Linux-Crypto Archive on lore.kernel.org
 help / color / Atom feed
* Crypto Update for 2.6.29
@ 2008-12-25  0:17 Herbert Xu
  2008-12-25  0:20 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2008-12-25  0:17 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.29:

The main change is the introduction of the shash algorithm type.
It's meant to replace the existing hash type as the main interface
for synchronous hash operations.  Its key feature is support for
simultaneous operations on a single tfm where previously multiple
tfm objects had to be allocated.  A large chunk of the changes
here are simply conversions of existing hash algorithms to use
the new interface.  In particular, the crc32c algorithm has been
converted, which means that the libcrc32c interface can now use
the crypto interface, giving it access to Intel's new CRC32C
instruction.

Apart from that there is the usual collection of bug fixes and
updates to algorithms and drivers.

Adrian-Ken Rueegsegger (10):
      libcrc32c: Fix "crc32c undefined" compilation error
      crypto: sha1 - Switch to shash
      crypto: md4 - Switch to shash
      crypto: md5 - Switch to shash
      crypto: sha256 - Switch to shash
      crypto: tgr192 - Switch to shash
      crypto: wp512 - Switch to shash
      crypto: michael_mic - Switch to shash
      crypto: sha512 - Move message schedule W[80] to static percpu area
      crypto: sha512 - Switch to shash

Evgeniy Polyakov (3):
      crypto: hifn - Disable driver when physical size exceeds 32 bits
      crypto: hifn_795x - Fix queue management
      crypto: hifn_795x - Use softirq kernel mapping in bh context

Geert Uytterhoeven (2):
      crypto: testmgr - Validate output length in (de)compression tests
      crypto: testmgr - Correct comment about deflate parameters

Harvey Harrison (3):
      crypto: camellia - use kernel-provided bitops, unaligned access
      crypto: remove uses of __constant_{endian} helpers
      crypto: salsa20 - Remove private wrappers around various operations

Herbert Xu (21):
      crypto: padlock - Avoid resetting cword on successive operations
      crypto: api - Move type exit function into crypto_tfm
      crypto: api - Rebirth of crypto_alloc_tfm
      crypto: hash - Add shash interface
      crypto: hash - Export shash through ahash
      crypto: hash - Add import/export interface
      crypto: api - Call type show function before legacy for proc
      crypto: hash - Export shash through hash
      crypto: crc32c - Switch to shash
      crypto: crc32c-intel - Switch to shash
      crypto: crc32c - Test descriptor context format
      libcrc32c: Move implementation to crypto crc32c
      libcrc32c: Add crc32c_le macro
      libcrc32c: Select CRYPTO in Kconfig
      crypto: hash - Make setkey optional
      crypto: null - Switch to shash
      crypto: rmd128 - Switch to shash
      crypto: rmd160 - Switch to shash
      crypto: rmd256 - Switch to shash
      crypto: rmd320 - Switch to shash
      crypto: aes - Precompute tables

Ingo Molnar (1):
      crypto: testmgr - Fix error flow of test_comp

Jarod Wilson (3):
      crypto: ansi_cprng - Avoid incorrect extra call to _get_more_prng_bytes
      crypto: ansi_cprng - fix inverted DT increment routine
      crypto: des3_ede - permit weak keys unless REQ_WEAK_KEY set

Julia Lawall (1):
      crypto: md4 - Use ARRAY_SIZE

Kent Liu (1):
      crypto: crc32c-intel - Update copyright head

Kim Phillips (2):
      crypto: talitos - Pass correct interrupt status to error handler
      crypto: talitos - Perform auth check in h/w if on sec 2.1 and above

Lee Nipper (2):
      crypto: talitos - Implement done interrupt mitigation
      crypto: talitos - Ack done interrupt in isr instead of tasklet

Neil Horman (2):
      crypto: testmgr - Trigger a panic when self test fails in FIPS mode
      crypto: ansi_cprng - Allow resetting of DT value

Patrick McHardy (5):
      crypto: hifn_795x - Fix DMA setup
      crypto: hifn_795x - Don't copy src sg list
      crypto: hifn_795x - Fix request context corruption
      crypto: hifn_795x - Fix queue processing
      crypto: hifn_795x - Remove some unused cruft

Vishnu Suresh (1):
      crypto: talitos - Preempt overflow interrupts off-by-one fix

 arch/x86/crypto/crc32c-intel.c |  121 +++---
 crypto/Kconfig                 |   29 +-
 crypto/Makefile                |    1 +
 crypto/aes_generic.c           | 1145 ++++++++++++++++++++++++++++++++++++----
 crypto/ahash.c                 |   38 ++-
 crypto/ansi_cprng.c            |   35 +-
 crypto/api.c                   |  121 ++++-
 crypto/authenc.c               |    3 +
 crypto/camellia.c              |   84 ++--
 crypto/crc32c.c                |  290 ++++++-----
 crypto/crypto_null.c           |   64 ++-
 crypto/des_generic.c           |    5 +-
 crypto/fcrypt.c                |    8 +-
 crypto/hmac.c                  |   10 +-
 crypto/internal.h              |    2 +
 crypto/md4.c                   |   56 ++-
 crypto/md5.c                   |   50 +-
 crypto/michael_mic.c           |   72 ++--
 crypto/proc.c                  |   20 +-
 crypto/rmd128.c                |   61 ++-
 crypto/rmd160.c                |   61 ++-
 crypto/rmd256.c                |   61 ++-
 crypto/rmd320.c                |   61 ++-
 crypto/salsa20_generic.c       |   75 ++--
 crypto/sha1_generic.c          |   56 ++-
 crypto/sha256_generic.c        |  104 ++--
 crypto/sha512_generic.c        |  127 +++---
 crypto/shash.c                 |  508 ++++++++++++++++++
 crypto/testmgr.c               |   76 +++-
 crypto/testmgr.h               |    2 +-
 crypto/tgr192.c                |  135 +++---
 crypto/wp512.c                 |  121 +++--
 drivers/crypto/hifn_795x.c     |  494 ++++++++---------
 drivers/crypto/padlock-aes.c   |   52 ++-
 drivers/crypto/talitos.c       |  153 ++++--
 drivers/crypto/talitos.h       |   85 ++--
 include/crypto/aes.h           |    8 +-
 include/crypto/algapi.h        |   16 +-
 include/crypto/hash.h          |  125 +++++
 include/crypto/internal/hash.h |   16 +-
 include/linux/crc32c.h         |    6 +-
 include/linux/crypto.h         |   10 +-
 lib/Kconfig                    |    2 +
 lib/libcrc32c.c                |  182 ++------
 44 files changed, 3331 insertions(+), 1420 deletions(-)
 create mode 100644 crypto/shash.c

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.29
  2008-12-25  0:17 Crypto Update for 2.6.29 Herbert Xu
@ 2008-12-25  0:20 ` Herbert Xu
  2009-03-24  4:49   ` Crypto Update for 2.6.30 Herbert Xu
       [not found]   ` <20090324044932.GA18245@gondor.apana.org.au>
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2008-12-25  0:20 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.29:

The main change is the introduction of the shash algorithm type.
It's meant to replace the existing hash type as the main interface
for synchronous hash operations.  Its key feature is support for
simultaneous operations on a single tfm where previously multiple
tfm objects had to be allocated.  A large chunk of the changes
here are simply conversions of existing hash algorithms to use
the new interface.  In particular, the crc32c algorithm has been
converted, which means that the libcrc32c interface can now use
the crypto interface, giving it access to Intel's new CRC32C
instruction.

Apart from that there is the usual collection of bug fixes and
updates to algorithms and drivers.

Now with the pull location :)

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Adrian-Ken Rueegsegger (10):
      libcrc32c: Fix "crc32c undefined" compilation error
      crypto: sha1 - Switch to shash
      crypto: md4 - Switch to shash
      crypto: md5 - Switch to shash
      crypto: sha256 - Switch to shash
      crypto: tgr192 - Switch to shash
      crypto: wp512 - Switch to shash
      crypto: michael_mic - Switch to shash
      crypto: sha512 - Move message schedule W[80] to static percpu area
      crypto: sha512 - Switch to shash

Evgeniy Polyakov (3):
      crypto: hifn - Disable driver when physical size exceeds 32 bits
      crypto: hifn_795x - Fix queue management
      crypto: hifn_795x - Use softirq kernel mapping in bh context

Geert Uytterhoeven (2):
      crypto: testmgr - Validate output length in (de)compression tests
      crypto: testmgr - Correct comment about deflate parameters

Harvey Harrison (3):
      crypto: camellia - use kernel-provided bitops, unaligned access
      crypto: remove uses of __constant_{endian} helpers
      crypto: salsa20 - Remove private wrappers around various operations

Herbert Xu (21):
      crypto: padlock - Avoid resetting cword on successive operations
      crypto: api - Move type exit function into crypto_tfm
      crypto: api - Rebirth of crypto_alloc_tfm
      crypto: hash - Add shash interface
      crypto: hash - Export shash through ahash
      crypto: hash - Add import/export interface
      crypto: api - Call type show function before legacy for proc
      crypto: hash - Export shash through hash
      crypto: crc32c - Switch to shash
      crypto: crc32c-intel - Switch to shash
      crypto: crc32c - Test descriptor context format
      libcrc32c: Move implementation to crypto crc32c
      libcrc32c: Add crc32c_le macro
      libcrc32c: Select CRYPTO in Kconfig
      crypto: hash - Make setkey optional
      crypto: null - Switch to shash
      crypto: rmd128 - Switch to shash
      crypto: rmd160 - Switch to shash
      crypto: rmd256 - Switch to shash
      crypto: rmd320 - Switch to shash
      crypto: aes - Precompute tables

Ingo Molnar (1):
      crypto: testmgr - Fix error flow of test_comp

Jarod Wilson (3):
      crypto: ansi_cprng - Avoid incorrect extra call to _get_more_prng_bytes
      crypto: ansi_cprng - fix inverted DT increment routine
      crypto: des3_ede - permit weak keys unless REQ_WEAK_KEY set

Julia Lawall (1):
      crypto: md4 - Use ARRAY_SIZE

Kent Liu (1):
      crypto: crc32c-intel - Update copyright head

Kim Phillips (2):
      crypto: talitos - Pass correct interrupt status to error handler
      crypto: talitos - Perform auth check in h/w if on sec 2.1 and above

Lee Nipper (2):
      crypto: talitos - Implement done interrupt mitigation
      crypto: talitos - Ack done interrupt in isr instead of tasklet

Neil Horman (2):
      crypto: testmgr - Trigger a panic when self test fails in FIPS mode
      crypto: ansi_cprng - Allow resetting of DT value

Patrick McHardy (5):
      crypto: hifn_795x - Fix DMA setup
      crypto: hifn_795x - Don't copy src sg list
      crypto: hifn_795x - Fix request context corruption
      crypto: hifn_795x - Fix queue processing
      crypto: hifn_795x - Remove some unused cruft

Vishnu Suresh (1):
      crypto: talitos - Preempt overflow interrupts off-by-one fix

 arch/x86/crypto/crc32c-intel.c |  121 +++---
 crypto/Kconfig                 |   29 +-
 crypto/Makefile                |    1 +
 crypto/aes_generic.c           | 1145 ++++++++++++++++++++++++++++++++++++----
 crypto/ahash.c                 |   38 ++-
 crypto/ansi_cprng.c            |   35 +-
 crypto/api.c                   |  121 ++++-
 crypto/authenc.c               |    3 +
 crypto/camellia.c              |   84 ++--
 crypto/crc32c.c                |  290 ++++++-----
 crypto/crypto_null.c           |   64 ++-
 crypto/des_generic.c           |    5 +-
 crypto/fcrypt.c                |    8 +-
 crypto/hmac.c                  |   10 +-
 crypto/internal.h              |    2 +
 crypto/md4.c                   |   56 ++-
 crypto/md5.c                   |   50 +-
 crypto/michael_mic.c           |   72 ++--
 crypto/proc.c                  |   20 +-
 crypto/rmd128.c                |   61 ++-
 crypto/rmd160.c                |   61 ++-
 crypto/rmd256.c                |   61 ++-
 crypto/rmd320.c                |   61 ++-
 crypto/salsa20_generic.c       |   75 ++--
 crypto/sha1_generic.c          |   56 ++-
 crypto/sha256_generic.c        |  104 ++--
 crypto/sha512_generic.c        |  127 +++---
 crypto/shash.c                 |  508 ++++++++++++++++++
 crypto/testmgr.c               |   76 +++-
 crypto/testmgr.h               |    2 +-
 crypto/tgr192.c                |  135 +++---
 crypto/wp512.c                 |  121 +++--
 drivers/crypto/hifn_795x.c     |  494 ++++++++---------
 drivers/crypto/padlock-aes.c   |   52 ++-
 drivers/crypto/talitos.c       |  153 ++++--
 drivers/crypto/talitos.h       |   85 ++--
 include/crypto/aes.h           |    8 +-
 include/crypto/algapi.h        |   16 +-
 include/crypto/hash.h          |  125 +++++
 include/crypto/internal/hash.h |   16 +-
 include/linux/crc32c.h         |    6 +-
 include/linux/crypto.h         |   10 +-
 lib/Kconfig                    |    2 +
 lib/libcrc32c.c                |  182 ++------
 44 files changed, 3331 insertions(+), 1420 deletions(-)
 create mode 100644 crypto/shash.c

> Thanks,
> -- 
> Visit Openswan at http://www.openswan.org/
> Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
> Home Page: http://gondor.apana.org.au/~herbert/
> PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.30
  2008-12-25  0:20 ` Herbert Xu
@ 2009-03-24  4:49   ` Herbert Xu
       [not found]   ` <20090324044932.GA18245@gondor.apana.org.au>
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-03-24  4:49 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.30:

* A new compression interface that supports "compress as you go".
 - This includes a patch to move nlattr from net into lib.
* Support for the Intel AES instruction.
* More shash algorithm conversions.
* Multithreaded software crypto through cryptd.
* AMCC crypto driver.
* timeriomem RNG driver.
* Random fixes.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Adrian-Ken Rueegsegger (1):
      crypto: Fix dead links

Alexander Clouter (1):
      hwrng: timeriomem - New driver

Geert Uytterhoeven (5):
      netlink: Move netlink attribute parsing support to lib
      crypto: compress - Add pcomp interface
      crypto: testmgr - Add support for the pcomp interface
      crypto: zlib - New zlib crypto module, using pcomp
      crypto: testmgr - add zlib test

Heiko Carstens (1):
      hwrng: timeriomem - Breaks an allyesconfig build on s390:

Herbert Xu (10):
      crypto: shash - Remove superfluous check in init_tfm
      crypto: shash - Add crypto_shash_blocksize
      crypto: sha-s390 - Switch to shash
      crypto: api - crypto_alg_mod_lookup either tested or untested
      crypto: api - Fix crypto_alloc_tfm/create_create_tfm return convention
      crypto: skcipher - Avoid infinite loop when cipher fails selftest
      crypto: aead - Avoid infinite loop when nivaead fails selftest
      crypto: testmgr - Test skciphers with no IVs
      nlattr: Fix build error with NET off
      crypto: sha512-s390 - Add missing block size

Huang Ying (7):
      crypto: aes - Move key_length in struct crypto_aes_ctx to be the last field
      crypto: aes - Export x86 AES encrypt/decrypt functions
      crypto: cryptd - Add support to access underlying blkcipher
      crypto: aes-ni - Add support to Intel AES-NI instructions for x86_64 platform
      crypto: api - Use dedicated workqueue for crypto subsystem
      crypto: cryptd - Per-CPU thread implementation based on kcrypto_wq
      crypto: chainiv - Use kcrypto_wq instead of keventd_wq

James Hsiao (1):
      crypto: amcc - Add crypt4xx driver

Neil Horman (3):
      crypto: ansi_cprng - Force reset on allocation
      crypto: ansi_cprng - Panic on CPRNG test failure when in FIPS mode
      crypto: ansi_cprng - Add maintainer

 MAINTAINERS                             |    6 +
 arch/powerpc/boot/dts/canyonlands.dts   |    7 +
 arch/powerpc/boot/dts/kilauea.dts       |    7 +
 arch/s390/crypto/sha.h                  |    6 +-
 arch/s390/crypto/sha1_s390.c            |   40 +-
 arch/s390/crypto/sha256_s390.c          |   40 +-
 arch/s390/crypto/sha512_s390.c          |   81 +-
 arch/s390/crypto/sha_common.c           |   20 +-
 arch/x86/crypto/Makefile                |    3 +
 arch/x86/crypto/aes-i586-asm_32.S       |   18 +-
 arch/x86/crypto/aes-x86_64-asm_64.S     |    6 +-
 arch/x86/crypto/aes_glue.c              |   20 +-
 arch/x86/crypto/aesni-intel_asm.S       |  896 +++++++++++++++++++++
 arch/x86/crypto/aesni-intel_glue.c      |  461 +++++++++++
 arch/x86/include/asm/aes.h              |   11 +
 arch/x86/include/asm/cpufeature.h       |    1 +
 crypto/Kconfig                          |   44 +
 crypto/Makefile                         |    5 +
 crypto/ablkcipher.c                     |   19 +
 crypto/aead.c                           |   16 +
 crypto/algboss.c                        |   20 +-
 crypto/ansi_cprng.c                     |   17 +-
 crypto/api.c                            |   17 +-
 crypto/blkcipher.c                      |    2 +-
 crypto/chainiv.c                        |    3 +-
 crypto/cryptd.c                         |  237 +++---
 crypto/crypto_wq.c                      |   38 +
 crypto/gf128mul.c                       |    2 +-
 crypto/internal.h                       |    6 +-
 crypto/pcompress.c                      |   97 +++
 crypto/sha256_generic.c                 |    2 +-
 crypto/shash.c                          |   20 +-
 crypto/tcrypt.c                         |    6 +-
 crypto/testmgr.c                        |  198 +++++
 crypto/testmgr.h                        |  147 ++++
 crypto/zlib.c                           |  378 +++++++++
 drivers/char/hw_random/Kconfig          |   14 +
 drivers/char/hw_random/Makefile         |    1 +
 drivers/char/hw_random/timeriomem-rng.c |  151 ++++
 drivers/crypto/Kconfig                  |   15 +-
 drivers/crypto/Makefile                 |    1 +
 drivers/crypto/amcc/Makefile            |    2 +
 drivers/crypto/amcc/crypto4xx_alg.c     |  293 +++++++
 drivers/crypto/amcc/crypto4xx_core.c    | 1310 +++++++++++++++++++++++++++++++
 drivers/crypto/amcc/crypto4xx_core.h    |  177 +++++
 drivers/crypto/amcc/crypto4xx_reg_def.h |  284 +++++++
 drivers/crypto/amcc/crypto4xx_sa.c      |  108 +++
 drivers/crypto/amcc/crypto4xx_sa.h      |  243 ++++++
 include/crypto/aes.h                    |    6 +-
 include/crypto/compress.h               |  145 ++++
 include/crypto/cryptd.h                 |   27 +
 include/crypto/crypto_wq.h              |    7 +
 include/crypto/hash.h                   |    5 +
 include/crypto/internal/compress.h      |   28 +
 include/linux/crypto.h                  |    4 +-
 include/linux/timeriomem-rng.h          |   21 +
 lib/Kconfig                             |    6 +
 lib/Makefile                            |    2 +
 net/netlink/attr.c => lib/nlattr.c      |   20 +-
 net/Kconfig                             |    1 +
 net/netlink/Makefile                    |    2 +-
 61 files changed, 5506 insertions(+), 264 deletions(-)
 create mode 100644 arch/x86/crypto/aesni-intel_asm.S
 create mode 100644 arch/x86/crypto/aesni-intel_glue.c
 create mode 100644 arch/x86/include/asm/aes.h
 create mode 100644 crypto/crypto_wq.c
 create mode 100644 crypto/pcompress.c
 create mode 100644 crypto/zlib.c
 create mode 100644 drivers/char/hw_random/timeriomem-rng.c
 create mode 100644 drivers/crypto/amcc/Makefile
 create mode 100644 drivers/crypto/amcc/crypto4xx_alg.c
 create mode 100644 drivers/crypto/amcc/crypto4xx_core.c
 create mode 100644 drivers/crypto/amcc/crypto4xx_core.h
 create mode 100644 drivers/crypto/amcc/crypto4xx_reg_def.h
 create mode 100644 drivers/crypto/amcc/crypto4xx_sa.c
 create mode 100644 drivers/crypto/amcc/crypto4xx_sa.h
 create mode 100644 include/crypto/compress.h
 create mode 100644 include/crypto/cryptd.h
 create mode 100644 include/crypto/crypto_wq.h
 create mode 100644 include/crypto/internal/compress.h
 create mode 100644 include/linux/timeriomem-rng.h
 rename net/netlink/attr.c => lib/nlattr.c (99%)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.30
       [not found]   ` <20090324044932.GA18245@gondor.apana.org.au>
@ 2009-04-02  6:14     ` Herbert Xu
  2009-05-17 22:28       ` Herbert Xu
  2009-06-13  2:05     ` Crypto Update for 2.6.31 Herbert Xu
  2009-12-04 13:55     ` Crypto Update for 2.6.33 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-04-02  6:14 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes three bugs/regressions:

* IO address handling fix in timeriomem.
* Crash due to incorrect SG handling in ixp4xx.
* Crypto API (shash) bug that can lead to a CRC32C crash.
 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexander Clouter (1):
      hwrng: timeriomem - Use phys address rather than virt

Christian Hohnstaedt (1):
      crypto: ixp4xx - Fix handling of chained sg buffers

Yehuda Sadeh (1):
      crypto: shash - Fix unaligned calculation with short length

 crypto/shash.c                          |    3 +
 drivers/char/hw_random/timeriomem-rng.c |   39 ++++++-
 drivers/crypto/ixp4xx_crypto.c          |  182 +++++++++++--------------------
 include/linux/timeriomem-rng.h          |    2 +-
 4 files changed, 102 insertions(+), 124 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.30
  2009-04-02  6:14     ` Herbert Xu
@ 2009-05-17 22:28       ` Herbert Xu
  2009-05-31 13:12         ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-05-17 22:28 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a few bugs/regressions:

* Check firmware before claiming algorithm support in ixp4xx.
* Fix autoloading of optimised AES modules.
* Fix eseqiv IV generation.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Christian Hohnstaedt (1):
      crypto: ixp4xx - check firmware for crypto support

Herbert Xu (2):
      crypto: api - Fix algorithm module auto-loading
      crypto: padlock - Revert aes-all alias to aes

Steffen Klassert (1):
      crypto: eseqiv - Fix IV generation for sync algorithms

 crypto/api.c                   |    3 ++-
 crypto/eseqiv.c                |    3 ++-
 drivers/crypto/ixp4xx_crypto.c |   33 ++++++++++++++++++++++++++++++++-
 drivers/crypto/padlock-aes.c   |    2 +-
 4 files changed, 37 insertions(+), 4 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.30
  2009-05-17 22:28       ` Herbert Xu
@ 2009-05-31 13:12         ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-05-31 13:12 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression that triggers with SLAB debugging on,
where the new ahash code fails to handle sg entries that cross page
boundaries which are generated by kmalloc.
 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: hash - Fix handling of sg entry that crosses page boundary

 crypto/ahash.c |    7 ++++---
 1 files changed, 4 insertions(+), 3 deletions(-)
 
Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.31
       [not found]   ` <20090324044932.GA18245@gondor.apana.org.au>
  2009-04-02  6:14     ` Herbert Xu
@ 2009-06-13  2:05     ` Herbert Xu
  2009-06-21 14:09       ` Crypto Fixes " Herbert Xu
                         ` (2 more replies)
  2009-12-04 13:55     ` Crypto Update for 2.6.33 Herbert Xu
  2 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2009-06-13  2:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.31:

* 64-bit VIA crypto/RNG support.
* More operation modes added for Intel AES.
* New test vectors for CCM/CTR/RNG.
* Slight change to the compress API for squashfs.
* Talitos fixes/clean-ups.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alex Riesen (1):
      crypto: api - Use formatting of module name

Alexander Clouter (1):
      hwrng: timeriomem - Fix potential oops (request_mem_region/__devinit)

Frank Seidel (1):
      crypto: tcrypt - Reduce stack size

Geert Uytterhoeven (3):
      crypto: testmgr - Kill test_comp() sparse warnings
      crypto: pcomp - pcompress.c should include crypto/internal/compress.h
      crypto: compress - Return produced bytes in crypto_{,de}compress_{update,final}

Harald Welte (3):
      hwrng: via_rng - The VIA Hardware RNG driver is for the CPU, not Chipset
      hwrng: via_rng - Support VIA Nano hardware RNG
      hwrng: via_rng - Support VIA Nano hardware RNG on X86_64 builds

Herbert Xu (4):
      crypto: padlock - Restore dependency on x86
      crypto: testmgr - Dynamically allocate xbuf and axbuf
      crypto: testmgr - Check all test vector lengths
      crypto: testmgr - Allow hash test vectors longer than a page

Huang Ying (3):
      crypto: cryptd - Use nivcipher in cryptd_alloc_ablkcipher
      crypto: fpu - Add template for blkcipher touching FPU
      crypto: aes-ni - Add support for more modes

Jarod Wilson (10):
      crypto: testmgr - Handle AEAD test vectors expected to fail verification
      crypto: testmgr - Add self-tests for rfc4309(ccm(aes))
      crypto: testmgr - Add infrastructure for ansi_cprng self-tests
      crypto: testmgr - Add ansi_cprng test vectors
      crypto: testmgr - Catch base cipher self-test failures in fips mode
      crypto: testmgr - Print self-test pass notices in fips mode
      crypto: testmgr - Add ctr(aes) test vectors
      crypto: testmgr - Mark algs allowed in fips mode
      crypto: testmgr - Skip algs not flagged fips_allowed in fips mode
      crypto: tcrypt - Do not exit on success in fips mode

Johannes Weiner (1):
      crypto: api - Use kzfree

Kim Phillips (3):
      crypto: talitos - Whitespace/codingstyle/overrun lines cleanup
      crypto: talitos - containerof related codingstyle
      crypto: talitos - Avoid unnecessary decrypt check

Lee Nipper (2):
      crypto: talitos - scaffolding for new algorithm types
      crypto: talitos - Add ablkcipher algorithms

Mike Frysinger (1):
      crypto: hifn_795x - fix __dev{init,exit} markings

Sebastian Andrzej Siewior (1):
      crypto: padlock - Enable on x86_64

Uwe Kleine-König (1):
      hwrng: omap - Move probe function to .devinit.text

 arch/x86/crypto/Makefile                |    2 +
 arch/x86/crypto/aesni-intel_glue.c      |  267 ++++++++++++-
 arch/x86/crypto/fpu.c                   |  166 +++++++
 crypto/Kconfig                          |   10 +
 crypto/algboss.c                        |   18 +-
 crypto/api.c                            |   14 +-
 crypto/cryptd.c                         |   14 +-
 crypto/internal.h                       |    3 -
 crypto/pcompress.c                      |    1 +
 crypto/tcrypt.c                         |  183 +++++----
 crypto/testmgr.c                        |  470 ++++++++++++++++-----
 crypto/testmgr.h                        |  645 ++++++++++++++++++++++++++++-
 crypto/zlib.c                           |   24 +-
 drivers/char/hw_random/Kconfig          |    2 +-
 drivers/char/hw_random/omap-rng.c       |    2 +-
 drivers/char/hw_random/timeriomem-rng.c |   26 +-
 drivers/char/hw_random/via-rng.c        |   15 +-
 drivers/crypto/Kconfig                  |    2 +-
 drivers/crypto/hifn_795x.c              |    8 +-
 drivers/crypto/padlock-aes.c            |   13 +
 drivers/crypto/talitos.c                |  713 ++++++++++++++++++++++---------
 21 files changed, 2141 insertions(+), 457 deletions(-)
 
Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.31
  2009-06-13  2:05     ` Crypto Update for 2.6.31 Herbert Xu
@ 2009-06-21 14:09       ` Herbert Xu
  2009-09-02 22:03         ` Herbert Xu
  2009-09-10 14:19       ` Crypto Update for 2.6.32 Herbert Xu
       [not found]       ` <20090910141905.GA17948@gondor.apana.org.au>
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-06-21 14:09 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a number of regressions for hardware AES:

* Spurious page faults with AES on Via Nano.
* Fix broken decryption with Intel AES.
* Fix atomic sleep with Intel AES.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Chuck Ebbert (2):
      crypto: padlock-aes - work around Nano CPU errata in ECB mode
      crypto: padlock-aes - work around Nano CPU errata in CBC mode

Huang Ying (3):
      crypto: aes-ni - Fix cbc mode IV saving
      crypto: aes-ni - Do not sleep when using the FPU
      crypto: aes-ni - Remove CRYPTO_TFM_REQ_MAY_SLEEP from fpu template

 arch/x86/crypto/aesni-intel_asm.S  |    5 +-
 arch/x86/crypto/aesni-intel_glue.c |    4 +
 arch/x86/crypto/fpu.c              |    4 +-
 drivers/crypto/padlock-aes.c       |  138 +++++++++++++++++++++++++----------
 4 files changed, 107 insertions(+), 44 deletions(-)

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.31
  2009-06-21 14:09       ` Crypto Fixes " Herbert Xu
@ 2009-09-02 22:03         ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-09-02 22:03 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a serious regression for IPsec when using the
chainiv algorithm.  We were checking for NULL after converting a
pointer that can be NULL to its container, which means that
the NULL pointer check is useless.  This would occur when the
chainiv backlog queue is depleted.  The result is a crash.

Based on the one report received it does not occur all the time
though, possibly because we only use the backlog when two CPUs
try to push data through a single SA at the same time, which is
rare.
 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: skcipher - Fix skcipher_dequeue_givcrypt NULL test

 crypto/algapi.c                    |   11 +++++++++--
 include/crypto/algapi.h            |    1 +
 include/crypto/internal/skcipher.h |    4 ++--
 3 files changed, 12 insertions(+), 4 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.32
  2009-06-13  2:05     ` Crypto Update for 2.6.31 Herbert Xu
  2009-06-21 14:09       ` Crypto Fixes " Herbert Xu
@ 2009-09-10 14:19       ` Herbert Xu
       [not found]       ` <20090910141905.GA17948@gondor.apana.org.au>
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-09-10 14:19 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.32:

* Completed hash algorithm transition to shash.
* Convert IPsec over to lockless ahash interface.
* Split GHASH from GCM.
* Orion5X crypto engine support.
* Minor fixes/updates.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Christian Kujau (1):
      crypto: rng - Fix typo

Herbert Xu (75):
      crypto: ansi_cprng - Do not select FIPS
      crypto: tcrypt - Fix module return code when testing by name
      crypto: testmgr - Remove hash size check
      crypto: skcipher - Fix request for sync algorithms
      crypto: skcipher - Change default sync geniv on SMP to eseqiv
      crypto: testmgr - Allow implementation-specific tests
      crypto: api - Add new template create function
      crypto: api - Add crypto_alloc_instance2
      crypto: shash - Add shash_instance
      crypto: api - Add new style spawn support
      crypto: shash - Add spawn support
      crypto: api - Add crypto_attr_alg2 helper
      crypto: shash - Add shash_attr_alg2 helper
      crypto: shash - Add shash_register_instance
      crypto: shash - Add crypto_shash_ctx_aligned
      crypto: shash - Add __crypto_shash_cast
      crypto: shash - Use finup in default digest
      crypto: shash - Propagate reinit return value
      crypto: shash - Add shash_instance_ctx
      crypto: api - Fix crypto_drop_spawn crash on blank spawns
      crypto: shash - Export/import hash state only
      crypto: shash - Move finup/digest null checks to registration time
      crypto: sha1_generic - Add export/import support
      crypto: sha256_generic - Use 64-bit counter like sha1
      crypto: sha256_generic - Add export/import support
      crypto: sha1-s390 - Add export/import support
      crypto: sha256-s390 - Add export/import support
      crypto: padlock - Use shash fallback for sha
      crypto: shash - Move null setkey check to registration time
      crypto: async - Use kzfree for requests
      crypto: shash - Make descsize a run-time attribute
      crypto: padlock - Switch sha to shash
      crypto: hmac - Switch to shash
      crypto: xcbc - Switch to shash
      crypto: authenc - Remove reference to crypto_hash
      crypto: hash - Remove legacy hash/digest implementaion
      crypto: shash - Export async functions
      crypto: cryptd - Use shash algorithms
      crypto: ahash - Add crypto_ahash_set_reqsize
      crypto: cryptd - Use crypto_ahash_set_reqsize
      crypto: crypto4xx - Use crypto_ahash_set_reqsize
      crypto: api - Remove frontend argument from extsize/init_tfm
      crypto: ahash - Convert to new style algorithms
      crypto: ahash - Add instance/spawn support
      crypto: tcrypt - Add mask parameter
      crypto: hash - Add helpers to free spawns
      crypto: cryptd - Switch to template create API
      crypto: cryptd - Switch to new style ahash
      crypto: crypto4xx - Switch to new style ahash
      crypto: ahash - Remove old_ahash_alg
      crypto: hash - Zap unaligned buffers
      crypto: shash - Fix alignment in unaligned operations
      crypto: ahash - Use GFP_KERNEL in unaligned setkey
      crypto: ahash - Add unaligned handling and default operations
      crypto: crypto4xx - Disable SHA implementation
      crypto: hmac - Fix incorrect error value when creating instance
      crypto: xcbc - Fix incorrect error value when creating instance
      crypto: padlock - Fix compile error on i386
      crypto: ahash - Fix setkey crash
      crypto: shash - Fix digest size offset
      crypto: shash - Fix async finup handling of null digest
      crypto: padlock - Fix hashing of partial blocks
      crypto: cryptd - Add finup/export/import for hash
      crypto: xcbc - Use crypto_xor
      crypto: xcbc - Fix shash conversion
      crypto: sha512 - Export struct sha512_state
      crypto: sha512_generic - Use 64-bit counters
      crypto: sha512-s390 - Add export/import support
      crypto: shash - Require all algorithms to support export/import
      crypto: hmac - Prehash ipad/opad
      crypto: api - Fix aligned ctx helper
      Revert crypto: fips - Select CPRNG
      crypto: ctr - Use chainiv on raw counter mode
      crypto: blkcipher - Do not use eseqiv on stream ciphers
      crypto: api - Do not displace newly registered algorithms

Huang Ying (3):
      crypto: ghash - Add GHASH digest algorithm for GCM
      crypto: gcm - Use GHASH digest algorithm
      crypto: cryptd - Add support to access underlaying shash

Jan Glauber (1):
      crypto: sha-s390 - Fix warnings in import function

Jarod Wilson (1):
      crypto: des_s390 - Permit weak keys unless REQ_WEAK_KEY set

Joe Perches (1):
      hwrng: Use PCI_VDEVICE

Kim Phillips (3):
      crypto: talitos - simplify hmac data size calculation
      crypto: talitos - align locks on cache lines
      crypto: talitos - add support for 36 bit addressing

Neil Horman (3):
      random: Add optional continuous repetition test to entropy store based rngs
      crypto: fips - Select CPRNG
      crypto: fips - Depend on ansi_cprng

Phil Carmody (1):
      crypto: aes - Undefined behaviour in crypto_aes_expand_key

Roland Dreier (1):
      crypto: aes-ni - Don't print message with KERN_ERR on old system

Sachin Sant (1):
      crypto: s390 - Fix sha build failure

Sebastian Andrzej Siewior (3):
      crypto: ansi_prng - Use just a BH lock
      crypto: ansi_prng - alloc cipher just in init
      crypto: mv_cesa - Add support for Orion5X crypto engine

Shane Wang (1):
      crypto: vmac - New hash algorithm for intel_txt support

Steffen Klassert (7):
      crypto: tcrypt - Test algorithms by name
      crypto: cryptd - Fix uninitialized return value
      crypto: ahash - Use GFP_KERNEL on allocation if the request can sleep
      crypto: shash - Test for the algorithms import function before exporting it
      crypto: authenc - Convert to ahash
      crypto: xcbc - Fix alignment calculation of xcbc_tfm_ctx
      crypto: ansi_cprng - Fix module initialization

 arch/s390/crypto/des_s390.c          |   11 +-
 arch/s390/crypto/sha1_s390.c         |   26 ++
 arch/s390/crypto/sha256_s390.c       |   26 ++
 arch/s390/crypto/sha512_s390.c       |   36 ++
 arch/x86/crypto/aesni-intel_glue.c   |    2 +-
 crypto/Kconfig                       |   30 ++-
 crypto/Makefile                      |    5 +-
 crypto/ablkcipher.c                  |   29 ++-
 crypto/aes_generic.c                 |    9 +-
 crypto/ahash.c                       |  336 +++++++++++++++--
 crypto/algapi.c                      |  180 ++++++++--
 crypto/algboss.c                     |    5 +
 crypto/ansi_cprng.c                  |   43 +--
 crypto/api.c                         |   54 ++--
 crypto/authenc.c                     |  358 ++++++++++++++----
 crypto/cryptd.c                      |  321 +++++++++++------
 crypto/ctr.c                         |    2 +
 crypto/gcm.c                         |  580 ++++++++++++++++++++---------
 crypto/ghash-generic.c               |  170 +++++++++
 crypto/hmac.c                        |  302 +++++++--------
 crypto/internal.h                    |   28 +--
 crypto/pcompress.c                   |    6 +-
 crypto/rng.c                         |    2 +-
 crypto/sha1_generic.c                |   41 ++-
 crypto/sha256_generic.c              |  100 +++---
 crypto/sha512_generic.c              |   48 +--
 crypto/shash.c                       |  270 ++++++++++----
 crypto/tcrypt.c                      |   22 +-
 crypto/testmgr.c                     |   30 ++-
 crypto/testmgr.h                     |   16 +
 crypto/vmac.c                        |  678 ++++++++++++++++++++++++++++++++++
 crypto/xcbc.c                        |  370 +++++++------------
 drivers/char/hw_random/amd-rng.c     |    4 +-
 drivers/char/hw_random/geode-rng.c   |    3 +-
 drivers/char/random.c                |   14 +
 drivers/crypto/Kconfig               |   15 +-
 drivers/crypto/Makefile              |    1 +
 drivers/crypto/amcc/crypto4xx_alg.c  |    3 +-
 drivers/crypto/amcc/crypto4xx_core.c |   73 ++--
 drivers/crypto/amcc/crypto4xx_core.h |   25 ++-
 drivers/crypto/mv_cesa.c             |  606 ++++++++++++++++++++++++++++++
 drivers/crypto/mv_cesa.h             |  119 ++++++
 drivers/crypto/padlock-sha.c         |  329 +++++++++--------
 drivers/crypto/talitos.c             |  216 +++++------
 drivers/crypto/talitos.h             |    1 +
 include/crypto/algapi.h              |   37 ++-
 include/crypto/cryptd.h              |   17 +
 include/crypto/hash.h                |  147 +++++---
 include/crypto/internal/hash.h       |  147 +++++++-
 include/crypto/sha.h                 |   20 +
 include/crypto/vmac.h                |   61 +++
 include/linux/crypto.h               |   43 +--
 include/linux/fips.h                 |   10 +
 53 files changed, 4515 insertions(+), 1512 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.32
       [not found]       ` <20090910141905.GA17948@gondor.apana.org.au>
@ 2009-10-20  6:54         ` Herbert Xu
  2009-10-20  7:26           ` Herbert Xu
  2009-12-30  2:12           ` Crypto Fixes for 2.6.33 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2009-10-20  6:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in the padlock-sha driver that causes
faults on 32-bit VIA processors.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: padlock-sha - Fix stack alignment

 drivers/crypto/padlock-sha.c |   14 ++++++++++++--
 1 files changed, 12 insertions(+), 2 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.32
  2009-10-20  6:54         ` Crypto Fixes " Herbert Xu
@ 2009-10-20  7:26           ` Herbert Xu
  2009-11-23 12:05             ` Herbert Xu
  2009-12-30  2:12           ` Crypto Fixes for 2.6.33 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-10-20  7:26 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

> This push fixes a regression in the padlock-sha driver that causes
> faults on 32-bit VIA processors.

I've just added another regression fix that's specific to the
Intel AESNI instruction where the FPU test was reversed.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: padlock-sha - Fix stack alignment

Huang Ying (1):
      crypto: aesni-intel - Fix irq_fpu_usable usage

 arch/x86/crypto/aesni-intel_glue.c |   10 +++++-----
 drivers/crypto/padlock-sha.c       |   14 ++++++++++++--
 2 files changed, 17 insertions(+), 7 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.32
  2009-10-20  7:26           ` Herbert Xu
@ 2009-11-23 12:05             ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-11-23 12:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a crash in the gcm driver when used in conjunction
with an asynchronous cipher (e.g., aesni-intel).

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Huang Ying (1):
      crypto: gcm - fix another complete call in complete fuction

 crypto/gcm.c |  107 +++++++++++++++++++++++++++++++++++++++------------------
 1 files changed, 73 insertions(+), 34 deletions(-)
 
Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.33
       [not found]   ` <20090324044932.GA18245@gondor.apana.org.au>
  2009-04-02  6:14     ` Herbert Xu
  2009-06-13  2:05     ` Crypto Update for 2.6.31 Herbert Xu
@ 2009-12-04 13:55     ` Herbert Xu
  2010-02-26  0:49       ` Crypto Update for 2.6.34 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-12-04 13:55 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.33:

* Removal of legacy hash code.
* New ghash (part of GCM) driver using Intel hardware support.
* Hardware RNG driver API update.
* Random fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Benjamin Gilbert (3):
      crypto: hash - Remove legacy hash/digest code
      crypto: api - Remove digest case from procfs show handler
      crypto: hash - Remove cra_u.{digest,hash}

Felipe Contreras (1):
      crypto: testmgr - Fix warning

Herbert Xu (2):
      crypto: ghash-intel - Hard-code pshufb
      crypto: ghash-intel - Add PSHUFB macros

Huang Ying (6):
      crypto: ghash - Add PCLMULQDQ accelerated implementation
      crypto: ghash-intel - Fix building failure on x86_32
      crypto: ghash-intel - Fix irq_fpu_usable usage
      x86: Generate .byte code for some new instructions via gas macro
      crypto: aesni-intel - Use gas macro for AES-NI instructions
      crypto: ghash-clmulni-intel - Use gas macro for PCLMULQDQ-NI and PSHUFB

Ian Molton (3):
      hwrng: virtio-rng - Convert to new API
      hwrng: core - Prevent too-small buffer sizes
      hwrng: core - Replace u32 in driver API with byte array

Jaswinder Singh Rajput (1):
      crypto: ansi_cprng - Move FIPS functions under CONFIG_CRYPTO_FIPS

Jiri Kosina (1):
      crypto: ghash-clmulni-intel - Put proper .data section in place

Neil Horman (1):
      crypto: ansi_cprng - Add FIPS wrapper

Roel Kluin (1):
      crypto: ansi_cprng - Fix test in get_prng_bytes

Youquan, Song (1):
      crypto: testmgr - Add ghash algorithm test before provide to users

 arch/x86/crypto/Makefile                   |    3 
 arch/x86/crypto/aesni-intel_asm.S          |  517 +++++++++--------------------
 arch/x86/crypto/ghash-clmulni-intel_asm.S  |  157 ++++++++
 arch/x86/crypto/ghash-clmulni-intel_glue.c |  333 ++++++++++++++++++
 arch/x86/include/asm/cpufeature.h          |    1 
 arch/x86/include/asm/i387.h                |    7 
 arch/x86/include/asm/inst.h                |  150 ++++++++
 crypto/Kconfig                             |    9 
 crypto/ansi_cprng.c                        |   82 +++-
 crypto/cryptd.c                            |    7 
 crypto/digest.c                            |  240 -------------
 crypto/hash.c                              |  183 ----------
 crypto/proc.c                              |    7 
 crypto/testmgr.c                           |   11 
 crypto/testmgr.h                           |   15 
 drivers/char/hw_random/core.c              |  110 +++---
 drivers/char/hw_random/virtio-rng.c        |   78 +---
 include/crypto/algapi.h                    |    1 
 include/crypto/cryptd.h                    |    1 
 include/linux/crypto.h                     |   27 -
 include/linux/hw_random.h                  |    7 
 21 files changed, 1034 insertions(+), 912 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.33
  2009-10-20  6:54         ` Crypto Fixes " Herbert Xu
  2009-10-20  7:26           ` Herbert Xu
@ 2009-12-30  2:12           ` Herbert Xu
  2010-02-01 19:52             ` Herbert Xu
       [not found]             ` <20100201195204.GA6953@gondor.apana.org.au>
  1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2009-12-30  2:12 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in the hardware RNG core introduced
by the recent API change.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      hwrng: core - Fix double unlock in rng_dev_read

 drivers/char/hw_random/core.c |    5 +++--
 1 files changed, 3 insertions(+), 2 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.33
  2009-12-30  2:12           ` Crypto Fixes for 2.6.33 Herbert Xu
@ 2010-02-01 19:52             ` Herbert Xu
       [not found]             ` <20100201195204.GA6953@gondor.apana.org.au>
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-02-01 19:52 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a couple of serious bugs:

* UBIFS assertion failure caused by /dev/random (since forever)
* Broken hmac support in padlock-sha (since 2.6.32)


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (2):
      crypto: padlock-sha - Add import/export support
      random: Remove unused inode variable

Matt Mackall (1):
      random: drop weird m_time/a_time manipulation

 drivers/char/random.c        |    9 ---------
 drivers/crypto/padlock-sha.c |   23 +++++++++++++++++++++++
 2 files changed, 23 insertions(+), 9 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.34
  2009-12-04 13:55     ` Crypto Update for 2.6.33 Herbert Xu
@ 2010-02-26  0:49       ` Herbert Xu
  2010-03-01  7:50         ` tip: origin tree boot crash Ingo Molnar
  2010-05-19  2:06         ` Crypto Update for 2.6.35 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-02-26  0:49 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.34:

* New pcrypt module to spread crypto work across CPUs.
* Added RFC4543 GCM support.
* Added nomadik RNG driver.
* MD5 export/import support.
* Random fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alessandro Rubini (2):
      hwrng: nomadik - Add hardware RNG driver
      hwrng: nomadik - Add platform device for rng in cpu-8815

Max Vozeler (1):
      crypto: md5 - Add export support

Márton Németh (1):
      crypto: Make Open Firmware device id constant

Richard Hartmann (19):
      crypto: ablkcipher - Fix checkpatch errors
      crypto: aead - Fix checkpatch errors
      crypto: blowfish - Fix checkpatch errors
      crypto: algapi - Fix checkpatch errors
      crypto: anubis - Fix checkpatch errors
      crypto: api - Fix checkpatch errors
      crypto: authenc - Fix checkpatch errors
      crypto: camellia - Fix checkpatch errors
      crypto: cast5 - Fix checkpatch errors
      crypto: cast6 - Fix checkpatch errors
      crypto: compress - Fix checkpatch errors
      crypto: crc32 - Fix checkpatch errors
      crypto: cipher - Fix checkpatch errors
      crypto: crypto_null - Fix checkpatch errors
      crypto: deflate - Fix checkpatch errors
      crypto: des_generic - Fix checkpatch errors
      crypto: ecb - Fix checkpatch errors
      crypto: fcrypt - Fix checkpatch errors
      crypto: aes_generic - Fix checkpatch errors

Roel Kluin (3):
      crypto: aes_s390 - access .cip instead of .blk in cipher mode
      crypto: geode-aes - access .cip instead of .blk in cipher mode
      crypto: geode-aes - Fix cip/blk confusion

Steffen Klassert (3):
      padata: Generic parallelization/serialization interface
      crypto: pcrypt - Add pcrypt crypto parallelization wrapper
      crypto: pcrypt - call the complete function on error

Tobias Brunner (1):
      crypto: gcm - Add RFC4543 wrapper for GCM

Youquan, Song (1):
      crypto: testmgr - Fix complain about lack test for internal used algorithm

 arch/arm/mach-nomadik/cpu-8815.c     |    8 +
 arch/s390/crypto/aes_s390.c          |    6 +-
 crypto/Kconfig                       |   10 +
 crypto/Makefile                      |    1 +
 crypto/ablkcipher.c                  |    4 +-
 crypto/aead.c                        |    4 +-
 crypto/aes_generic.c                 |    4 +-
 crypto/algapi.c                      |    4 +-
 crypto/anubis.c                      |   22 +-
 crypto/api.c                         |   13 +-
 crypto/authenc.c                     |   10 +-
 crypto/blowfish.c                    |   18 +-
 crypto/camellia.c                    |  616 +++++++++++++++---------------
 crypto/cast5.c                       |   14 +-
 crypto/cast6.c                       |  122 +++---
 crypto/cipher.c                      |    2 +-
 crypto/compress.c                    |    4 +-
 crypto/crc32c.c                      |    6 +-
 crypto/crypto_null.c                 |    8 +-
 crypto/deflate.c                     |   20 +-
 crypto/des_generic.c                 |    3 +-
 crypto/ecb.c                         |    2 +-
 crypto/fcrypt.c                      |    6 +-
 crypto/gcm.c                         |  287 ++++++++++++++
 crypto/md5.c                         |   40 ++-
 crypto/pcrypt.c                      |  445 ++++++++++++++++++++++
 crypto/testmgr.c                     |   84 ++++
 drivers/char/hw_random/Kconfig       |   12 +
 drivers/char/hw_random/Makefile      |    1 +
 drivers/char/hw_random/nomadik-rng.c |  103 +++++
 drivers/crypto/amcc/crypto4xx_core.c |    2 +-
 drivers/crypto/geode-aes.c           |    8 +-
 drivers/crypto/talitos.c             |    2 +-
 include/crypto/md5.h                 |   17 +
 include/crypto/pcrypt.h              |   51 +++
 include/linux/padata.h               |   88 +++++
 include/linux/pfkeyv2.h              |    1 +
 init/Kconfig                         |    4 +
 kernel/Makefile                      |    1 +
 kernel/padata.c                      |  690 ++++++++++++++++++++++++++++++++++
 net/xfrm/xfrm_algo.c                 |   16 +
 41 files changed, 2293 insertions(+), 466 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 246+ messages in thread

* tip: origin tree boot crash
  2010-02-26  0:49       ` Crypto Update for 2.6.34 Herbert Xu
@ 2010-03-01  7:50         ` Ingo Molnar
  2010-03-01 14:55           ` Steffen Klassert
  2010-05-19  2:06         ` Crypto Update for 2.6.35 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Ingo Molnar @ 2010-03-01  7:50 UTC (permalink / raw)
  To: Herbert Xu, Steffen Klassert
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List


[-- Attachment #1: Type: text/plain, Size: 3663 bytes --]


Hi,

* Herbert Xu <herbert@gondor.apana.org.au> wrote:

>       crypto: pcrypt - Add pcrypt crypto parallelization wrapper

-tip testing started triggering the following frequent boot crash yesterday, 
on 64-bit x86:

 |  calling  pcrypt_init+0x0/0xee @ 1
 |  BUG: unable to handle kernel NULL pointer dereference at (null)
 |  IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
 |  Call Trace:
 |   [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
 |   [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
 |   [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee

  ( Full oops attached below. Config attached as well. )

I have bisected it back to the following upstream commit:

 |
 | 5068c7a883d1694f0fb3631b664827644153cd08 is the first bad commit
 | commit 5068c7a883d1694f0fb3631b664827644153cd08
 | Author: Steffen Klassert <steffen.klassert@secunet.com>
 | Date:   Thu Jan 7 15:57:19 2010 +1100
 |
 |     crypto: pcrypt - Add pcrypt crypto parallelization wrapper
 |

And have confirmed it via more testing that reverting the following two 
commits:

  5a1436b: crypto: pcrypt - call the complete function on error
  5068c7a: crypto: pcrypt - Add pcrypt crypto parallelization wrapper

Solves the crash. I have pushed out the reverts into tip:out-of-tree for now, 
and can test any real fix as well.

Thanks,

	Ingo

-------------->
Calling  crypto_ctr_module_init+0x0/0x3e @ 1
initcall crypto_ctr_module_init+0x0/0x3e returned 0 after 0 usecs
calling  pcrypt_init+0x0/0xee @ 1
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
PGD 0 
Oops: 0002 [#1] SMP 
last sysfs file: 
CPU 1 
Modules linked in:

Pid: 1, comm: swapper Not tainted 2.6.33-01768-g43a834d #19338 A8N-E/System Product Name
RIP: 0010:[<ffffffff8126550b>]  [<ffffffff8126550b>] memcpy+0xb/0xb0
RSP: 0018:ffff88003f875e88  EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffffff81f5f740 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ffffffff81f5f740 RDI: 0000000000000000
RBP: ffff88003f875ec0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88003e5317b0
R13: ffff88003f97a690 R14: ffff88003e5317b0 R15: ffff88003f9287d0
FS:  0000000000000000(0000) GS:ffff880004200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000000001be8000 CR4: 00000000000006a0
DR0: ffffffff82c160bc DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Process swapper (pid: 1, threadinfo ffff88003f874000, task ffff88003f878000)
Stack:
 ffffffff810c2f38 ffff880000000018 ffffffff81f5f740 ffffffff82158c51
<0> 00000001552321fe 0000000000000002 0000000000000000 ffff88003f875ee0
<0> ffffffff82158ccc 00000001552321fe 0000000000000000 ffff88003f875f10
Call Trace:
 [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
 [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
 [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
 [<ffffffff810001dc>] do_one_initcall+0x3c/0x200
 [<ffffffff8213e73c>] kernel_init+0x161/0x1b7
 [<ffffffff81004184>] kernel_thread_helper+0x4/0x10
 [<ffffffff817d2150>] ? restore_args+0x0/0x30
 [<ffffffff8213e5db>] ? kernel_init+0x0/0x1b7
 [<ffffffff81004180>] ? kernel_thread_helper+0x0/0x10
Code: 81 ea d8 1f 00 00 48 3b 42 20 73 07 48 8b 50 f9 31 c0 c3 31 d2 48 c7 c0 f2 ff ff ff c3 90 90 90 48 89 f8 89 d1 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 8b 1e 4c 8b 46 08 4c 89 1f 4c 89 47 08 
RIP  [<ffffffff8126550b>] memcpy+0xb/0xb0
 RSP <ffff88003f875e88>
CR2: 0000000000000000
---[ end trace 5a5d197966b56a2e ]---
swapper used greatest stack depth: 5016 bytes left
Kernel panic - not syncing: Attempted to kill init!


[-- Attachment #2: config --]
[-- Type: text/plain, Size: 72645 bytes --]

#
# Automatically generated make config: don't edit
# Linux kernel version: 2.6.33
# Sun Feb 28 23:17:34 2010
#
CONFIG_64BIT=y
# CONFIG_X86_32 is not set
CONFIG_X86_64=y
CONFIG_X86=y
CONFIG_OUTPUT_FORMAT="elf64-x86-64"
CONFIG_ARCH_DEFCONFIG="arch/x86/configs/x86_64_defconfig"
CONFIG_GENERIC_TIME=y
CONFIG_GENERIC_CMOS_UPDATE=y
CONFIG_CLOCKSOURCE_WATCHDOG=y
CONFIG_GENERIC_CLOCKEVENTS=y
CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y
CONFIG_LOCKDEP_SUPPORT=y
CONFIG_STACKTRACE_SUPPORT=y
CONFIG_HAVE_LATENCYTOP_SUPPORT=y
CONFIG_MMU=y
CONFIG_ZONE_DMA=y
CONFIG_GENERIC_ISA_DMA=y
CONFIG_GENERIC_IOMAP=y
CONFIG_GENERIC_BUG=y
CONFIG_GENERIC_BUG_RELATIVE_POINTERS=y
CONFIG_GENERIC_HWEIGHT=y
CONFIG_GENERIC_GPIO=y
CONFIG_ARCH_MAY_HAVE_PC_FDC=y
# CONFIG_RWSEM_GENERIC_SPINLOCK is not set
CONFIG_RWSEM_XCHGADD_ALGORITHM=y
CONFIG_ARCH_HAS_CPU_IDLE_WAIT=y
CONFIG_GENERIC_CALIBRATE_DELAY=y
CONFIG_GENERIC_TIME_VSYSCALL=y
CONFIG_ARCH_HAS_CPU_RELAX=y
CONFIG_ARCH_HAS_DEFAULT_IDLE=y
CONFIG_ARCH_HAS_CACHE_LINE_SIZE=y
CONFIG_HAVE_SETUP_PER_CPU_AREA=y
CONFIG_NEED_PER_CPU_EMBED_FIRST_CHUNK=y
CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK=y
CONFIG_HAVE_CPUMASK_OF_CPU_MAP=y
CONFIG_ARCH_HIBERNATION_POSSIBLE=y
CONFIG_ARCH_SUSPEND_POSSIBLE=y
CONFIG_ZONE_DMA32=y
CONFIG_ARCH_POPULATES_NODE_MAP=y
CONFIG_AUDIT_ARCH=y
CONFIG_ARCH_SUPPORTS_OPTIMIZED_INLINING=y
CONFIG_ARCH_SUPPORTS_DEBUG_PAGEALLOC=y
CONFIG_HAVE_EARLY_RES=y
CONFIG_GENERIC_HARDIRQS=y
CONFIG_GENERIC_HARDIRQS_NO__DO_IRQ=y
CONFIG_GENERIC_IRQ_PROBE=y
CONFIG_GENERIC_PENDING_IRQ=y
CONFIG_USE_GENERIC_SMP_HELPERS=y
CONFIG_X86_64_SMP=y
CONFIG_X86_HT=y
CONFIG_X86_TRAMPOLINE=y
# CONFIG_KTIME_SCALAR is not set
CONFIG_BOOTPARAM_SUPPORT_NOT_WANTED=y
CONFIG_DEFCONFIG_LIST="/lib/modules/$UNAME_RELEASE/.config"
CONFIG_CONSTRUCTORS=y

#
# General setup
#
CONFIG_EXPERIMENTAL=y
# CONFIG_BROKEN_BOOT_ALLOWED4 is not set
CONFIG_BROKEN_BOOT_DISALLOWED=y
CONFIG_BROKEN_BOOT_EUROPE=y
CONFIG_BROKEN_BOOT_TITAN=y
CONFIG_LOCK_KERNEL=y
CONFIG_INIT_ENV_ARG_LIMIT=32
CONFIG_LOCALVERSION=""
CONFIG_LOCALVERSION_AUTO=y
CONFIG_HAVE_KERNEL_GZIP=y
CONFIG_HAVE_KERNEL_BZIP2=y
CONFIG_HAVE_KERNEL_LZMA=y
CONFIG_HAVE_KERNEL_LZO=y
CONFIG_KERNEL_GZIP=y
# CONFIG_KERNEL_BZIP2 is not set
# CONFIG_KERNEL_LZMA is not set
# CONFIG_KERNEL_LZO is not set
CONFIG_SWAP=y
CONFIG_SYSVIPC=y
CONFIG_SYSVIPC_SYSCTL=y
CONFIG_POSIX_MQUEUE=y
CONFIG_POSIX_MQUEUE_SYSCTL=y
CONFIG_BSD_PROCESS_ACCT=y
# CONFIG_BSD_PROCESS_ACCT_V3 is not set
# CONFIG_TASKSTATS is not set
# CONFIG_AUDIT is not set

#
# RCU Subsystem
#
CONFIG_TREE_RCU=y
# CONFIG_TREE_PREEMPT_RCU is not set
# CONFIG_TINY_RCU is not set
CONFIG_RCU_TRACE=y
CONFIG_RCU_FANOUT=64
CONFIG_RCU_FANOUT_EXACT=y
CONFIG_RCU_FAST_NO_HZ=y
CONFIG_TREE_RCU_TRACE=y
CONFIG_IKCONFIG=y
CONFIG_IKCONFIG_PROC=y
CONFIG_LOG_BUF_SHIFT=20
CONFIG_HAVE_UNSTABLE_SCHED_CLOCK=y
# CONFIG_CGROUPS is not set
CONFIG_SYSFS_DEPRECATED=y
CONFIG_SYSFS_DEPRECATED_V2=y
# CONFIG_RELAY is not set
CONFIG_NAMESPACES=y
CONFIG_UTS_NS=y
CONFIG_IPC_NS=y
# CONFIG_USER_NS is not set
CONFIG_PID_NS=y
CONFIG_NET_NS=y
# CONFIG_BLK_DEV_INITRD is not set
# CONFIG_CC_OPTIMIZE_FOR_SIZE is not set
CONFIG_SYSCTL=y
CONFIG_ANON_INODES=y
CONFIG_EMBEDDED=y
CONFIG_UID16=y
# CONFIG_SYSCTL_SYSCALL is not set
CONFIG_KALLSYMS=y
CONFIG_KALLSYMS_ALL=y
# CONFIG_KALLSYMS_EXTRA_PASS is not set
CONFIG_HOTPLUG=y
CONFIG_PRINTK=y
CONFIG_BUG=y
CONFIG_ELF_CORE=y
CONFIG_PCSPKR_PLATFORM=y
CONFIG_BASE_FULL=y
CONFIG_FUTEX=y
CONFIG_EPOLL=y
CONFIG_SIGNALFD=y
CONFIG_TIMERFD=y
CONFIG_EVENTFD=y
CONFIG_SHMEM=y
CONFIG_AIO=y
CONFIG_HAVE_PERF_EVENTS=y
CONFIG_PERF_USE_VMALLOC=y
CONFIG_PERF_EVENTS_NMI=y

#
# Kernel Performance Events And Counters
#
CONFIG_PERF_EVENTS=y
CONFIG_PERF_COUNTERS=y
CONFIG_DEBUG_PERF_USE_VMALLOC=y
CONFIG_VM_EVENT_COUNTERS=y
CONFIG_PCI_QUIRKS=y
CONFIG_SLUB_DEBUG=y
CONFIG_COMPAT_BRK=y
# CONFIG_SLAB is not set
CONFIG_SLUB=y
# CONFIG_SLOB is not set
CONFIG_PROFILING=y
CONFIG_TRACEPOINTS=y
# CONFIG_OPROFILE is not set
CONFIG_HAVE_OPROFILE=y
# CONFIG_KPROBES is not set
CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS=y
CONFIG_USER_RETURN_NOTIFIER=y
CONFIG_HAVE_IOREMAP_PROT=y
CONFIG_HAVE_KPROBES=y
CONFIG_HAVE_KRETPROBES=y
CONFIG_HAVE_OPTPROBES=y
CONFIG_HAVE_ARCH_TRACEHOOK=y
CONFIG_HAVE_DMA_ATTRS=y
CONFIG_HAVE_REGS_AND_STACK_ACCESS_API=y
CONFIG_HAVE_DMA_API_DEBUG=y
CONFIG_HAVE_HW_BREAKPOINT=y
CONFIG_HAVE_USER_RETURN_NOTIFIER=y

#
# GCOV-based kernel profiling
#
CONFIG_SLOW_WORK=y
# CONFIG_SLOW_WORK_DEBUG is not set
# CONFIG_HAVE_GENERIC_DMA_COHERENT is not set
CONFIG_SLABINFO=y
CONFIG_RT_MUTEXES=y
CONFIG_BASE_SMALL=0
CONFIG_MODULES=y
# CONFIG_MODULE_FORCE_LOAD is not set
CONFIG_MODULE_UNLOAD=y
CONFIG_MODULE_FORCE_UNLOAD=y
# CONFIG_MODVERSIONS is not set
CONFIG_MODULE_SRCVERSION_ALL=y
CONFIG_STOP_MACHINE=y
CONFIG_BLOCK=y
# CONFIG_BLK_DEV_BSG is not set
CONFIG_BLK_DEV_INTEGRITY=y
CONFIG_BLOCK_COMPAT=y

#
# IO Schedulers
#
CONFIG_IOSCHED_NOOP=y
CONFIG_IOSCHED_DEADLINE=y
# CONFIG_IOSCHED_CFQ is not set
CONFIG_DEFAULT_DEADLINE=y
# CONFIG_DEFAULT_CFQ is not set
# CONFIG_DEFAULT_NOOP is not set
CONFIG_DEFAULT_IOSCHED="deadline"
CONFIG_PREEMPT_NOTIFIERS=y
CONFIG_PADATA=y
# CONFIG_INLINE_SPIN_TRYLOCK is not set
# CONFIG_INLINE_SPIN_TRYLOCK_BH is not set
# CONFIG_INLINE_SPIN_LOCK is not set
# CONFIG_INLINE_SPIN_LOCK_BH is not set
# CONFIG_INLINE_SPIN_LOCK_IRQ is not set
# CONFIG_INLINE_SPIN_LOCK_IRQSAVE is not set
# CONFIG_INLINE_SPIN_UNLOCK is not set
# CONFIG_INLINE_SPIN_UNLOCK_BH is not set
# CONFIG_INLINE_SPIN_UNLOCK_IRQ is not set
# CONFIG_INLINE_SPIN_UNLOCK_IRQRESTORE is not set
# CONFIG_INLINE_READ_TRYLOCK is not set
# CONFIG_INLINE_READ_LOCK is not set
# CONFIG_INLINE_READ_LOCK_BH is not set
# CONFIG_INLINE_READ_LOCK_IRQ is not set
# CONFIG_INLINE_READ_LOCK_IRQSAVE is not set
# CONFIG_INLINE_READ_UNLOCK is not set
# CONFIG_INLINE_READ_UNLOCK_BH is not set
# CONFIG_INLINE_READ_UNLOCK_IRQ is not set
# CONFIG_INLINE_READ_UNLOCK_IRQRESTORE is not set
# CONFIG_INLINE_WRITE_TRYLOCK is not set
# CONFIG_INLINE_WRITE_LOCK is not set
# CONFIG_INLINE_WRITE_LOCK_BH is not set
# CONFIG_INLINE_WRITE_LOCK_IRQ is not set
# CONFIG_INLINE_WRITE_LOCK_IRQSAVE is not set
# CONFIG_INLINE_WRITE_UNLOCK is not set
# CONFIG_INLINE_WRITE_UNLOCK_BH is not set
# CONFIG_INLINE_WRITE_UNLOCK_IRQ is not set
# CONFIG_INLINE_WRITE_UNLOCK_IRQRESTORE is not set
# CONFIG_MUTEX_SPIN_ON_OWNER is not set
# CONFIG_FREEZER is not set

#
# Processor type and features
#
CONFIG_TICK_ONESHOT=y
CONFIG_NO_HZ=y
CONFIG_HIGH_RES_TIMERS=y
CONFIG_GENERIC_CLOCKEVENTS_BUILD=y
CONFIG_SMP_SUPPORT=y
CONFIG_SPARSE_IRQ=y
CONFIG_X86_MPPARSE=y
CONFIG_X86_EXTENDED_PLATFORM=y
CONFIG_X86_VSMP=y
# CONFIG_SCHED_OMIT_FRAME_POINTER is not set
# CONFIG_PARAVIRT_GUEST is not set
CONFIG_PARAVIRT=y
CONFIG_PARAVIRT_DEBUG=y
CONFIG_NO_BOOTMEM=y
CONFIG_MEMTEST=y
# CONFIG_M386 is not set
# CONFIG_M486 is not set
# CONFIG_M586 is not set
# CONFIG_M586TSC is not set
# CONFIG_M586MMX is not set
# CONFIG_M686 is not set
# CONFIG_MPENTIUMII is not set
# CONFIG_MPENTIUMIII is not set
# CONFIG_MPENTIUMM is not set
# CONFIG_MPENTIUM4 is not set
# CONFIG_MK6 is not set
# CONFIG_MK7 is not set
# CONFIG_MK8 is not set
# CONFIG_MCRUSOE is not set
# CONFIG_MEFFICEON is not set
# CONFIG_MWINCHIPC6 is not set
# CONFIG_MWINCHIP3D is not set
# CONFIG_MGEODEGX1 is not set
# CONFIG_MGEODE_LX is not set
# CONFIG_MCYRIXIII is not set
# CONFIG_MVIAC3_2 is not set
# CONFIG_MVIAC7 is not set
# CONFIG_MPSC is not set
# CONFIG_MCORE2 is not set
# CONFIG_MATOM is not set
CONFIG_GENERIC_CPU=y
CONFIG_X86_CPU=y
CONFIG_X86_INTERNODE_CACHE_SHIFT=12
CONFIG_X86_CMPXCHG=y
CONFIG_X86_L1_CACHE_SHIFT=6
CONFIG_X86_XADD=y
CONFIG_X86_WP_WORKS_OK=y
CONFIG_X86_TSC=y
CONFIG_X86_CMPXCHG64=y
CONFIG_X86_CMOV=y
CONFIG_X86_MINIMUM_CPU_FAMILY=64
CONFIG_X86_DEBUGCTLMSR=y
CONFIG_PROCESSOR_SELECT=y
CONFIG_CPU_SUP_INTEL=y
CONFIG_CPU_SUP_AMD=y
CONFIG_CPU_SUP_CENTAUR=y
# CONFIG_X86_DS is not set
CONFIG_HPET_TIMER=y
CONFIG_DMI=y
# CONFIG_GART_IOMMU is not set
CONFIG_CALGARY_IOMMU=y
CONFIG_CALGARY_IOMMU_ENABLED_BY_DEFAULT=y
CONFIG_SWIOTLB=y
CONFIG_IOMMU_HELPER=y
# CONFIG_IOMMU_API is not set
CONFIG_MAXSMP=y
CONFIG_NR_CPUS=4096
CONFIG_SCHED_SMT=y
CONFIG_SCHED_MC=y
# CONFIG_PREEMPT_NONE is not set
CONFIG_PREEMPT_VOLUNTARY=y
# CONFIG_PREEMPT is not set
CONFIG_X86_LOCAL_APIC=y
CONFIG_X86_IO_APIC=y
# CONFIG_X86_REROUTE_FOR_BROKEN_BOOT_IRQS is not set
# CONFIG_X86_MCE is not set
CONFIG_I8K=y
# CONFIG_MICROCODE is not set
# CONFIG_X86_MSR is not set
# CONFIG_X86_CPUID is not set
CONFIG_UP_WANTED_1=y
# CONFIG_UP_WANTED_2 is not set
CONFIG_SMP=y
CONFIG_ARCH_PHYS_ADDR_T_64BIT=y
# CONFIG_DIRECT_GBPAGES is not set
# CONFIG_NUMA is not set
CONFIG_ARCH_PROC_KCORE_TEXT=y
CONFIG_ARCH_SPARSEMEM_DEFAULT=y
CONFIG_ARCH_SPARSEMEM_ENABLE=y
CONFIG_ARCH_SELECT_MEMORY_MODEL=y
CONFIG_ARCH_MEMORY_PROBE=y
CONFIG_ILLEGAL_POINTER_VALUE=0xdead000000000000
CONFIG_SELECT_MEMORY_MODEL=y
# CONFIG_FLATMEM_MANUAL is not set
# CONFIG_DISCONTIGMEM_MANUAL is not set
CONFIG_SPARSEMEM_MANUAL=y
CONFIG_SPARSEMEM=y
CONFIG_HAVE_MEMORY_PRESENT=y
CONFIG_SPARSEMEM_EXTREME=y
CONFIG_SPARSEMEM_VMEMMAP_ENABLE=y
CONFIG_SPARSEMEM_ALLOC_MEM_MAP_TOGETHER=y
CONFIG_SPARSEMEM_VMEMMAP=y
CONFIG_MEMORY_HOTPLUG=y
CONFIG_MEMORY_HOTPLUG_SPARSE=y
CONFIG_MEMORY_HOTREMOVE=y
CONFIG_PAGEFLAGS_EXTENDED=y
CONFIG_SPLIT_PTLOCK_CPUS=999999
CONFIG_MIGRATION=y
CONFIG_PHYS_ADDR_T_64BIT=y
CONFIG_ZONE_DMA_FLAG=1
CONFIG_BOUNCE=y
CONFIG_VIRT_TO_BUS=y
CONFIG_MMU_NOTIFIER=y
CONFIG_KSM=y
CONFIG_DEFAULT_MMAP_MIN_ADDR=4096
# CONFIG_X86_CHECK_BIOS_CORRUPTION is not set
CONFIG_X86_RESERVE_LOW_64K=y
CONFIG_MTRR=y
CONFIG_MTRR_SANITIZER=y
CONFIG_MTRR_SANITIZER_ENABLE_DEFAULT=0
CONFIG_MTRR_SANITIZER_SPARE_REG_NR_DEFAULT=1
# CONFIG_X86_PAT is not set
CONFIG_SECCOMP=y
CONFIG_CC_STACKPROTECTOR=y
# CONFIG_HZ_100 is not set
# CONFIG_HZ_250 is not set
CONFIG_HZ_300=y
# CONFIG_HZ_1000 is not set
CONFIG_HZ=300
CONFIG_SCHED_HRTICK=y
CONFIG_KEXEC=y
CONFIG_CRASH_DUMP=y
CONFIG_PHYSICAL_START=0x1000000
CONFIG_RELOCATABLE=y
CONFIG_PHYSICAL_ALIGN=0x1000000
CONFIG_HOTPLUG_CPU=y
CONFIG_COMPAT_VDSO=y
# CONFIG_CMDLINE_BOOL is not set
CONFIG_ARCH_ENABLE_MEMORY_HOTPLUG=y
CONFIG_ARCH_ENABLE_MEMORY_HOTREMOVE=y

#
# Power management and ACPI options
#
# CONFIG_PM is not set
CONFIG_SFI=y

#
# CPU Frequency scaling
#
CONFIG_CPU_FREQ=y
CONFIG_CPU_FREQ_TABLE=y
# CONFIG_CPU_FREQ_DEBUG is not set
CONFIG_CPU_FREQ_STAT=m
CONFIG_CPU_FREQ_STAT_DETAILS=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE is not set
CONFIG_CPU_FREQ_DEFAULT_GOV_ONDEMAND=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_CONSERVATIVE is not set
CONFIG_CPU_FREQ_GOV_PERFORMANCE=y
CONFIG_CPU_FREQ_GOV_POWERSAVE=y
CONFIG_CPU_FREQ_GOV_USERSPACE=m
CONFIG_CPU_FREQ_GOV_ONDEMAND=y
CONFIG_CPU_FREQ_GOV_CONSERVATIVE=m

#
# CPUFreq processor drivers
#
CONFIG_X86_P4_CLOCKMOD=m

#
# shared options
#
CONFIG_X86_SPEEDSTEP_LIB=m
CONFIG_CPU_IDLE=y
CONFIG_CPU_IDLE_GOV_LADDER=y
CONFIG_CPU_IDLE_GOV_MENU=y

#
# Memory power savings
#
CONFIG_I7300_IDLE_IOAT_CHANNEL=y
CONFIG_I7300_IDLE=m

#
# Bus options (PCI etc.)
#
CONFIG_PCI=y
CONFIG_PCI_DIRECT=y
CONFIG_PCI_DOMAINS=y
# CONFIG_PCIEPORTBUS is not set
CONFIG_ARCH_SUPPORTS_MSI=y
CONFIG_PCI_MSI=y
CONFIG_PCI_DEBUG=y
CONFIG_PCI_STUB=y
CONFIG_HT_IRQ=y
# CONFIG_PCI_IOV is not set
CONFIG_ISA_DMA_API=y
# CONFIG_PCCARD is not set
# CONFIG_HOTPLUG_PCI is not set

#
# Executable file formats / Emulations
#
CONFIG_BINFMT_ELF=y
CONFIG_COMPAT_BINFMT_ELF=y
# CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS is not set
# CONFIG_HAVE_AOUT is not set
CONFIG_BINFMT_MISC=m
CONFIG_IA32_EMULATION=y
CONFIG_IA32_AOUT=m
CONFIG_COMPAT=y
CONFIG_COMPAT_FOR_U64_ALIGNMENT=y
CONFIG_SYSVIPC_COMPAT=y
CONFIG_NET=y
CONFIG_COMPAT_NETLINK_MESSAGES=y

#
# Networking options
#
CONFIG_PACKET=y
# CONFIG_PACKET_MMAP is not set
CONFIG_UNIX=y
CONFIG_XFRM=y
CONFIG_XFRM_USER=m
CONFIG_XFRM_SUB_POLICY=y
CONFIG_XFRM_MIGRATE=y
# CONFIG_XFRM_STATISTICS is not set
CONFIG_XFRM_IPCOMP=y
CONFIG_NET_KEY=m
CONFIG_NET_KEY_MIGRATE=y
CONFIG_INET=y
# CONFIG_IP_MULTICAST is not set
# CONFIG_IP_ADVANCED_ROUTER is not set
CONFIG_IP_FIB_HASH=y
CONFIG_IP_PNP=y
# CONFIG_IP_PNP_DHCP is not set
# CONFIG_IP_PNP_BOOTP is not set
CONFIG_IP_PNP_RARP=y
# CONFIG_NET_IPIP is not set
CONFIG_NET_IPGRE=y
CONFIG_ARPD=y
CONFIG_SYN_COOKIES=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=y
# CONFIG_INET_IPCOMP is not set
# CONFIG_INET_XFRM_TUNNEL is not set
# CONFIG_INET_TUNNEL is not set
CONFIG_INET_XFRM_MODE_TRANSPORT=y
CONFIG_INET_XFRM_MODE_TUNNEL=m
CONFIG_INET_XFRM_MODE_BEET=y
CONFIG_INET_LRO=y
# CONFIG_INET_DIAG is not set
CONFIG_TCP_CONG_ADVANCED=y
CONFIG_TCP_CONG_BIC=m
# CONFIG_TCP_CONG_CUBIC is not set
CONFIG_TCP_CONG_WESTWOOD=y
CONFIG_TCP_CONG_HTCP=y
# CONFIG_TCP_CONG_HSTCP is not set
CONFIG_TCP_CONG_HYBLA=y
CONFIG_TCP_CONG_VEGAS=m
CONFIG_TCP_CONG_SCALABLE=m
CONFIG_TCP_CONG_LP=m
# CONFIG_TCP_CONG_VENO is not set
CONFIG_TCP_CONG_YEAH=m
CONFIG_TCP_CONG_ILLINOIS=m
# CONFIG_DEFAULT_BIC is not set
# CONFIG_DEFAULT_CUBIC is not set
# CONFIG_DEFAULT_HTCP is not set
# CONFIG_DEFAULT_VEGAS is not set
CONFIG_DEFAULT_WESTWOOD=y
# CONFIG_DEFAULT_RENO is not set
CONFIG_DEFAULT_TCP_CONG="westwood"
# CONFIG_TCP_MD5SIG is not set
CONFIG_IPV6=y
CONFIG_IPV6_PRIVACY=y
# CONFIG_IPV6_ROUTER_PREF is not set
# CONFIG_IPV6_OPTIMISTIC_DAD is not set
# CONFIG_INET6_AH is not set
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=y
CONFIG_IPV6_MIP6=m
CONFIG_INET6_XFRM_TUNNEL=y
CONFIG_INET6_TUNNEL=y
CONFIG_INET6_XFRM_MODE_TRANSPORT=y
CONFIG_INET6_XFRM_MODE_TUNNEL=m
# CONFIG_INET6_XFRM_MODE_BEET is not set
CONFIG_INET6_XFRM_MODE_ROUTEOPTIMIZATION=m
# CONFIG_IPV6_SIT is not set
CONFIG_IPV6_TUNNEL=y
CONFIG_IPV6_MULTIPLE_TABLES=y
CONFIG_IPV6_SUBTREES=y
CONFIG_IPV6_MROUTE=y
# CONFIG_IPV6_PIMSM_V2 is not set
# CONFIG_NETLABEL is not set
CONFIG_NETWORK_SECMARK=y
CONFIG_NETFILTER=y
# CONFIG_NETFILTER_DEBUG is not set
CONFIG_NETFILTER_ADVANCED=y

#
# Core Netfilter Configuration
#
CONFIG_NETFILTER_NETLINK=y
CONFIG_NETFILTER_NETLINK_QUEUE=y
CONFIG_NETFILTER_NETLINK_LOG=y
# CONFIG_NF_CONNTRACK is not set
CONFIG_NETFILTER_XTABLES=y
CONFIG_NETFILTER_XT_TARGET_CLASSIFY=y
# CONFIG_NETFILTER_XT_TARGET_DSCP is not set
CONFIG_NETFILTER_XT_TARGET_HL=y
CONFIG_NETFILTER_XT_TARGET_LED=m
CONFIG_NETFILTER_XT_TARGET_MARK=y
CONFIG_NETFILTER_XT_TARGET_NFLOG=y
CONFIG_NETFILTER_XT_TARGET_NFQUEUE=m
CONFIG_NETFILTER_XT_TARGET_RATEEST=y
# CONFIG_NETFILTER_XT_TARGET_SECMARK is not set
# CONFIG_NETFILTER_XT_TARGET_TCPMSS is not set
# CONFIG_NETFILTER_XT_TARGET_TCPOPTSTRIP is not set
CONFIG_NETFILTER_XT_MATCH_COMMENT=m
# CONFIG_NETFILTER_XT_MATCH_DCCP is not set
# CONFIG_NETFILTER_XT_MATCH_DSCP is not set
CONFIG_NETFILTER_XT_MATCH_ESP=y
CONFIG_NETFILTER_XT_MATCH_HASHLIMIT=y
CONFIG_NETFILTER_XT_MATCH_HL=y
CONFIG_NETFILTER_XT_MATCH_IPRANGE=m
CONFIG_NETFILTER_XT_MATCH_LENGTH=m
CONFIG_NETFILTER_XT_MATCH_LIMIT=y
CONFIG_NETFILTER_XT_MATCH_MAC=y
CONFIG_NETFILTER_XT_MATCH_MARK=m
# CONFIG_NETFILTER_XT_MATCH_MULTIPORT is not set
CONFIG_NETFILTER_XT_MATCH_OWNER=y
CONFIG_NETFILTER_XT_MATCH_POLICY=m
# CONFIG_NETFILTER_XT_MATCH_PKTTYPE is not set
CONFIG_NETFILTER_XT_MATCH_QUOTA=m
CONFIG_NETFILTER_XT_MATCH_RATEEST=y
CONFIG_NETFILTER_XT_MATCH_REALM=y
CONFIG_NETFILTER_XT_MATCH_RECENT=m
# CONFIG_NETFILTER_XT_MATCH_RECENT_PROC_COMPAT is not set
CONFIG_NETFILTER_XT_MATCH_SCTP=m
CONFIG_NETFILTER_XT_MATCH_STATISTIC=y
CONFIG_NETFILTER_XT_MATCH_STRING=y
CONFIG_NETFILTER_XT_MATCH_TCPMSS=y
CONFIG_NETFILTER_XT_MATCH_TIME=y
# CONFIG_NETFILTER_XT_MATCH_U32 is not set
CONFIG_NETFILTER_XT_MATCH_OSF=y
CONFIG_IP_VS=y
CONFIG_IP_VS_IPV6=y
CONFIG_IP_VS_DEBUG=y
CONFIG_IP_VS_TAB_BITS=12

#
# IPVS transport protocol load balancing support
#
# CONFIG_IP_VS_PROTO_TCP is not set
# CONFIG_IP_VS_PROTO_UDP is not set
CONFIG_IP_VS_PROTO_AH_ESP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y

#
# IPVS scheduler
#
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=y
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=y
# CONFIG_IP_VS_LBLCR is not set
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=y
CONFIG_IP_VS_SED=y
CONFIG_IP_VS_NQ=m

#
# IPVS application helper
#

#
# IP: Netfilter Configuration
#
# CONFIG_NF_DEFRAG_IPV4 is not set
CONFIG_IP_NF_QUEUE=y
CONFIG_IP_NF_IPTABLES=y
CONFIG_IP_NF_MATCH_ADDRTYPE=m
# CONFIG_IP_NF_MATCH_AH is not set
CONFIG_IP_NF_MATCH_ECN=y
CONFIG_IP_NF_MATCH_TTL=y
CONFIG_IP_NF_FILTER=y
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
# CONFIG_IP_NF_TARGET_ULOG is not set
CONFIG_IP_NF_MANGLE=y
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_TTL=y
# CONFIG_IP_NF_RAW is not set
CONFIG_IP_NF_SECURITY=y
# CONFIG_IP_NF_ARPTABLES is not set

#
# IPv6: Netfilter Configuration
#
CONFIG_IP6_NF_QUEUE=y
# CONFIG_IP6_NF_IPTABLES is not set

#
# DECnet: Netfilter Configuration
#
CONFIG_DECNET_NF_GRABULATOR=y
CONFIG_IP_DCCP=y

#
# DCCP CCIDs Configuration (EXPERIMENTAL)
#
CONFIG_IP_DCCP_CCID2_DEBUG=y
# CONFIG_IP_DCCP_CCID3 is not set

#
# DCCP Kernel Hacking
#
CONFIG_IP_DCCP_DEBUG=y
CONFIG_IP_SCTP=y
CONFIG_SCTP_DBG_MSG=y
CONFIG_SCTP_DBG_OBJCNT=y
# CONFIG_SCTP_HMAC_NONE is not set
# CONFIG_SCTP_HMAC_SHA1 is not set
CONFIG_SCTP_HMAC_MD5=y
CONFIG_RDS=m
CONFIG_RDS_RDMA=m
CONFIG_RDS_TCP=m
# CONFIG_RDS_DEBUG is not set
CONFIG_TIPC=y
CONFIG_TIPC_ADVANCED=y
CONFIG_TIPC_ZONES=3
CONFIG_TIPC_CLUSTERS=1
CONFIG_TIPC_NODES=255
CONFIG_TIPC_SLAVE_NODES=0
CONFIG_TIPC_PORTS=8191
CONFIG_TIPC_LOG=0
# CONFIG_TIPC_DEBUG is not set
# CONFIG_ATM is not set
CONFIG_STP=m
CONFIG_GARP=m
# CONFIG_BRIDGE is not set
CONFIG_NET_DSA=y
# CONFIG_NET_DSA_TAG_DSA is not set
CONFIG_NET_DSA_TAG_EDSA=y
CONFIG_NET_DSA_TAG_TRAILER=y
CONFIG_NET_DSA_MV88E6XXX=y
CONFIG_NET_DSA_MV88E6060=y
# CONFIG_NET_DSA_MV88E6XXX_NEED_PPU is not set
# CONFIG_NET_DSA_MV88E6131 is not set
CONFIG_NET_DSA_MV88E6123_61_65=y
CONFIG_VLAN_8021Q=m
CONFIG_VLAN_8021Q_GVRP=y
CONFIG_DECNET=y
CONFIG_DECNET_ROUTER=y
CONFIG_LLC=y
# CONFIG_LLC2 is not set
CONFIG_IPX=y
CONFIG_IPX_INTERN=y
CONFIG_ATALK=y
CONFIG_DEV_APPLETALK=y
CONFIG_IPDDP=y
# CONFIG_IPDDP_ENCAP is not set
CONFIG_IPDDP_DECAP=y
# CONFIG_X25 is not set
CONFIG_LAPB=y
CONFIG_ECONET=m
CONFIG_ECONET_AUNUDP=y
# CONFIG_ECONET_NATIVE is not set
CONFIG_WAN_ROUTER=y
# CONFIG_PHONET is not set
CONFIG_IEEE802154=m
CONFIG_NET_SCHED=y

#
# Queueing/Scheduling
#
CONFIG_NET_SCH_CBQ=m
CONFIG_NET_SCH_HTB=m
# CONFIG_NET_SCH_HFSC is not set
# CONFIG_NET_SCH_PRIO is not set
# CONFIG_NET_SCH_MULTIQ is not set
CONFIG_NET_SCH_RED=m
CONFIG_NET_SCH_SFQ=m
# CONFIG_NET_SCH_TEQL is not set
CONFIG_NET_SCH_TBF=y
CONFIG_NET_SCH_GRED=y
CONFIG_NET_SCH_DSMARK=y
CONFIG_NET_SCH_NETEM=y
CONFIG_NET_SCH_DRR=m
# CONFIG_NET_SCH_INGRESS is not set

#
# Classification
#
CONFIG_NET_CLS=y
CONFIG_NET_CLS_BASIC=y
CONFIG_NET_CLS_TCINDEX=m
CONFIG_NET_CLS_ROUTE4=y
CONFIG_NET_CLS_ROUTE=y
CONFIG_NET_CLS_FW=y
CONFIG_NET_CLS_U32=m
CONFIG_CLS_U32_PERF=y
CONFIG_CLS_U32_MARK=y
CONFIG_NET_CLS_RSVP=y
# CONFIG_NET_CLS_RSVP6 is not set
CONFIG_NET_CLS_FLOW=y
# CONFIG_NET_EMATCH is not set
CONFIG_NET_CLS_ACT=y
CONFIG_NET_ACT_POLICE=y
CONFIG_NET_ACT_GACT=y
# CONFIG_GACT_PROB is not set
# CONFIG_NET_ACT_MIRRED is not set
# CONFIG_NET_ACT_IPT is not set
CONFIG_NET_ACT_NAT=y
# CONFIG_NET_ACT_PEDIT is not set
CONFIG_NET_ACT_SIMP=y
CONFIG_NET_ACT_SKBEDIT=m
# CONFIG_NET_CLS_IND is not set
CONFIG_NET_SCH_FIFO=y
# CONFIG_DCB is not set

#
# Network testing
#
CONFIG_NET_PKTGEN=m
# CONFIG_NET_DROP_MONITOR is not set
CONFIG_HAMRADIO=y

#
# Packet Radio protocols
#
CONFIG_AX25=y
# CONFIG_AX25_DAMA_SLAVE is not set
# CONFIG_NETROM is not set
CONFIG_ROSE=m

#
# AX.25 network device drivers
#
# CONFIG_MKISS is not set
CONFIG_6PACK=y
CONFIG_BPQETHER=y
CONFIG_BAYCOM_SER_FDX=m
CONFIG_BAYCOM_SER_HDX=m
# CONFIG_BAYCOM_PAR is not set
CONFIG_YAM=m
# CONFIG_CAN is not set
CONFIG_IRDA=m

#
# IrDA protocols
#
CONFIG_IRLAN=m
CONFIG_IRNET=m
CONFIG_IRCOMM=m
CONFIG_IRDA_ULTRA=y

#
# IrDA options
#
CONFIG_IRDA_CACHE_LAST_LSAP=y
CONFIG_IRDA_FAST_RR=y
# CONFIG_IRDA_DEBUG is not set

#
# Infrared-port device drivers
#

#
# SIR device drivers
#
CONFIG_IRTTY_SIR=m

#
# Dongle support
#
CONFIG_DONGLE=y
# CONFIG_ESI_DONGLE is not set
# CONFIG_ACTISYS_DONGLE is not set
# CONFIG_TEKRAM_DONGLE is not set
CONFIG_TOIM3232_DONGLE=m
CONFIG_LITELINK_DONGLE=m
CONFIG_MA600_DONGLE=m
CONFIG_GIRBIL_DONGLE=m
CONFIG_MCP2120_DONGLE=m
CONFIG_OLD_BELKIN_DONGLE=m
CONFIG_ACT200L_DONGLE=m
# CONFIG_KINGSUN_DONGLE is not set
CONFIG_KSDAZZLE_DONGLE=m
# CONFIG_KS959_DONGLE is not set

