* Crypto Update for 2.6.29
@ 2008-12-25 0:17 Herbert Xu
2008-12-25 0:20 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2008-12-25 0:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.29:
The main change is the introduction of the shash algorithm type.
It's meant to replace the existing hash type as the main interface
for synchronous hash operations. Its key feature is support for
simultaneous operations on a single tfm where previously multiple
tfm objects had to be allocated. A large chunk of the changes
here are simply conversions of existing hash algorithms to use
the new interface. In particular, the crc32c algorithm has been
converted, which means that the libcrc32c interface can now use
the crypto interface, giving it access to Intel's new CRC32C
instruction.
Apart from that there is the usual collection of bug fixes and
updates to algorithms and drivers.
Adrian-Ken Rueegsegger (10):
libcrc32c: Fix "crc32c undefined" compilation error
crypto: sha1 - Switch to shash
crypto: md4 - Switch to shash
crypto: md5 - Switch to shash
crypto: sha256 - Switch to shash
crypto: tgr192 - Switch to shash
crypto: wp512 - Switch to shash
crypto: michael_mic - Switch to shash
crypto: sha512 - Move message schedule W[80] to static percpu area
crypto: sha512 - Switch to shash
Evgeniy Polyakov (3):
crypto: hifn - Disable driver when physical size exceeds 32 bits
crypto: hifn_795x - Fix queue management
crypto: hifn_795x - Use softirq kernel mapping in bh context
Geert Uytterhoeven (2):
crypto: testmgr - Validate output length in (de)compression tests
crypto: testmgr - Correct comment about deflate parameters
Harvey Harrison (3):
crypto: camellia - use kernel-provided bitops, unaligned access
crypto: remove uses of __constant_{endian} helpers
crypto: salsa20 - Remove private wrappers around various operations
Herbert Xu (21):
crypto: padlock - Avoid resetting cword on successive operations
crypto: api - Move type exit function into crypto_tfm
crypto: api - Rebirth of crypto_alloc_tfm
crypto: hash - Add shash interface
crypto: hash - Export shash through ahash
crypto: hash - Add import/export interface
crypto: api - Call type show function before legacy for proc
crypto: hash - Export shash through hash
crypto: crc32c - Switch to shash
crypto: crc32c-intel - Switch to shash
crypto: crc32c - Test descriptor context format
libcrc32c: Move implementation to crypto crc32c
libcrc32c: Add crc32c_le macro
libcrc32c: Select CRYPTO in Kconfig
crypto: hash - Make setkey optional
crypto: null - Switch to shash
crypto: rmd128 - Switch to shash
crypto: rmd160 - Switch to shash
crypto: rmd256 - Switch to shash
crypto: rmd320 - Switch to shash
crypto: aes - Precompute tables
Ingo Molnar (1):
crypto: testmgr - Fix error flow of test_comp
Jarod Wilson (3):
crypto: ansi_cprng - Avoid incorrect extra call to _get_more_prng_bytes
crypto: ansi_cprng - fix inverted DT increment routine
crypto: des3_ede - permit weak keys unless REQ_WEAK_KEY set
Julia Lawall (1):
crypto: md4 - Use ARRAY_SIZE
Kent Liu (1):
crypto: crc32c-intel - Update copyright head
Kim Phillips (2):
crypto: talitos - Pass correct interrupt status to error handler
crypto: talitos - Perform auth check in h/w if on sec 2.1 and above
Lee Nipper (2):
crypto: talitos - Implement done interrupt mitigation
crypto: talitos - Ack done interrupt in isr instead of tasklet
Neil Horman (2):
crypto: testmgr - Trigger a panic when self test fails in FIPS mode
crypto: ansi_cprng - Allow resetting of DT value
Patrick McHardy (5):
crypto: hifn_795x - Fix DMA setup
crypto: hifn_795x - Don't copy src sg list
crypto: hifn_795x - Fix request context corruption
crypto: hifn_795x - Fix queue processing
crypto: hifn_795x - Remove some unused cruft
Vishnu Suresh (1):
crypto: talitos - Preempt overflow interrupts off-by-one fix
arch/x86/crypto/crc32c-intel.c | 121 +++---
crypto/Kconfig | 29 +-
crypto/Makefile | 1 +
crypto/aes_generic.c | 1145 ++++++++++++++++++++++++++++++++++++----
crypto/ahash.c | 38 ++-
crypto/ansi_cprng.c | 35 +-
crypto/api.c | 121 ++++-
crypto/authenc.c | 3 +
crypto/camellia.c | 84 ++--
crypto/crc32c.c | 290 ++++++-----
crypto/crypto_null.c | 64 ++-
crypto/des_generic.c | 5 +-
crypto/fcrypt.c | 8 +-
crypto/hmac.c | 10 +-
crypto/internal.h | 2 +
crypto/md4.c | 56 ++-
crypto/md5.c | 50 +-
crypto/michael_mic.c | 72 ++--
crypto/proc.c | 20 +-
crypto/rmd128.c | 61 ++-
crypto/rmd160.c | 61 ++-
crypto/rmd256.c | 61 ++-
crypto/rmd320.c | 61 ++-
crypto/salsa20_generic.c | 75 ++--
crypto/sha1_generic.c | 56 ++-
crypto/sha256_generic.c | 104 ++--
crypto/sha512_generic.c | 127 +++---
crypto/shash.c | 508 ++++++++++++++++++
crypto/testmgr.c | 76 +++-
crypto/testmgr.h | 2 +-
crypto/tgr192.c | 135 +++---
crypto/wp512.c | 121 +++--
drivers/crypto/hifn_795x.c | 494 ++++++++---------
drivers/crypto/padlock-aes.c | 52 ++-
drivers/crypto/talitos.c | 153 ++++--
drivers/crypto/talitos.h | 85 ++--
include/crypto/aes.h | 8 +-
include/crypto/algapi.h | 16 +-
include/crypto/hash.h | 125 +++++
include/crypto/internal/hash.h | 16 +-
include/linux/crc32c.h | 6 +-
include/linux/crypto.h | 10 +-
lib/Kconfig | 2 +
lib/libcrc32c.c | 182 ++------
44 files changed, 3331 insertions(+), 1420 deletions(-)
create mode 100644 crypto/shash.c
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.29
2008-12-25 0:17 Crypto Update for 2.6.29 Herbert Xu
@ 2008-12-25 0:20 ` Herbert Xu
2009-03-24 4:49 ` Crypto Update for 2.6.30 Herbert Xu
[not found] ` <20090324044932.GA18245@gondor.apana.org.au>
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2008-12-25 0:20 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.29:
The main change is the introduction of the shash algorithm type.
It's meant to replace the existing hash type as the main interface
for synchronous hash operations. Its key feature is support for
simultaneous operations on a single tfm where previously multiple
tfm objects had to be allocated. A large chunk of the changes
here are simply conversions of existing hash algorithms to use
the new interface. In particular, the crc32c algorithm has been
converted, which means that the libcrc32c interface can now use
the crypto interface, giving it access to Intel's new CRC32C
instruction.
Apart from that there is the usual collection of bug fixes and
updates to algorithms and drivers.
Now with the pull location :)
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Adrian-Ken Rueegsegger (10):
libcrc32c: Fix "crc32c undefined" compilation error
crypto: sha1 - Switch to shash
crypto: md4 - Switch to shash
crypto: md5 - Switch to shash
crypto: sha256 - Switch to shash
crypto: tgr192 - Switch to shash
crypto: wp512 - Switch to shash
crypto: michael_mic - Switch to shash
crypto: sha512 - Move message schedule W[80] to static percpu area
crypto: sha512 - Switch to shash
Evgeniy Polyakov (3):
crypto: hifn - Disable driver when physical size exceeds 32 bits
crypto: hifn_795x - Fix queue management
crypto: hifn_795x - Use softirq kernel mapping in bh context
Geert Uytterhoeven (2):
crypto: testmgr - Validate output length in (de)compression tests
crypto: testmgr - Correct comment about deflate parameters
Harvey Harrison (3):
crypto: camellia - use kernel-provided bitops, unaligned access
crypto: remove uses of __constant_{endian} helpers
crypto: salsa20 - Remove private wrappers around various operations
Herbert Xu (21):
crypto: padlock - Avoid resetting cword on successive operations
crypto: api - Move type exit function into crypto_tfm
crypto: api - Rebirth of crypto_alloc_tfm
crypto: hash - Add shash interface
crypto: hash - Export shash through ahash
crypto: hash - Add import/export interface
crypto: api - Call type show function before legacy for proc
crypto: hash - Export shash through hash
crypto: crc32c - Switch to shash
crypto: crc32c-intel - Switch to shash
crypto: crc32c - Test descriptor context format
libcrc32c: Move implementation to crypto crc32c
libcrc32c: Add crc32c_le macro
libcrc32c: Select CRYPTO in Kconfig
crypto: hash - Make setkey optional
crypto: null - Switch to shash
crypto: rmd128 - Switch to shash
crypto: rmd160 - Switch to shash
crypto: rmd256 - Switch to shash
crypto: rmd320 - Switch to shash
crypto: aes - Precompute tables
Ingo Molnar (1):
crypto: testmgr - Fix error flow of test_comp
Jarod Wilson (3):
crypto: ansi_cprng - Avoid incorrect extra call to _get_more_prng_bytes
crypto: ansi_cprng - fix inverted DT increment routine
crypto: des3_ede - permit weak keys unless REQ_WEAK_KEY set
Julia Lawall (1):
crypto: md4 - Use ARRAY_SIZE
Kent Liu (1):
crypto: crc32c-intel - Update copyright head
Kim Phillips (2):
crypto: talitos - Pass correct interrupt status to error handler
crypto: talitos - Perform auth check in h/w if on sec 2.1 and above
Lee Nipper (2):
crypto: talitos - Implement done interrupt mitigation
crypto: talitos - Ack done interrupt in isr instead of tasklet
Neil Horman (2):
crypto: testmgr - Trigger a panic when self test fails in FIPS mode
crypto: ansi_cprng - Allow resetting of DT value
Patrick McHardy (5):
crypto: hifn_795x - Fix DMA setup
crypto: hifn_795x - Don't copy src sg list
crypto: hifn_795x - Fix request context corruption
crypto: hifn_795x - Fix queue processing
crypto: hifn_795x - Remove some unused cruft
Vishnu Suresh (1):
crypto: talitos - Preempt overflow interrupts off-by-one fix
arch/x86/crypto/crc32c-intel.c | 121 +++---
crypto/Kconfig | 29 +-
crypto/Makefile | 1 +
crypto/aes_generic.c | 1145 ++++++++++++++++++++++++++++++++++++----
crypto/ahash.c | 38 ++-
crypto/ansi_cprng.c | 35 +-
crypto/api.c | 121 ++++-
crypto/authenc.c | 3 +
crypto/camellia.c | 84 ++--
crypto/crc32c.c | 290 ++++++-----
crypto/crypto_null.c | 64 ++-
crypto/des_generic.c | 5 +-
crypto/fcrypt.c | 8 +-
crypto/hmac.c | 10 +-
crypto/internal.h | 2 +
crypto/md4.c | 56 ++-
crypto/md5.c | 50 +-
crypto/michael_mic.c | 72 ++--
crypto/proc.c | 20 +-
crypto/rmd128.c | 61 ++-
crypto/rmd160.c | 61 ++-
crypto/rmd256.c | 61 ++-
crypto/rmd320.c | 61 ++-
crypto/salsa20_generic.c | 75 ++--
crypto/sha1_generic.c | 56 ++-
crypto/sha256_generic.c | 104 ++--
crypto/sha512_generic.c | 127 +++---
crypto/shash.c | 508 ++++++++++++++++++
crypto/testmgr.c | 76 +++-
crypto/testmgr.h | 2 +-
crypto/tgr192.c | 135 +++---
crypto/wp512.c | 121 +++--
drivers/crypto/hifn_795x.c | 494 ++++++++---------
drivers/crypto/padlock-aes.c | 52 ++-
drivers/crypto/talitos.c | 153 ++++--
drivers/crypto/talitos.h | 85 ++--
include/crypto/aes.h | 8 +-
include/crypto/algapi.h | 16 +-
include/crypto/hash.h | 125 +++++
include/crypto/internal/hash.h | 16 +-
include/linux/crc32c.h | 6 +-
include/linux/crypto.h | 10 +-
lib/Kconfig | 2 +
lib/libcrc32c.c | 182 ++------
44 files changed, 3331 insertions(+), 1420 deletions(-)
create mode 100644 crypto/shash.c
> Thanks,
> --
> Visit Openswan at http://www.openswan.org/
> Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
> Home Page: http://gondor.apana.org.au/~herbert/
> PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.30
2008-12-25 0:20 ` Herbert Xu
@ 2009-03-24 4:49 ` Herbert Xu
[not found] ` <20090324044932.GA18245@gondor.apana.org.au>
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-03-24 4:49 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.30:
* A new compression interface that supports "compress as you go".
- This includes a patch to move nlattr from net into lib.
* Support for the Intel AES instruction.
* More shash algorithm conversions.
* Multithreaded software crypto through cryptd.
* AMCC crypto driver.
* timeriomem RNG driver.
* Random fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Adrian-Ken Rueegsegger (1):
crypto: Fix dead links
Alexander Clouter (1):
hwrng: timeriomem - New driver
Geert Uytterhoeven (5):
netlink: Move netlink attribute parsing support to lib
crypto: compress - Add pcomp interface
crypto: testmgr - Add support for the pcomp interface
crypto: zlib - New zlib crypto module, using pcomp
crypto: testmgr - add zlib test
Heiko Carstens (1):
hwrng: timeriomem - Breaks an allyesconfig build on s390:
Herbert Xu (10):
crypto: shash - Remove superfluous check in init_tfm
crypto: shash - Add crypto_shash_blocksize
crypto: sha-s390 - Switch to shash
crypto: api - crypto_alg_mod_lookup either tested or untested
crypto: api - Fix crypto_alloc_tfm/create_create_tfm return convention
crypto: skcipher - Avoid infinite loop when cipher fails selftest
crypto: aead - Avoid infinite loop when nivaead fails selftest
crypto: testmgr - Test skciphers with no IVs
nlattr: Fix build error with NET off
crypto: sha512-s390 - Add missing block size
Huang Ying (7):
crypto: aes - Move key_length in struct crypto_aes_ctx to be the last field
crypto: aes - Export x86 AES encrypt/decrypt functions
crypto: cryptd - Add support to access underlying blkcipher
crypto: aes-ni - Add support to Intel AES-NI instructions for x86_64 platform
crypto: api - Use dedicated workqueue for crypto subsystem
crypto: cryptd - Per-CPU thread implementation based on kcrypto_wq
crypto: chainiv - Use kcrypto_wq instead of keventd_wq
James Hsiao (1):
crypto: amcc - Add crypt4xx driver
Neil Horman (3):
crypto: ansi_cprng - Force reset on allocation
crypto: ansi_cprng - Panic on CPRNG test failure when in FIPS mode
crypto: ansi_cprng - Add maintainer
MAINTAINERS | 6 +
arch/powerpc/boot/dts/canyonlands.dts | 7 +
arch/powerpc/boot/dts/kilauea.dts | 7 +
arch/s390/crypto/sha.h | 6 +-
arch/s390/crypto/sha1_s390.c | 40 +-
arch/s390/crypto/sha256_s390.c | 40 +-
arch/s390/crypto/sha512_s390.c | 81 +-
arch/s390/crypto/sha_common.c | 20 +-
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aes-i586-asm_32.S | 18 +-
arch/x86/crypto/aes-x86_64-asm_64.S | 6 +-
arch/x86/crypto/aes_glue.c | 20 +-
arch/x86/crypto/aesni-intel_asm.S | 896 +++++++++++++++++++++
arch/x86/crypto/aesni-intel_glue.c | 461 +++++++++++
arch/x86/include/asm/aes.h | 11 +
arch/x86/include/asm/cpufeature.h | 1 +
crypto/Kconfig | 44 +
crypto/Makefile | 5 +
crypto/ablkcipher.c | 19 +
crypto/aead.c | 16 +
crypto/algboss.c | 20 +-
crypto/ansi_cprng.c | 17 +-
crypto/api.c | 17 +-
crypto/blkcipher.c | 2 +-
crypto/chainiv.c | 3 +-
crypto/cryptd.c | 237 +++---
crypto/crypto_wq.c | 38 +
crypto/gf128mul.c | 2 +-
crypto/internal.h | 6 +-
crypto/pcompress.c | 97 +++
crypto/sha256_generic.c | 2 +-
crypto/shash.c | 20 +-
crypto/tcrypt.c | 6 +-
crypto/testmgr.c | 198 +++++
crypto/testmgr.h | 147 ++++
crypto/zlib.c | 378 +++++++++
drivers/char/hw_random/Kconfig | 14 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/timeriomem-rng.c | 151 ++++
drivers/crypto/Kconfig | 15 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/amcc/Makefile | 2 +
drivers/crypto/amcc/crypto4xx_alg.c | 293 +++++++
drivers/crypto/amcc/crypto4xx_core.c | 1310 +++++++++++++++++++++++++++++++
drivers/crypto/amcc/crypto4xx_core.h | 177 +++++
drivers/crypto/amcc/crypto4xx_reg_def.h | 284 +++++++
drivers/crypto/amcc/crypto4xx_sa.c | 108 +++
drivers/crypto/amcc/crypto4xx_sa.h | 243 ++++++
include/crypto/aes.h | 6 +-
include/crypto/compress.h | 145 ++++
include/crypto/cryptd.h | 27 +
include/crypto/crypto_wq.h | 7 +
include/crypto/hash.h | 5 +
include/crypto/internal/compress.h | 28 +
include/linux/crypto.h | 4 +-
include/linux/timeriomem-rng.h | 21 +
lib/Kconfig | 6 +
lib/Makefile | 2 +
net/netlink/attr.c => lib/nlattr.c | 20 +-
net/Kconfig | 1 +
net/netlink/Makefile | 2 +-
61 files changed, 5506 insertions(+), 264 deletions(-)
create mode 100644 arch/x86/crypto/aesni-intel_asm.S
create mode 100644 arch/x86/crypto/aesni-intel_glue.c
create mode 100644 arch/x86/include/asm/aes.h
create mode 100644 crypto/crypto_wq.c
create mode 100644 crypto/pcompress.c
create mode 100644 crypto/zlib.c
create mode 100644 drivers/char/hw_random/timeriomem-rng.c
create mode 100644 drivers/crypto/amcc/Makefile
create mode 100644 drivers/crypto/amcc/crypto4xx_alg.c
create mode 100644 drivers/crypto/amcc/crypto4xx_core.c
create mode 100644 drivers/crypto/amcc/crypto4xx_core.h
create mode 100644 drivers/crypto/amcc/crypto4xx_reg_def.h
create mode 100644 drivers/crypto/amcc/crypto4xx_sa.c
create mode 100644 drivers/crypto/amcc/crypto4xx_sa.h
create mode 100644 include/crypto/compress.h
create mode 100644 include/crypto/cryptd.h
create mode 100644 include/crypto/crypto_wq.h
create mode 100644 include/crypto/internal/compress.h
create mode 100644 include/linux/timeriomem-rng.h
rename net/netlink/attr.c => lib/nlattr.c (99%)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.30
[not found] ` <20090324044932.GA18245@gondor.apana.org.au>
@ 2009-04-02 6:14 ` Herbert Xu
2009-05-17 22:28 ` Herbert Xu
2009-06-13 2:05 ` Crypto Update for 2.6.31 Herbert Xu
2009-12-04 13:55 ` Crypto Update for 2.6.33 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-04-02 6:14 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes three bugs/regressions:
* IO address handling fix in timeriomem.
* Crash due to incorrect SG handling in ixp4xx.
* Crypto API (shash) bug that can lead to a CRC32C crash.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexander Clouter (1):
hwrng: timeriomem - Use phys address rather than virt
Christian Hohnstaedt (1):
crypto: ixp4xx - Fix handling of chained sg buffers
Yehuda Sadeh (1):
crypto: shash - Fix unaligned calculation with short length
crypto/shash.c | 3 +
drivers/char/hw_random/timeriomem-rng.c | 39 ++++++-
drivers/crypto/ixp4xx_crypto.c | 182 +++++++++++--------------------
include/linux/timeriomem-rng.h | 2 +-
4 files changed, 102 insertions(+), 124 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.30
2009-04-02 6:14 ` Herbert Xu
@ 2009-05-17 22:28 ` Herbert Xu
2009-05-31 13:12 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-05-17 22:28 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a few bugs/regressions:
* Check firmware before claiming algorithm support in ixp4xx.
* Fix autoloading of optimised AES modules.
* Fix eseqiv IV generation.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Christian Hohnstaedt (1):
crypto: ixp4xx - check firmware for crypto support
Herbert Xu (2):
crypto: api - Fix algorithm module auto-loading
crypto: padlock - Revert aes-all alias to aes
Steffen Klassert (1):
crypto: eseqiv - Fix IV generation for sync algorithms
crypto/api.c | 3 ++-
crypto/eseqiv.c | 3 ++-
drivers/crypto/ixp4xx_crypto.c | 33 ++++++++++++++++++++++++++++++++-
drivers/crypto/padlock-aes.c | 2 +-
4 files changed, 37 insertions(+), 4 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.30
2009-05-17 22:28 ` Herbert Xu
@ 2009-05-31 13:12 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-05-31 13:12 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression that triggers with SLAB debugging on,
where the new ahash code fails to handle sg entries that cross page
boundaries which are generated by kmalloc.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: hash - Fix handling of sg entry that crosses page boundary
crypto/ahash.c | 7 ++++---
1 files changed, 4 insertions(+), 3 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.31
[not found] ` <20090324044932.GA18245@gondor.apana.org.au>
2009-04-02 6:14 ` Herbert Xu
@ 2009-06-13 2:05 ` Herbert Xu
2009-06-21 14:09 ` Crypto Fixes " Herbert Xu
` (2 more replies)
2009-12-04 13:55 ` Crypto Update for 2.6.33 Herbert Xu
2 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2009-06-13 2:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.31:
* 64-bit VIA crypto/RNG support.
* More operation modes added for Intel AES.
* New test vectors for CCM/CTR/RNG.
* Slight change to the compress API for squashfs.
* Talitos fixes/clean-ups.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Riesen (1):
crypto: api - Use formatting of module name
Alexander Clouter (1):
hwrng: timeriomem - Fix potential oops (request_mem_region/__devinit)
Frank Seidel (1):
crypto: tcrypt - Reduce stack size
Geert Uytterhoeven (3):
crypto: testmgr - Kill test_comp() sparse warnings
crypto: pcomp - pcompress.c should include crypto/internal/compress.h
crypto: compress - Return produced bytes in crypto_{,de}compress_{update,final}
Harald Welte (3):
hwrng: via_rng - The VIA Hardware RNG driver is for the CPU, not Chipset
hwrng: via_rng - Support VIA Nano hardware RNG
hwrng: via_rng - Support VIA Nano hardware RNG on X86_64 builds
Herbert Xu (4):
crypto: padlock - Restore dependency on x86
crypto: testmgr - Dynamically allocate xbuf and axbuf
crypto: testmgr - Check all test vector lengths
crypto: testmgr - Allow hash test vectors longer than a page
Huang Ying (3):
crypto: cryptd - Use nivcipher in cryptd_alloc_ablkcipher
crypto: fpu - Add template for blkcipher touching FPU
crypto: aes-ni - Add support for more modes
Jarod Wilson (10):
crypto: testmgr - Handle AEAD test vectors expected to fail verification
crypto: testmgr - Add self-tests for rfc4309(ccm(aes))
crypto: testmgr - Add infrastructure for ansi_cprng self-tests
crypto: testmgr - Add ansi_cprng test vectors
crypto: testmgr - Catch base cipher self-test failures in fips mode
crypto: testmgr - Print self-test pass notices in fips mode
crypto: testmgr - Add ctr(aes) test vectors
crypto: testmgr - Mark algs allowed in fips mode
crypto: testmgr - Skip algs not flagged fips_allowed in fips mode
crypto: tcrypt - Do not exit on success in fips mode
Johannes Weiner (1):
crypto: api - Use kzfree
Kim Phillips (3):
crypto: talitos - Whitespace/codingstyle/overrun lines cleanup
crypto: talitos - containerof related codingstyle
crypto: talitos - Avoid unnecessary decrypt check
Lee Nipper (2):
crypto: talitos - scaffolding for new algorithm types
crypto: talitos - Add ablkcipher algorithms
Mike Frysinger (1):
crypto: hifn_795x - fix __dev{init,exit} markings
Sebastian Andrzej Siewior (1):
crypto: padlock - Enable on x86_64
Uwe Kleine-König (1):
hwrng: omap - Move probe function to .devinit.text
arch/x86/crypto/Makefile | 2 +
arch/x86/crypto/aesni-intel_glue.c | 267 ++++++++++++-
arch/x86/crypto/fpu.c | 166 +++++++
crypto/Kconfig | 10 +
crypto/algboss.c | 18 +-
crypto/api.c | 14 +-
crypto/cryptd.c | 14 +-
crypto/internal.h | 3 -
crypto/pcompress.c | 1 +
crypto/tcrypt.c | 183 +++++----
crypto/testmgr.c | 470 ++++++++++++++++-----
crypto/testmgr.h | 645 ++++++++++++++++++++++++++++-
crypto/zlib.c | 24 +-
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/omap-rng.c | 2 +-
drivers/char/hw_random/timeriomem-rng.c | 26 +-
drivers/char/hw_random/via-rng.c | 15 +-
drivers/crypto/Kconfig | 2 +-
drivers/crypto/hifn_795x.c | 8 +-
drivers/crypto/padlock-aes.c | 13 +
drivers/crypto/talitos.c | 713 ++++++++++++++++++++++---------
21 files changed, 2141 insertions(+), 457 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.31
2009-06-13 2:05 ` Crypto Update for 2.6.31 Herbert Xu
@ 2009-06-21 14:09 ` Herbert Xu
2009-09-02 22:03 ` Herbert Xu
2009-09-10 14:19 ` Crypto Update for 2.6.32 Herbert Xu
[not found] ` <20090910141905.GA17948@gondor.apana.org.au>
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-06-21 14:09 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of regressions for hardware AES:
* Spurious page faults with AES on Via Nano.
* Fix broken decryption with Intel AES.
* Fix atomic sleep with Intel AES.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Chuck Ebbert (2):
crypto: padlock-aes - work around Nano CPU errata in ECB mode
crypto: padlock-aes - work around Nano CPU errata in CBC mode
Huang Ying (3):
crypto: aes-ni - Fix cbc mode IV saving
crypto: aes-ni - Do not sleep when using the FPU
crypto: aes-ni - Remove CRYPTO_TFM_REQ_MAY_SLEEP from fpu template
arch/x86/crypto/aesni-intel_asm.S | 5 +-
arch/x86/crypto/aesni-intel_glue.c | 4 +
arch/x86/crypto/fpu.c | 4 +-
drivers/crypto/padlock-aes.c | 138 +++++++++++++++++++++++++----------
4 files changed, 107 insertions(+), 44 deletions(-)
Cheers,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.31
2009-06-21 14:09 ` Crypto Fixes " Herbert Xu
@ 2009-09-02 22:03 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-09-02 22:03 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a serious regression for IPsec when using the
chainiv algorithm. We were checking for NULL after converting a
pointer that can be NULL to its container, which means that
the NULL pointer check is useless. This would occur when the
chainiv backlog queue is depleted. The result is a crash.
Based on the one report received it does not occur all the time
though, possibly because we only use the backlog when two CPUs
try to push data through a single SA at the same time, which is
rare.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: skcipher - Fix skcipher_dequeue_givcrypt NULL test
crypto/algapi.c | 11 +++++++++--
include/crypto/algapi.h | 1 +
include/crypto/internal/skcipher.h | 4 ++--
3 files changed, 12 insertions(+), 4 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.32
2009-06-13 2:05 ` Crypto Update for 2.6.31 Herbert Xu
2009-06-21 14:09 ` Crypto Fixes " Herbert Xu
@ 2009-09-10 14:19 ` Herbert Xu
[not found] ` <20090910141905.GA17948@gondor.apana.org.au>
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-09-10 14:19 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.32:
* Completed hash algorithm transition to shash.
* Convert IPsec over to lockless ahash interface.
* Split GHASH from GCM.
* Orion5X crypto engine support.
* Minor fixes/updates.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Christian Kujau (1):
crypto: rng - Fix typo
Herbert Xu (75):
crypto: ansi_cprng - Do not select FIPS
crypto: tcrypt - Fix module return code when testing by name
crypto: testmgr - Remove hash size check
crypto: skcipher - Fix request for sync algorithms
crypto: skcipher - Change default sync geniv on SMP to eseqiv
crypto: testmgr - Allow implementation-specific tests
crypto: api - Add new template create function
crypto: api - Add crypto_alloc_instance2
crypto: shash - Add shash_instance
crypto: api - Add new style spawn support
crypto: shash - Add spawn support
crypto: api - Add crypto_attr_alg2 helper
crypto: shash - Add shash_attr_alg2 helper
crypto: shash - Add shash_register_instance
crypto: shash - Add crypto_shash_ctx_aligned
crypto: shash - Add __crypto_shash_cast
crypto: shash - Use finup in default digest
crypto: shash - Propagate reinit return value
crypto: shash - Add shash_instance_ctx
crypto: api - Fix crypto_drop_spawn crash on blank spawns
crypto: shash - Export/import hash state only
crypto: shash - Move finup/digest null checks to registration time
crypto: sha1_generic - Add export/import support
crypto: sha256_generic - Use 64-bit counter like sha1
crypto: sha256_generic - Add export/import support
crypto: sha1-s390 - Add export/import support
crypto: sha256-s390 - Add export/import support
crypto: padlock - Use shash fallback for sha
crypto: shash - Move null setkey check to registration time
crypto: async - Use kzfree for requests
crypto: shash - Make descsize a run-time attribute
crypto: padlock - Switch sha to shash
crypto: hmac - Switch to shash
crypto: xcbc - Switch to shash
crypto: authenc - Remove reference to crypto_hash
crypto: hash - Remove legacy hash/digest implementaion
crypto: shash - Export async functions
crypto: cryptd - Use shash algorithms
crypto: ahash - Add crypto_ahash_set_reqsize
crypto: cryptd - Use crypto_ahash_set_reqsize
crypto: crypto4xx - Use crypto_ahash_set_reqsize
crypto: api - Remove frontend argument from extsize/init_tfm
crypto: ahash - Convert to new style algorithms
crypto: ahash - Add instance/spawn support
crypto: tcrypt - Add mask parameter
crypto: hash - Add helpers to free spawns
crypto: cryptd - Switch to template create API
crypto: cryptd - Switch to new style ahash
crypto: crypto4xx - Switch to new style ahash
crypto: ahash - Remove old_ahash_alg
crypto: hash - Zap unaligned buffers
crypto: shash - Fix alignment in unaligned operations
crypto: ahash - Use GFP_KERNEL in unaligned setkey
crypto: ahash - Add unaligned handling and default operations
crypto: crypto4xx - Disable SHA implementation
crypto: hmac - Fix incorrect error value when creating instance
crypto: xcbc - Fix incorrect error value when creating instance
crypto: padlock - Fix compile error on i386
crypto: ahash - Fix setkey crash
crypto: shash - Fix digest size offset
crypto: shash - Fix async finup handling of null digest
crypto: padlock - Fix hashing of partial blocks
crypto: cryptd - Add finup/export/import for hash
crypto: xcbc - Use crypto_xor
crypto: xcbc - Fix shash conversion
crypto: sha512 - Export struct sha512_state
crypto: sha512_generic - Use 64-bit counters
crypto: sha512-s390 - Add export/import support
crypto: shash - Require all algorithms to support export/import
crypto: hmac - Prehash ipad/opad
crypto: api - Fix aligned ctx helper
Revert crypto: fips - Select CPRNG
crypto: ctr - Use chainiv on raw counter mode
crypto: blkcipher - Do not use eseqiv on stream ciphers
crypto: api - Do not displace newly registered algorithms
Huang Ying (3):
crypto: ghash - Add GHASH digest algorithm for GCM
crypto: gcm - Use GHASH digest algorithm
crypto: cryptd - Add support to access underlaying shash
Jan Glauber (1):
crypto: sha-s390 - Fix warnings in import function
Jarod Wilson (1):
crypto: des_s390 - Permit weak keys unless REQ_WEAK_KEY set
Joe Perches (1):
hwrng: Use PCI_VDEVICE
Kim Phillips (3):
crypto: talitos - simplify hmac data size calculation
crypto: talitos - align locks on cache lines
crypto: talitos - add support for 36 bit addressing
Neil Horman (3):
random: Add optional continuous repetition test to entropy store based rngs
crypto: fips - Select CPRNG
crypto: fips - Depend on ansi_cprng
Phil Carmody (1):
crypto: aes - Undefined behaviour in crypto_aes_expand_key
Roland Dreier (1):
crypto: aes-ni - Don't print message with KERN_ERR on old system
Sachin Sant (1):
crypto: s390 - Fix sha build failure
Sebastian Andrzej Siewior (3):
crypto: ansi_prng - Use just a BH lock
crypto: ansi_prng - alloc cipher just in init
crypto: mv_cesa - Add support for Orion5X crypto engine
Shane Wang (1):
crypto: vmac - New hash algorithm for intel_txt support
Steffen Klassert (7):
crypto: tcrypt - Test algorithms by name
crypto: cryptd - Fix uninitialized return value
crypto: ahash - Use GFP_KERNEL on allocation if the request can sleep
crypto: shash - Test for the algorithms import function before exporting it
crypto: authenc - Convert to ahash
crypto: xcbc - Fix alignment calculation of xcbc_tfm_ctx
crypto: ansi_cprng - Fix module initialization
arch/s390/crypto/des_s390.c | 11 +-
arch/s390/crypto/sha1_s390.c | 26 ++
arch/s390/crypto/sha256_s390.c | 26 ++
arch/s390/crypto/sha512_s390.c | 36 ++
arch/x86/crypto/aesni-intel_glue.c | 2 +-
crypto/Kconfig | 30 ++-
crypto/Makefile | 5 +-
crypto/ablkcipher.c | 29 ++-
crypto/aes_generic.c | 9 +-
crypto/ahash.c | 336 +++++++++++++++--
crypto/algapi.c | 180 ++++++++--
crypto/algboss.c | 5 +
crypto/ansi_cprng.c | 43 +--
crypto/api.c | 54 ++--
crypto/authenc.c | 358 ++++++++++++++----
crypto/cryptd.c | 321 +++++++++++------
crypto/ctr.c | 2 +
crypto/gcm.c | 580 ++++++++++++++++++++---------
crypto/ghash-generic.c | 170 +++++++++
crypto/hmac.c | 302 +++++++--------
crypto/internal.h | 28 +--
crypto/pcompress.c | 6 +-
crypto/rng.c | 2 +-
crypto/sha1_generic.c | 41 ++-
crypto/sha256_generic.c | 100 +++---
crypto/sha512_generic.c | 48 +--
crypto/shash.c | 270 ++++++++++----
crypto/tcrypt.c | 22 +-
crypto/testmgr.c | 30 ++-
crypto/testmgr.h | 16 +
crypto/vmac.c | 678 ++++++++++++++++++++++++++++++++++
crypto/xcbc.c | 370 +++++++------------
drivers/char/hw_random/amd-rng.c | 4 +-
drivers/char/hw_random/geode-rng.c | 3 +-
drivers/char/random.c | 14 +
drivers/crypto/Kconfig | 15 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/amcc/crypto4xx_alg.c | 3 +-
drivers/crypto/amcc/crypto4xx_core.c | 73 ++--
drivers/crypto/amcc/crypto4xx_core.h | 25 ++-
drivers/crypto/mv_cesa.c | 606 ++++++++++++++++++++++++++++++
drivers/crypto/mv_cesa.h | 119 ++++++
drivers/crypto/padlock-sha.c | 329 +++++++++--------
drivers/crypto/talitos.c | 216 +++++------
drivers/crypto/talitos.h | 1 +
include/crypto/algapi.h | 37 ++-
include/crypto/cryptd.h | 17 +
include/crypto/hash.h | 147 +++++---
include/crypto/internal/hash.h | 147 +++++++-
include/crypto/sha.h | 20 +
include/crypto/vmac.h | 61 +++
include/linux/crypto.h | 43 +--
include/linux/fips.h | 10 +
53 files changed, 4515 insertions(+), 1512 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.32
[not found] ` <20090910141905.GA17948@gondor.apana.org.au>
@ 2009-10-20 6:54 ` Herbert Xu
2009-10-20 7:26 ` Herbert Xu
2009-12-30 2:12 ` Crypto Fixes for 2.6.33 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2009-10-20 6:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in the padlock-sha driver that causes
faults on 32-bit VIA processors.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: padlock-sha - Fix stack alignment
drivers/crypto/padlock-sha.c | 14 ++++++++++++--
1 files changed, 12 insertions(+), 2 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.32
2009-10-20 6:54 ` Crypto Fixes " Herbert Xu
@ 2009-10-20 7:26 ` Herbert Xu
2009-11-23 12:05 ` Herbert Xu
2009-12-30 2:12 ` Crypto Fixes for 2.6.33 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-10-20 7:26 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
> This push fixes a regression in the padlock-sha driver that causes
> faults on 32-bit VIA processors.
I've just added another regression fix that's specific to the
Intel AESNI instruction where the FPU test was reversed.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: padlock-sha - Fix stack alignment
Huang Ying (1):
crypto: aesni-intel - Fix irq_fpu_usable usage
arch/x86/crypto/aesni-intel_glue.c | 10 +++++-----
drivers/crypto/padlock-sha.c | 14 ++++++++++++--
2 files changed, 17 insertions(+), 7 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.32
2009-10-20 7:26 ` Herbert Xu
@ 2009-11-23 12:05 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2009-11-23 12:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a crash in the gcm driver when used in conjunction
with an asynchronous cipher (e.g., aesni-intel).
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Huang Ying (1):
crypto: gcm - fix another complete call in complete fuction
crypto/gcm.c | 107 +++++++++++++++++++++++++++++++++++++++------------------
1 files changed, 73 insertions(+), 34 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.33
[not found] ` <20090324044932.GA18245@gondor.apana.org.au>
2009-04-02 6:14 ` Herbert Xu
2009-06-13 2:05 ` Crypto Update for 2.6.31 Herbert Xu
@ 2009-12-04 13:55 ` Herbert Xu
2010-02-26 0:49 ` Crypto Update for 2.6.34 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2009-12-04 13:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.33:
* Removal of legacy hash code.
* New ghash (part of GCM) driver using Intel hardware support.
* Hardware RNG driver API update.
* Random fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Benjamin Gilbert (3):
crypto: hash - Remove legacy hash/digest code
crypto: api - Remove digest case from procfs show handler
crypto: hash - Remove cra_u.{digest,hash}
Felipe Contreras (1):
crypto: testmgr - Fix warning
Herbert Xu (2):
crypto: ghash-intel - Hard-code pshufb
crypto: ghash-intel - Add PSHUFB macros
Huang Ying (6):
crypto: ghash - Add PCLMULQDQ accelerated implementation
crypto: ghash-intel - Fix building failure on x86_32
crypto: ghash-intel - Fix irq_fpu_usable usage
x86: Generate .byte code for some new instructions via gas macro
crypto: aesni-intel - Use gas macro for AES-NI instructions
crypto: ghash-clmulni-intel - Use gas macro for PCLMULQDQ-NI and PSHUFB
Ian Molton (3):
hwrng: virtio-rng - Convert to new API
hwrng: core - Prevent too-small buffer sizes
hwrng: core - Replace u32 in driver API with byte array
Jaswinder Singh Rajput (1):
crypto: ansi_cprng - Move FIPS functions under CONFIG_CRYPTO_FIPS
Jiri Kosina (1):
crypto: ghash-clmulni-intel - Put proper .data section in place
Neil Horman (1):
crypto: ansi_cprng - Add FIPS wrapper
Roel Kluin (1):
crypto: ansi_cprng - Fix test in get_prng_bytes
Youquan, Song (1):
crypto: testmgr - Add ghash algorithm test before provide to users
arch/x86/crypto/Makefile | 3
arch/x86/crypto/aesni-intel_asm.S | 517 +++++++++--------------------
arch/x86/crypto/ghash-clmulni-intel_asm.S | 157 ++++++++
arch/x86/crypto/ghash-clmulni-intel_glue.c | 333 ++++++++++++++++++
arch/x86/include/asm/cpufeature.h | 1
arch/x86/include/asm/i387.h | 7
arch/x86/include/asm/inst.h | 150 ++++++++
crypto/Kconfig | 9
crypto/ansi_cprng.c | 82 +++-
crypto/cryptd.c | 7
crypto/digest.c | 240 -------------
crypto/hash.c | 183 ----------
crypto/proc.c | 7
crypto/testmgr.c | 11
crypto/testmgr.h | 15
drivers/char/hw_random/core.c | 110 +++---
drivers/char/hw_random/virtio-rng.c | 78 +---
include/crypto/algapi.h | 1
include/crypto/cryptd.h | 1
include/linux/crypto.h | 27 -
include/linux/hw_random.h | 7
21 files changed, 1034 insertions(+), 912 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.33
2009-10-20 6:54 ` Crypto Fixes " Herbert Xu
2009-10-20 7:26 ` Herbert Xu
@ 2009-12-30 2:12 ` Herbert Xu
2010-02-01 19:52 ` Herbert Xu
[not found] ` <20100201195204.GA6953@gondor.apana.org.au>
1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2009-12-30 2:12 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in the hardware RNG core introduced
by the recent API change.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
hwrng: core - Fix double unlock in rng_dev_read
drivers/char/hw_random/core.c | 5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.33
2009-12-30 2:12 ` Crypto Fixes for 2.6.33 Herbert Xu
@ 2010-02-01 19:52 ` Herbert Xu
[not found] ` <20100201195204.GA6953@gondor.apana.org.au>
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-02-01 19:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a couple of serious bugs:
* UBIFS assertion failure caused by /dev/random (since forever)
* Broken hmac support in padlock-sha (since 2.6.32)
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (2):
crypto: padlock-sha - Add import/export support
random: Remove unused inode variable
Matt Mackall (1):
random: drop weird m_time/a_time manipulation
drivers/char/random.c | 9 ---------
drivers/crypto/padlock-sha.c | 23 +++++++++++++++++++++++
2 files changed, 23 insertions(+), 9 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.34
2009-12-04 13:55 ` Crypto Update for 2.6.33 Herbert Xu
@ 2010-02-26 0:49 ` Herbert Xu
2010-03-01 7:50 ` tip: origin tree boot crash Ingo Molnar
2010-05-19 2:06 ` Crypto Update for 2.6.35 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-02-26 0:49 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.34:
* New pcrypt module to spread crypto work across CPUs.
* Added RFC4543 GCM support.
* Added nomadik RNG driver.
* MD5 export/import support.
* Random fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alessandro Rubini (2):
hwrng: nomadik - Add hardware RNG driver
hwrng: nomadik - Add platform device for rng in cpu-8815
Max Vozeler (1):
crypto: md5 - Add export support
Márton Németh (1):
crypto: Make Open Firmware device id constant
Richard Hartmann (19):
crypto: ablkcipher - Fix checkpatch errors
crypto: aead - Fix checkpatch errors
crypto: blowfish - Fix checkpatch errors
crypto: algapi - Fix checkpatch errors
crypto: anubis - Fix checkpatch errors
crypto: api - Fix checkpatch errors
crypto: authenc - Fix checkpatch errors
crypto: camellia - Fix checkpatch errors
crypto: cast5 - Fix checkpatch errors
crypto: cast6 - Fix checkpatch errors
crypto: compress - Fix checkpatch errors
crypto: crc32 - Fix checkpatch errors
crypto: cipher - Fix checkpatch errors
crypto: crypto_null - Fix checkpatch errors
crypto: deflate - Fix checkpatch errors
crypto: des_generic - Fix checkpatch errors
crypto: ecb - Fix checkpatch errors
crypto: fcrypt - Fix checkpatch errors
crypto: aes_generic - Fix checkpatch errors
Roel Kluin (3):
crypto: aes_s390 - access .cip instead of .blk in cipher mode
crypto: geode-aes - access .cip instead of .blk in cipher mode
crypto: geode-aes - Fix cip/blk confusion
Steffen Klassert (3):
padata: Generic parallelization/serialization interface
crypto: pcrypt - Add pcrypt crypto parallelization wrapper
crypto: pcrypt - call the complete function on error
Tobias Brunner (1):
crypto: gcm - Add RFC4543 wrapper for GCM
Youquan, Song (1):
crypto: testmgr - Fix complain about lack test for internal used algorithm
arch/arm/mach-nomadik/cpu-8815.c | 8 +
arch/s390/crypto/aes_s390.c | 6 +-
crypto/Kconfig | 10 +
crypto/Makefile | 1 +
crypto/ablkcipher.c | 4 +-
crypto/aead.c | 4 +-
crypto/aes_generic.c | 4 +-
crypto/algapi.c | 4 +-
crypto/anubis.c | 22 +-
crypto/api.c | 13 +-
crypto/authenc.c | 10 +-
crypto/blowfish.c | 18 +-
crypto/camellia.c | 616 +++++++++++++++---------------
crypto/cast5.c | 14 +-
crypto/cast6.c | 122 +++---
crypto/cipher.c | 2 +-
crypto/compress.c | 4 +-
crypto/crc32c.c | 6 +-
crypto/crypto_null.c | 8 +-
crypto/deflate.c | 20 +-
crypto/des_generic.c | 3 +-
crypto/ecb.c | 2 +-
crypto/fcrypt.c | 6 +-
crypto/gcm.c | 287 ++++++++++++++
crypto/md5.c | 40 ++-
crypto/pcrypt.c | 445 ++++++++++++++++++++++
crypto/testmgr.c | 84 ++++
drivers/char/hw_random/Kconfig | 12 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/nomadik-rng.c | 103 +++++
drivers/crypto/amcc/crypto4xx_core.c | 2 +-
drivers/crypto/geode-aes.c | 8 +-
drivers/crypto/talitos.c | 2 +-
include/crypto/md5.h | 17 +
include/crypto/pcrypt.h | 51 +++
include/linux/padata.h | 88 +++++
include/linux/pfkeyv2.h | 1 +
init/Kconfig | 4 +
kernel/Makefile | 1 +
kernel/padata.c | 690 ++++++++++++++++++++++++++++++++++
net/xfrm/xfrm_algo.c | 16 +
41 files changed, 2293 insertions(+), 466 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 246+ messages in thread
* tip: origin tree boot crash
2010-02-26 0:49 ` Crypto Update for 2.6.34 Herbert Xu
@ 2010-03-01 7:50 ` Ingo Molnar
2010-03-01 14:55 ` Steffen Klassert
2010-05-19 2:06 ` Crypto Update for 2.6.35 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Ingo Molnar @ 2010-03-01 7:50 UTC (permalink / raw)
To: Herbert Xu, Steffen Klassert
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
[-- Attachment #1: Type: text/plain, Size: 3663 bytes --]
Hi,
* Herbert Xu <herbert@gondor.apana.org.au> wrote:
> crypto: pcrypt - Add pcrypt crypto parallelization wrapper
-tip testing started triggering the following frequent boot crash yesterday,
on 64-bit x86:
| calling pcrypt_init+0x0/0xee @ 1
| BUG: unable to handle kernel NULL pointer dereference at (null)
| IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
| Call Trace:
| [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
| [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
| [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
( Full oops attached below. Config attached as well. )
I have bisected it back to the following upstream commit:
|
| 5068c7a883d1694f0fb3631b664827644153cd08 is the first bad commit
| commit 5068c7a883d1694f0fb3631b664827644153cd08
| Author: Steffen Klassert <steffen.klassert@secunet.com>
| Date: Thu Jan 7 15:57:19 2010 +1100
|
| crypto: pcrypt - Add pcrypt crypto parallelization wrapper
|
And have confirmed it via more testing that reverting the following two
commits:
5a1436b: crypto: pcrypt - call the complete function on error
5068c7a: crypto: pcrypt - Add pcrypt crypto parallelization wrapper
Solves the crash. I have pushed out the reverts into tip:out-of-tree for now,
and can test any real fix as well.
Thanks,
Ingo
-------------->
Calling crypto_ctr_module_init+0x0/0x3e @ 1
initcall crypto_ctr_module_init+0x0/0x3e returned 0 after 0 usecs
calling pcrypt_init+0x0/0xee @ 1
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
PGD 0
Oops: 0002 [#1] SMP
last sysfs file:
CPU 1
Modules linked in:
Pid: 1, comm: swapper Not tainted 2.6.33-01768-g43a834d #19338 A8N-E/System Product Name
RIP: 0010:[<ffffffff8126550b>] [<ffffffff8126550b>] memcpy+0xb/0xb0
RSP: 0018:ffff88003f875e88 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffffff81f5f740 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ffffffff81f5f740 RDI: 0000000000000000
RBP: ffff88003f875ec0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88003e5317b0
R13: ffff88003f97a690 R14: ffff88003e5317b0 R15: ffff88003f9287d0
FS: 0000000000000000(0000) GS:ffff880004200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000000001be8000 CR4: 00000000000006a0
DR0: ffffffff82c160bc DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Process swapper (pid: 1, threadinfo ffff88003f874000, task ffff88003f878000)
Stack:
ffffffff810c2f38 ffff880000000018 ffffffff81f5f740 ffffffff82158c51
<0> 00000001552321fe 0000000000000002 0000000000000000 ffff88003f875ee0
<0> ffffffff82158ccc 00000001552321fe 0000000000000000 ffff88003f875f10
Call Trace:
[<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
[<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
[<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
[<ffffffff810001dc>] do_one_initcall+0x3c/0x200
[<ffffffff8213e73c>] kernel_init+0x161/0x1b7
[<ffffffff81004184>] kernel_thread_helper+0x4/0x10
[<ffffffff817d2150>] ? restore_args+0x0/0x30
[<ffffffff8213e5db>] ? kernel_init+0x0/0x1b7
[<ffffffff81004180>] ? kernel_thread_helper+0x0/0x10
Code: 81 ea d8 1f 00 00 48 3b 42 20 73 07 48 8b 50 f9 31 c0 c3 31 d2 48 c7 c0 f2 ff ff ff c3 90 90 90 48 89 f8 89 d1 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 8b 1e 4c 8b 46 08 4c 89 1f 4c 89 47 08
RIP [<ffffffff8126550b>] memcpy+0xb/0xb0
RSP <ffff88003f875e88>
CR2: 0000000000000000
---[ end trace 5a5d197966b56a2e ]---
swapper used greatest stack depth: 5016 bytes left
Kernel panic - not syncing: Attempted to kill init!
[-- Attachment #2: config --]
[-- Type: text/plain, Size: 72645 bytes --]
#
# Automatically generated make config: don't edit
# Linux kernel version: 2.6.33
# Sun Feb 28 23:17:34 2010
#
CONFIG_64BIT=y
# CONFIG_X86_32 is not set
CONFIG_X86_64=y
CONFIG_X86=y
CONFIG_OUTPUT_FORMAT="elf64-x86-64"
CONFIG_ARCH_DEFCONFIG="arch/x86/configs/x86_64_defconfig"
CONFIG_GENERIC_TIME=y
CONFIG_GENERIC_CMOS_UPDATE=y
CONFIG_CLOCKSOURCE_WATCHDOG=y
CONFIG_GENERIC_CLOCKEVENTS=y
CONFIG_GENERIC_CLOCKEVENTS_BROADCAST=y
CONFIG_LOCKDEP_SUPPORT=y
CONFIG_STACKTRACE_SUPPORT=y
CONFIG_HAVE_LATENCYTOP_SUPPORT=y
CONFIG_MMU=y
CONFIG_ZONE_DMA=y
CONFIG_GENERIC_ISA_DMA=y
CONFIG_GENERIC_IOMAP=y
CONFIG_GENERIC_BUG=y
CONFIG_GENERIC_BUG_RELATIVE_POINTERS=y
CONFIG_GENERIC_HWEIGHT=y
CONFIG_GENERIC_GPIO=y
CONFIG_ARCH_MAY_HAVE_PC_FDC=y
# CONFIG_RWSEM_GENERIC_SPINLOCK is not set
CONFIG_RWSEM_XCHGADD_ALGORITHM=y
CONFIG_ARCH_HAS_CPU_IDLE_WAIT=y
CONFIG_GENERIC_CALIBRATE_DELAY=y
CONFIG_GENERIC_TIME_VSYSCALL=y
CONFIG_ARCH_HAS_CPU_RELAX=y
CONFIG_ARCH_HAS_DEFAULT_IDLE=y
CONFIG_ARCH_HAS_CACHE_LINE_SIZE=y
CONFIG_HAVE_SETUP_PER_CPU_AREA=y
CONFIG_NEED_PER_CPU_EMBED_FIRST_CHUNK=y
CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK=y
CONFIG_HAVE_CPUMASK_OF_CPU_MAP=y
CONFIG_ARCH_HIBERNATION_POSSIBLE=y
CONFIG_ARCH_SUSPEND_POSSIBLE=y
CONFIG_ZONE_DMA32=y
CONFIG_ARCH_POPULATES_NODE_MAP=y
CONFIG_AUDIT_ARCH=y
CONFIG_ARCH_SUPPORTS_OPTIMIZED_INLINING=y
CONFIG_ARCH_SUPPORTS_DEBUG_PAGEALLOC=y
CONFIG_HAVE_EARLY_RES=y
CONFIG_GENERIC_HARDIRQS=y
CONFIG_GENERIC_HARDIRQS_NO__DO_IRQ=y
CONFIG_GENERIC_IRQ_PROBE=y
CONFIG_GENERIC_PENDING_IRQ=y
CONFIG_USE_GENERIC_SMP_HELPERS=y
CONFIG_X86_64_SMP=y
CONFIG_X86_HT=y
CONFIG_X86_TRAMPOLINE=y
# CONFIG_KTIME_SCALAR is not set
CONFIG_BOOTPARAM_SUPPORT_NOT_WANTED=y
CONFIG_DEFCONFIG_LIST="/lib/modules/$UNAME_RELEASE/.config"
CONFIG_CONSTRUCTORS=y
#
# General setup
#
CONFIG_EXPERIMENTAL=y
# CONFIG_BROKEN_BOOT_ALLOWED4 is not set
CONFIG_BROKEN_BOOT_DISALLOWED=y
CONFIG_BROKEN_BOOT_EUROPE=y
CONFIG_BROKEN_BOOT_TITAN=y
CONFIG_LOCK_KERNEL=y
CONFIG_INIT_ENV_ARG_LIMIT=32
CONFIG_LOCALVERSION=""
CONFIG_LOCALVERSION_AUTO=y
CONFIG_HAVE_KERNEL_GZIP=y
CONFIG_HAVE_KERNEL_BZIP2=y
CONFIG_HAVE_KERNEL_LZMA=y
CONFIG_HAVE_KERNEL_LZO=y
CONFIG_KERNEL_GZIP=y
# CONFIG_KERNEL_BZIP2 is not set
# CONFIG_KERNEL_LZMA is not set
# CONFIG_KERNEL_LZO is not set
CONFIG_SWAP=y
CONFIG_SYSVIPC=y
CONFIG_SYSVIPC_SYSCTL=y
CONFIG_POSIX_MQUEUE=y
CONFIG_POSIX_MQUEUE_SYSCTL=y
CONFIG_BSD_PROCESS_ACCT=y
# CONFIG_BSD_PROCESS_ACCT_V3 is not set
# CONFIG_TASKSTATS is not set
# CONFIG_AUDIT is not set
#
# RCU Subsystem
#
CONFIG_TREE_RCU=y
# CONFIG_TREE_PREEMPT_RCU is not set
# CONFIG_TINY_RCU is not set
CONFIG_RCU_TRACE=y
CONFIG_RCU_FANOUT=64
CONFIG_RCU_FANOUT_EXACT=y
CONFIG_RCU_FAST_NO_HZ=y
CONFIG_TREE_RCU_TRACE=y
CONFIG_IKCONFIG=y
CONFIG_IKCONFIG_PROC=y
CONFIG_LOG_BUF_SHIFT=20
CONFIG_HAVE_UNSTABLE_SCHED_CLOCK=y
# CONFIG_CGROUPS is not set
CONFIG_SYSFS_DEPRECATED=y
CONFIG_SYSFS_DEPRECATED_V2=y
# CONFIG_RELAY is not set
CONFIG_NAMESPACES=y
CONFIG_UTS_NS=y
CONFIG_IPC_NS=y
# CONFIG_USER_NS is not set
CONFIG_PID_NS=y
CONFIG_NET_NS=y
# CONFIG_BLK_DEV_INITRD is not set
# CONFIG_CC_OPTIMIZE_FOR_SIZE is not set
CONFIG_SYSCTL=y
CONFIG_ANON_INODES=y
CONFIG_EMBEDDED=y
CONFIG_UID16=y
# CONFIG_SYSCTL_SYSCALL is not set
CONFIG_KALLSYMS=y
CONFIG_KALLSYMS_ALL=y
# CONFIG_KALLSYMS_EXTRA_PASS is not set
CONFIG_HOTPLUG=y
CONFIG_PRINTK=y
CONFIG_BUG=y
CONFIG_ELF_CORE=y
CONFIG_PCSPKR_PLATFORM=y
CONFIG_BASE_FULL=y
CONFIG_FUTEX=y
CONFIG_EPOLL=y
CONFIG_SIGNALFD=y
CONFIG_TIMERFD=y
CONFIG_EVENTFD=y
CONFIG_SHMEM=y
CONFIG_AIO=y
CONFIG_HAVE_PERF_EVENTS=y
CONFIG_PERF_USE_VMALLOC=y
CONFIG_PERF_EVENTS_NMI=y
#
# Kernel Performance Events And Counters
#
CONFIG_PERF_EVENTS=y
CONFIG_PERF_COUNTERS=y
CONFIG_DEBUG_PERF_USE_VMALLOC=y
CONFIG_VM_EVENT_COUNTERS=y
CONFIG_PCI_QUIRKS=y
CONFIG_SLUB_DEBUG=y
CONFIG_COMPAT_BRK=y
# CONFIG_SLAB is not set
CONFIG_SLUB=y
# CONFIG_SLOB is not set
CONFIG_PROFILING=y
CONFIG_TRACEPOINTS=y
# CONFIG_OPROFILE is not set
CONFIG_HAVE_OPROFILE=y
# CONFIG_KPROBES is not set
CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS=y
CONFIG_USER_RETURN_NOTIFIER=y
CONFIG_HAVE_IOREMAP_PROT=y
CONFIG_HAVE_KPROBES=y
CONFIG_HAVE_KRETPROBES=y
CONFIG_HAVE_OPTPROBES=y
CONFIG_HAVE_ARCH_TRACEHOOK=y
CONFIG_HAVE_DMA_ATTRS=y
CONFIG_HAVE_REGS_AND_STACK_ACCESS_API=y
CONFIG_HAVE_DMA_API_DEBUG=y
CONFIG_HAVE_HW_BREAKPOINT=y
CONFIG_HAVE_USER_RETURN_NOTIFIER=y
#
# GCOV-based kernel profiling
#
CONFIG_SLOW_WORK=y
# CONFIG_SLOW_WORK_DEBUG is not set
# CONFIG_HAVE_GENERIC_DMA_COHERENT is not set
CONFIG_SLABINFO=y
CONFIG_RT_MUTEXES=y
CONFIG_BASE_SMALL=0
CONFIG_MODULES=y
# CONFIG_MODULE_FORCE_LOAD is not set
CONFIG_MODULE_UNLOAD=y
CONFIG_MODULE_FORCE_UNLOAD=y
# CONFIG_MODVERSIONS is not set
CONFIG_MODULE_SRCVERSION_ALL=y
CONFIG_STOP_MACHINE=y
CONFIG_BLOCK=y
# CONFIG_BLK_DEV_BSG is not set
CONFIG_BLK_DEV_INTEGRITY=y
CONFIG_BLOCK_COMPAT=y
#
# IO Schedulers
#
CONFIG_IOSCHED_NOOP=y
CONFIG_IOSCHED_DEADLINE=y
# CONFIG_IOSCHED_CFQ is not set
CONFIG_DEFAULT_DEADLINE=y
# CONFIG_DEFAULT_CFQ is not set
# CONFIG_DEFAULT_NOOP is not set
CONFIG_DEFAULT_IOSCHED="deadline"
CONFIG_PREEMPT_NOTIFIERS=y
CONFIG_PADATA=y
# CONFIG_INLINE_SPIN_TRYLOCK is not set
# CONFIG_INLINE_SPIN_TRYLOCK_BH is not set
# CONFIG_INLINE_SPIN_LOCK is not set
# CONFIG_INLINE_SPIN_LOCK_BH is not set
# CONFIG_INLINE_SPIN_LOCK_IRQ is not set
# CONFIG_INLINE_SPIN_LOCK_IRQSAVE is not set
# CONFIG_INLINE_SPIN_UNLOCK is not set
# CONFIG_INLINE_SPIN_UNLOCK_BH is not set
# CONFIG_INLINE_SPIN_UNLOCK_IRQ is not set
# CONFIG_INLINE_SPIN_UNLOCK_IRQRESTORE is not set
# CONFIG_INLINE_READ_TRYLOCK is not set
# CONFIG_INLINE_READ_LOCK is not set
# CONFIG_INLINE_READ_LOCK_BH is not set
# CONFIG_INLINE_READ_LOCK_IRQ is not set
# CONFIG_INLINE_READ_LOCK_IRQSAVE is not set
# CONFIG_INLINE_READ_UNLOCK is not set
# CONFIG_INLINE_READ_UNLOCK_BH is not set
# CONFIG_INLINE_READ_UNLOCK_IRQ is not set
# CONFIG_INLINE_READ_UNLOCK_IRQRESTORE is not set
# CONFIG_INLINE_WRITE_TRYLOCK is not set
# CONFIG_INLINE_WRITE_LOCK is not set
# CONFIG_INLINE_WRITE_LOCK_BH is not set
# CONFIG_INLINE_WRITE_LOCK_IRQ is not set
# CONFIG_INLINE_WRITE_LOCK_IRQSAVE is not set
# CONFIG_INLINE_WRITE_UNLOCK is not set
# CONFIG_INLINE_WRITE_UNLOCK_BH is not set
# CONFIG_INLINE_WRITE_UNLOCK_IRQ is not set
# CONFIG_INLINE_WRITE_UNLOCK_IRQRESTORE is not set
# CONFIG_MUTEX_SPIN_ON_OWNER is not set
# CONFIG_FREEZER is not set
#
# Processor type and features
#
CONFIG_TICK_ONESHOT=y
CONFIG_NO_HZ=y
CONFIG_HIGH_RES_TIMERS=y
CONFIG_GENERIC_CLOCKEVENTS_BUILD=y
CONFIG_SMP_SUPPORT=y
CONFIG_SPARSE_IRQ=y
CONFIG_X86_MPPARSE=y
CONFIG_X86_EXTENDED_PLATFORM=y
CONFIG_X86_VSMP=y
# CONFIG_SCHED_OMIT_FRAME_POINTER is not set
# CONFIG_PARAVIRT_GUEST is not set
CONFIG_PARAVIRT=y
CONFIG_PARAVIRT_DEBUG=y
CONFIG_NO_BOOTMEM=y
CONFIG_MEMTEST=y
# CONFIG_M386 is not set
# CONFIG_M486 is not set
# CONFIG_M586 is not set
# CONFIG_M586TSC is not set
# CONFIG_M586MMX is not set
# CONFIG_M686 is not set
# CONFIG_MPENTIUMII is not set
# CONFIG_MPENTIUMIII is not set
# CONFIG_MPENTIUMM is not set
# CONFIG_MPENTIUM4 is not set
# CONFIG_MK6 is not set
# CONFIG_MK7 is not set
# CONFIG_MK8 is not set
# CONFIG_MCRUSOE is not set
# CONFIG_MEFFICEON is not set
# CONFIG_MWINCHIPC6 is not set
# CONFIG_MWINCHIP3D is not set
# CONFIG_MGEODEGX1 is not set
# CONFIG_MGEODE_LX is not set
# CONFIG_MCYRIXIII is not set
# CONFIG_MVIAC3_2 is not set
# CONFIG_MVIAC7 is not set
# CONFIG_MPSC is not set
# CONFIG_MCORE2 is not set
# CONFIG_MATOM is not set
CONFIG_GENERIC_CPU=y
CONFIG_X86_CPU=y
CONFIG_X86_INTERNODE_CACHE_SHIFT=12
CONFIG_X86_CMPXCHG=y
CONFIG_X86_L1_CACHE_SHIFT=6
CONFIG_X86_XADD=y
CONFIG_X86_WP_WORKS_OK=y
CONFIG_X86_TSC=y
CONFIG_X86_CMPXCHG64=y
CONFIG_X86_CMOV=y
CONFIG_X86_MINIMUM_CPU_FAMILY=64
CONFIG_X86_DEBUGCTLMSR=y
CONFIG_PROCESSOR_SELECT=y
CONFIG_CPU_SUP_INTEL=y
CONFIG_CPU_SUP_AMD=y
CONFIG_CPU_SUP_CENTAUR=y
# CONFIG_X86_DS is not set
CONFIG_HPET_TIMER=y
CONFIG_DMI=y
# CONFIG_GART_IOMMU is not set
CONFIG_CALGARY_IOMMU=y
CONFIG_CALGARY_IOMMU_ENABLED_BY_DEFAULT=y
CONFIG_SWIOTLB=y
CONFIG_IOMMU_HELPER=y
# CONFIG_IOMMU_API is not set
CONFIG_MAXSMP=y
CONFIG_NR_CPUS=4096
CONFIG_SCHED_SMT=y
CONFIG_SCHED_MC=y
# CONFIG_PREEMPT_NONE is not set
CONFIG_PREEMPT_VOLUNTARY=y
# CONFIG_PREEMPT is not set
CONFIG_X86_LOCAL_APIC=y
CONFIG_X86_IO_APIC=y
# CONFIG_X86_REROUTE_FOR_BROKEN_BOOT_IRQS is not set
# CONFIG_X86_MCE is not set
CONFIG_I8K=y
# CONFIG_MICROCODE is not set
# CONFIG_X86_MSR is not set
# CONFIG_X86_CPUID is not set
CONFIG_UP_WANTED_1=y
# CONFIG_UP_WANTED_2 is not set
CONFIG_SMP=y
CONFIG_ARCH_PHYS_ADDR_T_64BIT=y
# CONFIG_DIRECT_GBPAGES is not set
# CONFIG_NUMA is not set
CONFIG_ARCH_PROC_KCORE_TEXT=y
CONFIG_ARCH_SPARSEMEM_DEFAULT=y
CONFIG_ARCH_SPARSEMEM_ENABLE=y
CONFIG_ARCH_SELECT_MEMORY_MODEL=y
CONFIG_ARCH_MEMORY_PROBE=y
CONFIG_ILLEGAL_POINTER_VALUE=0xdead000000000000
CONFIG_SELECT_MEMORY_MODEL=y
# CONFIG_FLATMEM_MANUAL is not set
# CONFIG_DISCONTIGMEM_MANUAL is not set
CONFIG_SPARSEMEM_MANUAL=y
CONFIG_SPARSEMEM=y
CONFIG_HAVE_MEMORY_PRESENT=y
CONFIG_SPARSEMEM_EXTREME=y
CONFIG_SPARSEMEM_VMEMMAP_ENABLE=y
CONFIG_SPARSEMEM_ALLOC_MEM_MAP_TOGETHER=y
CONFIG_SPARSEMEM_VMEMMAP=y
CONFIG_MEMORY_HOTPLUG=y
CONFIG_MEMORY_HOTPLUG_SPARSE=y
CONFIG_MEMORY_HOTREMOVE=y
CONFIG_PAGEFLAGS_EXTENDED=y
CONFIG_SPLIT_PTLOCK_CPUS=999999
CONFIG_MIGRATION=y
CONFIG_PHYS_ADDR_T_64BIT=y
CONFIG_ZONE_DMA_FLAG=1
CONFIG_BOUNCE=y
CONFIG_VIRT_TO_BUS=y
CONFIG_MMU_NOTIFIER=y
CONFIG_KSM=y
CONFIG_DEFAULT_MMAP_MIN_ADDR=4096
# CONFIG_X86_CHECK_BIOS_CORRUPTION is not set
CONFIG_X86_RESERVE_LOW_64K=y
CONFIG_MTRR=y
CONFIG_MTRR_SANITIZER=y
CONFIG_MTRR_SANITIZER_ENABLE_DEFAULT=0
CONFIG_MTRR_SANITIZER_SPARE_REG_NR_DEFAULT=1
# CONFIG_X86_PAT is not set
CONFIG_SECCOMP=y
CONFIG_CC_STACKPROTECTOR=y
# CONFIG_HZ_100 is not set
# CONFIG_HZ_250 is not set
CONFIG_HZ_300=y
# CONFIG_HZ_1000 is not set
CONFIG_HZ=300
CONFIG_SCHED_HRTICK=y
CONFIG_KEXEC=y
CONFIG_CRASH_DUMP=y
CONFIG_PHYSICAL_START=0x1000000
CONFIG_RELOCATABLE=y
CONFIG_PHYSICAL_ALIGN=0x1000000
CONFIG_HOTPLUG_CPU=y
CONFIG_COMPAT_VDSO=y
# CONFIG_CMDLINE_BOOL is not set
CONFIG_ARCH_ENABLE_MEMORY_HOTPLUG=y
CONFIG_ARCH_ENABLE_MEMORY_HOTREMOVE=y
#
# Power management and ACPI options
#
# CONFIG_PM is not set
CONFIG_SFI=y
#
# CPU Frequency scaling
#
CONFIG_CPU_FREQ=y
CONFIG_CPU_FREQ_TABLE=y
# CONFIG_CPU_FREQ_DEBUG is not set
CONFIG_CPU_FREQ_STAT=m
CONFIG_CPU_FREQ_STAT_DETAILS=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_PERFORMANCE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_POWERSAVE is not set
# CONFIG_CPU_FREQ_DEFAULT_GOV_USERSPACE is not set
CONFIG_CPU_FREQ_DEFAULT_GOV_ONDEMAND=y
# CONFIG_CPU_FREQ_DEFAULT_GOV_CONSERVATIVE is not set
CONFIG_CPU_FREQ_GOV_PERFORMANCE=y
CONFIG_CPU_FREQ_GOV_POWERSAVE=y
CONFIG_CPU_FREQ_GOV_USERSPACE=m
CONFIG_CPU_FREQ_GOV_ONDEMAND=y
CONFIG_CPU_FREQ_GOV_CONSERVATIVE=m
#
# CPUFreq processor drivers
#
CONFIG_X86_P4_CLOCKMOD=m
#
# shared options
#
CONFIG_X86_SPEEDSTEP_LIB=m
CONFIG_CPU_IDLE=y
CONFIG_CPU_IDLE_GOV_LADDER=y
CONFIG_CPU_IDLE_GOV_MENU=y
#
# Memory power savings
#
CONFIG_I7300_IDLE_IOAT_CHANNEL=y
CONFIG_I7300_IDLE=m
#
# Bus options (PCI etc.)
#
CONFIG_PCI=y
CONFIG_PCI_DIRECT=y
CONFIG_PCI_DOMAINS=y
# CONFIG_PCIEPORTBUS is not set
CONFIG_ARCH_SUPPORTS_MSI=y
CONFIG_PCI_MSI=y
CONFIG_PCI_DEBUG=y
CONFIG_PCI_STUB=y
CONFIG_HT_IRQ=y
# CONFIG_PCI_IOV is not set
CONFIG_ISA_DMA_API=y
# CONFIG_PCCARD is not set
# CONFIG_HOTPLUG_PCI is not set
#
# Executable file formats / Emulations
#
CONFIG_BINFMT_ELF=y
CONFIG_COMPAT_BINFMT_ELF=y
# CONFIG_CORE_DUMP_DEFAULT_ELF_HEADERS is not set
# CONFIG_HAVE_AOUT is not set
CONFIG_BINFMT_MISC=m
CONFIG_IA32_EMULATION=y
CONFIG_IA32_AOUT=m
CONFIG_COMPAT=y
CONFIG_COMPAT_FOR_U64_ALIGNMENT=y
CONFIG_SYSVIPC_COMPAT=y
CONFIG_NET=y
CONFIG_COMPAT_NETLINK_MESSAGES=y
#
# Networking options
#
CONFIG_PACKET=y
# CONFIG_PACKET_MMAP is not set
CONFIG_UNIX=y
CONFIG_XFRM=y
CONFIG_XFRM_USER=m
CONFIG_XFRM_SUB_POLICY=y
CONFIG_XFRM_MIGRATE=y
# CONFIG_XFRM_STATISTICS is not set
CONFIG_XFRM_IPCOMP=y
CONFIG_NET_KEY=m
CONFIG_NET_KEY_MIGRATE=y
CONFIG_INET=y
# CONFIG_IP_MULTICAST is not set
# CONFIG_IP_ADVANCED_ROUTER is not set
CONFIG_IP_FIB_HASH=y
CONFIG_IP_PNP=y
# CONFIG_IP_PNP_DHCP is not set
# CONFIG_IP_PNP_BOOTP is not set
CONFIG_IP_PNP_RARP=y
# CONFIG_NET_IPIP is not set
CONFIG_NET_IPGRE=y
CONFIG_ARPD=y
CONFIG_SYN_COOKIES=y
CONFIG_INET_AH=m
CONFIG_INET_ESP=y
# CONFIG_INET_IPCOMP is not set
# CONFIG_INET_XFRM_TUNNEL is not set
# CONFIG_INET_TUNNEL is not set
CONFIG_INET_XFRM_MODE_TRANSPORT=y
CONFIG_INET_XFRM_MODE_TUNNEL=m
CONFIG_INET_XFRM_MODE_BEET=y
CONFIG_INET_LRO=y
# CONFIG_INET_DIAG is not set
CONFIG_TCP_CONG_ADVANCED=y
CONFIG_TCP_CONG_BIC=m
# CONFIG_TCP_CONG_CUBIC is not set
CONFIG_TCP_CONG_WESTWOOD=y
CONFIG_TCP_CONG_HTCP=y
# CONFIG_TCP_CONG_HSTCP is not set
CONFIG_TCP_CONG_HYBLA=y
CONFIG_TCP_CONG_VEGAS=m
CONFIG_TCP_CONG_SCALABLE=m
CONFIG_TCP_CONG_LP=m
# CONFIG_TCP_CONG_VENO is not set
CONFIG_TCP_CONG_YEAH=m
CONFIG_TCP_CONG_ILLINOIS=m
# CONFIG_DEFAULT_BIC is not set
# CONFIG_DEFAULT_CUBIC is not set
# CONFIG_DEFAULT_HTCP is not set
# CONFIG_DEFAULT_VEGAS is not set
CONFIG_DEFAULT_WESTWOOD=y
# CONFIG_DEFAULT_RENO is not set
CONFIG_DEFAULT_TCP_CONG="westwood"
# CONFIG_TCP_MD5SIG is not set
CONFIG_IPV6=y
CONFIG_IPV6_PRIVACY=y
# CONFIG_IPV6_ROUTER_PREF is not set
# CONFIG_IPV6_OPTIMISTIC_DAD is not set
# CONFIG_INET6_AH is not set
CONFIG_INET6_ESP=m
CONFIG_INET6_IPCOMP=y
CONFIG_IPV6_MIP6=m
CONFIG_INET6_XFRM_TUNNEL=y
CONFIG_INET6_TUNNEL=y
CONFIG_INET6_XFRM_MODE_TRANSPORT=y
CONFIG_INET6_XFRM_MODE_TUNNEL=m
# CONFIG_INET6_XFRM_MODE_BEET is not set
CONFIG_INET6_XFRM_MODE_ROUTEOPTIMIZATION=m
# CONFIG_IPV6_SIT is not set
CONFIG_IPV6_TUNNEL=y
CONFIG_IPV6_MULTIPLE_TABLES=y
CONFIG_IPV6_SUBTREES=y
CONFIG_IPV6_MROUTE=y
# CONFIG_IPV6_PIMSM_V2 is not set
# CONFIG_NETLABEL is not set
CONFIG_NETWORK_SECMARK=y
CONFIG_NETFILTER=y
# CONFIG_NETFILTER_DEBUG is not set
CONFIG_NETFILTER_ADVANCED=y
#
# Core Netfilter Configuration
#
CONFIG_NETFILTER_NETLINK=y
CONFIG_NETFILTER_NETLINK_QUEUE=y
CONFIG_NETFILTER_NETLINK_LOG=y
# CONFIG_NF_CONNTRACK is not set
CONFIG_NETFILTER_XTABLES=y
CONFIG_NETFILTER_XT_TARGET_CLASSIFY=y
# CONFIG_NETFILTER_XT_TARGET_DSCP is not set
CONFIG_NETFILTER_XT_TARGET_HL=y
CONFIG_NETFILTER_XT_TARGET_LED=m
CONFIG_NETFILTER_XT_TARGET_MARK=y
CONFIG_NETFILTER_XT_TARGET_NFLOG=y
CONFIG_NETFILTER_XT_TARGET_NFQUEUE=m
CONFIG_NETFILTER_XT_TARGET_RATEEST=y
# CONFIG_NETFILTER_XT_TARGET_SECMARK is not set
# CONFIG_NETFILTER_XT_TARGET_TCPMSS is not set
# CONFIG_NETFILTER_XT_TARGET_TCPOPTSTRIP is not set
CONFIG_NETFILTER_XT_MATCH_COMMENT=m
# CONFIG_NETFILTER_XT_MATCH_DCCP is not set
# CONFIG_NETFILTER_XT_MATCH_DSCP is not set
CONFIG_NETFILTER_XT_MATCH_ESP=y
CONFIG_NETFILTER_XT_MATCH_HASHLIMIT=y
CONFIG_NETFILTER_XT_MATCH_HL=y
CONFIG_NETFILTER_XT_MATCH_IPRANGE=m
CONFIG_NETFILTER_XT_MATCH_LENGTH=m
CONFIG_NETFILTER_XT_MATCH_LIMIT=y
CONFIG_NETFILTER_XT_MATCH_MAC=y
CONFIG_NETFILTER_XT_MATCH_MARK=m
# CONFIG_NETFILTER_XT_MATCH_MULTIPORT is not set
CONFIG_NETFILTER_XT_MATCH_OWNER=y
CONFIG_NETFILTER_XT_MATCH_POLICY=m
# CONFIG_NETFILTER_XT_MATCH_PKTTYPE is not set
CONFIG_NETFILTER_XT_MATCH_QUOTA=m
CONFIG_NETFILTER_XT_MATCH_RATEEST=y
CONFIG_NETFILTER_XT_MATCH_REALM=y
CONFIG_NETFILTER_XT_MATCH_RECENT=m
# CONFIG_NETFILTER_XT_MATCH_RECENT_PROC_COMPAT is not set
CONFIG_NETFILTER_XT_MATCH_SCTP=m
CONFIG_NETFILTER_XT_MATCH_STATISTIC=y
CONFIG_NETFILTER_XT_MATCH_STRING=y
CONFIG_NETFILTER_XT_MATCH_TCPMSS=y
CONFIG_NETFILTER_XT_MATCH_TIME=y
# CONFIG_NETFILTER_XT_MATCH_U32 is not set
CONFIG_NETFILTER_XT_MATCH_OSF=y
CONFIG_IP_VS=y
CONFIG_IP_VS_IPV6=y
CONFIG_IP_VS_DEBUG=y
CONFIG_IP_VS_TAB_BITS=12
#
# IPVS transport protocol load balancing support
#
# CONFIG_IP_VS_PROTO_TCP is not set
# CONFIG_IP_VS_PROTO_UDP is not set
CONFIG_IP_VS_PROTO_AH_ESP=y
CONFIG_IP_VS_PROTO_ESP=y
CONFIG_IP_VS_PROTO_AH=y
#
# IPVS scheduler
#
CONFIG_IP_VS_RR=m
CONFIG_IP_VS_WRR=y
CONFIG_IP_VS_LC=m
CONFIG_IP_VS_WLC=m
CONFIG_IP_VS_LBLC=y
# CONFIG_IP_VS_LBLCR is not set
CONFIG_IP_VS_DH=m
CONFIG_IP_VS_SH=y
CONFIG_IP_VS_SED=y
CONFIG_IP_VS_NQ=m
#
# IPVS application helper
#
#
# IP: Netfilter Configuration
#
# CONFIG_NF_DEFRAG_IPV4 is not set
CONFIG_IP_NF_QUEUE=y
CONFIG_IP_NF_IPTABLES=y
CONFIG_IP_NF_MATCH_ADDRTYPE=m
# CONFIG_IP_NF_MATCH_AH is not set
CONFIG_IP_NF_MATCH_ECN=y
CONFIG_IP_NF_MATCH_TTL=y
CONFIG_IP_NF_FILTER=y
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_LOG=m
# CONFIG_IP_NF_TARGET_ULOG is not set
CONFIG_IP_NF_MANGLE=y
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_TTL=y
# CONFIG_IP_NF_RAW is not set
CONFIG_IP_NF_SECURITY=y
# CONFIG_IP_NF_ARPTABLES is not set
#
# IPv6: Netfilter Configuration
#
CONFIG_IP6_NF_QUEUE=y
# CONFIG_IP6_NF_IPTABLES is not set
#
# DECnet: Netfilter Configuration
#
CONFIG_DECNET_NF_GRABULATOR=y
CONFIG_IP_DCCP=y
#
# DCCP CCIDs Configuration (EXPERIMENTAL)
#
CONFIG_IP_DCCP_CCID2_DEBUG=y
# CONFIG_IP_DCCP_CCID3 is not set
#
# DCCP Kernel Hacking
#
CONFIG_IP_DCCP_DEBUG=y
CONFIG_IP_SCTP=y
CONFIG_SCTP_DBG_MSG=y
CONFIG_SCTP_DBG_OBJCNT=y
# CONFIG_SCTP_HMAC_NONE is not set
# CONFIG_SCTP_HMAC_SHA1 is not set
CONFIG_SCTP_HMAC_MD5=y
CONFIG_RDS=m
CONFIG_RDS_RDMA=m
CONFIG_RDS_TCP=m
# CONFIG_RDS_DEBUG is not set
CONFIG_TIPC=y
CONFIG_TIPC_ADVANCED=y
CONFIG_TIPC_ZONES=3
CONFIG_TIPC_CLUSTERS=1
CONFIG_TIPC_NODES=255
CONFIG_TIPC_SLAVE_NODES=0
CONFIG_TIPC_PORTS=8191
CONFIG_TIPC_LOG=0
# CONFIG_TIPC_DEBUG is not set
# CONFIG_ATM is not set
CONFIG_STP=m
CONFIG_GARP=m
# CONFIG_BRIDGE is not set
CONFIG_NET_DSA=y
# CONFIG_NET_DSA_TAG_DSA is not set
CONFIG_NET_DSA_TAG_EDSA=y
CONFIG_NET_DSA_TAG_TRAILER=y
CONFIG_NET_DSA_MV88E6XXX=y
CONFIG_NET_DSA_MV88E6060=y
# CONFIG_NET_DSA_MV88E6XXX_NEED_PPU is not set
# CONFIG_NET_DSA_MV88E6131 is not set
CONFIG_NET_DSA_MV88E6123_61_65=y
CONFIG_VLAN_8021Q=m
CONFIG_VLAN_8021Q_GVRP=y
CONFIG_DECNET=y
CONFIG_DECNET_ROUTER=y
CONFIG_LLC=y
# CONFIG_LLC2 is not set
CONFIG_IPX=y
CONFIG_IPX_INTERN=y
CONFIG_ATALK=y
CONFIG_DEV_APPLETALK=y
CONFIG_IPDDP=y
# CONFIG_IPDDP_ENCAP is not set
CONFIG_IPDDP_DECAP=y
# CONFIG_X25 is not set
CONFIG_LAPB=y
CONFIG_ECONET=m
CONFIG_ECONET_AUNUDP=y
# CONFIG_ECONET_NATIVE is not set
CONFIG_WAN_ROUTER=y
# CONFIG_PHONET is not set
CONFIG_IEEE802154=m
CONFIG_NET_SCHED=y
#
# Queueing/Scheduling
#
CONFIG_NET_SCH_CBQ=m
CONFIG_NET_SCH_HTB=m
# CONFIG_NET_SCH_HFSC is not set
# CONFIG_NET_SCH_PRIO is not set
# CONFIG_NET_SCH_MULTIQ is not set
CONFIG_NET_SCH_RED=m
CONFIG_NET_SCH_SFQ=m
# CONFIG_NET_SCH_TEQL is not set
CONFIG_NET_SCH_TBF=y
CONFIG_NET_SCH_GRED=y
CONFIG_NET_SCH_DSMARK=y
CONFIG_NET_SCH_NETEM=y
CONFIG_NET_SCH_DRR=m
# CONFIG_NET_SCH_INGRESS is not set
#
# Classification
#
CONFIG_NET_CLS=y
CONFIG_NET_CLS_BASIC=y
CONFIG_NET_CLS_TCINDEX=m
CONFIG_NET_CLS_ROUTE4=y
CONFIG_NET_CLS_ROUTE=y
CONFIG_NET_CLS_FW=y
CONFIG_NET_CLS_U32=m
CONFIG_CLS_U32_PERF=y
CONFIG_CLS_U32_MARK=y
CONFIG_NET_CLS_RSVP=y
# CONFIG_NET_CLS_RSVP6 is not set
CONFIG_NET_CLS_FLOW=y
# CONFIG_NET_EMATCH is not set
CONFIG_NET_CLS_ACT=y
CONFIG_NET_ACT_POLICE=y
CONFIG_NET_ACT_GACT=y
# CONFIG_GACT_PROB is not set
# CONFIG_NET_ACT_MIRRED is not set
# CONFIG_NET_ACT_IPT is not set
CONFIG_NET_ACT_NAT=y
# CONFIG_NET_ACT_PEDIT is not set
CONFIG_NET_ACT_SIMP=y
CONFIG_NET_ACT_SKBEDIT=m
# CONFIG_NET_CLS_IND is not set
CONFIG_NET_SCH_FIFO=y
# CONFIG_DCB is not set
#
# Network testing
#
CONFIG_NET_PKTGEN=m
# CONFIG_NET_DROP_MONITOR is not set
CONFIG_HAMRADIO=y
#
# Packet Radio protocols
#
CONFIG_AX25=y
# CONFIG_AX25_DAMA_SLAVE is not set
# CONFIG_NETROM is not set
CONFIG_ROSE=m
#
# AX.25 network device drivers
#
# CONFIG_MKISS is not set
CONFIG_6PACK=y
CONFIG_BPQETHER=y
CONFIG_BAYCOM_SER_FDX=m
CONFIG_BAYCOM_SER_HDX=m
# CONFIG_BAYCOM_PAR is not set
CONFIG_YAM=m
# CONFIG_CAN is not set
CONFIG_IRDA=m
#
# IrDA protocols
#
CONFIG_IRLAN=m
CONFIG_IRNET=m
CONFIG_IRCOMM=m
CONFIG_IRDA_ULTRA=y
#
# IrDA options
#
CONFIG_IRDA_CACHE_LAST_LSAP=y
CONFIG_IRDA_FAST_RR=y
# CONFIG_IRDA_DEBUG is not set
#
# Infrared-port device drivers
#
#
# SIR device drivers
#
CONFIG_IRTTY_SIR=m
#
# Dongle support
#
CONFIG_DONGLE=y
# CONFIG_ESI_DONGLE is not set
# CONFIG_ACTISYS_DONGLE is not set
# CONFIG_TEKRAM_DONGLE is not set
CONFIG_TOIM3232_DONGLE=m
CONFIG_LITELINK_DONGLE=m
CONFIG_MA600_DONGLE=m
CONFIG_GIRBIL_DONGLE=m
CONFIG_MCP2120_DONGLE=m
CONFIG_OLD_BELKIN_DONGLE=m
CONFIG_ACT200L_DONGLE=m
# CONFIG_KINGSUN_DONGLE is not set
CONFIG_KSDAZZLE_DONGLE=m
# CONFIG_KS959_DONGLE is not set
#
# FIR device drivers
#
CONFIG_USB_IRDA=m
CONFIG_SIGMATEL_FIR=m
CONFIG_NSC_FIR=m
CONFIG_WINBOND_FIR=m
# CONFIG_SMC_IRCC_FIR is not set
# CONFIG_ALI_FIR is not set
CONFIG_VLSI_FIR=m
CONFIG_VIA_FIR=m
CONFIG_MCS_FIR=m
CONFIG_BT=m
CONFIG_BT_L2CAP=m
CONFIG_BT_SCO=m
CONFIG_BT_RFCOMM=m
CONFIG_BT_RFCOMM_TTY=y
# CONFIG_BT_BNEP is not set
# CONFIG_BT_CMTP is not set
CONFIG_BT_HIDP=m
#
# Bluetooth device drivers
#
# CONFIG_BT_HCIBTUSB is not set
CONFIG_BT_HCIUART=m
CONFIG_BT_HCIUART_H4=y
CONFIG_BT_HCIUART_BCSP=y
CONFIG_BT_HCIUART_LL=y
CONFIG_BT_HCIBCM203X=m
# CONFIG_BT_HCIBPA10X is not set
CONFIG_BT_HCIBFUSB=m
# CONFIG_BT_HCIVHCI is not set
CONFIG_BT_MRVL=m
CONFIG_AF_RXRPC=y
CONFIG_AF_RXRPC_DEBUG=y
CONFIG_RXKAD=y
CONFIG_FIB_RULES=y
CONFIG_WIRELESS=y
CONFIG_WIRELESS_EXT=y
CONFIG_WEXT_CORE=y
CONFIG_WEXT_PROC=y
CONFIG_WEXT_SPY=y
CONFIG_WEXT_PRIV=y
CONFIG_CFG80211=m
# CONFIG_NL80211_TESTMODE is not set
CONFIG_CFG80211_DEVELOPER_WARNINGS=y
CONFIG_CFG80211_REG_DEBUG=y
CONFIG_CFG80211_DEFAULT_PS=y
CONFIG_CFG80211_DEBUGFS=y
CONFIG_WIRELESS_OLD_REGULATORY=y
CONFIG_CFG80211_WEXT=y
CONFIG_WIRELESS_EXT_SYSFS=y
CONFIG_LIB80211=m
CONFIG_LIB80211_CRYPT_WEP=m
CONFIG_LIB80211_CRYPT_CCMP=m
CONFIG_LIB80211_CRYPT_TKIP=m
CONFIG_LIB80211_DEBUG=y
# CONFIG_MAC80211 is not set
# CONFIG_WIMAX is not set
CONFIG_RFKILL=m
CONFIG_RFKILL_LEDS=y
# CONFIG_RFKILL_INPUT is not set
#
# Device Drivers
#
#
# Generic Driver Options
#
CONFIG_UEVENT_HELPER_PATH="/sbin/hotplug"
# CONFIG_DEVTMPFS is not set
CONFIG_STANDALONE=y
CONFIG_PREVENT_FIRMWARE_BUILD=y
CONFIG_FW_LOADER=y
CONFIG_FIRMWARE_IN_KERNEL=y
CONFIG_EXTRA_FIRMWARE=""
