public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [GIT PULL] Crypto Update for 5.9
@ 2020-08-03  4:40 Herbert Xu
  2020-08-03 17:55 ` pr-tracker-bot
                   ` (2 more replies)
  0 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2020-08-03  4:40 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Add support for allocating transforms on a specific NUMA Node.
- Introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY for storage users.

Algorithms:

- Drop PMULL based ghash on arm64.
- Fixes for building with clang on x86.
- Add sha256 helper that does the digest in one go.
- Add SP800-56A rev 3 validation checks to dh.

Drivers:

- Permit users to specify NUMA node in hisilicon/zip.
- Add support for i.MX6 in imx-rngc.
- Add sa2ul crypto driver.
- Add BA431 hwrng driver.
- Add Ingenic JZ4780 and X1000 hwrng driver.
- Spread IRQ affinity in inside-secure and marvell/cesa.

There may be a conflict with the tip tree because of the removal
of arch/x86/include/asm/inst.h.  This file was previously only used
by the Crypto API and just as we stopped using it the tip tree
started using it.  So taking the version from the tip tree should
do the trick.

There is also a conflit witht the jc_docs tree due to unrelated
changes to the same file.  The resolution should be straightforward.

The following changes since commit e04ec0de61c1eb9693179093e83ab8ca68a30d08:

  padata: upgrade smp_mb__after_atomic to smp_mb in padata_do_serial (2020-06-18 17:09:54 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 3cbfe80737c18ac6e635421ab676716a393d3074:

  crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR (2020-07-31 18:25:29 +1000)

----------------------------------------------------------------
Alexander A. Klimov (2):
      hwrng: ks-sa - Replace HTTP links with HTTPS ones
      crypto: Replace HTTP links with HTTPS ones

Andrei Botila (1):
      crypto: caam/qi2 - add support for dpseci_reset()

Andrey Smirnov (1):
      crypto: caam - add clock info for VFxxx SoCs

Ard Biesheuvel (20):
      crypto: arm64/ghash - drop PMULL based shash
      crypto: arm64/gcm - disentangle ghash and gcm setkey() routines
      crypto: arm64/gcm - use variably sized key struct
      crypto: arm64/gcm - use inline helper to suppress indirect calls
      crypto: arm/ghash - use variably sized key struct
      crypto: amlogic-gxl - default to build as module
      crypto: amlogic-gxl - permit async skcipher as fallback
      crypto: omap-aes - permit asynchronous skcipher as fallback
      crypto: sun4i - permit asynchronous skcipher as fallback
      crypto: sun8i-ce - permit asynchronous skcipher as fallback
      crypto: sun8i-ss - permit asynchronous skcipher as fallback
      crypto: ccp - permit asynchronous skcipher as fallback
      crypto: chelsio - permit asynchronous skcipher as fallback
      crypto: mxs-dcp - permit asynchronous skcipher as fallback
      crypto: picoxcell - permit asynchronous skcipher as fallback
      crypto: qce - permit asynchronous skcipher as fallback
      crypto: sahara - permit asynchronous skcipher as fallback
      crypto: mediatek - use AES library for GCM key derivation
      crypto: x86/chacha-sse3 - use unaligned loads for state array
      crypto: xts - Replace memcpy() invocation with simple assignment

Arnd Bergmann (1):
      crypto: x86/crc32c - fix building with clang ias

Barry Song (2):
      crypto: api - permit users to specify numa node of acomp hardware
      crypto: hisilicon/zip - permit users to specify NUMA node

Christophe JAILLET (2):
      crypto: chelsio - Avoid some code duplication
      crypto: chelsio - Fix some pr_xxx messages

Colin Ian King (4):
      crypto: caam/qi2 - remove redundant assignment to ret
      crypto: ccp - remove redundant assignment to variable ret
      crypto: img-hash - remove redundant initialization of variable err
      hwrng: core - remove redundant initialization of variable ret

Dan Carpenter (1):
      crypto: hisilicon - allow smaller reads in debugfs

Dan Douglass (1):
      crypto: caam/jr - remove incorrect reference to caam_jr_register()

Daniel Jordan (6):
      padata: remove start function
      padata: remove stop function
      padata: inline single call of pd_setup_cpumasks()
      padata: remove effective cpumasks from the instance
      padata: fold padata_alloc_possible() into padata_alloc()
      padata: remove padata_parallel_queue

Dinghao Liu (1):
      crypto: sun8i-ce - Fix runtime PM imbalance in sun8i_ce_cipher_init

Eric Biggers (14):
      crc-t10dif: use fallback in initial state
      crc-t10dif: clean up some more things
      crypto: sparc - rename sha256 to sha256_alg
      crypto: lib/sha256 - add sha256() function
      efi: use sha256() instead of open coding
      mptcp: use sha256() instead of open coding
      ASoC: cros_ec_codec: use sha256() instead of open coding
      crypto: geniv - remove unneeded arguments from aead_geniv_alloc()
      crypto: seqiv - remove seqiv_create()
      crypto: algapi - use common mechanism for inheriting flags
      crypto: algapi - add NEED_FALLBACK to INHERITED_FLAGS
      crypto: algapi - introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY
      crypto: xts - prefix function and struct names with "xts"
      crypto: lrw - prefix function and struct names with "lrw"

Fenghua Yu (1):
      crypto: hisilicon/qm - Change type of pasid to u32

Franck LENORMAND (1):
      crypto: caam - remove deadcode on 32-bit platforms

Geert Uytterhoeven (1):
      hwrng: ba431 - HW_RANDOM_BA431 should not default to y

Gilad Ben-Yossef (3):
      crypto: ccree - fix resource leak on error path
      crypto: ccree - adapt ccree essiv support to kcapi
      crypto: ccree - remove unused field

Giovanni Cabiddu (6):
      crypto: qat - convert to SPDX License Identifiers
      crypto: qat - remove packed attribute in etr structs
      crypto: qat - allow xts requests not multiple of block
      crypto: qat - validate xts key
      crypto: qat - remove unused field in skcipher ctx
      crypto: qat - fallback for xts with 192 bit keys

Gustavo A. R. Silva (1):
      crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR

Herbert Xu (25):
      crypto: algif_aead - Only wake up when ctx->more is zero
      crc-t10dif: Fix potential crypto notify dead-lock
      crypto: caam - Fix argument type in handle_imx6_err005766
      crypto: octeontx - Fix sparse warnings
      crypto: omap-des - Fix sparse/compiler warnings
      crypto: omap-sham - Fix sparse/compiler warnings
      crypto: api - Prune inclusions in crypto.h
      crypto: cpt - Fix sparse warnings
      Merge branch 'ux500'
      hwrng: npcm - Fix W=1 unused variable warning
      hwrng: omap - Fix W=1 unused variable warning
      hwrng: hisi - Fix W=1 unused variable warning
      hwrng: bcm2835 - Fix W=1 unused variable warning
      hwrng: st - Fix W=1 unused variable warning
      hwrng: pic32 - Fix W=1 unused variable warning
      hwrng: octeon - Fix sparse warnings
      hwrng: ba431 - Add dependency on HAS_IOMEM
      crypto: af_alg - Fix regression on empty requests
      crypto: ccp - Fix sparse warnings
      crypto: caam - Remove broken arc4 support
      hwrng: ba431 - Include kernel.h
      crypto: lib/chacha20poly1305 - Add missing function declaration
      crypto: ccp - Silence strncpy warning
      crypto: omap-aes - Fix sparse and compiler warnings
      crypto: x86/curve25519 - Remove unused carry variables

Horia Geantă (8):
      crypto: caam/qi2 - fix return code in ahash_finup_no_ctx()
      dt-bindings: rng: add RNGB compatibles for i.MX6 SoCs
      hwrng: imx-rngc - enable driver for i.MX6
      crypto: caam/qi2 - fix error reporting for caam_hash_alloc
      crypto: caam/qi2 - create ahash shared descriptors only once
      crypto: caam - silence .setkey in case of bad key length
      crypto: caam - add more RNG hw error codes
      crypto: caam/qi2 - add module alias

Hui Tang (2):
      crypto: hisilicon/hpre - HPRE_OVERTIME_THRHLD can be written by debugfs
      crypto: hisilicon/hpre - disable FLR triggered by hardware

Jian Cai (1):
      crypto: aesni - add compatibility with IAS

John Allen (1):
      crypto: ccp - Fix use of merged scatterlists

Kai Ye (2):
      crypto: hisilicon/sec2 - clear SEC debug regs
      crypto:hisilicon/sec2 - update busy processing logic

Keerthy (4):
      dt-bindings: crypto: Add TI SA2UL crypto accelerator documentation
      crypto: sa2ul - Add crypto driver
      crypto: sa2ul - add sha1/sha256/sha512 support
      crypto: sa2ul - Add AEAD algorithm support

Lee Jones (1):
      crypto: ux500/hash - Add namespacing to hash_init()

Longfang Liu (4):
      crypto: hisilicon - update SEC driver module parameter
      crypto: hisilicon/sec2 - update SEC initialization and reset
      crypto: hisilicon/sec2 - update debugfs interface parameters
      crypto: hisilicon/sec2 - fix some coding styles

Marcelo Henrique Cerri (1):
      lib/mpi: Add mpi_sub_ui()

Meng Yu (4):
      crypto: hisilicon/hpre - Init the value of current_q of debugfs
      crypto: hisilicon/hpre - Modify the Macro definition and format
      crypto: hisilicon/hpre - Add a switch in sriov_configure
      crypto: hisilicon/hpre - update debugfs interface parameters

Mikulas Patocka (3):
      crypto: cpt - don't sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified
      crypto: hisilicon - don't sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified
      crypto: drivers - set the flag CRYPTO_ALG_ALLOCATES_MEMORY

Olivier Sobrie (2):
      dt-bindings: rng: document Silex Insight BA431 hwrng
      hwrng: ba431 - add support for BA431 hwrng

Randy Dunlap (3):
      crypto: hash - drop duplicated word in a comment
      crypto: skcipher - drop duplicated word in kernel-doc
      crypto: testmgr - delete duplicated words

Rikard Falkeborn (4):
      hwrng: bcm2835 - Constify bcm2835_rng_devtype[]
      hwrng: nomadik - Constify nmk_rng_ids[]
      hwrng: virtio - Constify id_table[]
      crypto: virtio - constify features[] and id_table[]

Sedat Dilek (1):
      crypto: aesni - Fix build with LLVM_IAS=1

Sivaprakash Murugesan (3):
      crypto: qce - support zero length test vectors
      crypto: qce - re-initialize context on import
      crypto: qce/sha - Do not modify scatterlist passed along with request

Stephan Müller (4):
      crypto: ecdh - check validity of Z before export
      crypto: dh - check validity of Z before export
      crypto: dh - SP800-56A rev 3 local public key validation
      crypto: ecc - SP800-56A rev 3 local public key validation

Sven Auhagen (2):
      crypto: inside-secure - irq balance
      crypto: marvell/cesa - irq balance

Tero Kristo (1):
      crypto: sa2ul - add device links to child devices

Tom Lendacky (1):
      crypto: ccp - Update CCP driver maintainer information

Tom Rix (1):
      crypto: qat - fix double free in qat_uclo_create_batch_init_list

Uros Bizjak (2):
      crypto: x86 - Remove include/asm/inst.h
      crypto: x86 - Put back integer parts of include/asm/inst.h

Vaibhav Gupta (1):
      crypto: ccp - use generic power management

Wojciech Ziemba (5):
      crypto: qat - replace user types with kernel u types
      crypto: qat - replace user types with kernel ABI __u types
      crypto: qat - update fw init admin msg
      crypto: qat - send admin messages to set of AEs
      crypto: qat - update timeout logic in put admin msg

Zhangfei Gao (1):
      crypto: hisilicon - fix strncpy warning with strscpy

周琰杰 (Zhou Yanjie) (2):
      dt-bindings: RNG: Add Ingenic RNG bindings.
      crypto: ingenic - Add hardware RNG for Ingenic JZ4780 and X1000

 Documentation/core-api/padata.rst                                  |   18 +-
 Documentation/crypto/api-intro.txt                                 |    2 +-
 Documentation/crypto/userspace-if.rst                              |    4 +-
 Documentation/devicetree/bindings/crypto/ti,sa2ul.yaml             |   76 +++++
 Documentation/devicetree/bindings/rng/imx-rng.txt                  |    3 +
 Documentation/devicetree/bindings/rng/ingenic,rng.yaml             |   36 +++
 Documentation/devicetree/bindings/rng/silex-insight,ba431-rng.yaml |   36 +++
 MAINTAINERS                                                        |    9 +
 arch/arm/crypto/crc32-ce-core.S                                    |    2 +-
 arch/arm/crypto/ghash-ce-glue.c                                    |   51 ++-
 arch/arm/crypto/sha1-armv4-large.S                                 |    2 +-
 arch/arm/crypto/sha256-armv4.pl                                    |    2 +-
 arch/arm/crypto/sha256-core.S_shipped                              |    2 +-
 arch/arm/crypto/sha512-armv4.pl                                    |    4 +-
 arch/arm/crypto/sha512-core.S_shipped                              |    4 +-
 arch/arm64/crypto/ghash-ce-glue.c                                  |  257 ++++++---------
 arch/sparc/crypto/sha256_glue.c                                    |   14 +-
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S                            |   15 +-
 arch/x86/crypto/aesni-intel_asm.S                                  |  739 +++++++++++++++++++++---------------------
 arch/x86/crypto/aesni-intel_avx-x86_64.S                           |    1 -
 arch/x86/crypto/chacha-ssse3-x86_64.S                              |   16 +-
 arch/x86/crypto/chacha_glue.c                                      |   17 +-
 arch/x86/crypto/crc32-pclmul_asm.S                                 |   47 ++-
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S                          |    7 +-
 arch/x86/crypto/curve25519-x86_64.c                                |    6 +-
 arch/x86/crypto/ghash-clmulni-intel_asm.S                          |   17 +-
 arch/x86/include/asm/inst.h                                        |  163 ----------
 crypto/Kconfig                                                     |   46 +--
 crypto/acompress.c                                                 |    8 +
 crypto/adiantum.c                                                  |   14 +-
 crypto/af_alg.c                                                    |   11 +-
 crypto/algapi.c                                                    |   21 +-
 crypto/algif_aead.c                                                |    4 +-
 crypto/algif_skcipher.c                                            |    4 +-
 crypto/api.c                                                       |   24 +-
 crypto/authenc.c                                                   |   14 +-
 crypto/authencesn.c                                                |   14 +-
 crypto/blake2b_generic.c                                           |    2 +-
 crypto/camellia_generic.c                                          |    2 +-
 crypto/ccm.c                                                       |   33 +-
 crypto/chacha20poly1305.c                                          |   14 +-
 crypto/cmac.c                                                      |    5 +-
 crypto/cryptd.c                                                    |   59 ++--
 crypto/ctr.c                                                       |   17 +-
 crypto/cts.c                                                       |   13 +-
 crypto/dh.c                                                        |   38 +++
 crypto/ecc.c                                                       |   44 ++-
 crypto/ecc.h                                                       |   14 +
 crypto/echainiv.c                                                  |    2 +-
 crypto/essiv.c                                                     |   11 +-
 crypto/gcm.c                                                       |   40 +--
 crypto/geniv.c                                                     |   19 +-
 crypto/hmac.c                                                      |    5 +-
 crypto/internal.h                                                  |   23 +-
 crypto/jitterentropy.c                                             |    4 +-
 crypto/lrw.c                                                       |  134 ++++----
 crypto/pcrypt.c                                                    |   31 +-
 crypto/rsa-pkcs1pad.c                                              |   13 +-
 crypto/salsa20_generic.c                                           |    4 +-
 crypto/seqiv.c                                                     |   18 +-
 crypto/sha3_generic.c                                              |    2 +-
 crypto/simd.c                                                      |    6 +-
 crypto/skcipher.c                                                  |   13 +-
 crypto/testmgr.h                                                   |   10 +-
 crypto/vmac.c                                                      |    5 +-
 crypto/xcbc.c                                                      |    5 +-
 crypto/xts.c                                                       |  154 +++++----
 drivers/char/hw_random/Kconfig                                     |   27 +-
 drivers/char/hw_random/Makefile                                    |    2 +
 drivers/char/hw_random/ba431-rng.c                                 |  235 ++++++++++++++
 drivers/char/hw_random/bcm2835-rng.c                               |    5 +-
 drivers/char/hw_random/core.c                                      |    2 +-
 drivers/char/hw_random/hisi-rng.c                                  |    2 +-
 drivers/char/hw_random/ingenic-rng.c                               |  154 +++++++++
 drivers/char/hw_random/ks-sa-rng.c                                 |    2 +-
 drivers/char/hw_random/nomadik-rng.c                               |    2 +-
 drivers/char/hw_random/npcm-rng.c                                  |    2 +-
 drivers/char/hw_random/octeon-rng.c                                |    6 +-
 drivers/char/hw_random/omap-rng.c                                  |   11 +-
 drivers/char/hw_random/pic32-rng.c                                 |    2 +-
 drivers/char/hw_random/st-rng.c                                    |    3 +-
 drivers/char/hw_random/virtio-rng.c                                |    2 +-
 drivers/crypto/Kconfig                                             |   19 +-
 drivers/crypto/Makefile                                            |    1 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c                |   46 +--
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h                       |    3 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c                |   42 +--
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c                  |   12 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h                       |    8 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c                |   39 +--
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c                  |   12 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h                       |   26 +-
 drivers/crypto/amlogic/Kconfig                                     |    2 +-
 drivers/crypto/amlogic/amlogic-gxl-cipher.c                        |   27 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c                          |    6 +-
 drivers/crypto/amlogic/amlogic-gxl.h                               |    3 +-
 drivers/crypto/axis/artpec6_crypto.c                               |   20 +-
 drivers/crypto/bcm/cipher.c                                        |   72 +++--
 drivers/crypto/caam/caamalg.c                                      |   37 +--
 drivers/crypto/caam/caamalg_qi.c                                   |    8 +-
 drivers/crypto/caam/caamalg_qi2.c                                  |   42 ++-
 drivers/crypto/caam/caamhash.c                                     |    2 +-
 drivers/crypto/caam/compat.h                                       |    1 -
 drivers/crypto/caam/ctrl.c                                         |   12 +-
 drivers/crypto/caam/dpseci.c                                       |   18 ++
 drivers/crypto/caam/dpseci.h                                       |    2 +
 drivers/crypto/caam/dpseci_cmd.h                                   |    1 +
 drivers/crypto/caam/error.c                                        |    3 +
 drivers/crypto/caam/jr.c                                           |    3 +-
 drivers/crypto/caam/regs.h                                         |   11 +-
 drivers/crypto/cavium/cpt/cptvf_algs.c                             |   28 +-
 drivers/crypto/cavium/cpt/cptvf_reqmanager.c                       |   24 +-
 drivers/crypto/cavium/cpt/request_manager.h                        |   26 +-
 drivers/crypto/cavium/nitrox/nitrox_aead.c                         |    4 +-
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c                     |   16 +-
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c                           |    1 +
 drivers/crypto/ccp/ccp-crypto-aes-galois.c                         |    1 +
 drivers/crypto/ccp/ccp-crypto-aes-xts.c                            |   34 +-
 drivers/crypto/ccp/ccp-crypto-aes.c                                |    2 +
 drivers/crypto/ccp/ccp-crypto-des3.c                               |    1 +
 drivers/crypto/ccp/ccp-crypto-sha.c                                |    4 +-
 drivers/crypto/ccp/ccp-crypto.h                                    |    4 +-
 drivers/crypto/ccp/ccp-dev-v5.c                                    |    8 +-
 drivers/crypto/ccp/ccp-dev.c                                       |    4 +-
 drivers/crypto/ccp/ccp-dev.h                                       |   13 +-
 drivers/crypto/ccp/ccp-ops.c                                       |   43 ++-
 drivers/crypto/ccp/sp-dev.c                                        |    6 +-
 drivers/crypto/ccp/sp-dev.h                                        |    6 +-
 drivers/crypto/ccp/sp-pci.c                                        |   17 +-
 drivers/crypto/ccp/sp-platform.c                                   |    2 +-
 drivers/crypto/ccree/cc_cipher.c                                   |  149 ++++++---
 drivers/crypto/chelsio/chcr_algo.c                                 |   87 +++--
 drivers/crypto/chelsio/chcr_crypto.h                               |    3 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c                          |  111 ++++---
 drivers/crypto/hisilicon/qm.c                                      |   43 +--
 drivers/crypto/hisilicon/qm.h                                      |    1 +
 drivers/crypto/hisilicon/sec/sec_algs.c                            |   58 ++--
 drivers/crypto/hisilicon/sec2/sec.h                                |    4 +
 drivers/crypto/hisilicon/sec2/sec_crypto.c                         |   95 ++++--
 drivers/crypto/hisilicon/sec2/sec_main.c                           |  132 ++++----
 drivers/crypto/hisilicon/zip/zip.h                                 |    2 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c                          |    6 +-
 drivers/crypto/hisilicon/zip/zip_main.c                            |    5 +-
 drivers/crypto/img-hash.c                                          |    2 +-
 drivers/crypto/inside-secure/safexcel.c                            |   13 +-
 drivers/crypto/inside-secure/safexcel.h                            |    3 +
 drivers/crypto/inside-secure/safexcel_cipher.c                     |   47 +++
 drivers/crypto/inside-secure/safexcel_hash.c                       |   18 ++
 drivers/crypto/ixp4xx_crypto.c                                     |    6 +-
 drivers/crypto/marvell/cesa/cesa.c                                 |   11 +-
 drivers/crypto/marvell/cesa/cesa.h                                 |    1 +
 drivers/crypto/marvell/cesa/cipher.c                               |   18 +-
 drivers/crypto/marvell/cesa/hash.c                                 |    6 +
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c                  |    8 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h                  |    2 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c                   |   51 ++-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.h                   |    6 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.c                 |    9 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.h                 |   24 +-
 drivers/crypto/mediatek/mtk-aes.c                                  |   63 +---
 drivers/crypto/mxs-dcp.c                                           |   33 +-
 drivers/crypto/n2_core.c                                           |    3 +-
 drivers/crypto/omap-aes.c                                          |   41 ++-
 drivers/crypto/omap-aes.h                                          |    3 +-
 drivers/crypto/omap-des.c                                          |    6 +-
 drivers/crypto/omap-sham.c                                         |   18 +-
 drivers/crypto/picoxcell_crypto.c                                  |   55 ++--
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c                   |   48 +--
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h                   |   48 +--
 drivers/crypto/qat/qat_c3xxx/adf_drv.c                             |   48 +--
 drivers/crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c               |   48 +--
 drivers/crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h               |   48 +--
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c                           |   48 +--
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c                     |   48 +--
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h                     |   48 +--
 drivers/crypto/qat/qat_c62x/adf_drv.c                              |   48 +--
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c                 |   48 +--
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h                 |   48 +--
 drivers/crypto/qat/qat_c62xvf/adf_drv.c                            |   48 +--
 drivers/crypto/qat/qat_common/adf_accel_devices.h                  |  102 ++----
 drivers/crypto/qat/qat_common/adf_accel_engine.c                   |   52 +--
 drivers/crypto/qat/qat_common/adf_admin.c                          |  144 ++++-----
 drivers/crypto/qat/qat_common/adf_aer.c                            |   50 +--
 drivers/crypto/qat/qat_common/adf_cfg.c                            |   48 +--
 drivers/crypto/qat/qat_common/adf_cfg.h                            |   48 +--
 drivers/crypto/qat/qat_common/adf_cfg_common.h                     |   72 +----
 drivers/crypto/qat/qat_common/adf_cfg_strings.h                    |   48 +--
 drivers/crypto/qat/qat_common/adf_cfg_user.h                       |   58 +---
 drivers/crypto/qat/qat_common/adf_common_drv.h                     |   60 +---
 drivers/crypto/qat/qat_common/adf_ctl_drv.c                        |   52 +--
 drivers/crypto/qat/qat_common/adf_dev_mgr.c                        |   56 +---
 drivers/crypto/qat/qat_common/adf_hw_arbiter.c                     |   48 +--
 drivers/crypto/qat/qat_common/adf_init.c                           |   48 +--
 drivers/crypto/qat/qat_common/adf_isr.c                            |   48 +--
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c                      |   49 +--
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h                      |   48 +--
 drivers/crypto/qat/qat_common/adf_sriov.c                          |   48 +--
 drivers/crypto/qat/qat_common/adf_transport.c                      |  110 ++-----
 drivers/crypto/qat/qat_common/adf_transport.h                      |   52 +--
 drivers/crypto/qat/qat_common/adf_transport_access_macros.h        |   54 +---
 drivers/crypto/qat/qat_common/adf_transport_debug.c                |   48 +--
 drivers/crypto/qat/qat_common/adf_transport_internal.h             |   75 +----
 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c                      |   48 +--
 drivers/crypto/qat/qat_common/adf_vf_isr.c                         |   48 +--
 drivers/crypto/qat/qat_common/icp_qat_fw.h                         |  106 ++----
 drivers/crypto/qat/qat_common/icp_qat_fw_init_admin.h              |  145 ++++-----
 drivers/crypto/qat/qat_common/icp_qat_fw_la.h                      |  206 +++++-------
 drivers/crypto/qat/qat_common/icp_qat_fw_loader_handle.h           |   48 +--
 drivers/crypto/qat/qat_common/icp_qat_fw_pke.h                     |  100 ++----
 drivers/crypto/qat/qat_common/icp_qat_hal.h                        |   48 +--
 drivers/crypto/qat/qat_common/icp_qat_hw.h                         |   64 +---
 drivers/crypto/qat/qat_common/icp_qat_uclo.h                       |   54 +---
 drivers/crypto/qat/qat_common/qat_algs.c                           |  211 +++++++-----
 drivers/crypto/qat/qat_common/qat_asym_algs.c                      |   61 +---
 drivers/crypto/qat/qat_common/qat_crypto.c                         |   48 +--
 drivers/crypto/qat/qat_common/qat_crypto.h                         |   48 +--
 drivers/crypto/qat/qat_common/qat_hal.c                            |   88 ++---
 drivers/crypto/qat/qat_common/qat_uclo.c                           |   77 ++---
 drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c             |   74 +----
 drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h             |   48 +--
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c                          |   48 +--
 drivers/crypto/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c         |   48 +--
 drivers/crypto/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h         |   48 +--
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c                        |   48 +--
 drivers/crypto/qce/cipher.h                                        |    3 +-
 drivers/crypto/qce/common.h                                        |    2 +
 drivers/crypto/qce/sha.c                                           |   36 ++-
 drivers/crypto/qce/skcipher.c                                      |   43 +--
 drivers/crypto/sa2ul.c                                             | 2420 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 drivers/crypto/sa2ul.h                                             |  403 +++++++++++++++++++++++
 drivers/crypto/sahara.c                                            |   96 +++---
 drivers/crypto/talitos.c                                           |  117 ++++---
 drivers/crypto/ux500/hash/hash_core.c                              |   18 +-
 drivers/crypto/virtio/virtio_crypto_algs.c                         |    3 +-
 drivers/crypto/virtio/virtio_crypto_core.c                         |    4 +-
 drivers/crypto/xilinx/zynqmp-aes-gcm.c                             |    1 +
 drivers/firmware/efi/embedded-firmware.c                           |    9 +-
 include/crypto/acompress.h                                         |   18 ++
 include/crypto/algapi.h                                            |   25 +-
 include/crypto/chacha.h                                            |    4 -
 include/crypto/chacha20poly1305.h                                  |    2 +
 include/crypto/hash.h                                              |    2 +-
 include/crypto/if_alg.h                                            |    4 +-
 include/crypto/internal/geniv.h                                    |    2 +-
 include/crypto/sha.h                                               |    1 +
 include/crypto/skcipher.h                                          |    2 +-
 include/linux/crypto.h                                             |   41 ++-
 include/linux/mpi.h                                                |    3 +
 include/linux/padata.h                                             |   21 +-
 kernel/padata.c                                                    |  177 +++-------
 lib/crc-t10dif.c                                                   |   75 +++--
 lib/crypto/chacha20poly1305.c                                      |    2 -
 lib/crypto/sha256.c                                                |   10 +
 lib/mpi/Makefile                                                   |    1 +
 lib/mpi/mpi-sub-ui.c                                               |   78 +++++
 net/mptcp/crypto.c                                                 |   15 +-
 sound/soc/codecs/cros_ec_codec.c                                   |   27 +-
 257 files changed, 6648 insertions(+), 5497 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/ti,sa2ul.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/ingenic,rng.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/silex-insight,ba431-rng.yaml
 create mode 100644 drivers/char/hw_random/ba431-rng.c
 create mode 100644 drivers/char/hw_random/ingenic-rng.c
 create mode 100644 drivers/crypto/sa2ul.c
 create mode 100644 drivers/crypto/sa2ul.h
 create mode 100644 lib/mpi/mpi-sub-ui.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.9
  2020-08-03  4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
@ 2020-08-03 17:55 ` pr-tracker-bot
  2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
  2020-10-12  3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-08-03 17:55 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 3 Aug 2020 14:40:24 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ab5c60b79ab6cc50b39bbb21b2f9fb55af900b84

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.9
  2020-08-03  4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
  2020-08-03 17:55 ` pr-tracker-bot
@ 2020-08-30 22:33 ` Herbert Xu
  2020-08-30 23:02   ` pr-tracker-bot
                     ` (2 more replies)
  2020-10-12  3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2020-08-30 22:33 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes the following issues:

- Regression in af_alg that affects iwd.
- Restore polling delay in qat.
- Double free in ingenic on error path.
- Potential build failure in sa2ul due to missing Kconfig dependency.

The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5:

  Linux 5.9-rc1 (2020-08-16 13:04:57 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to c195d66a8a75c60515819b101975f38b7ec6577f:

  crypto: af_alg - Work around empty control messages without MSG_MORE (2020-08-27 23:20:36 +1000)

----------------------------------------------------------------
Giovanni Cabiddu (1):
      crypto: qat - add delay before polling mailbox

Herbert Xu (1):
      crypto: af_alg - Work around empty control messages without MSG_MORE

Randy Dunlap (1):
      crypto: sa2ul - add Kconfig selects to fix build error

Wei Yongjun (1):
      crypto: ingenic - Drop kfree for memory allocated with devm_kzalloc

 crypto/af_alg.c                           | 13 ++++++++++---
 drivers/char/hw_random/ingenic-rng.c      |  9 ++-------
 drivers/crypto/Kconfig                    |  3 +++
 drivers/crypto/qat/qat_common/adf_admin.c |  7 ++++---
 4 files changed, 19 insertions(+), 13 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.9
  2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2020-08-30 23:02   ` pr-tracker-bot
  2020-09-10  0:34   ` Herbert Xu
  2020-10-26  1:11   ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-08-30 23:02 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 31 Aug 2020 08:33:04 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e43327c706f28d9e66fc4242af4aefdd69e8ff24

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.9
  2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
  2020-08-30 23:02   ` pr-tracker-bot
@ 2020-09-10  0:34   ` Herbert Xu
  2020-09-10  2:48     ` pr-tracker-bot
  2020-10-26  1:11   ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2020-09-10  0:34 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in padata.

The following changes since commit c195d66a8a75c60515819b101975f38b7ec6577f:

  crypto: af_alg - Work around empty control messages without MSG_MORE (2020-08-27 23:20:36 +1000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 1b0df11fde0f14a269a181b3b7f5122415bc5ed7:

  padata: fix possible padata_works_lock deadlock (2020-09-04 17:51:55 +1000)

----------------------------------------------------------------
Daniel Jordan (1):
      padata: fix possible padata_works_lock deadlock

 kernel/padata.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.9
  2020-09-10  0:34   ` Herbert Xu
@ 2020-09-10  2:48     ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-09-10  2:48 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 10 Sep 2020 10:34:23 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/7fe10096c1508c7f033d34d0741809f8eecc1ed4

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.10
  2020-08-03  4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
  2020-08-03 17:55 ` pr-tracker-bot
  2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2020-10-12  3:32 ` Herbert Xu
  2020-10-13 16:24   ` pr-tracker-bot
  2020-12-14  5:55   ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-10-12  3:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Allow DRBG testing through user-space af_alg.
- Add tcrypt speed testing support for keyed hashes.
- Add type-safe init/exit hooks for ahash.

Algorithms:

- Mark arc4 as obsolete and pending for future removal.
- Mark anubis, khazad, sead and tea as obsolete.
- Improve boot-time xor benchmark.
- Add OSCCA SM2 asymmetric cipher algorithm and use it for integrity.

Drivers:

- Fixes and enhancement for XTS in caam.
- Add support for XIP8001B hwrng in xiphera-trng.
- Add RNG and hash support in sun8i-ce/sun8i-ss.
- Allow imx-rngc to be used by kernel entropy pool.
- Use crypto engine in omap-sham.
- Add support for Ingenic X1830 with ingenic.

The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5:

  Linux 5.9-rc1 (2020-08-16 13:04:57 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 3093e7c16e12d729c325adb3c53dde7308cefbd8:

  X.509: Fix modular build of public_key_sm2 (2020-10-08 16:39:14 +1100)

----------------------------------------------------------------
Andrei Botila (10):
      crypto: caam/jr - add fallback for XTS with more than 8B IV
      crypto: caam/qi - add fallback for XTS with more than 8B IV
      crypto: caam/qi2 - add fallback for XTS with more than 8B IV
      crypto: caam/jr - add support for more XTS key lengths
      crypto: caam/qi - add support for more XTS key lengths
      crypto: caam/qi2 - add support for more XTS key lengths
      crypto: caam - add xts check for block length equal to zero
      crypto: caam/jr - add support for XTS with 16B IV
      crypto: caam/qi - add support for XTS with 16B IV
      crypto: caam/qi2 - add support for XTS with 16B IV

Andy Shevchenko (1):
      crypto: caam - use traditional error check pattern

Ard Biesheuvel (15):
      staging/rtl8192e: switch to RC4 library interface
      staging/rtl8192u: switch to RC4 library interface
      SUNRPC: remove RC4-HMAC-MD5 support from KerberosV
      crypto: n2 - remove ecb(arc4) support
      crypto: bcm-iproc - remove ecb(arc4) support
      net: wireless: drop bogus CRYPTO_xxx Kconfig selects
      crypto: arc4 - mark ecb(arc4) skcipher as obsolete
      crypto: Kconfig - mark unused ciphers as obsolete
      crypto: arm/sha256-neon - avoid ADRL pseudo instruction
      crypto: arm/sha512-neon - avoid ADRL pseudo instruction
      crypto: arm/aes-neonbs - avoid hacks to prevent Thumb2 mode switches
      crypto: arm/aes-neonbs - avoid loading reorder argument on encryption
      crypto: arm/aes-neonbs - use typed init/exit routines for XTS
      crypto: xor - defer load time benchmark to a later time
      crypto: xor - use ktime for template benchmarking

Atte Tommiska (3):
      dt-bindings: vendor-prefixes: Add Xiphera vendor prefix
      dt-bindings: rng: add bindings for Xiphera XIP8001B hwrng
      hwrng: xiphera-trng: add support for XIP8001B hwrng

Christophe JAILLET (2):
      crypto: hifn_795x - switch from 'pci_' to 'dma_' API
      crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call

Colin Ian King (1):
      crypto: chelsio - fix minor indentation issue

Corentin Labbe (18):
      crypto: proc - Removing some useless only space lines
      crypto: sun8i-ss - Add SS_START define
      crypto: sun8i-ss - Add support for the PRNG
      crypto: sun8i-ss - support hash algorithms
      crypto: sun8i-ss - fix a trivial typo
      crypto: sun8i-ss - Add more comment on some structures
      crypto: sun8i-ss - better debug printing
      crypto: sun8i-ce - handle endianness of t_common_ctl
      crypto: sun8i-ce - move iv data to request context
      crypto: sun8i-ce - split into prepare/run/unprepare
      crypto: sun8i-ce - handle different error registers
      crypto: sun8i-ce - rename has_t_dlen_in_bytes to cipher_t_dlen_in_bytes
      crypto: sun8i-ce - support hash algorithms
      crypto: sun8i-ce - Add stat_bytes debugfs
      crypto: sun8i-ce - Add support for the PRNG
      crypto: sun8i-ce - Add support for the TRNG
      crypto: sun8i-ce - fix comparison of integer expressions of different signedness
      crypto: sun8i-ss - fix comparison of integer expressions of different signedness

Dan Carpenter (1):
      crypto: sa2ul - Fix pm_runtime_get_sync() error checking

Daniel Jordan (1):
      padata: add another maintainer and another list

Denis Efremov (5):
      crypto: inside-secure - use kfree_sensitive()
      crypto: amlogic - use kfree_sensitive()
      crypto: sun8i-ce - use kfree_sensitive()
      crypto: sun8i-ss - use kfree_sensitive()
      crypto: sun8i-ss - remove redundant memzero_explicit()

Dominik Przychodni (1):
      crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA

Elena Petrova (1):
      crypto: af_alg - add extra parameters for DRBG interface

Fabio Estevam (1):
      crypto: arm/curve25519 - include <linux/scatterlist.h>

George Acosta (1):
      crypto: cavium/nitrox - add an error message to explain the failure of pci_request_mem_regions

Gilad Ben-Yossef (2):
      crypto: ccree - remove data unit size support
      crypto: ccree - remove bitlocker cipher

Giovanni Cabiddu (5):
      crypto: qat - include domain in top level debugfs path
      crypto: qat - replace device ids defines
      crypto: qat - use PCI_VDEVICE
      crypto: qat - fix function parameters descriptions
      crypto: qat - drop input parameter from adf_enable_aer()

Hao Fang (1):
      crypto: hisilicon/zip - fix the uncleared debug registers

Herbert Xu (32):
      crypto: algapi - Move crypto_yield into internal.h
      crypto: algapi - Remove skbuff.h inclusion
      crypto: algif_skcipher - EBUSY on aio should be an error
      crypto: algif_aead - Do not set MAY_BACKLOG on the async path
      crypto: marvell/cesa - Fix sparse warnings
      crypto: tcrypt - Add support for hash speed testing with keys
      crypto: stm32 - Add missing header inclusions
      crypto: ahash - Add init_tfm/exit_tfm
      crypto: ahash - Add ahash_alg_instance
      crypto: ahash - Remove AHASH_REQUEST_ON_STACK
      crypto: hifn_795x - Remove 64-bit build-time check
      crypto: mediatek - Fix endianness bugs and sparse warnings
      crypto: stm32 - Fix sparse warnings
      crypto: arm/poly1305 - Add prototype for poly1305_blocks_neon
      crypto: arm64/sha - Add declarations for assembly variables
      crypto: arm64/gcm - Fix endianness warnings
      crypto: powerpc/crc-vpmsum_test - Fix sparse endianness warning
      crypto: amlogic - Fix endianness marker
      crypto: arm/aes-neonbs - Use generic cbc encryption path
      crypto: cbc - Remove cbc.h
      crypto: ux500 - Fix sparse endianness warnings
      crypto: sa2ul - Select CRYPTO_AUTHENC
      crypto: sun4i-ss - Fix sparse endianness markers
      crypto: n2 - Fix sparse endianness warning
      crypto: inside-secure - Move priv pointer into safexcel_context
      crypto: inside-secure - Move ipad/opad into safexcel_context
      crypto: inside-secure - Reuse code in safexcel_hmac_alg_setkey
      crypto: lib/chacha20poly1305 - Set SG_MITER_ATOMIC unconditionally
      crypto: x86/poly1305 - Remove assignments with no effect
      lib/mpi: Fix unused variable warnings
      crypto: bcm - Verify GCM/CCM key length in setkey
      X.509: Fix modular build of public_key_sm2

Horia Geantă (1):
      crypto: caam - Move debugfs fops into standalone file

Hui Tang (1):
      crypto: hisilicon/qm - fix judgement of queue is full

Ira Weiny (2):
      crypto: ux500 - Fix kmap() bug
      crypto: hash - Remove unused async iterators

Jorge Ramirez-Ortiz (2):
      hwrng: optee - handle unlimited data rates
      hwrng: optee - fix wait use case

Julia Lawall (5):
      hwrng: stm32 - use semicolons rather than commas to separate statements
      hwrng: iproc-rng200 - use semicolons rather than commas to separate statements
      hwrng: mxc-rnga - use semicolons rather than commas to separate statements
      crypto: drivers - use semicolons rather than commas to separate statements
      crypto: atmel-tdes - use semicolons rather than commas to separate statements

Krzysztof Kozlowski (9):
      hwrng: cctrn - Simplify with dev_err_probe()
      crypto: sa2ul - Simplify with dev_err_probe()
      crypto: ccree - Simplify with dev_err_probe()
      crypto: s5p-sss - Add and fix kerneldoc
      crypto: s5p-sss - Pass error from clk_get and reduce verbosity on deferral
      crypto: caam - Fix kerneldoc
      crypto: caam - Simplify with dev_err_probe()
      crypto: stm32-hash - Simplify with dev_err_probe()
      crypto: sun8i - Simplify with dev_err_probe()

Liu Shixin (3):
      crypto: atmel-aes - convert to use be32_add_cpu()
      crypto: qat - convert to use DEFINE_SEQ_ATTRIBUTE macro
      crypto: cpt - simplify the return expression of cav_register_algs

Longfang Liu (5):
      crypto: hisilicon - update mininum queue
      crypto: hisilicon - update HPRE module parameter description
      crypto: hisilicon - update SEC module parameter description
      crypto: hisilicon - update ZIP module parameter description
      crypto: hisilicon - fixed memory allocation error

Madhuparna Bhowmik (1):
      crypto: picoxcell - Fix potential race condition bug

Marco Felsch (1):
      hwrng: imx-rngc - add quality to use it as kernel entropy pool

Meng Yu (3):
      crypto: hisilicon/hpre - remove useless code
      crypto: hisilicon/hpre - adjust some coding style
      crypto: hisilicon/hpre - fix a bug in dh algorithm

Nathan Chancellor (1):
      crypto: xor - Remove unused variable count in do_xor_speed

Nicolas Toromanoff (1):
      crypto: stm32/crc32 - Avoid lock if hardware is already used

Pascal van Leeuwen (2):
      crypto: inside-secure - Prevent missing of processing errors
      crypto: inside-secure - Add support for EIP197 with output classifier

Pavel Machek (1):
      crypto: ccp - fix error handling

Peter Ujfalusi (1):
      crypto: sa2ul - Fix DMA mapping API usage

Qinglang Miao (8):
      crypto: qat - remove unnecessary mutex_init()
      crypto: allwinner - Convert to DEFINE_SHOW_ATTRIBUTE
      crypto: amlogic - Convert to DEFINE_SHOW_ATTRIBUTE
      crypto: caam - Convert to DEFINE_SHOW_ATTRIBUTE
      crypto: cavium/zip - Convert to DEFINE_SHOW_ATTRIBUTE
      crypto: hisilicon/qm - Convert to DEFINE_SHOW_ATTRIBUTE
      crypto: marvell/octeontx - simplify the return expression of create_sysfs_eng_grps_info()
      crypto: mediatek - simplify the return expression of mtk_dfe_dse_reset()

Ram Muthiah (1):
      crypto: virtio - don't use 'default m'

Randy Dunlap (5):
      crypto: algif_aead - delete duplicated word
      crypto: crc32c_generic - delete and fix duplicated words
      crypto: crct10dif_generic - fix duplicated words
      crypto: engine - delete duplicated word
      crypto: tcrypt - delete duplicated words in messages

Shukun Tan (4):
      crypto: hisilicon/qm - clear used reference count when start qp
      crypto: hisilicon/qm - fix event queue depth to 2048
      crypto: hisilicon/qm - fix VF not available after PF FLR
      crypto: hisilicon/zip - modify debugfs interface parameters

Sihang Chen (2):
      crypto: hisilicon/qm - fix wrong release after using strsep
      crypto: hisilicon/zip - fix the uninitalized 'curr_qm_qp_num'

Tero Kristo (3):
      crypto: sa2ul - fix compiler warning produced by clang
      crypto: omap-sham - convert to use crypto engine
      crypto: omap-sham - fix digcnt register handling with export/import

Tianjia Zhang (12):
      crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc()
      crypto: sm3 - export crypto_sm3_final function
      lib/mpi: Extend the MPI library
      lib/mpi: Introduce ec implementation to MPI library
      crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
      crypto: testmgr - support test with different ciphertext per encryption
      crypto: testmgr - Fix potential memory leak in test_akcipher_one()
      crypto: sm2 - add SM2 test vectors to testmgr
      X.509: support OSCCA certificate parse
      X.509: support OSCCA SM2-with-SM3 certificate verification
      integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
      X.509: fix error return value on the failed path

Tom Rix (1):
      hwrng: intel - cleanup initialization

Tomer Maimon (1):
      hwrng: npcm - modify readl to readb

Uros Bizjak (3):
      crypto: x86/crc32c-intel - Use CRC32 mnemonic
      crypto: curve25519-x86_64 - Use XORL r32,32
      crypto: poly1305-x86_64 - Use XORL r32,32

Weili Qian (2):
      crypto: hisilicon/qm - fix the call trace when unbind device
      crypto: hisilicon/qm - remove the update of flags

Xiaoliang Pang (1):
      cypto: mediatek - fix leaks in mtk_desc_ring_alloc

Xu Wang (1):
      crypto: s5p-sss - remove redundant null check

Yang Shen (15):
      crypto: hisilicon/qm - fix print frequence in hisi_qp_send
      crypto: hisilicon/qm - fix no stop reason when use 'hisi_qm_stop'
      crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown'
      crypto: hisilicon/qm - fix the process of register algorithms to crypto
      crypto: hisilicon/zip - remove some useless parameters
      crypto: hisilicon/zip - unify naming style for functions and macros
      crypto: hisilicon/zip - replace 'sprintf' with 'scnprintf'
      crypto: hisilicon/zip - use a enum parameter instead of some macros
      crypto: hisilicon/zip - add print for error branch
      crypto: hisilicon/zip - fix static check warning
      crypto: hisilicon/zip - move some private macros from 'zip.h' to 'zip_crypto.c'
      crypto: hisilicon/zip - supplement some comments
      crypto: hisilicon/zip - fix some coding styles
      crypto: hisilicon/qm - fix wrong return type of 'pci_get_drvdata'
      crypto: hisilicon/zip - fix the return value when device is busy

YueHaibing (1):
      crypto: sa2ul - Fix pointer-to-int-cast warning

Zhang Qilong (1):
      crypto: marvell/cesa - use devm_platform_ioremap_resource_byname

Zhou Wang (1):
      crypto: hisilicon/zip - fix zero length input in GZIP decompress

dinghao.liu@zju.edu.cn (1):
      crypto: ccree - fix runtime PM imbalance on error

周琰杰 (Zhou Yanjie) (2):
      dt-bindings: RNG: Add Ingenic TRNG bindings.
      hwrng: ingenic - Add hardware TRNG for Ingenic X1830

 Documentation/crypto/userspace-if.rst              |   20 +-
 .../devicetree/bindings/rng/ingenic,trng.yaml      |   43 +
 .../bindings/rng/xiphera,xip8001b-trng.yaml        |   33 +
 .../devicetree/bindings/vendor-prefixes.yaml       |    2 +
 MAINTAINERS                                        |    2 +
 arch/arm/crypto/aes-neonbs-core.S                  |   54 +-
 arch/arm/crypto/aes-neonbs-glue.c                  |   58 +-
 arch/arm/crypto/curve25519-glue.c                  |    1 +
 arch/arm/crypto/poly1305-glue.c                    |    1 +
 arch/arm/crypto/sha256-armv4.pl                    |    4 +-
 arch/arm/crypto/sha256-core.S_shipped              |    4 +-
 arch/arm/crypto/sha512-armv4.pl                    |    4 +-
 arch/arm/crypto/sha512-core.S_shipped              |    4 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |    4 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |    3 +
 arch/arm64/crypto/sha2-ce-glue.c                   |    3 +
 arch/powerpc/crypto/crc-vpmsum_test.c              |    6 +-
 arch/x86/crypto/blake2s-glue.c                     |    1 +
 arch/x86/crypto/chacha_glue.c                      |    1 +
 arch/x86/crypto/crc32c-intel_glue.c                |   18 +-
 arch/x86/crypto/curve25519-x86_64.c                |   69 +-
 arch/x86/crypto/nhpoly1305-avx2-glue.c             |    1 +
 arch/x86/crypto/nhpoly1305-sse2-glue.c             |    1 +
 arch/x86/crypto/poly1305-x86_64-cryptogams.pl      |    8 +-
 arch/x86/crypto/poly1305_glue.c                    |    4 +-
 crypto/Kconfig                                     |   40 +
 crypto/Makefile                                    |    8 +
 crypto/af_alg.c                                    |   14 +-
 crypto/ahash.c                                     |   54 +-
 crypto/algif_aead.c                                |    9 +-
 crypto/algif_rng.c                                 |  175 ++-
 crypto/algif_skcipher.c                            |    2 +-
 crypto/arc4.c                                      |   11 +
 crypto/asymmetric_keys/public_key.c                |   63 +
 crypto/asymmetric_keys/x509_cert_parser.c          |   27 +-
 crypto/asymmetric_keys/x509_public_key.c           |    3 +
 crypto/cbc.c                                       |  144 +-
 crypto/crc32c_generic.c                            |    4 +-
 crypto/crct10dif_generic.c                         |    2 +-
 crypto/crypto_engine.c                             |    3 +-
 crypto/ecrdsa.c                                    |    1 +
 crypto/internal.h                                  |   16 +-
 crypto/jitterentropy-kcapi.c                       |    2 +-
 crypto/proc.c                                      |    4 +-
 crypto/rsa-pkcs1pad.c                              |    1 +
 crypto/sm2.c                                       |  481 +++++++
 crypto/sm2signature.asn1                           |    4 +
 crypto/sm3_generic.c                               |    7 +-
 crypto/tcrypt.c                                    |   18 +-
 crypto/tcrypt.h                                    |   29 -
 crypto/testmgr.c                                   |   25 +-
 crypto/testmgr.h                                   |   59 +
 crypto/xor.c                                       |   69 +-
 drivers/char/hw_random/Kconfig                     |   24 +
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/cctrng.c                    |    9 +-
 drivers/char/hw_random/imx-rngc.c                  |    1 +
 drivers/char/hw_random/ingenic-trng.c              |  161 +++
 drivers/char/hw_random/intel-rng.c                 |    2 +-
 drivers/char/hw_random/iproc-rng200.c              |    8 +-
 drivers/char/hw_random/mxc-rnga.c                  |    6 +-
 drivers/char/hw_random/npcm-rng.c                  |   14 +-
 drivers/char/hw_random/optee-rng.c                 |    6 +-
 drivers/char/hw_random/stm32-rng.c                 |    8 +-
 drivers/char/hw_random/xiphera-trng.c              |  150 ++
 drivers/crypto/Kconfig                             |    1 +
 drivers/crypto/allwinner/Kconfig                   |   43 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c  |   17 +-
 drivers/crypto/allwinner/sun8i-ce/Makefile         |    3 +
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |  131 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |  405 +++++-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |  413 ++++++
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c  |  164 +++
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c  |  127 ++
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |  139 +-
 drivers/crypto/allwinner/sun8i-ss/Makefile         |    2 +
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |   16 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |  229 ++-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |  444 ++++++
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c  |  173 +++
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h       |   89 +-
 drivers/crypto/amcc/crypto4xx_alg.c                |    2 +-
 drivers/crypto/amcc/crypto4xx_core.h               |    1 +
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |   12 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c          |   16 +-
 drivers/crypto/atmel-aes.c                         |    2 +-
 drivers/crypto/atmel-tdes.c                        |    2 +-
 drivers/crypto/bcm/cipher.c                        |  111 +-
 drivers/crypto/bcm/cipher.h                        |    1 -
 drivers/crypto/bcm/spu.c                           |   23 +-
 drivers/crypto/bcm/spu.h                           |    1 -
 drivers/crypto/bcm/spu2.c                          |   12 +-
 drivers/crypto/bcm/spu2.h                          |    1 -
 drivers/crypto/caam/Kconfig                        |    3 +
 drivers/crypto/caam/Makefile                       |    2 +
 drivers/crypto/caam/caamalg.c                      |   94 +-
 drivers/crypto/caam/caamalg_desc.c                 |   28 +-
 drivers/crypto/caam/caamalg_qi.c                   |   94 +-
 drivers/crypto/caam/caamalg_qi2.c                  |  118 +-
 drivers/crypto/caam/caamalg_qi2.h                  |    2 +
 drivers/crypto/caam/ctrl.c                         |   88 +-
 drivers/crypto/caam/debugfs.c                      |   96 ++
 drivers/crypto/caam/debugfs.h                      |   26 +
 drivers/crypto/caam/dpseci-debugfs.c               |   23 +-
 drivers/crypto/caam/intern.h                       |   17 -
 drivers/crypto/caam/jr.c                           |   10 +-
 drivers/crypto/caam/qi.c                           |   20 +-
 drivers/crypto/cavium/cpt/cptvf_algs.c             |    8 +-
 drivers/crypto/cavium/nitrox/nitrox_main.c         |    1 +
 drivers/crypto/cavium/zip/zip_main.c               |   44 +-
 drivers/crypto/ccp/ccp-ops.c                       |    3 +-
 drivers/crypto/ccree/cc_cipher.c                   |  282 +---
 drivers/crypto/ccree/cc_crypto_ctx.h               |    1 -
 drivers/crypto/ccree/cc_driver.c                   |    7 +-
 drivers/crypto/ccree/cc_driver.h                   |    1 -
 drivers/crypto/ccree/cc_pm.c                       |    6 +-
 drivers/crypto/chelsio/chcr_core.c                 |    2 +-
 drivers/crypto/hifn_795x.c                         |   28 +-
 drivers/crypto/hisilicon/hpre/hpre.h               |    1 -
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   59 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   33 +-
 drivers/crypto/hisilicon/qm.c                      |  237 ++-
 drivers/crypto/hisilicon/qm.h                      |   31 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   51 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   39 +-
 drivers/crypto/hisilicon/zip/zip.h                 |   15 -
 drivers/crypto/hisilicon/zip/zip_crypto.c          |  140 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |  195 +--
 drivers/crypto/img-hash.c                          |    1 +
 drivers/crypto/inside-secure/safexcel.c            |   44 +-
 drivers/crypto/inside-secure/safexcel.h            |   28 +-
 drivers/crypto/inside-secure/safexcel_cipher.c     |   90 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |  153 +-
 drivers/crypto/inside-secure/safexcel_ring.c       |    9 +-
 drivers/crypto/ixp4xx_crypto.c                     |    2 +-
 drivers/crypto/marvell/cesa/cesa.c                 |    4 +-
 drivers/crypto/marvell/cesa/cesa.h                 |   20 +-
 drivers/crypto/marvell/cesa/cipher.c               |    5 +-
 drivers/crypto/marvell/cesa/hash.c                 |   24 +-
 drivers/crypto/marvell/cesa/tdma.c                 |   16 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c  |    8 +-
 drivers/crypto/mediatek/mtk-aes.c                  |   57 +-
 drivers/crypto/mediatek/mtk-platform.c             |   16 +-
 drivers/crypto/mediatek/mtk-sha.c                  |    2 +-
 drivers/crypto/n2_core.c                           |   60 +-
 drivers/crypto/omap-sham.c                         |  189 ++-
 drivers/crypto/padlock-aes.c                       |    1 +
 drivers/crypto/picoxcell_crypto.c                  |    9 +-
 drivers/crypto/qat/qat_c3xxx/adf_drv.c             |   19 +-
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |   17 +-
 drivers/crypto/qat/qat_c62x/adf_drv.c              |   19 +-
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |   17 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    6 -
 drivers/crypto/qat/qat_common/adf_aer.c            |    6 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |   19 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    2 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    2 -
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |    2 +-
 drivers/crypto/qat/qat_common/adf_sriov.c          |    6 +-
 .../crypto/qat/qat_common/adf_transport_debug.c    |   42 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |   10 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |    7 +-
 drivers/crypto/qat/qat_common/qat_uclo.c           |    9 +-
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |   19 +-
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |   17 +-
 drivers/crypto/qce/core.c                          |    1 +
 drivers/crypto/qce/sha.c                           |    1 +
 drivers/crypto/qce/skcipher.c                      |    1 +
 drivers/crypto/qcom-rng.c                          |    1 +
 drivers/crypto/rockchip/rk3288_crypto.c            |    1 +
 drivers/crypto/rockchip/rk3288_crypto.h            |    1 +
 drivers/crypto/rockchip/rk3288_crypto_ahash.c      |    1 +
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |    1 +
 drivers/crypto/s5p-sss.c                           |   28 +-
 drivers/crypto/sa2ul.c                             |  235 +--
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/stm32/Kconfig                       |    1 +
 drivers/crypto/stm32/stm32-crc32.c                 |   22 +-
 drivers/crypto/stm32/stm32-cryp.c                  |   47 +-
 drivers/crypto/stm32/stm32-hash.c                  |   16 +-
 drivers/crypto/talitos.c                           |    8 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |   28 +-
 drivers/crypto/ux500/hash/hash_core.c              |   31 +-
 drivers/crypto/virtio/Kconfig                      |    1 -
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |    1 +
 drivers/net/wireless/intel/ipw2x00/Kconfig         |    4 -
 drivers/net/wireless/intersil/hostap/Kconfig       |    4 -
 drivers/staging/rtl8192e/Kconfig                   |    4 +-
 drivers/staging/rtl8192e/rtllib_crypt_tkip.c       |   70 +-
 drivers/staging/rtl8192e/rtllib_crypt_wep.c        |   72 +-
 drivers/staging/rtl8192u/Kconfig                   |    1 +
 .../rtl8192u/ieee80211/ieee80211_crypt_tkip.c      |   81 +-
 .../rtl8192u/ieee80211/ieee80211_crypt_wep.c       |   64 +-
 include/crypto/algapi.h                            |    8 +-
 include/crypto/cbc.h                               |  141 --
 include/crypto/hash.h                              |   18 +-
 include/crypto/if_alg.h                            |    1 +
 include/crypto/internal/hash.h                     |   19 +-
 include/crypto/public_key.h                        |    3 +
 include/crypto/sm2.h                               |   25 +
 include/crypto/sm3.h                               |    2 +
 include/linux/mpi.h                                |  192 +++
 include/linux/oid_registry.h                       |    6 +
 include/linux/sunrpc/gss_krb5.h                    |   11 -
 include/linux/sunrpc/gss_krb5_enctypes.h           |    9 +-
 include/uapi/linux/if_alg.h                        |    1 +
 lib/crypto/chacha20poly1305.c                      |    4 +-
 lib/mpi/Makefile                                   |    6 +
 lib/mpi/ec.c                                       | 1509 ++++++++++++++++++++
 lib/mpi/mpi-add.c                                  |  155 ++
 lib/mpi/mpi-bit.c                                  |  251 ++++
 lib/mpi/mpi-cmp.c                                  |   46 +-
 lib/mpi/mpi-div.c                                  |  234 +++
 lib/mpi/mpi-internal.h                             |   53 +
 lib/mpi/mpi-inv.c                                  |  143 ++
 lib/mpi/mpi-mod.c                                  |  155 ++
 lib/mpi/mpi-mul.c                                  |   91 ++
 lib/mpi/mpicoder.c                                 |  336 +++++
 lib/mpi/mpih-div.c                                 |  294 ++++
 lib/mpi/mpih-mul.c                                 |   25 +
 lib/mpi/mpiutil.c                                  |  204 +++
 net/sunrpc/Kconfig                                 |    1 -
 net/sunrpc/auth_gss/gss_krb5_crypto.c              |  276 ----
 net/sunrpc/auth_gss/gss_krb5_mech.c                |   95 --
 net/sunrpc/auth_gss/gss_krb5_seal.c                |    1 -
 net/sunrpc/auth_gss/gss_krb5_seqnum.c              |   87 --
 net/sunrpc/auth_gss/gss_krb5_unseal.c              |    1 -
 net/sunrpc/auth_gss/gss_krb5_wrap.c                |   65 +-
 security/integrity/digsig_asymmetric.c             |   14 +-
 229 files changed, 9465 insertions(+), 3102 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/rng/ingenic,trng.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/xiphera,xip8001b-trng.yaml
 create mode 100644 crypto/sm2.c
 create mode 100644 crypto/sm2signature.asn1
 create mode 100644 drivers/char/hw_random/ingenic-trng.c
 create mode 100644 drivers/char/hw_random/xiphera-trng.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
 create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c
 create mode 100644 drivers/crypto/caam/debugfs.c
 create mode 100644 drivers/crypto/caam/debugfs.h
 delete mode 100644 include/crypto/cbc.h
 create mode 100644 include/crypto/sm2.h
 create mode 100644 lib/mpi/ec.c
 create mode 100644 lib/mpi/mpi-add.c
 create mode 100644 lib/mpi/mpi-div.c
 create mode 100644 lib/mpi/mpi-inv.c
 create mode 100644 lib/mpi/mpi-mod.c
 create mode 100644 lib/mpi/mpi-mul.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.10
  2020-10-12  3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
@ 2020-10-13 16:24   ` pr-tracker-bot
  2020-12-14  5:55   ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-10-13 16:24 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 12 Oct 2020 14:32:49 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/39a5101f989e8d2be557136704d53990f9b402c8

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.10
  2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
  2020-08-30 23:02   ` pr-tracker-bot
  2020-09-10  0:34   ` Herbert Xu
@ 2020-10-26  1:11   ` Herbert Xu
  2020-10-26 17:52     ` pr-tracker-bot
  2020-12-27 11:32     ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-10-26  1:11 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in x86/poly1305.

The following changes since commit 3093e7c16e12d729c325adb3c53dde7308cefbd8:

  X.509: Fix modular build of public_key_sm2 (2020-10-08 16:39:14 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to c3a98c3ad5c0dc60a1ac66bf91147a3f39cac96b:

  crypto: x86/poly1305 - add back a needed assignment (2020-10-24 09:38:32 +1100)

----------------------------------------------------------------
Eric Biggers (1):
      crypto: x86/poly1305 - add back a needed assignment

 arch/x86/crypto/poly1305_glue.c | 1 +
 1 file changed, 1 insertion(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.10
  2020-10-26  1:11   ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
@ 2020-10-26 17:52     ` pr-tracker-bot
  2020-12-27 11:32     ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-10-26 17:52 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 26 Oct 2020 12:11:59 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/41ba50b0572e90ed3d24fe4def54567e9050bc47

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.11
  2020-10-12  3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
  2020-10-13 16:24   ` pr-tracker-bot
@ 2020-12-14  5:55   ` Herbert Xu
  2020-12-14 20:56     ` pr-tracker-bot
  2021-02-15  2:47     ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-12-14  5:55 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Add speed testing on 1420-byte blocks for networking.

Algorithms:

- Improve performance of chacha on ARM for network packets.
- Improve performance of aegis128 on ARM for network packets.

Drivers:

- Add support for Keem Bay OCS AES/SM4.
- Add support for QAT 4xxx devices.
- Enable crypto-engine retry mechanism in caam.
- Enable support for crypto engine on sdm845 in qce.
- Add HiSilicon PRNG driver support.

Please note that there is a merge conflict in the MAINTAINERS
file with the drm tree due to the Keem Bay driver.

The following changes since commit 3650b228f83adda7e5ee532e2b90429c03f7b9ec:

  Linux 5.10-rc1 (2020-10-25 15:14:11 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 linus 

for you to fetch changes up to 93cebeb1c21a65b92636aaa278a32fbc0415ec67:

  crypto: qat - add capability detection logic in qat_4xxx (2020-12-11 21:54:16 +1100)

----------------------------------------------------------------
Adam Guerin (2):
      crypto: qat - remove cast for mailbox CSR
      crypto: qat - replace pci with PCI in comments

Ahsan Atta (1):
      crypto: qat - num_rings_per_bank is device dependent

Ard Biesheuvel (14):
      crypto: arm64/poly1305-neon - reorder PAC authentication with SP update
      crypto: arm/chacha-neon - optimize for non-block size multiples
      crypto: arm64/chacha - simplify tail block handling
      crypto: arm64/gcm - move authentication tag check to SIMD domain
      crypto: aegis128 - wipe plaintext and tag if decryption fails
      crypto: aegis128/neon - optimize tail block handling
      crypto: aegis128/neon - move final tag check to SIMD domain
      crypto: aegis128 - expose SIMD code path as separate driver
      crypto: tcrypt - don't initialize at subsys_initcall time
      crypto: tcrypt - permit tcrypt.ko to be builtin
      crypto: tcrypt - include 1420 byte blocks in aead and skcipher benchmarks
      crypto: ecdh - avoid unaligned accesses in ecdh_set_secret()
      crypto: arm/aes-ce - work around Cortex-A57/A72 silion errata
      crypto: aegis128 - avoid spurious references crypto_aegis128_update_simd

Arnd Bergmann (1):
      crypto: atmel-i2c - select CONFIG_BITREVERSE

Arvind Sankar (6):
      crypto: lib/sha256 - Use memzero_explicit() for clearing state
      crypto: hash - Use memzero_explicit() for clearing state
      crypto: lib/sha256 - Don't clear temporary variables
      crypto: lib/sha256 - Clear W[] in sha256_update() instead of sha256_transform()
      crypto: lib/sha256 - Unroll SHA256 loop 8 times intead of 64
      crypto: lib/sha256 - Unroll LOAD and BLEND loops

Christophe JAILLET (3):
      crypto: cavium/zip - Use dma_set_mask_and_coherent to simplify code
      crypto: marvell/octeontx - Use dma_set_mask_and_coherent to simplify code
      crypto: cavium - Use dma_set_mask_and_coherent to simplify code

Christophe Leroy (2):
      crypto: talitos - Endianess in current_desc_hdr()
      crypto: talitos - Fix return type of current_desc_hdr()

Colin Ian King (2):
      crypto: inside-secure - Fix sizeof() mismatch
      crypto: kconfig - fix a couple of spelling mistakes

Corentin Labbe (1):
      crypto: sun8i-ce - fix two error path's memory leak

Daniele Alessandrelli (1):
      dt-bindings: Add Keem Bay OCS AES bindings

Eric Biggers (8):
      crypto: x86/aes - remove unused file aes_glue.c
      crypto: aead - add crypto_aead_driver_name()
      crypto: testmgr - always print the actual hash driver name
      crypto: testmgr - always print the actual AEAD driver name
      crypto: testmgr - always print the actual skcipher driver name
      crypto: testmgr - WARN on test failure
      crypto: af_alg - avoid undefined behavior accessing salg_name
      crypto: sha - split sha.h into sha1.h and sha2.h

Gilad Ben-Yossef (1):
      crypto: ccree - rework cache parameters handling

Giovanni Cabiddu (33):
      crypto: qat - remove unused function
      crypto: qat - mask device capabilities with soft straps
      crypto: qat - fix configuration of iov threads
      crypto: qat - split transport CSR access logic
      crypto: qat - relocate GEN2 CSR access code
      crypto: qat - abstract admin interface
      crypto: qat - add packed to init admin structures
      crypto: qat - rename ME in AE
      crypto: qat - change admin sequence
      crypto: qat - use admin mask to send fw constants
      crypto: qat - update constants table
      crypto: qat - remove writes into WQCFG
      crypto: qat - remove unused macros in arbiter module
      crypto: qat - abstract arbiter access
      crypto: qat - register crypto instances based on capability
      crypto: qat - enable ring after pair is programmed
      crypto: qat - abstract build ring base
      crypto: qat - replace constant masks with GENMASK
      crypto: qat - use BIT_ULL() - 1 pattern for masks
      crypto: qat - abstract writes to arbiter enable
      crypto: qat - remove hardcoded bank irq clear flag mask
      crypto: qat - call functions in adf_sriov if available
      crypto: qat - remove unnecessary void* casts
      crypto: qat - change return value in adf_cfg_add_key_value_param()
      crypto: qat - change return value in adf_cfg_key_val_get()
      crypto: qat - refactor qat_crypto_create_instances()
      crypto: qat - refactor qat_crypto_dev_config()
      crypto: qat - allow for instances in different banks
      crypto: qat - extend ae_mask
      crypto: qat - support for mof format in fw loader
      crypto: qat - target fw images to specific AEs
      crypto: qat - add hook to initialize vector routing table
      crypto: qat - add qat_4xxx driver

Gustavo A. R. Silva (1):
      crypto: ccree - Fix fall-through warnings for Clang

Herbert Xu (10):
      lib/mpi: Remove unused scalar_copied
      crypto: sa2ul - Reduce stack usage
      crypto: cavium/nitrox - Fix sparse warnings
      crypto: lib/curve25519 - Move selftest prototype into header file
      crypto: mips/octeon - Fix sparse endianness warnings
      crypto: powerpc/sha256-spe - Fix sparse endianness warning
      crypto: sparc - Fix sparse endianness warnings
      crypto: lib/blake2s - Move selftest prototype into header file
      hwrng: ks-sa - Add dependency on IOMEM and OF
      crypto: cpt - Fix sparse warnings in cptpf

Horia Geantă (3):
      crypto: arm/aes-neonbs - fix usage of cbc(aes) fallback
      crypto: caam - fix printing on xts fallback allocation error path
      crypto: caam/qi - simplify error path for context allocation

Iuliana Prodan (1):
      crypto: caam - enable crypto-engine retry mechanism

Jack Xu (31):
      crypto: qat - fix status check in qat_hal_put_rel_rd_xfer()
      crypto: qat - fix CSR access
      crypto: qat - fix error message
      crypto: qat - remove unnecessary parenthesis
      crypto: qat - introduce additional parenthesis
      crypto: qat - rename qat_uclo_del_uof_obj()
      crypto: qat - add support for relative FW ucode loading
      crypto: qat - change type for ctx_mask
      crypto: qat - change micro word data mask
      crypto: qat - refactor AE start
      crypto: qat - remove global CSRs helpers
      crypto: qat - move defines to header files
      crypto: qat - refactor qat_uclo_set_ae_mode()
      crypto: qat - refactor long expressions
      crypto: qat - introduce chip info structure
      crypto: qat - replace check based on DID
      crypto: qat - add next neighbor to chip_info
      crypto: qat - add support for lm2 and lm3
      crypto: qat - add local memory size to chip info
      crypto: qat - add reset CSR and mask to chip info
      crypto: qat - add clock enable CSR to chip info
      crypto: qat - add wake up event to chip info
      crypto: qat - add misc control CSR to chip info
      crypto: qat - add check for null pointer
      crypto: qat - use ae_mask
      crypto: qat - add CSS3K support
      crypto: qat - add FCU CSRs to chip info
      crypto: qat - allow to target specific AEs
      crypto: qat - add support for shared ustore
      crypto: qat - add support for broadcasting mode
      crypto: qat - add gen4 firmware loader

Jason A. Donenfeld (1):
      crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager

Kai Ye (1):
      crypto: hisilicon/sec2 - Fix aead authentication setting key error

Longfang Liu (2):
      crypto: hisilicon - delete unused structure member variables
      crypto: hisilicon - fixes some coding style

Marco Chiappero (5):
      crypto: qat - update IV in software
      crypto: qat - add support for capability detection
      crypto: qat - add AES-CTR support for QAT GEN4 devices
      crypto: qat - add AES-XTS support for QAT GEN4 devices
      crypto: qat - add capability detection logic in qat_4xxx

Mike Healy (1):
      crypto: keembay - Add support for Keem Bay OCS AES/SM4

Nathan Chancellor (1):
      crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd

Nigel Christian (1):
      hwrng: imx-rngc - irq already prints an error

Shiju Jose (1):
      crypto: hisilicon - Fix doc warnings in sgl.c and qm.c

Thara Gopinath (2):
      crypto: qce - Enable support for crypto engine on sdm845
      crypto: qce - Fix SHA result buffer corruption issues

Tianjia Zhang (1):
      crypto: sm2 - remove unnecessary reset operations

Tom Rix (4):
      crypto: atmel-sha - remove unneeded break
      crypto: cavium/nitrox - remove unneeded semicolon
      crypto: qat - remove unneeded semicolon
      crypto: seed - remove trailing semicolon in macro definition

Uros Bizjak (3):
      crypto: aesni - Use TEST %reg,%reg instead of CMP $0,%reg
      crypto: x86/sha512 - Use TEST %reg,%reg instead of CMP $0,%reg
      crypto: x86/poly1305 - Use TEST %reg,%reg instead of CMP $0,%reg

Weili Qian (12):
      crypto: hisilicon/qm - numbers are replaced by macros
      crypto: hisilicon/qm - modify the return type of function
      crypto: hisilicon/qm - modify the return type of debugfs interface
      crypto: hisilicon/qm - modify return type of 'qm_set_sqctype'
      crypto: hisilicon/qm - replace 'sprintf' with 'scnprintf'
      crypto: hisilicon/qm - split 'qm_qp_ctx_cfg' into smaller pieces
      crypto: hisilicon/qm - split 'qm_eq_ctx_cfg' into smaller pieces
      crypto: hisilicon/qm - split 'hisi_qm_init' into smaller pieces
      hwrng: hisi - remove HiSilicon TRNG driver
      crypto: hisilicon/trng - add HiSilicon TRNG driver support
      crypto: hisilicon/trng - add support for PRNG
      MAINTAINERS: Move HiSilicon TRNG V2 driver

Yang Shen (1):
      crypto: hisilicon/zip - add a work_queue for zip irq

Yejune Deng (1):
      crypto: hisilicon/trng - replace atomic_add_return()

Zhang Qilong (2):
      crypto: omap-aes - fix the reference count leak of omap device
      crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe

kernel test robot (1):
      crypto: qat - fix excluded_middle.cocci warnings

 .../bindings/crypto/intel,keembay-ocs-aes.yaml     |   45 +
 MAINTAINERS                                        |   12 +-
 arch/arm/crypto/aes-ce-core.S                      |   32 +-
 arch/arm/crypto/aes-neonbs-glue.c                  |    8 +-
 arch/arm/crypto/chacha-glue.c                      |   34 +-
 arch/arm/crypto/chacha-neon-core.S                 |   97 +-
 arch/arm/crypto/sha1-ce-glue.c                     |    2 +-
 arch/arm/crypto/sha1.h                             |    2 +-
 arch/arm/crypto/sha1_glue.c                        |    2 +-
 arch/arm/crypto/sha1_neon_glue.c                   |    2 +-
 arch/arm/crypto/sha2-ce-glue.c                     |    2 +-
 arch/arm/crypto/sha256_glue.c                      |    2 +-
 arch/arm/crypto/sha256_neon_glue.c                 |    2 +-
 arch/arm/crypto/sha512-glue.c                      |    2 +-
 arch/arm/crypto/sha512-neon-glue.c                 |    2 +-
 arch/arm64/configs/defconfig                       |    1 +
 arch/arm64/crypto/aes-glue.c                       |    2 +-
 arch/arm64/crypto/chacha-neon-core.S               |  193 +--
 arch/arm64/crypto/ghash-ce-core.S                  |   15 +
 arch/arm64/crypto/ghash-ce-glue.c                  |   48 +-
 arch/arm64/crypto/poly1305-armv8.pl                |    2 +-
 arch/arm64/crypto/poly1305-core.S_shipped          |    2 +-
 arch/arm64/crypto/poly1305-glue.c                  |    2 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |    2 +-
 arch/arm64/crypto/sha2-ce-glue.c                   |    2 +-
 arch/arm64/crypto/sha256-glue.c                    |    2 +-
 arch/arm64/crypto/sha3-ce-glue.c                   |    2 +-
 arch/arm64/crypto/sha512-ce-glue.c                 |    2 +-
 arch/arm64/crypto/sha512-glue.c                    |    2 +-
 arch/mips/cavium-octeon/crypto/octeon-crypto.h     |    2 +-
 arch/mips/cavium-octeon/crypto/octeon-md5.c        |   14 +-
 arch/mips/cavium-octeon/crypto/octeon-sha1.c       |    2 +-
 arch/mips/cavium-octeon/crypto/octeon-sha256.c     |    2 +-
 arch/mips/cavium-octeon/crypto/octeon-sha512.c     |    2 +-
 arch/powerpc/crypto/sha1-spe-glue.c                |    2 +-
 arch/powerpc/crypto/sha1.c                         |    2 +-
 arch/powerpc/crypto/sha256-spe-glue.c              |    4 +-
 arch/s390/crypto/sha.h                             |    3 +-
 arch/s390/crypto/sha1_s390.c                       |    2 +-
 arch/s390/crypto/sha256_s390.c                     |    2 +-
 arch/s390/crypto/sha3_256_s390.c                   |    1 -
 arch/s390/crypto/sha3_512_s390.c                   |    1 -
 arch/s390/crypto/sha512_s390.c                     |    2 +-
 arch/s390/purgatory/purgatory.c                    |    2 +-
 arch/sparc/crypto/crc32c_glue.c                    |    2 +-
 arch/sparc/crypto/md5_glue.c                       |    9 +-
 arch/sparc/crypto/sha1_glue.c                      |    2 +-
 arch/sparc/crypto/sha256_glue.c                    |    2 +-
 arch/sparc/crypto/sha512_glue.c                    |    2 +-
 arch/x86/crypto/aes_glue.c                         |    1 -
 arch/x86/crypto/aesni-intel_asm.S                  |   20 +-
 arch/x86/crypto/aesni-intel_avx-x86_64.S           |   20 +-
 arch/x86/crypto/poly1305-x86_64-cryptogams.pl      |    2 +-
 arch/x86/crypto/poly1305_glue.c                    |    2 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |    2 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    2 +-
 arch/x86/crypto/sha512-avx-asm.S                   |    2 +-
 arch/x86/crypto/sha512-ssse3-asm.S                 |    2 +-
 arch/x86/crypto/sha512_ssse3_glue.c                |    2 +-
 arch/x86/purgatory/purgatory.c                     |    2 +-
 crypto/Kconfig                                     |    4 +-
 crypto/aegis128-core.c                             |  245 ++-
 crypto/aegis128-neon-inner.c                       |  122 +-
 crypto/aegis128-neon.c                             |   21 +-
 crypto/af_alg.c                                    |   10 +-
 crypto/asymmetric_keys/asym_tpm.c                  |    2 +-
 crypto/ecdh.c                                      |    9 +-
 crypto/seed.c                                      |    2 +-
 crypto/sha1_generic.c                              |    2 +-
 crypto/sha256_generic.c                            |    2 +-
 crypto/sha512_generic.c                            |    2 +-
 crypto/sm2.c                                       |   75 +-
 crypto/tcrypt.c                                    |   83 +-
 crypto/testmgr.c                                   |  141 +-
 drivers/char/hw_random/Kconfig                     |   14 +-
 drivers/char/hw_random/Makefile                    |    1 -
 drivers/char/hw_random/hisi-trng-v2.c              |   99 --
 drivers/char/hw_random/imx-rngc.c                  |    4 +-
 drivers/char/random.c                              |    2 +-
 drivers/crypto/Kconfig                             |    5 +-
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/allwinner/Kconfig                   |    2 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h       |    2 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |   23 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |    3 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |    3 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h       |    3 +-
 drivers/crypto/amcc/crypto4xx_alg.c                |    2 +-
 drivers/crypto/amcc/crypto4xx_core.c               |    4 +-
 drivers/crypto/atmel-authenc.h                     |    3 +-
 drivers/crypto/atmel-sha.c                         |    4 +-
 drivers/crypto/axis/artpec6_crypto.c               |    3 +-
 drivers/crypto/bcm/cipher.c                        |    3 +-
 drivers/crypto/bcm/cipher.h                        |    3 +-
 drivers/crypto/bcm/spu.h                           |    3 +-
 drivers/crypto/caam/caamalg.c                      |    4 +-
 drivers/crypto/caam/caamalg_qi.c                   |   12 +-
 drivers/crypto/caam/caamalg_qi2.c                  |    3 +-
 drivers/crypto/caam/compat.h                       |    3 +-
 drivers/crypto/caam/intern.h                       |    8 +
 drivers/crypto/caam/jr.c                           |    4 +-
 drivers/crypto/cavium/cpt/cptpf_main.c             |   16 +-
 drivers/crypto/cavium/cpt/cptvf_main.c             |   10 +-
 drivers/crypto/cavium/nitrox/nitrox_aead.c         |   11 +-
 drivers/crypto/cavium/nitrox/nitrox_debugfs.c      |    1 +
 drivers/crypto/cavium/nitrox/nitrox_hal.c          |    1 +
 drivers/crypto/cavium/nitrox/nitrox_isr.c          |    1 +
 drivers/crypto/cavium/nitrox/nitrox_isr.h          |    9 +
 drivers/crypto/cavium/nitrox/nitrox_main.c         |   13 -
 drivers/crypto/cavium/nitrox/nitrox_mbx.c          |    3 +-
 drivers/crypto/cavium/nitrox/nitrox_req.h          |    4 +
 drivers/crypto/cavium/nitrox/nitrox_reqmgr.c       |    7 +-
 drivers/crypto/cavium/zip/zip_main.c               |   10 +-
 drivers/crypto/ccp/ccp-crypto-sha.c                |    3 +-
 drivers/crypto/ccp/ccp-crypto.h                    |    3 +-
 drivers/crypto/ccree/cc_cipher.c                   |    3 +
 drivers/crypto/ccree/cc_driver.c                   |   75 +-
 drivers/crypto/ccree/cc_driver.h                   |    9 +-
 drivers/crypto/ccree/cc_pm.c                       |    2 +-
 drivers/crypto/chelsio/chcr_algo.c                 |    3 +-
 drivers/crypto/hisilicon/Kconfig                   |    8 +
 drivers/crypto/hisilicon/Makefile                  |    1 +
 drivers/crypto/hisilicon/hpre/hpre_main.c          |    4 +-
 drivers/crypto/hisilicon/qm.c                      |  220 ++-
 drivers/crypto/hisilicon/qm.h                      |    2 +-
 drivers/crypto/hisilicon/sec2/sec.h                |    2 -
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   25 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   34 +-
 drivers/crypto/hisilicon/sgl.c                     |    2 -
 drivers/crypto/hisilicon/trng/Makefile             |    2 +
 drivers/crypto/hisilicon/trng/trng.c               |  334 ++++
 drivers/crypto/hisilicon/zip/zip_main.c            |   30 +-
 drivers/crypto/img-hash.c                          |    3 +-
 drivers/crypto/inside-secure/safexcel.c            |    2 +-
 drivers/crypto/inside-secure/safexcel.h            |    3 +-
 drivers/crypto/inside-secure/safexcel_cipher.c     |    3 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |    3 +-
 drivers/crypto/ixp4xx_crypto.c                     |    2 +-
 drivers/crypto/keembay/Kconfig                     |   39 +
 drivers/crypto/keembay/Makefile                    |    5 +
 drivers/crypto/keembay/keembay-ocs-aes-core.c      | 1713 ++++++++++++++++++++
 drivers/crypto/keembay/ocs-aes.c                   | 1489 +++++++++++++++++
 drivers/crypto/keembay/ocs-aes.h                   |  129 ++
 drivers/crypto/marvell/cesa/hash.c                 |    3 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_main.c   |   10 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   |    3 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_main.c   |   10 +-
 drivers/crypto/mediatek/mtk-sha.c                  |    3 +-
 drivers/crypto/mxs-dcp.c                           |    3 +-
 drivers/crypto/n2_core.c                           |    3 +-
 drivers/crypto/nx/nx-sha256.c                      |    2 +-
 drivers/crypto/nx/nx-sha512.c                      |    2 +-
 drivers/crypto/nx/nx.c                             |    2 +-
 drivers/crypto/omap-aes.c                          |    4 +-
 drivers/crypto/omap-sham.c                         |    3 +-
 drivers/crypto/padlock-sha.c                       |    3 +-
 drivers/crypto/picoxcell_crypto.c                  |    3 +-
 drivers/crypto/qat/Kconfig                         |   11 +
 drivers/crypto/qat/Makefile                        |    1 +
 drivers/crypto/qat/qat_4xxx/Makefile               |    4 +
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |  242 +++
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h     |   86 +
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |  323 ++++
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |   49 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h   |    5 +
 drivers/crypto/qat/qat_c3xxx/adf_drv.c             |   11 +-
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c   |    7 +-
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |    4 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |   49 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h     |    5 +
 drivers/crypto/qat/qat_c62x/adf_drv.c              |   11 +-
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c |    7 +-
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |    4 +-
 drivers/crypto/qat/qat_common/Makefile             |    2 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   65 +-
 drivers/crypto/qat/qat_common/adf_accel_engine.c   |   69 +-
 drivers/crypto/qat/qat_common/adf_admin.c          |   77 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |    4 +-
 drivers/crypto/qat/qat_common/adf_cfg_common.h     |    3 +-
 drivers/crypto/qat/qat_common/adf_cfg_strings.h    |    3 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |   19 +-
 drivers/crypto/qat/qat_common/adf_dev_mgr.c        |   11 +-
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c   |  181 +++
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h   |  123 ++
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.c   |  101 ++
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h   |   99 ++
 drivers/crypto/qat/qat_common/adf_hw_arbiter.c     |   94 +-
 drivers/crypto/qat/qat_common/adf_isr.c            |    7 +-
 drivers/crypto/qat/qat_common/adf_sriov.c          |   78 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |  130 +-
 .../qat/qat_common/adf_transport_access_macros.h   |   67 -
 .../crypto/qat/qat_common/adf_transport_debug.c    |   32 +-
 .../crypto/qat/qat_common/adf_transport_internal.h |    2 +-
 drivers/crypto/qat/qat_common/adf_vf_isr.c         |    5 +-
 .../crypto/qat/qat_common/icp_qat_fw_init_admin.h  |    6 +-
 drivers/crypto/qat/qat_common/icp_qat_fw_la.h      |    7 +
 .../qat/qat_common/icp_qat_fw_loader_handle.h      |   26 +-
 drivers/crypto/qat/qat_common/icp_qat_hal.h        |   63 +-
 drivers/crypto/qat/qat_common/icp_qat_hw.h         |   40 +-
 drivers/crypto/qat/qat_common/icp_qat_uclo.h       |  132 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |  248 ++-
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |   13 +-
 drivers/crypto/qat/qat_common/qat_crypto.c         |  162 +-
 drivers/crypto/qat/qat_common/qat_crypto.h         |   26 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |  421 +++--
 drivers/crypto/qat/qat_common/qat_uclo.c           |  737 +++++++--
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |   60 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |    5 +
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |    9 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |    7 +-
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |    4 +-
 drivers/crypto/qce/common.c                        |    3 +-
 drivers/crypto/qce/core.c                          |   18 +-
 drivers/crypto/qce/sha.c                           |    2 +-
 drivers/crypto/qce/sha.h                           |    3 +-
 drivers/crypto/rockchip/rk3288_crypto.h            |    3 +-
 drivers/crypto/s5p-sss.c                           |    3 +-
 drivers/crypto/sa2ul.c                             |  121 +-
 drivers/crypto/sa2ul.h                             |    7 +-
 drivers/crypto/sahara.c                            |    3 +-
 drivers/crypto/stm32/stm32-hash.c                  |    3 +-
 drivers/crypto/talitos.c                           |   13 +-
 drivers/crypto/ux500/hash/hash_core.c              |    3 +-
 drivers/firmware/efi/embedded-firmware.c           |    2 +-
 .../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c    |    3 +-
 .../ethernet/chelsio/inline_crypto/chtls/chtls.h   |    3 +-
 drivers/nfc/s3fwrn5/firmware.c                     |    2 +-
 drivers/tee/tee_core.c                             |    2 +-
 fs/crypto/fname.c                                  |    2 +-
 fs/crypto/hkdf.c                                   |    2 +-
 fs/ubifs/auth.c                                    |    1 -
 fs/verity/fsverity_private.h                       |    2 +-
 include/crypto/aead.h                              |    5 +
 include/crypto/curve25519.h                        |    2 +
 include/crypto/hash_info.h                         |    3 +-
 include/crypto/internal/blake2s.h                  |    2 +
 include/crypto/sha1.h                              |   46 +
 include/crypto/sha1_base.h                         |    5 +-
 include/crypto/{sha.h => sha2.h}                   |   41 +-
 include/crypto/sha256_base.h                       |    5 +-
 include/crypto/sha512_base.h                       |    5 +-
 include/crypto/sm3_base.h                          |    3 +-
 include/linux/ccp.h                                |    3 +-
 include/linux/filter.h                             |    2 +-
 include/linux/purgatory.h                          |    2 +-
 include/uapi/linux/if_alg.h                        |   16 +
 kernel/crash_core.c                                |    2 +-
 kernel/kexec_core.c                                |    1 -
 kernel/kexec_file.c                                |    2 +-
 lib/crypto/blake2s-selftest.c                      |    2 +-
 lib/crypto/blake2s.c                               |    2 -
 lib/crypto/curve25519.c                            |    2 -
 lib/crypto/sha256.c                                |  214 +--
 lib/digsig.c                                       |    2 +-
 lib/mpi/ec.c                                       |    3 -
 lib/sha1.c                                         |    2 +-
 net/ipv6/seg6_hmac.c                               |    1 -
 net/mptcp/crypto.c                                 |    2 +-
 net/mptcp/options.c                                |    2 +-
 net/mptcp/subflow.c                                |    2 +-
 security/integrity/integrity.h                     |    2 +-
 security/keys/encrypted-keys/encrypted.c           |    2 +-
 security/keys/trusted-keys/trusted_tpm1.c          |    2 +-
 sound/soc/codecs/cros_ec_codec.c                   |    2 +-
 264 files changed, 8427 insertions(+), 1992 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml
 delete mode 100644 arch/x86/crypto/aes_glue.c
 delete mode 100644 drivers/char/hw_random/hisi-trng-v2.c
 create mode 100644 drivers/crypto/hisilicon/trng/Makefile
 create mode 100644 drivers/crypto/hisilicon/trng/trng.c
 create mode 100644 drivers/crypto/keembay/Kconfig
 create mode 100644 drivers/crypto/keembay/Makefile
 create mode 100644 drivers/crypto/keembay/keembay-ocs-aes-core.c
 create mode 100644 drivers/crypto/keembay/ocs-aes.c
 create mode 100644 drivers/crypto/keembay/ocs-aes.h
 create mode 100644 drivers/crypto/qat/qat_4xxx/Makefile
 create mode 100644 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c
 create mode 100644 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h
 create mode 100644 drivers/crypto/qat/qat_4xxx/adf_drv.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_hw_data.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h
 create mode 100644 include/crypto/sha1.h
 rename include/crypto/{sha.h => sha2.h} (77%)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.11
  2020-12-14  5:55   ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
@ 2020-12-14 20:56     ` pr-tracker-bot
  2021-02-15  2:47     ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-12-14 20:56 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 14 Dec 2020 16:55:16 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/9e4b0d55d84a66dbfede56890501dc96e696059c

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.11
  2020-10-26  1:11   ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
  2020-10-26 17:52     ` pr-tracker-bot
@ 2020-12-27 11:32     ` Herbert Xu
  2020-12-27 17:27       ` pr-tracker-bot
  2021-01-08  3:54       ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-12-27 11:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a number of autobuild failures due to missing
Kconfig dependencies.

The following changes since commit 93cebeb1c21a65b92636aaa278a32fbc0415ec67:

  crypto: qat - add capability detection logic in qat_4xxx (2020-12-11 21:54:16 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to c0e583ab2016de8dedfb73934d4c4e8ff5bd896c:

  crypto: qat - add CRYPTO_AES to Kconfig dependencies (2020-12-23 18:45:23 +1100)

----------------------------------------------------------------
Daniele Alessandrelli (1):
      crypto: keembay - Add dependency on HAS_IOMEM

Geert Uytterhoeven (1):
      crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_AES_SM4 should depend on ARCH_KEEMBAY

Marco Chiappero (1):
      crypto: qat - add CRYPTO_AES to Kconfig dependencies

 drivers/crypto/keembay/Kconfig | 5 +++--
 drivers/crypto/qat/Kconfig     | 1 +
 2 files changed, 4 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.11
  2020-12-27 11:32     ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
@ 2020-12-27 17:27       ` pr-tracker-bot
  2021-01-08  3:54       ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-12-27 17:27 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sun, 27 Dec 2020 22:32:21 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/33c148a4ae7dc3cd440f6c0d746ac7f0ff320682

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.11
  2020-12-27 11:32     ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
  2020-12-27 17:27       ` pr-tracker-bot
@ 2021-01-08  3:54       ` Herbert Xu
  2021-01-08 20:36         ` pr-tracker-bot
                           ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2021-01-08  3:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a functional bug in arm/chacha-neon as well as a
potential buffer overflow in ecdh.

The following changes since commit 5c8fe583cce542aa0b84adc939ce85293de36e5e:

  Linux 5.11-rc1 (2020-12-27 15:30:22 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:

  crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)

----------------------------------------------------------------
Ard Biesheuvel (2):
      crypto: arm/chacha-neon - add missing counter increment
      crypto: ecdh - avoid buffer overflow in ecdh_set_secret()

 arch/arm/crypto/chacha-glue.c | 1 +
 crypto/ecdh.c                 | 3 ++-
 2 files changed, 3 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.11
  2021-01-08  3:54       ` Herbert Xu
@ 2021-01-08 20:36         ` pr-tracker-bot
  2021-01-18  5:13         ` Herbert Xu
  2021-07-08  3:09         ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-01-08 20:36 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 8 Jan 2021 14:54:50 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ea1c87c156d94dd78b4f5267ec40c403b2da7e14

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.11
  2021-01-08  3:54       ` Herbert Xu
  2021-01-08 20:36         ` pr-tracker-bot
@ 2021-01-18  5:13         ` Herbert Xu
  2021-01-18 21:16           ` pr-tracker-bot
  2021-01-25 22:36           ` Herbert Xu
  2021-07-08  3:09         ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-01-18  5:13 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a Kconfig dependency issue with omap-sham and a
divide by zero in xor on some platforms.

The following changes since commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:

  crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 382811940303f7cd01d0f3dcdf432dfd89c5a98e:

  crypto: omap-sham - Fix link error without crypto-engine (2021-01-08 15:37:55 +1100)

----------------------------------------------------------------
Arnd Bergmann (1):
      crypto: omap-sham - Fix link error without crypto-engine

Kirill Tkhai (1):
      crypto: xor - Fix divide error in do_xor_speed()

 crypto/xor.c           | 2 ++
 drivers/crypto/Kconfig | 1 +
 2 files changed, 3 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.11
  2021-01-18  5:13         ` Herbert Xu
@ 2021-01-18 21:16           ` pr-tracker-bot
  2021-01-25 22:36           ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-01-18 21:16 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 18 Jan 2021 16:13:13 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/fd3958eac387593d02e4d4287658ba04bcdb235a

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.11
  2021-01-18  5:13         ` Herbert Xu
  2021-01-18 21:16           ` pr-tracker-bot
@ 2021-01-25 22:36           ` Herbert Xu
  2021-01-26  0:01             ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2021-01-25 22:36 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in the cesa driver.

The following changes since commit 382811940303f7cd01d0f3dcdf432dfd89c5a98e:

  crypto: omap-sham - Fix link error without crypto-engine (2021-01-08 15:37:55 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 4f6543f28bb05433d87b6de6c21e9c14c35ecf33:

  crypto: marvel/cesa - Fix tdma descriptor on 64-bit (2021-01-22 14:57:31 +1100)

----------------------------------------------------------------
Herbert Xu (1):
      crypto: marvel/cesa - Fix tdma descriptor on 64-bit

 drivers/crypto/marvell/cesa/cesa.h | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.11
  2021-01-25 22:36           ` Herbert Xu
@ 2021-01-26  0:01             ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-01-26  0:01 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 26 Jan 2021 09:36:19 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/13391c60da3308ed9980de0168f74cce6c62ac1d

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.12
  2020-12-14  5:55   ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
  2020-12-14 20:56     ` pr-tracker-bot
@ 2021-02-15  2:47     ` Herbert Xu
  2021-02-22  1:28       ` pr-tracker-bot
  2021-04-26 12:32       ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-02-15  2:47 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Restrict crypto_cipher to internal API users only.

Algorithms:

- Add x86 aesni acceleration for cts.
- Improve x86 aesni acceleration for xts.
- Remove x86 acceleration of some uncommon algorithms.
- Remove RIPE-MD, Tiger and Salsa20.
- Remove tnepres.
- Add ARM acceleration for BLAKE2s and BLAKE2b.

Drivers:

- Add Keem Bay OCS HCU driver.
- Add Marvell OcteonTX2 CPT PF driver.
- Remove PicoXcell driver.
- Remove mediatek driver.

