* [GIT PULL] Crypto Update for 5.9
@ 2020-08-03 4:40 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
` (2 more replies)
0 siblings, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2020-08-03 4:40 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Add support for allocating transforms on a specific NUMA Node.
- Introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY for storage users.
Algorithms:
- Drop PMULL based ghash on arm64.
- Fixes for building with clang on x86.
- Add sha256 helper that does the digest in one go.
- Add SP800-56A rev 3 validation checks to dh.
Drivers:
- Permit users to specify NUMA node in hisilicon/zip.
- Add support for i.MX6 in imx-rngc.
- Add sa2ul crypto driver.
- Add BA431 hwrng driver.
- Add Ingenic JZ4780 and X1000 hwrng driver.
- Spread IRQ affinity in inside-secure and marvell/cesa.
There may be a conflict with the tip tree because of the removal
of arch/x86/include/asm/inst.h. This file was previously only used
by the Crypto API and just as we stopped using it the tip tree
started using it. So taking the version from the tip tree should
do the trick.
There is also a conflit witht the jc_docs tree due to unrelated
changes to the same file. The resolution should be straightforward.
The following changes since commit e04ec0de61c1eb9693179093e83ab8ca68a30d08:
padata: upgrade smp_mb__after_atomic to smp_mb in padata_do_serial (2020-06-18 17:09:54 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 3cbfe80737c18ac6e635421ab676716a393d3074:
crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR (2020-07-31 18:25:29 +1000)
----------------------------------------------------------------
Alexander A. Klimov (2):
hwrng: ks-sa - Replace HTTP links with HTTPS ones
crypto: Replace HTTP links with HTTPS ones
Andrei Botila (1):
crypto: caam/qi2 - add support for dpseci_reset()
Andrey Smirnov (1):
crypto: caam - add clock info for VFxxx SoCs
Ard Biesheuvel (20):
crypto: arm64/ghash - drop PMULL based shash
crypto: arm64/gcm - disentangle ghash and gcm setkey() routines
crypto: arm64/gcm - use variably sized key struct
crypto: arm64/gcm - use inline helper to suppress indirect calls
crypto: arm/ghash - use variably sized key struct
crypto: amlogic-gxl - default to build as module
crypto: amlogic-gxl - permit async skcipher as fallback
crypto: omap-aes - permit asynchronous skcipher as fallback
crypto: sun4i - permit asynchronous skcipher as fallback
crypto: sun8i-ce - permit asynchronous skcipher as fallback
crypto: sun8i-ss - permit asynchronous skcipher as fallback
crypto: ccp - permit asynchronous skcipher as fallback
crypto: chelsio - permit asynchronous skcipher as fallback
crypto: mxs-dcp - permit asynchronous skcipher as fallback
crypto: picoxcell - permit asynchronous skcipher as fallback
crypto: qce - permit asynchronous skcipher as fallback
crypto: sahara - permit asynchronous skcipher as fallback
crypto: mediatek - use AES library for GCM key derivation
crypto: x86/chacha-sse3 - use unaligned loads for state array
crypto: xts - Replace memcpy() invocation with simple assignment
Arnd Bergmann (1):
crypto: x86/crc32c - fix building with clang ias
Barry Song (2):
crypto: api - permit users to specify numa node of acomp hardware
crypto: hisilicon/zip - permit users to specify NUMA node
Christophe JAILLET (2):
crypto: chelsio - Avoid some code duplication
crypto: chelsio - Fix some pr_xxx messages
Colin Ian King (4):
crypto: caam/qi2 - remove redundant assignment to ret
crypto: ccp - remove redundant assignment to variable ret
crypto: img-hash - remove redundant initialization of variable err
hwrng: core - remove redundant initialization of variable ret
Dan Carpenter (1):
crypto: hisilicon - allow smaller reads in debugfs
Dan Douglass (1):
crypto: caam/jr - remove incorrect reference to caam_jr_register()
Daniel Jordan (6):
padata: remove start function
padata: remove stop function
padata: inline single call of pd_setup_cpumasks()
padata: remove effective cpumasks from the instance
padata: fold padata_alloc_possible() into padata_alloc()
padata: remove padata_parallel_queue
Dinghao Liu (1):
crypto: sun8i-ce - Fix runtime PM imbalance in sun8i_ce_cipher_init
Eric Biggers (14):
crc-t10dif: use fallback in initial state
crc-t10dif: clean up some more things
crypto: sparc - rename sha256 to sha256_alg
crypto: lib/sha256 - add sha256() function
efi: use sha256() instead of open coding
mptcp: use sha256() instead of open coding
ASoC: cros_ec_codec: use sha256() instead of open coding
crypto: geniv - remove unneeded arguments from aead_geniv_alloc()
crypto: seqiv - remove seqiv_create()
crypto: algapi - use common mechanism for inheriting flags
crypto: algapi - add NEED_FALLBACK to INHERITED_FLAGS
crypto: algapi - introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY
crypto: xts - prefix function and struct names with "xts"
crypto: lrw - prefix function and struct names with "lrw"
Fenghua Yu (1):
crypto: hisilicon/qm - Change type of pasid to u32
Franck LENORMAND (1):
crypto: caam - remove deadcode on 32-bit platforms
Geert Uytterhoeven (1):
hwrng: ba431 - HW_RANDOM_BA431 should not default to y
Gilad Ben-Yossef (3):
crypto: ccree - fix resource leak on error path
crypto: ccree - adapt ccree essiv support to kcapi
crypto: ccree - remove unused field
Giovanni Cabiddu (6):
crypto: qat - convert to SPDX License Identifiers
crypto: qat - remove packed attribute in etr structs
crypto: qat - allow xts requests not multiple of block
crypto: qat - validate xts key
crypto: qat - remove unused field in skcipher ctx
crypto: qat - fallback for xts with 192 bit keys
Gustavo A. R. Silva (1):
crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR
Herbert Xu (25):
crypto: algif_aead - Only wake up when ctx->more is zero
crc-t10dif: Fix potential crypto notify dead-lock
crypto: caam - Fix argument type in handle_imx6_err005766
crypto: octeontx - Fix sparse warnings
crypto: omap-des - Fix sparse/compiler warnings
crypto: omap-sham - Fix sparse/compiler warnings
crypto: api - Prune inclusions in crypto.h
crypto: cpt - Fix sparse warnings
Merge branch 'ux500'
hwrng: npcm - Fix W=1 unused variable warning
hwrng: omap - Fix W=1 unused variable warning
hwrng: hisi - Fix W=1 unused variable warning
hwrng: bcm2835 - Fix W=1 unused variable warning
hwrng: st - Fix W=1 unused variable warning
hwrng: pic32 - Fix W=1 unused variable warning
hwrng: octeon - Fix sparse warnings
hwrng: ba431 - Add dependency on HAS_IOMEM
crypto: af_alg - Fix regression on empty requests
crypto: ccp - Fix sparse warnings
crypto: caam - Remove broken arc4 support
hwrng: ba431 - Include kernel.h
crypto: lib/chacha20poly1305 - Add missing function declaration
crypto: ccp - Silence strncpy warning
crypto: omap-aes - Fix sparse and compiler warnings
crypto: x86/curve25519 - Remove unused carry variables
Horia Geantă (8):
crypto: caam/qi2 - fix return code in ahash_finup_no_ctx()
dt-bindings: rng: add RNGB compatibles for i.MX6 SoCs
hwrng: imx-rngc - enable driver for i.MX6
crypto: caam/qi2 - fix error reporting for caam_hash_alloc
crypto: caam/qi2 - create ahash shared descriptors only once
crypto: caam - silence .setkey in case of bad key length
crypto: caam - add more RNG hw error codes
crypto: caam/qi2 - add module alias
Hui Tang (2):
crypto: hisilicon/hpre - HPRE_OVERTIME_THRHLD can be written by debugfs
crypto: hisilicon/hpre - disable FLR triggered by hardware
Jian Cai (1):
crypto: aesni - add compatibility with IAS
John Allen (1):
crypto: ccp - Fix use of merged scatterlists
Kai Ye (2):
crypto: hisilicon/sec2 - clear SEC debug regs
crypto:hisilicon/sec2 - update busy processing logic
Keerthy (4):
dt-bindings: crypto: Add TI SA2UL crypto accelerator documentation
crypto: sa2ul - Add crypto driver
crypto: sa2ul - add sha1/sha256/sha512 support
crypto: sa2ul - Add AEAD algorithm support
Lee Jones (1):
crypto: ux500/hash - Add namespacing to hash_init()
Longfang Liu (4):
crypto: hisilicon - update SEC driver module parameter
crypto: hisilicon/sec2 - update SEC initialization and reset
crypto: hisilicon/sec2 - update debugfs interface parameters
crypto: hisilicon/sec2 - fix some coding styles
Marcelo Henrique Cerri (1):
lib/mpi: Add mpi_sub_ui()
Meng Yu (4):
crypto: hisilicon/hpre - Init the value of current_q of debugfs
crypto: hisilicon/hpre - Modify the Macro definition and format
crypto: hisilicon/hpre - Add a switch in sriov_configure
crypto: hisilicon/hpre - update debugfs interface parameters
Mikulas Patocka (3):
crypto: cpt - don't sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified
crypto: hisilicon - don't sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified
crypto: drivers - set the flag CRYPTO_ALG_ALLOCATES_MEMORY
Olivier Sobrie (2):
dt-bindings: rng: document Silex Insight BA431 hwrng
hwrng: ba431 - add support for BA431 hwrng
Randy Dunlap (3):
crypto: hash - drop duplicated word in a comment
crypto: skcipher - drop duplicated word in kernel-doc
crypto: testmgr - delete duplicated words
Rikard Falkeborn (4):
hwrng: bcm2835 - Constify bcm2835_rng_devtype[]
hwrng: nomadik - Constify nmk_rng_ids[]
hwrng: virtio - Constify id_table[]
crypto: virtio - constify features[] and id_table[]
Sedat Dilek (1):
crypto: aesni - Fix build with LLVM_IAS=1
Sivaprakash Murugesan (3):
crypto: qce - support zero length test vectors
crypto: qce - re-initialize context on import
crypto: qce/sha - Do not modify scatterlist passed along with request
Stephan Müller (4):
crypto: ecdh - check validity of Z before export
crypto: dh - check validity of Z before export
crypto: dh - SP800-56A rev 3 local public key validation
crypto: ecc - SP800-56A rev 3 local public key validation
Sven Auhagen (2):
crypto: inside-secure - irq balance
crypto: marvell/cesa - irq balance
Tero Kristo (1):
crypto: sa2ul - add device links to child devices
Tom Lendacky (1):
crypto: ccp - Update CCP driver maintainer information
Tom Rix (1):
crypto: qat - fix double free in qat_uclo_create_batch_init_list
Uros Bizjak (2):
crypto: x86 - Remove include/asm/inst.h
crypto: x86 - Put back integer parts of include/asm/inst.h
Vaibhav Gupta (1):
crypto: ccp - use generic power management
Wojciech Ziemba (5):
crypto: qat - replace user types with kernel u types
crypto: qat - replace user types with kernel ABI __u types
crypto: qat - update fw init admin msg
crypto: qat - send admin messages to set of AEs
crypto: qat - update timeout logic in put admin msg
Zhangfei Gao (1):
crypto: hisilicon - fix strncpy warning with strscpy
周琰杰 (Zhou Yanjie) (2):
dt-bindings: RNG: Add Ingenic RNG bindings.
crypto: ingenic - Add hardware RNG for Ingenic JZ4780 and X1000
Documentation/core-api/padata.rst | 18 +-
Documentation/crypto/api-intro.txt | 2 +-
Documentation/crypto/userspace-if.rst | 4 +-
Documentation/devicetree/bindings/crypto/ti,sa2ul.yaml | 76 +++++
Documentation/devicetree/bindings/rng/imx-rng.txt | 3 +
Documentation/devicetree/bindings/rng/ingenic,rng.yaml | 36 +++
Documentation/devicetree/bindings/rng/silex-insight,ba431-rng.yaml | 36 +++
MAINTAINERS | 9 +
arch/arm/crypto/crc32-ce-core.S | 2 +-
arch/arm/crypto/ghash-ce-glue.c | 51 ++-
arch/arm/crypto/sha1-armv4-large.S | 2 +-
arch/arm/crypto/sha256-armv4.pl | 2 +-
arch/arm/crypto/sha256-core.S_shipped | 2 +-
arch/arm/crypto/sha512-armv4.pl | 4 +-
arch/arm/crypto/sha512-core.S_shipped | 4 +-
arch/arm64/crypto/ghash-ce-glue.c | 257 ++++++---------
arch/sparc/crypto/sha256_glue.c | 14 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 15 +-
arch/x86/crypto/aesni-intel_asm.S | 739 +++++++++++++++++++++---------------------
arch/x86/crypto/aesni-intel_avx-x86_64.S | 1 -
arch/x86/crypto/chacha-ssse3-x86_64.S | 16 +-
arch/x86/crypto/chacha_glue.c | 17 +-
arch/x86/crypto/crc32-pclmul_asm.S | 47 ++-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 7 +-
arch/x86/crypto/curve25519-x86_64.c | 6 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 17 +-
arch/x86/include/asm/inst.h | 163 ----------
crypto/Kconfig | 46 +--
crypto/acompress.c | 8 +
crypto/adiantum.c | 14 +-
crypto/af_alg.c | 11 +-
crypto/algapi.c | 21 +-
crypto/algif_aead.c | 4 +-
crypto/algif_skcipher.c | 4 +-
crypto/api.c | 24 +-
crypto/authenc.c | 14 +-
crypto/authencesn.c | 14 +-
crypto/blake2b_generic.c | 2 +-
crypto/camellia_generic.c | 2 +-
crypto/ccm.c | 33 +-
crypto/chacha20poly1305.c | 14 +-
crypto/cmac.c | 5 +-
crypto/cryptd.c | 59 ++--
crypto/ctr.c | 17 +-
crypto/cts.c | 13 +-
crypto/dh.c | 38 +++
crypto/ecc.c | 44 ++-
crypto/ecc.h | 14 +
crypto/echainiv.c | 2 +-
crypto/essiv.c | 11 +-
crypto/gcm.c | 40 +--
crypto/geniv.c | 19 +-
crypto/hmac.c | 5 +-
crypto/internal.h | 23 +-
crypto/jitterentropy.c | 4 +-
crypto/lrw.c | 134 ++++----
crypto/pcrypt.c | 31 +-
crypto/rsa-pkcs1pad.c | 13 +-
crypto/salsa20_generic.c | 4 +-
crypto/seqiv.c | 18 +-
crypto/sha3_generic.c | 2 +-
crypto/simd.c | 6 +-
crypto/skcipher.c | 13 +-
crypto/testmgr.h | 10 +-
crypto/vmac.c | 5 +-
crypto/xcbc.c | 5 +-
crypto/xts.c | 154 +++++----
drivers/char/hw_random/Kconfig | 27 +-
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/ba431-rng.c | 235 ++++++++++++++
drivers/char/hw_random/bcm2835-rng.c | 5 +-
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/hisi-rng.c | 2 +-
drivers/char/hw_random/ingenic-rng.c | 154 +++++++++
drivers/char/hw_random/ks-sa-rng.c | 2 +-
drivers/char/hw_random/nomadik-rng.c | 2 +-
drivers/char/hw_random/npcm-rng.c | 2 +-
drivers/char/hw_random/octeon-rng.c | 6 +-
drivers/char/hw_random/omap-rng.c | 11 +-
drivers/char/hw_random/pic32-rng.c | 2 +-
drivers/char/hw_random/st-rng.c | 3 +-
drivers/char/hw_random/virtio-rng.c | 2 +-
drivers/crypto/Kconfig | 19 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 46 +--
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 3 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 42 +--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 12 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 8 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 39 +--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 12 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 26 +-
drivers/crypto/amlogic/Kconfig | 2 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 27 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl.h | 3 +-
drivers/crypto/axis/artpec6_crypto.c | 20 +-
drivers/crypto/bcm/cipher.c | 72 +++--
drivers/crypto/caam/caamalg.c | 37 +--
drivers/crypto/caam/caamalg_qi.c | 8 +-
drivers/crypto/caam/caamalg_qi2.c | 42 ++-
drivers/crypto/caam/caamhash.c | 2 +-
drivers/crypto/caam/compat.h | 1 -
drivers/crypto/caam/ctrl.c | 12 +-
drivers/crypto/caam/dpseci.c | 18 ++
drivers/crypto/caam/dpseci.h | 2 +
drivers/crypto/caam/dpseci_cmd.h | 1 +
drivers/crypto/caam/error.c | 3 +
drivers/crypto/caam/jr.c | 3 +-
drivers/crypto/caam/regs.h | 11 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 28 +-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 24 +-
drivers/crypto/cavium/cpt/request_manager.h | 26 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 16 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 1 +
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 1 +
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 34 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 2 +
drivers/crypto/ccp/ccp-crypto-des3.c | 1 +
drivers/crypto/ccp/ccp-crypto-sha.c | 4 +-
drivers/crypto/ccp/ccp-crypto.h | 4 +-
drivers/crypto/ccp/ccp-dev-v5.c | 8 +-
drivers/crypto/ccp/ccp-dev.c | 4 +-
drivers/crypto/ccp/ccp-dev.h | 13 +-
drivers/crypto/ccp/ccp-ops.c | 43 ++-
drivers/crypto/ccp/sp-dev.c | 6 +-
drivers/crypto/ccp/sp-dev.h | 6 +-
drivers/crypto/ccp/sp-pci.c | 17 +-
drivers/crypto/ccp/sp-platform.c | 2 +-
drivers/crypto/ccree/cc_cipher.c | 149 ++++++---
drivers/crypto/chelsio/chcr_algo.c | 87 +++--
drivers/crypto/chelsio/chcr_crypto.h | 3 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 111 ++++---
drivers/crypto/hisilicon/qm.c | 43 +--
drivers/crypto/hisilicon/qm.h | 1 +
drivers/crypto/hisilicon/sec/sec_algs.c | 58 ++--
drivers/crypto/hisilicon/sec2/sec.h | 4 +
drivers/crypto/hisilicon/sec2/sec_crypto.c | 95 ++++--
drivers/crypto/hisilicon/sec2/sec_main.c | 132 ++++----
drivers/crypto/hisilicon/zip/zip.h | 2 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 6 +-
drivers/crypto/hisilicon/zip/zip_main.c | 5 +-
drivers/crypto/img-hash.c | 2 +-
drivers/crypto/inside-secure/safexcel.c | 13 +-
drivers/crypto/inside-secure/safexcel.h | 3 +
drivers/crypto/inside-secure/safexcel_cipher.c | 47 +++
drivers/crypto/inside-secure/safexcel_hash.c | 18 ++
drivers/crypto/ixp4xx_crypto.c | 6 +-
drivers/crypto/marvell/cesa/cesa.c | 11 +-
drivers/crypto/marvell/cesa/cesa.h | 1 +
drivers/crypto/marvell/cesa/cipher.c | 18 +-
drivers/crypto/marvell/cesa/hash.c | 6 +
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 8 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h | 2 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 51 ++-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.h | 6 +-
drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.c | 9 +-
drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.h | 24 +-
drivers/crypto/mediatek/mtk-aes.c | 63 +---
drivers/crypto/mxs-dcp.c | 33 +-
drivers/crypto/n2_core.c | 3 +-
drivers/crypto/omap-aes.c | 41 ++-
drivers/crypto/omap-aes.h | 3 +-
drivers/crypto/omap-des.c | 6 +-
drivers/crypto/omap-sham.c | 18 +-
drivers/crypto/picoxcell_crypto.c | 55 ++--
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 48 +--
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 48 +--
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 48 +--
drivers/crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 48 +--
drivers/crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 48 +--
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 48 +--
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 48 +--
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 48 +--
drivers/crypto/qat/qat_c62x/adf_drv.c | 48 +--
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 48 +--
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h | 48 +--
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 48 +--
drivers/crypto/qat/qat_common/adf_accel_devices.h | 102 ++----
drivers/crypto/qat/qat_common/adf_accel_engine.c | 52 +--
drivers/crypto/qat/qat_common/adf_admin.c | 144 ++++-----
drivers/crypto/qat/qat_common/adf_aer.c | 50 +--
drivers/crypto/qat/qat_common/adf_cfg.c | 48 +--
drivers/crypto/qat/qat_common/adf_cfg.h | 48 +--
drivers/crypto/qat/qat_common/adf_cfg_common.h | 72 +----
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 48 +--
drivers/crypto/qat/qat_common/adf_cfg_user.h | 58 +---
drivers/crypto/qat/qat_common/adf_common_drv.h | 60 +---
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 52 +--
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 56 +---
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 48 +--
drivers/crypto/qat/qat_common/adf_init.c | 48 +--
drivers/crypto/qat/qat_common/adf_isr.c | 48 +--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 49 +--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 48 +--
drivers/crypto/qat/qat_common/adf_sriov.c | 48 +--
drivers/crypto/qat/qat_common/adf_transport.c | 110 ++-----
drivers/crypto/qat/qat_common/adf_transport.h | 52 +--
drivers/crypto/qat/qat_common/adf_transport_access_macros.h | 54 +---
drivers/crypto/qat/qat_common/adf_transport_debug.c | 48 +--
drivers/crypto/qat/qat_common/adf_transport_internal.h | 75 +----
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 48 +--
drivers/crypto/qat/qat_common/adf_vf_isr.c | 48 +--
drivers/crypto/qat/qat_common/icp_qat_fw.h | 106 ++----
drivers/crypto/qat/qat_common/icp_qat_fw_init_admin.h | 145 ++++-----
drivers/crypto/qat/qat_common/icp_qat_fw_la.h | 206 +++++-------
drivers/crypto/qat/qat_common/icp_qat_fw_loader_handle.h | 48 +--
drivers/crypto/qat/qat_common/icp_qat_fw_pke.h | 100 ++----
drivers/crypto/qat/qat_common/icp_qat_hal.h | 48 +--
drivers/crypto/qat/qat_common/icp_qat_hw.h | 64 +---
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 54 +---
drivers/crypto/qat/qat_common/qat_algs.c | 211 +++++++-----
drivers/crypto/qat/qat_common/qat_asym_algs.c | 61 +---
drivers/crypto/qat/qat_common/qat_crypto.c | 48 +--
drivers/crypto/qat/qat_common/qat_crypto.h | 48 +--
drivers/crypto/qat/qat_common/qat_hal.c | 88 ++---
drivers/crypto/qat/qat_common/qat_uclo.c | 77 ++---
drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 74 +----
drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 48 +--
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 48 +--
drivers/crypto/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 48 +--
drivers/crypto/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 48 +--
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 48 +--
drivers/crypto/qce/cipher.h | 3 +-
drivers/crypto/qce/common.h | 2 +
drivers/crypto/qce/sha.c | 36 ++-
drivers/crypto/qce/skcipher.c | 43 +--
drivers/crypto/sa2ul.c | 2420 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
drivers/crypto/sa2ul.h | 403 +++++++++++++++++++++++
drivers/crypto/sahara.c | 96 +++---
drivers/crypto/talitos.c | 117 ++++---
drivers/crypto/ux500/hash/hash_core.c | 18 +-
drivers/crypto/virtio/virtio_crypto_algs.c | 3 +-
drivers/crypto/virtio/virtio_crypto_core.c | 4 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 1 +
drivers/firmware/efi/embedded-firmware.c | 9 +-
include/crypto/acompress.h | 18 ++
include/crypto/algapi.h | 25 +-
include/crypto/chacha.h | 4 -
include/crypto/chacha20poly1305.h | 2 +
include/crypto/hash.h | 2 +-
include/crypto/if_alg.h | 4 +-
include/crypto/internal/geniv.h | 2 +-
include/crypto/sha.h | 1 +
include/crypto/skcipher.h | 2 +-
include/linux/crypto.h | 41 ++-
include/linux/mpi.h | 3 +
include/linux/padata.h | 21 +-
kernel/padata.c | 177 +++-------
lib/crc-t10dif.c | 75 +++--
lib/crypto/chacha20poly1305.c | 2 -
lib/crypto/sha256.c | 10 +
lib/mpi/Makefile | 1 +
lib/mpi/mpi-sub-ui.c | 78 +++++
net/mptcp/crypto.c | 15 +-
sound/soc/codecs/cros_ec_codec.c | 27 +-
257 files changed, 6648 insertions(+), 5497 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/ti,sa2ul.yaml
create mode 100644 Documentation/devicetree/bindings/rng/ingenic,rng.yaml
create mode 100644 Documentation/devicetree/bindings/rng/silex-insight,ba431-rng.yaml
create mode 100644 drivers/char/hw_random/ba431-rng.c
create mode 100644 drivers/char/hw_random/ingenic-rng.c
create mode 100644 drivers/crypto/sa2ul.c
create mode 100644 drivers/crypto/sa2ul.h
create mode 100644 lib/mpi/mpi-sub-ui.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.9
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
@ 2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2020-08-03 17:55 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 3 Aug 2020 14:40:24 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ab5c60b79ab6cc50b39bbb21b2f9fb55af900b84
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.9
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
@ 2020-08-30 22:33 ` Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
` (2 more replies)
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2 siblings, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2020-08-30 22:33 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
- Regression in af_alg that affects iwd.
- Restore polling delay in qat.
- Double free in ingenic on error path.
- Potential build failure in sa2ul due to missing Kconfig dependency.
The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5:
Linux 5.9-rc1 (2020-08-16 13:04:57 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c195d66a8a75c60515819b101975f38b7ec6577f:
crypto: af_alg - Work around empty control messages without MSG_MORE (2020-08-27 23:20:36 +1000)
----------------------------------------------------------------
Giovanni Cabiddu (1):
crypto: qat - add delay before polling mailbox
Herbert Xu (1):
crypto: af_alg - Work around empty control messages without MSG_MORE
Randy Dunlap (1):
crypto: sa2ul - add Kconfig selects to fix build error
Wei Yongjun (1):
crypto: ingenic - Drop kfree for memory allocated with devm_kzalloc
crypto/af_alg.c | 13 ++++++++++---
drivers/char/hw_random/ingenic-rng.c | 9 ++-------
drivers/crypto/Kconfig | 3 +++
drivers/crypto/qat/qat_common/adf_admin.c | 7 ++++---
4 files changed, 19 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.9
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2020-08-30 23:02 ` pr-tracker-bot
2020-09-10 0:34 ` Herbert Xu
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2020-08-30 23:02 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 31 Aug 2020 08:33:04 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e43327c706f28d9e66fc4242af4aefdd69e8ff24
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.9
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
@ 2020-09-10 0:34 ` Herbert Xu
2020-09-10 2:48 ` pr-tracker-bot
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2020-09-10 0:34 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in padata.
The following changes since commit c195d66a8a75c60515819b101975f38b7ec6577f:
crypto: af_alg - Work around empty control messages without MSG_MORE (2020-08-27 23:20:36 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 1b0df11fde0f14a269a181b3b7f5122415bc5ed7:
padata: fix possible padata_works_lock deadlock (2020-09-04 17:51:55 +1000)
----------------------------------------------------------------
Daniel Jordan (1):
padata: fix possible padata_works_lock deadlock
kernel/padata.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.10
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
2020-09-10 0:34 ` Herbert Xu
@ 2020-10-26 1:11 ` Herbert Xu
2020-10-26 17:52 ` pr-tracker-bot
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2020-10-26 1:11 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in x86/poly1305.
The following changes since commit 3093e7c16e12d729c325adb3c53dde7308cefbd8:
X.509: Fix modular build of public_key_sm2 (2020-10-08 16:39:14 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c3a98c3ad5c0dc60a1ac66bf91147a3f39cac96b:
crypto: x86/poly1305 - add back a needed assignment (2020-10-24 09:38:32 +1100)
----------------------------------------------------------------
Eric Biggers (1):
crypto: x86/poly1305 - add back a needed assignment
arch/x86/crypto/poly1305_glue.c | 1 +
1 file changed, 1 insertion(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.10
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
@ 2020-10-26 17:52 ` pr-tracker-bot
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2020-10-26 17:52 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 26 Oct 2020 12:11:59 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/41ba50b0572e90ed3d24fe4def54567e9050bc47
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2020-10-26 17:52 ` pr-tracker-bot
@ 2020-12-27 11:32 ` Herbert Xu
2020-12-27 17:27 ` pr-tracker-bot
2021-01-08 3:54 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2020-12-27 11:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of autobuild failures due to missing
Kconfig dependencies.
The following changes since commit 93cebeb1c21a65b92636aaa278a32fbc0415ec67:
crypto: qat - add capability detection logic in qat_4xxx (2020-12-11 21:54:16 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c0e583ab2016de8dedfb73934d4c4e8ff5bd896c:
crypto: qat - add CRYPTO_AES to Kconfig dependencies (2020-12-23 18:45:23 +1100)
----------------------------------------------------------------
Daniele Alessandrelli (1):
crypto: keembay - Add dependency on HAS_IOMEM
Geert Uytterhoeven (1):
crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_AES_SM4 should depend on ARCH_KEEMBAY
Marco Chiappero (1):
crypto: qat - add CRYPTO_AES to Kconfig dependencies
drivers/crypto/keembay/Kconfig | 5 +++--
drivers/crypto/qat/Kconfig | 1 +
2 files changed, 4 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
@ 2020-12-27 17:27 ` pr-tracker-bot
2021-01-08 3:54 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2020-12-27 17:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sun, 27 Dec 2020 22:32:21 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/33c148a4ae7dc3cd440f6c0d746ac7f0ff320682
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2020-12-27 17:27 ` pr-tracker-bot
@ 2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2021-01-08 3:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a functional bug in arm/chacha-neon as well as a
potential buffer overflow in ecdh.
The following changes since commit 5c8fe583cce542aa0b84adc939ce85293de36e5e:
Linux 5.11-rc1 (2020-12-27 15:30:22 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:
crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)
----------------------------------------------------------------
Ard Biesheuvel (2):
crypto: arm/chacha-neon - add missing counter increment
crypto: ecdh - avoid buffer overflow in ecdh_set_secret()
arch/arm/crypto/chacha-glue.c | 1 +
crypto/ecdh.c | 3 ++-
2 files changed, 3 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2021-01-08 3:54 ` Herbert Xu
@ 2021-01-08 20:36 ` pr-tracker-bot
2021-01-18 5:13 ` Herbert Xu
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-01-08 20:36 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 8 Jan 2021 14:54:50 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ea1c87c156d94dd78b4f5267ec40c403b2da7e14
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
@ 2021-01-18 5:13 ` Herbert Xu
2021-01-18 21:16 ` pr-tracker-bot
2021-01-25 22:36 ` Herbert Xu
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-01-18 5:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a Kconfig dependency issue with omap-sham and a
divide by zero in xor on some platforms.
The following changes since commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:
crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 382811940303f7cd01d0f3dcdf432dfd89c5a98e:
crypto: omap-sham - Fix link error without crypto-engine (2021-01-08 15:37:55 +1100)
----------------------------------------------------------------
Arnd Bergmann (1):
crypto: omap-sham - Fix link error without crypto-engine
Kirill Tkhai (1):
crypto: xor - Fix divide error in do_xor_speed()
crypto/xor.c | 2 ++
drivers/crypto/Kconfig | 1 +
2 files changed, 3 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2021-01-18 5:13 ` Herbert Xu
@ 2021-01-18 21:16 ` pr-tracker-bot
2021-01-25 22:36 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-01-18 21:16 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 18 Jan 2021 16:13:13 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/fd3958eac387593d02e4d4287658ba04bcdb235a
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2021-01-18 5:13 ` Herbert Xu
2021-01-18 21:16 ` pr-tracker-bot
@ 2021-01-25 22:36 ` Herbert Xu
2021-01-26 0:01 ` pr-tracker-bot
1 sibling, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2021-01-25 22:36 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in the cesa driver.
The following changes since commit 382811940303f7cd01d0f3dcdf432dfd89c5a98e:
crypto: omap-sham - Fix link error without crypto-engine (2021-01-08 15:37:55 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 4f6543f28bb05433d87b6de6c21e9c14c35ecf33:
crypto: marvel/cesa - Fix tdma descriptor on 64-bit (2021-01-22 14:57:31 +1100)
----------------------------------------------------------------
Herbert Xu (1):
crypto: marvel/cesa - Fix tdma descriptor on 64-bit
drivers/crypto/marvell/cesa/cesa.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.14
2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
2021-01-18 5:13 ` Herbert Xu
@ 2021-07-08 3:09 ` Herbert Xu
2021-07-09 19:20 ` pr-tracker-bot
2021-08-17 1:36 ` Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-07-08 3:09 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains the following fixes and changes:
- Regression in drbg due to missing self-test for new default algorithm.
- Add ratelimit on user-triggerable message in qat.
- Build failure due to missing dependency in sl3516.
- Remove obsolete PageSlab checks.
- Bogus hardware register writes on Kunpeng920 in hisilicon/sec.
The following changes since commit 9f38b678ffc4e2ccf167a1131c0403dc4f5e1bb7:
crypto: sl3516 - depends on HAS_IOMEM (2021-06-24 14:57:28 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 66192b2e3fd8ab97ed518d6c0240e26655a20b4b:
crypto: hisilicon/sec - fix the process of disabling sva prefetching (2021-06-28 11:28:09 +0800)
----------------------------------------------------------------
Colin Ian King (1):
crypto: qat - ratelimit invalid ioctl message and print the invalid cmd
Geert Uytterhoeven (2):
crypto: sl3516 - Typo s/Stormlink/Storlink/
crypto: sl3516 - Add dependency on ARCH_GEMINI
Herbert Xu (2):
crypto: scatterwalk - Remove obsolete PageSlab check
crypto: omap - Drop obsolete PageSlab check
Kai Ye (1):
crypto: hisilicon/sec - fix the process of disabling sva prefetching
Stephan Müller (1):
crypto: drbg - self test for HMAC(SHA-512)
crypto/testmgr.c | 5 ++-
crypto/testmgr.h | 49 +++++++++++++++++++++++++++++
drivers/crypto/Kconfig | 6 ++--
drivers/crypto/gemini/sl3516-ce-cipher.c | 2 +-
drivers/crypto/gemini/sl3516-ce-core.c | 2 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 3 ++
drivers/crypto/omap-crypto.c | 3 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 2 +-
include/crypto/scatterwalk.h | 7 +----
9 files changed, 64 insertions(+), 15 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.14
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
@ 2021-07-09 19:20 ` pr-tracker-bot
2021-08-17 1:36 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-07-09 19:20 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 8 Jul 2021 11:09:13 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8dc121eeab9abfbc510097f8db83e87560f753b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.14
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2021-07-09 19:20 ` pr-tracker-bot
@ 2021-08-17 1:36 ` Herbert Xu
2021-08-17 2:27 ` pr-tracker-bot
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-08-17 1:36 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains a fix for a potential boot failure due to
a missing Kconfig dependency for people upgrading with the DRBG
enabled.
The following changes since commit e73f0f0ee7541171d89f2e2491130c7771ba58d3:
Linux 5.14-rc1 (2021-07-11 15:07:40 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 5261cdf457ce3635bf18d393a3c1991dcfaf9d02:
crypto: drbg - select SHA512 (2021-07-16 15:49:31 +0800)
----------------------------------------------------------------
Stephan Mueller (1):
crypto: drbg - select SHA512
crypto/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.14
2021-08-17 1:36 ` Herbert Xu
@ 2021-08-17 2:27 ` pr-tracker-bot
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-08-17 2:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 17 Aug 2021 09:36:01 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/794c7931a2428a656551f2179e6a093233a6e0aa
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.15
2021-08-17 1:36 ` Herbert Xu
2021-08-17 2:27 ` pr-tracker-bot
@ 2021-09-29 2:38 ` Herbert Xu
2021-09-29 14:51 ` pr-tracker-bot
2021-10-29 4:14 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-09-29 2:38 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains fixes for a resource leak in ccp as well as
stack corruption in x86/sm4.
The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:
Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0e14ef38669ce4faa80589247fe8ed8a3780f414:
crypto: x86/sm4 - Fix frame pointer stack corruption (2021-09-24 15:58:50 +0800)
----------------------------------------------------------------
Dan Carpenter (1):
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
Josh Poimboeuf (1):
crypto: x86/sm4 - Fix frame pointer stack corruption
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 5 +++--
drivers/crypto/ccp/ccp-ops.c | 14 ++++++++------
2 files changed, 11 insertions(+), 8 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
@ 2021-09-29 14:51 ` pr-tracker-bot
2021-10-29 4:14 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-09-29 14:51 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 29 Sep 2021 10:38:43 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6e439bbd436e39f15abc9587cdd23d56257780cb
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.15
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
2021-09-29 14:51 ` pr-tracker-bot
@ 2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2021-10-29 4:14 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build-time warning in x86/sm4.
The following changes since commit 0e14ef38669ce4faa80589247fe8ed8a3780f414:
crypto: x86/sm4 - Fix frame pointer stack corruption (2021-09-24 15:58:50 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to f8690a4b5a1b64f74ae5c4f7c4ea880d8a8e1a0d:
crypto: x86/sm4 - Fix invalid section entry size (2021-10-22 20:23:01 +0800)
----------------------------------------------------------------
Tianjia Zhang (1):
crypto: x86/sm4 - Fix invalid section entry size
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 6 +++++-
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 6 +++++-
2 files changed, 10 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-10-29 4:14 ` Herbert Xu
@ 2021-10-29 17:39 ` Linus Torvalds
2021-11-02 4:01 ` Herbert Xu
2021-10-29 18:49 ` pr-tracker-bot
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2021-10-29 17:39 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Oct 28, 2021 at 9:14 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes a build-time warning in x86/sm4.
Hmm..
> Tianjia Zhang (1):
> crypto: x86/sm4 - Fix invalid section entry size
So I do wonder why the crypto code asm tends to use such complex
".section" directives.
Almost everythign else in the kernel just uses
.section <name>,"a"
for data (and "ax" for text).
The crypto code uses that very subtle "M" flag which allows the linker
to merge data, but how much of a win is that added complexity? Now you
need to get the sizes exactly right, and you hit tooling issues.
Plus, I get the feeling that some people have just copied-and-pasted
those things, and don't necessarily realize just _how_ subtle 'M'
sections are.
How much of a data savings is it to have this complexity? Particularly
since I suspect most of the time these things end up being individual
modules, and never actually get linked together at all?
So I get this very strong feeling that the crypto code is doing
complicated and fragile things that cause tooling issues - and does so
for no good reason and no actual real-life upside.
I've pulled this, but I do suspect that all the fancy
.section .rodata.xyz, "aM", @progbits, abc
could just as well be
.section .rodata, "a"
instead, and you guys are only causing problems for yourself by trying
to be clever in pointless ways.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-10-29 17:39 ` Linus Torvalds
@ 2021-11-02 4:01 ` Herbert Xu
0 siblings, 0 replies; 146+ messages in thread
From: Herbert Xu @ 2021-11-02 4:01 UTC (permalink / raw)
To: Linus Torvalds, Denys Vlasenko
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Tianjia Zhang
On Fri, Oct 29, 2021 at 10:39:35AM -0700, Linus Torvalds wrote:
>
> Plus, I get the feeling that some people have just copied-and-pasted
> those things, and don't necessarily realize just _how_ subtle 'M'
> sections are.
>
> How much of a data savings is it to have this complexity? Particularly
> since I suspect most of the time these things end up being individual
> modules, and never actually get linked together at all?
Let me copy Denys Vlasenko who introduced this.
But you're absolutely right that the recent additions are
more likely to be just cut-n-paste rather than deeply thought
through.
FWIW the original change that added this was:
ommit e183914af00e15eb41ae666d44e323bfa154be13
Author: Denys Vlasenko <dvlasenk@redhat.com>
Date: Thu Jan 19 22:33:04 2017 +0100
crypto: x86 - make constants readonly, allow linker to merge them
A lot of asm-optimized routines in arch/x86/crypto/ keep its
constants in .data. This is wrong, they should be on .rodata.
Mnay of these constants are the same in different modules.
For example, 128-bit shuffle mask 0x000102030405060708090A0B0C0D0E0F
exists in at least half a dozen places.
There is a way to let linker merge them and use just one copy.
The rules are as follows: mergeable objects of different sizes
should not share sections. You can't put them all in one .rodata
section, they will lose "mergeability".
GCC puts its mergeable constants in ".rodata.cstSIZE" sections,
or ".rodata.cstSIZE.<object_name>" if -fdata-sections is used.
This patch does the same:
.section .rodata.cst16.SHUF_MASK, "aM", @progbits, 16
It is important that all data in such section consists of
16-byte elements, not larger ones, and there are no implicit
use of one element from another.
When this is not the case, use non-mergeable section:
.section .rodata[.VAR_NAME], "a", @progbits
This reduces .data by ~15 kbytes:
text data bss dec hex filename
11097415 2705840 2630712 16433967 fac32f vmlinux-prev.o
11112095 2690672 2630712 16433479 fac147 vmlinux.o
Merged objects are visible in System.map:
ffffffff81a28810 r POLY
ffffffff81a28810 r POLY
ffffffff81a28820 r TWOONE
ffffffff81a28820 r TWOONE
ffffffff81a28830 r PSHUFFLE_BYTE_FLIP_MASK <- merged regardless of
ffffffff81a28830 r SHUF_MASK <------------- the name difference
ffffffff81a28830 r SHUF_MASK
ffffffff81a28830 r SHUF_MASK
..
ffffffff81a28d00 r K512 <- merged three identical 640-byte tables
ffffffff81a28d00 r K512
ffffffff81a28d00 r K512
Use of object names in section name suffixes is not strictly necessary,
but might help if someday link stage will use garbage collection
to eliminate unused sections (ld --gc-sections).
Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
CC: Herbert Xu <herbert@gondor.apana.org.au>
CC: Josh Poimboeuf <jpoimboe@redhat.com>
CC: Xiaodong Liu <xiaodong.liu@intel.com>
CC: Megha Dey <megha.dey@intel.com>
CC: linux-crypto@vger.kernel.org
CC: x86@kernel.org
CC: linux-kernel@vger.kernel.org
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
@ 2021-10-29 18:49 ` pr-tracker-bot
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-10-29 18:49 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 29 Oct 2021 12:14:09 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/75c7a6c1ca63131875fe869cbfd404c94d0e1944
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.16
2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
2021-10-29 18:49 ` pr-tracker-bot
@ 2021-11-12 10:48 ` Herbert Xu
2021-11-12 20:42 ` pr-tracker-bot
2021-12-22 5:13 ` Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-11-12 10:48 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a boot crash regression.
The following changes since commit 39ef08517082a424b5b65c3dbaa6c0fa9d3303b9:
crypto: testmgr - fix wrong key length for pkcs1pad (2021-10-29 21:04:04 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to beaaaa37c664e9afdf2913aee19185d8e3793b50:
crypto: api - Fix boot-up crash when crypto manager is disabled (2021-11-09 13:45:48 +0800)
----------------------------------------------------------------
Herbert Xu (1):
crypto: api - Fix boot-up crash when crypto manager is disabled
crypto/algapi.c | 2 ++
1 file changed, 2 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.16
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
@ 2021-11-12 20:42 ` pr-tracker-bot
2021-12-22 5:13 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-11-12 20:42 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 12 Nov 2021 18:48:15 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/66f4beaa6c1d28161f534471484b2daa2de1dce0
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.16
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2021-11-12 20:42 ` pr-tracker-bot
@ 2021-12-22 5:13 ` Herbert Xu
2021-12-22 19:02 ` pr-tracker-bot
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-12-22 5:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in the qat driver.
The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf:
Linux 5.16-rc1 (2021-11-14 13:56:52 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 27750a315aba7e6675bb1c3dfd4481c4f6888af1:
crypto: qat - do not handle PFVF sources for qat_4xxx (2021-12-17 13:11:54 +1100)
----------------------------------------------------------------
Giovanni Cabiddu (1):
crypto: qat - do not handle PFVF sources for qat_4xxx
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 7 +++++++
1 file changed, 7 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.16
2021-12-22 5:13 ` Herbert Xu
@ 2021-12-22 19:02 ` pr-tracker-bot
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-12-22 19:02 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 22 Dec 2021 16:13:07 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e19e226345196649e83d49c6997e806a8ecdafe6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.17
2021-12-22 5:13 ` Herbert Xu
2021-12-22 19:02 ` pr-tracker-bot
@ 2022-02-09 2:33 ` Herbert Xu
2022-02-09 18:01 ` pr-tracker-bot
2022-03-16 1:13 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-02-09 2:33 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes two regressions:
- Potential boot failure due to missing cryptomgr on initramfs.
- Stack overflow in octeontx2.
The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:
Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c6ce9c5831cae515d375a01b97ae1778689acf19:
crypto: api - Move cryptomgr soft dependency into algapi (2022-02-05 15:10:07 +1100)
----------------------------------------------------------------
Herbert Xu (1):
crypto: api - Move cryptomgr soft dependency into algapi
Kees Cook (1):
crypto: octeontx2 - Avoid stack variable overflow
crypto/algapi.c | 1 +
crypto/api.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 3 ++-
3 files changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.17
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
@ 2022-02-09 18:01 ` pr-tracker-bot
2022-03-16 1:13 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-02-09 18:01 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 9 Feb 2022 13:33:31 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f9f94c9d2c070941a5688f0f751a489c7d0e5039
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.17
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
2022-02-09 18:01 ` pr-tracker-bot
@ 2022-03-16 1:13 ` Herbert Xu
2022-03-17 20:40 ` pr-tracker-bot
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-03-16 1:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug where qcom-rng can return a buffer that is
not completely filled with random data.
The following changes since commit c6ce9c5831cae515d375a01b97ae1778689acf19:
crypto: api - Move cryptomgr soft dependency into algapi (2022-02-05 15:10:07 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to a680b1832ced3b5fa7c93484248fd221ea0d614b:
crypto: qcom-rng - ensure buffer for generate is completely filled (2022-03-14 14:41:04 +1200)
----------------------------------------------------------------
Brian Masney (1):
crypto: qcom-rng - ensure buffer for generate is completely filled
drivers/crypto/qcom-rng.c | 17 ++++++++++-------
1 file changed, 10 insertions(+), 7 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.17
2022-03-16 1:13 ` Herbert Xu
@ 2022-03-17 20:40 ` pr-tracker-bot
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-03-17 20:40 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 16 Mar 2022 13:13:45 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d34c58247f73c5358ceae1ae648fb9daa408ef23
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.18
2022-03-16 1:13 ` Herbert Xu
2022-03-17 20:40 ` pr-tracker-bot
@ 2022-03-31 3:16 ` Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2022-03-31 3:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0e03b8fd29363f2df44e2a7a176d486de550757a:
crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST (2022-03-14 14:45:45 +1200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p1
for you to fetch changes up to aa8e73eed7d3084c18dd16d195748661c7e881b5:
crypto: x86/sm3 - Fixup SLS (2022-03-30 16:33:11 +1200)
----------------------------------------------------------------
This push fixes the following issues:
- Missing Kconfig dependency on arm that leads to boot failure.
- x86 SLS fixes.
- Reference leak in the stm32 driver.
----------------------------------------------------------------
Herbert Xu (1):
crypto: arm/aes-neonbs-cbc - Select generic cbc and aes
Peter Zijlstra (3):
crypto: x86/chacha20 - Avoid spurious jumps to other functions
crypto: x86/poly1305 - Fixup SLS
crypto: x86/sm3 - Fixup SLS
Zheng Yongjun (1):
crypto: stm32 - fix reference leak in stm32_crc_remove
arch/arm/crypto/Kconfig | 2 ++
arch/x86/crypto/chacha-avx512vl-x86_64.S | 4 +--
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 38 +++++++++++++--------------
arch/x86/crypto/sm3-avx-asm_64.S | 2 +-
drivers/crypto/stm32/stm32-crc32.c | 4 ++-
5 files changed, 27 insertions(+), 23 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.18
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
@ 2022-03-31 19:12 ` pr-tracker-bot
2022-05-20 5:41 ` Herbert Xu
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-03-31 19:12 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 31 Mar 2022 15:16:58 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93235e3df29c084a37e0daed17801c6adfce4cb6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.18
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
@ 2022-05-20 5:41 ` Herbert Xu
2022-05-20 6:10 ` pr-tracker-bot
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2022-05-20 5:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17:
Linux 5.18-rc1 (2022-04-03 14:08:21 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p2
for you to fetch changes up to 16287397ec5c08aa58db6acf7dbc55470d78087d:
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (2022-05-13 17:13:38 +0800)
----------------------------------------------------------------
This push fixes a regression in a recent fix to qcom-rng.
----------------------------------------------------------------
Ondrej Mosnacek (1):
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
drivers/crypto/qcom-rng.c | 1 +
1 file changed, 1 insertion(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.19
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
2022-05-20 5:41 ` Herbert Xu
@ 2022-05-27 11:29 ` Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
` (2 more replies)
2 siblings, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2022-05-27 11:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17:
Linux 5.18-rc1 (2022-04-03 14:08:21 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p1
for you to fetch changes up to e4e62bbc6aba49a5edb3156ec65f6698ff37d228:
hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (2022-05-20 13:54:45 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Test in-place en/decryption with two sglists in testmgr.
- Fix process vs. softirq race in cryptd.
Algorithms:
- Add arm64 acceleration for sm4.
- Add s390 acceleration for chacha20.
Drivers:
- Add polarfire soc hwrng support in mpsf.
- Add support for TI SoC AM62x in sa2ul.
- Add support for ATSHA204 cryptochip in atmel-sha204a.
- Add support for PRNG in caam.
- Restore support for storage encryption in qat.
- Restore support for storage encryption in hisilicon/sec.
----------------------------------------------------------------
Colin Ian King (1):
hwrng: optee - remove redundant initialization to variable rng_size
Conor Dooley (1):
hwrng: mpfs - add polarfire soc hwrng support
Corentin Labbe (20):
crypto: marvell/cesa - ECB does not IV
crypto: sun8i-ce - Fix minor style issue
crypto: sun8i-ce - do not allocate memory when handling requests
crypto: sun4i-ss - do not allocate backup IV on requests
crypto: sun8i-ss - rework handling of IV
crypto: sun8i-ss - handle zero sized sg
crypto: sun8i-ss - remove redundant test
crypto: sun8i-ss - test error before assigning
crypto: sun8i-ss - use sg_nents_for_len
crypto: sun8i-ss - do not allocate memory when handling hash requests
crypto: sun8i-ss - do not zeroize all pad
crypto: sun8i-ss - handle requests if last block is not modulo 64
crypto: sun8i-ss - rework debugging
crypto: sun8i-ss - Add function for handling hash padding
crypto: sun8i-ss - add hmac(sha1)
crypto: sun8i-ss - do not fallback if cryptlen is less than sg length
crypto: sun8i-ce - Add function for handling hash padding
crypto: sun8i-ce - use sg_nents_for_len
crypto: sun8i-ce - rework debugging
crypto: sun8i-ce - do not fallback if cryptlen is less than sg length
Eric Biggers (1):
crypto: testmgr - test in-place en/decryption with two sglists
Fabio Estevam (1):
crypto: caam - fix i.MX6SX entropy delay value
Gilad Ben-Yossef (2):
crypto: ccree - rearrange init calls to avoid race
crypto: ccree - use fine grained DMA mapping dir
Giovanni Cabiddu (15):
crypto: qat - set CIPHER capability for DH895XCC
crypto: qat - set COMPRESSION capability for DH895XCC
crypto: qat - remove unused PFVF stubs
crypto: qat - set to zero DH parameters before free
crypto: qat - use pre-allocated buffers in datapath
crypto: qat - refactor submission logic
crypto: qat - add backlog mechanism
crypto: qat - fix memory leak in RSA
crypto: qat - remove dma_free_coherent() for RSA
crypto: qat - remove dma_free_coherent() for DH
crypto: qat - add param check for RSA
crypto: qat - add param check for DH
crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag
crypto: qat - re-enable registration of algorithms
crypto: qat - add support for 401xx devices
Haowen Bai (1):
crypto: qat - Fix unsigned function returning negative constant
Herbert Xu (3):
hwrng: mpfs - Enable COMPILE_TEST
Revert "hwrng: mpfs - Enable COMPILE_TEST"
hwrng: cn10k - Enable compile testing
Hui Tang (1):
crypto: hisilicon/qm - optimize the barrier operation
Jacky Li (1):
crypto: ccp - Fix the INIT_EX data file open failure
Jakob Koschel (1):
crypto: cavium/nitrox - remove check of list iterator against head past the loop body
Jason A. Donenfeld (1):
crypto: sm3,sm4 - move into crypto directory
Jayesh Choudhary (2):
dt-bindings: crypto: ti,sa2ul: Add a new compatible for AM62
crypto: sa2ul - Add the new compatible for AM62
Juerg Haefliger (1):
crypto: inside-secure - Add MODULE_FIRMWARE macros
Kai Ye (13):
crypto: hisilicon/qm - add register checking for ACC
crypto: hisilicon/hpre - support register checking
crypto: hisilicon/sec - support register checking
crypto: hisilicon/zip - support register checking
Documentation: update debugfs doc for Hisilicon HPRE
Documentation: update debugfs doc for Hisilicon SEC
Documentation: update debugfs doc for Hisilicon ZIP
crypto: hisilicon/qm - add last word dumping for ACC
crypto: hisilicon/sec - support last word dumping
crypto: hisilicon/hpre - support last word dumping
crypto: hisilicon/zip - support last word dumping
crypto: hisilicon/sec - add sm4 generic selection
crypto: hisilicon/sec - delete the flag CRYPTO_ALG_ALLOCATES_MEMORY
Lv Ruyi (1):
crypto: keembay - Make use of devm helper function devm_platform_ioremap_resource()
Marco Chiappero (12):
crypto: qat - fix ETR sources enabled by default on GEN2 devices
crypto: qat - remove unneeded braces
crypto: qat - remove unnecessary tests to detect PFVF support
crypto: qat - add missing restarting event notification in VFs
crypto: qat - test PFVF registers for spurious interrupts on GEN4
crypto: qat - fix wording and formatting in code comment
crypto: qat - fix off-by-one error in PFVF debug print
crypto: qat - rework the VF2PF interrupt handling logic
crypto: qat - leverage the GEN2 VF mask definiton
crypto: qat - replace disable_vf2pf_interrupts()
crypto: qat - use u32 variables in all GEN4 pfvf_ops
crypto: qat - remove line wrapping for pfvf_ops functions
Mario Limonciello (4):
crypto: ccp - cache capability into psp device
crypto: ccp - Export PSP security bits to userspace
crypto: ccp - Allow PSP driver to load without SEV/TEE support
crypto: ccp - When TSME and SME both detected notify user
Masahiro Yamada (2):
crypto: vmx - Align the short log with Makefile cleanups
crypto: vmx - Fix build error
Meenakshi Aggarwal (1):
crypto: caam/rng - Add support for PRNG
Minghao Chi (3):
crypto: sun8i-ss - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
crypto: sun8i-ce - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
crypto: octeontx2 - simplify the return expression of otx2_cpt_aead_cbc_aes_sha_setkey()
Pali Rohár (1):
crypto: atmel-sha204a - Add support for ATSHA204 cryptochip
Peter Gonda (1):
crypto: ccp - Log when resetting PSP SEV state
Randy Dunlap (1):
crypto: x86 - eliminate anonymous module_init & module_exit
Robin Murphy (1):
crypto: qat - stop using iommu_present()
Sebastian Andrzej Siewior (1):
crypto: cryptd - Protect per-CPU resource by disabling BH.
Tetsuo Handa (1):
crypto: atmel - Avoid flush_scheduled_work() usage
Tianjia Zhang (5):
crypto: sm4 - export sm4 constant arrays
crypto: arm64/sm4-ce - rename to sm4-ce-cipher
crypto: arm64/sm4 - add ARMv8 NEON implementation
crypto: arm64/sm4 - add ARMv8 Crypto Extensions implementation
crypto: arm64/sm4 - Fix wrong dependency of NEON/CE implementation
Uwe Kleine-König (3):
crypto: atmel-sha204a - Remove useless check
crypto: atmel-sha204a - Suppress duplicate error message
crypto: atmel-i2c - Simplify return code in probe function
Vitaly Chikunov (1):
crypto: ecrdsa - Fix incorrect use of vli_cmp
Vladis Dronov (3):
hwrng: cn10k - Optimize cn10k_rng_read()
hwrng: cn10k - Make check_rng_health() return an error code
crypto: s390 - add crypto library interface for ChaCha20
Weili Qian (4):
crypto: hisilicon/qm - remove unused function declaration
crypto: hisilicon/qm - set function with static
crypto: hisilicon/qm - replace hisi_qm_release_qp() with hisi_qm_free_qps()
crypto: hisilicon/qm - remove hisi_qm_get_free_qp_num()
Wojciech Ziemba (1):
crypto: qat - add check for invalid PFVF protocol version 0
Yang Li (1):
crypto: engine - Add parameter description in crypto_transfer_request() kernel-doc comment
Yang Shen (1):
crypto: hisilicon/sgl - align the hardware sgl dma address
Yang Yingliang (1):
hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume()
Yihao Han (1):
crypto: ux500/hash - simplify if-if to if-else
jianchunfu (1):
crypto: talitos - Uniform coding style with defined variable
Documentation/ABI/testing/debugfs-hisi-hpre | 14 +
Documentation/ABI/testing/debugfs-hisi-sec | 14 +
Documentation/ABI/testing/debugfs-hisi-zip | 14 +
Documentation/ABI/testing/sysfs-driver-ccp | 87 +++
.../devicetree/bindings/crypto/ti,sa2ul.yaml | 1 +
.../devicetree/bindings/trivial-devices.yaml | 4 +-
arch/arm64/crypto/Kconfig | 16 +-
arch/arm64/crypto/Makefile | 8 +-
arch/arm64/crypto/sm4-ce-cipher-core.S | 36 ++
arch/arm64/crypto/sm4-ce-cipher-glue.c | 82 +++
arch/arm64/crypto/sm4-ce-core.S | 688 ++++++++++++++++++++-
arch/arm64/crypto/sm4-ce-glue.c | 386 ++++++++++--
arch/arm64/crypto/sm4-neon-core.S | 487 +++++++++++++++
arch/arm64/crypto/sm4-neon-glue.c | 442 +++++++++++++
arch/s390/crypto/chacha-glue.c | 34 +-
arch/x86/crypto/blowfish_glue.c | 8 +-
arch/x86/crypto/camellia_glue.c | 8 +-
arch/x86/crypto/serpent_avx2_glue.c | 8 +-
arch/x86/crypto/twofish_glue.c | 8 +-
arch/x86/crypto/twofish_glue_3way.c | 8 +-
crypto/Kconfig | 18 +-
crypto/Makefile | 6 +-
crypto/cryptd.c | 23 +-
crypto/crypto_engine.c | 1 +
crypto/ecrdsa.c | 8 +-
{lib/crypto => crypto}/sm3.c | 0
{lib/crypto => crypto}/sm4.c | 10 +-
crypto/testmgr.c | 75 ++-
drivers/char/hw_random/Kconfig | 15 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/cn10k-rng.c | 31 +-
drivers/char/hw_random/mpfs-rng.c | 104 ++++
drivers/char/hw_random/omap3-rom-rng.c | 2 +-
drivers/char/hw_random/optee-rng.c | 2 +-
drivers/crypto/Kconfig | 4 +-
drivers/crypto/Makefile | 1 +
.../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 22 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 1 +
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 102 +--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 54 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 130 ++--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 6 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 19 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 180 ++++--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 92 ++-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 385 ++++++++++--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 6 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 33 +-
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-i2c.c | 30 +-
drivers/crypto/atmel-i2c.h | 1 +
drivers/crypto/atmel-sha204a.c | 11 +-
drivers/crypto/caam/Kconfig | 8 +
drivers/crypto/caam/Makefile | 1 +
drivers/crypto/caam/caamprng.c | 235 +++++++
drivers/crypto/caam/ctrl.c | 18 +
drivers/crypto/caam/intern.h | 15 +
drivers/crypto/caam/jr.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 10 +-
drivers/crypto/ccp/psp-dev.c | 49 +-
drivers/crypto/ccp/psp-dev.h | 22 +
drivers/crypto/ccp/sev-dev.c | 32 +-
drivers/crypto/ccp/sp-pci.c | 62 ++
drivers/crypto/ccree/cc_buffer_mgr.c | 27 +-
drivers/crypto/ccree/cc_driver.c | 24 +-
drivers/crypto/hisilicon/Kconfig | 1 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 222 +++++--
drivers/crypto/hisilicon/qm.c | 282 ++++++++-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 2 -
drivers/crypto/hisilicon/sec2/sec_main.c | 108 +++-
drivers/crypto/hisilicon/sgl.c | 6 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 2 +-
drivers/crypto/hisilicon/zip/zip_main.c | 185 +++++-
drivers/crypto/inside-secure/safexcel.c | 9 +
drivers/crypto/keembay/keembay-ocs-aes-core.c | 9 +-
drivers/crypto/marvell/cesa/cipher.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 7 +-
drivers/crypto/qat/qat_4xxx/adf_drv.c | 8 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 15 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 4 -
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 15 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 4 -
drivers/crypto/qat/qat_common/Makefile | 1 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 6 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 18 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 13 +
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 6 +
drivers/crypto/qat/qat_common/adf_gen2_pfvf.c | 78 ++-
drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 61 +-
drivers/crypto/qat/qat_common/adf_isr.c | 21 +-
drivers/crypto/qat/qat_common/adf_pfvf_msg.h | 4 +-
drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c | 6 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 16 +-
drivers/crypto/qat/qat_common/adf_transport.c | 11 +
drivers/crypto/qat/qat_common/adf_transport.h | 1 +
.../crypto/qat/qat_common/adf_transport_internal.h | 1 +
drivers/crypto/qat/qat_common/adf_vf_isr.c | 1 +
drivers/crypto/qat/qat_common/qat_algs.c | 153 +++--
drivers/crypto/qat/qat_common/qat_algs_send.c | 86 +++
drivers/crypto/qat/qat_common/qat_algs_send.h | 11 +
drivers/crypto/qat/qat_common/qat_asym_algs.c | 307 +++++----
drivers/crypto/qat/qat_common/qat_crypto.c | 10 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 44 ++
drivers/crypto/qat/qat_common/qat_hal.c | 1 +
drivers/crypto/qat/qat_common/qat_uclo.c | 3 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 126 ++--
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 4 -
drivers/crypto/sa2ul.c | 1 +
drivers/crypto/talitos.c | 10 +-
drivers/crypto/ux500/hash/hash_core.c | 4 +-
drivers/crypto/vmx/Makefile | 17 +-
include/crypto/sm4.h | 4 +
include/linux/hisi_acc_qm.h | 23 +-
lib/crypto/Kconfig | 6 -
lib/crypto/Makefile | 6 -
tools/testing/crypto/chacha20-s390/Makefile | 12 +
tools/testing/crypto/chacha20-s390/run-tests.sh | 34 +
tools/testing/crypto/chacha20-s390/test-cipher.c | 372 +++++++++++
118 files changed, 5534 insertions(+), 1058 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-driver-ccp
create mode 100644 arch/arm64/crypto/sm4-ce-cipher-core.S
create mode 100644 arch/arm64/crypto/sm4-ce-cipher-glue.c
create mode 100644 arch/arm64/crypto/sm4-neon-core.S
create mode 100644 arch/arm64/crypto/sm4-neon-glue.c
rename {lib/crypto => crypto}/sm3.c (100%)
rename {lib/crypto => crypto}/sm4.c (94%)
create mode 100644 drivers/char/hw_random/mpfs-rng.c
create mode 100644 drivers/crypto/caam/caamprng.c
create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.c
create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.h
create mode 100644 tools/testing/crypto/chacha20-s390/Makefile
create mode 100644 tools/testing/crypto/chacha20-s390/run-tests.sh
create mode 100644 tools/testing/crypto/chacha20-s390/test-cipher.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.19
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
@ 2022-05-28 1:21 ` pr-tracker-bot
2022-06-17 8:29 ` Herbert Xu
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-05-28 1:21 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 27 May 2022 19:29:02 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d075c0c1be279c5f4c6688ac0442fff6494e56bc
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.19
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
@ 2022-06-17 8:29 ` Herbert Xu
2022-06-17 15:29 ` pr-tracker-bot
2022-06-30 7:56 ` Herbert Xu
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-06-17 8:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56:
Linux 5.19-rc1 (2022-06-05 17:18:54 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p2
for you to fetch changes up to abfed87e2a12bd246047d78c01d81eb9529f1d06:
crypto: memneq - move into lib/ (2022-06-12 14:51:51 +0800)
----------------------------------------------------------------
This push fixes a potential build failure when CRYPTO=m.
----------------------------------------------------------------
Jason A. Donenfeld (1):
crypto: memneq - move into lib/
crypto/Kconfig | 1 +
crypto/Makefile | 2 +-
lib/Kconfig | 3 +++
lib/Makefile | 1 +
lib/crypto/Kconfig | 1 +
{crypto => lib}/memneq.c | 0
6 files changed, 7 insertions(+), 1 deletion(-)
rename {crypto => lib}/memneq.c (100%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.19
2022-06-17 8:29 ` Herbert Xu
@ 2022-06-17 15:29 ` pr-tracker-bot
2022-06-30 7:56 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-06-17 15:29 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 17 Jun 2022 16:29:33 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/79fe0f863f920c5fcf9dea61676742f813f0b7a6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.19
2022-06-17 8:29 ` Herbert Xu
2022-06-17 15:29 ` pr-tracker-bot
@ 2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2022-06-30 7:56 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit abfed87e2a12bd246047d78c01d81eb9529f1d06:
crypto: memneq - move into lib/ (2022-06-12 14:51:51 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p3
for you to fetch changes up to 87d044096ea62f1f230e8c4679ee8abf03266f64:
crypto: ccp - Fix device IRQ counting by using platform_irq_count() (2022-06-24 17:09:01 +0800)
----------------------------------------------------------------
This push fixes a regression that breaks the ccp driver.
----------------------------------------------------------------
Tom Lendacky (1):
crypto: ccp - Fix device IRQ counting by using platform_irq_count()
drivers/crypto/ccp/sp-platform.c | 12 ++----------
1 file changed, 2 insertions(+), 10 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.19
2022-06-30 7:56 ` Herbert Xu
@ 2022-06-30 17:28 ` pr-tracker-bot
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-06-30 17:28 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 30 Jun 2022 15:56:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f5da5ddf81ad0bfb91fa5e7d087e2ad96f26b7b7
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.0
2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
@ 2022-08-31 8:55 ` Herbert Xu
2022-08-31 17:20 ` pr-tracker-bot
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2022-08-31 8:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 568035b01cfb107af8d2e4bd2fb9aea22cf5b868:
Linux 6.0-rc1 (2022-08-14 15:50:18 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.0-p2
for you to fetch changes up to 874b301985ef2f89b8b592ad255e03fb6fbfe605:
crypto: lib - remove unneeded selection of XOR_BLOCKS (2022-08-26 18:40:14 +0800)
----------------------------------------------------------------
This push fixes a boot performance regression due to an unnecessary
dependency on XOR_BLOCKS.
----------------------------------------------------------------
Eric Biggers (1):
crypto: lib - remove unneeded selection of XOR_BLOCKS
lib/crypto/Kconfig | 1 -
1 file changed, 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.1
2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
@ 2022-10-17 4:38 ` Herbert Xu
2022-10-17 17:51 ` pr-tracker-bot
2022-10-28 4:58 ` Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-10-17 4:38 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b411b1a0c8bddd470fc8c3457629ac25a168cba0:
crypto: aspeed - Remove redundant dev_err call (2022-09-30 13:59:13 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p2
for you to fetch changes up to 96cb9d0554457086664d3bd10630b11193d863f1:
hwrng: bcm2835 - use hwrng_msleep() instead of cpu_relax() (2022-10-14 19:03:09 +0800)
----------------------------------------------------------------
This push fixes an issue exposed by the recent change to feed
untrusted sources into /dev/random.
----------------------------------------------------------------
Jason A. Donenfeld (1):
hwrng: bcm2835 - use hwrng_msleep() instead of cpu_relax()
drivers/char/hw_random/bcm2835-rng.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
@ 2022-10-17 17:51 ` pr-tracker-bot
2022-10-28 4:58 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-10-17 17:51 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 17 Oct 2022 12:38:48 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bbb8ceb5e2421184db9560e9d2cfaf858e1db616
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.1
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2022-10-17 17:51 ` pr-tracker-bot
@ 2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2022-10-28 4:58 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 9abf2313adc1ca1b6180c508c25f22f9395cc780:
Linux 6.1-rc1 (2022-10-16 15:36:24 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p3
for you to fetch changes up to 9f6035af06b526e678808d492fc0830aef6cfbd8:
crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned (2022-10-21 19:05:05 +0800)
----------------------------------------------------------------
This push fixes an alignment crash in x86/polyval.
----------------------------------------------------------------
Nathan Huckleberry (1):
crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned
arch/x86/crypto/polyval-clmulni_glue.c | 19 ++++++++++++++-----
1 file changed, 14 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-28 4:58 ` Herbert Xu
@ 2022-10-28 17:00 ` Linus Torvalds
2022-11-02 9:49 ` Herbert Xu
2022-10-28 17:02 ` pr-tracker-bot
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2022-10-28 17:00 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, Oct 27, 2022 at 9:58 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes an alignment crash in x86/polyval.
I'm surprised that there isn't a cra_ctxalignment field. Instead there
is crypto_tfm_ctx_alignment(), but that is just an odd way to write
CRYPTO_MINALIGN.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
@ 2022-10-28 17:02 ` pr-tracker-bot
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-10-28 17:02 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 28 Oct 2022 12:58:15 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/05c31d25cc9678cc173cf12e259d638e8a641f66
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.2
2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
2022-10-28 17:02 ` pr-tracker-bot
@ 2023-01-06 9:15 ` Herbert Xu
2023-01-06 21:19 ` pr-tracker-bot
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-01-06 9:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 1b929c02afd37871d5afb9d498426f83432e71c2:
Linux 6.2-rc1 (2022-12-25 13:41:39 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p2
for you to fetch changes up to 736f88689c6912f05d0116917910603a7ba97de7:
crypto: arm64/sm4 - fix possible crash with CFI enabled (2022-12-30 17:57:42 +0800)
----------------------------------------------------------------
This push fixes a CFI crash in arm64/sm4 as well as a regression
in the caam driver.
----------------------------------------------------------------
Nikolaus Voss (1):
crypto: caam - fix CAAM io mem access in blob_gen
Tianjia Zhang (1):
crypto: arm64/sm4 - fix possible crash with CFI enabled
arch/arm64/crypto/sm4-ce-ccm-core.S | 5 +++--
arch/arm64/crypto/sm4-ce-gcm-core.S | 5 +++--
drivers/crypto/caam/blob_gen.c | 2 +-
3 files changed, 7 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.2
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
@ 2023-01-06 21:19 ` pr-tracker-bot
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-01-06 21:19 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 6 Jan 2023 17:15:32 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/90bc52c525fdac4ed8cbf13c08c813ec2a4fc856
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.3
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2023-01-06 21:19 ` pr-tracker-bot
@ 2023-03-05 10:15 ` Herbert Xu
2023-03-05 19:37 ` pr-tracker-bot
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-03-05 10:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 8b84475318641c2b89320859332544cf187e1cbd:
crypto: x86/aria-avx - Do not use avx2 instructions (2023-02-14 13:39:33 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p2
for you to fetch changes up to 660ca9470f9c613fa2c71a123a9469c80a697ee4:
crypto: caam - Fix edesc/iv ordering mixup (2023-02-28 16:30:58 +0800)
----------------------------------------------------------------
This push fixes a regression in the caam driver.