# CONFIG_DEBUG_DRIVER is not set
CONFIG_DEBUG_DEVRES=y
# CONFIG_SYS_HYPERVISOR is not set
CONFIG_CONNECTOR=m
CONFIG_PARPORT=y
CONFIG_PARPORT_PC=y
CONFIG_PARPORT_SERIAL=y
# CONFIG_PARPORT_PC_FIFO is not set
CONFIG_PARPORT_PC_SUPERIO=y
# CONFIG_PARPORT_GSC is not set
# CONFIG_PARPORT_AX88796 is not set
# CONFIG_PARPORT_1284 is not set
CONFIG_PARPORT_NOT_PC=y
CONFIG_BLK_DEV=y
# CONFIG_BLK_DEV_FD is not set
CONFIG_BLK_CPQ_DA=y
CONFIG_BLK_CPQ_CISS_DA=m
CONFIG_CISS_SCSI_TAPE=y
CONFIG_BLK_DEV_DAC960=y
CONFIG_BLK_DEV_UMEM=y
# CONFIG_BLK_DEV_COW_COMMON is not set
# CONFIG_BLK_DEV_LOOP is not set
# CONFIG_BLK_DEV_DRBD is not set
# CONFIG_BLK_DEV_NBD is not set
CONFIG_BLK_DEV_SX8=m
CONFIG_BLK_DEV_UB=m
CONFIG_BLK_DEV_RAM=y
CONFIG_BLK_DEV_RAM_COUNT=16
CONFIG_BLK_DEV_RAM_SIZE=4096
CONFIG_BLK_DEV_XIP=y
CONFIG_CDROM_PKTCDVD=y
CONFIG_CDROM_PKTCDVD_BUFFERS=8
# CONFIG_CDROM_PKTCDVD_WCACHE is not set
# CONFIG_ATA_OVER_ETH is not set
CONFIG_BLK_DEV_HD=y
CONFIG_MISC_DEVICES=y
CONFIG_AD525X_DPOT=m
CONFIG_IBM_ASM=y
CONFIG_PHANTOM=m
CONFIG_SGI_IOC4=y
CONFIG_TIFM_CORE=y
CONFIG_TIFM_7XX1=m
# CONFIG_ICS932S401 is not set
CONFIG_ENCLOSURE_SERVICES=m
CONFIG_CS5535_MFGPT=y
CONFIG_CS5535_MFGPT_DEFAULT_IRQ=7
# CONFIG_HP_ILO is not set
CONFIG_ISL29003=m
# CONFIG_DS1682 is not set
CONFIG_TI_DAC7512=y
CONFIG_C2PORT=m
CONFIG_C2PORT_DURAMAR_2150=m
#
# EEPROM support
#
CONFIG_EEPROM_AT24=m
CONFIG_EEPROM_AT25=y
CONFIG_EEPROM_LEGACY=m
CONFIG_EEPROM_MAX6875=m
# CONFIG_EEPROM_93CX6 is not set
# CONFIG_CB710_CORE is not set
CONFIG_HAVE_IDE=y
#
# SCSI device support
#
CONFIG_RAID_ATTRS=m
CONFIG_SCSI=y
CONFIG_SCSI_DMA=y
CONFIG_SCSI_TGT=m
# CONFIG_SCSI_NETLINK is not set
# CONFIG_SCSI_PROC_FS is not set
#
# SCSI support type (disk, tape, CD-ROM)
#
CONFIG_BLK_DEV_SD=y
# CONFIG_CHR_DEV_ST is not set
CONFIG_CHR_DEV_OSST=y
CONFIG_BLK_DEV_SR=y
# CONFIG_BLK_DEV_SR_VENDOR is not set
# CONFIG_CHR_DEV_SG is not set
CONFIG_CHR_DEV_SCH=m
CONFIG_SCSI_ENCLOSURE=m
# CONFIG_SCSI_MULTI_LUN is not set
# CONFIG_SCSI_CONSTANTS is not set
CONFIG_SCSI_LOGGING=y
CONFIG_SCSI_SCAN_ASYNC=y
CONFIG_SCSI_WAIT_SCAN=m
#
# SCSI Transports
#
CONFIG_SCSI_SPI_ATTRS=y
# CONFIG_SCSI_FC_ATTRS is not set
# CONFIG_SCSI_ISCSI_ATTRS is not set
CONFIG_SCSI_SAS_ATTRS=m
CONFIG_SCSI_SAS_LIBSAS=m
# CONFIG_SCSI_SAS_ATA is not set
CONFIG_SCSI_SAS_HOST_SMP=y
CONFIG_SCSI_SAS_LIBSAS_DEBUG=y
# CONFIG_SCSI_LOWLEVEL is not set
CONFIG_SCSI_AIC7XXX=y
CONFIG_SCSI_DH=y
CONFIG_SCSI_DH_RDAC=m
CONFIG_SCSI_DH_HP_SW=y
CONFIG_SCSI_DH_EMC=m
# CONFIG_SCSI_DH_ALUA is not set
# CONFIG_SCSI_OSD_INITIATOR is not set
CONFIG_ATA=y
# CONFIG_ATA_NONSTANDARD is not set
# CONFIG_ATA_VERBOSE_ERROR is not set
CONFIG_SATA_PMP=y
CONFIG_SATA_AHCI=y
# CONFIG_SATA_SIL24 is not set
CONFIG_ATA_SFF=y
CONFIG_SATA_SVW=y
CONFIG_ATA_PIIX=y
CONFIG_SATA_MV=y
CONFIG_SATA_NV=y
CONFIG_PDC_ADMA=m
# CONFIG_SATA_QSTOR is not set
CONFIG_SATA_PROMISE=y
CONFIG_SATA_SX4=y
CONFIG_SATA_SIL=y
CONFIG_SATA_SIS=m
CONFIG_SATA_ULI=y
CONFIG_SATA_VIA=y
# CONFIG_SATA_VITESSE is not set
CONFIG_SATA_INIC162X=m
CONFIG_PATA_ALI=y
CONFIG_PATA_AMD=y
CONFIG_PATA_ARTOP=y
# CONFIG_PATA_ATP867X is not set
CONFIG_PATA_ATIIXP=y
# CONFIG_PATA_CMD640_PCI is not set
CONFIG_PATA_CMD64X=m
CONFIG_PATA_CS5520=y
CONFIG_PATA_CS5530=m
CONFIG_PATA_CYPRESS=m
CONFIG_PATA_EFAR=y
# CONFIG_ATA_GENERIC is not set
# CONFIG_PATA_HPT366 is not set
CONFIG_PATA_HPT37X=m
# CONFIG_PATA_HPT3X2N is not set
CONFIG_PATA_HPT3X3=y
# CONFIG_PATA_HPT3X3_DMA is not set
# CONFIG_PATA_IT821X is not set
CONFIG_PATA_IT8213=m
CONFIG_PATA_JMICRON=m
CONFIG_PATA_TRIFLEX=m
CONFIG_PATA_MARVELL=y
# CONFIG_PATA_MPIIX is not set
CONFIG_PATA_OLDPIIX=y
CONFIG_PATA_NETCELL=y
CONFIG_PATA_NINJA32=y
CONFIG_PATA_NS87410=m
CONFIG_PATA_NS87415=y
# CONFIG_PATA_OPTI is not set
CONFIG_PATA_OPTIDMA=m
CONFIG_PATA_PDC2027X=y
CONFIG_PATA_PDC_OLD=m
CONFIG_PATA_RADISYS=m
CONFIG_PATA_RDC=m
# CONFIG_PATA_RZ1000 is not set
CONFIG_PATA_SC1200=y
# CONFIG_PATA_SERVERWORKS is not set
# CONFIG_PATA_SIL680 is not set
CONFIG_PATA_SIS=m
CONFIG_PATA_TOSHIBA=y
CONFIG_PATA_VIA=y
# CONFIG_PATA_WINBOND is not set
CONFIG_PATA_PLATFORM=m
# CONFIG_PATA_SCH is not set
CONFIG_MD=y
CONFIG_BLK_DEV_MD=m
CONFIG_MD_LINEAR=m
# CONFIG_MD_RAID0 is not set
CONFIG_MD_RAID1=m
# CONFIG_MD_RAID10 is not set
CONFIG_MD_RAID456=m
CONFIG_MULTICORE_RAID456=y
CONFIG_MD_RAID6_PQ=m
CONFIG_ASYNC_RAID6_TEST=m
CONFIG_MD_MULTIPATH=m
CONFIG_MD_FAULTY=m
CONFIG_BLK_DEV_DM=m
CONFIG_DM_DEBUG=y
CONFIG_DM_CRYPT=m
# CONFIG_DM_SNAPSHOT is not set
CONFIG_DM_MIRROR=m
CONFIG_DM_LOG_USERSPACE=m
CONFIG_DM_ZERO=m
# CONFIG_DM_MULTIPATH is not set
CONFIG_DM_DELAY=m
# CONFIG_DM_UEVENT is not set
CONFIG_FUSION=y
# CONFIG_FUSION_SPI is not set
# CONFIG_FUSION_FC is not set
# CONFIG_FUSION_SAS is not set
CONFIG_FUSION_MAX_SGE=128
# CONFIG_FUSION_LOGGING is not set
#
# IEEE 1394 (FireWire) support
#
#
# You can enable one or both FireWire driver stacks.
#
#
# The newer stack is recommended.
#
CONFIG_FIREWIRE=m
# CONFIG_FIREWIRE_OHCI is not set
CONFIG_FIREWIRE_SBP2=m
# CONFIG_FIREWIRE_NET is not set
# CONFIG_IEEE1394 is not set
CONFIG_I2O=y
CONFIG_I2O_LCT_NOTIFY_ON_CHANGES=y
# CONFIG_I2O_EXT_ADAPTEC is not set
# CONFIG_I2O_CONFIG is not set
CONFIG_I2O_BUS=m
# CONFIG_I2O_BLOCK is not set
# CONFIG_I2O_SCSI is not set
CONFIG_I2O_PROC=m
# CONFIG_MACINTOSH_DRIVERS is not set
CONFIG_NETDEVICES=y
CONFIG_IFB=m
CONFIG_DUMMY=y
# CONFIG_BONDING is not set
# CONFIG_MACVLAN is not set
# CONFIG_EQUALIZER is not set
# CONFIG_TUN is not set
# CONFIG_VETH is not set
# CONFIG_ARCNET is not set
CONFIG_PHYLIB=y
#
# MII PHY device drivers
#
# CONFIG_MARVELL_PHY is not set
# CONFIG_DAVICOM_PHY is not set
CONFIG_QSEMI_PHY=y
CONFIG_LXT_PHY=y
# CONFIG_CICADA_PHY is not set
CONFIG_VITESSE_PHY=y
CONFIG_SMSC_PHY=y
CONFIG_BROADCOM_PHY=y
# CONFIG_ICPLUS_PHY is not set
# CONFIG_REALTEK_PHY is not set
# CONFIG_NATIONAL_PHY is not set
# CONFIG_STE10XP is not set
# CONFIG_LSI_ET1011C_PHY is not set
CONFIG_FIXED_PHY=y
CONFIG_MDIO_BITBANG=y
# CONFIG_MDIO_GPIO is not set
CONFIG_NET_ETHERNET=y
CONFIG_MII=y
CONFIG_HAPPYMEAL=m
CONFIG_SUNGEM=m
CONFIG_CASSINI=m
# CONFIG_NET_VENDOR_3COM is not set
CONFIG_VORTEX=y
# CONFIG_ENC28J60 is not set
CONFIG_ETHOC=y
CONFIG_DNET=m
# CONFIG_NET_TULIP is not set
CONFIG_HP100=y
# CONFIG_IBM_NEW_EMAC_ZMII is not set
# CONFIG_IBM_NEW_EMAC_RGMII is not set
# CONFIG_IBM_NEW_EMAC_TAH is not set
# CONFIG_IBM_NEW_EMAC_EMAC4 is not set
# CONFIG_IBM_NEW_EMAC_NO_FLOW_CTRL is not set
# CONFIG_IBM_NEW_EMAC_MAL_CLR_ICINTSTAT is not set
# CONFIG_IBM_NEW_EMAC_MAL_COMMON_ERR is not set
CONFIG_NET_PCI=y
# CONFIG_PCNET32 is not set
CONFIG_AMD8111_ETH=y
CONFIG_ADAPTEC_STARFIRE=m
# CONFIG_B44 is not set
CONFIG_FORCEDETH=y
# CONFIG_FORCEDETH_NAPI is not set
CONFIG_E100=y
# CONFIG_FEALNX is not set
CONFIG_NATSEMI=m
CONFIG_NE2K_PCI=y
CONFIG_8139CP=y
CONFIG_8139TOO=y
# CONFIG_8139TOO_PIO is not set
# CONFIG_8139TOO_TUNE_TWISTER is not set
CONFIG_8139TOO_8129=y
CONFIG_8139_OLD_RX_RESET=y
CONFIG_R6040=m
CONFIG_SIS900=y
CONFIG_EPIC100=m
CONFIG_SMSC9420=m
CONFIG_SUNDANCE=y
# CONFIG_SUNDANCE_MMIO is not set
CONFIG_TLAN=m
CONFIG_KS8842=m
CONFIG_KS8851=m
# CONFIG_KS8851_MLL is not set
CONFIG_VIA_RHINE=y
CONFIG_VIA_RHINE_MMIO=y
CONFIG_SC92031=m
CONFIG_NET_POCKET=y
CONFIG_ATP=m
CONFIG_DE600=m
CONFIG_DE620=m
# CONFIG_ATL2 is not set
CONFIG_NETDEV_1000=y
# CONFIG_ACENIC is not set
CONFIG_DL2K=m
CONFIG_E1000=y
CONFIG_E1000E=y
# CONFIG_IP1000 is not set
CONFIG_IGB=y
# CONFIG_IGBVF is not set
CONFIG_NS83820=y
CONFIG_HAMACHI=m
# CONFIG_YELLOWFIN is not set
# CONFIG_R8169 is not set
# CONFIG_SIS190 is not set
CONFIG_SKGE=y
CONFIG_SKGE_DEBUG=y
CONFIG_SKY2=m
# CONFIG_SKY2_DEBUG is not set
# CONFIG_VIA_VELOCITY is not set
CONFIG_TIGON3=y
CONFIG_BNX2=y
CONFIG_CNIC=y
CONFIG_QLA3XXX=y
# CONFIG_ATL1 is not set
CONFIG_ATL1E=y
CONFIG_ATL1C=y
# CONFIG_JME is not set
CONFIG_NETDEV_10000=y
CONFIG_MDIO=y
CONFIG_CHELSIO_T1=y
CONFIG_CHELSIO_T1_1G=y
CONFIG_CHELSIO_T3_DEPENDS=y
# CONFIG_CHELSIO_T3 is not set
CONFIG_ENIC=y
CONFIG_IXGBE=m
CONFIG_IXGB=m
# CONFIG_S2IO is not set
# CONFIG_MYRI10GE is not set
# CONFIG_NIU is not set
CONFIG_MLX4_EN=y
CONFIG_MLX4_CORE=y
CONFIG_MLX4_DEBUG=y
CONFIG_TEHUTI=m
# CONFIG_BNX2X is not set
# CONFIG_QLGE is not set
# CONFIG_SFC is not set
CONFIG_BE2NET=m
# CONFIG_TR is not set
CONFIG_WLAN=y
# CONFIG_AIRO is not set
CONFIG_ATMEL=y
CONFIG_PCI_ATMEL=y
# CONFIG_PRISM54 is not set
CONFIG_USB_ZD1201=m
# CONFIG_USB_NET_RNDIS_WLAN is not set
# CONFIG_ATH_COMMON is not set
CONFIG_HOSTAP=m
# CONFIG_HOSTAP_FIRMWARE is not set
CONFIG_HOSTAP_PLX=m
# CONFIG_HOSTAP_PCI is not set
CONFIG_IPW2100=m
# CONFIG_IPW2100_MONITOR is not set
# CONFIG_IPW2100_DEBUG is not set
CONFIG_IPW2200=m
# CONFIG_IPW2200_MONITOR is not set
CONFIG_IPW2200_QOS=y
CONFIG_IPW2200_DEBUG=y
CONFIG_LIBIPW=m
CONFIG_LIBIPW_DEBUG=y
# CONFIG_LIBERTAS is not set
CONFIG_HERMES=m
# CONFIG_HERMES_CACHE_FW_ON_INIT is not set
# CONFIG_PLX_HERMES is not set
CONFIG_TMD_HERMES=m
# CONFIG_NORTEL_HERMES is not set
CONFIG_PCI_HERMES=m
#
# Enable WiMAX (Networking options) to see the WiMAX drivers
#
#
# USB Network Adapters
#
# CONFIG_USB_CATC is not set
CONFIG_USB_KAWETH=y
CONFIG_USB_PEGASUS=m
CONFIG_USB_RTL8150=m
CONFIG_USB_USBNET=m
# CONFIG_USB_NET_AX8817X is not set
CONFIG_USB_NET_CDCETHER=m
# CONFIG_USB_NET_CDC_EEM is not set
CONFIG_USB_NET_DM9601=m
CONFIG_USB_NET_SMSC95XX=m
CONFIG_USB_NET_GL620A=m
# CONFIG_USB_NET_NET1080 is not set
CONFIG_USB_NET_PLUSB=m
CONFIG_USB_NET_MCS7830=m
CONFIG_USB_NET_RNDIS_HOST=m
# CONFIG_USB_NET_CDC_SUBSET is not set
# CONFIG_USB_NET_ZAURUS is not set
# CONFIG_USB_HSO is not set
CONFIG_USB_NET_INT51X1=m
CONFIG_WAN=y
CONFIG_LANMEDIA=m
CONFIG_HDLC=y
CONFIG_HDLC_RAW=m
# CONFIG_HDLC_RAW_ETH is not set
CONFIG_HDLC_CISCO=y
CONFIG_HDLC_FR=y
CONFIG_HDLC_PPP=y
CONFIG_HDLC_X25=y
# CONFIG_PCI200SYN is not set
# CONFIG_WANXL is not set
CONFIG_PC300TOO=y
CONFIG_FARSYNC=m
# CONFIG_DSCC4 is not set
CONFIG_DLCI=y
CONFIG_DLCI_MAX=8
CONFIG_WAN_ROUTER_DRIVERS=m
# CONFIG_CYCLADES_SYNC is not set
CONFIG_SBNI=m
CONFIG_SBNI_MULTILINE=y
CONFIG_IEEE802154_DRIVERS=m
# CONFIG_IEEE802154_FAKEHARD is not set
CONFIG_FDDI=y
CONFIG_DEFXX=m
CONFIG_DEFXX_MMIO=y
CONFIG_SKFP=y
CONFIG_HIPPI=y
CONFIG_ROADRUNNER=m
CONFIG_ROADRUNNER_LARGE_RINGS=y
CONFIG_PLIP=m
CONFIG_PPP=y
# CONFIG_PPP_MULTILINK is not set
CONFIG_PPP_FILTER=y
# CONFIG_PPP_ASYNC is not set
CONFIG_PPP_SYNC_TTY=y
CONFIG_PPP_DEFLATE=m
# CONFIG_PPP_BSDCOMP is not set
# CONFIG_PPP_MPPE is not set
CONFIG_PPPOE=m
CONFIG_PPPOL2TP=y
# CONFIG_SLIP is not set
CONFIG_SLHC=y
# CONFIG_NET_FC is not set
CONFIG_NETCONSOLE=y
CONFIG_NETCONSOLE_DYNAMIC=y
CONFIG_NETPOLL=y
CONFIG_NETPOLL_TRAP=y
CONFIG_NET_POLL_CONTROLLER=y
CONFIG_VMXNET3=m
CONFIG_ISDN=y
CONFIG_ISDN_I4L=m
CONFIG_ISDN_PPP=y
CONFIG_ISDN_PPP_VJ=y
CONFIG_ISDN_MPP=y
# CONFIG_IPPP_FILTER is not set
CONFIG_ISDN_PPP_BSDCOMP=m
# CONFIG_ISDN_AUDIO is not set
#
# ISDN feature submodules
#
CONFIG_ISDN_DIVERSION=m
#
# ISDN4Linux hardware drivers
#
#
# Passive cards
#
# CONFIG_ISDN_DRV_HISAX is not set
#
# Active cards
#
CONFIG_HYSDN=m
# CONFIG_HYSDN_CAPI is not set
CONFIG_ISDN_CAPI=m
CONFIG_ISDN_DRV_AVMB1_VERBOSE_REASON=y
CONFIG_CAPI_TRACE=y
CONFIG_ISDN_CAPI_MIDDLEWARE=y
CONFIG_ISDN_CAPI_CAPI20=m
# CONFIG_ISDN_CAPI_CAPIFS_BOOL is not set
CONFIG_ISDN_CAPI_CAPIDRV=m
#
# CAPI hardware drivers
#
CONFIG_CAPI_AVM=y
# CONFIG_ISDN_DRV_AVMB1_B1PCI is not set
# CONFIG_ISDN_DRV_AVMB1_B1PCMCIA is not set
# CONFIG_ISDN_DRV_AVMB1_T1PCI is not set
# CONFIG_ISDN_DRV_AVMB1_C4 is not set
CONFIG_CAPI_EICON=y
# CONFIG_ISDN_DIVAS is not set
CONFIG_ISDN_DRV_GIGASET=m
# CONFIG_GIGASET_CAPI is not set
CONFIG_GIGASET_I4L=y
# CONFIG_GIGASET_DUMMYLL is not set
CONFIG_GIGASET_BASE=m
CONFIG_GIGASET_M105=m
CONFIG_GIGASET_M101=m
CONFIG_GIGASET_DEBUG=y
CONFIG_PHONE=y
# CONFIG_PHONE_IXJ is not set
#
# Input device support
#
CONFIG_INPUT=y
CONFIG_INPUT_FF_MEMLESS=m
CONFIG_INPUT_POLLDEV=y
CONFIG_INPUT_SPARSEKMAP=m
#
# Userland interfaces
#
CONFIG_INPUT_MOUSEDEV=y
CONFIG_INPUT_MOUSEDEV_PSAUX=y
CONFIG_INPUT_MOUSEDEV_SCREEN_X=1024
CONFIG_INPUT_MOUSEDEV_SCREEN_Y=768
CONFIG_INPUT_JOYDEV=m
CONFIG_INPUT_EVDEV=y
# CONFIG_INPUT_EVBUG is not set
#
# Input Device Drivers
#
CONFIG_INPUT_KEYBOARD=y
CONFIG_KEYBOARD_ADP5588=m
CONFIG_KEYBOARD_ATKBD=y
# CONFIG_QT2160 is not set
CONFIG_KEYBOARD_LKKBD=y
CONFIG_KEYBOARD_GPIO=m
CONFIG_KEYBOARD_MATRIX=m
# CONFIG_KEYBOARD_LM8323 is not set
CONFIG_KEYBOARD_MAX7359=m
# CONFIG_KEYBOARD_NEWTON is not set
CONFIG_KEYBOARD_OPENCORES=m
CONFIG_KEYBOARD_STOWAWAY=m
CONFIG_KEYBOARD_SUNKBD=m
CONFIG_KEYBOARD_XTKBD=m
CONFIG_INPUT_MOUSE=y
# CONFIG_MOUSE_PS2 is not set
# CONFIG_MOUSE_SERIAL is not set
# CONFIG_MOUSE_APPLETOUCH is not set
CONFIG_MOUSE_BCM5974=m
# CONFIG_MOUSE_VSXXXAA is not set
# CONFIG_MOUSE_GPIO is not set
CONFIG_MOUSE_SYNAPTICS_I2C=m
# CONFIG_INPUT_JOYSTICK is not set
# CONFIG_INPUT_TABLET is not set
CONFIG_INPUT_TOUCHSCREEN=y
CONFIG_TOUCHSCREEN_ADS7846=m
# CONFIG_TOUCHSCREEN_AD7877 is not set
CONFIG_TOUCHSCREEN_AD7879_I2C=m
CONFIG_TOUCHSCREEN_AD7879=m
CONFIG_TOUCHSCREEN_DYNAPRO=y
CONFIG_TOUCHSCREEN_EETI=m
CONFIG_TOUCHSCREEN_FUJITSU=m
CONFIG_TOUCHSCREEN_GUNZE=y
# CONFIG_TOUCHSCREEN_ELO is not set
CONFIG_TOUCHSCREEN_WACOM_W8001=m
CONFIG_TOUCHSCREEN_MCS5000=m
# CONFIG_TOUCHSCREEN_MTOUCH is not set
# CONFIG_TOUCHSCREEN_INEXIO is not set
# CONFIG_TOUCHSCREEN_MK712 is not set
CONFIG_TOUCHSCREEN_PENMOUNT=m
CONFIG_TOUCHSCREEN_TOUCHRIGHT=y
CONFIG_TOUCHSCREEN_TOUCHWIN=m
CONFIG_TOUCHSCREEN_UCB1400=y
CONFIG_TOUCHSCREEN_WM97XX=m
# CONFIG_TOUCHSCREEN_WM9705 is not set
CONFIG_TOUCHSCREEN_WM9712=y
# CONFIG_TOUCHSCREEN_WM9713 is not set
# CONFIG_TOUCHSCREEN_USB_COMPOSITE is not set
CONFIG_TOUCHSCREEN_TOUCHIT213=y
# CONFIG_TOUCHSCREEN_TSC2007 is not set
CONFIG_INPUT_MISC=y
CONFIG_INPUT_PCSPKR=m
CONFIG_INPUT_APANEL=m
# CONFIG_INPUT_ATI_REMOTE is not set
CONFIG_INPUT_ATI_REMOTE2=m
CONFIG_INPUT_KEYSPAN_REMOTE=m
# CONFIG_INPUT_POWERMATE is not set
# CONFIG_INPUT_YEALINK is not set
CONFIG_INPUT_CM109=m
CONFIG_INPUT_UINPUT=m
# CONFIG_INPUT_GPIO_ROTARY_ENCODER is not set
#
# Hardware I/O ports
#
CONFIG_SERIO=y
CONFIG_SERIO_I8042=y
CONFIG_SERIO_SERPORT=y
CONFIG_SERIO_CT82C710=m
CONFIG_SERIO_PARKBD=m
CONFIG_SERIO_PCIPS2=y
CONFIG_SERIO_LIBPS2=y
CONFIG_SERIO_RAW=m
CONFIG_SERIO_ALTERA_PS2=m
# CONFIG_GAMEPORT is not set
#
# Character devices
#
CONFIG_VT=y
# CONFIG_CONSOLE_TRANSLATIONS is not set
CONFIG_VT_CONSOLE=y
CONFIG_HW_CONSOLE=y
CONFIG_VT_HW_CONSOLE_BINDING=y
CONFIG_DEVKMEM=y
CONFIG_SERIAL_NONSTANDARD=y
CONFIG_COMPUTONE=m
CONFIG_ROCKETPORT=m
CONFIG_CYCLADES=y
# CONFIG_CYZ_INTR is not set
# CONFIG_DIGIEPCA is not set
CONFIG_MOXA_INTELLIO=m
CONFIG_MOXA_SMARTIO=m
CONFIG_ISI=m
CONFIG_SYNCLINK=m
# CONFIG_SYNCLINKMP is not set
CONFIG_SYNCLINK_GT=y
CONFIG_N_HDLC=m
CONFIG_RISCOM8=y
CONFIG_SPECIALIX=y
# CONFIG_STALDRV is not set
# CONFIG_NOZOMI is not set
#
# Serial drivers
#
CONFIG_SERIAL_8250=y
CONFIG_SERIAL_8250_CONSOLE=y
CONFIG_FIX_EARLYCON_MEM=y
CONFIG_SERIAL_8250_PCI=y
CONFIG_SERIAL_8250_NR_UARTS=4
CONFIG_SERIAL_8250_RUNTIME_UARTS=4
# CONFIG_SERIAL_8250_EXTENDED is not set
#
# Non-8250 serial port support
#
# CONFIG_SERIAL_MAX3100 is not set
# CONFIG_SERIAL_UARTLITE is not set
CONFIG_SERIAL_CORE=y
CONFIG_SERIAL_CORE_CONSOLE=y
# CONFIG_SERIAL_JSM is not set
CONFIG_SERIAL_TIMBERDALE=m
CONFIG_UNIX98_PTYS=y
CONFIG_DEVPTS_MULTIPLE_INSTANCES=y
CONFIG_LEGACY_PTYS=y
CONFIG_LEGACY_PTY_COUNT=256
CONFIG_PRINTER=m
CONFIG_LP_CONSOLE=y
CONFIG_PPDEV=y
# CONFIG_IPMI_HANDLER is not set
CONFIG_HW_RANDOM=m
# CONFIG_HW_RANDOM_TIMERIOMEM is not set
CONFIG_HW_RANDOM_INTEL=m
# CONFIG_HW_RANDOM_AMD is not set
CONFIG_HW_RANDOM_VIA=m
CONFIG_NVRAM=y
# CONFIG_R3964 is not set
# CONFIG_APPLICOM is not set
# CONFIG_MWAVE is not set
CONFIG_PC8736x_GPIO=y
CONFIG_NSC_GPIO=y
CONFIG_RAW_DRIVER=y
CONFIG_MAX_RAW_DEVS=256
CONFIG_HANGCHECK_TIMER=m
CONFIG_TCG_TPM=y
# CONFIG_TCG_NSC is not set
# CONFIG_TCG_ATMEL is not set
# CONFIG_TELCLOCK is not set
CONFIG_DEVPORT=y
CONFIG_I2C=m
CONFIG_I2C_BOARDINFO=y
CONFIG_I2C_COMPAT=y
CONFIG_I2C_CHARDEV=m
CONFIG_I2C_HELPER_AUTO=y
CONFIG_I2C_ALGOBIT=m
CONFIG_I2C_ALGOPCA=m
#
# I2C Hardware Bus support
#
#
# PC SMBus host controller drivers
#
# CONFIG_I2C_ALI1535 is not set
# CONFIG_I2C_ALI1563 is not set
# CONFIG_I2C_ALI15X3 is not set
CONFIG_I2C_AMD756=m
CONFIG_I2C_AMD8111=m
# CONFIG_I2C_I801 is not set
# CONFIG_I2C_ISCH is not set
# CONFIG_I2C_PIIX4 is not set
CONFIG_I2C_NFORCE2=m
CONFIG_I2C_SIS5595=m
CONFIG_I2C_SIS630=m
# CONFIG_I2C_SIS96X is not set
CONFIG_I2C_VIA=m
# CONFIG_I2C_VIAPRO is not set
#
# I2C system bus drivers (mostly embedded / system-on-chip)
#
CONFIG_I2C_GPIO=m
CONFIG_I2C_OCORES=m
CONFIG_I2C_SIMTEC=m
#
# External I2C/SMBus adapter drivers
#
# CONFIG_I2C_PARPORT is not set
CONFIG_I2C_PARPORT_LIGHT=m
CONFIG_I2C_TAOS_EVM=m
# CONFIG_I2C_TINY_USB is not set
#
# Other I2C/SMBus bus drivers
#
CONFIG_I2C_PCA_PLATFORM=m
CONFIG_I2C_STUB=m
#
# Miscellaneous I2C Chip support
#
CONFIG_SENSORS_TSL2550=m
# CONFIG_I2C_DEBUG_CORE is not set
CONFIG_I2C_DEBUG_ALGO=y
CONFIG_I2C_DEBUG_BUS=y
CONFIG_I2C_DEBUG_CHIP=y
CONFIG_SPI=y
# CONFIG_SPI_DEBUG is not set
CONFIG_SPI_MASTER=y
#
# SPI Master Controller Drivers
#
CONFIG_SPI_BITBANG=y
CONFIG_SPI_BUTTERFLY=m
CONFIG_SPI_GPIO=y
CONFIG_SPI_LM70_LLP=m
CONFIG_SPI_XILINX=m
CONFIG_SPI_XILINX_PLTFM=m
# CONFIG_SPI_DESIGNWARE is not set
#
# SPI Protocol Masters
#
# CONFIG_SPI_SPIDEV is not set
CONFIG_SPI_TLE62X0=y
#
# PPS support
#
CONFIG_PPS=m
CONFIG_PPS_DEBUG=y
CONFIG_ARCH_WANT_OPTIONAL_GPIOLIB=y
CONFIG_GPIOLIB=y
CONFIG_DEBUG_GPIO=y
CONFIG_GPIO_SYSFS=y
#
# Memory mapped GPIO expanders:
#
#
# I2C GPIO expanders:
#
CONFIG_GPIO_MAX732X=m
# CONFIG_GPIO_PCA953X is not set
CONFIG_GPIO_PCF857X=m
CONFIG_GPIO_ADP5588=m
#
# PCI GPIO expanders:
#
# CONFIG_GPIO_CS5535 is not set
CONFIG_GPIO_LANGWELL=y
# CONFIG_GPIO_TIMBERDALE is not set
#
# SPI GPIO expanders:
#
# CONFIG_GPIO_MAX7301 is not set
# CONFIG_GPIO_MCP23S08 is not set
CONFIG_GPIO_MC33880=m
#
# AC97 GPIO expanders:
#
# CONFIG_GPIO_UCB1400 is not set
CONFIG_W1=m
CONFIG_W1_CON=y
#
# 1-wire Bus Masters
#
CONFIG_W1_MASTER_MATROX=m
CONFIG_W1_MASTER_DS2490=m
CONFIG_W1_MASTER_DS2482=m
# CONFIG_W1_MASTER_GPIO is not set
#
# 1-wire Slaves
#
CONFIG_W1_SLAVE_THERM=m
CONFIG_W1_SLAVE_SMEM=m
CONFIG_W1_SLAVE_DS2431=m
CONFIG_W1_SLAVE_DS2433=m
# CONFIG_W1_SLAVE_DS2433_CRC is not set
# CONFIG_W1_SLAVE_DS2760 is not set
CONFIG_W1_SLAVE_BQ27000=m
CONFIG_POWER_SUPPLY=m
# CONFIG_POWER_SUPPLY_DEBUG is not set
CONFIG_PDA_POWER=m
# CONFIG_BATTERY_DS2760 is not set
# CONFIG_BATTERY_DS2782 is not set
CONFIG_BATTERY_BQ27x00=m
# CONFIG_BATTERY_MAX17040 is not set
CONFIG_HWMON=y
CONFIG_HWMON_VID=m
CONFIG_HWMON_DEBUG_CHIP=y
#
# Native drivers
#
CONFIG_SENSORS_ABITUGURU=y
CONFIG_SENSORS_ABITUGURU3=m
CONFIG_SENSORS_AD7414=m
CONFIG_SENSORS_AD7418=m
# CONFIG_SENSORS_ADCXX is not set
CONFIG_SENSORS_ADM1021=m
CONFIG_SENSORS_ADM1025=m
# CONFIG_SENSORS_ADM1026 is not set
CONFIG_SENSORS_ADM1029=m
# CONFIG_SENSORS_ADM1031 is not set
CONFIG_SENSORS_ADM9240=m
# CONFIG_SENSORS_ADT7462 is not set
# CONFIG_SENSORS_ADT7470 is not set
CONFIG_SENSORS_ADT7473=m
CONFIG_SENSORS_ADT7475=m
# CONFIG_SENSORS_K8TEMP is not set
# CONFIG_SENSORS_K10TEMP is not set
# CONFIG_SENSORS_ASB100 is not set
CONFIG_SENSORS_ATXP1=m
# CONFIG_SENSORS_DS1621 is not set
CONFIG_SENSORS_I5K_AMB=y
CONFIG_SENSORS_F71805F=y
CONFIG_SENSORS_F71882FG=y
CONFIG_SENSORS_F75375S=m
CONFIG_SENSORS_FSCHMD=m
# CONFIG_SENSORS_G760A is not set
CONFIG_SENSORS_GL518SM=m
CONFIG_SENSORS_GL520SM=m
CONFIG_SENSORS_CORETEMP=y
CONFIG_SENSORS_IT87=m
CONFIG_SENSORS_LM63=m
CONFIG_SENSORS_LM70=m
# CONFIG_SENSORS_LM73 is not set
CONFIG_SENSORS_LM75=m
CONFIG_SENSORS_LM77=m
# CONFIG_SENSORS_LM78 is not set
CONFIG_SENSORS_LM80=m
# CONFIG_SENSORS_LM83 is not set
CONFIG_SENSORS_LM85=m
CONFIG_SENSORS_LM87=m
CONFIG_SENSORS_LTC4215=m
CONFIG_SENSORS_LTC4245=m
# CONFIG_SENSORS_LM95241 is not set
CONFIG_SENSORS_MAX1111=y
# CONFIG_SENSORS_MAX1619 is not set
# CONFIG_SENSORS_MAX6650 is not set
CONFIG_SENSORS_PC87360=m
CONFIG_SENSORS_PC87427=y
CONFIG_SENSORS_PCF8591=m
CONFIG_SENSORS_SHT15=m
CONFIG_SENSORS_SIS5595=y
# CONFIG_SENSORS_DME1737 is not set
CONFIG_SENSORS_SMSC47M1=y
# CONFIG_SENSORS_SMSC47M192 is not set
# CONFIG_SENSORS_SMSC47B397 is not set
CONFIG_SENSORS_ADS7828=m
CONFIG_SENSORS_AMC6821=m
CONFIG_SENSORS_THMC50=m
CONFIG_SENSORS_TMP401=m
CONFIG_SENSORS_TMP421=m
CONFIG_SENSORS_VIA_CPUTEMP=y
# CONFIG_SENSORS_VIA686A is not set
CONFIG_SENSORS_VT1211=m
CONFIG_SENSORS_VT8231=m
# CONFIG_SENSORS_W83781D is not set
# CONFIG_SENSORS_W83791D is not set
CONFIG_SENSORS_W83792D=m
CONFIG_SENSORS_W83793=m
# CONFIG_SENSORS_W83L785TS is not set
CONFIG_SENSORS_W83L786NG=m
CONFIG_SENSORS_HDAPS=m
CONFIG_SENSORS_LIS3_SPI=m
CONFIG_SENSORS_LIS3_I2C=m
# CONFIG_SENSORS_APPLESMC is not set
CONFIG_THERMAL=y
# CONFIG_THERMAL_HWMON is not set
CONFIG_WATCHDOG=y
CONFIG_WATCHDOG_NOWAYOUT=y
#
# Watchdog Device Drivers
#
CONFIG_SOFT_WATCHDOG=m
CONFIG_ACQUIRE_WDT=y
CONFIG_ADVANTECH_WDT=y
# CONFIG_ALIM1535_WDT is not set
CONFIG_ALIM7101_WDT=m
CONFIG_GEODE_WDT=m
CONFIG_SC520_WDT=m
CONFIG_IB700_WDT=m
CONFIG_IBMASR=m
# CONFIG_WAFER_WDT is not set
CONFIG_I6300ESB_WDT=m
# CONFIG_ITCO_WDT is not set
CONFIG_IT8712F_WDT=m
CONFIG_IT87_WDT=y
# CONFIG_HP_WATCHDOG is not set
CONFIG_SC1200_WDT=y
CONFIG_PC87413_WDT=y
CONFIG_60XX_WDT=y
CONFIG_SBC8360_WDT=m
CONFIG_CPU5_WDT=m
# CONFIG_SMSC_SCH311X_WDT is not set
CONFIG_SMSC37B787_WDT=y
CONFIG_W83627HF_WDT=m
CONFIG_W83877F_WDT=y
# CONFIG_W83977F_WDT is not set
CONFIG_MACHZ_WDT=y
CONFIG_SBC_EPX_C3_WATCHDOG=y
#
# PCI-based Watchdog Cards
#
CONFIG_PCIPCWATCHDOG=m
# CONFIG_WDTPCI is not set
#
# USB-based Watchdog Cards
#
# CONFIG_USBPCWATCHDOG is not set
CONFIG_SSB_POSSIBLE=y
#
# Sonics Silicon Backplane
#
# CONFIG_SSB is not set
#
# Multifunction device drivers
#
CONFIG_MFD_CORE=y
CONFIG_MFD_SM501=m
CONFIG_MFD_SM501_GPIO=y
# CONFIG_HTC_PASIC3 is not set
CONFIG_UCB1400_CORE=y
CONFIG_TPS65010=m
# CONFIG_MFD_TMIO is not set
# CONFIG_MFD_WM8400 is not set
# CONFIG_MFD_PCF50633 is not set
# CONFIG_MFD_MC13783 is not set
# CONFIG_AB3100_CORE is not set
# CONFIG_EZX_PCAP is not set
CONFIG_AB4500_CORE=m
CONFIG_MFD_TIMBERDALE=y
# CONFIG_REGULATOR is not set
CONFIG_MEDIA_SUPPORT=m
#
# Multimedia core support
#
CONFIG_VIDEO_DEV=m
CONFIG_VIDEO_V4L2_COMMON=m
CONFIG_VIDEO_ALLOW_V4L1=y
CONFIG_VIDEO_V4L1_COMPAT=y
CONFIG_DVB_CORE=m
CONFIG_VIDEO_MEDIA=m
#
# Multimedia drivers
#
CONFIG_VIDEO_SAA7146=m
CONFIG_VIDEO_SAA7146_VV=m
CONFIG_IR_CORE=m
CONFIG_VIDEO_IR=m
CONFIG_MEDIA_ATTACH=y
CONFIG_MEDIA_TUNER=m
# CONFIG_MEDIA_TUNER_CUSTOMISE is not set
CONFIG_MEDIA_TUNER_SIMPLE=m
CONFIG_MEDIA_TUNER_TDA8290=m
CONFIG_MEDIA_TUNER_TDA18271=m
CONFIG_MEDIA_TUNER_TDA9887=m
CONFIG_MEDIA_TUNER_TEA5761=m
CONFIG_MEDIA_TUNER_TEA5767=m
CONFIG_MEDIA_TUNER_MT20XX=m
CONFIG_MEDIA_TUNER_XC2028=m
CONFIG_MEDIA_TUNER_XC5000=m
CONFIG_MEDIA_TUNER_MC44S803=m
CONFIG_VIDEO_V4L2=m
CONFIG_VIDEO_V4L1=m
CONFIG_VIDEOBUF_GEN=m
CONFIG_VIDEOBUF_DMA_SG=m
CONFIG_VIDEOBUF_DVB=m
CONFIG_VIDEO_BTCX=m
CONFIG_VIDEO_TVEEPROM=m
CONFIG_VIDEO_TUNER=m
CONFIG_VIDEO_CAPTURE_DRIVERS=y
CONFIG_VIDEO_ADV_DEBUG=y
# CONFIG_VIDEO_FIXED_MINOR_RANGES is not set
CONFIG_VIDEO_HELPER_CHIPS_AUTO=y
CONFIG_VIDEO_IR_I2C=m
CONFIG_VIDEO_TVAUDIO=m
CONFIG_VIDEO_TDA7432=m
CONFIG_VIDEO_TDA9840=m
CONFIG_VIDEO_TEA6415C=m
CONFIG_VIDEO_TEA6420=m
CONFIG_VIDEO_MSP3400=m
CONFIG_VIDEO_CS53L32A=m
CONFIG_VIDEO_M52790=m
CONFIG_VIDEO_WM8775=m
CONFIG_VIDEO_WM8739=m
CONFIG_VIDEO_VP27SMPX=m
CONFIG_VIDEO_SAA6588=m
CONFIG_VIDEO_BT819=m
CONFIG_VIDEO_BT856=m
CONFIG_VIDEO_BT866=m
CONFIG_VIDEO_KS0127=m
CONFIG_VIDEO_OV7670=m
CONFIG_VIDEO_SAA7110=m
CONFIG_VIDEO_SAA711X=m
CONFIG_VIDEO_SAA717X=m
CONFIG_VIDEO_VPX3220=m
CONFIG_VIDEO_CX25840=m
CONFIG_VIDEO_CX2341X=m
CONFIG_VIDEO_SAA7127=m
CONFIG_VIDEO_ADV7175=m
CONFIG_VIDEO_UPD64031A=m
CONFIG_VIDEO_UPD64083=m
# CONFIG_VIDEO_VIVI is not set
CONFIG_VIDEO_BT848=m
CONFIG_VIDEO_BT848_DVB=y
CONFIG_VIDEO_CPIA=m
# CONFIG_VIDEO_CPIA_USB is not set
CONFIG_VIDEO_CPIA2=m
CONFIG_VIDEO_SAA5246A=m
CONFIG_VIDEO_SAA5249=m
CONFIG_VIDEO_STRADIS=m
CONFIG_VIDEO_ZORAN=m
CONFIG_VIDEO_ZORAN_DC30=m
CONFIG_VIDEO_ZORAN_ZR36060=m
# CONFIG_VIDEO_ZORAN_BUZ is not set
CONFIG_VIDEO_ZORAN_DC10=m
CONFIG_VIDEO_ZORAN_LML33=m
# CONFIG_VIDEO_ZORAN_LML33R10 is not set
CONFIG_VIDEO_ZORAN_AVS6EYES=m
CONFIG_VIDEO_SAA7134=m
CONFIG_VIDEO_SAA7134_ALSA=m
# CONFIG_VIDEO_SAA7134_DVB is not set
CONFIG_VIDEO_MXB=m
CONFIG_VIDEO_HEXIUM_ORION=m
# CONFIG_VIDEO_HEXIUM_GEMINI is not set
# CONFIG_VIDEO_CX23885 is not set
CONFIG_VIDEO_IVTV=m
CONFIG_VIDEO_FB_IVTV=m
# CONFIG_VIDEO_CX18 is not set
CONFIG_VIDEO_SAA7164=m
CONFIG_VIDEO_CAFE_CCIC=m
CONFIG_SOC_CAMERA=m
CONFIG_SOC_CAMERA_MT9M001=m
CONFIG_SOC_CAMERA_MT9M111=m
CONFIG_SOC_CAMERA_MT9T031=m
CONFIG_SOC_CAMERA_MT9T112=m
# CONFIG_SOC_CAMERA_MT9V022 is not set
CONFIG_SOC_CAMERA_RJ54N1=m
# CONFIG_SOC_CAMERA_TW9910 is not set
CONFIG_SOC_CAMERA_PLATFORM=m
CONFIG_SOC_CAMERA_OV772X=m
# CONFIG_SOC_CAMERA_OV9640 is not set
# CONFIG_V4L_USB_DRIVERS is not set
CONFIG_RADIO_ADAPTERS=y
# CONFIG_RADIO_GEMTEK_PCI is not set
CONFIG_RADIO_MAXIRADIO=m
# CONFIG_RADIO_MAESTRO is not set
CONFIG_I2C_SI4713=m
CONFIG_RADIO_SI4713=m
# CONFIG_USB_DSBR is not set
# CONFIG_RADIO_SI470X is not set
CONFIG_USB_MR800=m
# CONFIG_RADIO_TEA5764 is not set
CONFIG_RADIO_SAA7706H=m
CONFIG_RADIO_TEF6862=m
CONFIG_RADIO_TIMBERDALE=m
CONFIG_DVB_MAX_ADAPTERS=8
CONFIG_DVB_DYNAMIC_MINORS=y
# CONFIG_DVB_CAPTURE_DRIVERS is not set
CONFIG_DVB_BT8XX=m
CONFIG_DVB_TDA10048=m
CONFIG_DVB_S5H1411=m
CONFIG_DAB=y
CONFIG_USB_DABUSB=m
#
# Graphics support
#
# CONFIG_AGP is not set
CONFIG_VGA_ARB=y
CONFIG_VGA_ARB_MAX_GPUS=16
CONFIG_DRM=m
CONFIG_DRM_KMS_HELPER=m
CONFIG_DRM_TTM=m
CONFIG_DRM_TDFX=m
CONFIG_DRM_R128=m
CONFIG_DRM_RADEON=m
# CONFIG_DRM_MGA is not set
# CONFIG_DRM_VIA is not set
CONFIG_DRM_SAVAGE=m
CONFIG_VGASTATE=m
CONFIG_VIDEO_OUTPUT_CONTROL=m
CONFIG_FB=m
CONFIG_FIRMWARE_EDID=y
CONFIG_FB_DDC=m
# CONFIG_FB_BOOT_VESA_SUPPORT is not set
CONFIG_FB_CFB_FILLRECT=m
CONFIG_FB_CFB_COPYAREA=m
CONFIG_FB_CFB_IMAGEBLIT=m
# CONFIG_FB_CFB_REV_PIXELS_IN_BYTE is not set
CONFIG_FB_SYS_FILLRECT=m
CONFIG_FB_SYS_COPYAREA=m
CONFIG_FB_SYS_IMAGEBLIT=m
# CONFIG_FB_FOREIGN_ENDIAN is not set
CONFIG_FB_SYS_FOPS=m
CONFIG_FB_DEFERRED_IO=y
CONFIG_FB_HECUBA=m
# CONFIG_FB_SVGALIB is not set
# CONFIG_FB_MACMODES is not set
CONFIG_FB_BACKLIGHT=y
CONFIG_FB_MODE_HELPERS=y
CONFIG_FB_TILEBLITTING=y
#
# Frame buffer hardware drivers
#
CONFIG_FB_PM2=m
CONFIG_FB_PM2_FIFO_DISCONNECT=y
# CONFIG_FB_CYBER2000 is not set
# CONFIG_FB_ARC is not set
CONFIG_FB_UVESA=m
CONFIG_FB_N411=m
CONFIG_FB_HGA=m
CONFIG_FB_HGA_ACCEL=y
# CONFIG_FB_S1D13XXX is not set
CONFIG_FB_NVIDIA=m
CONFIG_FB_NVIDIA_I2C=y
CONFIG_FB_NVIDIA_DEBUG=y
CONFIG_FB_NVIDIA_BACKLIGHT=y
# CONFIG_FB_RIVA is not set
CONFIG_FB_LE80578=m
CONFIG_FB_CARILLO_RANCH=m
# CONFIG_FB_MATROX is not set
CONFIG_FB_ATY128=m
# CONFIG_FB_ATY128_BACKLIGHT is not set
# CONFIG_FB_ATY is not set
# CONFIG_FB_S3 is not set
CONFIG_FB_SAVAGE=m
# CONFIG_FB_SAVAGE_I2C is not set
# CONFIG_FB_SAVAGE_ACCEL is not set
CONFIG_FB_SIS=m
# CONFIG_FB_SIS_300 is not set
CONFIG_FB_SIS_315=y
CONFIG_FB_VIA=m
CONFIG_FB_NEOMAGIC=m
# CONFIG_FB_KYRO is not set
# CONFIG_FB_3DFX is not set
# CONFIG_FB_VOODOO1 is not set
# CONFIG_FB_VT8623 is not set
# CONFIG_FB_TRIDENT is not set
# CONFIG_FB_ARK is not set
CONFIG_FB_PM3=m
CONFIG_FB_CARMINE=m
# CONFIG_FB_CARMINE_DRAM_EVAL is not set
CONFIG_CARMINE_DRAM_CUSTOM=y
# CONFIG_FB_GEODE is not set
CONFIG_FB_TMIO=m
CONFIG_FB_TMIO_ACCELL=y
# CONFIG_FB_SM501 is not set
CONFIG_FB_METRONOME=m
CONFIG_FB_MB862XX=m
CONFIG_FB_MB862XX_PCI_GDC=y
CONFIG_FB_BROADSHEET=m
CONFIG_BACKLIGHT_LCD_SUPPORT=y
# CONFIG_LCD_CLASS_DEVICE is not set
CONFIG_BACKLIGHT_CLASS_DEVICE=y
CONFIG_BACKLIGHT_GENERIC=m
# CONFIG_BACKLIGHT_PROGEAR is not set
# CONFIG_BACKLIGHT_MBP_NVIDIA is not set
CONFIG_BACKLIGHT_SAHARA=y
#
# Display device support
#
CONFIG_DISPLAY_SUPPORT=y
#
# Display hardware drivers
#
#
# Console display driver support
#
CONFIG_VGA_CONSOLE=y
# CONFIG_VGACON_SOFT_SCROLLBACK is not set
CONFIG_DUMMY_CONSOLE=y
CONFIG_LOGO=y
CONFIG_LOGO_LINUX_MONO=y
CONFIG_LOGO_LINUX_VGA16=y
CONFIG_LOGO_LINUX_CLUT224=y
CONFIG_SOUND=y
CONFIG_SOUND_OSS_CORE=y
CONFIG_SOUND_OSS_CORE_PRECLAIM=y
CONFIG_SND=y
CONFIG_SND_TIMER=y
CONFIG_SND_PCM=y
CONFIG_SND_HWDEP=y
CONFIG_SND_RAWMIDI=y
CONFIG_SND_JACK=y
CONFIG_SND_SEQUENCER=m
CONFIG_SND_SEQ_DUMMY=m
CONFIG_SND_OSSEMUL=y
CONFIG_SND_MIXER_OSS=y
CONFIG_SND_PCM_OSS=y
CONFIG_SND_PCM_OSS_PLUGINS=y
# CONFIG_SND_SEQUENCER_OSS is not set
# CONFIG_SND_HRTIMER is not set
CONFIG_SND_DYNAMIC_MINORS=y
CONFIG_SND_SUPPORT_OLD_API=y
# CONFIG_SND_VERBOSE_PROCFS is not set
CONFIG_SND_VERBOSE_PRINTK=y
CONFIG_SND_DEBUG=y
CONFIG_SND_DEBUG_VERBOSE=y
CONFIG_SND_VMASTER=y
CONFIG_SND_DMA_SGBUF=y
CONFIG_SND_RAWMIDI_SEQ=m
CONFIG_SND_OPL3_LIB_SEQ=m
# CONFIG_SND_OPL4_LIB_SEQ is not set
# CONFIG_SND_SBAWE_SEQ is not set
CONFIG_SND_EMU10K1_SEQ=m
CONFIG_SND_MPU401_UART=y
CONFIG_SND_OPL3_LIB=y
CONFIG_SND_VX_LIB=y
CONFIG_SND_AC97_CODEC=y
CONFIG_SND_DRIVERS=y
CONFIG_SND_PCSP=m
CONFIG_SND_DUMMY=y
CONFIG_SND_VIRMIDI=m
CONFIG_SND_MTS64=y
# CONFIG_SND_SERIAL_U16550 is not set
CONFIG_SND_MPU401=m
# CONFIG_SND_PORTMAN2X4 is not set
# CONFIG_SND_AC97_POWER_SAVE is not set
CONFIG_SND_PCI=y
CONFIG_SND_AD1889=y
CONFIG_SND_ALS300=m
# CONFIG_SND_ALS4000 is not set
CONFIG_SND_ALI5451=y
CONFIG_SND_ATIIXP=m
# CONFIG_SND_ATIIXP_MODEM is not set
# CONFIG_SND_AU8810 is not set
CONFIG_SND_AU8820=y
# CONFIG_SND_AU8830 is not set
CONFIG_SND_AW2=y
CONFIG_SND_AZT3328=m
CONFIG_SND_BT87X=y
# CONFIG_SND_BT87X_OVERCLOCK is not set
# CONFIG_SND_CA0106 is not set
CONFIG_SND_CMIPCI=y
CONFIG_SND_OXYGEN_LIB=y
CONFIG_SND_OXYGEN=y
# CONFIG_SND_CS4281 is not set
# CONFIG_SND_CS46XX is not set
# CONFIG_SND_CS5530 is not set
CONFIG_SND_CS5535AUDIO=m
# CONFIG_SND_CTXFI is not set
CONFIG_SND_DARLA20=y
# CONFIG_SND_GINA20 is not set
# CONFIG_SND_LAYLA20 is not set
# CONFIG_SND_DARLA24 is not set
CONFIG_SND_GINA24=y
CONFIG_SND_LAYLA24=m
CONFIG_SND_MONA=m
CONFIG_SND_MIA=y
CONFIG_SND_ECHO3G=y
CONFIG_SND_INDIGO=m
# CONFIG_SND_INDIGOIO is not set
# CONFIG_SND_INDIGODJ is not set
CONFIG_SND_INDIGOIOX=y
CONFIG_SND_INDIGODJX=y
CONFIG_SND_EMU10K1=y
# CONFIG_SND_EMU10K1X is not set
CONFIG_SND_ENS1370=y
CONFIG_SND_ENS1371=y
CONFIG_SND_ES1938=m
CONFIG_SND_ES1968=m
# CONFIG_SND_FM801 is not set
CONFIG_SND_HDA_INTEL=y
CONFIG_SND_HDA_HWDEP=y
CONFIG_SND_HDA_RECONFIG=y
# CONFIG_SND_HDA_INPUT_BEEP is not set
# CONFIG_SND_HDA_INPUT_JACK is not set
# CONFIG_SND_HDA_PATCH_LOADER is not set
# CONFIG_SND_HDA_CODEC_REALTEK is not set
CONFIG_SND_HDA_CODEC_ANALOG=y
CONFIG_SND_HDA_CODEC_SIGMATEL=y
CONFIG_SND_HDA_CODEC_VIA=y
CONFIG_SND_HDA_CODEC_ATIHDMI=y
CONFIG_SND_HDA_CODEC_NVHDMI=y
# CONFIG_SND_HDA_CODEC_INTELHDMI is not set
CONFIG_SND_HDA_CODEC_CIRRUS=y
CONFIG_SND_HDA_CODEC_CONEXANT=y
# CONFIG_SND_HDA_CODEC_CA0110 is not set
CONFIG_SND_HDA_CODEC_CMEDIA=y
# CONFIG_SND_HDA_CODEC_SI3054 is not set
CONFIG_SND_HDA_GENERIC=y
CONFIG_SND_HDA_POWER_SAVE=y
CONFIG_SND_HDA_POWER_SAVE_DEFAULT=0
CONFIG_SND_HDSP=y
#
# Don't forget to add built-in firmwares for HDSP driver
#
# CONFIG_SND_HDSPM is not set
CONFIG_SND_HIFIER=m
CONFIG_SND_ICE1712=y
CONFIG_SND_ICE1724=y
CONFIG_SND_INTEL8X0=y
CONFIG_SND_INTEL8X0M=m
# CONFIG_SND_KORG1212 is not set
CONFIG_SND_LX6464ES=m
CONFIG_SND_MAESTRO3=m
CONFIG_SND_MIXART=y
CONFIG_SND_NM256=m
CONFIG_SND_PCXHR=m
CONFIG_SND_RIPTIDE=m
CONFIG_SND_RME32=m
CONFIG_SND_RME96=m
CONFIG_SND_RME9652=m
# CONFIG_SND_SONICVIBES is not set
CONFIG_SND_TRIDENT=y
# CONFIG_SND_VIA82XX is not set
CONFIG_SND_VIA82XX_MODEM=y
CONFIG_SND_VIRTUOSO=y
CONFIG_SND_VX222=y
CONFIG_SND_YMFPCI=m
# CONFIG_SND_SPI is not set
CONFIG_SND_USB=y
CONFIG_SND_USB_AUDIO=m
CONFIG_SND_USB_USX2Y=y
# CONFIG_SND_USB_CAIAQ is not set
# CONFIG_SND_USB_US122L is not set
CONFIG_SND_SOC=y
CONFIG_SND_SOC_I2C_AND_SPI=m
# CONFIG_SND_SOC_ALL_CODECS is not set
CONFIG_SOUND_PRIME=y
CONFIG_SOUND_OSS=y
# CONFIG_SOUND_TRACEINIT is not set
CONFIG_SOUND_DMAP=y
CONFIG_SOUND_VMIDI=m
CONFIG_SOUND_TRIX=y
CONFIG_SOUND_MSS=m
CONFIG_SOUND_MPU401=m
CONFIG_SOUND_PAS=m
# CONFIG_SOUND_PSS is not set
CONFIG_SOUND_SB=m
CONFIG_SOUND_YM3812=y
# CONFIG_SOUND_UART6850 is not set
CONFIG_SOUND_AEDSP16=m
CONFIG_SC6600=y
# CONFIG_SC6600_JOY is not set
CONFIG_SC6600_CDROM=4
CONFIG_SC6600_CDROMBASE=0
CONFIG_SOUND_KAHLUA=m
CONFIG_AC97_BUS=y
# CONFIG_HID_SUPPORT is not set
CONFIG_HID=m
CONFIG_USB_MOUSE=y
CONFIG_USB_SUPPORT=y
CONFIG_USB_ARCH_HAS_HCD=y
CONFIG_USB_ARCH_HAS_OHCI=y
CONFIG_USB_ARCH_HAS_EHCI=y
CONFIG_USB=y
CONFIG_USB_DEBUG=y
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y
#
# Miscellaneous USB options
#
CONFIG_USB_DEVICEFS=y
CONFIG_USB_DEVICE_CLASS=y
CONFIG_USB_DYNAMIC_MINORS=y
# CONFIG_USB_OTG is not set
# CONFIG_USB_OTG_WHITELIST is not set
# CONFIG_USB_OTG_BLACKLIST_HUB is not set
CONFIG_USB_MON=y
CONFIG_USB_WUSB=y
# CONFIG_USB_WUSB_CBAF is not set
#
# USB Host Controller Drivers
#
# CONFIG_USB_C67X00_HCD is not set
CONFIG_USB_XHCI_HCD=y
CONFIG_USB_XHCI_HCD_DEBUGGING=y
CONFIG_USB_EHCI_HCD=y
# CONFIG_USB_EHCI_ROOT_HUB_TT is not set
# CONFIG_USB_EHCI_TT_NEWSCHED is not set
# CONFIG_USB_OXU210HP_HCD is not set
# CONFIG_USB_ISP116X_HCD is not set
CONFIG_USB_ISP1760_HCD=y
CONFIG_USB_ISP1362_HCD=m
CONFIG_USB_OHCI_HCD=y
# CONFIG_USB_OHCI_BIG_ENDIAN_DESC is not set
# CONFIG_USB_OHCI_BIG_ENDIAN_MMIO is not set
CONFIG_USB_OHCI_LITTLE_ENDIAN=y
CONFIG_USB_UHCI_HCD=y
# CONFIG_USB_U132_HCD is not set
CONFIG_USB_SL811_HCD=y
CONFIG_USB_R8A66597_HCD=m
CONFIG_USB_HWA_HCD=y
#
# USB Device Class drivers
#
CONFIG_USB_ACM=y
# CONFIG_USB_PRINTER is not set
CONFIG_USB_WDM=m
CONFIG_USB_TMC=y
#
# NOTE: USB_STORAGE depends on SCSI but BLK_DEV_SD may
#
#
# also be needed; see USB_STORAGE Help for more info
#
CONFIG_USB_STORAGE=m
CONFIG_USB_STORAGE_DEBUG=y
CONFIG_USB_STORAGE_DATAFAB=m
CONFIG_USB_STORAGE_FREECOM=m
# CONFIG_USB_STORAGE_ISD200 is not set
CONFIG_USB_STORAGE_USBAT=m
CONFIG_USB_STORAGE_SDDR09=m
CONFIG_USB_STORAGE_SDDR55=m
CONFIG_USB_STORAGE_JUMPSHOT=m
# CONFIG_USB_STORAGE_ALAUDA is not set
CONFIG_USB_STORAGE_ONETOUCH=m
CONFIG_USB_STORAGE_KARMA=m
CONFIG_USB_STORAGE_CYPRESS_ATACB=m
# CONFIG_USB_LIBUSUAL is not set
#
# USB Imaging devices
#
CONFIG_USB_MDC800=m
# CONFIG_USB_MICROTEK is not set
#
# USB port drivers
#
CONFIG_USB_USS720=y
# CONFIG_USB_SERIAL is not set
#
# USB Miscellaneous drivers
#
CONFIG_USB_EMI62=y
CONFIG_USB_EMI26=m
CONFIG_USB_ADUTUX=y
# CONFIG_USB_SEVSEG is not set
CONFIG_USB_RIO500=m
# CONFIG_USB_LEGOTOWER is not set
CONFIG_USB_LCD=y
# CONFIG_USB_BERRY_CHARGE is not set
CONFIG_USB_LED=y
CONFIG_USB_CYPRESS_CY7C63=y
CONFIG_USB_CYTHERM=m
CONFIG_USB_IDMOUSE=m
CONFIG_USB_FTDI_ELAN=y
CONFIG_USB_APPLEDISPLAY=y
CONFIG_USB_SISUSBVGA=y
# CONFIG_USB_SISUSBVGA_CON is not set
CONFIG_USB_LD=m
CONFIG_USB_TRANCEVIBRATOR=m
CONFIG_USB_IOWARRIOR=y
CONFIG_USB_TEST=y
CONFIG_USB_ISIGHTFW=y
CONFIG_USB_VST=m
#
# OTG and related infrastructure
#
CONFIG_USB_OTG_UTILS=y
# CONFIG_USB_GPIO_VBUS is not set
CONFIG_NOP_USB_XCEIV=m
CONFIG_UWB=y
CONFIG_UWB_HWA=y
# CONFIG_UWB_WHCI is not set
CONFIG_UWB_WLP=m
CONFIG_UWB_I1480U=y
CONFIG_UWB_I1480U_WLP=m
# CONFIG_MMC is not set
# CONFIG_MEMSTICK is not set
CONFIG_NEW_LEDS=y
CONFIG_LEDS_CLASS=y
#
# LED drivers
#
CONFIG_LEDS_ALIX2=m
CONFIG_LEDS_PCA9532=m
CONFIG_LEDS_GPIO=y
CONFIG_LEDS_GPIO_PLATFORM=y
CONFIG_LEDS_LP3944=m
CONFIG_LEDS_CLEVO_MAIL=y
CONFIG_LEDS_PCA955X=m
CONFIG_LEDS_DAC124S085=m
CONFIG_LEDS_BD2802=m
CONFIG_LEDS_LT3593=y
#
# LED Triggers
#
CONFIG_LEDS_TRIGGERS=y
CONFIG_LEDS_TRIGGER_TIMER=y
CONFIG_LEDS_TRIGGER_HEARTBEAT=y
CONFIG_LEDS_TRIGGER_BACKLIGHT=m
# CONFIG_LEDS_TRIGGER_GPIO is not set
CONFIG_LEDS_TRIGGER_DEFAULT_ON=m
#
# iptables trigger is under Netfilter config (LED target)
#
CONFIG_ACCESSIBILITY=y
# CONFIG_A11Y_BRAILLE_CONSOLE is not set
CONFIG_INFINIBAND=m
CONFIG_INFINIBAND_USER_MAD=m
CONFIG_INFINIBAND_USER_ACCESS=m
CONFIG_INFINIBAND_USER_MEM=y
CONFIG_INFINIBAND_ADDR_TRANS=y
CONFIG_INFINIBAND_MTHCA=m
# CONFIG_INFINIBAND_MTHCA_DEBUG is not set
CONFIG_INFINIBAND_IPATH=m
CONFIG_INFINIBAND_AMSO1100=m
# CONFIG_INFINIBAND_AMSO1100_DEBUG is not set
CONFIG_MLX4_INFINIBAND=m
# CONFIG_INFINIBAND_NES is not set
CONFIG_INFINIBAND_IPOIB=m
CONFIG_INFINIBAND_IPOIB_CM=y
# CONFIG_INFINIBAND_IPOIB_DEBUG is not set
# CONFIG_INFINIBAND_SRP is not set
# CONFIG_INFINIBAND_ISER is not set
CONFIG_EDAC=y
#
# Reporting subsystems
#
# CONFIG_EDAC_DEBUG is not set
CONFIG_EDAC_MM_EDAC=y
CONFIG_EDAC_E752X=y
CONFIG_EDAC_I82975X=y
CONFIG_EDAC_I3000=y
CONFIG_EDAC_I3200=y
# CONFIG_EDAC_X38 is not set
CONFIG_EDAC_I5400=y
CONFIG_EDAC_I5000=m
# CONFIG_EDAC_I5100 is not set
CONFIG_RTC_LIB=y
CONFIG_RTC_CLASS=y
CONFIG_RTC_HCTOSYS=y
CONFIG_RTC_HCTOSYS_DEVICE="rtc0"
CONFIG_RTC_DEBUG=y
#
# RTC interfaces
#
CONFIG_RTC_INTF_SYSFS=y
# CONFIG_RTC_INTF_PROC is not set
CONFIG_RTC_INTF_DEV=y
CONFIG_RTC_INTF_DEV_UIE_EMUL=y
# CONFIG_RTC_DRV_TEST is not set
#
# I2C RTC drivers
#
CONFIG_RTC_DRV_DS1307=m
CONFIG_RTC_DRV_DS1374=m
CONFIG_RTC_DRV_DS1672=m
# CONFIG_RTC_DRV_MAX6900 is not set
CONFIG_RTC_DRV_RS5C372=m
# CONFIG_RTC_DRV_ISL1208 is not set
CONFIG_RTC_DRV_X1205=m
# CONFIG_RTC_DRV_PCF8563 is not set
CONFIG_RTC_DRV_PCF8583=m
# CONFIG_RTC_DRV_M41T80 is not set
CONFIG_RTC_DRV_BQ32K=m
# CONFIG_RTC_DRV_S35390A is not set
CONFIG_RTC_DRV_FM3130=m
# CONFIG_RTC_DRV_RX8581 is not set
# CONFIG_RTC_DRV_RX8025 is not set
#
# SPI RTC drivers
#
CONFIG_RTC_DRV_M41T94=y
# CONFIG_RTC_DRV_DS1305 is not set
CONFIG_RTC_DRV_DS1390=m
CONFIG_RTC_DRV_MAX6902=m
# CONFIG_RTC_DRV_R9701 is not set
CONFIG_RTC_DRV_RS5C348=y
CONFIG_RTC_DRV_DS3234=m
CONFIG_RTC_DRV_PCF2123=y
#
# Platform RTC drivers
#
# CONFIG_RTC_DRV_CMOS is not set
CONFIG_RTC_DRV_DS1286=m
CONFIG_RTC_DRV_DS1511=y
CONFIG_RTC_DRV_DS1553=m
CONFIG_RTC_DRV_DS1742=y
CONFIG_RTC_DRV_STK17TA8=y
CONFIG_RTC_DRV_M48T86=y
CONFIG_RTC_DRV_M48T35=y
# CONFIG_RTC_DRV_M48T59 is not set
CONFIG_RTC_DRV_MSM6242=m
# CONFIG_RTC_DRV_BQ4802 is not set
CONFIG_RTC_DRV_RP5C01=y
CONFIG_RTC_DRV_V3020=y
#
# on-CPU RTC drivers
#
# CONFIG_CS5535_CLOCK_EVENT_SRC is not set
CONFIG_DMADEVICES=y
#
# DMA Devices
#
# CONFIG_INTEL_IOATDMA is not set
# CONFIG_AUXDISPLAY is not set
CONFIG_UIO=y
CONFIG_UIO_CIF=m
CONFIG_UIO_PDRV=m
CONFIG_UIO_PDRV_GENIRQ=y
# CONFIG_UIO_SMX is not set
CONFIG_UIO_AEC=m
CONFIG_UIO_SERCOS3=m
# CONFIG_UIO_PCI_GENERIC is not set
#
# TI VLYNQ
#
CONFIG_X86_PLATFORM_DEVICES=y
CONFIG_DELL_LAPTOP=m
#
# Firmware Drivers
#
CONFIG_EDD=y
CONFIG_EDD_OFF=y
CONFIG_FIRMWARE_MEMMAP=y
# CONFIG_DELL_RBU is not set
CONFIG_DCDBAS=y
CONFIG_DMIID=y
# CONFIG_ISCSI_IBFT_FIND is not set
#
# File systems
#
# CONFIG_EXT2_FS is not set
CONFIG_EXT3_FS=y
CONFIG_EXT3_DEFAULTS_TO_ORDERED=y
CONFIG_EXT3_FS_XATTR=y
CONFIG_EXT3_FS_POSIX_ACL=y
CONFIG_EXT3_FS_SECURITY=y
CONFIG_EXT4_FS=m
CONFIG_EXT4_USE_FOR_EXT23=y
CONFIG_EXT4_FS_XATTR=y
# CONFIG_EXT4_FS_POSIX_ACL is not set
CONFIG_EXT4_FS_SECURITY=y
CONFIG_EXT4_DEBUG=y
CONFIG_JBD=y
CONFIG_JBD_DEBUG=y
CONFIG_JBD2=m
CONFIG_JBD2_DEBUG=y
CONFIG_FS_MBCACHE=y
# CONFIG_REISERFS_FS is not set
CONFIG_JFS_FS=m
CONFIG_JFS_POSIX_ACL=y
CONFIG_JFS_SECURITY=y
# CONFIG_JFS_DEBUG is not set
CONFIG_JFS_STATISTICS=y
CONFIG_FS_POSIX_ACL=y
CONFIG_XFS_FS=m
CONFIG_XFS_QUOTA=y
# CONFIG_XFS_POSIX_ACL is not set
CONFIG_XFS_RT=y
CONFIG_XFS_DEBUG=y
CONFIG_GFS2_FS=m
# CONFIG_GFS2_FS_LOCKING_DLM is not set
CONFIG_OCFS2_FS=m
# CONFIG_OCFS2_FS_O2CB is not set
CONFIG_OCFS2_FS_USERSPACE_CLUSTER=m
CONFIG_OCFS2_FS_STATS=y
# CONFIG_OCFS2_DEBUG_MASKLOG is not set
# CONFIG_OCFS2_DEBUG_FS is not set
# CONFIG_BTRFS_FS is not set
CONFIG_NILFS2_FS=m
CONFIG_FILE_LOCKING=y
CONFIG_FSNOTIFY=y
# CONFIG_DNOTIFY is not set
CONFIG_INOTIFY=y
CONFIG_INOTIFY_USER=y
CONFIG_QUOTA=y
CONFIG_QUOTA_NETLINK_INTERFACE=y
CONFIG_PRINT_QUOTA_WARNING=y
CONFIG_QUOTA_TREE=m
CONFIG_QFMT_V1=y
CONFIG_QFMT_V2=m
CONFIG_QUOTACTL=y
CONFIG_AUTOFS_FS=m
# CONFIG_AUTOFS4_FS is not set
CONFIG_FUSE_FS=m
CONFIG_CUSE=m
#
# Caches
#
# CONFIG_FSCACHE is not set
#
# CD-ROM/DVD Filesystems
#
CONFIG_ISO9660_FS=y
CONFIG_JOLIET=y
# CONFIG_ZISOFS is not set
CONFIG_UDF_FS=m
CONFIG_UDF_NLS=y
#
# DOS/FAT/NT Filesystems
#
CONFIG_FAT_FS=y
# CONFIG_MSDOS_FS is not set
CONFIG_VFAT_FS=y
CONFIG_FAT_DEFAULT_CODEPAGE=437
CONFIG_FAT_DEFAULT_IOCHARSET="iso8859-1"
CONFIG_NTFS_FS=y
# CONFIG_NTFS_DEBUG is not set
CONFIG_NTFS_RW=y
#
# Pseudo filesystems
#
CONFIG_PROC_FS=y
CONFIG_PROC_KCORE=y
CONFIG_PROC_VMCORE=y
CONFIG_PROC_SYSCTL=y
CONFIG_PROC_PAGE_MONITOR=y
CONFIG_SYSFS=y
CONFIG_TMPFS=y
# CONFIG_TMPFS_POSIX_ACL is not set
# CONFIG_HUGETLBFS is not set
# CONFIG_HUGETLB_PAGE is not set
CONFIG_CONFIGFS_FS=y
# CONFIG_MISC_FILESYSTEMS is not set
CONFIG_NETWORK_FILESYSTEMS=y
CONFIG_NFS_FS=m
# CONFIG_NFS_V3 is not set
# CONFIG_NFS_V4 is not set
# CONFIG_NFSD is not set
CONFIG_LOCKD=m
CONFIG_EXPORTFS=m
CONFIG_NFS_COMMON=y
CONFIG_SUNRPC=m
CONFIG_SUNRPC_GSS=m
CONFIG_SUNRPC_XPRT_RDMA=m
CONFIG_RPCSEC_GSS_KRB5=m
CONFIG_RPCSEC_GSS_SPKM3=m
CONFIG_SMB_FS=y
CONFIG_SMB_NLS_DEFAULT=y
CONFIG_SMB_NLS_REMOTE="cp437"
CONFIG_CIFS=m
# CONFIG_CIFS_STATS is not set
# CONFIG_CIFS_WEAK_PW_HASH is not set
CONFIG_CIFS_UPCALL=y
# CONFIG_CIFS_XATTR is not set
# CONFIG_CIFS_DEBUG2 is not set
CONFIG_CIFS_DFS_UPCALL=y
CONFIG_CIFS_EXPERIMENTAL=y
CONFIG_NCP_FS=m
# CONFIG_NCPFS_PACKET_SIGNING is not set
# CONFIG_NCPFS_IOCTL_LOCKING is not set
CONFIG_NCPFS_STRONG=y
CONFIG_NCPFS_NFS_NS=y
# CONFIG_NCPFS_OS2_NS is not set
CONFIG_NCPFS_SMALLDOS=y
CONFIG_NCPFS_NLS=y
CONFIG_NCPFS_EXTRAS=y
CONFIG_CODA_FS=m
CONFIG_AFS_FS=y
CONFIG_AFS_DEBUG=y
#
# Partition Types
#
CONFIG_PARTITION_ADVANCED=y
# CONFIG_ACORN_PARTITION is not set
# CONFIG_OSF_PARTITION is not set
CONFIG_AMIGA_PARTITION=y
CONFIG_ATARI_PARTITION=y
CONFIG_MAC_PARTITION=y
CONFIG_MSDOS_PARTITION=y
CONFIG_BSD_DISKLABEL=y
CONFIG_MINIX_SUBPARTITION=y
CONFIG_SOLARIS_X86_PARTITION=y
CONFIG_UNIXWARE_DISKLABEL=y
CONFIG_LDM_PARTITION=y
CONFIG_LDM_DEBUG=y
CONFIG_SGI_PARTITION=y
# CONFIG_ULTRIX_PARTITION is not set
CONFIG_SUN_PARTITION=y
CONFIG_KARMA_PARTITION=y
# CONFIG_EFI_PARTITION is not set
CONFIG_SYSV68_PARTITION=y
CONFIG_NLS=y
CONFIG_NLS_DEFAULT="iso8859-1"
# CONFIG_NLS_CODEPAGE_437 is not set
CONFIG_NLS_CODEPAGE_737=y
# CONFIG_NLS_CODEPAGE_775 is not set
CONFIG_NLS_CODEPAGE_850=m
CONFIG_NLS_CODEPAGE_852=m
# CONFIG_NLS_CODEPAGE_855 is not set
CONFIG_NLS_CODEPAGE_857=y
# CONFIG_NLS_CODEPAGE_860 is not set
CONFIG_NLS_CODEPAGE_861=m
CONFIG_NLS_CODEPAGE_862=m
# CONFIG_NLS_CODEPAGE_863 is not set
# CONFIG_NLS_CODEPAGE_864 is not set
# CONFIG_NLS_CODEPAGE_865 is not set
CONFIG_NLS_CODEPAGE_866=y
CONFIG_NLS_CODEPAGE_869=m
CONFIG_NLS_CODEPAGE_936=y
CONFIG_NLS_CODEPAGE_950=y
CONFIG_NLS_CODEPAGE_932=y
# CONFIG_NLS_CODEPAGE_949 is not set
CONFIG_NLS_CODEPAGE_874=m
# CONFIG_NLS_ISO8859_8 is not set
# CONFIG_NLS_CODEPAGE_1250 is not set
CONFIG_NLS_CODEPAGE_1251=m
# CONFIG_NLS_ASCII is not set
CONFIG_NLS_ISO8859_1=m
CONFIG_NLS_ISO8859_2=y
# CONFIG_NLS_ISO8859_3 is not set
# CONFIG_NLS_ISO8859_4 is not set
CONFIG_NLS_ISO8859_5=y
CONFIG_NLS_ISO8859_6=m
CONFIG_NLS_ISO8859_7=m
CONFIG_NLS_ISO8859_9=y
CONFIG_NLS_ISO8859_13=m
CONFIG_NLS_ISO8859_14=y
# CONFIG_NLS_ISO8859_15 is not set
CONFIG_NLS_KOI8_R=y
CONFIG_NLS_KOI8_U=m
CONFIG_NLS_UTF8=y
CONFIG_DLM=y
CONFIG_DLM_DEBUG=y
#
# Kernel hacking
#
CONFIG_TRACE_IRQFLAGS_SUPPORT=y
# CONFIG_PRINTK_TIME is not set
# CONFIG_ENABLE_WARN_DEPRECATED is not set
# CONFIG_ENABLE_MUST_CHECK is not set
CONFIG_FRAME_WARN=2048
CONFIG_MAGIC_SYSRQ=y
CONFIG_STRIP_ASM_SYMS=y
CONFIG_UNUSED_SYMBOLS=y
CONFIG_DEBUG_FS=y
CONFIG_HEADERS_CHECK=y
CONFIG_DEBUG_SECTION_MISMATCH=y
CONFIG_DEBUG_KERNEL=y
# CONFIG_DEBUG_SHIRQ is not set
CONFIG_DETECT_SOFTLOCKUP=y
CONFIG_NMI_WATCHDOG=y
CONFIG_BOOTPARAM_SOFTLOCKUP_PANIC=y
CONFIG_BOOTPARAM_SOFTLOCKUP_PANIC_VALUE=1
CONFIG_DETECT_HUNG_TASK=y
CONFIG_BOOTPARAM_HUNG_TASK_PANIC=y
CONFIG_BOOTPARAM_HUNG_TASK_PANIC_VALUE=1
# CONFIG_SCHED_DEBUG is not set
# CONFIG_SCHEDSTATS is not set
CONFIG_TIMER_STATS=y
CONFIG_DEBUG_OBJECTS=y
CONFIG_DEBUG_OBJECTS_SELFTEST=y
# CONFIG_DEBUG_OBJECTS_FREE is not set
CONFIG_DEBUG_OBJECTS_TIMERS=y
# CONFIG_DEBUG_OBJECTS_WORK is not set
CONFIG_DEBUG_OBJECTS_ENABLE_DEFAULT=1
CONFIG_SLUB_DEBUG_ON=y
# CONFIG_SLUB_STATS is not set
# CONFIG_DEBUG_RT_MUTEXES is not set
# CONFIG_RT_MUTEX_TESTER is not set
CONFIG_DEBUG_SPINLOCK=y
CONFIG_DEBUG_MUTEXES=y
CONFIG_DEBUG_LOCK_ALLOC=y
CONFIG_PROVE_LOCKING=y
CONFIG_LOCKDEP=y
CONFIG_LOCK_STAT=y
# CONFIG_DEBUG_LOCKDEP is not set
CONFIG_TRACE_IRQFLAGS=y
CONFIG_DEBUG_SPINLOCK_SLEEP=y
# CONFIG_DEBUG_LOCKING_API_SELFTESTS is not set
CONFIG_STACKTRACE=y
CONFIG_DEBUG_BUGVERBOSE=y
CONFIG_DEBUG_VM=y
CONFIG_DEBUG_VIRTUAL=y
# CONFIG_DEBUG_WRITECOUNT is not set
CONFIG_DEBUG_MEMORY_INIT=y
CONFIG_DEBUG_LIST=y
CONFIG_DEBUG_SG=y
CONFIG_DEBUG_NOTIFIERS=y
# CONFIG_DEBUG_CREDENTIALS is not set
CONFIG_ARCH_WANT_FRAME_POINTERS=y
CONFIG_FRAME_POINTER=y
# CONFIG_BOOT_PRINTK_DELAY is not set
CONFIG_RCU_TORTURE_TEST=m
# CONFIG_RCU_CPU_STALL_DETECTOR is not set
CONFIG_BACKTRACE_SELF_TEST=y
CONFIG_DEBUG_FORCE_WEAK_PER_CPU=y
CONFIG_FAULT_INJECTION=y
# CONFIG_FAILSLAB is not set
CONFIG_FAIL_PAGE_ALLOC=y
# CONFIG_FAIL_MAKE_REQUEST is not set
CONFIG_FAIL_IO_TIMEOUT=y
CONFIG_FAULT_INJECTION_DEBUG_FS=y
# CONFIG_LATENCYTOP is not set
CONFIG_SYSCTL_SYSCALL_CHECK=y
# CONFIG_DEBUG_PAGEALLOC is not set
CONFIG_USER_STACKTRACE_SUPPORT=y
CONFIG_NOP_TRACER=y
CONFIG_HAVE_FUNCTION_TRACER=y
CONFIG_HAVE_FUNCTION_GRAPH_TRACER=y
CONFIG_HAVE_FUNCTION_GRAPH_FP_TEST=y
CONFIG_HAVE_FUNCTION_TRACE_MCOUNT_TEST=y
CONFIG_HAVE_DYNAMIC_FTRACE=y
CONFIG_HAVE_FTRACE_MCOUNT_RECORD=y
CONFIG_HAVE_SYSCALL_TRACEPOINTS=y
CONFIG_TRACER_MAX_TRACE=y
CONFIG_RING_BUFFER=y
CONFIG_EVENT_TRACING=y
CONFIG_CONTEXT_SWITCH_TRACER=y
CONFIG_RING_BUFFER_ALLOW_SWAP=y
CONFIG_TRACING=y
CONFIG_GENERIC_TRACER=y
CONFIG_TRACING_SUPPORT=y
CONFIG_FTRACE=y
CONFIG_FUNCTION_TRACER=y
CONFIG_FUNCTION_GRAPH_TRACER=y
CONFIG_IRQSOFF_TRACER=y
CONFIG_SYSPROF_TRACER=y
CONFIG_SCHED_TRACER=y
# CONFIG_FTRACE_SYSCALLS is not set
CONFIG_BOOT_TRACER=y
CONFIG_BRANCH_PROFILE_NONE=y
# CONFIG_PROFILE_ANNOTATED_BRANCHES is not set
# CONFIG_PROFILE_ALL_BRANCHES is not set
CONFIG_KSYM_TRACER=y
CONFIG_PROFILE_KSYM_TRACER=y
CONFIG_STACK_TRACER=y
CONFIG_KMEMTRACE=y
CONFIG_WORKQUEUE_TRACER=y
# CONFIG_BLK_DEV_IO_TRACE is not set
# CONFIG_DYNAMIC_FTRACE is not set
CONFIG_FUNCTION_PROFILER=y
CONFIG_FTRACE_SELFTEST=y
CONFIG_FTRACE_STARTUP_TEST=y
# CONFIG_EVENT_TRACE_TEST_SYSCALLS is not set
# CONFIG_MMIOTRACE is not set
CONFIG_PROVIDE_OHCI1394_DMA_INIT=y
# CONFIG_BUILD_DOCSRC is not set
# CONFIG_DYNAMIC_DEBUG is not set
CONFIG_DMA_API_DEBUG=y
CONFIG_SAMPLES=y
# CONFIG_SAMPLE_TRACEPOINTS is not set
CONFIG_SAMPLE_TRACE_EVENTS=m
CONFIG_SAMPLE_KOBJECT=m
CONFIG_SAMPLE_HW_BREAKPOINT=m
CONFIG_HAVE_ARCH_KGDB=y
CONFIG_KGDB=y
# CONFIG_KGDB_SERIAL_CONSOLE is not set
# CONFIG_KGDB_TESTS is not set
CONFIG_HAVE_ARCH_KMEMCHECK=y
CONFIG_STRICT_DEVMEM=y
CONFIG_X86_VERBOSE_BOOTUP=y
CONFIG_EARLY_PRINTK=y
CONFIG_EARLY_PRINTK_DBGP=y
CONFIG_DEBUG_STACKOVERFLOW=y
CONFIG_DEBUG_STACK_USAGE=y
CONFIG_DEBUG_PER_CPU_MAPS=y
# CONFIG_X86_PTDUMP is not set
# CONFIG_DEBUG_RODATA is not set
CONFIG_DEBUG_NX_TEST=m
CONFIG_IOMMU_STRESS=y
CONFIG_HAVE_MMIOTRACE_SUPPORT=y
CONFIG_IO_DELAY_TYPE_0X80=0
CONFIG_IO_DELAY_TYPE_0XED=1
CONFIG_IO_DELAY_TYPE_UDELAY=2
CONFIG_IO_DELAY_TYPE_NONE=3
# CONFIG_IO_DELAY_0X80 is not set
CONFIG_IO_DELAY_0XED=y
# CONFIG_IO_DELAY_UDELAY is not set
# CONFIG_IO_DELAY_NONE is not set
CONFIG_DEFAULT_IO_DELAY_TYPE=1
CONFIG_DEBUG_BOOT_PARAMS=y
CONFIG_CPA_DEBUG=y
CONFIG_OPTIMIZE_INLINING=y
#
# Security options
#
CONFIG_KEYS=y
CONFIG_KEYS_DEBUG_PROC_KEYS=y
CONFIG_SECURITY=y
CONFIG_SECURITYFS=y
CONFIG_SECURITY_NETWORK=y
# CONFIG_SECURITY_NETWORK_XFRM is not set
CONFIG_SECURITY_PATH=y
CONFIG_SECURITY_TOMOYO=y
# CONFIG_DEFAULT_SECURITY_SELINUX is not set
# CONFIG_DEFAULT_SECURITY_SMACK is not set
# CONFIG_DEFAULT_SECURITY_TOMOYO is not set
CONFIG_DEFAULT_SECURITY_DAC=y
CONFIG_DEFAULT_SECURITY=""
CONFIG_XOR_BLOCKS=m
CONFIG_ASYNC_CORE=m
CONFIG_ASYNC_MEMCPY=m
CONFIG_ASYNC_XOR=m
CONFIG_ASYNC_PQ=m
CONFIG_ASYNC_RAID6_RECOV=m
CONFIG_CRYPTO=y
#
# Crypto core or helper
#
CONFIG_CRYPTO_FIPS=y
CONFIG_CRYPTO_ALGAPI=y
CONFIG_CRYPTO_ALGAPI2=y
CONFIG_CRYPTO_AEAD=y
CONFIG_CRYPTO_AEAD2=y
CONFIG_CRYPTO_BLKCIPHER=y
CONFIG_CRYPTO_BLKCIPHER2=y
CONFIG_CRYPTO_HASH=y
CONFIG_CRYPTO_HASH2=y
CONFIG_CRYPTO_RNG=y
CONFIG_CRYPTO_RNG2=y
CONFIG_CRYPTO_PCOMP=y
CONFIG_CRYPTO_MANAGER=y
CONFIG_CRYPTO_MANAGER2=y
CONFIG_CRYPTO_GF128MUL=y
CONFIG_CRYPTO_NULL=m
CONFIG_CRYPTO_PCRYPT=y
CONFIG_CRYPTO_WORKQUEUE=y
CONFIG_CRYPTO_CRYPTD=m
CONFIG_CRYPTO_AUTHENC=y
# CONFIG_CRYPTO_TEST is not set
#
# Authenticated Encryption with Associated Data
#
# CONFIG_CRYPTO_CCM is not set
# CONFIG_CRYPTO_GCM is not set
CONFIG_CRYPTO_SEQIV=y
#
# Block modes
#
CONFIG_CRYPTO_CBC=y
CONFIG_CRYPTO_CTR=y
CONFIG_CRYPTO_CTS=y
CONFIG_CRYPTO_ECB=m
CONFIG_CRYPTO_LRW=m
CONFIG_CRYPTO_PCBC=y
CONFIG_CRYPTO_XTS=m
#
# Hash modes
#
CONFIG_CRYPTO_HMAC=y
# CONFIG_CRYPTO_XCBC is not set
CONFIG_CRYPTO_VMAC=m
#
# Digest
#
CONFIG_CRYPTO_CRC32C=y
# CONFIG_CRYPTO_CRC32C_INTEL is not set
CONFIG_CRYPTO_GHASH=m
# CONFIG_CRYPTO_MD4 is not set
CONFIG_CRYPTO_MD5=y
CONFIG_CRYPTO_MICHAEL_MIC=m
CONFIG_CRYPTO_RMD128=y
# CONFIG_CRYPTO_RMD160 is not set
# CONFIG_CRYPTO_RMD256 is not set
# CONFIG_CRYPTO_RMD320 is not set
CONFIG_CRYPTO_SHA1=y
CONFIG_CRYPTO_SHA256=y
# CONFIG_CRYPTO_SHA512 is not set
CONFIG_CRYPTO_TGR192=y
CONFIG_CRYPTO_WP512=m
CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL=m
#
# Ciphers
#
CONFIG_CRYPTO_AES=y
# CONFIG_CRYPTO_AES_X86_64 is not set
# CONFIG_CRYPTO_AES_NI_INTEL is not set
CONFIG_CRYPTO_ANUBIS=m
CONFIG_CRYPTO_ARC4=m
# CONFIG_CRYPTO_BLOWFISH is not set
CONFIG_CRYPTO_CAMELLIA=y
CONFIG_CRYPTO_CAST5=m
CONFIG_CRYPTO_CAST6=y
CONFIG_CRYPTO_DES=y
CONFIG_CRYPTO_FCRYPT=y
CONFIG_CRYPTO_KHAZAD=m
CONFIG_CRYPTO_SALSA20=y
CONFIG_CRYPTO_SALSA20_X86_64=y
# CONFIG_CRYPTO_SEED is not set
CONFIG_CRYPTO_SERPENT=m
CONFIG_CRYPTO_TEA=y
CONFIG_CRYPTO_TWOFISH=y
CONFIG_CRYPTO_TWOFISH_COMMON=y
CONFIG_CRYPTO_TWOFISH_X86_64=y
#
# Compression
#
CONFIG_CRYPTO_DEFLATE=y
CONFIG_CRYPTO_ZLIB=y
CONFIG_CRYPTO_LZO=y
#
# Random Number Generation
#
CONFIG_CRYPTO_ANSI_CPRNG=m
# CONFIG_CRYPTO_HW is not set
CONFIG_HAVE_KVM=y
CONFIG_HAVE_KVM_IRQCHIP=y
CONFIG_HAVE_KVM_EVENTFD=y
CONFIG_KVM_APIC_ARCHITECTURE=y
CONFIG_VIRTUALIZATION=y
CONFIG_KVM=m
CONFIG_KVM_INTEL=m
CONFIG_KVM_AMD=m
# CONFIG_VIRTIO_PCI is not set
# CONFIG_VIRTIO_BALLOON is not set
CONFIG_BINARY_PRINTF=y
#
# Library routines
#
CONFIG_BITREVERSE=y
CONFIG_GENERIC_FIND_FIRST_BIT=y
CONFIG_GENERIC_FIND_NEXT_BIT=y
CONFIG_GENERIC_FIND_LAST_BIT=y
CONFIG_CRC_CCITT=m
CONFIG_CRC16=m
CONFIG_CRC_T10DIF=y
CONFIG_CRC_ITU_T=m
CONFIG_CRC32=y
CONFIG_CRC7=y
CONFIG_LIBCRC32C=y
CONFIG_ZLIB_INFLATE=y
CONFIG_ZLIB_DEFLATE=y
CONFIG_LZO_COMPRESS=y
CONFIG_LZO_DECOMPRESS=y
CONFIG_TEXTSEARCH=y
CONFIG_TEXTSEARCH_KMP=y
CONFIG_TEXTSEARCH_BM=y
CONFIG_TEXTSEARCH_FSM=y
CONFIG_HAS_IOMEM=y
CONFIG_HAS_IOPORT=y
CONFIG_HAS_DMA=y
CONFIG_CHECK_SIGNATURE=y
CONFIG_CPUMASK_OFFSTACK=y
CONFIG_NLATTR=y
CONFIG_FORCE_SUCCESSFUL_BUILD=y
CONFIG_FORCE_MINIMAL_CONFIG=y
CONFIG_FORCE_MINIMAL_CONFIG_64=y
CONFIG_FORCE_MINIMAL_CONFIG_PHYS=y
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: tip: origin tree boot crash
2010-03-01 7:50 ` tip: origin tree boot crash Ingo Molnar
@ 2010-03-01 14:55 ` Steffen Klassert
2010-03-03 14:42 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Steffen Klassert @ 2010-03-01 14:55 UTC (permalink / raw)
To: Ingo Molnar
Cc: Herbert Xu, Linus Torvalds, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
Hi.