The following changes since commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:

  crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 0de9dc80625b0ca1cb9730c5ed1c5a8cab538369:

  hwrng: timeriomem - Use device-managed registration API (2021-02-10 17:56:01 +1100)

----------------------------------------------------------------
Adam Guerin (3):
      crypto: qat - fix potential spectre issue
      crypto: qat - change format string and cast ring size
      crypto: qat - reduce size of mapped region

Ard Biesheuvel (60):
      crypto: aesni - implement support for cts(cbc(aes))
      crypto: tcrypt - avoid signed overflow in byte count
      chcr_ktls: use AES library for single use cipher
      crypto: remove cipher routines from public crypto API
      crypto: arm64/aes-ce - really hide slower algos when faster ones are enabled
      crypto: arm64/aes-ctr - improve tail handling
      crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
      crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
      crypto: aesni - prevent misaligned buffers on the stack
      crypto: aesni - drop unused asm prototypes
      crypto: aesni - clean up mapping of associated data
      crypto: aesni - refactor scatterlist processing
      crypto: aesni - replace function pointers with static branches
      crypto: x86/camellia - switch to XTS template
      crypto: x86/cast6 - switch to XTS template
      crypto: x86/serpent- switch to XTS template
      crypto: x86/twofish - switch to XTS template
      crypto: x86/glue-helper - drop XTS helper routines
      crypto: x86/camellia - drop CTR mode implementation
      crypto: x86/serpent - drop CTR mode implementation
      crypto: x86/cast5 - drop CTR mode implementation
      crypto: x86/cast6 - drop CTR mode implementation
      crypto: x86/twofish - drop CTR mode implementation
      crypto: x86/glue-helper - drop CTR helper routines
      crypto: x86/des - drop CTR mode implementation
      crypto: x86/blowfish - drop CTR mode implementation
      crypto: x86 - add some helper macros for ECB and CBC modes
      crypto: x86/camellia - drop dependency on glue helper
      crypto: x86/serpent - drop dependency on glue helper
      crypto: x86/cast5 - drop dependency on glue helper
      crypto: x86/cast6 - drop dependency on glue helper
      crypto: x86/twofish - drop dependency on glue helper
      crypto: x86 - remove glue helper module
      crypto: x86 - use local headers for x86 specific shared declarations
      crypto - shash: reduce minimum alignment of shash_desc structure
      crypto: arm64/sha - add missing module aliases
      crypto: aesni - replace CTR function pointer with static call
      crypto: aesni - release FPU during skcipher walk API calls
      crypto: rmd128 - remove RIPE-MD 128 hash algorithm
      crypto: rmd256 - remove RIPE-MD 256 hash algorithm
      crypto: rmd320 - remove RIPE-MD 320 hash algorithm
      crypto: tgr192 - remove Tiger 128/160/192 hash algorithms
      crypto: salsa20 - remove Salsa20 stream cipher algorithm
      arm64: assembler: add cond_yield macro
      crypto: michael_mic - fix broken misalignment handling
      crypto: serpent - get rid of obsolete tnepres variant
      crypto: serpent - use unaligned accessors instead of alignmask
      crypto: blowfish - use unaligned accessors instead of alignmask
      crypto: camellia - use unaligned accessors instead of alignmask
      crypto: cast5 - use unaligned accessors instead of alignmask
      crypto: cast6 - use unaligned accessors instead of alignmask
      crypto: fcrypt - drop unneeded alignmask
      crypto: twofish - use unaligned accessors instead of alignmask
      crypto: arm64/sha1-ce - simplify NEON yield
      crypto: arm64/sha2-ce - simplify NEON yield
      crypto: arm64/sha3-ce - simplify NEON yield
      crypto: arm64/sha512-ce - simplify NEON yield
      crypto: arm64/aes-neonbs - remove NEON yield calls
      crypto: arm64/aes-ce-mac - simplify NEON yield
      crypto: arm64/crc-t10dif - move NEON yield to C code

Arnd Bergmann (1):
      crypto: octeontx2 - fix -Wpointer-bool-conversion warning

Bhaskar Chowdhury (2):
      crypto: marvell/cesa - Fix a spelling s/fautly/faultly/ in comment
      crypto: xor - Fix typo of optimization

Christophe JAILLET (1):
      hwrng: ingenic - Fix a resource leak in an error handling path

Christophe Leroy (2):
      crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
      crypto: talitos - Fix ctr(aes) on SEC1

Corentin Labbe (8):
      crypto: sun4i-ss - linearize buffers content must be kept
      crypto: sun4i-ss - checking sg length is not sufficient
      crypto: sun4i-ss - IV register does not work on A10 and A13
      crypto: sun4i-ss - handle BigEndian for cipher
      crypto: sun4i-ss - initialize need_fallback
      crypto: sun4i-ss - fix kmap usage
      crypto: sun4i-ss - enabled stats via debugfs
      crypto: sun4i-ss - add SPDX header and remove blank lines

Dan Carpenter (2):
      crypto: keembay-ocs-hcu - Fix a WARN() message
      crypto: octeontx2 - fix signedness bug in cptvf_register_interrupts()

Daniele Alessandrelli (6):
      crypto: keembay-ocs-hcu - Add HMAC support
      crypto: keembay-ocs-hcu - Add optional support for sha224
      MAINTAINERS: Add maintainers for Keem Bay OCS HCU driver
      crypto: keembay-ocs-hcu - Add dependency on HAS_IOMEM and ARCH_KEEMBAY
      crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key()
      crypto: keembay-ocs-aes - Fix 'q' assignment during CCM B0 generation

Declan Murphy (2):
      dt-bindings: crypto: Add Keem Bay OCS HCU bindings
      crypto: keembay - Add Keem Bay OCS HCU driver

Eric Biggers (14):
      crypto: blake2s - define shash_alg structs using macros
      crypto: x86/blake2s - define shash_alg structs using macros
      crypto: blake2s - remove unneeded includes
      crypto: blake2s - move update and final logic to internal/blake2s.h
      crypto: blake2s - share the "shash" API boilerplate code
      crypto: blake2s - optimize blake2s initialization
      crypto: blake2s - add comment for blake2s_state fields
      crypto: blake2s - adjust include guard naming
      crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
      crypto: arm/blake2s - add ARM scalar optimized BLAKE2s
      wireguard: Kconfig: select CRYPTO_BLAKE2S_ARM
      crypto: blake2b - sync with blake2s implementation
      crypto: blake2b - update file comment
      crypto: arm/blake2b - add NEON-accelerated BLAKE2b

Fabio Estevam (1):
      crypto: sahara - Remove unused .id_table support

Florian Fainelli (1):
      crypto: crypto4xx - Avoid linking failure with HW_RANDOM=m

Geert Uytterhoeven (1):
      crypto: marvell - CRYPTO_DEV_OCTEONTX2_CPT should depend on ARCH_THUNDER2

Herbert Xu (6):
      crypto: vmx - Move extern declarations into header file
      crypto: stm32 - Fix last sparse warning in stm32_cryp_check_ctr_counter
      crypto: bcm - Fix sparse warnings
      crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
      crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
      Merge git://git.kernel.org/.../arm64/linux for-next/crypto

Hui Tang (6):
      crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
      crypto: hisilicon/hpre - add two RAS correctable errors processing
      crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
      crypto: hisilicon/hpre - adapt the number of clusters
      crypto: hisilicon/hpre - tiny fix
      crypto: hisilicon/hpre - enable Elliptic curve cryptography

Jan Henrik Weinstock (1):
      hwrng: timeriomem - Fix cooldown period calculation

Jason A. Donenfeld (1):
      crypto: lib/chacha20poly1305 - define empty module exit function

Jiapeng Chong (1):
      crypto: caam - Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE

Jiri Olsa (1):
      crypto: bcm - Rename struct device_private to bcm_device_private

Kai Ye (4):
      crypto: hisilicon/qm - SVA bugfixed on Kunpeng920
      crypto: hisilicon - add ZIP device using mode parameter
      crypto: hisilicon/hpre - register HPRE device to uacce
      crypto: hisilicon/sec - register SEC device to uacce

Krzysztof Kozlowski (1):
      MAINTAINERS: crypto: s5p-sss: drop Kamil Konieczny

Marco Chiappero (1):
      crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig

Matthias Brugger (2):
      hwrng: iproc-rng200 - Fix disable of the block.
      hwrng: iproc-rng200 - Move enable/disable in separate function

Ovidiu Panait (1):
      crypto: keembay - use 64-bit arithmetic for computing bit_len

Rob Herring (1):
      crypto: picoxcell - Remove PicoXcell driver

Sihang Chen (1):
      crypto: hisilicon/qm - update irqflag

Srujana Challa (9):
      crypto: marvell - add Marvell OcteonTX2 CPT PF driver
      crypto: octeontx2 - add mailbox communication with AF
      crypto: octeontx2 - enable SR-IOV and mailbox communication with VF
      crypto: octeontx2 - load microcode and create engine groups
      crypto: octeontx2 - add LF framework
      crypto: octeontx2 - add support to get engine capabilities
      crypto: octeontx2 - add virtual function driver support
      crypto: octeontx2 - add support to process the crypto request
      crypto: octeontx2 - register with linux crypto framework

Tian Tao (4):
      crypto: ccree - remove unused including <linux/version.h>
      crypto: inside-secure - fix platform_get_irq.cocci warnings
      hwrng: optee - Use device-managed registration API
      hwrng: timeriomem - Use device-managed registration API

Vic Wu (1):
      crypto: mediatek - remove obsolete driver

Weili Qian (7):
      crypto: hisilicon/qm - fix use of 'dma_map_single'
      crypto: hisilicon - PASID fixed on Kunpeng 930
      crypto: hisilicon/qm - removing driver after reset
      crypto: hisilicon/qm - fix request missing error
      crypto: hisilicon/qm - fix the value of 'QM_SQC_VFT_BASE_MASK_V2'
      crypto: hisilicon/qm - do not reset hardware when CE happens
      crypto: hisilicon/qm - fix printing format issue

Wojciech Ziemba (1):
      crypto: qat - configure arbiter mapping based on engines enabled

Xu Wang (1):
      crypto: cpt - remove casting dma_alloc_coherent

Yang Li (1):
      crypto: powerpc/sha256 - remove unneeded semicolon

dingsenjie (1):
      crypto: ccree - fix spelling typo of allocated

 .mailmap                                           |    1 -
 .../admin-guide/device-mapper/dm-integrity.rst     |    4 +-
 Documentation/crypto/api-skcipher.rst              |    4 +-
 .../bindings/crypto/intel,keembay-ocs-hcu.yaml     |   46 +
 .../bindings/crypto/samsung-slimsss.yaml           |    1 -
 .../devicetree/bindings/crypto/samsung-sss.yaml    |    1 -
 MAINTAINERS                                        |   12 +-
 arch/arm/crypto/Kconfig                            |   19 +
 arch/arm/crypto/Makefile                           |    4 +
 arch/arm/crypto/aes-neonbs-glue.c                  |    3 +
 arch/arm/crypto/blake2b-neon-core.S                |  347 ++++
 arch/arm/crypto/blake2b-neon-glue.c                |  105 ++
 arch/arm/crypto/blake2s-core.S                     |  285 +++
 arch/arm/crypto/blake2s-glue.c                     |   78 +
 arch/arm64/crypto/aes-glue.c                       |   71 +-
 arch/arm64/crypto/aes-modes.S                      |  217 ++-
 arch/arm64/crypto/aes-neonbs-core.S                |    8 +-
 arch/arm64/crypto/crct10dif-ce-core.S              |   43 +-
 arch/arm64/crypto/crct10dif-ce-glue.c              |   30 +-
 arch/arm64/crypto/sha1-ce-core.S                   |   47 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |   23 +-
 arch/arm64/crypto/sha2-ce-core.S                   |   38 +-
 arch/arm64/crypto/sha2-ce-glue.c                   |   24 +-
 arch/arm64/crypto/sha3-ce-core.S                   |   81 +-
 arch/arm64/crypto/sha3-ce-glue.c                   |   18 +-
 arch/arm64/crypto/sha512-ce-core.S                 |   29 +-
 arch/arm64/crypto/sha512-ce-glue.c                 |   55 +-
 arch/arm64/include/asm/assembler.h                 |   16 +
 arch/powerpc/crypto/sha256-spe-glue.c              |    2 +-
 arch/s390/crypto/aes_s390.c                        |    2 +
 arch/x86/crypto/Makefile                           |    2 -
 arch/x86/crypto/aesni-intel_asm.S                  |  482 +++++-
 arch/x86/crypto/aesni-intel_glue.c                 |  753 ++++----
 arch/x86/crypto/blake2s-glue.c                     |  150 +-
 arch/x86/crypto/blowfish_glue.c                    |  107 --
 arch/x86/crypto/camellia-aesni-avx-asm_64.S        |  298 ----
 arch/x86/crypto/camellia-aesni-avx2-asm_64.S       |  351 ----
 arch/x86/{include/asm => }/crypto/camellia.h       |   24 -
 arch/x86/crypto/camellia_aesni_avx2_glue.c         |  198 +--
 arch/x86/crypto/camellia_aesni_avx_glue.c          |  216 +--
 arch/x86/crypto/camellia_glue.c                    |  145 +-
 arch/x86/crypto/cast5_avx_glue.c                   |  287 +---
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |   84 -
 arch/x86/crypto/cast6_avx_glue.c                   |  207 +--
 arch/x86/crypto/des3_ede_glue.c                    |  104 --
 arch/x86/crypto/ecb_cbc_helpers.h                  |   76 +
 arch/x86/crypto/glue_helper-asm-avx.S              |  104 --
 arch/x86/crypto/glue_helper-asm-avx2.S             |  136 --
 arch/x86/crypto/glue_helper.c                      |  381 -----
 arch/x86/crypto/serpent-avx-x86_64-asm_64.S        |   68 -
 arch/x86/crypto/serpent-avx.h                      |   21 +
 arch/x86/crypto/serpent-avx2-asm_64.S              |   87 -
 arch/x86/{include/asm => }/crypto/serpent-sse2.h   |    0
 arch/x86/crypto/serpent_avx2_glue.c                |  185 +-
 arch/x86/crypto/serpent_avx_glue.c                 |  215 +--
 arch/x86/crypto/serpent_sse2_glue.c                |  150 +-
 arch/x86/crypto/twofish-avx-x86_64-asm_64.S        |   80 -
 arch/x86/{include/asm => }/crypto/twofish.h        |    4 -
 arch/x86/crypto/twofish_avx_glue.c                 |  211 +--
 arch/x86/crypto/twofish_glue_3way.c                |  160 +-
 arch/x86/include/asm/crypto/glue_helper.h          |  118 --
 arch/x86/include/asm/crypto/serpent-avx.h          |   42 -
 crypto/Kconfig                                     |   96 +-
 crypto/Makefile                                    |    4 -
 crypto/adiantum.c                                  |    2 +
 crypto/ansi_cprng.c                                |    2 +
 crypto/blake2b_generic.c                           |  249 +--
 crypto/blake2s_generic.c                           |  158 +-
 crypto/blowfish_generic.c                          |   23 +-
 crypto/camellia_generic.c                          |   45 +-
 crypto/cast5_generic.c                             |   23 +-
 crypto/cast6_generic.c                             |   39 +-
 crypto/cbc.c                                       |    1 +
 crypto/ccm.c                                       |    2 +
 crypto/cfb.c                                       |    2 +
 crypto/cipher.c                                    |    7 +-
 crypto/cmac.c                                      |    2 +
 crypto/ctr.c                                       |    2 +
 crypto/drbg.c                                      |    2 +
 crypto/ecb.c                                       |    1 +
 crypto/ecdh_helper.c                               |    3 +
 crypto/essiv.c                                     |    2 +
 crypto/fcrypt.c                                    |    1 -
 crypto/keywrap.c                                   |    2 +
 crypto/michael_mic.c                               |   31 +-
 crypto/ofb.c                                       |    2 +
 crypto/pcbc.c                                      |    2 +
 crypto/ripemd.h                                    |   14 -
 crypto/rmd128.c                                    |  323 ----
 crypto/rmd256.c                                    |  342 ----
 crypto/rmd320.c                                    |  391 -----
 crypto/salsa20_generic.c                           |  212 ---
 crypto/serpent_generic.c                           |  126 +-
 crypto/skcipher.c                                  |    8 +-
 crypto/tcrypt.c                                    |  113 +-
 crypto/testmgr.c                                   |   57 +-
 crypto/testmgr.h                                   | 1632 ------------------
 crypto/tgr192.c                                    |  682 --------
 crypto/twofish_generic.c                           |   11 +-
 crypto/vmac.c                                      |    2 +
 crypto/xcbc.c                                      |    2 +
 crypto/xor.c                                       |    2 +-
 crypto/xts.c                                       |    2 +
 drivers/char/hw_random/ingenic-trng.c              |    6 +-
 drivers/char/hw_random/iproc-rng200.c              |   38 +-
 drivers/char/hw_random/optee-rng.c                 |    3 +-
 drivers/char/hw_random/timeriomem-rng.c            |    5 +-
 drivers/crypto/Kconfig                             |   35 +-
 drivers/crypto/Makefile                            |    2 -
 drivers/crypto/allwinner/Kconfig                   |    9 +
 .../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c    |  196 ++-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |   52 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c  |    6 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-prng.c  |    6 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h       |    8 +
 drivers/crypto/bcm/cipher.c                        |    6 +-
 drivers/crypto/bcm/cipher.h                        |    4 +-
 drivers/crypto/bcm/spu.c                           |   20 +-
 drivers/crypto/bcm/spu2.c                          |    6 +-
 drivers/crypto/bcm/spu2.h                          |    8 +-
 drivers/crypto/bcm/spum.h                          |   22 +-
 drivers/crypto/bcm/util.c                          |    4 +-
 drivers/crypto/bcm/util.h                          |   26 +-
 drivers/crypto/caam/debugfs.c                      |    4 +-
 drivers/crypto/cavium/cpt/cptvf_main.c             |    8 +-
 drivers/crypto/ccree/cc_cipher.c                   |    2 +-
 drivers/crypto/ccree/cc_driver.h                   |    1 -
 drivers/crypto/geode-aes.c                         |    2 +
 drivers/crypto/hisilicon/hpre/hpre.h               |    8 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |  169 +-
 drivers/crypto/hisilicon/qm.c                      |  193 ++-
 drivers/crypto/hisilicon/qm.h                      |   33 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   42 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |   23 +-
 drivers/crypto/inside-secure/safexcel.c            |    6 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |    1 +
 drivers/crypto/keembay/Kconfig                     |   31 +
 drivers/crypto/keembay/Makefile                    |    3 +
 drivers/crypto/keembay/keembay-ocs-hcu-core.c      | 1264 ++++++++++++++
 drivers/crypto/keembay/ocs-aes.c                   |   10 +-
 drivers/crypto/keembay/ocs-hcu.c                   |  840 +++++++++
 drivers/crypto/keembay/ocs-hcu.h                   |  106 ++
 drivers/crypto/marvell/Kconfig                     |   15 +
 drivers/crypto/marvell/Makefile                    |    1 +
 drivers/crypto/marvell/cesa/cesa.c                 |   10 +-
 drivers/crypto/marvell/cesa/cesa.h                 |   31 +-
 drivers/crypto/marvell/cesa/cipher.c               |   34 +-
 drivers/crypto/marvell/cesa/hash.c                 |   59 +-
 drivers/crypto/marvell/cesa/tdma.c                 |   52 +-
 drivers/crypto/marvell/octeontx2/Makefile          |   10 +
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |  137 ++
 .../crypto/marvell/octeontx2/otx2_cpt_hw_types.h   |  464 +++++
 .../marvell/octeontx2/otx2_cpt_mbox_common.c       |  202 +++
 drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h |  197 +++
 drivers/crypto/marvell/octeontx2/otx2_cptlf.c      |  428 +++++
 drivers/crypto/marvell/octeontx2/otx2_cptlf.h      |  353 ++++
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |   61 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |  713 ++++++++
 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c |  356 ++++
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    | 1415 +++++++++++++++
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.h    |  162 ++
 drivers/crypto/marvell/octeontx2/otx2_cptvf.h      |   29 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 1758 +++++++++++++++++++
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h |  178 ++
 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c |  410 +++++
 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c |  167 ++
 .../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c   |  541 ++++++
 drivers/crypto/mediatek/Makefile                   |    3 -
 drivers/crypto/mediatek/mtk-aes.c                  | 1271 --------------
 drivers/crypto/mediatek/mtk-platform.c             |  586 -------
 drivers/crypto/mediatek/mtk-platform.h             |  231 ---
 drivers/crypto/mediatek/mtk-regs.h                 |  190 --
 drivers/crypto/mediatek/mtk-sha.c                  | 1353 ---------------
 drivers/crypto/picoxcell_crypto.c                  | 1807 --------------------
 drivers/crypto/picoxcell_crypto_regs.h             |  115 --
 drivers/crypto/qat/Kconfig                         |    2 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |   14 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |   17 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |   27 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    3 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    1 +
 drivers/crypto/qat/qat_common/adf_hw_arbiter.c     |    8 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |    2 +
 .../crypto/qat/qat_common/adf_transport_debug.c    |    4 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |    1 +
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |   12 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |   28 +-
 drivers/crypto/sahara.c                            |    7 -
 drivers/crypto/stm32/stm32-cryp.c                  |    2 +-
 drivers/crypto/talitos.c                           |   50 +-
 drivers/crypto/talitos.h                           |    1 +
 drivers/crypto/vmx/aes.c                           |    1 +
 drivers/crypto/vmx/aesp8-ppc.h                     |    6 +
 drivers/crypto/vmx/vmx.c                           |    7 +-
 drivers/net/Kconfig                                |    1 +
 drivers/net/ethernet/chelsio/inline_crypto/Kconfig |    1 +
 .../chelsio/inline_crypto/ch_ktls/chcr_ktls.c      |   19 +-
 include/crypto/algapi.h                            |   39 -
 include/crypto/blake2b.h                           |   67 +
 include/crypto/blake2s.h                           |   63 +-
 include/crypto/hash.h                              |    8 +-
 include/crypto/internal/blake2b.h                  |  115 ++
 include/crypto/internal/blake2s.h                  |  109 +-
 include/crypto/internal/cipher.h                   |  218 +++
 include/crypto/internal/skcipher.h                 |    2 +-
 include/linux/crypto.h                             |  172 +-
 lib/crypto/blake2s.c                               |   48 +-
 lib/crypto/chacha20poly1305.c                      |    5 +
 208 files changed, 13977 insertions(+), 15312 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-hcu.yaml
 create mode 100644 arch/arm/crypto/blake2b-neon-core.S
 create mode 100644 arch/arm/crypto/blake2b-neon-glue.c
 create mode 100644 arch/arm/crypto/blake2s-core.S
 create mode 100644 arch/arm/crypto/blake2s-glue.c
 rename arch/x86/{include/asm => }/crypto/camellia.h (69%)
 create mode 100644 arch/x86/crypto/ecb_cbc_helpers.h
 delete mode 100644 arch/x86/crypto/glue_helper.c
 create mode 100644 arch/x86/crypto/serpent-avx.h
 rename arch/x86/{include/asm => }/crypto/serpent-sse2.h (100%)
 rename arch/x86/{include/asm => }/crypto/twofish.h (80%)
 delete mode 100644 arch/x86/include/asm/crypto/glue_helper.h
 delete mode 100644 arch/x86/include/asm/crypto/serpent-avx.h
 delete mode 100644 crypto/rmd128.c
 delete mode 100644 crypto/rmd256.c
 delete mode 100644 crypto/rmd320.c
 delete mode 100644 crypto/salsa20_generic.c
 delete mode 100644 crypto/tgr192.c
 create mode 100644 drivers/crypto/keembay/keembay-ocs-hcu-core.c
 create mode 100644 drivers/crypto/keembay/ocs-hcu.c
 create mode 100644 drivers/crypto/keembay/ocs-hcu.h
 create mode 100644 drivers/crypto/marvell/octeontx2/Makefile
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_hw_types.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_mbox_common.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptlf.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptlf.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c
 delete mode 100644 drivers/crypto/mediatek/Makefile
 delete mode 100644 drivers/crypto/mediatek/mtk-aes.c
 delete mode 100644 drivers/crypto/mediatek/mtk-platform.c
 delete mode 100644 drivers/crypto/mediatek/mtk-platform.h
 delete mode 100644 drivers/crypto/mediatek/mtk-regs.h
 delete mode 100644 drivers/crypto/mediatek/mtk-sha.c
 delete mode 100644 drivers/crypto/picoxcell_crypto.c
 delete mode 100644 drivers/crypto/picoxcell_crypto_regs.h
 create mode 100644 include/crypto/blake2b.h
 create mode 100644 include/crypto/internal/blake2b.h
 create mode 100644 include/crypto/internal/cipher.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.12
  2021-02-15  2:47     ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
@ 2021-02-22  1:28       ` pr-tracker-bot
  2021-04-26 12:32       ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-02-22  1:28 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 15 Feb 2021 13:47:21 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/31caf8b2a847214be856f843e251fc2ed2cd1075

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.13
  2021-02-15  2:47     ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
  2021-02-22  1:28       ` pr-tracker-bot
@ 2021-04-26 12:32       ` Herbert Xu
  2021-04-26 15:59         ` pr-tracker-bot
  2021-06-28 11:00         ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-04-26 12:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- crypto_destroy_tfm now ignores errors as well as NULL pointers.

Algorithms:

- Add explicit curve IDs in ECDH algorithm names.
- Add NIST P384 curve parameters.
- Add ECDSA.

Drivers:

- Add support for Green Sardine in ccp.
- Add ecdh/curve25519 to hisilicon/hpre.
- Add support for AM64 in sa2ul.

The following changes since commit a38fd8748464831584a19438cbb3082b5a2dab15:

  Linux 5.12-rc2 (2021-03-05 17:33:41 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to e3a606f2c544b231f6079c8c5fea451e772e1139:

  fsverity: relax build time dependency on CRYPTO_SHA256 (2021-04-22 17:31:32 +1000)

----------------------------------------------------------------
Aditya Srivastava (4):
      crypto: vmx - fix incorrect kernel-doc comment syntax in files
      crypto: amcc - fix incorrect kernel-doc comment syntax in files
      crypto: ux500 - fix incorrect kernel-doc comment syntax
      crypto: nx - fix incorrect kernel-doc comment syntax in files

Ard Biesheuvel (6):
      crypto: api - check for ERR pointers in crypto_destroy_tfm()
      crypto: arm/aes-scalar - switch to common rev_l/mov_l macros
      crypto: arm/chacha-scalar - switch to common rev_l macro
      crypto: arm64/aes-ce - deal with oversight in new CTR carry code
      fscrypt: relax Kconfig dependencies for crypto API algorithms
      fsverity: relax build time dependency on CRYPTO_SHA256

Arnd Bergmann (1):
      crypto: poly1305 - fix poly1305_core_setkey() declaration

Ayush Sawal (1):
      crypto: chelsio - Read rxchannel-id from firmware

Bhaskar Chowdhury (2):
      crypto: qat - fix spelling mistake: "messge" -> "message"
      crypto: inside-secure - Minor typo fix in the file safexcel.c

Christophe JAILLET (1):
      crypto: crc32-generic - Use SPDX-License-Identifier

Colin Ian King (3):
      crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
      crypto: sun8i-ss - Fix memory leak of pad
      crypto: sa2ul - Fix memory leak of rxd

Corentin Labbe (2):
      crypto: sun8i-ss - fix result memory leak on error path
      crypto: allwinner - add missing CRYPTO_ prefix

Devaraj Rangasamy (1):
      ccp: ccp - add support for Green Sardine

Eric Biggers (5):
      crypto: arm/blake2b - drop unnecessary return statement
      crypto: arm/blake2s - fix for big endian
      crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
      random: initialize ChaCha20 constants with correct endianness
      random: remove dead code left over from blocking pool

Giovanni Cabiddu (1):
      crypto: qat - fix error path in adf_isr_resource_alloc()

Guobin Huang (2):
      crypto: geode - use DEFINE_SPINLOCK() for spinlock
      crypto: ixp4xx - use DEFINE_SPINLOCK() for spinlock

Hao Fang (1):
      crypto: hisilicon - use the correct HiSilicon copyright

Herbert Xu (3):
      crypto: serpent - Fix sparse byte order warnings
      crypto: aegis128 - Move simd prototypes into aegis.h
      Merge branch 'ecc'

Hui Tang (14):
      crypto: qat - fix unmap invalid dma address
      crypto: qat - fix use of 'dma_map_single'
      crypto: hisilicon/hpre - delete wrap of 'CONFIG_CRYPTO_DH'
      crypto: hisilicon/hpre - optimise 'hpre_algs_register' error path
      crypto: hisilicon - fix the check on dma address
      crypto: hisilicon/hpre - fix "hpre_ctx_init" resource leak
      crypto: hisilicon/hpre - fix Kconfig
      crypto: hisilicon/hpre - fix PASID setting on kunpeng 920
      crypto: hisilicon/hpre - fix a typo and delete redundant blank line
      crypto: hisilicon/hpre - delete redundant '\n'
      crypto: hisilicon/hpre - delete the rudundant space after return
      crypto: hisilicon/hpre - use the correct variable type
      crypto: hisilicon/hpre - add debug log
      crypto: hisilicon/hpre - delete redundant log and return in advance

Jia-Ju Bai (1):
      crypto: sun8i-ce - fix error return code in sun8i_ce_prng_generate()

Jiapeng Chong (2):
      crypto: ccp - A value assigned to a variable is never used
      crypto: chelsio - remove unused function

Kai Ye (11):
      crypto: testmgr - delete some redundant code
      crypto: rockchip - delete unneeded variable initialization
      crypto: hisilicon/sec - fixup checking the 3DES weak key
      crypto: hisilicon/qm - delete redundant code
      crypto: atmel - use the correct print format
      crypto: hisilicon/sec - use the correct print format
      crypto: hisilicon/sgl - add a comment for block size initialization
      crypto: hisilicon/sgl - delete unneeded variable initialization
      crypto: hisilicon/sgl - add some dfx logs
      crypto: hisilicon/sgl - fix the soft sg map to hardware sg
      crypto: hisilicon/sgl - fix the sg buf unmap

Krzysztof Kozlowski (4):
      crypto: s5p-sss - initialize APB clock after the AXI bus clock for SlimSSS
      crypto: s5p-sss - simplify getting of_device_id match data
      crypto: s5p-sss - remove unneeded local variable initialization
      crypto: s5p-sss - consistently use local 'dev' variable in probe()

Lee Jones (10):
      crypto: hisilicon/sec - Supply missing description for 'sec_queue_empty()'s 'queue' param
      crypto: bcm - Fix a whole host of kernel-doc misdemeanours
      crypto: chelsio - Fix some kernel-doc issues
      crypto: ux500/hash - Fix worthy kernel-doc headers and remove others
      crypto: keembay - Fix incorrectly named functions/structs
      crypto: atmel-ecc - Struct headers need to start with keyword 'struct'
      crypto: caam - Provide the name of the function and provide missing descriptions
      crypto: vmx - Source headers are not good kernel-doc candidates
      crypto: nx - Repair some kernel-doc problems
      crypto: nitrox - Demote non-compliant kernel-doc headers

Longfang Liu (5):
      crypto: hisilicon/sec - fixes a printing error
      crypto: hisilicon/sec - fixes some coding style
      crypto: hisilicon/sec - fixes some driver coding style
      crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
      crypto: hisilicon/sec - Fix a module parameter error

Lv Yunlong (1):
      crypto: qat - Fix a double free in adf_create_ring

Meng Yu (10):
      crypto: hisilicon/hpre - add version adapt to new algorithms
      crypto: hisilicon/hpre - add algorithm type
      crypto: ecdh - move curve_id of ECDH from the key to algorithm name
      crypto: ecc - expose ecc curves
      crypto: hisilicon/hpre - add 'ECDH' algorithm
      crypto: ecc - add curve25519 params and expose them
      crypto: hisilicon/hpre - add 'CURVE25519' algorithm
      crypto: ecc - Correct an error in the comments
      crypto: hisilicon/hpre - Add processing of src_data in 'CURVE25519'
      crypto: ecc - delete a useless function declaration

Milan Djurovic (3):
      crypto: jitterentropy - Put constants on the right side of the expression
      crypto: keywrap - Remove else after break statement
      crypto: fcrypt - Remove 'do while(0)' loop for single statement macro

Nathan Chancellor (1):
      crypto: arm/curve25519 - Move '.fpu' after '.arch'

Peter Ujfalusi (3):
      dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
      crypto: sa2ul - Support for per channel coherency
      crypto: sa2ul - Add support for AM64

Philipp Zabel (1):
      crypto: sun4i-ss - simplify optional reset handling

Randy Dunlap (2):
      crypto: doc - fix kernel-doc notation in chacha.c and af_alg.c
      crypto: camellia - drop duplicate "depends on CRYPTO"

Rijo Thomas (2):
      crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
      crypto: ccp - fix command queuing to TEE ring buffer

Ruiqi Gong (1):
      crypto: hisilicon/hpre - fix a typo in hpre_crypto.c

Saulo Alessandre (4):
      crypto: ecc - Add NIST P384 curve parameters
      crypto: ecc - Add math to support fast NIST P384
      crypto: ecdsa - Register NIST P384 and extend test suite
      x509: Add OID for NIST P384 and extend parser for it

Shixin Liu (7):
      crypto: sun4i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
      crypto: sun8i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
      crypto: sun8i-ce - Fix PM reference leak in sun8i_ce_probe()
      crypto: stm32/hash - Fix PM reference leak on stm32-hash.c
      crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c
      crypto: sa2ul - Fix PM reference leak in sa_ul_probe()
      crypto: omap-aes - Fix PM reference leak on omap-aes.c

Srujana Challa (1):
      crypto: octeontx2 - add support for OcteonTX2 98xx CPT block.

Stefan Berger (5):
      oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
      crypto: ecdsa - Add support for ECDSA signature verification
      x509: Detect sm2 keys by their parameters OID
      x509: Add support for parsing x509 certs with ECDSA keys
      ima: Support EC keys for signature verification

Tang Bin (1):
      crypto: amlogic - Fix unnecessary check in meson_crypto_probe()

Tang Yizhou (1):
      crypto: ccp - Use DEFINE_SPINLOCK() for spinlock

Thara Gopinath (11):
      crypto: qce - Restore/save ahash state with custom struct in export/import
      crypto: qce - Hold back a block of data to be transferred as part of final
      crypto: qce - Return unsupported if key1 and key 2 are same for AES XTS algorithm
      crypto: qce - Return unsupported if any three keys are same for DES3 algorithms
      crypto: qce - Return error for zero length messages
      crypto: qce - Return error for non-blocksize data(ECB/CBC algorithms)
      crypto: qce - Set ivsize to 0 for ecb(aes)
      crypto: qce - Improve the conditions for requesting AES fallback cipher
      crypto: qce - Set data unit size to message length for AES XTS transformation
      crypto: qce - Remover src_tbl from qce_cipher_reqctx
      crypto: qce - Remove totallen and offset in qce_start

Tian Tao (13):
      hwrng: ba431 - Use device-managed registration
      hwrng: xiphera-trng - use devm_platform_ioremap_resource() to simplify
      hwrng: bcm2835 - remove redundant null check
      hwrng: omap - Fix included header from 'asm'
      hwrng: cctrng - Use device-managed registration API
      hwrng: pic32 - Use device-managed registration API
      crypto: cavium - remove unused including <linux/version.h>
      hwrng: cctrng - use devm_platform_ioremap_resource() to simplify
      hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
      hwrng: intel - Fix included header from 'asm
      hwrng: omap - Use of_device_get_match_data() helper
      crypto: cavium/zip - remove unused including <linux/version.h>
      crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions

Tom Lendacky (1):
      crypto: ccp - Don't initialize SEV support without the SEV feature

Tong Zhang (2):
      crypto: qat - don't release uninitialized resources
      crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init

Vinay Kumar Yadav (1):
      crypto: chelsio/chcr - Remove useless MODULE_VERSION

Wan Jiabing (1):
      crypto: ux500/cryp - Remove duplicate argument

Wang Qing (1):
      hwrng: cctrng - delete redundant printing of return value

Wei Yongjun (2):
      crypto: keembay-ocs-hcu - Fix error return code in kmb_ocs_hcu_probe()
      crypto: keembay-ocs-aes - Fix error return code in kmb_ocs_aes_probe()

Weili Qian (10):
      crypto: hisilicon/qm - set the total number of queues
      crypto: hisilicon/qm - move 'CURRENT_QM' code to qm.c
      crypto: hisilicon/qm - set the number of queues for function
      crypto: hisilicon/qm - add queue isolation support for Kunpeng930
      crypto: hisilicon/qm - add stop queue by hardware
      crypto: hisilicon/trng - add version to adapt new algorithm
      crypto: hisilicon - dynamic configuration 'err_info'
      crypto: hisilicon - support new error types for ZIP
      crypto: hisilicon - add new error type for SEC
      crypto: hisilicon - enable new error types for QM

Wojciech Ziemba (1):
      crypto: qat - enable detection of accelerators hang

Xiang Chen (4):
      crypto: amlogic - Fix the parameter of dma_unmap_sg()
      crypto: cavium - Fix the parameter of dma_unmap_sg()
      crypto: ux500 - Fix the parameter of dma_unmap_sg()
      crypto: allwinner - Fix the parameter of dma_unmap_sg()

Yang Li (2):
      crypto: powepc/sha1 - remove unneeded semicolon
      crypto: nx - add missing call to of_node_put()

Yang Shen (4):
      crypto: hisilicon/zip - adjust functions location
      crypto: hisilicon/zip - add comments for 'hisi_zip_sqe'
      crypto: hisilicon/zip - initialize operations about 'sqe' in 'acomp_alg.init'
      crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930

YueHaibing (5):
      crypto: atmel-tdes - Remove redundant dev_err call in atmel_tdes_probe()
      crypto: img-hash - Remove redundant dev_err call in img_hash_probe()
      crypto: ux500 - Remove redundant dev_err calls
      crypto: keembay - Remove redundant dev_err calls
      crypto: ccree - Remove redundant dev_err call in init_cc_resources()

Zihao Tang (1):
      hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit

Álvaro Fernández Rojas (3):
      dt-bindings: rng: bcm2835: add clock constraints
      dt-bindings: rng: bcm2835: document reset support
      hwrng: bcm2835 - add reset support

 .../devicetree/bindings/crypto/ti,sa2ul.yaml       |  24 +-
 .../devicetree/bindings/rng/brcm,bcm2835.yaml      |  21 +
 arch/arm/crypto/aes-cipher-core.S                  |  42 +-
 arch/arm/crypto/blake2b-neon-glue.c                |   4 +-
 arch/arm/crypto/blake2s-core.S                     |  21 +
 arch/arm/crypto/chacha-scalar-core.S               |  43 +-
 arch/arm/crypto/curve25519-core.S                  |   2 +-
 arch/arm/crypto/poly1305-glue.c                    |   2 +-
 arch/arm64/crypto/aes-modes.S                      |   1 +
 arch/arm64/crypto/poly1305-glue.c                  |   2 +-
 arch/mips/crypto/poly1305-glue.c                   |   2 +-
 arch/powerpc/crypto/sha1-spe-glue.c                |   2 +-
 arch/x86/crypto/poly1305_glue.c                    |   6 +-
 crypto/Kconfig                                     |  15 +-
 crypto/Makefile                                    |   6 +
 crypto/aegis.h                                     |  19 +
 crypto/aegis128-core.c                             |  15 -
 crypto/aegis128-neon.c                             |  10 +-
 crypto/af_alg.c                                    |  94 ++-
 crypto/api.c                                       |   2 +-
 crypto/asymmetric_keys/public_key.c                |   4 +-
 crypto/asymmetric_keys/x509_cert_parser.c          |  49 +-
 crypto/asymmetric_keys/x509_public_key.c           |   4 +-
 crypto/crc32_generic.c                             |  24 +-
 crypto/ecc.c                                       | 291 +++++--
 crypto/ecc.h                                       |  49 +-
 crypto/ecc_curve_defs.h                            |  49 ++
 crypto/ecdh.c                                      |  72 +-
 crypto/ecdh_helper.c                               |   4 +-
 crypto/ecdsa.c                                     | 376 +++++++++
 crypto/ecdsasignature.asn1                         |   4 +
 crypto/fcrypt.c                                    |   5 +-
 crypto/jitterentropy.c                             |   8 +-
 crypto/keywrap.c                                   |   4 +-
 crypto/rng.c                                       |  10 +-
 crypto/serpent_generic.c                           |  39 +-
 crypto/testmgr.c                                   |  42 +-
 crypto/testmgr.h                                   | 458 +++++++++-
 drivers/char/hw_random/ba431-rng.c                 |  16 +-
 drivers/char/hw_random/bcm2835-rng.c               |  27 +-
 drivers/char/hw_random/cctrng.c                    |  20 +-
 drivers/char/hw_random/core.c                      |   2 +-
 drivers/char/hw_random/intel-rng.c                 |   2 +-
 drivers/char/hw_random/omap-rng.c                  |  14 +-
 drivers/char/hw_random/pic32-rng.c                 |   3 +-
 drivers/char/hw_random/xiphera-trng.c              |   4 +-
 drivers/char/random.c                              |  21 +-
 drivers/crypto/allwinner/Kconfig                   |  14 +-
 .../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c    |   2 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |  23 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c  |   2 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-prng.c  |   2 +-
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |   9 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |   2 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |   3 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c  |   1 +
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |  11 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |   2 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |  12 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c  |   4 +-
 drivers/crypto/amcc/crypto4xx_alg.c                |  12 +-
 drivers/crypto/amcc/crypto4xx_core.c               |  18 +-
 drivers/crypto/amcc/crypto4xx_core.h               |   4 +-
 drivers/crypto/amcc/crypto4xx_reg_def.h            |   8 +-
 drivers/crypto/amcc/crypto4xx_sa.h                 |  18 +-
 drivers/crypto/amcc/crypto4xx_trng.h               |   2 +-
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |   6 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c          |   3 -
 drivers/crypto/atmel-ecc.c                         |  30 +-
 drivers/crypto/atmel-i2c.c                         |   2 +-
 drivers/crypto/atmel-sha.c                         |   4 +-
 drivers/crypto/atmel-tdes.c                        |   1 -
 drivers/crypto/bcm/cipher.c                        |   7 +-
 drivers/crypto/bcm/spu.c                           |  16 +-
 drivers/crypto/bcm/spu2.c                          |  43 +-
 drivers/crypto/bcm/util.c                          |   4 +-
 drivers/crypto/caam/caamalg_qi2.c                  |   3 +
 drivers/crypto/caam/caampkc.c                      |   3 +-
 drivers/crypto/cavium/cpt/cptpf_main.c             |   1 -
 drivers/crypto/cavium/nitrox/nitrox_isr.c          |   4 +-
 drivers/crypto/cavium/nitrox/nitrox_reqmgr.c       |   9 +-
 drivers/crypto/cavium/zip/common.h                 |   1 -
 drivers/crypto/ccp/ccp-crypto-main.c               |   3 +-
 drivers/crypto/ccp/ccp-dev.c                       |  12 +-
 drivers/crypto/ccp/ccp-ops.c                       |   1 -
 drivers/crypto/ccp/sev-dev.c                       |   6 +
 drivers/crypto/ccp/sp-dev.c                        |  12 +-
 drivers/crypto/ccp/sp-dev.h                        |  15 +-
 drivers/crypto/ccp/sp-pci.c                        |   1 +
 drivers/crypto/ccp/tee-dev.c                       |  57 +-
 drivers/crypto/ccp/tee-dev.h                       |  20 +-
 drivers/crypto/ccree/cc_driver.c                   |   4 +-
 drivers/crypto/chelsio/chcr_algo.c                 |  32 +-
 drivers/crypto/chelsio/chcr_core.c                 |   5 +-
 drivers/crypto/chelsio/chcr_core.h                 |   1 -
 drivers/crypto/geode-aes.c                         |   4 +-
 drivers/crypto/hisilicon/Kconfig                   |   2 +
 drivers/crypto/hisilicon/hpre/hpre.h               |  18 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        | 921 ++++++++++++++++++++-
 drivers/crypto/hisilicon/hpre/hpre_main.c          | 158 ++--
 drivers/crypto/hisilicon/qm.c                      | 396 +++++++--
 drivers/crypto/hisilicon/qm.h                      |  29 +-
 drivers/crypto/hisilicon/sec/sec_algs.c            |   2 +-
 drivers/crypto/hisilicon/sec/sec_drv.c             |  13 +-
 drivers/crypto/hisilicon/sec/sec_drv.h             |   2 +-
 drivers/crypto/hisilicon/sec2/sec.h                |  10 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         | 137 +--
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |   6 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           | 267 +++---
 drivers/crypto/hisilicon/sgl.c                     |  37 +-
 drivers/crypto/hisilicon/trng/trng.c               |  13 +-
 drivers/crypto/hisilicon/zip/zip.h                 |  50 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          | 710 +++++++++-------
 drivers/crypto/hisilicon/zip/zip_main.c            |  99 +--
 drivers/crypto/img-hash.c                          |   3 -
 drivers/crypto/inside-secure/safexcel.c            |   2 +-
 drivers/crypto/ixp4xx_crypto.c                     |   7 +-
 drivers/crypto/keembay/keembay-ocs-aes-core.c      |   8 +-
 drivers/crypto/keembay/keembay-ocs-hcu-core.c      |   8 +-
 drivers/crypto/keembay/ocs-hcu.c                   |   8 +-
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |  10 +-
 .../marvell/octeontx2/otx2_cpt_mbox_common.c       |  14 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.c      |   8 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.h      |   1 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |   1 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |  33 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    | 144 +++-
 drivers/crypto/nx/nx-aes-cbc.c                     |   2 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |   2 +-
 drivers/crypto/nx/nx-aes-ctr.c                     |   2 +-
 drivers/crypto/nx/nx-aes-ecb.c                     |   2 +-
 drivers/crypto/nx/nx-aes-gcm.c                     |   2 +-
 drivers/crypto/nx/nx-aes-xcbc.c                    |   2 +-
 drivers/crypto/nx/nx-common-powernv.c              |   4 +-
 drivers/crypto/nx/nx-sha256.c                      |   2 +-
 drivers/crypto/nx/nx-sha512.c                      |   2 +-
 drivers/crypto/nx/nx.c                             |   5 +-
 drivers/crypto/nx/nx_debugfs.c                     |   2 +-
 drivers/crypto/omap-aes.c                          |   7 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |   1 +
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |   1 +
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |   4 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |   1 +
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |   4 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   1 +
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c   |  25 +
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h   |  13 +
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.c   |  40 +
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h   |  14 +-
 drivers/crypto/qat/qat_common/adf_init.c           |   4 +
 drivers/crypto/qat/qat_common/adf_isr.c            |  29 +-
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c      |   2 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |   1 +
 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c      |   4 +-
 drivers/crypto/qat/qat_common/adf_vf_isr.c         |  17 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |  32 +-
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |   4 +-
 drivers/crypto/qce/cipher.h                        |   1 -
 drivers/crypto/qce/common.c                        |  25 +-
 drivers/crypto/qce/common.h                        |   3 +-
 drivers/crypto/qce/sha.c                           | 143 ++--
 drivers/crypto/qce/skcipher.c                      |  69 +-
 drivers/crypto/rockchip/rk3288_crypto_ahash.c      |   2 +-
 drivers/crypto/s5p-sss.c                           |  17 +-
 drivers/crypto/sa2ul.c                             | 143 +++-
 drivers/crypto/sa2ul.h                             |   4 +
 drivers/crypto/stm32/stm32-cryp.c                  |   4 +-
 drivers/crypto/stm32/stm32-hash.c                  |   8 +-
 drivers/crypto/ux500/cryp/cryp.c                   |   5 +-
 drivers/crypto/ux500/cryp/cryp.h                   |   2 +-
 drivers/crypto/ux500/cryp/cryp_core.c              |  10 +-
 drivers/crypto/ux500/cryp/cryp_irq.c               |   2 +-
 drivers/crypto/ux500/cryp/cryp_irq.h               |   4 +-
 drivers/crypto/ux500/cryp/cryp_irqp.h              |   4 +-
 drivers/crypto/ux500/cryp/cryp_p.h                 |  15 +-
 drivers/crypto/ux500/hash/hash_core.c              |  18 +-
 drivers/crypto/vmx/aes.c                           |   2 +-
 drivers/crypto/vmx/aes_cbc.c                       |   2 +-
 drivers/crypto/vmx/aes_ctr.c                       |   2 +-
 drivers/crypto/vmx/aes_xts.c                       |   2 +-
 drivers/crypto/vmx/ghash.c                         |   2 +-
 drivers/crypto/vmx/vmx.c                           |   2 +-
 fs/crypto/Kconfig                                  |  30 +-
 fs/verity/Kconfig                                  |   8 +-
 include/crypto/acompress.h                         |   2 +
 include/crypto/aead.h                              |   2 +
 include/crypto/akcipher.h                          |   2 +
 include/crypto/chacha.h                            |   9 +-
 include/crypto/ecc_curve.h                         |  60 ++
 include/crypto/ecdh.h                              |   3 +-
 include/crypto/hash.h                              |   4 +
 include/crypto/internal/poly1305.h                 |   3 +-
 include/crypto/kpp.h                               |   2 +
 include/crypto/poly1305.h                          |   6 +-
 include/crypto/rng.h                               |   2 +
 include/crypto/skcipher.h                          |   2 +
 include/keys/asymmetric-type.h                     |   6 +
 include/linux/oid_registry.h                       |  10 +-
 include/trace/events/random.h                      |  83 --
 include/uapi/misc/uacce/hisi_qm.h                  |   1 +
 lib/crypto/chacha.c                                |   4 +-
 lib/crypto/poly1305-donna32.c                      |   3 +-
 lib/crypto/poly1305-donna64.c                      |   3 +-
 lib/crypto/poly1305.c                              |   3 +-
 lib/oid_registry.c                                 |  24 +
 net/bluetooth/ecdh_helper.c                        |   2 -
 net/bluetooth/selftest.c                           |   2 +-
 net/bluetooth/smp.c                                |   6 +-
 security/integrity/digsig_asymmetric.c             |  30 +-
 209 files changed, 4558 insertions(+), 1986 deletions(-)
 create mode 100644 crypto/ecdsa.c
 create mode 100644 crypto/ecdsasignature.asn1
 create mode 100644 include/crypto/ecc_curve.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.13
  2021-04-26 12:32       ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
@ 2021-04-26 15:59         ` pr-tracker-bot
  2021-06-28 11:00         ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-04-26 15:59 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 26 Apr 2021 20:32:00 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a4a78bc8ead44c3cdb470c6e1f37afcabdddfc14

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.14
  2021-04-26 12:32       ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
  2021-04-26 15:59         ` pr-tracker-bot
@ 2021-06-28 11:00         ` Herbert Xu
  2021-06-28 23:36           ` pr-tracker-bot
  2021-08-30  8:28           ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-06-28 11:00 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Algorithms:

- Fix rmmod crash with x86/curve25519.
- Add ECDH NIST P384.
- Generate assembly files at build-time with perl scripts on arm.
- Switch to HMAC SHA512 DRBG as default DRBG.

Drivers:

- Add sl3516 crypto engine.
- Add ECDH NIST P384 support in hisilicon/hpre.
- Add {ofb,cfb,ctr} over {aes,sm4} in hisilicon/sec.
- Add {ccm,gcm} over {aes,sm4} in hisilicon/sec.
- Enable omap hwrng driver for TI K3 family.
- Add support for AEAD algorithms in qce.

Please note that there is a merge conflict with cavium/nitrox,
the fix is to simply use the version from the crypto tree.

The following changes since commit 6efb943b8616ec53a5e444193dccf1af9ad627b5:

  Linux 5.13-rc1 (2021-05-09 14:17:44 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 9f38b678ffc4e2ccf167a1131c0403dc4f5e1bb7:

  crypto: sl3516 - depends on HAS_IOMEM (2021-06-24 14:57:28 +0800)

----------------------------------------------------------------
Ard Biesheuvel (2):
      crypto: tcrypt - enable tests for xxhash and blake2
      crypto: shash - avoid comparing pointers to exported functions under CFI

Arnd Bergmann (1):
      crypto: ixp4xx - convert to platform driver

Baokun Li (1):
      crypto: ccp - Use list_move_tail instead of list_del/list_add_tail in ccp-dmaengine.c

Bixuan Cui (1):
      crypto: nx - add missing MODULE_DEVICE_TABLE

Christophe JAILLET (3):
      crypto: cpt - Use 'hlist_for_each_entry' to simplify code
      crypto: ccp - Fix a resource leak in an error handling path
      crypto: cavium/nitrox - Fix an error rhandling path in 'nitrox_probe()'

Colin Ian King (2):
      hwrng: amd - remove redundant initialization of variable err
      crypto: hisilicon/sec - Fix spelling mistake "fallbcak" -> "fallback"

Corentin Labbe (15):
      crypto: ixp4xx - dma_unmap the correct address
      crypto: ixp4xx - update IV after requests
      crypto: ixp4xx - fallback when having more than one SG
      crypto: ixp4xx - convert unsigned to unsigned int
      crypto: ixp4xx - convert all printk to dev_xxx
      crypto: ixp4xx - whitespace fixes
      crypto: ixp4xx - Do not initialize static to NULL
      crypto: ixp4xx - remove brackets from single statement
      crypto: ixp4xx - Correct functions alignment
      MAINTAINERS: add ixp4xx_crypto to the right arch list
      MAINTAINERS: add myself as maintainer of ixp4xx_crypto
      dt-bindings: crypto: Add documentation for sl3516-ce
      crypto: sl3516 - Add sl3516 crypto engine
      MAINTAINERS: add gemini crypto sl3516-ce
      crypto: sl3516 - depends on HAS_IOMEM

Hangbin Liu (1):
      crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit

Herbert Xu (4):
      crypto: sa2ul - Remove unused auth_len variable
      crypto: api - Move crypto attr definitions out of crypto.h
      crypto: nx - Fix RCU warning in nx842_OF_upd_status
      crypto: nx - Fix numerous sparse byte-order warnings

Hongbo Li (1):
      crypto: sm2 - fix a memory leak in sm2

Horia Geantă (1):
      MAINTAINERS: update caam crypto driver maintainers list

Hui Tang (20):
      crypto: testmgr - fix initialization of 'secret_size'
      crypto: ecdh - extend 'cra_driver_name' with curve name
      crypto: hisilicon/hpre - extend 'cra_driver_name' with curve name
      crypto: hisilicon/hpre - fix unmapping invalid dma address
      crypto: hisilicon/hpre - the macro 'HPRE_ADDR' expands
      crypto: hisilicon/hpre - init a structure member each line
      crypto: hisilicon/hpre - replace macro with inline function
      crypto: hisilicon/hpre - remove the macro of 'HPRE_DEV'
      crypto: hisilicon/hpre - delete rudundant initialization
      crypto: hisilicon/hpre - use 'GENMASK' to generate mask value
      crypto: hisilicon/hpre - delete rudundant macro definition
      crypto: hisilicon/hpre - add 'default' for switch statement
      crypto: khazad,wp512 - remove leading spaces before tabs
      crypto: ecdh - fix ecdh-nist-p192's entry in testmgr
      crypto: ecdh - fix 'ecdh_init'
      crypto: ecdh - register NIST P384 tfm
      crypto: ecdh - add test suite for NIST P384
      crypto: hisilicon/hpre - fix ecdh self test issue
      crypto: hisilicon/hpre - add check before gx modulo p
      crypto: hisilicon/hpre - register ecdh NIST P384

Jack Xu (5):
      crypto: qat - return error when failing to map FW
      crypto: qat - check MMP size before writing to the SRAM
      crypto: qat - report an error if MMP file size is too large
      crypto: qat - check return code of qat_hal_rd_rel_reg()
      crypto: qat - remove unused macro in FW loader

Jiapeng Chong (1):
      crypto: qce - Fix inconsistent indenting

Joerg Roedel (1):
      crypto: ccp - Annotate SEV Firmware file names

Juerg Haefliger (1):
      hwrng: Kconfig - Remove leading spaces

Kai Ye (19):
      crypto: hisilicon/qm - add dfx log if not use hardware crypto algs
      crypto: hisilicon/qm - fix the process of VF's list adding
      crypto: hisilicon/sec - add new type of SQE
      crypto: hisilicon/sec - driver adapt to new SQE
      crypto: hisilicon/sec - add new skcipher mode for SEC
      crypto: hisilicon/sec - add fallback tfm supporting for XTS mode
      crypto: hisilicon/sec - fixup 3des minimum key size declaration
      crypto: hisilicon/sec - add new algorithm mode for AEAD
      crypto: hisilicon/sec - add fallback tfm supporting for aeads
      crypto: hisilicon/sec - add hardware integrity check value process
      crypto: hisilicon/sec - modify the SEC request structure
      crypto: hisilicon/qm - supports writing QoS int the host
      crypto: hisilicon/qm - add the "alg_qos" file node
      crypto: hisilicon/qm - merges the work initialization process into a single function
      crypto: hisilicon/qm - add pf ping single vf function
      crypto: hisilicon/qm - supports to inquiry each function's QoS
      crypto: hisilicon/sec - adds the max shaper type rate
      crypto: hisilicon/hpre - adds the max shaper type rate
      crypto: hisilicon/zip - adds the max shaper type rate

Kees Cook (1):
      crypto: nx - Fix memcpy() over-reading in nonce

Lee Jones (3):
      crypto: cavium: Fix a bunch of kernel-doc related issues
      crypto: nx: nx-aes-gcm: Kernel-doc formatting should not be used for headers
      crypto: ccp: ccp-dev: Fix a little doc-rot

Linus Walleij (2):
      crypto: ixp4xx - Add DT bindings
      crypto: ixp4xx - Add device tree support

Liu Shixin (1):
      crypto: api - remove CRYPTOA_U32 and related functions

Longfang Liu (1):
      crypto: hisilicon/qm - support address prefetching

Masahiro Yamada (4):
      crypto: arm - generate *.S by Perl at build time instead of shipping them
      crypto: arm - use a pattern rule for generating *.S files
      crypto: arm64 - generate *.S by Perl at build time instead of shipping them
      crypto: arm64 - use a pattern rule for generating *.S files

Shaokun Zhang (2):
      hwrng: core - remove redundant initialization of variable err
      crypto: nx - Fix typo in comment

Srujana Challa (4):
      crypto: octeontx2 - Add mailbox support for CN10K
      crypto: octeontx2 - add support to map LMTST region for CN10K
      crypto: octeontx2 - add support for CPT operations on CN10K
      crypto: octeontx2 - enable and handle ME interrupts

Stephan Müller (1):
      crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG

Suman Anna (6):
      hwrng: omap - Enable driver for TI K3 family
      crypto: sa2ul - Fix leaks on failure paths with sa_dma_init()
      crypto: sa2ul - Fix pm_runtime enable in sa_ul_probe()
      crypto: sa2ul - Use of_device_get_match_data() helper
      crypto: sa2ul - Use devm_platform_ioremap_resource()
      crypto: sa2ul - Remove child devices in remove

Thara Gopinath (9):
      crypto: qce - Add MAC failed error checking
      crypto: qce - Make result dump optional
      crypto: qce - Add mode for rfc4309
      crypto: qce - Add support for AEAD algorithms
      crypto: qce - Clean up qce_auth_cfg
      crypto: qce - Add support for AEAD algorithms
      crypto: qce - Schedule fallback aead algorithm
      crypto: qce: skcipher: Fix incorrect sg count for dma transfers
      MAINTAINERS: Add maintainer for Qualcomm crypto drivers

Tian Tao (3):
      hwrng: exynos - Use pm_runtime_resume_and_get() to replace open coding
      hwrng: omap - Use pm_runtime_resume_and_get() to replace open coding
      hwrng: ks-sa - Use pm_runtime_resume_and_get() to replace open coding

Tom Rix (1):
      crypto: marvell/cesa - change FPGA indirect article to an

Tong Tiangen (1):
      crypto: nitrox - fix unchecked variable in nitrox_register_interrupts

Wei Yongjun (2):
      crypto: qce - Fix some error handling path
      crypto: qce - fix error return code in qce_skcipher_async_req_handle()

Weili Qian (9):
      crypto: hisilicon/qm - initialize the device before doing tasks
      crypto: hisilicon/qm - modify 'QM_RESETTING' clearing error
      crypto: hisilicon/qm - adjust order of device error configuration
      crypto: hisilicon/qm - enable to close master ooo when NFE occurs
      crypto: hisilicon/qm - add MSI detection steps on Kunpeng930
      crypto: hisilicon/qm - adjust reset interface
      crypto: hisilicon/qm - enable PF and VFs communication
      crypto: hisilicon/qm - add callback to support communication
      crypto: hisilicon/qm - update reset flow

Wenkai Lin (1):
      crypto: hisilicon/qm - implement for querying hardware tasks status.

Wu Bo (1):
      crypto: af_alg - use DIV_ROUND_UP helper macro for calculations

Yang Li (2):
      crypto: cavium/nitrox - Remove redundant initialization of 'sg'
      crypto: cavium/nitrox - Fix kernel-doc

YueHaibing (2):
      hwrng: core - Use DEVICE_ATTR_<RW|RO> macro
      crypto: sl3516 - Fix build warning without CONFIG_PM

Zhang Qilong (2):
      crypto: omap-des - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
      crypto: omap-sham - Fix PM reference leak in omap sham ops

Zhen Lei (2):
      crypto: ux500 - Fix error return code in hash_hw_final()
      crypto: header - Fix spelling errors

Zou Wei (1):
      crypto: hisilicon - switch to memdup_user_nul()

kernel test robot (1):
      crypto: sl3516 - fix duplicated inclusion

Łukasz Stelmach (1):
      hwrng: exynos - Fix runtime PM imbalance on error

 .../bindings/crypto/cortina,sl3516-crypto.yaml     |   50 +
 .../bindings/crypto/intel,ixp4xx-crypto.yaml       |   47 +
 .../intel,ixp4xx-network-processing-engine.yaml    |   22 +-
 MAINTAINERS                                        |   23 +-
 arch/arm/crypto/Makefile                           |   10 +-
 arch/arm/crypto/poly1305-core.S_shipped            | 1158 --------
 arch/arm/crypto/sha256-core.S_shipped              | 2816 --------------------
 arch/arm/crypto/sha512-core.S_shipped              | 1869 -------------
 arch/arm/mach-ixp4xx/common.c                      |   26 +
 arch/arm64/crypto/Makefile                         |   10 +-
 arch/arm64/crypto/poly1305-core.S_shipped          |  835 ------
 arch/arm64/crypto/sha256-core.S_shipped            | 2069 --------------
 arch/arm64/crypto/sha512-core.S_shipped            | 1093 --------
 arch/x86/crypto/curve25519-x86_64.c                |    2 +-
 crypto/af_alg.c                                    |    2 +-
 crypto/algapi.c                                    |   18 -
 crypto/algboss.c                                   |   31 +-
 crypto/drbg.c                                      |   12 +-
 crypto/ecdh.c                                      |   49 +-
 crypto/internal.h                                  |   12 +
 crypto/khazad.c                                    |    2 +-
 crypto/shash.c                                     |   18 +-
 crypto/sm2.c                                       |   24 +-
 crypto/tcrypt.c                                    |   36 +
 crypto/testmgr.c                                   |   10 +-
 crypto/testmgr.h                                   |   71 +-
 crypto/wp512.c                                     |   40 +-
 drivers/char/hw_random/Kconfig                     |   10 +-
 drivers/char/hw_random/amd-rng.c                   |    2 +-
 drivers/char/hw_random/core.c                      |   38 +-
 drivers/char/hw_random/exynos-trng.c               |    7 +-
 drivers/char/hw_random/ks-sa-rng.c                 |    3 +-
 drivers/char/hw_random/omap-rng.c                  |    6 +-
 drivers/crypto/Kconfig                             |   41 +
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/cavium/cpt/cptpf_main.c             |    2 +-
 drivers/crypto/cavium/cpt/cptvf_reqmanager.c       |   10 +-
 drivers/crypto/cavium/nitrox/nitrox_isr.c          |    4 +
 drivers/crypto/cavium/nitrox/nitrox_main.c         |   22 +-
 drivers/crypto/cavium/nitrox/nitrox_mbx.c          |    4 +-
 drivers/crypto/cavium/nitrox/nitrox_reqmgr.c       |   16 +-
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c     |    2 +-
 drivers/crypto/ccp/ccp-dev.c                       |    2 +-
 drivers/crypto/ccp/ccp-dmaengine.c                 |    3 +-
 drivers/crypto/ccp/sev-dev.c                       |    4 +
 drivers/crypto/ccp/sp-pci.c                        |    6 +-
 drivers/crypto/gemini/Makefile                     |    2 +
 drivers/crypto/gemini/sl3516-ce-cipher.c           |  387 +++
 drivers/crypto/gemini/sl3516-ce-core.c             |  535 ++++
 drivers/crypto/gemini/sl3516-ce-rng.c              |   61 +
 drivers/crypto/gemini/sl3516-ce.h                  |  347 +++
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |  185 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |  256 +-
 drivers/crypto/hisilicon/qm.c                      | 2181 +++++++++++----
 drivers/crypto/hisilicon/qm.h                      |   17 +
 drivers/crypto/hisilicon/sec2/sec.h                |   23 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         | 1036 ++++++-
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |  193 ++
 drivers/crypto/hisilicon/sec2/sec_main.c           |  100 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |   99 +-
 drivers/crypto/ixp4xx_crypto.c                     |  413 +--
 drivers/crypto/marvell/cesa/cesa.h                 |    2 +-
 drivers/crypto/marvell/octeontx2/Makefile          |   13 +-
 drivers/crypto/marvell/octeontx2/cn10k_cpt.c       |   93 +
 drivers/crypto/marvell/octeontx2/cn10k_cpt.h       |   36 +
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |   23 +
 .../crypto/marvell/octeontx2/otx2_cpt_hw_types.h   |   16 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.c      |    9 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.h      |   10 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |    1 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |  160 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    |   32 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.h    |    8 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf.h      |    3 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c |   49 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c |   43 +
 .../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c   |   17 +-
 drivers/crypto/nx/nx-842-pseries.c                 |   31 +-
 drivers/crypto/nx/nx-aes-cbc.c                     |    2 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |    4 +-
 drivers/crypto/nx/nx-aes-ctr.c                     |    4 +-
 drivers/crypto/nx/nx-aes-ecb.c                     |    2 +-
 drivers/crypto/nx/nx-aes-gcm.c                     |    2 +-
 drivers/crypto/nx/nx-common-powernv.c              |    4 +-
 drivers/crypto/nx/nx-sha256.c                      |   19 +-
 drivers/crypto/nx/nx-sha512.c                      |   19 +-
 drivers/crypto/nx/nx_csbcpb.h                      |    4 +-
 drivers/crypto/omap-des.c                          |    9 +-
 drivers/crypto/omap-sham.c                         |    4 +-
 .../qat/qat_common/icp_qat_fw_loader_handle.h      |    2 +-
 drivers/crypto/qat/qat_common/qat_hal.c            |   14 +-
 drivers/crypto/qat/qat_common/qat_uclo.c           |   12 +-
 drivers/crypto/qce/Makefile                        |    1 +
 drivers/crypto/qce/aead.c                          |  847 ++++++
 drivers/crypto/qce/aead.h                          |   56 +
 drivers/crypto/qce/common.c                        |  196 +-
 drivers/crypto/qce/common.h                        |    9 +-
 drivers/crypto/qce/core.c                          |    4 +
 drivers/crypto/qce/skcipher.c                      |   19 +-
 drivers/crypto/sa2ul.c                             |   50 +-
 drivers/crypto/ux500/hash/hash_core.c              |    1 +
 drivers/soc/ixp4xx/ixp4xx-npe.c                    |    7 +
 include/crypto/aead.h                              |    2 +-
 include/crypto/algapi.h                            |   10 +-
 include/crypto/engine.h                            |    2 +-
 include/crypto/hash.h                              |    2 +-
 include/crypto/internal/hash.h                     |    8 +-
 include/linux/crypto.h                             |   26 -
 108 files changed, 7084 insertions(+), 11176 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/cortina,sl3516-crypto.yaml
 create mode 100644 Documentation/devicetree/bindings/crypto/intel,ixp4xx-crypto.yaml
 delete mode 100644 arch/arm/crypto/poly1305-core.S_shipped
 delete mode 100644 arch/arm/crypto/sha256-core.S_shipped
 delete mode 100644 arch/arm/crypto/sha512-core.S_shipped
 delete mode 100644 arch/arm64/crypto/poly1305-core.S_shipped
 delete mode 100644 arch/arm64/crypto/sha256-core.S_shipped
 delete mode 100644 arch/arm64/crypto/sha512-core.S_shipped
 create mode 100644 drivers/crypto/gemini/Makefile
 create mode 100644 drivers/crypto/gemini/sl3516-ce-cipher.c
 create mode 100644 drivers/crypto/gemini/sl3516-ce-core.c
 create mode 100644 drivers/crypto/gemini/sl3516-ce-rng.c
 create mode 100644 drivers/crypto/gemini/sl3516-ce.h
 create mode 100644 drivers/crypto/marvell/octeontx2/cn10k_cpt.c
 create mode 100644 drivers/crypto/marvell/octeontx2/cn10k_cpt.h
 create mode 100644 drivers/crypto/qce/aead.c
 create mode 100644 drivers/crypto/qce/aead.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.14
  2021-06-28 11:00         ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
@ 2021-06-28 23:36           ` pr-tracker-bot
  2021-08-30  8:28           ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-06-28 23:36 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 28 Jun 2021 19:00:51 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6159c49e12284b4880fd60e0575a71a40556a67e

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.14
  2021-01-08  3:54       ` Herbert Xu
  2021-01-08 20:36         ` pr-tracker-bot
  2021-01-18  5:13         ` Herbert Xu
@ 2021-07-08  3:09         ` Herbert Xu
  2021-07-09 19:20           ` pr-tracker-bot
  2021-08-17  1:36           ` Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-07-08  3:09 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push contains the following fixes and changes:

- Regression in drbg due to missing self-test for new default algorithm.
- Add ratelimit on user-triggerable message in qat.
- Build failure due to missing dependency in sl3516.
- Remove obsolete PageSlab checks.
- Bogus hardware register writes on Kunpeng920 in hisilicon/sec.

The following changes since commit 9f38b678ffc4e2ccf167a1131c0403dc4f5e1bb7:

  crypto: sl3516 - depends on HAS_IOMEM (2021-06-24 14:57:28 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 66192b2e3fd8ab97ed518d6c0240e26655a20b4b:

  crypto: hisilicon/sec - fix the process of disabling sva prefetching (2021-06-28 11:28:09 +0800)

----------------------------------------------------------------
Colin Ian King (1):
      crypto: qat - ratelimit invalid ioctl message and print the invalid cmd

Geert Uytterhoeven (2):
      crypto: sl3516 - Typo s/Stormlink/Storlink/
      crypto: sl3516 - Add dependency on ARCH_GEMINI

Herbert Xu (2):
      crypto: scatterwalk - Remove obsolete PageSlab check
      crypto: omap - Drop obsolete PageSlab check

Kai Ye (1):
      crypto: hisilicon/sec - fix the process of disabling sva prefetching

Stephan Müller (1):
      crypto: drbg - self test for HMAC(SHA-512)

 crypto/testmgr.c                            |  5 ++-
 crypto/testmgr.h                            | 49 +++++++++++++++++++++++++++++
 drivers/crypto/Kconfig                      |  6 ++--
 drivers/crypto/gemini/sl3516-ce-cipher.c    |  2 +-
 drivers/crypto/gemini/sl3516-ce-core.c      |  2 +-
 drivers/crypto/hisilicon/sec2/sec_main.c    |  3 ++
 drivers/crypto/omap-crypto.c                |  3 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c |  2 +-
 include/crypto/scatterwalk.h                |  7 +----
 9 files changed, 64 insertions(+), 15 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.14
  2021-07-08  3:09         ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
@ 2021-07-09 19:20           ` pr-tracker-bot
  2021-08-17  1:36           ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-07-09 19:20 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 8 Jul 2021 11:09:13 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8dc121eeab9abfbc510097f8db83e87560f753b

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.14
  2021-07-08  3:09         ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
  2021-07-09 19:20           ` pr-tracker-bot
@ 2021-08-17  1:36           ` Herbert Xu
  2021-08-17  2:27             ` pr-tracker-bot
  2021-09-29  2:38             ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-08-17  1:36 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push contains a fix for a potential boot failure due to
a missing Kconfig dependency for people upgrading with the DRBG
enabled.

The following changes since commit e73f0f0ee7541171d89f2e2491130c7771ba58d3:

  Linux 5.14-rc1 (2021-07-11 15:07:40 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 5261cdf457ce3635bf18d393a3c1991dcfaf9d02:

  crypto: drbg - select SHA512 (2021-07-16 15:49:31 +0800)

----------------------------------------------------------------
Stephan Mueller (1):
      crypto: drbg - select SHA512

 crypto/Kconfig | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.14
  2021-08-17  1:36           ` Herbert Xu
@ 2021-08-17  2:27             ` pr-tracker-bot
  2021-09-29  2:38             ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-08-17  2:27 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 17 Aug 2021 09:36:01 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/794c7931a2428a656551f2179e6a093233a6e0aa

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.15
  2021-06-28 11:00         ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
  2021-06-28 23:36           ` pr-tracker-bot
@ 2021-08-30  8:28           ` Herbert Xu
  2021-08-30 20:17             ` pr-tracker-bot
  2021-11-02  3:52             ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-08-30  8:28 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Algorithms:

- Add AES-NI/AVX/x86_64 implementation of SM4.

Drivers:

- Add Arm SMCCC TRNG based driver.

The following changes since commit 5261cdf457ce3635bf18d393a3c1991dcfaf9d02:

  crypto: drbg - select SHA512 (2021-07-16 15:49:31 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 6ae51ffe5e768d9e25a7f4298e2e7a058472bcc3:

  crypto: sha512 - remove imaginary and mystifying clearing of variables (2021-08-27 16:30:19 +0800)

----------------------------------------------------------------
Ahsan Atta (1):
      crypto: qat - flush vf workqueue at driver removal

Andre Przywara (2):
      firmware: smccc: Register smccc_trng platform device
      hwrng: Add Arm SMCCC TRNG based driver

Ard Biesheuvel (1):
      crypto: x86/aes-ni - add missing error checks in XTS code

Ben Hutchings (2):
      crypto: omap - Avoid redundant copy when using truncated sg list
      crypto: omap - Fix inconsistent locking of device lists

Brijesh Singh (1):
      crypto: ccp - shutdown SEV firmware on kexec

Cai Huoqing (1):
      padata: Remove repeated verbose license text

Changbin Du (1):
      crypto: skcipher - in_irq() cleanup

Christophe JAILLET (3):
      crypto: qat - simplify code and axe the use of a deprecated API
      crypto: qat - disable AER if an error occurs in probe functions
      crypto: qat - fix a typo in a comment

Giovanni Cabiddu (8):
      crypto: qat - set DMA mask to 48 bits for Gen2
      crypto: qat - use proper type for vf_mask
      crypto: qat - do not ignore errors from enable_vf2pf_comms()
      crypto: qat - handle both source of interrupt in VF ISR
      crypto: qat - prevent spurious MSI interrupt in VF
      crypto: qat - move IO virtualization functions
      crypto: qat - do not export adf_iov_putmsg()
      crypto: qat - store vf.compatible flag

Hongbo Li (1):
      lib/mpi: use kcalloc in mpi_resize

Jason Wang (2):
      crypto: sun8i-ss - Use kfree_sensitive
      crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data

John Allen (1):
      crypto: ccp - Add support for new CCP/PSP device ID

Kai Ye (2):
      crypto: hisilicon/sec - fix the abnormal exiting process
      crypto: hisilicon/sec - modify the hardware endian configuration

Kanchana Velusamy (1):
      crypto: qat - protect interrupt mask CSRs with a spinlock

Lukas Bulwahn (2):
      crypto: rmd320 - remove rmd320 in Makefile
      crypto: sha512 - remove imaginary and mystifying clearing of variables

Marco Chiappero (10):
      crypto: qat - remove empty sriov_configure()
      crypto: qat - enable interrupts only after ISR allocation
      crypto: qat - prevent spurious MSI interrupt in PF
      crypto: qat - rename compatibility version definition
      crypto: qat - fix reuse of completion variable
      crypto: qat - move pf2vf interrupt [en|dis]able to adf_vf_isr.c
      crypto: qat - fix naming for init/shutdown VF to PF notifications
      crypto: qat - complete all the init steps before service notification
      crypto: qat - fix naming of PF/VF enable functions
      crypto: qat - remove the unnecessary get_vintmsk_offset()

Mian Yousaf Kaukab (1):
      crypto: ecc - handle unaligned input buffer in ecc_swap_digits

Randy Dunlap (4):
      crypto: arm/curve25519 - rename 'mod_init' & 'mod_exit' functions to be module-specific
      hwrng: rename 'mod_init' & 'mod_exit' functions to be module-specific
      crypto: lib - rename 'mod_init' & 'mod_exit' functions to be module-specific
      crypto: wp512 - correct a non-kernel-doc comment

Salah Triki (1):
      crypto: atmel-aes - use swap()

Sean Anderson (2):
      crypto: mxs-dcp - Check for DMA mapping errors
      crypto: mxs-dcp - Use sg_mapping_iter to copy data

Sebastian Andrzej Siewior (2):
      crypto: virtio - Replace deprecated CPU-hotplug functions.
      padata: Replace deprecated CPU-hotplug functions.

Shreyansh Chouhan (1):
      crypto: aesni - xts_crypt() return if walk.nbytes is 0

Svyatoslav Pankratov (1):
      crypto: qat - remove intermediate tasklet for vf2pf

Tianjia Zhang (9):
      crypto: sm4 - create SM4 library based on sm4 generic code
      crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
      crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
      crypto: tcrypt - add the asynchronous speed test for SM4
      crypto: tcrypt - Fix missing return value check
      crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
      crypto: tcrypt - add GCM/CCM mode test for SM4 algorithm
      crypto: x86/sm4 - export reusable AESNI/AVX functions
      crypto: x86/sm4 - add AES-NI/AVX2/x86_64 implementation

Tony Lindgren (6):
      crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
      crypto: omap-sham - initialize req only after omap_sham_hw_init()
      crypto: omap-sham - add missing pm_runtime_dontuse_autosuspend()
      crypto: omap-sham - drop old hw_init and unused FLAGS_INIT
      crypto: omap-sham - drop suspend and resume functions
      crypto: omap-sham - drop pm_runtime_irqsafe() usage

Tudor Ambarus (9):
      crypto: atmel-tdes - Clarify how tdes dev gets allocated to the tfm
      crypto: atmel-tdes - Handle error messages
      crypto: atmel-aes - Add blocksize constraint for ECB and CBC modes
      crypto: atmel-aes - Add XTS input length constraint
      crypto: atmel-aes - Add NIST 800-38A's zero length cryptlen constraint
      crypto: atmel-tdes - Add FIPS81's zero length cryptlen constraint
      crypto: atmel - Set OFB's blocksize to 1
      crypto: atmel-aes - Add fallback to XTS software implementation
      crypto: atmel-aes - Allocate aes dev at tfm init time

Weili Qian (8):
      crypto: hisilicon - enable zip device clock gating
      crypto: hisilicon - enable sec device clock gating
      crypto: hisilicon - enable hpre device clock gating
      crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
      crypto: hisilicon - add runtime PM ops
      crypto: hisilicon - support runtime PM for accelerator device
      crypto: hisilicon - change parameter passing of debugfs function
      crypto: hisilicon - check _PS0 and _PR0 method

Xiyu Yang (1):
      padata: Convert from atomic_t to refcount_t on parallel_data->refcnt

 arch/arm/crypto/curve25519-glue.c                  |   8 +-
 arch/arm64/crypto/Kconfig                          |   2 +-
 arch/arm64/crypto/sm4-ce-glue.c                    |  20 +-
 arch/x86/crypto/Makefile                           |   6 +
 arch/x86/crypto/aesni-intel_glue.c                 |   5 +
 arch/x86/crypto/sm4-aesni-avx-asm_64.S             | 589 +++++++++++++++++++++
 arch/x86/crypto/sm4-aesni-avx2-asm_64.S            | 497 +++++++++++++++++
 arch/x86/crypto/sm4-avx.h                          |  24 +
 arch/x86/crypto/sm4_aesni_avx2_glue.c              | 169 ++++++
 arch/x86/crypto/sm4_aesni_avx_glue.c               | 487 +++++++++++++++++
 crypto/Kconfig                                     |  44 ++
 crypto/Makefile                                    |   1 -
 crypto/ecc.h                                       |   5 +-
 crypto/sha512_generic.c                            |   3 -
 crypto/skcipher.c                                  |   2 +-
 crypto/sm4_generic.c                               | 180 +------
 crypto/tcrypt.c                                    | 100 +++-
 crypto/testmgr.c                                   |  29 +
 crypto/testmgr.h                                   | 148 ++++++
 crypto/wp512.c                                     |   2 +-
 drivers/char/hw_random/Kconfig                     |  14 +
 drivers/char/hw_random/Makefile                    |   1 +
 drivers/char/hw_random/amd-rng.c                   |   8 +-
 drivers/char/hw_random/arm_smccc_trng.c            | 123 +++++
 drivers/char/hw_random/geode-rng.c                 |   8 +-
 drivers/char/hw_random/intel-rng.c                 |   8 +-
 drivers/char/hw_random/via-rng.c                   |   8 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c  |   9 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c  |   3 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c  |   9 +-
 drivers/crypto/atmel-aes.c                         | 154 ++++--
 drivers/crypto/atmel-tdes.c                        |  66 +--
 drivers/crypto/ccp/sev-dev.c                       |  49 +-
 drivers/crypto/ccp/sp-pci.c                        |  19 +
 drivers/crypto/hisilicon/hpre/hpre_main.c          | 123 ++++-
 drivers/crypto/hisilicon/qm.c                      | 430 ++++++++++++---
 drivers/crypto/hisilicon/qm.h                      |   8 +
 drivers/crypto/hisilicon/sec2/sec.h                |   5 -
 drivers/crypto/hisilicon/sec2/sec_main.c           | 138 +++--
 drivers/crypto/hisilicon/zip/zip_main.c            |  83 ++-
 drivers/crypto/mxs-dcp.c                           |  81 +--
 drivers/crypto/omap-aes.c                          |   8 +-
 drivers/crypto/omap-crypto.c                       |   2 +-
 drivers/crypto/omap-des.c                          |   8 +-
 drivers/crypto/omap-sham.c                         |  68 +--
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |   8 +-
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |  14 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |  19 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h   |   1 -
 drivers/crypto/qat/qat_c3xxx/adf_drv.c             |  21 +-
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c   |  14 +-
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h   |   1 -
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |  16 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |  19 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h     |   1 -
 drivers/crypto/qat/qat_c62x/adf_drv.c              |  21 +-
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c |  14 +-
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h |   1 -
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |  16 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   8 +-
 drivers/crypto/qat/qat_common/adf_aer.c            |   2 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |  21 +-
 drivers/crypto/qat/qat_common/adf_init.c           |  13 +-
 drivers/crypto/qat/qat_common/adf_isr.c            |  42 +-
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c      |  78 +--
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h      |   2 +-
 drivers/crypto/qat/qat_common/adf_sriov.c          |   8 +-
 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c      |  12 +-
 drivers/crypto/qat/qat_common/adf_vf_isr.c         |  64 ++-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |  19 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |   1 -
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |  21 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |  14 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h    |   1 -
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |  16 +-
 drivers/crypto/virtio/virtio_crypto_core.c         |   4 +-
 drivers/firmware/smccc/smccc.c                     |  17 +
 include/crypto/sm4.h                               |  25 +-
 include/linux/padata.h                             |   3 +-
 kernel/padata.c                                    |  35 +-
 lib/crypto/Kconfig                                 |   3 +
 lib/crypto/Makefile                                |   3 +
 lib/crypto/blake2s.c                               |   8 +-
 lib/crypto/chacha20poly1305.c                      |   8 +-
 lib/crypto/curve25519.c                            |   8 +-
 lib/crypto/sm4.c                                   | 176 ++++++
 lib/mpi/mpiutil.c                                  |   2 +-
 87 files changed, 3695 insertions(+), 839 deletions(-)
 create mode 100644 arch/x86/crypto/sm4-aesni-avx-asm_64.S
 create mode 100644 arch/x86/crypto/sm4-aesni-avx2-asm_64.S
 create mode 100644 arch/x86/crypto/sm4-avx.h
 create mode 100644 arch/x86/crypto/sm4_aesni_avx2_glue.c
 create mode 100644 arch/x86/crypto/sm4_aesni_avx_glue.c
 create mode 100644 drivers/char/hw_random/arm_smccc_trng.c
 create mode 100644 lib/crypto/sm4.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.15
  2021-08-30  8:28           ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
@ 2021-08-30 20:17             ` pr-tracker-bot
  2021-11-02  3:52             ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-08-30 20:17 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 30 Aug 2021 16:28:18 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/44a7d4441181d0f2d622dc9bb512d7f5ca13f768

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.15
  2021-08-17  1:36           ` Herbert Xu
  2021-08-17  2:27             ` pr-tracker-bot
@ 2021-09-29  2:38             ` Herbert Xu
  2021-09-29 14:51               ` pr-tracker-bot
  2021-10-29  4:14               ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-09-29  2:38 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push contains fixes for a resource leak in ccp as well as
stack corruption in x86/sm4.

The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:

  Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 0e14ef38669ce4faa80589247fe8ed8a3780f414:

  crypto: x86/sm4 - Fix frame pointer stack corruption (2021-09-24 15:58:50 +0800)

----------------------------------------------------------------
Dan Carpenter (1):
      crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()

Josh Poimboeuf (1):
      crypto: x86/sm4 - Fix frame pointer stack corruption

 arch/x86/crypto/sm4-aesni-avx-asm_64.S |  5 +++--
 drivers/crypto/ccp/ccp-ops.c           | 14 ++++++++------
 2 files changed, 11 insertions(+), 8 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.15
  2021-09-29  2:38             ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
@ 2021-09-29 14:51               ` pr-tracker-bot
  2021-10-29  4:14               ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-09-29 14:51 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 29 Sep 2021 10:38:43 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6e439bbd436e39f15abc9587cdd23d56257780cb

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.15
  2021-09-29  2:38             ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
  2021-09-29 14:51               ` pr-tracker-bot
@ 2021-10-29  4:14               ` Herbert Xu
  2021-10-29 17:39                 ` Linus Torvalds
                                   ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2021-10-29  4:14 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a build-time warning in x86/sm4.

The following changes since commit 0e14ef38669ce4faa80589247fe8ed8a3780f414:

  crypto: x86/sm4 - Fix frame pointer stack corruption (2021-09-24 15:58:50 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to f8690a4b5a1b64f74ae5c4f7c4ea880d8a8e1a0d:

  crypto: x86/sm4 - Fix invalid section entry size (2021-10-22 20:23:01 +0800)

----------------------------------------------------------------
Tianjia Zhang (1):
      crypto: x86/sm4 - Fix invalid section entry size

 arch/x86/crypto/sm4-aesni-avx-asm_64.S  | 6 +++++-
 arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 6 +++++-
 2 files changed, 10 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.15
  2021-10-29  4:14               ` Herbert Xu
@ 2021-10-29 17:39                 ` Linus Torvalds
  2021-11-02  4:01                   ` Herbert Xu
  2021-10-29 18:49                 ` pr-tracker-bot
  2021-11-12 10:48                 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2021-10-29 17:39 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Thu, Oct 28, 2021 at 9:14 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes a build-time warning in x86/sm4.

Hmm..

> Tianjia Zhang (1):
>       crypto: x86/sm4 - Fix invalid section entry size

So I do wonder why the crypto code asm tends to use such complex
".section" directives.

Almost everythign else in the kernel just uses

     .section <name>,"a"

for data (and "ax" for text).

The crypto code uses that very subtle "M" flag which allows the linker
to merge data, but how much of a win is that added complexity? Now you
need to get the sizes exactly right, and you hit tooling issues.

Plus, I get the feeling that some people have just copied-and-pasted
those things, and don't necessarily realize just _how_ subtle 'M'
sections are.

How much of a data savings is it to have this complexity? Particularly
since I suspect most of the time these things end up being individual
modules, and never actually get linked together at all?

So I get this very strong feeling that the crypto code is doing
complicated and fragile things that cause tooling issues - and does so
for no good reason and no actual real-life upside.

I've pulled this, but I do suspect that all the fancy

   .section .rodata.xyz, "aM", @progbits, abc

could just as well be

    .section .rodata, "a"

instead, and you guys are only causing problems for yourself by trying
to be clever in pointless ways.

            Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.15
  2021-10-29  4:14               ` Herbert Xu
  2021-10-29 17:39                 ` Linus Torvalds
@ 2021-10-29 18:49                 ` pr-tracker-bot
  2021-11-12 10:48                 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-10-29 18:49 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 29 Oct 2021 12:14:09 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/75c7a6c1ca63131875fe869cbfd404c94d0e1944

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.16
  2021-08-30  8:28           ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
  2021-08-30 20:17             ` pr-tracker-bot
@ 2021-11-02  3:52             ` Herbert Xu
  2021-11-02  4:27               ` pr-tracker-bot
  2022-01-11  2:04               ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-11-02  3:52 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

API:

- Delay boot-up self-test for built-in algorithms.

Algorithms:

- Remove fallback path on arm64 as SIMD now runs with softirq off.

Drivers:

- Add Keem Bay OCS ECC Driver.

The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:

  Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 39ef08517082a424b5b65c3dbaa6c0fa9d3303b9:

  crypto: testmgr - fix wrong key length for pkcs1pad (2021-10-29 21:04:04 +0800)

----------------------------------------------------------------
Ard Biesheuvel (7):
      crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path
      crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers
      crypto: arm64/aes-ce - stop using SIMD helper for skciphers
      crypto: arm64/aes-ccm - yield NEON when processing auth-only data
      crypto: arm64/aes-ccm - remove non-SIMD fallback path
      crypto: arm64/aes-ccm - reduce NEON begin/end calls for common case
      crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data

Arnd Bergmann (2):
      crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency
      crypto: ccree - avoid out-of-range warnings from clang

Cai Huoqing (3):
      hwrng: Kconfig - Add helper dependency on COMPILE_TEST
      hwrng: ixp4xx - Make use of the helper function devm_platform_ioremap_resource()
      crypto: ccp - Make use of the helper macro kthread_run()

Colin Ian King (2):
      crypto: img-hash - remove need for error return variable ret
      crypto: hisilicon/zip - Fix spelling mistake "COMSUMED" -> "CONSUMED"

Daniel Jordan (1):
      crypto: pcrypt - Delay write to padata->info

Daniele Alessandrelli (2):
      crypto: ecc - Move ecc.h to include/crypto/internal
      crypto: ecc - Export additional helper functions

Giovanni Cabiddu (5):
      crypto: qat - remove unneeded packed attribute
      crypto: qat - power up 4xxx device
      crypto: qat - detect PFVF collision after ACK
      crypto: qat - disregard spurious PFVF interrupts
      crypto: qat - use hweight for bit counting

Herbert Xu (4):
      crypto: hisilicon - Fix sscanf format signedness
      crypto: api - Fix built-in testing dependency failures
      crypto: api - Export crypto_boot_test_finished
      crypto: api - Do not create test larvals if manager is disabled

Horia Geantă (1):
      crypto: tcrypt - fix skcipher multi-buffer tests for 1420B blocks

Kai Ye (3):
      crypto: hisilicon/qm - fix the uacce mmap failed
      crypto: hisilicon/qm - support the userspace task resetting
      crypto: hisilicon/qm - modify the uacce mode check

Krzysztof Kozlowski (1):
      crypto: marvell/cesa - drop unneeded MODULE_ALIAS

Lei He (1):
      crypto: testmgr - fix wrong key length for pkcs1pad

Maksim Lukoshkov (1):
      crypto: qat - free irqs only if allocated

Marco Chiappero (9):
      crypto: qat - remove unnecessary collision prevention step in PFVF
      crypto: qat - fix handling of VF to PF interrupts
      crypto: qat - remove duplicated logic across GEN2 drivers
      crypto: qat - make pfvf send message direction agnostic
      crypto: qat - move pfvf collision detection values
      crypto: qat - rename pfvf collision constants
      crypto: qat - add VF and PF wrappers to common send function
      crypto: qat - extract send and wait from adf_vf2pf_request_version()
      crypto: qat - share adf_enable_pf2vf_comms() from adf_pf2vf_msg.c

Markus Schneider-Pargmann (1):
      hwrng: mtk - Force runtime pm ops for sleep ops

Michael Walle (1):
      crypto: caam - disable pkc for non-E SoCs

Nathan Chancellor (1):
      crypto: sm4 - Do not change section of ck and sbox

Ovidiu Panait (1):
      crypto: octeontx2 - set assoclen in aead_do_fallback()

Peter Gonda (1):
      crypto: ccp - Fix whitespace in sev_cmd_buffer_len()

Prabhjot Khurana (3):
      crypto: engine - Add KPP Support to Crypto Engine
      dt-bindings: crypto: Add Keem Bay ECC bindings
      crypto: keembay-ocs-ecc - Add Keem Bay OCS ECC Driver

Qing Wang (1):
      hwrng: s390 - replace snprintf in show functions with sysfs_emit

Randy Dunlap (1):
      crypto: jitter - drop kernel-doc notation

Sebastian Andrzej Siewior (1):
      crypto: testmgr - Only disable migration in crypto_disable_simd_for_test()

Shreyansh Chouhan (1):
      crypto: aesni - check walk.nbytes instead of err

Tang Bin (2):
      crypto: s5p-sss - Add error handling in s5p_aes_probe()
      crypto: sa2ul - Use the defined variable to clean code

Tim Gardner (1):
      crypto: drbg - Fix unused value warning in drbg_healthcheck_sanity()

Uwe Kleine-König (1):
      hwrng: meson - Improve error handling for core clock

Wojciech Ziemba (3):
      crypto: qat - replace deprecated MSI API
      crypto: qat - remove unmatched CPU affinity to cluster IRQ
      crypto: qat - free irq in case of failure

 Documentation/crypto/crypto_engine.rst             |    4 +
 .../bindings/crypto/intel,keembay-ocs-ecc.yaml     |   47 +
 MAINTAINERS                                        |   11 +
 arch/arm64/crypto/Kconfig                          |    6 -
 arch/arm64/crypto/aes-ce-ccm-core.S                |   24 +-
 arch/arm64/crypto/aes-ce-ccm-glue.c                |  203 ++--
 arch/arm64/crypto/aes-glue.c                       |  102 +-
 arch/arm64/crypto/aes-neonbs-glue.c                |  122 +--
 arch/arm64/crypto/ghash-ce-glue.c                  |  209 +---
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 crypto/Kconfig                                     |    2 +-
 crypto/algapi.c                                    |  123 ++-
 crypto/api.c                                       |   50 +-
 crypto/crypto_engine.c                             |   26 +
 crypto/drbg.c                                      |    2 +-
 crypto/ecc.c                                       |   14 +-
 crypto/ecdh.c                                      |    2 +-
 crypto/ecdsa.c                                     |    2 +-
 crypto/ecrdsa.c                                    |    2 +-
 crypto/ecrdsa_defs.h                               |    2 +-
 crypto/internal.h                                  |   10 +
 crypto/jitterentropy.c                             |   24 +-
 crypto/pcrypt.c                                    |   12 +-
 crypto/tcrypt.c                                    |    5 +-
 crypto/testmgr.c                                   |    4 +-
 crypto/testmgr.h                                   |    2 +-
 drivers/char/hw_random/Kconfig                     |   12 +-
 drivers/char/hw_random/ixp4xx-rng.c                |    4 +-
 drivers/char/hw_random/meson-rng.c                 |    5 +-
 drivers/char/hw_random/mtk-rng.c                   |    9 +-
 drivers/char/hw_random/s390-trng.c                 |    4 +-
 drivers/crypto/caam/caampkc.c                      |   19 +-
 drivers/crypto/caam/regs.h                         |    3 +
 drivers/crypto/ccp/ccp-dev-v3.c                    |    5 +-
 drivers/crypto/ccp/ccp-dev-v5.c                    |    5 +-
 drivers/crypto/ccp/sev-dev.c                       |    2 +-
 drivers/crypto/ccree/cc_driver.c                   |    3 +-
 drivers/crypto/hisilicon/qm.c                      |   74 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |    2 +-
 drivers/crypto/img-hash.c                          |    7 +-
 drivers/crypto/keembay/Kconfig                     |   19 +
 drivers/crypto/keembay/Makefile                    |    2 +
 drivers/crypto/keembay/keembay-ocs-ecc.c           | 1017 ++++++++++++++++++++
 drivers/crypto/marvell/cesa/cesa.c                 |    1 -
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |    1 +
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |   35 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h     |   10 +
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |   89 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h   |   13 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |   87 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h     |   12 -
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   29 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    9 +-
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c   |   98 ++
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h   |   27 +
 drivers/crypto/qat/qat_common/adf_init.c           |    5 +
 drivers/crypto/qat/qat_common/adf_isr.c            |  190 ++--
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c      |  238 +++--
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h      |    9 -
 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c      |    4 +-
 drivers/crypto/qat/qat_common/adf_vf_isr.c         |   30 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |  123 +--
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |   14 +-
 drivers/crypto/s5p-sss.c                           |    2 +
 drivers/crypto/sa2ul.c                             |   13 +-
 include/crypto/engine.h                            |    5 +
 {crypto => include/crypto/internal}/ecc.h          |   36 +
 lib/crypto/sm4.c                                   |    4 +-
 68 files changed, 2130 insertions(+), 1158 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-ecc.yaml
 create mode 100644 drivers/crypto/keembay/keembay-ocs-ecc.c
 rename {crypto => include/crypto/internal}/ecc.h (90%)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.15
  2021-10-29 17:39                 ` Linus Torvalds
@ 2021-11-02  4:01                   ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2021-11-02  4:01 UTC (permalink / raw)
  To: Linus Torvalds, Denys Vlasenko
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Tianjia Zhang

On Fri, Oct 29, 2021 at 10:39:35AM -0700, Linus Torvalds wrote:
>
> Plus, I get the feeling that some people have just copied-and-pasted
> those things, and don't necessarily realize just _how_ subtle 'M'
> sections are.
> 
> How much of a data savings is it to have this complexity? Particularly
> since I suspect most of the time these things end up being individual
> modules, and never actually get linked together at all?

