Linux-Crypto Archive on lore.kernel.org
 help / color / Atom feed
* [GIT PULL] Crypto Update for 5.4
@ 2019-09-16  8:49 Herbert Xu
  2019-09-18 19:55 ` pr-tracker-bot
                   ` (2 more replies)
  0 siblings, 3 replies; 52+ messages in thread
From: Herbert Xu @ 2019-09-16  8:49 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Add the ability to abort a skcipher walk.

Algorithms:

- Fix XTS to actually do the stealing.
- Add library helpers for AES and DES for single-block users.
- Add library helpers for SHA256.
- Add new DES key verification helper.
- Add surrounding bits for ESSIV generator.
- Add accelerations for aegis128.
- Add test vectors for lzo-rle.

Drivers:

- Add i.MX8MQ support to caam.
- Add gcm/ccm/cfb/ofb aes support in inside-secure.
- Add ofb/cfb aes support in media-tek.
- Add HiSilicon ZIP accelerator support.

Others:

- Fix potential race condition in padata.
- Use unbound workqueues in padata.

Please note that there is a conflict with mainline due to the
sha256 library change.  There is also a conflit with the s390
tree due to changes in the s390 crypto code.  Finally there is
a conflict with arm-soc due to a DTS change.

The following changes since commit 5f9e832c137075045d15cd6899ab0505cfb2ca4b:

  Linus 5.3-rc1 (2019-07-21 14:05:38 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 9575d1a5c0780ea26ff8dd29c94a32be32ce3c85:

  crypto: caam - Cast to long first before pointer conversion (2019-09-13 21:20:47 +1000)

----------------------------------------------------------------
Alexander Sverdlin (1):
      crypto: qat - Silence smp_processor_id() warning

Andrey Smirnov (20):
      crypto: caam - move DMA mask selection into a function
      crypto: caam - simplfy clock initialization
      crypto: caam - convert caam_jr_init() to use devres
      crypto: caam - request JR IRQ as the last step
      crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
      crypto: caam - use ioread64*_hi_lo in rd_reg64
      crypto: caam - drop 64-bit only wr/rd_reg64()
      crypto: caam - share definition for MAX_SDLEN
      crypto: caam - make CAAM_PTR_SZ dynamic
      crypto: caam - move cpu_to_caam_dma() selection to runtime
      crypto: caam - drop explicit usage of struct jr_outentry
      crypto: caam - don't hardcode inpentry size
      crypto: caam - select DMA address size at runtime
      crypto: caam - always select job ring via RSR on i.MX8MQ
      crypto: caam - add clock entry for i.MX8MQ
      crypto: caam - make sure clocks are enabled first
      crypto: caam - use devres to unmap JR's registers
      crypto: caam - check irq_of_parse_and_map for errors
      crypto: caam - dispose of IRQ mapping only after IRQ is freed
      arm64: dts: imx8mq: Add CAAM node

Anson Huang (2):
      hwrng: imx-rngc - use devm_platform_ioremap_resource() to simplify code
      hwrng: mxc-rnga - use devm_platform_ioremap_resource() to simplify code

Ard Biesheuvel (103):
      crypto: arm/aes-ce - cosmetic/whitespace cleanup
      crypto: aes - rename local routines to prevent future clashes
      crypto: aes/fixed-time - align key schedule with other implementations
      crypto: aes - create AES library based on the fixed time AES code
      crypto: x86/aes-ni - switch to generic for fallback and key routines
      crypto: x86/aes - drop scalar assembler implementations
      crypto: padlock/aes - switch to library version of key expansion routine
      crypto: cesa/aes - switch to library version of key expansion routine
      crypto: safexcel/aes - switch to library version of key expansion routine
      crypto: arm64/ghash - switch to AES library
      crypto: arm/aes-neonbs - switch to library version of key expansion routine
      crypto: arm64/aes-ccm - switch to AES library
      crypto: arm64/aes-neonbs - switch to library version of key expansion routine
      crypto: arm64/aes-ce - switch to library version of key expansion routine
      crypto: aes-generic - drop key expansion routine in favor of library version
      crypto: ctr - add helper for performing a CTR encryption walk
      crypto: aes - move sync ctr(aes) to AES library and generic helper
      crypto: arm64/aes-ce-cipher - use AES library as fallback
      crypto: arm/aes - use native endiannes for key schedule
      crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
      crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
      crypto: arm/ghash - provide a synchronous version
      bluetooth: switch to AES library
      crypto: amcc - switch to AES library for GCM key derivation
      crypto: ccp - move to AES library for CMAC key derivation
      crypto: chelsio - replace AES cipher calls with library calls
      crypto: aes-generic - unexport last-round AES tables
      crypto: lib/aes - export sbox and inverse sbox
      crypto: arm64/aes-neon - switch to shared AES Sboxes
      crypto: arm/aes-cipher - switch to shared AES inverse Sbox
      crypto: arm64/aes-cipher - switch to shared AES inverse Sbox
      crypto: arm/aes-scalar - unexport en/decryption routines
      crypto: morus - remove generic and x86 implementations
      crypto: aegis128l/aegis256 - remove x86 and generic implementations
      crypto: aegis128 - drop empty TFM init/exit routines
      crypto: aegis - avoid prerotated AES tables
      crypto: aegis128 - add support for SIMD acceleration
      crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
      crypto: tcrypt - add a speed test for AEGIS128
      crypto: s390/aes - fix name clash after AES library refactor
      asm-generic: make simd.h a mandatory include/asm header
      crypto: xts - add support for ciphertext stealing
      crypto: aegis128 - add support for SIMD acceleration
      crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
      crypto: arm64/aegis128 - implement plain NEON version
      crypto: des/3des_ede - add new helpers to verify keys
      crypto: s390/des - switch to new verification routines
      crypto: sparc/des - switch to new verification routines
      crypto: atmel/des - switch to new verification routines
      crypto: bcm/des - switch to new verification routines
      crypto: caam/des - switch to new verification routines
      crypto: cpt/des - switch to new verification routines
      crypto: nitrox/des - switch to new verification routines
      crypto: ccp/des - switch to new verification routines
      crypto: ccree/des - switch to new verification routines
      crypto: hifn/des - switch to new verification routines
      crypto: hisilicon/des - switch to new verification routines
      crypto: safexcel/des - switch to new verification routines
      crypto: ixp4xx/des - switch to new verification routines
      crypto: cesa/des - switch to new verification routines
      crypto: n2/des - switch to new verification routines
      crypto: omap/des - switch to new verification routines
      crypto: picoxcell/des - switch to new verification routines
      crypto: qce/des - switch to new verification routines
      crypto: rk3288/des - switch to new verification routines
      crypto: stm32/des - switch to new verification routines
      crypto: sun4i/des - switch to new verification routines
      crypto: talitos/des - switch to new verification routines
      crypto: ux500/des - switch to new verification routines
      crypto: 3des - move verification out of exported routine
      crypto: des - remove unused function
      crypto: des - split off DES library from generic DES cipher driver
      crypto: x86/des - switch to library interface
      crypto: des - remove now unused __des3_ede_setkey()
      fs: cifs: move from the crypto cipher API to the new DES library interface
      crypto: x86/xts - implement support for ciphertext stealing
      crypto: s390/xts-aes - invoke fallback for ciphertext stealing
      crypto: vmx/xts - use fallback for ciphertext stealing
      crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
      crypto: n2/des - fix build breakage after DES updates
      crypto: arm64/aegis128 - use explicit vector load for permute vectors
      crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
      crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
      crypto: arm64/aes - implement accelerated ESSIV/CBC mode
      crypto: s5p - deal gracefully with bogus input sizes
      crypto: s5p - use correct block size of 1 for ctr(aes)
      crypto: ccp - invoke fallback for XTS ciphertext stealing
      crypto: arm/aes - fix round key prototypes
      crypto: arm/aes-ce - yield the SIMD unit between scatterwalk steps
      crypto: arm/aes-ce - switch to 4x interleave
      crypto: arm/aes-ce - replace tweak mask literal with composition
      crypto: arm/aes-neonbs - replace tweak mask literal with composition
      crypto: arm64/aes-neonbs - replace tweak mask literal with composition
      crypto: arm64/aes-neon - limit exposed routines if faster driver is enabled
      crypto: skcipher - add the ability to abort a skcipher walk
      crypto: arm64/aes-cts-cbc-ce - performance tweak
      crypto: arm64/aes-cts-cbc - move request context data to the stack
      crypto: arm64/aes - implement support for XTS ciphertext stealing
      crypto: arm64/aes-neonbs - implement ciphertext stealing for XTS
      crypto: arm/aes-ce - implement ciphertext stealing for XTS
      crypto: arm/aes-neonbs - implement ciphertext stealing for XTS
      crypto: arm/aes-ce - implement ciphertext stealing for CBC
      crypto: x86/aes-ni - use AES library instead of single-use AES cipher

Arnd Bergmann (3):
      crypto: ccp - Reduce maximum stack usage
      crypto: aegis - fix badly optimized clang output
      crypto: jitterentropy - build without sanitizer

Bjorn Helgaas (2):
      crypto: ccp - Include DMA declarations explicitly
      crypto: ccp - Remove unnecessary linux/pci.h include

Christophe JAILLET (1):
      crypto: picoxcell - Fix the name of the module in the description of CRYPTO_DEV_PICOXCELL

Chuhong Yuan (4):
      crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
      crypto: atmel-sha204a - Use device-managed registration API
      hwrng: drivers - Use device-managed registration API
      crypto: cryptd - Use refcount_t for refcount

Colin Ian King (1):
      crypto: ccree - fix spelling mistake "configration" -> "configuration"

Daniel Jordan (11):
      padata: purge get_cpu and reorder_via_wq from padata_do_serial
      padata: initialize pd->cpu with effective cpumask
      padata: allocate workqueue internally
      workqueue: unconfine alloc/apply/free_workqueue_attrs()
      workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
      padata: make padata_do_parallel find alternate callback CPU
      crypto: pcrypt - remove padata cpumask notifier
      padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
      padata: use separate workqueues for parallel and serial work
      padata: unbind parallel jobs from specific CPUs
      padata: remove cpu_index from the parallel_queue

Daniel Mack (1):
      hwrng: timeriomem - relax check on memory resource size

Denis Efremov (1):
      MAINTAINERS: nx crypto: Fix typo in a filepath

Eric Biggers (1):
      crypto: ghash - add comment and improve help text

Fuqian Huang (1):
      crypto: drivers - Use kmemdup rather than duplicating its implementation

Gary R Hook (2):
      crypto: ccp - Log an error message when ccp-crypto fails to load
      crypto: ccp - Clean up and exit correctly on allocation failure

Gilad Ben-Yossef (6):
      crypto: ccree - drop legacy ivgen support
      crypto: ccree - account for TEE not ready to report
      crypto: fips - add FIPS test failure notification chain
      crypto: ccree - notify TEE on FIPS tests errors
      crypto: ccree - use the full crypt length value
      crypto: ccree - use std api sg_zero_buffer

Gustavo A. R. Silva (1):
      crypto: ux500/crypt - Mark expected switch fall-throughs

Hannah Pan (1):
      crypto: testmgr - add tests for lzo-rle

Hans de Goede (17):
      crypto: sha256 - Fix some coding style issues
      crypto: sha256_generic - Fix some coding style issues
      crypto: sha256 - Move lib/sha256.c to lib/crypto
      crypto: sha256 - Use get/put_unaligned_be32 to get input, memzero_explicit
      crypto: sha256 - Make lib/crypto/sha256.c suitable for generic use
      crypto: sha256 - Add sha224 support to sha256 library code
      crypto: sha256_generic - Switch to the generic lib/crypto/sha256.c lib code
      crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c
      crypto: arm - Rename functions to avoid conflict with crypto/sha256.h
      crypto: arm64 - Rename functions to avoid conflict with crypto/sha256.h
      crypto: s390 - Rename functions to avoid conflict with crypto/sha256.h
      crypto: x86 - Rename functions to avoid conflict with crypto/sha256.h
      crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
      crypto: chelsio - Rename arrays to avoid conflict with crypto/sha256.h
      crypto: n2 - Rename arrays to avoid conflict with crypto/sha256.h
      crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
      crypto: sha256 - Remove sha256/224_init code duplication

Herbert Xu (9):
      crypto: Remove orphan tools/crypto directory
      padata: Replace delayed timer with immediate workqueue in padata_reorder
      Revert "crypto: aegis128 - add support for SIMD acceleration"
      asm-generic: Remove redundant arch-specific rules for simd.h
      crypto: hisilicon - Fix warning on printing %p with dma_addr_t
      crypto: talitos - Fix build warning in aead_des3_setkey
      crypto: skcipher - Unmap pages after an external error
      crypto: ux500 - Fix COMPILE_TEST warnings
      crypto: caam - Cast to long first before pointer conversion

Hook, Gary (5):
      crypto: ccp - Make CCP debugfs support optional
      crypto: ccp - Add a module parameter to specify a queue count
      crypto: ccp - module parameter to limit the number of enabled CCPs
      crypto: ccp - Add a module parameter to control registration for DMA
      crypto: ccp - Include the module name in system log messages

Horia Geantă (8):
      crypto: caam - defer probing until QMan is available
      crypto: caam - fix concurrency issue in givencrypt descriptor
      crypto: caam/qi - fix error handling in ERN handler
      crypto: caam - fix return code in completion callbacks
      crypto: caam - update IV only when crypto operation succeeds
      crypto: caam - keep both virtual and dma key addresses
      crypto: caam - fix MDHA key derivation for certain user key lengths
      crypto: caam/qi - execute library only on DPAA 1.x

Iuliana Prodan (15):
      crypto: ccree - check assoclen for rfc4543
      crypto: bcm - check assoclen for rfc4543/rfc4106
      crypto: gcm - helper functions for assoclen/authsize check
      crypto: aes - helper function to validate key length for AES algorithms
      crypto: caam - check key length
      crypto: caam - check authsize
      crypto: caam - check assoclen
      crypto: caam - check zero-length input
      crypto: caam - update rfc4106 sh desc to support zero length input
      crypto: caam - free resources in case caam_rng registration failed
      crypto: caam - execute module exit point only if necessary
      crypto: caam - unregister algorithm only if the registration succeeded
      crypto: caam - change return value in case CAAM has no MDHA
      crypto: gcm - restrict assoclen for rfc4543
      crypto: caam/qi - use print_hex_dump_debug function to print debug messages

Jonathan Neuschäfer (1):
      Documentation: crypto: crypto_engine: Fix Sphinx warning

Mao Wenan (1):
      crypto: hisilicon - select CRYPTO_LIB_DES while compiling SEC driver

Masahiro Yamada (3):
      crypto: add header include guards
      crypto: user - fix potential warnings in cryptouser.h
      hwrng: timeriomem - add include guard to timeriomem-rng.h

Nathan Chancellor (1):
      lib/mpi: Eliminate unused umul_ppmm definitions for MIPS

Nishka Dasgupta (1):
      crypto: nx - Add of_node_put() before return in 842

Ondrej Mosnacek (1):
      crypto: user - make NETLINK_CRYPTO work inside netns

Pascal van Leeuwen (36):
      crypto: inside-secure - keep ivsize for DES ECB modes at 0
      crypto: inside-secure - silently return -EINVAL for input error cases
      crypto: inside-secure - fix incorrect skcipher output IV
      crypto: inside-secure - fix scatter/gather list to descriptor conversion
      crypto: inside-secure - fix EINVAL error (buf overflow) for AEAD decrypt
      crypto: inside-secure: back out parts of earlier HMAC update workaround
      crypto: inside-secure - let HW deal with initial hash digest
      crypto: inside-secure - add support for arbitrary size hash/HMAC updates
      crypto: inside-secure - add support for 0 length HMAC messages
      crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
      crypto: inside-secure - added support for rfc3686(ctr(aes))
      crypto: inside-secure - add support for authenc(hmac(sha*),rfc3686(ctr(aes))) suites
      crypto: inside-secure -reduce hash byte counters to 64 bits
      crypto: inside-secure - Use defines instead of some constants (cosmetic)
      crypto: inside-secure - Remove redundant DES ECB & CBC keysize check
      crypto: aead - Do not allow authsize=0 if auth. alg has digestsize>0
      crypto: inside-secure - make driver selectable for non-Marvell hardware
      crypto: inside-secure - Remove redundant algo to engine mapping code
      crypto: inside-secure - add support for PCI based FPGA development board
      crypto: inside-secure - add support for using the EIP197 without vendor firmware
      crypto: inside-secure - Move static cipher alg & mode settings to init
      crypto: inside-secure - Add support for the AES-XTS algorithm
      crypto: inside-secure - Only enable algorithms advertised by the hardware
      crypto: inside-secure - Made .cra_priority value a define
      crypto: inside-secure - Minor optimization recognizing CTR is always AES
      crypto: inside-secure - Minor code cleanup and optimizations
      crypto: inside-secure - Added support for basic AES-GCM
      crypto: inside-secure - Added AES-CFB support
      crypto: inside-secure - Added AES-OFB support
      crypto: inside-secure - Added support for basic AES-CCM
      crypto: inside-secure - Add EIP97/EIP197 and endianness detection
      crypto: inside-secure: Corrected configuration of EIP96_TOKEN_CTRL
      crypto: inside-secure - Enable extended algorithms on newer HW
      crypto: inside-secure - Base CD fetchcount on actual CD FIFO size
      crypto: inside-secure - Base RD fetchcount on actual RD FIFO size
      crypto: inside-secure - Probe transform record cache RAM sizes

Peter Zijlstra (1):
      crypto: engine - Reduce default RT priority

Phani Kiran Hemadri (3):
      crypto: cavium/nitrox - Add support for loading asymmetric crypto firmware
      crypto: cavium/nitrox - Allocate asymmetric crypto command queues
      crypto: cavium/nitrox - Configure asymmetric queue manager Hardware unit

Ryder Lee (4):
      crypto: mediatek - move mtk_aes_find_dev() to the right place
      crypto: mediatek - fix uninitialized value of gctx->textlen
      crypto: mediatek - only treat EBUSY as transient if backlog
      crypto: mediatek - add support to OFB/CFB mode

Sebastian Andrzej Siewior (1):
      crypto: ux500 - Use spinlock_t instead of struct spinlock

Stephen Boyd (4):
      crypto: drivers - Remove dev_err() usage after platform_get_irq()
      hwrng: core - Freeze khwrng thread during suspend
      random: Support freezable kthreads in add_hwgenerator_randomness()
      random: Use wait_event_freezable() in add_hwgenerator_randomness()

Stephen Rothwell (1):
      hwrng: n2-drv - fix typo

Thomas Gleixner (1):
      crypto: api - Remove redundant #ifdef in crypto_yield()

Uri Shir (1):
      crypto: ccree - enable CTS support in AES-XTS

Vakul Garg (2):
      crypto: caam/qi2 - Increase napi budget to process more caam responses
      crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

Vic Wu (1):
      crypto: mediatek - fix incorrect crypto key setting

Wei Yongjun (1):
      crypto: cavium/zip - Add missing single_release()

YueHaibing (17):
      crypto: artpec6 - use devm_platform_ioremap_resource() to simplify code
      crypto: ccp - use devm_platform_ioremap_resource() to simplify code
      crypto: exynos - use devm_platform_ioremap_resource() to simplify code
      crypto: img-hash - use devm_platform_ioremap_resource() to simplify code
      crypto: inside-secure - use devm_platform_ioremap_resource() to simplify code
      crypto: mediatek - use devm_platform_ioremap_resource() to simplify code
      crypto: picoxcell - use devm_platform_ioremap_resource() to simplify code
      crypto: sunxi-ss - use devm_platform_ioremap_resource() to simplify code
      crypto: rockchip - use devm_platform_ioremap_resource() to simplify code
      crypto: stm32 - use devm_platform_ioremap_resource() to simplify code
      crypto: qce - use devm_platform_ioremap_resource() to simplify code
      crypto: qcom-rng - use devm_platform_ioremap_resource() to simplify code
      crypto: aes-generic - remove unused variable 'rco_tab'
      crypto: streebog - remove two unused variables
      crypto: aegis128 - Fix -Wunused-const-variable warning
      crypto: atmel - Fix -Wunused-const-variable warning
      crypto: nx - remove unused variables 'nx_driver_string' and 'nx_driver_version'

Zhou Wang (12):
      crypto: hisilicon - add queue management driver for HiSilicon QM module
      crypto: hisilicon - add hardware SGL support
      crypto: hisilicon - add HiSilicon ZIP accelerator support
      crypto: hisilicon - add SRIOV support for ZIP
      Documentation: Add debugfs doc for hisi_zip
      crypto: hisilicon - add debugfs for ZIP and QM
      MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
      crypto: hisilicon - fix kbuild warnings
      crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
      crypto: hisilicon - init curr_sgl_dma to fix compile warning
      crypto: hisilicon - add missing single_release
      crypto: hisilicon - fix error handle in hisi_zip_create_req_q

zhong jiang (2):
      crypto: arm64/aes - Use PTR_ERR_OR_ZERO rather than its implementation.
      crypto: marvell - Use kzfree rather than its implementation