#
# FIR device drivers
#
CONFIG_USB_IRDA=m
CONFIG_SIGMATEL_FIR=m
CONFIG_NSC_FIR=m
CONFIG_WINBOND_FIR=m
# CONFIG_SMC_IRCC_FIR is not set
# CONFIG_ALI_FIR is not set
CONFIG_VLSI_FIR=m
CONFIG_VIA_FIR=m
CONFIG_MCS_FIR=m
CONFIG_BT=m
CONFIG_BT_L2CAP=m
CONFIG_BT_SCO=m
CONFIG_BT_RFCOMM=m
CONFIG_BT_RFCOMM_TTY=y
# CONFIG_BT_BNEP is not set
# CONFIG_BT_CMTP is not set
CONFIG_BT_HIDP=m

#
# Bluetooth device drivers
#
# CONFIG_BT_HCIBTUSB is not set
CONFIG_BT_HCIUART=m
CONFIG_BT_HCIUART_H4=y
CONFIG_BT_HCIUART_BCSP=y
CONFIG_BT_HCIUART_LL=y
CONFIG_BT_HCIBCM203X=m
# CONFIG_BT_HCIBPA10X is not set
CONFIG_BT_HCIBFUSB=m
# CONFIG_BT_HCIVHCI is not set
CONFIG_BT_MRVL=m
CONFIG_AF_RXRPC=y
CONFIG_AF_RXRPC_DEBUG=y
CONFIG_RXKAD=y
CONFIG_FIB_RULES=y
CONFIG_WIRELESS=y
CONFIG_WIRELESS_EXT=y
CONFIG_WEXT_CORE=y
CONFIG_WEXT_PROC=y
CONFIG_WEXT_SPY=y
CONFIG_WEXT_PRIV=y
CONFIG_CFG80211=m
# CONFIG_NL80211_TESTMODE is not set
CONFIG_CFG80211_DEVELOPER_WARNINGS=y
CONFIG_CFG80211_REG_DEBUG=y
CONFIG_CFG80211_DEFAULT_PS=y
CONFIG_CFG80211_DEBUGFS=y
CONFIG_WIRELESS_OLD_REGULATORY=y
CONFIG_CFG80211_WEXT=y
CONFIG_WIRELESS_EXT_SYSFS=y
CONFIG_LIB80211=m
CONFIG_LIB80211_CRYPT_WEP=m
CONFIG_LIB80211_CRYPT_CCMP=m
CONFIG_LIB80211_CRYPT_TKIP=m
CONFIG_LIB80211_DEBUG=y
# CONFIG_MAC80211 is not set
# CONFIG_WIMAX is not set
CONFIG_RFKILL=m
CONFIG_RFKILL_LEDS=y
# CONFIG_RFKILL_INPUT is not set

#
# Device Drivers
#

#
# Generic Driver Options
#
CONFIG_UEVENT_HELPER_PATH="/sbin/hotplug"
# CONFIG_DEVTMPFS is not set
CONFIG_STANDALONE=y
CONFIG_PREVENT_FIRMWARE_BUILD=y
CONFIG_FW_LOADER=y
CONFIG_FIRMWARE_IN_KERNEL=y
CONFIG_EXTRA_FIRMWARE=""
# CONFIG_DEBUG_DRIVER is not set
CONFIG_DEBUG_DEVRES=y
# CONFIG_SYS_HYPERVISOR is not set
CONFIG_CONNECTOR=m
CONFIG_PARPORT=y
CONFIG_PARPORT_PC=y
CONFIG_PARPORT_SERIAL=y
# CONFIG_PARPORT_PC_FIFO is not set
CONFIG_PARPORT_PC_SUPERIO=y
# CONFIG_PARPORT_GSC is not set
# CONFIG_PARPORT_AX88796 is not set
# CONFIG_PARPORT_1284 is not set
CONFIG_PARPORT_NOT_PC=y
CONFIG_BLK_DEV=y
# CONFIG_BLK_DEV_FD is not set
CONFIG_BLK_CPQ_DA=y
CONFIG_BLK_CPQ_CISS_DA=m
CONFIG_CISS_SCSI_TAPE=y
CONFIG_BLK_DEV_DAC960=y
CONFIG_BLK_DEV_UMEM=y
# CONFIG_BLK_DEV_COW_COMMON is not set
# CONFIG_BLK_DEV_LOOP is not set
# CONFIG_BLK_DEV_DRBD is not set
# CONFIG_BLK_DEV_NBD is not set
CONFIG_BLK_DEV_SX8=m
CONFIG_BLK_DEV_UB=m
CONFIG_BLK_DEV_RAM=y
CONFIG_BLK_DEV_RAM_COUNT=16
CONFIG_BLK_DEV_RAM_SIZE=4096
CONFIG_BLK_DEV_XIP=y
CONFIG_CDROM_PKTCDVD=y
CONFIG_CDROM_PKTCDVD_BUFFERS=8
# CONFIG_CDROM_PKTCDVD_WCACHE is not set
# CONFIG_ATA_OVER_ETH is not set
CONFIG_BLK_DEV_HD=y
CONFIG_MISC_DEVICES=y
CONFIG_AD525X_DPOT=m
CONFIG_IBM_ASM=y
CONFIG_PHANTOM=m
CONFIG_SGI_IOC4=y
CONFIG_TIFM_CORE=y
CONFIG_TIFM_7XX1=m
# CONFIG_ICS932S401 is not set
CONFIG_ENCLOSURE_SERVICES=m
CONFIG_CS5535_MFGPT=y
CONFIG_CS5535_MFGPT_DEFAULT_IRQ=7
# CONFIG_HP_ILO is not set
CONFIG_ISL29003=m
# CONFIG_DS1682 is not set
CONFIG_TI_DAC7512=y
CONFIG_C2PORT=m
CONFIG_C2PORT_DURAMAR_2150=m

#
# EEPROM support
#
CONFIG_EEPROM_AT24=m
CONFIG_EEPROM_AT25=y
CONFIG_EEPROM_LEGACY=m
CONFIG_EEPROM_MAX6875=m
# CONFIG_EEPROM_93CX6 is not set
# CONFIG_CB710_CORE is not set
CONFIG_HAVE_IDE=y

#
# SCSI device support
#
CONFIG_RAID_ATTRS=m
CONFIG_SCSI=y
CONFIG_SCSI_DMA=y
CONFIG_SCSI_TGT=m
# CONFIG_SCSI_NETLINK is not set
# CONFIG_SCSI_PROC_FS is not set

#
# SCSI support type (disk, tape, CD-ROM)
#
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
CONFIG_CHR_DEV_OSST=y
CONFIG_BLK_DEV_SR=y
# CONFIG_BLK_DEV_SR_VENDOR is not set
# CONFIG_CHR_DEV_SG is not set
CONFIG_CHR_DEV_SCH=m
CONFIG_SCSI_ENCLOSURE=m
# CONFIG_SCSI_MULTI_LUN is not set
# CONFIG_SCSI_CONSTANTS is not set
CONFIG_SCSI_LOGGING=y
CONFIG_SCSI_SCAN_ASYNC=y
CONFIG_SCSI_WAIT_SCAN=m

#
# SCSI Transports
#
CONFIG_SCSI_SPI_ATTRS=y
# CONFIG_SCSI_FC_ATTRS is not set
# CONFIG_SCSI_ISCSI_ATTRS is not set
CONFIG_SCSI_SAS_ATTRS=m
CONFIG_SCSI_SAS_LIBSAS=m
# CONFIG_SCSI_SAS_ATA is not set
CONFIG_SCSI_SAS_HOST_SMP=y
CONFIG_SCSI_SAS_LIBSAS_DEBUG=y
# CONFIG_SCSI_LOWLEVEL is not set
CONFIG_SCSI_AIC7XXX=y
CONFIG_SCSI_DH=y
CONFIG_SCSI_DH_RDAC=m
CONFIG_SCSI_DH_HP_SW=y
CONFIG_SCSI_DH_EMC=m
# CONFIG_SCSI_DH_ALUA is not set
# CONFIG_SCSI_OSD_INITIATOR is not set
CONFIG_ATA=y
# CONFIG_ATA_NONSTANDARD is not set
# CONFIG_ATA_VERBOSE_ERROR is not set
CONFIG_SATA_PMP=y
CONFIG_SATA_AHCI=y
# CONFIG_SATA_SIL24 is not set
CONFIG_ATA_SFF=y
CONFIG_SATA_SVW=y
CONFIG_ATA_PIIX=y
CONFIG_SATA_MV=y
CONFIG_SATA_NV=y
CONFIG_PDC_ADMA=m
# CONFIG_SATA_QSTOR is not set
CONFIG_SATA_PROMISE=y
CONFIG_SATA_SX4=y
CONFIG_SATA_SIL=y
CONFIG_SATA_SIS=m
CONFIG_SATA_ULI=y
CONFIG_SATA_VIA=y
# CONFIG_SATA_VITESSE is not set
CONFIG_SATA_INIC162X=m
CONFIG_PATA_ALI=y
CONFIG_PATA_AMD=y
CONFIG_PATA_ARTOP=y
# CONFIG_PATA_ATP867X is not set
CONFIG_PATA_ATIIXP=y
# CONFIG_PATA_CMD640_PCI is not set
CONFIG_PATA_CMD64X=m
CONFIG_PATA_CS5520=y
CONFIG_PATA_CS5530=m
CONFIG_PATA_CYPRESS=m
CONFIG_PATA_EFAR=y
# CONFIG_ATA_GENERIC is not set
# CONFIG_PATA_HPT366 is not set
CONFIG_PATA_HPT37X=m
# CONFIG_PATA_HPT3X2N is not set
CONFIG_PATA_HPT3X3=y
# CONFIG_PATA_HPT3X3_DMA is not set
# CONFIG_PATA_IT821X is not set
CONFIG_PATA_IT8213=m
CONFIG_PATA_JMICRON=m
CONFIG_PATA_TRIFLEX=m
CONFIG_PATA_MARVELL=y
# CONFIG_PATA_MPIIX is not set
CONFIG_PATA_OLDPIIX=y
CONFIG_PATA_NETCELL=y
CONFIG_PATA_NINJA32=y
CONFIG_PATA_NS87410=m
CONFIG_PATA_NS87415=y
# CONFIG_PATA_OPTI is not set
CONFIG_PATA_OPTIDMA=m
CONFIG_PATA_PDC2027X=y
CONFIG_PATA_PDC_OLD=m
CONFIG_PATA_RADISYS=m
CONFIG_PATA_RDC=m
# CONFIG_PATA_RZ1000 is not set
CONFIG_PATA_SC1200=y
# CONFIG_PATA_SERVERWORKS is not set
# CONFIG_PATA_SIL680 is not set
CONFIG_PATA_SIS=m
CONFIG_PATA_TOSHIBA=y
CONFIG_PATA_VIA=y
# CONFIG_PATA_WINBOND is not set
CONFIG_PATA_PLATFORM=m
# CONFIG_PATA_SCH is not set
CONFIG_MD=y
CONFIG_BLK_DEV_MD=m
CONFIG_MD_LINEAR=m
# CONFIG_MD_RAID0 is not set
CONFIG_MD_RAID1=m
# CONFIG_MD_RAID10 is not set
CONFIG_MD_RAID456=m
CONFIG_MULTICORE_RAID456=y
CONFIG_MD_RAID6_PQ=m
CONFIG_ASYNC_RAID6_TEST=m
CONFIG_MD_MULTIPATH=m
CONFIG_MD_FAULTY=m
CONFIG_BLK_DEV_DM=m
CONFIG_DM_DEBUG=y
CONFIG_DM_CRYPT=m
# CONFIG_DM_SNAPSHOT is not set
CONFIG_DM_MIRROR=m
CONFIG_DM_LOG_USERSPACE=m
CONFIG_DM_ZERO=m
# CONFIG_DM_MULTIPATH is not set
CONFIG_DM_DELAY=m
# CONFIG_DM_UEVENT is not set
CONFIG_FUSION=y
# CONFIG_FUSION_SPI is not set
# CONFIG_FUSION_FC is not set
# CONFIG_FUSION_SAS is not set
CONFIG_FUSION_MAX_SGE=128
# CONFIG_FUSION_LOGGING is not set

#
# IEEE 1394 (FireWire) support
#

#
# You can enable one or both FireWire driver stacks.
#

#
# The newer stack is recommended.
#
CONFIG_FIREWIRE=m
# CONFIG_FIREWIRE_OHCI is not set
CONFIG_FIREWIRE_SBP2=m
# CONFIG_FIREWIRE_NET is not set
# CONFIG_IEEE1394 is not set
CONFIG_I2O=y
CONFIG_I2O_LCT_NOTIFY_ON_CHANGES=y
# CONFIG_I2O_EXT_ADAPTEC is not set
# CONFIG_I2O_CONFIG is not set
CONFIG_I2O_BUS=m
# CONFIG_I2O_BLOCK is not set
# CONFIG_I2O_SCSI is not set
CONFIG_I2O_PROC=m
# CONFIG_MACINTOSH_DRIVERS is not set
CONFIG_NETDEVICES=y
CONFIG_IFB=m
CONFIG_DUMMY=y
# CONFIG_BONDING is not set
# CONFIG_MACVLAN is not set
# CONFIG_EQUALIZER is not set
# CONFIG_TUN is not set
# CONFIG_VETH is not set
# CONFIG_ARCNET is not set
CONFIG_PHYLIB=y

#
# MII PHY device drivers
#
# CONFIG_MARVELL_PHY is not set
# CONFIG_DAVICOM_PHY is not set
CONFIG_QSEMI_PHY=y
CONFIG_LXT_PHY=y
# CONFIG_CICADA_PHY is not set
CONFIG_VITESSE_PHY=y
CONFIG_SMSC_PHY=y
CONFIG_BROADCOM_PHY=y
# CONFIG_ICPLUS_PHY is not set
# CONFIG_REALTEK_PHY is not set
# CONFIG_NATIONAL_PHY is not set
# CONFIG_STE10XP is not set
# CONFIG_LSI_ET1011C_PHY is not set
CONFIG_FIXED_PHY=y
CONFIG_MDIO_BITBANG=y
# CONFIG_MDIO_GPIO is not set
CONFIG_NET_ETHERNET=y
CONFIG_MII=y
CONFIG_HAPPYMEAL=m
CONFIG_SUNGEM=m
CONFIG_CASSINI=m
# CONFIG_NET_VENDOR_3COM is not set
CONFIG_VORTEX=y
# CONFIG_ENC28J60 is not set
CONFIG_ETHOC=y
CONFIG_DNET=m
# CONFIG_NET_TULIP is not set
CONFIG_HP100=y
# CONFIG_IBM_NEW_EMAC_ZMII is not set
# CONFIG_IBM_NEW_EMAC_RGMII is not set
# CONFIG_IBM_NEW_EMAC_TAH is not set
# CONFIG_IBM_NEW_EMAC_EMAC4 is not set
# CONFIG_IBM_NEW_EMAC_NO_FLOW_CTRL is not set
# CONFIG_IBM_NEW_EMAC_MAL_CLR_ICINTSTAT is not set
# CONFIG_IBM_NEW_EMAC_MAL_COMMON_ERR is not set
CONFIG_NET_PCI=y
# CONFIG_PCNET32 is not set
CONFIG_AMD8111_ETH=y
CONFIG_ADAPTEC_STARFIRE=m
# CONFIG_B44 is not set
CONFIG_FORCEDETH=y
# CONFIG_FORCEDETH_NAPI is not set
CONFIG_E100=y
# CONFIG_FEALNX is not set
CONFIG_NATSEMI=m
CONFIG_NE2K_PCI=y
CONFIG_8139CP=y
CONFIG_8139TOO=y
# CONFIG_8139TOO_PIO is not set
# CONFIG_8139TOO_TUNE_TWISTER is not set
CONFIG_8139TOO_8129=y
CONFIG_8139_OLD_RX_RESET=y
CONFIG_R6040=m
CONFIG_SIS900=y
CONFIG_EPIC100=m
CONFIG_SMSC9420=m
CONFIG_SUNDANCE=y
# CONFIG_SUNDANCE_MMIO is not set
CONFIG_TLAN=m
CONFIG_KS8842=m
CONFIG_KS8851=m
# CONFIG_KS8851_MLL is not set
CONFIG_VIA_RHINE=y
CONFIG_VIA_RHINE_MMIO=y
CONFIG_SC92031=m
CONFIG_NET_POCKET=y
CONFIG_ATP=m
CONFIG_DE600=m
CONFIG_DE620=m
# CONFIG_ATL2 is not set
CONFIG_NETDEV_1000=y
# CONFIG_ACENIC is not set
CONFIG_DL2K=m
CONFIG_E1000=y
CONFIG_E1000E=y
# CONFIG_IP1000 is not set
CONFIG_IGB=y
# CONFIG_IGBVF is not set
CONFIG_NS83820=y
CONFIG_HAMACHI=m
# CONFIG_YELLOWFIN is not set
# CONFIG_R8169 is not set
# CONFIG_SIS190 is not set
CONFIG_SKGE=y
CONFIG_SKGE_DEBUG=y
CONFIG_SKY2=m
# CONFIG_SKY2_DEBUG is not set
# CONFIG_VIA_VELOCITY is not set
CONFIG_TIGON3=y
CONFIG_BNX2=y
CONFIG_CNIC=y
CONFIG_QLA3XXX=y
# CONFIG_ATL1 is not set
CONFIG_ATL1E=y
CONFIG_ATL1C=y
# CONFIG_JME is not set
CONFIG_NETDEV_10000=y
CONFIG_MDIO=y
CONFIG_CHELSIO_T1=y
CONFIG_CHELSIO_T1_1G=y
CONFIG_CHELSIO_T3_DEPENDS=y
# CONFIG_CHELSIO_T3 is not set
CONFIG_ENIC=y
CONFIG_IXGBE=m
CONFIG_IXGB=m
# CONFIG_S2IO is not set
# CONFIG_MYRI10GE is not set
# CONFIG_NIU is not set
CONFIG_MLX4_EN=y
CONFIG_MLX4_CORE=y
CONFIG_MLX4_DEBUG=y
CONFIG_TEHUTI=m
# CONFIG_BNX2X is not set
# CONFIG_QLGE is not set
# CONFIG_SFC is not set
CONFIG_BE2NET=m
# CONFIG_TR is not set
CONFIG_WLAN=y
# CONFIG_AIRO is not set
CONFIG_ATMEL=y
CONFIG_PCI_ATMEL=y
# CONFIG_PRISM54 is not set
CONFIG_USB_ZD1201=m
# CONFIG_USB_NET_RNDIS_WLAN is not set
# CONFIG_ATH_COMMON is not set
CONFIG_HOSTAP=m
# CONFIG_HOSTAP_FIRMWARE is not set
CONFIG_HOSTAP_PLX=m
# CONFIG_HOSTAP_PCI is not set
CONFIG_IPW2100=m
# CONFIG_IPW2100_MONITOR is not set
# CONFIG_IPW2100_DEBUG is not set
CONFIG_IPW2200=m
# CONFIG_IPW2200_MONITOR is not set
CONFIG_IPW2200_QOS=y
CONFIG_IPW2200_DEBUG=y
CONFIG_LIBIPW=m
CONFIG_LIBIPW_DEBUG=y
# CONFIG_LIBERTAS is not set
CONFIG_HERMES=m
# CONFIG_HERMES_CACHE_FW_ON_INIT is not set
# CONFIG_PLX_HERMES is not set
CONFIG_TMD_HERMES=m
# CONFIG_NORTEL_HERMES is not set
CONFIG_PCI_HERMES=m

#
# Enable WiMAX (Networking options) to see the WiMAX drivers
#

#
# USB Network Adapters
#
# CONFIG_USB_CATC is not set
CONFIG_USB_KAWETH=y
CONFIG_USB_PEGASUS=m
CONFIG_USB_RTL8150=m
CONFIG_USB_USBNET=m
# CONFIG_USB_NET_AX8817X is not set
CONFIG_USB_NET_CDCETHER=m
# CONFIG_USB_NET_CDC_EEM is not set
CONFIG_USB_NET_DM9601=m
CONFIG_USB_NET_SMSC95XX=m
CONFIG_USB_NET_GL620A=m
# CONFIG_USB_NET_NET1080 is not set
CONFIG_USB_NET_PLUSB=m
CONFIG_USB_NET_MCS7830=m
CONFIG_USB_NET_RNDIS_HOST=m
# CONFIG_USB_NET_CDC_SUBSET is not set
# CONFIG_USB_NET_ZAURUS is not set
# CONFIG_USB_HSO is not set
CONFIG_USB_NET_INT51X1=m
CONFIG_WAN=y
CONFIG_LANMEDIA=m
CONFIG_HDLC=y
CONFIG_HDLC_RAW=m
# CONFIG_HDLC_RAW_ETH is not set
CONFIG_HDLC_CISCO=y
CONFIG_HDLC_FR=y
CONFIG_HDLC_PPP=y
CONFIG_HDLC_X25=y
# CONFIG_PCI200SYN is not set
# CONFIG_WANXL is not set
CONFIG_PC300TOO=y
CONFIG_FARSYNC=m
# CONFIG_DSCC4 is not set
CONFIG_DLCI=y
CONFIG_DLCI_MAX=8
CONFIG_WAN_ROUTER_DRIVERS=m
# CONFIG_CYCLADES_SYNC is not set
CONFIG_SBNI=m
CONFIG_SBNI_MULTILINE=y
CONFIG_IEEE802154_DRIVERS=m
# CONFIG_IEEE802154_FAKEHARD is not set
CONFIG_FDDI=y
CONFIG_DEFXX=m
CONFIG_DEFXX_MMIO=y
CONFIG_SKFP=y
CONFIG_HIPPI=y
CONFIG_ROADRUNNER=m
CONFIG_ROADRUNNER_LARGE_RINGS=y
CONFIG_PLIP=m
CONFIG_PPP=y
# CONFIG_PPP_MULTILINK is not set
CONFIG_PPP_FILTER=y
# CONFIG_PPP_ASYNC is not set
CONFIG_PPP_SYNC_TTY=y
CONFIG_PPP_DEFLATE=m
# CONFIG_PPP_BSDCOMP is not set
# CONFIG_PPP_MPPE is not set
CONFIG_PPPOE=m
CONFIG_PPPOL2TP=y
# CONFIG_SLIP is not set
CONFIG_SLHC=y
# CONFIG_NET_FC is not set
CONFIG_NETCONSOLE=y
CONFIG_NETCONSOLE_DYNAMIC=y
CONFIG_NETPOLL=y
CONFIG_NETPOLL_TRAP=y
CONFIG_NET_POLL_CONTROLLER=y
CONFIG_VMXNET3=m
CONFIG_ISDN=y
CONFIG_ISDN_I4L=m
CONFIG_ISDN_PPP=y
CONFIG_ISDN_PPP_VJ=y
CONFIG_ISDN_MPP=y
# CONFIG_IPPP_FILTER is not set
CONFIG_ISDN_PPP_BSDCOMP=m
# CONFIG_ISDN_AUDIO is not set

#
# ISDN feature submodules
#
CONFIG_ISDN_DIVERSION=m

#
# ISDN4Linux hardware drivers
#

#
# Passive cards
#
# CONFIG_ISDN_DRV_HISAX is not set

#
# Active cards
#
CONFIG_HYSDN=m
# CONFIG_HYSDN_CAPI is not set
CONFIG_ISDN_CAPI=m
CONFIG_ISDN_DRV_AVMB1_VERBOSE_REASON=y
CONFIG_CAPI_TRACE=y
CONFIG_ISDN_CAPI_MIDDLEWARE=y
CONFIG_ISDN_CAPI_CAPI20=m
# CONFIG_ISDN_CAPI_CAPIFS_BOOL is not set
CONFIG_ISDN_CAPI_CAPIDRV=m

#
# CAPI hardware drivers
#
CONFIG_CAPI_AVM=y
# CONFIG_ISDN_DRV_AVMB1_B1PCI is not set
# CONFIG_ISDN_DRV_AVMB1_B1PCMCIA is not set
# CONFIG_ISDN_DRV_AVMB1_T1PCI is not set
# CONFIG_ISDN_DRV_AVMB1_C4 is not set
CONFIG_CAPI_EICON=y
# CONFIG_ISDN_DIVAS is not set
CONFIG_ISDN_DRV_GIGASET=m
# CONFIG_GIGASET_CAPI is not set
CONFIG_GIGASET_I4L=y
# CONFIG_GIGASET_DUMMYLL is not set
CONFIG_GIGASET_BASE=m
CONFIG_GIGASET_M105=m
CONFIG_GIGASET_M101=m
CONFIG_GIGASET_DEBUG=y
CONFIG_PHONE=y
# CONFIG_PHONE_IXJ is not set

#
# Input device support
#
CONFIG_INPUT=y
CONFIG_INPUT_FF_MEMLESS=m
CONFIG_INPUT_POLLDEV=y
CONFIG_INPUT_SPARSEKMAP=m

#
# Userland interfaces
#
CONFIG_INPUT_MOUSEDEV=y
CONFIG_INPUT_MOUSEDEV_PSAUX=y
CONFIG_INPUT_MOUSEDEV_SCREEN_X=1024
CONFIG_INPUT_MOUSEDEV_SCREEN_Y=768
CONFIG_INPUT_JOYDEV=m
CONFIG_INPUT_EVDEV=y
# CONFIG_INPUT_EVBUG is not set

#
# Input Device Drivers
#
CONFIG_INPUT_KEYBOARD=y
CONFIG_KEYBOARD_ADP5588=m
CONFIG_KEYBOARD_ATKBD=y
# CONFIG_QT2160 is not set
CONFIG_KEYBOARD_LKKBD=y
CONFIG_KEYBOARD_GPIO=m
CONFIG_KEYBOARD_MATRIX=m
# CONFIG_KEYBOARD_LM8323 is not set
CONFIG_KEYBOARD_MAX7359=m
# CONFIG_KEYBOARD_NEWTON is not set
CONFIG_KEYBOARD_OPENCORES=m
CONFIG_KEYBOARD_STOWAWAY=m
CONFIG_KEYBOARD_SUNKBD=m
CONFIG_KEYBOARD_XTKBD=m
CONFIG_INPUT_MOUSE=y
# CONFIG_MOUSE_PS2 is not set
# CONFIG_MOUSE_SERIAL is not set
# CONFIG_MOUSE_APPLETOUCH is not set
CONFIG_MOUSE_BCM5974=m
# CONFIG_MOUSE_VSXXXAA is not set
# CONFIG_MOUSE_GPIO is not set
CONFIG_MOUSE_SYNAPTICS_I2C=m
# CONFIG_INPUT_JOYSTICK is not set
# CONFIG_INPUT_TABLET is not set
CONFIG_INPUT_TOUCHSCREEN=y
CONFIG_TOUCHSCREEN_ADS7846=m
# CONFIG_TOUCHSCREEN_AD7877 is not set
CONFIG_TOUCHSCREEN_AD7879_I2C=m
CONFIG_TOUCHSCREEN_AD7879=m
CONFIG_TOUCHSCREEN_DYNAPRO=y
CONFIG_TOUCHSCREEN_EETI=m
CONFIG_TOUCHSCREEN_FUJITSU=m
CONFIG_TOUCHSCREEN_GUNZE=y
# CONFIG_TOUCHSCREEN_ELO is not set
CONFIG_TOUCHSCREEN_WACOM_W8001=m
CONFIG_TOUCHSCREEN_MCS5000=m
# CONFIG_TOUCHSCREEN_MTOUCH is not set
# CONFIG_TOUCHSCREEN_INEXIO is not set
# CONFIG_TOUCHSCREEN_MK712 is not set
CONFIG_TOUCHSCREEN_PENMOUNT=m
CONFIG_TOUCHSCREEN_TOUCHRIGHT=y
CONFIG_TOUCHSCREEN_TOUCHWIN=m
CONFIG_TOUCHSCREEN_UCB1400=y
CONFIG_TOUCHSCREEN_WM97XX=m
# CONFIG_TOUCHSCREEN_WM9705 is not set
CONFIG_TOUCHSCREEN_WM9712=y
# CONFIG_TOUCHSCREEN_WM9713 is not set
# CONFIG_TOUCHSCREEN_USB_COMPOSITE is not set
CONFIG_TOUCHSCREEN_TOUCHIT213=y
# CONFIG_TOUCHSCREEN_TSC2007 is not set
CONFIG_INPUT_MISC=y
CONFIG_INPUT_PCSPKR=m
CONFIG_INPUT_APANEL=m
# CONFIG_INPUT_ATI_REMOTE is not set
CONFIG_INPUT_ATI_REMOTE2=m
CONFIG_INPUT_KEYSPAN_REMOTE=m
# CONFIG_INPUT_POWERMATE is not set
# CONFIG_INPUT_YEALINK is not set
CONFIG_INPUT_CM109=m
CONFIG_INPUT_UINPUT=m
# CONFIG_INPUT_GPIO_ROTARY_ENCODER is not set

#
# Hardware I/O ports
#
CONFIG_SERIO=y
CONFIG_SERIO_I8042=y
CONFIG_SERIO_SERPORT=y
CONFIG_SERIO_CT82C710=m
CONFIG_SERIO_PARKBD=m
CONFIG_SERIO_PCIPS2=y
CONFIG_SERIO_LIBPS2=y
CONFIG_SERIO_RAW=m
CONFIG_SERIO_ALTERA_PS2=m
# CONFIG_GAMEPORT is not set

#
# Character devices
#
CONFIG_VT=y
# CONFIG_CONSOLE_TRANSLATIONS is not set
CONFIG_VT_CONSOLE=y
CONFIG_HW_CONSOLE=y
CONFIG_VT_HW_CONSOLE_BINDING=y
CONFIG_DEVKMEM=y
CONFIG_SERIAL_NONSTANDARD=y
CONFIG_COMPUTONE=m
CONFIG_ROCKETPORT=m
CONFIG_CYCLADES=y
# CONFIG_CYZ_INTR is not set
# CONFIG_DIGIEPCA is not set
CONFIG_MOXA_INTELLIO=m
CONFIG_MOXA_SMARTIO=m
CONFIG_ISI=m
CONFIG_SYNCLINK=m
# CONFIG_SYNCLINKMP is not set
CONFIG_SYNCLINK_GT=y
CONFIG_N_HDLC=m
CONFIG_RISCOM8=y
CONFIG_SPECIALIX=y
# CONFIG_STALDRV is not set
# CONFIG_NOZOMI is not set

#
# Serial drivers
#
CONFIG_SERIAL_8250=y
CONFIG_SERIAL_8250_CONSOLE=y
CONFIG_FIX_EARLYCON_MEM=y
CONFIG_SERIAL_8250_PCI=y
CONFIG_SERIAL_8250_NR_UARTS=4
CONFIG_SERIAL_8250_RUNTIME_UARTS=4
# CONFIG_SERIAL_8250_EXTENDED is not set

#
# Non-8250 serial port support
#
# CONFIG_SERIAL_MAX3100 is not set
# CONFIG_SERIAL_UARTLITE is not set
CONFIG_SERIAL_CORE=y
CONFIG_SERIAL_CORE_CONSOLE=y
# CONFIG_SERIAL_JSM is not set
CONFIG_SERIAL_TIMBERDALE=m
CONFIG_UNIX98_PTYS=y
CONFIG_DEVPTS_MULTIPLE_INSTANCES=y
CONFIG_LEGACY_PTYS=y
CONFIG_LEGACY_PTY_COUNT=256
CONFIG_PRINTER=m
CONFIG_LP_CONSOLE=y
CONFIG_PPDEV=y
# CONFIG_IPMI_HANDLER is not set
CONFIG_HW_RANDOM=m
# CONFIG_HW_RANDOM_TIMERIOMEM is not set
CONFIG_HW_RANDOM_INTEL=m
# CONFIG_HW_RANDOM_AMD is not set
CONFIG_HW_RANDOM_VIA=m
CONFIG_NVRAM=y
# CONFIG_R3964 is not set
# CONFIG_APPLICOM is not set
# CONFIG_MWAVE is not set
CONFIG_PC8736x_GPIO=y
CONFIG_NSC_GPIO=y
CONFIG_RAW_DRIVER=y
CONFIG_MAX_RAW_DEVS=256
CONFIG_HANGCHECK_TIMER=m
CONFIG_TCG_TPM=y
# CONFIG_TCG_NSC is not set
# CONFIG_TCG_ATMEL is not set
# CONFIG_TELCLOCK is not set
CONFIG_DEVPORT=y
CONFIG_I2C=m
CONFIG_I2C_BOARDINFO=y
CONFIG_I2C_COMPAT=y
CONFIG_I2C_CHARDEV=m
CONFIG_I2C_HELPER_AUTO=y
CONFIG_I2C_ALGOBIT=m
CONFIG_I2C_ALGOPCA=m

#
# I2C Hardware Bus support
#

#
# PC SMBus host controller drivers
#
# CONFIG_I2C_ALI1535 is not set
# CONFIG_I2C_ALI1563 is not set
# CONFIG_I2C_ALI15X3 is not set
CONFIG_I2C_AMD756=m
CONFIG_I2C_AMD8111=m
# CONFIG_I2C_I801 is not set
# CONFIG_I2C_ISCH is not set
# CONFIG_I2C_PIIX4 is not set
CONFIG_I2C_NFORCE2=m
CONFIG_I2C_SIS5595=m
CONFIG_I2C_SIS630=m
# CONFIG_I2C_SIS96X is not set
CONFIG_I2C_VIA=m
# CONFIG_I2C_VIAPRO is not set

#
# I2C system bus drivers (mostly embedded / system-on-chip)
#
CONFIG_I2C_GPIO=m
CONFIG_I2C_OCORES=m
CONFIG_I2C_SIMTEC=m

#
# External I2C/SMBus adapter drivers
#
# CONFIG_I2C_PARPORT is not set
CONFIG_I2C_PARPORT_LIGHT=m
CONFIG_I2C_TAOS_EVM=m
# CONFIG_I2C_TINY_USB is not set

#
# Other I2C/SMBus bus drivers
#
CONFIG_I2C_PCA_PLATFORM=m
CONFIG_I2C_STUB=m

#
# Miscellaneous I2C Chip support
#
CONFIG_SENSORS_TSL2550=m
# CONFIG_I2C_DEBUG_CORE is not set
CONFIG_I2C_DEBUG_ALGO=y
CONFIG_I2C_DEBUG_BUS=y
CONFIG_I2C_DEBUG_CHIP=y
CONFIG_SPI=y
# CONFIG_SPI_DEBUG is not set
CONFIG_SPI_MASTER=y

#
# SPI Master Controller Drivers
#
CONFIG_SPI_BITBANG=y
CONFIG_SPI_BUTTERFLY=m
CONFIG_SPI_GPIO=y
CONFIG_SPI_LM70_LLP=m
CONFIG_SPI_XILINX=m
CONFIG_SPI_XILINX_PLTFM=m
# CONFIG_SPI_DESIGNWARE is not set

#
# SPI Protocol Masters
#
# CONFIG_SPI_SPIDEV is not set
CONFIG_SPI_TLE62X0=y

#
# PPS support
#
CONFIG_PPS=m
CONFIG_PPS_DEBUG=y
CONFIG_ARCH_WANT_OPTIONAL_GPIOLIB=y
CONFIG_GPIOLIB=y
CONFIG_DEBUG_GPIO=y
CONFIG_GPIO_SYSFS=y

#
# Memory mapped GPIO expanders:
#

#
# I2C GPIO expanders:
#
CONFIG_GPIO_MAX732X=m
# CONFIG_GPIO_PCA953X is not set
CONFIG_GPIO_PCF857X=m
CONFIG_GPIO_ADP5588=m

#
# PCI GPIO expanders:
#
# CONFIG_GPIO_CS5535 is not set
CONFIG_GPIO_LANGWELL=y
# CONFIG_GPIO_TIMBERDALE is not set

#
# SPI GPIO expanders:
#
# CONFIG_GPIO_MAX7301 is not set
# CONFIG_GPIO_MCP23S08 is not set
CONFIG_GPIO_MC33880=m

#
# AC97 GPIO expanders:
#
# CONFIG_GPIO_UCB1400 is not set
CONFIG_W1=m
CONFIG_W1_CON=y

#
# 1-wire Bus Masters
#
CONFIG_W1_MASTER_MATROX=m
CONFIG_W1_MASTER_DS2490=m
CONFIG_W1_MASTER_DS2482=m
# CONFIG_W1_MASTER_GPIO is not set

#
# 1-wire Slaves
#
CONFIG_W1_SLAVE_THERM=m
CONFIG_W1_SLAVE_SMEM=m
CONFIG_W1_SLAVE_DS2431=m
CONFIG_W1_SLAVE_DS2433=m
# CONFIG_W1_SLAVE_DS2433_CRC is not set
# CONFIG_W1_SLAVE_DS2760 is not set
CONFIG_W1_SLAVE_BQ27000=m
CONFIG_POWER_SUPPLY=m
# CONFIG_POWER_SUPPLY_DEBUG is not set
CONFIG_PDA_POWER=m
# CONFIG_BATTERY_DS2760 is not set
# CONFIG_BATTERY_DS2782 is not set
CONFIG_BATTERY_BQ27x00=m
# CONFIG_BATTERY_MAX17040 is not set
CONFIG_HWMON=y
CONFIG_HWMON_VID=m
CONFIG_HWMON_DEBUG_CHIP=y

#
# Native drivers
#
CONFIG_SENSORS_ABITUGURU=y
CONFIG_SENSORS_ABITUGURU3=m
CONFIG_SENSORS_AD7414=m
CONFIG_SENSORS_AD7418=m
# CONFIG_SENSORS_ADCXX is not set
CONFIG_SENSORS_ADM1021=m
CONFIG_SENSORS_ADM1025=m
# CONFIG_SENSORS_ADM1026 is not set
CONFIG_SENSORS_ADM1029=m
# CONFIG_SENSORS_ADM1031 is not set
CONFIG_SENSORS_ADM9240=m
# CONFIG_SENSORS_ADT7462 is not set
# CONFIG_SENSORS_ADT7470 is not set
CONFIG_SENSORS_ADT7473=m
CONFIG_SENSORS_ADT7475=m
# CONFIG_SENSORS_K8TEMP is not set
# CONFIG_SENSORS_K10TEMP is not set
# CONFIG_SENSORS_ASB100 is not set
CONFIG_SENSORS_ATXP1=m
# CONFIG_SENSORS_DS1621 is not set
CONFIG_SENSORS_I5K_AMB=y
CONFIG_SENSORS_F71805F=y
CONFIG_SENSORS_F71882FG=y
CONFIG_SENSORS_F75375S=m
CONFIG_SENSORS_FSCHMD=m
# CONFIG_SENSORS_G760A is not set
CONFIG_SENSORS_GL518SM=m
CONFIG_SENSORS_GL520SM=m
CONFIG_SENSORS_CORETEMP=y
CONFIG_SENSORS_IT87=m
CONFIG_SENSORS_LM63=m
CONFIG_SENSORS_LM70=m
# CONFIG_SENSORS_LM73 is not set
CONFIG_SENSORS_LM75=m
CONFIG_SENSORS_LM77=m
# CONFIG_SENSORS_LM78 is not set
CONFIG_SENSORS_LM80=m
# CONFIG_SENSORS_LM83 is not set
CONFIG_SENSORS_LM85=m
CONFIG_SENSORS_LM87=m
CONFIG_SENSORS_LTC4215=m
CONFIG_SENSORS_LTC4245=m
# CONFIG_SENSORS_LM95241 is not set
CONFIG_SENSORS_MAX1111=y
# CONFIG_SENSORS_MAX1619 is not set
# CONFIG_SENSORS_MAX6650 is not set
CONFIG_SENSORS_PC87360=m
CONFIG_SENSORS_PC87427=y
CONFIG_SENSORS_PCF8591=m
CONFIG_SENSORS_SHT15=m
CONFIG_SENSORS_SIS5595=y
# CONFIG_SENSORS_DME1737 is not set
CONFIG_SENSORS_SMSC47M1=y
# CONFIG_SENSORS_SMSC47M192 is not set
# CONFIG_SENSORS_SMSC47B397 is not set
CONFIG_SENSORS_ADS7828=m
CONFIG_SENSORS_AMC6821=m
CONFIG_SENSORS_THMC50=m
CONFIG_SENSORS_TMP401=m
CONFIG_SENSORS_TMP421=m
CONFIG_SENSORS_VIA_CPUTEMP=y
# CONFIG_SENSORS_VIA686A is not set
CONFIG_SENSORS_VT1211=m
CONFIG_SENSORS_VT8231=m
# CONFIG_SENSORS_W83781D is not set
# CONFIG_SENSORS_W83791D is not set
CONFIG_SENSORS_W83792D=m
CONFIG_SENSORS_W83793=m
# CONFIG_SENSORS_W83L785TS is not set
CONFIG_SENSORS_W83L786NG=m
CONFIG_SENSORS_HDAPS=m
CONFIG_SENSORS_LIS3_SPI=m
CONFIG_SENSORS_LIS3_I2C=m
# CONFIG_SENSORS_APPLESMC is not set
CONFIG_THERMAL=y
# CONFIG_THERMAL_HWMON is not set
CONFIG_WATCHDOG=y
CONFIG_WATCHDOG_NOWAYOUT=y

#
# Watchdog Device Drivers
#
CONFIG_SOFT_WATCHDOG=m
CONFIG_ACQUIRE_WDT=y
CONFIG_ADVANTECH_WDT=y
# CONFIG_ALIM1535_WDT is not set
CONFIG_ALIM7101_WDT=m
CONFIG_GEODE_WDT=m
CONFIG_SC520_WDT=m
CONFIG_IB700_WDT=m
CONFIG_IBMASR=m
# CONFIG_WAFER_WDT is not set
CONFIG_I6300ESB_WDT=m
# CONFIG_ITCO_WDT is not set
CONFIG_IT8712F_WDT=m
CONFIG_IT87_WDT=y
# CONFIG_HP_WATCHDOG is not set
CONFIG_SC1200_WDT=y
CONFIG_PC87413_WDT=y
CONFIG_60XX_WDT=y
CONFIG_SBC8360_WDT=m
CONFIG_CPU5_WDT=m
# CONFIG_SMSC_SCH311X_WDT is not set
CONFIG_SMSC37B787_WDT=y
CONFIG_W83627HF_WDT=m
CONFIG_W83877F_WDT=y
# CONFIG_W83977F_WDT is not set
CONFIG_MACHZ_WDT=y
CONFIG_SBC_EPX_C3_WATCHDOG=y

#
# PCI-based Watchdog Cards
#
CONFIG_PCIPCWATCHDOG=m
# CONFIG_WDTPCI is not set

#
# USB-based Watchdog Cards
#
# CONFIG_USBPCWATCHDOG is not set
CONFIG_SSB_POSSIBLE=y

#
# Sonics Silicon Backplane
#
# CONFIG_SSB is not set

#
# Multifunction device drivers
#
CONFIG_MFD_CORE=y
CONFIG_MFD_SM501=m
CONFIG_MFD_SM501_GPIO=y
# CONFIG_HTC_PASIC3 is not set
CONFIG_UCB1400_CORE=y
CONFIG_TPS65010=m
# CONFIG_MFD_TMIO is not set
# CONFIG_MFD_WM8400 is not set
# CONFIG_MFD_PCF50633 is not set
# CONFIG_MFD_MC13783 is not set
# CONFIG_AB3100_CORE is not set
# CONFIG_EZX_PCAP is not set
CONFIG_AB4500_CORE=m
CONFIG_MFD_TIMBERDALE=y
# CONFIG_REGULATOR is not set
CONFIG_MEDIA_SUPPORT=m

#
# Multimedia core support
#
CONFIG_VIDEO_DEV=m
CONFIG_VIDEO_V4L2_COMMON=m
CONFIG_VIDEO_ALLOW_V4L1=y
CONFIG_VIDEO_V4L1_COMPAT=y
CONFIG_DVB_CORE=m
CONFIG_VIDEO_MEDIA=m

#
# Multimedia drivers
#
CONFIG_VIDEO_SAA7146=m
CONFIG_VIDEO_SAA7146_VV=m
CONFIG_IR_CORE=m
CONFIG_VIDEO_IR=m
CONFIG_MEDIA_ATTACH=y
CONFIG_MEDIA_TUNER=m
# CONFIG_MEDIA_TUNER_CUSTOMISE is not set
CONFIG_MEDIA_TUNER_SIMPLE=m
CONFIG_MEDIA_TUNER_TDA8290=m
CONFIG_MEDIA_TUNER_TDA18271=m
CONFIG_MEDIA_TUNER_TDA9887=m
CONFIG_MEDIA_TUNER_TEA5761=m
CONFIG_MEDIA_TUNER_TEA5767=m
CONFIG_MEDIA_TUNER_MT20XX=m
CONFIG_MEDIA_TUNER_XC2028=m
CONFIG_MEDIA_TUNER_XC5000=m
CONFIG_MEDIA_TUNER_MC44S803=m
CONFIG_VIDEO_V4L2=m
CONFIG_VIDEO_V4L1=m
CONFIG_VIDEOBUF_GEN=m
CONFIG_VIDEOBUF_DMA_SG=m
CONFIG_VIDEOBUF_DVB=m
CONFIG_VIDEO_BTCX=m
CONFIG_VIDEO_TVEEPROM=m
CONFIG_VIDEO_TUNER=m
CONFIG_VIDEO_CAPTURE_DRIVERS=y
CONFIG_VIDEO_ADV_DEBUG=y
# CONFIG_VIDEO_FIXED_MINOR_RANGES is not set
CONFIG_VIDEO_HELPER_CHIPS_AUTO=y
CONFIG_VIDEO_IR_I2C=m
CONFIG_VIDEO_TVAUDIO=m
CONFIG_VIDEO_TDA7432=m
CONFIG_VIDEO_TDA9840=m
CONFIG_VIDEO_TEA6415C=m
CONFIG_VIDEO_TEA6420=m
CONFIG_VIDEO_MSP3400=m
CONFIG_VIDEO_CS53L32A=m
CONFIG_VIDEO_M52790=m
CONFIG_VIDEO_WM8775=m
CONFIG_VIDEO_WM8739=m
CONFIG_VIDEO_VP27SMPX=m
CONFIG_VIDEO_SAA6588=m
CONFIG_VIDEO_BT819=m
CONFIG_VIDEO_BT856=m
CONFIG_VIDEO_BT866=m
CONFIG_VIDEO_KS0127=m
CONFIG_VIDEO_OV7670=m
CONFIG_VIDEO_SAA7110=m
CONFIG_VIDEO_SAA711X=m
CONFIG_VIDEO_SAA717X=m
CONFIG_VIDEO_VPX3220=m
CONFIG_VIDEO_CX25840=m
CONFIG_VIDEO_CX2341X=m
CONFIG_VIDEO_SAA7127=m
CONFIG_VIDEO_ADV7175=m
CONFIG_VIDEO_UPD64031A=m
CONFIG_VIDEO_UPD64083=m
# CONFIG_VIDEO_VIVI is not set
CONFIG_VIDEO_BT848=m
CONFIG_VIDEO_BT848_DVB=y
CONFIG_VIDEO_CPIA=m
# CONFIG_VIDEO_CPIA_USB is not set
CONFIG_VIDEO_CPIA2=m
CONFIG_VIDEO_SAA5246A=m
CONFIG_VIDEO_SAA5249=m
CONFIG_VIDEO_STRADIS=m
CONFIG_VIDEO_ZORAN=m
CONFIG_VIDEO_ZORAN_DC30=m
CONFIG_VIDEO_ZORAN_ZR36060=m
# CONFIG_VIDEO_ZORAN_BUZ is not set
CONFIG_VIDEO_ZORAN_DC10=m
CONFIG_VIDEO_ZORAN_LML33=m
# CONFIG_VIDEO_ZORAN_LML33R10 is not set
CONFIG_VIDEO_ZORAN_AVS6EYES=m
CONFIG_VIDEO_SAA7134=m
CONFIG_VIDEO_SAA7134_ALSA=m
# CONFIG_VIDEO_SAA7134_DVB is not set
CONFIG_VIDEO_MXB=m
CONFIG_VIDEO_HEXIUM_ORION=m
# CONFIG_VIDEO_HEXIUM_GEMINI is not set
# CONFIG_VIDEO_CX23885 is not set
CONFIG_VIDEO_IVTV=m
CONFIG_VIDEO_FB_IVTV=m
# CONFIG_VIDEO_CX18 is not set
CONFIG_VIDEO_SAA7164=m
CONFIG_VIDEO_CAFE_CCIC=m
CONFIG_SOC_CAMERA=m
CONFIG_SOC_CAMERA_MT9M001=m
CONFIG_SOC_CAMERA_MT9M111=m
CONFIG_SOC_CAMERA_MT9T031=m
CONFIG_SOC_CAMERA_MT9T112=m
# CONFIG_SOC_CAMERA_MT9V022 is not set
CONFIG_SOC_CAMERA_RJ54N1=m
# CONFIG_SOC_CAMERA_TW9910 is not set
CONFIG_SOC_CAMERA_PLATFORM=m
CONFIG_SOC_CAMERA_OV772X=m
# CONFIG_SOC_CAMERA_OV9640 is not set
# CONFIG_V4L_USB_DRIVERS is not set
CONFIG_RADIO_ADAPTERS=y
# CONFIG_RADIO_GEMTEK_PCI is not set
CONFIG_RADIO_MAXIRADIO=m
# CONFIG_RADIO_MAESTRO is not set
CONFIG_I2C_SI4713=m
CONFIG_RADIO_SI4713=m
# CONFIG_USB_DSBR is not set
# CONFIG_RADIO_SI470X is not set
CONFIG_USB_MR800=m
# CONFIG_RADIO_TEA5764 is not set
CONFIG_RADIO_SAA7706H=m
CONFIG_RADIO_TEF6862=m
CONFIG_RADIO_TIMBERDALE=m
CONFIG_DVB_MAX_ADAPTERS=8
CONFIG_DVB_DYNAMIC_MINORS=y
# CONFIG_DVB_CAPTURE_DRIVERS is not set
CONFIG_DVB_BT8XX=m
CONFIG_DVB_TDA10048=m
CONFIG_DVB_S5H1411=m
CONFIG_DAB=y
CONFIG_USB_DABUSB=m

#
# Graphics support
#
# CONFIG_AGP is not set
CONFIG_VGA_ARB=y
CONFIG_VGA_ARB_MAX_GPUS=16
CONFIG_DRM=m
CONFIG_DRM_KMS_HELPER=m
CONFIG_DRM_TTM=m
CONFIG_DRM_TDFX=m
CONFIG_DRM_R128=m
CONFIG_DRM_RADEON=m
# CONFIG_DRM_MGA is not set
# CONFIG_DRM_VIA is not set
CONFIG_DRM_SAVAGE=m
CONFIG_VGASTATE=m
CONFIG_VIDEO_OUTPUT_CONTROL=m
CONFIG_FB=m
CONFIG_FIRMWARE_EDID=y
CONFIG_FB_DDC=m
# CONFIG_FB_BOOT_VESA_SUPPORT is not set
CONFIG_FB_CFB_FILLRECT=m
CONFIG_FB_CFB_COPYAREA=m
CONFIG_FB_CFB_IMAGEBLIT=m
# CONFIG_FB_CFB_REV_PIXELS_IN_BYTE is not set
CONFIG_FB_SYS_FILLRECT=m
CONFIG_FB_SYS_COPYAREA=m
CONFIG_FB_SYS_IMAGEBLIT=m
# CONFIG_FB_FOREIGN_ENDIAN is not set
CONFIG_FB_SYS_FOPS=m
CONFIG_FB_DEFERRED_IO=y
CONFIG_FB_HECUBA=m
# CONFIG_FB_SVGALIB is not set
# CONFIG_FB_MACMODES is not set
CONFIG_FB_BACKLIGHT=y
CONFIG_FB_MODE_HELPERS=y
CONFIG_FB_TILEBLITTING=y

#
# Frame buffer hardware drivers
#
CONFIG_FB_PM2=m
CONFIG_FB_PM2_FIFO_DISCONNECT=y
# CONFIG_FB_CYBER2000 is not set
# CONFIG_FB_ARC is not set
CONFIG_FB_UVESA=m
CONFIG_FB_N411=m
CONFIG_FB_HGA=m
CONFIG_FB_HGA_ACCEL=y
# CONFIG_FB_S1D13XXX is not set
CONFIG_FB_NVIDIA=m
CONFIG_FB_NVIDIA_I2C=y
CONFIG_FB_NVIDIA_DEBUG=y
CONFIG_FB_NVIDIA_BACKLIGHT=y
# CONFIG_FB_RIVA is not set
CONFIG_FB_LE80578=m
CONFIG_FB_CARILLO_RANCH=m
# CONFIG_FB_MATROX is not set
CONFIG_FB_ATY128=m
# CONFIG_FB_ATY128_BACKLIGHT is not set
# CONFIG_FB_ATY is not set
# CONFIG_FB_S3 is not set
CONFIG_FB_SAVAGE=m
# CONFIG_FB_SAVAGE_I2C is not set
# CONFIG_FB_SAVAGE_ACCEL is not set
CONFIG_FB_SIS=m
# CONFIG_FB_SIS_300 is not set
CONFIG_FB_SIS_315=y
CONFIG_FB_VIA=m
CONFIG_FB_NEOMAGIC=m
# CONFIG_FB_KYRO is not set
# CONFIG_FB_3DFX is not set
# CONFIG_FB_VOODOO1 is not set
# CONFIG_FB_VT8623 is not set
# CONFIG_FB_TRIDENT is not set
# CONFIG_FB_ARK is not set
CONFIG_FB_PM3=m
CONFIG_FB_CARMINE=m
# CONFIG_FB_CARMINE_DRAM_EVAL is not set
CONFIG_CARMINE_DRAM_CUSTOM=y
# CONFIG_FB_GEODE is not set
CONFIG_FB_TMIO=m
CONFIG_FB_TMIO_ACCELL=y
# CONFIG_FB_SM501 is not set
CONFIG_FB_METRONOME=m
CONFIG_FB_MB862XX=m
CONFIG_FB_MB862XX_PCI_GDC=y
CONFIG_FB_BROADSHEET=m
CONFIG_BACKLIGHT_LCD_SUPPORT=y
# CONFIG_LCD_CLASS_DEVICE is not set
CONFIG_BACKLIGHT_CLASS_DEVICE=y
CONFIG_BACKLIGHT_GENERIC=m
# CONFIG_BACKLIGHT_PROGEAR is not set
# CONFIG_BACKLIGHT_MBP_NVIDIA is not set
CONFIG_BACKLIGHT_SAHARA=y

#
# Display device support
#
CONFIG_DISPLAY_SUPPORT=y

#
# Display hardware drivers
#

#
# Console display driver support
#
CONFIG_VGA_CONSOLE=y
# CONFIG_VGACON_SOFT_SCROLLBACK is not set
CONFIG_DUMMY_CONSOLE=y
CONFIG_LOGO=y
CONFIG_LOGO_LINUX_MONO=y
CONFIG_LOGO_LINUX_VGA16=y
CONFIG_LOGO_LINUX_CLUT224=y
CONFIG_SOUND=y
CONFIG_SOUND_OSS_CORE=y
CONFIG_SOUND_OSS_CORE_PRECLAIM=y
CONFIG_SND=y
CONFIG_SND_TIMER=y
CONFIG_SND_PCM=y
CONFIG_SND_HWDEP=y
CONFIG_SND_RAWMIDI=y
CONFIG_SND_JACK=y
CONFIG_SND_SEQUENCER=m
CONFIG_SND_SEQ_DUMMY=m
CONFIG_SND_OSSEMUL=y
CONFIG_SND_MIXER_OSS=y
CONFIG_SND_PCM_OSS=y
CONFIG_SND_PCM_OSS_PLUGINS=y
# CONFIG_SND_SEQUENCER_OSS is not set
# CONFIG_SND_HRTIMER is not set
CONFIG_SND_DYNAMIC_MINORS=y
CONFIG_SND_SUPPORT_OLD_API=y
# CONFIG_SND_VERBOSE_PROCFS is not set
CONFIG_SND_VERBOSE_PRINTK=y
CONFIG_SND_DEBUG=y
CONFIG_SND_DEBUG_VERBOSE=y
CONFIG_SND_VMASTER=y
CONFIG_SND_DMA_SGBUF=y
CONFIG_SND_RAWMIDI_SEQ=m
CONFIG_SND_OPL3_LIB_SEQ=m
# CONFIG_SND_OPL4_LIB_SEQ is not set
# CONFIG_SND_SBAWE_SEQ is not set
CONFIG_SND_EMU10K1_SEQ=m
CONFIG_SND_MPU401_UART=y
CONFIG_SND_OPL3_LIB=y
CONFIG_SND_VX_LIB=y
CONFIG_SND_AC97_CODEC=y
CONFIG_SND_DRIVERS=y
CONFIG_SND_PCSP=m
CONFIG_SND_DUMMY=y
CONFIG_SND_VIRMIDI=m
CONFIG_SND_MTS64=y
# CONFIG_SND_SERIAL_U16550 is not set
CONFIG_SND_MPU401=m
# CONFIG_SND_PORTMAN2X4 is not set
# CONFIG_SND_AC97_POWER_SAVE is not set
CONFIG_SND_PCI=y
CONFIG_SND_AD1889=y
CONFIG_SND_ALS300=m
# CONFIG_SND_ALS4000 is not set
CONFIG_SND_ALI5451=y
CONFIG_SND_ATIIXP=m
# CONFIG_SND_ATIIXP_MODEM is not set
# CONFIG_SND_AU8810 is not set
CONFIG_SND_AU8820=y
# CONFIG_SND_AU8830 is not set
CONFIG_SND_AW2=y
CONFIG_SND_AZT3328=m
CONFIG_SND_BT87X=y
# CONFIG_SND_BT87X_OVERCLOCK is not set
# CONFIG_SND_CA0106 is not set
CONFIG_SND_CMIPCI=y
CONFIG_SND_OXYGEN_LIB=y
CONFIG_SND_OXYGEN=y
# CONFIG_SND_CS4281 is not set
# CONFIG_SND_CS46XX is not set
# CONFIG_SND_CS5530 is not set
CONFIG_SND_CS5535AUDIO=m
# CONFIG_SND_CTXFI is not set
CONFIG_SND_DARLA20=y
# CONFIG_SND_GINA20 is not set
# CONFIG_SND_LAYLA20 is not set
# CONFIG_SND_DARLA24 is not set
CONFIG_SND_GINA24=y
CONFIG_SND_LAYLA24=m
CONFIG_SND_MONA=m
CONFIG_SND_MIA=y
CONFIG_SND_ECHO3G=y
CONFIG_SND_INDIGO=m
# CONFIG_SND_INDIGOIO is not set
# CONFIG_SND_INDIGODJ is not set
CONFIG_SND_INDIGOIOX=y
CONFIG_SND_INDIGODJX=y
CONFIG_SND_EMU10K1=y
# CONFIG_SND_EMU10K1X is not set
CONFIG_SND_ENS1370=y
CONFIG_SND_ENS1371=y
CONFIG_SND_ES1938=m
CONFIG_SND_ES1968=m
# CONFIG_SND_FM801 is not set
CONFIG_SND_HDA_INTEL=y
CONFIG_SND_HDA_HWDEP=y
CONFIG_SND_HDA_RECONFIG=y
# CONFIG_SND_HDA_INPUT_BEEP is not set
# CONFIG_SND_HDA_INPUT_JACK is not set
# CONFIG_SND_HDA_PATCH_LOADER is not set
# CONFIG_SND_HDA_CODEC_REALTEK is not set
CONFIG_SND_HDA_CODEC_ANALOG=y
CONFIG_SND_HDA_CODEC_SIGMATEL=y
CONFIG_SND_HDA_CODEC_VIA=y
CONFIG_SND_HDA_CODEC_ATIHDMI=y
CONFIG_SND_HDA_CODEC_NVHDMI=y
# CONFIG_SND_HDA_CODEC_INTELHDMI is not set
CONFIG_SND_HDA_CODEC_CIRRUS=y
CONFIG_SND_HDA_CODEC_CONEXANT=y
# CONFIG_SND_HDA_CODEC_CA0110 is not set
CONFIG_SND_HDA_CODEC_CMEDIA=y
# CONFIG_SND_HDA_CODEC_SI3054 is not set
CONFIG_SND_HDA_GENERIC=y
CONFIG_SND_HDA_POWER_SAVE=y
CONFIG_SND_HDA_POWER_SAVE_DEFAULT=0
CONFIG_SND_HDSP=y

#
# Don't forget to add built-in firmwares for HDSP driver
#
# CONFIG_SND_HDSPM is not set
CONFIG_SND_HIFIER=m
CONFIG_SND_ICE1712=y
CONFIG_SND_ICE1724=y
CONFIG_SND_INTEL8X0=y
CONFIG_SND_INTEL8X0M=m
# CONFIG_SND_KORG1212 is not set
CONFIG_SND_LX6464ES=m
CONFIG_SND_MAESTRO3=m
CONFIG_SND_MIXART=y
CONFIG_SND_NM256=m
CONFIG_SND_PCXHR=m
CONFIG_SND_RIPTIDE=m
CONFIG_SND_RME32=m
CONFIG_SND_RME96=m
CONFIG_SND_RME9652=m
# CONFIG_SND_SONICVIBES is not set
CONFIG_SND_TRIDENT=y
# CONFIG_SND_VIA82XX is not set
CONFIG_SND_VIA82XX_MODEM=y
CONFIG_SND_VIRTUOSO=y
CONFIG_SND_VX222=y
CONFIG_SND_YMFPCI=m
# CONFIG_SND_SPI is not set
CONFIG_SND_USB=y
CONFIG_SND_USB_AUDIO=m
CONFIG_SND_USB_USX2Y=y
# CONFIG_SND_USB_CAIAQ is not set
# CONFIG_SND_USB_US122L is not set
CONFIG_SND_SOC=y
CONFIG_SND_SOC_I2C_AND_SPI=m
# CONFIG_SND_SOC_ALL_CODECS is not set
CONFIG_SOUND_PRIME=y
CONFIG_SOUND_OSS=y
# CONFIG_SOUND_TRACEINIT is not set
CONFIG_SOUND_DMAP=y
CONFIG_SOUND_VMIDI=m
CONFIG_SOUND_TRIX=y
CONFIG_SOUND_MSS=m
CONFIG_SOUND_MPU401=m
CONFIG_SOUND_PAS=m
# CONFIG_SOUND_PSS is not set
CONFIG_SOUND_SB=m
CONFIG_SOUND_YM3812=y
# CONFIG_SOUND_UART6850 is not set
CONFIG_SOUND_AEDSP16=m
CONFIG_SC6600=y
# CONFIG_SC6600_JOY is not set
CONFIG_SC6600_CDROM=4
CONFIG_SC6600_CDROMBASE=0
CONFIG_SOUND_KAHLUA=m
CONFIG_AC97_BUS=y
# CONFIG_HID_SUPPORT is not set
CONFIG_HID=m
CONFIG_USB_MOUSE=y
CONFIG_USB_SUPPORT=y
CONFIG_USB_ARCH_HAS_HCD=y
CONFIG_USB_ARCH_HAS_OHCI=y
CONFIG_USB_ARCH_HAS_EHCI=y
CONFIG_USB=y
CONFIG_USB_DEBUG=y
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y

#
# Miscellaneous USB options
#
CONFIG_USB_DEVICEFS=y
CONFIG_USB_DEVICE_CLASS=y
CONFIG_USB_DYNAMIC_MINORS=y
# CONFIG_USB_OTG is not set
# CONFIG_USB_OTG_WHITELIST is not set
# CONFIG_USB_OTG_BLACKLIST_HUB is not set
CONFIG_USB_MON=y
CONFIG_USB_WUSB=y
# CONFIG_USB_WUSB_CBAF is not set

#
# USB Host Controller Drivers
#
# CONFIG_USB_C67X00_HCD is not set
CONFIG_USB_XHCI_HCD=y
CONFIG_USB_XHCI_HCD_DEBUGGING=y
CONFIG_USB_EHCI_HCD=y
# CONFIG_USB_EHCI_ROOT_HUB_TT is not set
# CONFIG_USB_EHCI_TT_NEWSCHED is not set
# CONFIG_USB_OXU210HP_HCD is not set
# CONFIG_USB_ISP116X_HCD is not set
CONFIG_USB_ISP1760_HCD=y
CONFIG_USB_ISP1362_HCD=m
CONFIG_USB_OHCI_HCD=y
# CONFIG_USB_OHCI_BIG_ENDIAN_DESC is not set
# CONFIG_USB_OHCI_BIG_ENDIAN_MMIO is not set
CONFIG_USB_OHCI_LITTLE_ENDIAN=y
CONFIG_USB_UHCI_HCD=y
# CONFIG_USB_U132_HCD is not set
CONFIG_USB_SL811_HCD=y
CONFIG_USB_R8A66597_HCD=m
CONFIG_USB_HWA_HCD=y

#
# USB Device Class drivers
#
CONFIG_USB_ACM=y
# CONFIG_USB_PRINTER is not set
CONFIG_USB_WDM=m
CONFIG_USB_TMC=y

#
# NOTE: USB_STORAGE depends on SCSI but BLK_DEV_SD may
#

#
# also be needed; see USB_STORAGE Help for more info
#
CONFIG_USB_STORAGE=m
CONFIG_USB_STORAGE_DEBUG=y
CONFIG_USB_STORAGE_DATAFAB=m
CONFIG_USB_STORAGE_FREECOM=m
# CONFIG_USB_STORAGE_ISD200 is not set
CONFIG_USB_STORAGE_USBAT=m
CONFIG_USB_STORAGE_SDDR09=m
CONFIG_USB_STORAGE_SDDR55=m
CONFIG_USB_STORAGE_JUMPSHOT=m
# CONFIG_USB_STORAGE_ALAUDA is not set
CONFIG_USB_STORAGE_ONETOUCH=m
CONFIG_USB_STORAGE_KARMA=m
CONFIG_USB_STORAGE_CYPRESS_ATACB=m
# CONFIG_USB_LIBUSUAL is not set

#
# USB Imaging devices
#
CONFIG_USB_MDC800=m
# CONFIG_USB_MICROTEK is not set

#
# USB port drivers
#
CONFIG_USB_USS720=y
# CONFIG_USB_SERIAL is not set

#
# USB Miscellaneous drivers
#
CONFIG_USB_EMI62=y
CONFIG_USB_EMI26=m
CONFIG_USB_ADUTUX=y
# CONFIG_USB_SEVSEG is not set
CONFIG_USB_RIO500=m
# CONFIG_USB_LEGOTOWER is not set
CONFIG_USB_LCD=y
# CONFIG_USB_BERRY_CHARGE is not set
CONFIG_USB_LED=y
CONFIG_USB_CYPRESS_CY7C63=y
CONFIG_USB_CYTHERM=m
CONFIG_USB_IDMOUSE=m
CONFIG_USB_FTDI_ELAN=y
CONFIG_USB_APPLEDISPLAY=y
CONFIG_USB_SISUSBVGA=y
# CONFIG_USB_SISUSBVGA_CON is not set
CONFIG_USB_LD=m
CONFIG_USB_TRANCEVIBRATOR=m
CONFIG_USB_IOWARRIOR=y
CONFIG_USB_TEST=y
CONFIG_USB_ISIGHTFW=y
CONFIG_USB_VST=m

#
# OTG and related infrastructure
#
CONFIG_USB_OTG_UTILS=y
# CONFIG_USB_GPIO_VBUS is not set
CONFIG_NOP_USB_XCEIV=m
CONFIG_UWB=y
CONFIG_UWB_HWA=y
# CONFIG_UWB_WHCI is not set
CONFIG_UWB_WLP=m
CONFIG_UWB_I1480U=y
CONFIG_UWB_I1480U_WLP=m
# CONFIG_MMC is not set
# CONFIG_MEMSTICK is not set
CONFIG_NEW_LEDS=y
CONFIG_LEDS_CLASS=y

#
# LED drivers
#
CONFIG_LEDS_ALIX2=m
CONFIG_LEDS_PCA9532=m
CONFIG_LEDS_GPIO=y
CONFIG_LEDS_GPIO_PLATFORM=y
CONFIG_LEDS_LP3944=m
CONFIG_LEDS_CLEVO_MAIL=y
CONFIG_LEDS_PCA955X=m
CONFIG_LEDS_DAC124S085=m
CONFIG_LEDS_BD2802=m
CONFIG_LEDS_LT3593=y

#
# LED Triggers
#
CONFIG_LEDS_TRIGGERS=y
CONFIG_LEDS_TRIGGER_TIMER=y
CONFIG_LEDS_TRIGGER_HEARTBEAT=y
CONFIG_LEDS_TRIGGER_BACKLIGHT=m
# CONFIG_LEDS_TRIGGER_GPIO is not set
CONFIG_LEDS_TRIGGER_DEFAULT_ON=m

#
# iptables trigger is under Netfilter config (LED target)
#
CONFIG_ACCESSIBILITY=y
# CONFIG_A11Y_BRAILLE_CONSOLE is not set
CONFIG_INFINIBAND=m
CONFIG_INFINIBAND_USER_MAD=m
CONFIG_INFINIBAND_USER_ACCESS=m
CONFIG_INFINIBAND_USER_MEM=y
CONFIG_INFINIBAND_ADDR_TRANS=y
CONFIG_INFINIBAND_MTHCA=m
# CONFIG_INFINIBAND_MTHCA_DEBUG is not set
CONFIG_INFINIBAND_IPATH=m
CONFIG_INFINIBAND_AMSO1100=m
# CONFIG_INFINIBAND_AMSO1100_DEBUG is not set
CONFIG_MLX4_INFINIBAND=m
# CONFIG_INFINIBAND_NES is not set
CONFIG_INFINIBAND_IPOIB=m
CONFIG_INFINIBAND_IPOIB_CM=y
# CONFIG_INFINIBAND_IPOIB_DEBUG is not set
# CONFIG_INFINIBAND_SRP is not set
# CONFIG_INFINIBAND_ISER is not set
CONFIG_EDAC=y

#
# Reporting subsystems
#
# CONFIG_EDAC_DEBUG is not set
CONFIG_EDAC_MM_EDAC=y
CONFIG_EDAC_E752X=y
CONFIG_EDAC_I82975X=y
CONFIG_EDAC_I3000=y
CONFIG_EDAC_I3200=y
# CONFIG_EDAC_X38 is not set
CONFIG_EDAC_I5400=y
CONFIG_EDAC_I5000=m
# CONFIG_EDAC_I5100 is not set
CONFIG_RTC_LIB=y
CONFIG_RTC_CLASS=y
CONFIG_RTC_HCTOSYS=y
CONFIG_RTC_HCTOSYS_DEVICE="rtc0"
CONFIG_RTC_DEBUG=y

#
# RTC interfaces
#
CONFIG_RTC_INTF_SYSFS=y
# CONFIG_RTC_INTF_PROC is not set
CONFIG_RTC_INTF_DEV=y
CONFIG_RTC_INTF_DEV_UIE_EMUL=y
# CONFIG_RTC_DRV_TEST is not set

#
# I2C RTC drivers
#
CONFIG_RTC_DRV_DS1307=m
CONFIG_RTC_DRV_DS1374=m
CONFIG_RTC_DRV_DS1672=m
# CONFIG_RTC_DRV_MAX6900 is not set
CONFIG_RTC_DRV_RS5C372=m
# CONFIG_RTC_DRV_ISL1208 is not set
CONFIG_RTC_DRV_X1205=m
# CONFIG_RTC_DRV_PCF8563 is not set
CONFIG_RTC_DRV_PCF8583=m
# CONFIG_RTC_DRV_M41T80 is not set
CONFIG_RTC_DRV_BQ32K=m
# CONFIG_RTC_DRV_S35390A is not set
CONFIG_RTC_DRV_FM3130=m
# CONFIG_RTC_DRV_RX8581 is not set
# CONFIG_RTC_DRV_RX8025 is not set

#
# SPI RTC drivers
#
CONFIG_RTC_DRV_M41T94=y
# CONFIG_RTC_DRV_DS1305 is not set
CONFIG_RTC_DRV_DS1390=m
CONFIG_RTC_DRV_MAX6902=m
# CONFIG_RTC_DRV_R9701 is not set
CONFIG_RTC_DRV_RS5C348=y
CONFIG_RTC_DRV_DS3234=m
CONFIG_RTC_DRV_PCF2123=y

#
# Platform RTC drivers
#
# CONFIG_RTC_DRV_CMOS is not set
CONFIG_RTC_DRV_DS1286=m
CONFIG_RTC_DRV_DS1511=y
CONFIG_RTC_DRV_DS1553=m
CONFIG_RTC_DRV_DS1742=y
CONFIG_RTC_DRV_STK17TA8=y
CONFIG_RTC_DRV_M48T86=y
CONFIG_RTC_DRV_M48T35=y
# CONFIG_RTC_DRV_M48T59 is not set
CONFIG_RTC_DRV_MSM6242=m
# CONFIG_RTC_DRV_BQ4802 is not set
CONFIG_RTC_DRV_RP5C01=y
CONFIG_RTC_DRV_V3020=y

#
# on-CPU RTC drivers
#
# CONFIG_CS5535_CLOCK_EVENT_SRC is not set
CONFIG_DMADEVICES=y

#
# DMA Devices
#
# CONFIG_INTEL_IOATDMA is not set
# CONFIG_AUXDISPLAY is not set
CONFIG_UIO=y
CONFIG_UIO_CIF=m
CONFIG_UIO_PDRV=m
CONFIG_UIO_PDRV_GENIRQ=y
# CONFIG_UIO_SMX is not set
CONFIG_UIO_AEC=m
CONFIG_UIO_SERCOS3=m
# CONFIG_UIO_PCI_GENERIC is not set

#
# TI VLYNQ
#
CONFIG_X86_PLATFORM_DEVICES=y
CONFIG_DELL_LAPTOP=m

#
# Firmware Drivers
#
CONFIG_EDD=y
CONFIG_EDD_OFF=y
CONFIG_FIRMWARE_MEMMAP=y
# CONFIG_DELL_RBU is not set
CONFIG_DCDBAS=y
CONFIG_DMIID=y
# CONFIG_ISCSI_IBFT_FIND is not set

#
# File systems
#
# CONFIG_EXT2_FS is not set
CONFIG_EXT3_FS=y
CONFIG_EXT3_DEFAULTS_TO_ORDERED=y
CONFIG_EXT3_FS_XATTR=y
CONFIG_EXT3_FS_POSIX_ACL=y
CONFIG_EXT3_FS_SECURITY=y
CONFIG_EXT4_FS=m
CONFIG_EXT4_USE_FOR_EXT23=y
CONFIG_EXT4_FS_XATTR=y
# CONFIG_EXT4_FS_POSIX_ACL is not set
CONFIG_EXT4_FS_SECURITY=y
CONFIG_EXT4_DEBUG=y
CONFIG_JBD=y
CONFIG_JBD_DEBUG=y
CONFIG_JBD2=m
CONFIG_JBD2_DEBUG=y
CONFIG_FS_MBCACHE=y
# CONFIG_REISERFS_FS is not set
CONFIG_JFS_FS=m
CONFIG_JFS_POSIX_ACL=y
CONFIG_JFS_SECURITY=y
# CONFIG_JFS_DEBUG is not set
CONFIG_JFS_STATISTICS=y
CONFIG_FS_POSIX_ACL=y
CONFIG_XFS_FS=m
CONFIG_XFS_QUOTA=y
# CONFIG_XFS_POSIX_ACL is not set
CONFIG_XFS_RT=y
CONFIG_XFS_DEBUG=y
CONFIG_GFS2_FS=m
# CONFIG_GFS2_FS_LOCKING_DLM is not set
CONFIG_OCFS2_FS=m
# CONFIG_OCFS2_FS_O2CB is not set
CONFIG_OCFS2_FS_USERSPACE_CLUSTER=m
CONFIG_OCFS2_FS_STATS=y
# CONFIG_OCFS2_DEBUG_MASKLOG is not set
# CONFIG_OCFS2_DEBUG_FS is not set
# CONFIG_BTRFS_FS is not set
CONFIG_NILFS2_FS=m
CONFIG_FILE_LOCKING=y
CONFIG_FSNOTIFY=y
# CONFIG_DNOTIFY is not set
CONFIG_INOTIFY=y
CONFIG_INOTIFY_USER=y
CONFIG_QUOTA=y
CONFIG_QUOTA_NETLINK_INTERFACE=y
CONFIG_PRINT_QUOTA_WARNING=y
CONFIG_QUOTA_TREE=m
CONFIG_QFMT_V1=y
CONFIG_QFMT_V2=m
CONFIG_QUOTACTL=y
CONFIG_AUTOFS_FS=m
# CONFIG_AUTOFS4_FS is not set
CONFIG_FUSE_FS=m
CONFIG_CUSE=m

#
# Caches
#
# CONFIG_FSCACHE is not set

#
# CD-ROM/DVD Filesystems
#
CONFIG_ISO9660_FS=y
CONFIG_JOLIET=y
# CONFIG_ZISOFS is not set
CONFIG_UDF_FS=m
CONFIG_UDF_NLS=y

#
# DOS/FAT/NT Filesystems
#
CONFIG_FAT_FS=y
# CONFIG_MSDOS_FS is not set
CONFIG_VFAT_FS=y
CONFIG_FAT_DEFAULT_CODEPAGE=437
CONFIG_FAT_DEFAULT_IOCHARSET="iso8859-1"
CONFIG_NTFS_FS=y
# CONFIG_NTFS_DEBUG is not set
CONFIG_NTFS_RW=y

#
# Pseudo filesystems
#
CONFIG_PROC_FS=y
CONFIG_PROC_KCORE=y
CONFIG_PROC_VMCORE=y
CONFIG_PROC_SYSCTL=y
CONFIG_PROC_PAGE_MONITOR=y
CONFIG_SYSFS=y
CONFIG_TMPFS=y
# CONFIG_TMPFS_POSIX_ACL is not set
# CONFIG_HUGETLBFS is not set
# CONFIG_HUGETLB_PAGE is not set
CONFIG_CONFIGFS_FS=y
# CONFIG_MISC_FILESYSTEMS is not set
CONFIG_NETWORK_FILESYSTEMS=y
CONFIG_NFS_FS=m
# CONFIG_NFS_V3 is not set
# CONFIG_NFS_V4 is not set
# CONFIG_NFSD is not set
CONFIG_LOCKD=m
CONFIG_EXPORTFS=m
CONFIG_NFS_COMMON=y
CONFIG_SUNRPC=m
CONFIG_SUNRPC_GSS=m
CONFIG_SUNRPC_XPRT_RDMA=m
CONFIG_RPCSEC_GSS_KRB5=m
CONFIG_RPCSEC_GSS_SPKM3=m
CONFIG_SMB_FS=y
CONFIG_SMB_NLS_DEFAULT=y
CONFIG_SMB_NLS_REMOTE="cp437"
CONFIG_CIFS=m
# CONFIG_CIFS_STATS is not set
# CONFIG_CIFS_WEAK_PW_HASH is not set
CONFIG_CIFS_UPCALL=y
# CONFIG_CIFS_XATTR is not set
# CONFIG_CIFS_DEBUG2 is not set
CONFIG_CIFS_DFS_UPCALL=y
CONFIG_CIFS_EXPERIMENTAL=y
CONFIG_NCP_FS=m
# CONFIG_NCPFS_PACKET_SIGNING is not set
# CONFIG_NCPFS_IOCTL_LOCKING is not set
CONFIG_NCPFS_STRONG=y
CONFIG_NCPFS_NFS_NS=y
# CONFIG_NCPFS_OS2_NS is not set
CONFIG_NCPFS_SMALLDOS=y
CONFIG_NCPFS_NLS=y
CONFIG_NCPFS_EXTRAS=y
CONFIG_CODA_FS=m
CONFIG_AFS_FS=y
CONFIG_AFS_DEBUG=y

#
# Partition Types
#
CONFIG_PARTITION_ADVANCED=y
# CONFIG_ACORN_PARTITION is not set
# CONFIG_OSF_PARTITION is not set
CONFIG_AMIGA_PARTITION=y
CONFIG_ATARI_PARTITION=y
CONFIG_MAC_PARTITION=y
CONFIG_MSDOS_PARTITION=y
CONFIG_BSD_DISKLABEL=y
CONFIG_MINIX_SUBPARTITION=y
CONFIG_SOLARIS_X86_PARTITION=y
CONFIG_UNIXWARE_DISKLABEL=y
CONFIG_LDM_PARTITION=y
CONFIG_LDM_DEBUG=y
CONFIG_SGI_PARTITION=y
# CONFIG_ULTRIX_PARTITION is not set
CONFIG_SUN_PARTITION=y
CONFIG_KARMA_PARTITION=y
# CONFIG_EFI_PARTITION is not set
CONFIG_SYSV68_PARTITION=y
CONFIG_NLS=y
CONFIG_NLS_DEFAULT="iso8859-1"
# CONFIG_NLS_CODEPAGE_437 is not set
CONFIG_NLS_CODEPAGE_737=y
# CONFIG_NLS_CODEPAGE_775 is not set
CONFIG_NLS_CODEPAGE_850=m
CONFIG_NLS_CODEPAGE_852=m
# CONFIG_NLS_CODEPAGE_855 is not set
CONFIG_NLS_CODEPAGE_857=y
# CONFIG_NLS_CODEPAGE_860 is not set
CONFIG_NLS_CODEPAGE_861=m
CONFIG_NLS_CODEPAGE_862=m
# CONFIG_NLS_CODEPAGE_863 is not set
# CONFIG_NLS_CODEPAGE_864 is not set
# CONFIG_NLS_CODEPAGE_865 is not set
CONFIG_NLS_CODEPAGE_866=y
CONFIG_NLS_CODEPAGE_869=m
CONFIG_NLS_CODEPAGE_936=y
CONFIG_NLS_CODEPAGE_950=y
CONFIG_NLS_CODEPAGE_932=y
# CONFIG_NLS_CODEPAGE_949 is not set
CONFIG_NLS_CODEPAGE_874=m
# CONFIG_NLS_ISO8859_8 is not set
# CONFIG_NLS_CODEPAGE_1250 is not set
CONFIG_NLS_CODEPAGE_1251=m
# CONFIG_NLS_ASCII is not set
CONFIG_NLS_ISO8859_1=m
CONFIG_NLS_ISO8859_2=y
# CONFIG_NLS_ISO8859_3 is not set
# CONFIG_NLS_ISO8859_4 is not set
CONFIG_NLS_ISO8859_5=y
CONFIG_NLS_ISO8859_6=m
CONFIG_NLS_ISO8859_7=m
CONFIG_NLS_ISO8859_9=y
CONFIG_NLS_ISO8859_13=m
CONFIG_NLS_ISO8859_14=y
# CONFIG_NLS_ISO8859_15 is not set
CONFIG_NLS_KOI8_R=y
CONFIG_NLS_KOI8_U=m
CONFIG_NLS_UTF8=y
CONFIG_DLM=y
CONFIG_DLM_DEBUG=y

#
# Kernel hacking
#
CONFIG_TRACE_IRQFLAGS_SUPPORT=y
# CONFIG_PRINTK_TIME is not set
# CONFIG_ENABLE_WARN_DEPRECATED is not set
# CONFIG_ENABLE_MUST_CHECK is not set
CONFIG_FRAME_WARN=2048
CONFIG_MAGIC_SYSRQ=y
CONFIG_STRIP_ASM_SYMS=y
CONFIG_UNUSED_SYMBOLS=y
CONFIG_DEBUG_FS=y
CONFIG_HEADERS_CHECK=y
CONFIG_DEBUG_SECTION_MISMATCH=y
CONFIG_DEBUG_KERNEL=y
# CONFIG_DEBUG_SHIRQ is not set
CONFIG_DETECT_SOFTLOCKUP=y
CONFIG_NMI_WATCHDOG=y
CONFIG_BOOTPARAM_SOFTLOCKUP_PANIC=y
CONFIG_BOOTPARAM_SOFTLOCKUP_PANIC_VALUE=1
CONFIG_DETECT_HUNG_TASK=y
CONFIG_BOOTPARAM_HUNG_TASK_PANIC=y
CONFIG_BOOTPARAM_HUNG_TASK_PANIC_VALUE=1
# CONFIG_SCHED_DEBUG is not set
# CONFIG_SCHEDSTATS is not set
CONFIG_TIMER_STATS=y
CONFIG_DEBUG_OBJECTS=y
CONFIG_DEBUG_OBJECTS_SELFTEST=y
# CONFIG_DEBUG_OBJECTS_FREE is not set
CONFIG_DEBUG_OBJECTS_TIMERS=y
# CONFIG_DEBUG_OBJECTS_WORK is not set
CONFIG_DEBUG_OBJECTS_ENABLE_DEFAULT=1
CONFIG_SLUB_DEBUG_ON=y
# CONFIG_SLUB_STATS is not set
# CONFIG_DEBUG_RT_MUTEXES is not set
# CONFIG_RT_MUTEX_TESTER is not set
CONFIG_DEBUG_SPINLOCK=y
CONFIG_DEBUG_MUTEXES=y
CONFIG_DEBUG_LOCK_ALLOC=y
CONFIG_PROVE_LOCKING=y
CONFIG_LOCKDEP=y
CONFIG_LOCK_STAT=y
# CONFIG_DEBUG_LOCKDEP is not set
CONFIG_TRACE_IRQFLAGS=y
CONFIG_DEBUG_SPINLOCK_SLEEP=y
# CONFIG_DEBUG_LOCKING_API_SELFTESTS is not set
CONFIG_STACKTRACE=y
CONFIG_DEBUG_BUGVERBOSE=y
CONFIG_DEBUG_VM=y
CONFIG_DEBUG_VIRTUAL=y
# CONFIG_DEBUG_WRITECOUNT is not set
CONFIG_DEBUG_MEMORY_INIT=y
CONFIG_DEBUG_LIST=y
CONFIG_DEBUG_SG=y
CONFIG_DEBUG_NOTIFIERS=y
# CONFIG_DEBUG_CREDENTIALS is not set
CONFIG_ARCH_WANT_FRAME_POINTERS=y
CONFIG_FRAME_POINTER=y
# CONFIG_BOOT_PRINTK_DELAY is not set
CONFIG_RCU_TORTURE_TEST=m
# CONFIG_RCU_CPU_STALL_DETECTOR is not set
CONFIG_BACKTRACE_SELF_TEST=y
CONFIG_DEBUG_FORCE_WEAK_PER_CPU=y
CONFIG_FAULT_INJECTION=y
# CONFIG_FAILSLAB is not set
CONFIG_FAIL_PAGE_ALLOC=y
# CONFIG_FAIL_MAKE_REQUEST is not set
CONFIG_FAIL_IO_TIMEOUT=y
CONFIG_FAULT_INJECTION_DEBUG_FS=y
# CONFIG_LATENCYTOP is not set
CONFIG_SYSCTL_SYSCALL_CHECK=y
# CONFIG_DEBUG_PAGEALLOC is not set
CONFIG_USER_STACKTRACE_SUPPORT=y
CONFIG_NOP_TRACER=y
CONFIG_HAVE_FUNCTION_TRACER=y
CONFIG_HAVE_FUNCTION_GRAPH_TRACER=y
CONFIG_HAVE_FUNCTION_GRAPH_FP_TEST=y
CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST=y
CONFIG_HAVE_DYNAMIC_FTRACE=y
CONFIG_HAVE_FTRACE_MCOUNT_RECORD=y
CONFIG_HAVE_SYSCALL_TRACEPOINTS=y
CONFIG_TRACER_MAX_TRACE=y
CONFIG_RING_BUFFER=y
CONFIG_EVENT_TRACING=y
CONFIG_CONTEXT_SWITCH_TRACER=y
CONFIG_RING_BUFFER_ALLOW_SWAP=y
CONFIG_TRACING=y
CONFIG_GENERIC_TRACER=y
CONFIG_TRACING_SUPPORT=y
CONFIG_FTRACE=y
CONFIG_FUNCTION_TRACER=y
CONFIG_FUNCTION_GRAPH_TRACER=y
CONFIG_IRQSOFF_TRACER=y
CONFIG_SYSPROF_TRACER=y
CONFIG_SCHED_TRACER=y
# CONFIG_FTRACE_SYSCALLS is not set
CONFIG_BOOT_TRACER=y
CONFIG_BRANCH_PROFILE_NONE=y
# CONFIG_PROFILE_ANNOTATED_BRANCHES is not set
# CONFIG_PROFILE_ALL_BRANCHES is not set
CONFIG_KSYM_TRACER=y
CONFIG_PROFILE_KSYM_TRACER=y
CONFIG_STACK_TRACER=y
CONFIG_KMEMTRACE=y
CONFIG_WORKQUEUE_TRACER=y
# CONFIG_BLK_DEV_IO_TRACE is not set
# CONFIG_DYNAMIC_FTRACE is not set
CONFIG_FUNCTION_PROFILER=y
CONFIG_FTRACE_SELFTEST=y
CONFIG_FTRACE_STARTUP_TEST=y
# CONFIG_EVENT_TRACE_TEST_SYSCALLS is not set
# CONFIG_MMIOTRACE is not set
CONFIG_PROVIDE_OHCI1394_DMA_INIT=y
# CONFIG_BUILD_DOCSRC is not set
# CONFIG_DYNAMIC_DEBUG is not set
CONFIG_DMA_API_DEBUG=y
CONFIG_SAMPLES=y
# CONFIG_SAMPLE_TRACEPOINTS is not set
CONFIG_SAMPLE_TRACE_EVENTS=m
CONFIG_SAMPLE_KOBJECT=m
CONFIG_SAMPLE_HW_BREAKPOINT=m
CONFIG_HAVE_ARCH_KGDB=y
CONFIG_KGDB=y
# CONFIG_KGDB_SERIAL_CONSOLE is not set
# CONFIG_KGDB_TESTS is not set
CONFIG_HAVE_ARCH_KMEMCHECK=y
CONFIG_STRICT_DEVMEM=y
CONFIG_X86_VERBOSE_BOOTUP=y
CONFIG_EARLY_PRINTK=y
CONFIG_EARLY_PRINTK_DBGP=y
CONFIG_DEBUG_STACKOVERFLOW=y
CONFIG_DEBUG_STACK_USAGE=y
CONFIG_DEBUG_PER_CPU_MAPS=y
# CONFIG_X86_PTDUMP is not set
# CONFIG_DEBUG_RODATA is not set
CONFIG_DEBUG_NX_TEST=m
CONFIG_IOMMU_STRESS=y
CONFIG_HAVE_MMIOTRACE_SUPPORT=y
CONFIG_IO_DELAY_TYPE_0X80=0
CONFIG_IO_DELAY_TYPE_0XED=1
CONFIG_IO_DELAY_TYPE_UDELAY=2
CONFIG_IO_DELAY_TYPE_NONE=3
# CONFIG_IO_DELAY_0X80 is not set
CONFIG_IO_DELAY_0XED=y
# CONFIG_IO_DELAY_UDELAY is not set
# CONFIG_IO_DELAY_NONE is not set
CONFIG_DEFAULT_IO_DELAY_TYPE=1
CONFIG_DEBUG_BOOT_PARAMS=y
CONFIG_CPA_DEBUG=y
CONFIG_OPTIMIZE_INLINING=y

#
# Security options
#
CONFIG_KEYS=y
CONFIG_KEYS_DEBUG_PROC_KEYS=y
CONFIG_SECURITY=y
CONFIG_SECURITYFS=y
CONFIG_SECURITY_NETWORK=y
# CONFIG_SECURITY_NETWORK_XFRM is not set
CONFIG_SECURITY_PATH=y
CONFIG_SECURITY_TOMOYO=y
# CONFIG_DEFAULT_SECURITY_SELINUX is not set
# CONFIG_DEFAULT_SECURITY_SMACK is not set
# CONFIG_DEFAULT_SECURITY_TOMOYO is not set
CONFIG_DEFAULT_SECURITY_DAC=y
CONFIG_DEFAULT_SECURITY=""
CONFIG_XOR_BLOCKS=m
CONFIG_ASYNC_CORE=m
CONFIG_ASYNC_MEMCPY=m
CONFIG_ASYNC_XOR=m
CONFIG_ASYNC_PQ=m
CONFIG_ASYNC_RAID6_RECOV=m
CONFIG_CRYPTO=y

#
# Crypto core or helper
#
CONFIG_CRYPTO_FIPS=y
CONFIG_CRYPTO_ALGAPI=y
CONFIG_CRYPTO_ALGAPI2=y
CONFIG_CRYPTO_AEAD=y
CONFIG_CRYPTO_AEAD2=y
CONFIG_CRYPTO_BLKCIPHER=y
CONFIG_CRYPTO_BLKCIPHER2=y
CONFIG_CRYPTO_HASH=y
CONFIG_CRYPTO_HASH2=y
CONFIG_CRYPTO_RNG=y
CONFIG_CRYPTO_RNG2=y
CONFIG_CRYPTO_PCOMP=y
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_MANAGER2=y
CONFIG_CRYPTO_GF128MUL=y
CONFIG_CRYPTO_NULL=m
CONFIG_CRYPTO_PCRYPT=y
CONFIG_CRYPTO_WORKQUEUE=y
CONFIG_CRYPTO_CRYPTD=m
CONFIG_CRYPTO_AUTHENC=y
# CONFIG_CRYPTO_TEST is not set

#
# Authenticated Encryption with Associated Data
#
# CONFIG_CRYPTO_CCM is not set
# CONFIG_CRYPTO_GCM is not set
CONFIG_CRYPTO_SEQIV=y

#
# Block modes
#
CONFIG_CRYPTO_CBC=y
CONFIG_CRYPTO_CTR=y
CONFIG_CRYPTO_CTS=y
CONFIG_CRYPTO_ECB=m
CONFIG_CRYPTO_LRW=m
CONFIG_CRYPTO_PCBC=y
CONFIG_CRYPTO_XTS=m

#
# Hash modes
#
CONFIG_CRYPTO_HMAC=y
# CONFIG_CRYPTO_XCBC is not set
CONFIG_CRYPTO_VMAC=m

#
# Digest
#
CONFIG_CRYPTO_CRC32C=y
# CONFIG_CRYPTO_CRC32C_INTEL is not set
CONFIG_CRYPTO_GHASH=m
# CONFIG_CRYPTO_MD4 is not set
CONFIG_CRYPTO_MD5=y
CONFIG_CRYPTO_MICHAEL_MIC=m
CONFIG_CRYPTO_RMD128=y
# CONFIG_CRYPTO_RMD160 is not set
# CONFIG_CRYPTO_RMD256 is not set
# CONFIG_CRYPTO_RMD320 is not set
CONFIG_CRYPTO_SHA1=y
CONFIG_CRYPTO_SHA256=y
# CONFIG_CRYPTO_SHA512 is not set
CONFIG_CRYPTO_TGR192=y
CONFIG_CRYPTO_WP512=m
CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL=m

#
# Ciphers
#
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_X86_64 is not set
# CONFIG_CRYPTO_AES_NI_INTEL is not set
CONFIG_CRYPTO_ANUBIS=m
CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_BLOWFISH is not set
CONFIG_CRYPTO_CAMELLIA=y
CONFIG_CRYPTO_CAST5=m
CONFIG_CRYPTO_CAST6=y
CONFIG_CRYPTO_DES=y
CONFIG_CRYPTO_FCRYPT=y
CONFIG_CRYPTO_KHAZAD=m
CONFIG_CRYPTO_SALSA20=y
CONFIG_CRYPTO_SALSA20_X86_64=y
# CONFIG_CRYPTO_SEED is not set
CONFIG_CRYPTO_SERPENT=m
CONFIG_CRYPTO_TEA=y
CONFIG_CRYPTO_TWOFISH=y
CONFIG_CRYPTO_TWOFISH_COMMON=y
CONFIG_CRYPTO_TWOFISH_X86_64=y

#
# Compression
#
CONFIG_CRYPTO_DEFLATE=y
CONFIG_CRYPTO_ZLIB=y
CONFIG_CRYPTO_LZO=y

#
# Random Number Generation
#
CONFIG_CRYPTO_ANSI_CPRNG=m
# CONFIG_CRYPTO_HW is not set
CONFIG_HAVE_KVM=y
CONFIG_HAVE_KVM_IRQCHIP=y
CONFIG_HAVE_KVM_EVENTFD=y
CONFIG_KVM_APIC_ARCHITECTURE=y
CONFIG_VIRTUALIZATION=y
CONFIG_KVM=m
CONFIG_KVM_INTEL=m
CONFIG_KVM_AMD=m
# CONFIG_VIRTIO_PCI is not set
# CONFIG_VIRTIO_BALLOON is not set
CONFIG_BINARY_PRINTF=y

#
# Library routines
#
CONFIG_BITREVERSE=y
CONFIG_GENERIC_FIND_FIRST_BIT=y
CONFIG_GENERIC_FIND_NEXT_BIT=y
CONFIG_GENERIC_FIND_LAST_BIT=y
CONFIG_CRC_CCITT=m
CONFIG_CRC16=m
CONFIG_CRC_T10DIF=y
CONFIG_CRC_ITU_T=m
CONFIG_CRC32=y
CONFIG_CRC7=y
CONFIG_LIBCRC32C=y
CONFIG_ZLIB_INFLATE=y
CONFIG_ZLIB_DEFLATE=y
CONFIG_LZO_COMPRESS=y
CONFIG_LZO_DECOMPRESS=y
CONFIG_TEXTSEARCH=y
CONFIG_TEXTSEARCH_KMP=y
CONFIG_TEXTSEARCH_BM=y
CONFIG_TEXTSEARCH_FSM=y
CONFIG_HAS_IOMEM=y
CONFIG_HAS_IOPORT=y
CONFIG_HAS_DMA=y
CONFIG_CHECK_SIGNATURE=y
CONFIG_CPUMASK_OFFSTACK=y
CONFIG_NLATTR=y
CONFIG_FORCE_SUCCESSFUL_BUILD=y
CONFIG_FORCE_MINIMAL_CONFIG=y
CONFIG_FORCE_MINIMAL_CONFIG_64=y
CONFIG_FORCE_MINIMAL_CONFIG_PHYS=y

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: tip: origin tree boot crash
  2010-03-01  7:50         ` tip: origin tree boot crash Ingo Molnar
@ 2010-03-01 14:55           ` Steffen Klassert
  2010-03-03 14:42             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Steffen Klassert @ 2010-03-01 14:55 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Herbert Xu, Linus Torvalds, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

Hi.