Let me copy Denys Vlasenko who introduced this.

But you're absolutely right that the recent additions are
more likely to be just cut-n-paste rather than deeply thought
through.

FWIW the original change that added this was:

ommit e183914af00e15eb41ae666d44e323bfa154be13
Author: Denys Vlasenko <dvlasenk@redhat.com>
Date:   Thu Jan 19 22:33:04 2017 +0100

    crypto: x86 - make constants readonly, allow linker to merge them

    A lot of asm-optimized routines in arch/x86/crypto/ keep its
    constants in .data. This is wrong, they should be on .rodata.

    Mnay of these constants are the same in different modules.
    For example, 128-bit shuffle mask 0x000102030405060708090A0B0C0D0E0F
    exists in at least half a dozen places.

    There is a way to let linker merge them and use just one copy.
    The rules are as follows: mergeable objects of different sizes
    should not share sections. You can't put them all in one .rodata
    section, they will lose "mergeability".

    GCC puts its mergeable constants in ".rodata.cstSIZE" sections,
    or ".rodata.cstSIZE.<object_name>" if -fdata-sections is used.
    This patch does the same:

            .section .rodata.cst16.SHUF_MASK, "aM", @progbits, 16

    It is important that all data in such section consists of
    16-byte elements, not larger ones, and there are no implicit
    use of one element from another.

    When this is not the case, use non-mergeable section:

            .section .rodata[.VAR_NAME], "a", @progbits

    This reduces .data by ~15 kbytes:

        text    data     bss     dec      hex filename
    11097415 2705840 2630712 16433967  fac32f vmlinux-prev.o
    11112095 2690672 2630712 16433479  fac147 vmlinux.o

    Merged objects are visible in System.map:

    ffffffff81a28810 r POLY
    ffffffff81a28810 r POLY
    ffffffff81a28820 r TWOONE
    ffffffff81a28820 r TWOONE
    ffffffff81a28830 r PSHUFFLE_BYTE_FLIP_MASK <- merged regardless of
    ffffffff81a28830 r SHUF_MASK   <------------- the name difference
    ffffffff81a28830 r SHUF_MASK
    ffffffff81a28830 r SHUF_MASK
    ..
    ffffffff81a28d00 r K512 <- merged three identical 640-byte tables
    ffffffff81a28d00 r K512
    ffffffff81a28d00 r K512

    Use of object names in section name suffixes is not strictly necessary,
    but might help if someday link stage will use garbage collection
    to eliminate unused sections (ld --gc-sections).

    Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
    CC: Herbert Xu <herbert@gondor.apana.org.au>
    CC: Josh Poimboeuf <jpoimboe@redhat.com>
    CC: Xiaodong Liu <xiaodong.liu@intel.com>
    CC: Megha Dey <megha.dey@intel.com>
    CC: linux-crypto@vger.kernel.org
    CC: x86@kernel.org
    CC: linux-kernel@vger.kernel.org
    Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.16
  2021-11-02  3:52             ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
@ 2021-11-02  4:27               ` pr-tracker-bot
  2022-01-11  2:04               ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-11-02  4:27 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 2 Nov 2021 11:52:02 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bfc484fe6abba4b89ec9330e0e68778e2a9856b2

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.16
  2021-10-29  4:14               ` Herbert Xu
  2021-10-29 17:39                 ` Linus Torvalds
  2021-10-29 18:49                 ` pr-tracker-bot
@ 2021-11-12 10:48                 ` Herbert Xu
  2021-11-12 20:42                   ` pr-tracker-bot
  2021-12-22  5:13                   ` Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-11-12 10:48 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a boot crash regression.

The following changes since commit 39ef08517082a424b5b65c3dbaa6c0fa9d3303b9:

  crypto: testmgr - fix wrong key length for pkcs1pad (2021-10-29 21:04:04 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to beaaaa37c664e9afdf2913aee19185d8e3793b50:

  crypto: api - Fix boot-up crash when crypto manager is disabled (2021-11-09 13:45:48 +0800)

----------------------------------------------------------------
Herbert Xu (1):
      crypto: api - Fix boot-up crash when crypto manager is disabled

 crypto/algapi.c | 2 ++
 1 file changed, 2 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.16
  2021-11-12 10:48                 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
@ 2021-11-12 20:42                   ` pr-tracker-bot
  2021-12-22  5:13                   ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-11-12 20:42 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 12 Nov 2021 18:48:15 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/66f4beaa6c1d28161f534471484b2daa2de1dce0

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.16
  2021-11-12 10:48                 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
  2021-11-12 20:42                   ` pr-tracker-bot
@ 2021-12-22  5:13                   ` Herbert Xu
  2021-12-22 19:02                     ` pr-tracker-bot
  2022-02-09  2:33                     ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-12-22  5:13 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a regression in the qat driver.

The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf:

  Linux 5.16-rc1 (2021-11-14 13:56:52 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 27750a315aba7e6675bb1c3dfd4481c4f6888af1:

  crypto: qat - do not handle PFVF sources for qat_4xxx (2021-12-17 13:11:54 +1100)

----------------------------------------------------------------
Giovanni Cabiddu (1):
      crypto: qat - do not handle PFVF sources for qat_4xxx

 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 7 +++++++
 1 file changed, 7 insertions(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.16
  2021-12-22  5:13                   ` Herbert Xu
@ 2021-12-22 19:02                     ` pr-tracker-bot
  2022-02-09  2:33                     ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-12-22 19:02 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 22 Dec 2021 16:13:07 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e19e226345196649e83d49c6997e806a8ecdafe6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.17
  2021-11-02  3:52             ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
  2021-11-02  4:27               ` pr-tracker-bot
@ 2022-01-11  2:04               ` Herbert Xu
  2022-01-11 20:53                 ` pr-tracker-bot
  2022-03-20 23:42                 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-01-11  2:04 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This update includes the following changes:

Algorithms:

- Drop alignment requirement for data in aesni.
- Use synchronous seeding from the /dev/random in DRBG.
- Reseed nopr DRBGs every 5 minutes from /dev/random.
- Add KDF algorithms currently used by security/DH.
- Fix lack of entropy on some AMD CPUs with jitter RNG.

Drivers:

- Add support for the D1 variant in sun8i-ce.
- Add SEV_INIT_EX support in ccp.
- PFVF support for GEN4 host driver in qat.
- Compression support for GEN4 devices in qat.
- Add cn10k random number generator support.

The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf:

  Linux 5.16-rc1 (2021-11-14 13:56:52 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 5f21d7d283dd82865bdb0123795b3accf0d42b67:

  crypto: af_alg - rewrite NULL pointer check (2022-01-07 14:30:01 +1100)

----------------------------------------------------------------
Andy Shevchenko (1):
      crypto: api - Replace kernel.h with the necessary inclusions

Chengfeng Ye (3):
      crypto: qce - fix uaf on qce_aead_register_one
      crypto: qce - fix uaf on qce_ahash_register_one
      crypto: qce - fix uaf on qce_skcipher_register_one

Christophe JAILLET (1):
      crypto: ccree - remove redundant 'flush_workqueue()' calls

Colin Ian King (1):
      crypto: x86/des3 - remove redundant assignment of variable nbytes

Corentin Labbe (2):
      crypto: sun8i-ce - Add support for the D1 variant
      crypto: omap - increase priority of DES/3DES

Dan Carpenter (3):
      crypto: octeontx2 - uninitialized variable in kvf_limits_store()
      crypto: octeontx2 - out of bounds access in otx2_cpt_dl_custom_egrp_delete()
      crypto: octeontx2 - prevent underflow in get_cores_bmap()

David Rientjes (1):
      crypto: ccp - Add SEV_INIT_EX support

Etienne Carriere (2):
      crypto: stm32/cryp - defer probe for reset controller
      crypto: stm32/cryp - don't print error on probe deferral

Gaurav Jain (1):
      crypto: caam - save caam memory to support crypto engine retry mechanism.

Geert Uytterhoeven (1):
      crypto: sa2ul - Use bitfield helpers

Giovanni Cabiddu (13):
      crypto: qat - do not handle PFVF sources for qat_4xxx
      crypto: qat - fix undetected PFVF timeout in ACK loop
      crypto: qat - move vf2pf interrupt helpers
      crypto: qat - change PFVF ACK behaviour
      crypto: qat - re-enable interrupts for legacy PFVF messages
      crypto: qat - relocate PFVF disabled function
      crypto: qat - abstract PFVF receive logic
      crypto: qat - get compression extended capabilities
      crypto: qat - set CIPHER capability for QAT GEN2
      crypto: qat - set COMPRESSION capability for QAT GEN2
      crypto: qat - extend crypto capability detection for 4xxx
      crypto: qat - allow detection of dc capabilities for 4xxx
      crypto: qat - fix definition of ring reset results

Guo Zhengkui (1):
      crypto: dh - remove duplicate includes

Gustavo A. R. Silva (2):
      crypto: cavium - Use kcalloc() instead of kzalloc()
      crypto: marvell/octeontx - Use kcalloc() instead of kzalloc()

Heiner Kallweit (1):
      crypto: omap-aes - Fix broken pm_runtime_and_get() usage

Herbert Xu (1):
      crypto: stm32 - Revert broken pm_runtime_resume_and_get changes

Jakub Kicinski (1):
      crypto: x86/aesni - don't require alignment of data

Jason A. Donenfeld (1):
      crypto: x86/curve25519 - use in/out register constraints more precisely

Jason Wang (1):
      crypto: ccp - no need to initialise statics to 0

Jiapeng Chong (1):
      crypto: octeontx2 - Use swap() instead of swap_engines()

Jiasheng Jiang (1):
      crypto: af_alg - rewrite NULL pointer check

Kai Ye (5):
      crypto: hisilicon - modify the value of engine type rate
      crypto: hisilicon/qm - modify the value of qos initialization
      crypto: hisilicon/qm - some optimizations of ths qos write process
      crypto: hisilicon/qm - simplified the calculation of qos shaper parameters
      MAINTAINERS: update SEC2 driver maintainers list

Lad Prabhakar (1):
      crypto: ux500 - Use platform_get_irq() to get the interrupt

Lei He (1):
      crypto: testmgr - Fix wrong test case of RSA

Lukas Bulwahn (1):
      MAINTAINERS: rectify entry for INTEL KEEM BAY OCS ECC CRYPTO DRIVER

Marco Chiappero (36):
      crypto: qat - refactor PF top half for PFVF
      crypto: qat - move VF message handler to adf_vf2pf_msg.c
      crypto: qat - move interrupt code out of the PFVF handler
      crypto: qat - split PFVF message decoding from handling
      crypto: qat - handle retries due to collisions in adf_iov_putmsg()
      crypto: qat - relocate PFVF PF related logic
      crypto: qat - relocate PFVF VF related logic
      crypto: qat - add pfvf_ops
      crypto: qat - differentiate between pf2vf and vf2pf offset
      crypto: qat - abstract PFVF send function
      crypto: qat - reorganize PFVF code
      crypto: qat - reorganize PFVF protocol definitions
      crypto: qat - use enums for PFVF protocol codes
      crypto: qat - pass the PF2VF responses back to the callers
      crypto: qat - refactor pfvf version request messages
      crypto: qat - do not rely on min version
      crypto: qat - fix VF IDs in PFVF log messages
      crypto: qat - improve logging of PFVF messages
      crypto: qat - support the reset of ring pairs on PF
      crypto: qat - add the adf_get_pmisc_base() helper function
      crypto: qat - make PFVF message construction direction agnostic
      crypto: qat - make PFVF send and receive direction agnostic
      crypto: qat - set PFVF_MSGORIGIN just before sending
      crypto: qat - abstract PFVF messages with struct pfvf_message
      crypto: qat - leverage bitfield.h utils for PFVF messages
      crypto: qat - leverage read_poll_timeout in PFVF send
      crypto: qat - improve the ACK timings in PFVF send
      crypto: qat - store the PFVF protocol version of the endpoints
      crypto: qat - store the ring-to-service mapping
      crypto: qat - introduce support for PFVF block messages
      crypto: qat - exchange device capabilities over PFVF
      crypto: qat - support fast ACKs in the PFVF protocol
      crypto: qat - exchange ring-to-service mappings over PFVF
      crypto: qat - config VFs based on ring-to-svc mapping
      crypto: qat - add PFVF support to the GEN4 host driver
      crypto: qat - add PFVF support to enable the reset of ring pairs

Marek Vasut (1):
      crypto: stm32/crc32 - Fix kernel BUG triggered in probe()

Meng Li (1):
      crypto: caam - replace this_cpu_ptr with raw_cpu_ptr

Nicolai Stange (9):
      crypto: drbg - prepare for more fine-grained tracking of seeding state
      crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
      crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
      crypto: drbg - make reseeding from get_random_bytes() synchronous
      crypto: drbg - make drbg_prepare_hrng() handle jent instantiation errors
      crypto: drbg - reseed 'nopr' drbgs periodically from get_random_bytes()
      crypto: drbg - ignore jitterentropy errors if not in FIPS mode
      crypto: jitter - don't limit ->health_failure check to FIPS mode
      crypto: jitter - quit sample collection loop upon RCT failure

Nicolas Toromanoff (7):
      crypto: stm32/cryp - fix CTR counter carry
      crypto: stm32/cryp - fix xts and race condition in crypto_engine requests
      crypto: stm32/cryp - check early input data
      crypto: stm32/cryp - fix double pm exit
      crypto: stm32/cryp - fix lrw chaining mode
      crypto: stm32/cryp - fix bugs and crash in tests
      crypto: stm32/cryp - reorder hw initialization

Pankaj Gupta (1):
      MAINTAINERS: update caam crypto driver maintainers list

Peter Gonda (4):
      crypto: ccp - Add SEV_INIT rc error logging on init
      crypto: ccp - Move SEV_INIT retry for corrupted data
      crypto: ccp - Refactor out sev_fw_alloc()
      crypto: ccp - Add psp_init_on_probe module parameter

Srujana Challa (2):
      crypto: octeontx2 - add apis for custom engine groups
      crypto: octeontx2 - parameters for custom engine groups

Stephan Müller (10):
      crypto: kdf - Add key derivation self-test support code
      crypto: kdf - add SP800-108 counter key derivation function
      security: DH - remove dead code for zero padding
      security: DH - use KDF implementation from crypto API
      crypto: jitter - consider 32 LSB for APT
      crypto: rsa - limit key size to 2048 in FIPS mode
      crypto: dh - limit key size to 2048 in FIPS mode
      crypto: des - disallow des3 in FIPS mode
      crypto: jitter - add oversampling of noise source
      crypto: kdf - select SHA-256 required for self-test

Sunil Goutham (2):
      hwrng: cavium - Check health status while reading random data
      hwrng: cn10k - Add random number generator support

Tianjia Zhang (5):
      crypto: sha256 - remove duplicate generic hash init function
      crypto: mips/sha - remove duplicate hash init function
      crypto: powerpc/sha - remove duplicate hash init function
      crypto: sparc/sha - remove duplicate hash init function
      crypto: s390/sha512 - Use macros instead of direct IV numbers

Tom Rix (1):
      crypto: hisilicon - cleanup warning in qm_get_qos_value()

Tomasz Kowalik (1):
      crypto: qat - add support for compression for 4xxx

Tudor Ambarus (1):
      crypto: atmel-aes - Reestablish the correct tfm context at dequeue

Wei Yongjun (1):
      crypto: keembay-ocs-ecc - Fix error return code in kmb_ocs_ecc_probe()

Weili Qian (9):
      crypto: hisilicon/qm - fix incorrect return value of hisi_qm_resume()
      crypto: hisilicon/hpre - fix memory leak in hpre_curve25519_src_init()
      crypto: hisilicon/qm - remove unnecessary device memory reset
      crypto: hisilicon/qm - code movement
      crypto: hisilicon/qm - modify the handling method after abnormal interruption
      crypto: hisilicon/qm - use request_threaded_irq instead
      crypto: hisilicon/qm - reset function if event queue overflows
      crypto: hisilicon/qm - disable queue when 'CQ' error
      crypto: hisilicon/qm - disable qm clock-gating

Yang Guang (1):
      crypto: hisilicon/hpre - use swap() to make code cleaner

Yang Li (1):
      crypto: ccp - remove unneeded semicolon

Yang Shen (3):
      crypto: hisilicon/zip - enable ssid for sva sgl
      crypto: hisilicon/qm - fix deadlock for remove driver
      crypto: hisilicon/zip - add new algorithms for uacce device

Zizhuang Deng (1):
      lib/mpi: Add the return value check of kcalloc()

chiminghao (1):
      crypto: octeontx2 - use swap() to make code cleaner

 Documentation/virt/kvm/amd-memory-encryption.rst   |   6 +
 MAINTAINERS                                        |   3 +-
 arch/mips/cavium-octeon/crypto/octeon-sha1.c       |  17 +-
 arch/mips/cavium-octeon/crypto/octeon-sha256.c     |  39 +-
 arch/mips/cavium-octeon/crypto/octeon-sha512.c     |  39 +-
 arch/powerpc/crypto/sha1-spe-glue.c                |  17 +-
 arch/powerpc/crypto/sha1.c                         |  14 +-
 arch/powerpc/crypto/sha256-spe-glue.c              |  39 +-
 arch/s390/crypto/sha512_s390.c                     |  32 +-
 arch/sparc/crypto/sha1_glue.c                      |  14 +-
 arch/sparc/crypto/sha256_glue.c                    |  37 +-
 arch/sparc/crypto/sha512_glue.c                    |  37 +-
 arch/x86/crypto/aesni-intel_glue.c                 |   4 +-
 arch/x86/crypto/curve25519-x86_64.c                | 767 ++++++++++------
 arch/x86/crypto/des3_ede_glue.c                    |   4 +-
 crypto/Kconfig                                     |   4 +
 crypto/Makefile                                    |   5 +
 crypto/af_alg.c                                    |   7 +-
 crypto/dh.c                                        |   5 +-
 crypto/drbg.c                                      | 150 ++--
 crypto/jitterentropy-kcapi.c                       |   6 -
 crypto/jitterentropy.c                             |  32 +-
 crypto/jitterentropy.h                             |   1 -
 crypto/kdf_sp800108.c                              | 153 ++++
 crypto/rsa.c                                       |   4 +
 crypto/sha256_generic.c                            |  16 +-
 crypto/testmgr.c                                   |   9 -
 crypto/testmgr.h                                   |   6 +-
 drivers/char/hw_random/Kconfig                     |  13 +-
 drivers/char/hw_random/Makefile                    |   1 +
 drivers/char/hw_random/cavium-rng-vf.c             | 194 +++-
 drivers/char/hw_random/cavium-rng.c                |  11 +-
 drivers/char/hw_random/cn10k-rng.c                 | 181 ++++
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |  21 +
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |   1 +
 drivers/crypto/atmel-aes.c                         |   6 +-
 drivers/crypto/caam/caamalg.c                      |   6 +
 drivers/crypto/caam/caamalg_qi2.c                  |   2 +-
 drivers/crypto/caam/caamhash.c                     |   3 +
 drivers/crypto/caam/caampkc.c                      |   3 +
 drivers/crypto/cavium/cpt/cptvf_main.c             |   5 +-
 drivers/crypto/ccp/ccp-dev.c                       |   2 +-
 drivers/crypto/ccp/sev-dev.c                       | 259 +++++-
 drivers/crypto/ccree/cc_request_mgr.c              |   1 -
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   7 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   2 +-
 drivers/crypto/hisilicon/qm.c                      | 483 ++++++----
 drivers/crypto/hisilicon/sec2/sec_main.c           |   2 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |  12 +-
 drivers/crypto/keembay/keembay-ocs-ecc.c           |   1 +
 drivers/crypto/marvell/octeontx/otx_cptvf_main.c   |   4 +-
 drivers/crypto/marvell/octeontx2/Makefile          |   2 +-
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |   1 +
 .../crypto/marvell/octeontx2/otx2_cpt_devlink.c    | 108 +++
 .../crypto/marvell/octeontx2/otx2_cpt_devlink.h    |  20 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |   3 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |  18 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    | 315 ++++++-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.h    |   7 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |   5 +-
 drivers/crypto/omap-aes.c                          |   2 +-
 drivers/crypto/omap-des.c                          |   8 +-
 drivers/crypto/qat/Kconfig                         |   1 +
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     | 151 +++-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h     |   2 +
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |  33 +
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |  12 +-
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c   |  15 +-
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h   |   1 -
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |   6 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |  12 +-
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c |  15 +-
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h |   1 -
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |   6 +-
 drivers/crypto/qat/qat_common/Makefile             |   6 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |  47 +-
 drivers/crypto/qat/qat_common/adf_accel_engine.c   |   8 +-
 drivers/crypto/qat/qat_common/adf_admin.c          |  47 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |   1 +
 drivers/crypto/qat/qat_common/adf_cfg_common.h     |  13 +
 drivers/crypto/qat/qat_common/adf_cfg_strings.h    |   3 +
 drivers/crypto/qat/qat_common/adf_common_drv.h     |  42 +-
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c   | 105 +--
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h   |  22 +-
 drivers/crypto/qat/qat_common/adf_gen2_pfvf.c      | 381 ++++++++
 drivers/crypto/qat/qat_common/adf_gen2_pfvf.h      |  29 +
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.c   |  69 +-
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h   |  17 +
 drivers/crypto/qat/qat_common/adf_gen4_pfvf.c      | 148 +++
 drivers/crypto/qat/qat_common/adf_gen4_pfvf.h      |  17 +
 drivers/crypto/qat/qat_common/adf_init.c           |  11 +-
 drivers/crypto/qat/qat_common/adf_isr.c            | 111 ++-
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c      | 416 ---------
 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h      |  93 --
 drivers/crypto/qat/qat_common/adf_pfvf_msg.h       | 259 ++++++
 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.c    |  52 ++
 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.h    |  18 +
 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c  | 346 ++++++++
 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.h  |  13 +
 drivers/crypto/qat/qat_common/adf_pfvf_utils.c     |  65 ++
 drivers/crypto/qat/qat_common/adf_pfvf_utils.h     |  31 +
 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c    | 167 ++++
 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.h    |  23 +
 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.c  | 368 ++++++++
 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.h  |  17 +
 drivers/crypto/qat/qat_common/adf_sriov.c          |  59 +-
 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c      |  48 -
 drivers/crypto/qat/qat_common/adf_vf_isr.c         | 106 +--
 .../crypto/qat/qat_common/icp_qat_fw_init_admin.h  |   4 +-
 drivers/crypto/qat/qat_common/icp_qat_hw.h         |  13 +-
 drivers/crypto/qat/qat_common/qat_crypto.c         |  25 +
 drivers/crypto/qat/qat_common/qat_hal.c            |  41 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |  44 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |   2 +
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |  15 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h    |   1 -
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |   6 +-
 drivers/crypto/qce/aead.c                          |   2 +-
 drivers/crypto/qce/sha.c                           |   2 +-
 drivers/crypto/qce/skcipher.c                      |   2 +-
 drivers/crypto/sa2ul.c                             |  19 +-
 drivers/crypto/stm32/stm32-crc32.c                 |   4 +-
 drivers/crypto/stm32/stm32-cryp.c                  | 988 +++++++++------------
 drivers/crypto/stm32/stm32-hash.c                  |   6 +-
 drivers/crypto/ux500/cryp/cryp.h                   |   2 +
 drivers/crypto/ux500/cryp/cryp_core.c              |  26 +-
 include/crypto/aead.h                              |   4 +-
 include/crypto/algapi.h                            |   5 +-
 include/crypto/blake2b.h                           |   1 -
 include/crypto/blake2s.h                           |   2 +-
 include/crypto/cryptd.h                            |   3 +-
 include/crypto/drbg.h                              |  11 +-
 include/crypto/engine.h                            |   6 +-
 include/crypto/internal/kdf_selftest.h             |  71 ++
 include/crypto/kdf_sp800108.h                      |  61 ++
 include/crypto/pcrypt.h                            |   2 +-
 include/crypto/scatterwalk.h                       |   3 +-
 include/crypto/skcipher.h                          |   6 +-
 include/linux/psp-sev.h                            |  21 +
 lib/mpi/mpi-mod.c                                  |   2 +
 security/keys/Kconfig                              |   2 +-
 security/keys/dh.c                                 | 130 +--
 142 files changed, 5484 insertions(+), 2637 deletions(-)
 create mode 100644 crypto/kdf_sp800108.c
 create mode 100644 drivers/char/hw_random/cn10k-rng.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_devlink.c
 create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_devlink.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_pfvf.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_pfvf.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pfvf.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pfvf.h
 delete mode 100644 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c
 delete mode 100644 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_msg.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_utils.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_utils.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.h
 delete mode 100644 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c
 create mode 100644 include/crypto/internal/kdf_selftest.h
 create mode 100644 include/crypto/kdf_sp800108.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.17
  2022-01-11  2:04               ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
@ 2022-01-11 20:53                 ` pr-tracker-bot
  2022-03-20 23:42                 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-01-11 20:53 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 11 Jan 2022 13:04:19 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5c947d0dbae8038ec1c8b538891f6475350542ee

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.17
  2021-12-22  5:13                   ` Herbert Xu
  2021-12-22 19:02                     ` pr-tracker-bot
@ 2022-02-09  2:33                     ` Herbert Xu
  2022-02-09 18:01                       ` pr-tracker-bot
  2022-03-16  1:13                       ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-02-09  2:33 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes two regressions:

- Potential boot failure due to missing cryptomgr on initramfs.
- Stack overflow in octeontx2.

The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:

  Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to c6ce9c5831cae515d375a01b97ae1778689acf19:

  crypto: api - Move cryptomgr soft dependency into algapi (2022-02-05 15:10:07 +1100)

----------------------------------------------------------------
Herbert Xu (1):
      crypto: api - Move cryptomgr soft dependency into algapi

Kees Cook (1):
      crypto: octeontx2 - Avoid stack variable overflow

 crypto/algapi.c                                     | 1 +
 crypto/api.c                                        | 1 -
 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 3 ++-
 3 files changed, 3 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.17
  2022-02-09  2:33                     ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
@ 2022-02-09 18:01                       ` pr-tracker-bot
  2022-03-16  1:13                       ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-02-09 18:01 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 9 Feb 2022 13:33:31 +1100:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f9f94c9d2c070941a5688f0f751a489c7d0e5039

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.17
  2022-02-09  2:33                     ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
  2022-02-09 18:01                       ` pr-tracker-bot
@ 2022-03-16  1:13                       ` Herbert Xu
  2022-03-17 20:40                         ` pr-tracker-bot
  2022-03-31  3:16                         ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-16  1:13 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This push fixes a bug where qcom-rng can return a buffer that is
not completely filled with random data.

The following changes since commit c6ce9c5831cae515d375a01b97ae1778689acf19:

  crypto: api - Move cryptomgr soft dependency into algapi (2022-02-05 15:10:07 +1100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to a680b1832ced3b5fa7c93484248fd221ea0d614b:

  crypto: qcom-rng - ensure buffer for generate is completely filled (2022-03-14 14:41:04 +1200)

----------------------------------------------------------------
Brian Masney (1):
      crypto: qcom-rng - ensure buffer for generate is completely filled

 drivers/crypto/qcom-rng.c | 17 ++++++++++-------
 1 file changed, 10 insertions(+), 7 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.17
  2022-03-16  1:13                       ` Herbert Xu
@ 2022-03-17 20:40                         ` pr-tracker-bot
  2022-03-31  3:16                         ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-03-17 20:40 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 16 Mar 2022 13:13:45 +1200:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d34c58247f73c5358ceae1ae648fb9daa408ef23

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.18
  2022-01-11  2:04               ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
  2022-01-11 20:53                 ` pr-tracker-bot
@ 2022-03-20 23:42                 ` Herbert Xu
  2022-03-21 23:14                   ` Linus Torvalds
  2022-03-21 23:18                   ` pr-tracker-bot
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-20 23:42 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

This update includes the following changes:

API:

- hwrng core now credits for low-quality RNG devices.

Algorithms:

- Optimisations for neon aes on arm/arm64.
- Add accelerated crc32_be on arm64.
- Add ffdheXYZ(dh) templates.
- Disallow hmac keys < 112 bits in FIPS mode.
- Add AVX assembly implementation for sm3 on x86.

Drivers:

- Add missing local_bh_disable calls for crypto_engine callback.
- Ensure BH is disabled in crypto_engine callback path.
- Fix zero length DMA mappings in ccree.
- Add synchronization between mailbox accesses in octeontx2.
- Add Xilinx SHA3 driver.
- Add support for the TDES IP available on sama7g5 SoC in atmel.

The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:

  Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus 

for you to fetch changes up to 0e03b8fd29363f2df44e2a7a176d486de550757a:

  crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST (2022-03-14 14:45:45 +1200)

----------------------------------------------------------------
Andy Shevchenko (2):
      crypto: qat - don't cast parameter in bit operations
      crypto: cavium/nitrox - don't cast parameter in bit operations

Ard Biesheuvel (8):
      crypto: memneq - avoid implicit unaligned accesses
      crypto: arm64/aes-neon-ctr - improve handling of single tail block
      crypto: arm/aes-neonbs-ctr - deal with non-multiples of AES block size
      crypto: arm64/aes-neonbs-ctr - fallback to plain NEON for final chunk
      crypto: arm64/aes-neonbs-xts - use plain NEON for non-power-of-2 input sizes
      lib/xor: make xor prototypes more friendly to compiler vectorization
      crypto: arm/xor - make vectorized C code Clang-friendly
      crypto: crypto_xor - use helpers for unaligned accesses

Claudiu Beznea (7):
      hwrng: atmel - add wait for ready support on read
      hwrng: atmel - disable trng on failure path
      hwrng: atmel - rename enable/disable functions to init/cleanup
      hwrng: atmel - move set of TRNG_HALFR in atmel_trng_init()
      hwrng: atmel - use __maybe_unused and pm_ptr() for pm ops
      hwrng: atmel - add runtime pm support
      hwrng: atmel - remove extra line

Colin Ian King (2):
      crypto: marvell/octeontx - remove redundant initialization of variable c_size
      crypto: sl3516 - remove redundant initializations of pointers in_sg and out_sg

Corentin Labbe (10):
      crypto: sun8i-ss - really disable hash on A80
      crypto: cavium/nitrox - fix typo on crypto
      crypto: rockchip - ECB does not need IV
      crypto: cavium/zip - register algorithm only if hardware is present
      crypto: sun8i-ss - call finalize with bh disabled
      crypto: sun8i-ce - call finalize with bh disabled
      crypto: amlogic - call finalize with bh disabled
      crypto: gemini - call finalize with bh disabled
      crypto: engine - check if BH is disabled during completion
      crypto: xilinx: prevent probing on non-xilinx hardware

Dan Carpenter (1):
      crypto: qat - fix a signedness bug in get_service_enabled()

Dominik Brodowski (10):
      hwrng: core - explicit ordering of initcalls
      hwrng: core - read() callback must be called for size of 32 or more bytes
      hwrng: core - use rng_fillbuf in add_early_randomness()
      hwrng: core - only set cur_rng_set_by_user if it is working
      hwrng: core - break out of hwrng_fillfn if current rng is not trusted
      hwrng: core - credit entropy for low quality sources of randomness
      hwrng: core - do not bother to order list of devices by quality
      hwrng: core - start and stop in-kernel rngd in separate function
      hwrng: core - use per-rng quality value instead of global setting
      hwrng: core - introduce rng_quality sysfs attribute

Dāvis Mosāns (1):
      crypto: ccp - ccp_dmaengine_unregister release dma channels

Eric Biggers (5):
      crypto: rsa-pkcs1pad - only allow with rsa
      crypto: rsa-pkcs1pad - correctly get hash from source scatterlist
      crypto: rsa-pkcs1pad - restore signature length check
      crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete()
      crypto: rsa-pkcs1pad - use clearer variable names

Geert Uytterhoeven (1):
      hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER

Gilad Ben-Yossef (1):
      crypto: ccree - don't attempt 0 len DMA mappings

Giovanni Cabiddu (5):
      crypto: qat - fix access to PFVF interrupt registers for GEN4
      crypto: qat - disable registration of algorithms
      crypto: qat - remove unneeded assignment
      crypto: qat - fix initialization of pfvf cap_msg structures
      crypto: qat - fix initialization of pfvf rts_map_msg structures

Harman Kalra (1):
      crypto: octeontx2 - add synchronization between mailbox accesses

Harsha (4):
      crypto: xilinx - Updated Makefile for xilinx subdirectory
      firmware: xilinx: Add ZynqMP SHA API for SHA3 functionality
      crypto: xilinx - Add Xilinx SHA3 driver
      MAINTAINERS: Add maintainer for Xilinx ZynqMP SHA3 driver

Herbert Xu (6):
      crypto: testmgr - Move crypto_simd_disabled_for_test out
      crypto: kdf - Select hmac in addition to sha256
      crypto: authenc - Fix sleep in atomic context in decrypt_tail
      crypto: xts - Add softdep on ecb
      crypto: lrw - Add dependency on ecb
      crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST

Jianglei Nie (1):
      crypto: ccree - Fix use after free in cc_cipher_exit()

Jiapeng Chong (2):
      crypto: marvell/octeontx - Use swap() instead of open coding it
      crypto: dh - Remove the unused function dh_safe_prime_dh_alg()

Julia Lawall (1):
      crypto: ux500 - use GFP_KERNEL

Kai Ye (14):
      Documentation: use the tabs on all acc documentation
      Documentation: update debugfs doc for Hisilicon SEC
      Documentation: update debugfs doc for Hisilicon ZIP
      Documentation: update debugfs doc for Hisilicon HPRE
      crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
      crypto: hisilicon/sec - add some comments for soft fallback
      crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
      crypto: hisilicon/sec - fix the CTR mode BD configuration
      crypto: hisilicon/sec - use the correct print format
      crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos
      crypto: hisilicon/sec - add the register configuration for HW V3
      crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3
      crypto: hisilicon/sec - fix the aead software fallback for engine
      crypto: hisilicon/qm - fix memset during queues clearing

Kavyasree Kotagiri (1):
      crypto: atmel - add support for AES and SHA IPs available on lan966x SoC

Kevin Bracey (4):
      lib/crc32: remove unneeded casts
      lib/crc32: Make crc32_be weak for arch override
      lib/crc32test: correct printed bytes count
      arm64: lib: accelerate crc32_be

Longfang Liu (1):
      MAINTAINERS: update HPRE/SEC2/TRNG driver maintainers list

Miaoqian Lin (1):
      hwrng: nomadik - Change clk_disable to clk_disable_unprepare

Minghao Chi (1):
      crypto: ccp - remove redundant ret variable

Nathan Huckleberry (1):
      crypto: x86 - Convert to SPDX identifier

Nicolai Stange (15):
      crypto: kpp - provide support for KPP template instances
      crypto: kpp - provide support for KPP spawns
      crypto: dh - remove struct dh's ->q member
      crypto: dh - constify struct dh's pointer members
      crypto: dh - split out deserialization code from crypto_dh_decode()
      crypto: dh - introduce common code for built-in safe-prime group support
      crypto: dh - implement ffdheXYZ(dh) templates
      crypto: testmgr - add known answer tests for ffdheXYZ(dh) templates
      crypto: dh - implement private key generation primitive for ffdheXYZ(dh)
      crypto: testmgr - add keygen tests for ffdheXYZ(dh) templates
      crypto: dh - allow for passing NULL to the ffdheXYZ(dh)s' ->set_secret()
      crypto: api - allow algs only in specific constructions in FIPS mode
      crypto: dh - disallow plain "dh" usage in FIPS mode
      lib/mpi: export mpi_rshift
      crypto: dh - calculate Q from P for the full public key verification

Peter Gonda (1):
      crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()

Petr Vorel (1):
      crypto: vmx - add missing dependencies

Rikard Falkeborn (3):
      crypto: omap-aes - Constify static attribute_group
      crypto: omap-sham - Constify static attribute_group
      crypto: nx - Constify static attribute_group structs

Shijith Thotton (2):
      crypto: octeontx2 - select CONFIG_NET_DEVLINK
      crypto: octeontx2 - remove CONFIG_DM_CRYPT check

Srujana Challa (3):
      crypto: octeontx2 - CN10K CPT to RNM workaround
      crypto: octeontx2 - disable DMA black hole on an DMA fault
      crypto: octeontx2 - increase CPT HW instruction queue length

Stephan Müller (2):
      crypto: hmac - add fips_skip support
      crypto: hmac - disallow keys < 112 bits in FIPS mode

Tianjia Zhang (7):
      crypto: sm3 - create SM3 stand-alone library
      crypto: arm64/sm3-ce - make dependent on sm3 library
      crypto: sm2 - make dependent on sm3 library
      crypto: sm3 - make dependent on sm3 library
      crypto: x86/sm3 - add AVX assembly implementation
      crypto: tcrypt - add asynchronous speed test for SM3
      crypto: tcrypt - remove all multibuffer ahash tests

Tom Rix (2):
      crypto: cleanup comments
      crypto: arm64 - cleanup comments

Tomas Paukrt (1):
      crypto: mxs-dcp - Fix scatterlist processing

Tudor Ambarus (1):
      crypto: atmel-tdes - Add support for the TDES IP available on sama7g5 SoC

Wan Jiabing (1):
      hwrng: cavium - fix NULL but dereferenced coccicheck error

Wojciech Ziemba (3):
      crypto: qat - add misc workqueue
      crypto: qat - move and rename GEN4 error register definitions
      crypto: qat - enable power management for QAT GEN4

Yang Yingliang (1):
      crypto: octeontx2 - fix missing unlock

YueHaibing (2):
      crypto: x86/blowfish - Remove unused inline functions
      crypto: x86/des3 - Remove unused inline function des3_ede_enc_blk_3way()

Yury Norov (1):
      padata: replace cpumask_weight with cpumask_empty in padata.c

 Documentation/ABI/testing/debugfs-hisi-hpre        |  178 +--
 Documentation/ABI/testing/debugfs-hisi-sec         |  146 +-
 Documentation/ABI/testing/debugfs-hisi-zip         |  146 +-
 MAINTAINERS                                        |   11 +-
 arch/alpha/include/asm/xor.h                       |   53 +-
 arch/arm/crypto/aes-neonbs-core.S                  |  105 +-
 arch/arm/crypto/aes-neonbs-glue.c                  |   35 +-
 arch/arm/include/asm/xor.h                         |   42 +-
 arch/arm/lib/xor-neon.c                            |   12 +-
 arch/arm64/crypto/Kconfig                          |    2 +-
 arch/arm64/crypto/aes-glue.c                       |   22 +-
 arch/arm64/crypto/aes-modes.S                      |   18 +-
 arch/arm64/crypto/aes-neonbs-core.S                |  264 +---
 arch/arm64/crypto/aes-neonbs-glue.c                |   97 +-
 arch/arm64/crypto/sha3-ce-glue.c                   |    2 +-
 arch/arm64/crypto/sha512-armv8.pl                  |    2 +-
 arch/arm64/crypto/sha512-ce-glue.c                 |    2 +-
 arch/arm64/crypto/sm3-ce-glue.c                    |   28 +-
 arch/arm64/include/asm/xor.h                       |   21 +-
 arch/arm64/lib/crc32.S                             |   87 +-
 arch/arm64/lib/xor-neon.c                          |   46 +-
 arch/ia64/include/asm/xor.h                        |   21 +-
 arch/powerpc/include/asm/xor_altivec.h             |   25 +-
 arch/powerpc/lib/xor_vmx.c                         |   28 +-
 arch/powerpc/lib/xor_vmx.h                         |   27 +-
 arch/powerpc/lib/xor_vmx_glue.c                    |   32 +-
 arch/s390/lib/xor.c                                |   21 +-
 arch/sparc/include/asm/xor_32.h                    |   21 +-
 arch/sparc/include/asm/xor_64.h                    |   42 +-
 arch/x86/crypto/Makefile                           |    3 +
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S            |   63 +-
 arch/x86/crypto/blowfish_glue.c                    |   12 -
 arch/x86/crypto/des3_ede_glue.c                    |    8 -
 arch/x86/crypto/sm3-avx-asm_64.S                   |  517 +++++++
 arch/x86/crypto/sm3_avx_glue.c                     |  134 ++
 arch/x86/include/asm/xor.h                         |   42 +-
 arch/x86/include/asm/xor_32.h                      |   42 +-
 arch/x86/include/asm/xor_avx.h                     |   21 +-
 crypto/Kconfig                                     |   25 +-
 crypto/algapi.c                                    |   48 +-
 crypto/api.c                                       |   19 +-
 crypto/asymmetric_keys/signature.c                 |    2 +-
 crypto/asymmetric_keys/x509_parser.h               |    2 +-
 crypto/async_tx/async_xor.c                        |    8 +-
 crypto/async_tx/raid6test.c                        |    4 +-
 crypto/authenc.c                                   |    2 +-
 crypto/cfb.c                                       |    2 +-
 crypto/crypto_engine.c                             |    1 +
 crypto/dh.c                                        |  681 ++++++++-
 crypto/dh_helper.c                                 |   42 +-
 crypto/hmac.c                                      |    4 +
 crypto/kpp.c                                       |   29 +
 crypto/lrw.c                                       |    1 +
 crypto/memneq.c                                    |   22 +-
 crypto/rsa-pkcs1pad.c                              |   38 +-
 crypto/sm2.c                                       |   40 +-
 crypto/sm3_generic.c                               |  142 +-
 crypto/tcrypt.c                                    |  226 +--
 crypto/testmgr.c                                   |   67 +-
 crypto/testmgr.h                                   | 1456 +++++++++++++++++++-
 crypto/xts.c                                       |    1 +
 drivers/char/hw_random/Kconfig                     |    2 +-
 drivers/char/hw_random/atmel-rng.c                 |  148 +-
 drivers/char/hw_random/cavium-rng-vf.c             |    2 +-
 drivers/char/hw_random/core.c                      |  161 ++-
 drivers/char/hw_random/nomadik-rng.c               |    4 +-
 drivers/crypto/Kconfig                             |   10 +
 drivers/crypto/Makefile                            |    2 +-
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |    3 +
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |    3 +
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |    3 +
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |    2 +
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |    3 +
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |    2 +
 drivers/crypto/atmel-aes.c                         |    1 +
 drivers/crypto/atmel-sha.c                         |    1 +
 drivers/crypto/atmel-tdes.c                        |    1 +
 drivers/crypto/cavium/nitrox/nitrox_mbx.c          |    8 +-
 drivers/crypto/cavium/nitrox/nitrox_req.h          |    2 +-
 drivers/crypto/cavium/zip/zip_main.c               |   83 +-
 drivers/crypto/ccp/ccp-crypto-aes.c                |    5 +-
 drivers/crypto/ccp/ccp-dmaengine.c                 |   16 +
 drivers/crypto/ccp/sev-dev.c                       |    2 +-
 drivers/crypto/ccree/cc_buffer_mgr.c               |    7 +
 drivers/crypto/ccree/cc_cipher.c                   |    2 +-
 drivers/crypto/gemini/sl3516-ce-cipher.c           |    6 +-
 drivers/crypto/hisilicon/qm.c                      |    4 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   43 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |    6 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   59 +-
 drivers/crypto/marvell/Kconfig                     |    1 +
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   |    5 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_main.c   |    1 -
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |    1 +
 .../marvell/octeontx2/otx2_cpt_mbox_common.c       |   14 +
 drivers/crypto/marvell/octeontx2/otx2_cptlf.h      |   19 +-
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |    1 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |   25 +-
 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c |   27 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    |   56 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |   17 +-
 drivers/crypto/mxs-dcp.c                           |    2 +-
 drivers/crypto/nx/nx-common-pseries.c              |    4 +-
 drivers/crypto/omap-aes.c                          |    2 +-
 drivers/crypto/omap-sham.c                         |    2 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |   23 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h     |   24 -
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |    7 +
 drivers/crypto/qat/qat_common/Makefile             |    1 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    2 +
 drivers/crypto/qat/qat_common/adf_admin.c          |   37 +
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    4 +
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    6 +
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h   |   14 +
 drivers/crypto/qat/qat_common/adf_gen4_pfvf.c      |   42 +-
 drivers/crypto/qat/qat_common/adf_gen4_pm.c        |  137 ++
 drivers/crypto/qat/qat_common/adf_gen4_pm.h        |   44 +
 drivers/crypto/qat/qat_common/adf_init.c           |    6 +
 drivers/crypto/qat/qat_common/adf_isr.c            |   42 +
 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c    |    4 +-
 .../crypto/qat/qat_common/icp_qat_fw_init_admin.h  |    1 +
 drivers/crypto/qat/qat_common/qat_crypto.c         |    7 +
 drivers/crypto/qat/qat_common/qat_uclo.c           |    9 +-
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |    1 -
 drivers/crypto/ux500/cryp/cryp_core.c              |    2 +-
 drivers/crypto/ux500/hash/hash_core.c              |    2 +-
 drivers/crypto/vmx/Kconfig                         |    4 +
 drivers/crypto/xilinx/Makefile                     |    1 +
 drivers/crypto/xilinx/zynqmp-sha.c                 |  264 ++++
 drivers/firmware/xilinx/zynqmp.c                   |   26 +
 .../net/ethernet/marvell/octeontx2/af/rvu_cpt.c    |    1 +
 include/asm-generic/xor.h                          |   84 +-
 include/crypto/algapi.h                            |   10 +-
 include/crypto/dh.h                                |   26 +-
 include/crypto/internal/kpp.h                      |  158 +++
 include/crypto/sm3.h                               |   34 +-
 include/linux/crypto.h                             |    9 +
 include/linux/firmware/xlnx-zynqmp.h               |    8 +
 include/linux/raid/xor.h                           |   21 +-
 kernel/padata.c                                    |    2 +-
 lib/crc32.c                                        |   14 +-
 lib/crc32test.c                                    |    2 +-
 lib/crypto/Kconfig                                 |    3 +
 lib/crypto/Makefile                                |    3 +
 lib/crypto/sm3.c                                   |  246 ++++
 lib/mpi/mpi-bit.c                                  |    1 +
 security/keys/dh.c                                 |    2 +-
 147 files changed, 5673 insertions(+), 1669 deletions(-)
 create mode 100644 arch/x86/crypto/sm3-avx-asm_64.S
 create mode 100644 arch/x86/crypto/sm3_avx_glue.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pm.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pm.h
 create mode 100644 drivers/crypto/xilinx/zynqmp-sha.c
 create mode 100644 lib/crypto/sm3.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.18
  2022-03-20 23:42                 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
@ 2022-03-21 23:14                   ` Linus Torvalds
  2022-03-22  5:49                     ` Herbert Xu
  2022-03-21 23:18                   ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2022-03-21 23:14 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sun, Mar 20, 2022 at 4:42 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
>   git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

So perhaps somewhat ironically, the crypto tree is now the first tree
I'm merging in this merge window that doesn't have a signed tag.

I don't require signed tags for kernel.org pulls, but I really do
heavily prefer them, and they aren't that hard to do.

I'm sure there are several other non-signed pull requests waiting in
the queue, but still, your pull request stands out as being the first
one - out of 27 so far - that didn't have it.

Can I prod you in the direction of making signed tags a part of your
workflow? The tag can contain the details of the pull - in which case
git request-pull will populate the pull request with it - or it can be
just some dummy message and you write the details separately in the
pull request email like you do now.

I know you have a pgp key, because I have one in my keyring from you
going all the way back to 2011. And if you have lost sight of that one
and need to create a new one, that still better going forward than not
signing your pull requests at all..

            Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.18
  2022-03-20 23:42                 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
  2022-03-21 23:14                   ` Linus Torvalds
@ 2022-03-21 23:18                   ` pr-tracker-bot
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-03-21 23:18 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 21 Mar 2022 11:42:35 +1200:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93e220a62da36f766b3188e76e234607e41488f9

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.18
  2022-03-21 23:14                   ` Linus Torvalds
@ 2022-03-22  5:49                     ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-22  5:49 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Mar 21, 2022 at 04:14:50PM -0700, Linus Torvalds wrote:
>
> Can I prod you in the direction of making signed tags a part of your
> workflow? The tag can contain the details of the pull - in which case
> git request-pull will populate the pull request with it - or it can be
> just some dummy message and you write the details separately in the
> pull request email like you do now.

Sure, I can do that starting with the next push request.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.18
  2022-03-16  1:13                       ` Herbert Xu
  2022-03-17 20:40                         ` pr-tracker-bot
@ 2022-03-31  3:16                         ` Herbert Xu
  2022-03-31 19:12                           ` pr-tracker-bot
                                             ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-31  3:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 0e03b8fd29363f2df44e2a7a176d486de550757a:

  crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST (2022-03-14 14:45:45 +1200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p1

for you to fetch changes up to aa8e73eed7d3084c18dd16d195748661c7e881b5:

  crypto: x86/sm3 - Fixup SLS (2022-03-30 16:33:11 +1200)

----------------------------------------------------------------
This push fixes the following issues:

- Missing Kconfig dependency on arm that leads to boot failure.
- x86 SLS fixes.
- Reference leak in the stm32 driver.

----------------------------------------------------------------
Herbert Xu (1):
      crypto: arm/aes-neonbs-cbc - Select generic cbc and aes

Peter Zijlstra (3):
      crypto: x86/chacha20 - Avoid spurious jumps to other functions
      crypto: x86/poly1305 - Fixup SLS
      crypto: x86/sm3 - Fixup SLS

Zheng Yongjun (1):
      crypto: stm32 - fix reference leak in stm32_crc_remove

 arch/arm/crypto/Kconfig                       |  2 ++
 arch/x86/crypto/chacha-avx512vl-x86_64.S      |  4 +--
 arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 38 +++++++++++++--------------
 arch/x86/crypto/sm3-avx-asm_64.S              |  2 +-
 drivers/crypto/stm32/stm32-crc32.c            |  4 ++-
 5 files changed, 27 insertions(+), 23 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.18
  2022-03-31  3:16                         ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
@ 2022-03-31 19:12                           ` pr-tracker-bot
  2022-05-20  5:41                           ` Herbert Xu
  2022-05-27 11:29                           ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-03-31 19:12 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 31 Mar 2022 15:16:58 +1200:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93235e3df29c084a37e0daed17801c6adfce4cb6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.18
  2022-03-31  3:16                         ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
  2022-03-31 19:12                           ` pr-tracker-bot
@ 2022-05-20  5:41                           ` Herbert Xu
  2022-05-20  6:10                             ` pr-tracker-bot
  2022-05-27 11:29                           ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2022-05-20  5:41 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17:

  Linux 5.18-rc1 (2022-04-03 14:08:21 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p2 

for you to fetch changes up to 16287397ec5c08aa58db6acf7dbc55470d78087d:

  crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (2022-05-13 17:13:38 +0800)

----------------------------------------------------------------
This push fixes a regression in a recent fix to qcom-rng.

----------------------------------------------------------------
Ondrej Mosnacek (1):
      crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ

 drivers/crypto/qcom-rng.c | 1 +
 1 file changed, 1 insertion(+)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.18
  2022-05-20  5:41                           ` Herbert Xu
@ 2022-05-20  6:10                             ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-05-20  6:10 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 20 May 2022 13:41:04 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3d7285a335edaf23b699e87c528cf0b0070e3293

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.19
  2022-03-31  3:16                         ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
  2022-03-31 19:12                           ` pr-tracker-bot
  2022-05-20  5:41                           ` Herbert Xu
@ 2022-05-27 11:29                           ` Herbert Xu
  2022-05-28  1:21                             ` pr-tracker-bot
                                               ` (2 more replies)
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-05-27 11:29 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17:

  Linux 5.18-rc1 (2022-04-03 14:08:21 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p1 

for you to fetch changes up to e4e62bbc6aba49a5edb3156ec65f6698ff37d228:

  hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (2022-05-20 13:54:45 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Test in-place en/decryption with two sglists in testmgr.
- Fix process vs. softirq race in cryptd.

Algorithms:

- Add arm64 acceleration for sm4.
- Add s390 acceleration for chacha20.

Drivers:

- Add polarfire soc hwrng support in mpsf.
- Add support for TI SoC AM62x in sa2ul.
- Add support for ATSHA204 cryptochip in atmel-sha204a.
- Add support for PRNG in caam.
- Restore support for storage encryption in qat.
- Restore support for storage encryption in hisilicon/sec.

----------------------------------------------------------------
Colin Ian King (1):
      hwrng: optee - remove redundant initialization to variable rng_size

Conor Dooley (1):
      hwrng: mpfs - add polarfire soc hwrng support

Corentin Labbe (20):
      crypto: marvell/cesa - ECB does not IV
      crypto: sun8i-ce - Fix minor style issue
      crypto: sun8i-ce - do not allocate memory when handling requests
      crypto: sun4i-ss - do not allocate backup IV on requests
      crypto: sun8i-ss - rework handling of IV
      crypto: sun8i-ss - handle zero sized sg
      crypto: sun8i-ss - remove redundant test
      crypto: sun8i-ss - test error before assigning
      crypto: sun8i-ss - use sg_nents_for_len
      crypto: sun8i-ss - do not allocate memory when handling hash requests
      crypto: sun8i-ss - do not zeroize all pad
      crypto: sun8i-ss - handle requests if last block is not modulo 64
      crypto: sun8i-ss - rework debugging
      crypto: sun8i-ss - Add function for handling hash padding
      crypto: sun8i-ss - add hmac(sha1)
      crypto: sun8i-ss - do not fallback if cryptlen is less than sg length
      crypto: sun8i-ce - Add function for handling hash padding
      crypto: sun8i-ce - use sg_nents_for_len
      crypto: sun8i-ce - rework debugging
      crypto: sun8i-ce - do not fallback if cryptlen is less than sg length

Eric Biggers (1):
      crypto: testmgr - test in-place en/decryption with two sglists

Fabio Estevam (1):
      crypto: caam - fix i.MX6SX entropy delay value

Gilad Ben-Yossef (2):
      crypto: ccree - rearrange init calls to avoid race
      crypto: ccree - use fine grained DMA mapping dir

Giovanni Cabiddu (15):
      crypto: qat - set CIPHER capability for DH895XCC
      crypto: qat - set COMPRESSION capability for DH895XCC
      crypto: qat - remove unused PFVF stubs
      crypto: qat - set to zero DH parameters before free
      crypto: qat - use pre-allocated buffers in datapath
      crypto: qat - refactor submission logic
      crypto: qat - add backlog mechanism
      crypto: qat - fix memory leak in RSA
      crypto: qat - remove dma_free_coherent() for RSA
      crypto: qat - remove dma_free_coherent() for DH
      crypto: qat - add param check for RSA
      crypto: qat - add param check for DH
      crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag
      crypto: qat - re-enable registration of algorithms
      crypto: qat - add support for 401xx devices

Haowen Bai (1):
      crypto: qat - Fix unsigned function returning negative constant

Herbert Xu (3):
      hwrng: mpfs - Enable COMPILE_TEST
      Revert "hwrng: mpfs - Enable COMPILE_TEST"
      hwrng: cn10k - Enable compile testing

Hui Tang (1):
      crypto: hisilicon/qm - optimize the barrier operation

Jacky Li (1):
      crypto: ccp - Fix the INIT_EX data file open failure

Jakob Koschel (1):
      crypto: cavium/nitrox - remove check of list iterator against head past the loop body

Jason A. Donenfeld (1):
      crypto: sm3,sm4 - move into crypto directory

Jayesh Choudhary (2):
      dt-bindings: crypto: ti,sa2ul: Add a new compatible for AM62
      crypto: sa2ul - Add the new compatible for AM62

Juerg Haefliger (1):
      crypto: inside-secure - Add MODULE_FIRMWARE macros

Kai Ye (13):
      crypto: hisilicon/qm - add register checking for ACC
      crypto: hisilicon/hpre - support register checking
      crypto: hisilicon/sec - support register checking
      crypto: hisilicon/zip - support register checking
      Documentation: update debugfs doc for Hisilicon HPRE
      Documentation: update debugfs doc for Hisilicon SEC
      Documentation: update debugfs doc for Hisilicon ZIP
      crypto: hisilicon/qm - add last word dumping for ACC
      crypto: hisilicon/sec - support last word dumping
      crypto: hisilicon/hpre - support last word dumping
      crypto: hisilicon/zip - support last word dumping
      crypto: hisilicon/sec - add sm4 generic selection
      crypto: hisilicon/sec - delete the flag CRYPTO_ALG_ALLOCATES_MEMORY

Lv Ruyi (1):
      crypto: keembay - Make use of devm helper function devm_platform_ioremap_resource()

Marco Chiappero (12):
      crypto: qat - fix ETR sources enabled by default on GEN2 devices
      crypto: qat - remove unneeded braces
      crypto: qat - remove unnecessary tests to detect PFVF support
      crypto: qat - add missing restarting event notification in VFs
      crypto: qat - test PFVF registers for spurious interrupts on GEN4
      crypto: qat - fix wording and formatting in code comment
      crypto: qat - fix off-by-one error in PFVF debug print
      crypto: qat - rework the VF2PF interrupt handling logic
      crypto: qat - leverage the GEN2 VF mask definiton
      crypto: qat - replace disable_vf2pf_interrupts()
      crypto: qat - use u32 variables in all GEN4 pfvf_ops
      crypto: qat - remove line wrapping for pfvf_ops functions

Mario Limonciello (4):
      crypto: ccp - cache capability into psp device
      crypto: ccp - Export PSP security bits to userspace
      crypto: ccp - Allow PSP driver to load without SEV/TEE support
      crypto: ccp - When TSME and SME both detected notify user

Masahiro Yamada (2):
      crypto: vmx - Align the short log with Makefile cleanups
      crypto: vmx - Fix build error

Meenakshi Aggarwal (1):
      crypto: caam/rng - Add support for PRNG

Minghao Chi (3):
      crypto: sun8i-ss - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
      crypto: sun8i-ce - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
      crypto: octeontx2 - simplify the return expression of otx2_cpt_aead_cbc_aes_sha_setkey()

Pali Rohár (1):
      crypto: atmel-sha204a - Add support for ATSHA204 cryptochip

Peter Gonda (1):
      crypto: ccp - Log when resetting PSP SEV state

Randy Dunlap (1):
      crypto: x86 - eliminate anonymous module_init & module_exit

Robin Murphy (1):
      crypto: qat - stop using iommu_present()

Sebastian Andrzej Siewior (1):
      crypto: cryptd - Protect per-CPU resource by disabling BH.

Tetsuo Handa (1):
      crypto: atmel - Avoid flush_scheduled_work() usage

Tianjia Zhang (5):
      crypto: sm4 - export sm4 constant arrays
      crypto: arm64/sm4-ce - rename to sm4-ce-cipher
      crypto: arm64/sm4 - add ARMv8 NEON implementation
      crypto: arm64/sm4 - add ARMv8 Crypto Extensions implementation
      crypto: arm64/sm4 - Fix wrong dependency of NEON/CE implementation

Uwe Kleine-König (3):
      crypto: atmel-sha204a - Remove useless check
      crypto: atmel-sha204a - Suppress duplicate error message
      crypto: atmel-i2c - Simplify return code in probe function

Vitaly Chikunov (1):
      crypto: ecrdsa - Fix incorrect use of vli_cmp

Vladis Dronov (3):
      hwrng: cn10k - Optimize cn10k_rng_read()
      hwrng: cn10k - Make check_rng_health() return an error code
      crypto: s390 - add crypto library interface for ChaCha20

Weili Qian (4):
      crypto: hisilicon/qm - remove unused function declaration
      crypto: hisilicon/qm - set function with static
      crypto: hisilicon/qm - replace hisi_qm_release_qp() with hisi_qm_free_qps()
      crypto: hisilicon/qm - remove hisi_qm_get_free_qp_num()

Wojciech Ziemba (1):
      crypto: qat - add check for invalid PFVF protocol version 0

Yang Li (1):
      crypto: engine - Add parameter description in crypto_transfer_request() kernel-doc comment

Yang Shen (1):
      crypto: hisilicon/sgl - align the hardware sgl dma address

Yang Yingliang (1):
      hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume()

Yihao Han (1):
      crypto: ux500/hash - simplify if-if to if-else

jianchunfu (1):
      crypto: talitos - Uniform coding style with defined variable

 Documentation/ABI/testing/debugfs-hisi-hpre        |  14 +
 Documentation/ABI/testing/debugfs-hisi-sec         |  14 +
 Documentation/ABI/testing/debugfs-hisi-zip         |  14 +
 Documentation/ABI/testing/sysfs-driver-ccp         |  87 +++
 .../devicetree/bindings/crypto/ti,sa2ul.yaml       |   1 +
 .../devicetree/bindings/trivial-devices.yaml       |   4 +-
 arch/arm64/crypto/Kconfig                          |  16 +-
 arch/arm64/crypto/Makefile                         |   8 +-
 arch/arm64/crypto/sm4-ce-cipher-core.S             |  36 ++
 arch/arm64/crypto/sm4-ce-cipher-glue.c             |  82 +++
 arch/arm64/crypto/sm4-ce-core.S                    | 688 ++++++++++++++++++++-
 arch/arm64/crypto/sm4-ce-glue.c                    | 386 ++++++++++--
 arch/arm64/crypto/sm4-neon-core.S                  | 487 +++++++++++++++
 arch/arm64/crypto/sm4-neon-glue.c                  | 442 +++++++++++++
 arch/s390/crypto/chacha-glue.c                     |  34 +-
 arch/x86/crypto/blowfish_glue.c                    |   8 +-
 arch/x86/crypto/camellia_glue.c                    |   8 +-
 arch/x86/crypto/serpent_avx2_glue.c                |   8 +-
 arch/x86/crypto/twofish_glue.c                     |   8 +-
 arch/x86/crypto/twofish_glue_3way.c                |   8 +-
 crypto/Kconfig                                     |  18 +-
 crypto/Makefile                                    |   6 +-
 crypto/cryptd.c                                    |  23 +-
 crypto/crypto_engine.c                             |   1 +
 crypto/ecrdsa.c                                    |   8 +-
 {lib/crypto => crypto}/sm3.c                       |   0
 {lib/crypto => crypto}/sm4.c                       |  10 +-
 crypto/testmgr.c                                   |  75 ++-
 drivers/char/hw_random/Kconfig                     |  15 +-
 drivers/char/hw_random/Makefile                    |   1 +
 drivers/char/hw_random/cn10k-rng.c                 |  31 +-
 drivers/char/hw_random/mpfs-rng.c                  | 104 ++++
 drivers/char/hw_random/omap3-rom-rng.c             |   2 +-
 drivers/char/hw_random/optee-rng.c                 |   2 +-
 drivers/crypto/Kconfig                             |   4 +-
 drivers/crypto/Makefile                            |   1 +
 .../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c    |  22 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h       |   1 +
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    | 102 +--
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |  54 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  | 130 ++--
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c  |   6 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |  19 +-
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    | 180 ++++--
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |  92 ++-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  | 385 ++++++++++--
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c  |   6 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h       |  33 +-
 drivers/crypto/atmel-ecc.c                         |   2 +-
 drivers/crypto/atmel-i2c.c                         |  30 +-
 drivers/crypto/atmel-i2c.h                         |   1 +
 drivers/crypto/atmel-sha204a.c                     |  11 +-
 drivers/crypto/caam/Kconfig                        |   8 +
 drivers/crypto/caam/Makefile                       |   1 +
 drivers/crypto/caam/caamprng.c                     | 235 +++++++
 drivers/crypto/caam/ctrl.c                         |  18 +
 drivers/crypto/caam/intern.h                       |  15 +
 drivers/crypto/caam/jr.c                           |   3 +-
 drivers/crypto/cavium/nitrox/nitrox_main.c         |  10 +-
 drivers/crypto/ccp/psp-dev.c                       |  49 +-
 drivers/crypto/ccp/psp-dev.h                       |  22 +
 drivers/crypto/ccp/sev-dev.c                       |  32 +-
 drivers/crypto/ccp/sp-pci.c                        |  62 ++
 drivers/crypto/ccree/cc_buffer_mgr.c               |  27 +-
 drivers/crypto/ccree/cc_driver.c                   |  24 +-
 drivers/crypto/hisilicon/Kconfig                   |   1 +
 drivers/crypto/hisilicon/hpre/hpre_main.c          | 222 +++++--
 drivers/crypto/hisilicon/qm.c                      | 282 ++++++++-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   2 -
 drivers/crypto/hisilicon/sec2/sec_main.c           | 108 +++-
 drivers/crypto/hisilicon/sgl.c                     |   6 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   2 +-
 drivers/crypto/hisilicon/zip/zip_main.c            | 185 +++++-
 drivers/crypto/inside-secure/safexcel.c            |   9 +
 drivers/crypto/keembay/keembay-ocs-aes-core.c      |   9 +-
 drivers/crypto/marvell/cesa/cipher.c               |   1 -
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |   7 +-
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |   8 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |  15 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h   |   4 -
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |  15 +-
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h     |   4 -
 drivers/crypto/qat/qat_common/Makefile             |   1 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   6 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |  18 +-
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c   |  13 +
 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h   |   6 +
 drivers/crypto/qat/qat_common/adf_gen2_pfvf.c      |  78 ++-
 drivers/crypto/qat/qat_common/adf_gen4_pfvf.c      |  61 +-
 drivers/crypto/qat/qat_common/adf_isr.c            |  21 +-
 drivers/crypto/qat/qat_common/adf_pfvf_msg.h       |   4 +-
 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c  |   6 +-
 drivers/crypto/qat/qat_common/adf_sriov.c          |  16 +-
 drivers/crypto/qat/qat_common/adf_transport.c      |  11 +
 drivers/crypto/qat/qat_common/adf_transport.h      |   1 +
 .../crypto/qat/qat_common/adf_transport_internal.h |   1 +
 drivers/crypto/qat/qat_common/adf_vf_isr.c         |   1 +
 drivers/crypto/qat/qat_common/qat_algs.c           | 153 +++--
 drivers/crypto/qat/qat_common/qat_algs_send.c      |  86 +++
 drivers/crypto/qat/qat_common/qat_algs_send.h      |  11 +
 drivers/crypto/qat/qat_common/qat_asym_algs.c      | 307 +++++----
 drivers/crypto/qat/qat_common/qat_crypto.c         |  10 +-
 drivers/crypto/qat/qat_common/qat_crypto.h         |  44 ++
 drivers/crypto/qat/qat_common/qat_hal.c            |   1 +
 drivers/crypto/qat/qat_common/qat_uclo.c           |   3 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 126 ++--
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h |   4 -
 drivers/crypto/sa2ul.c                             |   1 +
 drivers/crypto/talitos.c                           |  10 +-
 drivers/crypto/ux500/hash/hash_core.c              |   4 +-
 drivers/crypto/vmx/Makefile                        |  17 +-
 include/crypto/sm4.h                               |   4 +
 include/linux/hisi_acc_qm.h                        |  23 +-
 lib/crypto/Kconfig                                 |   6 -
 lib/crypto/Makefile                                |   6 -
 tools/testing/crypto/chacha20-s390/Makefile        |  12 +
 tools/testing/crypto/chacha20-s390/run-tests.sh    |  34 +
 tools/testing/crypto/chacha20-s390/test-cipher.c   | 372 +++++++++++
 118 files changed, 5534 insertions(+), 1058 deletions(-)
 create mode 100644 Documentation/ABI/testing/sysfs-driver-ccp
 create mode 100644 arch/arm64/crypto/sm4-ce-cipher-core.S
 create mode 100644 arch/arm64/crypto/sm4-ce-cipher-glue.c
 create mode 100644 arch/arm64/crypto/sm4-neon-core.S
 create mode 100644 arch/arm64/crypto/sm4-neon-glue.c
 rename {lib/crypto => crypto}/sm3.c (100%)
 rename {lib/crypto => crypto}/sm4.c (94%)
 create mode 100644 drivers/char/hw_random/mpfs-rng.c
 create mode 100644 drivers/crypto/caam/caamprng.c
 create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.c
 create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.h
 create mode 100644 tools/testing/crypto/chacha20-s390/Makefile
 create mode 100644 tools/testing/crypto/chacha20-s390/run-tests.sh
 create mode 100644 tools/testing/crypto/chacha20-s390/test-cipher.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.19
  2022-05-27 11:29                           ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
@ 2022-05-28  1:21                             ` pr-tracker-bot
  2022-06-17  8:29                             ` Herbert Xu
  2022-08-02  6:05                             ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-05-28  1:21 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 27 May 2022 19:29:02 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d075c0c1be279c5f4c6688ac0442fff6494e56bc

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.19
  2022-05-27 11:29                           ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
  2022-05-28  1:21                             ` pr-tracker-bot
@ 2022-06-17  8:29                             ` Herbert Xu
  2022-06-17 15:29                               ` pr-tracker-bot
  2022-06-30  7:56                               ` Herbert Xu
  2022-08-02  6:05                             ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-06-17  8:29 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56:

  Linux 5.19-rc1 (2022-06-05 17:18:54 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p2 

for you to fetch changes up to abfed87e2a12bd246047d78c01d81eb9529f1d06:

  crypto: memneq - move into lib/ (2022-06-12 14:51:51 +0800)

----------------------------------------------------------------
This push fixes a potential build failure when CRYPTO=m.
----------------------------------------------------------------

Jason A. Donenfeld (1):
      crypto: memneq - move into lib/

 crypto/Kconfig           | 1 +
 crypto/Makefile          | 2 +-
 lib/Kconfig              | 3 +++
 lib/Makefile             | 1 +
 lib/crypto/Kconfig       | 1 +
 {crypto => lib}/memneq.c | 0
 6 files changed, 7 insertions(+), 1 deletion(-)
 rename {crypto => lib}/memneq.c (100%)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.19
  2022-06-17  8:29                             ` Herbert Xu
@ 2022-06-17 15:29                               ` pr-tracker-bot
  2022-06-30  7:56                               ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-06-17 15:29 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 17 Jun 2022 16:29:33 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/79fe0f863f920c5fcf9dea61676742f813f0b7a6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 5.19
  2022-06-17  8:29                             ` Herbert Xu
  2022-06-17 15:29                               ` pr-tracker-bot
@ 2022-06-30  7:56                               ` Herbert Xu
  2022-06-30 17:28                                 ` pr-tracker-bot
                                                   ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-06-30  7:56 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit abfed87e2a12bd246047d78c01d81eb9529f1d06:

  crypto: memneq - move into lib/ (2022-06-12 14:51:51 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p3 

for you to fetch changes up to 87d044096ea62f1f230e8c4679ee8abf03266f64:

  crypto: ccp - Fix device IRQ counting by using platform_irq_count() (2022-06-24 17:09:01 +0800)

----------------------------------------------------------------
This push fixes a regression that breaks the ccp driver.
----------------------------------------------------------------

Tom Lendacky (1):
      crypto: ccp - Fix device IRQ counting by using platform_irq_count()

 drivers/crypto/ccp/sp-platform.c | 12 ++----------
 1 file changed, 2 insertions(+), 10 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 5.19
  2022-06-30  7:56                               ` Herbert Xu
@ 2022-06-30 17:28                                 ` pr-tracker-bot
  2022-08-31  8:55                                 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
  2022-10-17  4:38                                 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-06-30 17:28 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 30 Jun 2022 15:56:44 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f5da5ddf81ad0bfb91fa5e7d087e2ad96f26b7b7

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 5.20
  2022-05-27 11:29                           ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
  2022-05-28  1:21                             ` pr-tracker-bot
  2022-06-17  8:29                             ` Herbert Xu
@ 2022-08-02  6:05                             ` Herbert Xu
  2022-08-03  0:57                               ` pr-tracker-bot
  2022-10-04  8:54                               ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-08-02  6:05 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56:

  Linux 5.19-rc1 (2022-06-05 17:18:54 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.20-p1

for you to fetch changes up to af5d35b83f642399c719ea9a8599a13b8a0c4167:

  crypto: tcrypt - Remove the static variable initialisations to NULL (2022-07-29 18:29:18 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Make proc files report fips module name and version.

Algorithms:

- Move generic SHA1 code into lib/crypto.
- Implement Chinese Remainder Theorem for RSA.
- Remove blake2s.
- Add XCTR with x86/arm64 acceleration.
- Add POLYVAL with x86/arm64 acceleration.
- Add HCTR2.
- Add ARIA.

Drivers:

- Add support for new CCP/PSP device ID in ccp.

----------------------------------------------------------------
Alexey Khoroshilov (1):
      crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs()

Andre Przywara (1):
      crypto: qat - replace get_current_node() with numa_node_id()

Andrew Davis (2):
      crypto: sa2ul - Set the supported_algos bits individually
      crypto: sa2ul - Check engine status before enabling

Bagas Sanjaya (2):
      Documentation: qat: Use code block for qat sysfs example
      Documentation: qat: rewrite description

Christophe JAILLET (2):
      crypto: ccree - Remove a useless dma_supported() call
      crypto: hisilicon/zip - Use the bitmap API to allocate bitmaps

Claudiu Beznea (2):
      crypto: atmel-sha - initialize sha_dd while declaring
      crypto: atmel-tdes - initialize tdes_dd while declaring

Colin Ian King (1):
      crypto: x86/blowfish - remove redundant assignment to variable nytes

Dan Carpenter (2):
      crypto: sun8i-ss - fix error codes in allocate_flows()
      crypto: sun8i-ss - Fix error codes for dma_mapping_error()

Eric Biggers (3):
      crypto: lib - move lib/sha1.c into lib/crypto/
      crypto: lib - make the sha1 library optional
      crypto: lib - add module license to libsha1

GUO Zihua (1):
      crypto: arm64/poly1305 - fix a read out-of-bound

Giovanni Cabiddu (4):
      crypto: qat - expose device state through sysfs for 4xxx
      crypto: qat - change behaviour of adf_cfg_add_key_value_param()
      crypto: qat - relocate and rename adf_sriov_prepare_restart()
      crypto: qat - expose device config through sysfs for 4xxx

Herbert Xu (1):
      crypto: vmx - Fix warning on p8_ghash_alg

Ignat Korchagin (3):
      crypto: rsa - implement Chinese Remainder Theorem for faster private key operations
      crypto: testmgr - populate RSA CRT parameters in RSA test vectors
      crypto: testmgr - some more fixes to RSA test vectors

Jakub Kicinski (1):
      crypto: caam/qi2 - switch to netif_napi_add_tx_weight()

Jason A. Donenfeld (3):
      crypto: memneq - move into lib/
      crypto: blake2s - remove shash module
      crypto: lib/blake2s - reduce stack frame usage in self test

Jason Wang (3):
      crypto: twofish - Fix comment typo
      hwrng: via - Fix comment typo
      crypto: tcrypt - Remove the static variable initialisations to NULL

Jiang Jian (6):
      crypto: nx - drop unexpected word "the"
      crypto: ux500/hash - drop unexpected word "the"
      crypto: cavium - fix typos in comments
      crypto: caam - drop unexpected word 'a' in comments
      crypto: caam - drop unexpected word 'for' in comments
      crypto: vmx - drop unexpected word 'for' in comments

Jianglei Nie (1):
      crypto: hisilicon/sec - fix inconsistent argument

Jilin Yuan (1):
      crypto: arm64/aes-neon - Fix typo in comment

John Allen (1):
      crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak

Julia Lawall (2):
      crypto: hisilicon/sec - fix typos in comment
      crypto: ccp - fix typo in comment

Kai Ye (2):
      crypto: hisilicon/sec - only HW V2 needs to change the BD err detection
      crypto: hisilicon/sec - fix auth key size error

Liang He (2):
      crypto: amcc - Hold the reference returned by of_find_compatible_node
      crypto: nx - Hold the reference returned by of_find_compatible_node

Mario Limonciello (1):
      crypto: ccp - Add support for new CCP/PSP device ID

Nathan Huckleberry (9):
      crypto: xctr - Add XCTR support
      crypto: polyval - Add POLYVAL support
      crypto: hctr2 - Add HCTR2 support
      crypto: x86/aesni-xctr - Add accelerated implementation of XCTR
      crypto: arm64/aes-xctr - Add accelerated implementation of XCTR
      crypto: arm64/aes-xctr - Improve readability of XCTR and CTR modes
      crypto: x86/polyval - Add PCLMULQDQ accelerated implementation of POLYVAL
      crypto: arm64/polyval - Add PMULL accelerated implementation of POLYVAL
      fscrypt: Add HCTR2 support for filename encryption

Ofer Heifetz (1):
      crypto: inside-secure - fix packed bit-field result descriptor

Pali Rohár (1):
      crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of

Peng Wu (1):
      crypto: sun8i-ss - fix a NULL vs IS_ERR() check in sun8i_ss_hashkey

Qian Cai (1):
      crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE

Randy Dunlap (1):
      crypto: rmd160 - fix Kconfig "its" grammar

Shijith Thotton (2):
      crypto: octeontx2 - add firmware version in devlink info
      crypto: octeontx2 - fix potential null pointer access

Taehee Yoo (2):
      crypto: aria - Implement ARIA symmetric cipher algorithm
      crypto: testmgr - add ARIA testmgr tests

Tom Lendacky (1):
      crypto: ccp - During shutdown, check SEV data pointer before using

Uwe Kleine-König (9):
      crypto: atmel-ecc - Remove duplicated error reporting in .remove()
      crypto: atmel-aes - Drop if with an always false condition
      crypto: atmel-sha - Drop if with an always false condition
      crypto: atmel-tdes - Drop if with an always false condition
      crypto: omap-aes - Drop if with an always false condition
      crypto: omap-des - Drop if with an always false condition
      crypto: omap-sham - Drop if with an always false condition
      crypto: s5p-sss - Drop if with an always false condition
      crypto: keembay-ocs-ecc - Drop if with an always false condition

Vladis Dronov (1):
      crypto: fips - make proc files report fips module name and version

Weili Qian (4):
      crypto: hisilicon/trng - fix local variable type
      crypto: hisilicon/qm - add functions for releasing resources
      crypto: hisilicon/qm - move alloc qm->wq to qm.c
      crypto: hisilicon/qm - modify event irq processing

Yoan Picchi (1):
      crypto: qat - Removes the x86 dependency on the QAT drivers

Yuan Can (1):
      crypto: ccree - Add missing clk_disable_unprepare() in cc_pm_resume()

Zhengchao Shao (3):
      crypto: hisilicon/sec - don't sleep when in softirq
      crypto: hisilicon - Kunpeng916 crypto driver don't sleep when in softirq
      crypto: hisilicon/hpre - don't use GFP_KERNEL to alloc mem during softirq

Zhou Wang (1):
      MAINTAINERS: update HiSilicon ZIP and QM maintainers

lei he (1):
      crypto: testmgr - fix version number of RSA tests

shaom Deng (1):
      cyrpto: powerpc/aes - delete the rebundant word "block" in comments

 Documentation/ABI/testing/sysfs-driver-qat         |   49 +
 Documentation/filesystems/fscrypt.rst              |   22 +-
 MAINTAINERS                                        |   15 +-
 arch/arm/crypto/Kconfig                            |    2 +-
 arch/arm/crypto/Makefile                           |    4 +-
 arch/arm/crypto/blake2s-shash.c                    |   75 -
 arch/arm64/crypto/Kconfig                          |   10 +-
 arch/arm64/crypto/Makefile                         |    3 +
 arch/arm64/crypto/aes-glue.c                       |   80 +-
 arch/arm64/crypto/aes-modes.S                      |  349 +-
 arch/arm64/crypto/aes-neon.S                       |    2 +-
 arch/arm64/crypto/poly1305-glue.c                  |    2 +-
 arch/arm64/crypto/polyval-ce-core.S                |  361 ++
 arch/arm64/crypto/polyval-ce-glue.c                |  191 +
 arch/powerpc/crypto/aes-spe-glue.c                 |    2 +-
 arch/x86/crypto/Makefile                           |    7 +-
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S            |  232 +-
 arch/x86/crypto/aesni-intel_glue.c                 |  114 +-
 arch/x86/crypto/blake2s-glue.c                     |    3 +-
 arch/x86/crypto/blake2s-shash.c                    |   77 -
 arch/x86/crypto/blowfish_glue.c                    |    4 +-
 arch/x86/crypto/polyval-clmulni_asm.S              |  321 ++
 arch/x86/crypto/polyval-clmulni_glue.c             |  203 +
 crypto/Kconfig                                     |   99 +-
 crypto/Makefile                                    |    7 +-
 crypto/aria.c                                      |  288 ++
 crypto/blake2s_generic.c                           |   75 -
 crypto/fips.c                                      |   35 +-
 crypto/hctr2.c                                     |  581 +++
 crypto/polyval-generic.c                           |  245 +
 crypto/rsa.c                                       |   78 +-
 crypto/tcrypt.c                                    |   62 +-
 crypto/testmgr.c                                   |   75 +-
 crypto/testmgr.h                                   | 4830 ++++++++++++++++++--
 crypto/twofish_common.c                            |    2 +-
 crypto/xctr.c                                      |  191 +
 drivers/char/hw_random/via-rng.c                   |    2 +-
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |    1 +
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |   16 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |   10 +-
 drivers/crypto/amcc/crypto4xx_core.c               |   40 +-
 drivers/crypto/atmel-aes.c                         |    3 +-
 drivers/crypto/atmel-ecc.c                         |   12 +-
 drivers/crypto/atmel-sha.c                         |    5 +-
 drivers/crypto/atmel-tdes.c                        |    5 +-
 drivers/crypto/caam/caamalg_qi2.c                  |    7 +-
 drivers/crypto/caam/caamhash_desc.c                |    2 +-
 drivers/crypto/caam/qi.c                           |    6 +-
 drivers/crypto/cavium/cpt/cpt_hw_types.h           |    2 +-
 drivers/crypto/ccp/ccp-dev.h                       |    2 +-
 drivers/crypto/ccp/sev-dev.c                       |   12 +-
 drivers/crypto/ccp/sp-pci.c                        |    7 +
 drivers/crypto/ccree/cc_driver.c                   |   13 +-
 drivers/crypto/ccree/cc_pm.c                       |    2 +
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |    2 +-
 drivers/crypto/hisilicon/qm.c                      |  203 +-
 drivers/crypto/hisilicon/sec/sec_algs.c            |   14 +-
 drivers/crypto/hisilicon/sec/sec_drv.c             |    2 +-
 drivers/crypto/hisilicon/sec/sec_drv.h             |    2 +-
 drivers/crypto/hisilicon/sec2/sec.h                |    6 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   26 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |    1 +
 drivers/crypto/hisilicon/sec2/sec_main.c           |   39 +-
 drivers/crypto/hisilicon/trng/trng.c               |    2 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   10 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |   17 +-
 drivers/crypto/inside-secure/safexcel.c            |    2 +
 drivers/crypto/inside-secure/safexcel.h            |   18 +-
 drivers/crypto/keembay/keembay-ocs-ecc.c           |    2 -
 .../crypto/marvell/octeontx2/otx2_cpt_devlink.c    |   40 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    |   17 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.h    |    3 +
 drivers/crypto/nx/nx-common-powernv.c              |    2 +-
 drivers/crypto/nx/nx-common-pseries.c              |    5 +-
 drivers/crypto/omap-aes.c                          |    4 -
 drivers/crypto/omap-des.c                          |    4 -
 drivers/crypto/omap-sham.c                         |    3 +-
 drivers/crypto/qat/Kconfig                         |   14 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |    1 +
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h     |    1 +
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |    6 +-
 drivers/crypto/qat/qat_common/Makefile             |    1 +
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |    1 +
 drivers/crypto/qat/qat_common/adf_cfg.c            |   41 +-
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    8 +-
 drivers/crypto/qat/qat_common/adf_init.c           |   26 +
 drivers/crypto/qat/qat_common/adf_sriov.c          |   28 +-
 drivers/crypto/qat/qat_common/adf_sysfs.c          |  191 +
 drivers/crypto/qat/qat_common/qat_algs.c           |    4 +-
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |    4 +-
 drivers/crypto/s5p-sss.c                           |    3 -
 drivers/crypto/sa2ul.c                             |   25 +-
 drivers/crypto/sa2ul.h                             |    1 +
 drivers/crypto/ux500/hash/hash_core.c              |    2 +-
 drivers/crypto/vmx/ghash.c                         |    1 +
 drivers/crypto/vmx/ghashp8-ppc.pl                  |    2 +-
 fs/crypto/fscrypt_private.h                        |    2 +-
 fs/crypto/keysetup.c                               |    7 +
 fs/crypto/policy.c                                 |   14 +-
 include/crypto/aria.h                              |  461 ++
 include/crypto/internal/blake2s.h                  |  108 -
 include/crypto/polyval.h                           |   22 +
 include/linux/hisi_acc_qm.h                        |    8 +-
 include/uapi/linux/fscrypt.h                       |    3 +-
 init/Kconfig                                       |    1 +
 lib/Kconfig                                        |    3 +
 lib/Makefile                                       |    3 +-
 lib/crypto/Kconfig                                 |    4 +
 lib/crypto/Makefile                                |    3 +
 lib/crypto/blake2s-selftest.c                      |   41 +
 lib/crypto/blake2s.c                               |   37 +-
 lib/{ => crypto}/sha1.c                            |    3 +
 {crypto => lib}/memneq.c                           |    0
 lib/mpi/mpi-add.c                                  |    2 +-
 lib/mpi/mpi-mul.c                                  |    1 +
 net/ipv6/Kconfig                                   |    1 +
 116 files changed, 9147 insertions(+), 1204 deletions(-)
 create mode 100644 Documentation/ABI/testing/sysfs-driver-qat
 delete mode 100644 arch/arm/crypto/blake2s-shash.c
 create mode 100644 arch/arm64/crypto/polyval-ce-core.S
 create mode 100644 arch/arm64/crypto/polyval-ce-glue.c
 delete mode 100644 arch/x86/crypto/blake2s-shash.c
 create mode 100644 arch/x86/crypto/polyval-clmulni_asm.S
 create mode 100644 arch/x86/crypto/polyval-clmulni_glue.c
 create mode 100644 crypto/aria.c
 delete mode 100644 crypto/blake2s_generic.c
 create mode 100644 crypto/hctr2.c
 create mode 100644 crypto/polyval-generic.c
 create mode 100644 crypto/xctr.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_sysfs.c
 create mode 100644 include/crypto/aria.h
 create mode 100644 include/crypto/polyval.h
 rename lib/{ => crypto}/sha1.c (98%)
 rename {crypto => lib}/memneq.c (100%)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 5.20
  2022-08-02  6:05                             ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
@ 2022-08-03  0:57                               ` pr-tracker-bot
  2022-10-04  8:54                               ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-08-03  0:57 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 2 Aug 2022 14:05:04 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.20-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c2a24a7a036b3bd3a2e6c66730dfc777cae6540a

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.0
  2022-06-30  7:56                               ` Herbert Xu
  2022-06-30 17:28                                 ` pr-tracker-bot
@ 2022-08-31  8:55                                 ` Herbert Xu
  2022-08-31 17:20                                   ` pr-tracker-bot
  2022-10-17  4:38                                 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2022-08-31  8:55 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 568035b01cfb107af8d2e4bd2fb9aea22cf5b868:

  Linux 6.0-rc1 (2022-08-14 15:50:18 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.0-p2

for you to fetch changes up to 874b301985ef2f89b8b592ad255e03fb6fbfe605:

  crypto: lib - remove unneeded selection of XOR_BLOCKS (2022-08-26 18:40:14 +0800)

----------------------------------------------------------------
This push fixes a boot performance regression due to an unnecessary
dependency on XOR_BLOCKS.

----------------------------------------------------------------
Eric Biggers (1):
      crypto: lib - remove unneeded selection of XOR_BLOCKS

 lib/crypto/Kconfig | 1 -
 1 file changed, 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.0
  2022-08-31  8:55                                 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
@ 2022-08-31 17:20                                   ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-08-31 17:20 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 31 Aug 2022 16:55:31 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.0-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2361d3841fddffdd4b495a4510c507f0b8f17061

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.1
  2022-08-02  6:05                             ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
  2022-08-03  0:57                               ` pr-tracker-bot
@ 2022-10-04  8:54                               ` Herbert Xu
  2022-10-10 20:56                                 ` pr-tracker-bot
  2022-12-14  8:15                                 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-10-04  8:54 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 874b301985ef2f89b8b592ad255e03fb6fbfe605:

  crypto: lib - remove unneeded selection of XOR_BLOCKS (2022-08-26 18:40:14 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p1

for you to fetch changes up to b411b1a0c8bddd470fc8c3457629ac25a168cba0:

  crypto: aspeed - Remove redundant dev_err call (2022-09-30 13:59:13 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Feed untrusted RNGs into /dev/random.
- Allow HWRNG sleeping to be more interruptible.
- Create lib/utils module.
- Setting private keys no longer required for akcipher.
- Remove tcrypt mode=1000.
- Reorganised Kconfig entries.

Algorithms:

- Load x86/sha512 based on CPU features.
- Add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher.

Drivers:

- Add HACE crypto driver aspeed.