On Mon, Mar 01, 2010 at 08:50:24AM +0100, Ingo Molnar wrote:
>
> Hi,
>
> * Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> > crypto: pcrypt - Add pcrypt crypto parallelization wrapper
>
> -tip testing started triggering the following frequent boot crash yesterday,
> on 64-bit x86:
>
> | calling pcrypt_init+0x0/0xee @ 1
> | BUG: unable to handle kernel NULL pointer dereference at (null)
> | IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
> | Call Trace:
> | [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
> | [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
> | [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
>
Ugh, it seems that I forgot to allocate one of the cpumasks. Looking at the
configs of my test systems I noticed, that CONFIG_CPUMASK_OFFSTACK was
not set on all the configs, so I did not notice it.
The patch below fixes the boot crash if CONFIG_CPUMASK_OFFSTACK is
enabled on my test systems. Does the patch fix it for you too?
Thanks,
Steffen
Subject: [PATCH] padata: allocate the cpumask for the padata instance
The cpumask of the padata instance was used without allocated.
This caused boot crashes if CONFIG_CPUMASK_OFFSTACK is enabled.
This patch fixes this by doing proper allocation for this cpumask.
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
---
kernel/padata.c | 8 +++++++-
1 files changed, 7 insertions(+), 1 deletions(-)
diff --git a/kernel/padata.c b/kernel/padata.c
index 6f9bcb8..93caf65 100644
--- a/kernel/padata.c
+++ b/kernel/padata.c
@@ -642,6 +642,9 @@ struct padata_instance *padata_alloc(const struct cpumask *cpumask,
if (!pd)
goto err_free_inst;
+ if (!alloc_cpumask_var(&pinst->cpumask, GFP_KERNEL))
+ goto err_free_pd;
+
rcu_assign_pointer(pinst->pd, pd);
pinst->wq = wq;
@@ -654,12 +657,14 @@ struct padata_instance *padata_alloc(const struct cpumask *cpumask,
pinst->cpu_notifier.priority = 0;
err = register_hotcpu_notifier(&pinst->cpu_notifier);
if (err)
- goto err_free_pd;
+ goto err_free_cpumask;
mutex_init(&pinst->lock);
return pinst;
+err_free_cpumask:
+ free_cpumask_var(pinst->cpumask);
err_free_pd:
padata_free_pd(pd);
err_free_inst:
@@ -685,6 +690,7 @@ void padata_free(struct padata_instance *pinst)
unregister_hotcpu_notifier(&pinst->cpu_notifier);
padata_free_pd(pinst->pd);
+ free_cpumask_var(pinst->cpumask);
kfree(pinst);
}
EXPORT_SYMBOL(padata_free);
--
1.5.6.5
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: tip: origin tree boot crash
2010-03-01 14:55 ` Steffen Klassert
@ 2010-03-03 14:42 ` Herbert Xu
2010-03-04 3:00 ` Ingo Molnar
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-03-03 14:42 UTC (permalink / raw)
To: Steffen Klassert
Cc: Ingo Molnar, Linus Torvalds, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Mon, Mar 01, 2010 at 03:55:19PM +0100, Steffen Klassert wrote:
>
> On Mon, Mar 01, 2010 at 08:50:24AM +0100, Ingo Molnar wrote:
> >
> > * Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > > crypto: pcrypt - Add pcrypt crypto parallelization wrapper
> >
> > -tip testing started triggering the following frequent boot crash yesterday,
> > on 64-bit x86:
> >
> > | calling pcrypt_init+0x0/0xee @ 1
> > | BUG: unable to handle kernel NULL pointer dereference at (null)
> > | IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
> > | Call Trace:
> > | [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
> > | [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
> > | [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
> >
>
> Ugh, it seems that I forgot to allocate one of the cpumasks. Looking at the
> configs of my test systems I noticed, that CONFIG_CPUMASK_OFFSTACK was
> not set on all the configs, so I did not notice it.
>
> The patch below fixes the boot crash if CONFIG_CPUMASK_OFFSTACK is
> enabled on my test systems. Does the patch fix it for you too?
Ingo, any luck with this patch from Steffen?
Cheers,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: tip: origin tree boot crash
2010-03-03 14:42 ` Herbert Xu
@ 2010-03-04 3:00 ` Ingo Molnar
2010-03-04 5:31 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Ingo Molnar @ 2010-03-04 3:00 UTC (permalink / raw)
To: Herbert Xu
Cc: Steffen Klassert, Linus Torvalds, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
* Herbert Xu <herbert@gondor.apana.org.au> wrote:
> On Mon, Mar 01, 2010 at 03:55:19PM +0100, Steffen Klassert wrote:
> >
> > On Mon, Mar 01, 2010 at 08:50:24AM +0100, Ingo Molnar wrote:
> > >
> > > * Herbert Xu <herbert@gondor.apana.org.au> wrote:
> > >
> > > > crypto: pcrypt - Add pcrypt crypto parallelization wrapper
> > >
> > > -tip testing started triggering the following frequent boot crash yesterday,
> > > on 64-bit x86:
> > >
> > > | calling pcrypt_init+0x0/0xee @ 1
> > > | BUG: unable to handle kernel NULL pointer dereference at (null)
> > > | IP: [<ffffffff8126550b>] memcpy+0xb/0xb0
> > > | Call Trace:
> > > | [<ffffffff810c2f38>] ? padata_alloc+0x98/0x150
> > > | [<ffffffff82158c51>] ? pcrypt_init+0x0/0xee
> > > | [<ffffffff82158ccc>] pcrypt_init+0x7b/0xee
> > >
> >
> > Ugh, it seems that I forgot to allocate one of the cpumasks. Looking at the
> > configs of my test systems I noticed, that CONFIG_CPUMASK_OFFSTACK was
> > not set on all the configs, so I did not notice it.
> >
> > The patch below fixes the boot crash if CONFIG_CPUMASK_OFFSTACK is
> > enabled on my test systems. Does the patch fix it for you too?
>
> Ingo, any luck with this patch from Steffen?
I'm still busy with the merge window - please dont wait for me and consider it
fixed, i'll re-report if there's still any problems.
Thanks,
Ingo
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: tip: origin tree boot crash
2010-03-04 3:00 ` Ingo Molnar
@ 2010-03-04 5:31 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-03-04 5:31 UTC (permalink / raw)
To: Ingo Molnar
Cc: Steffen Klassert, Linus Torvalds, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Mar 04, 2010 at 04:00:52AM +0100, Ingo Molnar wrote:
>
> I'm still busy with the merge window - please dont wait for me and consider it
> fixed, i'll re-report if there's still any problems.
OK, I'll apply the patch.
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.34
[not found] ` <20100201195204.GA6953@gondor.apana.org.au>
@ 2010-03-05 7:10 ` Herbert Xu
[not found] ` <20100305071043.GA3548@gondor.apana.org.au>
2010-11-13 12:59 ` Crypto Fixes for 2.6.37 Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-03-05 7:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes three regressions and an older bug:
* The new padata system crashes during init on certain configurations.
* Fixed hmac(md5) broken by recent md5 update.
* Fixed authenc broken by ahash conversion.
* Fixed handling of unaligned buffers in hash API.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: md5 - Set statesize
Steffen Klassert (3):
crypto: authenc - Use correct ahash complete functions
crypto: authenc - Move saved IV in front of the ablkcipher request
padata: Allocate the cpumask for the padata instance
Szilveszter Ördög (1):
crypto: hash - Fix handling of unaligned buffers
crypto/ahash.c | 1 -
crypto/authenc.c | 27 +++++++++++++++------------
crypto/md5.c | 1 +
kernel/padata.c | 8 +++++++-
4 files changed, 23 insertions(+), 14 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.34
[not found] ` <20100305071043.GA3548@gondor.apana.org.au>
@ 2010-04-27 13:55 ` Herbert Xu
2010-06-03 10:05 ` Crypto Fixes for 2.6.35 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-04-27 13:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes an IPsec crash when an async hash driver is used.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: authenc - Add EINPROGRESS check
crypto/authenc.c | 16 +++++++++++-----
1 files changed, 11 insertions(+), 5 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.35
2010-02-26 0:49 ` Crypto Update for 2.6.34 Herbert Xu
2010-03-01 7:50 ` tip: origin tree boot crash Ingo Molnar
@ 2010-05-19 2:06 ` Herbert Xu
2010-05-21 10:44 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-05-19 2:06 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.35:
* Hardware hash support in mv_cesa.
* Hardware hash support in omap.
* VMAC now works on big-endian.
* Random fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Chihau Chau (1):
crypto: geode-aes - Fix some code style issues
Dan Carpenter (2):
crypto: pcrypt - Handle crypto_get_attr_type errors
crypto: algapi - Remove unneeded null check
Dmitry Kasatkin (3):
crypto: omap - Updates omap sham device related platform code
crypto: omap - sha1 & md5 driver
crypto: omap - OMAP macros corrected
Henrik Kretzschmar (1):
padata: Section cleanup
Herbert Xu (1):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6
Huang Ying (4):
crypto: aesni-intel - Add AES-NI accelerated CTR mode
crypto: tcrypt - Speed testing support for ghash
crypto: aesni-intel - Fix CTR optimization build failure with gas 2.16.1
crypto: aesni-intel - Fix another CTR build failure with gas 2.16.1
Richard Hartmann (1):
crypto: internal - Fix checkpatch errors
Shane Wang (1):
crypto: vmac - Fix big-endian support
Steffen Klassert (5):
padata: Dont scale the parallel objects with the cpus
padata: cpu hotplug code should depend on CONFIG_HOTPLUG_CPU
padata: Remove superfluous might_sleep
padata: Initialize the padata queues only for the used cpus
padata: Use get_online_cpus/put_online_cpus
Tobias Klauser (1):
crypto: mv_cesa - Use resource_size
Uri Simchoni (10):
crypto: mv_cesa - Invoke the user callback from a softirq context
crypto: mv_cesa - Remove compiler warning in mv_cesa driver
crypto: mv_cesa - Fix situation where the dest sglist is organized differently than the source sglist
crypto: mv_cesa - Fix situations where the src sglist spans more data than the request asks for
crypto: mv_cesa - Enqueue generic async requests
crypto: mv_cesa - Rename a variable to a more suitable name
crypto: mv_cesa - Execute some code via function pointers rathr than direct calls
crypto: mv_cesa - Make the copy-back of data optional
crypto: mv_cesa - Support processing of data from previous requests
crypto: mv_cesa - Add sha1 and hmac(sha1) async hash drivers
arch/arm/mach-omap2/clock2420_data.c | 2 +-
arch/arm/mach-omap2/clock2430_data.c | 2 +-
arch/arm/mach-omap2/clock3xxx_data.c | 2 +-
arch/arm/mach-omap2/devices.c | 58 ++-
arch/arm/plat-omap/include/plat/omap34xx.h | 5 +
arch/x86/crypto/aesni-intel_asm.S | 115 +++
arch/x86/crypto/aesni-intel_glue.c | 130 +++-
arch/x86/include/asm/inst.h | 96 ++-
crypto/algapi.c | 2 +-
crypto/internal.h | 2 +-
crypto/pcrypt.c | 11 +-
crypto/tcrypt.c | 7 +
crypto/tcrypt.h | 29 +
crypto/testmgr.h | 64 ++-
crypto/vmac.c | 75 +-
drivers/crypto/Kconfig | 9 +
drivers/crypto/Makefile | 2 +
drivers/crypto/geode-aes.c | 36 +-
drivers/crypto/mv_cesa.c | 692 ++++++++++++++--
drivers/crypto/mv_cesa.h | 40 +-
drivers/crypto/omap-sham.c | 1259 ++++++++++++++++++++++++++++
kernel/padata.c | 56 +-
22 files changed, 2497 insertions(+), 197 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.35
2010-05-19 2:06 ` Crypto Update for 2.6.35 Herbert Xu
@ 2010-05-21 10:44 ` Herbert Xu
2010-08-04 14:04 ` Crypto Update for 2.6.36 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-05-21 10:44 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is a revised crypto update for 2.6.35:
* Hardware hash support in mv_cesa.
* Hardware hash support in omap.
* Hardware hash support in talitos.
* Hardware hash/cipher support for Niagara2.
* Hardware support for CTR mode in aesni.
* VMAC now works on big-endian.
* Updates to padata.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Chihau Chau (1):
crypto: geode-aes - Fix some code style issues
Dan Carpenter (2):
crypto: pcrypt - Handle crypto_get_attr_type errors
crypto: algapi - Remove unneeded null check
David S. Miller (6):
crypto: hifn_795x - Rename ablkcipher_walk to hifn_cipher_walk
crypto: scatterwalk - Fix scatterwalk_done() test
crypto: tcrypt - Add speed tests for async hashing
crypto: testmgr - Add testing for async hashing and update/final
crypto: skcipher - Add ablkcipher_walk interfaces
crypto: n2 - Add Niagara2 crypto driver
Dmitry Kasatkin (3):
crypto: omap - Updates omap sham device related platform code
crypto: omap - sha1 & md5 driver
crypto: omap - OMAP macros corrected
Henrik Kretzschmar (1):
padata: Section cleanup
Herbert Xu (2):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6
crypto: shash - Remove usage of CRYPTO_MINALIGN
Huang Ying (4):
crypto: aesni-intel - Add AES-NI accelerated CTR mode
crypto: tcrypt - Speed testing support for ghash
crypto: aesni-intel - Fix CTR optimization build failure with gas 2.16.1
crypto: aesni-intel - Fix another CTR build failure with gas 2.16.1
Kim Phillips (1):
crypto: talitos - add support for sha224
Lee Nipper (3):
crypto: talitos - prepare for adding ahash algorithms
crypto: talitos - second prepare step for adding ahash algorithms
crypto: talitos - add hash algorithms
Matt Mackall (1):
random: simplify fips mode
Richard Hartmann (1):
crypto: internal - Fix checkpatch errors
Shane Wang (1):
crypto: vmac - Fix big-endian support
Shikhar Khattar (1):
crypto: authenc - Fix cryptlen calculation
Steffen Klassert (9):
padata: Dont scale the parallel objects with the cpus
padata: cpu hotplug code should depend on CONFIG_HOTPLUG_CPU
padata: Remove superfluous might_sleep
padata: Initialize the padata queues only for the used cpus
padata: Use get_online_cpus/put_online_cpus
padata: Use a timer to handle remaining objects in the reorder queues
padata: Flush the padata queues actively
padata: Add some code comments
padata: Use get_online_cpus/put_online_cpus in padata_free
Tobias Klauser (1):
crypto: mv_cesa - Use resource_size
Uri Simchoni (10):
crypto: mv_cesa - Invoke the user callback from a softirq context
crypto: mv_cesa - Remove compiler warning in mv_cesa driver
crypto: mv_cesa - Fix situation where the dest sglist is organized differently than the source sglist
crypto: mv_cesa - Fix situations where the src sglist spans more data than the request asks for
crypto: mv_cesa - Enqueue generic async requests
crypto: mv_cesa - Rename a variable to a more suitable name
crypto: mv_cesa - Execute some code via function pointers rathr than direct calls
crypto: mv_cesa - Make the copy-back of data optional
crypto: mv_cesa - Support processing of data from previous requests
crypto: mv_cesa - Add sha1 and hmac(sha1) async hash drivers
arch/arm/mach-omap2/clock2420_data.c | 2 +-
arch/arm/mach-omap2/clock2430_data.c | 2 +-
arch/arm/mach-omap2/clock3xxx_data.c | 2 +-
arch/arm/mach-omap2/devices.c | 58 +-
arch/arm/plat-omap/include/plat/omap34xx.h | 5 +
arch/x86/crypto/aesni-intel_asm.S | 115 ++
arch/x86/crypto/aesni-intel_glue.c | 130 ++-
arch/x86/include/asm/inst.h | 96 ++-
crypto/ablkcipher.c | 277 ++++
crypto/algapi.c | 2 +-
crypto/authenc.c | 8 +-
crypto/internal.h | 2 +-
crypto/pcrypt.c | 11 +-
crypto/scatterwalk.c | 2 +-
crypto/shash.c | 2 +-
crypto/tcrypt.c | 343 +++++-
crypto/tcrypt.h | 29 +
crypto/testmgr.c | 66 +-
crypto/testmgr.h | 64 +-
crypto/vmac.c | 75 +-
drivers/char/random.c | 10 +-
drivers/crypto/Kconfig | 21 +
drivers/crypto/Makefile | 4 +
drivers/crypto/geode-aes.c | 36 +-
drivers/crypto/hifn_795x.c | 18 +-
drivers/crypto/mv_cesa.c | 692 +++++++++-
drivers/crypto/mv_cesa.h | 40 +-
drivers/crypto/n2_asm.S | 95 ++
drivers/crypto/n2_core.c | 2083 ++++++++++++++++++++++++++++
drivers/crypto/n2_core.h | 231 +++
drivers/crypto/omap-sham.c | 1259 +++++++++++++++++
drivers/crypto/talitos.c | 699 +++++++++-
drivers/crypto/talitos.h | 12 +-
include/crypto/algapi.h | 40 +
include/linux/padata.h | 55 +
kernel/padata.c | 185 ++-
36 files changed, 6456 insertions(+), 315 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.35
2010-04-27 13:55 ` Herbert Xu
@ 2010-06-03 10:05 ` Herbert Xu
2010-06-03 16:26 ` Linus Torvalds
2010-07-16 2:26 ` Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-06-03 10:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes build failures for of_device drivers as well as
a couple of bugs in the n2 driver.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Anatolij Gustschin (1):
crypto: crypto4xx - Fix build breakage
David S. Miller (3):
n2_crypto: Fix build after of_device/of_platform_driver changes.
n2_crypto: Fix MAU kmem_cache name.
n2_crypto: Plumb fallback ahash requests properly.
drivers/crypto/amcc/crypto4xx_core.c | 6 +-
drivers/crypto/n2_core.c | 123 ++++++++++++++++++----------------
2 files changed, 68 insertions(+), 61 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-06-03 10:05 ` Crypto Fixes for 2.6.35 Herbert Xu
@ 2010-06-03 16:26 ` Linus Torvalds
2010-06-03 21:56 ` Herbert Xu
2010-07-16 2:26 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2010-06-03 16:26 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, 3 Jun 2010, Herbert Xu wrote:
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
"Already up-to-date." Forgot to push? (I also checked master, so it's not
that mirroring is slow)
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-06-03 16:26 ` Linus Torvalds
@ 2010-06-03 21:56 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-06-03 21:56 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jun 03, 2010 at 09:26:38AM -0700, Linus Torvalds wrote:
>
>
> On Thu, 3 Jun 2010, Herbert Xu wrote:
> >
> > Please pull from
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> "Already up-to-date." Forgot to push? (I also checked master, so it's not
> that mirroring is slow)
Sorry, I pushed my tree to my home directory on master but not
to /pub :)
Should work now.
Thanks!
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-06-03 10:05 ` Crypto Fixes for 2.6.35 Herbert Xu
2010-06-03 16:26 ` Linus Torvalds
@ 2010-07-16 2:26 ` Herbert Xu
2010-07-22 5:50 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-07-16 2:26 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a crash in the new ablkcipher walking code used by
async block ciphers.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Jiri Slaby (1):
crypto: skcipher - avoid NULL dereference
crypto/ablkcipher.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-07-16 2:26 ` Herbert Xu
@ 2010-07-22 5:50 ` Herbert Xu
2010-07-23 5:17 ` Lee Nipper
2010-09-03 6:00 ` Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-07-22 5:50 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the talito hash driver that causes too
much data to be copied.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Lee Nipper (1):
crypto: talitos - fix bug in sg_copy_end_to_buffer
drivers/crypto/talitos.c | 6 +++++-
1 files changed, 5 insertions(+), 1 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-07-22 5:50 ` Herbert Xu
@ 2010-07-23 5:17 ` Lee Nipper
2010-07-23 7:27 ` Herbert Xu
2010-09-03 6:00 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Lee Nipper @ 2010-07-23 5:17 UTC (permalink / raw)
To: Herbert Xu; +Cc: linux-crypto
On Thu, Jul 22, 2010 at 00:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> Hi Linus:
>
> This push fixes a bug in the talito hash driver that causes too
> much data to be copied.
>
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> or
>
> master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
>
> Lee Nipper (1):
> crypto: talitos - fix bug in sg_copy_end_to_buffer
>
> drivers/crypto/talitos.c | 6 +++++-
> 1 files changed, 5 insertions(+), 1 deletions(-)
>
Thanks Herbert.
But I am curious why this patch
http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg04660.html
wasn't nudged along too. It also fixed a talitos problem with ahash.
I don't mind if it needs to wait until later; I'm just curious.
Thanks again,
Lee
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-07-23 5:17 ` Lee Nipper
@ 2010-07-23 7:27 ` Herbert Xu
2010-07-23 13:17 ` Lee Nipper
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-07-23 7:27 UTC (permalink / raw)
To: Lee Nipper; +Cc: linux-crypto
On Fri, Jul 23, 2010 at 12:17:59AM -0500, Lee Nipper wrote:
>
> But I am curious why this patch
>
> http://www.mail-archive.com/linux-crypto@vger.kernel.org/msg04660.html
>
> wasn't nudged along too. It also fixed a talitos problem with ahash.
> I don't mind if it needs to wait until later; I'm just curious.
If it causes a crash or has other serious implications then I will
push it. However, if it simply results in a broken hash computation,
a failure that should be fairly obvious, then it can wait til the
next cycle.
When I looked at it previously I thought it fell into the latter
category, but I might be mistaken.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-07-23 7:27 ` Herbert Xu
@ 2010-07-23 13:17 ` Lee Nipper
0 siblings, 0 replies; 246+ messages in thread
From: Lee Nipper @ 2010-07-23 13:17 UTC (permalink / raw)
To: Herbert Xu; +Cc: linux-crypto
On Fri, Jul 23, 2010 at 02:27, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> If it causes a crash or has other serious implications then I will
> push it. However, if it simply results in a broken hash computation,
> a failure that should be fairly obvious, then it can wait til the
> next cycle.
>
> When I looked at it previously I thought it fell into the latter
> category, but I might be mistaken.
That's right. It's just a hash thing.
Thanks,
Lee
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.36
2010-05-21 10:44 ` Herbert Xu
@ 2010-08-04 14:04 ` Herbert Xu
2010-10-24 6:16 ` Crypto Update for 2.6.37 Herbert Xu
[not found] ` <20101024061625.GA23715@gondor.apana.org.au>
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-08-04 14:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.36:
* HMAC support for Niagara2.
* Talitos ahash bug fix.
* Adds sysfs interface to padata/pcrypt.
* Fixes/clean-ups for padata/pcrypt.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexander Shishkin (1):
crypto: testmgr - add an option to disable cryptoalgos' self-tests
Andrea Gelmini (1):
crypto: des_s390 - Checkpatch cleanup
Dan Carpenter (2):
crypto: mv_cesa - fixup error handling in mv_probe()
padata: add parenthesis in MAX_SEQ_NR macro
Dan Kruchinin (3):
padata: Make two separate cpumasks
padata: Added sysfs primitives to padata subsystem
pcrypt: Added sysfs interface to pcrypt
David S. Miller (4):
n2_crypto: Kill n2_base_ctx and helpers.
n2_crypto: Log algorithm success/failure in kernel log.
n2_crypto: Make ahash parameterization explicit.
n2_crypto: Add HMAC support.
Herbert Xu (2):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/crypto-2.6
crypto: pcomp - Fix illegal Kconfig configuration
Huang Weiyi (1):
crypto: omap - remove unused #include <linux/version.h>
Jan Glauber (2):
crypto: des_s390: remove des3_ede128 mode
crypto: des_s390: use generic weak key check
Joachim Fritschi (1):
crypto: twofish: Rename twofish to twofish_generic and add an alias
Julia Lawall (1):
crypto: Use ERR_CAST
Justin P. Mattock (1):
crypto: hifn_795x - Remove unused ctx variable
Kulikov Vasiliy (1):
hwrng: n2-drv - remove casts from void*
Lee Nipper (1):
crypto: talitos - fix ahash for multiple of blocksize
Peter Huewe (1):
crypto: geode_aes - Convert pci_table entries to PCI_VDEVICE (if PCI_ANY_ID is used)
Richard Kennedy (1):
random: Reorder struct entropy_store to remove padding on 64bits
Steffen Klassert (17):
padata: Check for valid padata instance on start
padata: Block until the instance is unused on stop
padata: Handle empty padata cpumasks
padata: make padata_do_parallel to return zero on success
padata: simplify serialization mechanism
padata: update documentation
padata: Fix cpu index counting
padata: Allocate cpumask dependend recources in any case
padata: Check for valid cpumasks
crypto: pcrypt - Dont calulate a callback cpu on empty callback cpumask
padata: Rename padata_alloc functions
padata: Rearrange set_cpumask functions
padata: Pass the padata cpumasks to the cpumask_change_notifier chain
crypto: pcrypt - Rename pcrypt_instance
crypto: pcrypt - Update pcrypt cpumask according to the padata cpumask notifier
padata: Remove padata_get_cpumask
padata: update API documentation
Documentation/padata.txt | 97 +++-
arch/s390/crypto/Makefile | 2 +-
arch/s390/crypto/crypto_des.h | 2 +-
arch/s390/crypto/des_s390.c | 238 +---------
crypto/Kconfig | 15 +-
crypto/Makefile | 4 +-
crypto/algboss.c | 4 +
crypto/authenc.c | 2 +-
crypto/ctr.c | 2 +-
crypto/pcrypt.c | 241 ++++++++---
crypto/testmgr.c | 14 +
crypto/{twofish.c => twofish_generic.c} | 1 +
crypto/xts.c | 2 +-
drivers/char/hw_random/n2-drv.c | 2 +-
drivers/char/random.c | 2 +-
drivers/crypto/geode-aes.c | 2 +-
drivers/crypto/hifn_795x.c | 4 -
drivers/crypto/mv_cesa.c | 10 +-
drivers/crypto/n2_core.c | 417 ++++++++++++-----
drivers/crypto/omap-sham.c | 1 -
drivers/crypto/talitos.c | 77 ++--
include/linux/padata.h | 121 ++++--
kernel/padata.c | 755 +++++++++++++++++++++++--------
23 files changed, 1307 insertions(+), 708 deletions(-)
Thanks,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-07-22 5:50 ` Herbert Xu
2010-07-23 5:17 ` Lee Nipper
@ 2010-09-03 6:00 ` Herbert Xu
2010-09-03 11:07 ` Crypto Fixes for 2.6.36 Herbert Xu
2010-09-04 10:45 ` Crypto Fixes for 2.6.35 Chuck Ebbert
1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2010-09-03 6:00 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the new ahash walking code, as well as
the self-test disabling option. The self-test disabling options
is now enabled by default as requested.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (2):
crypto: testmgr - Fix test disabling option
crypto: testmgr - Default to no tests
Szilveszter Ördög (1):
crypto: hash - Fix handling of small unaligned buffers
crypto/Kconfig | 8 ++++----
crypto/ahash.c | 7 +++++--
crypto/algboss.c | 8 ++++----
crypto/testmgr.c | 4 ++--
4 files changed, 15 insertions(+), 12 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.36
2010-09-03 6:00 ` Herbert Xu
@ 2010-09-03 11:07 ` Herbert Xu
2010-12-15 11:50 ` Crypto Fixes for 2.6.37 Herbert Xu
2010-09-04 10:45 ` Crypto Fixes for 2.6.35 Chuck Ebbert
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-09-03 11:07 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, Sep 03, 2010 at 02:00:55PM +0800, Herbert Xu wrote:
> Hi Linus:
>
> This push fixes a bug in the new ahash walking code, as well as
> the self-test disabling option. The self-test disabling options
> is now enabled by default as requested.
I missed a changeset in the push request. This also includes a
revert of a bogus cast removal patch.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (3):
crypto: testmgr - Fix test disabling option
crypto: testmgr - Default to no tests
Revert "hwrng: n2-drv - remove casts from void*"
Szilveszter Ördög (1):
crypto: hash - Fix handling of small unaligned buffers
crypto/Kconfig | 8 ++++----
crypto/ahash.c | 7 +++++--
crypto/algboss.c | 8 ++++----
crypto/testmgr.c | 4 ++--
drivers/char/hw_random/n2-drv.c | 2 +-
5 files changed, 16 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-09-03 6:00 ` Herbert Xu
2010-09-03 11:07 ` Crypto Fixes for 2.6.36 Herbert Xu
@ 2010-09-04 10:45 ` Chuck Ebbert
2010-09-04 12:22 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Chuck Ebbert @ 2010-09-04 10:45 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, 3 Sep 2010 14:00:55 +0800
Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> or
>
> master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
>
> Herbert Xu (2):
> crypto: testmgr - Fix test disabling option
> crypto: testmgr - Default to no tests
>
> Szilveszter Ördög (1):
> crypto: hash - Fix handling of small unaligned buffers
>
What happened to my minor fix?
[ http://marc.info/?l=linux-crypto-vger&m=128311860504202&w=2 ]
I never got a reply about it.
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.35
2010-09-04 10:45 ` Crypto Fixes for 2.6.35 Chuck Ebbert
@ 2010-09-04 12:22 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-09-04 12:22 UTC (permalink / raw)
To: Chuck Ebbert
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sat, Sep 04, 2010 at 06:45:01AM -0400, Chuck Ebbert wrote:
> On Fri, 3 Sep 2010 14:00:55 +0800
> Herbert Xu <herbert@gondor.hengli.com.au> wrote:
>
> > Please pull from
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> >
> > or
> >
> > master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> >
> >
> > Herbert Xu (2):
> > crypto: testmgr - Fix test disabling option
> > crypto: testmgr - Default to no tests
> >
> > Szilveszter Ördög (1):
> > crypto: hash - Fix handling of small unaligned buffers
> >
>
> What happened to my minor fix?
>
> [ http://marc.info/?l=linux-crypto-vger&m=128311860504202&w=2 ]
>
> I never got a reply about it.
Hmm I did send you a reply.
Anyway it's in cryptodev-2.6.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.37
2010-08-04 14:04 ` Crypto Update for 2.6.36 Herbert Xu
@ 2010-10-24 6:16 ` Herbert Xu
[not found] ` <20101024061625.GA23715@gondor.apana.org.au>
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-10-24 6:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.37:
* cryptd now supports AEAD.
* OMAP2/3 AES support.
* Mark Steffen Klassert as maintainer for padata/pcrypt.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Adrian Hoban (1):
crypto: cryptd - Adding the AEAD interface type support to cryptd
Chuck Ebbert (1):
crypto: fips - FIPS requires algorithm self-tests
David S. Miller (1):
crypto: n2_crypto - Niagara2 driver needs to depend upon CRYPTO_DES
Dmitry Kasatkin (2):
crypto: updates to enable omap aes
crypto: omap-aes - OMAP2/3 AES hw accelerator driver
Justin P. Mattock (1):
crypto: Kconfig - update broken web addresses
Kim Phillips (3):
crypto: talitos - fix warning: 'alg' may be used uninitialized in this function
crypto: talitos - fix checkpatch warning
crypto: talitos - sparse check endian fixes
Namhyung Kim (1):
padata: add missing __percpu markup in include/linux/padata.h
Samu Onkalo (1):
crypto: omap-sham - Adjust DMA parameters
Steffen Klassert (1):
MAINTAINERS: Add maintainer entries for padata/pcrypt
Tejun Heo (1):
crypto: hifn_795x - use cancel_delayed_work_sync()
Tracey Dent (1):
crypto: Makefile - replace the use of <module>-objs with <module>-y
MAINTAINERS | 16 +
arch/arm/mach-omap2/clock2420_data.c | 2 +-
arch/arm/mach-omap2/clock2430_data.c | 2 +-
arch/arm/mach-omap2/clock3xxx_data.c | 2 +-
arch/arm/mach-omap2/devices.c | 71 +++
crypto/Kconfig | 21 +-
crypto/cryptd.c | 206 ++++++++-
drivers/crypto/Kconfig | 9 +
drivers/crypto/Makefile | 3 +-
drivers/crypto/amcc/Makefile | 2 +-
drivers/crypto/hifn_795x.c | 3 +-
drivers/crypto/omap-aes.c | 948 ++++++++++++++++++++++++++++++++++
drivers/crypto/omap-sham.c | 6 +-
drivers/crypto/talitos.c | 29 +-
include/crypto/cryptd.h | 24 +
include/linux/padata.h | 4 +-
16 files changed, 1310 insertions(+), 38 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.37
[not found] ` <20100201195204.GA6953@gondor.apana.org.au>
2010-03-05 7:10 ` Crypto Fixes for 2.6.34 Herbert Xu
[not found] ` <20100305071043.GA3548@gondor.apana.org.au>
@ 2010-11-13 12:59 ` Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-11-13 12:59 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a couple of bugs in hardware crypto support:
* VIA Padlock had a serious problem dealing with odd-block-sized
input for AES-CBC which causes memory overwrites beyond the
end of the output buffer. Luckily the main user which is IPsec
has plenty of padding that avoids any serious consequences.
* Null check on the wrong variable in Sparc n2.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: padlock - Fix AES-CBC handling on odd-block-sized input
Nicolas Kaiser (1):
crypto: n2 - dubious error check
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/padlock-aes.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.37
2010-09-03 11:07 ` Crypto Fixes for 2.6.36 Herbert Xu
@ 2010-12-15 11:50 ` Herbert Xu
2010-12-15 20:40 ` Linus Torvalds
` (2 more replies)
0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2010-12-15 11:50 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem under certain configurations due
to a missing include.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Randy Dunlap (1):
crypto: ghash-intel - ghash-clmulni-intel_glue needs err.h
arch/x86/crypto/ghash-clmulni-intel_glue.c | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.37
2010-12-15 11:50 ` Crypto Fixes for 2.6.37 Herbert Xu
@ 2010-12-15 20:40 ` Linus Torvalds
2010-12-16 0:49 ` Herbert Xu
2011-02-16 5:39 ` Crypto Fixes for 2.6.38 Herbert Xu
[not found] ` <20110216053911.GA10999@gondor.apana.org.au>
2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2010-12-15 20:40 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Dec 15, 2010 at 3:50 AM, Herbert Xu
<herbert@gondor.hengli.com.au> wrote:
>
> This push fixes a build problem under certain configurations due
> to a missing include.
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
You have a bad repo. Git says:
fatal: loose object 52f6c5ad430e41736133acac179607b224eaaa11 (stored
in ./objects/52/f6c5ad430e41736133acac179607b224eaaa11) is corrupted
and it doesn't really seem to be corrupt as much as just unreadable
(ie you've made it readable only by yourself).
There's a few other objects like that too. How do you push to your
repo, and what changed?
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.37
2010-12-15 20:40 ` Linus Torvalds
@ 2010-12-16 0:49 ` Herbert Xu
2010-12-16 0:58 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2010-12-16 0:49 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Dec 15, 2010 at 12:40:48PM -0800, Linus Torvalds wrote:
>
> There's a few other objects like that too. How do you push to your
> repo, and what changed?
Oops, I've fixed that now. I use rsync to copy files across so
it's my end that has changed. And indeed I've just done an upgrade.
Sorry.
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 2.6.37
2010-12-16 0:49 ` Herbert Xu
@ 2010-12-16 0:58 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2010-12-16 0:58 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Dec 16, 2010 at 08:49:38AM +0800, Herbert Xu wrote:
> On Wed, Dec 15, 2010 at 12:40:48PM -0800, Linus Torvalds wrote:
> >
> > There's a few other objects like that too. How do you push to your
> > repo, and what changed?
>
> Oops, I've fixed that now. I use rsync to copy files across so
> it's my end that has changed. And indeed I've just done an upgrade.
> Sorry.
OK it should be fixed for got now. I suspect what has changed
is that git is now using my umask by default.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.38
[not found] ` <20101024061625.GA23715@gondor.apana.org.au>
@ 2011-01-06 0:01 ` Herbert Xu
2011-01-06 18:05 ` Linus Torvalds
` (2 more replies)
0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 0:01 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.38:
* Crypto API interface for user-space (hash + skcipher)
* Fixes for new OMAP driver.
* 32-bit support in aesni-intel.
* GCM support in aesni-intel.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Adrian Hoban (1):
crypto: rfc4106 - Extending the RC4106 AES-GCM test vectors
Adrian-Ken Rueegsegger (1):
crypto: ripemd - Set module author and update email address
Dmitry Kasatkin (15):
crypto: omap-sham - uses digest buffer in request context
crypto: omap-sham - DMA initialization fixes for off mode
crypto: omap-sham - error handling improved
crypto: omap-sham - removed redundunt locking
crypto: omap-sham - crypto_ahash_final() now not need to be called.
crypto: omap-sham - hash-in-progress is stored in hw format
crypto: omap-sham - FLAGS_FIRST is redundant and removed
crypto: omap-sham - zero-copy scatterlist handling
crypto: omap-aes - DMA initialization fixes for OMAP off mode
crypto: omap-aes - redundant locking is removed
crypto: omap-aes - error handling implementation improved
crypto: omap-aes - unnecessary code removed
crypto: omap-aes - initialize aes module once per request
crypto: omap-aes - checkpatch --file warning fixes
crypto: omap-sham - backlog handling fix
Herbert Xu (10):
crypto: hash - Fix async import on shash algorithm
net - Add AF_ALG macros
crypto: af_alg - User-space interface for Crypto API
crypto: algif_hash - User-space interface for hash operations
crypto: algif_skcipher - User-space interface for skcipher operations
crypto: algif_skcipher - Pass on error from af_alg_make_sg
crypto: af_alg - Add dependency on NET
crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned
crypto: algif_skcipher - Handle unaligned receive buffer
crypto: gf128mul - Remove experimental tag
Joe Perches (1):
crypto: Use vzalloc
Mathias Krause (2):
crypto: aesni-intel - Ported implementation to x86-32
crypto: aesni-intel - Fixed build error on x86-32
Miloslav Trmač (3):
include: Install linux/if_alg.h for user-space crypto API
net: Add missing lockdep class names for af_alg
crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets
Nicolas Kaiser (1):
crypto: cast5 - simplify if-statements
Randy Dunlap (1):
crypto: af_alg - fix af_alg memory_allocated data type
Roel Kluin (1):
crypto: mv_cesa - dont return PTR_ERR() of wrong pointer
Steffen Klassert (2):
crypto: scatterwalk - Add scatterwalk_crypto_chain helper
crypto: Use scatterwalk_crypto_chain
Tadeusz Struk (2):
crypto: aesni-intel - RFC4106 AES-GCM Driver Using Intel New Instructions
crypto: aesni-intel - Fixed build with binutils 2.16
Tejun Heo (1):
crypto: mark crypto workqueues CPU_INTENSIVE
Tracey Dent (1):
crypto: Makefile clean up
arch/x86/crypto/aesni-intel_asm.S | 1832 +++++++++++++++++++++++++++++++++++-
arch/x86/crypto/aesni-intel_glue.c | 540 +++++++++++-
crypto/Kconfig | 34 +-
crypto/Makefile | 17 +-
crypto/af_alg.c | 483 ++++++++++
crypto/algif_hash.c | 319 +++++++
crypto/algif_skcipher.c | 632 +++++++++++++
crypto/authenc.c | 22 +-
crypto/cast5.c | 74 +-
crypto/crypto_wq.c | 3 +-
crypto/deflate.c | 3 +-
crypto/eseqiv.c | 18 +-
crypto/gcm.c | 19 +-
crypto/pcrypt.c | 3 +-
crypto/rmd128.c | 3 +-
crypto/rmd160.c | 3 +-
crypto/rmd256.c | 3 +-
crypto/rmd320.c | 3 +-
crypto/shash.c | 8 +-
crypto/tcrypt.c | 11 +
crypto/testmgr.c | 24 +
crypto/testmgr.h | 361 +++++++
crypto/zlib.c | 3 +-
drivers/crypto/mv_cesa.c | 2 +-
drivers/crypto/omap-aes.c | 260 +++---
drivers/crypto/omap-sham.c | 374 +++++----
include/crypto/if_alg.h | 92 ++
include/crypto/scatterwalk.h | 15 +
include/linux/Kbuild | 1 +
include/linux/if_alg.h | 40 +
include/linux/socket.h | 5 +-
net/core/sock.c | 6 +-
32 files changed, 4763 insertions(+), 450 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 0:01 ` Crypto Update for 2.6.38 Herbert Xu
@ 2011-01-06 18:05 ` Linus Torvalds
2011-01-06 21:16 ` Herbert Xu
2011-01-13 1:44 ` Herbert Xu
2011-03-15 14:59 ` Crypto Update for 2.6.39 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 18:05 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Jan 5, 2011 at 4:01 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
>
> * Crypto API interface for user-space (hash + skcipher)
Is there really any point to this? And can we get more explanation of
what the interface is, and who would use it?
If you need crypto in user space, it's almost invariably better done
in user space. If the CPU can do crypto on its own, and doesn't expose
those instructions to user space, it's just a stupid CPU - and the
user/kernel transfer is likely going to make it slower than a pure
software approach for any but the biggest transfers.
And if the crypto engine is off-chip, the sw version is going to be
faster anyway except for possible async versions that are hard to
interface to user space.
So I really need more convincing about the whole user-space interface.
Adding new interfaces willy-nilly isn't a good idea. They need damn
good reasons.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 18:05 ` Linus Torvalds
@ 2011-01-06 21:16 ` Herbert Xu
2011-01-06 21:23 ` Linus Torvalds
2011-01-06 21:46 ` Pavel Roskin
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 21:16 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 10:05:46AM -0800, Linus Torvalds wrote:
>
> Is there really any point to this? And can we get more explanation of
> what the interface is, and who would use it?
I think you've answered it yourself in the third paragraph :)
> If you need crypto in user space, it's almost invariably better done
> in user space. If the CPU can do crypto on its own, and doesn't expose
> those instructions to user space, it's just a stupid CPU - and the
> user/kernel transfer is likely going to make it slower than a pure
> software approach for any but the biggest transfers.
I agree completely.
> And if the crypto engine is off-chip, the sw version is going to be
> faster anyway except for possible async versions that are hard to
> interface to user space.
>
> So I really need more convincing about the whole user-space interface.
> Adding new interfaces willy-nilly isn't a good idea. They need damn
> good reasons.
Right. This purpose of this interface is to access the async
hardware crypto drivers that we have added over the past years.
For a modern x86-64 CPU it isn't interesting at all. It's mainly
for other architectures where the CPU may not be able to keep up
with say 10Gb/s IPsec traffic and the encryption and/or hashing
must be offloaded.
This is also why only hash and skcipher are supported as they
are the main algorithm types supported by teh current async
drivers in the kernel.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 21:16 ` Herbert Xu
@ 2011-01-06 21:23 ` Linus Torvalds
2011-01-06 21:39 ` Herbert Xu
2011-01-06 21:46 ` Pavel Roskin
1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 21:23 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 6, 2011 at 1:16 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> On Thu, Jan 06, 2011 at 10:05:46AM -0800, Linus Torvalds wrote:
>>
>> Is there really any point to this? And can we get more explanation of
>> what the interface is, and who would use it?
>
> I think you've answered it yourself in the third paragraph :)
No I didn't.
What part of "can we get more explanation of what the interface is" is unclear?
Explanations of interface. Code. Who uses it? What are the actual
performance benefits on real code?
Quite frankly, asynchronous external devices using DMA or similar are
seldom real performance improvements. The bus and cache traffic tends
to overwhelm any other advantage, and commonly the result is (a) lower
performance with (b) better-looking profiles.
But "better-looking profiles" isn't actually a real advantage.
And I really do want to hear about new kernel interfaces. What _are_
the interfaces, and what are the advantages to them.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 21:23 ` Linus Torvalds
@ 2011-01-06 21:39 ` Herbert Xu
2011-01-06 22:13 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 21:39 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 01:23:19PM -0800, Linus Torvalds wrote:
>
> Explanations of interface. Code. Who uses it? What are the actual
> performance benefits on real code?
You snipped out the bit in my reply where I expanded on it:
: Right. This purpose of this interface is to access the async
: hardware crypto drivers that we have added over the past years.
:
: For a modern x86-64 CPU it isn't interesting at all. It's mainly
: for other architectures where the CPU may not be able to keep up
: with say 10Gb/s IPsec traffic and the encryption and/or hashing
: must be offloaded.
:
: This is also why only hash and skcipher are supported as they
: are the main algorithm types supported by teh current async
: drivers in the kernel.
The interface is meant to be used by those whose CPU either cannot
provide adequate performance for encryption/hashing, or where they
need to preverse the CPU power for other tasks. This is most
likely to be used on a non-x86 architecture, as most of our async
crypto drivers are for non-x86 architectures.
Users can be anything performing bulk encryptiong/hashing in user-
space, e.g., SSL (although there are plans to implement SSL in
the kernel as well), SSH, etc.
Here is the original cover email for the patches:
: On Tue, Sep 07, 2010 at 04:42:13PM +0800, Herbert Xu wrote:
: >
: > This is what I am proposing for the Crypto API user-interface.
: >
: > Note that this is the interface for operations. There will be
: > a separate interface (most likely netlink) for configuring crypto
: > algorithms, e.g., picking a specific AES implementation as the
: > system default.
:
: OK I've gone ahead and implemented the user-space API for hashes
: and ciphers.
:
: To recap this interface is designed to allow user-space programs
: to access hardware cryptographic accelerators that we have added
: to the kernel.
:
: The intended usage scenario is where a large amount of data needs
: to be processed where the benefits offered by hardware acceleration
: that is normally unavailable in user-space (as opposed to ones
: such as the Intel AES instruction which may be used directly from
: user-space) outweigh the overhead of going through the kernel.
:
: In order to further minimise the overhead in these cases, this
: interface offers the option of avoiding copying data between
: user-space and the kernel where possible and appropriate. For
: ciphers this means the use of the splice(2) interface instead of
: sendmsg(2)
:
: Here is a sample hash program (note that these only illustrate
: what the interface looks like and are not meant to be good examples
: of coding :)
:
: int main(void)
: {
: int opfd;
: int tfmfd;
: struct sockaddr_alg sa = {
: .salg_family = AF_ALG,
: .salg_type = "hash",
: .salg_name = "sha1"
: };
: char buf[20];
: int i;
:
: tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);
:
: bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));
:
: opfd = accept(tfmfd, NULL, 0);
:
: write(opfd, "abc", 3);
: read(opfd, buf, 20);
:
: for (i = 0; i < 20; i++) {
: printf("%02x", (unsigned char)buf[i]);
: }
: printf("\n");
:
: close(opfd);
: close(tfmfd);
:
: return 0;
: }
:
: And here is one for ciphers:
:
: int main(void)
: {
: int opfd;
: int tfmfd;
: struct sockaddr_alg sa = {
: .salg_family = AF_ALG,
: .salg_type = "skcipher",
: .salg_name = "cbc(aes)"
: };
: struct msghdr msg = {};
: struct cmsghdr *cmsg;
: char cbuf[CMSG_SPACE(4) + CMSG_SPACE(20)];
: char buf[16];
: struct af_alg_iv *iv;
: struct iovec iov;
: int i;
:
: tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);
:
: bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));
:
: setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY,
: "\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
: "\x51\x2e\x03\xd5\x34\x12\x00\x06", 16);
:
: opfd = accept(tfmfd, NULL, 0);
:
: msg.msg_control = cbuf;
: msg.msg_controllen = sizeof(cbuf);
:
: cmsg = CMSG_FIRSTHDR(&msg);
: cmsg->cmsg_level = SOL_ALG;
: cmsg->cmsg_type = ALG_SET_OP;
: cmsg->cmsg_len = CMSG_LEN(4);
: *(__u32 *)CMSG_DATA(cmsg) = ALG_OP_ENCRYPT;
:
: cmsg = CMSG_NXTHDR(&msg, cmsg);
: cmsg->cmsg_level = SOL_ALG;
: cmsg->cmsg_type = ALG_SET_IV;
: cmsg->cmsg_len = CMSG_LEN(20);
: iv = (void *)CMSG_DATA(cmsg);
: iv->ivlen = 16;
: memcpy(iv->iv, "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
: "\xb4\x22\xda\x80\x2c\x9f\xac\x41", 16);
:
: iov.iov_base = "Single block msg";
: iov.iov_len = 16;
:
: msg.msg_iov = &iov;
: msg.msg_iovlen = 1;
:
: sendmsg(opfd, &msg, 0);
: read(opfd, buf, 16);
:
: for (i = 0; i < 16; i++) {
: printf("%02x", (unsigned char)buf[i]);
: }
: printf("\n");
:
: close(opfd);
: close(tfmfd);
:
: return 0;
: }
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 21:16 ` Herbert Xu
2011-01-06 21:23 ` Linus Torvalds
@ 2011-01-06 21:46 ` Pavel Roskin
2011-01-06 21:49 ` Herbert Xu
2011-01-06 23:02 ` Mihai Donțu
1 sibling, 2 replies; 246+ messages in thread
From: Pavel Roskin @ 2011-01-06 21:46 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On 01/06/2011 04:16 PM, Herbert Xu wrote:
> This is also why only hash and skcipher are supported as they
> are the main algorithm types supported by teh current async
> drivers in the kernel.
Are there any chances AEAD will be supported? Is the API extendable to
allow that?
If I remember correctly, the original patch was simply a port of FreeBSD
/dev/crypto, which doesn't support AEAD.
--
Regards,
Pavel Roskin
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 21:46 ` Pavel Roskin
@ 2011-01-06 21:49 ` Herbert Xu
2011-01-06 23:02 ` Mihai Donțu
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 21:49 UTC (permalink / raw)
To: Pavel Roskin
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 04:46:02PM -0500, Pavel Roskin wrote:
>
> Are there any chances AEAD will be supported? Is the API extendable to
> allow that?
Yes we can support AEAD. However, as there weren't any existing
user-space users that could benefit immediately, I have not added
it at this point in time.
When combined-mode support in async hardware becomes more common
this could change of course.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 21:39 ` Herbert Xu
@ 2011-01-06 22:13 ` Linus Torvalds
2011-01-06 22:30 ` Herbert Xu
2011-01-07 12:04 ` Neil Horman
0 siblings, 2 replies; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 22:13 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 6, 2011 at 1:39 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> On Thu, Jan 06, 2011 at 01:23:19PM -0800, Linus Torvalds wrote:
>>
>> Explanations of interface. Code. Who uses it? What are the actual
>> performance benefits on real code?
>
> You snipped out the bit in my reply where I expanded on it:
You didn't expand on it AT ALL.
You just mentioned "the interface". I haven't seen WHAT THAT INTERFACE IS!
How hard is that to understand?
> Here is the original cover email for the patches:
Ok, this is more like it. This is roughly what I wanted to see:
> : Here is a sample hash program (note that these only illustrate
> : what the interface looks like and are not meant to be good examples
> : of coding :)
But I'm still missing the part where you show that there is any actual
use case that makes sense, and that actually improves performance.
Maybe it's been posted somewhere else, but the thing is, you're asking
_me_ to pull, and as a result you need to convince _me_ that this is a
good idea. So if it's been posted/discussed extensively elsewhere,
please point to those discussions.
I really don't like adding interfaces that don't have hard uses
associated with them. We've done it in the past, and it tends to be a
morass and a bad idea. That's been true even when the idea has been my
own, and thus obviously genius-level and clearly the RightThing(tm),
like "splice()". And it's why I push back on new interfaces when I see
them.
Btw, it doesn't have to be about performance per se. Does this allow
people to use keys without actually _seeing_ those keys? Your example
implies that that is not the case, but that's actually one of the few
reasons to actually support a kernel crypto interface - the ability to
have private personal keys around, but not having to actually let
possibly untrusted programs see them.
For example of why something like that matters, I can well see myself
using some program to encrypt things. But maybe I don't trust that
program enough to give it my actual private keys. In that case, kernel
support is a real feature.
But in your example, it looks like you just give it the key. Which to
me means that you're totally missing one of the major reasons for
having a separate protection domain.
And that makes me think that the interface is bad. And that's why it's
a big change to go from "internal kernel crypto interface" to "actual
user-space interface to the kernel crypto engine". The first one can
be fixed. The second one cannot.
So I'm not necessarily hung up on "performance", but I am hung up on
"there needs to be a point", and "the interface needs to be
-correct-". Performance would be one such point. Not just 'the
hardware is there'. I know the hardware exists, but I'm not at all
convinced that DMA with all the cacheflushing will ever actully be
faster the the CPU. And if it can, I want to hear about the real-world
situation where it actually is used.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:13 ` Linus Torvalds
@ 2011-01-06 22:30 ` Herbert Xu
2011-01-06 22:33 ` David Miller
2011-01-06 22:43 ` Linus Torvalds
2011-01-07 12:04 ` Neil Horman
1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 22:30 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 02:13:17PM -0800, Linus Torvalds wrote:
>
> But I'm still missing the part where you show that there is any actual
> use case that makes sense, and that actually improves performance.
> Maybe it's been posted somewhere else, but the thing is, you're asking
> _me_ to pull, and as a result you need to convince _me_ that this is a
> good idea. So if it's been posted/discussed extensively elsewhere,
> please point to those discussions.
The main use-case is bulk encryption/hashing in user-space. For
example, on Sparc Niagara2 you need to use SPU (Stream Processing
Unit) in order to do crypto at 10Gb/s over the network. Because
of the hardware design, it is difficult to make use of the SPU
directly in user-space, unless you dedicate the SPU to one single
thread/user.
That is why we need a crypto driver in the kernel as well as a
user-space interface exporting it, to make available a single
piece of hardware resource so that it may be used by multiple
users in user-space.
The same applies to most of the drivers in drivers/crypto, e.g.,
omap provides ARM crypto acceleration providing crypto throughput
that simply cannot be achieved by the CPU itself.
The actual encryption in user-space would be anything that is
done in bulk, such as SSH or SSL. In fact, the intention is
to implement it just once in a library such as libssl where it
could then be used automatically by all appliations.
> But in your example, it looks like you just give it the key. Which to
> me means that you're totally missing one of the major reasons for
> having a separate protection domain.
Providing such separation is not the primary objective of this API,
which is providing user-space access to off-chip crypto hardware.
However, this is something that has been considered and can be
easily added. The idea is to first add symmetric key storage
capability to the existing in-kernel keyring API. Once that is
done we can easily add a new setsockopt to the crypto user-interface
that retrieves the key from the kernel keyring instead of getting
it directly from user-space.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:30 ` Herbert Xu
@ 2011-01-06 22:33 ` David Miller
2011-01-06 22:43 ` Linus Torvalds
1 sibling, 0 replies; 246+ messages in thread
From: David Miller @ 2011-01-06 22:33 UTC (permalink / raw)
To: herbert; +Cc: torvalds, linux-kernel, linux-crypto
From: Herbert Xu <herbert@gondor.apana.org.au>
Date: Fri, 7 Jan 2011 09:30:42 +1100
> On Thu, Jan 06, 2011 at 02:13:17PM -0800, Linus Torvalds wrote:
>>
>> But I'm still missing the part where you show that there is any actual
>> use case that makes sense, and that actually improves performance.
>> Maybe it's been posted somewhere else, but the thing is, you're asking
>> _me_ to pull, and as a result you need to convince _me_ that this is a
>> good idea. So if it's been posted/discussed extensively elsewhere,
>> please point to those discussions.
>
> The main use-case is bulk encryption/hashing in user-space. For
> example, on Sparc Niagara2 you need to use SPU (Stream Processing
> Unit) in order to do crypto at 10Gb/s over the network. Because
> of the hardware design, it is difficult to make use of the SPU
> directly in user-space, unless you dedicate the SPU to one single
> thread/user.
The N2 SPU is not accessible at all from userspace.
> However, this is something that has been considered and can be
> easily added. The idea is to first add symmetric key storage
> capability to the existing in-kernel keyring API. Once that is
> done we can easily add a new setsockopt to the crypto user-interface
> that retrieves the key from the kernel keyring instead of getting
> it directly from user-space.
That indeed would be real interesting.
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:30 ` Herbert Xu
2011-01-06 22:33 ` David Miller
@ 2011-01-06 22:43 ` Linus Torvalds
2011-01-06 22:53 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 22:43 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 6, 2011 at 2:30 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
>
> The main use-case is bulk encryption/hashing in user-space. For
> example, on Sparc Niagara2 you need to use SPU (Stream Processing
> Unit) in order to do crypto at 10Gb/s over the network.
Umm. But doesn't that require that the data then be sent to the network?
Why would a user-space -> crypto engine -> user space -> network chip
thing ever be good enough? Niagara is so slow that the whole bounce
thing will totally negate all the SPU advantages.
Your interface doesn't seem to support the use case that you actually
want, which is to avoid the bouncing back and forth between user space
buffers.
And if you bounce back and forth, I bet you can't get that 10Gb/s anyway.
Can you do the "bypass directly to the TCP stream" with the interface
you added? It isn't at all obvious how it would work.
So let me repeat ONE MORE TIME:
- I understand that your interface can use the hw that exists
- but I still want real-world use cases to show that it actually
works and makes sense in practice.
Don't give me "we could use the SPU" crap. Give me "this program
actually uses the SPU and gets better performance thanks to it, and
here are the numbers".
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:43 ` Linus Torvalds
@ 2011-01-06 22:53 ` Herbert Xu
2011-01-06 23:25 ` Linus Torvalds
2011-01-07 2:39 ` Pavel Roskin
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-06 22:53 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 02:43:35PM -0800, Linus Torvalds wrote:
>
> Can you do the "bypass directly to the TCP stream" with the interface
> you added? It isn't at all obvious how it would work.
Yes it can. The interface allows zero-copy in both directions
using the splice interface. Here is a sample program demonstrating
zero-copy in-place encryption. It doesn't send the result over TCP
but I'm sure you can imagine what that would look like.
Note that the final read(2) looks like it copies, but it doesn't.
The read(2) will setup SG lists using the user-space address and
place the encryption result in there directly. In this case as
the source/destination addresses are identical, it performs in-place
encryption.
#include <fcntl.h>
#include <stdio.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <linux/splice.h>
#include <linux/types.h>
#include <linux/af_alg.h>
static char buf[4096] __attribute__((__aligned__(4096)));
int main(void)
{
int opfd;
int tfmfd;
struct sockaddr_alg sa = {
.salg_family = AF_ALG,
.salg_type = "skcipher",
.salg_name = "cbc(aes)"
};
struct msghdr msg = {};
struct cmsghdr *cmsg;
char cbuf[CMSG_SPACE(4) + CMSG_SPACE(20)];
struct aes_iv {
__u32 len;
__u8 iv[16];
} *iv;
struct iovec iov;
int i;
int pipes[2];
pipe(pipes);
tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);
bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));
setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY,
"\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
"\x51\x2e\x03\xd5\x34\x12\x00\x06", 16);
opfd = accept(tfmfd, NULL, 0);
msg.msg_control = cbuf;
msg.msg_controllen = sizeof(cbuf);
cmsg = CMSG_FIRSTHDR(&msg);
cmsg->cmsg_level = SOL_ALG;
cmsg->cmsg_type = ALG_SET_OP;
cmsg->cmsg_len = CMSG_LEN(4);
*(__u32 *)CMSG_DATA(cmsg) = ALG_OP_ENCRYPT;
cmsg = CMSG_NXTHDR(&msg, cmsg);
cmsg->cmsg_level = SOL_ALG;
cmsg->cmsg_type = ALG_SET_IV;
cmsg->cmsg_len = CMSG_LEN(20);
iv = (void *)CMSG_DATA(cmsg);
iv->len = 16;
memcpy(iv->iv, "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
"\xb4\x22\xda\x80\x2c\x9f\xac\x41", 16);
memcpy(buf, "Single block msg", 16);
iov.iov_base = buf;
iov.iov_len = 4096;
msg.msg_iovlen = 0;
msg.msg_flags = MSG_MORE;
sendmsg(opfd, &msg, 0);
vmsplice(pipes[1], &iov, 1, SPLICE_F_GIFT);
splice(pipes[0], NULL, opfd, NULL, 16, 0);
read(opfd, buf, 16);
for (i = 0; i < 16; i++) {
printf("%02x", (unsigned char)buf[i]);
}
printf("\n");
close(opfd);
close(tfmfd);
return 0;
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 21:46 ` Pavel Roskin
2011-01-06 21:49 ` Herbert Xu
@ 2011-01-06 23:02 ` Mihai Donțu
1 sibling, 0 replies; 246+ messages in thread
From: Mihai Donțu @ 2011-01-06 23:02 UTC (permalink / raw)
To: Pavel Roskin
Cc: Herbert Xu, Linus Torvalds, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Thursday 06 January 2011 23:46:02 Pavel Roskin wrote:
> On 01/06/2011 04:16 PM, Herbert Xu wrote:
> > This is also why only hash and skcipher are supported as they
> > are the main algorithm types supported by teh current async
> > drivers in the kernel.
>
> Are there any chances AEAD will be supported? Is the API extendable to
> allow that?
>
> If I remember correctly, the original patch was simply a port of FreeBSD
> /dev/crypto, which doesn't support AEAD.
If it's meant to work like the FreeBSD /dev/crypto, then maybe this[1] paper
is worth mentionning, which includes some performance numbers. There was a
single thing that drew my attention, from "Drawbacks and problems [of
userspace crypto]": "Lots of scary code-duplication".
[1] http://www.paeps.cx/pubs/crypto_acceleration/slides.pdf
--
Mihai Donțu
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:53 ` Herbert Xu
@ 2011-01-06 23:25 ` Linus Torvalds
2011-01-07 0:14 ` Herbert Xu
2011-01-07 2:39 ` Pavel Roskin
1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-01-06 23:25 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 6, 2011 at 2:53 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> On Thu, Jan 06, 2011 at 02:43:35PM -0800, Linus Torvalds wrote:
>>
>> Can you do the "bypass directly to the TCP stream" with the interface
>> you added? It isn't at all obvious how it would work.
>
> Yes it can. The interface allows zero-copy in both directions
> using the splice interface. Here is a sample program demonstrating
> zero-copy in-place encryption. It doesn't send the result over TCP
> but I'm sure you can imagine what that would look like.
Ok. So can we actually get numbers for this?
Put another way: I really really REALLY don't want to merge new
user-space interfaces that don't actually work in reality. But if this
allows direct encryption to a network interface, and it actually is
able to saturate 10Gb on niagara (unlike a user-mode encryption thing,
I assume, since those things are dog slow), then that would certainly
be a good real-life test.
But I really don't want to merge it unless it has had at least
real-life testing of actually doing better than regular sw user-space
encryption.
I realize that on PC's, it's unlikely to ever help. So I'm not asking
for "show me how this helps on my hardware". But I do want to get some
case on _some_ actual hardware where it works on a real load.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 23:25 ` Linus Torvalds
@ 2011-01-07 0:14 ` Herbert Xu
2011-01-07 2:43 ` David Miller
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-01-07 0:14 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 03:25:32PM -0800, Linus Torvalds wrote:
>
> Ok. So can we actually get numbers for this?
As you alluded to, we need real non-x86 hardware to get some
proper numbers. Unfortunately I'm currently a continent away
from my async hardware so all I can give you are software
numbers.
Anyway, here is a test program that does a set number (1024 * 1024)
of 4096-byte (total 4GB) encryptions with libssl and kernel crypto.
The result on my Core 2 (in a KVM VM FWIW) is:
lenny0:~# time ./test_crypto > /dev/null
real 0m30.340s
user 0m0.172s
sys 0m30.166s
lenny0:~# time ./test_crypto software > /dev/null
real 0m34.555s
user 0m34.550s
sys 0m0.004s
lenny0:~#
I'm not claiming these numbers make any sense but this is just
a ballpark figure.
Dave, can you run this program on your N2 and see what it shows?
#include <fcntl.h>
#include <openssl/aes.h>
#include <stdio.h>
#include <string.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <linux/types.h>
#define AF_ALG 38
#define SOL_ALG 279
#define SPLICE_F_GIFT (0x08) /* pages passed in are a gift */
struct sockaddr_alg {
__u16 salg_family;
__u8 salg_type[14];
__u32 salg_feat;
__u32 salg_mask;
__u8 salg_name[64];
};
struct af_alg_iv {
__u32 ivlen;
__u8 iv[0];
};
/* Socket options */
#define ALG_SET_KEY 1
#define ALG_SET_IV 2
#define ALG_SET_OP 3
/* Operations */
#define ALG_OP_DECRYPT 0
#define ALG_OP_ENCRYPT 1
static char buf[4096] __attribute__((__aligned__(4096)));
static void crypt_ssl(const char *key, char *iv, int i)
{
AES_KEY akey;
AES_set_encrypt_key(key, 128, &akey);
while (i--)
AES_cbc_encrypt(buf, buf, 4096, &akey, iv, 1);
}
static void crypt_kernel(const char *key, char *oiv, int i)
{
int opfd;
int tfmfd;
struct sockaddr_alg sa = {
.salg_family = AF_ALG,
.salg_type = "skcipher",
.salg_name = "cbc(aes)"
};
struct msghdr msg = {};
struct cmsghdr *cmsg;
char cbuf[CMSG_SPACE(4) + CMSG_SPACE(20)] = {};
struct aes_iv {
__u32 len;
__u8 iv[16];
} *iv;
struct iovec iov;
int pipes[2];
pipe(pipes);
tfmfd = socket(AF_ALG, SOCK_SEQPACKET, 0);
bind(tfmfd, (struct sockaddr *)&sa, sizeof(sa));
setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY, key, 16);
opfd = accept(tfmfd, NULL, 0);
msg.msg_control = cbuf;
msg.msg_controllen = sizeof(cbuf);
cmsg = CMSG_FIRSTHDR(&msg);
cmsg->cmsg_level = SOL_ALG;
cmsg->cmsg_type = ALG_SET_OP;
cmsg->cmsg_len = CMSG_LEN(4);
*(__u32 *)CMSG_DATA(cmsg) = ALG_OP_ENCRYPT;
cmsg = CMSG_NXTHDR(&msg, cmsg);
cmsg->cmsg_level = SOL_ALG;
cmsg->cmsg_type = ALG_SET_IV;
cmsg->cmsg_len = CMSG_LEN(20);
iv = (void *)CMSG_DATA(cmsg);
iv->len = 16;
memcpy(iv->iv, oiv, 16);
iov.iov_base = buf;
iov.iov_len = 4096;
msg.msg_iovlen = 0;
msg.msg_flags = MSG_MORE;
while (i--) {
sendmsg(opfd, &msg, 0);
vmsplice(pipes[1], &iov, 1, SPLICE_F_GIFT);
splice(pipes[0], NULL, opfd, NULL, 4096, 0);
read(opfd, buf, 4096);
}
close(opfd);
close(tfmfd);
close(pipes[0]);
close(pipes[1]);
}
int main(int argc, char **argv)
{
int i;
const char key[16] =
"\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
"\x51\x2e\x03\xd5\x34\x12\x00\x06";
char iv[16] =
"\x3d\xaf\xba\x42\x9d\x9e\xb4\x30"
"\xb4\x22\xda\x80\x2c\x9f\xac\x41";
memcpy(buf, "Single block msg", 16);
if (argc > 1)
crypt_ssl(key, iv, 1024 * 1024);
else
crypt_kernel(key, iv, 1024 * 1024);
for (i = 0; i < 4096; i++) {
printf("%02x", (unsigned char)buf[i]);
}
printf("\n");
return 0;
}
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:53 ` Herbert Xu
2011-01-06 23:25 ` Linus Torvalds
@ 2011-01-07 2:39 ` Pavel Roskin
2011-01-07 3:03 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Pavel Roskin @ 2011-01-07 2:39 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Quoting Herbert Xu <herbert@gondor.apana.org.au>:
> setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY,
> "\x06\xa9\x21\x40\x36\xb8\xa1\x5b"
> "\x51\x2e\x03\xd5\x34\x12\x00\x06", 16);
By the way, is it a good idea to use setsockopt() this way? Some keys
may be large. And if AEAD is supported, will it use setsockopt() for
the unencrypted authenticated data?
Maybe some variation of write() or sendto() would be more appropriate?
--
Regards,
Pavel Roskin
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-07 0:14 ` Herbert Xu
@ 2011-01-07 2:43 ` David Miller
2011-01-07 3:04 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: David Miller @ 2011-01-07 2:43 UTC (permalink / raw)
To: herbert; +Cc: torvalds, linux-kernel, linux-crypto
From: Herbert Xu <herbert@gondor.apana.org.au>
Date: Fri, 7 Jan 2011 11:14:59 +1100
> Anyway, here is a test program that does a set number (1024 * 1024)
> of 4096-byte (total 4GB) encryptions with libssl and kernel crypto.
> The result on my Core 2 (in a KVM VM FWIW) is:
>
> lenny0:~# time ./test_crypto > /dev/null
>
> real 0m30.340s
> user 0m0.172s
> sys 0m30.166s
> lenny0:~# time ./test_crypto software > /dev/null
>
> real 0m34.555s
> user 0m34.550s
> sys 0m0.004s
> lenny0:~#
>
> I'm not claiming these numbers make any sense but this is just
> a ballpark figure.
>
> Dave, can you run this program on your N2 and see what it shows?
Sure, here goes, BTW I had to change the buffer size to 8192 since
vmsplice requires page aligned operation (I was getting -EINVAL
otherwise):
davem@maramba:~$ time ./crypto_user_test >/dev/null
real 0m46.586s
user 0m3.280s
sys 0m43.230s
davem@maramba:~$ time ./crypto_user_test software >/dev/null
real 10m40.336s
user 10m40.540s
sys 0m0.000s
davem@maramba:~$
What's that, something like a factor of 13 faster? :-)
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-07 2:39 ` Pavel Roskin
@ 2011-01-07 3:03 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-07 3:03 UTC (permalink / raw)
To: Pavel Roskin
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 09:39:28PM -0500, Pavel Roskin wrote:
>
> By the way, is it a good idea to use setsockopt() this way? Some keys
> may be large. And if AEAD is supported, will it use setsockopt() for
> the unencrypted authenticated data?
For large keys (i.e., asymmetric key crypto) the kernel keyring API
would be the obvious way of passing them around.
For AEAD the AD would be passed around through send/splice.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-07 2:43 ` David Miller
@ 2011-01-07 3:04 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-07 3:04 UTC (permalink / raw)
To: David Miller; +Cc: torvalds, linux-kernel, linux-crypto
On Thu, Jan 06, 2011 at 06:43:02PM -0800, David Miller wrote:
>
> davem@maramba:~$ time ./crypto_user_test >/dev/null
>
> real 0m46.586s
> user 0m3.280s
> sys 0m43.230s
> davem@maramba:~$ time ./crypto_user_test software >/dev/null
>
> real 10m40.336s
> user 10m40.540s
> sys 0m0.000s
> davem@maramba:~$
>
> What's that, something like a factor of 13 faster? :-)
Heh, I missed the leading 1 in your second result and was about
to spill my drink :)
Thanks!
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 22:13 ` Linus Torvalds
2011-01-06 22:30 ` Herbert Xu
@ 2011-01-07 12:04 ` Neil Horman
2011-01-08 13:23 ` Nikos Mavrogiannopoulos
1 sibling, 1 reply; 246+ messages in thread
From: Neil Horman @ 2011-01-07 12:04 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Thu, Jan 06, 2011 at 02:13:17PM -0800, Linus Torvalds wrote:
> On Thu, Jan 6, 2011 at 1:39 PM, Herbert Xu <herbert@gondor.hengli.com.au> wrote:
> > On Thu, Jan 06, 2011 at 01:23:19PM -0800, Linus Torvalds wrote:
> >>
> >> Explanations of interface. Code. Who uses it? What are the actual
> >> performance benefits on real code?
> >
> > You snipped out the bit in my reply where I expanded on it:
>
> You didn't expand on it AT ALL.
>
> You just mentioned "the interface". I haven't seen WHAT THAT INTERFACE IS!
>
> How hard is that to understand?
>
> > Here is the original cover email for the patches:
>
> Ok, this is more like it. This is roughly what I wanted to see:
>
> > : Here is a sample hash program (note that these only illustrate
> > : what the interface looks like and are not meant to be good examples
> > : of coding :)
>
> But I'm still missing the part where you show that there is any actual
> use case that makes sense, and that actually improves performance.
> Maybe it's been posted somewhere else, but the thing is, you're asking
> _me_ to pull, and as a result you need to convince _me_ that this is a
> good idea. So if it's been posted/discussed extensively elsewhere,
> please point to those discussions.
