From: Herbert Xu <herbert@gondor.apana.org.au>
To: Linus Torvalds <torvalds@linux-foundation.org>,
"David S. Miller" <davem@davemloft.net>,
Linux Kernel Mailing List <linux-kernel@vger.kernel.org>,
Linux Crypto Mailing List <linux-crypto@vger.kernel.org>
Subject: Crypto Update for 4.18
Date: Tue, 5 Jun 2018 01:15:52 +0800 [thread overview]
Message-ID: <20180604171552.lctgpei4y4xzogoo@gondor.apana.org.au> (raw)
In-Reply-To: <20180404152752.GA11822@gondor.apana.org.au>
Hi Linus:
Here is the crypto update for 4.18:
API:
- Decryption test vectors are now automatically generated from
encryption test vectors.
Algorithms:
- Fix unaligned access issues in crc32/crc32c.
- Add zstd compression algorithm.
- Add AEGIS.
- Add MORUS.
Drivers:
- Add accelerated AEGIS/MORUS on x86.
- Add accelerated SM4 on arm64.
- Removed x86 assembly salsa implementation as it is slower than C.
- Add authenc(hmac(sha*), cbc(aes)) support in inside-secure.
- Add ctr(aes) support in crypto4xx.
- Add hardware key support in ccree.
- Add support for new Centaur CPU in via-rng.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Adam Langley (1):
crypto: clarify licensing of OpenSSL asm code
Antoine Tenart (10):
crypto: inside-secure - remove VLAs
crypto: inside-secure - rework cipher functions for future AEAD support
crypto: inside-secure - rework the alg type settings in the context
crypto: inside-secure - make the context control size dynamic
crypto: inside-secure - make the key and context size computation dynamic
crypto: inside-secure - fix the hash then encrypt/decrypt types
crypto: inside-secure - improve error reporting
crypto: inside-secure - authenc(hmac(sha256), cbc(aes)) support
crypto: inside-secure - authenc(hmac(sha224), cbc(aes)) support
crypto: inside-secure - authenc(hmac(sha1), cbc(aes)) support
Ard Biesheuvel (12):
crypto: sm4 - export encrypt/decrypt routines to other drivers
crypto: arm64 - add support for SM4 encryption using special instructions
crypto: arm64/sha1-ce - yield NEON after every block of input
crypto: arm64/sha2-ce - yield NEON after every block of input
crypto: arm64/aes-ccm - yield NEON after every block of input
crypto: arm64/aes-blk - yield NEON after every block of input
crypto: arm64/aes-bs - yield NEON after every block of input
crypto: arm64/aes-ghash - yield NEON after every block of input
crypto: arm64/crc32-ce - yield NEON after every block of input
crypto: arm64/crct10dif-ce - yield NEON after every block of input
crypto: arm64/sha3-ce - yield NEON after every block of input
crypto: arm64/sha512-ce - yield NEON after every block of input
Atul Gupta (7):
crypto: chelsio - request to HW should wrap
crypto: chtls - generic handling of data and hdr
crypto: chtls - key len correction
crypto: chtls - wait for memory sendmsg, sendpage
crypto: chtls - dereference null variable
crypto: chtls - kbuild warnings
crypto: chtls - free beyond end rspq_skb_cache
Bin Liu (1):
crypto: omap-sham - fix memleak
Christian Lamparter (7):