----------------------------------------------------------------
Adam Guerin (1):
      crypto: qat - add limit to linked list parsing

Damian Muszynski (2):
      crypto: qat - fix DMA transfer direction
      crypto: qat - use reference to structure in dma_map_single()

Dan Carpenter (2):
      crypto: marvell/octeontx - prevent integer overflows
      crypto: cavium - prevent integer overflow loading firmware

Dominik Brodowski (1):
      hwrng: core - start hwrng kthread also for untrusted sources

Dong Chuanjian (1):
      crypto: drbg - remove unnecessary (void*) conversions

Eric Biggers (3):
      crypto: lib - create utils module and move __crypto_memneq into it
      crypto: lib - move __crypto_xor into utils
      crypto: lib - remove __HAVE_ARCH_CRYPTO_MEMNEQ

Gaosheng Cui (3):
      crypto: bcm - Simplify obtain the name for cipher
      crypto: aead - Remove unused inline functions from aead
      crypto: scatterwalk - Remove unused inline function scatterwalk_aligned()

Giovanni Cabiddu (1):
      Revert "crypto: qat - reduce size of mapped region"

Herbert Xu (7):
      crypto: qcom-rng - Fix qcom_rng_of_match unused warning
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
      Revert "crypto: gemini - Fix error check for dma_map_sg"
      Revert "crypto: allwinner - Fix dma_map_sg error check"
      crypto: aspeed - Enable compile testing
      crypto: aspeed - Fix sparse warnings
      crypto: artpec6 - Fix printk warning on size_t/%d

Ignat Korchagin (1):
      crypto: akcipher - default implementation for setting a private key

Jack Wang (6):
      crypto: gemini - Fix error check for dma_map_sg
      crypto: sahara - Fix error check for dma_map_sg
      crypto: qce - Fix dma_map_sg error check
      crypto: amlogic - Fix dma_map_sg error check
      crypto: allwinner - Fix dma_map_sg error check
      crypto: ccree - Fix dma_map_sg error check

Jacky Li (2):
      crypto: ccp - Initialize PSP when reading psp data file failed
      crypto: ccp - Fail the PSP initialization when writing psp data file failed

James Cowgill (1):
      hwrng: arm-smccc-trng - fix NO_ENTROPY handling

Jarkko Sakkinen (1):
      crypto: ccp - Add a quirk to firmware update

Jason A. Donenfeld (1):
      hwrng: core - let sleep be interrupted when unregistering hwrng

Jason Wang (2):
      crypto: cavium - Fix comment typo
      crypto: api - Fix comment typo

Jean Delvare (1):
      crypto: keembay-ocs - Drop obsolete dependency on COMPILE_TEST

Junchong Pan (1):
      crypto: hisilicon/qm - remove unneeded data storage

Kai Ye (3):
      crypto: hisilicon/qm - no judgment in the back process
      crypto: hisilicon/sec - delete redundant blank lines
      crypto: hisilicon/qm - fix the qos value initialization

Koba Ko (1):
      crypto: ccp - Release dma channels before dmaengine unrgister

Kshitiz Varshney (1):
      hwrng: imx-rngc - Moving IRQ handler registering after imx_rngc_irq_mask_clear()

Liu Shixin (1):
      crypto: sun4i-ss - use DEFINE_SHOW_ATTRIBUTE to simplify sun4i_ss_debugfs

Lucas Segarra Fernandez (3):
      crypto: testmgr - extend acomp tests for NULL destination buffer
      crypto: testmgr - fix indentation for test_acomp() args
      crypto: qat - fix default value of WDT timer

Lukas Bulwahn (2):
      crypto: arm64 - revert unintended config name change for CRYPTO_SHA1_ARM64_CE
      crypto: blake2s - revert unintended config addition of CRYPTO_BLAKE2S

Martin Kaiser (3):
      hwrng: imx-rngc - use KBUILD_MODNAME as driver name
      hwrng: imx-rngc - use devm_clk_get_enabled
      hwrng: imx-rngc - use devres for hwrng registration

Neal Liu (8):
      crypto: aspeed - Add HACE hash driver
      dt-bindings: clock: Add AST2500/AST2600 HACE reset definition
      ARM: dts: aspeed: Add HACE device controller node
      dt-bindings: crypto: add documentation for aspeed hace
      crypto: aspeed - add HACE crypto driver
      crypto: aspeed - fix build module error
      crypto: aspeed: fix format unexpected build warning
      crypto: aspeed - fix build error when only CRYPTO_DEV_ASPEED is enabled

Peter Harliman Liem (3):
      crypto: inside-secure - Change swab to swab32
      crypto: inside_secure - Avoid dma map if size is zero
      crypto: inside-secure - Replace generic aes with libaes

Robert Elliott (20):
      crypto: x86/sha512 - load based on CPU features
      crypto: testmgr - don't generate WARN for missing modules
      crypto: tcrypt - remove mode=1000
      crypto: Kconfig - move mips entries to a submenu
      crypto: Kconfig - move powerpc entries to a submenu
      crypto: Kconfig - move s390 entries to a submenu
      crypto: Kconfig - move sparc entries to a submenu
      crypto: Kconfig - move x86 entries to a submenu
      crypto: Kconfig - remove AES_ARM64 ref by SA2UL
      crypto: Kconfig - submenus for arm and arm64
      crypto: Kconfig - sort the arm64 entries
      crypto: Kconfig - sort the arm entries
      crypto: Kconfig - add submenus
      crypto: Kconfig - simplify public-key entries
      crypto: Kconfig - simplify CRC entries
      crypto: Kconfig - simplify aead entries
      crypto: Kconfig - simplify hash entries
      crypto: Kconfig - simplify userspace entries
      crypto: Kconfig - simplify cipher entries
      crypto: Kconfig - simplify compression/RNG entries

Shang XiaoJing (1):
      crypto: aspeed - Remove redundant dev_err call

Srinivas Kerekare (1):
      crypto: qat - add check to validate firmware images

Sun Ke (1):
      crypto: aspeed - fix return value check in aspeed_hace_probe()

Taehee Yoo (3):
      crypto: aria - prepare generic module for optimized implementations
      crypto: aria-avx - add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher
      crypto: tcrypt - add async speed test for aria cipher

Tuo Cao (1):
      crypto: artpec6 - move spin_lock_bh to spin_lock in tasklet

Weili Qian (12):
      crypto: hisilicon/hpre - change return type of hpre_cluster_inqry_write()
      crypto: hisilicon/qm - fix missing destroy qp_idr
      crypto: hisilicon/qm - remove unneeded hardware cache write back
      crypto: hisilicon/qm - check mailbox operation result
      crypto: hisilicon/qm - fix missing put dfx access
      crypto: hisilicon/qm - return failure if vfs_num exceeds total VFs
      crypto: hisilicon/qm - get hardware features from hardware registers
      crypto: hisilicon/qm - get qp num and depth from hardware registers
      crypto: hisilicon/qm - add UACCE_CMD_QM_SET_QP_INFO support
      crypto: hisilicon/qm - get error type from hardware registers
      crypto: hisilicon/qm - support get device irq information from hardware registers
      crypto: hisilicon/zip - support zip capability

Wenkai Lin (1):
      crypto: hisilicon/sec - get algorithm bitmap from registers

Wolfram Sang (2):
      crypto: core - move from strlcpy with unused retval to strscpy
      crypto: drivers - move from strlcpy with unused retval to strscpy

Xiu Jianfeng (1):
      crypto: add __init/__exit annotations to init/exit funcs

Yang Shen (2):
      crypto: hisilicon/zip - optimization for performance
      crypto: hisilicon/zip - some misc cleanup

Ye Weihua (1):
      crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr

YueHaibing (1):
      crypto: aspeed - Fix check for platform_get_irq() errors

Zhengchao Shao (1):
      crypto: sahara - don't sleep when in softirq

Zhiqi Song (3):
      crypto: hisilicon/hpre - support hpre capability
      crypto: hisilicon/hpre - optimize registration of ecdh
      crypto: hisilicon - support get algs by the capability register

Zhuo Chen (1):
      crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call

lei he (1):
      crypto: virtio - fix memory-leak

wangjianli (3):
      crypto: n2 - fix repeated words in comments
      crypto: marvell/octeontx - fix repeated words in comments
      crypto: bcm - fix repeated words in comments

ye xingchen (7):
      crypto: sun8i-ce - using the pm_runtime_resume_and_get to simplify the code
      crypto: octeontx - Remove the unneeded result variable
      crypto: nx - Remove the unneeded result variable
      crypto: ccp - Remove the unneeded result variable
      crypto: octeontx2 - Remove the unneeded result variable
      crypto: zip - remove the unneeded result variable
      crypto: marvell/octeontx - use sysfs_emit() to instead of scnprintf()

 .../bindings/crypto/aspeed,ast2500-hace.yaml       |   53 +
 .../virt/kvm/x86/amd-memory-encryption.rst         |    5 +-
 MAINTAINERS                                        |    7 +
 arch/arm/Kconfig                                   |    4 -
 arch/arm/boot/dts/aspeed-g5.dtsi                   |    8 +
 arch/arm/boot/dts/aspeed-g6.dtsi                   |    8 +
 arch/arm/configs/exynos_defconfig                  |    1 -
 arch/arm/configs/milbeaut_m10v_defconfig           |    1 -
 arch/arm/configs/multi_v7_defconfig                |    1 -
 arch/arm/configs/omap2plus_defconfig               |    1 -
 arch/arm/configs/pxa_defconfig                     |    1 -
 arch/arm/crypto/Kconfig                            |  238 ++-
 arch/arm64/Kconfig                                 |    3 -
 arch/arm64/configs/defconfig                       |    1 -
 arch/arm64/crypto/Kconfig                          |  279 ++-
 arch/mips/crypto/Kconfig                           |   74 +
 arch/powerpc/crypto/Kconfig                        |   97 +
 arch/s390/crypto/Kconfig                           |  135 ++
 arch/sparc/crypto/Kconfig                          |   90 +
 arch/x86/crypto/Kconfig                            |  484 +++++
 arch/x86/crypto/Makefile                           |    3 +
 arch/x86/crypto/aria-aesni-avx-asm_64.S            | 1303 ++++++++++++
 arch/x86/crypto/aria-avx.h                         |   16 +
 arch/x86/crypto/aria_aesni_avx_glue.c              |  213 ++
 arch/x86/crypto/sha512_ssse3_glue.c                |   10 +
 crypto/Kconfig                                     | 2225 +++++++-------------
 crypto/Makefile                                    |    2 +-
 crypto/akcipher.c                                  |    8 +
 crypto/algapi.c                                    |   71 -
 crypto/api.c                                       |    4 +-
 crypto/{aria.c => aria_generic.c}                  |   39 +-
 crypto/async_tx/raid6test.c                        |    4 +-
 crypto/curve25519-generic.c                        |    4 +-
 crypto/dh.c                                        |    4 +-
 crypto/drbg.c                                      |   12 +-
 crypto/ecdh.c                                      |    4 +-
 crypto/ecdsa.c                                     |    4 +-
 crypto/essiv.c                                     |    2 +-
 crypto/rsa.c                                       |    4 +-
 crypto/sm2.c                                       |    4 +-
 crypto/tcrypt.c                                    |   53 +-
 crypto/testmgr.c                                   |   38 +-
 drivers/char/hw_random/arm_smccc_trng.c            |    4 +-
 drivers/char/hw_random/core.c                      |   55 +-
 drivers/char/hw_random/imx-rngc.c                  |   51 +-
 drivers/crypto/Kconfig                             |    3 +-
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |   16 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c  |    6 +-
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |    6 +-
 drivers/crypto/aspeed/Kconfig                      |   48 +
 drivers/crypto/aspeed/Makefile                     |    7 +
 drivers/crypto/aspeed/aspeed-hace-crypto.c         | 1133 ++++++++++
 drivers/crypto/aspeed/aspeed-hace-hash.c           | 1391 ++++++++++++
 drivers/crypto/aspeed/aspeed-hace.c                |  284 +++
 drivers/crypto/aspeed/aspeed-hace.h                |  298 +++
 drivers/crypto/axis/artpec6_crypto.c               |    6 +-
 drivers/crypto/bcm/cipher.c                        |    4 +-
 drivers/crypto/bcm/cipher.h                        |    2 +-
 drivers/crypto/cavium/cpt/cpt_hw_types.h           |    2 +-
 drivers/crypto/cavium/cpt/cptpf_main.c             |    6 +-
 drivers/crypto/cavium/zip/zip_crypto.c             |   30 +-
 drivers/crypto/ccp/ccp-crypto-des3.c               |    5 +-
 drivers/crypto/ccp/ccp-dmaengine.c                 |    6 +-
 drivers/crypto/ccp/sev-dev.c                       |   78 +-
 drivers/crypto/ccree/cc_buffer_mgr.c               |    2 +-
 drivers/crypto/hisilicon/hpre/hpre.h               |    8 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |  250 ++-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |  216 +-
 drivers/crypto/hisilicon/qm.c                      |  906 ++++----
 drivers/crypto/hisilicon/sec2/sec.h                |   34 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |  456 ++--
 drivers/crypto/hisilicon/sec2/sec_main.c           |  160 +-
 drivers/crypto/hisilicon/zip/zip.h                 |    3 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |  134 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |  266 ++-
 drivers/crypto/inside-secure/safexcel_cipher.c     |   60 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |   67 +-
 drivers/crypto/keembay/Kconfig                     |    4 +-
 drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h |    2 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c  |   24 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_main.c   |    8 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_mbox.c   |   20 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    |    4 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c |    5 +-
 drivers/crypto/n2_core.c                           |    2 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |    5 +-
 drivers/crypto/qat/qat_common/adf_cfg.c            |    6 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |   10 +-
 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h   |    2 +-
 .../crypto/qat/qat_common/adf_transport_debug.c    |    2 +-
 drivers/crypto/qat/qat_common/icp_qat_uclo.h       |    3 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |   18 +-
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |   24 +-
 drivers/crypto/qat/qat_common/qat_uclo.c           |   56 +-
 drivers/crypto/qce/aead.c                          |    4 +-
 drivers/crypto/qce/sha.c                           |    8 +-
 drivers/crypto/qce/skcipher.c                      |    8 +-
 drivers/crypto/qcom-rng.c                          |    7 +-
 drivers/crypto/sahara.c                            |   22 +-
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |    4 +
 drivers/net/Kconfig                                |    2 -
 drivers/net/wireless/ath/ath9k/rng.c               |    3 +-
 include/crypto/aria.h                              |   17 +-
 include/crypto/internal/aead.h                     |   25 -
 include/crypto/scatterwalk.h                       |    6 -
 include/dt-bindings/clock/aspeed-clock.h           |    1 +
 include/dt-bindings/clock/ast2600-clock.h          |    1 +
 include/linux/hisi_acc_qm.h                        |   63 +-
 include/linux/hw_random.h                          |    3 +
 include/uapi/misc/uacce/hisi_qm.h                  |   17 +-
 lib/Kconfig                                        |    3 -
 lib/Makefile                                       |    1 -
 lib/crypto/Kconfig                                 |    7 +-
 lib/crypto/Makefile                                |    3 +
 lib/{ => crypto}/memneq.c                          |    7 +-
 lib/crypto/utils.c                                 |   88 +
 117 files changed, 9052 insertions(+), 2965 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/aspeed,ast2500-hace.yaml
 create mode 100644 arch/mips/crypto/Kconfig
 create mode 100644 arch/powerpc/crypto/Kconfig
 create mode 100644 arch/s390/crypto/Kconfig
 create mode 100644 arch/sparc/crypto/Kconfig
 create mode 100644 arch/x86/crypto/Kconfig
 create mode 100644 arch/x86/crypto/aria-aesni-avx-asm_64.S
 create mode 100644 arch/x86/crypto/aria-avx.h
 create mode 100644 arch/x86/crypto/aria_aesni_avx_glue.c
 rename crypto/{aria.c => aria_generic.c} (86%)
 create mode 100644 drivers/crypto/aspeed/Kconfig
 create mode 100644 drivers/crypto/aspeed/Makefile
 create mode 100644 drivers/crypto/aspeed/aspeed-hace-crypto.c
 create mode 100644 drivers/crypto/aspeed/aspeed-hace-hash.c
 create mode 100644 drivers/crypto/aspeed/aspeed-hace.c
 create mode 100644 drivers/crypto/aspeed/aspeed-hace.h
 rename lib/{ => crypto}/memneq.c (98%)
 create mode 100644 lib/crypto/utils.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.1
  2022-10-04  8:54                               ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
@ 2022-10-10 20:56                                 ` pr-tracker-bot
  2022-12-14  8:15                                 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-10-10 20:56 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 4 Oct 2022 16:54:25 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3604a7f568d3f67be8c13736201411ee83b210a1

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.1
  2022-06-30  7:56                               ` Herbert Xu
  2022-06-30 17:28                                 ` pr-tracker-bot
  2022-08-31  8:55                                 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
@ 2022-10-17  4:38                                 ` Herbert Xu
  2022-10-17 17:51                                   ` pr-tracker-bot
  2022-10-28  4:58                                   ` Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-10-17  4:38 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit b411b1a0c8bddd470fc8c3457629ac25a168cba0:

  crypto: aspeed - Remove redundant dev_err call (2022-09-30 13:59:13 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p2

for you to fetch changes up to 96cb9d0554457086664d3bd10630b11193d863f1:

  hwrng: bcm2835 - use hwrng_msleep() instead of cpu_relax() (2022-10-14 19:03:09 +0800)

----------------------------------------------------------------
This push fixes an issue exposed by the recent change to feed
untrusted sources into /dev/random.
----------------------------------------------------------------

Jason A. Donenfeld (1):
      hwrng: bcm2835 - use hwrng_msleep() instead of cpu_relax()

 drivers/char/hw_random/bcm2835-rng.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.1
  2022-10-17  4:38                                 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
@ 2022-10-17 17:51                                   ` pr-tracker-bot
  2022-10-28  4:58                                   ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-10-17 17:51 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 17 Oct 2022 12:38:48 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bbb8ceb5e2421184db9560e9d2cfaf858e1db616

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.1
  2022-10-17  4:38                                 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
  2022-10-17 17:51                                   ` pr-tracker-bot
@ 2022-10-28  4:58                                   ` Herbert Xu
  2022-10-28 17:00                                     ` Linus Torvalds
                                                       ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-10-28  4:58 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 9abf2313adc1ca1b6180c508c25f22f9395cc780:

  Linux 6.1-rc1 (2022-10-16 15:36:24 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p3

for you to fetch changes up to 9f6035af06b526e678808d492fc0830aef6cfbd8:

  crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned (2022-10-21 19:05:05 +0800)

----------------------------------------------------------------
This push fixes an alignment crash in x86/polyval.
----------------------------------------------------------------

Nathan Huckleberry (1):
      crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned

 arch/x86/crypto/polyval-clmulni_glue.c | 19 ++++++++++++++-----
 1 file changed, 14 insertions(+), 5 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.1
  2022-10-28  4:58                                   ` Herbert Xu
@ 2022-10-28 17:00                                     ` Linus Torvalds
  2022-11-02  9:49                                       ` Herbert Xu
  2022-10-28 17:02                                     ` pr-tracker-bot
  2023-01-06  9:15                                     ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2022-10-28 17:00 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Thu, Oct 27, 2022 at 9:58 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes an alignment crash in x86/polyval.

I'm surprised that there isn't a cra_ctxalignment field. Instead there
is crypto_tfm_ctx_alignment(), but that is just an odd way to write
CRYPTO_MINALIGN.

            Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.1
  2022-10-28  4:58                                   ` Herbert Xu
  2022-10-28 17:00                                     ` Linus Torvalds
@ 2022-10-28 17:02                                     ` pr-tracker-bot
  2023-01-06  9:15                                     ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-10-28 17:02 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 28 Oct 2022 12:58:15 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/05c31d25cc9678cc173cf12e259d638e8a641f66

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.1
  2022-10-28 17:00                                     ` Linus Torvalds
@ 2022-11-02  9:49                                       ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2022-11-02  9:49 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, Oct 28, 2022 at 10:00:34AM -0700, Linus Torvalds wrote:
> 
> I'm surprised that there isn't a cra_ctxalignment field. Instead there
> is crypto_tfm_ctx_alignment(), but that is just an odd way to write
> CRYPTO_MINALIGN.

It's a micro-optimisation to elide the align operaton because
most algorithms don't need it.

I've been meaning to add a helper for it though:

https://lore.kernel.org/all/E1noNhu-00BzV4-4N@fornost.hmeau.com/

But I got side tracked by the vacillating DMA discussion.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.2
  2022-10-04  8:54                               ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
  2022-10-10 20:56                                 ` pr-tracker-bot
@ 2022-12-14  8:15                                 ` Herbert Xu
  2022-12-14 22:25                                   ` pr-tracker-bot
  2023-02-20  5:22                                   ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-12-14  8:15 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 9f6035af06b526e678808d492fc0830aef6cfbd8:

  crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned (2022-10-21 19:05:05 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p1 

for you to fetch changes up to 453de3eb08c4b7e31b3019a4b0cc3ebce51a6219:

  crypto: ux500/cryp - delete driver (2022-12-09 18:45:01 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Optimise away self-test overhead when they are disabled.
- Support symmetric encryption via keyring keys in af_alg.
- Flip hwrng default_quality, the default is now maximum entropy.

Algorithms:

- Add library version of aesgcm.
- CFI fixes for assembly code.
- Add arm/arm64 accelerated versions of sm3/sm4.

Drivers:

- Remove assumption on arm64 that kmalloc is DMA-aligned.
- Fix selftest failures in rockchip.
- Add support for RK3328/RK3399 in rockchip.
- Add deflate support in qat.
- Merge ux500 into stm32.
- Add support for TEE for PCI ID 0x14CA in ccp.
- Add mt7986 support in mtk.
- Add MaxLinear platform support in inside-secure.
- Add NPCM8XX support in npcm.

----------------------------------------------------------------
Angel Iglesias (1):
      i2c: core: Introduce i2c_client_get_device_id helper function

Anirudh Venkataramanan (4):
      crypto: tcrypt - Use pr_cont to print test results
      crypto: tcrypt - Use pr_info/pr_err
      crypto: tcrypt - Drop module name from print string
      crypto: tcrypt - Drop leading newlines from prints

Ard Biesheuvel (7):
      crypto: move gf128mul library into lib/crypto
      crypto: lib/gf128mul - make gf128mul_lle time invariant
      crypto: lib/aesgcm - Provide minimal library implementation
      crypto: arm64/aes-neonbs - use frame_push/pop consistently
      crypto: arm64/aes-modes - use frame_push/pop macros consistently
      crypto: arm64/crct10dif - use frame_push/pop macros consistently
      crypto: arm64/ghash-ce - use frame_push/pop macros consistently

Christophe JAILLET (1):
      crypto: amlogic - Remove kcalloc without check

Colin Ian King (1):
      crypto: stm32 - Fix spelling mistake "wite" -> "write"

Corentin Labbe (32):
      crypto: sun8i-ss - use dma_addr instead u32
      crypto: n2 - add missing hash statesize
      crypto: rockchip - use dev_err for error message about interrupt
      crypto: rockchip - do not use uninitialized variable
      crypto: rockchip - do not do custom power management
      crypto: rockchip - fix privete/private typo
      crypto: rockchip - do not store mode globally
      crypto: rockchip - add fallback for cipher
      crypto: rockchip - add fallback for ahash
      crypto: rockchip - better handle cipher key
      crypto: rockchip - remove non-aligned handling
      crypto: rockchip - rework by using crypto_engine
      crypto: rockchip - rewrite type
      crypto: rockchip - add debugfs
      crypto: rockchip - introduce PM
      crypto: rockchip - handle reset also in PM
      crypto: rockchip - use clk_bulk to simplify clock management
      crypto: rockchip - add myself as maintainer
      crypto: rockchip - use read_poll_timeout
      crypto: rockchip - fix style issue
      crypto: rockchip - add support for rk3328
      crypto: rockchip - rename ablk functions to cipher
      crypto: rockchip - rework rk_handle_req function
      crypto: rockchip - use a rk_crypto_info variable instead of lot of indirection
      crypto: rockchip - use the rk_crypto_info given as parameter
      dt-bindings: crypto: convert rockchip-crypto to YAML
      dt-bindings: crypto: rockchip: add new compatible
      crypto: rockchip - store crypto_info in request context
      crypto: rockchip - Check for clocks numbers and their frequencies
      crypto: rockchip - rk_ahash_reg_init use crypto_info from parameter
      crypto: rockchip - permit to have more than one reset
      crypto: rockchip - Add support for RK3399

Daniel Jordan (2):
      padata: Always leave BHs disabled when running ->parallel()
      padata: Fix list iterator in padata_do_serial()

Eric Biggers (18):
      crypto: api - optimize algorithm registration when self-tests disabled
      crypto: algboss - optimize registration of internal algorithms
      crypto: api - compile out crypto_boot_test_finished when tests disabled
      crypto: kdf - skip self-test when tests disabled
      crypto: kdf - silence noisy self-test
      crypto: algboss - compile out test-related code when tests disabled
      crypto: x86/aegis128 - fix possible crash with CFI enabled
      crypto: x86/aria - fix crash with CFI enabled
      crypto: x86/nhpoly1305 - eliminate unnecessary CFI wrappers
      crypto: x86/sha1 - fix possible crash with CFI enabled
      crypto: x86/sha256 - fix possible crash with CFI enabled
      crypto: x86/sha512 - fix possible crash with CFI enabled
      crypto: x86/sm3 - fix possible crash with CFI enabled
      crypto: x86/sm4 - fix crash with CFI enabled
      crypto: arm64/nhpoly1305 - eliminate unnecessary CFI wrapper
      crypto: arm64/sm3 - fix possible crash with CFI enabled
      crypto: arm/nhpoly1305 - eliminate unnecessary CFI wrapper
      Revert "crypto: shash - avoid comparing pointers to exported functions under CFI"

Frederick Lawler (1):
      crypto: af_alg - Support symmetric encryption via keyring keys

Gaosheng Cui (2):
      crypto: ccree - Remove debugfs when platform_driver_register failed
      crypto: img-hash - Fix variable dereferenced before check 'hdev->req'

Giovanni Cabiddu (12):
      crypto: qat - relocate bufferlist logic
      crypto: qat - rename bufferlist functions
      crypto: qat - change bufferlist logic interface
      crypto: qat - generalize crypto request buffers
      crypto: qat - extend buffer list interface
      crypto: qat - relocate backlog related structures
      crypto: qat - relocate qat_algs_alloc_flags()
      crypto: qat - rename and relocate GEN2 config function
      crypto: qat - expose deflate through acomp api for QAT GEN2
      crypto: qat - enable deflate for QAT GEN4
      crypto: acomp - define max size for destination
      crypto: qat - add resubmit logic for decompression

Gustavo A. R. Silva (1):
      crypto: talitos - Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper

Herbert Xu (34):
      crypto: ixp4xx - Fix sparse warnings
      crypto: cryptd - Use request context instead of stack for sub-request
      crypto: skcipher - Allow sync algorithms with large request contexts
      Merge branch 'i2c/client_device_id_helper-immutable' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa/linux
      crypto: rsa-pkcs1pad - Use helper to set reqsize
      crypto: kpp - Add helper to set reqsize
      crypto: hisilicon/hpre - Use helper to set reqsize
      crypto: qat - Use helper to set reqsize
      crypto: caam - Use helper to set reqsize
      crypto: virtio - Use helper to set reqsize
      crypto: akcipher - Move reqsize into tfm
      crypto: dh - Use helper to set reqsize
      crypto: kpp - Move reqsize into tfm
      crypto: Prepare to move crypto_tfm_ctx
      crypto: api - Add crypto_tfm_ctx_dma
      crypto: aead - Add ctx helpers with DMA alignment
      crypto: hash - Add ctx helpers with DMA alignment
      crypto: skcipher - Add ctx helpers with DMA alignment
      crypto: api - Increase MAX_ALGAPI_ALIGNMASK to 127
      crypto: akcipher - Add ctx helpers with DMA alignment
      crypto: kpp - Add ctx helpers with DMA alignment
      crypto: caam - Set DMA alignment explicitly
      crypto: api - Use linux/cache.h instead of asm/cache.h
      crypto: chelsio - Fix flexible struct array warning
      crypto: cavium - Set DMA alignment explicitly
      crypto: ccp - Set DMA alignment explicitly
      crypto: ccree - Set DMA alignment explicitly
      crypto: chelsio - Set DMA alignment explicitly
      crypto: hisilicon/hpre - Set DMA alignment explicitly
      crypto: safexcel - Set DMA alignment explicitly
      crypto: keembay - Set DMA alignment explicitly
      crypto: octeontx - Set DMA alignment explicitly
      crypto: octeontx2 - Set DMA alignment explicitly
      crypto: qce - Set DMA alignment explicitly

Jason A. Donenfeld (2):
      hwrng: core - treat default_quality as a maximum and default to 1024
      hwrng: u2fzero - account for high quality RNG

Joe Fradley (1):
      crypto: x86/curve25519 - disable gcov

Kai Ye (8):
      crypto: hisilicon/qm - increase the memory of local variables
      crypto: hisilicon/qm - add pci bdf number check
      crypto: hisilicon/qm - delete redundancy check
      crypto: hisilicon/qm - delete redundant null assignment operations
      crypto: hisilicon/qm - modify the process of regs dfx
      crypto: hisilicon/qm - split a debugfs.c from qm
      crypto: hisilicon/qm - the command dump process is modified
      crypto: hisilicon/sec - fix spelling mistake 'ckeck' -> 'check'

Linus Walleij (4):
      dt-bindings: crypto: Let STM32 define Ux500 CRYP
      crypto: stm32 - enable drivers to be used on Ux500
      crypto: stm32/cryp - enable for use with Ux500
      crypto: ux500/cryp - delete driver

Mario Limonciello (1):
      crypto: ccp - Add support for TEE for PCI ID 0x14CA

Mingming.Su (1):
      hwrng: mtk - add mt7986 support

Natalia Petrova (1):
      crypto: nitrox - avoid double free on error path in nitrox_sriov_init()

Nikolaus Voss (1):
      crypto: caam - warn if blob_gen key is insecure

Peter Harliman Liem (3):
      crypto: inside-secure - Expand soc data structure
      crypto: inside-secure - Add fw_little_endian option
      crypto: inside-secure - Add MaxLinear platform

Ralph Siemsen (1):
      crypto: doc - use correct function name

Robert Elliott (1):
      crypto: tcrypt - fix return value for multiple subtests

Shang XiaoJing (1):
      crypto: omap-sham - Use pm_runtime_resume_and_get() in omap_sham_probe()

Shashank Gupta (1):
      crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe

Tianjia Zhang (17):
      crypto: ccm - use local variables instead of indirect references
      crypto: scatterwalk - remove duplicate function declarations
      crypto: arm64/sm3 - raise the priority of the CE implementation
      crypto: arm64/sm3 - add NEON assembly implementation
      crypto: arm64/sm4 - refactor and simplify NEON implementation
      crypto: testmgr - add SM4 cts-cbc/xts/xcbc test vectors
      crypto: tcrypt - add SM4 cts-cbc/xts/xcbc test
      crypto: arm64/sm4 - refactor and simplify CE implementation
      crypto: arm64/sm4 - simplify sm4_ce_expand_key() of CE implementation
      crypto: arm64/sm4 - export reusable CE acceleration functions
      crypto: arm64/sm4 - add CE implementation for CTS-CBC mode
      crypto: arm64/sm4 - add CE implementation for XTS mode
      crypto: arm64/sm4 - add CE implementation for cmac/xcbc/cbcmac
      crypto: arm64/sm4 - add CE implementation for CCM mode
      crypto: arm64/sm4 - add CE implementation for GCM mode
      crypto: arm64 - Fix unused variable compilation warnings of cpu_feature
      crypto: ccree,hisilicon - Fix dependencies to correct algorithm

Tomas Marek (3):
      hwrng: stm32 - fix number of returned bytes on read
      hwrng: stm32 - fix read of the last word
      hwrng: stm32 - rename readl return value

Tomer Maimon (2):
      dt-bindings: rng: nuvoton,npcm-rng: Add npcm845 compatible string
      hwrng: npcm - Add NPCM8XX support

Uwe Kleine-König (3):
      crypto: ccree - Make cc_debugfs_global_fini() available for module init function
      crypto: atmel-ecc - Convert to i2c's .probe_new()
      crypto: atmel-sha204a - Convert to i2c's .probe_new()

Wang Yufen (1):
      crypto: qat - fix error return code in adf_probe

Weili Qian (5):
      crypto: hisilicon/qm - fix incorrect parameters usage
      crypto: hisilicon/sec - enabling clock gating of the address prefetch module
      crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
      crypto: hisilicon/qm - fix 'QM_XEQ_DEPTH_CAP' mask value
      crypto: hisilicon/qm - add device status check when start fails

Wenkai Lin (1):
      crypto: hisilicon/sec - remove continuous blank lines

Xiongfeng Wang (3):
      crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set()
      hwrng: amd - Fix PCI device refcount leak
      hwrng: geode - Fix PCI device refcount leak

Yang Li (1):
      crypto: rockchip - Remove surplus dev_err() when using platform_get_irq()

Yicong Yang (1):
      crypto: hisilicon/qm - drop unnecessary IS_ENABLE(CONFIG_NUMA) check

Yuan Can (1):
      crypto: ccp - Remove unused struct ccp_crypto_cpu

Yushan Zhou (1):
      crypto: marvell/octeontx - remove redundant NULL check

Zhang Yiqun (1):
      crypto: tcrypt - Fix multibuffer skcipher speed test mem leak

Zhiqi Song (1):
      crypto: hisilicon/hpre - fix resource leak in remove process

jianchunfu (1):
      crypto: talitos - Use the defined variable to clean code

ruanjinjie (1):
      crypto: ccp - Add __init/__exit annotations to module init/exit funcs

wangjianli (1):
      crypto: octeontx - fix repeated words in comments

 Documentation/crypto/devel-algos.rst               |    2 +-
 Documentation/crypto/userspace-if.rst              |   15 +-
 .../bindings/crypto/rockchip,rk3288-crypto.yaml    |  127 ++
 .../devicetree/bindings/crypto/rockchip-crypto.txt |   28 -
 .../devicetree/bindings/crypto/st,stm32-cryp.yaml  |   19 +
 .../devicetree/bindings/rng/nuvoton,npcm-rng.yaml  |    4 +-
 MAINTAINERS                                        |    7 +
 arch/arm/crypto/Kconfig                            |    2 +-
 arch/arm/crypto/aes-cipher-glue.c                  |    2 +-
 arch/arm/crypto/nh-neon-core.S                     |    2 +-
 arch/arm/crypto/nhpoly1305-neon-glue.c             |   11 +-
 arch/arm64/crypto/Kconfig                          |   49 +-
 arch/arm64/crypto/Makefile                         |    9 +
 arch/arm64/crypto/aes-ce-glue.c                    |    2 +-
 arch/arm64/crypto/aes-cipher-glue.c                |    2 +-
 arch/arm64/crypto/aes-modes.S                      |   34 +-
 arch/arm64/crypto/aes-neonbs-core.S                |   16 +-
 arch/arm64/crypto/crct10dif-ce-core.S              |    5 +-
 arch/arm64/crypto/ghash-ce-core.S                  |    8 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |    2 +-
 arch/arm64/crypto/nh-neon-core.S                   |    5 +-
 arch/arm64/crypto/nhpoly1305-neon-glue.c           |   11 +-
 arch/arm64/crypto/sm3-ce-glue.c                    |    2 +-
 arch/arm64/crypto/sm3-neon-core.S                  |  601 ++++++++
 arch/arm64/crypto/sm3-neon-glue.c                  |  103 ++
 arch/arm64/crypto/sm4-ce-asm.h                     |  209 +++
 arch/arm64/crypto/sm4-ce-ccm-core.S                |  328 ++++
 arch/arm64/crypto/sm4-ce-ccm-glue.c                |  303 ++++
 arch/arm64/crypto/sm4-ce-cipher-glue.c             |    2 +-
 arch/arm64/crypto/sm4-ce-core.S                    | 1205 ++++++++++-----
 arch/arm64/crypto/sm4-ce-gcm-core.S                |  741 +++++++++
 arch/arm64/crypto/sm4-ce-gcm-glue.c                |  286 ++++
 arch/arm64/crypto/sm4-ce-glue.c                    |  575 ++++++-
 arch/arm64/crypto/sm4-ce.h                         |   16 +
 arch/arm64/crypto/sm4-neon-core.S                  |  630 +++++---
 arch/arm64/crypto/sm4-neon-glue.c                  |  172 +--
 arch/um/drivers/random.c                           |    1 -
 arch/x86/crypto/Makefile                           |    3 +
 arch/x86/crypto/aegis128-aesni-asm.S               |    9 +-
 arch/x86/crypto/aria-aesni-avx-asm_64.S            |   13 +-
 arch/x86/crypto/nh-avx2-x86_64.S                   |    5 +-
 arch/x86/crypto/nh-sse2-x86_64.S                   |    5 +-
 arch/x86/crypto/nhpoly1305-avx2-glue.c             |   11 +-
 arch/x86/crypto/nhpoly1305-sse2-glue.c             |   11 +-
 arch/x86/crypto/sha1_ni_asm.S                      |    3 +-
 arch/x86/crypto/sha1_ssse3_asm.S                   |    3 +-
 arch/x86/crypto/sha256-avx-asm.S                   |    3 +-
 arch/x86/crypto/sha256-avx2-asm.S                  |    3 +-
 arch/x86/crypto/sha256-ssse3-asm.S                 |    3 +-
 arch/x86/crypto/sha256_ni_asm.S                    |    3 +-
 arch/x86/crypto/sha512-avx-asm.S                   |    3 +-
 arch/x86/crypto/sha512-avx2-asm.S                  |    3 +-
 arch/x86/crypto/sha512-ssse3-asm.S                 |    3 +-
 arch/x86/crypto/sm3-avx-asm_64.S                   |    3 +-
 arch/x86/crypto/sm4-aesni-avx-asm_64.S             |    7 +-
 arch/x86/crypto/sm4-aesni-avx2-asm_64.S            |    7 +-
 arch/x86/crypto/twofish_glue.c                     |    2 +-
 crypto/Kconfig                                     |    9 +-
 crypto/Makefile                                    |    1 -
 crypto/aes_generic.c                               |    2 +-
 crypto/aes_ti.c                                    |    2 +-
 crypto/af_alg.c                                    |  135 +-
 crypto/algapi.c                                    |  160 +-
 crypto/algboss.c                                   |   22 +-
 crypto/anubis.c                                    |    2 +-
 crypto/api.c                                       |   11 +-
 crypto/blowfish_common.c                           |    3 +-
 crypto/blowfish_generic.c                          |    3 +-
 crypto/camellia_generic.c                          |    2 +-
 crypto/cast5_generic.c                             |    2 +-
 crypto/cast6_generic.c                             |    2 +-
 crypto/ccm.c                                       |    2 +-
 crypto/cryptd.c                                    |   36 +-
 crypto/des_generic.c                               |    2 +-
 crypto/dh.c                                        |    4 +-
 crypto/fcrypt.c                                    |    2 +-
 crypto/internal.h                                  |   20 +-
 crypto/kdf_sp800108.c                              |   10 +-
 crypto/khazad.c                                    |    2 +-
 crypto/rsa-pkcs1pad.c                              |    5 +-
 crypto/seed.c                                      |    2 +-
 crypto/serpent_generic.c                           |    2 +-
 crypto/shash.c                                     |   27 +-
 crypto/skcipher.c                                  |    2 +-
 crypto/sm4_generic.c                               |    2 +-
 crypto/tcrypt.c                                    |  317 ++--
 crypto/tea.c                                       |    2 +-
 crypto/testmgr.c                                   |   19 +
 crypto/testmgr.h                                   |  977 ++++++++++++
 crypto/twofish_common.c                            |    2 +-
 crypto/twofish_generic.c                           |    2 +-
 drivers/char/hw_random/amd-rng.c                   |   18 +-
 drivers/char/hw_random/cavium-rng-vf.c             |    1 -
 drivers/char/hw_random/cn10k-rng.c                 |    1 -
 drivers/char/hw_random/core.c                      |    9 +-
 drivers/char/hw_random/geode-rng.c                 |   36 +-
 drivers/char/hw_random/mpfs-rng.c                  |    1 -
 drivers/char/hw_random/mtk-rng.c                   |    5 +-
 drivers/char/hw_random/npcm-rng.c                  |   15 +-
 drivers/char/hw_random/s390-trng.c                 |    1 -
 drivers/char/hw_random/stm32-rng.c                 |    8 +-
 drivers/char/hw_random/timeriomem-rng.c            |    2 -
 drivers/char/hw_random/virtio-rng.c                |    1 -
 drivers/crypto/Kconfig                             |   19 +-
 drivers/crypto/Makefile                            |    2 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c  |    1 -
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |    2 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c          |    1 -
 drivers/crypto/amlogic/amlogic-gxl.h               |    2 +-
 drivers/crypto/atmel-ecc.c                         |    6 +-
 drivers/crypto/atmel-sha204a.c                     |    7 +-
 drivers/crypto/caam/blob_gen.c                     |    9 +
 drivers/crypto/caam/caamalg.c                      |   72 +-
 drivers/crypto/caam/caamalg_qi.c                   |   52 +-
 drivers/crypto/caam/caamalg_qi2.c                  |  173 +--
 drivers/crypto/caam/caamhash.c                     |   87 +-
 drivers/crypto/caam/caampkc.c                      |   50 +-
 drivers/crypto/caam/caamrng.c                      |    1 -
 drivers/crypto/caam/regs.h                         |    3 +
 drivers/crypto/cavium/cpt/cptvf_algs.c             |   10 +-
 drivers/crypto/cavium/nitrox/nitrox_aead.c         |   12 +-
 drivers/crypto/cavium/nitrox/nitrox_mbx.c          |    1 +
 drivers/crypto/ccp/ccp-crypto-aes-cmac.c           |   21 +-
 drivers/crypto/ccp/ccp-crypto-aes-galois.c         |   12 +-
 drivers/crypto/ccp/ccp-crypto-aes-xts.c            |   20 +-
 drivers/crypto/ccp/ccp-crypto-aes.c                |   29 +-
 drivers/crypto/ccp/ccp-crypto-des3.c               |   17 +-
 drivers/crypto/ccp/ccp-crypto-main.c               |   15 +-
 drivers/crypto/ccp/ccp-crypto-rsa.c                |   18 +-
 drivers/crypto/ccp/ccp-crypto-sha.c                |   26 +-
 drivers/crypto/ccp/sp-pci.c                        |   11 +-
 drivers/crypto/ccree/cc_aead.c                     |   62 +-
 drivers/crypto/ccree/cc_buffer_mgr.c               |   18 +-
 drivers/crypto/ccree/cc_debugfs.c                  |    2 +-
 drivers/crypto/ccree/cc_driver.c                   |   10 +-
 drivers/crypto/ccree/cc_hash.c                     |   86 +-
 drivers/crypto/chelsio/Kconfig                     |    2 +-
 drivers/crypto/chelsio/chcr_algo.c                 |   49 +-
 drivers/crypto/chelsio/chcr_crypto.h               |    6 +-
 drivers/crypto/hisilicon/Kconfig                   |    2 +-
 drivers/crypto/hisilicon/Makefile                  |    2 +-
 drivers/crypto/hisilicon/debugfs.c                 | 1147 ++++++++++++++
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   47 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   17 +-
 drivers/crypto/hisilicon/qm.c                      | 1427 ++---------------
 drivers/crypto/hisilicon/qm_common.h               |   87 ++
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |    5 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   10 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |    7 +-
 drivers/crypto/img-hash.c                          |    8 +-
 drivers/crypto/inside-secure/safexcel.c            |   69 +-
 drivers/crypto/inside-secure/safexcel.h            |   10 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |   99 +-
 drivers/crypto/ixp4xx_crypto.c                     |   10 +-
 drivers/crypto/keembay/keembay-ocs-hcu-core.c      |   26 +-
 drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h |    2 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c  |    3 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   |   69 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |   79 +-
 drivers/crypto/n2_core.c                           |    6 +
 drivers/crypto/nx/nx-842.h                         |    2 +-
 drivers/crypto/omap-sham.c                         |    2 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c     |    4 +-
 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h     |    2 +-
 drivers/crypto/qat/qat_4xxx/adf_drv.c              |  146 +-
 drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c   |    4 +
 drivers/crypto/qat/qat_c3xxx/adf_drv.c             |    2 +-
 .../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c   |    4 +
 drivers/crypto/qat/qat_c3xxxvf/adf_drv.c           |    2 -
 drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c     |    4 +
 drivers/crypto/qat/qat_c62x/adf_drv.c              |    2 +-
 drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c |    4 +
 drivers/crypto/qat/qat_c62xvf/adf_drv.c            |    2 -
 drivers/crypto/qat/qat_common/Makefile             |    8 +-
 drivers/crypto/qat/qat_common/adf_accel_devices.h  |   14 +
 drivers/crypto/qat/qat_common/adf_cfg_strings.h    |    1 +
 drivers/crypto/qat/qat_common/adf_common_drv.h     |    9 +-
 drivers/crypto/qat/qat_common/adf_ctl_drv.c        |    6 +
 drivers/crypto/qat/qat_common/adf_gen2_config.c    |  206 +++
 drivers/crypto/qat/qat_common/adf_gen2_config.h    |   10 +
 drivers/crypto/qat/qat_common/adf_gen2_dc.c        |   70 +
 drivers/crypto/qat/qat_common/adf_gen2_dc.h        |   10 +
 drivers/crypto/qat/qat_common/adf_gen4_dc.c        |   83 +
 drivers/crypto/qat/qat_common/adf_gen4_dc.h        |   10 +
 drivers/crypto/qat/qat_common/adf_init.c           |   11 +
 drivers/crypto/qat/qat_common/adf_sriov.c          |    4 +
 drivers/crypto/qat/qat_common/icp_qat_fw.h         |   24 +
 drivers/crypto/qat/qat_common/icp_qat_fw_comp.h    |  404 +++++
 drivers/crypto/qat/qat_common/icp_qat_hw.h         |   66 +
 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp.h |  164 ++
 .../qat/qat_common/icp_qat_hw_20_comp_defs.h       |  300 ++++
 drivers/crypto/qat/qat_common/qat_algs.c           |  208 +--
 drivers/crypto/qat/qat_common/qat_algs_send.h      |   16 +-
 drivers/crypto/qat/qat_common/qat_asym_algs.c      |    6 +-
 drivers/crypto/qat/qat_common/qat_bl.c             |  383 +++++
 drivers/crypto/qat/qat_common/qat_bl.h             |   67 +
 drivers/crypto/qat/qat_common/qat_comp_algs.c      |  344 +++++
 drivers/crypto/qat/qat_common/qat_comp_req.h       |  123 ++
 drivers/crypto/qat/qat_common/qat_compression.c    |  297 ++++
 drivers/crypto/qat/qat_common/qat_compression.h    |   37 +
 drivers/crypto/qat/qat_common/qat_crypto.c         |  120 +-
 drivers/crypto/qat/qat_common/qat_crypto.h         |   55 +-
 .../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c |    4 +
 drivers/crypto/qat/qat_dh895xcc/adf_drv.c          |    2 +-
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |    4 +
 drivers/crypto/qat/qat_dh895xccvf/adf_drv.c        |    2 -
 drivers/crypto/qce/aead.c                          |   22 +-
 drivers/crypto/qce/common.c                        |    5 +-
 drivers/crypto/qce/sha.c                           |   18 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |  505 +++---
 drivers/crypto/rockchip/rk3288_crypto.h            |  107 +-
 drivers/crypto/rockchip/rk3288_crypto_ahash.c      |  267 ++--
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |  543 ++++---
 drivers/crypto/stm32/Kconfig                       |    4 +-
 drivers/crypto/stm32/stm32-cryp.c                  |  417 +++--
 drivers/crypto/talitos.c                           |    6 +-
 drivers/crypto/talitos.h                           |    4 +-
 drivers/crypto/ux500/Kconfig                       |   10 -
 drivers/crypto/ux500/Makefile                      |    1 -
 drivers/crypto/ux500/cryp/Makefile                 |   10 -
 drivers/crypto/ux500/cryp/cryp.c                   |  394 -----
 drivers/crypto/ux500/cryp/cryp.h                   |  315 ----
 drivers/crypto/ux500/cryp/cryp_core.c              | 1600 --------------------
 drivers/crypto/ux500/cryp/cryp_irq.c               |   45 -
 drivers/crypto/ux500/cryp/cryp_irq.h               |   31 -
 drivers/crypto/ux500/cryp/cryp_irqp.h              |  125 --
 drivers/crypto/ux500/cryp/cryp_p.h                 |  122 --
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |    5 +-
 drivers/firmware/turris-mox-rwtm.c                 |    1 -
 drivers/hid/hid-u2fzero.c                          |    1 -
 drivers/i2c/i2c-core-base.c                        |   14 +
 drivers/s390/crypto/zcrypt_api.c                   |    6 -
 drivers/usb/misc/chaoskey.c                        |    1 -
 include/crypto/acompress.h                         |    1 +
 include/crypto/akcipher.h                          |    7 +-
 include/crypto/algapi.h                            |   43 +-
 include/crypto/aria.h                              |    2 +-
 include/crypto/gcm.h                               |   22 +
 include/crypto/internal/acompress.h                |    2 +
 include/crypto/internal/aead.h                     |   22 +
 include/crypto/internal/akcipher.h                 |   26 +-
 include/crypto/internal/hash.h                     |   30 +-
 include/crypto/internal/kpp.h                      |   30 +-
 include/crypto/internal/scompress.h                |    3 +-
 include/crypto/internal/skcipher.h                 |   30 +
 include/crypto/kpp.h                               |    9 +-
 include/crypto/scatterwalk.h                       |    1 -
 include/linux/crypto.h                             |    5 -
 include/linux/hisi_acc_qm.h                        |   14 +-
 include/linux/hw_random.h                          |    2 +-
 include/linux/i2c.h                                |    1 +
 include/uapi/linux/if_alg.h                        |    1 +
 kernel/padata.c                                    |   15 +-
 lib/crypto/Kconfig                                 |    9 +
 lib/crypto/Makefile                                |    5 +
 lib/crypto/aesgcm.c                                |  727 +++++++++
 {crypto => lib/crypto}/gf128mul.c                  |   58 +-
 257 files changed, 13380 insertions(+), 7088 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/rockchip,rk3288-crypto.yaml
 delete mode 100644 Documentation/devicetree/bindings/crypto/rockchip-crypto.txt
 create mode 100644 arch/arm64/crypto/sm3-neon-core.S
 create mode 100644 arch/arm64/crypto/sm3-neon-glue.c
 create mode 100644 arch/arm64/crypto/sm4-ce-asm.h
 create mode 100644 arch/arm64/crypto/sm4-ce-ccm-core.S
 create mode 100644 arch/arm64/crypto/sm4-ce-ccm-glue.c
 create mode 100644 arch/arm64/crypto/sm4-ce-gcm-core.S
 create mode 100644 arch/arm64/crypto/sm4-ce-gcm-glue.c
 create mode 100644 arch/arm64/crypto/sm4-ce.h
 create mode 100644 drivers/crypto/hisilicon/debugfs.c
 create mode 100644 drivers/crypto/hisilicon/qm_common.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_config.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_config.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_dc.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_dc.h
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_dc.c
 create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_dc.h
 create mode 100644 drivers/crypto/qat/qat_common/icp_qat_fw_comp.h
 create mode 100644 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp.h
 create mode 100644 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp_defs.h
 create mode 100644 drivers/crypto/qat/qat_common/qat_bl.c
 create mode 100644 drivers/crypto/qat/qat_common/qat_bl.h
 create mode 100644 drivers/crypto/qat/qat_common/qat_comp_algs.c
 create mode 100644 drivers/crypto/qat/qat_common/qat_comp_req.h
 create mode 100644 drivers/crypto/qat/qat_common/qat_compression.c
 create mode 100644 drivers/crypto/qat/qat_common/qat_compression.h
 delete mode 100644 drivers/crypto/ux500/cryp/Makefile
 delete mode 100644 drivers/crypto/ux500/cryp/cryp.c
 delete mode 100644 drivers/crypto/ux500/cryp/cryp.h
 delete mode 100644 drivers/crypto/ux500/cryp/cryp_core.c
 delete mode 100644 drivers/crypto/ux500/cryp/cryp_irq.c
 delete mode 100644 drivers/crypto/ux500/cryp/cryp_irq.h
 delete mode 100644 drivers/crypto/ux500/cryp/cryp_irqp.h
 delete mode 100644 drivers/crypto/ux500/cryp/cryp_p.h
 create mode 100644 lib/crypto/aesgcm.c
 rename {crypto => lib/crypto}/gf128mul.c (87%)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.2
  2022-12-14  8:15                                 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
@ 2022-12-14 22:25                                   ` pr-tracker-bot
  2023-02-20  5:22                                   ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-12-14 22:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 14 Dec 2022 16:15:22 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/64e7003c6b85626a533a67c1ba938b75a3db24e6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.2
  2022-10-28  4:58                                   ` Herbert Xu
  2022-10-28 17:00                                     ` Linus Torvalds
  2022-10-28 17:02                                     ` pr-tracker-bot
@ 2023-01-06  9:15                                     ` Herbert Xu
  2023-01-06 21:19                                       ` pr-tracker-bot
  2023-03-05 10:15                                       ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-01-06  9:15 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 1b929c02afd37871d5afb9d498426f83432e71c2:

  Linux 6.2-rc1 (2022-12-25 13:41:39 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p2 

for you to fetch changes up to 736f88689c6912f05d0116917910603a7ba97de7:

  crypto: arm64/sm4 - fix possible crash with CFI enabled (2022-12-30 17:57:42 +0800)

----------------------------------------------------------------
This push fixes a CFI crash in arm64/sm4 as well as a regression
in the caam driver.
----------------------------------------------------------------

Nikolaus Voss (1):
      crypto: caam - fix CAAM io mem access in blob_gen

Tianjia Zhang (1):
      crypto: arm64/sm4 - fix possible crash with CFI enabled

 arch/arm64/crypto/sm4-ce-ccm-core.S | 5 +++--
 arch/arm64/crypto/sm4-ce-gcm-core.S | 5 +++--
 drivers/crypto/caam/blob_gen.c      | 2 +-
 3 files changed, 7 insertions(+), 5 deletions(-)
 
Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.2
  2023-01-06  9:15                                     ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
@ 2023-01-06 21:19                                       ` pr-tracker-bot
  2023-03-05 10:15                                       ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-01-06 21:19 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 6 Jan 2023 17:15:32 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/90bc52c525fdac4ed8cbf13c08c813ec2a4fc856

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.3
  2022-12-14  8:15                                 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
  2022-12-14 22:25                                   ` pr-tracker-bot
@ 2023-02-20  5:22                                   ` Herbert Xu
  2023-02-22  2:50                                     ` pr-tracker-bot
  2023-04-24  4:52                                     ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-02-20  5:22 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 736f88689c6912f05d0116917910603a7ba97de7:

  crypto: arm64/sm4 - fix possible crash with CFI enabled (2022-12-30 17:57:42 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p1 

for you to fetch changes up to 8b84475318641c2b89320859332544cf187e1cbd:

  crypto: x86/aria-avx - Do not use avx2 instructions (2023-02-14 13:39:33 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Use kmap_local instead of kmap_atomic.
- Change request callback to take void pointer.
- Print FIPS status in /proc/crypto (when enabled).

Algorithms:

- Add rfc4106/gcm support on arm64.
- Add ARIA AVX2/512 support on x86.

Drivers:

- Add TRNG driver for StarFive SoC.
- Delete ux500/hash driver (subsumed by stm32/hash).
- Add zlib support in qat.
- Add RSA support in aspeed.

----------------------------------------------------------------
Alexander Lobakin (1):
      crypto: octeontx2 - Fix objects shared between several modules

Ard Biesheuvel (5):
      crypto: scatterwalk - use kmap_local() not kmap_atomic()
      crypto: skcipher - Use scatterwalk (un)map interface for dst and src buffers
      crypto: arm64/gcm - add RFC4106 support
      crypto: tcrypt - include larger key sizes in RFC4106 benchmark
      crypto: aead - fix inaccurate documentation

Arnd Bergmann (1):
      crypto: wp512 - disable kmsan checks in wp512_process_buffer()

Christophe JAILLET (1):
      crypto: virtio/akcipher - Do not use GFP_ATOMIC when not needed

Danny Tsen (6):
      crypto: p10-aes-gcm - Update Kconfig and Makefile
      crypto: p10-aes-gcm - Glue code for AES/GCM stitched implementation
      crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation
      crypto: p10-aes-gcm - Supporting functions for AES
      crypto: p10-aes-gcm - Supporting functions for ghash
      crypto: p10-aes-gcm - A perl script to process PowerPC assembler source

David Rientjes (1):
      crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2

Eric Biggers (3):
      crypto: x86/ghash - fix unaligned access in ghash_setkey()
      crypto: x86/ghash - use le128 instead of u128
      crypto: x86/ghash - add comment and fix broken link

Giovanni Cabiddu (2):
      crypto: qat - fix out-of-bounds read
      crypto: qat - drop log level of msg in get_instance_node()

Gustavo A. R. Silva (1):
      crypto: aspeed - Replace zero-length array with flexible-array member

Herbert Xu (77):
      crypto: arm/sha1 - Fix clang function cast warnings
      crypto: lib/blake2s - Split up test function to halve stack usage
      lib/mpi: Fix buffer overrun when SG is too long
      crypto: caam - Avoid GCC memset bug warning
      crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
      crypto: caam - Remove GFP_DMA and add DMA alignment padding
      crypto: talitos - Remove GFP_DMA and add DMA alignment padding
      crypto: p10-aes-gcm - Revert implementation
      crypto: essiv - Handle EBUSY correctly
      crypto: seqiv - Handle EBUSY correctly
      crypto: cryptd - Remove unnecessary skcipher_request_zero
      crypto: bcm - Use subrequest for fallback
      crypto: caam - Use ahash_request_complete
      crypto: xts - Handle EBUSY correctly
      crypto: engine - Fix excess parameter doc warning
      Revert "crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete"
      crypto: img-hash - Fix sparse endianness warning
      crypto: marvell/cesa - Use crypto_wait_req
      hwrng: starfive - Enable compile testing
      crypto: arm64/aes-ccm - Rewrite skcipher walker loop
      crypto: safexcel - Use crypto_wait_req
      crypto: arm64/sm4-gcm - Fix possible crash in GCM cryption
      crypto: api - Add scaffolding to change completion function signature
      dm: Add scaffolding to change completion function signature
      net: macsec: Add scaffolding to change completion function signature
      fs: ecryptfs: Use crypto_wait_req
      Bluetooth: Use crypto_wait_req
      net: ipv4: Add scaffolding to change completion function signature
      net: ipv6: Add scaffolding to change completion function signature
      tipc: Add scaffolding to change completion function signature
      tls: Only use data field in crypto completion function
      KEYS: DH: Use crypto_wait_req
      crypto: cryptd - Use subreq for AEAD
      crypto: acompress - Use crypto_request_complete
      crypto: aead - Use crypto_request_complete
      crypto: akcipher - Use crypto_request_complete
      crypto: hash - Use crypto_request_complete
      crypto: kpp - Use crypto_request_complete
      crypto: skcipher - Use crypto_request_complete
      crypto: engine - Use crypto_request_complete
      crypto: rsa-pkcs1pad - Use akcipher_request_complete
      crypto: cryptd - Use request_complete helpers
      crypto: atmel - Use request_complete helpers
      crypto: artpec6 - Use request_complete helpers
      crypto: bcm - Use request_complete helpers
      crypto: cpt - Use request_complete helpers
      crypto: nitrox - Use request_complete helpers
      crypto: ccp - Use request_complete helpers
      crypto: chelsio - Use request_complete helpers
      crypto: hifn_795x - Use request_complete helpers
      crypto: hisilicon - Use request_complete helpers
      crypto: img-hash - Use request_complete helpers
      crypto: safexcel - Use request_complete helpers
      crypto: ixp4xx - Use request_complete helpers
      crypto: marvell/cesa - Use request_complete helpers
      crypto: octeontx - Use request_complete helpers
      crypto: octeontx2 - Use request_complete helpers
      crypto: mxs-dcp - Use request_complete helpers
      crypto: qat - Use request_complete helpers
      crypto: qce - Use request_complete helpers
      crypto: s5p-sss - Use request_complete helpers
      crypto: sahara - Use request_complete helpers
      crypto: talitos - Use request_complete helpers
      crypto: api - Use data directly in completion function
      dm: Remove completion function scaffolding
      net: macsec: Remove completion function scaffolding
      net: ipv4: Remove completion function scaffolding
      net: ipv6: Remove completion function scaffolding
      tipc: Remove completion function scaffolding
      tls: Remove completion function scaffolding
      crypto: api - Remove completion function scaffolding
      tls: Pass rec instead of aead_req into tls_encrypt_done
      crypto: ecc - Silence sparse warning
      crypto: nx - Fix sparse warnings
      crypto: crypto4xx - Call dma_unmap_page when done
      crypto: proc - Print fips status
      crypto: aspeed - Fix modular aspeed-acry

Jia Jie Ho (2):
      dt-bindings: rng: Add StarFive TRNG module
      hwrng: starfive - Add TRNG driver for StarFive SoC

Koba Ko (1):
      crypto: ccp - Failure on re-initialization due to duplicate sysfs filename

Linus Walleij (7):
      crypto: stm32 - Use accelerated readsl/writesl
      dt-bindings: crypto: Let STM32 define Ux500 HASH
      crypto: stm32/hash - Simplify code
      crypto: stm32/hash - Use existing busy poll function
      crypto: stm32/hash - Wait for idle before final CPU xmit
      crypto: stm32/hash - Support Ux500 hash
      crypto: ux500/hash - delete driver

Lucas Segarra Fernandez (2):
      crypto: qat - extend buffer list logic interface
      crypto: qat - add qat_zlib_deflate

Lukas Bulwahn (4):
      crypto: ux500 - update debug config after ux500 cryp driver removal
      crypto: hisilicon - remove redundant config PCI dependency for some CRYPTO_DEV_HISI configs
      crypto: atmel-i2c - avoid defines prefixed with CONFIG
      MAINTAINERS: repair file entry for STARFIVE TRNG DRIVER

Meadhbh (1):
      Documentation: qat: change kernel version

Meadhbh Fitzpatrick (1):
      crypto: qat - fix spelling mistakes from 'bufer' to 'buffer'

Neal Liu (5):
      crypto: aspeed - Add ACRY RSA driver
      ARM: dts: aspeed: Add ACRY/AHBC device controller node
      dt-bindings: crypto: add documentation for Aspeed ACRY
      dt-bindings: bus: add documentation for Aspeed AHBC
      crypto: aspeed - fix type warnings

Nicolai Stange (4):
      crypto: xts - restrict key lengths to approved values in FIPS mode
      crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
      crypto: testmgr - disallow plain ghash in FIPS mode
      crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode

Peter Lafreniere (4):
      crypto: x86 - exit fpu context earlier in ECB/CBC macros
      crypto: x86/blowfish - Remove unused encode parameter
      crypto: x86/blowfish - Convert to use ECB/CBC helpers
      crypto: x86/blowfish - Eliminate use of SYM_TYPED_FUNC_START in asm

Samuel Holland (2):
      dt-bindings: crypto: sun8i-ce: Add compatible for D1
      crypto: sun8i-ce - Add TRNG clock to the D1 variant

Sergiu Moga (1):
      crypto: atmel - Add capability case for the 0x600 SHA and AES IP versions

Taehee Yoo (8):
      crypto: x86/aria - add keystream array into request ctx
      crypto: x86/aria - do not use magic number offsets of aria_ctx
      crypto: x86/aria - implement aria-avx2
      crypto: x86/aria - implement aria-avx512
      crypto: x86/aria-avx - fix build failure with old binutils
      crypto: x86/aria-avx2 - fix build failure with old binutils
      crypto: x86/aria-avx512 - fix build failure with old binutils
      crypto: x86/aria-avx - Do not use avx2 instructions

Tianjia Zhang (1):
      crypto: arm64/sm4-ccm - Rewrite skcipher walker loop

Tom Lendacky (3):
      crypto: ccp - Provide MMIO register naming for documenation
      crypto: ccp - Add a firmware definition for EPYC gen 4 processors
      crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware

Uwe Kleine-König (1):
      crypto: atmel - Drop unused id parameter from atmel_i2c_probe()

Vladis Dronov (3):
      crypto: xts - drop xts_check_key()
      crypto: s390/aes - drop redundant xts key check
      crypto: testmgr - disallow certain DRBG hash functions in FIPS mode

Weili Qian (5):
      crypto: hisilicon/qm - remove some unused defines
      crypto: hisilicon/qm - use min() instead of min_t()
      crypto: hisilicon/qm - change function names
      crypto: hisilicon/qm - update comments to match function
      crypto: hisilicon/qm - fix coding style issues

Yang Yingliang (1):
      crypto: aspeed - change aspeed_acry_akcipher_algs to static

Zhang Yiqun (1):
      crypto: testmgr - add diff-splits of src/dst into default cipher config

ye xingchen (1):
      crypto: aspeed - Use devm_platform_get_and_ioremap_resource()

 Documentation/ABI/testing/sysfs-driver-qat         |    4 +-
 .../bindings/bus/aspeed,ast2600-ahbc.yaml          |   37 +
 .../bindings/crypto/allwinner,sun8i-ce.yaml        |   33 +-
 .../bindings/crypto/aspeed,ast2600-acry.yaml       |   49 +
 .../devicetree/bindings/crypto/st,stm32-hash.yaml  |   23 +-
 .../bindings/rng/starfive,jh7110-trng.yaml         |   55 +
 MAINTAINERS                                        |    8 +-
 arch/arm/boot/dts/aspeed-g6.dtsi                   |   13 +
 arch/arm/crypto/sha1_glue.c                        |   14 +-
 arch/arm64/crypto/aes-ce-ccm-glue.c                |   57 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |  145 +-
 arch/arm64/crypto/sm4-ce-ccm-glue.c                |   44 +-
 arch/arm64/crypto/sm4-ce-gcm-glue.c                |   51 +-
 arch/s390/crypto/aes_s390.c                        |    4 -
 arch/s390/crypto/paes_s390.c                       |    2 +-
 arch/x86/Kconfig.assembler                         |    5 +
 arch/x86/crypto/Kconfig                            |   38 +
 arch/x86/crypto/Makefile                           |    6 +
 arch/x86/crypto/aria-aesni-avx-asm_64.S            |  172 +-
 arch/x86/crypto/aria-aesni-avx2-asm_64.S           | 1441 ++++++++++++++
 arch/x86/crypto/aria-avx.h                         |   48 +-
 arch/x86/crypto/aria-gfni-avx512-asm_64.S          |  971 ++++++++++
 arch/x86/crypto/aria_aesni_avx2_glue.c             |  254 +++
 arch/x86/crypto/aria_aesni_avx_glue.c              |   49 +-
 arch/x86/crypto/aria_gfni_avx512_glue.c            |  250 +++
 arch/x86/crypto/blowfish-x86_64-asm_64.S           |   71 +-
 arch/x86/crypto/blowfish_glue.c                    |  200 +-
 arch/x86/crypto/ecb_cbc_helpers.h                  |   19 +-
 arch/x86/crypto/ghash-clmulni-intel_asm.S          |    6 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |   45 +-
 arch/x86/kernel/asm-offsets.c                      |    8 +
 crypto/adiantum.c                                  |    5 +-
 crypto/af_alg.c                                    |    6 +-
 crypto/ahash.c                                     |  195 +-
 crypto/api.c                                       |    4 +-
 crypto/aria_generic.c                              |    4 +
 crypto/authenc.c                                   |   14 +-
 crypto/authencesn.c                                |   15 +-
 crypto/ccm.c                                       |    9 +-
 crypto/chacha20poly1305.c                          |   40 +-
 crypto/cryptd.c                                    |  290 +--
 crypto/crypto_engine.c                             |    8 +-
 crypto/cts.c                                       |   12 +-
 crypto/dh.c                                        |    5 +-
 crypto/ecc.c                                       |    6 +-
 crypto/essiv.c                                     |   15 +-
 crypto/gcm.c                                       |   36 +-
 crypto/hctr2.c                                     |    5 +-
 crypto/lrw.c                                       |    4 +-
 crypto/pcrypt.c                                    |    4 +-
 crypto/proc.c                                      |    6 +
 crypto/rsa-pkcs1pad.c                              |   51 +-
 crypto/seqiv.c                                     |    7 +-
 crypto/shash.c                                     |    4 +-
 crypto/skcipher.c                                  |   22 +-
 crypto/tcrypt.c                                    |    8 +-
 crypto/tcrypt.h                                    |    2 +-
 crypto/testmgr.c                                   |   16 +-
 crypto/wp512.c                                     |    2 +-
 crypto/xts.c                                       |   20 +-
 drivers/char/hw_random/Kconfig                     |   10 +
 drivers/char/hw_random/Makefile                    |    1 +
 drivers/char/hw_random/jh7110-trng.c               |  393 ++++
 drivers/crypto/Kconfig                             |   10 -
 drivers/crypto/Makefile                            |    1 -
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |    1 +
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |    2 +-
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |    4 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |   13 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |    4 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c  |   11 +-
 drivers/crypto/amcc/crypto4xx_core.c               |   10 +-
 drivers/crypto/aspeed/Kconfig                      |   11 +
 drivers/crypto/aspeed/Makefile                     |    4 +
 drivers/crypto/aspeed/aspeed-acry.c                |  828 +++++++++
 drivers/crypto/aspeed/aspeed-hace.c                |    5 +-
 drivers/crypto/aspeed/aspeed-hace.h                |    2 +-
 drivers/crypto/atmel-aes.c                         |    7 +-
 drivers/crypto/atmel-ecc.c                         |    3 +-
 drivers/crypto/atmel-i2c.c                         |    4 +-
 drivers/crypto/atmel-i2c.h                         |    4 +-
 drivers/crypto/atmel-sha.c                         |   10 +-
 drivers/crypto/atmel-sha204a.c                     |    3 +-
 drivers/crypto/atmel-tdes.c                        |    4 +-
 drivers/crypto/axis/artpec6_crypto.c               |   14 +-
 drivers/crypto/bcm/cipher.c                        |  102 +-
 drivers/crypto/bcm/cipher.h                        |    7 +-
 drivers/crypto/caam/blob_gen.c                     |    2 +-
 drivers/crypto/caam/caamalg.c                      |   16 +-
 drivers/crypto/caam/caamalg_qi.c                   |   16 +-
 drivers/crypto/caam/caamalg_qi2.c                  |   56 +-
 drivers/crypto/caam/caamalg_qi2.h                  |   10 +-
 drivers/crypto/caam/caamhash.c                     |   18 +-
 drivers/crypto/caam/caampkc.c                      |   31 +-
 drivers/crypto/caam/caamprng.c                     |   12 +-
 drivers/crypto/caam/caamrng.c                      |   11 +-
 drivers/crypto/caam/ctrl.c                         |    4 +-
 drivers/crypto/caam/desc_constr.h                  |    3 +-
 drivers/crypto/caam/key_gen.c                      |    2 +-
 drivers/crypto/caam/qi.c                           |    4 +-
 drivers/crypto/caam/qi.h                           |   12 +-
 drivers/crypto/cavium/cpt/cptvf_algs.c             |   10 +-
 drivers/crypto/cavium/nitrox/nitrox_aead.c         |    4 +-
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c     |    8 +-
 drivers/crypto/ccp/ccp-crypto-main.c               |   12 +-
 drivers/crypto/ccp/ccp-dmaengine.c                 |   21 +-
 drivers/crypto/ccp/sev-dev.c                       |   16 +-
 drivers/crypto/ccp/sp-pci.c                        |   46 +-
 drivers/crypto/ccree/cc_cipher.c                   |    2 +-
 drivers/crypto/chelsio/chcr_algo.c                 |    6 +-
 drivers/crypto/hifn_795x.c                         |    4 +-
 drivers/crypto/hisilicon/Kconfig                   |    8 +-
 drivers/crypto/hisilicon/qm.c                      |   54 +-
 drivers/crypto/hisilicon/sec/sec_algs.c            |    6 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   10 +-
 drivers/crypto/hisilicon/sgl.c                     |    1 -
 drivers/crypto/img-hash.c                          |   12 +-
 drivers/crypto/inside-secure/safexcel.c            |   15 +-
 drivers/crypto/inside-secure/safexcel.h            |    6 -
 drivers/crypto/inside-secure/safexcel_cipher.c     |   21 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |   54 +-
 drivers/crypto/ixp4xx_crypto.c                     |    4 +-
 drivers/crypto/marvell/cesa/cesa.c                 |    4 +-
 drivers/crypto/marvell/cesa/hash.c                 |   41 +-
 drivers/crypto/marvell/cesa/tdma.c                 |    2 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   |    6 +-
 drivers/crypto/marvell/octeontx2/Makefile          |   11 +-
 drivers/crypto/marvell/octeontx2/cn10k_cpt.c       |    9 +-
 drivers/crypto/marvell/octeontx2/cn10k_cpt.h       |    2 -
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |    2 -
 .../marvell/octeontx2/otx2_cpt_mbox_common.c       |   14 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.c      |   11 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |    2 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |    6 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c |    2 +
 drivers/crypto/mxs-dcp.c                           |    8 +-
 drivers/crypto/nx/nx-common-powernv.c              |   13 +-
 drivers/crypto/nx/nx-common-pseries.c              |    6 +-
 .../qat/qat_common/adf_transport_access_macros.h   |    2 +-
 drivers/crypto/qat/qat_common/qat_algs.c           |    6 +-
 drivers/crypto/qat/qat_common/qat_algs_send.c      |    3 +-
 drivers/crypto/qat/qat_common/qat_bl.c             |  115 +-
 drivers/crypto/qat/qat_common/qat_bl.h             |    4 +-
 drivers/crypto/qat/qat_common/qat_comp_algs.c      |  169 +-
 drivers/crypto/qat/qat_common/qat_compression.c    |    2 +-
 drivers/crypto/qat/qat_common/qat_crypto.c         |    2 +-
 drivers/crypto/qce/core.c                          |    4 +-
 drivers/crypto/s5p-sss.c                           |    8 +-
 drivers/crypto/sahara.c                            |    4 +-
 drivers/crypto/stm32/stm32-cryp.c                  |   37 +-
 drivers/crypto/stm32/stm32-hash.c                  |  266 ++-
 drivers/crypto/talitos.c                           |    6 +-
 drivers/crypto/ux500/Kconfig                       |   22 -
 drivers/crypto/ux500/Makefile                      |    7 -
 drivers/crypto/ux500/hash/Makefile                 |   11 -
 drivers/crypto/ux500/hash/hash_alg.h               |  398 ----
 drivers/crypto/ux500/hash/hash_core.c              | 1966 --------------------
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |    2 +-
 drivers/md/dm-crypt.c                              |    8 +-
 drivers/md/dm-integrity.c                          |    4 +-
 drivers/net/macsec.c                               |    8 +-
 fs/ecryptfs/crypto.c                               |   30 +-
 include/crypto/aead.h                              |   20 +-
 include/crypto/algapi.h                            |    6 +
 include/crypto/if_alg.h                            |    4 +-
 include/crypto/internal/acompress.h                |    2 +-
 include/crypto/internal/aead.h                     |    2 +-
 include/crypto/internal/akcipher.h                 |    2 +-
 include/crypto/internal/hash.h                     |    2 +-
 include/crypto/internal/kpp.h                      |    2 +-
 include/crypto/internal/skcipher.h                 |    2 +-
 include/crypto/scatterwalk.h                       |    4 +-
 include/crypto/xts.h                               |   25 +-
 include/linux/crypto.h                             |    4 +-
 include/linux/hisi_acc_qm.h                        |    5 +-
 lib/crypto/blake2s-selftest.c                      |   25 +-
 lib/mpi/mpicoder.c                                 |    3 +-
 net/bluetooth/ecdh_helper.c                        |   37 +-
 net/ipv4/ah4.c                                     |    8 +-
 net/ipv4/esp4.c                                    |   20 +-
 net/ipv6/ah6.c                                     |    8 +-
 net/ipv6/esp6.c                                    |   20 +-
 net/tipc/crypto.c                                  |   12 +-
 net/tls/tls.h                                      |    2 +
 net/tls/tls_sw.c                                   |   42 +-
 security/keys/dh.c                                 |   30 +-
 186 files changed, 6379 insertions(+), 4053 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/bus/aspeed,ast2600-ahbc.yaml
 create mode 100644 Documentation/devicetree/bindings/crypto/aspeed,ast2600-acry.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/starfive,jh7110-trng.yaml
 create mode 100644 arch/x86/crypto/aria-aesni-avx2-asm_64.S
 create mode 100644 arch/x86/crypto/aria-gfni-avx512-asm_64.S
 create mode 100644 arch/x86/crypto/aria_aesni_avx2_glue.c
 create mode 100644 arch/x86/crypto/aria_gfni_avx512_glue.c
 create mode 100644 drivers/char/hw_random/jh7110-trng.c
 create mode 100644 drivers/crypto/aspeed/aspeed-acry.c
 delete mode 100644 drivers/crypto/ux500/Kconfig
 delete mode 100644 drivers/crypto/ux500/Makefile
 delete mode 100644 drivers/crypto/ux500/hash/Makefile
 delete mode 100644 drivers/crypto/ux500/hash/hash_alg.h
 delete mode 100644 drivers/crypto/ux500/hash/hash_core.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.3
  2023-02-20  5:22                                   ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
@ 2023-02-22  2:50                                     ` pr-tracker-bot
  2023-04-24  4:52                                     ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-02-22  2:50 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 20 Feb 2023 13:22:32 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/36289a03bcd3aabdf66de75cb6d1b4ee15726438

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.3
  2023-01-06  9:15                                     ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
  2023-01-06 21:19                                       ` pr-tracker-bot
@ 2023-03-05 10:15                                       ` Herbert Xu
  2023-03-05 19:37                                         ` pr-tracker-bot
  2023-05-07 13:19                                         ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-03-05 10:15 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 8b84475318641c2b89320859332544cf187e1cbd:

  crypto: x86/aria-avx - Do not use avx2 instructions (2023-02-14 13:39:33 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p2 

for you to fetch changes up to 660ca9470f9c613fa2c71a123a9469c80a697ee4:

  crypto: caam - Fix edesc/iv ordering mixup (2023-02-28 16:30:58 +0800)

----------------------------------------------------------------
This push fixes a regression in the caam driver.
----------------------------------------------------------------

Herbert Xu (1):
      crypto: caam - Fix edesc/iv ordering mixup

 drivers/crypto/caam/caamalg.c    | 26 +++++++++++++++++++-------
 drivers/crypto/caam/caamalg_qi.c | 40 ++++++++++++++++++++++++++--------------
 drivers/crypto/caam/qi.c         | 10 ++++++++--
 3 files changed, 53 insertions(+), 23 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.3
  2023-03-05 10:15                                       ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
@ 2023-03-05 19:37                                         ` pr-tracker-bot
  2023-05-07 13:19                                         ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-03-05 19:37 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sun, 5 Mar 2023 18:15:19 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f915322fe014c5c515119381e886faf07b3c9d31

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.4
  2023-02-20  5:22                                   ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
  2023-02-22  2:50                                     ` pr-tracker-bot
@ 2023-04-24  4:52                                     ` Herbert Xu
  2023-04-26 17:06                                       ` pr-tracker-bot
  2023-06-29  5:06                                       ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-04-24  4:52 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit fe15c26ee26efa11741a7b632e9f23b01aca4cc6:

  Linux 6.3-rc1 (2023-03-05 14:52:03 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p1 

for you to fetch changes up to 482c84e906e535072c55395acabd3a58e9443d12:

  i2c: designware: Add doorbell support for Mendocino (2023-04-20 18:20:05 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Total usage stats now include all that returned error (instead of some).
- Remove maximum hash statesize limit.
- Add cloning support for hmac and unkeyed hashes.
- Demote BUG_ON in crypto_unregister_alg to a WARN_ON.

Algorithms:

- Use RIP-relative addressing on x86 to prepare for PIE build.
- Add accelerated AES/GCM stitched implementation on powerpc P10.
- Add some test vectors for cmac(camellia).
- Remove failure case where jent is unavailable outside of FIPS mode in drbg.
- Add permanent and intermittent health error checks in jitter RNG.

Drivers:

- Add support for 402xx devices in qat.
- Add support for HiSTB TRNG.
- Fix hash concurrency issues in stm32.
- Add OP-TEE firmware support in caam.
----------------------------------------------------------------

Anthony Yznaga (1):
      padata: use alignment when calculating the number of worker threads

Ard Biesheuvel (13):
      crypto: x86/aegis128 - Use RIP-relative addressing
      crypto: x86/aesni - Use RIP-relative addressing
      crypto: x86/aria - Use RIP-relative addressing
      crypto: x86/camellia - Use RIP-relative addressing
      crypto: x86/cast5 - Use RIP-relative addressing
      crypto: x86/cast6 - Use RIP-relative addressing
      crypto: x86/crc32c - Use RIP-relative addressing
      crypto: x86/des3 - Use RIP-relative addressing
      crypto: x86/ghash - Use RIP-relative addressing
      crypto: x86/sha256 - Use RIP-relative addressing
      crypto: x86/aesni - Use local .L symbols for code
      crypto: x86/crc32 - Use local .L symbols for code
      crypto: x86/sha - Use local .L symbols for code

Arnd Bergmann (1):
      crypto: ixp4xx - fix building wiht 64-bit dma_addr_t

Bhupesh Sharma (4):
      dt-bindings: qcom-qce: Convert bindings to yaml
      MAINTAINERS: Add qcom-qce dt-binding file to QUALCOMM CRYPTO DRIVERS section
      dt-bindings: qcom-qce: Add 'interconnects' and 'interconnect-names'
      dt-bindings: qcom-qce: Add 'iommus' to optional properties

Bjorn Helgaas (6):
      crypto: qat - drop redundant adf_enable_aer()
      crypto: cavium/nitrox - remove unnecessary aer.h include
      crypto: hisilicon/hpre - remove unnecessary aer.h include
      crypto: hisilicon/qm - remove unnecessary aer.h include
      crypto: hisilicon/sec - remove unnecessary aer.h include
      crypto: hisilicon/zip - remove unnecessary aer.h include

Christophe JAILLET (2):
      crypto: caam - Clear some memory in instantiate_rng
      crypto: mxs-dcp - Use the devm_clk_get_optional_enabled() helper

Damian Muszynski (1):
      crypto: qat - add support for 402xx devices

Danny Tsen (8):
      crypto: p10-aes-gcm - Glue code for AES/GCM stitched implementation
      crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation
      crypto: p10-aes-gcm - Supporting functions for AES
      crypto: p10-aes-gcm - Supporting functions for ghash
      crypto: p10-aes-gcm - A perl script to process PowerPC assembler source.
      crypto: p10-aes-gcm - Update Kconfig and Makefile
      crypto: p10-aes-gcm - Remove POWER10_CPU dependency
      powerpc: Move Power10 feature PPC_MODULE_FEATURE_P10

David Howells (1):
      crypto: testmgr - Add some test vectors for cmac(camellia)

David Yang (1):
      crypto: hisilicon/trng - add support for HiSTB TRNG

Eric Biggers (2):
      crypto: arm64/aes-neonbs - fix crash with CFI enabled
      crypto: testmgr - fix RNG performance in fuzz tests

Gaurav Jain (1):
      crypto: caam/jr - add .shutdown hook

Heiner Kallweit (3):
      hwrng: meson - remove unused member of struct meson_rng_data
      hwrng: meson - use devm_clk_get_optional_enabled
      hwrng: meson - remove not needed call to platform_set_drvdata

Herbert Xu (34):
      crypto: acomp - Be more careful with request flags
      crypto: qat - Include algapi.h for low-level Crypto API
      crypto: algapi - Move stat reporting into algapi
      crypto: aead - Count error stats differently
      crypto: akcipher - Count error stats differently
      crypto: hash - Count error stats differently
      crypto: acomp - Count error stats differently
      crypto: kpp - Count error stats differently
      crypto: skcipher - Count error stats differently
      crypto: rng - Count error stats differently
      crypto: api - Move MODULE_ALIAS_CRYPTO to algapi.h
      crypto: api - Check CRYPTO_USER instead of NET for report
      crypto: stm32 - Save 54 CSR registers
      crypto: stm32 - Move polling into do_one_request
      crypto: stm32 - Simplify finup
      crypto: stm32 - Remove unused hdev->err field
      crypto: stm32 - Move hash state into separate structure
      crypto: stm32 - Remove unused HASH_FLAGS_ERRORS
      crypto: stm32 - Fix empty message processing
      crypto: stm32 - Save and restore between each request
      crypto: hash - Fix kdoc errors about HASH_ALG_COMMON
      crypto: ccree - Depend on HAS_IOMEM
      crypto: lib/utils - Move utilities into new header
      crypto: drbg - Only fail when jent is unavailable in FIPS mode
      crypto: algif_hash - Allocate hash state with kmalloc
      crypto: hash - Remove maximum statesize limit
      crypto: ixp4xx - Do not check word size when compile testing
      crypto: api - Move low-level functions into algapi.h
      crypto: api - Add crypto_tfm_get
      crypto: api - Add crypto_clone_tfm
      crypto: hash - Add crypto_clone_ahash/shash
      crypto: hmac - Add support for cloning
      crypto: cryptd - Convert hash to use modern init_tfm/exit_tfm
      crypto: cryptd - Add support for cloning hashes

Horia GeantA (2):
      crypto: caam - reduce page 0 regs access to minimum
      crypto: caam - OP-TEE firmware support

Horia Geanta (1):
      drivers: crypto: caam/jr - Allow quiesce when quiesced

Jeremi Piotrowski (1):
      crypto: ccp - Clear PSP interrupt status register before calling handler

Jonathan McDowell (2):
      crypto: safexcel - Raise firmware load failure message to error
      crypto: safexcel - Cleanup ring IRQ workqueues on load failure

Krzysztof Kozlowski (2):
      crypto: atmel-sha204a - Mark OF related data as maybe unused
      crypto: img-hash - Fix img_hash_match unused warning

Luis Chamberlain (1):
      crypto: fips - simplify one-level sysctl registration for crypto_sysctl_table

Mario Limonciello (13):
      crypto: ccp - Drop TEE support for IRQ handler
      crypto: ccp - Add a header for multiple drivers to use `__psp_pa`
      crypto: ccp - Move some PSP mailbox bit definitions into common header
      crypto: ccp - Add support for an interface for platform features
      crypto: ccp - Enable platform access interface on client PSP parts
      crypto: ccp - Add support for ringing a platform doorbell
      crypto: ccp - Don't initialize CCP for PSP 0x1649
      crypto: ccp - Drop extra doorbell checks
      crypto: ccp - Bump up doorbell debug message to error
      crypto: ccp - Return doorbell status code as an argument
      crypto: ccp - Use lower 8 bytes to communicate with doorbell command register
      i2c: designware: Use PCI PSP driver for communication
      i2c: designware: Add doorbell support for Mendocino

Neal Liu (2):
      crypto: aspeed - add error handling if dmam_alloc_coherent() failed
      crypto: aspeed - fix uninitialized symbol 'idx' warning

Randy Dunlap (1):
      async_tx: fix kernel-doc notation warnings

Ryan Wanner (4):
      crypto: atmel-sha - Add zero length message digest support for hmac
      crypto: atmel-tdes - Detecting in-place operations with two sg lists
      crypto: atmel-aes - Detecting in-place operations two sg lists
      crypto: atmel-aes - Match cfb block size with generic implementation

Shashank Gupta (6):
      crypto: qat - delay sysfs initialization
      crypto: qat - fix concurrency issue when device state changes
      crypto: qat - replace state machine calls
      crypto: qat - refactor device restart logic
      crypto: qat - make state machine functions static
      crypto: qat - fix apply custom thread-service mapping for dc service

Stephan Müller (1):
      crypto: jitter - permanent and intermittent health errors

Suman Anna (1):
      crypto: sa2ul - Select CRYPTO_DES

Thara Gopinath (2):
      crypto: qce - Add support to initialize interconnect path
      crypto: qce - Make clocks optional

Thomas Weißschuh (1):
      padata: Make kobj_type structure constant

Toke Høiland-Jørgensen (1):
      crypto: api - Demote BUG_ON() in crypto_unregister_alg() to a WARN_ON()

Tom Zanussi (3):
      crypto: keembay - Move driver to drivers/crypto/intel/keembay
      crypto: ixp4xx - Move driver to drivers/crypto/intel/ixp4xx
      crypto: qat - Move driver to drivers/crypto/intel/qat

Uwe Kleine-König (4):
      hwrng: xgene - Simplify using dev_err_probe()
      hwrng: xgene - Simplify using devm_clk_get_optional_enabled()
      hwrng: xgene - Improve error reporting for problems during .remove()
      crypto: keembay - Drop if with an always false condition

Vladimir Zapolskiy (4):
      dt-bindings: qcom-qce: Add new SoC compatible strings for Qualcomm QCE IP
      dt-bindings: qcom-qce: document optional clocks and clock-names properties
      arm64: dts: qcom: sm8550: add QCE IP family compatible values
      crypto: qce - Add a QCE IP family compatible 'qcom,qce'

Yang Li (4):
      crypto: aspeed - Use devm_platform_ioremap_resource()
      crypto: ccree - Use devm_platform_get_and_ioremap_resource()
      crypto: img-hash - Use devm_platform_get_and_ioremap_resource()
      crypto: stm32 - Use devm_platform_get_and_ioremap_resource()

Ye Xingchen (1):
      crypto: p10-aes-gcm - remove duplicate include header

Yu Zhe (4):
      hwrng: xgene - remove unnecessary (void*) conversions
      crypto: crypto4xx - remove unnecessary (void*) conversions
      crypto: drivers - remove unnecessary (void*) conversions
      crypto: caam - remove unnecessary (void*) conversions

 .../devicetree/bindings/crypto/qcom-qce.txt        |   25 -
 .../devicetree/bindings/crypto/qcom-qce.yaml       |  123 ++
 MAINTAINERS                                        |   33 +-
 arch/arm64/boot/dts/qcom/sm8550.dtsi               |    2 +-
 arch/arm64/crypto/aes-neonbs-core.S                |    9 +-
 arch/powerpc/crypto/Kconfig                        |   17 +
 arch/powerpc/crypto/Makefile                       |   13 +
 arch/powerpc/crypto/aes-gcm-p10-glue.c             |  343 +++++
 arch/powerpc/crypto/aes-gcm-p10.S                  | 1521 ++++++++++++++++++++
 arch/powerpc/crypto/aesp8-ppc.pl                   |  585 ++++++++
 arch/powerpc/crypto/ghashp8-ppc.pl                 |  370 +++++
 arch/powerpc/crypto/ppc-xlate.pl                   |  229 +++
 arch/powerpc/include/asm/cpufeature.h              |    1 +
 arch/x86/crypto/aegis128-aesni-asm.S               |    6 +-
 arch/x86/crypto/aesni-intel_asm.S                  |  198 +--
 arch/x86/crypto/aesni-intel_avx-x86_64.S           |  254 ++--
 arch/x86/crypto/aria-aesni-avx-asm_64.S            |   28 +-
 arch/x86/crypto/aria-aesni-avx2-asm_64.S           |   28 +-
 arch/x86/crypto/aria-gfni-avx512-asm_64.S          |   24 +-
 arch/x86/crypto/camellia-aesni-avx-asm_64.S        |   30 +-
 arch/x86/crypto/camellia-aesni-avx2-asm_64.S       |   30 +-
 arch/x86/crypto/camellia-x86_64-asm_64.S           |    6 +-
 arch/x86/crypto/cast5-avx-x86_64-asm_64.S          |   38 +-
 arch/x86/crypto/cast6-avx-x86_64-asm_64.S          |   32 +-
 arch/x86/crypto/crc32-pclmul_asm.S                 |   16 +-
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |   70 +-
 arch/x86/crypto/des3_ede-asm_64.S                  |   96 +-
 arch/x86/crypto/ghash-clmulni-intel_asm.S          |    4 +-
 arch/x86/crypto/sha1_avx2_x86_64_asm.S             |   25 +-
 arch/x86/crypto/sha256-avx-asm.S                   |   16 +-
 arch/x86/crypto/sha256-avx2-asm.S                  |   54 +-
 arch/x86/crypto/sha256-ssse3-asm.S                 |   16 +-
 arch/x86/crypto/sha512-avx-asm.S                   |    8 +-
 arch/x86/crypto/sha512-avx2-asm.S                  |   16 +-
 arch/x86/crypto/sha512-ssse3-asm.S                 |    8 +-
 arch/x86/kvm/svm/sev.c                             |    1 +
 crypto/acompress.c                                 |   81 +-
 crypto/aead.c                                      |   98 +-
 crypto/ahash.c                                     |  144 +-
 crypto/akcipher.c                                  |   52 +-
 crypto/algapi.c                                    |  219 +--
 crypto/algif_hash.c                                |   19 +-
 crypto/api.c                                       |   63 +-
 crypto/async_tx/async_pq.c                         |   10 +-
 crypto/async_tx/async_tx.c                         |    4 +-
 crypto/compress.h                                  |   26 +
 crypto/cryptd.c                                    |   34 +-
 crypto/crypto_user_stat.c                          |  183 +--
 crypto/drbg.c                                      |    2 +-
 crypto/fips.c                                      |   11 +-
 crypto/hash.h                                      |   40 +
 crypto/hmac.c                                      |   15 +
 crypto/internal.h                                  |   10 +
 crypto/jitterentropy-kcapi.c                       |   51 +-
 crypto/jitterentropy.c                             |  144 +-
 crypto/jitterentropy.h                             |    1 -
 crypto/kpp.c                                       |   53 +-
 crypto/rng.c                                       |   65 +-
 crypto/scompress.c                                 |   39 +-
 crypto/shash.c                                     |  181 ++-
 crypto/skcipher.c                                  |  113 +-
 crypto/tcrypt.c                                    |   11 +-
 crypto/testmgr.c                                   |  272 ++--
 crypto/testmgr.h                                   |   47 +
 drivers/char/hw_random/meson-rng.c                 |   29 +-
 drivers/char/hw_random/xgene-rng.c                 |   46 +-
 drivers/crypto/Kconfig                             |   21 +-
 drivers/crypto/Makefile                            |    4 +-
 drivers/crypto/amcc/crypto4xx_core.c               |    2 +-
 drivers/crypto/aspeed/aspeed-acry.c                |   14 +-
 drivers/crypto/atmel-aes.c                         |   16 +-
 drivers/crypto/atmel-sha.c                         |   34 +-
 drivers/crypto/atmel-sha204a.c                     |    2 +-
 drivers/crypto/atmel-tdes.c                        |   15 +-
 drivers/crypto/caam/caamalg.c                      |   21 +-
 drivers/crypto/caam/caamhash.c                     |   10 +-
 drivers/crypto/caam/caampkc.c                      |    6 +-
 drivers/crypto/caam/caamrng.c                      |    6 +-
 drivers/crypto/caam/ctrl.c                         |  112 +-
 drivers/crypto/caam/debugfs.c                      |   12 +-
 drivers/crypto/caam/debugfs.h                      |    7 +-
 drivers/crypto/caam/dpseci-debugfs.c               |    2 +-
 drivers/crypto/caam/intern.h                       |    1 +
 drivers/crypto/caam/jr.c                           |   61 +-
 drivers/crypto/cavium/nitrox/nitrox_main.c         |    1 -
 drivers/crypto/ccp/Makefile                        |    3 +-
 drivers/crypto/ccp/platform-access.c               |  215 +++
 drivers/crypto/ccp/platform-access.h               |   35 +
 drivers/crypto/ccp/psp-dev.c                       |   38 +-
 drivers/crypto/ccp/psp-dev.h                       |   11 +-
 drivers/crypto/ccp/sev-dev.c                       |   16 +-
 drivers/crypto/ccp/sev-dev.h                       |    2 +-
 drivers/crypto/ccp/sp-dev.h                        |   10 +
 drivers/crypto/ccp/sp-pci.c                        |   11 +-
 drivers/crypto/ccp/tee-dev.c                       |   17 +-
 drivers/crypto/ccree/cc_driver.c                   |    4 +-
 drivers/crypto/hifn_795x.c                         |   24 +-
 drivers/crypto/hisilicon/Kconfig                   |    7 +
 drivers/crypto/hisilicon/Makefile                  |    2 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |    1 -
 drivers/crypto/hisilicon/qm.c                      |    1 -
 drivers/crypto/hisilicon/sec2/sec_main.c           |    1 -
 drivers/crypto/hisilicon/trng/Makefile             |    3 +
 drivers/crypto/hisilicon/trng/trng-stb.c           |  176 +++
 drivers/crypto/hisilicon/zip/zip_main.c            |    1 -
 drivers/crypto/img-hash.c                          |    7 +-
 drivers/crypto/inside-secure/safexcel.c            |   39 +-
 drivers/crypto/intel/Kconfig                       |    5 +
 drivers/crypto/intel/Makefile                      |    5 +
 drivers/crypto/intel/ixp4xx/Kconfig                |   14 +
 drivers/crypto/intel/ixp4xx/Makefile               |    2 +
 drivers/crypto/{ => intel/ixp4xx}/ixp4xx_crypto.c  |   15 +-
 drivers/crypto/{ => intel}/keembay/Kconfig         |    0
 drivers/crypto/{ => intel}/keembay/Makefile        |    0
 .../{ => intel}/keembay/keembay-ocs-aes-core.c     |    2 -
 .../crypto/{ => intel}/keembay/keembay-ocs-ecc.c   |    0
 .../{ => intel}/keembay/keembay-ocs-hcu-core.c     |    0
 drivers/crypto/{ => intel}/keembay/ocs-aes.c       |    0
 drivers/crypto/{ => intel}/keembay/ocs-aes.h       |    0
 drivers/crypto/{ => intel}/keembay/ocs-hcu.c       |    0
 drivers/crypto/{ => intel}/keembay/ocs-hcu.h       |    0
 drivers/crypto/{ => intel}/qat/Kconfig             |    0
 drivers/crypto/{ => intel}/qat/Makefile            |    0
 drivers/crypto/{ => intel}/qat/qat_4xxx/Makefile   |    0
 .../{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.c    |   62 +-
 .../{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.h    |    9 +-
 drivers/crypto/{ => intel}/qat/qat_4xxx/adf_drv.c  |   31 +-
 drivers/crypto/{ => intel}/qat/qat_c3xxx/Makefile  |    0
 .../{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.c  |    2 +-
 .../{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.h  |    0
 drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_drv.c |   24 +-
 .../crypto/{ => intel}/qat/qat_c3xxxvf/Makefile    |    0
 .../qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c          |    0
 .../qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h          |    0
 .../crypto/{ => intel}/qat/qat_c3xxxvf/adf_drv.c   |   13 +-
 drivers/crypto/{ => intel}/qat/qat_c62x/Makefile   |    0
 .../{ => intel}/qat/qat_c62x/adf_c62x_hw_data.c    |    2 +-
 .../{ => intel}/qat/qat_c62x/adf_c62x_hw_data.h    |    0
 drivers/crypto/{ => intel}/qat/qat_c62x/adf_drv.c  |   24 +-
 drivers/crypto/{ => intel}/qat/qat_c62xvf/Makefile |    0
 .../qat/qat_c62xvf/adf_c62xvf_hw_data.c            |    0
 .../qat/qat_c62xvf/adf_c62xvf_hw_data.h            |    0
 .../crypto/{ => intel}/qat/qat_c62xvf/adf_drv.c    |   13 +-
 drivers/crypto/{ => intel}/qat/qat_common/Makefile |    0
 .../{ => intel}/qat/qat_common/adf_accel_devices.h |    5 +-
 .../{ => intel}/qat/qat_common/adf_accel_engine.c  |    0
 .../crypto/{ => intel}/qat/qat_common/adf_admin.c  |    0
 .../crypto/{ => intel}/qat/qat_common/adf_aer.c    |   39 +-
 .../crypto/{ => intel}/qat/qat_common/adf_cfg.c    |    0
 .../crypto/{ => intel}/qat/qat_common/adf_cfg.h    |    0
 .../{ => intel}/qat/qat_common/adf_cfg_common.h    |    0
 .../{ => intel}/qat/qat_common/adf_cfg_strings.h   |    0
 .../{ => intel}/qat/qat_common/adf_cfg_user.h      |    0
 .../{ => intel}/qat/qat_common/adf_common_drv.h    |   10 +-
 .../{ => intel}/qat/qat_common/adf_ctl_drv.c       |   30 +-
 .../{ => intel}/qat/qat_common/adf_dev_mgr.c       |    2 +
 .../{ => intel}/qat/qat_common/adf_gen2_config.c   |    0
 .../{ => intel}/qat/qat_common/adf_gen2_config.h   |    0
 .../{ => intel}/qat/qat_common/adf_gen2_dc.c       |    0
 .../{ => intel}/qat/qat_common/adf_gen2_dc.h       |    0
 .../{ => intel}/qat/qat_common/adf_gen2_hw_data.c  |    0
 .../{ => intel}/qat/qat_common/adf_gen2_hw_data.h  |    0
 .../{ => intel}/qat/qat_common/adf_gen2_pfvf.c     |    0
 .../{ => intel}/qat/qat_common/adf_gen2_pfvf.h     |    0
 .../{ => intel}/qat/qat_common/adf_gen4_dc.c       |    0
 .../{ => intel}/qat/qat_common/adf_gen4_dc.h       |    0
 .../{ => intel}/qat/qat_common/adf_gen4_hw_data.c  |    0
 .../{ => intel}/qat/qat_common/adf_gen4_hw_data.h  |    0
 .../{ => intel}/qat/qat_common/adf_gen4_pfvf.c     |    0
 .../{ => intel}/qat/qat_common/adf_gen4_pfvf.h     |    0
 .../{ => intel}/qat/qat_common/adf_gen4_pm.c       |    0
 .../{ => intel}/qat/qat_common/adf_gen4_pm.h       |    0
 .../{ => intel}/qat/qat_common/adf_hw_arbiter.c    |    2 +-
 .../crypto/{ => intel}/qat/qat_common/adf_init.c   |   96 +-
 .../crypto/{ => intel}/qat/qat_common/adf_isr.c    |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_msg.h      |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_pf_msg.c   |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_pf_msg.h   |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_pf_proto.c |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_pf_proto.h |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_utils.c    |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_utils.h    |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_vf_msg.c   |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_vf_msg.h   |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_vf_proto.c |    0
 .../{ => intel}/qat/qat_common/adf_pfvf_vf_proto.h |    0
 .../crypto/{ => intel}/qat/qat_common/adf_sriov.c  |   10 +-
 .../crypto/{ => intel}/qat/qat_common/adf_sysfs.c  |   23 +-
 .../{ => intel}/qat/qat_common/adf_transport.c     |    0
 .../{ => intel}/qat/qat_common/adf_transport.h     |    0
 .../qat/qat_common/adf_transport_access_macros.h   |    0
 .../qat/qat_common/adf_transport_debug.c           |    0
 .../qat/qat_common/adf_transport_internal.h        |    0
 .../crypto/{ => intel}/qat/qat_common/adf_vf_isr.c |    3 +-
 .../crypto/{ => intel}/qat/qat_common/icp_qat_fw.h |    0
 .../{ => intel}/qat/qat_common/icp_qat_fw_comp.h   |    0
 .../qat/qat_common/icp_qat_fw_init_admin.h         |    0
 .../{ => intel}/qat/qat_common/icp_qat_fw_la.h     |    0
 .../qat/qat_common/icp_qat_fw_loader_handle.h      |    0
 .../{ => intel}/qat/qat_common/icp_qat_fw_pke.h    |    0
 .../{ => intel}/qat/qat_common/icp_qat_hal.h       |    0
 .../crypto/{ => intel}/qat/qat_common/icp_qat_hw.h |    0
 .../qat/qat_common/icp_qat_hw_20_comp.h            |    0
 .../qat/qat_common/icp_qat_hw_20_comp_defs.h       |    0
 .../{ => intel}/qat/qat_common/icp_qat_uclo.h      |    0
 .../crypto/{ => intel}/qat/qat_common/qat_algs.c   |    0
 .../{ => intel}/qat/qat_common/qat_algs_send.c     |    0
 .../{ => intel}/qat/qat_common/qat_algs_send.h     |    0
 .../{ => intel}/qat/qat_common/qat_asym_algs.c     |    0
 drivers/crypto/{ => intel}/qat/qat_common/qat_bl.c |    0
 drivers/crypto/{ => intel}/qat/qat_common/qat_bl.h |    0
 .../{ => intel}/qat/qat_common/qat_comp_algs.c     |    0
 .../{ => intel}/qat/qat_common/qat_comp_req.h      |    0
 .../{ => intel}/qat/qat_common/qat_compression.c   |    0
 .../{ => intel}/qat/qat_common/qat_compression.h   |    0
 .../crypto/{ => intel}/qat/qat_common/qat_crypto.c |    0
 .../crypto/{ => intel}/qat/qat_common/qat_crypto.h |    0
 .../crypto/{ => intel}/qat/qat_common/qat_hal.c    |    1 +
 .../crypto/{ => intel}/qat/qat_common/qat_uclo.c   |    1 +
 .../crypto/{ => intel}/qat/qat_dh895xcc/Makefile   |    0
 .../qat/qat_dh895xcc/adf_dh895xcc_hw_data.c        |    2 +-
 .../qat/qat_dh895xcc/adf_dh895xcc_hw_data.h        |    0
 .../crypto/{ => intel}/qat/qat_dh895xcc/adf_drv.c  |   24 +-
 .../crypto/{ => intel}/qat/qat_dh895xccvf/Makefile |    0
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |    0
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h    |    0
 .../{ => intel}/qat/qat_dh895xccvf/adf_drv.c       |   13 +-
 drivers/crypto/mxs-dcp.c                           |   21 +-
 drivers/crypto/qce/core.c                          |   23 +-
 drivers/crypto/qce/core.h                          |    1 +
 drivers/crypto/sa2ul.c                             |    6 +-
 drivers/crypto/sahara.c                            |    4 +-
 drivers/crypto/stm32/stm32-hash.c                  |  361 ++---
 drivers/i2c/busses/Kconfig                         |    5 +-
 drivers/i2c/busses/i2c-designware-amdpsp.c         |  205 +--
 drivers/i2c/busses/i2c-designware-core.h           |    1 -
 drivers/i2c/busses/i2c-designware-platdrv.c        |    1 -
 drivers/tee/amdtee/call.c                          |    2 +-
 drivers/tee/amdtee/shm_pool.c                      |    2 +-
 include/crypto/acompress.h                         |  132 +-
 include/crypto/aead.h                              |   22 +
 include/crypto/akcipher.h                          |  102 +-
 include/crypto/algapi.h                            |   93 +-
 include/crypto/hash.h                              |   95 +-
 include/crypto/internal/acompress.h                |   43 +-
 include/crypto/internal/hash.h                     |    2 -
 include/crypto/internal/scompress.h                |   15 +-
 include/crypto/kpp.h                               |   73 +-
 include/crypto/rng.h                               |   65 +-
 include/crypto/skcipher.h                          |   22 +
 include/crypto/utils.h                             |   73 +
 include/linux/crypto.h                             |  236 +--
 include/linux/psp-platform-access.h                |   65 +
 include/linux/psp-sev.h                            |    8 -
 include/linux/psp.h                                |   29 +
 kernel/padata.c                                    |    4 +-
 lib/crypto/utils.c                                 |    2 +-
 257 files changed, 6776 insertions(+), 2730 deletions(-)
 delete mode 100644 Documentation/devicetree/bindings/crypto/qcom-qce.txt
 create mode 100644 Documentation/devicetree/bindings/crypto/qcom-qce.yaml
 create mode 100644 arch/powerpc/crypto/aes-gcm-p10-glue.c
 create mode 100644 arch/powerpc/crypto/aes-gcm-p10.S
 create mode 100644 arch/powerpc/crypto/aesp8-ppc.pl
 create mode 100644 arch/powerpc/crypto/ghashp8-ppc.pl
 create mode 100644 arch/powerpc/crypto/ppc-xlate.pl
 create mode 100644 crypto/compress.h
 create mode 100644 crypto/hash.h
 create mode 100644 drivers/crypto/ccp/platform-access.c
 create mode 100644 drivers/crypto/ccp/platform-access.h
 create mode 100644 drivers/crypto/hisilicon/trng/trng-stb.c
 create mode 100644 drivers/crypto/intel/Kconfig
 create mode 100644 drivers/crypto/intel/Makefile
 create mode 100644 drivers/crypto/intel/ixp4xx/Kconfig
 create mode 100644 drivers/crypto/intel/ixp4xx/Makefile
 rename drivers/crypto/{ => intel/ixp4xx}/ixp4xx_crypto.c (99%)
 rename drivers/crypto/{ => intel}/keembay/Kconfig (100%)
 rename drivers/crypto/{ => intel}/keembay/Makefile (100%)
 rename drivers/crypto/{ => intel}/keembay/keembay-ocs-aes-core.c (99%)
 rename drivers/crypto/{ => intel}/keembay/keembay-ocs-ecc.c (100%)
 rename drivers/crypto/{ => intel}/keembay/keembay-ocs-hcu-core.c (100%)
 rename drivers/crypto/{ => intel}/keembay/ocs-aes.c (100%)
 rename drivers/crypto/{ => intel}/keembay/ocs-aes.h (100%)
 rename drivers/crypto/{ => intel}/keembay/ocs-hcu.c (100%)
 rename drivers/crypto/{ => intel}/keembay/ocs-hcu.h (100%)
 rename drivers/crypto/{ => intel}/qat/Kconfig (100%)
 rename drivers/crypto/{ => intel}/qat/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_4xxx/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.c (87%)
 rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.h (86%)
 rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_drv.c (95%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxx/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.c (98%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_drv.c (93%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_drv.c (96%)
 rename drivers/crypto/{ => intel}/qat/qat_c62x/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_c62x_hw_data.c (98%)
 rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_c62x_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_drv.c (93%)
 rename drivers/crypto/{ => intel}/qat/qat_c62xvf/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_c62xvf_hw_data.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_c62xvf_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_drv.c (96%)
 rename drivers/crypto/{ => intel}/qat/qat_common/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_accel_devices.h (97%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_accel_engine.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_admin.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_aer.c (82%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_common.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_strings.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_user.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_common_drv.h (96%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_ctl_drv.c (95%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_dev_mgr.c (99%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_config.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_config.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_dc.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_dc.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_hw_data.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_pfvf.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_pfvf.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_dc.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_dc.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_hw_data.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pfvf.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pfvf.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pm.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pm.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_hw_arbiter.c (98%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_init.c (85%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_isr.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_msg.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_msg.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_msg.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_proto.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_proto.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_utils.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_utils.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_msg.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_msg.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_proto.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_proto.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_sriov.c (96%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_sysfs.c (88%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_access_macros.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_debug.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_internal.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/adf_vf_isr.c (99%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_comp.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_init_admin.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_la.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_loader_handle.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_pke.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hal.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw_20_comp.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw_20_comp_defs.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_uclo.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs_send.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs_send.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_asym_algs.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_bl.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_bl.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_comp_algs.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_comp_req.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_compression.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_compression.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_crypto.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_crypto.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_hal.c (99%)
 rename drivers/crypto/{ => intel}/qat/qat_common/qat_uclo.c (99%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c (99%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_drv.c (93%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/Makefile (100%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c (100%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h (100%)
 rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_drv.c (96%)
 create mode 100644 include/crypto/utils.h
 create mode 100644 include/linux/psp-platform-access.h
 create mode 100644 include/linux/psp.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.4
  2023-04-24  4:52                                     ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
@ 2023-04-26 17:06                                       ` pr-tracker-bot
  2023-06-29  5:06                                       ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-04-26 17:06 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 24 Apr 2023 12:52:27 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/733f7e9c18c5e377025c1bfdce6bc9a7d55649be

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.4
  2023-03-05 10:15                                       ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
  2023-03-05 19:37                                         ` pr-tracker-bot
@ 2023-05-07 13:19                                         ` Herbert Xu
  2023-05-07 18:12                                           ` pr-tracker-bot
  2023-05-29  3:41                                           ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-05-07 13:19 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 482c84e906e535072c55395acabd3a58e9443d12:

  i2c: designware: Add doorbell support for Mendocino (2023-04-20 18:20:05 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p2 

for you to fetch changes up to b8969a1b69672b163d057e7745ebc915df689211:

  crypto: api - Fix CRYPTO_USER checks for report function (2023-05-02 18:22:24 +0800)

----------------------------------------------------------------
This push fixes the following problems:

- A long-standing bug in crypto_engine.
- A buggy but harmless check in the sun8i-ss driver. 
- A regression in the CRYPTO_USER interface.
----------------------------------------------------------------

Christophe JAILLET (1):
      crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs()

Olivier Bacon (1):
      crypto: engine - fix crypto_queue backlog handling

Ondrej Mosnacek (1):
      crypto: api - Fix CRYPTO_USER checks for report function

 crypto/acompress.c                                  | 2 +-
 crypto/aead.c                                       | 2 +-
 crypto/ahash.c                                      | 2 +-
 crypto/akcipher.c                                   | 2 +-
 crypto/algapi.c                                     | 3 +++
 crypto/crypto_engine.c                              | 6 +++---
 crypto/kpp.c                                        | 2 +-
 crypto/rng.c                                        | 2 +-
 crypto/scompress.c                                  | 2 +-
 crypto/shash.c                                      | 2 +-
 crypto/skcipher.c                                   | 2 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 2 +-
 12 files changed, 16 insertions(+), 13 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.4
  2023-05-07 13:19                                         ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
@ 2023-05-07 18:12                                           ` pr-tracker-bot
  2023-05-29  3:41                                           ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-05-07 18:12 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sun, 7 May 2023 21:19:48 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6f69c981811c8b019d7882839e31c34ea8330860

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.4
  2023-05-07 13:19                                         ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
  2023-05-07 18:12                                           ` pr-tracker-bot
@ 2023-05-29  3:41                                           ` Herbert Xu
  2023-05-29 11:39                                             ` pr-tracker-bot
  2023-07-09 23:51                                             ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-05-29  3:41 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit b8969a1b69672b163d057e7745ebc915df689211:

  crypto: api - Fix CRYPTO_USER checks for report function (2023-05-02 18:22:24 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.4-p3 

for you to fetch changes up to 6ab39f99927eed605728b02d512438d828183c97:

  crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors (2023-05-24 18:10:27 +0800)

----------------------------------------------------------------
This push fixes an alignment crash in x86/aria.
----------------------------------------------------------------

Ard Biesheuvel (1):
      crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors

 arch/x86/crypto/aria-aesni-avx-asm_64.S | 2 --
 1 file changed, 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.4
  2023-05-29  3:41                                           ` Herbert Xu
@ 2023-05-29 11:39                                             ` pr-tracker-bot
  2023-07-09 23:51                                             ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-05-29 11:39 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 29 May 2023 11:41:40 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.4-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/7a6c8e512fa072cfe8ad7a3b26666b6f26435870

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.5
  2023-04-24  4:52                                     ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
  2023-04-26 17:06                                       ` pr-tracker-bot
@ 2023-06-29  5:06                                       ` Herbert Xu
  2023-07-01  5:04                                         ` pr-tracker-bot
  2023-08-28  9:22                                         ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-06-29  5:06 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

Please note that there is a nasty merge conflict in the directory
crypto/asymmetric because of the conflicting changes in mainline
versus what's in cryptodev.