 Documentation/ABI/testing/debugfs-hisi-zip         |   50 +
 Documentation/crypto/crypto_engine.rst             |    1 +
 .../devicetree/bindings/rng/timeriomem_rng.txt     |    2 +-
 Documentation/padata.txt                           |   12 +-
 MAINTAINERS                                        |   13 +-
 arch/arm/crypto/Kconfig                            |    2 +-
 arch/arm/crypto/aes-ce-core.S                      |  482 +-
 arch/arm/crypto/aes-ce-glue.c                      |  545 +-
 arch/arm/crypto/aes-cipher-core.S                  |   40 +-
 arch/arm/crypto/aes-cipher-glue.c                  |   11 +-
 arch/arm/crypto/aes-neonbs-core.S                  |   24 +-
 arch/arm/crypto/aes-neonbs-glue.c                  |  160 +-
 arch/arm/crypto/ghash-ce-glue.c                    |   80 +-
 arch/arm/crypto/sha256_glue.c                      |    8 +-
 arch/arm/crypto/sha256_neon_glue.c                 |   24 +-
 arch/arm/include/asm/Kbuild                        |    1 -
 arch/arm64/boot/dts/freescale/imx8mq.dtsi          |   30 +
 arch/arm64/crypto/Kconfig                          |   10 +-
 arch/arm64/crypto/aes-ce-ccm-glue.c                |   18 +-
 arch/arm64/crypto/aes-ce-glue.c                    |    7 +-
 arch/arm64/crypto/aes-ce.S                         |    3 +
 arch/arm64/crypto/aes-cipher-core.S                |   40 +-
 arch/arm64/crypto/aes-cipher-glue.c                |   11 +-
 arch/arm64/crypto/aes-ctr-fallback.h               |   50 -
 arch/arm64/crypto/aes-glue.c                       |  470 +-
 arch/arm64/crypto/aes-modes.S                      |  135 +-
 arch/arm64/crypto/aes-neon.S                       |   79 +-
 arch/arm64/crypto/aes-neonbs-core.S                |    9 +-
 arch/arm64/crypto/aes-neonbs-glue.c                |  140 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |   30 +-
 arch/arm64/crypto/sha256-glue.c                    |   24 +-
 arch/powerpc/include/asm/Kbuild                    |    1 -
 arch/s390/crypto/aes_s390.c                        |   16 +-
 arch/s390/crypto/des_s390.c                        |   25 +-
 arch/s390/crypto/ghash_s390.c                      |    2 +-
 arch/s390/crypto/sha256_s390.c                     |    8 +-
 arch/s390/purgatory/Makefile                       |    4 +-
 arch/s390/purgatory/purgatory.c                    |    2 +-
 arch/sparc/crypto/aes_glue.c                       |    8 +-
 arch/sparc/crypto/des_glue.c                       |   37 +-
 arch/x86/crypto/Makefile                           |   21 -
 arch/x86/crypto/aegis128l-aesni-asm.S              |  823 ---
 arch/x86/crypto/aegis128l-aesni-glue.c             |  293 --
 arch/x86/crypto/aegis256-aesni-asm.S               |  700 ---
 arch/x86/crypto/aegis256-aesni-glue.c              |  293 --
 arch/x86/crypto/aes-i586-asm_32.S                  |  362 --
 arch/x86/crypto/aes-x86_64-asm_64.S                |  185 -
 arch/x86/crypto/aes_glue.c                         |   70 -
 arch/x86/crypto/aesni-intel_glue.c                 |   46 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |    4 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |    4 +-
 arch/x86/crypto/cast6_avx_glue.c                   |    4 +-
 arch/x86/crypto/des3_ede_glue.c                    |   38 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |    3 +-
 arch/x86/crypto/glue_helper.c                      |   67 +-
 arch/x86/crypto/morus1280-avx2-asm.S               |  619 ---
 arch/x86/crypto/morus1280-avx2-glue.c              |   62 -
 arch/x86/crypto/morus1280-sse2-asm.S               |  893 ----
 arch/x86/crypto/morus1280-sse2-glue.c              |   61 -
 arch/x86/crypto/morus1280_glue.c                   |  205 -
 arch/x86/crypto/morus640-sse2-asm.S                |  612 ---
 arch/x86/crypto/morus640-sse2-glue.c               |   61 -
 arch/x86/crypto/morus640_glue.c                    |  200 -
 arch/x86/crypto/serpent_avx2_glue.c                |    4 +-
 arch/x86/crypto/serpent_avx_glue.c                 |    4 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |   12 +-
 arch/x86/crypto/twofish_avx_glue.c                 |    4 +-
 arch/x86/include/asm/crypto/aes.h                  |   12 -
 arch/x86/include/asm/crypto/glue_helper.h          |    2 +-
 arch/x86/purgatory/Makefile                        |    4 +-
 arch/x86/purgatory/purgatory.c                     |    2 +-
 crypto/Kconfig                                     |  164 +-
 crypto/Makefile                                    |   26 +-
 crypto/aead.c                                      |    3 +-
 crypto/aegis.h                                     |   39 +-
 crypto/{aegis128.c => aegis128-core.c}             |   74 +-
 crypto/aegis128-neon-inner.c                       |  212 +
 crypto/aegis128-neon.c                             |   49 +
 crypto/aegis128l.c                                 |  522 --
 crypto/aegis256.c                                  |  473 --
 crypto/aes_generic.c                               |  169 +-
 crypto/aes_ti.c                                    |  313 +-
 crypto/cryptd.c                                    |   44 +-
 crypto/crypto_engine.c                             |    2 +-
 crypto/crypto_user_base.c                          |   37 +-
 crypto/crypto_user_stat.c                          |    4 +-
 crypto/des_generic.c                               |  945 +---
 crypto/fips.c                                      |   11 +
 crypto/gcm.c                                       |   47 +-
 crypto/ghash-generic.c                             |   31 +-
 crypto/morus1280.c                                 |  542 --
 crypto/morus640.c                                  |  533 --
 crypto/pcrypt.c                                    |  167 +-
 crypto/sha256_generic.c                            |  224 +-
 crypto/skcipher.c                                  |   42 +-
 crypto/streebog_generic.c                          |   46 -
 crypto/tcrypt.c                                    |   16 +
 crypto/testmgr.c                                   |   52 +-
 crypto/testmgr.h                                   | 5284 ++++++--------------
 crypto/xts.c                                       |  152 +-
 drivers/char/hw_random/atmel-rng.c                 |    3 +-
 drivers/char/hw_random/cavium-rng-vf.c             |   11 +-
 drivers/char/hw_random/core.c                      |    5 +-
 drivers/char/hw_random/exynos-trng.c               |    3 +-
 drivers/char/hw_random/imx-rngc.c                  |    4 +-
 drivers/char/hw_random/mxc-rnga.c                  |    4 +-
 drivers/char/hw_random/n2-drv.c                    |    4 +-
 drivers/char/hw_random/nomadik-rng.c               |    3 +-
 drivers/char/hw_random/omap-rng.c                  |    3 +-
 drivers/char/hw_random/powernv-rng.c               |   10 +-
 drivers/char/hw_random/st-rng.c                    |    4 +-
 drivers/char/hw_random/timeriomem-rng.c            |    4 +-
 drivers/char/hw_random/xgene-rng.c                 |    4 +-
 drivers/char/random.c                              |    4 +-
 drivers/crypto/Kconfig                             |   56 +-
 drivers/crypto/amcc/crypto4xx_alg.c                |   24 +-
 drivers/crypto/atmel-aes.c                         |    1 -
 drivers/crypto/atmel-i2c.c                         |   12 +
 drivers/crypto/atmel-i2c.h                         |   12 -
 drivers/crypto/atmel-sha.c                         |    1 -
 drivers/crypto/atmel-sha204a.c                     |    3 +-
 drivers/crypto/atmel-tdes.c                        |   29 +-
 drivers/crypto/axis/artpec6_crypto.c               |    4 +-
 drivers/crypto/bcm/cipher.c                        |   92 +-
 drivers/crypto/caam/Kconfig                        |    4 +-
 drivers/crypto/caam/Makefile                       |    1 +
 drivers/crypto/caam/caamalg.c                      |  268 +-
 drivers/crypto/caam/caamalg_desc.c                 |   56 +-
 drivers/crypto/caam/caamalg_desc.h                 |    4 +-
 drivers/crypto/caam/caamalg_qi.c                   |  257 +-
 drivers/crypto/caam/caamalg_qi2.c                  |  325 +-
 drivers/crypto/caam/caamalg_qi2.h                  |   31 +-
 drivers/crypto/caam/caamhash.c                     |  116 +-
 drivers/crypto/caam/caamhash_desc.c                |    5 +-
 drivers/crypto/caam/caamhash_desc.h                |    2 +-
 drivers/crypto/caam/caampkc.c                      |   99 +-
 drivers/crypto/caam/caamrng.c                      |   19 +-
 drivers/crypto/caam/compat.h                       |    2 +-
 drivers/crypto/caam/ctrl.c                         |  255 +-
 drivers/crypto/caam/desc_constr.h                  |   81 +-
 drivers/crypto/caam/dpseci-debugfs.c               |   79 +
 drivers/crypto/caam/dpseci-debugfs.h               |   18 +
 drivers/crypto/caam/error.c                        |   64 +-
 drivers/crypto/caam/error.h                        |    2 +-
 drivers/crypto/caam/intern.h                       |   32 +-
 drivers/crypto/caam/jr.c                           |  124 +-
 drivers/crypto/caam/key_gen.c                      |   14 +-
 drivers/crypto/caam/pdb.h                          |   16 +-
 drivers/crypto/caam/pkc_desc.c                     |    8 +-
 drivers/crypto/caam/qi.c                           |   10 +-
 drivers/crypto/caam/qi.h                           |   26 -
 drivers/crypto/caam/regs.h                         |  141 +-
 drivers/crypto/cavium/cpt/cptvf_algs.c             |   26 +-
 drivers/crypto/cavium/nitrox/Kconfig               |    2 +-
 drivers/crypto/cavium/nitrox/nitrox_csr.h          |  235 +-
 drivers/crypto/cavium/nitrox/nitrox_debugfs.c      |    3 +-
 drivers/crypto/cavium/nitrox/nitrox_dev.h          |    8 +-
 drivers/crypto/cavium/nitrox/nitrox_hal.c          |  158 +-
 drivers/crypto/cavium/nitrox/nitrox_hal.h          |    6 +-
 drivers/crypto/cavium/nitrox/nitrox_lib.c          |   66 +-
 drivers/crypto/cavium/nitrox/nitrox_main.c         |  148 +-
 drivers/crypto/cavium/nitrox/nitrox_req.h          |   30 +
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c     |    4 +-
 drivers/crypto/cavium/nitrox/nitrox_sriov.c        |    3 +
 drivers/crypto/cavium/zip/zip_main.c               |    3 +
 drivers/crypto/ccp/Kconfig                         |    9 +
 drivers/crypto/ccp/Makefile                        |    4 +-
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c           |   25 +-
 drivers/crypto/ccp/ccp-crypto-aes-xts.c            |    3 -
 drivers/crypto/ccp/ccp-crypto-des3.c               |    7 +-
 drivers/crypto/ccp/ccp-crypto-main.c               |    4 +-
 drivers/crypto/ccp/ccp-crypto.h                    |    8 +-
 drivers/crypto/ccp/ccp-dev-v3.c                    |    3 +-
 drivers/crypto/ccp/ccp-dev-v5.c                    |   26 +-
 drivers/crypto/ccp/ccp-dev.c                       |   29 +-
 drivers/crypto/ccp/ccp-dev.h                       |    3 +-
 drivers/crypto/ccp/ccp-dmaengine.c                 |   13 +-
 drivers/crypto/ccp/ccp-ops.c                       |   56 +-
 drivers/crypto/ccp/psp-dev.h                       |    1 -
 drivers/crypto/ccp/sp-dev.h                        |    1 -
 drivers/crypto/ccp/sp-platform.c                   |    4 +-
 drivers/crypto/ccree/Makefile                      |    2 +-
 drivers/crypto/ccree/cc_aead.c                     |  129 +-
 drivers/crypto/ccree/cc_aead.h                     |    3 +-
 drivers/crypto/ccree/cc_buffer_mgr.c               |   21 -
 drivers/crypto/ccree/cc_buffer_mgr.h               |    2 -
 drivers/crypto/ccree/cc_cipher.c                   |   31 +-
 drivers/crypto/ccree/cc_driver.c                   |   18 +-
 drivers/crypto/ccree/cc_driver.h                   |   10 -
 drivers/crypto/ccree/cc_fips.c                     |   31 +-
 drivers/crypto/ccree/cc_hash.c                     |  153 +-
 drivers/crypto/ccree/cc_ivgen.c                    |  276 -
 drivers/crypto/ccree/cc_ivgen.h                    |   55 -
 drivers/crypto/ccree/cc_pm.c                       |    2 -
 drivers/crypto/ccree/cc_request_mgr.c              |   47 +-
 drivers/crypto/chelsio/Kconfig                     |    1 +
 drivers/crypto/chelsio/chcr_algo.c                 |   46 +-
 drivers/crypto/chelsio/chcr_algo.h                 |   20 +-
 drivers/crypto/chelsio/chcr_crypto.h               |    1 -
 drivers/crypto/chelsio/chcr_ipsec.c                |   19 +-
 drivers/crypto/chelsio/chtls/chtls_hw.c            |   20 +-
 drivers/crypto/exynos-rng.c                        |    4 +-
 drivers/crypto/hifn_795x.c                         |   32 +-
 drivers/crypto/hisilicon/Kconfig                   |   25 +
 drivers/crypto/hisilicon/Makefile                  |    3 +
 drivers/crypto/hisilicon/qm.c                      | 1913 +++++++
 drivers/crypto/hisilicon/qm.h                      |  215 +
 drivers/crypto/hisilicon/sec/sec_algs.c            |   18 +-
 drivers/crypto/hisilicon/sgl.c                     |  214 +
 drivers/crypto/hisilicon/sgl.h                     |   24 +
 drivers/crypto/hisilicon/zip/Makefile              |    2 +
 drivers/crypto/hisilicon/zip/zip.h                 |   71 +
 drivers/crypto/hisilicon/zip/zip_crypto.c          |  653 +++
 drivers/crypto/hisilicon/zip/zip_main.c            | 1013 ++++
 drivers/crypto/img-hash.c                          |    5 +-
 drivers/crypto/inside-secure/safexcel.c            | 1153 ++++-
 drivers/crypto/inside-secure/safexcel.h            |  226 +-
 drivers/crypto/inside-secure/safexcel_cipher.c     | 1532 ++++--
 drivers/crypto/inside-secure/safexcel_hash.c       |  625 +--
 drivers/crypto/inside-secure/safexcel_ring.c       |   11 +-
 drivers/crypto/ixp4xx_crypto.c                     |   27 +-
 drivers/crypto/marvell/cipher.c                    |   27 +-
 drivers/crypto/marvell/hash.c                      |    3 +-
 drivers/crypto/mediatek/mtk-aes.c                  |  143 +-
 drivers/crypto/mediatek/mtk-platform.c             |    7 +-
 drivers/crypto/mediatek/mtk-sha.c                  |    4 +-
 drivers/crypto/mxs-dcp.c                           |    8 +-
 drivers/crypto/n2_core.c                           |   42 +-
 drivers/crypto/nx/nx-842-powernv.c                 |    1 +
 drivers/crypto/nx/nx.h                             |    3 -
 drivers/crypto/omap-aes.c                          |    1 -
 drivers/crypto/omap-des.c                          |   28 +-
 drivers/crypto/omap-sham.c                         |    1 -
 drivers/crypto/padlock-aes.c                       |   10 +-
 drivers/crypto/picoxcell_crypto.c                  |   29 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    2 +-
 drivers/crypto/qce/ablkcipher.c                    |   55 +-
 drivers/crypto/qce/core.c                          |    4 +-
 drivers/crypto/qcom-rng.c                          |    4 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |    4 +-
 drivers/crypto/rockchip/rk3288_crypto.h            |    2 +-
 drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c |   21 +-
 drivers/crypto/s5p-sss.c                           |    7 +-
 drivers/crypto/sahara.c                            |    4 +-
 drivers/crypto/stm32/Kconfig                       |    2 +-
 drivers/crypto/stm32/stm32-crc32.c                 |    4 +-
 drivers/crypto/stm32/stm32-cryp.c                  |   38 +-
 drivers/crypto/stm32/stm32-hash.c                  |    4 +-
 drivers/crypto/sunxi-ss/sun4i-ss-cipher.c          |   26 +-
 drivers/crypto/sunxi-ss/sun4i-ss-core.c            |    4 +-
 drivers/crypto/sunxi-ss/sun4i-ss.h                 |    2 +-
 drivers/crypto/talitos.c                           |   38 +-
 drivers/crypto/ux500/Kconfig                       |    2 +-
 drivers/crypto/ux500/cryp/cryp.c                   |    6 +
 drivers/crypto/ux500/cryp/cryp.h                   |    4 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |   39 +-
 drivers/crypto/ux500/hash/hash_alg.h               |    4 +-
 drivers/crypto/ux500/hash/hash_core.c              |   12 +-
 drivers/crypto/virtio/virtio_crypto_algs.c         |    4 +-
 drivers/crypto/vmx/aes_xts.c                       |    2 +-
 fs/cifs/Kconfig                                    |    2 +-
 fs/cifs/cifsfs.c                                   |    1 -
 fs/cifs/smbencrypt.c                               |   18 +-
 include/asm-generic/Kbuild                         |    2 +
 include/crypto/aes.h                               |   58 +-
 include/crypto/algapi.h                            |    2 -
 include/crypto/ctr.h                               |   50 +
 include/crypto/des.h                               |   77 +-
 include/crypto/gcm.h                               |   55 +
 include/crypto/ghash.h                             |    2 +-
 include/crypto/internal/cryptouser.h               |    7 +-
 include/crypto/internal/des.h                      |  152 +
 include/crypto/internal/skcipher.h                 |    5 +
 include/crypto/morus1280_glue.h                    |   97 -
 include/crypto/morus640_glue.h                     |   97 -
 include/crypto/morus_common.h                      |   18 -
 include/crypto/sha.h                               |   47 +
 include/crypto/sha1_base.h                         |    5 +
 include/crypto/sha256_base.h                       |   29 +-
 include/crypto/sha512_base.h                       |    5 +
 include/crypto/sm3_base.h                          |    5 +
 include/linux/fips.h                               |    7 +
 include/linux/padata.h                             |   29 +-
 include/linux/sha256.h                             |   28 -
 include/linux/timeriomem-rng.h                     |    5 +
 include/linux/workqueue.h                          |    4 +
 include/net/net_namespace.h                        |    3 +
 include/uapi/linux/cryptouser.h                    |    5 +
 kernel/padata.c                                    |  307 +-
 kernel/workqueue.c                                 |   25 +-
 lib/crypto/Makefile                                |    9 +
 lib/crypto/aes.c                                   |  356 ++
 lib/crypto/des.c                                   |  902 ++++
 lib/{ => crypto}/sha256.c                          |  150 +-
 lib/mpi/longlong.h                                 |   36 +-
 net/bluetooth/Kconfig                              |    3 +-
 net/bluetooth/smp.c                                |  103 +-
 tools/crypto/getstat.c                             |  294 --
 298 files changed, 15611 insertions(+), 18397 deletions(-)
 create mode 100644 Documentation/ABI/testing/debugfs-hisi-zip
 delete mode 100644 arch/arm64/crypto/aes-ctr-fallback.h
 delete mode 100644 arch/x86/crypto/aegis128l-aesni-asm.S
 delete mode 100644 arch/x86/crypto/aegis128l-aesni-glue.c
 delete mode 100644 arch/x86/crypto/aegis256-aesni-asm.S
 delete mode 100644 arch/x86/crypto/aegis256-aesni-glue.c
 delete mode 100644 arch/x86/crypto/aes-i586-asm_32.S
 delete mode 100644 arch/x86/crypto/aes-x86_64-asm_64.S
 delete mode 100644 arch/x86/crypto/morus1280-avx2-asm.S
 delete mode 100644 arch/x86/crypto/morus1280-avx2-glue.c
 delete mode 100644 arch/x86/crypto/morus1280-sse2-asm.S
 delete mode 100644 arch/x86/crypto/morus1280-sse2-glue.c
 delete mode 100644 arch/x86/crypto/morus1280_glue.c
 delete mode 100644 arch/x86/crypto/morus640-sse2-asm.S
 delete mode 100644 arch/x86/crypto/morus640-sse2-glue.c
 delete mode 100644 arch/x86/crypto/morus640_glue.c
 delete mode 100644 arch/x86/include/asm/crypto/aes.h
 rename crypto/{aegis128.c => aegis128-core.c} (87%)
 create mode 100644 crypto/aegis128-neon-inner.c
 create mode 100644 crypto/aegis128-neon.c
 delete mode 100644 crypto/aegis128l.c
 delete mode 100644 crypto/aegis256.c
 delete mode 100644 crypto/morus1280.c
 delete mode 100644 crypto/morus640.c
 create mode 100644 drivers/crypto/caam/dpseci-debugfs.c
 create mode 100644 drivers/crypto/caam/dpseci-debugfs.h
 delete mode 100644 drivers/crypto/ccree/cc_ivgen.c
 delete mode 100644 drivers/crypto/ccree/cc_ivgen.h
 create mode 100644 drivers/crypto/hisilicon/qm.c
 create mode 100644 drivers/crypto/hisilicon/qm.h
 create mode 100644 drivers/crypto/hisilicon/sgl.c
 create mode 100644 drivers/crypto/hisilicon/sgl.h
 create mode 100644 drivers/crypto/hisilicon/zip/Makefile
 create mode 100644 drivers/crypto/hisilicon/zip/zip.h
 create mode 100644 drivers/crypto/hisilicon/zip/zip_crypto.c
 create mode 100644 drivers/crypto/hisilicon/zip/zip_main.c
 create mode 100644 include/crypto/internal/des.h
 delete mode 100644 include/crypto/morus1280_glue.h
 delete mode 100644 include/crypto/morus640_glue.h
 delete mode 100644 include/crypto/morus_common.h
 delete mode 100644 include/linux/sha256.h
 create mode 100644 lib/crypto/aes.c
 create mode 100644 lib/crypto/des.c
 rename lib/{ => crypto}/sha256.c (66%)
 delete mode 100644 tools/crypto/getstat.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.4
  2019-09-16  8:49 [GIT PULL] Crypto Update for 5.4 Herbert Xu
@ 2019-09-18 19:55 ` pr-tracker-bot
  2019-09-23  5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
  2019-11-25  3:45 ` [GIT PULL] Crypto Update for 5.5 Herbert Xu
  2 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-09-18 19:55 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 16 Sep 2019 18:49:01 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/8b53c76533aa4356602aea98f98a2f3b4051464c

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.4
  2019-09-16  8:49 [GIT PULL] Crypto Update for 5.4 Herbert Xu
  2019-09-18 19:55 ` pr-tracker-bot
@ 2019-09-23  5:05 ` Herbert Xu
  2019-09-23 16:50   ` pr-tracker-bot
                     ` (2 more replies)
  2019-11-25  3:45 ` [GIT PULL] Crypto Update for 5.5 Herbert Xu
  2 siblings, 3 replies; 52+ messages in thread
From: Herbert Xu @ 2019-09-23  5:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

- Potential boot hang in hwrng.
- Missing switch/break in talitos.
- Bugs and warnings in hisilicon.
- Build warning in inside-secure.

The following changes since commit 9575d1a5c0780ea26ff8dd29c94a32be32ce3c85:

  crypto: caam - Cast to long first before pointer conversion (2019-09-13 21:20:47 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to bf6a7a5ad6fa69e48b735be75eeb90569d9584bb:

  crypto: hisilicon - avoid unused function warning (2019-09-20 23:05:33 +1000)

----------------------------------------------------------------
Arnd Bergmann (1):
      crypto: hisilicon - avoid unused function warning

Gustavo A. R. Silva (1):
      crypto: talitos - fix missing break in switch statement

Laurent Vivier (1):
      hwrng: core - don't wait on add_early_randomness()

Pascal van Leeuwen (1):
      crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n

Yunfeng Ye (3):
      crypto: hisilicon - Fix double free in sec_free_hw_sgl()
      crypto: hisilicon - Matching the dma address for dma_pool_free()
      crypto: hisilicon - Fix return value check in hisi_zip_acompress()

 drivers/char/hw_random/core.c             |  2 +-
 drivers/crypto/hisilicon/sec/sec_algs.c   | 43 ++++++++++++++-----------------
 drivers/crypto/hisilicon/zip/zip_crypto.c |  4 +--
 drivers/crypto/hisilicon/zip/zip_main.c   |  7 ++---
 drivers/crypto/inside-secure/safexcel.c   | 40 ++++++++++++++++++++--------
 drivers/crypto/talitos.c                  |  1 +
 6 files changed, 54 insertions(+), 43 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.4
  2019-09-23  5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2019-09-23 16:50   ` pr-tracker-bot
  2019-10-10 12:38   ` Herbert Xu
  2019-12-02  6:20   ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
  2 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-09-23 16:50 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 23 Sep 2019 15:05:15 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3c6a6910a81eae3566bb5fef6ea0f624382595e6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.4
  2019-09-23  5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
  2019-09-23 16:50   ` pr-tracker-bot
@ 2019-10-10 12:38   ` Herbert Xu
  2019-10-10 15:45     ` pr-tracker-bot
  2019-11-17  1:00     ` Herbert Xu
  2019-12-02  6:20   ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
  2 siblings, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2019-10-10 12:38 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes build issues in arm/aes-ce.

The following changes since commit bf6a7a5ad6fa69e48b735be75eeb90569d9584bb:

  crypto: hisilicon - avoid unused function warning (2019-09-20 23:05:33 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to f703964fc66804e6049f2670fc11045aa8359b1a:

  crypto: arm/aes-ce - add dependency on AES library (2019-10-01 23:06:43 +1000)

----------------------------------------------------------------
Ard Biesheuvel (2):
      crypto: arm/aes-ce - build for v8 architecture explicitly
      crypto: arm/aes-ce - add dependency on AES library

 arch/arm/crypto/Kconfig       | 1 +
 arch/arm/crypto/aes-ce-core.S | 1 +
 2 files changed, 2 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.4
  2019-10-10 12:38   ` Herbert Xu
@ 2019-10-10 15:45     ` pr-tracker-bot
  2019-11-17  1:00     ` Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-10-10 15:45 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 10 Oct 2019 23:38:49 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/fb20da6af705597cefcf05fc99e48d5c066dbdff

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.4
  2019-10-10 12:38   ` Herbert Xu
  2019-10-10 15:45     ` pr-tracker-bot
@ 2019-11-17  1:00     ` Herbert Xu
  2019-11-17  2:35       ` pr-tracker-bot
  1 sibling, 1 reply; 52+ messages in thread
From: Herbert Xu @ 2019-11-17  1:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push reverts a number of changes to the khwrng thread which
feeds the kernel random number pool from hwrng drivers.  They
were trying to fix issues with suspend-and-resume but ended up
causing regressions.

The following changes since commit f703964fc66804e6049f2670fc11045aa8359b1a:

  crypto: arm/aes-ce - add dependency on AES library (2019-10-01 23:06:43 +1000)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 08e97aec700aeff54c4847f170e566cbd7e14e81:

  Revert "hwrng: core - Freeze khwrng thread during suspend" (2019-11-17 08:48:17 +0800)

----------------------------------------------------------------
Herbert Xu (1):
      Revert "hwrng: core - Freeze khwrng thread during suspend"

 drivers/char/hw_random/core.c | 5 +----
 drivers/char/random.c         | 4 +---
 2 files changed, 2 insertions(+), 7 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.4
  2019-11-17  1:00     ` Herbert Xu
@ 2019-11-17  2:35       ` pr-tracker-bot
  0 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-11-17  2:35 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sun, 17 Nov 2019 09:00:36 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/1d4c79ed324ad780cfc3ad38364ba1fd585dd2a8

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Update for 5.5
  2019-09-16  8:49 [GIT PULL] Crypto Update for 5.4 Herbert Xu
  2019-09-18 19:55 ` pr-tracker-bot
  2019-09-23  5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2019-11-25  3:45 ` Herbert Xu
  2019-11-26  4:25   ` pr-tracker-bot
  2020-01-28  5:03   ` [GIT PULL] Crypto Update for 5.6 Herbert Xu
  2 siblings, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2019-11-25  3:45 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Add library interfaces of certain crypto algorithms for WireGuard.
- Remove the obsolete ablkcipher and blkcipher interfaces.
- Move add_early_randomness() out of rng_mutex.

Algorithms:

- Add blake2b shash algorithm.
- Add blake2s shash algorithm.
- Add curve25519 kpp algorithm.
- Implement 4 way interleave in arm64/gcm-ce.
- Implement ciphertext stealing in powerpc/spe-xts.
- Add Eric Biggers's scalar accelerated ChaCha code for ARM.
- Add accelerated 32r2 code from Zinc for MIPS.
- Add OpenSSL/CRYPTOGRAMS poly1305 implementation for ARM and MIPS.
 
Drivers:
 
- Fix entropy reading failures in ks-sa.
- Add support for sam9x60 in atmel.
- Add crypto accelerator for amlogic GXL.
- Add sun8i-ce Crypto Engine.
- Add sun8i-ss cryptographic offloader.
- Add a host of algorithms to inside-secure.
- Add NPCM RNG driver.
- add HiSilicon HPRE accelerator.
- Add HiSilicon TRNG driver.

Please note that there is a conflict with mainline due to the
modification of arch/arm/crypto/Kconfig by the crypto tree for
v5.4.  The resolution should be fairly trivial though.

The following changes since commit 54ecb8f7028c5eb3d740bb82b0f1d90f2df63c5c:

  Linux 5.4-rc1 (2019-09-30 10:35:40 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git 

for you to fetch changes up to 4ee812f6143d78d8ba1399671d78c8d78bf2817c:

  crypto: vmx - Avoid weird build failures (2019-11-22 18:48:39 +0800)

----------------------------------------------------------------
Alexander E. Patrakov (1):
      crypto: jitter - fix comments

Alexander Sverdlin (1):
      hwrng: ks-sa - Add minimum sleep time before ready-polling

Andrey Smirnov (6):
      crypto: caam - use devres to unmap memory
      crypto: caam - use devres to remove debugfs
      crypto: caam - use devres to de-initialize the RNG
      crypto: caam - use devres to de-initialize QI
      crypto: caam - use devres to populate platform devices
      crypto: caam - populate platform devices last

Ard Biesheuvel (66):
      crypto: testmgr - add another gcm(aes) testcase
      crypto: arm64/gcm-ce - implement 4 way interleave
      crypto: aegis128-neon - use Clang compatible cflags for ARM
      crypto: aegis128/simd - build 32-bit ARM for v8 architecture explicitly
      crypto: geode-aes - switch to skcipher for cbc(aes) fallback
      crypto: arm - use Kconfig based compiler checks for crypto opcodes
      crypto: aegis128 - avoid function pointers for parameterization
      crypto: aegis128 - duplicate init() and final() hooks in SIMD code
      crypto: powerpc/spe-xts - implement support for ciphertext stealing
      crypto: ecdh - fix big endian bug in ECC library
      crypto: lib - tidy up lib/crypto Kconfig and Makefile
      crypto: chacha - move existing library code into lib/crypto
      crypto: x86/chacha - depend on generic chacha library instead of crypto driver
      crypto: x86/chacha - expose SIMD ChaCha routine as library function
      crypto: arm64/chacha - depend on generic chacha library instead of crypto driver
      crypto: arm64/chacha - expose arm64 ChaCha routine as library function
      crypto: arm/chacha - import Eric Biggers's scalar accelerated ChaCha code
      crypto: arm/chacha - remove dependency on generic ChaCha driver
      crypto: arm/chacha - expose ARM ChaCha routine as library function
      crypto: mips/chacha - wire up accelerated 32r2 code from Zinc
      crypto: chacha - unexport chacha_generic routines
      crypto: poly1305 - move core routines into a separate library
      crypto: x86/poly1305 - unify Poly1305 state struct with generic code
      crypto: poly1305 - expose init/update/final library interface
      crypto: x86/poly1305 - depend on generic library not generic shash
      crypto: x86/poly1305 - expose existing driver as poly1305 library
      crypto: arm64/poly1305 - incorporate OpenSSL/CRYPTOGAMS NEON implementation
      crypto: arm/poly1305 - incorporate OpenSSL/CRYPTOGAMS NEON implementation
      crypto: mips/poly1305 - incorporate OpenSSL/CRYPTOGAMS optimized implementation
      int128: move __uint128_t compiler test to Kconfig
      crypto: testmgr - add test cases for Blake2s
      crypto: blake2s - implement generic shash driver
      crypto: curve25519 - add kpp selftest
      crypto: curve25519 - implement generic KPP driver
      crypto: lib/curve25519 - work around Clang stack spilling issue
      crypto: chacha20poly1305 - import construction and selftest from Zinc
      crypto: lib/chacha20poly1305 - reimplement crypt_from_sg() routine
      crypto: virtio - implement missing support for output IVs
      crypto: virtio - deal with unsupported input sizes
      crypto: virtio - switch to skcipher API
      crypto: ccp - switch from ablkcipher to skcipher
      crypto: omap - switch to skcipher API
      crypto: ux500 - switch to skcipher API
      crypto: s5p - switch to skcipher API
      crypto: atmel-aes - switch to skcipher API
      crypto: atmel-tdes - switch to skcipher API
      crypto: bcm-spu - switch to skcipher API
      crypto: nitrox - remove cra_type reference to ablkcipher
      crypto: cavium/cpt - switch to skcipher API
      crypto: chelsio - switch to skcipher API
      crypto: hifn - switch to skcipher API
      crypto: ixp4xx - switch to skcipher API
      crypto: mxs - switch to skcipher API
      crypto: mediatek - switch to skcipher API
      crypto: sahara - switch to skcipher API
      crypto: picoxcell - switch to skcipher API
      crypto: qce - switch to skcipher API
      crypto: stm32 - switch to skcipher API
      crypto: niagara2 - switch to skcipher API
      crypto: rockchip - switch to skcipher API
      crypto: talitos - switch to skcipher API
      crypto: qat - switch to skcipher API
      crypto: marvell/cesa - rename blkcipher to skcipher
      crypto: nx - remove stale comment referring to the blkcipher walk API
      crypto: ablkcipher - remove deprecated and unused ablkcipher support
      crypto: ccree - update a stale reference to ablkcipher

Arnd Bergmann (4):
      crypto: hisilicon - allow compile-testing on x86
      crypto: inside-secure - Fix a maybe-uninitialized warning
      crypto: inside-secure - Remove #ifdef checks
      hwrng: omap3-rom - Fix unused function warnings

Ashish Kalra (1):
      crypto: ccp - Retry SEV INIT command in case of integrity check failure.

Ayush Sawal (1):
      crypto: af_alg - cast ki_complete ternary op to int

Ben Dooks (2):
      crypto: jitter - add header to fix buildwarnings
      hwrng: ka-sa - fix __iomem on registers

Ben Dooks (Codethink) (1):
      crypto: atmel - fix data types for __be{32,64}

Brijesh Singh (1):
      crypto: ccp - add SEV command privilege separation

Chen Wandun (1):
      crypto: essiv - remove redundant null pointer check before kfree

Christian Lamparter (2):
      crypto: amcc - restore CRYPTO_AES dependency
      crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr

Christophe JAILLET (1):
      crypto: chtls - simplify a bit 'create_flowc_wr_skb()'

Christophe Leroy (1):
      crypto: talitos - fix hash result for VMAP_STACK

Chuhong Yuan (1):
      crypto: inside-secure - Add missed clk_disable_unprepare

Codrin Ciubotariu (2):
      dt-bindings: rng: atmel-trng: add new compatible
      hwrng: atmel - add new platform support for sam9x60

Colin Ian King (4):
      crypto: inside-secure - fix spelling mistake "algorithmn" -> "algorithm"
      crypto: mediatek - remove redundant bitwise-or
      crypto: amlogic - ensure error variable err is set before returning it
      crypto: allwinner - fix some spelling mistakes

Corentin Labbe (20):
      crypto: sun4i-ss - simplify enable/disable of the device
      crypto: sun4i-ss - enable pm_runtime
      dt-bindings: crypto: Add DT bindings documentation for amlogic-crypto
      MAINTAINERS: Add myself as maintainer of amlogic crypto
      crypto: amlogic - Add crypto accelerator for amlogic GXL
      crypto: allwinner - Add allwinner subdirectory
      crypto: allwinner - Add sun8i-ce Crypto Engine
      crypto: sun4i-ss - Move to Allwinner directory
      crypto: allwinner - Add sun8i-ss cryptographic offloader
      dt-bindings: crypto: Add DT bindings documentation for sun8i-ss Security System
      crypto: amlogic - fix two resources leak
      MAINTAINERS: add linux-amlogic list for amlogic crypto
      crypto: tcrypt - constify check alg list
      crypto: sun4i-ss - Fix 64-bit size_t warnings on sun4i-ss-hash.c
      crypto: sun4i-ss - remove dependency on not 64BIT
      crypto: sun4i-ss - use crypto_ahash_digestsize
      crypto: sun4i-ss - hide the Invalid keylen message
      crypto: sun4i-ss - fix big endian issues
      crypto: sun8i-ce - enable working on big endian
      crypto: amlogic - enable working on big endian kernel

David Sterba (9):
      crypto: blake2b - add blake2b generic implementation
      crypto: testmgr - add test vectors for blake2b
      crypto: blake2b - merge _final implementation to callback
      crypto: blake2b - merge blake2 init to api callback
      crypto: blake2b - simplify key init
      crypto: blake2b - delete unused structs or members
      crypto: blake2b - open code set last block helper
      crypto: blake2b - merge _update to api callback
      crypto: blake2b - rename tfm context and _setkey callback

Eneas U de Queiroz (1):
      crypto: qce - add CRYPTO_ALG_KERN_DRIVER_ONLY flag

Eric Biggers (24):
      crypto: geode-aes - convert to skcipher API and make thread-safe
      crypto: sparc/aes - convert to skcipher API
      crypto: sparc/camellia - convert to skcipher API
      crypto: sparc/des - convert to skcipher API
      crypto: s390/aes - convert to skcipher API
      crypto: s390/paes - convert to skcipher API
      crypto: s390/des - convert to skcipher API
      crypto: padlock-aes - convert to skcipher API
      crypto: nx - don't abuse blkcipher_desc to pass iv around
      crypto: nx - convert AES-ECB to skcipher API
      crypto: nx - convert AES-CBC to skcipher API
      crypto: nx - convert AES-CTR to skcipher API
      crypto: powerpc - don't unnecessarily use atomic scatterwalk
      crypto: powerpc - don't set ivsize for AES-ECB
      crypto: powerpc - convert SPE AES algorithms to skcipher API
      crypto: skcipher - unify the crypto_has_skcipher*() functions
      crypto: skcipher - remove crypto_has_ablkcipher()
      crypto: skcipher - rename crypto_skcipher_type2 to crypto_skcipher_type
      crypto: skcipher - remove the "blkcipher" algorithm type
      crypto: skcipher - rename the crypto_blkcipher module and kconfig option
      crypto: mips/chacha - select CRYPTO_SKCIPHER, not CRYPTO_BLKCIPHER
      crypto: chacha_generic - remove unnecessary setkey() functions
      crypto: x86/chacha - only unregister algorithms if registered
      crypto: lib/chacha20poly1305 - use chacha20_crypt()

Geert Uytterhoeven (1):
      crypto: nx - Improve debugfs_create_u{32,64}() handling for atomics

Greg Kroah-Hartman (1):
      crypto: hisilicon - no need to check return value of debugfs_create functions

Hao Fang (1):
      crypto: hisilicon - add vfs_num module param for zip

Herbert Xu (7):
      crypto: algif_skcipher - Use chunksize instead of blocksize
      crypto: atmel - Fix authenc support when it is set to m
      crypto: atmel - Fix remaining endianess warnings
      crypto: api - Add softdep on cryptomgr
      crypto: aead - Split out geniv into its own module
      crypto: sun4i-ss - Fix 64-bit size_t warnings
      hwrng: ks-sa - Enable COMPILE_TEST

Hook, Gary (2):
      crypto: ccp - Change a message to reflect status instead of failure
      crypto: ccp - Verify access to device registers before initializing

Iuliana Prodan (1):
      crypto: caam - use mapped_{src,dst}_nents for descriptor

Jason A. Donenfeld (7):
      crypto: mips/chacha - import 32r2 ChaCha code from Zinc
      crypto: blake2s - generic C library implementation and selftest
      crypto: blake2s - x86_64 SIMD implementation
      crypto: curve25519 - generic C library implementations
      crypto: curve25519 - x86_64 library and KPP implementations
      crypto: arm/curve25519 - import Bernstein and Schwabe's Curve25519 ARM implementation
      crypto: arm/curve25519 - wire up NEON implementation

Laurent Vivier (2):
      hwrng: core - move add_early_randomness() out of rng_mutex
      hwrng: core - Fix use-after-free warning in hwrng_register()

Longfang Liu (1):
      Documentation: add DebugFS doc for HiSilicon SEC

Mark Salter (1):
      crypto: ccp - fix uninitialized list head

Markus Elfring (2):
      hwrng: iproc-rng200 - Use devm_platform_ioremap_resource() in iproc_rng200_probe()
      hwrng: mediatek - Use devm_platform_ioremap_resource() in mtk_rng_probe()

Michael Ellerman (1):
      crypto: vmx - Avoid weird build failures

Nagadheeraj Rottela (3):
      crypto: cavium/nitrox - check assoclen and authsize for gcm(aes) cipher
      crypto: cavium/nitrox - Fix cbc ciphers self test failures
      crypto: cavium/nitrox - Add mailbox message to get mcode info in VF