>
> I really don't like adding interfaces that don't have hard uses
> associated with them. We've done it in the past, and it tends to be a
> morass and a bad idea. That's been true even when the idea has been my
> own, and thus obviously genius-level and clearly the RightThing(tm),
> like "splice()". And it's why I push back on new interfaces when I see
> them.
>
> Btw, it doesn't have to be about performance per se. Does this allow
> people to use keys without actually _seeing_ those keys? Your example
> implies that that is not the case, but that's actually one of the few
> reasons to actually support a kernel crypto interface - the ability to
> have private personal keys around, but not having to actually let
> possibly untrusted programs see them.
>
This actually is an indirect feature of this interface. Using it, you can open
a algorithm socket, select a specific alg, assign a key, and then pass that
socket descriptor over a unix socket to an another process using an
SCM_RIGHTS ancilliary message. The receiving process can then use children
acceppted from that passed socket to preform the configured crypto operation
without any knoweldge of the keys used in it. I can write a demo app if you
like.
Regards
Neil
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-07 12:04 ` Neil Horman
@ 2011-01-08 13:23 ` Nikos Mavrogiannopoulos
2011-01-10 12:03 ` Neil Horman
0 siblings, 1 reply; 246+ messages in thread
From: Nikos Mavrogiannopoulos @ 2011-01-08 13:23 UTC (permalink / raw)
To: Neil Horman
Cc: Linus Torvalds, Herbert Xu, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Jan 7, 2011 at 2:04 PM, Neil Horman <nhorman@tuxdriver.com> wrote:
>> Btw, it doesn't have to be about performance per se. Does this allow
>> people to use keys without actually _seeing_ those keys? Your example
>> implies that that is not the case, but that's actually one of the few
>> reasons to actually support a kernel crypto interface - the ability to
>> have private personal keys around, but not having to actually let
>> possibly untrusted programs see them.
> This actually is an indirect feature of this interface. Using it, you can open
> a algorithm socket, select a specific alg, assign a key, and then pass that
> socket descriptor over a unix socket to an another process using an
> SCM_RIGHTS ancilliary message. The receiving process can then use children
> acceppted from that passed socket to preform the configured crypto operation
> without any knoweldge of the keys used in it. I can write a demo app if you
> like.
Several things have to be considered when extending an interface like
that. For example, do the algorithm implementations protect against
timing attacks, or keys can be recovered, using them? What is the
purpose of cryptographic key separation? If long term keys are to be
protected, then it makes sense to support RSA, DSA keys in addition to
symmetric keys (e.g. microsoft only supports assymetric keys for
separation, since symmetric ones are rarely used as long term keys -
[in TLS-PSK]).
Some of these issues are discussed in my report on a user-space crypto
interface that specifically targeted separation and speed at [0].
regards,
Nikos
[0]. https://www.cosic.esat.kuleuven.be/publications/article-1490.pdf
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-08 13:23 ` Nikos Mavrogiannopoulos
@ 2011-01-10 12:03 ` Neil Horman
2011-01-10 19:05 ` Dag Arne Osvik
0 siblings, 1 reply; 246+ messages in thread
From: Neil Horman @ 2011-01-10 12:03 UTC (permalink / raw)
To: Nikos Mavrogiannopoulos
Cc: Linus Torvalds, Herbert Xu, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Sat, Jan 08, 2011 at 03:23:04PM +0200, Nikos Mavrogiannopoulos wrote:
> On Fri, Jan 7, 2011 at 2:04 PM, Neil Horman <nhorman@tuxdriver.com> wrote:
>
> >> Btw, it doesn't have to be about performance per se. Does this allow
> >> people to use keys without actually _seeing_ those keys? Your example
> >> implies that that is not the case, but that's actually one of the few
> >> reasons to actually support a kernel crypto interface - the ability to
> >> have private personal keys around, but not having to actually let
> >> possibly untrusted programs see them.
> > This actually is an indirect feature of this interface. Using it, you can open
> > a algorithm socket, select a specific alg, assign a key, and then pass that
> > socket descriptor over a unix socket to an another process using an
> > SCM_RIGHTS ancilliary message. The receiving process can then use children
> > acceppted from that passed socket to preform the configured crypto operation
> > without any knoweldge of the keys used in it. I can write a demo app if you
> > like.
>
> Several things have to be considered when extending an interface like
> that. For example, do the algorithm implementations protect against
> timing attacks, or keys can be recovered, using them? What is the
No, the kernel does not implement any protection against timing attacks in the
algorithms per-se, but preforming a timing attack against a kernel crypto
operation is going to be near impossible anyway, as precise timing measurements
are going to get obscured by interupts, scheduling jitter, lock contention, and
various other factors that will make measuring syscall time fairly useless.
> purpose of cryptographic key separation? If long term keys are to be
My only purpose was to answer Linus' question. He wondered if other user space
programs could use instances of cyrpto algs over this interface without needing
to hold key data. I was illustrating how that could be done.
Neil
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-10 12:03 ` Neil Horman
@ 2011-01-10 19:05 ` Dag Arne Osvik
0 siblings, 0 replies; 246+ messages in thread
From: Dag Arne Osvik @ 2011-01-10 19:05 UTC (permalink / raw)
To: Neil Horman, Nikos Mavrogiannopoulos
Cc: Linus Torvalds, Herbert Xu, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
> On Sat, Jan 08, 2011 at 03:23:04PM +0200, Nikos Mavrogiannopoulos wrote:
> > On Fri, Jan 7, 2011 at 2:04 PM, Neil Horman <nhorman@tuxdriver.com>
> > wrote:
> >
> > > > Btw, it doesn't have to be about performance per se. Does this
> > > > allow people to use keys without actually _seeing_ those keys?
> > > > Your example implies that that is not the case, but that's
> > > > actually one of the few reasons to actually support a kernel
> > > > crypto interface - the ability to have private personal keys
> > > > around, but not having to actually let possibly untrusted programs
> > > > see them.
> > > This actually is an indirect feature of this interface. Using it,
> > > you can open a algorithm socket, select a specific alg, assign a
> > > key, and then pass that socket descriptor over a unix socket to an
> > > another process using an SCM_RIGHTS ancilliary message. The
> > > receiving process can then use children acceppted from that passed
> > > socket to preform the configured crypto operation without any
> > > knoweldge of the keys used in it. I can write a demo app if you
> > > like.
> >
> > Several things have to be considered when extending an interface like
> > that. For example, do the algorithm implementations protect against
> > timing attacks, or keys can be recovered, using them? What is the
> No, the kernel does not implement any protection against timing attacks
> in the algorithms per-se, but preforming a timing attack against a
> kernel crypto operation is going to be near impossible anyway, as
> precise timing measurements are going to get obscured by interupts,
> scheduling jitter, lock contention, and various other factors that will
> make measuring syscall time fairly useless.
Let me just point out that this is not near impossible at all; instead it has already been done more than 6 years ago. And it's not only syscall time that leaks information. One practical example is recovery of a full AES key in a couple of seconds, using cache attacks against an encrypted file system. AES-NI is immune to this kind of attack, but other algorithms typically implemented using lookup tables are at risk.
Dag Arne
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 2.6.38
2011-01-06 0:01 ` Crypto Update for 2.6.38 Herbert Xu
2011-01-06 18:05 ` Linus Torvalds
@ 2011-01-13 1:44 ` Herbert Xu
2011-03-15 14:59 ` Crypto Update for 2.6.39 Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-01-13 1:44 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is an updated to the crypto pull request for 2.6.38:
* Crypto API interface for user-space (hash + skcipher)
This interface is intended to provide access of kernel
hardware crypto drivers to user-space applications. It
presents the kernel crypto API via a socket interface.
It is only meant to be used for bulk crypto operations,
i.e., if you're doing less than a page's worth of data,
then this is not for you.
For bulk data processing the performance is similar to
that in the kernel when zero-copy is used in both
directions.
* Memory corruption fix for via_rng.
* Fixes for new OMAP driver.
* 32-bit support in aesni-intel.
* GCM support in aesni-intel.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Adrian Hoban (1):
crypto: rfc4106 - Extending the RC4106 AES-GCM test vectors
Adrian-Ken Rueegsegger (1):
crypto: ripemd - Set module author and update email address
Dennis Gilmore (1):
crypto: n2 - use __devexit not __exit in n2_unregister_algs
Dmitry Kasatkin (15):
crypto: omap-sham - uses digest buffer in request context
crypto: omap-sham - DMA initialization fixes for off mode
crypto: omap-sham - error handling improved
crypto: omap-sham - removed redundunt locking
crypto: omap-sham - crypto_ahash_final() now not need to be called.
crypto: omap-sham - hash-in-progress is stored in hw format
crypto: omap-sham - FLAGS_FIRST is redundant and removed
crypto: omap-sham - zero-copy scatterlist handling
crypto: omap-aes - DMA initialization fixes for OMAP off mode
crypto: omap-aes - redundant locking is removed
crypto: omap-aes - error handling implementation improved
crypto: omap-aes - unnecessary code removed
crypto: omap-aes - initialize aes module once per request
crypto: omap-aes - checkpatch --file warning fixes
crypto: omap-sham - backlog handling fix
Herbert Xu (13):
crypto: hash - Fix async import on shash algorithm
net - Add AF_ALG macros
crypto: af_alg - User-space interface for Crypto API
crypto: algif_hash - User-space interface for hash operations
crypto: algif_skcipher - User-space interface for skcipher operations
crypto: algif_skcipher - Pass on error from af_alg_make_sg
crypto: af_alg - Add dependency on NET
crypto: algif_skcipher - Fixed overflow when sndbuf is page aligned
crypto: algif_skcipher - Handle unaligned receive buffer
crypto: gf128mul - Remove experimental tag
hwrng: via_rng - Fix asm constraints
crypto: padlock - Move padlock.h into include/crypto
hwrng: via_rng - Fix memory scribbling on some CPUs
Joe Perches (1):
crypto: Use vzalloc
Mathias Krause (2):
crypto: aesni-intel - Ported implementation to x86-32
crypto: aesni-intel - Fixed build error on x86-32
Miloslav Trmač (3):
include: Install linux/if_alg.h for user-space crypto API
net: Add missing lockdep class names for af_alg
crypto: af_alg - Make sure sk_security is initialized on accept()ed sockets
Nicolas Kaiser (1):
crypto: cast5 - simplify if-statements
Randy Dunlap (1):
crypto: af_alg - fix af_alg memory_allocated data type
Roel Kluin (1):
crypto: mv_cesa - dont return PTR_ERR() of wrong pointer
Steffen Klassert (2):
crypto: scatterwalk - Add scatterwalk_crypto_chain helper
crypto: Use scatterwalk_crypto_chain
Tadeusz Struk (2):
crypto: aesni-intel - RFC4106 AES-GCM Driver Using Intel New Instructions
crypto: aesni-intel - Fixed build with binutils 2.16
Tejun Heo (1):
crypto: mark crypto workqueues CPU_INTENSIVE
Tracey Dent (1):
crypto: Makefile clean up
arch/x86/crypto/aesni-intel_asm.S | 1832 ++++++++++++++++++++++++++++++++-
arch/x86/crypto/aesni-intel_glue.c | 540 ++++++++++-
crypto/Kconfig | 34 +-
crypto/Makefile | 17 +-
crypto/af_alg.c | 483 +++++++++
crypto/algif_hash.c | 319 ++++++
crypto/algif_skcipher.c | 632 ++++++++++++
crypto/authenc.c | 22 +-
crypto/cast5.c | 74 +-
crypto/crypto_wq.c | 3 +-
crypto/deflate.c | 3 +-
crypto/eseqiv.c | 18 +-
crypto/gcm.c | 19 +-
crypto/pcrypt.c | 3 +-
crypto/rmd128.c | 3 +-
crypto/rmd160.c | 3 +-
crypto/rmd256.c | 3 +-
crypto/rmd320.c | 3 +-
crypto/shash.c | 8 +-
crypto/tcrypt.c | 11 +
crypto/testmgr.c | 24 +
crypto/testmgr.h | 361 +++++++
crypto/zlib.c | 3 +-
drivers/char/hw_random/via-rng.c | 10 +-
drivers/crypto/mv_cesa.c | 2 +-
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/omap-aes.c | 260 +++---
drivers/crypto/omap-sham.c | 374 ++++---
drivers/crypto/padlock-aes.c | 2 +-
drivers/crypto/padlock-sha.c | 8 +-
include/crypto/if_alg.h | 92 ++
{drivers => include}/crypto/padlock.h | 8 +-
include/crypto/scatterwalk.h | 15 +
include/linux/Kbuild | 1 +
include/linux/if_alg.h | 40 +
include/linux/socket.h | 5 +-
net/core/sock.c | 6 +-
37 files changed, 4779 insertions(+), 464 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.38
2010-12-15 11:50 ` Crypto Fixes for 2.6.37 Herbert Xu
2010-12-15 20:40 ` Linus Torvalds
@ 2011-02-16 5:39 ` Herbert Xu
[not found] ` <20110216053911.GA10999@gondor.apana.org.au>
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-02-16 5:39 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes an ancient bug in s390's implementation of SHA
that manifests itself only under certain conditions. This bug
causes the generation of incorrect hashes, and potentially memory
corruption.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: sha-s390 - Reset index after processing partial block
arch/s390/crypto/sha_common.c | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.39
2011-01-06 0:01 ` Crypto Update for 2.6.38 Herbert Xu
2011-01-06 18:05 ` Linus Torvalds
2011-01-13 1:44 ` Herbert Xu
@ 2011-03-15 14:59 ` Herbert Xu
2011-05-20 23:54 ` Crypto Update for 2.6.40 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-03-15 14:59 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.39:
* New picoxcell crypto driver.
* New picoxcell RNG driver.
* Added SHA test vectors to detect bugs such as the recent one on s390.
* Memory leaks fixes on error path in aesni-intel.
* xts(aes) and ghash are now available in FIPS mode.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
David Sterba (1):
crypto: tcrypt - do not attempt to write to readonly variable
Davidlohr Bueso (1):
crypto: skcipher - remove redundant NULL check
Herbert Xu (1):
crypto: sha1 - Add test vector to test partial block processing
Jamie Iles (4):
hwrng: pixocell - add support for picoxcell TRNG
crypto: omap-aes - don't treat NULL clk as an error
crypto: omap-sham - don't treat NULL clk as an error
crypto: picoxcell - add support for the picoxcell crypto engines
Jarod Wilson (3):
crypto: testmgr - mark xts(aes) as fips_allowed
crypto: testmgr - mark ghash as fips_allowed
random: update interface comments to reflect reality
Jesper Juhl (2):
crypto: aesni-intel - Don't leak memory in rfc4106_set_hash_subkey
crypto: aesni-intel - Fix remaining leak in rfc4106_set_hash_key
Julia Lawall (1):
hwrng: omap - Convert release_resource to release_region/release_mem_region
arch/x86/crypto/aesni-intel_glue.c | 24 +-
crypto/ablkcipher.c | 3 +-
crypto/tcrypt.c | 3 +-
crypto/testmgr.c | 2 +
crypto/testmgr.h | 30 +-
drivers/char/hw_random/Kconfig | 12 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/omap-rng.c | 14 +-
drivers/char/hw_random/picoxcell-rng.c | 208 ++++
drivers/char/random.c | 13 +-
drivers/crypto/Kconfig | 17 +
drivers/crypto/Makefile | 2 +-
drivers/crypto/omap-aes.c | 4 +-
drivers/crypto/omap-sham.c | 4 +-
drivers/crypto/picoxcell_crypto.c | 1867 ++++++++++++++++++++++++++++++++
drivers/crypto/picoxcell_crypto_regs.h | 128 +++
16 files changed, 2299 insertions(+), 33 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 2.6.39
[not found] ` <20110216053911.GA10999@gondor.apana.org.au>
@ 2011-03-28 7:13 ` Herbert Xu
2011-06-29 23:51 ` Crypto Fixes for 3.0 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-03-28 7:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the aesni-intel driver that may cause
incorrect results for certain input sizes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Tadeusz Struk (1):
crypto: aesni-intel - fixed problem with packets that are not multiple of 64bytes
arch/x86/crypto/aesni-intel_asm.S | 5 ++++-
arch/x86/crypto/aesni-intel_glue.c | 14 ++++++++++++--
2 files changed, 16 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 2.6.40
2011-03-15 14:59 ` Crypto Update for 2.6.39 Herbert Xu
@ 2011-05-20 23:54 ` Herbert Xu
2011-07-24 1:17 ` Crypto Update for 3.1 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-05-20 23:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 2.6.40:
* New Freescale SEC4/CAAM driver.
* New S5PV210 advanced crypto engine driver.
* Support for EMU chips on omap.
* SHA-128/256 support for VIA Nano.
* Native XTS/GHASH/CTR support on s390.
* New test vector for AES-OFB.
* Make aesni-intel build on 32-bit again.
* SHA1 fixes for omap.
* Bug fixes for mv_cesa.
* AMD RNG support on Maple PPC boards.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andy Lutomirski (1):
crypto: aesni-intel - Merge with fpu.ko
Brilly Wu (1):
crypto: padlock - Add SHA-1/256 module for VIA Nano
Dan Carpenter (2):
crypto: caam - dereferencing ERR_PTR on allocation failure
crypto: caam - ARRAY_SIZE() vs sizeof()
Dmitry Eremin-Solenikov (2):
hwrng: amd - manage resource allocation
hwrng: amd - enable AMD hw rnd driver for Maple PPC boards
Dmitry Kasatkin (3):
crypto: omap-sham - remove debug print
crypto: omap-sham - enable driver for EMU chips
crypto: omap-sham - hmac calculation bug fix for sha1 base hash
Gerald Schaefer (3):
crypto: s390 - add System z hardware support for XTS mode
crypto: s390 - add System z hardware support for GHASH
crypto: s390 - add System z hardware support for CTR mode
Jamie Iles (1):
crypto: picoxcell - fix possible status FIFO overflow
Jan Glauber (4):
crypto: s390 - extend crypto facility check
crypto: s390 - cleanup DES code
crypto: s390 - cleanup s390 Kconfig options
crypto: tcrypt - CTR mode speed test for AES
Julia Lawall (1):
crypto: caam - introduce missing kfree
Kim Phillips (13):
crypto: caam - Add support for the Freescale SEC4/CAAM
crypto: caam - standardize device tree naming convention to utilize '-vX.Y'
crypto: caam - de-CHIP-ify device tree compatibles
crypto: caam - handle interrupt lines shared across rings
crypto: caam - fix queue interface detection
crypto: caam - remove WAIT-FOR-COMPLETIONs from givencrypt descriptor
crypto: caam - remove duplicate dev_err
crypto: caam - remove unused keylen from session context
crypto: caam - fix printk recursion for long error texts
crypto: caam - platform_bus_type migration
crypto: caam - fix decryption shared vs. non-shared key setting
crypto: caam - remove unused authkeylen from caam_ctx
crypto: caam - add support for sha512 variants of existing AEAD algorithms
Markku Kylanpaa (1):
crypto: omap-sham - fix concurrent sha1 calculations
Phil Sutter (10):
crypto: mv_cesa - use ablkcipher_request_cast instead of the manual container_of
crypto: mv_cesa - the descriptor pointer register needs to be set just once
crypto: mv_cesa - drop this call to mv_hash_final from mv_hash_finup
crypto: mv_cesa - print a warning when registration of AES algos fail
crypto: mv_cesa - no need to save digest state after the last chunk
crypto: mv_cesa - refactor copy_src_to_buf()
crypto: mv_cesa - fill inner/outer IV fields only in HMAC case
crypto: mv_cesa - move digest state initialisation to a better place
crypto: mv_cesa - copy remaining bytes to SRAM only when needed
crypto: mv_cesa - make count_sgs() null-pointer proof
Puneet Saxena (1):
crypto: testmgr - add support for aes ofb mode
Randy Dunlap (1):
crypto: aesni-intel - fix aesni build on i386
Vladimir Zapolskiy (1):
crypto: s5p-sss - add S5PV210 advanced crypto engine support
.../devicetree/bindings/crypto/fsl-sec4.txt | 397 +++++
arch/powerpc/boot/dts/p4080ds.dts | 86 +-
arch/s390/crypto/Makefile | 1 +
arch/s390/crypto/aes_s390.c | 383 +++++-
arch/s390/crypto/crypt_s390.h | 112 ++-
arch/s390/crypto/des_check_key.c | 132 --
arch/s390/crypto/des_s390.c | 370 ++++--
arch/s390/crypto/ghash_s390.c | 162 ++
arch/s390/crypto/prng.c | 2 +-
arch/s390/crypto/sha1_s390.c | 2 +-
arch/s390/crypto/sha256_s390.c | 2 +-
arch/s390/crypto/sha512_s390.c | 2 +-
arch/x86/crypto/Makefile | 4 +-
arch/x86/crypto/aesni-intel_glue.c | 9 +
arch/x86/crypto/fpu.c | 10 +-
crypto/Kconfig | 6 -
crypto/tcrypt.c | 4 +
crypto/testmgr.c | 16 +
crypto/testmgr.h | 60 +
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/amd-rng.c | 9 +
drivers/crypto/Kconfig | 65 +-
drivers/crypto/Makefile | 2 +
drivers/crypto/caam/Kconfig | 72 +
drivers/crypto/caam/Makefile | 8 +
drivers/crypto/caam/caamalg.c | 1268 ++++++++++++++++
drivers/crypto/caam/compat.h | 35 +
drivers/crypto/caam/ctrl.c | 269 ++++
drivers/crypto/caam/desc.h | 1605 ++++++++++++++++++++
drivers/crypto/caam/desc_constr.h | 205 +++
drivers/crypto/caam/error.c | 248 +++
drivers/crypto/caam/error.h | 11 +
drivers/crypto/caam/intern.h | 113 ++
drivers/crypto/caam/jr.c | 517 +++++++
drivers/crypto/caam/jr.h | 21 +
drivers/crypto/caam/regs.h | 663 ++++++++
drivers/crypto/mv_cesa.c | 97 +-
drivers/crypto/omap-sham.c | 78 +-
drivers/crypto/padlock-sha.c | 269 ++++-
drivers/crypto/picoxcell_crypto.c | 64 +-
drivers/crypto/s5p-sss.c | 701 +++++++++
41 files changed, 7660 insertions(+), 422 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.0
2011-03-28 7:13 ` Crypto Fixes for 2.6.39 Herbert Xu
@ 2011-06-29 23:51 ` Herbert Xu
2011-10-21 8:22 ` Crypto Fixes for 3.1 Herbert Xu
2012-01-26 2:43 ` Crypto Fixes for 3.3 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-06-29 23:51 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a memory corruption bug due to undersized kmalloc
in the caam driver. The patch has actually been in my tree for
a month but I had incorrectly placed it in the tree for linux-next.
Sorry about that.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Kim Phillips (1):
crypto: caam - fix operator precedence in shared descriptor allocation
drivers/crypto/caam/caamalg.c | 6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.1
2011-05-20 23:54 ` Crypto Update for 2.6.40 Herbert Xu
@ 2011-07-24 1:17 ` Herbert Xu
2011-10-31 4:09 ` Crypto Update for 3.2 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-07-24 1:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.1:
* Support for AES/DES/3DES in caam.
* Improved AEAD support in caam.
* Added hardware SHA-224 support to s390.
* Added ppc4xx RNG driver.
* Updates to omap-sham driver.
* Updates to talitos driver.
* Added XTS-AES-256 test vectors.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Dmitry Kasatkin (11):
crypto: omap-sham - remove extra reference
crypto: omap-sham - remove unused code
crypto: omap-sham - replace flags bit mask with bit number
crypto: omap-sham - replace flags operation with atomic bit operations
crypto: omap-sham - move some flags to device context
crypto: omap-sham - remove unnecessary local variable
crypto: omap-sham - remove dedicated queue handling tasklet
crypto: omap-sham - irq and dma handling changes
crypto: omap-sham - irq handler must not clear error code
crypto: omap-sham - clear device flags when finishing request
crypto: omap-sham - do not schedule tasklet if there is no active requests
Gustavo F. Padovan (1):
crypto: ghash-intel - Fix set but not used in ghash_async_setkey()
H Hartley Sweeten (1):
hwrng: timeriomem - use resource_size
Herbert Xu (1):
crypto: algif_hash - Handle initial af_alg_make_sg error correctly
Jan Glauber (1):
crypto: s390 - support hardware accelerated SHA-224
Jarod Wilson (1):
crypto: testmgr - add xts-aes-256 self-test
Josh Boyer (2):
crypto: crypto4xx - Perform read/modify/write on device control register
hwrng: ppc4xx - add support for ppc4xx TRNG
Julia Lawall (2):
hwrng: omap - add missing clk_put
hwrng: nomadik - add missing clk_put
Kim Phillips (5):
crypto: caam - fix build warning when DEBUG_FS not configured
crypto: talitos - ensure request ordering within a single tfm
crypto: talitos - don't set done notification in hot path
crypto: talitos - remove unused giv from ablkcipher methods
crypto: talitos - don't bad_key in ablkcipher setkey
Mandeep Singh Baines (1):
crypto: sha1_generic - use SHA1_BLOCK_SIZE
Mathias Krause (1):
crypto: gf128mul - fix call to memset()
Mati Vait (2):
crypto: crc32c - Fixed coding style issue
crypto: arc4 - Fixed coding style issues
Richard Weinberger (1):
crypto: UML build fixes
Yuan Kang (4):
crypto: caam - shorter names
crypto: caam - structure renaming
crypto: caam - faster aead implementation
crypto: caam - ablkcipher support
arch/s390/crypto/sha256_s390.c | 66 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 2 +-
crypto/Kconfig | 4 +-
crypto/algif_hash.c | 4 +-
crypto/arc4.c | 15 +-
crypto/crc32c.c | 10 +-
crypto/gf128mul.c | 4 +-
crypto/sha1_generic.c | 11 +-
crypto/testmgr.h | 293 +++++-
drivers/char/hw_random/Kconfig | 12 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/nomadik-rng.c | 3 +-
drivers/char/hw_random/omap-rng.c | 6 +-
drivers/char/hw_random/ppc4xx-rng.c | 156 +++
drivers/char/hw_random/timeriomem-rng.c | 3 +-
drivers/crypto/amcc/crypto4xx_core.c | 5 +-
drivers/crypto/caam/caamalg.c | 1848 +++++++++++++++++++++-------
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 4 +-
drivers/crypto/caam/desc_constr.h | 58 +-
drivers/crypto/omap-sham.c | 180 ++--
drivers/crypto/talitos.c | 47 +-
22 files changed, 2136 insertions(+), 597 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.1
2011-06-29 23:51 ` Crypto Fixes for 3.0 Herbert Xu
@ 2011-10-21 8:22 ` Herbert Xu
2011-10-21 9:41 ` David Rientjes
2011-11-10 23:00 ` Crypto Fixes for 3.2 Herbert Xu
2012-01-26 2:43 ` Crypto Fixes for 3.3 Herbert Xu
1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-10-21 8:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a NULL-pointer dereference that can be triggered
from user-space.
Please pull from
git://github.com/herbertx/crypto.git
Nick Bowler (1):
crypto: ghash - Avoid null pointer dereference if no key is set
crypto/ghash-generic.c | 6 ++++++
1 files changed, 6 insertions(+), 0 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.1
2011-10-21 8:22 ` Crypto Fixes for 3.1 Herbert Xu
@ 2011-10-21 9:41 ` David Rientjes
2011-10-21 11:35 ` Herbert Xu
2011-11-10 23:00 ` Crypto Fixes for 3.2 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: David Rientjes @ 2011-10-21 9:41 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, 21 Oct 2011, Herbert Xu wrote:
> Hi Linus:
>
> This push fixes a NULL-pointer dereference that can be triggered
> from user-space.
>
> Please pull from
>
> git://github.com/herbertx/crypto.git
>
Hi Herbert,
When I pull from this, I also get
commit 9c129165af0225c63c37d1896ac9b0d34e48b69f
Author: Jamie Iles <jamie@jamieiles.com>
Date: Mon Jun 6 12:31:17 2011 +0100
crypto: picoxcell - fix possible invalid pointer dereference
which looks unrelated?
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.1
2011-10-21 9:41 ` David Rientjes
@ 2011-10-21 11:35 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-10-21 11:35 UTC (permalink / raw)
To: David Rientjes
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, Oct 21, 2011 at 02:41:54AM -0700, David Rientjes wrote:
> On Fri, 21 Oct 2011, Herbert Xu wrote:
>
> > Hi Linus:
> >
> > This push fixes a NULL-pointer dereference that can be triggered
> > from user-space.
> >
> > Please pull from
> >
> > git://github.com/herbertx/crypto.git
> >
>
> Hi Herbert,
>
> When I pull from this, I also get
>
> commit 9c129165af0225c63c37d1896ac9b0d34e48b69f
> Author: Jamie Iles <jamie@jamieiles.com>
> Date: Mon Jun 6 12:31:17 2011 +0100
>
> crypto: picoxcell - fix possible invalid pointer dereference
>
> which looks unrelated?
Sorry, I seem to have based it on a dirty tree. It should be
fixed now.
Thanks!
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.2
2011-07-24 1:17 ` Crypto Update for 3.1 Herbert Xu
@ 2011-10-31 4:09 ` Herbert Xu
2011-10-31 16:42 ` Randy Dunlap
2012-01-06 4:12 ` Crypto Update for 3.3 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2011-10-31 4:09 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Linus:
Here is the crypto update for 3.2:
* User-space interface for algorithm selection/configuration
* SSSE3 implementation of SHA1.
* X86-64 assembly implementation of blowfish.
* X86-64 assembly implementation of twofish.
* Misc fixes.
Please pull from
git://github.com/herbertx/crypto.git
The top commit object is
commit ea8bdfcff17599e5d80f93e2ae194fbbab7f8d5e
Author: Herbert Xu <herbert@gondor.apana.org.au>
Date: Wed Oct 26 17:15:10 2011 +0200
crypto: user - Add dependency on NET
Alexey Dobriyan (1):
crypto: whirlpool - count rounds from 0
H Hartley Sweeten (1):
crypto: aes-x86 - quiet sparse noise about symbol not declared
Herbert Xu (4):
crypto: sha - Fix build error due to crypto_sha1_update
crypto: cryptd - Use subsys_initcall to prevent races with aesni
crypto: user - Initialise match in crypto_alg_match
crypto: user - Add dependency on NET
Jamie Iles (5):
crypto: picoxcell - convert to platform ID table
crypto: picoxcell - add connection ID to the clock name
crypto: picoxcell - support for device tree matching
crypto: picoxcell - fix possible invalid pointer dereference
crypto: picoxcell - add dependency on HAVE_CLK
Jonathan Nieder (1):
crypto: padlock-aes - Make module loading even quieter when hardware is missing
Jussi Kivilinna (13):
crypto: blowfish - split generic and common c code
crypto: blowfish - rename C-version to blowfish_generic
crypto: tcrypt - add ctr(blowfish) speed test
crypto: blowfish - add x86_64 assembly implementation
crypto: blowfish-x86_64 - improve x86_64 blowfish 4-way performance
crypto: blowfish-x86_64 - add credits
crypto: tcrypt - add ctr(twofish) speed test
crypto: twofish-x86-asm - make assembler functions use twofish_ctx instead of crypto_tfm
crypto: twofish - add 3-way parallel x86_64 assembler implemention
crypto: blowfish-x86_64 - fix ctr blocksize to 1
crypto: twofish-x86_64-3way - fix ctr blocksize to 1
crypto: testmgr - add blowfish test-vectors
crypto: testmgr - add twofish tests
Kim Phillips (1):
crypto: talitos - handle descriptor not found in error path
Mathias Krause (2):
crypto: sha1 - export sha1_update for reuse
crypto: sha1 - SSSE3 based SHA1 implementation for x86-64
Richard Weinberger (1):
crypto: Make hifn_795x build depend on !ARCH_DMA_ADDR_T_64BIT
Steffen Klassert (17):
crypto: Add a flag to identify crypto instances
crypto: Export crypto_remove_spawns
crypto: Export crypto_remove_final
crypto: Add userspace configuration API
crypto: Add a report function pointer to crypto_type
crypto: Add userspace report for larval type algorithms
crypto: Add userspace report for shash type algorithms
crypto: Add userspace report for ahash type algorithms
crypto: Add userspace report for blkcipher type algorithms
crypto: Add userspace report for ablkcipher type algorithms
crypto: Add userspace report for givcipher type algorithms
crypto: Add userspace report for aead type algorithms
crypto: Add userspace report for nivaead type algorithms
crypto: Add userspace report for pcompress type algorithms
crypto: Add userspace report for rng type algorithms
crypto: Add userspace report for cipher type algorithms
crypto: Add userspace report for compress type algorithms
Thomas Meyer (1):
crypto: n2 - Fix a get/put_cpu() imbalance
.../devicetree/bindings/crypto/picochip-spacc.txt | 23 +
arch/x86/crypto/Makefile | 12 +
arch/x86/crypto/aes_glue.c | 1 +
arch/x86/crypto/blowfish-x86_64-asm_64.S | 390 ++++++++++++++
arch/x86/crypto/blowfish_glue.c | 492 +++++++++++++++++
arch/x86/crypto/sha1_ssse3_asm.S | 558 ++++++++++++++++++++
arch/x86/crypto/sha1_ssse3_glue.c | 240 +++++++++
arch/x86/crypto/twofish-i586-asm_32.S | 10 +-
arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 316 +++++++++++
arch/x86/crypto/twofish-x86_64-asm_64.S | 6 +-
arch/x86/crypto/twofish_glue.c | 12 +-
arch/x86/crypto/twofish_glue_3way.c | 472 +++++++++++++++++
arch/x86/include/asm/cpufeature.h | 3 +
crypto/Kconfig | 63 +++
crypto/Makefile | 4 +-
crypto/ablkcipher.c | 48 ++
crypto/aead.c | 48 ++
crypto/ahash.c | 21 +
crypto/algapi.c | 12 +-
crypto/blkcipher.c | 25 +
crypto/{blowfish.c => blowfish_common.c} | 98 +----
crypto/blowfish_generic.c | 142 +++++
crypto/cryptd.c | 2 +-
crypto/crypto_user.c | 438 +++++++++++++++
crypto/internal.h | 3 +
crypto/pcompress.c | 18 +
crypto/rng.c | 20 +
crypto/sha1_generic.c | 9 +-
crypto/shash.c | 21 +
crypto/tcrypt.c | 10 +
crypto/testmgr.c | 30 +
crypto/testmgr.h | 398 ++++++++++++++-
crypto/wp512.c | 18 +-
drivers/crypto/Kconfig | 3 +-
drivers/crypto/hifn_795x.c | 6 +-
drivers/crypto/n2_core.c | 4 +-
drivers/crypto/padlock-aes.c | 4 +-
drivers/crypto/picoxcell_crypto.c | 121 ++---
drivers/crypto/talitos.c | 18 +-
include/crypto/algapi.h | 2 +
include/crypto/blowfish.h | 23 +
include/crypto/sha.h | 5 +
include/linux/crypto.h | 5 +
include/linux/cryptouser.h | 102 ++++
include/linux/netlink.h | 1 +
45 files changed, 4049 insertions(+), 208 deletions(-)
Thanks,
- --
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)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=PElH
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.2
2011-10-31 4:09 ` Crypto Update for 3.2 Herbert Xu
@ 2011-10-31 16:42 ` Randy Dunlap
2011-10-31 17:16 ` Linus Torvalds
2012-01-06 4:12 ` Crypto Update for 3.3 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Randy Dunlap @ 2011-10-31 16:42 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On 10/30/2011 09:09 PM, Herbert Xu wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi Linus:
>
> Here is the crypto update for 3.2:
>
> * User-space interface for algorithm selection/configuration
> * SSSE3 implementation of SHA1.
> * X86-64 assembly implementation of blowfish.
> * X86-64 assembly implementation of twofish.
> * Misc fixes.
>
>
> Please pull from
>
> git://github.com/herbertx/crypto.git
>
>
> The top commit object is
>
> commit ea8bdfcff17599e5d80f93e2ae194fbbab7f8d5e
> Author: Herbert Xu <herbert@gondor.apana.org.au>
> Date: Wed Oct 26 17:15:10 2011 +0200
>
> crypto: user - Add dependency on NET
> Herbert Xu (4):
> crypto: sha - Fix build error due to crypto_sha1_update
> crypto: cryptd - Use subsys_initcall to prevent races with aesni
> crypto: user - Initialise match in crypto_alg_match
> crypto: user - Add dependency on NET
Actually adds "select NET", a reverse dependency. :(
Linus was quite vocal about not allowing MD to select BLOCK.
See https://lkml.org/lkml/2011/8/10/527
and https://lkml.org/lkml/2011/8/10/533
To me this is very similar.
--
~Randy
*** Remember to use Documentation/SubmitChecklist when testing your code ***
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.2
2011-10-31 16:42 ` Randy Dunlap
@ 2011-10-31 17:16 ` Linus Torvalds
2011-11-01 3:48 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2011-10-31 17:16 UTC (permalink / raw)
To: Randy Dunlap
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Oct 31, 2011 at 9:42 AM, Randy Dunlap <rdunlap@xenotime.net> wrote:
>
> Actually adds "select NET", a reverse dependency. :(
>
> Linus was quite vocal about not allowing MD to select BLOCK.
> See https://lkml.org/lkml/2011/8/10/527
> and https://lkml.org/lkml/2011/8/10/533
>
> To me this is very similar.
I do agree.
"select" makes sense when it's a way for a user to not have to care
about some small helper thing that is really not obvious for a casual
user.
But darn it, if somebody has said "no networking", then some random
small feature shouldn't suddenly select it.
IOW, it's about "relative importance". We should use "select" when
some feature that should be user-visible selects some details. And we
should use "depends on" when there's a major subsystem that some small
detail depends on.
So classic and obvious uses where "select" is appropriate is when a
driver needs some helper library to work (eg "select FW_LOADER" or
"select CRC32").
And a classic and obvious case where "depends on" is the appropriate
choice is when it depends on a major subsystem ("depends on PCI" or
"depends on USB" or "depends on X86").
And I think "NET" definitely falls into that second category - exactly
the same way "BLOCK" fell into it. You don't "select" major subsystems
- if somebody turned off the subsystem, we turn off the stuff that
depends on it.
(Of course, in reality, pretty much nobody turns off NET, I suspect.
But if some embedded place really doesn't want it, then damn it, we
shouldn't ask about the odd crypto user interfaces, because they
really aren't major enough, and the embedded platform is clearly
trying very hard to run small).
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.2
2011-10-31 17:16 ` Linus Torvalds
@ 2011-11-01 3:48 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-11-01 3:48 UTC (permalink / raw)
To: Linus Torvalds
Cc: Randy Dunlap, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Mon, Oct 31, 2011 at 10:16:55AM -0700, Linus Torvalds wrote:
> On Mon, Oct 31, 2011 at 9:42 AM, Randy Dunlap <rdunlap@xenotime.net> wrote:
> >
> > Actually adds "select NET", a reverse dependency. :(
> >
> > Linus was quite vocal about not allowing MD to select BLOCK.
> > See https://lkml.org/lkml/2011/8/10/527
> > and https://lkml.org/lkml/2011/8/10/533
> >
> > To me this is very similar.
>
> I do agree.
OK, I've turned it into a depends_on.
Here is the crypto update for 3.2:
* User-space interface for algorithm selection/configuration
* SSSE3 implementation of SHA1.
* X86-64 assembly implementation of blowfish.
* X86-64 assembly implementation of twofish.
* Misc fixes.
Please pull from
git://github.com/herbertx/crypto.git
The top commit object is
commit 5db017aa2809c49ca0a43b0f3ed1267e6be60883
Author: Herbert Xu <herbert@gondor.apana.org.au>
Date: Tue Nov 1 12:12:43 2011 +1100
crypto: user - Depend on NET instead of selecting it
Alexey Dobriyan (1):
crypto: whirlpool - count rounds from 0
H Hartley Sweeten (1):
crypto: aes-x86 - quiet sparse noise about symbol not declared
Herbert Xu (5):
crypto: sha - Fix build error due to crypto_sha1_update
crypto: cryptd - Use subsys_initcall to prevent races with aesni
crypto: user - Initialise match in crypto_alg_match
crypto: user - Add dependency on NET
crypto: user - Depend on NET instead of selecting it
Jamie Iles (5):
crypto: picoxcell - convert to platform ID table
crypto: picoxcell - add connection ID to the clock name
crypto: picoxcell - support for device tree matching
crypto: picoxcell - fix possible invalid pointer dereference
crypto: picoxcell - add dependency on HAVE_CLK
Jonathan Nieder (1):
crypto: padlock-aes - Make module loading even quieter when hardware is missing
Jussi Kivilinna (13):
crypto: blowfish - split generic and common c code
crypto: blowfish - rename C-version to blowfish_generic
crypto: tcrypt - add ctr(blowfish) speed test
crypto: blowfish - add x86_64 assembly implementation
crypto: blowfish-x86_64 - improve x86_64 blowfish 4-way performance
crypto: blowfish-x86_64 - add credits
crypto: tcrypt - add ctr(twofish) speed test
crypto: twofish-x86-asm - make assembler functions use twofish_ctx instead of crypto_tfm
crypto: twofish - add 3-way parallel x86_64 assembler implemention
crypto: blowfish-x86_64 - fix ctr blocksize to 1
crypto: twofish-x86_64-3way - fix ctr blocksize to 1
crypto: testmgr - add blowfish test-vectors
crypto: testmgr - add twofish tests
Kim Phillips (1):
crypto: talitos - handle descriptor not found in error path
Mathias Krause (2):
crypto: sha1 - export sha1_update for reuse
crypto: sha1 - SSSE3 based SHA1 implementation for x86-64
Richard Weinberger (1):
crypto: Make hifn_795x build depend on !ARCH_DMA_ADDR_T_64BIT
Steffen Klassert (17):
crypto: Add a flag to identify crypto instances
crypto: Export crypto_remove_spawns
crypto: Export crypto_remove_final
crypto: Add userspace configuration API
crypto: Add a report function pointer to crypto_type
crypto: Add userspace report for larval type algorithms
crypto: Add userspace report for shash type algorithms
crypto: Add userspace report for ahash type algorithms
crypto: Add userspace report for blkcipher type algorithms
crypto: Add userspace report for ablkcipher type algorithms
crypto: Add userspace report for givcipher type algorithms
crypto: Add userspace report for aead type algorithms
crypto: Add userspace report for nivaead type algorithms
crypto: Add userspace report for pcompress type algorithms
crypto: Add userspace report for rng type algorithms
crypto: Add userspace report for cipher type algorithms
crypto: Add userspace report for compress type algorithms
Thomas Meyer (1):
crypto: n2 - Fix a get/put_cpu() imbalance
.../devicetree/bindings/crypto/picochip-spacc.txt | 23 +
arch/x86/crypto/Makefile | 12 +
arch/x86/crypto/aes_glue.c | 1 +
arch/x86/crypto/blowfish-x86_64-asm_64.S | 390 ++++++++++++++
arch/x86/crypto/blowfish_glue.c | 492 +++++++++++++++++
arch/x86/crypto/sha1_ssse3_asm.S | 558 ++++++++++++++++++++
arch/x86/crypto/sha1_ssse3_glue.c | 240 +++++++++
arch/x86/crypto/twofish-i586-asm_32.S | 10 +-
arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 316 +++++++++++
arch/x86/crypto/twofish-x86_64-asm_64.S | 6 +-
arch/x86/crypto/twofish_glue.c | 12 +-
arch/x86/crypto/twofish_glue_3way.c | 472 +++++++++++++++++
arch/x86/include/asm/cpufeature.h | 3 +
crypto/Kconfig | 63 +++
crypto/Makefile | 4 +-
crypto/ablkcipher.c | 48 ++
crypto/aead.c | 48 ++
crypto/ahash.c | 21 +
crypto/algapi.c | 12 +-
crypto/blkcipher.c | 25 +
crypto/{blowfish.c => blowfish_common.c} | 98 +----
crypto/blowfish_generic.c | 142 +++++
crypto/cryptd.c | 2 +-
crypto/crypto_user.c | 438 +++++++++++++++
crypto/internal.h | 3 +
crypto/pcompress.c | 18 +
crypto/rng.c | 20 +
crypto/sha1_generic.c | 9 +-
crypto/shash.c | 21 +
crypto/tcrypt.c | 10 +
crypto/testmgr.c | 30 +
crypto/testmgr.h | 398 ++++++++++++++-
crypto/wp512.c | 18 +-
drivers/crypto/Kconfig | 3 +-
drivers/crypto/hifn_795x.c | 6 +-
drivers/crypto/n2_core.c | 4 +-
drivers/crypto/padlock-aes.c | 4 +-
drivers/crypto/picoxcell_crypto.c | 121 ++---
drivers/crypto/talitos.c | 18 +-
include/crypto/algapi.h | 2 +
include/crypto/blowfish.h | 23 +
include/crypto/sha.h | 5 +
include/linux/crypto.h | 5 +
include/linux/cryptouser.h | 102 ++++
include/linux/netlink.h | 1 +
45 files changed, 4049 insertions(+), 208 deletions(-)
Thanks,
- - --
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)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=GwqI
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.2
2011-10-21 8:22 ` Crypto Fixes for 3.1 Herbert Xu
2011-10-21 9:41 ` David Rientjes
@ 2011-11-10 23:00 ` Herbert Xu
2011-11-26 2:34 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2011-11-10 23:00 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Linus:
This push fixes a build problem with NET disabled and potential
lock mismatch in the new configuration interface.
Please pull from
git://github.com/herbertx/crypto.git
The top commit object is
commit 3acc84739dd5d746840f881ad4d60bd2a428f1dd
Author: Herbert Xu <herbert@gondor.apana.org.au>
Date: Thu Nov 3 23:46:07 2011 +1100
crypto: algapi - Fix build problem with NET disabled
The report functions use NLA_PUT so we need to ensure that NET
is enabled.
Reported-by: Luis Henriques <henrix@camandro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Herbert Xu (1):
crypto: algapi - Fix build problem with NET disabled
Jonathan Corbet (1):
crypto: user - Fix rwsem leak in crypto_user
crypto/ablkcipher.c | 14 ++++++++++++++
crypto/aead.c | 14 ++++++++++++++
crypto/ahash.c | 7 +++++++
crypto/blkcipher.c | 7 +++++++
crypto/crypto_user.c | 3 ---
crypto/pcompress.c | 7 +++++++
crypto/rng.c | 7 +++++++
crypto/shash.c | 7 +++++++
8 files changed, 63 insertions(+), 3 deletions(-)
Thanks,
- --
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)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=MC9A
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.2
2011-11-10 23:00 ` Crypto Fixes for 3.2 Herbert Xu
@ 2011-11-26 2:34 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2011-11-26 2:34 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Linus:
This push fixes a problem with mv_cesa the driver where it makes
incorrect hashes on input chunks greater than 1920 bytes.
Please pull from
git://github.com/herbertx/crypto.git
The top commit object is
commit 274252862f386b7868f35bf5ceaa5391a8ccfdf3
Author: Phil Sutter <phil.sutter@viprinet.com>
Date: Wed Nov 16 18:28:01 2011 +0100
crypto: mv_cesa - fix hashing of chunks > 1920 bytes
Phil Sutter (1):
crypto: mv_cesa - fix hashing of chunks > 1920 bytes
drivers/crypto/mv_cesa.c | 12 +++++++-----
1 files changed, 7 insertions(+), 5 deletions(-)
Thanks,
- --
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)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=iYTU
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.3
2011-10-31 4:09 ` Crypto Update for 3.2 Herbert Xu
2011-10-31 16:42 ` Randy Dunlap
@ 2012-01-06 4:12 ` Herbert Xu
2012-01-11 22:19 ` Herbert Xu
` (2 more replies)
1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2012-01-06 4:12 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.3:
* New test vectors (serpent, xts-twofish).
* Speed test for asynchronous ciphers.
* SSE2 assembly implementation of serpent.
* Support for LRW and XTS in X86-64 assembly implementation of twofish.
* More MD5 combos for caam.
* Channel remap on talitos for better affinity.
* Direct support for HMAC on talitos.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Axel Lin (2):
char: hw_random: convert drivers/char/hw_random/* to use module_platform_driver()
crypto: convert drivers/crypto/* to use module_platform_driver()
Jamie Iles (1):
crypto: picoxcell - fix boolean and / or confusion
Jarod Wilson (1):
crypto: ansi_cprng - enforce key != seed in fips mode
Jussi Kivilinna (36):
crypto: testmgr - add new serpent test vectors
crypto: tcrypt - add test_acipher_speed
crypto: tcrypt - add serpent speed tests
crypto: serpent - export common functions for x86_64/i386-sse2 assembler implementations
crypto: serpent - rename module from serpent to serpent_generic
crypto: lrw - fix memleak
crypto: lrw - use blocksize constant
crypto: lrw - split gf128mul table initialization from setkey
crypto: lrw - add interface for parallelized cipher implementions
crypto: testmgr - add lrw(serpent) test vectors
crypto: tcrypt - add lrw(serpent) tests
crypto: testmgr - add lrw(twofish) test vectors
crypto: tcrypt - add lrw(twofish) tests
crypto: twofish-x86_64-3way - add lrw support
crypto: xts - use blocksize constant
crypto: xts: add interface for parallelized cipher implementations
crypto: testmgr - add xts(serpent) test vectors
crypto: tcrypt - add xts(serpent) tests
crypto: testmgr - add xts(twofish) test vectors
crypto: tcrypt - add xts(twofish) tests
crypto: twofish-x86_64-3way - add xts support
crypto: serpent - add 8-way parallel x86_64/SSE2 assembler implementation
crypto: serpent - add 4-way parallel i586/SSE2 assembler implementation
crypto: serpent-sse2 - add lrw support
crypto: serpent-sse2 - add xts support
crypto: serpent-sse2 - clear CRYPTO_TFM_REQ_MAY_SLEEP in lrw and xts modes
crypto: serpent - cleanup checkpatch errors and warnings
crypto: serpent - rename serpent.c to serpent_generic.c
crypto: serpent-sse2 - should select CRYPTO_CRYPTD
crypto: lrw - remove dependency on EXPERIMENTAL
crypto: xts - remove dependency on EXPERIMENTAL
crypto: twofish-x86_64-3way - select LRW and XTS
crypto: twofish-x86_64-3way - remove unneeded LRW/XTS #ifdefs
crypto: serpent-sse2 - select LRW and XTS
crypto: serpent-sse2 - remove unneeded LRW/XTS #ifdefs
crypto: gf128mul - remove leftover "(EXPERIMENTAL)" in Kconfig
Kim Phillips (11):
crypto: talitos - be less noisy on startup
crypto: talitos - prepare driver for channel remap support
crypto: talitos - support for channel remap and 2nd IRQ
crypto: caam - add support for MD5 algorithm variants
crypto: talitos - fix bad kfree
crypto: talitos - remove NO_IRQ references
crypto: talitos - convert talitos_error to struct device
crypto: caam - desc.h - convert spaces to tabs
crypto: caam - more desc.h cleanups
crypto: caam - fix polarity of "propagate error" logic
crypto: caam - remove DECO access initialization code
Lee Nipper (1):
crypto: talitos - add hmac algorithms
Steffen Klassert (1):
crypto: Unlink and free instances when deleted
Valdis.Kletnieks@vt.edu (1):
crypto: fix typo in crypto/Kconfig
arch/x86/crypto/Makefile | 4 +
arch/x86/crypto/serpent-sse2-i586-asm_32.S | 638 ++++++
arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 761 +++++++
arch/x86/crypto/serpent_sse2_glue.c | 1070 ++++++++++
arch/x86/crypto/twofish_glue_3way.c | 218 ++
arch/x86/include/asm/serpent.h | 63 +
crypto/Kconfig | 52 +-
crypto/Makefile | 2 +-
crypto/algapi.c | 29 +
crypto/ansi_cprng.c | 8 +
crypto/crypto_user.c | 2 +-
crypto/lrw.c | 156 ++-
crypto/serpent.c | 587 ------
crypto/serpent_generic.c | 684 +++++++
crypto/tcrypt.c | 310 +++
crypto/tcrypt.h | 2 +
crypto/testmgr.c | 150 ++
crypto/testmgr.h | 2759 +++++++++++++++++++++++++-
crypto/twofish_common.c | 13 +-
crypto/xts.c | 79 +-
drivers/char/hw_random/atmel-rng.c | 12 +-
drivers/char/hw_random/n2-drv.c | 13 +-
drivers/char/hw_random/octeon-rng.c | 13 +-
drivers/char/hw_random/pasemi-rng.c | 12 +-
drivers/char/hw_random/picoxcell-rng.c | 12 +-
drivers/char/hw_random/ppc4xx-rng.c | 12 +-
drivers/char/hw_random/timeriomem-rng.c | 13 +-
drivers/crypto/amcc/crypto4xx_core.c | 13 +-
drivers/crypto/caam/caamalg.c | 67 +-
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 26 +-
drivers/crypto/caam/desc.h | 2265 +++++++++++-----------
drivers/crypto/caam/desc_constr.h | 7 +-
drivers/crypto/caam/regs.h | 1 -
drivers/crypto/mv_cesa.c | 12 +-
drivers/crypto/picoxcell_crypto.c | 16 +-
drivers/crypto/s5p-sss.c | 13 +-
drivers/crypto/talitos.c | 493 ++++-
drivers/crypto/talitos.h | 45 +-
include/crypto/algapi.h | 1 +
include/crypto/lrw.h | 43 +
include/crypto/serpent.h | 27 +
include/crypto/twofish.h | 2 +
include/crypto/xts.h | 27 +
44 files changed, 8684 insertions(+), 2049 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.3
2012-01-06 4:12 ` Crypto Update for 3.3 Herbert Xu
@ 2012-01-11 22:19 ` Herbert Xu
2012-03-20 3:27 ` Herbert Xu
2012-10-04 9:53 ` Crypto Update for 3.7 Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-01-11 22:19 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This is a resend of the crypto update for 3.3:
* New test vectors (serpent, xts-twofish).
* Speed test for asynchronous ciphers.
* SSE2 assembly implementation of serpent.
* Support for LRW and XTS in X86-64 assembly implementation of twofish.
* More MD5 combos for caam.
* Channel remap on talitos for better affinity.
* Direct support for HMAC on talitos.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Axel Lin (2):
char: hw_random: convert drivers/char/hw_random/* to use module_platform_driver()
crypto: convert drivers/crypto/* to use module_platform_driver()
Jamie Iles (1):
crypto: picoxcell - fix boolean and / or confusion
Jarod Wilson (1):
crypto: ansi_cprng - enforce key != seed in fips mode
Jussi Kivilinna (36):
crypto: testmgr - add new serpent test vectors
crypto: tcrypt - add test_acipher_speed
crypto: tcrypt - add serpent speed tests
crypto: serpent - export common functions for x86_64/i386-sse2 assembler implementations
crypto: serpent - rename module from serpent to serpent_generic
crypto: lrw - fix memleak
crypto: lrw - use blocksize constant
crypto: lrw - split gf128mul table initialization from setkey
crypto: lrw - add interface for parallelized cipher implementions
crypto: testmgr - add lrw(serpent) test vectors
crypto: tcrypt - add lrw(serpent) tests
crypto: testmgr - add lrw(twofish) test vectors
crypto: tcrypt - add lrw(twofish) tests
crypto: twofish-x86_64-3way - add lrw support
crypto: xts - use blocksize constant
crypto: xts: add interface for parallelized cipher implementations
crypto: testmgr - add xts(serpent) test vectors
crypto: tcrypt - add xts(serpent) tests
crypto: testmgr - add xts(twofish) test vectors
crypto: tcrypt - add xts(twofish) tests
crypto: twofish-x86_64-3way - add xts support
crypto: serpent - add 8-way parallel x86_64/SSE2 assembler implementation
crypto: serpent - add 4-way parallel i586/SSE2 assembler implementation
crypto: serpent-sse2 - add lrw support
crypto: serpent-sse2 - add xts support
crypto: serpent-sse2 - clear CRYPTO_TFM_REQ_MAY_SLEEP in lrw and xts modes
crypto: serpent - cleanup checkpatch errors and warnings
crypto: serpent - rename serpent.c to serpent_generic.c
crypto: serpent-sse2 - should select CRYPTO_CRYPTD
crypto: lrw - remove dependency on EXPERIMENTAL
crypto: xts - remove dependency on EXPERIMENTAL
crypto: twofish-x86_64-3way - select LRW and XTS
crypto: twofish-x86_64-3way - remove unneeded LRW/XTS #ifdefs
crypto: serpent-sse2 - select LRW and XTS
crypto: serpent-sse2 - remove unneeded LRW/XTS #ifdefs
crypto: gf128mul - remove leftover "(EXPERIMENTAL)" in Kconfig
Kim Phillips (11):
crypto: talitos - be less noisy on startup
crypto: talitos - prepare driver for channel remap support
crypto: talitos - support for channel remap and 2nd IRQ
crypto: caam - add support for MD5 algorithm variants
crypto: talitos - fix bad kfree
crypto: talitos - remove NO_IRQ references
crypto: talitos - convert talitos_error to struct device
crypto: caam - desc.h - convert spaces to tabs
crypto: caam - more desc.h cleanups
crypto: caam - fix polarity of "propagate error" logic
crypto: caam - remove DECO access initialization code
Lee Nipper (1):
crypto: talitos - add hmac algorithms
Steffen Klassert (1):
crypto: Unlink and free instances when deleted
Valdis.Kletnieks@vt.edu (1):
crypto: fix typo in crypto/Kconfig
arch/x86/crypto/Makefile | 4 +
arch/x86/crypto/serpent-sse2-i586-asm_32.S | 638 ++++++
arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 761 +++++++
arch/x86/crypto/serpent_sse2_glue.c | 1070 ++++++++++
arch/x86/crypto/twofish_glue_3way.c | 218 ++
arch/x86/include/asm/serpent.h | 63 +
crypto/Kconfig | 52 +-
crypto/Makefile | 2 +-
crypto/algapi.c | 29 +
crypto/ansi_cprng.c | 8 +
crypto/crypto_user.c | 2 +-
crypto/lrw.c | 156 ++-
crypto/serpent.c | 587 ------
crypto/serpent_generic.c | 684 +++++++
crypto/tcrypt.c | 310 +++
crypto/tcrypt.h | 2 +
crypto/testmgr.c | 150 ++
crypto/testmgr.h | 2759 +++++++++++++++++++++++++-
crypto/twofish_common.c | 13 +-
crypto/xts.c | 79 +-
drivers/char/hw_random/atmel-rng.c | 12 +-
drivers/char/hw_random/n2-drv.c | 13 +-
drivers/char/hw_random/octeon-rng.c | 13 +-
drivers/char/hw_random/pasemi-rng.c | 12 +-
drivers/char/hw_random/picoxcell-rng.c | 12 +-
drivers/char/hw_random/ppc4xx-rng.c | 12 +-
drivers/char/hw_random/timeriomem-rng.c | 13 +-
drivers/crypto/amcc/crypto4xx_core.c | 13 +-
drivers/crypto/caam/caamalg.c | 67 +-
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 26 +-
drivers/crypto/caam/desc.h | 2265 +++++++++++-----------
drivers/crypto/caam/desc_constr.h | 7 +-
drivers/crypto/caam/regs.h | 1 -
drivers/crypto/mv_cesa.c | 12 +-
drivers/crypto/picoxcell_crypto.c | 16 +-
drivers/crypto/s5p-sss.c | 13 +-
drivers/crypto/talitos.c | 493 ++++-
drivers/crypto/talitos.h | 45 +-
include/crypto/algapi.h | 1 +
include/crypto/lrw.h | 43 +
include/crypto/serpent.h | 27 +
include/crypto/twofish.h | 2 +
include/crypto/xts.h | 27 +
44 files changed, 8684 insertions(+), 2049 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.3
2011-06-29 23:51 ` Crypto Fixes for 3.0 Herbert Xu
2011-10-21 8:22 ` Crypto Fixes for 3.1 Herbert Xu
@ 2012-01-26 2:43 ` Herbert Xu
2012-01-26 3:35 ` Linus Torvalds
` (3 more replies)
1 sibling, 4 replies; 246+ messages in thread
From: Herbert Xu @ 2012-01-26 2:43 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a race condition in sha512 that affects users
who use it in process context and softirq context concurrently,
in particular, this affects IPsec. The result of the race is
the production of incorrect hashes, which for IPsec leands to
loss of connectivity.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexey Dobriyan (2):
crypto: sha512 - make it work, undo percpu message schedule
crypto: sha512 - reduce stack usage to safe number
crypto/sha512_generic.c | 62 +++++++++++++++++++++++++---------------------
1 files changed, 34 insertions(+), 28 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.3
2012-01-26 2:43 ` Crypto Fixes for 3.3 Herbert Xu
@ 2012-01-26 3:35 ` Linus Torvalds
2012-01-26 4:07 ` Herbert Xu
2012-02-14 3:35 ` Herbert Xu
` (2 subsequent siblings)
3 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2012-01-26 3:35 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Jan 25, 2012 at 6:43 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes a race condition in sha512 that affects users
> who use it in process context and softirq context concurrently,
> in particular, this affects IPsec. The result of the race is
> the production of incorrect hashes, which for IPsec leands to
> loss of connectivity.
Ugh. This once more has the crazy signed integer modulus operator,
which can be quite expensive depending on whether the compiler can
tell whether it is always positive or not.
Also, that modulus is exposed everywhere.
In git, the sha1 implementation (which has many of the same issues) does this:
/* This "rolls" over the 512-bit array */
#define W(x) (array[(x)&15])
which means that the modulus exists in just one place (and is the
correct binary 'and', not the possibly-expensive division).
We also avoid the problem with absolutely horrible gcc register usage
by having an arch-specific "accessor macro":
/*
* If you have 32 registers or more, the compiler can (and should)
* try to change the array[] accesses into registers. However, on
* machines with less than ~25 registers, that won't really work,
* and at least gcc will make an unholy mess of it.
*
* So to avoid that mess which just slows things down, we force
* the stores to memory to actually happen (we might be better off
* with a 'W(t)=(val);asm("":"+m" (W(t))' there instead, as
* suggested by Artur Skawina - that will also make gcc unable to
* try to do the silly "optimize away loads" part because it won't
* see what the value will be).
*
* Ben Herrenschmidt reports that on PPC, the C version comes close
* to the optimized asm with this (ie on PPC you don't want that
* 'volatile', since there are lots of registers).
*
* On ARM we get the best code generation by forcing a full memory barrier
* between each SHA_ROUND, otherwise gcc happily get wild with spilling and
* the stack frame size simply explode and performance goes down the drain.
*/
#if defined(__i386__) || defined(__x86_64__)
#define setW(x, val) (*(volatile unsigned int *)&W(x) = (val))
#elif defined(__GNUC__) && defined(__arm__)
#define setW(x, val) do { W(x) = (val); __asm__("":::"memory"); } while (0)
#else
#define setW(x, val) (W(x) = (val))
#endif
which is not pretty, but as you guys found out, the alternative can be
much worse (ie totally crazy gcc register spilling)
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.3
2012-01-26 3:35 ` Linus Torvalds
@ 2012-01-26 4:07 ` Herbert Xu
2012-01-26 4:16 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-01-26 4:07 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Jan 25, 2012 at 07:35:19PM -0800, Linus Torvalds wrote:
>
> Ugh. This once more has the crazy signed integer modulus operator,
> which can be quite expensive depending on whether the compiler can
> tell whether it is always positive or not.
Oops, I had incorrectly applied the first patch in the thread.
I've fixed it in the tree now.
> We also avoid the problem with absolutely horrible gcc register usage
> by having an arch-specific "accessor macro":
We could certainly do something like that. Although I'd be
more comfortable with pushing this through linux-next, OK?
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexey Dobriyan (2):
crypto: sha512 - make it work, undo percpu message schedule
crypto: sha512 - reduce stack usage to safe number
Herbert Xu (1):
crypto: sha512 - Use binary and instead of modulus
crypto/sha512_generic.c | 62 +++++++++++++++++++++++++---------------------
1 files changed, 34 insertions(+), 28 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.3
2012-01-26 4:07 ` Herbert Xu
@ 2012-01-26 4:16 ` Linus Torvalds
0 siblings, 0 replies; 246+ messages in thread
From: Linus Torvalds @ 2012-01-26 4:16 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Jan 25, 2012 at 8:07 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Oops, I had incorrectly applied the first patch in the thread.
>
> I've fixed it in the tree now.
Oh well, I already pulled your tree. I just wanted to voice a few
comments on it.
>> We also avoid the problem with absolutely horrible gcc register usage
>> by having an arch-specific "accessor macro":
>
> We could certainly do something like that. Although I'd be
> more comfortable with pushing this through linux-next, OK?
Absolutely.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.3
2012-01-26 2:43 ` Crypto Fixes for 3.3 Herbert Xu
2012-01-26 3:35 ` Linus Torvalds
@ 2012-02-14 3:35 ` Herbert Xu
2012-02-16 5:32 ` Herbert Xu
2012-03-22 1:20 ` Crypto Fixes for 3.4 Herbert Xu
2012-08-23 8:32 ` Crypto Fixes for 3.6 Herbert Xu
3 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-02-14 3:35 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push updates the sha512 fix so that it doesn't cause excessive
stack usage on i386. This is done by reverting to the original
code, and avoiding the W duplication by moving its initialisation
into the loop.
As the underlying code is in fact the one that we have used for years,
I'm pushing this now instead of postponing to the next cycle.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (2):
crypto: sha512 - Use binary and instead of modulus
crypto: sha512 - Avoid stack bloat on i386
crypto/sha512_generic.c | 70 ++++++++++++++++++++++-------------------------
1 files changed, 33 insertions(+), 37 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.3
2012-02-14 3:35 ` Herbert Xu
@ 2012-02-16 5:32 ` Herbert Xu
2012-03-03 5:36 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-02-16 5:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Dave reported that even with the latest stack bloat reduction
fix for i386, the stack usage of sha512 still exceeded 1024 bytes
on sparc32. However, with Alexey's ror64 patch applied, the stack
usage goes back down to a more respectable 824.
So I've moved the ror64 patch from cryptodev to crypto and I'm
pushing it to you now.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexey Dobriyan (1):
crypto: sha512 - use standard ror64()
crypto/sha512_generic.c | 13 ++++---------
include/linux/bitops.h | 20 ++++++++++++++++++++
2 files changed, 24 insertions(+), 9 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.3
2012-02-16 5:32 ` Herbert Xu
@ 2012-03-03 5:36 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-03-03 5:36 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in mv_cesa that causes all hash operations
that supply data on a final operation to fail.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Phil Sutter (1):
crypto: mv_cesa - fix final callback not ignoring input data
drivers/crypto/mv_cesa.c | 1 +
1 files changed, 1 insertions(+), 0 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.3
2012-01-06 4:12 ` Crypto Update for 3.3 Herbert Xu
2012-01-11 22:19 ` Herbert Xu
@ 2012-03-20 3:27 ` Herbert Xu
2012-05-23 1:35 ` Crypto Update for 3.5 Herbert Xu
2012-10-04 9:53 ` Crypto Update for 3.7 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-03-20 3:27 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.4:
* sha512 bug fixes (already in your tree).
* SHA224/SHA384 AEAD support in caam.
* X86-64 optimised version of Camellia.
* Tegra AES support.
* Bulk algorithm registration interface to make driver registration easier.
* padata race fixes.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexey Dobriyan (4):
crypto: sha512 - make it work, undo percpu message schedule
crypto: sha512 - reduce stack usage to safe number
crypto: sha512 - use standard ror64()
crypto: sha512 - use standard ror64()
Hemant Agrawal (1):
crypto: caam - add sha224 and sha384 variants to existing AEAD algorithms
Henning Heinold (1):
arm: tegra: export tegra_chip_uid
Herbert Xu (3):
crypto: sha512 - Use binary and instead of modulus
crypto: sha512 - Avoid stack bloat on i386
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Jesper Juhl (3):
crypto: In crypto_add_alg(), 'exact' wants to be initialized to 0
crypto: twofish-x86 - Remove dead code from twofish_glue_3way.c::init()
crypto: serpent-sse2 - remove dead code from serpent_sse2_glue.c::serpent_sse2_init()
Julia Lawall (2):
hwrng: tx4939 - use devm_request_and_ioremap
crypto: ixp4xx - convert GFP_KERNEL to GFP_ATOMIC
Jussi Kivilinna (16):
crypto: twofish-x86_64-3way - blacklist pentium4 and atom
crypto: blowfish-x86_64 - blacklist Pentium 4
crypto: serpent-sse2 - change transpose_4x4 to only use integer instructions
crypto: serpent-sse2 - use crypto_[un]register_algs
crypto: twofish-x86_64-3way - use crypto_[un]register_algs
crypto: blowfish-x86_64 - use crypto_[un]register_algs
crypto: serpent-sse2 - combine ablk_*_init functions
crypto: blowfish-x86_64 - set alignmask to zero
crypto: twofish-x86_64/i586 - set alignmask to zero
crypto: camellia - simplify key setup and CAMELLIA_ROUNDSM macro
crypto: testmgr - add more camellia test vectors
crypto: tcrypt - add more camellia tests
crypto: camellia - rename camellia module to camellia_generic
crypto: camellia - fix checkpatch warnings
crypto: camellia - rename camellia.c to camellia_generic.c
crypto: camellia - add assembler implementation for x86_64
Kim Phillips (2):
crypto: caam - be less noisy on startup
crypto: caam - fix gcc 4.6 warning
Mark Brown (1):
crypto: Add bulk algorithm registration interface
Nikos Mavrogiannopoulos (1):
crypto: Add CRYPTO_ALG_KERN_DRIVER_ONLY flag
Steffen Klassert (2):
padata: Fix race in the serialization path
padata: Fix race on sequence number wrap
Varun Wadekar (1):
crypto: driver for Tegra AES hardware
arch/arm/mach-tegra/fuse.c | 2 +
arch/x86/crypto/Makefile | 2 +
arch/x86/crypto/blowfish_glue.c | 191 ++--
arch/x86/crypto/camellia-x86_64-asm_64.S | 520 +++++++
arch/x86/crypto/camellia_glue.c | 1952 ++++++++++++++++++++++++++
arch/x86/crypto/serpent-sse2-i586-asm_32.S | 29 +-
arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 29 +-
arch/x86/crypto/serpent_sse2_glue.c | 394 ++----
arch/x86/crypto/twofish_glue.c | 2 +-
arch/x86/crypto/twofish_glue_3way.c | 265 ++--
crypto/Kconfig | 18 +
crypto/Makefile | 2 +-
crypto/algapi.c | 35 +
crypto/camellia.c | 1116 ---------------
crypto/camellia_generic.c | 1102 +++++++++++++++
crypto/crypto_user.c | 2 +-
crypto/sha512_generic.c | 59 +-
crypto/tcrypt.c | 12 +
crypto/testmgr.c | 45 +
crypto/testmgr.h | 1383 ++++++++++++++++++-
drivers/char/hw_random/tx4939-rng.c | 5 +-
drivers/crypto/Kconfig | 11 +
drivers/crypto/Makefile | 1 +
drivers/crypto/caam/caamalg.c | 126 ++-
drivers/crypto/caam/ctrl.c | 2 +-
drivers/crypto/geode-aes.c | 6 +-
drivers/crypto/hifn_795x.c | 3 +-
drivers/crypto/ixp4xx_crypto.c | 4 +-
drivers/crypto/mv_cesa.c | 12 +-
drivers/crypto/n2_core.c | 7 +-
drivers/crypto/omap-aes.c | 8 +-
drivers/crypto/omap-sham.c | 4 +
drivers/crypto/picoxcell_crypto.c | 46 +-
drivers/crypto/s5p-sss.c | 6 +-
drivers/crypto/talitos.c | 1 +
drivers/crypto/tegra-aes.c | 1096 +++++++++++++++
drivers/crypto/tegra-aes.h | 103 ++
include/linux/bitops.h | 20 +
include/linux/crypto.h | 7 +
include/linux/padata.h | 6 +-
kernel/padata.c | 44 +-
41 files changed, 6936 insertions(+), 1742 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.4
2012-01-26 2:43 ` Crypto Fixes for 3.3 Herbert Xu
2012-01-26 3:35 ` Linus Torvalds
2012-02-14 3:35 ` Herbert Xu
@ 2012-03-22 1:20 ` Herbert Xu
2012-04-02 9:45 ` Herbert Xu
2012-06-11 13:00 ` Crypto Fixes for 3.5 Herbert Xu
2012-08-23 8:32 ` Crypto Fixes for 3.6 Herbert Xu
3 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2012-03-22 1:20 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem where two crypto modules both
try to export the same symbols (which shouldn't have been exported
in the first place).
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Jussi Kivilinna (2):
crypto: camellia-x86_64 - module init/exit functions should be static
crypto: twofish-x86_64-3way - module init/exit functions should be static
arch/x86/crypto/camellia_glue.c | 4 ++--
arch/x86/crypto/twofish_glue_3way.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.4
2012-03-22 1:20 ` Crypto Fixes for 3.4 Herbert Xu
@ 2012-04-02 9:45 ` Herbert Xu
2012-04-20 14:16 ` Herbert Xu
2012-06-11 13:00 ` Crypto Fixes for 3.5 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-04-02 9:45 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of issues:
* Fix for CPU hotplug hang in padata.
* Avoid using cpu_active inappropriately in pcrypt and padata.
* Fix for user-space algorithm lookup hang with IV generators.
* Fix for netlink dump of algorithms where stuff went missing due
to incorrect calculation of message size.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Steffen Klassert (6):
padata: Add a reference to the api documentation
padata: Use the online cpumask as the default
padata: Fix cpu hotplug
crypto: pcrypt - Use the online cpumask as the default
crypto: user - Fix lookup of algorithms with IV generator
crypto: user - Fix size of netlink dump message
crypto/ablkcipher.c | 4 +-
crypto/aead.c | 4 +-
crypto/crypto_user.c | 80 +++++++++++++++++++++++++++++++++++-
crypto/pcrypt.c | 8 ++--
include/crypto/internal/aead.h | 2 +
include/crypto/internal/skcipher.h | 2 +
include/linux/cryptouser.h | 3 +
kernel/padata.c | 13 ++++--
8 files changed, 103 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.4
2012-04-02 9:45 ` Herbert Xu
@ 2012-04-20 14:16 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-04-20 14:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of issues:
* Locking fix for talitos driver.
* Fix 64-bit counter overflow in SHA-512.
* Build fix for ixp4xx.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Horia Geanta (1):
crypto: talitos - properly lock access to global talitos registers
Kent Yoder (1):
crypto: sha512 - Fix byte counter overflow in SHA-512
Michał Wróbel (1):
crypto: ixp4xx - include fix
crypto/sha512_generic.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 1 +
drivers/crypto/talitos.c | 20 +++++++++++++++++---
3 files changed, 19 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.5
2012-03-20 3:27 ` Herbert Xu
@ 2012-05-23 1:35 ` Herbert Xu
2012-05-23 23:06 ` Linus Torvalds
2012-07-25 8:41 ` Crypto Update for 3.6 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2012-05-23 1:35 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.5:
* New cipher/hash driver for ARM ux500.
* Code clean-up for aesni-intel.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andreas Westin (5):
crypto: ux500 - Add driver for CRYP hardware
crypto: ux500 - Add driver for HASH hardware
mach-ux500: crypto - core support for CRYP/HASH module.
crypto: ux500 - Update DMA handling for 3.4
crypto: ux500 - Cleanup hardware identification
Borislav Petkov (1):
crypto, xor: Sanitize checksumming function selection output
Julia Lawall (2):
crypto: crypto4xx - move up err_request_irq label
hwrng: omap - use devm_request_and_ioremap
Jussi Kivilinna (2):
crypto: aesni-intel - use crypto_[un]register_algs
crypto: aesni-intel - move more common code to ablk_init_common
Nicolas Ferre (1):
hwrng: Kconfig - modify default state for atmel-rng driver
Shengzhou Liu (1):
crypto: caam - add backward compatible string sec4.0
arch/arm/mach-ux500/board-mop500.c | 48
arch/arm/mach-ux500/clock.c | 18
arch/arm/mach-ux500/devices-common.h | 54
arch/arm/mach-ux500/devices-db8500.c | 3
arch/arm/mach-ux500/devices-db8500.h | 4
arch/arm/mach-ux500/include/mach/crypto-ux500.h | 22
arch/arm/mach-ux500/include/mach/devices.h | 3
arch/arm/mach-ux500/include/mach/hardware.h | 3
arch/x86/crypto/aesni-intel_glue.c | 827 +++------
crypto/xor.c | 5
drivers/char/hw_random/Kconfig | 2
drivers/char/hw_random/omap-rng.c | 22
drivers/crypto/Kconfig | 11
drivers/crypto/Makefile | 1
drivers/crypto/amcc/crypto4xx_core.c | 2
drivers/crypto/caam/caamalg.c | 14
drivers/crypto/caam/ctrl.c | 16
drivers/crypto/ux500/Kconfig | 30
drivers/crypto/ux500/Makefile | 8
drivers/crypto/ux500/cryp/Makefile | 13
drivers/crypto/ux500/cryp/cryp.c | 401 ++++
drivers/crypto/ux500/cryp/cryp.h | 308 +++
drivers/crypto/ux500/cryp/cryp_core.c | 1790 +++++++++++++++++++++
drivers/crypto/ux500/cryp/cryp_irq.c | 45
drivers/crypto/ux500/cryp/cryp_irq.h | 31
drivers/crypto/ux500/cryp/cryp_irqp.h | 125 +
drivers/crypto/ux500/cryp/cryp_p.h | 125 +
drivers/crypto/ux500/hash/Makefile | 11
drivers/crypto/ux500/hash/hash_alg.h | 395 ++++
drivers/crypto/ux500/hash/hash_core.c | 2031 +++++++++++++++++++++++-
30 files changed, 5819 insertions(+), 549 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.5
2012-05-23 1:35 ` Crypto Update for 3.5 Herbert Xu
@ 2012-05-23 23:06 ` Linus Torvalds
2012-05-24 0:21 ` Herbert Xu
2012-05-24 7:03 ` Linus Walleij
2012-07-25 8:41 ` Crypto Update for 3.6 Herbert Xu
1 sibling, 2 replies; 246+ messages in thread
From: Linus Torvalds @ 2012-05-23 23:06 UTC (permalink / raw)
To: Herbert Xu, Andreas Westin
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, May 22, 2012 at 6:35 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 3.5:
I pulled this, but quite frankly, some of it looks like utter garbage.
There's a declaration for dbx500_add_platform_device_noirq() that does
not exist and is not used anywhere. Why? It was added in commit
585d188f8072, and I see no rhyme or reason to it.
I only noticed because I happened to get a conflict due to the
location it was added. I removed it. WTF is going on?
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.5
2012-05-23 23:06 ` Linus Torvalds
@ 2012-05-24 0:21 ` Herbert Xu
2012-05-24 8:36 ` Arnd Bergmann
2012-05-24 7:03 ` Linus Walleij
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-05-24 0:21 UTC (permalink / raw)
To: Linus Torvalds
Cc: Andreas Westin, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Arnd Bergmann, Linus Walleij
On Wed, May 23, 2012 at 04:06:35PM -0700, Linus Torvalds wrote:
> On Tue, May 22, 2012 at 6:35 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Here is the crypto update for 3.5:
>
> I pulled this, but quite frankly, some of it looks like utter garbage.
>
> There's a declaration for dbx500_add_platform_device_noirq() that does
> not exist and is not used anywhere. Why? It was added in commit
> 585d188f8072, and I see no rhyme or reason to it.
I can't see why that was added there either.
Adding Arnd/Linus Walleij to see if they can tell us whether
it should go or stay.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.5
2012-05-23 23:06 ` Linus Torvalds
2012-05-24 0:21 ` Herbert Xu
@ 2012-05-24 7:03 ` Linus Walleij
1 sibling, 0 replies; 246+ messages in thread
From: Linus Walleij @ 2012-05-24 7:03 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, Andreas Westin, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List, Lee Jones
On Thu, May 24, 2012 at 1:06 AM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> There's a declaration for dbx500_add_platform_device_noirq() that does
> not exist and is not used anywhere. Why? It was added in commit
> 585d188f8072, and I see no rhyme or reason to it.
>
> I only noticed because I happened to get a conflict due to the
> location it was added. I removed it. WTF is going on?
AFAICT this was retrofitted to get a booting kernel on
the cryptodev base which was based on something old like
v3.2 just some weeks back. (Now it's upgraded to mainline, great!)
Greg was pushing for us to allocate all devices dynamically at
one point, but there was no real infrastructure for it and some local
implementations to meet that requirement, that's why these
functions pop up and down. We're working on it with device tree
etc, mea culpa...
Yours,
Linus Walleij
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.5
2012-05-24 0:21 ` Herbert Xu
@ 2012-05-24 8:36 ` Arnd Bergmann
0 siblings, 0 replies; 246+ messages in thread
From: Arnd Bergmann @ 2012-05-24 8:36 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, Andreas Westin, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List,
Linus Walleij, Lee Jones
On Thursday 24 May 2012, Herbert Xu wrote:
> On Wed, May 23, 2012 at 04:06:35PM -0700, Linus Torvalds wrote:
> > On Tue, May 22, 2012 at 6:35 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> > >
> > > Here is the crypto update for 3.5:
> >
> > I pulled this, but quite frankly, some of it looks like utter garbage.
> >
> > There's a declaration for dbx500_add_platform_device_noirq() that does
> > not exist and is not used anywhere. Why? It was added in commit
> > 585d188f8072, and I see no rhyme or reason to it.
>
> I can't see why that was added there either.
>
> Adding Arnd/Linus Walleij to see if they can tell us whether
> it should go or stay.
It should go. For all I can tell, this was the result of Lee Jones
doing major cleanups to the ux500 platform for this merge window
in parallel with the crypto driver getting added following the
older code pattern. The crypto patch had to be reworked for this
and apparently a hunk from the older version survived.
The entire file in which it was added is going to be removed
in one of the next kernel versions once we can boot all ux500 machines
using only device tree definitions, so it will be taken care of.
Arnd
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.5
2012-03-22 1:20 ` Crypto Fixes for 3.4 Herbert Xu
2012-04-02 9:45 ` Herbert Xu
@ 2012-06-11 13:00 ` Herbert Xu
2012-06-18 8:24 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-06-11 13:00 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes an unaligned fault on x86-32 with aesni-intel
and an RNG failure with atmel-rng (repeated bits).
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mathias Krause (1):
crypto: aesni-intel - fix unaligned cbc decrypt for x86-32
Peter Korsgaard (1):
hwrng: atmel-rng - fix race condition leading to repeated bits
arch/x86/crypto/aesni-intel_asm.S | 6 ++++--
drivers/char/hw_random/atmel-rng.c | 7 +++++++
2 files changed, 11 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.5
2012-06-11 13:00 ` Crypto Fixes for 3.5 Herbert Xu
@ 2012-06-18 8:24 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-06-18 8:24 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes another bug in the atmel-rng that made it produce
completely useless output.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Peter Korsgaard (1):
hwrng: atmel-rng - fix data valid check
drivers/char/hw_random/atmel-rng.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.6
2012-05-23 1:35 ` Crypto Update for 3.5 Herbert Xu
2012-05-23 23:06 ` Linus Torvalds
@ 2012-07-25 8:41 ` Herbert Xu
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-07-25 8:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.6:
* Fixed algorithm construction hang when self-test fails.
* Added SHA variants to talitos AEAD list.
* New driver for Exynos random number generator.
* Performance enhancements for arc4.
* Added hwrng support to caam.
* Added ahash support to caam.
* Fixed bad kfree in aesni-intel.
* Allow aesni-intel in FIPS mode.
* Added atmel driver with support for AES/3DES/SHA.
* Bug fixes for mv_cesa.
* CRC hardware driver for BF60x family processors.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (1):
crypto: caam - ERA retrieval and printing for SEC device
Benoît Thébaudeau (1):
hwrng: mxc-rnga - fix data_present API
Bharat Bhushan (1):
crypto: caam - Using alloc_coherent for caam job rings
Hemant Agrawal (1):
crypto: caam - add PDB (Protocol Descriptor Block) definitions
Herbert Xu (1):
crypto: algapi - Move larval completion into algboss
Horia Geanta (4):
crypto: talitos - move talitos structures to header file
crypto: talitos - export the talitos_submit function
crypto: talitos - add sha224, sha384 and sha512 to existing AEAD algorithms
crypto: testmgr - add aead cbc aes hmac sha1,256,512 test vectors
Johannes Goetzfried (4):
crypto: twofish - add x86_64/avx assembler implementation
crypto: testmgr - expand twofish test vectors
crypto: serpent - add x86_64/avx assembler implementation
crypto: twofish-avx - remove useless instruction
Jonghwa Lee (1):
hwrng: exynos - Add support for Exynos random number generator
Jussi Kivilinna (15):
crypto: testmgr - add ecb(arc4) speed tests
crypto: arc4 - improve performance by adding ecb(arc4)
crypto: arc4 - improve performance by using u32 for ctx and variables
crypto: serpent-sse2/avx - allow both to be built into kernel
crypto: ablk_helper - move ablk_* functions from serpent-sse2/avx glue code to shared module
crypto: twofish-avx - change to use shared ablk_* functions
crypto: aes_ni - change to use shared ablk_* functions
crypto: serpent-sse2 - prepare serpent-sse2 glue code into generic x86 glue code for 128bit block ciphers
crypto: serpent-sse2 - split generic glue code to new helper module
crypto: serpent-avx: remove duplicated glue code and use shared glue code from glue_helper
crypto: camellia-x86_64 - remove duplicated glue code and use shared glue code from glue_helper
crypto: twofish-x86_64-3way - remove duplicated glue code and use shared glue code from glue_helper
crypto: twofish-avx - remove duplicated glue code and use shared glue code from glue_helper
crypto: move arch/x86/include/asm/serpent-{sse2|avx}.h to arch/x86/include/asm/crypto/
crypto: move arch/x86/include/asm/aes.h to arch/x86/include/asm/crypto/
Kim Phillips (10):
crypto: caam - remove line continuations from ablkcipher_append_src_dst
crypto: caam - fix input job ring element dma mapping size
crypto: caam - fix descriptor length adjustments for protocol descriptors
crypto: caam - assign 40-bit masks on SEC v5.0 and above
crypto: caam - add support for SEC v5.x RNG4
crypto: caam - disable IRQ coalescing by default
crypto: caam - use non-irq versions of spinlocks for job rings
crypto: caam - only query h/w in job ring dequeue path
crypto: caam - consolidate memory barriers from job ring en/dequeue
crypto: caam - one tasklet per job ring
Mathias Krause (1):
crypto: sha1 - use Kbuild supplied flags for AVX test
Milan Broz (2):
crypto: aesni-intel - fix wrong kfree pointer
crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode
Nicolas Royer (5):
ARM: AT91SAM9G45: add crypto peripherals
crypto: atmel - add Atmel AES driver
crypto: atmel - add Atmel DES/TDES driver
crypto: atmel - add Atmel SHA1/SHA256 driver
crypto: atmel - add new tests to tcrypt
Paul Bolle (1):
crypto: s390 - clean up DES code a bit more
Phil Sutter (3):
crypto: mv_cesa - add an expiry timer in case anything goes wrong
crypto: mv_cesa - initialise the interrupt status field to zero
crypto: mv_cesa - fix for hash finalisation with data
Sebastian Andrzej Siewior (1):
crypto: arc4 - now arc needs blockcipher support
Seth Jennings (2):
crypto: nx - move nx build to driver/crypto Makefile
crypto: nx - fix typo in nx driver config option
Sonic Zhang (2):
crypto: testmgr - Add new test cases for Blackfin CRC crypto driver
crypto: bfin_crc - CRC hardware driver for BF60x family processors.