For the resolution, please pick the code from cryptodev as the
linear interface makes the previous fix-up in mainline unnecessary.

For the time being there is still an unnecessary copy in the API
for the software case but hopefully that will go away once I
finish the conversion of the underlying algorithm code to use
linear addresses instead of SG lists.

The following changes since commit ac9a78681b921877518763ba0e89202254349d1b:

  Linux 6.4-rc1 (2023-05-07 13:34:35 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.5-p1 

for you to fetch changes up to 486bfb05913ac9969a3a71a4dc48f17f31cb162d:

  crypto: akcipher - Do not copy dst if it is NULL (2023-06-27 17:59:52 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Add linear akcipher/sig API.
- Add tfm cloning (hmac, cmac).
- Add statesize to crypto_ahash.

Algorithms:

- Allow only odd e and restrict value in FIPS mode for RSA.
- Replace LFSR with SHA3-256 in jitter.
- Add interface for gathering of raw entropy in jitter.

Drivers:

- Fix race on data_avail and actual data in hwrng/virtio.
- Add hash and HMAC support in starfive.
- Add RSA algo support in starfive.
- Add support for PCI device 0x156E in ccp.
----------------------------------------------------------------

Adam Guerin (2):
      crypto: qat - move returns to default case
      crypto: qat - extend configuration for 4xxx

Arnd Bergmann (2):
      crypto: aegis128-neon - add header for internal prototypes
      crypto: marvell/cesa - Fix type mismatch warning

Bharat Bhushan (1):
      hwrng: cn10k - Add extended trng register support

Bhupesh Sharma (2):
      dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
      dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290

Damian Muszynski (1):
      crypto: qat - move dbgfs init to separate file

Dan Carpenter (1):
      crypto: ixp4xx - silence uninitialized variable warning

David Yang (2):
      hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
      crypto: engine - Fix struct crypto_engine_op doc

Dmitry Safonov (2):
      crypto: api - Remove crypto_init_ops()
      crypto: cipher - On clone do crypto_mod_get()

Eric Biggers (1):
      crypto: Kconfig - warn about performance overhead of CRYPTO_STATS

Franziska Naepelt (1):
      crypto: hmac - Add missing blank line

Giovanni Cabiddu (4):
      crypto: qat - add missing function declaration in adf_dbgfs.h
      crypto: qat - make fw images name constant
      crypto: qat - refactor fw config logic for 4xxx
      crypto: qat - do not export adf_init_admin_pm()

Hareshx Sankar Raj (2):
      crypto: qat - unmap buffer before free for DH
      crypto: qat - unmap buffers before free for RSA

Herbert Xu (28):
      hwrng: Kconfig - Add HAS_IOMEM dependencies for exynos/meson/mtk/npcm
      crypto: arm/sha1-neon - Fix clang function cast warnings
      crypto: arm/sha256-neon - Fix clang function cast warnings
      crypto: arm/sha512-neon - Fix clang function cast warnings
      crypto: hash - Add statesize to crypto_ahash
      crypto: hash - Make crypto_ahash_alg helper available
      hwrng: virtio - Fix race on data_avail and actual data
      crypto: lib/sha256 - Remove redundant and unused sha224_update
      crypto: lib/sha256 - Use generic code from sha256_base
      crypto: arm64/sha256-glue - Include module.h
      crypto: starfive - Depend on AMBA_PL08X instead of selecting it
      crypto: cmac - Use modern init_tfm/exit_tfm
      crypto: cipher - Add crypto_clone_cipher
      crypto: cmac - Add support for cloning
      crypto: shash - Allow cloning on algorithms with no init_tfm
      dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
      crypto: algboss - Add missing dependency on RNG2
      crypto: geniv - Split geniv out of AEAD Kconfig option
      crypto: api - Add __crypto_alloc_tfmgfp
      crypto: akcipher - Add sync interface without SG lists
      crypto: sig - Add interface for sign/verify
      KEYS: Add forward declaration in asymmetric-parser.h
      KEYS: asymmetric: Move sm2 code into x509_public_key
      KEYS: asymmetric: Use new crypto interface without scatterlists
      crypto: sm2 - Provide sm2_compute_z_digest when sm2 is disabled
      crypto: akcipher - Set request tfm on sync path
      crypto: sig - Fix verify call
      crypto: akcipher - Do not copy dst if it is NULL

Horia GeantA (1):
      crypto: caam - refactor RNG initialization

Jia Jie Ho (6):
      dt-bindings: crypto: Add StarFive crypto module
      crypto: starfive - Add crypto engine support
      crypto: starfive - Add hash and HMAC support
      crypto: starfive - Fix driver dependencies
      crypto: starfive - Update hash module irq handling
      crypto: starfive - Add RSA algo support

John Allen (1):
      crypto: ccp - Add support for PCI device 0x156E

Karthikeyan Gopal (2):
      crypto: qat - set deprecated capabilities as reserved
      crypto: qat - update slice mask for 4xxx devices

Lucas Segarra Fernandez (1):
      crypto: qat - expose pm_idle_enabled through sysfs

Mahmoud Adam (1):
      crypto: rsa - allow only odd e and restrict value in FIPS mode

Mario Limonciello (2):
      crypto: ccp - Validate that platform access mailbox registers are declared
      crypto: ccp - Add support for PCI device 0x17E0

Martin Kaiser (9):
      hwrng: imx-rngc - simpler check for available random bytes
      hwrng: imx-rngc - use bitfield macros to read rng type
      hwrng: imx-rngc - use BIT(x) for register bit defines
      hwrng: imx-rngc - mark the probe function as __init
      hwrng: imx-rngc - don't init of_device_id's data
      hwrng: imx-rngc - fix the timeout for init and self check
      hwrng: st - support compile-testing
      hwrng: st - keep clock enabled while hwrng is registered
      hwrng: imx-rngc - switch to DEFINE_SIMPLE_DEV_PM_OPS

Meenakshi Aggarwal (1):
      crypto: caam - optimize RNG sample size

Pankaj Gupta (1):
      crypto: caam - Fix soc_id matching

Randy Dunlap (1):
      crypto: nx - fix build warnings when DEBUG_FS is not enabled

Rob Herring (1):
      crypto: n2 - Use of_property_read_reg() to parse "reg"

Srujana Challa (2):
      crypto: octeontx2 - add support for AF to CPT PF uplink mbox
      crypto: octeontx2 - hardware configuration for inline IPsec

Stephan Müller (3):
      crypto: jitter - replace LFSR with SHA3-256
      crypto: jitter - add interface for gathering of raw entropy
      crypto: jitter - correct health test during initialization

Tero Kristo (1):
      crypto: sa2ul - change unsafe data size limit to 255 bytes

Uwe Kleine-König (1):
      crypto: atmel - Switch i2c drivers back to use .probe()

Victoria Milhoan (1):
      crypto: caam - adjust RNG timing to support more devices

Victoria Milhoan (b42089) (1):
      crypto: caam - add a test for the RNG

 Documentation/ABI/testing/sysfs-driver-qat         |  46 ++
 .../devicetree/bindings/crypto/qcom-qce.yaml       |  52 +-
 .../bindings/crypto/starfive,jh7110-crypto.yaml    |  70 ++
 MAINTAINERS                                        |   7 +
 arch/arm/crypto/sha1_neon_glue.c                   |  12 +-
 arch/arm/crypto/sha256_neon_glue.c                 |  12 +-
 arch/arm/crypto/sha512-neon-glue.c                 |  12 +-
 arch/arm64/crypto/sha256-glue.c                    |   3 +-
 crypto/Kconfig                                     |  66 +-
 crypto/Makefile                                    |   4 +-
 crypto/aegis-neon.h                                |  17 +
 crypto/aegis128-neon-inner.c                       |   1 +
 crypto/aegis128-neon.c                             |  12 +-
 crypto/ahash.c                                     |   9 +-
 crypto/akcipher.c                                  | 124 ++-
 crypto/api.c                                       |  27 +-
 crypto/asymmetric_keys/public_key.c                | 303 ++++---
 crypto/asymmetric_keys/x509_public_key.c           |  29 +-
 crypto/cipher.c                                    |  28 +
 crypto/cmac.c                                      |  36 +-
 crypto/hmac.c                                      |   1 +
 crypto/internal.h                                  |  22 +
 crypto/jitterentropy-kcapi.c                       | 192 ++++-
 crypto/jitterentropy-testing.c                     | 294 +++++++
 crypto/jitterentropy.c                             | 152 ++--
 crypto/jitterentropy.h                             |  20 +-
 crypto/rsa.c                                       |  36 +
 crypto/shash.c                                     |  12 +-
 crypto/sig.c                                       | 157 ++++
 crypto/sm2.c                                       | 104 ++-
 drivers/char/hw_random/Kconfig                     |  27 +-
 drivers/char/hw_random/Makefile                    |   1 +
 drivers/char/hw_random/cn10k-rng.c                 |  63 +-
 .../trng/trng-stb.c => char/hw_random/histb-rng.c} |  83 +-
 drivers/char/hw_random/imx-rngc.c                  |  53 +-
 drivers/char/hw_random/st-rng.c                    |  21 +-
 drivers/char/hw_random/virtio-rng.c                |  10 +-
 drivers/crypto/Kconfig                             |   1 +
 drivers/crypto/Makefile                            |   1 +
 drivers/crypto/atmel-ecc.c                         |   2 +-
 drivers/crypto/atmel-sha204a.c                     |   2 +-
 drivers/crypto/caam/Kconfig                        |   9 +
 drivers/crypto/caam/caamrng.c                      |  48 ++
 drivers/crypto/caam/ctrl.c                         | 272 ++++---
 drivers/crypto/caam/intern.h                       |   1 +
 drivers/crypto/caam/regs.h                         |  14 +-
 drivers/crypto/ccp/platform-access.c               |   5 +
 drivers/crypto/ccp/sp-pci.c                        |  43 +
 drivers/crypto/hisilicon/Kconfig                   |   7 -
 drivers/crypto/hisilicon/Makefile                  |   2 +-
 drivers/crypto/hisilicon/trng/Makefile             |   3 -
 drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c        |   2 +-
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   | 229 ++++--
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h   |   2 +-
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |  45 +-
 drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c       |  12 +-
 drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c     |  12 +-
 drivers/crypto/intel/qat/qat_c62x/adf_drv.c        |  12 +-
 drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c      |  12 +-
 drivers/crypto/intel/qat/qat_common/Makefile       |   4 +-
 .../intel/qat/qat_common/adf_accel_devices.h       |   2 +-
 .../crypto/intel/qat/qat_common/adf_accel_engine.c |   2 +-
 drivers/crypto/intel/qat/qat_common/adf_admin.c    |   1 -
 drivers/crypto/intel/qat/qat_common/adf_cfg.c      |  28 +-
 drivers/crypto/intel/qat/qat_common/adf_cfg.h      |   2 +
 .../crypto/intel/qat/qat_common/adf_cfg_strings.h  |   8 +
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |   2 +-
 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c    |  69 ++
 drivers/crypto/intel/qat/qat_common/adf_dbgfs.h    |  29 +
 drivers/crypto/intel/qat/qat_common/adf_gen4_pm.c  |  12 +-
 drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h  |   1 +
 drivers/crypto/intel/qat/qat_common/adf_init.c     |   6 +
 drivers/crypto/intel/qat/qat_common/adf_sysfs.c    |  60 ++
 drivers/crypto/intel/qat/qat_common/icp_qat_hw.h   |   3 +-
 drivers/crypto/intel/qat/qat_common/qat_algs.c     |   1 -
 .../crypto/intel/qat/qat_common/qat_asym_algs.c    |  14 +-
 drivers/crypto/intel/qat/qat_common/qat_uclo.c     |   8 +-
 drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c    |  12 +-
 drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c  |  12 +-
 drivers/crypto/marvell/cesa/cipher.c               |   2 +-
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |  15 +
 .../marvell/octeontx2/otx2_cpt_mbox_common.c       |   3 +
 drivers/crypto/marvell/octeontx2/otx2_cptlf.c      |  34 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.h      |  33 +-
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |   7 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |  41 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 247 +++++-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    |  10 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf.h      |   1 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c |   8 +-
 drivers/crypto/n2_core.c                           |   9 +-
 drivers/crypto/nx/Makefile                         |   2 +-
 drivers/crypto/nx/nx.h                             |   4 +-
 drivers/crypto/sa2ul.h                             |   2 +-
 drivers/crypto/starfive/Kconfig                    |  20 +
 drivers/crypto/starfive/Makefile                   |   4 +
 drivers/crypto/starfive/jh7110-cryp.c              | 258 ++++++
 drivers/crypto/starfive/jh7110-cryp.h              | 172 ++++
 drivers/crypto/starfive/jh7110-hash.c              | 899 +++++++++++++++++++++
 drivers/crypto/starfive/jh7110-rsa.c               | 617 ++++++++++++++
 drivers/md/dm-crypt.c                              |  15 +-
 include/crypto/akcipher.h                          |  36 +
 include/crypto/algapi.h                            |   1 -
 include/crypto/engine.h                            |   2 +-
 include/crypto/hash.h                              |   3 +-
 include/crypto/internal/cipher.h                   |   2 +
 include/crypto/internal/hash.h                     |  12 +
 include/crypto/internal/sig.h                      |  17 +
 include/crypto/public_key.h                        |   2 -
 include/crypto/sha2.h                              |   2 +-
 include/crypto/sha256_base.h                       |  50 +-
 include/crypto/sig.h                               | 140 ++++
 include/crypto/sm2.h                               |  21 +-
 include/keys/asymmetric-parser.h                   |   2 +
 include/linux/crypto.h                             |   3 +-
 lib/crypto/sha256.c                                |  79 +-
 116 files changed, 4940 insertions(+), 965 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/starfive,jh7110-crypto.yaml
 create mode 100644 crypto/aegis-neon.h
 create mode 100644 crypto/jitterentropy-testing.c
 create mode 100644 crypto/sig.c
 rename drivers/{crypto/hisilicon/trng/trng-stb.c => char/hw_random/histb-rng.c} (53%)
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_dbgfs.h
 create mode 100644 drivers/crypto/starfive/Kconfig
 create mode 100644 drivers/crypto/starfive/Makefile
 create mode 100644 drivers/crypto/starfive/jh7110-cryp.c
 create mode 100644 drivers/crypto/starfive/jh7110-cryp.h
 create mode 100644 drivers/crypto/starfive/jh7110-hash.c
 create mode 100644 drivers/crypto/starfive/jh7110-rsa.c
 create mode 100644 include/crypto/internal/sig.h
 create mode 100644 include/crypto/sig.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.5
  2023-06-29  5:06                                       ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
@ 2023-07-01  5:04                                         ` pr-tracker-bot
  2023-08-28  9:22                                         ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-07-01  5:04 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 29 Jun 2023 13:06:18 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.5-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5d95ff84e62be914b4a4dabfa814e4096b05b1b0

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.5
  2023-05-29  3:41                                           ` Herbert Xu
  2023-05-29 11:39                                             ` pr-tracker-bot
@ 2023-07-09 23:51                                             ` Herbert Xu
  2023-07-10 17:20                                               ` pr-tracker-bot
  2023-08-21  3:37                                               ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-07-09 23:51 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 5d95ff84e62be914b4a4dabfa814e4096b05b1b0:

  Merge tag 'v6.5-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-06-30 21:27:13 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.5-p2 

for you to fetch changes up to 0b7ec177b589842c0abf9e91459c83ba28d32452:

  crypto: algif_hash - Fix race between MORE and non-MORE sends (2023-07-08 22:48:42 +1000)

----------------------------------------------------------------
This push fixes a couple of regressions in af_alg and incorrect
return values in crypto/asymmetric_keys/public_key.
----------------------------------------------------------------

Dan Carpenter (1):
      KEYS: asymmetric: Fix error codes

David Howells (2):
      crypto: af_alg - Fix merging of written data into spliced pages
      crypto: algif_hash - Fix race between MORE and non-MORE sends

 crypto/af_alg.c                     |  7 ++++---
 crypto/algif_hash.c                 |  4 +++-
 crypto/asymmetric_keys/public_key.c | 20 +++++++++++++++-----
 3 files changed, 22 insertions(+), 9 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.5
  2023-07-09 23:51                                             ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
@ 2023-07-10 17:20                                               ` pr-tracker-bot
  2023-08-21  3:37                                               ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-07-10 17:20 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 10 Jul 2023 09:51:03 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.5-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/419caed6cc77f19148faefe13515f8685ede219b

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.5
  2023-07-09 23:51                                             ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
  2023-07-10 17:20                                               ` pr-tracker-bot
@ 2023-08-21  3:37                                               ` Herbert Xu
  2023-08-21  5:09                                                 ` pr-tracker-bot
  2023-08-31  5:16                                                 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-08-21  3:37 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 419caed6cc77f19148faefe13515f8685ede219b:

  Merge tag 'v6.5-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-07-10 09:53:11 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 tags/v6.5-p3

for you to fetch changes up to 080aa61e370b9c5cafe71cacadbfe0e72db4d6df:

  crypto: fix uninit-value in af_alg_free_resources (2023-08-18 18:30:09 +0800)

----------------------------------------------------------------
This push fixes a regression in the caam driver and af_alg.
----------------------------------------------------------------
Herbert Xu (1):
      Revert "crypto: caam - adjust RNG timing to support more devices"

Pavel Skripkin (1):
      crypto: fix uninit-value in af_alg_free_resources

 crypto/af_alg.c            | 4 ++--
 drivers/crypto/caam/ctrl.c | 4 ++--
 2 files changed, 4 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.5
  2023-08-21  3:37                                               ` Herbert Xu
@ 2023-08-21  5:09                                                 ` pr-tracker-bot
  2023-08-31  5:16                                                 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-08-21  5:09 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 21 Aug 2023 11:37:44 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 tags/v6.5-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f7757129e3dea336c407551c98f50057c22bb266

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.6
  2023-06-29  5:06                                       ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
  2023-07-01  5:04                                         ` pr-tracker-bot
@ 2023-08-28  9:22                                         ` Herbert Xu
  2023-08-29 19:00                                           ` pr-tracker-bot
  2023-11-02  6:56                                           ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-08-28  9:22 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 419caed6cc77f19148faefe13515f8685ede219b:

  Merge tag 'v6.5-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-07-10 09:53:11 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p1 

for you to fetch changes up to 85b9bf9a514d991fcecb118d0a8a35e754ff9265:

  Revert "dt-bindings: crypto: qcom,prng: Add SM8450" (2023-08-25 19:01:45 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Move crypto engine callback from tfm ctx into algorithm object.
- Fix atomic sleep bug in crypto_destroy_instance.
- Move lib/mpi into lib/crypto.

Algorithms:

- Add chacha20 and poly1305 implementation for powerpc p10.

Drivers:

- Add AES skcipher and aead support to starfive.
- Add Dynamic Boost Control support to ccp.
- Add support for STM32P13 platform to stm32.
----------------------------------------------------------------
Adam Guerin (1):
      crypto: qat - fix crypto capability detection for 4xxx

Arnd Bergmann (2):
      crypto: caam - fix PM operations definition
      crypto: drivers - avoid memcpy size warning

Azeem Shaikh (1):
      crypto: lrw,xts - Replace strlcpy with strscpy

Chang S. Bae (1):
      crypto: x86/aesni - Align the address before aes_set_key_common()

Christophe JAILLET (2):
      crypto: caam - Use struct_size()
      crypto: caam - Remove messages related to memory allocation failure

Damian Muszynski (5):
      crypto: qat - add internal timer for qat 4xxx
      crypto: qat - drop obsolete heartbeat interface
      crypto: qat - add measure clock frequency
      crypto: qat - add heartbeat feature
      crypto: qat - add heartbeat counters check

Danny Tsen (5):
      crypto: chacha20-p10 - An optimized Chacha20 implementation with 8-way unrolling for ppc64le
      crypt: chacha20-p10 - Glue code for optmized Chacha20 implementation for ppc64le
      crypto: poly1305-p10 - An optimized Poly1305 implementation with 4-way unrolling for ppc64le
      crypto: poly1305-p10 - Glue code for optmized Poly1305 implementation for ppc64le
      crypto: powerpc - Add chacha20/poly1305-p10 to Kconfig and Makefile

David Howells (1):
      crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390

Eric Biggers (1):
      crypto: x86/aesni - remove unused parameter to aes_set_key_common()

Florian Fainelli (1):
      hwrng: iproc-rng200 - Implement suspend and resume calls

Franck LENORMAND (1):
      crypto: caam - Change structure type representing DECO MID

Frederick Lawler (1):
      crypto: af_alg - Decrement struct key.usage in alg_set_by_key_serial()

GUO Zihua (1):
      hwrng: core - Remove duplicated include

Gaosheng Cui (1):
      KEYS: fix kernel-doc warnings in verify_pefile

Gaurav Jain (1):
      crypto: caam - fix unchecked return value error

Giovanni Cabiddu (1):
      crypto: qat - change value of default idle filter

Herbert Xu (38):
      crypto: api - Use work queue in crypto_destroy_instance
      crypto: lib - Move mpi into lib/crypto
      crypto: sun8i-ce - Remove prepare/unprepare request
      crypto: sun8i-ss - Remove prepare/unprepare request
      crypto: amlogic - Remove prepare/unprepare request
      crypto: aspeed - Remove prepare/unprepare request
      crypto: sl3516 - Remove prepare/unprepare request
      crypto: keembay - Remove prepare/unprepare request
      crypto: omap - Remove prepare/unprepare request
      crypto: rk3288 - Remove prepare/unprepare request
      crypto: jh1100 - Remove prepare/unprepare request
      crypto: stm32 - Remove prepare/unprepare request
      crypto: virtio - Remove prepare/unprepare request
      crypto: zynqmp - Remove prepare/unprepare request
      crypto: engine - Remove prepare/unprepare request
      crypto: jh7110 - Include crypto/hash.h in header file
      crypto: engine - Move crypto inclusions out of header file
      crypto: jh7110 - Include scatterwalk.h for struct scatter_walk
      crypto: engine - Create internal/engine.h
      crypto: omap - Include internal/engine.h
      crypto: caam - Include internal/engine.h
      crypto: engine - Move struct crypto_engine into internal/engine.h
      crypto: engine - Move crypto_engine_ops from request into crypto_alg
      crypto: sun8i-ce - Use new crypto_engine_op interface
      crypto: sun8i-ss - Use new crypto_engine_op interface
      crypto: amlogic - Use new crypto_engine_op interface
      crypto: aspeed - Use new crypto_engine_op interface
      crypto: aspeed - Remove non-standard sha512 algorithms
      crypto: caam - Use new crypto_engine_op interface
      crypto: sl3516 - Use new crypto_engine_op interface
      crypto: keembay - Use new crypto_engine_op interface
      crypto: omap - Use new crypto_engine_op interface
      crypto: rk3288 - Use new crypto_engine_op interface
      crypto: jh7110 - Use new crypto_engine_op interface
      crypto: stm32 - Use new crypto_engine_op interface
      crypto: virtio - Use new crypto_engine_op interface
      crypto: zynqmp - Use new crypto_engine_op interface
      crypto: engine - Remove crypto_engine_ctx

Horia Geanta (1):
      crypto: caam - add power management support

Horia Geantă (1):
      crypto: caam/jr - fix shared IRQ line handling

Iuliana Prodan (1):
      crypto: caam - increase the domain of write memory barrier to full system

Jia Jie Ho (1):
      crypto: starfive - Add AES skcipher and aead support

Jiapeng Chong (1):
      crypto: sig - Remove some unused functions

Joachim Vandersmissen (1):
      crypto: jitter - Add clarifying comments to Jitter Entropy RCT cutoff values

Konrad Dybcio (2):
      dt-bindings: crypto: qcom,prng: Add SM8450
      crypto: qcom-rng: Make the core clock optional regardless of ACPI presence

Krzysztof Kozlowski (1):
      crypto: exynos - fix Wvoid-pointer-to-enum-cast warning

Lionel Debieve (1):
      dt-bindings: crypto: add new compatible for stm32-hash

Lucas Segarra Fernandez (1):
      crypto: qat - add fw_counters debugfs file

Mahmoud Adam (1):
      KEYS: use kfree_sensitive with key

Mario Limonciello (11):
      crypto: ccp - Rename macro for security attributes
      crypto: ccp - Add support for displaying PSP firmware versions
      crypto: ccp - Add bootloader and TEE version offsets
      crypto: ccp - move setting PSP master to earlier in the init
      crypto: ccp - Add support for fetching a nonce for dynamic boost control
      crypto: ccp - Add support for setting user ID for dynamic boost control
      crypto: ccp - Add support for getting and setting DBC parameters
      crypto: ccp - Add a sample library for ioctl use
      crypto: ccp - Add a sample python script for Dynamic Boost Control
      crypto: ccp - Add unit tests for dynamic boost control
      crypto: ccp - Add Mario to MAINTAINERS

Mark O'Donovan (1):
      crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()

Martin Kaiser (25):
      hwrng: nomadik - keep clock enabled while hwrng is registered
      hwrng: nomadik - use dev_err_probe
      hwrng: imx-rngc - use dev_err_probe
      hwrng: exynos - switch to DEFINE_SIMPLE_DEV_PM_OPS
      hwrng: pic32 - enable compile-testing
      hwrng: pic32 - use devm_clk_get_enabled
      hwrng: pic32 - remove unused defines
      hwrng: pic32 - enable TRNG only while it's used
      hwrng: ingenic - enable compile testing
      hwrng: ingenic - remove two unused defines
      hwrng: ingenic - remove dead assignments
      hwrng: ingenic - use devm_clk_get_enabled
      hwrng: ingenic - use dev_err_probe in error paths
      hwrng: ingenic - don't disable the rng in ingenic_trng_remove
      hwrng: ingenic - switch to device managed registration
      hwrng: ba431 - do not set drvdata
      hwrng: ba431 - don't init of_device_id's data
      hwrng: ba431 - use dev_err_probe after failed registration
      hwrng: arm-smccc-trng - don't set drvdata
      hwrng: cctrng - don't open code init and exit functions
      hwrng: cctrng - let devres enable the clock
      hwrng: cctrng - merge cc_trng_clk_init into its only caller
      hwrng: cctrng - use dev_err_probe in error paths
      hwrng: cn10k - delete empty remove function
      hwrng: cn10k - use dev_err_probe

Masahiro Yamada (1):
      crypto: arm64/aes - remove Makefile hack

Neil Armstrong (1):
      Revert "dt-bindings: crypto: qcom,prng: Add SM8450"

Rob Herring (4):
      hwrng: Explicitly include correct DT includes
      hwrng: Enable COMPILE_TEST for more drivers
      hwrng: xgene: Add explicit io.h include
      crypto: drivers - Explicitly include correct DT includes

Ruan Jinjie (1):
      crypto: hisilicon/sec - Do not check for 0 return after calling platform_get_irq()

Thomas Bourgoin (6):
      crypto: stm32 - add new algorithms support
      crypto: stm32 - remove bufcnt in stm32_hash_write_ctrl.
      crypto: stm32 - fix loop iterating through scatterlist for DMA
      crypto: stm32 - check request size and scatterlist size when using DMA.
      crypto: stm32 - fix MDMAT condition
      crypto: stm32 - remove flag HASH_FLAGS_DMA_READY

Thore Sommer (1):
      X.509: if signature is unsupported skip validation

Uwe Kleine-König (4):
      crypto: starfive - Convert to platform remove callback returning void
      crypto: stm32 - Properly handle pm_runtime_get failing
      crypto: stm32 - Drop if block with always false condition
      crypto: stm32 - Convert to platform remove callback returning void

Wang Ming (1):
      crypto: atmel - Use dev_err_probe instead of dev_err

Weili Qian (5):
      crypto: hisilicon/hpre - ensure private key less than n
      crypto: hisilicon/qm - flush all work before driver removed
      crypto: hisilicon/qm - stop function and write data to memory
      crypto: hisilicon/qm - increase device doorbell timeout
      crypto: hisilicon/hpre - enable sva error interrupt event

Yang Yingliang (2):
      crypto: starfive - fix return value check in starfive_aes_prepare_req()
      crypto: qat - use kfree_sensitive instead of memset/kfree()

Yangtao Li (6):
      crypto: omap-des - Use devm_platform_get_and_ioremap_resource()
      crypto: keembay - Convert to devm_platform_ioremap_resource()
      crypto: atmel-aes - Use devm_platform_get_and_ioremap_resource()
      crypto: atmel-sha - Use devm_platform_get_and_ioremap_resource()
      crypto: atmel-tdes - Use devm_platform_get_and_ioremap_resource()
      hwrng: timeriomem - Use devm_platform_get_and_ioremap_resource()

You Kangren (1):
      crypto: qat - replace the if statement with min()

Yue Haibing (3):
      crypto: allwinner - Remove unused function declarations
      crypto: qat - Remove unused function declarations
      crypto: chelsio - Remove unused declarations

 Documentation/ABI/testing/debugfs-driver-qat       |   61 ++
 Documentation/ABI/testing/sysfs-driver-ccp         |   18 +
 .../devicetree/bindings/crypto/st,stm32-hash.yaml  |    1 +
 MAINTAINERS                                        |   12 +
 arch/arm64/crypto/Makefile                         |    5 -
 arch/arm64/crypto/aes-glue-ce.c                    |    2 +
 arch/arm64/crypto/aes-glue-neon.c                  |    1 +
 arch/powerpc/crypto/Kconfig                        |   26 +
 arch/powerpc/crypto/Makefile                       |    4 +
 arch/powerpc/crypto/chacha-p10-glue.c              |  221 ++++
 arch/powerpc/crypto/chacha-p10le-8x.S              |  842 +++++++++++++++
 arch/powerpc/crypto/poly1305-p10-glue.c            |  186 ++++
 arch/powerpc/crypto/poly1305-p10le_64.S            | 1075 ++++++++++++++++++++
 arch/x86/crypto/aesni-intel_glue.c                 |   22 +-
 crypto/af_alg.c                                    |    4 +
 crypto/algapi.c                                    |   16 +-
 crypto/asymmetric_keys/public_key.c                |    8 +-
 crypto/asymmetric_keys/verify_pefile.c             |    2 +-
 crypto/asymmetric_keys/x509_public_key.c           |    5 +
 crypto/crypto_engine.c                             |  244 ++++-
 crypto/jitterentropy.c                             |   10 +-
 crypto/lrw.c                                       |    6 +-
 crypto/sig.c                                       |    5 -
 crypto/xts.c                                       |    6 +-
 drivers/char/hw_random/Kconfig                     |   37 +-
 drivers/char/hw_random/amd-rng.c                   |    1 +
 drivers/char/hw_random/arm_smccc_trng.c            |    2 -
 drivers/char/hw_random/atmel-rng.c                 |    2 +-
 drivers/char/hw_random/ba431-rng.c                 |   10 +-
 drivers/char/hw_random/bcm2835-rng.c               |    3 +-
 drivers/char/hw_random/cctrng.c                    |   93 +-
 drivers/char/hw_random/cn10k-rng.c                 |   18 +-
 drivers/char/hw_random/core.c                      |    3 +-
 drivers/char/hw_random/exynos-trng.c               |    8 +-
 drivers/char/hw_random/imx-rngc.c                  |   24 +-
 drivers/char/hw_random/ingenic-rng.c               |    2 +-
 drivers/char/hw_random/ingenic-trng.c              |   59 +-
 drivers/char/hw_random/iproc-rng200.c              |   28 +-
 drivers/char/hw_random/nomadik-rng.c               |   19 +-
 drivers/char/hw_random/npcm-rng.c                  |    3 +-
 drivers/char/hw_random/omap-rng.c                  |    2 -
 drivers/char/hw_random/omap3-rom-rng.c             |    1 -
 drivers/char/hw_random/pasemi-rng.c                |    3 +-
 drivers/char/hw_random/pic32-rng.c                 |   76 +-
 drivers/char/hw_random/stm32-rng.c                 |    3 +-
 drivers/char/hw_random/timeriomem-rng.c            |   25 +-
 drivers/char/hw_random/xgene-rng.c                 |    6 +-
 drivers/char/hw_random/xiphera-trng.c              |    1 -
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |    1 -
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |   41 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |  172 ++--
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |  100 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |   16 +-
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |   27 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |  155 +--
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |  114 ++-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h       |   19 +-
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |   13 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c          |   61 +-
 drivers/crypto/amlogic/amlogic-gxl.h               |    5 +-
 drivers/crypto/aspeed/aspeed-acry.c                |   40 +-
 drivers/crypto/aspeed/aspeed-hace-crypto.c         |  134 ++-
 drivers/crypto/aspeed/aspeed-hace-hash.c           |  285 ++----
 drivers/crypto/aspeed/aspeed-hace.c                |    9 +-
 drivers/crypto/aspeed/aspeed-hace.h                |   30 +-
 drivers/crypto/atmel-aes.c                         |   21 +-
 drivers/crypto/atmel-ecc.c                         |    2 +-
 drivers/crypto/atmel-sha.c                         |   28 +-
 drivers/crypto/atmel-tdes.c                        |   20 +-
 drivers/crypto/bcm/cipher.c                        |    6 +-
 drivers/crypto/caam/caamalg.c                      |  386 +++++--
 drivers/crypto/caam/caamhash.c                     |   47 +-
 drivers/crypto/caam/caampkc.c                      |   25 +-
 drivers/crypto/caam/caampkc.h                      |    3 -
 drivers/crypto/caam/ctrl.c                         |  107 ++
 drivers/crypto/caam/intern.h                       |   25 +-
 drivers/crypto/caam/jr.c                           |  206 +++-
 drivers/crypto/caam/qi.c                           |    1 +
 drivers/crypto/caam/regs.h                         |    9 +-
 drivers/crypto/ccp/Makefile                        |    3 +-
 drivers/crypto/ccp/dbc.c                           |  250 +++++
 drivers/crypto/ccp/dbc.h                           |   56 +
 drivers/crypto/ccp/psp-dev.c                       |   19 +-
 drivers/crypto/ccp/psp-dev.h                       |    1 +
 drivers/crypto/ccp/sp-dev.h                        |    7 +
 drivers/crypto/ccp/sp-pci.c                        |   96 +-
 drivers/crypto/ccree/cc_driver.c                   |    1 -
 drivers/crypto/chelsio/chcr_algo.c                 |    3 +-
 drivers/crypto/chelsio/chcr_core.h                 |    1 -
 drivers/crypto/chelsio/chcr_crypto.h               |    1 -
 drivers/crypto/exynos-rng.c                        |    4 +-
 drivers/crypto/gemini/sl3516-ce-cipher.c           |   22 +-
 drivers/crypto/gemini/sl3516-ce-core.c             |   50 +-
 drivers/crypto/gemini/sl3516-ce.h                  |    8 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   10 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |    5 +-
 drivers/crypto/hisilicon/qm.c                      |   28 +-
 drivers/crypto/hisilicon/sec/sec_drv.c             |    4 +-
 drivers/crypto/img-hash.c                          |    4 +-
 .../crypto/intel/keembay/keembay-ocs-aes-core.c    |  431 ++++----
 drivers/crypto/intel/keembay/keembay-ocs-ecc.c     |   73 +-
 .../crypto/intel/keembay/keembay-ocs-hcu-core.c    |  243 +++--
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |   23 +
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h   |    4 +
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |    3 +
 .../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c |   28 +
 .../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.h |    7 +
 .../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c   |   28 +
 .../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.h   |    7 +
 drivers/crypto/intel/qat/qat_common/Makefile       |    5 +
 .../intel/qat/qat_common/adf_accel_devices.h       |   14 +
 drivers/crypto/intel/qat/qat_common/adf_admin.c    |   61 ++
 .../crypto/intel/qat/qat_common/adf_cfg_strings.h  |    2 +
 drivers/crypto/intel/qat/qat_common/adf_clock.c    |  131 +++
 drivers/crypto/intel/qat/qat_common/adf_clock.h    |   14 +
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |   14 +-
 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c    |   12 +
 .../crypto/intel/qat/qat_common/adf_fw_counters.c  |  264 +++++
 .../crypto/intel/qat/qat_common/adf_fw_counters.h  |   11 +
 .../crypto/intel/qat/qat_common/adf_gen2_config.c  |    7 +
 .../crypto/intel/qat/qat_common/adf_gen2_hw_data.h |    3 +
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |    3 +
 drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h  |    2 +-
 .../crypto/intel/qat/qat_common/adf_gen4_timer.c   |   70 ++
 .../crypto/intel/qat/qat_common/adf_gen4_timer.h   |   21 +
 .../crypto/intel/qat/qat_common/adf_heartbeat.c    |  336 ++++++
 .../crypto/intel/qat/qat_common/adf_heartbeat.h    |   79 ++
 .../intel/qat/qat_common/adf_heartbeat_dbgfs.c     |  194 ++++
 .../intel/qat/qat_common/adf_heartbeat_dbgfs.h     |   12 +
 drivers/crypto/intel/qat/qat_common/adf_init.c     |   28 +
 drivers/crypto/intel/qat/qat_common/adf_isr.c      |    6 +
 .../intel/qat/qat_common/icp_qat_fw_init_admin.h   |   23 +-
 drivers/crypto/intel/qat/qat_common/icp_qat_hw.h   |    5 +-
 .../crypto/intel/qat/qat_common/qat_compression.c  |    3 +-
 drivers/crypto/intel/qat/qat_common/qat_uclo.c     |    7 +-
 .../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c  |   13 +
 .../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h  |    5 +
 drivers/crypto/n2_core.c                           |    2 +-
 drivers/crypto/omap-aes-gcm.c                      |   39 +-
 drivers/crypto/omap-aes.c                          |  264 ++---
 drivers/crypto/omap-aes.h                          |   15 +-
 drivers/crypto/omap-des.c                          |  212 ++--
 drivers/crypto/omap-sham.c                         |  291 +++---
 drivers/crypto/qcom-rng.c                          |   10 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |   59 +-
 drivers/crypto/rockchip/rk3288_crypto.h            |   21 +-
 drivers/crypto/rockchip/rk3288_crypto_ahash.c      |   80 +-
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |   60 +-
 drivers/crypto/s5p-sss.c                           |    1 -
 drivers/crypto/sa2ul.c                             |    3 +-
 drivers/crypto/sahara.c                            |    1 -
 drivers/crypto/starfive/Kconfig                    |    2 +
 drivers/crypto/starfive/Makefile                   |    2 +-
 drivers/crypto/starfive/jh7110-aes.c               | 1024 +++++++++++++++++++
 drivers/crypto/starfive/jh7110-cryp.c              |   53 +-
 drivers/crypto/starfive/jh7110-cryp.h              |   74 +-
 drivers/crypto/starfive/jh7110-hash.c              |  290 +++---
 drivers/crypto/stm32/Kconfig                       |    2 +
 drivers/crypto/stm32/stm32-cryp.c                  |  356 +++----
 drivers/crypto/stm32/stm32-hash.c                  |  988 +++++++++++++-----
 drivers/crypto/talitos.c                           |    4 +-
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |   35 +-
 .../crypto/virtio/virtio_crypto_skcipher_algs.c    |   25 +-
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |   41 +-
 drivers/crypto/xilinx/zynqmp-sha.c                 |    1 -
 include/crypto/algapi.h                            |    3 +
 include/crypto/engine.h                            |  118 +--
 include/crypto/internal/engine.h                   |   74 ++
 include/linux/hisi_acc_qm.h                        |    2 +-
 include/linux/psp-platform-access.h                |    4 +
 include/uapi/linux/psp-dbc.h                       |  147 +++
 lib/Makefile                                       |    1 -
 lib/crypto/Makefile                                |    2 +
 lib/{ => crypto}/mpi/Makefile                      |    0
 lib/{ => crypto}/mpi/ec.c                          |    0
 lib/{ => crypto}/mpi/generic_mpih-add1.c           |    0
 lib/{ => crypto}/mpi/generic_mpih-lshift.c         |    0
 lib/{ => crypto}/mpi/generic_mpih-mul1.c           |    0
 lib/{ => crypto}/mpi/generic_mpih-mul2.c           |    0
 lib/{ => crypto}/mpi/generic_mpih-mul3.c           |    0
 lib/{ => crypto}/mpi/generic_mpih-rshift.c         |    0
 lib/{ => crypto}/mpi/generic_mpih-sub1.c           |    0
 lib/{ => crypto}/mpi/longlong.h                    |    0
 lib/{ => crypto}/mpi/mpi-add.c                     |    0
 lib/{ => crypto}/mpi/mpi-bit.c                     |    0
 lib/{ => crypto}/mpi/mpi-cmp.c                     |    8 +-
 lib/{ => crypto}/mpi/mpi-div.c                     |    0
 lib/{ => crypto}/mpi/mpi-inline.h                  |    0
 lib/{ => crypto}/mpi/mpi-internal.h                |    0
 lib/{ => crypto}/mpi/mpi-inv.c                     |    0
 lib/{ => crypto}/mpi/mpi-mod.c                     |    0
 lib/{ => crypto}/mpi/mpi-mul.c                     |    0
 lib/{ => crypto}/mpi/mpi-pow.c                     |    0
 lib/{ => crypto}/mpi/mpi-sub-ui.c                  |    0
 lib/{ => crypto}/mpi/mpicoder.c                    |    0
 lib/{ => crypto}/mpi/mpih-cmp.c                    |    0
 lib/{ => crypto}/mpi/mpih-div.c                    |    0
 lib/{ => crypto}/mpi/mpih-mul.c                    |    0
 lib/{ => crypto}/mpi/mpiutil.c                     |    0
 tools/crypto/ccp/.gitignore                        |    1 +
 tools/crypto/ccp/Makefile                          |   13 +
 tools/crypto/ccp/dbc.c                             |   72 ++
 tools/crypto/ccp/dbc.py                            |   64 ++
 tools/crypto/ccp/dbc_cli.py                        |  134 +++
 tools/crypto/ccp/test_dbc.py                       |  266 +++++
 205 files changed, 10033 insertions(+), 2915 deletions(-)
 create mode 100644 Documentation/ABI/testing/debugfs-driver-qat
 create mode 100644 arch/arm64/crypto/aes-glue-ce.c
 create mode 100644 arch/arm64/crypto/aes-glue-neon.c
 create mode 100644 arch/powerpc/crypto/chacha-p10-glue.c
 create mode 100644 arch/powerpc/crypto/chacha-p10le-8x.S
 create mode 100644 arch/powerpc/crypto/poly1305-p10-glue.c
 create mode 100644 arch/powerpc/crypto/poly1305-p10le_64.S
 create mode 100644 drivers/crypto/ccp/dbc.c
 create mode 100644 drivers/crypto/ccp/dbc.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_clock.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_clock.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_counters.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_counters.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_timer.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_timer.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_dbgfs.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_dbgfs.h
 create mode 100644 drivers/crypto/starfive/jh7110-aes.c
 create mode 100644 include/crypto/internal/engine.h
 create mode 100644 include/uapi/linux/psp-dbc.h
 rename lib/{ => crypto}/mpi/Makefile (100%)
 rename lib/{ => crypto}/mpi/ec.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-add1.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-lshift.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-mul1.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-mul2.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-mul3.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-rshift.c (100%)
 rename lib/{ => crypto}/mpi/generic_mpih-sub1.c (100%)
 rename lib/{ => crypto}/mpi/longlong.h (100%)
 rename lib/{ => crypto}/mpi/mpi-add.c (100%)
 rename lib/{ => crypto}/mpi/mpi-bit.c (100%)
 rename lib/{ => crypto}/mpi/mpi-cmp.c (96%)
 rename lib/{ => crypto}/mpi/mpi-div.c (100%)
 rename lib/{ => crypto}/mpi/mpi-inline.h (100%)
 rename lib/{ => crypto}/mpi/mpi-internal.h (100%)
 rename lib/{ => crypto}/mpi/mpi-inv.c (100%)
 rename lib/{ => crypto}/mpi/mpi-mod.c (100%)
 rename lib/{ => crypto}/mpi/mpi-mul.c (100%)
 rename lib/{ => crypto}/mpi/mpi-pow.c (100%)
 rename lib/{ => crypto}/mpi/mpi-sub-ui.c (100%)
 rename lib/{ => crypto}/mpi/mpicoder.c (100%)
 rename lib/{ => crypto}/mpi/mpih-cmp.c (100%)
 rename lib/{ => crypto}/mpi/mpih-div.c (100%)
 rename lib/{ => crypto}/mpi/mpih-mul.c (100%)
 rename lib/{ => crypto}/mpi/mpiutil.c (100%)
 create mode 100644 tools/crypto/ccp/.gitignore
 create mode 100644 tools/crypto/ccp/Makefile
 create mode 100644 tools/crypto/ccp/dbc.c
 create mode 100644 tools/crypto/ccp/dbc.py
 create mode 100755 tools/crypto/ccp/dbc_cli.py
 create mode 100755 tools/crypto/ccp/test_dbc.py

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.6
  2023-08-28  9:22                                         ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
@ 2023-08-29 19:00                                           ` pr-tracker-bot
  2023-11-02  6:56                                           ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-08-29 19:00 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 28 Aug 2023 17:22:20 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/68cf01760bc0891074e813b9bb06d2696cac1c01

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.6
  2023-08-21  3:37                                               ` Herbert Xu
  2023-08-21  5:09                                                 ` pr-tracker-bot
@ 2023-08-31  5:16                                                 ` Herbert Xu
  2023-09-01 23:19                                                   ` pr-tracker-bot
                                                                     ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2023-08-31  5:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 85b9bf9a514d991fcecb118d0a8a35e754ff9265:

  Revert "dt-bindings: crypto: qcom,prng: Add SM8450" (2023-08-25 19:01:45 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p2 

for you to fetch changes up to ba22e81872c1232ea4ba421251d8109a5ed68c52:

  crypto: powerpc/chacha20,poly1305-p10 - Add dependency on VSX (2023-08-30 13:48:39 +0800)

----------------------------------------------------------------
This push fixes a random config build failure on powerpc.
----------------------------------------------------------------

Herbert Xu (1):
      crypto: powerpc/chacha20,poly1305-p10 - Add dependency on VSX

 arch/powerpc/crypto/Kconfig | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.6
  2023-08-31  5:16                                                 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
@ 2023-09-01 23:19                                                   ` pr-tracker-bot
  2023-09-22  2:10                                                   ` Herbert Xu
  2023-11-09  4:30                                                   ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-09-01 23:19 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 31 Aug 2023 13:16:33 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0fe2b86c21253bb365947ceed3531eb214d4c5b5

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.6
  2023-08-31  5:16                                                 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
  2023-09-01 23:19                                                   ` pr-tracker-bot
@ 2023-09-22  2:10                                                   ` Herbert Xu
  2023-09-22 16:43                                                     ` pr-tracker-bot
  2023-10-10  8:46                                                     ` Herbert Xu
  2023-11-09  4:30                                                   ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-09-22  2:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 0bb80ecc33a8fb5a682236443c1e740d5c917d1d:

  Linux 6.6-rc1 (2023-09-10 16:28:41 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p3 

for you to fetch changes up to 21155620fbf2edbb071144894ff9d67ba9a1faa0:

  crypto: sm2 - Fix crash caused by uninitialized context (2023-09-20 13:10:10 +0800)

----------------------------------------------------------------
This push fixes a regression in sm2.
----------------------------------------------------------------

Tianjia Zhang (1):
      crypto: sm2 - Fix crash caused by uninitialized context

 crypto/sm2.c | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.6
  2023-09-22  2:10                                                   ` Herbert Xu
@ 2023-09-22 16:43                                                     ` pr-tracker-bot
  2023-10-10  8:46                                                     ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-09-22 16:43 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 22 Sep 2023 10:10:51 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2f8d62daf2b5d9835ccd1ae0407de130156c17c1

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.6
  2023-09-22  2:10                                                   ` Herbert Xu
  2023-09-22 16:43                                                     ` pr-tracker-bot
@ 2023-10-10  8:46                                                     ` Herbert Xu
  2023-10-10 18:54                                                       ` pr-tracker-bot
  2023-10-21  9:23                                                       ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-10-10  8:46 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 21155620fbf2edbb071144894ff9d67ba9a1faa0:

  crypto: sm2 - Fix crash caused by uninitialized context (2023-09-20 13:10:10 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p4 

for you to fetch changes up to 152d0bcdf1efcb54a4fa20f694e9c7bbb6d06cbf:

  dm crypt: Fix reqsize in crypt_iv_eboiv_gen (2023-10-06 10:39:18 +0800)

----------------------------------------------------------------
This push fixes a 6.5 regression in dm-crypt.
----------------------------------------------------------------

Herbert Xu (1):
      dm crypt: Fix reqsize in crypt_iv_eboiv_gen

 drivers/md/dm-crypt.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.6
  2023-10-10  8:46                                                     ` Herbert Xu
@ 2023-10-10 18:54                                                       ` pr-tracker-bot
  2023-10-21  9:23                                                       ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-10-10 18:54 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 10 Oct 2023 16:46:44 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p4

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/832b5d0bf94cab3ab1ca690fca3c3d931f5fa7cd

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.6
  2023-10-10  8:46                                                     ` Herbert Xu
  2023-10-10 18:54                                                       ` pr-tracker-bot
@ 2023-10-21  9:23                                                       ` Herbert Xu
  2023-10-21 17:57                                                         ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2023-10-21  9:23 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 152d0bcdf1efcb54a4fa20f694e9c7bbb6d06cbf:

  dm crypt: Fix reqsize in crypt_iv_eboiv_gen (2023-10-06 10:39:18 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p5 

for you to fetch changes up to b11950356c4b416d2e87941f3aa7a8bf089db72b:

  KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash (2023-10-18 12:27:10 +0800)

----------------------------------------------------------------
This push fixes a 6.5 regression in crypto/asymmetric_keys.
----------------------------------------------------------------

Herbert Xu (1):
      KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash

 crypto/asymmetric_keys/public_key.c | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.6
  2023-10-21  9:23                                                       ` Herbert Xu
@ 2023-10-21 17:57                                                         ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-10-21 17:57 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sat, 21 Oct 2023 17:23:07 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p5

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f1de9aced809f1751bc97703bdf678c75da3fed3

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.7
  2023-08-28  9:22                                         ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
  2023-08-29 19:00                                           ` pr-tracker-bot
@ 2023-11-02  6:56                                           ` Herbert Xu
  2023-11-03  2:34                                             ` Linus Torvalds
                                                               ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2023-11-02  6:56 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 0bb80ecc33a8fb5a682236443c1e740d5c917d1d:

  Linux 6.6-rc1 (2023-09-10 16:28:41 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p1 

for you to fetch changes up to a312e07a65fb598ed239b940434392721385c722:

  crypto: adiantum - flush destination page before unmapping (2023-11-01 12:58:42 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Add virtual-address based lskcipher interface.
- Optimise ahash/shash performance in light of costly indirect calls.
- Remove ahash alignmask attribute.

Algorithms:

- Improve AES/XTS performance of 6-way unrolling for ppc.
- Remove some uses of obsolete algorithms (md4, md5, sha1).
- Add FIPS 202 SHA-3 support in pkcs1pad.
- Add fast path for single-page messages in adiantum.
- Remove zlib-deflate.

Drivers:

- Add support for S4 in meson RNG driver.
- Add STM32MP13x support in stm32.
- Add hwrng interface support in qcom-rng.
- Add support for deflate algorithm in hisilicon/zip.
----------------------------------------------------------------

Adam Guerin (1):
      crypto: qat - enable dc chaining service

Alexey Romanov (2):
      hwrng: meson - add support for S4
      dt-bindings: rng: meson: add meson-rng-s4 compatible

Andrei Coardos (5):
      hwrng: bcm2835 - removed call to platform_set_drvdata()
      hwrng: hisi - removed unneeded call to platform_set_drvdata()
      hwrng: mpfs - removed unneeded call to platform_set_drvdata()
      hwrng: xgene - removed unneeded call to platform_set_drvdata()
      hwrng: xiphera - removed unnneded platform_set_drvdata()

André Apitzsch (1):
      crypto: qcom-rng - Add missing dependency on hw_random

Ashish Kalra (1):
      MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT

Bartosz Golaszewski (1):
      dt-bindings: crypto: ice: document the sa8775p inline crypto engine

Bo Liu (1):
      crypto: aesni - Fix double word in comments

Chang S. Bae (3):
      crypto: x86/aesni - Refactor the common address alignment code
      crypto: x86/aesni - Correct the data type in struct aesni_xts_ctx
      crypto: x86/aesni - Perform address alignment early for XTS mode

Christophe JAILLET (1):
      crypto: hisilicon/hpre - Fix a erroneous check after snprintf()

Ciunas Bennett (3):
      crypto: qat - add rate limiting sysfs interface
      crypto: qat - add rp2svc sysfs attribute
      crypto: qat - add num_rps sysfs attribute

Damian Muszynski (4):
      units: Add BYTES_PER_*BIT
      crypto: qat - add bits.h to icp_qat_hw.h
      crypto: qat - add retrieval of fw capabilities
      crypto: qat - add rate limiting feature to qat_4xxx

Danny Tsen (1):
      crypto: vmx - Improved AES/XTS performance of 6-way unrolling for ppc

Dimitri John Ledkov (11):
      crypto: pkcs7 - remove md4 md5 x.509 support
      crypto: pkcs7 - remove sha1 support
      crypto: mscode_parser - remove sha224 authenticode support
      module: Do not offer sha224 for built-in module signing
      certs: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
      x509: Add OIDs for FIPS 202 SHA-3 hash and signatures
      crypto: FIPS 202 SHA-3 register in hash info for IMA
      crypto: rsa-pkcs1pad - Add FIPS 202 SHA-3 support
      crypto: asymmetric_keys - allow FIPS 202 SHA-3 signatures
      module: enable automatic module signing with FIPS 202 SHA-3
      Documentation/module-signing.txt: bring up to date

Eric Biggers (65):
      crypto: xts - use 'spawn' for underlying single-block cipher
      crypto: shash - optimize the default digest and finup
      crypto: shash - fold shash_digest_unaligned() into crypto_shash_digest()
      crypto: arm64/sha2-ce - implement ->digest for sha256
      crypto: x86/sha256 - implement ->digest for sha256
      crypto: adiantum - add fast path for single-page messages
      crypto: arm/nhpoly1305 - implement ->digest
      crypto: arm64/nhpoly1305 - implement ->digest
      crypto: x86/nhpoly1305 - implement ->digest
      crypto: arm64/sha1-ce - clean up backwards function names
      crypto: arm64/sha2-ce - clean up backwards function names
      crypto: arm64/sha512-ce - clean up backwards function names
      crypto: arm64/sha256 - clean up backwards function names
      crypto: arm64/sha512 - clean up backwards function names
      crypto: skcipher - fix weak key check for lskciphers
      crypto: shash - eliminate indirect call for default import and export
      crypto: sparc/crc32c - stop using the shash alignmask
      crypto: stm32 - remove unnecessary alignmask
      crypto: xilinx/zynqmp-sha - remove unnecessary alignmask
      crypto: mips/crc32 - remove redundant setting of alignmask to 0
      crypto: loongarch/crc32 - remove redundant setting of alignmask to 0
      crypto: cbcmac - remove unnecessary alignment logic
      crypto: cmac - remove unnecessary alignment logic
      crypto: hmac - remove unnecessary alignment logic
      crypto: vmac - don't set alignmask
      crypto: xcbc - remove unnecessary alignment logic
      crypto: shash - remove support for nonzero alignmask
      libceph: stop checking crypto_shash_alignmask
      crypto: drbg - stop checking crypto_shash_alignmask
      crypto: testmgr - stop checking crypto_shash_alignmask
      crypto: adiantum - stop using alignmask of shash_alg
      crypto: hctr2 - stop using alignmask of shash_alg
      crypto: shash - remove crypto_shash_alignmask
      crypto: shash - remove crypto_shash_ctx_aligned()
      crypto: sun4i-ss - remove unnecessary alignmask for ahashes
      crypto: sun8i-ce - remove unnecessary alignmask for ahashes
      crypto: sun8i-ss - remove unnecessary alignmask for ahashes
      crypto: atmel - remove unnecessary alignmask for ahashes
      crypto: artpec6 - stop setting alignmask for ahashes
      crypto: mxs-dcp - remove unnecessary alignmask for ahashes
      crypto: s5p-sss - remove unnecessary alignmask for ahashes
      crypto: talitos - remove unnecessary alignmask for ahashes
      crypto: omap-sham - stop setting alignmask for ahashes
      crypto: rockchip - remove unnecessary alignmask for ahashes
      crypto: starfive - remove unnecessary alignmask for ahashes
      crypto: stm32 - remove unnecessary alignmask for ahashes
      crypto: ahash - remove support for nonzero alignmask
      crypto: authenc - stop using alignmask of ahash
      crypto: authencesn - stop using alignmask of ahash
      crypto: testmgr - stop checking crypto_ahash_alignmask
      net: ipv4: stop checking crypto_ahash_alignmask
      net: ipv6: stop checking crypto_ahash_alignmask
      crypto: ccm - stop using alignmask of ahash
      crypto: chacha20poly1305 - stop using alignmask of ahash
      crypto: gcm - stop using alignmask of ahash
      crypto: ahash - remove crypto_ahash_alignmask
      crypto: ahash - remove struct ahash_request_priv
      crypto: ahash - improve file comment
      crypto: chelsio - stop using crypto_ahash::init
      crypto: talitos - stop using crypto_ahash::init
      crypto: hash - move "ahash wrapping shash" functions to ahash.c
      crypto: ahash - check for shash type instead of not ahash type
      crypto: ahash - optimize performance when wrapping shash
      crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
      crypto: adiantum - flush destination page before unmapping

Fabio Estevam (3):
      dt-bindings: crypto: fsl-imx-sahara: Shorten the title
      dt-bindings: crypto: fsl-imx-sahara: Document the clocks
      dt-bindings: crypto: fsl-imx-sahara: Fix the number of irqs

Gatien Chevallier (8):
      dt-bindings: rng: introduce new compatible for STM32MP13x
      hwrng: stm32 - use devm_platform_get_and_ioremap_resource() API
      hwrng: stm32 - implement STM32MP13x support
      hwrng: stm32 - implement error concealment
      hwrng: stm32 - rework error handling in stm32_rng_read()
      hwrng: stm32 - restrain RNG noise source clock
      hwrng: stm32 - support RNG configuration locking mechanism
      hwrng: stm32 - rework power management sequences

Gaurav Jain (2):
      crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure
      crypto: caam/jr - fix Chacha20 + Poly1305 self test failure

Giovanni Cabiddu (15):
      Documentation: ABI: debugfs-driver-qat: fix fw_counters path
      crypto: qat - fix state machines cleanup paths
      crypto: qat - do not shadow error code
      crypto: qat - ignore subsequent state up commands
      crypto: qat - fix unregistration of crypto algorithms
      crypto: qat - fix unregistration of compression algorithms
      crypto: qat - consolidate services structure
      crypto: qat - increase size of buffers
      crypto: qat - add namespace to driver
      crypto: qat - refactor fw config related functions
      crypto: qat - use masks for AE groups
      crypto: qat - fix ring to service map for QAT GEN4
      crypto: qat - move admin api
      crypto: qat - move adf_cfg_services
      crypto: qat - fix deadlock in backlog processing

Herbert Xu (45):
      wireguard: do not include crypto/algapi.h
      KEYS: Include linux/errno.h in linux/verification.h
      hwrng: octeon - Fix warnings on 32-bit platforms
      fscrypt: Do not include crypto/algapi.h
      ubifs: Do not include crypto/algapi.h
      Bluetooth: Do not include crypto/algapi.h
      ah: Do not include crypto/algapi.h
      mptcp: Do not include crypto/algapi.h
      SUNRPC: Do not include crypto/algapi.h
      evm: Do not include crypto/algapi.h
      KEYS: encrypted: Do not include crypto/algapi.h
      chelsio: Do not include crypto/algapi.h
      crypto: aead - Add crypto_has_aead
      ipsec: Stop using crypto_has_alg
      crypto: hash - Hide CRYPTO_ALG_TYPE_AHASH_MASK
      crypto: skcipher - Add lskcipher
      crypto: lskcipher - Add compatibility wrapper around ECB
      crypto: testmgr - Add support for lskcipher algorithms
      crypto: ecb - Convert from skcipher to lskcipher
      crypto: cbc - Convert from skcipher to lskcipher
      ipsec: Select CRYPTO_AEAD
      crypto: qat - Remove zlib-deflate
      crypto: deflate - Remove zlib-deflate
      crypto: testmgr - Remove zlib-deflate
      crypto: skcipher - Add dependency on ecb
      crypto: arc4 - Convert from skcipher to lskcipher
      crypto: skcipher - Add crypto_spawn_skcipher_alg_common
      crypto: essiv - Handle lskcipher spawns
      crypto: cryptd - Only access common skcipher fields on spawn
      crypto: adiantum - Only access common skcipher fields on spawn
      crypto: authenc - Only access common skcipher fields on spawn
      crypto: authencesn - Only access common skcipher fields on spawn
      crypto: ccm - Only access common skcipher fields on spawn
      crypto: chacha20poly1305 - Only access common skcipher fields on spawn
      crypto: ctr - Only access common skcipher fields on spawn
      crypto: cts - Only access common skcipher fields on spawn
      crypto: gcm - Only access common skcipher fields on spawn
      crypto: hctr2 - Only access common skcipher fields on spawn
      crypto: lrw - Only access common skcipher fields on spawn
      crypto: xts - Only access common skcipher fields on spawn
      crypto: skcipher - Remove obsolete skcipher_alg helpers
      crypto: lskcipher - Return EINVAL when ecb_name fails sanity checks
      crypto: hifn_795x - Silence gcc format-truncation false positive warnings
      certs: Break circular dependency when selftest is modular
      crypto: rsa - Add module alias for pkcs1pad

Jinjie Ruan (1):
      crypto: qat - Use list_for_each_entry() helper

John Allen (1):
      crypto: ccp - Dump SEV command buffer registers on SEV command error

Jonas Gorski (1):
      hwrng: geode - fix accessing registers

Justin Stitt (2):
      crypto: cavium/nitrox - refactor deprecated strncpy
      crypto: qat - refactor deprecated strncpy

Kees Cook (1):
      crypto: qat - Annotate struct adf_fw_counters with __counted_by

Li zeming (1):
      crypto: api - Remove unnecessary NULL initialisation

Longfang Liu (3):
      crypto: hisilicon/qm - fix PF queue parameter issue
      crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
      crypto: hisilicon/qm - prevent soft lockup in receive loop

Lu Jialin (1):
      crypto: pcrypt - Fix hungtask for PADATA_RESET

Lucas Segarra Fernandez (3):
      crypto: qat - refactor included headers
      crypto: qat - add pm_status debugfs file
      crypto: qat - add cnv_errors debugfs file

Lukas Wunner (2):
      X.509: Add missing IMPLICIT annotations to AKID ASN.1 module
      treewide: Add SPDX identifier to IETF ASN.1 modules

Mario Limonciello (9):
      crypto: ccp - Get a free page to use while fetching initial nonce
      crypto: ccp - Fix ioctl unit tests
      crypto: ccp - Fix DBC sample application error handling
      crypto: ccp - Fix sample application signature passing
      crypto: ccp - Fix some unfused tests
      crypto: ccp - Add support for extended PSP mailbox commands
      crypto: ccp - Add a communication path abstraction for DBC
      crypto: ccp - Add a macro to check capabilities register
      crypto: ccp - Add support for DBC over PSP mailbox

Martin Kaiser (7):
      hwrng: ks-sa - access private data via struct hwrng
      hwrng: ks-sa - remove dev from struct ks_sa_rng
      hwrng: ks-sa - use dev_err_probe
      hwrng: nomadik - add MODULE_DESCRIPTION
      hwrng: st - add MODULE_DESCRIPTION
      hwrng: imx-rngc - reasonable timeout for selftest
      hwrng: imx-rngc - reasonable timeout for initial seed

Neil Armstrong (2):
      dt-bindings: crypto: qcom,prng: document that RNG on SM8450 is a TRNG
      dt-bindings: crypto: qcom,prng: document SM8550

Om Prakash Singh (2):
      crypto: qcom-rng - Add hw_random interface support
      dt-bindings: crypto: qcom,prng: document SA8775P and SC7280

Randy Dunlap (2):
      crypto: akcipher - fix kernel-doc typos
      crypto: sig - fix kernel-doc typo

Rob Herring (2):
      crypto: aspeed-hace - Use device_get_match_data()
      hwrng: n2 - Use device_get_match_data()

Roxana Nicolescu (1):
      crypto: x86/sha - load modules based on CPU features

Shashank Gupta (9):
      crypto: qat - add infrastructure for error reporting
      crypto: qat - add reporting of correctable errors for QAT GEN4
      crypto: qat - add reporting of errors from ERRSOU1 for QAT GEN4
      crypto: qat - add handling of errors from ERRSOU2 for QAT GEN4
      crypto: qat - add handling of compression related errors for QAT GEN4
      crypto: qat - add adf_get_aram_base() helper function
      crypto: qat - add handling of errors from ERRSOU3 for QAT GEN4
      crypto: qat - add error counters
      crypto: qat - count QAT GEN4 errors

Stefan Wahren (1):
      hwrng: bcm2835 - Fix hwrng throughput regression

Stephan Müller (5):
      crypto: jitter - add RCT/APT support for different OSRs
      crypto: jitter - Allow configuration of memory size
      crypto: jitter - Allow configuration of oversampling rate
      crypto: jitter - reuse allocated entropy collector
      crypto: jitter - use permanent health test storage

Svyatoslav Pankratov (1):
      crypto: qat - fix double free during reset

Tom Lendacky (1):
      crypto: ccp - Move direct access to some PSP registers out of TEE

Uwe Kleine-König (44):
      crypto: keembay - Don't pass errors to the caller in .remove()
      crypto: engine - Make crypto_engine_exit() return void
      crypto: sun4i-ss - Convert to platform remove callback returning void
      crypto: sun8i-ce - Convert to platform remove callback returning void
      crypto: sun8i-ss - Convert to platform remove callback returning void
      crypto: amcc/crypto4xx - Convert to platform remove callback returning void
      crypto: amlogic-gxl-core - Convert to platform remove callback returning void
      crypto: aspeed-acry - Convert to platform remove callback returning void
      crypto: aspeed-hace - Convert to platform remove callback returning void
      crypto: atmel-aes - Convert to platform remove callback returning void
      crypto: atmel-sha - Convert to platform remove callback returning void
      crypto: atmel-tdes - Convert to platform remove callback returning void
      crypto: axis/artpec6 - Convert to platform remove callback returning void
      crypto: bcm/cipher - Convert to platform remove callback returning void
      crypto: caam/jr - Convert to platform remove callback returning void
      crypto: ccp/sp - Convert to platform remove callback returning void
      crypto: ccree/cc - Convert to platform remove callback returning void
      crypto: exynos-rng - Convert to platform remove callback returning void
      crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
      crypto: hisilicon/sec - Convert to platform remove callback returning void
      crypto: hisilicon/trng - Convert to platform remove callback returning void
      crypto: img-hash - Convert to platform remove callback returning void
      crypto: inside-secure/safexcel - Convert to platform remove callback returning void
      crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
      crypto: intel/keembay-ocs-aes - Convert to platform remove callback returning void
      crypto: intel/keembay-ocs-ecc - Convert to platform remove callback returning void
      crypto: intel/keembay-ocs-hcu - Convert to platform remove callback returning void
      crypto: marvell/cesa - Convert to platform remove callback returning void
      crypto: mxs-dcp - Convert to platform remove callback returning void
      crypto: n2_core - Convert to platform remove callback returning void
      crypto: omap-aes - Convert to platform remove callback returning void
      crypto: omap-des - Convert to platform remove callback returning void
      crypto: omap-sham - Convert to platform remove callback returning void
      crypto: qce - Convert to platform remove callback returning void
      crypto: qcom-rng - Convert to platform remove callback returning void
      crypto: rockchip/rk3288 - Convert to platform remove callback returning void
      crypto: s5p-sss - Convert to platform remove callback returning void
      crypto: sa2ul - Convert to platform remove callback returning void
      crypto: sahara - Convert to platform remove callback returning void
      crypto: stm32/crc32 - Convert to platform remove callback returning void
      crypto: stm32/cryp - Convert to platform remove callback returning void
      crypto: talitos - Convert to platform remove callback returning void
      crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
      crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void

WangJinchao (1):
      padata: Fix refcnt handling in padata_free_shell()

Weili Qian (3):
      crypto: hisilicon/qm - fix the type value of aeq
      crypto: hisilicon/qm - check function qp num before alg register
      crypto: hisilicon/qm - alloc buffer to set and get xqc

Wenkai Lin (1):
      crypto: hisilicon/sec - fix for sgl unmmap problem

Yang Shen (2):
      crypto: hisilicon/zip - support deflate algorithm
      crypto: hisilicon/zip - remove zlib and gzip

zhenwei pi (1):
      crypto: virtio - handle config changed by work queue

 Documentation/ABI/testing/debugfs-driver-qat       |   24 +-
 Documentation/ABI/testing/sysfs-driver-qat         |   48 +
 Documentation/ABI/testing/sysfs-driver-qat_ras     |   41 +
 Documentation/ABI/testing/sysfs-driver-qat_rl      |  226 +++
 Documentation/admin-guide/module-signing.rst       |   17 +-
 Documentation/crypto/devel-algos.rst               |    4 +-
 .../devicetree/bindings/crypto/fsl-imx-sahara.yaml |   43 +-
 .../bindings/crypto/qcom,inline-crypto-engine.yaml |    1 +
 .../devicetree/bindings/crypto/qcom,prng.yaml      |   28 +-
 .../devicetree/bindings/rng/amlogic,meson-rng.yaml |    1 +
 .../devicetree/bindings/rng/st,stm32-rng.yaml      |   20 +-
 MAINTAINERS                                        |    2 +-
 arch/arm/crypto/nhpoly1305-neon-glue.c             |    9 +
 arch/arm64/crypto/nhpoly1305-neon-glue.c           |    9 +
 arch/arm64/crypto/sha1-ce-core.S                   |    8 +-
 arch/arm64/crypto/sha1-ce-glue.c                   |   21 +-
 arch/arm64/crypto/sha2-ce-core.S                   |    8 +-
 arch/arm64/crypto/sha2-ce-glue.c                   |   39 +-
 arch/arm64/crypto/sha256-glue.c                    |   26 +-
 arch/arm64/crypto/sha512-ce-core.S                 |    8 +-
 arch/arm64/crypto/sha512-ce-glue.c                 |   26 +-
 arch/arm64/crypto/sha512-glue.c                    |   12 +-
 arch/loongarch/crypto/crc32-loongarch.c            |    2 -
 arch/mips/crypto/crc32-mips.c                      |    2 -
 arch/sparc/crypto/crc32c_glue.c                    |   43 +-
 arch/x86/crypto/aesni-intel_asm.S                  |    4 +-
 arch/x86/crypto/aesni-intel_avx-x86_64.S           |    4 +-
 arch/x86/crypto/aesni-intel_glue.c                 |   52 +-
 arch/x86/crypto/nhpoly1305-avx2-glue.c             |    9 +
 arch/x86/crypto/nhpoly1305-sse2-glue.c             |    9 +
 arch/x86/crypto/sha1_ssse3_glue.c                  |   12 +
 arch/x86/crypto/sha256_ssse3_glue.c                |   44 +
 certs/Kconfig                                      |    6 +-
 crypto/Kconfig                                     |   63 +-
 crypto/Makefile                                    |    6 +-
 crypto/adiantum.c                                  |   80 +-
 crypto/aead.c                                      |    6 +
 crypto/ahash.c                                     |  406 +++--
 crypto/api.c                                       |    2 +-
 crypto/arc4.c                                      |   60 +-
 crypto/asymmetric_keys/Kconfig                     |    3 +-
 crypto/asymmetric_keys/Makefile                    |    3 +-
 crypto/asymmetric_keys/mscode_parser.c             |   19 +-
 crypto/asymmetric_keys/pkcs7.asn1                  |    7 +
 crypto/asymmetric_keys/pkcs7_parser.c              |   22 +-
 crypto/asymmetric_keys/pkcs8.asn1                  |    6 +
 crypto/asymmetric_keys/public_key.c                |    8 +-
 crypto/asymmetric_keys/selftest.c                  |   15 +-
 crypto/asymmetric_keys/signature.c                 |    2 +-
 crypto/asymmetric_keys/x509.asn1                   |    7 +
 crypto/asymmetric_keys/x509_akid.asn1              |   29 +-
 crypto/asymmetric_keys/x509_cert_parser.c          |   36 +-
 crypto/asymmetric_keys/x509_parser.h               |    9 -
 crypto/asymmetric_keys/x509_public_key.c           |    8 +-
 crypto/authenc.c                                   |   20 +-
 crypto/authencesn.c                                |   28 +-
 crypto/cbc.c                                       |  159 +-
 crypto/ccm.c                                       |   29 +-
 crypto/chacha20poly1305.c                          |   11 +-
 crypto/cmac.c                                      |   39 +-
 crypto/cryptd.c                                    |   14 +-
 crypto/crypto_engine.c                             |    8 +-
 crypto/ctr.c                                       |   14 +-
 crypto/cts.c                                       |   12 +-
 crypto/deflate.c                                   |   61 +-
 crypto/drbg.c                                      |    2 +-
 crypto/ecb.c                                       |  206 ++-
 crypto/essiv.c                                     |   20 +-
 crypto/gcm.c                                       |   12 +-
 crypto/hash.h                                      |   14 +-
 crypto/hash_info.c                                 |    6 +
 crypto/hctr2.c                                     |   11 +-
 crypto/hmac.c                                      |   56 +-
 crypto/jitterentropy-kcapi.c                       |   17 +-
 crypto/jitterentropy.c                             |  342 +++--
 crypto/jitterentropy.h                             |    5 +-
 crypto/lrw.c                                       |   12 +-
 crypto/lskcipher.c                                 |  634 ++++++++
 crypto/pcrypt.c                                    |    4 +
 crypto/rsa-pkcs1pad.c                              |   27 +-
 crypto/rsaprivkey.asn1                             |    7 +
 crypto/rsapubkey.asn1                              |    7 +
 crypto/shash.c                                     |  387 +----
 crypto/skcipher.c                                  |   81 +-
 crypto/skcipher.h                                  |   28 +
 crypto/testmgr.c                                   |   57 +-
 crypto/testmgr.h                                   |  155 --
 crypto/vmac.c                                      |    1 -
 crypto/xcbc.c                                      |   32 +-
 crypto/xts.c                                       |   33 +-
 drivers/char/hw_random/bcm2835-rng.c               |    4 +-
 drivers/char/hw_random/core.c                      |    6 +
 drivers/char/hw_random/geode-rng.c                 |    6 +-
 drivers/char/hw_random/hisi-rng.c                  |    2 -
 drivers/char/hw_random/imx-rngc.c                  |   10 +-
 drivers/char/hw_random/ks-sa-rng.c                 |   26 +-
 drivers/char/hw_random/meson-rng.c                 |   80 +-
 drivers/char/hw_random/mpfs-rng.c                  |    2 -
 drivers/char/hw_random/n2-drv.c                    |   10 +-
 drivers/char/hw_random/nomadik-rng.c               |    1 +
 drivers/char/hw_random/octeon-rng.c                |    6 +-
 drivers/char/hw_random/st-rng.c                    |    1 +
 drivers/char/hw_random/stm32-rng.c                 |  519 +++++--
 drivers/char/hw_random/xgene-rng.c                 |    1 -
 drivers/char/hw_random/xiphera-trng.c              |    2 -
 drivers/crypto/Kconfig                             |    1 +
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |    7 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |   11 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |   11 +-
 drivers/crypto/amcc/crypto4xx_core.c               |    6 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c          |    5 +-
 drivers/crypto/aspeed/aspeed-acry.c                |    6 +-
 drivers/crypto/aspeed/aspeed-hace.c                |   16 +-
 drivers/crypto/atmel-aes.c                         |    6 +-
 drivers/crypto/atmel-sha.c                         |    8 +-
 drivers/crypto/atmel-tdes.c                        |    6 +-
 drivers/crypto/axis/artpec6_crypto.c               |    8 +-
 drivers/crypto/bcm/cipher.c                        |    5 +-
 drivers/crypto/caam/caamalg.c                      |    3 +-
 drivers/crypto/caam/caamalg_qi2.c                  |    3 +-
 drivers/crypto/caam/jr.c                           |   22 +-
 drivers/crypto/cavium/nitrox/nitrox_hal.c          |    2 +-
 drivers/crypto/ccp/dbc.c                           |   74 +-
 drivers/crypto/ccp/dbc.h                           |   29 +-
 drivers/crypto/ccp/psp-dev.c                       |  122 +-
 drivers/crypto/ccp/psp-dev.h                       |   55 +
 drivers/crypto/ccp/sev-dev.c                       |   14 +
 drivers/crypto/ccp/sp-dev.h                        |    4 +
 drivers/crypto/ccp/sp-pci.c                        |   22 +-
 drivers/crypto/ccp/sp-platform.c                   |    6 +-
 drivers/crypto/ccp/tee-dev.c                       |   48 +-
 drivers/crypto/ccp/tee-dev.h                       |   15 +-
 drivers/crypto/ccree/cc_driver.c                   |    6 +-
 drivers/crypto/chelsio/chcr_algo.c                 |    9 +-
 drivers/crypto/exynos-rng.c                        |    6 +-
 drivers/crypto/gemini/sl3516-ce-core.c             |    6 +-
 drivers/crypto/hifn_795x.c                         |   11 +-
 drivers/crypto/hisilicon/debugfs.c                 |   79 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   25 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   21 +-
 drivers/crypto/hisilicon/qm.c                      |  520 +++----
 drivers/crypto/hisilicon/qm_common.h               |    6 +-
 drivers/crypto/hisilicon/sec/sec_drv.c             |    6 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   32 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   29 +-
 drivers/crypto/hisilicon/trng/trng.c               |    6 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |  290 +---
 drivers/crypto/hisilicon/zip/zip_main.c            |   23 +-
 drivers/crypto/img-hash.c                          |    6 +-
 drivers/crypto/inside-secure/safexcel.c            |    6 +-
 drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c        |    6 +-
 .../crypto/intel/keembay/keembay-ocs-aes-core.c    |    6 +-
 drivers/crypto/intel/keembay/keembay-ocs-ecc.c     |    6 +-
 .../crypto/intel/keembay/keembay-ocs-hcu-core.c    |   15 +-
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |  245 ++-
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h   |   30 +-
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |   36 +-
 .../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c |    1 +
 drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c       |    1 +
 drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c     |    1 +
 .../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c   |    1 +
 drivers/crypto/intel/qat/qat_c62x/adf_drv.c        |    1 +
 drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c      |    1 +
 drivers/crypto/intel/qat/qat_common/Makefile       |   10 +
 .../intel/qat/qat_common/adf_accel_devices.h       |   61 +-
 drivers/crypto/intel/qat/qat_common/adf_admin.c    |  156 +-
 drivers/crypto/intel/qat/qat_common/adf_admin.h    |   27 +
 drivers/crypto/intel/qat/qat_common/adf_aer.c      |    3 +-
 .../crypto/intel/qat/qat_common/adf_cfg_services.c |   20 +
 .../crypto/intel/qat/qat_common/adf_cfg_services.h |   24 +
 .../crypto/intel/qat/qat_common/adf_cfg_strings.h  |    1 +
 drivers/crypto/intel/qat/qat_common/adf_clock.c    |    1 +
 .../crypto/intel/qat/qat_common/adf_cnv_dbgfs.c    |  300 ++++
 .../crypto/intel/qat/qat_common/adf_cnv_dbgfs.h    |   11 +
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |   20 +-
 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c    |    6 +
 .../crypto/intel/qat/qat_common/adf_fw_counters.c  |    3 +-
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |    7 +
 drivers/crypto/intel/qat/qat_common/adf_gen4_pm.c  |   27 +-
 drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h  |   50 +-
 .../intel/qat/qat_common/adf_gen4_pm_debugfs.c     |  266 ++++
 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c | 1566 ++++++++++++++++++++
 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.h |  825 +++++++++++
 .../crypto/intel/qat/qat_common/adf_gen4_timer.c   |    1 +
 .../crypto/intel/qat/qat_common/adf_heartbeat.c    |    1 +
 .../intel/qat/qat_common/adf_heartbeat_dbgfs.c     |    1 +
 drivers/crypto/intel/qat/qat_common/adf_init.c     |   63 +-
 drivers/crypto/intel/qat/qat_common/adf_isr.c      |   18 +
 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.c |   48 +
 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.h |   12 +
 drivers/crypto/intel/qat/qat_common/adf_rl.c       | 1169 +++++++++++++++
 drivers/crypto/intel/qat/qat_common/adf_rl.h       |  176 +++
 drivers/crypto/intel/qat/qat_common/adf_rl_admin.c |   97 ++
 drivers/crypto/intel/qat/qat_common/adf_rl_admin.h |   18 +
 drivers/crypto/intel/qat/qat_common/adf_sysfs.c    |  112 +-
 .../intel/qat/qat_common/adf_sysfs_ras_counters.c  |  112 ++
 .../intel/qat/qat_common/adf_sysfs_ras_counters.h  |   27 +
 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c |  451 ++++++
 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.h |   11 +
 .../intel/qat/qat_common/adf_transport_debug.c     |    4 +-
 .../intel/qat/qat_common/icp_qat_fw_init_admin.h   |   82 +
 drivers/crypto/intel/qat/qat_common/icp_qat_hw.h   |    2 +
 .../crypto/intel/qat/qat_common/qat_algs_send.c    |   46 +-
 .../crypto/intel/qat/qat_common/qat_comp_algs.c    |  129 +-
 drivers/crypto/intel/qat/qat_common/qat_uclo.c     |    2 +-
 .../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c  |    1 +
 drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c    |    1 +
 drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c  |    1 +
 drivers/crypto/marvell/cesa/cesa.c                 |    6 +-
 drivers/crypto/mxs-dcp.c                           |    8 +-
 drivers/crypto/n2_core.c                           |   12 +-
 drivers/crypto/omap-aes.c                          |    6 +-
 drivers/crypto/omap-des.c                          |    6 +-
 drivers/crypto/omap-sham.c                         |   22 +-
 drivers/crypto/qce/core.c                          |    5 +-
 drivers/crypto/qcom-rng.c                          |   71 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |    5 +-
 drivers/crypto/rockchip/rk3288_crypto_ahash.c      |    3 -
 drivers/crypto/s5p-sss.c                           |   12 +-
 drivers/crypto/sa2ul.c                             |    6 +-
 drivers/crypto/sahara.c                            |    6 +-
 drivers/crypto/starfive/jh7110-hash.c              |   13 +-
 drivers/crypto/stm32/stm32-crc32.c                 |   17 +-
 drivers/crypto/stm32/stm32-cryp.c                  |   16 +-
 drivers/crypto/stm32/stm32-hash.c                  |   20 -
 drivers/crypto/talitos.c                           |   23 +-
 drivers/crypto/virtio/virtio_crypto_common.h       |    3 +
 drivers/crypto/virtio/virtio_crypto_core.c         |   14 +-
 drivers/crypto/vmx/aesp8-ppc.pl                    |  141 +-
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |    6 +-
 drivers/crypto/xilinx/zynqmp-sha.c                 |    7 +-
 .../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c    |    2 -
 .../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.h    |    1 -
 .../ethernet/chelsio/inline_crypto/chtls/chtls.h   |    1 -
 drivers/net/wireguard/cookie.c                     |    2 +-
 drivers/net/wireguard/netlink.c                    |    2 +-
 drivers/net/wireguard/noise.c                      |    2 +-
 fs/crypto/keysetup_v1.c                            |    2 +-
 fs/smb/server/ksmbd_spnego_negtokeninit.asn1       |    8 +
 fs/smb/server/ksmbd_spnego_negtokentarg.asn1       |    7 +
 fs/ubifs/auth.c                                    |    3 +-
 fs/ubifs/replay.c                                  |    1 -
 fs/ubifs/ubifs.h                                   |    2 +-
 include/crypto/aead.h                              |   12 +
 include/crypto/akcipher.h                          |    4 +-
 include/crypto/algapi.h                            |    5 -
 include/crypto/engine.h                            |    2 +-
 include/crypto/hash.h                              |   95 +-
 include/crypto/hash_info.h                         |    1 +
 include/crypto/internal/hash.h                     |    9 +-
 include/crypto/internal/skcipher.h                 |  130 +-
 include/crypto/sig.h                               |    2 +-
 include/crypto/skcipher.h                          |  296 +++-
 include/linux/crypto.h                             |   30 +-
 include/linux/hisi_acc_qm.h                        |   39 +-
 include/linux/hw_random.h                          |    1 +
 include/linux/oid_registry.h                       |   23 +-
 include/linux/units.h                              |    4 +
 include/linux/verification.h                       |    1 +
 include/uapi/linux/hash_info.h                     |    3 +
 kernel/module/Kconfig                              |   25 +-
 kernel/padata.c                                    |    8 +-
 net/bluetooth/smp.c                                |    3 +-
 net/ceph/messenger_v2.c                            |    4 -
 net/ipv4/ah4.c                                     |   19 +-
 net/ipv4/netfilter/nf_nat_snmp_basic.asn1          |    8 +
 net/ipv6/ah6.c                                     |   19 +-
 net/mptcp/subflow.c                                |    2 +-
 net/sunrpc/auth_gss/gss_krb5_crypto.c              |    2 +-
 net/sunrpc/auth_gss/gss_krb5_unseal.c              |    2 -
 net/xfrm/Kconfig                                   |    1 +
 net/xfrm/xfrm_algo.c                               |   19 +-
 security/integrity/evm/evm_main.c                  |    3 +-
 security/keys/encrypted-keys/encrypted.c           |    2 +-
 tools/crypto/ccp/dbc.c                             |   17 +-
 tools/crypto/ccp/dbc.py                            |    8 +-
 tools/crypto/ccp/test_dbc.py                       |   45 +-
 277 files changed, 10706 insertions(+), 3352 deletions(-)
 create mode 100644 Documentation/ABI/testing/sysfs-driver-qat_ras
 create mode 100644 Documentation/ABI/testing/sysfs-driver-qat_rl
 create mode 100644 crypto/lskcipher.c
 create mode 100644 crypto/skcipher.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_admin.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cfg_services.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cfg_services.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cnv_dbgfs.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cnv_dbgfs.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_pm_debugfs.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl_admin.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl_admin.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_ras_counters.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_ras_counters.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.7
  2023-11-02  6:56                                           ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
@ 2023-11-03  2:34                                             ` Linus Torvalds
  2023-11-03  5:52                                               ` Herbert Xu
  2023-11-03  2:37                                             ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
  2024-01-09 22:17                                             ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2023-11-03  2:34 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, 1 Nov 2023 at 20:56, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Stephan Müller (5):
>       crypto: jitter - add RCT/APT support for different OSRs
>       crypto: jitter - Allow configuration of memory size
>       crypto: jitter - Allow configuration of oversampling rate
>       crypto: jitter - reuse allocated entropy collector
>       crypto: jitter - use permanent health test storage

This is beyond annoying.