Navid Emamdoost (3):
      crypto: ccp - Release all allocated memory if sha type is invalid
      crypto: user - fix memory leak in crypto_report
      crypto: user - fix memory leak in crypto_reportstat

Pascal van Leeuwen (37):
      crypto: inside-secure - Added support for CRC32
      crypto: inside-secure - Added support for the AES CBCMAC ahash
      crypto: inside-secure - Added support for the AES XCBC ahash
      crypto: inside-secure - Added support for the AES-CMAC ahash
      crypto: inside-secure - Added support for the CHACHA20 skcipher
      crypto: inside-secure - Add support for the Chacha20-Poly1305 AEAD
      crypto: inside-secure - Add CRYPTO_CHACHA20POLY1305 to CRYPTO_DEV_SAFEXCEL
      crypto: inside-secure - Added support for basic SM3 ahash
      crypto: inside-secure - Added support for HMAC-SM3 ahash
      crypto: testmgr - Added testvectors for the hmac(sm3) ahash
      crypto: inside-secure - Add support for the ecb(sm4) skcipher
      crypto: inside-secure - Add support for the cbc(sm4) skcipher
      crypto: inside-secure - Add support for the ofb(sm4) skcipher
      crypto: testmgr - Added testvectors for the ofb(sm4) & cfb(sm4) skciphers
      crypto: inside-secure - Add support for the cfb(sm4) skcipher
      crypto: inside-secure - Add support for the rfc3685(ctr(sm4)) skcipher
      crypto: testmgr - Added testvectors for the rfc3686(ctr(sm4)) skcipher
      crypto: inside-secure - Add SM4 based authenc AEAD ciphersuites
      crypto: inside-secure - Add SHA3 family of basic hash algorithms
      crypto: inside-secure - Add HMAC-SHA3 family of authentication algorithms
      crypto: inside-secure - Add CRYPTO_SHA3 to CRYPTO_DEV_SAFEXCEL
      crypto: inside-secure - Added support for authenc HMAC-SHA1/DES-CBC
      crypto: inside-secure - Added support for authenc HMAC-SHA2/3DES-CBC
      crypto: inside-secure - Added support for authenc HMAC-SHA2/DES-CBC
      crypto: inside-secure - Fix stability issue with Macchiatobin
      crypto: inside-secure - Fixed corner case TRC admin RAM probing issue
      crypto: inside-secure - Added support for the rfc4106(gcm(aes)) AEAD
      crypto: inside-secure - Added support for the rfc4543(gcm(aes)) "AEAD"
      crypto: inside-secure - Added support for the rfc4309(ccm(aes)) AEAD
      crypto: inside-secure - Add support for 256 bit wide internal bus
      crypto: inside-secure - Add support for HW with less ring AIC's than rings
      crypto: inside-secure - Add support for the EIP196
      crypto: inside-secure - Fix build error with CONFIG_CRYPTO_SM3=m
      crypto: inside-secure - Made locally used safexcel_pci_remove() static
      crypto: inside-secure - Fixed warnings on inconsistent byte order handling
      crypto: inside-secure - Fix hangup during probing for EIP97 engine
      crypto: inside-secure - Fixed authenc w/ (3)DES fails on Macchiatobin

Peter Ujfalusi (1):
      crypto: qce/dma - Use dma_request_chan() directly for channel request

Phani Kiran Hemadri (1):
      crypto: cavium/nitrox - fix firmware assignment to AE cores

Rikard Falkeborn (1):
      crypto: hisilicon: Fix misuse of GENMASK macro

Shukun Tan (4):
      crypto: hisilicon - add sgl_sge_nr module param for zip
      crypto: hisilicon - Fix using plain integer as NULL pointer
      crypto: hisilicon - fix param should be static when not external.
      crypto: hisilicon - fix endianness verification problem of QM

Sumit Garg (1):
      hwrng: omap - Fix RNG wait loop timeout

Tian Tao (2):
      crypto: ccree - fix comparison of unsigned expression warning
      crypto: tgr192 - remove unneeded semicolon

Tomer Maimon (2):
      dt-binding: hwrng: add NPCM RNG documentation
      hwrng: npcm - add NPCM RNG driver

Tony Lindgren (7):
      ARM: OMAP2+: Check omap3-rom-rng for GP device instead of HS device
      hwrng: omap3-rom - Fix missing clock by probing with device tree
      hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled
      hwrng: omap3-rom - Initialize default quality to get data
      hwrng: omap3-rom - Update to use standard driver data
      hwrng: omap3-rom - Use runtime PM instead of custom functions
      hwrng: omap3-rom - Use devm hwrng and runtime PM

Tudor Ambarus (4):
      crypto: atmel-aes - Fix IV handling when req->nbytes < ivsize
      crypto: atmel - Fix selection of CRYPTO_AUTHENC
      crypto: atmel-tdes - Set the IV after {en,de}crypt
      crypto: atmel-aes - Change data type for "lastc" buffer

YueHaibing (17):
      crypto: inside-secure - Use PTR_ERR_OR_ZERO in safexcel_xcbcmac_cra_init()
      hwrng: atmel - use devm_platform_ioremap_resource() to simplify code
      hwrng: bcm2835 - use devm_platform_ioremap_resource() to simplify code
      hwrng: exynos - use devm_platform_ioremap_resource() to simplify code
      hwrng: hisi - use devm_platform_ioremap_resource() to simplify code
      hwrng: ks-sa - use devm_platform_ioremap_resource() to simplify code
      hwrng: meson - use devm_platform_ioremap_resource() to simplify code
      hwrng: npcm - use devm_platform_ioremap_resource() to simplify code
      hwrng: omap - use devm_platform_ioremap_resource() to simplify code
      hwrng: pasemi - use devm_platform_ioremap_resource() to simplify code
      hwrng: pic32 - use devm_platform_ioremap_resource() to simplify code
      hwrng: st - use devm_platform_ioremap_resource() to simplify code
      hwrng: tx4939 - use devm_platform_ioremap_resource() to simplify code
      hwrng: xgene - use devm_platform_ioremap_resource() to simplify code
      crypto: amlogic - Use kmemdup in meson_aes_setkey()
      crypto: sun8i-ce - Fix memdup.cocci warnings
      crypto: atmel - Fix build error of CRYPTO_AUTHENC

Yunfeng Ye (2):
      crypto: chtls - remove the redundant check in chtls_recvmsg()
      crypto: arm64/aes-neonbs - add return value of skcipher_walk_done() in __xts_crypt()

Zaibo Xu (11):
      crypto: hisilicon - add HiSilicon HPRE accelerator
      crypto: hisilicon - add SRIOV support for HPRE
      Documentation: Add debugfs doc for hisi_hpre
      crypto: hisilicon - Add debugfs for HPRE
      MAINTAINERS: Add maintainer for HiSilicon HPRE driver
      hwrng: hisi - add HiSilicon TRNG driver support
      MAINTAINERS: Add maintainer for HiSilicon TRNG V2 driver
      crypto: hisilicon - add HiSilicon SEC V2 driver
      crypto: hisilicon - add SRIOV for HiSilicon SEC
      crypto: hisilicon - add DebugFS for HiSilicon SEC
      MAINTAINERS: Add maintainer for HiSilicon SEC V2 driver

Zhou Wang (8):
      crypto: hisilicon - merge sgl support to hisi_qm module
      crypto: hisilicon - fix large sgl memory allocation problem when disable smmu
      crypto: hisilicon - misc fix about sgl
      crypto: hisilicon - select NEED_SG_DMA_LENGTH in qm Kconfig
      crypto: hisilicon - tiny fix about QM/ZIP error callback print
      crypto: hisilicon - use sgl API to get sgl dma addr and len
      crypto: hisilicon - fix to return sub-optimal device when best device has no qps
      crypto: hisilicon - replace #ifdef with IS_ENABLED for CONFIG_NUMA

kbuild test robot (1):
      crypto: sun8i-ss - fix memdup.cocci warnings

kbuild test robot Remove unneeded semicolon (1):
      crypto: sun8i-ss - fix semicolon.cocci warnings

zhengbin (1):
      crypto: ux500 - Remove set but not used variable 'cookie'

Łukasz Stelmach (1):
      dt-bindings: hwrng: Add Samsung Exynos 5250+ True RNG bindings

 Documentation/ABI/testing/debugfs-hisi-hpre        |   57 +
 Documentation/ABI/testing/debugfs-hisi-sec         |   43 +
 Documentation/crypto/api-skcipher.rst              |   29 +-
 Documentation/crypto/architecture.rst              |    4 -
 Documentation/crypto/crypto_engine.rst             |    4 -
 Documentation/crypto/devel-algos.rst               |   27 +-
 .../bindings/crypto/allwinner,sun8i-ss.yaml        |   60 +
 .../bindings/crypto/amlogic,gxl-crypto.yaml        |   52 +
 .../devicetree/bindings/rng/atmel-trng.txt         |    2 +-
 .../devicetree/bindings/rng/nuvoton,npcm-rng.txt   |   12 +
 .../devicetree/bindings/rng/omap3_rom_rng.txt      |   27 +
 .../bindings/rng/samsung,exynos5250-trng.txt       |   17 +
 MAINTAINERS                                        |   37 +-
 arch/arm/boot/dts/omap3-n900.dts                   |    6 +
 arch/arm/crypto/Kconfig                            |   36 +-
 arch/arm/crypto/Makefile                           |   49 +-
 arch/arm/crypto/aes-ce-core.S                      |    1 +
 arch/arm/crypto/chacha-glue.c                      |  343 +
 arch/arm/crypto/chacha-neon-glue.c                 |  202 -
 arch/arm/crypto/chacha-scalar-core.S               |  460 ++
 arch/arm/crypto/crct10dif-ce-core.S                |    2 +-
 arch/arm/crypto/curve25519-core.S                  | 2062 ++++++
 arch/arm/crypto/curve25519-glue.c                  |  127 +
 arch/arm/crypto/ghash-ce-core.S                    |    1 +
 arch/arm/crypto/poly1305-armv4.pl                  | 1236 ++++
 arch/arm/crypto/poly1305-core.S_shipped            | 1158 +++
 arch/arm/crypto/poly1305-glue.c                    |  276 +
 arch/arm/crypto/sha1-ce-core.S                     |    1 +
 arch/arm/crypto/sha2-ce-core.S                     |    1 +
 arch/arm/mach-omap2/pdata-quirks.c                 |   14 +-
 arch/arm64/Kconfig                                 |    2 +-
 arch/arm64/crypto/Kconfig                          |   17 +-
 arch/arm64/crypto/Makefile                         |   10 +-
 arch/arm64/crypto/aes-neonbs-glue.c                |    2 +-
 arch/arm64/crypto/chacha-neon-glue.c               |   81 +-
 arch/arm64/crypto/ghash-ce-core.S                  |  501 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |  293 +-
 arch/arm64/crypto/poly1305-armv8.pl                |  913 +++
 arch/arm64/crypto/poly1305-core.S_shipped          |  835 +++
 arch/arm64/crypto/poly1305-glue.c                  |  237 +
 arch/mips/Makefile                                 |    2 +-
 arch/mips/crypto/Makefile                          |   18 +
 arch/mips/crypto/chacha-core.S                     |  497 ++
 arch/mips/crypto/chacha-glue.c                     |  150 +
 arch/mips/crypto/poly1305-glue.c                   |  203 +
 arch/mips/crypto/poly1305-mips.pl                  | 1273 ++++
 arch/powerpc/crypto/aes-spe-glue.c                 |  454 +-
 arch/riscv/Kconfig                                 |    2 +-
 arch/s390/crypto/aes_s390.c                        |  609 +-
 arch/s390/crypto/des_s390.c                        |  419 +-
 arch/s390/crypto/paes_s390.c                       |  414 +-
 arch/sparc/crypto/aes_glue.c                       |  310 +-
 arch/sparc/crypto/camellia_glue.c                  |  217 +-
 arch/sparc/crypto/des_glue.c                       |  499 +-
 arch/x86/Kconfig                                   |    2 +-
 arch/x86/crypto/Makefile                           |    3 +
 arch/x86/crypto/blake2s-core.S                     |  258 +
 arch/x86/crypto/blake2s-glue.c                     |  233 +
 arch/x86/crypto/chacha_glue.c                      |  184 +-
 arch/x86/crypto/curve25519-x86_64.c                | 2475 +++++++
 arch/x86/crypto/poly1305_glue.c                    |  199 +-
 crypto/Kconfig                                     |  171 +-
 crypto/Makefile                                    |   11 +-
 crypto/ablkcipher.c                                |  407 --
 crypto/adiantum.c                                  |    5 +-
 crypto/aead.c                                      |  165 +-
 crypto/aegis128-core.c                             |  125 +-
 crypto/aegis128-neon-inner.c                       |   50 +
 crypto/aegis128-neon.c                             |   21 +
 crypto/af_alg.c                                    |    2 +-
 crypto/algapi.c                                    |   26 -
 crypto/algif_skcipher.c                            |    2 +-
 crypto/api.c                                       |    3 +-
 crypto/blake2b_generic.c                           |  320 +
 crypto/blake2s_generic.c                           |  171 +
 crypto/blkcipher.c                                 |  548 --
 crypto/chacha_generic.c                            |   94 +-
 crypto/cryptd.c                                    |    2 +-
 crypto/crypto_engine.c                             |   29 -
 crypto/crypto_user_base.c                          |    4 +-
 crypto/crypto_user_stat.c                          |    8 +-
 crypto/curve25519-generic.c                        |   90 +
 crypto/ecc.c                                       |    5 +-
 crypto/essiv.c                                     |    9 +-
 crypto/geniv.c                                     |  176 +
 crypto/jitterentropy-kcapi.c                       |    8 +-
 crypto/jitterentropy.c                             |   13 +-
 crypto/jitterentropy.h                             |   17 +
 crypto/nhpoly1305.c                                |    3 +-
 crypto/poly1305_generic.c                          |  228 +-
 crypto/skcipher.c                                  |  230 +-
 crypto/tcrypt.c                                    |    4 +-
 crypto/testmgr.c                                   |   82 +
 crypto/testmgr.h                                   | 2124 ++++++
 crypto/tgr192.c                                    |    4 +-
 drivers/char/hw_random/Kconfig                     |   28 +-
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/atmel-rng.c                 |   43 +-
 drivers/char/hw_random/bcm2835-rng.c               |    5 +-
 drivers/char/hw_random/core.c                      |   61 +-
 drivers/char/hw_random/exynos-trng.c               |    4 +-
 drivers/char/hw_random/hisi-rng.c                  |    4 +-
 drivers/char/hw_random/hisi-trng-v2.c              |   99 +
 drivers/char/hw_random/iproc-rng200.c              |    9 +-
 drivers/char/hw_random/ks-sa-rng.c                 |   44 +-
 drivers/char/hw_random/meson-rng.c                 |    4 +-
 drivers/char/hw_random/mtk-rng.c                   |    9 +-
 drivers/char/hw_random/npcm-rng.c                  |  184 +
 drivers/char/hw_random/omap-rng.c                  |   13 +-
 drivers/char/hw_random/omap3-rom-rng.c             |  168 +-
 drivers/char/hw_random/pasemi-rng.c                |    4 +-
 drivers/char/hw_random/pic32-rng.c                 |    4 +-
 drivers/char/hw_random/st-rng.c                    |    4 +-
 drivers/char/hw_random/tx4939-rng.c                |    4 +-
 drivers/char/hw_random/xgene-rng.c                 |    4 +-
 drivers/crypto/Kconfig                             |   92 +-
 drivers/crypto/Makefile                            |    3 +-
 drivers/crypto/allwinner/Kconfig                   |   87 +
 drivers/crypto/allwinner/Makefile                  |    3 +
 .../{sunxi-ss => allwinner/sun4i-ss}/Makefile      |    0
 .../sun4i-ss}/sun4i-ss-cipher.c                    |   34 +-
 .../sun4i-ss}/sun4i-ss-core.c                      |  139 +-
 .../sun4i-ss}/sun4i-ss-hash.c                      |   47 +-
 .../sun4i-ss}/sun4i-ss-prng.c                      |    9 +-
 .../{sunxi-ss => allwinner/sun4i-ss}/sun4i-ss.h    |    2 +
 drivers/crypto/allwinner/sun8i-ce/Makefile         |    2 +
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |  438 ++
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |  676 ++
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |  254 +
 drivers/crypto/allwinner/sun8i-ss/Makefile         |    2 +
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |  436 ++
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |  642 ++
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h       |  218 +
 drivers/crypto/amcc/crypto4xx_core.c               |    6 +-
 drivers/crypto/amlogic/Kconfig                     |   24 +
 drivers/crypto/amlogic/Makefile                    |    2 +
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |  382 +
 drivers/crypto/amlogic/amlogic-gxl-core.c          |  332 +
 drivers/crypto/amlogic/amlogic-gxl.h               |  161 +
 drivers/crypto/atmel-aes.c                         |  590 +-
 drivers/crypto/atmel-authenc.h                     |    2 +-
 drivers/crypto/atmel-sha.c                         |    4 +-
 drivers/crypto/atmel-tdes.c                        |  469 +-
 drivers/crypto/bcm/cipher.c                        |  373 +-
 drivers/crypto/bcm/cipher.h                        |   10 +-
 drivers/crypto/bcm/spu2.c                          |    6 +-
 drivers/crypto/caam/Kconfig                        |    6 +-
 drivers/crypto/caam/caampkc.c                      |   72 +-
 drivers/crypto/caam/caampkc.h                      |    8 +-
 drivers/crypto/caam/ctrl.c                         |  222 +-
 drivers/crypto/caam/intern.h                       |    4 -
 drivers/crypto/caam/qi.c                           |    8 +-
 drivers/crypto/caam/qi.h                           |    1 -
 drivers/crypto/cavium/cpt/cptvf_algs.c             |  292 +-
 drivers/crypto/cavium/nitrox/Kconfig               |    2 +-
 drivers/crypto/cavium/nitrox/nitrox_aead.c         |   39 +-
 drivers/crypto/cavium/nitrox/nitrox_dev.h          |   15 +
 drivers/crypto/cavium/nitrox/nitrox_main.c         |    9 +-
 drivers/crypto/cavium/nitrox/nitrox_mbx.c          |    8 +
 drivers/crypto/cavium/nitrox/nitrox_req.h          |    4 +
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c     |  134 +-
 drivers/crypto/ccp/Kconfig                         |    2 +-
 drivers/crypto/ccp/ccp-crypto-aes-galois.c         |    7 +-
 drivers/crypto/ccp/ccp-crypto-aes-xts.c            |   94 +-
 drivers/crypto/ccp/ccp-crypto-aes.c                |  169 +-
 drivers/crypto/ccp/ccp-crypto-des3.c               |  100 +-
 drivers/crypto/ccp/ccp-crypto-main.c               |   14 +-
 drivers/crypto/ccp/ccp-crypto.h                    |   13 +-
 drivers/crypto/ccp/ccp-dev-v5.c                    |   14 +-
 drivers/crypto/ccp/ccp-dev.c                       |   15 +-
 drivers/crypto/ccp/ccp-dmaengine.c                 |    1 +
 drivers/crypto/ccp/ccp-ops.c                       |    3 +-
 drivers/crypto/ccp/psp-dev.c                       |   59 +-
 drivers/crypto/ccp/psp-dev.h                       |    1 +
 drivers/crypto/ccree/cc_aead.c                     |    3 +-
 drivers/crypto/ccree/cc_cipher.c                   |    4 +-
 drivers/crypto/chelsio/chcr_algo.c                 |  334 +-
 drivers/crypto/chelsio/chcr_algo.h                 |    2 +-
 drivers/crypto/chelsio/chcr_crypto.h               |   16 +-
 drivers/crypto/chelsio/chtls/chtls_io.c            |    5 +-
 drivers/crypto/geode-aes.c                         |  433 +-
 drivers/crypto/geode-aes.h                         |   15 +-
 drivers/crypto/hifn_795x.c                         |  183 +-
 drivers/crypto/hisilicon/Kconfig                   |   45 +-
 drivers/crypto/hisilicon/Makefile                  |    6 +-
 drivers/crypto/hisilicon/hpre/Makefile             |    2 +
 drivers/crypto/hisilicon/hpre/hpre.h               |   83 +
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        | 1137 +++
 drivers/crypto/hisilicon/hpre/hpre_main.c          | 1052 +++
 drivers/crypto/hisilicon/qm.c                      |  142 +-
 drivers/crypto/hisilicon/qm.h                      |   17 +-
 drivers/crypto/hisilicon/sec2/Makefile             |    2 +
 drivers/crypto/hisilicon/sec2/sec.h                |  156 +
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |  889 +++
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |  198 +
 drivers/crypto/hisilicon/sec2/sec_main.c           | 1095 +++
 drivers/crypto/hisilicon/sgl.c                     |  184 +-
 drivers/crypto/hisilicon/sgl.h                     |   24 -
 drivers/crypto/hisilicon/zip/zip.h                 |    1 -
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   46 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |  294 +-
 drivers/crypto/inside-secure/safexcel.c            |  329 +-
 drivers/crypto/inside-secure/safexcel.h            |  131 +-
 drivers/crypto/inside-secure/safexcel_cipher.c     | 2062 +++++-
 drivers/crypto/inside-secure/safexcel_hash.c       | 1475 +++-
 drivers/crypto/inside-secure/safexcel_ring.c       |    5 +-
 drivers/crypto/ixp4xx_crypto.c                     |  228 +-
 drivers/crypto/marvell/cesa.h                      |    6 +-
 drivers/crypto/marvell/cipher.c                    |   14 +-
 drivers/crypto/mediatek/mtk-aes.c                  |  250 +-
 drivers/crypto/mxs-dcp.c                           |  140 +-
 drivers/crypto/n2_core.c                           |  194 +-
 drivers/crypto/nx/nx-aes-cbc.c                     |   81 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |   45 +-
 drivers/crypto/nx/nx-aes-ctr.c                     |   87 +-
 drivers/crypto/nx/nx-aes-ecb.c                     |   76 +-
 drivers/crypto/nx/nx-aes-gcm.c                     |   29 +-
 drivers/crypto/nx/nx.c                             |   64 +-
 drivers/crypto/nx/nx.h                             |   19 +-
 drivers/crypto/nx/nx_debugfs.c                     |   18 +-
 drivers/crypto/omap-aes.c                          |  209 +-
 drivers/crypto/omap-aes.h                          |    4 +-
 drivers/crypto/omap-des.c                          |  232 +-
 drivers/crypto/padlock-aes.c                       |  157 +-
 drivers/crypto/picoxcell_crypto.c                  |  386 +-
 drivers/crypto/qat/Kconfig                         |    2 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |  304 +-
 drivers/crypto/qat/qat_common/qat_crypto.h         |    4 +-
 drivers/crypto/qce/Makefile                        |    2 +-
 drivers/crypto/qce/cipher.h                        |    8 +-
 drivers/crypto/qce/common.c                        |   12 +-
 drivers/crypto/qce/common.h                        |    3 +-
 drivers/crypto/qce/core.c                          |    2 +-
 drivers/crypto/qce/dma.c                           |    4 +-
 drivers/crypto/qce/sha.c                           |    2 +-
 drivers/crypto/qce/{ablkcipher.c => skcipher.c}    |  172 +-
 drivers/crypto/rockchip/Makefile                   |    2 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |    8 +-
 drivers/crypto/rockchip/rk3288_crypto.h            |    3 +-
 drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c |  556 --
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |  538 ++
 drivers/crypto/s5p-sss.c                           |  187 +-
 drivers/crypto/sahara.c                            |  156 +-
 drivers/crypto/stm32/stm32-cryp.c                  |  338 +-
 drivers/crypto/talitos.c                           |  314 +-
 drivers/crypto/ux500/Kconfig                       |    2 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |  371 +-
 drivers/crypto/ux500/hash/hash_core.c              |    3 +-
 drivers/crypto/virtio/Kconfig                      |    2 +-
 drivers/crypto/virtio/virtio_crypto_algs.c         |  192 +-
 drivers/crypto/virtio/virtio_crypto_common.h       |    2 +-
 drivers/crypto/vmx/Makefile                        |    6 +-
 drivers/net/wireless/cisco/Kconfig                 |    2 +-
 include/crypto/aead.h                              |    2 +-
 include/crypto/algapi.h                            |  149 -
 include/crypto/blake2s.h                           |  106 +
 include/crypto/chacha.h                            |   83 +-
 include/crypto/chacha20poly1305.h                  |   48 +
 include/crypto/curve25519.h                        |   71 +
 include/crypto/engine.h                            |    4 -
 include/crypto/hash.h                              |    2 +-
 include/crypto/internal/blake2s.h                  |   24 +
 include/crypto/internal/chacha.h                   |   43 +
 include/crypto/internal/des.h                      |   12 -
 include/crypto/internal/poly1305.h                 |   58 +
 include/crypto/internal/skcipher.h                 |   62 -
 include/crypto/poly1305.h                          |   69 +-
 include/crypto/skcipher.h                          |   49 +-
 include/linux/crypto.h                             |  861 +--
 include/linux/pci.h                                |    1 +
 include/uapi/linux/psp-sev.h                       |    3 +
 init/Kconfig                                       |    4 +
 lib/Makefile                                       |    3 +-
 lib/crypto/Kconfig                                 |  130 +
 lib/crypto/Makefile                                |   42 +-
 lib/crypto/blake2s-generic.c                       |  111 +
 lib/crypto/blake2s-selftest.c                      |  622 ++
 lib/crypto/blake2s.c                               |  126 +
 lib/{ => crypto}/chacha.c                          |   20 +-
 lib/crypto/chacha20poly1305-selftest.c             | 7393 ++++++++++++++++++++
 lib/crypto/chacha20poly1305.c                      |  369 +
 lib/crypto/curve25519-fiat32.c                     |  864 +++
 lib/crypto/curve25519-hacl64.c                     |  788 +++
 lib/crypto/curve25519.c                            |   25 +
 lib/crypto/libchacha.c                             |   35 +
 lib/crypto/poly1305.c                              |  232 +
 lib/ubsan.c                                        |    2 +-
 lib/ubsan.h                                        |    2 +-
 net/bluetooth/Kconfig                              |    2 +-
 net/rxrpc/Kconfig                                  |    2 +-
 net/xfrm/Kconfig                                   |    2 +-
 net/xfrm/xfrm_algo.c                               |    4 +-
 292 files changed, 47110 insertions(+), 11394 deletions(-)
 create mode 100644 Documentation/ABI/testing/debugfs-hisi-hpre
 create mode 100644 Documentation/ABI/testing/debugfs-hisi-sec
 create mode 100644 Documentation/devicetree/bindings/crypto/allwinner,sun8i-ss.yaml
 create mode 100644 Documentation/devicetree/bindings/crypto/amlogic,gxl-crypto.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/nuvoton,npcm-rng.txt
 create mode 100644 Documentation/devicetree/bindings/rng/omap3_rom_rng.txt
 create mode 100644 Documentation/devicetree/bindings/rng/samsung,exynos5250-trng.txt
 create mode 100644 arch/arm/crypto/chacha-glue.c
 delete mode 100644 arch/arm/crypto/chacha-neon-glue.c
 create mode 100644 arch/arm/crypto/chacha-scalar-core.S
 create mode 100644 arch/arm/crypto/curve25519-core.S
 create mode 100644 arch/arm/crypto/curve25519-glue.c
 create mode 100644 arch/arm/crypto/poly1305-armv4.pl
 create mode 100644 arch/arm/crypto/poly1305-core.S_shipped
 create mode 100644 arch/arm/crypto/poly1305-glue.c
 create mode 100644 arch/arm64/crypto/poly1305-armv8.pl
 create mode 100644 arch/arm64/crypto/poly1305-core.S_shipped
 create mode 100644 arch/arm64/crypto/poly1305-glue.c
 create mode 100644 arch/mips/crypto/chacha-core.S
 create mode 100644 arch/mips/crypto/chacha-glue.c
 create mode 100644 arch/mips/crypto/poly1305-glue.c
 create mode 100644 arch/mips/crypto/poly1305-mips.pl
 create mode 100644 arch/x86/crypto/blake2s-core.S
 create mode 100644 arch/x86/crypto/blake2s-glue.c
 create mode 100644 arch/x86/crypto/curve25519-x86_64.c
 delete mode 100644 crypto/ablkcipher.c
 create mode 100644 crypto/blake2b_generic.c
 create mode 100644 crypto/blake2s_generic.c
 delete mode 100644 crypto/blkcipher.c
 create mode 100644 crypto/curve25519-generic.c
 create mode 100644 crypto/geniv.c
 create mode 100644 crypto/jitterentropy.h
 create mode 100644 drivers/char/hw_random/hisi-trng-v2.c
 create mode 100644 drivers/char/hw_random/npcm-rng.c
 create mode 100644 drivers/crypto/allwinner/Kconfig
 create mode 100644 drivers/crypto/allwinner/Makefile
 rename drivers/crypto/{sunxi-ss => allwinner/sun4i-ss}/Makefile (100%)
 rename drivers/crypto/{sunxi-ss => allwinner/sun4i-ss}/sun4i-ss-cipher.c (95%)
 rename drivers/crypto/{sunxi-ss => allwinner/sun4i-ss}/sun4i-ss-core.c (87%)
 rename drivers/crypto/{sunxi-ss => allwinner/sun4i-ss}/sun4i-ss-hash.c (93%)
 rename drivers/crypto/{sunxi-ss => allwinner/sun4i-ss}/sun4i-ss-prng.c (92%)
 rename drivers/crypto/{sunxi-ss => allwinner/sun4i-ss}/sun4i-ss.h (98%)
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/Makefile
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h
 create mode 100644 drivers/crypto/allwinner/sun8i-ss/Makefile
 create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h
 create mode 100644 drivers/crypto/amlogic/Kconfig
 create mode 100644 drivers/crypto/amlogic/Makefile
 create mode 100644 drivers/crypto/amlogic/amlogic-gxl-cipher.c
 create mode 100644 drivers/crypto/amlogic/amlogic-gxl-core.c
 create mode 100644 drivers/crypto/amlogic/amlogic-gxl.h
 create mode 100644 drivers/crypto/hisilicon/hpre/Makefile
 create mode 100644 drivers/crypto/hisilicon/hpre/hpre.h
 create mode 100644 drivers/crypto/hisilicon/hpre/hpre_crypto.c
 create mode 100644 drivers/crypto/hisilicon/hpre/hpre_main.c
 create mode 100644 drivers/crypto/hisilicon/sec2/Makefile
 create mode 100644 drivers/crypto/hisilicon/sec2/sec.h
 create mode 100644 drivers/crypto/hisilicon/sec2/sec_crypto.c
 create mode 100644 drivers/crypto/hisilicon/sec2/sec_crypto.h
 create mode 100644 drivers/crypto/hisilicon/sec2/sec_main.c
 delete mode 100644 drivers/crypto/hisilicon/sgl.h
 rename drivers/crypto/qce/{ablkcipher.c => skcipher.c} (62%)
 delete mode 100644 drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c
 create mode 100644 drivers/crypto/rockchip/rk3288_crypto_skcipher.c
 create mode 100644 include/crypto/blake2s.h
 create mode 100644 include/crypto/chacha20poly1305.h
 create mode 100644 include/crypto/curve25519.h
 create mode 100644 include/crypto/internal/blake2s.h
 create mode 100644 include/crypto/internal/chacha.h
 create mode 100644 include/crypto/internal/poly1305.h
 create mode 100644 lib/crypto/Kconfig
 create mode 100644 lib/crypto/blake2s-generic.c
 create mode 100644 lib/crypto/blake2s-selftest.c
 create mode 100644 lib/crypto/blake2s.c
 rename lib/{ => crypto}/chacha.c (88%)
 create mode 100644 lib/crypto/chacha20poly1305-selftest.c
 create mode 100644 lib/crypto/chacha20poly1305.c
 create mode 100644 lib/crypto/curve25519-fiat32.c
 create mode 100644 lib/crypto/curve25519-hacl64.c
 create mode 100644 lib/crypto/curve25519.c
 create mode 100644 lib/crypto/libchacha.c
 create mode 100644 lib/crypto/poly1305.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.5
  2019-11-25  3:45 ` [GIT PULL] Crypto Update for 5.5 Herbert Xu
@ 2019-11-26  4:25   ` pr-tracker-bot
  2020-01-28  5:03   ` [GIT PULL] Crypto Update for 5.6 Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-11-26  4:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 25 Nov 2019 11:45:36 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git refs/heads/master

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/642356cb5f4a8c82b5ca5ebac288c327d10df236

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.5
  2019-09-23  5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
  2019-09-23 16:50   ` pr-tracker-bot
  2019-10-10 12:38   ` Herbert Xu
@ 2019-12-02  6:20   ` Herbert Xu
  2019-12-03  1:30     ` pr-tracker-bot
  2019-12-14  8:47     ` Herbert Xu
  2 siblings, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2019-12-02  6:20 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

- Fix build error in crypto lib code when crypto API is off.
- Fix NULL/error check in hisilicon.
- Fix Kconfig-related build error in talitos.