----------------------------------------------------------------
Herbert Xu (1):
crypto: caam - Fix edesc/iv ordering mixup
drivers/crypto/caam/caamalg.c | 26 +++++++++++++++++++-------
drivers/crypto/caam/caamalg_qi.c | 40 ++++++++++++++++++++++++++--------------
drivers/crypto/caam/qi.c | 10 ++++++++--
3 files changed, 53 insertions(+), 23 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.3
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
@ 2023-03-05 19:37 ` pr-tracker-bot
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-03-05 19:37 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sun, 5 Mar 2023 18:15:19 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f915322fe014c5c515119381e886faf07b3c9d31
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.4
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2023-03-05 19:37 ` pr-tracker-bot
@ 2023-05-07 13:19 ` Herbert Xu
2023-05-07 18:12 ` pr-tracker-bot
2023-05-29 3:41 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-05-07 13:19 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 482c84e906e535072c55395acabd3a58e9443d12:
i2c: designware: Add doorbell support for Mendocino (2023-04-20 18:20:05 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p2
for you to fetch changes up to b8969a1b69672b163d057e7745ebc915df689211:
crypto: api - Fix CRYPTO_USER checks for report function (2023-05-02 18:22:24 +0800)
----------------------------------------------------------------
This push fixes the following problems:
- A long-standing bug in crypto_engine.
- A buggy but harmless check in the sun8i-ss driver.
- A regression in the CRYPTO_USER interface.
----------------------------------------------------------------
Christophe JAILLET (1):
crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs()
Olivier Bacon (1):
crypto: engine - fix crypto_queue backlog handling
Ondrej Mosnacek (1):
crypto: api - Fix CRYPTO_USER checks for report function
crypto/acompress.c | 2 +-
crypto/aead.c | 2 +-
crypto/ahash.c | 2 +-
crypto/akcipher.c | 2 +-
crypto/algapi.c | 3 +++
crypto/crypto_engine.c | 6 +++---
crypto/kpp.c | 2 +-
crypto/rng.c | 2 +-
crypto/scompress.c | 2 +-
crypto/shash.c | 2 +-
crypto/skcipher.c | 2 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 2 +-
12 files changed, 16 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.4
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
@ 2023-05-07 18:12 ` pr-tracker-bot
2023-05-29 3:41 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-05-07 18:12 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sun, 7 May 2023 21:19:48 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6f69c981811c8b019d7882839e31c34ea8330860
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.4
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
2023-05-07 18:12 ` pr-tracker-bot
@ 2023-05-29 3:41 ` Herbert Xu
2023-05-29 11:39 ` pr-tracker-bot
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-05-29 3:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b8969a1b69672b163d057e7745ebc915df689211:
crypto: api - Fix CRYPTO_USER checks for report function (2023-05-02 18:22:24 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.4-p3
for you to fetch changes up to 6ab39f99927eed605728b02d512438d828183c97:
crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors (2023-05-24 18:10:27 +0800)
----------------------------------------------------------------
This push fixes an alignment crash in x86/aria.
----------------------------------------------------------------
Ard Biesheuvel (1):
crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
arch/x86/crypto/aria-aesni-avx-asm_64.S | 2 --
1 file changed, 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.4
2023-05-29 3:41 ` Herbert Xu
@ 2023-05-29 11:39 ` pr-tracker-bot
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-05-29 11:39 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 29 May 2023 11:41:40 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.4-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/7a6c8e512fa072cfe8ad7a3b26666b6f26435870
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.5
2023-05-29 3:41 ` Herbert Xu
2023-05-29 11:39 ` pr-tracker-bot
@ 2023-07-09 23:51 ` Herbert Xu
2023-07-10 17:20 ` pr-tracker-bot
2023-08-21 3:37 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-07-09 23:51 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 5d95ff84e62be914b4a4dabfa814e4096b05b1b0:
Merge tag 'v6.5-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-06-30 21:27:13 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.5-p2
for you to fetch changes up to 0b7ec177b589842c0abf9e91459c83ba28d32452:
crypto: algif_hash - Fix race between MORE and non-MORE sends (2023-07-08 22:48:42 +1000)
----------------------------------------------------------------
This push fixes a couple of regressions in af_alg and incorrect
return values in crypto/asymmetric_keys/public_key.
----------------------------------------------------------------
Dan Carpenter (1):
KEYS: asymmetric: Fix error codes
David Howells (2):
crypto: af_alg - Fix merging of written data into spliced pages
crypto: algif_hash - Fix race between MORE and non-MORE sends
crypto/af_alg.c | 7 ++++---
crypto/algif_hash.c | 4 +++-
crypto/asymmetric_keys/public_key.c | 20 +++++++++++++++-----
3 files changed, 22 insertions(+), 9 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.5
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
@ 2023-07-10 17:20 ` pr-tracker-bot
2023-08-21 3:37 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-07-10 17:20 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 10 Jul 2023 09:51:03 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.5-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/419caed6cc77f19148faefe13515f8685ede219b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.5
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
2023-07-10 17:20 ` pr-tracker-bot
@ 2023-08-21 3:37 ` Herbert Xu
2023-08-21 5:09 ` pr-tracker-bot
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-08-21 3:37 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 419caed6cc77f19148faefe13515f8685ede219b:
Merge tag 'v6.5-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-07-10 09:53:11 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 tags/v6.5-p3
for you to fetch changes up to 080aa61e370b9c5cafe71cacadbfe0e72db4d6df:
crypto: fix uninit-value in af_alg_free_resources (2023-08-18 18:30:09 +0800)
----------------------------------------------------------------
This push fixes a regression in the caam driver and af_alg.
----------------------------------------------------------------
Herbert Xu (1):
Revert "crypto: caam - adjust RNG timing to support more devices"
Pavel Skripkin (1):
crypto: fix uninit-value in af_alg_free_resources
crypto/af_alg.c | 4 ++--
drivers/crypto/caam/ctrl.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.5
2023-08-21 3:37 ` Herbert Xu
@ 2023-08-21 5:09 ` pr-tracker-bot
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-08-21 5:09 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 21 Aug 2023 11:37:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 tags/v6.5-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f7757129e3dea336c407551c98f50057c22bb266
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-08-21 3:37 ` Herbert Xu
2023-08-21 5:09 ` pr-tracker-bot
@ 2023-08-31 5:16 ` Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2023-08-31 5:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 85b9bf9a514d991fcecb118d0a8a35e754ff9265:
Revert "dt-bindings: crypto: qcom,prng: Add SM8450" (2023-08-25 19:01:45 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p2
for you to fetch changes up to ba22e81872c1232ea4ba421251d8109a5ed68c52:
crypto: powerpc/chacha20,poly1305-p10 - Add dependency on VSX (2023-08-30 13:48:39 +0800)
----------------------------------------------------------------
This push fixes a random config build failure on powerpc.
----------------------------------------------------------------
Herbert Xu (1):
crypto: powerpc/chacha20,poly1305-p10 - Add dependency on VSX
arch/powerpc/crypto/Kconfig | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
@ 2023-09-01 23:19 ` pr-tracker-bot
2023-09-22 2:10 ` Herbert Xu
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-09-01 23:19 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 31 Aug 2023 13:16:33 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0fe2b86c21253bb365947ceed3531eb214d4c5b5
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
@ 2023-09-22 2:10 ` Herbert Xu
2023-09-22 16:43 ` pr-tracker-bot
2023-10-10 8:46 ` Herbert Xu
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-09-22 2:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0bb80ecc33a8fb5a682236443c1e740d5c917d1d:
Linux 6.6-rc1 (2023-09-10 16:28:41 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p3
for you to fetch changes up to 21155620fbf2edbb071144894ff9d67ba9a1faa0:
crypto: sm2 - Fix crash caused by uninitialized context (2023-09-20 13:10:10 +0800)
----------------------------------------------------------------
This push fixes a regression in sm2.
----------------------------------------------------------------
Tianjia Zhang (1):
crypto: sm2 - Fix crash caused by uninitialized context
crypto/sm2.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-09-22 2:10 ` Herbert Xu
@ 2023-09-22 16:43 ` pr-tracker-bot
2023-10-10 8:46 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-09-22 16:43 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 22 Sep 2023 10:10:51 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2f8d62daf2b5d9835ccd1ae0407de130156c17c1
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-09-22 2:10 ` Herbert Xu
2023-09-22 16:43 ` pr-tracker-bot
@ 2023-10-10 8:46 ` Herbert Xu
2023-10-10 18:54 ` pr-tracker-bot
2023-10-21 9:23 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-10-10 8:46 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 21155620fbf2edbb071144894ff9d67ba9a1faa0:
crypto: sm2 - Fix crash caused by uninitialized context (2023-09-20 13:10:10 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p4
for you to fetch changes up to 152d0bcdf1efcb54a4fa20f694e9c7bbb6d06cbf:
dm crypt: Fix reqsize in crypt_iv_eboiv_gen (2023-10-06 10:39:18 +0800)
----------------------------------------------------------------
This push fixes a 6.5 regression in dm-crypt.
----------------------------------------------------------------
Herbert Xu (1):
dm crypt: Fix reqsize in crypt_iv_eboiv_gen
drivers/md/dm-crypt.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-10-10 8:46 ` Herbert Xu
@ 2023-10-10 18:54 ` pr-tracker-bot
2023-10-21 9:23 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-10-10 18:54 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 10 Oct 2023 16:46:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/832b5d0bf94cab3ab1ca690fca3c3d931f5fa7cd
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-10-10 8:46 ` Herbert Xu
2023-10-10 18:54 ` pr-tracker-bot
@ 2023-10-21 9:23 ` Herbert Xu
2023-10-21 17:57 ` pr-tracker-bot
1 sibling, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2023-10-21 9:23 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 152d0bcdf1efcb54a4fa20f694e9c7bbb6d06cbf:
dm crypt: Fix reqsize in crypt_iv_eboiv_gen (2023-10-06 10:39:18 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p5
for you to fetch changes up to b11950356c4b416d2e87941f3aa7a8bf089db72b:
KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash (2023-10-18 12:27:10 +0800)
----------------------------------------------------------------
This push fixes a 6.5 regression in crypto/asymmetric_keys.
----------------------------------------------------------------
Herbert Xu (1):
KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
crypto/asymmetric_keys/public_key.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.7
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
2023-09-22 2:10 ` Herbert Xu
@ 2023-11-09 4:30 ` Herbert Xu
2023-11-10 1:30 ` pr-tracker-bot
2 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2023-11-09 4:30 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit a312e07a65fb598ed239b940434392721385c722:
crypto: adiantum - flush destination page before unmapping (2023-11-01 12:58:42 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p2
for you to fetch changes up to 9aedd10fe38418319bd8ed55dc68a40ec04aaa05:
crypto: ahash - Set using_shash for cloned ahash wrapper over shash (2023-11-07 16:44:36 +0800)
----------------------------------------------------------------
This push fixes a regression in ahash and hides the Kconfig
sub-options for the jitter RNG.
----------------------------------------------------------------
Dmitry Safonov (1):
crypto: ahash - Set using_shash for cloned ahash wrapper over shash
Herbert Xu (1):
crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
crypto/Kconfig | 28 +++++++++++++++++++++++++---
crypto/ahash.c | 1 +
2 files changed, 26 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.20
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
2022-06-17 8:29 ` Herbert Xu
@ 2022-08-02 6:05 ` Herbert Xu
2022-08-03 0:57 ` pr-tracker-bot
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-08-02 6:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56:
Linux 5.19-rc1 (2022-06-05 17:18:54 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.20-p1
for you to fetch changes up to af5d35b83f642399c719ea9a8599a13b8a0c4167:
crypto: tcrypt - Remove the static variable initialisations to NULL (2022-07-29 18:29:18 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Make proc files report fips module name and version.
Algorithms:
- Move generic SHA1 code into lib/crypto.
- Implement Chinese Remainder Theorem for RSA.
- Remove blake2s.
- Add XCTR with x86/arm64 acceleration.
- Add POLYVAL with x86/arm64 acceleration.
- Add HCTR2.
- Add ARIA.
Drivers:
- Add support for new CCP/PSP device ID in ccp.
----------------------------------------------------------------
Alexey Khoroshilov (1):
crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs()
Andre Przywara (1):
crypto: qat - replace get_current_node() with numa_node_id()
Andrew Davis (2):
crypto: sa2ul - Set the supported_algos bits individually
crypto: sa2ul - Check engine status before enabling
Bagas Sanjaya (2):
Documentation: qat: Use code block for qat sysfs example
Documentation: qat: rewrite description
Christophe JAILLET (2):
crypto: ccree - Remove a useless dma_supported() call
crypto: hisilicon/zip - Use the bitmap API to allocate bitmaps
Claudiu Beznea (2):
crypto: atmel-sha - initialize sha_dd while declaring
crypto: atmel-tdes - initialize tdes_dd while declaring
Colin Ian King (1):
crypto: x86/blowfish - remove redundant assignment to variable nytes
Dan Carpenter (2):
crypto: sun8i-ss - fix error codes in allocate_flows()
crypto: sun8i-ss - Fix error codes for dma_mapping_error()
Eric Biggers (3):
crypto: lib - move lib/sha1.c into lib/crypto/
crypto: lib - make the sha1 library optional
crypto: lib - add module license to libsha1
GUO Zihua (1):
crypto: arm64/poly1305 - fix a read out-of-bound
Giovanni Cabiddu (4):
crypto: qat - expose device state through sysfs for 4xxx
crypto: qat - change behaviour of adf_cfg_add_key_value_param()
crypto: qat - relocate and rename adf_sriov_prepare_restart()
crypto: qat - expose device config through sysfs for 4xxx
Herbert Xu (1):
crypto: vmx - Fix warning on p8_ghash_alg
Ignat Korchagin (3):
crypto: rsa - implement Chinese Remainder Theorem for faster private key operations
crypto: testmgr - populate RSA CRT parameters in RSA test vectors
crypto: testmgr - some more fixes to RSA test vectors
Jakub Kicinski (1):
crypto: caam/qi2 - switch to netif_napi_add_tx_weight()
Jason A. Donenfeld (3):
crypto: memneq - move into lib/
crypto: blake2s - remove shash module
crypto: lib/blake2s - reduce stack frame usage in self test
Jason Wang (3):
crypto: twofish - Fix comment typo
hwrng: via - Fix comment typo
crypto: tcrypt - Remove the static variable initialisations to NULL
Jiang Jian (6):
crypto: nx - drop unexpected word "the"
crypto: ux500/hash - drop unexpected word "the"
crypto: cavium - fix typos in comments
crypto: caam - drop unexpected word 'a' in comments
crypto: caam - drop unexpected word 'for' in comments
crypto: vmx - drop unexpected word 'for' in comments
Jianglei Nie (1):
crypto: hisilicon/sec - fix inconsistent argument
Jilin Yuan (1):
crypto: arm64/aes-neon - Fix typo in comment
John Allen (1):
crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
Julia Lawall (2):
crypto: hisilicon/sec - fix typos in comment
crypto: ccp - fix typo in comment
Kai Ye (2):
crypto: hisilicon/sec - only HW V2 needs to change the BD err detection
crypto: hisilicon/sec - fix auth key size error
Liang He (2):
crypto: amcc - Hold the reference returned by of_find_compatible_node
crypto: nx - Hold the reference returned by of_find_compatible_node
Mario Limonciello (1):
crypto: ccp - Add support for new CCP/PSP device ID
Nathan Huckleberry (9):
crypto: xctr - Add XCTR support
crypto: polyval - Add POLYVAL support
crypto: hctr2 - Add HCTR2 support
crypto: x86/aesni-xctr - Add accelerated implementation of XCTR
crypto: arm64/aes-xctr - Add accelerated implementation of XCTR
crypto: arm64/aes-xctr - Improve readability of XCTR and CTR modes
crypto: x86/polyval - Add PCLMULQDQ accelerated implementation of POLYVAL
crypto: arm64/polyval - Add PMULL accelerated implementation of POLYVAL
fscrypt: Add HCTR2 support for filename encryption
Ofer Heifetz (1):
crypto: inside-secure - fix packed bit-field result descriptor
Pali Rohár (1):
crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of
Peng Wu (1):
crypto: sun8i-ss - fix a NULL vs IS_ERR() check in sun8i_ss_hashkey
Qian Cai (1):
crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE
Randy Dunlap (1):
crypto: rmd160 - fix Kconfig "its" grammar
Shijith Thotton (2):
crypto: octeontx2 - add firmware version in devlink info
crypto: octeontx2 - fix potential null pointer access
Taehee Yoo (2):
crypto: aria - Implement ARIA symmetric cipher algorithm
crypto: testmgr - add ARIA testmgr tests
Tom Lendacky (1):
crypto: ccp - During shutdown, check SEV data pointer before using
Uwe Kleine-König (9):
crypto: atmel-ecc - Remove duplicated error reporting in .remove()
crypto: atmel-aes - Drop if with an always false condition
crypto: atmel-sha - Drop if with an always false condition
crypto: atmel-tdes - Drop if with an always false condition
crypto: omap-aes - Drop if with an always false condition
crypto: omap-des - Drop if with an always false condition
crypto: omap-sham - Drop if with an always false condition
crypto: s5p-sss - Drop if with an always false condition
crypto: keembay-ocs-ecc - Drop if with an always false condition
Vladis Dronov (1):
crypto: fips - make proc files report fips module name and version
Weili Qian (4):
crypto: hisilicon/trng - fix local variable type
crypto: hisilicon/qm - add functions for releasing resources
crypto: hisilicon/qm - move alloc qm->wq to qm.c
crypto: hisilicon/qm - modify event irq processing
Yoan Picchi (1):
crypto: qat - Removes the x86 dependency on the QAT drivers
Yuan Can (1):
crypto: ccree - Add missing clk_disable_unprepare() in cc_pm_resume()
Zhengchao Shao (3):
crypto: hisilicon/sec - don't sleep when in softirq
crypto: hisilicon - Kunpeng916 crypto driver don't sleep when in softirq
crypto: hisilicon/hpre - don't use GFP_KERNEL to alloc mem during softirq
Zhou Wang (1):
MAINTAINERS: update HiSilicon ZIP and QM maintainers
lei he (1):
crypto: testmgr - fix version number of RSA tests
shaom Deng (1):
cyrpto: powerpc/aes - delete the rebundant word "block" in comments
Documentation/ABI/testing/sysfs-driver-qat | 49 +
Documentation/filesystems/fscrypt.rst | 22 +-
MAINTAINERS | 15 +-
arch/arm/crypto/Kconfig | 2 +-
arch/arm/crypto/Makefile | 4 +-
arch/arm/crypto/blake2s-shash.c | 75 -
arch/arm64/crypto/Kconfig | 10 +-
arch/arm64/crypto/Makefile | 3 +
arch/arm64/crypto/aes-glue.c | 80 +-
arch/arm64/crypto/aes-modes.S | 349 +-
arch/arm64/crypto/aes-neon.S | 2 +-
arch/arm64/crypto/poly1305-glue.c | 2 +-
arch/arm64/crypto/polyval-ce-core.S | 361 ++
arch/arm64/crypto/polyval-ce-glue.c | 191 +
arch/powerpc/crypto/aes-spe-glue.c | 2 +-
arch/x86/crypto/Makefile | 7 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 232 +-
arch/x86/crypto/aesni-intel_glue.c | 114 +-
arch/x86/crypto/blake2s-glue.c | 3 +-
arch/x86/crypto/blake2s-shash.c | 77 -
arch/x86/crypto/blowfish_glue.c | 4 +-
arch/x86/crypto/polyval-clmulni_asm.S | 321 ++
arch/x86/crypto/polyval-clmulni_glue.c | 203 +
crypto/Kconfig | 99 +-
crypto/Makefile | 7 +-
crypto/aria.c | 288 ++
crypto/blake2s_generic.c | 75 -
crypto/fips.c | 35 +-
crypto/hctr2.c | 581 +++
crypto/polyval-generic.c | 245 +
crypto/rsa.c | 78 +-
crypto/tcrypt.c | 62 +-
crypto/testmgr.c | 75 +-
crypto/testmgr.h | 4830 ++++++++++++++++++--
crypto/twofish_common.c | 2 +-
crypto/xctr.c | 191 +
drivers/char/hw_random/via-rng.c | 2 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 1 +
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 16 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 10 +-
drivers/crypto/amcc/crypto4xx_core.c | 40 +-
drivers/crypto/atmel-aes.c | 3 +-
drivers/crypto/atmel-ecc.c | 12 +-
drivers/crypto/atmel-sha.c | 5 +-
drivers/crypto/atmel-tdes.c | 5 +-
drivers/crypto/caam/caamalg_qi2.c | 7 +-
drivers/crypto/caam/caamhash_desc.c | 2 +-
drivers/crypto/caam/qi.c | 6 +-
drivers/crypto/cavium/cpt/cpt_hw_types.h | 2 +-
drivers/crypto/ccp/ccp-dev.h | 2 +-
drivers/crypto/ccp/sev-dev.c | 12 +-
drivers/crypto/ccp/sp-pci.c | 7 +
drivers/crypto/ccree/cc_driver.c | 13 +-
drivers/crypto/ccree/cc_pm.c | 2 +
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 2 +-
drivers/crypto/hisilicon/qm.c | 203 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 14 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 2 +-
drivers/crypto/hisilicon/sec/sec_drv.h | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 6 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 26 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 1 +
drivers/crypto/hisilicon/sec2/sec_main.c | 39 +-
drivers/crypto/hisilicon/trng/trng.c | 2 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 10 +-
drivers/crypto/hisilicon/zip/zip_main.c | 17 +-
drivers/crypto/inside-secure/safexcel.c | 2 +
drivers/crypto/inside-secure/safexcel.h | 18 +-
drivers/crypto/keembay/keembay-ocs-ecc.c | 2 -
.../crypto/marvell/octeontx2/otx2_cpt_devlink.c | 40 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 17 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 3 +
drivers/crypto/nx/nx-common-powernv.c | 2 +-
drivers/crypto/nx/nx-common-pseries.c | 5 +-
drivers/crypto/omap-aes.c | 4 -
drivers/crypto/omap-des.c | 4 -
drivers/crypto/omap-sham.c | 3 +-
drivers/crypto/qat/Kconfig | 14 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 1 +
drivers/crypto/qat/qat_4xxx/adf_drv.c | 6 +-
drivers/crypto/qat/qat_common/Makefile | 1 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 +
drivers/crypto/qat/qat_common/adf_cfg.c | 41 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 8 +-
drivers/crypto/qat/qat_common/adf_init.c | 26 +
drivers/crypto/qat/qat_common/adf_sriov.c | 28 +-
drivers/crypto/qat/qat_common/adf_sysfs.c | 191 +
drivers/crypto/qat/qat_common/qat_algs.c | 4 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 4 +-
drivers/crypto/s5p-sss.c | 3 -
drivers/crypto/sa2ul.c | 25 +-
drivers/crypto/sa2ul.h | 1 +
drivers/crypto/ux500/hash/hash_core.c | 2 +-
drivers/crypto/vmx/ghash.c | 1 +
drivers/crypto/vmx/ghashp8-ppc.pl | 2 +-
fs/crypto/fscrypt_private.h | 2 +-
fs/crypto/keysetup.c | 7 +
fs/crypto/policy.c | 14 +-
include/crypto/aria.h | 461 ++
include/crypto/internal/blake2s.h | 108 -
include/crypto/polyval.h | 22 +
include/linux/hisi_acc_qm.h | 8 +-
include/uapi/linux/fscrypt.h | 3 +-
init/Kconfig | 1 +
lib/Kconfig | 3 +
lib/Makefile | 3 +-
lib/crypto/Kconfig | 4 +
lib/crypto/Makefile | 3 +
lib/crypto/blake2s-selftest.c | 41 +
lib/crypto/blake2s.c | 37 +-
lib/{ => crypto}/sha1.c | 3 +
{crypto => lib}/memneq.c | 0
lib/mpi/mpi-add.c | 2 +-
lib/mpi/mpi-mul.c | 1 +
net/ipv6/Kconfig | 1 +
116 files changed, 9147 insertions(+), 1204 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-driver-qat
delete mode 100644 arch/arm/crypto/blake2s-shash.c
create mode 100644 arch/arm64/crypto/polyval-ce-core.S
create mode 100644 arch/arm64/crypto/polyval-ce-glue.c
delete mode 100644 arch/x86/crypto/blake2s-shash.c
create mode 100644 arch/x86/crypto/polyval-clmulni_asm.S
create mode 100644 arch/x86/crypto/polyval-clmulni_glue.c
create mode 100644 crypto/aria.c
delete mode 100644 crypto/blake2s_generic.c
create mode 100644 crypto/hctr2.c
create mode 100644 crypto/polyval-generic.c
create mode 100644 crypto/xctr.c
create mode 100644 drivers/crypto/qat/qat_common/adf_sysfs.c
create mode 100644 include/crypto/aria.h
create mode 100644 include/crypto/polyval.h
rename lib/{ => crypto}/sha1.c (98%)
rename {crypto => lib}/memneq.c (100%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.20
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
@ 2022-08-03 0:57 ` pr-tracker-bot
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-08-03 0:57 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 2 Aug 2022 14:05:04 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.20-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c2a24a7a036b3bd3a2e6c66730dfc777cae6540a
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.1
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2022-08-03 0:57 ` pr-tracker-bot
@ 2022-10-04 8:54 ` Herbert Xu
2022-10-10 20:56 ` pr-tracker-bot
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-10-04 8:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 874b301985ef2f89b8b592ad255e03fb6fbfe605:
crypto: lib - remove unneeded selection of XOR_BLOCKS (2022-08-26 18:40:14 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p1
for you to fetch changes up to b411b1a0c8bddd470fc8c3457629ac25a168cba0:
crypto: aspeed - Remove redundant dev_err call (2022-09-30 13:59:13 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Feed untrusted RNGs into /dev/random.
- Allow HWRNG sleeping to be more interruptible.
- Create lib/utils module.
- Setting private keys no longer required for akcipher.
- Remove tcrypt mode=1000.
- Reorganised Kconfig entries.
Algorithms:
- Load x86/sha512 based on CPU features.
- Add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher.
Drivers:
- Add HACE crypto driver aspeed.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - add limit to linked list parsing
Damian Muszynski (2):
crypto: qat - fix DMA transfer direction
crypto: qat - use reference to structure in dma_map_single()
Dan Carpenter (2):
crypto: marvell/octeontx - prevent integer overflows
crypto: cavium - prevent integer overflow loading firmware
Dominik Brodowski (1):
hwrng: core - start hwrng kthread also for untrusted sources
Dong Chuanjian (1):
crypto: drbg - remove unnecessary (void*) conversions
Eric Biggers (3):
crypto: lib - create utils module and move __crypto_memneq into it
crypto: lib - move __crypto_xor into utils
crypto: lib - remove __HAVE_ARCH_CRYPTO_MEMNEQ
Gaosheng Cui (3):
crypto: bcm - Simplify obtain the name for cipher
crypto: aead - Remove unused inline functions from aead
crypto: scatterwalk - Remove unused inline function scatterwalk_aligned()
Giovanni Cabiddu (1):
Revert "crypto: qat - reduce size of mapped region"
Herbert Xu (7):
crypto: qcom-rng - Fix qcom_rng_of_match unused warning
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Revert "crypto: gemini - Fix error check for dma_map_sg"
Revert "crypto: allwinner - Fix dma_map_sg error check"
crypto: aspeed - Enable compile testing
crypto: aspeed - Fix sparse warnings
crypto: artpec6 - Fix printk warning on size_t/%d
Ignat Korchagin (1):
crypto: akcipher - default implementation for setting a private key
Jack Wang (6):
crypto: gemini - Fix error check for dma_map_sg
crypto: sahara - Fix error check for dma_map_sg
crypto: qce - Fix dma_map_sg error check
crypto: amlogic - Fix dma_map_sg error check
crypto: allwinner - Fix dma_map_sg error check
crypto: ccree - Fix dma_map_sg error check
Jacky Li (2):
crypto: ccp - Initialize PSP when reading psp data file failed
crypto: ccp - Fail the PSP initialization when writing psp data file failed
James Cowgill (1):
hwrng: arm-smccc-trng - fix NO_ENTROPY handling
Jarkko Sakkinen (1):
crypto: ccp - Add a quirk to firmware update
Jason A. Donenfeld (1):
hwrng: core - let sleep be interrupted when unregistering hwrng
Jason Wang (2):
crypto: cavium - Fix comment typo
crypto: api - Fix comment typo
Jean Delvare (1):
crypto: keembay-ocs - Drop obsolete dependency on COMPILE_TEST
Junchong Pan (1):
crypto: hisilicon/qm - remove unneeded data storage
Kai Ye (3):
crypto: hisilicon/qm - no judgment in the back process
crypto: hisilicon/sec - delete redundant blank lines
crypto: hisilicon/qm - fix the qos value initialization
Koba Ko (1):
crypto: ccp - Release dma channels before dmaengine unrgister
Kshitiz Varshney (1):
hwrng: imx-rngc - Moving IRQ handler registering after imx_rngc_irq_mask_clear()
Liu Shixin (1):
crypto: sun4i-ss - use DEFINE_SHOW_ATTRIBUTE to simplify sun4i_ss_debugfs
Lucas Segarra Fernandez (3):
crypto: testmgr - extend acomp tests for NULL destination buffer
crypto: testmgr - fix indentation for test_acomp() args
crypto: qat - fix default value of WDT timer
Lukas Bulwahn (2):
crypto: arm64 - revert unintended config name change for CRYPTO_SHA1_ARM64_CE
crypto: blake2s - revert unintended config addition of CRYPTO_BLAKE2S
Martin Kaiser (3):
hwrng: imx-rngc - use KBUILD_MODNAME as driver name
hwrng: imx-rngc - use devm_clk_get_enabled
hwrng: imx-rngc - use devres for hwrng registration
Neal Liu (8):
crypto: aspeed - Add HACE hash driver
dt-bindings: clock: Add AST2500/AST2600 HACE reset definition
ARM: dts: aspeed: Add HACE device controller node
dt-bindings: crypto: add documentation for aspeed hace
crypto: aspeed - add HACE crypto driver
crypto: aspeed - fix build module error
crypto: aspeed: fix format unexpected build warning
crypto: aspeed - fix build error when only CRYPTO_DEV_ASPEED is enabled
Peter Harliman Liem (3):
crypto: inside-secure - Change swab to swab32
crypto: inside_secure - Avoid dma map if size is zero
crypto: inside-secure - Replace generic aes with libaes
Robert Elliott (20):
crypto: x86/sha512 - load based on CPU features
crypto: testmgr - don't generate WARN for missing modules
crypto: tcrypt - remove mode=1000
crypto: Kconfig - move mips entries to a submenu
crypto: Kconfig - move powerpc entries to a submenu
crypto: Kconfig - move s390 entries to a submenu
crypto: Kconfig - move sparc entries to a submenu
crypto: Kconfig - move x86 entries to a submenu
crypto: Kconfig - remove AES_ARM64 ref by SA2UL
crypto: Kconfig - submenus for arm and arm64
crypto: Kconfig - sort the arm64 entries
crypto: Kconfig - sort the arm entries
crypto: Kconfig - add submenus
crypto: Kconfig - simplify public-key entries
crypto: Kconfig - simplify CRC entries
crypto: Kconfig - simplify aead entries
crypto: Kconfig - simplify hash entries
crypto: Kconfig - simplify userspace entries
crypto: Kconfig - simplify cipher entries
crypto: Kconfig - simplify compression/RNG entries
Shang XiaoJing (1):
crypto: aspeed - Remove redundant dev_err call
Srinivas Kerekare (1):
crypto: qat - add check to validate firmware images
Sun Ke (1):
crypto: aspeed - fix return value check in aspeed_hace_probe()
Taehee Yoo (3):
crypto: aria - prepare generic module for optimized implementations
crypto: aria-avx - add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher
crypto: tcrypt - add async speed test for aria cipher
Tuo Cao (1):
crypto: artpec6 - move spin_lock_bh to spin_lock in tasklet
Weili Qian (12):
crypto: hisilicon/hpre - change return type of hpre_cluster_inqry_write()
crypto: hisilicon/qm - fix missing destroy qp_idr
crypto: hisilicon/qm - remove unneeded hardware cache write back
crypto: hisilicon/qm - check mailbox operation result
crypto: hisilicon/qm - fix missing put dfx access
crypto: hisilicon/qm - return failure if vfs_num exceeds total VFs
crypto: hisilicon/qm - get hardware features from hardware registers
crypto: hisilicon/qm - get qp num and depth from hardware registers
crypto: hisilicon/qm - add UACCE_CMD_QM_SET_QP_INFO support
crypto: hisilicon/qm - get error type from hardware registers
crypto: hisilicon/qm - support get device irq information from hardware registers
crypto: hisilicon/zip - support zip capability
Wenkai Lin (1):
crypto: hisilicon/sec - get algorithm bitmap from registers
Wolfram Sang (2):
crypto: core - move from strlcpy with unused retval to strscpy
crypto: drivers - move from strlcpy with unused retval to strscpy
Xiu Jianfeng (1):
crypto: add __init/__exit annotations to init/exit funcs
Yang Shen (2):
crypto: hisilicon/zip - optimization for performance
crypto: hisilicon/zip - some misc cleanup
Ye Weihua (1):
crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr
YueHaibing (1):
crypto: aspeed - Fix check for platform_get_irq() errors
Zhengchao Shao (1):
crypto: sahara - don't sleep when in softirq
Zhiqi Song (3):
crypto: hisilicon/hpre - support hpre capability
crypto: hisilicon/hpre - optimize registration of ecdh
crypto: hisilicon - support get algs by the capability register
Zhuo Chen (1):
crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call
lei he (1):
crypto: virtio - fix memory-leak
wangjianli (3):
crypto: n2 - fix repeated words in comments
crypto: marvell/octeontx - fix repeated words in comments
crypto: bcm - fix repeated words in comments
ye xingchen (7):
crypto: sun8i-ce - using the pm_runtime_resume_and_get to simplify the code
crypto: octeontx - Remove the unneeded result variable
crypto: nx - Remove the unneeded result variable
crypto: ccp - Remove the unneeded result variable
crypto: octeontx2 - Remove the unneeded result variable
crypto: zip - remove the unneeded result variable
crypto: marvell/octeontx - use sysfs_emit() to instead of scnprintf()
.../bindings/crypto/aspeed,ast2500-hace.yaml | 53 +
.../virt/kvm/x86/amd-memory-encryption.rst | 5 +-
MAINTAINERS | 7 +
arch/arm/Kconfig | 4 -
arch/arm/boot/dts/aspeed-g5.dtsi | 8 +
arch/arm/boot/dts/aspeed-g6.dtsi | 8 +
arch/arm/configs/exynos_defconfig | 1 -
arch/arm/configs/milbeaut_m10v_defconfig | 1 -
arch/arm/configs/multi_v7_defconfig | 1 -
arch/arm/configs/omap2plus_defconfig | 1 -
arch/arm/configs/pxa_defconfig | 1 -
arch/arm/crypto/Kconfig | 238 ++-
arch/arm64/Kconfig | 3 -
arch/arm64/configs/defconfig | 1 -
arch/arm64/crypto/Kconfig | 279 ++-
arch/mips/crypto/Kconfig | 74 +
arch/powerpc/crypto/Kconfig | 97 +
arch/s390/crypto/Kconfig | 135 ++
arch/sparc/crypto/Kconfig | 90 +
arch/x86/crypto/Kconfig | 484 +++++
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aria-aesni-avx-asm_64.S | 1303 ++++++++++++
arch/x86/crypto/aria-avx.h | 16 +
arch/x86/crypto/aria_aesni_avx_glue.c | 213 ++
arch/x86/crypto/sha512_ssse3_glue.c | 10 +
crypto/Kconfig | 2225 +++++++-------------
crypto/Makefile | 2 +-
crypto/akcipher.c | 8 +
crypto/algapi.c | 71 -
crypto/api.c | 4 +-
crypto/{aria.c => aria_generic.c} | 39 +-
crypto/async_tx/raid6test.c | 4 +-
crypto/curve25519-generic.c | 4 +-
crypto/dh.c | 4 +-
crypto/drbg.c | 12 +-
crypto/ecdh.c | 4 +-
crypto/ecdsa.c | 4 +-
crypto/essiv.c | 2 +-
crypto/rsa.c | 4 +-
crypto/sm2.c | 4 +-
crypto/tcrypt.c | 53 +-
crypto/testmgr.c | 38 +-
drivers/char/hw_random/arm_smccc_trng.c | 4 +-
drivers/char/hw_random/core.c | 55 +-
drivers/char/hw_random/imx-rngc.c | 51 +-
drivers/crypto/Kconfig | 3 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 16 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 6 +-
drivers/crypto/aspeed/Kconfig | 48 +
drivers/crypto/aspeed/Makefile | 7 +
drivers/crypto/aspeed/aspeed-hace-crypto.c | 1133 ++++++++++
drivers/crypto/aspeed/aspeed-hace-hash.c | 1391 ++++++++++++
drivers/crypto/aspeed/aspeed-hace.c | 284 +++
drivers/crypto/aspeed/aspeed-hace.h | 298 +++
drivers/crypto/axis/artpec6_crypto.c | 6 +-
drivers/crypto/bcm/cipher.c | 4 +-
drivers/crypto/bcm/cipher.h | 2 +-
drivers/crypto/cavium/cpt/cpt_hw_types.h | 2 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 6 +-
drivers/crypto/cavium/zip/zip_crypto.c | 30 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 5 +-
drivers/crypto/ccp/ccp-dmaengine.c | 6 +-
drivers/crypto/ccp/sev-dev.c | 78 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 2 +-
drivers/crypto/hisilicon/hpre/hpre.h | 8 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 250 ++-
drivers/crypto/hisilicon/hpre/hpre_main.c | 216 +-
drivers/crypto/hisilicon/qm.c | 906 ++++----
drivers/crypto/hisilicon/sec2/sec.h | 34 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 456 ++--
drivers/crypto/hisilicon/sec2/sec_main.c | 160 +-
drivers/crypto/hisilicon/zip/zip.h | 3 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 134 +-
drivers/crypto/hisilicon/zip/zip_main.c | 266 ++-
drivers/crypto/inside-secure/safexcel_cipher.c | 60 +-
drivers/crypto/inside-secure/safexcel_hash.c | 67 +-
drivers/crypto/keembay/Kconfig | 4 +-
drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h | 2 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 24 +-
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 8 +-
drivers/crypto/marvell/octeontx/otx_cptvf_mbox.c | 20 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 4 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 5 +-
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/nx/nx-aes-ccm.c | 5 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 6 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 10 +-
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 2 +-
.../crypto/qat/qat_common/adf_transport_debug.c | 2 +-
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 3 +-
drivers/crypto/qat/qat_common/qat_algs.c | 18 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 24 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 56 +-
drivers/crypto/qce/aead.c | 4 +-
drivers/crypto/qce/sha.c | 8 +-
drivers/crypto/qce/skcipher.c | 8 +-
drivers/crypto/qcom-rng.c | 7 +-
drivers/crypto/sahara.c | 22 +-
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 4 +
drivers/net/Kconfig | 2 -
drivers/net/wireless/ath/ath9k/rng.c | 3 +-
include/crypto/aria.h | 17 +-
include/crypto/internal/aead.h | 25 -
include/crypto/scatterwalk.h | 6 -
include/dt-bindings/clock/aspeed-clock.h | 1 +
include/dt-bindings/clock/ast2600-clock.h | 1 +
include/linux/hisi_acc_qm.h | 63 +-
include/linux/hw_random.h | 3 +
include/uapi/misc/uacce/hisi_qm.h | 17 +-
lib/Kconfig | 3 -
lib/Makefile | 1 -
lib/crypto/Kconfig | 7 +-
lib/crypto/Makefile | 3 +
lib/{ => crypto}/memneq.c | 7 +-
lib/crypto/utils.c | 88 +
117 files changed, 9052 insertions(+), 2965 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/aspeed,ast2500-hace.yaml
create mode 100644 arch/mips/crypto/Kconfig
create mode 100644 arch/powerpc/crypto/Kconfig
create mode 100644 arch/s390/crypto/Kconfig
create mode 100644 arch/sparc/crypto/Kconfig
create mode 100644 arch/x86/crypto/Kconfig
create mode 100644 arch/x86/crypto/aria-aesni-avx-asm_64.S
create mode 100644 arch/x86/crypto/aria-avx.h
create mode 100644 arch/x86/crypto/aria_aesni_avx_glue.c
rename crypto/{aria.c => aria_generic.c} (86%)
create mode 100644 drivers/crypto/aspeed/Kconfig
create mode 100644 drivers/crypto/aspeed/Makefile
create mode 100644 drivers/crypto/aspeed/aspeed-hace-crypto.c
create mode 100644 drivers/crypto/aspeed/aspeed-hace-hash.c
create mode 100644 drivers/crypto/aspeed/aspeed-hace.c
create mode 100644 drivers/crypto/aspeed/aspeed-hace.h
rename lib/{ => crypto}/memneq.c (98%)
create mode 100644 lib/crypto/utils.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.1
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
@ 2022-10-10 20:56 ` pr-tracker-bot
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-10-10 20:56 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 4 Oct 2022 16:54:25 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3604a7f568d3f67be8c13736201411ee83b210a1
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.2
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2022-10-10 20:56 ` pr-tracker-bot
@ 2022-12-14 8:15 ` Herbert Xu
2022-12-14 22:25 ` pr-tracker-bot
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-12-14 8:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 9f6035af06b526e678808d492fc0830aef6cfbd8:
crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned (2022-10-21 19:05:05 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p1
for you to fetch changes up to 453de3eb08c4b7e31b3019a4b0cc3ebce51a6219:
crypto: ux500/cryp - delete driver (2022-12-09 18:45:01 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Optimise away self-test overhead when they are disabled.
- Support symmetric encryption via keyring keys in af_alg.
- Flip hwrng default_quality, the default is now maximum entropy.
Algorithms:
- Add library version of aesgcm.
- CFI fixes for assembly code.
- Add arm/arm64 accelerated versions of sm3/sm4.
Drivers:
- Remove assumption on arm64 that kmalloc is DMA-aligned.
- Fix selftest failures in rockchip.
- Add support for RK3328/RK3399 in rockchip.
- Add deflate support in qat.
- Merge ux500 into stm32.
- Add support for TEE for PCI ID 0x14CA in ccp.
- Add mt7986 support in mtk.
- Add MaxLinear platform support in inside-secure.
- Add NPCM8XX support in npcm.
----------------------------------------------------------------
Angel Iglesias (1):
i2c: core: Introduce i2c_client_get_device_id helper function
Anirudh Venkataramanan (4):
crypto: tcrypt - Use pr_cont to print test results
crypto: tcrypt - Use pr_info/pr_err
crypto: tcrypt - Drop module name from print string
crypto: tcrypt - Drop leading newlines from prints
Ard Biesheuvel (7):
crypto: move gf128mul library into lib/crypto
crypto: lib/gf128mul - make gf128mul_lle time invariant
crypto: lib/aesgcm - Provide minimal library implementation
crypto: arm64/aes-neonbs - use frame_push/pop consistently
crypto: arm64/aes-modes - use frame_push/pop macros consistently
crypto: arm64/crct10dif - use frame_push/pop macros consistently
crypto: arm64/ghash-ce - use frame_push/pop macros consistently
Christophe JAILLET (1):
crypto: amlogic - Remove kcalloc without check
Colin Ian King (1):
crypto: stm32 - Fix spelling mistake "wite" -> "write"
Corentin Labbe (32):
crypto: sun8i-ss - use dma_addr instead u32
crypto: n2 - add missing hash statesize
crypto: rockchip - use dev_err for error message about interrupt
crypto: rockchip - do not use uninitialized variable
crypto: rockchip - do not do custom power management
crypto: rockchip - fix privete/private typo
crypto: rockchip - do not store mode globally
crypto: rockchip - add fallback for cipher
crypto: rockchip - add fallback for ahash
crypto: rockchip - better handle cipher key
crypto: rockchip - remove non-aligned handling
crypto: rockchip - rework by using crypto_engine
crypto: rockchip - rewrite type
crypto: rockchip - add debugfs
crypto: rockchip - introduce PM
crypto: rockchip - handle reset also in PM
crypto: rockchip - use clk_bulk to simplify clock management
crypto: rockchip - add myself as maintainer
crypto: rockchip - use read_poll_timeout
crypto: rockchip - fix style issue
crypto: rockchip - add support for rk3328
crypto: rockchip - rename ablk functions to cipher
crypto: rockchip - rework rk_handle_req function
crypto: rockchip - use a rk_crypto_info variable instead of lot of indirection
crypto: rockchip - use the rk_crypto_info given as parameter
dt-bindings: crypto: convert rockchip-crypto to YAML
dt-bindings: crypto: rockchip: add new compatible
crypto: rockchip - store crypto_info in request context
crypto: rockchip - Check for clocks numbers and their frequencies
crypto: rockchip - rk_ahash_reg_init use crypto_info from parameter
crypto: rockchip - permit to have more than one reset
crypto: rockchip - Add support for RK3399
Daniel Jordan (2):
padata: Always leave BHs disabled when running ->parallel()
padata: Fix list iterator in padata_do_serial()
Eric Biggers (18):
crypto: api - optimize algorithm registration when self-tests disabled
crypto: algboss - optimize registration of internal algorithms
crypto: api - compile out crypto_boot_test_finished when tests disabled
crypto: kdf - skip self-test when tests disabled
crypto: kdf - silence noisy self-test
crypto: algboss - compile out test-related code when tests disabled
crypto: x86/aegis128 - fix possible crash with CFI enabled
crypto: x86/aria - fix crash with CFI enabled
crypto: x86/nhpoly1305 - eliminate unnecessary CFI wrappers
crypto: x86/sha1 - fix possible crash with CFI enabled
crypto: x86/sha256 - fix possible crash with CFI enabled
crypto: x86/sha512 - fix possible crash with CFI enabled
crypto: x86/sm3 - fix possible crash with CFI enabled
crypto: x86/sm4 - fix crash with CFI enabled
crypto: arm64/nhpoly1305 - eliminate unnecessary CFI wrapper
crypto: arm64/sm3 - fix possible crash with CFI enabled
crypto: arm/nhpoly1305 - eliminate unnecessary CFI wrapper
Revert "crypto: shash - avoid comparing pointers to exported functions under CFI"
Frederick Lawler (1):
crypto: af_alg - Support symmetric encryption via keyring keys
Gaosheng Cui (2):
crypto: ccree - Remove debugfs when platform_driver_register failed
crypto: img-hash - Fix variable dereferenced before check 'hdev->req'
Giovanni Cabiddu (12):
crypto: qat - relocate bufferlist logic
crypto: qat - rename bufferlist functions
crypto: qat - change bufferlist logic interface
crypto: qat - generalize crypto request buffers
crypto: qat - extend buffer list interface
crypto: qat - relocate backlog related structures
crypto: qat - relocate qat_algs_alloc_flags()
crypto: qat - rename and relocate GEN2 config function
crypto: qat - expose deflate through acomp api for QAT GEN2
crypto: qat - enable deflate for QAT GEN4
crypto: acomp - define max size for destination
crypto: qat - add resubmit logic for decompression
Gustavo A. R. Silva (1):
crypto: talitos - Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper
Herbert Xu (34):
crypto: ixp4xx - Fix sparse warnings
crypto: cryptd - Use request context instead of stack for sub-request
crypto: skcipher - Allow sync algorithms with large request contexts
Merge branch 'i2c/client_device_id_helper-immutable' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa/linux
crypto: rsa-pkcs1pad - Use helper to set reqsize
crypto: kpp - Add helper to set reqsize
crypto: hisilicon/hpre - Use helper to set reqsize
crypto: qat - Use helper to set reqsize
crypto: caam - Use helper to set reqsize
crypto: virtio - Use helper to set reqsize
crypto: akcipher - Move reqsize into tfm
crypto: dh - Use helper to set reqsize
crypto: kpp - Move reqsize into tfm
crypto: Prepare to move crypto_tfm_ctx
crypto: api - Add crypto_tfm_ctx_dma
crypto: aead - Add ctx helpers with DMA alignment
crypto: hash - Add ctx helpers with DMA alignment
crypto: skcipher - Add ctx helpers with DMA alignment
crypto: api - Increase MAX_ALGAPI_ALIGNMASK to 127
crypto: akcipher - Add ctx helpers with DMA alignment
crypto: kpp - Add ctx helpers with DMA alignment
crypto: caam - Set DMA alignment explicitly
crypto: api - Use linux/cache.h instead of asm/cache.h
crypto: chelsio - Fix flexible struct array warning
crypto: cavium - Set DMA alignment explicitly
crypto: ccp - Set DMA alignment explicitly
crypto: ccree - Set DMA alignment explicitly
crypto: chelsio - Set DMA alignment explicitly
crypto: hisilicon/hpre - Set DMA alignment explicitly
crypto: safexcel - Set DMA alignment explicitly
crypto: keembay - Set DMA alignment explicitly
crypto: octeontx - Set DMA alignment explicitly
crypto: octeontx2 - Set DMA alignment explicitly
crypto: qce - Set DMA alignment explicitly
Jason A. Donenfeld (2):
hwrng: core - treat default_quality as a maximum and default to 1024
hwrng: u2fzero - account for high quality RNG
Joe Fradley (1):
crypto: x86/curve25519 - disable gcov
Kai Ye (8):
crypto: hisilicon/qm - increase the memory of local variables
crypto: hisilicon/qm - add pci bdf number check
crypto: hisilicon/qm - delete redundancy check
crypto: hisilicon/qm - delete redundant null assignment operations
crypto: hisilicon/qm - modify the process of regs dfx
crypto: hisilicon/qm - split a debugfs.c from qm
crypto: hisilicon/qm - the command dump process is modified
crypto: hisilicon/sec - fix spelling mistake 'ckeck' -> 'check'
Linus Walleij (4):
dt-bindings: crypto: Let STM32 define Ux500 CRYP
crypto: stm32 - enable drivers to be used on Ux500
crypto: stm32/cryp - enable for use with Ux500
crypto: ux500/cryp - delete driver
Mario Limonciello (1):
crypto: ccp - Add support for TEE for PCI ID 0x14CA
Mingming.Su (1):
hwrng: mtk - add mt7986 support
Natalia Petrova (1):
crypto: nitrox - avoid double free on error path in nitrox_sriov_init()
Nikolaus Voss (1):
crypto: caam - warn if blob_gen key is insecure
Peter Harliman Liem (3):
crypto: inside-secure - Expand soc data structure
crypto: inside-secure - Add fw_little_endian option
crypto: inside-secure - Add MaxLinear platform
Ralph Siemsen (1):
crypto: doc - use correct function name
Robert Elliott (1):
crypto: tcrypt - fix return value for multiple subtests
Shang XiaoJing (1):
crypto: omap-sham - Use pm_runtime_resume_and_get() in omap_sham_probe()
Shashank Gupta (1):
crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe
Tianjia Zhang (17):
crypto: ccm - use local variables instead of indirect references
crypto: scatterwalk - remove duplicate function declarations
crypto: arm64/sm3 - raise the priority of the CE implementation
crypto: arm64/sm3 - add NEON assembly implementation
crypto: arm64/sm4 - refactor and simplify NEON implementation
crypto: testmgr - add SM4 cts-cbc/xts/xcbc test vectors
crypto: tcrypt - add SM4 cts-cbc/xts/xcbc test
crypto: arm64/sm4 - refactor and simplify CE implementation
crypto: arm64/sm4 - simplify sm4_ce_expand_key() of CE implementation
crypto: arm64/sm4 - export reusable CE acceleration functions
crypto: arm64/sm4 - add CE implementation for CTS-CBC mode
crypto: arm64/sm4 - add CE implementation for XTS mode
crypto: arm64/sm4 - add CE implementation for cmac/xcbc/cbcmac
crypto: arm64/sm4 - add CE implementation for CCM mode
crypto: arm64/sm4 - add CE implementation for GCM mode
crypto: arm64 - Fix unused variable compilation warnings of cpu_feature
crypto: ccree,hisilicon - Fix dependencies to correct algorithm
Tomas Marek (3):
hwrng: stm32 - fix number of returned bytes on read
hwrng: stm32 - fix read of the last word
hwrng: stm32 - rename readl return value
Tomer Maimon (2):
dt-bindings: rng: nuvoton,npcm-rng: Add npcm845 compatible string
hwrng: npcm - Add NPCM8XX support
Uwe Kleine-König (3):
crypto: ccree - Make cc_debugfs_global_fini() available for module init function
crypto: atmel-ecc - Convert to i2c's .probe_new()
crypto: atmel-sha204a - Convert to i2c's .probe_new()
Wang Yufen (1):
crypto: qat - fix error return code in adf_probe
Weili Qian (5):
crypto: hisilicon/qm - fix incorrect parameters usage
crypto: hisilicon/sec - enabling clock gating of the address prefetch module
crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
crypto: hisilicon/qm - fix 'QM_XEQ_DEPTH_CAP' mask value
crypto: hisilicon/qm - add device status check when start fails
Wenkai Lin (1):
crypto: hisilicon/sec - remove continuous blank lines
Xiongfeng Wang (3):
crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set()
hwrng: amd - Fix PCI device refcount leak
hwrng: geode - Fix PCI device refcount leak
Yang Li (1):
crypto: rockchip - Remove surplus dev_err() when using platform_get_irq()
Yicong Yang (1):
crypto: hisilicon/qm - drop unnecessary IS_ENABLE(CONFIG_NUMA) check
Yuan Can (1):
crypto: ccp - Remove unused struct ccp_crypto_cpu
Yushan Zhou (1):
crypto: marvell/octeontx - remove redundant NULL check
Zhang Yiqun (1):
crypto: tcrypt - Fix multibuffer skcipher speed test mem leak
Zhiqi Song (1):
crypto: hisilicon/hpre - fix resource leak in remove process
jianchunfu (1):
crypto: talitos - Use the defined variable to clean code
ruanjinjie (1):
crypto: ccp - Add __init/__exit annotations to module init/exit funcs
wangjianli (1):
crypto: octeontx - fix repeated words in comments
Documentation/crypto/devel-algos.rst | 2 +-
Documentation/crypto/userspace-if.rst | 15 +-
.../bindings/crypto/rockchip,rk3288-crypto.yaml | 127 ++
.../devicetree/bindings/crypto/rockchip-crypto.txt | 28 -
.../devicetree/bindings/crypto/st,stm32-cryp.yaml | 19 +
.../devicetree/bindings/rng/nuvoton,npcm-rng.yaml | 4 +-
MAINTAINERS | 7 +
arch/arm/crypto/Kconfig | 2 +-
arch/arm/crypto/aes-cipher-glue.c | 2 +-
arch/arm/crypto/nh-neon-core.S | 2 +-
arch/arm/crypto/nhpoly1305-neon-glue.c | 11 +-
arch/arm64/crypto/Kconfig | 49 +-
arch/arm64/crypto/Makefile | 9 +
arch/arm64/crypto/aes-ce-glue.c | 2 +-
arch/arm64/crypto/aes-cipher-glue.c | 2 +-
arch/arm64/crypto/aes-modes.S | 34 +-
arch/arm64/crypto/aes-neonbs-core.S | 16 +-
arch/arm64/crypto/crct10dif-ce-core.S | 5 +-
arch/arm64/crypto/ghash-ce-core.S | 8 +-
arch/arm64/crypto/ghash-ce-glue.c | 2 +-
arch/arm64/crypto/nh-neon-core.S | 5 +-
arch/arm64/crypto/nhpoly1305-neon-glue.c | 11 +-
arch/arm64/crypto/sm3-ce-glue.c | 2 +-
arch/arm64/crypto/sm3-neon-core.S | 601 ++++++++
arch/arm64/crypto/sm3-neon-glue.c | 103 ++
arch/arm64/crypto/sm4-ce-asm.h | 209 +++
arch/arm64/crypto/sm4-ce-ccm-core.S | 328 ++++
arch/arm64/crypto/sm4-ce-ccm-glue.c | 303 ++++
arch/arm64/crypto/sm4-ce-cipher-glue.c | 2 +-
arch/arm64/crypto/sm4-ce-core.S | 1205 ++++++++++-----
arch/arm64/crypto/sm4-ce-gcm-core.S | 741 +++++++++
arch/arm64/crypto/sm4-ce-gcm-glue.c | 286 ++++
arch/arm64/crypto/sm4-ce-glue.c | 575 ++++++-
arch/arm64/crypto/sm4-ce.h | 16 +
arch/arm64/crypto/sm4-neon-core.S | 630 +++++---
arch/arm64/crypto/sm4-neon-glue.c | 172 +--
arch/um/drivers/random.c | 1 -
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aegis128-aesni-asm.S | 9 +-
arch/x86/crypto/aria-aesni-avx-asm_64.S | 13 +-
arch/x86/crypto/nh-avx2-x86_64.S | 5 +-
arch/x86/crypto/nh-sse2-x86_64.S | 5 +-
arch/x86/crypto/nhpoly1305-avx2-glue.c | 11 +-
arch/x86/crypto/nhpoly1305-sse2-glue.c | 11 +-
arch/x86/crypto/sha1_ni_asm.S | 3 +-
arch/x86/crypto/sha1_ssse3_asm.S | 3 +-
arch/x86/crypto/sha256-avx-asm.S | 3 +-
arch/x86/crypto/sha256-avx2-asm.S | 3 +-
arch/x86/crypto/sha256-ssse3-asm.S | 3 +-
arch/x86/crypto/sha256_ni_asm.S | 3 +-
arch/x86/crypto/sha512-avx-asm.S | 3 +-
arch/x86/crypto/sha512-avx2-asm.S | 3 +-
arch/x86/crypto/sha512-ssse3-asm.S | 3 +-
arch/x86/crypto/sm3-avx-asm_64.S | 3 +-
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 7 +-
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 7 +-
arch/x86/crypto/twofish_glue.c | 2 +-
crypto/Kconfig | 9 +-
crypto/Makefile | 1 -
crypto/aes_generic.c | 2 +-
crypto/aes_ti.c | 2 +-
crypto/af_alg.c | 135 +-
crypto/algapi.c | 160 +-
crypto/algboss.c | 22 +-
crypto/anubis.c | 2 +-
crypto/api.c | 11 +-
crypto/blowfish_common.c | 3 +-
crypto/blowfish_generic.c | 3 +-
crypto/camellia_generic.c | 2 +-
crypto/cast5_generic.c | 2 +-
crypto/cast6_generic.c | 2 +-
crypto/ccm.c | 2 +-
crypto/cryptd.c | 36 +-
crypto/des_generic.c | 2 +-
crypto/dh.c | 4 +-
crypto/fcrypt.c | 2 +-
crypto/internal.h | 20 +-
crypto/kdf_sp800108.c | 10 +-
crypto/khazad.c | 2 +-
crypto/rsa-pkcs1pad.c | 5 +-
crypto/seed.c | 2 +-
crypto/serpent_generic.c | 2 +-
crypto/shash.c | 27 +-
crypto/skcipher.c | 2 +-
crypto/sm4_generic.c | 2 +-
crypto/tcrypt.c | 317 ++--
crypto/tea.c | 2 +-
crypto/testmgr.c | 19 +
crypto/testmgr.h | 977 ++++++++++++
crypto/twofish_common.c | 2 +-
crypto/twofish_generic.c | 2 +-
drivers/char/hw_random/amd-rng.c | 18 +-
drivers/char/hw_random/cavium-rng-vf.c | 1 -
drivers/char/hw_random/cn10k-rng.c | 1 -
drivers/char/hw_random/core.c | 9 +-
drivers/char/hw_random/geode-rng.c | 36 +-
drivers/char/hw_random/mpfs-rng.c | 1 -
drivers/char/hw_random/mtk-rng.c | 5 +-
drivers/char/hw_random/npcm-rng.c | 15 +-
drivers/char/hw_random/s390-trng.c | 1 -
drivers/char/hw_random/stm32-rng.c | 8 +-
drivers/char/hw_random/timeriomem-rng.c | 2 -
drivers/char/hw_random/virtio-rng.c | 1 -
drivers/crypto/Kconfig | 19 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 1 -
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 2 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 1 -
drivers/crypto/amlogic/amlogic-gxl.h | 2 +-
drivers/crypto/atmel-ecc.c | 6 +-
drivers/crypto/atmel-sha204a.c | 7 +-
drivers/crypto/caam/blob_gen.c | 9 +
drivers/crypto/caam/caamalg.c | 72 +-
drivers/crypto/caam/caamalg_qi.c | 52 +-
drivers/crypto/caam/caamalg_qi2.c | 173 +--
drivers/crypto/caam/caamhash.c | 87 +-
drivers/crypto/caam/caampkc.c | 50 +-
drivers/crypto/caam/caamrng.c | 1 -
drivers/crypto/caam/regs.h | 3 +
drivers/crypto/cavium/cpt/cptvf_algs.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 12 +-
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 1 +
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 21 +-
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 12 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 20 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 29 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 17 +-
drivers/crypto/ccp/ccp-crypto-main.c | 15 +-
drivers/crypto/ccp/ccp-crypto-rsa.c | 18 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 26 +-
drivers/crypto/ccp/sp-pci.c | 11 +-
drivers/crypto/ccree/cc_aead.c | 62 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 18 +-
drivers/crypto/ccree/cc_debugfs.c | 2 +-
drivers/crypto/ccree/cc_driver.c | 10 +-
drivers/crypto/ccree/cc_hash.c | 86 +-
drivers/crypto/chelsio/Kconfig | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 49 +-
drivers/crypto/chelsio/chcr_crypto.h | 6 +-
drivers/crypto/hisilicon/Kconfig | 2 +-
drivers/crypto/hisilicon/Makefile | 2 +-
drivers/crypto/hisilicon/debugfs.c | 1147 ++++++++++++++
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 47 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 17 +-
drivers/crypto/hisilicon/qm.c | 1427 ++---------------
drivers/crypto/hisilicon/qm_common.h | 87 ++
drivers/crypto/hisilicon/sec2/sec_crypto.c | 5 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 10 +-
drivers/crypto/hisilicon/zip/zip_main.c | 7 +-
drivers/crypto/img-hash.c | 8 +-
drivers/crypto/inside-secure/safexcel.c | 69 +-
drivers/crypto/inside-secure/safexcel.h | 10 +-
drivers/crypto/inside-secure/safexcel_hash.c | 99 +-
drivers/crypto/ixp4xx_crypto.c | 10 +-
drivers/crypto/keembay/keembay-ocs-hcu-core.c | 26 +-
drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h | 2 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 3 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 69 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 79 +-
drivers/crypto/n2_core.c | 6 +
drivers/crypto/nx/nx-842.h | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 4 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 2 +-
drivers/crypto/qat/qat_4xxx/adf_drv.c | 146 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 4 +
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 2 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 4 +
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 2 -
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 4 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 2 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 4 +
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 2 -
drivers/crypto/qat/qat_common/Makefile | 8 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 14 +
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 1 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 9 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 6 +
drivers/crypto/qat/qat_common/adf_gen2_config.c | 206 +++
drivers/crypto/qat/qat_common/adf_gen2_config.h | 10 +
drivers/crypto/qat/qat_common/adf_gen2_dc.c | 70 +
drivers/crypto/qat/qat_common/adf_gen2_dc.h | 10 +
drivers/crypto/qat/qat_common/adf_gen4_dc.c | 83 +
drivers/crypto/qat/qat_common/adf_gen4_dc.h | 10 +
drivers/crypto/qat/qat_common/adf_init.c | 11 +
drivers/crypto/qat/qat_common/adf_sriov.c | 4 +
drivers/crypto/qat/qat_common/icp_qat_fw.h | 24 +
drivers/crypto/qat/qat_common/icp_qat_fw_comp.h | 404 +++++
drivers/crypto/qat/qat_common/icp_qat_hw.h | 66 +
drivers/crypto/qat/qat_common/icp_qat_hw_20_comp.h | 164 ++
.../qat/qat_common/icp_qat_hw_20_comp_defs.h | 300 ++++
drivers/crypto/qat/qat_common/qat_algs.c | 208 +--
drivers/crypto/qat/qat_common/qat_algs_send.h | 16 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 6 +-
drivers/crypto/qat/qat_common/qat_bl.c | 383 +++++
drivers/crypto/qat/qat_common/qat_bl.h | 67 +
drivers/crypto/qat/qat_common/qat_comp_algs.c | 344 +++++
drivers/crypto/qat/qat_common/qat_comp_req.h | 123 ++
drivers/crypto/qat/qat_common/qat_compression.c | 297 ++++
drivers/crypto/qat/qat_common/qat_compression.h | 37 +
drivers/crypto/qat/qat_common/qat_crypto.c | 120 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 55 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 4 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 2 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 4 +
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 2 -
drivers/crypto/qce/aead.c | 22 +-
drivers/crypto/qce/common.c | 5 +-
drivers/crypto/qce/sha.c | 18 +-
drivers/crypto/rockchip/rk3288_crypto.c | 505 +++---
drivers/crypto/rockchip/rk3288_crypto.h | 107 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 267 ++--
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 543 ++++---
drivers/crypto/stm32/Kconfig | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 417 +++--
drivers/crypto/talitos.c | 6 +-
drivers/crypto/talitos.h | 4 +-
drivers/crypto/ux500/Kconfig | 10 -
drivers/crypto/ux500/Makefile | 1 -
drivers/crypto/ux500/cryp/Makefile | 10 -
drivers/crypto/ux500/cryp/cryp.c | 394 -----
drivers/crypto/ux500/cryp/cryp.h | 315 ----
drivers/crypto/ux500/cryp/cryp_core.c | 1600 --------------------
drivers/crypto/ux500/cryp/cryp_irq.c | 45 -
drivers/crypto/ux500/cryp/cryp_irq.h | 31 -
drivers/crypto/ux500/cryp/cryp_irqp.h | 125 --
drivers/crypto/ux500/cryp/cryp_p.h | 122 --
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 5 +-
drivers/firmware/turris-mox-rwtm.c | 1 -
drivers/hid/hid-u2fzero.c | 1 -
drivers/i2c/i2c-core-base.c | 14 +
drivers/s390/crypto/zcrypt_api.c | 6 -
drivers/usb/misc/chaoskey.c | 1 -
include/crypto/acompress.h | 1 +
include/crypto/akcipher.h | 7 +-
include/crypto/algapi.h | 43 +-
include/crypto/aria.h | 2 +-
include/crypto/gcm.h | 22 +
include/crypto/internal/acompress.h | 2 +
include/crypto/internal/aead.h | 22 +
include/crypto/internal/akcipher.h | 26 +-
include/crypto/internal/hash.h | 30 +-
include/crypto/internal/kpp.h | 30 +-
include/crypto/internal/scompress.h | 3 +-
include/crypto/internal/skcipher.h | 30 +
include/crypto/kpp.h | 9 +-
include/crypto/scatterwalk.h | 1 -
include/linux/crypto.h | 5 -
include/linux/hisi_acc_qm.h | 14 +-
include/linux/hw_random.h | 2 +-
include/linux/i2c.h | 1 +
include/uapi/linux/if_alg.h | 1 +
kernel/padata.c | 15 +-
lib/crypto/Kconfig | 9 +
lib/crypto/Makefile | 5 +
lib/crypto/aesgcm.c | 727 +++++++++
{crypto => lib/crypto}/gf128mul.c | 58 +-
257 files changed, 13380 insertions(+), 7088 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/rockchip,rk3288-crypto.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/rockchip-crypto.txt
create mode 100644 arch/arm64/crypto/sm3-neon-core.S
create mode 100644 arch/arm64/crypto/sm3-neon-glue.c
create mode 100644 arch/arm64/crypto/sm4-ce-asm.h
create mode 100644 arch/arm64/crypto/sm4-ce-ccm-core.S
create mode 100644 arch/arm64/crypto/sm4-ce-ccm-glue.c
create mode 100644 arch/arm64/crypto/sm4-ce-gcm-core.S
create mode 100644 arch/arm64/crypto/sm4-ce-gcm-glue.c
create mode 100644 arch/arm64/crypto/sm4-ce.h
create mode 100644 drivers/crypto/hisilicon/debugfs.c
create mode 100644 drivers/crypto/hisilicon/qm_common.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_config.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_config.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_dc.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_dc.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_dc.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_dc.h
create mode 100644 drivers/crypto/qat/qat_common/icp_qat_fw_comp.h
create mode 100644 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp.h
create mode 100644 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp_defs.h
create mode 100644 drivers/crypto/qat/qat_common/qat_bl.c
create mode 100644 drivers/crypto/qat/qat_common/qat_bl.h
create mode 100644 drivers/crypto/qat/qat_common/qat_comp_algs.c
create mode 100644 drivers/crypto/qat/qat_common/qat_comp_req.h
create mode 100644 drivers/crypto/qat/qat_common/qat_compression.c
create mode 100644 drivers/crypto/qat/qat_common/qat_compression.h
delete mode 100644 drivers/crypto/ux500/cryp/Makefile
delete mode 100644 drivers/crypto/ux500/cryp/cryp.c
delete mode 100644 drivers/crypto/ux500/cryp/cryp.h
delete mode 100644 drivers/crypto/ux500/cryp/cryp_core.c
delete mode 100644 drivers/crypto/ux500/cryp/cryp_irq.c
delete mode 100644 drivers/crypto/ux500/cryp/cryp_irq.h
delete mode 100644 drivers/crypto/ux500/cryp/cryp_irqp.h
delete mode 100644 drivers/crypto/ux500/cryp/cryp_p.h
create mode 100644 lib/crypto/aesgcm.c
rename {crypto => lib/crypto}/gf128mul.c (87%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.2
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
@ 2022-12-14 22:25 ` pr-tracker-bot
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-12-14 22:25 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 14 Dec 2022 16:15:22 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/64e7003c6b85626a533a67c1ba938b75a3db24e6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.3
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
2022-12-14 22:25 ` pr-tracker-bot
@ 2023-02-20 5:22 ` Herbert Xu
2023-02-22 2:50 ` pr-tracker-bot
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-02-20 5:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 736f88689c6912f05d0116917910603a7ba97de7:
crypto: arm64/sm4 - fix possible crash with CFI enabled (2022-12-30 17:57:42 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p1
for you to fetch changes up to 8b84475318641c2b89320859332544cf187e1cbd:
crypto: x86/aria-avx - Do not use avx2 instructions (2023-02-14 13:39:33 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Use kmap_local instead of kmap_atomic.
- Change request callback to take void pointer.
- Print FIPS status in /proc/crypto (when enabled).
Algorithms:
- Add rfc4106/gcm support on arm64.
- Add ARIA AVX2/512 support on x86.
Drivers:
- Add TRNG driver for StarFive SoC.
- Delete ux500/hash driver (subsumed by stm32/hash).
- Add zlib support in qat.
- Add RSA support in aspeed.