crypto: crypto4xx - performance optimizations
crypto: crypto4xx - convert to skcipher
crypto: crypto4xx - avoid VLA use
crypto: crypto4xx - add aes-ctr support
crypto: crypto4xx - properly set IV after de- and encrypt
crypto: crypto4xx - extend aead fallback checks
crypto: crypto4xx - put temporary dst sg into request ctx
Colin Ian King (5):
crypto: chelsio - don't leak information from the stack to userspace
crypto: chelsio - remove redundant assignment to cdev->ports
crypto: ghash-clmulni - fix spelling mistake: "acclerated" -> "accelerated"
hwrng: n2 - fix spelling mistake: "restesting" -> "retesting"
crypto: nx - fix spelling mistake: "seqeunce" -> "sequence"
Conor McLoughlin (1):
crypto: qat - Add MODULE_FIRMWARE for all qat drivers
Eric Biggers (13):
crypto: crc32-generic - use unaligned access macros when needed
crypto: crc32c-generic - remove cra_alignmask
crypto: crc32-generic - remove __crc32_le()
crypto: testmgr - remove bfin_crc "hmac(crc32)" test vectors
crypto: testmgr - fix testing OPTIONAL_KEY hash algorithms
crypto: testmgr - add more unkeyed crc32 and crc32c test vectors
crypto: testmgr - add extra ecb(des) encryption test vectors
crypto: testmgr - make an cbc(des) encryption test vector chunked
crypto: testmgr - add extra ecb(tnepres) encryption test vectors
crypto: testmgr - add extra kw(aes) encryption test vector
crypto: testmgr - eliminate redundant decryption test vectors
crypto: x86/salsa20 - remove x86 salsa20 implementations
crypto: salsa20 - Revert "crypto: salsa20 - export generic helpers"
Fabio Estevam (4):
crypto: caam - staticize caam_get_era()
crypto: caam - allow retrieving 'era' from register
crypto: rsa - Remove unneeded error assignment
crypto: caam: - Use kmemdup() function
Geert Uytterhoeven (1):
crypto: drivers - Remove depends on HAS_DMA in case of platform dependency
Gilad Ben-Yossef (6):
crypto: ccree - enable support for hardware keys
crypto: ccree - use proper printk format
crypto: testmgr - reorder paes test lexicographically
crypto: ccree - correct host regs offset
crypto: ccree - better clock handling
crypto: ccree - silence debug prints
Gustavo A. R. Silva (1):
crypto: chelsio - Fix potential NULL pointer dereferences
Harsh Jain (3):
crypto: chelsio - Return -ENOSPC for transient busy indication.
crypt: chelsio - Send IV as Immediate for cipher algo
crypto: chelsio - Remove separate buffer used for DMA map B0 block in CCM
Horia Geantă (8):
crypto: caam - fix DMA mapping dir for generated IV
crypto: caam - fix IV DMA mapping and updating
crypto: caam/qi - fix IV DMA mapping and updating
crypto: caam - strip input zeros from RSA input buffer
crypto: caam - fix size of RSA prime factor q
crypto: caam - fix MC firmware detection
crypto: caam - fix rfc4543 descriptors
crypto: caam/qi - fix warning in init_cgr()
Jan Glauber (5):
crypto: cavium - Fix fallout from CONFIG_VMAP_STACK
crypto: cavium - Limit result reading attempts
crypto: cavium - Prevent division by zero
crypto: cavium - Fix statistics pending request value