On Mon, Mar 01, 2010 at 08:50:24AM +0100, Ingo Molnar wrote:
> 
> Hi,
> 
> * Herbert Xu <herbert@gondor.apana.org.au> wrote:
> 
> >       crypto: pcrypt - Add pcrypt crypto parallelization wrapper
> 
> -tip testing started triggering the following frequent boot crash yesterday, 
> on 64-bit x86:
> 
>  |  calling  pcrypt_init+0x0/0xee @ 1
>  |  BUG: unable to handle kernel NULL pointer dereference at (null)
>  |  IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
>  |  Call Trace:
>  |   [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
>  |   [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
>  |   [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
> 

Ugh, it seems that I forgot to allocate one of the cpumasks. Looking at the
configs of my test systems I noticed, that CONFIG_CPUMASK_OFFSTACK was
not set on all the configs, so I did not notice it.

The patch below fixes the boot crash if CONFIG_CPUMASK_OFFSTACK is
enabled on my test systems. Does the patch fix it for you too?

Thanks,

Steffen

Subject: [PATCH] padata: allocate the cpumask for the padata instance

The cpumask of the padata instance was used without allocated.
This caused boot crashes if CONFIG_CPUMASK_OFFSTACK is enabled.
This patch fixes this by doing proper allocation for this cpumask.

Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
---
 kernel/padata.c |    8 +++++++-
 1 files changed, 7 insertions(+), 1 deletions(-)

diff --git a/kernel/padata.c b/kernel/padata.c
index 6f9bcb8..93caf65 100644
--- a/kernel/padata.c
+++ b/kernel/padata.c
@@ -642,6 +642,9 @@ struct padata_instance *padata_alloc(const struct cpumask *cpumask,
 	if (!pd)
 		goto err_free_inst;
 
+	if (!alloc_cpumask_var(&pinst->cpumask, GFP_KERNEL))
+		goto err_free_pd;
+
 	rcu_assign_pointer(pinst->pd, pd);
 
 	pinst->wq = wq;
@@ -654,12 +657,14 @@ struct padata_instance *padata_alloc(const struct cpumask *cpumask,
 	pinst->cpu_notifier.priority = 0;
 	err = register_hotcpu_notifier(&pinst->cpu_notifier);
 	if (err)
-		goto err_free_pd;
+		goto err_free_cpumask;
 
 	mutex_init(&pinst->lock);
 
 	return pinst;
 
+err_free_cpumask:
+	free_cpumask_var(pinst->cpumask);
 err_free_pd:
 	padata_free_pd(pd);
 err_free_inst:
@@ -685,6 +690,7 @@ void padata_free(struct padata_instance *pinst)
 
 	unregister_hotcpu_notifier(&pinst->cpu_notifier);
 	padata_free_pd(pinst->pd);
+	free_cpumask_var(pinst->cpumask);
 	kfree(pinst);
 }
 EXPORT_SYMBOL(padata_free);
-- 
1.5.6.5


^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: tip: origin tree boot crash
  2010-03-01 14:55           ` Steffen Klassert
@ 2010-03-03 14:42             ` Herbert Xu
  2010-03-04  3:00               ` Ingo Molnar
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-03-03 14:42 UTC (permalink / raw)
  To: Steffen Klassert
  Cc: Ingo Molnar, Linus Torvalds, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Mon, Mar 01, 2010 at 03:55:19PM +0100, Steffen Klassert wrote:
> 
> On Mon, Mar 01, 2010 at 08:50:24AM +0100, Ingo Molnar wrote:
> > 
> > * Herbert Xu <herbert@gondor.apana.org.au> wrote:
> > 
> > >       crypto: pcrypt - Add pcrypt crypto parallelization wrapper
> > 
> > -tip testing started triggering the following frequent boot crash yesterday, 
> > on 64-bit x86:
> > 
> >  |  calling  pcrypt_init+0x0/0xee @ 1
> >  |  BUG: unable to handle kernel NULL pointer dereference at (null)
> >  |  IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
> >  |  Call Trace:
> >  |   [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
> >  |   [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
> >  |   [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
> > 
> 
> Ugh, it seems that I forgot to allocate one of the cpumasks. Looking at the
> configs of my test systems I noticed, that CONFIG_CPUMASK_OFFSTACK was
> not set on all the configs, so I did not notice it.
> 
> The patch below fixes the boot crash if CONFIG_CPUMASK_OFFSTACK is
> enabled on my test systems. Does the patch fix it for you too?

Ingo, any luck with this patch from Steffen?

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: tip: origin tree boot crash
  2010-03-03 14:42             ` Herbert Xu
@ 2010-03-04  3:00               ` Ingo Molnar
  2010-03-04  5:31                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Ingo Molnar @ 2010-03-04  3:00 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Steffen Klassert, Linus Torvalds, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List


* Herbert Xu <herbert@gondor.apana.org.au> wrote:

> On Mon, Mar 01, 2010 at 03:55:19PM +0100, Steffen Klassert wrote:
> > 
> > On Mon, Mar 01, 2010 at 08:50:24AM +0100, Ingo Molnar wrote:
> > > 
> > > * Herbert Xu <herbert@gondor.apana.org.au> wrote:
> > > 
> > > >       crypto: pcrypt - Add pcrypt crypto parallelization wrapper
> > > 
> > > -tip testing started triggering the following frequent boot crash yesterday, 
> > > on 64-bit x86:
> > > 
> > >  |  calling  pcrypt_init+0x0/0xee @ 1
> > >  |  BUG: unable to handle kernel NULL pointer dereference at (null)
> > >  |  IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
> > >  |  Call Trace:
> > >  |   [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
> > >  |   [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
> > >  |   [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
> > > 
> > 
> > Ugh, it seems that I forgot to allocate one of the cpumasks. Looking at the
> > configs of my test systems I noticed, that CONFIG_CPUMASK_OFFSTACK was
> > not set on all the configs, so I did not notice it.
> > 
> > The patch below fixes the boot crash if CONFIG_CPUMASK_OFFSTACK is
> > enabled on my test systems. Does the patch fix it for you too?
> 
> Ingo, any luck with this patch from Steffen?

I'm still busy with the merge window - please dont wait for me and consider it 
fixed, i'll re-report if there's still any problems.

Thanks,

	Ingo

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: tip: origin tree boot crash
  2010-03-04  3:00               ` Ingo Molnar
@ 2010-03-04  5:31                 ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-03-04  5:31 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Steffen Klassert, Linus Torvalds, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Mar 04, 2010 at 04:00:52AM +0100, Ingo Molnar wrote:
> 
> I'm still busy with the merge window - please dont wait for me and consider it 
> fixed, i'll re-report if there's still any problems.

OK, I'll apply the patch.

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.34
       [not found]             ` <20100201195204.GA6953@gondor.apana.org.au>
@ 2010-03-05  7:10               ` Herbert Xu
       [not found]               ` <20100305071043.GA3548@gondor.apana.org.au>
  2010-11-13 12:59               ` Crypto Fixes for 2.6.37 Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-03-05  7:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes three regressions and an older bug:

* The new padata system crashes during init on certain configurations.
* Fixed hmac(md5) broken by recent md5 update.
* Fixed authenc broken by ahash conversion.
* Fixed handling of unaligned buffers in hash API.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: md5 - Set statesize

Steffen Klassert (3):
      crypto: authenc - Use correct ahash complete functions
      crypto: authenc - Move saved IV in front of the ablkcipher request
      padata: Allocate the cpumask for the padata instance

Szilveszter Ördög (1):
      crypto: hash - Fix handling of unaligned buffers

 crypto/ahash.c   |    1 -
 crypto/authenc.c |   27 +++++++++++++++------------
 crypto/md5.c     |    1 +
 kernel/padata.c  |    8 +++++++-
 4 files changed, 23 insertions(+), 14 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.34
       [not found]               ` <20100305071043.GA3548@gondor.apana.org.au>
@ 2010-04-27 13:55                 ` Herbert Xu
  2010-06-03 10:05                   ` Crypto Fixes for 2.6.35 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-04-27 13:55 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes an IPsec crash when an async hash driver is used.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: authenc - Add EINPROGRESS check

 crypto/authenc.c |   16 +++++++++++-----
 1 files changed, 11 insertions(+), 5 deletions(-)
 
Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.35
  2010-02-26  0:49       ` Crypto Update for 2.6.34 Herbert Xu
  2010-03-01  7:50         ` tip: origin tree boot crash Ingo Molnar
@ 2010-05-19  2:06         ` Herbert Xu
  2010-05-21 10:44           ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-05-19  2:06 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.35:

* Hardware hash support in mv_cesa.
* Hardware hash support in omap.
* VMAC now works on big-endian.
* Random fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Chihau Chau (1):
      crypto: geode-aes - Fix some code style issues

Dan Carpenter (2):
      crypto: pcrypt - Handle crypto_get_attr_type errors
      crypto: algapi - Remove unneeded null check

Dmitry Kasatkin (3):
      crypto: omap - Updates omap sham device related platform code
      crypto: omap - sha1 & md5 driver
      crypto: omap - OMAP macros corrected

Henrik Kretzschmar (1):
      padata: Section cleanup

Herbert Xu (1):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6

Huang Ying (4):
      crypto: aesni-intel - Add AES-NI accelerated CTR mode
      crypto: tcrypt - Speed testing support for ghash
      crypto: aesni-intel - Fix CTR optimization build failure with gas 2.16.1
      crypto: aesni-intel - Fix another CTR build failure with gas 2.16.1

Richard Hartmann (1):
      crypto: internal - Fix checkpatch errors

Shane Wang (1):
      crypto: vmac - Fix big-endian support

Steffen Klassert (5):
      padata: Dont scale the parallel objects with the cpus
      padata: cpu hotplug code should depend on CONFIG_HOTPLUG_CPU
      padata: Remove superfluous might_sleep
      padata: Initialize the padata queues only for the used cpus
      padata: Use get_online_cpus/put_online_cpus

Tobias Klauser (1):
      crypto: mv_cesa - Use resource_size

Uri Simchoni (10):
      crypto: mv_cesa - Invoke the user callback from a softirq context
      crypto: mv_cesa - Remove compiler warning in mv_cesa driver
      crypto: mv_cesa - Fix situation where the dest sglist is organized differently than the source sglist
      crypto: mv_cesa - Fix situations where the src sglist spans more data than the request asks for
      crypto: mv_cesa - Enqueue generic async requests
      crypto: mv_cesa - Rename a variable to a more suitable name
      crypto: mv_cesa - Execute some code via function pointers rathr than direct calls
      crypto: mv_cesa - Make the copy-back of data optional
      crypto: mv_cesa - Support processing of data from previous requests
      crypto: mv_cesa - Add sha1 and hmac(sha1) async hash drivers

 arch/arm/mach-omap2/clock2420_data.c       |    2 +-
 arch/arm/mach-omap2/clock2430_data.c       |    2 +-
 arch/arm/mach-omap2/clock3xxx_data.c       |    2 +-
 arch/arm/mach-omap2/devices.c              |   58 ++-
 arch/arm/plat-omap/include/plat/omap34xx.h |    5 +
 arch/x86/crypto/aesni-intel_asm.S          |  115 +++
 arch/x86/crypto/aesni-intel_glue.c         |  130 +++-
 arch/x86/include/asm/inst.h                |   96 ++-
 crypto/algapi.c                            |    2 +-
 crypto/internal.h                          |    2 +-
 crypto/pcrypt.c                            |   11 +-
 crypto/tcrypt.c                            |    7 +
 crypto/tcrypt.h                            |   29 +
 crypto/testmgr.h                           |   64 ++-
 crypto/vmac.c                              |   75 +-
 drivers/crypto/Kconfig                     |    9 +
 drivers/crypto/Makefile                    |    2 +
 drivers/crypto/geode-aes.c                 |   36 +-
 drivers/crypto/mv_cesa.c                   |  692 ++++++++++++++--
 drivers/crypto/mv_cesa.h                   |   40 +-
 drivers/crypto/omap-sham.c                 | 1259 ++++++++++++++++++++++++++++
 kernel/padata.c                            |   56 +-
 22 files changed, 2497 insertions(+), 197 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.35
  2010-05-19  2:06         ` Crypto Update for 2.6.35 Herbert Xu
@ 2010-05-21 10:44           ` Herbert Xu
  2010-08-04 14:04             ` Crypto Update for 2.6.36 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-05-21 10:44 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is a revised crypto update for 2.6.35:

* Hardware hash support in mv_cesa.
* Hardware hash support in omap.
* Hardware hash support in talitos.
* Hardware hash/cipher support for Niagara2.
* Hardware support for CTR mode in aesni.
* VMAC now works on big-endian.
* Updates to padata.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Chihau Chau (1):
      crypto: geode-aes - Fix some code style issues

Dan Carpenter (2):
      crypto: pcrypt - Handle crypto_get_attr_type errors
      crypto: algapi - Remove unneeded null check

David S. Miller (6):
      crypto: hifn_795x - Rename ablkcipher_walk to hifn_cipher_walk
      crypto: scatterwalk - Fix scatterwalk_done() test
      crypto: tcrypt - Add speed tests for async hashing
      crypto: testmgr - Add testing for async hashing and update/final
      crypto: skcipher - Add ablkcipher_walk interfaces
      crypto: n2 - Add Niagara2 crypto driver

Dmitry Kasatkin (3):
      crypto: omap - Updates omap sham device related platform code
      crypto: omap - sha1 & md5 driver
      crypto: omap - OMAP macros corrected

Henrik Kretzschmar (1):
      padata: Section cleanup

Herbert Xu (2):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6
      crypto: shash - Remove usage of CRYPTO_MINALIGN

Huang Ying (4):
      crypto: aesni-intel - Add AES-NI accelerated CTR mode
      crypto: tcrypt - Speed testing support for ghash
      crypto: aesni-intel - Fix CTR optimization build failure with gas 2.16.1
      crypto: aesni-intel - Fix another CTR build failure with gas 2.16.1

Kim Phillips (1):
      crypto: talitos - add support for sha224

Lee Nipper (3):
      crypto: talitos - prepare for adding ahash algorithms
      crypto: talitos - second prepare step for adding ahash algorithms
      crypto: talitos - add hash algorithms

Matt Mackall (1):
      random: simplify fips mode

Richard Hartmann (1):
      crypto: internal - Fix checkpatch errors

Shane Wang (1):
      crypto: vmac - Fix big-endian support

Shikhar Khattar (1):
      crypto: authenc - Fix cryptlen calculation

Steffen Klassert (9):
      padata: Dont scale the parallel objects with the cpus
      padata: cpu hotplug code should depend on CONFIG_HOTPLUG_CPU
      padata: Remove superfluous might_sleep
      padata: Initialize the padata queues only for the used cpus
      padata: Use get_online_cpus/put_online_cpus
      padata: Use a timer to handle remaining objects in the reorder queues
      padata: Flush the padata queues actively
      padata: Add some code comments
      padata: Use get_online_cpus/put_online_cpus in padata_free

Tobias Klauser (1):
      crypto: mv_cesa - Use resource_size

Uri Simchoni (10):
      crypto: mv_cesa - Invoke the user callback from a softirq context
      crypto: mv_cesa - Remove compiler warning in mv_cesa driver
      crypto: mv_cesa - Fix situation where the dest sglist is organized differently than the source sglist
      crypto: mv_cesa - Fix situations where the src sglist spans more data than the request asks for
      crypto: mv_cesa - Enqueue generic async requests
      crypto: mv_cesa - Rename a variable to a more suitable name
      crypto: mv_cesa - Execute some code via function pointers rathr than direct calls
      crypto: mv_cesa - Make the copy-back of data optional
      crypto: mv_cesa - Support processing of data from previous requests
      crypto: mv_cesa - Add sha1 and hmac(sha1) async hash drivers

 arch/arm/mach-omap2/clock2420_data.c       |    2 +-
 arch/arm/mach-omap2/clock2430_data.c       |    2 +-
 arch/arm/mach-omap2/clock3xxx_data.c       |    2 +-
 arch/arm/mach-omap2/devices.c              |   58 +-
 arch/arm/plat-omap/include/plat/omap34xx.h |    5 +
 arch/x86/crypto/aesni-intel_asm.S          |  115 ++
 arch/x86/crypto/aesni-intel_glue.c         |  130 ++-
 arch/x86/include/asm/inst.h                |   96 ++-
 crypto/ablkcipher.c                        |  277 ++++
 crypto/algapi.c                            |    2 +-
 crypto/authenc.c                           |    8 +-
 crypto/internal.h                          |    2 +-
 crypto/pcrypt.c                            |   11 +-
 crypto/scatterwalk.c                       |    2 +-
 crypto/shash.c                             |    2 +-
 crypto/tcrypt.c                            |  343 +++++-
 crypto/tcrypt.h                            |   29 +
 crypto/testmgr.c                           |   66 +-
 crypto/testmgr.h                           |   64 +-
 crypto/vmac.c                              |   75 +-
 drivers/char/random.c                      |   10 +-
 drivers/crypto/Kconfig                     |   21 +
 drivers/crypto/Makefile                    |    4 +
 drivers/crypto/geode-aes.c                 |   36 +-
 drivers/crypto/hifn_795x.c                 |   18 +-
 drivers/crypto/mv_cesa.c                   |  692 +++++++++-
 drivers/crypto/mv_cesa.h                   |   40 +-
 drivers/crypto/n2_asm.S                    |   95 ++
 drivers/crypto/n2_core.c                   | 2083 ++++++++++++++++++++++++++++
 drivers/crypto/n2_core.h                   |  231 +++
 drivers/crypto/omap-sham.c                 | 1259 +++++++++++++++++
 drivers/crypto/talitos.c                   |  699 +++++++++-
 drivers/crypto/talitos.h                   |   12 +-
 include/crypto/algapi.h                    |   40 +
 include/linux/padata.h                     |   55 +
 kernel/padata.c                            |  185 ++-
 36 files changed, 6456 insertions(+), 315 deletions(-)
 
Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.35
  2010-04-27 13:55                 ` Herbert Xu
@ 2010-06-03 10:05                   ` Herbert Xu
  2010-06-03 16:26                     ` Linus Torvalds
  2010-07-16  2:26                     ` Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-06-03 10:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes build failures for of_device drivers as well as
a couple of bugs in the n2 driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Anatolij Gustschin (1):
      crypto: crypto4xx - Fix build breakage

David S. Miller (3):
      n2_crypto: Fix build after of_device/of_platform_driver changes.
      n2_crypto: Fix MAU kmem_cache name.
      n2_crypto: Plumb fallback ahash requests properly.

 drivers/crypto/amcc/crypto4xx_core.c |    6 +-
 drivers/crypto/n2_core.c             |  123 ++++++++++++++++++----------------
 2 files changed, 68 insertions(+), 61 deletions(-)
  
Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-06-03 10:05                   ` Crypto Fixes for 2.6.35 Herbert Xu
@ 2010-06-03 16:26                     ` Linus Torvalds
  2010-06-03 21:56                       ` Herbert Xu
  2010-07-16  2:26                     ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2010-06-03 16:26 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List



On Thu, 3 Jun 2010, Herbert Xu wrote:
> 
> Please pull from
> 
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

"Already up-to-date." Forgot to push? (I also checked master, so it's not 
that mirroring is slow)

		Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-06-03 16:26                     ` Linus Torvalds
@ 2010-06-03 21:56                       ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-06-03 21:56 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jun 03, 2010 at 09:26:38AM -0700, Linus Torvalds wrote:
> 
> 
> On Thu, 3 Jun 2010, Herbert Xu wrote:
> > 
> > Please pull from
> > 
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> 
> "Already up-to-date." Forgot to push? (I also checked master, so it's not 
> that mirroring is slow)

Sorry, I pushed my tree to my home directory on master but not
to /pub :)

Should work now.

Thanks!
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-06-03 10:05                   ` Crypto Fixes for 2.6.35 Herbert Xu
  2010-06-03 16:26                     ` Linus Torvalds
@ 2010-07-16  2:26                     ` Herbert Xu
  2010-07-22  5:50                       ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-07-16  2:26 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a crash in the new ablkcipher walking code used by
async block ciphers.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Jiri Slaby (1):
      crypto: skcipher - avoid NULL dereference

 crypto/ablkcipher.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-07-16  2:26                     ` Herbert Xu
@ 2010-07-22  5:50                       ` Herbert Xu
  2010-07-23  5:17                         ` Lee Nipper
  2010-09-03  6:00                         ` Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-07-22  5:50 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the talito hash driver that causes too
much data to be copied.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Lee Nipper (1):
      crypto: talitos - fix bug in sg_copy_end_to_buffer

 drivers/crypto/talitos.c |    6 +++++-
 1 files changed, 5 insertions(+), 1 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-07-22  5:50                       ` Herbert Xu
@ 2010-07-23  5:17                         ` Lee Nipper
  2010-07-23  7:27                           ` Herbert Xu
  2010-09-03  6:00                         ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Lee Nipper @ 2010-07-23  5:17 UTC (permalink / raw)
  To: Herbert Xu; +Cc: linux-crypto

On Thu, Jul 22, 2010 at 00:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> Hi Linus:
>
> This push fixes a bug in the talito hash driver that causes too
> much data to be copied.
>
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> or
>
> master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
>
> Lee Nipper (1):
>      crypto: talitos - fix bug in sg_copy_end_to_buffer
>
>  drivers/crypto/talitos.c |    6 +++++-
>  1 files changed, 5 insertions(+), 1 deletions(-)
>

Thanks Herbert.

But I am curious why this patch

http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg04660.html

wasn't nudged along too.  It also fixed a talitos problem with ahash.
I don't mind if it needs to wait until later;  I'm just curious.

Thanks again,

Lee

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-07-23  5:17                         ` Lee Nipper
@ 2010-07-23  7:27                           ` Herbert Xu
  2010-07-23 13:17                             ` Lee Nipper
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-07-23  7:27 UTC (permalink / raw)
  To: Lee Nipper; +Cc: linux-crypto

On Fri, Jul 23, 2010 at 12:17:59AM -0500, Lee Nipper wrote:
>
> But I am curious why this patch
> 
> http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg04660.html
> 
> wasn't nudged along too.  It also fixed a talitos problem with ahash.
> I don't mind if it needs to wait until later;  I'm just curious.

If it causes a crash or has other serious implications then I will
push it.  However, if it simply results in a broken hash computation,
a failure that should be fairly obvious, then it can wait til the
next cycle.

When I looked at it previously I thought it fell into the latter
category, but I might be mistaken.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-07-23  7:27                           ` Herbert Xu
@ 2010-07-23 13:17                             ` Lee Nipper
  0 siblings, 0 replies; 246+ messages in thread
From: Lee Nipper @ 2010-07-23 13:17 UTC (permalink / raw)
  To: Herbert Xu; +Cc: linux-crypto

On Fri, Jul 23, 2010 at 02:27, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> If it causes a crash or has other serious implications then I will
> push it.  However, if it simply results in a broken hash computation,
> a failure that should be fairly obvious, then it can wait til the
> next cycle.
>
> When I looked at it previously I thought it fell into the latter
> category, but I might be mistaken.

That's right.  It's just a hash thing.
Thanks,

Lee

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.36
  2010-05-21 10:44           ` Herbert Xu
@ 2010-08-04 14:04             ` Herbert Xu
  2010-10-24  6:16               ` Crypto Update for 2.6.37 Herbert Xu
       [not found]               ` <20101024061625.GA23715@gondor.apana.org.au>
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-08-04 14:04 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.36:

* HMAC support for Niagara2.
* Talitos ahash bug fix.
* Adds sysfs interface to padata/pcrypt.
* Fixes/clean-ups for padata/pcrypt.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexander Shishkin (1):
      crypto: testmgr - add an option to disable cryptoalgos' self-tests

Andrea Gelmini (1):
      crypto: des_s390 - Checkpatch cleanup

Dan Carpenter (2):
      crypto: mv_cesa - fixup error handling in mv_probe()
      padata: add parenthesis in MAX_SEQ_NR macro

Dan Kruchinin (3):
      padata: Make two separate cpumasks
      padata: Added sysfs primitives to padata subsystem
      pcrypt: Added sysfs interface to pcrypt

David S. Miller (4):
      n2_crypto: Kill n2_base_ctx and helpers.
      n2_crypto: Log algorithm success/failure in kernel log.
      n2_crypto: Make ahash parameterization explicit.
      n2_crypto: Add HMAC support.

Herbert Xu (2):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/crypto-2.6
      crypto: pcomp - Fix illegal Kconfig configuration

Huang Weiyi (1):
      crypto: omap - remove unused #include <linux/version.h>

Jan Glauber (2):
      crypto: des_s390: remove des3_ede128 mode
      crypto: des_s390: use generic weak key check

Joachim Fritschi (1):
      crypto: twofish: Rename twofish to twofish_generic and add an alias

Julia Lawall (1):
      crypto: Use ERR_CAST

Justin P. Mattock (1):
      crypto: hifn_795x - Remove unused ctx variable

Kulikov Vasiliy (1):
      hwrng: n2-drv - remove casts from void*

Lee Nipper (1):
      crypto: talitos - fix ahash for multiple of blocksize

Peter Huewe (1):
      crypto: geode_aes - Convert pci_table entries to PCI_VDEVICE (if PCI_ANY_ID is used)

Richard Kennedy (1):
      random: Reorder struct entropy_store to remove padding on 64bits

Steffen Klassert (17):
      padata: Check for valid padata instance on start
      padata: Block until the instance is unused on stop
      padata: Handle empty padata cpumasks
      padata: make padata_do_parallel to return zero on success
      padata: simplify serialization mechanism
      padata: update documentation
      padata: Fix cpu index counting
      padata: Allocate cpumask dependend recources in any case
      padata: Check for valid cpumasks
      crypto: pcrypt - Dont calulate a callback cpu on empty callback cpumask
      padata: Rename padata_alloc functions
      padata: Rearrange set_cpumask functions
      padata: Pass the padata cpumasks to the cpumask_change_notifier chain
      crypto: pcrypt - Rename pcrypt_instance
      crypto: pcrypt - Update pcrypt cpumask according to the padata cpumask notifier
      padata: Remove padata_get_cpumask
      padata: update API documentation

 Documentation/padata.txt                |   97 +++-
 arch/s390/crypto/Makefile               |    2 +-
 arch/s390/crypto/crypto_des.h           |    2 +-
 arch/s390/crypto/des_s390.c             |  238 +---------
 crypto/Kconfig                          |   15 +-
 crypto/Makefile                         |    4 +-
 crypto/algboss.c                        |    4 +
 crypto/authenc.c                        |    2 +-
 crypto/ctr.c                            |    2 +-
 crypto/pcrypt.c                         |  241 ++++++++---
 crypto/testmgr.c                        |   14 +
 crypto/{twofish.c => twofish_generic.c} |    1 +
 crypto/xts.c                            |    2 +-
 drivers/char/hw_random/n2-drv.c         |    2 +-
 drivers/char/random.c                   |    2 +-
 drivers/crypto/geode-aes.c              |    2 +-
 drivers/crypto/hifn_795x.c              |    4 -
 drivers/crypto/mv_cesa.c                |   10 +-
 drivers/crypto/n2_core.c                |  417 ++++++++++++-----
 drivers/crypto/omap-sham.c              |    1 -
 drivers/crypto/talitos.c                |   77 ++--
 include/linux/padata.h                  |  121 ++++--
 kernel/padata.c                         |  755 +++++++++++++++++++++++--------
 23 files changed, 1307 insertions(+), 708 deletions(-)

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-07-22  5:50                       ` Herbert Xu
  2010-07-23  5:17                         ` Lee Nipper
@ 2010-09-03  6:00                         ` Herbert Xu
  2010-09-03 11:07                           ` Crypto Fixes for 2.6.36 Herbert Xu
  2010-09-04 10:45                           ` Crypto Fixes for 2.6.35 Chuck Ebbert
  1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-09-03  6:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the new ahash walking code, as well as
the self-test disabling option.  The self-test disabling options
is now enabled by default as requested.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (2):
      crypto: testmgr - Fix test disabling option
      crypto: testmgr - Default to no tests

Szilveszter Ördög (1):
      crypto: hash - Fix handling of small unaligned buffers

 crypto/Kconfig   |    8 ++++----
 crypto/ahash.c   |    7 +++++--
 crypto/algboss.c |    8 ++++----
 crypto/testmgr.c |    4 ++--
 4 files changed, 15 insertions(+), 12 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.36
  2010-09-03  6:00                         ` Herbert Xu
@ 2010-09-03 11:07                           ` Herbert Xu
  2010-12-15 11:50                             ` Crypto Fixes for 2.6.37 Herbert Xu
  2010-09-04 10:45                           ` Crypto Fixes for 2.6.35 Chuck Ebbert
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-09-03 11:07 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, Sep 03, 2010 at 02:00:55PM +0800, Herbert Xu wrote:
> Hi Linus:
> 
> This push fixes a bug in the new ahash walking code, as well as
> the self-test disabling option.  The self-test disabling options
> is now enabled by default as requested.

I missed a changeset in the push request.  This also includes a
revert of a bogus cast removal patch.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (3):
      crypto: testmgr - Fix test disabling option
      crypto: testmgr - Default to no tests
      Revert "hwrng: n2-drv - remove casts from void*"

Szilveszter Ördög (1):
      crypto: hash - Fix handling of small unaligned buffers

 crypto/Kconfig                  |    8 ++++----
 crypto/ahash.c                  |    7 +++++--
 crypto/algboss.c                |    8 ++++----
 crypto/testmgr.c                |    4 ++--
 drivers/char/hw_random/n2-drv.c |    2 +-
 5 files changed, 16 insertions(+), 13 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-09-03  6:00                         ` Herbert Xu
  2010-09-03 11:07                           ` Crypto Fixes for 2.6.36 Herbert Xu
@ 2010-09-04 10:45                           ` Chuck Ebbert
  2010-09-04 12:22                             ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Chuck Ebbert @ 2010-09-04 10:45 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, 3 Sep 2010 14:00:55 +0800
Herbert Xu <herbert@gondor.hengli.com.au> wrote:

> Please pull from
> 
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> 
> or
> 
> master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> 
> 
> Herbert Xu (2):
>       crypto: testmgr - Fix test disabling option
>       crypto: testmgr - Default to no tests
> 
> Szilveszter Ördög (1):
>       crypto: hash - Fix handling of small unaligned buffers
> 

What happened to my minor fix?

 [ http://marc.info/?l=linux-crypto-vger&m=128311860504202&w=2 ]

I never got a reply about it.

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.35
  2010-09-04 10:45                           ` Crypto Fixes for 2.6.35 Chuck Ebbert
@ 2010-09-04 12:22                             ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-09-04 12:22 UTC (permalink / raw)
  To: Chuck Ebbert
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sat, Sep 04, 2010 at 06:45:01AM -0400, Chuck Ebbert wrote:
> On Fri, 3 Sep 2010 14:00:55 +0800
> Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> 
> > Please pull from
> > 
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> > 
> > or
> > 
> > master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> > 
> > 
> > Herbert Xu (2):
> >       crypto: testmgr - Fix test disabling option
> >       crypto: testmgr - Default to no tests
> > 
> > Szilveszter Ördög (1):
> >       crypto: hash - Fix handling of small unaligned buffers
> > 
> 
> What happened to my minor fix?
> 
>  [ http://marc.info/?l=linux-crypto-vger&m=128311860504202&w=2 ]
> 
> I never got a reply about it.

Hmm I did send you a reply.

Anyway it's in cryptodev-2.6.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.37
  2010-08-04 14:04             ` Crypto Update for 2.6.36 Herbert Xu
@ 2010-10-24  6:16               ` Herbert Xu
       [not found]               ` <20101024061625.GA23715@gondor.apana.org.au>
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-10-24  6:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.37:

* cryptd now supports AEAD.
* OMAP2/3 AES support.
* Mark Steffen Klassert as maintainer for padata/pcrypt.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Adrian Hoban (1):
      crypto: cryptd - Adding the AEAD interface type support to cryptd

Chuck Ebbert (1):
      crypto: fips - FIPS requires algorithm self-tests

David S. Miller (1):
      crypto: n2_crypto - Niagara2 driver needs to depend upon CRYPTO_DES

Dmitry Kasatkin (2):
      crypto: updates to enable omap aes
      crypto: omap-aes - OMAP2/3 AES hw accelerator driver

Justin P. Mattock (1):
      crypto: Kconfig - update broken web addresses

Kim Phillips (3):
      crypto: talitos - fix warning: 'alg' may be used uninitialized in this function
      crypto: talitos - fix checkpatch warning
      crypto: talitos - sparse check endian fixes

Namhyung Kim (1):
      padata: add missing __percpu markup in include/linux/padata.h

Samu Onkalo (1):
      crypto: omap-sham - Adjust DMA parameters

Steffen Klassert (1):
      MAINTAINERS: Add maintainer entries for padata/pcrypt

Tejun Heo (1):
      crypto: hifn_795x - use cancel_delayed_work_sync()

Tracey Dent (1):
      crypto: Makefile - replace the use of <module>-objs with <module>-y

 MAINTAINERS                          |   16 +
 arch/arm/mach-omap2/clock2420_data.c |    2 +-
 arch/arm/mach-omap2/clock2430_data.c |    2 +-
 arch/arm/mach-omap2/clock3xxx_data.c |    2 +-
 arch/arm/mach-omap2/devices.c        |   71 +++
 crypto/Kconfig                       |   21 +-
 crypto/cryptd.c                      |  206 ++++++++-
 drivers/crypto/Kconfig               |    9 +
 drivers/crypto/Makefile              |    3 +-
 drivers/crypto/amcc/Makefile         |    2 +-
 drivers/crypto/hifn_795x.c           |    3 +-
 drivers/crypto/omap-aes.c            |  948 ++++++++++++++++++++++++++++++++++
 drivers/crypto/omap-sham.c           |    6 +-
 drivers/crypto/talitos.c             |   29 +-
 include/crypto/cryptd.h              |   24 +
 include/linux/padata.h               |    4 +-
 16 files changed, 1310 insertions(+), 38 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.37
       [not found]             ` <20100201195204.GA6953@gondor.apana.org.au>
  2010-03-05  7:10               ` Crypto Fixes for 2.6.34 Herbert Xu
       [not found]               ` <20100305071043.GA3548@gondor.apana.org.au>
@ 2010-11-13 12:59               ` Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-11-13 12:59 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a couple of bugs in hardware crypto support:

* VIA Padlock had a serious problem dealing with odd-block-sized
  input for AES-CBC which causes memory overwrites beyond the
  end of the output buffer.  Luckily the main user which is IPsec
  has plenty of padding that avoids any serious consequences.
* Null check on the wrong variable in Sparc n2.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: padlock - Fix AES-CBC handling on odd-block-sized input

Nicolas Kaiser (1):
      crypto: n2 - dubious error check

 drivers/crypto/n2_core.c     |    2 +-
 drivers/crypto/padlock-aes.c |    2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.37
  2010-09-03 11:07                           ` Crypto Fixes for 2.6.36 Herbert Xu
@ 2010-12-15 11:50                             ` Herbert Xu
  2010-12-15 20:40                               ` Linus Torvalds
                                                 ` (2 more replies)
  0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2010-12-15 11:50 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem under certain configurations due
to a missing include.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Randy Dunlap (1):
      crypto: ghash-intel - ghash-clmulni-intel_glue needs err.h

 arch/x86/crypto/ghash-clmulni-intel_glue.c |    1 +
 1 files changed, 1 insertions(+), 0 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.37
  2010-12-15 11:50                             ` Crypto Fixes for 2.6.37 Herbert Xu
@ 2010-12-15 20:40                               ` Linus Torvalds
  2010-12-16  0:49                                 ` Herbert Xu
  2011-02-16  5:39                               ` Crypto Fixes for 2.6.38 Herbert Xu
       [not found]                               ` <20110216053911.GA10999@gondor.apana.org.au>
  2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2010-12-15 20:40 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Dec 15, 2010 at 3:50 AM, Herbert Xu
<herbert@gondor.hengli.com.au> wrote:
>
> This push fixes a build problem under certain configurations due
> to a missing include.
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

You have a bad repo. Git says:

  fatal: loose object 52f6c5ad430e41736133acac179607b224eaaa11 (stored
in ./objects/52/f6c5ad430e41736133acac179607b224eaaa11) is corrupted

and it doesn't really seem to be corrupt as much as just unreadable
(ie you've made it readable only by yourself).

There's a few other objects like that too. How do you push to your
repo, and what changed?

                              Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.37
  2010-12-15 20:40                               ` Linus Torvalds
@ 2010-12-16  0:49                                 ` Herbert Xu
  2010-12-16  0:58                                   ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-12-16  0:49 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Dec 15, 2010 at 12:40:48PM -0800, Linus Torvalds wrote:
>
> There's a few other objects like that too. How do you push to your
> repo, and what changed?

Oops, I've fixed that now.  I use rsync to copy files across so
it's my end that has changed.  And indeed I've just done an upgrade.
Sorry.
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 2.6.37
  2010-12-16  0:49                                 ` Herbert Xu
@ 2010-12-16  0:58                                   ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-12-16  0:58 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Dec 16, 2010 at 08:49:38AM +0800, Herbert Xu wrote:
> On Wed, Dec 15, 2010 at 12:40:48PM -0800, Linus Torvalds wrote:
> >
> > There's a few other objects like that too. How do you push to your
> > repo, and what changed?
> 
> Oops, I've fixed that now.  I use rsync to copy files across so
> it's my end that has changed.  And indeed I've just done an upgrade.
> Sorry.

OK it should be fixed for got now.  I suspect what has changed
is that git is now using my umask by default.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.38
       [not found]               ` <20101024061625.GA23715@gondor.apana.org.au>
@ 2011-01-06  0:01                 ` Herbert Xu
  2011-01-06 18:05                   ` Linus Torvalds
                                     ` (2 more replies)
  0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06  0:01 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.38:

* Crypto API interface for user-space (hash + skcipher)
* Fixes for new OMAP driver.
* 32-bit support in aesni-intel.
* GCM support in aesni-intel.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Adrian Hoban (1):
      crypto: rfc4106 - Extending the RC4106 AES-GCM test vectors

Adrian-Ken Rueegsegger (1):
      crypto: ripemd - Set module author and update email address

Dmitry Kasatkin (15):
      crypto: omap-sham - uses digest buffer in request context
      crypto: omap-sham - DMA initialization fixes for off mode
      crypto: omap-sham - error handling improved
      crypto: omap-sham - removed redundunt locking
      crypto: omap-sham - crypto_ahash_final() now not need to be called.
      crypto: omap-sham - hash-in-progress is stored in hw format
      crypto: omap-sham - FLAGS_FIRST is redundant and removed
      crypto: omap-sham - zero-copy scatterlist handling
      crypto: omap-aes - DMA initialization fixes for OMAP off mode
      crypto: omap-aes - redundant locking is removed
      crypto: omap-aes - error handling implementation improved
      crypto: omap-aes - unnecessary code removed
      crypto: omap-aes - initialize aes module once per request
      crypto: omap-aes - checkpatch --file warning fixes
      crypto: omap-sham - backlog handling fix

Herbert Xu (10):
      crypto: hash - Fix async import on shash algorithm
      net - Add AF_ALG macros
      crypto: af_alg - User-space interface for Crypto API
      crypto: algif_hash - User-space interface for hash operations
      crypto: algif_skcipher - User-space interface for skcipher operations
      crypto: algif_skcipher - Pass on error from af_alg_make_sg
      crypto: af_alg - Add dependency on NET
      crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned
      crypto: algif_skcipher - Handle unaligned receive buffer
      crypto: gf128mul - Remove experimental tag

Joe Perches (1):
      crypto: Use vzalloc

Mathias Krause (2):
      crypto: aesni-intel - Ported implementation to x86-32
      crypto: aesni-intel - Fixed build error on x86-32

Miloslav Trmač (3):
      include: Install linux/if_alg.h for user-space crypto API
      net: Add missing lockdep class names for af_alg
      crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets

Nicolas Kaiser (1):
      crypto: cast5 - simplify if-statements

Randy Dunlap (1):
      crypto: af_alg - fix af_alg memory_allocated data type

Roel Kluin (1):
      crypto: mv_cesa - dont return PTR_ERR() of wrong pointer

Steffen Klassert (2):
      crypto: scatterwalk - Add scatterwalk_crypto_chain helper
      crypto: Use scatterwalk_crypto_chain

Tadeusz Struk (2):
      crypto: aesni-intel - RFC4106 AES-GCM Driver Using Intel New Instructions
      crypto: aesni-intel - Fixed build with binutils 2.16

Tejun Heo (1):
      crypto: mark crypto workqueues CPU_INTENSIVE

Tracey Dent (1):
      crypto: Makefile clean up

 arch/x86/crypto/aesni-intel_asm.S  | 1832 +++++++++++++++++++++++++++++++++++-
 arch/x86/crypto/aesni-intel_glue.c |  540 +++++++++++-
 crypto/Kconfig                     |   34 +-
 crypto/Makefile                    |   17 +-
 crypto/af_alg.c                    |  483 ++++++++++
 crypto/algif_hash.c                |  319 +++++++
 crypto/algif_skcipher.c            |  632 +++++++++++++
 crypto/authenc.c                   |   22 +-
 crypto/cast5.c                     |   74 +-
 crypto/crypto_wq.c                 |    3 +-
 crypto/deflate.c                   |    3 +-
 crypto/eseqiv.c                    |   18 +-
 crypto/gcm.c                       |   19 +-
 crypto/pcrypt.c                    |    3 +-
 crypto/rmd128.c                    |    3 +-
 crypto/rmd160.c                    |    3 +-
 crypto/rmd256.c                    |    3 +-
 crypto/rmd320.c                    |    3 +-
 crypto/shash.c                     |    8 +-
 crypto/tcrypt.c                    |   11 +
 crypto/testmgr.c                   |   24 +
 crypto/testmgr.h                   |  361 +++++++
 crypto/zlib.c                      |    3 +-
 drivers/crypto/mv_cesa.c           |    2 +-
 drivers/crypto/omap-aes.c          |  260 +++---
 drivers/crypto/omap-sham.c         |  374 +++++----
 include/crypto/if_alg.h            |   92 ++
 include/crypto/scatterwalk.h       |   15 +
 include/linux/Kbuild               |    1 +
 include/linux/if_alg.h             |   40 +
 include/linux/socket.h             |    5 +-
 net/core/sock.c                    |    6 +-
 32 files changed, 4763 insertions(+), 450 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06  0:01                 ` Crypto Update for 2.6.38 Herbert Xu
@ 2011-01-06 18:05                   ` Linus Torvalds
  2011-01-06 21:16                     ` Herbert Xu
  2011-01-13  1:44                   ` Herbert Xu
  2011-03-15 14:59                   ` Crypto Update for 2.6.39 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 18:05 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Jan 5, 2011 at 4:01 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
>
> * Crypto API interface for user-space (hash + skcipher)

Is there really any point to this? And can we get more explanation of
what the interface is, and who would use it?

If you need crypto in user space, it's almost invariably better done
in user space. If the CPU can do crypto on its own, and doesn't expose
those instructions to user space, it's just a stupid CPU - and the
user/kernel transfer is likely going to make it slower than a pure
software approach for any but the biggest transfers.

And if the crypto engine is off-chip, the sw version is going to be
faster anyway except for possible async versions that are hard to
interface to user space.

So I really need more convincing about the whole user-space interface.
Adding new interfaces willy-nilly isn't a good idea. They need damn
good reasons.

                                      Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 18:05                   ` Linus Torvalds
@ 2011-01-06 21:16                     ` Herbert Xu
  2011-01-06 21:23                       ` Linus Torvalds
  2011-01-06 21:46                       ` Pavel Roskin
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 21:16 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 10:05:46AM -0800, Linus Torvalds wrote:
>
> Is there really any point to this? And can we get more explanation of
> what the interface is, and who would use it?

I think you've answered it yourself in the third paragraph :)

> If you need crypto in user space, it's almost invariably better done
> in user space. If the CPU can do crypto on its own, and doesn't expose
> those instructions to user space, it's just a stupid CPU - and the
> user/kernel transfer is likely going to make it slower than a pure
> software approach for any but the biggest transfers.

I agree completely.

> And if the crypto engine is off-chip, the sw version is going to be
> faster anyway except for possible async versions that are hard to
> interface to user space.
> 
> So I really need more convincing about the whole user-space interface.
> Adding new interfaces willy-nilly isn't a good idea. They need damn
> good reasons.

Right.  This purpose of this interface is to access the async
hardware crypto drivers that we have added over the past years.

For a modern x86-64 CPU it isn't interesting at all.  It's mainly
for other architectures where the CPU may not be able to keep up
with say 10Gb/s IPsec traffic and the encryption and/or hashing
must be offloaded.

This is also why only hash and skcipher are supported as they
are the main algorithm types supported by teh current async
drivers in the kernel.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 21:16                     ` Herbert Xu
@ 2011-01-06 21:23                       ` Linus Torvalds
  2011-01-06 21:39                         ` Herbert Xu
  2011-01-06 21:46                       ` Pavel Roskin
  1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 21:23 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 6, 2011 at 1:16 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> On Thu, Jan 06, 2011 at 10:05:46AM -0800, Linus Torvalds wrote:
>>
>> Is there really any point to this? And can we get more explanation of
>> what the interface is, and who would use it?
>
> I think you've answered it yourself in the third paragraph :)

No I didn't.

What part of "can we get more explanation of what the interface is" is unclear?

Explanations of interface. Code. Who uses it? What are the actual
performance benefits on real code?

Quite frankly, asynchronous external devices using DMA or similar are
seldom real performance improvements. The bus and cache traffic tends
to overwhelm any other advantage, and commonly the result is (a) lower
performance with (b) better-looking profiles.

But "better-looking profiles" isn't actually a real advantage.

And I really do want to hear about new kernel interfaces. What _are_
the interfaces, and what are the advantages to them.

                     Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 21:23                       ` Linus Torvalds
@ 2011-01-06 21:39                         ` Herbert Xu
  2011-01-06 22:13                           ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 21:39 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 01:23:19PM -0800, Linus Torvalds wrote:
>
> Explanations of interface. Code. Who uses it? What are the actual
> performance benefits on real code?

You snipped out the bit in my reply where I expanded on it:

: Right.  This purpose of this interface is to access the async
: hardware crypto drivers that we have added over the past years.
:
: For a modern x86-64 CPU it isn't interesting at all.  It's mainly
: for other architectures where the CPU may not be able to keep up
: with say 10Gb/s IPsec traffic and the encryption and/or hashing
: must be offloaded.
:
: This is also why only hash and skcipher are supported as they
: are the main algorithm types supported by teh current async
: drivers in the kernel.

The interface is meant to be used by those whose CPU either cannot
provide adequate performance for encryption/hashing, or where they
need to preverse the CPU power for other tasks.  This is most
likely to be used on a non-x86 architecture, as most of our async
crypto drivers are for non-x86 architectures.

Users can be anything performing bulk encryptiong/hashing in user-
space, e.g., SSL (although there are plans to implement SSL in
the kernel as well), SSH, etc.

Here is the original cover email for the patches:

: On Tue, Sep 07, 2010 at 04:42:13PM +0800, Herbert Xu wrote:
: > 
: > This is what I am proposing for the Crypto API user-interface.
: > 
: > Note that this is the interface for operations.  There will be
: > a separate interface (most likely netlink) for configuring crypto
: > algorithms, e.g., picking a specific AES implementation as the
: > system default.
:
: OK I've gone ahead and implemented the user-space API for hashes
: and ciphers.
:
: To recap this interface is designed to allow user-space programs
: to access hardware cryptographic accelerators that we have added
: to the kernel.
:
: The intended usage scenario is where a large amount of data needs
: to be processed where the benefits offered by hardware acceleration
: that is normally unavailable in user-space (as opposed to ones
: such as the Intel AES instruction which may be used directly from
: user-space) outweigh the overhead of going through the kernel.
:
: In order to further minimise the overhead in these cases, this
: interface offers the option of avoiding copying data between
: user-space and the kernel where possible and appropriate.  For
: ciphers this means the use of the splice(2) interface instead of
: sendmsg(2)
:
: Here is a sample hash program (note that these only illustrate
: what the interface looks like and are not meant to be good examples
: of coding :)
:
: int main(void)
: {
: 	int opfd;
: 	int tfmfd;
: 	struct sockaddr_alg sa = {
: 		.salg_family = AF_ALG,
: 		.salg_type = "hash",
: 		.salg_name = "sha1"
: 	};
: 	char buf[20];
: 	int i;
:
: 	tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);
:
: 	bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));
:
: 	opfd = accept(tfmfd, NULL, 0);
:
: 	write(opfd, "abc", 3);
: 	read(opfd, buf, 20);
:
: 	for (i = 0; i < 20; i++) {
: 		printf("%02x", (unsigned char)buf[i]);
: 	}
: 	printf("\n");
:
: 	close(opfd);
: 	close(tfmfd);
:
: 	return 0;
: }
:
: And here is one for ciphers:
:
: int main(void)
: {
: 	int opfd;
: 	int tfmfd;
: 	struct sockaddr_alg sa = {
: 		.salg_family = AF_ALG,
: 		.salg_type = "skcipher",
: 		.salg_name = "cbc(aes)"
: 	};
: 	struct msghdr msg = {};
: 	struct cmsghdr *cmsg;
: 	char cbuf[CMSG_SPACE(4) + CMSG_SPACE(20)];
: 	char buf[16];
: 	struct af_alg_iv *iv;
: 	struct iovec iov;
: 	int i;
:
: 	tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);
:
: 	bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));
:
: 	setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY,
: 		   "\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
: 		   "\x51\x2e\x03\xd5\x34\x12\x00\x06", 16);
:
: 	opfd = accept(tfmfd, NULL, 0);
:
: 	msg.msg_control = cbuf;
: 	msg.msg_controllen = sizeof(cbuf);
:
: 	cmsg = CMSG_FIRSTHDR(&msg);
: 	cmsg->cmsg_level = SOL_ALG;
: 	cmsg->cmsg_type = ALG_SET_OP;
: 	cmsg->cmsg_len = CMSG_LEN(4);
: 	*(__u32 *)CMSG_DATA(cmsg) = ALG_OP_ENCRYPT;
:
: 	cmsg = CMSG_NXTHDR(&msg, cmsg);
: 	cmsg->cmsg_level = SOL_ALG;
: 	cmsg->cmsg_type = ALG_SET_IV;
: 	cmsg->cmsg_len = CMSG_LEN(20);
: 	iv = (void *)CMSG_DATA(cmsg);
: 	iv->ivlen = 16;
: 	memcpy(iv->iv, "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
: 		       "\xb4\x22\xda\x80\x2c\x9f\xac\x41", 16);
:
: 	iov.iov_base = "Single block msg";
: 	iov.iov_len = 16;
:
: 	msg.msg_iov = &iov;
: 	msg.msg_iovlen = 1;
:
: 	sendmsg(opfd, &msg, 0);
: 	read(opfd, buf, 16);
:
: 	for (i = 0; i < 16; i++) {
: 		printf("%02x", (unsigned char)buf[i]);
: 	}
: 	printf("\n");
:
: 	close(opfd);
: 	close(tfmfd);
:
: 	return 0;
: }

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 21:16                     ` Herbert Xu
  2011-01-06 21:23                       ` Linus Torvalds
@ 2011-01-06 21:46                       ` Pavel Roskin
  2011-01-06 21:49                         ` Herbert Xu
  2011-01-06 23:02                         ` Mihai Donțu
  1 sibling, 2 replies; 246+ messages in thread
From: Pavel Roskin @ 2011-01-06 21:46 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On 01/06/2011 04:16 PM, Herbert Xu wrote:

> This is also why only hash and skcipher are supported as they
> are the main algorithm types supported by teh current async
> drivers in the kernel.

Are there any chances AEAD will be supported?  Is the API extendable to 
allow that?

If I remember correctly, the original patch was simply a port of FreeBSD 
/dev/crypto, which doesn't support AEAD.

-- 
Regards,
Pavel Roskin

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 21:46                       ` Pavel Roskin
@ 2011-01-06 21:49                         ` Herbert Xu
  2011-01-06 23:02                         ` Mihai Donțu
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 21:49 UTC (permalink / raw)
  To: Pavel Roskin
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 04:46:02PM -0500, Pavel Roskin wrote:
>
> Are there any chances AEAD will be supported?  Is the API extendable to  
> allow that?

Yes we can support AEAD.  However, as there weren't any existing
user-space users that could benefit immediately, I have not added
it at this point in time.

When combined-mode support in async hardware becomes more common
this could change of course.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 21:39                         ` Herbert Xu
@ 2011-01-06 22:13                           ` Linus Torvalds
  2011-01-06 22:30                             ` Herbert Xu
  2011-01-07 12:04                             ` Neil Horman
  0 siblings, 2 replies; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 22:13 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 6, 2011 at 1:39 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> On Thu, Jan 06, 2011 at 01:23:19PM -0800, Linus Torvalds wrote:
>>
>> Explanations of interface. Code. Who uses it? What are the actual
>> performance benefits on real code?
>
> You snipped out the bit in my reply where I expanded on it:

You didn't expand on it AT ALL.

You just mentioned "the interface". I haven't seen WHAT THAT INTERFACE IS!

How hard is that to understand?

> Here is the original cover email for the patches:

Ok, this is more like it. This is roughly what I wanted to see:

> : Here is a sample hash program (note that these only illustrate
> : what the interface looks like and are not meant to be good examples
> : of coding :)

But I'm still missing the part where you show that there is any actual
use case that makes sense, and that actually improves performance.
Maybe it's been posted somewhere else, but the thing is, you're asking
_me_ to pull, and as a result you need to convince _me_ that this is a
good idea. So if it's been posted/discussed extensively elsewhere,
please point to those discussions.

I really don't like adding interfaces that don't have hard uses
associated with them. We've done it in the past, and it tends to be a
morass and a bad idea. That's been true even when the idea has been my
own, and thus obviously genius-level and clearly the RightThing(tm),
like "splice()". And it's why I push back on new interfaces when I see
them.

Btw, it doesn't have to be about performance per se. Does this allow
people to use keys without actually _seeing_ those keys? Your example
implies that that is not the case, but that's actually one of the few
reasons to actually support a kernel crypto interface - the ability to
have private personal keys around, but not having to actually let
possibly untrusted programs see them.

For example of why something like that matters, I can well see myself
using some program to encrypt things. But maybe I don't trust that
program enough to give it my actual private keys. In that case, kernel
support is a real feature.

But in your example, it looks like you just give it the key. Which to
me means that you're totally missing one of the major reasons for
having a separate protection domain.

And that makes me think that the interface is bad. And that's why it's
a big change to go from "internal kernel crypto interface" to "actual
user-space interface to the kernel crypto engine". The first one can
be fixed. The second one cannot.

So I'm not necessarily hung up on "performance", but I am hung up on
"there needs to be a point", and "the interface needs to be
-correct-". Performance would be one such point. Not just 'the
hardware is there'. I know the hardware exists, but I'm not at all
convinced that DMA with all the cacheflushing will ever actully be
faster the the CPU. And if it can, I want to hear about the real-world
situation where it actually is used.

                Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:13                           ` Linus Torvalds
@ 2011-01-06 22:30                             ` Herbert Xu
  2011-01-06 22:33                               ` David Miller
  2011-01-06 22:43                               ` Linus Torvalds
  2011-01-07 12:04                             ` Neil Horman
  1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 22:30 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 02:13:17PM -0800, Linus Torvalds wrote:
> 
> But I'm still missing the part where you show that there is any actual
> use case that makes sense, and that actually improves performance.
> Maybe it's been posted somewhere else, but the thing is, you're asking
> _me_ to pull, and as a result you need to convince _me_ that this is a
> good idea. So if it's been posted/discussed extensively elsewhere,
> please point to those discussions.

The main use-case is bulk encryption/hashing in user-space.  For
example, on Sparc Niagara2 you need to use SPU (Stream Processing
Unit) in order to do crypto at 10Gb/s over the network.  Because
of the hardware design, it is difficult to make use of the SPU
directly in user-space, unless you dedicate the SPU to one single
thread/user.

That is why we need a crypto driver in the kernel as well as a
user-space interface exporting it, to make available a single
piece of hardware resource so that it may be used by multiple
users in user-space.

The same applies to most of the drivers in drivers/crypto, e.g.,
omap provides ARM crypto acceleration providing crypto throughput
that simply cannot be achieved by the CPU itself.

The actual encryption in user-space would be anything that is
done in bulk, such as SSH or SSL.  In fact, the intention is
to implement it just once in a library such as libssl where it
could then be used automatically by all appliations.

> But in your example, it looks like you just give it the key. Which to
> me means that you're totally missing one of the major reasons for
> having a separate protection domain.

Providing such separation is not the primary objective of this API,
which is providing user-space access to off-chip crypto hardware.

However, this is something that has been considered and can be
easily added.  The idea is to first add symmetric key storage
capability to the existing in-kernel keyring API.  Once that is
done we can easily add a new setsockopt to the crypto user-interface
that retrieves the key from the kernel keyring instead of getting
it directly from user-space.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:30                             ` Herbert Xu
@ 2011-01-06 22:33                               ` David Miller
  2011-01-06 22:43                               ` Linus Torvalds
  1 sibling, 0 replies; 246+ messages in thread
From: David Miller @ 2011-01-06 22:33 UTC (permalink / raw)
  To: herbert; +Cc: torvalds, linux-kernel, linux-crypto

From: Herbert Xu <herbert@gondor.apana.org.au>
Date: Fri, 7 Jan 2011 09:30:42 +1100

> On Thu, Jan 06, 2011 at 02:13:17PM -0800, Linus Torvalds wrote:
>> 
>> But I'm still missing the part where you show that there is any actual
>> use case that makes sense, and that actually improves performance.
>> Maybe it's been posted somewhere else, but the thing is, you're asking
>> _me_ to pull, and as a result you need to convince _me_ that this is a
>> good idea. So if it's been posted/discussed extensively elsewhere,
>> please point to those discussions.
> 
> The main use-case is bulk encryption/hashing in user-space.  For
> example, on Sparc Niagara2 you need to use SPU (Stream Processing
> Unit) in order to do crypto at 10Gb/s over the network.  Because
> of the hardware design, it is difficult to make use of the SPU
> directly in user-space, unless you dedicate the SPU to one single
> thread/user.

The N2 SPU is not accessible at all from userspace.

> However, this is something that has been considered and can be
> easily added.  The idea is to first add symmetric key storage
> capability to the existing in-kernel keyring API.  Once that is
> done we can easily add a new setsockopt to the crypto user-interface
> that retrieves the key from the kernel keyring instead of getting
> it directly from user-space.

That indeed would be real interesting.

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:30                             ` Herbert Xu
  2011-01-06 22:33                               ` David Miller
@ 2011-01-06 22:43                               ` Linus Torvalds
  2011-01-06 22:53                                 ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 22:43 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 6, 2011 at 2:30 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
>
> The main use-case is bulk encryption/hashing in user-space.  For
> example, on Sparc Niagara2 you need to use SPU (Stream Processing
> Unit) in order to do crypto at 10Gb/s over the network.

Umm. But doesn't that require that the data then be sent to the network?

Why would a user-space -> crypto engine -> user space -> network chip
thing ever be good enough? Niagara is so slow that the whole bounce
thing will totally negate all the SPU advantages.

Your interface doesn't seem to support the use case that you actually
want, which is to avoid the bouncing back and forth between user space
buffers.

And if you bounce back and forth, I bet you can't get that 10Gb/s anyway.

Can you do the "bypass directly to the TCP stream" with the interface
you added? It isn't at all obvious how it would work.

So let me repeat ONE MORE TIME:

 - I understand that your interface can use the hw that exists

 - but I still want real-world use cases to show that it actually
works and makes sense in practice.

Don't give me "we could use the SPU" crap. Give me "this program
actually uses the SPU and gets better performance thanks to it, and
here are the numbers".

                         Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:43                               ` Linus Torvalds
@ 2011-01-06 22:53                                 ` Herbert Xu
  2011-01-06 23:25                                   ` Linus Torvalds
  2011-01-07  2:39                                   ` Pavel Roskin
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 22:53 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 02:43:35PM -0800, Linus Torvalds wrote:
>
> Can you do the "bypass directly to the TCP stream" with the interface
> you added? It isn't at all obvious how it would work.

Yes it can.  The interface allows zero-copy in both directions
using the splice interface.  Here is a sample program demonstrating
zero-copy in-place encryption.  It doesn't send the result over TCP
but I'm sure you can imagine what that would look like.

Note that the final read(2) looks like it copies, but it doesn't.
The read(2) will setup SG lists using the user-space address and
place the encryption result in there directly.  In this case as
the source/destination addresses are identical, it performs in-place
encryption.

#include <fcntl.h>
#include <stdio.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <linux/splice.h>
#include <linux/types.h>
#include <linux/af_alg.h>

static char buf[4096] __attribute__((__aligned__(4096)));

int main(void)
{
	int opfd;
	int tfmfd;
	struct sockaddr_alg sa = {
		.salg_family = AF_ALG,
		.salg_type = "skcipher",
		.salg_name = "cbc(aes)"
	};
	struct msghdr msg = {};
	struct cmsghdr *cmsg;
	char cbuf[CMSG_SPACE(4) + CMSG_SPACE(20)];
	struct aes_iv {
		__u32 len;
		__u8 iv[16];
	} *iv;
	struct iovec iov;
	int i;
	int pipes[2];

	pipe(pipes);

	tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);

	bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));

	setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY,
		   "\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
		   "\x51\x2e\x03\xd5\x34\x12\x00\x06", 16);

	opfd = accept(tfmfd, NULL, 0);

	msg.msg_control = cbuf;
	msg.msg_controllen = sizeof(cbuf);

	cmsg = CMSG_FIRSTHDR(&msg);
	cmsg->cmsg_level = SOL_ALG;
	cmsg->cmsg_type = ALG_SET_OP;
	cmsg->cmsg_len = CMSG_LEN(4);
	*(__u32 *)CMSG_DATA(cmsg) = ALG_OP_ENCRYPT;

	cmsg = CMSG_NXTHDR(&msg, cmsg);
	cmsg->cmsg_level = SOL_ALG;
	cmsg->cmsg_type = ALG_SET_IV;
	cmsg->cmsg_len = CMSG_LEN(20);
	iv = (void *)CMSG_DATA(cmsg);
	iv->len = 16;
	memcpy(iv->iv, "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
		       "\xb4\x22\xda\x80\x2c\x9f\xac\x41", 16);

	memcpy(buf, "Single block msg", 16);

	iov.iov_base = buf;
	iov.iov_len = 4096;

	msg.msg_iovlen = 0;
	msg.msg_flags = MSG_MORE;

	sendmsg(opfd, &msg, 0);
	vmsplice(pipes[1], &iov, 1, SPLICE_F_GIFT);
	splice(pipes[0], NULL, opfd, NULL, 16, 0);
	read(opfd, buf, 16);

	for (i = 0; i < 16; i++) {
		printf("%02x", (unsigned char)buf[i]);
	}
	printf("\n");

	close(opfd);
	close(tfmfd);

	return 0;

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 21:46                       ` Pavel Roskin
  2011-01-06 21:49                         ` Herbert Xu
@ 2011-01-06 23:02                         ` Mihai Donțu
  1 sibling, 0 replies; 246+ messages in thread
From: Mihai Donțu @ 2011-01-06 23:02 UTC (permalink / raw)
  To: Pavel Roskin
  Cc: Herbert Xu, Linus Torvalds, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Thursday 06 January 2011 23:46:02 Pavel Roskin wrote:
> On 01/06/2011 04:16 PM, Herbert Xu wrote:
> > This is also why only hash and skcipher are supported as they
> > are the main algorithm types supported by teh current async
> > drivers in the kernel.
> 
> Are there any chances AEAD will be supported?  Is the API extendable to
> allow that?
> 
> If I remember correctly, the original patch was simply a port of FreeBSD
> /dev/crypto, which doesn't support AEAD.

If it's meant to work like the FreeBSD /dev/crypto, then maybe this[1] paper 
is worth mentionning, which includes some performance numbers. There was a 
single thing that drew my attention, from "Drawbacks and problems [of 
userspace crypto]": "Lots of scary code-duplication".

[1] http://www.paeps.cx/pubs/crypto_acceleration/slides.pdf

-- 
Mihai Donțu

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:53                                 ` Herbert Xu
@ 2011-01-06 23:25                                   ` Linus Torvalds
  2011-01-07  0:14                                     ` Herbert Xu
  2011-01-07  2:39                                   ` Pavel Roskin
  1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 23:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 6, 2011 at 2:53 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> On Thu, Jan 06, 2011 at 02:43:35PM -0800, Linus Torvalds wrote:
>>
>> Can you do the "bypass directly to the TCP stream" with the interface
>> you added? It isn't at all obvious how it would work.
>
> Yes it can.  The interface allows zero-copy in both directions
> using the splice interface.  Here is a sample program demonstrating
> zero-copy in-place encryption.  It doesn't send the result over TCP
> but I'm sure you can imagine what that would look like.

Ok. So can we actually get numbers for this?

Put another way: I really really REALLY don't want to merge new
user-space interfaces that don't actually work in reality. But if this
allows direct encryption to a network interface, and it actually is
able to saturate 10Gb on niagara (unlike a user-mode encryption thing,
I assume, since those things are dog slow), then that would certainly
be a good real-life test.

But I really don't want to merge it unless it has had at least
real-life testing of actually doing better than regular sw user-space
encryption.

I realize that on PC's, it's unlikely to ever help. So I'm not asking
for "show me how this helps on my hardware". But I do want to get some
case on _some_ actual hardware where it works on a real load.

                    Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 23:25                                   ` Linus Torvalds
@ 2011-01-07  0:14                                     ` Herbert Xu
  2011-01-07  2:43                                       ` David Miller
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-01-07  0:14 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 03:25:32PM -0800, Linus Torvalds wrote:
>
> Ok. So can we actually get numbers for this?

As you alluded to, we need real non-x86 hardware to get some
proper numbers.  Unfortunately I'm currently a continent away
from my async hardware so all I can give you are software
numbers.

Anyway, here is a test program that does a set number (1024 * 1024)
of 4096-byte (total 4GB) encryptions with libssl and kernel crypto.
The result on my Core 2 (in a KVM VM FWIW) is:

lenny0:~# time ./test_crypto > /dev/null 

real    0m30.340s
user    0m0.172s
sys     0m30.166s
lenny0:~# time ./test_crypto software > /dev/null 

real    0m34.555s
user    0m34.550s
sys     0m0.004s
lenny0:~# 

I'm not claiming these numbers make any sense but this is just
a ballpark figure.

Dave, can you run this program on your N2 and see what it shows?

#include <fcntl.h>
#include <openssl/aes.h>
#include <stdio.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <linux/types.h>

#define AF_ALG 38
#define SOL_ALG 279

#define SPLICE_F_GIFT	(0x08)	/* pages passed in are a gift */

struct sockaddr_alg {
	__u16	salg_family;
	__u8	salg_type[14];
	__u32	salg_feat;
	__u32	salg_mask;
	__u8	salg_name[64];
};

struct af_alg_iv {
	__u32	ivlen;
	__u8	iv[0];
};

/* Socket options */
#define ALG_SET_KEY			1
#define ALG_SET_IV			2
#define ALG_SET_OP			3

/* Operations */
#define ALG_OP_DECRYPT			0
#define ALG_OP_ENCRYPT			1

static char buf[4096] __attribute__((__aligned__(4096)));

static void crypt_ssl(const char *key, char *iv, int i)
{
	AES_KEY akey;

	AES_set_encrypt_key(key, 128, &akey);

	while (i--)
		AES_cbc_encrypt(buf, buf, 4096, &akey, iv, 1);
}

static void crypt_kernel(const char *key, char *oiv, int i)
{
	int opfd;
	int tfmfd;
	struct sockaddr_alg sa = {
		.salg_family = AF_ALG,
		.salg_type = "skcipher",
		.salg_name = "cbc(aes)"
	};
	struct msghdr msg = {};
	struct cmsghdr *cmsg;
	char cbuf[CMSG_SPACE(4) + CMSG_SPACE(20)] = {};
	struct aes_iv {
		__u32 len;
		__u8 iv[16];
	} *iv;
	struct iovec iov;
	int pipes[2];

	pipe(pipes);

	tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);

	bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));

	setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY, key, 16);

	opfd = accept(tfmfd, NULL, 0);

	msg.msg_control = cbuf;
	msg.msg_controllen = sizeof(cbuf);

	cmsg = CMSG_FIRSTHDR(&msg);
	cmsg->cmsg_level = SOL_ALG;
	cmsg->cmsg_type = ALG_SET_OP;
	cmsg->cmsg_len = CMSG_LEN(4);
	*(__u32 *)CMSG_DATA(cmsg) = ALG_OP_ENCRYPT;

	cmsg = CMSG_NXTHDR(&msg, cmsg);
	cmsg->cmsg_level = SOL_ALG;
	cmsg->cmsg_type = ALG_SET_IV;
	cmsg->cmsg_len = CMSG_LEN(20);
	iv = (void *)CMSG_DATA(cmsg);
	iv->len = 16;
	memcpy(iv->iv, oiv, 16);

	iov.iov_base = buf;
	iov.iov_len = 4096;

	msg.msg_iovlen = 0;
	msg.msg_flags = MSG_MORE;

	while (i--) {
		sendmsg(opfd, &msg, 0);
		vmsplice(pipes[1], &iov, 1, SPLICE_F_GIFT);
		splice(pipes[0], NULL, opfd, NULL, 4096, 0);
		read(opfd, buf, 4096);
	}

	close(opfd);
	close(tfmfd);
	close(pipes[0]);
	close(pipes[1]);
}

int main(int argc, char **argv)
{
	int i;

	const char key[16] =
		"\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
		"\x51\x2e\x03\xd5\x34\x12\x00\x06";
	char iv[16] = 
		"\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
		"\xb4\x22\xda\x80\x2c\x9f\xac\x41";
	
	memcpy(buf, "Single block msg", 16);

	if (argc > 1)
		crypt_ssl(key, iv, 1024 * 1024);
	else
		crypt_kernel(key, iv, 1024 * 1024);

	for (i = 0; i < 4096; i++) {
		printf("%02x", (unsigned char)buf[i]);
	}
	printf("\n");

	return 0;
}

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:53                                 ` Herbert Xu
  2011-01-06 23:25                                   ` Linus Torvalds
@ 2011-01-07  2:39                                   ` Pavel Roskin
  2011-01-07  3:03                                     ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Pavel Roskin @ 2011-01-07  2:39 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Quoting Herbert Xu <herbert@gondor.apana.org.au>:

> 	setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY,
> 		   "\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
> 		   "\x51\x2e\x03\xd5\x34\x12\x00\x06", 16);

By the way, is it a good idea to use setsockopt() this way?  Some keys  
may be large.  And if AEAD is supported, will it use setsockopt() for  
the unencrypted authenticated data?

Maybe some variation of write() or sendto() would be more appropriate?

-- 
Regards,
Pavel Roskin

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-07  0:14                                     ` Herbert Xu
@ 2011-01-07  2:43                                       ` David Miller
  2011-01-07  3:04                                         ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: David Miller @ 2011-01-07  2:43 UTC (permalink / raw)
  To: herbert; +Cc: torvalds, linux-kernel, linux-crypto

From: Herbert Xu <herbert@gondor.apana.org.au>
Date: Fri, 7 Jan 2011 11:14:59 +1100

> Anyway, here is a test program that does a set number (1024 * 1024)
> of 4096-byte (total 4GB) encryptions with libssl and kernel crypto.
> The result on my Core 2 (in a KVM VM FWIW) is:
> 
> lenny0:~# time ./test_crypto > /dev/null 
> 
> real    0m30.340s
> user    0m0.172s
> sys     0m30.166s
> lenny0:~# time ./test_crypto software > /dev/null 
> 
> real    0m34.555s
> user    0m34.550s
> sys     0m0.004s
> lenny0:~# 
> 
> I'm not claiming these numbers make any sense but this is just
> a ballpark figure.
> 
> Dave, can you run this program on your N2 and see what it shows?

Sure, here goes, BTW I had to change the buffer size to 8192 since
vmsplice requires page aligned operation (I was getting -EINVAL
otherwise):

davem@maramba:~$ time ./crypto_user_test >/dev/null

real		 0m46.586s
user		 0m3.280s
sys		 0m43.230s
davem@maramba:~$ time ./crypto_user_test software >/dev/null

real		 10m40.336s
user		 10m40.540s
sys		 0m0.000s
davem@maramba:~$   

What's that, something like a factor of 13 faster? :-)

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-07  2:39                                   ` Pavel Roskin
@ 2011-01-07  3:03                                     ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-07  3:03 UTC (permalink / raw)
  To: Pavel Roskin
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 09:39:28PM -0500, Pavel Roskin wrote:
>
> By the way, is it a good idea to use setsockopt() this way?  Some keys  
> may be large.  And if AEAD is supported, will it use setsockopt() for  
> the unencrypted authenticated data?

For large keys (i.e., asymmetric key crypto) the kernel keyring API
would be the obvious way of passing them around.

For AEAD the AD would be passed around through send/splice.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-07  2:43                                       ` David Miller
@ 2011-01-07  3:04                                         ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-07  3:04 UTC (permalink / raw)
  To: David Miller; +Cc: torvalds, linux-kernel, linux-crypto

On Thu, Jan 06, 2011 at 06:43:02PM -0800, David Miller wrote:
>
> davem@maramba:~$ time ./crypto_user_test >/dev/null
> 
> real		 0m46.586s
> user		 0m3.280s
> sys		 0m43.230s
> davem@maramba:~$ time ./crypto_user_test software >/dev/null
> 
> real		 10m40.336s
> user		 10m40.540s
> sys		 0m0.000s
> davem@maramba:~$   
> 
> What's that, something like a factor of 13 faster? :-)

Heh, I missed the leading 1 in your second result and was about
to spill my drink :)

Thanks!
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06 22:13                           ` Linus Torvalds
  2011-01-06 22:30                             ` Herbert Xu
@ 2011-01-07 12:04                             ` Neil Horman
  2011-01-08 13:23                               ` Nikos Mavrogiannopoulos
  1 sibling, 1 reply; 246+ messages in thread
From: Neil Horman @ 2011-01-07 12:04 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Thu, Jan 06, 2011 at 02:13:17PM -0800, Linus Torvalds wrote:
> On Thu, Jan 6, 2011 at 1:39 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> > On Thu, Jan 06, 2011 at 01:23:19PM -0800, Linus Torvalds wrote:
> >>
> >> Explanations of interface. Code. Who uses it? What are the actual
> >> performance benefits on real code?
> >
> > You snipped out the bit in my reply where I expanded on it:
> 
> You didn't expand on it AT ALL.
> 
> You just mentioned "the interface". I haven't seen WHAT THAT INTERFACE IS!
> 
> How hard is that to understand?
> 
> > Here is the original cover email for the patches:
> 
> Ok, this is more like it. This is roughly what I wanted to see:
> 
> > : Here is a sample hash program (note that these only illustrate
> > : what the interface looks like and are not meant to be good examples
> > : of coding :)
> 
> But I'm still missing the part where you show that there is any actual
> use case that makes sense, and that actually improves performance.
> Maybe it's been posted somewhere else, but the thing is, you're asking
> _me_ to pull, and as a result you need to convince _me_ that this is a
> good idea. So if it's been posted/discussed extensively elsewhere,
> please point to those discussions.
> 
> I really don't like adding interfaces that don't have hard uses
> associated with them. We've done it in the past, and it tends to be a
> morass and a bad idea. That's been true even when the idea has been my
> own, and thus obviously genius-level and clearly the RightThing(tm),
> like "splice()". And it's why I push back on new interfaces when I see
> them.
> 
> Btw, it doesn't have to be about performance per se. Does this allow
> people to use keys without actually _seeing_ those keys? Your example
> implies that that is not the case, but that's actually one of the few
> reasons to actually support a kernel crypto interface - the ability to
> have private personal keys around, but not having to actually let
> possibly untrusted programs see them.
> 
This actually is an indirect feature of this interface.  Using it, you can open
a algorithm socket, select a specific alg, assign a key, and then pass that
socket descriptor over a unix socket to an another process using an
SCM_RIGHTS ancilliary message.  The receiving process can then use children
acceppted from that passed socket to preform the configured crypto operation
without any knoweldge of the keys used in it.  I can write a demo app if you
like.

Regards
Neil
 

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-07 12:04                             ` Neil Horman
@ 2011-01-08 13:23                               ` Nikos Mavrogiannopoulos
  2011-01-10 12:03                                 ` Neil Horman
  0 siblings, 1 reply; 246+ messages in thread
From: Nikos Mavrogiannopoulos @ 2011-01-08 13:23 UTC (permalink / raw)
  To: Neil Horman
  Cc: Linus Torvalds, Herbert Xu, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Jan 7, 2011 at 2:04 PM, Neil Horman <nhorman@tuxdriver.com> wrote:

>> Btw, it doesn't have to be about performance per se. Does this allow
>> people to use keys without actually _seeing_ those keys? Your example
>> implies that that is not the case, but that's actually one of the few
>> reasons to actually support a kernel crypto interface - the ability to
>> have private personal keys around, but not having to actually let
>> possibly untrusted programs see them.
> This actually is an indirect feature of this interface.  Using it, you can open
> a algorithm socket, select a specific alg, assign a key, and then pass that
> socket descriptor over a unix socket to an another process using an
> SCM_RIGHTS ancilliary message.  The receiving process can then use children
> acceppted from that passed socket to preform the configured crypto operation
> without any knoweldge of the keys used in it.  I can write a demo app if you
> like.

Several things have to be considered when extending an interface like
that. For example, do the algorithm implementations protect against
timing attacks, or keys can be recovered, using them? What is the
purpose of cryptographic key separation? If long term keys are to be
protected, then it makes sense to support RSA, DSA keys in addition to
symmetric keys (e.g. microsoft only supports assymetric keys for
separation, since symmetric ones are rarely used as long term keys -
[in TLS-PSK]).

Some of these issues are discussed in my report on a user-space crypto
interface that specifically targeted separation and speed at [0].

regards,
Nikos

[0]. https://www.cosic.esat.kuleuven.be/publications/article-1490.pdf

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-08 13:23                               ` Nikos Mavrogiannopoulos
@ 2011-01-10 12:03                                 ` Neil Horman
  2011-01-10 19:05                                   ` Dag Arne Osvik
  0 siblings, 1 reply; 246+ messages in thread
From: Neil Horman @ 2011-01-10 12:03 UTC (permalink / raw)
  To: Nikos Mavrogiannopoulos
  Cc: Linus Torvalds, Herbert Xu, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Sat, Jan 08, 2011 at 03:23:04PM +0200, Nikos Mavrogiannopoulos wrote:
> On Fri, Jan 7, 2011 at 2:04 PM, Neil Horman <nhorman@tuxdriver.com> wrote:
> 
> >> Btw, it doesn't have to be about performance per se. Does this allow
> >> people to use keys without actually _seeing_ those keys? Your example
> >> implies that that is not the case, but that's actually one of the few
> >> reasons to actually support a kernel crypto interface - the ability to
> >> have private personal keys around, but not having to actually let
> >> possibly untrusted programs see them.
> > This actually is an indirect feature of this interface.  Using it, you can open
> > a algorithm socket, select a specific alg, assign a key, and then pass that
> > socket descriptor over a unix socket to an another process using an
> > SCM_RIGHTS ancilliary message.  The receiving process can then use children
> > acceppted from that passed socket to preform the configured crypto operation
> > without any knoweldge of the keys used in it.  I can write a demo app if you
> > like.
> 
> Several things have to be considered when extending an interface like
> that. For example, do the algorithm implementations protect against
> timing attacks, or keys can be recovered, using them? What is the
No, the kernel does not implement any protection against timing attacks in the
algorithms per-se, but preforming a timing attack against a kernel crypto
operation is going to be near impossible anyway, as precise timing measurements
are going to get obscured by interupts, scheduling jitter, lock contention, and
various other factors that will make measuring syscall time fairly useless.

> purpose of cryptographic key separation? If long term keys are to be
My only purpose was to answer Linus' question.  He wondered if other user space
programs could use instances of cyrpto algs over this interface without needing
to hold key data.  I was illustrating how that could be done.

Neil

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-10 12:03                                 ` Neil Horman
@ 2011-01-10 19:05                                   ` Dag Arne Osvik
  0 siblings, 0 replies; 246+ messages in thread
From: Dag Arne Osvik @ 2011-01-10 19:05 UTC (permalink / raw)
  To: Neil Horman, Nikos Mavrogiannopoulos
  Cc: Linus Torvalds, Herbert Xu, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

> On Sat, Jan 08, 2011 at 03:23:04PM +0200, Nikos Mavrogiannopoulos wrote:
> > On Fri, Jan 7, 2011 at 2:04 PM, Neil Horman <nhorman@tuxdriver.com>
> > wrote:
> > 
> > > > Btw, it doesn't have to be about performance per se. Does this
> > > > allow people to use keys without actually _seeing_ those keys?
> > > > Your example implies that that is not the case, but that's
> > > > actually one of the few reasons to actually support a kernel
> > > > crypto interface - the ability to have private personal keys
> > > > around, but not having to actually let possibly untrusted programs
> > > > see them.
> > > This actually is an indirect feature of this interface.  Using it,
> > > you can open a algorithm socket, select a specific alg, assign a
> > > key, and then pass that socket descriptor over a unix socket to an
> > > another process using an SCM_RIGHTS ancilliary message.  The
> > > receiving process can then use children acceppted from that passed
> > > socket to preform the configured crypto operation without any
> > > knoweldge of the keys used in it.  I can write a demo app if you
> > > like.
> > 
> > Several things have to be considered when extending an interface like
> > that. For example, do the algorithm implementations protect against
> > timing attacks, or keys can be recovered, using them? What is the
> No, the kernel does not implement any protection against timing attacks
> in the algorithms per-se, but preforming a timing attack against a
> kernel crypto operation is going to be near impossible anyway, as
> precise timing measurements are going to get obscured by interupts,
> scheduling jitter, lock contention, and various other factors that will
> make measuring syscall time fairly useless.

Let me just point out that this is not near impossible at all; instead it has already been done more than 6 years ago. And it's not only syscall time that leaks information. One practical example is recovery of a full AES key in a couple of seconds, using cache attacks against an encrypted file system. AES-NI is immune to this kind of attack, but other algorithms typically implemented using lookup tables are at risk.

Dag Arne

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 2.6.38
  2011-01-06  0:01                 ` Crypto Update for 2.6.38 Herbert Xu
  2011-01-06 18:05                   ` Linus Torvalds
@ 2011-01-13  1:44                   ` Herbert Xu
  2011-03-15 14:59                   ` Crypto Update for 2.6.39 Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-13  1:44 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is an updated to the crypto pull request for 2.6.38:

* Crypto API interface for user-space (hash + skcipher)

	This interface is intended to provide access of kernel
	hardware crypto drivers to user-space applications.  It
	presents the kernel crypto API via a socket interface.

	It is only meant to be used for bulk crypto operations,
	i.e., if you're doing less than a page's worth of data,
	then this is not for you.

	For bulk data processing the performance is similar to
	that in the kernel when zero-copy is used in both
	directions.