Steffen Klassert (1):
crypto: algapi - Fix hang on crypto allocation
Yashpal Dutta (1):
crypto: caam - fix start index for Protocol shared descriptors
Yuan Kang (8):
crypto: caam - support external seq in/out lengths
crypto: caam - remove jr register/deregister
crypto: caam - refactor key_gen, sg
crypto: caam - link_tbl rename
crypto: caam - ahash hmac support
crypto: caam - unkeyed ahash support
crypto: caam - chaining support
crypto: caam - hwrng support
arch/arm/mach-at91/at91sam9g45.c | 13 +-
arch/arm/mach-at91/at91sam9g45_devices.c | 128 ++
arch/arm/mach-at91/include/mach/at91sam9g45.h | 2 +
arch/powerpc/Makefile | 1 -
arch/s390/crypto/crypto_des.h | 18 -
arch/x86/crypto/Makefile | 14 +-
arch/x86/crypto/ablk_helper.c | 149 ++
arch/x86/crypto/aes_glue.c | 2 +-
arch/x86/crypto/aesni-intel_glue.c | 110 +-
arch/x86/crypto/camellia_glue.c | 355 +---
arch/x86/crypto/glue_helper.c | 307 ++++
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 704 ++++++++
.../{serpent_sse2_glue.c => serpent_avx_glue.c} | 592 ++-----
arch/x86/crypto/serpent_sse2_glue.c | 513 ++-----
arch/x86/crypto/sha1_ssse3_asm.S | 2 +-
arch/x86/crypto/sha1_ssse3_glue.c | 6 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 300 ++++
arch/x86/crypto/twofish_avx_glue.c | 624 +++++++
arch/x86/crypto/twofish_glue_3way.c | 409 ++----
arch/x86/include/asm/crypto/ablk_helper.h | 31 +
arch/x86/include/asm/{ => crypto}/aes.h | 0
arch/x86/include/asm/crypto/glue_helper.h | 115 ++
arch/x86/include/asm/crypto/serpent-avx.h | 32 +
.../asm/{serpent.h => crypto/serpent-sse2.h} | 4 +-
arch/x86/include/asm/crypto/twofish.h | 46 +
crypto/Kconfig | 67 +-
crypto/algapi.c | 17 -
crypto/algboss.c | 17 +-
crypto/arc4.c | 115 +-
crypto/internal.h | 1 -
crypto/tcrypt.c | 86 +-
crypto/testmgr.c | 203 +++
crypto/testmgr.h | 1852 +++++++++++++++++++-
drivers/char/hw_random/Kconfig | 12 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/exynos-rng.c | 182 ++
drivers/char/hw_random/mxc-rnga.c | 21 +-
drivers/crypto/Kconfig | 56 +-
drivers/crypto/Makefile | 7 +-
drivers/crypto/atmel-aes-regs.h | 62 +
drivers/crypto/atmel-aes.c | 1206 +++++++++++++
drivers/crypto/atmel-sha-regs.h | 46 +
drivers/crypto/atmel-sha.c | 1112 ++++++++++++
drivers/crypto/atmel-tdes-regs.h | 89 +
drivers/crypto/atmel-tdes.c | 1215 +++++++++++++
drivers/crypto/bfin_crc.c | 780 ++++++++
drivers/crypto/caam/Kconfig | 30 +-
drivers/crypto/caam/Makefile | 4 +-
drivers/crypto/caam/caamalg.c | 572 ++----
drivers/crypto/caam/caamhash.c | 1878 ++++++++++++++++++++
drivers/crypto/caam/caamrng.c | 309 ++++
drivers/crypto/caam/compat.h | 2 +
drivers/crypto/caam/ctrl.c | 179 ++-
drivers/crypto/caam/ctrl.h | 13 +
drivers/crypto/caam/desc.h | 31 +-
drivers/crypto/caam/desc_constr.h | 57 +-
drivers/crypto/caam/error.c | 44 +-
drivers/crypto/caam/intern.h | 6 +-
drivers/crypto/caam/jr.c | 115 +-
drivers/crypto/caam/key_gen.c | 122 ++
drivers/crypto/caam/key_gen.h | 17 +
drivers/crypto/caam/pdb.h | 401 +++++
drivers/crypto/caam/regs.h | 38 +-
drivers/crypto/caam/sg_sw_sec4.h | 156 ++
drivers/crypto/mv_cesa.c | 61 +-
drivers/crypto/talitos.c | 283 ++--
drivers/crypto/talitos.h | 123 ++
include/linux/platform_data/atmel-aes.h | 22 +
68 files changed, 13795 insertions(+), 2292 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.6
2012-01-26 2:43 ` Crypto Fixes for 3.3 Herbert Xu
` (2 preceding siblings ...)
2012-03-22 1:20 ` Crypto Fixes for 3.4 Herbert Xu
@ 2012-08-23 8:32 ` Herbert Xu
2012-09-11 4:10 ` Herbert Xu
2012-11-09 9:30 ` Crypto Fixes for 3.7 Herbert Xu
3 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2012-08-23 8:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build error on 32-bit archs in the hifn driver
as well as a potential deadlock in the caam driver.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Jussi Kivilinna (1):
crypto: hifn_795x - fix 64bit division and undefined __divdi3 on 32bit archs
Kim Phillips (1):
crypto: caam - fix possible deadlock condition
drivers/crypto/caam/jr.c | 10 +++++-----
drivers/crypto/hifn_795x.c | 4 ++--
2 files changed, 7 insertions(+), 7 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.6
2012-08-23 8:32 ` Crypto Fixes for 3.6 Herbert Xu
@ 2012-09-11 4:10 ` Herbert Xu
2012-11-09 9:30 ` Crypto Fixes for 3.7 Herbert Xu
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2012-09-11 4:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the authenc self-test crash as well as a missing
export of a symbol used by a module.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ben Collins (1):
crypto/caam: Export gen_split_key symbol for other modules
Herbert Xu (1):
crypto: authenc - Fix crash with zero-length assoc data
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.7
2012-01-06 4:12 ` Crypto Update for 3.3 Herbert Xu
2012-01-11 22:19 ` Herbert Xu
2012-03-20 3:27 ` Herbert Xu
@ 2012-10-04 9:53 ` Herbert Xu
2012-12-14 10:31 ` Crypto Update for 3.8 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-10-04 9:53 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.7:
* Optimised AES/SHA1 for ARM.
* IPsec ESN support in talitos and caam.
* x86_64/avx implementation of cast5/cast6.
* Add/use multi-algorithm registration helpers where possible.
* Added IBM Power7+ in-Nest support.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
David McCullough (1):
arm/crypto: Add optimized AES and SHA1 routines
Devendra Naga (1):
crypto: ux500/hash - remove unneeded return at ux500_hash_mod_fini
Fabio Estevam (2):
hwrng: mxc-rnga - Adapt clocks to new i.mx clock framework
hwrng: mxc-rnga - Access data via structure
Horia Geanta (7):
crypto: talitos - fix icv management on outbound direction
crypto: talitos - prune unneeded descriptor allocation param
crypto: talitos - change type and name for [src|dst]_is_chained
crypto: talitos - support for assoc data provided as scatterlist
crypto: talitos - add IPsec ESN support
crypto: caam - add IPsec ESN support
crypto: caam - fix error IDs for SEC v5.x RNG4
Johannes Goetzfried (6):
crypto: cast5 - prepare generic module for optimized implementations
crypto: testmgr - add larger cast5 testvectors
crypto: cast5 - add x86_64/avx assembler implementation
crypto: cast6 - prepare generic module for optimized implementations
crypto: testmgr - add larger cast6 testvectors
crypto: cast6 - add x86_64/avx assembler implementation
Julia Lawall (1):
drivers/char/hw_random/octeon-rng.c: drop frees of devm allocated data
Jussi Kivilinna (32):
crypto: tea - use crypto_[un]register_algs
crypto: crypto_null - use crypto_[un]register_algs
crypto: des - use crypto_[un]register_algs
crypto: serpent - use crypto_[un]register_algs
crypto: ansi_cprng - use crypto_[un]register_algs
crypto: add crypto_[un]register_shashes for [un]registering multiple shash entries at once
crypto: tiger - use crypto_[un]register_shashes
crypto: sha256 - use crypto_[un]register_shashes
crypto: sha512 - use crypto_[un]register_shashes
crypto: whirlpool - use crypto_[un]register_shashes
crypto: cleanup - remove unneeded crypto_alg.cra_list initializations
crypto: arch/x86 - cleanup - remove unneeded crypto_alg.cra_list initializations
crypto: drivers - remove cra_list initialization
crypto: arch/s390 - cleanup - remove unneeded cra_list initialization
crypto: aesni_intel - improve lrw and xts performance by utilizing parallel AES-NI hardware pipelines
crypto: twofish-avx - tune assembler code for more performance
crypto: cast5-avx - tune assembler code for more performance
crypto: cast6-avx - tune assembler code for more performance
crypto: crypto_user - fix sparse warnings (symbol was not declared, should be static?)
crypto: camellia-x86_64 - fix sparse warnings (constant is so big)
crypto: cast5 - fix sparse warnings (symbol was not declared, should be static?)
crypto: cast6 - fix sparse warnings (symbol was not declared, should be static?)
Revert "[CRYPTO] cast6: inline bloat--"
crypto: 842 - remove .cra_list initialization
crypto: testmgr - allow non-multi page and multi page skcipher tests from same test template
crypto: testmgr - add test vectors for partial ctr(cast5) and ctr(cast6)
crypto: testmgr - add test vectors for CTR mode IV increasement
crypto: testmgr - make test_skcipher also test 'dst != src' code paths
crypto: testmgr - make test_aead also test 'dst != src' code paths
crypto: tcrypt - add missing tests for camellia and ghash
crypto: cast5/avx - fix storing of new IV in CBC encryption
crypto: x86/glue_helper - fix storing of new IV in CBC encryption
Kent Yoder (1):
crypto: Add a MAINTAINERS entry for P7+ in-Nest crypto driver
Kim Phillips (6):
crypto: caam - fix possible deadlock condition
crypto: caam - set descriptor sharing type to SERIAL
crypto: talitos - consolidate cra_type assignments
crypto: talitos - consolidate common cra_* assignments
crypto: caam - coccicheck fixes
crypto: caam - increase TRNG clocks per sample
Michael Ellerman (1):
crypto: nx - Remove virt_to_abs() usage in nx-842.c
Peter Senna Tschudin (4):
crypto: ux500 - fix error return code
crypto: hifn_795x - fix error return code
crypto: crypto4xx - fix error return code
crypto: tegra-aes - fix error return code
Sachin Kamat (1):
crypto: geode-aes - Use module_pci_driver
Seth Jennings (4):
powerpc/crypto: rework Kconfig
powerpc/crypto: add compression support to arch vec
powerpc/crypto: add 842 hardware compression driver
powerpc/crypto: add 842 crypto driver
Shengzhou Liu (1):
crypto: caam - add backward compatible string sec4.0
Suresh Siddha (1):
crypto, tcrypt: remove local_bh_disable/enable() around local_irq_disable/enable()
Tushar Behera (1):
crypto: atmel - Remove possible typo error
Wei Yongjun (1):
crypto: remove duplicated include
MAINTAINERS | 12 +
arch/arm/Makefile | 1 +
arch/arm/crypto/Makefile | 9 +
arch/arm/crypto/aes-armv4.S | 1112 +++++
arch/arm/crypto/aes_glue.c | 108 +
arch/arm/crypto/sha1-armv4-large.S | 503 ++
arch/arm/crypto/sha1_glue.c | 179 +
arch/powerpc/configs/ppc64_defconfig | 3 +-
arch/powerpc/configs/pseries_defconfig | 3 +-
arch/powerpc/kernel/prom_init.c | 4 +-
arch/s390/crypto/aes_s390.c | 5 -
arch/s390/crypto/des_s390.c | 10 -
arch/s390/crypto/ghash_s390.c | 1 -
arch/x86/crypto/Makefile | 4 +
arch/x86/crypto/aes_glue.c | 1 -
arch/x86/crypto/aesni-intel_glue.c | 258 +-
arch/x86/crypto/blowfish_glue.c | 4 -
arch/x86/crypto/camellia_glue.c | 1382 +++---
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 376 ++
arch/x86/crypto/cast5_avx_glue.c | 530 ++
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 383 ++
.../{serpent_avx_glue.c => cast6_avx_glue.c} | 380 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 2 -
arch/x86/crypto/glue_helper.c | 2 +-
arch/x86/crypto/salsa20_glue.c | 1 -
arch/x86/crypto/serpent_avx_glue.c | 10 -
arch/x86/crypto/serpent_sse2_glue.c | 10 -
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 227 +-
arch/x86/crypto/twofish_avx_glue.c | 10 -
arch/x86/crypto/twofish_glue.c | 1 -
arch/x86/crypto/twofish_glue_3way.c | 5 -
crypto/842.c | 182 +
crypto/Kconfig | 75 +
crypto/Makefile | 5 +-
crypto/aes_generic.c | 1 -
crypto/ansi_cprng.c | 63 +-
crypto/anubis.c | 1 -
crypto/blowfish_generic.c | 1 -
crypto/camellia_generic.c | 1 -
crypto/{cast5.c => cast5_generic.c} | 80 +-
crypto/{cast6.c => cast6_generic.c} | 73 +-
crypto/crypto_null.c | 57 +-
crypto/crypto_user.c | 2 +-
crypto/deflate.c | 1 -
crypto/des_generic.c | 25 +-
crypto/fcrypt.c | 1 -
crypto/ghash-generic.c | 1 -
crypto/khazad.c | 1 -
crypto/krng.c | 1 -
crypto/lzo.c | 1 -
crypto/salsa20_generic.c | 1 -
crypto/seed.c | 1 -
crypto/serpent_generic.c | 53 +-
crypto/sha256_generic.c | 25 +-
crypto/sha512_generic.c | 20 +-
crypto/shash.c | 36 +
crypto/tcrypt.c | 95 +-
crypto/tcrypt.h | 1 +
crypto/tea.c | 41 +-
crypto/testmgr.c | 472 ++-
crypto/testmgr.h | 5169 ++++++++++++++++----
crypto/tgr192.c | 38 +-
crypto/twofish_generic.c | 1 -
crypto/vmac.c | 10 +-
crypto/wp512.c | 39 +-
drivers/char/hw_random/mxc-rnga.c | 108 +-
drivers/char/hw_random/octeon-rng.c | 17 +-
drivers/crypto/Kconfig | 22 +-
drivers/crypto/amcc/crypto4xx_core.c | 1 +
drivers/crypto/atmel-aes.c | 7 -
drivers/crypto/atmel-sha.c | 5 -
drivers/crypto/atmel-tdes.c | 6 -
drivers/crypto/caam/caamalg.c | 51 +-
drivers/crypto/caam/caamhash.c | 22 +-
drivers/crypto/caam/caamrng.c | 9 +-
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 6 +-
drivers/crypto/caam/error.c | 2 -
drivers/crypto/caam/jr.c | 10 +-
drivers/crypto/caam/key_gen.c | 4 +
drivers/crypto/geode-aes.c | 18 +-
drivers/crypto/hifn_795x.c | 5 +-
drivers/crypto/nx/Kconfig | 26 +
drivers/crypto/nx/Makefile | 5 +-
drivers/crypto/nx/nx-842.c | 1617 ++++++
drivers/crypto/nx/nx-aes-cbc.c | 1 -
drivers/crypto/nx/nx-aes-ccm.c | 2 -
drivers/crypto/nx/nx-aes-ctr.c | 2 -
drivers/crypto/nx/nx-aes-ecb.c | 1 -
drivers/crypto/nx/nx-aes-gcm.c | 2 -
drivers/crypto/omap-aes.c | 1 -
drivers/crypto/padlock-aes.c | 3 -
drivers/crypto/s5p-sss.c | 1 -
drivers/crypto/talitos.c | 442 +-
drivers/crypto/tegra-aes.c | 3 +-
drivers/crypto/ux500/cryp/cryp_core.c | 1 +
drivers/crypto/ux500/hash/hash_core.c | 1 -
include/crypto/cast5.h | 27 +
include/crypto/cast6.h | 28 +
include/crypto/internal/hash.h | 2 +
include/linux/nx842.h | 11 +
101 files changed, 11832 insertions(+), 2748 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.7
2012-08-23 8:32 ` Crypto Fixes for 3.6 Herbert Xu
2012-09-11 4:10 ` Herbert Xu
@ 2012-11-09 9:30 ` Herbert Xu
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-11-09 9:30 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a potential panic in cryptd which may occur with
crypto drivers such as aesni-intel.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Jussi Kivilinna (1):
crypto: cryptd - disable softirqs in cryptd_queue_worker to prevent data corruption
crypto/cryptd.c | 11 ++++++++---
1 files changed, 8 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.8
2012-10-04 9:53 ` Crypto Update for 3.7 Herbert Xu
@ 2012-12-14 10:31 ` Herbert Xu
2013-02-23 2:33 ` Crypto Update for 3.9 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2012-12-14 10:31 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.8:
* Added aesni/avx/x86_64 implementations for camellia.
* Optimised AVX code for cast5/serpent/twofish/cast6.
* Fixed vmac bug with unaligned input.
* Allow compression algorithms in FIPS mode.
* Optimised crc32c implementation for Intel.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Axel Lin (1):
crypto: picoxcell - Add terminating entry for platform_device_id table
Jussi Kivilinna (18):
crypto: testmgr - expand camellia test vectors
crypto: testmgr - expand blowfish test vectors
crypto: testmgr - expand serpent test vectors
crypto: testmgr - add new larger AES testvectors
crypto: testmgr - add new larger DES testvectors
crypto: testmgr - add new larger DES3_EDE testvectors
crypto: x86/glue_helper - use le128 instead of u128 for CTR mode
crypto: cast6/avx - avoid using temporary stack buffers
crypto: twofish/avx - avoid using temporary stack buffers
crypto: serpent/avx - avoid using temporary stack buffers
crypto: cast5/avx - avoid using temporary stack buffers
crypto: tcrypt - add async speed test for camellia cipher
crypto: camellia-x86_64 - share common functions and move structures and function definitions to header file
crypto: camellia - add AES-NI/AVX/x86_64 assembler implementation of camellia cipher
crypto: cast5/cast6 - move lookup tables to shared module
crypto: testmgr - remove fips_allowed flag from camellia-aesni null-tests
crypto: testmgr - clean alg_test_null entries in alg_test_descs[]
crypto: testmgr - add larger crc32c test vector to test FPU path in crc32c_intel
Mathias Krause (1):
crypto: testmgr - remove superfluous initializers for xts(aes)
Milan Broz (1):
crypto: testmgr - allow compression algs in fips mode
Sachin Kamat (1):
crypto: s5p-sss - Fix compilation error
Salman Qazi (1):
crypto: vmac - Make VMAC work when blocks aren't aligned
Sebastian Andrzej Siewior (1):
crypto: omap-aes - select BLKCIPHER2
Shan Wei (1):
padata: use __this_cpu_read per-cpu helper
Tim Chen (3):
crypto: crc32c - Rename crc32c-intel.c to crc32c-intel_glue.c
crypto: crc32c - Optimize CRC32C calculation with PCLMULQDQ instruction
crypto: tcrypt - Added speed test in tcrypt for crc32c
Vakul Garg (1):
crypto: caam - Updated SEC-4.0 device tree binding for ERA information.
Wei Yongjun (3):
crypto: talitos - convert to use be16_add_cpu()
crypto: tegra - fix missing unlock on error case
crypto: tegra-aes - fix error-valued pointer dereference
.../devicetree/bindings/crypto/fsl-sec4.txt | 5 +-
arch/x86/crypto/Makefile | 5 +
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 1102 ++++
arch/x86/crypto/camellia_aesni_avx_glue.c | 558 ++
arch/x86/crypto/camellia_glue.c | 92 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 348 +-
arch/x86/crypto/cast5_avx_glue.c | 79 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 206 +-
arch/x86/crypto/cast6_avx_glue.c | 77 +-
.../crypto/{crc32c-intel.c => crc32c-intel_glue.c} | 81 +
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 460 ++
arch/x86/crypto/glue_helper-asm-avx.S | 91 +
arch/x86/crypto/glue_helper.c | 12 +-
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 166 +-
arch/x86/crypto/serpent_avx_glue.c | 49 +-
arch/x86/crypto/serpent_sse2_glue.c | 12 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 208 +-
arch/x86/crypto/twofish_avx_glue.c | 73 +-
arch/x86/crypto/twofish_glue_3way.c | 20 +-
arch/x86/include/asm/crypto/camellia.h | 82 +
arch/x86/include/asm/crypto/glue_helper.h | 28 +-
arch/x86/include/asm/crypto/serpent-avx.h | 27 +-
arch/x86/include/asm/crypto/twofish.h | 4 +-
crypto/Kconfig | 42 +
crypto/Makefile | 1 +
crypto/cast5_generic.c | 277 +-
crypto/cast6_generic.c | 280 +-
crypto/cast_common.c | 290 +
crypto/tcrypt.c | 29 +
crypto/testmgr.c | 369 +--
crypto/testmgr.h | 5912 +++++++++++++++++++-
crypto/vmac.c | 47 +-
drivers/crypto/Kconfig | 1 +
drivers/crypto/picoxcell_crypto.c | 1 +
drivers/crypto/s5p-sss.c | 2 +-
drivers/crypto/talitos.c | 3 +-
drivers/crypto/tegra-aes.c | 10 +-
include/crypto/cast5.h | 6 +-
include/crypto/cast6.h | 6 +-
include/crypto/cast_common.h | 9 +
include/crypto/vmac.h | 2 +
kernel/padata.c | 5 +-
42 files changed, 9391 insertions(+), 1686 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.9
2012-12-14 10:31 ` Crypto Update for 3.8 Herbert Xu
@ 2013-02-23 2:33 ` Herbert Xu
2013-05-02 1:47 ` Crypto Update for 3.10 Herbert Xu
2013-09-07 3:55 ` Crypto Update for 3.12 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2013-02-23 2:33 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.9:
* Added accelerated implementation of crc32 using pclmulqdq.
* Added test vector for fcrypt.
* Added support for OMAP4/AM33XX cipher and hash.
* Fixed loose crypto_user input checks.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexander Boyko (1):
crypto: crc32 - add crc32 pclmulqdq implementation and wrappers for table implementation
Herbert Xu (1):
crypto: crc32-pclmul - Kill warning on x86-32
Jingoo Han (1):
crypto: s5p-sss - Use devm_clk_get()
Julia Lawall (3):
crypto: bfin_crc - reposition free_irq to avoid access to invalid data
crypto: atmel-aes - adjust duplicate test
crypto: use ERR_CAST
Jussi Kivilinna (13):
crypto: testmgr - add test vector for fcrypt
crypto: x86/aes - assembler clean-ups: use ENTRY/ENDPROC, localize jump targets
crypto: aesni-intel - add ENDPROC statements for assembler functions
crypto: blowfish-x86_64: use ENTRY()/ENDPROC() for assembler functions and localize jump targets
crypto: camellia-x86_64/aes-ni: use ENTRY()/ENDPROC() for assembler functions and localize jump targets
crypto: cast5-avx: use ENTRY()/ENDPROC() for assembler functions and localize jump targets
crypto: cast6-avx: use ENTRY()/ENDPROC() for assembler functions
crypto: x86/crc32c - assembler clean-up: use ENTRY/ENDPROC
crypto: x86/ghash - assembler clean-up: use ENDPROC at end of assember functions
crypto: x86/salsa20 - assembler cleanup, use ENTRY/ENDPROC for assember functions and rename ECRYPT_* to salsa20_*
crypto: x86/serpent - use ENTRY/ENDPROC for assember functions and localize jump targets
crypto: x86/sha1 - assembler clean-ups: use ENTRY/ENDPROC
crypto: x86/twofish - assembler clean-ups: use ENTRY/ENDPROC, localize jump labels
Mark A. Greer (20):
crypto: omap-sham - Remove unnecessary pr_info noise
crypto: omap-sham - Convert to use pm_runtime API
crypto: omap-sham - Add suspend/resume support
crypto: omap-sham - Add code to use dmaengine API
crypto: omap-sham - Remove usage of private DMA API
crypto: omap-sham - Add Device Tree Support
crypto: omap-sham - Convert to dma_request_slave_channel_compat()
crypto: omap-sham - Add OMAP4/AM33XX SHAM Support
crypto: omap-sham - Add SHA224 and SHA256 Support
crypto: omap-aes - Remmove unnecessary pr_info noise
crypto: omap-aes - Don't reset controller for every operation
crypto: omap-aes - Convert to use pm_runtime API
crypto: omap-aes - Add suspend/resume support
crypto: omap-aes - Add code to use dmaengine API
crypto: omap-aes - Remove usage of private DMA API
crypto: omap-aes - Add Device Tree Support
crypto: omap-aes - Convert to dma_request_slave_channel_compat()
crypto: omap-aes - Add OMAP4/AM33XX AES Support
crypto: omap-aes - Add CTR algorithm Support
crypto: omap-sham - Fix compile errors when CONFIG_OF not defined
Mathias Krause (3):
crypto: user - fix info leaks in report API
crypto: user - fix empty string test in report API
crypto: user - ensure user supplied strings are nul-terminated
Vakul Garg (1):
crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.
.../devicetree/bindings/crypto/fsl-sec4.txt | 12 +-
arch/x86/crypto/Makefile | 2 +
arch/x86/crypto/aes-i586-asm_32.S | 15 +-
arch/x86/crypto/aes-x86_64-asm_64.S | 30 +-
arch/x86/crypto/aesni-intel_asm.S | 23 +-
arch/x86/crypto/blowfish-x86_64-asm_64.S | 39 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 38 +-
arch/x86/crypto/camellia-x86_64-asm_64.S | 50 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 48 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 35 +-
arch/x86/crypto/crc32-pclmul_asm.S | 246 ++++++
arch/x86/crypto/crc32-pclmul_glue.c | 201 +++++
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 8 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 4 +
arch/x86/crypto/salsa20-i586-asm_32.S | 28 +-
arch/x86/crypto/salsa20-x86_64-asm_64.S | 28 +-
arch/x86/crypto/salsa20_glue.c | 5 -
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 35 +-
arch/x86/crypto/serpent-sse2-i586-asm_32.S | 20 +-
arch/x86/crypto/serpent-sse2-x86_64-asm_64.S | 20 +-
arch/x86/crypto/sha1_ssse3_asm.S | 10 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 35 +-
arch/x86/crypto/twofish-i586-asm_32.S | 11 +-
arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 20 +-
arch/x86/crypto/twofish-x86_64-asm_64.S | 11 +-
crypto/Kconfig | 21 +
crypto/Makefile | 1 +
crypto/ablkcipher.c | 12 +-
crypto/aead.c | 15 +-
crypto/ahash.c | 2 +-
crypto/algapi.c | 4 +-
crypto/authenc.c | 3 +-
crypto/authencesn.c | 3 +-
crypto/blkcipher.c | 12 +-
crypto/ccm.c | 23 +-
crypto/chainiv.c | 3 +-
crypto/crc32.c | 158 ++++
crypto/crypto_user.c | 38 +-
crypto/ctr.c | 3 +-
crypto/cts.c | 3 +-
crypto/gcm.c | 29 +-
crypto/pcompress.c | 3 +-
crypto/rng.c | 2 +-
crypto/seqiv.c | 3 +-
crypto/shash.c | 3 +-
crypto/testmgr.c | 15 +
drivers/crypto/atmel-aes.c | 2 +-
drivers/crypto/bfin_crc.c | 6 +-
drivers/crypto/omap-aes.c | 658 +++++++++++----
drivers/crypto/omap-sham.c | 915 +++++++++++++++-----
drivers/crypto/s5p-sss.c | 4 +-
51 files changed, 2153 insertions(+), 762 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.9
2012-11-09 9:30 ` Crypto Fixes for 3.7 Herbert Xu
@ 2013-03-28 8:28 ` Herbert Xu
2013-03-28 13:05 ` Chaoxing Lin
` (5 more replies)
0 siblings, 6 replies; 246+ messages in thread
From: Herbert Xu @ 2013-03-28 8:28 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push removes IPsec ESN support from the talitos/caam drivers
since they were implemented incorrectly, causing interoperability
problems if ESN is used with them.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Horia Geanta (2):
Revert "crypto: talitos - add IPsec ESN support"
Revert "crypto: caam - add IPsec ESN support"
drivers/crypto/caam/caamalg.c | 27 ++-------------------------
drivers/crypto/caam/compat.h | 1 -
drivers/crypto/talitos.c | 30 ++----------------------------
3 files changed, 4 insertions(+), 54 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* RE: Crypto Fixes for 3.9
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
@ 2013-03-28 13:05 ` Chaoxing Lin
2013-03-28 13:52 ` Herbert Xu
2013-04-10 2:21 ` Herbert Xu
` (4 subsequent siblings)
5 siblings, 1 reply; 246+ messages in thread
From: Chaoxing Lin @ 2013-03-28 13:05 UTC (permalink / raw)
To: Herbert Xu, Linus Torvalds, Linux Kernel Mailing List,
Linux Crypto Mailing List
Would you be able to incorporate the GMAC ESN bug fix in 3.9?
Thanks,
Chaoxing
--------------------------------
Thanks Jussi, the patch fixes the problem.
You may commit it officially.
Chaoxing
-----Original Message-----
From: Jussi Kivilinna [mailto:jussi.kivilinna@iki.fi]
Sent: Tuesday, March 26, 2013 4:16 PM
To: Chaoxing Lin
Cc: linux-crypto@vger.kernel.org
Subject: Re: potential bug in GMAC implementation. not work in ESN mode
On 25.03.2013 18:12, Chaoxing Lin wrote:
> 2nd ping....
>
> Nobody is maintaining crypto/gcm.c?
>
>
>
> -----Original Message-----
> From: Chaoxing Lin
> Sent: Friday, March 08, 2013 11:38 AM
> To: 'linux-crypto@vger.kernel.org'
> Subject: potential bug in GMAC implementation. not work in ESN mode
>
> I was testing ipsec with GMAC and found that the rfc4543 GMAC implementation in kernel software crypto work in "esp=aes256gmac-noesn!" mode.
> It does not work in in "esp=aes256gmac-esn!" mode. The tunnel was established but no data traffic is possible.
>
> Looking at source code, I found this piece of code is suspicious.
> Line 1146~1147 tries to put req->assoc to assoc[1]. But I think this way only works when req->assoc has only one segment. In ESN mode, req->assoc contains 3 segments (SPI, SN-hi, SN-low). Line 1146~1147 will only attach SPI segment(with total length) in assoc.
>
> Please let me know whether I understand it right.
Your analysis seems correct. Does attached the patch fix the problem? (I've only compile tested it.)
-Jussi
> Thanks,
>
> Chaoxing
>
>
> Source from kernel 3.8.2
> path: root/crypto/gcm.c
>
> 1136: /* construct the aad */
> 1137: dstp = sg_page(dst);
> vdst = PageHighMem(dstp) ? NULL : page_address(dstp) + dst->offset;
>
> sg_init_table(payload, 2);
> sg_set_buf(payload, req->iv, 8);
> scatterwalk_crypto_chain(payload, dst, vdst == req->iv + 8, 2);
> assoclen += 8 + req->cryptlen - (enc ? 0 : authsize);
>
> sg_init_table(assoc, 2);
> 1146: sg_set_page(assoc, sg_page(req->assoc), req->assoc->length,
> 1147: req->assoc->offset);
> scatterwalk_crypto_chain(assoc, payload, 0, 2);
>
> aead_request_set_tfm(subreq, ctx->child);
> aead_request_set_callback(subreq, req->base.flags, req->base.complete,
> req->base.data);
> aead_request_set_crypt(subreq, cipher, cipher, enc ? 0 : authsize, iv);
> 1154: aead_request_set_assoc(subreq, assoc, assoclen);
> --
> To unsubscribe from this list: send the line "unsubscribe
> linux-crypto" in the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
-----Original Message-----
From: linux-crypto-owner@vger.kernel.org [mailto:linux-crypto-owner@vger.kernel.org] On Behalf Of Herbert Xu
Sent: Thursday, March 28, 2013 4:29 AM
To: Linus Torvalds; David S. Miller; Linux Kernel Mailing List; Linux Crypto Mailing List
Subject: Crypto Fixes for 3.9
Hi Linus:
This push removes IPsec ESN support from the talitos/caam drivers since they were implemented incorrectly, causing interoperability problems if ESN is used with them.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Horia Geanta (2):
Revert "crypto: talitos - add IPsec ESN support"
Revert "crypto: caam - add IPsec ESN support"
drivers/crypto/caam/caamalg.c | 27 ++-------------------------
drivers/crypto/caam/compat.h | 1 -
drivers/crypto/talitos.c | 30 ++----------------------------
3 files changed, 4 insertions(+), 54 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.9
2013-03-28 13:05 ` Chaoxing Lin
@ 2013-03-28 13:52 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-03-28 13:52 UTC (permalink / raw)
To: Chaoxing Lin; +Cc: torvalds, linux-kernel, linux-crypto
Chaoxing Lin <Chaoxing.Lin@ultra-3eti.com> wrote:
> Would you be able to incorporate the GMAC ESN bug fix in 3.9?
I'd be happy to once I get the patch.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.9
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
2013-03-28 13:05 ` Chaoxing Lin
@ 2013-04-10 2:21 ` Herbert Xu
2013-04-22 0:34 ` Herbert Xu
2013-05-28 5:52 ` Crypto Fixes for 3.10 Herbert Xu
` (3 subsequent siblings)
5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-04-10 2:21 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a GCM bug that breaks IPsec and a compile problem
in ux500.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Jussi Kivilinna (1):
crypto: gcm - fix assumption that assoc has one segment
Linus Walleij (1):
crypto: ux500 - add missing comma
crypto/gcm.c | 17 ++++++++++++++---
drivers/crypto/ux500/cryp/cryp_core.c | 2 +-
2 files changed, 15 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.9
2013-04-10 2:21 ` Herbert Xu
@ 2013-04-22 0:34 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-04-22 0:34 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a kernel memory leak in the algif interface.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mathias Krause (1):
crypto: algif - suppress sending source address information in recvmsg
crypto/algif_hash.c | 2 ++
crypto/algif_skcipher.c | 1 +
2 files changed, 3 insertions(+), 0 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.10
2013-02-23 2:33 ` Crypto Update for 3.9 Herbert Xu
@ 2013-05-02 1:47 ` Herbert Xu
2013-07-05 9:52 ` Crypto Update for 3.11 Herbert Xu
2013-09-07 3:55 ` Crypto Update for 3.12 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-05-02 1:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.10:
* XTS mode optimisation for twofish/cast6/camellia/aes on x86.
* AVX2/x86_64 implementation for blowfish/twofish/serpent/camellia.
* SSSE3/AVX/AVX2 optimisations for sha256/sha512.
* Added driver for SAHARA2 crypto accelerator.
* Fix for GMAC when used in non-IPsec secnarios.
* Added generic CMAC implementation (including IPsec glue).
* IP update for crypto/atmel.
* Support for more than one device in hwrng/timeriomem.
* Added Broadcom BCM2835 RNG driver.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexander Clouter (2):
hwrng: timeriomem - update to support more than one device
hwrng: timeriomem - added devicetree hooks
Fabio Estevam (1):
hwrng: mxc-rnga - Use devm_ioremap_resource()
Herbert Xu (1):
crypto: crc32c - Kill pointless CRYPTO_CRC32C_X86_64 option
Javier Martin (1):
crypto: sahara - Add driver for SAHARA2 accelerator.
Jingoo Han (1):
hwrng: exynos - add CONFIG_PM_SLEEP/CONFIG_PM_RUNTIME to suspend/resume
Joel A Fernandes (2):
crypto: omap-sham - Use pm_runtime_put instead of pm_runtime_put_sync in tasklet
crypto: omap-aes - Use pm_runtime_put instead of pm_runtime_put_sync in tasklet
Jussi Kivilinna (20):
crypto: x86/crc32-pclmul - assembly clean-ups: use ENTRY/ENDPROC
crypto: x86 - build AVX block cipher implementations only if assembler supports AVX instructions
crypto: gcm - make GMAC work when dst and src are different
crypto: gcm - fix rfc4543 to handle async crypto correctly
crypto: testmgr - add AES GMAC test vectors
crypto: testmgr - add empty test vectors for null ciphers
crypto: add CMAC support to CryptoAPI
xfrm: add rfc4494 AES-CMAC-96 support
crypto: x86 - add more optimized XTS-mode for serpent-avx
crypto: x86/twofish-avx - use optimized XTS code
crypto: cast6-avx: use new optimized XTS code
crypto: x86/camellia-aesni-avx - add more optimized XTS code
crypto: aesni_intel - add more optimized XTS mode for x86-64
crypto: aesni_intel - fix Kconfig problem with CRYPTO_GLUE_HELPER_X86
crypto: testmgr - extend camellia test-vectors for camellia-aesni/avx2
crypto: tcrypt - add async cipher speed tests for blowfish
crypto: blowfish - add AVX2/x86_64 implementation of blowfish cipher
crypto: twofish - add AVX2/x86_64 assembler implementation of twofish cipher
crypto: serpent - add AVX2/x86_64 assembler implementation of serpent cipher
crypto: camellia - add AVX2/AES-NI/x86_64 assembler implementation of camellia cipher
Kim Phillips (2):
crypto: caam - change key gen functions to return signed int
crypto: caam - static constify error data
Lubomir Rintel (1):
hwrng: bcm2835 - Add Broadcom BCM2835 RNG driver
Mathias Krause (1):
crypto: user - constify netlink dispatch table
Mihnea Dobrescu-Balaur (1):
crypto: ux500 - replace kmalloc and then memcpy with kmemdup
Nicolas Royer (4):
ARM: AT91SAM9G45: same platform data structure for all crypto peripherals
crypto: atmel-aes - add support for latest release of the IP (0x130)
crypto: atmel-tdes - add support for latest release of the IP (0x700)
crypto: atmel-sha - add support for latest release of the IP (0x410)
Paul Bolle (1):
crypto: caam - fix typo "CRYPTO_AHASH"
Sachin Kamat (3):
crypto: omap-aes - Use module_platform_driver macro
crypto: omap-sham - Use module_platform_driver macro
crypto: picoxcell - Use of_match_ptr() macro
Sandy Wu (1):
crypto: crc32-pclmul - Use gas macro for pclmulqdq
Syam Sidhardhan (1):
crypto: bfin_crc - Fix possible NULL pointer dereference
Tang Chen (1):
hwrng: Fix a wrong comment in Documentation/hw_random.txt
Tim Chen (11):
crypto: crc32c - Update the links to the white papers on CRC32C calculations with PCLMULQDQ instructions.
crypto: sha256 - Expose SHA256 generic routine to be callable externally.
crypto: sha256 - Optimized sha256 x86_64 assembly routine using Supplemental SSE3 instructions.
crypto: sha256 - Optimized sha256 x86_64 assembly routine with AVX instructions.
crypto: sha256 - Optimized sha256 x86_64 routine using AVX2's RORX instructions
crypto: sha256 - Create module providing optimized SHA256 routines using SSSE3, AVX or AVX2 instructions.
crypto: sha512 - Expose generic sha512 routine to be callable from other modules
crypto: sha512 - Optimized SHA512 x86_64 assembly routine using Supplemental SSE3 instructions.
crypto: sha512 - Optimized SHA512 x86_64 assembly routine using AVX instructions.
crypto: sha512 - Optimized SHA512 x86_64 assembly routine using AVX2 RORX instruction.
crypto: sha512 - Create module providing optimized SHA512 routines using SSSE3, AVX or AVX2 instructions.
Vakul Garg (3):
crypto: caam - set RDB bit in security configuration register
crypto: caam - Fix missing init of '.type' in AEAD algos.
crypto: caam - fix job ring cleanup code
Wei Yongjun (1):
crypto: ux500 - fix error return code in hash_dma_final()
.../devicetree/bindings/crypto/fsl-imx-sahara.txt | 15 +
.../devicetree/bindings/hwrng/timeriomem_rng.txt | 18 +
.../devicetree/bindings/rng/brcm,bcm2835.txt | 13 +
Documentation/hw_random.txt | 2 +-
arch/arm/mach-at91/at91sam9g45_devices.c | 14 +-
arch/x86/crypto/Makefile | 57 +-
arch/x86/crypto/aesni-intel_asm.S | 117 ++
arch/x86/crypto/aesni-intel_glue.c | 80 ++
arch/x86/crypto/blowfish-avx2-asm_64.S | 449 +++++++
.../{blowfish_glue.c => blowfish_avx2_glue.c} | 402 ++++---
arch/x86/crypto/blowfish_glue.c | 32 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 180 +++-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 1368 ++++++++++++++++++++
...aesni_avx_glue.c => camellia_aesni_avx2_glue.c} | 182 ++--
arch/x86/crypto/camellia_aesni_avx_glue.c | 104 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 48 +-
arch/x86/crypto/cast6_avx_glue.c | 91 +-
arch/x86/crypto/crc32-pclmul_asm.S | 6 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 10 +-
arch/x86/crypto/glue_helper-asm-avx.S | 61 +-
arch/x86/crypto/glue_helper-asm-avx2.S | 180 +++
arch/x86/crypto/glue_helper.c | 97 ++-
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 45 +-
...t-avx-x86_64-asm_64.S => serpent-avx2-asm_64.S} | 207 ++--
.../{serpent_avx_glue.c => serpent_avx2_glue.c} | 323 +++---
arch/x86/crypto/serpent_avx_glue.c | 145 ++-
arch/x86/crypto/sha256-avx-asm.S | 496 +++++++
arch/x86/crypto/sha256-avx2-asm.S | 772 +++++++++++
arch/x86/crypto/sha256-ssse3-asm.S | 506 ++++++++
arch/x86/crypto/sha256_ssse3_glue.c | 275 ++++
arch/x86/crypto/sha512-avx-asm.S | 423 ++++++
arch/x86/crypto/sha512-avx2-asm.S | 743 +++++++++++
arch/x86/crypto/sha512-ssse3-asm.S | 421 ++++++
arch/x86/crypto/sha512_ssse3_glue.c | 282 ++++
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 48 +-
arch/x86/crypto/twofish-avx2-asm_64.S | 600 +++++++++
.../{twofish_avx_glue.c => twofish_avx2_glue.c} | 269 ++--
arch/x86/crypto/twofish_avx_glue.c | 101 +-
arch/x86/include/asm/cpufeature.h | 1 +
arch/x86/include/asm/crypto/blowfish.h | 43 +
arch/x86/include/asm/crypto/camellia.h | 19 +
arch/x86/include/asm/crypto/glue_helper.h | 24 +
arch/x86/include/asm/crypto/serpent-avx.h | 29 +
arch/x86/include/asm/crypto/twofish.h | 18 +
crypto/Kconfig | 133 ++-
crypto/Makefile | 1 +
crypto/cmac.c | 315 +++++
crypto/crypto_user.c | 4 +-
crypto/gcm.c | 116 ++-
crypto/sha256_generic.c | 11 +-
crypto/sha512_generic.c | 13 +-
crypto/tcrypt.c | 30 +-
crypto/testmgr.c | 95 ++-
crypto/testmgr.h | 1314 ++++++++++++++++++-
drivers/char/hw_random/Kconfig | 12 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/bcm2835-rng.c | 113 ++
drivers/char/hw_random/exynos-rng.c | 3 +-
drivers/char/hw_random/mxc-rnga.c | 21 +-
drivers/char/hw_random/timeriomem-rng.c | 190 ++-
drivers/crypto/Kconfig | 18 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/atmel-aes.c | 471 +++++--
drivers/crypto/atmel-sha-regs.h | 7 +-
drivers/crypto/atmel-sha.c | 586 +++++++--
drivers/crypto/atmel-tdes-regs.h | 2 +
drivers/crypto/atmel-tdes.c | 394 +++++-
drivers/crypto/bfin_crc.c | 6 +-
drivers/crypto/caam/Kconfig | 2 +-
drivers/crypto/caam/caamalg.c | 6 +
drivers/crypto/caam/caamhash.c | 4 +-
drivers/crypto/caam/ctrl.c | 3 +
drivers/crypto/caam/error.c | 10 +-
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/jr.c | 4 +
drivers/crypto/caam/key_gen.c | 2 +-
drivers/crypto/caam/key_gen.h | 2 +-
drivers/crypto/caam/regs.h | 4 +-
drivers/crypto/omap-aes.c | 15 +-
drivers/crypto/omap-sham.c | 15 +-
drivers/crypto/picoxcell_crypto.c | 4 +-
drivers/crypto/sahara.c | 1070 +++++++++++++++
drivers/crypto/ux500/hash/hash_core.c | 6 +-
include/crypto/sha.h | 5 +
include/linux/platform_data/atmel-aes.h | 22 -
include/linux/platform_data/crypto-atmel.h | 22 +
include/linux/timeriomem-rng.h | 5 -
net/xfrm/xfrm_algo.c | 13 +
88 files changed, 13036 insertions(+), 1352 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.10
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
2013-03-28 13:05 ` Chaoxing Lin
2013-04-10 2:21 ` Herbert Xu
@ 2013-05-28 5:52 ` Herbert Xu
2013-06-10 9:05 ` Herbert Xu
2013-07-24 7:23 ` Crypto Fixes for 3.11 Herbert Xu
` (2 subsequent siblings)
5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-05-28 5:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a crash in the new sha256_ssse3 driver as well as
a DMA setup/teardown bug in caam.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Horia Geanta (1):
crypto: caam - fix inconsistent assoc dma mapping direction
Jussi Kivilinna (1):
crypto: sha256_ssse3 - fix stack corruption with SSSE3 and AVX implementations
arch/x86/crypto/sha256-avx-asm.S | 2 +-
arch/x86/crypto/sha256-ssse3-asm.S | 2 +-
drivers/crypto/caam/caamalg.c | 4 ++--
3 files changed, 4 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.10
2013-05-28 5:52 ` Crypto Fixes for 3.10 Herbert Xu
@ 2013-06-10 9:05 ` Herbert Xu
2013-06-20 13:29 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-06-10 9:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem in sahara and temporarily disables
two new optimisations because of performance regressions until a
permanent fix is ready.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Arnd Bergmann (1):
crypto: sahara - fix building as module
Jussi Kivilinna (2):
crypto: twofish - disable AVX2 implementation
crypto: blowfish - disable AVX2 implementation
crypto/Kconfig | 2 ++
drivers/crypto/sahara.c | 2 +-
2 files changed, 3 insertions(+), 1 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.10
2013-06-10 9:05 ` Herbert Xu
@ 2013-06-20 13:29 ` Herbert Xu
2013-06-27 13:02 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-06-20 13:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes an unaligned crash in XTS mode when using aseni_intel.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Jussi Kivilinna (1):
crypto: aesni_intel - fix accessing of unaligned memory
arch/x86/crypto/aesni-intel_asm.S | 48 ++++++++++++++++++++++++------------
1 files changed, 32 insertions(+), 16 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.10
2013-06-20 13:29 ` Herbert Xu
@ 2013-06-27 13:02 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-06-27 13:02 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a crash in the crypto layer exposed by an SCTP
test tool.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: algboss - Hold ref count on larval
crypto/algboss.c | 15 ++++++++-------
crypto/api.c | 6 ------
crypto/internal.h | 6 ++++++
3 files changed, 14 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.11
2013-05-02 1:47 ` Crypto Update for 3.10 Herbert Xu
@ 2013-07-05 9:52 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-07-05 9:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.11:
* Do not idle omap device between crypto operations in one session.
* Added sha224/sha384 shims for SSSE3.
* More optimisations for camellia-aesni-avx2.
* Removed defunct blowfish/twofish AVX2 implementations.
* Added unaligned buffer self-tests.
* Added PCLMULQDQ optimisation for CRCT10DIF.
* Added support for Freescale's DCP co-processor
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andrei Varvara (8):
crypto: caam - fix SEQ IN PTR command when RTO or PRE bit is set
crypto: caam - Fix STORE command to support overwriting Shared Descriptor's memory
crypto: caam - Add MATH command to support shld function
crypto: caam - Add new macros for building extended SEC descriptors (> 64 words)
crypto: caam - Add defines for overwriting Descriptor's memory
crypto: caam - Add defines for CAAM commands
crypto: caam - Add define for Adjust Output Frame Length in PDB
crypto: caam - add missing flag for the LOAD/STORE commands
Arnd Bergmann (1):
hwrng: bcm2835 - fix MODULE_LICENSE tag
Herbert Xu (2):
crypto: crct10dif - Use PTR_RET
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto
Jingoo Han (6):
hwrng: atmel - remove unnecessary platform_set_drvdata()
hwrng: bcm63xx - remove unnecessary platform_set_drvdata()
hwrng: timeriomem - remove unnecessary platform_set_drvdata()
hwrng: tx4939 - remove unnecessary platform_set_drvdata()
hwrng: use platform_{get,set}_drvdata()
crypto: picoxcell - replace strict_strtoul() with kstrtoul()
Joel A Fernandes (1):
crypto: omap-aes - Don't idle/start AES device between Encrypt operations
Jussi Kivilinna (10):
crypto: sha512_generic - set cra_driver_name
crypto: sha512_ssse3 - add sha384 support
crypto: sha256_ssse3 - add sha224 support
crypto: camellia-aesni-avx2 - tune assembly code for more performance
Revert "crypto: blowfish - add AVX2/x86_64 implementation of blowfish cipher"
Revert "crypto: twofish - add AVX2/x86_64 assembler implementation of twofish cipher"
crypto: testmgr - check that entries in alg_test_descs are in correct order
crypto: testmgr - test skciphers with unaligned buffers
crypto: testmgr - test AEADs with unaligned buffers
crypto: testmgr - test hash implementations with unaligned buffers
Lars-Peter Clausen (1):
crypto: hifn_795x - Pass correct pointer to free_irq()
Laurent Navet (1):
drivers: crypto: use devm_ioremap_resource()
Linus Walleij (1):
hwrng: nomadik - use clk_prepare_enable()
Paul Bolle (1):
crypto: sahara - remove dependency on EXPERIMENTAL
Ruchika Gupta (1):
crypto: caam - FIX RNG init for RNG greater than equal to 4
Sachin Kamat (6):
crypto: mv_cesa: Remove redundant platform_set_drvdata()
crypto: s5p-sss: Remove redundant platform_set_drvdata()
crypto: dcp - Remove redundant platform_set_drvdata()
crypto: dcp - Use devm_* APIs
crypto: dcp - Use NULL instead of 0
crypto: dcp - Staticize local symbols
Thomas Meyer (1):
crypto: ux500 - Cocci spatch "resource_size.spatch"
Tim Chen (4):
crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework
crypto: crct10dif - Accelerated CRC T10 DIF computation with PCLMULQDQ instruction
crypto: crct10dif - Glue code to cast accelerated CRCT10DIF assembly as a crypto transform
crypto: crct10dif - Simple correctness and speed test for CRCT10DIF hash
Tobias Rauter (1):
crypto: dcp - Added support for Freescale's DCP co-processor
arch/arm/boot/dts/imx28.dtsi | 2 +-
arch/x86/crypto/Makefile | 8 +-
arch/x86/crypto/blowfish-avx2-asm_64.S | 449 -------------
arch/x86/crypto/blowfish_avx2_glue.c | 585 -----------------
arch/x86/crypto/blowfish_glue.c | 32 +-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 160 +++--
arch/x86/crypto/crct10dif-pcl-asm_64.S | 643 ++++++++++++++++++
arch/x86/crypto/crct10dif-pclmul_glue.c | 151 +++++
arch/x86/crypto/sha256_ssse3_glue.c | 57 ++-
arch/x86/crypto/sha512_ssse3_glue.c | 58 ++-
arch/x86/crypto/twofish-avx2-asm_64.S | 600 -----------------
arch/x86/crypto/twofish_avx2_glue.c | 584 ----------------
arch/x86/crypto/twofish_avx_glue.c | 14 +-
arch/x86/include/asm/crypto/blowfish.h | 43 --
arch/x86/include/asm/crypto/twofish.h | 18 -
crypto/Kconfig | 63 +--
crypto/Makefile | 1 +
crypto/crct10dif.c | 178 +++++
crypto/sha512_generic.c | 2 +
crypto/tcrypt.c | 8 +
crypto/testmgr.c | 176 ++++-
crypto/testmgr.h | 33 +
drivers/char/hw_random/atmel-rng.c | 2 -
drivers/char/hw_random/bcm2835-rng.c | 2 +-
drivers/char/hw_random/bcm63xx-rng.c | 2 -
drivers/char/hw_random/n2-drv.c | 6 +-
drivers/char/hw_random/nomadik-rng.c | 2 +-
drivers/char/hw_random/octeon-rng.c | 4 +-
drivers/char/hw_random/omap-rng.c | 6 +-
drivers/char/hw_random/timeriomem-rng.c | 2 -
drivers/char/hw_random/tx4939-rng.c | 1 -
drivers/crypto/Kconfig | 12 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/caam/ctrl.c | 10 +-
drivers/crypto/caam/desc.h | 22 +-
drivers/crypto/caam/desc_constr.h | 81 +++-
drivers/crypto/caam/pdb.h | 1 +
drivers/crypto/caam/regs.h | 42 ++-
drivers/crypto/dcp.c | 912 ++++++++++++++++++++++++++
drivers/crypto/hifn_795x.c | 4 +-
drivers/crypto/mv_cesa.c | 1 -
drivers/crypto/omap-aes.c | 36 +-
drivers/crypto/omap-sham.c | 7 +-
drivers/crypto/picoxcell_crypto.c | 2 +-
drivers/crypto/s5p-sss.c | 2 -
drivers/crypto/ux500/cryp/cryp_core.c | 2 +-
include/linux/crc-t10dif.h | 4 +
lib/Kconfig | 2 +
lib/crc-t10dif.c | 73 +--
49 files changed, 2542 insertions(+), 2564 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.11
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
` (2 preceding siblings ...)
2013-05-28 5:52 ` Crypto Fixes for 3.10 Herbert Xu
@ 2013-07-24 7:23 ` Herbert Xu
2013-09-13 11:30 ` Crypto Fixes for 3.12 Herbert Xu
2013-12-03 12:41 ` Crypto Fixes for 3.13 Herbert Xu
5 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-07-24 7:23 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a memory corruption issue in caam, as well as
reverting the new optimised crct10dif implementation as it breaks
boot on initrd systems.
Hopefully crct10dif will be reinstated once the supporting code
is added so that it doesn't break boot.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
Revert "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework"
Vakul Garg (1):
crypto: caam - Fixed the memory out of bound overwrite issue
arch/x86/crypto/Makefile | 2 -
arch/x86/crypto/crct10dif-pcl-asm_64.S | 643 -------------------------------
arch/x86/crypto/crct10dif-pclmul_glue.c | 151 --------
crypto/Kconfig | 19 -
crypto/Makefile | 1 -
crypto/crct10dif.c | 178 ---------
crypto/tcrypt.c | 8 -
crypto/testmgr.c | 10 -
crypto/testmgr.h | 33 --
drivers/crypto/caam/caamhash.c | 2 +-
include/linux/crc-t10dif.h | 4 -
lib/Kconfig | 2 -
lib/crc-t10dif.c | 73 ++--
13 files changed, 44 insertions(+), 1082 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.12
2013-02-23 2:33 ` Crypto Update for 3.9 Herbert Xu
2013-05-02 1:47 ` Crypto Update for 3.10 Herbert Xu
@ 2013-09-07 3:55 ` Herbert Xu
2013-11-07 8:01 ` Crypto Update for 3.13 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-09-07 3:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.12:
* Added MODULE_SOFTDEP to allow pre-loading of modules.
* Reinstated crct10dif driver using the module softdep feature.
* Allow via rng driver to be auto-loaded.
* Split large input data when necessary in nx.
* Handle zero length messages correctly for GCM/XCBC in nx.
* Handle SHA-2 chunks bigger than block size properly in nx.
* Handle unaligned lengths in omap-aes.
* Added SHA384/SHA512 to omap-sham.
* Added OMAP5/AM43XX SHAM support.
* Added OMAP4 TRNG support.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (2):
crypto: caam - replace xstr macro with __stringify
crypto: caam - add option for enabling DEBUG mode
Andi Kleen (1):
crypto: make tables used from assembler __visible
Andreas Robinson (1):
modules: add support for soft module dependencies
Ben Hutchings (1):
hwrng: via - Add MODULE_DEVICE_TABLE
Chen Gang (1):
padata - share code between CPU_ONLINE and CPU_DOWN_FAILED, same to CPU_DOWN_PREPARE and CPU_UP_CANCELED
Cristian Stoica (1):
crypto: testmgr - remove double execution of the same test suite
Dan Carpenter (2):
crypto: sahara - checking the wrong variable
crypto: tegra-aes - bitwise vs logical and
Fabio Estevam (1):
hwrng: mxc-rnga - Check the return value from clk_prepare_enable()
Fionnuala Gunter (3):
crypto: nx - saves chaining value from co-processor
crypto: nx - fix limits to sg lists for AES-XCBC
crypto: nx - fix limits to sg lists for AES-CCM
Herbert Xu (2):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
Reinstate "crypto: crct10dif - Wrap crc_t10dif function all to use crypto transform framework"
Jan-Simon Möller (1):
crypto: fcrypt - Fix bitoperation for compilation with clang
Jingoo Han (3):
hwrng: pixocel - Staticize 'rng_dev'
crypto: sahara - Staticize local symbol
crypto: crypto4xx - Staticize local symbols
Joe Perches (1):
crypto: ux500 - Fix logging, make arrays const, neatening
Joel Fernandes (14):
crypto: scatterwalk - Add support for calculating number of SG elements
crypto: omap-aes - Add useful debug macros
crypto: omap-aes - Populate number of SG elements
crypto: omap-aes - Simplify DMA usage by using direct SGs
crypto: omap-aes - Sync SG before DMA operation
crypto: omap-aes - Remove previously used intermediate buffers
crypto: omap-aes - Add IRQ info and helper macros
crypto: omap-aes - PIO mode: Add IRQ handler and walk SGs
crypto: omap-aes - PIO mode: platform data for OMAP4/AM437x and trigger
crypto: omap-aes - Switch to PIO mode during probe
crypto: omap-aes - Add support for cases of unaligned lengths
crypto: omap-aes - Convert kzalloc to devm_kzalloc
crypto: omap-aes - Convert request_irq to devm_request_irq
crypto: omap-aes - Kconfig: Add build support for AM437x
John Haxby (1):
crypto: xor - Check for osxsave as well as avx in crypto/xor
Julia Lawall (3):
hwrng: tx4939 - simplify use of devm_ioremap_resource
crypto: camellia-x86-64 - replace commas by semicolons and adjust code alignment
crypto: camellia_generic - replace commas by semicolons and adjust code alignment
Lokesh Vutla (12):
crypto: omap-sham - Add SHA384 and SHA512 Support
crypto: omap-sham - Add OMAP5/AM43XX SHAM Support
crypto: omap-sham - Convert to devm_request_irq()
crypto: omap-sham - Convert to devm_kzalloc()
hwrng: omap - Use module_platform_driver macro
hwrng: omap - Convert to devm_kzalloc()
hwrng: omap - Remove duplicated function call
hwrng: omap - Add device tree support
ARM: OMAP2+: Only manually add hwmod data when DT not used.
hwrng: omap - Add OMAP4 TRNG support
crypto: omap-sham - Enable Polling mode if DMA fails
crypto: omap-sham - correct dma burst size
Marcelo Cerri (11):
crypto: nx - fix physical addresses added to sg lists
crypto: nx - fix limits to sg lists for SHA-2
crypto: nx - fix concurrency issue
crypto: nx - add offset to nx_build_sg_lists()
crypto: nx - fix limits to sg lists for AES-ECB
crypto: nx - fix limits to sg lists for AES-CBC
crypto: nx - fix limits to sg lists for AES-CTR
crypto: nx - fix limits to sg lists for AES-GCM
crypto: nx - fix XCBC for zero length messages
crypto: nx - fix GCM for zero length messages
crypto: nx - fix SHA-2 for chunks bigger than block size
Olof Johansson (1):
hwrng: omap - reorder OMAP TRNG driver code
Richard Weinberger (1):
padata - Register hotcpu notifier after initialization
Ruchika Gupta (2):
crypto: caam - RNG instantiation by directly programming DECO
crypto: caam - Remove unused functions from Job Ring
Vakul Garg (1):
crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h
jmlatten@linux.vnet.ibm.com (1):
crypto: nx - fix nx-aes-gcm verification
arch/arm/mach-omap2/devices.c | 2 +-
arch/x86/crypto/Makefile | 2 +
arch/x86/crypto/camellia_glue.c | 64 +--
arch/x86/crypto/crct10dif-pcl-asm_64.S | 643 +++++++++++++++++++++++++++++++
arch/x86/crypto/crct10dif-pclmul_glue.c | 151 ++++++++
arch/x86/include/asm/xor_avx.h | 4 +-
crypto/Kconfig | 19 +
crypto/Makefile | 1 +
crypto/aes_generic.c | 8 +-
crypto/camellia_generic.c | 48 +--
crypto/cast_common.c | 8 +-
crypto/crct10dif.c | 178 +++++++++
crypto/fcrypt.c | 2 +-
crypto/scatterwalk.c | 22 ++
crypto/tcrypt.c | 8 +
crypto/testmgr.c | 12 +-
crypto/testmgr.h | 33 ++
drivers/char/hw_random/Kconfig | 6 +-
drivers/char/hw_random/mxc-rnga.c | 4 +-
drivers/char/hw_random/omap-rng.c | 386 +++++++++++++++----
drivers/char/hw_random/picoxcell-rng.c | 2 +-
drivers/char/hw_random/tx4939-rng.c | 4 +-
drivers/char/hw_random/via-rng.c | 7 +
drivers/crypto/Kconfig | 13 +-
drivers/crypto/amcc/crypto4xx_alg.c | 15 +-
drivers/crypto/caam/Kconfig | 8 +
drivers/crypto/caam/Makefile | 3 +
drivers/crypto/caam/caamalg.c | 80 ++--
drivers/crypto/caam/caamhash.c | 70 ++--
drivers/crypto/caam/ctrl.c | 77 ++--
drivers/crypto/caam/desc_constr.h | 1 +
drivers/crypto/caam/intern.h | 5 -
drivers/crypto/caam/jr.c | 67 ----
drivers/crypto/caam/jr.h | 2 -
drivers/crypto/caam/key_gen.c | 6 +-
drivers/crypto/caam/regs.h | 12 +-
drivers/crypto/nx/nx-aes-cbc.c | 57 ++-
drivers/crypto/nx/nx-aes-ccm.c | 283 ++++++++++----
drivers/crypto/nx/nx-aes-ctr.c | 52 ++-
drivers/crypto/nx/nx-aes-ecb.c | 50 ++-
drivers/crypto/nx/nx-aes-gcm.c | 296 ++++++++++----
drivers/crypto/nx/nx-aes-xcbc.c | 205 +++++++---
drivers/crypto/nx/nx-sha256.c | 124 +++---
drivers/crypto/nx/nx-sha512.c | 131 ++++---
drivers/crypto/nx/nx.c | 35 +-
drivers/crypto/nx/nx.h | 3 +-
drivers/crypto/omap-aes.c | 468 ++++++++++++----------
drivers/crypto/omap-sham.c | 382 ++++++++++++++----
drivers/crypto/sahara.c | 4 +-
drivers/crypto/tegra-aes.c | 6 +-
drivers/crypto/ux500/hash/hash_core.c | 586 ++++++++++++++--------------
include/crypto/scatterwalk.h | 2 +
include/linux/crc-t10dif.h | 4 +
include/linux/module.h | 5 +
kernel/padata.c | 32 +-
lib/Kconfig | 2 +
lib/crc-t10dif.c | 74 ++--
57 files changed, 3410 insertions(+), 1364 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.12
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
` (3 preceding siblings ...)
2013-07-24 7:23 ` Crypto Fixes for 3.11 Herbert Xu
@ 2013-09-13 11:30 ` Herbert Xu
2013-09-13 14:22 ` Linus Torvalds
2013-12-03 12:41 ` Crypto Fixes for 3.13 Herbert Xu
5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-09-13 11:30 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a 7+ year race condition in the crypto API that
causes sporadic crashes when multiple threads load the same
algorithm.
It also fixes the crct10dif algorithm again to prevent boot
failures on systems where the initramfs tool ignores module
softdeps.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (2):
crypto: api - Fix race condition in larval lookup
crypto: crct10dif - Add fallback for broken initrds
crypto/Makefile | 2 +-
crypto/api.c | 7 +-
crypto/{crct10dif.c => crct10dif_common.c} | 100 +--------------------------
crypto/{crct10dif.c => crct10dif_generic.c} | 53 +-------------
lib/crc-t10dif.c | 11 ++-
5 files changed, 20 insertions(+), 153 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.12
2013-09-13 11:30 ` Crypto Fixes for 3.12 Herbert Xu
@ 2013-09-13 14:22 ` Linus Torvalds
2013-09-13 14:39 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2013-09-13 14:22 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Sep 13, 2013 at 4:30 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Herbert Xu (2):
> crypto: api - Fix race condition in larval lookup
> crypto: crct10dif - Add fallback for broken initrds
>
> crypto/Makefile | 2 +-
> crypto/api.c | 7 +-
> crypto/{crct10dif.c => crct10dif_common.c} | 100 +--------------------------
> crypto/{crct10dif.c => crct10dif_generic.c} | 53 +-------------
> lib/crc-t10dif.c | 11 ++-
> 5 files changed, 20 insertions(+), 153 deletions(-)
Please fix your script. You apparently have it using "-C" to find
copies, which can be very useful to see what is going on especially
with "--summary" (which you don't have), but is misleading when
sending diffstats when people don't expect it.
The pull request does not have "20 insertions", it has "146
insertions", and it's just that a fair chunk of them come from a file
being essentially duplicated. See the difference:
With copy detection ("git diff -C --stat --summary")
crypto/Makefile | 2 +-
crypto/api.c | 7 +-
crypto/{crct10dif.c => crct10dif_common.c} | 100 +-------------------
crypto/{crct10dif.c => crct10dif_generic.c} | 53 +----------
lib/crc-t10dif.c | 11 ++-
5 files changed, 20 insertions(+), 153 deletions(-)
copy crypto/{crct10dif.c => crct10dif_common.c} (63%)
rename crypto/{crct10dif.c => crct10dif_generic.c} (55%)
With just rename detection (git diff -M --stat --summary)
crypto/Makefile | 2 +-
crypto/api.c | 7 +-
crypto/{crct10dif.c => crct10dif_common.c} | 100 +---------------
crypto/crct10dif_generic.c | 127 +++++++++++++++++++++
lib/crc-t10dif.c | 11 +-
5 files changed, 146 insertions(+), 101 deletions(-)
rename crypto/{crct10dif.c => crct10dif_common.c} (63%)
create mode 100644 crypto/crct10dif_generic.c
and your pull request looked really misleading because it did "-C" but
didn't have that summary pointing out that one of them was a copy.
So please use "-M --stat --summary". That's what git shows me when I
do a "git pull", so that's what I'm going to compare with..
As mentioned "-C" _is_ useful, but it's useful when you're
specifically looking for "that's a lot of new lines, is it copying old
files" kind of things.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.12
2013-09-13 14:22 ` Linus Torvalds
@ 2013-09-13 14:39 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-09-13 14:39 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Sep 13, 2013 at 07:22:55AM -0700, Linus Torvalds wrote:
> On Fri, Sep 13, 2013 at 4:30 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Herbert Xu (2):
> > crypto: api - Fix race condition in larval lookup
> > crypto: crct10dif - Add fallback for broken initrds
> >
> > crypto/Makefile | 2 +-
> > crypto/api.c | 7 +-
> > crypto/{crct10dif.c => crct10dif_common.c} | 100 +--------------------------
> > crypto/{crct10dif.c => crct10dif_generic.c} | 53 +-------------
> > lib/crc-t10dif.c | 11 ++-
> > 5 files changed, 20 insertions(+), 153 deletions(-)
>
> Please fix your script. You apparently have it using "-C" to find
> copies, which can be very useful to see what is going on especially
> with "--summary" (which you don't have), but is misleading when
> sending diffstats when people don't expect it.
Sorry, will do for future pushes. FWIW the -M stats are
crypto/Makefile | 2 +-
crypto/api.c | 7 +-
crypto/{crct10dif.c => crct10dif_common.c} | 100 +---------------------
crypto/crct10dif_generic.c | 127 ++++++++++++++++++++++++++++
lib/crc-t10dif.c | 11 ++-
5 files changed, 146 insertions(+), 101 deletions(-)
> With just rename detection (git diff -M --stat --summary)
> crypto/Makefile | 2 +-
> crypto/api.c | 7 +-
> crypto/{crct10dif.c => crct10dif_common.c} | 100 +---------------
> crypto/crct10dif_generic.c | 127 +++++++++++++++++++++
> lib/crc-t10dif.c | 11 +-
> 5 files changed, 146 insertions(+), 101 deletions(-)
> rename crypto/{crct10dif.c => crct10dif_common.c} (63%)
> create mode 100644 crypto/crct10dif_generic.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.13
2013-09-07 3:55 ` Crypto Update for 3.12 Herbert Xu
@ 2013-11-07 8:01 ` Herbert Xu
2013-11-12 16:41 ` Herbert Xu
2014-01-23 11:53 ` Crypto Update for 3.14 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-07 8:01 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.13:
* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.
* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (7):
crypto: caam - fix RNG state handle instantiation descriptor
crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
crypto: caam - fix RNG4 instantiation
crypto: caam - split RNG4 instantiation function
crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
crypto: caam - fix RNG4 AAI defines
crypto: caam - enable instantiation of all RNG4 state handles
Ard Biesheuvel (2):
crypto: create generic version of ablk_helper
crypto: move x86 to the generic version of ablk_helper
Ben Hutchings (1):
hwrng: via-rng - Mark device ID table as __maybe_unused
Fabio Estevam (4):
crypto: dcp - Use devm_ioremap_resource()
crypto: dcp - Use devm_request_irq()
crypto: dcp - Fix the path for releasing the resources
crypto: dcp - Check the return value from devm_ioremap_resource()
Herbert Xu (2):
crypto: skcipher - Use eseqiv even on UP machines
crypto: s390 - Fix aes-cbc IV corruption
James Yonan (1):
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
Joel Fernandes (1):
crypto: omap-aes - Fix CTR mode counter length
Joni Lapilainen (1):
crypto: omap-sham - Add missing modalias
Jussi Kivilinna (2):
crypto: sha256_ssse3 - use correct module alias for sha224
crypto: x86 - restore avx2_supported check
Linus Walleij (1):
crypto: tegra - use kernel entropy instead of ad-hoc
Mathias Krause (6):
crypto: authenc - Export key parsing helper function
crypto: authencesn - Simplify key parsing
crypto: ixp4xx - Simplify and harden key parsing
crypto: picoxcell - Simplify and harden key parsing
crypto: talitos - Simplify key parsing
padata: make the sequence counter an atomic_t
Michael Ellerman (2):
hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
hwrng: pseries - Return errors to upper levels in pseries-rng.c
Michael Opdenacker (1):
crypto: mv_cesa: remove deprecated IRQF_DISABLED
Neil Horman (1):
crypto: ansi_cprng - Fix off by one error in non-block size request
Oliver Neukum (1):
crypto: sha256_ssse3 - also test for BMI2
Pali Rohár (1):
hwrng: OMAP3 ROM Random Number Generator support
Ruchika Gupta (3):
crypto: caam - Add Platform driver for Job Ring
crypto: caam - Add API's to allocate/free Job Rings
crypto: caam - Modify the interface layers to use JR API's
Sachin Kamat (7):
crypto: mv_cesa - Staticize local symbols
crypto: omap-aes - Staticize local symbols
crypto: tegra-aes - Staticize tegra_aes_cra_exit
crypto: tegra-aes - Fix NULL pointer dereference
crypto: tegra-aes - Use devm_clk_get
crypto: sahara - Remove redundant of_match_ptr
crypto: mv_cesa - Remove redundant of_match_ptr
Stanimir Varbanov (2):
ARM: DT: msm: Add Qualcomm's PRNG driver binding document
hwrng: msm - Add PRNG support for MSM SoC's
Stephen Warren (1):
ARM: tegra: remove tegra_chip_uid()
Yashpal Dutta (1):
crypto: caam - map src buffer before access
kbuild test robot (1):
crypto: ablk_helper - Replace memcpy with struct assignment
.../devicetree/bindings/rng/qcom,prng.txt | 17 +
arch/arm/mach-tegra/fuse.c | 10 -
arch/s390/crypto/aes_s390.c | 19 +-
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aesni-intel_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 2 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/serpent_avx2_glue.c | 2 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 4 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/include/asm/simd.h | 11 +
crypto/Kconfig | 23 +-
crypto/Makefile | 8 +-
{arch/x86/crypto => crypto}/ablk_helper.c | 13 +-
crypto/ablkcipher.c | 21 +-
crypto/ansi_cprng.c | 4 +-
crypto/asymmetric_keys/rsa.c | 5 +-
crypto/authenc.c | 54 ++-
crypto/authencesn.c | 34 +--
crypto/ccm.c | 4 +-
crypto/gcm.c | 2 +-
crypto/memneq.c | 138 +++++++
drivers/char/hw_random/Kconfig | 25 ++
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/msm-rng.c | 197 +++++++++
drivers/char/hw_random/omap3-rom-rng.c | 141 +++++++
drivers/char/hw_random/pseries-rng.c | 19 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/caam/Kconfig | 25 +-
drivers/crypto/caam/Makefile | 4 +-
drivers/crypto/caam/caamalg.c | 83 +---
drivers/crypto/caam/caamhash.c | 88 ++---
drivers/crypto/caam/caamrng.c | 29 +-
drivers/crypto/caam/ctrl.c | 418 ++++++++++++++++----
drivers/crypto/caam/desc.h | 17 +-
drivers/crypto/caam/intern.h | 20 +-
drivers/crypto/caam/jr.c | 339 +++++++++++-----
drivers/crypto/caam/jr.h | 5 +-
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/caam/sg_sw_sec4.h | 34 ++-
drivers/crypto/dcp.c | 49 +--
drivers/crypto/ixp4xx_crypto.c | 26 +-
drivers/crypto/mv_cesa.c | 14 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-sham.c | 1 +
drivers/crypto/picoxcell_crypto.c | 32 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 35 +--
drivers/crypto/tegra-aes.c | 26 +-
include/asm-generic/simd.h | 14 +
.../include/asm => include}/crypto/ablk_helper.h | 0
include/crypto/algapi.h | 18 +-
include/crypto/authenc.h | 12 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 9 +-
59 files changed, 1454 insertions(+), 643 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.13
2013-11-07 8:01 ` Crypto Update for 3.13 Herbert Xu
@ 2013-11-12 16:41 ` Herbert Xu
2013-11-12 16:59 ` Borislav Petkov
` (2 more replies)
2014-01-23 11:53 ` Crypto Update for 3.14 Herbert Xu
1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-12 16:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.13:
* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.
* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (7):
crypto: caam - fix RNG state handle instantiation descriptor
crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
crypto: caam - fix RNG4 instantiation
crypto: caam - split RNG4 instantiation function
crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
crypto: caam - fix RNG4 AAI defines
crypto: caam - enable instantiation of all RNG4 state handles
Ard Biesheuvel (2):
crypto: create generic version of ablk_helper
crypto: move x86 to the generic version of ablk_helper
Ben Hutchings (1):
hwrng: via-rng - Mark device ID table as __maybe_unused
Fabio Estevam (4):
crypto: dcp - Use devm_ioremap_resource()
crypto: dcp - Use devm_request_irq()
crypto: dcp - Fix the path for releasing the resources
crypto: dcp - Check the return value from devm_ioremap_resource()
Herbert Xu (2):
crypto: skcipher - Use eseqiv even on UP machines
crypto: s390 - Fix aes-cbc IV corruption
James Yonan (1):
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
Joel Fernandes (1):
crypto: omap-aes - Fix CTR mode counter length
Joni Lapilainen (1):
crypto: omap-sham - Add missing modalias
Jussi Kivilinna (2):
crypto: sha256_ssse3 - use correct module alias for sha224
crypto: x86 - restore avx2_supported check
Linus Walleij (1):
crypto: tegra - use kernel entropy instead of ad-hoc
Mathias Krause (6):
crypto: authenc - Export key parsing helper function
crypto: authencesn - Simplify key parsing
crypto: ixp4xx - Simplify and harden key parsing
crypto: picoxcell - Simplify and harden key parsing
crypto: talitos - Simplify key parsing
padata: make the sequence counter an atomic_t
Michael Ellerman (2):
hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
hwrng: pseries - Return errors to upper levels in pseries-rng.c
Michael Opdenacker (1):
crypto: mv_cesa: remove deprecated IRQF_DISABLED
Neil Horman (1):
crypto: ansi_cprng - Fix off by one error in non-block size request
Oliver Neukum (1):
crypto: sha256_ssse3 - also test for BMI2
Pali Rohár (1):
hwrng: OMAP3 ROM Random Number Generator support
Ruchika Gupta (3):
crypto: caam - Add Platform driver for Job Ring
crypto: caam - Add API's to allocate/free Job Rings
crypto: caam - Modify the interface layers to use JR API's
Sachin Kamat (7):
crypto: mv_cesa - Staticize local symbols
crypto: omap-aes - Staticize local symbols
crypto: tegra-aes - Staticize tegra_aes_cra_exit
crypto: tegra-aes - Fix NULL pointer dereference
crypto: tegra-aes - Use devm_clk_get
crypto: sahara - Remove redundant of_match_ptr
crypto: mv_cesa - Remove redundant of_match_ptr
Stanimir Varbanov (2):
ARM: DT: msm: Add Qualcomm's PRNG driver binding document
hwrng: msm - Add PRNG support for MSM SoC's
Stephen Warren (1):
ARM: tegra: remove tegra_chip_uid()
Yashpal Dutta (1):
crypto: caam - map src buffer before access
kbuild test robot (1):
crypto: ablk_helper - Replace memcpy with struct assignment
.../devicetree/bindings/rng/qcom,prng.txt | 17 +
arch/arm/mach-tegra/fuse.c | 10 -
arch/s390/crypto/aes_s390.c | 19 +-
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aesni-intel_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 2 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/serpent_avx2_glue.c | 2 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 4 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/include/asm/simd.h | 11 +
crypto/Kconfig | 23 +-
crypto/Makefile | 8 +-
{arch/x86/crypto => crypto}/ablk_helper.c | 13 +-
crypto/ablkcipher.c | 21 +-
crypto/ansi_cprng.c | 4 +-
crypto/asymmetric_keys/rsa.c | 5 +-
crypto/authenc.c | 54 ++-
crypto/authencesn.c | 34 +--
crypto/ccm.c | 4 +-
crypto/gcm.c | 2 +-
crypto/memneq.c | 138 +++++++
drivers/char/hw_random/Kconfig | 25 ++
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/msm-rng.c | 197 +++++++++
drivers/char/hw_random/omap3-rom-rng.c | 141 +++++++
drivers/char/hw_random/pseries-rng.c | 19 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/caam/Kconfig | 25 +-
drivers/crypto/caam/Makefile | 4 +-
drivers/crypto/caam/caamalg.c | 83 +---
drivers/crypto/caam/caamhash.c | 88 ++---
drivers/crypto/caam/caamrng.c | 29 +-
drivers/crypto/caam/ctrl.c | 418 ++++++++++++++++----
drivers/crypto/caam/desc.h | 17 +-
drivers/crypto/caam/intern.h | 20 +-
drivers/crypto/caam/jr.c | 339 +++++++++++-----
drivers/crypto/caam/jr.h | 5 +-
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/caam/sg_sw_sec4.h | 34 ++-
drivers/crypto/dcp.c | 49 +--
drivers/crypto/ixp4xx_crypto.c | 26 +-
drivers/crypto/mv_cesa.c | 14 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-sham.c | 1 +
drivers/crypto/picoxcell_crypto.c | 32 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 35 +--
drivers/crypto/tegra-aes.c | 26 +-
include/asm-generic/simd.h | 14 +
.../include/asm => include}/crypto/ablk_helper.h | 0
include/crypto/algapi.h | 18 +-
include/crypto/authenc.h | 12 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 9 +-
59 files changed, 1454 insertions(+), 643 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.13
2013-11-12 16:41 ` Herbert Xu
@ 2013-11-12 16:59 ` Borislav Petkov
2013-11-12 18:27 ` Herbert Xu
2013-11-19 2:21 ` [GIT] " Herbert Xu
2013-11-23 1:34 ` Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Borislav Petkov @ 2013-11-12 16:59 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Nov 13, 2013 at 12:41:52AM +0800, Herbert Xu wrote:
> Hi Linus:
>
> Here is the crypto update for 3.13:
>
> * Made x86 ablk_helper generic for ARM.
> * Phase out chainiv in favour of eseqiv (affects IPsec).
> * Fixed aes-cbc IV corruption on s390.
> * Added constant-time crypto_memneq which replaces memcmp.
>
> * Fixed aes-ctr in omap-aes.
> * Added OMAP3 ROM RNG support.
> * Add PRNG support for MSM SoC's
> * Add and use Job Ring API in caam.
>
> * Misc fixes.
Maybe add this one to that:
http://marc.info/?l=linux-kernel&m=138078878205385&w=2
?
--
Regards/Gruss,
Boris.
Sent from a fat crate under my desk. Formatting is fine.
--
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.13
2013-11-12 16:59 ` Borislav Petkov
@ 2013-11-12 18:27 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-12 18:27 UTC (permalink / raw)
To: Borislav Petkov
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, James Morris
On Tue, Nov 12, 2013 at 05:59:34PM +0100, Borislav Petkov wrote:
> On Wed, Nov 13, 2013 at 12:41:52AM +0800, Herbert Xu wrote:
> > Hi Linus:
> >
> > Here is the crypto update for 3.13:
> >
> > * Made x86 ablk_helper generic for ARM.
> > * Phase out chainiv in favour of eseqiv (affects IPsec).
> > * Fixed aes-cbc IV corruption on s390.
> > * Added constant-time crypto_memneq which replaces memcmp.
> >
> > * Fixed aes-ctr in omap-aes.
> > * Added OMAP3 ROM RNG support.
> > * Add PRNG support for MSM SoC's
> > * Add and use Job Ring API in caam.
> >
> > * Misc fixes.
>
> Maybe add this one to that:
>
> http://marc.info/?l=linux-kernel&m=138078878205385&w=2
>
> ?
I think this should probably go through James Morris's tree.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* [GIT] Crypto Update for 3.13
2013-11-12 16:41 ` Herbert Xu
2013-11-12 16:59 ` Borislav Petkov
@ 2013-11-19 2:21 ` Herbert Xu
2013-11-23 1:34 ` Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-19 2:21 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is a resend of crypto the update for 3.13:
* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.
* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (7):
crypto: caam - fix RNG state handle instantiation descriptor
crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
crypto: caam - fix RNG4 instantiation
crypto: caam - split RNG4 instantiation function
crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
crypto: caam - fix RNG4 AAI defines
crypto: caam - enable instantiation of all RNG4 state handles
Ard Biesheuvel (2):
crypto: create generic version of ablk_helper
crypto: move x86 to the generic version of ablk_helper
Ben Hutchings (1):
hwrng: via-rng - Mark device ID table as __maybe_unused
Fabio Estevam (4):
crypto: dcp - Use devm_ioremap_resource()
crypto: dcp - Use devm_request_irq()
crypto: dcp - Fix the path for releasing the resources
crypto: dcp - Check the return value from devm_ioremap_resource()
Herbert Xu (2):
crypto: skcipher - Use eseqiv even on UP machines
crypto: s390 - Fix aes-cbc IV corruption
James Yonan (1):
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
Joel Fernandes (1):
crypto: omap-aes - Fix CTR mode counter length
Joni Lapilainen (1):
crypto: omap-sham - Add missing modalias
Jussi Kivilinna (2):
crypto: sha256_ssse3 - use correct module alias for sha224
crypto: x86 - restore avx2_supported check
Linus Walleij (1):
crypto: tegra - use kernel entropy instead of ad-hoc
Mathias Krause (6):
crypto: authenc - Export key parsing helper function
crypto: authencesn - Simplify key parsing
crypto: ixp4xx - Simplify and harden key parsing
crypto: picoxcell - Simplify and harden key parsing
crypto: talitos - Simplify key parsing
padata: make the sequence counter an atomic_t
Michael Ellerman (2):
hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
hwrng: pseries - Return errors to upper levels in pseries-rng.c
Michael Opdenacker (1):
crypto: mv_cesa: remove deprecated IRQF_DISABLED
Neil Horman (1):
crypto: ansi_cprng - Fix off by one error in non-block size request
Oliver Neukum (1):
crypto: sha256_ssse3 - also test for BMI2
Pali Rohár (1):
hwrng: OMAP3 ROM Random Number Generator support
Ruchika Gupta (3):
crypto: caam - Add Platform driver for Job Ring
crypto: caam - Add API's to allocate/free Job Rings
crypto: caam - Modify the interface layers to use JR API's
Sachin Kamat (7):
crypto: mv_cesa - Staticize local symbols
crypto: omap-aes - Staticize local symbols
crypto: tegra-aes - Staticize tegra_aes_cra_exit
crypto: tegra-aes - Fix NULL pointer dereference
crypto: tegra-aes - Use devm_clk_get
crypto: sahara - Remove redundant of_match_ptr
crypto: mv_cesa - Remove redundant of_match_ptr
Stanimir Varbanov (2):
ARM: DT: msm: Add Qualcomm's PRNG driver binding document
hwrng: msm - Add PRNG support for MSM SoC's
Stephen Warren (1):
ARM: tegra: remove tegra_chip_uid()
Yashpal Dutta (1):
crypto: caam - map src buffer before access
kbuild test robot (1):
crypto: ablk_helper - Replace memcpy with struct assignment
.../devicetree/bindings/rng/qcom,prng.txt | 17 +
arch/arm/mach-tegra/fuse.c | 10 -
arch/s390/crypto/aes_s390.c | 19 +-
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aesni-intel_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 2 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/serpent_avx2_glue.c | 2 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 4 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/include/asm/simd.h | 11 +
crypto/Kconfig | 23 +-
crypto/Makefile | 8 +-
{arch/x86/crypto => crypto}/ablk_helper.c | 13 +-
crypto/ablkcipher.c | 21 +-
crypto/ansi_cprng.c | 4 +-
crypto/asymmetric_keys/rsa.c | 5 +-
crypto/authenc.c | 54 ++-
crypto/authencesn.c | 34 +--
crypto/ccm.c | 4 +-
crypto/gcm.c | 2 +-
crypto/memneq.c | 138 +++++++
drivers/char/hw_random/Kconfig | 25 ++
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/msm-rng.c | 197 +++++++++
drivers/char/hw_random/omap3-rom-rng.c | 141 +++++++
drivers/char/hw_random/pseries-rng.c | 19 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/caam/Kconfig | 25 +-
drivers/crypto/caam/Makefile | 4 +-
drivers/crypto/caam/caamalg.c | 83 +---
drivers/crypto/caam/caamhash.c | 88 ++---
drivers/crypto/caam/caamrng.c | 29 +-
drivers/crypto/caam/ctrl.c | 418 ++++++++++++++++----
drivers/crypto/caam/desc.h | 17 +-
drivers/crypto/caam/intern.h | 20 +-
drivers/crypto/caam/jr.c | 339 +++++++++++-----
drivers/crypto/caam/jr.h | 5 +-
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/caam/sg_sw_sec4.h | 34 ++-
drivers/crypto/dcp.c | 49 +--
drivers/crypto/ixp4xx_crypto.c | 26 +-
drivers/crypto/mv_cesa.c | 14 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-sham.c | 1 +
drivers/crypto/picoxcell_crypto.c | 32 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 35 +--
drivers/crypto/tegra-aes.c | 26 +-
include/asm-generic/simd.h | 14 +
.../include/asm => include}/crypto/ablk_helper.h | 0
include/crypto/algapi.h | 18 +-
include/crypto/authenc.h | 12 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 9 +-
59 files changed, 1454 insertions(+), 643 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.13
2013-11-12 16:41 ` Herbert Xu
2013-11-12 16:59 ` Borislav Petkov
2013-11-19 2:21 ` [GIT] " Herbert Xu
@ 2013-11-23 1:34 ` Herbert Xu
2013-11-23 1:40 ` Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-11-23 1:34 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This is a resend.
Here is the crypto update for 3.13:
* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.
* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (7):
crypto: caam - fix RNG state handle instantiation descriptor
crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
crypto: caam - fix RNG4 instantiation
crypto: caam - split RNG4 instantiation function
crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
crypto: caam - fix RNG4 AAI defines
crypto: caam - enable instantiation of all RNG4 state handles
Ard Biesheuvel (2):
crypto: create generic version of ablk_helper
crypto: move x86 to the generic version of ablk_helper
Ben Hutchings (1):
hwrng: via-rng - Mark device ID table as __maybe_unused
Fabio Estevam (4):
crypto: dcp - Use devm_ioremap_resource()
crypto: dcp - Use devm_request_irq()
crypto: dcp - Fix the path for releasing the resources
crypto: dcp - Check the return value from devm_ioremap_resource()
Herbert Xu (2):
crypto: skcipher - Use eseqiv even on UP machines
crypto: s390 - Fix aes-cbc IV corruption
James Yonan (1):
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
Joel Fernandes (1):
crypto: omap-aes - Fix CTR mode counter length
Joni Lapilainen (1):
crypto: omap-sham - Add missing modalias
Jussi Kivilinna (2):
crypto: sha256_ssse3 - use correct module alias for sha224
crypto: x86 - restore avx2_supported check
Linus Walleij (1):
crypto: tegra - use kernel entropy instead of ad-hoc
Mathias Krause (6):
crypto: authenc - Export key parsing helper function
crypto: authencesn - Simplify key parsing
crypto: ixp4xx - Simplify and harden key parsing
crypto: picoxcell - Simplify and harden key parsing
crypto: talitos - Simplify key parsing
padata: make the sequence counter an atomic_t
Michael Ellerman (2):
hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
hwrng: pseries - Return errors to upper levels in pseries-rng.c
Michael Opdenacker (1):
crypto: mv_cesa: remove deprecated IRQF_DISABLED
Neil Horman (1):
crypto: ansi_cprng - Fix off by one error in non-block size request
Oliver Neukum (1):
crypto: sha256_ssse3 - also test for BMI2
Pali Rohár (1):
hwrng: OMAP3 ROM Random Number Generator support
Ruchika Gupta (3):
crypto: caam - Add Platform driver for Job Ring
crypto: caam - Add API's to allocate/free Job Rings
crypto: caam - Modify the interface layers to use JR API's
Sachin Kamat (7):
crypto: mv_cesa - Staticize local symbols
crypto: omap-aes - Staticize local symbols
crypto: tegra-aes - Staticize tegra_aes_cra_exit
crypto: tegra-aes - Fix NULL pointer dereference
crypto: tegra-aes - Use devm_clk_get
crypto: sahara - Remove redundant of_match_ptr
crypto: mv_cesa - Remove redundant of_match_ptr
Stanimir Varbanov (2):
ARM: DT: msm: Add Qualcomm's PRNG driver binding document
hwrng: msm - Add PRNG support for MSM SoC's
Stephen Warren (1):
ARM: tegra: remove tegra_chip_uid()
Yashpal Dutta (1):
crypto: caam - map src buffer before access
kbuild test robot (1):
crypto: ablk_helper - Replace memcpy with struct assignment
.../devicetree/bindings/rng/qcom,prng.txt | 17 +
arch/arm/mach-tegra/fuse.c | 10 -
arch/s390/crypto/aes_s390.c | 19 +-
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aesni-intel_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 2 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/serpent_avx2_glue.c | 2 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 4 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/include/asm/simd.h | 11 +
crypto/Kconfig | 23 +-
crypto/Makefile | 8 +-
{arch/x86/crypto => crypto}/ablk_helper.c | 13 +-
crypto/ablkcipher.c | 21 +-
crypto/ansi_cprng.c | 4 +-
crypto/asymmetric_keys/rsa.c | 5 +-
crypto/authenc.c | 54 ++-
crypto/authencesn.c | 34 +--
crypto/ccm.c | 4 +-
crypto/gcm.c | 2 +-
crypto/memneq.c | 138 +++++++
drivers/char/hw_random/Kconfig | 25 ++
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/msm-rng.c | 197 +++++++++
drivers/char/hw_random/omap3-rom-rng.c | 141 +++++++
drivers/char/hw_random/pseries-rng.c | 19 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/caam/Kconfig | 25 +-
drivers/crypto/caam/Makefile | 4 +-
drivers/crypto/caam/caamalg.c | 83 +---
drivers/crypto/caam/caamhash.c | 88 ++---
drivers/crypto/caam/caamrng.c | 29 +-
drivers/crypto/caam/ctrl.c | 418 ++++++++++++++++----
drivers/crypto/caam/desc.h | 17 +-
drivers/crypto/caam/intern.h | 20 +-
drivers/crypto/caam/jr.c | 339 +++++++++++-----
drivers/crypto/caam/jr.h | 5 +-
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/caam/sg_sw_sec4.h | 34 ++-
drivers/crypto/dcp.c | 49 +--
drivers/crypto/ixp4xx_crypto.c | 26 +-
drivers/crypto/mv_cesa.c | 14 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-sham.c | 1 +
drivers/crypto/picoxcell_crypto.c | 32 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 35 +--
drivers/crypto/tegra-aes.c | 26 +-
include/asm-generic/simd.h | 14 +
.../include/asm => include}/crypto/ablk_helper.h | 0
include/crypto/algapi.h | 18 +-
include/crypto/authenc.h | 12 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 9 +-
59 files changed, 1454 insertions(+), 643 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.13
2013-11-23 1:34 ` Herbert Xu
@ 2013-11-23 1:40 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2013-11-23 1:40 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
Hi Linus:
This is a resend with the recipients in the cc field instead of the
to field.
Here is the crypto update for 3.13:
* Made x86 ablk_helper generic for ARM.
* Phase out chainiv in favour of eseqiv (affects IPsec).
* Fixed aes-cbc IV corruption on s390.
* Added constant-time crypto_memneq which replaces memcmp.
* Fixed aes-ctr in omap-aes.
* Added OMAP3 ROM RNG support.
* Add PRNG support for MSM SoC's
* Add and use Job Ring API in caam.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (7):
crypto: caam - fix RNG state handle instantiation descriptor
crypto: caam - fix hash, alg and rng registration if CAAM driver not initialized
crypto: caam - fix RNG4 instantiation
crypto: caam - split RNG4 instantiation function
crypto: caam - uninstantiate RNG state handle 0 if instantiated by caam driver
crypto: caam - fix RNG4 AAI defines
crypto: caam - enable instantiation of all RNG4 state handles
Ard Biesheuvel (2):
crypto: create generic version of ablk_helper
crypto: move x86 to the generic version of ablk_helper
Ben Hutchings (1):
hwrng: via-rng - Mark device ID table as __maybe_unused
Fabio Estevam (4):
crypto: dcp - Use devm_ioremap_resource()
crypto: dcp - Use devm_request_irq()
crypto: dcp - Fix the path for releasing the resources
crypto: dcp - Check the return value from devm_ioremap_resource()
Herbert Xu (2):
crypto: skcipher - Use eseqiv even on UP machines
crypto: s390 - Fix aes-cbc IV corruption
James Yonan (1):
crypto: crypto_memneq - add equality testing of memory regions w/o timing leaks
Joel Fernandes (1):
crypto: omap-aes - Fix CTR mode counter length
Joni Lapilainen (1):
crypto: omap-sham - Add missing modalias
Jussi Kivilinna (2):
crypto: sha256_ssse3 - use correct module alias for sha224
crypto: x86 - restore avx2_supported check
Linus Walleij (1):
crypto: tegra - use kernel entropy instead of ad-hoc
Mathias Krause (6):
crypto: authenc - Export key parsing helper function
crypto: authencesn - Simplify key parsing
crypto: ixp4xx - Simplify and harden key parsing
crypto: picoxcell - Simplify and harden key parsing
crypto: talitos - Simplify key parsing
padata: make the sequence counter an atomic_t
Michael Ellerman (2):
hwrng: pseries - Use KBUILD_MODNAME in pseries-rng.c
hwrng: pseries - Return errors to upper levels in pseries-rng.c
Michael Opdenacker (1):
crypto: mv_cesa: remove deprecated IRQF_DISABLED
Neil Horman (1):
crypto: ansi_cprng - Fix off by one error in non-block size request
Oliver Neukum (1):
crypto: sha256_ssse3 - also test for BMI2
Pali Rohár (1):
hwrng: OMAP3 ROM Random Number Generator support
Ruchika Gupta (3):
crypto: caam - Add Platform driver for Job Ring
crypto: caam - Add API's to allocate/free Job Rings
crypto: caam - Modify the interface layers to use JR API's
Sachin Kamat (7):
crypto: mv_cesa - Staticize local symbols
crypto: omap-aes - Staticize local symbols
crypto: tegra-aes - Staticize tegra_aes_cra_exit
crypto: tegra-aes - Fix NULL pointer dereference
crypto: tegra-aes - Use devm_clk_get
crypto: sahara - Remove redundant of_match_ptr
crypto: mv_cesa - Remove redundant of_match_ptr
Stanimir Varbanov (2):
ARM: DT: msm: Add Qualcomm's PRNG driver binding document
hwrng: msm - Add PRNG support for MSM SoC's
Stephen Warren (1):
ARM: tegra: remove tegra_chip_uid()
Yashpal Dutta (1):
crypto: caam - map src buffer before access
kbuild test robot (1):
crypto: ablk_helper - Replace memcpy with struct assignment
.../devicetree/bindings/rng/qcom,prng.txt | 17 +
arch/arm/mach-tegra/fuse.c | 10 -
arch/s390/crypto/aes_s390.c | 19 +-
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aesni-intel_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 2 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 2 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/serpent_avx2_glue.c | 2 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 4 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/include/asm/simd.h | 11 +
crypto/Kconfig | 23 +-
crypto/Makefile | 8 +-
{arch/x86/crypto => crypto}/ablk_helper.c | 13 +-
crypto/ablkcipher.c | 21 +-
crypto/ansi_cprng.c | 4 +-
crypto/asymmetric_keys/rsa.c | 5 +-
crypto/authenc.c | 54 ++-
crypto/authencesn.c | 34 +--
crypto/ccm.c | 4 +-
crypto/gcm.c | 2 +-
crypto/memneq.c | 138 +++++++
drivers/char/hw_random/Kconfig | 25 ++
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/msm-rng.c | 197 +++++++++
drivers/char/hw_random/omap3-rom-rng.c | 141 +++++++
drivers/char/hw_random/pseries-rng.c | 19 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/caam/Kconfig | 25 +-
drivers/crypto/caam/Makefile | 4 +-
drivers/crypto/caam/caamalg.c | 83 +---
drivers/crypto/caam/caamhash.c | 88 ++---
drivers/crypto/caam/caamrng.c | 29 +-
drivers/crypto/caam/ctrl.c | 418 ++++++++++++++++----
drivers/crypto/caam/desc.h | 17 +-
drivers/crypto/caam/intern.h | 20 +-
drivers/crypto/caam/jr.c | 339 +++++++++++-----
drivers/crypto/caam/jr.h | 5 +-
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/caam/sg_sw_sec4.h | 34 ++-
drivers/crypto/dcp.c | 49 +--
drivers/crypto/ixp4xx_crypto.c | 26 +-
drivers/crypto/mv_cesa.c | 14 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-sham.c | 1 +
drivers/crypto/picoxcell_crypto.c | 32 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 35 +--
drivers/crypto/tegra-aes.c | 26 +-
include/asm-generic/simd.h | 14 +
.../include/asm => include}/crypto/ablk_helper.h | 0
include/crypto/algapi.h | 18 +-
include/crypto/authenc.h | 12 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 9 +-
59 files changed, 1454 insertions(+), 643 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.13
2013-03-28 8:28 ` Crypto Fixes for 3.9 Herbert Xu
` (4 preceding siblings ...)
2013-09-13 11:30 ` Crypto Fixes for 3.12 Herbert Xu
@ 2013-12-03 12:41 ` Herbert Xu
2013-12-09 11:57 ` Herbert Xu
5 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-12-03 12:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of crashes triggered by a previous
crypto self-test update. It also fixes a build problem in the
caam driver, as well as a concurrency issue in s390. Finally
there is a pair of fixes to bugs in the crypto scatterwalk code
and authenc that may lead to crashes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Gerald Schaefer (1):
crypto: s390 - Fix aes-xts parameter corruption
Horia Geanta (5):
crypto: talitos - corrrectly handle zero-length assoc data
crypto: ccm - Fix handling of zero plaintext when computing mac
crypto: caam - fix aead sglen for case 'dst != src'
crypto: talitos - fix aead sglen for case 'dst != src'
crypto: testmgr - fix sglen in test_aead for case 'dst != src'
Michael Neuling (1):
crypto: caam - Add missing Job Ring include
Tom Lendacky (2):
crypto: authenc - Find proper IV address in ablkcipher callback
crypto: scatterwalk - Set the chain pointer indication bit
arch/s390/crypto/aes_s390.c | 31 ++++++++++--------
crypto/authenc.c | 7 ++--
crypto/ccm.c | 3 +-
crypto/tcrypt.c | 4 ++
crypto/testmgr.c | 26 +++++++--------
drivers/crypto/caam/caamalg.c | 51 +++++++++++++++++-------------
drivers/crypto/caam/jr.c | 1 +
drivers/crypto/talitos.c | 68 +++++++++++++++++++++++-----------------
include/crypto/scatterwalk.h | 1 +
9 files changed, 109 insertions(+), 83 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 3.13
2013-12-03 12:41 ` Crypto Fixes for 3.13 Herbert Xu
@ 2013-12-09 11:57 ` Herbert Xu
2014-01-01 6:10 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2013-12-09 11:57 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Unfortunately the last push that fixed a crash in the crypto
scatterwalk code introduced a new crash when SG debugging is
enabled. This push fixes that.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Tom Lendacky (1):
crypto: scatterwalk - Use sg_chain_ptr on chain entries
include/crypto/scatterwalk.h | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.13
2013-12-09 11:57 ` Herbert Xu
@ 2014-01-01 6:10 ` Herbert Xu
2014-02-03 12:59 ` Crypto Fixes for 3.14 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-01-01 6:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build error on ARM that was introduced in 3.13-rc1.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Krzysztof Hałasa (1):
crypto: ixp4xx - Fix kernel compile error
drivers/crypto/ixp4xx_crypto.c | 4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.14
2013-11-07 8:01 ` Crypto Update for 3.13 Herbert Xu
2013-11-12 16:41 ` Herbert Xu
@ 2014-01-23 11:53 ` Herbert Xu
2014-04-01 10:00 ` Crypto Update for 3.15 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-01-23 11:53 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.14:
* Improved crypto_memneq helper.
* Use cyprto_memneq in arch-specific crypto code.
* Replaced orphaned DCP driver with Freescale MXS DCP driver.
* Added AVX/AVX2 version of AESNI-GCM encode and decode.
* Added AMD Cryptographic Coprocessor (CCP) driver.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andy Shevchenko (1):
crypto: aesni - fix build on x86 (32bit)
Cesar Eduardo Barros (1):
crypto: more robust crypto_memneq
Daniel Borkmann (2):
crypto: memneq - fix for archs without efficient unaligned access
crypto: arch - use crypto_memneq instead of memcmp
Fengguang Wu (1):
crytpo: ccp - fix coccinelle warnings
Horia Geanta (2):
crypto: talitos - fix locating offending descriptor in error path
crypto: caam - simplify and harden key parsing
Lokesh Vutla (1):
crypto: omap-sham - Fix Polling mode for larger blocks
Marek Vasut (5):
crypto: ahash - Fully restore ahash request before completing
crypto: mxs - Remove the old DCP driver
crypto: mxs - Add Freescale MXS DCP driver
ARM: mxs: dts: Enable DCP for MXS
crypto: drivers - Sort drivers/crypto/Makefile
Mark A. Greer (1):
crypto: omap-sham - Only release DMA channel if successfully requested
Mathias Krause (2):
crypto: pcrypt - Fix wrong usage of rcu_dereference()
padata: Fix wrong usage of rcu_dereference()
Nishanth Menon (1):
crypto: omap-aes - add error check for pm_runtime_get_sync
Sachin Kamat (3):
crypto: crypto4xx - Remove redundant dev_set_drvdata
crypto: ccp - Remove redundant dev_set_drvdata
crypto: talitos - Remove redundant dev_set_drvdata
Tim Chen (3):
crypto: aesni - AVX and AVX2 version of AESNI-GCM encode and decode
crypto: tcrypt - Added speed tests for AEAD crypto alogrithms in tcrypt test suite
crypto: aesni - fix build on x86 (32bit)
Tom Lendacky (17):
crypto: ccp - CCP device driver and interface support
crypto: ccp - crypto API interface to the CCP device driver
crypto: ccp - CCP AES crypto API support
crypto: ccp - CCP AES CMAC mode crypto API support
crypto: ccp - CCP XTS-AES crypto API support
crypto: ccp - CCP SHA crypto API support
crytpo: ccp - CCP device driver build files
crypto: ccp - CCP maintainer information
crypto: ccp - Fix sparse warnings in ccp-crypto-sha.c
crypto: ccp - CCP Kconfig fixes
crypto: ccp - Remove user triggerable pr_err calls
crypto: ccp - Apply appropriate gfp_t type to memory allocations
crypto: ccp - Cleanup scatterlist usage
crypto: ccp - Check for caller result area before using it
crypto: ccp - Change data length declarations to u64
crypto: ccp - Cleanup hash invocation calls
crypto: ccp - CCP device enabled/disabled changes
Wei Yongjun (1):
crypto: mxs - Fix sparse non static symbol warning
.../devicetree/bindings/crypto/fsl-dcp.txt | 17 +
MAINTAINERS | 7 +
arch/arm/boot/dts/imx23.dtsi | 4 +-
arch/arm/boot/dts/imx28.dtsi | 3 +-
arch/s390/crypto/des_s390.c | 6 +-
arch/x86/crypto/Makefile | 1 +
arch/x86/crypto/aesni-intel_avx-x86_64.S | 2811 ++++++++++++++++++++
arch/x86/crypto/aesni-intel_glue.c | 147 +-
crypto/Makefile | 5 -
crypto/ahash.c | 5 +-
crypto/memneq.c | 80 +-
crypto/pcrypt.c | 2 +-
crypto/tcrypt.c | 270 ++
crypto/tcrypt.h | 10 +
drivers/crypto/Kconfig | 39 +-
drivers/crypto/Makefile | 33 +-
drivers/crypto/amcc/crypto4xx_core.c | 1 -
drivers/crypto/caam/caamalg.c | 36 +-
drivers/crypto/ccp/Kconfig | 24 +
drivers/crypto/ccp/Makefile | 10 +
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 365 +++
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 279 ++
drivers/crypto/ccp/ccp-crypto-aes.c | 369 +++
drivers/crypto/ccp/ccp-crypto-main.c | 432 +++
drivers/crypto/ccp/ccp-crypto-sha.c | 517 ++++
drivers/crypto/ccp/ccp-crypto.h | 197 ++
drivers/crypto/ccp/ccp-dev.c | 595 +++++
drivers/crypto/ccp/ccp-dev.h | 272 ++
drivers/crypto/ccp/ccp-ops.c | 2024 ++++++++++++++
drivers/crypto/ccp/ccp-pci.c | 361 +++
drivers/crypto/dcp.c | 903 -------
drivers/crypto/mxs-dcp.c | 1100 ++++++++
drivers/crypto/omap-aes.c | 16 +-
drivers/crypto/omap-sham.c | 19 +-
drivers/crypto/talitos.c | 23 +-
include/linux/ccp.h | 537 ++++
include/linux/compiler-gcc.h | 3 +
include/linux/compiler-intel.h | 7 +
include/linux/compiler.h | 4 +
kernel/padata.c | 2 +-
40 files changed, 10527 insertions(+), 1009 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.14
2014-01-01 6:10 ` Herbert Xu
@ 2014-02-03 12:59 ` Herbert Xu
2014-04-13 23:34 ` Crypto Fixes for 3.15 Herbert Xu
` (2 more replies)
0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2014-02-03 12:59 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of concurrency issues on s390 where
multiple users of the same crypto transform may clobber each
other's results.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Harald Freudenberger (3):
crypto: s390 - fix concurrency issue in aes-ctr mode
crypto: s390 - fix des and des3_ede cbc concurrency issue
crypto: s390 - fix des and des3_ede ctr concurrency issue
arch/s390/crypto/aes_s390.c | 65 +++++++++++++++++++++---------
arch/s390/crypto/des_s390.c | 95 ++++++++++++++++++++++++++++---------------
2 files changed, 108 insertions(+), 52 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.15
2014-01-23 11:53 ` Crypto Update for 3.14 Herbert Xu
@ 2014-04-01 10:00 ` Herbert Xu
2014-06-05 6:23 ` Crypto Update for 3.16 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-04-01 10:00 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.15:
* Added 3DES driver for OMAP4/AM43xx.
* Added AVX2 acceleration for SHA.
* Added hash-only AEAD algorithms in caam.
* Removed tegra driver as it is not functioning and the hardware is too slow.
* Allow blkcipher walks over AEAD (needed for ARM).
* Fixed unprotected FPU/SSE access in ghash-clmulni-intel.
* Fixed highmem crash in omap-sham.
* Add (zero entropy) randomness when initialising hardware RNGs.
* Fixed unaligned ahash comletion functions.
* Added soft module depedency for crc32c for initrds that use crc32c.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (1):
crypto: caam - fix ERA retrieval function
Alexander Shiyan (1):
crypto: sahara - Use return value of devm_request_irq() on error
Ard Biesheuvel (3):
crypto: remove direct blkcipher_walk dependency on transform
crypto: allow blkcipher walks over AEAD data
crypto: ghash-clmulni-intel - use C implementation for setkey()
Dan Carpenter (3):
hwrng: cleanup in hwrng_register()
crypto: remove a duplicate checks in __cbc_decrypt()
crypto: caam - writel() arguments are swapped
Dave Jones (1):
crypto: ccp - Fix ccp_run_passthru_cmd dma variable assignments
Fabio Estevam (3):
crypto: mxs-dcp: Use devm_kzalloc()
crypto: mxs-dcp: Check the return value of stmp_reset_block()
crypto: mxs-dcp - Fix platform_get_irq() error handling
Herbert Xu (1):
crypto: caam - Fix first parameter to caam_init_rng
Horia Geanta (5):
crypto: caam - remove error propagation handling
crypto: export NULL algorithms defines
crypto: testmgr - add aead null encryption test vectors
crypto: caam - add support for aead null encryption
crypto: caam - add missing key_dma unmap
Jingoo Han (14):
crypto: picoxcell - Use devm_ioremap_resource()
crypto: sahara - Use devm_ioremap_resource()
crypto: s5p-sss - Use devm_ioremap_resource()
hwrng: atmel - Use devm_ioremap_resource()
hwrng: pixocell - Use devm_ioremap_resource()
hwrng: atmel - Use devm_clk_get()
hwrng: omap3-rom - Use devm_clk_get()
hwrng: pixocell - Use devm_clk_get()
hwrng: nomadik - Use devm_*() functions
hwrng: timeriomem - Use devm_*() functions
crypto: omap-aes - Use SIMPLE_DEV_PM_OPS macro
crypto: omap-des - Use SIMPLE_DEV_PM_OPS macro
crypto: omap-sham - Use SIMPLE_DEV_PM_OPS macro
crypto: omap-des - make local functions static
Joel Fernandes (3):
crypto: omap-des - Add omap-des driver for OMAP4/AM43xx
crypto: omap-des - Add config and build options
crypto: omap-sham - Map SG pages if they are HIGHMEM before accessing
Kees Cook (1):
hwrng: add randomness to system from rng sources
Kevin Hao (1):
crypto: talitos: init the priv->alg_list more earlier in talitos_probe()
Marek Vasut (6):
crypto: dcp - Move the AES operation type from actx to rctx
crypto: mxs-dcp - Align the bounce buffers
crypto: mxs-dcp - Optimize hashing
crypto: hash - Fix the pointer voodoo in unaligned ahash
crypto: hash - Pull out the functions to save/restore request
crypto: hash - Simplify the ahash_finup implementation
Mathias Krause (3):
crypto: x86/sha1 - re-enable the AVX variant
crypto: x86/sha1 - fix stack alignment of AVX2 variant
crypto: x86/sha1 - reduce size of the AVX2 asm implementation
Nitesh Lal (2):
crypto: caam - Fix job ring discovery in controller driver
crypto: caam - Dynamic memory allocation for caam_rng_ctx object
Sonic Zhang (1):
crypt: bfin_crc - Remove useless SSYNC instruction and cache flush to DMA coherent memory
Stephen Warren (1):
crypto: tegra - remove driver
Tim Chen (2):
CRC32C: Add soft module dependency to load other accelerated crc32c modules
crypto: crypto_wq - Fix late crypto work queue initialization
Tom Lendacky (7):
crypto: ccp - Allow for selective disablement of crypto API algorithms
crypto: ccp - Move HMAC calculation down to ccp ops file
crypto: ccp - Use a single queue for proper ordering of tfm requests
crypto: ccp - Perform completion callbacks using a tasklet
crypto: ccp - Prevent a possible lost CCP command request
crypto: ccp - Invoke context callback when there is a backlog error
crypto: ccp - Account for CCP backlog processing
chandramouli narayanan (1):
crypto: sha - SHA1 transform x86_64 AVX2
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/blowfish_glue.c | 3 -
arch/x86/crypto/cast5_avx_glue.c | 3 -
arch/x86/crypto/ghash-clmulni-intel_asm.S | 29 -
arch/x86/crypto/ghash-clmulni-intel_glue.c | 14 +-
arch/x86/crypto/sha1_avx2_x86_64_asm.S | 708 ++++++++++++++++
arch/x86/crypto/sha1_ssse3_glue.c | 53 ++-
crypto/Kconfig | 4 +-
crypto/Makefile | 2 +-
crypto/ahash.c | 147 +++--
crypto/blkcipher.c | 81 ++-
crypto/{crc32c.c => crc32c_generic.c} | 2 +
crypto/crypto_null.c | 6 +-
crypto/crypto_wq.c | 2 +-
crypto/tcrypt.c | 8 +
crypto/testmgr.c | 32 +
crypto/testmgr.h | 180 ++++
drivers/char/hw_random/atmel-rng.c | 23 +-
drivers/char/hw_random/core.c | 17 +-
drivers/char/hw_random/nomadik-rng.c | 13 +-
drivers/char/hw_random/omap3-rom-rng.c | 3 +-
drivers/char/hw_random/picoxcell-rng.c | 27 +-
drivers/char/hw_random/timeriomem-rng.c | 40 +-
drivers/crypto/Kconfig | 22 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/bfin_crc.c | 45 +-
drivers/crypto/caam/caamalg.c | 384 ++++++++--
drivers/crypto/caam/caamrng.c | 17 +-
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 61 +-
drivers/crypto/caam/ctrl.h | 2 +-
drivers/crypto/caam/desc_constr.h | 27 +-
drivers/crypto/caam/regs.h | 4 +-
drivers/crypto/ccp/ccp-crypto-main.c | 224 ++---
drivers/crypto/ccp/ccp-crypto-sha.c | 130 +---
drivers/crypto/ccp/ccp-crypto.h | 8 +-
drivers/crypto/ccp/ccp-dev.c | 21 +-
drivers/crypto/ccp/ccp-ops.c | 108 +++-
drivers/crypto/mxs-dcp.c | 83 ++-
drivers/crypto/omap-aes.c | 4 +-
drivers/crypto/omap-des.c | 1216 ++++++++++++++++++++++++++++
drivers/crypto/omap-sham.c | 12 +-
drivers/crypto/picoxcell_crypto.c | 16 +-
drivers/crypto/s5p-sss.c | 13 +-
drivers/crypto/sahara.c | 26 +-
drivers/crypto/talitos.c | 4 +-
drivers/crypto/tegra-aes.c | 1087 -------------------------
drivers/crypto/tegra-aes.h | 103 ---
include/crypto/algapi.h | 9 +-
include/crypto/null.h | 11 +
include/linux/ccp.h | 7 +
51 files changed, 3140 insertions(+), 1907 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.15
2014-02-03 12:59 ` Crypto Fixes for 3.14 Herbert Xu
@ 2014-04-13 23:34 ` Herbert Xu
2014-05-13 11:02 ` Herbert Xu
2014-07-10 9:03 ` Crypto Fixes for 3.16 Herbert Xu
2014-12-31 3:32 ` Crypto Fixes for 3.19 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-04-13 23:34 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a potential boot crash on bcm2835 due to the
recent change that now causes hardware RNGs to be accessed on
registration.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Matt Porter (1):
hwrng: bcm2835 - fix oops when rng h/w is accessed during registration
drivers/char/hw_random/bcm2835-rng.c | 10 +++++-----
1 files changed, 5 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.15
2014-04-13 23:34 ` Crypto Fixes for 3.15 Herbert Xu
@ 2014-05-13 11:02 ` Herbert Xu
2014-05-21 12:22 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-05-13 11:02 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a NULL pointer dereference on allocation failure
in caam, as well as a regression in the ctr mode on s390 that was
added with the recent concurrency fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Harald Freudenberger (1):
crypto: s390 - fix aes,des ctr mode concurrency finding.
Horia Geanta (1):
crypto: caam - add allocation failure handling in SPRINTFCAT macro
arch/s390/crypto/aes_s390.c | 3 +++
arch/s390/crypto/des_s390.c | 3 +++
drivers/crypto/caam/error.c | 10 +++++++---
3 files changed, 13 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.15
2014-05-13 11:02 ` Herbert Xu
@ 2014-05-21 12:22 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-05-21 12:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a NULL pointer dereference on allocation failure
in caam, as well as a regression in the ctr mode on s390 that was
added with the recent concurrency fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Harald Freudenberger (1):
crypto: s390 - fix aes,des ctr mode concurrency finding.
Horia Geanta (1):
crypto: caam - add allocation failure handling in SPRINTFCAT macro
arch/s390/crypto/aes_s390.c | 3 +++
arch/s390/crypto/des_s390.c | 3 +++
drivers/crypto/caam/error.c | 10 +++++++---
3 files changed, 13 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.16
2014-04-01 10:00 ` Crypto Update for 3.15 Herbert Xu
@ 2014-06-05 6:23 ` Herbert Xu
2014-06-08 2:56 ` Linus Torvalds
2014-08-04 13:03 ` Crypto Update for 3.17 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2014-06-05 6:23 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.16:
* Added test vectors for SHA/AES-CCM/DES-CBC/3DES-CBC.
* Fixed a number of error-path memory leaks in tcrypt.
* Fixed error-path memory leak in caam.
* Removed unnecessary global mutex from mxs-dcp.
* Added ahash walk interface that can actually be asynchronous.
* Cleaned up caam error reporting.
* Allow crypto_user get operation to be used by non-root users.
* Add support for SSS module on Exynos.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
Alexander Gordeev (1):
crypto: ccp - Use pci_enable_msix_range() instead of pci_enable_msix()
Ard Biesheuvel (1):
crypto: testmgr - add test cases for SHA-1, SHA-224, SHA-256 and AES-CCM
Arnd Bergmann (1):
crypto: s5p-sss - fix multiplatform build
Christian Engelmayer (3):
crypto: tcrypt - Fix potential leak in test_aead_speed() if aad_size is too big
crypto: tcrypt - Fix potential leak in test_aead_speed() if crypto_alloc_aead() fails
crypto: tcrypt - Fix leak of struct aead_request in test_aead_speed()
Fabio Estevam (1):
crypto: mxs-dcp - Remove global mutex
Herbert Xu (2):
crypto: ghash-clmulni-intel - Use u128 instead of be128 for internal key
crypto: hash - Add real ahash walk interface
Himangi Saraogi (1):
hwrng: n2-drv - Introduce the use of the managed version of kzalloc
Horia Geanta (1):
crypto: caam - fix mem leak in ahash_setkey
Jean Delvare (3):
hwrng: Move UML_RANDOM at the last position
hwrng: Turn HW_RANDOM into a menuconfig
hwrng: Fix a few driver dependencies and defaults
Jingoo Han (3):
crypto: omap-des - use devm_ioremap_resource()
hwrng: omap - remove unnecessary OOM messages
hwrng: timeriomem - remove unnecessary OOM messages
Jussi Kivilinna (1):
crypto: testmgr - add empty and large test vectors for SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512
Leilei Zhao (2):
crypto: atmel-aes - correct block size of cfb8 mode
crypto: atmel-aes - check alignment of cfb64 mode
Marek Vasut (23):
crypto: caam - Contain caam_jr_strstatus() ugliness
crypto: caam - Pull all the error codes out
crypto: caam - Implement fast-path for error codes with no handler
crypto: caam - Pass error type into the functions
crypto: caam - Kill the easy targets
crypto: caam - Dissolve report_jump_idx()
crypto: caam - Clean up report_ccb_status()
crypto: caam - Clean up report_deco_status()
crypto: caam - Kill SPRINTFCAT() with fire
crypto: caam - Sweep the remnants
crypto: caam - Fix the 'quoted string split across lines'
crypto: geode - Kill AES_MIN_BLOCK_SIZE
crypto: geode - Kill AES_IV_LENGTH
crypto: geode - Consistently use AES_KEYSIZE_128
crypto: geode - Weed out printk() from probe()
crypto: geode - Don't use tfm->__crt_alg->cra_name directly
crypto: ccp - tfm->__crt_alg->cra_name directly
crypto: cesa - tfm->__crt_alg->cra_name directly
crypto: dcp - tfm->__crt_alg->cra_name directly
crypto: n2 - tfm->__crt_alg->cra_name directly
crypto: padlock - tfm->__crt_alg->cra_name directly
crypto: sahara - tfm->__crt_alg->cra_name directly
crypto: cesa - tfm->__crt_alg->cra_type directly
Matthias-Christian Ott (1):
crypto: user - Allow CRYPTO_MSG_GETALG without CAP_NET_ADMIN
Monam Agarwal (1):
crypto: nx - Use RCU_INIT_POINTER(x, NULL)
Naveen Krishna Chatradhi (7):
crypto: s5p-sss - Use platform_get_irq() instead of _byname()
crypto: s5p-sss - Add device tree support
crypto: s5p-sss - Add support for SSS module on Exynos
crypto: s5p-sss - Let Exynos SoCs select SSS driver
crypto: s5p-sss - validate iv before memcpy
crypto: s5p-sss - Use clk_prepare/clk_unprepare
crypto: s5p-sss - Look for the next request in the queue
Nishanth Menon (1):
crypto: omap-des - handle error of pm_runtime_get_sync
Nitesh Lal (1):
crypto: testmgr - add aead cbc des, des3_ede tests
Paul Bolle (1):
hwrng: picoxcell - remove unbuildable picoxcell TRNG
Sonic Zhang (3):
crypto: bfin_crc - access crc registers by readl and writel functions
crypto: bfin_crc - ignore duplicated registration of the same algorithm
cryptoo: bfin_crc - avoid get physical address of coherence memory by dma_map_single
Tadeusz Struk (1):
crypto: testmgr - Fix DMA-API warning
Vakul Garg (1):
crypto: caam - reinitialize keys_fit_inline for decrypt and givencrypt
.../devicetree/bindings/crypto/samsung-sss.txt | 34 +
arch/x86/crypto/ghash-clmulni-intel_asm.S | 4 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 12 +-
crypto/ahash.c | 41 +-
crypto/crypto_user.c | 12 +-
crypto/tcrypt.c | 52 +-
crypto/testmgr.c | 181 ++-
crypto/testmgr.h | 1441 +++++++++++++++++++-
drivers/char/hw_random/Kconfig | 103 +-
drivers/char/hw_random/Makefile | 1 -
drivers/char/hw_random/n2-drv.c | 24 +-
drivers/char/hw_random/omap-rng.c | 4 +-
drivers/char/hw_random/picoxcell-rng.c | 181 ---
drivers/char/hw_random/timeriomem-rng.c | 4 +-
drivers/crypto/Kconfig | 6 +-
drivers/crypto/atmel-aes.c | 8 +-
drivers/crypto/bfin_crc.c | 103 +-
.../include/asm => drivers/crypto}/bfin_crc.h | 0
drivers/crypto/caam/caamalg.c | 31 +-
drivers/crypto/caam/caamhash.c | 32 +-
drivers/crypto/caam/caamrng.c | 7 +-
drivers/crypto/caam/error.c | 389 +++---
drivers/crypto/caam/error.h | 2 +-
drivers/crypto/caam/key_gen.c | 7 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 4 +-
drivers/crypto/ccp/ccp-pci.c | 7 +-
drivers/crypto/geode-aes.c | 28 +-
drivers/crypto/geode-aes.h | 6 +-
drivers/crypto/mv_cesa.c | 6 +-
drivers/crypto/mxs-dcp.c | 52 +-
drivers/crypto/n2_core.c | 4 +-
drivers/crypto/nx/nx-842.c | 4 +-
drivers/crypto/omap-des.c | 33 +-
drivers/crypto/padlock-sha.c | 2 +-
drivers/crypto/s5p-sss.c | 148 +-
drivers/crypto/sahara.c | 2 +-
include/crypto/internal/hash.h | 13 +
37 files changed, 2245 insertions(+), 743 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.16
2014-06-05 6:23 ` Crypto Update for 3.16 Herbert Xu
@ 2014-06-08 2:56 ` Linus Torvalds
2014-06-08 4:55 ` Herbert Xu
2014-06-09 1:47 ` Steven Miao
2014-08-04 13:03 ` Crypto Update for 3.17 Herbert Xu
1 sibling, 2 replies; 246+ messages in thread
From: Linus Torvalds @ 2014-06-08 2:56 UTC (permalink / raw)
To: Herbert Xu, Sonic Zhang, Steven Miao
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Jun 4, 2014 at 11:23 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 3.16:
There's something odd going on with bfin_crc.h.
You moved it in commit 52e6e543f2d8 ("crypto: bfin_crc - access crc
registers by readl and writel functions").
It got *deleted* by commit 3356c99ea392 ("bfin_crc: Move architecture
independant crc header file out of the blackfin folder") which claims
to just move things.
Both of those commits are by Sonic Zhang, just came to me through two
different trees (though your crypto tree, and through Steven Miao's
bfin tree).
I'm assuming that the delete was actually incorrect, and should have
been a move, because it looks like the bfin_crc.c file won't compile
without it. So I've re-instated that file.
But the state of the bfin tree seems to be crap. Somebody should take
a look at what happened here. My suspicion is that commit 3356c99ea392
was broken by Steven Miao trying to only touch files in arch/blackfin
or something.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.16
2014-06-08 2:56 ` Linus Torvalds
@ 2014-06-08 4:55 ` Herbert Xu
2014-06-09 1:47 ` Steven Miao
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-06-08 4:55 UTC (permalink / raw)
To: Linus Torvalds
Cc: Sonic Zhang, Steven Miao, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Sat, Jun 07, 2014 at 07:56:53PM -0700, Linus Torvalds wrote:
>
> I'm assuming that the delete was actually incorrect, and should have
> been a move, because it looks like the bfin_crc.c file won't compile
> without it. So I've re-instated that file.
Yes that would be my assumption as well.
Sonic/Steven, could you please double-check the current tree to see
whether it's in the right state?
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.16
2014-06-08 2:56 ` Linus Torvalds
2014-06-08 4:55 ` Herbert Xu
@ 2014-06-09 1:47 ` Steven Miao
1 sibling, 0 replies; 246+ messages in thread
From: Steven Miao @ 2014-06-09 1:47 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, Sonic Zhang, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
Hi Linus,
On Sun, Jun 8, 2014 at 10:56 AM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> On Wed, Jun 4, 2014 at 11:23 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>>
>> Here is the crypto update for 3.16:
>
> There's something odd going on with bfin_crc.h.
>
> You moved it in commit 52e6e543f2d8 ("crypto: bfin_crc - access crc
> registers by readl and writel functions").
>
> It got *deleted* by commit 3356c99ea392 ("bfin_crc: Move architecture
> independant crc header file out of the blackfin folder") which claims
> to just move things.
>
> Both of those commits are by Sonic Zhang, just came to me through two
> different trees (though your crypto tree, and through Steven Miao's
> bfin tree).
>
> I'm assuming that the delete was actually incorrect, and should have
> been a move, because it looks like the bfin_crc.c file won't compile
> without it. So I've re-instated that file.
>
> But the state of the bfin tree seems to be crap. Somebody should take
> a look at what happened here. My suspicion is that commit 3356c99ea392
> was broken by Steven Miao trying to only touch files in arch/blackfin
> or something.
Yes. I should be a move from arch/blackfin to drivers/crypto, sorry
for I only formating the arch/blackfin changes.
>
> Linus
-steven
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.16
2014-02-03 12:59 ` Crypto Fixes for 3.14 Herbert Xu
2014-04-13 23:34 ` Crypto Fixes for 3.15 Herbert Xu
@ 2014-07-10 9:03 ` Herbert Xu
2014-07-18 10:57 ` Herbert Xu
2014-09-15 11:35 ` Crypto Fixes for 3.17 Herbert Xu
2014-12-31 3:32 ` Crypto Fixes for 3.19 Herbert Xu
2 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2014-07-10 9:03 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes an error in sha512_ssse3 that leads to incorrect
output as well as a memory leak in caam_jr when the module is
unloaded.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Cristian Stoica (1):
crypto: caam - fix memleak in caam_jr module
Jussi Kivilinna (1):
crypto: sha512_ssse3 - fix byte count to bit count conversion
arch/x86/crypto/sha512_ssse3_glue.c | 2 +-
drivers/crypto/caam/jr.c | 8 +++-----
2 files changed, 4 insertions(+), 6 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.16
2014-07-10 9:03 ` Crypto Fixes for 3.16 Herbert Xu
@ 2014-07-18 10:57 ` Herbert Xu
2014-07-28 14:05 ` Herbert Xu
2014-09-15 11:35 ` Crypto Fixes for 3.17 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-07-18 10:57 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a boot hang in virt guests when the virtio RNG
is enabled.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Amit Shah (2):
hwrng: fetch randomness only after device init
hwrng: virtio - ensure reads happen after successful probe
drivers/char/hw_random/core.c | 47 +++++++++++++++++++++++++++++------
drivers/char/hw_random/virtio-rng.c | 10 ++++++++
2 files changed, 49 insertions(+), 8 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.16
2014-07-18 10:57 ` Herbert Xu
@ 2014-07-28 14:05 ` Herbert Xu
2014-07-31 13:59 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-07-28 14:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression on ARM where odd-sized blocks supplied
to AES may cause crashes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mikulas Patocka (2):
crypto: arm64-aes - fix encryption of unaligned data
crypto: arm-aes - fix encryption of unaligned data
arch/arm/crypto/aesbs-glue.c | 10 +++++-----
arch/arm64/crypto/aes-glue.c | 12 ++++++------
2 files changed, 11 insertions(+), 11 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.16
2014-07-28 14:05 ` Herbert Xu
@ 2014-07-31 13:59 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-07-31 13:59 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push adds missing SELinux labeling to AF_ALG sockets which
apparently causes SELinux (or at least the SELinux people) to
misbehave :)
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Milan Broz (1):
crypto: af_alg - properly label AF_ALG socket
crypto/af_alg.c | 2 ++
1 file changed, 2 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.17
2014-06-05 6:23 ` Crypto Update for 3.16 Herbert Xu
2014-06-08 2:56 ` Linus Torvalds
@ 2014-08-04 13:03 ` Herbert Xu
2014-10-07 13:18 ` Crypto Update for 3.18 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-08-04 13:03 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.17:
* Added CTR(AES) optimisation on x86_64 using "by8" AVX.
* Added arm64 support to ccp.
* Added Intel QAT crypto driver.
* Added Qualcomm crypto engine driver.
* Added x86-64 assembly optimisation for 3DES.
* Added CTR(3DES) speed test.
* Moved FIPS panic from module.c so that it only triggers on crypto modules.
* Added SP800-90A Deterministic Random Bit Generator (drbg).
* Added more test vectors for ghash.
* Tweaked self tests to catch partial block bugs.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ard Biesheuvel (2):
crypto: testmgr - add 4 more test vectors for GHASH
crypto: testmgr - use chunks smaller than algo block size in chunk tests
Arnd Bergmann (1):
crypto: ux500 - make interrupt mode plausible
Chen Gang (1):
crypto: qce - Let 'DEV_QCE' depend on both HAS_DMA and HAS_IOMEM
Dan Carpenter (2):
crypto: caam - remove duplicate FIFOST_CONT_MASK define
crypto: qat - remove an unneeded cast
Eric Dumazet (2):
crypto: lzo - try kmalloc() before vmalloc()
crypto: lzo - use kvfree() helper
Fengguang Wu (1):
crypto: drbg - drbg_exit() can be static
George Spelvin (1):
crypto: crc32c-pclmul - Shrink K_table to 32-bit words
Herbert Xu (2):
crypto: qat - Fix build problem with O=
crypto: drbg - Use Kconfig to ensure at least one RNG option is set
Himangi Saraogi (1):
crypto: caam - Introduce the use of the managed version of kzalloc
Horia Geanta (12):
crypto: testmgr - avoid DMA mapping from text, rodata, stack
crypto: caam - set coherent_dma_mask
crypto: caam - fix typo in dma_mapping_error
crypto: caam - fix "failed to check map error" DMA warnings
crypto: caam - fix DMA unmapping error in hash_digest_key
crypto: caam - fix DMA direction mismatch in ahash_done_ctx_dst
crypto: caam - fix DMA direction mismatch in ahash_done_ctx_src
crypto: caam - fix uninitialized S/G table size in ahash_digest
crypto: caam - fix uninitialized edesc->dst_dma field
crypto: caam - fix uninitialized state->buf_dma field
crypto: caam - set DK (Decrypt Key) bit only for AES accelerator
crypto: caam - fix DECO RSR polling
Jarod Wilson (2):
crypto: fips - only panic on bad/missing crypto mod signatures
crypto: testmgr - add missing spaces to drbg error strings
Jean Delvare (1):
crypto: drivers - Add 2 missing __exit_p
Jussi Kivilinna (3):
crypto: tcrypt - add ctr(des3_ede) sync speed test
crypto: des_3des - add x86-64 assembly implementation
crypto: des3_ede-x86_64 - fix parse warning
Luca Clementi (1):
crypto: tcrypt - print cra driver name in tcrypt tests output
Marek Vasut (2):
crypto: api - Move crypto_yield() to algapi.h
crypto: skcipher - Don't use __crypto_dequeue_request()
Mark Rustad (1):
crypto: Resolve shadow warnings
Nitesh Narayan Lal (2):
crypto: dts - Addition of missing SEC compatibile property in c29x device tree
crypto: caam - Enabling multiple caam debug support for C29x platform
Pramod Gurav (2):
crypto: atmel-sha - Switch to managed version of kzalloc
crypto: atmel-tdes - Switch to managed version of kzalloc
Ruchika Gupta (5):
crypto: caam - Correct definition of registers in memory map
crypto: caam - Configuration for platforms with virtualization enabled in CAAM
crypto: caam - Add definition of rd/wr_reg64 for little endian platform
crypto: caam - Correct the dma mapping for sg table
crypto: caam - Check for CAAM block presence before registering with crypto layer
Stanimir Varbanov (5):
crypto: qce - Qualcomm crypto engine driver
crypto: qce - Build Qualcomm crypto driver
ARM: DT: qcom: Add Qualcomm crypto driver binding document
crypto: qce - fix sparse warnings
crypto: qce - add dependancy to Kconfig
Stephan Mueller (16):
crypto: drbg - SP800-90A Deterministic Random Bit Generator
crypto: drbg - header file for DRBG
crypto: drbg - DRBG kernel configuration options
crypto: drbg - compile the DRBG code
crypto: drbg - DRBG testmgr test vectors
crypto: drbg - Add DRBG test code to testmgr
crypto: drbg - simplify ordering of linked list in drbg_ctr_df
crypto: drbg - fix memory corruption for AES192
crypto: drbg - use of kernel linked list
crypto: drbg - cleanup of preprocessor macros
crypto: drbg - Fix format string for debugging statements
crypto: drbg - Call CTR DRBG DF function only once
crypto: drbg - Select correct DRBG core for stdrng
crypto: drbg - Mix a time stamp into DRBG state
crypto: drbg - HMAC-SHA1 DRBG has crypto strength of 128 bits
crypto: drbg - fix failure of generating multiple of 2**16 bytes
Tadeusz Struk (22):
crypto: qat - Intel(R) QAT driver framework
crypto: qat - Intel(R) QAT transport code
crypto: qat - Intel(R) QAT FW interface
crypto: qat - Intel(R) QAT crypto interface
crypto: qat - Intel(R) QAT ucode part of fw loader
crypto: qat - Intel(R) QAT accelengine part of fw loader
crypto: qat - Intel(R) QAT DH895xcc accelerator
crypto: qat - Update to makefiles
crypto: qat - Fix random config build warnings
crypto: qat - Updated Firmware Info Metadata
crypto: qat - Fixed new checkpatch warnings
crypto: qat - Fix error path crash when no firmware is present
crypto: qat - remove unnecessary return codes
crypto: qat - checkpatch blank lines
crypto: qat - remove unneeded header
crypto: qat - remove unnecessary parentheses
crypto: qat - use min_t macro
crypto: qat - change slice->regions to slice->region
crypto: qat - change ae_num to ae_id
crypto: qat - Updated print outputs
crypto: qat - Use hweight for bit counting
crypto: qat - Fixed SKU1 dev issue
Tom Lendacky (6):
crypto: ccp - Modify PCI support in prep for arm64 support
crypto: ccp - CCP device bindings documentation
crypto: ccp - Add platform device support for arm64
crypto: ccp - Base AXI DMA cache settings on device tree
crypto: ccp - Remove "select OF" from Kconfig
crypto: ccp - Do not sign extend input data to CCP
chandramouli narayanan (1):
crypto: aes - AES CTR x86_64 "by8" AVX optimization
.../devicetree/bindings/crypto/amd-ccp.txt | 19 +
.../devicetree/bindings/crypto/qcom-qce.txt | 25 +
Documentation/ioctl/ioctl-number.txt | 1 +
MAINTAINERS | 6 +
arch/powerpc/boot/dts/fsl/qoriq-sec6.0-0.dtsi | 3 +-
arch/x86/crypto/Makefile | 4 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 546 ++++++
arch/x86/crypto/aesni-intel_glue.c | 40 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 281 ++-
arch/x86/crypto/des3_ede-asm_64.S | 805 ++++++++
arch/x86/crypto/des3_ede_glue.c | 509 +++++
crypto/Kconfig | 50 +-
crypto/Makefile | 1 +
crypto/algapi.c | 14 +
crypto/cryptd.c | 12 +-
crypto/des_generic.c | 22 +-
crypto/drbg.c | 2044 ++++++++++++++++++++
crypto/eseqiv.c | 8 +-
crypto/gcm.c | 30 +-
crypto/lzo.c | 8 +-
crypto/seqiv.c | 16 +-
crypto/tcrypt.c | 114 +-
crypto/testmgr.c | 304 ++-
crypto/testmgr.h | 1158 +++++++++--
drivers/crypto/Kconfig | 20 +-
drivers/crypto/Makefile | 2 +
drivers/crypto/amcc/crypto4xx_core.c | 2 +-
drivers/crypto/atmel-sha.c | 9 +-
drivers/crypto/atmel-tdes.c | 8 +-
drivers/crypto/caam/caamalg.c | 80 +-
drivers/crypto/caam/caamhash.c | 186 +-
drivers/crypto/caam/caamrng.c | 79 +-
drivers/crypto/caam/ctrl.c | 76 +-
drivers/crypto/caam/desc.h | 1 -
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/jr.c | 6 +-
drivers/crypto/caam/regs.h | 105 +-
drivers/crypto/ccp/Makefile | 5 +
drivers/crypto/ccp/ccp-dev.c | 34 +
drivers/crypto/ccp/ccp-dev.h | 14 +-
drivers/crypto/ccp/ccp-ops.c | 26 +-
drivers/crypto/ccp/ccp-pci.c | 39 +-
drivers/crypto/ccp/ccp-platform.c | 230 +++
drivers/crypto/nx/nx-842.c | 2 +-
drivers/crypto/qat/Kconfig | 23 +
drivers/crypto/qat/Makefile | 2 +
drivers/crypto/qat/qat_common/Makefile | 14 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 205 ++
drivers/crypto/qat/qat_common/adf_accel_engine.c | 168 ++
drivers/crypto/qat/qat_common/adf_aer.c | 259 +++
drivers/crypto/qat/qat_common/adf_cfg.c | 361 ++++
drivers/crypto/qat/qat_common/adf_cfg.h | 87 +
drivers/crypto/qat/qat_common/adf_cfg_common.h | 100 +
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 83 +
drivers/crypto/qat/qat_common/adf_cfg_user.h | 94 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 192 ++
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 490 +++++
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 215 ++
drivers/crypto/qat/qat_common/adf_init.c | 388 ++++
drivers/crypto/qat/qat_common/adf_transport.c | 567 ++++++
drivers/crypto/qat/qat_common/adf_transport.h | 63 +
.../qat/qat_common/adf_transport_access_macros.h | 160 ++
.../crypto/qat/qat_common/adf_transport_debug.c | 304 +++
.../crypto/qat/qat_common/adf_transport_internal.h | 118 ++
drivers/crypto/qat/qat_common/icp_qat_fw.h | 316 +++
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 131 ++
drivers/crypto/qat/qat_common/icp_qat_fw_la.h | 404 ++++
.../qat/qat_common/icp_qat_fw_loader_handle.h | 78 +
drivers/crypto/qat/qat_common/icp_qat_hal.h | 125 ++
drivers/crypto/qat/qat_common/icp_qat_hw.h | 305 +++
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 377 ++++
drivers/crypto/qat/qat_common/qat_algs.c | 1038 ++++++++++
drivers/crypto/qat/qat_common/qat_crypto.c | 284 +++
drivers/crypto/qat/qat_common/qat_crypto.h | 83 +
drivers/crypto/qat/qat_common/qat_hal.c | 1393 +++++++++++++
drivers/crypto/qat/qat_common/qat_uclo.c | 1181 +++++++++++
drivers/crypto/qat/qat_dh895xcc/Makefile | 8 +
drivers/crypto/qat/qat_dh895xcc/adf_admin.c | 144 ++
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 214 ++
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 86 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 449 +++++
drivers/crypto/qat/qat_dh895xcc/adf_drv.h | 67 +
drivers/crypto/qat/qat_dh895xcc/adf_hw_arbiter.c | 159 ++
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 266 +++
drivers/crypto/qat/qat_dh895xcc/qat_admin.c | 107 +
drivers/crypto/qce/Makefile | 6 +
drivers/crypto/qce/ablkcipher.c | 431 +++++
drivers/crypto/qce/cipher.h | 68 +
drivers/crypto/qce/common.c | 438 +++++
drivers/crypto/qce/common.h | 102 +
drivers/crypto/qce/core.c | 286 +++
drivers/crypto/qce/core.h | 68 +
drivers/crypto/qce/dma.c | 186 ++
drivers/crypto/qce/dma.h | 58 +
drivers/crypto/qce/regs-v5.h | 334 ++++
drivers/crypto/qce/sha.c | 588 ++++++
drivers/crypto/qce/sha.h | 81 +
drivers/crypto/ux500/cryp/cryp_core.c | 25 +-
include/crypto/aead.h | 4 +-
include/crypto/algapi.h | 6 +
include/crypto/des.h | 3 +
include/crypto/drbg.h | 290 +++
include/crypto/hash.h | 4 +-
include/crypto/internal/skcipher.h | 3 +-
include/crypto/scatterwalk.h | 6 -
include/crypto/skcipher.h | 4 +-
include/linux/crypto.h | 8 +-
kernel/module.c | 4 -
108 files changed, 20473 insertions(+), 583 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.17
2014-07-10 9:03 ` Crypto Fixes for 3.16 Herbert Xu
2014-07-18 10:57 ` Herbert Xu
@ 2014-09-15 11:35 ` Herbert Xu
2014-09-24 13:27 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-09-15 11:35 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the newly added drbg generator so that it actually
works on 32-bit machines. Previously the code was only tested on
64-bit and on 32-bit it overflowed and simply doesn't work.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: drbg - backport "fix maximum value checks on 32 bit systems"
Stephan Mueller (1):
crypto: drbg - remove check for uninitialized DRBG handle
crypto/drbg.c | 3 ---
include/crypto/drbg.h | 13 +++++++++++++
2 files changed, 13 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.17
2014-09-15 11:35 ` Crypto Fixes for 3.17 Herbert Xu
@ 2014-09-24 13:27 ` Herbert Xu
2014-11-10 8:57 ` Crypto Fixes for 3.18 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-09-24 13:27 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes three issues:
* If ccp is loaded on a machine without ccp, it will incorrectly
activate causing all requests to fail. Fixed by preventing ccp
from loading if hardware isn't available.
* Not all IRQs were enabled for the qat driver, leading to potential
stalls when it is used.
* Disabled buggy AVX CTR implementation in aesni.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mathias Krause (1):
crypto: aesni - disable "by8" AVX CTR optimization
Tadeusz Struk (1):
crypto: qat - Enable all 32 IRQs
Tom Lendacky (1):
crypto: ccp - Check for CCP before registering crypto algs
arch/x86/crypto/aesni-intel_glue.c | 4 ++--
drivers/crypto/ccp/ccp-crypto-main.c | 4 ++++
drivers/crypto/ccp/ccp-dev.c | 14 ++++++++++++++
drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 2 +-
include/linux/ccp.h | 12 ++++++++++++
5 files changed, 33 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.18
2014-08-04 13:03 ` Crypto Update for 3.17 Herbert Xu
@ 2014-10-07 13:18 ` Herbert Xu
2014-12-11 12:51 ` Crypto Update for 3.19 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-10-07 13:18 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Cc: Peter Zijlstra
Hi Linus:
Here is the crypto update for 3.18:
* Add multibuffer infrastructure:
. Add single_task_running scheduler helper, OKed by Peter on lkml.
* Add SHA1 multibuffer implementation for AVX2.
* Reenable "by8" AVX CTR optimisation after fixing counter overflow.
* Add APM X-Gene SoC RNG support.
* SHA256/SHA512 now handles unaligned input correctly.
* Set lz4 decompressed length correctly.
* Fix algif socket buffer allocation failure for 64K page machines.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alex Porosanu (3):
crypto: caam - disable RNG oscillator maximum frequency check
crypto: caam - change starting entropy delay value
crypto: caam - enable raw data instead of von Neumann data
Alexander Gordeev (1):
crypto: qat - Use pci_enable_msix_exact() instead of pci_enable_msix()
Cristian Stoica (7):
crypto: testmgr - white space fix-ups on test_aead
crypto: testmgr - white space removal on __test_hash
crypto: testmgr - white space removal on __test_skcipher
crypto: testmgr - delay execution of set-up code
crypto: testmgr - remove unused function argument
crypto: caam - remove duplicated sg copy functions
crypto: caam - fix addressing of struct member
David S. Miller (1):
crypto: sha - Handle unaligned input data in generic sha256 and sha512.
Feng Kan (3):
hwrng: xgene - add support for APM X-Gene SoC RNG support
Documentation: rng: Add X-Gene SoC RNG driver documentation
arm64: dts: add random number generator dts node to APM X-Gene platform.
Fengguang Wu (2):
crypto: mcryptd - mcryptd_flist can be static
crypto: sha-mb - sha1_mb_alg_state can be static
Herbert Xu (2):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
KOVACS Krisztian (2):
crypto: lz4,lz4hc - fix decompression
crypto: testmgr - add test for lz4 and lz4hc
Mathias Krause (3):
crypto: aesni - fix counter overflow handling in "by8" variant
crypto: aesni - remove unused defines in "by8" variant
Revert "crypto: aesni - disable "by8" AVX CTR optimization"
Nitesh Narayan Lal (1):
crypto: caam - Dynamic allocation of addresses for various memory blocks in CAAM.
Ondrej Kozina (1):
crypto: algif - avoid excessive use of socket buffer in skcipher
Rasmus Villemoes (1):
crypto: mv_cesa - Add missing #define
Stephan Mueller (10):
crypto: drbg - replace int2byte with cpu_to_be
crypto: drbg - kzfree does not need a check for NULL pointer
crypto: drbg - remove superflowous checks
crypto: drbg - remove superflowous memset(0)
crypto: drbg - use kmalloc instead of kzalloc for V and C
crypto: drbg - remove unnecessary sanity checks
crypto: drbg - remove configuration of fixed values
crypto: drbg - remove unnecessary sanity check for shadow state
crypto: drbg - fix sparse warning for cpu_to_be[32|64]
crypto: drbg - fix maximum value checks on 32 bit systems
Sudip Mukherjee (1):
hwrng: printk replacement
Tadeusz Struk (2):
crypto: qat - Fix typo in name of tasklet_struct
crypto: qat - Removed unneeded partial state
Ted Percival (1):
crypto: mcryptd - Fix typos in CRYPTO_MCRYPTD description
Tim Chen (7):
crypto: hash - initialize entry len for null input in crypto hash sg list walk
sched: Add function single_task_running to let a task check if it is the only task running on a cpu
crypto: sha-mb - multibuffer crypto infrastructure
crypto: sha-mb - SHA1 multibuffer algorithm data structures
crypto: sha-mb - SHA1 multibuffer submit and flush routines for AVX2
crypto: sha-mb - SHA1 multibuffer crypto computation (x8 AVX2)
crypto: sha-mb - SHA1 multibuffer job manager and glue code
Wei Yongjun (1):
crypto: qat - Fix return value check in adf_chr_drv_create()
Documentation/devicetree/bindings/rng/apm,rng.txt | 17 +
arch/arm64/boot/dts/apm-storm.dtsi | 21 +
arch/x86/crypto/Makefile | 1 +
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 20 +-
arch/x86/crypto/aesni-intel_glue.c | 4 +-
arch/x86/crypto/sha-mb/Makefile | 11 +
arch/x86/crypto/sha-mb/sha1_mb.c | 935 +++++++++++++++++++
arch/x86/crypto/sha-mb/sha1_mb_mgr_datastruct.S | 287 ++++++
arch/x86/crypto/sha-mb/sha1_mb_mgr_flush_avx2.S | 327 +++++++
arch/x86/crypto/sha-mb/sha1_mb_mgr_init_avx2.c | 64 ++
arch/x86/crypto/sha-mb/sha1_mb_mgr_submit_avx2.S | 228 +++++
arch/x86/crypto/sha-mb/sha1_x8_avx2.S | 472 ++++++++++
arch/x86/crypto/sha-mb/sha_mb_ctx.h | 136 +++
arch/x86/crypto/sha-mb/sha_mb_mgr.h | 110 +++
crypto/Kconfig | 30 +
crypto/Makefile | 1 +
crypto/ahash.c | 12 +-
crypto/algif_skcipher.c | 2 +-
crypto/drbg.c | 130 +--
crypto/lz4.c | 2 +-
crypto/lz4hc.c | 2 +-
crypto/mcryptd.c | 705 ++++++++++++++
crypto/sha256_generic.c | 3 +-
crypto/sha512_generic.c | 3 +-
crypto/testmgr.c | 966 ++++++++++----------
crypto/testmgr.h | 66 ++
drivers/char/hw_random/Kconfig | 13 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/amd-rng.c | 4 +-
drivers/char/hw_random/geode-rng.c | 4 +-
drivers/char/hw_random/intel-rng.c | 13 +-
drivers/char/hw_random/pasemi-rng.c | 2 +-
drivers/char/hw_random/pseries-rng.c | 2 +-
drivers/char/hw_random/via-rng.c | 8 +-
drivers/char/hw_random/xgene-rng.c | 423 +++++++++
drivers/crypto/caam/caamhash.c | 28 +-
drivers/crypto/caam/ctrl.c | 138 ++-
drivers/crypto/caam/intern.h | 9 +-
drivers/crypto/caam/regs.h | 51 +-
drivers/crypto/caam/sg_sw_sec4.h | 54 --
drivers/crypto/mv_cesa.h | 1 +
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 2 +-
.../crypto/qat/qat_common/adf_transport_internal.h | 2 +-
drivers/crypto/qat/qat_common/qat_algs.c | 66 +-
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 14 +-
include/crypto/drbg.h | 19 +-
include/crypto/internal/hash.h | 9 +
include/crypto/mcryptd.h | 112 +++
include/linux/sched.h | 1 +
kernel/sched/core.c | 12 +
50 files changed, 4706 insertions(+), 837 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.18
2014-09-24 13:27 ` Herbert Xu
@ 2014-11-10 8:57 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-11-10 8:57 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes these issues:
* Stack corruption in pseries hwrng driver.
* Missing DMA unmap in caam crypto driver.
* NUMA crash in qat crypto driver.
* Buggy mapping of zero-length associated data in qat crypto driver.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Cristian Stoica (1):
crypto: caam - fix missing dma unmap on error path
Greg Kurz (1):
hwrng: pseries - port to new read API and fix stack corruption
Tadeusz Struk (2):
crypto: qat - Prevent dma mapping zero length assoc data
crypto: qat - Enforce valid numa configuration
drivers/char/hw_random/pseries-rng.c | 11 ++++---
drivers/crypto/caam/key_gen.c | 29 +++++++++----------
drivers/crypto/qat/qat_common/adf_accel_devices.h | 3 +-
drivers/crypto/qat/qat_common/adf_transport.c | 12 ++++----
drivers/crypto/qat/qat_common/qat_algs.c | 7 +++--
drivers/crypto/qat/qat_common/qat_crypto.c | 8 ++++--
drivers/crypto/qat/qat_dh895xcc/adf_admin.c | 2 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 32 ++++++++-------------
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 2 +-
9 files changed, 53 insertions(+), 53 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.19
2014-10-07 13:18 ` Crypto Update for 3.18 Herbert Xu
@ 2014-12-11 12:51 ` Herbert Xu
2014-12-12 11:54 ` Herbert Xu
2015-02-14 9:43 ` Crypto Update for 3.20 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2014-12-11 12:51 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Cc: Peter Zijlstra
Hi Linus:
Here is the crypto update for 3.19:
* The crypto API is now documented :)
* Disallow arbitrary module loading through crypto API.
* Allow get request with empty driver name through crypto_user.
* Allow speed testing of arbitrary hash functions.
* Add caam support for ctr(aes), gcm(aes) and their derivatives.
* nx now supports concurrent hashing properly.
* Add sahara support for SHA1/256.
* Add ARM64 version of CRC32.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Boris Brezillon (4):
hwrng: atmel - use clk_prepapre_enable/_disable_unprepare
hwrng: atmel - add DT support
hwrng: atmel - Add TRNG DT binding doc
ARM: at91/dt: add trng node to at91sam9g45
Bruce Allan (4):
crypto: qat - fix bad unlock balance
crypto: qat - cleanup coccicheck warning - NULL check before freeing functions
crypto: qat - cleanup unnecessary break checkpatch warning
crypto: qat - misspelling typo - "reseting" should be "resetting"
Catalin Vasile (5):
crypto: caam - add support for ctr(aes)
crypto: caam - add support for rfc3686(ctr(aes))
crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
Cristian Stoica (1):
crypto: caam - fix error reporting
Dan Carpenter (1):
crypto: sha-mb - remove a bogus NULL check
Daniel Borkmann (1):
crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
Herbert Xu (4):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
crypto: user - Allow get request with empty driver name
crypto: algif_skcipher - Fixed blocking recvmsg
crypto: tcrypt - Allow speed testing of arbitrary hash functions
Johannes Berg (1):
crypto: bfin_crc - don't include linux/unaligned/access_ok.h
Julia Lawall (4):
crypto: sparc - replace memset by memzero_explicit
crypto: sha - replace memset by memzero_explicit
crypto: powerpc - replace memset by memzero_explicit
crypto: arm - replace memset by memzero_explicit
Kees Cook (2):
crypto: prefix module autoloading with "crypto-"
crypto: include crypto- module prefix in template
Leonidas S. Barbosa (8):
crypto: nx - Moving NX-AES-CBC to be processed logic
crypto: nx - Moving NX-AES-CCM to be processed logic and sg_list bounds
crypto: nx - Moving limit and bound logic in CTR and fix IV vector
crypto: nx - Moving NX-AES-ECB to be processed logic
crypto: nx - Moving NX-AES-GCM to be processed logic
crypto: nx - Moving NX-AES-XCBC to be processed logic
crypto: nx - Fix SHA concurrence issue and sg limit bounds
crypto: nx - Fixing the limit number of bytes to be processed
Masanari Iida (1):
crypto: testmgr - Remove unnecessary KERN_INFO from testmgr.c
Nickolaus Woodruff (1):
crypto: drbg - use memzero_explicit() for clearing sensitive data
Pranith Kumar (1):
crypto: caam - Remove unnecessary smp_read_barrier_depends()
Rickard Strandqvist (1):
hwrng: core - Changed from using strncat to strlcat
Steffen Trumtrar (4):
crypto: sahara - fix spinlock initialization
crypto: sahara - add support for i.MX53
crypto: sahara - replace tasklets with kthread
crypto: sahara - add support for SHA1/256
Stephan Mueller (22):
crypto: drbg - use crypto_inc
crypto: drbg - add MODULE_ALIAS for all DRBG types
crypto: algif - zeroize message digest buffer
crypto: algif - zeroize IV buffer
crypto: doc - crypto API high level spec
crypto: doc - compile crypto API spec
crypto: doc - userspace interface spec
crypto: doc - RNG API documentation
crypto: doc - hash data structures
crypto: doc - AHASH API documentation
crypto: doc - SHASH API documentation
crypto: doc - cipher data structures
crypto: doc - ABLKCIPHER API documentation
crypto: doc - AEAD API documentation
crypto: doc - BLKCIPHER API documentation
crypto: doc - CIPHER API documentation
crypto: doc - HASH API documentation
crypto: doc - document uncovered member variables
crypto: user - add MODULE_ALIAS
crypto: drbg - use MODULE_ALIAS_CRYPTO
crypto: algif_skcipher - initialize upon init request
crypto: af_alg - add user space interface for AEAD
Struk, Tadeusz (3):
crypto: qat - Use memzero_explicit
crytpo: qat - Fix 64 bytes requests
crypto: algif_skcipher - removed unneeded code
Tadeusz Struk (2):
crypto: qat - Move BAR definitions to device specific module
crypto: qat - fix problem with coalescing enable logic
Tudor Ambarus (4):
crypto: caam - add support for gcm(aes)
crypto: caam - add support for rfc4106(gcm(aes))
crypto: caam - fix output sequence contiguity check
crypto: caam - add support for rfc4543(gcm(aes))
Ulf Hansson (2):
crypto: ux500/cryp - Silence compiler warning for !CONFIG_PM
crypto: ux500/hash - Silence compiler warning for !CONFIG_PM
Valentin Rothberg (1):
crypto: aesni - remove unnecessary #define
Yazen Ghannam (1):
crypto: crc32 - Add ARM64 CRC32 hw accelerated module
Documentation/DocBook/Makefile | 2 +-
Documentation/DocBook/crypto-API.tmpl | 1253 ++++++++++
Documentation/crypto/crypto-API-userspace.txt | 205 ++
.../devicetree/bindings/crypto/fsl-imx-sahara.txt | 2 +-
.../devicetree/bindings/hwrng/atmel-trng.txt | 16 +
arch/arm/boot/dts/at91sam9g45.dtsi | 7 +
arch/arm/crypto/aes_glue.c | 4 +-
arch/arm/crypto/sha1_glue.c | 2 +-
arch/arm/crypto/sha1_neon_glue.c | 2 +-
arch/arm/crypto/sha512_neon_glue.c | 6 +-
arch/arm64/crypto/Kconfig | 4 +
arch/arm64/crypto/Makefile | 4 +
arch/arm64/crypto/aes-ce-ccm-glue.c | 2 +-
arch/arm64/crypto/aes-glue.c | 8 +-
arch/arm64/crypto/crc32-arm64.c | 274 +++
arch/powerpc/crypto/sha1.c | 4 +-
arch/s390/crypto/aes_s390.c | 2 +-
arch/s390/crypto/des_s390.c | 4 +-
arch/s390/crypto/ghash_s390.c | 2 +-
arch/s390/crypto/sha1_s390.c | 2 +-
arch/s390/crypto/sha256_s390.c | 4 +-
arch/s390/crypto/sha512_s390.c | 4 +-
arch/sparc/crypto/aes_glue.c | 2 +-
arch/sparc/crypto/camellia_glue.c | 2 +-
arch/sparc/crypto/crc32c_glue.c | 2 +-
arch/sparc/crypto/des_glue.c | 2 +-
arch/sparc/crypto/md5_glue.c | 2 +-
arch/sparc/crypto/sha1_glue.c | 2 +-
arch/sparc/crypto/sha256_glue.c | 6 +-
arch/sparc/crypto/sha512_glue.c | 6 +-
arch/x86/crypto/aes_glue.c | 4 +-
arch/x86/crypto/aesni-intel_glue.c | 10 +-
arch/x86/crypto/blowfish_glue.c | 4 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 4 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 4 +-
arch/x86/crypto/camellia_glue.c | 4 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/crc32-pclmul_glue.c | 4 +-
arch/x86/crypto/crc32c-intel_glue.c | 4 +-
arch/x86/crypto/crct10dif-pclmul_glue.c | 4 +-
arch/x86/crypto/des3_ede_glue.c | 8 +-
arch/x86/crypto/fpu.c | 3 +
arch/x86/crypto/ghash-clmulni-intel_glue.c | 2 +-
arch/x86/crypto/salsa20_glue.c | 4 +-
arch/x86/crypto/serpent_avx2_glue.c | 4 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha-mb/sha1_mb.c | 3 +-
arch/x86/crypto/sha1_ssse3_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 6 +-
arch/x86/crypto/sha512_ssse3_glue.c | 6 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/crypto/twofish_glue.c | 4 +-
arch/x86/crypto/twofish_glue_3way.c | 4 +-
crypto/842.c | 1 +
crypto/aes_generic.c | 2 +-
crypto/af_alg.c | 6 +
crypto/algapi.c | 4 +-
crypto/algif_hash.c | 4 +-
crypto/algif_skcipher.c | 15 +-
crypto/ansi_cprng.c | 2 +-
crypto/anubis.c | 1 +
crypto/api.c | 4 +-
crypto/arc4.c | 1 +
crypto/authenc.c | 1 +
crypto/authencesn.c | 1 +
crypto/blowfish_generic.c | 2 +-
crypto/camellia_generic.c | 2 +-
crypto/cast5_generic.c | 2 +-
crypto/cast6_generic.c | 2 +-
crypto/cbc.c | 1 +
crypto/ccm.c | 5 +-
crypto/chainiv.c | 1 +
crypto/cmac.c | 1 +
crypto/crc32.c | 1 +
crypto/crc32c_generic.c | 2 +-
crypto/crct10dif_generic.c | 2 +-
crypto/cryptd.c | 1 +
crypto/crypto_null.c | 6 +-
crypto/crypto_user.c | 6 +-
crypto/ctr.c | 3 +-
crypto/cts.c | 1 +
crypto/deflate.c | 2 +-
crypto/des_generic.c | 2 +-
crypto/drbg.c | 127 +-
crypto/ecb.c | 1 +
crypto/eseqiv.c | 1 +
crypto/fcrypt.c | 1 +
crypto/gcm.c | 7 +-
crypto/ghash-generic.c | 2 +-
crypto/hmac.c | 1 +
crypto/khazad.c | 1 +
crypto/krng.c | 2 +-
crypto/lrw.c | 1 +
crypto/lz4.c | 1 +
crypto/lz4hc.c | 1 +
crypto/lzo.c | 1 +
crypto/mcryptd.c | 1 +
crypto/md4.c | 2 +-
crypto/md5.c | 1 +
crypto/michael_mic.c | 1 +
crypto/pcbc.c | 1 +
crypto/pcrypt.c | 1 +
crypto/rmd128.c | 1 +
crypto/rmd160.c | 1 +
crypto/rmd256.c | 1 +
crypto/rmd320.c | 1 +
crypto/salsa20_generic.c | 2 +-
crypto/seed.c | 1 +
crypto/seqiv.c | 1 +
crypto/serpent_generic.c | 4 +-
crypto/sha1_generic.c | 2 +-
crypto/sha256_generic.c | 4 +-
crypto/sha512_generic.c | 4 +-
crypto/tcrypt.c | 32 +-
crypto/tea.c | 4 +-
crypto/testmgr.c | 3 +-
crypto/tgr192.c | 4 +-
crypto/twofish_generic.c | 2 +-
crypto/vmac.c | 1 +
crypto/wp512.c | 4 +-
crypto/xcbc.c | 1 +
crypto/xts.c | 1 +
crypto/zlib.c | 1 +
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/atmel-rng.c | 15 +-
drivers/char/hw_random/core.c | 12 +-
drivers/crypto/bfin_crc.c | 2 +-
drivers/crypto/caam/caamalg.c | 2412 +++++++++++++++++---
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/desc_constr.h | 2 +
drivers/crypto/caam/error.c | 25 +-
drivers/crypto/caam/jr.c | 3 -
drivers/crypto/nx/nx-aes-cbc.c | 12 +-
drivers/crypto/nx/nx-aes-ccm.c | 61 +-
drivers/crypto/nx/nx-aes-ctr.c | 13 +-
drivers/crypto/nx/nx-aes-ecb.c | 12 +-
drivers/crypto/nx/nx-aes-gcm.c | 66 +-
drivers/crypto/nx/nx-aes-xcbc.c | 81 +-
drivers/crypto/nx/nx-sha256.c | 208 +-
drivers/crypto/nx/nx-sha512.c | 222 +-
drivers/crypto/nx/nx.c | 127 +-
drivers/crypto/nx/nx.h | 8 +-
drivers/crypto/padlock-aes.c | 2 +-
drivers/crypto/padlock-sha.c | 8 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 2 -
drivers/crypto/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 3 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 6 +-
drivers/crypto/qat/qat_common/adf_transport.c | 15 +-
.../qat/qat_common/adf_transport_access_macros.h | 9 +-
drivers/crypto/qat/qat_common/qat_algs.c | 37 +-
drivers/crypto/qat/qat_common/qat_hal.c | 3 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 2 +
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 12 +-
drivers/crypto/sahara.c | 794 ++++++-
drivers/crypto/ux500/cryp/cryp_core.c | 6 +-
drivers/crypto/ux500/hash/hash_core.c | 10 +-
drivers/s390/crypto/ap_bus.c | 3 +-
include/crypto/hash.h | 492 ++++
include/crypto/if_alg.h | 1 +
include/crypto/rng.h | 80 +
include/linux/crypto.h | 1112 ++++++++-
include/net/sock.h | 1 +
include/uapi/linux/if_alg.h | 2 +
net/core/sock.c | 24 +-
167 files changed, 7090 insertions(+), 1068 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 3.19
2014-12-11 12:51 ` Crypto Update for 3.19 Herbert Xu
@ 2014-12-12 11:54 ` Herbert Xu
2015-02-14 9:43 ` Crypto Update for 3.20 Herbert Xu
1 sibling, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2014-12-12 11:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is a resend of the crypto update for 3.19 since I accidentally
pushed out an old tree instead of the current crypto tree.
* The crypto API is now documented :)
* Disallow arbitrary module loading through crypto API.
* Allow get request with empty driver name through crypto_user.
* Allow speed testing of arbitrary hash functions.
* Add caam support for ctr(aes), gcm(aes) and their derivatives.
* nx now supports concurrent hashing properly.
* Add sahara support for SHA1/256.