crypto: cavium - Fix smp_processor_id() warnings
Janakarajan Natarajan (2):
crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command
crypto: ccp - Add GET_ID SEV command
Kees Cook (2):
crypto: ecc - Actually remove stack VLA usage
crypto: tcrypt - Remove VLA usage
Mahipal Challa (1):
crypto: testmgr - Allow different compression results
Michael Ellerman (2):
crypto: vmx - Remove overly verbose printk from AES init routines
crypto: vmx - Remove overly verbose printk from AES XTS init
Nick Terrell (1):
crypto: zstd - Add zstd support
Ondrej Mosnacek (9):
crypto: aegis - Add generic AEGIS AEAD implementations
crypto: testmgr - Add test vectors for AEGIS
crypto: x86 - Add optimized AEGIS implementations
crypto: morus - Add generic MORUS AEAD implementations
crypto: testmgr - Add test vectors for MORUS
crypto: morus - Add common SIMD glue code for MORUS
crypto: x86 - Add optimized MORUS implementations
crypto: x86/aegis256 - Fix wrong key buffer size
crypto: morus - Mark MORUS SIMD glue as x86-specific
Salvatore Mesoraca (2):
crypto: api - laying defines and checks for statically allocated buffers
crypto: remove several VLAs
Tudor-Dan Ambarus (2):
crypto: authenc - don't leak pointers to authenc keys
crypto: authencesn - don't leak pointers to authenc keys
Varsha Rao (1):
crypto: cavium - Remove unnecessary parentheses
Wenwen Wang (1):
crypto: chtls - fix a missing-check bug
Wolfram Sang (1):
crypto: drivers - simplify getting .drvdata
davidwang (1):
hwrng: via - support new Centaur CPU
lionel.debieve@st.com (2):
hwrng: stm32 - define default state for rng driver
hwrng: stm32 - fix pm_suspend issue
arch/arm/crypto/sha1-armv4-large.S | 10 +
arch/arm/crypto/sha256-armv4.pl | 11 +-
arch/arm/crypto/sha256-core.S_shipped | 11 +-
arch/arm/crypto/sha512-armv4.pl | 11 +-
arch/arm/crypto/sha512-core.S_shipped | 11 +-
arch/arm64/crypto/Kconfig | 6 +
arch/arm64/crypto/Makefile | 3 +
arch/arm64/crypto/aes-ce-ccm-core.S | 150 +-
arch/arm64/crypto/aes-ce.S | 15 +-
arch/arm64/crypto/aes-modes.S | 331 +-
arch/arm64/crypto/aes-neonbs-core.S | 305 +-
arch/arm64/crypto/crc32-ce-core.S | 40 +-
arch/arm64/crypto/crct10dif-ce-core.S | 32 +-
arch/arm64/crypto/ghash-ce-core.S | 113 +-
arch/arm64/crypto/ghash-ce-glue.c | 28 +-
arch/arm64/crypto/sha1-ce-core.S | 42 +-
arch/arm64/crypto/sha2-ce-core.S | 37 +-
arch/arm64/crypto/sha256-core.S_shipped | 12 +-
arch/arm64/crypto/sha3-ce-core.S | 77 +-
arch/arm64/crypto/sha512-armv8.pl | 12 +-
arch/arm64/crypto/sha512-ce-core.S | 27 +-
arch/arm64/crypto/sha512-core.S_shipped | 12 +-
arch/arm64/crypto/sm4-ce-core.S | 36 +
arch/arm64/crypto/sm4-ce-glue.c | 73 +
arch/x86/crypto/Makefile | 25 +-
arch/x86/crypto/aegis128-aesni-asm.S | 749 +
arch/x86/crypto/aegis128-aesni-glue.c | 407 +
arch/x86/crypto/aegis128l-aesni-asm.S | 825 +
arch/x86/crypto/aegis128l-aesni-glue.c | 407 +
arch/x86/crypto/aegis256-aesni-asm.S | 702 +
arch/x86/crypto/aegis256-aesni-glue.c | 407 +
arch/x86/crypto/ghash-clmulni-intel_glue.c | 2 +-