The following changes since commit 4ee812f6143d78d8ba1399671d78c8d78bf2817c:

  crypto: vmx - Avoid weird build failures (2019-11-22 18:48:39 +0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 8a6b8f4d7a891ac66db4f97900a86b55c84a5802:

  crypto: hisilicon - fix a NULL vs IS_ERR() bug in sec_create_qp_ctx() (2019-11-27 13:08:50 +0800)

----------------------------------------------------------------
Dan Carpenter (1):
      crypto: hisilicon - fix a NULL vs IS_ERR() bug in sec_create_qp_ctx()

Herbert Xu (1):
      crypto: talitos - Fix build error by selecting LIB_DES

Jason A. Donenfeld (1):
      crypto: arch - conditionalize crypto api in arch glue for lib code

 arch/arm/crypto/chacha-glue.c              | 26 ++++++++++++++++----------
 arch/arm/crypto/curve25519-glue.c          |  5 +++--
 arch/arm/crypto/poly1305-glue.c            |  9 ++++++---
 arch/arm64/crypto/chacha-neon-glue.c       |  5 +++--
 arch/arm64/crypto/poly1305-glue.c          |  5 +++--
 arch/mips/crypto/chacha-glue.c             |  6 ++++--
 arch/mips/crypto/poly1305-glue.c           |  6 ++++--
 arch/x86/crypto/blake2s-glue.c             |  6 ++++--
 arch/x86/crypto/chacha_glue.c              |  5 +++--
 arch/x86/crypto/curve25519-x86_64.c        |  7 ++++---
 arch/x86/crypto/poly1305_glue.c            |  5 +++--
 drivers/crypto/Kconfig                     |  1 +
 drivers/crypto/hisilicon/sec2/sec_crypto.c |  4 ++--
 13 files changed, 56 insertions(+), 34 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.5
  2019-12-02  6:20   ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
@ 2019-12-03  1:30     ` pr-tracker-bot
  2019-12-14  8:47     ` Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-12-03  1:30 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 2 Dec 2019 14:20:17 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/483847a70262f7361f8a6f78513c985c2c8b1719

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.5
  2019-12-02  6:20   ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
  2019-12-03  1:30     ` pr-tracker-bot
@ 2019-12-14  8:47     ` Herbert Xu
  2019-12-14 22:05       ` pr-tracker-bot
  2020-01-15 15:08       ` Herbert Xu
  1 sibling, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2019-12-14  8:47 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes another build problem for Wireguard without Crypto
API.

The following changes since commit 8a6b8f4d7a891ac66db4f97900a86b55c84a5802:

  crypto: hisilicon - fix a NULL vs IS_ERR() bug in sec_create_qp_ctx() (2019-11-27 13:08:50 +0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 84faa307249b341f6ad8de3e1869d77a65e26669:

  crypto: arm/curve25519 - add arch-specific key generation function (2019-12-12 14:07:14 +0800)

----------------------------------------------------------------
Jason A. Donenfeld (1):
      crypto: arm/curve25519 - add arch-specific key generation function

 arch/arm/crypto/curve25519-glue.c | 7 +++++++
 1 file changed, 7 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.5
  2019-12-14  8:47     ` Herbert Xu
@ 2019-12-14 22:05       ` pr-tracker-bot
  2020-01-15 15:08       ` Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2019-12-14 22:05 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sat, 14 Dec 2019 16:47:49 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f791ede32a14151a313783e1105049a137bc13c8

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.5
  2019-12-14  8:47     ` Herbert Xu
  2019-12-14 22:05       ` pr-tracker-bot
@ 2020-01-15 15:08       ` Herbert Xu
  2020-01-15 19:35         ` pr-tracker-bot
  2020-02-13  3:32         ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
  1 sibling, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2020-01-15 15:08 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem for the hisilicon driver.

The following changes since commit 84faa307249b341f6ad8de3e1869d77a65e26669:

  crypto: arm/curve25519 - add arch-specific key generation function (2019-12-12 14:07:14 +0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to cb1eeb75cf3dd84ced81333967200583993dfd73:

  crypto: hisilicon/sec2 - Use atomics instead of __sync (2020-01-09 11:28:08 +0800)

----------------------------------------------------------------
Arnd Bergmann (1):
      crypto: hisilicon/sec2 - Use atomics instead of __sync

 drivers/crypto/hisilicon/sec2/sec.h        |  6 +++---
 drivers/crypto/hisilicon/sec2/sec_crypto.c | 12 ++++++------
 drivers/crypto/hisilicon/sec2/sec_main.c   | 14 ++++++++++++--
 3 files changed, 21 insertions(+), 11 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.5
  2020-01-15 15:08       ` Herbert Xu
@ 2020-01-15 19:35         ` pr-tracker-bot
  2020-02-13  3:32         ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-01-15 19:35 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 15 Jan 2020 23:08:12 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0174cb6ce9449ce9b59cb9c6f4f64dc4df3de458

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Update for 5.6
  2019-11-25  3:45 ` [GIT PULL] Crypto Update for 5.5 Herbert Xu
  2019-11-26  4:25   ` pr-tracker-bot
@ 2020-01-28  5:03   ` Herbert Xu
  2020-01-29  0:30     ` pr-tracker-bot
  2020-04-01  4:27     ` [GIT PULL] Crypto Update for 5.7 Herbert Xu
  1 sibling, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2020-01-28  5:03 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Removed CRYPTO_TFM_RES flags.
- Extended spawn grabbing to all algorithm types.
- Moved hash descsize verification into API code.

Algorithms:

- Fixed recursive pcrypt dead-lock.
- Added new 32 and 64-bit generic versions of poly1305.
- Added cryptogams implementation of x86/poly1305.
-

Drivers:

- Added support for i.MX8M Mini in caam.
- Added support for i.MX8M Nano in caam.
- Added support for i.MX8M Plus in caam.
- Added support for A33 variant of SS in sun4i-ss.
- Added TEE support for Raven Ridge in ccp.
- Added in-kernel API to submit TEE commands in ccp.
- Added AMD-TEE driver.
- Added support for BCM2711 in iproc-rng200.
- Added support for AES256-GCM based ciphers for chtls.
- Added aead support on SEC2 in hisilicon.

The following changes since commit e42617b825f8073569da76dc4510bfa019b1c35a:

  Linux 5.5-rc1 (2019-12-08 14:57:55 -0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 0bc81767c5bd9d005fae1099fb39eb3688370cb1:

  crypto: arm/chacha - fix build failured when kernel mode NEON is disabled (2020-01-22 16:21:11 +0800)

----------------------------------------------------------------
Adam Ford (1):
      crypto: caam - Add support for i.MX8M Mini

Andrei Botila (2):
      crypto: caam - remove double buffering for ahash
      crypto: caam/qi2 - remove double buffering for ahash

Ard Biesheuvel (9):
      crypto: ccp - set max RSA modulus size for v3 platform devices as well
      crypto: arm64/ghash-neon - bump priority to 150
      crypto: omap-aes - reject invalid input sizes for block modes
      crypto: omap-aes-ctr - set blocksize to 1
      crypto: omap-aes-gcm - deal with memory allocation failure
      crypto: omap-aes-gcm - add missing .setauthsize hooks
      crypto: omap-aes-gcm - check length of assocdata in RFC4106 mode
      crypto: omap-aes-gcm - use the AES library to encrypt the tag
      crypto: arm/chacha - fix build failured when kernel mode NEON is disabled

Arnd Bergmann (1):
      crypto: hisilicon/sec2 - Use atomics instead of __sync

Ayush Sawal (2):
      crypto: chelsio - calculating tx_channel_id as per the max number of channels
      crypto: chelsio - Resetting crypto counters during the driver unregister

Ben Dooks (Codethink) (1):
      crypto: sun4i-ss - make unexported sun4i_ss_pm_ops static

Brendan Higgins (2):
      crypto: inside-secure - add unspecified HAS_IOMEM dependency
      crypto: amlogic - add unspecified HAS_IOMEM dependency

Chen Zhou (2):
      crypto: allwinner - remove unneeded semicolon
      crypto: api - remove unneeded semicolon

Christian Lamparter (2):
      crypto: crypto4xx - reduce memory fragmentation
      crypto: crypto4xx - use GFP_KERNEL for big allocations

Chuhong Yuan (1):
      crypto: picoxcell - adjust the position of tasklet_init and fix missed tasklet_kill

Colin Ian King (2):
      tee: fix memory allocation failure checks on drv_data and amdtee
      crypto: hisilicon - fix spelling mistake "disgest" -> "digest"

Corentin Labbe (5):
      crypto: sun4i-ss - add the A33 variant of SS
      crypto: sun8i-ss - fix removal of module
      crypto: amlogic - fix removal of module
      crypto: sun8i-ce - fix removal of module
      crypto: sun8i-ce - remove dead code

Daniel Axtens (1):
      crypto: vmx - reject xts inputs that are too short

Daniel Jordan (6):
      padata: validate cpumask without removed CPU during offline
      padata: always acquire cpu_hotplug_lock before pinst->lock
      padata: remove cpumask change notifier
      padata: remove reorder_objects
      padata: update documentation
      padata: update documentation file path in MAINTAINERS

Eneas U de Queiroz (6):
      crypto: qce - fix ctr-aes-qce block, chunk sizes
      crypto: qce - fix xts-aes-qce key sizes
      crypto: qce - save a sg table slot for result buf
      crypto: qce - update the skcipher IV
      crypto: qce - initialize fallback only for AES
      crypto: qce - allow building only hashes/ciphers

Eric Biggers (63):
      crypto: hisilicon - select CRYPTO_SKCIPHER, not CRYPTO_BLKCIPHER
      crypto: api - remove another reference to blkcipher
      crypto: skcipher - remove crypto_skcipher::ivsize
      crypto: skcipher - remove crypto_skcipher::keysize
      crypto: skcipher - remove crypto_skcipher::setkey
      crypto: skcipher - remove crypto_skcipher::encrypt
      crypto: skcipher - remove crypto_skcipher::decrypt
      crypto: skcipher - remove crypto_skcipher_extsize()
      crypto: shash - allow essiv and hmac to use OPTIONAL_KEY algorithms
      crypto: aead - move crypto_aead_maxauthsize() to <crypto/aead.h>
      crypto: skcipher - add crypto_skcipher_min_keysize()
      crypto: testmgr - don't try to decrypt uninitialized buffers
      crypto: testmgr - check skcipher min_keysize
      crypto: testmgr - test setting misaligned keys
      crypto: testmgr - create struct aead_extra_tests_ctx
      crypto: testmgr - generate inauthentic AEAD test vectors
      crypto: compress - remove crt_u.compress (struct compress_tfm)
      crypto: cipher - remove crt_u.cipher (struct cipher_tfm)
      crypto: doc - remove references to ARC4
      crypto: algapi - make unregistration functions return void
      crypto: skcipher - remove skcipher_walk_aead()
      crypto: chelsio - fix writing tfm flags to wrong place
      crypto: artpec6 - return correct error code for failed setkey()
      crypto: atmel-sha - fix error handling when setting hmac key
      crypto: remove unused tfm result flags
      crypto: remove CRYPTO_TFM_RES_BAD_BLOCK_LEN
      crypto: remove CRYPTO_TFM_RES_BAD_KEY_LEN
      crypto: remove CRYPTO_TFM_RES_WEAK_KEY
      crypto: remove propagation of CRYPTO_TFM_RES_* flags
      crypto: algapi - make crypto_drop_spawn() a no-op on uninitialized spawns
      crypto: algapi - make crypto_grab_spawn() handle an ERR_PTR() name
      crypto: shash - make struct shash_instance be the full size
      crypto: ahash - make struct ahash_instance be the full size
      crypto: skcipher - pass instance to crypto_grab_skcipher()
      crypto: aead - pass instance to crypto_grab_aead()
      crypto: akcipher - pass instance to crypto_grab_akcipher()
      crypto: algapi - pass instance to crypto_grab_spawn()
      crypto: shash - introduce crypto_grab_shash()
      crypto: ahash - introduce crypto_grab_ahash()
      crypto: cipher - introduce crypto_cipher_spawn and crypto_grab_cipher()
      crypto: adiantum - use crypto_grab_{cipher,shash} and simplify error paths
      crypto: cryptd - use crypto_grab_shash() and simplify error paths
      crypto: hmac - use crypto_grab_shash() and simplify error paths
      crypto: authenc - use crypto_grab_ahash() and simplify error paths
      crypto: authencesn - use crypto_grab_ahash() and simplify error paths
      crypto: gcm - use crypto_grab_ahash() and simplify error paths
      crypto: ccm - use crypto_grab_ahash() and simplify error paths
      crypto: chacha20poly1305 - use crypto_grab_ahash() and simplify error paths
      crypto: skcipher - use crypto_grab_cipher() and simplify error paths
      crypto: cbcmac - use crypto_grab_cipher() and simplify error paths
      crypto: cmac - use crypto_grab_cipher() and simplify error paths
      crypto: vmac - use crypto_grab_cipher() and simplify error paths
      crypto: xcbc - use crypto_grab_cipher() and simplify error paths
      crypto: cipher - make crypto_spawn_cipher() take a crypto_cipher_spawn
      crypto: algapi - remove obsoleted instance creation helpers
      crypto: ahash - unexport crypto_ahash_type
      crypto: algapi - fold crypto_init_spawn() into crypto_grab_spawn()
      crypto: hash - add support for new way of freeing instances
      crypto: geniv - convert to new way of freeing instances
      crypto: cryptd - convert to new way of freeing instances
      crypto: shash - convert shash_free_instance() to new style
      crypto: algapi - remove crypto_template::{alloc,free}()
      crypto: algapi - enforce that all instances have a ->free() method

Gary R Hook (1):
      crypto: ccp - Update MAINTAINERS for CCP driver

Geert Uytterhoeven (1):
      crypto: essiv - fix AEAD capitalization and preposition use in help text

Gilad Ben-Yossef (10):
      crypto: ccree - remove useless define
      crypto: ccree - fix backlog memory leak
      crypto: ccree - fix AEAD decrypt auth fail
      crypto: ccree - turn errors to debug msgs
      crypto: ccree - fix pm wrongful error reporting
      crypto: ccree - cc_do_send_request() is void func
      crypto: ccree - fix PM race condition
      crypto: ccree - split overloaded usage of irq field
      crypto: ccree - make cc_pm_put_suspend() void
      crypto: ccree - erase unneeded inline funcs

Greg Kroah-Hartman (1):
      crypto: hisilicon - still no need to check return value of debugfs_create functions

Hadar Gat (4):
      crypto: ccree - fix typos in comments
      crypto: ccree - fix typos in error msgs
      crypto: ccree - fix typos in error msgs
      crypto: ccree - fix typo in comment

Herbert Xu (18):
      padata: Remove broken queue flushing
      crypto: pcrypt - Fix user-after-free on module unload
      padata: Remove unused padata_remove_cpu
      crypto: pcrypt - Avoid deadlock by using per-instance padata queues
      crypto: pcrypt - Do not clear MAY_SLEEP flag in original request
      crypto: af_alg - Use bh_lock_sock in sk_destruct
      crypto: api - Check spawn->alg under lock in crypto_drop_spawn
      crypto: api - Fix race condition in crypto_spawn_alg
      crypto: api - Do not zap spawn->alg
      crypto: api - Add more comments to crypto_remove_spawns
      crypto: shash - Add init_tfm/exit_tfm and verify descsize
      crypto: padlock-sha - Use init_tfm/exit_tfm interface
      crypto: hmac - Use init_tfm/exit_tfm interface
      crypto: api - fix unexpectedly getting generic implementation
      crypto: api - Retain alg refcount in crypto_grab_spawn
      crypto: skcipher - Add skcipher_ialg_simple helper
      Merge git://git.kernel.org/.../herbert/crypto-2.6
      crypto: curve25519 - Fix selftest build error

Horia Geantă (3):
      crypto: caam - add support for i.MX8M Nano
      crypto: caam/qi2 - fix typo in algorithm's driver name
      crypto: caam - add support for i.MX8M Plus

Iuliana Prodan (1):
      crypto: caam - do not reset pointer size from MCFGR register

Jason A. Donenfeld (9):
      crypto: arm/curve25519 - add arch-specific key generation function
      crypto: lib/curve25519 - re-add selftests
      crypto: poly1305 - add new 32 and 64-bit generic versions
      crypto: x86/poly1305 - import unmodified cryptogams implementation
      crypto: x86/poly1305 - wire up faster implementations for kernel
      crypto: {arm,arm64,mips}/poly1305 - remove redundant non-reduction from emit
      crypto: x86/poly1305 - fix .gitignore typo
      crypto: chacha20poly1305 - add back missing test vectors and test chunking
      crypto: x86/poly1305 - emit does base conversion itself

Jonathan Cameron (2):
      crypto: hisilicon - Fix issue with wrong number of sg elements after dma map
      crypto: hisilicon - Use the offset fields in sqe to avoid need to split scatterlists

Kamil Konieczny (1):
      MAINTAINERS: update my e-mail address

Kees Cook (2):
      crypto: x86 - Regularize glue function prototypes
      crypto: x86/sha - Eliminate casts on asm implementations

Krzysztof Kozlowski (2):
      crypto: Kconfig - Fix indentation
      crypto: exynos-rng - Rename Exynos to lowercase

Mark Brown (1):
      crypto: arm64 - Use modern annotations for assembly functions

Ofir Drang (1):
      crypto: ccree - fix FDE descriptor sequence

Pascal van Leeuwen (3):
      crypto: inside-secure - Fix Unable to fit even 1 command desc error w/ EIP97
      crypto: inside-secure - Fix hang case on EIP97 with zero length input data
      crypto: inside-secure - Fix hang case on EIP97 with basic DES/3DES ops

Peter Ujfalusi (5):
      crypto: atmel-aes - Retire dma_request_slave_channel_compat()
      crypto: atmel-sha - Retire dma_request_slave_channel_compat()
      crypto: atmel-tdes - Retire dma_request_slave_channel_compat()
      crypto: img-hash - Use dma_request_chan instead dma_request_slave_channel
      crypto: stm32/hash - Use dma_request_chan() instead dma_request_slave_channel()

Rijo Thomas (15):
      crypto: ccp - rename psp-dev files to sev-dev
      crypto: ccp - create a generic psp-dev file
      crypto: ccp - move SEV vdata to a dedicated data structure
      crypto: ccp - check whether PSP supports SEV or TEE before initialization
      crypto: ccp - add TEE support for Raven Ridge
      crypto: ccp - provide in-kernel API to submit TEE commands
      tee: allow compilation of tee subsystem for AMD CPUs
      tee: add AMD-TEE driver
      tee: amdtee: check TEE status during driver initialization
      Documentation: tee: add AMD-TEE driver details
      tee: amdtee: remove unused variable initialization
      tee: amdtee: print error message if tee not present
      tee: amdtee: skip tee_device_unregister if tee_device_alloc fails
      tee: amdtee: rename err label to err_device_unregister
      tee: amdtee: remove redundant NULL check for pool

Sami Tolvanen (1):
      crypto: arm64/sha - fix function types

Stefan Wahren (2):
      dt-bindings: rng: add BCM2711 RNG compatible
      hwrng: iproc-rng200 - Add support for BCM2711

Tero Kristo (15):
      crypto: omap-sham - split up data to multiple sg elements with huge data
      crypto: omap-sham - remove the sysfs group during driver removal
      crypto: omap-aes - remove the sysfs group during driver removal
      crypto: omap-des - add IV output handling
      crypto: omap-aes - add IV output handling
      crypto: omap-sham - fix buffer handling for split test cases
      crypto: omap-aes-gcm - fix corner case with only auth data
      crypto: omap-sham - fix split update cases with cryptomgr tests
      crypto: omap-aes - fixup aligned data cleanup
      crypto: omap-aes-gcm - fix failure with assocdata only
      crypto: omap-sham - fix unaligned sg list handling
      crypto: omap-aes-gcm - convert to use crypto engine
      crypto: omap-des - avoid unnecessary spam with bad cryptlen
      crypto: omap-des - handle NULL cipher request
      crypto: omap-crypto - copy the temporary data to output buffer properly

Tudor Ambarus (23):
      crypto: atmel-tdes - Constify value to write to hw
      crypto: atmel-{sha,tdes} - Change algorithm priorities
      crypto: atmel-tdes - Remove unused header includes
      crypto: atmel-{sha,tdes} - Propagate error from _hw_version_init()
      crypto: atmel-{aes,sha,tdes} - Drop superfluous error message in probe()
      crypto: atmel-{aes,sha,tdes} - Rename labels in probe()
      crypto: atmel-tdes - Remove useless write in Control Register
      crypto: atmel-tdes - Map driver data flags to Mode Register
      crypto: atmel-tdes - Drop unnecessary passing of tfm
      crypto: atmel-{aes,tdes} - Do not save IV for ECB mode
      crypto: atmel-aes - Fix counter overflow in CTR mode
      crypto: atmel-aes - Fix saving of IV for CTR mode
      crypto: atmel-{sha,tdes} - Remove unused 'err' member of driver data
      crypto: atmel-sha - Void return type for atmel_sha_update_dma_stop()
      crypto: atmel-aes - Use gcm helper to check authsize
      crypto: atmel-{aes,sha,tdes} - Group common alg type init in dedicated methods
      crypto: atmel-{aes,sha} - Fix incorrect use of dmaengine_terminate_all()
      crypto: atmel-{aes,sha,tdes} - Drop duplicate init of dma_slave_config.direction
      crypto: atmel-{aes,sha,tdes} - Stop passing unused argument in _dma_init()
      crypto: atmel-{sha,tdes} - Print warn message even when deferring
      crypto: atmel-{aes,tdes} - Update the IV only when the op succeeds
      crypto: atmel-aes - Fix CTR counter overflow when multiple fragments
      crypto: atmel-{aes,sha,tdes} - Retire crypto_platform_data

Valdis Kletnieks (1):
      crypto: chacha - fix warning message in header file

Vinay Kumar Yadav (4):
      crypto: chtls - Add support for AES256-GCM based ciphers
      crypto: chtls - Fixed memory leak
      crypto: chtls - Corrected function call context
      crypto: chtls - Fixed listen fail when max stid range reached

Zaibo Xu (13):
      crypto: hisilicon - Update debugfs usage of SEC V2
      crypto: hisilicon - fix print/comment of SEC V2
      crypto: hisilicon - Update some names on SEC V2
      crypto: hisilicon - Update QP resources of SEC V2
      crypto: hisilicon - Adjust some inner logic
      crypto: hisilicon - Add callback error check
      crypto: hisilicon - Add branch prediction macro
      crypto: hisilicon - redefine skcipher initiation
      crypto: hisilicon - Add aead support on SEC2
      crypto: hisilicon - Bugfixed tfm leak
      crypto: hisilicon - Fixed some tiny bugs of HPRE
      crypto: hisilicon - adjust hpre_crt_para_get
      crypto: hisilicon - add branch prediction macro

Zhou Wang (1):
      crypto: hisilicon - Remove useless MODULE macros

zhengbin (1):
      crypto: inside-secure - Use PTR_ERR_OR_ZERO() to simplify code