----------------------------------------------------------------
Alexander Lobakin (1):
crypto: octeontx2 - Fix objects shared between several modules
Ard Biesheuvel (5):
crypto: scatterwalk - use kmap_local() not kmap_atomic()
crypto: skcipher - Use scatterwalk (un)map interface for dst and src buffers
crypto: arm64/gcm - add RFC4106 support
crypto: tcrypt - include larger key sizes in RFC4106 benchmark
crypto: aead - fix inaccurate documentation
Arnd Bergmann (1):
crypto: wp512 - disable kmsan checks in wp512_process_buffer()
Christophe JAILLET (1):
crypto: virtio/akcipher - Do not use GFP_ATOMIC when not needed
Danny Tsen (6):
crypto: p10-aes-gcm - Update Kconfig and Makefile
crypto: p10-aes-gcm - Glue code for AES/GCM stitched implementation
crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation
crypto: p10-aes-gcm - Supporting functions for AES
crypto: p10-aes-gcm - Supporting functions for ghash
crypto: p10-aes-gcm - A perl script to process PowerPC assembler source
David Rientjes (1):
crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
Eric Biggers (3):
crypto: x86/ghash - fix unaligned access in ghash_setkey()
crypto: x86/ghash - use le128 instead of u128
crypto: x86/ghash - add comment and fix broken link
Giovanni Cabiddu (2):
crypto: qat - fix out-of-bounds read
crypto: qat - drop log level of msg in get_instance_node()
Gustavo A. R. Silva (1):
crypto: aspeed - Replace zero-length array with flexible-array member
Herbert Xu (77):
crypto: arm/sha1 - Fix clang function cast warnings
crypto: lib/blake2s - Split up test function to halve stack usage
lib/mpi: Fix buffer overrun when SG is too long
crypto: caam - Avoid GCC memset bug warning
crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
crypto: caam - Remove GFP_DMA and add DMA alignment padding
crypto: talitos - Remove GFP_DMA and add DMA alignment padding
crypto: p10-aes-gcm - Revert implementation
crypto: essiv - Handle EBUSY correctly
crypto: seqiv - Handle EBUSY correctly
crypto: cryptd - Remove unnecessary skcipher_request_zero
crypto: bcm - Use subrequest for fallback
crypto: caam - Use ahash_request_complete
crypto: xts - Handle EBUSY correctly
crypto: engine - Fix excess parameter doc warning
Revert "crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete"
crypto: img-hash - Fix sparse endianness warning
crypto: marvell/cesa - Use crypto_wait_req
hwrng: starfive - Enable compile testing
crypto: arm64/aes-ccm - Rewrite skcipher walker loop
crypto: safexcel - Use crypto_wait_req
crypto: arm64/sm4-gcm - Fix possible crash in GCM cryption
crypto: api - Add scaffolding to change completion function signature
dm: Add scaffolding to change completion function signature
net: macsec: Add scaffolding to change completion function signature
fs: ecryptfs: Use crypto_wait_req
Bluetooth: Use crypto_wait_req
net: ipv4: Add scaffolding to change completion function signature
net: ipv6: Add scaffolding to change completion function signature
tipc: Add scaffolding to change completion function signature
tls: Only use data field in crypto completion function
KEYS: DH: Use crypto_wait_req
crypto: cryptd - Use subreq for AEAD
crypto: acompress - Use crypto_request_complete
crypto: aead - Use crypto_request_complete
crypto: akcipher - Use crypto_request_complete
crypto: hash - Use crypto_request_complete
crypto: kpp - Use crypto_request_complete
crypto: skcipher - Use crypto_request_complete
crypto: engine - Use crypto_request_complete
crypto: rsa-pkcs1pad - Use akcipher_request_complete
crypto: cryptd - Use request_complete helpers
crypto: atmel - Use request_complete helpers
crypto: artpec6 - Use request_complete helpers
crypto: bcm - Use request_complete helpers
crypto: cpt - Use request_complete helpers
crypto: nitrox - Use request_complete helpers
crypto: ccp - Use request_complete helpers
crypto: chelsio - Use request_complete helpers
crypto: hifn_795x - Use request_complete helpers
crypto: hisilicon - Use request_complete helpers
crypto: img-hash - Use request_complete helpers
crypto: safexcel - Use request_complete helpers
crypto: ixp4xx - Use request_complete helpers
crypto: marvell/cesa - Use request_complete helpers
crypto: octeontx - Use request_complete helpers
crypto: octeontx2 - Use request_complete helpers
crypto: mxs-dcp - Use request_complete helpers
crypto: qat - Use request_complete helpers
crypto: qce - Use request_complete helpers
crypto: s5p-sss - Use request_complete helpers
crypto: sahara - Use request_complete helpers
crypto: talitos - Use request_complete helpers
crypto: api - Use data directly in completion function
dm: Remove completion function scaffolding
net: macsec: Remove completion function scaffolding
net: ipv4: Remove completion function scaffolding
net: ipv6: Remove completion function scaffolding
tipc: Remove completion function scaffolding
tls: Remove completion function scaffolding
crypto: api - Remove completion function scaffolding
tls: Pass rec instead of aead_req into tls_encrypt_done
crypto: ecc - Silence sparse warning
crypto: nx - Fix sparse warnings
crypto: crypto4xx - Call dma_unmap_page when done
crypto: proc - Print fips status
crypto: aspeed - Fix modular aspeed-acry
Jia Jie Ho (2):
dt-bindings: rng: Add StarFive TRNG module
hwrng: starfive - Add TRNG driver for StarFive SoC
Koba Ko (1):
crypto: ccp - Failure on re-initialization due to duplicate sysfs filename
Linus Walleij (7):
crypto: stm32 - Use accelerated readsl/writesl
dt-bindings: crypto: Let STM32 define Ux500 HASH
crypto: stm32/hash - Simplify code
crypto: stm32/hash - Use existing busy poll function
crypto: stm32/hash - Wait for idle before final CPU xmit
crypto: stm32/hash - Support Ux500 hash
crypto: ux500/hash - delete driver
Lucas Segarra Fernandez (2):
crypto: qat - extend buffer list logic interface
crypto: qat - add qat_zlib_deflate
Lukas Bulwahn (4):
crypto: ux500 - update debug config after ux500 cryp driver removal
crypto: hisilicon - remove redundant config PCI dependency for some CRYPTO_DEV_HISI configs
crypto: atmel-i2c - avoid defines prefixed with CONFIG
MAINTAINERS: repair file entry for STARFIVE TRNG DRIVER
Meadhbh (1):
Documentation: qat: change kernel version
Meadhbh Fitzpatrick (1):
crypto: qat - fix spelling mistakes from 'bufer' to 'buffer'
Neal Liu (5):
crypto: aspeed - Add ACRY RSA driver
ARM: dts: aspeed: Add ACRY/AHBC device controller node
dt-bindings: crypto: add documentation for Aspeed ACRY
dt-bindings: bus: add documentation for Aspeed AHBC
crypto: aspeed - fix type warnings
Nicolai Stange (4):
crypto: xts - restrict key lengths to approved values in FIPS mode
crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
crypto: testmgr - disallow plain ghash in FIPS mode
crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
Peter Lafreniere (4):
crypto: x86 - exit fpu context earlier in ECB/CBC macros
crypto: x86/blowfish - Remove unused encode parameter
crypto: x86/blowfish - Convert to use ECB/CBC helpers
crypto: x86/blowfish - Eliminate use of SYM_TYPED_FUNC_START in asm
Samuel Holland (2):
dt-bindings: crypto: sun8i-ce: Add compatible for D1
crypto: sun8i-ce - Add TRNG clock to the D1 variant
Sergiu Moga (1):
crypto: atmel - Add capability case for the 0x600 SHA and AES IP versions
Taehee Yoo (8):
crypto: x86/aria - add keystream array into request ctx
crypto: x86/aria - do not use magic number offsets of aria_ctx
crypto: x86/aria - implement aria-avx2
crypto: x86/aria - implement aria-avx512
crypto: x86/aria-avx - fix build failure with old binutils
crypto: x86/aria-avx2 - fix build failure with old binutils
crypto: x86/aria-avx512 - fix build failure with old binutils
crypto: x86/aria-avx - Do not use avx2 instructions
Tianjia Zhang (1):
crypto: arm64/sm4-ccm - Rewrite skcipher walker loop
Tom Lendacky (3):
crypto: ccp - Provide MMIO register naming for documenation
crypto: ccp - Add a firmware definition for EPYC gen 4 processors
crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware
Uwe Kleine-König (1):
crypto: atmel - Drop unused id parameter from atmel_i2c_probe()
Vladis Dronov (3):
crypto: xts - drop xts_check_key()
crypto: s390/aes - drop redundant xts key check
crypto: testmgr - disallow certain DRBG hash functions in FIPS mode
Weili Qian (5):
crypto: hisilicon/qm - remove some unused defines
crypto: hisilicon/qm - use min() instead of min_t()
crypto: hisilicon/qm - change function names
crypto: hisilicon/qm - update comments to match function
crypto: hisilicon/qm - fix coding style issues
Yang Yingliang (1):
crypto: aspeed - change aspeed_acry_akcipher_algs to static
Zhang Yiqun (1):
crypto: testmgr - add diff-splits of src/dst into default cipher config
ye xingchen (1):
crypto: aspeed - Use devm_platform_get_and_ioremap_resource()
Documentation/ABI/testing/sysfs-driver-qat | 4 +-
.../bindings/bus/aspeed,ast2600-ahbc.yaml | 37 +
.../bindings/crypto/allwinner,sun8i-ce.yaml | 33 +-
.../bindings/crypto/aspeed,ast2600-acry.yaml | 49 +
.../devicetree/bindings/crypto/st,stm32-hash.yaml | 23 +-
.../bindings/rng/starfive,jh7110-trng.yaml | 55 +
MAINTAINERS | 8 +-
arch/arm/boot/dts/aspeed-g6.dtsi | 13 +
arch/arm/crypto/sha1_glue.c | 14 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 57 +-
arch/arm64/crypto/ghash-ce-glue.c | 145 +-
arch/arm64/crypto/sm4-ce-ccm-glue.c | 44 +-
arch/arm64/crypto/sm4-ce-gcm-glue.c | 51 +-
arch/s390/crypto/aes_s390.c | 4 -
arch/s390/crypto/paes_s390.c | 2 +-
arch/x86/Kconfig.assembler | 5 +
arch/x86/crypto/Kconfig | 38 +
arch/x86/crypto/Makefile | 6 +
arch/x86/crypto/aria-aesni-avx-asm_64.S | 172 +-
arch/x86/crypto/aria-aesni-avx2-asm_64.S | 1441 ++++++++++++++
arch/x86/crypto/aria-avx.h | 48 +-
arch/x86/crypto/aria-gfni-avx512-asm_64.S | 971 ++++++++++
arch/x86/crypto/aria_aesni_avx2_glue.c | 254 +++
arch/x86/crypto/aria_aesni_avx_glue.c | 49 +-
arch/x86/crypto/aria_gfni_avx512_glue.c | 250 +++
arch/x86/crypto/blowfish-x86_64-asm_64.S | 71 +-
arch/x86/crypto/blowfish_glue.c | 200 +-
arch/x86/crypto/ecb_cbc_helpers.h | 19 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 6 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 45 +-
arch/x86/kernel/asm-offsets.c | 8 +
crypto/adiantum.c | 5 +-
crypto/af_alg.c | 6 +-
crypto/ahash.c | 195 +-
crypto/api.c | 4 +-
crypto/aria_generic.c | 4 +
crypto/authenc.c | 14 +-
crypto/authencesn.c | 15 +-
crypto/ccm.c | 9 +-
crypto/chacha20poly1305.c | 40 +-
crypto/cryptd.c | 290 +--
crypto/crypto_engine.c | 8 +-
crypto/cts.c | 12 +-
crypto/dh.c | 5 +-
crypto/ecc.c | 6 +-
crypto/essiv.c | 15 +-
crypto/gcm.c | 36 +-
crypto/hctr2.c | 5 +-
crypto/lrw.c | 4 +-
crypto/pcrypt.c | 4 +-
crypto/proc.c | 6 +
crypto/rsa-pkcs1pad.c | 51 +-
crypto/seqiv.c | 7 +-
crypto/shash.c | 4 +-
crypto/skcipher.c | 22 +-
crypto/tcrypt.c | 8 +-
crypto/tcrypt.h | 2 +-
crypto/testmgr.c | 16 +-
crypto/wp512.c | 2 +-
crypto/xts.c | 20 +-
drivers/char/hw_random/Kconfig | 10 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/jh7110-trng.c | 393 ++++
drivers/crypto/Kconfig | 10 -
drivers/crypto/Makefile | 1 -
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 1 +
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 2 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 4 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 13 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 4 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 11 +-
drivers/crypto/amcc/crypto4xx_core.c | 10 +-
drivers/crypto/aspeed/Kconfig | 11 +
drivers/crypto/aspeed/Makefile | 4 +
drivers/crypto/aspeed/aspeed-acry.c | 828 +++++++++
drivers/crypto/aspeed/aspeed-hace.c | 5 +-
drivers/crypto/aspeed/aspeed-hace.h | 2 +-
drivers/crypto/atmel-aes.c | 7 +-
drivers/crypto/atmel-ecc.c | 3 +-
drivers/crypto/atmel-i2c.c | 4 +-
drivers/crypto/atmel-i2c.h | 4 +-
drivers/crypto/atmel-sha.c | 10 +-
drivers/crypto/atmel-sha204a.c | 3 +-
drivers/crypto/atmel-tdes.c | 4 +-
drivers/crypto/axis/artpec6_crypto.c | 14 +-
drivers/crypto/bcm/cipher.c | 102 +-
drivers/crypto/bcm/cipher.h | 7 +-
drivers/crypto/caam/blob_gen.c | 2 +-
drivers/crypto/caam/caamalg.c | 16 +-
drivers/crypto/caam/caamalg_qi.c | 16 +-
drivers/crypto/caam/caamalg_qi2.c | 56 +-
drivers/crypto/caam/caamalg_qi2.h | 10 +-
drivers/crypto/caam/caamhash.c | 18 +-
drivers/crypto/caam/caampkc.c | 31 +-
drivers/crypto/caam/caamprng.c | 12 +-
drivers/crypto/caam/caamrng.c | 11 +-
drivers/crypto/caam/ctrl.c | 4 +-
drivers/crypto/caam/desc_constr.h | 3 +-
drivers/crypto/caam/key_gen.c | 2 +-
drivers/crypto/caam/qi.c | 4 +-
drivers/crypto/caam/qi.h | 12 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 8 +-
drivers/crypto/ccp/ccp-crypto-main.c | 12 +-
drivers/crypto/ccp/ccp-dmaengine.c | 21 +-
drivers/crypto/ccp/sev-dev.c | 16 +-
drivers/crypto/ccp/sp-pci.c | 46 +-
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 6 +-
drivers/crypto/hifn_795x.c | 4 +-
drivers/crypto/hisilicon/Kconfig | 8 +-
drivers/crypto/hisilicon/qm.c | 54 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 6 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 10 +-
drivers/crypto/hisilicon/sgl.c | 1 -
drivers/crypto/img-hash.c | 12 +-
drivers/crypto/inside-secure/safexcel.c | 15 +-
drivers/crypto/inside-secure/safexcel.h | 6 -
drivers/crypto/inside-secure/safexcel_cipher.c | 21 +-
drivers/crypto/inside-secure/safexcel_hash.c | 54 +-
drivers/crypto/ixp4xx_crypto.c | 4 +-
drivers/crypto/marvell/cesa/cesa.c | 4 +-
drivers/crypto/marvell/cesa/hash.c | 41 +-
drivers/crypto/marvell/cesa/tdma.c | 2 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 6 +-
drivers/crypto/marvell/octeontx2/Makefile | 11 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 9 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.h | 2 -
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 2 -
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 14 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 11 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 2 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 6 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 2 +
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/nx/nx-common-powernv.c | 13 +-
drivers/crypto/nx/nx-common-pseries.c | 6 +-
.../qat/qat_common/adf_transport_access_macros.h | 2 +-
drivers/crypto/qat/qat_common/qat_algs.c | 6 +-
drivers/crypto/qat/qat_common/qat_algs_send.c | 3 +-
drivers/crypto/qat/qat_common/qat_bl.c | 115 +-
drivers/crypto/qat/qat_common/qat_bl.h | 4 +-
drivers/crypto/qat/qat_common/qat_comp_algs.c | 169 +-
drivers/crypto/qat/qat_common/qat_compression.c | 2 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 2 +-
drivers/crypto/qce/core.c | 4 +-
drivers/crypto/s5p-sss.c | 8 +-
drivers/crypto/sahara.c | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 37 +-
drivers/crypto/stm32/stm32-hash.c | 266 ++-
drivers/crypto/talitos.c | 6 +-
drivers/crypto/ux500/Kconfig | 22 -
drivers/crypto/ux500/Makefile | 7 -
drivers/crypto/ux500/hash/Makefile | 11 -
drivers/crypto/ux500/hash/hash_alg.h | 398 ----
drivers/crypto/ux500/hash/hash_core.c | 1966 --------------------
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 2 +-
drivers/md/dm-crypt.c | 8 +-
drivers/md/dm-integrity.c | 4 +-
drivers/net/macsec.c | 8 +-
fs/ecryptfs/crypto.c | 30 +-
include/crypto/aead.h | 20 +-
include/crypto/algapi.h | 6 +
include/crypto/if_alg.h | 4 +-
include/crypto/internal/acompress.h | 2 +-
include/crypto/internal/aead.h | 2 +-
include/crypto/internal/akcipher.h | 2 +-
include/crypto/internal/hash.h | 2 +-
include/crypto/internal/kpp.h | 2 +-
include/crypto/internal/skcipher.h | 2 +-
include/crypto/scatterwalk.h | 4 +-
include/crypto/xts.h | 25 +-
include/linux/crypto.h | 4 +-
include/linux/hisi_acc_qm.h | 5 +-
lib/crypto/blake2s-selftest.c | 25 +-
lib/mpi/mpicoder.c | 3 +-
net/bluetooth/ecdh_helper.c | 37 +-
net/ipv4/ah4.c | 8 +-
net/ipv4/esp4.c | 20 +-
net/ipv6/ah6.c | 8 +-
net/ipv6/esp6.c | 20 +-
net/tipc/crypto.c | 12 +-
net/tls/tls.h | 2 +
net/tls/tls_sw.c | 42 +-
security/keys/dh.c | 30 +-
186 files changed, 6379 insertions(+), 4053 deletions(-)
create mode 100644 Documentation/devicetree/bindings/bus/aspeed,ast2600-ahbc.yaml
create mode 100644 Documentation/devicetree/bindings/crypto/aspeed,ast2600-acry.yaml
create mode 100644 Documentation/devicetree/bindings/rng/starfive,jh7110-trng.yaml
create mode 100644 arch/x86/crypto/aria-aesni-avx2-asm_64.S
create mode 100644 arch/x86/crypto/aria-gfni-avx512-asm_64.S
create mode 100644 arch/x86/crypto/aria_aesni_avx2_glue.c
create mode 100644 arch/x86/crypto/aria_gfni_avx512_glue.c
create mode 100644 drivers/char/hw_random/jh7110-trng.c
create mode 100644 drivers/crypto/aspeed/aspeed-acry.c
delete mode 100644 drivers/crypto/ux500/Kconfig
delete mode 100644 drivers/crypto/ux500/Makefile
delete mode 100644 drivers/crypto/ux500/hash/Makefile
delete mode 100644 drivers/crypto/ux500/hash/hash_alg.h
delete mode 100644 drivers/crypto/ux500/hash/hash_core.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.3
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
@ 2023-02-22 2:50 ` pr-tracker-bot
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-02-22 2:50 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 20 Feb 2023 13:22:32 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/36289a03bcd3aabdf66de75cb6d1b4ee15726438
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.4
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
2023-02-22 2:50 ` pr-tracker-bot
@ 2023-04-24 4:52 ` Herbert Xu
2023-04-26 17:06 ` pr-tracker-bot
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-04-24 4:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit fe15c26ee26efa11741a7b632e9f23b01aca4cc6:
Linux 6.3-rc1 (2023-03-05 14:52:03 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p1
for you to fetch changes up to 482c84e906e535072c55395acabd3a58e9443d12:
i2c: designware: Add doorbell support for Mendocino (2023-04-20 18:20:05 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Total usage stats now include all that returned error (instead of some).
- Remove maximum hash statesize limit.
- Add cloning support for hmac and unkeyed hashes.
- Demote BUG_ON in crypto_unregister_alg to a WARN_ON.
Algorithms:
- Use RIP-relative addressing on x86 to prepare for PIE build.
- Add accelerated AES/GCM stitched implementation on powerpc P10.
- Add some test vectors for cmac(camellia).
- Remove failure case where jent is unavailable outside of FIPS mode in drbg.
- Add permanent and intermittent health error checks in jitter RNG.
Drivers:
- Add support for 402xx devices in qat.
- Add support for HiSTB TRNG.
- Fix hash concurrency issues in stm32.
- Add OP-TEE firmware support in caam.
----------------------------------------------------------------
Anthony Yznaga (1):
padata: use alignment when calculating the number of worker threads
Ard Biesheuvel (13):
crypto: x86/aegis128 - Use RIP-relative addressing
crypto: x86/aesni - Use RIP-relative addressing
crypto: x86/aria - Use RIP-relative addressing
crypto: x86/camellia - Use RIP-relative addressing
crypto: x86/cast5 - Use RIP-relative addressing
crypto: x86/cast6 - Use RIP-relative addressing
crypto: x86/crc32c - Use RIP-relative addressing
crypto: x86/des3 - Use RIP-relative addressing
crypto: x86/ghash - Use RIP-relative addressing
crypto: x86/sha256 - Use RIP-relative addressing
crypto: x86/aesni - Use local .L symbols for code
crypto: x86/crc32 - Use local .L symbols for code
crypto: x86/sha - Use local .L symbols for code
Arnd Bergmann (1):
crypto: ixp4xx - fix building wiht 64-bit dma_addr_t
Bhupesh Sharma (4):
dt-bindings: qcom-qce: Convert bindings to yaml
MAINTAINERS: Add qcom-qce dt-binding file to QUALCOMM CRYPTO DRIVERS section
dt-bindings: qcom-qce: Add 'interconnects' and 'interconnect-names'
dt-bindings: qcom-qce: Add 'iommus' to optional properties
Bjorn Helgaas (6):
crypto: qat - drop redundant adf_enable_aer()
crypto: cavium/nitrox - remove unnecessary aer.h include
crypto: hisilicon/hpre - remove unnecessary aer.h include
crypto: hisilicon/qm - remove unnecessary aer.h include
crypto: hisilicon/sec - remove unnecessary aer.h include
crypto: hisilicon/zip - remove unnecessary aer.h include
Christophe JAILLET (2):
crypto: caam - Clear some memory in instantiate_rng
crypto: mxs-dcp - Use the devm_clk_get_optional_enabled() helper
Damian Muszynski (1):
crypto: qat - add support for 402xx devices
Danny Tsen (8):
crypto: p10-aes-gcm - Glue code for AES/GCM stitched implementation
crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation
crypto: p10-aes-gcm - Supporting functions for AES
crypto: p10-aes-gcm - Supporting functions for ghash
crypto: p10-aes-gcm - A perl script to process PowerPC assembler source.
crypto: p10-aes-gcm - Update Kconfig and Makefile
crypto: p10-aes-gcm - Remove POWER10_CPU dependency
powerpc: Move Power10 feature PPC_MODULE_FEATURE_P10
David Howells (1):
crypto: testmgr - Add some test vectors for cmac(camellia)
David Yang (1):
crypto: hisilicon/trng - add support for HiSTB TRNG
Eric Biggers (2):
crypto: arm64/aes-neonbs - fix crash with CFI enabled
crypto: testmgr - fix RNG performance in fuzz tests
Gaurav Jain (1):
crypto: caam/jr - add .shutdown hook
Heiner Kallweit (3):
hwrng: meson - remove unused member of struct meson_rng_data
hwrng: meson - use devm_clk_get_optional_enabled
hwrng: meson - remove not needed call to platform_set_drvdata
Herbert Xu (34):
crypto: acomp - Be more careful with request flags
crypto: qat - Include algapi.h for low-level Crypto API
crypto: algapi - Move stat reporting into algapi
crypto: aead - Count error stats differently
crypto: akcipher - Count error stats differently
crypto: hash - Count error stats differently
crypto: acomp - Count error stats differently
crypto: kpp - Count error stats differently
crypto: skcipher - Count error stats differently
crypto: rng - Count error stats differently
crypto: api - Move MODULE_ALIAS_CRYPTO to algapi.h
crypto: api - Check CRYPTO_USER instead of NET for report
crypto: stm32 - Save 54 CSR registers
crypto: stm32 - Move polling into do_one_request
crypto: stm32 - Simplify finup
crypto: stm32 - Remove unused hdev->err field
crypto: stm32 - Move hash state into separate structure
crypto: stm32 - Remove unused HASH_FLAGS_ERRORS
crypto: stm32 - Fix empty message processing
crypto: stm32 - Save and restore between each request
crypto: hash - Fix kdoc errors about HASH_ALG_COMMON
crypto: ccree - Depend on HAS_IOMEM
crypto: lib/utils - Move utilities into new header
crypto: drbg - Only fail when jent is unavailable in FIPS mode
crypto: algif_hash - Allocate hash state with kmalloc
crypto: hash - Remove maximum statesize limit
crypto: ixp4xx - Do not check word size when compile testing
crypto: api - Move low-level functions into algapi.h
crypto: api - Add crypto_tfm_get
crypto: api - Add crypto_clone_tfm
crypto: hash - Add crypto_clone_ahash/shash
crypto: hmac - Add support for cloning
crypto: cryptd - Convert hash to use modern init_tfm/exit_tfm
crypto: cryptd - Add support for cloning hashes
Horia GeantA (2):
crypto: caam - reduce page 0 regs access to minimum
crypto: caam - OP-TEE firmware support
Horia Geanta (1):
drivers: crypto: caam/jr - Allow quiesce when quiesced
Jeremi Piotrowski (1):
crypto: ccp - Clear PSP interrupt status register before calling handler
Jonathan McDowell (2):
crypto: safexcel - Raise firmware load failure message to error
crypto: safexcel - Cleanup ring IRQ workqueues on load failure
Krzysztof Kozlowski (2):
crypto: atmel-sha204a - Mark OF related data as maybe unused
crypto: img-hash - Fix img_hash_match unused warning
Luis Chamberlain (1):
crypto: fips - simplify one-level sysctl registration for crypto_sysctl_table
Mario Limonciello (13):
crypto: ccp - Drop TEE support for IRQ handler
crypto: ccp - Add a header for multiple drivers to use `__psp_pa`
crypto: ccp - Move some PSP mailbox bit definitions into common header
crypto: ccp - Add support for an interface for platform features
crypto: ccp - Enable platform access interface on client PSP parts
crypto: ccp - Add support for ringing a platform doorbell
crypto: ccp - Don't initialize CCP for PSP 0x1649
crypto: ccp - Drop extra doorbell checks
crypto: ccp - Bump up doorbell debug message to error
crypto: ccp - Return doorbell status code as an argument
crypto: ccp - Use lower 8 bytes to communicate with doorbell command register
i2c: designware: Use PCI PSP driver for communication
i2c: designware: Add doorbell support for Mendocino
Neal Liu (2):
crypto: aspeed - add error handling if dmam_alloc_coherent() failed
crypto: aspeed - fix uninitialized symbol 'idx' warning
Randy Dunlap (1):
async_tx: fix kernel-doc notation warnings
Ryan Wanner (4):
crypto: atmel-sha - Add zero length message digest support for hmac
crypto: atmel-tdes - Detecting in-place operations with two sg lists
crypto: atmel-aes - Detecting in-place operations two sg lists
crypto: atmel-aes - Match cfb block size with generic implementation
Shashank Gupta (6):
crypto: qat - delay sysfs initialization
crypto: qat - fix concurrency issue when device state changes
crypto: qat - replace state machine calls
crypto: qat - refactor device restart logic
crypto: qat - make state machine functions static
crypto: qat - fix apply custom thread-service mapping for dc service
Stephan Müller (1):
crypto: jitter - permanent and intermittent health errors
Suman Anna (1):
crypto: sa2ul - Select CRYPTO_DES
Thara Gopinath (2):
crypto: qce - Add support to initialize interconnect path
crypto: qce - Make clocks optional
Thomas Weißschuh (1):
padata: Make kobj_type structure constant
Toke Høiland-Jørgensen (1):
crypto: api - Demote BUG_ON() in crypto_unregister_alg() to a WARN_ON()
Tom Zanussi (3):
crypto: keembay - Move driver to drivers/crypto/intel/keembay
crypto: ixp4xx - Move driver to drivers/crypto/intel/ixp4xx
crypto: qat - Move driver to drivers/crypto/intel/qat
Uwe Kleine-König (4):
hwrng: xgene - Simplify using dev_err_probe()
hwrng: xgene - Simplify using devm_clk_get_optional_enabled()
hwrng: xgene - Improve error reporting for problems during .remove()
crypto: keembay - Drop if with an always false condition
Vladimir Zapolskiy (4):
dt-bindings: qcom-qce: Add new SoC compatible strings for Qualcomm QCE IP
dt-bindings: qcom-qce: document optional clocks and clock-names properties
arm64: dts: qcom: sm8550: add QCE IP family compatible values
crypto: qce - Add a QCE IP family compatible 'qcom,qce'
Yang Li (4):
crypto: aspeed - Use devm_platform_ioremap_resource()
crypto: ccree - Use devm_platform_get_and_ioremap_resource()
crypto: img-hash - Use devm_platform_get_and_ioremap_resource()
crypto: stm32 - Use devm_platform_get_and_ioremap_resource()
Ye Xingchen (1):
crypto: p10-aes-gcm - remove duplicate include header
Yu Zhe (4):
hwrng: xgene - remove unnecessary (void*) conversions
crypto: crypto4xx - remove unnecessary (void*) conversions
crypto: drivers - remove unnecessary (void*) conversions
crypto: caam - remove unnecessary (void*) conversions
.../devicetree/bindings/crypto/qcom-qce.txt | 25 -
.../devicetree/bindings/crypto/qcom-qce.yaml | 123 ++
MAINTAINERS | 33 +-
arch/arm64/boot/dts/qcom/sm8550.dtsi | 2 +-
arch/arm64/crypto/aes-neonbs-core.S | 9 +-
arch/powerpc/crypto/Kconfig | 17 +
arch/powerpc/crypto/Makefile | 13 +
arch/powerpc/crypto/aes-gcm-p10-glue.c | 343 +++++
arch/powerpc/crypto/aes-gcm-p10.S | 1521 ++++++++++++++++++++
arch/powerpc/crypto/aesp8-ppc.pl | 585 ++++++++
arch/powerpc/crypto/ghashp8-ppc.pl | 370 +++++
arch/powerpc/crypto/ppc-xlate.pl | 229 +++
arch/powerpc/include/asm/cpufeature.h | 1 +
arch/x86/crypto/aegis128-aesni-asm.S | 6 +-
arch/x86/crypto/aesni-intel_asm.S | 198 +--
arch/x86/crypto/aesni-intel_avx-x86_64.S | 254 ++--
arch/x86/crypto/aria-aesni-avx-asm_64.S | 28 +-
arch/x86/crypto/aria-aesni-avx2-asm_64.S | 28 +-
arch/x86/crypto/aria-gfni-avx512-asm_64.S | 24 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 30 +-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 30 +-
arch/x86/crypto/camellia-x86_64-asm_64.S | 6 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 38 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 32 +-
arch/x86/crypto/crc32-pclmul_asm.S | 16 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 70 +-
arch/x86/crypto/des3_ede-asm_64.S | 96 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 4 +-
arch/x86/crypto/sha1_avx2_x86_64_asm.S | 25 +-
arch/x86/crypto/sha256-avx-asm.S | 16 +-
arch/x86/crypto/sha256-avx2-asm.S | 54 +-
arch/x86/crypto/sha256-ssse3-asm.S | 16 +-
arch/x86/crypto/sha512-avx-asm.S | 8 +-
arch/x86/crypto/sha512-avx2-asm.S | 16 +-
arch/x86/crypto/sha512-ssse3-asm.S | 8 +-
arch/x86/kvm/svm/sev.c | 1 +
crypto/acompress.c | 81 +-
crypto/aead.c | 98 +-
crypto/ahash.c | 144 +-
crypto/akcipher.c | 52 +-
crypto/algapi.c | 219 +--
crypto/algif_hash.c | 19 +-
crypto/api.c | 63 +-
crypto/async_tx/async_pq.c | 10 +-
crypto/async_tx/async_tx.c | 4 +-
crypto/compress.h | 26 +
crypto/cryptd.c | 34 +-
crypto/crypto_user_stat.c | 183 +--
crypto/drbg.c | 2 +-
crypto/fips.c | 11 +-
crypto/hash.h | 40 +
crypto/hmac.c | 15 +
crypto/internal.h | 10 +
crypto/jitterentropy-kcapi.c | 51 +-
crypto/jitterentropy.c | 144 +-
crypto/jitterentropy.h | 1 -
crypto/kpp.c | 53 +-
crypto/rng.c | 65 +-
crypto/scompress.c | 39 +-
crypto/shash.c | 181 ++-
crypto/skcipher.c | 113 +-
crypto/tcrypt.c | 11 +-
crypto/testmgr.c | 272 ++--
crypto/testmgr.h | 47 +
drivers/char/hw_random/meson-rng.c | 29 +-
drivers/char/hw_random/xgene-rng.c | 46 +-
drivers/crypto/Kconfig | 21 +-
drivers/crypto/Makefile | 4 +-
drivers/crypto/amcc/crypto4xx_core.c | 2 +-
drivers/crypto/aspeed/aspeed-acry.c | 14 +-
drivers/crypto/atmel-aes.c | 16 +-
drivers/crypto/atmel-sha.c | 34 +-
drivers/crypto/atmel-sha204a.c | 2 +-
drivers/crypto/atmel-tdes.c | 15 +-
drivers/crypto/caam/caamalg.c | 21 +-
drivers/crypto/caam/caamhash.c | 10 +-
drivers/crypto/caam/caampkc.c | 6 +-
drivers/crypto/caam/caamrng.c | 6 +-
drivers/crypto/caam/ctrl.c | 112 +-
drivers/crypto/caam/debugfs.c | 12 +-
drivers/crypto/caam/debugfs.h | 7 +-
drivers/crypto/caam/dpseci-debugfs.c | 2 +-
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/jr.c | 61 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 1 -
drivers/crypto/ccp/Makefile | 3 +-
drivers/crypto/ccp/platform-access.c | 215 +++
drivers/crypto/ccp/platform-access.h | 35 +
drivers/crypto/ccp/psp-dev.c | 38 +-
drivers/crypto/ccp/psp-dev.h | 11 +-
drivers/crypto/ccp/sev-dev.c | 16 +-
drivers/crypto/ccp/sev-dev.h | 2 +-
drivers/crypto/ccp/sp-dev.h | 10 +
drivers/crypto/ccp/sp-pci.c | 11 +-
drivers/crypto/ccp/tee-dev.c | 17 +-
drivers/crypto/ccree/cc_driver.c | 4 +-
drivers/crypto/hifn_795x.c | 24 +-
drivers/crypto/hisilicon/Kconfig | 7 +
drivers/crypto/hisilicon/Makefile | 2 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 1 -
drivers/crypto/hisilicon/qm.c | 1 -
drivers/crypto/hisilicon/sec2/sec_main.c | 1 -
drivers/crypto/hisilicon/trng/Makefile | 3 +
drivers/crypto/hisilicon/trng/trng-stb.c | 176 +++
drivers/crypto/hisilicon/zip/zip_main.c | 1 -
drivers/crypto/img-hash.c | 7 +-
drivers/crypto/inside-secure/safexcel.c | 39 +-
drivers/crypto/intel/Kconfig | 5 +
drivers/crypto/intel/Makefile | 5 +
drivers/crypto/intel/ixp4xx/Kconfig | 14 +
drivers/crypto/intel/ixp4xx/Makefile | 2 +
drivers/crypto/{ => intel/ixp4xx}/ixp4xx_crypto.c | 15 +-
drivers/crypto/{ => intel}/keembay/Kconfig | 0
drivers/crypto/{ => intel}/keembay/Makefile | 0
.../{ => intel}/keembay/keembay-ocs-aes-core.c | 2 -
.../crypto/{ => intel}/keembay/keembay-ocs-ecc.c | 0
.../{ => intel}/keembay/keembay-ocs-hcu-core.c | 0
drivers/crypto/{ => intel}/keembay/ocs-aes.c | 0
drivers/crypto/{ => intel}/keembay/ocs-aes.h | 0
drivers/crypto/{ => intel}/keembay/ocs-hcu.c | 0
drivers/crypto/{ => intel}/keembay/ocs-hcu.h | 0
drivers/crypto/{ => intel}/qat/Kconfig | 0
drivers/crypto/{ => intel}/qat/Makefile | 0
drivers/crypto/{ => intel}/qat/qat_4xxx/Makefile | 0
.../{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.c | 62 +-
.../{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.h | 9 +-
drivers/crypto/{ => intel}/qat/qat_4xxx/adf_drv.c | 31 +-
drivers/crypto/{ => intel}/qat/qat_c3xxx/Makefile | 0
.../{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 2 +-
.../{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 0
drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_drv.c | 24 +-
.../crypto/{ => intel}/qat/qat_c3xxxvf/Makefile | 0
.../qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 0
.../qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 0
.../crypto/{ => intel}/qat/qat_c3xxxvf/adf_drv.c | 13 +-
drivers/crypto/{ => intel}/qat/qat_c62x/Makefile | 0
.../{ => intel}/qat/qat_c62x/adf_c62x_hw_data.c | 2 +-
.../{ => intel}/qat/qat_c62x/adf_c62x_hw_data.h | 0
drivers/crypto/{ => intel}/qat/qat_c62x/adf_drv.c | 24 +-
drivers/crypto/{ => intel}/qat/qat_c62xvf/Makefile | 0
.../qat/qat_c62xvf/adf_c62xvf_hw_data.c | 0
.../qat/qat_c62xvf/adf_c62xvf_hw_data.h | 0
.../crypto/{ => intel}/qat/qat_c62xvf/adf_drv.c | 13 +-
drivers/crypto/{ => intel}/qat/qat_common/Makefile | 0
.../{ => intel}/qat/qat_common/adf_accel_devices.h | 5 +-
.../{ => intel}/qat/qat_common/adf_accel_engine.c | 0
.../crypto/{ => intel}/qat/qat_common/adf_admin.c | 0
.../crypto/{ => intel}/qat/qat_common/adf_aer.c | 39 +-
.../crypto/{ => intel}/qat/qat_common/adf_cfg.c | 0
.../crypto/{ => intel}/qat/qat_common/adf_cfg.h | 0
.../{ => intel}/qat/qat_common/adf_cfg_common.h | 0
.../{ => intel}/qat/qat_common/adf_cfg_strings.h | 0
.../{ => intel}/qat/qat_common/adf_cfg_user.h | 0
.../{ => intel}/qat/qat_common/adf_common_drv.h | 10 +-
.../{ => intel}/qat/qat_common/adf_ctl_drv.c | 30 +-
.../{ => intel}/qat/qat_common/adf_dev_mgr.c | 2 +
.../{ => intel}/qat/qat_common/adf_gen2_config.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_config.h | 0
.../{ => intel}/qat/qat_common/adf_gen2_dc.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_dc.h | 0
.../{ => intel}/qat/qat_common/adf_gen2_hw_data.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_hw_data.h | 0
.../{ => intel}/qat/qat_common/adf_gen2_pfvf.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_pfvf.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_dc.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_dc.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_hw_data.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_hw_data.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_pfvf.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_pfvf.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_pm.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_pm.h | 0
.../{ => intel}/qat/qat_common/adf_hw_arbiter.c | 2 +-
.../crypto/{ => intel}/qat/qat_common/adf_init.c | 96 +-
.../crypto/{ => intel}/qat/qat_common/adf_isr.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_msg.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_msg.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_msg.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_proto.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_proto.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_utils.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_utils.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_msg.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_msg.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_proto.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_proto.h | 0
.../crypto/{ => intel}/qat/qat_common/adf_sriov.c | 10 +-
.../crypto/{ => intel}/qat/qat_common/adf_sysfs.c | 23 +-
.../{ => intel}/qat/qat_common/adf_transport.c | 0
.../{ => intel}/qat/qat_common/adf_transport.h | 0
.../qat/qat_common/adf_transport_access_macros.h | 0
.../qat/qat_common/adf_transport_debug.c | 0
.../qat/qat_common/adf_transport_internal.h | 0
.../crypto/{ => intel}/qat/qat_common/adf_vf_isr.c | 3 +-
.../crypto/{ => intel}/qat/qat_common/icp_qat_fw.h | 0
.../{ => intel}/qat/qat_common/icp_qat_fw_comp.h | 0
.../qat/qat_common/icp_qat_fw_init_admin.h | 0
.../{ => intel}/qat/qat_common/icp_qat_fw_la.h | 0
.../qat/qat_common/icp_qat_fw_loader_handle.h | 0
.../{ => intel}/qat/qat_common/icp_qat_fw_pke.h | 0
.../{ => intel}/qat/qat_common/icp_qat_hal.h | 0
.../crypto/{ => intel}/qat/qat_common/icp_qat_hw.h | 0
.../qat/qat_common/icp_qat_hw_20_comp.h | 0
.../qat/qat_common/icp_qat_hw_20_comp_defs.h | 0
.../{ => intel}/qat/qat_common/icp_qat_uclo.h | 0
.../crypto/{ => intel}/qat/qat_common/qat_algs.c | 0
.../{ => intel}/qat/qat_common/qat_algs_send.c | 0
.../{ => intel}/qat/qat_common/qat_algs_send.h | 0
.../{ => intel}/qat/qat_common/qat_asym_algs.c | 0
drivers/crypto/{ => intel}/qat/qat_common/qat_bl.c | 0
drivers/crypto/{ => intel}/qat/qat_common/qat_bl.h | 0
.../{ => intel}/qat/qat_common/qat_comp_algs.c | 0
.../{ => intel}/qat/qat_common/qat_comp_req.h | 0
.../{ => intel}/qat/qat_common/qat_compression.c | 0
.../{ => intel}/qat/qat_common/qat_compression.h | 0
.../crypto/{ => intel}/qat/qat_common/qat_crypto.c | 0
.../crypto/{ => intel}/qat/qat_common/qat_crypto.h | 0
.../crypto/{ => intel}/qat/qat_common/qat_hal.c | 1 +
.../crypto/{ => intel}/qat/qat_common/qat_uclo.c | 1 +
.../crypto/{ => intel}/qat/qat_dh895xcc/Makefile | 0
.../qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 2 +-
.../qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 0
.../crypto/{ => intel}/qat/qat_dh895xcc/adf_drv.c | 24 +-
.../crypto/{ => intel}/qat/qat_dh895xccvf/Makefile | 0
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 0
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 0
.../{ => intel}/qat/qat_dh895xccvf/adf_drv.c | 13 +-
drivers/crypto/mxs-dcp.c | 21 +-
drivers/crypto/qce/core.c | 23 +-
drivers/crypto/qce/core.h | 1 +
drivers/crypto/sa2ul.c | 6 +-
drivers/crypto/sahara.c | 4 +-
drivers/crypto/stm32/stm32-hash.c | 361 ++---
drivers/i2c/busses/Kconfig | 5 +-
drivers/i2c/busses/i2c-designware-amdpsp.c | 205 +--
drivers/i2c/busses/i2c-designware-core.h | 1 -
drivers/i2c/busses/i2c-designware-platdrv.c | 1 -
drivers/tee/amdtee/call.c | 2 +-
drivers/tee/amdtee/shm_pool.c | 2 +-
include/crypto/acompress.h | 132 +-
include/crypto/aead.h | 22 +
include/crypto/akcipher.h | 102 +-
include/crypto/algapi.h | 93 +-
include/crypto/hash.h | 95 +-
include/crypto/internal/acompress.h | 43 +-
include/crypto/internal/hash.h | 2 -
include/crypto/internal/scompress.h | 15 +-
include/crypto/kpp.h | 73 +-
include/crypto/rng.h | 65 +-
include/crypto/skcipher.h | 22 +
include/crypto/utils.h | 73 +
include/linux/crypto.h | 236 +--
include/linux/psp-platform-access.h | 65 +
include/linux/psp-sev.h | 8 -
include/linux/psp.h | 29 +
kernel/padata.c | 4 +-
lib/crypto/utils.c | 2 +-
257 files changed, 6776 insertions(+), 2730 deletions(-)
delete mode 100644 Documentation/devicetree/bindings/crypto/qcom-qce.txt
create mode 100644 Documentation/devicetree/bindings/crypto/qcom-qce.yaml
create mode 100644 arch/powerpc/crypto/aes-gcm-p10-glue.c
create mode 100644 arch/powerpc/crypto/aes-gcm-p10.S
create mode 100644 arch/powerpc/crypto/aesp8-ppc.pl
create mode 100644 arch/powerpc/crypto/ghashp8-ppc.pl
create mode 100644 arch/powerpc/crypto/ppc-xlate.pl
create mode 100644 crypto/compress.h
create mode 100644 crypto/hash.h
create mode 100644 drivers/crypto/ccp/platform-access.c
create mode 100644 drivers/crypto/ccp/platform-access.h
create mode 100644 drivers/crypto/hisilicon/trng/trng-stb.c
create mode 100644 drivers/crypto/intel/Kconfig
create mode 100644 drivers/crypto/intel/Makefile
create mode 100644 drivers/crypto/intel/ixp4xx/Kconfig
create mode 100644 drivers/crypto/intel/ixp4xx/Makefile
rename drivers/crypto/{ => intel/ixp4xx}/ixp4xx_crypto.c (99%)
rename drivers/crypto/{ => intel}/keembay/Kconfig (100%)
rename drivers/crypto/{ => intel}/keembay/Makefile (100%)
rename drivers/crypto/{ => intel}/keembay/keembay-ocs-aes-core.c (99%)
rename drivers/crypto/{ => intel}/keembay/keembay-ocs-ecc.c (100%)
rename drivers/crypto/{ => intel}/keembay/keembay-ocs-hcu-core.c (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-aes.c (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-aes.h (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-hcu.c (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-hcu.h (100%)
rename drivers/crypto/{ => intel}/qat/Kconfig (100%)
rename drivers/crypto/{ => intel}/qat/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.c (87%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.h (86%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_drv.c (95%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.c (98%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_drv.c (93%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_drv.c (96%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_c62x_hw_data.c (98%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_c62x_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_drv.c (93%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_c62xvf_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_c62xvf_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_drv.c (96%)
rename drivers/crypto/{ => intel}/qat/qat_common/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_accel_devices.h (97%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_accel_engine.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_admin.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_aer.c (82%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_common.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_strings.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_user.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_common_drv.h (96%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_ctl_drv.c (95%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_dev_mgr.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_config.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_config.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_dc.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_dc.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_pfvf.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_pfvf.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_dc.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_dc.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pfvf.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pfvf.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pm.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pm.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_hw_arbiter.c (98%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_init.c (85%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_isr.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_msg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_msg.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_msg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_proto.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_proto.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_utils.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_utils.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_msg.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_msg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_proto.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_proto.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_sriov.c (96%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_sysfs.c (88%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_access_macros.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_debug.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_internal.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_vf_isr.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_comp.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_init_admin.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_la.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_loader_handle.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_pke.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hal.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw_20_comp.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw_20_comp_defs.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_uclo.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs_send.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs_send.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_asym_algs.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_bl.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_bl.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_comp_algs.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_comp_req.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_compression.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_compression.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_crypto.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_crypto.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_hal.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_uclo.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_drv.c (93%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_drv.c (96%)
create mode 100644 include/crypto/utils.h
create mode 100644 include/linux/psp-platform-access.h
create mode 100644 include/linux/psp.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.4
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
@ 2023-04-26 17:06 ` pr-tracker-bot
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-04-26 17:06 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 24 Apr 2023 12:52:27 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/733f7e9c18c5e377025c1bfdce6bc9a7d55649be
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.5
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
2023-04-26 17:06 ` pr-tracker-bot
@ 2023-06-29 5:06 ` Herbert Xu
2023-07-01 5:04 ` pr-tracker-bot
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-06-29 5:06 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Please note that there is a nasty merge conflict in the directory
crypto/asymmetric because of the conflicting changes in mainline
versus what's in cryptodev.
For the resolution, please pick the code from cryptodev as the
linear interface makes the previous fix-up in mainline unnecessary.
For the time being there is still an unnecessary copy in the API
for the software case but hopefully that will go away once I
finish the conversion of the underlying algorithm code to use
linear addresses instead of SG lists.
The following changes since commit ac9a78681b921877518763ba0e89202254349d1b:
Linux 6.4-rc1 (2023-05-07 13:34:35 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.5-p1
for you to fetch changes up to 486bfb05913ac9969a3a71a4dc48f17f31cb162d:
crypto: akcipher - Do not copy dst if it is NULL (2023-06-27 17:59:52 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add linear akcipher/sig API.
- Add tfm cloning (hmac, cmac).
- Add statesize to crypto_ahash.
Algorithms:
- Allow only odd e and restrict value in FIPS mode for RSA.
- Replace LFSR with SHA3-256 in jitter.
- Add interface for gathering of raw entropy in jitter.
Drivers:
- Fix race on data_avail and actual data in hwrng/virtio.
- Add hash and HMAC support in starfive.
- Add RSA algo support in starfive.
- Add support for PCI device 0x156E in ccp.
----------------------------------------------------------------
Adam Guerin (2):
crypto: qat - move returns to default case
crypto: qat - extend configuration for 4xxx
Arnd Bergmann (2):
crypto: aegis128-neon - add header for internal prototypes
crypto: marvell/cesa - Fix type mismatch warning
Bharat Bhushan (1):
hwrng: cn10k - Add extended trng register support
Bhupesh Sharma (2):
dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290
Damian Muszynski (1):
crypto: qat - move dbgfs init to separate file
Dan Carpenter (1):
crypto: ixp4xx - silence uninitialized variable warning
David Yang (2):
hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
crypto: engine - Fix struct crypto_engine_op doc
Dmitry Safonov (2):
crypto: api - Remove crypto_init_ops()
crypto: cipher - On clone do crypto_mod_get()
Eric Biggers (1):
crypto: Kconfig - warn about performance overhead of CRYPTO_STATS
Franziska Naepelt (1):
crypto: hmac - Add missing blank line
Giovanni Cabiddu (4):
crypto: qat - add missing function declaration in adf_dbgfs.h
crypto: qat - make fw images name constant
crypto: qat - refactor fw config logic for 4xxx
crypto: qat - do not export adf_init_admin_pm()
Hareshx Sankar Raj (2):
crypto: qat - unmap buffer before free for DH
crypto: qat - unmap buffers before free for RSA
Herbert Xu (28):
hwrng: Kconfig - Add HAS_IOMEM dependencies for exynos/meson/mtk/npcm
crypto: arm/sha1-neon - Fix clang function cast warnings
crypto: arm/sha256-neon - Fix clang function cast warnings
crypto: arm/sha512-neon - Fix clang function cast warnings
crypto: hash - Add statesize to crypto_ahash
crypto: hash - Make crypto_ahash_alg helper available
hwrng: virtio - Fix race on data_avail and actual data
crypto: lib/sha256 - Remove redundant and unused sha224_update
crypto: lib/sha256 - Use generic code from sha256_base
crypto: arm64/sha256-glue - Include module.h
crypto: starfive - Depend on AMBA_PL08X instead of selecting it
crypto: cmac - Use modern init_tfm/exit_tfm
crypto: cipher - Add crypto_clone_cipher
crypto: cmac - Add support for cloning
crypto: shash - Allow cloning on algorithms with no init_tfm
dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
crypto: algboss - Add missing dependency on RNG2
crypto: geniv - Split geniv out of AEAD Kconfig option
crypto: api - Add __crypto_alloc_tfmgfp
crypto: akcipher - Add sync interface without SG lists
crypto: sig - Add interface for sign/verify
KEYS: Add forward declaration in asymmetric-parser.h
KEYS: asymmetric: Move sm2 code into x509_public_key
KEYS: asymmetric: Use new crypto interface without scatterlists
crypto: sm2 - Provide sm2_compute_z_digest when sm2 is disabled
crypto: akcipher - Set request tfm on sync path
crypto: sig - Fix verify call
crypto: akcipher - Do not copy dst if it is NULL
Horia GeantA (1):
crypto: caam - refactor RNG initialization
Jia Jie Ho (6):
dt-bindings: crypto: Add StarFive crypto module
crypto: starfive - Add crypto engine support
crypto: starfive - Add hash and HMAC support
crypto: starfive - Fix driver dependencies
crypto: starfive - Update hash module irq handling
crypto: starfive - Add RSA algo support
John Allen (1):
crypto: ccp - Add support for PCI device 0x156E
Karthikeyan Gopal (2):
crypto: qat - set deprecated capabilities as reserved
crypto: qat - update slice mask for 4xxx devices
Lucas Segarra Fernandez (1):
crypto: qat - expose pm_idle_enabled through sysfs
Mahmoud Adam (1):
crypto: rsa - allow only odd e and restrict value in FIPS mode
Mario Limonciello (2):
crypto: ccp - Validate that platform access mailbox registers are declared
crypto: ccp - Add support for PCI device 0x17E0
Martin Kaiser (9):
hwrng: imx-rngc - simpler check for available random bytes
hwrng: imx-rngc - use bitfield macros to read rng type
hwrng: imx-rngc - use BIT(x) for register bit defines
hwrng: imx-rngc - mark the probe function as __init
hwrng: imx-rngc - don't init of_device_id's data
hwrng: imx-rngc - fix the timeout for init and self check
hwrng: st - support compile-testing
hwrng: st - keep clock enabled while hwrng is registered
hwrng: imx-rngc - switch to DEFINE_SIMPLE_DEV_PM_OPS
Meenakshi Aggarwal (1):
crypto: caam - optimize RNG sample size
Pankaj Gupta (1):
crypto: caam - Fix soc_id matching
Randy Dunlap (1):
crypto: nx - fix build warnings when DEBUG_FS is not enabled
Rob Herring (1):
crypto: n2 - Use of_property_read_reg() to parse "reg"
Srujana Challa (2):
crypto: octeontx2 - add support for AF to CPT PF uplink mbox
crypto: octeontx2 - hardware configuration for inline IPsec
Stephan Müller (3):
crypto: jitter - replace LFSR with SHA3-256
crypto: jitter - add interface for gathering of raw entropy
crypto: jitter - correct health test during initialization
Tero Kristo (1):
crypto: sa2ul - change unsafe data size limit to 255 bytes
Uwe Kleine-König (1):
crypto: atmel - Switch i2c drivers back to use .probe()
Victoria Milhoan (1):
crypto: caam - adjust RNG timing to support more devices
Victoria Milhoan (b42089) (1):
crypto: caam - add a test for the RNG
Documentation/ABI/testing/sysfs-driver-qat | 46 ++
.../devicetree/bindings/crypto/qcom-qce.yaml | 52 +-
.../bindings/crypto/starfive,jh7110-crypto.yaml | 70 ++
MAINTAINERS | 7 +
arch/arm/crypto/sha1_neon_glue.c | 12 +-
arch/arm/crypto/sha256_neon_glue.c | 12 +-
arch/arm/crypto/sha512-neon-glue.c | 12 +-
arch/arm64/crypto/sha256-glue.c | 3 +-
crypto/Kconfig | 66 +-
crypto/Makefile | 4 +-
crypto/aegis-neon.h | 17 +
crypto/aegis128-neon-inner.c | 1 +
crypto/aegis128-neon.c | 12 +-
crypto/ahash.c | 9 +-
crypto/akcipher.c | 124 ++-
crypto/api.c | 27 +-
crypto/asymmetric_keys/public_key.c | 303 ++++---
crypto/asymmetric_keys/x509_public_key.c | 29 +-
crypto/cipher.c | 28 +
crypto/cmac.c | 36 +-
crypto/hmac.c | 1 +
crypto/internal.h | 22 +
crypto/jitterentropy-kcapi.c | 192 ++++-
crypto/jitterentropy-testing.c | 294 +++++++
crypto/jitterentropy.c | 152 ++--
crypto/jitterentropy.h | 20 +-
crypto/rsa.c | 36 +
crypto/shash.c | 12 +-
crypto/sig.c | 157 ++++
crypto/sm2.c | 104 ++-
drivers/char/hw_random/Kconfig | 27 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/cn10k-rng.c | 63 +-
.../trng/trng-stb.c => char/hw_random/histb-rng.c} | 83 +-
drivers/char/hw_random/imx-rngc.c | 53 +-
drivers/char/hw_random/st-rng.c | 21 +-
drivers/char/hw_random/virtio-rng.c | 10 +-
drivers/crypto/Kconfig | 1 +
drivers/crypto/Makefile | 1 +
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-sha204a.c | 2 +-
drivers/crypto/caam/Kconfig | 9 +
drivers/crypto/caam/caamrng.c | 48 ++
drivers/crypto/caam/ctrl.c | 272 ++++---
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/ccp/platform-access.c | 5 +
drivers/crypto/ccp/sp-pci.c | 43 +
drivers/crypto/hisilicon/Kconfig | 7 -
drivers/crypto/hisilicon/Makefile | 2 +-
drivers/crypto/hisilicon/trng/Makefile | 3 -
drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c | 2 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 229 ++++--
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 2 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 45 +-
drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_c62x/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_common/Makefile | 4 +-
.../intel/qat/qat_common/adf_accel_devices.h | 2 +-
.../crypto/intel/qat/qat_common/adf_accel_engine.c | 2 +-
drivers/crypto/intel/qat/qat_common/adf_admin.c | 1 -
drivers/crypto/intel/qat/qat_common/adf_cfg.c | 28 +-
drivers/crypto/intel/qat/qat_common/adf_cfg.h | 2 +
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 8 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 69 ++
drivers/crypto/intel/qat/qat_common/adf_dbgfs.h | 29 +
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.c | 12 +-
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_init.c | 6 +
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 60 ++
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 3 +-
drivers/crypto/intel/qat/qat_common/qat_algs.c | 1 -
.../crypto/intel/qat/qat_common/qat_asym_algs.c | 14 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 8 +-
drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c | 12 +-
drivers/crypto/marvell/cesa/cipher.c | 2 +-
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 15 +
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 3 +
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 34 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 33 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 7 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 41 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 247 +++++-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 10 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 8 +-
drivers/crypto/n2_core.c | 9 +-
drivers/crypto/nx/Makefile | 2 +-
drivers/crypto/nx/nx.h | 4 +-
drivers/crypto/sa2ul.h | 2 +-
drivers/crypto/starfive/Kconfig | 20 +
drivers/crypto/starfive/Makefile | 4 +
drivers/crypto/starfive/jh7110-cryp.c | 258 ++++++
drivers/crypto/starfive/jh7110-cryp.h | 172 ++++
drivers/crypto/starfive/jh7110-hash.c | 899 +++++++++++++++++++++
drivers/crypto/starfive/jh7110-rsa.c | 617 ++++++++++++++
drivers/md/dm-crypt.c | 15 +-
include/crypto/akcipher.h | 36 +
include/crypto/algapi.h | 1 -
include/crypto/engine.h | 2 +-
include/crypto/hash.h | 3 +-
include/crypto/internal/cipher.h | 2 +
include/crypto/internal/hash.h | 12 +
include/crypto/internal/sig.h | 17 +
include/crypto/public_key.h | 2 -
include/crypto/sha2.h | 2 +-
include/crypto/sha256_base.h | 50 +-
include/crypto/sig.h | 140 ++++
include/crypto/sm2.h | 21 +-
include/keys/asymmetric-parser.h | 2 +
include/linux/crypto.h | 3 +-
lib/crypto/sha256.c | 79 +-
116 files changed, 4940 insertions(+), 965 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/starfive,jh7110-crypto.yaml
create mode 100644 crypto/aegis-neon.h
create mode 100644 crypto/jitterentropy-testing.c
create mode 100644 crypto/sig.c
rename drivers/{crypto/hisilicon/trng/trng-stb.c => char/hw_random/histb-rng.c} (53%)
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_dbgfs.h
create mode 100644 drivers/crypto/starfive/Kconfig
create mode 100644 drivers/crypto/starfive/Makefile
create mode 100644 drivers/crypto/starfive/jh7110-cryp.c
create mode 100644 drivers/crypto/starfive/jh7110-cryp.h
create mode 100644 drivers/crypto/starfive/jh7110-hash.c
create mode 100644 drivers/crypto/starfive/jh7110-rsa.c
create mode 100644 include/crypto/internal/sig.h
create mode 100644 include/crypto/sig.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.5
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
@ 2023-07-01 5:04 ` pr-tracker-bot
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-07-01 5:04 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 29 Jun 2023 13:06:18 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.5-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5d95ff84e62be914b4a4dabfa814e4096b05b1b0
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.6
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
2023-07-01 5:04 ` pr-tracker-bot
@ 2023-08-28 9:22 ` Herbert Xu
2023-08-29 19:00 ` pr-tracker-bot
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-08-28 9:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 419caed6cc77f19148faefe13515f8685ede219b:
Merge tag 'v6.5-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-07-10 09:53:11 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p1
for you to fetch changes up to 85b9bf9a514d991fcecb118d0a8a35e754ff9265:
Revert "dt-bindings: crypto: qcom,prng: Add SM8450" (2023-08-25 19:01:45 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Move crypto engine callback from tfm ctx into algorithm object.
- Fix atomic sleep bug in crypto_destroy_instance.
- Move lib/mpi into lib/crypto.
Algorithms:
- Add chacha20 and poly1305 implementation for powerpc p10.
Drivers:
- Add AES skcipher and aead support to starfive.
- Add Dynamic Boost Control support to ccp.
- Add support for STM32P13 platform to stm32.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - fix crypto capability detection for 4xxx
Arnd Bergmann (2):
crypto: caam - fix PM operations definition
crypto: drivers - avoid memcpy size warning
Azeem Shaikh (1):
crypto: lrw,xts - Replace strlcpy with strscpy
Chang S. Bae (1):
crypto: x86/aesni - Align the address before aes_set_key_common()
Christophe JAILLET (2):
crypto: caam - Use struct_size()
crypto: caam - Remove messages related to memory allocation failure
Damian Muszynski (5):
crypto: qat - add internal timer for qat 4xxx
crypto: qat - drop obsolete heartbeat interface
crypto: qat - add measure clock frequency
crypto: qat - add heartbeat feature
crypto: qat - add heartbeat counters check
Danny Tsen (5):
crypto: chacha20-p10 - An optimized Chacha20 implementation with 8-way unrolling for ppc64le
crypt: chacha20-p10 - Glue code for optmized Chacha20 implementation for ppc64le
crypto: poly1305-p10 - An optimized Poly1305 implementation with 4-way unrolling for ppc64le
crypto: poly1305-p10 - Glue code for optmized Poly1305 implementation for ppc64le
crypto: powerpc - Add chacha20/poly1305-p10 to Kconfig and Makefile
David Howells (1):
crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390
Eric Biggers (1):
crypto: x86/aesni - remove unused parameter to aes_set_key_common()
Florian Fainelli (1):
hwrng: iproc-rng200 - Implement suspend and resume calls
Franck LENORMAND (1):
crypto: caam - Change structure type representing DECO MID
Frederick Lawler (1):
crypto: af_alg - Decrement struct key.usage in alg_set_by_key_serial()
GUO Zihua (1):
hwrng: core - Remove duplicated include
Gaosheng Cui (1):
KEYS: fix kernel-doc warnings in verify_pefile
Gaurav Jain (1):
crypto: caam - fix unchecked return value error
Giovanni Cabiddu (1):
crypto: qat - change value of default idle filter
Herbert Xu (38):
crypto: api - Use work queue in crypto_destroy_instance
crypto: lib - Move mpi into lib/crypto
crypto: sun8i-ce - Remove prepare/unprepare request
crypto: sun8i-ss - Remove prepare/unprepare request
crypto: amlogic - Remove prepare/unprepare request
crypto: aspeed - Remove prepare/unprepare request
crypto: sl3516 - Remove prepare/unprepare request
crypto: keembay - Remove prepare/unprepare request
crypto: omap - Remove prepare/unprepare request
crypto: rk3288 - Remove prepare/unprepare request
crypto: jh1100 - Remove prepare/unprepare request
crypto: stm32 - Remove prepare/unprepare request
crypto: virtio - Remove prepare/unprepare request
crypto: zynqmp - Remove prepare/unprepare request
crypto: engine - Remove prepare/unprepare request
crypto: jh7110 - Include crypto/hash.h in header file
crypto: engine - Move crypto inclusions out of header file
crypto: jh7110 - Include scatterwalk.h for struct scatter_walk
crypto: engine - Create internal/engine.h
crypto: omap - Include internal/engine.h
crypto: caam - Include internal/engine.h
crypto: engine - Move struct crypto_engine into internal/engine.h
crypto: engine - Move crypto_engine_ops from request into crypto_alg
crypto: sun8i-ce - Use new crypto_engine_op interface
crypto: sun8i-ss - Use new crypto_engine_op interface
crypto: amlogic - Use new crypto_engine_op interface
crypto: aspeed - Use new crypto_engine_op interface
crypto: aspeed - Remove non-standard sha512 algorithms
crypto: caam - Use new crypto_engine_op interface
crypto: sl3516 - Use new crypto_engine_op interface
crypto: keembay - Use new crypto_engine_op interface
crypto: omap - Use new crypto_engine_op interface
crypto: rk3288 - Use new crypto_engine_op interface
crypto: jh7110 - Use new crypto_engine_op interface
crypto: stm32 - Use new crypto_engine_op interface
crypto: virtio - Use new crypto_engine_op interface
crypto: zynqmp - Use new crypto_engine_op interface
crypto: engine - Remove crypto_engine_ctx
Horia Geanta (1):
crypto: caam - add power management support
Horia Geantă (1):
crypto: caam/jr - fix shared IRQ line handling
Iuliana Prodan (1):
crypto: caam - increase the domain of write memory barrier to full system
Jia Jie Ho (1):
crypto: starfive - Add AES skcipher and aead support
Jiapeng Chong (1):
crypto: sig - Remove some unused functions
Joachim Vandersmissen (1):
crypto: jitter - Add clarifying comments to Jitter Entropy RCT cutoff values
Konrad Dybcio (2):
dt-bindings: crypto: qcom,prng: Add SM8450
crypto: qcom-rng: Make the core clock optional regardless of ACPI presence
Krzysztof Kozlowski (1):
crypto: exynos - fix Wvoid-pointer-to-enum-cast warning
Lionel Debieve (1):
dt-bindings: crypto: add new compatible for stm32-hash
Lucas Segarra Fernandez (1):
crypto: qat - add fw_counters debugfs file
Mahmoud Adam (1):
KEYS: use kfree_sensitive with key
Mario Limonciello (11):
crypto: ccp - Rename macro for security attributes
crypto: ccp - Add support for displaying PSP firmware versions
crypto: ccp - Add bootloader and TEE version offsets
crypto: ccp - move setting PSP master to earlier in the init
crypto: ccp - Add support for fetching a nonce for dynamic boost control
crypto: ccp - Add support for setting user ID for dynamic boost control
crypto: ccp - Add support for getting and setting DBC parameters
crypto: ccp - Add a sample library for ioctl use
crypto: ccp - Add a sample python script for Dynamic Boost Control
crypto: ccp - Add unit tests for dynamic boost control
crypto: ccp - Add Mario to MAINTAINERS
Mark O'Donovan (1):
crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
Martin Kaiser (25):
hwrng: nomadik - keep clock enabled while hwrng is registered
hwrng: nomadik - use dev_err_probe
hwrng: imx-rngc - use dev_err_probe
hwrng: exynos - switch to DEFINE_SIMPLE_DEV_PM_OPS
hwrng: pic32 - enable compile-testing
hwrng: pic32 - use devm_clk_get_enabled
hwrng: pic32 - remove unused defines
hwrng: pic32 - enable TRNG only while it's used
hwrng: ingenic - enable compile testing
hwrng: ingenic - remove two unused defines
hwrng: ingenic - remove dead assignments
hwrng: ingenic - use devm_clk_get_enabled
hwrng: ingenic - use dev_err_probe in error paths
hwrng: ingenic - don't disable the rng in ingenic_trng_remove
hwrng: ingenic - switch to device managed registration
hwrng: ba431 - do not set drvdata
hwrng: ba431 - don't init of_device_id's data
hwrng: ba431 - use dev_err_probe after failed registration
hwrng: arm-smccc-trng - don't set drvdata
hwrng: cctrng - don't open code init and exit functions
hwrng: cctrng - let devres enable the clock
hwrng: cctrng - merge cc_trng_clk_init into its only caller
hwrng: cctrng - use dev_err_probe in error paths
hwrng: cn10k - delete empty remove function
hwrng: cn10k - use dev_err_probe
Masahiro Yamada (1):
crypto: arm64/aes - remove Makefile hack
Neil Armstrong (1):
Revert "dt-bindings: crypto: qcom,prng: Add SM8450"
Rob Herring (4):
hwrng: Explicitly include correct DT includes
hwrng: Enable COMPILE_TEST for more drivers
hwrng: xgene: Add explicit io.h include
crypto: drivers - Explicitly include correct DT includes
Ruan Jinjie (1):
crypto: hisilicon/sec - Do not check for 0 return after calling platform_get_irq()
Thomas Bourgoin (6):
crypto: stm32 - add new algorithms support
crypto: stm32 - remove bufcnt in stm32_hash_write_ctrl.
crypto: stm32 - fix loop iterating through scatterlist for DMA
crypto: stm32 - check request size and scatterlist size when using DMA.