arch/x86/crypto/morus1280-avx2-asm.S | 621 +
arch/x86/crypto/morus1280-avx2-glue.c | 68 +
arch/x86/crypto/morus1280-sse2-asm.S | 895 +
arch/x86/crypto/morus1280-sse2-glue.c | 68 +
arch/x86/crypto/morus1280_glue.c | 302 +
arch/x86/crypto/morus640-sse2-asm.S | 614 +
arch/x86/crypto/morus640-sse2-glue.c | 68 +
arch/x86/crypto/morus640_glue.c | 298 +
arch/x86/crypto/salsa20-i586-asm_32.S | 938 -
arch/x86/crypto/salsa20-x86_64-asm_64.S | 805 -
arch/x86/crypto/salsa20_glue.c | 91 -
crypto/Kconfig | 138 +-
crypto/Makefile | 6 +
crypto/aegis.h | 80 +
crypto/aegis128.c | 463 +
crypto/aegis128l.c | 527 +
crypto/aegis256.c | 478 +
crypto/algapi.c | 10 +
crypto/authenc.c | 1 +
crypto/authencesn.c | 1 +
crypto/cfb.c | 7 +-
crypto/cipher.c | 3 +-
crypto/crc32_generic.c | 15 +-
crypto/crc32c_generic.c | 8 +-
crypto/ctr.c | 4 +-
crypto/cts.c | 5 +-
crypto/ecc.c | 66 +-
crypto/ecc.h | 4 +-
crypto/ecdh.c | 4 +-
crypto/morus1280.c | 549 +
crypto/morus640.c | 544 +
crypto/pcbc.c | 5 +-
crypto/rsa.c | 1 -
crypto/salsa20_generic.c | 20 +-
crypto/sm4_generic.c | 10 +-
crypto/tcrypt.c | 122 +-
crypto/testmgr.c | 613 +-
crypto/testmgr.h |47127 +++++++++++-------------
crypto/zstd.c | 265 +
drivers/char/hw_random/Kconfig | 1 +
drivers/char/hw_random/n2-drv.c | 2 +-
drivers/char/hw_random/stm32-rng.c | 9 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/Kconfig | 16 +-
drivers/crypto/amcc/crypto4xx_alg.c | 231 +-
drivers/crypto/amcc/crypto4xx_core.c | 317 +-
drivers/crypto/amcc/crypto4xx_core.h | 35 +-
drivers/crypto/caam/caamalg.c | 231 +-
drivers/crypto/caam/caamalg_desc.c | 4 +-
drivers/crypto/caam/caamalg_qi.c | 227 +-
drivers/crypto/caam/caampkc.c | 71 +-
drivers/crypto/caam/caampkc.h | 8 +
drivers/crypto/caam/ctrl.c | 78 +-
drivers/crypto/caam/ctrl.h | 2 -
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/qi.c | 5 +-
drivers/crypto/caam/regs.h | 6 +
drivers/crypto/cavium/zip/common.h | 21 +
drivers/crypto/cavium/zip/zip_crypto.c | 22 +-
drivers/crypto/cavium/zip/zip_deflate.c | 4 +-
drivers/crypto/cavium/zip/zip_device.c | 4 +-
drivers/crypto/cavium/zip/zip_inflate.c | 4 +-
drivers/crypto/cavium/zip/zip_main.c | 24 +-
drivers/crypto/cavium/zip/zip_main.h | 1 -
drivers/crypto/cavium/zip/zip_regs.h | 42 +-
drivers/crypto/ccp/psp-dev.c | 143 +-
drivers/crypto/ccp/psp-dev.h | 4 +
drivers/crypto/ccree/cc_cipher.c | 350 +-
drivers/crypto/ccree/cc_cipher.h | 30 +-
drivers/crypto/ccree/cc_debugfs.c | 7 +-
drivers/crypto/ccree/cc_driver.c | 36 +-
drivers/crypto/ccree/cc_driver.h | 2 +
drivers/crypto/ccree/cc_host_regs.h | 6 +-
drivers/crypto/chelsio/chcr_algo.c | 303 +-
drivers/crypto/chelsio/chcr_algo.h | 3 +-
drivers/crypto/chelsio/chcr_core.h | 2 +-
drivers/crypto/chelsio/chcr_crypto.h | 15 +-
drivers/crypto/chelsio/chcr_ipsec.c | 35 +-
drivers/crypto/chelsio/chtls/chtls.h | 11 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 28 +-
drivers/crypto/chelsio/chtls/chtls_hw.c | 6 +-
drivers/crypto/chelsio/chtls/chtls_io.c | 158 +-