* Memory corruption fix for via_rng.
* Fixes for new OMAP driver.
* 32-bit support in aesni-intel.
* GCM support in aesni-intel.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Adrian Hoban (1):
      crypto: rfc4106 - Extending the RC4106 AES-GCM test vectors

Adrian-Ken Rueegsegger (1):
      crypto: ripemd - Set module author and update email address

Dennis Gilmore (1):
      crypto: n2 - use __devexit not __exit in n2_unregister_algs

Dmitry Kasatkin (15):
      crypto: omap-sham - uses digest buffer in request context
      crypto: omap-sham - DMA initialization fixes for off mode
      crypto: omap-sham - error handling improved
      crypto: omap-sham - removed redundunt locking
      crypto: omap-sham - crypto_ahash_final() now not need to be called.
      crypto: omap-sham - hash-in-progress is stored in hw format
      crypto: omap-sham - FLAGS_FIRST is redundant and removed
      crypto: omap-sham - zero-copy scatterlist handling
      crypto: omap-aes - DMA initialization fixes for OMAP off mode
      crypto: omap-aes - redundant locking is removed
      crypto: omap-aes - error handling implementation improved
      crypto: omap-aes - unnecessary code removed
      crypto: omap-aes - initialize aes module once per request
      crypto: omap-aes - checkpatch --file warning fixes
      crypto: omap-sham - backlog handling fix

Herbert Xu (13):
      crypto: hash - Fix async import on shash algorithm
      net - Add AF_ALG macros
      crypto: af_alg - User-space interface for Crypto API
      crypto: algif_hash - User-space interface for hash operations
      crypto: algif_skcipher - User-space interface for skcipher operations
      crypto: algif_skcipher - Pass on error from af_alg_make_sg
      crypto: af_alg - Add dependency on NET
      crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned
      crypto: algif_skcipher - Handle unaligned receive buffer
      crypto: gf128mul - Remove experimental tag
      hwrng: via_rng - Fix asm constraints
      crypto: padlock - Move padlock.h into include/crypto
      hwrng: via_rng - Fix memory scribbling on some CPUs

Joe Perches (1):
      crypto: Use vzalloc

Mathias Krause (2):
      crypto: aesni-intel - Ported implementation to x86-32
      crypto: aesni-intel - Fixed build error on x86-32

Miloslav Trmač (3):
      include: Install linux/if_alg.h for user-space crypto API
      net: Add missing lockdep class names for af_alg
      crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets

Nicolas Kaiser (1):
      crypto: cast5 - simplify if-statements

Randy Dunlap (1):
      crypto: af_alg - fix af_alg memory_allocated data type

Roel Kluin (1):
      crypto: mv_cesa - dont return PTR_ERR() of wrong pointer

Steffen Klassert (2):
      crypto: scatterwalk - Add scatterwalk_crypto_chain helper
      crypto: Use scatterwalk_crypto_chain

Tadeusz Struk (2):
      crypto: aesni-intel - RFC4106 AES-GCM Driver Using Intel New Instructions
      crypto: aesni-intel - Fixed build with binutils 2.16

Tejun Heo (1):
      crypto: mark crypto workqueues CPU_INTENSIVE

Tracey Dent (1):
      crypto: Makefile clean up

 arch/x86/crypto/aesni-intel_asm.S     | 1832 ++++++++++++++++++++++++++++++++-
 arch/x86/crypto/aesni-intel_glue.c    |  540 ++++++++++-
 crypto/Kconfig                        |   34 +-
 crypto/Makefile                       |   17 +-
 crypto/af_alg.c                       |  483 +++++++++
 crypto/algif_hash.c                   |  319 ++++++
 crypto/algif_skcipher.c               |  632 ++++++++++++
 crypto/authenc.c                      |   22 +-
 crypto/cast5.c                        |   74 +-
 crypto/crypto_wq.c                    |    3 +-
 crypto/deflate.c                      |    3 +-
 crypto/eseqiv.c                       |   18 +-
 crypto/gcm.c                          |   19 +-
 crypto/pcrypt.c                       |    3 +-
 crypto/rmd128.c                       |    3 +-
 crypto/rmd160.c                       |    3 +-
 crypto/rmd256.c                       |    3 +-
 crypto/rmd320.c                       |    3 +-
 crypto/shash.c                        |    8 +-
 crypto/tcrypt.c                       |   11 +
 crypto/testmgr.c                      |   24 +
 crypto/testmgr.h                      |  361 +++++++
 crypto/zlib.c                         |    3 +-
 drivers/char/hw_random/via-rng.c      |   10 +-
 drivers/crypto/mv_cesa.c              |    2 +-
 drivers/crypto/n2_core.c              |    2 +-
 drivers/crypto/omap-aes.c             |  260 +++---
 drivers/crypto/omap-sham.c            |  374 ++++---
 drivers/crypto/padlock-aes.c          |    2 +-
 drivers/crypto/padlock-sha.c          |    8 +-
 include/crypto/if_alg.h               |   92 ++
 {drivers => include}/crypto/padlock.h |    8 +-
 include/crypto/scatterwalk.h          |   15 +
 include/linux/Kbuild                  |    1 +
 include/linux/if_alg.h                |   40 +
 include/linux/socket.h                |    5 +-
 net/core/sock.c                       |    6 +-
 37 files changed, 4779 insertions(+), 464 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.38
  2010-12-15 11:50                             ` Crypto Fixes for 2.6.37 Herbert Xu
  2010-12-15 20:40                               ` Linus Torvalds
@ 2011-02-16  5:39                               ` Herbert Xu
       [not found]                               ` <20110216053911.GA10999@gondor.apana.org.au>
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-02-16  5:39 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes an ancient bug in s390's implementation of SHA
that manifests itself only under certain conditions.  This bug
causes the generation of incorrect hashes, and potentially memory
corruption.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: sha-s390 - Reset index after processing partial block

 arch/s390/crypto/sha_common.c |    1 +
 1 files changed, 1 insertions(+), 0 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.39
  2011-01-06  0:01                 ` Crypto Update for 2.6.38 Herbert Xu
  2011-01-06 18:05                   ` Linus Torvalds
  2011-01-13  1:44                   ` Herbert Xu
@ 2011-03-15 14:59                   ` Herbert Xu
  2011-05-20 23:54                     ` Crypto Update for 2.6.40 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-03-15 14:59 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.39:

* New picoxcell crypto driver.
* New picoxcell RNG driver.
* Added SHA test vectors to detect bugs such as the recent one on s390.
* Memory leaks fixes on error path in aesni-intel.
* xts(aes) and ghash are now available in FIPS mode.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


David Sterba (1):
      crypto: tcrypt - do not attempt to write to readonly variable

Davidlohr Bueso (1):
      crypto: skcipher - remove redundant NULL check

Herbert Xu (1):
      crypto: sha1 - Add test vector to test partial block processing

Jamie Iles (4):
      hwrng: pixocell - add support for picoxcell TRNG
      crypto: omap-aes - don't treat NULL clk as an error
      crypto: omap-sham - don't treat NULL clk as an error
      crypto: picoxcell - add support for the picoxcell crypto engines

Jarod Wilson (3):
      crypto: testmgr - mark xts(aes) as fips_allowed
      crypto: testmgr - mark ghash as fips_allowed
      random: update interface comments to reflect reality

Jesper Juhl (2):
      crypto: aesni-intel - Don't leak memory in rfc4106_set_hash_subkey
      crypto: aesni-intel - Fix remaining leak in rfc4106_set_hash_key

Julia Lawall (1):
      hwrng: omap - Convert release_resource to release_region/release_mem_region

 arch/x86/crypto/aesni-intel_glue.c     |   24 +-
 crypto/ablkcipher.c                    |    3 +-
 crypto/tcrypt.c                        |    3 +-
 crypto/testmgr.c                       |    2 +
 crypto/testmgr.h                       |   30 +-
 drivers/char/hw_random/Kconfig         |   12 +
 drivers/char/hw_random/Makefile        |    1 +
 drivers/char/hw_random/omap-rng.c      |   14 +-
 drivers/char/hw_random/picoxcell-rng.c |  208 ++++
 drivers/char/random.c                  |   13 +-
 drivers/crypto/Kconfig                 |   17 +
 drivers/crypto/Makefile                |    2 +-
 drivers/crypto/omap-aes.c              |    4 +-
 drivers/crypto/omap-sham.c             |    4 +-
 drivers/crypto/picoxcell_crypto.c      | 1867 ++++++++++++++++++++++++++++++++
 drivers/crypto/picoxcell_crypto_regs.h |  128 +++
 16 files changed, 2299 insertions(+), 33 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 2.6.39
       [not found]                               ` <20110216053911.GA10999@gondor.apana.org.au>
@ 2011-03-28  7:13                                 ` Herbert Xu
  2011-06-29 23:51                                   ` Crypto Fixes for 3.0 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-03-28  7:13 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the aesni-intel driver that may cause
incorrect results for certain input sizes.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

Tadeusz Struk (1):
      crypto: aesni-intel - fixed problem with packets that are not multiple of 64bytes

 arch/x86/crypto/aesni-intel_asm.S  |    5 ++++-
 arch/x86/crypto/aesni-intel_glue.c |   14 ++++++++++++--
 2 files changed, 16 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 2.6.40
  2011-03-15 14:59                   ` Crypto Update for 2.6.39 Herbert Xu
@ 2011-05-20 23:54                     ` Herbert Xu
  2011-07-24  1:17                       ` Crypto Update for 3.1 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-05-20 23:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 2.6.40:

* New Freescale SEC4/CAAM driver.
* New S5PV210 advanced crypto engine driver.
* Support for EMU chips on omap.
* SHA-128/256 support for VIA Nano.
* Native XTS/GHASH/CTR support on s390.
* New test vector for AES-OFB.
* Make aesni-intel build on 32-bit again.
* SHA1 fixes for omap.
* Bug fixes for mv_cesa.
* AMD RNG support on Maple PPC boards.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Andy Lutomirski (1):
      crypto: aesni-intel - Merge with fpu.ko

Brilly Wu (1):
      crypto: padlock - Add SHA-1/256 module for VIA Nano

Dan Carpenter (2):
      crypto: caam - dereferencing ERR_PTR on allocation failure
      crypto: caam - ARRAY_SIZE() vs sizeof()

Dmitry Eremin-Solenikov (2):
      hwrng: amd - manage resource allocation
      hwrng: amd - enable AMD hw rnd driver for Maple PPC boards

Dmitry Kasatkin (3):
      crypto: omap-sham - remove debug print
      crypto: omap-sham - enable driver for EMU chips
      crypto: omap-sham - hmac calculation bug fix for sha1 base hash

Gerald Schaefer (3):
      crypto: s390 - add System z hardware support for XTS mode
      crypto: s390 - add System z hardware support for GHASH
      crypto: s390 - add System z hardware support for CTR mode

Jamie Iles (1):
      crypto: picoxcell - fix possible status FIFO overflow

Jan Glauber (4):
      crypto: s390 - extend crypto facility check
      crypto: s390 - cleanup DES code
      crypto: s390 - cleanup s390 Kconfig options
      crypto: tcrypt - CTR mode speed test for AES

Julia Lawall (1):
      crypto: caam - introduce missing kfree

Kim Phillips (13):
      crypto: caam - Add support for the Freescale SEC4/CAAM
      crypto: caam - standardize device tree naming convention to utilize '-vX.Y'
      crypto: caam - de-CHIP-ify device tree compatibles
      crypto: caam - handle interrupt lines shared across rings
      crypto: caam - fix queue interface detection
      crypto: caam - remove WAIT-FOR-COMPLETIONs from givencrypt descriptor
      crypto: caam - remove duplicate dev_err
      crypto: caam - remove unused keylen from session context
      crypto: caam - fix printk recursion for long error texts
      crypto: caam - platform_bus_type migration
      crypto: caam - fix decryption shared vs. non-shared key setting
      crypto: caam - remove unused authkeylen from caam_ctx
      crypto: caam - add support for sha512 variants of existing AEAD algorithms

Markku Kylanpaa (1):
      crypto: omap-sham - fix concurrent sha1 calculations

Phil Sutter (10):
      crypto: mv_cesa - use ablkcipher_request_cast instead of the manual container_of
      crypto: mv_cesa - the descriptor pointer register needs to be set just once
      crypto: mv_cesa - drop this call to mv_hash_final from mv_hash_finup
      crypto: mv_cesa - print a warning when registration of AES algos fail
      crypto: mv_cesa - no need to save digest state after the last chunk
      crypto: mv_cesa - refactor copy_src_to_buf()
      crypto: mv_cesa - fill inner/outer IV fields only in HMAC case
      crypto: mv_cesa - move digest state initialisation to a better place
      crypto: mv_cesa - copy remaining bytes to SRAM only when needed
      crypto: mv_cesa - make count_sgs() null-pointer proof

Puneet Saxena (1):
      crypto: testmgr - add support for aes ofb mode

Randy Dunlap (1):
      crypto: aesni-intel - fix aesni build on i386

Vladimir Zapolskiy (1):
      crypto: s5p-sss - add S5PV210 advanced crypto engine support

 .../devicetree/bindings/crypto/fsl-sec4.txt        |  397 +++++
 arch/powerpc/boot/dts/p4080ds.dts                  |   86 +-
 arch/s390/crypto/Makefile                          |    1 +
 arch/s390/crypto/aes_s390.c                        |  383 +++++-
 arch/s390/crypto/crypt_s390.h                      |  112 ++-
 arch/s390/crypto/des_check_key.c                   |  132 --
 arch/s390/crypto/des_s390.c                        |  370 ++++--
 arch/s390/crypto/ghash_s390.c                      |  162 ++
 arch/s390/crypto/prng.c                            |    2 +-
 arch/s390/crypto/sha1_s390.c                       |    2 +-
 arch/s390/crypto/sha256_s390.c                     |    2 +-
 arch/s390/crypto/sha512_s390.c                     |    2 +-
 arch/x86/crypto/Makefile                           |    4 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    9 +
 arch/x86/crypto/fpu.c                              |   10 +-
 crypto/Kconfig                                     |    6 -
 crypto/tcrypt.c                                    |    4 +
 crypto/testmgr.c                                   |   16 +
 crypto/testmgr.h                                   |   60 +
 drivers/char/hw_random/Kconfig                     |    2 +-
 drivers/char/hw_random/amd-rng.c                   |    9 +
 drivers/crypto/Kconfig                             |   65 +-
 drivers/crypto/Makefile                            |    2 +
 drivers/crypto/caam/Kconfig                        |   72 +
 drivers/crypto/caam/Makefile                       |    8 +
 drivers/crypto/caam/caamalg.c                      | 1268 ++++++++++++++++
 drivers/crypto/caam/compat.h                       |   35 +
 drivers/crypto/caam/ctrl.c                         |  269 ++++
 drivers/crypto/caam/desc.h                         | 1605 ++++++++++++++++++++
 drivers/crypto/caam/desc_constr.h                  |  205 +++
 drivers/crypto/caam/error.c                        |  248 +++
 drivers/crypto/caam/error.h                        |   11 +
 drivers/crypto/caam/intern.h                       |  113 ++
 drivers/crypto/caam/jr.c                           |  517 +++++++
 drivers/crypto/caam/jr.h                           |   21 +
 drivers/crypto/caam/regs.h                         |  663 ++++++++
 drivers/crypto/mv_cesa.c                           |   97 +-
 drivers/crypto/omap-sham.c                         |   78 +-
 drivers/crypto/padlock-sha.c                       |  269 ++++-
 drivers/crypto/picoxcell_crypto.c                  |   64 +-
 drivers/crypto/s5p-sss.c                           |  701 +++++++++
 41 files changed, 7660 insertions(+), 422 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.0
  2011-03-28  7:13                                 ` Crypto Fixes for 2.6.39 Herbert Xu
@ 2011-06-29 23:51                                   ` Herbert Xu
  2011-10-21  8:22                                     ` Crypto Fixes for 3.1 Herbert Xu
  2012-01-26  2:43                                     ` Crypto Fixes for 3.3 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-06-29 23:51 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a memory corruption bug due to undersized kmalloc
in the caam driver.  The patch has actually been in my tree for
a month but I had incorrectly placed it in the tree for linux-next.
Sorry about that.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Kim Phillips (1):
      crypto: caam - fix operator precedence in shared descriptor allocation

 drivers/crypto/caam/caamalg.c |    6 +++---
 1 files changed, 3 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.1
  2011-05-20 23:54                     ` Crypto Update for 2.6.40 Herbert Xu
@ 2011-07-24  1:17                       ` Herbert Xu
  2011-10-31  4:09                         ` Crypto Update for 3.2 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-07-24  1:17 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.1:

* Support for AES/DES/3DES in caam.
* Improved AEAD support in caam.
* Added hardware SHA-224 support to s390.
* Added ppc4xx RNG driver.
* Updates to omap-sham driver.
* Updates to talitos driver.
* Added XTS-AES-256 test vectors.
* Misc fixes.
 

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Dmitry Kasatkin (11):
      crypto: omap-sham - remove extra reference
      crypto: omap-sham - remove unused code
      crypto: omap-sham - replace flags bit mask with bit number
      crypto: omap-sham - replace flags operation with atomic bit operations
      crypto: omap-sham - move some flags to device context
      crypto: omap-sham - remove unnecessary local variable
      crypto: omap-sham - remove dedicated queue handling tasklet
      crypto: omap-sham - irq and dma handling changes
      crypto: omap-sham - irq handler must not clear error code
      crypto: omap-sham - clear device flags when finishing request
      crypto: omap-sham - do not schedule tasklet if there is no active requests

Gustavo F. Padovan (1):
      crypto: ghash-intel - Fix set but not used in ghash_async_setkey()

H Hartley Sweeten (1):
      hwrng: timeriomem - use resource_size

Herbert Xu (1):
      crypto: algif_hash - Handle initial af_alg_make_sg error correctly

Jan Glauber (1):
      crypto: s390 - support hardware accelerated SHA-224

Jarod Wilson (1):
      crypto: testmgr - add xts-aes-256 self-test

Josh Boyer (2):
      crypto: crypto4xx - Perform read/modify/write on device control register
      hwrng: ppc4xx - add support for ppc4xx TRNG

Julia Lawall (2):
      hwrng: omap - add missing clk_put
      hwrng: nomadik - add missing clk_put

Kim Phillips (5):
      crypto: caam - fix build warning when DEBUG_FS not configured
      crypto: talitos - ensure request ordering within a single tfm
      crypto: talitos - don't set done notification in hot path
      crypto: talitos - remove unused giv from ablkcipher methods
      crypto: talitos - don't bad_key in ablkcipher setkey

Mandeep Singh Baines (1):
      crypto: sha1_generic - use SHA1_BLOCK_SIZE

Mathias Krause (1):
      crypto: gf128mul - fix call to memset()

Mati Vait (2):
      crypto: crc32c - Fixed coding style issue
      crypto: arc4 - Fixed coding style issues

Richard Weinberger (1):
      crypto: UML build fixes

Yuan Kang (4):
      crypto: caam - shorter names
      crypto: caam - structure renaming
      crypto: caam - faster aead implementation
      crypto: caam - ablkcipher support

 arch/s390/crypto/sha256_s390.c             |   66 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c |    2 +-
 crypto/Kconfig                             |    4 +-
 crypto/algif_hash.c                        |    4 +-
 crypto/arc4.c                              |   15 +-
 crypto/crc32c.c                            |   10 +-
 crypto/gf128mul.c                          |    4 +-
 crypto/sha1_generic.c                      |   11 +-
 crypto/testmgr.h                           |  293 +++++-
 drivers/char/hw_random/Kconfig             |   12 +
 drivers/char/hw_random/Makefile            |    1 +
 drivers/char/hw_random/nomadik-rng.c       |    3 +-
 drivers/char/hw_random/omap-rng.c          |    6 +-
 drivers/char/hw_random/ppc4xx-rng.c        |  156 +++
 drivers/char/hw_random/timeriomem-rng.c    |    3 +-
 drivers/crypto/amcc/crypto4xx_core.c       |    5 +-
 drivers/crypto/caam/caamalg.c              | 1848 +++++++++++++++++++++-------
 drivers/crypto/caam/compat.h               |    1 +
 drivers/crypto/caam/ctrl.c                 |    4 +-
 drivers/crypto/caam/desc_constr.h          |   58 +-
 drivers/crypto/omap-sham.c                 |  180 ++--
 drivers/crypto/talitos.c                   |   47 +-
 22 files changed, 2136 insertions(+), 597 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.1
  2011-06-29 23:51                                   ` Crypto Fixes for 3.0 Herbert Xu
@ 2011-10-21  8:22                                     ` Herbert Xu
  2011-10-21  9:41                                       ` David Rientjes
  2011-11-10 23:00                                       ` Crypto Fixes for 3.2 Herbert Xu
  2012-01-26  2:43                                     ` Crypto Fixes for 3.3 Herbert Xu
  1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-10-21  8:22 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a NULL-pointer dereference that can be triggered
from user-space.

Please pull from

git://github.com/herbertx/crypto.git


Nick Bowler (1):
      crypto: ghash - Avoid null pointer dereference if no key is set

 crypto/ghash-generic.c |    6 ++++++
 1 files changed, 6 insertions(+), 0 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.1
  2011-10-21  8:22                                     ` Crypto Fixes for 3.1 Herbert Xu
@ 2011-10-21  9:41                                       ` David Rientjes
  2011-10-21 11:35                                         ` Herbert Xu
  2011-11-10 23:00                                       ` Crypto Fixes for 3.2 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: David Rientjes @ 2011-10-21  9:41 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, 21 Oct 2011, Herbert Xu wrote:

> Hi Linus:
> 
> This push fixes a NULL-pointer dereference that can be triggered
> from user-space.
> 
> Please pull from
> 
> git://github.com/herbertx/crypto.git
> 

Hi Herbert,

When I pull from this, I also get 

commit 9c129165af0225c63c37d1896ac9b0d34e48b69f
Author: Jamie Iles <jamie@jamieiles.com>
Date:   Mon Jun 6 12:31:17 2011 +0100

    crypto: picoxcell - fix possible invalid pointer dereference

which looks unrelated?

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.1
  2011-10-21  9:41                                       ` David Rientjes
@ 2011-10-21 11:35                                         ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-10-21 11:35 UTC (permalink / raw)
  To: David Rientjes
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, Oct 21, 2011 at 02:41:54AM -0700, David Rientjes wrote:
> On Fri, 21 Oct 2011, Herbert Xu wrote:
> 
> > Hi Linus:
> > 
> > This push fixes a NULL-pointer dereference that can be triggered
> > from user-space.
> > 
> > Please pull from
> > 
> > git://github.com/herbertx/crypto.git
> > 
> 
> Hi Herbert,
> 
> When I pull from this, I also get 
> 
> commit 9c129165af0225c63c37d1896ac9b0d34e48b69f
> Author: Jamie Iles <jamie@jamieiles.com>
> Date:   Mon Jun 6 12:31:17 2011 +0100
> 
>     crypto: picoxcell - fix possible invalid pointer dereference
> 
> which looks unrelated?

Sorry, I seem to have based it on a dirty tree.  It should be
fixed now.

Thanks!
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.2
  2011-07-24  1:17                       ` Crypto Update for 3.1 Herbert Xu
@ 2011-10-31  4:09                         ` Herbert Xu
  2011-10-31 16:42                           ` Randy Dunlap
  2012-01-06  4:12                           ` Crypto Update for 3.3 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-10-31  4:09 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Linus:

Here is the crypto update for 3.2:

* User-space interface for algorithm selection/configuration
* SSSE3 implementation of SHA1.
* X86-64 assembly implementation of blowfish.
* X86-64 assembly implementation of twofish.
* Misc fixes.


Please pull from

git://github.com/herbertx/crypto.git


The top commit object is

	commit ea8bdfcff17599e5d80f93e2ae194fbbab7f8d5e
	Author: Herbert Xu <herbert@gondor.apana.org.au>
	Date:   Wed Oct 26 17:15:10 2011 +0200

	    crypto: user - Add dependency on NET

Alexey Dobriyan (1):
      crypto: whirlpool - count rounds from 0

H Hartley Sweeten (1):
      crypto: aes-x86 - quiet sparse noise about symbol not declared

Herbert Xu (4):
      crypto: sha - Fix build error due to crypto_sha1_update
      crypto: cryptd - Use subsys_initcall to prevent races with aesni
      crypto: user - Initialise match in crypto_alg_match
      crypto: user - Add dependency on NET

Jamie Iles (5):
      crypto: picoxcell - convert to platform ID table
      crypto: picoxcell - add connection ID to the clock name
      crypto: picoxcell - support for device tree matching
      crypto: picoxcell - fix possible invalid pointer dereference
      crypto: picoxcell - add dependency on HAVE_CLK

Jonathan Nieder (1):
      crypto: padlock-aes - Make module loading even quieter when hardware is missing

Jussi Kivilinna (13):
      crypto: blowfish - split generic and common c code
      crypto: blowfish - rename C-version to blowfish_generic
      crypto: tcrypt - add ctr(blowfish) speed test
      crypto: blowfish - add x86_64 assembly implementation
      crypto: blowfish-x86_64 - improve x86_64 blowfish 4-way performance
      crypto: blowfish-x86_64 - add credits
      crypto: tcrypt - add ctr(twofish) speed test
      crypto: twofish-x86-asm - make assembler functions use twofish_ctx instead of crypto_tfm
      crypto: twofish - add 3-way parallel x86_64 assembler implemention
      crypto: blowfish-x86_64 - fix ctr blocksize to 1
      crypto: twofish-x86_64-3way - fix ctr blocksize to 1
      crypto: testmgr - add blowfish test-vectors
      crypto: testmgr - add twofish tests

Kim Phillips (1):
      crypto: talitos - handle descriptor not found in error path

Mathias Krause (2):
      crypto: sha1 - export sha1_update for reuse
      crypto: sha1 - SSSE3 based SHA1 implementation for x86-64

Richard Weinberger (1):
      crypto: Make hifn_795x build depend on !ARCH_DMA_ADDR_T_64BIT

Steffen Klassert (17):
      crypto: Add a flag to identify crypto instances
      crypto: Export crypto_remove_spawns
      crypto: Export crypto_remove_final
      crypto: Add userspace configuration API
      crypto: Add a report function pointer to crypto_type
      crypto: Add userspace report for larval type algorithms
      crypto: Add userspace report for shash type algorithms
      crypto: Add userspace report for ahash type algorithms
      crypto: Add userspace report for blkcipher type algorithms
      crypto: Add userspace report for ablkcipher type algorithms
      crypto: Add userspace report for givcipher type algorithms
      crypto: Add userspace report for aead type algorithms
      crypto: Add userspace report for nivaead type algorithms
      crypto: Add userspace report for pcompress type algorithms
      crypto: Add userspace report for rng type algorithms
      crypto: Add userspace report for cipher type algorithms
      crypto: Add userspace report for compress type algorithms

Thomas Meyer (1):
      crypto: n2 - Fix a get/put_cpu() imbalance

 .../devicetree/bindings/crypto/picochip-spacc.txt  |   23 +
 arch/x86/crypto/Makefile                           |   12 +
 arch/x86/crypto/aes_glue.c                         |    1 +
 arch/x86/crypto/blowfish-x86_64-asm_64.S           |  390 ++++++++++++++
 arch/x86/crypto/blowfish_glue.c                    |  492 +++++++++++++++++
 arch/x86/crypto/sha1_ssse3_asm.S                   |  558 ++++++++++++++++++++
 arch/x86/crypto/sha1_ssse3_glue.c                  |  240 +++++++++
 arch/x86/crypto/twofish-i586-asm_32.S              |   10 +-
 arch/x86/crypto/twofish-x86_64-asm_64-3way.S       |  316 +++++++++++
 arch/x86/crypto/twofish-x86_64-asm_64.S            |    6 +-
 arch/x86/crypto/twofish_glue.c                     |   12 +-
 arch/x86/crypto/twofish_glue_3way.c                |  472 +++++++++++++++++
 arch/x86/include/asm/cpufeature.h                  |    3 +
 crypto/Kconfig                                     |   63 +++
 crypto/Makefile                                    |    4 +-
 crypto/ablkcipher.c                                |   48 ++
 crypto/aead.c                                      |   48 ++
 crypto/ahash.c                                     |   21 +
 crypto/algapi.c                                    |   12 +-
 crypto/blkcipher.c                                 |   25 +
 crypto/{blowfish.c => blowfish_common.c}           |   98 +----
 crypto/blowfish_generic.c                          |  142 +++++
 crypto/cryptd.c                                    |    2 +-
 crypto/crypto_user.c                               |  438 +++++++++++++++
 crypto/internal.h                                  |    3 +
 crypto/pcompress.c                                 |   18 +
 crypto/rng.c                                       |   20 +
 crypto/sha1_generic.c                              |    9 +-
 crypto/shash.c                                     |   21 +
 crypto/tcrypt.c                                    |   10 +
 crypto/testmgr.c                                   |   30 +
 crypto/testmgr.h                                   |  398 ++++++++++++++-
 crypto/wp512.c                                     |   18 +-
 drivers/crypto/Kconfig                             |    3 +-
 drivers/crypto/hifn_795x.c                         |    6 +-
 drivers/crypto/n2_core.c                           |    4 +-
 drivers/crypto/padlock-aes.c                       |    4 +-
 drivers/crypto/picoxcell_crypto.c                  |  121 ++---
 drivers/crypto/talitos.c                           |   18 +-
 include/crypto/algapi.h                            |    2 +
 include/crypto/blowfish.h                          |   23 +
 include/crypto/sha.h                               |    5 +
 include/linux/crypto.h                             |    5 +
 include/linux/cryptouser.h                         |  102 ++++
 include/linux/netlink.h                            |    1 +
 45 files changed, 4049 insertions(+), 208 deletions(-)
 
Thanks,
- -- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=PElH
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.2
  2011-10-31  4:09                         ` Crypto Update for 3.2 Herbert Xu
@ 2011-10-31 16:42                           ` Randy Dunlap
  2011-10-31 17:16                             ` Linus Torvalds
  2012-01-06  4:12                           ` Crypto Update for 3.3 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Randy Dunlap @ 2011-10-31 16:42 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On 10/30/2011 09:09 PM, Herbert Xu wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi Linus:
> 
> Here is the crypto update for 3.2:
> 
> * User-space interface for algorithm selection/configuration
> * SSSE3 implementation of SHA1.
> * X86-64 assembly implementation of blowfish.
> * X86-64 assembly implementation of twofish.
> * Misc fixes.
> 
> 
> Please pull from
> 
> git://github.com/herbertx/crypto.git
> 
> 
> The top commit object is
> 
> 	commit ea8bdfcff17599e5d80f93e2ae194fbbab7f8d5e
> 	Author: Herbert Xu <herbert@gondor.apana.org.au>
> 	Date:   Wed Oct 26 17:15:10 2011 +0200
> 
> 	    crypto: user - Add dependency on NET


> Herbert Xu (4):
>       crypto: sha - Fix build error due to crypto_sha1_update
>       crypto: cryptd - Use subsys_initcall to prevent races with aesni
>       crypto: user - Initialise match in crypto_alg_match
>       crypto: user - Add dependency on NET

Actually adds "select NET", a reverse dependency.  :(

Linus was quite vocal about not allowing MD to select BLOCK.
See https://lkml.org/lkml/2011/8/10/527
and https://lkml.org/lkml/2011/8/10/533

To me this is very similar.

-- 
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.2
  2011-10-31 16:42                           ` Randy Dunlap
@ 2011-10-31 17:16                             ` Linus Torvalds
  2011-11-01  3:48                               ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-10-31 17:16 UTC (permalink / raw)
  To: Randy Dunlap
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Oct 31, 2011 at 9:42 AM, Randy Dunlap <rdunlap@xenotime.net> wrote:
>
> Actually adds "select NET", a reverse dependency.  :(
>
> Linus was quite vocal about not allowing MD to select BLOCK.
> See https://lkml.org/lkml/2011/8/10/527
> and https://lkml.org/lkml/2011/8/10/533
>
> To me this is very similar.

I do agree.

"select" makes sense when it's a way for a user to not have to care
about some small helper thing that is really not obvious for a casual
user.

But darn it, if somebody has said "no networking", then some random
small feature shouldn't suddenly select it.

IOW, it's about "relative importance". We should use "select" when
some feature that should be user-visible selects some details. And we
should use "depends on" when there's a major subsystem that some small
detail depends on.

So classic and obvious uses where "select" is appropriate is when a
driver needs some helper library to work (eg "select FW_LOADER" or
"select CRC32").

And a classic and obvious case where "depends on" is the appropriate
choice is when it depends on a major subsystem ("depends on PCI" or
"depends on USB" or "depends on X86").

And I think "NET" definitely falls into that second category - exactly
the same way "BLOCK" fell into it. You don't "select" major subsystems
- if somebody turned off the subsystem, we turn off the stuff that
depends on it.

(Of course, in reality, pretty much nobody turns off NET, I suspect.
But if some embedded place really doesn't want it, then damn it, we
shouldn't ask about the odd crypto user interfaces, because they
really aren't major enough, and the embedded platform is clearly
trying very hard to run small).

                        Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.2
  2011-10-31 17:16                             ` Linus Torvalds
@ 2011-11-01  3:48                               ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-11-01  3:48 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Randy Dunlap, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, Oct 31, 2011 at 10:16:55AM -0700, Linus Torvalds wrote:
> On Mon, Oct 31, 2011 at 9:42 AM, Randy Dunlap <rdunlap@xenotime.net> wrote:
> >
> > Actually adds "select NET", a reverse dependency.  :(
> >
> > Linus was quite vocal about not allowing MD to select BLOCK.
> > See https://lkml.org/lkml/2011/8/10/527
> > and https://lkml.org/lkml/2011/8/10/533
> >
> > To me this is very similar.
> 
> I do agree.

OK, I've turned it into a depends_on.

Here is the crypto update for 3.2:

* User-space interface for algorithm selection/configuration
* SSSE3 implementation of SHA1.
* X86-64 assembly implementation of blowfish.
* X86-64 assembly implementation of twofish.
* Misc fixes.


Please pull from

git://github.com/herbertx/crypto.git


The top commit object is

	commit 5db017aa2809c49ca0a43b0f3ed1267e6be60883
	Author: Herbert Xu <herbert@gondor.apana.org.au>
	Date:   Tue Nov 1 12:12:43 2011 +1100

	    crypto: user - Depend on NET instead of selecting it

Alexey Dobriyan (1):
      crypto: whirlpool - count rounds from 0

H Hartley Sweeten (1):
      crypto: aes-x86 - quiet sparse noise about symbol not declared

Herbert Xu (5):
      crypto: sha - Fix build error due to crypto_sha1_update
      crypto: cryptd - Use subsys_initcall to prevent races with aesni
      crypto: user - Initialise match in crypto_alg_match
      crypto: user - Add dependency on NET
      crypto: user - Depend on NET instead of selecting it

Jamie Iles (5):
      crypto: picoxcell - convert to platform ID table
      crypto: picoxcell - add connection ID to the clock name
      crypto: picoxcell - support for device tree matching
      crypto: picoxcell - fix possible invalid pointer dereference
      crypto: picoxcell - add dependency on HAVE_CLK

Jonathan Nieder (1):
      crypto: padlock-aes - Make module loading even quieter when hardware is missing

Jussi Kivilinna (13):
      crypto: blowfish - split generic and common c code
      crypto: blowfish - rename C-version to blowfish_generic
      crypto: tcrypt - add ctr(blowfish) speed test
      crypto: blowfish - add x86_64 assembly implementation
      crypto: blowfish-x86_64 - improve x86_64 blowfish 4-way performance
      crypto: blowfish-x86_64 - add credits
      crypto: tcrypt - add ctr(twofish) speed test
      crypto: twofish-x86-asm - make assembler functions use twofish_ctx instead of crypto_tfm
      crypto: twofish - add 3-way parallel x86_64 assembler implemention
      crypto: blowfish-x86_64 - fix ctr blocksize to 1
      crypto: twofish-x86_64-3way - fix ctr blocksize to 1
      crypto: testmgr - add blowfish test-vectors
      crypto: testmgr - add twofish tests

Kim Phillips (1):
      crypto: talitos - handle descriptor not found in error path

Mathias Krause (2):
      crypto: sha1 - export sha1_update for reuse
      crypto: sha1 - SSSE3 based SHA1 implementation for x86-64

Richard Weinberger (1):
      crypto: Make hifn_795x build depend on !ARCH_DMA_ADDR_T_64BIT

Steffen Klassert (17):
      crypto: Add a flag to identify crypto instances
      crypto: Export crypto_remove_spawns
      crypto: Export crypto_remove_final
      crypto: Add userspace configuration API
      crypto: Add a report function pointer to crypto_type
      crypto: Add userspace report for larval type algorithms
      crypto: Add userspace report for shash type algorithms
      crypto: Add userspace report for ahash type algorithms
      crypto: Add userspace report for blkcipher type algorithms
      crypto: Add userspace report for ablkcipher type algorithms
      crypto: Add userspace report for givcipher type algorithms
      crypto: Add userspace report for aead type algorithms
      crypto: Add userspace report for nivaead type algorithms
      crypto: Add userspace report for pcompress type algorithms
      crypto: Add userspace report for rng type algorithms
      crypto: Add userspace report for cipher type algorithms
      crypto: Add userspace report for compress type algorithms

Thomas Meyer (1):
      crypto: n2 - Fix a get/put_cpu() imbalance

 .../devicetree/bindings/crypto/picochip-spacc.txt  |   23 +
 arch/x86/crypto/Makefile                           |   12 +
 arch/x86/crypto/aes_glue.c                         |    1 +
 arch/x86/crypto/blowfish-x86_64-asm_64.S           |  390 ++++++++++++++
 arch/x86/crypto/blowfish_glue.c                    |  492 +++++++++++++++++
 arch/x86/crypto/sha1_ssse3_asm.S                   |  558 ++++++++++++++++++++
 arch/x86/crypto/sha1_ssse3_glue.c                  |  240 +++++++++
 arch/x86/crypto/twofish-i586-asm_32.S              |   10 +-
 arch/x86/crypto/twofish-x86_64-asm_64-3way.S       |  316 +++++++++++
 arch/x86/crypto/twofish-x86_64-asm_64.S            |    6 +-
 arch/x86/crypto/twofish_glue.c                     |   12 +-
 arch/x86/crypto/twofish_glue_3way.c                |  472 +++++++++++++++++
 arch/x86/include/asm/cpufeature.h                  |    3 +
 crypto/Kconfig                                     |   63 +++
 crypto/Makefile                                    |    4 +-
 crypto/ablkcipher.c                                |   48 ++
 crypto/aead.c                                      |   48 ++
 crypto/ahash.c                                     |   21 +
 crypto/algapi.c                                    |   12 +-
 crypto/blkcipher.c                                 |   25 +
 crypto/{blowfish.c => blowfish_common.c}           |   98 +----
 crypto/blowfish_generic.c                          |  142 +++++
 crypto/cryptd.c                                    |    2 +-
 crypto/crypto_user.c                               |  438 +++++++++++++++
 crypto/internal.h                                  |    3 +
 crypto/pcompress.c                                 |   18 +
 crypto/rng.c                                       |   20 +
 crypto/sha1_generic.c                              |    9 +-
 crypto/shash.c                                     |   21 +
 crypto/tcrypt.c                                    |   10 +
 crypto/testmgr.c                                   |   30 +
 crypto/testmgr.h                                   |  398 ++++++++++++++-
 crypto/wp512.c                                     |   18 +-
 drivers/crypto/Kconfig                             |    3 +-
 drivers/crypto/hifn_795x.c                         |    6 +-
 drivers/crypto/n2_core.c                           |    4 +-
 drivers/crypto/padlock-aes.c                       |    4 +-
 drivers/crypto/picoxcell_crypto.c                  |  121 ++---
 drivers/crypto/talitos.c                           |   18 +-
 include/crypto/algapi.h                            |    2 +
 include/crypto/blowfish.h                          |   23 +
 include/crypto/sha.h                               |    5 +
 include/linux/crypto.h                             |    5 +
 include/linux/cryptouser.h                         |  102 ++++
 include/linux/netlink.h                            |    1 +
 45 files changed, 4049 insertions(+), 208 deletions(-)

Thanks,
- - -- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=GwqI
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.2
  2011-10-21  8:22                                     ` Crypto Fixes for 3.1 Herbert Xu
  2011-10-21  9:41                                       ` David Rientjes
@ 2011-11-10 23:00                                       ` Herbert Xu
  2011-11-26  2:34                                         ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-11-10 23:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Linus:

This push fixes a build problem with NET disabled and potential
lock mismatch in the new configuration interface.

Please pull from

git://github.com/herbertx/crypto.git


The top commit object is

commit 3acc84739dd5d746840f881ad4d60bd2a428f1dd
Author: Herbert Xu <herbert@gondor.apana.org.au>
Date:   Thu Nov 3 23:46:07 2011 +1100

    crypto: algapi - Fix build problem with NET disabled
    
    The report functions use NLA_PUT so we need to ensure that NET
    is enabled.
    
    Reported-by: Luis Henriques <henrix@camandro.org>
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>


Herbert Xu (1):
      crypto: algapi - Fix build problem with NET disabled

Jonathan Corbet (1):
      crypto: user - Fix rwsem leak in crypto_user

 crypto/ablkcipher.c  |   14 ++++++++++++++
 crypto/aead.c        |   14 ++++++++++++++
 crypto/ahash.c       |    7 +++++++
 crypto/blkcipher.c   |    7 +++++++
 crypto/crypto_user.c |    3 ---
 crypto/pcompress.c   |    7 +++++++
 crypto/rng.c         |    7 +++++++
 crypto/shash.c       |    7 +++++++
 8 files changed, 63 insertions(+), 3 deletions(-)

Thanks,
- -- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=MC9A
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.2
  2011-11-10 23:00                                       ` Crypto Fixes for 3.2 Herbert Xu
@ 2011-11-26  2:34                                         ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-11-26  2:34 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Linus:

This push fixes a problem with mv_cesa the driver where it makes
incorrect hashes on input chunks greater than 1920 bytes.

Please pull from

git://github.com/herbertx/crypto.git


The top commit object is

commit 274252862f386b7868f35bf5ceaa5391a8ccfdf3
Author: Phil Sutter <phil.sutter@viprinet.com>
Date:   Wed Nov 16 18:28:01 2011 +0100

    crypto: mv_cesa - fix hashing of chunks > 1920 bytes


Phil Sutter (1):
      crypto: mv_cesa - fix hashing of chunks > 1920 bytes

 drivers/crypto/mv_cesa.c |   12 +++++++-----
 1 files changed, 7 insertions(+), 5 deletions(-)
 
Thanks,
- -- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=iYTU
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.3
  2011-10-31  4:09                         ` Crypto Update for 3.2 Herbert Xu
  2011-10-31 16:42                           ` Randy Dunlap
@ 2012-01-06  4:12                           ` Herbert Xu
  2012-01-11 22:19                             ` Herbert Xu
                                               ` (2 more replies)
  1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2012-01-06  4:12 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.3:

* New test vectors (serpent, xts-twofish).
* Speed test for asynchronous ciphers.
* SSE2 assembly implementation of serpent.
* Support for LRW and XTS in X86-64 assembly implementation of twofish.
* More MD5 combos for caam.
* Channel remap on talitos for better affinity.
* Direct support for HMAC on talitos.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Axel Lin (2):
      char: hw_random: convert drivers/char/hw_random/* to use module_platform_driver()
      crypto: convert drivers/crypto/* to use module_platform_driver()

Jamie Iles (1):
      crypto: picoxcell - fix boolean and / or confusion

Jarod Wilson (1):
      crypto: ansi_cprng - enforce key != seed in fips mode

Jussi Kivilinna (36):
      crypto: testmgr - add new serpent test vectors
      crypto: tcrypt - add test_acipher_speed
      crypto: tcrypt - add serpent speed tests
      crypto: serpent - export common functions for x86_64/i386-sse2 assembler implementations
      crypto: serpent - rename module from serpent to serpent_generic
      crypto: lrw - fix memleak
      crypto: lrw - use blocksize constant
      crypto: lrw - split gf128mul table initialization from setkey
      crypto: lrw - add interface for parallelized cipher implementions
      crypto: testmgr - add lrw(serpent) test vectors
      crypto: tcrypt - add lrw(serpent) tests
      crypto: testmgr - add lrw(twofish) test vectors
      crypto: tcrypt - add lrw(twofish) tests
      crypto: twofish-x86_64-3way - add lrw support
      crypto: xts - use blocksize constant
      crypto: xts: add interface for parallelized cipher implementations
      crypto: testmgr - add xts(serpent) test vectors
      crypto: tcrypt - add xts(serpent) tests
      crypto: testmgr - add xts(twofish) test vectors
      crypto: tcrypt - add xts(twofish) tests
      crypto: twofish-x86_64-3way - add xts support
      crypto: serpent - add 8-way parallel x86_64/SSE2 assembler implementation
      crypto: serpent - add 4-way parallel i586/SSE2 assembler implementation
      crypto: serpent-sse2 - add lrw support
      crypto: serpent-sse2 - add xts support
      crypto: serpent-sse2 - clear CRYPTO_TFM_REQ_MAY_SLEEP in lrw and xts modes
      crypto: serpent - cleanup checkpatch errors and warnings
      crypto: serpent - rename serpent.c to serpent_generic.c
      crypto: serpent-sse2 - should select CRYPTO_CRYPTD
      crypto: lrw - remove dependency on EXPERIMENTAL
      crypto: xts - remove dependency on EXPERIMENTAL
      crypto: twofish-x86_64-3way - select LRW and XTS
      crypto: twofish-x86_64-3way - remove unneeded LRW/XTS #ifdefs
      crypto: serpent-sse2 - select LRW and XTS
      crypto: serpent-sse2 - remove unneeded LRW/XTS #ifdefs
      crypto: gf128mul - remove leftover "(EXPERIMENTAL)" in Kconfig

Kim Phillips (11):
      crypto: talitos - be less noisy on startup
      crypto: talitos - prepare driver for channel remap support
      crypto: talitos - support for channel remap and 2nd IRQ
      crypto: caam - add support for MD5 algorithm variants
      crypto: talitos - fix bad kfree
      crypto: talitos - remove NO_IRQ references
      crypto: talitos - convert talitos_error to struct device
      crypto: caam - desc.h - convert spaces to tabs
      crypto: caam - more desc.h cleanups
      crypto: caam - fix polarity of "propagate error" logic
      crypto: caam - remove DECO access initialization code

Lee Nipper (1):
      crypto: talitos - add hmac algorithms

Steffen Klassert (1):
      crypto: Unlink and free instances when deleted

Valdis.Kletnieks@vt.edu (1):
      crypto: fix typo in crypto/Kconfig

 arch/x86/crypto/Makefile                     |    4 +
 arch/x86/crypto/serpent-sse2-i586-asm_32.S   |  638 ++++++
 arch/x86/crypto/serpent-sse2-x86_64-asm_64.S |  761 +++++++
 arch/x86/crypto/serpent_sse2_glue.c          | 1070 ++++++++++
 arch/x86/crypto/twofish_glue_3way.c          |  218 ++
 arch/x86/include/asm/serpent.h               |   63 +
 crypto/Kconfig                               |   52 +-
 crypto/Makefile                              |    2 +-
 crypto/algapi.c                              |   29 +
 crypto/ansi_cprng.c                          |    8 +
 crypto/crypto_user.c                         |    2 +-
 crypto/lrw.c                                 |  156 ++-
 crypto/serpent.c                             |  587 ------
 crypto/serpent_generic.c                     |  684 +++++++
 crypto/tcrypt.c                              |  310 +++
 crypto/tcrypt.h                              |    2 +
 crypto/testmgr.c                             |  150 ++
 crypto/testmgr.h                             | 2759 +++++++++++++++++++++++++-
 crypto/twofish_common.c                      |   13 +-
 crypto/xts.c                                 |   79 +-
 drivers/char/hw_random/atmel-rng.c           |   12 +-
 drivers/char/hw_random/n2-drv.c              |   13 +-
 drivers/char/hw_random/octeon-rng.c          |   13 +-
 drivers/char/hw_random/pasemi-rng.c          |   12 +-
 drivers/char/hw_random/picoxcell-rng.c       |   12 +-
 drivers/char/hw_random/ppc4xx-rng.c          |   12 +-
 drivers/char/hw_random/timeriomem-rng.c      |   13 +-
 drivers/crypto/amcc/crypto4xx_core.c         |   13 +-
 drivers/crypto/caam/caamalg.c                |   67 +-
 drivers/crypto/caam/compat.h                 |    1 +
 drivers/crypto/caam/ctrl.c                   |   26 +-
 drivers/crypto/caam/desc.h                   | 2265 +++++++++++-----------
 drivers/crypto/caam/desc_constr.h            |    7 +-
 drivers/crypto/caam/regs.h                   |    1 -
 drivers/crypto/mv_cesa.c                     |   12 +-
 drivers/crypto/picoxcell_crypto.c            |   16 +-
 drivers/crypto/s5p-sss.c                     |   13 +-
 drivers/crypto/talitos.c                     |  493 ++++-
 drivers/crypto/talitos.h                     |   45 +-
 include/crypto/algapi.h                      |    1 +
 include/crypto/lrw.h                         |   43 +
 include/crypto/serpent.h                     |   27 +
 include/crypto/twofish.h                     |    2 +
 include/crypto/xts.h                         |   27 +
 44 files changed, 8684 insertions(+), 2049 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.3
  2012-01-06  4:12                           ` Crypto Update for 3.3 Herbert Xu
@ 2012-01-11 22:19                             ` Herbert Xu
  2012-03-20  3:27                             ` Herbert Xu
  2012-10-04  9:53                             ` Crypto Update for 3.7 Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-01-11 22:19 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This is a resend of the crypto update for 3.3:

* New test vectors (serpent, xts-twofish).
* Speed test for asynchronous ciphers.
* SSE2 assembly implementation of serpent.
* Support for LRW and XTS in X86-64 assembly implementation of twofish.
* More MD5 combos for caam.
* Channel remap on talitos for better affinity.
* Direct support for HMAC on talitos.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Axel Lin (2):
      char: hw_random: convert drivers/char/hw_random/* to use module_platform_driver()
      crypto: convert drivers/crypto/* to use module_platform_driver()

Jamie Iles (1):
      crypto: picoxcell - fix boolean and / or confusion

Jarod Wilson (1):
      crypto: ansi_cprng - enforce key != seed in fips mode

Jussi Kivilinna (36):
      crypto: testmgr - add new serpent test vectors
      crypto: tcrypt - add test_acipher_speed
      crypto: tcrypt - add serpent speed tests
      crypto: serpent - export common functions for x86_64/i386-sse2 assembler implementations
      crypto: serpent - rename module from serpent to serpent_generic
      crypto: lrw - fix memleak
      crypto: lrw - use blocksize constant
      crypto: lrw - split gf128mul table initialization from setkey
      crypto: lrw - add interface for parallelized cipher implementions
      crypto: testmgr - add lrw(serpent) test vectors
      crypto: tcrypt - add lrw(serpent) tests
      crypto: testmgr - add lrw(twofish) test vectors
      crypto: tcrypt - add lrw(twofish) tests
      crypto: twofish-x86_64-3way - add lrw support
      crypto: xts - use blocksize constant
      crypto: xts: add interface for parallelized cipher implementations
      crypto: testmgr - add xts(serpent) test vectors
      crypto: tcrypt - add xts(serpent) tests
      crypto: testmgr - add xts(twofish) test vectors
      crypto: tcrypt - add xts(twofish) tests
      crypto: twofish-x86_64-3way - add xts support
      crypto: serpent - add 8-way parallel x86_64/SSE2 assembler implementation
      crypto: serpent - add 4-way parallel i586/SSE2 assembler implementation
      crypto: serpent-sse2 - add lrw support
      crypto: serpent-sse2 - add xts support
      crypto: serpent-sse2 - clear CRYPTO_TFM_REQ_MAY_SLEEP in lrw and xts modes
      crypto: serpent - cleanup checkpatch errors and warnings
      crypto: serpent - rename serpent.c to serpent_generic.c
      crypto: serpent-sse2 - should select CRYPTO_CRYPTD
      crypto: lrw - remove dependency on EXPERIMENTAL
      crypto: xts - remove dependency on EXPERIMENTAL
      crypto: twofish-x86_64-3way - select LRW and XTS
      crypto: twofish-x86_64-3way - remove unneeded LRW/XTS #ifdefs
      crypto: serpent-sse2 - select LRW and XTS
      crypto: serpent-sse2 - remove unneeded LRW/XTS #ifdefs
      crypto: gf128mul - remove leftover "(EXPERIMENTAL)" in Kconfig

Kim Phillips (11):
      crypto: talitos - be less noisy on startup
      crypto: talitos - prepare driver for channel remap support
      crypto: talitos - support for channel remap and 2nd IRQ
      crypto: caam - add support for MD5 algorithm variants
      crypto: talitos - fix bad kfree
      crypto: talitos - remove NO_IRQ references
      crypto: talitos - convert talitos_error to struct device
      crypto: caam - desc.h - convert spaces to tabs
      crypto: caam - more desc.h cleanups
      crypto: caam - fix polarity of "propagate error" logic
      crypto: caam - remove DECO access initialization code

Lee Nipper (1):
      crypto: talitos - add hmac algorithms

Steffen Klassert (1):
      crypto: Unlink and free instances when deleted

Valdis.Kletnieks@vt.edu (1):
      crypto: fix typo in crypto/Kconfig

 arch/x86/crypto/Makefile                     |    4 +
 arch/x86/crypto/serpent-sse2-i586-asm_32.S   |  638 ++++++
 arch/x86/crypto/serpent-sse2-x86_64-asm_64.S |  761 +++++++
 arch/x86/crypto/serpent_sse2_glue.c          | 1070 ++++++++++
 arch/x86/crypto/twofish_glue_3way.c          |  218 ++
 arch/x86/include/asm/serpent.h               |   63 +
 crypto/Kconfig                               |   52 +-
 crypto/Makefile                              |    2 +-
 crypto/algapi.c                              |   29 +
 crypto/ansi_cprng.c                          |    8 +
 crypto/crypto_user.c                         |    2 +-
 crypto/lrw.c                                 |  156 ++-
 crypto/serpent.c                             |  587 ------
 crypto/serpent_generic.c                     |  684 +++++++
 crypto/tcrypt.c                              |  310 +++
 crypto/tcrypt.h                              |    2 +
 crypto/testmgr.c                             |  150 ++
 crypto/testmgr.h                             | 2759 +++++++++++++++++++++++++-
 crypto/twofish_common.c                      |   13 +-
 crypto/xts.c                                 |   79 +-
 drivers/char/hw_random/atmel-rng.c           |   12 +-
 drivers/char/hw_random/n2-drv.c              |   13 +-
 drivers/char/hw_random/octeon-rng.c          |   13 +-
 drivers/char/hw_random/pasemi-rng.c          |   12 +-
 drivers/char/hw_random/picoxcell-rng.c       |   12 +-
 drivers/char/hw_random/ppc4xx-rng.c          |   12 +-
 drivers/char/hw_random/timeriomem-rng.c      |   13 +-
 drivers/crypto/amcc/crypto4xx_core.c         |   13 +-
 drivers/crypto/caam/caamalg.c                |   67 +-
 drivers/crypto/caam/compat.h                 |    1 +
 drivers/crypto/caam/ctrl.c                   |   26 +-
 drivers/crypto/caam/desc.h                   | 2265 +++++++++++-----------
 drivers/crypto/caam/desc_constr.h            |    7 +-
 drivers/crypto/caam/regs.h                   |    1 -
 drivers/crypto/mv_cesa.c                     |   12 +-
 drivers/crypto/picoxcell_crypto.c            |   16 +-
 drivers/crypto/s5p-sss.c                     |   13 +-
 drivers/crypto/talitos.c                     |  493 ++++-
 drivers/crypto/talitos.h                     |   45 +-
 include/crypto/algapi.h                      |    1 +
 include/crypto/lrw.h                         |   43 +
 include/crypto/serpent.h                     |   27 +
 include/crypto/twofish.h                     |    2 +
 include/crypto/xts.h                         |   27 +
 44 files changed, 8684 insertions(+), 2049 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.3
  2011-06-29 23:51                                   ` Crypto Fixes for 3.0 Herbert Xu
  2011-10-21  8:22                                     ` Crypto Fixes for 3.1 Herbert Xu
@ 2012-01-26  2:43                                     ` Herbert Xu
  2012-01-26  3:35                                       ` Linus Torvalds
                                                         ` (3 more replies)
  1 sibling, 4 replies; 246+ messages in thread
From: Herbert Xu @ 2012-01-26  2:43 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a race condition in sha512 that affects users
who use it in process context and softirq context concurrently,
in particular, this affects IPsec.  The result of the race is
the production of incorrect hashes, which for IPsec leands to
loss of connectivity.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexey Dobriyan (2):
      crypto: sha512 - make it work, undo percpu message schedule
      crypto: sha512 - reduce stack usage to safe number

 crypto/sha512_generic.c |   62 +++++++++++++++++++++++++---------------------
 1 files changed, 34 insertions(+), 28 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.3
  2012-01-26  2:43                                     ` Crypto Fixes for 3.3 Herbert Xu
@ 2012-01-26  3:35                                       ` Linus Torvalds
  2012-01-26  4:07                                         ` Herbert Xu
  2012-02-14  3:35                                       ` Herbert Xu
                                                         ` (2 subsequent siblings)
  3 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2012-01-26  3:35 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Jan 25, 2012 at 6:43 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes a race condition in sha512 that affects users
> who use it in process context and softirq context concurrently,
> in particular, this affects IPsec.  The result of the race is
> the production of incorrect hashes, which for IPsec leands to
> loss of connectivity.

Ugh. This once more has the crazy signed integer modulus operator,
which can be quite expensive depending on whether the compiler can
tell whether it is always positive or not.

Also, that modulus is exposed everywhere.

In git, the sha1 implementation (which has many of the same issues) does this:

  /* This "rolls" over the 512-bit array */
  #define W(x) (array[(x)&15])

which means that the modulus exists in just one place (and is the
correct binary 'and', not the possibly-expensive division).

We also avoid the problem with absolutely horrible gcc register usage
by having an arch-specific "accessor macro":

  /*
   * If you have 32 registers or more, the compiler can (and should)
   * try to change the array[] accesses into registers. However, on
   * machines with less than ~25 registers, that won't really work,
   * and at least gcc will make an unholy mess of it.
   *
   * So to avoid that mess which just slows things down, we force
   * the stores to memory to actually happen (we might be better off
   * with a 'W(t)=(val);asm("":"+m" (W(t))' there instead, as
   * suggested by Artur Skawina - that will also make gcc unable to
   * try to do the silly "optimize away loads" part because it won't
   * see what the value will be).
   *
   * Ben Herrenschmidt reports that on PPC, the C version comes close
   * to the optimized asm with this (ie on PPC you don't want that
   * 'volatile', since there are lots of registers).
   *
   * On ARM we get the best code generation by forcing a full memory barrier
   * between each SHA_ROUND, otherwise gcc happily get wild with spilling and
   * the stack frame size simply explode and performance goes down the drain.
   */

  #if defined(__i386__) || defined(__x86_64__)
    #define setW(x, val) (*(volatile unsigned int *)&W(x) = (val))
  #elif defined(__GNUC__) && defined(__arm__)
    #define setW(x, val) do { W(x) = (val); __asm__("":::"memory"); } while (0)
  #else
    #define setW(x, val) (W(x) = (val))
  #endif

which is not pretty, but as you guys found out, the alternative can be
much worse (ie totally crazy gcc register spilling)

                    Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.3
  2012-01-26  3:35                                       ` Linus Torvalds
@ 2012-01-26  4:07                                         ` Herbert Xu
  2012-01-26  4:16                                           ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-01-26  4:07 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Jan 25, 2012 at 07:35:19PM -0800, Linus Torvalds wrote:
>
> Ugh. This once more has the crazy signed integer modulus operator,
> which can be quite expensive depending on whether the compiler can
> tell whether it is always positive or not.

Oops, I had incorrectly applied the first patch in the thread.

I've fixed it in the tree now.

> We also avoid the problem with absolutely horrible gcc register usage
> by having an arch-specific "accessor macro":

We could certainly do something like that.  Although I'd be
more comfortable with pushing this through linux-next, OK?


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexey Dobriyan (2):
      crypto: sha512 - make it work, undo percpu message schedule
      crypto: sha512 - reduce stack usage to safe number

Herbert Xu (1):
      crypto: sha512 - Use binary and instead of modulus

 crypto/sha512_generic.c |   62 +++++++++++++++++++++++++---------------------
 1 files changed, 34 insertions(+), 28 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.3
  2012-01-26  4:07                                         ` Herbert Xu
@ 2012-01-26  4:16                                           ` Linus Torvalds
  0 siblings, 0 replies; 246+ messages in thread
From: Linus Torvalds @ 2012-01-26  4:16 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Jan 25, 2012 at 8:07 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Oops, I had incorrectly applied the first patch in the thread.
>
> I've fixed it in the tree now.

Oh well, I already pulled your tree. I just wanted to voice a few
comments on it.

>> We also avoid the problem with absolutely horrible gcc register usage
>> by having an arch-specific "accessor macro":
>
> We could certainly do something like that.  Although I'd be
> more comfortable with pushing this through linux-next, OK?

Absolutely.

               Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.3
  2012-01-26  2:43                                     ` Crypto Fixes for 3.3 Herbert Xu
  2012-01-26  3:35                                       ` Linus Torvalds
@ 2012-02-14  3:35                                       ` Herbert Xu
  2012-02-16  5:32                                         ` Herbert Xu
  2012-03-22  1:20                                       ` Crypto Fixes for 3.4 Herbert Xu
  2012-08-23  8:32                                       ` Crypto Fixes for 3.6 Herbert Xu
  3 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-02-14  3:35 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push updates the sha512 fix so that it doesn't cause excessive
stack usage on i386.  This is done by reverting to the original
code, and avoiding the W duplication by moving its initialisation
into the loop.

As the underlying code is in fact the one that we have used for years,
I'm pushing this now instead of postponing to the next cycle.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (2):
      crypto: sha512 - Use binary and instead of modulus
      crypto: sha512 - Avoid stack bloat on i386

 crypto/sha512_generic.c |   70 ++++++++++++++++++++++-------------------------
 1 files changed, 33 insertions(+), 37 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.3
  2012-02-14  3:35                                       ` Herbert Xu
@ 2012-02-16  5:32                                         ` Herbert Xu
  2012-03-03  5:36                                           ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-02-16  5:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Dave reported that even with the latest stack bloat reduction
fix for i386, the stack usage of sha512 still exceeded 1024 bytes
on sparc32.  However, with Alexey's ror64 patch applied, the stack
usage goes back down to a more respectable 824.

So I've moved the ror64 patch from cryptodev to crypto and I'm
pushing it to you now.
 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexey Dobriyan (1):
      crypto: sha512 - use standard ror64()

 crypto/sha512_generic.c |   13 ++++---------
 include/linux/bitops.h  |   20 ++++++++++++++++++++
 2 files changed, 24 insertions(+), 9 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.3
  2012-02-16  5:32                                         ` Herbert Xu
@ 2012-03-03  5:36                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-03-03  5:36 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in mv_cesa that causes all hash operations
that supply data on a final operation to fail.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Phil Sutter (1):
      crypto: mv_cesa - fix final callback not ignoring input data

 drivers/crypto/mv_cesa.c |    1 +
 1 files changed, 1 insertions(+), 0 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.3
  2012-01-06  4:12                           ` Crypto Update for 3.3 Herbert Xu
  2012-01-11 22:19                             ` Herbert Xu
@ 2012-03-20  3:27                             ` Herbert Xu
  2012-05-23  1:35                               ` Crypto Update for 3.5 Herbert Xu
  2012-10-04  9:53                             ` Crypto Update for 3.7 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-03-20  3:27 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.4:

* sha512 bug fixes (already in your tree).
* SHA224/SHA384 AEAD support in caam.
* X86-64 optimised version of Camellia.
* Tegra AES support.
* Bulk algorithm registration interface to make driver registration easier.
* padata race fixes.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexey Dobriyan (4):
      crypto: sha512 - make it work, undo percpu message schedule
      crypto: sha512 - reduce stack usage to safe number
      crypto: sha512 - use standard ror64()
      crypto: sha512 - use standard ror64()

Hemant Agrawal (1):
      crypto: caam - add sha224 and sha384 variants to existing AEAD algorithms

Henning Heinold (1):
      arm: tegra: export tegra_chip_uid

Herbert Xu (3):
      crypto: sha512 - Use binary and instead of modulus
      crypto: sha512 - Avoid stack bloat on i386
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Jesper Juhl (3):
      crypto: In crypto_add_alg(), 'exact' wants to be initialized to 0
      crypto: twofish-x86 - Remove dead code from twofish_glue_3way.c::init()
      crypto: serpent-sse2 - remove dead code from serpent_sse2_glue.c::serpent_sse2_init()

Julia Lawall (2):
      hwrng: tx4939 - use devm_request_and_ioremap
      crypto: ixp4xx - convert GFP_KERNEL to GFP_ATOMIC

Jussi Kivilinna (16):
      crypto: twofish-x86_64-3way - blacklist pentium4 and atom
      crypto: blowfish-x86_64 - blacklist Pentium 4
      crypto: serpent-sse2 - change transpose_4x4 to only use integer instructions
      crypto: serpent-sse2 - use crypto_[un]register_algs
      crypto: twofish-x86_64-3way - use crypto_[un]register_algs
      crypto: blowfish-x86_64 - use crypto_[un]register_algs
      crypto: serpent-sse2 - combine ablk_*_init functions
      crypto: blowfish-x86_64 - set alignmask to zero
      crypto: twofish-x86_64/i586 - set alignmask to zero
      crypto: camellia - simplify key setup and CAMELLIA_ROUNDSM macro
      crypto: testmgr - add more camellia test vectors
      crypto: tcrypt - add more camellia tests
      crypto: camellia - rename camellia module to camellia_generic
      crypto: camellia - fix checkpatch warnings
      crypto: camellia - rename camellia.c to camellia_generic.c
      crypto: camellia - add assembler implementation for x86_64

Kim Phillips (2):
      crypto: caam - be less noisy on startup
      crypto: caam - fix gcc 4.6 warning

Mark Brown (1):
      crypto: Add bulk algorithm registration interface

Nikos Mavrogiannopoulos (1):
      crypto: Add CRYPTO_ALG_KERN_DRIVER_ONLY flag

Steffen Klassert (2):
      padata: Fix race in the serialization path
      padata: Fix race on sequence number wrap

Varun Wadekar (1):
      crypto: driver for Tegra AES hardware

 arch/arm/mach-tegra/fuse.c                   |    2 +
 arch/x86/crypto/Makefile                     |    2 +
 arch/x86/crypto/blowfish_glue.c              |  191 ++--
 arch/x86/crypto/camellia-x86_64-asm_64.S     |  520 +++++++
 arch/x86/crypto/camellia_glue.c              | 1952 ++++++++++++++++++++++++++
 arch/x86/crypto/serpent-sse2-i586-asm_32.S   |   29 +-
 arch/x86/crypto/serpent-sse2-x86_64-asm_64.S |   29 +-
 arch/x86/crypto/serpent_sse2_glue.c          |  394 ++----
 arch/x86/crypto/twofish_glue.c               |    2 +-
 arch/x86/crypto/twofish_glue_3way.c          |  265 ++--
 crypto/Kconfig                               |   18 +
 crypto/Makefile                              |    2 +-
 crypto/algapi.c                              |   35 +
 crypto/camellia.c                            | 1116 ---------------
 crypto/camellia_generic.c                    | 1102 +++++++++++++++
 crypto/crypto_user.c                         |    2 +-
 crypto/sha512_generic.c                      |   59 +-
 crypto/tcrypt.c                              |   12 +
 crypto/testmgr.c                             |   45 +
 crypto/testmgr.h                             | 1383 ++++++++++++++++++-
 drivers/char/hw_random/tx4939-rng.c          |    5 +-
 drivers/crypto/Kconfig                       |   11 +
 drivers/crypto/Makefile                      |    1 +
 drivers/crypto/caam/caamalg.c                |  126 ++-
 drivers/crypto/caam/ctrl.c                   |    2 +-
 drivers/crypto/geode-aes.c                   |    6 +-
 drivers/crypto/hifn_795x.c                   |    3 +-
 drivers/crypto/ixp4xx_crypto.c               |    4 +-
 drivers/crypto/mv_cesa.c                     |   12 +-
 drivers/crypto/n2_core.c                     |    7 +-
 drivers/crypto/omap-aes.c                    |    8 +-
 drivers/crypto/omap-sham.c                   |    4 +
 drivers/crypto/picoxcell_crypto.c            |   46 +-
 drivers/crypto/s5p-sss.c                     |    6 +-
 drivers/crypto/talitos.c                     |    1 +
 drivers/crypto/tegra-aes.c                   | 1096 +++++++++++++++
 drivers/crypto/tegra-aes.h                   |  103 ++
 include/linux/bitops.h                       |   20 +
 include/linux/crypto.h                       |    7 +
 include/linux/padata.h                       |    6 +-
 kernel/padata.c                              |   44 +-
 41 files changed, 6936 insertions(+), 1742 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.4
  2012-01-26  2:43                                     ` Crypto Fixes for 3.3 Herbert Xu
  2012-01-26  3:35                                       ` Linus Torvalds
  2012-02-14  3:35                                       ` Herbert Xu
@ 2012-03-22  1:20                                       ` Herbert Xu
  2012-04-02  9:45                                         ` Herbert Xu
  2012-06-11 13:00                                         ` Crypto Fixes for 3.5 Herbert Xu
  2012-08-23  8:32                                       ` Crypto Fixes for 3.6 Herbert Xu
  3 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2012-03-22  1:20 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem where two crypto modules both
try to export the same symbols (which shouldn't have been exported
in the first place).

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Jussi Kivilinna (2):
      crypto: camellia-x86_64 - module init/exit functions should be static
      crypto: twofish-x86_64-3way - module init/exit functions should be static

 arch/x86/crypto/camellia_glue.c     |    4 ++--
 arch/x86/crypto/twofish_glue_3way.c |    4 ++--
 2 files changed, 4 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.4
  2012-03-22  1:20                                       ` Crypto Fixes for 3.4 Herbert Xu
@ 2012-04-02  9:45                                         ` Herbert Xu
  2012-04-20 14:16                                           ` Herbert Xu
  2012-06-11 13:00                                         ` Crypto Fixes for 3.5 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-04-02  9:45 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a number of issues:

* Fix for CPU hotplug hang in padata.
* Avoid using cpu_active inappropriately in pcrypt and padata.
* Fix for user-space algorithm lookup hang with IV generators.
* Fix for netlink dump of algorithms where stuff went missing due
  to incorrect calculation of message size.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Steffen Klassert (6):
      padata: Add a reference to the api documentation
      padata: Use the online cpumask as the default
      padata: Fix cpu hotplug
      crypto: pcrypt - Use the online cpumask as the default
      crypto: user - Fix lookup of algorithms with IV generator
      crypto: user - Fix size of netlink dump message

 crypto/ablkcipher.c                |    4 +-
 crypto/aead.c                      |    4 +-
 crypto/crypto_user.c               |   80 +++++++++++++++++++++++++++++++++++-
 crypto/pcrypt.c                    |    8 ++--
 include/crypto/internal/aead.h     |    2 +
 include/crypto/internal/skcipher.h |    2 +
 include/linux/cryptouser.h         |    3 +
 kernel/padata.c                    |   13 ++++--
 8 files changed, 103 insertions(+), 13 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.4
  2012-04-02  9:45                                         ` Herbert Xu
@ 2012-04-20 14:16                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-04-20 14:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a number of issues:

* Locking fix for talitos driver.
* Fix 64-bit counter overflow in SHA-512.
* Build fix for ixp4xx.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Horia Geanta (1):
      crypto: talitos - properly lock access to global talitos registers

Kent Yoder (1):
      crypto: sha512 - Fix byte counter overflow in SHA-512

Michał Wróbel (1):
      crypto: ixp4xx - include fix

 crypto/sha512_generic.c        |    2 +-
 drivers/crypto/ixp4xx_crypto.c |    1 +
 drivers/crypto/talitos.c       |   20 +++++++++++++++++---
 3 files changed, 19 insertions(+), 4 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.5
  2012-03-20  3:27                             ` Herbert Xu
@ 2012-05-23  1:35                               ` Herbert Xu
  2012-05-23 23:06                                 ` Linus Torvalds
  2012-07-25  8:41                                 ` Crypto Update for 3.6 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2012-05-23  1:35 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.5:

* New cipher/hash driver for ARM ux500.
* Code clean-up for aesni-intel.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Andreas Westin (5):
      crypto: ux500 - Add driver for CRYP hardware
      crypto: ux500 - Add driver for HASH hardware
      mach-ux500: crypto - core support for CRYP/HASH module.
      crypto: ux500 - Update DMA handling for 3.4
      crypto: ux500 - Cleanup hardware identification

Borislav Petkov (1):
      crypto, xor: Sanitize checksumming function selection output

Julia Lawall (2):
      crypto: crypto4xx - move up err_request_irq label
      hwrng: omap - use devm_request_and_ioremap

Jussi Kivilinna (2):
      crypto: aesni-intel - use crypto_[un]register_algs
      crypto: aesni-intel - move more common code to ablk_init_common

Nicolas Ferre (1):
      hwrng: Kconfig - modify default state for atmel-rng driver

Shengzhou Liu (1):
      crypto: caam - add backward compatible string sec4.0

 arch/arm/mach-ux500/board-mop500.c              |   48 
 arch/arm/mach-ux500/clock.c                     |   18 
 arch/arm/mach-ux500/devices-common.h            |   54 
 arch/arm/mach-ux500/devices-db8500.c            |    3 
 arch/arm/mach-ux500/devices-db8500.h            |    4 
 arch/arm/mach-ux500/include/mach/crypto-ux500.h |   22 
 arch/arm/mach-ux500/include/mach/devices.h      |    3 
 arch/arm/mach-ux500/include/mach/hardware.h     |    3 
 arch/x86/crypto/aesni-intel_glue.c              |  827 +++------
 crypto/xor.c                                    |    5 
 drivers/char/hw_random/Kconfig                  |    2 
 drivers/char/hw_random/omap-rng.c               |   22 
 drivers/crypto/Kconfig                          |   11 
 drivers/crypto/Makefile                         |    1 
 drivers/crypto/amcc/crypto4xx_core.c            |    2 
 drivers/crypto/caam/caamalg.c                   |   14 
 drivers/crypto/caam/ctrl.c                      |   16 
 drivers/crypto/ux500/Kconfig                    |   30 
 drivers/crypto/ux500/Makefile                   |    8 
 drivers/crypto/ux500/cryp/Makefile              |   13 
 drivers/crypto/ux500/cryp/cryp.c                |  401 ++++
 drivers/crypto/ux500/cryp/cryp.h                |  308 +++
 drivers/crypto/ux500/cryp/cryp_core.c           | 1790 +++++++++++++++++++++
 drivers/crypto/ux500/cryp/cryp_irq.c            |   45 
 drivers/crypto/ux500/cryp/cryp_irq.h            |   31 
 drivers/crypto/ux500/cryp/cryp_irqp.h           |  125 +
 drivers/crypto/ux500/cryp/cryp_p.h              |  125 +
 drivers/crypto/ux500/hash/Makefile              |   11 
 drivers/crypto/ux500/hash/hash_alg.h            |  395 ++++
 drivers/crypto/ux500/hash/hash_core.c           | 2031 +++++++++++++++++++++++-
 30 files changed, 5819 insertions(+), 549 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.5
  2012-05-23  1:35                               ` Crypto Update for 3.5 Herbert Xu
@ 2012-05-23 23:06                                 ` Linus Torvalds
  2012-05-24  0:21                                   ` Herbert Xu
  2012-05-24  7:03                                   ` Linus Walleij
  2012-07-25  8:41                                 ` Crypto Update for 3.6 Herbert Xu
  1 sibling, 2 replies; 246+ messages in thread
From: Linus Torvalds @ 2012-05-23 23:06 UTC (permalink / raw)
  To: Herbert Xu, Andreas Westin
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, May 22, 2012 at 6:35 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 3.5:

I pulled this, but quite frankly, some of it looks like utter garbage.

There's a declaration for dbx500_add_platform_device_noirq() that does
not exist and is not used anywhere. Why? It was added in commit
585d188f8072, and I see no rhyme or reason to it.

I only noticed because I happened to get a conflict due to the
location it was added. I removed it. WTF is going on?

                         Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.5
  2012-05-23 23:06                                 ` Linus Torvalds
@ 2012-05-24  0:21                                   ` Herbert Xu
  2012-05-24  8:36                                     ` Arnd Bergmann
  2012-05-24  7:03                                   ` Linus Walleij
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-05-24  0:21 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Andreas Westin, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Arnd Bergmann, Linus Walleij

On Wed, May 23, 2012 at 04:06:35PM -0700, Linus Torvalds wrote:
> On Tue, May 22, 2012 at 6:35 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Here is the crypto update for 3.5:
> 
> I pulled this, but quite frankly, some of it looks like utter garbage.
> 
> There's a declaration for dbx500_add_platform_device_noirq() that does
> not exist and is not used anywhere. Why? It was added in commit
> 585d188f8072, and I see no rhyme or reason to it.

I can't see why that was added there either.

Adding Arnd/Linus Walleij to see if they can tell us whether
it should go or stay.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.5
  2012-05-23 23:06                                 ` Linus Torvalds
  2012-05-24  0:21                                   ` Herbert Xu
@ 2012-05-24  7:03                                   ` Linus Walleij
  1 sibling, 0 replies; 246+ messages in thread
From: Linus Walleij @ 2012-05-24  7:03 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, Andreas Westin, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List, Lee Jones

On Thu, May 24, 2012 at 1:06 AM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:

> There's a declaration for dbx500_add_platform_device_noirq() that does
> not exist and is not used anywhere. Why? It was added in commit
> 585d188f8072, and I see no rhyme or reason to it.
>
> I only noticed because I happened to get a conflict due to the
> location it was added. I removed it. WTF is going on?

AFAICT this was retrofitted to get a booting kernel on
the cryptodev base which was based on something old like
v3.2 just some weeks back. (Now it's upgraded to mainline, great!)

Greg was pushing for us to allocate all devices dynamically at
one point, but there was no real infrastructure for it and some local
implementations to meet that requirement, that's why these
functions pop up and down. We're working on it with device tree
etc, mea culpa...

Yours,
Linus Walleij

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.5
  2012-05-24  0:21                                   ` Herbert Xu
@ 2012-05-24  8:36                                     ` Arnd Bergmann
  0 siblings, 0 replies; 246+ messages in thread
From: Arnd Bergmann @ 2012-05-24  8:36 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, Andreas Westin, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List,
	Linus Walleij, Lee Jones

On Thursday 24 May 2012, Herbert Xu wrote:
> On Wed, May 23, 2012 at 04:06:35PM -0700, Linus Torvalds wrote:
> > On Tue, May 22, 2012 at 6:35 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> > >
> > > Here is the crypto update for 3.5:
> > 
> > I pulled this, but quite frankly, some of it looks like utter garbage.
> > 
> > There's a declaration for dbx500_add_platform_device_noirq() that does
> > not exist and is not used anywhere. Why? It was added in commit
> > 585d188f8072, and I see no rhyme or reason to it.
> 
> I can't see why that was added there either.
> 
> Adding Arnd/Linus Walleij to see if they can tell us whether
> it should go or stay.

It should go. For all I can tell, this was the result of Lee Jones
doing major cleanups to the ux500 platform for this merge window
in parallel with the crypto driver getting added following the
older code pattern. The crypto patch had to be reworked for this
and apparently a hunk from the older version survived.

The entire file in which it was added is going to be removed
in one of the next kernel versions once we can boot all ux500 machines
using only device tree definitions, so it will be taken care of.

	Arnd

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.5
  2012-03-22  1:20                                       ` Crypto Fixes for 3.4 Herbert Xu
  2012-04-02  9:45                                         ` Herbert Xu
@ 2012-06-11 13:00                                         ` Herbert Xu
  2012-06-18  8:24                                           ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-06-11 13:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes an unaligned fault on x86-32 with aesni-intel
and an RNG failure with atmel-rng (repeated bits).


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Mathias Krause (1):
      crypto: aesni-intel - fix unaligned cbc decrypt for x86-32

Peter Korsgaard (1):
      hwrng: atmel-rng - fix race condition leading to repeated bits

 arch/x86/crypto/aesni-intel_asm.S  |    6 ++++--
 drivers/char/hw_random/atmel-rng.c |    7 +++++++
 2 files changed, 11 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.5
  2012-06-11 13:00                                         ` Crypto Fixes for 3.5 Herbert Xu
@ 2012-06-18  8:24                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-06-18  8:24 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes another bug in the atmel-rng that made it produce
completely useless output.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Peter Korsgaard (1):
      hwrng: atmel-rng - fix data valid check

 drivers/char/hw_random/atmel-rng.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.6
  2012-05-23  1:35                               ` Crypto Update for 3.5 Herbert Xu
  2012-05-23 23:06                                 ` Linus Torvalds
@ 2012-07-25  8:41                                 ` Herbert Xu
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-07-25  8:41 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.6:

* Fixed algorithm construction hang when self-test fails.
* Added SHA variants to talitos AEAD list.
* New driver for Exynos random number generator.
* Performance enhancements for arc4.
* Added hwrng support to caam.
* Added ahash support to caam.
* Fixed bad kfree in aesni-intel.
* Allow aesni-intel in FIPS mode.
* Added atmel driver with support for AES/3DES/SHA.
* Bug fixes for mv_cesa.
* CRC hardware driver for BF60x family processors.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alex Porosanu (1):
      crypto: caam - ERA retrieval and printing for SEC device

Benoît Thébaudeau (1):
      hwrng: mxc-rnga - fix data_present API

Bharat Bhushan (1):
      crypto: caam - Using alloc_coherent for caam job rings

Hemant Agrawal (1):
      crypto: caam - add PDB (Protocol Descriptor Block) definitions

Herbert Xu (1):
      crypto: algapi - Move larval completion into algboss

Horia Geanta (4):
      crypto: talitos - move talitos structures to header file
      crypto: talitos - export the talitos_submit function
      crypto: talitos - add sha224, sha384 and sha512 to existing AEAD algorithms
      crypto: testmgr - add aead cbc aes hmac sha1,256,512 test vectors

Johannes Goetzfried (4):
      crypto: twofish - add x86_64/avx assembler implementation
      crypto: testmgr - expand twofish test vectors
      crypto: serpent - add x86_64/avx assembler implementation
      crypto: twofish-avx - remove useless instruction

Jonghwa Lee (1):
      hwrng: exynos - Add support for Exynos random number generator

Jussi Kivilinna (15):
      crypto: testmgr - add ecb(arc4) speed tests
      crypto: arc4 - improve performance by adding ecb(arc4)
      crypto: arc4 - improve performance by using u32 for ctx and variables
      crypto: serpent-sse2/avx - allow both to be built into kernel
      crypto: ablk_helper - move ablk_* functions from serpent-sse2/avx glue code to shared module
      crypto: twofish-avx - change to use shared ablk_* functions
      crypto: aes_ni - change to use shared ablk_* functions
      crypto: serpent-sse2 - prepare serpent-sse2 glue code into generic x86 glue code for 128bit block ciphers
      crypto: serpent-sse2 - split generic glue code to new helper module
      crypto: serpent-avx: remove duplicated glue code and use shared glue code from glue_helper
      crypto: camellia-x86_64 - remove duplicated glue code and use shared glue code from glue_helper
      crypto: twofish-x86_64-3way - remove duplicated glue code and use shared glue code from glue_helper
      crypto: twofish-avx - remove duplicated glue code and use shared glue code from glue_helper
      crypto: move arch/x86/include/asm/serpent-{sse2|avx}.h to arch/x86/include/asm/crypto/
      crypto: move arch/x86/include/asm/aes.h to arch/x86/include/asm/crypto/

Kim Phillips (10):
      crypto: caam - remove line continuations from ablkcipher_append_src_dst
      crypto: caam - fix input job ring element dma mapping size
      crypto: caam - fix descriptor length adjustments for protocol descriptors
      crypto: caam - assign 40-bit masks on SEC v5.0 and above
      crypto: caam - add support for SEC v5.x RNG4
      crypto: caam - disable IRQ coalescing by default
      crypto: caam - use non-irq versions of spinlocks for job rings
      crypto: caam - only query h/w in job ring dequeue path
      crypto: caam - consolidate memory barriers from job ring en/dequeue
      crypto: caam - one tasklet per job ring

Mathias Krause (1):
      crypto: sha1 - use Kbuild supplied flags for AVX test

Milan Broz (2):
      crypto: aesni-intel - fix wrong kfree pointer
      crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode

Nicolas Royer (5):
      ARM: AT91SAM9G45: add crypto peripherals
      crypto: atmel - add Atmel AES driver
      crypto: atmel - add Atmel DES/TDES driver
      crypto: atmel - add Atmel SHA1/SHA256 driver
      crypto: atmel - add new tests to tcrypt

Paul Bolle (1):
      crypto: s390 - clean up DES code a bit more

Phil Sutter (3):
      crypto: mv_cesa - add an expiry timer in case anything goes wrong
      crypto: mv_cesa - initialise the interrupt status field to zero
      crypto: mv_cesa - fix for hash finalisation with data

Sebastian Andrzej Siewior (1):
      crypto: arc4 - now arc needs blockcipher support

Seth Jennings (2):
      crypto: nx - move nx build to driver/crypto Makefile
      crypto: nx - fix typo in nx driver config option

Sonic Zhang (2):
      crypto: testmgr - Add new test cases for Blackfin CRC crypto driver
      crypto: bfin_crc - CRC hardware driver for BF60x family processors.