crypto: stm32 - fix MDMAT condition
crypto: stm32 - remove flag HASH_FLAGS_DMA_READY
Thore Sommer (1):
X.509: if signature is unsupported skip validation
Uwe Kleine-König (4):
crypto: starfive - Convert to platform remove callback returning void
crypto: stm32 - Properly handle pm_runtime_get failing
crypto: stm32 - Drop if block with always false condition
crypto: stm32 - Convert to platform remove callback returning void
Wang Ming (1):
crypto: atmel - Use dev_err_probe instead of dev_err
Weili Qian (5):
crypto: hisilicon/hpre - ensure private key less than n
crypto: hisilicon/qm - flush all work before driver removed
crypto: hisilicon/qm - stop function and write data to memory
crypto: hisilicon/qm - increase device doorbell timeout
crypto: hisilicon/hpre - enable sva error interrupt event
Yang Yingliang (2):
crypto: starfive - fix return value check in starfive_aes_prepare_req()
crypto: qat - use kfree_sensitive instead of memset/kfree()
Yangtao Li (6):
crypto: omap-des - Use devm_platform_get_and_ioremap_resource()
crypto: keembay - Convert to devm_platform_ioremap_resource()
crypto: atmel-aes - Use devm_platform_get_and_ioremap_resource()
crypto: atmel-sha - Use devm_platform_get_and_ioremap_resource()
crypto: atmel-tdes - Use devm_platform_get_and_ioremap_resource()
hwrng: timeriomem - Use devm_platform_get_and_ioremap_resource()
You Kangren (1):
crypto: qat - replace the if statement with min()
Yue Haibing (3):
crypto: allwinner - Remove unused function declarations
crypto: qat - Remove unused function declarations
crypto: chelsio - Remove unused declarations
Documentation/ABI/testing/debugfs-driver-qat | 61 ++
Documentation/ABI/testing/sysfs-driver-ccp | 18 +
.../devicetree/bindings/crypto/st,stm32-hash.yaml | 1 +
MAINTAINERS | 12 +
arch/arm64/crypto/Makefile | 5 -
arch/arm64/crypto/aes-glue-ce.c | 2 +
arch/arm64/crypto/aes-glue-neon.c | 1 +
arch/powerpc/crypto/Kconfig | 26 +
arch/powerpc/crypto/Makefile | 4 +
arch/powerpc/crypto/chacha-p10-glue.c | 221 ++++
arch/powerpc/crypto/chacha-p10le-8x.S | 842 +++++++++++++++
arch/powerpc/crypto/poly1305-p10-glue.c | 186 ++++
arch/powerpc/crypto/poly1305-p10le_64.S | 1075 ++++++++++++++++++++
arch/x86/crypto/aesni-intel_glue.c | 22 +-
crypto/af_alg.c | 4 +
crypto/algapi.c | 16 +-
crypto/asymmetric_keys/public_key.c | 8 +-
crypto/asymmetric_keys/verify_pefile.c | 2 +-
crypto/asymmetric_keys/x509_public_key.c | 5 +
crypto/crypto_engine.c | 244 ++++-
crypto/jitterentropy.c | 10 +-
crypto/lrw.c | 6 +-
crypto/sig.c | 5 -
crypto/xts.c | 6 +-
drivers/char/hw_random/Kconfig | 37 +-
drivers/char/hw_random/amd-rng.c | 1 +
drivers/char/hw_random/arm_smccc_trng.c | 2 -
drivers/char/hw_random/atmel-rng.c | 2 +-
drivers/char/hw_random/ba431-rng.c | 10 +-
drivers/char/hw_random/bcm2835-rng.c | 3 +-
drivers/char/hw_random/cctrng.c | 93 +-
drivers/char/hw_random/cn10k-rng.c | 18 +-
drivers/char/hw_random/core.c | 3 +-
drivers/char/hw_random/exynos-trng.c | 8 +-
drivers/char/hw_random/imx-rngc.c | 24 +-
drivers/char/hw_random/ingenic-rng.c | 2 +-
drivers/char/hw_random/ingenic-trng.c | 59 +-
drivers/char/hw_random/iproc-rng200.c | 28 +-
drivers/char/hw_random/nomadik-rng.c | 19 +-
drivers/char/hw_random/npcm-rng.c | 3 +-
drivers/char/hw_random/omap-rng.c | 2 -
drivers/char/hw_random/omap3-rom-rng.c | 1 -
drivers/char/hw_random/pasemi-rng.c | 3 +-
drivers/char/hw_random/pic32-rng.c | 76 +-
drivers/char/hw_random/stm32-rng.c | 3 +-
drivers/char/hw_random/timeriomem-rng.c | 25 +-
drivers/char/hw_random/xgene-rng.c | 6 +-
drivers/char/hw_random/xiphera-trng.c | 1 -
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 1 -
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 41 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 172 ++--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 100 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 16 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 27 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 155 +--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 114 ++-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 19 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 13 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 61 +-
drivers/crypto/amlogic/amlogic-gxl.h | 5 +-
drivers/crypto/aspeed/aspeed-acry.c | 40 +-
drivers/crypto/aspeed/aspeed-hace-crypto.c | 134 ++-
drivers/crypto/aspeed/aspeed-hace-hash.c | 285 ++----
drivers/crypto/aspeed/aspeed-hace.c | 9 +-
drivers/crypto/aspeed/aspeed-hace.h | 30 +-
drivers/crypto/atmel-aes.c | 21 +-
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-sha.c | 28 +-
drivers/crypto/atmel-tdes.c | 20 +-
drivers/crypto/bcm/cipher.c | 6 +-
drivers/crypto/caam/caamalg.c | 386 +++++--
drivers/crypto/caam/caamhash.c | 47 +-
drivers/crypto/caam/caampkc.c | 25 +-
drivers/crypto/caam/caampkc.h | 3 -
drivers/crypto/caam/ctrl.c | 107 ++
drivers/crypto/caam/intern.h | 25 +-
drivers/crypto/caam/jr.c | 206 +++-
drivers/crypto/caam/qi.c | 1 +
drivers/crypto/caam/regs.h | 9 +-
drivers/crypto/ccp/Makefile | 3 +-
drivers/crypto/ccp/dbc.c | 250 +++++
drivers/crypto/ccp/dbc.h | 56 +
drivers/crypto/ccp/psp-dev.c | 19 +-
drivers/crypto/ccp/psp-dev.h | 1 +
drivers/crypto/ccp/sp-dev.h | 7 +
drivers/crypto/ccp/sp-pci.c | 96 +-
drivers/crypto/ccree/cc_driver.c | 1 -
drivers/crypto/chelsio/chcr_algo.c | 3 +-
drivers/crypto/chelsio/chcr_core.h | 1 -
drivers/crypto/chelsio/chcr_crypto.h | 1 -
drivers/crypto/exynos-rng.c | 4 +-
drivers/crypto/gemini/sl3516-ce-cipher.c | 22 +-
drivers/crypto/gemini/sl3516-ce-core.c | 50 +-
drivers/crypto/gemini/sl3516-ce.h | 8 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 10 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 5 +-
drivers/crypto/hisilicon/qm.c | 28 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 4 +-
drivers/crypto/img-hash.c | 4 +-
.../crypto/intel/keembay/keembay-ocs-aes-core.c | 431 ++++----
drivers/crypto/intel/keembay/keembay-ocs-ecc.c | 73 +-
.../crypto/intel/keembay/keembay-ocs-hcu-core.c | 243 +++--
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 23 +
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 4 +
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 3 +
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 28 +
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 7 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 28 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.h | 7 +
drivers/crypto/intel/qat/qat_common/Makefile | 5 +
.../intel/qat/qat_common/adf_accel_devices.h | 14 +
drivers/crypto/intel/qat/qat_common/adf_admin.c | 61 ++
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 2 +
drivers/crypto/intel/qat/qat_common/adf_clock.c | 131 +++
drivers/crypto/intel/qat/qat_common/adf_clock.h | 14 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 14 +-
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 12 +
.../crypto/intel/qat/qat_common/adf_fw_counters.c | 264 +++++
.../crypto/intel/qat/qat_common/adf_fw_counters.h | 11 +
.../crypto/intel/qat/qat_common/adf_gen2_config.c | 7 +
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.h | 3 +
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 3 +
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h | 2 +-
.../crypto/intel/qat/qat_common/adf_gen4_timer.c | 70 ++
.../crypto/intel/qat/qat_common/adf_gen4_timer.h | 21 +
.../crypto/intel/qat/qat_common/adf_heartbeat.c | 336 ++++++
.../crypto/intel/qat/qat_common/adf_heartbeat.h | 79 ++
.../intel/qat/qat_common/adf_heartbeat_dbgfs.c | 194 ++++
.../intel/qat/qat_common/adf_heartbeat_dbgfs.h | 12 +
drivers/crypto/intel/qat/qat_common/adf_init.c | 28 +
drivers/crypto/intel/qat/qat_common/adf_isr.c | 6 +
.../intel/qat/qat_common/icp_qat_fw_init_admin.h | 23 +-
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 5 +-
.../crypto/intel/qat/qat_common/qat_compression.c | 3 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 7 +-
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 13 +
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 5 +
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/omap-aes-gcm.c | 39 +-
drivers/crypto/omap-aes.c | 264 ++---
drivers/crypto/omap-aes.h | 15 +-
drivers/crypto/omap-des.c | 212 ++--
drivers/crypto/omap-sham.c | 291 +++---
drivers/crypto/qcom-rng.c | 10 +-
drivers/crypto/rockchip/rk3288_crypto.c | 59 +-
drivers/crypto/rockchip/rk3288_crypto.h | 21 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 80 +-
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 60 +-
drivers/crypto/s5p-sss.c | 1 -
drivers/crypto/sa2ul.c | 3 +-
drivers/crypto/sahara.c | 1 -
drivers/crypto/starfive/Kconfig | 2 +
drivers/crypto/starfive/Makefile | 2 +-
drivers/crypto/starfive/jh7110-aes.c | 1024 +++++++++++++++++++
drivers/crypto/starfive/jh7110-cryp.c | 53 +-
drivers/crypto/starfive/jh7110-cryp.h | 74 +-
drivers/crypto/starfive/jh7110-hash.c | 290 +++---
drivers/crypto/stm32/Kconfig | 2 +
drivers/crypto/stm32/stm32-cryp.c | 356 +++----
drivers/crypto/stm32/stm32-hash.c | 988 +++++++++++++-----
drivers/crypto/talitos.c | 4 +-
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 35 +-
.../crypto/virtio/virtio_crypto_skcipher_algs.c | 25 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 41 +-
drivers/crypto/xilinx/zynqmp-sha.c | 1 -
include/crypto/algapi.h | 3 +
include/crypto/engine.h | 118 +--
include/crypto/internal/engine.h | 74 ++
include/linux/hisi_acc_qm.h | 2 +-
include/linux/psp-platform-access.h | 4 +
include/uapi/linux/psp-dbc.h | 147 +++
lib/Makefile | 1 -
lib/crypto/Makefile | 2 +
lib/{ => crypto}/mpi/Makefile | 0
lib/{ => crypto}/mpi/ec.c | 0
lib/{ => crypto}/mpi/generic_mpih-add1.c | 0
lib/{ => crypto}/mpi/generic_mpih-lshift.c | 0
lib/{ => crypto}/mpi/generic_mpih-mul1.c | 0
lib/{ => crypto}/mpi/generic_mpih-mul2.c | 0
lib/{ => crypto}/mpi/generic_mpih-mul3.c | 0
lib/{ => crypto}/mpi/generic_mpih-rshift.c | 0
lib/{ => crypto}/mpi/generic_mpih-sub1.c | 0
lib/{ => crypto}/mpi/longlong.h | 0
lib/{ => crypto}/mpi/mpi-add.c | 0
lib/{ => crypto}/mpi/mpi-bit.c | 0
lib/{ => crypto}/mpi/mpi-cmp.c | 8 +-
lib/{ => crypto}/mpi/mpi-div.c | 0
lib/{ => crypto}/mpi/mpi-inline.h | 0
lib/{ => crypto}/mpi/mpi-internal.h | 0
lib/{ => crypto}/mpi/mpi-inv.c | 0
lib/{ => crypto}/mpi/mpi-mod.c | 0
lib/{ => crypto}/mpi/mpi-mul.c | 0
lib/{ => crypto}/mpi/mpi-pow.c | 0
lib/{ => crypto}/mpi/mpi-sub-ui.c | 0
lib/{ => crypto}/mpi/mpicoder.c | 0
lib/{ => crypto}/mpi/mpih-cmp.c | 0
lib/{ => crypto}/mpi/mpih-div.c | 0
lib/{ => crypto}/mpi/mpih-mul.c | 0
lib/{ => crypto}/mpi/mpiutil.c | 0
tools/crypto/ccp/.gitignore | 1 +
tools/crypto/ccp/Makefile | 13 +
tools/crypto/ccp/dbc.c | 72 ++
tools/crypto/ccp/dbc.py | 64 ++
tools/crypto/ccp/dbc_cli.py | 134 +++
tools/crypto/ccp/test_dbc.py | 266 +++++
205 files changed, 10033 insertions(+), 2915 deletions(-)
create mode 100644 Documentation/ABI/testing/debugfs-driver-qat
create mode 100644 arch/arm64/crypto/aes-glue-ce.c
create mode 100644 arch/arm64/crypto/aes-glue-neon.c
create mode 100644 arch/powerpc/crypto/chacha-p10-glue.c
create mode 100644 arch/powerpc/crypto/chacha-p10le-8x.S
create mode 100644 arch/powerpc/crypto/poly1305-p10-glue.c
create mode 100644 arch/powerpc/crypto/poly1305-p10le_64.S
create mode 100644 drivers/crypto/ccp/dbc.c
create mode 100644 drivers/crypto/ccp/dbc.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_clock.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_clock.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_counters.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_counters.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_timer.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_timer.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_dbgfs.h
create mode 100644 drivers/crypto/starfive/jh7110-aes.c
create mode 100644 include/crypto/internal/engine.h
create mode 100644 include/uapi/linux/psp-dbc.h
rename lib/{ => crypto}/mpi/Makefile (100%)
rename lib/{ => crypto}/mpi/ec.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-add1.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-lshift.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-mul1.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-mul2.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-mul3.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-rshift.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-sub1.c (100%)
rename lib/{ => crypto}/mpi/longlong.h (100%)
rename lib/{ => crypto}/mpi/mpi-add.c (100%)
rename lib/{ => crypto}/mpi/mpi-bit.c (100%)
rename lib/{ => crypto}/mpi/mpi-cmp.c (96%)
rename lib/{ => crypto}/mpi/mpi-div.c (100%)
rename lib/{ => crypto}/mpi/mpi-inline.h (100%)
rename lib/{ => crypto}/mpi/mpi-internal.h (100%)
rename lib/{ => crypto}/mpi/mpi-inv.c (100%)
rename lib/{ => crypto}/mpi/mpi-mod.c (100%)
rename lib/{ => crypto}/mpi/mpi-mul.c (100%)
rename lib/{ => crypto}/mpi/mpi-pow.c (100%)
rename lib/{ => crypto}/mpi/mpi-sub-ui.c (100%)
rename lib/{ => crypto}/mpi/mpicoder.c (100%)
rename lib/{ => crypto}/mpi/mpih-cmp.c (100%)
rename lib/{ => crypto}/mpi/mpih-div.c (100%)
rename lib/{ => crypto}/mpi/mpih-mul.c (100%)
rename lib/{ => crypto}/mpi/mpiutil.c (100%)
create mode 100644 tools/crypto/ccp/.gitignore
create mode 100644 tools/crypto/ccp/Makefile
create mode 100644 tools/crypto/ccp/dbc.c
create mode 100644 tools/crypto/ccp/dbc.py
create mode 100755 tools/crypto/ccp/dbc_cli.py
create mode 100755 tools/crypto/ccp/test_dbc.py
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.6
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
@ 2023-08-29 19:00 ` pr-tracker-bot
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-08-29 19:00 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 28 Aug 2023 17:22:20 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/68cf01760bc0891074e813b9bb06d2696cac1c01
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.7
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
2023-08-29 19:00 ` pr-tracker-bot
@ 2023-11-02 6:56 ` Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2023-11-02 6:56 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0bb80ecc33a8fb5a682236443c1e740d5c917d1d:
Linux 6.6-rc1 (2023-09-10 16:28:41 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p1
for you to fetch changes up to a312e07a65fb598ed239b940434392721385c722:
crypto: adiantum - flush destination page before unmapping (2023-11-01 12:58:42 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add virtual-address based lskcipher interface.
- Optimise ahash/shash performance in light of costly indirect calls.
- Remove ahash alignmask attribute.
Algorithms:
- Improve AES/XTS performance of 6-way unrolling for ppc.
- Remove some uses of obsolete algorithms (md4, md5, sha1).
- Add FIPS 202 SHA-3 support in pkcs1pad.
- Add fast path for single-page messages in adiantum.
- Remove zlib-deflate.
Drivers:
- Add support for S4 in meson RNG driver.
- Add STM32MP13x support in stm32.
- Add hwrng interface support in qcom-rng.
- Add support for deflate algorithm in hisilicon/zip.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - enable dc chaining service
Alexey Romanov (2):
hwrng: meson - add support for S4
dt-bindings: rng: meson: add meson-rng-s4 compatible
Andrei Coardos (5):
hwrng: bcm2835 - removed call to platform_set_drvdata()
hwrng: hisi - removed unneeded call to platform_set_drvdata()
hwrng: mpfs - removed unneeded call to platform_set_drvdata()
hwrng: xgene - removed unneeded call to platform_set_drvdata()
hwrng: xiphera - removed unnneded platform_set_drvdata()
André Apitzsch (1):
crypto: qcom-rng - Add missing dependency on hw_random
Ashish Kalra (1):
MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
Bartosz Golaszewski (1):
dt-bindings: crypto: ice: document the sa8775p inline crypto engine
Bo Liu (1):
crypto: aesni - Fix double word in comments
Chang S. Bae (3):
crypto: x86/aesni - Refactor the common address alignment code
crypto: x86/aesni - Correct the data type in struct aesni_xts_ctx
crypto: x86/aesni - Perform address alignment early for XTS mode
Christophe JAILLET (1):
crypto: hisilicon/hpre - Fix a erroneous check after snprintf()
Ciunas Bennett (3):
crypto: qat - add rate limiting sysfs interface
crypto: qat - add rp2svc sysfs attribute
crypto: qat - add num_rps sysfs attribute
Damian Muszynski (4):
units: Add BYTES_PER_*BIT
crypto: qat - add bits.h to icp_qat_hw.h
crypto: qat - add retrieval of fw capabilities
crypto: qat - add rate limiting feature to qat_4xxx
Danny Tsen (1):
crypto: vmx - Improved AES/XTS performance of 6-way unrolling for ppc
Dimitri John Ledkov (11):
crypto: pkcs7 - remove md4 md5 x.509 support
crypto: pkcs7 - remove sha1 support
crypto: mscode_parser - remove sha224 authenticode support
module: Do not offer sha224 for built-in module signing
certs: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
x509: Add OIDs for FIPS 202 SHA-3 hash and signatures
crypto: FIPS 202 SHA-3 register in hash info for IMA
crypto: rsa-pkcs1pad - Add FIPS 202 SHA-3 support
crypto: asymmetric_keys - allow FIPS 202 SHA-3 signatures
module: enable automatic module signing with FIPS 202 SHA-3
Documentation/module-signing.txt: bring up to date
Eric Biggers (65):
crypto: xts - use 'spawn' for underlying single-block cipher
crypto: shash - optimize the default digest and finup
crypto: shash - fold shash_digest_unaligned() into crypto_shash_digest()
crypto: arm64/sha2-ce - implement ->digest for sha256
crypto: x86/sha256 - implement ->digest for sha256
crypto: adiantum - add fast path for single-page messages
crypto: arm/nhpoly1305 - implement ->digest
crypto: arm64/nhpoly1305 - implement ->digest
crypto: x86/nhpoly1305 - implement ->digest
crypto: arm64/sha1-ce - clean up backwards function names
crypto: arm64/sha2-ce - clean up backwards function names
crypto: arm64/sha512-ce - clean up backwards function names
crypto: arm64/sha256 - clean up backwards function names
crypto: arm64/sha512 - clean up backwards function names
crypto: skcipher - fix weak key check for lskciphers
crypto: shash - eliminate indirect call for default import and export
crypto: sparc/crc32c - stop using the shash alignmask
crypto: stm32 - remove unnecessary alignmask
crypto: xilinx/zynqmp-sha - remove unnecessary alignmask
crypto: mips/crc32 - remove redundant setting of alignmask to 0
crypto: loongarch/crc32 - remove redundant setting of alignmask to 0
crypto: cbcmac - remove unnecessary alignment logic
crypto: cmac - remove unnecessary alignment logic
crypto: hmac - remove unnecessary alignment logic
crypto: vmac - don't set alignmask
crypto: xcbc - remove unnecessary alignment logic
crypto: shash - remove support for nonzero alignmask
libceph: stop checking crypto_shash_alignmask
crypto: drbg - stop checking crypto_shash_alignmask
crypto: testmgr - stop checking crypto_shash_alignmask
crypto: adiantum - stop using alignmask of shash_alg
crypto: hctr2 - stop using alignmask of shash_alg
crypto: shash - remove crypto_shash_alignmask
crypto: shash - remove crypto_shash_ctx_aligned()
crypto: sun4i-ss - remove unnecessary alignmask for ahashes
crypto: sun8i-ce - remove unnecessary alignmask for ahashes
crypto: sun8i-ss - remove unnecessary alignmask for ahashes
crypto: atmel - remove unnecessary alignmask for ahashes
crypto: artpec6 - stop setting alignmask for ahashes
crypto: mxs-dcp - remove unnecessary alignmask for ahashes
crypto: s5p-sss - remove unnecessary alignmask for ahashes
crypto: talitos - remove unnecessary alignmask for ahashes
crypto: omap-sham - stop setting alignmask for ahashes
crypto: rockchip - remove unnecessary alignmask for ahashes
crypto: starfive - remove unnecessary alignmask for ahashes
crypto: stm32 - remove unnecessary alignmask for ahashes
crypto: ahash - remove support for nonzero alignmask
crypto: authenc - stop using alignmask of ahash
crypto: authencesn - stop using alignmask of ahash
crypto: testmgr - stop checking crypto_ahash_alignmask
net: ipv4: stop checking crypto_ahash_alignmask
net: ipv6: stop checking crypto_ahash_alignmask
crypto: ccm - stop using alignmask of ahash
crypto: chacha20poly1305 - stop using alignmask of ahash
crypto: gcm - stop using alignmask of ahash
crypto: ahash - remove crypto_ahash_alignmask
crypto: ahash - remove struct ahash_request_priv
crypto: ahash - improve file comment
crypto: chelsio - stop using crypto_ahash::init
crypto: talitos - stop using crypto_ahash::init
crypto: hash - move "ahash wrapping shash" functions to ahash.c
crypto: ahash - check for shash type instead of not ahash type
crypto: ahash - optimize performance when wrapping shash
crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
crypto: adiantum - flush destination page before unmapping
Fabio Estevam (3):
dt-bindings: crypto: fsl-imx-sahara: Shorten the title
dt-bindings: crypto: fsl-imx-sahara: Document the clocks
dt-bindings: crypto: fsl-imx-sahara: Fix the number of irqs
Gatien Chevallier (8):
dt-bindings: rng: introduce new compatible for STM32MP13x
hwrng: stm32 - use devm_platform_get_and_ioremap_resource() API
hwrng: stm32 - implement STM32MP13x support
hwrng: stm32 - implement error concealment
hwrng: stm32 - rework error handling in stm32_rng_read()
hwrng: stm32 - restrain RNG noise source clock
hwrng: stm32 - support RNG configuration locking mechanism
hwrng: stm32 - rework power management sequences
Gaurav Jain (2):
crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure
crypto: caam/jr - fix Chacha20 + Poly1305 self test failure
Giovanni Cabiddu (15):
Documentation: ABI: debugfs-driver-qat: fix fw_counters path
crypto: qat - fix state machines cleanup paths
crypto: qat - do not shadow error code
crypto: qat - ignore subsequent state up commands
crypto: qat - fix unregistration of crypto algorithms
crypto: qat - fix unregistration of compression algorithms
crypto: qat - consolidate services structure
crypto: qat - increase size of buffers
crypto: qat - add namespace to driver
crypto: qat - refactor fw config related functions
crypto: qat - use masks for AE groups
crypto: qat - fix ring to service map for QAT GEN4
crypto: qat - move admin api
crypto: qat - move adf_cfg_services
crypto: qat - fix deadlock in backlog processing
Herbert Xu (45):
wireguard: do not include crypto/algapi.h
KEYS: Include linux/errno.h in linux/verification.h
hwrng: octeon - Fix warnings on 32-bit platforms
fscrypt: Do not include crypto/algapi.h
ubifs: Do not include crypto/algapi.h
Bluetooth: Do not include crypto/algapi.h
ah: Do not include crypto/algapi.h
mptcp: Do not include crypto/algapi.h
SUNRPC: Do not include crypto/algapi.h
evm: Do not include crypto/algapi.h
KEYS: encrypted: Do not include crypto/algapi.h
chelsio: Do not include crypto/algapi.h
crypto: aead - Add crypto_has_aead
ipsec: Stop using crypto_has_alg
crypto: hash - Hide CRYPTO_ALG_TYPE_AHASH_MASK
crypto: skcipher - Add lskcipher
crypto: lskcipher - Add compatibility wrapper around ECB
crypto: testmgr - Add support for lskcipher algorithms
crypto: ecb - Convert from skcipher to lskcipher
crypto: cbc - Convert from skcipher to lskcipher
ipsec: Select CRYPTO_AEAD
crypto: qat - Remove zlib-deflate
crypto: deflate - Remove zlib-deflate
crypto: testmgr - Remove zlib-deflate
crypto: skcipher - Add dependency on ecb
crypto: arc4 - Convert from skcipher to lskcipher
crypto: skcipher - Add crypto_spawn_skcipher_alg_common
crypto: essiv - Handle lskcipher spawns
crypto: cryptd - Only access common skcipher fields on spawn
crypto: adiantum - Only access common skcipher fields on spawn
crypto: authenc - Only access common skcipher fields on spawn
crypto: authencesn - Only access common skcipher fields on spawn
crypto: ccm - Only access common skcipher fields on spawn
crypto: chacha20poly1305 - Only access common skcipher fields on spawn
crypto: ctr - Only access common skcipher fields on spawn
crypto: cts - Only access common skcipher fields on spawn
crypto: gcm - Only access common skcipher fields on spawn
crypto: hctr2 - Only access common skcipher fields on spawn
crypto: lrw - Only access common skcipher fields on spawn
crypto: xts - Only access common skcipher fields on spawn
crypto: skcipher - Remove obsolete skcipher_alg helpers
crypto: lskcipher - Return EINVAL when ecb_name fails sanity checks
crypto: hifn_795x - Silence gcc format-truncation false positive warnings
certs: Break circular dependency when selftest is modular
crypto: rsa - Add module alias for pkcs1pad
Jinjie Ruan (1):
crypto: qat - Use list_for_each_entry() helper
John Allen (1):
crypto: ccp - Dump SEV command buffer registers on SEV command error
Jonas Gorski (1):
hwrng: geode - fix accessing registers
Justin Stitt (2):
crypto: cavium/nitrox - refactor deprecated strncpy
crypto: qat - refactor deprecated strncpy
Kees Cook (1):
crypto: qat - Annotate struct adf_fw_counters with __counted_by
Li zeming (1):
crypto: api - Remove unnecessary NULL initialisation
Longfang Liu (3):
crypto: hisilicon/qm - fix PF queue parameter issue
crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
crypto: hisilicon/qm - prevent soft lockup in receive loop
Lu Jialin (1):
crypto: pcrypt - Fix hungtask for PADATA_RESET
Lucas Segarra Fernandez (3):
crypto: qat - refactor included headers
crypto: qat - add pm_status debugfs file
crypto: qat - add cnv_errors debugfs file
Lukas Wunner (2):
X.509: Add missing IMPLICIT annotations to AKID ASN.1 module
treewide: Add SPDX identifier to IETF ASN.1 modules
Mario Limonciello (9):
crypto: ccp - Get a free page to use while fetching initial nonce
crypto: ccp - Fix ioctl unit tests
crypto: ccp - Fix DBC sample application error handling
crypto: ccp - Fix sample application signature passing
crypto: ccp - Fix some unfused tests
crypto: ccp - Add support for extended PSP mailbox commands
crypto: ccp - Add a communication path abstraction for DBC
crypto: ccp - Add a macro to check capabilities register
crypto: ccp - Add support for DBC over PSP mailbox
Martin Kaiser (7):
hwrng: ks-sa - access private data via struct hwrng
hwrng: ks-sa - remove dev from struct ks_sa_rng
hwrng: ks-sa - use dev_err_probe
hwrng: nomadik - add MODULE_DESCRIPTION
hwrng: st - add MODULE_DESCRIPTION
hwrng: imx-rngc - reasonable timeout for selftest
hwrng: imx-rngc - reasonable timeout for initial seed
Neil Armstrong (2):
dt-bindings: crypto: qcom,prng: document that RNG on SM8450 is a TRNG
dt-bindings: crypto: qcom,prng: document SM8550
Om Prakash Singh (2):
crypto: qcom-rng - Add hw_random interface support
dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
Randy Dunlap (2):
crypto: akcipher - fix kernel-doc typos
crypto: sig - fix kernel-doc typo
Rob Herring (2):
crypto: aspeed-hace - Use device_get_match_data()
hwrng: n2 - Use device_get_match_data()
Roxana Nicolescu (1):
crypto: x86/sha - load modules based on CPU features
Shashank Gupta (9):
crypto: qat - add infrastructure for error reporting
crypto: qat - add reporting of correctable errors for QAT GEN4
crypto: qat - add reporting of errors from ERRSOU1 for QAT GEN4
crypto: qat - add handling of errors from ERRSOU2 for QAT GEN4
crypto: qat - add handling of compression related errors for QAT GEN4
crypto: qat - add adf_get_aram_base() helper function
crypto: qat - add handling of errors from ERRSOU3 for QAT GEN4
crypto: qat - add error counters
crypto: qat - count QAT GEN4 errors
Stefan Wahren (1):
hwrng: bcm2835 - Fix hwrng throughput regression
Stephan Müller (5):
crypto: jitter - add RCT/APT support for different OSRs
crypto: jitter - Allow configuration of memory size
crypto: jitter - Allow configuration of oversampling rate
crypto: jitter - reuse allocated entropy collector
crypto: jitter - use permanent health test storage
Svyatoslav Pankratov (1):
crypto: qat - fix double free during reset
Tom Lendacky (1):
crypto: ccp - Move direct access to some PSP registers out of TEE
Uwe Kleine-König (44):
crypto: keembay - Don't pass errors to the caller in .remove()
crypto: engine - Make crypto_engine_exit() return void
crypto: sun4i-ss - Convert to platform remove callback returning void
crypto: sun8i-ce - Convert to platform remove callback returning void
crypto: sun8i-ss - Convert to platform remove callback returning void
crypto: amcc/crypto4xx - Convert to platform remove callback returning void
crypto: amlogic-gxl-core - Convert to platform remove callback returning void
crypto: aspeed-acry - Convert to platform remove callback returning void
crypto: aspeed-hace - Convert to platform remove callback returning void
crypto: atmel-aes - Convert to platform remove callback returning void
crypto: atmel-sha - Convert to platform remove callback returning void
crypto: atmel-tdes - Convert to platform remove callback returning void
crypto: axis/artpec6 - Convert to platform remove callback returning void
crypto: bcm/cipher - Convert to platform remove callback returning void
crypto: caam/jr - Convert to platform remove callback returning void
crypto: ccp/sp - Convert to platform remove callback returning void
crypto: ccree/cc - Convert to platform remove callback returning void
crypto: exynos-rng - Convert to platform remove callback returning void
crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
crypto: hisilicon/sec - Convert to platform remove callback returning void
crypto: hisilicon/trng - Convert to platform remove callback returning void
crypto: img-hash - Convert to platform remove callback returning void
crypto: inside-secure/safexcel - Convert to platform remove callback returning void
crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
crypto: intel/keembay-ocs-aes - Convert to platform remove callback returning void
crypto: intel/keembay-ocs-ecc - Convert to platform remove callback returning void
crypto: intel/keembay-ocs-hcu - Convert to platform remove callback returning void
crypto: marvell/cesa - Convert to platform remove callback returning void
crypto: mxs-dcp - Convert to platform remove callback returning void
crypto: n2_core - Convert to platform remove callback returning void
crypto: omap-aes - Convert to platform remove callback returning void
crypto: omap-des - Convert to platform remove callback returning void
crypto: omap-sham - Convert to platform remove callback returning void
crypto: qce - Convert to platform remove callback returning void
crypto: qcom-rng - Convert to platform remove callback returning void
crypto: rockchip/rk3288 - Convert to platform remove callback returning void
crypto: s5p-sss - Convert to platform remove callback returning void
crypto: sa2ul - Convert to platform remove callback returning void
crypto: sahara - Convert to platform remove callback returning void
crypto: stm32/crc32 - Convert to platform remove callback returning void
crypto: stm32/cryp - Convert to platform remove callback returning void
crypto: talitos - Convert to platform remove callback returning void
crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
WangJinchao (1):
padata: Fix refcnt handling in padata_free_shell()
Weili Qian (3):
crypto: hisilicon/qm - fix the type value of aeq
crypto: hisilicon/qm - check function qp num before alg register
crypto: hisilicon/qm - alloc buffer to set and get xqc
Wenkai Lin (1):
crypto: hisilicon/sec - fix for sgl unmmap problem
Yang Shen (2):
crypto: hisilicon/zip - support deflate algorithm
crypto: hisilicon/zip - remove zlib and gzip
zhenwei pi (1):
crypto: virtio - handle config changed by work queue
Documentation/ABI/testing/debugfs-driver-qat | 24 +-
Documentation/ABI/testing/sysfs-driver-qat | 48 +
Documentation/ABI/testing/sysfs-driver-qat_ras | 41 +
Documentation/ABI/testing/sysfs-driver-qat_rl | 226 +++
Documentation/admin-guide/module-signing.rst | 17 +-
Documentation/crypto/devel-algos.rst | 4 +-
.../devicetree/bindings/crypto/fsl-imx-sahara.yaml | 43 +-
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../devicetree/bindings/crypto/qcom,prng.yaml | 28 +-
.../devicetree/bindings/rng/amlogic,meson-rng.yaml | 1 +
.../devicetree/bindings/rng/st,stm32-rng.yaml | 20 +-
MAINTAINERS | 2 +-
arch/arm/crypto/nhpoly1305-neon-glue.c | 9 +
arch/arm64/crypto/nhpoly1305-neon-glue.c | 9 +
arch/arm64/crypto/sha1-ce-core.S | 8 +-
arch/arm64/crypto/sha1-ce-glue.c | 21 +-
arch/arm64/crypto/sha2-ce-core.S | 8 +-
arch/arm64/crypto/sha2-ce-glue.c | 39 +-
arch/arm64/crypto/sha256-glue.c | 26 +-
arch/arm64/crypto/sha512-ce-core.S | 8 +-
arch/arm64/crypto/sha512-ce-glue.c | 26 +-
arch/arm64/crypto/sha512-glue.c | 12 +-
arch/loongarch/crypto/crc32-loongarch.c | 2 -
arch/mips/crypto/crc32-mips.c | 2 -
arch/sparc/crypto/crc32c_glue.c | 43 +-
arch/x86/crypto/aesni-intel_asm.S | 4 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 4 +-
arch/x86/crypto/aesni-intel_glue.c | 52 +-
arch/x86/crypto/nhpoly1305-avx2-glue.c | 9 +
arch/x86/crypto/nhpoly1305-sse2-glue.c | 9 +
arch/x86/crypto/sha1_ssse3_glue.c | 12 +
arch/x86/crypto/sha256_ssse3_glue.c | 44 +
certs/Kconfig | 6 +-
crypto/Kconfig | 63 +-
crypto/Makefile | 6 +-
crypto/adiantum.c | 80 +-
crypto/aead.c | 6 +
crypto/ahash.c | 406 +++--
crypto/api.c | 2 +-
crypto/arc4.c | 60 +-
crypto/asymmetric_keys/Kconfig | 3 +-
crypto/asymmetric_keys/Makefile | 3 +-
crypto/asymmetric_keys/mscode_parser.c | 19 +-
crypto/asymmetric_keys/pkcs7.asn1 | 7 +
crypto/asymmetric_keys/pkcs7_parser.c | 22 +-
crypto/asymmetric_keys/pkcs8.asn1 | 6 +
crypto/asymmetric_keys/public_key.c | 8 +-
crypto/asymmetric_keys/selftest.c | 15 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/asymmetric_keys/x509.asn1 | 7 +
crypto/asymmetric_keys/x509_akid.asn1 | 29 +-
crypto/asymmetric_keys/x509_cert_parser.c | 36 +-
crypto/asymmetric_keys/x509_parser.h | 9 -
crypto/asymmetric_keys/x509_public_key.c | 8 +-
crypto/authenc.c | 20 +-
crypto/authencesn.c | 28 +-
crypto/cbc.c | 159 +-
crypto/ccm.c | 29 +-
crypto/chacha20poly1305.c | 11 +-
crypto/cmac.c | 39 +-
crypto/cryptd.c | 14 +-
crypto/crypto_engine.c | 8 +-
crypto/ctr.c | 14 +-
crypto/cts.c | 12 +-
crypto/deflate.c | 61 +-
crypto/drbg.c | 2 +-
crypto/ecb.c | 206 ++-
crypto/essiv.c | 20 +-
crypto/gcm.c | 12 +-
crypto/hash.h | 14 +-
crypto/hash_info.c | 6 +
crypto/hctr2.c | 11 +-
crypto/hmac.c | 56 +-
crypto/jitterentropy-kcapi.c | 17 +-
crypto/jitterentropy.c | 342 +++--
crypto/jitterentropy.h | 5 +-
crypto/lrw.c | 12 +-
crypto/lskcipher.c | 634 ++++++++
crypto/pcrypt.c | 4 +
crypto/rsa-pkcs1pad.c | 27 +-
crypto/rsaprivkey.asn1 | 7 +
crypto/rsapubkey.asn1 | 7 +
crypto/shash.c | 387 +----
crypto/skcipher.c | 81 +-
crypto/skcipher.h | 28 +
crypto/testmgr.c | 57 +-
crypto/testmgr.h | 155 --
crypto/vmac.c | 1 -
crypto/xcbc.c | 32 +-
crypto/xts.c | 33 +-
drivers/char/hw_random/bcm2835-rng.c | 4 +-
drivers/char/hw_random/core.c | 6 +
drivers/char/hw_random/geode-rng.c | 6 +-
drivers/char/hw_random/hisi-rng.c | 2 -
drivers/char/hw_random/imx-rngc.c | 10 +-
drivers/char/hw_random/ks-sa-rng.c | 26 +-
drivers/char/hw_random/meson-rng.c | 80 +-
drivers/char/hw_random/mpfs-rng.c | 2 -
drivers/char/hw_random/n2-drv.c | 10 +-
drivers/char/hw_random/nomadik-rng.c | 1 +
drivers/char/hw_random/octeon-rng.c | 6 +-
drivers/char/hw_random/st-rng.c | 1 +
drivers/char/hw_random/stm32-rng.c | 519 +++++--
drivers/char/hw_random/xgene-rng.c | 1 -
drivers/char/hw_random/xiphera-trng.c | 2 -
drivers/crypto/Kconfig | 1 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 7 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 11 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 11 +-
drivers/crypto/amcc/crypto4xx_core.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 5 +-
drivers/crypto/aspeed/aspeed-acry.c | 6 +-
drivers/crypto/aspeed/aspeed-hace.c | 16 +-
drivers/crypto/atmel-aes.c | 6 +-
drivers/crypto/atmel-sha.c | 8 +-
drivers/crypto/atmel-tdes.c | 6 +-
drivers/crypto/axis/artpec6_crypto.c | 8 +-
drivers/crypto/bcm/cipher.c | 5 +-
drivers/crypto/caam/caamalg.c | 3 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +-
drivers/crypto/caam/jr.c | 22 +-
drivers/crypto/cavium/nitrox/nitrox_hal.c | 2 +-
drivers/crypto/ccp/dbc.c | 74 +-
drivers/crypto/ccp/dbc.h | 29 +-
drivers/crypto/ccp/psp-dev.c | 122 +-
drivers/crypto/ccp/psp-dev.h | 55 +
drivers/crypto/ccp/sev-dev.c | 14 +
drivers/crypto/ccp/sp-dev.h | 4 +
drivers/crypto/ccp/sp-pci.c | 22 +-
drivers/crypto/ccp/sp-platform.c | 6 +-
drivers/crypto/ccp/tee-dev.c | 48 +-
drivers/crypto/ccp/tee-dev.h | 15 +-
drivers/crypto/ccree/cc_driver.c | 6 +-
drivers/crypto/chelsio/chcr_algo.c | 9 +-
drivers/crypto/exynos-rng.c | 6 +-
drivers/crypto/gemini/sl3516-ce-core.c | 6 +-
drivers/crypto/hifn_795x.c | 11 +-
drivers/crypto/hisilicon/debugfs.c | 79 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 25 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 21 +-
drivers/crypto/hisilicon/qm.c | 520 +++----
drivers/crypto/hisilicon/qm_common.h | 6 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 6 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 32 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 29 +-
drivers/crypto/hisilicon/trng/trng.c | 6 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 290 +---
drivers/crypto/hisilicon/zip/zip_main.c | 23 +-
drivers/crypto/img-hash.c | 6 +-
drivers/crypto/inside-secure/safexcel.c | 6 +-
drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c | 6 +-
.../crypto/intel/keembay/keembay-ocs-aes-core.c | 6 +-
drivers/crypto/intel/keembay/keembay-ocs-ecc.c | 6 +-
.../crypto/intel/keembay/keembay-ocs-hcu-core.c | 15 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 245 ++-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 30 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 36 +-
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c | 1 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_c62x/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_common/Makefile | 10 +
.../intel/qat/qat_common/adf_accel_devices.h | 61 +-
drivers/crypto/intel/qat/qat_common/adf_admin.c | 156 +-
drivers/crypto/intel/qat/qat_common/adf_admin.h | 27 +
drivers/crypto/intel/qat/qat_common/adf_aer.c | 3 +-
.../crypto/intel/qat/qat_common/adf_cfg_services.c | 20 +
.../crypto/intel/qat/qat_common/adf_cfg_services.h | 24 +
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_clock.c | 1 +
.../crypto/intel/qat/qat_common/adf_cnv_dbgfs.c | 300 ++++
.../crypto/intel/qat/qat_common/adf_cnv_dbgfs.h | 11 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 20 +-
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 6 +
.../crypto/intel/qat/qat_common/adf_fw_counters.c | 3 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 7 +
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.c | 27 +-
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h | 50 +-
.../intel/qat/qat_common/adf_gen4_pm_debugfs.c | 266 ++++
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c | 1566 ++++++++++++++++++++
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.h | 825 +++++++++++
.../crypto/intel/qat/qat_common/adf_gen4_timer.c | 1 +
.../crypto/intel/qat/qat_common/adf_heartbeat.c | 1 +
.../intel/qat/qat_common/adf_heartbeat_dbgfs.c | 1 +
drivers/crypto/intel/qat/qat_common/adf_init.c | 63 +-
drivers/crypto/intel/qat/qat_common/adf_isr.c | 18 +
drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.c | 48 +
drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.h | 12 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 1169 +++++++++++++++
drivers/crypto/intel/qat/qat_common/adf_rl.h | 176 +++
drivers/crypto/intel/qat/qat_common/adf_rl_admin.c | 97 ++
drivers/crypto/intel/qat/qat_common/adf_rl_admin.h | 18 +
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 112 +-
.../intel/qat/qat_common/adf_sysfs_ras_counters.c | 112 ++
.../intel/qat/qat_common/adf_sysfs_ras_counters.h | 27 +
drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c | 451 ++++++
drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.h | 11 +
.../intel/qat/qat_common/adf_transport_debug.c | 4 +-
.../intel/qat/qat_common/icp_qat_fw_init_admin.h | 82 +
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 2 +
.../crypto/intel/qat/qat_common/qat_algs_send.c | 46 +-
.../crypto/intel/qat/qat_common/qat_comp_algs.c | 129 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 2 +-
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c | 1 +
drivers/crypto/marvell/cesa/cesa.c | 6 +-
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/n2_core.c | 12 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-des.c | 6 +-
drivers/crypto/omap-sham.c | 22 +-
drivers/crypto/qce/core.c | 5 +-
drivers/crypto/qcom-rng.c | 71 +-
drivers/crypto/rockchip/rk3288_crypto.c | 5 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 3 -
drivers/crypto/s5p-sss.c | 12 +-
drivers/crypto/sa2ul.c | 6 +-
drivers/crypto/sahara.c | 6 +-
drivers/crypto/starfive/jh7110-hash.c | 13 +-
drivers/crypto/stm32/stm32-crc32.c | 17 +-
drivers/crypto/stm32/stm32-cryp.c | 16 +-
drivers/crypto/stm32/stm32-hash.c | 20 -
drivers/crypto/talitos.c | 23 +-
drivers/crypto/virtio/virtio_crypto_common.h | 3 +
drivers/crypto/virtio/virtio_crypto_core.c | 14 +-
drivers/crypto/vmx/aesp8-ppc.pl | 141 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 6 +-
drivers/crypto/xilinx/zynqmp-sha.c | 7 +-
.../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c | 2 -
.../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.h | 1 -
.../ethernet/chelsio/inline_crypto/chtls/chtls.h | 1 -
drivers/net/wireguard/cookie.c | 2 +-
drivers/net/wireguard/netlink.c | 2 +-
drivers/net/wireguard/noise.c | 2 +-
fs/crypto/keysetup_v1.c | 2 +-
fs/smb/server/ksmbd_spnego_negtokeninit.asn1 | 8 +
fs/smb/server/ksmbd_spnego_negtokentarg.asn1 | 7 +
fs/ubifs/auth.c | 3 +-
fs/ubifs/replay.c | 1 -
fs/ubifs/ubifs.h | 2 +-
include/crypto/aead.h | 12 +
include/crypto/akcipher.h | 4 +-
include/crypto/algapi.h | 5 -
include/crypto/engine.h | 2 +-
include/crypto/hash.h | 95 +-
include/crypto/hash_info.h | 1 +
include/crypto/internal/hash.h | 9 +-
include/crypto/internal/skcipher.h | 130 +-
include/crypto/sig.h | 2 +-
include/crypto/skcipher.h | 296 +++-
include/linux/crypto.h | 30 +-
include/linux/hisi_acc_qm.h | 39 +-
include/linux/hw_random.h | 1 +
include/linux/oid_registry.h | 23 +-
include/linux/units.h | 4 +
include/linux/verification.h | 1 +
include/uapi/linux/hash_info.h | 3 +
kernel/module/Kconfig | 25 +-
kernel/padata.c | 8 +-
net/bluetooth/smp.c | 3 +-
net/ceph/messenger_v2.c | 4 -
net/ipv4/ah4.c | 19 +-
net/ipv4/netfilter/nf_nat_snmp_basic.asn1 | 8 +
net/ipv6/ah6.c | 19 +-
net/mptcp/subflow.c | 2 +-
net/sunrpc/auth_gss/gss_krb5_crypto.c | 2 +-
net/sunrpc/auth_gss/gss_krb5_unseal.c | 2 -
net/xfrm/Kconfig | 1 +
net/xfrm/xfrm_algo.c | 19 +-
security/integrity/evm/evm_main.c | 3 +-
security/keys/encrypted-keys/encrypted.c | 2 +-
tools/crypto/ccp/dbc.c | 17 +-
tools/crypto/ccp/dbc.py | 8 +-
tools/crypto/ccp/test_dbc.py | 45 +-
277 files changed, 10706 insertions(+), 3352 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-driver-qat_ras
create mode 100644 Documentation/ABI/testing/sysfs-driver-qat_rl
create mode 100644 crypto/lskcipher.c
create mode 100644 crypto/skcipher.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_admin.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cfg_services.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cfg_services.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cnv_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cnv_dbgfs.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_pm_debugfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl_admin.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl_admin.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_ras_counters.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_ras_counters.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
@ 2023-11-03 2:34 ` Linus Torvalds
2023-11-03 5:52 ` Herbert Xu
2023-11-03 2:37 ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2023-11-03 2:34 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Wed, 1 Nov 2023 at 20:56, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Stephan Müller (5):
> crypto: jitter - add RCT/APT support for different OSRs
> crypto: jitter - Allow configuration of memory size
> crypto: jitter - Allow configuration of oversampling rate
> crypto: jitter - reuse allocated entropy collector
> crypto: jitter - use permanent health test storage
This is beyond annoying.
These are adding Kconfig questions that don't make sense. The whole
jitter thing is debatably useful in the first place, and now you just
annoy users with random questions.
And I mean truly random - the whole jitter entropy is voodoo
programming to begin with, and having some crazy 8MB buffer for it is
just ridiculous.
Honestly, this all smells like somebody's PhD thesis, not a real life thing.
And no, we don't make our Kconfig questions more annoying for some PhD thesis.
We also don't ask people questions that don't have valid answers. Just
because the whole "what is entropy in the first place" isn't
clear-cut, we don't then punt some tweaking question to the user.
We have a very simple and stupid jitter entropy thing AT BOOT TIME
just to try to generate some amount of entropy to make boots
non-repeatable (see "try_to_generate_entropy()" in
drivers/char/random.c).
Honestly, the whole crypto layer one is ridiculous overkill in the
first place, but the annoying new questions have now literally made me
consider just removing it entirely.
Because no, IT IS NOT OK TO ASK CRAZY QUESTIONS. If some developer
cannot come up with a reasonable answer, a random user sure has hell
cannot.
And no, any question that says "do you want to use 8MB of memory for
jitter entropy" is just batsh*t crazy.
This kind of crap needs to stop.
If somebody wants to do this kind of thing, just do it in user space.
It's ridiculously pointless in the kernel.
Convince me I'm wrong. But there is no way in *hell* you will convince
me that we should ask users about some jitter memory sizing.
Allocating memory for timing analysis is silly to begin with, since
any kernel thing could just use the physical memory mapping we already
have in the kernel. I suspect strongly that all this code has been
influenced by code running in user space, where it belongs, and where
you do need to allocate memory to have it available.
Please just make this noise go away.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-03 2:34 ` Linus Torvalds
@ 2023-11-03 5:52 ` Herbert Xu
2023-11-03 6:32 ` Linus Torvalds
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2023-11-03 5:52 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert
On Thu, Nov 02, 2023 at 04:34:11PM -1000, Linus Torvalds wrote:
> On Wed, 1 Nov 2023 at 20:56, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Stephan Müller (5):
> > crypto: jitter - add RCT/APT support for different OSRs
> > crypto: jitter - Allow configuration of memory size
> > crypto: jitter - Allow configuration of oversampling rate
> > crypto: jitter - reuse allocated entropy collector
> > crypto: jitter - use permanent health test storage
>
> This is beyond annoying.
...
> Please just make this noise go away.
Fair enough. How about adding an EXPERT dependency on this?
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-03 5:52 ` Herbert Xu
@ 2023-11-03 6:32 ` Linus Torvalds
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2023-11-03 6:32 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert
On Thu, 2 Nov 2023 at 19:52, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Fair enough. How about adding an EXPERT dependency on this?
I think that would help the situation, but I assume the sizing for the
jitter buffer is at least partly due to trying to account for cache
sizing or similar issues?
Which really means that I assume any static compile-time answer to
that question is always wrong - whether you are an expert or not.
Unless you are just building the thing for one particular machine.
So I do think the problem is deeper than "this is a question only for
experts". I definitely don't think you should ask a regular user (or
even a distro kernel package manager). I suspect it's likely that the
question is just wrong in general - because any particular one buffer
size for any number of machines simply cannot be the right answer.
I realize that the commit says "*allow* for configuration of memory
size", but I really question the whole approach.
But yes - hiding these questions from any reasonable normal user is at
least a good first step.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
2023-11-03 6:32 ` Linus Torvalds
@ 2023-11-06 10:00 ` Herbert Xu
2023-11-06 15:25 ` Stephan Mueller
2023-11-10 9:04 ` Geert Uytterhoeven
0 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2023-11-06 10:00 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert, Stephan Müller
On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
>
> I think that would help the situation, but I assume the sizing for the
> jitter buffer is at least partly due to trying to account for cache
> sizing or similar issues?
>
> Which really means that I assume any static compile-time answer to
> that question is always wrong - whether you are an expert or not.
> Unless you are just building the thing for one particular machine.
>
> So I do think the problem is deeper than "this is a question only for
> experts". I definitely don't think you should ask a regular user (or
> even a distro kernel package manager). I suspect it's likely that the
> question is just wrong in general - because any particular one buffer
> size for any number of machines simply cannot be the right answer.
>
> I realize that the commit says "*allow* for configuration of memory
> size", but I really question the whole approach.
Yes I think these are all valid points. I just noticed that I
forgot to cc the author so let's see if Stephan has anything to
add.
> But yes - hiding these questions from any reasonable normal user is at
> least a good first step.
OK here's the patch:
---8<---
As JITTERENTROPY is selected by default if you enable the CRYPTO
API, any Kconfig options added there will show up for every single
user. Hide the esoteric options under EXPERT as well as FIPS so
that only distro makers will see them.
Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
diff --git a/crypto/Kconfig b/crypto/Kconfig
index bbf51d55724e..70661f58ee41 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
See https://www.chronox.de/jent.html
+if CRYPTO_JITTERENTROPY
+if CRYPTO_FIPS && EXPERT
+
choice
prompt "CPU Jitter RNG Memory Size"
default CRYPTO_JITTERENTROPY_MEMSIZE_2
- depends on CRYPTO_JITTERENTROPY
help
The Jitter RNG measures the execution time of memory accesses.
Multiple consecutive memory accesses are performed. If the memory
@@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
int "CPU Jitter RNG Oversampling Rate"
range 1 15
default 1
- depends on CRYPTO_JITTERENTROPY
help
The Jitter RNG allows the specification of an oversampling rate (OSR).
The Jitter RNG operation requires a fixed amount of timing
@@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
config CRYPTO_JITTERENTROPY_TESTINTERFACE
bool "CPU Jitter RNG Test Interface"
- depends on CRYPTO_JITTERENTROPY
help
The test interface allows a privileged process to capture
the raw unconditioned high resolution time stamp noise that
@@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
If unsure, select N.
+endif # if CRYPTO_FIPS && EXPERT
+
+if !(CRYPTO_FIPS && EXPERT)
+
+config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
+ int
+ default 64
+
+config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
+ int
+ default 32
+
+config CRYPTO_JITTERENTROPY_OSR
+ int
+ default 1
+
+config CRYPTO_JITTERENTROPY_TESTINTERFACE
+ bool
+
+endif # if !(CRYPTO_FIPS && EXPERT)
+endif # if CRYPTO_JITTERENTROPY
+
config CRYPTO_KDF800108_CTR
tristate
select CRYPTO_HMAC
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply related [flat|nested] 146+ messages in thread
* Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
@ 2023-11-06 15:25 ` Stephan Mueller
2023-11-10 9:04 ` Geert Uytterhoeven
1 sibling, 0 replies; 146+ messages in thread
From: Stephan Mueller @ 2023-11-06 15:25 UTC (permalink / raw)
To: Linus Torvalds, Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert
Am Montag, 6. November 2023, 11:00:08 CET schrieb Herbert Xu:
Hi Herbert,
> On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> > I think that would help the situation, but I assume the sizing for the
> > jitter buffer is at least partly due to trying to account for cache
> > sizing or similar issues?
> >
> > Which really means that I assume any static compile-time answer to
> > that question is always wrong - whether you are an expert or not.
> > Unless you are just building the thing for one particular machine.
> >
> > So I do think the problem is deeper than "this is a question only for
> > experts". I definitely don't think you should ask a regular user (or
> > even a distro kernel package manager). I suspect it's likely that the
> > question is just wrong in general - because any particular one buffer
> > size for any number of machines simply cannot be the right answer.
> >
> > I realize that the commit says "*allow* for configuration of memory
> > size", but I really question the whole approach.
>
> Yes I think these are all valid points. I just noticed that I
> forgot to cc the author so let's see if Stephan has anything to
> add.
I concur that these questions are more for experts.
>
> > But yes - hiding these questions from any reasonable normal user is at
> > least a good first step.
>
> OK here's the patch:
>
> ---8<---
> As JITTERENTROPY is selected by default if you enable the CRYPTO
> API, any Kconfig options added there will show up for every single
> user. Hide the esoteric options under EXPERT as well as FIPS so
> that only distro makers will see them.
>
> Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
>
> diff --git a/crypto/Kconfig b/crypto/Kconfig
> index bbf51d55724e..70661f58ee41 100644
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
>
> See https://www.chronox.de/jent.html
>
> +if CRYPTO_JITTERENTROPY
> +if CRYPTO_FIPS && EXPERT
> +
> choice
> prompt "CPU Jitter RNG Memory Size"
> default CRYPTO_JITTERENTROPY_MEMSIZE_2
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG measures the execution time of memory accesses.
> Multiple consecutive memory accesses are performed. If the memory
> @@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
> int "CPU Jitter RNG Oversampling Rate"
> range 1 15
> default 1
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG allows the specification of an oversampling rate (OSR).
> The Jitter RNG operation requires a fixed amount of timing
> @@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
>
> config CRYPTO_JITTERENTROPY_TESTINTERFACE
> bool "CPU Jitter RNG Test Interface"
> - depends on CRYPTO_JITTERENTROPY
> help
> The test interface allows a privileged process to capture
> the raw unconditioned high resolution time stamp noise that
> @@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
>
> If unsure, select N.
>
> +endif # if CRYPTO_FIPS && EXPERT
> +
> +if !(CRYPTO_FIPS && EXPERT)
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
> + int
> + default 64
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
> + int
> + default 32
> +
> +config CRYPTO_JITTERENTROPY_OSR
> + int
> + default 1
> +
> +config CRYPTO_JITTERENTROPY_TESTINTERFACE
> + bool
> +
> +endif # if !(CRYPTO_FIPS && EXPERT)
> +endif # if CRYPTO_JITTERENTROPY
> +
> config CRYPTO_KDF800108_CTR
> tristate
> select CRYPTO_HMAC
Reviewed-by: Stephan Mueller <smueller@chronox.de>
Ciao
Stephan
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
2023-11-06 15:25 ` Stephan Mueller
@ 2023-11-10 9:04 ` Geert Uytterhoeven
1 sibling, 0 replies; 146+ messages in thread
From: Geert Uytterhoeven @ 2023-11-10 9:04 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert, Stephan Müller,
Masahiro Yamada, linux-kbuild
Hi Herbert, Yamada-san,
On Mon, Nov 6, 2023 at 11:00 AM Herbert Xu <herbert@gondor.apana.org.au> wrote:
> On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> > I think that would help the situation, but I assume the sizing for the
> > jitter buffer is at least partly due to trying to account for cache
> > sizing or similar issues?
> >
> > Which really means that I assume any static compile-time answer to
> > that question is always wrong - whether you are an expert or not.
> > Unless you are just building the thing for one particular machine.
> >
> > So I do think the problem is deeper than "this is a question only for
> > experts". I definitely don't think you should ask a regular user (or
> > even a distro kernel package manager). I suspect it's likely that the
> > question is just wrong in general - because any particular one buffer
> > size for any number of machines simply cannot be the right answer.
> >
> > I realize that the commit says "*allow* for configuration of memory
> > size", but I really question the whole approach.
>
> Yes I think these are all valid points. I just noticed that I
> forgot to cc the author so let's see if Stephan has anything to
> add.
>
> > But yes - hiding these questions from any reasonable normal user is at
> > least a good first step.
>
> OK here's the patch:
>
> ---8<---
> As JITTERENTROPY is selected by default if you enable the CRYPTO
> API, any Kconfig options added there will show up for every single
> user. Hide the esoteric options under EXPERT as well as FIPS so
> that only distro makers will see them.
>
> Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Thanks for your patch, which is now commit e7ed6473c2c8c4e4 ("crypto:
jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT").
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
>
> See https://www.chronox.de/jent.html
>
> +if CRYPTO_JITTERENTROPY
> +if CRYPTO_FIPS && EXPERT
> +
> choice
> prompt "CPU Jitter RNG Memory Size"
> default CRYPTO_JITTERENTROPY_MEMSIZE_2
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG measures the execution time of memory accesses.
> Multiple consecutive memory accesses are performed. If the memory
> @@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
> int "CPU Jitter RNG Oversampling Rate"
> range 1 15
> default 1
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG allows the specification of an oversampling rate (OSR).
> The Jitter RNG operation requires a fixed amount of timing
> @@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
>
> config CRYPTO_JITTERENTROPY_TESTINTERFACE
> bool "CPU Jitter RNG Test Interface"
> - depends on CRYPTO_JITTERENTROPY
> help
> The test interface allows a privileged process to capture
> the raw unconditioned high resolution time stamp noise that
> @@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
>
> If unsure, select N.
>
> +endif # if CRYPTO_FIPS && EXPERT
> +
> +if !(CRYPTO_FIPS && EXPERT)
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
> + int
> + default 64
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
> + int
> + default 32
> +
> +config CRYPTO_JITTERENTROPY_OSR
> + int
> + default 1
> +
> +config CRYPTO_JITTERENTROPY_TESTINTERFACE
> + bool
This duplicates the symbols in the CRYPTO_FIPS && EXPERT section above,
which is fragile.
For the int and bool symbols, this can be handled without duplication
using:
config CRYPTO_JITTERENTROPY_OSR
- int "CPU Jitter RNG Oversampling Rate"
+ int "CPU Jitter RNG Oversampling Rate" if CRYPTO_FIPS && EXPERT
config CRYPTO_JITTERENTROPY_TESTINTERFACE
- bool "CPU Jitter RNG Test Interface"
+ bool "CPU Jitter RNG Test Interface" if CRYPTO_FIPS && EXPERT
Unfortunately the following does not work for the choice statement,
although kconfig does not report an error:
choice
- prompt "CPU Jitter RNG Memory Size"
+ prompt "CPU Jitter RNG Memory Size" if CRYPTO_FIPS && EXPERT
default CRYPTO_JITTERENTROPY_MEMSIZE_2
Unlike for other symbol types, which just become silent if
!(CRYPTO_FIPS && EXPERT), the choice is skipped completely if
!(CRYPTO_FIPS && EXPERT), and CRYPTO_JITTERENTROPY_MEMSIZE_2 is not set.
Yamada-san: Do you know why choice behaves differently?
Is this easy to fix?
Thanks!
> +
> +endif # if !(CRYPTO_FIPS && EXPERT)
> +endif # if CRYPTO_JITTERENTROPY
> +
> config CRYPTO_KDF800108_CTR
> tristate
> select CRYPTO_HMAC
Gr{oetje,eeting}s,
Geert
--
Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org
In personal conversations with technical people, I call myself a hacker. But
when I'm talking to journalists I just say "programmer" or something like that.
-- Linus Torvalds
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
@ 2023-11-03 2:37 ` pr-tracker-bot
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2023-11-03 2:37 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 2 Nov 2023 14:56:05 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bc3012f4e3a9765de81f454cb8f9bb16aafc6ff5
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.8
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
2023-11-03 2:37 ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
@ 2024-01-09 22:17 ` Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
` (2 more replies)
2 siblings, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2024-01-09 22:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b85ea95d086471afb4ad062012a4d73cd328fa86:
Linux 6.7-rc1 (2023-11-12 16:19:07 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p1
for you to fetch changes up to b8910630c967ffee582289451ddb5f9f19c26872:
crypto: iaa - Account for cpu-less numa nodes (2023-12-29 11:25:56 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add incremental lskcipher/skcipher processing.
Algorithms:
- Remove SHA1 from drbg.
- Remove CFB and OFB.
Drivers:
- Add comp high perf mode configuration in hisilicon/zip.
- Add support for 420xx devices in qat.
- Add IAA Compression Accelerator driver.
----------------------------------------------------------------
Bharat Bhushan (2):
crypto: octeontx2 - By default allocate one CPT LF per CPT VF
crypto: octeontx2 - Fix cptvf driver cleanup
Chanho Park (1):
crypto: jh7110 - Correct deferred probe return
Chen Ni (1):
crypto: sa2ul - Return crypto_aead_setkey to transfer the error
Chenghai Huang (3):
crypto: hisilicon/zip - add zip comp high perf mode configuration
crypto: hisilicon/qm - delete a dbg function
crypto: hisilicon/sec2 - optimize the error return process
Chengming Zhou (1):
crypto: scomp - fix req->dst buffer overflow
Christophe JAILLET (1):
hwrng: virtio - Remove usage of the deprecated ida_simple_xx() API
Damian Muszynski (5):
crypto: qat - add sysfs_added flag for ras
crypto: qat - add sysfs_added flag for rate limiting
crypto: qat - fix error path in add_update_sla()
crypto: qat - fix mutex ordering in adf_rl
crypto: qat - generate dynamically arbiter mappings
Dan Carpenter (2):
crypto: rsa - add a check for allocation failure
crypto: qat - prevent underflow in rp2srv_store()
Dave Jiang (1):
dmaengine: idxd: add external module driver support for dsa_bus_type
Dimitri John Ledkov (4):
crypto: drbg - ensure most preferred type is FIPS health checked
crypto: drbg - update FIPS CTR self-checks to aes256
crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
crypto: drbg - Remove SHA1 from drbg
Dinghao Liu (1):
crypto: ccp - fix memleak in ccp_init_dm_workarea
Eric Biggers (4):
crypto: sun8i-ss - use crypto_shash_tfm_digest() in sun8i_ss_hashkey()
crypto: shash - don't exclude async statuses from error stats
crypto: x86/sha1 - autoload if SHA-NI detected
crypto: x86/sha256 - autoload if SHA-NI detected
Giovanni Cabiddu (1):
crypto: qat - add NULL pointer check
Gonglei (Arei) (1):
crypto: virtio - Handle dataq logic with tasklet
Gustavo A. R. Silva (1):
crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings
Herbert Xu (31):
crypto: ccree - Silence gcc format-truncation false positive warnings
crypto: marvell/cesa - Silence gcc format-truncation false positive warnings
crypto: n2 - Silence gcc format-truncation false positive warnings
crypto: af_alg - Disallow multiple in-flight AIO requests
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
crypto: s390/aes - Fix buffer overread in CTR mode
crypto: arm64/sm4 - Remove cfb(sm4)
crypto: x86/sm4 - Remove cfb(sm4)
crypto: crypto4xx - Remove cfb and ofb
crypto: aspeed - Remove cfb and ofb
crypto: atmel - Remove cfb and ofb
crypto: cpt - Remove cfb
crypto: nitrox - Remove cfb
crypto: ccp - Remove cfb and ofb
crypto: hifn_795x - Remove cfb and ofb
crypto: hisilicon/sec2 - Remove cfb and ofb
crypto: safexcel - Remove cfb and ofb
crypto: octeontx - Remove cfb
crypto: n2 - Remove cfb
crypto: starfive - Remove cfb and ofb
crypto: bcm - Remove ofb
crypto: ccree - Remove ofb
crypto: tcrypt - Remove cfb and ofb
crypto: testmgr - Remove cfb and ofb
crypto: cfb,ofb - Remove cfb and ofb
crypto: skcipher - Add internal state support
crypto: skcipher - Make use of internal state
crypto: arc4 - Add internal state
crypto: algif_skcipher - Fix stream cipher chaining
crypto: api - Disallow identical driver names
crypto: skcipher - Pass statesize for simple lskcipher instances
Jia Jie Ho (8):
crypto: starfive - Update driver dependencies
crypto: starfive - RSA poll csr for done status
crypto: starfive - Pad adata with zeroes
hwrng: starfive - Fix dev_err_probe return error
crypto: starfive - Remove unneeded NULL checks
crypto: starfive - Fix dev_err_probe return error
dt-bindings: rng: starfive: Add jh8100 compatible string
hwrng: starfive - Add runtime pm ops
Jiapeng Chong (1):
crypto: iaa - remove unneeded semicolon
Jie Wang (5):
crypto: qat - relocate and rename get_service_enabled()
crypto: qat - change signature of uof_get_num_objs()
crypto: qat - relocate portions of qat_4xxx code
crypto: qat - move fw config related structures
crypto: qat - add support for 420xx devices
Krzysztof Kozlowski (2):
dt-bindings: crypto: qcom-qce: constrain clocks for IPQ9574 QCE
dt-bindings: crypto: qcom-qce: constrain clocks for SM8150-compatible QCE
Longfang Liu (1):
MAINTAINERS: update SEC2/HPRE driver maintainers list
Lucas Segarra Fernandez (4):
crypto: qat - include pci.h for GET_DEV()
crypto: qat - add admin msgs for telemetry
crypto: qat - add support for device telemetry
crypto: qat - add support for ring pair level telemetry
Martin Kaiser (1):
hwrng: virtio - remove #ifdef guards for PM functions
Neil Armstrong (3):
dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
dt-bindings: crypto: qcom,prng: document SM8650
Nikita Zhandarovich (1):
crypto: safexcel - Add error handling for dma_map_sg() calls
Nithin Dabilpuram (2):
crypto: octeontx2 - register error interrupts for inline cptlf
crypto: octeontx2 - support setting ctx ilen for inline CPT LF
Om Prakash Singh (1):
dt-bindings: crypto: qcom-qce: document the SC7280 crypto engine
Ovidiu Panait (28):
crypto: sahara - remove FLAGS_NEW_KEY logic
crypto: sahara - fix cbc selftest failure
crypto: sahara - fix ahash selftest failure
crypto: sahara - fix processing requests with cryptlen < sg->length
crypto: sahara - fix error handling in sahara_hw_descriptor_create()
crypto: sahara - remove unused error field in sahara_dev
crypto: sahara - avoid skcipher fallback code duplication
crypto: rk3288 - Use helper to set reqsize
crypto: amlogic - Use helper to set reqsize
crypto: artpec6 - Use helper to set reqsize
crypto: stm32/cryp - Use helper to set reqsize
crypto: sl3516 - Use helper to set reqsize
crypto: sun8i-ce - Use helper to set reqsize
crypto: sun8i-ss - Use helper to set reqsize
crypto: sahara - handle zero-length aes requests
crypto: sahara - fix ahash reqsize
crypto: sahara - fix wait_for_completion_timeout() error handling
crypto: sahara - improve error handling in sahara_sha_process()
crypto: sahara - fix processing hash requests with req->nbytes < sg->length
crypto: sahara - do not resize req->src when doing hash operations
crypto: sahara - clean up macro indentation
crypto: sahara - use BIT() macro
crypto: sahara - use devm_clk_get_enabled()
crypto: sahara - use dev_err_probe()
crypto: sahara - remove 'active' flag from sahara_aes_reqctx struct
crypto: sahara - remove unnecessary NULL assignments
crypto: sahara - remove error message for bad aes request size
crypto: sahara - add support for crypto_engine
Rafał Miłecki (1):
dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
Rob Herring (1):
hwrng: ingenic - Replace of_device.h with explicit of.h include
Sagar Vashnav (1):
crypto: lib/aesgcm - Add kernel docs for aesgcm_mac
Srujana Challa (7):
crypto: octeontx2 - remove CPT block reset
crypto: octeontx2 - add SGv2 support for CN10KB or CN10KA B0
crypto: octeontx2 - add devlink option to set t106 mode
crypto: octeontx2 - remove errata workaround for CN10KB or CN10KA B0 chip.