* Add ARM64 version of CRC32.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Boris Brezillon (4):
hwrng: atmel - use clk_prepapre_enable/_disable_unprepare
hwrng: atmel - add DT support
hwrng: atmel - Add TRNG DT binding doc
ARM: at91/dt: add trng node to at91sam9g45
Bruce Allan (4):
crypto: qat - fix bad unlock balance
crypto: qat - cleanup coccicheck warning - NULL check before freeing functions
crypto: qat - cleanup unnecessary break checkpatch warning
crypto: qat - misspelling typo - "reseting" should be "resetting"
Catalin Vasile (5):
crypto: caam - add support for ctr(aes)
crypto: caam - add support for rfc3686(ctr(aes))
crypto: caam - add support for rfc3686 with authenc md5, sha1 and sha2
crypto: caam - add support for givencrypt cbc(aes) and rfc3686(ctr(aes))
crypto: caam - add support for givencrypt cbc(des) and cbc(des3_ede)
Cristian Stoica (1):
crypto: caam - fix error reporting
Dan Carpenter (1):
crypto: sha-mb - remove a bogus NULL check
Daniel Borkmann (1):
crypto: algif - add and use sock_kzfree_s() instead of memzero_explicit()
Herbert Xu (4):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
crypto: user - Allow get request with empty driver name
crypto: algif_skcipher - Fixed blocking recvmsg
crypto: tcrypt - Allow speed testing of arbitrary hash functions
Johannes Berg (1):
crypto: bfin_crc - don't include linux/unaligned/access_ok.h
Julia Lawall (4):
crypto: sparc - replace memset by memzero_explicit
crypto: sha - replace memset by memzero_explicit
crypto: powerpc - replace memset by memzero_explicit
crypto: arm - replace memset by memzero_explicit
Kees Cook (2):
crypto: prefix module autoloading with "crypto-"
crypto: include crypto- module prefix in template
Leonidas S. Barbosa (8):
crypto: nx - Moving NX-AES-CBC to be processed logic
crypto: nx - Moving NX-AES-CCM to be processed logic and sg_list bounds
crypto: nx - Moving limit and bound logic in CTR and fix IV vector
crypto: nx - Moving NX-AES-ECB to be processed logic
crypto: nx - Moving NX-AES-GCM to be processed logic
crypto: nx - Moving NX-AES-XCBC to be processed logic
crypto: nx - Fix SHA concurrence issue and sg limit bounds
crypto: nx - Fixing the limit number of bytes to be processed
Masanari Iida (1):
crypto: testmgr - Remove unnecessary KERN_INFO from testmgr.c
Nickolaus Woodruff (1):
crypto: drbg - use memzero_explicit() for clearing sensitive data
Pranith Kumar (1):
crypto: caam - Remove unnecessary smp_read_barrier_depends()
Rickard Strandqvist (1):
hwrng: core - Changed from using strncat to strlcat
Steffen Trumtrar (4):
crypto: sahara - fix spinlock initialization
crypto: sahara - add support for i.MX53
crypto: sahara - replace tasklets with kthread
crypto: sahara - add support for SHA1/256
Stephan Mueller (22):
crypto: drbg - use crypto_inc
crypto: drbg - add MODULE_ALIAS for all DRBG types
crypto: algif - zeroize message digest buffer
crypto: algif - zeroize IV buffer
crypto: doc - crypto API high level spec
crypto: doc - compile crypto API spec
crypto: doc - userspace interface spec
crypto: doc - RNG API documentation
crypto: doc - hash data structures
crypto: doc - AHASH API documentation
crypto: doc - SHASH API documentation
crypto: doc - cipher data structures
crypto: doc - ABLKCIPHER API documentation
crypto: doc - AEAD API documentation
crypto: doc - BLKCIPHER API documentation
crypto: doc - CIPHER API documentation
crypto: doc - HASH API documentation
crypto: doc - document uncovered member variables
crypto: user - add MODULE_ALIAS
crypto: drbg - use MODULE_ALIAS_CRYPTO
crypto: algif_skcipher - initialize upon init request
crypto: af_alg - add user space interface for AEAD
Struk, Tadeusz (3):
crypto: qat - Use memzero_explicit
crytpo: qat - Fix 64 bytes requests
crypto: algif_skcipher - removed unneeded code
Tadeusz Struk (2):
crypto: qat - Move BAR definitions to device specific module
crypto: qat - fix problem with coalescing enable logic
Tudor Ambarus (4):
crypto: caam - add support for gcm(aes)
crypto: caam - add support for rfc4106(gcm(aes))
crypto: caam - fix output sequence contiguity check
crypto: caam - add support for rfc4543(gcm(aes))
Ulf Hansson (2):
crypto: ux500/cryp - Silence compiler warning for !CONFIG_PM
crypto: ux500/hash - Silence compiler warning for !CONFIG_PM
Valentin Rothberg (1):
crypto: aesni - remove unnecessary #define
Yazen Ghannam (1):
crypto: crc32 - Add ARM64 CRC32 hw accelerated module
Documentation/DocBook/Makefile | 2 +-
Documentation/DocBook/crypto-API.tmpl | 1253 ++++++++++
Documentation/crypto/crypto-API-userspace.txt | 205 ++
.../devicetree/bindings/crypto/fsl-imx-sahara.txt | 2 +-
.../devicetree/bindings/hwrng/atmel-trng.txt | 16 +
arch/arm/boot/dts/at91sam9g45.dtsi | 7 +
arch/arm/crypto/aes_glue.c | 4 +-
arch/arm/crypto/sha1_glue.c | 2 +-
arch/arm/crypto/sha1_neon_glue.c | 2 +-
arch/arm/crypto/sha512_neon_glue.c | 6 +-
arch/arm64/crypto/Kconfig | 4 +
arch/arm64/crypto/Makefile | 4 +
arch/arm64/crypto/aes-ce-ccm-glue.c | 2 +-
arch/arm64/crypto/aes-glue.c | 8 +-
arch/arm64/crypto/crc32-arm64.c | 274 +++
arch/powerpc/crypto/sha1.c | 4 +-
arch/s390/crypto/aes_s390.c | 2 +-
arch/s390/crypto/des_s390.c | 4 +-
arch/s390/crypto/ghash_s390.c | 2 +-
arch/s390/crypto/sha1_s390.c | 2 +-
arch/s390/crypto/sha256_s390.c | 4 +-
arch/s390/crypto/sha512_s390.c | 4 +-
arch/sparc/crypto/aes_glue.c | 2 +-
arch/sparc/crypto/camellia_glue.c | 2 +-
arch/sparc/crypto/crc32c_glue.c | 2 +-
arch/sparc/crypto/des_glue.c | 2 +-
arch/sparc/crypto/md5_glue.c | 2 +-
arch/sparc/crypto/sha1_glue.c | 2 +-
arch/sparc/crypto/sha256_glue.c | 6 +-
arch/sparc/crypto/sha512_glue.c | 6 +-
arch/x86/crypto/aes_glue.c | 4 +-
arch/x86/crypto/aesni-intel_glue.c | 10 +-
arch/x86/crypto/blowfish_glue.c | 4 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 4 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 4 +-
arch/x86/crypto/camellia_glue.c | 4 +-
arch/x86/crypto/cast5_avx_glue.c | 2 +-
arch/x86/crypto/cast6_avx_glue.c | 2 +-
arch/x86/crypto/crc32-pclmul_glue.c | 4 +-
arch/x86/crypto/crc32c-intel_glue.c | 4 +-
arch/x86/crypto/crct10dif-pclmul_glue.c | 4 +-
arch/x86/crypto/des3_ede_glue.c | 8 +-
arch/x86/crypto/fpu.c | 3 +
arch/x86/crypto/ghash-clmulni-intel_glue.c | 2 +-
arch/x86/crypto/salsa20_glue.c | 4 +-
arch/x86/crypto/serpent_avx2_glue.c | 4 +-
arch/x86/crypto/serpent_avx_glue.c | 2 +-
arch/x86/crypto/serpent_sse2_glue.c | 2 +-
arch/x86/crypto/sha-mb/sha1_mb.c | 3 +-
arch/x86/crypto/sha1_ssse3_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 6 +-
arch/x86/crypto/sha512_ssse3_glue.c | 6 +-
arch/x86/crypto/twofish_avx_glue.c | 2 +-
arch/x86/crypto/twofish_glue.c | 4 +-
arch/x86/crypto/twofish_glue_3way.c | 4 +-
crypto/842.c | 1 +
crypto/aes_generic.c | 2 +-
crypto/af_alg.c | 6 +
crypto/algapi.c | 4 +-
crypto/algif_hash.c | 4 +-
crypto/algif_skcipher.c | 15 +-
crypto/ansi_cprng.c | 2 +-
crypto/anubis.c | 1 +
crypto/api.c | 4 +-
crypto/arc4.c | 1 +
crypto/authenc.c | 1 +
crypto/authencesn.c | 1 +
crypto/blowfish_generic.c | 2 +-
crypto/camellia_generic.c | 2 +-
crypto/cast5_generic.c | 2 +-
crypto/cast6_generic.c | 2 +-
crypto/cbc.c | 1 +
crypto/ccm.c | 5 +-
crypto/chainiv.c | 1 +
crypto/cmac.c | 1 +
crypto/crc32.c | 1 +
crypto/crc32c_generic.c | 2 +-
crypto/crct10dif_generic.c | 2 +-
crypto/cryptd.c | 1 +
crypto/crypto_null.c | 6 +-
crypto/crypto_user.c | 6 +-
crypto/ctr.c | 3 +-
crypto/cts.c | 1 +
crypto/deflate.c | 2 +-
crypto/des_generic.c | 2 +-
crypto/drbg.c | 127 +-
crypto/ecb.c | 1 +
crypto/eseqiv.c | 1 +
crypto/fcrypt.c | 1 +
crypto/gcm.c | 7 +-
crypto/ghash-generic.c | 2 +-
crypto/hmac.c | 1 +
crypto/khazad.c | 1 +
crypto/krng.c | 2 +-
crypto/lrw.c | 1 +
crypto/lz4.c | 1 +
crypto/lz4hc.c | 1 +
crypto/lzo.c | 1 +
crypto/mcryptd.c | 1 +
crypto/md4.c | 2 +-
crypto/md5.c | 1 +
crypto/michael_mic.c | 1 +
crypto/pcbc.c | 1 +
crypto/pcrypt.c | 1 +
crypto/rmd128.c | 1 +
crypto/rmd160.c | 1 +
crypto/rmd256.c | 1 +
crypto/rmd320.c | 1 +
crypto/salsa20_generic.c | 2 +-
crypto/seed.c | 1 +
crypto/seqiv.c | 1 +
crypto/serpent_generic.c | 4 +-
crypto/sha1_generic.c | 2 +-
crypto/sha256_generic.c | 4 +-
crypto/sha512_generic.c | 4 +-
crypto/tcrypt.c | 32 +-
crypto/tea.c | 4 +-
crypto/testmgr.c | 3 +-
crypto/tgr192.c | 4 +-
crypto/twofish_generic.c | 2 +-
crypto/vmac.c | 1 +
crypto/wp512.c | 4 +-
crypto/xcbc.c | 1 +
crypto/xts.c | 1 +
crypto/zlib.c | 1 +
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/atmel-rng.c | 15 +-
drivers/char/hw_random/core.c | 12 +-
drivers/crypto/bfin_crc.c | 2 +-
drivers/crypto/caam/caamalg.c | 2412 +++++++++++++++++---
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/desc_constr.h | 2 +
drivers/crypto/caam/error.c | 25 +-
drivers/crypto/caam/jr.c | 3 -
drivers/crypto/nx/nx-aes-cbc.c | 12 +-
drivers/crypto/nx/nx-aes-ccm.c | 61 +-
drivers/crypto/nx/nx-aes-ctr.c | 13 +-
drivers/crypto/nx/nx-aes-ecb.c | 12 +-
drivers/crypto/nx/nx-aes-gcm.c | 66 +-
drivers/crypto/nx/nx-aes-xcbc.c | 81 +-
drivers/crypto/nx/nx-sha256.c | 208 +-
drivers/crypto/nx/nx-sha512.c | 222 +-
drivers/crypto/nx/nx.c | 127 +-
drivers/crypto/nx/nx.h | 8 +-
drivers/crypto/padlock-aes.c | 2 +-
drivers/crypto/padlock-sha.c | 8 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 2 -
drivers/crypto/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 3 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 6 +-
drivers/crypto/qat/qat_common/adf_transport.c | 15 +-
.../qat/qat_common/adf_transport_access_macros.h | 9 +-
drivers/crypto/qat/qat_common/qat_algs.c | 37 +-
drivers/crypto/qat/qat_common/qat_hal.c | 3 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 2 +
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 12 +-
drivers/crypto/sahara.c | 794 ++++++-
drivers/crypto/ux500/cryp/cryp_core.c | 6 +-
drivers/crypto/ux500/hash/hash_core.c | 10 +-
drivers/s390/crypto/ap_bus.c | 3 +-
include/crypto/hash.h | 492 ++++
include/crypto/if_alg.h | 1 +
include/crypto/rng.h | 80 +
include/linux/crypto.h | 1112 ++++++++-
include/net/sock.h | 1 +
include/uapi/linux/if_alg.h | 2 +
net/core/sock.c | 24 +-
167 files changed, 7090 insertions(+), 1068 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.19
2014-02-03 12:59 ` Crypto Fixes for 3.14 Herbert Xu
2014-04-13 23:34 ` Crypto Fixes for 3.15 Herbert Xu
2014-07-10 9:03 ` Crypto Fixes for 3.16 Herbert Xu
@ 2014-12-31 3:32 ` Herbert Xu
2015-01-07 2:17 ` Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2014-12-31 3:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a use-after-free crash in the user-space crypto
API.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Rabin Vincent (1):
crypto: af_alg - fix backlog handling
crypto/af_alg.c | 3 +++
1 file changed, 3 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.19
2014-12-31 3:32 ` Crypto Fixes for 3.19 Herbert Xu
@ 2015-01-07 2:17 ` Herbert Xu
2015-01-20 0:52 ` Herbert Xu
` (2 more replies)
0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-01-07 2:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem with sha-mb with old toolchains
and an implementation bug in the ctr(aes)/by8 branch of aesni-intel
that's enabled when AVX is available.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mathias Krause (1):
crypto: aesni - fix "by8" variant for 128 bit keys
Vinson Lee (1):
crypto: sha-mb - Add avx2_supported check.
arch/x86/crypto/Makefile | 2 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 46 +++++++++++++++++++++++--------
2 files changed, 36 insertions(+), 12 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 3.19
2015-01-07 2:17 ` Herbert Xu
@ 2015-01-20 0:52 ` Herbert Xu
2015-03-09 5:19 ` Crypto Fixes for 4.0 Herbert Xu
2015-04-25 8:03 ` Crypto Fixes for 4.1 Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-01-20 0:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression that arose from the change to add
a crypto prefix to module names which was done to prevent the
loading of arbitrary modules through the Crypto API. In particular,
a number of modules were missing the crypto prefix which meant
that they could no longer be autoloaded.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mathias Krause (1):
crypto: add missing crypto module aliases
arch/powerpc/crypto/sha1.c | 1 +
arch/x86/crypto/sha-mb/sha1_mb.c | 2 +-
crypto/aes_generic.c | 1 +
crypto/ansi_cprng.c | 1 +
crypto/blowfish_generic.c | 1 +
crypto/camellia_generic.c | 1 +
crypto/cast5_generic.c | 1 +
crypto/cast6_generic.c | 1 +
crypto/crc32c_generic.c | 1 +
crypto/crct10dif_generic.c | 1 +
crypto/des_generic.c | 7 ++++---
crypto/ghash-generic.c | 1 +
crypto/krng.c | 1 +
crypto/salsa20_generic.c | 1 +
crypto/serpent_generic.c | 1 +
crypto/sha1_generic.c | 1 +
crypto/sha256_generic.c | 2 ++
crypto/sha512_generic.c | 2 ++
crypto/tea.c | 1 +
crypto/tgr192.c | 1 +
crypto/twofish_generic.c | 1 +
crypto/wp512.c | 1 +
22 files changed, 27 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 3.20
2014-12-11 12:51 ` Crypto Update for 3.19 Herbert Xu
2014-12-12 11:54 ` Herbert Xu
@ 2015-02-14 9:43 ` Herbert Xu
2015-04-15 3:39 ` Crypto Update for 4.1 Herbert Xu
2015-06-26 10:22 ` Crypto Fixes for 4.2 Herbert Xu
1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-02-14 9:43 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 3.20:
* Added 192/256-bit key support to aesni GCM.
* Added MIPS OCTEON MD5 support.
* Fixed hwrng starvation and race conditions.
* Added note that memzero_explicit is not a subsitute for memset.
* Added user-space interface for crypto_rng.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Aaro Koskinen (5):
MIPS: OCTEON: add crypto helper functions
crypto: octeon - add instruction definitions for MD5
MIPS: OCTEON: reintroduce crypto features check
crypto: octeon - add MD5 module
crypto: octeon - enable OCTEON MD5 module selection
Allan, Bruce W (5):
crypto: qat - fix device reset flow
crypto: qat - correctly type a boolean
crypto: qat - adf_ae_stop() is never called
crypto: qat - use pci_wait_for_pending_transaction()
crypto: qat - remove unnecessary include of atomic.h header file
Amos Kong (1):
hwrng: move some code out mutex_lock for avoiding underlying deadlock
Andrey Ryabinin (1):
crypto: ccp - terminate ccp_support array with empty element
Asaf Vertz (2):
crypto: ux500 - fix checkpatch errors
crypto: omap-des - fix BUG_ON condition
Christophe Jaillet (1):
crypto: atmel - Free memory in error path
Cristian Stoica (8):
crypto: replace scatterwalk_sg_next with sg_next
crypto: caam - remove dead code
crypto: caam - remove unused local variable
crypto: caam - pair irq map and dispose in the same function
crypto: caam - fix resource clean-up on error path for caam_jr_init
crypto: tcrypt - fix buflen reminder calculation
crypto: testmgr - limit IV copy length in aead tests
crypto: tcrypt - do not allocate iv on stack for aead speed tests
Daniel Borkmann (1):
lib: memzero_explicit: add comment for its usage
Herbert Xu (11):
hwrng: core - Use struct completion for cleanup_done
hwrng: core - Fix current_rng init/cleanup race yet again
hwrng: core - Do not register device opportunistically
hwrng: core - Drop current rng in set_current_rng
hwrng: core - Move hwrng_init call into set_current_rng
Revert "crypto: drbg - use memzero_explicit() for clearing sensitive data"
crypto: qat - Fix incorrect uses of memzero_explicit
crypto: qat - Ensure ipad and opad are zeroed
crypto: cts - Remove bogus use of seqiv
crypto: cts - Weed out non-CBC algorithms
crypto: seqiv - Ensure that IV size is at least 8 bytes
Jarod Wilson (1):
crypto: testmgr - mark rfc4106(gcm(aes)) as fips_allowed
Joshua I. James (5):
crypto: ablkcipher - fixed style errors in ablkcipher.c
crypto: aead - fixed style error in aead.c
crypto: af_alg - fixed style error in af_alg.c
crypto: ahash - fixed style error in ahash.c
crypto: api - fixed style erro in algapi.c
Kim Phillips (1):
crypto: caam - don't emit ICV check failures to dmesg
Masanari Iida (1):
crypto: bfin_crc - Remove unnecessary KERN_ERR in bfin_crc.c
Mathias Krause (5):
crypto: sparc64/aes - fix module description
crypto: sparc64/camellia - fix module alias
crypto: sparc64/des - add "des3_ede" module alias
crypto: sparc64/md5 - fix module description
crypto: x86/des3_ede - drop bogus module aliases
Michael S. Tsirkin (2):
MAINTAINERS: add linux-crypto to hw random
hwrng: virtio - drop extra empty line
Rabin Vincent (1):
crypto: testmgr - don't use interruptible wait in tests
Rickard Strandqvist (1):
crypto: amcc - Remove unused function
Rusty Russell (5):
hwrng: place mutex around read functions and buffers.
hwrng: use reference counts on each struct hwrng.
hwrng: fix unregister race.
hwrng: don't double-check old_rng.
hwrng: don't init list element we're about to add to list.
Stephan Mueller (7):
crypto: drbg - panic on continuous self test error
crypto: af_alg - add setsockopt for auth tag size
crypto: af_alg - zeroize key data
crypto: algif_rng - add random number generator support
crypto: algif_rng - enable RNG interface compilation
crypto: aead - add check for presence of auth tag
crypto: doc - remove colons in comments
Svenning Sørensen (1):
crypto: atmel_sha - remove unused shash fallback instance.
Tadeusz Struk (4):
crypto: algif - Mark sgl end at the end of data
crypto: qat - Fix assumption that sg in and out will have the same nents
crypto: qat - add support for cbc(aes) ablkcipher
crypto: qat - don't need qat_auth_state struct
Timothy McCaffrey (1):
crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106
Wei Yongjun (1):
crypto: algif_rng - fix sparse non static symbol warning
MAINTAINERS | 1 +
arch/mips/cavium-octeon/Makefile | 1 +
arch/mips/cavium-octeon/crypto/Makefile | 7 +
arch/mips/cavium-octeon/crypto/octeon-crypto.c | 66 ++
arch/mips/cavium-octeon/crypto/octeon-crypto.h | 75 +++
arch/mips/cavium-octeon/crypto/octeon-md5.c | 216 +++++++
arch/mips/cavium-octeon/executive/octeon-model.c | 6 +
arch/mips/include/asm/octeon/octeon-feature.h | 17 +-
arch/mips/include/asm/octeon/octeon.h | 5 -
arch/sparc/crypto/aes_glue.c | 2 +-
arch/sparc/crypto/camellia_glue.c | 2 +-
arch/sparc/crypto/des_glue.c | 1 +
arch/sparc/crypto/md5_glue.c | 2 +-
arch/x86/crypto/aesni-intel_asm.S | 343 ++++++-----
arch/x86/crypto/aesni-intel_glue.c | 34 +-
arch/x86/crypto/des3_ede_glue.c | 2 -
crypto/Kconfig | 18 +
crypto/Makefile | 1 +
crypto/ablkcipher.c | 7 +-
crypto/aead.c | 3 +-
crypto/af_alg.c | 11 +-
crypto/ahash.c | 3 +-
crypto/algapi.c | 1 +
crypto/algif_rng.c | 192 ++++++
crypto/algif_skcipher.c | 8 +
crypto/cts.c | 5 +-
crypto/drbg.c | 34 +-
crypto/scatterwalk.c | 6 +-
crypto/seqiv.c | 12 +
crypto/tcrypt.c | 37 +-
crypto/testmgr.c | 58 +-
drivers/char/hw_random/core.c | 215 ++++---
drivers/char/hw_random/virtio-rng.c | 1 -
drivers/crypto/amcc/crypto4xx_sa.c | 23 -
drivers/crypto/atmel-aes.c | 2 +-
drivers/crypto/atmel-sha.c | 50 +-
drivers/crypto/atmel-tdes.c | 2 +-
drivers/crypto/bfin_crc.c | 4 +-
drivers/crypto/caam/caamalg.c | 14 +-
drivers/crypto/caam/ctrl.c | 6 +-
drivers/crypto/caam/error.c | 13 +-
drivers/crypto/caam/jr.c | 37 +-
drivers/crypto/caam/sg_sw_sec4.h | 8 +-
drivers/crypto/ccp/ccp-dev.c | 1 +
drivers/crypto/ixp4xx_crypto.c | 4 +-
drivers/crypto/nx/nx.c | 6 +-
drivers/crypto/omap-aes.c | 4 +-
drivers/crypto/omap-des.c | 8 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 6 +-
drivers/crypto/qat/qat_common/adf_aer.c | 24 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 2 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 7 +-
drivers/crypto/qat/qat_common/adf_init.c | 98 ++-
.../crypto/qat/qat_common/adf_transport_internal.h | 1 -
drivers/crypto/qat/qat_common/icp_qat_hw.h | 2 +-
drivers/crypto/qat/qat_common/qat_algs.c | 642 +++++++++++++++-----
drivers/crypto/qat/qat_common/qat_crypto.h | 16 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 19 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 42 +-
drivers/crypto/qce/dma.c | 6 +-
drivers/crypto/qce/sha.c | 2 +-
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 8 +-
drivers/crypto/ux500/cryp/cryp_core.c | 10 +-
include/crypto/if_alg.h | 1 +
include/crypto/scatterwalk.h | 10 +-
include/linux/crypto.h | 11 +-
include/linux/hw_random.h | 4 +
lib/string.c | 5 +
70 files changed, 1785 insertions(+), 709 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.0
2015-01-07 2:17 ` Herbert Xu
2015-01-20 0:52 ` Herbert Xu
@ 2015-03-09 5:19 ` Herbert Xu
2015-03-18 5:25 ` Herbert Xu
2015-04-25 8:03 ` Crypto Fixes for 4.1 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-03-09 5:19 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the ARM XTS implementation that can
cause failures to in decrypting encrypted disks.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ard Biesheuvel (1):
crypto: arm/aes update NEON AES module to latest OpenSSL version
arch/arm/crypto/aesbs-core.S_shipped | 12 ++++++++----
arch/arm/crypto/bsaes-armv7.pl | 12 ++++++++----
2 files changed, 16 insertions(+), 8 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.0
2015-03-09 5:19 ` Crypto Fixes for 4.0 Herbert Xu
@ 2015-03-18 5:25 ` Herbert Xu
2015-03-18 18:12 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-03-18 5:25 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
On Mon, Mar 09, 2015 at 04:19:50PM +1100, Herbert Xu wrote:
>
> This push fixes a bug in the ARM XTS implementation that can
> cause failures to in decrypting encrypted disks.
For some reason this didn't get pulled so I'm resending it with
another fix.
The new fix is a memory overwrite bug that can cause a crash
which can be triggered from userspace.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ard Biesheuvel (1):
crypto: arm/aes update NEON AES module to latest OpenSSL version
Stephan Mueller (1):
crypto: aesni - fix memory usage in GCM decryption
arch/arm/crypto/aesbs-core.S_shipped | 12 ++++++++----
arch/arm/crypto/bsaes-armv7.pl | 12 ++++++++----
arch/x86/crypto/aesni-intel_glue.c | 4 ++--
3 files changed, 18 insertions(+), 10 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.0
2015-03-18 5:25 ` Herbert Xu
@ 2015-03-18 18:12 ` Linus Torvalds
0 siblings, 0 replies; 246+ messages in thread
From: Linus Torvalds @ 2015-03-18 18:12 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Mar 17, 2015 at 10:25 PM, Herbert Xu
<herbert@gondor.apana.org.au> wrote:
> Hi Linus:
>
> On Mon, Mar 09, 2015 at 04:19:50PM +1100, Herbert Xu wrote:
>>
>> This push fixes a bug in the ARM XTS implementation that can
>> cause failures to in decrypting encrypted disks.
>
> For some reason this didn't get pulled so I'm resending it with
> another fix.
Hmm. I never got your original email. Maybe it was in my spam folder
and my spam scan never noticed..
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 4.1
2015-02-14 9:43 ` Crypto Update for 3.20 Herbert Xu
@ 2015-04-15 3:39 ` Herbert Xu
2015-04-16 1:58 ` Linus Torvalds
2015-06-22 8:44 ` Crypto Update for 4.2 Herbert Xu
2015-06-26 10:22 ` Crypto Fixes for 4.2 Herbert Xu
1 sibling, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-04-15 3:39 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 4.1:
* Added user-space interface for AEAD.
* Added user-space interface for RNG (i.e., pseudo RNG).
* Prevent internal helper algos from being exposed to user-space.
* Merged common code from assembly/C SHA implementations .
* Added ARMv8 SHA1/256.
* Added ARMv8 AES.
* Added ARMv8 GHASH.
* Added ARM assmelber and NEON SHA256.
* Added MIPS OCTEON SHA1/256/512.
* Added MIPS img-hash SHA1/256 and MD5.
* Added Power 8 VMX AES/CBC/CTR/GHASH.
* Added PPC assembler AES, SHA1/256 and MD5.
* Added Broadcom IPROC RNG driver.
* Misc fixes.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Aaro Koskinen (7):
crypto: octeon - don't disable bottom half in octeon-md5
crypto: octeon - always disable preemption when using crypto engine
crypto: octeon - add instruction definitions for SHA1/256/512
crypto: octeon - add SHA1 module
crypto: octeon - add SHA256 module
crypto: octeon - add SHA512 module
crypto: octeon - enable OCTEON SHA1/256/512 module selection
Allan, Bruce W (10):
crypto: qat - remove duplicate definition of Intel PCI vendor id
crypto: qat - fix typo in string
crypto: qat - make error and info log messages more descriptive
crypto: qat - fix typo
crypto: qat - fix checkpatch CHECK_SPACING issues
crypto: qat - checkpatch PARENTHESIS_ALIGNMENT and LOGICAL_CONTINUATIONS
crypto: qat - fix checkpatch CONCATENATED_STRING issues
crypto: qat - fix checkpatch BIT_MACRO issues
crypto: qat - fix checkpatch COMPARISON_TO_NULL issue
crypto: qat - fix checkpatch CODE_INDENT issue
Ameen Ali (1):
crypto: sha1-mb - Syntax error
Andre Wolokita (2):
hwrng: omap - Change RNG_CONFIG_REG to RNG_CONTROL_REG when checking and disabling TRNG
hwrng: omap - Change RNG_CONFIG_REG to RNG_CONTROL_REG in init
Ard Biesheuvel (23):
crypto: arm - move ARM specific Kconfig definitions to a dedicated file
crypto: arm - add support for SHA1 using ARMv8 Crypto Instructions
crypto: arm - add support for SHA-224/256 using ARMv8 Crypto Extensions
crypto: arm - AES in ECB/CBC/CTR/XTS modes using ARMv8 Crypto Extensions
crypto: arm - add support for GHASH using ARMv8 Crypto Extensions
crypto: arm/ghash - fix big-endian bug in ghash
crypto: sha1 - implement base layer for SHA-1
crypto: sha256 - implement base layer for SHA-256
crypto: sha512 - implement base layer for SHA-512
crypto: sha1-generic - move to generic glue implementation
crypto: sha256-generic - move to generic glue implementation
crypto: sha512-generic - move to generic glue implementation
crypto: arm/sha1 - move SHA-1 ARM asm implementation to base layer
crypto: arm/sha1_neon - move SHA-1 NEON implementation to base layer
crypto: arm/sha1-ce - move SHA-1 ARMv8 implementation to base layer
crypto: arm/sha256 - move SHA-224/256 ASM/NEON implementation to base layer
crypto: arm/sha2-ce - move SHA-224/256 ARMv8 implementation to base layer
crypto: arm64/sha1-ce - move SHA-1 ARMv8 implementation to base layer
crypto: arm64/sha2-ce - move SHA-224/256 ARMv8 implementation to base layer
crypto: x86/sha1_ssse3 - move SHA-1 SSSE3 implementation to base layer
crypto: x86/sha256_ssse3 - move SHA-224/256 SSSE3 implementation to base layer
crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer
crypto: arm - workaround for building with old binutils
Arnd Bergmann (1):
crypto: arm/sha256 - avoid sha256 code on ARMv7-M
Colin Ian King (1):
crypto: atmel - fix typo in dev_err error message
Dan Carpenter (2):
crypto: img-hash - fix some compile warnings
crypto: img-hash - shift wrapping bug in img_hash_hw_init()
Dmitry Torokhov (12):
hwrng: omap - remove incorrect __exit markups
hwrng: octeon - remove incorrect __exit markups
hwrng: pseries - remove incorrect __init/__exit markups
crypto: qat - remove incorrect __exit markup
crypto: amcc - remove incorrect __init/__exit markups
hwrng: omap - remove #ifdefery around PM methods
hwrng: add devm_* interfaces
hwrng: bcm63xx - make use of devm_hwrng_register
hwrng: exynos - make use of devm_hwrng_register
hwrng: msm - make use of devm_hwrng_register
hwrng: iproc-rng200 - do not use static structure
hwrng: iproc-rng200 - make use of devm_hwrng_register
Feng Kan (1):
hwrng: xgene - add ACPI support for APM X-Gene RNG unit
Florian Fainelli (4):
hwrng: bcm63xx - drop bcm_{readl,writel} macros
hwrng: bcm63xx - move register definitions to driver
MIPS: BCM63xx: remove RSET_RNG register definitions
hwrng: bcm63xx - use devm_* helpers
Geert Uytterhoeven (1):
crypto: ux500 - Update error message for dmaengine_prep_slave_sg() API
Herbert Xu (6):
linux-next: Tree for Mar 11 (powerpc build failure due to vmx crypto code)
linux-next: build failure after merge of the crypto tree
crypto: api - Fix races in crypto_unregister_instance
crypto: api - Change crypto_unregister_instance argument type
crypto: user - Fix crypto_alg_match race
crypto: api - Move alg ref count init to crypto_check_alg
Horia Geant? (1):
crypto: tcrypt - fix uninit sg entries in test_acipher_speed
James Hartley (3):
crypto: img-hash - Add Imagination Technologies hw hash accelerator
Documentation: crypto: Add DT binding info for the img hw hash accelerator
crypto: img-hash - Fix Kconfig selections
Julia Lawall (1):
crypto: don't export static symbol
Keith Packard (1):
hwrng: core - allow perfect entropy from hardware devices
Kim Phillips (1):
crypto: powerpc - move files to fix build error
Lad, Prabhakar (1):
crypto: sha-mb - Fix big integer constant sparse warning
Leilei Zhao (9):
crypto: atmel-aes - add new version
crypto: atmel-sha - add new version
crypto: atmel-sha - fix sg list management
crypto: atmel-sha - initialize spinlock in probe
crypto: atmel-sha - correct the max burst size
crypto: atmel-tdes - initialize spinlock in probe
crypto: atmel-aes - initialize spinlock in probe
crypto: atmel-aes - sync the buf used in DMA or CPU
crypto: atmel-aes - correct usage of dma_sync_* API
Leonidas S. Barbosa (2):
crypto: vmx - Add support for VMS instructions by ASM
crypto: vmx - Enabling VMX module for PPC64
Ludovic Desroches (1):
crypto: atmel-sha - correct the way data are split
Marcelo H. Cerri (5):
crypto: vmx - Adding VMX module for Power 8
crypto: vmx - Adding AES routines for VMX module
crypto: vmx - Adding CBC routines for VMX module
crypto: vmx - Adding CTR routines for VMX module
crypto: vmx - Adding GHASH routines for VMX module
Markus Stockhausen (16):
crypto: ppc/sha256 - assembler
crypto: ppc/sha256 - glue
crypto: ppc/sha256 - kernel config
crypto: powerpc/aes - register defines
crypto: powerpc/aes - aes tables
crypto: powerpc/aes - assembler core
crypto: powerpc/aes - key handling
crypto: powerpc/aes - ECB/CBC/CTR/XTS modes
cyprot: powerpc/aes - glue code
crypto: powerpc/aes - kernel config
crypto: powerpc/sha1 - assembler
crypto: powerpc/sha1 - glue
crypto: powerpc/sha1 - kernel config
crypto: powerpc/md5 - assembler
crypto: powerpc/md5 - glue
crypto: powerpc/md5 - kernel config
Martin Hicks (2):
crypto: talitos - Simplify per-channel initialization
crypto: talitos - Remove MD5_BLOCK_SIZE
Masanari Iida (1):
crypto: serpent_sse2 - Fix a typo in Kconfig
Nicholas Mc Guire (4):
crypto: mxs-dcp - fix type of ret for wait_for_completion_timeout
crypto: sahara - fix type of ret for wait_for_completion_timeout
crypto: sahara - pass on error condition
crypto: sahara - drop unnecessary default assignment
Sami Tolvanen (1):
crypto: arm/sha256 - Add optimized SHA-256/224
Scott Branden (2):
hwrng: iproc-rng200 - Add device tree bindings
hwrng: iproc-rng200 - Add Broadcom IPROC RNG driver
Steffen Trumtrar (2):
crypto: sahara - use the backlog
crypto: sahara - fix AES descriptor create
Stephan Mueller (31):
crypto: doc - describe internal structure
crypto: algif - add AEAD support
crypto: algif - enable AEAD interface compilation
crypto: drbg - use single block cipher API
crypto: drbg - remove superflowous memsets
crypto: rng - RNGs must return 0 in success case
crypto: doc - AEAD / RNG AF_ALG interface
MAINTAINERS: add crypto-API.tmpl
crypto: testmgr - fix RNG return code enforcement
crypto: algif_rng - zeroize buffer with random data
crypto: api - prevent helper ciphers from being used
crypto: testmgr - use CRYPTO_ALG_INTERNAL
crypto: cryptd - process CRYPTO_ALG_INTERNAL
crypto: proc - identify internal ciphers
crypto: aesni - mark AES-NI helper ciphers
crypto: clmulni - mark ghash clmulni helper ciphers
crypto: ghash-ce - mark GHASH ARMv8 vmull.p64 helper ciphers
crypto: camellia_aesni_avx2 - mark AES-NI Camellia helper ciphers
crypto: cast5_avx - mark CAST5 helper ciphers
crypto: camellia_aesni_avx - mark AVX Camellia helper ciphers
crypto: cast6_avx - mark CAST6 helper ciphers
crypto: serpent_avx2 - mark Serpent AVX2 helper ciphers
crypto: serpent_avx - mark Serpent AVX helper ciphers
crypto: serpent_sse2 - mark Serpent SSE2 helper ciphers
crypto: twofish_avx - mark Twofish AVX helper ciphers
crypto: aesbs - mark NEON bit sliced AES helper ciphers
crypto: aes-ce - mark ARMv8 AES helper ciphers
crypto: arm64/aes - mark 64 bit ARMv8 AES helper ciphers
crypto: mcryptd - process CRYPTO_ALG_INTERNAL
crypto: sha-mb - mark Multi buffer SHA1 helper cipher
crypto: api - remove instance when test failed
Tadeusz Struk (3):
crypto: aesni - make driver-gcm-aes-aesni helper a proper aead alg
crypto: qat - print ring name in debug output
crypto: qat - fix double release_firmware on error path
Tom Lendacky (5):
crypto: ccp - Updates for checkpatch warnings/errors
crypto: ccp - Update CCP build support
crypto: ccp - Use dma_set_mask_and_coherent to set DMA mask
crypto: ccp - Convert calls to their devm_ counterparts
crypto: ccp - Add ACPI support
Vutla, Lokesh (3):
crypto: omap-sham - Use pm_runtime_irq_safe()
crypto: omap-aes - Fix support for unequal lengths
crypto: omap-sham - Add the offset of sg page to vaddr
Yanjiang Jin (2):
crypto: caam - fix uninitialized edesc->sec4_sg_bytes field
hwrng: caam - fix rng_unmap_ctx's DMA_UNMAP size problem
mancha security (1):
lib: memzero_explicit: use barrier instead of OPTIMIZER_HIDE_VAR
Documentation/DocBook/crypto-API.tmpl | 860 ++++++
Documentation/crypto/crypto-API-userspace.txt | 205 --
.../devicetree/bindings/crypto/img-hash.txt | 27 +
.../bindings/hwrng/brcm,iproc-rng200.txt | 12 +
MAINTAINERS | 1 +
arch/arm/Kconfig | 3 +
arch/arm/crypto/Kconfig | 130 +
arch/arm/crypto/Makefile | 27 +-
arch/arm/crypto/aes-ce-core.S | 518 ++++
arch/arm/crypto/aes-ce-glue.c | 524 ++++
arch/arm/crypto/aesbs-glue.c | 9 +-
arch/arm/crypto/ghash-ce-core.S | 94 +
arch/arm/crypto/ghash-ce-glue.c | 320 +++
arch/arm/crypto/sha1-ce-core.S | 125 +
arch/arm/crypto/sha1-ce-glue.c | 96 +
arch/arm/{include/asm => }/crypto/sha1.h | 3 +
arch/arm/crypto/sha1_glue.c | 112 +-
arch/arm/crypto/sha1_neon_glue.c | 137 +-
arch/arm/crypto/sha2-ce-core.S | 125 +
arch/arm/crypto/sha2-ce-glue.c | 114 +
arch/arm/crypto/sha256-armv4.pl | 716 +++++
arch/arm/crypto/sha256-core.S_shipped | 2808 ++++++++++++++++++++
arch/arm/crypto/sha256_glue.c | 128 +
arch/arm/crypto/sha256_glue.h | 14 +
arch/arm/crypto/sha256_neon_glue.c | 101 +
arch/arm64/crypto/aes-glue.c | 12 +-
arch/arm64/crypto/sha1-ce-core.S | 33 +-
arch/arm64/crypto/sha1-ce-glue.c | 151 +-
arch/arm64/crypto/sha2-ce-core.S | 29 +-
arch/arm64/crypto/sha2-ce-glue.c | 227 +-
arch/mips/cavium-octeon/crypto/Makefile | 5 +-
arch/mips/cavium-octeon/crypto/octeon-crypto.c | 4 +-
arch/mips/cavium-octeon/crypto/octeon-crypto.h | 83 +-
arch/mips/cavium-octeon/crypto/octeon-md5.c | 8 -
arch/mips/cavium-octeon/crypto/octeon-sha1.c | 241 ++
arch/mips/cavium-octeon/crypto/octeon-sha256.c | 280 ++
arch/mips/cavium-octeon/crypto/octeon-sha512.c | 277 ++
arch/mips/include/asm/mach-bcm63xx/bcm63xx_regs.h | 14 -
arch/powerpc/crypto/Makefile | 8 +
arch/powerpc/crypto/aes-spe-core.S | 351 +++
arch/powerpc/crypto/aes-spe-glue.c | 512 ++++
arch/powerpc/crypto/aes-spe-keys.S | 283 ++
arch/powerpc/crypto/aes-spe-modes.S | 630 +++++
arch/powerpc/crypto/aes-spe-regs.h | 42 +
arch/powerpc/crypto/aes-tab-4k.S | 331 +++
arch/powerpc/crypto/md5-asm.S | 243 ++
arch/powerpc/crypto/md5-glue.c | 165 ++
arch/powerpc/crypto/sha1-spe-asm.S | 299 +++
arch/powerpc/crypto/sha1-spe-glue.c | 210 ++
arch/powerpc/crypto/sha256-spe-asm.S | 323 +++
arch/powerpc/crypto/sha256-spe-glue.c | 275 ++
arch/x86/crypto/aesni-intel_glue.c | 187 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 15 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 15 +-
arch/x86/crypto/cast5_avx_glue.c | 9 +-
arch/x86/crypto/cast6_avx_glue.c | 15 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 7 +-
arch/x86/crypto/glue_helper.c | 1 -
arch/x86/crypto/serpent_avx2_glue.c | 15 +-
arch/x86/crypto/serpent_avx_glue.c | 15 +-
arch/x86/crypto/serpent_sse2_glue.c | 15 +-
arch/x86/crypto/sha-mb/sha1_mb.c | 9 +-
arch/x86/crypto/sha-mb/sha1_mb_mgr_init_avx2.c | 2 +-
arch/x86/crypto/sha1_ssse3_glue.c | 139 +-
arch/x86/crypto/sha256-avx-asm.S | 10 +-
arch/x86/crypto/sha256-avx2-asm.S | 10 +-
arch/x86/crypto/sha256-ssse3-asm.S | 10 +-
arch/x86/crypto/sha256_ssse3_glue.c | 193 +-
arch/x86/crypto/sha512-avx-asm.S | 6 +-
arch/x86/crypto/sha512-avx2-asm.S | 6 +-
arch/x86/crypto/sha512-ssse3-asm.S | 6 +-
arch/x86/crypto/sha512_ssse3_glue.c | 202 +-
arch/x86/crypto/twofish_avx_glue.c | 15 +-
crypto/Kconfig | 142 +-
crypto/Makefile | 1 +
crypto/ablk_helper.c | 3 +-
crypto/algapi.c | 42 +-
crypto/algif_aead.c | 666 +++++
crypto/algif_rng.c | 2 +-
crypto/ansi_cprng.c | 6 +-
crypto/api.c | 10 +
crypto/cryptd.c | 49 +-
crypto/crypto_user.c | 39 +-
crypto/drbg.c | 64 +-
crypto/mcryptd.c | 25 +-
crypto/proc.c | 3 +
crypto/sha1_generic.c | 102 +-
crypto/sha256_generic.c | 133 +-
crypto/sha512_generic.c | 123 +-
crypto/tcrypt.c | 4 +-
crypto/testmgr.c | 24 +-
drivers/char/hw_random/Kconfig | 13 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/bcm63xx-rng.c | 120 +-
drivers/char/hw_random/core.c | 45 +-
drivers/char/hw_random/exynos-rng.c | 12 +-
drivers/char/hw_random/iproc-rng200.c | 239 ++
drivers/char/hw_random/msm-rng.c | 11 +-
drivers/char/hw_random/octeon-rng.c | 4 +-
drivers/char/hw_random/omap-rng.c | 23 +-
drivers/char/hw_random/pseries-rng.c | 4 +-
drivers/char/hw_random/xgene-rng.c | 10 +
drivers/crypto/Kconfig | 24 +-
drivers/crypto/Makefile | 2 +
drivers/crypto/amcc/crypto4xx_core.c | 6 +-
drivers/crypto/atmel-aes.c | 26 +-
drivers/crypto/atmel-sha.c | 37 +-
drivers/crypto/atmel-tdes.c | 3 +-
drivers/crypto/caam/caamhash.c | 1 +
drivers/crypto/caam/caamrng.c | 6 +-
drivers/crypto/ccp/Makefile | 9 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 12 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 4 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 3 +-
drivers/crypto/ccp/ccp-crypto-main.c | 5 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 12 +-
drivers/crypto/ccp/ccp-crypto.h | 3 -
drivers/crypto/ccp/ccp-dev.c | 7 +-
drivers/crypto/ccp/ccp-dev.h | 12 +-
drivers/crypto/ccp/ccp-ops.c | 24 +-
drivers/crypto/ccp/ccp-pci.c | 21 +-
drivers/crypto/ccp/ccp-platform.c | 111 +-
drivers/crypto/img-hash.c | 1029 +++++++
drivers/crypto/mxs-dcp.c | 2 +-
drivers/crypto/omap-aes.c | 14 +-
drivers/crypto/omap-sham.c | 2 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 -
drivers/crypto/qat/qat_common/adf_accel_engine.c | 35 +-
drivers/crypto/qat/qat_common/adf_aer.c | 21 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 5 +-
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 10 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 66 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 3 +-
drivers/crypto/qat/qat_common/adf_init.c | 88 +-
drivers/crypto/qat/qat_common/adf_transport.c | 31 +-
.../crypto/qat/qat_common/adf_transport_debug.c | 2 +
drivers/crypto/qat/qat_common/icp_qat_hw.h | 2 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 9 +-
drivers/crypto/qat/qat_common/qat_hal.c | 6 +-
drivers/crypto/qat/qat_dh895xcc/adf_admin.c | 3 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 3 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 6 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 4 +-
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 15 +-
drivers/crypto/sahara.c | 51 +-
drivers/crypto/talitos.c | 17 +-
drivers/crypto/ux500/hash/hash_core.c | 2 +-
drivers/crypto/vmx/Kconfig | 8 +
drivers/crypto/vmx/Makefile | 19 +
drivers/crypto/vmx/aes.c | 139 +
drivers/crypto/vmx/aes_cbc.c | 184 ++
drivers/crypto/vmx/aes_ctr.c | 167 ++
drivers/crypto/vmx/aesp8-ppc.h | 20 +
drivers/crypto/vmx/aesp8-ppc.pl | 1930 ++++++++++++++
drivers/crypto/vmx/ghash.c | 214 ++
drivers/crypto/vmx/ghashp8-ppc.pl | 228 ++
drivers/crypto/vmx/ppc-xlate.pl | 207 ++
drivers/crypto/vmx/vmx.c | 88 +
include/crypto/algapi.h | 2 +-
include/crypto/rng.h | 3 +-
include/crypto/sha.h | 15 +-
include/crypto/sha1_base.h | 106 +
include/crypto/sha256_base.h | 128 +
include/crypto/sha512_base.h | 131 +
include/linux/crypto.h | 6 +
include/linux/hw_random.h | 4 +
lib/string.c | 2 +-
168 files changed, 18223 insertions(+), 2202 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-15 3:39 ` Crypto Update for 4.1 Herbert Xu
@ 2015-04-16 1:58 ` Linus Torvalds
2015-04-16 2:37 ` Linus Torvalds
2015-06-22 8:44 ` Crypto Update for 4.2 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16 1:58 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Apr 14, 2015 at 8:39 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 4.1:
Just a heads-up: this breaks iwlwifi for me after suspend.
I'm bisecting right now. But because this laptop is what I expect to
travel with tomorrow, I will ruthlessly revert anything I find,
because I need it to work.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 1:58 ` Linus Torvalds
@ 2015-04-16 2:37 ` Linus Torvalds
2015-04-16 2:38 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16 2:37 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, Apr 15, 2015 at 6:58 PM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> On Tue, Apr 14, 2015 at 8:39 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>>
>> Here is the crypto update for 4.1:
>
> Just a heads-up: this breaks iwlwifi for me after suspend.
Ok, bisect completed:
[torvalds@vaio linux]$ git bisect bad
9c521a200bc3c12bd724e48a75c57d5358f672be is the first bad commit
commit 9c521a200bc3c12bd724e48a75c57d5358f672be
Author: Stephan Mueller <smueller@chronox.de>
Date: Thu Apr 9 12:09:55 2015 +0200
crypto: api - remove instance when test failed
...
and while I have no idea *why* it breaks iwlwifi after a
suspend/resume cycle, it is 100% repeatable. The bisect zoomed right
to that commit, and reverting it on top of the current tree also makes
everything work again.
So it gets reverted. I'll be happy to test things out, but with the
merge window *and* travel, I may or may not be quick about it.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 2:37 ` Linus Torvalds
@ 2015-04-16 2:38 ` Linus Torvalds
2015-04-16 2:42 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16 2:38 UTC (permalink / raw)
To: Herbert Xu, Stephan Mueller
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
Oh, and I forgot to add Stephan to the email recipients list..
Sorry for the duplicate email,
Linus
On Wed, Apr 15, 2015 at 7:37 PM, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
> On Wed, Apr 15, 2015 at 6:58 PM, Linus Torvalds
> <torvalds@linux-foundation.org> wrote:
>> On Tue, Apr 14, 2015 at 8:39 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>>>
>>> Here is the crypto update for 4.1:
>>
>> Just a heads-up: this breaks iwlwifi for me after suspend.
>
> Ok, bisect completed:
>
> [torvalds@vaio linux]$ git bisect bad
> 9c521a200bc3c12bd724e48a75c57d5358f672be is the first bad commit
> commit 9c521a200bc3c12bd724e48a75c57d5358f672be
> Author: Stephan Mueller <smueller@chronox.de>
> Date: Thu Apr 9 12:09:55 2015 +0200
>
> crypto: api - remove instance when test failed
> ...
>
> and while I have no idea *why* it breaks iwlwifi after a
> suspend/resume cycle, it is 100% repeatable. The bisect zoomed right
> to that commit, and reverting it on top of the current tree also makes
> everything work again.
>
> So it gets reverted. I'll be happy to test things out, but with the
> merge window *and* travel, I may or may not be quick about it.
>
> Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 2:38 ` Linus Torvalds
@ 2015-04-16 2:42 ` Herbert Xu
2015-04-16 2:49 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-04-16 2:42 UTC (permalink / raw)
To: Linus Torvalds
Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Apr 15, 2015 at 07:38:29PM -0700, Linus Torvalds wrote:
>
> > Ok, bisect completed:
> >
> > [torvalds@vaio linux]$ git bisect bad
> > 9c521a200bc3c12bd724e48a75c57d5358f672be is the first bad commit
> > commit 9c521a200bc3c12bd724e48a75c57d5358f672be
> > Author: Stephan Mueller <smueller@chronox.de>
> > Date: Thu Apr 9 12:09:55 2015 +0200
> >
> > crypto: api - remove instance when test failed
Is CONFIG_CRYPTO_MANAGER_DISABLE_TESTS set or unset in you .config?
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 2:42 ` Herbert Xu
@ 2015-04-16 2:49 ` Linus Torvalds
2015-04-16 3:07 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16 2:49 UTC (permalink / raw)
To: Herbert Xu
Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Apr 15, 2015 at 7:42 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Is CONFIG_CRYPTO_MANAGER_DISABLE_TESTS set or unset in you .config?
# CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
I'll send you the full .config in private (no need to spam the mailing
list) in case you have any other questions about my setup.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 2:49 ` Linus Torvalds
@ 2015-04-16 3:07 ` Herbert Xu
2015-04-16 3:34 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-04-16 3:07 UTC (permalink / raw)
To: Linus Torvalds
Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Apr 15, 2015 at 07:49:01PM -0700, Linus Torvalds wrote:
> On Wed, Apr 15, 2015 at 7:42 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Is CONFIG_CRYPTO_MANAGER_DISABLE_TESTS set or unset in you .config?
>
> # CONFIG_CRYPTO_MANAGER_DISABLE_TESTS is not set
>
> I'll send you the full .config in private (no need to spam the mailing
> list) in case you have any other questions about my setup.
Thanks! It actually appears to be a very simple bug that I somehow
missed during reviewing.
---8<---
The commit 9c521a200bc3c12bd724e48a75c57d5358f672be ("crypto:
api - remove instance when test failed") tried to grab a module
reference count before the module was even set. Worse, it then
goes on to free the module reference count after it is set so
you quickly end up with a negative module reference count which
prevents people from using any instances belonging to that module.
This patch moves the module initialisation before the reference
count.
Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
diff --git a/crypto/algapi.c b/crypto/algapi.c
index 2d0a1c6..d2627a3 100644
--- a/crypto/algapi.c
+++ b/crypto/algapi.c
@@ -525,12 +525,12 @@ int crypto_register_instance(struct crypto_template *tmpl,
if (err)
return err;
- if (unlikely(!crypto_mod_get(&inst->alg)))
- return -EAGAIN;
-
inst->alg.cra_module = tmpl->module;
inst->alg.cra_flags |= CRYPTO_ALG_INSTANCE;
+ if (unlikely(!crypto_mod_get(&inst->alg)))
+ return -EAGAIN;
+
down_write(&crypto_alg_sem);
larval = __crypto_register_alg(&inst->alg);
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 3:07 ` Herbert Xu
@ 2015-04-16 3:34 ` Linus Torvalds
2015-04-23 19:27 ` Bobby Powers
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-04-16 3:34 UTC (permalink / raw)
To: Herbert Xu
Cc: Stephan Mueller, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Apr 15, 2015 at 8:07 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Thanks! It actually appears to be a very simple bug that I somehow
> missed during reviewing.
Ok, this patch seems to fix it for me, so I undid my revert that I
hadn't pushed out yet, and pushed out this instead.
Thanks,
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-16 3:34 ` Linus Torvalds
@ 2015-04-23 19:27 ` Bobby Powers
2015-04-23 20:10 ` Ard Biesheuvel
0 siblings, 1 reply; 246+ messages in thread
From: Bobby Powers @ 2015-04-23 19:27 UTC (permalink / raw)
To: Linus Torvalds, Ard Biesheuvel
Cc: Herbert Xu, Stephan Mueller, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
[-- Attachment #1: Type: text/plain, Size: 694 bytes --]
Hello,
Linus Torvalds <torvalds@linux-foundation.org> wrote:
> Ok, this patch seems to fix it for me, so I undid my revert that I
> hadn't pushed out yet, and pushed out this instead.
Commit e68410ebf62676dfb93aafff7c55b76644f37072 in Linus's tree from
this crpyto update (crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3
implementation to base layer) causes a GPF on boot in
sha512_ssse3_finup for me on a Broadwell i7-5600U, rendering the
kernel unbootable.
Reverting that commit enables me to boot. I don't know enough about
the code to comment. Config is attached, and I can provide a photo of
the reported Call Trace if thats helpful. It is quite reproducible
for me.
yours,
Bobby
[-- Attachment #2: config --]
[-- Type: application/octet-stream, Size: 122699 bytes --]
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-23 19:27 ` Bobby Powers
@ 2015-04-23 20:10 ` Ard Biesheuvel
2015-04-23 21:35 ` Bobby Powers
0 siblings, 1 reply; 246+ messages in thread
From: Ard Biesheuvel @ 2015-04-23 20:10 UTC (permalink / raw)
To: Bobby Powers
Cc: Linus Torvalds, Herbert Xu, Stephan Mueller, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On 23 April 2015 at 21:27, Bobby Powers <bobbypowers@gmail.com> wrote:
> Hello,
>
> Linus Torvalds <torvalds@linux-foundation.org> wrote:
>> Ok, this patch seems to fix it for me, so I undid my revert that I
>> hadn't pushed out yet, and pushed out this instead.
>
> Commit e68410ebf62676dfb93aafff7c55b76644f37072 in Linus's tree from
> this crpyto update (crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3
> implementation to base layer) causes a GPF on boot in
> sha512_ssse3_finup for me on a Broadwell i7-5600U, rendering the
> kernel unbootable.
>
> Reverting that commit enables me to boot. I don't know enough about
> the code to comment. Config is attached, and I can provide a photo of
> the reported Call Trace if thats helpful. It is quite reproducible
> for me.
>
Hello Bobby,
Would you be able to check whether the following patch fixes the crash?
diff --git a/arch/x86/crypto/sha512-avx2-asm.S
b/arch/x86/crypto/sha512-avx2-asm.S
index a4771dcd1fcf..1f20b35d8573 100644
--- a/arch/x86/crypto/sha512-avx2-asm.S
+++ b/arch/x86/crypto/sha512-avx2-asm.S
@@ -79,7 +79,7 @@ NUM_BLKS = %rdx
c = %rcx
d = %r8
e = %rdx
-y3 = %rdi
+y3 = %rsi
TBL = %rbp
If not, please share the call trace and the content of /proc/cpuinfo
Regards,
Ard.
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.1
2015-04-23 20:10 ` Ard Biesheuvel
@ 2015-04-23 21:35 ` Bobby Powers
2015-04-24 6:37 ` [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change Ard Biesheuvel
0 siblings, 1 reply; 246+ messages in thread
From: Bobby Powers @ 2015-04-23 21:35 UTC (permalink / raw)
To: Ard Biesheuvel
Cc: Linus Torvalds, Herbert Xu, Stephan Mueller, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Apr 23, 2015 at 4:10 PM, Ard Biesheuvel
<ard.biesheuvel@linaro.org> wrote:
>
> Hello Bobby,
>
> Would you be able to check whether the following patch fixes the crash?
>
> diff --git a/arch/x86/crypto/sha512-avx2-asm.S
> b/arch/x86/crypto/sha512-avx2-asm.S
> index a4771dcd1fcf..1f20b35d8573 100644
> --- a/arch/x86/crypto/sha512-avx2-asm.S
> +++ b/arch/x86/crypto/sha512-avx2-asm.S
> @@ -79,7 +79,7 @@ NUM_BLKS = %rdx
> c = %rcx
> d = %r8
> e = %rdx
> -y3 = %rdi
> +y3 = %rsi
>
> TBL = %rbp
>
Tested-By: Bobby Powers <bobbypowers@gmail.com>
Thanks Ard. Yes, this fixes things for me. Good eye :)
yours,
Bobby
^ permalink raw reply [flat|nested] 246+ messages in thread
* [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change
2015-04-23 21:35 ` Bobby Powers
@ 2015-04-24 6:37 ` Ard Biesheuvel
2015-04-24 12:20 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Ard Biesheuvel @ 2015-04-24 6:37 UTC (permalink / raw)
To: linux-crypto, herbert, torvalds, smueller, davem, linux-kernel,
bobbypowers
Cc: Ard Biesheuvel
Patch e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512
SSSE3 implementation to base layer") changed the prototypes of the
core asm SHA-512 implementations so that they are compatible with
the prototype used by the base layer.
However, in one instance, the register that was used for passing the
input buffer was reused as a scratch register later on in the code,
and since the input buffer param changed places with the digest param
-which needs to be written back before the function returns- this
resulted in the scratch register to be dereferenced in a memory write
operation, causing a GPF.
Fix this by changing the scratch register to use the same register as
the input buffer param again.
Fixes: e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer")
Reported-By: Bobby Powers <bobbypowers@gmail.com>
Tested-By: Bobby Powers <bobbypowers@gmail.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
---
arch/x86/crypto/sha512-avx2-asm.S | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/crypto/sha512-avx2-asm.S b/arch/x86/crypto/sha512-avx2-asm.S
index a4771dcd1fcf..1f20b35d8573 100644
--- a/arch/x86/crypto/sha512-avx2-asm.S
+++ b/arch/x86/crypto/sha512-avx2-asm.S
@@ -79,7 +79,7 @@ NUM_BLKS = %rdx
c = %rcx
d = %r8
e = %rdx
-y3 = %rdi
+y3 = %rsi
TBL = %rbp
--
1.8.3.2
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change
2015-04-24 6:37 ` [PATCH] crypto: x86/sha512_ssse3 - fixup for asm function prototype change Ard Biesheuvel
@ 2015-04-24 12:20 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-04-24 12:20 UTC (permalink / raw)
To: Ard Biesheuvel
Cc: linux-crypto, torvalds, smueller, davem, linux-kernel, bobbypowers
On Fri, Apr 24, 2015 at 08:37:09AM +0200, Ard Biesheuvel wrote:
> Patch e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512
> SSSE3 implementation to base layer") changed the prototypes of the
> core asm SHA-512 implementations so that they are compatible with
> the prototype used by the base layer.
>
> However, in one instance, the register that was used for passing the
> input buffer was reused as a scratch register later on in the code,
> and since the input buffer param changed places with the digest param
> -which needs to be written back before the function returns- this
> resulted in the scratch register to be dereferenced in a memory write
> operation, causing a GPF.
>
> Fix this by changing the scratch register to use the same register as
> the input buffer param again.
>
> Fixes: e68410ebf626 ("crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer")
> Reported-By: Bobby Powers <bobbypowers@gmail.com>
> Tested-By: Bobby Powers <bobbypowers@gmail.com>
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Patch applied. Thanks!
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-01-07 2:17 ` Herbert Xu
2015-01-20 0:52 ` Herbert Xu
2015-03-09 5:19 ` Crypto Fixes for 4.0 Herbert Xu
@ 2015-04-25 8:03 ` Herbert Xu
2015-05-05 10:06 ` Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-04-25 8:03 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem with img-hash under non-standard
configurations and a serious regression with sha512_ssse3 which can
lead to boot failures.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ard Biesheuvel (1):
crypto: x86/sha512_ssse3 - fixup for asm function prototype change
Geert Uytterhoeven (1):
crypto: img-hash - CRYPTO_DEV_IMGTEC_HASH should depend on HAS_DMA
arch/x86/crypto/sha512-avx2-asm.S | 2 +-
drivers/crypto/Kconfig | 3 ++-
2 files changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-04-25 8:03 ` Crypto Fixes for 4.1 Herbert Xu
@ 2015-05-05 10:06 ` Herbert Xu
2015-05-11 5:56 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-05 10:06 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem with bcm63xx and yet another fix
to the memzero_explicit function to ensure that the memset is not
elided.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Daniel Borkmann (1):
lib: make memzero_explicit more robust against dead store elimination
Álvaro Fernández Rojas (1):
hwrng: bcm63xx - Fix driver compilation
drivers/char/hw_random/bcm63xx-rng.c | 18 +++++++++---------
include/linux/compiler-gcc.h | 16 +++++++++++++++-
include/linux/compiler-intel.h | 3 +++
include/linux/compiler.h | 4 ++++
lib/string.c | 2 +-
5 files changed, 32 insertions(+), 11 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-05-05 10:06 ` Herbert Xu
@ 2015-05-11 5:56 ` Herbert Xu
2015-05-20 6:54 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-11 5:56 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a the implementation of CRC32 on arm64 where it
incorrectly applied negation on the result. It also fixes the
arm64 implementations of SHA/SHA256 where in some cases it may
end up finalising the result twice.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ard Biesheuvel (3):
crypto: arm64/crc32 - bring in line with generic CRC32
crypto: arm64/sha1-ce - prevent asm code finalization in final() path
crypto: arm64/sha2-ce - prevent asm code finalization in final() path
arch/arm64/crypto/crc32-arm64.c | 22 +++++++++++++++++++---
arch/arm64/crypto/sha1-ce-glue.c | 3 +++
arch/arm64/crypto/sha2-ce-glue.c | 3 +++
3 files changed, 25 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-05-11 5:56 ` Herbert Xu
@ 2015-05-20 6:54 ` Herbert Xu
2015-05-22 4:05 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-20 6:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a the crash in the newly added algif_aead interface
when it tries to link SG lists.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Tadeusz Struk (1):
crypto: algif_aead - fix invalid sgl linking
crypto/algif_aead.c | 9 ++++-----
1 file changed, 4 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-05-20 6:54 ` Herbert Xu
@ 2015-05-22 4:05 ` Herbert Xu
2015-05-22 21:29 ` Linus Torvalds
2015-05-26 8:43 ` Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-05-22 4:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* Crash in the newly added algif_aead interface when it tries to
link SG lists.
* ICV corruption in s390/ghash when the same tfm is used by more
than one thread.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
or
master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Harald Freudenberger (1):
crypto: s390/ghash - Fix incorrect ghash icv buffer handling.
Tadeusz Struk (1):
crypto: algif_aead - fix invalid sgl linking
arch/s390/crypto/ghash_s390.c | 25 +++++++++++++------------
crypto/algif_aead.c | 9 ++++-----
2 files changed, 17 insertions(+), 17 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.1
2015-05-22 4:05 ` Herbert Xu
@ 2015-05-22 21:29 ` Linus Torvalds
2015-05-22 21:39 ` Herbert Xu
2015-05-26 8:43 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-05-22 21:29 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, May 21, 2015 at 9:05 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> or
>
> master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Mind fixing your script to not have that old "master.kernel.org' thing
that no longer works and hasn't worked in a long time? I thought I
asked you earlier, but it turns out that was Dmitry and the input tree
who had the same old script...
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.1
2015-05-22 21:29 ` Linus Torvalds
@ 2015-05-22 21:39 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-05-22 21:39 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, May 22, 2015 at 02:29:11PM -0700, Linus Torvalds wrote:
> On Thu, May 21, 2015 at 9:05 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Please pull from
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
> >
> > or
> >
> > master.kernel.org:/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
>
> Mind fixing your script to not have that old "master.kernel.org' thing
> that no longer works and hasn't worked in a long time? I thought I
> asked you earlier, but it turns out that was Dmitry and the input tree
> who had the same old script...
Sure I'll get rid of it.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-05-22 4:05 ` Herbert Xu
2015-05-22 21:29 ` Linus Torvalds
@ 2015-05-26 8:43 ` Herbert Xu
2015-06-18 3:43 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-05-26 8:43 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push disables the newly (4.1) added user-space AEAD interface
so that we can fix issues in the underlying kernel AEAD interface.
Once the new kernel AEAD interface is ready we can then reenable
the user-space AEAD interface.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: algif_aead - Disable AEAD user-space for now
crypto/Kconfig | 9 ---------
1 file changed, 9 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.1
2015-05-26 8:43 ` Herbert Xu
@ 2015-06-18 3:43 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-18 3:43 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
1) Crash in caam hash due to uninitialised buffer lengths.
2) Alignment issue in caam RNG that may lead to non-random output.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Steve Cornelius (2):
crypto: caam - improve initalization for context state saves
crypto: caam - fix RNG buffer cache alignment
drivers/crypto/caam/caamhash.c | 2 ++
drivers/crypto/caam/caamrng.c | 2 +-
2 files changed, 3 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 4.2
2015-04-15 3:39 ` Crypto Update for 4.1 Herbert Xu
2015-04-16 1:58 ` Linus Torvalds
@ 2015-06-22 8:44 ` Herbert Xu
2015-06-23 4:26 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-22 8:44 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 4.2:
API:
* Convert RNG interface to new style.
* New AEAD interface with one SG list for AD and plain/cipher text.
All external AEAD users have been converted.
* New asymmetric key interface (akcipher).
Algorithms:
* Chacha20, Poly1305 and RFC7539 support.
* New RSA implementation.
* Jitter RNG.
* DRBG is now seeded with both /dev/random and Jitter RNG. If
kernel pool isn't ready then DRBG will be reseeded when it is.
* DRBG is now the default crypto API RNG, replacing krng.
* 842 compression (previously part of powerpc nx driver).
Drivers:
* Accelerated SHA-512 for arm64.
* New Marvell CESA driver that supports DMA and more algorithms.
* Updated powerpc nx 842 support.
* Added support for SEC1 hardware to talitos.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Allan, Bruce W (2):
crypto: qat - do not duplicate string containing firmware name
crypto: qat - add driver version
Ard Biesheuvel (3):
crypto: testmgr - add test cases for CRC32
crypto: arm/sha512 - accelerated SHA-512 using ARM generic ASM and NEON
crypto: arm/aes - streamline AES-192 code path
Arnaud Ebalard (4):
crypto: marvell/cesa - add Triple-DES support
crypto: marvell/cesa - add MD5 support
crypto: marvell/cesa - add SHA256 support
crypto: marvell/cesa - add support for Kirkwood and Dove SoCs
Boris BREZILLON (11):
crypto: mv_cesa - request registers memory region
crypto: mv_cesa - document the clocks property
crypto: mv_cesa - use gen_pool to reserve the SRAM memory region
crypto: mv_cesa - explicitly define kirkwood and dove compatible strings
crypto: marvell/cesa - add a new driver for Marvell's CESA
crypto: marvell/cesa - add TDMA support
crypto: marvell/cesa - add DES support
crypto: marvell/cesa - add support for all armada SoCs
crypto: marvell/cesa - add allhwsupport module parameter
crypto: marvell/cesa - add support for Orion SoCs
crypto: marvell/cesa - add DT bindings documentation
Boris Brezillon (1):
crypto: marvell/cesa - remove COMPILE_TEST dependency
Colin Ian King (1):
crypto: mv_cesa - ensure backlog is initialised
Dan Carpenter (1):
crypto: talitos - fix size calculation in talitos_edesc_alloc()
Dan Streetman (19):
powerpc: export of_get_ibm_chip_id function
powerpc: Add ICSWX instruction
lib: add software 842 compression/decompression
crypto: 842 - change 842 alg to use software
crypto: nx - rename nx-842.c to nx-842-pseries.c
crypto: nx - add NX-842 platform frontend driver
crypto: nx - add nx842 constraints
crypto: nx - add PowerNV platform NX-842 driver
crypto: nx - simplify pSeries nx842 driver
crypto: nx - add hardware 842 crypto comp alg
lib: make lib/842 decompress functions static
lib: correct 842 decompress for 32 bit
crypto: nx - remove 842-nx null checks
crypto: nx - prevent nx 842 load if no hw driver
crypto: nx - fix nx-842 pSeries driver minimum buffer size
crypto: nx - move include/linux/nx842.h into drivers/crypto/nx/nx-842.h
crypto: nx - replace NX842_MEM_COMPRESS with function
crypto: nx - add LE support to pSeries platform driver
MAINTAINERS: clarify drivers/crypto/nx/ file ownership
David Howells (2):
crypto: pcomp - Constify (de)compression parameters
crypto: testmgr - Wrap the LHS in expressions of the form !x == y
Fabio Estevam (1):
crypto: sahara - propagate the error on clk_disable_unprepare() failure
Harald Freudenberger (1):
crypto: testmgr - Added one larger ghash testvector (400 bytes) to the testmgr.
Herbert Xu (166):
crypto: drbg - Initialise mutex in drbg_healthcheck_sanity
crypto: drbg - Do not seed RNG in drbg_kcapi_init
crypto: api - Add crypto_alg_extsize helper
crypto: shash - Use crypto_alg_extsize helper
crypto: pcomp - Use crypto_alg_extsize helper
crypto: rng - Convert crypto_rng to new style crypto_type
crypto: rng - Introduce crypto_rng_generate
crypto: rng - Mark crypto_rng_reset seed as const
crypto: rng - Convert low-level crypto_rng to new style
crypto: rng - Add crypto_rng_set_entropy
crypto: rng - Add multiple algorithm registration interface
crypto: drbg - Convert to new rng interface
crypto: ansi_cprng - Remove bogus inclusion of internal.h
crypto: ansi_cprng - Convert to new rng interface
crypto: krng - Convert to new rng interface
crypto: rng - Remove old low-level rng interface
crypto: algif_rng - Remove obsolete const-removal cast
crypto: rng - Zero seed in crypto_rng_reset
crypto: tcrypt - Handle async return from crypto_ahash_init
crypto: api - Move module sig ifdef into accessor function
crypto: drbg - Remove FIPS ifdef from drbg_healthcheck_sanity
crypto: caam - Remove bogus references to crypto API internals
crypto: api - Include linux/fips.h
crypto: fips - Remove bogus inclusion of internal.h
crypto: fips - Move fips_enabled sysctl into fips.c
crypto: tcrypt - Include linux/fips.h for fips_enabled
crypto: testmgr - Include linux/fips.h for fips_enabled
crypto: api - Remove linux/fips.h from internal.h
crypto: arm64/aes-ce-ccm - Include crypto/internal/aead.h
crypto: algif_aead - Include crypto/aead.h
crypto: tcrypt - Include crypto/aead.h
crypto: testmgr - Include crypto/aead.h
mac80211: Include crypto/aead.h
mac802154: Include crypto/aead.h
crypto: api - Fix build error when modules are disabled
crypto: skcipher - Fix corner case in crypto_lookup_skcipher
crypto: aead - Fix corner case in crypto_lookup_aead
crypto: api - Add crypto_grab_spawn primitive
crypto: authenc - Include internal/aead.h
crypto: authencesn - Include internal/aead.h
crypto: caam - Include internal/aead.h
crypto: ixp4xx - Include internal/aead.h
crypto: nx - Include internal/aead.h
crypto: qat - Include internal/aead.h
crypto: talitos - Include internal/aead.h
crypto: blkcipher - Include crypto/aead.h
crypto: caam - Remove unnecessary reference to crt_aead
crypto: aead - Add crypto_aead_set_reqsize helper
crypto: authenc - Use crypto_aead_set_reqsize helper
crypto: authencesn - Use crypto_aead_set_reqsize helper
crypto: ccm - Use crypto_aead_set_reqsize helper
crypto: cryptd - Use crypto_aead_set_reqsize helper
crypto: gcm - Use crypto_aead_set_reqsize helper
crypto: pcrypt - Use crypto_aead_set_reqsize helper
crypto: seqiv - Use crypto_aead_set_reqsize helper
crypto: aesni - Use crypto_aead_set_reqsize helper
crypto: ixp4xx - Use crypto_aead_set_reqsize helper
crypto: picoxcell - Use crypto_aead_set_reqsize helper
crypto: qat - Use crypto_aead_set_reqsize helper
crypto: cryptd - Add missing aead.h inclusion
crypto: aead - Convert top level interface to new style
crypto: cryptd - Use crypto_grab_aead
crypto: pcrypt - Use crypto_grab_aead
crypto: scatterwalk - Add scatterwalk_ffwd helper
crypto: aead - Add new interface with single SG list
crypto: aead - Rename aead_alg to old_aead_alg
crypto: caam - Use old_aead_alg
crypto: aead - Add crypto_aead_maxauthsize
crypto: ixp4xx - Use crypto_aead_maxauthsize
crypto: nx - Remove unnecessary maxauthsize check
crypto: aead - Add support for new AEAD implementations
crypto: null - Add default null skcipher
crypto: gcm - Use default null skcipher
crypto: scatterwalk - Check for same address in map_and_copy
crypto: seqiv - Add support for new AEAD interface
crypto: seqiv - Add seqniv
crypto: echainiv - Add encrypted chain IV generator
crypto: aead - Add crypto_aead_alg_ivsize/maxauthsize
crypto: pcrypt - Make tfm_count an atomic_t
crypto: skcipher - Use tmpl->create
crypto: aead - Use tmpl->create
crypto: seqiv - Use aead_register_instance
crypto: echainiv - Use aead_register_instance
crypto: aead - Do not set cra_type for new style instances
crypto: echainiv - Stop using cryptoff
crypto: seqiv - Stop using cryptoff
crypto: aead - Remove unused cryptoff parameter
random: Wake up all getrandom(2) callers when pool is ready
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
crypto: aead - Document behaviour of AD in destination buffer
crypto: scatterwalk - Add missing sg_init_table to scatterwalk_ffwd
crypto: aead - Preserve in-place processing in old_crypt
crypto: aead - Add common IV generation code
crypto: echainiv - Copy AD along with plain text
crypto: echainiv - Use common IV generation code
crypto: echainiv - Fix IV size in context size calculation
crypto: seqiv - Copy AD along with plain/cipher text
crypto: seqiv - Use common IV generation code
crypto: seqiv - Fix IV size in context size calculation
crypto: seqiv - Fix module unload/reload crash
crypto: testmgr - Switch to new AEAD interface
xfrm: Add IV generator information to xfrm_algo_desc
ipsec: Add IV generator information to xfrm_state
esp4: Switch to new AEAD interface
esp6: Switch to new AEAD interface
mac802154: Switch to new AEAD interface
mac80211: Switch to new AEAD interface
crypto: tcrypt - Switch to new AEAD interface
crypto: algif_aead - Switch to new AEAD interface
Revert "crypto: algif_aead - Disable AEAD user-space for now"
crypto: aead - Add type-safe init/exit functions
crypto: aead - Add aead_alg_instance
crypto: api - Include alignment in crypto_alg_extsize
crypto: aead - Ignore return value from crypto_unregister_alg
crypto: aead - Add multiple algorithm registration interface
crypto: pcrypt - Add support for new AEAD interface
crypto: cryptd - Add setkey/setauthsize functions for AEAD
crypto: aesni - Convert top-level rfc4106 algorithm to new interface
crypto: cryptd - Convert to new AEAD interface
crypto: aesni - Convert rfc4106 to new AEAD interface
crypto: scatterwalk - Hide PageSlab call to optimise away flush_dcache_page
crypto: chainiv - Move IV seeding into init function
crypto: echainiv - Move IV seeding into init function
crypto: eseqiv - Move IV seeding into init function
crypto: seqiv - Move IV seeding into init function
crypto: drbg - Add stdrng alias and increase priority
crypto: echainiv - Set Kconfig default to m
crypto: rng - Make DRBG the default RNG
crypto: rng - Remove krng
crypto: caam - Clamp AEAD SG list by input length
nios2: Export get_cycles
random: Add callback API for random pool readiness
random: Remove kernel blocking API
crypto: drbg - Add select on sha256
crypto: picoxcell - Include linux/sizes.h
crypto: picoxcell - Make use of sg_nents_for_len
crypto: picoxcell - Clamp AEAD SG list by input length
crypto: vmx - Remove duplicate PPC64 dependency
crypto: vmx - Reindent to kernel style
crypto: testmgr - Disable rfc4543 test
crypto: gcm - Convert to new AEAD interface
crypto: testmgr - Update rfc4543 test vectors
crypto: nx - Convert GCM to new AEAD interface
crypto: caam - Handle errors in dma_map_sg_chained
crypto: caam - Convert GCM to new AEAD interface
Revert "crypto: testmgr - Disable rfc4543 test"
crypto: testmgr - Add mcgrew test vectors for rfc4106
crypto: tcrypt - Add rfc4309(ccm(aes)) speed test
crypto: tcrypt - Fixed AEAD speed test setup
crypto: drivers - Fix Kconfig selects
crypto: api - Add CRYPTO_MINALIGN_ATTR to struct crypto_alg
crypto: aead - Fix aead_instance struct size
crypto: caam - Reintroduce DESC_MAX_USED_BYTES
crypto: caam - Set last bit on src SG list
Merge branch 'mvebu/drivers' of git://git.kernel.org/pub/scm/linux/kernel/git/arm/arm-soc
crypto: nx - Check for bogus firmware properties
crypto: skcipher - Allow givencrypt to be NULL
crypto: rng - Do not free default RNG when it becomes unused
crypto: user - Move cryptouser.h to uapi
crypto: user - Add CRYPTO_MSG_DELRNG
crypto: chainiv - Offer normal cipher functionality without RNG
crypto: eseqiv - Offer normal cipher functionality without RNG
crypto: seqiv - Add compatibility support without RNG
crypto: echainiv - Only hold RNG during initialisation
crypto: af_alg - Forbid the use internal algorithms
crypto: algif_aead - Temporarily disable all AEAD algorithms
Horia Geant? (4):
crypto: talitos - avoid memleak in talitos_alg_alloc()
Revert "crypto: talitos - convert to use be16_add_cpu()"
crypto: talitos - avoid out of bound scatterlist iterator
crypto: talitos - static code checker fixes
Jeremiah Mahler (1):
crypto: aesni - fix crypto_fpu_exit() section mismatch
LABBE Corentin (7):
crypto: md5 - add MD5 initial vectors
crypto: md5 - use md5 IV MD5_HX instead of their raw value
crypto: powerpc/md5 - use md5 IV MD5_HX instead of their raw value
crypto: sparc/md5 - use md5 IV MD5_HX instead of their raw value
crypto: n2 - use md5 IV MD5_HX instead of their raw value
crypto: octeon - use md5 IV MD5_HX instead of their raw value
crypto: testmgr - Document struct cipher_testvec
LEROY Christophe (17):
crypto: talitos - Use zero entry to init descriptors ptrs to zero
crypto: talitos - Refactor the sg in/out chain allocation
crypto: talitos - talitos_ptr renamed ptr for more lisibility
crypto: talitos - Add a helper function to clear j_extent field
crypto: talitos - remove param 'extent' in map_single_talitos_ptr()
crypto: talitos - helper function for ptr len
crypto: talitos - enhanced talitos_desc struct for SEC1
crypto: talitos - add sub-choice in talitos CONFIG for SEC1
crypto: talitos - Add a feature to tag SEC1
crypto: talitos - fill in talitos descriptor iaw SEC1 or SEC2+
crypto: talitos - adaptation of talitos_submit() for SEC1
crypto: talitos - base address for Execution Units
crypto: talitos - adapt interrupts and reset functions to SEC1
crypto: talitos - implement scatter/gather copy for SEC1
crypto: talitos - SEC1 bugs on 0 data hash
crypto: talitos - Add fsl,sec1.0 compatible
crypto: talitos - Update DT bindings with SEC1
Leonidas Da Silva Barbosa (2):
crypto: nx - Fixing NX data alignment with nx_sg list
crypto: nx - Fixing SHA update bug
Martin Willi (10):
crypto: chacha20 - Add a generic ChaCha20 stream cipher implementation
crypto: testmgr - Add ChaCha20 test vectors from RFC7539
crypto: poly1305 - Add a generic Poly1305 authenticator implementation
crypto: testmgr - Add Poly1305 test vectors from RFC7539
crypto: chacha20poly1305 - Add a ChaCha20-Poly1305 AEAD construction, RFC7539
crypto: testmgr - Add ChaCha20-Poly1305 test vectors from RFC7539
crypto: chacha20poly1305 - Add an IPsec variant for RFC7539 AEAD
crypto: testmgr - Add draft-ietf-ipsecme-chacha20-poly1305 test vector
xfrm: Define ChaCha20-Poly1305 AEAD XFRM algo for IPsec users
crypto: poly1305 - Pass key as first two message blocks to each desc_ctx
Masanari Iida (2):
crypto: doc - Fix typo in crypto-API.tmpl
crypto: doc - Fix typo in crypto-API.xml
Michael van der Westhuizen (1):
crypto: picoxcell - Update to the current clk API
Pali Rohár (2):
crypto: omap-sham - Check for return value from pm_runtime_get_sync
crypto: omap-sham - Add support for omap3 devices
Paulo Flabiano Smorigo (1):
crypto: vmx - fix two mistyped texts
Sergey Senozhatsky (1):
crypto: drbg - report backend_cra_name when allocation fails
Steffen Trumtrar (1):
crypto: caam - fix non-64-bit write/read access
Stephan Mueller (15):
cryoto: drbg - clear all temporary memory
crypto: drbg - fix drbg_generate return val check
crypto: drbg - replace spinlock with mutex
crypto: drbg - leave cipher handles operational
crypto: doc - change header file locations
random: Blocking API for accessing nonblocking_pool
crypto: drbg - prepare for async seeding
crypto: drbg - add async seeding operation
crypto: drbg - use Jitter RNG to obtain seed
crypto: jitterentropy - add jitterentropy RNG
crypto: jitterentropy - remove timekeeping_valid_for_hres
crypto: doc - cover new AEAD interface
crypto: drbg - use pragmas for disabling optimization
crypto: drbg - Use callback API for random readiness
crypto: drbg - reseed often if seedsource is degraded
Tadeusz Struk (9):
crypto: qat - remove unused structure members
crypto: qat - rm unneeded header include
crypto: qat - Set max request size
crypto: qat: fix issue when mapping assoc to internal AD struct
MPILIB: add mpi_read_buf() and mpi_get_size() helpers
crypto: akcipher - add PKE API
crypto: rsa - add a new rsa generic implementation
crypto: testmgr - add tests vectors for RSA
crypto: rsa - fix invalid select for AKCIPHER
Tom Lendacky (4):
crypto: ccp - Remove manual check and set of dma_mask pointer
crypto: ccp - Remove unused structure field
scatterlist: introduce sg_nents_for_len
crypto: ccp - Protect against poorly marked end of sg list
Victoria Milhoan (2):
crypto: caam - Fix incorrect size when DMA unmapping buffer
crypto: caam - Provide correct value to iounmap() in controller driver
Wu Fengguang (1):
crypto: echainiv - echainiv_read_iv() can be static
firo yang (1):
crypto: sha1-mb - Remove pointless cast
Documentation/DocBook/crypto-API.tmpl | 67 +-
.../devicetree/bindings/crypto/fsl-sec2.txt | 6 +-
.../devicetree/bindings/crypto/marvell-cesa.txt | 45 +
.../devicetree/bindings/crypto/mv_cesa.txt | 31 +-
MAINTAINERS | 26 +-
arch/arm/boot/dts/armada-375.dtsi | 2 +-
arch/arm/boot/dts/armada-38x.dtsi | 2 +-
arch/arm/boot/dts/armada-39x.dtsi | 2 +-
arch/arm/boot/dts/armada-xp-linksys-mamba.dts | 5 +
arch/arm/boot/dts/armada-xp-openblocks-ax3-4.dts | 4 +
arch/arm/boot/dts/dove-cubox.dts | 1 +
arch/arm/crypto/Kconfig | 15 +-
arch/arm/crypto/Makefile | 10 +-
arch/arm/crypto/aes-ce-core.S | 7 +-
arch/arm/crypto/sha512-armv4.pl | 649 ++++++
arch/arm/crypto/sha512-armv7-neon.S | 455 ----
arch/arm/crypto/sha512-core.S_shipped | 1861 +++++++++++++++
arch/arm/crypto/sha512-glue.c | 121 +
arch/arm/crypto/sha512-neon-glue.c | 98 +
arch/arm/crypto/sha512.h | 8 +
arch/arm/crypto/sha512_neon_glue.c | 305 ---
arch/arm64/crypto/aes-ce-ccm-glue.c | 2 +-
arch/arm64/crypto/crc32-arm64.c | 22 +-
arch/arm64/crypto/sha1-ce-glue.c | 3 +
arch/arm64/crypto/sha2-ce-glue.c | 3 +
arch/mips/cavium-octeon/crypto/octeon-md5.c | 8 +-
arch/nios2/kernel/time.c | 2 +
arch/powerpc/crypto/md5-glue.c | 8 +-
arch/powerpc/include/asm/icswx.h | 184 ++
arch/powerpc/include/asm/ppc-opcode.h | 13 +
arch/powerpc/kernel/prom.c | 1 +
arch/s390/crypto/ghash_s390.c | 25 +-
arch/sparc/crypto/md5_glue.c | 8 +-
arch/x86/crypto/aesni-intel_glue.c | 423 ++--
arch/x86/crypto/fpu.c | 2 +-
arch/x86/crypto/sha-mb/sha1_mb.c | 3 +-
crypto/842.c | 174 +-
crypto/Kconfig | 97 +-
crypto/Makefile | 15 +-
crypto/ablkcipher.c | 12 +-
crypto/aead.c | 684 ++++--
crypto/af_alg.c | 5 +-
crypto/akcipher.c | 117 +
crypto/algapi.c | 31 +-
crypto/algif_aead.c | 79 +-
crypto/algif_rng.c | 2 +-
crypto/ansi_cprng.c | 88 +-
crypto/authenc.c | 17 +-
crypto/authencesn.c | 17 +-
crypto/blkcipher.c | 1 +
crypto/ccm.c | 14 +-
crypto/chacha20_generic.c | 216 ++
crypto/chacha20poly1305.c | 695 ++++++
crypto/chainiv.c | 105 +-
crypto/cryptd.c | 135 +-
crypto/crypto_null.c | 39 +
crypto/crypto_user.c | 34 +-
crypto/drbg.c | 567 ++---
crypto/echainiv.c | 312 +++
crypto/eseqiv.c | 52 +-
crypto/fips.c | 53 +-
crypto/gcm.c | 940 +++-----
crypto/internal.h | 3 +-
crypto/jitterentropy.c | 928 ++++++++
crypto/krng.c | 66 -
crypto/md5.c | 8 +-
crypto/pcompress.c | 7 +-
crypto/pcrypt.c | 199 +-
crypto/poly1305_generic.c | 321 +++
crypto/proc.c | 41 -
crypto/rng.c | 132 +-
crypto/rsa.c | 315 +++
crypto/rsa_helper.c | 121 +
crypto/rsakey.asn1 | 5 +
crypto/scatterwalk.c | 45 +-
crypto/seqiv.c | 587 ++++-
crypto/shash.c | 7 +-
crypto/tcrypt.c | 36 +-
crypto/tcrypt.h | 1 +
crypto/testmgr.c | 314 ++-
crypto/testmgr.h | 2443 +++++++++++++++++++-
crypto/zlib.c | 4 +-
drivers/bus/mvebu-mbus.c | 120 +-
drivers/char/hw_random/bcm63xx-rng.c | 18 +-
drivers/char/random.c | 80 +-
drivers/crypto/Kconfig | 87 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/caam/Kconfig | 5 +-
drivers/crypto/caam/caamalg.c | 1497 ++++++------
drivers/crypto/caam/caamhash.c | 9 +-
drivers/crypto/caam/compat.h | 2 +-
drivers/crypto/caam/ctrl.c | 4 +-
drivers/crypto/caam/regs.h | 38 +-
drivers/crypto/caam/sg_sw_sec4.h | 50 +-
drivers/crypto/ccp/Kconfig | 1 -
drivers/crypto/ccp/ccp-ops.c | 9 +-
drivers/crypto/ccp/ccp-platform.c | 2 -
drivers/crypto/ixp4xx_crypto.c | 9 +-
drivers/crypto/marvell/Makefile | 2 +
drivers/crypto/marvell/cesa.c | 548 +++++
drivers/crypto/marvell/cesa.h | 791 +++++++
drivers/crypto/marvell/cipher.c | 797 +++++++
drivers/crypto/marvell/hash.c | 1441 ++++++++++++
drivers/crypto/marvell/tdma.c | 224 ++
drivers/crypto/mv_cesa.c | 73 +-
drivers/crypto/n2_core.c | 8 +-
drivers/crypto/nx/Kconfig | 61 +-
drivers/crypto/nx/Makefile | 9 +-
drivers/crypto/nx/nx-842-crypto.c | 580 +++++
drivers/crypto/nx/nx-842-platform.c | 84 +
drivers/crypto/nx/nx-842-powernv.c | 637 +++++
drivers/crypto/nx/nx-842-pseries.c | 1140 +++++++++
drivers/crypto/nx/nx-842.c | 1610 +------------
drivers/crypto/nx/nx-842.h | 144 ++
drivers/crypto/nx/nx-aes-gcm.c | 110 +-
drivers/crypto/nx/nx-sha256.c | 84 +-
drivers/crypto/nx/nx-sha512.c | 85 +-
drivers/crypto/nx/nx.c | 233 +-
drivers/crypto/nx/nx.h | 9 +-
drivers/crypto/omap-sham.c | 27 +-
drivers/crypto/picoxcell_crypto.c | 41 +-
drivers/crypto/qat/Kconfig | 6 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 -
drivers/crypto/qat/qat_common/adf_cfg_user.h | 12 -
drivers/crypto/qat/qat_common/adf_common_drv.h | 7 +
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 1 +
drivers/crypto/qat/qat_common/qat_algs.c | 39 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 5 +-
drivers/crypto/sahara.c | 13 +-
drivers/crypto/talitos.c | 743 ++++--
drivers/crypto/talitos.h | 153 +-
drivers/crypto/ux500/Kconfig | 4 +-
drivers/crypto/vmx/Kconfig | 2 +-
drivers/crypto/vmx/Makefile | 2 +-
drivers/crypto/vmx/aes.c | 166 +-
drivers/crypto/vmx/aes_cbc.c | 236 +-
drivers/crypto/vmx/aes_ctr.c | 225 +-
drivers/crypto/vmx/aesp8-ppc.h | 15 +-
drivers/crypto/vmx/ghash.c | 278 +--
drivers/crypto/vmx/vmx.c | 68 +-
include/crypto/aead.h | 533 ++++-
include/crypto/akcipher.h | 340 +++
include/crypto/algapi.h | 35 +-
include/crypto/compress.h | 8 +-
include/crypto/cryptd.h | 1 +
include/crypto/drbg.h | 59 +-
include/crypto/hash.h | 2 +-
include/crypto/internal/aead.h | 102 +-
include/crypto/internal/akcipher.h | 60 +
include/crypto/internal/geniv.h | 24 +
include/crypto/internal/rng.h | 21 +-
include/crypto/internal/rsa.h | 27 +
include/crypto/md5.h | 5 +
include/crypto/null.h | 3 +
include/crypto/rng.h | 100 +-
include/crypto/scatterwalk.h | 4 +
include/linux/compiler-gcc.h | 16 +-
include/linux/compiler-intel.h | 3 +
include/linux/compiler.h | 4 +
include/linux/crypto.h | 501 +---
include/linux/mbus.h | 5 +
include/linux/module.h | 12 +
include/linux/mpi.h | 15 +
include/linux/nx842.h | 11 -
include/linux/random.h | 9 +
include/linux/scatterlist.h | 1 +
include/linux/sw842.h | 12 +
include/net/xfrm.h | 3 +
include/{ => uapi}/linux/cryptouser.h | 6 +
lib/842/842.h | 127 +
lib/842/842_compress.c | 626 +++++
lib/842/842_debugfs.h | 52 +
lib/842/842_decompress.c | 405 ++++
lib/842/Makefile | 2 +
lib/Kconfig | 6 +
lib/Makefile | 2 +
lib/mpi/mpicoder.c | 87 +-
lib/mpi/mpiutil.c | 6 +-
lib/scatterlist.c | 32 +
lib/string.c | 2 +-
net/ipv4/esp4.c | 200 +-
net/ipv6/esp6.c | 200 +-
net/key/af_key.c | 1 +
net/mac80211/aes_ccm.c | 33 +-
net/mac80211/aes_gcm.c | 33 +-
net/mac80211/aes_gmac.c | 14 +-
net/mac802154/llsec.c | 44 +-
net/xfrm/xfrm_algo.c | 28 +
net/xfrm/xfrm_user.c | 40 +-
189 files changed, 23661 insertions(+), 7358 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.2
2015-06-22 8:44 ` Crypto Update for 4.2 Herbert Xu
@ 2015-06-23 4:26 ` Linus Torvalds
2015-06-23 4:32 ` Herbert Xu
2015-06-24 2:11 ` Linus Torvalds
2015-08-31 13:56 ` Crypto Update for 4.3 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-23 4:26 UTC (permalink / raw)
To: Herbert Xu, Steffen Klassert
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Mon, Jun 22, 2015 at 1:44 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 4.2:
So this generates conflicts with your earlier changes (that I got
through the networking tree - they are your patches, but they went
through Steffen Klassert and then David Miller).