Steffen Klassert (1):
      crypto: algapi - Fix hang on crypto allocation

Yashpal Dutta (1):
      crypto: caam - fix start index for Protocol shared descriptors

Yuan Kang (8):
      crypto: caam - support external seq in/out lengths
      crypto: caam - remove jr register/deregister
      crypto: caam - refactor key_gen, sg
      crypto: caam - link_tbl rename
      crypto: caam - ahash hmac support
      crypto: caam - unkeyed ahash support
      crypto: caam - chaining support
      crypto: caam - hwrng support

 arch/arm/mach-at91/at91sam9g45.c                   |   13 +-
 arch/arm/mach-at91/at91sam9g45_devices.c           |  128 ++
 arch/arm/mach-at91/include/mach/at91sam9g45.h      |    2 +
 arch/powerpc/Makefile                              |    1 -
 arch/s390/crypto/crypto_des.h                      |   18 -
 arch/x86/crypto/Makefile                           |   14 +-
 arch/x86/crypto/ablk_helper.c                      |  149 ++
 arch/x86/crypto/aes_glue.c                         |    2 +-
 arch/x86/crypto/aesni-intel_glue.c                 |  110 +-
 arch/x86/crypto/camellia_glue.c                    |  355 +---
 arch/x86/crypto/glue_helper.c                      |  307 ++++
 arch/x86/crypto/serpent-avx-x86_64-asm_64.S        |  704 ++++++++
 .../{serpent_sse2_glue.c => serpent_avx_glue.c}    |  592 ++-----
 arch/x86/crypto/serpent_sse2_glue.c                |  513 ++-----
 arch/x86/crypto/sha1_ssse3_asm.S                   |    2 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |    6 +-
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |  300 ++++
 arch/x86/crypto/twofish_avx_glue.c                 |  624 +++++++
 arch/x86/crypto/twofish_glue_3way.c                |  409 ++----
 arch/x86/include/asm/crypto/ablk_helper.h          |   31 +
 arch/x86/include/asm/{ => crypto}/aes.h            |    0
 arch/x86/include/asm/crypto/glue_helper.h          |  115 ++
 arch/x86/include/asm/crypto/serpent-avx.h          |   32 +
 .../asm/{serpent.h => crypto/serpent-sse2.h}       |    4 +-
 arch/x86/include/asm/crypto/twofish.h              |   46 +
 crypto/Kconfig                                     |   67 +-
 crypto/algapi.c                                    |   17 -
 crypto/algboss.c                                   |   17 +-
 crypto/arc4.c                                      |  115 +-
 crypto/internal.h                                  |    1 -
 crypto/tcrypt.c                                    |   86 +-
 crypto/testmgr.c                                   |  203 +++
 crypto/testmgr.h                                   | 1852 +++++++++++++++++++-
 drivers/char/hw_random/Kconfig                     |   12 +
 drivers/char/hw_random/Makefile                    |    1 +
 drivers/char/hw_random/exynos-rng.c                |  182 ++
 drivers/char/hw_random/mxc-rnga.c                  |   21 +-
 drivers/crypto/Kconfig                             |   56 +-
 drivers/crypto/Makefile                            |    7 +-
 drivers/crypto/atmel-aes-regs.h                    |   62 +
 drivers/crypto/atmel-aes.c                         | 1206 +++++++++++++
 drivers/crypto/atmel-sha-regs.h                    |   46 +
 drivers/crypto/atmel-sha.c                         | 1112 ++++++++++++
 drivers/crypto/atmel-tdes-regs.h                   |   89 +
 drivers/crypto/atmel-tdes.c                        | 1215 +++++++++++++
 drivers/crypto/bfin_crc.c                          |  780 ++++++++
 drivers/crypto/caam/Kconfig                        |   30 +-
 drivers/crypto/caam/Makefile                       |    4 +-
 drivers/crypto/caam/caamalg.c                      |  572 ++----
 drivers/crypto/caam/caamhash.c                     | 1878 ++++++++++++++++++++
 drivers/crypto/caam/caamrng.c                      |  309 ++++
 drivers/crypto/caam/compat.h                       |    2 +
 drivers/crypto/caam/ctrl.c                         |  179 ++-
 drivers/crypto/caam/ctrl.h                         |   13 +
 drivers/crypto/caam/desc.h                         |   31 +-
 drivers/crypto/caam/desc_constr.h                  |   57 +-
 drivers/crypto/caam/error.c                        |   44 +-
 drivers/crypto/caam/intern.h                       |    6 +-
 drivers/crypto/caam/jr.c                           |  115 +-
 drivers/crypto/caam/key_gen.c                      |  122 ++
 drivers/crypto/caam/key_gen.h                      |   17 +
 drivers/crypto/caam/pdb.h                          |  401 +++++
 drivers/crypto/caam/regs.h                         |   38 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |  156 ++
 drivers/crypto/mv_cesa.c                           |   61 +-
 drivers/crypto/talitos.c                           |  283 ++--
 drivers/crypto/talitos.h                           |  123 ++
 include/linux/platform_data/atmel-aes.h            |   22 +
 68 files changed, 13795 insertions(+), 2292 deletions(-)
  
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.6
  2012-01-26  2:43                                     ` Crypto Fixes for 3.3 Herbert Xu
                                                         ` (2 preceding siblings ...)
  2012-03-22  1:20                                       ` Crypto Fixes for 3.4 Herbert Xu
@ 2012-08-23  8:32                                       ` Herbert Xu
  2012-09-11  4:10                                         ` Herbert Xu
  2012-11-09  9:30                                         ` Crypto Fixes for 3.7 Herbert Xu
  3 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2012-08-23  8:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build error on 32-bit archs in the hifn driver
as well as a potential deadlock in the caam driver.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Jussi Kivilinna (1):
      crypto: hifn_795x - fix 64bit division and undefined __divdi3 on 32bit archs

Kim Phillips (1):
      crypto: caam - fix possible deadlock condition

 drivers/crypto/caam/jr.c   |   10 +++++-----
 drivers/crypto/hifn_795x.c |    4 ++--
 2 files changed, 7 insertions(+), 7 deletions(-)
  
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.6
  2012-08-23  8:32                                       ` Crypto Fixes for 3.6 Herbert Xu
@ 2012-09-11  4:10                                         ` Herbert Xu
  2012-11-09  9:30                                         ` Crypto Fixes for 3.7 Herbert Xu
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-09-11  4:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the authenc self-test crash as well as a missing
export of a symbol used by a module.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Ben Collins (1):
      crypto/caam: Export gen_split_key symbol for other modules

Herbert Xu (1):
      crypto: authenc - Fix crash with zero-length assoc data
   
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.7
  2012-01-06  4:12                           ` Crypto Update for 3.3 Herbert Xu
  2012-01-11 22:19                             ` Herbert Xu
  2012-03-20  3:27                             ` Herbert Xu
@ 2012-10-04  9:53                             ` Herbert Xu
  2012-12-14 10:31                               ` Crypto Update for 3.8 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-10-04  9:53 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.7:

* Optimised AES/SHA1 for ARM.
* IPsec ESN support in talitos and caam.
* x86_64/avx implementation of cast5/cast6.
* Add/use multi-algorithm registration helpers where possible.
* Added IBM Power7+ in-Nest support.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


David McCullough (1):
      arm/crypto: Add optimized AES and SHA1 routines

Devendra Naga (1):
      crypto: ux500/hash - remove unneeded return at ux500_hash_mod_fini

Fabio Estevam (2):
      hwrng: mxc-rnga - Adapt clocks to new i.mx clock framework
      hwrng: mxc-rnga - Access data via structure

Horia Geanta (7):
      crypto: talitos - fix icv management on outbound direction
      crypto: talitos - prune unneeded descriptor allocation param
      crypto: talitos - change type and name for [src|dst]_is_chained
      crypto: talitos - support for assoc data provided as scatterlist
      crypto: talitos - add IPsec ESN support
      crypto: caam - add IPsec ESN support
      crypto: caam - fix error IDs for SEC v5.x RNG4

Johannes Goetzfried (6):
      crypto: cast5 - prepare generic module for optimized implementations
      crypto: testmgr - add larger cast5 testvectors
      crypto: cast5 - add x86_64/avx assembler implementation
      crypto: cast6 - prepare generic module for optimized implementations
      crypto: testmgr - add larger cast6 testvectors
      crypto: cast6 - add x86_64/avx assembler implementation

Julia Lawall (1):
      drivers/char/hw_random/octeon-rng.c: drop frees of devm allocated data

Jussi Kivilinna (32):
      crypto: tea - use crypto_[un]register_algs
      crypto: crypto_null - use crypto_[un]register_algs
      crypto: des - use crypto_[un]register_algs
      crypto: serpent - use crypto_[un]register_algs
      crypto: ansi_cprng - use crypto_[un]register_algs
      crypto: add crypto_[un]register_shashes for [un]registering multiple shash entries at once
      crypto: tiger - use crypto_[un]register_shashes
      crypto: sha256 - use crypto_[un]register_shashes
      crypto: sha512 - use crypto_[un]register_shashes
      crypto: whirlpool - use crypto_[un]register_shashes
      crypto: cleanup - remove unneeded crypto_alg.cra_list initializations
      crypto: arch/x86 - cleanup - remove unneeded crypto_alg.cra_list initializations
      crypto: drivers - remove cra_list initialization
      crypto: arch/s390 - cleanup - remove unneeded cra_list initialization
      crypto: aesni_intel - improve lrw and xts performance by utilizing parallel AES-NI hardware pipelines
      crypto: twofish-avx - tune assembler code for more performance
      crypto: cast5-avx - tune assembler code for more performance
      crypto: cast6-avx - tune assembler code for more performance
      crypto: crypto_user - fix sparse warnings (symbol was not declared, should be static?)
      crypto: camellia-x86_64 - fix sparse warnings (constant is so big)
      crypto: cast5 - fix sparse warnings (symbol was not declared, should be static?)
      crypto: cast6 - fix sparse warnings (symbol was not declared, should be static?)
      Revert "[CRYPTO] cast6: inline bloat--"
      crypto: 842 - remove .cra_list initialization
      crypto: testmgr - allow non-multi page and multi page skcipher tests from same test template
      crypto: testmgr - add test vectors for partial ctr(cast5) and ctr(cast6)
      crypto: testmgr - add test vectors for CTR mode IV increasement
      crypto: testmgr - make test_skcipher also test 'dst != src' code paths
      crypto: testmgr - make test_aead also test 'dst != src' code paths
      crypto: tcrypt - add missing tests for camellia and ghash
      crypto: cast5/avx - fix storing of new IV in CBC encryption
      crypto: x86/glue_helper - fix storing of new IV in CBC encryption

Kent Yoder (1):
      crypto: Add a MAINTAINERS entry for P7+ in-Nest crypto driver

Kim Phillips (6):
      crypto: caam - fix possible deadlock condition
      crypto: caam - set descriptor sharing type to SERIAL
      crypto: talitos - consolidate cra_type assignments
      crypto: talitos - consolidate common cra_* assignments
      crypto: caam - coccicheck fixes
      crypto: caam - increase TRNG clocks per sample

Michael Ellerman (1):
      crypto: nx - Remove virt_to_abs() usage in nx-842.c

Peter Senna Tschudin (4):
      crypto: ux500 - fix error return code
      crypto: hifn_795x - fix error return code
      crypto: crypto4xx - fix error return code
      crypto: tegra-aes - fix error return code

Sachin Kamat (1):
      crypto: geode-aes - Use module_pci_driver

Seth Jennings (4):
      powerpc/crypto: rework Kconfig
      powerpc/crypto: add compression support to arch vec
      powerpc/crypto: add 842 hardware compression driver
      powerpc/crypto: add 842 crypto driver

Shengzhou Liu (1):
      crypto: caam - add backward compatible string sec4.0

Suresh Siddha (1):
      crypto, tcrypt: remove local_bh_disable/enable() around local_irq_disable/enable()

Tushar Behera (1):
      crypto: atmel - Remove possible typo error

Wei Yongjun (1):
      crypto: remove duplicated include

 MAINTAINERS                                        |   12 +
 arch/arm/Makefile                                  |    1 +
 arch/arm/crypto/Makefile                           |    9 +
 arch/arm/crypto/aes-armv4.S                        | 1112 +++++
 arch/arm/crypto/aes_glue.c                         |  108 +
 arch/arm/crypto/sha1-armv4-large.S                 |  503 ++
 arch/arm/crypto/sha1_glue.c                        |  179 +
 arch/powerpc/configs/ppc64_defconfig               |    3 +-
 arch/powerpc/configs/pseries_defconfig             |    3 +-
 arch/powerpc/kernel/prom_init.c                    |    4 +-
 arch/s390/crypto/aes_s390.c                        |    5 -
 arch/s390/crypto/des_s390.c                        |   10 -
 arch/s390/crypto/ghash_s390.c                      |    1 -
 arch/x86/crypto/Makefile                           |    4 +
 arch/x86/crypto/aes_glue.c                         |    1 -
 arch/x86/crypto/aesni-intel_glue.c                 |  258 +-
 arch/x86/crypto/blowfish_glue.c                    |    4 -
 arch/x86/crypto/camellia_glue.c                    | 1382 +++---
 arch/x86/crypto/cast5-avx-x86_64-asm_64.S          |  376 ++
 arch/x86/crypto/cast5_avx_glue.c                   |  530 ++
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |  383 ++
 .../{serpent_avx_glue.c => cast6_avx_glue.c}       |  380 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |    2 -
 arch/x86/crypto/glue_helper.c                      |    2 +-
 arch/x86/crypto/salsa20_glue.c                     |    1 -
 arch/x86/crypto/serpent_avx_glue.c                 |   10 -
 arch/x86/crypto/serpent_sse2_glue.c                |   10 -
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |  227 +-
 arch/x86/crypto/twofish_avx_glue.c                 |   10 -
 arch/x86/crypto/twofish_glue.c                     |    1 -
 arch/x86/crypto/twofish_glue_3way.c                |    5 -
 crypto/842.c                                       |  182 +
 crypto/Kconfig                                     |   75 +
 crypto/Makefile                                    |    5 +-
 crypto/aes_generic.c                               |    1 -
 crypto/ansi_cprng.c                                |   63 +-
 crypto/anubis.c                                    |    1 -
 crypto/blowfish_generic.c                          |    1 -
 crypto/camellia_generic.c                          |    1 -
 crypto/{cast5.c => cast5_generic.c}                |   80 +-
 crypto/{cast6.c => cast6_generic.c}                |   73 +-
 crypto/crypto_null.c                               |   57 +-
 crypto/crypto_user.c                               |    2 +-
 crypto/deflate.c                                   |    1 -
 crypto/des_generic.c                               |   25 +-
 crypto/fcrypt.c                                    |    1 -
 crypto/ghash-generic.c                             |    1 -
 crypto/khazad.c                                    |    1 -
 crypto/krng.c                                      |    1 -
 crypto/lzo.c                                       |    1 -
 crypto/salsa20_generic.c                           |    1 -
 crypto/seed.c                                      |    1 -
 crypto/serpent_generic.c                           |   53 +-
 crypto/sha256_generic.c                            |   25 +-
 crypto/sha512_generic.c                            |   20 +-
 crypto/shash.c                                     |   36 +
 crypto/tcrypt.c                                    |   95 +-
 crypto/tcrypt.h                                    |    1 +
 crypto/tea.c                                       |   41 +-
 crypto/testmgr.c                                   |  472 ++-
 crypto/testmgr.h                                   | 5169 ++++++++++++++++----
 crypto/tgr192.c                                    |   38 +-
 crypto/twofish_generic.c                           |    1 -
 crypto/vmac.c                                      |   10 +-
 crypto/wp512.c                                     |   39 +-
 drivers/char/hw_random/mxc-rnga.c                  |  108 +-
 drivers/char/hw_random/octeon-rng.c                |   17 +-
 drivers/crypto/Kconfig                             |   22 +-
 drivers/crypto/amcc/crypto4xx_core.c               |    1 +
 drivers/crypto/atmel-aes.c                         |    7 -
 drivers/crypto/atmel-sha.c                         |    5 -
 drivers/crypto/atmel-tdes.c                        |    6 -
 drivers/crypto/caam/caamalg.c                      |   51 +-
 drivers/crypto/caam/caamhash.c                     |   22 +-
 drivers/crypto/caam/caamrng.c                      |    9 +-
 drivers/crypto/caam/compat.h                       |    1 +
 drivers/crypto/caam/ctrl.c                         |    6 +-
 drivers/crypto/caam/error.c                        |    2 -
 drivers/crypto/caam/jr.c                           |   10 +-
 drivers/crypto/caam/key_gen.c                      |    4 +
 drivers/crypto/geode-aes.c                         |   18 +-
 drivers/crypto/hifn_795x.c                         |    5 +-
 drivers/crypto/nx/Kconfig                          |   26 +
 drivers/crypto/nx/Makefile                         |    5 +-
 drivers/crypto/nx/nx-842.c                         | 1617 ++++++
 drivers/crypto/nx/nx-aes-cbc.c                     |    1 -
 drivers/crypto/nx/nx-aes-ccm.c                     |    2 -
 drivers/crypto/nx/nx-aes-ctr.c                     |    2 -
 drivers/crypto/nx/nx-aes-ecb.c                     |    1 -
 drivers/crypto/nx/nx-aes-gcm.c                     |    2 -
 drivers/crypto/omap-aes.c                          |    1 -
 drivers/crypto/padlock-aes.c                       |    3 -
 drivers/crypto/s5p-sss.c                           |    1 -
 drivers/crypto/talitos.c                           |  442 +-
 drivers/crypto/tegra-aes.c                         |    3 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |    1 +
 drivers/crypto/ux500/hash/hash_core.c              |    1 -
 include/crypto/cast5.h                             |   27 +
 include/crypto/cast6.h                             |   28 +
 include/crypto/internal/hash.h                     |    2 +
 include/linux/nx842.h                              |   11 +
 101 files changed, 11832 insertions(+), 2748 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.7
  2012-08-23  8:32                                       ` Crypto Fixes for 3.6 Herbert Xu
  2012-09-11  4:10                                         ` Herbert Xu
@ 2012-11-09  9:30                                         ` Herbert Xu
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-11-09  9:30 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a potential panic in cryptd which may occur with
crypto drivers such as aesni-intel.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Jussi Kivilinna (1):
      crypto: cryptd - disable softirqs in cryptd_queue_worker to prevent data corruption

 crypto/cryptd.c |   11 ++++++++---
 1 files changed, 8 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.8
  2012-10-04  9:53                             ` Crypto Update for 3.7 Herbert Xu
@ 2012-12-14 10:31                               ` Herbert Xu
  2013-02-23  2:33                                 ` Crypto Update for 3.9 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-12-14 10:31 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.8:

* Added aesni/avx/x86_64 implementations for camellia.
* Optimised AVX code for cast5/serpent/twofish/cast6.
* Fixed vmac bug with unaligned input.
* Allow compression algorithms in FIPS mode.
* Optimised crc32c implementation for Intel.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Axel Lin (1):
      crypto: picoxcell - Add terminating entry for platform_device_id table

Jussi Kivilinna (18):
      crypto: testmgr - expand camellia test vectors
      crypto: testmgr - expand blowfish test vectors
      crypto: testmgr - expand serpent test vectors
      crypto: testmgr - add new larger AES testvectors
      crypto: testmgr - add new larger DES testvectors
      crypto: testmgr - add new larger DES3_EDE testvectors
      crypto: x86/glue_helper - use le128 instead of u128 for CTR mode
      crypto: cast6/avx - avoid using temporary stack buffers
      crypto: twofish/avx - avoid using temporary stack buffers
      crypto: serpent/avx - avoid using temporary stack buffers
      crypto: cast5/avx - avoid using temporary stack buffers
      crypto: tcrypt - add async speed test for camellia cipher
      crypto: camellia-x86_64 - share common functions and move structures and function definitions to header file
      crypto: camellia - add AES-NI/AVX/x86_64 assembler implementation of camellia cipher
      crypto: cast5/cast6 - move lookup tables to shared module
      crypto: testmgr - remove fips_allowed flag from camellia-aesni null-tests
      crypto: testmgr - clean alg_test_null entries in alg_test_descs[]
      crypto: testmgr - add larger crc32c test vector to test FPU path in crc32c_intel

Mathias Krause (1):
      crypto: testmgr - remove superfluous initializers for xts(aes)

Milan Broz (1):
      crypto: testmgr - allow compression algs in fips mode

Sachin Kamat (1):
      crypto: s5p-sss - Fix compilation error

Salman Qazi (1):
      crypto: vmac - Make VMAC work when blocks aren't aligned

Sebastian Andrzej Siewior (1):
      crypto: omap-aes - select BLKCIPHER2

Shan Wei (1):
      padata: use __this_cpu_read per-cpu helper

Tim Chen (3):
      crypto: crc32c - Rename crc32c-intel.c to crc32c-intel_glue.c
      crypto: crc32c - Optimize CRC32C calculation with PCLMULQDQ instruction
      crypto: tcrypt - Added speed test in tcrypt for crc32c

Vakul Garg (1):
      crypto: caam - Updated SEC-4.0 device tree binding for ERA information.

Wei Yongjun (3):
      crypto: talitos - convert to use be16_add_cpu()
      crypto: tegra - fix missing unlock on error case
      crypto: tegra-aes - fix error-valued pointer dereference

 .../devicetree/bindings/crypto/fsl-sec4.txt        |    5 +-
 arch/x86/crypto/Makefile                           |    5 +
 arch/x86/crypto/camellia-aesni-avx-asm_64.S        | 1102 ++++
 arch/x86/crypto/camellia_aesni_avx_glue.c          |  558 ++
 arch/x86/crypto/camellia_glue.c                    |   92 +-
 arch/x86/crypto/cast5-avx-x86_64-asm_64.S          |  348 +-
 arch/x86/crypto/cast5_avx_glue.c                   |   79 +-
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |  206 +-
 arch/x86/crypto/cast6_avx_glue.c                   |   77 +-
 .../crypto/{crc32c-intel.c => crc32c-intel_glue.c} |   81 +
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |  460 ++
 arch/x86/crypto/glue_helper-asm-avx.S              |   91 +
 arch/x86/crypto/glue_helper.c                      |   12 +-
 arch/x86/crypto/serpent-avx-x86_64-asm_64.S        |  166 +-
 arch/x86/crypto/serpent_avx_glue.c                 |   49 +-
 arch/x86/crypto/serpent_sse2_glue.c                |   12 +-
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |  208 +-
 arch/x86/crypto/twofish_avx_glue.c                 |   73 +-
 arch/x86/crypto/twofish_glue_3way.c                |   20 +-
 arch/x86/include/asm/crypto/camellia.h             |   82 +
 arch/x86/include/asm/crypto/glue_helper.h          |   28 +-
 arch/x86/include/asm/crypto/serpent-avx.h          |   27 +-
 arch/x86/include/asm/crypto/twofish.h              |    4 +-
 crypto/Kconfig                                     |   42 +
 crypto/Makefile                                    |    1 +
 crypto/cast5_generic.c                             |  277 +-
 crypto/cast6_generic.c                             |  280 +-
 crypto/cast_common.c                               |  290 +
 crypto/tcrypt.c                                    |   29 +
 crypto/testmgr.c                                   |  369 +--
 crypto/testmgr.h                                   | 5912 +++++++++++++++++++-
 crypto/vmac.c                                      |   47 +-
 drivers/crypto/Kconfig                             |    1 +
 drivers/crypto/picoxcell_crypto.c                  |    1 +
 drivers/crypto/s5p-sss.c                           |    2 +-
 drivers/crypto/talitos.c                           |    3 +-
 drivers/crypto/tegra-aes.c                         |   10 +-
 include/crypto/cast5.h                             |    6 +-
 include/crypto/cast6.h                             |    6 +-
 include/crypto/cast_common.h                       |    9 +
 include/crypto/vmac.h                              |    2 +
 kernel/padata.c                                    |    5 +-
 42 files changed, 9391 insertions(+), 1686 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.9
  2012-12-14 10:31                               ` Crypto Update for 3.8 Herbert Xu
@ 2013-02-23  2:33                                 ` Herbert Xu
  2013-05-02  1:47                                   ` Crypto Update for 3.10 Herbert Xu
  2013-09-07  3:55                                   ` Crypto Update for 3.12 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2013-02-23  2:33 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.9:

* Added accelerated implementation of crc32 using pclmulqdq.
* Added test vector for fcrypt.
* Added support for OMAP4/AM33XX cipher and hash.
* Fixed loose crypto_user input checks.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexander Boyko (1):
      crypto: crc32 - add crc32 pclmulqdq implementation and wrappers for table implementation

Herbert Xu (1):
      crypto: crc32-pclmul - Kill warning on x86-32

Jingoo Han (1):
      crypto: s5p-sss - Use devm_clk_get()

Julia Lawall (3):
      crypto: bfin_crc - reposition free_irq to avoid access to invalid data
      crypto: atmel-aes - adjust duplicate test
      crypto: use ERR_CAST

Jussi Kivilinna (13):
      crypto: testmgr - add test vector for fcrypt
      crypto: x86/aes - assembler clean-ups: use ENTRY/ENDPROC, localize jump targets
      crypto: aesni-intel - add ENDPROC statements for assembler functions
      crypto: blowfish-x86_64: use ENTRY()/ENDPROC() for assembler functions and localize jump targets
      crypto: camellia-x86_64/aes-ni: use ENTRY()/ENDPROC() for assembler functions and localize jump targets
      crypto: cast5-avx: use ENTRY()/ENDPROC() for assembler functions and localize jump targets
      crypto: cast6-avx: use ENTRY()/ENDPROC() for assembler functions
      crypto: x86/crc32c - assembler clean-up: use ENTRY/ENDPROC
      crypto: x86/ghash - assembler clean-up: use ENDPROC at end of assember functions
      crypto: x86/salsa20 - assembler cleanup, use ENTRY/ENDPROC for assember functions and rename ECRYPT_* to salsa20_*
      crypto: x86/serpent - use ENTRY/ENDPROC for assember functions and localize jump targets
      crypto: x86/sha1 - assembler clean-ups: use ENTRY/ENDPROC
      crypto: x86/twofish - assembler clean-ups: use ENTRY/ENDPROC, localize jump labels

Mark A. Greer (20):
      crypto: omap-sham - Remove unnecessary pr_info noise
      crypto: omap-sham - Convert to use pm_runtime API
      crypto: omap-sham - Add suspend/resume support
      crypto: omap-sham - Add code to use dmaengine API
      crypto: omap-sham - Remove usage of private DMA API
      crypto: omap-sham - Add Device Tree Support
      crypto: omap-sham - Convert to dma_request_slave_channel_compat()
      crypto: omap-sham - Add OMAP4/AM33XX SHAM Support
      crypto: omap-sham - Add SHA224 and SHA256 Support
      crypto: omap-aes - Remmove unnecessary pr_info noise
      crypto: omap-aes - Don't reset controller for every operation
      crypto: omap-aes - Convert to use pm_runtime API
      crypto: omap-aes - Add suspend/resume support
      crypto: omap-aes - Add code to use dmaengine API
      crypto: omap-aes - Remove usage of private DMA API
      crypto: omap-aes - Add Device Tree Support
      crypto: omap-aes - Convert to dma_request_slave_channel_compat()
      crypto: omap-aes - Add OMAP4/AM33XX AES Support
      crypto: omap-aes - Add CTR algorithm Support
      crypto: omap-sham - Fix compile errors when CONFIG_OF not defined

Mathias Krause (3):
      crypto: user - fix info leaks in report API
      crypto: user - fix empty string test in report API
      crypto: user - ensure user supplied strings are nul-terminated

Vakul Garg (1):
      crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.

 .../devicetree/bindings/crypto/fsl-sec4.txt        |   12 +-
 arch/x86/crypto/Makefile                           |    2 +
 arch/x86/crypto/aes-i586-asm_32.S                  |   15 +-
 arch/x86/crypto/aes-x86_64-asm_64.S                |   30 +-
 arch/x86/crypto/aesni-intel_asm.S                  |   23 +-
 arch/x86/crypto/blowfish-x86_64-asm_64.S           |   39 +-
 arch/x86/crypto/camellia-aesni-avx-asm_64.S        |   38 +-
 arch/x86/crypto/camellia-x86_64-asm_64.S           |   50 +-
 arch/x86/crypto/cast5-avx-x86_64-asm_64.S          |   48 +-
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |   35 +-
 arch/x86/crypto/crc32-pclmul_asm.S                 |  246 ++++++
 arch/x86/crypto/crc32-pclmul_glue.c                |  201 +++++
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |    8 +-
 arch/x86/crypto/ghash-clmulni-intel_asm.S          |    4 +
 arch/x86/crypto/salsa20-i586-asm_32.S              |   28 +-
 arch/x86/crypto/salsa20-x86_64-asm_64.S            |   28 +-
 arch/x86/crypto/salsa20_glue.c                     |    5 -
 arch/x86/crypto/serpent-avx-x86_64-asm_64.S        |   35 +-
 arch/x86/crypto/serpent-sse2-i586-asm_32.S         |   20 +-
 arch/x86/crypto/serpent-sse2-x86_64-asm_64.S       |   20 +-
 arch/x86/crypto/sha1_ssse3_asm.S                   |   10 +-
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |   35 +-
 arch/x86/crypto/twofish-i586-asm_32.S              |   11 +-
 arch/x86/crypto/twofish-x86_64-asm_64-3way.S       |   20 +-
 arch/x86/crypto/twofish-x86_64-asm_64.S            |   11 +-
 crypto/Kconfig                                     |   21 +
 crypto/Makefile                                    |    1 +
 crypto/ablkcipher.c                                |   12 +-
 crypto/aead.c                                      |   15 +-
 crypto/ahash.c                                     |    2 +-
 crypto/algapi.c                                    |    4 +-
 crypto/authenc.c                                   |    3 +-
 crypto/authencesn.c                                |    3 +-
 crypto/blkcipher.c                                 |   12 +-
 crypto/ccm.c                                       |   23 +-
 crypto/chainiv.c                                   |    3 +-
 crypto/crc32.c                                     |  158 ++++
 crypto/crypto_user.c                               |   38 +-
 crypto/ctr.c                                       |    3 +-
 crypto/cts.c                                       |    3 +-
 crypto/gcm.c                                       |   29 +-
 crypto/pcompress.c                                 |    3 +-
 crypto/rng.c                                       |    2 +-
 crypto/seqiv.c                                     |    3 +-
 crypto/shash.c                                     |    3 +-
 crypto/testmgr.c                                   |   15 +
 drivers/crypto/atmel-aes.c                         |    2 +-
 drivers/crypto/bfin_crc.c                          |    6 +-
 drivers/crypto/omap-aes.c                          |  658 +++++++++++----
 drivers/crypto/omap-sham.c                         |  915 +++++++++++++++-----
 drivers/crypto/s5p-sss.c                           |    4 +-
 51 files changed, 2153 insertions(+), 762 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.9
  2012-11-09  9:30                                         ` Crypto Fixes for 3.7 Herbert Xu
@ 2013-03-28  8:28                                           ` Herbert Xu
  2013-03-28 13:05                                             ` Chaoxing Lin
                                                               ` (5 more replies)
  0 siblings, 6 replies; 246+ messages in thread
From: Herbert Xu @ 2013-03-28  8:28 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push removes IPsec ESN support from the talitos/caam drivers
since they were implemented incorrectly, causing interoperability
problems if ESN is used with them.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Horia Geanta (2):
      Revert "crypto: talitos - add IPsec ESN support"
      Revert "crypto: caam - add IPsec ESN support"

 drivers/crypto/caam/caamalg.c |   27 ++-------------------------
 drivers/crypto/caam/compat.h  |    1 -
 drivers/crypto/talitos.c      |   30 ++----------------------------
 3 files changed, 4 insertions(+), 54 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* RE: Crypto Fixes for 3.9
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
@ 2013-03-28 13:05                                             ` Chaoxing Lin
  2013-03-28 13:52                                               ` Herbert Xu
  2013-04-10  2:21                                             ` Herbert Xu
                                                               ` (4 subsequent siblings)
  5 siblings, 1 reply; 246+ messages in thread
From: Chaoxing Lin @ 2013-03-28 13:05 UTC (permalink / raw)
  To: Herbert Xu, Linus Torvalds, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Would you be able to incorporate the GMAC ESN bug fix in 3.9?

Thanks,

Chaoxing


--------------------------------
Thanks Jussi, the patch fixes the problem.

You may commit it officially.

Chaoxing

-----Original Message-----
From: Jussi Kivilinna [mailto:jussi.kivilinna@iki.fi]
Sent: Tuesday, March 26, 2013 4:16 PM
To: Chaoxing Lin
Cc: linux-crypto@vger.kernel.org
Subject: Re: potential bug in GMAC implementation. not work in ESN mode

On 25.03.2013 18:12, Chaoxing Lin wrote:
> 2nd ping....
> 
> Nobody is maintaining crypto/gcm.c?
> 
> 
> 
> -----Original Message-----
> From: Chaoxing Lin
> Sent: Friday, March 08, 2013 11:38 AM
> To: 'linux-crypto@vger.kernel.org'
> Subject: potential bug in GMAC implementation. not work in ESN mode
> 
> I was testing ipsec with GMAC and found that the rfc4543 GMAC implementation in kernel software crypto work in "esp=aes256gmac-noesn!" mode.
> It does not work in in "esp=aes256gmac-esn!" mode. The tunnel was established but no data traffic is possible.
> 
> Looking at source code, I found this piece of code is suspicious.
> Line 1146~1147 tries to put req->assoc to assoc[1]. But I think this way only works when req->assoc has only one segment. In ESN mode, req->assoc contains 3 segments (SPI, SN-hi, SN-low). Line 1146~1147 will only attach SPI segment(with total length) in assoc.
> 
> Please let me know whether I understand it right.

Your analysis seems correct. Does attached the patch fix the problem? (I've only compile tested it.)

-Jussi

> Thanks,
> 
> Chaoxing
> 
> 
> Source from kernel 3.8.2
> path: root/crypto/gcm.c
> 
> 1136: /* construct the aad */
> 1137:	dstp = sg_page(dst);
> 	vdst = PageHighMem(dstp) ? NULL : page_address(dstp) + dst->offset;
> 
> 	sg_init_table(payload, 2);
> 	sg_set_buf(payload, req->iv, 8);
> 	scatterwalk_crypto_chain(payload, dst, vdst == req->iv + 8, 2);
> 	assoclen += 8 + req->cryptlen - (enc ? 0 : authsize);
> 
> 	sg_init_table(assoc, 2);
> 1146:	sg_set_page(assoc, sg_page(req->assoc), req->assoc->length,
> 1147:		    req->assoc->offset);
> 	scatterwalk_crypto_chain(assoc, payload, 0, 2);
> 
> 	aead_request_set_tfm(subreq, ctx->child);
> 	aead_request_set_callback(subreq, req->base.flags, req->base.complete,
> 				  req->base.data);
> 	aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv);
> 1154:	aead_request_set_assoc(subreq, assoc, assoclen);
> --
> To unsubscribe from this list: send the line "unsubscribe 
> linux-crypto" in the body of a message to majordomo@vger.kernel.org 
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 


-----Original Message-----
From: linux-crypto-owner@vger.kernel.org [mailto:linux-crypto-owner@vger.kernel.org] On Behalf Of Herbert Xu
Sent: Thursday, March 28, 2013 4:29 AM
To: Linus Torvalds; David S. Miller; Linux Kernel Mailing List; Linux Crypto Mailing List
Subject: Crypto Fixes for 3.9

Hi Linus:

This push removes IPsec ESN support from the talitos/caam drivers since they were implemented incorrectly, causing interoperability problems if ESN is used with them.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Horia Geanta (2):
      Revert "crypto: talitos - add IPsec ESN support"
      Revert "crypto: caam - add IPsec ESN support"

 drivers/crypto/caam/caamalg.c |   27 ++-------------------------
 drivers/crypto/caam/compat.h  |    1 -
 drivers/crypto/talitos.c      |   30 ++----------------------------
 3 files changed, 4 insertions(+), 54 deletions(-)

Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@vger.kernel.org More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.9
  2013-03-28 13:05                                             ` Chaoxing Lin
@ 2013-03-28 13:52                                               ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-03-28 13:52 UTC (permalink / raw)
  To: Chaoxing Lin; +Cc: torvalds, linux-kernel, linux-crypto

Chaoxing Lin <Chaoxing.Lin@ultra-3eti.com> wrote:
> Would you be able to incorporate the GMAC ESN bug fix in 3.9?

I'd be happy to once I get the patch.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.9
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
  2013-03-28 13:05                                             ` Chaoxing Lin
@ 2013-04-10  2:21                                             ` Herbert Xu
  2013-04-22  0:34                                               ` Herbert Xu
  2013-05-28  5:52                                             ` Crypto Fixes for 3.10 Herbert Xu
                                                               ` (3 subsequent siblings)
  5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-04-10  2:21 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a GCM bug that breaks IPsec and a compile problem
in ux500.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Jussi Kivilinna (1):
      crypto: gcm - fix assumption that assoc has one segment

Linus Walleij (1):
      crypto: ux500 - add missing comma

 crypto/gcm.c                          |   17 ++++++++++++++---
 drivers/crypto/ux500/cryp/cryp_core.c |    2 +-
 2 files changed, 15 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.9
  2013-04-10  2:21                                             ` Herbert Xu
@ 2013-04-22  0:34                                               ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-04-22  0:34 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a kernel memory leak in the algif interface.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Mathias Krause (1):
      crypto: algif - suppress sending source address information in recvmsg

 crypto/algif_hash.c     |    2 ++
 crypto/algif_skcipher.c |    1 +
 2 files changed, 3 insertions(+), 0 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.10
  2013-02-23  2:33                                 ` Crypto Update for 3.9 Herbert Xu
@ 2013-05-02  1:47                                   ` Herbert Xu
  2013-07-05  9:52                                     ` Crypto Update for 3.11 Herbert Xu
  2013-09-07  3:55                                   ` Crypto Update for 3.12 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-05-02  1:47 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.10:

* XTS mode optimisation for twofish/cast6/camellia/aes on x86.
* AVX2/x86_64 implementation for blowfish/twofish/serpent/camellia.
* SSSE3/AVX/AVX2 optimisations for sha256/sha512.
* Added driver for SAHARA2 crypto accelerator.
* Fix for GMAC when used in non-IPsec secnarios.
* Added generic CMAC implementation (including IPsec glue).
* IP update for crypto/atmel.
* Support for more than one device in hwrng/timeriomem.
* Added Broadcom BCM2835 RNG driver.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexander Clouter (2):
      hwrng: timeriomem - update to support more than one device
      hwrng: timeriomem - added devicetree hooks

Fabio Estevam (1):
      hwrng: mxc-rnga - Use devm_ioremap_resource()

Herbert Xu (1):
      crypto: crc32c - Kill pointless CRYPTO_CRC32C_X86_64 option

Javier Martin (1):
      crypto: sahara - Add driver for SAHARA2 accelerator.

Jingoo Han (1):
      hwrng: exynos - add CONFIG_PM_SLEEP/CONFIG_PM_RUNTIME to suspend/resume

Joel A Fernandes (2):
      crypto: omap-sham - Use pm_runtime_put instead of pm_runtime_put_sync in tasklet
      crypto: omap-aes - Use pm_runtime_put instead of pm_runtime_put_sync in tasklet

Jussi Kivilinna (20):
      crypto: x86/crc32-pclmul - assembly clean-ups: use ENTRY/ENDPROC
      crypto: x86 - build AVX block cipher implementations only if assembler supports AVX instructions
      crypto: gcm - make GMAC work when dst and src are different
      crypto: gcm - fix rfc4543 to handle async crypto correctly
      crypto: testmgr - add AES GMAC test vectors
      crypto: testmgr - add empty test vectors for null ciphers
      crypto: add CMAC support to CryptoAPI
      xfrm: add rfc4494 AES-CMAC-96 support
      crypto: x86 - add more optimized XTS-mode for serpent-avx
      crypto: x86/twofish-avx - use optimized XTS code
      crypto: cast6-avx: use new optimized XTS code
      crypto: x86/camellia-aesni-avx - add more optimized XTS code
      crypto: aesni_intel - add more optimized XTS mode for x86-64
      crypto: aesni_intel - fix Kconfig problem with CRYPTO_GLUE_HELPER_X86
      crypto: testmgr - extend camellia test-vectors for camellia-aesni/avx2
      crypto: tcrypt - add async cipher speed tests for blowfish
      crypto: blowfish - add AVX2/x86_64 implementation of blowfish cipher
      crypto: twofish - add AVX2/x86_64 assembler implementation of twofish cipher
      crypto: serpent - add AVX2/x86_64 assembler implementation of serpent cipher
      crypto: camellia - add AVX2/AES-NI/x86_64 assembler implementation of camellia cipher

Kim Phillips (2):
      crypto: caam - change key gen functions to return signed int
      crypto: caam - static constify error data

Lubomir Rintel (1):
      hwrng: bcm2835 - Add Broadcom BCM2835 RNG driver

Mathias Krause (1):
      crypto: user - constify netlink dispatch table

Mihnea Dobrescu-Balaur (1):
      crypto: ux500 - replace kmalloc and then memcpy with kmemdup

Nicolas Royer (4):
      ARM: AT91SAM9G45: same platform data structure for all crypto peripherals
      crypto: atmel-aes - add support for latest release of the IP (0x130)
      crypto: atmel-tdes - add support for latest release of the IP (0x700)
      crypto: atmel-sha - add support for latest release of the IP (0x410)

Paul Bolle (1):
      crypto: caam - fix typo "CRYPTO_AHASH"

Sachin Kamat (3):
      crypto: omap-aes - Use module_platform_driver macro
      crypto: omap-sham - Use module_platform_driver macro
      crypto: picoxcell - Use of_match_ptr() macro

Sandy Wu (1):
      crypto: crc32-pclmul - Use gas macro for pclmulqdq

Syam Sidhardhan (1):
      crypto: bfin_crc - Fix possible NULL pointer dereference

Tang Chen (1):
      hwrng: Fix a wrong comment in Documentation/hw_random.txt

Tim Chen (11):
      crypto: crc32c - Update the links to the white papers on CRC32C calculations with PCLMULQDQ instructions.
      crypto: sha256 - Expose SHA256 generic routine to be callable externally.
      crypto: sha256 - Optimized sha256 x86_64 assembly routine using Supplemental SSE3 instructions.
      crypto: sha256 - Optimized sha256 x86_64 assembly routine with AVX instructions.
      crypto: sha256 - Optimized sha256 x86_64 routine using AVX2's RORX instructions
      crypto: sha256 - Create module providing optimized SHA256 routines using SSSE3, AVX or AVX2 instructions.
      crypto: sha512 - Expose generic sha512 routine to be callable from other modules
      crypto: sha512 - Optimized SHA512 x86_64 assembly routine using Supplemental SSE3 instructions.
      crypto: sha512 - Optimized SHA512 x86_64 assembly routine using AVX instructions.
      crypto: sha512 - Optimized SHA512 x86_64 assembly routine using AVX2 RORX instruction.
      crypto: sha512 - Create module providing optimized SHA512 routines using SSSE3, AVX or AVX2 instructions.

Vakul Garg (3):
      crypto: caam - set RDB bit in security configuration register
      crypto: caam - Fix missing init of '.type' in AEAD algos.
      crypto: caam - fix job ring cleanup code

Wei Yongjun (1):
      crypto: ux500 - fix error return code in hash_dma_final()

 .../devicetree/bindings/crypto/fsl-imx-sahara.txt  |   15 +
 .../devicetree/bindings/hwrng/timeriomem_rng.txt   |   18 +
 .../devicetree/bindings/rng/brcm,bcm2835.txt       |   13 +
 Documentation/hw_random.txt                        |    2 +-
 arch/arm/mach-at91/at91sam9g45_devices.c           |   14 +-
 arch/x86/crypto/Makefile                           |   57 +-
 arch/x86/crypto/aesni-intel_asm.S                  |  117 ++
 arch/x86/crypto/aesni-intel_glue.c                 |   80 ++
 arch/x86/crypto/blowfish-avx2-asm_64.S             |  449 +++++++
 .../{blowfish_glue.c => blowfish_avx2_glue.c}      |  402 ++++---
 arch/x86/crypto/blowfish_glue.c                    |   32 +-
 arch/x86/crypto/camellia-aesni-avx-asm_64.S        |  180 +++-
 arch/x86/crypto/camellia-aesni-avx2-asm_64.S       | 1368 ++++++++++++++++++++
 ...aesni_avx_glue.c => camellia_aesni_avx2_glue.c} |  182 ++--
 arch/x86/crypto/camellia_aesni_avx_glue.c          |  104 +-
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |   48 +-
 arch/x86/crypto/cast6_avx_glue.c                   |   91 +-
 arch/x86/crypto/crc32-pclmul_asm.S                 |    6 +-
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |   10 +-
 arch/x86/crypto/glue_helper-asm-avx.S              |   61 +-
 arch/x86/crypto/glue_helper-asm-avx2.S             |  180 +++
 arch/x86/crypto/glue_helper.c                      |   97 ++-
 arch/x86/crypto/serpent-avx-x86_64-asm_64.S        |   45 +-
 ...t-avx-x86_64-asm_64.S => serpent-avx2-asm_64.S} |  207 ++--
 .../{serpent_avx_glue.c => serpent_avx2_glue.c}    |  323 +++---
 arch/x86/crypto/serpent_avx_glue.c                 |  145 ++-
 arch/x86/crypto/sha256-avx-asm.S                   |  496 +++++++
 arch/x86/crypto/sha256-avx2-asm.S                  |  772 +++++++++++
 arch/x86/crypto/sha256-ssse3-asm.S                 |  506 ++++++++
 arch/x86/crypto/sha256_ssse3_glue.c                |  275 ++++
 arch/x86/crypto/sha512-avx-asm.S                   |  423 ++++++
 arch/x86/crypto/sha512-avx2-asm.S                  |  743 +++++++++++
 arch/x86/crypto/sha512-ssse3-asm.S                 |  421 ++++++
 arch/x86/crypto/sha512_ssse3_glue.c                |  282 ++++
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |   48 +-
 arch/x86/crypto/twofish-avx2-asm_64.S              |  600 +++++++++
 .../{twofish_avx_glue.c => twofish_avx2_glue.c}    |  269 ++--
 arch/x86/crypto/twofish_avx_glue.c                 |  101 +-
 arch/x86/include/asm/cpufeature.h                  |    1 +
 arch/x86/include/asm/crypto/blowfish.h             |   43 +
 arch/x86/include/asm/crypto/camellia.h             |   19 +
 arch/x86/include/asm/crypto/glue_helper.h          |   24 +
 arch/x86/include/asm/crypto/serpent-avx.h          |   29 +
 arch/x86/include/asm/crypto/twofish.h              |   18 +
 crypto/Kconfig                                     |  133 ++-
 crypto/Makefile                                    |    1 +
 crypto/cmac.c                                      |  315 +++++
 crypto/crypto_user.c                               |    4 +-
 crypto/gcm.c                                       |  116 ++-
 crypto/sha256_generic.c                            |   11 +-
 crypto/sha512_generic.c                            |   13 +-
 crypto/tcrypt.c                                    |   30 +-
 crypto/testmgr.c                                   |   95 ++-
 crypto/testmgr.h                                   | 1314 ++++++++++++++++++-
 drivers/char/hw_random/Kconfig                     |   12 +
 drivers/char/hw_random/Makefile                    |    1 +
 drivers/char/hw_random/bcm2835-rng.c               |  113 ++
 drivers/char/hw_random/exynos-rng.c                |    3 +-
 drivers/char/hw_random/mxc-rnga.c                  |   21 +-
 drivers/char/hw_random/timeriomem-rng.c            |  190 ++-
 drivers/crypto/Kconfig                             |   18 +-
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/atmel-aes.c                         |  471 +++++--
 drivers/crypto/atmel-sha-regs.h                    |    7 +-
 drivers/crypto/atmel-sha.c                         |  586 +++++++--
 drivers/crypto/atmel-tdes-regs.h                   |    2 +
 drivers/crypto/atmel-tdes.c                        |  394 +++++-
 drivers/crypto/bfin_crc.c                          |    6 +-
 drivers/crypto/caam/Kconfig                        |    2 +-
 drivers/crypto/caam/caamalg.c                      |    6 +
 drivers/crypto/caam/caamhash.c                     |    4 +-
 drivers/crypto/caam/ctrl.c                         |    3 +
 drivers/crypto/caam/error.c                        |   10 +-
 drivers/crypto/caam/intern.h                       |    1 +
 drivers/crypto/caam/jr.c                           |    4 +
 drivers/crypto/caam/key_gen.c                      |    2 +-
 drivers/crypto/caam/key_gen.h                      |    2 +-
 drivers/crypto/caam/regs.h                         |    4 +-
 drivers/crypto/omap-aes.c                          |   15 +-
 drivers/crypto/omap-sham.c                         |   15 +-
 drivers/crypto/picoxcell_crypto.c                  |    4 +-
 drivers/crypto/sahara.c                            | 1070 +++++++++++++++
 drivers/crypto/ux500/hash/hash_core.c              |    6 +-
 include/crypto/sha.h                               |    5 +
 include/linux/platform_data/atmel-aes.h            |   22 -
 include/linux/platform_data/crypto-atmel.h         |   22 +
 include/linux/timeriomem-rng.h                     |    5 -
 net/xfrm/xfrm_algo.c                               |   13 +
 88 files changed, 13036 insertions(+), 1352 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.10
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
  2013-03-28 13:05                                             ` Chaoxing Lin
  2013-04-10  2:21                                             ` Herbert Xu
@ 2013-05-28  5:52                                             ` Herbert Xu
  2013-06-10  9:05                                               ` Herbert Xu
  2013-07-24  7:23                                             ` Crypto Fixes for 3.11 Herbert Xu
                                                               ` (2 subsequent siblings)
  5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-05-28  5:52 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a crash in the new sha256_ssse3 driver as well as
a DMA setup/teardown bug in caam.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Horia Geanta (1):
      crypto: caam - fix inconsistent assoc dma mapping direction

Jussi Kivilinna (1):
      crypto: sha256_ssse3 - fix stack corruption with SSSE3 and AVX implementations

 arch/x86/crypto/sha256-avx-asm.S   |    2 +-
 arch/x86/crypto/sha256-ssse3-asm.S |    2 +-
 drivers/crypto/caam/caamalg.c      |    4 ++--
 3 files changed, 4 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.10
  2013-05-28  5:52                                             ` Crypto Fixes for 3.10 Herbert Xu
@ 2013-06-10  9:05                                               ` Herbert Xu
  2013-06-20 13:29                                                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-06-10  9:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem in sahara and temporarily disables
two new optimisations because of performance regressions until a
permanent fix is ready.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Arnd Bergmann (1):
      crypto: sahara - fix building as module

Jussi Kivilinna (2):
      crypto: twofish - disable AVX2 implementation
      crypto: blowfish - disable AVX2 implementation

 crypto/Kconfig          |    2 ++
 drivers/crypto/sahara.c |    2 +-
 2 files changed, 3 insertions(+), 1 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.10
  2013-06-10  9:05                                               ` Herbert Xu
@ 2013-06-20 13:29                                                 ` Herbert Xu
  2013-06-27 13:02                                                   ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-06-20 13:29 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes an unaligned crash in XTS mode when using aseni_intel.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Jussi Kivilinna (1):
      crypto: aesni_intel - fix accessing of unaligned memory

 arch/x86/crypto/aesni-intel_asm.S |   48 ++++++++++++++++++++++++------------
 1 files changed, 32 insertions(+), 16 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.10
  2013-06-20 13:29                                                 ` Herbert Xu
@ 2013-06-27 13:02                                                   ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-06-27 13:02 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a crash in the crypto layer exposed by an SCTP
test tool.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: algboss - Hold ref count on larval

 crypto/algboss.c  |   15 ++++++++-------
 crypto/api.c      |    6 ------
 crypto/internal.h |    6 ++++++
 3 files changed, 14 insertions(+), 13 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.11
  2013-05-02  1:47                                   ` Crypto Update for 3.10 Herbert Xu
@ 2013-07-05  9:52                                     ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-07-05  9:52 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.11:

* Do not idle omap device between crypto operations in one session.
* Added sha224/sha384 shims for SSSE3.
* More optimisations for camellia-aesni-avx2.
* Removed defunct blowfish/twofish AVX2 implementations.
* Added unaligned buffer self-tests.
* Added PCLMULQDQ optimisation for CRCT10DIF.
* Added support for Freescale's DCP co-processor
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Andrei Varvara (8):
      crypto: caam - fix SEQ IN PTR command when RTO or PRE bit is set
      crypto: caam - Fix STORE command to support overwriting Shared Descriptor's memory
      crypto: caam - Add MATH command to support shld function
      crypto: caam - Add new macros for building extended SEC descriptors (> 64 words)
      crypto: caam - Add defines for overwriting Descriptor's memory
      crypto: caam - Add defines for CAAM commands
      crypto: caam - Add define for Adjust Output Frame Length in PDB
      crypto: caam - add missing flag for the LOAD/STORE commands

Arnd Bergmann (1):
      hwrng: bcm2835 - fix MODULE_LICENSE tag

Herbert Xu (2):
      crypto: crct10dif - Use PTR_RET
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto

Jingoo Han (6):
      hwrng: atmel - remove unnecessary platform_set_drvdata()
      hwrng: bcm63xx - remove unnecessary platform_set_drvdata()
      hwrng: timeriomem - remove unnecessary platform_set_drvdata()
      hwrng: tx4939 - remove unnecessary platform_set_drvdata()
      hwrng: use platform_{get,set}_drvdata()
      crypto: picoxcell - replace strict_strtoul() with kstrtoul()

Joel A Fernandes (1):
      crypto: omap-aes - Don't idle/start AES device between Encrypt operations

Jussi Kivilinna (10):
      crypto: sha512_generic - set cra_driver_name
      crypto: sha512_ssse3 - add sha384 support
      crypto: sha256_ssse3 - add sha224 support
      crypto: camellia-aesni-avx2 - tune assembly code for more performance
      Revert "crypto: blowfish - add AVX2/x86_64 implementation of blowfish cipher"
      Revert "crypto: twofish - add AVX2/x86_64 assembler implementation of twofish cipher"
      crypto: testmgr - check that entries in alg_test_descs are in correct order
      crypto: testmgr - test skciphers with unaligned buffers
      crypto: testmgr - test AEADs with unaligned buffers
      crypto: testmgr - test hash implementations with unaligned buffers

Lars-Peter Clausen (1):
      crypto: hifn_795x - Pass correct pointer to free_irq()

Laurent Navet (1):
      drivers: crypto: use devm_ioremap_resource()

Linus Walleij (1):
      hwrng: nomadik - use clk_prepare_enable()

Paul Bolle (1):
      crypto: sahara - remove dependency on EXPERIMENTAL

Ruchika Gupta (1):
      crypto: caam - FIX RNG init for RNG greater than equal to 4

Sachin Kamat (6):
      crypto: mv_cesa: Remove redundant platform_set_drvdata()
      crypto: s5p-sss: Remove redundant platform_set_drvdata()
      crypto: dcp - Remove redundant platform_set_drvdata()
      crypto: dcp - Use devm_* APIs
      crypto: dcp - Use NULL instead of 0
      crypto: dcp - Staticize local symbols

Thomas Meyer (1):
      crypto: ux500 - Cocci spatch "resource_size.spatch"

Tim Chen (4):
      crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework
      crypto: crct10dif - Accelerated CRC T10 DIF computation with PCLMULQDQ instruction
      crypto: crct10dif - Glue code to cast accelerated CRCT10DIF assembly as a crypto transform
      crypto: crct10dif - Simple correctness and speed test for CRCT10DIF hash

Tobias Rauter (1):
      crypto: dcp - Added support for Freescale's DCP co-processor

 arch/arm/boot/dts/imx28.dtsi                 |    2 +-
 arch/x86/crypto/Makefile                     |    8 +-
 arch/x86/crypto/blowfish-avx2-asm_64.S       |  449 -------------
 arch/x86/crypto/blowfish_avx2_glue.c         |  585 -----------------
 arch/x86/crypto/blowfish_glue.c              |   32 +-
 arch/x86/crypto/camellia-aesni-avx2-asm_64.S |  160 +++--
 arch/x86/crypto/crct10dif-pcl-asm_64.S       |  643 ++++++++++++++++++
 arch/x86/crypto/crct10dif-pclmul_glue.c      |  151 +++++
 arch/x86/crypto/sha256_ssse3_glue.c          |   57 ++-
 arch/x86/crypto/sha512_ssse3_glue.c          |   58 ++-
 arch/x86/crypto/twofish-avx2-asm_64.S        |  600 -----------------
 arch/x86/crypto/twofish_avx2_glue.c          |  584 ----------------
 arch/x86/crypto/twofish_avx_glue.c           |   14 +-
 arch/x86/include/asm/crypto/blowfish.h       |   43 --
 arch/x86/include/asm/crypto/twofish.h        |   18 -
 crypto/Kconfig                               |   63 +--
 crypto/Makefile                              |    1 +
 crypto/crct10dif.c                           |  178 +++++
 crypto/sha512_generic.c                      |    2 +
 crypto/tcrypt.c                              |    8 +
 crypto/testmgr.c                             |  176 ++++-
 crypto/testmgr.h                             |   33 +
 drivers/char/hw_random/atmel-rng.c           |    2 -
 drivers/char/hw_random/bcm2835-rng.c         |    2 +-
 drivers/char/hw_random/bcm63xx-rng.c         |    2 -
 drivers/char/hw_random/n2-drv.c              |    6 +-
 drivers/char/hw_random/nomadik-rng.c         |    2 +-
 drivers/char/hw_random/octeon-rng.c          |    4 +-
 drivers/char/hw_random/omap-rng.c            |    6 +-
 drivers/char/hw_random/timeriomem-rng.c      |    2 -
 drivers/char/hw_random/tx4939-rng.c          |    1 -
 drivers/crypto/Kconfig                       |   12 +-
 drivers/crypto/Makefile                      |    1 +
 drivers/crypto/caam/ctrl.c                   |   10 +-
 drivers/crypto/caam/desc.h                   |   22 +-
 drivers/crypto/caam/desc_constr.h            |   81 +++-
 drivers/crypto/caam/pdb.h                    |    1 +
 drivers/crypto/caam/regs.h                   |   42 ++-
 drivers/crypto/dcp.c                         |  912 ++++++++++++++++++++++++++
 drivers/crypto/hifn_795x.c                   |    4 +-
 drivers/crypto/mv_cesa.c                     |    1 -
 drivers/crypto/omap-aes.c                    |   36 +-
 drivers/crypto/omap-sham.c                   |    7 +-
 drivers/crypto/picoxcell_crypto.c            |    2 +-
 drivers/crypto/s5p-sss.c                     |    2 -
 drivers/crypto/ux500/cryp/cryp_core.c        |    2 +-
 include/linux/crc-t10dif.h                   |    4 +
 lib/Kconfig                                  |    2 +
 lib/crc-t10dif.c                             |   73 +--
 49 files changed, 2542 insertions(+), 2564 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.11
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
                                                               ` (2 preceding siblings ...)
  2013-05-28  5:52                                             ` Crypto Fixes for 3.10 Herbert Xu
@ 2013-07-24  7:23                                             ` Herbert Xu
  2013-09-13 11:30                                             ` Crypto Fixes for 3.12 Herbert Xu
  2013-12-03 12:41                                             ` Crypto Fixes for 3.13 Herbert Xu
  5 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-07-24  7:23 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a memory corruption issue in caam, as well as
reverting the new optimised crct10dif implementation as it breaks
boot on initrd systems.

Hopefully crct10dif will be reinstated once the supporting code
is added so that it doesn't break boot.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      Revert "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework"

Vakul Garg (1):
      crypto: caam - Fixed the memory out of bound overwrite issue

 arch/x86/crypto/Makefile                |    2 -
 arch/x86/crypto/crct10dif-pcl-asm_64.S  |  643 -------------------------------
 arch/x86/crypto/crct10dif-pclmul_glue.c |  151 --------
 crypto/Kconfig                          |   19 -
 crypto/Makefile                         |    1 -
 crypto/crct10dif.c                      |  178 ---------
 crypto/tcrypt.c                         |    8 -
 crypto/testmgr.c                        |   10 -
 crypto/testmgr.h                        |   33 --
 drivers/crypto/caam/caamhash.c          |    2 +-
 include/linux/crc-t10dif.h              |    4 -
 lib/Kconfig                             |    2 -
 lib/crc-t10dif.c                        |   73 ++--
 13 files changed, 44 insertions(+), 1082 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.12
  2013-02-23  2:33                                 ` Crypto Update for 3.9 Herbert Xu
  2013-05-02  1:47                                   ` Crypto Update for 3.10 Herbert Xu
@ 2013-09-07  3:55                                   ` Herbert Xu
  2013-11-07  8:01                                     ` Crypto Update for 3.13 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-09-07  3:55 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.12:

* Added MODULE_SOFTDEP to allow pre-loading of modules.
* Reinstated crct10dif driver using the module softdep feature.
* Allow via rng driver to be auto-loaded.

* Split large input data when necessary in nx.
* Handle zero length messages correctly for GCM/XCBC in nx.
* Handle SHA-2 chunks bigger than block size properly in nx.

* Handle unaligned lengths in omap-aes.
* Added SHA384/SHA512 to omap-sham.
* Added OMAP5/AM43XX SHAM support.
* Added OMAP4 TRNG support.

* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alex Porosanu (2):
      crypto: caam - replace xstr macro with __stringify
      crypto: caam - add option for enabling DEBUG mode

Andi Kleen (1):
      crypto: make tables used from assembler __visible

Andreas Robinson (1):
      modules: add support for soft module dependencies

Ben Hutchings (1):
      hwrng: via - Add MODULE_DEVICE_TABLE

Chen Gang (1):
      padata - share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED

Cristian Stoica (1):
      crypto: testmgr - remove double execution of the same test suite

Dan Carpenter (2):
      crypto: sahara - checking the wrong variable
      crypto: tegra-aes - bitwise vs logical and

Fabio Estevam (1):
      hwrng: mxc-rnga - Check the return value from clk_prepare_enable()

Fionnuala Gunter (3):
      crypto: nx - saves chaining value from co-processor
      crypto: nx - fix limits to sg lists for AES-XCBC
      crypto: nx - fix limits to sg lists for AES-CCM

Herbert Xu (2):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
      Reinstate "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework"

Jan-Simon Möller (1):
      crypto: fcrypt - Fix bitoperation for compilation with clang

Jingoo Han (3):
      hwrng: pixocel - Staticize 'rng_dev'
      crypto: sahara - Staticize local symbol
      crypto: crypto4xx - Staticize local symbols

Joe Perches (1):
      crypto: ux500 - Fix logging, make arrays const, neatening

Joel Fernandes (14):
      crypto: scatterwalk - Add support for calculating number of SG elements
      crypto: omap-aes - Add useful debug macros
      crypto: omap-aes - Populate number of SG elements
      crypto: omap-aes - Simplify DMA usage by using direct SGs
      crypto: omap-aes - Sync SG before DMA operation
      crypto: omap-aes - Remove previously used intermediate buffers
      crypto: omap-aes - Add IRQ info and helper macros
      crypto: omap-aes - PIO mode: Add IRQ handler and walk SGs
      crypto: omap-aes - PIO mode: platform data for OMAP4/AM437x and trigger
      crypto: omap-aes - Switch to PIO mode during probe
      crypto: omap-aes - Add support for cases of unaligned lengths
      crypto: omap-aes - Convert kzalloc to devm_kzalloc
      crypto: omap-aes - Convert request_irq to devm_request_irq
      crypto: omap-aes - Kconfig: Add build support for AM437x

John Haxby (1):
      crypto: xor - Check for osxsave as well as avx in crypto/xor

Julia Lawall (3):
      hwrng: tx4939 - simplify use of devm_ioremap_resource
      crypto: camellia-x86-64 - replace commas by semicolons and adjust code alignment
      crypto: camellia_generic - replace commas by semicolons and adjust code alignment

Lokesh Vutla (12):
      crypto: omap-sham - Add SHA384 and SHA512 Support
      crypto: omap-sham - Add OMAP5/AM43XX SHAM Support
      crypto: omap-sham - Convert to devm_request_irq()
      crypto: omap-sham - Convert to devm_kzalloc()
      hwrng: omap - Use module_platform_driver macro
      hwrng: omap - Convert to devm_kzalloc()
      hwrng: omap - Remove duplicated function call
      hwrng: omap - Add device tree support
      ARM: OMAP2+: Only manually add hwmod data when DT not used.
      hwrng: omap - Add OMAP4 TRNG support
      crypto: omap-sham - Enable Polling mode if DMA fails
      crypto: omap-sham - correct dma burst size

Marcelo Cerri (11):
      crypto: nx - fix physical addresses added to sg lists
      crypto: nx - fix limits to sg lists for SHA-2
      crypto: nx - fix concurrency issue
      crypto: nx - add offset to nx_build_sg_lists()
      crypto: nx - fix limits to sg lists for AES-ECB
      crypto: nx - fix limits to sg lists for AES-CBC
      crypto: nx - fix limits to sg lists for AES-CTR
      crypto: nx - fix limits to sg lists for AES-GCM
      crypto: nx - fix XCBC for zero length messages
      crypto: nx - fix GCM for zero length messages
      crypto: nx - fix SHA-2 for chunks bigger than block size

Olof Johansson (1):
      hwrng: omap - reorder OMAP TRNG driver code

Richard Weinberger (1):
      padata - Register hotcpu notifier after initialization

Ruchika Gupta (2):
      crypto: caam - RNG instantiation by directly programming DECO
      crypto: caam - Remove unused functions from Job Ring

Vakul Garg (1):
      crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h

jmlatten@linux.vnet.ibm.com (1):
      crypto: nx - fix nx-aes-gcm verification

 arch/arm/mach-omap2/devices.c           |    2 +-
 arch/x86/crypto/Makefile                |    2 +
 arch/x86/crypto/camellia_glue.c         |   64 +--
 arch/x86/crypto/crct10dif-pcl-asm_64.S  |  643 +++++++++++++++++++++++++++++++
 arch/x86/crypto/crct10dif-pclmul_glue.c |  151 ++++++++
 arch/x86/include/asm/xor_avx.h          |    4 +-
 crypto/Kconfig                          |   19 +
 crypto/Makefile                         |    1 +
 crypto/aes_generic.c                    |    8 +-
 crypto/camellia_generic.c               |   48 +--
 crypto/cast_common.c                    |    8 +-
 crypto/crct10dif.c                      |  178 +++++++++
 crypto/fcrypt.c                         |    2 +-
 crypto/scatterwalk.c                    |   22 ++
 crypto/tcrypt.c                         |    8 +
 crypto/testmgr.c                        |   12 +-
 crypto/testmgr.h                        |   33 ++
 drivers/char/hw_random/Kconfig          |    6 +-
 drivers/char/hw_random/mxc-rnga.c       |    4 +-
 drivers/char/hw_random/omap-rng.c       |  386 +++++++++++++++----
 drivers/char/hw_random/picoxcell-rng.c  |    2 +-
 drivers/char/hw_random/tx4939-rng.c     |    4 +-
 drivers/char/hw_random/via-rng.c        |    7 +
 drivers/crypto/Kconfig                  |   13 +-
 drivers/crypto/amcc/crypto4xx_alg.c     |   15 +-
 drivers/crypto/caam/Kconfig             |    8 +
 drivers/crypto/caam/Makefile            |    3 +
 drivers/crypto/caam/caamalg.c           |   80 ++--
 drivers/crypto/caam/caamhash.c          |   70 ++--
 drivers/crypto/caam/ctrl.c              |   77 ++--
 drivers/crypto/caam/desc_constr.h       |    1 +
 drivers/crypto/caam/intern.h            |    5 -
 drivers/crypto/caam/jr.c                |   67 ----
 drivers/crypto/caam/jr.h                |    2 -
 drivers/crypto/caam/key_gen.c           |    6 +-
 drivers/crypto/caam/regs.h              |   12 +-
 drivers/crypto/nx/nx-aes-cbc.c          |   57 ++-
 drivers/crypto/nx/nx-aes-ccm.c          |  283 ++++++++++----
 drivers/crypto/nx/nx-aes-ctr.c          |   52 ++-
 drivers/crypto/nx/nx-aes-ecb.c          |   50 ++-
 drivers/crypto/nx/nx-aes-gcm.c          |  296 ++++++++++----
 drivers/crypto/nx/nx-aes-xcbc.c         |  205 +++++++---
 drivers/crypto/nx/nx-sha256.c           |  124 +++---
 drivers/crypto/nx/nx-sha512.c           |  131 ++++---
 drivers/crypto/nx/nx.c                  |   35 +-
 drivers/crypto/nx/nx.h                  |    3 +-
 drivers/crypto/omap-aes.c               |  468 ++++++++++++----------
 drivers/crypto/omap-sham.c              |  382 ++++++++++++++----
 drivers/crypto/sahara.c                 |    4 +-
 drivers/crypto/tegra-aes.c              |    6 +-
 drivers/crypto/ux500/hash/hash_core.c   |  586 ++++++++++++++--------------
 include/crypto/scatterwalk.h            |    2 +
 include/linux/crc-t10dif.h              |    4 +
 include/linux/module.h                  |    5 +
 kernel/padata.c                         |   32 +-
 lib/Kconfig                             |    2 +
 lib/crc-t10dif.c                        |   74 ++--
 57 files changed, 3410 insertions(+), 1364 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.12
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
                                                               ` (3 preceding siblings ...)
  2013-07-24  7:23                                             ` Crypto Fixes for 3.11 Herbert Xu
@ 2013-09-13 11:30                                             ` Herbert Xu
  2013-09-13 14:22                                               ` Linus Torvalds
  2013-12-03 12:41                                             ` Crypto Fixes for 3.13 Herbert Xu
  5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-09-13 11:30 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a 7+ year race condition in the crypto API that
causes sporadic crashes when multiple threads load the same
algorithm.

It also fixes the crct10dif algorithm again to prevent boot
failures on systems where the initramfs tool ignores module
softdeps.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (2):
      crypto: api - Fix race condition in larval lookup
      crypto: crct10dif - Add fallback for broken initrds

 crypto/Makefile                             |    2 +-
 crypto/api.c                                |    7 +-
 crypto/{crct10dif.c => crct10dif_common.c}  |  100 +--------------------------
 crypto/{crct10dif.c => crct10dif_generic.c} |   53 +-------------
 lib/crc-t10dif.c                            |   11 ++-
 5 files changed, 20 insertions(+), 153 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.12
  2013-09-13 11:30                                             ` Crypto Fixes for 3.12 Herbert Xu
@ 2013-09-13 14:22                                               ` Linus Torvalds
  2013-09-13 14:39                                                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2013-09-13 14:22 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Sep 13, 2013 at 4:30 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Herbert Xu (2):
>       crypto: api - Fix race condition in larval lookup
>       crypto: crct10dif - Add fallback for broken initrds
>
>  crypto/Makefile                             |    2 +-
>  crypto/api.c                                |    7 +-
>  crypto/{crct10dif.c => crct10dif_common.c}  |  100 +--------------------------
>  crypto/{crct10dif.c => crct10dif_generic.c} |   53 +-------------
>  lib/crc-t10dif.c                            |   11 ++-
>  5 files changed, 20 insertions(+), 153 deletions(-)

Please fix your script. You apparently have it using "-C" to find
copies, which can be very useful to see what is going on especially
with "--summary" (which you don't have), but is misleading when
sending diffstats when people don't expect it.

The pull request does not have "20 insertions", it has "146
insertions", and it's just that a fair chunk of them come from a file
being essentially duplicated. See the difference:

With copy detection ("git diff -C --stat --summary")
 crypto/Makefile                             |   2 +-
 crypto/api.c                                |   7 +-
 crypto/{crct10dif.c => crct10dif_common.c}  | 100 +-------------------
 crypto/{crct10dif.c => crct10dif_generic.c} |  53 +----------
 lib/crc-t10dif.c                            |  11 ++-
 5 files changed, 20 insertions(+), 153 deletions(-)
 copy crypto/{crct10dif.c => crct10dif_common.c} (63%)
 rename crypto/{crct10dif.c => crct10dif_generic.c} (55%)

With just rename detection (git diff -M --stat --summary)
 crypto/Makefile                            |   2 +-
 crypto/api.c                               |   7 +-
 crypto/{crct10dif.c => crct10dif_common.c} | 100 +---------------
 crypto/crct10dif_generic.c                 | 127 +++++++++++++++++++++
 lib/crc-t10dif.c                           |  11 +-
 5 files changed, 146 insertions(+), 101 deletions(-)
 rename crypto/{crct10dif.c => crct10dif_common.c} (63%)
 create mode 100644 crypto/crct10dif_generic.c

and your pull request looked really misleading because it did "-C" but
didn't have that summary pointing out that one of them was a copy.

So please use "-M --stat --summary". That's what git shows me when I
do a "git pull", so that's what I'm going to compare with..

As mentioned "-C" _is_ useful, but it's useful when you're
specifically looking for "that's a lot of new lines, is it copying old
files" kind of things.

                  Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.12
  2013-09-13 14:22                                               ` Linus Torvalds
@ 2013-09-13 14:39                                                 ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-09-13 14:39 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Sep 13, 2013 at 07:22:55AM -0700, Linus Torvalds wrote:
> On Fri, Sep 13, 2013 at 4:30 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Herbert Xu (2):
> >       crypto: api - Fix race condition in larval lookup
> >       crypto: crct10dif - Add fallback for broken initrds
> >
> >  crypto/Makefile                             |    2 +-
> >  crypto/api.c                                |    7 +-
> >  crypto/{crct10dif.c => crct10dif_common.c}  |  100 +--------------------------
> >  crypto/{crct10dif.c => crct10dif_generic.c} |   53 +-------------
> >  lib/crc-t10dif.c                            |   11 ++-
> >  5 files changed, 20 insertions(+), 153 deletions(-)
> 
> Please fix your script. You apparently have it using "-C" to find
> copies, which can be very useful to see what is going on especially
> with "--summary" (which you don't have), but is misleading when
> sending diffstats when people don't expect it.

Sorry, will do for future pushes.  FWIW the -M stats are

 crypto/Makefile                            |    2 +-
 crypto/api.c                               |    7 +-
 crypto/{crct10dif.c => crct10dif_common.c} |  100 +---------------------
 crypto/crct10dif_generic.c                 |  127 ++++++++++++++++++++++++++++
 lib/crc-t10dif.c                           |   11 ++-
 5 files changed, 146 insertions(+), 101 deletions(-)
 
> With just rename detection (git diff -M --stat --summary)
>  crypto/Makefile                            |   2 +-
>  crypto/api.c                               |   7 +-
>  crypto/{crct10dif.c => crct10dif_common.c} | 100 +---------------
>  crypto/crct10dif_generic.c                 | 127 +++++++++++++++++++++
>  lib/crc-t10dif.c                           |  11 +-
>  5 files changed, 146 insertions(+), 101 deletions(-)
>  rename crypto/{crct10dif.c => crct10dif_common.c} (63%)
>  create mode 100644 crypto/crct10dif_generic.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.13
  2013-09-07  3:55                                   ` Crypto Update for 3.12 Herbert Xu
@ 2013-11-07  8:01                                     ` Herbert Xu
  2013-11-12 16:41                                       ` Herbert Xu
  2014-01-23 11:53                                       ` Crypto Update for 3.14 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-07  8:01 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.13:

* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.

* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.

* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Alex Porosanu (7):
      crypto: caam - fix RNG state handle instantiation descriptor
      crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
      crypto: caam - fix RNG4 instantiation
      crypto: caam - split RNG4 instantiation function
      crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
      crypto: caam - fix RNG4 AAI defines
      crypto: caam - enable instantiation of all RNG4 state handles

Ard Biesheuvel (2):
      crypto: create generic version of ablk_helper
      crypto: move x86 to the generic version of ablk_helper

Ben Hutchings (1):
      hwrng: via-rng - Mark device ID table as __maybe_unused

Fabio Estevam (4):
      crypto: dcp - Use devm_ioremap_resource()
      crypto: dcp - Use devm_request_irq()
      crypto: dcp - Fix the path for releasing the resources
      crypto: dcp - Check the return value from devm_ioremap_resource()

Herbert Xu (2):
      crypto: skcipher - Use eseqiv even on UP machines
      crypto: s390 - Fix aes-cbc IV corruption

James Yonan (1):
      crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks

Joel Fernandes (1):
      crypto: omap-aes - Fix CTR mode counter length

Joni Lapilainen (1):
      crypto: omap-sham - Add missing modalias

Jussi Kivilinna (2):
      crypto: sha256_ssse3 - use correct module alias for sha224
      crypto: x86 - restore avx2_supported check

Linus Walleij (1):
      crypto: tegra - use kernel entropy instead of ad-hoc

Mathias Krause (6):
      crypto: authenc - Export key parsing helper function
      crypto: authencesn - Simplify key parsing
      crypto: ixp4xx - Simplify and harden key parsing
      crypto: picoxcell - Simplify and harden key parsing
      crypto: talitos - Simplify key parsing
      padata: make the sequence counter an atomic_t

Michael Ellerman (2):
      hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
      hwrng: pseries - Return errors to upper levels in pseries-rng.c

Michael Opdenacker (1):
      crypto: mv_cesa: remove deprecated IRQF_DISABLED

Neil Horman (1):
      crypto: ansi_cprng - Fix off by one error in non-block size request

Oliver Neukum (1):
      crypto: sha256_ssse3 - also test for BMI2

Pali Rohár (1):
      hwrng: OMAP3 ROM Random Number Generator support

Ruchika Gupta (3):
      crypto: caam - Add Platform driver for Job Ring
      crypto: caam - Add API's to allocate/free Job Rings
      crypto: caam - Modify the interface layers to use JR API's

Sachin Kamat (7):
      crypto: mv_cesa - Staticize local symbols
      crypto: omap-aes - Staticize local symbols
      crypto: tegra-aes - Staticize tegra_aes_cra_exit
      crypto: tegra-aes - Fix NULL pointer dereference
      crypto: tegra-aes - Use devm_clk_get
      crypto: sahara - Remove redundant of_match_ptr
      crypto: mv_cesa - Remove redundant of_match_ptr

Stanimir Varbanov (2):
      ARM: DT: msm: Add Qualcomm's PRNG driver binding document
      hwrng: msm - Add PRNG support for MSM SoC's

Stephen Warren (1):
      ARM: tegra: remove tegra_chip_uid()

Yashpal Dutta (1):
      crypto: caam - map src buffer before access

kbuild test robot (1):
      crypto: ablk_helper - Replace memcpy with struct assignment

 .../devicetree/bindings/rng/qcom,prng.txt          |   17 +
 arch/arm/mach-tegra/fuse.c                         |   10 -
 arch/s390/crypto/aes_s390.c                        |   19 +-
 arch/x86/crypto/Makefile                           |    3 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    2 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    2 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    2 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    4 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/include/asm/simd.h                        |   11 +
 crypto/Kconfig                                     |   23 +-
 crypto/Makefile                                    |    8 +-
 {arch/x86/crypto => crypto}/ablk_helper.c          |   13 +-
 crypto/ablkcipher.c                                |   21 +-
 crypto/ansi_cprng.c                                |    4 +-
 crypto/asymmetric_keys/rsa.c                       |    5 +-
 crypto/authenc.c                                   |   54 ++-
 crypto/authencesn.c                                |   34 +--
 crypto/ccm.c                                       |    4 +-
 crypto/gcm.c                                       |    2 +-
 crypto/memneq.c                                    |  138 +++++++
 drivers/char/hw_random/Kconfig                     |   25 ++
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/msm-rng.c                   |  197 +++++++++
 drivers/char/hw_random/omap3-rom-rng.c             |  141 +++++++
 drivers/char/hw_random/pseries-rng.c               |   19 +-
 drivers/char/hw_random/via-rng.c                   |    2 +-
 drivers/crypto/caam/Kconfig                        |   25 +-
 drivers/crypto/caam/Makefile                       |    4 +-
 drivers/crypto/caam/caamalg.c                      |   83 +---
 drivers/crypto/caam/caamhash.c                     |   88 ++---
 drivers/crypto/caam/caamrng.c                      |   29 +-
 drivers/crypto/caam/ctrl.c                         |  418 ++++++++++++++++----
 drivers/crypto/caam/desc.h                         |   17 +-
 drivers/crypto/caam/intern.h                       |   20 +-
 drivers/crypto/caam/jr.c                           |  339 +++++++++++-----
 drivers/crypto/caam/jr.h                           |    5 +-
 drivers/crypto/caam/regs.h                         |   14 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   34 ++-
 drivers/crypto/dcp.c                               |   49 +--
 drivers/crypto/ixp4xx_crypto.c                     |   26 +-
 drivers/crypto/mv_cesa.c                           |   14 +-
 drivers/crypto/omap-aes.c                          |    6 +-
 drivers/crypto/omap-sham.c                         |    1 +
 drivers/crypto/picoxcell_crypto.c                  |   32 +--
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/talitos.c                           |   35 +--
 drivers/crypto/tegra-aes.c                         |   26 +-
 include/asm-generic/simd.h                         |   14 +
 .../include/asm => include}/crypto/ablk_helper.h   |    0
 include/crypto/algapi.h                            |   18 +-
 include/crypto/authenc.h                           |   12 +-
 include/linux/padata.h                             |    3 +-
 kernel/padata.c                                    |    9 +-
 59 files changed, 1454 insertions(+), 643 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.13
  2013-11-07  8:01                                     ` Crypto Update for 3.13 Herbert Xu
@ 2013-11-12 16:41                                       ` Herbert Xu
  2013-11-12 16:59                                         ` Borislav Petkov
                                                           ` (2 more replies)
  2014-01-23 11:53                                       ` Crypto Update for 3.14 Herbert Xu
  1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-12 16:41 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.13:

* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.

* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.

* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Alex Porosanu (7):
      crypto: caam - fix RNG state handle instantiation descriptor
      crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
      crypto: caam - fix RNG4 instantiation
      crypto: caam - split RNG4 instantiation function
      crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
      crypto: caam - fix RNG4 AAI defines
      crypto: caam - enable instantiation of all RNG4 state handles

Ard Biesheuvel (2):
      crypto: create generic version of ablk_helper
      crypto: move x86 to the generic version of ablk_helper

Ben Hutchings (1):
      hwrng: via-rng - Mark device ID table as __maybe_unused

Fabio Estevam (4):
      crypto: dcp - Use devm_ioremap_resource()
      crypto: dcp - Use devm_request_irq()
      crypto: dcp - Fix the path for releasing the resources
      crypto: dcp - Check the return value from devm_ioremap_resource()

Herbert Xu (2):
      crypto: skcipher - Use eseqiv even on UP machines
      crypto: s390 - Fix aes-cbc IV corruption

James Yonan (1):
      crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks

Joel Fernandes (1):
      crypto: omap-aes - Fix CTR mode counter length

Joni Lapilainen (1):
      crypto: omap-sham - Add missing modalias

Jussi Kivilinna (2):
      crypto: sha256_ssse3 - use correct module alias for sha224
      crypto: x86 - restore avx2_supported check

Linus Walleij (1):
      crypto: tegra - use kernel entropy instead of ad-hoc

Mathias Krause (6):
      crypto: authenc - Export key parsing helper function
      crypto: authencesn - Simplify key parsing
      crypto: ixp4xx - Simplify and harden key parsing
      crypto: picoxcell - Simplify and harden key parsing
      crypto: talitos - Simplify key parsing
      padata: make the sequence counter an atomic_t

Michael Ellerman (2):
      hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
      hwrng: pseries - Return errors to upper levels in pseries-rng.c

Michael Opdenacker (1):
      crypto: mv_cesa: remove deprecated IRQF_DISABLED

Neil Horman (1):
      crypto: ansi_cprng - Fix off by one error in non-block size request

Oliver Neukum (1):
      crypto: sha256_ssse3 - also test for BMI2

Pali Rohár (1):
      hwrng: OMAP3 ROM Random Number Generator support

Ruchika Gupta (3):
      crypto: caam - Add Platform driver for Job Ring
      crypto: caam - Add API's to allocate/free Job Rings
      crypto: caam - Modify the interface layers to use JR API's

Sachin Kamat (7):
      crypto: mv_cesa - Staticize local symbols
      crypto: omap-aes - Staticize local symbols
      crypto: tegra-aes - Staticize tegra_aes_cra_exit
      crypto: tegra-aes - Fix NULL pointer dereference
      crypto: tegra-aes - Use devm_clk_get
      crypto: sahara - Remove redundant of_match_ptr
      crypto: mv_cesa - Remove redundant of_match_ptr

Stanimir Varbanov (2):
      ARM: DT: msm: Add Qualcomm's PRNG driver binding document
      hwrng: msm - Add PRNG support for MSM SoC's

Stephen Warren (1):
      ARM: tegra: remove tegra_chip_uid()

Yashpal Dutta (1):
      crypto: caam - map src buffer before access

kbuild test robot (1):
      crypto: ablk_helper - Replace memcpy with struct assignment

 .../devicetree/bindings/rng/qcom,prng.txt          |   17 +
 arch/arm/mach-tegra/fuse.c                         |   10 -
 arch/s390/crypto/aes_s390.c                        |   19 +-
 arch/x86/crypto/Makefile                           |    3 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    2 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    2 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    2 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    4 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/include/asm/simd.h                        |   11 +
 crypto/Kconfig                                     |   23 +-
 crypto/Makefile                                    |    8 +-
 {arch/x86/crypto => crypto}/ablk_helper.c          |   13 +-
 crypto/ablkcipher.c                                |   21 +-
 crypto/ansi_cprng.c                                |    4 +-
 crypto/asymmetric_keys/rsa.c                       |    5 +-
 crypto/authenc.c                                   |   54 ++-
 crypto/authencesn.c                                |   34 +--
 crypto/ccm.c                                       |    4 +-
 crypto/gcm.c                                       |    2 +-
 crypto/memneq.c                                    |  138 +++++++
 drivers/char/hw_random/Kconfig                     |   25 ++
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/msm-rng.c                   |  197 +++++++++
 drivers/char/hw_random/omap3-rom-rng.c             |  141 +++++++
 drivers/char/hw_random/pseries-rng.c               |   19 +-
 drivers/char/hw_random/via-rng.c                   |    2 +-
 drivers/crypto/caam/Kconfig                        |   25 +-
 drivers/crypto/caam/Makefile                       |    4 +-
 drivers/crypto/caam/caamalg.c                      |   83 +---
 drivers/crypto/caam/caamhash.c                     |   88 ++---
 drivers/crypto/caam/caamrng.c                      |   29 +-
 drivers/crypto/caam/ctrl.c                         |  418 ++++++++++++++++----
 drivers/crypto/caam/desc.h                         |   17 +-
 drivers/crypto/caam/intern.h                       |   20 +-
 drivers/crypto/caam/jr.c                           |  339 +++++++++++-----
 drivers/crypto/caam/jr.h                           |    5 +-
 drivers/crypto/caam/regs.h                         |   14 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   34 ++-
 drivers/crypto/dcp.c                               |   49 +--
 drivers/crypto/ixp4xx_crypto.c                     |   26 +-
 drivers/crypto/mv_cesa.c                           |   14 +-
 drivers/crypto/omap-aes.c                          |    6 +-
 drivers/crypto/omap-sham.c                         |    1 +
 drivers/crypto/picoxcell_crypto.c                  |   32 +--
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/talitos.c                           |   35 +--
 drivers/crypto/tegra-aes.c                         |   26 +-
 include/asm-generic/simd.h                         |   14 +
 .../include/asm => include}/crypto/ablk_helper.h   |    0
 include/crypto/algapi.h                            |   18 +-
 include/crypto/authenc.h                           |   12 +-
 include/linux/padata.h                             |    3 +-
 kernel/padata.c                                    |    9 +-
 59 files changed, 1454 insertions(+), 643 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.13
  2013-11-12 16:41                                       ` Herbert Xu
@ 2013-11-12 16:59                                         ` Borislav Petkov
  2013-11-12 18:27                                           ` Herbert Xu
  2013-11-19  2:21                                         ` [GIT] " Herbert Xu
  2013-11-23  1:34                                         ` Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Borislav Petkov @ 2013-11-12 16:59 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Nov 13, 2013 at 12:41:52AM +0800, Herbert Xu wrote:
> Hi Linus:
> 
> Here is the crypto update for 3.13:
> 
> * Made x86 ablk_helper generic for ARM.
> * Phase out chainiv in favour of eseqiv (affects IPsec).
> * Fixed aes-cbc IV corruption on s390.
> * Added constant-time crypto_memneq which replaces memcmp.
> 
> * Fixed aes-ctr in omap-aes.
> * Added OMAP3 ROM RNG support.
> * Add PRNG support for MSM SoC's
> * Add and use Job Ring API in caam.
> 
> * Misc fixes.

Maybe add this one to that:

http://marc.info/?l=linux-kernel&m=138078878205385&w=2

?

-- 
Regards/Gruss,
    Boris.

Sent from a fat crate under my desk. Formatting is fine.
--

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.13
  2013-11-12 16:59                                         ` Borislav Petkov
@ 2013-11-12 18:27                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-12 18:27 UTC (permalink / raw)
  To: Borislav Petkov
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, James Morris

On Tue, Nov 12, 2013 at 05:59:34PM +0100, Borislav Petkov wrote:
> On Wed, Nov 13, 2013 at 12:41:52AM +0800, Herbert Xu wrote:
> > Hi Linus:
> > 
> > Here is the crypto update for 3.13:
> > 
> > * Made x86 ablk_helper generic for ARM.
> > * Phase out chainiv in favour of eseqiv (affects IPsec).
> > * Fixed aes-cbc IV corruption on s390.
> > * Added constant-time crypto_memneq which replaces memcmp.
> > 
> > * Fixed aes-ctr in omap-aes.
> > * Added OMAP3 ROM RNG support.
> > * Add PRNG support for MSM SoC's
> > * Add and use Job Ring API in caam.
> > 
> > * Misc fixes.
> 
> Maybe add this one to that:
> 
> http://marc.info/?l=linux-kernel&m=138078878205385&w=2
> 
> ?

I think this should probably go through James Morris's tree.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* [GIT] Crypto Update for 3.13
  2013-11-12 16:41                                       ` Herbert Xu
  2013-11-12 16:59                                         ` Borislav Petkov
@ 2013-11-19  2:21                                         ` Herbert Xu
  2013-11-23  1:34                                         ` Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-19  2:21 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is a resend of crypto the update for 3.13:

* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.

* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.

* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Alex Porosanu (7):
      crypto: caam - fix RNG state handle instantiation descriptor
      crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
      crypto: caam - fix RNG4 instantiation
      crypto: caam - split RNG4 instantiation function
      crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
      crypto: caam - fix RNG4 AAI defines
      crypto: caam - enable instantiation of all RNG4 state handles

Ard Biesheuvel (2):
      crypto: create generic version of ablk_helper
      crypto: move x86 to the generic version of ablk_helper

Ben Hutchings (1):
      hwrng: via-rng - Mark device ID table as __maybe_unused

Fabio Estevam (4):
      crypto: dcp - Use devm_ioremap_resource()
      crypto: dcp - Use devm_request_irq()
      crypto: dcp - Fix the path for releasing the resources
      crypto: dcp - Check the return value from devm_ioremap_resource()

Herbert Xu (2):
      crypto: skcipher - Use eseqiv even on UP machines
      crypto: s390 - Fix aes-cbc IV corruption

James Yonan (1):
      crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks

Joel Fernandes (1):
      crypto: omap-aes - Fix CTR mode counter length

Joni Lapilainen (1):
      crypto: omap-sham - Add missing modalias

Jussi Kivilinna (2):
      crypto: sha256_ssse3 - use correct module alias for sha224
      crypto: x86 - restore avx2_supported check

Linus Walleij (1):
      crypto: tegra - use kernel entropy instead of ad-hoc

Mathias Krause (6):
      crypto: authenc - Export key parsing helper function
      crypto: authencesn - Simplify key parsing
      crypto: ixp4xx - Simplify and harden key parsing
      crypto: picoxcell - Simplify and harden key parsing
      crypto: talitos - Simplify key parsing
      padata: make the sequence counter an atomic_t

Michael Ellerman (2):
      hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
      hwrng: pseries - Return errors to upper levels in pseries-rng.c

Michael Opdenacker (1):
      crypto: mv_cesa: remove deprecated IRQF_DISABLED

Neil Horman (1):
      crypto: ansi_cprng - Fix off by one error in non-block size request

Oliver Neukum (1):
      crypto: sha256_ssse3 - also test for BMI2

Pali Rohár (1):
      hwrng: OMAP3 ROM Random Number Generator support

Ruchika Gupta (3):
      crypto: caam - Add Platform driver for Job Ring
      crypto: caam - Add API's to allocate/free Job Rings
      crypto: caam - Modify the interface layers to use JR API's

Sachin Kamat (7):
      crypto: mv_cesa - Staticize local symbols
      crypto: omap-aes - Staticize local symbols
      crypto: tegra-aes - Staticize tegra_aes_cra_exit
      crypto: tegra-aes - Fix NULL pointer dereference
      crypto: tegra-aes - Use devm_clk_get
      crypto: sahara - Remove redundant of_match_ptr
      crypto: mv_cesa - Remove redundant of_match_ptr

Stanimir Varbanov (2):
      ARM: DT: msm: Add Qualcomm's PRNG driver binding document
      hwrng: msm - Add PRNG support for MSM SoC's

Stephen Warren (1):
      ARM: tegra: remove tegra_chip_uid()

Yashpal Dutta (1):
      crypto: caam - map src buffer before access

kbuild test robot (1):
      crypto: ablk_helper - Replace memcpy with struct assignment

 .../devicetree/bindings/rng/qcom,prng.txt          |   17 +
 arch/arm/mach-tegra/fuse.c                         |   10 -
 arch/s390/crypto/aes_s390.c                        |   19 +-
 arch/x86/crypto/Makefile                           |    3 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    2 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    2 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    2 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    4 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/include/asm/simd.h                        |   11 +
 crypto/Kconfig                                     |   23 +-
 crypto/Makefile                                    |    8 +-
 {arch/x86/crypto => crypto}/ablk_helper.c          |   13 +-
 crypto/ablkcipher.c                                |   21 +-
 crypto/ansi_cprng.c                                |    4 +-
 crypto/asymmetric_keys/rsa.c                       |    5 +-
 crypto/authenc.c                                   |   54 ++-
 crypto/authencesn.c                                |   34 +--
 crypto/ccm.c                                       |    4 +-
 crypto/gcm.c                                       |    2 +-
 crypto/memneq.c                                    |  138 +++++++
 drivers/char/hw_random/Kconfig                     |   25 ++
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/msm-rng.c                   |  197 +++++++++
 drivers/char/hw_random/omap3-rom-rng.c             |  141 +++++++
 drivers/char/hw_random/pseries-rng.c               |   19 +-
 drivers/char/hw_random/via-rng.c                   |    2 +-
 drivers/crypto/caam/Kconfig                        |   25 +-
 drivers/crypto/caam/Makefile                       |    4 +-
 drivers/crypto/caam/caamalg.c                      |   83 +---
 drivers/crypto/caam/caamhash.c                     |   88 ++---
 drivers/crypto/caam/caamrng.c                      |   29 +-
 drivers/crypto/caam/ctrl.c                         |  418 ++++++++++++++++----
 drivers/crypto/caam/desc.h                         |   17 +-
 drivers/crypto/caam/intern.h                       |   20 +-
 drivers/crypto/caam/jr.c                           |  339 +++++++++++-----
 drivers/crypto/caam/jr.h                           |    5 +-
 drivers/crypto/caam/regs.h                         |   14 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   34 ++-
 drivers/crypto/dcp.c                               |   49 +--
 drivers/crypto/ixp4xx_crypto.c                     |   26 +-
 drivers/crypto/mv_cesa.c                           |   14 +-
 drivers/crypto/omap-aes.c                          |    6 +-
 drivers/crypto/omap-sham.c                         |    1 +
 drivers/crypto/picoxcell_crypto.c                  |   32 +--
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/talitos.c                           |   35 +--
 drivers/crypto/tegra-aes.c                         |   26 +-
 include/asm-generic/simd.h                         |   14 +
 .../include/asm => include}/crypto/ablk_helper.h   |    0
 include/crypto/algapi.h                            |   18 +-
 include/crypto/authenc.h                           |   12 +-
 include/linux/padata.h                             |    3 +-
 kernel/padata.c                                    |    9 +-
 59 files changed, 1454 insertions(+), 643 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.13
  2013-11-12 16:41                                       ` Herbert Xu
  2013-11-12 16:59                                         ` Borislav Petkov
  2013-11-19  2:21                                         ` [GIT] " Herbert Xu
@ 2013-11-23  1:34                                         ` Herbert Xu
  2013-11-23  1:40                                           ` Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-11-23  1:34 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This is a resend.

Here is the crypto update for 3.13:

* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.

* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.

* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Alex Porosanu (7):
      crypto: caam - fix RNG state handle instantiation descriptor
      crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
      crypto: caam - fix RNG4 instantiation
      crypto: caam - split RNG4 instantiation function
      crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
      crypto: caam - fix RNG4 AAI defines
      crypto: caam - enable instantiation of all RNG4 state handles

Ard Biesheuvel (2):
      crypto: create generic version of ablk_helper
      crypto: move x86 to the generic version of ablk_helper

Ben Hutchings (1):
      hwrng: via-rng - Mark device ID table as __maybe_unused

Fabio Estevam (4):
      crypto: dcp - Use devm_ioremap_resource()
      crypto: dcp - Use devm_request_irq()
      crypto: dcp - Fix the path for releasing the resources
      crypto: dcp - Check the return value from devm_ioremap_resource()

Herbert Xu (2):
      crypto: skcipher - Use eseqiv even on UP machines
      crypto: s390 - Fix aes-cbc IV corruption

James Yonan (1):
      crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks

Joel Fernandes (1):
      crypto: omap-aes - Fix CTR mode counter length

Joni Lapilainen (1):
      crypto: omap-sham - Add missing modalias

Jussi Kivilinna (2):
      crypto: sha256_ssse3 - use correct module alias for sha224
      crypto: x86 - restore avx2_supported check

Linus Walleij (1):
      crypto: tegra - use kernel entropy instead of ad-hoc

Mathias Krause (6):
      crypto: authenc - Export key parsing helper function
      crypto: authencesn - Simplify key parsing
      crypto: ixp4xx - Simplify and harden key parsing
      crypto: picoxcell - Simplify and harden key parsing
      crypto: talitos - Simplify key parsing
      padata: make the sequence counter an atomic_t

Michael Ellerman (2):
      hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
      hwrng: pseries - Return errors to upper levels in pseries-rng.c

Michael Opdenacker (1):
      crypto: mv_cesa: remove deprecated IRQF_DISABLED

Neil Horman (1):
      crypto: ansi_cprng - Fix off by one error in non-block size request

Oliver Neukum (1):
      crypto: sha256_ssse3 - also test for BMI2

Pali Rohár (1):
      hwrng: OMAP3 ROM Random Number Generator support

Ruchika Gupta (3):
      crypto: caam - Add Platform driver for Job Ring
      crypto: caam - Add API's to allocate/free Job Rings
      crypto: caam - Modify the interface layers to use JR API's

Sachin Kamat (7):
      crypto: mv_cesa - Staticize local symbols
      crypto: omap-aes - Staticize local symbols
      crypto: tegra-aes - Staticize tegra_aes_cra_exit
      crypto: tegra-aes - Fix NULL pointer dereference
      crypto: tegra-aes - Use devm_clk_get
      crypto: sahara - Remove redundant of_match_ptr
      crypto: mv_cesa - Remove redundant of_match_ptr

Stanimir Varbanov (2):
      ARM: DT: msm: Add Qualcomm's PRNG driver binding document
      hwrng: msm - Add PRNG support for MSM SoC's

Stephen Warren (1):
      ARM: tegra: remove tegra_chip_uid()

Yashpal Dutta (1):
      crypto: caam - map src buffer before access

kbuild test robot (1):
      crypto: ablk_helper - Replace memcpy with struct assignment

 .../devicetree/bindings/rng/qcom,prng.txt          |   17 +
 arch/arm/mach-tegra/fuse.c                         |   10 -
 arch/s390/crypto/aes_s390.c                        |   19 +-
 arch/x86/crypto/Makefile                           |    3 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    2 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    2 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    2 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    4 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/include/asm/simd.h                        |   11 +
 crypto/Kconfig                                     |   23 +-
 crypto/Makefile                                    |    8 +-
 {arch/x86/crypto => crypto}/ablk_helper.c          |   13 +-
 crypto/ablkcipher.c                                |   21 +-
 crypto/ansi_cprng.c                                |    4 +-
 crypto/asymmetric_keys/rsa.c                       |    5 +-
 crypto/authenc.c                                   |   54 ++-
 crypto/authencesn.c                                |   34 +--
 crypto/ccm.c                                       |    4 +-
 crypto/gcm.c                                       |    2 +-
 crypto/memneq.c                                    |  138 +++++++
 drivers/char/hw_random/Kconfig                     |   25 ++
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/msm-rng.c                   |  197 +++++++++
 drivers/char/hw_random/omap3-rom-rng.c             |  141 +++++++
 drivers/char/hw_random/pseries-rng.c               |   19 +-
 drivers/char/hw_random/via-rng.c                   |    2 +-
 drivers/crypto/caam/Kconfig                        |   25 +-
 drivers/crypto/caam/Makefile                       |    4 +-
 drivers/crypto/caam/caamalg.c                      |   83 +---
 drivers/crypto/caam/caamhash.c                     |   88 ++---
 drivers/crypto/caam/caamrng.c                      |   29 +-
 drivers/crypto/caam/ctrl.c                         |  418 ++++++++++++++++----
 drivers/crypto/caam/desc.h                         |   17 +-
 drivers/crypto/caam/intern.h                       |   20 +-
 drivers/crypto/caam/jr.c                           |  339 +++++++++++-----
 drivers/crypto/caam/jr.h                           |    5 +-
 drivers/crypto/caam/regs.h                         |   14 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   34 ++-
 drivers/crypto/dcp.c                               |   49 +--
 drivers/crypto/ixp4xx_crypto.c                     |   26 +-
 drivers/crypto/mv_cesa.c                           |   14 +-
 drivers/crypto/omap-aes.c                          |    6 +-
 drivers/crypto/omap-sham.c                         |    1 +
 drivers/crypto/picoxcell_crypto.c                  |   32 +--
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/talitos.c                           |   35 +--
 drivers/crypto/tegra-aes.c                         |   26 +-
 include/asm-generic/simd.h                         |   14 +
 .../include/asm => include}/crypto/ablk_helper.h   |    0
 include/crypto/algapi.h                            |   18 +-
 include/crypto/authenc.h                           |   12 +-
 include/linux/padata.h                             |    3 +-
 kernel/padata.c                                    |    9 +-
 59 files changed, 1454 insertions(+), 643 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.13
  2013-11-23  1:34                                         ` Herbert Xu
@ 2013-11-23  1:40                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-23  1:40 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

Hi Linus:

This is a resend with the recipients in the cc field instead of the
to field.

Here is the crypto update for 3.13:

* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.

* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.

* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Alex Porosanu (7):
      crypto: caam - fix RNG state handle instantiation descriptor
      crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
      crypto: caam - fix RNG4 instantiation
      crypto: caam - split RNG4 instantiation function
      crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
      crypto: caam - fix RNG4 AAI defines
      crypto: caam - enable instantiation of all RNG4 state handles

Ard Biesheuvel (2):
      crypto: create generic version of ablk_helper
      crypto: move x86 to the generic version of ablk_helper

Ben Hutchings (1):
      hwrng: via-rng - Mark device ID table as __maybe_unused

Fabio Estevam (4):
      crypto: dcp - Use devm_ioremap_resource()
      crypto: dcp - Use devm_request_irq()
      crypto: dcp - Fix the path for releasing the resources
      crypto: dcp - Check the return value from devm_ioremap_resource()

Herbert Xu (2):
      crypto: skcipher - Use eseqiv even on UP machines
      crypto: s390 - Fix aes-cbc IV corruption

James Yonan (1):
      crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks

Joel Fernandes (1):
      crypto: omap-aes - Fix CTR mode counter length

Joni Lapilainen (1):
      crypto: omap-sham - Add missing modalias

Jussi Kivilinna (2):
      crypto: sha256_ssse3 - use correct module alias for sha224
      crypto: x86 - restore avx2_supported check

Linus Walleij (1):
      crypto: tegra - use kernel entropy instead of ad-hoc

Mathias Krause (6):
      crypto: authenc - Export key parsing helper function
      crypto: authencesn - Simplify key parsing
      crypto: ixp4xx - Simplify and harden key parsing
      crypto: picoxcell - Simplify and harden key parsing
      crypto: talitos - Simplify key parsing
      padata: make the sequence counter an atomic_t

Michael Ellerman (2):
      hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
      hwrng: pseries - Return errors to upper levels in pseries-rng.c

Michael Opdenacker (1):
      crypto: mv_cesa: remove deprecated IRQF_DISABLED

Neil Horman (1):
      crypto: ansi_cprng - Fix off by one error in non-block size request

Oliver Neukum (1):
      crypto: sha256_ssse3 - also test for BMI2

Pali Rohár (1):
      hwrng: OMAP3 ROM Random Number Generator support

Ruchika Gupta (3):
      crypto: caam - Add Platform driver for Job Ring
      crypto: caam - Add API's to allocate/free Job Rings
      crypto: caam - Modify the interface layers to use JR API's

Sachin Kamat (7):
      crypto: mv_cesa - Staticize local symbols
      crypto: omap-aes - Staticize local symbols
      crypto: tegra-aes - Staticize tegra_aes_cra_exit
      crypto: tegra-aes - Fix NULL pointer dereference
      crypto: tegra-aes - Use devm_clk_get
      crypto: sahara - Remove redundant of_match_ptr
      crypto: mv_cesa - Remove redundant of_match_ptr

Stanimir Varbanov (2):
      ARM: DT: msm: Add Qualcomm's PRNG driver binding document
      hwrng: msm - Add PRNG support for MSM SoC's

Stephen Warren (1):
      ARM: tegra: remove tegra_chip_uid()

Yashpal Dutta (1):
      crypto: caam - map src buffer before access

kbuild test robot (1):
      crypto: ablk_helper - Replace memcpy with struct assignment

 .../devicetree/bindings/rng/qcom,prng.txt          |   17 +
 arch/arm/mach-tegra/fuse.c                         |   10 -
 arch/s390/crypto/aes_s390.c                        |   19 +-
 arch/x86/crypto/Makefile                           |    3 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    2 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    2 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    2 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    4 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/include/asm/simd.h                        |   11 +
 crypto/Kconfig                                     |   23 +-
 crypto/Makefile                                    |    8 +-
 {arch/x86/crypto => crypto}/ablk_helper.c          |   13 +-
 crypto/ablkcipher.c                                |   21 +-
 crypto/ansi_cprng.c                                |    4 +-
 crypto/asymmetric_keys/rsa.c                       |    5 +-
 crypto/authenc.c                                   |   54 ++-
 crypto/authencesn.c                                |   34 +--
 crypto/ccm.c                                       |    4 +-
 crypto/gcm.c                                       |    2 +-
 crypto/memneq.c                                    |  138 +++++++
 drivers/char/hw_random/Kconfig                     |   25 ++
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/msm-rng.c                   |  197 +++++++++
 drivers/char/hw_random/omap3-rom-rng.c             |  141 +++++++
 drivers/char/hw_random/pseries-rng.c               |   19 +-
 drivers/char/hw_random/via-rng.c                   |    2 +-
 drivers/crypto/caam/Kconfig                        |   25 +-
 drivers/crypto/caam/Makefile                       |    4 +-
 drivers/crypto/caam/caamalg.c                      |   83 +---
 drivers/crypto/caam/caamhash.c                     |   88 ++---
 drivers/crypto/caam/caamrng.c                      |   29 +-
 drivers/crypto/caam/ctrl.c                         |  418 ++++++++++++++++----
 drivers/crypto/caam/desc.h                         |   17 +-
 drivers/crypto/caam/intern.h                       |   20 +-
 drivers/crypto/caam/jr.c                           |  339 +++++++++++-----
 drivers/crypto/caam/jr.h                           |    5 +-
 drivers/crypto/caam/regs.h                         |   14 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   34 ++-
 drivers/crypto/dcp.c                               |   49 +--
 drivers/crypto/ixp4xx_crypto.c                     |   26 +-
 drivers/crypto/mv_cesa.c                           |   14 +-
 drivers/crypto/omap-aes.c                          |    6 +-
 drivers/crypto/omap-sham.c                         |    1 +
 drivers/crypto/picoxcell_crypto.c                  |   32 +--
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/talitos.c                           |   35 +--
 drivers/crypto/tegra-aes.c                         |   26 +-
 include/asm-generic/simd.h                         |   14 +
 .../include/asm => include}/crypto/ablk_helper.h   |    0
 include/crypto/algapi.h                            |   18 +-
 include/crypto/authenc.h                           |   12 +-
 include/linux/padata.h                             |    3 +-
 kernel/padata.c                                    |    9 +-
 59 files changed, 1454 insertions(+), 643 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.13
  2013-03-28  8:28                                           ` Crypto Fixes for 3.9 Herbert Xu
                                                               ` (4 preceding siblings ...)
  2013-09-13 11:30                                             ` Crypto Fixes for 3.12 Herbert Xu
@ 2013-12-03 12:41                                             ` Herbert Xu
  2013-12-09 11:57                                               ` Herbert Xu
  5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-12-03 12:41 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a number of crashes triggered by a previous
crypto self-test update.  It also fixes a build problem in the
caam driver, as well as a concurrency issue in s390.  Finally
there is a pair of fixes to bugs in the crypto scatterwalk code
and authenc that may lead to crashes.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Gerald Schaefer (1):
      crypto: s390 - Fix aes-xts parameter corruption

Horia Geanta (5):
      crypto: talitos - corrrectly handle zero-length assoc data
      crypto: ccm - Fix handling of zero plaintext when computing mac
      crypto: caam - fix aead sglen for case 'dst != src'
      crypto: talitos - fix aead sglen for case 'dst != src'
      crypto: testmgr - fix sglen in test_aead for case 'dst != src'

Michael Neuling (1):
      crypto: caam - Add missing Job Ring include

Tom Lendacky (2):
      crypto: authenc - Find proper IV address in ablkcipher callback
      crypto: scatterwalk - Set the chain pointer indication bit

 arch/s390/crypto/aes_s390.c   |   31 ++++++++++--------
 crypto/authenc.c              |    7 ++--
 crypto/ccm.c                  |    3 +-
 crypto/tcrypt.c               |    4 ++
 crypto/testmgr.c              |   26 +++++++--------
 drivers/crypto/caam/caamalg.c |   51 +++++++++++++++++-------------
 drivers/crypto/caam/jr.c      |    1 +
 drivers/crypto/talitos.c      |   68 +++++++++++++++++++++++-----------------
 include/crypto/scatterwalk.h  |    1 +
 9 files changed, 109 insertions(+), 83 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 3.13
  2013-12-03 12:41                                             ` Crypto Fixes for 3.13 Herbert Xu
@ 2013-12-09 11:57                                               ` Herbert Xu
  2014-01-01  6:10                                                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-12-09 11:57 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Unfortunately the last push that fixed a crash in the crypto
scatterwalk code introduced a new crash when SG debugging is
enabled.  This push fixes that.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Tom Lendacky (1):
      crypto: scatterwalk - Use sg_chain_ptr on chain entries

 include/crypto/scatterwalk.h |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.13
  2013-12-09 11:57                                               ` Herbert Xu
@ 2014-01-01  6:10                                                 ` Herbert Xu
  2014-02-03 12:59                                                   ` Crypto Fixes for 3.14 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-01-01  6:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build error on ARM that was introduced in 3.13-rc1.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Krzysztof Hałasa (1):
      crypto: ixp4xx - Fix kernel compile error

 drivers/crypto/ixp4xx_crypto.c |    4 +---
 1 files changed, 1 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.14
  2013-11-07  8:01                                     ` Crypto Update for 3.13 Herbert Xu
  2013-11-12 16:41                                       ` Herbert Xu
@ 2014-01-23 11:53                                       ` Herbert Xu
  2014-04-01 10:00                                         ` Crypto Update for 3.15 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-01-23 11:53 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.14:

* Improved crypto_memneq helper.
* Use cyprto_memneq in arch-specific crypto code.
* Replaced orphaned DCP driver with Freescale MXS DCP driver.
* Added AVX/AVX2 version of AESNI-GCM encode and decode.
* Added AMD Cryptographic Coprocessor (CCP) driver.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Andy Shevchenko (1):
      crypto: aesni - fix build on x86 (32bit)

Cesar Eduardo Barros (1):
      crypto: more robust crypto_memneq

Daniel Borkmann (2):
      crypto: memneq - fix for archs without efficient unaligned access
      crypto: arch - use crypto_memneq instead of memcmp

Fengguang Wu (1):
      crytpo: ccp - fix coccinelle warnings

Horia Geanta (2):
      crypto: talitos - fix locating offending descriptor in error path
      crypto: caam - simplify and harden key parsing

Lokesh Vutla (1):
      crypto: omap-sham - Fix Polling mode for larger blocks

Marek Vasut (5):
      crypto: ahash - Fully restore ahash request before completing
      crypto: mxs - Remove the old DCP driver
      crypto: mxs - Add Freescale MXS DCP driver
      ARM: mxs: dts: Enable DCP for MXS
      crypto: drivers - Sort drivers/crypto/Makefile

Mark A. Greer (1):
      crypto: omap-sham - Only release DMA channel if successfully requested

Mathias Krause (2):
      crypto: pcrypt - Fix wrong usage of rcu_dereference()
      padata: Fix wrong usage of rcu_dereference()

Nishanth Menon (1):
      crypto: omap-aes - add error check for pm_runtime_get_sync

Sachin Kamat (3):
      crypto: crypto4xx - Remove redundant dev_set_drvdata
      crypto: ccp - Remove redundant dev_set_drvdata
      crypto: talitos - Remove redundant dev_set_drvdata

Tim Chen (3):
      crypto: aesni - AVX and AVX2 version of AESNI-GCM encode and decode
      crypto: tcrypt - Added speed tests for AEAD crypto alogrithms in tcrypt test suite
      crypto: aesni - fix build on x86 (32bit)

Tom Lendacky (17):
      crypto: ccp - CCP device driver and interface support
      crypto: ccp - crypto API interface to the CCP device driver
      crypto: ccp - CCP AES crypto API support
      crypto: ccp - CCP AES CMAC mode crypto API support
      crypto: ccp - CCP XTS-AES crypto API support
      crypto: ccp - CCP SHA crypto API support
      crytpo: ccp - CCP device driver build files
      crypto: ccp - CCP maintainer information
      crypto: ccp - Fix sparse warnings in ccp-crypto-sha.c
      crypto: ccp - CCP Kconfig fixes
      crypto: ccp - Remove user triggerable pr_err calls
      crypto: ccp - Apply appropriate gfp_t type to memory allocations
      crypto: ccp - Cleanup scatterlist usage
      crypto: ccp - Check for caller result area before using it
      crypto: ccp - Change data length declarations to u64
      crypto: ccp - Cleanup hash invocation calls
      crypto: ccp - CCP device enabled/disabled changes

Wei Yongjun (1):
      crypto: mxs - Fix sparse non static symbol warning

 .../devicetree/bindings/crypto/fsl-dcp.txt         |   17 +
 MAINTAINERS                                        |    7 +
 arch/arm/boot/dts/imx23.dtsi                       |    4 +-
 arch/arm/boot/dts/imx28.dtsi                       |    3 +-
 arch/s390/crypto/des_s390.c                        |    6 +-
 arch/x86/crypto/Makefile                           |    1 +
 arch/x86/crypto/aesni-intel_avx-x86_64.S           | 2811 ++++++++++++++++++++
 arch/x86/crypto/aesni-intel_glue.c                 |  147 +-
 crypto/Makefile                                    |    5 -
 crypto/ahash.c                                     |    5 +-
 crypto/memneq.c                                    |   80 +-
 crypto/pcrypt.c                                    |    2 +-
 crypto/tcrypt.c                                    |  270 ++
 crypto/tcrypt.h                                    |   10 +
 drivers/crypto/Kconfig                             |   39 +-
 drivers/crypto/Makefile                            |   33 +-
 drivers/crypto/amcc/crypto4xx_core.c               |    1 -
 drivers/crypto/caam/caamalg.c                      |   36 +-
 drivers/crypto/ccp/Kconfig                         |   24 +
 drivers/crypto/ccp/Makefile                        |   10 +
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c           |  365 +++
 drivers/crypto/ccp/ccp-crypto-aes-xts.c            |  279 ++
 drivers/crypto/ccp/ccp-crypto-aes.c                |  369 +++
 drivers/crypto/ccp/ccp-crypto-main.c               |  432 +++
 drivers/crypto/ccp/ccp-crypto-sha.c                |  517 ++++
 drivers/crypto/ccp/ccp-crypto.h                    |  197 ++
 drivers/crypto/ccp/ccp-dev.c                       |  595 +++++
 drivers/crypto/ccp/ccp-dev.h                       |  272 ++
 drivers/crypto/ccp/ccp-ops.c                       | 2024 ++++++++++++++
 drivers/crypto/ccp/ccp-pci.c                       |  361 +++
 drivers/crypto/dcp.c                               |  903 -------
 drivers/crypto/mxs-dcp.c                           | 1100 ++++++++
 drivers/crypto/omap-aes.c                          |   16 +-
 drivers/crypto/omap-sham.c                         |   19 +-
 drivers/crypto/talitos.c                           |   23 +-
 include/linux/ccp.h                                |  537 ++++
 include/linux/compiler-gcc.h                       |    3 +
 include/linux/compiler-intel.h                     |    7 +
 include/linux/compiler.h                           |    4 +
 kernel/padata.c                                    |    2 +-
 40 files changed, 10527 insertions(+), 1009 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.14
  2014-01-01  6:10                                                 ` Herbert Xu
@ 2014-02-03 12:59                                                   ` Herbert Xu
  2014-04-13 23:34                                                     ` Crypto Fixes for 3.15 Herbert Xu
                                                                       ` (2 more replies)
  0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2014-02-03 12:59 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a number of concurrency issues on s390 where
multiple users of the same crypto transform may clobber each
other's results.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

 
Harald Freudenberger (3):
      crypto: s390 - fix concurrency issue in aes-ctr mode
      crypto: s390 - fix des and des3_ede cbc concurrency issue
      crypto: s390 - fix des and des3_ede ctr concurrency issue

 arch/s390/crypto/aes_s390.c |   65 +++++++++++++++++++++---------
 arch/s390/crypto/des_s390.c |   95 ++++++++++++++++++++++++++++---------------
 2 files changed, 108 insertions(+), 52 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.15
  2014-01-23 11:53                                       ` Crypto Update for 3.14 Herbert Xu
@ 2014-04-01 10:00                                         ` Herbert Xu
  2014-06-05  6:23                                           ` Crypto Update for 3.16 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-04-01 10:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.15:

* Added 3DES driver for OMAP4/AM43xx.
* Added AVX2 acceleration for SHA.
* Added hash-only AEAD algorithms in caam.
* Removed tegra driver as it is not functioning and the hardware is too slow.
* Allow blkcipher walks over AEAD (needed for ARM).
* Fixed unprotected FPU/SSE access in ghash-clmulni-intel.
* Fixed highmem crash in omap-sham.
* Add (zero entropy) randomness when initialising hardware RNGs.
* Fixed unaligned ahash comletion functions.
* Added soft module depedency for crc32c for initrds that use crc32c.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git



Alex Porosanu (1):
      crypto: caam - fix ERA retrieval function

Alexander Shiyan (1):
      crypto: sahara - Use return value of devm_request_irq() on error

Ard Biesheuvel (3):
      crypto: remove direct blkcipher_walk dependency on transform
      crypto: allow blkcipher walks over AEAD data
      crypto: ghash-clmulni-intel - use C implementation for setkey()

Dan Carpenter (3):
      hwrng: cleanup in hwrng_register()
      crypto: remove a duplicate checks in __cbc_decrypt()
      crypto: caam - writel() arguments are swapped

Dave Jones (1):
      crypto: ccp - Fix ccp_run_passthru_cmd dma variable assignments

Fabio Estevam (3):
      crypto: mxs-dcp: Use devm_kzalloc()
      crypto: mxs-dcp: Check the return value of stmp_reset_block()
      crypto: mxs-dcp - Fix platform_get_irq() error handling

Herbert Xu (1):
      crypto: caam - Fix first parameter to caam_init_rng

Horia Geanta (5):
      crypto: caam - remove error propagation handling
      crypto: export NULL algorithms defines
      crypto: testmgr - add aead null encryption test vectors
      crypto: caam - add support for aead null encryption
      crypto: caam - add missing key_dma unmap

Jingoo Han (14):
      crypto: picoxcell - Use devm_ioremap_resource()
      crypto: sahara - Use devm_ioremap_resource()
      crypto: s5p-sss - Use devm_ioremap_resource()
      hwrng: atmel - Use devm_ioremap_resource()
      hwrng: pixocell - Use devm_ioremap_resource()
      hwrng: atmel - Use devm_clk_get()
      hwrng: omap3-rom - Use devm_clk_get()
      hwrng: pixocell - Use devm_clk_get()
      hwrng: nomadik - Use devm_*() functions
      hwrng: timeriomem - Use devm_*() functions
      crypto: omap-aes - Use SIMPLE_DEV_PM_OPS macro
      crypto: omap-des - Use SIMPLE_DEV_PM_OPS macro
      crypto: omap-sham - Use SIMPLE_DEV_PM_OPS macro
      crypto: omap-des - make local functions static

Joel Fernandes (3):
      crypto: omap-des - Add omap-des driver for OMAP4/AM43xx
      crypto: omap-des - Add config and build options
      crypto: omap-sham - Map SG pages if they are HIGHMEM before accessing

Kees Cook (1):
      hwrng: add randomness to system from rng sources

Kevin Hao (1):
      crypto: talitos: init the priv->alg_list more earlier in talitos_probe()

Marek Vasut (6):
      crypto: dcp - Move the AES operation type from actx to rctx
      crypto: mxs-dcp - Align the bounce buffers
      crypto: mxs-dcp - Optimize hashing
      crypto: hash - Fix the pointer voodoo in unaligned ahash
      crypto: hash - Pull out the functions to save/restore request
      crypto: hash - Simplify the ahash_finup implementation

Mathias Krause (3):
      crypto: x86/sha1 - re-enable the AVX variant
      crypto: x86/sha1 - fix stack alignment of AVX2 variant
      crypto: x86/sha1 - reduce size of the AVX2 asm implementation

Nitesh Lal (2):
      crypto: caam - Fix job ring discovery in controller driver
      crypto: caam - Dynamic memory allocation for caam_rng_ctx object

Sonic Zhang (1):
      crypt: bfin_crc - Remove useless SSYNC instruction and cache flush to DMA coherent memory

Stephen Warren (1):
      crypto: tegra - remove driver

Tim Chen (2):
      CRC32C: Add soft module dependency to load other accelerated crc32c modules
      crypto: crypto_wq - Fix late crypto work queue initialization

Tom Lendacky (7):
      crypto: ccp - Allow for selective disablement of crypto API algorithms
      crypto: ccp - Move HMAC calculation down to ccp ops file
      crypto: ccp - Use a single queue for proper ordering of tfm requests
      crypto: ccp - Perform completion callbacks using a tasklet
      crypto: ccp - Prevent a possible lost CCP command request
      crypto: ccp - Invoke context callback when there is a backlog error
      crypto: ccp - Account for CCP backlog processing

chandramouli narayanan (1):
      crypto: sha - SHA1 transform x86_64 AVX2

 arch/x86/crypto/Makefile                   |    3 +
 arch/x86/crypto/blowfish_glue.c            |    3 -
 arch/x86/crypto/cast5_avx_glue.c           |    3 -
 arch/x86/crypto/ghash-clmulni-intel_asm.S  |   29 -
 arch/x86/crypto/ghash-clmulni-intel_glue.c |   14 +-
 arch/x86/crypto/sha1_avx2_x86_64_asm.S     |  708 ++++++++++++++++
 arch/x86/crypto/sha1_ssse3_glue.c          |   53 ++-
 crypto/Kconfig                             |    4 +-
 crypto/Makefile                            |    2 +-
 crypto/ahash.c                             |  147 +++--
 crypto/blkcipher.c                         |   81 ++-
 crypto/{crc32c.c => crc32c_generic.c}      |    2 +
 crypto/crypto_null.c                       |    6 +-
 crypto/crypto_wq.c                         |    2 +-
 crypto/tcrypt.c                            |    8 +
 crypto/testmgr.c                           |   32 +
 crypto/testmgr.h                           |  180 ++++
 drivers/char/hw_random/atmel-rng.c         |   23 +-
 drivers/char/hw_random/core.c              |   17 +-
 drivers/char/hw_random/nomadik-rng.c       |   13 +-
 drivers/char/hw_random/omap3-rom-rng.c     |    3 +-
 drivers/char/hw_random/picoxcell-rng.c     |   27 +-
 drivers/char/hw_random/timeriomem-rng.c    |   40 +-
 drivers/crypto/Kconfig                     |   22 +-
 drivers/crypto/Makefile                    |    2 +-
 drivers/crypto/bfin_crc.c                  |   45 +-
 drivers/crypto/caam/caamalg.c              |  384 ++++++++--
 drivers/crypto/caam/caamrng.c              |   17 +-
 drivers/crypto/caam/compat.h               |    1 +
 drivers/crypto/caam/ctrl.c                 |   61 +-
 drivers/crypto/caam/ctrl.h                 |    2 +-
 drivers/crypto/caam/desc_constr.h          |   27 +-
 drivers/crypto/caam/regs.h                 |    4 +-
 drivers/crypto/ccp/ccp-crypto-main.c       |  224 ++---
 drivers/crypto/ccp/ccp-crypto-sha.c        |  130 +---
 drivers/crypto/ccp/ccp-crypto.h            |    8 +-
 drivers/crypto/ccp/ccp-dev.c               |   21 +-
 drivers/crypto/ccp/ccp-ops.c               |  108 +++-
 drivers/crypto/mxs-dcp.c                   |   83 ++-
 drivers/crypto/omap-aes.c                  |    4 +-
 drivers/crypto/omap-des.c                  | 1216 ++++++++++++++++++++++++++++
 drivers/crypto/omap-sham.c                 |   12 +-
 drivers/crypto/picoxcell_crypto.c          |   16 +-
 drivers/crypto/s5p-sss.c                   |   13 +-
 drivers/crypto/sahara.c                    |   26 +-
 drivers/crypto/talitos.c                   |    4 +-
 drivers/crypto/tegra-aes.c                 | 1087 -------------------------
 drivers/crypto/tegra-aes.h                 |  103 ---
 include/crypto/algapi.h                    |    9 +-
 include/crypto/null.h                      |   11 +
 include/linux/ccp.h                        |    7 +
 51 files changed, 3140 insertions(+), 1907 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.15
  2014-02-03 12:59                                                   ` Crypto Fixes for 3.14 Herbert Xu
@ 2014-04-13 23:34                                                     ` Herbert Xu
  2014-05-13 11:02                                                       ` Herbert Xu
  2014-07-10  9:03                                                     ` Crypto Fixes for 3.16 Herbert Xu
  2014-12-31  3:32                                                     ` Crypto Fixes for 3.19 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-04-13 23:34 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a potential boot crash on bcm2835 due to the
recent change that now causes hardware RNGs to be accessed on
registration.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Matt Porter (1):
      hwrng: bcm2835 - fix oops when rng h/w is accessed during registration

 drivers/char/hw_random/bcm2835-rng.c |   10 +++++-----
 1 files changed, 5 insertions(+), 5 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.15
  2014-04-13 23:34                                                     ` Crypto Fixes for 3.15 Herbert Xu
@ 2014-05-13 11:02                                                       ` Herbert Xu
  2014-05-21 12:22                                                         ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-05-13 11:02 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a NULL pointer dereference on allocation failure
in caam, as well as a regression in the ctr mode on s390 that was
added with the recent concurrency fixes.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Harald Freudenberger (1):
      crypto: s390 - fix aes,des ctr mode concurrency finding.

Horia Geanta (1):
      crypto: caam - add allocation failure handling in SPRINTFCAT macro

 arch/s390/crypto/aes_s390.c |    3 +++
 arch/s390/crypto/des_s390.c |    3 +++
 drivers/crypto/caam/error.c |   10 +++++++---
 3 files changed, 13 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.15
  2014-05-13 11:02                                                       ` Herbert Xu
@ 2014-05-21 12:22                                                         ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-05-21 12:22 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a NULL pointer dereference on allocation failure
in caam, as well as a regression in the ctr mode on s390 that was
added with the recent concurrency fixes.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Harald Freudenberger (1):
      crypto: s390 - fix aes,des ctr mode concurrency finding.

Horia Geanta (1):
      crypto: caam - add allocation failure handling in SPRINTFCAT macro

 arch/s390/crypto/aes_s390.c |    3 +++
 arch/s390/crypto/des_s390.c |    3 +++
 drivers/crypto/caam/error.c |   10 +++++++---
 3 files changed, 13 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.16
  2014-04-01 10:00                                         ` Crypto Update for 3.15 Herbert Xu
@ 2014-06-05  6:23                                           ` Herbert Xu
  2014-06-08  2:56                                             ` Linus Torvalds
  2014-08-04 13:03                                             ` Crypto Update for 3.17 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2014-06-05  6:23 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.16:

* Added test vectors for SHA/AES-CCM/DES-CBC/3DES-CBC.
* Fixed a number of error-path memory leaks in tcrypt.
* Fixed error-path memory leak in caam.
* Removed unnecessary global mutex from mxs-dcp.
* Added ahash walk interface that can actually be asynchronous.
* Cleaned up caam error reporting.
* Allow crypto_user get operation to be used by non-root users.
* Add support for SSS module on Exynos.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git


Alexander Gordeev (1):
      crypto: ccp - Use pci_enable_msix_range() instead of pci_enable_msix()

Ard Biesheuvel (1):
      crypto: testmgr - add test cases for SHA-1, SHA-224, SHA-256 and AES-CCM

Arnd Bergmann (1):
      crypto: s5p-sss - fix multiplatform build

Christian Engelmayer (3):
      crypto: tcrypt - Fix potential leak in test_aead_speed() if aad_size is too big
      crypto: tcrypt - Fix potential leak in test_aead_speed() if crypto_alloc_aead() fails
      crypto: tcrypt - Fix leak of struct aead_request in test_aead_speed()

Fabio Estevam (1):
      crypto: mxs-dcp - Remove global mutex

Herbert Xu (2):
      crypto: ghash-clmulni-intel - Use u128 instead of be128 for internal key
      crypto: hash - Add real ahash walk interface

Himangi Saraogi (1):
      hwrng: n2-drv - Introduce the use of the managed version of kzalloc

Horia Geanta (1):
      crypto: caam - fix mem leak in ahash_setkey

Jean Delvare (3):
      hwrng: Move UML_RANDOM at the last position
      hwrng: Turn HW_RANDOM into a menuconfig
      hwrng: Fix a few driver dependencies and defaults

Jingoo Han (3):
      crypto: omap-des - use devm_ioremap_resource()
      hwrng: omap - remove unnecessary OOM messages
      hwrng: timeriomem - remove unnecessary OOM messages

Jussi Kivilinna (1):
      crypto: testmgr - add empty and large test vectors for SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512

Leilei Zhao (2):
      crypto: atmel-aes - correct block size of cfb8 mode
      crypto: atmel-aes - check alignment of cfb64 mode

Marek Vasut (23):
      crypto: caam - Contain caam_jr_strstatus() ugliness
      crypto: caam - Pull all the error codes out
      crypto: caam - Implement fast-path for error codes with no handler
      crypto: caam - Pass error type into the functions
      crypto: caam - Kill the easy targets
      crypto: caam - Dissolve report_jump_idx()
      crypto: caam - Clean up report_ccb_status()
      crypto: caam - Clean up report_deco_status()
      crypto: caam - Kill SPRINTFCAT() with fire
      crypto: caam - Sweep the remnants
      crypto: caam - Fix the 'quoted string split across lines'
      crypto: geode - Kill AES_MIN_BLOCK_SIZE
      crypto: geode - Kill AES_IV_LENGTH
      crypto: geode - Consistently use AES_KEYSIZE_128
      crypto: geode - Weed out printk() from probe()
      crypto: geode - Don't use tfm->__crt_alg->cra_name directly
      crypto: ccp - tfm->__crt_alg->cra_name directly
      crypto: cesa - tfm->__crt_alg->cra_name directly
      crypto: dcp - tfm->__crt_alg->cra_name directly
      crypto: n2 - tfm->__crt_alg->cra_name directly
      crypto: padlock - tfm->__crt_alg->cra_name directly
      crypto: sahara - tfm->__crt_alg->cra_name directly
      crypto: cesa - tfm->__crt_alg->cra_type directly

Matthias-Christian Ott (1):
      crypto: user - Allow CRYPTO_MSG_GETALG without CAP_NET_ADMIN

Monam Agarwal (1):
      crypto: nx - Use RCU_INIT_POINTER(x, NULL)

Naveen Krishna Chatradhi (7):
      crypto: s5p-sss - Use platform_get_irq() instead of _byname()
      crypto: s5p-sss - Add device tree support
      crypto: s5p-sss - Add support for SSS module on Exynos
      crypto: s5p-sss - Let Exynos SoCs select SSS driver
      crypto: s5p-sss - validate iv before memcpy
      crypto: s5p-sss - Use clk_prepare/clk_unprepare
      crypto: s5p-sss - Look for the next request in the queue

Nishanth Menon (1):
      crypto: omap-des - handle error of pm_runtime_get_sync

Nitesh Lal (1):
      crypto: testmgr - add aead cbc des, des3_ede tests

Paul Bolle (1):
      hwrng: picoxcell - remove unbuildable picoxcell TRNG

Sonic Zhang (3):
      crypto: bfin_crc - access crc registers by readl and writel functions
      crypto: bfin_crc - ignore duplicated registration of the same algorithm
      cryptoo: bfin_crc - avoid get physical address of coherence memory by dma_map_single

Tadeusz Struk (1):
      crypto: testmgr - Fix DMA-API warning

Vakul Garg (1):
      crypto: caam - reinitialize keys_fit_inline for decrypt and givencrypt

 .../devicetree/bindings/crypto/samsung-sss.txt     |   34 +
 arch/x86/crypto/ghash-clmulni-intel_asm.S          |    4 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |   12 +-
 crypto/ahash.c                                     |   41 +-
 crypto/crypto_user.c                               |   12 +-
 crypto/tcrypt.c                                    |   52 +-
 crypto/testmgr.c                                   |  181 ++-
 crypto/testmgr.h                                   | 1441 +++++++++++++++++++-
 drivers/char/hw_random/Kconfig                     |  103 +-
 drivers/char/hw_random/Makefile                    |    1 -
 drivers/char/hw_random/n2-drv.c                    |   24 +-
 drivers/char/hw_random/omap-rng.c                  |    4 +-
 drivers/char/hw_random/picoxcell-rng.c             |  181 ---
 drivers/char/hw_random/timeriomem-rng.c            |    4 +-
 drivers/crypto/Kconfig                             |    6 +-
 drivers/crypto/atmel-aes.c                         |    8 +-
 drivers/crypto/bfin_crc.c                          |  103 +-
 .../include/asm => drivers/crypto}/bfin_crc.h      |    0
 drivers/crypto/caam/caamalg.c                      |   31 +-
 drivers/crypto/caam/caamhash.c                     |   32 +-
 drivers/crypto/caam/caamrng.c                      |    7 +-
 drivers/crypto/caam/error.c                        |  389 +++---
 drivers/crypto/caam/error.h                        |    2 +-
 drivers/crypto/caam/key_gen.c                      |    7 +-
 drivers/crypto/ccp/ccp-crypto-aes-xts.c            |    4 +-
 drivers/crypto/ccp/ccp-pci.c                       |    7 +-
 drivers/crypto/geode-aes.c                         |   28 +-
 drivers/crypto/geode-aes.h                         |    6 +-
 drivers/crypto/mv_cesa.c                           |    6 +-
 drivers/crypto/mxs-dcp.c                           |   52 +-
 drivers/crypto/n2_core.c                           |    4 +-
 drivers/crypto/nx/nx-842.c                         |    4 +-
 drivers/crypto/omap-des.c                          |   33 +-
 drivers/crypto/padlock-sha.c                       |    2 +-
 drivers/crypto/s5p-sss.c                           |  148 +-
 drivers/crypto/sahara.c                            |    2 +-
 include/crypto/internal/hash.h                     |   13 +
 37 files changed, 2245 insertions(+), 743 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.16
  2014-06-05  6:23                                           ` Crypto Update for 3.16 Herbert Xu
@ 2014-06-08  2:56                                             ` Linus Torvalds
  2014-06-08  4:55                                               ` Herbert Xu
  2014-06-09  1:47                                               ` Steven Miao
  2014-08-04 13:03                                             ` Crypto Update for 3.17 Herbert Xu
  1 sibling, 2 replies; 246+ messages in thread
From: Linus Torvalds @ 2014-06-08  2:56 UTC (permalink / raw)
  To: Herbert Xu, Sonic Zhang, Steven Miao
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Jun 4, 2014 at 11:23 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 3.16:

There's something odd going on with bfin_crc.h.

You moved it in commit 52e6e543f2d8 ("crypto: bfin_crc - access crc
registers by readl and writel functions").

It got *deleted* by commit 3356c99ea392 ("bfin_crc: Move architecture
independant crc header file out of the blackfin folder") which claims
to just move things.

Both of those commits are by Sonic Zhang, just came to me through two
different trees (though your crypto tree, and through Steven Miao's
bfin tree).

I'm assuming that the delete was actually incorrect, and should have
been a move, because it looks like the bfin_crc.c file won't compile
without it. So I've re-instated that file.

But the state of the bfin tree seems to be crap. Somebody should take
a look at what happened here. My suspicion is that commit 3356c99ea392
was broken by Steven Miao trying to only touch files in arch/blackfin
or something.

               Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.16
  2014-06-08  2:56                                             ` Linus Torvalds
@ 2014-06-08  4:55                                               ` Herbert Xu
  2014-06-09  1:47                                               ` Steven Miao
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-06-08  4:55 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Sonic Zhang, Steven Miao, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Sat, Jun 07, 2014 at 07:56:53PM -0700, Linus Torvalds wrote:
> 
> I'm assuming that the delete was actually incorrect, and should have
> been a move, because it looks like the bfin_crc.c file won't compile
> without it. So I've re-instated that file.

Yes that would be my assumption as well.

Sonic/Steven, could you please double-check the current tree to see
whether it's in the right state?

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.16
  2014-06-08  2:56                                             ` Linus Torvalds
  2014-06-08  4:55                                               ` Herbert Xu
@ 2014-06-09  1:47                                               ` Steven Miao
  1 sibling, 0 replies; 246+ messages in thread
From: Steven Miao @ 2014-06-09  1:47 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, Sonic Zhang, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

Hi Linus,

On Sun, Jun 8, 2014 at 10:56 AM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> On Wed, Jun 4, 2014 at 11:23 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>>
>> Here is the crypto update for 3.16:
>
> There's something odd going on with bfin_crc.h.
>
> You moved it in commit 52e6e543f2d8 ("crypto: bfin_crc - access crc
> registers by readl and writel functions").
>
> It got *deleted* by commit 3356c99ea392 ("bfin_crc: Move architecture
> independant crc header file out of the blackfin folder") which claims
> to just move things.
>
> Both of those commits are by Sonic Zhang, just came to me through two
> different trees (though your crypto tree, and through Steven Miao's
> bfin tree).
>
> I'm assuming that the delete was actually incorrect, and should have
> been a move, because it looks like the bfin_crc.c file won't compile
> without it. So I've re-instated that file.
>
> But the state of the bfin tree seems to be crap. Somebody should take
> a look at what happened here. My suspicion is that commit 3356c99ea392
> was broken by Steven Miao trying to only touch files in arch/blackfin
> or something.
Yes. I should be a move from arch/blackfin to drivers/crypto, sorry
for I only formating the arch/blackfin changes.
>
>                Linus


-steven

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.16
  2014-02-03 12:59                                                   ` Crypto Fixes for 3.14 Herbert Xu
  2014-04-13 23:34                                                     ` Crypto Fixes for 3.15 Herbert Xu
@ 2014-07-10  9:03                                                     ` Herbert Xu
  2014-07-18 10:57                                                       ` Herbert Xu
  2014-09-15 11:35                                                       ` Crypto Fixes for 3.17 Herbert Xu
  2014-12-31  3:32                                                     ` Crypto Fixes for 3.19 Herbert Xu
  2 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2014-07-10  9:03 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes an error in sha512_ssse3 that leads to incorrect
output as well as a memory leak in caam_jr when the module is
unloaded.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Cristian Stoica (1):
      crypto: caam - fix memleak in caam_jr module

Jussi Kivilinna (1):
      crypto: sha512_ssse3 - fix byte count to bit count conversion

 arch/x86/crypto/sha512_ssse3_glue.c |    2 +-
 drivers/crypto/caam/jr.c            |    8 +++-----
 2 files changed, 4 insertions(+), 6 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.16
  2014-07-10  9:03                                                     ` Crypto Fixes for 3.16 Herbert Xu
@ 2014-07-18 10:57                                                       ` Herbert Xu
  2014-07-28 14:05                                                         ` Herbert Xu
  2014-09-15 11:35                                                       ` Crypto Fixes for 3.17 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-07-18 10:57 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a boot hang in virt guests when the virtio RNG
is enabled.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Amit Shah (2):
      hwrng: fetch randomness only after device init
      hwrng: virtio - ensure reads happen after successful probe

 drivers/char/hw_random/core.c       |   47 +++++++++++++++++++++++++++++------
 drivers/char/hw_random/virtio-rng.c |   10 ++++++++
 2 files changed, 49 insertions(+), 8 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.16
  2014-07-18 10:57                                                       ` Herbert Xu
@ 2014-07-28 14:05                                                         ` Herbert Xu
  2014-07-31 13:59                                                           ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-07-28 14:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression on ARM where odd-sized blocks supplied
to AES may cause crashes.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Mikulas Patocka (2):
      crypto: arm64-aes - fix encryption of unaligned data
      crypto: arm-aes - fix encryption of unaligned data

 arch/arm/crypto/aesbs-glue.c |   10 +++++-----
 arch/arm64/crypto/aes-glue.c |   12 ++++++------
 2 files changed, 11 insertions(+), 11 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.16
  2014-07-28 14:05                                                         ` Herbert Xu
@ 2014-07-31 13:59                                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-07-31 13:59 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push adds missing SELinux labeling to AF_ALG sockets which
apparently causes SELinux (or at least the SELinux people) to
misbehave :)

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Milan Broz (1):
      crypto: af_alg - properly label AF_ALG socket

 crypto/af_alg.c |    2 ++
 1 file changed, 2 insertions(+)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.17
  2014-06-05  6:23                                           ` Crypto Update for 3.16 Herbert Xu
  2014-06-08  2:56                                             ` Linus Torvalds
@ 2014-08-04 13:03                                             ` Herbert Xu
  2014-10-07 13:18                                               ` Crypto Update for 3.18 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-08-04 13:03 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.17:

* Added CTR(AES) optimisation on x86_64 using "by8" AVX.
* Added arm64 support to ccp.
* Added Intel QAT crypto driver.
* Added Qualcomm crypto engine driver.
* Added x86-64 assembly optimisation for 3DES.
* Added CTR(3DES) speed test.
* Moved FIPS panic from module.c so that it only triggers on crypto modules.
* Added SP800-90A Deterministic Random Bit Generator (drbg).
* Added more test vectors for ghash.
* Tweaked self tests to catch partial block bugs.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

 
Ard Biesheuvel (2):
      crypto: testmgr - add 4 more test vectors for GHASH
      crypto: testmgr - use chunks smaller than algo block size in chunk tests

Arnd Bergmann (1):
      crypto: ux500 - make interrupt mode plausible

Chen Gang (1):
      crypto: qce - Let 'DEV_QCE' depend on both HAS_DMA and HAS_IOMEM

Dan Carpenter (2):
      crypto: caam - remove duplicate FIFOST_CONT_MASK define
      crypto: qat - remove an unneeded cast

Eric Dumazet (2):
      crypto: lzo - try kmalloc() before vmalloc()
      crypto: lzo - use kvfree() helper

Fengguang Wu (1):
      crypto: drbg - drbg_exit() can be static

George Spelvin (1):
      crypto: crc32c-pclmul - Shrink K_table to 32-bit words

Herbert Xu (2):
      crypto: qat - Fix build problem with O=
      crypto: drbg - Use Kconfig to ensure at least one RNG option is set

Himangi Saraogi (1):
      crypto: caam - Introduce the use of the managed version of kzalloc

Horia Geanta (12):
      crypto: testmgr - avoid DMA mapping from text, rodata, stack
      crypto: caam - set coherent_dma_mask
      crypto: caam - fix typo in dma_mapping_error
      crypto: caam - fix "failed to check map error" DMA warnings
      crypto: caam - fix DMA unmapping error in hash_digest_key
      crypto: caam - fix DMA direction mismatch in ahash_done_ctx_dst
      crypto: caam - fix DMA direction mismatch in ahash_done_ctx_src
      crypto: caam - fix uninitialized S/G table size in ahash_digest
      crypto: caam - fix uninitialized edesc->dst_dma field
      crypto: caam - fix uninitialized state->buf_dma field
      crypto: caam - set DK (Decrypt Key) bit only for AES accelerator
      crypto: caam - fix DECO RSR polling

Jarod Wilson (2):
      crypto: fips - only panic on bad/missing crypto mod signatures
      crypto: testmgr - add missing spaces to drbg error strings

Jean Delvare (1):
      crypto: drivers - Add 2 missing __exit_p

Jussi Kivilinna (3):
      crypto: tcrypt - add ctr(des3_ede) sync speed test
      crypto: des_3des - add x86-64 assembly implementation
      crypto: des3_ede-x86_64 - fix parse warning

Luca Clementi (1):
      crypto: tcrypt - print cra driver name in tcrypt tests output

Marek Vasut (2):
      crypto: api - Move crypto_yield() to algapi.h
      crypto: skcipher - Don't use __crypto_dequeue_request()

Mark Rustad (1):
      crypto: Resolve shadow warnings

Nitesh Narayan Lal (2):
      crypto: dts - Addition of missing SEC compatibile property in c29x device tree
      crypto: caam - Enabling multiple caam debug support for C29x platform

Pramod Gurav (2):
      crypto: atmel-sha - Switch to managed version of kzalloc
      crypto: atmel-tdes - Switch to managed version of kzalloc

Ruchika Gupta (5):
      crypto: caam - Correct definition of registers in memory map
      crypto: caam - Configuration for platforms with virtualization enabled in CAAM
      crypto: caam - Add definition of rd/wr_reg64 for little endian platform
      crypto: caam - Correct the dma mapping for sg table
      crypto: caam - Check for CAAM block presence before registering with crypto layer

Stanimir Varbanov (5):
      crypto: qce - Qualcomm crypto engine driver
      crypto: qce - Build Qualcomm crypto driver
      ARM: DT: qcom: Add Qualcomm crypto driver binding document
      crypto: qce - fix sparse warnings
      crypto: qce - add dependancy to Kconfig

Stephan Mueller (16):
      crypto: drbg - SP800-90A Deterministic Random Bit Generator
      crypto: drbg - header file for DRBG
      crypto: drbg - DRBG kernel configuration options
      crypto: drbg - compile the DRBG code
      crypto: drbg - DRBG testmgr test vectors
      crypto: drbg - Add DRBG test code to testmgr
      crypto: drbg - simplify ordering of linked list in drbg_ctr_df
      crypto: drbg - fix memory corruption for AES192
      crypto: drbg - use of kernel linked list
      crypto: drbg - cleanup of preprocessor macros
      crypto: drbg - Fix format string for debugging statements
      crypto: drbg - Call CTR DRBG DF function only once
      crypto: drbg - Select correct DRBG core for stdrng
      crypto: drbg - Mix a time stamp into DRBG state
      crypto: drbg - HMAC-SHA1 DRBG has crypto strength of 128 bits
      crypto: drbg - fix failure of generating multiple of 2**16 bytes

Tadeusz Struk (22):
      crypto: qat - Intel(R) QAT driver framework
      crypto: qat - Intel(R) QAT transport code
      crypto: qat - Intel(R) QAT FW interface
      crypto: qat - Intel(R) QAT crypto interface
      crypto: qat - Intel(R) QAT ucode part of fw loader
      crypto: qat - Intel(R) QAT accelengine part of fw loader
      crypto: qat - Intel(R) QAT DH895xcc accelerator
      crypto: qat - Update to makefiles
      crypto: qat - Fix random config build warnings
      crypto: qat - Updated Firmware Info Metadata
      crypto: qat - Fixed new checkpatch warnings
      crypto: qat - Fix error path crash when no firmware is present
      crypto: qat - remove unnecessary return codes
      crypto: qat - checkpatch blank lines
      crypto: qat - remove unneeded header
      crypto: qat - remove unnecessary parentheses
      crypto: qat - use min_t macro
      crypto: qat - change slice->regions to slice->region
      crypto: qat - change ae_num to ae_id
      crypto: qat - Updated print outputs
      crypto: qat - Use hweight for bit counting
      crypto: qat - Fixed SKU1 dev issue

Tom Lendacky (6):
      crypto: ccp - Modify PCI support in prep for arm64 support
      crypto: ccp - CCP device bindings documentation
      crypto: ccp - Add platform device support for arm64
      crypto: ccp - Base AXI DMA cache settings on device tree
      crypto: ccp - Remove "select OF" from Kconfig
      crypto: ccp - Do not sign extend input data to CCP

chandramouli narayanan (1):
      crypto: aes - AES CTR x86_64 "by8" AVX optimization

 .../devicetree/bindings/crypto/amd-ccp.txt         |   19 +
 .../devicetree/bindings/crypto/qcom-qce.txt        |   25 +
 Documentation/ioctl/ioctl-number.txt               |    1 +
 MAINTAINERS                                        |    6 +
 arch/powerpc/boot/dts/fsl/qoriq-sec6.0-0.dtsi      |    3 +-
 arch/x86/crypto/Makefile                           |    4 +-
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S            |  546 ++++++
 arch/x86/crypto/aesni-intel_glue.c                 |   40 +-
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |  281 ++-
 arch/x86/crypto/des3_ede-asm_64.S                  |  805 ++++++++
 arch/x86/crypto/des3_ede_glue.c                    |  509 +++++
 crypto/Kconfig                                     |   50 +-
 crypto/Makefile                                    |    1 +
 crypto/algapi.c                                    |   14 +
 crypto/cryptd.c                                    |   12 +-
 crypto/des_generic.c                               |   22 +-
 crypto/drbg.c                                      | 2044 ++++++++++++++++++++
 crypto/eseqiv.c                                    |    8 +-
 crypto/gcm.c                                       |   30 +-
 crypto/lzo.c                                       |    8 +-
 crypto/seqiv.c                                     |   16 +-
 crypto/tcrypt.c                                    |  114 +-
 crypto/testmgr.c                                   |  304 ++-
 crypto/testmgr.h                                   | 1158 +++++++++--
 drivers/crypto/Kconfig                             |   20 +-
 drivers/crypto/Makefile                            |    2 +
 drivers/crypto/amcc/crypto4xx_core.c               |    2 +-
 drivers/crypto/atmel-sha.c                         |    9 +-
 drivers/crypto/atmel-tdes.c                        |    8 +-
 drivers/crypto/caam/caamalg.c                      |   80 +-
 drivers/crypto/caam/caamhash.c                     |  186 +-
 drivers/crypto/caam/caamrng.c                      |   79 +-
 drivers/crypto/caam/ctrl.c                         |   76 +-
 drivers/crypto/caam/desc.h                         |    1 -
 drivers/crypto/caam/intern.h                       |    1 +
 drivers/crypto/caam/jr.c                           |    6 +-
 drivers/crypto/caam/regs.h                         |  105 +-
 drivers/crypto/ccp/Makefile                        |    5 +
 drivers/crypto/ccp/ccp-dev.c                       |   34 +
 drivers/crypto/ccp/ccp-dev.h                       |   14 +-
 drivers/crypto/ccp/ccp-ops.c                       |   26 +-
 drivers/crypto/ccp/ccp-pci.c                       |   39 +-
 drivers/crypto/ccp/ccp-platform.c                  |  230 +++
 drivers/crypto/nx/nx-842.c                         |    2 +-
 drivers/crypto/qat/Kconfig                         |   23 +
 drivers/crypto/qat/Makefile                        |    2 +
 drivers/crypto/qat/qat_common/Makefile             |   14 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |  205 ++
 drivers/crypto/qat/qat_common/adf_accel_engine.c   |  168 ++
 drivers/crypto/qat/qat_common/adf_aer.c            |  259 +++
 drivers/crypto/qat/qat_common/adf_cfg.c            |  361 ++++
 drivers/crypto/qat/qat_common/adf_cfg.h            |   87 +
 drivers/crypto/qat/qat_common/adf_cfg_common.h     |  100 +
 drivers/crypto/qat/qat_common/adf_cfg_strings.h    |   83 +
 drivers/crypto/qat/qat_common/adf_cfg_user.h       |   94 +
 drivers/crypto/qat/qat_common/adf_common_drv.h     |  192 ++
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |  490 +++++
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |  215 ++
 drivers/crypto/qat/qat_common/adf_init.c           |  388 ++++
 drivers/crypto/qat/qat_common/adf_transport.c      |  567 ++++++
 drivers/crypto/qat/qat_common/adf_transport.h      |   63 +
 .../qat/qat_common/adf_transport_access_macros.h   |  160 ++
 .../crypto/qat/qat_common/adf_transport_debug.c    |  304 +++
 .../crypto/qat/qat_common/adf_transport_internal.h |  118 ++
 drivers/crypto/qat/qat_common/icp_qat_fw.h         |  316 +++
 .../crypto/qat/qat_common/icp_qat_fw_init_admin.h  |  131 ++
 drivers/crypto/qat/qat_common/icp_qat_fw_la.h      |  404 ++++
 .../qat/qat_common/icp_qat_fw_loader_handle.h      |   78 +
 drivers/crypto/qat/qat_common/icp_qat_hal.h        |  125 ++
 drivers/crypto/qat/qat_common/icp_qat_hw.h         |  305 +++
 drivers/crypto/qat/qat_common/icp_qat_uclo.h       |  377 ++++
 drivers/crypto/qat/qat_common/qat_algs.c           | 1038 ++++++++++
 drivers/crypto/qat/qat_common/qat_crypto.c         |  284 +++
 drivers/crypto/qat/qat_common/qat_crypto.h         |   83 +
 drivers/crypto/qat/qat_common/qat_hal.c            | 1393 +++++++++++++
 drivers/crypto/qat/qat_common/qat_uclo.c           | 1181 +++++++++++
 drivers/crypto/qat/qat_dh895xcc/Makefile           |    8 +
 drivers/crypto/qat/qat_dh895xcc/adf_admin.c        |  144 ++
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |  214 ++
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |   86 +
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |  449 +++++
 drivers/crypto/qat/qat_dh895xcc/adf_drv.h          |   67 +
 drivers/crypto/qat/qat_dh895xcc/adf_hw_arbiter.c   |  159 ++
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c          |  266 +++
 drivers/crypto/qat/qat_dh895xcc/qat_admin.c        |  107 +
 drivers/crypto/qce/Makefile                        |    6 +
 drivers/crypto/qce/ablkcipher.c                    |  431 +++++
 drivers/crypto/qce/cipher.h                        |   68 +
 drivers/crypto/qce/common.c                        |  438 +++++
 drivers/crypto/qce/common.h                        |  102 +
 drivers/crypto/qce/core.c                          |  286 +++
 drivers/crypto/qce/core.h                          |   68 +
 drivers/crypto/qce/dma.c                           |  186 ++
 drivers/crypto/qce/dma.h                           |   58 +
 drivers/crypto/qce/regs-v5.h                       |  334 ++++
 drivers/crypto/qce/sha.c                           |  588 ++++++
 drivers/crypto/qce/sha.h                           |   81 +
 drivers/crypto/ux500/cryp/cryp_core.c              |   25 +-
 include/crypto/aead.h                              |    4 +-
 include/crypto/algapi.h                            |    6 +
 include/crypto/des.h                               |    3 +
 include/crypto/drbg.h                              |  290 +++
 include/crypto/hash.h                              |    4 +-
 include/crypto/internal/skcipher.h                 |    3 +-
 include/crypto/scatterwalk.h                       |    6 -
 include/crypto/skcipher.h                          |    4 +-
 include/linux/crypto.h                             |    8 +-
 kernel/module.c                                    |    4 -
 108 files changed, 20473 insertions(+), 583 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.17
  2014-07-10  9:03                                                     ` Crypto Fixes for 3.16 Herbert Xu
  2014-07-18 10:57                                                       ` Herbert Xu
@ 2014-09-15 11:35                                                       ` Herbert Xu
  2014-09-24 13:27                                                         ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-09-15 11:35 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the newly added drbg generator so that it actually
works on 32-bit machines.  Previously the code was only tested on
64-bit and on 32-bit it overflowed and simply doesn't work.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: drbg - backport "fix maximum value checks on 32 bit systems"

Stephan Mueller (1):
      crypto: drbg - remove check for uninitialized DRBG handle

 crypto/drbg.c         |    3 ---
 include/crypto/drbg.h |   13 +++++++++++++
 2 files changed, 13 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.17
  2014-09-15 11:35                                                       ` Crypto Fixes for 3.17 Herbert Xu
@ 2014-09-24 13:27                                                         ` Herbert Xu
  2014-11-10  8:57                                                           ` Crypto Fixes for 3.18 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-09-24 13:27 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes three issues:

* If ccp is loaded on a machine without ccp, it will incorrectly
activate causing all requests to fail.  Fixed by preventing ccp
from loading if hardware isn't available.

* Not all IRQs were enabled for the qat driver, leading to potential
stalls when it is used.

* Disabled buggy AVX CTR implementation in aesni.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Mathias Krause (1):
      crypto: aesni - disable "by8" AVX CTR optimization

Tadeusz Struk (1):
      crypto: qat - Enable all 32 IRQs

Tom Lendacky (1):
      crypto: ccp - Check for CCP before registering crypto algs

 arch/x86/crypto/aesni-intel_glue.c                     |    4 ++--
 drivers/crypto/ccp/ccp-crypto-main.c                   |    4 ++++
 drivers/crypto/ccp/ccp-dev.c                           |   14 ++++++++++++++
 drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |    2 +-
 include/linux/ccp.h                                    |   12 ++++++++++++
 5 files changed, 33 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.18
  2014-08-04 13:03                                             ` Crypto Update for 3.17 Herbert Xu
@ 2014-10-07 13:18                                               ` Herbert Xu
  2014-12-11 12:51                                                 ` Crypto Update for 3.19 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-10-07 13:18 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List
  Cc: Peter Zijlstra

Hi Linus:

Here is the crypto update for 3.18:

* Add multibuffer infrastructure:
 . Add single_task_running scheduler helper, OKed by Peter on lkml.
* Add SHA1 multibuffer implementation for AVX2.
* Reenable "by8" AVX CTR optimisation after fixing counter overflow.
* Add APM X-Gene SoC RNG support.
* SHA256/SHA512 now handles unaligned input correctly.
* Set lz4 decompressed length correctly.
* Fix algif socket buffer allocation failure for 64K page machines.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alex Porosanu (3):
      crypto: caam - disable RNG oscillator maximum frequency check
      crypto: caam - change starting entropy delay value
      crypto: caam - enable raw data instead of von Neumann data

Alexander Gordeev (1):
      crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()

Cristian Stoica (7):
      crypto: testmgr - white space fix-ups on test_aead
      crypto: testmgr - white space removal on __test_hash
      crypto: testmgr - white space removal on __test_skcipher
      crypto: testmgr - delay execution of set-up code
      crypto: testmgr - remove unused function argument
      crypto: caam - remove duplicated sg copy functions
      crypto: caam - fix addressing of struct member

David S. Miller (1):
      crypto: sha - Handle unaligned input data in generic sha256 and sha512.

Feng Kan (3):
      hwrng: xgene - add support for APM X-Gene SoC RNG support
      Documentation: rng: Add X-Gene SoC RNG driver documentation
      arm64: dts: add random number generator dts node to APM X-Gene platform.

Fengguang Wu (2):
      crypto: mcryptd - mcryptd_flist can be static
      crypto: sha-mb - sha1_mb_alg_state can be static

Herbert Xu (2):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

KOVACS Krisztian (2):
      crypto: lz4,lz4hc - fix decompression
      crypto: testmgr - add test for lz4 and lz4hc

Mathias Krause (3):
      crypto: aesni - fix counter overflow handling in "by8" variant
      crypto: aesni - remove unused defines in "by8" variant
      Revert "crypto: aesni - disable "by8" AVX CTR optimization"

Nitesh Narayan Lal (1):
      crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.

Ondrej Kozina (1):
      crypto: algif - avoid excessive use of socket buffer in skcipher

Rasmus Villemoes (1):
      crypto: mv_cesa - Add missing #define

Stephan Mueller (10):
      crypto: drbg - replace int2byte with cpu_to_be
      crypto: drbg - kzfree does not need a check for NULL pointer
      crypto: drbg - remove superflowous checks
      crypto: drbg - remove superflowous memset(0)
      crypto: drbg - use kmalloc instead of kzalloc for V and C
      crypto: drbg - remove unnecessary sanity checks
      crypto: drbg - remove configuration of fixed values
      crypto: drbg - remove unnecessary sanity check for shadow state
      crypto: drbg - fix sparse warning for cpu_to_be[32|64]
      crypto: drbg - fix maximum value checks on 32 bit systems

Sudip Mukherjee (1):
      hwrng: printk replacement

Tadeusz Struk (2):
      crypto: qat - Fix typo in name of tasklet_struct
      crypto: qat - Removed unneeded partial state

Ted Percival (1):
      crypto: mcryptd - Fix typos in CRYPTO_MCRYPTD description

Tim Chen (7):
      crypto: hash - initialize entry len for null input in crypto hash sg list walk
      sched: Add function single_task_running to let a task check if it is the only task running on a cpu
      crypto: sha-mb - multibuffer crypto infrastructure
      crypto: sha-mb - SHA1 multibuffer algorithm data structures
      crypto: sha-mb - SHA1 multibuffer submit and flush routines for AVX2
      crypto: sha-mb - SHA1 multibuffer crypto computation (x8 AVX2)
      crypto: sha-mb - SHA1 multibuffer job manager and glue code

Wei Yongjun (1):
      crypto: qat - Fix return value check in adf_chr_drv_create()

 Documentation/devicetree/bindings/rng/apm,rng.txt  |   17 +
 arch/arm64/boot/dts/apm-storm.dtsi                 |   21 +
 arch/x86/crypto/Makefile                           |    1 +
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S            |   20 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    4 +-
 arch/x86/crypto/sha-mb/Makefile                    |   11 +
 arch/x86/crypto/sha-mb/sha1_mb.c                   |  935 +++++++++++++++++++
 arch/x86/crypto/sha-mb/sha1_mb_mgr_datastruct.S    |  287 ++++++
 arch/x86/crypto/sha-mb/sha1_mb_mgr_flush_avx2.S    |  327 +++++++
 arch/x86/crypto/sha-mb/sha1_mb_mgr_init_avx2.c     |   64 ++
 arch/x86/crypto/sha-mb/sha1_mb_mgr_submit_avx2.S   |  228 +++++
 arch/x86/crypto/sha-mb/sha1_x8_avx2.S              |  472 ++++++++++
 arch/x86/crypto/sha-mb/sha_mb_ctx.h                |  136 +++
 arch/x86/crypto/sha-mb/sha_mb_mgr.h                |  110 +++
 crypto/Kconfig                                     |   30 +
 crypto/Makefile                                    |    1 +
 crypto/ahash.c                                     |   12 +-
 crypto/algif_skcipher.c                            |    2 +-
 crypto/drbg.c                                      |  130 +--
 crypto/lz4.c                                       |    2 +-
 crypto/lz4hc.c                                     |    2 +-
 crypto/mcryptd.c                                   |  705 ++++++++++++++
 crypto/sha256_generic.c                            |    3 +-
 crypto/sha512_generic.c                            |    3 +-
 crypto/testmgr.c                                   |  966 ++++++++++----------
 crypto/testmgr.h                                   |   66 ++
 drivers/char/hw_random/Kconfig                     |   13 +
 drivers/char/hw_random/Makefile                    |    1 +
 drivers/char/hw_random/amd-rng.c                   |    4 +-
 drivers/char/hw_random/geode-rng.c                 |    4 +-
 drivers/char/hw_random/intel-rng.c                 |   13 +-
 drivers/char/hw_random/pasemi-rng.c                |    2 +-
 drivers/char/hw_random/pseries-rng.c               |    2 +-
 drivers/char/hw_random/via-rng.c                   |    8 +-
 drivers/char/hw_random/xgene-rng.c                 |  423 +++++++++
 drivers/crypto/caam/caamhash.c                     |   28 +-
 drivers/crypto/caam/ctrl.c                         |  138 ++-
 drivers/crypto/caam/intern.h                       |    9 +-
 drivers/crypto/caam/regs.h                         |   51 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   54 --
 drivers/crypto/mv_cesa.h                           |    1 +
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    2 +-
 .../crypto/qat/qat_common/adf_transport_internal.h |    2 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |   66 +-
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c          |   14 +-
 include/crypto/drbg.h                              |   19 +-
 include/crypto/internal/hash.h                     |    9 +
 include/crypto/mcryptd.h                           |  112 +++
 include/linux/sched.h                              |    1 +
 kernel/sched/core.c                                |   12 +
 50 files changed, 4706 insertions(+), 837 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.18
  2014-09-24 13:27                                                         ` Herbert Xu
@ 2014-11-10  8:57                                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-11-10  8:57 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes these issues:

* Stack corruption in pseries hwrng driver.
* Missing DMA unmap in caam crypto driver.
* NUMA crash in qat crypto driver.
* Buggy mapping of zero-length associated data in qat crypto driver.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Cristian Stoica (1):
      crypto: caam - fix missing dma unmap on error path

Greg Kurz (1):
      hwrng: pseries - port to new read API and fix stack corruption

Tadeusz Struk (2):
      crypto: qat - Prevent dma mapping zero length assoc data
      crypto: qat - Enforce valid numa configuration

 drivers/char/hw_random/pseries-rng.c              |   11 ++++---
 drivers/crypto/caam/key_gen.c                     |   29 +++++++++----------
 drivers/crypto/qat/qat_common/adf_accel_devices.h |    3 +-
 drivers/crypto/qat/qat_common/adf_transport.c     |   12 ++++----
 drivers/crypto/qat/qat_common/qat_algs.c          |    7 +++--
 drivers/crypto/qat/qat_common/qat_crypto.c        |    8 ++++--
 drivers/crypto/qat/qat_dh895xcc/adf_admin.c       |    2 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c         |   32 ++++++++-------------
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c         |    2 +-
 9 files changed, 53 insertions(+), 53 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.19
  2014-10-07 13:18                                               ` Crypto Update for 3.18 Herbert Xu
@ 2014-12-11 12:51                                                 ` Herbert Xu
  2014-12-12 11:54                                                   ` Herbert Xu
  2015-02-14  9:43                                                   ` Crypto Update for 3.20 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2014-12-11 12:51 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List
  Cc: Peter Zijlstra

Hi Linus:

Here is the crypto update for 3.19:

* The crypto API is now documented :)
* Disallow arbitrary module loading through crypto API.
* Allow get request with empty driver name through crypto_user.
* Allow speed testing of arbitrary hash functions.
* Add caam support for ctr(aes), gcm(aes) and their derivatives.
* nx now supports concurrent hashing properly.
* Add sahara support for SHA1/256.
* Add ARM64 version of CRC32.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

 
Boris Brezillon (4):
      hwrng: atmel - use clk_prepapre_enable/_disable_unprepare
      hwrng: atmel - add DT support
      hwrng: atmel - Add TRNG DT binding doc
      ARM: at91/dt: add trng node to at91sam9g45

Bruce Allan (4):
      crypto: qat - fix bad unlock balance
      crypto: qat - cleanup coccicheck warning - NULL check before freeing functions
      crypto: qat - cleanup unnecessary break checkpatch warning
      crypto: qat - misspelling typo - "reseting" should be "resetting"

Catalin Vasile (5):
      crypto: caam - add support for ctr(aes)
      crypto: caam - add support for rfc3686(ctr(aes))
      crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
      crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
      crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)

Cristian Stoica (1):
      crypto: caam - fix error reporting

Dan Carpenter (1):
      crypto: sha-mb - remove a bogus NULL check

Daniel Borkmann (1):
      crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()

Herbert Xu (4):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
      crypto: user - Allow get request with empty driver name
      crypto: algif_skcipher - Fixed blocking recvmsg
      crypto: tcrypt - Allow speed testing of arbitrary hash functions

Johannes Berg (1):
      crypto: bfin_crc - don't include linux/unaligned/access_ok.h

Julia Lawall (4):
      crypto: sparc - replace memset by memzero_explicit
      crypto: sha - replace memset by memzero_explicit
      crypto: powerpc - replace memset by memzero_explicit
      crypto: arm - replace memset by memzero_explicit

Kees Cook (2):
      crypto: prefix module autoloading with "crypto-"
      crypto: include crypto- module prefix in template

Leonidas S. Barbosa (8):
      crypto: nx - Moving NX-AES-CBC to be processed logic
      crypto: nx - Moving NX-AES-CCM to be processed logic and sg_list bounds
      crypto: nx - Moving limit and bound logic in CTR and fix IV vector
      crypto: nx - Moving NX-AES-ECB to be processed logic
      crypto: nx - Moving NX-AES-GCM to be processed logic
      crypto: nx - Moving NX-AES-XCBC to be processed logic
      crypto: nx - Fix SHA concurrence issue and sg limit bounds
      crypto: nx - Fixing the limit number of bytes to be processed

Masanari Iida (1):
      crypto: testmgr - Remove unnecessary KERN_INFO from testmgr.c

Nickolaus Woodruff (1):
      crypto: drbg - use memzero_explicit() for clearing sensitive data

Pranith Kumar (1):
      crypto: caam - Remove unnecessary smp_read_barrier_depends()

Rickard Strandqvist (1):
      hwrng: core - Changed from using strncat to strlcat

Steffen Trumtrar (4):
      crypto: sahara - fix spinlock initialization
      crypto: sahara - add support for i.MX53
      crypto: sahara - replace tasklets with kthread
      crypto: sahara - add support for SHA1/256

Stephan Mueller (22):
      crypto: drbg - use crypto_inc
      crypto: drbg - add MODULE_ALIAS for all DRBG types
      crypto: algif - zeroize message digest buffer
      crypto: algif - zeroize IV buffer
      crypto: doc - crypto API high level spec
      crypto: doc - compile crypto API spec
      crypto: doc - userspace interface spec
      crypto: doc - RNG API documentation
      crypto: doc - hash data structures
      crypto: doc - AHASH API documentation
      crypto: doc - SHASH API documentation
      crypto: doc - cipher data structures
      crypto: doc - ABLKCIPHER API documentation
      crypto: doc - AEAD API documentation
      crypto: doc - BLKCIPHER API documentation
      crypto: doc - CIPHER API documentation
      crypto: doc - HASH API documentation
      crypto: doc - document uncovered member variables
      crypto: user - add MODULE_ALIAS
      crypto: drbg - use MODULE_ALIAS_CRYPTO
      crypto: algif_skcipher - initialize upon init request
      crypto: af_alg - add user space interface for AEAD

Struk, Tadeusz (3):
      crypto: qat - Use memzero_explicit
      crytpo: qat - Fix 64 bytes requests
      crypto: algif_skcipher - removed unneeded code

Tadeusz Struk (2):
      crypto: qat - Move BAR definitions to device specific module
      crypto: qat - fix problem with coalescing enable logic

Tudor Ambarus (4):
      crypto: caam - add support for gcm(aes)
      crypto: caam - add support for rfc4106(gcm(aes))
      crypto: caam - fix output sequence contiguity check
      crypto: caam - add support for rfc4543(gcm(aes))

Ulf Hansson (2):
      crypto: ux500/cryp - Silence compiler warning for !CONFIG_PM
      crypto: ux500/hash - Silence compiler warning for !CONFIG_PM

Valentin Rothberg (1):
      crypto: aesni - remove unnecessary #define

Yazen Ghannam (1):
      crypto: crc32 - Add ARM64 CRC32 hw accelerated module

 Documentation/DocBook/Makefile                     |    2 +-
 Documentation/DocBook/crypto-API.tmpl              | 1253 ++++++++++
 Documentation/crypto/crypto-API-userspace.txt      |  205 ++
 .../devicetree/bindings/crypto/fsl-imx-sahara.txt  |    2 +-
 .../devicetree/bindings/hwrng/atmel-trng.txt       |   16 +
 arch/arm/boot/dts/at91sam9g45.dtsi                 |    7 +
 arch/arm/crypto/aes_glue.c                         |    4 +-
 arch/arm/crypto/sha1_glue.c                        |    2 +-
 arch/arm/crypto/sha1_neon_glue.c                   |    2 +-
 arch/arm/crypto/sha512_neon_glue.c                 |    6 +-
 arch/arm64/crypto/Kconfig                          |    4 +
 arch/arm64/crypto/Makefile                         |    4 +
 arch/arm64/crypto/aes-ce-ccm-glue.c                |    2 +-
 arch/arm64/crypto/aes-glue.c                       |    8 +-
 arch/arm64/crypto/crc32-arm64.c                    |  274 +++
 arch/powerpc/crypto/sha1.c                         |    4 +-
 arch/s390/crypto/aes_s390.c                        |    2 +-
 arch/s390/crypto/des_s390.c                        |    4 +-
 arch/s390/crypto/ghash_s390.c                      |    2 +-
 arch/s390/crypto/sha1_s390.c                       |    2 +-
 arch/s390/crypto/sha256_s390.c                     |    4 +-
 arch/s390/crypto/sha512_s390.c                     |    4 +-
 arch/sparc/crypto/aes_glue.c                       |    2 +-
 arch/sparc/crypto/camellia_glue.c                  |    2 +-
 arch/sparc/crypto/crc32c_glue.c                    |    2 +-
 arch/sparc/crypto/des_glue.c                       |    2 +-
 arch/sparc/crypto/md5_glue.c                       |    2 +-
 arch/sparc/crypto/sha1_glue.c                      |    2 +-
 arch/sparc/crypto/sha256_glue.c                    |    6 +-
 arch/sparc/crypto/sha512_glue.c                    |    6 +-
 arch/x86/crypto/aes_glue.c                         |    4 +-
 arch/x86/crypto/aesni-intel_glue.c                 |   10 +-
 arch/x86/crypto/blowfish_glue.c                    |    4 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    4 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    4 +-
 arch/x86/crypto/camellia_glue.c                    |    4 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/crc32-pclmul_glue.c                |    4 +-
 arch/x86/crypto/crc32c-intel_glue.c                |    4 +-
 arch/x86/crypto/crct10dif-pclmul_glue.c            |    4 +-
 arch/x86/crypto/des3_ede_glue.c                    |    8 +-
 arch/x86/crypto/fpu.c                              |    3 +
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |    2 +-
 arch/x86/crypto/salsa20_glue.c                     |    4 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    4 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha-mb/sha1_mb.c                   |    3 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    6 +-
 arch/x86/crypto/sha512_ssse3_glue.c                |    6 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/crypto/twofish_glue.c                     |    4 +-
 arch/x86/crypto/twofish_glue_3way.c                |    4 +-
 crypto/842.c                                       |    1 +
 crypto/aes_generic.c                               |    2 +-
 crypto/af_alg.c                                    |    6 +
 crypto/algapi.c                                    |    4 +-
 crypto/algif_hash.c                                |    4 +-
 crypto/algif_skcipher.c                            |   15 +-
 crypto/ansi_cprng.c                                |    2 +-
 crypto/anubis.c                                    |    1 +
 crypto/api.c                                       |    4 +-
 crypto/arc4.c                                      |    1 +
 crypto/authenc.c                                   |    1 +
 crypto/authencesn.c                                |    1 +
 crypto/blowfish_generic.c                          |    2 +-
 crypto/camellia_generic.c                          |    2 +-
 crypto/cast5_generic.c                             |    2 +-
 crypto/cast6_generic.c                             |    2 +-
 crypto/cbc.c                                       |    1 +
 crypto/ccm.c                                       |    5 +-
 crypto/chainiv.c                                   |    1 +
 crypto/cmac.c                                      |    1 +
 crypto/crc32.c                                     |    1 +
 crypto/crc32c_generic.c                            |    2 +-
 crypto/crct10dif_generic.c                         |    2 +-
 crypto/cryptd.c                                    |    1 +
 crypto/crypto_null.c                               |    6 +-
 crypto/crypto_user.c                               |    6 +-
 crypto/ctr.c                                       |    3 +-
 crypto/cts.c                                       |    1 +
 crypto/deflate.c                                   |    2 +-
 crypto/des_generic.c                               |    2 +-
 crypto/drbg.c                                      |  127 +-
 crypto/ecb.c                                       |    1 +
 crypto/eseqiv.c                                    |    1 +
 crypto/fcrypt.c                                    |    1 +
 crypto/gcm.c                                       |    7 +-
 crypto/ghash-generic.c                             |    2 +-
 crypto/hmac.c                                      |    1 +
 crypto/khazad.c                                    |    1 +
 crypto/krng.c                                      |    2 +-
 crypto/lrw.c                                       |    1 +
 crypto/lz4.c                                       |    1 +
 crypto/lz4hc.c                                     |    1 +
 crypto/lzo.c                                       |    1 +
 crypto/mcryptd.c                                   |    1 +
 crypto/md4.c                                       |    2 +-
 crypto/md5.c                                       |    1 +
 crypto/michael_mic.c                               |    1 +
 crypto/pcbc.c                                      |    1 +
 crypto/pcrypt.c                                    |    1 +
 crypto/rmd128.c                                    |    1 +
 crypto/rmd160.c                                    |    1 +
 crypto/rmd256.c                                    |    1 +
 crypto/rmd320.c                                    |    1 +
 crypto/salsa20_generic.c                           |    2 +-
 crypto/seed.c                                      |    1 +
 crypto/seqiv.c                                     |    1 +
 crypto/serpent_generic.c                           |    4 +-
 crypto/sha1_generic.c                              |    2 +-
 crypto/sha256_generic.c                            |    4 +-
 crypto/sha512_generic.c                            |    4 +-
 crypto/tcrypt.c                                    |   32 +-
 crypto/tea.c                                       |    4 +-
 crypto/testmgr.c                                   |    3 +-
 crypto/tgr192.c                                    |    4 +-
 crypto/twofish_generic.c                           |    2 +-
 crypto/vmac.c                                      |    1 +
 crypto/wp512.c                                     |    4 +-
 crypto/xcbc.c                                      |    1 +
 crypto/xts.c                                       |    1 +
 crypto/zlib.c                                      |    1 +
 drivers/char/hw_random/Kconfig                     |    2 +-
 drivers/char/hw_random/atmel-rng.c                 |   15 +-
 drivers/char/hw_random/core.c                      |   12 +-
 drivers/crypto/bfin_crc.c                          |    2 +-
 drivers/crypto/caam/caamalg.c                      | 2412 +++++++++++++++++---
 drivers/crypto/caam/compat.h                       |    1 +
 drivers/crypto/caam/desc_constr.h                  |    2 +
 drivers/crypto/caam/error.c                        |   25 +-
 drivers/crypto/caam/jr.c                           |    3 -
 drivers/crypto/nx/nx-aes-cbc.c                     |   12 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |   61 +-
 drivers/crypto/nx/nx-aes-ctr.c                     |   13 +-
 drivers/crypto/nx/nx-aes-ecb.c                     |   12 +-
 drivers/crypto/nx/nx-aes-gcm.c                     |   66 +-
 drivers/crypto/nx/nx-aes-xcbc.c                    |   81 +-
 drivers/crypto/nx/nx-sha256.c                      |  208 +-
 drivers/crypto/nx/nx-sha512.c                      |  222 +-
 drivers/crypto/nx/nx.c                             |  127 +-
 drivers/crypto/nx/nx.h                             |    8 +-
 drivers/crypto/padlock-aes.c                       |    2 +-
 drivers/crypto/padlock-sha.c                       |    8 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    2 -
 drivers/crypto/qat/qat_common/adf_aer.c            |    2 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    3 +-
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |    6 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |   15 +-
 .../qat/qat_common/adf_transport_access_macros.h   |    9 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |   37 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |    3 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |    2 +
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c          |   12 +-
 drivers/crypto/sahara.c                            |  794 ++++++-
 drivers/crypto/ux500/cryp/cryp_core.c              |    6 +-
 drivers/crypto/ux500/hash/hash_core.c              |   10 +-
 drivers/s390/crypto/ap_bus.c                       |    3 +-
 include/crypto/hash.h                              |  492 ++++
 include/crypto/if_alg.h                            |    1 +
 include/crypto/rng.h                               |   80 +
 include/linux/crypto.h                             | 1112 ++++++++-
 include/net/sock.h                                 |    1 +
 include/uapi/linux/if_alg.h                        |    2 +
 net/core/sock.c                                    |   24 +-
 167 files changed, 7090 insertions(+), 1068 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 3.19
  2014-12-11 12:51                                                 ` Crypto Update for 3.19 Herbert Xu
@ 2014-12-12 11:54                                                   ` Herbert Xu
  2015-02-14  9:43                                                   ` Crypto Update for 3.20 Herbert Xu
  1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-12-12 11:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is a resend of the crypto update for 3.19 since I accidentally
pushed out an old tree instead of the current crypto tree.