drivers/crypto/chelsio/chtls/chtls_main.c | 16 +-
drivers/crypto/exynos-rng.c | 6 +-
drivers/crypto/inside-secure/safexcel.c | 32 +
drivers/crypto/inside-secure/safexcel.h | 44 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 642 +-
drivers/crypto/inside-secure/safexcel_hash.c | 23 +-
drivers/crypto/nx/nx-842-powernv.c | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/picoxcell_crypto.c | 6 +-
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 2 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 2 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 1 +
drivers/crypto/vmx/aes.c | 2 -
drivers/crypto/vmx/aes_cbc.c | 3 -
drivers/crypto/vmx/aes_ctr.c | 2 -
drivers/crypto/vmx/aes_xts.c | 2 -
drivers/crypto/vmx/aesp8-ppc.pl | 49 +-
drivers/crypto/vmx/ghash.c | 2 -
drivers/crypto/vmx/ghashp8-ppc.pl | 9 +
include/crypto/algapi.h | 8 +
include/crypto/morus1280_glue.h | 137 +
include/crypto/morus640_glue.h | 137 +
include/crypto/morus_common.h | 23 +
include/crypto/salsa20.h | 27 -
include/crypto/sm4.h | 3 +
include/linux/psp-sev.h | 23 +
include/uapi/linux/psp-sev.h | 12 +
141 files changed, 34902 insertions(+), 29595 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
next prev parent reply other threads:[~2018-06-04 17:15 UTC|newest]
Thread overview: 120+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-11-19 10:27 Crypto Fixes for 4.9 Herbert Xu
2016-11-23 5:36 ` Herbert Xu
2016-12-05 6:37 ` Herbert Xu
2016-12-10 6:01 ` Herbert Xu
2016-12-13 13:24 ` Crypto Update for 4.10 Herbert Xu
2017-02-23 12:51 ` Crypto Update for 4.11 Herbert Xu
2017-05-01 14:26 ` Crypto Update for 4.12 Herbert Xu
2017-07-05 13:01 ` Crypto Update for 4.13 Herbert Xu
2017-07-05 20:02 ` Linus Torvalds
2017-07-06 2:19 ` Herbert Xu
2017-07-14 14:18 ` Crypto Fixes " Herbert Xu
2017-07-28 8:49 ` Herbert Xu
2017-08-09 12:04 ` Herbert Xu
2017-08-14 9:43 ` Herbert Xu
2017-09-01 7:53 ` Herbert Xu
2017-09-22 8:44 ` Crypto Fixes for 4.14 Herbert Xu
2017-10-12 10:51 ` Herbert Xu
2017-10-30 7:20 ` Herbert Xu
2017-11-06 6:37 ` Herbert Xu
2017-11-28 23:09 ` Crypto Fixes for 4.15 Herbert Xu
2017-12-11 7:22 ` Herbert Xu
2017-12-22 6:49 ` Herbert Xu
2018-01-05 7:38 ` Herbert Xu
2018-01-12 6:44 ` Herbert Xu
2018-02-12 3:17 ` Crypto Fixes for 4.16 Herbert Xu
2018-04-28 8:05 ` Crypto Fixes for 4.17 Herbert Xu
2018-05-30 16:17 ` Herbert Xu
2018-06-22 14:54 ` Crypto Fixes for 4.18 Herbert Xu
2018-07-08 16:20 ` Herbert Xu
2018-07-08 18:31 ` Linus Torvalds
2018-07-09 9:47 ` Ondrej Mosnáček
2018-07-09 15:52 ` Linus Torvalds
2018-07-19 7:39 ` Herbert Xu
2018-08-03 5:44 ` Herbert Xu
2018-08-09 5:47 ` Herbert Xu
2018-08-29 3:33 ` Crypto Fixes for 4.19 Herbert Xu
2018-09-19 6:22 ` Herbert Xu
2018-09-19 13:23 ` Greg KH
2018-09-19 16:10 ` process? [Re: Crypto Fixes for 4.19] Randy Dunlap
2018-09-19 16:40 ` Greg KH
2018-09-19 16:48 ` Randy Dunlap
2018-09-19 17:00 ` Willy Tarreau
2018-10-05 2:08 ` Crypto Fixes for 4.19 Herbert Xu
2018-10-05 15:37 ` Greg KH
2018-11-16 6:31 ` Crypto Fixes for 4.20 Herbert Xu