crypto: octeontx2 - add LF reset on queue disable
crypto: octeontx2 - update CPT inbound inline IPsec mailbox
crypto: octeontx2 - add ctx_val workaround
Thomas Bourgoin (1):
crypto: stm32/crc32 - fix parsing list of devices
Tianjia Zhang (1):
crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init
Tom Zanussi (16):
dmaengine: idxd: Rename drv_enable/disable_wq to idxd_drv_enable/disable_wq, and export
dmaengine: idxd: Export descriptor management functions
dmaengine: idxd: Export wq resource management functions
dmaengine: idxd: Add wq private data accessors
dmaengine: idxd: add callback support for iaa crypto
crypto: iaa - Add IAA Compression Accelerator Documentation
crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
crypto: iaa - Add per-cpu workqueue table with rebalancing
crypto: iaa - Add compression mode management along with fixed mode
crypto: iaa - Add support for deflate-iaa compression algorithm
crypto: iaa - Add irq support for the crypto async interface
crypto: iaa - Add IAA Compression Accelerator stats
dmaengine: idxd: Add support for device/wq defaults
crypto: iaa - Change desc->priv to 0
crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
crypto: iaa - Account for cpu-less numa nodes
Uwe Kleine-König (12):
hwrng: atmel - Convert to platform remove callback returning void
hwrng: cctrng - Convert to platform remove callback returning void
hwrng: exynos - Convert to platform remove callback returning void
hwrng: ingenic - Convert to platform remove callback returning void
hwrng: ks-sa - Convert to platform remove callback returning void
hwrng: mxc - Convert to platform remove callback returning void
hwrng: n2 - Convert to platform remove callback returning void
hwrng: npcm - Convert to platform remove callback returning void
hwrng: omap - Convert to platform remove callback returning void
hwrng: stm32 - Convert to platform remove callback returning void
hwrng: timeriomem - Convert to platform remove callback returning void
hwrng: xgene - Convert to platform remove callback returning void
Vegard Nossum (2):
crypto: shash - remove excess kerneldoc members
crypto: skcipher - remove excess kerneldoc members
WangJinchao (1):
crypto: tcrypt - add script tcrypt_speed_compare.py
Weili Qian (5):
crypto: hisilicon/qm - print device abnormal information
crypto: hisilicon/qm - remove incorrect type cast
crypto: hisilicon/sgl - small cleanups for sgl.c
crypto: hisilicon/qm - simplify the status of qm
crypto: hisilicon/qm - add comments and remove redundant array element
Wenkai Lin (1):
crypto: hisilicon/qm - add a function to set qm algs
Yang Yingliang (1):
hwrng: stm32 - add missing clk_disable_unprepare() in stm32_rng_init()
Zhiqi Song (4):
crypto: hisilicon/qm - save capability registers in qm init process
crypto: hisilicon/hpre - save capability registers in probe process
crypto: hisilicon/sec2 - save capability registers in probe process
crypto: hisilicon/zip - save capability registers in probe process
wangyangxin (1):
crypto: virtio - Wait for tasklet to complete on device remove
.../ABI/testing/debugfs-driver-qat_telemetry | 228 ++
Documentation/ABI/testing/debugfs-hisi-hpre | 2 +-
Documentation/ABI/testing/debugfs-hisi-sec | 2 +-
Documentation/ABI/testing/debugfs-hisi-zip | 2 +-
Documentation/crypto/device_drivers/index.rst | 9 +
Documentation/crypto/device_drivers/octeontx2.rst | 25 +
Documentation/crypto/index.rst | 1 +
.../bindings/crypto/inside-secure,safexcel.yaml | 86 +
.../bindings/crypto/inside-secure-safexcel.txt | 40 -
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../devicetree/bindings/crypto/qcom,prng.yaml | 1 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 14 +
.../bindings/rng/starfive,jh7110-trng.yaml | 6 +-
Documentation/driver-api/crypto/iaa/iaa-crypto.rst | 824 ++++++++
Documentation/driver-api/crypto/iaa/index.rst | 20 +
Documentation/driver-api/crypto/index.rst | 20 +
Documentation/driver-api/index.rst | 1 +
MAINTAINERS | 15 +-
arch/arm64/crypto/Kconfig | 6 +-
arch/arm64/crypto/sm4-ce-core.S | 158 --
arch/arm64/crypto/sm4-ce-glue.c | 108 +-
arch/arm64/crypto/sm4-ce.h | 3 -
arch/arm64/crypto/sm4-neon-core.S | 113 -
arch/arm64/crypto/sm4-neon-glue.c | 105 +-
arch/powerpc/crypto/aes-gcm-p10-glue.c | 2 +-
arch/s390/crypto/aes_s390.c | 4 +-
arch/s390/crypto/paes_s390.c | 4 +-
arch/x86/crypto/Kconfig | 8 +-
arch/x86/crypto/sha1_ssse3_glue.c | 7 +-
arch/x86/crypto/sha256_ssse3_glue.c | 7 +-
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 52 -
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 55 -
arch/x86/crypto/sm4-avx.h | 4 -
arch/x86/crypto/sm4_aesni_avx2_glue.c | 26 -
arch/x86/crypto/sm4_aesni_avx_glue.c | 130 --
crypto/Kconfig | 23 -
crypto/Makefile | 2 -
crypto/af_alg.c | 14 +-
crypto/algapi.c | 1 +
crypto/algif_skcipher.c | 72 +-
crypto/arc4.c | 11 +-
crypto/cbc.c | 6 +-
crypto/cfb.c | 254 ---
crypto/drbg.c | 40 +-
crypto/ecb.c | 10 +-
crypto/lskcipher.c | 43 +-
crypto/ofb.c | 106 -
crypto/rsa.c | 2 +
crypto/scompress.c | 6 +
crypto/shash.c | 6 +-
crypto/skcipher.c | 80 +-
crypto/tcrypt.c | 76 -
crypto/testmgr.c | 74 +-
crypto/testmgr.h | 1148 ----------
drivers/char/hw_random/atmel-rng.c | 6 +-
drivers/char/hw_random/cctrng.c | 6 +-
drivers/char/hw_random/core.c | 36 +-
drivers/char/hw_random/exynos-trng.c | 6 +-
drivers/char/hw_random/ingenic-rng.c | 8 +-
drivers/char/hw_random/jh7110-trng.c | 10 +-
drivers/char/hw_random/ks-sa-rng.c | 6 +-
drivers/char/hw_random/mxc-rnga.c | 6 +-
drivers/char/hw_random/n2-drv.c | 6 +-
drivers/char/hw_random/npcm-rng.c | 6 +-
drivers/char/hw_random/omap-rng.c | 6 +-
drivers/char/hw_random/stm32-rng.c | 7 +-
drivers/char/hw_random/timeriomem-rng.c | 6 +-
drivers/char/hw_random/virtio-rng.c | 14 +-
drivers/char/hw_random/xgene-rng.c | 6 +-
drivers/crypto/Kconfig | 1 +
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 4 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 5 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 25 +-
drivers/crypto/amcc/crypto4xx_alg.c | 14 -
drivers/crypto/amcc/crypto4xx_core.c | 40 -
drivers/crypto/amcc/crypto4xx_core.h | 4 -
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 4 +-
drivers/crypto/aspeed/Kconfig | 4 +-
drivers/crypto/aspeed/aspeed-hace-crypto.c | 230 --
drivers/crypto/atmel-aes.c | 214 +-
drivers/crypto/atmel-tdes.c | 205 +-
drivers/crypto/axis/artpec6_crypto.c | 12 +-
drivers/crypto/bcm/cipher.c | 57 -
drivers/crypto/cavium/cpt/cptvf_algs.c | 24 -
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 19 -
drivers/crypto/ccp/ccp-crypto-aes.c | 18 -
drivers/crypto/ccp/ccp-ops.c | 5 +-
drivers/crypto/ccree/cc_aead.c | 10 +-
drivers/crypto/ccree/cc_cipher.c | 45 +-
drivers/crypto/gemini/sl3516-ce-cipher.c | 4 +-
drivers/crypto/hifn_795x.c | 126 +-
drivers/crypto/hisilicon/debugfs.c | 54 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 122 +-
drivers/crypto/hisilicon/qm.c | 264 ++-
drivers/crypto/hisilicon/qm_common.h | 4 -
drivers/crypto/hisilicon/sec2/sec.h | 7 +
drivers/crypto/hisilicon/sec2/sec_crypto.c | 43 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 2 -
drivers/crypto/hisilicon/sec2/sec_main.c | 72 +-
drivers/crypto/hisilicon/sgl.c | 12 +-
drivers/crypto/hisilicon/zip/zip_main.c | 227 +-
drivers/crypto/inside-secure/safexcel.c | 4 -
drivers/crypto/inside-secure/safexcel.h | 4 -
drivers/crypto/inside-secure/safexcel_cipher.c | 171 +-
drivers/crypto/intel/Kconfig | 1 +
drivers/crypto/intel/Makefile | 1 +
drivers/crypto/intel/iaa/Kconfig | 19 +
drivers/crypto/intel/iaa/Makefile | 12 +
drivers/crypto/intel/iaa/iaa_crypto.h | 173 ++
drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c | 92 +
drivers/crypto/intel/iaa/iaa_crypto_main.c | 2193 ++++++++++++++++++++
drivers/crypto/intel/iaa/iaa_crypto_stats.c | 312 +++
drivers/crypto/intel/iaa/iaa_crypto_stats.h | 53 +
drivers/crypto/intel/qat/Kconfig | 11 +
drivers/crypto/intel/qat/Makefile | 1 +
drivers/crypto/intel/qat/qat_420xx/Makefile | 4 +
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 528 +++++
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.h | 55 +
drivers/crypto/intel/qat/qat_420xx/adf_drv.c | 202 ++
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 339 +--
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 52 -
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 277 +--
drivers/crypto/intel/qat/qat_common/Makefile | 4 +
.../intel/qat/qat_common/adf_accel_devices.h | 16 +-
.../crypto/intel/qat/qat_common/adf_accel_engine.c | 2 +-
drivers/crypto/intel/qat/qat_common/adf_admin.c | 37 +
drivers/crypto/intel/qat/qat_common/adf_admin.h | 4 +
.../crypto/intel/qat/qat_common/adf_cfg_common.h | 1 +
.../crypto/intel/qat/qat_common/adf_cfg_services.c | 27 +
.../crypto/intel/qat/qat_common/adf_cfg_services.h | 4 +
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 3 +
.../crypto/intel/qat/qat_common/adf_fw_config.h | 18 +
.../crypto/intel/qat/qat_common/adf_gen4_config.c | 287 +++
.../crypto/intel/qat/qat_common/adf_gen4_config.h | 11 +
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 238 +++
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 87 +
drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c | 153 ++
drivers/crypto/intel/qat/qat_common/adf_gen4_tl.h | 158 ++
drivers/crypto/intel/qat/qat_common/adf_init.c | 12 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 7 +-
drivers/crypto/intel/qat/qat_common/adf_rl.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 6 +-
.../intel/qat/qat_common/adf_sysfs_ras_counters.c | 7 +-
drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c | 8 +
.../crypto/intel/qat/qat_common/adf_telemetry.c | 288 +++
.../crypto/intel/qat/qat_common/adf_telemetry.h | 99 +
.../crypto/intel/qat/qat_common/adf_tl_debugfs.c | 710 +++++++
.../crypto/intel/qat/qat_common/adf_tl_debugfs.h | 117 ++
.../intel/qat/qat_common/icp_qat_fw_init_admin.h | 10 +
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 14 +-
drivers/crypto/intel/qat/qat_common/icp_qat_uclo.h | 2 +-
drivers/crypto/intel/qat/qat_common/qat_hal.c | 6 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 1 +
drivers/crypto/marvell/cesa/cesa.c | 6 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 23 -
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 86 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.h | 27 +
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 54 +-
.../crypto/marvell/octeontx2/otx2_cpt_devlink.c | 44 +-
.../crypto/marvell/octeontx2/otx2_cpt_hw_types.h | 9 +-
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 26 +
drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h | 298 +++
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 139 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 103 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 4 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 74 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 82 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 49 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 3 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 2 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 31 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h | 5 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 29 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 28 +
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 162 +-
drivers/crypto/n2_core.c | 36 +-
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 4 +-
drivers/crypto/sa2ul.c | 3 +-
drivers/crypto/sahara.c | 845 ++++----
drivers/crypto/starfive/Kconfig | 2 +-
drivers/crypto/starfive/jh7110-aes.c | 77 +-
drivers/crypto/starfive/jh7110-cryp.c | 20 +-
drivers/crypto/starfive/jh7110-cryp.h | 12 +-
drivers/crypto/starfive/jh7110-rsa.c | 58 +-
drivers/crypto/stm32/stm32-crc32.c | 2 +-
drivers/crypto/stm32/stm32-cryp.c | 2 +-
drivers/crypto/virtio/virtio_crypto_common.h | 2 +
drivers/crypto/virtio/virtio_crypto_core.c | 26 +-
drivers/dma/idxd/Makefile | 2 +-
drivers/dma/idxd/bus.c | 6 +
drivers/dma/idxd/cdev.c | 6 +-
drivers/dma/idxd/defaults.c | 53 +
drivers/dma/idxd/device.c | 13 +-
drivers/dma/idxd/dma.c | 9 +-
drivers/dma/idxd/idxd.h | 83 +-
drivers/dma/idxd/init.c | 7 +
drivers/dma/idxd/irq.c | 12 +-
drivers/dma/idxd/submit.c | 9 +-
include/crypto/hash.h | 4 -
include/crypto/if_alg.h | 5 +
include/crypto/skcipher.h | 133 +-
include/linux/hisi_acc_qm.h | 28 +-
lib/crypto/aesgcm.c | 13 +
lib/crypto/mpi/ec.c | 3 +
tools/crypto/tcrypt/tcrypt_speed_compare.py | 190 ++
205 files changed, 10087 insertions(+), 5779 deletions(-)
create mode 100644 Documentation/ABI/testing/debugfs-driver-qat_telemetry
create mode 100644 Documentation/crypto/device_drivers/index.rst
create mode 100644 Documentation/crypto/device_drivers/octeontx2.rst
create mode 100644 Documentation/devicetree/bindings/crypto/inside-secure,safexcel.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/inside-secure-safexcel.txt
create mode 100644 Documentation/driver-api/crypto/iaa/iaa-crypto.rst
create mode 100644 Documentation/driver-api/crypto/iaa/index.rst
create mode 100644 Documentation/driver-api/crypto/index.rst
delete mode 100644 crypto/cfb.c
delete mode 100644 crypto/ofb.c
create mode 100644 drivers/crypto/intel/iaa/Kconfig
create mode 100644 drivers/crypto/intel/iaa/Makefile
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto.h
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_main.c
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_stats.c
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_stats.h
create mode 100644 drivers/crypto/intel/qat/qat_420xx/Makefile
create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c
create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.h
create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_drv.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_config.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_config.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_config.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_telemetry.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_telemetry.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_tl_debugfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_tl_debugfs.h
create mode 100644 drivers/dma/idxd/defaults.c
create mode 100755 tools/crypto/tcrypt/tcrypt_speed_compare.py
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.8
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
@ 2024-01-10 20:38 ` pr-tracker-bot
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-01-10 20:38 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 10 Jan 2024 06:17:32 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0cb552aa97843f24549ce808883494138471c16b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
@ 2024-02-01 5:32 ` Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
` (2 more replies)
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2 siblings, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2024-02-01 5:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 6613476e225e090cc9aad49be7fa504e290dd33d:
Linux 6.8-rc1 (2024-01-21 14:11:32 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p2
for you to fetch changes up to c5a2f74db71a849f3a60bc153d684d6d28a0c665:
crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)
----------------------------------------------------------------
This push fixes regressions in caam and qat.
----------------------------------------------------------------
Damian Muszynski (1):
crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
Gaurav Jain (1):
crypto: caam - fix asynchronous hash
drivers/crypto/caam/caamalg_qi2.c | 7 +++++--
drivers/crypto/caam/caamhash.c | 7 +++++--
drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
3 files changed, 11 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2024-02-01 18:23 ` pr-tracker-bot
2024-02-08 4:29 ` Herbert Xu
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-02-01 18:23 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 1 Feb 2024 13:32:53 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/8a2514c0c61f7d4587071b96b4be7481350b5bc9
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
@ 2024-02-08 4:29 ` Herbert Xu
2024-02-08 6:24 ` pr-tracker-bot
2024-02-21 9:10 ` Herbert Xu
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2024-02-08 4:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c5a2f74db71a849f3a60bc153d684d6d28a0c665:
crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p3
for you to fetch changes up to 24c890dd712f6345e382256cae8c97abb0406b70:
crypto: algif_hash - Remove bogus SGL free on zero-length error path (2024-02-02 18:08:12 +0800)
----------------------------------------------------------------
This push fixes regressions in cbc and algif_hash, as well as an
older NULL-pointer dereference in ccp.
----------------------------------------------------------------
Herbert Xu (2):
crypto: cbc - Ensure statesize is zero
crypto: algif_hash - Remove bogus SGL free on zero-length error path
Kim Phillips (1):
crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
crypto/algif_hash.c | 5 +++--
crypto/cbc.c | 3 +++
drivers/crypto/ccp/sev-dev.c | 10 ++++++++--
3 files changed, 14 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-08 4:29 ` Herbert Xu
@ 2024-02-08 6:24 ` pr-tracker-bot
2024-02-21 9:10 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-02-08 6:24 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 8 Feb 2024 12:29:53 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/047371968ffc470769f541d6933e262dc7085456
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-08 4:29 ` Herbert Xu
2024-02-08 6:24 ` pr-tracker-bot
@ 2024-02-21 9:10 ` Herbert Xu
2024-02-21 17:17 ` pr-tracker-bot
2024-02-28 8:07 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2024-02-21 9:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 24c890dd712f6345e382256cae8c97abb0406b70:
crypto: algif_hash - Remove bogus SGL free on zero-length error path (2024-02-02 18:08:12 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p4
for you to fetch changes up to c0ec2a712daf133d9996a8a1b7ee2d4996080363:
crypto: virtio/akcipher - Fix stack overflow on memcpy (2024-02-09 12:55:53 +0800)
----------------------------------------------------------------
This push fixes a stack overflow in virtio.
----------------------------------------------------------------
zhenwei pi (1):
crypto: virtio/akcipher - Fix stack overflow on memcpy
drivers/crypto/virtio/virtio_crypto_akcipher_algs.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-21 9:10 ` Herbert Xu
@ 2024-02-21 17:17 ` pr-tracker-bot
2024-02-28 8:07 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-02-21 17:17 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 21 Feb 2024 17:10:48 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8be5a55b8e3f7eab8f36ceed2512f457f914318
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-21 9:10 ` Herbert Xu
2024-02-21 17:17 ` pr-tracker-bot
@ 2024-02-28 8:07 ` Herbert Xu
2024-02-28 17:48 ` pr-tracker-bot
2024-03-06 9:47 ` Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2024-02-28 8:07 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c0ec2a712daf133d9996a8a1b7ee2d4996080363:
crypto: virtio/akcipher - Fix stack overflow on memcpy (2024-02-09 12:55:53 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p5
for you to fetch changes up to 1c0cf6d19690141002889d72622b90fc01562ce4:
crypto: arm64/neonbs - fix out-of-bounds access on short input (2024-02-24 08:37:24 +0800)
----------------------------------------------------------------
This push fixes a regression in lskcipher and an out-of-bound
access in arm64/neonbs.
----------------------------------------------------------------
Ard Biesheuvel (1):
crypto: arm64/neonbs - fix out-of-bounds access on short input
Herbert Xu (1):
crypto: lskcipher - Copy IV in lskcipher glue code always
arch/arm64/crypto/aes-neonbs-glue.c | 11 +++++++++++
crypto/lskcipher.c | 6 ++----
2 files changed, 13 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-28 8:07 ` Herbert Xu
@ 2024-02-28 17:48 ` pr-tracker-bot
2024-03-06 9:47 ` Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-02-28 17:48 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 28 Feb 2024 16:07:59 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p5
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e326df53af0021f48a481ce9d489efda636c2dc6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-28 8:07 ` Herbert Xu
2024-02-28 17:48 ` pr-tracker-bot
@ 2024-03-06 9:47 ` Herbert Xu
2024-03-06 16:33 ` pr-tracker-bot
1 sibling, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2024-03-06 9:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 1c0cf6d19690141002889d72622b90fc01562ce4:
crypto: arm64/neonbs - fix out-of-bounds access on short input (2024-02-24 08:37:24 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p6
for you to fetch changes up to c0afb6b88fbbc177fa322a835f874be217bffe45:
crypto: rk3288 - Fix use after free in unprepare (2024-03-01 18:33:29 +0800)
----------------------------------------------------------------
This push fixes potential use-after-frees in rk3288 and sun8i-ce.
----------------------------------------------------------------
Andrey Skvortsov (1):
crypto: sun8i-ce - Fix use after free in unprepare
Herbert Xu (1):
crypto: rk3288 - Fix use after free in unprepare
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 34 +++++++++++-----------
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 4 +--
2 files changed, 19 insertions(+), 19 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.9
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
2024-02-08 4:29 ` Herbert Xu
@ 2024-03-25 9:47 ` Herbert Xu
2024-03-25 18:18 ` pr-tracker-bot
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2024-03-25 9:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 6a8dbd71a70620c42d4fa82509204ba18231f28d:
Revert "crypto: remove CONFIG_CRYPTO_STATS" (2024-03-13 09:49:37 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p2
for you to fetch changes up to 5a7e89d3315d1be86aff8a8bf849023cda6547f7:
crypto: iaa - Fix nr_cpus < nr_iaa case (2024-03-22 19:42:20 +0800)
----------------------------------------------------------------
This push fixes a regression that broke iwd as well as a divide by
zero in iaa.
----------------------------------------------------------------
Eric Biggers (1):
Revert "crypto: pkcs7 - remove sha1 support"
Tom Zanussi (1):
crypto: iaa - Fix nr_cpus < nr_iaa case
crypto/asymmetric_keys/mscode_parser.c | 3 ++
crypto/asymmetric_keys/pkcs7_parser.c | 4 ++
crypto/asymmetric_keys/public_key.c | 3 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/asymmetric_keys/x509_cert_parser.c | 8 +++
crypto/testmgr.h | 80 ++++++++++++++++++++++++++++++
drivers/crypto/intel/iaa/iaa_crypto_main.c | 10 ++--
include/linux/oid_registry.h | 4 ++
kernel/module/Kconfig | 5 ++
9 files changed, 114 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.9
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
@ 2024-03-25 18:18 ` pr-tracker-bot
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-03-25 18:18 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 25 Mar 2024 17:47:43 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/174fdc93a241af54772ae3e745ec719e9f6cebfc
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 6.10
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2024-03-25 18:18 ` pr-tracker-bot
@ 2024-05-20 3:26 ` Herbert Xu
2024-05-20 16:33 ` pr-tracker-bot
1 sibling, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2024-05-20 3:26 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 13909a0c88972c5ef5d13f44d1a8bf065a31bdf4:
crypto: atmel-sha204a - provide the otp content (2024-05-10 17:15:25 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p2
for you to fetch changes up to c6ab5c915da460c0397960af3c308386c3f3247b:
crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (2024-05-17 18:55:07 +0800)
----------------------------------------------------------------
This push fixes a bug in the new ecc P521 code as well as a buggy
fix in qat.
----------------------------------------------------------------
Herbert Xu (1):
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
Stefan Berger (1):
crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
crypto/ecc.c | 22 ++++++++++++++++++++++
drivers/crypto/intel/qat/qat_common/adf_aer.c | 19 +++++--------------
include/crypto/internal/ecc.h | 15 ++-------------
3 files changed, 29 insertions(+), 27 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.9
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2024-03-15 3:04 ` Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
` (2 more replies)
2 siblings, 3 replies; 146+ messages in thread
From: Herbert Xu @ 2024-03-15 3:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c5a2f74db71a849f3a60bc153d684d6d28a0c665:
crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p1
for you to fetch changes up to 6a8dbd71a70620c42d4fa82509204ba18231f28d:
Revert "crypto: remove CONFIG_CRYPTO_STATS" (2024-03-13 09:49:37 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Avoid unnecessary copying in scomp for trivial SG lists.
Algorithms:
- Optimise NEON CCM implementation on ARM64.
Drivers:
- Add queue stop/query debugfs support in hisilicon/qm.
----------------------------------------------------------------
Adam Guerin (6):
crypto: qat - remove unused macros in qat_comp_alg.c
crypto: qat - removed unused macro in adf_cnv_dbgfs.c
crypto: qat - avoid division by zero
crypto: qat - remove double initialization of value
crypto: qat - remove unnecessary description from comment
crypto: qat - fix comment structure
Ard Biesheuvel (8):
crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
crypto: arm64/aes-ccm - Pass short inputs via stack buffer
crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
crypto: arm64/aes-ccm - Merge encrypt and decrypt tail handling
crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helpers
Arnd Bergmann (2):
crypto: qat - avoid memcpy() overflow warning
crypto: arm/sha - fix function cast warnings
Barry Song (3):
crypto: hisilicon/zip - fix the missing CRYPTO_ALG_ASYNC in cra_flags
crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags
crypto: scomp - remove memcpy if sg_nents is 1 and pages are lowmem
Borislav Petkov (AMD) (1):
crypto: ccp - State in dmesg that TSME is enabled
Clay Chang (1):
KEYS: include header for EINVAL definition
Colin Ian King (2):
crypto: pcbc - remove redundant assignment to nbytes
crypto: asymmetric_keys - remove redundant pointer secs
Damian Muszynski (7):
crypto: qat - add heartbeat error simulator
crypto: qat - add auto reset on error
crypto: qat - change SLAs cleanup flow at shutdown
crypto: qat - resolve race condition during AER recovery
crypto: qat - fix ring to service map for dcc in 4xxx
crypto: qat - fix ring to service map for dcc in 420xx
crypto: qat - make ring to service map common for QAT GEN4
Dan Carpenter (1):
crypto: qat - uninitialized variable in adf_hb_error_inject_write()
Danny Tsen (1):
crypto: vmx - Move to arch/powerpc/crypto
David Wronek (1):
dt-bindings: crypto: ice: Document SC7180 inline crypto engine
Eric Biggers (2):
crypto: ahash - unexport crypto_hash_alg_has_setkey()
crypto: remove CONFIG_CRYPTO_STATS
Erick Archer (2):
crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
crypto: qat - use kcalloc_node() instead of kzalloc_node()
Furong Zhou (3):
crypto: qat - add fatal error notify method
crypto: qat - disable arbitration before reset
crypto: qat - limit heartbeat notifications
Giovanni Cabiddu (1):
Documentation: qat: fix auto_reset section
Herbert Xu (2):
crypto: dh - Make public key test FIPS-only
Revert "crypto: remove CONFIG_CRYPTO_STATS"
Joachim Vandersmissen (2):
crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c
crypto: rsa - restrict plaintext/ciphertext values more
Kilian Zinnecker (1):
crypto: rockchip - fix to check return value
Li RongQing (1):
crypto: virtio - remove duplicate check if queue is broken
Luca Weiss (1):
dt-bindings: qcom-qce: Add compatible for SM6350
Lukas Bulwahn (1):
MAINTAINERS: adjust file entries after crypto vmx file movement
Mario Limonciello (2):
crypto: ccp - Avoid discarding errors in psp_send_platform_access_msg()
crypto: ccp - Update return values for some unit tests
Markus Elfring (1):
crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Martin Kaiser (1):
hwrng: hisi - use dev_err_probe
Minjie Du (1):
crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
Mun Chun Yep (4):
crypto: qat - update PFVF protocol for recovery
crypto: qat - re-enable sriov after pf reset
crypto: qat - add fatal error notification
crypto: qat - improve aer error reset handling
Qi Tao (3):
crypto: hisilicon/sec2 - updates the sec DFX function register
crypto: hisilicon/sec2 - modify nested macro call
crypto: hisilicon/sec2 - fix some cleanup issues
Quanyang Wang (1):
crypto: xilinx - call finalize with bh disabled
Randy Dunlap (1):
crypto: jitter - fix CRYPTO_JITTERENTROPY help text
Tom Zanussi (3):
crypto: iaa - Remove header table code
crypto: iaa - Fix async_disable descriptor leak
crypto: iaa - Fix comp/decomp delay statistics
Tudor Ambarus (1):
MAINTAINERS: Remove T Ambarus from few mchp entries
Varshini Rajendran (4):
dt-bindings: crypto: add sam9x7 in Atmel AES
dt-bindings: crypto: add sam9x7 in Atmel SHA
dt-bindings: crypto: add sam9x7 in Atmel TDES
dt-bindings: rng: atmel,at91-trng: add sam9x7 TRNG
Vladis Dronov (1):
crypto: tcrypt - add ffdhe2048(dh) test
Weili Qian (5):
crypto: hisilicon/qm - support get device state
crypto: hisilicon/qm - dump important registers values before resetting
crypto: hisilicon/qm - add stop function by hardware
crypto: hisilicon/qm - obtain stop queue status
crypto: hisilicon/qm - change function type to void
Wenkai Lin (2):
crypto: hisilicon - Fix smp_processor_id() warnings
crypto: hisilicon/sec - remove unused parameter
Documentation/ABI/testing/debugfs-driver-qat | 26 ++
Documentation/ABI/testing/debugfs-hisi-hpre | 22 ++
Documentation/ABI/testing/debugfs-hisi-sec | 22 ++
Documentation/ABI/testing/debugfs-hisi-zip | 22 ++
Documentation/ABI/testing/sysfs-driver-qat | 20 ++
.../bindings/crypto/atmel,at91sam9g46-aes.yaml | 6 +-
.../bindings/crypto/atmel,at91sam9g46-sha.yaml | 6 +-
.../bindings/crypto/atmel,at91sam9g46-tdes.yaml | 6 +-
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 1 +
.../devicetree/bindings/rng/atmel,at91-trng.yaml | 4 +
MAINTAINERS | 25 +-
arch/arm/crypto/sha256_glue.c | 13 +-
arch/arm/crypto/sha512-glue.c | 12 +-
arch/arm64/crypto/Kconfig | 1 +
arch/arm64/crypto/aes-ce-ccm-core.S | 265 ++++++++-------------
arch/arm64/crypto/aes-ce-ccm-glue.c | 154 ++++++++----
arch/arm64/crypto/aes-glue.c | 1 +
arch/powerpc/crypto/Kconfig | 20 ++
arch/powerpc/crypto/Makefile | 20 +-
{drivers/crypto/vmx => arch/powerpc/crypto}/aes.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aes_cbc.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aes_ctr.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aes_xts.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.h | 0
.../vmx => arch/powerpc/crypto}/aesp8-ppc.pl | 0
.../crypto/vmx => arch/powerpc/crypto}/ghash.c | 0
.../vmx => arch/powerpc/crypto}/ghashp8-ppc.pl | 0
{drivers/crypto/vmx => arch/powerpc/crypto}/vmx.c | 0
crypto/Kconfig | 5 +-
crypto/ahash.c | 21 +-
crypto/asymmetric_keys/verify_pefile.c | 4 +-
crypto/dh.c | 63 ++---
crypto/pcbc.c | 4 +-
crypto/rsa.c | 36 ++-
crypto/scompress.c | 38 ++-
crypto/tcrypt.c | 3 +
crypto/testmgr.c | 8 -
drivers/char/hw_random/hisi-rng.c | 6 +-
drivers/crypto/Kconfig | 14 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 2 +-
drivers/crypto/ccp/platform-access.c | 11 +-
drivers/crypto/ccp/psp-dev.c | 11 +-
drivers/crypto/hisilicon/debugfs.c | 58 +++++
drivers/crypto/hisilicon/hpre/hpre_main.c | 2 +-
drivers/crypto/hisilicon/qm.c | 184 +++++++++-----
drivers/crypto/hisilicon/sec2/sec_crypto.c | 33 +--
drivers/crypto/hisilicon/sec2/sec_main.c | 7 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 1 +
drivers/crypto/hisilicon/zip/zip_main.c | 2 +-
drivers/crypto/intel/iaa/iaa_crypto.h | 25 --
drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c | 1 -
drivers/crypto/intel/iaa/iaa_crypto_main.c | 122 ++--------
drivers/crypto/intel/iaa/iaa_crypto_stats.c | 30 ---
drivers/crypto/intel/iaa/iaa_crypto_stats.h | 8 +-
drivers/crypto/intel/qat/Kconfig | 14 ++
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 64 ++---
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 64 ++---
drivers/crypto/intel/qat/qat_common/Makefile | 2 +
.../intel/qat/qat_common/adf_accel_devices.h | 3 +
drivers/crypto/intel/qat/qat_common/adf_aer.c | 138 ++++++++++-
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_clock.c | 3 +
.../crypto/intel/qat/qat_common/adf_cnv_dbgfs.c | 1 -
.../crypto/intel/qat/qat_common/adf_common_drv.h | 10 +
drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c | 4 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 59 +++++
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c | 6 +-
.../crypto/intel/qat/qat_common/adf_heartbeat.c | 20 +-
.../crypto/intel/qat/qat_common/adf_heartbeat.h | 21 ++
.../intel/qat/qat_common/adf_heartbeat_dbgfs.c | 53 +++++
.../intel/qat/qat_common/adf_heartbeat_inject.c | 76 ++++++
.../crypto/intel/qat/qat_common/adf_hw_arbiter.c | 25 ++
drivers/crypto/intel/qat/qat_common/adf_init.c | 12 +
drivers/crypto/intel/qat/qat_common/adf_isr.c | 11 +-
drivers/crypto/intel/qat/qat_common/adf_pfvf_msg.h | 7 +-
.../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.c | 64 ++++-
.../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.h | 21 ++
.../intel/qat/qat_common/adf_pfvf_pf_proto.c | 8 +
.../intel/qat/qat_common/adf_pfvf_vf_proto.c | 6 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 20 +-
drivers/crypto/intel/qat/qat_common/adf_sriov.c | 38 ++-
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 37 +++
drivers/crypto/intel/qat/qat_common/adf_vf_isr.c | 2 -
.../crypto/intel/qat/qat_common/qat_comp_algs.c | 9 -
drivers/crypto/intel/qat/qat_common/qat_crypto.c | 4 +-
drivers/crypto/rockchip/rk3288_crypto.c | 5 +
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 12 +-
drivers/crypto/virtio/virtio_crypto_core.c | 2 -
drivers/crypto/vmx/.gitignore | 3 -
drivers/crypto/vmx/Kconfig | 14 --
drivers/crypto/vmx/Makefile | 23 --
drivers/crypto/vmx/ppc-xlate.pl | 231 ------------------
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 3 +
include/crypto/internal/hash.h | 2 -
include/crypto/public_key.h | 1 +
include/linux/hisi_acc_qm.h | 10 +-
tools/crypto/ccp/test_dbc.py | 8 +-
100 files changed, 1450 insertions(+), 1016 deletions(-)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_cbc.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_ctr.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_xts.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.h (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.pl (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/ghash.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/ghashp8-ppc.pl (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/vmx.c (100%)
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_inject.c
delete mode 100644 drivers/crypto/vmx/.gitignore
delete mode 100644 drivers/crypto/vmx/Kconfig
delete mode 100644 drivers/crypto/vmx/Makefile
delete mode 100644 drivers/crypto/vmx/ppc-xlate.pl
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.9
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
@ 2024-03-15 21:51 ` Linus Torvalds
2024-03-16 4:39 ` Herbert Xu
2024-03-15 21:59 ` pr-tracker-bot
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2 siblings, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2024-03-15 21:51 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Thu, 14 Mar 2024 at 20:04, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Drivers:
>
> - Add queue stop/query debugfs support in hisilicon/qm.
There's a lot more than that in there. Fairl ybig Intel qat updates
from what I can see, for example.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.9
2024-03-15 21:51 ` Linus Torvalds
@ 2024-03-16 4:39 ` Herbert Xu
0 siblings, 0 replies; 146+ messages in thread
From: Herbert Xu @ 2024-03-16 4:39 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Fri, Mar 15, 2024 at 02:51:47PM -0700, Linus Torvalds wrote:
> On Thu, 14 Mar 2024 at 20:04, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Drivers:
> >
> > - Add queue stop/query debugfs support in hisilicon/qm.
>
> There's a lot more than that in there. Fairl ybig Intel qat updates
> from what I can see, for example.
Sorry, one line got chopped off while I was creating the signed
tag:
- Improve error recovery in qat.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.9
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
@ 2024-03-15 21:59 ` pr-tracker-bot
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2 siblings, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-03-15 21:59 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 15 Mar 2024 11:04:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c8e769961668ef56acabc67f040c58ed769c57e4
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 6.10
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
2024-03-15 21:59 ` pr-tracker-bot
@ 2024-05-13 3:50 ` Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
2024-05-13 22:38 ` pr-tracker-bot
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2024-05-13 3:50 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 174fdc93a241af54772ae3e745ec719e9f6cebfc:
Merge tag 'v6.9-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2024-03-25 10:48:23 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p1
for you to fetch changes up to 13909a0c88972c5ef5d13f44d1a8bf065a31bdf4:
crypto: atmel-sha204a - provide the otp content (2024-05-10 17:15:25 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Remove crypto stats interface.
Algorithms:
- Add faster AES-XTS on modern x86_64 CPUs.
- Forbid curves with order less than 224 bits in ecc (FIPS 186-5).
- Add ECDSA NIST P521.
Drivers:
- Expose otp zone in atmel.
- Add dh fallback for primes > 4K in qat.
- Add interface for live migration in qat.
- Use dma for aes requests in starfive.
- Add full DMA support for stm32mpx in stm32.
- Add Tegra Security Engine driver.
Others:
- Introduce scope-based x509_certificate allocation.
----------------------------------------------------------------
Adam Guerin (2):
crypto: qat - improve error message in adf_get_arbiter_mapping()
crypto: qat - improve error logging to be consistent across features
Akhil R (3):
dt-bindings: crypto: Add Tegra Security Engine
gpu: host1x: Add Tegra SE to SID table
crypto: tegra - Add Tegra Security Engine driver
Aleksandr Mishin (1):
crypto: bcm - Fix pointer arithmetic
Animesh Agarwal (1):
dt-bindings: crypto: ti,omap-sham: Convert to dtschema
Ard Biesheuvel (1):
crypto: arm64/aes-ce - Simplify round key load sequence
Arnd Bergmann (1):
crypto: ccp - drop platform ifdef checks
Chang S. Bae (2):
crypto: x86/aesni - Rearrange AES key size check
crypto: x86/aesni - Update aesni_set_key() to return void
Chen Ni (1):
crypto: octeontx2 - add missing check for dma_map_single
Chenghai Huang (10):
crypto: hisilicon/sec - Add the condition for configuring the sriov function
crypto: hisilicon/debugfs - Fix debugfs uninit process issue
crypto: hisilicon/sgl - Delete redundant parameter verification
crypto: hisilicon/debugfs - Fix the processing logic issue in the debugfs creation
crypto: hisilicon/qm - Add the default processing branch
crypto: hisilicon - Adjust debugfs creation and release order
crypto: hisilicon/sec - Fix memory leak for sec resource release
crypto: hisilicon/debugfs - Resolve the problem of applying for redundant space in sq dump
crypto: hisilicon/qm - Add the err memory release process to qm uninit
crypto: hisilicon/debugfs - mask the unnecessary info from the dump
Colin Ian King (1):
crypto: qat - Fix spelling mistake "Invalide" -> "Invalid"
Damian Muszynski (1):
crypto: qat - implement dh fallback for primes > 4K
Dan Carpenter (1):
crypto: tegra - Fix some error codes
Eric Biggers (24):
crypto: remove CONFIG_CRYPTO_STATS
x86: add kconfig symbols for assembler VAES and VPCLMULQDQ support
crypto: x86/aes-xts - add AES-XTS assembly macro for modern CPUs
crypto: x86/aes-xts - wire up AESNI + AVX implementation
crypto: x86/aes-xts - wire up VAES + AVX2 implementation
crypto: x86/aes-xts - wire up VAES + AVX10/256 implementation
crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
crypto: x86/nh-avx2 - add missing vzeroupper
crypto: x86/sha256-avx2 - add missing vzeroupper
crypto: x86/sha512-avx2 - add missing vzeroupper
crypto: x86/aes-xts - make non-AVX implementation use new glue code
crypto: x86/aes-xts - access round keys using single-byte offsets
crypto: x86/sha256-ni - convert to use rounds macros
crypto: x86/sha256-ni - rename some register aliases
crypto: x86/sha256-ni - optimize code size
crypto: x86/sha256-ni - simplify do_4rounds
crypto: x86/aes-xts - handle CTS encryption more efficiently
crypto: x86/aesni-xts - deduplicate aesni_xts_enc() and aesni_xts_dec()
crypto: x86/aes-xts - handle AES-128 and AES-192 more efficiently
crypto: x86/aes-xts - eliminate a few more instructions
crypto: x86/aes-xts - optimize size of instructions operating on lengths
crypto: x86/aes-xts - simplify loop in xts_crypt_slowpath()
crypto: x86/aes-gcm - delete unused GCM assembly code
crypto: x86/aes-gcm - simplify GCM hash subkey derivation
Geert Uytterhoeven (1):
dt-bindings: crypto: starfive: Restore sort order
Giovanni Cabiddu (3):
crypto: qat - adf_get_etr_base() helper
crypto: qat - relocate CSR access code
crypto: qat - specify firmware files for 402xx
Gustavo A. R. Silva (2):
crypto: nx - Avoid -Wflex-array-member-not-at-end warning
crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
Hailey Mothershead (1):
crypto: aead,cipher - zeroize key buffer after use
Herbert Xu (1):
padata: Disable BH when taking works lock on MT path
Jerry Snitselaar (1):
crypto: iaa - Fix some errors in IAA documentation
Jia Jie Ho (8):
dt-bindings: crypto: starfive: Add jh8100 support
crypto: starfive - Update hash dma usage
crypto: starfive - Skip unneeded key free
crypto: starfive - Use dma for aes requests
crypto: starfive - Skip dma setup for zeroed message
crypto: starfive - Skip unneeded fallback allocation
crypto: starfive - Do not free stack buffer
crypto: starfive - Use fallback for unaligned dma access
Joachim Vandersmissen (2):
crypto: ecc - update ecc_gen_privkey for FIPS 186-5
crypto: ecdh - explicitly zeroize private_key
Joel Granados (1):
crypto: fips - Remove the now superfluous sentinel element from ctl_table array
Li Zhijian (1):
hwrng: core - Convert sprintf/snprintf to sysfs_emit
Lothar Rubusch (4):
crypto: atmel-i2c - add missing arg description
crypto: atmel-i2c - rename read function
crypto: atmel-sha204a - add reading from otp zone
crypto: atmel-sha204a - provide the otp content
Luca Weiss (1):
dt-bindings: crypto: ice: Document sc7280 inline crypto engine
Lucas Segarra Fernandez (1):
crypto: qat - validate slices count returned by FW
Lukas Wunner (1):
X.509: Introduce scope-based x509_certificate allocation
Marek Vasut (3):
hwrng: stm32 - use logical OR in conditional
hwrng: stm32 - put IP into RPM suspend on failure
hwrng: stm32 - repair clock handling
Maxime Méré (1):
crypto: stm32/hash - add full DMA support for stm32mpx
Pankaj Gupta (2):
crypto: caam - init-clk based on caam-page0-access
crypto: caam - i.MX8ULP donot have CAAM page0 access
Roman Smirnov (2):
crypto: ecc - remove checks in crypto_ecdh_shared_secret() and ecc_make_pub_key()
crypto: algboss - remove NULL check in cryptomgr_schedule_probe()
Siming Wan (3):
crypto: qat - rename get_sla_arr_of_type()
crypto: qat - expand CSR operations for QAT GEN4 devices
crypto: qat - add bank save and restore flows
Stefan Berger (16):
crypto: ecdsa - Fix module auto-load on add-key
crypto: ecc - Use ECC_CURVE_NIST_P192/256/384_DIGITS where possible
crypto: ecdsa - Convert byte arrays with key coordinates to digits
crypto: ecdsa - Adjust tests on length of key parameters
crypto: ecdsa - Extend res.x mod n calculation for NIST P521
crypto: ecc - Add nbits field to ecc_curve structure
crypto: ecc - Implement vli_mmod_fast_521 for NIST p521
crypto: ecc - Add special case for NIST P521 in ecc_point_mult
crypto: ecc - Add NIST P521 curve parameters
crypto: ecdsa - Replace ndigits with nbits where precision is needed
crypto: ecdsa - Rename keylen to bufsize where necessary
crypto: ecdsa - Register NIST P521 and extend test suite
crypto: asymmetric_keys - Adjust signature size calculation for NIST P521
crypto: x509 - Add OID for NIST P521 and extend parser for it
crypto: ecdh - Pass private key in proper byte order to check valid key
crypto: ecdh - Initialize ctx->private_key in proper byte order
Thorsten Blum (4):
crypto: jitter - Use kvfree_sensitive() to fix Coccinelle warning
crypto: jitter - Remove duplicate word in comment
crypto: jitter - Replace http with https
crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
Tom Zanussi (5):
crypto: iaa - fix decomp_bytes_in stats
crypto: iaa - Remove comp/decomp delay statistics
crypto: iaa - Add global_stats file and remove individual stat files
crypto: iaa - Change iaa statistics to atomic64_t
crypto: iaa - Use cpumask_weight() when rebalancing
Uwe Kleine-König (2):
hwrng: mxc-rnga - Drop usage of platform_driver_probe()
crypto: tegra - Convert to platform remove callback returning void
Vitaly Chikunov (1):
crypto: ecrdsa - Fix module auto-load on add_key
Wenkai Lin (1):
crypto: hisilicon/sec2 - fix for register offset
Wolfram Sang (2):
crypto: api - use 'time_left' variable with wait_for_completion_killable_timeout()
crypto: sahara - use 'time_left' variable with wait_for_completion_timeout()
Xin Zeng (4):
crypto: qat - relocate and rename 4xxx PF2VM definitions
crypto: qat - move PFVF compat checker to a function
crypto: qat - add interface for live migration
crypto: qat - implement interface for live migration
.../bindings/crypto/nvidia,tegra234-se-aes.yaml | 52 +
.../bindings/crypto/nvidia,tegra234-se-hash.yaml | 52 +
.../devicetree/bindings/crypto/omap-sham.txt | 28 -
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../bindings/crypto/starfive,jh7110-crypto.yaml | 30 +-
.../devicetree/bindings/crypto/ti,omap-sham.yaml | 56 +
Documentation/driver-api/crypto/iaa/iaa-crypto.rst | 96 +-
MAINTAINERS | 5 +
arch/arm64/crypto/aes-ce.S | 34 +-
arch/arm64/crypto/aes-neon.S | 20 +-
arch/s390/configs/debug_defconfig | 1 -
arch/s390/configs/defconfig | 1 -
arch/x86/Kconfig.assembler | 10 +
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aes-xts-avx-x86_64.S | 845 +++++++++
arch/x86/crypto/aesni-intel_asm.S | 469 +----
arch/x86/crypto/aesni-intel_glue.c | 420 +++--
arch/x86/crypto/nh-avx2-x86_64.S | 1 +
arch/x86/crypto/sha256-avx2-asm.S | 1 +
arch/x86/crypto/sha256_ni_asm.S | 251 +--
arch/x86/crypto/sha512-avx2-asm.S | 1 +
crypto/Kconfig | 20 -
crypto/Makefile | 2 -
crypto/acompress.c | 33 -
crypto/aead.c | 87 +-
crypto/ahash.c | 63 +-
crypto/akcipher.c | 31 -
crypto/algboss.c | 3 -
crypto/api.c | 8 +-
crypto/asymmetric_keys/public_key.c | 14 +-
crypto/asymmetric_keys/x509_cert_parser.c | 46 +-
crypto/asymmetric_keys/x509_parser.h | 3 +
crypto/asymmetric_keys/x509_public_key.c | 31 +-
crypto/cipher.c | 3 +-
crypto/compress.h | 3 -
crypto/{crypto_user_base.c => crypto_user.c} | 10 +-
crypto/crypto_user_stat.c | 176 --
crypto/ecc.c | 100 +-
crypto/ecc_curve_defs.h | 49 +
crypto/ecdh.c | 11 +-
crypto/ecdsa.c | 66 +-
crypto/ecrdsa.c | 1 +
crypto/ecrdsa_defs.h | 5 +
crypto/fips.c | 1 -
crypto/hash.h | 30 -
crypto/jitterentropy-kcapi.c | 3 +-
crypto/jitterentropy.c | 4 +-
crypto/kpp.c | 30 -
crypto/lskcipher.c | 73 +-
crypto/rng.c | 44 +-
crypto/scompress.c | 3 -
crypto/shash.c | 75 +-
crypto/sig.c | 13 -
crypto/skcipher.c | 86 +-
crypto/skcipher.h | 10 -
crypto/testmgr.c | 7 +
crypto/testmgr.h | 146 ++
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/mxc-rnga.c | 9 +-
drivers/char/hw_random/stm32-rng.c | 18 +-
drivers/crypto/Kconfig | 8 +
drivers/crypto/Makefile | 1 +
drivers/crypto/atmel-i2c.c | 30 +-
drivers/crypto/atmel-i2c.h | 8 +-
drivers/crypto/atmel-sha204a.c | 68 +
drivers/crypto/bcm/spu2.c | 2 +-
drivers/crypto/caam/ctrl.c | 19 +-
drivers/crypto/ccp/sp-platform.c | 14 +-
drivers/crypto/hisilicon/debugfs.c | 65 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 23 +-
drivers/crypto/hisilicon/qm.c | 8 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 4 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 32 +-
drivers/crypto/hisilicon/sgl.c | 5 +-
drivers/crypto/hisilicon/zip/zip_main.c | 24 +-
drivers/crypto/intel/iaa/iaa_crypto.h | 16 +-
drivers/crypto/intel/iaa/iaa_crypto_main.c | 23 +-
drivers/crypto/intel/iaa/iaa_crypto_stats.c | 183 +-
drivers/crypto/intel/iaa/iaa_crypto_stats.h | 8 -
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 5 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 7 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 2 +
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 1 +
.../intel/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 1 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 1 +
.../intel/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_common/Makefile | 6 +-
.../intel/qat/qat_common/adf_accel_devices.h | 88 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 10 +
.../intel/qat/qat_common/adf_gen2_hw_csr_data.c | 101 +
.../intel/qat/qat_common/adf_gen2_hw_csr_data.h | 86 +
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.c | 97 -
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.h | 76 -
.../intel/qat/qat_common/adf_gen4_hw_csr_data.c | 231 +++
.../intel/qat/qat_common/adf_gen4_hw_csr_data.h | 188 ++
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 380 +++-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 127 +-
.../crypto/intel/qat/qat_common/adf_gen4_pfvf.c | 8 +-
drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c | 1 +
.../crypto/intel/qat/qat_common/adf_gen4_vf_mig.c | 1010 ++++++++++
.../crypto/intel/qat/qat_common/adf_gen4_vf_mig.h | 10 +
.../crypto/intel/qat/qat_common/adf_mstate_mgr.c | 318 ++++
.../crypto/intel/qat/qat_common/adf_mstate_mgr.h | 89 +
.../intel/qat/qat_common/adf_pfvf_pf_proto.c | 8 +-
.../crypto/intel/qat/qat_common/adf_pfvf_utils.h | 11 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 12 +-
drivers/crypto/intel/qat/qat_common/adf_rl.h | 2 +
drivers/crypto/intel/qat/qat_common/adf_sriov.c | 7 +-
.../crypto/intel/qat/qat_common/adf_telemetry.c | 21 +
.../crypto/intel/qat/qat_common/adf_telemetry.h | 1 +
.../crypto/intel/qat/qat_common/adf_transport.c | 4 +-
.../crypto/intel/qat/qat_common/qat_asym_algs.c | 66 +-
drivers/crypto/intel/qat/qat_common/qat_bl.c | 6 +-
drivers/crypto/intel/qat/qat_common/qat_bl.h | 11 +-
drivers/crypto/intel/qat/qat_common/qat_mig_dev.c | 130 ++
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 1 +
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 1 +
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 4 +
drivers/crypto/nx/nx-842.c | 6 +-
drivers/crypto/nx/nx-842.h | 10 +-
drivers/crypto/sahara.c | 16 +-
drivers/crypto/starfive/Kconfig | 4 +
drivers/crypto/starfive/jh7110-aes.c | 603 ++++--
drivers/crypto/starfive/jh7110-cryp.c | 43 -
drivers/crypto/starfive/jh7110-cryp.h | 10 +-
drivers/crypto/starfive/jh7110-hash.c | 285 ++-
drivers/crypto/starfive/jh7110-rsa.c | 14 +-
drivers/crypto/stm32/stm32-hash.c | 570 ++++--
drivers/crypto/tegra/Makefile | 9 +
drivers/crypto/tegra/tegra-se-aes.c | 1933 ++++++++++++++++++++
drivers/crypto/tegra/tegra-se-hash.c | 1060 +++++++++++
drivers/crypto/tegra/tegra-se-key.c | 156 ++
drivers/crypto/tegra/tegra-se-main.c | 437 +++++
drivers/crypto/tegra/tegra-se.h | 560 ++++++
drivers/gpu/host1x/dev.c | 24 +
include/crypto/acompress.h | 73 +-
include/crypto/aead.h | 21 -
include/crypto/akcipher.h | 78 +-
include/crypto/algapi.h | 3 -
include/crypto/ecc_curve.h | 2 +
include/crypto/ecdh.h | 1 +
include/crypto/hash.h | 22 -
include/crypto/internal/acompress.h | 1 -
include/crypto/internal/cryptouser.h | 16 -
include/crypto/internal/ecc.h | 27 +-
include/crypto/internal/scompress.h | 1 -
include/crypto/kpp.h | 58 +-
include/crypto/rng.h | 51 +-
include/crypto/skcipher.h | 25 -
include/linux/compiler.h | 2 +
include/linux/oid_registry.h | 1 +
include/linux/qat/qat_mig_dev.h | 31 +
include/uapi/linux/cryptouser.h | 30 +-
kernel/padata.c | 8 +-
154 files changed, 10335 insertions(+), 3222 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/nvidia,tegra234-se-aes.yaml
create mode 100644 Documentation/devicetree/bindings/crypto/nvidia,tegra234-se-hash.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/omap-sham.txt
create mode 100644 Documentation/devicetree/bindings/crypto/ti,omap-sham.yaml
create mode 100644 arch/x86/crypto/aes-xts-avx-x86_64.S
rename crypto/{crypto_user_base.c => crypto_user.c} (98%)
delete mode 100644 crypto/crypto_user_stat.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen2_hw_csr_data.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen2_hw_csr_data.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_hw_csr_data.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_hw_csr_data.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_vf_mig.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_vf_mig.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_mstate_mgr.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_mstate_mgr.h
create mode 100644 drivers/crypto/intel/qat/qat_common/qat_mig_dev.c
create mode 100644 drivers/crypto/tegra/Makefile
create mode 100644 drivers/crypto/tegra/tegra-se-aes.c
create mode 100644 drivers/crypto/tegra/tegra-se-hash.c
create mode 100644 drivers/crypto/tegra/tegra-se-key.c
create mode 100644 drivers/crypto/tegra/tegra-se-main.c
create mode 100644 drivers/crypto/tegra/tegra-se.h
delete mode 100644 include/crypto/internal/cryptouser.h
create mode 100644 include/linux/qat/qat_mig_dev.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
@ 2024-05-13 22:12 ` Linus Torvalds
2024-05-14 5:17 ` Herbert Xu
2024-05-14 6:54 ` Lukas Wunner
2024-05-13 22:38 ` pr-tracker-bot
1 sibling, 2 replies; 146+ messages in thread
From: Linus Torvalds @ 2024-05-13 22:12 UTC (permalink / raw)
To: Herbert Xu, Lukas Wunner
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Sun, 12 May 2024 at 20:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Lukas Wunner (1):
> X.509: Introduce scope-based x509_certificate allocation
I absolutely hate how this commit tries to remove one single compare
instruction by introducing a *very* dangerous hack.
The whole 'assume()' thing will generate actively wrong code if that
assumption conditional doesn't hold, to the point of being completely
impossible to debug.
Having random kernel code add random "assume()" lines is absolutely
not what we should do. Particularly not in some random code sequence
where it absolutely does not matter ONE WHIT.
Now, I've pulled this, but I killed that "assume()" hackery in my merge.
Because there is no way we will ever encourage random code to make
these kinds of patterns, and I most definitely do not want anybody
else to try to copy that horrendous thing.
Yes, yes, we have "unreachable()" in other places, and yes, you can
make compilers generate garbage by using that incorrectly. But they
should be about obvious code warning issues, not about "let's save one
conditional instruction".
Now, if somebody really *really* cares about that one extraneous
conditional, particularly if it shows up in some more important place
than some random certificate parsing routine where is most definitely
is not in the least critical, there are better models for this
optimization.
Maybe somebody can teach the kernel build in *general* that
"kmalloc()" and friends never return an error pointer, only NULL or
success? That would not necessarily be a bad idea if the scope-based
cleanup otherwise causes issues.
But this kind of hacky "one random piece of kernel code uses a very
dangerous pattern to state that some *other* piece of kernel code has
particular return patterns" - that is not at all acceptable.
Put another way: it would probably be ok if the SLAB people added some
"this function cannot return error codes" annotation on their core
declaration and it fixed an issue in _general_.
But it is *not* ok if random kernel code starts randomly asserting the
same thing.
Quod licet Iovi, non licet bovi.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 22:12 ` Linus Torvalds
@ 2024-05-14 5:17 ` Herbert Xu
2024-05-14 5:41 ` Linus Torvalds
2024-05-14 6:54 ` Lukas Wunner
1 sibling, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2024-05-14 5:17 UTC (permalink / raw)
To: Linus Torvalds
Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
>
> Maybe somebody can teach the kernel build in *general* that
> "kmalloc()" and friends never return an error pointer, only NULL or
> success? That would not necessarily be a bad idea if the scope-based
> cleanup otherwise causes issues.
Yes he did try this out:
https://lore.kernel.org/all/20240302082751.GA25828@wunner.de/
It resulted in an increase in total vmlinux size although I don't
think anyone looked into the reason for it.
> But this kind of hacky "one random piece of kernel code uses a very
> dangerous pattern to state that some *other* piece of kernel code has
> particular return patterns" - that is not at all acceptable.
Agreed.
However, this patch still has two outstanding build defects which
have not been addressed:
https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
So I might end up just reverting it.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-14 5:17 ` Herbert Xu
@ 2024-05-14 5:41 ` Linus Torvalds
2024-05-14 6:02 ` Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2024-05-14 5:41 UTC (permalink / raw)
To: Herbert Xu
Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, 13 May 2024 at 22:17, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Yes he did try this out:
>
> https://lore.kernel.org/all/20240302082751.GA25828@wunner.de/
>
> It resulted in an increase in total vmlinux size although I don't
> think anyone looked into the reason for it.
I think the basic issue is that the whole 'assume()' logic of "if (x)
unreachable()" is very fragile.
Basically, it *can* generate the exact code you want by basically
telling the compiler that if some condition is true, then the compiler
can jump to unreachable code, and then depending on the phase of the
moon, the compiler may get the whole "I can assume this is never
true".
BUT.
The reason I hated seeing it so much is exactly that it's basically
depending on everything going just right.
When things do *not* go right, it causes the compiler to instead
actually generate the extra code for the conditional, and actually
generate a conditional jump to something that the compiler then
decides it can do anything to, since it's unreachable.
So now you generate extra code, and generate a branch to nonsense.
> However, this patch still has two outstanding build defects which
> have not been addressed:
>
> https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
This one just seems to be a sanity check for "you shouldn't check
kmalloc() for ERR_PTR", so it's a validation test that then doesn't
like the new test in that 'assume()'.
And the second one:
> https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
looks *very* much like the cases we've seen with clang in particular
where clang goes "this code isn't reachable, so I'll just drop
everything on the floor", and then it just becomes a fallthrough to
whatever else code happens to come next. Most of the time that's just
more (unrelated) code in the same function, but sometimes it causes
that "falls through to next function" instead, entirely randomly
depending on how the code was laid out.
> So I might end up just reverting it.
I suspect that because I removed the whole 'assume()' hackery, neither
of the above issues will now happen, and the code nwo works.
But yes, the above is *exactly* why I don't want to see that
'unreachable()' hackery.
Now, if we had some *other* way to tell the compiler "this condition
never happens", that would be fine. Some compiler builtin for
asserting some condition.
But a conditional "unreachable()" is absolutely not it.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-14 5:41 ` Linus Torvalds
@ 2024-05-14 6:02 ` Herbert Xu
0 siblings, 0 replies; 146+ messages in thread
From: Herbert Xu @ 2024-05-14 6:02 UTC (permalink / raw)
To: Linus Torvalds
Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, May 13, 2024 at 10:41:58PM -0700, Linus Torvalds wrote:
>
> I suspect that because I removed the whole 'assume()' hackery, neither
> of the above issues will now happen, and the code nwo works.
Alright I'll let it stay and see if any new issues crop up.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 22:12 ` Linus Torvalds
2024-05-14 5:17 ` Herbert Xu
@ 2024-05-14 6:54 ` Lukas Wunner
2024-05-14 17:07 ` Linus Torvalds
1 sibling, 1 reply; 146+ messages in thread
From: Lukas Wunner @ 2024-05-14 6:54 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Julia Lawall, Nicolas Palix, cocci
On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
> On Sun, 12 May 2024 at 20:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Lukas Wunner (1):
> > X.509: Introduce scope-based x509_certificate allocation
[...]
> Having random kernel code add random "assume()" lines is absolutely
> not what we should do. Particularly not in some random code sequence
> where it absolutely does not matter ONE WHIT.
>
> Now, I've pulled this, but I killed that "assume()" hackery in my merge.
Thanks, appreciated. This way of handling it spares me from having
to resubmit the patch without assume(). (The patch is prep work
for upcoming PCI device authentication.)
> > However, this patch still has two outstanding build defects which
> > have not been addressed:
> >
> > https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
>
> This one just seems to be a sanity check for "you shouldn't check
> kmalloc() for ERR_PTR", so it's a validation test that then doesn't
> like the new test in that 'assume()'.
I've been in touch with Julia (+cc) to silence this coccinelle
false-positive. But now that the assume() is gone, the coccinelle
warning won't appear anyway:
https://lore.kernel.org/all/alpine.DEB.2.22.394.2405062136410.3284@hadrien/
> And the second one:
>
> > https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
>
> looks *very* much like the cases we've seen with clang in particular
> where clang goes "this code isn't reachable, so I'll just drop
> everything on the floor", and then it just becomes a fallthrough to
> whatever else code happens to come next. Most of the time that's just
> more (unrelated) code in the same function, but sometimes it causes
> that "falls through to next function" instead, entirely randomly
> depending on how the code was laid out.
Curiously, this particular 0-day report is for gcc 13.2.0 though,
not clang.
The assume() macro had no effect with clang when I tested it.
So the unnecessary IS_ERR() check persisted despite the macro when
compiling with clang. Only gcc honors it. Probably another reason
why you would hate the macro. :)
clang supports __builtin_assume(). In theory that should have the
same effect as __builtin_unreachable() on gcc (albeit with inverse
boolean semantics). In practice it had no effect. (Tested with
clang 15.0.6.)
https://clang.llvm.org/docs/LanguageExtensions.html#builtin-assume
So with clang there doesn't seem to be a working way to tell the
compiler about assumptions it can make. And with gcc it's apparently
"hit and miss" depending on the exact gcc version and code. :(
> I suspect that because I removed the whole 'assume()' hackery, neither
> of the above issues will now happen, and the code nwo works.
Yes.
I guess this effort was over the top, so apologies for the noise!
Thanks,
Lukas
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-14 6:54 ` Lukas Wunner
@ 2024-05-14 17:07 ` Linus Torvalds
0 siblings, 0 replies; 146+ messages in thread
From: Linus Torvalds @ 2024-05-14 17:07 UTC (permalink / raw)
To: Lukas Wunner
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Julia Lawall, Nicolas Palix, cocci
On Mon, 13 May 2024 at 23:54, Lukas Wunner <lukas@wunner.de> wrote:
>
> On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
> >
> > > https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
> >
> > looks *very* much like the cases we've seen with clang in particular
> > where clang goes "this code isn't reachable, so I'll just drop
> > everything on the floor", and then it just becomes a fallthrough to
> > whatever else code happens to come next. Most of the time that's just
> > more (unrelated) code in the same function, but sometimes it causes
> > that "falls through to next function" instead, entirely randomly
> > depending on how the code was laid out.
>
> Curiously, this particular 0-day report is for gcc 13.2.0 though,
> not clang.
Hmm. I think all the previous reports of "falls through to next
function" that I have seen have been with clang, but that is probably
be selection bias: the gcc cases of this tend to be found so much more
quickly (because gcc is still more common at least on x86) that by the
time I see the reports, it's because of some clang issue.
And in fact, when I go test this theory by going to search on lore, I
do see several gcc reports.
So no, it was never just clang-only, it was just that the ones I had
looked at were about clang.
> The assume() macro had no effect with clang when I tested it.
I suspect that the issue is that with *normal* kernel configurations,
the code generation is simple and straightforward enough that gcc did
the right thing.
And then some more complicated setup with more debugging support
enabled (particularly things like UBSAN or KASAN) the code gets
complicated enough that gcc doesn't do the optimization any more, and
then the conditional in assume() doesn't get optimized away at an
early stage any more, and remains as a conditional branch to
la-la-land.
And you actually don't even see this as a warning unless the
la-la-land happens to be at the end of a function. IOW, the "branch to
nowhere" _could_ just branch to some label inside the function, and
the objtool sanity check would never even have triggered.
That's why "unreachable()" can be so dangerous. It tells the compiler
that code generation in one place no longer matters, and then the
compiler can decide to leave things just dangling in odd ways.
The code presumably still *works* - because the actual conditional
never triggers, so in that sense it's safe and fine. But it's still
just horrendous to try to figure out, which is why I was so down on
it.
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
@ 2024-05-13 22:38 ` pr-tracker-bot
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2024-05-13 22:38 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 13 May 2024 11:50:03 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/84c7d76b5ab6a52e1b3d8101b9f910c128dca396
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.10
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2020-10-12 3:32 ` Herbert Xu
2020-10-13 16:24 ` pr-tracker-bot
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2 siblings, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2020-10-12 3:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Allow DRBG testing through user-space af_alg.
- Add tcrypt speed testing support for keyed hashes.
- Add type-safe init/exit hooks for ahash.
Algorithms:
- Mark arc4 as obsolete and pending for future removal.
- Mark anubis, khazad, sead and tea as obsolete.
- Improve boot-time xor benchmark.
- Add OSCCA SM2 asymmetric cipher algorithm and use it for integrity.
Drivers:
- Fixes and enhancement for XTS in caam.
- Add support for XIP8001B hwrng in xiphera-trng.
- Add RNG and hash support in sun8i-ce/sun8i-ss.
- Allow imx-rngc to be used by kernel entropy pool.
- Use crypto engine in omap-sham.
- Add support for Ingenic X1830 with ingenic.