* The crypto API is now documented :)
* Disallow arbitrary module loading through crypto API.
* Allow get request with empty driver name through crypto_user.
* Allow speed testing of arbitrary hash functions.
* Add caam support for ctr(aes), gcm(aes) and their derivatives.
* nx now supports concurrent hashing properly.
* Add sahara support for SHA1/256.
* Add ARM64 version of CRC32.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Boris Brezillon (4):
      hwrng: atmel - use clk_prepapre_enable/_disable_unprepare
      hwrng: atmel - add DT support
      hwrng: atmel - Add TRNG DT binding doc
      ARM: at91/dt: add trng node to at91sam9g45

Bruce Allan (4):
      crypto: qat - fix bad unlock balance
      crypto: qat - cleanup coccicheck warning - NULL check before freeing functions
      crypto: qat - cleanup unnecessary break checkpatch warning
      crypto: qat - misspelling typo - "reseting" should be "resetting"

Catalin Vasile (5):
      crypto: caam - add support for ctr(aes)
      crypto: caam - add support for rfc3686(ctr(aes))
      crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
      crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
      crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)

Cristian Stoica (1):
      crypto: caam - fix error reporting

Dan Carpenter (1):
      crypto: sha-mb - remove a bogus NULL check

Daniel Borkmann (1):
      crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()

Herbert Xu (4):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
      crypto: user - Allow get request with empty driver name
      crypto: algif_skcipher - Fixed blocking recvmsg
      crypto: tcrypt - Allow speed testing of arbitrary hash functions

Johannes Berg (1):
      crypto: bfin_crc - don't include linux/unaligned/access_ok.h

Julia Lawall (4):
      crypto: sparc - replace memset by memzero_explicit
      crypto: sha - replace memset by memzero_explicit
      crypto: powerpc - replace memset by memzero_explicit
      crypto: arm - replace memset by memzero_explicit

Kees Cook (2):
      crypto: prefix module autoloading with "crypto-"
      crypto: include crypto- module prefix in template

Leonidas S. Barbosa (8):
      crypto: nx - Moving NX-AES-CBC to be processed logic
      crypto: nx - Moving NX-AES-CCM to be processed logic and sg_list bounds
      crypto: nx - Moving limit and bound logic in CTR and fix IV vector
      crypto: nx - Moving NX-AES-ECB to be processed logic
      crypto: nx - Moving NX-AES-GCM to be processed logic
      crypto: nx - Moving NX-AES-XCBC to be processed logic
      crypto: nx - Fix SHA concurrence issue and sg limit bounds
      crypto: nx - Fixing the limit number of bytes to be processed

Masanari Iida (1):
      crypto: testmgr - Remove unnecessary KERN_INFO from testmgr.c

Nickolaus Woodruff (1):
      crypto: drbg - use memzero_explicit() for clearing sensitive data

Pranith Kumar (1):
      crypto: caam - Remove unnecessary smp_read_barrier_depends()

Rickard Strandqvist (1):
      hwrng: core - Changed from using strncat to strlcat

Steffen Trumtrar (4):
      crypto: sahara - fix spinlock initialization
      crypto: sahara - add support for i.MX53
      crypto: sahara - replace tasklets with kthread
      crypto: sahara - add support for SHA1/256

Stephan Mueller (22):
      crypto: drbg - use crypto_inc
      crypto: drbg - add MODULE_ALIAS for all DRBG types
      crypto: algif - zeroize message digest buffer
      crypto: algif - zeroize IV buffer
      crypto: doc - crypto API high level spec
      crypto: doc - compile crypto API spec
      crypto: doc - userspace interface spec
      crypto: doc - RNG API documentation
      crypto: doc - hash data structures
      crypto: doc - AHASH API documentation
      crypto: doc - SHASH API documentation
      crypto: doc - cipher data structures
      crypto: doc - ABLKCIPHER API documentation
      crypto: doc - AEAD API documentation
      crypto: doc - BLKCIPHER API documentation
      crypto: doc - CIPHER API documentation
      crypto: doc - HASH API documentation
      crypto: doc - document uncovered member variables
      crypto: user - add MODULE_ALIAS
      crypto: drbg - use MODULE_ALIAS_CRYPTO
      crypto: algif_skcipher - initialize upon init request
      crypto: af_alg - add user space interface for AEAD

Struk, Tadeusz (3):
      crypto: qat - Use memzero_explicit
      crytpo: qat - Fix 64 bytes requests
      crypto: algif_skcipher - removed unneeded code

Tadeusz Struk (2):
      crypto: qat - Move BAR definitions to device specific module
      crypto: qat - fix problem with coalescing enable logic

Tudor Ambarus (4):
      crypto: caam - add support for gcm(aes)
      crypto: caam - add support for rfc4106(gcm(aes))
      crypto: caam - fix output sequence contiguity check
      crypto: caam - add support for rfc4543(gcm(aes))

Ulf Hansson (2):
      crypto: ux500/cryp - Silence compiler warning for !CONFIG_PM
      crypto: ux500/hash - Silence compiler warning for !CONFIG_PM

Valentin Rothberg (1):
      crypto: aesni - remove unnecessary #define

Yazen Ghannam (1):
      crypto: crc32 - Add ARM64 CRC32 hw accelerated module

 Documentation/DocBook/Makefile                     |    2 +-
 Documentation/DocBook/crypto-API.tmpl              | 1253 ++++++++++
 Documentation/crypto/crypto-API-userspace.txt      |  205 ++
 .../devicetree/bindings/crypto/fsl-imx-sahara.txt  |    2 +-
 .../devicetree/bindings/hwrng/atmel-trng.txt       |   16 +
 arch/arm/boot/dts/at91sam9g45.dtsi                 |    7 +
 arch/arm/crypto/aes_glue.c                         |    4 +-
 arch/arm/crypto/sha1_glue.c                        |    2 +-
 arch/arm/crypto/sha1_neon_glue.c                   |    2 +-
 arch/arm/crypto/sha512_neon_glue.c                 |    6 +-
 arch/arm64/crypto/Kconfig                          |    4 +
 arch/arm64/crypto/Makefile                         |    4 +
 arch/arm64/crypto/aes-ce-ccm-glue.c                |    2 +-
 arch/arm64/crypto/aes-glue.c                       |    8 +-
 arch/arm64/crypto/crc32-arm64.c                    |  274 +++
 arch/powerpc/crypto/sha1.c                         |    4 +-
 arch/s390/crypto/aes_s390.c                        |    2 +-
 arch/s390/crypto/des_s390.c                        |    4 +-
 arch/s390/crypto/ghash_s390.c                      |    2 +-
 arch/s390/crypto/sha1_s390.c                       |    2 +-
 arch/s390/crypto/sha256_s390.c                     |    4 +-
 arch/s390/crypto/sha512_s390.c                     |    4 +-
 arch/sparc/crypto/aes_glue.c                       |    2 +-
 arch/sparc/crypto/camellia_glue.c                  |    2 +-
 arch/sparc/crypto/crc32c_glue.c                    |    2 +-
 arch/sparc/crypto/des_glue.c                       |    2 +-
 arch/sparc/crypto/md5_glue.c                       |    2 +-
 arch/sparc/crypto/sha1_glue.c                      |    2 +-
 arch/sparc/crypto/sha256_glue.c                    |    6 +-
 arch/sparc/crypto/sha512_glue.c                    |    6 +-
 arch/x86/crypto/aes_glue.c                         |    4 +-
 arch/x86/crypto/aesni-intel_glue.c                 |   10 +-
 arch/x86/crypto/blowfish_glue.c                    |    4 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    4 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    4 +-
 arch/x86/crypto/camellia_glue.c                    |    4 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    2 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    2 +-
 arch/x86/crypto/crc32-pclmul_glue.c                |    4 +-
 arch/x86/crypto/crc32c-intel_glue.c                |    4 +-
 arch/x86/crypto/crct10dif-pclmul_glue.c            |    4 +-
 arch/x86/crypto/des3_ede_glue.c                    |    8 +-
 arch/x86/crypto/fpu.c                              |    3 +
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |    2 +-
 arch/x86/crypto/salsa20_glue.c                     |    4 +-
 arch/x86/crypto/serpent_avx2_glue.c                |    4 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    2 +-
 arch/x86/crypto/serpent_sse2_glue.c                |    2 +-
 arch/x86/crypto/sha-mb/sha1_mb.c                   |    3 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    6 +-
 arch/x86/crypto/sha512_ssse3_glue.c                |    6 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    2 +-
 arch/x86/crypto/twofish_glue.c                     |    4 +-
 arch/x86/crypto/twofish_glue_3way.c                |    4 +-
 crypto/842.c                                       |    1 +
 crypto/aes_generic.c                               |    2 +-
 crypto/af_alg.c                                    |    6 +
 crypto/algapi.c                                    |    4 +-
 crypto/algif_hash.c                                |    4 +-
 crypto/algif_skcipher.c                            |   15 +-
 crypto/ansi_cprng.c                                |    2 +-
 crypto/anubis.c                                    |    1 +
 crypto/api.c                                       |    4 +-
 crypto/arc4.c                                      |    1 +
 crypto/authenc.c                                   |    1 +
 crypto/authencesn.c                                |    1 +
 crypto/blowfish_generic.c                          |    2 +-
 crypto/camellia_generic.c                          |    2 +-
 crypto/cast5_generic.c                             |    2 +-
 crypto/cast6_generic.c                             |    2 +-
 crypto/cbc.c                                       |    1 +
 crypto/ccm.c                                       |    5 +-
 crypto/chainiv.c                                   |    1 +
 crypto/cmac.c                                      |    1 +
 crypto/crc32.c                                     |    1 +
 crypto/crc32c_generic.c                            |    2 +-
 crypto/crct10dif_generic.c                         |    2 +-
 crypto/cryptd.c                                    |    1 +
 crypto/crypto_null.c                               |    6 +-
 crypto/crypto_user.c                               |    6 +-
 crypto/ctr.c                                       |    3 +-
 crypto/cts.c                                       |    1 +
 crypto/deflate.c                                   |    2 +-
 crypto/des_generic.c                               |    2 +-
 crypto/drbg.c                                      |  127 +-
 crypto/ecb.c                                       |    1 +
 crypto/eseqiv.c                                    |    1 +
 crypto/fcrypt.c                                    |    1 +
 crypto/gcm.c                                       |    7 +-
 crypto/ghash-generic.c                             |    2 +-
 crypto/hmac.c                                      |    1 +
 crypto/khazad.c                                    |    1 +
 crypto/krng.c                                      |    2 +-
 crypto/lrw.c                                       |    1 +
 crypto/lz4.c                                       |    1 +
 crypto/lz4hc.c                                     |    1 +
 crypto/lzo.c                                       |    1 +
 crypto/mcryptd.c                                   |    1 +
 crypto/md4.c                                       |    2 +-
 crypto/md5.c                                       |    1 +
 crypto/michael_mic.c                               |    1 +
 crypto/pcbc.c                                      |    1 +
 crypto/pcrypt.c                                    |    1 +
 crypto/rmd128.c                                    |    1 +
 crypto/rmd160.c                                    |    1 +
 crypto/rmd256.c                                    |    1 +
 crypto/rmd320.c                                    |    1 +
 crypto/salsa20_generic.c                           |    2 +-
 crypto/seed.c                                      |    1 +
 crypto/seqiv.c                                     |    1 +
 crypto/serpent_generic.c                           |    4 +-
 crypto/sha1_generic.c                              |    2 +-
 crypto/sha256_generic.c                            |    4 +-
 crypto/sha512_generic.c                            |    4 +-
 crypto/tcrypt.c                                    |   32 +-
 crypto/tea.c                                       |    4 +-
 crypto/testmgr.c                                   |    3 +-
 crypto/tgr192.c                                    |    4 +-
 crypto/twofish_generic.c                           |    2 +-
 crypto/vmac.c                                      |    1 +
 crypto/wp512.c                                     |    4 +-
 crypto/xcbc.c                                      |    1 +
 crypto/xts.c                                       |    1 +
 crypto/zlib.c                                      |    1 +
 drivers/char/hw_random/Kconfig                     |    2 +-
 drivers/char/hw_random/atmel-rng.c                 |   15 +-
 drivers/char/hw_random/core.c                      |   12 +-
 drivers/crypto/bfin_crc.c                          |    2 +-
 drivers/crypto/caam/caamalg.c                      | 2412 +++++++++++++++++---
 drivers/crypto/caam/compat.h                       |    1 +
 drivers/crypto/caam/desc_constr.h                  |    2 +
 drivers/crypto/caam/error.c                        |   25 +-
 drivers/crypto/caam/jr.c                           |    3 -
 drivers/crypto/nx/nx-aes-cbc.c                     |   12 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |   61 +-
 drivers/crypto/nx/nx-aes-ctr.c                     |   13 +-
 drivers/crypto/nx/nx-aes-ecb.c                     |   12 +-
 drivers/crypto/nx/nx-aes-gcm.c                     |   66 +-
 drivers/crypto/nx/nx-aes-xcbc.c                    |   81 +-
 drivers/crypto/nx/nx-sha256.c                      |  208 +-
 drivers/crypto/nx/nx-sha512.c                      |  222 +-
 drivers/crypto/nx/nx.c                             |  127 +-
 drivers/crypto/nx/nx.h                             |    8 +-
 drivers/crypto/padlock-aes.c                       |    2 +-
 drivers/crypto/padlock-sha.c                       |    8 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    2 -
 drivers/crypto/qat/qat_common/adf_aer.c            |    2 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    3 +-
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |    6 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |   15 +-
 .../qat/qat_common/adf_transport_access_macros.h   |    9 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |   37 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |    3 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |    2 +
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c          |   12 +-
 drivers/crypto/sahara.c                            |  794 ++++++-
 drivers/crypto/ux500/cryp/cryp_core.c              |    6 +-
 drivers/crypto/ux500/hash/hash_core.c              |   10 +-
 drivers/s390/crypto/ap_bus.c                       |    3 +-
 include/crypto/hash.h                              |  492 ++++
 include/crypto/if_alg.h                            |    1 +
 include/crypto/rng.h                               |   80 +
 include/linux/crypto.h                             | 1112 ++++++++-
 include/net/sock.h                                 |    1 +
 include/uapi/linux/if_alg.h                        |    2 +
 net/core/sock.c                                    |   24 +-
 167 files changed, 7090 insertions(+), 1068 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.19
  2014-02-03 12:59                                                   ` Crypto Fixes for 3.14 Herbert Xu
  2014-04-13 23:34                                                     ` Crypto Fixes for 3.15 Herbert Xu
  2014-07-10  9:03                                                     ` Crypto Fixes for 3.16 Herbert Xu
@ 2014-12-31  3:32                                                     ` Herbert Xu
  2015-01-07  2:17                                                       ` Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-12-31  3:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a use-after-free crash in the user-space crypto
API.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Rabin Vincent (1):
      crypto: af_alg - fix backlog handling

 crypto/af_alg.c |    3 +++
 1 file changed, 3 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.19
  2014-12-31  3:32                                                     ` Crypto Fixes for 3.19 Herbert Xu
@ 2015-01-07  2:17                                                       ` Herbert Xu
  2015-01-20  0:52                                                         ` Herbert Xu
                                                                           ` (2 more replies)
  0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-01-07  2:17 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem with sha-mb with old toolchains
and an implementation bug in the ctr(aes)/by8 branch of aesni-intel
that's enabled when AVX is available.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

 
Mathias Krause (1):
      crypto: aesni - fix "by8" variant for 128 bit keys

Vinson Lee (1):
      crypto: sha-mb - Add avx2_supported check.

 arch/x86/crypto/Makefile                |    2 +-
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S |   46 +++++++++++++++++++++++--------
 2 files changed, 36 insertions(+), 12 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 3.19
  2015-01-07  2:17                                                       ` Herbert Xu
@ 2015-01-20  0:52                                                         ` Herbert Xu
  2015-03-09  5:19                                                         ` Crypto Fixes for 4.0 Herbert Xu
  2015-04-25  8:03                                                         ` Crypto Fixes for 4.1 Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-01-20  0:52 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression that arose from the change to add
a crypto prefix to module names which was done to prevent the
loading of arbitrary modules through the Crypto API.  In particular,
a number of modules were missing the crypto prefix which meant
that they could no longer be autoloaded.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Mathias Krause (1):
      crypto: add missing crypto module aliases

 arch/powerpc/crypto/sha1.c       |    1 +
 arch/x86/crypto/sha-mb/sha1_mb.c |    2 +-
 crypto/aes_generic.c             |    1 +
 crypto/ansi_cprng.c              |    1 +
 crypto/blowfish_generic.c        |    1 +
 crypto/camellia_generic.c        |    1 +
 crypto/cast5_generic.c           |    1 +
 crypto/cast6_generic.c           |    1 +
 crypto/crc32c_generic.c          |    1 +
 crypto/crct10dif_generic.c       |    1 +
 crypto/des_generic.c             |    7 ++++---
 crypto/ghash-generic.c           |    1 +
 crypto/krng.c                    |    1 +
 crypto/salsa20_generic.c         |    1 +
 crypto/serpent_generic.c         |    1 +
 crypto/sha1_generic.c            |    1 +
 crypto/sha256_generic.c          |    2 ++
 crypto/sha512_generic.c          |    2 ++
 crypto/tea.c                     |    1 +
 crypto/tgr192.c                  |    1 +
 crypto/twofish_generic.c         |    1 +
 crypto/wp512.c                   |    1 +
 22 files changed, 27 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 3.20
  2014-12-11 12:51                                                 ` Crypto Update for 3.19 Herbert Xu
  2014-12-12 11:54                                                   ` Herbert Xu
@ 2015-02-14  9:43                                                   ` Herbert Xu
  2015-04-15  3:39                                                     ` Crypto Update for 4.1 Herbert Xu
  2015-06-26 10:22                                                     ` Crypto Fixes for 4.2 Herbert Xu
  1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-02-14  9:43 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 3.20:

* Added 192/256-bit key support to aesni GCM.
* Added MIPS OCTEON MD5 support.
* Fixed hwrng starvation and race conditions.
* Added note that memzero_explicit is not a subsitute for memset.
* Added user-space interface for crypto_rng.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Aaro Koskinen (5):
      MIPS: OCTEON: add crypto helper functions
      crypto: octeon - add instruction definitions for MD5
      MIPS: OCTEON: reintroduce crypto features check
      crypto: octeon - add MD5 module
      crypto: octeon - enable OCTEON MD5 module selection

Allan, Bruce W (5):
      crypto: qat - fix device reset flow
      crypto: qat - correctly type a boolean
      crypto: qat - adf_ae_stop() is never called
      crypto: qat - use pci_wait_for_pending_transaction()
      crypto: qat - remove unnecessary include of atomic.h header file

Amos Kong (1):
      hwrng: move some code out mutex_lock for avoiding underlying deadlock

Andrey Ryabinin (1):
      crypto: ccp - terminate ccp_support array with empty element

Asaf Vertz (2):
      crypto: ux500 - fix checkpatch errors
      crypto: omap-des - fix BUG_ON condition

Christophe Jaillet (1):
      crypto: atmel - Free memory in error path

Cristian Stoica (8):
      crypto: replace scatterwalk_sg_next with sg_next
      crypto: caam - remove dead code
      crypto: caam - remove unused local variable
      crypto: caam - pair irq map and dispose in the same function
      crypto: caam - fix resource clean-up on error path for caam_jr_init
      crypto: tcrypt - fix buflen reminder calculation
      crypto: testmgr - limit IV copy length in aead tests
      crypto: tcrypt - do not allocate iv on stack for aead speed tests

Daniel Borkmann (1):
      lib: memzero_explicit: add comment for its usage

Herbert Xu (11):
      hwrng: core - Use struct completion for cleanup_done
      hwrng: core - Fix current_rng init/cleanup race yet again
      hwrng: core - Do not register device opportunistically
      hwrng: core - Drop current rng in set_current_rng
      hwrng: core - Move hwrng_init call into set_current_rng
      Revert "crypto: drbg - use memzero_explicit() for clearing sensitive data"
      crypto: qat - Fix incorrect uses of memzero_explicit
      crypto: qat - Ensure ipad and opad are zeroed
      crypto: cts - Remove bogus use of seqiv
      crypto: cts - Weed out non-CBC algorithms
      crypto: seqiv - Ensure that IV size is at least 8 bytes

Jarod Wilson (1):
      crypto: testmgr - mark rfc4106(gcm(aes)) as fips_allowed

Joshua I. James (5):
      crypto: ablkcipher - fixed style errors in ablkcipher.c
      crypto: aead - fixed style error in aead.c
      crypto: af_alg - fixed style error in af_alg.c
      crypto: ahash - fixed style error in ahash.c
      crypto: api - fixed style erro in algapi.c

Kim Phillips (1):
      crypto: caam - don't emit ICV check failures to dmesg

Masanari Iida (1):
      crypto: bfin_crc - Remove unnecessary KERN_ERR in bfin_crc.c

Mathias Krause (5):
      crypto: sparc64/aes - fix module description
      crypto: sparc64/camellia - fix module alias
      crypto: sparc64/des - add "des3_ede" module alias
      crypto: sparc64/md5 - fix module description
      crypto: x86/des3_ede - drop bogus module aliases

Michael S. Tsirkin (2):
      MAINTAINERS: add linux-crypto to hw random
      hwrng: virtio - drop extra empty line

Rabin Vincent (1):
      crypto: testmgr - don't use interruptible wait in tests

Rickard Strandqvist (1):
      crypto: amcc - Remove unused function

Rusty Russell (5):
      hwrng: place mutex around read functions and buffers.
      hwrng: use reference counts on each struct hwrng.
      hwrng: fix unregister race.
      hwrng: don't double-check old_rng.
      hwrng: don't init list element we're about to add to list.

Stephan Mueller (7):
      crypto: drbg - panic on continuous self test error
      crypto: af_alg - add setsockopt for auth tag size
      crypto: af_alg - zeroize key data
      crypto: algif_rng - add random number generator support
      crypto: algif_rng - enable RNG interface compilation
      crypto: aead - add check for presence of auth tag
      crypto: doc - remove colons in comments

Svenning Sørensen (1):
      crypto: atmel_sha - remove unused shash fallback instance.

Tadeusz Struk (4):
      crypto: algif - Mark sgl end at the end of data
      crypto: qat - Fix assumption that sg in and out will have the same nents
      crypto: qat - add support for cbc(aes) ablkcipher
      crypto: qat - don't need qat_auth_state struct

Timothy McCaffrey (1):
      crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106

Wei Yongjun (1):
      crypto: algif_rng - fix sparse non static symbol warning

 MAINTAINERS                                        |    1 +
 arch/mips/cavium-octeon/Makefile                   |    1 +
 arch/mips/cavium-octeon/crypto/Makefile            |    7 +
 arch/mips/cavium-octeon/crypto/octeon-crypto.c     |   66 ++
 arch/mips/cavium-octeon/crypto/octeon-crypto.h     |   75 +++
 arch/mips/cavium-octeon/crypto/octeon-md5.c        |  216 +++++++
 arch/mips/cavium-octeon/executive/octeon-model.c   |    6 +
 arch/mips/include/asm/octeon/octeon-feature.h      |   17 +-
 arch/mips/include/asm/octeon/octeon.h              |    5 -
 arch/sparc/crypto/aes_glue.c                       |    2 +-
 arch/sparc/crypto/camellia_glue.c                  |    2 +-
 arch/sparc/crypto/des_glue.c                       |    1 +
 arch/sparc/crypto/md5_glue.c                       |    2 +-
 arch/x86/crypto/aesni-intel_asm.S                  |  343 ++++++-----
 arch/x86/crypto/aesni-intel_glue.c                 |   34 +-
 arch/x86/crypto/des3_ede_glue.c                    |    2 -
 crypto/Kconfig                                     |   18 +
 crypto/Makefile                                    |    1 +
 crypto/ablkcipher.c                                |    7 +-
 crypto/aead.c                                      |    3 +-
 crypto/af_alg.c                                    |   11 +-
 crypto/ahash.c                                     |    3 +-
 crypto/algapi.c                                    |    1 +
 crypto/algif_rng.c                                 |  192 ++++++
 crypto/algif_skcipher.c                            |    8 +
 crypto/cts.c                                       |    5 +-
 crypto/drbg.c                                      |   34 +-
 crypto/scatterwalk.c                               |    6 +-
 crypto/seqiv.c                                     |   12 +
 crypto/tcrypt.c                                    |   37 +-
 crypto/testmgr.c                                   |   58 +-
 drivers/char/hw_random/core.c                      |  215 ++++---
 drivers/char/hw_random/virtio-rng.c                |    1 -
 drivers/crypto/amcc/crypto4xx_sa.c                 |   23 -
 drivers/crypto/atmel-aes.c                         |    2 +-
 drivers/crypto/atmel-sha.c                         |   50 +-
 drivers/crypto/atmel-tdes.c                        |    2 +-
 drivers/crypto/bfin_crc.c                          |    4 +-
 drivers/crypto/caam/caamalg.c                      |   14 +-
 drivers/crypto/caam/ctrl.c                         |    6 +-
 drivers/crypto/caam/error.c                        |   13 +-
 drivers/crypto/caam/jr.c                           |   37 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |    8 +-
 drivers/crypto/ccp/ccp-dev.c                       |    1 +
 drivers/crypto/ixp4xx_crypto.c                     |    4 +-
 drivers/crypto/nx/nx.c                             |    6 +-
 drivers/crypto/omap-aes.c                          |    4 +-
 drivers/crypto/omap-des.c                          |    8 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    6 +-
 drivers/crypto/qat/qat_common/adf_aer.c            |   24 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |    2 +
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    2 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    7 +-
 drivers/crypto/qat/qat_common/adf_init.c           |   98 ++-
 .../crypto/qat/qat_common/adf_transport_internal.h |    1 -
 drivers/crypto/qat/qat_common/icp_qat_hw.h         |    2 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |  642 +++++++++++++++-----
 drivers/crypto/qat/qat_common/qat_crypto.h         |   16 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |   19 +
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |   42 +-
 drivers/crypto/qce/dma.c                           |    6 +-
 drivers/crypto/qce/sha.c                           |    2 +-
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/talitos.c                           |    8 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |   10 +-
 include/crypto/if_alg.h                            |    1 +
 include/crypto/scatterwalk.h                       |   10 +-
 include/linux/crypto.h                             |   11 +-
 include/linux/hw_random.h                          |    4 +
 lib/string.c                                       |    5 +
 70 files changed, 1785 insertions(+), 709 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.0
  2015-01-07  2:17                                                       ` Herbert Xu
  2015-01-20  0:52                                                         ` Herbert Xu
@ 2015-03-09  5:19                                                         ` Herbert Xu
  2015-03-18  5:25                                                           ` Herbert Xu
  2015-04-25  8:03                                                         ` Crypto Fixes for 4.1 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-03-09  5:19 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the ARM XTS implementation that can
cause failures to in decrypting encrypted disks.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Ard Biesheuvel (1):
      crypto: arm/aes update NEON AES module to latest OpenSSL version

 arch/arm/crypto/aesbs-core.S_shipped |   12 ++++++++----
 arch/arm/crypto/bsaes-armv7.pl       |   12 ++++++++----
 2 files changed, 16 insertions(+), 8 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.0
  2015-03-09  5:19                                                         ` Crypto Fixes for 4.0 Herbert Xu
@ 2015-03-18  5:25                                                           ` Herbert Xu
  2015-03-18 18:12                                                             ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-03-18  5:25 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

On Mon, Mar 09, 2015 at 04:19:50PM +1100, Herbert Xu wrote:
> 
> This push fixes a bug in the ARM XTS implementation that can
> cause failures to in decrypting encrypted disks.

For some reason this didn't get pulled so I'm resending it with
another fix.

The new fix is a memory overwrite bug that can cause a crash
which can be triggered from userspace.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Ard Biesheuvel (1):
      crypto: arm/aes update NEON AES module to latest OpenSSL version

Stephan Mueller (1):
      crypto: aesni - fix memory usage in GCM decryption

 arch/arm/crypto/aesbs-core.S_shipped |   12 ++++++++----
 arch/arm/crypto/bsaes-armv7.pl       |   12 ++++++++----
 arch/x86/crypto/aesni-intel_glue.c   |    4 ++--
 3 files changed, 18 insertions(+), 10 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.0
  2015-03-18  5:25                                                           ` Herbert Xu
@ 2015-03-18 18:12                                                             ` Linus Torvalds
  0 siblings, 0 replies; 246+ messages in thread
From: Linus Torvalds @ 2015-03-18 18:12 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Mar 17, 2015 at 10:25 PM, Herbert Xu
<herbert@gondor.apana.org.au> wrote:
> Hi Linus:
>
> On Mon, Mar 09, 2015 at 04:19:50PM +1100, Herbert Xu wrote:
>>
>> This push fixes a bug in the ARM XTS implementation that can
>> cause failures to in decrypting encrypted disks.
>
> For some reason this didn't get pulled so I'm resending it with
> another fix.

Hmm. I never got your original email. Maybe it was in my spam folder
and my spam scan never noticed..

                        Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 4.1
  2015-02-14  9:43                                                   ` Crypto Update for 3.20 Herbert Xu
@ 2015-04-15  3:39                                                     ` Herbert Xu
  2015-04-16  1:58                                                       ` Linus Torvalds
  2015-06-22  8:44                                                       ` Crypto Update for 4.2 Herbert Xu
  2015-06-26 10:22                                                     ` Crypto Fixes for 4.2 Herbert Xu
  1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-04-15  3:39 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 4.1:

* Added user-space interface for AEAD.
* Added user-space interface for RNG (i.e., pseudo RNG).
* Prevent internal helper algos from being exposed to user-space.
* Merged common code from assembly/C SHA implementations .
* Added ARMv8 SHA1/256.
* Added ARMv8 AES.
* Added ARMv8 GHASH.
* Added ARM assmelber and NEON SHA256.
* Added MIPS OCTEON SHA1/256/512.
* Added MIPS img-hash SHA1/256 and MD5.
* Added Power 8 VMX AES/CBC/CTR/GHASH.
* Added PPC assembler AES, SHA1/256 and MD5.
* Added Broadcom IPROC RNG driver.
* Misc fixes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Aaro Koskinen (7):
      crypto: octeon - don't disable bottom half in octeon-md5
      crypto: octeon - always disable preemption when using crypto engine
      crypto: octeon - add instruction definitions for SHA1/256/512
      crypto: octeon - add SHA1 module
      crypto: octeon - add SHA256 module
      crypto: octeon - add SHA512 module
      crypto: octeon - enable OCTEON SHA1/256/512 module selection

Allan, Bruce W (10):
      crypto: qat - remove duplicate definition of Intel PCI vendor id
      crypto: qat - fix typo in string
      crypto: qat - make error and info log messages more descriptive
      crypto: qat - fix typo
      crypto: qat - fix checkpatch CHECK_SPACING issues
      crypto: qat - checkpatch PARENTHESIS_ALIGNMENT and LOGICAL_CONTINUATIONS
      crypto: qat - fix checkpatch CONCATENATED_STRING issues
      crypto: qat - fix checkpatch BIT_MACRO issues
      crypto: qat - fix checkpatch COMPARISON_TO_NULL issue
      crypto: qat - fix checkpatch CODE_INDENT issue

Ameen Ali (1):
      crypto: sha1-mb - Syntax error

Andre Wolokita (2):
      hwrng: omap - Change RNG_CONFIG_REG to RNG_CONTROL_REG when checking and disabling TRNG
      hwrng: omap - Change RNG_CONFIG_REG to RNG_CONTROL_REG in init

Ard Biesheuvel (23):
      crypto: arm - move ARM specific Kconfig definitions to a dedicated file
      crypto: arm - add support for SHA1 using ARMv8 Crypto Instructions
      crypto: arm - add support for SHA-224/256 using ARMv8 Crypto Extensions
      crypto: arm - AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions
      crypto: arm - add support for GHASH using ARMv8 Crypto Extensions
      crypto: arm/ghash - fix big-endian bug in ghash
      crypto: sha1 - implement base layer for SHA-1
      crypto: sha256 - implement base layer for SHA-256
      crypto: sha512 - implement base layer for SHA-512
      crypto: sha1-generic - move to generic glue implementation
      crypto: sha256-generic - move to generic glue implementation
      crypto: sha512-generic - move to generic glue implementation
      crypto: arm/sha1 - move SHA-1 ARM asm implementation to base layer
      crypto: arm/sha1_neon - move SHA-1 NEON implementation to base layer
      crypto: arm/sha1-ce - move SHA-1 ARMv8 implementation to base layer
      crypto: arm/sha256 - move SHA-224/256 ASM/NEON implementation to base layer
      crypto: arm/sha2-ce - move SHA-224/256 ARMv8 implementation to base layer
      crypto: arm64/sha1-ce - move SHA-1 ARMv8 implementation to base layer
      crypto: arm64/sha2-ce - move SHA-224/256 ARMv8 implementation to base layer
      crypto: x86/sha1_ssse3 - move SHA-1 SSSE3 implementation to base layer
      crypto: x86/sha256_ssse3 - move SHA-224/256 SSSE3 implementation to base layer
      crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer
      crypto: arm - workaround for building with old binutils

Arnd Bergmann (1):
      crypto: arm/sha256 - avoid sha256 code on ARMv7-M

Colin Ian King (1):
      crypto: atmel - fix typo in dev_err error message

Dan Carpenter (2):
      crypto: img-hash - fix some compile warnings
      crypto: img-hash - shift wrapping bug in img_hash_hw_init()

Dmitry Torokhov (12):
      hwrng: omap - remove incorrect __exit markups
      hwrng: octeon - remove incorrect __exit markups
      hwrng: pseries - remove incorrect __init/__exit markups
      crypto: qat - remove incorrect __exit markup
      crypto: amcc - remove incorrect __init/__exit markups
      hwrng: omap - remove #ifdefery around PM methods
      hwrng: add devm_* interfaces
      hwrng: bcm63xx - make use of devm_hwrng_register
      hwrng: exynos - make use of devm_hwrng_register
      hwrng: msm - make use of devm_hwrng_register
      hwrng: iproc-rng200 - do not use static structure
      hwrng: iproc-rng200 - make use of devm_hwrng_register

Feng Kan (1):
      hwrng: xgene - add ACPI support for APM X-Gene RNG unit

Florian Fainelli (4):
      hwrng: bcm63xx - drop bcm_{readl,writel} macros
      hwrng: bcm63xx - move register definitions to driver
      MIPS: BCM63xx: remove RSET_RNG register definitions
      hwrng: bcm63xx - use devm_* helpers

Geert Uytterhoeven (1):
      crypto: ux500 - Update error message for dmaengine_prep_slave_sg() API

Herbert Xu (6):
      linux-next: Tree for Mar 11 (powerpc build failure due to vmx crypto code)
      linux-next: build failure after merge of the crypto tree
      crypto: api - Fix races in crypto_unregister_instance
      crypto: api - Change crypto_unregister_instance argument type
      crypto: user - Fix crypto_alg_match race
      crypto: api - Move alg ref count init to crypto_check_alg

Horia Geant? (1):
      crypto: tcrypt - fix uninit sg entries in test_acipher_speed

James Hartley (3):
      crypto: img-hash - Add Imagination Technologies hw hash accelerator
      Documentation: crypto: Add DT binding info for the img hw hash accelerator
      crypto: img-hash - Fix Kconfig selections

Julia Lawall (1):
      crypto: don't export static symbol

Keith Packard (1):
      hwrng: core - allow perfect entropy from hardware devices

Kim Phillips (1):
      crypto: powerpc - move files to fix build error

Lad, Prabhakar (1):
      crypto: sha-mb - Fix big integer constant sparse warning

Leilei Zhao (9):
      crypto: atmel-aes - add new version
      crypto: atmel-sha - add new version
      crypto: atmel-sha - fix sg list management
      crypto: atmel-sha - initialize spinlock in probe
      crypto: atmel-sha - correct the max burst size
      crypto: atmel-tdes - initialize spinlock in probe
      crypto: atmel-aes - initialize spinlock in probe
      crypto: atmel-aes - sync the buf used in DMA or CPU
      crypto: atmel-aes - correct usage of dma_sync_* API

Leonidas S. Barbosa (2):
      crypto: vmx - Add support for VMS instructions by ASM
      crypto: vmx - Enabling VMX module for PPC64

Ludovic Desroches (1):
      crypto: atmel-sha - correct the way data are split

Marcelo H. Cerri (5):
      crypto: vmx - Adding VMX module for Power 8
      crypto: vmx - Adding AES routines for VMX module
      crypto: vmx - Adding CBC routines for VMX module
      crypto: vmx - Adding CTR routines for VMX module
      crypto: vmx - Adding GHASH routines for VMX module

Markus Stockhausen (16):
      crypto: ppc/sha256 - assembler
      crypto: ppc/sha256 - glue
      crypto: ppc/sha256 - kernel config
      crypto: powerpc/aes - register defines
      crypto: powerpc/aes - aes tables
      crypto: powerpc/aes - assembler core
      crypto: powerpc/aes - key handling
      crypto: powerpc/aes - ECB/CBC/CTR/XTS modes
      cyprot: powerpc/aes - glue code
      crypto: powerpc/aes - kernel config
      crypto: powerpc/sha1 - assembler
      crypto: powerpc/sha1 - glue
      crypto: powerpc/sha1 - kernel config
      crypto: powerpc/md5 - assembler
      crypto: powerpc/md5 - glue
      crypto: powerpc/md5 - kernel config

Martin Hicks (2):
      crypto: talitos - Simplify per-channel initialization
      crypto: talitos - Remove MD5_BLOCK_SIZE

Masanari Iida (1):
      crypto: serpent_sse2 - Fix a typo in Kconfig

Nicholas Mc Guire (4):
      crypto: mxs-dcp - fix type of ret for wait_for_completion_timeout
      crypto: sahara - fix type of ret for wait_for_completion_timeout
      crypto: sahara - pass on error condition
      crypto: sahara - drop unnecessary default assignment

Sami Tolvanen (1):
      crypto: arm/sha256 - Add optimized SHA-256/224

Scott Branden (2):
      hwrng: iproc-rng200 - Add device tree bindings
      hwrng: iproc-rng200 - Add Broadcom IPROC RNG driver

Steffen Trumtrar (2):
      crypto: sahara - use the backlog
      crypto: sahara - fix AES descriptor create

Stephan Mueller (31):
      crypto: doc - describe internal structure
      crypto: algif - add AEAD support
      crypto: algif - enable AEAD interface compilation
      crypto: drbg - use single block cipher API
      crypto: drbg - remove superflowous memsets
      crypto: rng - RNGs must return 0 in success case
      crypto: doc - AEAD / RNG AF_ALG interface
      MAINTAINERS: add crypto-API.tmpl
      crypto: testmgr - fix RNG return code enforcement
      crypto: algif_rng - zeroize buffer with random data
      crypto: api - prevent helper ciphers from being used
      crypto: testmgr - use CRYPTO_ALG_INTERNAL
      crypto: cryptd - process CRYPTO_ALG_INTERNAL
      crypto: proc - identify internal ciphers
      crypto: aesni - mark AES-NI helper ciphers
      crypto: clmulni - mark ghash clmulni helper ciphers
      crypto: ghash-ce - mark GHASH ARMv8 vmull.p64 helper ciphers
      crypto: camellia_aesni_avx2 - mark AES-NI Camellia helper ciphers
      crypto: cast5_avx - mark CAST5 helper ciphers
      crypto: camellia_aesni_avx - mark AVX Camellia helper ciphers
      crypto: cast6_avx - mark CAST6 helper ciphers
      crypto: serpent_avx2 - mark Serpent AVX2 helper ciphers
      crypto: serpent_avx - mark Serpent AVX helper ciphers
      crypto: serpent_sse2 - mark Serpent SSE2 helper ciphers
      crypto: twofish_avx - mark Twofish AVX helper ciphers
      crypto: aesbs - mark NEON bit sliced AES helper ciphers
      crypto: aes-ce - mark ARMv8 AES helper ciphers
      crypto: arm64/aes - mark 64 bit ARMv8 AES helper ciphers
      crypto: mcryptd - process CRYPTO_ALG_INTERNAL
      crypto: sha-mb - mark Multi buffer SHA1 helper cipher
      crypto: api - remove instance when test failed

Tadeusz Struk (3):
      crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
      crypto: qat - print ring name in debug output
      crypto: qat - fix double release_firmware on error path

Tom Lendacky (5):
      crypto: ccp - Updates for checkpatch warnings/errors
      crypto: ccp - Update CCP build support
      crypto: ccp - Use dma_set_mask_and_coherent to set DMA mask
      crypto: ccp - Convert calls to their devm_ counterparts
      crypto: ccp - Add ACPI support

Vutla, Lokesh (3):
      crypto: omap-sham - Use pm_runtime_irq_safe()
      crypto: omap-aes - Fix support for unequal lengths
      crypto: omap-sham - Add the offset of sg page to vaddr

Yanjiang Jin (2):
      crypto: caam - fix uninitialized edesc->sec4_sg_bytes field
      hwrng: caam - fix rng_unmap_ctx's DMA_UNMAP size problem

mancha security (1):
      lib: memzero_explicit: use barrier instead of OPTIMIZER_HIDE_VAR

 Documentation/DocBook/crypto-API.tmpl              |  860 ++++++
 Documentation/crypto/crypto-API-userspace.txt      |  205 --
 .../devicetree/bindings/crypto/img-hash.txt        |   27 +
 .../bindings/hwrng/brcm,iproc-rng200.txt           |   12 +
 MAINTAINERS                                        |    1 +
 arch/arm/Kconfig                                   |    3 +
 arch/arm/crypto/Kconfig                            |  130 +
 arch/arm/crypto/Makefile                           |   27 +-
 arch/arm/crypto/aes-ce-core.S                      |  518 ++++
 arch/arm/crypto/aes-ce-glue.c                      |  524 ++++
 arch/arm/crypto/aesbs-glue.c                       |    9 +-
 arch/arm/crypto/ghash-ce-core.S                    |   94 +
 arch/arm/crypto/ghash-ce-glue.c                    |  320 +++
 arch/arm/crypto/sha1-ce-core.S                     |  125 +
 arch/arm/crypto/sha1-ce-glue.c                     |   96 +
 arch/arm/{include/asm => }/crypto/sha1.h           |    3 +
 arch/arm/crypto/sha1_glue.c                        |  112 +-
 arch/arm/crypto/sha1_neon_glue.c                   |  137 +-
 arch/arm/crypto/sha2-ce-core.S                     |  125 +
 arch/arm/crypto/sha2-ce-glue.c                     |  114 +
 arch/arm/crypto/sha256-armv4.pl                    |  716 +++++
 arch/arm/crypto/sha256-core.S_shipped              | 2808 ++++++++++++++++++++
 arch/arm/crypto/sha256_glue.c                      |  128 +
 arch/arm/crypto/sha256_glue.h                      |   14 +
 arch/arm/crypto/sha256_neon_glue.c                 |  101 +
 arch/arm64/crypto/aes-glue.c                       |   12 +-
 arch/arm64/crypto/sha1-ce-core.S                   |   33 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |  151 +-
 arch/arm64/crypto/sha2-ce-core.S                   |   29 +-
 arch/arm64/crypto/sha2-ce-glue.c                   |  227 +-
 arch/mips/cavium-octeon/crypto/Makefile            |    5 +-
 arch/mips/cavium-octeon/crypto/octeon-crypto.c     |    4 +-
 arch/mips/cavium-octeon/crypto/octeon-crypto.h     |   83 +-
 arch/mips/cavium-octeon/crypto/octeon-md5.c        |    8 -
 arch/mips/cavium-octeon/crypto/octeon-sha1.c       |  241 ++
 arch/mips/cavium-octeon/crypto/octeon-sha256.c     |  280 ++
 arch/mips/cavium-octeon/crypto/octeon-sha512.c     |  277 ++
 arch/mips/include/asm/mach-bcm63xx/bcm63xx_regs.h  |   14 -
 arch/powerpc/crypto/Makefile                       |    8 +
 arch/powerpc/crypto/aes-spe-core.S                 |  351 +++
 arch/powerpc/crypto/aes-spe-glue.c                 |  512 ++++
 arch/powerpc/crypto/aes-spe-keys.S                 |  283 ++
 arch/powerpc/crypto/aes-spe-modes.S                |  630 +++++
 arch/powerpc/crypto/aes-spe-regs.h                 |   42 +
 arch/powerpc/crypto/aes-tab-4k.S                   |  331 +++
 arch/powerpc/crypto/md5-asm.S                      |  243 ++
 arch/powerpc/crypto/md5-glue.c                     |  165 ++
 arch/powerpc/crypto/sha1-spe-asm.S                 |  299 +++
 arch/powerpc/crypto/sha1-spe-glue.c                |  210 ++
 arch/powerpc/crypto/sha256-spe-asm.S               |  323 +++
 arch/powerpc/crypto/sha256-spe-glue.c              |  275 ++
 arch/x86/crypto/aesni-intel_glue.c                 |  187 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |   15 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |   15 +-
 arch/x86/crypto/cast5_avx_glue.c                   |    9 +-
 arch/x86/crypto/cast6_avx_glue.c                   |   15 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |    7 +-
 arch/x86/crypto/glue_helper.c                      |    1 -
 arch/x86/crypto/serpent_avx2_glue.c                |   15 +-
 arch/x86/crypto/serpent_avx_glue.c                 |   15 +-
 arch/x86/crypto/serpent_sse2_glue.c                |   15 +-
 arch/x86/crypto/sha-mb/sha1_mb.c                   |    9 +-
 arch/x86/crypto/sha-mb/sha1_mb_mgr_init_avx2.c     |    2 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |  139 +-
 arch/x86/crypto/sha256-avx-asm.S                   |   10 +-
 arch/x86/crypto/sha256-avx2-asm.S                  |   10 +-
 arch/x86/crypto/sha256-ssse3-asm.S                 |   10 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |  193 +-
 arch/x86/crypto/sha512-avx-asm.S                   |    6 +-
 arch/x86/crypto/sha512-avx2-asm.S                  |    6 +-
 arch/x86/crypto/sha512-ssse3-asm.S                 |    6 +-
 arch/x86/crypto/sha512_ssse3_glue.c                |  202 +-
 arch/x86/crypto/twofish_avx_glue.c                 |   15 +-
 crypto/Kconfig                                     |  142 +-
 crypto/Makefile                                    |    1 +
 crypto/ablk_helper.c                               |    3 +-
 crypto/algapi.c                                    |   42 +-
 crypto/algif_aead.c                                |  666 +++++
 crypto/algif_rng.c                                 |    2 +-
 crypto/ansi_cprng.c                                |    6 +-
 crypto/api.c                                       |   10 +
 crypto/cryptd.c                                    |   49 +-
 crypto/crypto_user.c                               |   39 +-
 crypto/drbg.c                                      |   64 +-
 crypto/mcryptd.c                                   |   25 +-
 crypto/proc.c                                      |    3 +
 crypto/sha1_generic.c                              |  102 +-
 crypto/sha256_generic.c                            |  133 +-
 crypto/sha512_generic.c                            |  123 +-
 crypto/tcrypt.c                                    |    4 +-
 crypto/testmgr.c                                   |   24 +-
 drivers/char/hw_random/Kconfig                     |   13 +
 drivers/char/hw_random/Makefile                    |    1 +
 drivers/char/hw_random/bcm63xx-rng.c               |  120 +-
 drivers/char/hw_random/core.c                      |   45 +-
 drivers/char/hw_random/exynos-rng.c                |   12 +-
 drivers/char/hw_random/iproc-rng200.c              |  239 ++
 drivers/char/hw_random/msm-rng.c                   |   11 +-
 drivers/char/hw_random/octeon-rng.c                |    4 +-
 drivers/char/hw_random/omap-rng.c                  |   23 +-
 drivers/char/hw_random/pseries-rng.c               |    4 +-
 drivers/char/hw_random/xgene-rng.c                 |   10 +
 drivers/crypto/Kconfig                             |   24 +-
 drivers/crypto/Makefile                            |    2 +
 drivers/crypto/amcc/crypto4xx_core.c               |    6 +-
 drivers/crypto/atmel-aes.c                         |   26 +-
 drivers/crypto/atmel-sha.c                         |   37 +-
 drivers/crypto/atmel-tdes.c                        |    3 +-
 drivers/crypto/caam/caamhash.c                     |    1 +
 drivers/crypto/caam/caamrng.c                      |    6 +-
 drivers/crypto/ccp/Makefile                        |    9 +-
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c           |   12 +-
 drivers/crypto/ccp/ccp-crypto-aes-xts.c            |    4 +-
 drivers/crypto/ccp/ccp-crypto-aes.c                |    3 +-
 drivers/crypto/ccp/ccp-crypto-main.c               |    5 +-
 drivers/crypto/ccp/ccp-crypto-sha.c                |   12 +-
 drivers/crypto/ccp/ccp-crypto.h                    |    3 -
 drivers/crypto/ccp/ccp-dev.c                       |    7 +-
 drivers/crypto/ccp/ccp-dev.h                       |   12 +-
 drivers/crypto/ccp/ccp-ops.c                       |   24 +-
 drivers/crypto/ccp/ccp-pci.c                       |   21 +-
 drivers/crypto/ccp/ccp-platform.c                  |  111 +-
 drivers/crypto/img-hash.c                          | 1029 +++++++
 drivers/crypto/mxs-dcp.c                           |    2 +-
 drivers/crypto/omap-aes.c                          |   14 +-
 drivers/crypto/omap-sham.c                         |    2 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    1 -
 drivers/crypto/qat/qat_common/adf_accel_engine.c   |   35 +-
 drivers/crypto/qat/qat_common/adf_aer.c            |   21 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |    5 +-
 drivers/crypto/qat/qat_common/adf_cfg_strings.h    |   10 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    2 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |   66 +-
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |    3 +-
 drivers/crypto/qat/qat_common/adf_init.c           |   88 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |   31 +-
 .../crypto/qat/qat_common/adf_transport_debug.c    |    2 +
 drivers/crypto/qat/qat_common/icp_qat_hw.h         |    2 +-
 drivers/crypto/qat/qat_common/qat_crypto.c         |    9 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |    6 +-
 drivers/crypto/qat/qat_dh895xcc/adf_admin.c        |    3 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |    3 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |    6 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |    4 +-
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c          |   15 +-
 drivers/crypto/sahara.c                            |   51 +-
 drivers/crypto/talitos.c                           |   17 +-
 drivers/crypto/ux500/hash/hash_core.c              |    2 +-
 drivers/crypto/vmx/Kconfig                         |    8 +
 drivers/crypto/vmx/Makefile                        |   19 +
 drivers/crypto/vmx/aes.c                           |  139 +
 drivers/crypto/vmx/aes_cbc.c                       |  184 ++
 drivers/crypto/vmx/aes_ctr.c                       |  167 ++
 drivers/crypto/vmx/aesp8-ppc.h                     |   20 +
 drivers/crypto/vmx/aesp8-ppc.pl                    | 1930 ++++++++++++++
 drivers/crypto/vmx/ghash.c                         |  214 ++
 drivers/crypto/vmx/ghashp8-ppc.pl                  |  228 ++
 drivers/crypto/vmx/ppc-xlate.pl                    |  207 ++
 drivers/crypto/vmx/vmx.c                           |   88 +
 include/crypto/algapi.h                            |    2 +-
 include/crypto/rng.h                               |    3 +-
 include/crypto/sha.h                               |   15 +-
 include/crypto/sha1_base.h                         |  106 +
 include/crypto/sha256_base.h                       |  128 +
 include/crypto/sha512_base.h                       |  131 +
 include/linux/crypto.h                             |    6 +
 include/linux/hw_random.h                          |    4 +
 lib/string.c                                       |    2 +-
 168 files changed, 18223 insertions(+), 2202 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-15  3:39                                                     ` Crypto Update for 4.1 Herbert Xu
@ 2015-04-16  1:58                                                       ` Linus Torvalds
  2015-04-16  2:37                                                         ` Linus Torvalds
  2015-06-22  8:44                                                       ` Crypto Update for 4.2 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16  1:58 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Apr 14, 2015 at 8:39 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 4.1:

Just a heads-up: this breaks iwlwifi for me after suspend.

I'm bisecting right now. But because this laptop is what I expect to
travel with tomorrow, I will ruthlessly revert anything I find,
because I need it to work.

             Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  1:58                                                       ` Linus Torvalds
@ 2015-04-16  2:37                                                         ` Linus Torvalds
  2015-04-16  2:38                                                           ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16  2:37 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Wed, Apr 15, 2015 at 6:58 PM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> On Tue, Apr 14, 2015 at 8:39 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>>
>> Here is the crypto update for 4.1:
>
> Just a heads-up: this breaks iwlwifi for me after suspend.

Ok, bisect completed:

    [torvalds@vaio linux]$ git bisect bad
    9c521a200bc3c12bd724e48a75c57d5358f672be is the first bad commit
    commit 9c521a200bc3c12bd724e48a75c57d5358f672be
    Author: Stephan Mueller <smueller@chronox.de>
    Date:   Thu Apr 9 12:09:55 2015 +0200

        crypto: api - remove instance when test failed
    ...

and while I have no idea *why* it breaks iwlwifi after a
suspend/resume cycle, it is 100% repeatable. The bisect zoomed right
to that commit, and reverting it on top of the current tree also makes
everything work again.

So it gets reverted. I'll be happy to test things out, but with the
merge window *and* travel, I may or may not be quick about it.

           Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  2:37                                                         ` Linus Torvalds
@ 2015-04-16  2:38                                                           ` Linus Torvalds
  2015-04-16  2:42                                                             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16  2:38 UTC (permalink / raw)
  To: Herbert Xu, Stephan Mueller
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

Oh, and I forgot to add Stephan to the email recipients list..

Sorry for the duplicate email,

          Linus

On Wed, Apr 15, 2015 at 7:37 PM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> On Wed, Apr 15, 2015 at 6:58 PM, Linus Torvalds
> <torvalds@linux-foundation.org> wrote:
>> On Tue, Apr 14, 2015 at 8:39 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>>>
>>> Here is the crypto update for 4.1:
>>
>> Just a heads-up: this breaks iwlwifi for me after suspend.
>
> Ok, bisect completed:
>
>     [torvalds@vaio linux]$ git bisect bad
>     9c521a200bc3c12bd724e48a75c57d5358f672be is the first bad commit
>     commit 9c521a200bc3c12bd724e48a75c57d5358f672be
>     Author: Stephan Mueller <smueller@chronox.de>
>     Date:   Thu Apr 9 12:09:55 2015 +0200
>
>         crypto: api - remove instance when test failed
>     ...
>
> and while I have no idea *why* it breaks iwlwifi after a
> suspend/resume cycle, it is 100% repeatable. The bisect zoomed right
> to that commit, and reverting it on top of the current tree also makes
> everything work again.
>
> So it gets reverted. I'll be happy to test things out, but with the
> merge window *and* travel, I may or may not be quick about it.
>
>            Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  2:38                                                           ` Linus Torvalds
@ 2015-04-16  2:42                                                             ` Herbert Xu
  2015-04-16  2:49                                                               ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-04-16  2:42 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Apr 15, 2015 at 07:38:29PM -0700, Linus Torvalds wrote:
>
> > Ok, bisect completed:
> >
> >     [torvalds@vaio linux]$ git bisect bad
> >     9c521a200bc3c12bd724e48a75c57d5358f672be is the first bad commit
> >     commit 9c521a200bc3c12bd724e48a75c57d5358f672be
> >     Author: Stephan Mueller <smueller@chronox.de>
> >     Date:   Thu Apr 9 12:09:55 2015 +0200
> >
> >         crypto: api - remove instance when test failed

Is CONFIG_CRYPTO_MANAGER_DISABLE_TESTS set or unset in you .config?

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  2:42                                                             ` Herbert Xu
@ 2015-04-16  2:49                                                               ` Linus Torvalds
  2015-04-16  3:07                                                                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16  2:49 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Apr 15, 2015 at 7:42 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Is CONFIG_CRYPTO_MANAGER_DISABLE_TESTS set or unset in you .config?

# CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set

I'll send you the full .config in private (no need to spam the mailing
list) in case you have any other questions about my setup.

         Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  2:49                                                               ` Linus Torvalds
@ 2015-04-16  3:07                                                                 ` Herbert Xu
  2015-04-16  3:34                                                                   ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-04-16  3:07 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Apr 15, 2015 at 07:49:01PM -0700, Linus Torvalds wrote:
> On Wed, Apr 15, 2015 at 7:42 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Is CONFIG_CRYPTO_MANAGER_DISABLE_TESTS set or unset in you .config?
> 
> # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
> 
> I'll send you the full .config in private (no need to spam the mailing
> list) in case you have any other questions about my setup.

Thanks! It actually appears to be a very simple bug that I somehow
missed during reviewing.

---8<---
The commit 9c521a200bc3c12bd724e48a75c57d5358f672be ("crypto:
api - remove instance when test failed") tried to grab a module
reference count before the module was even set.  Worse, it then
goes on to free the module reference count after it is set so
you quickly end up with a negative module reference count which
prevents people from using any instances belonging to that module.

This patch moves the module initialisation before the reference
count.

Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

diff --git a/crypto/algapi.c b/crypto/algapi.c
index 2d0a1c6..d2627a3 100644
--- a/crypto/algapi.c
+++ b/crypto/algapi.c
@@ -525,12 +525,12 @@ int crypto_register_instance(struct crypto_template *tmpl,
 	if (err)
 		return err;
 
-	if (unlikely(!crypto_mod_get(&inst->alg)))
-		return -EAGAIN;
-
 	inst->alg.cra_module = tmpl->module;
 	inst->alg.cra_flags |= CRYPTO_ALG_INSTANCE;
 
+	if (unlikely(!crypto_mod_get(&inst->alg)))
+		return -EAGAIN;
+
 	down_write(&crypto_alg_sem);
 
 	larval = __crypto_register_alg(&inst->alg);
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  3:07                                                                 ` Herbert Xu
@ 2015-04-16  3:34                                                                   ` Linus Torvalds
  2015-04-23 19:27                                                                     ` Bobby Powers
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16  3:34 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Apr 15, 2015 at 8:07 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Thanks! It actually appears to be a very simple bug that I somehow
> missed during reviewing.

Ok, this patch seems to fix it for me, so I undid my revert that I
hadn't pushed out yet, and pushed out this instead.

Thanks,

            Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-16  3:34                                                                   ` Linus Torvalds
@ 2015-04-23 19:27                                                                     ` Bobby Powers
  2015-04-23 20:10                                                                       ` Ard Biesheuvel
  0 siblings, 1 reply; 246+ messages in thread
From: Bobby Powers @ 2015-04-23 19:27 UTC (permalink / raw)
  To: Linus Torvalds, Ard Biesheuvel
  Cc: Herbert Xu, Stephan Mueller, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List


[-- Attachment #1: Type: text/plain, Size: 694 bytes --]

Hello,

Linus Torvalds <torvalds@linux-foundation.org> wrote:
> Ok, this patch seems to fix it for me, so I undid my revert that I
> hadn't pushed out yet, and pushed out this instead.

Commit e68410ebf62676dfb93aafff7c55b76644f37072 in Linus's tree from
this crpyto update (crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3
implementation to base layer) causes a GPF on boot in
sha512_ssse3_finup for me on a Broadwell i7-5600U, rendering the
kernel unbootable.

Reverting that commit enables me to boot.  I don't know enough about
the code to comment.  Config is attached, and I can provide a photo of
the reported Call Trace if thats helpful.  It is quite reproducible
for me.

yours,
Bobby

[-- Attachment #2: config --]
[-- Type: application/octet-stream, Size: 122699 bytes --]

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-23 19:27                                                                     ` Bobby Powers
@ 2015-04-23 20:10                                                                       ` Ard Biesheuvel
  2015-04-23 21:35                                                                         ` Bobby Powers
  0 siblings, 1 reply; 246+ messages in thread
From: Ard Biesheuvel @ 2015-04-23 20:10 UTC (permalink / raw)
  To: Bobby Powers
  Cc: Linus Torvalds, Herbert Xu, Stephan Mueller, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On 23 April 2015 at 21:27, Bobby Powers <bobbypowers@gmail.com> wrote:
> Hello,
>
> Linus Torvalds <torvalds@linux-foundation.org> wrote:
>> Ok, this patch seems to fix it for me, so I undid my revert that I
>> hadn't pushed out yet, and pushed out this instead.
>
> Commit e68410ebf62676dfb93aafff7c55b76644f37072 in Linus's tree from
> this crpyto update (crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3
> implementation to base layer) causes a GPF on boot in
> sha512_ssse3_finup for me on a Broadwell i7-5600U, rendering the
> kernel unbootable.
>
> Reverting that commit enables me to boot.  I don't know enough about
> the code to comment.  Config is attached, and I can provide a photo of
> the reported Call Trace if thats helpful.  It is quite reproducible
> for me.
>

Hello Bobby,

Would you be able to check whether the following patch fixes the crash?

diff --git a/arch/x86/crypto/sha512-avx2-asm.S
b/arch/x86/crypto/sha512-avx2-asm.S
index a4771dcd1fcf..1f20b35d8573 100644
--- a/arch/x86/crypto/sha512-avx2-asm.S
+++ b/arch/x86/crypto/sha512-avx2-asm.S
@@ -79,7 +79,7 @@ NUM_BLKS    = %rdx
 c           = %rcx
 d           = %r8
 e           = %rdx
-y3          = %rdi
+y3          = %rsi

 TBL   = %rbp

If not, please share the call trace and the content of /proc/cpuinfo

Regards,
Ard.

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.1
  2015-04-23 20:10                                                                       ` Ard Biesheuvel
@ 2015-04-23 21:35                                                                         ` Bobby Powers
  2015-04-24  6:37                                                                           ` [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change Ard Biesheuvel
  0 siblings, 1 reply; 246+ messages in thread
From: Bobby Powers @ 2015-04-23 21:35 UTC (permalink / raw)
  To: Ard Biesheuvel
  Cc: Linus Torvalds, Herbert Xu, Stephan Mueller, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Apr 23, 2015 at 4:10 PM, Ard Biesheuvel
<ard.biesheuvel@linaro.org> wrote:
>
> Hello Bobby,
>
> Would you be able to check whether the following patch fixes the crash?
>
> diff --git a/arch/x86/crypto/sha512-avx2-asm.S
> b/arch/x86/crypto/sha512-avx2-asm.S
> index a4771dcd1fcf..1f20b35d8573 100644
> --- a/arch/x86/crypto/sha512-avx2-asm.S
> +++ b/arch/x86/crypto/sha512-avx2-asm.S
> @@ -79,7 +79,7 @@ NUM_BLKS    = %rdx
>  c           = %rcx
>  d           = %r8
>  e           = %rdx
> -y3          = %rdi
> +y3          = %rsi
>
>  TBL   = %rbp
>

Tested-By: Bobby Powers <bobbypowers@gmail.com>


Thanks Ard.  Yes, this fixes things for me.  Good eye :)

yours,
Bobby

^ permalink raw reply	[flat|nested] 246+ messages in thread

* [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change
  2015-04-23 21:35                                                                         ` Bobby Powers
@ 2015-04-24  6:37                                                                           ` Ard Biesheuvel
  2015-04-24 12:20                                                                             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Ard Biesheuvel @ 2015-04-24  6:37 UTC (permalink / raw)
  To: linux-crypto, herbert, torvalds, smueller, davem, linux-kernel,
	bobbypowers
  Cc: Ard Biesheuvel

Patch e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512
SSSE3 implementation to base layer") changed the prototypes of the
core asm SHA-512 implementations so that they are compatible with
the prototype used by the base layer.

However, in one instance, the register that was used for passing the
input buffer was reused as a scratch register later on in the code,
and since the input buffer param changed places with the digest param
-which needs to be written back before the function returns- this
resulted in the scratch register to be dereferenced in a memory write
operation, causing a GPF.

Fix this by changing the scratch register to use the same register as
the input buffer param again.

Fixes: e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer")
Reported-By: Bobby Powers <bobbypowers@gmail.com>
Tested-By: Bobby Powers <bobbypowers@gmail.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
---
 arch/x86/crypto/sha512-avx2-asm.S | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/crypto/sha512-avx2-asm.S b/arch/x86/crypto/sha512-avx2-asm.S
index a4771dcd1fcf..1f20b35d8573 100644
--- a/arch/x86/crypto/sha512-avx2-asm.S
+++ b/arch/x86/crypto/sha512-avx2-asm.S
@@ -79,7 +79,7 @@ NUM_BLKS    = %rdx
 c           = %rcx
 d           = %r8
 e           = %rdx
-y3          = %rdi
+y3          = %rsi
 
 TBL   = %rbp
 
-- 
1.8.3.2

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change
  2015-04-24  6:37                                                                           ` [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change Ard Biesheuvel
@ 2015-04-24 12:20                                                                             ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-04-24 12:20 UTC (permalink / raw)
  To: Ard Biesheuvel
  Cc: linux-crypto, torvalds, smueller, davem, linux-kernel, bobbypowers

On Fri, Apr 24, 2015 at 08:37:09AM +0200, Ard Biesheuvel wrote:
> Patch e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512
> SSSE3 implementation to base layer") changed the prototypes of the
> core asm SHA-512 implementations so that they are compatible with
> the prototype used by the base layer.
> 
> However, in one instance, the register that was used for passing the
> input buffer was reused as a scratch register later on in the code,
> and since the input buffer param changed places with the digest param
> -which needs to be written back before the function returns- this
> resulted in the scratch register to be dereferenced in a memory write
> operation, causing a GPF.
> 
> Fix this by changing the scratch register to use the same register as
> the input buffer param again.
> 
> Fixes: e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer")
> Reported-By: Bobby Powers <bobbypowers@gmail.com>
> Tested-By: Bobby Powers <bobbypowers@gmail.com>
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>

Patch applied.  Thanks!
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-01-07  2:17                                                       ` Herbert Xu
  2015-01-20  0:52                                                         ` Herbert Xu
  2015-03-09  5:19                                                         ` Crypto Fixes for 4.0 Herbert Xu
@ 2015-04-25  8:03                                                         ` Herbert Xu
  2015-05-05 10:06                                                           ` Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-04-25  8:03 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem with img-hash under non-standard
configurations and a serious regression with sha512_ssse3 which can
lead to boot failures.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Ard Biesheuvel (1):
      crypto: x86/sha512_ssse3 - fixup for asm function prototype change

Geert Uytterhoeven (1):
      crypto: img-hash - CRYPTO_DEV_IMGTEC_HASH should depend on HAS_DMA

 arch/x86/crypto/sha512-avx2-asm.S |    2 +-
 drivers/crypto/Kconfig            |    3 ++-
 2 files changed, 3 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-04-25  8:03                                                         ` Crypto Fixes for 4.1 Herbert Xu
@ 2015-05-05 10:06                                                           ` Herbert Xu
  2015-05-11  5:56                                                             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-05 10:06 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem with bcm63xx and yet another fix
to the memzero_explicit function to ensure that the memset is not
elided.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Daniel Borkmann (1):
      lib: make memzero_explicit more robust against dead store elimination

Álvaro Fernández Rojas (1):
      hwrng: bcm63xx - Fix driver compilation

 drivers/char/hw_random/bcm63xx-rng.c |   18 +++++++++---------
 include/linux/compiler-gcc.h         |   16 +++++++++++++++-
 include/linux/compiler-intel.h       |    3 +++
 include/linux/compiler.h             |    4 ++++
 lib/string.c                         |    2 +-
 5 files changed, 32 insertions(+), 11 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-05-05 10:06                                                           ` Herbert Xu
@ 2015-05-11  5:56                                                             ` Herbert Xu
  2015-05-20  6:54                                                               ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-11  5:56 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a the implementation of CRC32 on arm64 where it
incorrectly applied negation on the result.  It also fixes the
arm64 implementations of SHA/SHA256 where in some cases it may
end up finalising the result twice.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Ard Biesheuvel (3):
      crypto: arm64/crc32 - bring in line with generic CRC32
      crypto: arm64/sha1-ce - prevent asm code finalization in final() path
      crypto: arm64/sha2-ce - prevent asm code finalization in final() path

 arch/arm64/crypto/crc32-arm64.c  |   22 +++++++++++++++++++---
 arch/arm64/crypto/sha1-ce-glue.c |    3 +++
 arch/arm64/crypto/sha2-ce-glue.c |    3 +++
 3 files changed, 25 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-05-11  5:56                                                             ` Herbert Xu
@ 2015-05-20  6:54                                                               ` Herbert Xu
  2015-05-22  4:05                                                                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-20  6:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a the crash in the newly added algif_aead interface
when it tries to link SG lists.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Tadeusz Struk (1):
      crypto: algif_aead - fix invalid sgl linking

 crypto/algif_aead.c |    9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-05-20  6:54                                                               ` Herbert Xu
@ 2015-05-22  4:05                                                                 ` Herbert Xu
  2015-05-22 21:29                                                                   ` Linus Torvalds
  2015-05-26  8:43                                                                   ` Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-05-22  4:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* Crash in the newly added algif_aead interface when it tries to
  link SG lists.

* ICV corruption in s390/ghash when the same tfm is used by more
  than one thread.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

or

master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Harald Freudenberger (1):
      crypto: s390/ghash - Fix incorrect ghash icv buffer handling.

Tadeusz Struk (1):
      crypto: algif_aead - fix invalid sgl linking

 arch/s390/crypto/ghash_s390.c |   25 +++++++++++++------------
 crypto/algif_aead.c           |    9 ++++-----
 2 files changed, 17 insertions(+), 17 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.1
  2015-05-22  4:05                                                                 ` Herbert Xu
@ 2015-05-22 21:29                                                                   ` Linus Torvalds
  2015-05-22 21:39                                                                     ` Herbert Xu
  2015-05-26  8:43                                                                   ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-05-22 21:29 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, May 21, 2015 at 9:05 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> or
>
> master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git

Mind fixing your script to not have that old "master.kernel.org' thing
that no longer works and hasn't worked in a long time? I thought I
asked you earlier, but it turns out that was Dmitry and the input tree
who had the same old script...

               Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.1
  2015-05-22 21:29                                                                   ` Linus Torvalds
@ 2015-05-22 21:39                                                                     ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-05-22 21:39 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, May 22, 2015 at 02:29:11PM -0700, Linus Torvalds wrote:
> On Thu, May 21, 2015 at 9:05 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Please pull from
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> >
> > or
> >
> > master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> 
> Mind fixing your script to not have that old "master.kernel.org' thing
> that no longer works and hasn't worked in a long time? I thought I
> asked you earlier, but it turns out that was Dmitry and the input tree
> who had the same old script...

Sure I'll get rid of it.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-05-22  4:05                                                                 ` Herbert Xu
  2015-05-22 21:29                                                                   ` Linus Torvalds
@ 2015-05-26  8:43                                                                   ` Herbert Xu
  2015-06-18  3:43                                                                     ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-26  8:43 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push disables the newly (4.1) added user-space AEAD interface
so that we can fix issues in the underlying kernel AEAD interface.
Once the new kernel AEAD interface is ready we can then reenable
the user-space AEAD interface.
 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: algif_aead - Disable AEAD user-space for now

 crypto/Kconfig |    9 ---------
 1 file changed, 9 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.1
  2015-05-26  8:43                                                                   ` Herbert Xu
@ 2015-06-18  3:43                                                                     ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-18  3:43 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

1) Crash in caam hash due to uninitialised buffer lengths.
2) Alignment issue in caam RNG that may lead to non-random output.

Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Steve Cornelius (2):
      crypto: caam - improve initalization for context state saves
      crypto: caam - fix RNG buffer cache alignment

 drivers/crypto/caam/caamhash.c |    2 ++
 drivers/crypto/caam/caamrng.c  |    2 +-
 2 files changed, 3 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 4.2
  2015-04-15  3:39                                                     ` Crypto Update for 4.1 Herbert Xu
  2015-04-16  1:58                                                       ` Linus Torvalds
@ 2015-06-22  8:44                                                       ` Herbert Xu
  2015-06-23  4:26                                                         ` Linus Torvalds
                                                                           ` (2 more replies)
  1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-22  8:44 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 4.2:

API:

* Convert RNG interface to new style.
* New AEAD interface with one SG list for AD and plain/cipher text.
  All external AEAD users have been converted.
* New asymmetric key interface (akcipher).

Algorithms:
* Chacha20, Poly1305 and RFC7539 support.
* New RSA implementation.
* Jitter RNG.
* DRBG is now seeded with both /dev/random and Jitter RNG.  If
  kernel pool isn't ready then DRBG will be reseeded when it is.
* DRBG is now the default crypto API RNG, replacing krng.
* 842 compression (previously part of powerpc nx driver).

Drivers:

* Accelerated SHA-512 for arm64.
* New Marvell CESA driver that supports DMA and more algorithms.
* Updated powerpc nx 842 support.
* Added support for SEC1 hardware to talitos.

 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Allan, Bruce W (2):
      crypto: qat - do not duplicate string containing firmware name
      crypto: qat - add driver version

Ard Biesheuvel (3):
      crypto: testmgr - add test cases for CRC32
      crypto: arm/sha512 - accelerated SHA-512 using ARM generic ASM and NEON
      crypto: arm/aes - streamline AES-192 code path

Arnaud Ebalard (4):
      crypto: marvell/cesa - add Triple-DES support
      crypto: marvell/cesa - add MD5 support
      crypto: marvell/cesa - add SHA256 support
      crypto: marvell/cesa - add support for Kirkwood and Dove SoCs

Boris BREZILLON (11):
      crypto: mv_cesa - request registers memory region
      crypto: mv_cesa - document the clocks property
      crypto: mv_cesa - use gen_pool to reserve the SRAM memory region
      crypto: mv_cesa - explicitly define kirkwood and dove compatible strings
      crypto: marvell/cesa - add a new driver for Marvell's CESA
      crypto: marvell/cesa - add TDMA support
      crypto: marvell/cesa - add DES support
      crypto: marvell/cesa - add support for all armada SoCs
      crypto: marvell/cesa - add allhwsupport module parameter
      crypto: marvell/cesa - add support for Orion SoCs
      crypto: marvell/cesa - add DT bindings documentation

Boris Brezillon (1):
      crypto: marvell/cesa - remove COMPILE_TEST dependency

Colin Ian King (1):
      crypto: mv_cesa - ensure backlog is initialised

Dan Carpenter (1):
      crypto: talitos - fix size calculation in talitos_edesc_alloc()

Dan Streetman (19):
      powerpc: export of_get_ibm_chip_id function
      powerpc: Add ICSWX instruction
      lib: add software 842 compression/decompression
      crypto: 842 - change 842 alg to use software
      crypto: nx - rename nx-842.c to nx-842-pseries.c
      crypto: nx - add NX-842 platform frontend driver
      crypto: nx - add nx842 constraints
      crypto: nx - add PowerNV platform NX-842 driver
      crypto: nx - simplify pSeries nx842 driver
      crypto: nx - add hardware 842 crypto comp alg
      lib: make lib/842 decompress functions static
      lib: correct 842 decompress for 32 bit
      crypto: nx - remove 842-nx null checks
      crypto: nx - prevent nx 842 load if no hw driver
      crypto: nx - fix nx-842 pSeries driver minimum buffer size
      crypto: nx - move include/linux/nx842.h into drivers/crypto/nx/nx-842.h
      crypto: nx - replace NX842_MEM_COMPRESS with function
      crypto: nx - add LE support to pSeries platform driver
      MAINTAINERS: clarify drivers/crypto/nx/ file ownership

David Howells (2):
      crypto: pcomp - Constify (de)compression parameters
      crypto: testmgr - Wrap the LHS in expressions of the form !x == y

Fabio Estevam (1):
      crypto: sahara - propagate the error on clk_disable_unprepare() failure

Harald Freudenberger (1):
      crypto: testmgr - Added one larger ghash testvector (400 bytes) to the testmgr.

Herbert Xu (166):
      crypto: drbg - Initialise mutex in drbg_healthcheck_sanity
      crypto: drbg - Do not seed RNG in drbg_kcapi_init
      crypto: api - Add crypto_alg_extsize helper
      crypto: shash - Use crypto_alg_extsize helper
      crypto: pcomp - Use crypto_alg_extsize helper
      crypto: rng - Convert crypto_rng to new style crypto_type
      crypto: rng - Introduce crypto_rng_generate
      crypto: rng - Mark crypto_rng_reset seed as const
      crypto: rng - Convert low-level crypto_rng to new style
      crypto: rng - Add crypto_rng_set_entropy
      crypto: rng - Add multiple algorithm registration interface
      crypto: drbg - Convert to new rng interface
      crypto: ansi_cprng - Remove bogus inclusion of internal.h
      crypto: ansi_cprng - Convert to new rng interface
      crypto: krng - Convert to new rng interface
      crypto: rng - Remove old low-level rng interface
      crypto: algif_rng - Remove obsolete const-removal cast
      crypto: rng - Zero seed in crypto_rng_reset
      crypto: tcrypt - Handle async return from crypto_ahash_init
      crypto: api - Move module sig ifdef into accessor function
      crypto: drbg - Remove FIPS ifdef from drbg_healthcheck_sanity
      crypto: caam - Remove bogus references to crypto API internals
      crypto: api - Include linux/fips.h
      crypto: fips - Remove bogus inclusion of internal.h
      crypto: fips - Move fips_enabled sysctl into fips.c
      crypto: tcrypt - Include linux/fips.h for fips_enabled
      crypto: testmgr - Include linux/fips.h for fips_enabled
      crypto: api - Remove linux/fips.h from internal.h
      crypto: arm64/aes-ce-ccm - Include crypto/internal/aead.h
      crypto: algif_aead - Include crypto/aead.h
      crypto: tcrypt - Include crypto/aead.h
      crypto: testmgr - Include crypto/aead.h
      mac80211: Include crypto/aead.h
      mac802154: Include crypto/aead.h
      crypto: api - Fix build error when modules are disabled
      crypto: skcipher - Fix corner case in crypto_lookup_skcipher
      crypto: aead - Fix corner case in crypto_lookup_aead
      crypto: api - Add crypto_grab_spawn primitive
      crypto: authenc - Include internal/aead.h
      crypto: authencesn - Include internal/aead.h
      crypto: caam - Include internal/aead.h
      crypto: ixp4xx - Include internal/aead.h
      crypto: nx - Include internal/aead.h
      crypto: qat - Include internal/aead.h
      crypto: talitos - Include internal/aead.h
      crypto: blkcipher - Include crypto/aead.h
      crypto: caam - Remove unnecessary reference to crt_aead
      crypto: aead - Add crypto_aead_set_reqsize helper
      crypto: authenc - Use crypto_aead_set_reqsize helper
      crypto: authencesn - Use crypto_aead_set_reqsize helper
      crypto: ccm - Use crypto_aead_set_reqsize helper
      crypto: cryptd - Use crypto_aead_set_reqsize helper
      crypto: gcm - Use crypto_aead_set_reqsize helper
      crypto: pcrypt - Use crypto_aead_set_reqsize helper
      crypto: seqiv - Use crypto_aead_set_reqsize helper
      crypto: aesni - Use crypto_aead_set_reqsize helper
      crypto: ixp4xx - Use crypto_aead_set_reqsize helper
      crypto: picoxcell - Use crypto_aead_set_reqsize helper
      crypto: qat - Use crypto_aead_set_reqsize helper
      crypto: cryptd - Add missing aead.h inclusion
      crypto: aead - Convert top level interface to new style
      crypto: cryptd - Use crypto_grab_aead
      crypto: pcrypt - Use crypto_grab_aead
      crypto: scatterwalk - Add scatterwalk_ffwd helper
      crypto: aead - Add new interface with single SG list
      crypto: aead - Rename aead_alg to old_aead_alg
      crypto: caam - Use old_aead_alg
      crypto: aead - Add crypto_aead_maxauthsize
      crypto: ixp4xx - Use crypto_aead_maxauthsize
      crypto: nx - Remove unnecessary maxauthsize check
      crypto: aead - Add support for new AEAD implementations
      crypto: null - Add default null skcipher
      crypto: gcm - Use default null skcipher
      crypto: scatterwalk - Check for same address in map_and_copy
      crypto: seqiv - Add support for new AEAD interface
      crypto: seqiv - Add seqniv
      crypto: echainiv - Add encrypted chain IV generator
      crypto: aead - Add crypto_aead_alg_ivsize/maxauthsize
      crypto: pcrypt - Make tfm_count an atomic_t
      crypto: skcipher - Use tmpl->create
      crypto: aead - Use tmpl->create
      crypto: seqiv - Use aead_register_instance
      crypto: echainiv - Use aead_register_instance
      crypto: aead - Do not set cra_type for new style instances
      crypto: echainiv - Stop using cryptoff
      crypto: seqiv - Stop using cryptoff
      crypto: aead - Remove unused cryptoff parameter
      random: Wake up all getrandom(2) callers when pool is ready
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
      crypto: aead - Document behaviour of AD in destination buffer
      crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd
      crypto: aead - Preserve in-place processing in old_crypt
      crypto: aead - Add common IV generation code
      crypto: echainiv - Copy AD along with plain text
      crypto: echainiv - Use common IV generation code
      crypto: echainiv - Fix IV size in context size calculation
      crypto: seqiv - Copy AD along with plain/cipher text
      crypto: seqiv - Use common IV generation code
      crypto: seqiv - Fix IV size in context size calculation
      crypto: seqiv - Fix module unload/reload crash
      crypto: testmgr - Switch to new AEAD interface
      xfrm: Add IV generator information to xfrm_algo_desc
      ipsec: Add IV generator information to xfrm_state
      esp4: Switch to new AEAD interface
      esp6: Switch to new AEAD interface
      mac802154: Switch to new AEAD interface
      mac80211: Switch to new AEAD interface
      crypto: tcrypt - Switch to new AEAD interface
      crypto: algif_aead - Switch to new AEAD interface
      Revert "crypto: algif_aead - Disable AEAD user-space for now"
      crypto: aead - Add type-safe init/exit functions
      crypto: aead - Add aead_alg_instance
      crypto: api - Include alignment in crypto_alg_extsize
      crypto: aead - Ignore return value from crypto_unregister_alg
      crypto: aead - Add multiple algorithm registration interface
      crypto: pcrypt - Add support for new AEAD interface
      crypto: cryptd - Add setkey/setauthsize functions for AEAD
      crypto: aesni - Convert top-level rfc4106 algorithm to new interface
      crypto: cryptd - Convert to new AEAD interface
      crypto: aesni - Convert rfc4106 to new AEAD interface
      crypto: scatterwalk - Hide PageSlab call to optimise away flush_dcache_page
      crypto: chainiv - Move IV seeding into init function
      crypto: echainiv - Move IV seeding into init function
      crypto: eseqiv - Move IV seeding into init function
      crypto: seqiv - Move IV seeding into init function
      crypto: drbg - Add stdrng alias and increase priority
      crypto: echainiv - Set Kconfig default to m
      crypto: rng - Make DRBG the default RNG
      crypto: rng - Remove krng
      crypto: caam - Clamp AEAD SG list by input length
      nios2: Export get_cycles
      random: Add callback API for random pool readiness
      random: Remove kernel blocking API
      crypto: drbg - Add select on sha256
      crypto: picoxcell - Include linux/sizes.h
      crypto: picoxcell - Make use of sg_nents_for_len
      crypto: picoxcell - Clamp AEAD SG list by input length
      crypto: vmx - Remove duplicate PPC64 dependency
      crypto: vmx - Reindent to kernel style
      crypto: testmgr - Disable rfc4543 test
      crypto: gcm - Convert to new AEAD interface
      crypto: testmgr - Update rfc4543 test vectors
      crypto: nx - Convert GCM to new AEAD interface
      crypto: caam - Handle errors in dma_map_sg_chained
      crypto: caam - Convert GCM to new AEAD interface
      Revert "crypto: testmgr - Disable rfc4543 test"
      crypto: testmgr - Add mcgrew test vectors for rfc4106
      crypto: tcrypt - Add rfc4309(ccm(aes)) speed test
      crypto: tcrypt - Fixed AEAD speed test setup
      crypto: drivers - Fix Kconfig selects
      crypto: api - Add CRYPTO_MINALIGN_ATTR to struct crypto_alg
      crypto: aead - Fix aead_instance struct size
      crypto: caam - Reintroduce DESC_MAX_USED_BYTES
      crypto: caam - Set last bit on src SG list
      Merge branch 'mvebu/drivers' of git://git.kernel.org/pub/scm/linux/kernel/git/arm/arm-soc
      crypto: nx - Check for bogus firmware properties
      crypto: skcipher - Allow givencrypt to be NULL
      crypto: rng - Do not free default RNG when it becomes unused
      crypto: user - Move cryptouser.h to uapi
      crypto: user - Add CRYPTO_MSG_DELRNG
      crypto: chainiv - Offer normal cipher functionality without RNG
      crypto: eseqiv - Offer normal cipher functionality without RNG
      crypto: seqiv - Add compatibility support without RNG
      crypto: echainiv - Only hold RNG during initialisation
      crypto: af_alg - Forbid the use internal algorithms
      crypto: algif_aead - Temporarily disable all AEAD algorithms

Horia Geant? (4):
      crypto: talitos - avoid memleak in talitos_alg_alloc()
      Revert "crypto: talitos - convert to use be16_add_cpu()"
      crypto: talitos - avoid out of bound scatterlist iterator
      crypto: talitos - static code checker fixes

Jeremiah Mahler (1):
      crypto: aesni - fix crypto_fpu_exit() section mismatch

LABBE Corentin (7):
      crypto: md5 - add MD5 initial vectors
      crypto: md5 - use md5 IV MD5_HX instead of their raw value
      crypto: powerpc/md5 - use md5 IV MD5_HX instead of their raw value
      crypto: sparc/md5 - use md5 IV MD5_HX instead of their raw value
      crypto: n2 - use md5 IV MD5_HX instead of their raw value
      crypto: octeon - use md5 IV MD5_HX instead of their raw value
      crypto: testmgr - Document struct cipher_testvec

LEROY Christophe (17):
      crypto: talitos - Use zero entry to init descriptors ptrs to zero
      crypto: talitos - Refactor the sg in/out chain allocation
      crypto: talitos - talitos_ptr renamed ptr for more lisibility
      crypto: talitos - Add a helper function to clear j_extent field
      crypto: talitos - remove param 'extent' in map_single_talitos_ptr()
      crypto: talitos - helper function for ptr len
      crypto: talitos - enhanced talitos_desc struct for SEC1
      crypto: talitos - add sub-choice in talitos CONFIG for SEC1
      crypto: talitos - Add a feature to tag SEC1
      crypto: talitos - fill in talitos descriptor iaw SEC1 or SEC2+
      crypto: talitos - adaptation of talitos_submit() for SEC1
      crypto: talitos - base address for Execution Units
      crypto: talitos - adapt interrupts and reset functions to SEC1
      crypto: talitos - implement scatter/gather copy for SEC1
      crypto: talitos - SEC1 bugs on 0 data hash
      crypto: talitos - Add fsl,sec1.0 compatible
      crypto: talitos - Update DT bindings with SEC1

Leonidas Da Silva Barbosa (2):
      crypto: nx - Fixing NX data alignment with nx_sg list
      crypto: nx - Fixing SHA update bug

Martin Willi (10):
      crypto: chacha20 - Add a generic ChaCha20 stream cipher implementation
      crypto: testmgr - Add ChaCha20 test vectors from RFC7539
      crypto: poly1305 - Add a generic Poly1305 authenticator implementation
      crypto: testmgr - Add Poly1305 test vectors from RFC7539
      crypto: chacha20poly1305 - Add a ChaCha20-Poly1305 AEAD construction, RFC7539
      crypto: testmgr - Add ChaCha20-Poly1305 test vectors from RFC7539
      crypto: chacha20poly1305 - Add an IPsec variant for RFC7539 AEAD
      crypto: testmgr - Add draft-ietf-ipsecme-chacha20-poly1305 test vector
      xfrm: Define ChaCha20-Poly1305 AEAD XFRM algo for IPsec users
      crypto: poly1305 - Pass key as first two message blocks to each desc_ctx

Masanari Iida (2):
      crypto: doc - Fix typo in crypto-API.tmpl
      crypto: doc - Fix typo in crypto-API.xml

Michael van der Westhuizen (1):
      crypto: picoxcell - Update to the current clk API

Pali Rohár (2):
      crypto: omap-sham - Check for return value from pm_runtime_get_sync
      crypto: omap-sham - Add support for omap3 devices

Paulo Flabiano Smorigo (1):
      crypto: vmx - fix two mistyped texts

Sergey Senozhatsky (1):
      crypto: drbg - report backend_cra_name when allocation fails

Steffen Trumtrar (1):
      crypto: caam - fix non-64-bit write/read access

Stephan Mueller (15):
      cryoto: drbg - clear all temporary memory
      crypto: drbg - fix drbg_generate return val check
      crypto: drbg - replace spinlock with mutex
      crypto: drbg - leave cipher handles operational
      crypto: doc - change header file locations
      random: Blocking API for accessing nonblocking_pool
      crypto: drbg - prepare for async seeding
      crypto: drbg - add async seeding operation
      crypto: drbg - use Jitter RNG to obtain seed
      crypto: jitterentropy - add jitterentropy RNG
      crypto: jitterentropy - remove timekeeping_valid_for_hres
      crypto: doc - cover new AEAD interface
      crypto: drbg - use pragmas for disabling optimization
      crypto: drbg - Use callback API for random readiness
      crypto: drbg - reseed often if seedsource is degraded

Tadeusz Struk (9):
      crypto: qat - remove unused structure members
      crypto: qat - rm unneeded header include
      crypto: qat - Set max request size
      crypto: qat: fix issue when mapping assoc to internal AD struct
      MPILIB: add mpi_read_buf() and mpi_get_size() helpers
      crypto: akcipher - add PKE API
      crypto: rsa - add a new rsa generic implementation
      crypto: testmgr - add tests vectors for RSA
      crypto: rsa - fix invalid select for AKCIPHER

Tom Lendacky (4):
      crypto: ccp - Remove manual check and set of dma_mask pointer
      crypto: ccp - Remove unused structure field
      scatterlist: introduce sg_nents_for_len
      crypto: ccp - Protect against poorly marked end of sg list

Victoria Milhoan (2):
      crypto: caam - Fix incorrect size when DMA unmapping buffer
      crypto: caam - Provide correct value to iounmap() in controller driver

Wu Fengguang (1):
      crypto: echainiv - echainiv_read_iv() can be static

firo yang (1):
      crypto: sha1-mb - Remove pointless cast

 Documentation/DocBook/crypto-API.tmpl              |   67 +-
 .../devicetree/bindings/crypto/fsl-sec2.txt        |    6 +-
 .../devicetree/bindings/crypto/marvell-cesa.txt    |   45 +
 .../devicetree/bindings/crypto/mv_cesa.txt         |   31 +-
 MAINTAINERS                                        |   26 +-
 arch/arm/boot/dts/armada-375.dtsi                  |    2 +-
 arch/arm/boot/dts/armada-38x.dtsi                  |    2 +-
 arch/arm/boot/dts/armada-39x.dtsi                  |    2 +-
 arch/arm/boot/dts/armada-xp-linksys-mamba.dts      |    5 +
 arch/arm/boot/dts/armada-xp-openblocks-ax3-4.dts   |    4 +
 arch/arm/boot/dts/dove-cubox.dts                   |    1 +
 arch/arm/crypto/Kconfig                            |   15 +-
 arch/arm/crypto/Makefile                           |   10 +-
 arch/arm/crypto/aes-ce-core.S                      |    7 +-
 arch/arm/crypto/sha512-armv4.pl                    |  649 ++++++
 arch/arm/crypto/sha512-armv7-neon.S                |  455 ----
 arch/arm/crypto/sha512-core.S_shipped              | 1861 +++++++++++++++
 arch/arm/crypto/sha512-glue.c                      |  121 +
 arch/arm/crypto/sha512-neon-glue.c                 |   98 +
 arch/arm/crypto/sha512.h                           |    8 +
 arch/arm/crypto/sha512_neon_glue.c                 |  305 ---
 arch/arm64/crypto/aes-ce-ccm-glue.c                |    2 +-
 arch/arm64/crypto/crc32-arm64.c                    |   22 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |    3 +
 arch/arm64/crypto/sha2-ce-glue.c                   |    3 +
 arch/mips/cavium-octeon/crypto/octeon-md5.c        |    8 +-
 arch/nios2/kernel/time.c                           |    2 +
 arch/powerpc/crypto/md5-glue.c                     |    8 +-
 arch/powerpc/include/asm/icswx.h                   |  184 ++
 arch/powerpc/include/asm/ppc-opcode.h              |   13 +
 arch/powerpc/kernel/prom.c                         |    1 +
 arch/s390/crypto/ghash_s390.c                      |   25 +-
 arch/sparc/crypto/md5_glue.c                       |    8 +-
 arch/x86/crypto/aesni-intel_glue.c                 |  423 ++--
 arch/x86/crypto/fpu.c                              |    2 +-
 arch/x86/crypto/sha-mb/sha1_mb.c                   |    3 +-
 crypto/842.c                                       |  174 +-
 crypto/Kconfig                                     |   97 +-
 crypto/Makefile                                    |   15 +-
 crypto/ablkcipher.c                                |   12 +-
 crypto/aead.c                                      |  684 ++++--
 crypto/af_alg.c                                    |    5 +-
 crypto/akcipher.c                                  |  117 +
 crypto/algapi.c                                    |   31 +-
 crypto/algif_aead.c                                |   79 +-
 crypto/algif_rng.c                                 |    2 +-
 crypto/ansi_cprng.c                                |   88 +-
 crypto/authenc.c                                   |   17 +-
 crypto/authencesn.c                                |   17 +-
 crypto/blkcipher.c                                 |    1 +
 crypto/ccm.c                                       |   14 +-
 crypto/chacha20_generic.c                          |  216 ++
 crypto/chacha20poly1305.c                          |  695 ++++++
 crypto/chainiv.c                                   |  105 +-
 crypto/cryptd.c                                    |  135 +-
 crypto/crypto_null.c                               |   39 +
 crypto/crypto_user.c                               |   34 +-
 crypto/drbg.c                                      |  567 ++---
 crypto/echainiv.c                                  |  312 +++
 crypto/eseqiv.c                                    |   52 +-
 crypto/fips.c                                      |   53 +-
 crypto/gcm.c                                       |  940 +++-----
 crypto/internal.h                                  |    3 +-
 crypto/jitterentropy.c                             |  928 ++++++++
 crypto/krng.c                                      |   66 -
 crypto/md5.c                                       |    8 +-
 crypto/pcompress.c                                 |    7 +-
 crypto/pcrypt.c                                    |  199 +-
 crypto/poly1305_generic.c                          |  321 +++
 crypto/proc.c                                      |   41 -
 crypto/rng.c                                       |  132 +-
 crypto/rsa.c                                       |  315 +++
 crypto/rsa_helper.c                                |  121 +
 crypto/rsakey.asn1                                 |    5 +
 crypto/scatterwalk.c                               |   45 +-
 crypto/seqiv.c                                     |  587 ++++-
 crypto/shash.c                                     |    7 +-
 crypto/tcrypt.c                                    |   36 +-
 crypto/tcrypt.h                                    |    1 +
 crypto/testmgr.c                                   |  314 ++-
 crypto/testmgr.h                                   | 2443 +++++++++++++++++++-
 crypto/zlib.c                                      |    4 +-
 drivers/bus/mvebu-mbus.c                           |  120 +-
 drivers/char/hw_random/bcm63xx-rng.c               |   18 +-
 drivers/char/random.c                              |   80 +-
 drivers/crypto/Kconfig                             |   87 +-
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/caam/Kconfig                        |    5 +-
 drivers/crypto/caam/caamalg.c                      | 1497 ++++++------
 drivers/crypto/caam/caamhash.c                     |    9 +-
 drivers/crypto/caam/compat.h                       |    2 +-
 drivers/crypto/caam/ctrl.c                         |    4 +-
 drivers/crypto/caam/regs.h                         |   38 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   50 +-
 drivers/crypto/ccp/Kconfig                         |    1 -
 drivers/crypto/ccp/ccp-ops.c                       |    9 +-
 drivers/crypto/ccp/ccp-platform.c                  |    2 -
 drivers/crypto/ixp4xx_crypto.c                     |    9 +-
 drivers/crypto/marvell/Makefile                    |    2 +
 drivers/crypto/marvell/cesa.c                      |  548 +++++
 drivers/crypto/marvell/cesa.h                      |  791 +++++++
 drivers/crypto/marvell/cipher.c                    |  797 +++++++
 drivers/crypto/marvell/hash.c                      | 1441 ++++++++++++
 drivers/crypto/marvell/tdma.c                      |  224 ++
 drivers/crypto/mv_cesa.c                           |   73 +-
 drivers/crypto/n2_core.c                           |    8 +-
 drivers/crypto/nx/Kconfig                          |   61 +-
 drivers/crypto/nx/Makefile                         |    9 +-
 drivers/crypto/nx/nx-842-crypto.c                  |  580 +++++
 drivers/crypto/nx/nx-842-platform.c                |   84 +
 drivers/crypto/nx/nx-842-powernv.c                 |  637 +++++
 drivers/crypto/nx/nx-842-pseries.c                 | 1140 +++++++++
 drivers/crypto/nx/nx-842.c                         | 1610 +------------
 drivers/crypto/nx/nx-842.h                         |  144 ++
 drivers/crypto/nx/nx-aes-gcm.c                     |  110 +-
 drivers/crypto/nx/nx-sha256.c                      |   84 +-
 drivers/crypto/nx/nx-sha512.c                      |   85 +-
 drivers/crypto/nx/nx.c                             |  233 +-
 drivers/crypto/nx/nx.h                             |    9 +-
 drivers/crypto/omap-sham.c                         |   27 +-
 drivers/crypto/picoxcell_crypto.c                  |   41 +-
 drivers/crypto/qat/Kconfig                         |    6 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    1 -
 drivers/crypto/qat/qat_common/adf_cfg_user.h       |   12 -
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    7 +
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    1 +
 drivers/crypto/qat/qat_common/qat_algs.c           |   39 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |    5 +-
 drivers/crypto/sahara.c                            |   13 +-
 drivers/crypto/talitos.c                           |  743 ++++--
 drivers/crypto/talitos.h                           |  153 +-
 drivers/crypto/ux500/Kconfig                       |    4 +-
 drivers/crypto/vmx/Kconfig                         |    2 +-
 drivers/crypto/vmx/Makefile                        |    2 +-
 drivers/crypto/vmx/aes.c                           |  166 +-
 drivers/crypto/vmx/aes_cbc.c                       |  236 +-
 drivers/crypto/vmx/aes_ctr.c                       |  225 +-
 drivers/crypto/vmx/aesp8-ppc.h                     |   15 +-
 drivers/crypto/vmx/ghash.c                         |  278 +--
 drivers/crypto/vmx/vmx.c                           |   68 +-
 include/crypto/aead.h                              |  533 ++++-
 include/crypto/akcipher.h                          |  340 +++
 include/crypto/algapi.h                            |   35 +-
 include/crypto/compress.h                          |    8 +-
 include/crypto/cryptd.h                            |    1 +
 include/crypto/drbg.h                              |   59 +-
 include/crypto/hash.h                              |    2 +-
 include/crypto/internal/aead.h                     |  102 +-
 include/crypto/internal/akcipher.h                 |   60 +
 include/crypto/internal/geniv.h                    |   24 +
 include/crypto/internal/rng.h                      |   21 +-
 include/crypto/internal/rsa.h                      |   27 +
 include/crypto/md5.h                               |    5 +
 include/crypto/null.h                              |    3 +
 include/crypto/rng.h                               |  100 +-
 include/crypto/scatterwalk.h                       |    4 +
 include/linux/compiler-gcc.h                       |   16 +-
 include/linux/compiler-intel.h                     |    3 +
 include/linux/compiler.h                           |    4 +
 include/linux/crypto.h                             |  501 +---
 include/linux/mbus.h                               |    5 +
 include/linux/module.h                             |   12 +
 include/linux/mpi.h                                |   15 +
 include/linux/nx842.h                              |   11 -
 include/linux/random.h                             |    9 +
 include/linux/scatterlist.h                        |    1 +
 include/linux/sw842.h                              |   12 +
 include/net/xfrm.h                                 |    3 +
 include/{ => uapi}/linux/cryptouser.h              |    6 +
 lib/842/842.h                                      |  127 +
 lib/842/842_compress.c                             |  626 +++++
 lib/842/842_debugfs.h                              |   52 +
 lib/842/842_decompress.c                           |  405 ++++
 lib/842/Makefile                                   |    2 +
 lib/Kconfig                                        |    6 +
 lib/Makefile                                       |    2 +
 lib/mpi/mpicoder.c                                 |   87 +-
 lib/mpi/mpiutil.c                                  |    6 +-
 lib/scatterlist.c                                  |   32 +
 lib/string.c                                       |    2 +-
 net/ipv4/esp4.c                                    |  200 +-
 net/ipv6/esp6.c                                    |  200 +-
 net/key/af_key.c                                   |    1 +
 net/mac80211/aes_ccm.c                             |   33 +-
 net/mac80211/aes_gcm.c                             |   33 +-
 net/mac80211/aes_gmac.c                            |   14 +-
 net/mac802154/llsec.c                              |   44 +-
 net/xfrm/xfrm_algo.c                               |   28 +
 net/xfrm/xfrm_user.c                               |   40 +-
 189 files changed, 23661 insertions(+), 7358 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.2
  2015-06-22  8:44                                                       ` Crypto Update for 4.2 Herbert Xu
@ 2015-06-23  4:26                                                         ` Linus Torvalds
  2015-06-23  4:32                                                           ` Herbert Xu
  2015-06-24  2:11                                                         ` Linus Torvalds
  2015-08-31 13:56                                                         ` Crypto Update for 4.3 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-23  4:26 UTC (permalink / raw)
  To: Herbert Xu, Steffen Klassert
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Mon, Jun 22, 2015 at 1:44 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 4.2:

So this generates conflicts with your earlier changes (that I got
through the networking tree - they are your patches, but they went
through Steffen Klassert and then David Miller).