 .mailmap                                           |    1 +
 Documentation/core-api/index.rst                   |    1 +
 Documentation/core-api/padata.rst                  |  169 +
 Documentation/crypto/devel-algos.rst               |   38 +-
 .../devicetree/bindings/rng/brcm,iproc-rng200.txt  |    1 +
 Documentation/padata.txt                           |  163 -
 Documentation/tee.txt                              |   81 +
 MAINTAINERS                                        |    5 +-
 arch/arm/crypto/aes-ce-glue.c                      |   14 +-
 arch/arm/crypto/chacha-glue.c                      |    4 +-
 arch/arm/crypto/crc32-ce-glue.c                    |    4 +-
 arch/arm/crypto/curve25519-glue.c                  |    7 +
 arch/arm/crypto/ghash-ce-glue.c                    |   11 +-
 arch/arm/crypto/poly1305-glue.c                    |   18 +-
 arch/arm64/crypto/aes-ce-ccm-core.S                |   16 +-
 arch/arm64/crypto/aes-ce-ccm-glue.c                |    8 +-
 arch/arm64/crypto/aes-ce-core.S                    |   16 +-
 arch/arm64/crypto/aes-ce-glue.c                    |    8 +-
 arch/arm64/crypto/aes-ce.S                         |    4 +-
 arch/arm64/crypto/aes-cipher-core.S                |    8 +-
 arch/arm64/crypto/aes-glue.c                       |   31 +-
 arch/arm64/crypto/aes-modes.S                      |   16 +-
 arch/arm64/crypto/aes-neon.S                       |    4 +-
 arch/arm64/crypto/aes-neonbs-core.S                |   40 +-
 arch/arm64/crypto/chacha-neon-core.S               |   16 +-
 arch/arm64/crypto/crct10dif-ce-core.S              |   12 +-
 arch/arm64/crypto/ghash-ce-core.S                  |    8 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |   10 +-
 arch/arm64/crypto/nh-neon-core.S                   |    4 +-
 arch/arm64/crypto/poly1305-glue.c                  |   18 +-
 arch/arm64/crypto/sha1-ce-core.S                   |    4 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |   17 +-
 arch/arm64/crypto/sha2-ce-core.S                   |    4 +-
 arch/arm64/crypto/sha2-ce-glue.c                   |   34 +-
 arch/arm64/crypto/sha256-glue.c                    |   32 +-
 arch/arm64/crypto/sha3-ce-core.S                   |    4 +-
 arch/arm64/crypto/sha512-ce-core.S                 |    4 +-
 arch/arm64/crypto/sha512-ce-glue.c                 |   26 +-
 arch/arm64/crypto/sha512-glue.c                    |   15 +-
 arch/arm64/crypto/sm3-ce-core.S                    |    4 +-
 arch/arm64/crypto/sm4-ce-core.S                    |    4 +-
 arch/mips/crypto/crc32-mips.c                      |    4 +-
 arch/mips/crypto/poly1305-glue.c                   |   18 +-
 arch/powerpc/crypto/aes-spe-glue.c                 |   18 +-
 arch/powerpc/crypto/crc32c-vpmsum_glue.c           |    4 +-
 arch/s390/crypto/aes_s390.c                        |   27 +-
 arch/s390/crypto/crc32-vx.c                        |    8 +-
 arch/s390/crypto/ghash_s390.c                      |    4 +-
 arch/s390/crypto/paes_s390.c                       |   25 +-
 arch/sparc/crypto/aes_glue.c                       |    2 -
 arch/sparc/crypto/camellia_glue.c                  |    5 +-
 arch/sparc/crypto/crc32c_glue.c                    |    4 +-
 arch/x86/crypto/.gitignore                         |    1 +
 arch/x86/crypto/Makefile                           |   11 +-
 arch/x86/crypto/aegis128-aesni-glue.c              |    4 +-
 arch/x86/crypto/aesni-intel_asm.S                  |    8 +-
 arch/x86/crypto/aesni-intel_glue.c                 |   55 +-
 arch/x86/crypto/blake2s-glue.c                     |    4 +-
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |   77 +-
 arch/x86/crypto/camellia_aesni_avx_glue.c          |   81 +-
 arch/x86/crypto/camellia_glue.c                    |   54 +-
 arch/x86/crypto/cast6_avx_glue.c                   |   74 +-
 arch/x86/crypto/crc32-pclmul_glue.c                |    4 +-
 arch/x86/crypto/crc32c-intel_glue.c                |    4 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |   11 +-
 arch/x86/crypto/glue_helper.c                      |   23 +-
 arch/x86/crypto/poly1305-avx2-x86_64.S             |  390 --
 arch/x86/crypto/poly1305-sse2-x86_64.S             |  590 ---
 arch/x86/crypto/poly1305-x86_64-cryptogams.pl      | 4265 ++++++++++++++++++++
 arch/x86/crypto/poly1305_glue.c                    |  304 +-
 arch/x86/crypto/serpent_avx2_glue.c                |   65 +-
 arch/x86/crypto/serpent_avx_glue.c                 |   63 +-
 arch/x86/crypto/serpent_sse2_glue.c                |   30 +-
 arch/x86/crypto/sha1_avx2_x86_64_asm.S             |    6 +-
 arch/x86/crypto/sha1_ssse3_asm.S                   |   14 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |   70 +-
 arch/x86/crypto/sha256-avx-asm.S                   |    4 +-
 arch/x86/crypto/sha256-avx2-asm.S                  |    4 +-
 arch/x86/crypto/sha256-ssse3-asm.S                 |    6 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |   34 +-
 arch/x86/crypto/sha512-avx-asm.S                   |   11 +-
 arch/x86/crypto/sha512-avx2-asm.S                  |   11 +-
 arch/x86/crypto/sha512-ssse3-asm.S                 |   13 +-
 arch/x86/crypto/sha512_ssse3_glue.c                |   31 +-
 arch/x86/crypto/twofish_avx_glue.c                 |   81 +-
 arch/x86/crypto/twofish_glue_3way.c                |   37 +-
 arch/x86/include/asm/crypto/camellia.h             |   65 +-
 arch/x86/include/asm/crypto/glue_helper.h          |   18 +-
 arch/x86/include/asm/crypto/serpent-avx.h          |   20 +-
 arch/x86/include/asm/crypto/serpent-sse2.h         |   28 +-
 arch/x86/include/asm/crypto/twofish.h              |   19 +-
 crypto/Kconfig                                     |    4 +-
 crypto/acompress.c                                 |    4 +-
 crypto/adiantum.c                                  |  102 +-
 crypto/aead.c                                      |   15 +-
 crypto/aegis128-core.c                             |    4 +-
 crypto/aes_generic.c                               |   18 +-
 crypto/af_alg.c                                    |    6 +-
 crypto/ahash.c                                     |   54 +-
 crypto/akcipher.c                                  |    9 +-
 crypto/algapi.c                                    |  248 +-
 crypto/algboss.c                                   |   12 +-
 crypto/anubis.c                                    |    2 -
 crypto/api.c                                       |   24 +-
 crypto/authenc.c                                   |   70 +-
 crypto/authencesn.c                                |   70 +-
 crypto/blake2b_generic.c                           |    4 +-
 crypto/blake2s_generic.c                           |    4 +-
 crypto/camellia_generic.c                          |    5 +-
 crypto/cast6_generic.c                             |   28 +-
 crypto/cbc.c                                       |   15 +-
 crypto/ccm.c                                       |  136 +-
 crypto/cfb.c                                       |    5 +-
 crypto/chacha20poly1305.c                          |   96 +-
 crypto/cipher.c                                    |   93 +-
 crypto/cmac.c                                      |   40 +-
 crypto/compress.c                                  |   31 +-
 crypto/crc32_generic.c                             |    4 +-
 crypto/crc32c_generic.c                            |    4 +-
 crypto/cryptd.c                                    |  131 +-
 crypto/crypto_user_base.c                          |    3 +-
 crypto/ctr.c                                       |   26 +-
 crypto/cts.c                                       |   15 +-
 crypto/des_generic.c                               |   10 +-
 crypto/ecb.c                                       |    5 +-
 crypto/echainiv.c                                  |   20 +-
 crypto/essiv.c                                     |   44 +-
 crypto/gcm.c                                       |   96 +-
 crypto/geniv.c                                     |   19 +-
 crypto/ghash-generic.c                             |    4 +-
 crypto/hmac.c                                      |   62 +-
 crypto/internal.h                                  |    4 -
 crypto/keywrap.c                                   |   15 +-
 crypto/lrw.c                                       |   17 +-
 crypto/michael_mic.c                               |    4 +-
 crypto/nhpoly1305.c                                |    2 +-
 crypto/ofb.c                                       |    5 +-
 crypto/pcbc.c                                      |    5 +-
 crypto/pcrypt.c                                    |   44 +-
 crypto/poly1305_generic.c                          |   25 +-
 crypto/rsa-pkcs1pad.c                              |    8 +-
 crypto/scompress.c                                 |    4 +-
 crypto/seqiv.c                                     |   20 +-
 crypto/serpent_generic.c                           |    6 +-
 crypto/shash.c                                     |   95 +-
 crypto/simd.c                                      |   12 +-
 crypto/skcipher.c                                  |   97 +-
 crypto/sm4_generic.c                               |   16 +-
 crypto/testmgr.c                                   |  584 ++-
 crypto/testmgr.h                                   |   14 +-
 crypto/twofish_common.c                            |    8 +-
 crypto/vmac.c                                      |   44 +-
 crypto/xcbc.c                                      |   45 +-
 crypto/xts.c                                       |   17 +-
 crypto/xxhash_generic.c                            |    4 +-
 drivers/char/hw_random/Kconfig                     |    2 +-
 drivers/char/hw_random/iproc-rng200.c              |    1 +
 drivers/crypto/Kconfig                             |   89 +-
 .../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c    |    1 -
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |   24 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c  |    5 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h       |    9 +
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |    6 -
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |    6 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |    8 -
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |    2 -
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |    4 +-
 drivers/crypto/amcc/crypto4xx_alg.c                |   31 +-
 drivers/crypto/amcc/crypto4xx_core.c               |   37 +-
 drivers/crypto/amlogic/Kconfig                     |    1 +
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |    1 -
 drivers/crypto/amlogic/amlogic-gxl-core.c          |    4 +-
 drivers/crypto/atmel-aes.c                         |  359 +-
 drivers/crypto/atmel-authenc.h                     |    3 +-
 drivers/crypto/atmel-sha.c                         |  473 +--
 drivers/crypto/atmel-tdes.c                        |  375 +-
 drivers/crypto/axis/artpec6_crypto.c               |   10 +-
 drivers/crypto/bcm/cipher.c                        |   17 +-
 drivers/crypto/caam/Kconfig                        |   14 +-
 drivers/crypto/caam/caamalg.c                      |   33 +-
 drivers/crypto/caam/caamalg_qi.c                   |   44 +-
 drivers/crypto/caam/caamalg_qi2.c                  |  206 +-
 drivers/crypto/caam/caamhash.c                     |  167 +-
 drivers/crypto/caam/ctrl.c                         |   15 +-
 drivers/crypto/cavium/cpt/cptvf_algs.c             |    2 -
 drivers/crypto/cavium/nitrox/nitrox_aead.c         |    4 +-
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c     |   12 +-
 drivers/crypto/ccp/Makefile                        |    4 +-
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c           |    1 -
 drivers/crypto/ccp/ccp-crypto-aes-galois.c         |    1 -
 drivers/crypto/ccp/ccp-crypto-aes.c                |    1 -
 drivers/crypto/ccp/ccp-crypto-sha.c                |    4 +-
 drivers/crypto/ccp/ccp-dev-v3.c                    |    1 +
 drivers/crypto/ccp/psp-dev.c                       | 1042 +----
 drivers/crypto/ccp/psp-dev.h                       |   51 +-
 drivers/crypto/ccp/sev-dev.c                       | 1077 +++++
 drivers/crypto/ccp/sev-dev.h                       |   63 +
 drivers/crypto/ccp/sp-dev.h                        |   17 +-
 drivers/crypto/ccp/sp-pci.c                        |   43 +-
 drivers/crypto/ccp/tee-dev.c                       |  375 ++
 drivers/crypto/ccp/tee-dev.h                       |  110 +
 drivers/crypto/ccree/cc_aead.c                     |   43 +-
 drivers/crypto/ccree/cc_cipher.c                   |   58 +-
 drivers/crypto/ccree/cc_driver.c                   |   24 +-
 drivers/crypto/ccree/cc_driver.h                   |    6 +-
 drivers/crypto/ccree/cc_fips.c                     |    2 +-
 drivers/crypto/ccree/cc_hash.c                     |    8 -
 drivers/crypto/ccree/cc_pm.c                       |   39 +-
 drivers/crypto/ccree/cc_pm.h                       |   17 +-
 drivers/crypto/ccree/cc_request_mgr.c              |  103 +-
 drivers/crypto/ccree/cc_request_mgr.h              |    8 -
 drivers/crypto/chelsio/Kconfig                     |   30 +-
 drivers/crypto/chelsio/chcr_algo.c                 |   53 +-
 drivers/crypto/chelsio/chcr_core.c                 |   10 +-
 drivers/crypto/chelsio/chtls/chtls.h               |    7 +-
 drivers/crypto/chelsio/chtls/chtls_cm.c            |   57 +-
 drivers/crypto/chelsio/chtls/chtls_cm.h            |   21 +
 drivers/crypto/chelsio/chtls/chtls_hw.c            |   65 +-
 drivers/crypto/chelsio/chtls/chtls_main.c          |   28 +-
 drivers/crypto/geode-aes.c                         |   24 +-
 drivers/crypto/hisilicon/Kconfig                   |   11 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |  141 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   60 +-
 drivers/crypto/hisilicon/sec2/sec.h                |   53 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |  963 ++++-
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |   22 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   19 +-
 drivers/crypto/hisilicon/sgl.c                     |   17 +-
 drivers/crypto/hisilicon/zip/zip.h                 |    4 +
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   92 +-
 drivers/crypto/img-hash.c                          |    6 +-
 drivers/crypto/inside-secure/safexcel.c            |   12 +-
 drivers/crypto/inside-secure/safexcel.h            |   34 +-
 drivers/crypto/inside-secure/safexcel_cipher.c     |  600 +--
 drivers/crypto/inside-secure/safexcel_hash.c       |   36 +-
 drivers/crypto/inside-secure/safexcel_ring.c       |  130 +-
 drivers/crypto/ixp4xx_crypto.c                     |   31 +-
 drivers/crypto/marvell/cipher.c                    |    4 +-
 drivers/crypto/mediatek/mtk-aes.c                  |    4 -
 drivers/crypto/mxs-dcp.c                           |   12 +-
 drivers/crypto/n2_core.c                           |    1 -
 drivers/crypto/omap-aes-gcm.c                      |  223 +-
 drivers/crypto/omap-aes.c                          |  142 +-
 drivers/crypto/omap-aes.h                          |   12 +-
 drivers/crypto/omap-crypto.c                       |   37 +-
 drivers/crypto/omap-des.c                          |   13 +-
 drivers/crypto/omap-sham.c                         |  191 +-
 drivers/crypto/padlock-aes.c                       |    9 +-
 drivers/crypto/padlock-sha.c                       |   26 +-
 drivers/crypto/picoxcell_crypto.c                  |   30 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |    6 +-
 drivers/crypto/qce/Makefile                        |    7 +-
 drivers/crypto/qce/common.c                        |  244 +-
 drivers/crypto/qce/core.c                          |    4 +
 drivers/crypto/qce/dma.c                           |    6 +-
 drivers/crypto/qce/dma.h                           |    3 +-
 drivers/crypto/qce/sha.c                           |    2 -
 drivers/crypto/qce/skcipher.c                      |   41 +-
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |    4 +-
 drivers/crypto/sahara.c                            |    9 +-
 drivers/crypto/stm32/Kconfig                       |    6 +-
 drivers/crypto/stm32/stm32-crc32.c                 |    4 +-
 drivers/crypto/stm32/stm32-hash.c                  |    6 +-
 drivers/crypto/talitos.c                           |   15 +-
 drivers/crypto/ux500/Kconfig                       |   16 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |    2 -
 drivers/crypto/virtio/virtio_crypto_algs.c         |    8 +-
 drivers/crypto/vmx/aes_xts.c                       |    3 +
 drivers/tee/Kconfig                                |    4 +-
 drivers/tee/Makefile                               |    1 +
 drivers/tee/amdtee/Kconfig                         |    8 +
 drivers/tee/amdtee/Makefile                        |    5 +
 drivers/tee/amdtee/amdtee_if.h                     |  183 +
 drivers/tee/amdtee/amdtee_private.h                |  159 +
 drivers/tee/amdtee/call.c                          |  373 ++
 drivers/tee/amdtee/core.c                          |  518 +++
 drivers/tee/amdtee/shm_pool.c                      |   93 +
 fs/ecryptfs/crypto.c                               |    2 +-
 fs/ecryptfs/keystore.c                             |    4 +-
 include/crypto/aead.h                              |   10 +
 include/crypto/algapi.h                            |   84 +-
 include/crypto/cast6.h                             |    7 +-
 include/crypto/hash.h                              |   13 +
 include/crypto/internal/acompress.h                |    4 +-
 include/crypto/internal/aead.h                     |   21 +-
 include/crypto/internal/akcipher.h                 |   12 +-
 include/crypto/internal/chacha.h                   |    2 +-
 include/crypto/internal/des.h                      |   23 +-
 include/crypto/internal/geniv.h                    |    1 -
 include/crypto/internal/hash.h                     |   90 +-
 include/crypto/internal/poly1305.h                 |   45 +-
 include/crypto/internal/scompress.h                |    4 +-
 include/crypto/internal/skcipher.h                 |   27 +-
 include/crypto/nhpoly1305.h                        |    4 +-
 include/crypto/poly1305.h                          |   26 +-
 include/crypto/serpent.h                           |    4 +-
 include/crypto/skcipher.h                          |   26 +-
 include/crypto/twofish.h                           |    2 +-
 include/crypto/xts.h                               |   21 +-
 include/linux/cpuhotplug.h                         |    1 +
 include/linux/crypto.h                             |  104 +-
 include/linux/padata.h                             |   56 +-
 include/linux/platform_data/crypto-atmel.h         |   23 -
 include/linux/psp-tee.h                            |   91 +
 include/uapi/linux/tee.h                           |    1 +
 kernel/padata.c                                    |  386 +-
 lib/crypto/Kconfig                                 |    2 +-
 lib/crypto/Makefile                                |   14 +-
 lib/crypto/chacha20poly1305-selftest.c             | 1712 +++++++-
 lib/crypto/curve25519-generic.c                    |   24 +
 lib/crypto/curve25519-selftest.c                   | 1321 ++++++
 lib/crypto/curve25519.c                            |   20 +-
 lib/crypto/poly1305-donna32.c                      |  204 +
 lib/crypto/poly1305-donna64.c                      |  185 +
 lib/crypto/poly1305.c                              |  169 +-
 315 files changed, 16794 insertions(+), 8204 deletions(-)
 create mode 100644 Documentation/core-api/padata.rst
 delete mode 100644 Documentation/padata.txt
 create mode 100644 arch/x86/crypto/.gitignore
 delete mode 100644 arch/x86/crypto/poly1305-avx2-x86_64.S
 delete mode 100644 arch/x86/crypto/poly1305-sse2-x86_64.S
 create mode 100644 arch/x86/crypto/poly1305-x86_64-cryptogams.pl
 create mode 100644 drivers/crypto/ccp/sev-dev.c
 create mode 100644 drivers/crypto/ccp/sev-dev.h
 create mode 100644 drivers/crypto/ccp/tee-dev.c
 create mode 100644 drivers/crypto/ccp/tee-dev.h
 create mode 100644 drivers/tee/amdtee/Kconfig
 create mode 100644 drivers/tee/amdtee/Makefile
 create mode 100644 drivers/tee/amdtee/amdtee_if.h
 create mode 100644 drivers/tee/amdtee/amdtee_private.h
 create mode 100644 drivers/tee/amdtee/call.c
 create mode 100644 drivers/tee/amdtee/core.c
 create mode 100644 drivers/tee/amdtee/shm_pool.c
 delete mode 100644 include/linux/platform_data/crypto-atmel.h
 create mode 100644 include/linux/psp-tee.h
 create mode 100644 lib/crypto/curve25519-generic.c
 create mode 100644 lib/crypto/curve25519-selftest.c
 create mode 100644 lib/crypto/poly1305-donna32.c
 create mode 100644 lib/crypto/poly1305-donna64.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.6
  2020-01-28  5:03   ` [GIT PULL] Crypto Update for 5.6 Herbert Xu
@ 2020-01-29  0:30     ` pr-tracker-bot
  2020-04-01  4:27     ` [GIT PULL] Crypto Update for 5.7 Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-01-29  0:30 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 28 Jan 2020 13:03:26 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a78208e2436963d0b2c7d186277d6e1a9755029a

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.6
  2020-01-15 15:08       ` Herbert Xu
  2020-01-15 19:35         ` pr-tracker-bot
@ 2020-02-13  3:32         ` Herbert Xu
  2020-02-13 22:40           ` pr-tracker-bot
                             ` (2 more replies)
  1 sibling, 3 replies; 52+ messages in thread
From: Herbert Xu @ 2020-02-13  3:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a Kconfig anomaly when lib/crypto is enabled without
Crypto API.

The following changes since commit 0bc81767c5bd9d005fae1099fb39eb3688370cb1:

  crypto: arm/chacha - fix build failured when kernel mode NEON is disabled (2020-01-22 16:21:11 +0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 2343d1529aff8b552589f622c23932035ed7a05d:

  crypto: Kconfig - allow tests to be disabled when manager is disabled (2020-02-05 17:00:57 +0800)

----------------------------------------------------------------
Jason A. Donenfeld (1):
      crypto: Kconfig - allow tests to be disabled when manager is disabled

 crypto/Kconfig | 4 ----
 1 file changed, 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-02-13  3:32         ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
@ 2020-02-13 22:40           ` pr-tracker-bot
  2020-02-24  6:00           ` Herbert Xu
  2020-04-08  6:15           ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
  2 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-02-13 22:40 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 13 Feb 2020 11:32:31 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/64ae1342f8980d05c3df414a022b8123aa76c56b

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.6
  2020-02-13  3:32         ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
  2020-02-13 22:40           ` pr-tracker-bot
@ 2020-02-24  6:00           ` Herbert Xu
  2020-02-24 20:25             ` pr-tracker-bot
  2020-03-12 11:57             ` Herbert Xu
  2020-04-08  6:15           ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
  2 siblings, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2020-02-24  6:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a Kconfig-related build error and an integer overflow
in chacha20poly1305.

The following changes since commit 2343d1529aff8b552589f622c23932035ed7a05d:

  crypto: Kconfig - allow tests to be disabled when manager is disabled (2020-02-05 17:00:57 +0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to c9cc0517bba9f0213f1e55172feceb99e5512daf:

  crypto: chacha20poly1305 - prevent integer overflow on large input (2020-02-14 14:48:37 +0800)

----------------------------------------------------------------
Hongbo Yao (1):
      tee: amdtee: amdtee depends on CRYPTO_DEV_CCP_DD

Jason A. Donenfeld (1):
      crypto: chacha20poly1305 - prevent integer overflow on large input

 drivers/tee/amdtee/Kconfig    | 2 +-
 lib/crypto/chacha20poly1305.c | 3 +++
 2 files changed, 4 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-02-24  6:00           ` Herbert Xu
@ 2020-02-24 20:25             ` pr-tracker-bot
  2020-03-12 11:57             ` Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-02-24 20:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 24 Feb 2020 17:00:42 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/7031ecffab86199c2c688f7a723d03dfa6910fa6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.6
  2020-02-24  6:00           ` Herbert Xu
  2020-02-24 20:25             ` pr-tracker-bot
@ 2020-03-12 11:57             ` Herbert Xu
  2020-03-12 16:40               ` Linus Torvalds
                                 ` (2 more replies)
  1 sibling, 3 replies; 52+ messages in thread
From: Herbert Xu @ 2020-03-12 11:57 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build problem with x86/curve25519.

The following changes since commit c9cc0517bba9f0213f1e55172feceb99e5512daf:

  crypto: chacha20poly1305 - prevent integer overflow on large input (2020-02-14 14:48:37 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 1579f1bc3b753d17a44de3457d5c6f4a5b14c752:

  crypto: x86/curve25519 - support assemblers with no adx support (2020-03-05 18:28:09 +1100)

----------------------------------------------------------------
Jason A. Donenfeld (1):
      crypto: x86/curve25519 - support assemblers with no adx support

 arch/x86/Makefile           | 5 +++--
 arch/x86/crypto/Makefile    | 7 ++++++-
 include/crypto/curve25519.h | 6 ++++--
 3 files changed, 13 insertions(+), 5 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-03-12 11:57             ` Herbert Xu
@ 2020-03-12 16:40               ` Linus Torvalds
  2020-03-13  5:27                 ` Masahiro Yamada
                                   ` (2 more replies)
  2020-03-12 17:05               ` [GIT PULL] Crypto Fixes for 5.6 pr-tracker-bot
  2020-03-23 22:54               ` Herbert Xu
  2 siblings, 3 replies; 52+ messages in thread
From: Linus Torvalds @ 2020-03-12 16:40 UTC (permalink / raw)
  To: Herbert Xu, Masahiro Yamada, Jason A. Donenfeld
  Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List

On Thu, Mar 12, 2020 at 4:57 AM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes a build problem with x86/curve25519.

Pulled.

I do have a comment, though: this fix matches the existing pattern of
checking for assembler support, but that existing pattern is
absolutely horrible.

Would some enterprising individual please look at making the
CONFIG_AS_xyz flags use the _real_ config subsystem rather than ad-hoc
Makefile rules?

IOW, instead of having

  adx_instr := $(call as-instr,adox %r10$(comma)%r10,-DCONFIG_AS_ADX=1)
  ..
  adx_supported := $(call as-instr,adox %r10$(comma)%r10,yes,no)

in the makefiles, and silently changing how the Kconfig variables work
depending on those flags, make that DCONFIG_AS_ADX be a real config
variable:

   config AS_ADX
           def_bool $(success,$(srctree)/scripts/as-instr.sh "adox %r10,%r10")

or something like that?

And then we can make that CRYPTO_CURVE25519_X86 config variable simply have a

        depends on AS_ADX

in it, and the Kconfig system just takes care of these dependencies on its own.

Anyway, the crypto change isn't _wrong_, but it does point out an ugly
little horror in how the crypto layer silently basically changes the
configuration depending on other things.

For an example of why this is problematic: it means that if somebody
sends you their config file, the actual configuration you get may be
*completely* different from what they actually had, depending on
tools.

Added Masahiro to the cc, since he's used to the 'def_bool' model, and
also is familiar with our existing 'as-instr' Makefile macro.

So this is basically me throwing out a "I wish somebody would look at
this". Not meant as a criticism of the commit in question.

            Linus

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-03-12 11:57             ` Herbert Xu
  2020-03-12 16:40               ` Linus Torvalds
@ 2020-03-12 17:05               ` pr-tracker-bot
  2020-03-23 22:54               ` Herbert Xu
  2 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-03-12 17:05 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 12 Mar 2020 22:57:14 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2644bc8569baa735ae9c0a92432d6a30c20c1694

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-03-12 16:40               ` Linus Torvalds
@ 2020-03-13  5:27                 ` Masahiro Yamada
  2020-03-20 23:53                 ` Jason A. Donenfeld
  2020-03-21  0:49                 ` [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig Jason A. Donenfeld
  2 siblings, 0 replies; 52+ messages in thread
From: Masahiro Yamada @ 2020-03-13  5:27 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, Jason A. Donenfeld, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

Hi Linus,

On Fri, Mar 13, 2020 at 1:41 AM Linus Torvalds
<torvalds@linux-foundation.org> wrote:
>
> On Thu, Mar 12, 2020 at 4:57 AM Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > This push fixes a build problem with x86/curve25519.
>
> Pulled.
>
> I do have a comment, though: this fix matches the existing pattern of
> checking for assembler support, but that existing pattern is
> absolutely horrible.
>
> Would some enterprising individual please look at making the
> CONFIG_AS_xyz flags use the _real_ config subsystem rather than ad-hoc
> Makefile rules?
>
> IOW, instead of having
>
>   adx_instr := $(call as-instr,adox %r10$(comma)%r10,-DCONFIG_AS_ADX=1)
>   ..
>   adx_supported := $(call as-instr,adox %r10$(comma)%r10,yes,no)
>
> in the makefiles, and silently changing how the Kconfig variables work
> depending on those flags, make that DCONFIG_AS_ADX be a real config
> variable:
>
>    config AS_ADX
>            def_bool $(success,$(srctree)/scripts/as-instr.sh "adox %r10,%r10")
>
> or something like that?
>
> And then we can make that CRYPTO_CURVE25519_X86 config variable simply have a
>
>         depends on AS_ADX
>
> in it, and the Kconfig system just takes care of these dependencies on its own.
>
> Anyway, the crypto change isn't _wrong_, but it does point out an ugly
> little horror in how the crypto layer silently basically changes the
> configuration depending on other things.
>
> For an example of why this is problematic: it means that if somebody
> sends you their config file, the actual configuration you get may be
> *completely* different from what they actually had, depending on
> tools.
>
> Added Masahiro to the cc, since he's used to the 'def_bool' model, and
> also is familiar with our existing 'as-instr' Makefile macro.


Thanks for the heads-up.

In fact, as-instr is already used in Kconfig.
arch/arm64/Kconfig: line 1396


arm / arm64 are simple cases because
32, 64-bit is separated by directory.

There is one thing we need to be careful about.
The x86 GCC is usually biarch.
So, when evaluating 64-bit assembly code
with a default 32-bit compiler,
-m64 must be passed.

I will keep this conversion in my mind.

Thanks.

> So this is basically me throwing out a "I wish somebody would look at
> this". Not meant as a criticism of the commit in question.
>
>             Linus



-- 
Best Regards
Masahiro Yamada

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-03-12 16:40               ` Linus Torvalds
  2020-03-13  5:27                 ` Masahiro Yamada
@ 2020-03-20 23:53                 ` Jason A. Donenfeld
  2020-03-21 15:43                   ` Linus Torvalds
  2020-03-21  0:49                 ` [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig Jason A. Donenfeld
  2 siblings, 1 reply; 52+ messages in thread
From: Jason A. Donenfeld @ 2020-03-20 23:53 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, Masahiro Yamada, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

Funny, I always thought it was like that "for a good reason" that I
just didn't know about -- assumedly something having to do with a
difference between config time and compile time. I agree with you that
everything gets so much cleaner if we can do this in Kconfig. I've put
together the patch pasted below, which appears to work well. I'll work
on replumbing the other stuff and will send a series off to the list
hopefully not before too long.

From 12375354ddb4c8b1c75663312a9b6d9b9bc5f520 Mon Sep 17 00:00:00 2001
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
Date: Fri, 20 Mar 2020 17:49:36 -0600
Subject: [PATCH] x86: probe assembler instead of kconfig instead of makefile

Doing this probing inside of the Makefiles means we have a maze of
ifdefs inside the source code and child Makefiles that need to make
proper decisions on this too. Instead, we do it at Kconfig time, like
many other compiler and assembler options, which allows us to set up the
dependencies normally for full compilation units.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
---
 arch/x86/Kconfig           |  2 ++
 arch/x86/Kconfig.assembler | 33 +++++++++++++++++++++++++++++++++
 arch/x86/Makefile          | 22 ----------------------
 3 files changed, 35 insertions(+), 22 deletions(-)
 create mode 100644 arch/x86/Kconfig.assembler

diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index beea77046f9b..707673227837 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -2935,3 +2935,5 @@ config HAVE_ATOMIC_IOMAP
 source "drivers/firmware/Kconfig"

 source "arch/x86/kvm/Kconfig"
+
+source "arch/x86/Kconfig.assembler"
diff --git a/arch/x86/Kconfig.assembler b/arch/x86/Kconfig.assembler
new file mode 100644
index 000000000000..809adcf6f7c3
--- /dev/null
+++ b/arch/x86/Kconfig.assembler
@@ -0,0 +1,33 @@
+# SPDX-License-Identifier: GPL-2.0
+# Copyright (C) 2020 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
+
+config AS_CFI
+ def_bool $(as-instr,.cfi_startproc\n.cfi_rel_offset
rsp$(comma)0\n.cfi_endproc) if 64BIT
+ def_bool $(as-instr,.cfi_startproc\n.cfi_rel_offset
esp$(comma)0\n.cfi_endproc) if !64BIT
+
+config AS_CFI_SIGNAL_FRAME
+ def_bool $(as-instr,.cfi_startproc\n.cfi_signal_frame\n.cfi_endproc)
+
+config AS_CFI_SECTIONS
+ def_bool $(as-instr,.cfi_sections .debug_frame)
+
+config AS_SSSE3
+ def_bool $(as-instr,pshufb %xmm0$(comma)%xmm0)
+
+config AS_AVX
+ def_bool $(as-instr,vxorps %ymm0$(comma)%ymm1$(comma)%ymm2)
+
+config AS_AVX2
+ def_bool $(as-instr,vpbroadcastb %xmm0$(comma)%ymm1)
+
+config AS_AVX512
+ def_bool $(as-instr,vpmovm2b %k1$(comma)%zmm5)
+
+config AS_SHA1_NI
+ def_bool $(as-instr,sha1msg1 %xmm0$(comma)%xmm1)
+
+config AS_SHA256_NI
+ def_bool $(as-instr,sha256msg1 %xmm0$(comma)%xmm1)
+
+config AS_ADX
+ def_bool $(as-instr,adox %r10$(comma)%r10)
diff --git a/arch/x86/Makefile b/arch/x86/Makefile
index 513a55562d75..b65ec63c7db7 100644
--- a/arch/x86/Makefile
+++ b/arch/x86/Makefile
@@ -177,28 +177,6 @@ ifeq ($(ACCUMULATE_OUTGOING_ARGS), 1)
  KBUILD_CFLAGS += $(call cc-option,-maccumulate-outgoing-args,)
 endif

-# Stackpointer is addressed different for 32 bit and 64 bit x86
-sp-$(CONFIG_X86_32) := esp
-sp-$(CONFIG_X86_64) := rsp
-
-# do binutils support CFI?
-cfi := $(call as-instr,.cfi_startproc\n.cfi_rel_offset
$(sp-y)$(comma)0\n.cfi_endproc,-DCONFIG_AS_CFI=1)
-# is .cfi_signal_frame supported too?
-cfi-sigframe := $(call
as-instr,.cfi_startproc\n.cfi_signal_frame\n.cfi_endproc,-DCONFIG_AS_CFI_SIGNAL_FRAME=1)
-cfi-sections := $(call as-instr,.cfi_sections
.debug_frame,-DCONFIG_AS_CFI_SECTIONS=1)
-
-# does binutils support specific instructions?
-asinstr += $(call as-instr,pshufb %xmm0$(comma)%xmm0,-DCONFIG_AS_SSSE3=1)
-avx_instr := $(call as-instr,vxorps
%ymm0$(comma)%ymm1$(comma)%ymm2,-DCONFIG_AS_AVX=1)
-avx2_instr :=$(call as-instr,vpbroadcastb
%xmm0$(comma)%ymm1,-DCONFIG_AS_AVX2=1)
-avx512_instr :=$(call as-instr,vpmovm2b %k1$(comma)%zmm5,-DCONFIG_AS_AVX512=1)
-sha1_ni_instr :=$(call as-instr,sha1msg1
%xmm0$(comma)%xmm1,-DCONFIG_AS_SHA1_NI=1)
-sha256_ni_instr :=$(call as-instr,sha256msg1
%xmm0$(comma)%xmm1,-DCONFIG_AS_SHA256_NI=1)
-adx_instr := $(call as-instr,adox %r10$(comma)%r10,-DCONFIG_AS_ADX=1)
-
-KBUILD_AFLAGS += $(cfi) $(cfi-sigframe) $(cfi-sections) $(asinstr)
$(avx_instr) $(avx2_instr) $(avx512_instr) $(sha1_ni_instr)
$(sha256_ni_instr) $(adx_instr)
-KBUILD_CFLAGS += $(cfi) $(cfi-sigframe) $(cfi-sections) $(asinstr)
$(avx_instr) $(avx2_instr) $(avx512_instr) $(sha1_ni_instr)
$(sha256_ni_instr) $(adx_instr)
-
 KBUILD_LDFLAGS := -m elf_$(UTS_MACHINE)

 #
-- 
2.25.1

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig
  2020-03-12 16:40               ` Linus Torvalds
  2020-03-13  5:27                 ` Masahiro Yamada
  2020-03-20 23:53                 ` Jason A. Donenfeld
@ 2020-03-21  0:49                 ` Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 1/3] x86: probe assembler instead of kconfig instead of makefile Jason A. Donenfeld
                                     ` (2 more replies)
  2 siblings, 3 replies; 52+ messages in thread
From: Jason A. Donenfeld @ 2020-03-21  0:49 UTC (permalink / raw)
  To: linux-kbuild, linux-kernel
  Cc: Jason A. Donenfeld, Linus Torvalds, Masahiro Yamada, x86, linux-crypto

Doing this probing inside of the Makefiles means we have a maze of
ifdefs inside the source code and child Makefiles that need to make
proper decisions on this too. Instead, we do it at Kconfig time, like
many other compiler and assembler options, which allows us to set up the
dependencies normally for full compilation units.

This patchset might have weird implications, as things have relied on
the old behavior for a long time. For example, it now means that
environment changes need for Kconfig's defaults to be triggered again. I
recently saw some patch on LKML that was doing a substring comparison on
KBUILD_CFLAGS looking for -DCONFIG_AS_SOMETHING; things like that will
have to change too.

This RFC isn't super heavily tested, and I expect problems. Let me know
what you think.

Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Masahiro Yamada <yamada.masahiro@socionext.com>
Cc: x86@kernel.org
Cc: linux-crypto@vger.kernel.org

Jason A. Donenfeld (3):
  x86: probe assembler instead of kconfig instead of makefile
  crypto: x86 - rework configuration based on Kconfig
  crypto: curve25519 - do not pollute dispatcher based on assembler

 arch/x86/Kconfig              |   2 +
 arch/x86/Kconfig.assembler    |  36 ++++++++
 arch/x86/Makefile             |  22 -----
 arch/x86/crypto/Makefile      | 162 ++++++++++++++--------------------
 crypto/Kconfig                |  28 +++---
 drivers/gpu/drm/i915/Makefile |   3 -
 include/crypto/curve25519.h   |   6 +-
 lib/raid6/test/Makefile       |   9 --
 8 files changed, 120 insertions(+), 148 deletions(-)
 create mode 100644 arch/x86/Kconfig.assembler

-- 
2.25.1


^ permalink raw reply	[flat|nested] 52+ messages in thread

* [PATCH RFC 1/3] x86: probe assembler instead of kconfig instead of makefile
  2020-03-21  0:49                 ` [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig Jason A. Donenfeld
@ 2020-03-21  0:49                   ` Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 2/3] crypto: x86 - rework configuration based on Kconfig Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 3/3] crypto: curve25519 - do not pollute dispatcher based on assembler Jason A. Donenfeld
  2 siblings, 0 replies; 52+ messages in thread
From: Jason A. Donenfeld @ 2020-03-21  0:49 UTC (permalink / raw)
  To: linux-kbuild, linux-kernel
  Cc: Jason A. Donenfeld, Linus Torvalds, Masahiro Yamada, x86, linux-crypto

Doing this probing inside of the Makefiles means we have a maze of
ifdefs inside the source code and child Makefiles that need to make
proper decisions on this too. Instead, we do it at Kconfig time, like
many other compiler and assembler options, which allows us to set up the
dependencies normally for full compilation units.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
---
 arch/x86/Kconfig              |  2 ++
 arch/x86/Kconfig.assembler    | 36 +++++++++++++++++++++++++++++++++++
 arch/x86/Makefile             | 22 ---------------------
 drivers/gpu/drm/i915/Makefile |  3 ---
 lib/raid6/test/Makefile       |  9 ---------
 5 files changed, 38 insertions(+), 34 deletions(-)
 create mode 100644 arch/x86/Kconfig.assembler

diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index beea77046f9b..707673227837 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -2935,3 +2935,5 @@ config HAVE_ATOMIC_IOMAP
 source "drivers/firmware/Kconfig"
 
 source "arch/x86/kvm/Kconfig"
+
+source "arch/x86/Kconfig.assembler"
diff --git a/arch/x86/Kconfig.assembler b/arch/x86/Kconfig.assembler
new file mode 100644
index 000000000000..d90ed2d7adae
--- /dev/null
+++ b/arch/x86/Kconfig.assembler
@@ -0,0 +1,36 @@
+# SPDX-License-Identifier: GPL-2.0
+# Copyright (C) 2020 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
+
+config AS_CFI
+	def_bool $(as-instr,.cfi_startproc\n.cfi_rel_offset rsp$(comma)0\n.cfi_endproc) if 64BIT
+	def_bool $(as-instr,.cfi_startproc\n.cfi_rel_offset esp$(comma)0\n.cfi_endproc) if !64BIT
+
+config AS_CFI_SIGNAL_FRAME
+	def_bool $(as-instr,.cfi_startproc\n.cfi_signal_frame\n.cfi_endproc)
+
+config AS_CFI_SECTIONS
+	def_bool $(as-instr,.cfi_sections .debug_frame)
+
+config AS_SSSE3
+	def_bool $(as-instr,pshufb %xmm0$(comma)%xmm0)
+
+config AS_AVX
+	def_bool $(as-instr,vxorps %ymm0$(comma)%ymm1$(comma)%ymm2)
+
+config AS_AVX2
+	def_bool $(as-instr,vpbroadcastb %xmm0$(comma)%ymm1)
+
+config AS_AVX512
+	def_bool $(as-instr,vpmovm2b %k1$(comma)%zmm5)
+
+config AS_SHA1_NI
+	def_bool $(as-instr,sha1msg1 %xmm0$(comma)%xmm1)
+
+config AS_SHA256_NI
+	def_bool $(as-instr,sha256msg1 %xmm0$(comma)%xmm1)
+
+config AS_ADX
+	def_bool $(as-instr,adox %r10$(comma)%r10)
+
+config AS_MOVNTDQA
+	def_bool $(as-instr,movntdqa (%eax)$(comma)%xmm0)
diff --git a/arch/x86/Makefile b/arch/x86/Makefile
index 513a55562d75..b65ec63c7db7 100644
--- a/arch/x86/Makefile
+++ b/arch/x86/Makefile
@@ -177,28 +177,6 @@ ifeq ($(ACCUMULATE_OUTGOING_ARGS), 1)
 	KBUILD_CFLAGS += $(call cc-option,-maccumulate-outgoing-args,)
 endif
 
-# Stackpointer is addressed different for 32 bit and 64 bit x86
-sp-$(CONFIG_X86_32) := esp
-sp-$(CONFIG_X86_64) := rsp
-
-# do binutils support CFI?
-cfi := $(call as-instr,.cfi_startproc\n.cfi_rel_offset $(sp-y)$(comma)0\n.cfi_endproc,-DCONFIG_AS_CFI=1)
-# is .cfi_signal_frame supported too?
-cfi-sigframe := $(call as-instr,.cfi_startproc\n.cfi_signal_frame\n.cfi_endproc,-DCONFIG_AS_CFI_SIGNAL_FRAME=1)
-cfi-sections := $(call as-instr,.cfi_sections .debug_frame,-DCONFIG_AS_CFI_SECTIONS=1)
-
-# does binutils support specific instructions?
-asinstr += $(call as-instr,pshufb %xmm0$(comma)%xmm0,-DCONFIG_AS_SSSE3=1)
-avx_instr := $(call as-instr,vxorps %ymm0$(comma)%ymm1$(comma)%ymm2,-DCONFIG_AS_AVX=1)
-avx2_instr :=$(call as-instr,vpbroadcastb %xmm0$(comma)%ymm1,-DCONFIG_AS_AVX2=1)
-avx512_instr :=$(call as-instr,vpmovm2b %k1$(comma)%zmm5,-DCONFIG_AS_AVX512=1)
-sha1_ni_instr :=$(call as-instr,sha1msg1 %xmm0$(comma)%xmm1,-DCONFIG_AS_SHA1_NI=1)
-sha256_ni_instr :=$(call as-instr,sha256msg1 %xmm0$(comma)%xmm1,-DCONFIG_AS_SHA256_NI=1)
-adx_instr := $(call as-instr,adox %r10$(comma)%r10,-DCONFIG_AS_ADX=1)
-
-KBUILD_AFLAGS += $(cfi) $(cfi-sigframe) $(cfi-sections) $(asinstr) $(avx_instr) $(avx2_instr) $(avx512_instr) $(sha1_ni_instr) $(sha256_ni_instr) $(adx_instr)
-KBUILD_CFLAGS += $(cfi) $(cfi-sigframe) $(cfi-sections) $(asinstr) $(avx_instr) $(avx2_instr) $(avx512_instr) $(sha1_ni_instr) $(sha256_ni_instr) $(adx_instr)
-
 KBUILD_LDFLAGS := -m elf_$(UTS_MACHINE)
 
 #
diff --git a/drivers/gpu/drm/i915/Makefile b/drivers/gpu/drm/i915/Makefile
index a1f2411aa21b..e559e53fc634 100644
--- a/drivers/gpu/drm/i915/Makefile
+++ b/drivers/gpu/drm/i915/Makefile
@@ -28,9 +28,6 @@ subdir-ccflags-$(CONFIG_DRM_I915_WERROR) += -Werror
 CFLAGS_i915_pci.o = $(call cc-disable-warning, override-init)
 CFLAGS_display/intel_fbdev.o = $(call cc-disable-warning, override-init)
 
-subdir-ccflags-y += \
-	$(call as-instr,movntdqa (%eax)$(comma)%xmm0,-DCONFIG_AS_MOVNTDQA)
-
 subdir-ccflags-y += -I$(srctree)/$(src)
 
 # Please keep these build lists sorted!
diff --git a/lib/raid6/test/Makefile b/lib/raid6/test/Makefile
index 3ab8720aa2f8..f8d4a44bc03d 100644
--- a/lib/raid6/test/Makefile
+++ b/lib/raid6/test/Makefile
@@ -34,15 +34,6 @@ endif
 
 ifeq ($(IS_X86),yes)
         OBJS   += mmx.o sse1.o sse2.o avx2.o recov_ssse3.o recov_avx2.o avx512.o recov_avx512.o
-        CFLAGS += $(shell echo "pshufb %xmm0, %xmm0" |		\
-                    gcc -c -x assembler - >&/dev/null &&	\
-                    rm ./-.o && echo -DCONFIG_AS_SSSE3=1)
-        CFLAGS += $(shell echo "vpbroadcastb %xmm0, %ymm1" |	\
-                    gcc -c -x assembler - >&/dev/null &&	\
-                    rm ./-.o && echo -DCONFIG_AS_AVX2=1)
-	CFLAGS += $(shell echo "vpmovm2b %k1, %zmm5" |          \
-		    gcc -c -x assembler - >&/dev/null &&        \
-		    rm ./-.o && echo -DCONFIG_AS_AVX512=1)
 else ifeq ($(HAS_NEON),yes)
         OBJS   += neon.o neon1.o neon2.o neon4.o neon8.o recov_neon.o recov_neon_inner.o
         CFLAGS += -DCONFIG_KERNEL_MODE_NEON=1
-- 
2.25.1


^ permalink raw reply	[flat|nested] 52+ messages in thread

* [PATCH RFC 2/3] crypto: x86 - rework configuration based on Kconfig
  2020-03-21  0:49                 ` [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 1/3] x86: probe assembler instead of kconfig instead of makefile Jason A. Donenfeld
@ 2020-03-21  0:49                   ` Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 3/3] crypto: curve25519 - do not pollute dispatcher based on assembler Jason A. Donenfeld
  2 siblings, 0 replies; 52+ messages in thread
From: Jason A. Donenfeld @ 2020-03-21  0:49 UTC (permalink / raw)
  To: linux-kbuild, linux-kernel
  Cc: Jason A. Donenfeld, Linus Torvalds, Masahiro Yamada, x86, linux-crypto

Now that assembler capabilities are probed inside of Kconfig, we can set
up proper Kconfig-based dependencies. We also take this opportunity to
reorder the Makefile, so that items are grouped logically by primitive.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
---
 arch/x86/crypto/Makefile | 162 ++++++++++++++++-----------------------
 crypto/Kconfig           |  28 +++----
 2 files changed, 80 insertions(+), 110 deletions(-)

diff --git a/arch/x86/crypto/Makefile b/arch/x86/crypto/Makefile
index 8c2e9eadee8a..fa6a6848ef96 100644
--- a/arch/x86/crypto/Makefile
+++ b/arch/x86/crypto/Makefile
@@ -1,130 +1,100 @@
 # SPDX-License-Identifier: GPL-2.0
 #
-# Arch-specific CryptoAPI modules.
-#
+# x86 crypto algorithms
 
 OBJECT_FILES_NON_STANDARD := y
 
-avx_supported := $(call as-instr,vpxor %xmm0$(comma)%xmm0$(comma)%xmm0,yes,no)
-avx2_supported := $(call as-instr,vpgatherdd %ymm0$(comma)(%eax$(comma)%ymm1\
-				$(comma)4)$(comma)%ymm2,yes,no)
-avx512_supported :=$(call as-instr,vpmovm2b %k1$(comma)%zmm5,yes,no)
-sha1_ni_supported :=$(call as-instr,sha1msg1 %xmm0$(comma)%xmm1,yes,no)
-sha256_ni_supported :=$(call as-instr,sha256msg1 %xmm0$(comma)%xmm1,yes,no)
-adx_supported := $(call as-instr,adox %r10$(comma)%r10,yes,no)
-
 obj-$(CONFIG_CRYPTO_GLUE_HELPER_X86) += glue_helper.o
 
 obj-$(CONFIG_CRYPTO_TWOFISH_586) += twofish-i586.o
+twofish-i586-y := twofish-i586-asm_32.o twofish_glue.o
+obj-$(CONFIG_CRYPTO_TWOFISH_X86_64) += twofish-x86_64.o
+twofish-x86_64-y := twofish-x86_64-asm_64.o twofish_glue.o
+obj-$(CONFIG_CRYPTO_TWOFISH_X86_64_3WAY) += twofish-x86_64-3way.o
+twofish-x86_64-3way-y := twofish-x86_64-asm_64-3way.o twofish_glue_3way.o
+obj-$(CONFIG_CRYPTO_TWOFISH_AVX_X86_64) += twofish-avx-x86_64.o
+twofish-avx-x86_64-y := twofish-avx-x86_64-asm_64.o twofish_avx_glue.o
+
 obj-$(CONFIG_CRYPTO_SERPENT_SSE2_586) += serpent-sse2-i586.o
+serpent-sse2-i586-y := serpent-sse2-i586-asm_32.o serpent_sse2_glue.o
+obj-$(CONFIG_CRYPTO_SERPENT_SSE2_X86_64) += serpent-sse2-x86_64.o
+serpent-sse2-x86_64-y := serpent-sse2-x86_64-asm_64.o serpent_sse2_glue.o
+obj-$(CONFIG_CRYPTO_SERPENT_AVX_X86_64) += serpent-avx-x86_64.o
+serpent-avx-x86_64-y := serpent-avx-x86_64-asm_64.o serpent_avx_glue.o
+obj-$(CONFIG_CRYPTO_SERPENT_AVX2_X86_64) += serpent-avx2.o
+serpent-avx2-y := serpent-avx2-asm_64.o serpent_avx2_glue.o
 
 obj-$(CONFIG_CRYPTO_DES3_EDE_X86_64) += des3_ede-x86_64.o
+des3_ede-x86_64-y := des3_ede-asm_64.o des3_ede_glue.o
+
 obj-$(CONFIG_CRYPTO_CAMELLIA_X86_64) += camellia-x86_64.o
+camellia-x86_64-y := camellia-x86_64-asm_64.o camellia_glue.o
+obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX_X86_64) += camellia-aesni-avx-x86_64.o
+camellia-aesni-avx-x86_64-y := camellia-aesni-avx-asm_64.o camellia_aesni_avx_glue.o
+obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64) += camellia-aesni-avx2.o
+camellia-aesni-avx2-y := camellia-aesni-avx2-asm_64.o camellia_aesni_avx2_glue.o
+
 obj-$(CONFIG_CRYPTO_BLOWFISH_X86_64) += blowfish-x86_64.o
-obj-$(CONFIG_CRYPTO_TWOFISH_X86_64) += twofish-x86_64.o
-obj-$(CONFIG_CRYPTO_TWOFISH_X86_64_3WAY) += twofish-x86_64-3way.o
+blowfish-x86_64-y := blowfish-x86_64-asm_64.o blowfish_glue.o
+
+obj-$(CONFIG_CRYPTO_CAST5_AVX_X86_64) += cast5-avx-x86_64.o
+cast5-avx-x86_64-y := cast5-avx-x86_64-asm_64.o cast5_avx_glue.o
+
+obj-$(CONFIG_CRYPTO_CAST6_AVX_X86_64) += cast6-avx-x86_64.o
+cast6-avx-x86_64-y := cast6-avx-x86_64-asm_64.o cast6_avx_glue.o
+
+obj-$(CONFIG_CRYPTO_AEGIS128_AESNI_SSE2) += aegis128-aesni.o
+aegis128-aesni-y := aegis128-aesni-asm.o aegis128-aesni-glue.o
+
 obj-$(CONFIG_CRYPTO_CHACHA20_X86_64) += chacha-x86_64.o
-obj-$(CONFIG_CRYPTO_SERPENT_SSE2_X86_64) += serpent-sse2-x86_64.o
+chacha-x86_64-y := chacha-ssse3-x86_64.o chacha_glue.o
+chacha-x86_64-$(CONFIG_AS_AVX2) += chacha-avx2-x86_64.o
+chacha-x86_64-$(CONFIG_AS_AVX512) += chacha-avx512vl-x86_64.o
+
 obj-$(CONFIG_CRYPTO_AES_NI_INTEL) += aesni-intel.o
-obj-$(CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL) += ghash-clmulni-intel.o
+aesni-intel-y := aesni-intel_asm.o aesni-intel_glue.o
+aesni-intel-$(CONFIG_64BIT) += aesni-intel_avx-x86_64.o aes_ctrby8_avx-x86_64.o
 
-obj-$(CONFIG_CRYPTO_CRC32C_INTEL) += crc32c-intel.o
 obj-$(CONFIG_CRYPTO_SHA1_SSSE3) += sha1-ssse3.o
-obj-$(CONFIG_CRYPTO_CRC32_PCLMUL) += crc32-pclmul.o
-obj-$(CONFIG_CRYPTO_SHA256_SSSE3) += sha256-ssse3.o
-obj-$(CONFIG_CRYPTO_SHA512_SSSE3) += sha512-ssse3.o
-obj-$(CONFIG_CRYPTO_CRCT10DIF_PCLMUL) += crct10dif-pclmul.o
-obj-$(CONFIG_CRYPTO_POLY1305_X86_64) += poly1305-x86_64.o
-
-obj-$(CONFIG_CRYPTO_AEGIS128_AESNI_SSE2) += aegis128-aesni.o
+sha1-ssse3-y := sha1_ssse3_asm.o sha1_ssse3_glue.o
+sha1-ssse3-$(CONFIG_AS_SSSE3) += sha1_avx2_x86_64_asm.o
+sha1-ssse3-$(CONFIG_AS_SHA1_NI) += sha1_ni_asm.o
 
-obj-$(CONFIG_CRYPTO_NHPOLY1305_SSE2) += nhpoly1305-sse2.o
-obj-$(CONFIG_CRYPTO_NHPOLY1305_AVX2) += nhpoly1305-avx2.o
+obj-$(CONFIG_CRYPTO_SHA256_SSSE3) += sha256-ssse3.o
+sha256-ssse3-y := sha256-ssse3-asm.o sha256-avx-asm.o sha256-avx2-asm.o sha256_ssse3_glue.o
+sha256-ssse3-$(CONFIG_AS_SHA256_NI) += sha256_ni_asm.o
 
-# These modules require the assembler to support ADX.
-ifeq ($(adx_supported),yes)
-	obj-$(CONFIG_CRYPTO_CURVE25519_X86) += curve25519-x86_64.o
-endif
+obj-$(CONFIG_CRYPTO_SHA512_SSSE3) += sha512-ssse3.o
+sha512-ssse3-y := sha512-ssse3-asm.o sha512-avx-asm.o sha512-avx2-asm.o sha512_ssse3_glue.o
 
-# These modules require assembler to support AVX.
-ifeq ($(avx_supported),yes)
-	obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX_X86_64) += \
-						camellia-aesni-avx-x86_64.o
-	obj-$(CONFIG_CRYPTO_CAST5_AVX_X86_64) += cast5-avx-x86_64.o
-	obj-$(CONFIG_CRYPTO_CAST6_AVX_X86_64) += cast6-avx-x86_64.o
-	obj-$(CONFIG_CRYPTO_TWOFISH_AVX_X86_64) += twofish-avx-x86_64.o
-	obj-$(CONFIG_CRYPTO_SERPENT_AVX_X86_64) += serpent-avx-x86_64.o
-	obj-$(CONFIG_CRYPTO_BLAKE2S_X86) += blake2s-x86_64.o
-endif
+obj-$(CONFIG_CRYPTO_BLAKE2S_X86) += blake2s-x86_64.o
+blake2s-x86_64-y := blake2s-core.o blake2s-glue.o
 
-# These modules require assembler to support AVX2.
-ifeq ($(avx2_supported),yes)
-	obj-$(CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64) += camellia-aesni-avx2.o
-	obj-$(CONFIG_CRYPTO_SERPENT_AVX2_X86_64) += serpent-avx2.o
-endif
+obj-$(CONFIG_CRYPTO_GHASH_CLMUL_NI_INTEL) += ghash-clmulni-intel.o
+ghash-clmulni-intel-y := ghash-clmulni-intel_asm.o ghash-clmulni-intel_glue.o
 
-twofish-i586-y := twofish-i586-asm_32.o twofish_glue.o
-serpent-sse2-i586-y := serpent-sse2-i586-asm_32.o serpent_sse2_glue.o
+obj-$(CONFIG_CRYPTO_CRC32C_INTEL) += crc32c-intel.o
+crc32c-intel-y := crc32c-intel_glue.o
+crc32c-intel-$(CONFIG_64BIT) += crc32c-pcl-intel-asm_64.o
 
-des3_ede-x86_64-y := des3_ede-asm_64.o des3_ede_glue.o
-camellia-x86_64-y := camellia-x86_64-asm_64.o camellia_glue.o
-blowfish-x86_64-y := blowfish-x86_64-asm_64.o blowfish_glue.o
-twofish-x86_64-y := twofish-x86_64-asm_64.o twofish_glue.o
-twofish-x86_64-3way-y := twofish-x86_64-asm_64-3way.o twofish_glue_3way.o
-chacha-x86_64-y := chacha-ssse3-x86_64.o chacha_glue.o
-serpent-sse2-x86_64-y := serpent-sse2-x86_64-asm_64.o serpent_sse2_glue.o
+obj-$(CONFIG_CRYPTO_CRC32_PCLMUL) += crc32-pclmul.o
+crc32-pclmul-y := crc32-pclmul_asm.o crc32-pclmul_glue.o
 
-aegis128-aesni-y := aegis128-aesni-asm.o aegis128-aesni-glue.o
+obj-$(CONFIG_CRYPTO_CRCT10DIF_PCLMUL) += crct10dif-pclmul.o
+crct10dif-pclmul-y := crct10dif-pcl-asm_64.o crct10dif-pclmul_glue.o
 
-nhpoly1305-sse2-y := nh-sse2-x86_64.o nhpoly1305-sse2-glue.o
-blake2s-x86_64-y := blake2s-core.o blake2s-glue.o
+obj-$(CONFIG_CRYPTO_POLY1305_X86_64) += poly1305-x86_64.o
 poly1305-x86_64-y := poly1305-x86_64-cryptogams.o poly1305_glue.o
 ifneq ($(CONFIG_CRYPTO_POLY1305_X86_64),)
 targets += poly1305-x86_64-cryptogams.S
 endif
 
-ifeq ($(avx_supported),yes)
-	camellia-aesni-avx-x86_64-y := camellia-aesni-avx-asm_64.o \
-					camellia_aesni_avx_glue.o
-	cast5-avx-x86_64-y := cast5-avx-x86_64-asm_64.o cast5_avx_glue.o
-	cast6-avx-x86_64-y := cast6-avx-x86_64-asm_64.o cast6_avx_glue.o
-	twofish-avx-x86_64-y := twofish-avx-x86_64-asm_64.o \
-				twofish_avx_glue.o
-	serpent-avx-x86_64-y := serpent-avx-x86_64-asm_64.o \
-				serpent_avx_glue.o
-endif
-
-ifeq ($(avx2_supported),yes)
-	camellia-aesni-avx2-y := camellia-aesni-avx2-asm_64.o camellia_aesni_avx2_glue.o
-	chacha-x86_64-y += chacha-avx2-x86_64.o
-	serpent-avx2-y := serpent-avx2-asm_64.o serpent_avx2_glue.o
-
-	nhpoly1305-avx2-y := nh-avx2-x86_64.o nhpoly1305-avx2-glue.o
-endif
-
-ifeq ($(avx512_supported),yes)
-	chacha-x86_64-y += chacha-avx512vl-x86_64.o
-endif
+obj-$(CONFIG_CRYPTO_NHPOLY1305_SSE2) += nhpoly1305-sse2.o
+nhpoly1305-sse2-y := nh-sse2-x86_64.o nhpoly1305-sse2-glue.o
+obj-$(CONFIG_CRYPTO_NHPOLY1305_AVX2) += nhpoly1305-avx2.o
+nhpoly1305-avx2-y := nh-avx2-x86_64.o nhpoly1305-avx2-glue.o
 
-aesni-intel-y := aesni-intel_asm.o aesni-intel_glue.o
-aesni-intel-$(CONFIG_64BIT) += aesni-intel_avx-x86_64.o aes_ctrby8_avx-x86_64.o
-ghash-clmulni-intel-y := ghash-clmulni-intel_asm.o ghash-clmulni-intel_glue.o
-sha1-ssse3-y := sha1_ssse3_asm.o sha1_ssse3_glue.o
-ifeq ($(avx2_supported),yes)
-sha1-ssse3-y += sha1_avx2_x86_64_asm.o
-endif
-ifeq ($(sha1_ni_supported),yes)
-sha1-ssse3-y += sha1_ni_asm.o
-endif
-crc32c-intel-y := crc32c-intel_glue.o
-crc32c-intel-$(CONFIG_64BIT) += crc32c-pcl-intel-asm_64.o
-crc32-pclmul-y := crc32-pclmul_asm.o crc32-pclmul_glue.o
-sha256-ssse3-y := sha256-ssse3-asm.o sha256-avx-asm.o sha256-avx2-asm.o sha256_ssse3_glue.o
-ifeq ($(sha256_ni_supported),yes)
-sha256-ssse3-y += sha256_ni_asm.o
-endif
-sha512-ssse3-y := sha512-ssse3-asm.o sha512-avx-asm.o sha512-avx2-asm.o sha512_ssse3_glue.o
-crct10dif-pclmul-y := crct10dif-pcl-asm_64.o crct10dif-pclmul_glue.o
+obj-$(CONFIG_CRYPTO_CURVE25519_X86) += curve25519-x86_64.o
 
 quiet_cmd_perlasm = PERLASM $@
       cmd_perlasm = $(PERL) $< > $@
diff --git a/crypto/Kconfig b/crypto/Kconfig
index c24a47406f8f..f621fbd6c79c 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -267,7 +267,7 @@ config CRYPTO_CURVE25519
 
 config CRYPTO_CURVE25519_X86
 	tristate "x86_64 accelerated Curve25519 scalar multiplication library"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_ADX
 	select CRYPTO_LIB_CURVE25519_GENERIC
 	select CRYPTO_ARCH_HAVE_LIB_CURVE25519
 
@@ -465,7 +465,7 @@ config CRYPTO_NHPOLY1305_SSE2
 
 config CRYPTO_NHPOLY1305_AVX2
 	tristate "NHPoly1305 hash function (x86_64 AVX2 implementation)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX2
 	select CRYPTO_NHPOLY1305
 	help
 	  AVX2 optimized implementation of the hash function used by the
@@ -683,7 +683,7 @@ config CRYPTO_BLAKE2S
 
 config CRYPTO_BLAKE2S_X86
 	tristate "BLAKE2s digest algorithm (x86 accelerated version)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX
 	select CRYPTO_LIB_BLAKE2S_GENERIC
 	select CRYPTO_ARCH_HAVE_LIB_BLAKE2S
 
@@ -869,7 +869,7 @@ config CRYPTO_SHA1
 
 config CRYPTO_SHA1_SSSE3
 	tristate "SHA1 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_SSSE3
 	select CRYPTO_SHA1
 	select CRYPTO_HASH
 	help
@@ -880,7 +880,7 @@ config CRYPTO_SHA1_SSSE3
 
 config CRYPTO_SHA256_SSSE3
 	tristate "SHA256 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_SSSE3
 	select CRYPTO_SHA256
 	select CRYPTO_HASH
 	help
@@ -892,7 +892,7 @@ config CRYPTO_SHA256_SSSE3
 
 config CRYPTO_SHA512_SSSE3
 	tristate "SHA512 digest algorithm (SSSE3/AVX/AVX2)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_SSSE3
 	select CRYPTO_SHA512
 	select CRYPTO_HASH
 	help
@@ -1283,7 +1283,7 @@ config CRYPTO_CAMELLIA_X86_64
 
 config CRYPTO_CAMELLIA_AESNI_AVX_X86_64
 	tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX
 	depends on CRYPTO
 	select CRYPTO_SKCIPHER
 	select CRYPTO_CAMELLIA_X86_64
@@ -1303,7 +1303,7 @@ config CRYPTO_CAMELLIA_AESNI_AVX_X86_64
 
 config CRYPTO_CAMELLIA_AESNI_AVX2_X86_64
 	tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX2
 	depends on CRYPTO
 	select CRYPTO_CAMELLIA_AESNI_AVX_X86_64
 	help
@@ -1350,7 +1350,7 @@ config CRYPTO_CAST5
 
 config CRYPTO_CAST5_AVX_X86_64
 	tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX
 	select CRYPTO_SKCIPHER
 	select CRYPTO_CAST5
 	select CRYPTO_CAST_COMMON
@@ -1372,7 +1372,7 @@ config CRYPTO_CAST6
 
 config CRYPTO_CAST6_AVX_X86_64
 	tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX
 	select CRYPTO_SKCIPHER
 	select CRYPTO_CAST6
 	select CRYPTO_CAST_COMMON
@@ -1472,7 +1472,7 @@ config CRYPTO_CHACHA20
 
 config CRYPTO_CHACHA20_X86_64
 	tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_SSSE3
 	select CRYPTO_SKCIPHER
 	select CRYPTO_LIB_CHACHA_GENERIC
 	select CRYPTO_ARCH_HAVE_LIB_CHACHA
@@ -1553,7 +1553,7 @@ config CRYPTO_SERPENT_SSE2_586
 
 config CRYPTO_SERPENT_AVX_X86_64
 	tristate "Serpent cipher algorithm (x86_64/AVX)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX
 	select CRYPTO_SKCIPHER
 	select CRYPTO_GLUE_HELPER_X86
 	select CRYPTO_SERPENT
@@ -1573,7 +1573,7 @@ config CRYPTO_SERPENT_AVX_X86_64
 
 config CRYPTO_SERPENT_AVX2_X86_64
 	tristate "Serpent cipher algorithm (x86_64/AVX2)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX2
 	select CRYPTO_SERPENT_AVX_X86_64
 	help
 	  Serpent cipher algorithm, by Anderson, Biham & Knudsen.
@@ -1705,7 +1705,7 @@ config CRYPTO_TWOFISH_X86_64_3WAY
 
 config CRYPTO_TWOFISH_AVX_X86_64
 	tristate "Twofish cipher algorithm (x86_64/AVX)"
-	depends on X86 && 64BIT
+	depends on X86 && 64BIT && AS_AVX
 	select CRYPTO_SKCIPHER
 	select CRYPTO_GLUE_HELPER_X86
 	select CRYPTO_SIMD
-- 
2.25.1


^ permalink raw reply	[flat|nested] 52+ messages in thread

* [PATCH RFC 3/3] crypto: curve25519 - do not pollute dispatcher based on assembler
  2020-03-21  0:49                 ` [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 1/3] x86: probe assembler instead of kconfig instead of makefile Jason A. Donenfeld
  2020-03-21  0:49                   ` [PATCH RFC 2/3] crypto: x86 - rework configuration based on Kconfig Jason A. Donenfeld
@ 2020-03-21  0:49                   ` Jason A. Donenfeld
  2 siblings, 0 replies; 52+ messages in thread
From: Jason A. Donenfeld @ 2020-03-21  0:49 UTC (permalink / raw)
  To: linux-kbuild, linux-kernel
  Cc: Jason A. Donenfeld, Linus Torvalds, Masahiro Yamada, x86, linux-crypto

Since we're doing a static inline dispatch here, we normally branch
based on whether or not there's an arch implementation. That would have
been fine in general, except the crypto Makefile prior used to turn
things off -- despite the Kconfig -- resulting in us needing to also
hard code various assembler things into the dispatcher too. The horror!
Now that the assembler config options are done by Kconfig, we can get
rid of the inconsistency.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
---
 include/crypto/curve25519.h | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/include/crypto/curve25519.h b/include/crypto/curve25519.h
index 9ecb3c1f0f15..4e6dc840b159 100644
--- a/include/crypto/curve25519.h
+++ b/include/crypto/curve25519.h
@@ -33,8 +33,7 @@ bool __must_check curve25519(u8 mypublic[CURVE25519_KEY_SIZE],
 			     const u8 secret[CURVE25519_KEY_SIZE],
 			     const u8 basepoint[CURVE25519_KEY_SIZE])
 {
-	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519) &&
-	    (!IS_ENABLED(CONFIG_CRYPTO_CURVE25519_X86) || IS_ENABLED(CONFIG_AS_ADX)))
+	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519))
 		curve25519_arch(mypublic, secret, basepoint);
 	else
 		curve25519_generic(mypublic, secret, basepoint);
@@ -50,8 +49,7 @@ __must_check curve25519_generate_public(u8 pub[CURVE25519_KEY_SIZE],
 				    CURVE25519_KEY_SIZE)))
 		return false;
 
-	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519) &&
-	    (!IS_ENABLED(CONFIG_CRYPTO_CURVE25519_X86) || IS_ENABLED(CONFIG_AS_ADX)))
+	if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CURVE25519))
 		curve25519_base_arch(pub, secret);
 	else
 		curve25519_generic(pub, secret, curve25519_base_point);
-- 
2.25.1


^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-03-20 23:53                 ` Jason A. Donenfeld
@ 2020-03-21 15:43                   ` Linus Torvalds
  0 siblings, 0 replies; 52+ messages in thread
From: Linus Torvalds @ 2020-03-21 15:43 UTC (permalink / raw)
  To: Jason A. Donenfeld
  Cc: Herbert Xu, Masahiro Yamada, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List

On Fri, Mar 20, 2020 at 4:54 PM Jason A. Donenfeld <Jason@zx2c4.com> wrote:
>
> Funny, I always thought it was like that "for a good reason" that I
> just didn't know about -- assumedly something having to do with a
> difference between config time and compile time.

No, there _is_ a "good reason", but it is simply "hysterical raisins".

All scripting used to be done in Makefiles, for the simple reason that
GNU make supported all those shell escapes. The Kconfig language did
not.

The whole "shell escape in Kconfig" is relatively recent, and so we
still have old code (and people) used to the build-time makefile rules
rather than those newfangled Kconfig things.

Of course "relatively recent" is about two years by now. It's not like
we did it yesterday.

Anyway, your conversion patches look fine to me. I'm obviously not
taking them for 5.6, but if they go into -next and get some testing,
I'd love to have that cleanup in 5.7.

                 Linus

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.6
  2020-03-12 11:57             ` Herbert Xu
  2020-03-12 16:40               ` Linus Torvalds
  2020-03-12 17:05               ` [GIT PULL] Crypto Fixes for 5.6 pr-tracker-bot
@ 2020-03-23 22:54               ` Herbert Xu
  2020-03-23 23:05                 ` pr-tracker-bot
  2 siblings, 1 reply; 52+ messages in thread
From: Herbert Xu @ 2020-03-23 22:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a correctness bug in the ARM64 version of ChaCha
for lib/crypto used by WireGuard.

The following changes since commit 1579f1bc3b753d17a44de3457d5c6f4a5b14c752:

  crypto: x86/curve25519 - support assemblers with no adx support (2020-03-05 18:28:09 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to c8cfcb78c65877313cda7bcbace624d3dbd1f3b3:

  crypto: arm64/chacha - correctly walk through blocks (2020-03-20 14:35:27 +1100)

----------------------------------------------------------------
Jason A. Donenfeld (1):
      crypto: arm64/chacha - correctly walk through blocks

 arch/arm64/crypto/chacha-neon-glue.c   |  8 ++++----
 lib/crypto/chacha20poly1305-selftest.c | 11 ++++++++---
 2 files changed, 12 insertions(+), 7 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.6
  2020-03-23 22:54               ` Herbert Xu
@ 2020-03-23 23:05                 ` pr-tracker-bot
  0 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-03-23 23:05 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 24 Mar 2020 09:54:03 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/979e52ca0469fb38646bc51d26a0263a740c9f03

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Update for 5.7
  2020-01-28  5:03   ` [GIT PULL] Crypto Update for 5.6 Herbert Xu
  2020-01-29  0:30     ` pr-tracker-bot
@ 2020-04-01  4:27     ` Herbert Xu
  2020-04-01 22:35       ` pr-tracker-bot
  2020-06-01  2:45       ` [GIT PULL] Crypto Update for 5.8 Herbert Xu
  1 sibling, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2020-04-01  4:27 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Fix out-of-sync IVs in self-test for IPsec AEAD algorithms.

Algorithms:

- Use formally verified implementation of x86/curve25519.

Drivers:

- Enhance hwrng support in caam.
- Use crypto_engine for skcipher/aead/rsa/hash in caam.
- Add Xilinx AES driver.
- Add uacce driver.
- Register zip engine to uacce in hisilicon.
- Add support for OCTEON TX CPT engine in marvell.

The following changes since commit bb6d3fb354c5ee8d6bde2d576eb7220ea09862b9:

  Linux 5.6-rc1 (2020-02-09 16:08:48 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to fcb90d51c375d09a034993cda262b68499e233a4:

  crypto: af_alg - bool type cosmetics (2020-03-30 11:50:50 +1100)

----------------------------------------------------------------
Al Viro (1):
      crypto: chelsio - Endianess bug in create_authenc_wr

Andrei Botila (2):
      crypto: caam - update xts sector size for large input length
      bus: fsl-mc: add api to retrieve mc version

Andrey Smirnov (8):
      crypto: caam - allocate RNG instantiation descriptor with GFP_DMA
      crypto: caam - use struct hwrng's .init for initialization
      crypto: caam - drop global context pointer and init_done
      crypto: caam - simplify RNG implementation
      crypto: caam - check if RNG job failed
      crypto: caam - invalidate entropy register during RNG initialization
      crypto: caam - enable prediction resistance in HRWNG
      crypto: caam - limit single JD RNG output to maximum of 16 bytes

Ayush Sawal (5):
      crypto: chelsio - This fixes the libkcapi's cbc(aes) aio fail test cases
      crypto: chelsio - This fixes the kernel panic which occurs during a libkcapi test
      MAINTAINERS: Update maintainers for chelsio crypto drivers
      crypto: chelsio - Recalculate iv only if it is needed
      crypto: chelsio - Use multiple txq/rxq per tfm to process the requests

Chen Zhou (1):
      crypto: allwinner - remove redundant platform_get_irq error message

Colin Ian King (1):
      crypto: hisilicon - remove redundant assignment of pointer ctx

Connor Kuehl (1):
      crypto: ccp - use file mode for sev ioctl permissions

Corentin Labbe (3):
      crypto: arm64/sha-ce - implement export/import
      crypto: sun8i-ss - fix description of stat_fb
      crypto: sun8i-ce - fix description of stat_fb

Dan Carpenter (1):
      crypto: rng - Fix a refcounting bug in crypto_rng_reset()

Daniel Jordan (1):
      padata: fix uninitialized return value in padata_replace()

Devulapally Shiva Krishna (2):
      crypto: chelsio - Print the chcr driver information while module load.
      crypto: chelsio - un-register crypto algorithms

Eneas U de Queiroz (4):
      crypto: qce - use cryptlen when adding extra sgl
      crypto: qce - use AES fallback for small requests
      crypto: qce - handle AES-XTS cases that qce fails
      crypto: qce - fix wrong config symbol reference

Eric Biggers (15):
      crypto: authencesn - fix weird comma-terminated line
      crypto: ccm - simplify error handling in crypto_rfc4309_create()
      crypto: cryptd - simplify error handling in cryptd_create_*()
      crypto: ctr - simplify error handling in crypto_rfc3686_create()
      crypto: cts - simplify error handling in crypto_cts_create()
      crypto: gcm - simplify error handling in crypto_rfc4106_create()
      crypto: gcm - simplify error handling in crypto_rfc4543_create()
      crypto: geniv - simply error handling in aead_geniv_alloc()
      crypto: lrw - simplify error handling in create()
      crypto: pcrypt - simplify error handling in pcrypt_create_aead()
      crypto: rsa-pkcs1pad - simplify error handling in pkcs1pad_create()
      crypto: xts - simplify error handling in ->create()
      crypto: testmgr - use consistent IV copies for AEADs that need it
      crypto: testmgr - do comparison tests before inauthentic input tests
      crypto: aead - improve documentation for scatterlist layout

Geert Uytterhoeven (35):
      debugfs: regset32: Add Runtime PM support
      crypto: ccree - fix debugfs register access while suspended
      crypto: ccree - fix retry handling in cc_send_sync_request()
      crypto: ccree - remove unneeded casts
      crypto: ccree - swap SHA384 and SHA512 larval hashes at build time
      crypto: ccree - drop duplicated error message on SRAM exhaustion
      crypto: ccree - remove empty cc_sram_mgr_fini()
      crypto: ccree - clean up clock handling
      crypto: ccree - make mlli_params.mlli_virt_addr void *
      crypto: ccree - use existing helpers to split 64-bit addresses
      crypto: ccree - defer larval_digest_addr init until needed
      crypto: ccree - remove bogus paragraph about freeing SRAM
      crypto: ccree - use u32 for SRAM addresses
      crypto: ccree - simplify Runtime PM handling
      crypto: ccree - use of_device_get_match_data()
      crypto: ccree - remove cc_pm_is_dev_suspended() wrapper
      crypto: ccree - make cc_pm_{suspend,resume}() static
      crypto: ccree - remove struct cc_sram_ctx
      crypto: ccree - remove struct cc_debugfs_ctx
      crypto: ccree - remove struct buff_mgr_handle
      crypto: ccree - remove struct cc_cipher_handle
      crypto: ccree - extract cc_init_copy_sram()
      crypto: ccree - remove bogus kerneldoc markers
      crypto: ccree - improve kerneldoc in cc_hw_queue_defs.h
      crypto: ccree - improve kerneldoc in cc_buffer_mgr.c
      crypto: ccree - improve kerneldoc in cc_hash.[ch]
      crypto: ccree - improve kerneldoc in cc_request_mgr.[ch]
      crypto: ccree - improve kerneldoc in cc_sram_mgr.[ch]
      crypto: ccree - spelling s/Crytpcell/Cryptocell/
      crypto: ccree - grammar s/not room/no room/
      crypto: ccree - use existing dev helper in init_cc_resources()
      crypto: ccree - use devm_k[mz]alloc() for AEAD data
      crypto: ccree - use devm_k[mz]alloc() for cipher data
      crypto: ccree - use devm_kzalloc() for hash data
      crypto: qat - spelling s/Decrytp/Decrypt/

Gilad Ben-Yossef (9):
      crypto: ccree - protect against empty or NULL scatterlists
      crypto: ccree - only try to map auth tag if needed
      crypto: ccree - fix some reported cipher block sizes
      crypto: ccree - fix AEAD blocksize registration
      crypto: ccree - dec auth tag size from cryptlen map
      crypto: ccree - remove ancient TODO remarks
      crypto: ccree - only check condition if needed
      crypto: ccree - use crypto_ipsec_check_assoclen()
      crypto: ccree - refactor AEAD IV in AAD handling

Gustavo A. R. Silva (3):
      crypto: img-hash - Replace zero-length array with flexible-array member
      crypto: s5p-sss - Replace zero-length array with flexible-array member
      crypto: Replace zero-length array with flexible-array member

Hadar Gat (2):
      crypto: ccree - update register handling macros
      crypto: ccree - remove pointless comment

Herbert Xu (1):
      hwrng: omap3-rom - Include linux/io.h for virt_to_phys

Hongbo Yao (1):
      crypto: hisilicon - qm depends on UACCE

Horia Geantă (2):
      crypto: tcrypt - fix printed skcipher [a]sync mode
      crypto: caam/qi2 - fix chacha20 data size error

Hui Tang (1):
      crypto: hisilicon/hpre - Optimize finding hpre device process

Iuliana Prodan (9):
      crypto: caam - refactor skcipher/aead/gcm/chachapoly {en,de}crypt functions
      crypto: caam - refactor ahash_done callbacks
      crypto: caam - refactor ahash_edesc_alloc
      crypto: caam - refactor RSA private key _done callbacks
      crypto: caam - change return code in caam_jr_enqueue function
      crypto: caam - support crypto_engine framework for SKCIPHER algorithms
      crypto: caam - add crypto_engine support for AEAD algorithms
      crypto: caam - add crypto_engine support for RSA algorithms
      crypto: caam - add crypto_engine support for HASH algorithms

Jason A. Donenfeld (3):
      crypto: x86/curve25519 - replace with formally verified implementation
      crypto: x86/curve25519 - leave r12 as spare register
      crypto: arm[64]/poly1305 - add artifact to .gitignore files

Jianhui Zhao (1):
      crypto: atmel-i2c - Fix wakeup fail

John Allen (2):
      crypto: ccp - Cleanup misc_dev on sev_exit()
      crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy()

Kai Ye (1):
      crypto: hisilicon/sec2 - Add new create qp process

Kalyani Akula (3):
      firmware: xilinx: Add ZynqMP aes API for AES functionality
      dt-bindings: crypto: Add bindings for ZynqMP AES-GCM driver
      crypto: xilinx - Add Xilinx AES driver

Kenneth Lee (2):
      uacce: Add documents for uacce
      uacce: add uacce driver

Longfang Liu (3):
      crypto: hisilicon/sec2 - Add iommu status check
      crypto: hisilicon/sec2 - Update IV and MAC operation
      crypto: hisilicon/sec2 - Add pbuffer mode for SEC driver

Lothar Rubusch (1):
      crypto: af_alg - bool type cosmetics

Martin Kaiser (5):
      hwrng: imx-rngc - fix an error path
      hwrng: imx-rngc - use automatic seeding
      hwrng: imx-rngc - (trivial) simplify error prints
      hwrng: imx-rngc - check the rng type
      hwrng: imx-rngc - simplify interrupt mask/unmask

Matteo Croce (1):
      crypto: arm64/poly1305 - ignore build files

Randy Dunlap (1):
      hwrng: ks-sa - move TI Keystone driver into the config menu structure

Rosioru Dragos (1):
      crypto: mxs-dcp - fix scatterlist linearization for hash

Shukun Tan (6):
      crypto: hisilicon - Unify hardware error init/uninit into QM
      crypto: hisilicon - Configure zip RAS error type
      crypto: hisilicon - Unify error detect process into qm
      crypto: hisilicon - Fix duplicate print when qm occur multiple errors
      crypto: hisilicon - Use one workqueue per qm instead of per qp
      crypto: hisilicon/zip - Use hisi_qm_alloc_qps_node() when init ctx

SrujanaChalla (4):
      crypto: marvell - create common Kconfig and Makefile for Marvell
      crypto: marvell - add support for OCTEON TX CPT engine
      crypto: marvell - add the Virtual Function driver for CPT
      crypto: marvell - enable OcteonTX cpt options for build

Stefan Agner (1):
      crypto: arm/ghash-ce - define fpu before fpu registers are referenced

Stephen Kitt (1):
      crypto: chelsio - remove extra allocation for chtls_dev

Takashi Iwai (1):
      crypto: bcm - Use scnprintf() for avoiding potential buffer overflow

Tianjia Zhang (2):
      crypto: proc - simplify the c_show function
      crypto: qat - simplify the qat_crypto function

Torsten Duwe (1):
      crypto: arm/neon - memzero_explicit aes-cbc key

Uwe Kleine-König (1):
      hwrng: imx-rngc - improve dependencies

Valentin Ciocoi Radulescu (1):
      crypto: caam/qi - optimize frame queue cleanup

Vinay Kumar Yadav (2):
      crypto: chelsio/chtls - Fixed tls stats
      crypto: chelsio/chtls - Fixed boolinit.cocci warning

Weili Qian (1):
      crypto: hisilicon/qm - Put device finding logic into QM

Ye Kai (1):
      crypto: hisilicon/sec2 - Add workqueue for SEC driver.

YueHaibing (4):
      crypto: ccree - remove set but not used variable 'du_size'
      crypto: md5 - remove unused macros
      crypto: chelsio - remove set but not used variable 'adap'
      crypto: ccree - remove duplicated include from cc_aead.c

Zhangfei Gao (4):
      crypto: hisilicon - Remove module_param uacce_mode
      crypto: hisilicon - register zip engine to uacce
      MAINTAINERS: add maintainers for uacce
      uacce: unmap remaining mmapping from user space

 Documentation/ABI/testing/sysfs-driver-uacce       |   39 +
 .../bindings/crypto/xlnx,zynqmp-aes.yaml           |   37 +
 Documentation/misc-devices/uacce.rst               |  176 +
 MAINTAINERS                                        |   17 +-
 arch/arm/crypto/.gitignore                         |    1 +
 arch/arm/crypto/aes-neonbs-glue.c                  |    1 +
 arch/arm/crypto/ghash-ce-core.S                    |    5 +-
 arch/arm64/crypto/.gitignore                       |    1 +
 arch/arm64/crypto/aes-neonbs-glue.c                |    1 +
 arch/arm64/crypto/sha1-ce-glue.c                   |   20 +
 arch/arm64/crypto/sha2-ce-glue.c                   |   23 +
 arch/x86/crypto/curve25519-x86_64.c                | 3546 +++++++-------------
 crypto/af_alg.c                                    |   10 +-
 crypto/algif_hash.c                                |    6 +-
 crypto/authencesn.c                                |    2 +-
 crypto/ccm.c                                       |   29 +-
 crypto/cryptd.c                                    |   37 +-
 crypto/ctr.c                                       |   29 +-
 crypto/cts.c                                       |   27 +-
 crypto/gcm.c                                       |   66 +-
 crypto/geniv.c                                     |   17 +-
 crypto/lrw.c                                       |   28 +-
 crypto/md5.c                                       |    3 -
 crypto/pcrypt.c                                    |   33 +-
 crypto/proc.c                                      |    2 +-
 crypto/rng.c                                       |    8 +-
 crypto/rsa-pkcs1pad.c                              |   59 +-
 crypto/tcrypt.c                                    |    4 +-
 crypto/testmgr.c                                   |   28 +-
 crypto/xts.c                                       |   28 +-
 drivers/bus/fsl-mc/fsl-mc-bus.c                    |   33 +-
 drivers/char/hw_random/Kconfig                     |   17 +-
 drivers/char/hw_random/imx-rngc.c                  |   85 +-
 drivers/char/hw_random/omap3-rom-rng.c             |    1 +
 drivers/crypto/Kconfig                             |   50 +-
 drivers/crypto/Makefile                            |    3 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |    4 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |    2 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h       |    2 +-
 drivers/crypto/atmel-i2c.c                         |    3 +-
 drivers/crypto/bcm/util.c                          |   40 +-
 drivers/crypto/caam/Kconfig                        |    2 +
 drivers/crypto/caam/caamalg.c                      |  415 +--
 drivers/crypto/caam/caamalg_desc.c                 |   30 +-
 drivers/crypto/caam/caamalg_qi.c                   |    4 +-
 drivers/crypto/caam/caamalg_qi2.h                  |    6 +-
 drivers/crypto/caam/caamhash.c                     |  340 +-
 drivers/crypto/caam/caampkc.c                      |  185 +-
 drivers/crypto/caam/caampkc.h                      |   10 +
 drivers/crypto/caam/caamrng.c                      |  405 +--
 drivers/crypto/caam/ctrl.c                         |   88 +-
 drivers/crypto/caam/desc.h                         |    2 +
 drivers/crypto/caam/intern.h                       |    9 +-
 drivers/crypto/caam/jr.c                           |   49 +-
 drivers/crypto/caam/key_gen.c                      |    2 +-
 drivers/crypto/caam/qi.c                           |   60 +-
 drivers/crypto/caam/qi.h                           |    4 +-
 drivers/crypto/caam/regs.h                         |    7 +-
 drivers/crypto/cavium/nitrox/nitrox_main.c         |    2 +-
 drivers/crypto/ccp/psp-dev.c                       |    3 +
 drivers/crypto/ccp/sev-dev.c                       |   39 +-
 drivers/crypto/ccp/sp-dev.h                        |    1 +
 drivers/crypto/ccp/sp-pci.c                        |    9 +
 drivers/crypto/ccree/cc_aead.c                     |  176 +-
 drivers/crypto/ccree/cc_aead.h                     |    3 +-
 drivers/crypto/ccree/cc_buffer_mgr.c               |  229 +-
 drivers/crypto/ccree/cc_buffer_mgr.h               |    5 +-
 drivers/crypto/ccree/cc_cipher.c                   |   78 +-
 drivers/crypto/ccree/cc_debugfs.c                  |   29 +-
 drivers/crypto/ccree/cc_driver.c                   |  127 +-
 drivers/crypto/ccree/cc_driver.h                   |   18 +-
 drivers/crypto/ccree/cc_hash.c                     |  228 +-
 drivers/crypto/ccree/cc_hash.h                     |   31 +-
 drivers/crypto/ccree/cc_hw_queue_defs.h            |  332 +-
 drivers/crypto/ccree/cc_pm.c                       |   60 +-
 drivers/crypto/ccree/cc_pm.h                       |   21 -
 drivers/crypto/ccree/cc_request_mgr.c              |   48 +-
 drivers/crypto/ccree/cc_request_mgr.h              |   19 +-
 drivers/crypto/ccree/cc_sram_mgr.c                 |   78 +-
 drivers/crypto/ccree/cc_sram_mgr.h                 |   45 +-
 drivers/crypto/chelsio/chcr_algo.c                 |  358 +-
 drivers/crypto/chelsio/chcr_core.c                 |    3 +
 drivers/crypto/chelsio/chcr_core.h                 |    6 +-
 drivers/crypto/chelsio/chcr_crypto.h               |   16 +-
 drivers/crypto/chelsio/chtls/chtls_io.c            |    7 +-
 drivers/crypto/chelsio/chtls/chtls_main.c          |   10 +-
 drivers/crypto/hisilicon/Kconfig                   |    2 +
 drivers/crypto/hisilicon/hpre/hpre.h               |    3 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   20 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |  160 +-
 drivers/crypto/hisilicon/qm.c                      |  619 +++-
 drivers/crypto/hisilicon/qm.h                      |   72 +-
 drivers/crypto/hisilicon/sec2/sec.h                |   12 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |  260 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |  294 +-
 drivers/crypto/hisilicon/zip/zip.h                 |    2 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   54 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |  324 +-
 drivers/crypto/img-hash.c                          |    2 +-
 drivers/crypto/marvell/Kconfig                     |   37 +
 drivers/crypto/marvell/Makefile                    |    7 +-
 drivers/crypto/marvell/cesa/Makefile               |    3 +
 drivers/crypto/marvell/{ => cesa}/cesa.c           |    0
 drivers/crypto/marvell/{ => cesa}/cesa.h           |    5 +-
 drivers/crypto/marvell/{ => cesa}/cipher.c         |   15 +-
 drivers/crypto/marvell/{ => cesa}/hash.c           |   38 +-
 drivers/crypto/marvell/{ => cesa}/tdma.c           |   10 +-
 drivers/crypto/marvell/octeontx/Makefile           |    6 +
 drivers/crypto/marvell/octeontx/otx_cpt_common.h   |   51 +
 drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h |  824 +++++
 drivers/crypto/marvell/octeontx/otx_cptpf.h        |   34 +
 drivers/crypto/marvell/octeontx/otx_cptpf_main.c   |  307 ++
 drivers/crypto/marvell/octeontx/otx_cptpf_mbox.c   |  253 ++
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c  | 1686 ++++++++++
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h  |  180 +
 drivers/crypto/marvell/octeontx/otx_cptvf.h        |  104 +
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   | 1744 ++++++++++
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.h   |  188 ++
 drivers/crypto/marvell/octeontx/otx_cptvf_main.c   |  985 ++++++
 drivers/crypto/marvell/octeontx/otx_cptvf_mbox.c   |  247 ++
 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.c |  612 ++++
 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.h |  227 ++
 drivers/crypto/mediatek/mtk-sha.c                  |    2 +-
 drivers/crypto/mxs-dcp.c                           |   58 +-
 drivers/crypto/nx/nx.h                             |    2 +-
 drivers/crypto/omap-sham.c                         |    4 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |    2 +-
 drivers/crypto/qat/qat_common/qat_crypto.c         |    3 +-
 drivers/crypto/qce/common.c                        |    2 -
 drivers/crypto/qce/common.h                        |    3 +
 drivers/crypto/qce/dma.c                           |   11 +-
 drivers/crypto/qce/dma.h                           |    2 +-
 drivers/crypto/qce/skcipher.c                      |   30 +-
 drivers/crypto/s5p-sss.c                           |    2 +-
 drivers/crypto/xilinx/Makefile                     |    2 +
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |  457 +++
 drivers/firmware/xilinx/zynqmp.c                   |   25 +
 drivers/misc/Kconfig                               |    1 +
 drivers/misc/Makefile                              |    1 +
 drivers/misc/uacce/Kconfig                         |   13 +
 drivers/misc/uacce/Makefile                        |    2 +
 drivers/misc/uacce/uacce.c                         |  633 ++++
 fs/debugfs/file.c                                  |    8 +
 include/crypto/aead.h                              |   48 +-
 include/crypto/if_alg.h                            |    2 +-
 include/linux/debugfs.h                            |    1 +
 include/linux/firmware/xlnx-zynqmp.h               |    2 +
 include/linux/fsl/mc.h                             |   16 +
 include/linux/uacce.h                              |  163 +
 include/uapi/misc/uacce/hisi_qm.h                  |   23 +
 include/uapi/misc/uacce/uacce.h                    |   38 +
 kernel/padata.c                                    |    9 +-
 152 files changed, 13777 insertions(+), 5297 deletions(-)
 create mode 100644 Documentation/ABI/testing/sysfs-driver-uacce
 create mode 100644 Documentation/devicetree/bindings/crypto/xlnx,zynqmp-aes.yaml
 create mode 100644 Documentation/misc-devices/uacce.rst
 create mode 100644 drivers/crypto/marvell/Kconfig
 create mode 100644 drivers/crypto/marvell/cesa/Makefile
 rename drivers/crypto/marvell/{ => cesa}/cesa.c (100%)
 rename drivers/crypto/marvell/{ => cesa}/cesa.h (99%)
 rename drivers/crypto/marvell/{ => cesa}/cipher.c (98%)
 rename drivers/crypto/marvell/{ => cesa}/hash.c (98%)
 rename drivers/crypto/marvell/{ => cesa}/tdma.c (97%)
 create mode 100644 drivers/crypto/marvell/octeontx/Makefile
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cpt_common.h
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptpf.h
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptpf_main.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptpf_mbox.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf.h
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf_algs.h
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf_main.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf_mbox.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.c
 create mode 100644 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.h
 create mode 100644 drivers/crypto/xilinx/Makefile
 create mode 100644 drivers/crypto/xilinx/zynqmp-aes-gcm.c
 create mode 100644 drivers/misc/uacce/Kconfig
 create mode 100644 drivers/misc/uacce/Makefile
 create mode 100644 drivers/misc/uacce/uacce.c
 create mode 100644 include/linux/uacce.h
 create mode 100644 include/uapi/misc/uacce/hisi_qm.h
 create mode 100644 include/uapi/misc/uacce/uacce.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.7
  2020-04-01  4:27     ` [GIT PULL] Crypto Update for 5.7 Herbert Xu
@ 2020-04-01 22:35       ` pr-tracker-bot
  2020-06-01  2:45       ` [GIT PULL] Crypto Update for 5.8 Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-04-01 22:35 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 1 Apr 2020 15:27:21 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/72f35423e8a6a2451c202f52cb8adb92b08592ec

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.7
  2020-02-13  3:32         ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
  2020-02-13 22:40           ` pr-tracker-bot
  2020-02-24  6:00           ` Herbert Xu
@ 2020-04-08  6:15           ` Herbert Xu
  2020-04-09  4:55             ` pr-tracker-bot
                               ` (2 more replies)
  2 siblings, 3 replies; 52+ messages in thread
From: Herbert Xu @ 2020-04-08  6:15 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a Kconfig dependency for hisilicon as well as a
double free in marvell/octeontx.

The following changes since commit fcb90d51c375d09a034993cda262b68499e233a4:

  crypto: af_alg - bool type cosmetics (2020-03-30 11:50:50 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 755bddd1e4eaf9178758bd554c60aaab46fc42ba:

  crypto: marvell/octeontx - fix double free of ptr (2020-04-03 15:37:26 +1100)

----------------------------------------------------------------
Colin Ian King (1):
      crypto: marvell/octeontx - fix double free of ptr

YueHaibing (1):
      crypto: hisilicon - Fix build error

 drivers/crypto/hisilicon/Kconfig                 | 2 ++
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 8 +++++---
 2 files changed, 7 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.7
  2020-04-08  6:15           ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
@ 2020-04-09  4:55             ` pr-tracker-bot
  2020-04-29  5:54             ` Herbert Xu
  2020-06-11  4:05             ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
  2 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-04-09  4:55 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 8 Apr 2020 16:15:13 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8fc9cde85d829eed6ca050d86799cc4cfa6a048

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.7
  2020-04-08  6:15           ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
  2020-04-09  4:55             ` pr-tracker-bot
@ 2020-04-29  5:54             ` Herbert Xu
  2020-04-29 16:50               ` pr-tracker-bot
  2020-05-06  5:10               ` Herbert Xu
  2020-06-11  4:05             ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
  2 siblings, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2020-04-29  5:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bunch of bugs detected by KASAN in the caam driver.

The following changes since commit 8f3d9f354286745c751374f5f1fcafee6b3f3136:

  Linux 5.7-rc1 (2020-04-12 12:35:55 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 55b3209acbb01cb02b1ee6b1afe80d83b1aab36d:

  crypto: caam - fix the address of the last entry of S/G (2020-04-16 16:48:56 +1000)

----------------------------------------------------------------
Iuliana Prodan (5):
      crypto: caam - fix use-after-free KASAN issue for SKCIPHER algorithms
      crypto: caam - fix use-after-free KASAN issue for AEAD algorithms
      crypto: caam - fix use-after-free KASAN issue for HASH algorithms
      crypto: caam - fix use-after-free KASAN issue for RSA algorithms
      crypto: caam - fix the address of the last entry of S/G

 drivers/crypto/caam/caamalg.c  | 10 +++++++---
 drivers/crypto/caam/caamhash.c |  8 ++++++--
 drivers/crypto/caam/caampkc.c  |  8 ++++++--
 3 files changed, 19 insertions(+), 7 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.7
  2020-04-29  5:54             ` Herbert Xu
@ 2020-04-29 16:50               ` pr-tracker-bot
  2020-05-06  5:10               ` Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-04-29 16:50 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 29 Apr 2020 15:54:20 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6c3efdc911b67816285719bd610152232cf5e8e4

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.7
  2020-04-29  5:54             ` Herbert Xu
  2020-04-29 16:50               ` pr-tracker-bot
@ 2020-05-06  5:10               ` Herbert Xu
  2020-05-06 17:25                 ` pr-tracker-bot
  1 sibling, 1 reply; 52+ messages in thread
From: Herbert Xu @ 2020-05-06  5:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a potential scheduling latency problem for the
algorithms used by WireGuard.