The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5:
Linux 5.9-rc1 (2020-08-16 13:04:57 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 3093e7c16e12d729c325adb3c53dde7308cefbd8:
X.509: Fix modular build of public_key_sm2 (2020-10-08 16:39:14 +1100)
----------------------------------------------------------------
Andrei Botila (10):
crypto: caam/jr - add fallback for XTS with more than 8B IV
crypto: caam/qi - add fallback for XTS with more than 8B IV
crypto: caam/qi2 - add fallback for XTS with more than 8B IV
crypto: caam/jr - add support for more XTS key lengths
crypto: caam/qi - add support for more XTS key lengths
crypto: caam/qi2 - add support for more XTS key lengths
crypto: caam - add xts check for block length equal to zero
crypto: caam/jr - add support for XTS with 16B IV
crypto: caam/qi - add support for XTS with 16B IV
crypto: caam/qi2 - add support for XTS with 16B IV
Andy Shevchenko (1):
crypto: caam - use traditional error check pattern
Ard Biesheuvel (15):
staging/rtl8192e: switch to RC4 library interface
staging/rtl8192u: switch to RC4 library interface
SUNRPC: remove RC4-HMAC-MD5 support from KerberosV
crypto: n2 - remove ecb(arc4) support
crypto: bcm-iproc - remove ecb(arc4) support
net: wireless: drop bogus CRYPTO_xxx Kconfig selects
crypto: arc4 - mark ecb(arc4) skcipher as obsolete
crypto: Kconfig - mark unused ciphers as obsolete
crypto: arm/sha256-neon - avoid ADRL pseudo instruction
crypto: arm/sha512-neon - avoid ADRL pseudo instruction
crypto: arm/aes-neonbs - avoid hacks to prevent Thumb2 mode switches
crypto: arm/aes-neonbs - avoid loading reorder argument on encryption
crypto: arm/aes-neonbs - use typed init/exit routines for XTS
crypto: xor - defer load time benchmark to a later time
crypto: xor - use ktime for template benchmarking
Atte Tommiska (3):
dt-bindings: vendor-prefixes: Add Xiphera vendor prefix
dt-bindings: rng: add bindings for Xiphera XIP8001B hwrng
hwrng: xiphera-trng: add support for XIP8001B hwrng
Christophe JAILLET (2):
crypto: hifn_795x - switch from 'pci_' to 'dma_' API
crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call
Colin Ian King (1):
crypto: chelsio - fix minor indentation issue
Corentin Labbe (18):
crypto: proc - Removing some useless only space lines
crypto: sun8i-ss - Add SS_START define
crypto: sun8i-ss - Add support for the PRNG
crypto: sun8i-ss - support hash algorithms
crypto: sun8i-ss - fix a trivial typo
crypto: sun8i-ss - Add more comment on some structures
crypto: sun8i-ss - better debug printing
crypto: sun8i-ce - handle endianness of t_common_ctl
crypto: sun8i-ce - move iv data to request context
crypto: sun8i-ce - split into prepare/run/unprepare
crypto: sun8i-ce - handle different error registers
crypto: sun8i-ce - rename has_t_dlen_in_bytes to cipher_t_dlen_in_bytes
crypto: sun8i-ce - support hash algorithms
crypto: sun8i-ce - Add stat_bytes debugfs
crypto: sun8i-ce - Add support for the PRNG
crypto: sun8i-ce - Add support for the TRNG
crypto: sun8i-ce - fix comparison of integer expressions of different signedness
crypto: sun8i-ss - fix comparison of integer expressions of different signedness
Dan Carpenter (1):
crypto: sa2ul - Fix pm_runtime_get_sync() error checking
Daniel Jordan (1):
padata: add another maintainer and another list
Denis Efremov (5):
crypto: inside-secure - use kfree_sensitive()
crypto: amlogic - use kfree_sensitive()
crypto: sun8i-ce - use kfree_sensitive()
crypto: sun8i-ss - use kfree_sensitive()
crypto: sun8i-ss - remove redundant memzero_explicit()
Dominik Przychodni (1):
crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA
Elena Petrova (1):
crypto: af_alg - add extra parameters for DRBG interface
Fabio Estevam (1):
crypto: arm/curve25519 - include <linux/scatterlist.h>
George Acosta (1):
crypto: cavium/nitrox - add an error message to explain the failure of pci_request_mem_regions
Gilad Ben-Yossef (2):
crypto: ccree - remove data unit size support
crypto: ccree - remove bitlocker cipher
Giovanni Cabiddu (5):
crypto: qat - include domain in top level debugfs path
crypto: qat - replace device ids defines
crypto: qat - use PCI_VDEVICE
crypto: qat - fix function parameters descriptions
crypto: qat - drop input parameter from adf_enable_aer()
Hao Fang (1):
crypto: hisilicon/zip - fix the uncleared debug registers
Herbert Xu (32):
crypto: algapi - Move crypto_yield into internal.h
crypto: algapi - Remove skbuff.h inclusion
crypto: algif_skcipher - EBUSY on aio should be an error
crypto: algif_aead - Do not set MAY_BACKLOG on the async path
crypto: marvell/cesa - Fix sparse warnings
crypto: tcrypt - Add support for hash speed testing with keys
crypto: stm32 - Add missing header inclusions
crypto: ahash - Add init_tfm/exit_tfm
crypto: ahash - Add ahash_alg_instance
crypto: ahash - Remove AHASH_REQUEST_ON_STACK
crypto: hifn_795x - Remove 64-bit build-time check
crypto: mediatek - Fix endianness bugs and sparse warnings
crypto: stm32 - Fix sparse warnings
crypto: arm/poly1305 - Add prototype for poly1305_blocks_neon
crypto: arm64/sha - Add declarations for assembly variables
crypto: arm64/gcm - Fix endianness warnings
crypto: powerpc/crc-vpmsum_test - Fix sparse endianness warning
crypto: amlogic - Fix endianness marker
crypto: arm/aes-neonbs - Use generic cbc encryption path
crypto: cbc - Remove cbc.h
crypto: ux500 - Fix sparse endianness warnings
crypto: sa2ul - Select CRYPTO_AUTHENC
crypto: sun4i-ss - Fix sparse endianness markers
crypto: n2 - Fix sparse endianness warning
crypto: inside-secure - Move priv pointer into safexcel_context
crypto: inside-secure - Move ipad/opad into safexcel_context
crypto: inside-secure - Reuse code in safexcel_hmac_alg_setkey
crypto: lib/chacha20poly1305 - Set SG_MITER_ATOMIC unconditionally
crypto: x86/poly1305 - Remove assignments with no effect
lib/mpi: Fix unused variable warnings
crypto: bcm - Verify GCM/CCM key length in setkey
X.509: Fix modular build of public_key_sm2
Horia Geantă (1):
crypto: caam - Move debugfs fops into standalone file
Hui Tang (1):
crypto: hisilicon/qm - fix judgement of queue is full
Ira Weiny (2):
crypto: ux500 - Fix kmap() bug
crypto: hash - Remove unused async iterators
Jorge Ramirez-Ortiz (2):
hwrng: optee - handle unlimited data rates
hwrng: optee - fix wait use case
Julia Lawall (5):
hwrng: stm32 - use semicolons rather than commas to separate statements
hwrng: iproc-rng200 - use semicolons rather than commas to separate statements
hwrng: mxc-rnga - use semicolons rather than commas to separate statements
crypto: drivers - use semicolons rather than commas to separate statements
crypto: atmel-tdes - use semicolons rather than commas to separate statements
Krzysztof Kozlowski (9):
hwrng: cctrn - Simplify with dev_err_probe()
crypto: sa2ul - Simplify with dev_err_probe()
crypto: ccree - Simplify with dev_err_probe()
crypto: s5p-sss - Add and fix kerneldoc
crypto: s5p-sss - Pass error from clk_get and reduce verbosity on deferral
crypto: caam - Fix kerneldoc
crypto: caam - Simplify with dev_err_probe()
crypto: stm32-hash - Simplify with dev_err_probe()
crypto: sun8i - Simplify with dev_err_probe()
Liu Shixin (3):
crypto: atmel-aes - convert to use be32_add_cpu()
crypto: qat - convert to use DEFINE_SEQ_ATTRIBUTE macro
crypto: cpt - simplify the return expression of cav_register_algs
Longfang Liu (5):
crypto: hisilicon - update mininum queue
crypto: hisilicon - update HPRE module parameter description
crypto: hisilicon - update SEC module parameter description
crypto: hisilicon - update ZIP module parameter description
crypto: hisilicon - fixed memory allocation error
Madhuparna Bhowmik (1):
crypto: picoxcell - Fix potential race condition bug
Marco Felsch (1):
hwrng: imx-rngc - add quality to use it as kernel entropy pool
Meng Yu (3):
crypto: hisilicon/hpre - remove useless code
crypto: hisilicon/hpre - adjust some coding style
crypto: hisilicon/hpre - fix a bug in dh algorithm
Nathan Chancellor (1):
crypto: xor - Remove unused variable count in do_xor_speed
Nicolas Toromanoff (1):
crypto: stm32/crc32 - Avoid lock if hardware is already used
Pascal van Leeuwen (2):
crypto: inside-secure - Prevent missing of processing errors
crypto: inside-secure - Add support for EIP197 with output classifier
Pavel Machek (1):
crypto: ccp - fix error handling
Peter Ujfalusi (1):
crypto: sa2ul - Fix DMA mapping API usage
Qinglang Miao (8):
crypto: qat - remove unnecessary mutex_init()
crypto: allwinner - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: amlogic - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: caam - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: cavium/zip - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: hisilicon/qm - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: marvell/octeontx - simplify the return expression of create_sysfs_eng_grps_info()
crypto: mediatek - simplify the return expression of mtk_dfe_dse_reset()
Ram Muthiah (1):
crypto: virtio - don't use 'default m'
Randy Dunlap (5):
crypto: algif_aead - delete duplicated word
crypto: crc32c_generic - delete and fix duplicated words
crypto: crct10dif_generic - fix duplicated words
crypto: engine - delete duplicated word
crypto: tcrypt - delete duplicated words in messages
Shukun Tan (4):
crypto: hisilicon/qm - clear used reference count when start qp
crypto: hisilicon/qm - fix event queue depth to 2048
crypto: hisilicon/qm - fix VF not available after PF FLR
crypto: hisilicon/zip - modify debugfs interface parameters
Sihang Chen (2):
crypto: hisilicon/qm - fix wrong release after using strsep
crypto: hisilicon/zip - fix the uninitalized 'curr_qm_qp_num'
Tero Kristo (3):
crypto: sa2ul - fix compiler warning produced by clang
crypto: omap-sham - convert to use crypto engine
crypto: omap-sham - fix digcnt register handling with export/import
Tianjia Zhang (12):
crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc()
crypto: sm3 - export crypto_sm3_final function
lib/mpi: Extend the MPI library
lib/mpi: Introduce ec implementation to MPI library
crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
crypto: testmgr - support test with different ciphertext per encryption
crypto: testmgr - Fix potential memory leak in test_akcipher_one()
crypto: sm2 - add SM2 test vectors to testmgr
X.509: support OSCCA certificate parse
X.509: support OSCCA SM2-with-SM3 certificate verification
integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
X.509: fix error return value on the failed path
Tom Rix (1):
hwrng: intel - cleanup initialization
Tomer Maimon (1):
hwrng: npcm - modify readl to readb
Uros Bizjak (3):
crypto: x86/crc32c-intel - Use CRC32 mnemonic
crypto: curve25519-x86_64 - Use XORL r32,32
crypto: poly1305-x86_64 - Use XORL r32,32
Weili Qian (2):
crypto: hisilicon/qm - fix the call trace when unbind device
crypto: hisilicon/qm - remove the update of flags
Xiaoliang Pang (1):
cypto: mediatek - fix leaks in mtk_desc_ring_alloc
Xu Wang (1):
crypto: s5p-sss - remove redundant null check
Yang Shen (15):
crypto: hisilicon/qm - fix print frequence in hisi_qp_send
crypto: hisilicon/qm - fix no stop reason when use 'hisi_qm_stop'
crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown'
crypto: hisilicon/qm - fix the process of register algorithms to crypto
crypto: hisilicon/zip - remove some useless parameters
crypto: hisilicon/zip - unify naming style for functions and macros
crypto: hisilicon/zip - replace 'sprintf' with 'scnprintf'
crypto: hisilicon/zip - use a enum parameter instead of some macros
crypto: hisilicon/zip - add print for error branch
crypto: hisilicon/zip - fix static check warning
crypto: hisilicon/zip - move some private macros from 'zip.h' to 'zip_crypto.c'
crypto: hisilicon/zip - supplement some comments
crypto: hisilicon/zip - fix some coding styles
crypto: hisilicon/qm - fix wrong return type of 'pci_get_drvdata'
crypto: hisilicon/zip - fix the return value when device is busy
YueHaibing (1):
crypto: sa2ul - Fix pointer-to-int-cast warning
Zhang Qilong (1):
crypto: marvell/cesa - use devm_platform_ioremap_resource_byname
Zhou Wang (1):
crypto: hisilicon/zip - fix zero length input in GZIP decompress
dinghao.liu@zju.edu.cn (1):
crypto: ccree - fix runtime PM imbalance on error
周琰杰 (Zhou Yanjie) (2):
dt-bindings: RNG: Add Ingenic TRNG bindings.
hwrng: ingenic - Add hardware TRNG for Ingenic X1830
Documentation/crypto/userspace-if.rst | 20 +-
.../devicetree/bindings/rng/ingenic,trng.yaml | 43 +
.../bindings/rng/xiphera,xip8001b-trng.yaml | 33 +
.../devicetree/bindings/vendor-prefixes.yaml | 2 +
MAINTAINERS | 2 +
arch/arm/crypto/aes-neonbs-core.S | 54 +-
arch/arm/crypto/aes-neonbs-glue.c | 58 +-
arch/arm/crypto/curve25519-glue.c | 1 +
arch/arm/crypto/poly1305-glue.c | 1 +
arch/arm/crypto/sha256-armv4.pl | 4 +-
arch/arm/crypto/sha256-core.S_shipped | 4 +-
arch/arm/crypto/sha512-armv4.pl | 4 +-
arch/arm/crypto/sha512-core.S_shipped | 4 +-
arch/arm64/crypto/ghash-ce-glue.c | 4 +-
arch/arm64/crypto/sha1-ce-glue.c | 3 +
arch/arm64/crypto/sha2-ce-glue.c | 3 +
arch/powerpc/crypto/crc-vpmsum_test.c | 6 +-
arch/x86/crypto/blake2s-glue.c | 1 +
arch/x86/crypto/chacha_glue.c | 1 +
arch/x86/crypto/crc32c-intel_glue.c | 18 +-
arch/x86/crypto/curve25519-x86_64.c | 69 +-
arch/x86/crypto/nhpoly1305-avx2-glue.c | 1 +
arch/x86/crypto/nhpoly1305-sse2-glue.c | 1 +
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 8 +-
arch/x86/crypto/poly1305_glue.c | 4 +-
crypto/Kconfig | 40 +
crypto/Makefile | 8 +
crypto/af_alg.c | 14 +-
crypto/ahash.c | 54 +-
crypto/algif_aead.c | 9 +-
crypto/algif_rng.c | 175 ++-
crypto/algif_skcipher.c | 2 +-
crypto/arc4.c | 11 +
crypto/asymmetric_keys/public_key.c | 63 +
crypto/asymmetric_keys/x509_cert_parser.c | 27 +-
crypto/asymmetric_keys/x509_public_key.c | 3 +
crypto/cbc.c | 144 +-
crypto/crc32c_generic.c | 4 +-
crypto/crct10dif_generic.c | 2 +-
crypto/crypto_engine.c | 3 +-
crypto/ecrdsa.c | 1 +
crypto/internal.h | 16 +-
crypto/jitterentropy-kcapi.c | 2 +-
crypto/proc.c | 4 +-
crypto/rsa-pkcs1pad.c | 1 +
crypto/sm2.c | 481 +++++++
crypto/sm2signature.asn1 | 4 +
crypto/sm3_generic.c | 7 +-
crypto/tcrypt.c | 18 +-
crypto/tcrypt.h | 29 -
crypto/testmgr.c | 25 +-
crypto/testmgr.h | 59 +
crypto/xor.c | 69 +-
drivers/char/hw_random/Kconfig | 24 +
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/cctrng.c | 9 +-
drivers/char/hw_random/imx-rngc.c | 1 +
drivers/char/hw_random/ingenic-trng.c | 161 +++
drivers/char/hw_random/intel-rng.c | 2 +-
drivers/char/hw_random/iproc-rng200.c | 8 +-
drivers/char/hw_random/mxc-rnga.c | 6 +-
drivers/char/hw_random/npcm-rng.c | 14 +-
drivers/char/hw_random/optee-rng.c | 6 +-
drivers/char/hw_random/stm32-rng.c | 8 +-
drivers/char/hw_random/xiphera-trng.c | 150 ++
drivers/crypto/Kconfig | 1 +
drivers/crypto/allwinner/Kconfig | 43 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c | 17 +-
drivers/crypto/allwinner/sun8i-ce/Makefile | 3 +
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 131 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 405 +++++-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 413 ++++++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 164 +++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 127 ++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 139 +-
drivers/crypto/allwinner/sun8i-ss/Makefile | 2 +
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 16 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 229 ++-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 444 ++++++
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 173 +++
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 89 +-
drivers/crypto/amcc/crypto4xx_alg.c | 2 +-
drivers/crypto/amcc/crypto4xx_core.h | 1 +
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 12 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 16 +-
drivers/crypto/atmel-aes.c | 2 +-
drivers/crypto/atmel-tdes.c | 2 +-
drivers/crypto/bcm/cipher.c | 111 +-
drivers/crypto/bcm/cipher.h | 1 -
drivers/crypto/bcm/spu.c | 23 +-
drivers/crypto/bcm/spu.h | 1 -
drivers/crypto/bcm/spu2.c | 12 +-
drivers/crypto/bcm/spu2.h | 1 -
drivers/crypto/caam/Kconfig | 3 +
drivers/crypto/caam/Makefile | 2 +
drivers/crypto/caam/caamalg.c | 94 +-
drivers/crypto/caam/caamalg_desc.c | 28 +-
drivers/crypto/caam/caamalg_qi.c | 94 +-
drivers/crypto/caam/caamalg_qi2.c | 118 +-
drivers/crypto/caam/caamalg_qi2.h | 2 +
drivers/crypto/caam/ctrl.c | 88 +-
drivers/crypto/caam/debugfs.c | 96 ++
drivers/crypto/caam/debugfs.h | 26 +
drivers/crypto/caam/dpseci-debugfs.c | 23 +-
drivers/crypto/caam/intern.h | 17 -
drivers/crypto/caam/jr.c | 10 +-
drivers/crypto/caam/qi.c | 20 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 8 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 1 +
drivers/crypto/cavium/zip/zip_main.c | 44 +-
drivers/crypto/ccp/ccp-ops.c | 3 +-
drivers/crypto/ccree/cc_cipher.c | 282 +---
drivers/crypto/ccree/cc_crypto_ctx.h | 1 -
drivers/crypto/ccree/cc_driver.c | 7 +-
drivers/crypto/ccree/cc_driver.h | 1 -
drivers/crypto/ccree/cc_pm.c | 6 +-
drivers/crypto/chelsio/chcr_core.c | 2 +-
drivers/crypto/hifn_795x.c | 28 +-
drivers/crypto/hisilicon/hpre/hpre.h | 1 -
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 59 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 33 +-
drivers/crypto/hisilicon/qm.c | 237 ++-
drivers/crypto/hisilicon/qm.h | 31 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 51 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 39 +-
drivers/crypto/hisilicon/zip/zip.h | 15 -
drivers/crypto/hisilicon/zip/zip_crypto.c | 140 +-
drivers/crypto/hisilicon/zip/zip_main.c | 195 +--
drivers/crypto/img-hash.c | 1 +
drivers/crypto/inside-secure/safexcel.c | 44 +-
drivers/crypto/inside-secure/safexcel.h | 28 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 90 +-
drivers/crypto/inside-secure/safexcel_hash.c | 153 +-
drivers/crypto/inside-secure/safexcel_ring.c | 9 +-
drivers/crypto/ixp4xx_crypto.c | 2 +-
drivers/crypto/marvell/cesa/cesa.c | 4 +-
drivers/crypto/marvell/cesa/cesa.h | 20 +-
drivers/crypto/marvell/cesa/cipher.c | 5 +-
drivers/crypto/marvell/cesa/hash.c | 24 +-
drivers/crypto/marvell/cesa/tdma.c | 16 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 8 +-
drivers/crypto/mediatek/mtk-aes.c | 57 +-
drivers/crypto/mediatek/mtk-platform.c | 16 +-
drivers/crypto/mediatek/mtk-sha.c | 2 +-
drivers/crypto/n2_core.c | 60 +-
drivers/crypto/omap-sham.c | 189 ++-
drivers/crypto/padlock-aes.c | 1 +
drivers/crypto/picoxcell_crypto.c | 9 +-
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 19 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 17 +-
drivers/crypto/qat/qat_c62x/adf_drv.c | 19 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 17 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 6 -
drivers/crypto/qat/qat_common/adf_aer.c | 6 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 19 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 2 -
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 2 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 6 +-
.../crypto/qat/qat_common/adf_transport_debug.c | 42 +-
drivers/crypto/qat/qat_common/qat_algs.c | 10 +-
drivers/crypto/qat/qat_common/qat_hal.c | 7 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 9 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 19 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 17 +-
drivers/crypto/qce/core.c | 1 +
drivers/crypto/qce/sha.c | 1 +
drivers/crypto/qce/skcipher.c | 1 +
drivers/crypto/qcom-rng.c | 1 +
drivers/crypto/rockchip/rk3288_crypto.c | 1 +
drivers/crypto/rockchip/rk3288_crypto.h | 1 +
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 1 +
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 1 +
drivers/crypto/s5p-sss.c | 28 +-
drivers/crypto/sa2ul.c | 235 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/stm32/Kconfig | 1 +
drivers/crypto/stm32/stm32-crc32.c | 22 +-
drivers/crypto/stm32/stm32-cryp.c | 47 +-
drivers/crypto/stm32/stm32-hash.c | 16 +-
drivers/crypto/talitos.c | 8 +-
drivers/crypto/ux500/cryp/cryp_core.c | 28 +-
drivers/crypto/ux500/hash/hash_core.c | 31 +-
drivers/crypto/virtio/Kconfig | 1 -
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 1 +
drivers/net/wireless/intel/ipw2x00/Kconfig | 4 -
drivers/net/wireless/intersil/hostap/Kconfig | 4 -
drivers/staging/rtl8192e/Kconfig | 4 +-
drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 70 +-
drivers/staging/rtl8192e/rtllib_crypt_wep.c | 72 +-
drivers/staging/rtl8192u/Kconfig | 1 +
.../rtl8192u/ieee80211/ieee80211_crypt_tkip.c | 81 +-
.../rtl8192u/ieee80211/ieee80211_crypt_wep.c | 64 +-
include/crypto/algapi.h | 8 +-
include/crypto/cbc.h | 141 --
include/crypto/hash.h | 18 +-
include/crypto/if_alg.h | 1 +
include/crypto/internal/hash.h | 19 +-
include/crypto/public_key.h | 3 +
include/crypto/sm2.h | 25 +
include/crypto/sm3.h | 2 +
include/linux/mpi.h | 192 +++
include/linux/oid_registry.h | 6 +
include/linux/sunrpc/gss_krb5.h | 11 -
include/linux/sunrpc/gss_krb5_enctypes.h | 9 +-
include/uapi/linux/if_alg.h | 1 +
lib/crypto/chacha20poly1305.c | 4 +-
lib/mpi/Makefile | 6 +
lib/mpi/ec.c | 1509 ++++++++++++++++++++
lib/mpi/mpi-add.c | 155 ++
lib/mpi/mpi-bit.c | 251 ++++
lib/mpi/mpi-cmp.c | 46 +-
lib/mpi/mpi-div.c | 234 +++
lib/mpi/mpi-internal.h | 53 +
lib/mpi/mpi-inv.c | 143 ++
lib/mpi/mpi-mod.c | 155 ++
lib/mpi/mpi-mul.c | 91 ++
lib/mpi/mpicoder.c | 336 +++++
lib/mpi/mpih-div.c | 294 ++++
lib/mpi/mpih-mul.c | 25 +
lib/mpi/mpiutil.c | 204 +++
net/sunrpc/Kconfig | 1 -
net/sunrpc/auth_gss/gss_krb5_crypto.c | 276 ----
net/sunrpc/auth_gss/gss_krb5_mech.c | 95 --
net/sunrpc/auth_gss/gss_krb5_seal.c | 1 -
net/sunrpc/auth_gss/gss_krb5_seqnum.c | 87 --
net/sunrpc/auth_gss/gss_krb5_unseal.c | 1 -
net/sunrpc/auth_gss/gss_krb5_wrap.c | 65 +-
security/integrity/digsig_asymmetric.c | 14 +-
229 files changed, 9465 insertions(+), 3102 deletions(-)
create mode 100644 Documentation/devicetree/bindings/rng/ingenic,trng.yaml
create mode 100644 Documentation/devicetree/bindings/rng/xiphera,xip8001b-trng.yaml
create mode 100644 crypto/sm2.c
create mode 100644 crypto/sm2signature.asn1
create mode 100644 drivers/char/hw_random/ingenic-trng.c
create mode 100644 drivers/char/hw_random/xiphera-trng.c
create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c
create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c
create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c
create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c
create mode 100644 drivers/crypto/caam/debugfs.c
create mode 100644 drivers/crypto/caam/debugfs.h
delete mode 100644 include/crypto/cbc.h
create mode 100644 include/crypto/sm2.h
create mode 100644 lib/mpi/ec.c
create mode 100644 lib/mpi/mpi-add.c
create mode 100644 lib/mpi/mpi-div.c
create mode 100644 lib/mpi/mpi-inv.c
create mode 100644 lib/mpi/mpi-mod.c
create mode 100644 lib/mpi/mpi-mul.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.10
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
@ 2020-10-13 16:24 ` pr-tracker-bot
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2020-10-13 16:24 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 12 Oct 2020 14:32:49 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/39a5101f989e8d2be557136704d53990f9b402c8
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.11
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2020-10-13 16:24 ` pr-tracker-bot
@ 2020-12-14 5:55 ` Herbert Xu
2020-12-14 20:56 ` pr-tracker-bot
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2020-12-14 5:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Add speed testing on 1420-byte blocks for networking.
Algorithms:
- Improve performance of chacha on ARM for network packets.
- Improve performance of aegis128 on ARM for network packets.
Drivers:
- Add support for Keem Bay OCS AES/SM4.
- Add support for QAT 4xxx devices.
- Enable crypto-engine retry mechanism in caam.
- Enable support for crypto engine on sdm845 in qce.
- Add HiSilicon PRNG driver support.
Please note that there is a merge conflict in the MAINTAINERS
file with the drm tree due to the Keem Bay driver.
The following changes since commit 3650b228f83adda7e5ee532e2b90429c03f7b9ec:
Linux 5.10-rc1 (2020-10-25 15:14:11 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 linus
for you to fetch changes up to 93cebeb1c21a65b92636aaa278a32fbc0415ec67:
crypto: qat - add capability detection logic in qat_4xxx (2020-12-11 21:54:16 +1100)
----------------------------------------------------------------
Adam Guerin (2):
crypto: qat - remove cast for mailbox CSR
crypto: qat - replace pci with PCI in comments
Ahsan Atta (1):
crypto: qat - num_rings_per_bank is device dependent
Ard Biesheuvel (14):
crypto: arm64/poly1305-neon - reorder PAC authentication with SP update
crypto: arm/chacha-neon - optimize for non-block size multiples
crypto: arm64/chacha - simplify tail block handling
crypto: arm64/gcm - move authentication tag check to SIMD domain
crypto: aegis128 - wipe plaintext and tag if decryption fails
crypto: aegis128/neon - optimize tail block handling
crypto: aegis128/neon - move final tag check to SIMD domain
crypto: aegis128 - expose SIMD code path as separate driver
crypto: tcrypt - don't initialize at subsys_initcall time
crypto: tcrypt - permit tcrypt.ko to be builtin
crypto: tcrypt - include 1420 byte blocks in aead and skcipher benchmarks
crypto: ecdh - avoid unaligned accesses in ecdh_set_secret()
crypto: arm/aes-ce - work around Cortex-A57/A72 silion errata
crypto: aegis128 - avoid spurious references crypto_aegis128_update_simd
Arnd Bergmann (1):
crypto: atmel-i2c - select CONFIG_BITREVERSE
Arvind Sankar (6):
crypto: lib/sha256 - Use memzero_explicit() for clearing state
crypto: hash - Use memzero_explicit() for clearing state
crypto: lib/sha256 - Don't clear temporary variables
crypto: lib/sha256 - Clear W[] in sha256_update() instead of sha256_transform()
crypto: lib/sha256 - Unroll SHA256 loop 8 times intead of 64
crypto: lib/sha256 - Unroll LOAD and BLEND loops
Christophe JAILLET (3):
crypto: cavium/zip - Use dma_set_mask_and_coherent to simplify code
crypto: marvell/octeontx - Use dma_set_mask_and_coherent to simplify code
crypto: cavium - Use dma_set_mask_and_coherent to simplify code
Christophe Leroy (2):
crypto: talitos - Endianess in current_desc_hdr()
crypto: talitos - Fix return type of current_desc_hdr()
Colin Ian King (2):
crypto: inside-secure - Fix sizeof() mismatch
crypto: kconfig - fix a couple of spelling mistakes
Corentin Labbe (1):
crypto: sun8i-ce - fix two error path's memory leak
Daniele Alessandrelli (1):
dt-bindings: Add Keem Bay OCS AES bindings
Eric Biggers (8):
crypto: x86/aes - remove unused file aes_glue.c
crypto: aead - add crypto_aead_driver_name()
crypto: testmgr - always print the actual hash driver name
crypto: testmgr - always print the actual AEAD driver name
crypto: testmgr - always print the actual skcipher driver name
crypto: testmgr - WARN on test failure
crypto: af_alg - avoid undefined behavior accessing salg_name
crypto: sha - split sha.h into sha1.h and sha2.h
Gilad Ben-Yossef (1):
crypto: ccree - rework cache parameters handling
Giovanni Cabiddu (33):
crypto: qat - remove unused function
crypto: qat - mask device capabilities with soft straps
crypto: qat - fix configuration of iov threads
crypto: qat - split transport CSR access logic
crypto: qat - relocate GEN2 CSR access code
crypto: qat - abstract admin interface
crypto: qat - add packed to init admin structures
crypto: qat - rename ME in AE
crypto: qat - change admin sequence
crypto: qat - use admin mask to send fw constants
crypto: qat - update constants table
crypto: qat - remove writes into WQCFG
crypto: qat - remove unused macros in arbiter module
crypto: qat - abstract arbiter access
crypto: qat - register crypto instances based on capability
crypto: qat - enable ring after pair is programmed
crypto: qat - abstract build ring base
crypto: qat - replace constant masks with GENMASK
crypto: qat - use BIT_ULL() - 1 pattern for masks
crypto: qat - abstract writes to arbiter enable
crypto: qat - remove hardcoded bank irq clear flag mask
crypto: qat - call functions in adf_sriov if available
crypto: qat - remove unnecessary void* casts
crypto: qat - change return value in adf_cfg_add_key_value_param()
crypto: qat - change return value in adf_cfg_key_val_get()
crypto: qat - refactor qat_crypto_create_instances()
crypto: qat - refactor qat_crypto_dev_config()
crypto: qat - allow for instances in different banks
crypto: qat - extend ae_mask
crypto: qat - support for mof format in fw loader
crypto: qat - target fw images to specific AEs
crypto: qat - add hook to initialize vector routing table
crypto: qat - add qat_4xxx driver
Gustavo A. R. Silva (1):
crypto: ccree - Fix fall-through warnings for Clang
Herbert Xu (10):
lib/mpi: Remove unused scalar_copied
crypto: sa2ul - Reduce stack usage
crypto: cavium/nitrox - Fix sparse warnings
crypto: lib/curve25519 - Move selftest prototype into header file
crypto: mips/octeon - Fix sparse endianness warnings
crypto: powerpc/sha256-spe - Fix sparse endianness warning
crypto: sparc - Fix sparse endianness warnings
crypto: lib/blake2s - Move selftest prototype into header file
hwrng: ks-sa - Add dependency on IOMEM and OF
crypto: cpt - Fix sparse warnings in cptpf
Horia Geantă (3):
crypto: arm/aes-neonbs - fix usage of cbc(aes) fallback
crypto: caam - fix printing on xts fallback allocation error path
crypto: caam/qi - simplify error path for context allocation
Iuliana Prodan (1):
crypto: caam - enable crypto-engine retry mechanism
Jack Xu (31):
crypto: qat - fix status check in qat_hal_put_rel_rd_xfer()
crypto: qat - fix CSR access
crypto: qat - fix error message
crypto: qat - remove unnecessary parenthesis
crypto: qat - introduce additional parenthesis
crypto: qat - rename qat_uclo_del_uof_obj()
crypto: qat - add support for relative FW ucode loading
crypto: qat - change type for ctx_mask
crypto: qat - change micro word data mask
crypto: qat - refactor AE start
crypto: qat - remove global CSRs helpers
crypto: qat - move defines to header files
crypto: qat - refactor qat_uclo_set_ae_mode()
crypto: qat - refactor long expressions
crypto: qat - introduce chip info structure
crypto: qat - replace check based on DID
crypto: qat - add next neighbor to chip_info
crypto: qat - add support for lm2 and lm3
crypto: qat - add local memory size to chip info
crypto: qat - add reset CSR and mask to chip info
crypto: qat - add clock enable CSR to chip info
crypto: qat - add wake up event to chip info
crypto: qat - add misc control CSR to chip info
crypto: qat - add check for null pointer
crypto: qat - use ae_mask
crypto: qat - add CSS3K support
crypto: qat - add FCU CSRs to chip info
crypto: qat - allow to target specific AEs
crypto: qat - add support for shared ustore
crypto: qat - add support for broadcasting mode
crypto: qat - add gen4 firmware loader
Jason A. Donenfeld (1):
crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager
Kai Ye (1):
crypto: hisilicon/sec2 - Fix aead authentication setting key error
Longfang Liu (2):
crypto: hisilicon - delete unused structure member variables
crypto: hisilicon - fixes some coding style
Marco Chiappero (5):
crypto: qat - update IV in software
crypto: qat - add support for capability detection
crypto: qat - add AES-CTR support for QAT GEN4 devices
crypto: qat - add AES-XTS support for QAT GEN4 devices
crypto: qat - add capability detection logic in qat_4xxx
Mike Healy (1):
crypto: keembay - Add support for Keem Bay OCS AES/SM4
Nathan Chancellor (1):
crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd
Nigel Christian (1):
hwrng: imx-rngc - irq already prints an error
Shiju Jose (1):
crypto: hisilicon - Fix doc warnings in sgl.c and qm.c
Thara Gopinath (2):
crypto: qce - Enable support for crypto engine on sdm845
crypto: qce - Fix SHA result buffer corruption issues
Tianjia Zhang (1):
crypto: sm2 - remove unnecessary reset operations
Tom Rix (4):
crypto: atmel-sha - remove unneeded break
crypto: cavium/nitrox - remove unneeded semicolon
crypto: qat - remove unneeded semicolon
crypto: seed - remove trailing semicolon in macro definition
Uros Bizjak (3):
crypto: aesni - Use TEST %reg,%reg instead of CMP $0,%reg
crypto: x86/sha512 - Use TEST %reg,%reg instead of CMP $0,%reg
crypto: x86/poly1305 - Use TEST %reg,%reg instead of CMP $0,%reg
Weili Qian (12):
crypto: hisilicon/qm - numbers are replaced by macros
crypto: hisilicon/qm - modify the return type of function
crypto: hisilicon/qm - modify the return type of debugfs interface
crypto: hisilicon/qm - modify return type of 'qm_set_sqctype'
crypto: hisilicon/qm - replace 'sprintf' with 'scnprintf'
crypto: hisilicon/qm - split 'qm_qp_ctx_cfg' into smaller pieces
crypto: hisilicon/qm - split 'qm_eq_ctx_cfg' into smaller pieces
crypto: hisilicon/qm - split 'hisi_qm_init' into smaller pieces
hwrng: hisi - remove HiSilicon TRNG driver
crypto: hisilicon/trng - add HiSilicon TRNG driver support
crypto: hisilicon/trng - add support for PRNG
MAINTAINERS: Move HiSilicon TRNG V2 driver
Yang Shen (1):
crypto: hisilicon/zip - add a work_queue for zip irq
Yejune Deng (1):
crypto: hisilicon/trng - replace atomic_add_return()
Zhang Qilong (2):
crypto: omap-aes - fix the reference count leak of omap device
crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
kernel test robot (1):
crypto: qat - fix excluded_middle.cocci warnings
.../bindings/crypto/intel,keembay-ocs-aes.yaml | 45 +
MAINTAINERS | 12 +-
arch/arm/crypto/aes-ce-core.S | 32 +-
arch/arm/crypto/aes-neonbs-glue.c | 8 +-
arch/arm/crypto/chacha-glue.c | 34 +-
arch/arm/crypto/chacha-neon-core.S | 97 +-
arch/arm/crypto/sha1-ce-glue.c | 2 +-
arch/arm/crypto/sha1.h | 2 +-
arch/arm/crypto/sha1_glue.c | 2 +-
arch/arm/crypto/sha1_neon_glue.c | 2 +-
arch/arm/crypto/sha2-ce-glue.c | 2 +-
arch/arm/crypto/sha256_glue.c | 2 +-
arch/arm/crypto/sha256_neon_glue.c | 2 +-
arch/arm/crypto/sha512-glue.c | 2 +-
arch/arm/crypto/sha512-neon-glue.c | 2 +-
arch/arm64/configs/defconfig | 1 +
arch/arm64/crypto/aes-glue.c | 2 +-
arch/arm64/crypto/chacha-neon-core.S | 193 +--
arch/arm64/crypto/ghash-ce-core.S | 15 +
arch/arm64/crypto/ghash-ce-glue.c | 48 +-
arch/arm64/crypto/poly1305-armv8.pl | 2 +-
arch/arm64/crypto/poly1305-core.S_shipped | 2 +-
arch/arm64/crypto/poly1305-glue.c | 2 +-
arch/arm64/crypto/sha1-ce-glue.c | 2 +-
arch/arm64/crypto/sha2-ce-glue.c | 2 +-
arch/arm64/crypto/sha256-glue.c | 2 +-
arch/arm64/crypto/sha3-ce-glue.c | 2 +-
arch/arm64/crypto/sha512-ce-glue.c | 2 +-
arch/arm64/crypto/sha512-glue.c | 2 +-
arch/mips/cavium-octeon/crypto/octeon-crypto.h | 2 +-
arch/mips/cavium-octeon/crypto/octeon-md5.c | 14 +-
arch/mips/cavium-octeon/crypto/octeon-sha1.c | 2 +-
arch/mips/cavium-octeon/crypto/octeon-sha256.c | 2 +-
arch/mips/cavium-octeon/crypto/octeon-sha512.c | 2 +-
arch/powerpc/crypto/sha1-spe-glue.c | 2 +-
arch/powerpc/crypto/sha1.c | 2 +-
arch/powerpc/crypto/sha256-spe-glue.c | 4 +-
arch/s390/crypto/sha.h | 3 +-
arch/s390/crypto/sha1_s390.c | 2 +-
arch/s390/crypto/sha256_s390.c | 2 +-
arch/s390/crypto/sha3_256_s390.c | 1 -
arch/s390/crypto/sha3_512_s390.c | 1 -
arch/s390/crypto/sha512_s390.c | 2 +-
arch/s390/purgatory/purgatory.c | 2 +-
arch/sparc/crypto/crc32c_glue.c | 2 +-
arch/sparc/crypto/md5_glue.c | 9 +-
arch/sparc/crypto/sha1_glue.c | 2 +-
arch/sparc/crypto/sha256_glue.c | 2 +-
arch/sparc/crypto/sha512_glue.c | 2 +-
arch/x86/crypto/aes_glue.c | 1 -
arch/x86/crypto/aesni-intel_asm.S | 20 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 20 +-
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 2 +-
arch/x86/crypto/poly1305_glue.c | 2 +-
arch/x86/crypto/sha1_ssse3_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 2 +-
arch/x86/crypto/sha512-avx-asm.S | 2 +-
arch/x86/crypto/sha512-ssse3-asm.S | 2 +-
arch/x86/crypto/sha512_ssse3_glue.c | 2 +-
arch/x86/purgatory/purgatory.c | 2 +-
crypto/Kconfig | 4 +-
crypto/aegis128-core.c | 245 ++-
crypto/aegis128-neon-inner.c | 122 +-
crypto/aegis128-neon.c | 21 +-
crypto/af_alg.c | 10 +-
crypto/asymmetric_keys/asym_tpm.c | 2 +-
crypto/ecdh.c | 9 +-
crypto/seed.c | 2 +-
crypto/sha1_generic.c | 2 +-
crypto/sha256_generic.c | 2 +-
crypto/sha512_generic.c | 2 +-
crypto/sm2.c | 75 +-
crypto/tcrypt.c | 83 +-
crypto/testmgr.c | 141 +-
drivers/char/hw_random/Kconfig | 14 +-
drivers/char/hw_random/Makefile | 1 -
drivers/char/hw_random/hisi-trng-v2.c | 99 --
drivers/char/hw_random/imx-rngc.c | 4 +-
drivers/char/random.c | 2 +-
drivers/crypto/Kconfig | 5 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/allwinner/Kconfig | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 23 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 3 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 3 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 3 +-
drivers/crypto/amcc/crypto4xx_alg.c | 2 +-
drivers/crypto/amcc/crypto4xx_core.c | 4 +-
drivers/crypto/atmel-authenc.h | 3 +-
drivers/crypto/atmel-sha.c | 4 +-
drivers/crypto/axis/artpec6_crypto.c | 3 +-
drivers/crypto/bcm/cipher.c | 3 +-
drivers/crypto/bcm/cipher.h | 3 +-
drivers/crypto/bcm/spu.h | 3 +-
drivers/crypto/caam/caamalg.c | 4 +-
drivers/crypto/caam/caamalg_qi.c | 12 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +-
drivers/crypto/caam/compat.h | 3 +-
drivers/crypto/caam/intern.h | 8 +
drivers/crypto/caam/jr.c | 4 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 16 +-
drivers/crypto/cavium/cpt/cptvf_main.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 11 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_hal.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_isr.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_isr.h | 9 +
drivers/crypto/cavium/nitrox/nitrox_main.c | 13 -
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_req.h | 4 +
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 7 +-
drivers/crypto/cavium/zip/zip_main.c | 10 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 3 +-
drivers/crypto/ccp/ccp-crypto.h | 3 +-
drivers/crypto/ccree/cc_cipher.c | 3 +
drivers/crypto/ccree/cc_driver.c | 75 +-
drivers/crypto/ccree/cc_driver.h | 9 +-
drivers/crypto/ccree/cc_pm.c | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 3 +-
drivers/crypto/hisilicon/Kconfig | 8 +
drivers/crypto/hisilicon/Makefile | 1 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 4 +-
drivers/crypto/hisilicon/qm.c | 220 ++-
drivers/crypto/hisilicon/qm.h | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 2 -
drivers/crypto/hisilicon/sec2/sec_crypto.c | 25 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 34 +-
drivers/crypto/hisilicon/sgl.c | 2 -
drivers/crypto/hisilicon/trng/Makefile | 2 +
drivers/crypto/hisilicon/trng/trng.c | 334 ++++
drivers/crypto/hisilicon/zip/zip_main.c | 30 +-
drivers/crypto/img-hash.c | 3 +-
drivers/crypto/inside-secure/safexcel.c | 2 +-
drivers/crypto/inside-secure/safexcel.h | 3 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 3 +-
drivers/crypto/inside-secure/safexcel_hash.c | 3 +-
drivers/crypto/ixp4xx_crypto.c | 2 +-
drivers/crypto/keembay/Kconfig | 39 +
drivers/crypto/keembay/Makefile | 5 +
drivers/crypto/keembay/keembay-ocs-aes-core.c | 1713 ++++++++++++++++++++
drivers/crypto/keembay/ocs-aes.c | 1489 +++++++++++++++++
drivers/crypto/keembay/ocs-aes.h | 129 ++
drivers/crypto/marvell/cesa/hash.c | 3 +-
drivers/crypto/marvell/octeontx/otx_cptpf_main.c | 10 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 3 +-
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 10 +-
drivers/crypto/mediatek/mtk-sha.c | 3 +-
drivers/crypto/mxs-dcp.c | 3 +-
drivers/crypto/n2_core.c | 3 +-
drivers/crypto/nx/nx-sha256.c | 2 +-
drivers/crypto/nx/nx-sha512.c | 2 +-
drivers/crypto/nx/nx.c | 2 +-
drivers/crypto/omap-aes.c | 4 +-
drivers/crypto/omap-sham.c | 3 +-
drivers/crypto/padlock-sha.c | 3 +-
drivers/crypto/picoxcell_crypto.c | 3 +-
drivers/crypto/qat/Kconfig | 11 +
drivers/crypto/qat/Makefile | 1 +
drivers/crypto/qat/qat_4xxx/Makefile | 4 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 242 +++
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 86 +
drivers/crypto/qat/qat_4xxx/adf_drv.c | 323 ++++
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 49 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 5 +
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 11 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 7 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 49 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 5 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 11 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 7 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_common/Makefile | 2 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 65 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 69 +-
drivers/crypto/qat/qat_common/adf_admin.c | 77 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 4 +-
drivers/crypto/qat/qat_common/adf_cfg_common.h | 3 +-
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 3 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 19 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 11 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 181 +++
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 123 ++
drivers/crypto/qat/qat_common/adf_gen4_hw_data.c | 101 ++
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 99 ++
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 94 +-
drivers/crypto/qat/qat_common/adf_isr.c | 7 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 78 +-
drivers/crypto/qat/qat_common/adf_transport.c | 130 +-
.../qat/qat_common/adf_transport_access_macros.h | 67 -
.../crypto/qat/qat_common/adf_transport_debug.c | 32 +-
.../crypto/qat/qat_common/adf_transport_internal.h | 2 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 5 +-
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 6 +-
drivers/crypto/qat/qat_common/icp_qat_fw_la.h | 7 +
.../qat/qat_common/icp_qat_fw_loader_handle.h | 26 +-
drivers/crypto/qat/qat_common/icp_qat_hal.h | 63 +-
drivers/crypto/qat/qat_common/icp_qat_hw.h | 40 +-
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 132 +-
drivers/crypto/qat/qat_common/qat_algs.c | 248 ++-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 13 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 162 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 26 +-
drivers/crypto/qat/qat_common/qat_hal.c | 421 +++--
drivers/crypto/qat/qat_common/qat_uclo.c | 737 +++++++--
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 60 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 5 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 9 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 7 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 4 +-
drivers/crypto/qce/common.c | 3 +-
drivers/crypto/qce/core.c | 18 +-
drivers/crypto/qce/sha.c | 2 +-
drivers/crypto/qce/sha.h | 3 +-
drivers/crypto/rockchip/rk3288_crypto.h | 3 +-
drivers/crypto/s5p-sss.c | 3 +-
drivers/crypto/sa2ul.c | 121 +-
drivers/crypto/sa2ul.h | 7 +-
drivers/crypto/sahara.c | 3 +-
drivers/crypto/stm32/stm32-hash.c | 3 +-
drivers/crypto/talitos.c | 13 +-
drivers/crypto/ux500/hash/hash_core.c | 3 +-
drivers/firmware/efi/embedded-firmware.c | 2 +-
.../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c | 3 +-
.../ethernet/chelsio/inline_crypto/chtls/chtls.h | 3 +-
drivers/nfc/s3fwrn5/firmware.c | 2 +-
drivers/tee/tee_core.c | 2 +-
fs/crypto/fname.c | 2 +-
fs/crypto/hkdf.c | 2 +-
fs/ubifs/auth.c | 1 -
fs/verity/fsverity_private.h | 2 +-
include/crypto/aead.h | 5 +
include/crypto/curve25519.h | 2 +
include/crypto/hash_info.h | 3 +-
include/crypto/internal/blake2s.h | 2 +
include/crypto/sha1.h | 46 +
include/crypto/sha1_base.h | 5 +-
include/crypto/{sha.h => sha2.h} | 41 +-
include/crypto/sha256_base.h | 5 +-
include/crypto/sha512_base.h | 5 +-
include/crypto/sm3_base.h | 3 +-
include/linux/ccp.h | 3 +-
include/linux/filter.h | 2 +-
include/linux/purgatory.h | 2 +-
include/uapi/linux/if_alg.h | 16 +
kernel/crash_core.c | 2 +-
kernel/kexec_core.c | 1 -
kernel/kexec_file.c | 2 +-
lib/crypto/blake2s-selftest.c | 2 +-
lib/crypto/blake2s.c | 2 -
lib/crypto/curve25519.c | 2 -
lib/crypto/sha256.c | 214 +--
lib/digsig.c | 2 +-
lib/mpi/ec.c | 3 -
lib/sha1.c | 2 +-
net/ipv6/seg6_hmac.c | 1 -
net/mptcp/crypto.c | 2 +-
net/mptcp/options.c | 2 +-
net/mptcp/subflow.c | 2 +-
security/integrity/integrity.h | 2 +-
security/keys/encrypted-keys/encrypted.c | 2 +-
security/keys/trusted-keys/trusted_tpm1.c | 2 +-
sound/soc/codecs/cros_ec_codec.c | 2 +-
264 files changed, 8427 insertions(+), 1992 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml
delete mode 100644 arch/x86/crypto/aes_glue.c
delete mode 100644 drivers/char/hw_random/hisi-trng-v2.c
create mode 100644 drivers/crypto/hisilicon/trng/Makefile
create mode 100644 drivers/crypto/hisilicon/trng/trng.c
create mode 100644 drivers/crypto/keembay/Kconfig
create mode 100644 drivers/crypto/keembay/Makefile
create mode 100644 drivers/crypto/keembay/keembay-ocs-aes-core.c
create mode 100644 drivers/crypto/keembay/ocs-aes.c
create mode 100644 drivers/crypto/keembay/ocs-aes.h
create mode 100644 drivers/crypto/qat/qat_4xxx/Makefile
create mode 100644 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c
create mode 100644 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h
create mode 100644 drivers/crypto/qat/qat_4xxx/adf_drv.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_hw_data.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h
create mode 100644 include/crypto/sha1.h
rename include/crypto/{sha.h => sha2.h} (77%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.11
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
@ 2020-12-14 20:56 ` pr-tracker-bot
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2020-12-14 20:56 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 14 Dec 2020 16:55:16 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/9e4b0d55d84a66dbfede56890501dc96e696059c
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.12
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2020-12-14 20:56 ` pr-tracker-bot
@ 2021-02-15 2:47 ` Herbert Xu
2021-02-22 1:28 ` pr-tracker-bot
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-02-15 2:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Restrict crypto_cipher to internal API users only.
Algorithms:
- Add x86 aesni acceleration for cts.
- Improve x86 aesni acceleration for xts.
- Remove x86 acceleration of some uncommon algorithms.
- Remove RIPE-MD, Tiger and Salsa20.
- Remove tnepres.
- Add ARM acceleration for BLAKE2s and BLAKE2b.
Drivers:
- Add Keem Bay OCS HCU driver.
- Add Marvell OcteonTX2 CPT PF driver.
- Remove PicoXcell driver.
- Remove mediatek driver.
The following changes since commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:
crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0de9dc80625b0ca1cb9730c5ed1c5a8cab538369:
hwrng: timeriomem - Use device-managed registration API (2021-02-10 17:56:01 +1100)
----------------------------------------------------------------
Adam Guerin (3):
crypto: qat - fix potential spectre issue
crypto: qat - change format string and cast ring size
crypto: qat - reduce size of mapped region
Ard Biesheuvel (60):
crypto: aesni - implement support for cts(cbc(aes))
crypto: tcrypt - avoid signed overflow in byte count
chcr_ktls: use AES library for single use cipher
crypto: remove cipher routines from public crypto API
crypto: arm64/aes-ce - really hide slower algos when faster ones are enabled
crypto: arm64/aes-ctr - improve tail handling
crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
crypto: aesni - prevent misaligned buffers on the stack
crypto: aesni - drop unused asm prototypes
crypto: aesni - clean up mapping of associated data
crypto: aesni - refactor scatterlist processing
crypto: aesni - replace function pointers with static branches
crypto: x86/camellia - switch to XTS template
crypto: x86/cast6 - switch to XTS template
crypto: x86/serpent- switch to XTS template
crypto: x86/twofish - switch to XTS template
crypto: x86/glue-helper - drop XTS helper routines
crypto: x86/camellia - drop CTR mode implementation
crypto: x86/serpent - drop CTR mode implementation
crypto: x86/cast5 - drop CTR mode implementation
crypto: x86/cast6 - drop CTR mode implementation
crypto: x86/twofish - drop CTR mode implementation
crypto: x86/glue-helper - drop CTR helper routines
crypto: x86/des - drop CTR mode implementation
crypto: x86/blowfish - drop CTR mode implementation
crypto: x86 - add some helper macros for ECB and CBC modes
crypto: x86/camellia - drop dependency on glue helper
crypto: x86/serpent - drop dependency on glue helper
crypto: x86/cast5 - drop dependency on glue helper
crypto: x86/cast6 - drop dependency on glue helper
crypto: x86/twofish - drop dependency on glue helper
crypto: x86 - remove glue helper module
crypto: x86 - use local headers for x86 specific shared declarations
crypto - shash: reduce minimum alignment of shash_desc structure
crypto: arm64/sha - add missing module aliases
crypto: aesni - replace CTR function pointer with static call
crypto: aesni - release FPU during skcipher walk API calls
crypto: rmd128 - remove RIPE-MD 128 hash algorithm
crypto: rmd256 - remove RIPE-MD 256 hash algorithm
crypto: rmd320 - remove RIPE-MD 320 hash algorithm
crypto: tgr192 - remove Tiger 128/160/192 hash algorithms
crypto: salsa20 - remove Salsa20 stream cipher algorithm
arm64: assembler: add cond_yield macro
crypto: michael_mic - fix broken misalignment handling
crypto: serpent - get rid of obsolete tnepres variant
crypto: serpent - use unaligned accessors instead of alignmask
crypto: blowfish - use unaligned accessors instead of alignmask
crypto: camellia - use unaligned accessors instead of alignmask
crypto: cast5 - use unaligned accessors instead of alignmask
crypto: cast6 - use unaligned accessors instead of alignmask
crypto: fcrypt - drop unneeded alignmask
crypto: twofish - use unaligned accessors instead of alignmask
crypto: arm64/sha1-ce - simplify NEON yield
crypto: arm64/sha2-ce - simplify NEON yield
crypto: arm64/sha3-ce - simplify NEON yield
crypto: arm64/sha512-ce - simplify NEON yield
crypto: arm64/aes-neonbs - remove NEON yield calls
crypto: arm64/aes-ce-mac - simplify NEON yield
crypto: arm64/crc-t10dif - move NEON yield to C code
Arnd Bergmann (1):
crypto: octeontx2 - fix -Wpointer-bool-conversion warning
Bhaskar Chowdhury (2):
crypto: marvell/cesa - Fix a spelling s/fautly/faultly/ in comment
crypto: xor - Fix typo of optimization
Christophe JAILLET (1):
hwrng: ingenic - Fix a resource leak in an error handling path
Christophe Leroy (2):
crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
crypto: talitos - Fix ctr(aes) on SEC1
Corentin Labbe (8):
crypto: sun4i-ss - linearize buffers content must be kept
crypto: sun4i-ss - checking sg length is not sufficient
crypto: sun4i-ss - IV register does not work on A10 and A13
crypto: sun4i-ss - handle BigEndian for cipher
crypto: sun4i-ss - initialize need_fallback
crypto: sun4i-ss - fix kmap usage
crypto: sun4i-ss - enabled stats via debugfs
crypto: sun4i-ss - add SPDX header and remove blank lines
Dan Carpenter (2):
crypto: keembay-ocs-hcu - Fix a WARN() message
crypto: octeontx2 - fix signedness bug in cptvf_register_interrupts()
Daniele Alessandrelli (6):
crypto: keembay-ocs-hcu - Add HMAC support
crypto: keembay-ocs-hcu - Add optional support for sha224
MAINTAINERS: Add maintainers for Keem Bay OCS HCU driver
crypto: keembay-ocs-hcu - Add dependency on HAS_IOMEM and ARCH_KEEMBAY
crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key()
crypto: keembay-ocs-aes - Fix 'q' assignment during CCM B0 generation
Declan Murphy (2):
dt-bindings: crypto: Add Keem Bay OCS HCU bindings
crypto: keembay - Add Keem Bay OCS HCU driver
Eric Biggers (14):
crypto: blake2s - define shash_alg structs using macros
crypto: x86/blake2s - define shash_alg structs using macros
crypto: blake2s - remove unneeded includes
crypto: blake2s - move update and final logic to internal/blake2s.h
crypto: blake2s - share the "shash" API boilerplate code
crypto: blake2s - optimize blake2s initialization
crypto: blake2s - add comment for blake2s_state fields
crypto: blake2s - adjust include guard naming
crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
crypto: arm/blake2s - add ARM scalar optimized BLAKE2s
wireguard: Kconfig: select CRYPTO_BLAKE2S_ARM
crypto: blake2b - sync with blake2s implementation
crypto: blake2b - update file comment
crypto: arm/blake2b - add NEON-accelerated BLAKE2b
Fabio Estevam (1):
crypto: sahara - Remove unused .id_table support
Florian Fainelli (1):
crypto: crypto4xx - Avoid linking failure with HW_RANDOM=m
Geert Uytterhoeven (1):
crypto: marvell - CRYPTO_DEV_OCTEONTX2_CPT should depend on ARCH_THUNDER2
Herbert Xu (6):
crypto: vmx - Move extern declarations into header file
crypto: stm32 - Fix last sparse warning in stm32_cryp_check_ctr_counter
crypto: bcm - Fix sparse warnings
crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
Merge git://git.kernel.org/.../arm64/linux for-next/crypto
Hui Tang (6):
crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
crypto: hisilicon/hpre - add two RAS correctable errors processing
crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
crypto: hisilicon/hpre - adapt the number of clusters
crypto: hisilicon/hpre - tiny fix
crypto: hisilicon/hpre - enable Elliptic curve cryptography
Jan Henrik Weinstock (1):
hwrng: timeriomem - Fix cooldown period calculation
Jason A. Donenfeld (1):
crypto: lib/chacha20poly1305 - define empty module exit function
Jiapeng Chong (1):
crypto: caam - Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
Jiri Olsa (1):
crypto: bcm - Rename struct device_private to bcm_device_private
Kai Ye (4):
crypto: hisilicon/qm - SVA bugfixed on Kunpeng920
crypto: hisilicon - add ZIP device using mode parameter
crypto: hisilicon/hpre - register HPRE device to uacce
crypto: hisilicon/sec - register SEC device to uacce
Krzysztof Kozlowski (1):
MAINTAINERS: crypto: s5p-sss: drop Kamil Konieczny
Marco Chiappero (1):
crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
Matthias Brugger (2):
hwrng: iproc-rng200 - Fix disable of the block.
hwrng: iproc-rng200 - Move enable/disable in separate function
Ovidiu Panait (1):
crypto: keembay - use 64-bit arithmetic for computing bit_len
Rob Herring (1):
crypto: picoxcell - Remove PicoXcell driver
Sihang Chen (1):
crypto: hisilicon/qm - update irqflag
Srujana Challa (9):
crypto: marvell - add Marvell OcteonTX2 CPT PF driver
crypto: octeontx2 - add mailbox communication with AF
crypto: octeontx2 - enable SR-IOV and mailbox communication with VF
crypto: octeontx2 - load microcode and create engine groups
crypto: octeontx2 - add LF framework
crypto: octeontx2 - add support to get engine capabilities
crypto: octeontx2 - add virtual function driver support
crypto: octeontx2 - add support to process the crypto request
crypto: octeontx2 - register with linux crypto framework
Tian Tao (4):
crypto: ccree - remove unused including <linux/version.h>
crypto: inside-secure - fix platform_get_irq.cocci warnings
hwrng: optee - Use device-managed registration API
hwrng: timeriomem - Use device-managed registration API
Vic Wu (1):
crypto: mediatek - remove obsolete driver
Weili Qian (7):
crypto: hisilicon/qm - fix use of 'dma_map_single'
crypto: hisilicon - PASID fixed on Kunpeng 930
crypto: hisilicon/qm - removing driver after reset
crypto: hisilicon/qm - fix request missing error
crypto: hisilicon/qm - fix the value of 'QM_SQC_VFT_BASE_MASK_V2'
crypto: hisilicon/qm - do not reset hardware when CE happens
crypto: hisilicon/qm - fix printing format issue
Wojciech Ziemba (1):
crypto: qat - configure arbiter mapping based on engines enabled
Xu Wang (1):
crypto: cpt - remove casting dma_alloc_coherent
Yang Li (1):
crypto: powerpc/sha256 - remove unneeded semicolon
dingsenjie (1):
crypto: ccree - fix spelling typo of allocated
.mailmap | 1 -
.../admin-guide/device-mapper/dm-integrity.rst | 4 +-
Documentation/crypto/api-skcipher.rst | 4 +-
.../bindings/crypto/intel,keembay-ocs-hcu.yaml | 46 +
.../bindings/crypto/samsung-slimsss.yaml | 1 -
.../devicetree/bindings/crypto/samsung-sss.yaml | 1 -
MAINTAINERS | 12 +-
arch/arm/crypto/Kconfig | 19 +
arch/arm/crypto/Makefile | 4 +
arch/arm/crypto/aes-neonbs-glue.c | 3 +
arch/arm/crypto/blake2b-neon-core.S | 347 ++++
arch/arm/crypto/blake2b-neon-glue.c | 105 ++
arch/arm/crypto/blake2s-core.S | 285 +++
arch/arm/crypto/blake2s-glue.c | 78 +
arch/arm64/crypto/aes-glue.c | 71 +-
arch/arm64/crypto/aes-modes.S | 217 ++-
arch/arm64/crypto/aes-neonbs-core.S | 8 +-
arch/arm64/crypto/crct10dif-ce-core.S | 43 +-
arch/arm64/crypto/crct10dif-ce-glue.c | 30 +-
arch/arm64/crypto/sha1-ce-core.S | 47 +-
arch/arm64/crypto/sha1-ce-glue.c | 23 +-
arch/arm64/crypto/sha2-ce-core.S | 38 +-
arch/arm64/crypto/sha2-ce-glue.c | 24 +-
arch/arm64/crypto/sha3-ce-core.S | 81 +-
arch/arm64/crypto/sha3-ce-glue.c | 18 +-
arch/arm64/crypto/sha512-ce-core.S | 29 +-
arch/arm64/crypto/sha512-ce-glue.c | 55 +-
arch/arm64/include/asm/assembler.h | 16 +
arch/powerpc/crypto/sha256-spe-glue.c | 2 +-
arch/s390/crypto/aes_s390.c | 2 +
arch/x86/crypto/Makefile | 2 -
arch/x86/crypto/aesni-intel_asm.S | 482 +++++-
arch/x86/crypto/aesni-intel_glue.c | 753 ++++----
arch/x86/crypto/blake2s-glue.c | 150 +-
arch/x86/crypto/blowfish_glue.c | 107 --
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 298 ----
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 351 ----
arch/x86/{include/asm => }/crypto/camellia.h | 24 -
arch/x86/crypto/camellia_aesni_avx2_glue.c | 198 +--
arch/x86/crypto/camellia_aesni_avx_glue.c | 216 +--
arch/x86/crypto/camellia_glue.c | 145 +-
arch/x86/crypto/cast5_avx_glue.c | 287 +---
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 84 -
arch/x86/crypto/cast6_avx_glue.c | 207 +--
arch/x86/crypto/des3_ede_glue.c | 104 --
arch/x86/crypto/ecb_cbc_helpers.h | 76 +
arch/x86/crypto/glue_helper-asm-avx.S | 104 --
arch/x86/crypto/glue_helper-asm-avx2.S | 136 --
arch/x86/crypto/glue_helper.c | 381 -----
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 68 -
arch/x86/crypto/serpent-avx.h | 21 +
arch/x86/crypto/serpent-avx2-asm_64.S | 87 -
arch/x86/{include/asm => }/crypto/serpent-sse2.h | 0
arch/x86/crypto/serpent_avx2_glue.c | 185 +-
arch/x86/crypto/serpent_avx_glue.c | 215 +--
arch/x86/crypto/serpent_sse2_glue.c | 150 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 80 -
arch/x86/{include/asm => }/crypto/twofish.h | 4 -
arch/x86/crypto/twofish_avx_glue.c | 211 +--
arch/x86/crypto/twofish_glue_3way.c | 160 +-
arch/x86/include/asm/crypto/glue_helper.h | 118 --
arch/x86/include/asm/crypto/serpent-avx.h | 42 -
crypto/Kconfig | 96 +-
crypto/Makefile | 4 -
crypto/adiantum.c | 2 +
crypto/ansi_cprng.c | 2 +
crypto/blake2b_generic.c | 249 +--
crypto/blake2s_generic.c | 158 +-
crypto/blowfish_generic.c | 23 +-
crypto/camellia_generic.c | 45 +-
crypto/cast5_generic.c | 23 +-
crypto/cast6_generic.c | 39 +-
crypto/cbc.c | 1 +
crypto/ccm.c | 2 +
crypto/cfb.c | 2 +
crypto/cipher.c | 7 +-
crypto/cmac.c | 2 +
crypto/ctr.c | 2 +
crypto/drbg.c | 2 +
crypto/ecb.c | 1 +
crypto/ecdh_helper.c | 3 +
crypto/essiv.c | 2 +
crypto/fcrypt.c | 1 -
crypto/keywrap.c | 2 +
crypto/michael_mic.c | 31 +-
crypto/ofb.c | 2 +
crypto/pcbc.c | 2 +
crypto/ripemd.h | 14 -
crypto/rmd128.c | 323 ----
crypto/rmd256.c | 342 ----
crypto/rmd320.c | 391 -----
crypto/salsa20_generic.c | 212 ---
crypto/serpent_generic.c | 126 +-
crypto/skcipher.c | 8 +-
crypto/tcrypt.c | 113 +-
crypto/testmgr.c | 57 +-
crypto/testmgr.h | 1632 ------------------
crypto/tgr192.c | 682 --------
crypto/twofish_generic.c | 11 +-
crypto/vmac.c | 2 +
crypto/xcbc.c | 2 +
crypto/xor.c | 2 +-
crypto/xts.c | 2 +
drivers/char/hw_random/ingenic-trng.c | 6 +-
drivers/char/hw_random/iproc-rng200.c | 38 +-
drivers/char/hw_random/optee-rng.c | 3 +-
drivers/char/hw_random/timeriomem-rng.c | 5 +-
drivers/crypto/Kconfig | 35 +-
drivers/crypto/Makefile | 2 -
drivers/crypto/allwinner/Kconfig | 9 +
.../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 196 ++-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 52 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c | 6 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-prng.c | 6 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 8 +
drivers/crypto/bcm/cipher.c | 6 +-
drivers/crypto/bcm/cipher.h | 4 +-
drivers/crypto/bcm/spu.c | 20 +-
drivers/crypto/bcm/spu2.c | 6 +-
drivers/crypto/bcm/spu2.h | 8 +-
drivers/crypto/bcm/spum.h | 22 +-
drivers/crypto/bcm/util.c | 4 +-
drivers/crypto/bcm/util.h | 26 +-
drivers/crypto/caam/debugfs.c | 4 +-
drivers/crypto/cavium/cpt/cptvf_main.c | 8 +-
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/ccree/cc_driver.h | 1 -
drivers/crypto/geode-aes.c | 2 +
drivers/crypto/hisilicon/hpre/hpre.h | 8 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 169 +-
drivers/crypto/hisilicon/qm.c | 193 ++-
drivers/crypto/hisilicon/qm.h | 33 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 42 +-
drivers/crypto/hisilicon/zip/zip_main.c | 23 +-
drivers/crypto/inside-secure/safexcel.c | 6 +-
drivers/crypto/inside-secure/safexcel_hash.c | 1 +
drivers/crypto/keembay/Kconfig | 31 +
drivers/crypto/keembay/Makefile | 3 +
drivers/crypto/keembay/keembay-ocs-hcu-core.c | 1264 ++++++++++++++
drivers/crypto/keembay/ocs-aes.c | 10 +-
drivers/crypto/keembay/ocs-hcu.c | 840 +++++++++
drivers/crypto/keembay/ocs-hcu.h | 106 ++
drivers/crypto/marvell/Kconfig | 15 +
drivers/crypto/marvell/Makefile | 1 +
drivers/crypto/marvell/cesa/cesa.c | 10 +-
drivers/crypto/marvell/cesa/cesa.h | 31 +-
drivers/crypto/marvell/cesa/cipher.c | 34 +-
drivers/crypto/marvell/cesa/hash.c | 59 +-
drivers/crypto/marvell/cesa/tdma.c | 52 +-
drivers/crypto/marvell/octeontx2/Makefile | 10 +
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 137 ++
.../crypto/marvell/octeontx2/otx2_cpt_hw_types.h | 464 +++++
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 202 +++
drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h | 197 +++
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 428 +++++
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 353 ++++
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 61 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 713 ++++++++
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 356 ++++
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 1415 +++++++++++++++
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 162 ++
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 29 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 1758 +++++++++++++++++++
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h | 178 ++
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 410 +++++
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 167 ++
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 541 ++++++
drivers/crypto/mediatek/Makefile | 3 -
drivers/crypto/mediatek/mtk-aes.c | 1271 --------------
drivers/crypto/mediatek/mtk-platform.c | 586 -------
drivers/crypto/mediatek/mtk-platform.h | 231 ---
drivers/crypto/mediatek/mtk-regs.h | 190 --
drivers/crypto/mediatek/mtk-sha.c | 1353 ---------------
drivers/crypto/picoxcell_crypto.c | 1807 --------------------
drivers/crypto/picoxcell_crypto_regs.h | 115 --
drivers/crypto/qat/Kconfig | 2 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 14 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 17 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 27 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 3 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 1 +
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 8 +-
drivers/crypto/qat/qat_common/adf_transport.c | 2 +
.../crypto/qat/qat_common/adf_transport_debug.c | 4 +-
drivers/crypto/qat/qat_common/qat_algs.c | 1 +
drivers/crypto/qat/qat_common/qat_asym_algs.c | 12 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 28 +-
drivers/crypto/sahara.c | 7 -
drivers/crypto/stm32/stm32-cryp.c | 2 +-
drivers/crypto/talitos.c | 50 +-
drivers/crypto/talitos.h | 1 +
drivers/crypto/vmx/aes.c | 1 +
drivers/crypto/vmx/aesp8-ppc.h | 6 +
drivers/crypto/vmx/vmx.c | 7 +-
drivers/net/Kconfig | 1 +
drivers/net/ethernet/chelsio/inline_crypto/Kconfig | 1 +
.../chelsio/inline_crypto/ch_ktls/chcr_ktls.c | 19 +-
include/crypto/algapi.h | 39 -
include/crypto/blake2b.h | 67 +
include/crypto/blake2s.h | 63 +-
include/crypto/hash.h | 8 +-
include/crypto/internal/blake2b.h | 115 ++
include/crypto/internal/blake2s.h | 109 +-
include/crypto/internal/cipher.h | 218 +++
include/crypto/internal/skcipher.h | 2 +-
include/linux/crypto.h | 172 +-
lib/crypto/blake2s.c | 48 +-
lib/crypto/chacha20poly1305.c | 5 +
208 files changed, 13977 insertions(+), 15312 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-hcu.yaml
create mode 100644 arch/arm/crypto/blake2b-neon-core.S
create mode 100644 arch/arm/crypto/blake2b-neon-glue.c
create mode 100644 arch/arm/crypto/blake2s-core.S
create mode 100644 arch/arm/crypto/blake2s-glue.c
rename arch/x86/{include/asm => }/crypto/camellia.h (69%)
create mode 100644 arch/x86/crypto/ecb_cbc_helpers.h
delete mode 100644 arch/x86/crypto/glue_helper.c
create mode 100644 arch/x86/crypto/serpent-avx.h
rename arch/x86/{include/asm => }/crypto/serpent-sse2.h (100%)
rename arch/x86/{include/asm => }/crypto/twofish.h (80%)
delete mode 100644 arch/x86/include/asm/crypto/glue_helper.h
delete mode 100644 arch/x86/include/asm/crypto/serpent-avx.h
delete mode 100644 crypto/rmd128.c
delete mode 100644 crypto/rmd256.c
delete mode 100644 crypto/rmd320.c
delete mode 100644 crypto/salsa20_generic.c
delete mode 100644 crypto/tgr192.c
create mode 100644 drivers/crypto/keembay/keembay-ocs-hcu-core.c
create mode 100644 drivers/crypto/keembay/ocs-hcu.c
create mode 100644 drivers/crypto/keembay/ocs-hcu.h
create mode 100644 drivers/crypto/marvell/octeontx2/Makefile
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_hw_types.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_mbox_common.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptlf.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptlf.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c
delete mode 100644 drivers/crypto/mediatek/Makefile
delete mode 100644 drivers/crypto/mediatek/mtk-aes.c
delete mode 100644 drivers/crypto/mediatek/mtk-platform.c
delete mode 100644 drivers/crypto/mediatek/mtk-platform.h
delete mode 100644 drivers/crypto/mediatek/mtk-regs.h
delete mode 100644 drivers/crypto/mediatek/mtk-sha.c
delete mode 100644 drivers/crypto/picoxcell_crypto.c
delete mode 100644 drivers/crypto/picoxcell_crypto_regs.h
create mode 100644 include/crypto/blake2b.h
create mode 100644 include/crypto/internal/blake2b.h
create mode 100644 include/crypto/internal/cipher.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.12
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
@ 2021-02-22 1:28 ` pr-tracker-bot
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-02-22 1:28 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 15 Feb 2021 13:47:21 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/31caf8b2a847214be856f843e251fc2ed2cd1075
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.13
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
2021-02-22 1:28 ` pr-tracker-bot
@ 2021-04-26 12:32 ` Herbert Xu
2021-04-26 15:59 ` pr-tracker-bot
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-04-26 12:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- crypto_destroy_tfm now ignores errors as well as NULL pointers.
Algorithms:
- Add explicit curve IDs in ECDH algorithm names.
- Add NIST P384 curve parameters.
- Add ECDSA.
Drivers:
- Add support for Green Sardine in ccp.
- Add ecdh/curve25519 to hisilicon/hpre.
- Add support for AM64 in sa2ul.
The following changes since commit a38fd8748464831584a19438cbb3082b5a2dab15:
Linux 5.12-rc2 (2021-03-05 17:33:41 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to e3a606f2c544b231f6079c8c5fea451e772e1139:
fsverity: relax build time dependency on CRYPTO_SHA256 (2021-04-22 17:31:32 +1000)
----------------------------------------------------------------
Aditya Srivastava (4):
crypto: vmx - fix incorrect kernel-doc comment syntax in files
crypto: amcc - fix incorrect kernel-doc comment syntax in files
crypto: ux500 - fix incorrect kernel-doc comment syntax
crypto: nx - fix incorrect kernel-doc comment syntax in files
Ard Biesheuvel (6):
crypto: api - check for ERR pointers in crypto_destroy_tfm()
crypto: arm/aes-scalar - switch to common rev_l/mov_l macros
crypto: arm/chacha-scalar - switch to common rev_l macro
crypto: arm64/aes-ce - deal with oversight in new CTR carry code
fscrypt: relax Kconfig dependencies for crypto API algorithms
fsverity: relax build time dependency on CRYPTO_SHA256
Arnd Bergmann (1):
crypto: poly1305 - fix poly1305_core_setkey() declaration
Ayush Sawal (1):
crypto: chelsio - Read rxchannel-id from firmware
Bhaskar Chowdhury (2):
crypto: qat - fix spelling mistake: "messge" -> "message"
crypto: inside-secure - Minor typo fix in the file safexcel.c
Christophe JAILLET (1):
crypto: crc32-generic - Use SPDX-License-Identifier
Colin Ian King (3):
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
crypto: sun8i-ss - Fix memory leak of pad
crypto: sa2ul - Fix memory leak of rxd
Corentin Labbe (2):
crypto: sun8i-ss - fix result memory leak on error path
crypto: allwinner - add missing CRYPTO_ prefix
Devaraj Rangasamy (1):
ccp: ccp - add support for Green Sardine
Eric Biggers (5):
crypto: arm/blake2b - drop unnecessary return statement
crypto: arm/blake2s - fix for big endian
crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
random: initialize ChaCha20 constants with correct endianness
random: remove dead code left over from blocking pool
Giovanni Cabiddu (1):
crypto: qat - fix error path in adf_isr_resource_alloc()
Guobin Huang (2):
crypto: geode - use DEFINE_SPINLOCK() for spinlock
crypto: ixp4xx - use DEFINE_SPINLOCK() for spinlock
Hao Fang (1):
crypto: hisilicon - use the correct HiSilicon copyright
Herbert Xu (3):
crypto: serpent - Fix sparse byte order warnings
crypto: aegis128 - Move simd prototypes into aegis.h
Merge branch 'ecc'
Hui Tang (14):
crypto: qat - fix unmap invalid dma address
crypto: qat - fix use of 'dma_map_single'
crypto: hisilicon/hpre - delete wrap of 'CONFIG_CRYPTO_DH'
crypto: hisilicon/hpre - optimise 'hpre_algs_register' error path
crypto: hisilicon - fix the check on dma address
crypto: hisilicon/hpre - fix "hpre_ctx_init" resource leak
crypto: hisilicon/hpre - fix Kconfig
crypto: hisilicon/hpre - fix PASID setting on kunpeng 920
crypto: hisilicon/hpre - fix a typo and delete redundant blank line
crypto: hisilicon/hpre - delete redundant '\n'
crypto: hisilicon/hpre - delete the rudundant space after return
crypto: hisilicon/hpre - use the correct variable type
crypto: hisilicon/hpre - add debug log
crypto: hisilicon/hpre - delete redundant log and return in advance
Jia-Ju Bai (1):
crypto: sun8i-ce - fix error return code in sun8i_ce_prng_generate()
Jiapeng Chong (2):
crypto: ccp - A value assigned to a variable is never used
crypto: chelsio - remove unused function
Kai Ye (11):
crypto: testmgr - delete some redundant code
crypto: rockchip - delete unneeded variable initialization
crypto: hisilicon/sec - fixup checking the 3DES weak key
crypto: hisilicon/qm - delete redundant code
crypto: atmel - use the correct print format
crypto: hisilicon/sec - use the correct print format
crypto: hisilicon/sgl - add a comment for block size initialization
crypto: hisilicon/sgl - delete unneeded variable initialization
crypto: hisilicon/sgl - add some dfx logs
crypto: hisilicon/sgl - fix the soft sg map to hardware sg
crypto: hisilicon/sgl - fix the sg buf unmap
Krzysztof Kozlowski (4):
crypto: s5p-sss - initialize APB clock after the AXI bus clock for SlimSSS
crypto: s5p-sss - simplify getting of_device_id match data
crypto: s5p-sss - remove unneeded local variable initialization
crypto: s5p-sss - consistently use local 'dev' variable in probe()
Lee Jones (10):
crypto: hisilicon/sec - Supply missing description for 'sec_queue_empty()'s 'queue' param
crypto: bcm - Fix a whole host of kernel-doc misdemeanours
crypto: chelsio - Fix some kernel-doc issues
crypto: ux500/hash - Fix worthy kernel-doc headers and remove others
crypto: keembay - Fix incorrectly named functions/structs
crypto: atmel-ecc - Struct headers need to start with keyword 'struct'
crypto: caam - Provide the name of the function and provide missing descriptions
crypto: vmx - Source headers are not good kernel-doc candidates
crypto: nx - Repair some kernel-doc problems
crypto: nitrox - Demote non-compliant kernel-doc headers
Longfang Liu (5):
crypto: hisilicon/sec - fixes a printing error
crypto: hisilicon/sec - fixes some coding style
crypto: hisilicon/sec - fixes some driver coding style
crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
crypto: hisilicon/sec - Fix a module parameter error
Lv Yunlong (1):
crypto: qat - Fix a double free in adf_create_ring
Meng Yu (10):
crypto: hisilicon/hpre - add version adapt to new algorithms
crypto: hisilicon/hpre - add algorithm type
crypto: ecdh - move curve_id of ECDH from the key to algorithm name
crypto: ecc - expose ecc curves
crypto: hisilicon/hpre - add 'ECDH' algorithm
crypto: ecc - add curve25519 params and expose them
crypto: hisilicon/hpre - add 'CURVE25519' algorithm
crypto: ecc - Correct an error in the comments
crypto: hisilicon/hpre - Add processing of src_data in 'CURVE25519'
crypto: ecc - delete a useless function declaration
Milan Djurovic (3):
crypto: jitterentropy - Put constants on the right side of the expression
crypto: keywrap - Remove else after break statement
crypto: fcrypt - Remove 'do while(0)' loop for single statement macro
Nathan Chancellor (1):
crypto: arm/curve25519 - Move '.fpu' after '.arch'
Peter Ujfalusi (3):
dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
crypto: sa2ul - Support for per channel coherency
crypto: sa2ul - Add support for AM64
Philipp Zabel (1):
crypto: sun4i-ss - simplify optional reset handling
Randy Dunlap (2):
crypto: doc - fix kernel-doc notation in chacha.c and af_alg.c
crypto: camellia - drop duplicate "depends on CRYPTO"
Rijo Thomas (2):
crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
crypto: ccp - fix command queuing to TEE ring buffer
Ruiqi Gong (1):
crypto: hisilicon/hpre - fix a typo in hpre_crypto.c
Saulo Alessandre (4):
crypto: ecc - Add NIST P384 curve parameters
crypto: ecc - Add math to support fast NIST P384
crypto: ecdsa - Register NIST P384 and extend test suite
x509: Add OID for NIST P384 and extend parser for it
Shixin Liu (7):
crypto: sun4i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
crypto: sun8i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
crypto: sun8i-ce - Fix PM reference leak in sun8i_ce_probe()
crypto: stm32/hash - Fix PM reference leak on stm32-hash.c
crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c
crypto: sa2ul - Fix PM reference leak in sa_ul_probe()
crypto: omap-aes - Fix PM reference leak on omap-aes.c
Srujana Challa (1):
crypto: octeontx2 - add support for OcteonTX2 98xx CPT block.