I resolved them, but I want you to double-check the end result.

Some of the conflicts are just trivial (but annoying) conflicts due to
whitespace changes to the vmx routines.

But the changes to net/ipv4/esp4.c and net/ipv6/esp6.c are actual real
code conflicts, even though the in the merge they look like no change
at all, because I picked your side and the changes on the other side
just went away.

I did that, because ss far as I can tell, the changes in commits
7021b2e1cddd and 000ae7b2690e (that switch esp4/6 over to the new AEAD
interface) obviate the commits I got earlier to use the high-order
sequence number bits for IV generation.

So it looks to me like those AEAD interface changes already make sure
to use the full 64 bits of the sequence number.

But if I'm wrong, please holler. You clearly know both sides of this,
since you wrote all the patches involved, so I'd like you to
double-check me.

                  Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.2
  2015-06-23  4:26                                                         ` Linus Torvalds
@ 2015-06-23  4:32                                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-23  4:32 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Steffen Klassert, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Jun 22, 2015 at 09:26:51PM -0700, Linus Torvalds wrote:
>
> So it looks to me like those AEAD interface changes already make sure
> to use the full 64 bits of the sequence number.
> 
> But if I'm wrong, please holler. You clearly know both sides of this,
> since you wrote all the patches involved, so I'd like you to
> double-check me.

Yes the AEAD conversion does the right thing and uses the full 64
bits of the sequence number.  In fact it was during that conversion
when I noticed the bug and sent in a fix to Steffen.

Thanks for the heads up!
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.2
  2015-06-22  8:44                                                       ` Crypto Update for 4.2 Herbert Xu
  2015-06-23  4:26                                                         ` Linus Torvalds
@ 2015-06-24  2:11                                                         ` Linus Torvalds
  2015-06-24 13:29                                                           ` Herbert Xu
  2015-08-31 13:56                                                         ` Crypto Update for 4.3 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-24  2:11 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Mon, Jun 22, 2015 at 1:44 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 4.2:

Hmm. I noticed a new annoyance:

I get this at bootup:

  [  +0.001504] alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni)
  [  +0.002233] alg: aead: setkey failed on test 1 for
rfc4106-gcm-aesni: flags=0

in general, I'm not at all convinced that the crypto tests make sense.
I absolutely destest that horrid "testmgr.h" file that is 32
_thousand_ lines of noise. And now it's apparently complaining about a
missing test, so that nasty mess will presumably grow.

Could you not make the test infrastructure be something that gets run
in user space?

                    Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Update for 4.2
  2015-06-24  2:11                                                         ` Linus Torvalds
@ 2015-06-24 13:29                                                           ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-24 13:29 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Jun 23, 2015 at 07:11:19PM -0700, Linus Torvalds wrote:
> On Mon, Jun 22, 2015 at 1:44 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Here is the crypto update for 4.2:
> 
> Hmm. I noticed a new annoyance:
> 
> I get this at bootup:
> 
>   [  +0.001504] alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni)

This is indeed bogus and I'll make sure it disappears.

>   [  +0.002233] alg: aead: setkey failed on test 1 for
> rfc4106-gcm-aesni: flags=0

This however is a real bug.  It looks like aesni is somehow broken
and is failing on setkey.  I'll look into it.

> in general, I'm not at all convinced that the crypto tests make sense.
> I absolutely destest that horrid "testmgr.h" file that is 32
> _thousand_ lines of noise. And now it's apparently complaining about a
> missing test, so that nasty mess will presumably grow.
> 
> Could you not make the test infrastructure be something that gets run
> in user space?

I too think the current testmgr model has reached its limit.
However, it has been quite useful in catching bugs like the
one you saw which may otherwise result in hard-to-track-down
bugs in other subsystems such as IPsec or disk encryption.

What I was planning to do is to instead bundle the test vectors
with the algorithms themselves.  So for each algorithm we would
have the test vectors in the canonical C implementation which then
would be used to test every other implmenetation of that algorithm.

The test code could similarly be distributed out to the individual
types, e.g., RNG tests would go into rng.c, hash tests into ahash.c,
etc.

When this is done there would be no central repository of testing
information anymore.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.2
  2015-02-14  9:43                                                   ` Crypto Update for 3.20 Herbert Xu
  2015-04-15  3:39                                                     ` Crypto Update for 4.1 Herbert Xu
@ 2015-06-26 10:22                                                     ` Herbert Xu
  2015-06-26 20:07                                                       ` Linus Torvalds
                                                                         ` (2 more replies)
  1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-26 10:22 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* Move -O0 jitterentropy code into its own file instead of using
  gcc pragma magic.
* Kill testmgr warning for gcm-aes-aesni.
* Fix build failure in old rsa.

Other minor fixes:

* Ignore asn1 files generated by new rsa.
* Remove unnecessary kzfree NULL checks in jitterentropy.
* Typo fix in akcipher.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Alexander Kuleshov (1):
      crypto: rsa - add .gitignore for crypto/*.-asn1.[ch] files

Guenter Roeck (1):
      crypto: asymmetric_keys/rsa - Use non-conflicting variable name

Markus Elfring (1):
      crypto: jitterentropy - Delete unnecessary checks before the function call "kzfree"

Stephan Mueller (1):
      crypto: jitterentropy - avoid compiler warnings

Tadeusz Struk (2):
      crypto: akcipher - fix spelling cihper -> cipher
      crypto: testmgr - don't print info about missing test for gcm-aes-aesni

 crypto/.gitignore            |    1 +
 crypto/Makefile              |    4 +-
 crypto/akcipher.c            |    2 +-
 crypto/asymmetric_keys/rsa.c |    4 +-
 crypto/jitterentropy-kcapi.c |  208 ++++++++++++++++++++++++++++++++++++++++
 crypto/jitterentropy.c       |  215 ++++++++----------------------------------
 crypto/testmgr.c             |    4 +
 7 files changed, 256 insertions(+), 182 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.2
  2015-06-26 10:22                                                     ` Crypto Fixes for 4.2 Herbert Xu
@ 2015-06-26 20:07                                                       ` Linus Torvalds
  2015-06-27  6:56                                                         ` Herbert Xu
  2015-06-30 13:51                                                       ` Herbert Xu
  2015-09-08  9:25                                                       ` Crypto Fixes for 4.3 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-26 20:07 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Jun 26, 2015 at 3:22 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> * Kill testmgr warning for gcm-aes-aesni.

Hmm. You killed one of the warnings, but the setkey one remains.

    alg: aead: setkey failed on test 1 for rfc4106-gcm-aesni: flags=0

Expected?

               Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.2
  2015-06-26 20:07                                                       ` Linus Torvalds
@ 2015-06-27  6:56                                                         ` Herbert Xu
  2015-06-27 16:40                                                           ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-06-27  6:56 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Jun 26, 2015 at 01:07:02PM -0700, Linus Torvalds wrote:
> On Fri, Jun 26, 2015 at 3:22 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > * Kill testmgr warning for gcm-aes-aesni.
> 
> Hmm. You killed one of the warnings, but the setkey one remains.
> 
>     alg: aead: setkey failed on test 1 for rfc4106-gcm-aesni: flags=0
> 
> Expected?

I wanted to explore a more complete fix with delaying the testing
until all built-in registrations are complete but it turned out to
be too complicated for now.

So I think Tadeusz's patch is the simplest fix for 4.2.  Could you
please test it to see if it makes your warning go away? Just in
case you're running into something else that happens to look the
same.

Here is his patch again with a corrected changelog.

Thanks!

---8<---
From: Tadeusz Struk <tadeusz.struk@intel.com>
Subject: crypto: aesni - fix failing setkey for rfc4106-gcm-aesni

rfc4106(gcm(aes)) uses ctr(aes) to generate hash key. ctr(aes) needs
chainiv, but the chainiv gets initialized after aesni_intel when both
are statically linked so the setkey fails.
This patch forces aesni_intel to be initialized after chainiv.

Signed-off-by: Tadeusz Struk <tadeusz.struk@intel.com>
---
 arch/x86/crypto/aesni-intel_glue.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/crypto/aesni-intel_glue.c b/arch/x86/crypto/aesni-intel_glue.c
index ebcb981d..cb630a8 100644
--- a/arch/x86/crypto/aesni-intel_glue.c
+++ b/arch/x86/crypto/aesni-intel_glue.c
@@ -1537,7 +1537,7 @@ static void __exit aesni_exit(void)
 	crypto_fpu_exit();
 }
 
-module_init(aesni_init);
+late_initcall(aesni_init);
 module_exit(aesni_exit);
 
 MODULE_DESCRIPTION("Rijndael (AES) Cipher Algorithm, Intel AES-NI instructions optimized");


-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.2
  2015-06-27  6:56                                                         ` Herbert Xu
@ 2015-06-27 16:40                                                           ` Linus Torvalds
  2015-06-29  7:32                                                             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-27 16:40 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Jun 26, 2015 at 11:56 PM, Herbert Xu
<herbert@gondor.apana.org.au> wrote:
>
> So I think Tadeusz's patch is the simplest fix for 4.2.  Could you
> please test it to see if it makes your warning go away?

Seems to silence it here.

I get the feeling that the patch is still wrong - why are not the
*tests* run at late time when everything is properly set up, rather
than forcing ordering at the code init level - but at least I don't
see the annoying error, so it's certainly better than it was before.

                Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.2
  2015-06-27 16:40                                                           ` Linus Torvalds
@ 2015-06-29  7:32                                                             ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-29  7:32 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Sat, Jun 27, 2015 at 09:40:24AM -0700, Linus Torvalds wrote:
> On Fri, Jun 26, 2015 at 11:56 PM, Herbert Xu
> <herbert@gondor.apana.org.au> wrote:
> >
> > So I think Tadeusz's patch is the simplest fix for 4.2.  Could you
> > please test it to see if it makes your warning go away?
> 
> Seems to silence it here.

OK I'll apply this patch for 4.2.

> I get the feeling that the patch is still wrong - why are not the
> *tests* run at late time when everything is properly set up, rather
> than forcing ordering at the code init level - but at least I don't
> see the annoying error, so it's certainly better than it was before.

That's what I was exploring but I think it'll take a while so
it's best to postpone it to 4.3 or later.  The two alternatives
I was toying with are 1) delay the testing until the first time
the given algorithm is used; 2) perform testing for all built-in
algorithms at late_initcall.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.2
  2015-06-26 10:22                                                     ` Crypto Fixes for 4.2 Herbert Xu
  2015-06-26 20:07                                                       ` Linus Torvalds
@ 2015-06-30 13:51                                                       ` Herbert Xu
  2015-07-13  4:08                                                         ` Herbert Xu
  2015-09-08  9:25                                                       ` Crypto Fixes for 4.3 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-06-30 13:51 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the aesni setkey error and removes a couple of
unnecessary NULL checks in the Intel qat driver.

 
Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Markus Elfring (1):
      crypto: qat - Deletion of unnecessary checks before two function calls

Tadeusz Struk (1):
      crypto: aesni - fix failing setkey for rfc4106-gcm-aesni

 arch/x86/crypto/aesni-intel_glue.c               |    2 +-
 drivers/crypto/qat/qat_common/adf_accel_engine.c |    5 +----
 drivers/crypto/qat/qat_common/adf_transport.c    |    2 +-
 3 files changed, 3 insertions(+), 6 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.2
  2015-06-30 13:51                                                       ` Herbert Xu
@ 2015-07-13  4:08                                                         ` Herbert Xu
  2015-08-03  7:16                                                           ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-07-13  4:08 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a duplicate dma_unmap_sg call in omap-des and
reentrancy bugs in the powerpc nx driver which may cause bogus
output or worse memory corruption.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: nx - Fix reentrancy bugs

Vutla, Lokesh (1):
      crypto: omap-des - Fix unmapping of dma channels

 drivers/crypto/nx/nx-aes-ccm.c  |    6 ++--
 drivers/crypto/nx/nx-aes-ctr.c  |    7 ++--
 drivers/crypto/nx/nx-aes-gcm.c  |   17 ++++++----
 drivers/crypto/nx/nx-aes-xcbc.c |   70 ++++++++++++++++++++++++---------------
 drivers/crypto/nx/nx-sha256.c   |   43 +++++++++++++-----------
 drivers/crypto/nx/nx-sha512.c   |   44 +++++++++++++-----------
 drivers/crypto/nx/nx.c          |    3 ++
 drivers/crypto/nx/nx.h          |   14 ++++++--
 drivers/crypto/omap-des.c       |    3 --
 9 files changed, 125 insertions(+), 82 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.2
  2015-07-13  4:08                                                         ` Herbert Xu
@ 2015-08-03  7:16                                                           ` Herbert Xu
  2015-08-17  8:27                                                             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-08-03  7:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* A bogus BUG_ON in ixp4xx that can be triggered by a dst buffer
  that is an SG list.
* The error handling in hwrngd may cause a crash in case of an error.
* Fix a race condition in qat registration when multiple devices are
  present.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: ixp4xx - Remove bogus BUG_ON on scattered dst buffer

Martin Schwidefsky (1):
      hwrng: core - correct error check of kthread_run call

Tadeusz Struk (1):
      crypto: qat - Fix invalid synchronization between register/unregister sym algs

 drivers/char/hw_random/core.c            |    2 +-
 drivers/crypto/ixp4xx_crypto.c           |    1 -
 drivers/crypto/qat/qat_common/qat_algs.c |   24 ++++++++++++++++--------
 3 files changed, 17 insertions(+), 10 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.2
  2015-08-03  7:16                                                           ` Herbert Xu
@ 2015-08-17  8:27                                                             ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-08-17  8:27 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* A regression caused by the conversion of IPsec ESP to the new
  AEAD interface: ESN with authencesn no longer works because it
  relied on the AD input SG list having a specific layout which
  is no longer the case.  In linux-next authencesn is fixed properly
  and no longer assumes anything about the SG list format.  While
  for this release a minimal fix is applied to authencesn so that
  it works with the new linear layout.
* Fix memory corruption caused by bogus index in the caam hash code.
* Fix powerpc nx SHA hashing which could cause module load failures
  if module signature verification is enabled.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Herbert Xu (1):
      crypto: authencesn - Fix breakage with new ESP code

Horia Geant? (1):
      crypto: caam - fix memory corruption in ahash_final_ctx

Jan Stancek (1):
      crypto: nx - respect sg limit bounds when building sg lists for SHA

 crypto/authencesn.c            |   44 +++++++++++-----------------------------
 drivers/crypto/caam/caamhash.c |    7 ++++---
 drivers/crypto/nx/nx-sha256.c  |   27 ++++++++++++++----------
 drivers/crypto/nx/nx-sha512.c  |   28 ++++++++++++++-----------
 4 files changed, 48 insertions(+), 58 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 4.3
  2015-06-22  8:44                                                       ` Crypto Update for 4.2 Herbert Xu
  2015-06-23  4:26                                                         ` Linus Torvalds
  2015-06-24  2:11                                                         ` Linus Torvalds
@ 2015-08-31 13:56                                                         ` Herbert Xu
  2015-11-02  8:04                                                           ` Crypto Update for 4.4 Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-08-31 13:56 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 4.3:

API:

* The AEAD interface transition is now complete.
* Add top-level skcipher interface.

Drivers:

* x86-64 acceleration for chacha20/poly1305.
* Add sunxi-ss Allwinner Security System crypto accelerator.
* Add RSA algorithm to qat driver.
* Add SRIOV support to qat driver.
* Add LS1021A support to caam.
* Add i.MX6 support to caam.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Aaron Sierra (2):
      crypto: talitos - Remove zero_entry static initializer
      crypto: talitos - Prevent panic in probe error path

Ahsan Atta (1):
      crypto: qat - Fix typo othewise->otherwise

Alex Porosanu (1):
      crypto: caam - fix ERA property reading

Baruch Siach (1):
      crypto: arm - ignore generated SHA2 assembly files

Brian Norris (1):
      crypto: doc - make URL into hyperlink

Bruce Allan (4):
      crypto: qat - remove redundant struct elem
      crypto: qat - fix bug in ADF_RING_SIZE_BYTES_MIN macro
      crypto: qat - remove unused define
      crypto: qat - remove unnecessary list iteration

Chen-Yu Tsai (3):
      crypto: sunxi-ss - Document optional reset control bindings
      crypto: sunxi-ss - Add optional reset control support
      ARM: dts: sun6i: Add security system crypto engine clock and device nodes

Colin Ian King (1):
      crypto: img-hash - fix spelling mistake in dev_err error message

Dan Streetman (11):
      crypto: nx - remove __init/__exit from VIO functions
      crypto: nx - remove pSeries NX 'status' field
      crypto: nx - move kzalloc() out of spinlock
      crypto: nx - don't register pSeries driver if ENODEV
      crypto: nx - use common code for both NX decompress success cases
      crypto: nx - merge nx-compress and nx-compress-crypto
      crypto: nx - rename nx-842-crypto.c to nx-842.c
      crypto: nx - make platform drivers directly register with crypto
      crypto: nx - don't err if compressed output > input
      crypto: nx - use be32_to_cpu for __be32 field in debug msg
      MAINTAINERS: change 842 NX owner email address

Fabio Estevam (6):
      crypto: caam - Fix error handling in caam_rng_init()
      crypto: caam - Remove unneeded 'ret' variable
      crypto: amcc - Do a NULL check for pointer
      crypto: caam - Fix the error handling in caam_probe
      crypto: caam - Propagate the real error code in caam_probe
      crypto: caam - Use the preferred style for memory allocations

Herbert Xu (56):
      crypto: cryptd - Fix AEAD request context corruption
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
      crypto: api - Remove unused __crypto_dequeue_request
      crypto: aead - Add aead_queue interface
      crypto: nx/842 - Fix context corruption
      crypto: api - Add instance free function to crypto_type
      crypto: aead - Add type-safe function for freeing instances
      crypto: pcrypt - Propagate new AEAD implementation flag
      crypto: cryptd - Propagate new AEAD implementation flag
      crypto: echainiv - Fix encryption convention
      crypto: seqiv - Replace seqniv with seqiv
      crypto: aead - Propagate new AEAD implementation flag for IV generators
      crypto: testmgr - Disable rfc4106 test and convert test vectors
      crypto: tcrypt - Add support for new IV convention
      crypto: aesni - Use new IV convention
      crypto: gcm - Use new IV convention
      crypto: nx - Use new IV convention
      crypto: caam - Use new IV convention
      crypto: testmgr - Reenable rfc4106 test
      crypto: testmgr - Disable rfc4309 test and convert test vectors
      crypto: ccm - Convert to new AEAD interface
      crypto: aes-ce-ccm - Convert to new AEAD interface
      crypto: nx - Convert ccm to new AEAD interface
      crypto: testmgr - Reenable rfc4309 test
      crypto: chacha20poly1305 - Convert to new AEAD interface
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
      crypto: testmgr - Disable authenc test and convert test vectors
      crypto: authenc - Convert to new AEAD interface
      crypto: caam - Convert authenc to new AEAD interface
      crypto: ixp4xx - Convert to new AEAD interface
      crypto: picoxcell - Convert to new AEAD interface
      crypto: qat - Convert to new AEAD interface
      crypto: talitos - Convert to new AEAD interface
      crypto: testmgr - Reenable authenc tests
      crypto: authenc - Add Kconfig dependency on CRYPTO_NULL
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
      crypto: authencesn - Convert to new AEAD interface
      crypto: algboss - Remove reference to nivaead
      crypto: user - Remove crypto_lookup_aead call
      ipsec: Replace seqniv with seqiv
      crypto: seqiv - Remove seqniv
      crypto: seqiv - Remove AEAD compatibility code
      crypto: echainiv - Remove AEAD compatibility code
      crypto: aead - Add type-safe geniv init/exit helpers
      crypto: seqiv - Use generic geniv init/exit helpers
      crypto: echainiv - Use generic geniv init/exit helpers
      crypto: cryptd - Remove reference to crypto_aead_crt
      crypto: qat - Remove reference to crypto_aead_crt
      crypto: aead - Remove old AEAD interfaces
      crypto: aead - Remove CRYPTO_ALG_AEAD_NEW flag
      crypto: null - Use NULL2 in Makefile
      crypto: nx - Add forward declaration for struct crypto_aead
      crypto: null - Add missing Kconfig tristate for NULL2
      crypto: skcipher - Add top-level skcipher interface
      crypto: testmgr - Use new skcipher interface
      crypto: hash - Add AHASH_REQUEST_ON_STACK

Horia Geant? (5):
      crypto: caam - fix snooping for write transactions
      crypto: caam - fix RNG init descriptor ret. code checking
      crypto: caam - fix rfc4106 encap shared descriptor
      crypto: caam - add support for LS1021A
      crypto: caam - fix writing to JQCR_MS when using service interface

Kees Cook (1):
      crypto: jitterentropy - use safe format string parameters

Krzysztof Kozlowski (1):
      crypto: marvell/cesa - Drop owner assignment from platform_driver

LABBE Corentin (6):
      crypto: testmgr - add a chunking test for cbc(aes)
      ARM: sun4i: dt: Add Security System to A10 SoC DTS
      ARM: sun7i: dt: Add Security System to A20 SoC DTS
      ARM: sun4i: dt: Add DT bindings documentation for SUN4I Security System
      crypto: sunxi-ss - Add Allwinner Security System crypto accelerator
      MAINTAINERS: Add myself as maintainer of Allwinner Security System

Lars Persson (1):
      crypto: algif_aead - fix for multiple operations on AF_ALG sockets

Leonidas Da Silva Barbosa (7):
      powerpc: Uncomment and make enable_kernel_vsx() routine available
      crypto: vmx - Adding enable_kernel_vsx() to access VSX instructions
      Update NX crypto driver maintainers and adding VMX maintainers
      crypto: nx - Removing CTR mode from NX driver
      crypto: vmx - Fixing AES-CTR counter bug
      crypto: vmx - Fixing GHASH Key issue on little endian
      crypto: vmx - Fixing opcode issue

Martin Willi (10):
      crypto: tcrypt - Add ChaCha20/Poly1305 speed tests
      crypto: chacha20 - Export common ChaCha20 helpers
      crypto: chacha20 - Add a SSSE3 SIMD variant for x86_64
      crypto: chacha20 - Add a four block SSSE3 variant for x86_64
      crypto: chacha20 - Add an eight block AVX2 variant for x86_64
      crypto: testmgr - Add a longer ChaCha20 test vector
      crypto: poly1305 - Export common Poly1305 helpers
      crypto: poly1305 - Add a SSE2 SIMD variant for x86_64
      crypto: poly1305 - Add a two block SSE2 variant for x86_64
      crypto: poly1305 - Add a four block AVX2 variant for x86_64

Nishanth Aravamudan (4):
      crypto: nx - nx842_OF_upd_status should return ENODEV if device is not 'okay'
      crypto: nx - rename nx842_{init, exit} to nx842_pseries_{init, exit}
      crypto: nx - do not emit extra output if status is disabled
      crypto: nx - reduce chattiness of platform drivers

Paulo Flabiano Smorigo (1):
      Fix email address mistypo for NX/VMX crypto driver maintainers

Pingchao Yang (1):
      crypto: qat - add support for MMP FW

Stephan Mueller (2):
      crypto: doc - AEAD API conversion
      crypto: cmac - allow usage in FIPS mode

Steve Cornelius (1):
      crypto: caam - Enable MXC devices to select CAAM driver in Kconfig

Tadeusz Struk (17):
      crypto: qat - add MMP FW support to accel engine
      crypto: qat - Add support for RSA algorithm
      crypto: rsa - limit supported key lengths
      crypto: rsa - fix invalid check for keylen in fips mode
      crypto: qat - fix invalid check for RSA keylen in fips mode
      crypto: qat - Don't attempt to register algorithm multiple times
      crypto: qat - Move adf admin and adf hw arbitrer to common code
      crypto: qat - Add support for SRIOV
      crypto: qat - Add qat dh895xcc VF driver
      crypto: qat - Add FW const table
      PCI: Add quirk for Intel DH895xCC VF PCI config erratum
      crypto: qat - Fix adf_isr_resource_free name clash
      crypto: qat - Fix unmet direct dependencies for QAT_DH895xCCVF
      crypto: qat - Don't move data inside output buffer
      crypto: qat - silence a static checker warning
      MPI: Fix mpi_read_buffer
      crypto: qat - enable legacy VFs

Tom Lendacky (1):
      crypto: ccp - Provide support to autoload CCP driver

Tudor Ambarus (1):
      crypto: caam - fix warning in APPEND_MATH_IMM_u64

Vaishali Thakkar (1):
      crypto: sahara - Use dmam_alloc_coherent

Victoria Milhoan (13):
      crypto: caam - Add cache coherency support
      crypto: caam - Add setbits32/clrbits32/clrsetbits primitives for ARM compatibility
      crypto: caam - Enable and disable clocks on Freescale i.MX platforms
      crypto: caam - Modify Freescale CAAM driver Scatter Gather entry definition
      crypto: caam - Change kmalloc to kzalloc to avoid residual data
      crypto: caam - Correct DMA unmap size in ahash_update_ctx()
      crypto: caam - Use local sg pointers to walk the scatterlist
      crypto: caam - Added clocks and clock-names properties to SEC4.0 device tree binding
      ARM: clk-imx6q: Add CAAM clock support
      ARM: dts: mx6qdl: Add CAAM device node
      ARM: dts: mx6sx: Add CAAM device node
      crypto: caam - Detect hardware features during algorithm registration
      ARM: imx_v6_v7_defconfig: Select CAAM

Vutla, Lokesh (5):
      crypto: omap-aes - Fix CTR mode
      crypto: omap-aes - Increase priority of hw accelerator
      crypto: omap-aes - Fix configuring of AES mode
      crypto: omap-aes - Use BIT() macro
      crypto: tcrypt - Fix AEAD speed tests

Wu Fengguang (1):
      crypto: qat - fix simple_return.cocci warnings

 Documentation/DocBook/crypto-API.tmpl              |    8 +-
 .../devicetree/bindings/crypto/fsl-sec4.txt        |   17 +
 .../devicetree/bindings/crypto/sun4i-ss.txt        |   23 +
 MAINTAINERS                                        |   24 +-
 arch/arm/boot/dts/imx6qdl.dtsi                     |   29 +-
 arch/arm/boot/dts/imx6sx.dtsi                      |   27 +
 arch/arm/boot/dts/sun4i-a10.dtsi                   |    8 +
 arch/arm/boot/dts/sun6i-a31.dtsi                   |   18 +
 arch/arm/boot/dts/sun7i-a20.dtsi                   |    8 +
 arch/arm/configs/imx_v6_v7_defconfig               |    3 +-
 arch/arm/crypto/.gitignore                         |    2 +
 arch/arm64/crypto/aes-ce-ccm-glue.c                |   68 +-
 arch/powerpc/include/asm/switch_to.h               |    1 +
 arch/powerpc/kernel/process.c                      |    3 -
 arch/x86/crypto/Makefile                           |    6 +
 arch/x86/crypto/aesni-intel_glue.c                 |   53 +-
 arch/x86/crypto/chacha20-avx2-x86_64.S             |  443 +++
 arch/x86/crypto/chacha20-ssse3-x86_64.S            |  625 +++++
 arch/x86/crypto/chacha20_glue.c                    |  150 +
 arch/x86/crypto/poly1305-avx2-x86_64.S             |  386 +++
 arch/x86/crypto/poly1305-sse2-x86_64.S             |  582 ++++
 arch/x86/crypto/poly1305_glue.c                    |  207 ++
 crypto/Kconfig                                     |   40 +-
 crypto/Makefile                                    |    3 +-
 crypto/aead.c                                      |  635 +----
 crypto/algapi.c                                    |   25 +-
 crypto/algboss.c                                   |   12 +-
 crypto/algif_aead.c                                |    4 +-
 crypto/authenc.c                                   |  580 ++--
 crypto/authencesn.c                                |  716 ++---
 crypto/ccm.c                                       |  380 +--
 crypto/chacha20_generic.c                          |   28 +-
 crypto/chacha20poly1305.c                          |  216 +-
 crypto/cryptd.c                                    |   23 +-
 crypto/crypto_user.c                               |   32 -
 crypto/echainiv.c                                  |   86 +-
 crypto/gcm.c                                       |  102 +-
 crypto/jitterentropy-kcapi.c                       |    2 +-
 crypto/pcrypt.c                                    |    7 +
 crypto/poly1305_generic.c                          |   73 +-
 crypto/rsa.c                                       |   26 +-
 crypto/rsa_helper.c                                |    4 +-
 crypto/seqiv.c                                     |  445 +--
 crypto/skcipher.c                                  |  245 ++
 crypto/tcrypt.c                                    |   82 +-
 crypto/tcrypt.h                                    |   20 +
 crypto/testmgr.c                                   |   63 +-
 crypto/testmgr.h                                   | 2948 +++++++++++++++-----
 drivers/clk/imx/clk-imx6q.c                        |    3 +
 drivers/crypto/Kconfig                             |   17 +
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/amcc/crypto4xx_core.c               |    2 +-
 drivers/crypto/caam/Kconfig                        |   10 +-
 drivers/crypto/caam/caamalg.c                      | 2877 ++++++++++---------
 drivers/crypto/caam/caamhash.c                     |   69 +-
 drivers/crypto/caam/caamrng.c                      |   26 +-
 drivers/crypto/caam/compat.h                       |    1 +
 drivers/crypto/caam/ctrl.c                         |  154 +-
 drivers/crypto/caam/desc.h                         |   23 +-
 drivers/crypto/caam/desc_constr.h                  |    2 +-
 drivers/crypto/caam/intern.h                       |    5 +
 drivers/crypto/caam/jr.c                           |   30 +-
 drivers/crypto/caam/regs.h                         |   64 +-
 drivers/crypto/caam/sg_sw_sec4.h                   |   25 +-
 drivers/crypto/ccp/ccp-platform.c                  |    2 +
 drivers/crypto/img-hash.c                          |    2 +-
 drivers/crypto/ixp4xx_crypto.c                     |  312 ++-
 drivers/crypto/marvell/cesa.c                      |    1 -
 drivers/crypto/nx/Kconfig                          |   17 +-
 drivers/crypto/nx/Makefile                         |    8 +-
 drivers/crypto/nx/nx-842-crypto.c                  |  580 ----
 drivers/crypto/nx/nx-842-platform.c                |   84 -
 drivers/crypto/nx/nx-842-powernv.c                 |   42 +-
 drivers/crypto/nx/nx-842-pseries.c                 |  139 +-
 drivers/crypto/nx/nx-842.c                         |  554 +++-
 drivers/crypto/nx/nx-842.h                         |   65 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |  151 +-
 drivers/crypto/nx/nx-aes-ctr.c                     |   21 -
 drivers/crypto/nx/nx-aes-gcm.c                     |   64 +-
 drivers/crypto/nx/nx.c                             |   30 +-
 drivers/crypto/nx/nx.h                             |    9 +-
 drivers/crypto/omap-aes.c                          |   86 +-
 drivers/crypto/picoxcell_crypto.c                  |  677 ++---
 drivers/crypto/qat/Kconfig                         |   15 +
 drivers/crypto/qat/Makefile                        |    1 +
 drivers/crypto/qat/qat_common/.gitignore           |    1 +
 drivers/crypto/qat/qat_common/Makefile             |    8 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   46 +-
 drivers/crypto/qat/qat_common/adf_accel_engine.c   |   42 +-
 drivers/crypto/qat/qat_common/adf_admin.c          |  290 ++
 drivers/crypto/qat/qat_common/adf_aer.c            |    5 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |    9 +-
 drivers/crypto/qat/qat_common/adf_cfg_common.h     |    3 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |   53 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    6 +-
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |  286 +-
 .../{qat_dh895xcc => qat_common}/adf_hw_arbiter.c  |   37 +-
 drivers/crypto/qat/qat_common/adf_init.c           |  104 +-
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c      |  438 +++
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h      |  146 +
 drivers/crypto/qat/qat_common/adf_sriov.c          |  309 ++
 drivers/crypto/qat/qat_common/adf_transport.c      |   13 +-
 .../qat/qat_common/adf_transport_access_macros.h   |    5 +-
 drivers/crypto/qat/qat_common/icp_qat_fw.h         |    2 +
 drivers/crypto/qat/qat_common/icp_qat_fw_pke.h     |  112 +
 drivers/crypto/qat/qat_common/qat_algs.c           |  338 +--
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |  652 +++++
 drivers/crypto/qat/qat_common/qat_crypto.c         |   26 +-
 drivers/crypto/qat/qat_common/qat_crypto.h         |    2 -
 drivers/crypto/qat/qat_common/qat_hal.c            |   14 +-
 drivers/crypto/qat/qat_common/qat_rsakey.asn1      |    5 +
 drivers/crypto/qat/qat_common/qat_uclo.c           |   27 +-
 drivers/crypto/qat/qat_dh895xcc/Makefile           |    5 +-
 drivers/crypto/qat/qat_dh895xcc/adf_admin.c        |  145 -
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |   38 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |   12 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |   97 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.h          |    9 -
 drivers/crypto/qat/qat_dh895xcc/adf_isr.c          |  139 +-
 drivers/crypto/qat/qat_dh895xccvf/Makefile         |    5 +
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |  172 ++
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h    |   68 +
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |  393 +++
 .../qat_admin.c => qat_dh895xccvf/adf_drv.h}       |   70 +-
 drivers/crypto/qat/qat_dh895xccvf/adf_isr.c        |  258 ++
 drivers/crypto/sahara.c                            |   46 +-
 drivers/crypto/sunxi-ss/Makefile                   |    2 +
 drivers/crypto/sunxi-ss/sun4i-ss-cipher.c          |  542 ++++
 drivers/crypto/sunxi-ss/sun4i-ss-core.c            |  425 +++
 drivers/crypto/sunxi-ss/sun4i-ss-hash.c            |  492 ++++
 drivers/crypto/sunxi-ss/sun4i-ss.h                 |  201 ++
 drivers/crypto/talitos.c                           |  618 ++--
 drivers/crypto/talitos.h                           |    8 +-
 drivers/crypto/vmx/aes.c                           |    3 +
 drivers/crypto/vmx/aes_cbc.c                       |    3 +
 drivers/crypto/vmx/aes_ctr.c                       |   11 +-
 drivers/crypto/vmx/aesp8-ppc.pl                    |   34 +-
 drivers/crypto/vmx/ghash.c                         |    4 +
 drivers/crypto/vmx/ghashp8-ppc.pl                  |    6 +
 drivers/crypto/vmx/ppc-xlate.pl                    |    1 +
 drivers/pci/quirks.c                               |   85 +
 include/crypto/aead.h                              |  172 +-
 include/crypto/algapi.h                            |    3 +-
 include/crypto/chacha20.h                          |   25 +
 include/crypto/hash.h                              |    5 +
 include/crypto/internal/aead.h                     |   72 +-
 include/crypto/internal/geniv.h                    |    9 +
 include/crypto/internal/skcipher.h                 |   15 +
 include/crypto/poly1305.h                          |   41 +
 include/crypto/skcipher.h                          |  391 ++-
 include/dt-bindings/clock/imx6qdl-clock.h          |    5 +-
 include/linux/crypto.h                             |   54 +-
 lib/mpi/mpicoder.c                                 |   38 +-
 net/xfrm/xfrm_algo.c                               |   14 +-
 154 files changed, 15834 insertions(+), 7538 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.3
  2015-06-26 10:22                                                     ` Crypto Fixes for 4.2 Herbert Xu
  2015-06-26 20:07                                                       ` Linus Torvalds
  2015-06-30 13:51                                                       ` Herbert Xu
@ 2015-09-08  9:25                                                       ` Herbert Xu
  2015-09-16 10:30                                                         ` Herbert Xu
  2015-10-26 11:02                                                         ` Herbert Xu
  2 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-09-08  9:25 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a memory corruption bug in ghash-clmulni-intel
due to insufficient memory allocation.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Andrey Ryabinin (1):
      crypto: ghash-clmulni: specify context size for ghash async algorithm

 arch/x86/crypto/ghash-clmulni-intel_glue.c |    1 +
 1 file changed, 1 insertion(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.3
  2015-09-08  9:25                                                       ` Crypto Fixes for 4.3 Herbert Xu
@ 2015-09-16 10:30                                                         ` Herbert Xu
  2015-09-26 20:01                                                           ` Herbert Xu
  2015-10-26 11:02                                                         ` Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-09-16 10:30 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* The selftest overreads the IV test vector.
* Fix potential infinite loop in sunxi-ss driver.
* Fix powerpc build failure when VMX is set without VSX.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Andrey Ryabinin (1):
      crypto: testmgr - don't copy from source IV too much

LABBE Corentin (1):
      crypto: sunxi-ss - Fix a possible driver hang with ciphers

Michael Ellerman (1):
      crypto: vmx - VMX crypto should depend on CONFIG_VSX

 crypto/testmgr.c                          |    5 +++--
 drivers/crypto/Kconfig                    |    2 +-
 drivers/crypto/sunxi-ss/sun4i-ss-cipher.c |    2 +-
 3 files changed, 5 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.3
  2015-09-16 10:30                                                         ` Herbert Xu
@ 2015-09-26 20:01                                                           ` Herbert Xu
  2015-10-13 12:17                                                             ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-09-26 20:01 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* Check the return value of platform_get_irq as signed int in xgene.
* Skip adf_dev_restore on virtual functions in qat.
* Fix double-free with backlogged requests in marvell_cesa.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Andrzej Hajda (1):
      hwrng: xgene - fix handling platform_get_irq

Conor McLoughlin (1):
      crypto: qat - VF should never trigger SBR on PH

Thomas Petazzoni (1):
      crypto: marvell - properly handle CRYPTO_TFM_REQ_MAY_BACKLOG-flagged requests

 drivers/char/hw_random/xgene-rng.c      |    7 ++++---
 drivers/crypto/marvell/cesa.h           |   27 +++++++++++++++++++++++++++
 drivers/crypto/marvell/cipher.c         |    7 +++----
 drivers/crypto/marvell/hash.c           |    8 +++-----
 drivers/crypto/qat/qat_common/adf_aer.c |    3 +++
 5 files changed, 40 insertions(+), 12 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.3
  2015-09-26 20:01                                                           ` Herbert Xu
@ 2015-10-13 12:17                                                             ` Herbert Xu
  2015-10-13 17:23                                                               ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-10-13 12:17 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

* Fix AVX detection to prevent use of non-existent AESNI.
* Some SPARC ciphers did not set their IV size which may lead
  to memory corruption.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git


Ben Hutchings (1):
      crypto: camellia_aesni_avx - Fix CPU feature checks

Dave Kleikamp (1):
      crypto: sparc - initialize blkcipher.ivsize

 arch/sparc/crypto/aes_glue.c              |    2 ++
 arch/sparc/crypto/camellia_glue.c         |    1 +
 arch/sparc/crypto/des_glue.c              |    2 ++
 arch/x86/crypto/camellia_aesni_avx_glue.c |    5 +++++
 4 files changed, 10 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.3
  2015-10-13 12:17                                                             ` Herbert Xu
@ 2015-10-13 17:23                                                               ` Linus Torvalds
  2015-10-14  1:03                                                                 ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-10-13 17:23 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Oct 13, 2015 at 5:17 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes the following issues:
>
> * Fix AVX detection to prevent use of non-existent AESNI.
> * Some SPARC ciphers did not set their IV size which may lead
>   to memory corruption.

Hmm. It looks like you also quietly added a ahash fix this morning.

I took it despite it not being described or in the diffstat. But
please send new pull requests when you update a branch you asked me to
pull.

                    Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.3
  2015-10-13 17:23                                                               ` Linus Torvalds
@ 2015-10-14  1:03                                                                 ` Herbert Xu
  2015-10-14  2:00                                                                   ` Linus Torvalds
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-10-14  1:03 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Oct 13, 2015 at 10:23:39AM -0700, Linus Torvalds wrote:
>
> Hmm. It looks like you also quietly added a ahash fix this morning.
> 
> I took it despite it not being described or in the diffstat. But
> please send new pull requests when you update a branch you asked me to
> pull.

Oops, I should've waited for you to pull the previous one before
pushing this one out.

Anyway, this one is meant to fix a potential crash that can be
triggered by user-space but only if you have the relevant hardware,
in particular, Marvell CESA on ARM.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.3
  2015-10-14  1:03                                                                 ` Herbert Xu
@ 2015-10-14  2:00                                                                   ` Linus Torvalds
  2015-10-14  2:38                                                                     ` Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-10-14  2:00 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Oct 13, 2015 at 6:03 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Oops, I should've waited for you to pull the previous one before
> pushing this one out.

You might try to start using signed tags for your pull requests. That
lessens this kind of issue, because now only will you write the tag
message and then your signing key pass phrase etc, the tag would
specify one very particular commit at the time of the tagging rather
than just have it be the default branch of your public repository.

                Linus

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Re: Crypto Fixes for 4.3
  2015-10-14  2:00                                                                   ` Linus Torvalds
@ 2015-10-14  2:38                                                                     ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-10-14  2:38 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Tue, Oct 13, 2015 at 07:00:20PM -0700, Linus Torvalds wrote:
>
> You might try to start using signed tags for your pull requests. That
> lessens this kind of issue, because now only will you write the tag
> message and then your signing key pass phrase etc, the tag would
> specify one very particular commit at the time of the tagging rather
> than just have it be the default branch of your public repository.

Right.  I'll start using branches for the next push.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.3
  2015-09-08  9:25                                                       ` Crypto Fixes for 4.3 Herbert Xu
  2015-09-16 10:30                                                         ` Herbert Xu
@ 2015-10-26 11:02                                                         ` Herbert Xu
  2015-11-11  7:08                                                           ` Crypto Fixes for 4.4 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-10-26 11:02 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a problem in the Crypto API that may cause spurious
errors when signals are received by the process that made the orignal
system call into the kernel.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
      crypto: api - Only abort operations on fatal signal

 crypto/ablkcipher.c  |    2 +-
 crypto/algapi.c      |    2 +-
 crypto/api.c         |    6 +++---
 crypto/crypto_user.c |    2 +-
 4 files changed, 6 insertions(+), 6 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 4.4
  2015-08-31 13:56                                                         ` Crypto Update for 4.3 Herbert Xu
@ 2015-11-02  8:04                                                           ` Herbert Xu
  2016-01-11 10:14                                                             ` Crypto Update for 4.5 Herbert Xu
  0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-11-02  8:04 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 4.4:

API:

* Add support for cipher output IVs in testmgr.
* Add missing crypto_ahash_blocksize helper.
* Mark authenc and des ciphers as not allowed under FIPS.

Algorithms:

* Add CRC support to 842 compression.
* Add keywrap algorithm.
* A number of changes to the akcipher interface:
  + Separate functions for setting public/private keys.
  + Use SG lists.

Drivers:

* Add Intel SHA Extension optimised SHA1 and SHA256.
* Use dma_map_sg instead of custom functions in crypto drivers.
* Add support for STM32 RNG.
* Add support for ST RNG.
* Add Device Tree support to exynos RNG driver.
* Add support for mxs-dcp crypto device on MX6SL.
* Add xts(aes) support to caam.
* Add ctr(aes) and xts(aes) support to qat.
* A large set of fixes from Russell King for the marvell/cesa driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Alexander Kuleshov (1):
      crypto: jitterentropy - remove unnecessary information from a comment

Arnd Bergmann (1):
      crypto: mxs-dcp - mxs-dcp is an stmp device

Boris BREZILLON (1):
      crypto: testmgr - test IV value after a cipher operation

Boris Brezillon (1):
      crypto: marvell/cesa - fix memory leak

Catalin Vasile (1):
      crypto: caam - add support for acipher xts(aes)

Daniel Thompson (5):
      dt-bindings: Document the STM32 HW RNG bindings
      hwrng: stm32 - add support for STM32 HW RNG
      ARM: dts: stm32f429: Adopt STM32 RNG driver
      hwrng: stm32 - Fix build with CONFIG_PM
      hwrng: exynos - Fix unbalanced PM runtime get/puts

David Howells (1):
      crypto: akcipher - Don't #include crypto/public_key.h as the contents aren't used

Fabio Estevam (6):
      crypto: mxs-dcp - Allow MXS_DCP to be used on MX6SL
      hwrng: mxc-rnga - Remove unneeded goto label
      hwrng: mxc-rnga - Remove uneeded initialization
      hwrng: mxc-rnga - Remove unnecessary dev_info message
      hwrng: mxc-rnga - Use the preferred format for kzalloc
      crypto: caam - Remove unused JUMP_TYPE_MASK definition

Geliang Tang (1):
      crypto: skcipher - blkcipher and ablkcipher should it be static

Haren Myneni (1):
      crypto: 842 - Add CRC and validation support

Herbert Xu (1):
      crypto: ahash - Add crypto_ahash_blocksize

Horia Geant? (1):
      crypto: tcrypt - avoid mapping from module image addresses

John Griffin (1):
      crypto: qat - don't check for iommu

John Haxby (1):
      crypto: testmgr - Disable fips-allowed for authenc() and des() ciphers

Krzysztof Kozlowski (4):
      dt-bindings: rng: Describe Exynos4 PRNG bindings
      hwrng: exynos - Add timeout for waiting on init done
      hwrng: exynos - Fix missing configuration after suspend to RAM
      hwrng: exynos - Add Device Tree support

LABBE Corentin (14):
      crypto: bfin_crc - replace sg_count by sg_nents
      crypto: amcc - replace get_sg_count by sg_nents_for_len
      crypto: sahara - replace sahara_sg_length with sg_nents_for_len
      crypto: talitos - dma_map_sg can handle chained SG
      crypto: caam - dma_map_sg can handle chained SG
      crypto: sahara - dma_map_sg can handle chained SG
      crypto: qce - dma_map_sg can handle chained SG
      crypto: atmel - Check for clk_prepare_enable() return value
      crypto: atmel - use devm_xxx() managed function
      crypto: ux500 - Use devm_xxx() managed function
      crypto: s390/sha - replace raw value by their coresponding define
      crypto: sahara - set array of const as const
      crypto: n2 - set array of const as const
      lib/mpi: clean unused SHA1_DIGEST_LENGTH

Lee Jones (10):
      hwrng: doc - Fix device node name reference /dev/hw_random => /dev/hwrng
      hwrng: Kconfig - Fix device node name reference /dev/hw_random => /dev/hwrng
      hwrng: core - Simplify RNG switching from sysfs
      hwrng: st - Provide DT bindings for ST's Random Number Generator
      hwrng: st - Add support for ST's HW Random Number Generator
      ARM: STi: STiH407: Enable the 2 HW Random Number Generators for STiH4{07, 10}
      MAINTAINERS: Add ST's Random Number Generator to the ST entry
      hwrng: st: dt: Fix trivial typo in node address
      hwrng: st - Use real-world device timings for timeout
      hwrng: st - Improve FIFO size/depth description

Luis de Bethencourt (4):
      crypto: amcc - Fix module autoload for OF platform driver
      crypto: picoxcell - Fix module autoload for OF platform driver
      crypto: ux500 - Fix module autoload for OF platform drivers
      hwrng: Fix module autoload for OF platform drivers

Nicolas Iooss (1):
      crypto: crc32c-pclmul - use .rodata instead of .rotata

Russell King (32):
      crypto: marvell/cesa - fix stack smashing in marvell/hash.c
      crypto: marvell/cesa - initialise struct mv_cesa_ahash_req
      crypto: marvell/cesa - fix wrong hash results
      crypto: marvell/cesa - factor out common import/export functions
      crypto: marvell/cesa - easier way to get the transform
      crypto: marvell/cesa - keep creq->state in CPU endian format at all times
      crypto: marvell/cesa - add flag to determine algorithm endianness
      crypto: marvell/cesa - fix the bit length endianness
      crypto: marvell/cesa - ensure template operation is initialised
      crypto: marvell/cesa - const-ify argument to mv_cesa_get_op_cfg()
      crypto: marvell/cesa - factor out first fragment decisions to helper
      crypto: marvell/cesa - factor out adding an operation and launching it
      crypto: marvell/cesa - always ensure mid-fragments after first-fragment
      crypto: marvell/cesa - move mv_cesa_dma_add_frag() calls
      crypto: marvell/cesa - use presence of scatterlist to determine data load
      crypto: marvell/cesa - ensure iter.base.op_len is the full op length
      crypto: marvell/cesa - avoid adding final operation within loop
      crypto: marvell/cesa - rearrange last request handling
      crypto: marvell/cesa - rearrange handling for hw finished hashes
      crypto: marvell/cesa - rearrange handling for sw padded hashes
      crypto: marvell/cesa - fix first-fragment handling in mv_cesa_ahash_dma_last_req()
      crypto: caam - print errno code when hash registration fails
      crypto: caam - avoid needlessly saving and restoring caam_hash_ctx
      crypto: caam - fix non-block aligned hash calculation
      crypto: caam - only export the state we really need to export
      crypto: caam - fix indentation of close braces
      crypto: marvell/cesa - use readl_relaxed()/writel_relaxed()
      crypto: marvell/cesa - use dma_addr_t for cur_dma
      crypto: marvell/cesa - use gfp_t for gfp flags
      crypto: marvell/cesa - use memcpy_fromio()/memcpy_toio()
      crypto: marvell/cesa - fix missing cpu_to_le32() in mv_cesa_dma_add_op()
      crypto: marvell/cesa - use __le32 for hardware descriptors

Sowmini Varadhan (2):
      crypto: pkcs7 - Fix unaligned access in pkcs7_verify()
      crypto: asymmetric_keys - Fix unaligned access in x509_get_sig_params()

Stephan Mueller (4):
      crypto: keywrap - add key wrapping block chaining mode
      crypto: keywrap - enable compilation
      crypto: keywrap - add testmgr support
      lib/mpi: fix off by one in mpi_read_raw_from_sgl

Tadeusz Struk (7):
      crypto: qat - Add load balancing across devices
      crypto: qat - remove empty functions and turn qat_uregister fn to void
      crypto: qat - add support for ctr(aes) and xts(aes)
      crypto: qat - remove unneeded variable
      lib/mpi: Add mpi sgl helpers
      crypto: akcipher - Changes to asymmetric key API
      crypto: qat - fix crypto_get_instance_node function

Thomas Petazzoni (1):
      MAINTAINERS: add maintainers for the Marvell Crypto driver

Tom Lendacky (4):
      crypto: ccp - Replace BUG_ON with WARN_ON and a return code
      crypto: ccp - Remove use ACPI field
      crypto: ccp - Change references to accelerator to offload
      crypto: ccp - Use module name in driver structures

Vaishali Thakkar (1):
      hwrng: octeon - Use devm_hwrng_register

sudip (1):
      crypto: asymmetric_keys - remove always false comparison

tim (7):
      crypto: x86/sha - Intel SHA Extensions optimized SHA1 transform function
      crypto: x86/sha - Intel SHA Extensions optimized SHA256 transform function
      crypto: x86/sha - glue code for Intel SHA extensions optimized SHA1 & SHA256
      crypto: x86/sha - Add build support for Intel SHA Extensions optimized SHA1 and SHA256
      crypto: x86/sha - Restructure x86 sha1 glue code to expose all the available sha1 transforms
      crypto: x86/sha - Restructure x86 sha256 glue code to expose all the available sha256 transforms
      crypto: x86/sha - Restructure x86 sha512 glue code to expose all the available sha512 transforms

 .../bindings/rng/samsung,exynos-rng4.txt           |   17 +
 Documentation/devicetree/bindings/rng/st,rng.txt   |   15 +
 .../devicetree/bindings/rng/st,stm32-rng.txt       |   21 +
 Documentation/hw_random.txt                        |    8 +-
 MAINTAINERS                                        |    8 +
 arch/arm/boot/dts/stih407-family.dtsi              |   14 +
 arch/arm/boot/dts/stm32f429.dtsi                   |    7 +
 arch/s390/crypto/sha.h                             |    2 +-
 arch/x86/Makefile                                  |    6 +-
 arch/x86/crypto/Makefile                           |    8 +
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |    2 +-
 arch/x86/crypto/sha1_ni_asm.S                      |  302 +++++++++++++
 arch/x86/crypto/sha1_ssse3_glue.c                  |  314 ++++++++++---
 arch/x86/crypto/sha256_ni_asm.S                    |  353 +++++++++++++++
 arch/x86/crypto/sha256_ssse3_glue.c                |  329 ++++++++++++--
 arch/x86/crypto/sha512_ssse3_glue.c                |  249 +++++++++--
 crypto/Kconfig                                     |   17 +-
 crypto/Makefile                                    |   10 +-
 crypto/akcipher.c                                  |    1 -
 crypto/asymmetric_keys/pkcs7_verify.c              |    5 +-
 crypto/asymmetric_keys/x509_cert_parser.c          |    6 +-
 crypto/asymmetric_keys/x509_public_key.c           |    5 +-
 crypto/jitterentropy-kcapi.c                       |    4 -
 crypto/keywrap.c                                   |  419 +++++++++++++++++
 crypto/rsa.c                                       |   83 ++--
 crypto/rsa_helper.c                                |   42 +-
 crypto/rsakey.asn1                                 |    5 -
 crypto/rsaprivkey.asn1                             |   11 +
 crypto/rsapubkey.asn1                              |    4 +
 crypto/skcipher.c                                  |    4 +-
 crypto/tcrypt.c                                    |   17 +-
 crypto/testmgr.c                                   |   83 ++--
 crypto/testmgr.h                                   |   77 +++-
 drivers/char/hw_random/Kconfig                     |   24 +-
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/core.c                      |    2 +-
 drivers/char/hw_random/exynos-rng.c                |   58 ++-
 drivers/char/hw_random/mxc-rnga.c                  |   14 +-
 drivers/char/hw_random/octeon-rng.c                |   12 +-
 drivers/char/hw_random/pasemi-rng.c                |    1 +
 drivers/char/hw_random/ppc4xx-rng.c                |    1 +
 drivers/char/hw_random/st-rng.c                    |  151 +++++++
 drivers/char/hw_random/stm32-rng.c                 |  202 +++++++++
 drivers/crypto/Kconfig                             |    5 +-
 drivers/crypto/amcc/crypto4xx_core.c               |   23 +-
 drivers/crypto/atmel-aes.c                         |   44 +-
 drivers/crypto/atmel-sha.c                         |   33 +-
 drivers/crypto/atmel-tdes.c                        |   35 +-
 drivers/crypto/bfin_crc.c                          |   25 +-
 drivers/crypto/caam/caamalg.c                      |  232 +++++++---
 drivers/crypto/caam/caamhash.c                     |  131 +++---
 drivers/crypto/caam/desc.h                         |    1 -
 drivers/crypto/caam/sg_sw_sec4.h                   |   72 +--
 drivers/crypto/ccp/Kconfig                         |   13 +-
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c           |   20 +-
 drivers/crypto/ccp/ccp-crypto-main.c               |    6 +-
 drivers/crypto/ccp/ccp-crypto-sha.c                |   13 +
 drivers/crypto/ccp/ccp-ops.c                       |  108 +++--
 drivers/crypto/ccp/ccp-pci.c                       |    2 +-
 drivers/crypto/ccp/ccp-platform.c                  |    6 +-
 drivers/crypto/marvell/cesa.h                      |   55 ++-
 drivers/crypto/marvell/cipher.c                    |   13 +-
 drivers/crypto/marvell/hash.c                      |  471 ++++++++++----------
 drivers/crypto/marvell/tdma.c                      |   42 +-
 drivers/crypto/n2_core.c                           |    2 +-
 drivers/crypto/nx/nx-842-powernv.c                 |    4 +-
 drivers/crypto/nx/nx-842-pseries.c                 |    8 +-
 drivers/crypto/picoxcell_crypto.c                  |    1 +
 drivers/crypto/qat/qat_common/Makefile             |   12 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    4 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    6 -
 drivers/crypto/qat/qat_common/adf_init.c           |    8 +-
 drivers/crypto/qat/qat_common/adf_sriov.c          |    7 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |  178 +++++---
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |  213 ++++++---
 drivers/crypto/qat/qat_common/qat_crypto.c         |   79 ++--
 drivers/crypto/qat/qat_common/qat_hal.c            |    5 +-
 drivers/crypto/qat/qat_common/qat_rsakey.asn1      |    5 -
 drivers/crypto/qat/qat_common/qat_rsaprivkey.asn1  |   11 +
 drivers/crypto/qat/qat_common/qat_rsapubkey.asn1   |    4 +
 drivers/crypto/qce/ablkcipher.c                    |   30 +-
 drivers/crypto/qce/cipher.h                        |    4 -
 drivers/crypto/qce/dma.c                           |   52 ---
 drivers/crypto/qce/dma.h                           |    5 -
 drivers/crypto/qce/sha.c                           |   18 +-
 drivers/crypto/qce/sha.h                           |    2 -
 drivers/crypto/sahara.c                            |  108 +----
 drivers/crypto/talitos.c                           |  104 +----
 drivers/crypto/ux500/cryp/cryp_core.c              |   71 +--
 drivers/crypto/ux500/hash/hash_core.c              |   50 +--
 include/crypto/akcipher.h                          |   90 +++-
 include/crypto/hash.h                              |   14 +
 include/crypto/internal/rsa.h                      |    7 +-
 include/linux/mpi.h                                |   10 +-
 lib/842/842.h                                      |    2 +
 lib/842/842_compress.c                             |   13 +
 lib/842/842_decompress.c                           |   17 +
 lib/mpi/mpicoder.c                                 |  199 +++++++++
 98 files changed, 4070 insertions(+), 1538 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.4
  2015-10-26 11:02                                                         ` Herbert Xu
@ 2015-11-11  7:08                                                           ` Herbert Xu
  2015-11-17  9:41                                                             ` Herbert Xu
                                                                               ` (2 more replies)
  0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-11-11  7:08 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the algif_hash interface that may lead
to crashes when used with certain algorithms such as HMAC.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
      crypto: algif_hash - Only export and import on sockets with data

 crypto/algif_hash.c |   12 ++++++++++--
 1 file changed, 10 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.4
  2015-11-11  7:08                                                           ` Crypto Fixes for 4.4 Herbert Xu
@ 2015-11-17  9:41                                                             ` Herbert Xu
  2015-12-05  1:04                                                             ` Herbert Xu
  2015-12-28 13:26                                                             ` Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-11-17  9:41 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the qat driver where a user-space pointer
is dereferenced.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Tadeusz Struk (1):
      crypto: qat - don't use userspace pointer

 drivers/crypto/qat/qat_common/adf_ctl_drv.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.4
  2015-11-11  7:08                                                           ` Crypto Fixes for 4.4 Herbert Xu
  2015-11-17  9:41                                                             ` Herbert Xu
@ 2015-12-05  1:04                                                             ` Herbert Xu
  2015-12-14  9:29                                                               ` Herbert Xu
  2015-12-28 13:26                                                             ` Herbert Xu
  2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-12-05  1:04 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a couple of crypto drivers that were using memcmp
to verify authentication tags.  They now use crypto_memneq instead.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


David Gstir (2):
      crypto: nx - Fix timing leak in GCM and CCM decryption
      crypto: talitos - Fix timing leak in ESP ICV verification

 drivers/crypto/nx/nx-aes-ccm.c |    2 +-
 drivers/crypto/nx/nx-aes-gcm.c |    3 ++-
 drivers/crypto/talitos.c       |    2 +-
 3 files changed, 4 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.4
  2015-12-05  1:04                                                             ` Herbert Xu
@ 2015-12-14  9:29                                                               ` Herbert Xu
  0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-12-14  9:29 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a boundary condition in the blkcipher SG walking
code that can lead to a crash when used with the new chacha20
algorithm.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Jason A. Donenfeld (1):
      crypto: skcipher - Copy iv from desc even for 0-len walks

 crypto/ablkcipher.c |    2 +-
 crypto/blkcipher.c  |    2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.4
  2015-11-11  7:08                                                           ` Crypto Fixes for 4.4 Herbert Xu
  2015-11-17  9:41                                                             ` Herbert Xu
  2015-12-05  1:04                                                             ` Herbert Xu
@ 2015-12-28 13:26                                                             ` Herbert Xu
  2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-12-28 13:26 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug in the algif_skcipher interface that can
trigger a kernel WARN_ON from user-space.  It does so by using
the new skcipher interface which unlike the previous ablkcipher
does not need to create extra geniv objects which is what was
used to trigger the WARN_ON.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
      crypto: algif_skcipher - Use new skcipher interface

 crypto/algif_skcipher.c |   61 +++++++++++++++++++++++------------------------
 1 file changed, 30 insertions(+), 31 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 4.5
  2015-11-02  8:04                                                           ` Crypto Update for 4.4 Herbert Xu
@ 2016-01-11 10:14                                                             ` Herbert Xu
  2016-01-22 10:18                                                               ` Crypto Fixes " Herbert Xu
  2016-03-15  7:20                                                               ` Crypto Update for 4.6 Herbert Xu
  0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2016-01-11 10:14 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 4.5:

Algorithms:

* Add RSA padding algorithm.

Drivers:

* Add GCM mode support to atmel.
* Add atmel support for SAMA5D2 devices.
* Add cipher modes to talitos.
* Add rockchip driver for rk3288.
* Add qat support for C3XXX and C62X.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Aaro Koskinen (1):
      hwrng: omap3-rom - convert timer to delayed work

Ahsan Atta (1):
      crypto: qat - Rename dh895xcc mmp firmware

Alexander Kuleshov (1):
      crypto: cryptod - use crypto_skcipher_type() for getting skcipher type

Andrzej Zaborowski (5):
      lib/mpi: only require buffers as big as needed for the integer
      crypto: rsa - only require output buffers as big as needed.
      crypto: akcipher - add akcipher declarations needed by templates.
      crypto: rsa - RSA padding algorithm
      crypto: rsa-pkcs1pad - don't allocate buffer on stack

Arnd Bergmann (4):
      crypto: atmel - fix 64-bit warnings
      crypto: atmel: fix bogus select
      crypto: sahara - fix 64-bit dma_addr_t compilation
      crypto: sahara - fix debug output for 64-bit dma_addr_t

Cyrille Pitchen (24):
      crypto: tcrypt - fix keysize argument of test_aead_speed for gcm(aes)
      crypto: atmel-aes - constify value argument of atmel_aes_write_n()
      crypto: atmel-aes - change algorithm priorities
      crypto: atmel-aes - fix unregistration order of crypto algorithms
      crypto: atmel-aes - remove unused header includes
      crypto: atmel-aes - propagate error from atmel_aes_hw_version_init()
      crypto: atmel-aes - change atmel_aes_write_ctrl() signature
      crypto: atmel-aes - make crypto request queue management more generic
      crypto: atmel-aes - remove useless write in the Control Register
      crypto: atmel-aes - simplify the configuration of the AES IP
      crypto: atmel-aes - rework crypto request completion
      crypto: atmel-aes - remove unused 'err' member of struct atmel_aes_dev
      crypto: atmel-aes - reduce latency of DMA completion
      crypto: atmel-aes - remove useless AES_FLAGS_DMA flag
      crypto: atmel-aes - fix atmel_aes_remove()
      crypto: atmel-aes - improve performances of data transfer
      crypto: atmel-aes - use SIZE_IN_WORDS() helper macro
      crypto: atmel-aes - fix typo and indentation
      crypto: atmel-aes - create sections to regroup functions by usage
      crypto: atmel-aes - fix atmel-ctr-aes driver for RFC 3686
      crypto: atmel-aes - fix the counter overflow in CTR mode
      crypto: atmel-aes - change the DMA threshold
      crypto: atmel-aes - add support to GCM mode
      crypto: atmel-aes - add debug facilities to monitor register accesses.

Dan Streetman (1):
      crypto: 842 - remove WARN inside printk

Fabio Estevam (1):
      crypto: caam - pass the correct buffer length

Geliang Tang (6):
      crypto: api - use list_first_entry_or_null and list_next_entry
      crypto: mcryptd - use list_first_entry_or_null()
      crypto: padlock-aes - use offset_in_page macro
      crypto: qat - use list_for_each_entry*
      crypto: ccp - use to_pci_dev and to_platform_device
      crypto: hifn_795x, picoxcell - use ablkcipher_request_cast

Haren Myneni (1):
      crypto: nx-842 - Mask XERS0 bit in return value

Harvijay Saini (1):
      crypto: qat - ring returning retry even though ring has BW

Heiko Stuebner (1):
      crypto: rockchip - fix possible deadlock

Jason A. Donenfeld (1):
      crypto: chacha20poly1305 - Skip encryption/decryption for 0-len

Jim Davis (1):
      crypto: qat - fix typo in clean-files

Jiri Slaby (1):
      hwrng: core - sleep interruptible in read

Julia Lawall (2):
      crypto: qat - constify pci_error_handlers structures
      crypto: drbg - constify drbg_state_ops structures

LABBE Corentin (19):
      crypto: hifn_795x - remove the hifn_test function
      crypto: hifn_795x - use dev_xx/pr_xx instead of printk
      crypto: hifn_795x - fix coding style
      crypto: algif - Change some variable to size_t
      crypto: marvell - check return value of sg_nents_for_len
      crypto: talitos - check return value of sg_nents_for_len
      crypto: sahara - check return value of sg_nents_for_len
      crypto: qce - check return value of sg_nents_for_len
      crypto: picoxcell - check return value of sg_nents_for_len
      crypto: caam - check return value of sg_nents_for_len
      crypto: amcc - check return value of sg_nents_for_len
      crypto: sun4i-ss - add missing statesize
      crypto: sahara - set nb_[in|out]_sg as signed int
      crypto: picoxcell - set [src|dst]_nents and nents as signed int
      crypto: akcipher - fix typos in include/crypto/akcipher.h
      crypto: hash - add zero length message hash for shax and md5
      crypto: n2 - Use precalculated hash from headers
      crypto: ccp - Use precalculated hash from headers
      crypto: ux500 - Use precalculated hash from headers

LEROY Christophe (1):
      crypto: talitos - add new crypto modes

Leilei Zhao (1):
      crypto: atmel-aes - add new version

Leonidas Da Silva Barbosa (1):
      crypto: vmx - IV size failing on skcipher API

Markus Elfring (1):
      crypto: ixp4xx - Delete unnecessary checks before the function call "dma_pool_destroy"

Paul Gortmaker (1):
      crypto: asymmetric_keys - signature.c does not need <module.h>

Pingchao Yang (3):
      crypto: qat - add support for new devices to FW loader
      crypto: qat - fix CTX_ENABLES bits shift direction issue
      crypto: qat - fix some timeout tests

Rahul Pathak (2):
      crypto: atmel-sha - Removed unused variable "err"
      crypto: omap - Removed unused variable "err"

Randy Dunlap (1):
      crypto: aead - fix kernel-doc warnings in crypto/aead.h

Salvatore Benedetto (1):
      crypto: qat - remove superfluous check from adf_probe

Sam Protsenko (1):
      crypto: omap-des - Fix "schedule while atomic" bug

Tadeusz Struk (12):
      crypto: qat - when stopping all devices make fure VF are stopped first
      crypto: qat - fix get instance function
      crypto: qat - add new device definitions
      crypto: qat - move isr files to qat common so that they can be reused
      crypto: qat - add support for c3xxx accel type
      crypto: qat - add support for c62x accel type
      crypto: qat - add support for c3xxxvf accel type
      crypto: qat - add support for c62xvf accel type
      crypto: qat - select PCI_IOV when VF are enabled
      crypto: qat - uint8_t is not large enough for accel_id
      crypto: qat - Fix random config build issue
      crypto: qat - fix SKU definiftion for c3xxx dev

Thierry Reding (1):
      crypto: n2 - Use platform_register/unregister_drivers()

Wang, Rui Y (2):
      crypto: ghash-clmulni - Fix load failure
      crypto: cryptd - Assign statesize properly

Zain Wang (2):
      crypto: rockchip - add DT bindings documentation
      crypto: rockchip - add crypto driver for rk3288

Zeng Xin (1):
      crypto: qat - enable VF irq after guest exits ungracefully

saurabh (1):
      crypto: nx - use of_property_read_u32()

 .../devicetree/bindings/crypto/rockchip-crypto.txt |   29 +
 arch/powerpc/include/asm/icswx.h                   |    1 +
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |   26 +
 crypto/Makefile                                    |    1 +
 crypto/akcipher.c                                  |   34 +-
 crypto/algapi.c                                    |    9 +-
 crypto/algif_aead.c                                |    6 +-
 crypto/algif_skcipher.c                            |   10 +-
 crypto/asymmetric_keys/signature.c                 |    2 +-
 crypto/chacha20poly1305.c                          |    8 +
 crypto/cryptd.c                                    |    4 +-
 crypto/drbg.c                                      |    6 +-
 crypto/mcryptd.c                                   |    8 +-
 crypto/md5.c                                       |    6 +
 crypto/rsa-pkcs1pad.c                              |  628 +++++++
 crypto/rsa.c                                       |   40 +-
 crypto/sha1_generic.c                              |    7 +
 crypto/sha256_generic.c                            |   16 +
 crypto/tcrypt.c                                    |    2 +-
 drivers/char/hw_random/core.c                      |    6 +-
 drivers/char/hw_random/omap3-rom-rng.c             |   13 +-
 drivers/crypto/Kconfig                             |   18 +-
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/amcc/crypto4xx_core.c               |    4 +
 drivers/crypto/atmel-aes-regs.h                    |   10 +
 drivers/crypto/atmel-aes.c                         | 1843 ++++++++++++++------
 drivers/crypto/atmel-sha.c                         |    3 +-
 drivers/crypto/caam/caamhash.c                     |   26 +-
 drivers/crypto/ccp/Kconfig                         |    2 +
 drivers/crypto/ccp/ccp-ops.c                       |   39 +-
 drivers/crypto/ccp/ccp-pci.c                       |    8 +-
 drivers/crypto/ccp/ccp-platform.c                  |    6 +-
 drivers/crypto/hifn_795x.c                         |  512 +++---
 drivers/crypto/ixp4xx_crypto.c                     |    6 +-
 drivers/crypto/marvell/cipher.c                    |    8 +
 drivers/crypto/marvell/hash.c                      |    4 +
 drivers/crypto/n2_core.c                           |   50 +-
 drivers/crypto/nx/nx-842-powernv.c                 |   23 +-
 drivers/crypto/omap-aes.c                          |    4 +-
 drivers/crypto/omap-des.c                          |    5 +-
 drivers/crypto/padlock-aes.c                       |    4 +-
 drivers/crypto/picoxcell_crypto.c                  |   56 +-
 drivers/crypto/qat/Kconfig                         |   46 +
 drivers/crypto/qat/Makefile                        |    4 +
 drivers/crypto/qat/qat_c3xxx/Makefile              |    3 +
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |  238 +++
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h   |   83 +
 drivers/crypto/qat/qat_c3xxx/adf_drv.c             |  335 ++++
 drivers/crypto/qat/qat_c3xxxvf/Makefile            |    3 +
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c   |  173 ++
 .../adf_c3xxxvf_hw_data.h}                         |   31 +-
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |  305 ++++
 drivers/crypto/qat/qat_c62x/Makefile               |    3 +
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |  248 +++
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h     |   84 +
 drivers/crypto/qat/qat_c62x/adf_drv.c              |  335 ++++
 drivers/crypto/qat/qat_c62xvf/Makefile             |    3 +
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c |  173 ++
 .../adf_drv.h => qat_c62xvf/adf_c62xvf_hw_data.h}  |   32 +-
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |  305 ++++
 drivers/crypto/qat/qat_common/Makefile             |    4 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   16 +-
 drivers/crypto/qat/qat_common/adf_accel_engine.c   |    9 +-
 drivers/crypto/qat/qat_common/adf_admin.c          |    4 +-
 drivers/crypto/qat/qat_common/adf_aer.c            |    4 +-
 drivers/crypto/qat/qat_common/adf_cfg_common.h     |    8 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |   31 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |   21 +-
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |   36 +-
 drivers/crypto/qat/qat_common/adf_hw_arbiter.c     |    8 +-
 drivers/crypto/qat/qat_common/adf_init.c           |   21 +-
 .../qat/{qat_dh895xcc => qat_common}/adf_isr.c     |   44 +-
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c      |   23 -
 drivers/crypto/qat/qat_common/adf_transport.c      |   28 +-
 .../qat/qat_common/adf_transport_access_macros.h   |    5 +
 .../crypto/qat/qat_common/adf_transport_internal.h |    2 +-
 .../adf_isr.c => qat_common/adf_vf_isr.c}          |   64 +-
 .../qat/qat_common/icp_qat_fw_loader_handle.h      |   10 +
 drivers/crypto/qat/qat_common/icp_qat_hal.h        |   37 +-
 drivers/crypto/qat/qat_common/icp_qat_uclo.h       |  165 +-
 drivers/crypto/qat/qat_common/qat_crypto.c         |  136 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |  124 +-
 drivers/crypto/qat/qat_common/qat_uclo.c           |  555 +++++-
 drivers/crypto/qat/qat_dh895xcc/Makefile           |    4 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |    5 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |    9 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |  103 +-
 drivers/crypto/qat/qat_dh895xccvf/Makefile         |    4 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |    5 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h    |   10 +-
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |   96 +-
 drivers/crypto/qce/ablkcipher.c                    |    8 +
 drivers/crypto/qce/sha.c                           |    5 +
 drivers/crypto/rockchip/Makefile                   |    3 +
 drivers/crypto/rockchip/rk3288_crypto.c            |  394 +++++
 drivers/crypto/rockchip/rk3288_crypto.h            |  216 +++
 drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c |  505 ++++++
 drivers/crypto/sahara.c                            |   42 +-
 drivers/crypto/sunxi-ss/sun4i-ss-core.c            |    2 +
 drivers/crypto/talitos.c                           |  124 +-
 drivers/crypto/talitos.h                           |    1 +
 drivers/crypto/ux500/Kconfig                       |    2 +
 drivers/crypto/ux500/hash/hash_core.c              |   20 +-
 drivers/crypto/vmx/aes_cbc.c                       |    2 +-
 drivers/crypto/vmx/aes_ctr.c                       |    2 +-
 include/crypto/aead.h                              |    1 +
 include/crypto/akcipher.h                          |   10 +-
 include/crypto/internal/akcipher.h                 |   78 +
 include/crypto/internal/rsa.h                      |    2 +
 include/crypto/md5.h                               |    2 +
 include/crypto/sha.h                               |    6 +
 lib/842/842_decompress.c                           |   14 +-
 lib/mpi/mpicoder.c                                 |   21 +-
 113 files changed, 7344 insertions(+), 1605 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.5
  2016-01-11 10:14                                                             ` Crypto Update for 4.5 Herbert Xu
@ 2016-01-22 10:18                                                               ` Herbert Xu
  2016-02-01  8:31                                                                 ` Herbert Xu
                                                                                   ` (5 more replies)
  2016-03-15  7:20                                                               ` Crypto Update for 4.6 Herbert Xu
  1 sibling, 6 replies; 246+ messages in thread
From: Herbert Xu @ 2016-01-22 10:18 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

API:

* A large number of bug fixes for the af_alg interface, credit
goes to Dmitry Vyukov for discovering and reporting these issues.

Algorithms:

* sw842 needs to select crc32.
* The soft dependency on crc32c is now in the correct spot.

Drivers:

* The atmel AES driver needs HAS_DMA.
* The atmel AES driver was a missing break statement, fortunately
it's only a debug function.
* A number of bug fixes for the Intel qat driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Arnd Bergmann (1):
      lib: sw842: select crc32

Geert Uytterhoeven (1):
      crypto: CRYPTO_DEV_ATMEL_AES should depend on HAS_DMA

Herbert Xu (18):
      crypto: algif_skcipher - Require setkey before accept(2)
      crypto: af_alg - Disallow bind/setkey/... after accept(2)
      crypto: af_alg - Fix socket double-free when accept fails
      crypto: af_alg - Add nokey compatibility path
      crypto: algif_skcipher - Add nokey compatibility path
      crypto: hash - Add crypto_ahash_has_setkey
      crypto: algif_hash - Require setkey before accept(2)
      crypto: skcipher - Add crypto_skcipher_has_setkey
      crypto: algif_skcipher - Add key check exception for cipher_null
      crypto: af_alg - Allow af_af_alg_release_parent to be called on nokey path
      crypto: algif_hash - Remove custom release parent function
      crypto: algif_skcipher - Remove custom release parent function
      crypto: af_alg - Forbid bind(2) when nokey child sockets are present
      crypto: algif_hash - Fix race condition in hash_check_key
      crypto: algif_skcipher - Fix race condition in skcipher_check_key
      crypto: atmel-aes - Add missing break to atmel_aes_reg_name
      crypto: algif_skcipher - Load TX SG list after waiting
      crypto: algif_skcipher - sendmsg SG marking is off by one

Jean Delvare (1):
      crypto: crc32c - Fix crc32c soft dependency

Pingchao Yang (2):
      crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
      crypto: qat - fix timeout issues

Tadeusz Struk (1):
      crypto: qat - update init_esram for C3xxx dev type

 crypto/af_alg.c                         |   55 ++++++++--
 crypto/ahash.c                          |    5 +-
 crypto/algif_hash.c                     |  165 +++++++++++++++++++++++++++--
 crypto/algif_skcipher.c                 |  172 ++++++++++++++++++++++++++++---
 crypto/crc32c_generic.c                 |    1 -
 crypto/shash.c                          |    4 +-
 crypto/skcipher.c                       |    2 +
 drivers/crypto/Kconfig                  |    1 +
 drivers/crypto/atmel-aes.c              |    1 +
 drivers/crypto/qat/qat_common/qat_hal.c |   23 +++--
 include/crypto/hash.h                   |    6 ++
 include/crypto/if_alg.h                 |   11 +-
 include/crypto/skcipher.h               |    7 ++
 lib/Kconfig                             |    2 +
 lib/libcrc32c.c                         |    1 +
 15 files changed, 411 insertions(+), 45 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.5
  2016-01-22 10:18                                                               ` Crypto Fixes " Herbert Xu
@ 2016-02-01  8:31                                                                 ` Herbert Xu
  2016-02-09 17:54                                                                 ` Herbert Xu
                                                                                   ` (4 subsequent siblings)
  5 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2016-02-01  8:31 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

API:

* algif_hash needs to wait for init operations to complete.
* The has_key setting for shash was always true.

Algorithms:

* Add missing selections of CRYPTO_HASH.
* Fix pkcs7 authentication.

Drivers:

* Fix stack alignment bug in chacha20-ssse3.
* Fix performance regression in caam due to incorrect setting.
* Fix potential compile-only build failure of stm32.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Arnd Bergmann (1):
      crypto: ghash,poly1305 - select CRYPTO_HASH where needed

Cyrille Pitchen (1):
      crypto: atmel-aes - remove calls of clk_prepare() from atomic contexts

Eli Cooper (1):
      crypto: chacha20-ssse3 - Align stack pointer to 64 bytes

Herbert Xu (1):
      crypto: shash - Fix has_key setting

Horia Geant? (1):
      crypto: caam - make write transactions bufferable on PPC platforms

Peter Jones (1):
      PKCS#7: Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures

Richard Weinberger (1):
      hwrng: stm32 - Fix dependencies for !HAS_IOMEM archs

Wang, Rui Y (1):
      crypto: algif_hash - wait for crypto_ahash_init() to complete

 arch/x86/crypto/chacha20-ssse3-x86_64.S |    6 ++++--
 crypto/Kconfig                          |    2 ++
 crypto/algif_hash.c                     |    4 +++-
 crypto/asymmetric_keys/pkcs7_parser.c   |    4 +---
 crypto/shash.c                          |    7 +++----
 drivers/char/hw_random/Kconfig          |    1 +
 drivers/crypto/atmel-aes.c              |   16 ++++++++++++----
 drivers/crypto/caam/ctrl.c              |    4 ++--
 8 files changed, 28 insertions(+), 16 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Fixes for 4.5
  2016-01-22 10:18                                                               ` Crypto Fixes " Herbert Xu
  2016-02-01  8:31                                                                 ` Herbert Xu
@ 2016-02-09 17:54                                                                 ` Herbert Xu
  2016-03-23 13:09                                                                 ` Crypto Fixes for 4.6 Herbert Xu
                                                                                   ` (3 subsequent siblings)
  5 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2016-02-09 17:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

API:

* Fix async algif_skcipher, it was broken by recent fixes.
* Fix potential race condition in algif_skcipher with ctx.
* Fix potential memory corruption in algif_skcipher.
* Add missing lock to crypto_user when doing an alg dump.

Drivers:

* marvell/cesa was testing the wrong variable for NULL after
  allocation.
* Fix potential double-free in atmel-sha.
* Fix illegal call to sleepin function from atomic context in
  atmel-sha.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Boris BREZILLON (1):
      crypto: marvell/cesa - fix test in mv_cesa_dev_dma_init()

Cyrille Pitchen (2):
      crypto: atmel-sha - fix atmel_sha_remove()
      crypto: atmel-sha - remove calls of clk_prepare() from atomic contexts

Herbert Xu (3):
      crypto: algif_skcipher - Do not assume that req is unchanged
      crypto: algif_skcipher - Do not dereference ctx without socket lock
      crypto: algif_skcipher - Do not set MAY_BACKLOG on the async path

Mathias Krause (1):
      crypto: user - lock crypto_alg_list on alg dump

 crypto/algif_skcipher.c       |   80 +++++++++++++++++++++--------------------
 crypto/crypto_user.c          |    6 +++-
 drivers/crypto/atmel-sha.c    |   23 ++++++------
 drivers/crypto/marvell/cesa.c |    2 +-
 4 files changed, 60 insertions(+), 51 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 246+ messages in thread

* Crypto Update for 4.6
  2016-01-11 10:14                                                             ` Crypto Update for 4.5 Herbert Xu
  2016-01-22 10:18                                                               ` Crypto Fixes " Herbert Xu
@ 2016-03-15  7:20                                                               ` Herbert Xu
  2016-05-16  7:16                                                                 ` Crypto Update for 4.7 Herbert Xu
  1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2016-03-15  7:20 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Here is the crypto update for 4.6:

API:

* Convert remaining crypto_hash users to shash or ahash,
  also convert blkcipher/ablkcipher users to skcipher.
  Please note taht this conflicts with the net, staging
  and f2fs trees but the resolution should be fairly simple.
* Remove crypto_hash interface.
* Remove crypto_pcomp interface.
* Add crypto engine for async cipher drivers.
* Add akcipher documentation.
* Add skcipher documentation.

Algorithms:

* Rename crypto/crc32 to avoid name clash with lib/crc32.
* Fix bug in keywrap where we zero the wrong pointer.

Drivers:

* Support T5/M5, T7/M7 SPARC CPUs in n2 hwrng driver.
* Add PIC32 hwrng driver.
* Support BCM6368 in bcm63xx hwrng driver.
* Pack structs for 32-bit compat users in qat.
* Use crypto engine in omap-aes.
* Add support for sama5d2x SoCs in atmel-sha.
* Make atmel-sha available again.
* Make sahara hashing available again.
* Make ccp hashing available again.
* Make sha1-mb available again.
* Add support for multiple devices in ccp.
* Improve DMA performance in caam.
* Add hashing support to rockchip.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Anatoly Pugachev (2):
      hwrng: n2 - documentation, add DT bindings, vendor prefixes
      hwrng: n2 - Attach on T5/M5, T7/M7 SPARC CPUs

Andre Przywara (1):
      crypto: sunxi-ss - prevent compilation on 64-bit

Arnd Bergmann (5):
      crypto: sunxi - don't print confusing data
      crypto: jitterentropy - always select CRYPTO_RNG
      lib/mpi: avoid assembler warning
      lib/mpi: use "static inline" instead of "extern inline"
      hwrng: exynos - use __maybe_unused to hide pm functions

Atta, Ahsan (1):
      crypto: qat - Pack cfg ctl structs

Baolin Wang (3):
      crypto: api - Introduce crypto_queue_len() helper function
      crypto: engine - Introduce the block request crypto engine framework
      crypto: omap-aes - Support crypto engine framework

Cabiddu, Giovanni (1):
      crypto: qat - Reduced reqsize in qat_algs

Cyrille Pitchen (7):
      crypto: atmel-sha - fix crash when computing digest on empty message
      crypto: atmel-sha - fix a race between the 'done' tasklet and the crypto client
      crypto: atmel-sha - add support of sama5d2x SoCs
      crypto: atmel-sha - fix context switches
      crypto: atmel-sha - fix algorihtm registration
      crypto: atmel-sha - fix .import()/.export() implementation
      crypto: atmel-sha - fix race in atmel_sha_final()

Dan Carpenter (1):
      crypto: keywrap - memzero the correct memory

Fabio Estevam (4):
      crypto: sahara - remove unneeded mutex in the exported state
      crypto: sahara - avoid needlessly saving and restoring sahara_ctx
      crypto: sahara - fill the statesize field
      crypto: caam - Staticize caam_jr_shutdown()

Gary R Hook (4):
      crypto: ccp - Remove check for x86 family and model
      crypto: ccp - Support for multiple CCPs
      crypto: ccp - CCP versioning support
      crypto: ccp - Add abstraction for device-specific calls

Herbert Xu (41):
      crypto: ixp4xx - Fix false lastlen uninitialised warning
      crypto: skcipher - Add default key size helper
      crypto: hash - Add helpers to zero stack request/descriptor
      crypto: skcipher - Add helper to zero stack request
      crypto: api - Add crypto_type_has_alg helper
      crypto: hash - Add crypto_has_ahash helper
      crypto: skcipher - Add helper to retrieve driver name
      block: cryptoloop - Use new skcipher interface
      ppp_mppe: Use skcipher and ahash
      staging: rtl8192e: Replace uses of obsolete blkcipher and hash
      dm crypt: Use skcipher and ahash
      orinoco: Use ahash
      staging: rtl8192u: Use skcipher and ahash
      wusb: Use skcipher
      cifs: Use skcipher
      ext4: Use skcipher
      f2fs: Use skcipher
      sunrpc: Use skcipher and ahash/shash
      lib80211: Use skcipher and ahash
      KEYS: Use skcipher
      Bluetooth: Use skcipher and hash
      libceph: Use skcipher
      mac802154: Use skcipher
      rxrpc: Use skcipher
      ipsec: Use skcipher and ahash when probing algorithms
      drbd: Use shash and ahash
      nfc: s3fwrn5: Use shash
      iscsi_tcp: Use ahash
      iscsi-target: Use shash and ahash
      nfsd: Use shash
      sctp: Use shash
      tcp: Use ahash
      eCryptfs: Use skcipher and shash
      crypto: crc32 - Rename generic implementation
      crypto: tcrypt - Use ahash
      crypto: doc - Use ahash
      crypto: skcipher - Fix driver name helper
      crypto: hash - Add helpers to return alg and driver names
      staging: lustre: Use ahash
      crypto: hash - Remove c