These are adding Kconfig questions that don't make sense. The whole
jitter thing is debatably useful in the first place, and now you just
annoy users with random questions.

And I mean truly random - the whole jitter entropy is voodoo
programming to begin with, and having some crazy 8MB buffer for it is
just ridiculous.

Honestly, this all smells like somebody's PhD thesis, not a real life thing.

And no, we don't make our Kconfig questions more annoying for some PhD thesis.

We also don't ask people questions that don't have valid answers. Just
because the whole "what is entropy in the first place" isn't
clear-cut, we don't then punt some tweaking question to the user.

We have a very simple and stupid jitter entropy thing AT BOOT TIME
just to try to generate some amount of entropy to make boots
non-repeatable (see "try_to_generate_entropy()" in
drivers/char/random.c).

Honestly, the whole crypto layer one is ridiculous overkill in the
first place, but the annoying new questions have now literally made me
consider just removing it entirely.

Because no, IT IS NOT OK TO ASK CRAZY QUESTIONS. If some developer
cannot come up with a reasonable answer, a random user sure has hell
cannot.

And no, any question that says "do you want to use 8MB of memory for
jitter entropy" is just batsh*t crazy.

This kind of crap needs to stop.

If somebody wants to do this kind of thing, just do it in user space.
It's ridiculously pointless in the kernel.

Convince me I'm wrong. But there is no way in *hell* you will convince
me that we should ask users about some jitter memory sizing.
Allocating memory for timing analysis is silly to begin with, since
any kernel thing could just use the physical memory mapping we already
have in the kernel. I suspect strongly that all this code has been
influenced by code running in user space, where it belongs, and where
you do need to allocate memory to have it available.

Please just make this noise go away.

             Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.7
  2023-11-02  6:56                                           ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
  2023-11-03  2:34                                             ` Linus Torvalds
@ 2023-11-03  2:37                                             ` pr-tracker-bot
  2024-01-09 22:17                                             ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-11-03  2:37 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 2 Nov 2023 14:56:05 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bc3012f4e3a9765de81f454cb8f9bb16aafc6ff5

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.7
  2023-11-03  2:34                                             ` Linus Torvalds
@ 2023-11-03  5:52                                               ` Herbert Xu
  2023-11-03  6:32                                                 ` Linus Torvalds
  0 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2023-11-03  5:52 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Steffen Klassert

On Thu, Nov 02, 2023 at 04:34:11PM -1000, Linus Torvalds wrote:
> On Wed, 1 Nov 2023 at 20:56, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Stephan Müller (5):
> >       crypto: jitter - add RCT/APT support for different OSRs
> >       crypto: jitter - Allow configuration of memory size
> >       crypto: jitter - Allow configuration of oversampling rate
> >       crypto: jitter - reuse allocated entropy collector
> >       crypto: jitter - use permanent health test storage
> 
> This is beyond annoying.

...
 
> Please just make this noise go away.

Fair enough.  How about adding an EXPERT dependency on this?

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.7
  2023-11-03  5:52                                               ` Herbert Xu
@ 2023-11-03  6:32                                                 ` Linus Torvalds
  2023-11-06 10:00                                                   ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
  0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2023-11-03  6:32 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Steffen Klassert

On Thu, 2 Nov 2023 at 19:52, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Fair enough.  How about adding an EXPERT dependency on this?

I think that would help the situation, but I assume the sizing for the
jitter buffer is at least partly due to trying to account for cache
sizing or similar issues?

Which really means that I assume any static compile-time answer to
that question is always wrong - whether you are an expert or not.
Unless you are just building the thing for one particular machine.

So I do think the problem is deeper than "this is a question only for
experts". I definitely don't think you should ask a regular user (or
even a distro kernel package manager). I suspect it's likely that the
question is just wrong in general - because any particular one buffer
size for any number of machines simply cannot be the right answer.

I realize that the commit says "*allow* for configuration of memory
size", but I really question the whole approach.

But yes - hiding these questions from any reasonable normal user is at
least a good first step.

              Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
  2023-11-03  6:32                                                 ` Linus Torvalds
@ 2023-11-06 10:00                                                   ` Herbert Xu
  2023-11-06 15:25                                                     ` Stephan Mueller
  2023-11-10  9:04                                                     ` Geert Uytterhoeven
  0 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-11-06 10:00 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Steffen Klassert, Stephan Müller

On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> 
> I think that would help the situation, but I assume the sizing for the
> jitter buffer is at least partly due to trying to account for cache
> sizing or similar issues?
> 
> Which really means that I assume any static compile-time answer to
> that question is always wrong - whether you are an expert or not.
> Unless you are just building the thing for one particular machine.
> 
> So I do think the problem is deeper than "this is a question only for
> experts". I definitely don't think you should ask a regular user (or
> even a distro kernel package manager). I suspect it's likely that the
> question is just wrong in general - because any particular one buffer
> size for any number of machines simply cannot be the right answer.
> 
> I realize that the commit says "*allow* for configuration of memory
> size", but I really question the whole approach.

Yes I think these are all valid points.  I just noticed that I
forgot to cc the author so let's see if Stephan has anything to
add.

> But yes - hiding these questions from any reasonable normal user is at
> least a good first step.

OK here's the patch:

---8<---
As JITTERENTROPY is selected by default if you enable the CRYPTO
API, any Kconfig options added there will show up for every single
user.  Hide the esoteric options under EXPERT as well as FIPS so
that only distro makers will see them.

Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

diff --git a/crypto/Kconfig b/crypto/Kconfig
index bbf51d55724e..70661f58ee41 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
 
 	  See https://www.chronox.de/jent.html
 
+if CRYPTO_JITTERENTROPY
+if CRYPTO_FIPS && EXPERT
+
 choice
 	prompt "CPU Jitter RNG Memory Size"
 	default CRYPTO_JITTERENTROPY_MEMSIZE_2
-	depends on CRYPTO_JITTERENTROPY
 	help
 	  The Jitter RNG measures the execution time of memory accesses.
 	  Multiple consecutive memory accesses are performed. If the memory
@@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
 	int "CPU Jitter RNG Oversampling Rate"
 	range 1 15
 	default 1
-	depends on CRYPTO_JITTERENTROPY
 	help
 	  The Jitter RNG allows the specification of an oversampling rate (OSR).
 	  The Jitter RNG operation requires a fixed amount of timing
@@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
 
 config CRYPTO_JITTERENTROPY_TESTINTERFACE
 	bool "CPU Jitter RNG Test Interface"
-	depends on CRYPTO_JITTERENTROPY
 	help
 	  The test interface allows a privileged process to capture
 	  the raw unconditioned high resolution time stamp noise that
@@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
 
 	  If unsure, select N.
 
+endif	# if CRYPTO_FIPS && EXPERT
+
+if !(CRYPTO_FIPS && EXPERT)
+
+config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
+	int
+	default 64
+
+config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
+	int
+	default 32
+
+config CRYPTO_JITTERENTROPY_OSR
+	int
+	default 1
+
+config CRYPTO_JITTERENTROPY_TESTINTERFACE
+	bool
+
+endif	# if !(CRYPTO_FIPS && EXPERT)
+endif	# if CRYPTO_JITTERENTROPY
+
 config CRYPTO_KDF800108_CTR
 	tristate
 	select CRYPTO_HMAC
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply related	[flat|nested] 204+ messages in thread

* Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
  2023-11-06 10:00                                                   ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
@ 2023-11-06 15:25                                                     ` Stephan Mueller
  2023-11-10  9:04                                                     ` Geert Uytterhoeven
  1 sibling, 0 replies; 204+ messages in thread
From: Stephan Mueller @ 2023-11-06 15:25 UTC (permalink / raw)
  To: Linus Torvalds, Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Steffen Klassert

Am Montag, 6. November 2023, 11:00:08 CET schrieb Herbert Xu:

Hi Herbert,

> On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> > I think that would help the situation, but I assume the sizing for the
> > jitter buffer is at least partly due to trying to account for cache
> > sizing or similar issues?
> > 
> > Which really means that I assume any static compile-time answer to
> > that question is always wrong - whether you are an expert or not.
> > Unless you are just building the thing for one particular machine.
> > 
> > So I do think the problem is deeper than "this is a question only for
> > experts". I definitely don't think you should ask a regular user (or
> > even a distro kernel package manager). I suspect it's likely that the
> > question is just wrong in general - because any particular one buffer
> > size for any number of machines simply cannot be the right answer.
> > 
> > I realize that the commit says "*allow* for configuration of memory
> > size", but I really question the whole approach.
> 
> Yes I think these are all valid points.  I just noticed that I
> forgot to cc the author so let's see if Stephan has anything to
> add.

I concur that these questions are more for experts. 
> 
> > But yes - hiding these questions from any reasonable normal user is at
> > least a good first step.
> 
> OK here's the patch:
> 
> ---8<---
> As JITTERENTROPY is selected by default if you enable the CRYPTO
> API, any Kconfig options added there will show up for every single
> user.  Hide the esoteric options under EXPERT as well as FIPS so
> that only distro makers will see them.
> 
> Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
> 
> diff --git a/crypto/Kconfig b/crypto/Kconfig
> index bbf51d55724e..70661f58ee41 100644
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
> 
>  	  See https://www.chronox.de/jent.html
> 
> +if CRYPTO_JITTERENTROPY
> +if CRYPTO_FIPS && EXPERT
> +
>  choice
>  	prompt "CPU Jitter RNG Memory Size"
>  	default CRYPTO_JITTERENTROPY_MEMSIZE_2
> -	depends on CRYPTO_JITTERENTROPY
>  	help
>  	  The Jitter RNG measures the execution time of memory accesses.
>  	  Multiple consecutive memory accesses are performed. If the memory
> @@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
>  	int "CPU Jitter RNG Oversampling Rate"
>  	range 1 15
>  	default 1
> -	depends on CRYPTO_JITTERENTROPY
>  	help
>  	  The Jitter RNG allows the specification of an oversampling rate (OSR).
>  	  The Jitter RNG operation requires a fixed amount of timing
> @@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
> 
>  config CRYPTO_JITTERENTROPY_TESTINTERFACE
>  	bool "CPU Jitter RNG Test Interface"
> -	depends on CRYPTO_JITTERENTROPY
>  	help
>  	  The test interface allows a privileged process to capture
>  	  the raw unconditioned high resolution time stamp noise that
> @@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
> 
>  	  If unsure, select N.
> 
> +endif	# if CRYPTO_FIPS && EXPERT
> +
> +if !(CRYPTO_FIPS && EXPERT)
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
> +	int
> +	default 64
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
> +	int
> +	default 32
> +
> +config CRYPTO_JITTERENTROPY_OSR
> +	int
> +	default 1
> +
> +config CRYPTO_JITTERENTROPY_TESTINTERFACE
> +	bool
> +
> +endif	# if !(CRYPTO_FIPS && EXPERT)
> +endif	# if CRYPTO_JITTERENTROPY
> +
>  config CRYPTO_KDF800108_CTR
>  	tristate
>  	select CRYPTO_HMAC

Reviewed-by: Stephan Mueller <smueller@chronox.de>


Ciao
Stephan



^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.7
  2023-08-31  5:16                                                 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
  2023-09-01 23:19                                                   ` pr-tracker-bot
  2023-09-22  2:10                                                   ` Herbert Xu
@ 2023-11-09  4:30                                                   ` Herbert Xu
  2023-11-10  1:30                                                     ` pr-tracker-bot
  2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2023-11-09  4:30 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit a312e07a65fb598ed239b940434392721385c722:

  crypto: adiantum - flush destination page before unmapping (2023-11-01 12:58:42 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p2 

for you to fetch changes up to 9aedd10fe38418319bd8ed55dc68a40ec04aaa05:

  crypto: ahash - Set using_shash for cloned ahash wrapper over shash (2023-11-07 16:44:36 +0800)

----------------------------------------------------------------
This push fixes a regression in ahash and hides the Kconfig
sub-options for the jitter RNG.
----------------------------------------------------------------

Dmitry Safonov (1):
      crypto: ahash - Set using_shash for cloned ahash wrapper over shash

Herbert Xu (1):
      crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT

 crypto/Kconfig | 28 +++++++++++++++++++++++++---
 crypto/ahash.c |  1 +
 2 files changed, 26 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.7
  2023-11-09  4:30                                                   ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
@ 2023-11-10  1:30                                                     ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-11-10  1:30 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 9 Nov 2023 12:30:43 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3b220413438184b352b297e7cf593fa56999b5b3

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
  2023-11-06 10:00                                                   ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
  2023-11-06 15:25                                                     ` Stephan Mueller
@ 2023-11-10  9:04                                                     ` Geert Uytterhoeven
  1 sibling, 0 replies; 204+ messages in thread
From: Geert Uytterhoeven @ 2023-11-10  9:04 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Steffen Klassert, Stephan Müller,
	Masahiro Yamada, linux-kbuild

Hi Herbert, Yamada-san,

On Mon, Nov 6, 2023 at 11:00 AM Herbert Xu <herbert@gondor.apana.org.au> wrote:
> On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> > I think that would help the situation, but I assume the sizing for the
> > jitter buffer is at least partly due to trying to account for cache
> > sizing or similar issues?
> >
> > Which really means that I assume any static compile-time answer to
> > that question is always wrong - whether you are an expert or not.
> > Unless you are just building the thing for one particular machine.
> >
> > So I do think the problem is deeper than "this is a question only for
> > experts". I definitely don't think you should ask a regular user (or
> > even a distro kernel package manager). I suspect it's likely that the
> > question is just wrong in general - because any particular one buffer
> > size for any number of machines simply cannot be the right answer.
> >
> > I realize that the commit says "*allow* for configuration of memory
> > size", but I really question the whole approach.
>
> Yes I think these are all valid points.  I just noticed that I
> forgot to cc the author so let's see if Stephan has anything to
> add.
>
> > But yes - hiding these questions from any reasonable normal user is at
> > least a good first step.
>
> OK here's the patch:
>
> ---8<---
> As JITTERENTROPY is selected by default if you enable the CRYPTO
> API, any Kconfig options added there will show up for every single
> user.  Hide the esoteric options under EXPERT as well as FIPS so
> that only distro makers will see them.
>
> Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

Thanks for your patch, which is now commit e7ed6473c2c8c4e4 ("crypto:
jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT").

> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
>
>           See https://www.chronox.de/jent.html
>
> +if CRYPTO_JITTERENTROPY
> +if CRYPTO_FIPS && EXPERT
> +
>  choice
>         prompt "CPU Jitter RNG Memory Size"
>         default CRYPTO_JITTERENTROPY_MEMSIZE_2
> -       depends on CRYPTO_JITTERENTROPY
>         help
>           The Jitter RNG measures the execution time of memory accesses.
>           Multiple consecutive memory accesses are performed. If the memory
> @@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
>         int "CPU Jitter RNG Oversampling Rate"
>         range 1 15
>         default 1
> -       depends on CRYPTO_JITTERENTROPY
>         help
>           The Jitter RNG allows the specification of an oversampling rate (OSR).
>           The Jitter RNG operation requires a fixed amount of timing
> @@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
>
>  config CRYPTO_JITTERENTROPY_TESTINTERFACE
>         bool "CPU Jitter RNG Test Interface"
> -       depends on CRYPTO_JITTERENTROPY
>         help
>           The test interface allows a privileged process to capture
>           the raw unconditioned high resolution time stamp noise that
> @@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
>
>           If unsure, select N.
>
> +endif  # if CRYPTO_FIPS && EXPERT
> +
> +if !(CRYPTO_FIPS && EXPERT)
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
> +       int
> +       default 64
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
> +       int
> +       default 32
> +
> +config CRYPTO_JITTERENTROPY_OSR
> +       int
> +       default 1
> +
> +config CRYPTO_JITTERENTROPY_TESTINTERFACE
> +       bool

This duplicates the symbols in the CRYPTO_FIPS && EXPERT section above,
which is fragile.

For the int and bool symbols, this can be handled without duplication
using:

     config CRYPTO_JITTERENTROPY_OSR
    -       int "CPU Jitter RNG Oversampling Rate"
    +       int "CPU Jitter RNG Oversampling Rate" if CRYPTO_FIPS && EXPERT

     config CRYPTO_JITTERENTROPY_TESTINTERFACE
    -       bool "CPU Jitter RNG Test Interface"
    +       bool "CPU Jitter RNG Test Interface" if CRYPTO_FIPS && EXPERT

Unfortunately the following does not work for the choice statement,
although kconfig does not report an error:

     choice
    -       prompt "CPU Jitter RNG Memory Size"
    +       prompt "CPU Jitter RNG Memory Size" if CRYPTO_FIPS && EXPERT
             default CRYPTO_JITTERENTROPY_MEMSIZE_2

Unlike for other symbol types, which just become silent if
!(CRYPTO_FIPS && EXPERT), the choice is skipped completely if
!(CRYPTO_FIPS && EXPERT), and CRYPTO_JITTERENTROPY_MEMSIZE_2 is not set.

Yamada-san: Do you know why choice behaves differently?
Is this easy to fix?

Thanks!

> +
> +endif  # if !(CRYPTO_FIPS && EXPERT)
> +endif  # if CRYPTO_JITTERENTROPY
> +
>  config CRYPTO_KDF800108_CTR
>         tristate
>         select CRYPTO_HMAC

Gr{oetje,eeting}s,

                        Geert

-- 
Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org

In personal conversations with technical people, I call myself a hacker. But
when I'm talking to journalists I just say "programmer" or something like that.
                                -- Linus Torvalds

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.8
  2023-11-02  6:56                                           ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
  2023-11-03  2:34                                             ` Linus Torvalds
  2023-11-03  2:37                                             ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
@ 2024-01-09 22:17                                             ` Herbert Xu
  2024-01-10 20:38                                               ` pr-tracker-bot
                                                                 ` (2 more replies)
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-01-09 22:17 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit b85ea95d086471afb4ad062012a4d73cd328fa86:

  Linux 6.7-rc1 (2023-11-12 16:19:07 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p1 

for you to fetch changes up to b8910630c967ffee582289451ddb5f9f19c26872:

  crypto: iaa - Account for cpu-less numa nodes (2023-12-29 11:25:56 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Add incremental lskcipher/skcipher processing.

Algorithms:

- Remove SHA1 from drbg.
- Remove CFB and OFB.

Drivers:

- Add comp high perf mode configuration in hisilicon/zip.
- Add support for 420xx devices in qat.
- Add IAA Compression Accelerator driver.
----------------------------------------------------------------

Bharat Bhushan (2):
      crypto: octeontx2 - By default allocate one CPT LF per CPT VF
      crypto: octeontx2 - Fix cptvf driver cleanup

Chanho Park (1):
      crypto: jh7110 - Correct deferred probe return

Chen Ni (1):
      crypto: sa2ul - Return crypto_aead_setkey to transfer the error

Chenghai Huang (3):
      crypto: hisilicon/zip - add zip comp high perf mode configuration
      crypto: hisilicon/qm - delete a dbg function
      crypto: hisilicon/sec2 - optimize the error return process

Chengming Zhou (1):
      crypto: scomp - fix req->dst buffer overflow

Christophe JAILLET (1):
      hwrng: virtio - Remove usage of the deprecated ida_simple_xx() API

Damian Muszynski (5):
      crypto: qat - add sysfs_added flag for ras
      crypto: qat - add sysfs_added flag for rate limiting
      crypto: qat - fix error path in add_update_sla()
      crypto: qat - fix mutex ordering in adf_rl
      crypto: qat - generate dynamically arbiter mappings

Dan Carpenter (2):
      crypto: rsa - add a check for allocation failure
      crypto: qat - prevent underflow in rp2srv_store()

Dave Jiang (1):
      dmaengine: idxd: add external module driver support for dsa_bus_type

Dimitri John Ledkov (4):
      crypto: drbg - ensure most preferred type is FIPS health checked
      crypto: drbg - update FIPS CTR self-checks to aes256
      crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
      crypto: drbg - Remove SHA1 from drbg

Dinghao Liu (1):
      crypto: ccp - fix memleak in ccp_init_dm_workarea

Eric Biggers (4):
      crypto: sun8i-ss - use crypto_shash_tfm_digest() in sun8i_ss_hashkey()
      crypto: shash - don't exclude async statuses from error stats
      crypto: x86/sha1 - autoload if SHA-NI detected
      crypto: x86/sha256 - autoload if SHA-NI detected

Giovanni Cabiddu (1):
      crypto: qat - add NULL pointer check

Gonglei (Arei) (1):
      crypto: virtio - Handle dataq logic with tasklet

Gustavo A. R. Silva (1):
      crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings

Herbert Xu (31):
      crypto: ccree - Silence gcc format-truncation false positive warnings
      crypto: marvell/cesa - Silence gcc format-truncation false positive warnings
      crypto: n2 - Silence gcc format-truncation false positive warnings
      crypto: af_alg - Disallow multiple in-flight AIO requests
      hwrng: core - Fix page fault dead lock on mmap-ed hwrng
      crypto: s390/aes - Fix buffer overread in CTR mode
      crypto: arm64/sm4 - Remove cfb(sm4)
      crypto: x86/sm4 - Remove cfb(sm4)
      crypto: crypto4xx - Remove cfb and ofb
      crypto: aspeed - Remove cfb and ofb
      crypto: atmel - Remove cfb and ofb
      crypto: cpt - Remove cfb
      crypto: nitrox - Remove cfb
      crypto: ccp - Remove cfb and ofb
      crypto: hifn_795x - Remove cfb and ofb
      crypto: hisilicon/sec2 - Remove cfb and ofb
      crypto: safexcel - Remove cfb and ofb
      crypto: octeontx - Remove cfb
      crypto: n2 - Remove cfb
      crypto: starfive - Remove cfb and ofb
      crypto: bcm - Remove ofb
      crypto: ccree - Remove ofb
      crypto: tcrypt - Remove cfb and ofb
      crypto: testmgr - Remove cfb and ofb
      crypto: cfb,ofb - Remove cfb and ofb
      crypto: skcipher - Add internal state support
      crypto: skcipher - Make use of internal state
      crypto: arc4 - Add internal state
      crypto: algif_skcipher - Fix stream cipher chaining
      crypto: api - Disallow identical driver names
      crypto: skcipher - Pass statesize for simple lskcipher instances

Jia Jie Ho (8):
      crypto: starfive - Update driver dependencies
      crypto: starfive - RSA poll csr for done status
      crypto: starfive - Pad adata with zeroes
      hwrng: starfive - Fix dev_err_probe return error
      crypto: starfive - Remove unneeded NULL checks
      crypto: starfive - Fix dev_err_probe return error
      dt-bindings: rng: starfive: Add jh8100 compatible string
      hwrng: starfive - Add runtime pm ops

Jiapeng Chong (1):
      crypto: iaa - remove unneeded semicolon

Jie Wang (5):
      crypto: qat - relocate and rename get_service_enabled()
      crypto: qat - change signature of uof_get_num_objs()
      crypto: qat - relocate portions of qat_4xxx code
      crypto: qat - move fw config related structures
      crypto: qat - add support for 420xx devices

Krzysztof Kozlowski (2):
      dt-bindings: crypto: qcom-qce: constrain clocks for IPQ9574 QCE
      dt-bindings: crypto: qcom-qce: constrain clocks for SM8150-compatible QCE

Longfang Liu (1):
      MAINTAINERS: update SEC2/HPRE driver maintainers list

Lucas Segarra Fernandez (4):
      crypto: qat - include pci.h for GET_DEV()
      crypto: qat - add admin msgs for telemetry
      crypto: qat - add support for device telemetry
      crypto: qat - add support for ring pair level telemetry

Martin Kaiser (1):
      hwrng: virtio - remove #ifdef guards for PM functions

Neil Armstrong (3):
      dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
      dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
      dt-bindings: crypto: qcom,prng: document SM8650

Nikita Zhandarovich (1):
      crypto: safexcel - Add error handling for dma_map_sg() calls

Nithin Dabilpuram (2):
      crypto: octeontx2 - register error interrupts for inline cptlf
      crypto: octeontx2 - support setting ctx ilen for inline CPT LF

Om Prakash Singh (1):
      dt-bindings: crypto: qcom-qce: document the SC7280 crypto engine

Ovidiu Panait (28):
      crypto: sahara - remove FLAGS_NEW_KEY logic
      crypto: sahara - fix cbc selftest failure
      crypto: sahara - fix ahash selftest failure
      crypto: sahara - fix processing requests with cryptlen < sg->length
      crypto: sahara - fix error handling in sahara_hw_descriptor_create()
      crypto: sahara - remove unused error field in sahara_dev
      crypto: sahara - avoid skcipher fallback code duplication
      crypto: rk3288 - Use helper to set reqsize
      crypto: amlogic - Use helper to set reqsize
      crypto: artpec6 - Use helper to set reqsize
      crypto: stm32/cryp - Use helper to set reqsize
      crypto: sl3516 - Use helper to set reqsize
      crypto: sun8i-ce - Use helper to set reqsize
      crypto: sun8i-ss - Use helper to set reqsize
      crypto: sahara - handle zero-length aes requests
      crypto: sahara - fix ahash reqsize
      crypto: sahara - fix wait_for_completion_timeout() error handling
      crypto: sahara - improve error handling in sahara_sha_process()
      crypto: sahara - fix processing hash requests with req->nbytes < sg->length
      crypto: sahara - do not resize req->src when doing hash operations
      crypto: sahara - clean up macro indentation
      crypto: sahara - use BIT() macro
      crypto: sahara - use devm_clk_get_enabled()
      crypto: sahara - use dev_err_probe()
      crypto: sahara - remove 'active' flag from sahara_aes_reqctx struct
      crypto: sahara - remove unnecessary NULL assignments
      crypto: sahara - remove error message for bad aes request size
      crypto: sahara - add support for crypto_engine

Rafał Miłecki (1):
      dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema

Rob Herring (1):
      hwrng: ingenic - Replace of_device.h with explicit of.h include

Sagar Vashnav (1):
      crypto: lib/aesgcm - Add kernel docs for aesgcm_mac

Srujana Challa (7):
      crypto: octeontx2 - remove CPT block reset
      crypto: octeontx2 - add SGv2 support for CN10KB or CN10KA B0
      crypto: octeontx2 - add devlink option to set t106 mode
      crypto: octeontx2 - remove errata workaround for CN10KB or CN10KA B0 chip.
      crypto: octeontx2 - add LF reset on queue disable
      crypto: octeontx2 - update CPT inbound inline IPsec mailbox
      crypto: octeontx2 - add ctx_val workaround

Thomas Bourgoin (1):
      crypto: stm32/crc32 - fix parsing list of devices

Tianjia Zhang (1):
      crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init

Tom Zanussi (16):
      dmaengine: idxd: Rename drv_enable/disable_wq to idxd_drv_enable/disable_wq, and export
      dmaengine: idxd: Export descriptor management functions
      dmaengine: idxd: Export wq resource management functions
      dmaengine: idxd: Add wq private data accessors
      dmaengine: idxd: add callback support for iaa crypto
      crypto: iaa - Add IAA Compression Accelerator Documentation
      crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
      crypto: iaa - Add per-cpu workqueue table with rebalancing
      crypto: iaa - Add compression mode management along with fixed mode
      crypto: iaa - Add support for deflate-iaa compression algorithm
      crypto: iaa - Add irq support for the crypto async interface
      crypto: iaa - Add IAA Compression Accelerator stats
      dmaengine: idxd: Add support for device/wq defaults
      crypto: iaa - Change desc->priv to 0
      crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
      crypto: iaa - Account for cpu-less numa nodes

Uwe Kleine-König (12):
      hwrng: atmel - Convert to platform remove callback returning void
      hwrng: cctrng - Convert to platform remove callback returning void
      hwrng: exynos - Convert to platform remove callback returning void
      hwrng: ingenic - Convert to platform remove callback returning void
      hwrng: ks-sa - Convert to platform remove callback returning void
      hwrng: mxc - Convert to platform remove callback returning void
      hwrng: n2 - Convert to platform remove callback returning void
      hwrng: npcm - Convert to platform remove callback returning void
      hwrng: omap - Convert to platform remove callback returning void
      hwrng: stm32 - Convert to platform remove callback returning void
      hwrng: timeriomem - Convert to platform remove callback returning void
      hwrng: xgene - Convert to platform remove callback returning void

Vegard Nossum (2):
      crypto: shash - remove excess kerneldoc members
      crypto: skcipher - remove excess kerneldoc members

WangJinchao (1):
      crypto: tcrypt - add script tcrypt_speed_compare.py

Weili Qian (5):
      crypto: hisilicon/qm - print device abnormal information
      crypto: hisilicon/qm - remove incorrect type cast
      crypto: hisilicon/sgl - small cleanups for sgl.c
      crypto: hisilicon/qm - simplify the status of qm
      crypto: hisilicon/qm - add comments and remove redundant array element

Wenkai Lin (1):
      crypto: hisilicon/qm - add a function to set qm algs

Yang Yingliang (1):
      hwrng: stm32 - add missing clk_disable_unprepare() in stm32_rng_init()

Zhiqi Song (4):
      crypto: hisilicon/qm - save capability registers in qm init process
      crypto: hisilicon/hpre - save capability registers in probe process
      crypto: hisilicon/sec2 - save capability registers in probe process
      crypto: hisilicon/zip - save capability registers in probe process

wangyangxin (1):
      crypto: virtio - Wait for tasklet to complete on device remove

 .../ABI/testing/debugfs-driver-qat_telemetry       |  228 ++
 Documentation/ABI/testing/debugfs-hisi-hpre        |    2 +-
 Documentation/ABI/testing/debugfs-hisi-sec         |    2 +-
 Documentation/ABI/testing/debugfs-hisi-zip         |    2 +-
 Documentation/crypto/device_drivers/index.rst      |    9 +
 Documentation/crypto/device_drivers/octeontx2.rst  |   25 +
 Documentation/crypto/index.rst                     |    1 +
 .../bindings/crypto/inside-secure,safexcel.yaml    |   86 +
 .../bindings/crypto/inside-secure-safexcel.txt     |   40 -
 .../bindings/crypto/qcom,inline-crypto-engine.yaml |    1 +
 .../devicetree/bindings/crypto/qcom,prng.yaml      |    1 +
 .../devicetree/bindings/crypto/qcom-qce.yaml       |   14 +
 .../bindings/rng/starfive,jh7110-trng.yaml         |    6 +-
 Documentation/driver-api/crypto/iaa/iaa-crypto.rst |  824 ++++++++
 Documentation/driver-api/crypto/iaa/index.rst      |   20 +
 Documentation/driver-api/crypto/index.rst          |   20 +
 Documentation/driver-api/index.rst                 |    1 +
 MAINTAINERS                                        |   15 +-
 arch/arm64/crypto/Kconfig                          |    6 +-
 arch/arm64/crypto/sm4-ce-core.S                    |  158 --
 arch/arm64/crypto/sm4-ce-glue.c                    |  108 +-
 arch/arm64/crypto/sm4-ce.h                         |    3 -
 arch/arm64/crypto/sm4-neon-core.S                  |  113 -
 arch/arm64/crypto/sm4-neon-glue.c                  |  105 +-
 arch/powerpc/crypto/aes-gcm-p10-glue.c             |    2 +-
 arch/s390/crypto/aes_s390.c                        |    4 +-
 arch/s390/crypto/paes_s390.c                       |    4 +-
 arch/x86/crypto/Kconfig                            |    8 +-
 arch/x86/crypto/sha1_ssse3_glue.c                  |    7 +-
 arch/x86/crypto/sha256_ssse3_glue.c                |    7 +-
 arch/x86/crypto/sm4-aesni-avx-asm_64.S             |   52 -
 arch/x86/crypto/sm4-aesni-avx2-asm_64.S            |   55 -
 arch/x86/crypto/sm4-avx.h                          |    4 -
 arch/x86/crypto/sm4_aesni_avx2_glue.c              |   26 -
 arch/x86/crypto/sm4_aesni_avx_glue.c               |  130 --
 crypto/Kconfig                                     |   23 -
 crypto/Makefile                                    |    2 -
 crypto/af_alg.c                                    |   14 +-
 crypto/algapi.c                                    |    1 +
 crypto/algif_skcipher.c                            |   72 +-
 crypto/arc4.c                                      |   11 +-
 crypto/cbc.c                                       |    6 +-
 crypto/cfb.c                                       |  254 ---
 crypto/drbg.c                                      |   40 +-
 crypto/ecb.c                                       |   10 +-
 crypto/lskcipher.c                                 |   43 +-
 crypto/ofb.c                                       |  106 -
 crypto/rsa.c                                       |    2 +
 crypto/scompress.c                                 |    6 +
 crypto/shash.c                                     |    6 +-
 crypto/skcipher.c                                  |   80 +-
 crypto/tcrypt.c                                    |   76 -
 crypto/testmgr.c                                   |   74 +-
 crypto/testmgr.h                                   | 1148 ----------
 drivers/char/hw_random/atmel-rng.c                 |    6 +-
 drivers/char/hw_random/cctrng.c                    |    6 +-
 drivers/char/hw_random/core.c                      |   36 +-
 drivers/char/hw_random/exynos-trng.c               |    6 +-
 drivers/char/hw_random/ingenic-rng.c               |    8 +-
 drivers/char/hw_random/jh7110-trng.c               |   10 +-
 drivers/char/hw_random/ks-sa-rng.c                 |    6 +-
 drivers/char/hw_random/mxc-rnga.c                  |    6 +-
 drivers/char/hw_random/n2-drv.c                    |    6 +-
 drivers/char/hw_random/npcm-rng.c                  |    6 +-
 drivers/char/hw_random/omap-rng.c                  |    6 +-
 drivers/char/hw_random/stm32-rng.c                 |    7 +-
 drivers/char/hw_random/timeriomem-rng.c            |    6 +-
 drivers/char/hw_random/virtio-rng.c                |   14 +-
 drivers/char/hw_random/xgene-rng.c                 |    6 +-
 drivers/crypto/Kconfig                             |    1 +
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |    4 +-
 .../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c    |    5 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c  |   25 +-
 drivers/crypto/amcc/crypto4xx_alg.c                |   14 -
 drivers/crypto/amcc/crypto4xx_core.c               |   40 -
 drivers/crypto/amcc/crypto4xx_core.h               |    4 -
 drivers/crypto/amlogic/amlogic-gxl-cipher.c        |    4 +-
 drivers/crypto/aspeed/Kconfig                      |    4 +-
 drivers/crypto/aspeed/aspeed-hace-crypto.c         |  230 --
 drivers/crypto/atmel-aes.c                         |  214 +-
 drivers/crypto/atmel-tdes.c                        |  205 +-
 drivers/crypto/axis/artpec6_crypto.c               |   12 +-
 drivers/crypto/bcm/cipher.c                        |   57 -
 drivers/crypto/cavium/cpt/cptvf_algs.c             |   24 -
 drivers/crypto/cavium/nitrox/nitrox_skcipher.c     |   19 -
 drivers/crypto/ccp/ccp-crypto-aes.c                |   18 -
 drivers/crypto/ccp/ccp-ops.c                       |    5 +-
 drivers/crypto/ccree/cc_aead.c                     |   10 +-
 drivers/crypto/ccree/cc_cipher.c                   |   45 +-
 drivers/crypto/gemini/sl3516-ce-cipher.c           |    4 +-
 drivers/crypto/hifn_795x.c                         |  126 +-
 drivers/crypto/hisilicon/debugfs.c                 |   54 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |  122 +-
 drivers/crypto/hisilicon/qm.c                      |  264 ++-
 drivers/crypto/hisilicon/qm_common.h               |    4 -
 drivers/crypto/hisilicon/sec2/sec.h                |    7 +
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |   43 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |    2 -
 drivers/crypto/hisilicon/sec2/sec_main.c           |   72 +-
 drivers/crypto/hisilicon/sgl.c                     |   12 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |  227 +-
 drivers/crypto/inside-secure/safexcel.c            |    4 -
 drivers/crypto/inside-secure/safexcel.h            |    4 -
 drivers/crypto/inside-secure/safexcel_cipher.c     |  171 +-
 drivers/crypto/intel/Kconfig                       |    1 +
 drivers/crypto/intel/Makefile                      |    1 +
 drivers/crypto/intel/iaa/Kconfig                   |   19 +
 drivers/crypto/intel/iaa/Makefile                  |   12 +
 drivers/crypto/intel/iaa/iaa_crypto.h              |  173 ++
 drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c   |   92 +
 drivers/crypto/intel/iaa/iaa_crypto_main.c         | 2193 ++++++++++++++++++++
 drivers/crypto/intel/iaa/iaa_crypto_stats.c        |  312 +++
 drivers/crypto/intel/iaa/iaa_crypto_stats.h        |   53 +
 drivers/crypto/intel/qat/Kconfig                   |   11 +
 drivers/crypto/intel/qat/Makefile                  |    1 +
 drivers/crypto/intel/qat/qat_420xx/Makefile        |    4 +
 .../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c |  528 +++++
 .../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.h |   55 +
 drivers/crypto/intel/qat/qat_420xx/adf_drv.c       |  202 ++
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |  339 +--
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h   |   52 -
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |  277 +--
 drivers/crypto/intel/qat/qat_common/Makefile       |    4 +
 .../intel/qat/qat_common/adf_accel_devices.h       |   16 +-
 .../crypto/intel/qat/qat_common/adf_accel_engine.c |    2 +-
 drivers/crypto/intel/qat/qat_common/adf_admin.c    |   37 +
 drivers/crypto/intel/qat/qat_common/adf_admin.h    |    4 +
 .../crypto/intel/qat/qat_common/adf_cfg_common.h   |    1 +
 .../crypto/intel/qat/qat_common/adf_cfg_services.c |   27 +
 .../crypto/intel/qat/qat_common/adf_cfg_services.h |    4 +
 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c    |    3 +
 .../crypto/intel/qat/qat_common/adf_fw_config.h    |   18 +
 .../crypto/intel/qat/qat_common/adf_gen4_config.c  |  287 +++
 .../crypto/intel/qat/qat_common/adf_gen4_config.h  |   11 +
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.c |  238 +++
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |   87 +
 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c  |  153 ++
 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.h  |  158 ++
 drivers/crypto/intel/qat/qat_common/adf_init.c     |   12 +
 drivers/crypto/intel/qat/qat_common/adf_rl.c       |    7 +-
 drivers/crypto/intel/qat/qat_common/adf_rl.h       |    1 +
 drivers/crypto/intel/qat/qat_common/adf_sysfs.c    |    6 +-
 .../intel/qat/qat_common/adf_sysfs_ras_counters.c  |    7 +-
 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c |    8 +
 .../crypto/intel/qat/qat_common/adf_telemetry.c    |  288 +++
 .../crypto/intel/qat/qat_common/adf_telemetry.h    |   99 +
 .../crypto/intel/qat/qat_common/adf_tl_debugfs.c   |  710 +++++++
 .../crypto/intel/qat/qat_common/adf_tl_debugfs.h   |  117 ++
 .../intel/qat/qat_common/icp_qat_fw_init_admin.h   |   10 +
 drivers/crypto/intel/qat/qat_common/icp_qat_hw.h   |   14 +-
 drivers/crypto/intel/qat/qat_common/icp_qat_uclo.h |    2 +-
 drivers/crypto/intel/qat/qat_common/qat_hal.c      |    6 +-
 drivers/crypto/intel/qat/qat_common/qat_uclo.c     |    1 +
 drivers/crypto/marvell/cesa/cesa.c                 |    6 +-
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   |   23 -
 drivers/crypto/marvell/octeontx2/cn10k_cpt.c       |   86 +-
 drivers/crypto/marvell/octeontx2/cn10k_cpt.h       |   27 +
 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h |   54 +-
 .../crypto/marvell/octeontx2/otx2_cpt_devlink.c    |   44 +-
 .../crypto/marvell/octeontx2/otx2_cpt_hw_types.h   |    9 +-
 .../marvell/octeontx2/otx2_cpt_mbox_common.c       |   26 +
 drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h |  298 +++
 drivers/crypto/marvell/octeontx2/otx2_cptlf.c      |  139 +-
 drivers/crypto/marvell/octeontx2/otx2_cptlf.h      |  103 +-
 drivers/crypto/marvell/octeontx2/otx2_cptpf.h      |    4 +
 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c |   74 +-
 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c |   82 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    |   49 +-
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.h    |    3 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf.h      |    2 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |   31 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h |    5 +
 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c |   29 +-
 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c |   28 +
 .../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c   |  162 +-
 drivers/crypto/n2_core.c                           |   36 +-
 drivers/crypto/rockchip/rk3288_crypto_skcipher.c   |    4 +-
 drivers/crypto/sa2ul.c                             |    3 +-
 drivers/crypto/sahara.c                            |  845 ++++----
 drivers/crypto/starfive/Kconfig                    |    2 +-
 drivers/crypto/starfive/jh7110-aes.c               |   77 +-
 drivers/crypto/starfive/jh7110-cryp.c              |   20 +-
 drivers/crypto/starfive/jh7110-cryp.h              |   12 +-
 drivers/crypto/starfive/jh7110-rsa.c               |   58 +-
 drivers/crypto/stm32/stm32-crc32.c                 |    2 +-
 drivers/crypto/stm32/stm32-cryp.c                  |    2 +-
 drivers/crypto/virtio/virtio_crypto_common.h       |    2 +
 drivers/crypto/virtio/virtio_crypto_core.c         |   26 +-
 drivers/dma/idxd/Makefile                          |    2 +-
 drivers/dma/idxd/bus.c                             |    6 +
 drivers/dma/idxd/cdev.c                            |    6 +-
 drivers/dma/idxd/defaults.c                        |   53 +
 drivers/dma/idxd/device.c                          |   13 +-
 drivers/dma/idxd/dma.c                             |    9 +-
 drivers/dma/idxd/idxd.h                            |   83 +-
 drivers/dma/idxd/init.c                            |    7 +
 drivers/dma/idxd/irq.c                             |   12 +-
 drivers/dma/idxd/submit.c                          |    9 +-
 include/crypto/hash.h                              |    4 -
 include/crypto/if_alg.h                            |    5 +
 include/crypto/skcipher.h                          |  133 +-
 include/linux/hisi_acc_qm.h                        |   28 +-
 lib/crypto/aesgcm.c                                |   13 +
 lib/crypto/mpi/ec.c                                |    3 +
 tools/crypto/tcrypt/tcrypt_speed_compare.py        |  190 ++
 205 files changed, 10087 insertions(+), 5779 deletions(-)
 create mode 100644 Documentation/ABI/testing/debugfs-driver-qat_telemetry
 create mode 100644 Documentation/crypto/device_drivers/index.rst
 create mode 100644 Documentation/crypto/device_drivers/octeontx2.rst
 create mode 100644 Documentation/devicetree/bindings/crypto/inside-secure,safexcel.yaml
 delete mode 100644 Documentation/devicetree/bindings/crypto/inside-secure-safexcel.txt
 create mode 100644 Documentation/driver-api/crypto/iaa/iaa-crypto.rst
 create mode 100644 Documentation/driver-api/crypto/iaa/index.rst
 create mode 100644 Documentation/driver-api/crypto/index.rst
 delete mode 100644 crypto/cfb.c
 delete mode 100644 crypto/ofb.c
 create mode 100644 drivers/crypto/intel/iaa/Kconfig
 create mode 100644 drivers/crypto/intel/iaa/Makefile
 create mode 100644 drivers/crypto/intel/iaa/iaa_crypto.h
 create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c
 create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_main.c
 create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_stats.c
 create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_stats.h
 create mode 100644 drivers/crypto/intel/qat/qat_420xx/Makefile
 create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c
 create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.h
 create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_drv.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_config.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_config.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_config.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_telemetry.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_telemetry.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_tl_debugfs.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_tl_debugfs.h
 create mode 100644 drivers/dma/idxd/defaults.c
 create mode 100755 tools/crypto/tcrypt/tcrypt_speed_compare.py

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.8
  2024-01-09 22:17                                             ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
@ 2024-01-10 20:38                                               ` pr-tracker-bot
  2024-02-01  5:32                                               ` [GIT PULL] Crypto Fixes " Herbert Xu
  2024-03-15  3:04                                               ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-01-10 20:38 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 10 Jan 2024 06:17:32 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0cb552aa97843f24549ce808883494138471c16b

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.8
  2024-01-09 22:17                                             ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
  2024-01-10 20:38                                               ` pr-tracker-bot
@ 2024-02-01  5:32                                               ` Herbert Xu
  2024-02-01 18:23                                                 ` pr-tracker-bot
                                                                   ` (2 more replies)
  2024-03-15  3:04                                               ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-01  5:32 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 6613476e225e090cc9aad49be7fa504e290dd33d:

  Linux 6.8-rc1 (2024-01-21 14:11:32 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p2 

for you to fetch changes up to c5a2f74db71a849f3a60bc153d684d6d28a0c665:

  crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)

----------------------------------------------------------------
This push fixes regressions in caam and qat.
----------------------------------------------------------------

Damian Muszynski (1):
      crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx

Gaurav Jain (1):
      crypto: caam - fix asynchronous hash

 drivers/crypto/caam/caamalg_qi2.c                    | 7 +++++--
 drivers/crypto/caam/caamhash.c                       | 7 +++++--
 drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
 3 files changed, 11 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.8
  2024-02-01  5:32                                               ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2024-02-01 18:23                                                 ` pr-tracker-bot
  2024-02-08  4:29                                                 ` Herbert Xu
  2024-03-25  9:47                                                 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-01 18:23 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 1 Feb 2024 13:32:53 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/8a2514c0c61f7d4587071b96b4be7481350b5bc9

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.8
  2024-02-01  5:32                                               ` [GIT PULL] Crypto Fixes " Herbert Xu
  2024-02-01 18:23                                                 ` pr-tracker-bot
@ 2024-02-08  4:29                                                 ` Herbert Xu
  2024-02-08  6:24                                                   ` pr-tracker-bot
  2024-02-21  9:10                                                   ` Herbert Xu
  2024-03-25  9:47                                                 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-08  4:29 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit c5a2f74db71a849f3a60bc153d684d6d28a0c665:

  crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p3 

for you to fetch changes up to 24c890dd712f6345e382256cae8c97abb0406b70:

  crypto: algif_hash - Remove bogus SGL free on zero-length error path (2024-02-02 18:08:12 +0800)

----------------------------------------------------------------
This push fixes regressions in cbc and algif_hash, as well as an
older NULL-pointer dereference in ccp.
----------------------------------------------------------------

Herbert Xu (2):
      crypto: cbc - Ensure statesize is zero
      crypto: algif_hash - Remove bogus SGL free on zero-length error path

Kim Phillips (1):
      crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked

 crypto/algif_hash.c          |  5 +++--
 crypto/cbc.c                 |  3 +++
 drivers/crypto/ccp/sev-dev.c | 10 ++++++++--
 3 files changed, 14 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.8
  2024-02-08  4:29                                                 ` Herbert Xu
@ 2024-02-08  6:24                                                   ` pr-tracker-bot
  2024-02-21  9:10                                                   ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-08  6:24 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 8 Feb 2024 12:29:53 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/047371968ffc470769f541d6933e262dc7085456

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.8
  2024-02-08  4:29                                                 ` Herbert Xu
  2024-02-08  6:24                                                   ` pr-tracker-bot
@ 2024-02-21  9:10                                                   ` Herbert Xu
  2024-02-21 17:17                                                     ` pr-tracker-bot
  2024-02-28  8:07                                                     ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-21  9:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 24c890dd712f6345e382256cae8c97abb0406b70:

  crypto: algif_hash - Remove bogus SGL free on zero-length error path (2024-02-02 18:08:12 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p4 

for you to fetch changes up to c0ec2a712daf133d9996a8a1b7ee2d4996080363:

  crypto: virtio/akcipher - Fix stack overflow on memcpy (2024-02-09 12:55:53 +0800)

----------------------------------------------------------------
This push fixes a stack overflow in virtio.
----------------------------------------------------------------

zhenwei pi (1):
      crypto: virtio/akcipher - Fix stack overflow on memcpy

 drivers/crypto/virtio/virtio_crypto_akcipher_algs.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.8
  2024-02-21  9:10                                                   ` Herbert Xu
@ 2024-02-21 17:17                                                     ` pr-tracker-bot
  2024-02-28  8:07                                                     ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-21 17:17 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 21 Feb 2024 17:10:48 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p4

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8be5a55b8e3f7eab8f36ceed2512f457f914318

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.8
  2024-02-21  9:10                                                   ` Herbert Xu
  2024-02-21 17:17                                                     ` pr-tracker-bot
@ 2024-02-28  8:07                                                     ` Herbert Xu
  2024-02-28 17:48                                                       ` pr-tracker-bot
  2024-03-06  9:47                                                       ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-28  8:07 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit c0ec2a712daf133d9996a8a1b7ee2d4996080363:

  crypto: virtio/akcipher - Fix stack overflow on memcpy (2024-02-09 12:55:53 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p5 

for you to fetch changes up to 1c0cf6d19690141002889d72622b90fc01562ce4:

  crypto: arm64/neonbs - fix out-of-bounds access on short input (2024-02-24 08:37:24 +0800)

----------------------------------------------------------------
This push fixes a regression in lskcipher and an out-of-bound
access in arm64/neonbs.
----------------------------------------------------------------

Ard Biesheuvel (1):
      crypto: arm64/neonbs - fix out-of-bounds access on short input

Herbert Xu (1):
      crypto: lskcipher - Copy IV in lskcipher glue code always

 arch/arm64/crypto/aes-neonbs-glue.c | 11 +++++++++++
 crypto/lskcipher.c                  |  6 ++----
 2 files changed, 13 insertions(+), 4 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.8
  2024-02-28  8:07                                                     ` Herbert Xu
@ 2024-02-28 17:48                                                       ` pr-tracker-bot
  2024-03-06  9:47                                                       ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-28 17:48 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 28 Feb 2024 16:07:59 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p5

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e326df53af0021f48a481ce9d489efda636c2dc6

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.8
  2024-02-28  8:07                                                     ` Herbert Xu
  2024-02-28 17:48                                                       ` pr-tracker-bot
@ 2024-03-06  9:47                                                       ` Herbert Xu
  2024-03-06 16:33                                                         ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-03-06  9:47 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 1c0cf6d19690141002889d72622b90fc01562ce4:

  crypto: arm64/neonbs - fix out-of-bounds access on short input (2024-02-24 08:37:24 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p6 

for you to fetch changes up to c0afb6b88fbbc177fa322a835f874be217bffe45:

  crypto: rk3288 - Fix use after free in unprepare (2024-03-01 18:33:29 +0800)

----------------------------------------------------------------
This push fixes potential use-after-frees in rk3288 and sun8i-ce.
----------------------------------------------------------------

Andrey Skvortsov (1):
      crypto: sun8i-ce - Fix use after free in unprepare

Herbert Xu (1):
      crypto: rk3288 - Fix use after free in unprepare

 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    | 34 +++++++++++-----------
 drivers/crypto/rockchip/rk3288_crypto_ahash.c      |  4 +--
 2 files changed, 19 insertions(+), 19 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.8
  2024-03-06  9:47                                                       ` Herbert Xu
@ 2024-03-06 16:33                                                         ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-03-06 16:33 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 6 Mar 2024 17:47:40 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p6

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/09dcdbac54f4e60c917251fea98a69e46817fe27

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.9
  2024-01-09 22:17                                             ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
  2024-01-10 20:38                                               ` pr-tracker-bot
  2024-02-01  5:32                                               ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2024-03-15  3:04                                               ` Herbert Xu
  2024-03-15 21:51                                                 ` Linus Torvalds
                                                                   ` (2 more replies)
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-03-15  3:04 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit c5a2f74db71a849f3a60bc153d684d6d28a0c665:

  crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p1 

for you to fetch changes up to 6a8dbd71a70620c42d4fa82509204ba18231f28d:

  Revert "crypto: remove CONFIG_CRYPTO_STATS" (2024-03-13 09:49:37 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Avoid unnecessary copying in scomp for trivial SG lists.

Algorithms:

- Optimise NEON CCM implementation on ARM64.

Drivers:

- Add queue stop/query debugfs support in hisilicon/qm.
----------------------------------------------------------------

Adam Guerin (6):
      crypto: qat - remove unused macros in qat_comp_alg.c
      crypto: qat - removed unused macro in adf_cnv_dbgfs.c
      crypto: qat - avoid division by zero
      crypto: qat - remove double initialization of value
      crypto: qat - remove unnecessary description from comment
      crypto: qat - fix comment structure

Ard Biesheuvel (8):
      crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
      crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
      crypto: arm64/aes-ccm - Pass short inputs via stack buffer
      crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
      crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
      crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
      crypto: arm64/aes-ccm - Merge encrypt and decrypt tail handling
      crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helpers

Arnd Bergmann (2):
      crypto: qat - avoid memcpy() overflow warning
      crypto: arm/sha - fix function cast warnings

Barry Song (3):
      crypto: hisilicon/zip - fix the missing CRYPTO_ALG_ASYNC in cra_flags
      crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags
      crypto: scomp - remove memcpy if sg_nents is 1 and pages are lowmem

Borislav Petkov (AMD) (1):
      crypto: ccp - State in dmesg that TSME is enabled

Clay Chang (1):
      KEYS: include header for EINVAL definition

Colin Ian King (2):
      crypto: pcbc - remove redundant assignment to nbytes
      crypto: asymmetric_keys - remove redundant pointer secs

Damian Muszynski (7):
      crypto: qat - add heartbeat error simulator
      crypto: qat - add auto reset on error
      crypto: qat - change SLAs cleanup flow at shutdown
      crypto: qat - resolve race condition during AER recovery
      crypto: qat - fix ring to service map for dcc in 4xxx
      crypto: qat - fix ring to service map for dcc in 420xx
      crypto: qat - make ring to service map common for QAT GEN4

Dan Carpenter (1):
      crypto: qat - uninitialized variable in adf_hb_error_inject_write()

Danny Tsen (1):
      crypto: vmx - Move to arch/powerpc/crypto

David Wronek (1):
      dt-bindings: crypto: ice: Document SC7180 inline crypto engine

Eric Biggers (2):
      crypto: ahash - unexport crypto_hash_alg_has_setkey()
      crypto: remove CONFIG_CRYPTO_STATS

Erick Archer (2):
      crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
      crypto: qat - use kcalloc_node() instead of kzalloc_node()

Furong Zhou (3):
      crypto: qat - add fatal error notify method
      crypto: qat - disable arbitration before reset
      crypto: qat - limit heartbeat notifications

Giovanni Cabiddu (1):
      Documentation: qat: fix auto_reset section

Herbert Xu (2):
      crypto: dh - Make public key test FIPS-only
      Revert "crypto: remove CONFIG_CRYPTO_STATS"

Joachim Vandersmissen (2):
      crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c
      crypto: rsa - restrict plaintext/ciphertext values more

Kilian Zinnecker (1):
      crypto: rockchip - fix to check return value

Li RongQing (1):
      crypto: virtio - remove duplicate check if queue is broken

Luca Weiss (1):
      dt-bindings: qcom-qce: Add compatible for SM6350

Lukas Bulwahn (1):
      MAINTAINERS: adjust file entries after crypto vmx file movement

Mario Limonciello (2):
      crypto: ccp - Avoid discarding errors in psp_send_platform_access_msg()
      crypto: ccp - Update return values for some unit tests

Markus Elfring (1):
      crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection

Martin Kaiser (1):
      hwrng: hisi - use dev_err_probe

Minjie Du (1):
      crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()

Mun Chun Yep (4):
      crypto: qat - update PFVF protocol for recovery
      crypto: qat - re-enable sriov after pf reset
      crypto: qat - add fatal error notification
      crypto: qat - improve aer error reset handling

Qi Tao (3):
      crypto: hisilicon/sec2 - updates the sec DFX function register
      crypto: hisilicon/sec2 - modify nested macro call
      crypto: hisilicon/sec2 - fix some cleanup issues

Quanyang Wang (1):
      crypto: xilinx - call finalize with bh disabled

Randy Dunlap (1):
      crypto: jitter - fix CRYPTO_JITTERENTROPY help text

Tom Zanussi (3):
      crypto: iaa - Remove header table code
      crypto: iaa - Fix async_disable descriptor leak
      crypto: iaa - Fix comp/decomp delay statistics

Tudor Ambarus (1):
      MAINTAINERS: Remove T Ambarus from few mchp entries

Varshini Rajendran (4):
      dt-bindings: crypto: add sam9x7 in Atmel AES
      dt-bindings: crypto: add sam9x7 in Atmel SHA
      dt-bindings: crypto: add sam9x7 in Atmel TDES
      dt-bindings: rng: atmel,at91-trng: add sam9x7 TRNG

Vladis Dronov (1):
      crypto: tcrypt - add ffdhe2048(dh) test

Weili Qian (5):
      crypto: hisilicon/qm - support get device state
      crypto: hisilicon/qm - dump important registers values before resetting
      crypto: hisilicon/qm - add stop function by hardware
      crypto: hisilicon/qm - obtain stop queue status
      crypto: hisilicon/qm - change function type to void

Wenkai Lin (2):
      crypto: hisilicon - Fix smp_processor_id() warnings
      crypto: hisilicon/sec - remove unused parameter

 Documentation/ABI/testing/debugfs-driver-qat       |  26 ++
 Documentation/ABI/testing/debugfs-hisi-hpre        |  22 ++
 Documentation/ABI/testing/debugfs-hisi-sec         |  22 ++
 Documentation/ABI/testing/debugfs-hisi-zip         |  22 ++
 Documentation/ABI/testing/sysfs-driver-qat         |  20 ++
 .../bindings/crypto/atmel,at91sam9g46-aes.yaml     |   6 +-
 .../bindings/crypto/atmel,at91sam9g46-sha.yaml     |   6 +-
 .../bindings/crypto/atmel,at91sam9g46-tdes.yaml    |   6 +-
 .../bindings/crypto/qcom,inline-crypto-engine.yaml |   1 +
 .../devicetree/bindings/crypto/qcom-qce.yaml       |   1 +
 .../devicetree/bindings/rng/atmel,at91-trng.yaml   |   4 +
 MAINTAINERS                                        |  25 +-
 arch/arm/crypto/sha256_glue.c                      |  13 +-
 arch/arm/crypto/sha512-glue.c                      |  12 +-
 arch/arm64/crypto/Kconfig                          |   1 +
 arch/arm64/crypto/aes-ce-ccm-core.S                | 265 ++++++++-------------
 arch/arm64/crypto/aes-ce-ccm-glue.c                | 154 ++++++++----
 arch/arm64/crypto/aes-glue.c                       |   1 +
 arch/powerpc/crypto/Kconfig                        |  20 ++
 arch/powerpc/crypto/Makefile                       |  20 +-
 {drivers/crypto/vmx => arch/powerpc/crypto}/aes.c  |   0
 .../crypto/vmx => arch/powerpc/crypto}/aes_cbc.c   |   0
 .../crypto/vmx => arch/powerpc/crypto}/aes_ctr.c   |   0
 .../crypto/vmx => arch/powerpc/crypto}/aes_xts.c   |   0
 .../crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.h |   0
 .../vmx => arch/powerpc/crypto}/aesp8-ppc.pl       |   0
 .../crypto/vmx => arch/powerpc/crypto}/ghash.c     |   0
 .../vmx => arch/powerpc/crypto}/ghashp8-ppc.pl     |   0
 {drivers/crypto/vmx => arch/powerpc/crypto}/vmx.c  |   0
 crypto/Kconfig                                     |   5 +-
 crypto/ahash.c                                     |  21 +-
 crypto/asymmetric_keys/verify_pefile.c             |   4 +-
 crypto/dh.c                                        |  63 ++---
 crypto/pcbc.c                                      |   4 +-
 crypto/rsa.c                                       |  36 ++-
 crypto/scompress.c                                 |  38 ++-
 crypto/tcrypt.c                                    |   3 +
 crypto/testmgr.c                                   |   8 -
 drivers/char/hw_random/hisi-rng.c                  |   6 +-
 drivers/crypto/Kconfig                             |  14 +-
 drivers/crypto/Makefile                            |   2 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |   2 +-
 drivers/crypto/ccp/platform-access.c               |  11 +-
 drivers/crypto/ccp/psp-dev.c                       |  11 +-
 drivers/crypto/hisilicon/debugfs.c                 |  58 +++++
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   2 +-
 drivers/crypto/hisilicon/qm.c                      | 184 +++++++++-----
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |  33 +--
 drivers/crypto/hisilicon/sec2/sec_main.c           |   7 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   1 +
 drivers/crypto/hisilicon/zip/zip_main.c            |   2 +-
 drivers/crypto/intel/iaa/iaa_crypto.h              |  25 --
 drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c   |   1 -
 drivers/crypto/intel/iaa/iaa_crypto_main.c         | 122 ++--------
 drivers/crypto/intel/iaa/iaa_crypto_stats.c        |  30 ---
 drivers/crypto/intel/iaa/iaa_crypto_stats.h        |   8 +-
 drivers/crypto/intel/qat/Kconfig                   |  14 ++
 .../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c |  64 ++---
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |  64 ++---
 drivers/crypto/intel/qat/qat_common/Makefile       |   2 +
 .../intel/qat/qat_common/adf_accel_devices.h       |   3 +
 drivers/crypto/intel/qat/qat_common/adf_aer.c      | 138 ++++++++++-
 .../crypto/intel/qat/qat_common/adf_cfg_strings.h  |   1 +
 drivers/crypto/intel/qat/qat_common/adf_clock.c    |   3 +
 .../crypto/intel/qat/qat_common/adf_cnv_dbgfs.c    |   1 -
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |  10 +
 drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c  |   4 +-
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.c |  59 +++++
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |   1 +
 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c |   6 +-
 .../crypto/intel/qat/qat_common/adf_heartbeat.c    |  20 +-
 .../crypto/intel/qat/qat_common/adf_heartbeat.h    |  21 ++
 .../intel/qat/qat_common/adf_heartbeat_dbgfs.c     |  53 +++++
 .../intel/qat/qat_common/adf_heartbeat_inject.c    |  76 ++++++
 .../crypto/intel/qat/qat_common/adf_hw_arbiter.c   |  25 ++
 drivers/crypto/intel/qat/qat_common/adf_init.c     |  12 +
 drivers/crypto/intel/qat/qat_common/adf_isr.c      |  11 +-
 drivers/crypto/intel/qat/qat_common/adf_pfvf_msg.h |   7 +-
 .../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.c  |  64 ++++-
 .../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.h  |  21 ++
 .../intel/qat/qat_common/adf_pfvf_pf_proto.c       |   8 +
 .../intel/qat/qat_common/adf_pfvf_vf_proto.c       |   6 +
 drivers/crypto/intel/qat/qat_common/adf_rl.c       |  20 +-
 drivers/crypto/intel/qat/qat_common/adf_sriov.c    |  38 ++-
 drivers/crypto/intel/qat/qat_common/adf_sysfs.c    |  37 +++
 drivers/crypto/intel/qat/qat_common/adf_vf_isr.c   |   2 -
 .../crypto/intel/qat/qat_common/qat_comp_algs.c    |   9 -
 drivers/crypto/intel/qat/qat_common/qat_crypto.c   |   4 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |   5 +
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |  12 +-
 drivers/crypto/virtio/virtio_crypto_core.c         |   2 -
 drivers/crypto/vmx/.gitignore                      |   3 -
 drivers/crypto/vmx/Kconfig                         |  14 --
 drivers/crypto/vmx/Makefile                        |  23 --
 drivers/crypto/vmx/ppc-xlate.pl                    | 231 ------------------
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |   3 +
 include/crypto/internal/hash.h                     |   2 -
 include/crypto/public_key.h                        |   1 +
 include/linux/hisi_acc_qm.h                        |  10 +-
 tools/crypto/ccp/test_dbc.py                       |   8 +-
 100 files changed, 1450 insertions(+), 1016 deletions(-)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes.c (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_cbc.c (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_ctr.c (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_xts.c (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.h (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.pl (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/ghash.c (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/ghashp8-ppc.pl (100%)
 rename {drivers/crypto/vmx => arch/powerpc/crypto}/vmx.c (100%)
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_inject.c
 delete mode 100644 drivers/crypto/vmx/.gitignore
 delete mode 100644 drivers/crypto/vmx/Kconfig
 delete mode 100644 drivers/crypto/vmx/Makefile
 delete mode 100644 drivers/crypto/vmx/ppc-xlate.pl

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.9
  2024-03-15  3:04                                               ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
@ 2024-03-15 21:51                                                 ` Linus Torvalds
  2024-03-16  4:39                                                   ` Herbert Xu
  2024-03-15 21:59                                                 ` pr-tracker-bot
  2024-05-13  3:50                                                 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
  2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2024-03-15 21:51 UTC (permalink / raw)
  To: Herbert Xu
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Thu, 14 Mar 2024 at 20:04, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Drivers:
>
> - Add queue stop/query debugfs support in hisilicon/qm.

There's a lot more than that in there. Fairl ybig Intel qat updates
from what I can see, for example.

           Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.9
  2024-03-15  3:04                                               ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
  2024-03-15 21:51                                                 ` Linus Torvalds
@ 2024-03-15 21:59                                                 ` pr-tracker-bot
  2024-05-13  3:50                                                 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-03-15 21:59 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 15 Mar 2024 11:04:44 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c8e769961668ef56acabc67f040c58ed769c57e4

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.9
  2024-03-15 21:51                                                 ` Linus Torvalds
@ 2024-03-16  4:39                                                   ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2024-03-16  4:39 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, Mar 15, 2024 at 02:51:47PM -0700, Linus Torvalds wrote:
> On Thu, 14 Mar 2024 at 20:04, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Drivers:
> >
> > - Add queue stop/query debugfs support in hisilicon/qm.
> 
> There's a lot more than that in there. Fairl ybig Intel qat updates
> from what I can see, for example.

Sorry, one line got chopped off while I was creating the signed
tag:

- Improve error recovery in qat.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.9
  2024-02-01  5:32                                               ` [GIT PULL] Crypto Fixes " Herbert Xu
  2024-02-01 18:23                                                 ` pr-tracker-bot
  2024-02-08  4:29                                                 ` Herbert Xu
@ 2024-03-25  9:47                                                 ` Herbert Xu
  2024-03-25 18:18                                                   ` pr-tracker-bot
  2024-05-20  3:26                                                   ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-03-25  9:47 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 6a8dbd71a70620c42d4fa82509204ba18231f28d:

  Revert "crypto: remove CONFIG_CRYPTO_STATS" (2024-03-13 09:49:37 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p2 

for you to fetch changes up to 5a7e89d3315d1be86aff8a8bf849023cda6547f7:

  crypto: iaa - Fix nr_cpus < nr_iaa case (2024-03-22 19:42:20 +0800)

----------------------------------------------------------------
This push fixes a regression that broke iwd as well as a divide by
zero in iaa.
----------------------------------------------------------------

Eric Biggers (1):
      Revert "crypto: pkcs7 - remove sha1 support"

Tom Zanussi (1):
      crypto: iaa - Fix nr_cpus < nr_iaa case

 crypto/asymmetric_keys/mscode_parser.c     |  3 ++
 crypto/asymmetric_keys/pkcs7_parser.c      |  4 ++
 crypto/asymmetric_keys/public_key.c        |  3 +-
 crypto/asymmetric_keys/signature.c         |  2 +-
 crypto/asymmetric_keys/x509_cert_parser.c  |  8 +++
 crypto/testmgr.h                           | 80 ++++++++++++++++++++++++++++++
 drivers/crypto/intel/iaa/iaa_crypto_main.c | 10 ++--
 include/linux/oid_registry.h               |  4 ++
 kernel/module/Kconfig                      |  5 ++
 9 files changed, 114 insertions(+), 5 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.9
  2024-03-25  9:47                                                 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
@ 2024-03-25 18:18                                                   ` pr-tracker-bot
  2024-05-20  3:26                                                   ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-03-25 18:18 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 25 Mar 2024 17:47:43 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/174fdc93a241af54772ae3e745ec719e9f6cebfc

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.10
  2024-03-15  3:04                                               ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
  2024-03-15 21:51                                                 ` Linus Torvalds
  2024-03-15 21:59                                                 ` pr-tracker-bot
@ 2024-05-13  3:50                                                 ` Herbert Xu
  2024-05-13 22:12                                                   ` Linus Torvalds
                                                                     ` (2 more replies)
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-13  3:50 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 174fdc93a241af54772ae3e745ec719e9f6cebfc:

  Merge tag 'v6.9-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2024-03-25 10:48:23 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p1 

for you to fetch changes up to 13909a0c88972c5ef5d13f44d1a8bf065a31bdf4:

  crypto: atmel-sha204a - provide the otp content (2024-05-10 17:15:25 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Remove crypto stats interface.

Algorithms:

- Add faster AES-XTS on modern x86_64 CPUs.
- Forbid curves with order less than 224 bits in ecc (FIPS 186-5).
- Add ECDSA NIST P521.

Drivers:

- Expose otp zone in atmel.
- Add dh fallback for primes > 4K in qat.
- Add interface for live migration in qat.
- Use dma for aes requests in starfive.
- Add full DMA support for stm32mpx in stm32.
- Add Tegra Security Engine driver.

Others:

- Introduce scope-based x509_certificate allocation.
----------------------------------------------------------------

Adam Guerin (2):
      crypto: qat - improve error message in adf_get_arbiter_mapping()
      crypto: qat - improve error logging to be consistent across features

Akhil R (3):
      dt-bindings: crypto: Add Tegra Security Engine
      gpu: host1x: Add Tegra SE to SID table
      crypto: tegra - Add Tegra Security Engine driver

Aleksandr Mishin (1):
      crypto: bcm - Fix pointer arithmetic

Animesh Agarwal (1):
      dt-bindings: crypto: ti,omap-sham: Convert to dtschema

Ard Biesheuvel (1):
      crypto: arm64/aes-ce - Simplify round key load sequence

Arnd Bergmann (1):
      crypto: ccp - drop platform ifdef checks

Chang S. Bae (2):
      crypto: x86/aesni - Rearrange AES key size check
      crypto: x86/aesni - Update aesni_set_key() to return void

Chen Ni (1):
      crypto: octeontx2 - add missing check for dma_map_single

Chenghai Huang (10):
      crypto: hisilicon/sec - Add the condition for configuring the sriov function
      crypto: hisilicon/debugfs - Fix debugfs uninit process issue
      crypto: hisilicon/sgl - Delete redundant parameter verification
      crypto: hisilicon/debugfs - Fix the processing logic issue in the debugfs creation
      crypto: hisilicon/qm - Add the default processing branch
      crypto: hisilicon - Adjust debugfs creation and release order
      crypto: hisilicon/sec - Fix memory leak for sec resource release
      crypto: hisilicon/debugfs - Resolve the problem of applying for redundant space in sq dump
      crypto: hisilicon/qm - Add the err memory release process to qm uninit
      crypto: hisilicon/debugfs - mask the unnecessary info from the dump

Colin Ian King (1):
      crypto: qat - Fix spelling mistake "Invalide" -> "Invalid"

Damian Muszynski (1):
      crypto: qat - implement dh fallback for primes > 4K

Dan Carpenter (1):
      crypto: tegra - Fix some error codes

Eric Biggers (24):
      crypto: remove CONFIG_CRYPTO_STATS
      x86: add kconfig symbols for assembler VAES and VPCLMULQDQ support
      crypto: x86/aes-xts - add AES-XTS assembly macro for modern CPUs
      crypto: x86/aes-xts - wire up AESNI + AVX implementation
      crypto: x86/aes-xts - wire up VAES + AVX2 implementation
      crypto: x86/aes-xts - wire up VAES + AVX10/256 implementation
      crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
      crypto: x86/nh-avx2 - add missing vzeroupper
      crypto: x86/sha256-avx2 - add missing vzeroupper
      crypto: x86/sha512-avx2 - add missing vzeroupper
      crypto: x86/aes-xts - make non-AVX implementation use new glue code
      crypto: x86/aes-xts - access round keys using single-byte offsets
      crypto: x86/sha256-ni - convert to use rounds macros
      crypto: x86/sha256-ni - rename some register aliases
      crypto: x86/sha256-ni - optimize code size
      crypto: x86/sha256-ni - simplify do_4rounds
      crypto: x86/aes-xts - handle CTS encryption more efficiently
      crypto: x86/aesni-xts - deduplicate aesni_xts_enc() and aesni_xts_dec()
      crypto: x86/aes-xts - handle AES-128 and AES-192 more efficiently
      crypto: x86/aes-xts - eliminate a few more instructions
      crypto: x86/aes-xts - optimize size of instructions operating on lengths
      crypto: x86/aes-xts - simplify loop in xts_crypt_slowpath()
      crypto: x86/aes-gcm - delete unused GCM assembly code
      crypto: x86/aes-gcm - simplify GCM hash subkey derivation

Geert Uytterhoeven (1):
      dt-bindings: crypto: starfive: Restore sort order

Giovanni Cabiddu (3):
      crypto: qat - adf_get_etr_base() helper
      crypto: qat - relocate CSR access code
      crypto: qat - specify firmware files for 402xx

Gustavo A. R. Silva (2):
      crypto: nx - Avoid -Wflex-array-member-not-at-end warning
      crypto: qat - Avoid -Wflex-array-member-not-at-end warnings

Hailey Mothershead (1):
      crypto: aead,cipher - zeroize key buffer after use

Herbert Xu (1):
      padata: Disable BH when taking works lock on MT path

Jerry Snitselaar (1):
      crypto: iaa - Fix some errors in IAA documentation

Jia Jie Ho (8):
      dt-bindings: crypto: starfive: Add jh8100 support
      crypto: starfive - Update hash dma usage
      crypto: starfive - Skip unneeded key free
      crypto: starfive - Use dma for aes requests
      crypto: starfive - Skip dma setup for zeroed message
      crypto: starfive - Skip unneeded fallback allocation
      crypto: starfive - Do not free stack buffer
      crypto: starfive - Use fallback for unaligned dma access

Joachim Vandersmissen (2):
      crypto: ecc - update ecc_gen_privkey for FIPS 186-5
      crypto: ecdh - explicitly zeroize private_key

Joel Granados (1):
      crypto: fips - Remove the now superfluous sentinel element from ctl_table array

Li Zhijian (1):
      hwrng: core - Convert sprintf/snprintf to sysfs_emit

Lothar Rubusch (4):
      crypto: atmel-i2c - add missing arg description
      crypto: atmel-i2c - rename read function
      crypto: atmel-sha204a - add reading from otp zone
      crypto: atmel-sha204a - provide the otp content

Luca Weiss (1):
      dt-bindings: crypto: ice: Document sc7280 inline crypto engine

Lucas Segarra Fernandez (1):
      crypto: qat - validate slices count returned by FW

Lukas Wunner (1):
      X.509: Introduce scope-based x509_certificate allocation

Marek Vasut (3):
      hwrng: stm32 - use logical OR in conditional
      hwrng: stm32 - put IP into RPM suspend on failure
      hwrng: stm32 - repair clock handling

Maxime Méré (1):
      crypto: stm32/hash - add full DMA support for stm32mpx

Pankaj Gupta (2):
      crypto: caam - init-clk based on caam-page0-access
      crypto: caam - i.MX8ULP donot have CAAM page0 access

Roman Smirnov (2):
      crypto: ecc - remove checks in crypto_ecdh_shared_secret() and ecc_make_pub_key()
      crypto: algboss - remove NULL check in cryptomgr_schedule_probe()

Siming Wan (3):
      crypto: qat - rename get_sla_arr_of_type()
      crypto: qat - expand CSR operations for QAT GEN4 devices
      crypto: qat - add bank save and restore flows

Stefan Berger (16):
      crypto: ecdsa - Fix module auto-load on add-key
      crypto: ecc - Use ECC_CURVE_NIST_P192/256/384_DIGITS where possible
      crypto: ecdsa - Convert byte arrays with key coordinates to digits
      crypto: ecdsa - Adjust tests on length of key parameters
      crypto: ecdsa - Extend res.x mod n calculation for NIST P521
      crypto: ecc - Add nbits field to ecc_curve structure
      crypto: ecc - Implement vli_mmod_fast_521 for NIST p521
      crypto: ecc - Add special case for NIST P521 in ecc_point_mult
      crypto: ecc - Add NIST P521 curve parameters
      crypto: ecdsa - Replace ndigits with nbits where precision is needed
      crypto: ecdsa - Rename keylen to bufsize where necessary
      crypto: ecdsa - Register NIST P521 and extend test suite
      crypto: asymmetric_keys - Adjust signature size calculation for NIST P521
      crypto: x509 - Add OID for NIST P521 and extend parser for it
      crypto: ecdh - Pass private key in proper byte order to check valid key
      crypto: ecdh - Initialize ctx->private_key in proper byte order

Thorsten Blum (4):
      crypto: jitter - Use kvfree_sensitive() to fix Coccinelle warning
      crypto: jitter - Remove duplicate word in comment
      crypto: jitter - Replace http with https
      crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()

Tom Zanussi (5):
      crypto: iaa - fix decomp_bytes_in stats
      crypto: iaa - Remove comp/decomp delay statistics
      crypto: iaa - Add global_stats file and remove individual stat files
      crypto: iaa - Change iaa statistics to atomic64_t
      crypto: iaa - Use cpumask_weight() when rebalancing

Uwe Kleine-König (2):
      hwrng: mxc-rnga - Drop usage of platform_driver_probe()
      crypto: tegra - Convert to platform remove callback returning void

Vitaly Chikunov (1):
      crypto: ecrdsa - Fix module auto-load on add_key

Wenkai Lin (1):
      crypto: hisilicon/sec2 - fix for register offset

Wolfram Sang (2):
      crypto: api - use 'time_left' variable with wait_for_completion_killable_timeout()
      crypto: sahara - use 'time_left' variable with wait_for_completion_timeout()

Xin Zeng (4):
      crypto: qat - relocate and rename 4xxx PF2VM definitions
      crypto: qat - move PFVF compat checker to a function
      crypto: qat - add interface for live migration
      crypto: qat - implement interface for live migration

 .../bindings/crypto/nvidia,tegra234-se-aes.yaml    |   52 +
 .../bindings/crypto/nvidia,tegra234-se-hash.yaml   |   52 +
 .../devicetree/bindings/crypto/omap-sham.txt       |   28 -
 .../bindings/crypto/qcom,inline-crypto-engine.yaml |    1 +
 .../bindings/crypto/starfive,jh7110-crypto.yaml    |   30 +-
 .../devicetree/bindings/crypto/ti,omap-sham.yaml   |   56 +
 Documentation/driver-api/crypto/iaa/iaa-crypto.rst |   96 +-
 MAINTAINERS                                        |    5 +
 arch/arm64/crypto/aes-ce.S                         |   34 +-
 arch/arm64/crypto/aes-neon.S                       |   20 +-
 arch/s390/configs/debug_defconfig                  |    1 -
 arch/s390/configs/defconfig                        |    1 -
 arch/x86/Kconfig.assembler                         |   10 +
 arch/x86/crypto/Makefile                           |    3 +-
 arch/x86/crypto/aes-xts-avx-x86_64.S               |  845 +++++++++
 arch/x86/crypto/aesni-intel_asm.S                  |  469 +----
 arch/x86/crypto/aesni-intel_glue.c                 |  420 +++--
 arch/x86/crypto/nh-avx2-x86_64.S                   |    1 +
 arch/x86/crypto/sha256-avx2-asm.S                  |    1 +
 arch/x86/crypto/sha256_ni_asm.S                    |  251 +--
 arch/x86/crypto/sha512-avx2-asm.S                  |    1 +
 crypto/Kconfig                                     |   20 -
 crypto/Makefile                                    |    2 -
 crypto/acompress.c                                 |   33 -
 crypto/aead.c                                      |   87 +-
 crypto/ahash.c                                     |   63 +-
 crypto/akcipher.c                                  |   31 -
 crypto/algboss.c                                   |    3 -
 crypto/api.c                                       |    8 +-
 crypto/asymmetric_keys/public_key.c                |   14 +-
 crypto/asymmetric_keys/x509_cert_parser.c          |   46 +-
 crypto/asymmetric_keys/x509_parser.h               |    3 +
 crypto/asymmetric_keys/x509_public_key.c           |   31 +-
 crypto/cipher.c                                    |    3 +-
 crypto/compress.h                                  |    3 -
 crypto/{crypto_user_base.c => crypto_user.c}       |   10 +-
 crypto/crypto_user_stat.c                          |  176 --
 crypto/ecc.c                                       |  100 +-
 crypto/ecc_curve_defs.h                            |   49 +
 crypto/ecdh.c                                      |   11 +-
 crypto/ecdsa.c                                     |   66 +-
 crypto/ecrdsa.c                                    |    1 +
 crypto/ecrdsa_defs.h                               |    5 +
 crypto/fips.c                                      |    1 -
 crypto/hash.h                                      |   30 -
 crypto/jitterentropy-kcapi.c                       |    3 +-
 crypto/jitterentropy.c                             |    4 +-
 crypto/kpp.c                                       |   30 -
 crypto/lskcipher.c                                 |   73 +-
 crypto/rng.c                                       |   44 +-
 crypto/scompress.c                                 |    3 -
 crypto/shash.c                                     |   75 +-
 crypto/sig.c                                       |   13 -
 crypto/skcipher.c                                  |   86 +-
 crypto/skcipher.h                                  |   10 -
 crypto/testmgr.c                                   |    7 +
 crypto/testmgr.h                                   |  146 ++
 drivers/char/hw_random/core.c                      |    2 +-
 drivers/char/hw_random/mxc-rnga.c                  |    9 +-
 drivers/char/hw_random/stm32-rng.c                 |   18 +-
 drivers/crypto/Kconfig                             |    8 +
 drivers/crypto/Makefile                            |    1 +
 drivers/crypto/atmel-i2c.c                         |   30 +-
 drivers/crypto/atmel-i2c.h                         |    8 +-
 drivers/crypto/atmel-sha204a.c                     |   68 +
 drivers/crypto/bcm/spu2.c                          |    2 +-
 drivers/crypto/caam/ctrl.c                         |   19 +-
 drivers/crypto/ccp/sp-platform.c                   |   14 +-
 drivers/crypto/hisilicon/debugfs.c                 |   65 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   23 +-
 drivers/crypto/hisilicon/qm.c                      |    8 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |    4 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   32 +-
 drivers/crypto/hisilicon/sgl.c                     |    5 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |   24 +-
 drivers/crypto/intel/iaa/iaa_crypto.h              |   16 +-
 drivers/crypto/intel/iaa/iaa_crypto_main.c         |   23 +-
 drivers/crypto/intel/iaa/iaa_crypto_stats.c        |  183 +-
 drivers/crypto/intel/iaa/iaa_crypto_stats.h        |    8 -
 .../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c |    5 +-
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |    7 +-
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |    2 +
 .../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c |    1 +
 .../intel/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c    |    1 +
 .../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c   |    1 +
 .../intel/qat/qat_c62xvf/adf_c62xvf_hw_data.c      |    1 +
 drivers/crypto/intel/qat/qat_common/Makefile       |    6 +-
 .../intel/qat/qat_common/adf_accel_devices.h       |   88 +
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |   10 +
 .../intel/qat/qat_common/adf_gen2_hw_csr_data.c    |  101 +
 .../intel/qat/qat_common/adf_gen2_hw_csr_data.h    |   86 +
 .../crypto/intel/qat/qat_common/adf_gen2_hw_data.c |   97 -
 .../crypto/intel/qat/qat_common/adf_gen2_hw_data.h |   76 -
 .../intel/qat/qat_common/adf_gen4_hw_csr_data.c    |  231 +++
 .../intel/qat/qat_common/adf_gen4_hw_csr_data.h    |  188 ++
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.c |  380 +++-
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |  127 +-
 .../crypto/intel/qat/qat_common/adf_gen4_pfvf.c    |    8 +-
 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c  |    1 +
 .../crypto/intel/qat/qat_common/adf_gen4_vf_mig.c  | 1010 ++++++++++
 .../crypto/intel/qat/qat_common/adf_gen4_vf_mig.h  |   10 +
 .../crypto/intel/qat/qat_common/adf_mstate_mgr.c   |  318 ++++
 .../crypto/intel/qat/qat_common/adf_mstate_mgr.h   |   89 +
 .../intel/qat/qat_common/adf_pfvf_pf_proto.c       |    8 +-
 .../crypto/intel/qat/qat_common/adf_pfvf_utils.h   |   11 +
 drivers/crypto/intel/qat/qat_common/adf_rl.c       |   12 +-
 drivers/crypto/intel/qat/qat_common/adf_rl.h       |    2 +
 drivers/crypto/intel/qat/qat_common/adf_sriov.c    |    7 +-
 .../crypto/intel/qat/qat_common/adf_telemetry.c    |   21 +
 .../crypto/intel/qat/qat_common/adf_telemetry.h    |    1 +
 .../crypto/intel/qat/qat_common/adf_transport.c    |    4 +-
 .../crypto/intel/qat/qat_common/qat_asym_algs.c    |   66 +-
 drivers/crypto/intel/qat/qat_common/qat_bl.c       |    6 +-
 drivers/crypto/intel/qat/qat_common/qat_bl.h       |   11 +-
 drivers/crypto/intel/qat/qat_common/qat_mig_dev.c  |  130 ++
 .../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c  |    1 +
 .../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c    |    1 +
 drivers/crypto/marvell/octeontx2/cn10k_cpt.c       |    4 +
 drivers/crypto/nx/nx-842.c                         |    6 +-
 drivers/crypto/nx/nx-842.h                         |   10 +-
 drivers/crypto/sahara.c                            |   16 +-
 drivers/crypto/starfive/Kconfig                    |    4 +
 drivers/crypto/starfive/jh7110-aes.c               |  603 ++++--
 drivers/crypto/starfive/jh7110-cryp.c              |   43 -
 drivers/crypto/starfive/jh7110-cryp.h              |   10 +-
 drivers/crypto/starfive/jh7110-hash.c              |  285 ++-
 drivers/crypto/starfive/jh7110-rsa.c               |   14 +-
 drivers/crypto/stm32/stm32-hash.c                  |  570 ++++--
 drivers/crypto/tegra/Makefile                      |    9 +
 drivers/crypto/tegra/tegra-se-aes.c                | 1933 ++++++++++++++++++++
 drivers/crypto/tegra/tegra-se-hash.c               | 1060 +++++++++++
 drivers/crypto/tegra/tegra-se-key.c                |  156 ++
 drivers/crypto/tegra/tegra-se-main.c               |  437 +++++
 drivers/crypto/tegra/tegra-se.h                    |  560 ++++++
 drivers/gpu/host1x/dev.c                           |   24 +
 include/crypto/acompress.h                         |   73 +-
 include/crypto/aead.h                              |   21 -
 include/crypto/akcipher.h                          |   78 +-
 include/crypto/algapi.h                            |    3 -
 include/crypto/ecc_curve.h                         |    2 +
 include/crypto/ecdh.h                              |    1 +
 include/crypto/hash.h                              |   22 -
 include/crypto/internal/acompress.h                |    1 -
 include/crypto/internal/cryptouser.h               |   16 -
 include/crypto/internal/ecc.h                      |   27 +-
 include/crypto/internal/scompress.h                |    1 -
 include/crypto/kpp.h                               |   58 +-
 include/crypto/rng.h                               |   51 +-
 include/crypto/skcipher.h                          |   25 -
 include/linux/compiler.h                           |    2 +
 include/linux/oid_registry.h                       |    1 +
 include/linux/qat/qat_mig_dev.h                    |   31 +
 include/uapi/linux/cryptouser.h                    |   30 +-
 kernel/padata.c                                    |    8 +-
 154 files changed, 10335 insertions(+), 3222 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/crypto/nvidia,tegra234-se-aes.yaml
 create mode 100644 Documentation/devicetree/bindings/crypto/nvidia,tegra234-se-hash.yaml
 delete mode 100644 Documentation/devicetree/bindings/crypto/omap-sham.txt
 create mode 100644 Documentation/devicetree/bindings/crypto/ti,omap-sham.yaml
 create mode 100644 arch/x86/crypto/aes-xts-avx-x86_64.S
 rename crypto/{crypto_user_base.c => crypto_user.c} (98%)
 delete mode 100644 crypto/crypto_user_stat.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen2_hw_csr_data.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen2_hw_csr_data.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_hw_csr_data.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_hw_csr_data.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_vf_mig.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_vf_mig.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_mstate_mgr.c
 create mode 100644 drivers/crypto/intel/qat/qat_common/adf_mstate_mgr.h
 create mode 100644 drivers/crypto/intel/qat/qat_common/qat_mig_dev.c
 create mode 100644 drivers/crypto/tegra/Makefile
 create mode 100644 drivers/crypto/tegra/tegra-se-aes.c
 create mode 100644 drivers/crypto/tegra/tegra-se-hash.c
 create mode 100644 drivers/crypto/tegra/tegra-se-key.c
 create mode 100644 drivers/crypto/tegra/tegra-se-main.c
 create mode 100644 drivers/crypto/tegra/tegra-se.h
 delete mode 100644 include/crypto/internal/cryptouser.h
 create mode 100644 include/linux/qat/qat_mig_dev.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-13  3:50                                                 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
@ 2024-05-13 22:12                                                   ` Linus Torvalds
  2024-05-14  5:17                                                     ` Herbert Xu
  2024-05-14  6:54                                                     ` Lukas Wunner
  2024-05-13 22:38                                                   ` pr-tracker-bot
  2024-07-18 13:49                                                   ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Linus Torvalds @ 2024-05-13 22:12 UTC (permalink / raw)
  To: Herbert Xu, Lukas Wunner
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sun, 12 May 2024 at 20:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Lukas Wunner (1):
>       X.509: Introduce scope-based x509_certificate allocation

I absolutely hate how this commit tries to remove one single compare
instruction by introducing a *very* dangerous hack.

The whole 'assume()' thing will generate actively wrong code if that
assumption conditional doesn't hold, to the point of being completely
impossible to debug.

Having random kernel code add random "assume()" lines is absolutely
not what we should do. Particularly not in some random code sequence
where it absolutely does not matter ONE WHIT.

Now, I've pulled this, but I killed that  "assume()" hackery in my merge.

Because there is no way we will ever encourage random code to make
these kinds of patterns, and I most definitely do not want anybody
else to try to copy that horrendous thing.

Yes, yes, we have "unreachable()" in other places, and yes, you can
make compilers generate garbage by using that incorrectly. But they
should be about obvious code warning issues, not about "let's save one
conditional instruction".

Now, if somebody really *really* cares about that one extraneous
conditional, particularly if it shows up in some more important place
than some random certificate parsing routine where is most definitely
is not in the least critical, there are better models for this
optimization.

Maybe somebody can teach the kernel build in *general* that
"kmalloc()" and friends never return an error pointer, only NULL or
success? That would not necessarily be a bad idea if the scope-based
cleanup otherwise causes issues.

But this kind of hacky "one random piece of kernel code uses a very
dangerous pattern to state that some *other* piece of kernel code has
particular return patterns" - that is not at all acceptable.

Put another way: it would probably be ok if the SLAB people added some
"this function cannot return error codes" annotation on their core
declaration and it fixed an issue in _general_.

But it is *not* ok if random kernel code starts randomly asserting the
same thing.

Quod licet Iovi, non licet bovi.

                 Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-13  3:50                                                 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
  2024-05-13 22:12                                                   ` Linus Torvalds
@ 2024-05-13 22:38                                                   ` pr-tracker-bot
  2024-07-18 13:49                                                   ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-05-13 22:38 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 13 May 2024 11:50:03 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/84c7d76b5ab6a52e1b3d8101b9f910c128dca396

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-13 22:12                                                   ` Linus Torvalds
@ 2024-05-14  5:17                                                     ` Herbert Xu
  2024-05-14  5:41                                                       ` Linus Torvalds
  2024-05-14  6:54                                                     ` Lukas Wunner
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-05-14  5:17 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
>
> Maybe somebody can teach the kernel build in *general* that
> "kmalloc()" and friends never return an error pointer, only NULL or
> success? That would not necessarily be a bad idea if the scope-based
> cleanup otherwise causes issues.

Yes he did try this out:

https://lore.kernel.org/all/20240302082751.GA25828@wunner.de/

It resulted in an increase in total vmlinux size although I don't
think anyone looked into the reason for it.

> But this kind of hacky "one random piece of kernel code uses a very
> dangerous pattern to state that some *other* piece of kernel code has
> particular return patterns" - that is not at all acceptable.