I resolved them, but I want you to double-check the end result.
Some of the conflicts are just trivial (but annoying) conflicts due to
whitespace changes to the vmx routines.
But the changes to net/ipv4/esp4.c and net/ipv6/esp6.c are actual real
code conflicts, even though the in the merge they look like no change
at all, because I picked your side and the changes on the other side
just went away.
I did that, because ss far as I can tell, the changes in commits
7021b2e1cddd and 000ae7b2690e (that switch esp4/6 over to the new AEAD
interface) obviate the commits I got earlier to use the high-order
sequence number bits for IV generation.
So it looks to me like those AEAD interface changes already make sure
to use the full 64 bits of the sequence number.
But if I'm wrong, please holler. You clearly know both sides of this,
since you wrote all the patches involved, so I'd like you to
double-check me.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.2
2015-06-23 4:26 ` Linus Torvalds
@ 2015-06-23 4:32 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-23 4:32 UTC (permalink / raw)
To: Linus Torvalds
Cc: Steffen Klassert, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Jun 22, 2015 at 09:26:51PM -0700, Linus Torvalds wrote:
>
> So it looks to me like those AEAD interface changes already make sure
> to use the full 64 bits of the sequence number.
>
> But if I'm wrong, please holler. You clearly know both sides of this,
> since you wrote all the patches involved, so I'd like you to
> double-check me.
Yes the AEAD conversion does the right thing and uses the full 64
bits of the sequence number. In fact it was during that conversion
when I noticed the bug and sent in a fix to Steffen.
Thanks for the heads up!
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.2
2015-06-22 8:44 ` Crypto Update for 4.2 Herbert Xu
2015-06-23 4:26 ` Linus Torvalds
@ 2015-06-24 2:11 ` Linus Torvalds
2015-06-24 13:29 ` Herbert Xu
2015-08-31 13:56 ` Crypto Update for 4.3 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-24 2:11 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Mon, Jun 22, 2015 at 1:44 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Here is the crypto update for 4.2:
Hmm. I noticed a new annoyance:
I get this at bootup:
[ +0.001504] alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni)
[ +0.002233] alg: aead: setkey failed on test 1 for
rfc4106-gcm-aesni: flags=0
in general, I'm not at all convinced that the crypto tests make sense.
I absolutely destest that horrid "testmgr.h" file that is 32
_thousand_ lines of noise. And now it's apparently complaining about a
missing test, so that nasty mess will presumably grow.
Could you not make the test infrastructure be something that gets run
in user space?
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Update for 4.2
2015-06-24 2:11 ` Linus Torvalds
@ 2015-06-24 13:29 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-24 13:29 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Jun 23, 2015 at 07:11:19PM -0700, Linus Torvalds wrote:
> On Mon, Jun 22, 2015 at 1:44 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Here is the crypto update for 4.2:
>
> Hmm. I noticed a new annoyance:
>
> I get this at bootup:
>
> [ +0.001504] alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni)
This is indeed bogus and I'll make sure it disappears.
> [ +0.002233] alg: aead: setkey failed on test 1 for
> rfc4106-gcm-aesni: flags=0
This however is a real bug. It looks like aesni is somehow broken
and is failing on setkey. I'll look into it.
> in general, I'm not at all convinced that the crypto tests make sense.
> I absolutely destest that horrid "testmgr.h" file that is 32
> _thousand_ lines of noise. And now it's apparently complaining about a
> missing test, so that nasty mess will presumably grow.
>
> Could you not make the test infrastructure be something that gets run
> in user space?
I too think the current testmgr model has reached its limit.
However, it has been quite useful in catching bugs like the
one you saw which may otherwise result in hard-to-track-down
bugs in other subsystems such as IPsec or disk encryption.
What I was planning to do is to instead bundle the test vectors
with the algorithms themselves. So for each algorithm we would
have the test vectors in the canonical C implementation which then
would be used to test every other implmenetation of that algorithm.
The test code could similarly be distributed out to the individual
types, e.g., RNG tests would go into rng.c, hash tests into ahash.c,
etc.
When this is done there would be no central repository of testing
information anymore.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.2
2015-02-14 9:43 ` Crypto Update for 3.20 Herbert Xu
2015-04-15 3:39 ` Crypto Update for 4.1 Herbert Xu
@ 2015-06-26 10:22 ` Herbert Xu
2015-06-26 20:07 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-26 10:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* Move -O0 jitterentropy code into its own file instead of using
gcc pragma magic.
* Kill testmgr warning for gcm-aes-aesni.
* Fix build failure in old rsa.
Other minor fixes:
* Ignore asn1 files generated by new rsa.
* Remove unnecessary kzfree NULL checks in jitterentropy.
* Typo fix in akcipher.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Alexander Kuleshov (1):
crypto: rsa - add .gitignore for crypto/*.-asn1.[ch] files
Guenter Roeck (1):
crypto: asymmetric_keys/rsa - Use non-conflicting variable name
Markus Elfring (1):
crypto: jitterentropy - Delete unnecessary checks before the function call "kzfree"
Stephan Mueller (1):
crypto: jitterentropy - avoid compiler warnings
Tadeusz Struk (2):
crypto: akcipher - fix spelling cihper -> cipher
crypto: testmgr - don't print info about missing test for gcm-aes-aesni
crypto/.gitignore | 1 +
crypto/Makefile | 4 +-
crypto/akcipher.c | 2 +-
crypto/asymmetric_keys/rsa.c | 4 +-
crypto/jitterentropy-kcapi.c | 208 ++++++++++++++++++++++++++++++++++++++++
crypto/jitterentropy.c | 215 ++++++++----------------------------------
crypto/testmgr.c | 4 +
7 files changed, 256 insertions(+), 182 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.2
2015-06-26 10:22 ` Crypto Fixes for 4.2 Herbert Xu
@ 2015-06-26 20:07 ` Linus Torvalds
2015-06-27 6:56 ` Herbert Xu
2015-06-30 13:51 ` Herbert Xu
2015-09-08 9:25 ` Crypto Fixes for 4.3 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-26 20:07 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Jun 26, 2015 at 3:22 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> * Kill testmgr warning for gcm-aes-aesni.
Hmm. You killed one of the warnings, but the setkey one remains.
alg: aead: setkey failed on test 1 for rfc4106-gcm-aesni: flags=0
Expected?
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.2
2015-06-26 20:07 ` Linus Torvalds
@ 2015-06-27 6:56 ` Herbert Xu
2015-06-27 16:40 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-06-27 6:56 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Jun 26, 2015 at 01:07:02PM -0700, Linus Torvalds wrote:
> On Fri, Jun 26, 2015 at 3:22 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > * Kill testmgr warning for gcm-aes-aesni.
>
> Hmm. You killed one of the warnings, but the setkey one remains.
>
> alg: aead: setkey failed on test 1 for rfc4106-gcm-aesni: flags=0
>
> Expected?
I wanted to explore a more complete fix with delaying the testing
until all built-in registrations are complete but it turned out to
be too complicated for now.
So I think Tadeusz's patch is the simplest fix for 4.2. Could you
please test it to see if it makes your warning go away? Just in
case you're running into something else that happens to look the
same.
Here is his patch again with a corrected changelog.
Thanks!
---8<---
From: Tadeusz Struk <tadeusz.struk@intel.com>
Subject: crypto: aesni - fix failing setkey for rfc4106-gcm-aesni
rfc4106(gcm(aes)) uses ctr(aes) to generate hash key. ctr(aes) needs
chainiv, but the chainiv gets initialized after aesni_intel when both
are statically linked so the setkey fails.
This patch forces aesni_intel to be initialized after chainiv.
Signed-off-by: Tadeusz Struk <tadeusz.struk@intel.com>
---
arch/x86/crypto/aesni-intel_glue.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/crypto/aesni-intel_glue.c b/arch/x86/crypto/aesni-intel_glue.c
index ebcb981d..cb630a8 100644
--- a/arch/x86/crypto/aesni-intel_glue.c
+++ b/arch/x86/crypto/aesni-intel_glue.c
@@ -1537,7 +1537,7 @@ static void __exit aesni_exit(void)
crypto_fpu_exit();
}
-module_init(aesni_init);
+late_initcall(aesni_init);
module_exit(aesni_exit);
MODULE_DESCRIPTION("Rijndael (AES) Cipher Algorithm, Intel AES-NI instructions optimized");
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.2
2015-06-27 6:56 ` Herbert Xu
@ 2015-06-27 16:40 ` Linus Torvalds
2015-06-29 7:32 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-06-27 16:40 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Jun 26, 2015 at 11:56 PM, Herbert Xu
<herbert@gondor.apana.org.au> wrote:
>
> So I think Tadeusz's patch is the simplest fix for 4.2. Could you
> please test it to see if it makes your warning go away?
Seems to silence it here.
I get the feeling that the patch is still wrong - why are not the
*tests* run at late time when everything is properly set up, rather
than forcing ordering at the code init level - but at least I don't
see the annoying error, so it's certainly better than it was before.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.2
2015-06-27 16:40 ` Linus Torvalds
@ 2015-06-29 7:32 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-06-29 7:32 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Sat, Jun 27, 2015 at 09:40:24AM -0700, Linus Torvalds wrote:
> On Fri, Jun 26, 2015 at 11:56 PM, Herbert Xu
> <herbert@gondor.apana.org.au> wrote:
> >
> > So I think Tadeusz's patch is the simplest fix for 4.2. Could you
> > please test it to see if it makes your warning go away?
>
> Seems to silence it here.
OK I'll apply this patch for 4.2.
> I get the feeling that the patch is still wrong - why are not the
> *tests* run at late time when everything is properly set up, rather
> than forcing ordering at the code init level - but at least I don't
> see the annoying error, so it's certainly better than it was before.
That's what I was exploring but I think it'll take a while so
it's best to postpone it to 4.3 or later. The two alternatives
I was toying with are 1) delay the testing until the first time
the given algorithm is used; 2) perform testing for all built-in
algorithms at late_initcall.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.2
2015-06-26 10:22 ` Crypto Fixes for 4.2 Herbert Xu
2015-06-26 20:07 ` Linus Torvalds
@ 2015-06-30 13:51 ` Herbert Xu
2015-07-13 4:08 ` Herbert Xu
2015-09-08 9:25 ` Crypto Fixes for 4.3 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-06-30 13:51 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the aesni setkey error and removes a couple of
unnecessary NULL checks in the Intel qat driver.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Markus Elfring (1):
crypto: qat - Deletion of unnecessary checks before two function calls
Tadeusz Struk (1):
crypto: aesni - fix failing setkey for rfc4106-gcm-aesni
arch/x86/crypto/aesni-intel_glue.c | 2 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 5 +----
drivers/crypto/qat/qat_common/adf_transport.c | 2 +-
3 files changed, 3 insertions(+), 6 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.2
2015-06-30 13:51 ` Herbert Xu
@ 2015-07-13 4:08 ` Herbert Xu
2015-08-03 7:16 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-07-13 4:08 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a duplicate dma_unmap_sg call in omap-des and
reentrancy bugs in the powerpc nx driver which may cause bogus
output or worse memory corruption.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: nx - Fix reentrancy bugs
Vutla, Lokesh (1):
crypto: omap-des - Fix unmapping of dma channels
drivers/crypto/nx/nx-aes-ccm.c | 6 ++--
drivers/crypto/nx/nx-aes-ctr.c | 7 ++--
drivers/crypto/nx/nx-aes-gcm.c | 17 ++++++----
drivers/crypto/nx/nx-aes-xcbc.c | 70 ++++++++++++++++++++++++---------------
drivers/crypto/nx/nx-sha256.c | 43 +++++++++++++-----------
drivers/crypto/nx/nx-sha512.c | 44 +++++++++++++-----------
drivers/crypto/nx/nx.c | 3 ++
drivers/crypto/nx/nx.h | 14 ++++++--
drivers/crypto/omap-des.c | 3 --
9 files changed, 125 insertions(+), 82 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.2
2015-07-13 4:08 ` Herbert Xu
@ 2015-08-03 7:16 ` Herbert Xu
2015-08-17 8:27 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-08-03 7:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* A bogus BUG_ON in ixp4xx that can be triggered by a dst buffer
that is an SG list.
* The error handling in hwrngd may cause a crash in case of an error.
* Fix a race condition in qat registration when multiple devices are
present.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: ixp4xx - Remove bogus BUG_ON on scattered dst buffer
Martin Schwidefsky (1):
hwrng: core - correct error check of kthread_run call
Tadeusz Struk (1):
crypto: qat - Fix invalid synchronization between register/unregister sym algs
drivers/char/hw_random/core.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 1 -
drivers/crypto/qat/qat_common/qat_algs.c | 24 ++++++++++++++++--------
3 files changed, 17 insertions(+), 10 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.2
2015-08-03 7:16 ` Herbert Xu
@ 2015-08-17 8:27 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-08-17 8:27 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* A regression caused by the conversion of IPsec ESP to the new
AEAD interface: ESN with authencesn no longer works because it
relied on the AD input SG list having a specific layout which
is no longer the case. In linux-next authencesn is fixed properly
and no longer assumes anything about the SG list format. While
for this release a minimal fix is applied to authencesn so that
it works with the new linear layout.
* Fix memory corruption caused by bogus index in the caam hash code.
* Fix powerpc nx SHA hashing which could cause module load failures
if module signature verification is enabled.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Herbert Xu (1):
crypto: authencesn - Fix breakage with new ESP code
Horia Geant? (1):
crypto: caam - fix memory corruption in ahash_final_ctx
Jan Stancek (1):
crypto: nx - respect sg limit bounds when building sg lists for SHA
crypto/authencesn.c | 44 +++++++++++-----------------------------
drivers/crypto/caam/caamhash.c | 7 ++++---
drivers/crypto/nx/nx-sha256.c | 27 ++++++++++++++----------
drivers/crypto/nx/nx-sha512.c | 28 ++++++++++++++-----------
4 files changed, 48 insertions(+), 58 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 4.3
2015-06-22 8:44 ` Crypto Update for 4.2 Herbert Xu
2015-06-23 4:26 ` Linus Torvalds
2015-06-24 2:11 ` Linus Torvalds
@ 2015-08-31 13:56 ` Herbert Xu
2015-11-02 8:04 ` Crypto Update for 4.4 Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-08-31 13:56 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 4.3:
API:
* The AEAD interface transition is now complete.
* Add top-level skcipher interface.
Drivers:
* x86-64 acceleration for chacha20/poly1305.
* Add sunxi-ss Allwinner Security System crypto accelerator.
* Add RSA algorithm to qat driver.
* Add SRIOV support to qat driver.
* Add LS1021A support to caam.
* Add i.MX6 support to caam.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Aaron Sierra (2):
crypto: talitos - Remove zero_entry static initializer
crypto: talitos - Prevent panic in probe error path
Ahsan Atta (1):
crypto: qat - Fix typo othewise->otherwise
Alex Porosanu (1):
crypto: caam - fix ERA property reading
Baruch Siach (1):
crypto: arm - ignore generated SHA2 assembly files
Brian Norris (1):
crypto: doc - make URL into hyperlink
Bruce Allan (4):
crypto: qat - remove redundant struct elem
crypto: qat - fix bug in ADF_RING_SIZE_BYTES_MIN macro
crypto: qat - remove unused define
crypto: qat - remove unnecessary list iteration
Chen-Yu Tsai (3):
crypto: sunxi-ss - Document optional reset control bindings
crypto: sunxi-ss - Add optional reset control support
ARM: dts: sun6i: Add security system crypto engine clock and device nodes
Colin Ian King (1):
crypto: img-hash - fix spelling mistake in dev_err error message
Dan Streetman (11):
crypto: nx - remove __init/__exit from VIO functions
crypto: nx - remove pSeries NX 'status' field
crypto: nx - move kzalloc() out of spinlock
crypto: nx - don't register pSeries driver if ENODEV
crypto: nx - use common code for both NX decompress success cases
crypto: nx - merge nx-compress and nx-compress-crypto
crypto: nx - rename nx-842-crypto.c to nx-842.c
crypto: nx - make platform drivers directly register with crypto
crypto: nx - don't err if compressed output > input
crypto: nx - use be32_to_cpu for __be32 field in debug msg
MAINTAINERS: change 842 NX owner email address
Fabio Estevam (6):
crypto: caam - Fix error handling in caam_rng_init()
crypto: caam - Remove unneeded 'ret' variable
crypto: amcc - Do a NULL check for pointer
crypto: caam - Fix the error handling in caam_probe
crypto: caam - Propagate the real error code in caam_probe
crypto: caam - Use the preferred style for memory allocations
Herbert Xu (56):
crypto: cryptd - Fix AEAD request context corruption
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
crypto: api - Remove unused __crypto_dequeue_request
crypto: aead - Add aead_queue interface
crypto: nx/842 - Fix context corruption
crypto: api - Add instance free function to crypto_type
crypto: aead - Add type-safe function for freeing instances
crypto: pcrypt - Propagate new AEAD implementation flag
crypto: cryptd - Propagate new AEAD implementation flag
crypto: echainiv - Fix encryption convention
crypto: seqiv - Replace seqniv with seqiv
crypto: aead - Propagate new AEAD implementation flag for IV generators
crypto: testmgr - Disable rfc4106 test and convert test vectors
crypto: tcrypt - Add support for new IV convention
crypto: aesni - Use new IV convention
crypto: gcm - Use new IV convention
crypto: nx - Use new IV convention
crypto: caam - Use new IV convention
crypto: testmgr - Reenable rfc4106 test
crypto: testmgr - Disable rfc4309 test and convert test vectors
crypto: ccm - Convert to new AEAD interface
crypto: aes-ce-ccm - Convert to new AEAD interface
crypto: nx - Convert ccm to new AEAD interface
crypto: testmgr - Reenable rfc4309 test
crypto: chacha20poly1305 - Convert to new AEAD interface
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
crypto: testmgr - Disable authenc test and convert test vectors
crypto: authenc - Convert to new AEAD interface
crypto: caam - Convert authenc to new AEAD interface
crypto: ixp4xx - Convert to new AEAD interface
crypto: picoxcell - Convert to new AEAD interface
crypto: qat - Convert to new AEAD interface
crypto: talitos - Convert to new AEAD interface
crypto: testmgr - Reenable authenc tests
crypto: authenc - Add Kconfig dependency on CRYPTO_NULL
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
crypto: authencesn - Convert to new AEAD interface
crypto: algboss - Remove reference to nivaead
crypto: user - Remove crypto_lookup_aead call
ipsec: Replace seqniv with seqiv
crypto: seqiv - Remove seqniv
crypto: seqiv - Remove AEAD compatibility code
crypto: echainiv - Remove AEAD compatibility code
crypto: aead - Add type-safe geniv init/exit helpers
crypto: seqiv - Use generic geniv init/exit helpers
crypto: echainiv - Use generic geniv init/exit helpers
crypto: cryptd - Remove reference to crypto_aead_crt
crypto: qat - Remove reference to crypto_aead_crt
crypto: aead - Remove old AEAD interfaces
crypto: aead - Remove CRYPTO_ALG_AEAD_NEW flag
crypto: null - Use NULL2 in Makefile
crypto: nx - Add forward declaration for struct crypto_aead
crypto: null - Add missing Kconfig tristate for NULL2
crypto: skcipher - Add top-level skcipher interface
crypto: testmgr - Use new skcipher interface
crypto: hash - Add AHASH_REQUEST_ON_STACK
Horia Geant? (5):
crypto: caam - fix snooping for write transactions
crypto: caam - fix RNG init descriptor ret. code checking
crypto: caam - fix rfc4106 encap shared descriptor
crypto: caam - add support for LS1021A
crypto: caam - fix writing to JQCR_MS when using service interface
Kees Cook (1):
crypto: jitterentropy - use safe format string parameters
Krzysztof Kozlowski (1):
crypto: marvell/cesa - Drop owner assignment from platform_driver
LABBE Corentin (6):
crypto: testmgr - add a chunking test for cbc(aes)
ARM: sun4i: dt: Add Security System to A10 SoC DTS
ARM: sun7i: dt: Add Security System to A20 SoC DTS
ARM: sun4i: dt: Add DT bindings documentation for SUN4I Security System
crypto: sunxi-ss - Add Allwinner Security System crypto accelerator
MAINTAINERS: Add myself as maintainer of Allwinner Security System
Lars Persson (1):
crypto: algif_aead - fix for multiple operations on AF_ALG sockets
Leonidas Da Silva Barbosa (7):
powerpc: Uncomment and make enable_kernel_vsx() routine available
crypto: vmx - Adding enable_kernel_vsx() to access VSX instructions
Update NX crypto driver maintainers and adding VMX maintainers
crypto: nx - Removing CTR mode from NX driver
crypto: vmx - Fixing AES-CTR counter bug
crypto: vmx - Fixing GHASH Key issue on little endian
crypto: vmx - Fixing opcode issue
Martin Willi (10):
crypto: tcrypt - Add ChaCha20/Poly1305 speed tests
crypto: chacha20 - Export common ChaCha20 helpers
crypto: chacha20 - Add a SSSE3 SIMD variant for x86_64
crypto: chacha20 - Add a four block SSSE3 variant for x86_64
crypto: chacha20 - Add an eight block AVX2 variant for x86_64
crypto: testmgr - Add a longer ChaCha20 test vector
crypto: poly1305 - Export common Poly1305 helpers
crypto: poly1305 - Add a SSE2 SIMD variant for x86_64
crypto: poly1305 - Add a two block SSE2 variant for x86_64
crypto: poly1305 - Add a four block AVX2 variant for x86_64
Nishanth Aravamudan (4):
crypto: nx - nx842_OF_upd_status should return ENODEV if device is not 'okay'
crypto: nx - rename nx842_{init, exit} to nx842_pseries_{init, exit}
crypto: nx - do not emit extra output if status is disabled
crypto: nx - reduce chattiness of platform drivers
Paulo Flabiano Smorigo (1):
Fix email address mistypo for NX/VMX crypto driver maintainers
Pingchao Yang (1):
crypto: qat - add support for MMP FW
Stephan Mueller (2):
crypto: doc - AEAD API conversion
crypto: cmac - allow usage in FIPS mode
Steve Cornelius (1):
crypto: caam - Enable MXC devices to select CAAM driver in Kconfig
Tadeusz Struk (17):
crypto: qat - add MMP FW support to accel engine
crypto: qat - Add support for RSA algorithm
crypto: rsa - limit supported key lengths
crypto: rsa - fix invalid check for keylen in fips mode
crypto: qat - fix invalid check for RSA keylen in fips mode
crypto: qat - Don't attempt to register algorithm multiple times
crypto: qat - Move adf admin and adf hw arbitrer to common code
crypto: qat - Add support for SRIOV
crypto: qat - Add qat dh895xcc VF driver
crypto: qat - Add FW const table
PCI: Add quirk for Intel DH895xCC VF PCI config erratum
crypto: qat - Fix adf_isr_resource_free name clash
crypto: qat - Fix unmet direct dependencies for QAT_DH895xCCVF
crypto: qat - Don't move data inside output buffer
crypto: qat - silence a static checker warning
MPI: Fix mpi_read_buffer
crypto: qat - enable legacy VFs
Tom Lendacky (1):
crypto: ccp - Provide support to autoload CCP driver
Tudor Ambarus (1):
crypto: caam - fix warning in APPEND_MATH_IMM_u64
Vaishali Thakkar (1):
crypto: sahara - Use dmam_alloc_coherent
Victoria Milhoan (13):
crypto: caam - Add cache coherency support
crypto: caam - Add setbits32/clrbits32/clrsetbits primitives for ARM compatibility
crypto: caam - Enable and disable clocks on Freescale i.MX platforms
crypto: caam - Modify Freescale CAAM driver Scatter Gather entry definition
crypto: caam - Change kmalloc to kzalloc to avoid residual data
crypto: caam - Correct DMA unmap size in ahash_update_ctx()
crypto: caam - Use local sg pointers to walk the scatterlist
crypto: caam - Added clocks and clock-names properties to SEC4.0 device tree binding
ARM: clk-imx6q: Add CAAM clock support
ARM: dts: mx6qdl: Add CAAM device node
ARM: dts: mx6sx: Add CAAM device node
crypto: caam - Detect hardware features during algorithm registration
ARM: imx_v6_v7_defconfig: Select CAAM
Vutla, Lokesh (5):
crypto: omap-aes - Fix CTR mode
crypto: omap-aes - Increase priority of hw accelerator
crypto: omap-aes - Fix configuring of AES mode
crypto: omap-aes - Use BIT() macro
crypto: tcrypt - Fix AEAD speed tests
Wu Fengguang (1):
crypto: qat - fix simple_return.cocci warnings
Documentation/DocBook/crypto-API.tmpl | 8 +-
.../devicetree/bindings/crypto/fsl-sec4.txt | 17 +
.../devicetree/bindings/crypto/sun4i-ss.txt | 23 +
MAINTAINERS | 24 +-
arch/arm/boot/dts/imx6qdl.dtsi | 29 +-
arch/arm/boot/dts/imx6sx.dtsi | 27 +
arch/arm/boot/dts/sun4i-a10.dtsi | 8 +
arch/arm/boot/dts/sun6i-a31.dtsi | 18 +
arch/arm/boot/dts/sun7i-a20.dtsi | 8 +
arch/arm/configs/imx_v6_v7_defconfig | 3 +-
arch/arm/crypto/.gitignore | 2 +
arch/arm64/crypto/aes-ce-ccm-glue.c | 68 +-
arch/powerpc/include/asm/switch_to.h | 1 +
arch/powerpc/kernel/process.c | 3 -
arch/x86/crypto/Makefile | 6 +
arch/x86/crypto/aesni-intel_glue.c | 53 +-
arch/x86/crypto/chacha20-avx2-x86_64.S | 443 +++
arch/x86/crypto/chacha20-ssse3-x86_64.S | 625 +++++
arch/x86/crypto/chacha20_glue.c | 150 +
arch/x86/crypto/poly1305-avx2-x86_64.S | 386 +++
arch/x86/crypto/poly1305-sse2-x86_64.S | 582 ++++
arch/x86/crypto/poly1305_glue.c | 207 ++
crypto/Kconfig | 40 +-
crypto/Makefile | 3 +-
crypto/aead.c | 635 +----
crypto/algapi.c | 25 +-
crypto/algboss.c | 12 +-
crypto/algif_aead.c | 4 +-
crypto/authenc.c | 580 ++--
crypto/authencesn.c | 716 ++---
crypto/ccm.c | 380 +--
crypto/chacha20_generic.c | 28 +-
crypto/chacha20poly1305.c | 216 +-
crypto/cryptd.c | 23 +-
crypto/crypto_user.c | 32 -
crypto/echainiv.c | 86 +-
crypto/gcm.c | 102 +-
crypto/jitterentropy-kcapi.c | 2 +-
crypto/pcrypt.c | 7 +
crypto/poly1305_generic.c | 73 +-
crypto/rsa.c | 26 +-
crypto/rsa_helper.c | 4 +-
crypto/seqiv.c | 445 +--
crypto/skcipher.c | 245 ++
crypto/tcrypt.c | 82 +-
crypto/tcrypt.h | 20 +
crypto/testmgr.c | 63 +-
crypto/testmgr.h | 2948 +++++++++++++++-----
drivers/clk/imx/clk-imx6q.c | 3 +
drivers/crypto/Kconfig | 17 +
drivers/crypto/Makefile | 1 +
drivers/crypto/amcc/crypto4xx_core.c | 2 +-
drivers/crypto/caam/Kconfig | 10 +-
drivers/crypto/caam/caamalg.c | 2877 ++++++++++---------
drivers/crypto/caam/caamhash.c | 69 +-
drivers/crypto/caam/caamrng.c | 26 +-
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 154 +-
drivers/crypto/caam/desc.h | 23 +-
drivers/crypto/caam/desc_constr.h | 2 +-
drivers/crypto/caam/intern.h | 5 +
drivers/crypto/caam/jr.c | 30 +-
drivers/crypto/caam/regs.h | 64 +-
drivers/crypto/caam/sg_sw_sec4.h | 25 +-
drivers/crypto/ccp/ccp-platform.c | 2 +
drivers/crypto/img-hash.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 312 ++-
drivers/crypto/marvell/cesa.c | 1 -
drivers/crypto/nx/Kconfig | 17 +-
drivers/crypto/nx/Makefile | 8 +-
drivers/crypto/nx/nx-842-crypto.c | 580 ----
drivers/crypto/nx/nx-842-platform.c | 84 -
drivers/crypto/nx/nx-842-powernv.c | 42 +-
drivers/crypto/nx/nx-842-pseries.c | 139 +-
drivers/crypto/nx/nx-842.c | 554 +++-
drivers/crypto/nx/nx-842.h | 65 +-
drivers/crypto/nx/nx-aes-ccm.c | 151 +-
drivers/crypto/nx/nx-aes-ctr.c | 21 -
drivers/crypto/nx/nx-aes-gcm.c | 64 +-
drivers/crypto/nx/nx.c | 30 +-
drivers/crypto/nx/nx.h | 9 +-
drivers/crypto/omap-aes.c | 86 +-
drivers/crypto/picoxcell_crypto.c | 677 ++---
drivers/crypto/qat/Kconfig | 15 +
drivers/crypto/qat/Makefile | 1 +
drivers/crypto/qat/qat_common/.gitignore | 1 +
drivers/crypto/qat/qat_common/Makefile | 8 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 46 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 42 +-
drivers/crypto/qat/qat_common/adf_admin.c | 290 ++
drivers/crypto/qat/qat_common/adf_aer.c | 5 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 9 +-
drivers/crypto/qat/qat_common/adf_cfg_common.h | 3 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 53 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 6 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 286 +-
.../{qat_dh895xcc => qat_common}/adf_hw_arbiter.c | 37 +-
drivers/crypto/qat/qat_common/adf_init.c | 104 +-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 438 +++
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 146 +
drivers/crypto/qat/qat_common/adf_sriov.c | 309 ++
drivers/crypto/qat/qat_common/adf_transport.c | 13 +-
.../qat/qat_common/adf_transport_access_macros.h | 5 +-
drivers/crypto/qat/qat_common/icp_qat_fw.h | 2 +
drivers/crypto/qat/qat_common/icp_qat_fw_pke.h | 112 +
drivers/crypto/qat/qat_common/qat_algs.c | 338 +--
drivers/crypto/qat/qat_common/qat_asym_algs.c | 652 +++++
drivers/crypto/qat/qat_common/qat_crypto.c | 26 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 2 -
drivers/crypto/qat/qat_common/qat_hal.c | 14 +-
drivers/crypto/qat/qat_common/qat_rsakey.asn1 | 5 +
drivers/crypto/qat/qat_common/qat_uclo.c | 27 +-
drivers/crypto/qat/qat_dh895xcc/Makefile | 5 +-
drivers/crypto/qat/qat_dh895xcc/adf_admin.c | 145 -
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 38 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 12 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 97 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.h | 9 -
drivers/crypto/qat/qat_dh895xcc/adf_isr.c | 139 +-
drivers/crypto/qat/qat_dh895xccvf/Makefile | 5 +
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 172 ++
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 68 +
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 393 +++
.../qat_admin.c => qat_dh895xccvf/adf_drv.h} | 70 +-
drivers/crypto/qat/qat_dh895xccvf/adf_isr.c | 258 ++
drivers/crypto/sahara.c | 46 +-
drivers/crypto/sunxi-ss/Makefile | 2 +
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 542 ++++
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 425 +++
drivers/crypto/sunxi-ss/sun4i-ss-hash.c | 492 ++++
drivers/crypto/sunxi-ss/sun4i-ss.h | 201 ++
drivers/crypto/talitos.c | 618 ++--
drivers/crypto/talitos.h | 8 +-
drivers/crypto/vmx/aes.c | 3 +
drivers/crypto/vmx/aes_cbc.c | 3 +
drivers/crypto/vmx/aes_ctr.c | 11 +-
drivers/crypto/vmx/aesp8-ppc.pl | 34 +-
drivers/crypto/vmx/ghash.c | 4 +
drivers/crypto/vmx/ghashp8-ppc.pl | 6 +
drivers/crypto/vmx/ppc-xlate.pl | 1 +
drivers/pci/quirks.c | 85 +
include/crypto/aead.h | 172 +-
include/crypto/algapi.h | 3 +-
include/crypto/chacha20.h | 25 +
include/crypto/hash.h | 5 +
include/crypto/internal/aead.h | 72 +-
include/crypto/internal/geniv.h | 9 +
include/crypto/internal/skcipher.h | 15 +
include/crypto/poly1305.h | 41 +
include/crypto/skcipher.h | 391 ++-
include/dt-bindings/clock/imx6qdl-clock.h | 5 +-
include/linux/crypto.h | 54 +-
lib/mpi/mpicoder.c | 38 +-
net/xfrm/xfrm_algo.c | 14 +-
154 files changed, 15834 insertions(+), 7538 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.3
2015-06-26 10:22 ` Crypto Fixes for 4.2 Herbert Xu
2015-06-26 20:07 ` Linus Torvalds
2015-06-30 13:51 ` Herbert Xu
@ 2015-09-08 9:25 ` Herbert Xu
2015-09-16 10:30 ` Herbert Xu
2015-10-26 11:02 ` Herbert Xu
2 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2015-09-08 9:25 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a memory corruption bug in ghash-clmulni-intel
due to insufficient memory allocation.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andrey Ryabinin (1):
crypto: ghash-clmulni: specify context size for ghash async algorithm
arch/x86/crypto/ghash-clmulni-intel_glue.c | 1 +
1 file changed, 1 insertion(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.3
2015-09-08 9:25 ` Crypto Fixes for 4.3 Herbert Xu
@ 2015-09-16 10:30 ` Herbert Xu
2015-09-26 20:01 ` Herbert Xu
2015-10-26 11:02 ` Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-09-16 10:30 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* The selftest overreads the IV test vector.
* Fix potential infinite loop in sunxi-ss driver.
* Fix powerpc build failure when VMX is set without VSX.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andrey Ryabinin (1):
crypto: testmgr - don't copy from source IV too much
LABBE Corentin (1):
crypto: sunxi-ss - Fix a possible driver hang with ciphers
Michael Ellerman (1):
crypto: vmx - VMX crypto should depend on CONFIG_VSX
crypto/testmgr.c | 5 +++--
drivers/crypto/Kconfig | 2 +-
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 2 +-
3 files changed, 5 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.3
2015-09-16 10:30 ` Herbert Xu
@ 2015-09-26 20:01 ` Herbert Xu
2015-10-13 12:17 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-09-26 20:01 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* Check the return value of platform_get_irq as signed int in xgene.
* Skip adf_dev_restore on virtual functions in qat.
* Fix double-free with backlogged requests in marvell_cesa.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Andrzej Hajda (1):
hwrng: xgene - fix handling platform_get_irq
Conor McLoughlin (1):
crypto: qat - VF should never trigger SBR on PH
Thomas Petazzoni (1):
crypto: marvell - properly handle CRYPTO_TFM_REQ_MAY_BACKLOG-flagged requests
drivers/char/hw_random/xgene-rng.c | 7 ++++---
drivers/crypto/marvell/cesa.h | 27 +++++++++++++++++++++++++++
drivers/crypto/marvell/cipher.c | 7 +++----
drivers/crypto/marvell/hash.c | 8 +++-----
drivers/crypto/qat/qat_common/adf_aer.c | 3 +++
5 files changed, 40 insertions(+), 12 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.3
2015-09-26 20:01 ` Herbert Xu
@ 2015-10-13 12:17 ` Herbert Xu
2015-10-13 17:23 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-10-13 12:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
* Fix AVX detection to prevent use of non-existent AESNI.
* Some SPARC ciphers did not set their IV size which may lead
to memory corruption.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git
Ben Hutchings (1):
crypto: camellia_aesni_avx - Fix CPU feature checks
Dave Kleikamp (1):
crypto: sparc - initialize blkcipher.ivsize
arch/sparc/crypto/aes_glue.c | 2 ++
arch/sparc/crypto/camellia_glue.c | 1 +
arch/sparc/crypto/des_glue.c | 2 ++
arch/x86/crypto/camellia_aesni_avx_glue.c | 5 +++++
4 files changed, 10 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.3
2015-10-13 12:17 ` Herbert Xu
@ 2015-10-13 17:23 ` Linus Torvalds
2015-10-14 1:03 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-10-13 17:23 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Oct 13, 2015 at 5:17 AM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes the following issues:
>
> * Fix AVX detection to prevent use of non-existent AESNI.
> * Some SPARC ciphers did not set their IV size which may lead
> to memory corruption.
Hmm. It looks like you also quietly added a ahash fix this morning.
I took it despite it not being described or in the diffstat. But
please send new pull requests when you update a branch you asked me to
pull.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.3
2015-10-13 17:23 ` Linus Torvalds
@ 2015-10-14 1:03 ` Herbert Xu
2015-10-14 2:00 ` Linus Torvalds
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-10-14 1:03 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Oct 13, 2015 at 10:23:39AM -0700, Linus Torvalds wrote:
>
> Hmm. It looks like you also quietly added a ahash fix this morning.
>
> I took it despite it not being described or in the diffstat. But
> please send new pull requests when you update a branch you asked me to
> pull.
Oops, I should've waited for you to pull the previous one before
pushing this one out.
Anyway, this one is meant to fix a potential crash that can be
triggered by user-space but only if you have the relevant hardware,
in particular, Marvell CESA on ARM.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.3
2015-10-14 1:03 ` Herbert Xu
@ 2015-10-14 2:00 ` Linus Torvalds
2015-10-14 2:38 ` Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Linus Torvalds @ 2015-10-14 2:00 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Oct 13, 2015 at 6:03 PM, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Oops, I should've waited for you to pull the previous one before
> pushing this one out.
You might try to start using signed tags for your pull requests. That
lessens this kind of issue, because now only will you write the tag
message and then your signing key pass phrase etc, the tag would
specify one very particular commit at the time of the tagging rather
than just have it be the default branch of your public repository.
Linus
^ permalink raw reply [flat|nested] 246+ messages in thread
* Re: Crypto Fixes for 4.3
2015-10-14 2:00 ` Linus Torvalds
@ 2015-10-14 2:38 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-10-14 2:38 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Tue, Oct 13, 2015 at 07:00:20PM -0700, Linus Torvalds wrote:
>
> You might try to start using signed tags for your pull requests. That
> lessens this kind of issue, because now only will you write the tag
> message and then your signing key pass phrase etc, the tag would
> specify one very particular commit at the time of the tagging rather
> than just have it be the default branch of your public repository.
Right. I'll start using branches for the next push.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.3
2015-09-08 9:25 ` Crypto Fixes for 4.3 Herbert Xu
2015-09-16 10:30 ` Herbert Xu
@ 2015-10-26 11:02 ` Herbert Xu
2015-11-11 7:08 ` Crypto Fixes for 4.4 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-10-26 11:02 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a problem in the Crypto API that may cause spurious
errors when signals are received by the process that made the orignal
system call into the kernel.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Herbert Xu (1):
crypto: api - Only abort operations on fatal signal
crypto/ablkcipher.c | 2 +-
crypto/algapi.c | 2 +-
crypto/api.c | 6 +++---
crypto/crypto_user.c | 2 +-
4 files changed, 6 insertions(+), 6 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 4.4
2015-08-31 13:56 ` Crypto Update for 4.3 Herbert Xu
@ 2015-11-02 8:04 ` Herbert Xu
2016-01-11 10:14 ` Crypto Update for 4.5 Herbert Xu
0 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-11-02 8:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 4.4:
API:
* Add support for cipher output IVs in testmgr.
* Add missing crypto_ahash_blocksize helper.
* Mark authenc and des ciphers as not allowed under FIPS.
Algorithms:
* Add CRC support to 842 compression.
* Add keywrap algorithm.
* A number of changes to the akcipher interface:
+ Separate functions for setting public/private keys.
+ Use SG lists.
Drivers:
* Add Intel SHA Extension optimised SHA1 and SHA256.
* Use dma_map_sg instead of custom functions in crypto drivers.
* Add support for STM32 RNG.
* Add support for ST RNG.
* Add Device Tree support to exynos RNG driver.
* Add support for mxs-dcp crypto device on MX6SL.
* Add xts(aes) support to caam.
* Add ctr(aes) and xts(aes) support to qat.
* A large set of fixes from Russell King for the marvell/cesa driver.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Alexander Kuleshov (1):
crypto: jitterentropy - remove unnecessary information from a comment
Arnd Bergmann (1):
crypto: mxs-dcp - mxs-dcp is an stmp device
Boris BREZILLON (1):
crypto: testmgr - test IV value after a cipher operation
Boris Brezillon (1):
crypto: marvell/cesa - fix memory leak
Catalin Vasile (1):
crypto: caam - add support for acipher xts(aes)
Daniel Thompson (5):
dt-bindings: Document the STM32 HW RNG bindings
hwrng: stm32 - add support for STM32 HW RNG
ARM: dts: stm32f429: Adopt STM32 RNG driver
hwrng: stm32 - Fix build with CONFIG_PM
hwrng: exynos - Fix unbalanced PM runtime get/puts
David Howells (1):
crypto: akcipher - Don't #include crypto/public_key.h as the contents aren't used
Fabio Estevam (6):
crypto: mxs-dcp - Allow MXS_DCP to be used on MX6SL
hwrng: mxc-rnga - Remove unneeded goto label
hwrng: mxc-rnga - Remove uneeded initialization
hwrng: mxc-rnga - Remove unnecessary dev_info message
hwrng: mxc-rnga - Use the preferred format for kzalloc
crypto: caam - Remove unused JUMP_TYPE_MASK definition
Geliang Tang (1):
crypto: skcipher - blkcipher and ablkcipher should it be static
Haren Myneni (1):
crypto: 842 - Add CRC and validation support
Herbert Xu (1):
crypto: ahash - Add crypto_ahash_blocksize
Horia Geant? (1):
crypto: tcrypt - avoid mapping from module image addresses
John Griffin (1):
crypto: qat - don't check for iommu
John Haxby (1):
crypto: testmgr - Disable fips-allowed for authenc() and des() ciphers
Krzysztof Kozlowski (4):
dt-bindings: rng: Describe Exynos4 PRNG bindings
hwrng: exynos - Add timeout for waiting on init done
hwrng: exynos - Fix missing configuration after suspend to RAM
hwrng: exynos - Add Device Tree support
LABBE Corentin (14):
crypto: bfin_crc - replace sg_count by sg_nents
crypto: amcc - replace get_sg_count by sg_nents_for_len
crypto: sahara - replace sahara_sg_length with sg_nents_for_len
crypto: talitos - dma_map_sg can handle chained SG
crypto: caam - dma_map_sg can handle chained SG
crypto: sahara - dma_map_sg can handle chained SG
crypto: qce - dma_map_sg can handle chained SG
crypto: atmel - Check for clk_prepare_enable() return value
crypto: atmel - use devm_xxx() managed function
crypto: ux500 - Use devm_xxx() managed function
crypto: s390/sha - replace raw value by their coresponding define
crypto: sahara - set array of const as const
crypto: n2 - set array of const as const
lib/mpi: clean unused SHA1_DIGEST_LENGTH
Lee Jones (10):
hwrng: doc - Fix device node name reference /dev/hw_random => /dev/hwrng
hwrng: Kconfig - Fix device node name reference /dev/hw_random => /dev/hwrng
hwrng: core - Simplify RNG switching from sysfs
hwrng: st - Provide DT bindings for ST's Random Number Generator
hwrng: st - Add support for ST's HW Random Number Generator
ARM: STi: STiH407: Enable the 2 HW Random Number Generators for STiH4{07, 10}
MAINTAINERS: Add ST's Random Number Generator to the ST entry
hwrng: st: dt: Fix trivial typo in node address
hwrng: st - Use real-world device timings for timeout
hwrng: st - Improve FIFO size/depth description
Luis de Bethencourt (4):
crypto: amcc - Fix module autoload for OF platform driver
crypto: picoxcell - Fix module autoload for OF platform driver
crypto: ux500 - Fix module autoload for OF platform drivers
hwrng: Fix module autoload for OF platform drivers
Nicolas Iooss (1):
crypto: crc32c-pclmul - use .rodata instead of .rotata
Russell King (32):
crypto: marvell/cesa - fix stack smashing in marvell/hash.c
crypto: marvell/cesa - initialise struct mv_cesa_ahash_req
crypto: marvell/cesa - fix wrong hash results
crypto: marvell/cesa - factor out common import/export functions
crypto: marvell/cesa - easier way to get the transform
crypto: marvell/cesa - keep creq->state in CPU endian format at all times
crypto: marvell/cesa - add flag to determine algorithm endianness
crypto: marvell/cesa - fix the bit length endianness
crypto: marvell/cesa - ensure template operation is initialised
crypto: marvell/cesa - const-ify argument to mv_cesa_get_op_cfg()
crypto: marvell/cesa - factor out first fragment decisions to helper
crypto: marvell/cesa - factor out adding an operation and launching it
crypto: marvell/cesa - always ensure mid-fragments after first-fragment
crypto: marvell/cesa - move mv_cesa_dma_add_frag() calls
crypto: marvell/cesa - use presence of scatterlist to determine data load
crypto: marvell/cesa - ensure iter.base.op_len is the full op length
crypto: marvell/cesa - avoid adding final operation within loop
crypto: marvell/cesa - rearrange last request handling
crypto: marvell/cesa - rearrange handling for hw finished hashes
crypto: marvell/cesa - rearrange handling for sw padded hashes
crypto: marvell/cesa - fix first-fragment handling in mv_cesa_ahash_dma_last_req()
crypto: caam - print errno code when hash registration fails
crypto: caam - avoid needlessly saving and restoring caam_hash_ctx
crypto: caam - fix non-block aligned hash calculation
crypto: caam - only export the state we really need to export
crypto: caam - fix indentation of close braces
crypto: marvell/cesa - use readl_relaxed()/writel_relaxed()
crypto: marvell/cesa - use dma_addr_t for cur_dma
crypto: marvell/cesa - use gfp_t for gfp flags
crypto: marvell/cesa - use memcpy_fromio()/memcpy_toio()
crypto: marvell/cesa - fix missing cpu_to_le32() in mv_cesa_dma_add_op()
crypto: marvell/cesa - use __le32 for hardware descriptors
Sowmini Varadhan (2):
crypto: pkcs7 - Fix unaligned access in pkcs7_verify()
crypto: asymmetric_keys - Fix unaligned access in x509_get_sig_params()
Stephan Mueller (4):
crypto: keywrap - add key wrapping block chaining mode
crypto: keywrap - enable compilation
crypto: keywrap - add testmgr support
lib/mpi: fix off by one in mpi_read_raw_from_sgl
Tadeusz Struk (7):
crypto: qat - Add load balancing across devices
crypto: qat - remove empty functions and turn qat_uregister fn to void
crypto: qat - add support for ctr(aes) and xts(aes)
crypto: qat - remove unneeded variable
lib/mpi: Add mpi sgl helpers
crypto: akcipher - Changes to asymmetric key API
crypto: qat - fix crypto_get_instance_node function
Thomas Petazzoni (1):
MAINTAINERS: add maintainers for the Marvell Crypto driver
Tom Lendacky (4):
crypto: ccp - Replace BUG_ON with WARN_ON and a return code
crypto: ccp - Remove use ACPI field
crypto: ccp - Change references to accelerator to offload
crypto: ccp - Use module name in driver structures
Vaishali Thakkar (1):
hwrng: octeon - Use devm_hwrng_register
sudip (1):
crypto: asymmetric_keys - remove always false comparison
tim (7):
crypto: x86/sha - Intel SHA Extensions optimized SHA1 transform function
crypto: x86/sha - Intel SHA Extensions optimized SHA256 transform function
crypto: x86/sha - glue code for Intel SHA extensions optimized SHA1 & SHA256
crypto: x86/sha - Add build support for Intel SHA Extensions optimized SHA1 and SHA256
crypto: x86/sha - Restructure x86 sha1 glue code to expose all the available sha1 transforms
crypto: x86/sha - Restructure x86 sha256 glue code to expose all the available sha256 transforms
crypto: x86/sha - Restructure x86 sha512 glue code to expose all the available sha512 transforms
.../bindings/rng/samsung,exynos-rng4.txt | 17 +
Documentation/devicetree/bindings/rng/st,rng.txt | 15 +
.../devicetree/bindings/rng/st,stm32-rng.txt | 21 +
Documentation/hw_random.txt | 8 +-
MAINTAINERS | 8 +
arch/arm/boot/dts/stih407-family.dtsi | 14 +
arch/arm/boot/dts/stm32f429.dtsi | 7 +
arch/s390/crypto/sha.h | 2 +-
arch/x86/Makefile | 6 +-
arch/x86/crypto/Makefile | 8 +
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 2 +-
arch/x86/crypto/sha1_ni_asm.S | 302 +++++++++++++
arch/x86/crypto/sha1_ssse3_glue.c | 314 ++++++++++---
arch/x86/crypto/sha256_ni_asm.S | 353 +++++++++++++++
arch/x86/crypto/sha256_ssse3_glue.c | 329 ++++++++++++--
arch/x86/crypto/sha512_ssse3_glue.c | 249 +++++++++--
crypto/Kconfig | 17 +-
crypto/Makefile | 10 +-
crypto/akcipher.c | 1 -
crypto/asymmetric_keys/pkcs7_verify.c | 5 +-
crypto/asymmetric_keys/x509_cert_parser.c | 6 +-
crypto/asymmetric_keys/x509_public_key.c | 5 +-
crypto/jitterentropy-kcapi.c | 4 -
crypto/keywrap.c | 419 +++++++++++++++++
crypto/rsa.c | 83 ++--
crypto/rsa_helper.c | 42 +-
crypto/rsakey.asn1 | 5 -
crypto/rsaprivkey.asn1 | 11 +
crypto/rsapubkey.asn1 | 4 +
crypto/skcipher.c | 4 +-
crypto/tcrypt.c | 17 +-
crypto/testmgr.c | 83 ++--
crypto/testmgr.h | 77 +++-
drivers/char/hw_random/Kconfig | 24 +-
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/exynos-rng.c | 58 ++-
drivers/char/hw_random/mxc-rnga.c | 14 +-
drivers/char/hw_random/octeon-rng.c | 12 +-
drivers/char/hw_random/pasemi-rng.c | 1 +
drivers/char/hw_random/ppc4xx-rng.c | 1 +
drivers/char/hw_random/st-rng.c | 151 +++++++
drivers/char/hw_random/stm32-rng.c | 202 +++++++++
drivers/crypto/Kconfig | 5 +-
drivers/crypto/amcc/crypto4xx_core.c | 23 +-
drivers/crypto/atmel-aes.c | 44 +-
drivers/crypto/atmel-sha.c | 33 +-
drivers/crypto/atmel-tdes.c | 35 +-
drivers/crypto/bfin_crc.c | 25 +-
drivers/crypto/caam/caamalg.c | 232 +++++++---
drivers/crypto/caam/caamhash.c | 131 +++---
drivers/crypto/caam/desc.h | 1 -
drivers/crypto/caam/sg_sw_sec4.h | 72 +--
drivers/crypto/ccp/Kconfig | 13 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 20 +-
drivers/crypto/ccp/ccp-crypto-main.c | 6 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 13 +
drivers/crypto/ccp/ccp-ops.c | 108 +++--
drivers/crypto/ccp/ccp-pci.c | 2 +-
drivers/crypto/ccp/ccp-platform.c | 6 +-
drivers/crypto/marvell/cesa.h | 55 ++-
drivers/crypto/marvell/cipher.c | 13 +-
drivers/crypto/marvell/hash.c | 471 ++++++++++----------
drivers/crypto/marvell/tdma.c | 42 +-
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/nx/nx-842-powernv.c | 4 +-
drivers/crypto/nx/nx-842-pseries.c | 8 +-
drivers/crypto/picoxcell_crypto.c | 1 +
drivers/crypto/qat/qat_common/Makefile | 12 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 4 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 6 -
drivers/crypto/qat/qat_common/adf_init.c | 8 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 7 +-
drivers/crypto/qat/qat_common/qat_algs.c | 178 +++++---
drivers/crypto/qat/qat_common/qat_asym_algs.c | 213 ++++++---
drivers/crypto/qat/qat_common/qat_crypto.c | 79 ++--
drivers/crypto/qat/qat_common/qat_hal.c | 5 +-
drivers/crypto/qat/qat_common/qat_rsakey.asn1 | 5 -
drivers/crypto/qat/qat_common/qat_rsaprivkey.asn1 | 11 +
drivers/crypto/qat/qat_common/qat_rsapubkey.asn1 | 4 +
drivers/crypto/qce/ablkcipher.c | 30 +-
drivers/crypto/qce/cipher.h | 4 -
drivers/crypto/qce/dma.c | 52 ---
drivers/crypto/qce/dma.h | 5 -
drivers/crypto/qce/sha.c | 18 +-
drivers/crypto/qce/sha.h | 2 -
drivers/crypto/sahara.c | 108 +----
drivers/crypto/talitos.c | 104 +----
drivers/crypto/ux500/cryp/cryp_core.c | 71 +--
drivers/crypto/ux500/hash/hash_core.c | 50 +--
include/crypto/akcipher.h | 90 +++-
include/crypto/hash.h | 14 +
include/crypto/internal/rsa.h | 7 +-
include/linux/mpi.h | 10 +-
lib/842/842.h | 2 +
lib/842/842_compress.c | 13 +
lib/842/842_decompress.c | 17 +
lib/mpi/mpicoder.c | 199 +++++++++
98 files changed, 4070 insertions(+), 1538 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.4
2015-10-26 11:02 ` Herbert Xu
@ 2015-11-11 7:08 ` Herbert Xu
2015-11-17 9:41 ` Herbert Xu
` (2 more replies)
0 siblings, 3 replies; 246+ messages in thread
From: Herbert Xu @ 2015-11-11 7:08 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the algif_hash interface that may lead
to crashes when used with certain algorithms such as HMAC.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Herbert Xu (1):
crypto: algif_hash - Only export and import on sockets with data
crypto/algif_hash.c | 12 ++++++++++--
1 file changed, 10 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.4
2015-11-11 7:08 ` Crypto Fixes for 4.4 Herbert Xu
@ 2015-11-17 9:41 ` Herbert Xu
2015-12-05 1:04 ` Herbert Xu
2015-12-28 13:26 ` Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-11-17 9:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the qat driver where a user-space pointer
is dereferenced.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Tadeusz Struk (1):
crypto: qat - don't use userspace pointer
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.4
2015-11-11 7:08 ` Crypto Fixes for 4.4 Herbert Xu
2015-11-17 9:41 ` Herbert Xu
@ 2015-12-05 1:04 ` Herbert Xu
2015-12-14 9:29 ` Herbert Xu
2015-12-28 13:26 ` Herbert Xu
2 siblings, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2015-12-05 1:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a couple of crypto drivers that were using memcmp
to verify authentication tags. They now use crypto_memneq instead.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
David Gstir (2):
crypto: nx - Fix timing leak in GCM and CCM decryption
crypto: talitos - Fix timing leak in ESP ICV verification
drivers/crypto/nx/nx-aes-ccm.c | 2 +-
drivers/crypto/nx/nx-aes-gcm.c | 3 ++-
drivers/crypto/talitos.c | 2 +-
3 files changed, 4 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.4
2015-12-05 1:04 ` Herbert Xu
@ 2015-12-14 9:29 ` Herbert Xu
0 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-12-14 9:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a boundary condition in the blkcipher SG walking
code that can lead to a crash when used with the new chacha20
algorithm.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Jason A. Donenfeld (1):
crypto: skcipher - Copy iv from desc even for 0-len walks
crypto/ablkcipher.c | 2 +-
crypto/blkcipher.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.4
2015-11-11 7:08 ` Crypto Fixes for 4.4 Herbert Xu
2015-11-17 9:41 ` Herbert Xu
2015-12-05 1:04 ` Herbert Xu
@ 2015-12-28 13:26 ` Herbert Xu
2 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2015-12-28 13:26 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug in the algif_skcipher interface that can
trigger a kernel WARN_ON from user-space. It does so by using
the new skcipher interface which unlike the previous ablkcipher
does not need to create extra geniv objects which is what was
used to trigger the WARN_ON.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Herbert Xu (1):
crypto: algif_skcipher - Use new skcipher interface
crypto/algif_skcipher.c | 61 +++++++++++++++++++++++------------------------
1 file changed, 30 insertions(+), 31 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 4.5
2015-11-02 8:04 ` Crypto Update for 4.4 Herbert Xu
@ 2016-01-11 10:14 ` Herbert Xu
2016-01-22 10:18 ` Crypto Fixes " Herbert Xu
2016-03-15 7:20 ` Crypto Update for 4.6 Herbert Xu
0 siblings, 2 replies; 246+ messages in thread
From: Herbert Xu @ 2016-01-11 10:14 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 4.5:
Algorithms:
* Add RSA padding algorithm.
Drivers:
* Add GCM mode support to atmel.
* Add atmel support for SAMA5D2 devices.
* Add cipher modes to talitos.
* Add rockchip driver for rk3288.
* Add qat support for C3XXX and C62X.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Aaro Koskinen (1):
hwrng: omap3-rom - convert timer to delayed work
Ahsan Atta (1):
crypto: qat - Rename dh895xcc mmp firmware
Alexander Kuleshov (1):
crypto: cryptod - use crypto_skcipher_type() for getting skcipher type
Andrzej Zaborowski (5):
lib/mpi: only require buffers as big as needed for the integer
crypto: rsa - only require output buffers as big as needed.
crypto: akcipher - add akcipher declarations needed by templates.
crypto: rsa - RSA padding algorithm
crypto: rsa-pkcs1pad - don't allocate buffer on stack
Arnd Bergmann (4):
crypto: atmel - fix 64-bit warnings
crypto: atmel: fix bogus select
crypto: sahara - fix 64-bit dma_addr_t compilation
crypto: sahara - fix debug output for 64-bit dma_addr_t
Cyrille Pitchen (24):
crypto: tcrypt - fix keysize argument of test_aead_speed for gcm(aes)
crypto: atmel-aes - constify value argument of atmel_aes_write_n()
crypto: atmel-aes - change algorithm priorities
crypto: atmel-aes - fix unregistration order of crypto algorithms
crypto: atmel-aes - remove unused header includes
crypto: atmel-aes - propagate error from atmel_aes_hw_version_init()
crypto: atmel-aes - change atmel_aes_write_ctrl() signature
crypto: atmel-aes - make crypto request queue management more generic
crypto: atmel-aes - remove useless write in the Control Register
crypto: atmel-aes - simplify the configuration of the AES IP
crypto: atmel-aes - rework crypto request completion
crypto: atmel-aes - remove unused 'err' member of struct atmel_aes_dev
crypto: atmel-aes - reduce latency of DMA completion
crypto: atmel-aes - remove useless AES_FLAGS_DMA flag
crypto: atmel-aes - fix atmel_aes_remove()
crypto: atmel-aes - improve performances of data transfer
crypto: atmel-aes - use SIZE_IN_WORDS() helper macro
crypto: atmel-aes - fix typo and indentation
crypto: atmel-aes - create sections to regroup functions by usage
crypto: atmel-aes - fix atmel-ctr-aes driver for RFC 3686
crypto: atmel-aes - fix the counter overflow in CTR mode
crypto: atmel-aes - change the DMA threshold
crypto: atmel-aes - add support to GCM mode
crypto: atmel-aes - add debug facilities to monitor register accesses.
Dan Streetman (1):
crypto: 842 - remove WARN inside printk
Fabio Estevam (1):
crypto: caam - pass the correct buffer length
Geliang Tang (6):
crypto: api - use list_first_entry_or_null and list_next_entry
crypto: mcryptd - use list_first_entry_or_null()
crypto: padlock-aes - use offset_in_page macro
crypto: qat - use list_for_each_entry*
crypto: ccp - use to_pci_dev and to_platform_device
crypto: hifn_795x, picoxcell - use ablkcipher_request_cast
Haren Myneni (1):
crypto: nx-842 - Mask XERS0 bit in return value
Harvijay Saini (1):
crypto: qat - ring returning retry even though ring has BW
Heiko Stuebner (1):
crypto: rockchip - fix possible deadlock
Jason A. Donenfeld (1):
crypto: chacha20poly1305 - Skip encryption/decryption for 0-len
Jim Davis (1):
crypto: qat - fix typo in clean-files
Jiri Slaby (1):
hwrng: core - sleep interruptible in read
Julia Lawall (2):
crypto: qat - constify pci_error_handlers structures
crypto: drbg - constify drbg_state_ops structures
LABBE Corentin (19):
crypto: hifn_795x - remove the hifn_test function
crypto: hifn_795x - use dev_xx/pr_xx instead of printk
crypto: hifn_795x - fix coding style
crypto: algif - Change some variable to size_t
crypto: marvell - check return value of sg_nents_for_len
crypto: talitos - check return value of sg_nents_for_len
crypto: sahara - check return value of sg_nents_for_len
crypto: qce - check return value of sg_nents_for_len
crypto: picoxcell - check return value of sg_nents_for_len
crypto: caam - check return value of sg_nents_for_len
crypto: amcc - check return value of sg_nents_for_len
crypto: sun4i-ss - add missing statesize
crypto: sahara - set nb_[in|out]_sg as signed int
crypto: picoxcell - set [src|dst]_nents and nents as signed int
crypto: akcipher - fix typos in include/crypto/akcipher.h
crypto: hash - add zero length message hash for shax and md5
crypto: n2 - Use precalculated hash from headers
crypto: ccp - Use precalculated hash from headers
crypto: ux500 - Use precalculated hash from headers
LEROY Christophe (1):
crypto: talitos - add new crypto modes
Leilei Zhao (1):
crypto: atmel-aes - add new version
Leonidas Da Silva Barbosa (1):
crypto: vmx - IV size failing on skcipher API
Markus Elfring (1):
crypto: ixp4xx - Delete unnecessary checks before the function call "dma_pool_destroy"
Paul Gortmaker (1):
crypto: asymmetric_keys - signature.c does not need <module.h>
Pingchao Yang (3):
crypto: qat - add support for new devices to FW loader
crypto: qat - fix CTX_ENABLES bits shift direction issue
crypto: qat - fix some timeout tests
Rahul Pathak (2):
crypto: atmel-sha - Removed unused variable "err"
crypto: omap - Removed unused variable "err"
Randy Dunlap (1):
crypto: aead - fix kernel-doc warnings in crypto/aead.h
Salvatore Benedetto (1):
crypto: qat - remove superfluous check from adf_probe
Sam Protsenko (1):
crypto: omap-des - Fix "schedule while atomic" bug
Tadeusz Struk (12):
crypto: qat - when stopping all devices make fure VF are stopped first
crypto: qat - fix get instance function
crypto: qat - add new device definitions
crypto: qat - move isr files to qat common so that they can be reused
crypto: qat - add support for c3xxx accel type
crypto: qat - add support for c62x accel type
crypto: qat - add support for c3xxxvf accel type
crypto: qat - add support for c62xvf accel type
crypto: qat - select PCI_IOV when VF are enabled
crypto: qat - uint8_t is not large enough for accel_id
crypto: qat - Fix random config build issue
crypto: qat - fix SKU definiftion for c3xxx dev
Thierry Reding (1):
crypto: n2 - Use platform_register/unregister_drivers()
Wang, Rui Y (2):
crypto: ghash-clmulni - Fix load failure
crypto: cryptd - Assign statesize properly
Zain Wang (2):
crypto: rockchip - add DT bindings documentation
crypto: rockchip - add crypto driver for rk3288
Zeng Xin (1):
crypto: qat - enable VF irq after guest exits ungracefully
saurabh (1):
crypto: nx - use of_property_read_u32()
.../devicetree/bindings/crypto/rockchip-crypto.txt | 29 +
arch/powerpc/include/asm/icswx.h | 1 +
arch/x86/crypto/ghash-clmulni-intel_glue.c | 26 +
crypto/Makefile | 1 +
crypto/akcipher.c | 34 +-
crypto/algapi.c | 9 +-
crypto/algif_aead.c | 6 +-
crypto/algif_skcipher.c | 10 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/chacha20poly1305.c | 8 +
crypto/cryptd.c | 4 +-
crypto/drbg.c | 6 +-
crypto/mcryptd.c | 8 +-
crypto/md5.c | 6 +
crypto/rsa-pkcs1pad.c | 628 +++++++
crypto/rsa.c | 40 +-
crypto/sha1_generic.c | 7 +
crypto/sha256_generic.c | 16 +
crypto/tcrypt.c | 2 +-
drivers/char/hw_random/core.c | 6 +-
drivers/char/hw_random/omap3-rom-rng.c | 13 +-
drivers/crypto/Kconfig | 18 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/amcc/crypto4xx_core.c | 4 +
drivers/crypto/atmel-aes-regs.h | 10 +
drivers/crypto/atmel-aes.c | 1843 ++++++++++++++------
drivers/crypto/atmel-sha.c | 3 +-
drivers/crypto/caam/caamhash.c | 26 +-
drivers/crypto/ccp/Kconfig | 2 +
drivers/crypto/ccp/ccp-ops.c | 39 +-
drivers/crypto/ccp/ccp-pci.c | 8 +-
drivers/crypto/ccp/ccp-platform.c | 6 +-
drivers/crypto/hifn_795x.c | 512 +++---
drivers/crypto/ixp4xx_crypto.c | 6 +-
drivers/crypto/marvell/cipher.c | 8 +
drivers/crypto/marvell/hash.c | 4 +
drivers/crypto/n2_core.c | 50 +-
drivers/crypto/nx/nx-842-powernv.c | 23 +-
drivers/crypto/omap-aes.c | 4 +-
drivers/crypto/omap-des.c | 5 +-
drivers/crypto/padlock-aes.c | 4 +-
drivers/crypto/picoxcell_crypto.c | 56 +-
drivers/crypto/qat/Kconfig | 46 +
drivers/crypto/qat/Makefile | 4 +
drivers/crypto/qat/qat_c3xxx/Makefile | 3 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 238 +++
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 83 +
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 335 ++++
drivers/crypto/qat/qat_c3xxxvf/Makefile | 3 +
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 173 ++
.../adf_c3xxxvf_hw_data.h} | 31 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 305 ++++
drivers/crypto/qat/qat_c62x/Makefile | 3 +
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 248 +++
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 84 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 335 ++++
drivers/crypto/qat/qat_c62xvf/Makefile | 3 +
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 173 ++
.../adf_drv.h => qat_c62xvf/adf_c62xvf_hw_data.h} | 32 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 305 ++++
drivers/crypto/qat/qat_common/Makefile | 4 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 16 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 9 +-
drivers/crypto/qat/qat_common/adf_admin.c | 4 +-
drivers/crypto/qat/qat_common/adf_aer.c | 4 +-
drivers/crypto/qat/qat_common/adf_cfg_common.h | 8 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 31 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 21 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 36 +-
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 8 +-
drivers/crypto/qat/qat_common/adf_init.c | 21 +-
.../qat/{qat_dh895xcc => qat_common}/adf_isr.c | 44 +-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 23 -
drivers/crypto/qat/qat_common/adf_transport.c | 28 +-
.../qat/qat_common/adf_transport_access_macros.h | 5 +
.../crypto/qat/qat_common/adf_transport_internal.h | 2 +-
.../adf_isr.c => qat_common/adf_vf_isr.c} | 64 +-
.../qat/qat_common/icp_qat_fw_loader_handle.h | 10 +
drivers/crypto/qat/qat_common/icp_qat_hal.h | 37 +-
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 165 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 136 +-
drivers/crypto/qat/qat_common/qat_hal.c | 124 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 555 +++++-
drivers/crypto/qat/qat_dh895xcc/Makefile | 4 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 5 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 9 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 103 +-
drivers/crypto/qat/qat_dh895xccvf/Makefile | 4 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 5 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 10 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 96 +-
drivers/crypto/qce/ablkcipher.c | 8 +
drivers/crypto/qce/sha.c | 5 +
drivers/crypto/rockchip/Makefile | 3 +
drivers/crypto/rockchip/rk3288_crypto.c | 394 +++++
drivers/crypto/rockchip/rk3288_crypto.h | 216 +++
drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 505 ++++++
drivers/crypto/sahara.c | 42 +-
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 2 +
drivers/crypto/talitos.c | 124 +-
drivers/crypto/talitos.h | 1 +
drivers/crypto/ux500/Kconfig | 2 +
drivers/crypto/ux500/hash/hash_core.c | 20 +-
drivers/crypto/vmx/aes_cbc.c | 2 +-
drivers/crypto/vmx/aes_ctr.c | 2 +-
include/crypto/aead.h | 1 +
include/crypto/akcipher.h | 10 +-
include/crypto/internal/akcipher.h | 78 +
include/crypto/internal/rsa.h | 2 +
include/crypto/md5.h | 2 +
include/crypto/sha.h | 6 +
lib/842/842_decompress.c | 14 +-
lib/mpi/mpicoder.c | 21 +-
113 files changed, 7344 insertions(+), 1605 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.5
2016-01-11 10:14 ` Crypto Update for 4.5 Herbert Xu
@ 2016-01-22 10:18 ` Herbert Xu
2016-02-01 8:31 ` Herbert Xu
` (5 more replies)
2016-03-15 7:20 ` Crypto Update for 4.6 Herbert Xu
1 sibling, 6 replies; 246+ messages in thread
From: Herbert Xu @ 2016-01-22 10:18 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
API:
* A large number of bug fixes for the af_alg interface, credit
goes to Dmitry Vyukov for discovering and reporting these issues.
Algorithms:
* sw842 needs to select crc32.
* The soft dependency on crc32c is now in the correct spot.
Drivers:
* The atmel AES driver needs HAS_DMA.
* The atmel AES driver was a missing break statement, fortunately
it's only a debug function.
* A number of bug fixes for the Intel qat driver.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Arnd Bergmann (1):
lib: sw842: select crc32
Geert Uytterhoeven (1):
crypto: CRYPTO_DEV_ATMEL_AES should depend on HAS_DMA
Herbert Xu (18):
crypto: algif_skcipher - Require setkey before accept(2)
crypto: af_alg - Disallow bind/setkey/... after accept(2)
crypto: af_alg - Fix socket double-free when accept fails
crypto: af_alg - Add nokey compatibility path
crypto: algif_skcipher - Add nokey compatibility path
crypto: hash - Add crypto_ahash_has_setkey
crypto: algif_hash - Require setkey before accept(2)
crypto: skcipher - Add crypto_skcipher_has_setkey
crypto: algif_skcipher - Add key check exception for cipher_null
crypto: af_alg - Allow af_af_alg_release_parent to be called on nokey path
crypto: algif_hash - Remove custom release parent function
crypto: algif_skcipher - Remove custom release parent function
crypto: af_alg - Forbid bind(2) when nokey child sockets are present
crypto: algif_hash - Fix race condition in hash_check_key
crypto: algif_skcipher - Fix race condition in skcipher_check_key
crypto: atmel-aes - Add missing break to atmel_aes_reg_name
crypto: algif_skcipher - Load TX SG list after waiting
crypto: algif_skcipher - sendmsg SG marking is off by one
Jean Delvare (1):
crypto: crc32c - Fix crc32c soft dependency
Pingchao Yang (2):
crypto: qat - remove to call get_sram_bar_id for qat_c3xxx
crypto: qat - fix timeout issues
Tadeusz Struk (1):
crypto: qat - update init_esram for C3xxx dev type
crypto/af_alg.c | 55 ++++++++--
crypto/ahash.c | 5 +-
crypto/algif_hash.c | 165 +++++++++++++++++++++++++++--
crypto/algif_skcipher.c | 172 ++++++++++++++++++++++++++++---
crypto/crc32c_generic.c | 1 -
crypto/shash.c | 4 +-
crypto/skcipher.c | 2 +
drivers/crypto/Kconfig | 1 +
drivers/crypto/atmel-aes.c | 1 +
drivers/crypto/qat/qat_common/qat_hal.c | 23 +++--
include/crypto/hash.h | 6 ++
include/crypto/if_alg.h | 11 +-
include/crypto/skcipher.h | 7 ++
lib/Kconfig | 2 +
lib/libcrc32c.c | 1 +
15 files changed, 411 insertions(+), 45 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.5
2016-01-22 10:18 ` Crypto Fixes " Herbert Xu
@ 2016-02-01 8:31 ` Herbert Xu
2016-02-09 17:54 ` Herbert Xu
` (4 subsequent siblings)
5 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2016-02-01 8:31 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
API:
* algif_hash needs to wait for init operations to complete.
* The has_key setting for shash was always true.
Algorithms:
* Add missing selections of CRYPTO_HASH.
* Fix pkcs7 authentication.
Drivers:
* Fix stack alignment bug in chacha20-ssse3.
* Fix performance regression in caam due to incorrect setting.
* Fix potential compile-only build failure of stm32.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Arnd Bergmann (1):
crypto: ghash,poly1305 - select CRYPTO_HASH where needed
Cyrille Pitchen (1):
crypto: atmel-aes - remove calls of clk_prepare() from atomic contexts
Eli Cooper (1):
crypto: chacha20-ssse3 - Align stack pointer to 64 bytes
Herbert Xu (1):
crypto: shash - Fix has_key setting
Horia Geant? (1):
crypto: caam - make write transactions bufferable on PPC platforms
Peter Jones (1):
PKCS#7: Don't require SpcSpOpusInfo in Authenticode pkcs7 signatures
Richard Weinberger (1):
hwrng: stm32 - Fix dependencies for !HAS_IOMEM archs
Wang, Rui Y (1):
crypto: algif_hash - wait for crypto_ahash_init() to complete
arch/x86/crypto/chacha20-ssse3-x86_64.S | 6 ++++--
crypto/Kconfig | 2 ++
crypto/algif_hash.c | 4 +++-
crypto/asymmetric_keys/pkcs7_parser.c | 4 +---
crypto/shash.c | 7 +++----
drivers/char/hw_random/Kconfig | 1 +
drivers/crypto/atmel-aes.c | 16 ++++++++++++----
drivers/crypto/caam/ctrl.c | 4 ++--
8 files changed, 28 insertions(+), 16 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Fixes for 4.5
2016-01-22 10:18 ` Crypto Fixes " Herbert Xu
2016-02-01 8:31 ` Herbert Xu
@ 2016-02-09 17:54 ` Herbert Xu
2016-03-23 13:09 ` Crypto Fixes for 4.6 Herbert Xu
` (3 subsequent siblings)
5 siblings, 0 replies; 246+ messages in thread
From: Herbert Xu @ 2016-02-09 17:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
API:
* Fix async algif_skcipher, it was broken by recent fixes.
* Fix potential race condition in algif_skcipher with ctx.
* Fix potential memory corruption in algif_skcipher.
* Add missing lock to crypto_user when doing an alg dump.
Drivers:
* marvell/cesa was testing the wrong variable for NULL after
allocation.
* Fix potential double-free in atmel-sha.
* Fix illegal call to sleepin function from atomic context in
atmel-sha.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Boris BREZILLON (1):
crypto: marvell/cesa - fix test in mv_cesa_dev_dma_init()
Cyrille Pitchen (2):
crypto: atmel-sha - fix atmel_sha_remove()
crypto: atmel-sha - remove calls of clk_prepare() from atomic contexts
Herbert Xu (3):
crypto: algif_skcipher - Do not assume that req is unchanged
crypto: algif_skcipher - Do not dereference ctx without socket lock
crypto: algif_skcipher - Do not set MAY_BACKLOG on the async path
Mathias Krause (1):
crypto: user - lock crypto_alg_list on alg dump
crypto/algif_skcipher.c | 80 +++++++++++++++++++++--------------------
crypto/crypto_user.c | 6 +++-
drivers/crypto/atmel-sha.c | 23 ++++++------
drivers/crypto/marvell/cesa.c | 2 +-
4 files changed, 60 insertions(+), 51 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 246+ messages in thread
* Crypto Update for 4.6
2016-01-11 10:14 ` Crypto Update for 4.5 Herbert Xu
2016-01-22 10:18 ` Crypto Fixes " Herbert Xu
@ 2016-03-15 7:20 ` Herbert Xu
2016-05-16 7:16 ` Crypto Update for 4.7 Herbert Xu
1 sibling, 1 reply; 246+ messages in thread
From: Herbert Xu @ 2016-03-15 7:20 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Here is the crypto update for 4.6:
API:
* Convert remaining crypto_hash users to shash or ahash,
also convert blkcipher/ablkcipher users to skcipher.
Please note taht this conflicts with the net, staging
and f2fs trees but the resolution should be fairly simple.
* Remove crypto_hash interface.
* Remove crypto_pcomp interface.
* Add crypto engine for async cipher drivers.
* Add akcipher documentation.
* Add skcipher documentation.
Algorithms:
* Rename crypto/crc32 to avoid name clash with lib/crc32.
* Fix bug in keywrap where we zero the wrong pointer.
Drivers:
* Support T5/M5, T7/M7 SPARC CPUs in n2 hwrng driver.
* Add PIC32 hwrng driver.
* Support BCM6368 in bcm63xx hwrng driver.
* Pack structs for 32-bit compat users in qat.
* Use crypto engine in omap-aes.
* Add support for sama5d2x SoCs in atmel-sha.
* Make atmel-sha available again.
* Make sahara hashing available again.
* Make ccp hashing available again.
* Make sha1-mb available again.
* Add support for multiple devices in ccp.
* Improve DMA performance in caam.
* Add hashing support to rockchip.
Please pull from
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
Anatoly Pugachev (2):
hwrng: n2 - documentation, add DT bindings, vendor prefixes
hwrng: n2 - Attach on T5/M5, T7/M7 SPARC CPUs
Andre Przywara (1):
crypto: sunxi-ss - prevent compilation on 64-bit
Arnd Bergmann (5):
crypto: sunxi - don't print confusing data
crypto: jitterentropy - always select CRYPTO_RNG
lib/mpi: avoid assembler warning
lib/mpi: use "static inline" instead of "extern inline"
hwrng: exynos - use __maybe_unused to hide pm functions
Atta, Ahsan (1):
crypto: qat - Pack cfg ctl structs
Baolin Wang (3):
crypto: api - Introduce crypto_queue_len() helper function
crypto: engine - Introduce the block request crypto engine framework
crypto: omap-aes - Support crypto engine framework
Cabiddu, Giovanni (1):
crypto: qat - Reduced reqsize in qat_algs
Cyrille Pitchen (7):
crypto: atmel-sha - fix crash when computing digest on empty message
crypto: atmel-sha - fix a race between the 'done' tasklet and the crypto client
crypto: atmel-sha - add support of sama5d2x SoCs
crypto: atmel-sha - fix context switches
crypto: atmel-sha - fix algorihtm registration
crypto: atmel-sha - fix .import()/.export() implementation
crypto: atmel-sha - fix race in atmel_sha_final()
Dan Carpenter (1):
crypto: keywrap - memzero the correct memory
Fabio Estevam (4):
crypto: sahara - remove unneeded mutex in the exported state
crypto: sahara - avoid needlessly saving and restoring sahara_ctx
crypto: sahara - fill the statesize field
crypto: caam - Staticize caam_jr_shutdown()
Gary R Hook (4):
crypto: ccp - Remove check for x86 family and model
crypto: ccp - Support for multiple CCPs
crypto: ccp - CCP versioning support
crypto: ccp - Add abstraction for device-specific calls
Herbert Xu (41):
crypto: ixp4xx - Fix false lastlen uninitialised warning
crypto: skcipher - Add default key size helper
crypto: hash - Add helpers to zero stack request/descriptor
crypto: skcipher - Add helper to zero stack request
crypto: api - Add crypto_type_has_alg helper
crypto: hash - Add crypto_has_ahash helper
crypto: skcipher - Add helper to retrieve driver name
block: cryptoloop - Use new skcipher interface
ppp_mppe: Use skcipher and ahash
staging: rtl8192e: Replace uses of obsolete blkcipher and hash
dm crypt: Use skcipher and ahash
orinoco: Use ahash
staging: rtl8192u: Use skcipher and ahash
wusb: Use skcipher
cifs: Use skcipher
ext4: Use skcipher
f2fs: Use skcipher
sunrpc: Use skcipher and ahash/shash
lib80211: Use skcipher and ahash
KEYS: Use skcipher
Bluetooth: Use skcipher and hash
libceph: Use skcipher
mac802154: Use skcipher
rxrpc: Use skcipher
ipsec: Use skcipher and ahash when probing algorithms
drbd: Use shash and ahash
nfc: s3fwrn5: Use shash
iscsi_tcp: Use ahash
iscsi-target: Use shash and ahash
nfsd: Use shash
sctp: Use shash
tcp: Use ahash
eCryptfs: Use skcipher and shash
crypto: crc32 - Rename generic implementation
crypto: tcrypt - Use ahash
crypto: doc - Use ahash
crypto: skcipher - Fix driver name helper
crypto: hash - Add helpers to return alg and driver names
staging: lustre: Use ahash
crypto: hash - Remove c