Stefan Berger (5):
oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
crypto: ecdsa - Add support for ECDSA signature verification
x509: Detect sm2 keys by their parameters OID
x509: Add support for parsing x509 certs with ECDSA keys
ima: Support EC keys for signature verification
Tang Bin (1):
crypto: amlogic - Fix unnecessary check in meson_crypto_probe()
Tang Yizhou (1):
crypto: ccp - Use DEFINE_SPINLOCK() for spinlock
Thara Gopinath (11):
crypto: qce - Restore/save ahash state with custom struct in export/import
crypto: qce - Hold back a block of data to be transferred as part of final
crypto: qce - Return unsupported if key1 and key 2 are same for AES XTS algorithm
crypto: qce - Return unsupported if any three keys are same for DES3 algorithms
crypto: qce - Return error for zero length messages
crypto: qce - Return error for non-blocksize data(ECB/CBC algorithms)
crypto: qce - Set ivsize to 0 for ecb(aes)
crypto: qce - Improve the conditions for requesting AES fallback cipher
crypto: qce - Set data unit size to message length for AES XTS transformation
crypto: qce - Remover src_tbl from qce_cipher_reqctx
crypto: qce - Remove totallen and offset in qce_start
Tian Tao (13):
hwrng: ba431 - Use device-managed registration
hwrng: xiphera-trng - use devm_platform_ioremap_resource() to simplify
hwrng: bcm2835 - remove redundant null check
hwrng: omap - Fix included header from 'asm'
hwrng: cctrng - Use device-managed registration API
hwrng: pic32 - Use device-managed registration API
crypto: cavium - remove unused including <linux/version.h>
hwrng: cctrng - use devm_platform_ioremap_resource() to simplify
hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
hwrng: intel - Fix included header from 'asm
hwrng: omap - Use of_device_get_match_data() helper
crypto: cavium/zip - remove unused including <linux/version.h>
crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
Tom Lendacky (1):
crypto: ccp - Don't initialize SEV support without the SEV feature
Tong Zhang (2):
crypto: qat - don't release uninitialized resources
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Vinay Kumar Yadav (1):
crypto: chelsio/chcr - Remove useless MODULE_VERSION
Wan Jiabing (1):
crypto: ux500/cryp - Remove duplicate argument
Wang Qing (1):
hwrng: cctrng - delete redundant printing of return value
Wei Yongjun (2):
crypto: keembay-ocs-hcu - Fix error return code in kmb_ocs_hcu_probe()
crypto: keembay-ocs-aes - Fix error return code in kmb_ocs_aes_probe()
Weili Qian (10):
crypto: hisilicon/qm - set the total number of queues
crypto: hisilicon/qm - move 'CURRENT_QM' code to qm.c
crypto: hisilicon/qm - set the number of queues for function
crypto: hisilicon/qm - add queue isolation support for Kunpeng930
crypto: hisilicon/qm - add stop queue by hardware
crypto: hisilicon/trng - add version to adapt new algorithm
crypto: hisilicon - dynamic configuration 'err_info'
crypto: hisilicon - support new error types for ZIP
crypto: hisilicon - add new error type for SEC
crypto: hisilicon - enable new error types for QM
Wojciech Ziemba (1):
crypto: qat - enable detection of accelerators hang
Xiang Chen (4):
crypto: amlogic - Fix the parameter of dma_unmap_sg()
crypto: cavium - Fix the parameter of dma_unmap_sg()
crypto: ux500 - Fix the parameter of dma_unmap_sg()
crypto: allwinner - Fix the parameter of dma_unmap_sg()
Yang Li (2):
crypto: powepc/sha1 - remove unneeded semicolon
crypto: nx - add missing call to of_node_put()
Yang Shen (4):
crypto: hisilicon/zip - adjust functions location
crypto: hisilicon/zip - add comments for 'hisi_zip_sqe'
crypto: hisilicon/zip - initialize operations about 'sqe' in 'acomp_alg.init'
crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
YueHaibing (5):
crypto: atmel-tdes - Remove redundant dev_err call in atmel_tdes_probe()
crypto: img-hash - Remove redundant dev_err call in img_hash_probe()
crypto: ux500 - Remove redundant dev_err calls
crypto: keembay - Remove redundant dev_err calls
crypto: ccree - Remove redundant dev_err call in init_cc_resources()
Zihao Tang (1):
hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
Álvaro Fernández Rojas (3):
dt-bindings: rng: bcm2835: add clock constraints
dt-bindings: rng: bcm2835: document reset support
hwrng: bcm2835 - add reset support
.../devicetree/bindings/crypto/ti,sa2ul.yaml | 24 +-
.../devicetree/bindings/rng/brcm,bcm2835.yaml | 21 +
arch/arm/crypto/aes-cipher-core.S | 42 +-
arch/arm/crypto/blake2b-neon-glue.c | 4 +-
arch/arm/crypto/blake2s-core.S | 21 +
arch/arm/crypto/chacha-scalar-core.S | 43 +-
arch/arm/crypto/curve25519-core.S | 2 +-
arch/arm/crypto/poly1305-glue.c | 2 +-
arch/arm64/crypto/aes-modes.S | 1 +
arch/arm64/crypto/poly1305-glue.c | 2 +-
arch/mips/crypto/poly1305-glue.c | 2 +-
arch/powerpc/crypto/sha1-spe-glue.c | 2 +-
arch/x86/crypto/poly1305_glue.c | 6 +-
crypto/Kconfig | 15 +-
crypto/Makefile | 6 +
crypto/aegis.h | 19 +
crypto/aegis128-core.c | 15 -
crypto/aegis128-neon.c | 10 +-
crypto/af_alg.c | 94 ++-
crypto/api.c | 2 +-
crypto/asymmetric_keys/public_key.c | 4 +-
crypto/asymmetric_keys/x509_cert_parser.c | 49 +-
crypto/asymmetric_keys/x509_public_key.c | 4 +-
crypto/crc32_generic.c | 24 +-
crypto/ecc.c | 291 +++++--
crypto/ecc.h | 49 +-
crypto/ecc_curve_defs.h | 49 ++
crypto/ecdh.c | 72 +-
crypto/ecdh_helper.c | 4 +-
crypto/ecdsa.c | 376 +++++++++
crypto/ecdsasignature.asn1 | 4 +
crypto/fcrypt.c | 5 +-
crypto/jitterentropy.c | 8 +-
crypto/keywrap.c | 4 +-
crypto/rng.c | 10 +-
crypto/serpent_generic.c | 39 +-
crypto/testmgr.c | 42 +-
crypto/testmgr.h | 458 +++++++++-
drivers/char/hw_random/ba431-rng.c | 16 +-
drivers/char/hw_random/bcm2835-rng.c | 27 +-
drivers/char/hw_random/cctrng.c | 20 +-
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/intel-rng.c | 2 +-
drivers/char/hw_random/omap-rng.c | 14 +-
drivers/char/hw_random/pic32-rng.c | 3 +-
drivers/char/hw_random/xiphera-trng.c | 4 +-
drivers/char/random.c | 21 +-
drivers/crypto/allwinner/Kconfig | 14 +-
.../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 23 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-prng.c | 2 +-
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 9 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 3 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 1 +
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 11 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 2 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 12 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 4 +-
drivers/crypto/amcc/crypto4xx_alg.c | 12 +-
drivers/crypto/amcc/crypto4xx_core.c | 18 +-
drivers/crypto/amcc/crypto4xx_core.h | 4 +-
drivers/crypto/amcc/crypto4xx_reg_def.h | 8 +-
drivers/crypto/amcc/crypto4xx_sa.h | 18 +-
drivers/crypto/amcc/crypto4xx_trng.h | 2 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 3 -
drivers/crypto/atmel-ecc.c | 30 +-
drivers/crypto/atmel-i2c.c | 2 +-
drivers/crypto/atmel-sha.c | 4 +-
drivers/crypto/atmel-tdes.c | 1 -
drivers/crypto/bcm/cipher.c | 7 +-
drivers/crypto/bcm/spu.c | 16 +-
drivers/crypto/bcm/spu2.c | 43 +-
drivers/crypto/bcm/util.c | 4 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +
drivers/crypto/caam/caampkc.c | 3 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 1 -
drivers/crypto/cavium/nitrox/nitrox_isr.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 9 +-
drivers/crypto/cavium/zip/common.h | 1 -
drivers/crypto/ccp/ccp-crypto-main.c | 3 +-
drivers/crypto/ccp/ccp-dev.c | 12 +-
drivers/crypto/ccp/ccp-ops.c | 1 -
drivers/crypto/ccp/sev-dev.c | 6 +
drivers/crypto/ccp/sp-dev.c | 12 +-
drivers/crypto/ccp/sp-dev.h | 15 +-
drivers/crypto/ccp/sp-pci.c | 1 +
drivers/crypto/ccp/tee-dev.c | 57 +-
drivers/crypto/ccp/tee-dev.h | 20 +-
drivers/crypto/ccree/cc_driver.c | 4 +-
drivers/crypto/chelsio/chcr_algo.c | 32 +-
drivers/crypto/chelsio/chcr_core.c | 5 +-
drivers/crypto/chelsio/chcr_core.h | 1 -
drivers/crypto/geode-aes.c | 4 +-
drivers/crypto/hisilicon/Kconfig | 2 +
drivers/crypto/hisilicon/hpre/hpre.h | 18 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 921 ++++++++++++++++++++-
drivers/crypto/hisilicon/hpre/hpre_main.c | 158 ++--
drivers/crypto/hisilicon/qm.c | 396 +++++++--
drivers/crypto/hisilicon/qm.h | 29 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 2 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 13 +-
drivers/crypto/hisilicon/sec/sec_drv.h | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 10 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 137 +--
drivers/crypto/hisilicon/sec2/sec_crypto.h | 6 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 267 +++---
drivers/crypto/hisilicon/sgl.c | 37 +-
drivers/crypto/hisilicon/trng/trng.c | 13 +-
drivers/crypto/hisilicon/zip/zip.h | 50 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 710 +++++++++-------
drivers/crypto/hisilicon/zip/zip_main.c | 99 +--
drivers/crypto/img-hash.c | 3 -
drivers/crypto/inside-secure/safexcel.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 7 +-
drivers/crypto/keembay/keembay-ocs-aes-core.c | 8 +-
drivers/crypto/keembay/keembay-ocs-hcu-core.c | 8 +-
drivers/crypto/keembay/ocs-hcu.c | 8 +-
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 10 +-
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 14 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 8 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 33 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 144 +++-
drivers/crypto/nx/nx-aes-cbc.c | 2 +-
drivers/crypto/nx/nx-aes-ccm.c | 2 +-
drivers/crypto/nx/nx-aes-ctr.c | 2 +-
drivers/crypto/nx/nx-aes-ecb.c | 2 +-
drivers/crypto/nx/nx-aes-gcm.c | 2 +-
drivers/crypto/nx/nx-aes-xcbc.c | 2 +-
drivers/crypto/nx/nx-common-powernv.c | 4 +-
drivers/crypto/nx/nx-sha256.c | 2 +-
drivers/crypto/nx/nx-sha512.c | 2 +-
drivers/crypto/nx/nx.c | 5 +-
drivers/crypto/nx/nx_debugfs.c | 2 +-
drivers/crypto/omap-aes.c | 7 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 1 +
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 1 +
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 +
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 25 +
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 13 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.c | 40 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 14 +-
drivers/crypto/qat/qat_common/adf_init.c | 4 +
drivers/crypto/qat/qat_common/adf_isr.c | 29 +-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 2 +-
drivers/crypto/qat/qat_common/adf_transport.c | 1 +
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 4 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 17 +-
drivers/crypto/qat/qat_common/qat_algs.c | 32 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 4 +-
drivers/crypto/qce/cipher.h | 1 -
drivers/crypto/qce/common.c | 25 +-
drivers/crypto/qce/common.h | 3 +-
drivers/crypto/qce/sha.c | 143 ++--
drivers/crypto/qce/skcipher.c | 69 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 2 +-
drivers/crypto/s5p-sss.c | 17 +-
drivers/crypto/sa2ul.c | 143 +++-
drivers/crypto/sa2ul.h | 4 +
drivers/crypto/stm32/stm32-cryp.c | 4 +-
drivers/crypto/stm32/stm32-hash.c | 8 +-
drivers/crypto/ux500/cryp/cryp.c | 5 +-
drivers/crypto/ux500/cryp/cryp.h | 2 +-
drivers/crypto/ux500/cryp/cryp_core.c | 10 +-
drivers/crypto/ux500/cryp/cryp_irq.c | 2 +-
drivers/crypto/ux500/cryp/cryp_irq.h | 4 +-
drivers/crypto/ux500/cryp/cryp_irqp.h | 4 +-
drivers/crypto/ux500/cryp/cryp_p.h | 15 +-
drivers/crypto/ux500/hash/hash_core.c | 18 +-
drivers/crypto/vmx/aes.c | 2 +-
drivers/crypto/vmx/aes_cbc.c | 2 +-
drivers/crypto/vmx/aes_ctr.c | 2 +-
drivers/crypto/vmx/aes_xts.c | 2 +-
drivers/crypto/vmx/ghash.c | 2 +-
drivers/crypto/vmx/vmx.c | 2 +-
fs/crypto/Kconfig | 30 +-
fs/verity/Kconfig | 8 +-
include/crypto/acompress.h | 2 +
include/crypto/aead.h | 2 +
include/crypto/akcipher.h | 2 +
include/crypto/chacha.h | 9 +-
include/crypto/ecc_curve.h | 60 ++
include/crypto/ecdh.h | 3 +-
include/crypto/hash.h | 4 +
include/crypto/internal/poly1305.h | 3 +-
include/crypto/kpp.h | 2 +
include/crypto/poly1305.h | 6 +-
include/crypto/rng.h | 2 +
include/crypto/skcipher.h | 2 +
include/keys/asymmetric-type.h | 6 +
include/linux/oid_registry.h | 10 +-
include/trace/events/random.h | 83 --
include/uapi/misc/uacce/hisi_qm.h | 1 +
lib/crypto/chacha.c | 4 +-
lib/crypto/poly1305-donna32.c | 3 +-
lib/crypto/poly1305-donna64.c | 3 +-
lib/crypto/poly1305.c | 3 +-
lib/oid_registry.c | 24 +
net/bluetooth/ecdh_helper.c | 2 -
net/bluetooth/selftest.c | 2 +-
net/bluetooth/smp.c | 6 +-
security/integrity/digsig_asymmetric.c | 30 +-
209 files changed, 4558 insertions(+), 1986 deletions(-)
create mode 100644 crypto/ecdsa.c
create mode 100644 crypto/ecdsasignature.asn1
create mode 100644 include/crypto/ecc_curve.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.13
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
@ 2021-04-26 15:59 ` pr-tracker-bot
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-04-26 15:59 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 26 Apr 2021 20:32:00 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a4a78bc8ead44c3cdb470c6e1f37afcabdddfc14
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.14
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
2021-04-26 15:59 ` pr-tracker-bot
@ 2021-06-28 11:00 ` Herbert Xu
2021-06-28 23:36 ` pr-tracker-bot
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-06-28 11:00 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Algorithms:
- Fix rmmod crash with x86/curve25519.
- Add ECDH NIST P384.
- Generate assembly files at build-time with perl scripts on arm.
- Switch to HMAC SHA512 DRBG as default DRBG.
Drivers:
- Add sl3516 crypto engine.
- Add ECDH NIST P384 support in hisilicon/hpre.
- Add {ofb,cfb,ctr} over {aes,sm4} in hisilicon/sec.
- Add {ccm,gcm} over {aes,sm4} in hisilicon/sec.
- Enable omap hwrng driver for TI K3 family.
- Add support for AEAD algorithms in qce.
Please note that there is a merge conflict with cavium/nitrox,
the fix is to simply use the version from the crypto tree.
The following changes since commit 6efb943b8616ec53a5e444193dccf1af9ad627b5:
Linux 5.13-rc1 (2021-05-09 14:17:44 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 9f38b678ffc4e2ccf167a1131c0403dc4f5e1bb7:
crypto: sl3516 - depends on HAS_IOMEM (2021-06-24 14:57:28 +0800)
----------------------------------------------------------------
Ard Biesheuvel (2):
crypto: tcrypt - enable tests for xxhash and blake2
crypto: shash - avoid comparing pointers to exported functions under CFI
Arnd Bergmann (1):
crypto: ixp4xx - convert to platform driver
Baokun Li (1):
crypto: ccp - Use list_move_tail instead of list_del/list_add_tail in ccp-dmaengine.c
Bixuan Cui (1):
crypto: nx - add missing MODULE_DEVICE_TABLE
Christophe JAILLET (3):
crypto: cpt - Use 'hlist_for_each_entry' to simplify code
crypto: ccp - Fix a resource leak in an error handling path
crypto: cavium/nitrox - Fix an error rhandling path in 'nitrox_probe()'
Colin Ian King (2):
hwrng: amd - remove redundant initialization of variable err
crypto: hisilicon/sec - Fix spelling mistake "fallbcak" -> "fallback"
Corentin Labbe (15):
crypto: ixp4xx - dma_unmap the correct address
crypto: ixp4xx - update IV after requests
crypto: ixp4xx - fallback when having more than one SG
crypto: ixp4xx - convert unsigned to unsigned int
crypto: ixp4xx - convert all printk to dev_xxx
crypto: ixp4xx - whitespace fixes
crypto: ixp4xx - Do not initialize static to NULL
crypto: ixp4xx - remove brackets from single statement
crypto: ixp4xx - Correct functions alignment
MAINTAINERS: add ixp4xx_crypto to the right arch list
MAINTAINERS: add myself as maintainer of ixp4xx_crypto
dt-bindings: crypto: Add documentation for sl3516-ce
crypto: sl3516 - Add sl3516 crypto engine
MAINTAINERS: add gemini crypto sl3516-ce
crypto: sl3516 - depends on HAS_IOMEM
Hangbin Liu (1):
crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit
Herbert Xu (4):
crypto: sa2ul - Remove unused auth_len variable
crypto: api - Move crypto attr definitions out of crypto.h
crypto: nx - Fix RCU warning in nx842_OF_upd_status
crypto: nx - Fix numerous sparse byte-order warnings
Hongbo Li (1):
crypto: sm2 - fix a memory leak in sm2
Horia Geantă (1):
MAINTAINERS: update caam crypto driver maintainers list
Hui Tang (20):
crypto: testmgr - fix initialization of 'secret_size'
crypto: ecdh - extend 'cra_driver_name' with curve name
crypto: hisilicon/hpre - extend 'cra_driver_name' with curve name
crypto: hisilicon/hpre - fix unmapping invalid dma address
crypto: hisilicon/hpre - the macro 'HPRE_ADDR' expands
crypto: hisilicon/hpre - init a structure member each line
crypto: hisilicon/hpre - replace macro with inline function
crypto: hisilicon/hpre - remove the macro of 'HPRE_DEV'
crypto: hisilicon/hpre - delete rudundant initialization
crypto: hisilicon/hpre - use 'GENMASK' to generate mask value
crypto: hisilicon/hpre - delete rudundant macro definition
crypto: hisilicon/hpre - add 'default' for switch statement
crypto: khazad,wp512 - remove leading spaces before tabs
crypto: ecdh - fix ecdh-nist-p192's entry in testmgr
crypto: ecdh - fix 'ecdh_init'
crypto: ecdh - register NIST P384 tfm
crypto: ecdh - add test suite for NIST P384
crypto: hisilicon/hpre - fix ecdh self test issue
crypto: hisilicon/hpre - add check before gx modulo p
crypto: hisilicon/hpre - register ecdh NIST P384
Jack Xu (5):
crypto: qat - return error when failing to map FW
crypto: qat - check MMP size before writing to the SRAM
crypto: qat - report an error if MMP file size is too large
crypto: qat - check return code of qat_hal_rd_rel_reg()
crypto: qat - remove unused macro in FW loader
Jiapeng Chong (1):
crypto: qce - Fix inconsistent indenting
Joerg Roedel (1):
crypto: ccp - Annotate SEV Firmware file names
Juerg Haefliger (1):
hwrng: Kconfig - Remove leading spaces
Kai Ye (19):
crypto: hisilicon/qm - add dfx log if not use hardware crypto algs
crypto: hisilicon/qm - fix the process of VF's list adding
crypto: hisilicon/sec - add new type of SQE
crypto: hisilicon/sec - driver adapt to new SQE
crypto: hisilicon/sec - add new skcipher mode for SEC
crypto: hisilicon/sec - add fallback tfm supporting for XTS mode
crypto: hisilicon/sec - fixup 3des minimum key size declaration
crypto: hisilicon/sec - add new algorithm mode for AEAD
crypto: hisilicon/sec - add fallback tfm supporting for aeads
crypto: hisilicon/sec - add hardware integrity check value process
crypto: hisilicon/sec - modify the SEC request structure
crypto: hisilicon/qm - supports writing QoS int the host
crypto: hisilicon/qm - add the "alg_qos" file node
crypto: hisilicon/qm - merges the work initialization process into a single function
crypto: hisilicon/qm - add pf ping single vf function
crypto: hisilicon/qm - supports to inquiry each function's QoS
crypto: hisilicon/sec - adds the max shaper type rate
crypto: hisilicon/hpre - adds the max shaper type rate
crypto: hisilicon/zip - adds the max shaper type rate
Kees Cook (1):
crypto: nx - Fix memcpy() over-reading in nonce
Lee Jones (3):
crypto: cavium: Fix a bunch of kernel-doc related issues
crypto: nx: nx-aes-gcm: Kernel-doc formatting should not be used for headers
crypto: ccp: ccp-dev: Fix a little doc-rot
Linus Walleij (2):
crypto: ixp4xx - Add DT bindings
crypto: ixp4xx - Add device tree support
Liu Shixin (1):
crypto: api - remove CRYPTOA_U32 and related functions
Longfang Liu (1):
crypto: hisilicon/qm - support address prefetching
Masahiro Yamada (4):
crypto: arm - generate *.S by Perl at build time instead of shipping them
crypto: arm - use a pattern rule for generating *.S files
crypto: arm64 - generate *.S by Perl at build time instead of shipping them
crypto: arm64 - use a pattern rule for generating *.S files
Shaokun Zhang (2):
hwrng: core - remove redundant initialization of variable err
crypto: nx - Fix typo in comment
Srujana Challa (4):
crypto: octeontx2 - Add mailbox support for CN10K
crypto: octeontx2 - add support to map LMTST region for CN10K
crypto: octeontx2 - add support for CPT operations on CN10K
crypto: octeontx2 - enable and handle ME interrupts
Stephan Müller (1):
crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG
Suman Anna (6):
hwrng: omap - Enable driver for TI K3 family
crypto: sa2ul - Fix leaks on failure paths with sa_dma_init()
crypto: sa2ul - Fix pm_runtime enable in sa_ul_probe()
crypto: sa2ul - Use of_device_get_match_data() helper
crypto: sa2ul - Use devm_platform_ioremap_resource()
crypto: sa2ul - Remove child devices in remove
Thara Gopinath (9):
crypto: qce - Add MAC failed error checking
crypto: qce - Make result dump optional
crypto: qce - Add mode for rfc4309
crypto: qce - Add support for AEAD algorithms
crypto: qce - Clean up qce_auth_cfg
crypto: qce - Add support for AEAD algorithms
crypto: qce - Schedule fallback aead algorithm
crypto: qce: skcipher: Fix incorrect sg count for dma transfers
MAINTAINERS: Add maintainer for Qualcomm crypto drivers
Tian Tao (3):
hwrng: exynos - Use pm_runtime_resume_and_get() to replace open coding
hwrng: omap - Use pm_runtime_resume_and_get() to replace open coding
hwrng: ks-sa - Use pm_runtime_resume_and_get() to replace open coding
Tom Rix (1):
crypto: marvell/cesa - change FPGA indirect article to an
Tong Tiangen (1):
crypto: nitrox - fix unchecked variable in nitrox_register_interrupts
Wei Yongjun (2):
crypto: qce - Fix some error handling path
crypto: qce - fix error return code in qce_skcipher_async_req_handle()
Weili Qian (9):
crypto: hisilicon/qm - initialize the device before doing tasks
crypto: hisilicon/qm - modify 'QM_RESETTING' clearing error
crypto: hisilicon/qm - adjust order of device error configuration
crypto: hisilicon/qm - enable to close master ooo when NFE occurs
crypto: hisilicon/qm - add MSI detection steps on Kunpeng930
crypto: hisilicon/qm - adjust reset interface
crypto: hisilicon/qm - enable PF and VFs communication
crypto: hisilicon/qm - add callback to support communication
crypto: hisilicon/qm - update reset flow
Wenkai Lin (1):
crypto: hisilicon/qm - implement for querying hardware tasks status.
Wu Bo (1):
crypto: af_alg - use DIV_ROUND_UP helper macro for calculations
Yang Li (2):
crypto: cavium/nitrox - Remove redundant initialization of 'sg'
crypto: cavium/nitrox - Fix kernel-doc
YueHaibing (2):
hwrng: core - Use DEVICE_ATTR_<RW|RO> macro
crypto: sl3516 - Fix build warning without CONFIG_PM
Zhang Qilong (2):
crypto: omap-des - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
crypto: omap-sham - Fix PM reference leak in omap sham ops
Zhen Lei (2):
crypto: ux500 - Fix error return code in hash_hw_final()
crypto: header - Fix spelling errors
Zou Wei (1):
crypto: hisilicon - switch to memdup_user_nul()
kernel test robot (1):
crypto: sl3516 - fix duplicated inclusion
Łukasz Stelmach (1):
hwrng: exynos - Fix runtime PM imbalance on error
.../bindings/crypto/cortina,sl3516-crypto.yaml | 50 +
.../bindings/crypto/intel,ixp4xx-crypto.yaml | 47 +
.../intel,ixp4xx-network-processing-engine.yaml | 22 +-
MAINTAINERS | 23 +-
arch/arm/crypto/Makefile | 10 +-
arch/arm/crypto/poly1305-core.S_shipped | 1158 --------
arch/arm/crypto/sha256-core.S_shipped | 2816 --------------------
arch/arm/crypto/sha512-core.S_shipped | 1869 -------------
arch/arm/mach-ixp4xx/common.c | 26 +
arch/arm64/crypto/Makefile | 10 +-
arch/arm64/crypto/poly1305-core.S_shipped | 835 ------
arch/arm64/crypto/sha256-core.S_shipped | 2069 --------------
arch/arm64/crypto/sha512-core.S_shipped | 1093 --------
arch/x86/crypto/curve25519-x86_64.c | 2 +-
crypto/af_alg.c | 2 +-
crypto/algapi.c | 18 -
crypto/algboss.c | 31 +-
crypto/drbg.c | 12 +-
crypto/ecdh.c | 49 +-
crypto/internal.h | 12 +
crypto/khazad.c | 2 +-
crypto/shash.c | 18 +-
crypto/sm2.c | 24 +-
crypto/tcrypt.c | 36 +
crypto/testmgr.c | 10 +-
crypto/testmgr.h | 71 +-
crypto/wp512.c | 40 +-
drivers/char/hw_random/Kconfig | 10 +-
drivers/char/hw_random/amd-rng.c | 2 +-
drivers/char/hw_random/core.c | 38 +-
drivers/char/hw_random/exynos-trng.c | 7 +-
drivers/char/hw_random/ks-sa-rng.c | 3 +-
drivers/char/hw_random/omap-rng.c | 6 +-
drivers/crypto/Kconfig | 41 +
drivers/crypto/Makefile | 1 +
drivers/crypto/cavium/cpt/cptpf_main.c | 2 +-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_isr.c | 4 +
drivers/crypto/cavium/nitrox/nitrox_main.c | 22 +-
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 16 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 2 +-
drivers/crypto/ccp/ccp-dev.c | 2 +-
drivers/crypto/ccp/ccp-dmaengine.c | 3 +-
drivers/crypto/ccp/sev-dev.c | 4 +
drivers/crypto/ccp/sp-pci.c | 6 +-
drivers/crypto/gemini/Makefile | 2 +
drivers/crypto/gemini/sl3516-ce-cipher.c | 387 +++
drivers/crypto/gemini/sl3516-ce-core.c | 535 ++++
drivers/crypto/gemini/sl3516-ce-rng.c | 61 +
drivers/crypto/gemini/sl3516-ce.h | 347 +++
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 185 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 256 +-
drivers/crypto/hisilicon/qm.c | 2181 +++++++++++----
drivers/crypto/hisilicon/qm.h | 17 +
drivers/crypto/hisilicon/sec2/sec.h | 23 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 1036 ++++++-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 193 ++
drivers/crypto/hisilicon/sec2/sec_main.c | 100 +-
drivers/crypto/hisilicon/zip/zip_main.c | 99 +-
drivers/crypto/ixp4xx_crypto.c | 413 +--
drivers/crypto/marvell/cesa/cesa.h | 2 +-
drivers/crypto/marvell/octeontx2/Makefile | 13 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 93 +
drivers/crypto/marvell/octeontx2/cn10k_cpt.h | 36 +
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 23 +
.../crypto/marvell/octeontx2/otx2_cpt_hw_types.h | 16 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 9 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 10 +
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 160 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 32 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 8 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 3 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 49 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 43 +
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 17 +-
drivers/crypto/nx/nx-842-pseries.c | 31 +-
drivers/crypto/nx/nx-aes-cbc.c | 2 +-
drivers/crypto/nx/nx-aes-ccm.c | 4 +-
drivers/crypto/nx/nx-aes-ctr.c | 4 +-
drivers/crypto/nx/nx-aes-ecb.c | 2 +-
drivers/crypto/nx/nx-aes-gcm.c | 2 +-
drivers/crypto/nx/nx-common-powernv.c | 4 +-
drivers/crypto/nx/nx-sha256.c | 19 +-
drivers/crypto/nx/nx-sha512.c | 19 +-
drivers/crypto/nx/nx_csbcpb.h | 4 +-
drivers/crypto/omap-des.c | 9 +-
drivers/crypto/omap-sham.c | 4 +-
.../qat/qat_common/icp_qat_fw_loader_handle.h | 2 +-
drivers/crypto/qat/qat_common/qat_hal.c | 14 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 12 +-
drivers/crypto/qce/Makefile | 1 +
drivers/crypto/qce/aead.c | 847 ++++++
drivers/crypto/qce/aead.h | 56 +
drivers/crypto/qce/common.c | 196 +-
drivers/crypto/qce/common.h | 9 +-
drivers/crypto/qce/core.c | 4 +
drivers/crypto/qce/skcipher.c | 19 +-
drivers/crypto/sa2ul.c | 50 +-
drivers/crypto/ux500/hash/hash_core.c | 1 +
drivers/soc/ixp4xx/ixp4xx-npe.c | 7 +
include/crypto/aead.h | 2 +-
include/crypto/algapi.h | 10 +-
include/crypto/engine.h | 2 +-
include/crypto/hash.h | 2 +-
include/crypto/internal/hash.h | 8 +-
include/linux/crypto.h | 26 -
108 files changed, 7084 insertions(+), 11176 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/cortina,sl3516-crypto.yaml
create mode 100644 Documentation/devicetree/bindings/crypto/intel,ixp4xx-crypto.yaml
delete mode 100644 arch/arm/crypto/poly1305-core.S_shipped
delete mode 100644 arch/arm/crypto/sha256-core.S_shipped
delete mode 100644 arch/arm/crypto/sha512-core.S_shipped
delete mode 100644 arch/arm64/crypto/poly1305-core.S_shipped
delete mode 100644 arch/arm64/crypto/sha256-core.S_shipped
delete mode 100644 arch/arm64/crypto/sha512-core.S_shipped
create mode 100644 drivers/crypto/gemini/Makefile
create mode 100644 drivers/crypto/gemini/sl3516-ce-cipher.c
create mode 100644 drivers/crypto/gemini/sl3516-ce-core.c
create mode 100644 drivers/crypto/gemini/sl3516-ce-rng.c
create mode 100644 drivers/crypto/gemini/sl3516-ce.h
create mode 100644 drivers/crypto/marvell/octeontx2/cn10k_cpt.c
create mode 100644 drivers/crypto/marvell/octeontx2/cn10k_cpt.h
create mode 100644 drivers/crypto/qce/aead.c
create mode 100644 drivers/crypto/qce/aead.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.14
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
@ 2021-06-28 23:36 ` pr-tracker-bot
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-06-28 23:36 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 28 Jun 2021 19:00:51 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6159c49e12284b4880fd60e0575a71a40556a67e
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.15
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
2021-06-28 23:36 ` pr-tracker-bot
@ 2021-08-30 8:28 ` Herbert Xu
2021-08-30 20:17 ` pr-tracker-bot
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-08-30 8:28 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Algorithms:
- Add AES-NI/AVX/x86_64 implementation of SM4.
Drivers:
- Add Arm SMCCC TRNG based driver.
The following changes since commit 5261cdf457ce3635bf18d393a3c1991dcfaf9d02:
crypto: drbg - select SHA512 (2021-07-16 15:49:31 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 6ae51ffe5e768d9e25a7f4298e2e7a058472bcc3:
crypto: sha512 - remove imaginary and mystifying clearing of variables (2021-08-27 16:30:19 +0800)
----------------------------------------------------------------
Ahsan Atta (1):
crypto: qat - flush vf workqueue at driver removal
Andre Przywara (2):
firmware: smccc: Register smccc_trng platform device
hwrng: Add Arm SMCCC TRNG based driver
Ard Biesheuvel (1):
crypto: x86/aes-ni - add missing error checks in XTS code
Ben Hutchings (2):
crypto: omap - Avoid redundant copy when using truncated sg list
crypto: omap - Fix inconsistent locking of device lists
Brijesh Singh (1):
crypto: ccp - shutdown SEV firmware on kexec
Cai Huoqing (1):
padata: Remove repeated verbose license text
Changbin Du (1):
crypto: skcipher - in_irq() cleanup
Christophe JAILLET (3):
crypto: qat - simplify code and axe the use of a deprecated API
crypto: qat - disable AER if an error occurs in probe functions
crypto: qat - fix a typo in a comment
Giovanni Cabiddu (8):
crypto: qat - set DMA mask to 48 bits for Gen2
crypto: qat - use proper type for vf_mask
crypto: qat - do not ignore errors from enable_vf2pf_comms()
crypto: qat - handle both source of interrupt in VF ISR
crypto: qat - prevent spurious MSI interrupt in VF
crypto: qat - move IO virtualization functions
crypto: qat - do not export adf_iov_putmsg()
crypto: qat - store vf.compatible flag
Hongbo Li (1):
lib/mpi: use kcalloc in mpi_resize
Jason Wang (2):
crypto: sun8i-ss - Use kfree_sensitive
crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
John Allen (1):
crypto: ccp - Add support for new CCP/PSP device ID
Kai Ye (2):
crypto: hisilicon/sec - fix the abnormal exiting process
crypto: hisilicon/sec - modify the hardware endian configuration
Kanchana Velusamy (1):
crypto: qat - protect interrupt mask CSRs with a spinlock
Lukas Bulwahn (2):
crypto: rmd320 - remove rmd320 in Makefile
crypto: sha512 - remove imaginary and mystifying clearing of variables
Marco Chiappero (10):
crypto: qat - remove empty sriov_configure()
crypto: qat - enable interrupts only after ISR allocation
crypto: qat - prevent spurious MSI interrupt in PF
crypto: qat - rename compatibility version definition
crypto: qat - fix reuse of completion variable
crypto: qat - move pf2vf interrupt [en|dis]able to adf_vf_isr.c
crypto: qat - fix naming for init/shutdown VF to PF notifications
crypto: qat - complete all the init steps before service notification
crypto: qat - fix naming of PF/VF enable functions
crypto: qat - remove the unnecessary get_vintmsk_offset()
Mian Yousaf Kaukab (1):
crypto: ecc - handle unaligned input buffer in ecc_swap_digits
Randy Dunlap (4):
crypto: arm/curve25519 - rename 'mod_init' & 'mod_exit' functions to be module-specific
hwrng: rename 'mod_init' & 'mod_exit' functions to be module-specific
crypto: lib - rename 'mod_init' & 'mod_exit' functions to be module-specific
crypto: wp512 - correct a non-kernel-doc comment
Salah Triki (1):
crypto: atmel-aes - use swap()
Sean Anderson (2):
crypto: mxs-dcp - Check for DMA mapping errors
crypto: mxs-dcp - Use sg_mapping_iter to copy data
Sebastian Andrzej Siewior (2):
crypto: virtio - Replace deprecated CPU-hotplug functions.
padata: Replace deprecated CPU-hotplug functions.
Shreyansh Chouhan (1):
crypto: aesni - xts_crypt() return if walk.nbytes is 0
Svyatoslav Pankratov (1):
crypto: qat - remove intermediate tasklet for vf2pf
Tianjia Zhang (9):
crypto: sm4 - create SM4 library based on sm4 generic code
crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
crypto: tcrypt - add the asynchronous speed test for SM4
crypto: tcrypt - Fix missing return value check
crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
crypto: tcrypt - add GCM/CCM mode test for SM4 algorithm
crypto: x86/sm4 - export reusable AESNI/AVX functions
crypto: x86/sm4 - add AES-NI/AVX2/x86_64 implementation
Tony Lindgren (6):
crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
crypto: omap-sham - initialize req only after omap_sham_hw_init()
crypto: omap-sham - add missing pm_runtime_dontuse_autosuspend()
crypto: omap-sham - drop old hw_init and unused FLAGS_INIT
crypto: omap-sham - drop suspend and resume functions
crypto: omap-sham - drop pm_runtime_irqsafe() usage
Tudor Ambarus (9):
crypto: atmel-tdes - Clarify how tdes dev gets allocated to the tfm
crypto: atmel-tdes - Handle error messages
crypto: atmel-aes - Add blocksize constraint for ECB and CBC modes
crypto: atmel-aes - Add XTS input length constraint
crypto: atmel-aes - Add NIST 800-38A's zero length cryptlen constraint
crypto: atmel-tdes - Add FIPS81's zero length cryptlen constraint
crypto: atmel - Set OFB's blocksize to 1
crypto: atmel-aes - Add fallback to XTS software implementation
crypto: atmel-aes - Allocate aes dev at tfm init time
Weili Qian (8):
crypto: hisilicon - enable zip device clock gating
crypto: hisilicon - enable sec device clock gating
crypto: hisilicon - enable hpre device clock gating
crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
crypto: hisilicon - add runtime PM ops
crypto: hisilicon - support runtime PM for accelerator device
crypto: hisilicon - change parameter passing of debugfs function
crypto: hisilicon - check _PS0 and _PR0 method
Xiyu Yang (1):
padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
arch/arm/crypto/curve25519-glue.c | 8 +-
arch/arm64/crypto/Kconfig | 2 +-
arch/arm64/crypto/sm4-ce-glue.c | 20 +-
arch/x86/crypto/Makefile | 6 +
arch/x86/crypto/aesni-intel_glue.c | 5 +
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 589 +++++++++++++++++++++
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 497 +++++++++++++++++
arch/x86/crypto/sm4-avx.h | 24 +
arch/x86/crypto/sm4_aesni_avx2_glue.c | 169 ++++++
arch/x86/crypto/sm4_aesni_avx_glue.c | 487 +++++++++++++++++
crypto/Kconfig | 44 ++
crypto/Makefile | 1 -
crypto/ecc.h | 5 +-
crypto/sha512_generic.c | 3 -
crypto/skcipher.c | 2 +-
crypto/sm4_generic.c | 180 +------
crypto/tcrypt.c | 100 +++-
crypto/testmgr.c | 29 +
crypto/testmgr.h | 148 ++++++
crypto/wp512.c | 2 +-
drivers/char/hw_random/Kconfig | 14 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/amd-rng.c | 8 +-
drivers/char/hw_random/arm_smccc_trng.c | 123 +++++
drivers/char/hw_random/geode-rng.c | 8 +-
drivers/char/hw_random/intel-rng.c | 8 +-
drivers/char/hw_random/via-rng.c | 8 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 9 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 3 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 9 +-
drivers/crypto/atmel-aes.c | 154 ++++--
drivers/crypto/atmel-tdes.c | 66 +--
drivers/crypto/ccp/sev-dev.c | 49 +-
drivers/crypto/ccp/sp-pci.c | 19 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 123 ++++-
drivers/crypto/hisilicon/qm.c | 430 ++++++++++++---
drivers/crypto/hisilicon/qm.h | 8 +
drivers/crypto/hisilicon/sec2/sec.h | 5 -
drivers/crypto/hisilicon/sec2/sec_main.c | 138 +++--
drivers/crypto/hisilicon/zip/zip_main.c | 83 ++-
drivers/crypto/mxs-dcp.c | 81 +--
drivers/crypto/omap-aes.c | 8 +-
drivers/crypto/omap-crypto.c | 2 +-
drivers/crypto/omap-des.c | 8 +-
drivers/crypto/omap-sham.c | 68 +--
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 8 +-
drivers/crypto/qat/qat_4xxx/adf_drv.c | 14 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 19 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 1 -
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 21 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 14 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 16 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 19 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 1 -
drivers/crypto/qat/qat_c62x/adf_drv.c | 21 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 14 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 16 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 8 +-
drivers/crypto/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 21 +-
drivers/crypto/qat/qat_common/adf_init.c | 13 +-
drivers/crypto/qat/qat_common/adf_isr.c | 42 +-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 78 +--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 2 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 8 +-
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 12 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 64 ++-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 19 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 1 -
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 21 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 14 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 1 -
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 16 +-
drivers/crypto/virtio/virtio_crypto_core.c | 4 +-
drivers/firmware/smccc/smccc.c | 17 +
include/crypto/sm4.h | 25 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 35 +-
lib/crypto/Kconfig | 3 +
lib/crypto/Makefile | 3 +
lib/crypto/blake2s.c | 8 +-
lib/crypto/chacha20poly1305.c | 8 +-
lib/crypto/curve25519.c | 8 +-
lib/crypto/sm4.c | 176 ++++++
lib/mpi/mpiutil.c | 2 +-
87 files changed, 3695 insertions(+), 839 deletions(-)
create mode 100644 arch/x86/crypto/sm4-aesni-avx-asm_64.S
create mode 100644 arch/x86/crypto/sm4-aesni-avx2-asm_64.S
create mode 100644 arch/x86/crypto/sm4-avx.h
create mode 100644 arch/x86/crypto/sm4_aesni_avx2_glue.c
create mode 100644 arch/x86/crypto/sm4_aesni_avx_glue.c
create mode 100644 drivers/char/hw_random/arm_smccc_trng.c
create mode 100644 lib/crypto/sm4.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.15
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
@ 2021-08-30 20:17 ` pr-tracker-bot
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-08-30 20:17 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 30 Aug 2021 16:28:18 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/44a7d4441181d0f2d622dc9bb512d7f5ca13f768
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.16
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
2021-08-30 20:17 ` pr-tracker-bot
@ 2021-11-02 3:52 ` Herbert Xu
2021-11-02 4:27 ` pr-tracker-bot
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2021-11-02 3:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Delay boot-up self-test for built-in algorithms.
Algorithms:
- Remove fallback path on arm64 as SIMD now runs with softirq off.
Drivers:
- Add Keem Bay OCS ECC Driver.
The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:
Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 39ef08517082a424b5b65c3dbaa6c0fa9d3303b9:
crypto: testmgr - fix wrong key length for pkcs1pad (2021-10-29 21:04:04 +0800)
----------------------------------------------------------------
Ard Biesheuvel (7):
crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path
crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers
crypto: arm64/aes-ce - stop using SIMD helper for skciphers
crypto: arm64/aes-ccm - yield NEON when processing auth-only data
crypto: arm64/aes-ccm - remove non-SIMD fallback path
crypto: arm64/aes-ccm - reduce NEON begin/end calls for common case
crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data
Arnd Bergmann (2):
crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency
crypto: ccree - avoid out-of-range warnings from clang
Cai Huoqing (3):
hwrng: Kconfig - Add helper dependency on COMPILE_TEST
hwrng: ixp4xx - Make use of the helper function devm_platform_ioremap_resource()
crypto: ccp - Make use of the helper macro kthread_run()
Colin Ian King (2):
crypto: img-hash - remove need for error return variable ret
crypto: hisilicon/zip - Fix spelling mistake "COMSUMED" -> "CONSUMED"
Daniel Jordan (1):
crypto: pcrypt - Delay write to padata->info
Daniele Alessandrelli (2):
crypto: ecc - Move ecc.h to include/crypto/internal
crypto: ecc - Export additional helper functions
Giovanni Cabiddu (5):
crypto: qat - remove unneeded packed attribute
crypto: qat - power up 4xxx device
crypto: qat - detect PFVF collision after ACK
crypto: qat - disregard spurious PFVF interrupts
crypto: qat - use hweight for bit counting
Herbert Xu (4):
crypto: hisilicon - Fix sscanf format signedness
crypto: api - Fix built-in testing dependency failures
crypto: api - Export crypto_boot_test_finished
crypto: api - Do not create test larvals if manager is disabled
Horia Geantă (1):
crypto: tcrypt - fix skcipher multi-buffer tests for 1420B blocks
Kai Ye (3):
crypto: hisilicon/qm - fix the uacce mmap failed
crypto: hisilicon/qm - support the userspace task resetting
crypto: hisilicon/qm - modify the uacce mode check
Krzysztof Kozlowski (1):
crypto: marvell/cesa - drop unneeded MODULE_ALIAS
Lei He (1):
crypto: testmgr - fix wrong key length for pkcs1pad
Maksim Lukoshkov (1):
crypto: qat - free irqs only if allocated
Marco Chiappero (9):
crypto: qat - remove unnecessary collision prevention step in PFVF
crypto: qat - fix handling of VF to PF interrupts
crypto: qat - remove duplicated logic across GEN2 drivers
crypto: qat - make pfvf send message direction agnostic
crypto: qat - move pfvf collision detection values
crypto: qat - rename pfvf collision constants
crypto: qat - add VF and PF wrappers to common send function
crypto: qat - extract send and wait from adf_vf2pf_request_version()
crypto: qat - share adf_enable_pf2vf_comms() from adf_pf2vf_msg.c
Markus Schneider-Pargmann (1):
hwrng: mtk - Force runtime pm ops for sleep ops
Michael Walle (1):
crypto: caam - disable pkc for non-E SoCs
Nathan Chancellor (1):
crypto: sm4 - Do not change section of ck and sbox
Ovidiu Panait (1):
crypto: octeontx2 - set assoclen in aead_do_fallback()
Peter Gonda (1):
crypto: ccp - Fix whitespace in sev_cmd_buffer_len()
Prabhjot Khurana (3):
crypto: engine - Add KPP Support to Crypto Engine
dt-bindings: crypto: Add Keem Bay ECC bindings
crypto: keembay-ocs-ecc - Add Keem Bay OCS ECC Driver
Qing Wang (1):
hwrng: s390 - replace snprintf in show functions with sysfs_emit
Randy Dunlap (1):
crypto: jitter - drop kernel-doc notation
Sebastian Andrzej Siewior (1):
crypto: testmgr - Only disable migration in crypto_disable_simd_for_test()
Shreyansh Chouhan (1):
crypto: aesni - check walk.nbytes instead of err
Tang Bin (2):
crypto: s5p-sss - Add error handling in s5p_aes_probe()
crypto: sa2ul - Use the defined variable to clean code
Tim Gardner (1):
crypto: drbg - Fix unused value warning in drbg_healthcheck_sanity()
Uwe Kleine-König (1):
hwrng: meson - Improve error handling for core clock
Wojciech Ziemba (3):
crypto: qat - replace deprecated MSI API
crypto: qat - remove unmatched CPU affinity to cluster IRQ
crypto: qat - free irq in case of failure
Documentation/crypto/crypto_engine.rst | 4 +
.../bindings/crypto/intel,keembay-ocs-ecc.yaml | 47 +
MAINTAINERS | 11 +
arch/arm64/crypto/Kconfig | 6 -
arch/arm64/crypto/aes-ce-ccm-core.S | 24 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 203 ++--
arch/arm64/crypto/aes-glue.c | 102 +-
arch/arm64/crypto/aes-neonbs-glue.c | 122 +--
arch/arm64/crypto/ghash-ce-glue.c | 209 +---
arch/x86/crypto/aesni-intel_glue.c | 2 +-
crypto/Kconfig | 2 +-
crypto/algapi.c | 123 ++-
crypto/api.c | 50 +-
crypto/crypto_engine.c | 26 +
crypto/drbg.c | 2 +-
crypto/ecc.c | 14 +-
crypto/ecdh.c | 2 +-
crypto/ecdsa.c | 2 +-
crypto/ecrdsa.c | 2 +-
crypto/ecrdsa_defs.h | 2 +-
crypto/internal.h | 10 +
crypto/jitterentropy.c | 24 +-
crypto/pcrypt.c | 12 +-
crypto/tcrypt.c | 5 +-
crypto/testmgr.c | 4 +-
crypto/testmgr.h | 2 +-
drivers/char/hw_random/Kconfig | 12 +-
drivers/char/hw_random/ixp4xx-rng.c | 4 +-
drivers/char/hw_random/meson-rng.c | 5 +-
drivers/char/hw_random/mtk-rng.c | 9 +-
drivers/char/hw_random/s390-trng.c | 4 +-
drivers/crypto/caam/caampkc.c | 19 +-
drivers/crypto/caam/regs.h | 3 +
drivers/crypto/ccp/ccp-dev-v3.c | 5 +-
drivers/crypto/ccp/ccp-dev-v5.c | 5 +-
drivers/crypto/ccp/sev-dev.c | 2 +-
drivers/crypto/ccree/cc_driver.c | 3 +-
drivers/crypto/hisilicon/qm.c | 74 +-
drivers/crypto/hisilicon/zip/zip_main.c | 2 +-
drivers/crypto/img-hash.c | 7 +-
drivers/crypto/keembay/Kconfig | 19 +
drivers/crypto/keembay/Makefile | 2 +
drivers/crypto/keembay/keembay-ocs-ecc.c | 1017 ++++++++++++++++++++
drivers/crypto/marvell/cesa/cesa.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 1 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 35 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 10 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 89 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 13 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 87 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 12 -
drivers/crypto/qat/qat_common/adf_accel_devices.h | 29 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 9 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 98 ++
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 27 +
drivers/crypto/qat/qat_common/adf_init.c | 5 +
drivers/crypto/qat/qat_common/adf_isr.c | 190 ++--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 238 +++--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 9 -
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 4 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 30 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 123 +--
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 14 +-
drivers/crypto/s5p-sss.c | 2 +
drivers/crypto/sa2ul.c | 13 +-
include/crypto/engine.h | 5 +
{crypto => include/crypto/internal}/ecc.h | 36 +
lib/crypto/sm4.c | 4 +-
68 files changed, 2130 insertions(+), 1158 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-ecc.yaml
create mode 100644 drivers/crypto/keembay/keembay-ocs-ecc.c
rename {crypto => include/crypto/internal}/ecc.h (90%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.16
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
@ 2021-11-02 4:27 ` pr-tracker-bot
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2021-11-02 4:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 2 Nov 2021 11:52:02 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bfc484fe6abba4b89ec9330e0e68778e2a9856b2
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.17
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
2021-11-02 4:27 ` pr-tracker-bot
@ 2022-01-11 2:04 ` Herbert Xu
2022-01-11 20:53 ` pr-tracker-bot
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-01-11 2:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This update includes the following changes:
Algorithms:
- Drop alignment requirement for data in aesni.
- Use synchronous seeding from the /dev/random in DRBG.
- Reseed nopr DRBGs every 5 minutes from /dev/random.
- Add KDF algorithms currently used by security/DH.
- Fix lack of entropy on some AMD CPUs with jitter RNG.
Drivers:
- Add support for the D1 variant in sun8i-ce.
- Add SEV_INIT_EX support in ccp.
- PFVF support for GEN4 host driver in qat.
- Compression support for GEN4 devices in qat.
- Add cn10k random number generator support.
The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf:
Linux 5.16-rc1 (2021-11-14 13:56:52 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 5f21d7d283dd82865bdb0123795b3accf0d42b67:
crypto: af_alg - rewrite NULL pointer check (2022-01-07 14:30:01 +1100)
----------------------------------------------------------------
Andy Shevchenko (1):
crypto: api - Replace kernel.h with the necessary inclusions
Chengfeng Ye (3):
crypto: qce - fix uaf on qce_aead_register_one
crypto: qce - fix uaf on qce_ahash_register_one
crypto: qce - fix uaf on qce_skcipher_register_one
Christophe JAILLET (1):
crypto: ccree - remove redundant 'flush_workqueue()' calls
Colin Ian King (1):
crypto: x86/des3 - remove redundant assignment of variable nbytes
Corentin Labbe (2):
crypto: sun8i-ce - Add support for the D1 variant
crypto: omap - increase priority of DES/3DES
Dan Carpenter (3):
crypto: octeontx2 - uninitialized variable in kvf_limits_store()
crypto: octeontx2 - out of bounds access in otx2_cpt_dl_custom_egrp_delete()
crypto: octeontx2 - prevent underflow in get_cores_bmap()
David Rientjes (1):
crypto: ccp - Add SEV_INIT_EX support
Etienne Carriere (2):
crypto: stm32/cryp - defer probe for reset controller
crypto: stm32/cryp - don't print error on probe deferral
Gaurav Jain (1):
crypto: caam - save caam memory to support crypto engine retry mechanism.
Geert Uytterhoeven (1):
crypto: sa2ul - Use bitfield helpers
Giovanni Cabiddu (13):
crypto: qat - do not handle PFVF sources for qat_4xxx
crypto: qat - fix undetected PFVF timeout in ACK loop
crypto: qat - move vf2pf interrupt helpers
crypto: qat - change PFVF ACK behaviour
crypto: qat - re-enable interrupts for legacy PFVF messages
crypto: qat - relocate PFVF disabled function
crypto: qat - abstract PFVF receive logic
crypto: qat - get compression extended capabilities
crypto: qat - set CIPHER capability for QAT GEN2
crypto: qat - set COMPRESSION capability for QAT GEN2
crypto: qat - extend crypto capability detection for 4xxx
crypto: qat - allow detection of dc capabilities for 4xxx
crypto: qat - fix definition of ring reset results
Guo Zhengkui (1):
crypto: dh - remove duplicate includes
Gustavo A. R. Silva (2):
crypto: cavium - Use kcalloc() instead of kzalloc()
crypto: marvell/octeontx - Use kcalloc() instead of kzalloc()
Heiner Kallweit (1):
crypto: omap-aes - Fix broken pm_runtime_and_get() usage
Herbert Xu (1):
crypto: stm32 - Revert broken pm_runtime_resume_and_get changes
Jakub Kicinski (1):
crypto: x86/aesni - don't require alignment of data
Jason A. Donenfeld (1):
crypto: x86/curve25519 - use in/out register constraints more precisely
Jason Wang (1):
crypto: ccp - no need to initialise statics to 0
Jiapeng Chong (1):
crypto: octeontx2 - Use swap() instead of swap_engines()
Jiasheng Jiang (1):
crypto: af_alg - rewrite NULL pointer check
Kai Ye (5):
crypto: hisilicon - modify the value of engine type rate
crypto: hisilicon/qm - modify the value of qos initialization
crypto: hisilicon/qm - some optimizations of ths qos write process
crypto: hisilicon/qm - simplified the calculation of qos shaper parameters
MAINTAINERS: update SEC2 driver maintainers list
Lad Prabhakar (1):
crypto: ux500 - Use platform_get_irq() to get the interrupt
Lei He (1):
crypto: testmgr - Fix wrong test case of RSA
Lukas Bulwahn (1):
MAINTAINERS: rectify entry for INTEL KEEM BAY OCS ECC CRYPTO DRIVER
Marco Chiappero (36):
crypto: qat - refactor PF top half for PFVF
crypto: qat - move VF message handler to adf_vf2pf_msg.c
crypto: qat - move interrupt code out of the PFVF handler
crypto: qat - split PFVF message decoding from handling
crypto: qat - handle retries due to collisions in adf_iov_putmsg()
crypto: qat - relocate PFVF PF related logic
crypto: qat - relocate PFVF VF related logic
crypto: qat - add pfvf_ops
crypto: qat - differentiate between pf2vf and vf2pf offset
crypto: qat - abstract PFVF send function
crypto: qat - reorganize PFVF code
crypto: qat - reorganize PFVF protocol definitions
crypto: qat - use enums for PFVF protocol codes
crypto: qat - pass the PF2VF responses back to the callers
crypto: qat - refactor pfvf version request messages
crypto: qat - do not rely on min version
crypto: qat - fix VF IDs in PFVF log messages
crypto: qat - improve logging of PFVF messages
crypto: qat - support the reset of ring pairs on PF
crypto: qat - add the adf_get_pmisc_base() helper function
crypto: qat - make PFVF message construction direction agnostic
crypto: qat - make PFVF send and receive direction agnostic
crypto: qat - set PFVF_MSGORIGIN just before sending
crypto: qat - abstract PFVF messages with struct pfvf_message
crypto: qat - leverage bitfield.h utils for PFVF messages
crypto: qat - leverage read_poll_timeout in PFVF send
crypto: qat - improve the ACK timings in PFVF send
crypto: qat - store the PFVF protocol version of the endpoints
crypto: qat - store the ring-to-service mapping
crypto: qat - introduce support for PFVF block messages
crypto: qat - exchange device capabilities over PFVF
crypto: qat - support fast ACKs in the PFVF protocol
crypto: qat - exchange ring-to-service mappings over PFVF
crypto: qat - config VFs based on ring-to-svc mapping
crypto: qat - add PFVF support to the GEN4 host driver
crypto: qat - add PFVF support to enable the reset of ring pairs
Marek Vasut (1):
crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
Meng Li (1):
crypto: caam - replace this_cpu_ptr with raw_cpu_ptr
Nicolai Stange (9):
crypto: drbg - prepare for more fine-grained tracking of seeding state
crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
crypto: drbg - make reseeding from get_random_bytes() synchronous
crypto: drbg - make drbg_prepare_hrng() handle jent instantiation errors
crypto: drbg - reseed 'nopr' drbgs periodically from get_random_bytes()
crypto: drbg - ignore jitterentropy errors if not in FIPS mode
crypto: jitter - don't limit ->health_failure check to FIPS mode
crypto: jitter - quit sample collection loop upon RCT failure
Nicolas Toromanoff (7):
crypto: stm32/cryp - fix CTR counter carry
crypto: stm32/cryp - fix xts and race condition in crypto_engine requests
crypto: stm32/cryp - check early input data
crypto: stm32/cryp - fix double pm exit
crypto: stm32/cryp - fix lrw chaining mode
crypto: stm32/cryp - fix bugs and crash in tests
crypto: stm32/cryp - reorder hw initialization
Pankaj Gupta (1):
MAINTAINERS: update caam crypto driver maintainers list
Peter Gonda (4):
crypto: ccp - Add SEV_INIT rc error logging on init
crypto: ccp - Move SEV_INIT retry for corrupted data
crypto: ccp - Refactor out sev_fw_alloc()
crypto: ccp - Add psp_init_on_probe module parameter
Srujana Challa (2):
crypto: octeontx2 - add apis for custom engine groups
crypto: octeontx2 - parameters for custom engine groups
Stephan Müller (10):
crypto: kdf - Add key derivation self-test support code
crypto: kdf - add SP800-108 counter key derivation function
security: DH - remove dead code for zero padding
security: DH - use KDF implementation from crypto API
crypto: jitter - consider 32 LSB for APT
crypto: rsa - limit key size to 2048 in FIPS mode
crypto: dh - limit key size to 2048 in FIPS mode
crypto: des - disallow des3 in FIPS mode
crypto: jitter - add oversampling of noise source
crypto: kdf - select SHA-256 required for self-test
Sunil Goutham (2):
hwrng: cavium - Check health status while reading random data
hwrng: cn10k - Add random number generator support
Tianjia Zhang (5):
crypto: sha256 - remove duplicate generic hash init function
crypto: mips/sha - remove duplicate hash init function
crypto: powerpc/sha - remove duplicate hash init function
crypto: sparc/sha - remove duplicate hash init function
crypto: s390/sha512 - Use macros instead of direct IV numbers
Tom Rix (1):
crypto: hisilicon - cleanup warning in qm_get_qos_value()
Tomasz Kowalik (1):
crypto: qat - add support for compression for 4xxx
Tudor Ambarus (1):
crypto: atmel-aes - Reestablish the correct tfm context at dequeue
Wei Yongjun (1):
crypto: keembay-ocs-ecc - Fix error return code in kmb_ocs_ecc_probe()
Weili Qian (9):
crypto: hisilicon/qm - fix incorrect return value of hisi_qm_resume()
crypto: hisilicon/hpre - fix memory leak in hpre_curve25519_src_init()
crypto: hisilicon/qm - remove unnecessary device memory reset
crypto: hisilicon/qm - code movement
crypto: hisilicon/qm - modify the handling method after abnormal interruption
crypto: hisilicon/qm - use request_threaded_irq instead
crypto: hisilicon/qm - reset function if event queue overflows
crypto: hisilicon/qm - disable queue when 'CQ' error
crypto: hisilicon/qm - disable qm clock-gating
Yang Guang (1):
crypto: hisilicon/hpre - use swap() to make code cleaner
Yang Li (1):
crypto: ccp - remove unneeded semicolon
Yang Shen (3):
crypto: hisilicon/zip - enable ssid for sva sgl
crypto: hisilicon/qm - fix deadlock for remove driver
crypto: hisilicon/zip - add new algorithms for uacce device
Zizhuang Deng (1):
lib/mpi: Add the return value check of kcalloc()
chiminghao (1):
crypto: octeontx2 - use swap() to make code cleaner
Documentation/virt/kvm/amd-memory-encryption.rst | 6 +
MAINTAINERS | 3 +-
arch/mips/cavium-octeon/crypto/octeon-sha1.c | 17 +-
arch/mips/cavium-octeon/crypto/octeon-sha256.c | 39 +-
arch/mips/cavium-octeon/crypto/octeon-sha512.c | 39 +-
arch/powerpc/crypto/sha1-spe-glue.c | 17 +-
arch/powerpc/crypto/sha1.c | 14 +-
arch/powerpc/crypto/sha256-spe-glue.c | 39 +-
arch/s390/crypto/sha512_s390.c | 32 +-
arch/sparc/crypto/sha1_glue.c | 14 +-
arch/sparc/crypto/sha256_glue.c | 37 +-
arch/sparc/crypto/sha512_glue.c | 37 +-
arch/x86/crypto/aesni-intel_glue.c | 4 +-
arch/x86/crypto/curve25519-x86_64.c | 767 ++++++++++------
arch/x86/crypto/des3_ede_glue.c | 4 +-
crypto/Kconfig | 4 +
crypto/Makefile | 5 +
crypto/af_alg.c | 7 +-
crypto/dh.c | 5 +-
crypto/drbg.c | 150 ++--
crypto/jitterentropy-kcapi.c | 6 -
crypto/jitterentropy.c | 32 +-
crypto/jitterentropy.h | 1 -
crypto/kdf_sp800108.c | 153 ++++
crypto/rsa.c | 4 +
crypto/sha256_generic.c | 16 +-
crypto/testmgr.c | 9 -
crypto/testmgr.h | 6 +-
drivers/char/hw_random/Kconfig | 13 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/cavium-rng-vf.c | 194 +++-
drivers/char/hw_random/cavium-rng.c | 11 +-
drivers/char/hw_random/cn10k-rng.c | 181 ++++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 21 +
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 1 +
drivers/crypto/atmel-aes.c | 6 +-
drivers/crypto/caam/caamalg.c | 6 +
drivers/crypto/caam/caamalg_qi2.c | 2 +-
drivers/crypto/caam/caamhash.c | 3 +
drivers/crypto/caam/caampkc.c | 3 +
drivers/crypto/cavium/cpt/cptvf_main.c | 5 +-
drivers/crypto/ccp/ccp-dev.c | 2 +-
drivers/crypto/ccp/sev-dev.c | 259 +++++-
drivers/crypto/ccree/cc_request_mgr.c | 1 -
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 7 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 2 +-
drivers/crypto/hisilicon/qm.c | 483 ++++++----
drivers/crypto/hisilicon/sec2/sec_main.c | 2 +-
drivers/crypto/hisilicon/zip/zip_main.c | 12 +-
drivers/crypto/keembay/keembay-ocs-ecc.c | 1 +
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 4 +-
drivers/crypto/marvell/octeontx2/Makefile | 2 +-
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 1 +
.../crypto/marvell/octeontx2/otx2_cpt_devlink.c | 108 +++
.../crypto/marvell/octeontx2/otx2_cpt_devlink.h | 20 +
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 3 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 18 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 315 ++++++-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 7 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 5 +-
drivers/crypto/omap-aes.c | 2 +-
drivers/crypto/omap-des.c | 8 +-
drivers/crypto/qat/Kconfig | 1 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 151 +++-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 2 +
drivers/crypto/qat/qat_4xxx/adf_drv.c | 33 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 12 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 15 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 6 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 12 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 15 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 6 +-
drivers/crypto/qat/qat_common/Makefile | 6 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 47 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 8 +-
drivers/crypto/qat/qat_common/adf_admin.c | 47 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 1 +
drivers/crypto/qat/qat_common/adf_cfg_common.h | 13 +
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 3 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 42 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 105 +--
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 22 +-
drivers/crypto/qat/qat_common/adf_gen2_pfvf.c | 381 ++++++++
drivers/crypto/qat/qat_common/adf_gen2_pfvf.h | 29 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.c | 69 +-
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 17 +
drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 148 +++
drivers/crypto/qat/qat_common/adf_gen4_pfvf.h | 17 +
drivers/crypto/qat/qat_common/adf_init.c | 11 +-
drivers/crypto/qat/qat_common/adf_isr.c | 111 ++-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 416 ---------
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 93 --
drivers/crypto/qat/qat_common/adf_pfvf_msg.h | 259 ++++++
drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.c | 52 ++
drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.h | 18 +
drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c | 346 ++++++++
drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.h | 13 +
drivers/crypto/qat/qat_common/adf_pfvf_utils.c | 65 ++
drivers/crypto/qat/qat_common/adf_pfvf_utils.h | 31 +
drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c | 167 ++++
drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.h | 23 +
drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.c | 368 ++++++++
drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.h | 17 +
drivers/crypto/qat/qat_common/adf_sriov.c | 59 +-
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 48 -
drivers/crypto/qat/qat_common/adf_vf_isr.c | 106 +--
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 4 +-
drivers/crypto/qat/qat_common/icp_qat_hw.h | 13 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 25 +
drivers/crypto/qat/qat_common/qat_hal.c | 41 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 44 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 2 +
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 15 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 1 -
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 6 +-
drivers/crypto/qce/aead.c | 2 +-
drivers/crypto/qce/sha.c | 2 +-
drivers/crypto/qce/skcipher.c | 2 +-
drivers/crypto/sa2ul.c | 19 +-
drivers/crypto/stm32/stm32-crc32.c | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 988 +++++++++------------
drivers/crypto/stm32/stm32-hash.c | 6 +-
drivers/crypto/ux500/cryp/cryp.h | 2 +
drivers/crypto/ux500/cryp/cryp_core.c | 26 +-
include/crypto/aead.h | 4 +-
include/crypto/algapi.h | 5 +-
include/crypto/blake2b.h | 1 -
include/crypto/blake2s.h | 2 +-
include/crypto/cryptd.h | 3 +-
include/crypto/drbg.h | 11 +-
include/crypto/engine.h | 6 +-
include/crypto/internal/kdf_selftest.h | 71 ++
include/crypto/kdf_sp800108.h | 61 ++
include/crypto/pcrypt.h | 2 +-
include/crypto/scatterwalk.h | 3 +-
include/crypto/skcipher.h | 6 +-
include/linux/psp-sev.h | 21 +
lib/mpi/mpi-mod.c | 2 +
security/keys/Kconfig | 2 +-
security/keys/dh.c | 130 +--
142 files changed, 5484 insertions(+), 2637 deletions(-)
create mode 100644 crypto/kdf_sp800108.c
create mode 100644 drivers/char/hw_random/cn10k-rng.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_devlink.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_devlink.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_pfvf.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_pfvf.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pfvf.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pfvf.h
delete mode 100644 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c
delete mode 100644 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_utils.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_utils.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.h
delete mode 100644 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c
create mode 100644 include/crypto/internal/kdf_selftest.h
create mode 100644 include/crypto/kdf_sp800108.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.17
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
@ 2022-01-11 20:53 ` pr-tracker-bot
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-01-11 20:53 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 11 Jan 2022 13:04:19 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5c947d0dbae8038ec1c8b538891f6475350542ee
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.18
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
2022-01-11 20:53 ` pr-tracker-bot
@ 2022-03-20 23:42 ` Herbert Xu
2022-03-21 23:14 ` Linus Torvalds
2022-03-21 23:18 ` pr-tracker-bot
1 sibling, 2 replies; 146+ messages in thread
From: Herbert Xu @ 2022-03-20 23:42 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This update includes the following changes:
API:
- hwrng core now credits for low-quality RNG devices.
Algorithms:
- Optimisations for neon aes on arm/arm64.
- Add accelerated crc32_be on arm64.
- Add ffdheXYZ(dh) templates.
- Disallow hmac keys < 112 bits in FIPS mode.
- Add AVX assembly implementation for sm3 on x86.
Drivers:
- Add missing local_bh_disable calls for crypto_engine callback.
- Ensure BH is disabled in crypto_engine callback path.
- Fix zero length DMA mappings in ccree.
- Add synchronization between mailbox accesses in octeontx2.
- Add Xilinx SHA3 driver.
- Add support for the TDES IP available on sama7g5 SoC in atmel.
The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:
Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0e03b8fd29363f2df44e2a7a176d486de550757a:
crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST (2022-03-14 14:45:45 +1200)
----------------------------------------------------------------
Andy Shevchenko (2):
crypto: qat - don't cast parameter in bit operations
crypto: cavium/nitrox - don't cast parameter in bit operations
Ard Biesheuvel (8):
crypto: memneq - avoid implicit unaligned accesses
crypto: arm64/aes-neon-ctr - improve handling of single tail block
crypto: arm/aes-neonbs-ctr - deal with non-multiples of AES block size
crypto: arm64/aes-neonbs-ctr - fallback to plain NEON for final chunk
crypto: arm64/aes-neonbs-xts - use plain NEON for non-power-of-2 input sizes
lib/xor: make xor prototypes more friendly to compiler vectorization
crypto: arm/xor - make vectorized C code Clang-friendly
crypto: crypto_xor - use helpers for unaligned accesses
Claudiu Beznea (7):
hwrng: atmel - add wait for ready support on read
hwrng: atmel - disable trng on failure path
hwrng: atmel - rename enable/disable functions to init/cleanup
hwrng: atmel - move set of TRNG_HALFR in atmel_trng_init()
hwrng: atmel - use __maybe_unused and pm_ptr() for pm ops
hwrng: atmel - add runtime pm support
hwrng: atmel - remove extra line
Colin Ian King (2):
crypto: marvell/octeontx - remove redundant initialization of variable c_size
crypto: sl3516 - remove redundant initializations of pointers in_sg and out_sg
Corentin Labbe (10):
crypto: sun8i-ss - really disable hash on A80
crypto: cavium/nitrox - fix typo on crypto
crypto: rockchip - ECB does not need IV
crypto: cavium/zip - register algorithm only if hardware is present
crypto: sun8i-ss - call finalize with bh disabled
crypto: sun8i-ce - call finalize with bh disabled
crypto: amlogic - call finalize with bh disabled
crypto: gemini - call finalize with bh disabled
crypto: engine - check if BH is disabled during completion
crypto: xilinx: prevent probing on non-xilinx hardware
Dan Carpenter (1):
crypto: qat - fix a signedness bug in get_service_enabled()
Dominik Brodowski (10):
hwrng: core - explicit ordering of initcalls
hwrng: core - read() callback must be called for size of 32 or more bytes
hwrng: core - use rng_fillbuf in add_early_randomness()
hwrng: core - only set cur_rng_set_by_user if it is working
hwrng: core - break out of hwrng_fillfn if current rng is not trusted
hwrng: core - credit entropy for low quality sources of randomness
hwrng: core - do not bother to order list of devices by quality
hwrng: core - start and stop in-kernel rngd in separate function
hwrng: core - use per-rng quality value instead of global setting
hwrng: core - introduce rng_quality sysfs attribute
Dāvis Mosāns (1):
crypto: ccp - ccp_dmaengine_unregister release dma channels
Eric Biggers (5):
crypto: rsa-pkcs1pad - only allow with rsa
crypto: rsa-pkcs1pad - correctly get hash from source scatterlist
crypto: rsa-pkcs1pad - restore signature length check
crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete()
crypto: rsa-pkcs1pad - use clearer variable names
Geert Uytterhoeven (1):
hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER
Gilad Ben-Yossef (1):
crypto: ccree - don't attempt 0 len DMA mappings
Giovanni Cabiddu (5):
crypto: qat - fix access to PFVF interrupt registers for GEN4
crypto: qat - disable registration of algorithms
crypto: qat - remove unneeded assignment
crypto: qat - fix initialization of pfvf cap_msg structures
crypto: qat - fix initialization of pfvf rts_map_msg structures
Harman Kalra (1):
crypto: octeontx2 - add synchronization between mailbox accesses
Harsha (4):
crypto: xilinx - Updated Makefile for xilinx subdirectory
firmware: xilinx: Add ZynqMP SHA API for SHA3 functionality
crypto: xilinx - Add Xilinx SHA3 driver
MAINTAINERS: Add maintainer for Xilinx ZynqMP SHA3 driver
Herbert Xu (6):
crypto: testmgr - Move crypto_simd_disabled_for_test out
crypto: kdf - Select hmac in addition to sha256
crypto: authenc - Fix sleep in atomic context in decrypt_tail
crypto: xts - Add softdep on ecb
crypto: lrw - Add dependency on ecb
crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST
Jianglei Nie (1):
crypto: ccree - Fix use after free in cc_cipher_exit()
Jiapeng Chong (2):
crypto: marvell/octeontx - Use swap() instead of open coding it
crypto: dh - Remove the unused function dh_safe_prime_dh_alg()
Julia Lawall (1):
crypto: ux500 - use GFP_KERNEL
Kai Ye (14):
Documentation: use the tabs on all acc documentation
Documentation: update debugfs doc for Hisilicon SEC
Documentation: update debugfs doc for Hisilicon ZIP
Documentation: update debugfs doc for Hisilicon HPRE
crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
crypto: hisilicon/sec - add some comments for soft fallback
crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
crypto: hisilicon/sec - fix the CTR mode BD configuration
crypto: hisilicon/sec - use the correct print format
crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos
crypto: hisilicon/sec - add the register configuration for HW V3
crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3
crypto: hisilicon/sec - fix the aead software fallback for engine
crypto: hisilicon/qm - fix memset during queues clearing
Kavyasree Kotagiri (1):
crypto: atmel - add support for AES and SHA IPs available on lan966x SoC
Kevin Bracey (4):
lib/crc32: remove unneeded casts
lib/crc32: Make crc32_be weak for arch override
lib/crc32test: correct printed bytes count
arm64: lib: accelerate crc32_be
Longfang Liu (1):
MAINTAINERS: update HPRE/SEC2/TRNG driver maintainers list
Miaoqian Lin (1):
hwrng: nomadik - Change clk_disable to clk_disable_unprepare
Minghao Chi (1):
crypto: ccp - remove redundant ret variable
Nathan Huckleberry (1):
crypto: x86 - Convert to SPDX identifier
Nicolai Stange (15):
crypto: kpp - provide support for KPP template instances
crypto: kpp - provide support for KPP spawns
crypto: dh - remove struct dh's ->q member
crypto: dh - constify struct dh's pointer members
crypto: dh - split out deserialization code from crypto_dh_decode()
crypto: dh - introduce common code for built-in safe-prime group support
crypto: dh - implement ffdheXYZ(dh) templates
crypto: testmgr - add known answer tests for ffdheXYZ(dh) templates
crypto: dh - implement private key generation primitive for ffdheXYZ(dh)
crypto: testmgr - add keygen tests for ffdheXYZ(dh) templates
crypto: dh - allow for passing NULL to the ffdheXYZ(dh)s' ->set_secret()
crypto: api - allow algs only in specific constructions in FIPS mode
crypto: dh - disallow plain "dh" usage in FIPS mode
lib/mpi: export mpi_rshift
crypto: dh - calculate Q from P for the full public key verification
Peter Gonda (1):
crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
Petr Vorel (1):
crypto: vmx - add missing dependencies
Rikard Falkeborn (3):
crypto: omap-aes - Constify static attribute_group
crypto: omap-sham - Constify static attribute_group
crypto: nx - Constify static attribute_group structs
Shijith Thotton (2):
crypto: octeontx2 - select CONFIG_NET_DEVLINK
crypto: octeontx2 - remove CONFIG_DM_CRYPT check
Srujana Challa (3):
crypto: octeontx2 - CN10K CPT to RNM workaround
crypto: octeontx2 - disable DMA black hole on an DMA fault
crypto: octeontx2 - increase CPT HW instruction queue length
Stephan Müller (2):
crypto: hmac - add fips_skip support
crypto: hmac - disallow keys < 112 bits in FIPS mode
Tianjia Zhang (7):
crypto: sm3 - create SM3 stand-alone library
crypto: arm64/sm3-ce - make dependent on sm3 library
crypto: sm2 - make dependent on sm3 library
crypto: sm3 - make dependent on sm3 library
crypto: x86/sm3 - add AVX assembly implementation
crypto: tcrypt - add asynchronous speed test for SM3
crypto: tcrypt - remove all multibuffer ahash tests
Tom Rix (2):
crypto: cleanup comments
crypto: arm64 - cleanup comments
Tomas Paukrt (1):
crypto: mxs-dcp - Fix scatterlist processing
Tudor Ambarus (1):
crypto: atmel-tdes - Add support for the TDES IP available on sama7g5 SoC
Wan Jiabing (1):
hwrng: cavium - fix NULL but dereferenced coccicheck error
Wojciech Ziemba (3):
crypto: qat - add misc workqueue
crypto: qat - move and rename GEN4 error register definitions
crypto: qat - enable power management for QAT GEN4
Yang Yingliang (1):
crypto: octeontx2 - fix missing unlock
YueHaibing (2):
crypto: x86/blowfish - Remove unused inline functions
crypto: x86/des3 - Remove unused inline function des3_ede_enc_blk_3way()
Yury Norov (1):
padata: replace cpumask_weight with cpumask_empty in padata.c
Documentation/ABI/testing/debugfs-hisi-hpre | 178 +--
Documentation/ABI/testing/debugfs-hisi-sec | 146 +-
Documentation/ABI/testing/debugfs-hisi-zip | 146 +-
MAINTAINERS | 11 +-
arch/alpha/include/asm/xor.h | 53 +-
arch/arm/crypto/aes-neonbs-core.S | 105 +-
arch/arm/crypto/aes-neonbs-glue.c | 35 +-
arch/arm/include/asm/xor.h | 42 +-
arch/arm/lib/xor-neon.c | 12 +-
arch/arm64/crypto/Kconfig | 2 +-
arch/arm64/crypto/aes-glue.c | 22 +-
arch/arm64/crypto/aes-modes.S | 18 +-
arch/arm64/crypto/aes-neonbs-core.S | 264 +---
arch/arm64/crypto/aes-neonbs-glue.c | 97 +-
arch/arm64/crypto/sha3-ce-glue.c | 2 +-
arch/arm64/crypto/sha512-armv8.pl | 2 +-
arch/arm64/crypto/sha512-ce-glue.c | 2 +-
arch/arm64/crypto/sm3-ce-glue.c | 28 +-
arch/arm64/include/asm/xor.h | 21 +-
arch/arm64/lib/crc32.S | 87 +-
arch/arm64/lib/xor-neon.c | 46 +-
arch/ia64/include/asm/xor.h | 21 +-
arch/powerpc/include/asm/xor_altivec.h | 25 +-
arch/powerpc/lib/xor_vmx.c | 28 +-
arch/powerpc/lib/xor_vmx.h | 27 +-
arch/powerpc/lib/xor_vmx_glue.c | 32 +-
arch/s390/lib/xor.c | 21 +-
arch/sparc/include/asm/xor_32.h | 21 +-
arch/sparc/include/asm/xor_64.h | 42 +-
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 63 +-
arch/x86/crypto/blowfish_glue.c | 12 -
arch/x86/crypto/des3_ede_glue.c | 8 -
arch/x86/crypto/sm3-avx-asm_64.S | 517 +++++++
arch/x86/crypto/sm3_avx_glue.c | 134 ++
arch/x86/include/asm/xor.h | 42 +-
arch/x86/include/asm/xor_32.h | 42 +-
arch/x86/include/asm/xor_avx.h | 21 +-
crypto/Kconfig | 25 +-
crypto/algapi.c | 48 +-
crypto/api.c | 19 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/asymmetric_keys/x509_parser.h | 2 +-
crypto/async_tx/async_xor.c | 8 +-
crypto/async_tx/raid6test.c | 4 +-
crypto/authenc.c | 2 +-
crypto/cfb.c | 2 +-
crypto/crypto_engine.c | 1 +
crypto/dh.c | 681 ++++++++-
crypto/dh_helper.c | 42 +-
crypto/hmac.c | 4 +
crypto/kpp.c | 29 +
crypto/lrw.c | 1 +
crypto/memneq.c | 22 +-
crypto/rsa-pkcs1pad.c | 38 +-
crypto/sm2.c | 40 +-
crypto/sm3_generic.c | 142 +-
crypto/tcrypt.c | 226 +--
crypto/testmgr.c | 67 +-
crypto/testmgr.h | 1456 +++++++++++++++++++-
crypto/xts.c | 1 +
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/atmel-rng.c | 148 +-
drivers/char/hw_random/cavium-rng-vf.c | 2 +-
drivers/char/hw_random/core.c | 161 ++-
drivers/char/hw_random/nomadik-rng.c | 4 +-
drivers/crypto/Kconfig | 10 +
drivers/crypto/Makefile | 2 +-
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 3 +
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 3 +
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 3 +
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 2 +
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 3 +
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 2 +
drivers/crypto/atmel-aes.c | 1 +
drivers/crypto/atmel-sha.c | 1 +
drivers/crypto/atmel-tdes.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 8 +-
drivers/crypto/cavium/nitrox/nitrox_req.h | 2 +-
drivers/crypto/cavium/zip/zip_main.c | 83 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 5 +-
drivers/crypto/ccp/ccp-dmaengine.c | 16 +
drivers/crypto/ccp/sev-dev.c | 2 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 7 +
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/gemini/sl3516-ce-cipher.c | 6 +-
drivers/crypto/hisilicon/qm.c | 4 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 43 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 6 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 59 +-
drivers/crypto/marvell/Kconfig | 1 +
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 5 +-
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 1 +
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 14 +
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 19 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 25 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 27 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 56 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 17 +-
drivers/crypto/mxs-dcp.c | 2 +-
drivers/crypto/nx/nx-common-pseries.c | 4 +-
drivers/crypto/omap-aes.c | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 23 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 24 -
drivers/crypto/qat/qat_4xxx/adf_drv.c | 7 +
drivers/crypto/qat/qat_common/Makefile | 1 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 2 +
drivers/crypto/qat/qat_common/adf_admin.c | 37 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 4 +
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 6 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 14 +
drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 42 +-
drivers/crypto/qat/qat_common/adf_gen4_pm.c | 137 ++
drivers/crypto/qat/qat_common/adf_gen4_pm.h | 44 +
drivers/crypto/qat/qat_common/adf_init.c | 6 +
drivers/crypto/qat/qat_common/adf_isr.c | 42 +
drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c | 4 +-
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 1 +
drivers/crypto/qat/qat_common/qat_crypto.c | 7 +
drivers/crypto/qat/qat_common/qat_uclo.c | 9 +-
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 1 -
drivers/crypto/ux500/cryp/cryp_core.c | 2 +-
drivers/crypto/ux500/hash/hash_core.c | 2 +-
drivers/crypto/vmx/Kconfig | 4 +
drivers/crypto/xilinx/Makefile | 1 +
drivers/crypto/xilinx/zynqmp-sha.c | 264 ++++
drivers/firmware/xilinx/zynqmp.c | 26 +
.../net/ethernet/marvell/octeontx2/af/rvu_cpt.c | 1 +
include/asm-generic/xor.h | 84 +-
include/crypto/algapi.h | 10 +-
include/crypto/dh.h | 26 +-
include/crypto/internal/kpp.h | 158 +++
include/crypto/sm3.h | 34 +-
include/linux/crypto.h | 9 +
include/linux/firmware/xlnx-zynqmp.h | 8 +
include/linux/raid/xor.h | 21 +-
kernel/padata.c | 2 +-
lib/crc32.c | 14 +-
lib/crc32test.c | 2 +-
lib/crypto/Kconfig | 3 +
lib/crypto/Makefile | 3 +
lib/crypto/sm3.c | 246 ++++
lib/mpi/mpi-bit.c | 1 +
security/keys/dh.c | 2 +-
147 files changed, 5673 insertions(+), 1669 deletions(-)
create mode 100644 arch/x86/crypto/sm3-avx-asm_64.S
create mode 100644 arch/x86/crypto/sm3_avx_glue.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pm.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pm.h
create mode 100644 drivers/crypto/xilinx/zynqmp-sha.c
create mode 100644 lib/crypto/sm3.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.18
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
@ 2022-03-21 23:14 ` Linus Torvalds
2022-03-22 5:49 ` Herbert Xu
2022-03-21 23:18 ` pr-tracker-bot
1 sibling, 1 reply; 146+ messages in thread
From: Linus Torvalds @ 2022-03-21 23:14 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List, Linux Crypto Mailing List
On Sun, Mar 20, 2022 at 4:42 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
So perhaps somewhat ironically, the crypto tree is now the first tree
I'm merging in this merge window that doesn't have a signed tag.
I don't require signed tags for kernel.org pulls, but I really do
heavily prefer them, and they aren't that hard to do.
I'm sure there are several other non-signed pull requests waiting in
the queue, but still, your pull request stands out as being the first
one - out of 27 so far - that didn't have it.
Can I prod you in the direction of making signed tags a part of your
workflow? The tag can contain the details of the pull - in which case
git request-pull will populate the pull request with it - or it can be
just some dummy message and you write the details separately in the
pull request email like you do now.
I know you have a pgp key, because I have one in my keyring from you
going all the way back to 2011. And if you have lost sight of that one
and need to create a new one, that still better going forward than not
signing your pull requests at all..
Linus
^ permalink raw reply [flat|nested] 146+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.18
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
2022-03-21 23:14 ` Linus Torvalds
@ 2022-03-21 23:18 ` pr-tracker-bot
1 sibling, 0 replies; 146+ messages in thread
From: pr-tracker-bot @ 2022-03-21 23:18 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 21 Mar 2022 11:42:35 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93e220a62da36f766b3188e76e234607e41488f9
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Update for 5.4
@ 2019-09-16 8:49 Herbert Xu
2019-09-23 5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2019-09-16 8:49 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Add the ability to abort a skcipher walk.
Algorithms:
- Fix XTS to actually do the stealing.
- Add library helpers for AES and DES for single-block users.
- Add library helpers for SHA256.
- Add new DES key verification helper.
- Add surrounding bits for ESSIV generator.
- Add accelerations for aegis128.
- Add test vectors for lzo-rle.
Drivers:
- Add i.MX8MQ support to caam.
- Add gcm/ccm/cfb/ofb aes support in inside-secure.
- Add ofb/cfb aes support in media-tek.
- Add HiSilicon ZIP accelerator support.
Others:
- Fix potential race condition in padata.
- Use unbound workqueues in padata.
Please note that there is a conflict with mainline due to the
sha256 library change. There is also a conflit with the s390
tree due to changes in the s390 crypto code. Finally there is
a conflict with arm-soc due to a DTS change.
The following changes since commit 5f9e832c137075045d15cd6899ab0505cfb2ca4b:
Linus 5.3-rc1 (2019-07-21 14:05:38 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 9575d1a5c0780ea26ff8dd29c94a32be32ce3c85:
crypto: caam - Cast to long first before pointer conversion (2019-09-13 21:20:47 +1000)
----------------------------------------------------------------
Alexander Sverdlin (1):
crypto: qat - Silence smp_processor_id() warning
Andrey Smirnov (20):
crypto: caam - move DMA mask selection into a function
crypto: caam - simplfy clock initialization
crypto: caam - convert caam_jr_init() to use devres
crypto: caam - request JR IRQ as the last step
crytpo: caam - make use of iowrite64*_hi_lo in wr_reg64
crypto: caam - use ioread64*_hi_lo in rd_reg64
crypto: caam - drop 64-bit only wr/rd_reg64()
crypto: caam - share definition for MAX_SDLEN
crypto: caam - make CAAM_PTR_SZ dynamic
crypto: caam - move cpu_to_caam_dma() selection to runtime
crypto: caam - drop explicit usage of struct jr_outentry
crypto: caam - don't hardcode inpentry size
crypto: caam - select DMA address size at runtime
crypto: caam - always select job ring via RSR on i.MX8MQ
crypto: caam - add clock entry for i.MX8MQ
crypto: caam - make sure clocks are enabled first
crypto: caam - use devres to unmap JR's registers
crypto: caam - check irq_of_parse_and_map for errors
crypto: caam - dispose of IRQ mapping only after IRQ is freed
arm64: dts: imx8mq: Add CAAM node
Anson Huang (2):
hwrng: imx-rngc - use devm_platform_ioremap_resource() to simplify code
hwrng: mxc-rnga - use devm_platform_ioremap_resource() to simplify code
Ard Biesheuvel (103):
crypto: arm/aes-ce - cosmetic/whitespace cleanup
crypto: aes - rename local routines to prevent future clashes
crypto: aes/fixed-time - align key schedule with other implementations
crypto: aes - create AES library based on the fixed time AES code
crypto: x86/aes-ni - switch to generic for fallback and key routines
crypto: x86/aes - drop scalar assembler implementations
crypto: padlock/aes - switch to library version of key expansion routine
crypto: cesa/aes - switch to library version of key expansion routine
crypto: safexcel/aes - switch to library version of key expansion routine
crypto: arm64/ghash - switch to AES library
crypto: arm/aes-neonbs - switch to library version of key expansion routine
crypto: arm64/aes-ccm - switch to AES library
crypto: arm64/aes-neonbs - switch to library version of key expansion routine
crypto: arm64/aes-ce - switch to library version of key expansion routine
crypto: aes-generic - drop key expansion routine in favor of library version
crypto: ctr - add helper for performing a CTR encryption walk
crypto: aes - move sync ctr(aes) to AES library and generic helper
crypto: arm64/aes-ce-cipher - use AES library as fallback
crypto: arm/aes - use native endiannes for key schedule
crypto: arm/aes-ce - provide a synchronous version of ctr(aes)
crypto: arm/aes-neonbs - provide a synchronous version of ctr(aes)
crypto: arm/ghash - provide a synchronous version
bluetooth: switch to AES library
crypto: amcc - switch to AES library for GCM key derivation
crypto: ccp - move to AES library for CMAC key derivation
crypto: chelsio - replace AES cipher calls with library calls
crypto: aes-generic - unexport last-round AES tables
crypto: lib/aes - export sbox and inverse sbox
crypto: arm64/aes-neon - switch to shared AES Sboxes
crypto: arm/aes-cipher - switch to shared AES inverse Sbox
crypto: arm64/aes-cipher - switch to shared AES inverse Sbox
crypto: arm/aes-scalar - unexport en/decryption routines
crypto: morus - remove generic and x86 implementations
crypto: aegis128l/aegis256 - remove x86 and generic implementations
crypto: aegis128 - drop empty TFM init/exit routines
crypto: aegis - avoid prerotated AES tables
crypto: aegis128 - add support for SIMD acceleration
crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
crypto: tcrypt - add a speed test for AEGIS128
crypto: s390/aes - fix name clash after AES library refactor
asm-generic: make simd.h a mandatory include/asm header
crypto: xts - add support for ciphertext stealing
crypto: aegis128 - add support for SIMD acceleration
crypto: aegis128 - provide a SIMD implementation based on NEON intrinsics
crypto: arm64/aegis128 - implement plain NEON version
crypto: des/3des_ede - add new helpers to verify keys
crypto: s390/des - switch to new verification routines
crypto: sparc/des - switch to new verification routines
crypto: atmel/des - switch to new verification routines
crypto: bcm/des - switch to new verification routines
crypto: caam/des - switch to new verification routines
crypto: cpt/des - switch to new verification routines
crypto: nitrox/des - switch to new verification routines
crypto: ccp/des - switch to new verification routines
crypto: ccree/des - switch to new verification routines
crypto: hifn/des - switch to new verification routines
crypto: hisilicon/des - switch to new verification routines
crypto: safexcel/des - switch to new verification routines
crypto: ixp4xx/des - switch to new verification routines
crypto: cesa/des - switch to new verification routines
crypto: n2/des - switch to new verification routines
crypto: omap/des - switch to new verification routines
crypto: picoxcell/des - switch to new verification routines
crypto: qce/des - switch to new verification routines
crypto: rk3288/des - switch to new verification routines
crypto: stm32/des - switch to new verification routines
crypto: sun4i/des - switch to new verification routines
crypto: talitos/des - switch to new verification routines
crypto: ux500/des - switch to new verification routines
crypto: 3des - move verification out of exported routine
crypto: des - remove unused function
crypto: des - split off DES library from generic DES cipher driver
crypto: x86/des - switch to library interface
crypto: des - remove now unused __des3_ede_setkey()
fs: cifs: move from the crypto cipher API to the new DES library interface
crypto: x86/xts - implement support for ciphertext stealing
crypto: s390/xts-aes - invoke fallback for ciphertext stealing
crypto: vmx/xts - use fallback for ciphertext stealing
crypto: s390/aes - fix typo in XTS_BLOCK_SIZE identifier
crypto: n2/des - fix build breakage after DES updates
crypto: arm64/aegis128 - use explicit vector load for permute vectors
crypto: essiv - add tests for essiv in cbc(aes)+sha256 mode
crypto: arm64/aes-cts-cbc - factor out CBC en/decryption of a walk
crypto: arm64/aes - implement accelerated ESSIV/CBC mode
crypto: s5p - deal gracefully with bogus input sizes
crypto: s5p - use correct block size of 1 for ctr(aes)
crypto: ccp - invoke fallback for XTS ciphertext stealing
crypto: arm/aes - fix round key prototypes
crypto: arm/aes-ce - yield the SIMD unit between scatterwalk steps
crypto: arm/aes-ce - switch to 4x interleave
crypto: arm/aes-ce - replace tweak mask literal with composition
crypto: arm/aes-neonbs - replace tweak mask literal with composition
crypto: arm64/aes-neonbs - replace tweak mask literal with composition
crypto: arm64/aes-neon - limit exposed routines if faster driver is enabled
crypto: skcipher - add the ability to abort a skcipher walk
crypto: arm64/aes-cts-cbc-ce - performance tweak
crypto: arm64/aes-cts-cbc - move request context data to the stack
crypto: arm64/aes - implement support for XTS ciphertext stealing
crypto: arm64/aes-neonbs - implement ciphertext stealing for XTS
crypto: arm/aes-ce - implement ciphertext stealing for XTS
crypto: arm/aes-neonbs - implement ciphertext stealing for XTS
crypto: arm/aes-ce - implement ciphertext stealing for CBC
crypto: x86/aes-ni - use AES library instead of single-use AES cipher
Arnd Bergmann (3):
crypto: ccp - Reduce maximum stack usage
crypto: aegis - fix badly optimized clang output
crypto: jitterentropy - build without sanitizer
Bjorn Helgaas (2):
crypto: ccp - Include DMA declarations explicitly
crypto: ccp - Remove unnecessary linux/pci.h include
Christophe JAILLET (1):
crypto: picoxcell - Fix the name of the module in the description of CRYPTO_DEV_PICOXCELL
Chuhong Yuan (4):
crypto: ccp - Replace dma_pool_alloc + memset with dma_pool_zalloc
crypto: atmel-sha204a - Use device-managed registration API
hwrng: drivers - Use device-managed registration API
crypto: cryptd - Use refcount_t for refcount
Colin Ian King (1):
crypto: ccree - fix spelling mistake "configration" -> "configuration"
Daniel Jordan (11):
padata: purge get_cpu and reorder_via_wq from padata_do_serial
padata: initialize pd->cpu with effective cpumask
padata: allocate workqueue internally
workqueue: unconfine alloc/apply/free_workqueue_attrs()
workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs
padata: make padata_do_parallel find alternate callback CPU
crypto: pcrypt - remove padata cpumask notifier
padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible
padata: use separate workqueues for parallel and serial work
padata: unbind parallel jobs from specific CPUs
padata: remove cpu_index from the parallel_queue
Daniel Mack (1):
hwrng: timeriomem - relax check on memory resource size
Denis Efremov (1):
MAINTAINERS: nx crypto: Fix typo in a filepath
Eric Biggers (1):
crypto: ghash - add comment and improve help text
Fuqian Huang (1):
crypto: drivers - Use kmemdup rather than duplicating its implementation
Gary R Hook (2):
crypto: ccp - Log an error message when ccp-crypto fails to load
crypto: ccp - Clean up and exit correctly on allocation failure
Gilad Ben-Yossef (6):
crypto: ccree - drop legacy ivgen support
crypto: ccree - account for TEE not ready to report
crypto: fips - add FIPS test failure notification chain
crypto: ccree - notify TEE on FIPS tests errors
crypto: ccree - use the full crypt length value
crypto: ccree - use std api sg_zero_buffer
Gustavo A. R. Silva (1):
crypto: ux500/crypt - Mark expected switch fall-throughs
Hannah Pan (1):
crypto: testmgr - add tests for lzo-rle
Hans de Goede (17):
crypto: sha256 - Fix some coding style issues
crypto: sha256_generic - Fix some coding style issues
crypto: sha256 - Move lib/sha256.c to lib/crypto
crypto: sha256 - Use get/put_unaligned_be32 to get input, memzero_explicit
crypto: sha256 - Make lib/crypto/sha256.c suitable for generic use
crypto: sha256 - Add sha224 support to sha256 library code
crypto: sha256_generic - Switch to the generic lib/crypto/sha256.c lib code
crypto: sha256 - Add missing MODULE_LICENSE() to lib/crypto/sha256.c
crypto: arm - Rename functions to avoid conflict with crypto/sha256.h
crypto: arm64 - Rename functions to avoid conflict with crypto/sha256.h
crypto: s390 - Rename functions to avoid conflict with crypto/sha256.h
crypto: x86 - Rename functions to avoid conflict with crypto/sha256.h
crypto: ccree - Rename arrays to avoid conflict with crypto/sha256.h
crypto: chelsio - Rename arrays to avoid conflict with crypto/sha256.h
crypto: n2 - Rename arrays to avoid conflict with crypto/sha256.h
crypto: sha256 - Merge crypto/sha256.h into crypto/sha.h
crypto: sha256 - Remove sha256/224_init code duplication
Herbert Xu (9):
crypto: Remove orphan tools/crypto directory
padata: Replace delayed timer with immediate workqueue in padata_reorder
Revert "crypto: aegis128 - add support for SIMD acceleration"
asm-generic: Remove redundant arch-specific rules for simd.h
crypto: hisilicon - Fix warning on printing %p with dma_addr_t
crypto: talitos - Fix build warning in aead_des3_setkey
crypto: skcipher - Unmap pages after an external error
crypto: ux500 - Fix COMPILE_TEST warnings
crypto: caam - Cast to long first before pointer conversion
Hook, Gary (5):
crypto: ccp - Make CCP debugfs support optional
crypto: ccp - Add a module parameter to specify a queue count
crypto: ccp - module parameter to limit the number of enabled CCPs
crypto: ccp - Add a module parameter to control registration for DMA
crypto: ccp - Include the module name in system log messages
Horia Geantă (8):
crypto: caam - defer probing until QMan is available
crypto: caam - fix concurrency issue in givencrypt descriptor
crypto: caam/qi - fix error handling in ERN handler
crypto: caam - fix return code in completion callbacks
crypto: caam - update IV only when crypto operation succeeds
crypto: caam - keep both virtual and dma key addresses
crypto: caam - fix MDHA key derivation for certain user key lengths
crypto: caam/qi - execute library only on DPAA 1.x
Iuliana Prodan (15):
crypto: ccree - check assoclen for rfc4543
crypto: bcm - check assoclen for rfc4543/rfc4106
crypto: gcm - helper functions for assoclen/authsize check
crypto: aes - helper function to validate key length for AES algorithms
crypto: caam - check key length
crypto: caam - check authsize
crypto: caam - check assoclen
crypto: caam - check zero-length input
crypto: caam - update rfc4106 sh desc to support zero length input
crypto: caam - free resources in case caam_rng registration failed
crypto: caam - execute module exit point only if necessary
crypto: caam - unregister algorithm only if the registration succeeded
crypto: caam - change return value in case CAAM has no MDHA
crypto: gcm - restrict assoclen for rfc4543
crypto: caam/qi - use print_hex_dump_debug function to print debug messages
Jonathan Neuschäfer (1):
Documentation: crypto: crypto_engine: Fix Sphinx warning
Mao Wenan (1):
crypto: hisilicon - select CRYPTO_LIB_DES while compiling SEC driver
Masahiro Yamada (3):
crypto: add header include guards
crypto: user - fix potential warnings in cryptouser.h
hwrng: timeriomem - add include guard to timeriomem-rng.h
Nathan Chancellor (1):
lib/mpi: Eliminate unused umul_ppmm definitions for MIPS
Nishka Dasgupta (1):
crypto: nx - Add of_node_put() before return in 842
Ondrej Mosnacek (1):
crypto: user - make NETLINK_CRYPTO work inside netns
Pascal van Leeuwen (36):
crypto: inside-secure - keep ivsize for DES ECB modes at 0
crypto: inside-secure - silently return -EINVAL for input error cases
crypto: inside-secure - fix incorrect skcipher output IV
crypto: inside-secure - fix scatter/gather list to descriptor conversion
crypto: inside-secure - fix EINVAL error (buf overflow) for AEAD decrypt
crypto: inside-secure: back out parts of earlier HMAC update workaround
crypto: inside-secure - let HW deal with initial hash digest
crypto: inside-secure - add support for arbitrary size hash/HMAC updates
crypto: inside-secure - add support for 0 length HMAC messages
crypto: inside-secure - add support for authenc(hmac(sha1),cbc(des3_ede))
crypto: inside-secure - added support for rfc3686(ctr(aes))
crypto: inside-secure - add support for authenc(hmac(sha*),rfc3686(ctr(aes))) suites
crypto: inside-secure -reduce hash byte counters to 64 bits
crypto: inside-secure - Use defines instead of some constants (cosmetic)
crypto: inside-secure - Remove redundant DES ECB & CBC keysize check
crypto: aead - Do not allow authsize=0 if auth. alg has digestsize>0
crypto: inside-secure - make driver selectable for non-Marvell hardware
crypto: inside-secure - Remove redundant algo to engine mapping code
crypto: inside-secure - add support for PCI based FPGA development board
crypto: inside-secure - add support for using the EIP197 without vendor firmware
crypto: inside-secure - Move static cipher alg & mode settings to init
crypto: inside-secure - Add support for the AES-XTS algorithm
crypto: inside-secure - Only enable algorithms advertised by the hardware
crypto: inside-secure - Made .cra_priority value a define
crypto: inside-secure - Minor optimization recognizing CTR is always AES
crypto: inside-secure - Minor code cleanup and optimizations
crypto: inside-secure - Added support for basic AES-GCM
crypto: inside-secure - Added AES-CFB support
crypto: inside-secure - Added AES-OFB support
crypto: inside-secure - Added support for basic AES-CCM
crypto: inside-secure - Add EIP97/EIP197 and endianness detection
crypto: inside-secure: Corrected configuration of EIP96_TOKEN_CTRL
crypto: inside-secure - Enable extended algorithms on newer HW
crypto: inside-secure - Base CD fetchcount on actual CD FIFO size
crypto: inside-secure - Base RD fetchcount on actual RD FIFO size
crypto: inside-secure - Probe transform record cache RAM sizes
Peter Zijlstra (1):
crypto: engine - Reduce default RT priority
Phani Kiran Hemadri (3):
crypto: cavium/nitrox - Add support for loading asymmetric crypto firmware
crypto: cavium/nitrox - Allocate asymmetric crypto command queues
crypto: cavium/nitrox - Configure asymmetric queue manager Hardware unit
Ryder Lee (4):
crypto: mediatek - move mtk_aes_find_dev() to the right place
crypto: mediatek - fix uninitialized value of gctx->textlen
crypto: mediatek - only treat EBUSY as transient if backlog
crypto: mediatek - add support to OFB/CFB mode
Sebastian Andrzej Siewior (1):
crypto: ux500 - Use spinlock_t instead of struct spinlock
Stephen Boyd (4):
crypto: drivers - Remove dev_err() usage after platform_get_irq()
hwrng: core - Freeze khwrng thread during suspend
random: Support freezable kthreads in add_hwgenerator_randomness()
random: Use wait_event_freezable() in add_hwgenerator_randomness()
Stephen Rothwell (1):
hwrng: n2-drv - fix typo
Thomas Gleixner (1):
crypto: api - Remove redundant #ifdef in crypto_yield()
Uri Shir (1):
crypto: ccree - enable CTS support in AES-XTS
Vakul Garg (2):
crypto: caam/qi2 - Increase napi budget to process more caam responses
crypto: caam/qi2 - Add printing dpseci fq stats using debugfs
Vic Wu (1):
crypto: mediatek - fix incorrect crypto key setting
Wei Yongjun (1):
crypto: cavium/zip - Add missing single_release()
YueHaibing (17):
crypto: artpec6 - use devm_platform_ioremap_resource() to simplify code
crypto: ccp - use devm_platform_ioremap_resource() to simplify code
crypto: exynos - use devm_platform_ioremap_resource() to simplify code
crypto: img-hash - use devm_platform_ioremap_resource() to simplify code
crypto: inside-secure - use devm_platform_ioremap_resource() to simplify code
crypto: mediatek - use devm_platform_ioremap_resource() to simplify code
crypto: picoxcell - use devm_platform_ioremap_resource() to simplify code
crypto: sunxi-ss - use devm_platform_ioremap_resource() to simplify code
crypto: rockchip - use devm_platform_ioremap_resource() to simplify code
crypto: stm32 - use devm_platform_ioremap_resource() to simplify code
crypto: qce - use devm_platform_ioremap_resource() to simplify code
crypto: qcom-rng - use devm_platform_ioremap_resource() to simplify code
crypto: aes-generic - remove unused variable 'rco_tab'
crypto: streebog - remove two unused variables
crypto: aegis128 - Fix -Wunused-const-variable warning
crypto: atmel - Fix -Wunused-const-variable warning
crypto: nx - remove unused variables 'nx_driver_string' and 'nx_driver_version'
Zhou Wang (12):
crypto: hisilicon - add queue management driver for HiSilicon QM module
crypto: hisilicon - add hardware SGL support
crypto: hisilicon - add HiSilicon ZIP accelerator support
crypto: hisilicon - add SRIOV support for ZIP
Documentation: Add debugfs doc for hisi_zip
crypto: hisilicon - add debugfs for ZIP and QM
MAINTAINERS: add maintainer for HiSilicon QM and ZIP controller driver
crypto: hisilicon - fix kbuild warnings
crypto: hisilicon - add dependency for CRYPTO_DEV_HISI_ZIP
crypto: hisilicon - init curr_sgl_dma to fix compile warning
crypto: hisilicon - add missing single_release
crypto: hisilicon - fix error handle in hisi_zip_create_req_q
zhong jiang (2):
crypto: arm64/aes - Use PTR_ERR_OR_ZERO rather than its implementation.
crypto: marvell - Use kzfree rather than its implementation
Documentation/ABI/testing/debugfs-hisi-zip | 50 +
Documentation/crypto/crypto_engine.rst | 1 +
.../devicetree/bindings/rng/timeriomem_rng.txt | 2 +-
Documentation/padata.txt | 12 +-
MAINTAINERS | 13 +-
arch/arm/crypto/Kconfig | 2 +-
arch/arm/crypto/aes-ce-core.S | 482 +-
arch/arm/crypto/aes-ce-glue.c | 545 +-
arch/arm/crypto/aes-cipher-core.S | 40 +-
arch/arm/crypto/aes-cipher-glue.c | 11 +-
arch/arm/crypto/aes-neonbs-core.S | 24 +-
arch/arm/crypto/aes-neonbs-glue.c | 160 +-
arch/arm/crypto/ghash-ce-glue.c | 80 +-
arch/arm/crypto/sha256_glue.c | 8 +-
arch/arm/crypto/sha256_neon_glue.c | 24 +-
arch/arm/include/asm/Kbuild | 1 -
arch/arm64/boot/dts/freescale/imx8mq.dtsi | 30 +
arch/arm64/crypto/Kconfig | 10 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 18 +-
arch/arm64/crypto/aes-ce-glue.c | 7 +-
arch/arm64/crypto/aes-ce.S | 3 +
arch/arm64/crypto/aes-cipher-core.S | 40 +-
arch/arm64/crypto/aes-cipher-glue.c | 11 +-
arch/arm64/crypto/aes-ctr-fallback.h | 50 -
arch/arm64/crypto/aes-glue.c | 470 +-
arch/arm64/crypto/aes-modes.S | 135 +-
arch/arm64/crypto/aes-neon.S | 79 +-
arch/arm64/crypto/aes-neonbs-core.S | 9 +-
arch/arm64/crypto/aes-neonbs-glue.c | 140 +-
arch/arm64/crypto/ghash-ce-glue.c | 30 +-
arch/arm64/crypto/sha256-glue.c | 24 +-
arch/powerpc/include/asm/Kbuild | 1 -
arch/s390/crypto/aes_s390.c | 16 +-
arch/s390/crypto/des_s390.c | 25 +-
arch/s390/crypto/ghash_s390.c | 2 +-
arch/s390/crypto/sha256_s390.c | 8 +-
arch/s390/purgatory/Makefile | 4 +-
arch/s390/purgatory/purgatory.c | 2 +-
arch/sparc/crypto/aes_glue.c | 8 +-
arch/sparc/crypto/des_glue.c | 37 +-
arch/x86/crypto/Makefile | 21 -
arch/x86/crypto/aegis128l-aesni-asm.S | 823 ---
arch/x86/crypto/aegis128l-aesni-glue.c | 293 --
arch/x86/crypto/aegis256-aesni-asm.S | 700 ---
arch/x86/crypto/aegis256-aesni-glue.c | 293 --
arch/x86/crypto/aes-i586-asm_32.S | 362 --
arch/x86/crypto/aes-x86_64-asm_64.S | 185 -
arch/x86/crypto/aes_glue.c | 70 -
arch/x86/crypto/aesni-intel_glue.c | 46 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 4 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 4 +-
arch/x86/crypto/cast6_avx_glue.c | 4 +-
arch/x86/crypto/des3_ede_glue.c | 38 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 3 +-
arch/x86/crypto/glue_helper.c | 67 +-
arch/x86/crypto/morus1280-avx2-asm.S | 619 ---
arch/x86/crypto/morus1280-avx2-glue.c | 62 -
arch/x86/crypto/morus1280-sse2-asm.S | 893 ----
arch/x86/crypto/morus1280-sse2-glue.c | 61 -
arch/x86/crypto/morus1280_glue.c | 205 -
arch/x86/crypto/morus640-sse2-asm.S | 612 ---
arch/x86/crypto/morus640-sse2-glue.c | 61 -
arch/x86/crypto/morus640_glue.c | 200 -
arch/x86/crypto/serpent_avx2_glue.c | 4 +-
arch/x86/crypto/serpent_avx_glue.c | 4 +-
arch/x86/crypto/sha256_ssse3_glue.c | 12 +-
arch/x86/crypto/twofish_avx_glue.c | 4 +-
arch/x86/include/asm/crypto/aes.h | 12 -
arch/x86/include/asm/crypto/glue_helper.h | 2 +-
arch/x86/purgatory/Makefile | 4 +-
arch/x86/purgatory/purgatory.c | 2 +-
crypto/Kconfig | 164 +-
crypto/Makefile | 26 +-
crypto/aead.c | 3 +-
crypto/aegis.h | 39 +-
crypto/{aegis128.c => aegis128-core.c} | 74 +-
crypto/aegis128-neon-inner.c | 212 +
crypto/aegis128-neon.c | 49 +
crypto/aegis128l.c | 522 --
crypto/aegis256.c | 473 --
crypto/aes_generic.c | 169 +-
crypto/aes_ti.c | 313 +-
crypto/cryptd.c | 44 +-
crypto/crypto_engine.c | 2 +-
crypto/crypto_user_base.c | 37 +-
crypto/crypto_user_stat.c | 4 +-
crypto/des_generic.c | 945 +---
crypto/fips.c | 11 +
crypto/gcm.c | 47 +-
crypto/ghash-generic.c | 31 +-
crypto/morus1280.c | 542 --
crypto/morus640.c | 533 --
crypto/pcrypt.c | 167 +-
crypto/sha256_generic.c | 224 +-
crypto/skcipher.c | 42 +-
crypto/streebog_generic.c | 46 -
crypto/tcrypt.c | 16 +
crypto/testmgr.c | 52 +-
crypto/testmgr.h | 5284 ++++++--------------
crypto/xts.c | 152 +-
drivers/char/hw_random/atmel-rng.c | 3 +-
drivers/char/hw_random/cavium-rng-vf.c | 11 +-
drivers/char/hw_random/core.c | 5 +-
drivers/char/hw_random/exynos-trng.c | 3 +-
drivers/char/hw_random/imx-rngc.c | 4 +-
drivers/char/hw_random/mxc-rnga.c | 4 +-
drivers/char/hw_random/n2-drv.c | 4 +-
drivers/char/hw_random/nomadik-rng.c | 3 +-
drivers/char/hw_random/omap-rng.c | 3 +-
drivers/char/hw_random/powernv-rng.c | 10 +-
drivers/char/hw_random/st-rng.c | 4 +-
drivers/char/hw_random/timeriomem-rng.c | 4 +-
drivers/char/hw_random/xgene-rng.c | 4 +-
drivers/char/random.c | 4 +-
drivers/crypto/Kconfig | 56 +-
drivers/crypto/amcc/crypto4xx_alg.c | 24 +-
drivers/crypto/atmel-aes.c | 1 -
drivers/crypto/atmel-i2c.c | 12 +
drivers/crypto/atmel-i2c.h | 12 -
drivers/crypto/atmel-sha.c | 1 -
drivers/crypto/atmel-sha204a.c | 3 +-
drivers/crypto/atmel-tdes.c | 29 +-
drivers/crypto/axis/artpec6_crypto.c | 4 +-
drivers/crypto/bcm/cipher.c | 92 +-
drivers/crypto/caam/Kconfig | 4 +-
drivers/crypto/caam/Makefile | 1 +
drivers/crypto/caam/caamalg.c | 268 +-
drivers/crypto/caam/caamalg_desc.c | 56 +-
drivers/crypto/caam/caamalg_desc.h | 4 +-
drivers/crypto/caam/caamalg_qi.c | 257 +-
drivers/crypto/caam/caamalg_qi2.c | 325 +-
drivers/crypto/caam/caamalg_qi2.h | 31 +-
drivers/crypto/caam/caamhash.c | 116 +-
drivers/crypto/caam/caamhash_desc.c | 5 +-
drivers/crypto/caam/caamhash_desc.h | 2 +-
drivers/crypto/caam/caampkc.c | 99 +-
drivers/crypto/caam/caamrng.c | 19 +-
drivers/crypto/caam/compat.h | 2 +-
drivers/crypto/caam/ctrl.c | 255 +-
drivers/crypto/caam/desc_constr.h | 81 +-
drivers/crypto/caam/dpseci-debugfs.c | 79 +
drivers/crypto/caam/dpseci-debugfs.h | 18 +
drivers/crypto/caam/error.c | 64 +-
drivers/crypto/caam/error.h | 2 +-
drivers/crypto/caam/intern.h | 32 +-
drivers/crypto/caam/jr.c | 124 +-
drivers/crypto/caam/key_gen.c | 14 +-
drivers/crypto/caam/pdb.h | 16 +-
drivers/crypto/caam/pkc_desc.c | 8 +-
drivers/crypto/caam/qi.c | 10 +-
drivers/crypto/caam/qi.h | 26 -
drivers/crypto/caam/regs.h | 141 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 26 +-
drivers/crypto/cavium/nitrox/Kconfig | 2 +-
drivers/crypto/cavium/nitrox/nitrox_csr.h | 235 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_dev.h | 8 +-
drivers/crypto/cavium/nitrox/nitrox_hal.c | 158 +-
drivers/crypto/cavium/nitrox/nitrox_hal.h | 6 +-
drivers/crypto/cavium/nitrox/nitrox_lib.c | 66 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 148 +-
drivers/crypto/cavium/nitrox/nitrox_req.h | 30 +
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_sriov.c | 3 +
drivers/crypto/cavium/zip/zip_main.c | 3 +
drivers/crypto/ccp/Kconfig | 9 +
drivers/crypto/ccp/Makefile | 4 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 25 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 3 -
drivers/crypto/ccp/ccp-crypto-des3.c | 7 +-
drivers/crypto/ccp/ccp-crypto-main.c | 4 +-
drivers/crypto/ccp/ccp-crypto.h | 8 +-
drivers/crypto/ccp/ccp-dev-v3.c | 3 +-
drivers/crypto/ccp/ccp-dev-v5.c | 26 +-
drivers/crypto/ccp/ccp-dev.c | 29 +-
drivers/crypto/ccp/ccp-dev.h | 3 +-
drivers/crypto/ccp/ccp-dmaengine.c | 13 +-
drivers/crypto/ccp/ccp-ops.c | 56 +-
drivers/crypto/ccp/psp-dev.h | 1 -
drivers/crypto/ccp/sp-dev.h | 1 -
drivers/crypto/ccp/sp-platform.c | 4 +-
drivers/crypto/ccree/Makefile | 2 +-
drivers/crypto/ccree/cc_aead.c | 129 +-
drivers/crypto/ccree/cc_aead.h | 3 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 21 -
drivers/crypto/ccree/cc_buffer_mgr.h | 2 -
drivers/crypto/ccree/cc_cipher.c | 31 +-
drivers/crypto/ccree/cc_driver.c | 18 +-
drivers/crypto/ccree/cc_driver.h | 10 -
drivers/crypto/ccree/cc_fips.c | 31 +-
drivers/crypto/ccree/cc_hash.c | 153 +-
drivers/crypto/ccree/cc_ivgen.c | 276 -
drivers/crypto/ccree/cc_ivgen.h | 55 -
drivers/crypto/ccree/cc_pm.c | 2 -
drivers/crypto/ccree/cc_request_mgr.c | 47 +-
drivers/crypto/chelsio/Kconfig | 1 +
drivers/crypto/chelsio/chcr_algo.c | 46 +-
drivers/crypto/chelsio/chcr_algo.h | 20 +-
drivers/crypto/chelsio/chcr_crypto.h | 1 -
drivers/crypto/chelsio/chcr_ipsec.c | 19 +-
drivers/crypto/chelsio/chtls/chtls_hw.c | 20 +-
drivers/crypto/exynos-rng.c | 4 +-
drivers/crypto/hifn_795x.c | 32 +-
drivers/crypto/hisilicon/Kconfig | 25 +
drivers/crypto/hisilicon/Makefile | 3 +
drivers/crypto/hisilicon/qm.c | 1913 +++++++
drivers/crypto/hisilicon/qm.h | 215 +
drivers/crypto/hisilicon/sec/sec_algs.c | 18 +-
drivers/crypto/hisilicon/sgl.c | 214 +
drivers/crypto/hisilicon/sgl.h | 24 +
drivers/crypto/hisilicon/zip/Makefile | 2 +
drivers/crypto/hisilicon/zip/zip.h | 71 +
drivers/crypto/hisilicon/zip/zip_crypto.c | 653 +++
drivers/crypto/hisilicon/zip/zip_main.c | 1013 ++++
drivers/crypto/img-hash.c | 5 +-
drivers/crypto/inside-secure/safexcel.c | 1153 ++++-
drivers/crypto/inside-secure/safexcel.h | 226 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 1532 ++++--
drivers/crypto/inside-secure/safexcel_hash.c | 625 +--
drivers/crypto/inside-secure/safexcel_ring.c | 11 +-
drivers/crypto/ixp4xx_crypto.c | 27 +-
drivers/crypto/marvell/cipher.c | 27 +-
drivers/crypto/marvell/hash.c | 3 +-
drivers/crypto/mediatek/mtk-aes.c | 143 +-
drivers/crypto/mediatek/mtk-platform.c | 7 +-
drivers/crypto/mediatek/mtk-sha.c | 4 +-
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/n2_core.c | 42 +-
drivers/crypto/nx/nx-842-powernv.c | 1 +
drivers/crypto/nx/nx.h | 3 -
drivers/crypto/omap-aes.c | 1 -
drivers/crypto/omap-des.c | 28 +-
drivers/crypto/omap-sham.c | 1 -
drivers/crypto/padlock-aes.c | 10 +-
drivers/crypto/picoxcell_crypto.c | 29 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/qce/ablkcipher.c | 55 +-
drivers/crypto/qce/core.c | 4 +-
drivers/crypto/qcom-rng.c | 4 +-
drivers/crypto/rockchip/rk3288_crypto.c | 4 +-
drivers/crypto/rockchip/rk3288_crypto.h | 2 +-
drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 21 +-
drivers/crypto/s5p-sss.c | 7 +-
drivers/crypto/sahara.c | 4 +-
drivers/crypto/stm32/Kconfig | 2 +-
drivers/crypto/stm32/stm32-crc32.c | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 38 +-
drivers/crypto/stm32/stm32-hash.c | 4 +-
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 26 +-
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 4 +-
drivers/crypto/sunxi-ss/sun4i-ss.h | 2 +-
drivers/crypto/talitos.c | 38 +-
drivers/crypto/ux500/Kconfig | 2 +-
drivers/crypto/ux500/cryp/cryp.c | 6 +
drivers/crypto/ux500/cryp/cryp.h | 4 +-
drivers/crypto/ux500/cryp/cryp_core.c | 39 +-
drivers/crypto/ux500/hash/hash_alg.h | 4 +-
drivers/crypto/ux500/hash/hash_core.c | 12 +-
drivers/crypto/virtio/virtio_crypto_algs.c | 4 +-
drivers/crypto/vmx/aes_xts.c | 2 +-
fs/cifs/Kconfig | 2 +-
fs/cifs/cifsfs.c | 1 -
fs/cifs/smbencrypt.c | 18 +-
include/asm-generic/Kbuild | 2 +
include/crypto/aes.h | 58 +-
include/crypto/algapi.h | 2 -
include/crypto/ctr.h | 50 +
include/crypto/des.h | 77 +-
include/crypto/gcm.h | 55 +
include/crypto/ghash.h | 2 +-
include/crypto/internal/cryptouser.h | 7 +-
include/crypto/internal/des.h | 152 +
include/crypto/internal/skcipher.h | 5 +
include/crypto/morus1280_glue.h | 97 -
include/crypto/morus640_glue.h | 97 -
include/crypto/morus_common.h | 18 -
include/crypto/sha.h | 47 +
include/crypto/sha1_base.h | 5 +
include/crypto/sha256_base.h | 29 +-
include/crypto/sha512_base.h | 5 +
include/crypto/sm3_base.h | 5 +
include/linux/fips.h | 7 +
include/linux/padata.h | 29 +-
include/linux/sha256.h | 28 -
include/linux/timeriomem-rng.h | 5 +
include/linux/workqueue.h | 4 +
include/net/net_namespace.h | 3 +
include/uapi/linux/cryptouser.h | 5 +
kernel/padata.c | 307 +-
kernel/workqueue.c | 25 +-
lib/crypto/Makefile | 9 +
lib/crypto/aes.c | 356 ++
lib/crypto/des.c | 902 ++++
lib/{ => crypto}/sha256.c | 150 +-
lib/mpi/longlong.h | 36 +-
net/bluetooth/Kconfig | 3 +-
net/bluetooth/smp.c | 103 +-
tools/crypto/getstat.c | 294 --
298 files changed, 15611 insertions(+), 18397 deletions(-)
create mode 100644 Documentation/ABI/testing/debugfs-hisi-zip
delete mode 100644 arch/arm64/crypto/aes-ctr-fallback.h
delete mode 100644 arch/x86/crypto/aegis128l-aesni-asm.S
delete mode 100644 arch/x86/crypto/aegis128l-aesni-glue.c
delete mode 100644 arch/x86/crypto/aegis256-aesni-asm.S
delete mode 100644 arch/x86/crypto/aegis256-aesni-glue.c
delete mode 100644 arch/x86/crypto/aes-i586-asm_32.S
delete mode 100644 arch/x86/crypto/aes-x86_64-asm_64.S
delete mode 100644 arch/x86/crypto/morus1280-avx2-asm.S
delete mode 100644 arch/x86/crypto/morus1280-avx2-glue.c
delete mode 100644 arch/x86/crypto/morus1280-sse2-asm.S
delete mode 100644 arch/x86/crypto/morus1280-sse2-glue.c
delete mode 100644 arch/x86/crypto/morus1280_glue.c
delete mode 100644 arch/x86/crypto/morus640-sse2-asm.S
delete mode 100644 arch/x86/crypto/morus640-sse2-glue.c
delete mode 100644 arch/x86/crypto/morus640_glue.c
delete mode 100644 arch/x86/include/asm/crypto/aes.h
rename crypto/{aegis128.c => aegis128-core.c} (87%)
create mode 100644 crypto/aegis128-neon-inner.c
create mode 100644 crypto/aegis128-neon.c
delete mode 100644 crypto/aegis128l.c
delete mode 100644 crypto/aegis256.c
delete mode 100644 crypto/morus1280.c
delete mode 100644 crypto/morus640.c
create mode 100644 drivers/crypto/caam/dpseci-debugfs.c
create mode 100644 drivers/crypto/caam/dpseci-debugfs.h
delete mode 100644 drivers/crypto/ccree/cc_ivgen.c
delete mode 100644 drivers/crypto/ccree/cc_ivgen.h
create mode 100644 drivers/crypto/hisilicon/qm.c
create mode 100644 drivers/crypto/hisilicon/qm.h
create mode 100644 drivers/crypto/hisilicon/sgl.c
create mode 100644 drivers/crypto/hisilicon/sgl.h
create mode 100644 drivers/crypto/hisilicon/zip/Makefile
create mode 100644 drivers/crypto/hisilicon/zip/zip.h
create mode 100644 drivers/crypto/hisilicon/zip/zip_crypto.c
create mode 100644 drivers/crypto/hisilicon/zip/zip_main.c
create mode 100644 include/crypto/internal/des.h
delete mode 100644 include/crypto/morus1280_glue.h
delete mode 100644 include/crypto/morus640_glue.h
delete mode 100644 include/crypto/morus_common.h
delete mode 100644 include/linux/sha256.h
create mode 100644 lib/crypto/aes.c
create mode 100644 lib/crypto/des.c
rename lib/{ => crypto}/sha256.c (66%)
delete mode 100644 tools/crypto/getstat.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.4
2019-09-16 8:49 [GIT PULL] Crypto Update for 5.4 Herbert Xu
@ 2019-09-23 5:05 ` Herbert Xu
2019-12-02 6:20 ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2019-09-23 5:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
- Potential boot hang in hwrng.
- Missing switch/break in talitos.
- Bugs and warnings in hisilicon.
- Build warning in inside-secure.
The following changes since commit 9575d1a5c0780ea26ff8dd29c94a32be32ce3c85:
crypto: caam - Cast to long first before pointer conversion (2019-09-13 21:20:47 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to bf6a7a5ad6fa69e48b735be75eeb90569d9584bb:
crypto: hisilicon - avoid unused function warning (2019-09-20 23:05:33 +1000)
----------------------------------------------------------------
Arnd Bergmann (1):
crypto: hisilicon - avoid unused function warning
Gustavo A. R. Silva (1):
crypto: talitos - fix missing break in switch statement
Laurent Vivier (1):
hwrng: core - don't wait on add_early_randomness()
Pascal van Leeuwen (1):
crypto: inside-secure - Fix unused variable warning when CONFIG_PCI=n
Yunfeng Ye (3):
crypto: hisilicon - Fix double free in sec_free_hw_sgl()
crypto: hisilicon - Matching the dma address for dma_pool_free()
crypto: hisilicon - Fix return value check in hisi_zip_acompress()
drivers/char/hw_random/core.c | 2 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 43 ++++++++++++++-----------------
drivers/crypto/hisilicon/zip/zip_crypto.c | 4 +--
drivers/crypto/hisilicon/zip/zip_main.c | 7 ++---
drivers/crypto/inside-secure/safexcel.c | 40 ++++++++++++++++++++--------
drivers/crypto/talitos.c | 1 +
6 files changed, 54 insertions(+), 43 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.5
2019-09-23 5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2019-12-02 6:20 ` Herbert Xu
2019-12-14 8:47 ` Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2019-12-02 6:20 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
- Fix build error in crypto lib code when crypto API is off.
- Fix NULL/error check in hisilicon.
- Fix Kconfig-related build error in talitos.
The following changes since commit 4ee812f6143d78d8ba1399671d78c8d78bf2817c:
crypto: vmx - Avoid weird build failures (2019-11-22 18:48:39 +0800)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 8a6b8f4d7a891ac66db4f97900a86b55c84a5802:
crypto: hisilicon - fix a NULL vs IS_ERR() bug in sec_create_qp_ctx() (2019-11-27 13:08:50 +0800)
----------------------------------------------------------------
Dan Carpenter (1):
crypto: hisilicon - fix a NULL vs IS_ERR() bug in sec_create_qp_ctx()
Herbert Xu (1):
crypto: talitos - Fix build error by selecting LIB_DES
Jason A. Donenfeld (1):
crypto: arch - conditionalize crypto api in arch glue for lib code
arch/arm/crypto/chacha-glue.c | 26 ++++++++++++++++----------
arch/arm/crypto/curve25519-glue.c | 5 +++--
arch/arm/crypto/poly1305-glue.c | 9 ++++++---
arch/arm64/crypto/chacha-neon-glue.c | 5 +++--
arch/arm64/crypto/poly1305-glue.c | 5 +++--
arch/mips/crypto/chacha-glue.c | 6 ++++--
arch/mips/crypto/poly1305-glue.c | 6 ++++--
arch/x86/crypto/blake2s-glue.c | 6 ++++--
arch/x86/crypto/chacha_glue.c | 5 +++--
arch/x86/crypto/curve25519-x86_64.c | 7 ++++---
arch/x86/crypto/poly1305_glue.c | 5 +++--
drivers/crypto/Kconfig | 1 +
drivers/crypto/hisilicon/sec2/sec_crypto.c | 4 ++--
13 files changed, 56 insertions(+), 34 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.5
2019-12-02 6:20 ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
@ 2019-12-14 8:47 ` Herbert Xu
2020-01-15 15:08 ` Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2019-12-14 8:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes another build problem for Wireguard without Crypto
API.
The following changes since commit 8a6b8f4d7a891ac66db4f97900a86b55c84a5802:
crypto: hisilicon - fix a NULL vs IS_ERR() bug in sec_create_qp_ctx() (2019-11-27 13:08:50 +0800)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 84faa307249b341f6ad8de3e1869d77a65e26669:
crypto: arm/curve25519 - add arch-specific key generation function (2019-12-12 14:07:14 +0800)
----------------------------------------------------------------
Jason A. Donenfeld (1):
crypto: arm/curve25519 - add arch-specific key generation function
arch/arm/crypto/curve25519-glue.c | 7 +++++++
1 file changed, 7 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.5
2019-12-14 8:47 ` Herbert Xu
@ 2020-01-15 15:08 ` Herbert Xu
2020-02-13 3:32 ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2020-01-15 15:08 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build problem for the hisilicon driver.
The following changes since commit 84faa307249b341f6ad8de3e1869d77a65e26669:
crypto: arm/curve25519 - add arch-specific key generation function (2019-12-12 14:07:14 +0800)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to cb1eeb75cf3dd84ced81333967200583993dfd73:
crypto: hisilicon/sec2 - Use atomics instead of __sync (2020-01-09 11:28:08 +0800)
----------------------------------------------------------------
Arnd Bergmann (1):
crypto: hisilicon/sec2 - Use atomics instead of __sync
drivers/crypto/hisilicon/sec2/sec.h | 6 +++---
drivers/crypto/hisilicon/sec2/sec_crypto.c | 12 ++++++------
drivers/crypto/hisilicon/sec2/sec_main.c | 14 ++++++++++++--
3 files changed, 21 insertions(+), 11 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.6
2020-01-15 15:08 ` Herbert Xu
@ 2020-02-13 3:32 ` Herbert Xu
2020-04-08 6:15 ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2020-02-13 3:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a Kconfig anomaly when lib/crypto is enabled without
Crypto API.
The following changes since commit 0bc81767c5bd9d005fae1099fb39eb3688370cb1:
crypto: arm/chacha - fix build failured when kernel mode NEON is disabled (2020-01-22 16:21:11 +0800)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 2343d1529aff8b552589f622c23932035ed7a05d:
crypto: Kconfig - allow tests to be disabled when manager is disabled (2020-02-05 17:00:57 +0800)
----------------------------------------------------------------
Jason A. Donenfeld (1):
crypto: Kconfig - allow tests to be disabled when manager is disabled
crypto/Kconfig | 4 ----
1 file changed, 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.7
2020-02-13 3:32 ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
@ 2020-04-08 6:15 ` Herbert Xu
2020-06-11 4:05 ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2020-04-08 6:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a Kconfig dependency for hisilicon as well as a
double free in marvell/octeontx.
The following changes since commit fcb90d51c375d09a034993cda262b68499e233a4:
crypto: af_alg - bool type cosmetics (2020-03-30 11:50:50 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 755bddd1e4eaf9178758bd554c60aaab46fc42ba:
crypto: marvell/octeontx - fix double free of ptr (2020-04-03 15:37:26 +1100)
----------------------------------------------------------------
Colin Ian King (1):
crypto: marvell/octeontx - fix double free of ptr
YueHaibing (1):
crypto: hisilicon - Fix build error
drivers/crypto/hisilicon/Kconfig | 2 ++
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 8 +++++---
2 files changed, 7 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.8
2020-04-08 6:15 ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
@ 2020-06-11 4:05 ` Herbert Xu
2020-08-14 13:18 ` [GIT PULL] Crypto Fixes for 5.9 Herbert Xu
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2020-06-11 4:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains a number of fixes to the omap and nitrox drivers.
The following changes since commit 58ca0060ec4e51208d2eee12198fc55fd9e4feb3:
crypto: hisilicon - fix driver compatibility issue with different versions of devices (2020-05-28 17:27:52 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 320bdbd816156f9ca07e5fed7bfb449f2908dda7:
crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (2020-06-04 22:06:26 +1000)
----------------------------------------------------------------
Christophe JAILLET (1):
crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated
Tero Kristo (7):
crypto: omap-aes - avoid spamming console with self tests
crypto: omap-sham - force kernel driver usage for sha algos
crypto: omap-crypto - fix userspace copied buffer access
crypto: omap-sham - huge buffer access fixes
crypto: omap-sham - fix very small data size handling
crypto: omap-aes - prevent unregistering algorithms twice
crypto: omap-sham - add proper load balancing support for multicore
drivers/crypto/cavium/nitrox/nitrox_main.c | 4 ++--
drivers/crypto/omap-aes-gcm.c | 1 -
drivers/crypto/omap-aes.c | 8 ++++++--
drivers/crypto/omap-crypto.c | 10 ++++++++--
drivers/crypto/omap-sham.c | 101 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------------------------------
5 files changed, 74 insertions(+), 50 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
* [GIT PULL] Crypto Fixes for 5.9
2020-06-11 4:05 ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
@ 2020-08-14 13:18 ` Herbert Xu
2020-08-14 20:34 ` pr-tracker-bot
0 siblings, 1 reply; 146+ messages in thread
From: Herbert Xu @ 2020-08-14 13:18 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in af_alg.
The following changes since commit 3cbfe80737c18ac6e635421ab676716a393d3074:
crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR (2020-07-31 18:25:29 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 21dfbcd1f5cbff9cf2f9e7e43475aed8d072b0dd:
crypto: algif_aead - fix uninitialized ctx->init (2020-08-13 17:09:32 +1000)
----------------------------------------------------------------
Ondrej Mosnacek (1):
crypto: algif_aead - fix uninitialized ctx->init
crypto/algif_aead.c | 6 ------
crypto/algif_skcipher.c | 7 +------
2 files changed, 1 insertion(+), 12 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 146+ messages in thread
end of thread, other threads:[~2024-05-20 16:33 UTC | newest]
Thread overview: 146+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
2020-09-10 0:34 ` Herbert Xu
2020-09-10 2:48 ` pr-tracker-bot
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2020-10-26 17:52 ` pr-tracker-bot
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2020-12-27 17:27 ` pr-tracker-bot
2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
2021-01-18 5:13 ` Herbert Xu
2021-01-18 21:16 ` pr-tracker-bot
2021-01-25 22:36 ` Herbert Xu
2021-01-26 0:01 ` pr-tracker-bot
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2021-07-09 19:20 ` pr-tracker-bot
2021-08-17 1:36 ` Herbert Xu
2021-08-17 2:27 ` pr-tracker-bot
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
2021-09-29 14:51 ` pr-tracker-bot
2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
2021-11-02 4:01 ` Herbert Xu
2021-10-29 18:49 ` pr-tracker-bot
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2021-11-12 20:42 ` pr-tracker-bot
2021-12-22 5:13 ` Herbert Xu
2021-12-22 19:02 ` pr-tracker-bot
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
2022-02-09 18:01 ` pr-tracker-bot
2022-03-16 1:13 ` Herbert Xu
2022-03-17 20:40 ` pr-tracker-bot
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
2022-05-20 5:41 ` Herbert Xu
2022-05-20 6:10 ` pr-tracker-bot
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
2022-06-17 8:29 ` Herbert Xu
2022-06-17 15:29 ` pr-tracker-bot
2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
2022-08-31 17:20 ` pr-tracker-bot
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2022-10-17 17:51 ` pr-tracker-bot
2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
2022-11-02 9:49 ` Herbert Xu
2022-10-28 17:02 ` pr-tracker-bot
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2023-01-06 21:19 ` pr-tracker-bot
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2023-03-05 19:37 ` pr-tracker-bot
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
2023-05-07 18:12 ` pr-tracker-bot
2023-05-29 3:41 ` Herbert Xu
2023-05-29 11:39 ` pr-tracker-bot
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
2023-07-10 17:20 ` pr-tracker-bot
2023-08-21 3:37 ` Herbert Xu
2023-08-21 5:09 ` pr-tracker-bot
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
2023-09-22 2:10 ` Herbert Xu
2023-09-22 16:43 ` pr-tracker-bot
2023-10-10 8:46 ` Herbert Xu
2023-10-10 18:54 ` pr-tracker-bot
2023-10-21 9:23 ` Herbert Xu
2023-10-21 17:57 ` pr-tracker-bot
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2023-11-10 1:30 ` pr-tracker-bot
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2022-08-03 0:57 ` pr-tracker-bot
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2022-10-10 20:56 ` pr-tracker-bot
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
2022-12-14 22:25 ` pr-tracker-bot
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
2023-02-22 2:50 ` pr-tracker-bot
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
2023-04-26 17:06 ` pr-tracker-bot
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
2023-07-01 5:04 ` pr-tracker-bot
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
2023-08-29 19:00 ` pr-tracker-bot
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
2023-11-03 5:52 ` Herbert Xu
2023-11-03 6:32 ` Linus Torvalds
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
2023-11-06 15:25 ` Stephan Mueller
2023-11-10 9:04 ` Geert Uytterhoeven
2023-11-03 2:37 ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
2024-02-08 4:29 ` Herbert Xu
2024-02-08 6:24 ` pr-tracker-bot
2024-02-21 9:10 ` Herbert Xu
2024-02-21 17:17 ` pr-tracker-bot
2024-02-28 8:07 ` Herbert Xu
2024-02-28 17:48 ` pr-tracker-bot
2024-03-06 9:47 ` Herbert Xu
2024-03-06 16:33 ` pr-tracker-bot
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2024-03-25 18:18 ` pr-tracker-bot
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2024-05-20 16:33 ` pr-tracker-bot
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
2024-03-16 4:39 ` Herbert Xu
2024-03-15 21:59 ` pr-tracker-bot
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
2024-05-14 5:17 ` Herbert Xu
2024-05-14 5:41 ` Linus Torvalds
2024-05-14 6:02 ` Herbert Xu
2024-05-14 6:54 ` Lukas Wunner
2024-05-14 17:07 ` Linus Torvalds
2024-05-13 22:38 ` pr-tracker-bot
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2020-10-13 16:24 ` pr-tracker-bot
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2020-12-14 20:56 ` pr-tracker-bot
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
2021-02-22 1:28 ` pr-tracker-bot
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
2021-04-26 15:59 ` pr-tracker-bot
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
2021-06-28 23:36 ` pr-tracker-bot
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
2021-08-30 20:17 ` pr-tracker-bot
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
2021-11-02 4:27 ` pr-tracker-bot
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
2022-01-11 20:53 ` pr-tracker-bot
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
2022-03-21 23:14 ` Linus Torvalds
2022-03-22 5:49 ` Herbert Xu
2022-03-21 23:18 ` pr-tracker-bot
-- strict thread matches above, loose matches on Subject: below --
2019-09-16 8:49 [GIT PULL] Crypto Update for 5.4 Herbert Xu
2019-09-23 5:05 ` [GIT PULL] Crypto Fixes " Herbert Xu
2019-12-02 6:20 ` [GIT PULL] Crypto Fixes for 5.5 Herbert Xu
2019-12-14 8:47 ` Herbert Xu
2020-01-15 15:08 ` Herbert Xu
2020-02-13 3:32 ` [GIT PULL] Crypto Fixes for 5.6 Herbert Xu
2020-04-08 6:15 ` [GIT PULL] Crypto Fixes for 5.7 Herbert Xu
2020-06-11 4:05 ` [GIT PULL] Crypto Fixes for 5.8 Herbert Xu
2020-08-14 13:18 ` [GIT PULL] Crypto Fixes for 5.9 Herbert Xu
2020-08-14 20:34 ` pr-tracker-bot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).