Agreed.

However, this patch still has two outstanding build defects which
have not been addressed:

https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/

So I might end up just reverting it.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-14  5:17                                                     ` Herbert Xu
@ 2024-05-14  5:41                                                       ` Linus Torvalds
  2024-05-14  6:02                                                         ` Herbert Xu
  0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2024-05-14  5:41 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, 13 May 2024 at 22:17, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Yes he did try this out:
>
> https://lore.kernel.org/all/20240302082751.GA25828@wunner.de/
>
> It resulted in an increase in total vmlinux size although I don't
> think anyone looked into the reason for it.

I think the basic issue is that the whole 'assume()' logic of "if (x)
unreachable()" is very fragile.

Basically, it *can* generate the exact code you want by basically
telling the compiler that if some condition is true, then the compiler
can jump to unreachable code, and then depending on the phase of the
moon, the compiler may get the whole "I can assume this is never
true".

BUT.

The reason I hated seeing it so much is exactly that it's basically
depending on everything going just right.

When things do *not* go right, it causes the compiler to instead
actually generate the extra code for the conditional, and actually
generate a conditional jump to something that the compiler then
decides it can do anything to, since it's unreachable.

So now you generate extra code, and generate a branch to nonsense.

> However, this patch still has two outstanding build defects which
> have not been addressed:
>
> https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/

This one just seems to be a sanity check for "you shouldn't check
kmalloc() for ERR_PTR", so it's a validation test that then doesn't
like the new test in that 'assume()'.

And the second one:

> https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/

looks *very* much like the cases we've seen with clang in particular
where clang goes "this code isn't reachable, so I'll just drop
everything on the floor", and then it just becomes a fallthrough to
whatever else code happens to come next. Most of the time that's just
more (unrelated) code in the same function, but sometimes it causes
that "falls through to next function" instead, entirely randomly
depending on how the code was laid out.

> So I might end up just reverting it.

I suspect that because I removed the whole 'assume()' hackery, neither
of the above issues will now happen, and the code nwo works.

But yes, the above is *exactly* why I don't want to see that
'unreachable()' hackery.

Now, if we had some *other* way to tell the compiler "this condition
never happens", that would be fine. Some compiler builtin for
asserting some condition.

But a conditional "unreachable()" is absolutely not it.

               Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-14  5:41                                                       ` Linus Torvalds
@ 2024-05-14  6:02                                                         ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-14  6:02 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, May 13, 2024 at 10:41:58PM -0700, Linus Torvalds wrote:
>
> I suspect that because I removed the whole 'assume()' hackery, neither
> of the above issues will now happen, and the code nwo works.

Alright I'll let it stay and see if any new issues crop up.

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-13 22:12                                                   ` Linus Torvalds
  2024-05-14  5:17                                                     ` Herbert Xu
@ 2024-05-14  6:54                                                     ` Lukas Wunner
  2024-05-14 17:07                                                       ` Linus Torvalds
  1 sibling, 1 reply; 204+ messages in thread
From: Lukas Wunner @ 2024-05-14  6:54 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Julia Lawall, Nicolas Palix, cocci

On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
> On Sun, 12 May 2024 at 20:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Lukas Wunner (1):
> >       X.509: Introduce scope-based x509_certificate allocation
[...]
> Having random kernel code add random "assume()" lines is absolutely
> not what we should do. Particularly not in some random code sequence
> where it absolutely does not matter ONE WHIT.
> 
> Now, I've pulled this, but I killed that  "assume()" hackery in my merge.

Thanks, appreciated.  This way of handling it spares me from having
to resubmit the patch without assume().  (The patch is prep work
for upcoming PCI device authentication.)


> > However, this patch still has two outstanding build defects which
> > have not been addressed:
> >
> > https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
> 
> This one just seems to be a sanity check for "you shouldn't check
> kmalloc() for ERR_PTR", so it's a validation test that then doesn't
> like the new test in that 'assume()'.

I've been in touch with Julia (+cc) to silence this coccinelle
false-positive.  But now that the assume() is gone, the coccinelle
warning won't appear anyway:

https://lore.kernel.org/all/alpine.DEB.2.22.394.2405062136410.3284@hadrien/


> And the second one:
> 
> > https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
> 
> looks *very* much like the cases we've seen with clang in particular
> where clang goes "this code isn't reachable, so I'll just drop
> everything on the floor", and then it just becomes a fallthrough to
> whatever else code happens to come next. Most of the time that's just
> more (unrelated) code in the same function, but sometimes it causes
> that "falls through to next function" instead, entirely randomly
> depending on how the code was laid out.

Curiously, this particular 0-day report is for gcc 13.2.0 though,
not clang.

The assume() macro had no effect with clang when I tested it.
So the unnecessary IS_ERR() check persisted despite the macro when
compiling with clang.  Only gcc honors it.  Probably another reason
why you would hate the macro. :)

clang supports __builtin_assume().  In theory that should have the
same effect as __builtin_unreachable() on gcc (albeit with inverse
boolean semantics).  In practice it had no effect.  (Tested with
clang 15.0.6.)

https://clang.llvm.org/docs/LanguageExtensions.html#builtin-assume

So with clang there doesn't seem to be a working way to tell the
compiler about assumptions it can make.  And with gcc it's apparently
"hit and miss" depending on the exact gcc version and code. :(


> I suspect that because I removed the whole 'assume()' hackery, neither
> of the above issues will now happen, and the code nwo works.

Yes.

I guess this effort was over the top, so apologies for the noise!

Thanks,

Lukas

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.10
  2024-05-14  6:54                                                     ` Lukas Wunner
@ 2024-05-14 17:07                                                       ` Linus Torvalds
  0 siblings, 0 replies; 204+ messages in thread
From: Linus Torvalds @ 2024-05-14 17:07 UTC (permalink / raw)
  To: Lukas Wunner
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Julia Lawall, Nicolas Palix, cocci

On Mon, 13 May 2024 at 23:54, Lukas Wunner <lukas@wunner.de> wrote:
>
> On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
> >
> > > https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
> >
> > looks *very* much like the cases we've seen with clang in particular
> > where clang goes "this code isn't reachable, so I'll just drop
> > everything on the floor", and then it just becomes a fallthrough to
> > whatever else code happens to come next. Most of the time that's just
> > more (unrelated) code in the same function, but sometimes it causes
> > that "falls through to next function" instead, entirely randomly
> > depending on how the code was laid out.
>
> Curiously, this particular 0-day report is for gcc 13.2.0 though,
> not clang.

Hmm. I think all the previous reports of "falls through to next
function" that I have seen have been with clang, but that is probably
be selection bias: the gcc cases of this tend to be found so much more
quickly (because gcc is still more common at least on x86) that by the
time I see the reports, it's because of some clang issue.

And in fact, when I go test this theory by going to search on lore, I
do see several gcc reports.

So no, it was never just clang-only, it was just that the ones I had
looked at were about clang.

> The assume() macro had no effect with clang when I tested it.

I suspect that the issue is that with *normal* kernel configurations,
the code generation is simple and straightforward enough that gcc did
the right thing.

And then some more complicated setup with more debugging support
enabled (particularly things like UBSAN or KASAN) the code gets
complicated enough that gcc doesn't do the optimization any more, and
then the conditional in assume() doesn't get optimized away at an
early stage any more, and remains as a conditional branch to
la-la-land.

And you actually don't even see this as a warning unless the
la-la-land happens to be at the end of a function. IOW, the "branch to
nowhere" _could_ just branch to some label inside the function, and
the objtool sanity check would never even have triggered.

That's why "unreachable()" can be so dangerous. It tells the compiler
that code generation in one place no longer matters, and then the
compiler can decide to leave things just dangling in odd ways.

The code presumably still *works* - because the actual conditional
never triggers, so in that sense it's safe and fine. But it's still
just horrendous to try to figure out, which is why I was so down on
it.

              Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.10
  2024-03-25  9:47                                                 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
  2024-03-25 18:18                                                   ` pr-tracker-bot
@ 2024-05-20  3:26                                                   ` Herbert Xu
  2024-05-20 16:33                                                     ` pr-tracker-bot
                                                                       ` (2 more replies)
  1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-20  3:26 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 13909a0c88972c5ef5d13f44d1a8bf065a31bdf4:

  crypto: atmel-sha204a - provide the otp content (2024-05-10 17:15:25 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p2 

for you to fetch changes up to c6ab5c915da460c0397960af3c308386c3f3247b:

  crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (2024-05-17 18:55:07 +0800)

----------------------------------------------------------------
This push fixes a bug in the new ecc P521 code as well as a buggy
fix in qat.
----------------------------------------------------------------

Herbert Xu (1):
      crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak

Stefan Berger (1):
      crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes

 crypto/ecc.c                                  | 22 ++++++++++++++++++++++
 drivers/crypto/intel/qat/qat_common/adf_aer.c | 19 +++++--------------
 include/crypto/internal/ecc.h                 | 15 ++-------------
 3 files changed, 29 insertions(+), 27 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.10
  2024-05-20  3:26                                                   ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
@ 2024-05-20 16:33                                                     ` pr-tracker-bot
  2024-05-29  4:17                                                     ` Herbert Xu
  2024-09-23  3:08                                                     ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-05-20 16:33 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 20 May 2024 11:26:42 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/568c98a0f6eff6d44accfe56d0c58008bf0d498e

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.10
  2024-05-20  3:26                                                   ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
  2024-05-20 16:33                                                     ` pr-tracker-bot
@ 2024-05-29  4:17                                                     ` Herbert Xu
  2024-05-29 17:11                                                       ` pr-tracker-bot
  2024-06-28  0:40                                                       ` Herbert Xu
  2024-09-23  3:08                                                     ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-29  4:17 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit c6ab5c915da460c0397960af3c308386c3f3247b:

  crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (2024-05-17 18:55:07 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p3 

for you to fetch changes up to 67ec8cdf29971677b2fb4b6d92871eb5d5e95597:

  hwrng: core - Remove add_early_randomness (2024-05-26 18:32:16 +0800)

----------------------------------------------------------------
This push fixes a new run-time warning triggered by tpm.
----------------------------------------------------------------

Herbert Xu (1):
      hwrng: core - Remove add_early_randomness

 drivers/char/hw_random/core.c | 47 ++++---------------------------------------
 1 file changed, 4 insertions(+), 43 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.10
  2024-05-29  4:17                                                     ` Herbert Xu
@ 2024-05-29 17:11                                                       ` pr-tracker-bot
  2024-06-28  0:40                                                       ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-05-29 17:11 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 29 May 2024 12:17:54 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/db163660b02abbffebfad1bcd6dbce1201c72731

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.10
  2024-05-29  4:17                                                     ` Herbert Xu
  2024-05-29 17:11                                                       ` pr-tracker-bot
@ 2024-06-28  0:40                                                       ` Herbert Xu
  2024-06-28  1:01                                                         ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-06-28  0:40 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 67ec8cdf29971677b2fb4b6d92871eb5d5e95597:

  hwrng: core - Remove add_early_randomness (2024-05-26 18:32:16 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p4 

for you to fetch changes up to a5d8922ab2aec39336ebc78d7cefe3b84647b058:

  crypto: qat - fix linking errors when PCI_IOV is disabled (2024-06-21 21:51:51 +1000)

----------------------------------------------------------------
This push fixes a build failure in qat.
----------------------------------------------------------------

Xin Zeng (1):
      crypto: qat - fix linking errors when PCI_IOV is disabled

 drivers/crypto/intel/qat/qat_common/Makefile | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.10
  2024-06-28  0:40                                                       ` Herbert Xu
@ 2024-06-28  1:01                                                         ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-06-28  1:01 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 28 Jun 2024 10:40:19 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p4

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5bbd9b249880dba032bffa002dd9cd12cd5af09c

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.11
  2024-05-13  3:50                                                 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
  2024-05-13 22:12                                                   ` Linus Torvalds
  2024-05-13 22:38                                                   ` pr-tracker-bot
@ 2024-07-18 13:49                                                   ` Herbert Xu
  2024-07-19 18:09                                                     ` pr-tracker-bot
  2024-09-16  3:59                                                     ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-07-18 13:49 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 1613e604df0cd359cf2a7fbd9be7a0bcfacfabd0:

  Linux 6.10-rc1 (2024-05-26 15:20:12 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.11-p1 

for you to fetch changes up to df1e9791998a92fe9f1e7d3f031b34daaad39e2f:

  hwrng: core - remove (un)register_miscdev() (2024-07-13 11:50:28 +1200)

----------------------------------------------------------------
This update includes the following changes:

API:

- Test setkey in no-SIMD context.
- Add skcipher speed test for user-specified algorithm.

Algorithms:

- Add x25519 support on ppc64le.
- Add VAES and AVX512 / AVX10 optimized AES-GCM on x86.
- Remove sm2 algorithm.

Drivers:

- Add Allwinner H616 support to sun8i-ce.
- Use DMA in stm32.
- Add Exynos850 hwrng support to exynos.
----------------------------------------------------------------

Andre Przywara (3):
      dt-bindings: crypto: sun8i-ce: Add compatible for H616
      crypto: sun8i-ce - wrap accesses to descriptor address fields
      crypto: sun8i-ce - add Allwinner H616 support

Andy Shevchenko (1):
      hwrng: core - Remove list.h from the hw_random.h

Ard Biesheuvel (1):
      crypto: arm/crc32 - add kCFI annotations to asm routines

Chenghai Huang (2):
      crypto: hisilicon/qm - adjust the internal processing sequence of the vf enable and disable
      crypto: hisilicon/zip - optimize the address offset of the reg query function

Christophe JAILLET (1):
      crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()

Damian Muszynski (1):
      Documentation: qat: fix auto_reset attribute details

Dan Carpenter (1):
      crypto: lib/mpi - delete unnecessary condition

Danny Tsen (3):
      crypto: ppc/curve25519 - Low-level primitives for ppc64le
      crypto: ppc/curve25519 - Core functions for ppc64le
      crypto: ppc/curve25519 - Update Kconfig and Makefile for ppc64le

David Gstir (1):
      crypto: mxs-dcp - Ensure payload is zero when using key slot

Deming Wang (1):
      crypto: qat - Fix typo

Dr. David Alan Gilbert (4):
      crypto: axis - Remove unused struct 'dbgfs_u32'
      crypto: ccree - Remove unused struct 'tdes_keys'
      crypto: hifn_795x - Remove unused hifn_*_command structs
      crypto: n2 - Remove unused struct 'n2_skcipher_request_context'

Eric Biggers (4):
      crypto: testmgr - test setkey in no-SIMD context
      crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
      crypto: x86/aes-gcm - rewrite the AES-NI optimized AES-GCM
      crypto: testmgr - generate power-of-2 lengths more often

Francesco Dolcini (1):
      hwrng: Kconfig - Do not enable by default CN10K driver

Greg Kroah-Hartman (1):
      crypto: qat - make adf_ctl_class constant

Harald Freudenberger (1):
      hwrng: core - Fix wrong quality calculation at hw rng registration

Hareshx Sankar Raj (1):
      crypto: qat - fix unintentional re-enabling of error interrupts

Herbert Xu (2):
      crypto: api - Disable boot-test-finished if algapi is a module
      crypto: sm2 - Remove sm2 algorithm

Ilpo Järvinen (1):
      hwrng: amd - Convert PCIBIOS_* return codes to errnos

Jarkko Sakkinen (1):
      crypto: ecdsa - Fix the public key format description

Jeff Johnson (13):
      crypto: Add missing MODULE_DESCRIPTION() macros
      crypto: lib - add missing MODULE_DESCRIPTION() macros
      crypto: x86 - add missing MODULE_DESCRIPTION() macros
      crypto: atmel-sha204a - add missing MODULE_DESCRIPTION() macro
      crypto: keembay - add missing MODULE_DESCRIPTION() macro
      crypto: sa2ul - add missing MODULE_DESCRIPTION() macro
      crypto: xilinx - add missing MODULE_DESCRIPTION() macro
      hwrng: omap - add missing MODULE_DESCRIPTION() macro
      crypto: arm64 - add missing MODULE_DESCRIPTION() macros
      hwrng: drivers - add missing Arm & Cavium MODULE_DESCRIPTION() macros
      crypto: arm/poly1305 - add missing MODULE_DESCRIPTION() macro
      crypto: arm - add missing MODULE_DESCRIPTION() macros
      crypto: lib - add missing MODULE_DESCRIPTION() macros

Jia Jie Ho (2):
      crypto: starfive - Align rsa input data to 32-bit
      crypto: starfive - Fix nent assignment in rsa dec

Jiapeng Chong (2):
      crypto: lib/mpi - Use swap() in mpi_ec_mul_point()
      crypto: lib/mpi - Use swap() in mpi_powm()

Jiwei Sun (1):
      crypto: qat - initialize user_input.lock for rate_limiting

Kim Phillips (1):
      crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked

Kyle Meyer (1):
      crypto: deflate - Add aliases to deflate

Lothar Rubusch (1):
      crypto: atmel-sha204a - fix negated return value

Marek Vasut (3):
      hwrng: stm32 - use pm_runtime_resume_and_get()
      hwrng: stm32 - cache device pointer in struct stm32_rng_private
      hwrng: stm32 - use sizeof(*priv) instead of sizeof(struct stm32_rng_private)

Mario Limonciello (5):
      crypto: ccp - Represent capabilities register as a union
      crypto: ccp - Move security attributes to their own file
      crypto: ccp - align psp_platform_access_msg
      crypto: ccp - Add support for getting security attributes on some older systems
      crypto: ccp - Move message about TSME being enabled later in init

Mark Brown (1):
      crypto: arm64/crc10dif - Raise priority of NEON crct10dif implementation

Masahiro Yamada (1):
      hwrng: core - remove (un)register_miscdev()

Maxime Méré (4):
      crypto: stm32/cryp - use dma when possible
      crypto: stm32/cryp - increase priority
      crypto: stm32/cryp - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
      crypto: stm32/cryp - call finalize with bh disabled

Neil Armstrong (1):
      dt-bindings: rng: meson: add optional power-domains

Nivas Varadharajan Mugunthakumar (1):
      crypto: qat - extend scope of lock in adf_cfg_add_key_value_param()

Sam Protsenko (6):
      dt-bindings: rng: Add Exynos850 support to exynos-trng
      hwrng: exynos - Improve coding style
      hwrng: exynos - Use devm_clk_get_enabled() to get the clock
      hwrng: exynos - Implement bus clock control
      hwrng: exynos - Add SMC based TRNG operation
      hwrng: exynos - Enable Exynos850 support

Sergey Portnoy (1):
      crypto: tcrypt - add skcipher speed for given alg

Stefan Berger (4):
      crypto: ecdsa - Use ecc_digits_from_bytes to create hash digits array
      crypto: ecdsa - Use ecc_digits_from_bytes to convert signature
      crypto: ecc - Add comment to ecc_digits_from_bytes about input byte array
      crypto: ecc - Fix off-by-one missing to clear most significant digit

Tony Luck (2):
      crypto: x86/twofish - Switch to new Intel CPU model defines
      crypto: x86/poly1305 - Switch to new Intel CPU model defines

 Documentation/ABI/testing/sysfs-driver-qat         |    4 +-
 .../bindings/crypto/allwinner,sun8i-ce.yaml        |    2 +
 .../devicetree/bindings/rng/amlogic,meson-rng.yaml |    3 +
 .../bindings/rng/samsung,exynos5250-trng.yaml      |   40 +-
 MAINTAINERS                                        |    6 +
 arch/arm/crypto/aes-neonbs-glue.c                  |    1 +
 arch/arm/crypto/crc32-ce-core.S                    |   17 +-
 arch/arm/crypto/crc32-ce-glue.c                    |    1 +
 arch/arm/crypto/crct10dif-ce-glue.c                |    1 +
 arch/arm/crypto/curve25519-glue.c                  |    1 +
 arch/arm/crypto/poly1305-glue.c                    |    1 +
 arch/arm64/crypto/aes-neonbs-glue.c                |    1 +
 arch/arm64/crypto/crct10dif-ce-glue.c              |    3 +-
 arch/arm64/crypto/poly1305-glue.c                  |    1 +
 arch/powerpc/crypto/Kconfig                        |   11 +
 arch/powerpc/crypto/Makefile                       |    2 +
 arch/powerpc/crypto/curve25519-ppc64le-core.c      |  299 +++
 arch/powerpc/crypto/curve25519-ppc64le_asm.S       |  671 +++++
 arch/x86/crypto/Kconfig                            |    1 +
 arch/x86/crypto/Makefile                           |    8 +-
 arch/x86/crypto/aes-gcm-aesni-x86_64.S             | 1128 ++++++++
 arch/x86/crypto/aes-gcm-avx10-x86_64.S             | 1222 +++++++++
 arch/x86/crypto/aesni-intel_asm.S                  | 1503 +----------
 arch/x86/crypto/aesni-intel_avx-x86_64.S           | 2804 --------------------
 arch/x86/crypto/aesni-intel_glue.c                 | 1269 +++++----
 arch/x86/crypto/crc32-pclmul_glue.c                |    1 +
 arch/x86/crypto/curve25519-x86_64.c                |    1 +
 arch/x86/crypto/poly1305_glue.c                    |    4 +-
 arch/x86/crypto/twofish_glue_3way.c                |    9 +-
 crypto/Kconfig                                     |   18 -
 crypto/Makefile                                    |    8 -
 crypto/af_alg.c                                    |    1 +
 crypto/algapi.c                                    |    3 +
 crypto/algif_hash.c                                |    1 +
 crypto/algif_skcipher.c                            |    1 +
 crypto/api.c                                       |    4 +-
 crypto/asymmetric_keys/pkcs7_parser.c              |    4 -
 crypto/asymmetric_keys/public_key.c                |    7 -
 crypto/asymmetric_keys/x509_cert_parser.c          |   16 -
 crypto/asymmetric_keys/x509_public_key.c           |   17 +-
 crypto/cast_common.c                               |    1 +
 crypto/curve25519-generic.c                        |    1 +
 crypto/deflate.c                                   |    1 +
 crypto/ecc.c                                       |    3 +-
 crypto/ecdsa.c                                     |   34 +-
 crypto/internal.h                                  |    7 +-
 crypto/simd.c                                      |    1 +
 crypto/sm2.c                                       |  498 ----
 crypto/sm2signature.asn1                           |    4 -
 crypto/tcrypt.c                                    |    9 +
 crypto/testmgr.c                                   |   51 +-
 crypto/testmgr.h                                   |   59 -
 crypto/xor.c                                       |    1 +
 drivers/char/hw_random/Kconfig                     |    1 -
 drivers/char/hw_random/amd-rng.c                   |    4 +-
 drivers/char/hw_random/arm_smccc_trng.c            |    1 +
 drivers/char/hw_random/cavium-rng-vf.c             |    1 +
 drivers/char/hw_random/cavium-rng.c                |    1 +
 drivers/char/hw_random/core.c                      |   18 +-
 drivers/char/hw_random/exynos-trng.c               |  217 +-
 drivers/char/hw_random/omap-rng.c                  |    1 +
 drivers/char/hw_random/omap3-rom-rng.c             |    1 +
 drivers/char/hw_random/stm32-rng.c                 |   35 +-
 .../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c    |    8 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |   28 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c  |    6 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c  |    6 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c  |    2 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h       |   15 +
 drivers/crypto/atmel-sha204a.c                     |    3 +-
 drivers/crypto/axis/artpec6_crypto.c               |    7 -
 drivers/crypto/ccp/Makefile                        |    3 +-
 drivers/crypto/ccp/dbc.c                           |    2 +-
 drivers/crypto/ccp/hsti.c                          |  138 +
 drivers/crypto/ccp/hsti.h                          |   17 +
 drivers/crypto/ccp/psp-dev.c                       |   23 +-
 drivers/crypto/ccp/psp-dev.h                       |   46 +-
 drivers/crypto/ccp/sev-dev.c                       |    8 +-
 drivers/crypto/ccp/sp-dev.h                        |    2 +-
 drivers/crypto/ccp/sp-pci.c                        |   67 +-
 drivers/crypto/ccree/cc_cipher.c                   |    6 -
 drivers/crypto/hifn_795x.c                         |   17 -
 drivers/crypto/hisilicon/qm.c                      |   11 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |   48 +-
 drivers/crypto/intel/keembay/ocs-hcu.c             |    1 +
 drivers/crypto/intel/qat/qat_common/adf_cfg.c      |    6 +-
 drivers/crypto/intel/qat/qat_common/adf_ctl_drv.c  |   21 +-
 drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c  |    2 +-
 .../crypto/intel/qat/qat_common/adf_gen2_pfvf.c    |    4 +-
 drivers/crypto/intel/qat/qat_common/adf_rl.c       |    1 +
 .../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c  |    8 +-
 drivers/crypto/mxs-dcp.c                           |    3 +-
 drivers/crypto/n2_core.c                           |    4 -
 drivers/crypto/sa2ul.c                             |    1 +
 drivers/crypto/starfive/jh7110-cryp.h              |    4 +-
 drivers/crypto/starfive/jh7110-rsa.c               |   15 +-
 drivers/crypto/stm32/stm32-cryp.c                  |  719 ++++-
 drivers/crypto/tegra/tegra-se-main.c               |    1 -
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |    1 +
 include/crypto/internal/ecc.h                      |    3 +
 include/crypto/sm2.h                               |   28 -
 include/linux/hw_random.h                          |    3 +-
 include/linux/psp-platform-access.h                |    5 +-
 lib/crypto/arc4.c                                  |    1 +
 lib/crypto/des.c                                   |    1 +
 lib/crypto/libchacha.c                             |    1 +
 lib/crypto/mpi/ec.c                                |    6 +-
 lib/crypto/mpi/mpi-bit.c                           |   10 +-
 lib/crypto/mpi/mpi-pow.c                           |    9 +-
 lib/crypto/poly1305.c                              |    1 +
 lib/crypto/sha1.c                                  |    1 +
 lib/crypto/sha256.c                                |    1 +
 lib/crypto/utils.c                                 |    1 +
 security/integrity/digsig_asymmetric.c             |    3 +-
 114 files changed, 5480 insertions(+), 5893 deletions(-)
 create mode 100644 arch/powerpc/crypto/curve25519-ppc64le-core.c
 create mode 100644 arch/powerpc/crypto/curve25519-ppc64le_asm.S
 create mode 100644 arch/x86/crypto/aes-gcm-aesni-x86_64.S
 create mode 100644 arch/x86/crypto/aes-gcm-avx10-x86_64.S
 delete mode 100644 arch/x86/crypto/aesni-intel_avx-x86_64.S
 delete mode 100644 crypto/sm2.c
 delete mode 100644 crypto/sm2signature.asn1
 create mode 100644 drivers/crypto/ccp/hsti.c
 create mode 100644 drivers/crypto/ccp/hsti.h
 delete mode 100644 include/crypto/sm2.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.11
  2024-07-18 13:49                                                   ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
@ 2024-07-19 18:09                                                     ` pr-tracker-bot
  2024-09-16  3:59                                                     ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-07-19 18:09 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 19 Jul 2024 01:49:26 +1200:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.11-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c434e25b62f8efcfbb6bf1f7ce55960206c1137e

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.12
  2024-07-18 13:49                                                   ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
  2024-07-19 18:09                                                     ` pr-tracker-bot
@ 2024-09-16  3:59                                                     ` Herbert Xu
  2024-09-16  4:55                                                       ` pr-tracker-bot
  2024-11-18  3:18                                                       ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-09-16  3:59 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Fri, Jul 19, 2024 at 01:49:26AM +1200, Herbert Xu wrote:

The following changes since commit 8400291e289ee6b2bf9779ff1c83a291501f017b:

  Linux 6.11-rc1 (2024-07-28 14:19:55 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p1 

for you to fetch changes up to ce212d2afca47acd366a2e74c76fe82c31f785ab:

  crypto: n2 - Set err to EINVAL if snprintf fails for hmac (2024-09-13 18:26:53 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Make self-test asynchronous.

Algorithms:

- Remove MPI functions added for SM3.
- Add allocation error checks to remaining MPI functions (introduced for SM3).
- Set default Jitter RNG OSR to 3.

Drivers:

- Add hwrng driver for Rockchip RK3568 SoC.
- Allow disabling SR-IOV VFs through sysfs in qat.
- Fix device reset bugs in hisilicon.
- Fix authenc key parsing by using generic helper in octeontx*.

Others:

- Fix xor benchmarking on parisc.
----------------------------------------------------------------

Adam Guerin (1):
      crypto: qat - preserve ADF_GENERAL_SEC

Amit Shah (1):
      crypto: ccp - do not request interrupt on cmd completion when irqs disabled

Aurelien Jarno (2):
      dt-bindings: rng: Add Rockchip RK3568 TRNG
      hwrng: rockchip - add hwrng driver for Rockchip RK3568 SoC

Brian Masney (2):
      crypto: qcom-rng - fix support for ACPI-based systems
      crypto: qcom-rng - rename *_of_data to *_match_data

Chen Yufan (1):
      crypto: camm/qi - Use ERR_CAST() to return error-valued pointer

Chenghai Huang (2):
      crypto: hisilicon - add a lock for the qp send operation
      crypto: hisilicon/trng - modifying the order of header files

Chunhai Guo (2):
      crypto: atmel - use devm_clk_get_prepared() helpers
      crypto: img-hash - use devm_clk_get_enabled() helpers

Colin Ian King (2):
      crypto: hisilicon/sec - Remove trailing space after \n newline
      crypto: qat - Remove trailing space after \n newline

Dan Carpenter (7):
      crypto: iaa - Fix potential use after free bug
      crypto: spacc - Fix bounds checking on spacc->job[]
      crypto: spacc - Fix off by one in spacc_isenabled()
      crypto: spacc - Add a new line in spacc_open()
      crypto: spacc - Fix uninitialized variable in spacc_aead_process()
      crypto: spacc - Fix NULL vs IS_ERR() check in spacc_aead_fallback()
      crypto: spacc - Check for allocation failure in spacc_skcipher_fallback()

Eric Biggers (3):
      crypto: x86/aes-gcm - fix PREEMPT_RT issue in gcm_crypt()
      crypto: arm/aes-neonbs - go back to using aes-arm directly
      crypto: x86/aesni - update docs for aesni-intel module

Fangrui Song (1):
      crypto: x86/sha256 - Add parentheses around macros' single arguments

Francesco Dolcini (1):
      hwrng: cn10k - Enable by default CN10K driver if Thunder SoC is enabled

Frank Li (1):
      dt-bindings: crypto: fsl,sec-v4.0: add second register space for rtic

Gaosheng Cui (2):
      hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init
      hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume

Guoqing Jiang (1):
      hwrng: mtk - Use devm_pm_runtime_enable

Gustavo A. R. Silva (2):
      crypto: qat - Use static_assert() to check struct sizes
      crypto: nx - Use static_assert() to check struct sizes

Helge Deller (1):
      crypto: xor - fix template benchmarking

Herbert Xu (19):
      Revert "crypto: arm64/poly1305 - move data to rodata section"
      crypto: caam/qi* - Use cpumask_var_t instead of cpumask_t
      Revert "lib/mpi: Introduce ec implementation to MPI library"
      Revert "lib/mpi: Extend the MPI library"
      crypto: lib/mpi - Add error checks to extension
      crypto: dh - Check mpi_rshift errors
      crypto: rsa - Check MPI allocation errors
      crypto: spacc - Use crypto_authenc_extractkeys
      crypto: octeontx - Fix authenc setkey
      crypto: octeontx2 - Fix authenc setkey
      crypto: api - Remove instance larval fulfilment
      crypto: api - Do not wait for tests during registration
      crypto: simd - Do not call crypto_alloc_tfm during registration
      Revert "crypto: spacc - Add SPAcc Skcipher support"
      crypto: api - Fix generic algorithm self-test races
      crypto: algboss - Pass instance creation error up
      crypto: testmgr - Hide ENOENT errors
      crypto: octeontx* - Select CRYPTO_AUTHENC
      crypto: n2 - Set err to EINVAL if snprintf fails for hmac

Huan Yang (1):
      hwrng: mxc-rnga - Use devm_clk_get_enabled() helpers

Jeff Johnson (1):
      crypto: ppc/curve25519 - add missing MODULE_DESCRIPTION() macro

Jia He (2):
      crypto: arm64/poly1305 - move data to rodata section
      crypto: arm64/poly1305 - move data to rodata section

Kamlesh Gurudasani (1):
      padata: Honor the caller's alignment in case of chunk_size 0

Kuan-Wei Chiu (3):
      crypto: octeontx - Remove custom swap function in favor of built-in sort swap
      crypto: octeontx2 - Remove custom swap functions in favor of built-in sort swap
      crypto: hisilicon/zip - Optimize performance by replacing rw_lock with spinlock

Liao Chen (1):
      crypto: keembay - fix module autoloading

Martin Kaiser (2):
      hwrng: rockchip - rst is used only during probe
      hwrng: rockchip - handle devm_pm_runtime_enable errors

Michal Witwicki (4):
      crypto: qat - disable IOV in adf_dev_stop()
      crypto: qat - fix recovery flow for VFs
      crypto: qat - ensure correct order in VF restarting handler
      crypto: qat - allow disabling SR-IOV VFs

Nikunj Kela (1):
      dt-bindings: crypto: qcom,prng: document support for SA8255p

Pavan Kumar Paluri (1):
      crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure

Pavitrakumar M (8):
      crypto: spacc - Add SPAcc Skcipher support
      crypto: spacc - Enable SPAcc AUTODETECT
      crypto: spacc - Add SPAcc ahash support
      crypto: spacc - Add SPAcc aead support
      crypto: spacc - Add SPAcc Kconfig and Makefile
      crypto: spacc - Enable Driver compilation in crypto Kconfig and Makefile
      crypto: spacc - Fix counter width checks
      crypto: spacc - Fixed return to CRYPTO_OK

Riyan Dhiman (1):
      crypto: aegis128 - Fix indentation issue in crypto_aegis128_process_crypt()

Stephan Mueller (1):
      crypto: jitter - set default OSR to 3

Stephen Rothwell (1):
      crypto: spacc - Add ifndef around MIN

Svyatoslav Pankratov (1):
      crypto: qat - fix "Full Going True" macro definition

Thorsten Blum (2):
      crypto: chacha20poly1305 - Annotate struct chachapoly_ctx with __counted_by()
      crypto: jitter - Use min() to simplify jent_read_entropy()

Tom Lendacky (1):
      crypto: ccp - Add additional information about an SEV firmware upgrade

VanGiang Nguyen (1):
      padata: use integer wrap around to prevent deadlock on seq_nr overflow

WangYuli (1):
      crypto: mips/crc32 - Clean up useless assignment operations

Weili Qian (3):
      crypto: hisilicon/qm - reset device before enabling it
      crypto: hisilicon/hpre - mask cluster timeout error
      crypto: hisilicon/qm - inject error before stopping queue

Yang Shen (1):
      crypto: hisilicon - fix missed error branch

Yue Haibing (6):
      crypto: safexcel - Remove unused declaration safexcel_ring_first_rptr()
      crypto: sl3516 - Remove unused declaration sl3516_ce_enqueue()
      crypto: octeontx - Remove unused declaration otx_cpt_callback()
      crypto: ccp - Remove unused declaration sp_get_master()
      crypto: amlogic - Remove unused declaration meson_enqueue()
      crypto: crypto4xx - Remove unused declaration crypto4xx_free_ctx()

Zhu Jun (1):
      crypto: tools/ccp - Remove unused variable

 .../devicetree/bindings/crypto/fsl,sec-v4.0.yaml   |    5 +-
 .../devicetree/bindings/crypto/qcom,prng.yaml      |    1 +
 .../bindings/rng/rockchip,rk3568-rng.yaml          |   61 +
 MAINTAINERS                                        |    7 +
 arch/arm/crypto/Kconfig                            |   14 +-
 arch/arm/crypto/aes-ce-glue.c                      |    2 +-
 arch/arm/crypto/aes-cipher-glue.c                  |    5 +-
 arch/arm/crypto/aes-cipher.h                       |   13 +
 arch/arm/crypto/aes-neonbs-glue.c                  |  131 +-
 arch/arm64/crypto/poly1305-armv8.pl                |    6 +-
 arch/mips/crypto/crc32-mips.c                      |   64 +-
 arch/powerpc/crypto/curve25519-ppc64le-core.c      |    1 +
 arch/x86/crypto/Kconfig                            |    8 +-
 arch/x86/crypto/aesni-intel_glue.c                 |   61 +-
 arch/x86/crypto/sha256-avx2-asm.S                  |   16 +-
 crypto/Kconfig                                     |    2 +-
 crypto/aegis128-core.c                             |    5 +-
 crypto/algapi.c                                    |   71 +-
 crypto/algboss.c                                   |    4 +-
 crypto/api.c                                       |   75 +-
 crypto/chacha20poly1305.c                          |    2 +-
 crypto/dh.c                                        |    4 +-
 crypto/internal.h                                  |    3 +-
 crypto/jitterentropy.c                             |    6 +-
 crypto/rsa.c                                       |   19 +-
 crypto/simd.c                                      |   76 +-
 crypto/testmgr.c                                   |   23 +-
 crypto/xor.c                                       |   31 +-
 drivers/char/hw_random/Kconfig                     |   15 +
 drivers/char/hw_random/Makefile                    |    1 +
 drivers/char/hw_random/bcm2835-rng.c               |    4 +-
 drivers/char/hw_random/cctrng.c                    |    1 +
 drivers/char/hw_random/mtk-rng.c                   |    2 +-
 drivers/char/hw_random/mxc-rnga.c                  |   16 +-
 drivers/char/hw_random/rockchip-rng.c              |  228 +++
 drivers/crypto/amcc/crypto4xx_core.h               |    1 -
 drivers/crypto/amlogic/amlogic-gxl.h               |    2 -
 drivers/crypto/atmel-aes.c                         |   16 +-
 drivers/crypto/atmel-sha.c                         |   14 +-
 drivers/crypto/caam/caamalg_qi.c                   |    4 +-
 drivers/crypto/caam/caamalg_qi2.c                  |   17 +-
 drivers/crypto/caam/qi.c                           |   31 +-
 drivers/crypto/ccp/sev-dev.c                       |   28 +-
 drivers/crypto/ccp/sp-dev.h                        |    1 -
 drivers/crypto/gemini/sl3516-ce.h                  |    2 -
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |    2 +
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   54 +-
 drivers/crypto/hisilicon/qm.c                      |  151 +-
 drivers/crypto/hisilicon/sec/sec_drv.c             |    2 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |   16 +-
 drivers/crypto/hisilicon/sgl.c                     |   14 +-
 drivers/crypto/hisilicon/trng/trng.c               |    4 +-
 drivers/crypto/hisilicon/zip/zip_crypto.c          |   17 +-
 drivers/crypto/hisilicon/zip/zip_main.c            |   23 +-
 drivers/crypto/img-hash.c                          |   21 +-
 drivers/crypto/inside-secure/safexcel.h            |    1 -
 drivers/crypto/intel/iaa/iaa_crypto_main.c         |    4 +-
 .../crypto/intel/keembay/keembay-ocs-hcu-core.c    |    1 +
 drivers/crypto/intel/qat/qat_420xx/adf_drv.c       |    4 +-
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |    4 +-
 drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c       |    4 +-
 drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c     |    4 +-
 drivers/crypto/intel/qat/qat_c62x/adf_drv.c        |    4 +-
 drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c      |    4 +-
 drivers/crypto/intel/qat/qat_common/adf_aer.c      |    2 +-
 drivers/crypto/intel/qat/qat_common/adf_cfg.c      |   29 +
 drivers/crypto/intel/qat/qat_common/adf_cfg.h      |    2 +
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |    2 +-
 drivers/crypto/intel/qat/qat_common/adf_ctl_drv.c  |    6 +-
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |    2 +-
 drivers/crypto/intel/qat/qat_common/adf_init.c     |   44 +-
 .../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.c  |    9 +-
 .../crypto/intel/qat/qat_common/adf_pfvf_vf_msg.c  |   14 +
 .../crypto/intel/qat/qat_common/adf_pfvf_vf_msg.h  |    1 +
 drivers/crypto/intel/qat/qat_common/adf_sriov.c    |  194 ++-
 drivers/crypto/intel/qat/qat_common/adf_sysfs.c    |    4 +-
 drivers/crypto/intel/qat/qat_common/adf_vf_isr.c   |    4 +-
 drivers/crypto/intel/qat/qat_common/qat_bl.h       |    2 +
 drivers/crypto/intel/qat/qat_common/qat_uclo.c     |    2 +-
 drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c    |    4 +-
 drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c  |    4 +-
 drivers/crypto/marvell/Kconfig                     |    2 +
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.c   |  277 ++--
 drivers/crypto/marvell/octeontx/otx_cptvf_algs.h   |    1 -
 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c |  266 ++--
 drivers/crypto/n2_core.c                           |    1 +
 drivers/crypto/nx/nx-842.h                         |    3 +
 drivers/crypto/qcom-rng.c                          |   24 +-
 include/crypto/internal/simd.h                     |   12 +-
 include/linux/mpi.h                                |  192 +--
 kernel/padata.c                                    |    6 +-
 lib/crypto/mpi/Makefile                            |    2 -
 lib/crypto/mpi/ec.c                                | 1507 --------------------
 lib/crypto/mpi/mpi-add.c                           |   89 +-
 lib/crypto/mpi/mpi-bit.c                           |  168 +--
 lib/crypto/mpi/mpi-cmp.c                           |   46 +-
 lib/crypto/mpi/mpi-div.c                           |   82 +-
 lib/crypto/mpi/mpi-internal.h                      |   21 +-
 lib/crypto/mpi/mpi-inv.c                           |  143 --
 lib/crypto/mpi/mpi-mod.c                           |  148 +-
 lib/crypto/mpi/mpi-mul.c                           |   29 +-
 lib/crypto/mpi/mpicoder.c                          |  336 -----
 lib/crypto/mpi/mpih-mul.c                          |   25 -
 lib/crypto/mpi/mpiutil.c                           |  184 +--
 tools/crypto/ccp/dbc.c                             |    1 -
 105 files changed, 1423 insertions(+), 3900 deletions(-)
 create mode 100644 Documentation/devicetree/bindings/rng/rockchip,rk3568-rng.yaml
 create mode 100644 arch/arm/crypto/aes-cipher.h
 create mode 100644 drivers/char/hw_random/rockchip-rng.c
 delete mode 100644 lib/crypto/mpi/ec.c
 delete mode 100644 lib/crypto/mpi/mpi-inv.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.12
  2024-09-16  3:59                                                     ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
@ 2024-09-16  4:55                                                       ` pr-tracker-bot
  2024-11-18  3:18                                                       ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-09-16  4:55 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 16 Sep 2024 11:59:01 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/85ffc6e4ed3712f8b3fedb3fbe42afae644a699c

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.12
  2024-05-20  3:26                                                   ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
  2024-05-20 16:33                                                     ` pr-tracker-bot
  2024-05-29  4:17                                                     ` Herbert Xu
@ 2024-09-23  3:08                                                     ` Herbert Xu
  2024-09-24 18:04                                                       ` pr-tracker-bot
                                                                         ` (2 more replies)
  2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-09-23  3:08 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit ce212d2afca47acd366a2e74c76fe82c31f785ab:

  crypto: n2 - Set err to EINVAL if snprintf fails for hmac (2024-09-13 18:26:53 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p2 

for you to fetch changes up to 44ac4625ea002deecd0c227336c95b724206c698:

  crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (2024-09-21 17:14:59 +0800)

----------------------------------------------------------------
This push fixes the following issues:

- Disable buggy p10 aes-gcm code on powerpc.
- Fix module aliases in paes_s390.
- Fix buffer overread in caam.
----------------------------------------------------------------

Danny Tsen (1):
      crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10

Herbert Xu (2):
      crypto: caam - Pad SG length when allocating hash edesc
      crypto: s390/paes - Fix module aliases

 arch/powerpc/crypto/Kconfig    | 1 +
 arch/s390/crypto/paes_s390.c   | 5 ++++-
 drivers/crypto/caam/caamhash.c | 1 +
 3 files changed, 6 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.12
  2024-09-23  3:08                                                     ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
@ 2024-09-24 18:04                                                       ` pr-tracker-bot
  2024-10-16  5:37                                                       ` Herbert Xu
  2024-12-14  9:21                                                       ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
  2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-09-24 18:04 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 23 Sep 2024 11:08:15 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/1cfb46051db9ddb68e297eaf17270e09874ec5f3

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.12
  2024-09-23  3:08                                                     ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
  2024-09-24 18:04                                                       ` pr-tracker-bot
@ 2024-10-16  5:37                                                       ` Herbert Xu
  2024-10-16 20:51                                                         ` pr-tracker-bot
  2024-10-21  5:45                                                         ` Herbert Xu
  2024-12-14  9:21                                                       ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-10-16  5:37 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 44ac4625ea002deecd0c227336c95b724206c698:

  crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (2024-09-21 17:14:59 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p3 

for you to fetch changes up to e845d2399a00f866f287e0cefbd4fc7d8ef0d2f7:

  crypto: marvell/cesa - Disable hash algorithms (2024-10-10 17:03:35 +0800)

----------------------------------------------------------------
This push fixes the following issues:

- Remove bogus ENOENT error messages.
- Ensure algorithm is still alive before marking it as tested.
- Disable buggy hash algorithms in marvell/cesa.
----------------------------------------------------------------

Herbert Xu (3):
      crypto: api - Fix liveliness check in crypto_alg_tested
      crypto: testmgr - Hide ENOENT errors better
      crypto: marvell/cesa - Disable hash algorithms

 crypto/algapi.c                    |  2 +-
 crypto/testmgr.c                   | 23 +++++++++++------------
 drivers/crypto/marvell/cesa/hash.c | 12 ++++++------
 3 files changed, 18 insertions(+), 19 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.12
  2024-10-16  5:37                                                       ` Herbert Xu
@ 2024-10-16 20:51                                                         ` pr-tracker-bot
  2024-10-21  5:45                                                         ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-10-16 20:51 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 16 Oct 2024 13:37:55 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6f6fc393f4dbaa149962a4662f5dd08513c28905

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.12
  2024-10-16  5:37                                                       ` Herbert Xu
  2024-10-16 20:51                                                         ` pr-tracker-bot
@ 2024-10-21  5:45                                                         ` Herbert Xu
  2024-10-21 18:27                                                           ` pr-tracker-bot
  2024-11-15 11:51                                                           ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-10-21  5:45 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit e845d2399a00f866f287e0cefbd4fc7d8ef0d2f7:

  crypto: marvell/cesa - Disable hash algorithms (2024-10-10 17:03:35 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p4 

for you to fetch changes up to cd843399d706411ff80520fb7883afeeefa76e98:

  crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue (2024-10-16 13:38:16 +0800)

----------------------------------------------------------------
This push fixes a regression in mpi that broke RSA.
----------------------------------------------------------------

Qianqiang Liu (1):
      crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue

 lib/crypto/mpi/mpi-mul.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.12
  2024-10-21  5:45                                                         ` Herbert Xu
@ 2024-10-21 18:27                                                           ` pr-tracker-bot
  2024-11-15 11:51                                                           ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-10-21 18:27 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 21 Oct 2024 13:45:16 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p4

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a777c32ca42b9a8a5e5abd915883a73620d9044b

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.12
  2024-10-21  5:45                                                         ` Herbert Xu
  2024-10-21 18:27                                                           ` pr-tracker-bot
@ 2024-11-15 11:51                                                           ` Herbert Xu
  2024-11-15 18:59                                                             ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-11-15 11:51 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit cd843399d706411ff80520fb7883afeeefa76e98:

  crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue (2024-10-16 13:38:16 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p5 

for you to fetch changes up to dd41b283ef2f028e414312706b48f2880b7050b5:

  crypto: mips/crc32 - fix the CRC32C implementation (2024-10-26 14:39:30 +0800)

----------------------------------------------------------------
This push fixes a regression in the MIPS CRC32C code.
----------------------------------------------------------------

Eric Biggers (1):
      crypto: mips/crc32 - fix the CRC32C implementation

 arch/mips/crypto/crc32-mips.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.12
  2024-11-15 11:51                                                           ` Herbert Xu
@ 2024-11-15 18:59                                                             ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-11-15 18:59 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Fri, 15 Nov 2024 19:51:58 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p5

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/842c7e5834af1fd20b3c79f894be51b2059e3c88

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.13
  2024-09-16  3:59                                                     ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
  2024-09-16  4:55                                                       ` pr-tracker-bot
@ 2024-11-18  3:18                                                       ` Herbert Xu
  2024-11-19 19:06                                                         ` pr-tracker-bot
  2025-01-23 11:10                                                         ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-11-18  3:18 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 9852d85ec9d492ebef56dc5f229416c925758edc:

  Linux 6.12-rc1 (2024-09-29 15:06:19 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p1 

for you to fetch changes up to 4223414efeae3a8efb4da1e9c9c52a1a44c1c5bf:

  crypto: marvell/cesa - fix uninit value for struct mv_cesa_op_ctx (2024-11-15 19:52:51 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Add sig driver API.
- Remove signing/verification from akcipher API.
- Move crypto_simd_disabled_for_test to lib/crypto.
- Add WARN_ON for return values from driver that indicates memory corruption.

Algorithms:

- Provide crc32-arch and crc32c-arch through Crypto API.
- Optimise crc32c code size on x86.
- Optimise crct10dif on arm/arm64.
- Optimise p10-aes-gcm on powerpc.
- Optimise aegis128 on x86.
- Output full sample from test interface in jitter RNG.
- Retry without padata when it fails in pcrypt.

Drivers:

- Add support for Airoha EN7581 TRNG.
- Add support for STM32MP25x platforms in stm32.
- Enable iproc-r200 RNG driver on BCMBCA.
- Add Broadcom BCM74110 RNG driver.
----------------------------------------------------------------

Ahsan Atta (1):
      crypto: qat - remove faulty arbiter config reset

Ard Biesheuvel (8):
      crypto: crc32 - Provide crc32-arch driver for accelerated library code
      crypto: crc32c - Provide crc32c-arch driver for accelerated library code
      crypto: arm64/crct10dif - Remove obsolete chunking logic
      crypto: arm64/crct10dif - Use faster 16x64 bit polynomial multiply
      crypto: arm64/crct10dif - Remove remaining 64x64 PMULL fallback code
      crypto: arm/crct10dif - Use existing mov_l macro instead of __adrl
      crypto: arm/crct10dif - Macroify PMULL asm code
      crypto: arm/crct10dif - Implement plain NEON variant

Cabiddu, Giovanni (1):
      crypto: qat - remove check after debugfs_create_dir()

Chen Ridong (2):
      crypto: caam - add error check to caam_rsa_set_priv_key_form
      crypto: bcm - add error check in the ahash_hmac_init function

Chenghai Huang (1):
      crypto: hisilicon/qm - fix the coding specifications issue

Christian Marangi (2):
      dt-bindings: rng: add support for Airoha EN7581 TRNG
      hwrng: airoha - add support for Airoha EN7581 TRNG

Christophe JAILLET (4):
      crypto: caam - Fix the pointer passed to caam_qi_shutdown()
      crypto: caam - Slightly simplify platform_device()
      crypto: qat - Constify struct pm_status_row
      crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()

Colin Ian King (1):
      crypto: tegra - remove redundant error check on ret

Dan Carpenter (2):
      crypto: qat/qat_420xx - fix off by one in uof_get_name()
      crypto: qat/qat_4xxx - fix off by one in uof_get_name()

Danny Tsen (3):
      crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation
      crypto: powerpc/p10-aes-gcm - Register modules as SIMD
      crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMDand re-enable CRYPTO_AES_GCM_P10

Dr. David Alan Gilbert (3):
      crypto: qat - remove unused adf_devmgr_get_first
      crypto: x86/cast5 - Remove unused cast5_ctr_16way
      crypto: asymmetric_keys - Remove unused functions

Eric Biggers (14):
      crypto: x86/crc32c - simplify code for handling fewer than 200 bytes
      crypto: x86/crc32c - access 32-bit arguments as 32-bit
      crypto: x86/crc32c - eliminate jump table and excessive unrolling
      crypto: x86/aegis128 - access 32-bit arguments as 32-bit
      crypto: x86/aegis128 - remove no-op init and exit functions
      crypto: x86/aegis128 - eliminate some indirect calls
      crypto: x86/aegis128 - don't bother with special code for aligned data
      crypto: x86/aegis128 - optimize length block preparation using SSE4.1
      crypto: x86/aegis128 - improve assembly function prototypes
      crypto: x86/aegis128 - optimize partial block handling using SSE4.1
      crypto: x86/aegis128 - take advantage of block-aligned len
      crypto: x86/aegis128 - remove unneeded FRAME_BEGIN and FRAME_END
      crypto: x86/aegis128 - remove unneeded RETs
      crypto: api - move crypto_simd_disabled_for_test to lib

Everest K.C (1):
      crypto: cavium - Fix the if condition to exit loop after timeout

Fabio Estevam (1):
      dt-bindings: imx-rng: Allow passing only "fsl,imx31-rnga"

Gatien Chevallier (3):
      dt-bindings: rng: add st,stm32mp25-rng support
      hwrng: stm32 - implement support for STM32MP25x platforms
      hwrng: stm32 - update STM32MP15 RNG max clock frequency

Herbert Xu (3):
      hwrng: core - Add WARN_ON for buggy read return values
      crypto: lib/mpi - Export mpi_set_bit
      crypto: aesni - Move back to module_init

Joachim Vandersmissen (1):
      crypto: jitter - output full sample from test interface

Karol Przybylski (1):
      crypto: marvell/cesa - fix uninit value for struct mv_cesa_op_ctx

Li Huafei (1):
      crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()

Linus Walleij (1):
      hwrng: iproc-r200 - enable on BCMBCA

Lukas Bulwahn (1):
      hwrng: amd - remove reference to removed PPC_MAPLE config

Lukas Wunner (23):
      crypto: ecdsa - Drop unused test vector elements
      crypto: sig - Introduce sig_alg backend
      crypto: ecdsa - Migrate to sig_alg backend
      crypto: ecrdsa - Migrate to sig_alg backend
      crypto: rsa-pkcs1pad - Deduplicate set_{pub,priv}_key callbacks
      crypto: rsassa-pkcs1 - Migrate to sig_alg backend
      crypto: rsassa-pkcs1 - Harden digest length verification
      crypto: rsassa-pkcs1 - Avoid copying hash prefix
      crypto: virtio - Drop sign/verify operations
      crypto: drivers - Drop sign/verify operations
      crypto: akcipher - Drop sign/verify operations
      crypto: sig - Move crypto_sig_*() API calls to include file
      ASN.1: Clean up include statements in public headers
      crypto: ecdsa - Avoid signed integer overflow on signature decoding
      crypto: ecdsa - Move X9.62 signature decoding into template
      crypto: sig - Rename crypto_sig_maxsize() to crypto_sig_keysize()
      crypto: ecdsa - Move X9.62 signature size calculation into template
      crypto: ecdsa - Support P1363 signature decoding
      crypto: ecrdsa - Fix signature size calculation
      crypto: doc - Fix akcipher title reference
      crypto: sig - Fix oops on KEYCTL_PKEY_QUERY for RSA keys
      crypto: ecdsa - Update Kconfig help text for NIST P521
      crypto: rsassa-pkcs1 - Reinstate support for legacy protocols

Markus Mayer (2):
      dt-bindings: rng: add binding for BCM74110 RNG
      hwrng: bcm74110 - Add Broadcom BCM74110 RNG driver

Michal Suchanek (1):
      crypto: aes-gcm-p10 - Use the correct bit to test for P10

Ovidiu Panait (2):
      crypto: tegra - remove unneeded crypto_engine_stop() call
      crypto: starfive - remove unneeded crypto_engine_stop() call

Qi Tao (1):
      crypto: hisilicon - support querying the capability register

Qianqiang Liu (1):
      crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue

Rob Herring (Arm) (1):
      dt-bindings: rng: Add Marvell Armada RNG support

Rosen Penev (6):
      crypto: cesa - add COMPILE_TEST
      crypto: cesa - use enabled variants for clk_get
      crypto: cesa - remove irq_set_affinity_hint
      crypto: cesa - use devm_platform_get_and_ioremap_resource
      crypto: crypto4xx - avoid explicit resource
      crypto: crypto4xx - use devm in probe

Shen Lichuan (1):
      crypto: drivers - Correct multiple typos in comments

Tang Bin (1):
      crypto: amlogic - Remove redundant assignment and error messages

Thorsten Blum (1):
      crypto: drbg - Use str_true_false() and str_enabled_disabled() helpers

Tomas Paukrt (1):
      crypto: mxs-dcp - Fix AES-CBC with hardware-bound keys

Uwe Kleine-König (3):
      crypto: atmel - Drop explicit initialization of struct i2c_device_id::driver_data to 0
      crypto: drivers - Switch back to struct platform_driver::remove()
      hwrng: drivers - Switch back to struct platform_driver::remove()

Vishal Chourasia (2):
      crypto: nx - Rename devdata_mutex to devdata_spinlock
      crypto: nx - Fix invalid wait context during kexec reboot

Wang Hai (1):
      crypto: qat - Fix missing destroy_workqueue in adf_init_aer()

WangYuli (1):
      crypto: qat - Fix typo "accelaration"

Weili Qian (2):
      crypto: hisilicon/hpre - enable all clusters clock gating
      crypto: hisilicon/qm - disable same error report before resetting

Yi Yang (1):
      crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY

Yu Jiaoliang (1):
      crypto: ccree - Fix typo in comment

Yuvaraj Ranganathan (1):
      dt-bindings: crypto: qcom-qce: document the SA8775P crypto engine

Zanussi, Tom (2):
      crypto: iaa - Remove potential infinite loop in check_completion()
      MAINTAINERS: Make Kristen Accardi the IAA crypto driver maintainer

Zhu Jun (1):
      hwrng: histb - Fix the wrong format specifier

Zicheng Qu (1):
      padata: Clean up in padata_do_multithreaded()

 Documentation/ABI/testing/debugfs-hisi-hpre        |    7 +
 Documentation/ABI/testing/debugfs-hisi-sec         |    7 +
 Documentation/ABI/testing/debugfs-hisi-zip         |    7 +
 Documentation/crypto/api-akcipher.rst              |    4 +-
 Documentation/crypto/api-sig.rst                   |   15 +
 Documentation/crypto/api.rst                       |    1 +
 Documentation/crypto/architecture.rst              |    2 +
 .../devicetree/bindings/crypto/qcom-qce.yaml       |    1 +
 .../bindings/rng/airoha,en7581-trng.yaml           |   38 +
 .../devicetree/bindings/rng/brcm,bcm74110-rng.yaml |   35 +
 Documentation/devicetree/bindings/rng/imx-rng.yaml |    2 +-
 ..._rng.yaml => inside-secure,safexcel-eip76.yaml} |   17 +-
 .../devicetree/bindings/rng/st,stm32-rng.yaml      |   28 +-
 MAINTAINERS                                        |    2 +-
 arch/arm/crypto/crct10dif-ce-core.S                |  249 +-
 arch/arm/crypto/crct10dif-ce-glue.c                |   55 +-
 arch/arm64/crypto/crct10dif-ce-core.S              |  331 ++-
 arch/arm64/crypto/crct10dif-ce-glue.c              |   44 +-
 arch/powerpc/crypto/Kconfig                        |    2 +-
 arch/powerpc/crypto/aes-gcm-p10-glue.c             |  141 +-
 arch/powerpc/crypto/aes-gcm-p10.S                  | 2481 +++++++++-----------
 arch/x86/crypto/Kconfig                            |    4 +-
 arch/x86/crypto/aegis128-aesni-asm.S               |  516 ++--
 arch/x86/crypto/aegis128-aesni-glue.c              |  145 +-
 arch/x86/crypto/aesni-intel_glue.c                 |    2 +-
 arch/x86/crypto/cast5-avx-x86_64-asm_64.S          |   76 -
 arch/x86/crypto/crc32c-intel_glue.c                |    2 +-
 arch/x86/crypto/crc32c-pcl-intel-asm_64.S          |  348 +--
 crypto/Kconfig                                     |    7 +-
 crypto/Makefile                                    |    7 +-
 crypto/akcipher.c                                  |   64 +-
 crypto/algapi.c                                    |    6 -
 crypto/asymmetric_keys/public_key.c                |   58 +-
 crypto/asymmetric_keys/signature.c                 |   63 -
 crypto/crc32_generic.c                             |   94 +-
 crypto/crc32c_generic.c                            |   94 +-
 crypto/drbg.c                                      |    5 +-
 crypto/ecdsa-p1363.c                               |  159 ++
 crypto/ecdsa-x962.c                                |  237 ++
 crypto/ecdsa.c                                     |  209 +-
 crypto/ecrdsa.c                                    |   64 +-
 crypto/internal.h                                  |   19 -
 crypto/jitterentropy-testing.c                     |   31 +-
 crypto/jitterentropy.h                             |    4 +-
 crypto/pcrypt.c                                    |   12 +-
 crypto/rsa-pkcs1pad.c                              |  369 +--
 crypto/rsa.c                                       |   17 +-
 crypto/rsassa-pkcs1.c                              |  454 ++++
 crypto/sig.c                                       |  149 +-
 crypto/testmgr.c                                   |  332 ++-
 crypto/testmgr.h                                   | 1225 +++++++---
 drivers/char/hw_random/Kconfig                     |   30 +-
 drivers/char/hw_random/Makefile                    |    2 +
 drivers/char/hw_random/airoha-trng.c               |  243 ++
 drivers/char/hw_random/atmel-rng.c                 |    2 +-
 drivers/char/hw_random/bcm74110-rng.c              |  125 +
 drivers/char/hw_random/cctrng.c                    |    2 +-
 drivers/char/hw_random/core.c                      |   11 +-
 drivers/char/hw_random/exynos-trng.c               |    2 +-
 drivers/char/hw_random/histb-rng.c                 |    2 +-
 drivers/char/hw_random/ingenic-rng.c               |    2 +-
 drivers/char/hw_random/ks-sa-rng.c                 |    2 +-
 drivers/char/hw_random/mxc-rnga.c                  |    2 +-
 drivers/char/hw_random/n2-drv.c                    |    2 +-
 drivers/char/hw_random/npcm-rng.c                  |    2 +-
 drivers/char/hw_random/omap-rng.c                  |    2 +-
 drivers/char/hw_random/stm32-rng.c                 |   78 +-
 drivers/char/hw_random/timeriomem-rng.c            |    2 +-
 drivers/char/hw_random/xgene-rng.c                 |    2 +-
 drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c  |    2 +-
 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c  |    2 +-
 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c  |    2 +-
 drivers/crypto/amcc/crypto4xx_core.c               |   58 +-
 drivers/crypto/amlogic/amlogic-gxl-core.c          |   10 +-
 drivers/crypto/aspeed/aspeed-acry.c                |    4 +-
 drivers/crypto/aspeed/aspeed-hace.c                |    2 +-
 drivers/crypto/atmel-aes.c                         |    2 +-
 drivers/crypto/atmel-ecc.c                         |    2 +-
 drivers/crypto/atmel-sha.c                         |    2 +-
 drivers/crypto/atmel-sha204a.c                     |    4 +-
 drivers/crypto/atmel-tdes.c                        |    4 +-
 drivers/crypto/axis/artpec6_crypto.c               |    2 +-
 drivers/crypto/bcm/cipher.c                        |    7 +-
 drivers/crypto/caam/caampkc.c                      |   11 +-
 drivers/crypto/caam/jr.c                           |    2 +-
 drivers/crypto/caam/qi.c                           |    7 +-
 drivers/crypto/cavium/cpt/cptpf_main.c             |    6 +-
 drivers/crypto/cavium/cpt/cptvf_reqmanager.c       |    4 +-
 drivers/crypto/cavium/nitrox/nitrox_lib.c          |    2 +-
 drivers/crypto/ccp/sp-platform.c                   |    2 +-
 drivers/crypto/ccree/cc_aead.c                     |    4 +-
 drivers/crypto/ccree/cc_cipher.c                   |    2 +-
 drivers/crypto/ccree/cc_driver.c                   |    2 +-
 drivers/crypto/ccree/cc_hash.c                     |    2 +-
 drivers/crypto/chelsio/chcr_algo.c                 |    2 +-
 drivers/crypto/exynos-rng.c                        |    2 +-
 drivers/crypto/gemini/sl3516-ce-core.c             |    2 +-
 drivers/crypto/hisilicon/hpre/hpre.h               |   23 +
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |    2 -
 drivers/crypto/hisilicon/hpre/hpre_main.c          |  190 +-
 drivers/crypto/hisilicon/qm.c                      |  166 +-
 drivers/crypto/hisilicon/sec/sec_drv.c             |    2 +-
 drivers/crypto/hisilicon/sec2/sec.h                |   26 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |    8 +-
 drivers/crypto/hisilicon/sec2/sec_main.c           |  108 +-
 drivers/crypto/hisilicon/trng/trng.c               |    2 +-
 drivers/crypto/hisilicon/zip/zip.h                 |   18 +
 drivers/crypto/hisilicon/zip/zip_main.c            |  153 +-
 drivers/crypto/img-hash.c                          |    2 +-
 drivers/crypto/inside-secure/safexcel.c            |    2 +-
 drivers/crypto/inside-secure/safexcel_hash.c       |    2 +-
 drivers/crypto/intel/iaa/iaa_crypto_main.c         |   10 +
 drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c        |    2 +-
 .../crypto/intel/keembay/keembay-ocs-aes-core.c    |    2 +-
 drivers/crypto/intel/keembay/keembay-ocs-ecc.c     |    2 +-
 .../crypto/intel/keembay/keembay-ocs-hcu-core.c    |    2 +-
 .../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c |    2 +-
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |    2 +-
 drivers/crypto/intel/qat/qat_common/adf_aer.c      |    5 +-
 .../crypto/intel/qat/qat_common/adf_common_drv.h   |    1 -
 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c    |   13 +-
 drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c  |   10 -
 .../intel/qat/qat_common/adf_gen4_pm_debugfs.c     |   18 +-
 .../crypto/intel/qat/qat_common/adf_hw_arbiter.c   |    4 -
 drivers/crypto/intel/qat/qat_common/qat_hal.c      |    2 +-
 drivers/crypto/marvell/Kconfig                     |    2 +-
 drivers/crypto/marvell/cesa/cesa.c                 |   54 +-
 drivers/crypto/marvell/cesa/cipher.c               |   24 +-
 drivers/crypto/mxs-dcp.c                           |   22 +-
 drivers/crypto/n2_core.c                           |    4 +-
 drivers/crypto/nx/nx-common-pseries.c              |   37 +-
 drivers/crypto/omap-aes.c                          |    2 +-
 drivers/crypto/omap-des.c                          |    2 +-
 drivers/crypto/omap-sham.c                         |    2 +-
 drivers/crypto/qce/core.c                          |    2 +-
 drivers/crypto/qcom-rng.c                          |    2 +-
 drivers/crypto/rockchip/rk3288_crypto.c            |    2 +-
 drivers/crypto/s5p-sss.c                           |    2 +-
 drivers/crypto/sa2ul.c                             |    4 +-
 drivers/crypto/sahara.c                            |    2 +-
 drivers/crypto/starfive/jh7110-cryp.c              |    7 +-
 drivers/crypto/starfive/jh7110-rsa.c               |    2 -
 drivers/crypto/stm32/stm32-crc32.c                 |    2 +-
 drivers/crypto/stm32/stm32-cryp.c                  |    2 +-
 drivers/crypto/stm32/stm32-hash.c                  |    2 +-
 drivers/crypto/talitos.c                           |    2 +-
 drivers/crypto/tegra/tegra-se-aes.c                |    2 -
 drivers/crypto/tegra/tegra-se-main.c               |    4 +-
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |   65 +-
 drivers/crypto/xilinx/zynqmp-aes-gcm.c             |    2 +-
 drivers/crypto/xilinx/zynqmp-sha.c                 |    2 +-
 include/crypto/akcipher.h                          |   69 +-
 include/crypto/internal/akcipher.h                 |    4 +-
 include/crypto/internal/ecc.h                      |   14 +
 include/crypto/internal/rsa.h                      |   29 +
 include/crypto/internal/sig.h                      |   80 +
 include/crypto/public_key.h                        |    3 -
 include/crypto/sig.h                               |  152 +-
 include/linux/asn1_decoder.h                       |    1 +
 include/linux/asn1_encoder.h                       |    1 -
 include/linux/hisi_acc_qm.h                        |   56 +-
 include/linux/slab.h                               |    1 +
 include/uapi/linux/cryptouser.h                    |    5 +
 include/uapi/linux/virtio_crypto.h                 |    1 +
 kernel/padata.c                                    |    7 -
 lib/crc32.c                                        |    4 +
 lib/crypto/Makefile                                |    2 +
 lib/crypto/mpi/mpi-bit.c                           |    1 +
 lib/crypto/mpi/mpi-mul.c                           |    2 +-
 lib/crypto/simd.c                                  |   11 +
 security/integrity/ima/ima_main.c                  |    6 +-
 171 files changed, 6125 insertions(+), 4265 deletions(-)
 create mode 100644 Documentation/crypto/api-sig.rst
 create mode 100644 Documentation/devicetree/bindings/rng/airoha,en7581-trng.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/brcm,bcm74110-rng.yaml
 rename Documentation/devicetree/bindings/rng/{omap_rng.yaml => inside-secure,safexcel-eip76.yaml} (79%)
 create mode 100644 crypto/ecdsa-p1363.c
 create mode 100644 crypto/ecdsa-x962.c
 create mode 100644 crypto/rsassa-pkcs1.c
 create mode 100644 drivers/char/hw_random/airoha-trng.c
 create mode 100644 drivers/char/hw_random/bcm74110-rng.c
 create mode 100644 lib/crypto/simd.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.13
  2024-11-18  3:18                                                       ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
@ 2024-11-19 19:06                                                         ` pr-tracker-bot
  2025-01-23 11:10                                                         ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-11-19 19:06 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Mon, 18 Nov 2024 11:18:25 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/02b2f1a7b8ef340e57cae640a52ec7199b0b887d

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.13
  2024-09-23  3:08                                                     ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
  2024-09-24 18:04                                                       ` pr-tracker-bot
  2024-10-16  5:37                                                       ` Herbert Xu
@ 2024-12-14  9:21                                                       ` Herbert Xu
  2024-12-14 17:18                                                         ` pr-tracker-bot
  2025-03-31  4:50                                                         ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-12-14  9:21 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit fac04efc5c793dccbd07e2d59af9f90b7fc0dca4:

  Linux 6.13-rc2 (2024-12-08 14:03:39 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p2 

for you to fetch changes up to cd26cd65476711e2c69e0a049c0eeef4b743f5ac:

  crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem (2024-12-10 13:40:25 +0800)

----------------------------------------------------------------
This push fixes a regression in rsassa-pkcs1 as well as a buffer
overrun in hisilicon/debugfs.
----------------------------------------------------------------

Chenghai Huang (1):
      crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem

Herbert Xu (1):
      crypto: rsassa-pkcs1 - Copy source data for SG list

 crypto/rsassa-pkcs1.c              | 45 ++++++++++++--------------------------
 drivers/crypto/hisilicon/debugfs.c |  4 ++--
 2 files changed, 16 insertions(+), 33 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.13
  2024-12-14  9:21                                                       ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
@ 2024-12-14 17:18                                                         ` pr-tracker-bot
  2025-03-31  4:50                                                         ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-12-14 17:18 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sat, 14 Dec 2024 17:21:16 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p2

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ec2092915d60df2700f7062f171a7fbbad93166b

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.14
  2024-11-18  3:18                                                       ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
  2024-11-19 19:06                                                         ` pr-tracker-bot
@ 2025-01-23 11:10                                                         ` Herbert Xu
  2025-01-24 16:05                                                           ` pr-tracker-bot
  2025-03-25  5:53                                                           ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-01-23 11:10 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit cd26cd65476711e2c69e0a049c0eeef4b743f5ac:

  crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem (2024-12-10 13:40:25 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.14-p1 

for you to fetch changes up to 9d4f8e54cef2c42e23ef258833dbd06a1eaff89b:

  rhashtable: Fix rhashtable_try_insert test (2025-01-19 12:44:28 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Remove physical address skcipher walking.
- Fix boot-up self-test race.

Algorithms:

- Optimisations for x86/aes-gcm.
- Optimisations for x86/aes-xts.
- Remove VMAC.
- Remove keywrap.

Drivers:

- Remove n2.

Others:

- Fixes for padata UAF.
- Fix potential rhashtable deadlock by moving schedule_work outside lock.
----------------------------------------------------------------

Bartosz Golaszewski (9):
      crypto: qce - fix goto jump in error path
      crypto: qce - unregister previously registered algos in error path
      crypto: qce - remove unneeded call to icc_set_bw() in error path
      crypto: qce - shrink code with devres clk helpers
      crypto: qce - convert qce_dma_request() to use devres
      crypto: qce - make qce_register_algs() a managed interface
      crypto: qce - use __free() for a buffer that's always freed
      crypto: qce - convert tasklet to workqueue
      crypto: qce - switch to using a mutex

Breno Leitao (1):
      rhashtable: Fix potential deadlock by moving schedule_work outside lock

Chen Ridong (4):
      crypto: tegra - do not transfer req when tegra init fails
      padata: add pd get/put refcnt helper
      padata: fix UAF in padata_reorder
      padata: avoid UAF for reorder_work

Dr. David Alan Gilbert (2):
      crypto: lib/gf128mul - Remove some bbe deadcode
      crypto: asymmetric_keys - Remove unused key_being_used_for[]

Eric Biggers (32):
      crypto: qce - fix priority to be less than ARMv8 CE
      crypto: n2 - remove Niagara2 SPU driver
      crypto: skcipher - remove support for physical address walks
      crypto: anubis - stop using cra_alignmask
      crypto: aria - stop using cra_alignmask
      crypto: tea - stop using cra_alignmask
      crypto: khazad - stop using cra_alignmask
      crypto: seed - stop using cra_alignmask
      crypto: x86 - remove assignments of 0 to cra_alignmask
      crypto: aegis - remove assignments of 0 to cra_alignmask
      crypto: keywrap - remove assignment of 0 to cra_alignmask
      crypto: x86/aes-gcm - code size optimization
      crypto: x86/aes-gcm - tune better for AMD CPUs
      crypto: x86/aes-xts - use .irp when useful
      crypto: x86/aes-xts - make the register aliases per-function
      crypto: x86/aes-xts - improve some comments
      crypto: x86/aes-xts - change len parameter to int
      crypto: x86/aes-xts - more code size optimizations
      crypto: x86/aes-xts - additional optimizations
      crypto: vmac - remove unused VMAC algorithm
      crypto: keywrap - remove unused keywrap algorithm
      crypto: ahash - make hash walk functions private to ahash.c
      crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
      crypto: omap - switch from scatter_walk to plain offset
      crypto: skcipher - document skcipher_walk_done() and rename some vars
      crypto: skcipher - remove unnecessary page alignment of bounce buffer
      crypto: skcipher - remove redundant clamping to page size
      crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
      crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
      crypto: skcipher - clean up initialization of skcipher_walk::flags
      crypto: skcipher - optimize initializing skcipher_walk fields
      crypto: skcipher - call cond_resched() directly

Gaurav Jain (1):
      crypto: caam - use JobR's space to access page 0 regs

Gaurav Kashyap (3):
      dt-bindings: crypto: qcom-qce: Document the SM8750 crypto engine
      dt-bindings: crypto: qcom,prng: Document SM8750 RNG
      dt-bindings: crypto: qcom,inline-crypto-engine: Document the SM8750 ICE

Herbert Xu (6):
      crypto: api - Fix boot-up self-test race
      crypto: api - Call crypto_schedule_test outside of mutex
      MAINTAINERS: Move rhashtable over to linux-crypto
      crypto: sig - Set maskset to CRYPTO_ALG_TYPE_MASK
      crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
      rhashtable: Fix rhashtable_try_insert test

Joe Hattori (1):
      crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto()

Kanchana P Sridhar (1):
      crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async'

Krzysztof Kozlowski (1):
      crypto: bcm - Drop unused setting of local 'ptr' variable

Mario Limonciello (1):
      crypto: ccp - Use scoped guard for mutex

Md Sadre Alam (1):
      dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322

Nathan Chancellor (1):
      crypto: qce - revert "use __free() for a buffer that's always freed"

Thomas Weißschuh (1):
      padata: fix sysfs store callback check

Thorsten Blum (2):
      crypto: fips - Use str_enabled_disabled() helper in fips_enable()
      crypto: proc - Use str_yes_no() and str_no_yes() helpers

Weili Qian (2):
      crypto: hisilicon/zip - add data aggregation feature
      crypto: hisilicon/zip - support new error report

Wenkai Lin (2):
      crypto: hisilicon/sec2 - fix for aead icv error
      crypto: hisilicon/sec2 - fix for aead invalid authsize

Yang Shen (1):
      crypto: hisilicon/qm - support new function communication

Yuvaraj Ranganathan (3):
      dt-bindings: crypto: qcom,prng: document QCS8300
      dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
      dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine

 .../bindings/crypto/qcom,inline-crypto-engine.yaml |    2 +
 .../devicetree/bindings/crypto/qcom,prng.yaml      |    5 +
 .../devicetree/bindings/crypto/qcom-qce.yaml       |    2 +
 Documentation/driver-api/crypto/iaa/iaa-crypto.rst |    9 +-
 MAINTAINERS                                        |    2 +-
 arch/arm/configs/pxa_defconfig                     |    1 -
 arch/loongarch/configs/loongson3_defconfig         |    1 -
 arch/m68k/configs/amiga_defconfig                  |    2 -
 arch/m68k/configs/apollo_defconfig                 |    2 -
 arch/m68k/configs/atari_defconfig                  |    2 -
 arch/m68k/configs/bvme6000_defconfig               |    2 -
 arch/m68k/configs/hp300_defconfig                  |    2 -
 arch/m68k/configs/mac_defconfig                    |    2 -
 arch/m68k/configs/multi_defconfig                  |    2 -
 arch/m68k/configs/mvme147_defconfig                |    2 -
 arch/m68k/configs/mvme16x_defconfig                |    2 -
 arch/m68k/configs/q40_defconfig                    |    2 -
 arch/m68k/configs/sun3_defconfig                   |    2 -
 arch/m68k/configs/sun3x_defconfig                  |    2 -
 arch/mips/configs/bigsur_defconfig                 |    1 -
 arch/mips/configs/decstation_64_defconfig          |    2 -
 arch/mips/configs/decstation_defconfig             |    2 -
 arch/mips/configs/decstation_r4k_defconfig         |    2 -
 arch/mips/configs/ip27_defconfig                   |    1 -
 arch/mips/configs/ip30_defconfig                   |    1 -
 arch/powerpc/crypto/aes-gcm-p10-glue.c             |    9 +-
 arch/s390/configs/debug_defconfig                  |    2 -
 arch/s390/configs/defconfig                        |    2 -
 arch/x86/crypto/aegis128-aesni-glue.c              |    1 -
 arch/x86/crypto/aes-gcm-avx10-x86_64.S             |  119 +-
 arch/x86/crypto/aes-xts-avx-x86_64.S               |  329 +--
 arch/x86/crypto/aesni-intel_glue.c                 |   10 +-
 arch/x86/crypto/blowfish_glue.c                    |    1 -
 arch/x86/crypto/camellia_glue.c                    |    1 -
 arch/x86/crypto/des3_ede_glue.c                    |    1 -
 arch/x86/crypto/twofish_glue.c                     |    1 -
 crypto/Kconfig                                     |   18 -
 crypto/Makefile                                    |    2 -
 crypto/aegis128-core.c                             |    2 -
 crypto/ahash.c                                     |  158 +-
 crypto/algapi.c                                    |   31 +-
 crypto/anubis.c                                    |   14 +-
 crypto/aria_generic.c                              |   37 +-
 crypto/asymmetric_keys/asymmetric_type.c           |   10 -
 crypto/fips.c                                      |    4 +-
 crypto/keywrap.c                                   |  320 ---
 crypto/khazad.c                                    |   17 +-
 crypto/proc.c                                      |    9 +-
 crypto/seed.c                                      |   48 +-
 crypto/sig.c                                       |    4 +-
 crypto/skcipher.c                                  |  367 +---
 crypto/tcrypt.c                                    |    4 -
 crypto/tea.c                                       |   83 +-
 crypto/testmgr.c                                   |   26 +-
 crypto/testmgr.h                                   |  192 --
 crypto/vmac.c                                      |  696 -------
 drivers/crypto/Kconfig                             |   17 -
 drivers/crypto/Makefile                            |    2 -
 drivers/crypto/bcm/spu.c                           |    7 +-
 drivers/crypto/caam/blob_gen.c                     |    3 +-
 drivers/crypto/ccp/dbc.c                           |   53 +-
 drivers/crypto/hisilicon/hpre/hpre_main.c          |   13 +-
 drivers/crypto/hisilicon/qm.c                      |  291 ++-
 drivers/crypto/hisilicon/sec2/sec.h                |    3 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.c         |  157 +-
 drivers/crypto/hisilicon/sec2/sec_crypto.h         |   11 -
 drivers/crypto/hisilicon/sec2/sec_main.c           |   13 +-
 drivers/crypto/hisilicon/zip/Makefile              |    2 +-
 drivers/crypto/hisilicon/zip/dae_main.c            |  262 +++
 drivers/crypto/hisilicon/zip/zip.h                 |    8 +
 drivers/crypto/hisilicon/zip/zip_main.c            |   52 +-
 drivers/crypto/intel/iaa/iaa_crypto_main.c         |    2 +-
 drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c        |    3 +
 drivers/crypto/n2_asm.S                            |   96 -
 drivers/crypto/n2_core.c                           | 2168 --------------------
 drivers/crypto/n2_core.h                           |  232 ---
 drivers/crypto/omap-aes.c                          |   34 +-
 drivers/crypto/omap-aes.h                          |    6 +-
 drivers/crypto/omap-des.c                          |   40 +-
 drivers/crypto/qce/aead.c                          |    2 +-
 drivers/crypto/qce/core.c                          |  131 +-
 drivers/crypto/qce/core.h                          |    9 +-
 drivers/crypto/qce/dma.c                           |   22 +-
 drivers/crypto/qce/dma.h                           |    3 +-
 drivers/crypto/qce/sha.c                           |    2 +-
 drivers/crypto/qce/skcipher.c                      |    2 +-
 drivers/crypto/tegra/tegra-se-aes.c                |    7 +-
 drivers/crypto/tegra/tegra-se-hash.c               |    7 +-
 include/crypto/gf128mul.h                          |    6 +-
 include/crypto/internal/hash.h                     |   23 -
 include/crypto/internal/skcipher.h                 |   14 +-
 include/linux/hisi_acc_qm.h                        |    8 +
 include/linux/verification.h                       |    2 -
 kernel/padata.c                                    |   45 +-
 lib/crypto/aesgcm.c                                |    2 +-
 lib/crypto/gf128mul.c                              |   75 -
 lib/rhashtable.c                                   |   12 +-
 97 files changed, 1359 insertions(+), 5061 deletions(-)
 delete mode 100644 crypto/keywrap.c
 delete mode 100644 crypto/vmac.c
 create mode 100644 drivers/crypto/hisilicon/zip/dae_main.c
 delete mode 100644 drivers/crypto/n2_asm.S
 delete mode 100644 drivers/crypto/n2_core.c
 delete mode 100644 drivers/crypto/n2_core.h

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.14
  2025-01-23 11:10                                                         ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
@ 2025-01-24 16:05                                                           ` pr-tracker-bot
  2025-03-25  5:53                                                           ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-01-24 16:05 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 23 Jan 2025 19:10:34 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.14-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/454cb97726fe62a04b187a0d631ec0a69f6b713a

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Update for 6.15
  2025-01-23 11:10                                                         ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
  2025-01-24 16:05                                                           ` pr-tracker-bot
@ 2025-03-25  5:53                                                           ` Herbert Xu
  2025-03-25 15:25                                                             ` Eric Biggers
  2025-03-29 18:24                                                             ` pr-tracker-bot
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-03-25  5:53 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 2014c95afecee3e76ca4a56956a936e23283f05b:

  Linux 6.14-rc1 (2025-02-02 15:39:26 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.15-p1 

for you to fetch changes up to 99585c2192cb1ce212876e82ef01d1c98c7f4699:

  crypto: testmgr - Add multibuffer acomp testing (2025-03-22 07:25:19 +0800)

----------------------------------------------------------------
This update includes the following changes:

API:

- Remove legacy compression interface.
- Improve scatterwalk API.
- Add request chaining to ahash and acomp.
- Add virtual address support to ahash and acomp.
- Add folio support to acomp.
- Remove NULL dst support from acomp.

Algorithms:

- Library options are fuly hidden (selected by kernel users only).
- Add Kerberos5 algorithms.
- Add VAES-based ctr(aes) on x86.
- Ensure LZO respects output buffer length on compression.
- Remove obsolete SIMD fallback code path from arm/ghash-ce.

Drivers:

- Add support for PCI device 0x1134 in ccp.
- Add support for rk3588's standalone TRNG in rockchip.
- Add Inside Secure SafeXcel EIP-93 crypto engine support in eip93.
- Fix bugs in tegra uncovered by multi-threaded self-test.
- Fix corner cases in hisilicon/sec2.