The following changes since commit 55b3209acbb01cb02b1ee6b1afe80d83b1aab36d:

  crypto: caam - fix the address of the last entry of S/G (2020-04-16 16:48:56 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to a9a8ba90fa5857c2c8a0e32eef2159cec717da11:

  crypto: arch/nhpoly1305 - process in explicit 4k chunks (2020-04-30 15:16:59 +1000)

----------------------------------------------------------------
Jason A. Donenfeld (2):
      crypto: arch/lib - limit simd usage to 4k chunks
      crypto: arch/nhpoly1305 - process in explicit 4k chunks

 arch/arm/crypto/chacha-glue.c            | 14 +++++++++++---
 arch/arm/crypto/nhpoly1305-neon-glue.c   |  2 +-
 arch/arm/crypto/poly1305-glue.c          | 15 +++++++++++----
 arch/arm64/crypto/chacha-neon-glue.c     | 14 +++++++++++---
 arch/arm64/crypto/nhpoly1305-neon-glue.c |  2 +-
 arch/arm64/crypto/poly1305-glue.c        | 15 +++++++++++----
 arch/x86/crypto/blake2s-glue.c           | 10 ++++------
 arch/x86/crypto/chacha_glue.c            | 14 +++++++++++---
 arch/x86/crypto/nhpoly1305-avx2-glue.c   |  2 +-
 arch/x86/crypto/nhpoly1305-sse2-glue.c   |  2 +-
 arch/x86/crypto/poly1305_glue.c          | 13 ++++++-------
 11 files changed, 69 insertions(+), 34 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.7
  2020-05-06  5:10               ` Herbert Xu
@ 2020-05-06 17:25                 ` pr-tracker-bot
  0 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-05-06 17:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 6 May 2020 15:10:06 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3c40cdb0e93ec166f1fa4fee1eb62d45b5451515

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Update for 5.8
  2020-04-01  4:27     ` [GIT PULL] Crypto Update for 5.7 Herbert Xu
  2020-04-01 22:35       ` pr-tracker-bot
@ 2020-06-01  2:45       ` Herbert Xu
  2020-06-01 19:35         ` pr-tracker-bot
  1 sibling, 1 reply; 52+ messages in thread
From: Herbert Xu @ 2020-06-01  2:45 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Introduce crypto_shash_tfm_digest() and use it wherever possible.
- Fix use-after-free and race in crypto_spawn_alg.
- Add support for parallel and batch requests to crypto_engine.

Algorithms:

- Update jitter RNG for SP800-90B compliance.
- Always use jitter RNG as seed in drbg.

Drivers:

- Add Arm CryptoCell driver cctrng.
- Add support for SEV-ES to the PSP driver in ccp.

The following changes since commit 55b3209acbb01cb02b1ee6b1afe80d83b1aab36d:

  crypto: caam - fix the address of the last entry of S/G (2020-04-16 16:48:56 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 58ca0060ec4e51208d2eee12198fc55fd9e4feb3:

  crypto: hisilicon - fix driver compatibility issue with different versions of devices (2020-05-28 17:27:52 +1000)

----------------------------------------------------------------
Andy Shevchenko (1):
      hwrng: optee - Use UUID API for exporting the UUID

Arnd Bergmann (3):
      crypto: ccp -- don't "select" CONFIG_DMADEVICES
      crypto - Avoid free() namespace collision
      crypto: blake2b - Fix clang optimization for ARMv7-M

Barry Song (1):
      crypto: acomp - search acomp with scomp backend in crypto_has_acomp

Christophe JAILLET (2):
      crypto: marvell/octeontx - Add missing '\n' in log messages
      crypto: cavium/nitrox - Fix a typo in a comment

Colin Ian King (2):
      crypto: chelsio - remove redundant assignment to variable error
      crypto: algif_rng - remove redundant assignment to variable err

Corentin Labbe (2):
      crypto: ctr - no longer needs CRYPTO_SEQIV
      crypto: drbg - should select CTR

Daniel Jordan (1):
      padata: add separate cpuhp node for CPUHP_PADATA_DEAD

Eric Biggers (29):
      crypto: algapi - Avoid spurious modprobe on LOADED
      crypto: lib/sha256 - return void
      crypto: hash - introduce crypto_shash_tfm_digest()
      crypto: arm64/aes-glue - use crypto_shash_tfm_digest()
      crypto: essiv - use crypto_shash_tfm_digest()
      crypto: artpec6 - use crypto_shash_tfm_digest()
      crypto: ccp - use crypto_shash_tfm_digest()
      crypto: ccree - use crypto_shash_tfm_digest()
      crypto: hisilicon/sec2 - use crypto_shash_tfm_digest()
      crypto: mediatek - use crypto_shash_tfm_digest()
      crypto: n2 - use crypto_shash_tfm_digest()
      crypto: omap-sham - use crypto_shash_tfm_digest()
      crypto: s5p-sss - use crypto_shash_tfm_digest()
      nfc: s3fwrn5: use crypto_shash_tfm_digest()
      fscrypt: use crypto_shash_tfm_digest()
      ecryptfs: use crypto_shash_tfm_digest()
      nfsd: use crypto_shash_tfm_digest()
      ubifs: use crypto_shash_tfm_digest()
      Bluetooth: use crypto_shash_tfm_digest()
      sctp: use crypto_shash_tfm_digest()
      KEYS: encrypted: use crypto_shash_tfm_digest()
      ASoC: cros_ec_codec: use crypto_shash_tfm_digest()
      mptcp: use SHA256_BLOCK_SIZE, not SHA_MESSAGE_BYTES
      crypto: powerpc/sha1 - remove unused temporary workspace
      crypto: powerpc/sha1 - prefix the "sha1_" functions
      crypto: s390/sha1 - prefix the "sha1_" functions
      crypto: lib/sha1 - rename "sha" to "sha1"
      crypto: lib/sha1 - remove unnecessary includes of linux/cryptohash.h
      crypto: lib/sha1 - fold linux/cryptohash.h into crypto/sha.h

Etienne Carriere (2):
      crypto: stm32/hash - defer probe for reset controller
      crypto: stm32/hash - defer probe for dma device

Hadar Gat (7):
      dt-bindings: add device tree binding for Arm CryptoCell trng engine
      hwrng: cctrng - introduce Arm CryptoCell driver
      MAINTAINERS: add HG as cctrng maintainer
      hwrng: cctrng - add missing include to linux/fips.h
      hwrng: cctrng - Add dependency on OF
      hwrng: cctrng - change default to n
      hwrng: cctrng - update help description

Hao Fang (1):
      crypto: hisilicon - add vfs_num module parameter for hpre/sec

Herbert Xu (4):
      crypto: api - Fix use-after-free and race in crypto_spawn_alg
      hwrng: cctrng - Add dependency on HAS_IOMEM
      hwrng: cctrng - Remove unnecessary FIPS ifdef
      Revert "ASoC: cros_ec_codec: use crypto_shash_tfm_digest()"

Hui Tang (2):
      crypto: hisilicon/hpre - add controller reset support for HPRE
      crypto: hisilicon/hpre - add debugfs for Hisilicon HPRE

Iuliana Prodan (4):
      crypto: algapi - create function to add request in front of queue
      crypto: engine - support for parallel requests based on retry mechanism
      crypto: engine - support for batch requests
      crypto: engine - do not requeue in case of fatal error

Kai Ye (1):
      crypto: hisilicon/sec2 - add debugfs for Hisilicon SEC

Lionel Debieve (1):
      crypto: stm32/hash - don't print error on probe deferral

Longfang Liu (6):
      crypto: hisilicon/sec2 - modify the SEC probe process
      crypto: hisilicon/hpre - modify the HPRE probe process
      crypto: hisilicon/zip - modify the ZIP probe process
      crypto: hisilicon/qm - add debugfs for QM
      crypto: hisilicon/qm - add debugfs to the QM state machine
      crypto: hisilicon/zip - add debugfs for Hisilicon ZIP

Mark Brown (1):
      crypto: arm64 - Consistently enable extension

Markus Elfring (3):
      hwrng: omap - Delete an error message in of_get_omap_rng_device_details()
      hwrng: xgene - Delete an error message in xgene_rng_probe()
      crypto: sun8i-ss - Delete an error message in sun8i_ss_probe()

Nathan Chancellor (1):
      lib/mpi: Fix 64-bit MIPS build with Clang

Nicolas Toromanoff (5):
      crypto: stm32/crc32 - fix ext4 chksum BUG_ON()
      crypto: stm32/crc32 - fix run-time self test issue.
      crypto: stm32/crc32 - fix multi-instance
      crypto: stm32/crc32 - don't sleep in runtime pm
      crypto: stm32/crc32 - protect from concurrent accesses

Rikard Falkeborn (4):
      crypto: ccree - constify struct debugfs_reg32
      crypto: hisilicon/hpre - constify struct debugfs_reg32
      crypto: hisilicon/zip - constify struct debugfs_reg32
      crypto: hisilicon/sec2 - constify sec_dfx_regs

Shukun Tan (12):
      crypto: hisilicon - put vfs_num into struct hisi_qm
      crypto: hisilicon - unify SR-IOV related codes into QM
      crypto: hisilicon/qm - add controller reset interface
      crypto: hisilicon/zip - add controller reset support for zip
      crypto: hisilicon/qm - fix build failure with ACPI off
      crypto: hisilicon - refactor module parameter pf_q_num related code
      crypto: hisilicon - add FLR support
      crypto: hisilicon - remove use_dma_api related codes
      crypto: hisilicon - remove codes of directly report device errors through MSI
      crypto: hisilicon - add device error report through abnormal irq
      crypto: hisilicon/qm - add DebugFS for xQC and xQE dump
      crypto: hisilicon/qm - change debugfs file name from qm_regs to regs

Stephan Müller (2):
      crypto: jitter - SP800-90B compliance
      crypto: drbg - always seeded with SP800-90B compliant noise source

Stephen Rothwell (1):
      crypto: hisilicon/qm - add more ACPI dependencies

Tang Bin (5):
      crypto: amlogic - Delete duplicate dev_err in meson_crypto_probe()
      crypto: bcm - Delete redundant variable definition
      crypto: bcm - Remove the unnecessary cast for PTR_ERR().
      crypto: bcm - Fix unused assignment
      crypto: bcm - Use the defined variable to clean code

Tom Lendacky (1):
      crypto: ccp - Add support for SEV-ES to the PSP driver

Wei Yongjun (1):
      crypto: drbg - fix error return code in drbg_alloc_state()

Weili Qian (3):
      crypto: hisilicon - unify initial value assignment into QM
      crypto: hisilicon - QM memory management optimization
      crypto: hisilicon - fix driver compatibility issue with different versions of devices

Yang Shen (2):
      crypto: hisilicon/sec2 - add controller reset support for SEC2
      crypto: hisilicon/qm - stop qp by judging sq and cq tail

Zhou Wang (2):
      crypto: hisilicon/qm - add state machine for QM
      crypto: hisilicon/zip - Use temporary sqe when doing work

Zou Wei (2):
      crypto: hisilicon/qm - Make qm_controller_reset() static
      hwrng: cctrng - Make some symbols static

 Documentation/ABI/testing/debugfs-hisi-hpre           |   89 +++-
 Documentation/ABI/testing/debugfs-hisi-sec            |   94 +++-
 Documentation/ABI/testing/debugfs-hisi-zip            |   70 ++-
 Documentation/devicetree/bindings/rng/arm-cctrng.yaml |   54 +++
 Documentation/security/siphash.rst                    |    2 +-
 MAINTAINERS                                           |    9 +
 arch/arm/crypto/sha1_glue.c                           |    1 -
 arch/arm/crypto/sha1_neon_glue.c                      |    1 -
 arch/arm/crypto/sha256_glue.c                         |    1 -
 arch/arm/crypto/sha256_neon_glue.c                    |    1 -
 arch/arm/kernel/armksyms.c                            |    1 -
 arch/arm64/crypto/aes-glue.c                          |    4 +-
 arch/arm64/crypto/crct10dif-ce-core.S                 |    2 +-
 arch/arm64/crypto/sha256-glue.c                       |    1 -
 arch/arm64/crypto/sha512-glue.c                       |    1 -
 arch/microblaze/kernel/microblaze_ksyms.c             |    1 -
 arch/mips/cavium-octeon/crypto/octeon-md5.c           |    1 -
 arch/powerpc/crypto/md5-glue.c                        |    1 -
 arch/powerpc/crypto/sha1-spe-glue.c                   |    1 -
 arch/powerpc/crypto/sha1.c                            |   33 +-
 arch/powerpc/crypto/sha256-spe-glue.c                 |    1 -
 arch/s390/crypto/sha1_s390.c                          |   12 +-
 arch/sparc/crypto/md5_glue.c                          |    1 -
 arch/sparc/crypto/sha1_glue.c                         |    1 -
 arch/sparc/crypto/sha256_glue.c                       |    1 -
 arch/sparc/crypto/sha512_glue.c                       |    1 -
 arch/unicore32/kernel/ksyms.c                         |    1 -
 arch/x86/crypto/sha1_ssse3_glue.c                     |    1 -
 arch/x86/crypto/sha256_ssse3_glue.c                   |    1 -
 arch/x86/crypto/sha512_ssse3_glue.c                   |    1 -
 crypto/Kconfig                                        |    3 +-
 crypto/algapi.c                                       |   32 +-
 crypto/algif_rng.c                                    |    2 +-
 crypto/api.c                                          |    3 +-
 crypto/blake2b_generic.c                              |    4 +-
 crypto/crypto_engine.c                                |  168 +++++--
 crypto/drbg.c                                         |   30 +-
 crypto/essiv.c                                        |    4 +-
 crypto/internal.h                                     |    1 +
 crypto/jitterentropy-kcapi.c                          |   27 ++
 crypto/jitterentropy.c                                |  417 +++++++++++++----
 crypto/lrw.c                                          |    6 +-
 crypto/sha1_generic.c                                 |    5 +-
 crypto/sha256_generic.c                               |   14 +-
 crypto/shash.c                                        |   16 +
 crypto/xts.c                                          |    6 +-
 drivers/char/hw_random/Kconfig                        |   13 +
 drivers/char/hw_random/Makefile                       |    1 +
 drivers/char/hw_random/cctrng.c                       |  735 ++++++++++++++++++++++++++++++
 drivers/char/hw_random/cctrng.h                       |   72 +++
 drivers/char/hw_random/omap-rng.c                     |    5 +-
 drivers/char/hw_random/optee-rng.c                    |    2 +-
 drivers/char/hw_random/xgene-rng.c                    |    4 +-
 drivers/char/random.c                                 |    8 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c     |    4 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c             |    4 +-
 drivers/crypto/atmel-sha.c                            |    1 -
 drivers/crypto/axis/artpec6_crypto.c                  |   10 +-
 drivers/crypto/bcm/cipher.c                           |   27 +-
 drivers/crypto/cavium/nitrox/nitrox_main.c            |    2 +-
 drivers/crypto/ccp/Kconfig                            |    3 +-
 drivers/crypto/ccp/ccp-crypto-sha.c                   |    9 +-
 drivers/crypto/ccp/sev-dev.c                          |   43 ++
 drivers/crypto/ccree/cc_cipher.c                      |    9 +-
 drivers/crypto/ccree/cc_debugfs.c                     |    4 +-
 drivers/crypto/chelsio/chcr_algo.c                    |    3 +-
 drivers/crypto/chelsio/chcr_ipsec.c                   |    1 -
 drivers/crypto/hisilicon/Kconfig                      |    4 +
 drivers/crypto/hisilicon/hpre/hpre.h                  |   18 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c           |   99 +++-
 drivers/crypto/hisilicon/hpre/hpre_main.c             |  355 +++++++--------
 drivers/crypto/hisilicon/qm.c                         | 3769 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++--------------------------------------------
 drivers/crypto/hisilicon/qm.h                         |  120 ++++-
 drivers/crypto/hisilicon/sec2/sec.h                   |    5 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c            |   20 +-
 drivers/crypto/hisilicon/sec2/sec_main.c              |  379 ++++++---------
 drivers/crypto/hisilicon/zip/zip.h                    |    8 +
 drivers/crypto/hisilicon/zip/zip_crypto.c             |   20 +-
 drivers/crypto/hisilicon/zip/zip_main.c               |  362 +++++++--------
 drivers/crypto/marvell/octeontx/otx_cptpf_main.c      |    4 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_mbox.c      |   12 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c     |   95 ++--
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c      |    6 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_main.c      |   12 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.c    |   10 +-
 drivers/crypto/mediatek/mtk-sha.c                     |    7 +-
 drivers/crypto/n2_core.c                              |    7 +-
 drivers/crypto/omap-sham.c                            |   21 +-
 drivers/crypto/s5p-sss.c                              |   39 +-
 drivers/crypto/stm32/stm32-crc32.c                    |  230 +++++++---
 drivers/crypto/stm32/stm32-hash.c                     |   38 +-
 drivers/nfc/s3fwrn5/firmware.c                        |   10 +-
 fs/crypto/fname.c                                     |    7 +-
 fs/crypto/hkdf.c                                      |    6 +-
 fs/ecryptfs/crypto.c                                  |   17 +-
 fs/f2fs/hash.c                                        |    1 -
 fs/nfsd/nfs4recover.c                                 |   26 +-
 fs/ubifs/auth.c                                       |   20 +-
 fs/ubifs/master.c                                     |    9 +-
 fs/ubifs/replay.c                                     |   14 +-
 include/crypto/acompress.h                            |    2 +-
 include/crypto/algapi.h                               |    2 +
 include/crypto/drbg.h                                 |    6 +-
 include/crypto/engine.h                               |   15 +-
 include/crypto/hash.h                                 |   19 +
 include/crypto/sha.h                                  |   28 +-
 include/crypto/sha256_base.h                          |    6 +-
 include/linux/cryptohash.h                            |   14 -
 include/linux/filter.h                                |    4 +-
 include/linux/padata.h                                |    6 +-
 include/linux/psp-sev.h                               |    2 +
 include/net/tcp.h                                     |    1 -
 include/uapi/linux/psp-sev.h                          |    2 +
 kernel/bpf/core.c                                     |   18 +-
 kernel/padata.c                                       |   14 +-
 lib/crypto/chacha.c                                   |    1 -
 lib/crypto/sha256.c                                   |   20 +-
 lib/mpi/longlong.h                                    |    2 +-
 lib/sha1.c                                            |   24 +-
 net/bluetooth/smp.c                                   |    6 +-
 net/core/secure_seq.c                                 |    1 -
 net/ipv6/addrconf.c                                   |   10 +-
 net/ipv6/seg6_hmac.c                                  |    1 -
 net/mptcp/crypto.c                                    |    4 +-
 net/sctp/auth.c                                       |   10 +-
 net/sctp/sm_make_chunk.c                              |   23 +-
 security/keys/encrypted-keys/encrypted.c              |   18 +-
 127 files changed, 5634 insertions(+), 2462 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/rng/arm-cctrng.yaml
 create mode 100644 drivers/char/hw_random/cctrng.c
 create mode 100644 drivers/char/hw_random/cctrng.h
 delete mode 100644 include/linux/cryptohash.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.8
  2020-06-01  2:45       ` [GIT PULL] Crypto Update for 5.8 Herbert Xu
@ 2020-06-01 19:35         ` pr-tracker-bot
  0 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-06-01 19:35 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 1 Jun 2020 12:45:33 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/81e8c10dac62c427b25f6bbb07936806e4dd9e8a

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.8
  2020-04-08  6:15           ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
  2020-04-09  4:55             ` pr-tracker-bot
  2020-04-29  5:54             ` Herbert Xu
@ 2020-06-11  4:05             ` Herbert Xu
  2020-06-11 18:25               ` pr-tracker-bot
                                 ` (2 more replies)
  2 siblings, 3 replies; 52+ messages in thread
From: Herbert Xu @ 2020-06-11  4:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push contains a number of fixes to the omap and nitrox drivers.

The following changes since commit 58ca0060ec4e51208d2eee12198fc55fd9e4feb3:

  crypto: hisilicon - fix driver compatibility issue with different versions of devices (2020-05-28 17:27:52 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 320bdbd816156f9ca07e5fed7bfb449f2908dda7:

  crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (2020-06-04 22:06:26 +1000)

----------------------------------------------------------------
Christophe JAILLET (1):
      crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated

Tero Kristo (7):
      crypto: omap-aes - avoid spamming console with self tests
      crypto: omap-sham - force kernel driver usage for sha algos
      crypto: omap-crypto - fix userspace copied buffer access
      crypto: omap-sham - huge buffer access fixes
      crypto: omap-sham - fix very small data size handling
      crypto: omap-aes - prevent unregistering algorithms twice
      crypto: omap-sham - add proper load balancing support for multicore

 drivers/crypto/cavium/nitrox/nitrox_main.c |   4 ++--
 drivers/crypto/omap-aes-gcm.c              |   1 -
 drivers/crypto/omap-aes.c                  |   8 ++++++--
 drivers/crypto/omap-crypto.c               |  10 ++++++++--
 drivers/crypto/omap-sham.c                 | 101 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------------------------------
 5 files changed, 74 insertions(+), 50 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.8
  2020-06-11  4:05             ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
@ 2020-06-11 18:25               ` pr-tracker-bot
  2020-06-21  8:23               ` Herbert Xu
  2020-08-14 13:18               ` [GIT PULL] Crypto Fixes for 5.9 Herbert Xu
  2 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-06-11 18:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 11 Jun 2020 14:05:44 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e8de4575cf7601917c2eae9f8ee1a8ee3d9be2a7

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.8
  2020-06-11  4:05             ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
  2020-06-11 18:25               ` pr-tracker-bot
@ 2020-06-21  8:23               ` Herbert Xu
  2020-06-21 17:10                 ` pr-tracker-bot
  2020-06-29  2:16                 ` Herbert Xu
  2020-08-14 13:18               ` [GIT PULL] Crypto Fixes for 5.9 Herbert Xu
  2 siblings, 2 replies; 52+ messages in thread
From: Herbert Xu @ 2020-06-21  8:23 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push contains a number of fixes:

- NULL dereference in octeontx.
- PM reference imbalance in ks-sa.
- Dead-lock in crypto manager.
- Memory leak in drbg.
- Missing socket limit check on receive SG list size in algif_skcipher.
- Typos in caam.
- Warnings in ccp and hisilicon.

The following changes since commit b3a9e3b9622ae10064826dccb4f7a52bd88c7407:

  Linux 5.8-rc1 (2020-06-14 12:45:04 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 819966c06b759022e9932f328284314d9272b9f3:

  crypto: drbg - always try to free Jitter RNG instance (2020-06-15 17:38:54 +1000)

----------------------------------------------------------------
Dan Carpenter (1):
      crypto: marvell/octeontx - Fix a potential NULL dereference

Dinghao Liu (1):
      hwrng: ks-sa - Fix runtime PM imbalance on error

Eric Biggers (1):
      crypto: algboss - don't wait during notifier callback

Heinrich Schuchardt (1):
      crypto: caam - fix typos

Herbert Xu (3):
      crypto: algif_skcipher - Cap recv SG list at ctx->used
      crypto: hisilicon - Cap block size at 2^31
      crypto: ccp - Fix sparse warnings in sev-dev

Stephan Müller (1):
      crypto: drbg - always try to free Jitter RNG instance

 crypto/algboss.c                                 |  2 --
 crypto/algif_skcipher.c                          |  6 +-----
 crypto/drbg.c                                    |  6 ++++--
 drivers/char/hw_random/ks-sa-rng.c               |  1 +
 drivers/crypto/caam/Kconfig                      |  2 +-
 drivers/crypto/caam/ctrl.c                       | 18 +++++++++---------
 drivers/crypto/caam/desc.h                       |  4 ++--
 drivers/crypto/caam/pdb.h                        |  2 +-
 drivers/crypto/ccp/sev-dev.c                     | 23 ++++++++++++++++-------
 drivers/crypto/hisilicon/sgl.c                   |  3 ++-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 11 +++++++----
 include/linux/psp-sev.h                          |  2 +-
 12 files changed, 45 insertions(+), 35 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.8
  2020-06-21  8:23               ` Herbert Xu
@ 2020-06-21 17:10                 ` pr-tracker-bot
  2020-06-29  2:16                 ` Herbert Xu
  1 sibling, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-06-21 17:10 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sun, 21 Jun 2020 18:23:03 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93bbca271a715e2730b6f4ae0be42056cdab6561

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.8
  2020-06-21  8:23               ` Herbert Xu
  2020-06-21 17:10                 ` pr-tracker-bot
@ 2020-06-29  2:16                 ` Herbert Xu
  2020-06-29 17:15                   ` pr-tracker-bot
  1 sibling, 1 reply; 52+ messages in thread
From: Herbert Xu @ 2020-06-29  2:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes two race conditions, one in padata and one in
af_alg.

The following changes since commit 819966c06b759022e9932f328284314d9272b9f3:

  crypto: drbg - always try to free Jitter RNG instance (2020-06-15 17:38:54 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to e04ec0de61c1eb9693179093e83ab8ca68a30d08:

  padata: upgrade smp_mb__after_atomic to smp_mb in padata_do_serial (2020-06-18 17:09:54 +1000)

----------------------------------------------------------------
Daniel Jordan (1):
      padata: upgrade smp_mb__after_atomic to smp_mb in padata_do_serial

Herbert Xu (1):
      crypto: af_alg - fix use-after-free in af_alg_accept() due to bh_lock_sock()

 crypto/af_alg.c         | 26 +++++++++++---------------
 crypto/algif_aead.c     |  9 +++------
 crypto/algif_hash.c     |  9 +++------
 crypto/algif_skcipher.c |  9 +++------
 include/crypto/if_alg.h |  4 ++--
 kernel/padata.c         |  4 ++--
 6 files changed, 24 insertions(+), 37 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.8
  2020-06-29  2:16                 ` Herbert Xu
@ 2020-06-29 17:15                   ` pr-tracker-bot
  0 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-06-29 17:15 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 29 Jun 2020 12:16:27 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2cfa46dadd203eef88cc70131df7a81ebc34b8ff

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 52+ messages in thread

* [GIT PULL] Crypto Fixes for 5.9
  2020-06-11  4:05             ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
  2020-06-11 18:25               ` pr-tracker-bot
  2020-06-21  8:23               ` Herbert Xu
@ 2020-08-14 13:18               ` Herbert Xu
  2020-08-14 20:34                 ` pr-tracker-bot
  2 siblings, 1 reply; 52+ messages in thread
From: Herbert Xu @ 2020-08-14 13:18 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in af_alg.

The following changes since commit 3cbfe80737c18ac6e635421ab676716a393d3074:

  crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR (2020-07-31 18:25:29 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 21dfbcd1f5cbff9cf2f9e7e43475aed8d072b0dd:

  crypto: algif_aead - fix uninitialized ctx->init (2020-08-13 17:09:32 +1000)

----------------------------------------------------------------
Ondrej Mosnacek (1):
      crypto: algif_aead - fix uninitialized ctx->init

 crypto/algif_aead.c     | 6 ------
 crypto/algif_skcipher.c | 7 +------
 2 files changed, 1 insertion(+), 12 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 52+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.9
  2020-08-14 13:18               ` [GIT PULL] Crypto Fixes for 5.9 Herbert Xu
@ 2020-08-14 20:34                 ` pr-tracker-bot
  0 siblings, 0 replies; 52+ messages in thread
From: pr-tracker-bot @ 2020-08-14 20:34 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 14 Aug 2020 23:18:18 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d9361cb285281563adada9b16708b12053bd6531

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 52+ messages in thread

end of thread, back to index

Thread overview: 52+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-09-16  8:49 [GIT PULL] Crypto Update for 5.4 Herbert Xu
2019-09-18 19:55 ` pr-tracker-bot
2019-09-23  5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
2019-09-23 16:50   ` pr-tracker-bot
2019-10-10 12:38   ` Herbert Xu
2019-10-10 15:45     ` pr-tracker-bot
2019-11-17  1:00     ` Herbert Xu
2019-11-17  2:35       ` pr-tracker-bot
2019-12-02  6:20   ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
2019-12-03  1:30     ` pr-tracker-bot
2019-12-14  8:47     ` Herbert Xu
2019-12-14 22:05       ` pr-tracker-bot
2020-01-15 15:08       ` Herbert Xu
2020-01-15 19:35         ` pr-tracker-bot
2020-02-13  3:32         ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
2020-02-13 22:40           ` pr-tracker-bot
2020-02-24  6:00           ` Herbert Xu
2020-02-24 20:25             ` pr-tracker-bot
2020-03-12 11:57             ` Herbert Xu
2020-03-12 16:40               ` Linus Torvalds
2020-03-13  5:27                 ` Masahiro Yamada
2020-03-20 23:53                 ` Jason A. Donenfeld
2020-03-21 15:43                   ` Linus Torvalds
2020-03-21  0:49                 ` [PATCH RFC 0/3] x86: probe for assembler capabilities in Kconfig Jason A. Donenfeld
2020-03-21  0:49                   ` [PATCH RFC 1/3] x86: probe assembler instead of kconfig instead of makefile Jason A. Donenfeld
2020-03-21  0:49                   ` [PATCH RFC 2/3] crypto: x86 - rework configuration based on Kconfig Jason A. Donenfeld
2020-03-21  0:49                   ` [PATCH RFC 3/3] crypto: curve25519 - do not pollute dispatcher based on assembler Jason A. Donenfeld
2020-03-12 17:05               ` [GIT PULL] Crypto Fixes for 5.6 pr-tracker-bot
2020-03-23 22:54               ` Herbert Xu
2020-03-23 23:05                 ` pr-tracker-bot
2020-04-08  6:15           ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
2020-04-09  4:55             ` pr-tracker-bot
2020-04-29  5:54             ` Herbert Xu
2020-04-29 16:50               ` pr-tracker-bot
2020-05-06  5:10               ` Herbert Xu
2020-05-06 17:25                 ` pr-tracker-bot
2020-06-11  4:05             ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
2020-06-11 18:25               ` pr-tracker-bot
2020-06-21  8:23               ` Herbert Xu
2020-06-21 17:10                 ` pr-tracker-bot
2020-06-29  2:16                 ` Herbert Xu
2020-06-29 17:15                   ` pr-tracker-bot
2020-08-14 13:18               ` [GIT PULL] Crypto Fixes for 5.9 Herbert Xu
2020-08-14 20:34                 ` pr-tracker-bot
2019-11-25  3:45 ` [GIT PULL] Crypto Update for 5.5 Herbert Xu
2019-11-26  4:25   ` pr-tracker-bot
2020-01-28  5:03   ` [GIT PULL] Crypto Update for 5.6 Herbert Xu
2020-01-29  0:30     ` pr-tracker-bot
2020-04-01  4:27     ` [GIT PULL] Crypto Update for 5.7 Herbert Xu
2020-04-01 22:35       ` pr-tracker-bot
2020-06-01  2:45       ` [GIT PULL] Crypto Update for 5.8 Herbert Xu
2020-06-01 19:35         ` pr-tracker-bot

Linux-Crypto Archive on lore.kernel.org

Archives are clonable:
	git clone --mirror https://lore.kernel.org/linux-crypto/0 linux-crypto/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 linux-crypto linux-crypto/ https://lore.kernel.org/linux-crypto \
		linux-crypto@vger.kernel.org
	public-inbox-index linux-crypto

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://nntp.lore.kernel.org/org.kernel.vger.linux-crypto


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git