2018-12-07 6:14 ` Herbert Xu
2019-01-18 10:40 ` Crypto Fixes for 5.0 Herbert Xu
2019-02-01 5:42 ` Herbert Xu
2019-02-01 7:37 ` Linus Torvalds
2019-02-15 2:47 ` [GIT] " Herbert Xu
2019-02-15 17:10 ` pr-tracker-bot
2019-02-28 5:56 ` Herbert Xu
2019-03-02 0:20 ` pr-tracker-bot
2019-03-02 2:42 ` Herbert Xu
2019-03-02 17:10 ` pr-tracker-bot
2019-03-05 8:11 ` [GIT] Crypto Update for 5.1 Herbert Xu
2019-03-05 17:40 ` pr-tracker-bot
2019-05-06 3:29 ` [GIT] Crypto Update for 5.2 Herbert Xu
2019-05-07 3:25 ` pr-tracker-bot
2019-07-08 15:08 ` [GIT] Crypto Update for 5.3 Herbert Xu
2019-07-09 4:45 ` pr-tracker-bot
2019-03-12 4:58 ` [GIT] Crypto Fixes for 5.1 Herbert Xu
2019-03-13 17:10 ` pr-tracker-bot
2019-04-08 5:48 ` Herbert Xu
2019-04-08 6:25 ` pr-tracker-bot
2019-04-18 5:17 ` Herbert Xu
2019-04-18 15:20 ` pr-tracker-bot
2019-04-25 7:26 ` Herbert Xu
2019-04-25 16:25 ` pr-tracker-bot
2019-05-15 6:05 ` [GIT] Crypto Fixes for 5.2 Herbert Xu
2019-05-15 16:10 ` pr-tracker-bot
2019-05-21 12:58 ` Herbert Xu
2019-05-21 19:55 ` pr-tracker-bot
2019-06-06 6:03 ` Herbert Xu
2019-06-06 20:20 ` pr-tracker-bot
2019-07-05 4:24 ` Herbert Xu
2019-07-05 4:40 ` pr-tracker-bot
2019-07-19 3:12 ` [GIT] Crypto Fixes for 5.3 Herbert Xu
2019-07-19 19:45 ` pr-tracker-bot
2019-08-09 6:15 ` Herbert Xu
2019-08-09 16:35 ` pr-tracker-bot
2019-08-30 7:39 ` Herbert Xu
2019-08-31 2:01 ` Linus Torvalds
2019-08-31 12:12 ` Herbert Xu
2019-08-31 2:10 ` pr-tracker-bot
2017-09-04 10:12 ` Crypto Update for 4.14 Herbert Xu
2017-11-13 7:43 ` Crypto Update for 4.15 Herbert Xu
2018-01-29 14:50 ` Crypto Update for 4.16 Herbert Xu
2018-04-04 15:27 ` Crypto Update for 4.17 Herbert Xu
2018-06-04 17:15 ` Herbert Xu [this message]
2018-08-15 12:05 ` Crypto Update for 4.19 Herbert Xu
2018-10-23 10:09 ` Crypto Update for 4.20 Herbert Xu
2018-10-25 23:46 ` Linus Torvalds
2018-12-26 13:22 ` Crypto Update for 4.21 Herbert Xu
2018-12-26 16:49 ` Eric Biggers
2018-12-27 1:03 ` Herbert Xu
2016-12-15 16:07 ` Crypto Fixes for 4.10 Herbert Xu
2016-12-27 9:45 ` Herbert Xu
2016-12-30 10:19 ` Herbert Xu
2017-01-11 11:56 ` Herbert Xu
2017-02-01 9:04 ` Herbert Xu
2017-02-06 9:25 ` Herbert Xu
2017-03-04 7:41 ` Crypto Fixes for 4.11 Herbert Xu
2017-03-15 6:31 ` Herbert Xu
2017-03-24 13:46 ` Herbert Xu
2017-03-31 10:29 ` Herbert Xu
2017-04-10 11:04 ` Herbert Xu
2017-04-18 10:27 ` Herbert Xu
2017-05-23 3:42 ` Crypto Fixes for 4.12 Herbert Xu
2017-06-08 9:23 ` Herbert Xu
2017-06-08 14:05 ` David Miller
2017-06-09 2:52 ` Herbert Xu
2017-06-15 0:54 ` Herbert Xu
2017-06-15 9:04 ` Linus Torvalds
2017-06-15 9:05 ` Linus Torvalds
2017-06-15 9:42 ` Herbert Xu
2017-06-15 15:02 ` David Miller
2017-06-15 15:01 ` David Miller
2017-06-16 12:50 ` Theodore Ts'o
2017-06-16 16:49 ` David Miller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180604171552.lctgpei4y4xzogoo@gondor.apana.org.au \
--to=herbert@gondor.apana.org.au \
--cc=davem@davemloft.net \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).