Others:

- Add SG_MITER_LOCAL to sg miter.
- Convert ubifs, hibernate and xfrm_ipcomp from legacy API to acomp.
----------------------------------------------------------------

Abel Vesa (1):
      dt-bindings: crypto: qcom-qce: Document the X1E80100 crypto engine

Abhinaba Rakshit (1):
      dt-bindings: crypto: qcom,prng: document QCS615

Akhil R (10):
      crypto: tegra - Use separate buffer for setkey
      crypto: tegra - Do not use fixed size buffers
      crypto: tegra - finalize crypto req on error
      crypto: tegra - check return value for hash do_one_req
      crypto: tegra - Transfer HASH init function to crypto engine
      crypto: tegra - Fix HASH intermediate result handling
      crypto: tegra - Fix CMAC intermediate result handling
      crypto: tegra - Set IV to NULL explicitly for AES ECB
      crypto: tegra - Reserve keyslots to allocate dynamically
      crypto: tegra - Use HMAC fallback when keyslots are full

Ard Biesheuvel (12):
      crypto: lib/chachapoly - Drop dependency on CRYPTO_ALGAPI
      crypto: nx - Migrate to scomp API
      crypto: 842 - drop obsolete 'comp' implementation
      crypto: deflate - drop obsolete 'comp' implementation
      crypto: lz4 - drop obsolete 'comp' implementation
      crypto: lz4hc - drop obsolete 'comp' implementation
      crypto: lzo-rle - drop obsolete 'comp' implementation
      crypto: lzo - drop obsolete 'comp' implementation
      crypto: zstd - drop obsolete 'comp' implementation
      crypto: cavium/zip - drop obsolete 'comp' implementation
      crypto: compress_null - drop obsolete 'comp' implementation
      crypto: remove obsolete 'comp' compression API

Arnd Bergmann (2):
      crypto: bpf - Add MODULE_DESCRIPTION for skcipher
      crypto: lib/Kconfig - hide library options

Bairavi Alagappan (2):
      crypto: qat - set parity error mask for qat_420xx
      crypto: qat - remove access to parity register for QAT GEN4

Christian Marangi (4):
      spinlock: extend guard with spinlock_bh variants
      dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
      crypto: eip93 - Add Inside Secure SafeXcel EIP-93 crypto engine support
      crypto: inside-secure/eip93 - Correctly handle return of for sg_nents_for_len

Christophe JAILLET (1):
      crypto: virtio - Erase some sensitive memory when it is freed

David Howells (17):
      crypto/krb5: Add API Documentation
      crypto/krb5: Add some constants out of sunrpc headers
      crypto: Add 'krb5enc' hash and cipher AEAD algorithm
      crypto/krb5: Test manager data
      crypto/krb5: Implement Kerberos crypto core
      crypto/krb5: Add an API to query the layout of the crypto section
      crypto/krb5: Add an API to alloc and prepare a crypto object
      crypto/krb5: Add an API to perform requests
      crypto/krb5: Provide infrastructure and key derivation
      crypto/krb5: Implement the Kerberos5 rfc3961 key derivation
      crypto/krb5: Provide RFC3961 setkey packaging functions
      crypto/krb5: Implement the Kerberos5 rfc3961 encrypt and decrypt functions
      crypto/krb5: Implement the Kerberos5 rfc3961 get_mic and verify_mic
      crypto/krb5: Implement the AES enctypes from rfc3962
      crypto/krb5: Implement the AES enctypes from rfc8009
      crypto/krb5: Implement the Camellia enctypes from rfc6803
      crypto/krb5: Implement crypto self-testing

David Sterba (1):
      MAINTAINERS: add myself to co-maintain ZSTD

Devaraj Rangasamy (1):
      crypto: ccp - Add support for PCI device 0x1134

Dionna Glaze (1):
      crypto: ccp - Fix uAPI definitions of PSP errors

Dr. David Alan Gilbert (3):
      crypto: octeontx2 - Remove unused otx2_cpt_print_uc_dbg_info
      crypto: octeontx - Remove unused function otx_cpt_eng_grp_has_eng_type
      async_xor: Remove unused 'async_xor_val'

Dragan Simic (2):
      hwrng: Kconfig - Use tabs as leading whitespace consistently in Kconfig
      hwrng: Kconfig - Move one "tristate" Kconfig description to the usual place

Eric Biggers (25):
      crypto: x86/aes-xts - make the fast path 64-bit specific
      crypto: x86/aes-ctr - rewrite AESNI+AVX optimized CTR and add VAES support
      crypto: x86/aes-xts - change license to Apache-2.0 OR BSD-2-Clause
      crypto: scatterwalk - move to next sg entry just in time
      crypto: scatterwalk - add new functions for skipping data
      crypto: scatterwalk - add new functions for iterating through data
      crypto: scatterwalk - add new functions for copying data
      crypto: scatterwalk - add scatterwalk_get_sglist()
      crypto: skcipher - use scatterwalk_start_at_pos()
      crypto: aegis - use the new scatterwalk functions
      crypto: arm/ghash - use the new scatterwalk functions
      crypto: arm64 - use the new scatterwalk functions
      crypto: nx - use the new scatterwalk functions
      crypto: s390/aes-gcm - use the new scatterwalk functions
      crypto: s5p-sss - use the new scatterwalk functions
      crypto: stm32 - use the new scatterwalk functions
      crypto: x86/aes-gcm - use the new scatterwalk functions
      crypto: x86/aegis - use the new scatterwalk functions
      net/tls: use the new scatterwalk functions
      crypto: skcipher - use the new scatterwalk functions
      crypto: scatterwalk - remove obsolete functions
      crypto: scatterwalk - don't split at page boundaries when !HIGHMEM
      crypto: skcipher - fix mismatch between mapping and unmapping order
      crypto: scatterwalk - simplify map and unmap calling convention
      crypto: lib/chacha - remove unused arch-specific init support

Ethan Carter Edwards (1):
      crypto: artpec6 - change from kzalloc to kcalloc in artpec6_crypto_probe()

Geert Uytterhoeven (1):
      hwrng: Kconfig - Fix indentation of HW_RANDOM_CN10K help text

Giovanni Cabiddu (3):
      crypto: qat - fix object goals in Makefiles
      crypto: qat - reorder objects in qat_common Makefile
      crypto: qat - do not export adf_cfg_services

Herbert Xu (59):
      crypto: inside-secure - Eliminate duplication in top-level Makefile
      crypto: lib/Kconfig - Fix lib built-in failure when arch is modular
      crypto: null - Use spin lock instead of mutex
      crypto: api - Fix larval relookup type and mask
      crypto: skcipher - Set tfm in SYNC_SKCIPHER_REQUEST_ON_STACK
      crypto: skcipher - Zap type in crypto_alloc_sync_skcipher
      crypto: ahash - Only save callback and data in ahash_save_req
      crypto: x86/ghash - Use proper helpers to clone request
      crypto: hash - Add request chaining API
      crypto: tcrypt - Restore multibuffer ahash tests
      crypto: ahash - Add virtual address support
      crypto: ahash - Set default reqsize from ahash_alg
      crypto: skcipher - Use restrict rather than hand-rolling accesses
      crypto: lib/Kconfig - Hide arch options from user
      Merge tag 'crypto-krb5-20250303' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
      crypto: api - Move struct crypto_type into internal.h
      crypto: lzo - Fix compression buffer overrun
      crypto: iaa - Test the correct request flag
      crypto: acomp - Remove acomp request flags
      crypto: Kconfig - Select LIB generic option
      crypto: scatterwalk - Change scatterwalk_next calling convention
      crypto: scatterwalk - Add memcpy_sglist
      crypto: skcipher - Eliminate duplicate virt.addr field
      crypto: skcipher - Make skcipher_walk src.virt.addr const
      crypto: api - Add cra_type->destroy hook
      crypto: scomp - Remove tfm argument from alloc/free_ctx
      crypto: acomp - Move stream management into scomp layer
      crypto: scomp - Disable BH when taking per-cpu spin lock
      crypto: acomp - Add request chaining and virtual addresses
      crypto: testmgr - Remove NULL dst acomp tests
      lib/scatterlist: Add SG_MITER_LOCAL and use it
      crypto: krb5 - Use SG miter instead of doing it by hand
      crypto: hash - Fix test underflow in shash_ahash_digest
      crypto: scatterwalk - Use nth_page instead of doing it by hand
      crypto: hash - Use nth_page instead of doing it by hand
      crypto: padlock - Use zero page instead of stack buffer
      crypto: nx - Fix uninitialised hv_nxc on error
      xfrm: ipcomp: Call pskb_may_pull in ipcomp_input
      crypto: scomp - Remove support for some non-trivial SG lists
      crypto: iaa - Remove dst_null support
      crypto: qat - Remove dst_null support
      crypto: acomp - Remove dst_free
      crypto: scomp - Add chaining and virtual address support
      crypto: acomp - Add ACOMP_REQUEST_ALLOC and acomp_request_alloc_extra
      crypto: iaa - Use acomp stack fallback
      crypto: acomp - Add async nondma fallback
      crypto: acomp - Add support for folios
      xfrm: ipcomp: Use crypto_acomp interface
      PM: hibernate: Use crypto_acomp interface
      ubifs: Use crypto_acomp interface
      ubifs: Pass folios to acomp
      crypto: scompress - Fix scratch allocation failure handling
      crypto: scompress - Fix incorrect stream freeing
      crypto: api - Call crypto_alg_put in crypto_unregister_alg
      crypto: arm/ghash-ce - Remove SIMD fallback code path
      crypto: hash - Fix synchronous ahash chaining fallback
      crypto: testmgr - Add multibuffer hash testing
      crypto: acomp - Fix synchronous acomp chaining fallback
      crypto: testmgr - Add multibuffer acomp testing

J. Neuschäfer (1):
      dt-bindings: crypto: Convert fsl,sec-2.0 to YAML

Jack Xu (3):
      crypto: qat - remove unused members in suof structure
      crypto: qat - remove redundant FW image size check
      crypto: qat - optimize allocations for fw authentication

Kristen Carlson Accardi (1):
      MAINTAINERS: Add Vinicius Gomes to MAINTAINERS for IAA Crypto

Krzysztof Kozlowski (2):
      crypto: drivers - Use str_enable_disable-like helpers
      dt-bindings: rng: rockchip,rk3588-rng: Drop unnecessary status from example

Lukas Wunner (8):
      crypto: sig - Prepare for algorithms with variable signature size
      crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()
      crypto: virtio - Fix kernel-doc of virtcrypto_dev_stop()
      crypto: virtio - Simplify RSA key size caching
      crypto: virtio - Drop superfluous ctx->tfm backpointer
      crypto: virtio - Drop superfluous [as]kcipher_ctx pointer
      crypto: virtio - Drop superfluous [as]kcipher_req pointer
      MAINTAINERS: Add Lukas & Ignat & Stefan for asymmetric keys

Martin Kaiser (1):
      hwrng: imx-rngc - add runtime pm

Małgorzata Mielnik (1):
      crypto: qat - refactor service parsing logic

Nathan Chancellor (1):
      crypto: tegra - Fix format specifier in tegra_sha_prep_cmd()

Nicolas Frattaroli (6):
      dt-bindings: reset: Add SCMI reset IDs for RK3588
      dt-bindings: rng: add binding for Rockchip RK3588 RNG
      hwrng: rockchip - store dev pointer in driver struct
      hwrng: rockchip - eliminate some unnecessary dereferences
      hwrng: rockchip - add support for rk3588's standalone TRNG
      MAINTAINERS: add Nicolas Frattaroli to rockchip-rng maintainers

Rob Herring (Arm) (1):
      dt-bindings: crypto: inside-secure,safexcel: Allow dma-coherent

Shashank Gupta (1):
      crypto: octeontx2 - suppress auth failure screaming due to negative tests

Suman Kumar Chakraborty (3):
      crypto: qat - set command ids as reserved
      crypto: qat - add macro to write 64-bit values to registers
      crypto: qat - introduce fuse array

Sven Schwermer (1):
      crypto: mxs-dcp - Only set OTP_KEY bit for OTP key

Tanya Agarwal (1):
      lib: 842: Improve error handling in sw842_compress()

Thorsten Blum (5):
      crypto: skcipher - use str_yes_no() helper in crypto_skcipher_show()
      crypto: ahash - use str_yes_no() helper in crypto_ahash_show()
      crypto: bcm - set memory to zero only once
      crypto: aead - use str_yes_no() helper in crypto_aead_show()
      crypto: essiv - Replace memcpy() + NUL-termination with strscpy()

Tom Lendacky (1):
      crypto: ccp - Fix check for the primary ASP device

Wenkai Lin (3):
      crypto: hisilicon/sec2 - fix for aead auth key length
      crypto: hisilicon/sec2 - fix for aead authsize alignment
      crypto: hisilicon/sec2 - fix for sec spec check

lizhi (1):
      crypto: hisilicon/hpre - adapt ECDH for high-performance cores

 Documentation/crypto/architecture.rst              |   2 -
 Documentation/crypto/index.rst                     |   1 +
 Documentation/crypto/krb5.rst                      | 262 +++++++
 .../devicetree/bindings/crypto/fsl,sec2.0.yaml     | 144 ++++
 .../devicetree/bindings/crypto/fsl-sec2.txt        |  65 --
 .../crypto/inside-secure,safexcel-eip93.yaml       |  67 ++
 .../bindings/crypto/inside-secure,safexcel.yaml    |   2 +
 .../devicetree/bindings/crypto/qcom,prng.yaml      |   1 +
 .../devicetree/bindings/crypto/qcom-qce.yaml       |   1 +
 .../bindings/rng/rockchip,rk3588-rng.yaml          |  59 ++
 MAINTAINERS                                        |  39 +
 arch/arm/crypto/Kconfig                            |  10 +-
 arch/arm/crypto/aes-ce-glue.c                      |   2 +-
 arch/arm/crypto/chacha-glue.c                      |  10 +-
 arch/arm/crypto/ghash-ce-glue.c                    | 213 +----
 arch/arm64/crypto/Kconfig                          |   6 +-
 arch/arm64/crypto/aes-ce-ccm-glue.c                |  20 +-
 arch/arm64/crypto/aes-neonbs-glue.c                |   3 +-
 arch/arm64/crypto/chacha-neon-glue.c               |  10 +-
 arch/arm64/crypto/ghash-ce-glue.c                  |  17 +-
 arch/arm64/crypto/sm4-ce-ccm-glue.c                |  27 +-
 arch/arm64/crypto/sm4-ce-gcm-glue.c                |  31 +-
 arch/mips/crypto/Kconfig                           |   7 +-
 arch/mips/crypto/chacha-glue.c                     |  10 +-
 arch/powerpc/crypto/Kconfig                        |   7 +-
 arch/powerpc/crypto/aes-gcm-p10-glue.c             |   6 +-
 arch/powerpc/crypto/aes_ctr.c                      |   2 +-
 arch/powerpc/crypto/chacha-p10-glue.c              |  10 +-
 arch/riscv/crypto/Kconfig                          |   1 -
 arch/s390/crypto/Kconfig                           |   3 +-
 arch/s390/crypto/aes_s390.c                        |  45 +-
 arch/s390/crypto/chacha-glue.c                     |   8 +-
 arch/sparc/crypto/aes_glue.c                       |   2 +-
 arch/x86/crypto/Kconfig                            |  11 +-
 arch/x86/crypto/Makefile                           |   2 +-
 arch/x86/crypto/aegis128-aesni-glue.c              |   9 +-
 arch/x86/crypto/aes-ctr-avx-x86_64.S               | 592 ++++++++++++++
 arch/x86/crypto/aes-xts-avx-x86_64.S               |  55 +-
 arch/x86/crypto/aes_ctrby8_avx-x86_64.S            | 597 --------------
 arch/x86/crypto/aesni-intel_glue.c                 | 461 +++++------
 arch/x86/crypto/chacha_glue.c                      |  10 +-
 arch/x86/crypto/des3_ede_glue.c                    |   2 +-
 arch/x86/crypto/ghash-clmulni-intel_glue.c         |  23 +-
 crypto/842.c                                       |  70 +-
 crypto/Kconfig                                     |  16 +
 crypto/Makefile                                    |   5 +-
 crypto/acompress.c                                 | 276 ++++++-
 crypto/aead.c                                      |   5 +-
 crypto/aegis128-core.c                             |   9 +-
 crypto/ahash.c                                     | 601 +++++++++++---
 crypto/algapi.c                                    |   5 +-
 crypto/api.c                                       |  31 +-
 crypto/asymmetric_keys/public_key.c                |   9 +-
 crypto/async_tx/async_xor.c                        |  26 -
 crypto/bpf_crypto_skcipher.c                       |   1 +
 crypto/chacha_generic.c                            |   4 +-
 crypto/compress.c                                  |  32 -
 crypto/compress.h                                  |   2 -
 crypto/crypto_null.c                               |  68 +-
 crypto/crypto_user.c                               |  16 -
 crypto/ctr.c                                       |  10 +-
 crypto/deflate.c                                   |  62 +-
 crypto/ecc.c                                       |   2 +-
 crypto/ecdsa-p1363.c                               |   2 +-
 crypto/ecdsa-x962.c                                |   4 +-
 crypto/essiv.c                                     |   3 +-
 crypto/internal.h                                  |  20 +-
 crypto/krb5/Kconfig                                |  26 +
 crypto/krb5/Makefile                               |  18 +
 crypto/krb5/internal.h                             | 247 ++++++
 crypto/krb5/krb5_api.c                             | 452 +++++++++++
 crypto/krb5/krb5_kdf.c                             | 145 ++++
 crypto/krb5/rfc3961_simplified.c                   | 792 +++++++++++++++++++
 crypto/krb5/rfc3962_aes.c                          | 115 +++
 crypto/krb5/rfc6803_camellia.c                     | 237 ++++++
 crypto/krb5/rfc8009_aes2.c                         | 362 +++++++++
 crypto/krb5/selftest.c                             | 544 +++++++++++++
 crypto/krb5/selftest_data.c                        | 291 +++++++
 crypto/krb5enc.c                                   | 504 ++++++++++++
 crypto/lrw.c                                       |   2 +-
 crypto/lz4.c                                       |  65 +-
 crypto/lz4hc.c                                     |  70 +-
 crypto/lzo-rle.c                                   |  76 +-
 crypto/lzo.c                                       |  76 +-
 crypto/pcbc.c                                      |  28 +-
 crypto/proc.c                                      |   3 -
 crypto/rsassa-pkcs1.c                              |   2 +-
 crypto/scatterwalk.c                               | 126 ++-
 crypto/scompress.c                                 | 279 ++++---
 crypto/skcipher.c                                  | 151 ++--
 crypto/tcrypt.c                                    | 231 ++++++
 crypto/testmgr.c                                   | 505 ++++++------
 crypto/testmgr.h                                   | 351 +++++++++
 crypto/xctr.c                                      |   2 +-
 crypto/xts.c                                       |   2 +-
 crypto/zstd.c                                      |  60 +-
 drivers/char/hw_random/Kconfig                     |  21 +-
 drivers/char/hw_random/imx-rngc.c                  |  69 +-
 drivers/char/hw_random/rockchip-rng.c              | 254 +++++-
 drivers/crypto/Kconfig                             |   1 +
 drivers/crypto/Makefile                            |   2 +-
 drivers/crypto/axis/artpec6_crypto.c               |   4 +-
 drivers/crypto/bcm/cipher.c                        |  27 +-
 drivers/crypto/bcm/spu2.c                          |   3 +-
 drivers/crypto/caam/caamalg_qi2.c                  |   3 +-
 drivers/crypto/cavium/zip/zip_crypto.c             |  46 +-
 drivers/crypto/cavium/zip/zip_crypto.h             |  17 +-
 drivers/crypto/cavium/zip/zip_main.c               |  50 +-
 drivers/crypto/ccp/sp-pci.c                        |  16 +-
 drivers/crypto/hisilicon/hpre/hpre_crypto.c        |   7 +
 drivers/crypto/hisilicon/sec2/sec.h                |   1 -
 drivers/crypto/hisilicon/sec2/sec_crypto.c         | 125 ++-
 drivers/crypto/inside-secure/Makefile              |   1 +
 drivers/crypto/inside-secure/eip93/Kconfig         |  20 +
 drivers/crypto/inside-secure/eip93/Makefile        |   5 +
 drivers/crypto/inside-secure/eip93/eip93-aead.c    | 711 +++++++++++++++++
 drivers/crypto/inside-secure/eip93/eip93-aead.h    |  38 +
 drivers/crypto/inside-secure/eip93/eip93-aes.h     |  16 +
 drivers/crypto/inside-secure/eip93/eip93-cipher.c  | 413 ++++++++++
 drivers/crypto/inside-secure/eip93/eip93-cipher.h  |  60 ++
 drivers/crypto/inside-secure/eip93/eip93-common.c  | 822 +++++++++++++++++++
 drivers/crypto/inside-secure/eip93/eip93-common.h  |  24 +
 drivers/crypto/inside-secure/eip93/eip93-des.h     |  16 +
 drivers/crypto/inside-secure/eip93/eip93-hash.c    | 866 +++++++++++++++++++++
 drivers/crypto/inside-secure/eip93/eip93-hash.h    |  82 ++
 drivers/crypto/inside-secure/eip93/eip93-main.c    | 501 ++++++++++++
 drivers/crypto/inside-secure/eip93/eip93-main.h    | 151 ++++
 drivers/crypto/inside-secure/eip93/eip93-regs.h    | 335 ++++++++
 drivers/crypto/intel/iaa/iaa_crypto_main.c         | 164 +---
 drivers/crypto/intel/qat/qat_420xx/Makefile        |   2 +-
 .../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c |  19 +-
 drivers/crypto/intel/qat/qat_420xx/adf_drv.c       |   2 +-
 drivers/crypto/intel/qat/qat_4xxx/Makefile         |   2 +-
 .../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c   |  13 +-
 drivers/crypto/intel/qat/qat_4xxx/adf_drv.c        |   2 +-
 drivers/crypto/intel/qat/qat_c3xxx/Makefile        |   2 +-
 .../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c |   4 +-
 drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c       |   2 +-
 drivers/crypto/intel/qat/qat_c3xxxvf/Makefile      |   2 +-
 drivers/crypto/intel/qat/qat_c62x/Makefile         |   2 +-
 .../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c   |   4 +-
 drivers/crypto/intel/qat/qat_c62x/adf_drv.c        |   4 +-
 drivers/crypto/intel/qat/qat_c62xvf/Makefile       |   2 +-
 drivers/crypto/intel/qat/qat_common/Makefile       |  68 +-
 .../intel/qat/qat_common/adf_accel_devices.h       |  23 +-
 .../crypto/intel/qat/qat_common/adf_cfg_services.c | 167 +++-
 .../crypto/intel/qat/qat_common/adf_cfg_services.h |  28 +-
 .../crypto/intel/qat/qat_common/adf_cfg_strings.h  |   6 +-
 .../crypto/intel/qat/qat_common/adf_gen2_hw_data.c |   2 +-
 .../crypto/intel/qat/qat_common/adf_gen4_config.c  |  15 +-
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.c |  54 +-
 .../crypto/intel/qat/qat_common/adf_gen4_hw_data.h |   1 +
 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c |  59 +-
 drivers/crypto/intel/qat/qat_common/adf_sysfs.c    |  22 +-
 .../crypto/intel/qat/qat_common/icp_qat_fw_comp.h  |   4 +-
 drivers/crypto/intel/qat/qat_common/icp_qat_uclo.h |  10 -
 drivers/crypto/intel/qat/qat_common/qat_bl.c       | 159 ----
 drivers/crypto/intel/qat/qat_common/qat_bl.h       |   6 -
 .../crypto/intel/qat/qat_common/qat_comp_algs.c    |  85 +-
 drivers/crypto/intel/qat/qat_common/qat_comp_req.h |  10 -
 drivers/crypto/intel/qat/qat_common/qat_uclo.c     |  38 +-
 drivers/crypto/intel/qat/qat_dh895xcc/Makefile     |   2 +-
 .../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c  |   6 +-
 drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c    |   2 +-
 drivers/crypto/intel/qat/qat_dh895xccvf/Makefile   |   2 +-
 drivers/crypto/marvell/Kconfig                     |   4 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c  |  16 +-
 drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h  |   2 -
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.c    | 100 +--
 .../crypto/marvell/octeontx2/otx2_cptpf_ucode.h    |   1 -
 .../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c   |   7 +-
 drivers/crypto/mxs-dcp.c                           |   8 +-
 drivers/crypto/nx/nx-842.c                         |  33 +-
 drivers/crypto/nx/nx-842.h                         |  15 +-
 drivers/crypto/nx/nx-aes-ccm.c                     |  16 +-
 drivers/crypto/nx/nx-aes-gcm.c                     |  17 +-
 drivers/crypto/nx/nx-common-powernv.c              |  31 +-
 drivers/crypto/nx/nx-common-pseries.c              |  70 +-
 drivers/crypto/nx/nx.c                             |  34 +-
 drivers/crypto/nx/nx.h                             |   3 -
 drivers/crypto/padlock-sha.c                       |   4 +-
 drivers/crypto/s5p-sss.c                           |  38 +-
 drivers/crypto/stm32/stm32-cryp.c                  |  34 +-
 drivers/crypto/tegra/tegra-se-aes.c                | 401 ++++++----
 drivers/crypto/tegra/tegra-se-hash.c               | 287 ++++---
 drivers/crypto/tegra/tegra-se-key.c                |  29 +-
 drivers/crypto/tegra/tegra-se-main.c               |  16 +-
 drivers/crypto/tegra/tegra-se.h                    |  39 +-
 .../crypto/virtio/virtio_crypto_akcipher_algs.c    |  41 +-
 drivers/crypto/virtio/virtio_crypto_core.c         |   6 +-
 drivers/crypto/virtio/virtio_crypto_mgr.c          |   2 +-
 .../crypto/virtio/virtio_crypto_skcipher_algs.c    |  17 +-
 fs/ubifs/compress.c                                | 208 ++++-
 fs/ubifs/file.c                                    |  74 +-
 fs/ubifs/journal.c                                 |  11 +-
 fs/ubifs/ubifs.h                                   |  26 +-
 include/crypto/acompress.h                         | 382 ++++++++-
 include/crypto/algapi.h                            |  33 +-
 include/crypto/authenc.h                           |   2 +
 include/crypto/chacha.h                            |  11 +-
 include/crypto/ctr.h                               |   2 +-
 include/crypto/hash.h                              |  72 +-
 include/crypto/internal/acompress.h                |  85 +-
 include/crypto/internal/hash.h                     |  15 +
 include/crypto/internal/scompress.h                |  18 +-
 include/crypto/internal/skcipher.h                 |  40 +-
 include/crypto/krb5.h                              | 160 ++++
 include/crypto/scatterwalk.h                       | 234 ++++--
 include/crypto/sig.h                               |   5 +-
 include/crypto/skcipher.h                          |  19 +-
 include/dt-bindings/reset/rockchip,rk3588-cru.h    |  41 +-
 include/linux/async_tx.h                           |   5 -
 include/linux/crypto.h                             |  83 +-
 include/linux/lzo.h                                |   8 +
 include/linux/math.h                               |  12 +
 include/linux/scatterlist.h                        |   1 +
 include/linux/spinlock.h                           |  13 +
 include/net/ipcomp.h                               |  13 +-
 include/uapi/linux/psp-sev.h                       |  21 +-
 kernel/power/hibernate.c                           |   5 +-
 kernel/power/swap.c                                |  58 +-
 lib/842/842_compress.c                             |   2 +
 lib/crypto/Kconfig                                 |  45 +-
 lib/crypto/chacha20poly1305.c                      |   7 +-
 lib/lzo/Makefile                                   |   2 +-
 lib/lzo/lzo1x_compress.c                           | 102 ++-
 lib/lzo/lzo1x_compress_safe.c                      |  18 +
 lib/scatterlist.c                                  |  12 +-
 net/tls/tls_device_fallback.c                      |  31 +-
 net/xfrm/xfrm_algo.c                               |   7 +-
 net/xfrm/xfrm_ipcomp.c                             | 479 ++++++------
 security/keys/Kconfig                              |   2 +-
 tools/testing/crypto/chacha20-s390/test-cipher.c   |   4 +-
 233 files changed, 14511 insertions(+), 4726 deletions(-)
 create mode 100644 Documentation/crypto/krb5.rst
 create mode 100644 Documentation/devicetree/bindings/crypto/fsl,sec2.0.yaml
 delete mode 100644 Documentation/devicetree/bindings/crypto/fsl-sec2.txt
 create mode 100644 Documentation/devicetree/bindings/crypto/inside-secure,safexcel-eip93.yaml
 create mode 100644 Documentation/devicetree/bindings/rng/rockchip,rk3588-rng.yaml
 create mode 100644 arch/x86/crypto/aes-ctr-avx-x86_64.S
 delete mode 100644 arch/x86/crypto/aes_ctrby8_avx-x86_64.S
 delete mode 100644 crypto/compress.c
 create mode 100644 crypto/krb5/Kconfig
 create mode 100644 crypto/krb5/Makefile
 create mode 100644 crypto/krb5/internal.h
 create mode 100644 crypto/krb5/krb5_api.c
 create mode 100644 crypto/krb5/krb5_kdf.c
 create mode 100644 crypto/krb5/rfc3961_simplified.c
 create mode 100644 crypto/krb5/rfc3962_aes.c
 create mode 100644 crypto/krb5/rfc6803_camellia.c
 create mode 100644 crypto/krb5/rfc8009_aes2.c
 create mode 100644 crypto/krb5/selftest.c
 create mode 100644 crypto/krb5/selftest_data.c
 create mode 100644 crypto/krb5enc.c
 create mode 100644 drivers/crypto/inside-secure/eip93/Kconfig
 create mode 100644 drivers/crypto/inside-secure/eip93/Makefile
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-aead.c
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-aead.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-aes.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-cipher.c
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-cipher.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-common.c
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-common.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-des.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-hash.c
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-hash.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-main.c
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-main.h
 create mode 100644 drivers/crypto/inside-secure/eip93/eip93-regs.h
 create mode 100644 include/crypto/krb5.h
 create mode 100644 lib/lzo/lzo1x_compress_safe.c

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-25  5:53                                                           ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
@ 2025-03-25 15:25                                                             ` Eric Biggers
  2025-03-25 16:59                                                               ` Ard Biesheuvel
                                                                                 ` (2 more replies)
  2025-03-29 18:24                                                             ` pr-tracker-bot
  1 sibling, 3 replies; 204+ messages in thread
From: Eric Biggers @ 2025-03-25 15:25 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Mar 25, 2025 at 01:53:28PM +0800, Herbert Xu wrote:
>
>       crypto: hash - Add request chaining API

Herbert didn't mention that I have nacked this patch, which he is insisting on
pushing for some reason instead of my original version that is much better.

Let me reiterate why "request chaining" is a bad idea and is going to cause
problems.

It makes it so that now a single hash request can now actually be a list of hash
requests.  It makes some of the crypto code operate on the whole list.  However,
most code still operates only on the first request in the list.  It's
undocumented and inconsistent which code is doing which, which is going to cause
bugs.  The first request in the list is also being treated specially in
undocumented ways, so submitting a list of requests is not necessarily
equivalent to submitting them all individually.  Another recipe for bugs.

Each hash request can also contain an entire scatterlist.  It's overkill for
what is actually needed for multibuffer hashing, which is a simple API that
hashes two buffers specified by virtual address.  Herbert's API creates lots of
unnecessary edge cases, most of which lack any testing.  It continues many of
the worst practices of the crypto API that we *know* are not working, like
requiring per-request memory allocations and optimizing for legacy hardware
offload rather than the CPU-based crypto that almost everyone actually uses.

In contrast, my patchset
https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
multibuffer hashing in a much better way and has been ready for a year already.
It actually works; it has a smaller diffstat; it is faster; it has a much
simpler API; and it actually includes all needed pieces including x86 and arm64
support, dm-verity and fs-verity support, and full documentation and tests.

I've been spending a lot of time fixing the kernel's crypto code over the years.
I'm not looking forward to having another set of major issues to fix.

And this latest set of issues will be totally unnecessary.

We can do better than this, especially for cryptography code.

Nacked-by: Eric Biggers <ebiggers@kernel.org>

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-25 15:25                                                             ` Eric Biggers
@ 2025-03-25 16:59                                                               ` Ard Biesheuvel
  2025-03-26  1:49                                                               ` Herbert Xu
  2025-03-29 17:40                                                               ` Linus Torvalds
  2 siblings, 0 replies; 204+ messages in thread
From: Ard Biesheuvel @ 2025-03-25 16:59 UTC (permalink / raw)
  To: Eric Biggers, Herbert Xu, Linus Torvalds
  Cc: David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, 25 Mar 2025 at 16:25, Eric Biggers <ebiggers@kernel.org> wrote:
>
> On Tue, Mar 25, 2025 at 01:53:28PM +0800, Herbert Xu wrote:
> >
> >       crypto: hash - Add request chaining API
>
> Herbert didn't mention that I have nacked this patch, which he is insisting on
> pushing for some reason instead of my original version that is much better.
>
> Let me reiterate why "request chaining" is a bad idea and is going to cause
> problems.
>
> It makes it so that now a single hash request can now actually be a list of hash
> requests.  It makes some of the crypto code operate on the whole list.  However,
> most code still operates only on the first request in the list.  It's
> undocumented and inconsistent which code is doing which, which is going to cause
> bugs.  The first request in the list is also being treated specially in
> undocumented ways, so submitting a list of requests is not necessarily
> equivalent to submitting them all individually.  Another recipe for bugs.
>
> Each hash request can also contain an entire scatterlist.  It's overkill for
> what is actually needed for multibuffer hashing, which is a simple API that
> hashes two buffers specified by virtual address.  Herbert's API creates lots of
> unnecessary edge cases, most of which lack any testing.  It continues many of
> the worst practices of the crypto API that we *know* are not working, like
> requiring per-request memory allocations and optimizing for legacy hardware
> offload rather than the CPU-based crypto that almost everyone actually uses.
>
> In contrast, my patchset
> https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
> multibuffer hashing in a much better way and has been ready for a year already.
> It actually works; it has a smaller diffstat; it is faster; it has a much
> simpler API; and it actually includes all needed pieces including x86 and arm64
> support, dm-verity and fs-verity support, and full documentation and tests.
>
> I've been spending a lot of time fixing the kernel's crypto code over the years.
> I'm not looking forward to having another set of major issues to fix.
>
> And this latest set of issues will be totally unnecessary.
>
> We can do better than this, especially for cryptography code.
>
> Nacked-by: Eric Biggers <ebiggers@kernel.org>
>

It's sad that it is coming to this, but I have to second Eric here:
for CPU based crypto, the flexibility of Herbert's approach has no
added value. SHA CPU instructions can be interleaved at the
instruction level to get almost 2x speedup in some cases, and this
works very well when operating on equal sized inputs. However,
generalizing this to arbitrary request chains to accommodate async h/w
offload introduces a lot of complexity for use cases that are only
imaginary.

Given Eric's track record as a contributor to the crypto subsystem and
as a maintainer of subsystems that are closely tied to it, I would
expect Herbert to take his opinion more seriously, but it is just
being ignored. Instead, a lightly tested alternative with no
integration into existing users has been merged in its place, with
very little input from the community.

So Herbert, please withdraw this pull request, and work with Eric and
the rest of us to converge on something that we can all get behind.

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-25 15:25                                                             ` Eric Biggers
  2025-03-25 16:59                                                               ` Ard Biesheuvel
@ 2025-03-26  1:49                                                               ` Herbert Xu
  2025-03-26  2:16                                                                 ` Herbert Xu
  2025-03-26  3:20                                                                 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
  2025-03-29 17:40                                                               ` Linus Torvalds
  2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-03-26  1:49 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Mar 25, 2025 at 08:25:41AM -0700, Eric Biggers wrote:
> 
> Herbert didn't mention that I have nacked this patch, which he is insisting on
> pushing for some reason instead of my original version that is much better.

Let's see how your version is so much better:

https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/

-	/* Up to 1 + FS_VERITY_MAX_LEVELS pages may be mapped at once */
-	BUILD_BUG_ON(1 + FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
+	/*
+	 * Up to FS_VERITY_MAX_PENDING_DATA_BLOCKS + FS_VERITY_MAX_LEVELS pages
+	 * may be mapped at once.
+	 */
+	BUILD_BUG_ON(FS_VERITY_MAX_PENDING_DATA_BLOCKS +
+		     FS_VERITY_MAX_LEVELS > KM_MAX_IDX);

This arbitrary limit is a direct result of your welded-on commitment
to an API that supports virtually mapped addresses only.  Make no
mistake, virtual addresses are simple and easy to use, but the kernel
added more complicated constructs for real reasons.

I've gone through your use-case in fsverity/dm-verity, and they
never touch the data at all so the only reason for it to kmap the
data at all is to feed it to the Crypto API, which is capable of
doing its own kmap but you elected not to use that because you
hate the interface.

In fact it's a recurring theme, the zswap code jumps through multiple
hoops to map the data they're working on so that they can feed it to
the Crypto API as a virtually mapped pointer, even though they never
touch the mapped data at all.  The same thing also happened in ubifs,
which I managed to simplify by switching away from kmapped pointers:

https://patchwork.kernel.org/project/linux-crypto/patch/99ae6a15afc1478bab201949dc3dbb2c7634b687.1742034499.git.herbert@gondor.apana.org.au/

-		addr += UBIFS_BLOCK_SIZE;
-		if (folio_test_highmem(folio) && (offset_in_page(addr) == 0)) {
-			kunmap_local(addr - UBIFS_BLOCK_SIZE);
-			addr = kmap_local_folio(folio, i * UBIFS_BLOCK_SIZE);
-		}
+		offset += UBIFS_BLOCK_SIZE;

All this complexity was added because the legacy compression
interface only supported virtually mapped addresses.

Sure the ahash/acomp interface was suboptimal for *only* supporting
SG lists, which is what this pull request addresses by adding virtual
address (and folio) support.

> Let me reiterate why "request chaining" is a bad idea and is going to cause
> problems.

I'm more than willing to discuss with you the implementation details
of how the chaining is done and improving it.  However, if you proceed
to only issue blanket nacks without providing any constructive feedback,
then the only thing I can do is ignore you.

> In contrast, my patchset
> https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
> multibuffer hashing in a much better way and has been ready for a year already.
> It actually works; it has a smaller diffstat; it is faster; it has a much
> simpler API; and it actually includes all needed pieces including x86 and arm64
> support, dm-verity and fs-verity support, and full documentation and tests.

Everybody wants to sratch their itch but my job as the maintainer is
to ensure that the subsystem doesn't collapse into an unmaintainable
hodgepodge of individual contributions.

Yes I get that batching is useful for you, but your use-case is not
unique at all.  The compression people are proposing pretty much the
same thing

https://patchwork.kernel.org/project/linux-crypto/patch/20250303084724.6490-15-kanchana.p.sridhar@intel.com/

I don't want to be pressured by you into committing to an interface
that works for you only.
 
> Nacked-by: Eric Biggers <ebiggers@kernel.org>

This pull request doesn't even contain the meat of the hash changes
since I've been busy with the compression work.  So this is simply
a pre-emptive strike to stop further work from rendering your patches
obsolete.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-26  1:49                                                               ` Herbert Xu
@ 2025-03-26  2:16                                                                 ` Herbert Xu
  2025-03-26  3:34                                                                   ` Eric Biggers
  2025-03-26  3:20                                                                 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-26  2:16 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Mar 26, 2025 at 09:49:14AM +0800, Herbert Xu wrote:
>
> Let's see how your version is so much better:
> 
> https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/

BTW, I absolutely hate how the fs/block layer uses work queues
for everything.  It's been used as an argument for async being
unnecessary because you can always wait for completion since
you're in a work queue.

But this is exactly the wrong way to do asynchronous completion.
In fact, now that async support has been removed because of
religious opposition to ahash, we now end up with the worst of
both worlds where hashing is punted off to a work queue where
it is simply executed on the CPU:

/**
 * fsverity_enqueue_verify_work() - enqueue work on the fs-verity workqueue
 * @work: the work to enqueue
 *
 * Enqueue verification work for asynchronous processing.
 */
void fsverity_enqueue_verify_work(struct work_struct *work)
{
        queue_work(fsverity_read_workqueue, work);
}

The correct way to do async offload is to do it conditionally:

	ret = submit_request(rq);
	if (unlikely(needs_async(ret))) {
		allocate for async path with fallback to sync
		processing in case of OOM
		return;
	}

	execute normal synchronous path

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-26  1:49                                                               ` Herbert Xu
  2025-03-26  2:16                                                                 ` Herbert Xu
@ 2025-03-26  3:20                                                                 ` Eric Biggers
  2025-03-26  3:30                                                                   ` Herbert Xu
  1 sibling, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-26  3:20 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Mar 26, 2025 at 09:49:14AM +0800, Herbert Xu wrote:
> On Tue, Mar 25, 2025 at 08:25:41AM -0700, Eric Biggers wrote:
> > 
> > Herbert didn't mention that I have nacked this patch, which he is insisting on
> > pushing for some reason instead of my original version that is much better.
> 
> Let's see how your version is so much better:
> 
> https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/
> 
> -	/* Up to 1 + FS_VERITY_MAX_LEVELS pages may be mapped at once */
> -	BUILD_BUG_ON(1 + FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
> +	/*
> +	 * Up to FS_VERITY_MAX_PENDING_DATA_BLOCKS + FS_VERITY_MAX_LEVELS pages
> +	 * may be mapped at once.
> +	 */
> +	BUILD_BUG_ON(FS_VERITY_MAX_PENDING_DATA_BLOCKS +
> +		     FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
> 
> This arbitrary limit is a direct result of your welded-on commitment
> to an API that supports virtually mapped addresses only.  Make no
> mistake, virtual addresses are simple and easy to use, but the kernel
> added more complicated constructs for real reasons.

Umm, so you think someone is going to do multibuffer hashing with more buffers
than kmap_local supports (16)?  Why?  Regardless of the exact API, that case
would require kmap() to support.  It's hard to see how it would ever be worth
it, even if theoretically a CPU was capable of taking advantage of that much
instruction-level parallelism (this is implausible with SHA-256 instructions)
and ignoring the other issues like code size bloat and increased memory usage
that a very high interleaving factor would cause.

Of course, in practice this is just going to be used with 2x, which is what CPUs
can actually do with the SHA-256 instructions and avoids the various downsides
of overly-large interleaving factors.

> I've gone through your use-case in fsverity/dm-verity, and they
> never touch the data at all so the only reason for it to kmap the
> data at all is to feed it to the Crypto API, which is capable of
> doing its own kmap but you elected not to use that because you
> hate the interface.

Which is incorrect and just shows that you still haven't even read the code.
Take a look at cf715f4b7eb521a5bf67d391387b754c2fcde8d2.  Switching dm-verity to
always "map" the data blocks significantly simplified the dm-verity code (-138
line diffstat), *even before switching to shash*.  So we really want to just
pass virtual addresses to the crypto API too.  It's much simpler.

> In fact it's a recurring theme, the zswap code jumps through multiple
> hoops to map the data they're working on so that they can feed it to
> the Crypto API as a virtually mapped pointer, even though they never
> touch the mapped data at all.

Compression and hashing are not the same and use different APIs.  So this is a
straw man.  But I think you are on the wrong track for compression too.  What
zswap needs is relatively limited: only the compressed data (not the
uncompressed data) can be split across pages, and only 2 pages.  A complex API
with source and destination scatterlists isn't needed for this use case either,
even assuming that the best solution is to make all the compression algorithms
support this "natively" (most don't yet, or don't support it efficiently).
Other solutions that could be faster include just continuing to linearize the
data, or rethinking zswap to not create non-linear compressed data in the first
place, e.g. by putting compressed data only in large folios.

And yes, the zswap patchset is using request chaining, but that's because you
forced the zswap people to use it.  It wasn't their original proposal.  And
based on the discussions and various versions of the patchset, they've been
having quite a bit of trouble making sense of your API.

But again, this is compression, not hashing.  They don't use the same API.

> which I managed to simplify by switching away from kmapped pointers:
> 
> https://patchwork.kernel.org/project/linux-crypto/patch/99ae6a15afc1478bab201949dc3dbb2c7634b687.1742034499.git.herbert@gondor.apana.org.au/
> 

"Simplify" by a +90 line diffstat.  Sure.

> > Let me reiterate why "request chaining" is a bad idea and is going to cause
> > problems.
> 
> I'm more than willing to discuss with you the implementation details
> of how the chaining is done and improving it. However, if you proceed
> to only issue blanket nacks without providing any constructive feedback,
> then the only thing I can do is ignore you.

I've given you extensive constructive feedback over the past year, while you've
continued to nack my patches for inconsistent and bogus reasons.

> > In contrast, my patchset
> > https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
> > multibuffer hashing in a much better way and has been ready for a year already.
> > It actually works; it has a smaller diffstat; it is faster; it has a much
> > simpler API; and it actually includes all needed pieces including x86 and arm64
> > support, dm-verity and fs-verity support, and full documentation and tests.
> 
> Everybody wants to sratch their itch but my job as the maintainer is
> to ensure that the subsystem doesn't collapse into an unmaintainable
> hodgepodge of individual contributions.

But when there is only one such contribution, why overengineer it with something
that is slower, more complex, more error-prone, and harder to maintain?
Especially when this is a kernel-internal API that we can change whenever we
want to suit what is actually being used in the kernel.

And your vague plan to use multibuffer hashing in IPsec doesn't count.  I keep
explaining why it doesn't actually make sense, and how I've *actually* been
optimizing IPsec in other ways that actually matter and actually work, but you
haven't been listening.

> This pull request doesn't even contain the meat of the hash changes
> since I've been busy with the compression work.  So this is simply
> a pre-emptive strike to stop further work from rendering your patches
> obsolete.

I'd love for your work to make my patches obsolete, but unfortunately your
version is just worse.  And besides it being very incomplete, the main issue is
fundamental with the design.  So it doesn't really make sense to use it,
especially when I'm going to get stuck cleaning up your mess again.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-26  3:20                                                                 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
@ 2025-03-26  3:30                                                                   ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2025-03-26  3:30 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Mar 25, 2025 at 08:20:38PM -0700, Eric Biggers wrote:
>
> I'd love for your work to make my patches obsolete, but unfortunately your
> version is just worse.  And besides it being very incomplete, the main issue is
> fundamental with the design.  So it doesn't really make sense to use it,
> especially when I'm going to get stuck cleaning up your mess again.

I haven't even pushed the bulk of my hash work and yet you're trying
stop my pull request, so it's your way or the high way.

I don't see how that is constructive feedback.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-26  2:16                                                                 ` Herbert Xu
@ 2025-03-26  3:34                                                                   ` Eric Biggers
  2025-03-26  3:52                                                                     ` Herbert Xu
  0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-26  3:34 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Mar 26, 2025 at 10:16:10AM +0800, Herbert Xu wrote:
> On Wed, Mar 26, 2025 at 09:49:14AM +0800, Herbert Xu wrote:
> >
> > Let's see how your version is so much better:
> > 
> > https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/
> 
> BTW, I absolutely hate how the fs/block layer uses work queues
> for everything.  It's been used as an argument for async being
> unnecessary because you can always wait for completion since
> you're in a work queue.
> 
> But this is exactly the wrong way to do asynchronous completion.
> In fact, now that async support has been removed because of
> religious opposition to ahash, we now end up with the worst of
> both worlds where hashing is punted off to a work queue where
> it is simply executed on the CPU:
> 
> /**
>  * fsverity_enqueue_verify_work() - enqueue work on the fs-verity workqueue
>  * @work: the work to enqueue
>  *
>  * Enqueue verification work for asynchronous processing.
>  */
> void fsverity_enqueue_verify_work(struct work_struct *work)
> {
>         queue_work(fsverity_read_workqueue, work);
> }
> 
> The correct way to do async offload is to do it conditionally:
> 
> 	ret = submit_request(rq);
> 	if (unlikely(needs_async(ret))) {
> 		allocate for async path with fallback to sync
> 		processing in case of OOM
> 		return;
> 	}
> 
> 	execute normal synchronous path
> 

In the general case, the workqueue is needed anyway because the work can block
(e.g. to read Merkle tree blocks) or can take longer than should be spent in
softirq context.  But in many cases the workqueue is indeed overkill and hurts
I/O performance.  For that reason, dm-verity and dm-crypt already support doing
the read completion work in softirq context in some cases.  It's not enabled by
default though, and isn't implemented in quite the way it should be.  Several
people, including me, have been looking into improving that.

So I think your observation about the workqueue being unhelpful is generally
correct, but fixing that is already partially implemented and is being worked on
further.  And regardless, this does not have that much relevance to the crypto
API.  Yes, you can't sleep from a softirq, which means you can't wait for an
async crypto request to complete (other than polling).  So if you want to do
that, you have to go down the workqueue code path.  But in practice 99% of users
are just using the CPU-based crypto that is synchronous and does not block.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-26  3:34                                                                   ` Eric Biggers
@ 2025-03-26  3:52                                                                     ` Herbert Xu
  2025-03-30  2:33                                                                       ` Chaining is dead Herbert Xu
  0 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-26  3:52 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Mar 25, 2025 at 08:34:04PM -0700, Eric Biggers wrote:
>
> So I think your observation about the workqueue being unhelpful is generally
> correct, but fixing that is already partially implemented and is being worked on
> further.  And regardless, this does not have that much relevance to the crypto
> API.  Yes, you can't sleep from a softirq, which means you can't wait for an
> async crypto request to complete (other than polling).  So if you want to do
> that, you have to go down the workqueue code path.  But in practice 99% of users
> are just using the CPU-based crypto that is synchronous and does not block.

The point is that you don't have to wait.  Once verity verification
is done, all you do is mark the page/folio as up-to-date.  That work
can be done directly from softirq context.  So all you need to do to
support async crypto is to mark the page/folio as up-to-date from the
completion function, no work queues are needed anywhere.

Look, right now you've got this crazy cargo cult programming paradigm
of work queues that is worshipped because it lets you wait for async
completion.  In reality it is forcing everybody to go async even when
they don't need it.  Take ext4 as an example:

	ext4 calls verity
	schedule_work(verity_work);
	return asynchronously!

verity_work:
	do the crypto work
	__read_end_io(bio);

Just get rid of the work queue, it is not needed for async crypto,
which you don't even support anymore because you hate the interface
so much.

Even if we want to support async crypto, all you have to do is move
the __read_end_io call into the async completion function.  Voila,
no work queues are needed.

	ext4 calls verity

verity:
	ret = do the crypto work
	if (is_async(ret))
		return asynchronously;
	__read_end_io(bio)
	return synchronously;

async completion:
	__read_end_io(bio)

Networking has been doing this since 2008, I have no idea why storage
insists on the crazy workqueue paradigm.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-25 15:25                                                             ` Eric Biggers
  2025-03-25 16:59                                                               ` Ard Biesheuvel
  2025-03-26  1:49                                                               ` Herbert Xu
@ 2025-03-29 17:40                                                               ` Linus Torvalds
  2025-03-29 18:06                                                                 ` Eric Biggers
  2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 17:40 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, 25 Mar 2025 at 08:25, Eric Biggers <ebiggers@kernel.org> wrote:
>
> Each hash request can also contain an entire scatterlist.  It's overkill for
> what is actually needed for multibuffer hashing, which is a simple API that
> hashes two buffers specified by virtual address.  Herbert's API creates lots of
> unnecessary edge cases, most of which lack any testing.

Isn't that the whole *point* of the generic crypto layer?

Honestly, I think anybody who cares about modern CPU-based crypto
should do what wireguard did: stop using the generic crypto layer,
because it's fundamentally designed for odd async hardware in strange
*legacy* models, and the whole basic design is around the indirection
that allows different crypto engines.

Because that's the *point* of that code. I mean, a large part of the
*design* of it is centered around having external crypto engines. And
the thing you worry about is pretty much the opposite of that.

So if what you want is just fast modern crypto on the CPU, the generic
interfaces are just odd and complicated.

Yes, they get less complicated if you limit yourself to the
synchronous interfaces - which is, as you point out - why most people
do exactly that.

Put another way: I don't disagree with you, but at the same time my
reaction is that the generic crypto layer does what it has always
done.

I get the feeling that you are arguing for avoiding the overheads and
abstractions, and I'm not disagreeing. But overheads and abstractions
is what that crypto layer is *for*.

I mean, you can do

        tfm = crypto_alloc_shash("crc32c", 0, 0);

and jump through the crazy hoops with the indirection of going through
that tfm ("transformation object") that allocates a lot of extra info
and works with other things. And it's designed to work with various
non-CPU addresses etc.

Or you can just do

        crc = crc32c(crc, virt, cur_len);

and you're done - at the cost of only working with regular virtually
mapped addresses. Your choice.

So I think you want to do the wireguard thing, and use the fixed and
simple cases.

Yes, those interfaces only exist for a subset of things, but I think
that subset of things is (a) the relevant subset and (b) the ones
you'd do the whole parallel execution for anyway (afaik you did
sha256).

              Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-29 17:40                                                               ` Linus Torvalds
@ 2025-03-29 18:06                                                                 ` Eric Biggers
  2025-03-29 18:17                                                                   ` Linus Torvalds
  0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-29 18:06 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sat, Mar 29, 2025 at 10:40:23AM -0700, Linus Torvalds wrote:
> On Tue, 25 Mar 2025 at 08:25, Eric Biggers <ebiggers@kernel.org> wrote:
> >
> > Each hash request can also contain an entire scatterlist.  It's overkill for
> > what is actually needed for multibuffer hashing, which is a simple API that
> > hashes two buffers specified by virtual address.  Herbert's API creates lots of
> > unnecessary edge cases, most of which lack any testing.
> 
> Isn't that the whole *point* of the generic crypto layer?
> 
> Honestly, I think anybody who cares about modern CPU-based crypto
> should do what wireguard did: stop using the generic crypto layer,
> because it's fundamentally designed for odd async hardware in strange
> *legacy* models, and the whole basic design is around the indirection
> that allows different crypto engines.
> 
> Because that's the *point* of that code. I mean, a large part of the
> *design* of it is centered around having external crypto engines. And
> the thing you worry about is pretty much the opposite of that.
> 
> So if what you want is just fast modern crypto on the CPU, the generic
> interfaces are just odd and complicated.
> 
> Yes, they get less complicated if you limit yourself to the
> synchronous interfaces - which is, as you point out - why most people
> do exactly that.
> 
> Put another way: I don't disagree with you, but at the same time my
> reaction is that the generic crypto layer does what it has always
> done.
> 
> I get the feeling that you are arguing for avoiding the overheads and
> abstractions, and I'm not disagreeing. But overheads and abstractions
> is what that crypto layer is *for*.
> 
> I mean, you can do
> 
>         tfm = crypto_alloc_shash("crc32c", 0, 0);
> 
> and jump through the crazy hoops with the indirection of going through
> that tfm ("transformation object") that allocates a lot of extra info
> and works with other things. And it's designed to work with various
> non-CPU addresses etc.
> 
> Or you can just do
> 
>         crc = crc32c(crc, virt, cur_len);
> 
> and you're done - at the cost of only working with regular virtually
> mapped addresses. Your choice.
> 
> So I think you want to do the wireguard thing, and use the fixed and
> simple cases.
> 
> Yes, those interfaces only exist for a subset of things, but I think
> that subset of things is (a) the relevant subset and (b) the ones
> you'd do the whole parallel execution for anyway (afaik you did
> sha256).

The crypto_shash API is synchronous and operates on virtual addresses.  So it
just provides a simple way to support multiple hash algorithms, and none of the
legacy asynchronous hardware offload stuff.  It's crypto_ahash that has that.

Multibuffer hashing (interleaving multiple hashes) is CPU-based, and it requires
that all the lengths be synced up for it to work, which makes it very difficult
to support scatterlists.  So considering just crypto_shash and crypto_ahash, it
really belongs in crypto_shash (whereas Herbert wants it to go in crypto_ahash).

You're correct that it could go in a SHA-256 library function instead of either
crypto_shash or crypto_ahash.  I think it would be slightly more convenient to
have it in crypto_shash, since the users that want this (dm-verity and
fs-verity) do support multiple hash algorithms and appreciate having the
*simple* abstraction layer of crypto_shash.

But I'd be okay with having a separate code path for SHA-256 too, and maybe this
is the best way out of this...  No need to use the "Crypto API" at all if it's
not going to provide what is needed.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-29 18:06                                                                 ` Eric Biggers
@ 2025-03-29 18:17                                                                   ` Linus Torvalds
  2025-03-29 18:19                                                                     ` Linus Torvalds
  0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 18:17 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sat, 29 Mar 2025 at 11:06, Eric Biggers <ebiggers@kernel.org> wrote:
>
> The crypto_shash API is synchronous and operates on virtual addresses.  So it
> just provides a simple way to support multiple hash algorithms, and none of the
> legacy asynchronous hardware offload stuff.  It's crypto_ahash that has that.

Well, it's "simple" only compared to ahash.

It's still a complete nightmare compared to just doing the obvious
thing directly when that is an option.

I happened to just merge the rdma updates a couple of minutes ago, and
they actually removed the example I was using (ie the whole "use
crypto layer for crc32c" insanity).

             Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-29 18:17                                                                   ` Linus Torvalds
@ 2025-03-29 18:19                                                                     ` Linus Torvalds
  2025-03-29 18:38                                                                       ` Eric Biggers
  0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 18:19 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sat, 29 Mar 2025 at 11:17, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
>
> I happened to just merge the rdma updates a couple of minutes ago, and
> they actually removed the example I was using (ie the whole "use
> crypto layer for crc32c" insanity).

Heh. Looking closer, the "they" was actually you who did the patch and
Leon who applied it.

            Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-25  5:53                                                           ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
  2025-03-25 15:25                                                             ` Eric Biggers
@ 2025-03-29 18:24                                                             ` pr-tracker-bot
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-03-29 18:24 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Tue, 25 Mar 2025 13:53:28 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.15-p1

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e5e0e6bebef3a21081fd1057c40468d4cff1a60d

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-29 18:19                                                                     ` Linus Torvalds
@ 2025-03-29 18:38                                                                       ` Eric Biggers
  2025-03-29 18:52                                                                         ` Linus Torvalds
  0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-29 18:38 UTC (permalink / raw)
  To: Linus Torvalds
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sat, Mar 29, 2025 at 11:19:19AM -0700, Linus Torvalds wrote:
> On Sat, 29 Mar 2025 at 11:17, Linus Torvalds
> <torvalds@linux-foundation.org> wrote:
> >
> > I happened to just merge the rdma updates a couple of minutes ago, and
> > they actually removed the example I was using (ie the whole "use
> > crypto layer for crc32c" insanity).
> 
> Heh. Looking closer, the "they" was actually you who did the patch and
> Leon who applied it.
> 
>             Linus

Yes.  Those cases were just a single algorithm, though, so of course the library
was simpler.  fs-verity supports two hash algorithms (SHA-256 and SHA-512), and
dm-verity unfortunately supports every hash algorithm the crypto API supports
since it accepts it as a string and passes it directly to the crypto API.  I
know for sure dm-verity is used with at least SHA-256, SHA-1, and BLAKE2b, but
there could be more.  The crypto API also supports various "national pride"
algorithms like SM3 and Streebog, for example, and some people might expect
those to work with dm-verity.  (Unfortunately SM3 keeps getting pushed into
various standards, libraries, CPU instruction sets, etc.)

So for fs-verity we'd basically need:

    if (using SHA-256)
        sha256()
    else
        sha512()

    (and the same for any other algorithms that may get added in the future)

And for dm-verity we'd basically need:

    if (using SHA-256)
        sha256()
    else
        Use crypto_ahash or crypto_shash to handle arbitrary algorithm

And that's okay -- we can do that.  Just crypto_shash ends up being
approximately what is needed already, so just using it seems slightly
preferable.  But using the libraries whenever possible would be fine with me
too.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Update for 6.15
  2025-03-29 18:38                                                                       ` Eric Biggers
@ 2025-03-29 18:52                                                                         ` Linus Torvalds
  0 siblings, 0 replies; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 18:52 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sat, 29 Mar 2025 at 11:38, Eric Biggers <ebiggers@kernel.org> wrote:
>
> Yes.  Those cases were just a single algorithm, though, so of course the library
> was simpler.

Yeah, I realize.  It's the extreme case of "using the generic crypto
infrastructure is just silly to the point of being stupid".

I just think that there's a continuum of that situation.

There are cases where you *obviously* want to use the crypto
infrastructure, because you really have lots of different users, and
you actually need the flexibility (and in the extreme case you do have
the whole external async crypto engine case even if I can't for the
life of me see the point).

And there are the cases where it's just stupid to do it, because you
have one single hash you are doing and the flexibility is only pure
pointless overhead and it makes the code bigger, slower, and harder to
understand.

But I think then there are the middle grounds.

The cases where you may well just say "this is the common case that I
want to optimize for, and I know it's more efficient if I just do two
blocks in parallel and I'll do that case directly, and fall back to
the generic code for any odd cases".

               Linus

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Chaining is dead
  2025-03-26  3:52                                                                     ` Herbert Xu
@ 2025-03-30  2:33                                                                       ` Herbert Xu
  2025-03-31 16:56                                                                         ` Eric Biggers
  0 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-30  2:33 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Wed, Mar 26, 2025 at 11:52:05AM +0800, Herbert Xu wrote:
>
> they don't need it.  Take ext4 as an example:
> 
> 	ext4 calls verity
> 	schedule_work(verity_work);
> 	return asynchronously!
> 
> verity_work:
> 	do the crypto work
> 	__read_end_io(bio);

I went ahead and removed the work queue for fsverity and fscrypt
(except for the reading of the Merkle tree which is still done in
a work queue because I'm too lazy to make that async), and it
actually turned out to be slower than using a work queue.

I was testing with an encrypted 8GB file over ext4 mounted over a
loopback device in tmpfs.  The encryption is with xts-vaes.  It turns
out that not using a work queue actually made reading the entire file
go from 2.4s to 2.5s.

I then tried passing the whole bio (256KB per crypto request in my
test as opposed to the data unit size of 4KB per crypto request)
through using chaining to skcipher, with xts-vaes doing the requests
one-by-one.  Against my expectations, this didn't speed things up at
all (but at least it didn't slow things down either).  All the
benefits of aggregating the data were offset by the extra setup cost
of creating the chained requests.

So chaining is clearly not the way to go because it involves cutting
up into data units at the start of the process, rather than the end.

Finally I hacked up a patch (this goes on top of the skcipher branch
in cryptodev) to pass the whole bio through the Crypto API all the
way to xts-vaes which then unbundled it.  This turned out to be a
winner, taking the read time for 8GB from 2.4s down to 2.1s.

In view of this result, I'm going to throw away chaining, and instead
work on an interface that can take a whole bio (or folio), then cut
it up into the specified data unit size before processing.

The bottom-end of the interface should be able to feed two (or whatever
number you fancy) data units to the actual algorithm.

This should work just as well for compression, since their batching
input is simply a order-N folio.  The compression output is a bit
harder because the data unit size is not constant, but I think I
have a way of making it work by adding a bit to the scatterlist data
structure to indicate the end of each data unit.

PS For fsverity a 256KB bio size equates to 64 units of hash input.
My strategy is to allocate the whole thing if we can (2KB or 4KB
depending on your digest size), and if that fails, fall back to
a stack buffer of 512 bytes (or whatever number that keeps the
compiler quiet regarding stack usage).  Even if we're on the stack,
it should still give more than enough to data to satiate your
multibuffer hash code.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
diff --git a/arch/x86/crypto/aesni-intel_glue.c b/arch/x86/crypto/aesni-intel_glue.c
index 4f721760ebf1..57d149c223bd 100644
--- a/arch/x86/crypto/aesni-intel_glue.c
+++ b/arch/x86/crypto/aesni-intel_glue.c
@@ -17,6 +17,7 @@
  * Copyright 2024 Google LLC
  */
 
+#include <linux/bio.h>
 #include <linux/hardirq.h>
 #include <linux/types.h>
 #include <linux/module.h>
@@ -480,7 +481,7 @@ xts_crypt_slowpath(struct skcipher_request *req, xts_crypt_func crypt_func)
 
 /* __always_inline to avoid indirect call in fastpath */
 static __always_inline int
-xts_crypt(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
+xts_crypt_one(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
 	  xts_crypt_func crypt_func)
 {
 	struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
@@ -511,6 +512,42 @@ xts_crypt(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
 	return xts_crypt_slowpath(req, crypt_func);
 }
 
+static __always_inline int
+xts_crypt(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
+	  xts_crypt_func crypt_func)
+{
+	unsigned int du_bits = req->cryptlen;
+	unsigned int du_size = 1U << du_bits;
+	__le64 *iv = (void *)req->iv;
+	struct folio_iter fi;
+	struct bio *bio;
+	int err;
+
+	if (!(req->base.flags & CRYPTO_SKCIPHER_REQ_BIO))
+		return xts_crypt_one(req, encrypt_iv, crypt_func);
+
+	bio = (void *)req->src;
+
+	for (bio_first_folio(&fi, bio, 0); fi.folio; bio_next_folio(&fi, bio)) {
+		size_t i = fi.offset;
+
+		for (; i < fi.offset + fi.length; i += du_size) {
+			skcipher_request_set_folio(req, fi.folio, i, fi.folio, i, du_size, iv);
+			err = xts_crypt_one(req, encrypt_iv, crypt_func);
+			if (err)
+				goto out;
+
+			*iv = cpu_to_le64(le64_to_cpu(*iv) + 1);
+		}
+	}
+
+out:
+	req->src = (void *)bio;
+	req->dst = (void *)bio;
+	req->cryptlen = du_bits;
+	return err;
+}
+
 static void aesni_xts_encrypt_iv(const struct crypto_aes_ctx *tweak_key,
 				 u8 iv[AES_BLOCK_SIZE])
 {
diff --git a/fs/crypto/bio.c b/fs/crypto/bio.c
index 0ad8c30b8fa5..9f52dc7f7889 100644
--- a/fs/crypto/bio.c
+++ b/fs/crypto/bio.c
@@ -7,6 +7,7 @@
  * Copyright (C) 2015, Motorola Mobility
  */
 
+#include <crypto/skcipher.h>
 #include <linux/pagemap.h>
 #include <linux/module.h>
 #include <linux/bio.h>
@@ -30,16 +31,49 @@
  */
 bool fscrypt_decrypt_bio(struct bio *bio)
 {
+	struct folio *folio = bio_first_folio_all(bio);
+	const struct inode *inode = folio->mapping->host;
+	const struct fscrypt_inode_info *ci = inode->i_crypt_info;
+	const unsigned int du_bits = ci->ci_data_unit_bits;
+	struct crypto_skcipher *tfm = ci->ci_enc_key.tfm;
+	SKCIPHER_REQUEST_ON_STACK(req, tfm, sizeof(bio));
+	struct bio **ctx = skcipher_request_extra(req);
+	DECLARE_CRYPTO_WAIT(wait);
 	struct folio_iter fi;
+	union fscrypt_iv iv;
+	u64 index;
+	int err;
 
-	bio_for_each_folio_all(fi, bio) {
-		int err = fscrypt_decrypt_pagecache_blocks(fi.folio, fi.length,
-							   fi.offset);
+	*ctx = bio;
 
-		if (err) {
-			bio->bi_status = errno_to_blk_status(err);
-			return false;
-		}
+	bio_first_folio(&fi, bio, 0);
+	if (!fi.folio)
+		return true;
+
+	index = fi.offset;
+	index = ((u64)fi.folio->index << (PAGE_SHIFT - du_bits)) +
+		(index >> du_bits);
+	fscrypt_generate_iv(&iv, index, ci);
+
+	skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG |
+					   CRYPTO_SKCIPHER_REQ_BIO,
+				      NULL, NULL);
+	skcipher_request_set_crypt(req, (struct scatterlist *)bio,
+				   (struct scatterlist *)bio, du_bits, &iv);
+
+	err = crypto_skcipher_decrypt(req);
+	if (err == -EAGAIN) {
+		req = SKCIPHER_REQUEST_CLONE(req, GFP_ATOMIC);
+		skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG |
+						   CRYPTO_SKCIPHER_REQ_BIO,
+					      crypto_req_done, &wait);
+		err = crypto_skcipher_decrypt(req);
+	}
+	err = crypto_wait_req(err, &wait);
+	skcipher_request_free(req);
+	if (err) {
+		bio->bi_status = errno_to_blk_status(err);
+		return false;
 	}
 	return true;
 }
diff --git a/include/crypto/skcipher.h b/include/crypto/skcipher.h
index e159ea68124e..931585f864d1 100644
--- a/include/crypto/skcipher.h
+++ b/include/crypto/skcipher.h
@@ -26,6 +26,8 @@
 #define CRYPTO_SKCIPHER_REQ_CONT	0x00000001
 /* Set this bit if the skcipher operation is not final. */
 #define CRYPTO_SKCIPHER_REQ_NOTFINAL	0x00000002
+/* Set this bit if the skcipher is made of bio. */
+#define CRYPTO_SKCIPHER_REQ_BIO		0x00000004
 
 /**
  *	struct skcipher_request - Symmetric key cipher request

^ permalink raw reply related	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.15
  2024-12-14  9:21                                                       ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
  2024-12-14 17:18                                                         ` pr-tracker-bot
@ 2025-03-31  4:50                                                         ` Herbert Xu
  2025-04-05  2:23                                                           ` Herbert Xu
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-31  4:50 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 99585c2192cb1ce212876e82ef01d1c98c7f4699:

  crypto: testmgr - Add multibuffer acomp testing (2025-03-22 07:25:19 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.15-p2 v6.15-p2

for you to fetch changes up to 9764d5b0cd0ea4846fd46c7d0b4238ea122075a9:

  Revert "crypto: testmgr - Add multibuffer hash testing" (2025-03-30 09:39:57 +0800)

----------------------------------------------------------------
This push fixes reverts the multibuffer hash testing as it is buggy.
----------------------------------------------------------------

Herbert Xu (1):
      Revert "crypto: testmgr - Add multibuffer hash testing"

 crypto/testmgr.c | 157 +++++++++----------------------------------------------
 1 file changed, 24 insertions(+), 133 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-03-30  2:33                                                                       ` Chaining is dead Herbert Xu
@ 2025-03-31 16:56                                                                         ` Eric Biggers
  2025-04-01  2:44                                                                           ` Herbert Xu
                                                                                             ` (2 more replies)
  0 siblings, 3 replies; 204+ messages in thread
From: Eric Biggers @ 2025-03-31 16:56 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Sun, Mar 30, 2025 at 10:33:23AM +0800, Herbert Xu wrote:
> On Wed, Mar 26, 2025 at 11:52:05AM +0800, Herbert Xu wrote:
> >
> > they don't need it.  Take ext4 as an example:
> > 
> > 	ext4 calls verity
> > 	schedule_work(verity_work);
> > 	return asynchronously!
> > 
> > verity_work:
> > 	do the crypto work
> > 	__read_end_io(bio);
> 
> I went ahead and removed the work queue for fsverity and fscrypt
> (except for the reading of the Merkle tree which is still done in
> a work queue because I'm too lazy to make that async), and it
> actually turned out to be slower than using a work queue.
> 
> I was testing with an encrypted 8GB file over ext4 mounted over a
> loopback device in tmpfs.  The encryption is with xts-vaes.  It turns
> out that not using a work queue actually made reading the entire file
> go from 2.4s to 2.5s.
> 
> I then tried passing the whole bio (256KB per crypto request in my
> test as opposed to the data unit size of 4KB per crypto request)
> through using chaining to skcipher, with xts-vaes doing the requests
> one-by-one.  Against my expectations, this didn't speed things up at
> all (but at least it didn't slow things down either).  All the
> benefits of aggregating the data were offset by the extra setup cost
> of creating the chained requests.

Yes, your chaining API has poor performance and is difficult to test, as I've
been saying all along.

> So chaining is clearly not the way to go because it involves cutting
> up into data units at the start of the process, rather than the end.

Certainly agreed that chaining is not the way to go, but I think you're
overlooking that Linus's suggestion to use the libraries directly would also
solve this, while also not being restricted to bios and folios (note that not
all filesystems are block-based, for example...).  That would avoid the
per-request overhead from the generic crypto infrastructure, which is the real
source of the problem.

> Finally I hacked up a patch (this goes on top of the skcipher branch
> in cryptodev) to pass the whole bio through the Crypto API all the
> way to xts-vaes which then unbundled it.  This turned out to be a
> winner, taking the read time for 8GB from 2.4s down to 2.1s.
> 
> In view of this result, I'm going to throw away chaining, and instead
> work on an interface that can take a whole bio (or folio), then cut
> it up into the specified data unit size before processing.
> 
> The bottom-end of the interface should be able to feed two (or whatever
> number you fancy) data units to the actual algorithm.
> 
> This should work just as well for compression, since their batching
> input is simply a order-N folio.  The compression output is a bit
> harder because the data unit size is not constant, but I think I
> have a way of making it work by adding a bit to the scatterlist data
> structure to indicate the end of each data unit.
> 
> PS For fsverity a 256KB bio size equates to 64 units of hash input.
> My strategy is to allocate the whole thing if we can (2KB or 4KB
> depending on your digest size), and if that fails, fall back to
> a stack buffer of 512 bytes (or whatever number that keeps the
> compiler quiet regarding stack usage).  Even if we're on the stack,
> it should still give more than enough to data to satiate your
> multibuffer hash code.

Extending the generic crypto infrastructure to support bios and folios is an
interesting idea.

But TBH I think it's worse than Linus's suggestion of just extending lib/crypto/
to support the needed functionality and using that directly.  Your proposal is
again solving a problem created by the generic crypto infrastructure being too
complex, by making the generic crypto infrastructure even more complex.

With the bio and folio support in the generic crypto infrastructure, there would
be lots of work to do with adding support in all the underlying algorithms, and
adding tests for all the new APIs.

For hashing, users would need to allocate an array to hold the digest for every
block in the bio or folio.  That would add an additional memory allocation to
every I/O.  You said you'd like to fall back to a smaller buffer if the memory
allocation fails.  But that's silly; if we have to support that anyway, we might
as well do it that way only.  In which case the bio interface is pointless.

Also note that the kernel also *already* has an abstraction layer that allows
doing en/decryption on bios.  It's called blk-crypto, and it makes it possible
to do the en/decryption using either inline encryption hardware (i.e., the newer
style of crypto accelerator that is actually commonly used and doesn't use the
Crypto API at all) or the Crypto API.  I have plans to remove the fs-layer bio
en/decryption code from fscrypt and always use blk-crypto instead.

Adding bio support to the Crypto API feels duplicative of blk-crypto, and we'd
end up with too many abstraction layers.  I think my preferred approach is that
blk-crypto-fallback would directly call the library functions.  The legacy
Crypto API really has no useful role to play anymore.

FWIW, there are also people thinking about developing inline hashing hardware,
in which case something similar would apply to blk-integrity.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-03-31 16:56                                                                         ` Eric Biggers
@ 2025-04-01  2:44                                                                           ` Herbert Xu
  2025-04-01  3:33                                                                             ` Eric Biggers
  2025-04-01  3:30                                                                           ` Herbert Xu
  2025-04-04  8:46                                                                           ` Christoph Hellwig
  2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-04-01  2:44 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
>
> With the bio and folio support in the generic crypto infrastructure, there would
> be lots of work to do with adding support in all the underlying algorithms, and
> adding tests for all the new APIs.

It doesn't need to be all that complex.  My plan is to add a fallback
template at the top, which could then be implemented by strategic
algorithms at the bottom through an extension of the skcipher walk
mechanism.

So you'd allocate "fscrypt(xts(aes))" instead of "xts(aes)", and
the xts-vaes code could simply use the normal skcipher walker with
zero changes.  The only changes needed in the aesni module is to
hook up the xts code to the new "fscrypt(xts(aes))" algorithm.

The real reason why I think this is the way to go is that the same
speed-up would apply everywhere.  So just as I could gain a 15%
speed-up with xts in fscrypt without any actual multibuffer code,
a similar speed-up is expected with gcm in networking.  In fact
if anything the speed-up could be greater there because the data
unit size is smaller at under 1500 bytes.

You see the Crypto API as the problem here, but for me the problem
is the legacy data unit size.  It's 2025 and there is no reason why
anyone should be dealing with units of 1500 or 4096 bytes.

> For hashing, users would need to allocate an array to hold the digest for every
> block in the bio or folio.  That would add an additional memory allocation to
> every I/O.  You said you'd like to fall back to a smaller buffer if the memory
> allocation fails.  But that's silly; if we have to support that anyway, we might
> as well do it that way only.  In which case the bio interface is pointless.

Sure if you decide to go down the lib/crypto route then there is
no gain.  All it means is that you can't support hardware offload,
but neither of us really care about that.

> Also note that the kernel also *already* has an abstraction layer that allows
> doing en/decryption on bios.  It's called blk-crypto, and it makes it possible
> to do the en/decryption using either inline encryption hardware (i.e., the newer
> style of crypto accelerator that is actually commonly used and doesn't use the
> Crypto API at all) or the Crypto API.  I have plans to remove the fs-layer bio
> en/decryption code from fscrypt and always use blk-crypto instead.

Thanks for the pointer, I wasn't aware of its existence.  Yes
there should definitely be only one code path for this.  So
what's stopping you from removing fscrypt right now? IOW what's
missing from blk-crypto?

> Adding bio support to the Crypto API feels duplicative of blk-crypto, and we'd
> end up with too many abstraction layers.  I think my preferred approach is that
> blk-crypto-fallback would directly call the library functions.  The legacy
> Crypto API really has no useful role to play anymore.

I'd certainly like to see that :)

> FWIW, there are also people thinking about developing inline hashing hardware,
> in which case something similar would apply to blk-integrity.

Offloading a whole bio rather than a page or two is definitely
the way to go.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-03-31 16:56                                                                         ` Eric Biggers
  2025-04-01  2:44                                                                           ` Herbert Xu
@ 2025-04-01  3:30                                                                           ` Herbert Xu
  2025-04-01  3:39                                                                             ` Eric Biggers
  2025-04-04  8:46                                                                           ` Christoph Hellwig
  2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-04-01  3:30 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
>
> For hashing, users would need to allocate an array to hold the digest for every
> block in the bio or folio.  That would add an additional memory allocation to
> every I/O.  You said you'd like to fall back to a smaller buffer if the memory
> allocation fails.  But that's silly; if we have to support that anyway, we might
> as well do it that way only.  In which case the bio interface is pointless.

BTW, the existing verity code is hilarious.  In my test, for each
256KB bio, it was dividing them up into 4KB pages, and then for each
one of them, it's looking up the correct hash in the Merkle tree.

Surely there is some locality here so if you zoom out from 4KB (or
even 8KB with your multibuffer patch-set) to 256KB you could get all
the correct hashes in one go, rather than 64 times.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-04-01  2:44                                                                           ` Herbert Xu
@ 2025-04-01  3:33                                                                             ` Eric Biggers
  2025-04-01  3:55                                                                               ` Herbert Xu
  2025-04-01  7:20                                                                               ` Milan Broz
  0 siblings, 2 replies; 204+ messages in thread
From: Eric Biggers @ 2025-04-01  3:33 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Apr 01, 2025 at 10:44:34AM +0800, Herbert Xu wrote:
> Thanks for the pointer, I wasn't aware of its existence.  Yes
> there should definitely be only one code path for this.  So
> what's stopping you from removing fscrypt right now? IOW what's
> missing from blk-crypto?

Well, fscrypt (ext4/f2fs/ubifs/ceph encryption) wouldn't be removed; its
implementation would just change on ext4 and f2fs.  Instead of providing a
choice of whether to use blk-crypto or fs-layer crypto for file contents
en/decryption, ext4 and f2fs would always use blk-crypto.  Supporting code such
as fscrypt_decrypt_bio() that would become unused by that would be removed.

A few reasons I've waited so long:

- The fs-layer file contents en/decryption code was there first, and there
  hasn't been a strong need to remove it yet
- Much of the file contents en/decryption code in fs/crypto/ would still be
  needed, since ubifs and ceph still use it as they are not block-based
- It would make CONFIG_BLK_INLINE_ENCRYPTION, which adds a field to struct bio,
  required on more systems
- It would add the overhead of keyslot management to software crypto
- blk-crypto currently always uses inline encryption hardware when it's
  available; but, I'd like to preserve ext4's and f2fs's existing behavior where
  the use of inline encryption hardware is opt-in via a mount option.

But I'm thinking it's finally time, especially with the conversions of
filesystems to operate on folios that's going on.

dm-crypt could of course use blk-crypto too, but the dm people haven't been
super comfortable so far with delegating en/decryption to the block layer.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-04-01  3:30                                                                           ` Herbert Xu
@ 2025-04-01  3:39                                                                             ` Eric Biggers
  0 siblings, 0 replies; 204+ messages in thread
From: Eric Biggers @ 2025-04-01  3:39 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Apr 01, 2025 at 11:30:33AM +0800, Herbert Xu wrote:
> On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
> >
> > For hashing, users would need to allocate an array to hold the digest for every
> > block in the bio or folio.  That would add an additional memory allocation to
> > every I/O.  You said you'd like to fall back to a smaller buffer if the memory
> > allocation fails.  But that's silly; if we have to support that anyway, we might
> > as well do it that way only.  In which case the bio interface is pointless.
> 
> BTW, the existing verity code is hilarious.  In my test, for each
> 256KB bio, it was dividing them up into 4KB pages, and then for each
> one of them, it's looking up the correct hash in the Merkle tree.
> 
> Surely there is some locality here so if you zoom out from 4KB (or
> even 8KB with your multibuffer patch-set) to 256KB you could get all
> the correct hashes in one go, rather than 64 times.

Well, it looks up the bottom-level block before falling back to walking the full
path, and it's cached.  The cache lookup is fast compared to the actual hashing,
or at least traditionally has been.  You're right that it does often look up the
same block repeatedly, and that it's one of the things that needs to be better
optimized now that hashing is so fast that overheads like this become
significant.

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-04-01  3:33                                                                             ` Eric Biggers
@ 2025-04-01  3:55                                                                               ` Herbert Xu
  2025-04-01  4:08                                                                                 ` Eric Biggers
  2025-04-01  7:20                                                                               ` Milan Broz
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-04-01  3:55 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Mar 31, 2025 at 08:33:03PM -0700, Eric Biggers wrote:
>
> - It would add the overhead of keyslot management to software crypto

That seems to be a design error in blk_crypto.  Why should we
model the inadequacies of hardware in software?

If we're going through the software crypto path in blk_crypto,
it should be done as a first-clsas citizen, and not as a poor
man's version of hardware crypto.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-04-01  3:55                                                                               ` Herbert Xu
@ 2025-04-01  4:08                                                                                 ` Eric Biggers
  2025-04-01  4:14                                                                                   ` Herbert Xu
  0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-04-01  4:08 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Tue, Apr 01, 2025 at 11:55:02AM +0800, Herbert Xu wrote:
> On Mon, Mar 31, 2025 at 08:33:03PM -0700, Eric Biggers wrote:
> >
> > - It would add the overhead of keyslot management to software crypto
> 
> That seems to be a design error in blk_crypto.  Why should we
> model the inadequacies of hardware in software?
> 
> If we're going through the software crypto path in blk_crypto,
> it should be done as a first-clsas citizen, and not as a poor
> man's version of hardware crypto.

Interesting seeing this argument coming from you when the whole Crypto API is
built around forcing software crypto to use interfaces designed for hardware.

Currently the blk-crypto keyslots are "needed" even for blk-crypto-fallback
since otherwise it would be necessary to expand the key
(crypto_skcipher_setkey() in the Crypto API, or its library equivalent like
aes_expandkey() if we switch to that) for every I/O request.  The blk-crypto
interface could be reworked to support pre-expansion of the key, but that would
differ from what actual inline encryption hardware needs.  So this is just
another case where the needs of hardware vs. software diverge...

- Eric

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-04-01  4:08                                                                                 ` Eric Biggers
@ 2025-04-01  4:14                                                                                   ` Herbert Xu
  0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-01  4:14 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

On Mon, Mar 31, 2025 at 09:08:52PM -0700, Eric Biggers wrote:
>
> Interesting seeing this argument coming from you when the whole Crypto API is
> built around forcing software crypto to use interfaces designed for hardware.

Perhaps you should take your rose-coloured glasses off? :)

> aes_expandkey() if we switch to that) for every I/O request.  The blk-crypto
> interface could be reworked to support pre-expansion of the key, but that would
> differ from what actual inline encryption hardware needs.  So this is just
> another case where the needs of hardware vs. software diverge...

If we're going to converge on one interface, then it better put
the needs of software crypto first and foremost.  Now that doesn't
mean throwing out support for hardware altogether, but hardware
does need to take a backseat every now and then.

Cheers,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-04-01  3:33                                                                             ` Eric Biggers
  2025-04-01  3:55                                                                               ` Herbert Xu
@ 2025-04-01  7:20                                                                               ` Milan Broz
  1 sibling, 0 replies; 204+ messages in thread
From: Milan Broz @ 2025-04-01  7:20 UTC (permalink / raw)
  To: Eric Biggers, Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List, Mikulas Patocka

On 4/1/25 5:33 AM, Eric Biggers wrote:
> On Tue, Apr 01, 2025 at 10:44:34AM +0800, Herbert Xu wrote:
>> Thanks for the pointer, I wasn't aware of its existence.  Yes
>> there should definitely be only one code path for this.  So
>> what's stopping you from removing fscrypt right now? IOW what's
>> missing from blk-crypto?
> 
> Well, fscrypt (ext4/f2fs/ubifs/ceph encryption) wouldn't be removed; its
> implementation would just change on ext4 and f2fs.  Instead of providing a
> choice of whether to use blk-crypto or fs-layer crypto for file contents
> en/decryption, ext4 and f2fs would always use blk-crypto.  Supporting code such
> as fscrypt_decrypt_bio() that would become unused by that would be removed.
> 
> A few reasons I've waited so long:
> 
> - The fs-layer file contents en/decryption code was there first, and there
>    hasn't been a strong need to remove it yet
> - Much of the file contents en/decryption code in fs/crypto/ would still be
>    needed, since ubifs and ceph still use it as they are not block-based
> - It would make CONFIG_BLK_INLINE_ENCRYPTION, which adds a field to struct bio,
>    required on more systems
> - It would add the overhead of keyslot management to software crypto
> - blk-crypto currently always uses inline encryption hardware when it's
>    available; but, I'd like to preserve ext4's and f2fs's existing behavior where
>    the use of inline encryption hardware is opt-in via a mount option.
> 
> But I'm thinking it's finally time, especially with the conversions of
> filesystems to operate on folios that's going on.
> 
> dm-crypt could of course use blk-crypto too, but the dm people haven't been
> super comfortable so far with delegating en/decryption to the block layer.

Hi,

I cannot speak for device-mapper maintainers, but as it was me who complained about
block layer inline crypto introduction in dm-crypt, perhaps some clarification here:

I have no problem if there is a different block-layer/crypto API that guarantees
that the content of the bio is encrypted/decrypted, it could simplify dm-crypt a lot.
But it must not send plaintext to a random hardware device underneath by default
as it changes the dm-crypt threat model (and I see you mention the opt-in hw option
for fs mount as well).

However, dm-crypt also needs AEAD (authenticated encryption) support.
This is becoming important for devices that natively support additional per-sector metadata.
If we can access all these features through ublk in userspace one day, even better :)

Milan


^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: Chaining is dead
  2025-03-31 16:56                                                                         ` Eric Biggers
  2025-04-01  2:44                                                                           ` Herbert Xu
  2025-04-01  3:30                                                                           ` Herbert Xu
@ 2025-04-04  8:46                                                                           ` Christoph Hellwig
  2 siblings, 0 replies; 204+ messages in thread
From: Christoph Hellwig @ 2025-04-04  8:46 UTC (permalink / raw)
  To: Eric Biggers
  Cc: Herbert Xu, Linus Torvalds, David S. Miller,
	Linux Kernel Mailing List, Linux Crypto Mailing List,
	David Howells

On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
> > My strategy is to allocate the whole thing if we can (2KB or 4KB
> > depending on your digest size), and if that fails, fall back to
> > a stack buffer of 512 bytes (or whatever number that keeps the
> > compiler quiet regarding stack usage).  Even if we're on the stack,
> > it should still give more than enough to data to satiate your
> > multibuffer hash code.
> 
> Extending the generic crypto infrastructure to support bios and folios is an
> interesting idea.

The right way to do that is to make it work on an iov_iter.  David
Howells talked about that at LSF/MM and might even have done that work
at least at a POC level.  That way you can trivially pass in a bio
because it's just an ITER_BVEC iter, and for a folio you'd build a
single entry bvec.

The primary intent here is to avoid building the scatterlist for crypto
work in network file systems, but just about any other caller would
benefit as well, but that scatterlist isn't a good fit for any of the
callers I've looked at, it a really bad fit for software crypto and at
least once we get the new two step DMA API also a bad fit for hardware
offload.


^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.15
  2025-03-31  4:50                                                         ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
@ 2025-04-05  2:23                                                           ` Herbert Xu
  2025-04-05  3:09                                                             ` pr-tracker-bot
  2025-04-16  5:16                                                             ` Herbert Xu
  0 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-05  2:23 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 9764d5b0cd0ea4846fd46c7d0b4238ea122075a9:

  Revert "crypto: testmgr - Add multibuffer hash testing" (2025-03-30 09:39:57 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p3

for you to fetch changes up to 12e0b15b1986736af8c64b920efad00c655a3c79:

  crypto: inside-secure/eip93 - acquire lock on eip93_put_descriptor hash (2025-04-03 19:04:33 +0800)

----------------------------------------------------------------
This push fixes a race condition in the newly added eip93 driver.
----------------------------------------------------------------

Christian Marangi (1):
      crypto: inside-secure/eip93 - acquire lock on eip93_put_descriptor hash

 drivers/crypto/inside-secure/eip93/eip93-hash.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.15
  2025-04-05  2:23                                                           ` Herbert Xu
@ 2025-04-05  3:09                                                             ` pr-tracker-bot
  2025-04-16  5:16                                                             ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-05  3:09 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Sat, 5 Apr 2025 10:23:16 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p3

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a8662bcd2ff152bfbc751cab20f33053d74d0963

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.15
  2025-04-05  2:23                                                           ` Herbert Xu
  2025-04-05  3:09                                                             ` pr-tracker-bot
@ 2025-04-16  5:16                                                             ` Herbert Xu
  2025-04-16 15:24                                                               ` pr-tracker-bot
  2025-04-24  9:07                                                               ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-16  5:16 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 0af2f6be1b4281385b618cb86ad946eded089ac8:

  Linux 6.15-rc1 (2025-04-06 13:11:33 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p4

for you to fetch changes up to b2e689baf220408aff8ee5dfb4edb0817e1632bb:

  crypto: ahash - Disable request chaining (2025-04-12 09:33:09 +0800)

----------------------------------------------------------------
This push fixes the following issues:

- Disable ahash request chaining as it causes problems with the sa2ul driver.
- Fix a couple of bugs in the new scomp stream freeing code.
- Fix an old caam refcount underflow that is possibly showing up now
  because of the new parallel self-tests.
- Fix regression in the tegra driver.
----------------------------------------------------------------

Akhil R (1):
      crypto: tegra - Fix IV usage for AES ECB

Herbert Xu (4):
      crypto: scomp - Fix null-pointer deref when freeing streams
      crypto: caam/qi - Fix drv_ctx refcount bug
      crypto: scomp - Fix wild memory accesses in scomp_free_streams
      crypto: ahash - Disable request chaining

 crypto/ahash.c                      | 76 +------------------------------------
 crypto/scompress.c                  | 10 +++--
 drivers/crypto/caam/qi.c            |  6 +--
 drivers/crypto/tegra/tegra-se-aes.c |  5 +--
 include/crypto/hash.h               |  6 ++-
 include/crypto/internal/hash.h      |  2 +-
 6 files changed, 18 insertions(+), 87 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.15
  2025-04-16  5:16                                                             ` Herbert Xu
@ 2025-04-16 15:24                                                               ` pr-tracker-bot
  2025-04-24  9:07                                                               ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-16 15:24 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 16 Apr 2025 13:16:27 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p4

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c62f4b82d57155f35befb5c8bbae176614b87623

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.15
  2025-04-16  5:16                                                             ` Herbert Xu
  2025-04-16 15:24                                                               ` pr-tracker-bot
@ 2025-04-24  9:07                                                               ` Herbert Xu
  2025-04-24 16:29                                                                 ` pr-tracker-bot
  2025-04-30  2:47                                                                 ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-24  9:07 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit b2e689baf220408aff8ee5dfb4edb0817e1632bb:

  crypto: ahash - Disable request chaining (2025-04-12 09:33:09 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p5

for you to fetch changes up to 8006aff15516a170640239c5a8e6696c0ba18d8e:

  crypto: atmel-sha204a - Set hwrng quality to lowest possible (2025-04-23 09:32:57 +0800)

----------------------------------------------------------------
This push fixes the following issues:

- Revert acomp multibuffer tests which were buggy.
- Fix off-by-one regression in new scomp code.
- Lower quality setting on atmel-sha204a as it may not be random.
----------------------------------------------------------------

Herbert Xu (2):
      Revert "crypto: testmgr - Add multibuffer acomp testing"
      crypto: scomp - Fix off-by-one bug when calculating last page

Marek Behún (1):
      crypto: atmel-sha204a - Set hwrng quality to lowest possible

 crypto/scompress.c             |  10 +--
 crypto/testmgr.c               | 145 ++++++++++++++++++-----------------------
 drivers/crypto/atmel-sha204a.c |   6 ++
 3 files changed, 74 insertions(+), 87 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.15
  2025-04-24  9:07                                                               ` Herbert Xu
@ 2025-04-24 16:29                                                                 ` pr-tracker-bot
  2025-04-30  2:47                                                                 ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-24 16:29 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Thu, 24 Apr 2025 17:07:01 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p5

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/288537d9c9364356a4b2f6bd947f2e89cdaa353e

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.15
  2025-04-24  9:07                                                               ` Herbert Xu
  2025-04-24 16:29                                                                 ` pr-tracker-bot
@ 2025-04-30  2:47                                                                 ` Herbert Xu
  2025-04-30  4:19                                                                   ` pr-tracker-bot
  2025-05-21  1:59                                                                   ` Herbert Xu
  1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-30  2:47 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit 8006aff15516a170640239c5a8e6696c0ba18d8e:

  crypto: atmel-sha204a - Set hwrng quality to lowest possible (2025-04-23 09:32:57 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p6

for you to fetch changes up to a32f1923c6d6e9e727d00558a15ec0af6639de19:

  crypto: scompress - increment scomp_scratch_users when already allocated (2025-04-25 10:33:30 +0800)

----------------------------------------------------------------
This push fixes a regression in scompress.
----------------------------------------------------------------

Sabrina Dubroca (1):
      crypto: scompress - increment scomp_scratch_users when already allocated

 crypto/scompress.c | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.15
  2025-04-30  2:47                                                                 ` Herbert Xu
@ 2025-04-30  4:19                                                                   ` pr-tracker-bot
  2025-05-21  1:59                                                                   ` Herbert Xu
  1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-30  4:19 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 30 Apr 2025 10:47:38 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p6

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/b6ea1680d0ac0e45157a819c41b46565f4616186

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

* [GIT PULL] Crypto Fixes for 6.15
  2025-04-30  2:47                                                                 ` Herbert Xu
  2025-04-30  4:19                                                                   ` pr-tracker-bot
@ 2025-05-21  1:59                                                                   ` Herbert Xu
  2025-05-21  3:15                                                                     ` pr-tracker-bot
  1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-05-21  1:59 UTC (permalink / raw)
  To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

Hi Linus:

The following changes since commit a32f1923c6d6e9e727d00558a15ec0af6639de19:

  crypto: scompress - increment scomp_scratch_users when already allocated (2025-04-25 10:33:30 +0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p7

for you to fetch changes up to b2df03ed4052e97126267e8c13ad4204ea6ba9b6:

  crypto: algif_hash - fix double free in hash_accept (2025-05-19 13:44:16 +0800)

----------------------------------------------------------------
This push fixes a regression in padata as well as an ancient
double-free bug in af_alg.
----------------------------------------------------------------

Dominik Grzegorzek (1):
      padata: do not leak refcount in reorder_work

Ivan Pravdin (1):
      crypto: algif_hash - fix double free in hash_accept

 crypto/algif_hash.c | 4 ----
 kernel/padata.c     | 3 ++-
 2 files changed, 2 insertions(+), 5 deletions(-)

Thanks,
-- 
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 204+ messages in thread

* Re: [GIT PULL] Crypto Fixes for 6.15
  2025-05-21  1:59                                                                   ` Herbert Xu
@ 2025-05-21  3:15                                                                     ` pr-tracker-bot
  0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-05-21  3:15 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
	Linux Crypto Mailing List

The pull request you sent on Wed, 21 May 2025 09:59:47 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p7

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5da472ae1f128840b27795fa461b47a85d882ce2

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 204+ messages in thread

end of thread, other threads:[~2025-05-21  3:15 UTC | newest]

Thread overview: 204+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-08-03  4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02   ` pr-tracker-bot
2020-09-10  0:34   ` Herbert Xu
2020-09-10  2:48     ` pr-tracker-bot
2020-10-26  1:11   ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2020-10-26 17:52     ` pr-tracker-bot
2020-12-27 11:32     ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2020-12-27 17:27       ` pr-tracker-bot
2021-01-08  3:54       ` Herbert Xu
2021-01-08 20:36         ` pr-tracker-bot
2021-01-18  5:13         ` Herbert Xu
2021-01-18 21:16           ` pr-tracker-bot
2021-01-25 22:36           ` Herbert Xu
2021-01-26  0:01             ` pr-tracker-bot
2021-07-08  3:09         ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2021-07-09 19:20           ` pr-tracker-bot
2021-08-17  1:36           ` Herbert Xu
2021-08-17  2:27             ` pr-tracker-bot
2021-09-29  2:38             ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
2021-09-29 14:51               ` pr-tracker-bot
2021-10-29  4:14               ` Herbert Xu
2021-10-29 17:39                 ` Linus Torvalds
2021-11-02  4:01                   ` Herbert Xu
2021-10-29 18:49                 ` pr-tracker-bot
2021-11-12 10:48                 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2021-11-12 20:42                   ` pr-tracker-bot
2021-12-22  5:13                   ` Herbert Xu
2021-12-22 19:02                     ` pr-tracker-bot
2022-02-09  2:33                     ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
2022-02-09 18:01                       ` pr-tracker-bot
2022-03-16  1:13                       ` Herbert Xu
2022-03-17 20:40                         ` pr-tracker-bot
2022-03-31  3:16                         ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12                           ` pr-tracker-bot
2022-05-20  5:41                           ` Herbert Xu
2022-05-20  6:10                             ` pr-tracker-bot
2022-05-27 11:29                           ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28  1:21                             ` pr-tracker-bot
2022-06-17  8:29                             ` Herbert Xu
2022-06-17 15:29                               ` pr-tracker-bot
2022-06-30  7:56                               ` Herbert Xu
2022-06-30 17:28                                 ` pr-tracker-bot
2022-08-31  8:55                                 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
2022-08-31 17:20                                   ` pr-tracker-bot
2022-10-17  4:38                                 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2022-10-17 17:51                                   ` pr-tracker-bot
2022-10-28  4:58                                   ` Herbert Xu
2022-10-28 17:00                                     ` Linus Torvalds
2022-11-02  9:49                                       ` Herbert Xu
2022-10-28 17:02                                     ` pr-tracker-bot
2023-01-06  9:15                                     ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2023-01-06 21:19                                       ` pr-tracker-bot
2023-03-05 10:15                                       ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2023-03-05 19:37                                         ` pr-tracker-bot
2023-05-07 13:19                                         ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
2023-05-07 18:12                                           ` pr-tracker-bot
2023-05-29  3:41                                           ` Herbert Xu
2023-05-29 11:39                                             ` pr-tracker-bot
2023-07-09 23:51                                             ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
2023-07-10 17:20                                               ` pr-tracker-bot
2023-08-21  3:37                                               ` Herbert Xu
2023-08-21  5:09                                                 ` pr-tracker-bot
2023-08-31  5:16                                                 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19                                                   ` pr-tracker-bot
2023-09-22  2:10                                                   ` Herbert Xu
2023-09-22 16:43                                                     ` pr-tracker-bot
2023-10-10  8:46                                                     ` Herbert Xu
2023-10-10 18:54                                                       ` pr-tracker-bot
2023-10-21  9:23                                                       ` Herbert Xu
2023-10-21 17:57                                                         ` pr-tracker-bot
2023-11-09  4:30                                                   ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2023-11-10  1:30                                                     ` pr-tracker-bot
2022-08-02  6:05                             ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2022-08-03  0:57                               ` pr-tracker-bot
2022-10-04  8:54                               ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2022-10-10 20:56                                 ` pr-tracker-bot
2022-12-14  8:15                                 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
2022-12-14 22:25                                   ` pr-tracker-bot
2023-02-20  5:22                                   ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
2023-02-22  2:50                                     ` pr-tracker-bot
2023-04-24  4:52                                     ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
2023-04-26 17:06                                       ` pr-tracker-bot
2023-06-29  5:06                                       ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
2023-07-01  5:04                                         ` pr-tracker-bot
2023-08-28  9:22                                         ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
2023-08-29 19:00                                           ` pr-tracker-bot
2023-11-02  6:56                                           ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03  2:34                                             ` Linus Torvalds
2023-11-03  5:52                                               ` Herbert Xu
2023-11-03  6:32                                                 ` Linus Torvalds
2023-11-06 10:00                                                   ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
2023-11-06 15:25                                                     ` Stephan Mueller
2023-11-10  9:04                                                     ` Geert Uytterhoeven
2023-11-03  2:37                                             ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
2024-01-09 22:17                                             ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38                                               ` pr-tracker-bot
2024-02-01  5:32                                               ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23                                                 ` pr-tracker-bot
2024-02-08  4:29                                                 ` Herbert Xu
2024-02-08  6:24                                                   ` pr-tracker-bot
2024-02-21  9:10                                                   ` Herbert Xu
2024-02-21 17:17                                                     ` pr-tracker-bot
2024-02-28  8:07                                                     ` Herbert Xu
2024-02-28 17:48                                                       ` pr-tracker-bot
2024-03-06  9:47                                                       ` Herbert Xu
2024-03-06 16:33                                                         ` pr-tracker-bot
2024-03-25  9:47                                                 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2024-03-25 18:18                                                   ` pr-tracker-bot
2024-05-20  3:26                                                   ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2024-05-20 16:33                                                     ` pr-tracker-bot
2024-05-29  4:17                                                     ` Herbert Xu
2024-05-29 17:11                                                       ` pr-tracker-bot
2024-06-28  0:40                                                       ` Herbert Xu
2024-06-28  1:01                                                         ` pr-tracker-bot
2024-09-23  3:08                                                     ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
2024-09-24 18:04                                                       ` pr-tracker-bot
2024-10-16  5:37                                                       ` Herbert Xu
2024-10-16 20:51                                                         ` pr-tracker-bot
2024-10-21  5:45                                                         ` Herbert Xu
2024-10-21 18:27                                                           ` pr-tracker-bot
2024-11-15 11:51                                                           ` Herbert Xu
2024-11-15 18:59                                                             ` pr-tracker-bot
2024-12-14  9:21                                                       ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
2024-12-14 17:18                                                         ` pr-tracker-bot
2025-03-31  4:50                                                         ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
2025-04-05  2:23                                                           ` Herbert Xu
2025-04-05  3:09                                                             ` pr-tracker-bot
2025-04-16  5:16                                                             ` Herbert Xu
2025-04-16 15:24                                                               ` pr-tracker-bot
2025-04-24  9:07                                                               ` Herbert Xu
2025-04-24 16:29                                                                 ` pr-tracker-bot
2025-04-30  2:47                                                                 ` Herbert Xu
2025-04-30  4:19                                                                   ` pr-tracker-bot
2025-05-21  1:59                                                                   ` Herbert Xu
2025-05-21  3:15                                                                     ` pr-tracker-bot
2024-03-15  3:04                                               ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51                                                 ` Linus Torvalds
2024-03-16  4:39                                                   ` Herbert Xu
2024-03-15 21:59                                                 ` pr-tracker-bot
2024-05-13  3:50                                                 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2024-05-13 22:12                                                   ` Linus Torvalds
2024-05-14  5:17                                                     ` Herbert Xu
2024-05-14  5:41                                                       ` Linus Torvalds
2024-05-14  6:02                                                         ` Herbert Xu
2024-05-14  6:54                                                     ` Lukas Wunner
2024-05-14 17:07                                                       ` Linus Torvalds
2024-05-13 22:38                                                   ` pr-tracker-bot
2024-07-18 13:49                                                   ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
2024-07-19 18:09                                                     ` pr-tracker-bot
2024-09-16  3:59                                                     ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
2024-09-16  4:55                                                       ` pr-tracker-bot
2024-11-18  3:18                                                       ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
2024-11-19 19:06                                                         ` pr-tracker-bot
2025-01-23 11:10                                                         ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
2025-01-24 16:05                                                           ` pr-tracker-bot
2025-03-25  5:53                                                           ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
2025-03-25 15:25                                                             ` Eric Biggers
2025-03-25 16:59                                                               ` Ard Biesheuvel
2025-03-26  1:49                                                               ` Herbert Xu
2025-03-26  2:16                                                                 ` Herbert Xu
2025-03-26  3:34                                                                   ` Eric Biggers
2025-03-26  3:52                                                                     ` Herbert Xu
2025-03-30  2:33                                                                       ` Chaining is dead Herbert Xu
2025-03-31 16:56                                                                         ` Eric Biggers
2025-04-01  2:44                                                                           ` Herbert Xu
2025-04-01  3:33                                                                             ` Eric Biggers
2025-04-01  3:55                                                                               ` Herbert Xu
2025-04-01  4:08                                                                                 ` Eric Biggers
2025-04-01  4:14                                                                                   ` Herbert Xu
2025-04-01  7:20                                                                               ` Milan Broz
2025-04-01  3:30                                                                           ` Herbert Xu
2025-04-01  3:39                                                                             ` Eric Biggers
2025-04-04  8:46                                                                           ` Christoph Hellwig
2025-03-26  3:20                                                                 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
2025-03-26  3:30                                                                   ` Herbert Xu
2025-03-29 17:40                                                               ` Linus Torvalds
2025-03-29 18:06                                                                 ` Eric Biggers
2025-03-29 18:17                                                                   ` Linus Torvalds
2025-03-29 18:19                                                                     ` Linus Torvalds
2025-03-29 18:38                                                                       ` Eric Biggers
2025-03-29 18:52                                                                         ` Linus Torvalds
2025-03-29 18:24                                                             ` pr-tracker-bot
2020-10-12  3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2020-10-13 16:24   ` pr-tracker-bot
2020-12-14  5:55   ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2020-12-14 20:56     ` pr-tracker-bot
2021-02-15  2:47     ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
2021-02-22  1:28       ` pr-tracker-bot
2021-04-26 12:32       ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
2021-04-26 15:59         ` pr-tracker-bot
2021-06-28 11:00         ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
2021-06-28 23:36           ` pr-tracker-bot
2021-08-30  8:28           ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
2021-08-30 20:17             ` pr-tracker-bot
2021-11-02  3:52             ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
2021-11-02  4:27               ` pr-tracker-bot
2022-01-11  2:04               ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
2022-01-11 20:53                 ` pr-tracker-bot
2022-03-20 23:42                 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
2022-03-21 23:14                   ` Linus Torvalds
2022-03-22  5:49                     ` Herbert Xu
2022-03-21 23:18                   ` pr-tracker-bot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox