* [GIT PULL] Crypto Update for 5.9
@ 2020-08-03 4:40 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
` (2 more replies)
0 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2020-08-03 4:40 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Add support for allocating transforms on a specific NUMA Node.
- Introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY for storage users.
Algorithms:
- Drop PMULL based ghash on arm64.
- Fixes for building with clang on x86.
- Add sha256 helper that does the digest in one go.
- Add SP800-56A rev 3 validation checks to dh.
Drivers:
- Permit users to specify NUMA node in hisilicon/zip.
- Add support for i.MX6 in imx-rngc.
- Add sa2ul crypto driver.
- Add BA431 hwrng driver.
- Add Ingenic JZ4780 and X1000 hwrng driver.
- Spread IRQ affinity in inside-secure and marvell/cesa.
There may be a conflict with the tip tree because of the removal
of arch/x86/include/asm/inst.h. This file was previously only used
by the Crypto API and just as we stopped using it the tip tree
started using it. So taking the version from the tip tree should
do the trick.
There is also a conflit witht the jc_docs tree due to unrelated
changes to the same file. The resolution should be straightforward.
The following changes since commit e04ec0de61c1eb9693179093e83ab8ca68a30d08:
padata: upgrade smp_mb__after_atomic to smp_mb in padata_do_serial (2020-06-18 17:09:54 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 3cbfe80737c18ac6e635421ab676716a393d3074:
crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR (2020-07-31 18:25:29 +1000)
----------------------------------------------------------------
Alexander A. Klimov (2):
hwrng: ks-sa - Replace HTTP links with HTTPS ones
crypto: Replace HTTP links with HTTPS ones
Andrei Botila (1):
crypto: caam/qi2 - add support for dpseci_reset()
Andrey Smirnov (1):
crypto: caam - add clock info for VFxxx SoCs
Ard Biesheuvel (20):
crypto: arm64/ghash - drop PMULL based shash
crypto: arm64/gcm - disentangle ghash and gcm setkey() routines
crypto: arm64/gcm - use variably sized key struct
crypto: arm64/gcm - use inline helper to suppress indirect calls
crypto: arm/ghash - use variably sized key struct
crypto: amlogic-gxl - default to build as module
crypto: amlogic-gxl - permit async skcipher as fallback
crypto: omap-aes - permit asynchronous skcipher as fallback
crypto: sun4i - permit asynchronous skcipher as fallback
crypto: sun8i-ce - permit asynchronous skcipher as fallback
crypto: sun8i-ss - permit asynchronous skcipher as fallback
crypto: ccp - permit asynchronous skcipher as fallback
crypto: chelsio - permit asynchronous skcipher as fallback
crypto: mxs-dcp - permit asynchronous skcipher as fallback
crypto: picoxcell - permit asynchronous skcipher as fallback
crypto: qce - permit asynchronous skcipher as fallback
crypto: sahara - permit asynchronous skcipher as fallback
crypto: mediatek - use AES library for GCM key derivation
crypto: x86/chacha-sse3 - use unaligned loads for state array
crypto: xts - Replace memcpy() invocation with simple assignment
Arnd Bergmann (1):
crypto: x86/crc32c - fix building with clang ias
Barry Song (2):
crypto: api - permit users to specify numa node of acomp hardware
crypto: hisilicon/zip - permit users to specify NUMA node
Christophe JAILLET (2):
crypto: chelsio - Avoid some code duplication
crypto: chelsio - Fix some pr_xxx messages
Colin Ian King (4):
crypto: caam/qi2 - remove redundant assignment to ret
crypto: ccp - remove redundant assignment to variable ret
crypto: img-hash - remove redundant initialization of variable err
hwrng: core - remove redundant initialization of variable ret
Dan Carpenter (1):
crypto: hisilicon - allow smaller reads in debugfs
Dan Douglass (1):
crypto: caam/jr - remove incorrect reference to caam_jr_register()
Daniel Jordan (6):
padata: remove start function
padata: remove stop function
padata: inline single call of pd_setup_cpumasks()
padata: remove effective cpumasks from the instance
padata: fold padata_alloc_possible() into padata_alloc()
padata: remove padata_parallel_queue
Dinghao Liu (1):
crypto: sun8i-ce - Fix runtime PM imbalance in sun8i_ce_cipher_init
Eric Biggers (14):
crc-t10dif: use fallback in initial state
crc-t10dif: clean up some more things
crypto: sparc - rename sha256 to sha256_alg
crypto: lib/sha256 - add sha256() function
efi: use sha256() instead of open coding
mptcp: use sha256() instead of open coding
ASoC: cros_ec_codec: use sha256() instead of open coding
crypto: geniv - remove unneeded arguments from aead_geniv_alloc()
crypto: seqiv - remove seqiv_create()
crypto: algapi - use common mechanism for inheriting flags
crypto: algapi - add NEED_FALLBACK to INHERITED_FLAGS
crypto: algapi - introduce the flag CRYPTO_ALG_ALLOCATES_MEMORY
crypto: xts - prefix function and struct names with "xts"
crypto: lrw - prefix function and struct names with "lrw"
Fenghua Yu (1):
crypto: hisilicon/qm - Change type of pasid to u32
Franck LENORMAND (1):
crypto: caam - remove deadcode on 32-bit platforms
Geert Uytterhoeven (1):
hwrng: ba431 - HW_RANDOM_BA431 should not default to y
Gilad Ben-Yossef (3):
crypto: ccree - fix resource leak on error path
crypto: ccree - adapt ccree essiv support to kcapi
crypto: ccree - remove unused field
Giovanni Cabiddu (6):
crypto: qat - convert to SPDX License Identifiers
crypto: qat - remove packed attribute in etr structs
crypto: qat - allow xts requests not multiple of block
crypto: qat - validate xts key
crypto: qat - remove unused field in skcipher ctx
crypto: qat - fallback for xts with 192 bit keys
Gustavo A. R. Silva (1):
crypto: sa2ul - Fix inconsistent IS_ERR and PTR_ERR
Herbert Xu (25):
crypto: algif_aead - Only wake up when ctx->more is zero
crc-t10dif: Fix potential crypto notify dead-lock
crypto: caam - Fix argument type in handle_imx6_err005766
crypto: octeontx - Fix sparse warnings
crypto: omap-des - Fix sparse/compiler warnings
crypto: omap-sham - Fix sparse/compiler warnings
crypto: api - Prune inclusions in crypto.h
crypto: cpt - Fix sparse warnings
Merge branch 'ux500'
hwrng: npcm - Fix W=1 unused variable warning
hwrng: omap - Fix W=1 unused variable warning
hwrng: hisi - Fix W=1 unused variable warning
hwrng: bcm2835 - Fix W=1 unused variable warning
hwrng: st - Fix W=1 unused variable warning
hwrng: pic32 - Fix W=1 unused variable warning
hwrng: octeon - Fix sparse warnings
hwrng: ba431 - Add dependency on HAS_IOMEM
crypto: af_alg - Fix regression on empty requests
crypto: ccp - Fix sparse warnings
crypto: caam - Remove broken arc4 support
hwrng: ba431 - Include kernel.h
crypto: lib/chacha20poly1305 - Add missing function declaration
crypto: ccp - Silence strncpy warning
crypto: omap-aes - Fix sparse and compiler warnings
crypto: x86/curve25519 - Remove unused carry variables
Horia Geantă (8):
crypto: caam/qi2 - fix return code in ahash_finup_no_ctx()
dt-bindings: rng: add RNGB compatibles for i.MX6 SoCs
hwrng: imx-rngc - enable driver for i.MX6
crypto: caam/qi2 - fix error reporting for caam_hash_alloc
crypto: caam/qi2 - create ahash shared descriptors only once
crypto: caam - silence .setkey in case of bad key length
crypto: caam - add more RNG hw error codes
crypto: caam/qi2 - add module alias
Hui Tang (2):
crypto: hisilicon/hpre - HPRE_OVERTIME_THRHLD can be written by debugfs
crypto: hisilicon/hpre - disable FLR triggered by hardware
Jian Cai (1):
crypto: aesni - add compatibility with IAS
John Allen (1):
crypto: ccp - Fix use of merged scatterlists
Kai Ye (2):
crypto: hisilicon/sec2 - clear SEC debug regs
crypto:hisilicon/sec2 - update busy processing logic
Keerthy (4):
dt-bindings: crypto: Add TI SA2UL crypto accelerator documentation
crypto: sa2ul - Add crypto driver
crypto: sa2ul - add sha1/sha256/sha512 support
crypto: sa2ul - Add AEAD algorithm support
Lee Jones (1):
crypto: ux500/hash - Add namespacing to hash_init()
Longfang Liu (4):
crypto: hisilicon - update SEC driver module parameter
crypto: hisilicon/sec2 - update SEC initialization and reset
crypto: hisilicon/sec2 - update debugfs interface parameters
crypto: hisilicon/sec2 - fix some coding styles
Marcelo Henrique Cerri (1):
lib/mpi: Add mpi_sub_ui()
Meng Yu (4):
crypto: hisilicon/hpre - Init the value of current_q of debugfs
crypto: hisilicon/hpre - Modify the Macro definition and format
crypto: hisilicon/hpre - Add a switch in sriov_configure
crypto: hisilicon/hpre - update debugfs interface parameters
Mikulas Patocka (3):
crypto: cpt - don't sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified
crypto: hisilicon - don't sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified
crypto: drivers - set the flag CRYPTO_ALG_ALLOCATES_MEMORY
Olivier Sobrie (2):
dt-bindings: rng: document Silex Insight BA431 hwrng
hwrng: ba431 - add support for BA431 hwrng
Randy Dunlap (3):
crypto: hash - drop duplicated word in a comment
crypto: skcipher - drop duplicated word in kernel-doc
crypto: testmgr - delete duplicated words
Rikard Falkeborn (4):
hwrng: bcm2835 - Constify bcm2835_rng_devtype[]
hwrng: nomadik - Constify nmk_rng_ids[]
hwrng: virtio - Constify id_table[]
crypto: virtio - constify features[] and id_table[]
Sedat Dilek (1):
crypto: aesni - Fix build with LLVM_IAS=1
Sivaprakash Murugesan (3):
crypto: qce - support zero length test vectors
crypto: qce - re-initialize context on import
crypto: qce/sha - Do not modify scatterlist passed along with request
Stephan Müller (4):
crypto: ecdh - check validity of Z before export
crypto: dh - check validity of Z before export
crypto: dh - SP800-56A rev 3 local public key validation
crypto: ecc - SP800-56A rev 3 local public key validation
Sven Auhagen (2):
crypto: inside-secure - irq balance
crypto: marvell/cesa - irq balance
Tero Kristo (1):
crypto: sa2ul - add device links to child devices
Tom Lendacky (1):
crypto: ccp - Update CCP driver maintainer information
Tom Rix (1):
crypto: qat - fix double free in qat_uclo_create_batch_init_list
Uros Bizjak (2):
crypto: x86 - Remove include/asm/inst.h
crypto: x86 - Put back integer parts of include/asm/inst.h
Vaibhav Gupta (1):
crypto: ccp - use generic power management
Wojciech Ziemba (5):
crypto: qat - replace user types with kernel u types
crypto: qat - replace user types with kernel ABI __u types
crypto: qat - update fw init admin msg
crypto: qat - send admin messages to set of AEs
crypto: qat - update timeout logic in put admin msg
Zhangfei Gao (1):
crypto: hisilicon - fix strncpy warning with strscpy
周琰杰 (Zhou Yanjie) (2):
dt-bindings: RNG: Add Ingenic RNG bindings.
crypto: ingenic - Add hardware RNG for Ingenic JZ4780 and X1000
Documentation/core-api/padata.rst | 18 +-
Documentation/crypto/api-intro.txt | 2 +-
Documentation/crypto/userspace-if.rst | 4 +-
Documentation/devicetree/bindings/crypto/ti,sa2ul.yaml | 76 +++++
Documentation/devicetree/bindings/rng/imx-rng.txt | 3 +
Documentation/devicetree/bindings/rng/ingenic,rng.yaml | 36 +++
Documentation/devicetree/bindings/rng/silex-insight,ba431-rng.yaml | 36 +++
MAINTAINERS | 9 +
arch/arm/crypto/crc32-ce-core.S | 2 +-
arch/arm/crypto/ghash-ce-glue.c | 51 ++-
arch/arm/crypto/sha1-armv4-large.S | 2 +-
arch/arm/crypto/sha256-armv4.pl | 2 +-
arch/arm/crypto/sha256-core.S_shipped | 2 +-
arch/arm/crypto/sha512-armv4.pl | 4 +-
arch/arm/crypto/sha512-core.S_shipped | 4 +-
arch/arm64/crypto/ghash-ce-glue.c | 257 ++++++---------
arch/sparc/crypto/sha256_glue.c | 14 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 15 +-
arch/x86/crypto/aesni-intel_asm.S | 739 +++++++++++++++++++++---------------------
arch/x86/crypto/aesni-intel_avx-x86_64.S | 1 -
arch/x86/crypto/chacha-ssse3-x86_64.S | 16 +-
arch/x86/crypto/chacha_glue.c | 17 +-
arch/x86/crypto/crc32-pclmul_asm.S | 47 ++-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 7 +-
arch/x86/crypto/curve25519-x86_64.c | 6 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 17 +-
arch/x86/include/asm/inst.h | 163 ----------
crypto/Kconfig | 46 +--
crypto/acompress.c | 8 +
crypto/adiantum.c | 14 +-
crypto/af_alg.c | 11 +-
crypto/algapi.c | 21 +-
crypto/algif_aead.c | 4 +-
crypto/algif_skcipher.c | 4 +-
crypto/api.c | 24 +-
crypto/authenc.c | 14 +-
crypto/authencesn.c | 14 +-
crypto/blake2b_generic.c | 2 +-
crypto/camellia_generic.c | 2 +-
crypto/ccm.c | 33 +-
crypto/chacha20poly1305.c | 14 +-
crypto/cmac.c | 5 +-
crypto/cryptd.c | 59 ++--
crypto/ctr.c | 17 +-
crypto/cts.c | 13 +-
crypto/dh.c | 38 +++
crypto/ecc.c | 44 ++-
crypto/ecc.h | 14 +
crypto/echainiv.c | 2 +-
crypto/essiv.c | 11 +-
crypto/gcm.c | 40 +--
crypto/geniv.c | 19 +-
crypto/hmac.c | 5 +-
crypto/internal.h | 23 +-
crypto/jitterentropy.c | 4 +-
crypto/lrw.c | 134 ++++----
crypto/pcrypt.c | 31 +-
crypto/rsa-pkcs1pad.c | 13 +-
crypto/salsa20_generic.c | 4 +-
crypto/seqiv.c | 18 +-
crypto/sha3_generic.c | 2 +-
crypto/simd.c | 6 +-
crypto/skcipher.c | 13 +-
crypto/testmgr.h | 10 +-
crypto/vmac.c | 5 +-
crypto/xcbc.c | 5 +-
crypto/xts.c | 154 +++++----
drivers/char/hw_random/Kconfig | 27 +-
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/ba431-rng.c | 235 ++++++++++++++
drivers/char/hw_random/bcm2835-rng.c | 5 +-
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/hisi-rng.c | 2 +-
drivers/char/hw_random/ingenic-rng.c | 154 +++++++++
drivers/char/hw_random/ks-sa-rng.c | 2 +-
drivers/char/hw_random/nomadik-rng.c | 2 +-
drivers/char/hw_random/npcm-rng.c | 2 +-
drivers/char/hw_random/octeon-rng.c | 6 +-
drivers/char/hw_random/omap-rng.c | 11 +-
drivers/char/hw_random/pic32-rng.c | 2 +-
drivers/char/hw_random/st-rng.c | 3 +-
drivers/char/hw_random/virtio-rng.c | 2 +-
drivers/crypto/Kconfig | 19 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 46 +--
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 3 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 42 +--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 12 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 8 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 39 +--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 12 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 26 +-
drivers/crypto/amlogic/Kconfig | 2 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 27 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl.h | 3 +-
drivers/crypto/axis/artpec6_crypto.c | 20 +-
drivers/crypto/bcm/cipher.c | 72 +++--
drivers/crypto/caam/caamalg.c | 37 +--
drivers/crypto/caam/caamalg_qi.c | 8 +-
drivers/crypto/caam/caamalg_qi2.c | 42 ++-
drivers/crypto/caam/caamhash.c | 2 +-
drivers/crypto/caam/compat.h | 1 -
drivers/crypto/caam/ctrl.c | 12 +-
drivers/crypto/caam/dpseci.c | 18 ++
drivers/crypto/caam/dpseci.h | 2 +
drivers/crypto/caam/dpseci_cmd.h | 1 +
drivers/crypto/caam/error.c | 3 +
drivers/crypto/caam/jr.c | 3 +-
drivers/crypto/caam/regs.h | 11 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 28 +-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 24 +-
drivers/crypto/cavium/cpt/request_manager.h | 26 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 16 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 1 +
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 1 +
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 34 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 2 +
drivers/crypto/ccp/ccp-crypto-des3.c | 1 +
drivers/crypto/ccp/ccp-crypto-sha.c | 4 +-
drivers/crypto/ccp/ccp-crypto.h | 4 +-
drivers/crypto/ccp/ccp-dev-v5.c | 8 +-
drivers/crypto/ccp/ccp-dev.c | 4 +-
drivers/crypto/ccp/ccp-dev.h | 13 +-
drivers/crypto/ccp/ccp-ops.c | 43 ++-
drivers/crypto/ccp/sp-dev.c | 6 +-
drivers/crypto/ccp/sp-dev.h | 6 +-
drivers/crypto/ccp/sp-pci.c | 17 +-
drivers/crypto/ccp/sp-platform.c | 2 +-
drivers/crypto/ccree/cc_cipher.c | 149 ++++++---
drivers/crypto/chelsio/chcr_algo.c | 87 +++--
drivers/crypto/chelsio/chcr_crypto.h | 3 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 111 ++++---
drivers/crypto/hisilicon/qm.c | 43 +--
drivers/crypto/hisilicon/qm.h | 1 +
drivers/crypto/hisilicon/sec/sec_algs.c | 58 ++--
drivers/crypto/hisilicon/sec2/sec.h | 4 +
drivers/crypto/hisilicon/sec2/sec_crypto.c | 95 ++++--
drivers/crypto/hisilicon/sec2/sec_main.c | 132 ++++----
drivers/crypto/hisilicon/zip/zip.h | 2 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 6 +-
drivers/crypto/hisilicon/zip/zip_main.c | 5 +-
drivers/crypto/img-hash.c | 2 +-
drivers/crypto/inside-secure/safexcel.c | 13 +-
drivers/crypto/inside-secure/safexcel.h | 3 +
drivers/crypto/inside-secure/safexcel_cipher.c | 47 +++
drivers/crypto/inside-secure/safexcel_hash.c | 18 ++
drivers/crypto/ixp4xx_crypto.c | 6 +-
drivers/crypto/marvell/cesa/cesa.c | 11 +-
drivers/crypto/marvell/cesa/cesa.h | 1 +
drivers/crypto/marvell/cesa/cipher.c | 18 +-
drivers/crypto/marvell/cesa/hash.c | 6 +
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 8 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h | 2 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 51 ++-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.h | 6 +-
drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.c | 9 +-
drivers/crypto/marvell/octeontx/otx_cptvf_reqmgr.h | 24 +-
drivers/crypto/mediatek/mtk-aes.c | 63 +---
drivers/crypto/mxs-dcp.c | 33 +-
drivers/crypto/n2_core.c | 3 +-
drivers/crypto/omap-aes.c | 41 ++-
drivers/crypto/omap-aes.h | 3 +-
drivers/crypto/omap-des.c | 6 +-
drivers/crypto/omap-sham.c | 18 +-
drivers/crypto/picoxcell_crypto.c | 55 ++--
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 48 +--
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 48 +--
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 48 +--
drivers/crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 48 +--
drivers/crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 48 +--
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 48 +--
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 48 +--
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 48 +--
drivers/crypto/qat/qat_c62x/adf_drv.c | 48 +--
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 48 +--
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h | 48 +--
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 48 +--
drivers/crypto/qat/qat_common/adf_accel_devices.h | 102 ++----
drivers/crypto/qat/qat_common/adf_accel_engine.c | 52 +--
drivers/crypto/qat/qat_common/adf_admin.c | 144 ++++-----
drivers/crypto/qat/qat_common/adf_aer.c | 50 +--
drivers/crypto/qat/qat_common/adf_cfg.c | 48 +--
drivers/crypto/qat/qat_common/adf_cfg.h | 48 +--
drivers/crypto/qat/qat_common/adf_cfg_common.h | 72 +----
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 48 +--
drivers/crypto/qat/qat_common/adf_cfg_user.h | 58 +---
drivers/crypto/qat/qat_common/adf_common_drv.h | 60 +---
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 52 +--
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 56 +---
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 48 +--
drivers/crypto/qat/qat_common/adf_init.c | 48 +--
drivers/crypto/qat/qat_common/adf_isr.c | 48 +--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 49 +--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 48 +--
drivers/crypto/qat/qat_common/adf_sriov.c | 48 +--
drivers/crypto/qat/qat_common/adf_transport.c | 110 ++-----
drivers/crypto/qat/qat_common/adf_transport.h | 52 +--
drivers/crypto/qat/qat_common/adf_transport_access_macros.h | 54 +---
drivers/crypto/qat/qat_common/adf_transport_debug.c | 48 +--
drivers/crypto/qat/qat_common/adf_transport_internal.h | 75 +----
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 48 +--
drivers/crypto/qat/qat_common/adf_vf_isr.c | 48 +--
drivers/crypto/qat/qat_common/icp_qat_fw.h | 106 ++----
drivers/crypto/qat/qat_common/icp_qat_fw_init_admin.h | 145 ++++-----
drivers/crypto/qat/qat_common/icp_qat_fw_la.h | 206 +++++-------
drivers/crypto/qat/qat_common/icp_qat_fw_loader_handle.h | 48 +--
drivers/crypto/qat/qat_common/icp_qat_fw_pke.h | 100 ++----
drivers/crypto/qat/qat_common/icp_qat_hal.h | 48 +--
drivers/crypto/qat/qat_common/icp_qat_hw.h | 64 +---
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 54 +---
drivers/crypto/qat/qat_common/qat_algs.c | 211 +++++++-----
drivers/crypto/qat/qat_common/qat_asym_algs.c | 61 +---
drivers/crypto/qat/qat_common/qat_crypto.c | 48 +--
drivers/crypto/qat/qat_common/qat_crypto.h | 48 +--
drivers/crypto/qat/qat_common/qat_hal.c | 88 ++---
drivers/crypto/qat/qat_common/qat_uclo.c | 77 ++---
drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 74 +----
drivers/crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 48 +--
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 48 +--
drivers/crypto/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 48 +--
drivers/crypto/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 48 +--
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 48 +--
drivers/crypto/qce/cipher.h | 3 +-
drivers/crypto/qce/common.h | 2 +
drivers/crypto/qce/sha.c | 36 ++-
drivers/crypto/qce/skcipher.c | 43 +--
drivers/crypto/sa2ul.c | 2420 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
drivers/crypto/sa2ul.h | 403 +++++++++++++++++++++++
drivers/crypto/sahara.c | 96 +++---
drivers/crypto/talitos.c | 117 ++++---
drivers/crypto/ux500/hash/hash_core.c | 18 +-
drivers/crypto/virtio/virtio_crypto_algs.c | 3 +-
drivers/crypto/virtio/virtio_crypto_core.c | 4 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 1 +
drivers/firmware/efi/embedded-firmware.c | 9 +-
include/crypto/acompress.h | 18 ++
include/crypto/algapi.h | 25 +-
include/crypto/chacha.h | 4 -
include/crypto/chacha20poly1305.h | 2 +
include/crypto/hash.h | 2 +-
include/crypto/if_alg.h | 4 +-
include/crypto/internal/geniv.h | 2 +-
include/crypto/sha.h | 1 +
include/crypto/skcipher.h | 2 +-
include/linux/crypto.h | 41 ++-
include/linux/mpi.h | 3 +
include/linux/padata.h | 21 +-
kernel/padata.c | 177 +++-------
lib/crc-t10dif.c | 75 +++--
lib/crypto/chacha20poly1305.c | 2 -
lib/crypto/sha256.c | 10 +
lib/mpi/Makefile | 1 +
lib/mpi/mpi-sub-ui.c | 78 +++++
net/mptcp/crypto.c | 15 +-
sound/soc/codecs/cros_ec_codec.c | 27 +-
257 files changed, 6648 insertions(+), 5497 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/ti,sa2ul.yaml
create mode 100644 Documentation/devicetree/bindings/rng/ingenic,rng.yaml
create mode 100644 Documentation/devicetree/bindings/rng/silex-insight,ba431-rng.yaml
create mode 100644 drivers/char/hw_random/ba431-rng.c
create mode 100644 drivers/char/hw_random/ingenic-rng.c
create mode 100644 drivers/crypto/sa2ul.c
create mode 100644 drivers/crypto/sa2ul.h
create mode 100644 lib/mpi/mpi-sub-ui.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.9
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
@ 2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-08-03 17:55 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 3 Aug 2020 14:40:24 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ab5c60b79ab6cc50b39bbb21b2f9fb55af900b84
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.9
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
@ 2020-08-30 22:33 ` Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
` (2 more replies)
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2020-08-30 22:33 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes the following issues:
- Regression in af_alg that affects iwd.
- Restore polling delay in qat.
- Double free in ingenic on error path.
- Potential build failure in sa2ul due to missing Kconfig dependency.
The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5:
Linux 5.9-rc1 (2020-08-16 13:04:57 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c195d66a8a75c60515819b101975f38b7ec6577f:
crypto: af_alg - Work around empty control messages without MSG_MORE (2020-08-27 23:20:36 +1000)
----------------------------------------------------------------
Giovanni Cabiddu (1):
crypto: qat - add delay before polling mailbox
Herbert Xu (1):
crypto: af_alg - Work around empty control messages without MSG_MORE
Randy Dunlap (1):
crypto: sa2ul - add Kconfig selects to fix build error
Wei Yongjun (1):
crypto: ingenic - Drop kfree for memory allocated with devm_kzalloc
crypto/af_alg.c | 13 ++++++++++---
drivers/char/hw_random/ingenic-rng.c | 9 ++-------
drivers/crypto/Kconfig | 3 +++
drivers/crypto/qat/qat_common/adf_admin.c | 7 ++++---
4 files changed, 19 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.9
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2020-08-30 23:02 ` pr-tracker-bot
2020-09-10 0:34 ` Herbert Xu
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-08-30 23:02 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 31 Aug 2020 08:33:04 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e43327c706f28d9e66fc4242af4aefdd69e8ff24
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.9
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
@ 2020-09-10 0:34 ` Herbert Xu
2020-09-10 2:48 ` pr-tracker-bot
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2020-09-10 0:34 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in padata.
The following changes since commit c195d66a8a75c60515819b101975f38b7ec6577f:
crypto: af_alg - Work around empty control messages without MSG_MORE (2020-08-27 23:20:36 +1000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 1b0df11fde0f14a269a181b3b7f5122415bc5ed7:
padata: fix possible padata_works_lock deadlock (2020-09-04 17:51:55 +1000)
----------------------------------------------------------------
Daniel Jordan (1):
padata: fix possible padata_works_lock deadlock
kernel/padata.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.9
2020-09-10 0:34 ` Herbert Xu
@ 2020-09-10 2:48 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-09-10 2:48 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 10 Sep 2020 10:34:23 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/7fe10096c1508c7f033d34d0741809f8eecc1ed4
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.10
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2020-10-12 3:32 ` Herbert Xu
2020-10-13 16:24 ` pr-tracker-bot
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-10-12 3:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Allow DRBG testing through user-space af_alg.
- Add tcrypt speed testing support for keyed hashes.
- Add type-safe init/exit hooks for ahash.
Algorithms:
- Mark arc4 as obsolete and pending for future removal.
- Mark anubis, khazad, sead and tea as obsolete.
- Improve boot-time xor benchmark.
- Add OSCCA SM2 asymmetric cipher algorithm and use it for integrity.
Drivers:
- Fixes and enhancement for XTS in caam.
- Add support for XIP8001B hwrng in xiphera-trng.
- Add RNG and hash support in sun8i-ce/sun8i-ss.
- Allow imx-rngc to be used by kernel entropy pool.
- Use crypto engine in omap-sham.
- Add support for Ingenic X1830 with ingenic.
The following changes since commit 9123e3a74ec7b934a4a099e98af6a61c2f80bbf5:
Linux 5.9-rc1 (2020-08-16 13:04:57 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 3093e7c16e12d729c325adb3c53dde7308cefbd8:
X.509: Fix modular build of public_key_sm2 (2020-10-08 16:39:14 +1100)
----------------------------------------------------------------
Andrei Botila (10):
crypto: caam/jr - add fallback for XTS with more than 8B IV
crypto: caam/qi - add fallback for XTS with more than 8B IV
crypto: caam/qi2 - add fallback for XTS with more than 8B IV
crypto: caam/jr - add support for more XTS key lengths
crypto: caam/qi - add support for more XTS key lengths
crypto: caam/qi2 - add support for more XTS key lengths
crypto: caam - add xts check for block length equal to zero
crypto: caam/jr - add support for XTS with 16B IV
crypto: caam/qi - add support for XTS with 16B IV
crypto: caam/qi2 - add support for XTS with 16B IV
Andy Shevchenko (1):
crypto: caam - use traditional error check pattern
Ard Biesheuvel (15):
staging/rtl8192e: switch to RC4 library interface
staging/rtl8192u: switch to RC4 library interface
SUNRPC: remove RC4-HMAC-MD5 support from KerberosV
crypto: n2 - remove ecb(arc4) support
crypto: bcm-iproc - remove ecb(arc4) support
net: wireless: drop bogus CRYPTO_xxx Kconfig selects
crypto: arc4 - mark ecb(arc4) skcipher as obsolete
crypto: Kconfig - mark unused ciphers as obsolete
crypto: arm/sha256-neon - avoid ADRL pseudo instruction
crypto: arm/sha512-neon - avoid ADRL pseudo instruction
crypto: arm/aes-neonbs - avoid hacks to prevent Thumb2 mode switches
crypto: arm/aes-neonbs - avoid loading reorder argument on encryption
crypto: arm/aes-neonbs - use typed init/exit routines for XTS
crypto: xor - defer load time benchmark to a later time
crypto: xor - use ktime for template benchmarking
Atte Tommiska (3):
dt-bindings: vendor-prefixes: Add Xiphera vendor prefix
dt-bindings: rng: add bindings for Xiphera XIP8001B hwrng
hwrng: xiphera-trng: add support for XIP8001B hwrng
Christophe JAILLET (2):
crypto: hifn_795x - switch from 'pci_' to 'dma_' API
crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call
Colin Ian King (1):
crypto: chelsio - fix minor indentation issue
Corentin Labbe (18):
crypto: proc - Removing some useless only space lines
crypto: sun8i-ss - Add SS_START define
crypto: sun8i-ss - Add support for the PRNG
crypto: sun8i-ss - support hash algorithms
crypto: sun8i-ss - fix a trivial typo
crypto: sun8i-ss - Add more comment on some structures
crypto: sun8i-ss - better debug printing
crypto: sun8i-ce - handle endianness of t_common_ctl
crypto: sun8i-ce - move iv data to request context
crypto: sun8i-ce - split into prepare/run/unprepare
crypto: sun8i-ce - handle different error registers
crypto: sun8i-ce - rename has_t_dlen_in_bytes to cipher_t_dlen_in_bytes
crypto: sun8i-ce - support hash algorithms
crypto: sun8i-ce - Add stat_bytes debugfs
crypto: sun8i-ce - Add support for the PRNG
crypto: sun8i-ce - Add support for the TRNG
crypto: sun8i-ce - fix comparison of integer expressions of different signedness
crypto: sun8i-ss - fix comparison of integer expressions of different signedness
Dan Carpenter (1):
crypto: sa2ul - Fix pm_runtime_get_sync() error checking
Daniel Jordan (1):
padata: add another maintainer and another list
Denis Efremov (5):
crypto: inside-secure - use kfree_sensitive()
crypto: amlogic - use kfree_sensitive()
crypto: sun8i-ce - use kfree_sensitive()
crypto: sun8i-ss - use kfree_sensitive()
crypto: sun8i-ss - remove redundant memzero_explicit()
Dominik Przychodni (1):
crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA
Elena Petrova (1):
crypto: af_alg - add extra parameters for DRBG interface
Fabio Estevam (1):
crypto: arm/curve25519 - include <linux/scatterlist.h>
George Acosta (1):
crypto: cavium/nitrox - add an error message to explain the failure of pci_request_mem_regions
Gilad Ben-Yossef (2):
crypto: ccree - remove data unit size support
crypto: ccree - remove bitlocker cipher
Giovanni Cabiddu (5):
crypto: qat - include domain in top level debugfs path
crypto: qat - replace device ids defines
crypto: qat - use PCI_VDEVICE
crypto: qat - fix function parameters descriptions
crypto: qat - drop input parameter from adf_enable_aer()
Hao Fang (1):
crypto: hisilicon/zip - fix the uncleared debug registers
Herbert Xu (32):
crypto: algapi - Move crypto_yield into internal.h
crypto: algapi - Remove skbuff.h inclusion
crypto: algif_skcipher - EBUSY on aio should be an error
crypto: algif_aead - Do not set MAY_BACKLOG on the async path
crypto: marvell/cesa - Fix sparse warnings
crypto: tcrypt - Add support for hash speed testing with keys
crypto: stm32 - Add missing header inclusions
crypto: ahash - Add init_tfm/exit_tfm
crypto: ahash - Add ahash_alg_instance
crypto: ahash - Remove AHASH_REQUEST_ON_STACK
crypto: hifn_795x - Remove 64-bit build-time check
crypto: mediatek - Fix endianness bugs and sparse warnings
crypto: stm32 - Fix sparse warnings
crypto: arm/poly1305 - Add prototype for poly1305_blocks_neon
crypto: arm64/sha - Add declarations for assembly variables
crypto: arm64/gcm - Fix endianness warnings
crypto: powerpc/crc-vpmsum_test - Fix sparse endianness warning
crypto: amlogic - Fix endianness marker
crypto: arm/aes-neonbs - Use generic cbc encryption path
crypto: cbc - Remove cbc.h
crypto: ux500 - Fix sparse endianness warnings
crypto: sa2ul - Select CRYPTO_AUTHENC
crypto: sun4i-ss - Fix sparse endianness markers
crypto: n2 - Fix sparse endianness warning
crypto: inside-secure - Move priv pointer into safexcel_context
crypto: inside-secure - Move ipad/opad into safexcel_context
crypto: inside-secure - Reuse code in safexcel_hmac_alg_setkey
crypto: lib/chacha20poly1305 - Set SG_MITER_ATOMIC unconditionally
crypto: x86/poly1305 - Remove assignments with no effect
lib/mpi: Fix unused variable warnings
crypto: bcm - Verify GCM/CCM key length in setkey
X.509: Fix modular build of public_key_sm2
Horia Geantă (1):
crypto: caam - Move debugfs fops into standalone file
Hui Tang (1):
crypto: hisilicon/qm - fix judgement of queue is full
Ira Weiny (2):
crypto: ux500 - Fix kmap() bug
crypto: hash - Remove unused async iterators
Jorge Ramirez-Ortiz (2):
hwrng: optee - handle unlimited data rates
hwrng: optee - fix wait use case
Julia Lawall (5):
hwrng: stm32 - use semicolons rather than commas to separate statements
hwrng: iproc-rng200 - use semicolons rather than commas to separate statements
hwrng: mxc-rnga - use semicolons rather than commas to separate statements
crypto: drivers - use semicolons rather than commas to separate statements
crypto: atmel-tdes - use semicolons rather than commas to separate statements
Krzysztof Kozlowski (9):
hwrng: cctrn - Simplify with dev_err_probe()
crypto: sa2ul - Simplify with dev_err_probe()
crypto: ccree - Simplify with dev_err_probe()
crypto: s5p-sss - Add and fix kerneldoc
crypto: s5p-sss - Pass error from clk_get and reduce verbosity on deferral
crypto: caam - Fix kerneldoc
crypto: caam - Simplify with dev_err_probe()
crypto: stm32-hash - Simplify with dev_err_probe()
crypto: sun8i - Simplify with dev_err_probe()
Liu Shixin (3):
crypto: atmel-aes - convert to use be32_add_cpu()
crypto: qat - convert to use DEFINE_SEQ_ATTRIBUTE macro
crypto: cpt - simplify the return expression of cav_register_algs
Longfang Liu (5):
crypto: hisilicon - update mininum queue
crypto: hisilicon - update HPRE module parameter description
crypto: hisilicon - update SEC module parameter description
crypto: hisilicon - update ZIP module parameter description
crypto: hisilicon - fixed memory allocation error
Madhuparna Bhowmik (1):
crypto: picoxcell - Fix potential race condition bug
Marco Felsch (1):
hwrng: imx-rngc - add quality to use it as kernel entropy pool
Meng Yu (3):
crypto: hisilicon/hpre - remove useless code
crypto: hisilicon/hpre - adjust some coding style
crypto: hisilicon/hpre - fix a bug in dh algorithm
Nathan Chancellor (1):
crypto: xor - Remove unused variable count in do_xor_speed
Nicolas Toromanoff (1):
crypto: stm32/crc32 - Avoid lock if hardware is already used
Pascal van Leeuwen (2):
crypto: inside-secure - Prevent missing of processing errors
crypto: inside-secure - Add support for EIP197 with output classifier
Pavel Machek (1):
crypto: ccp - fix error handling
Peter Ujfalusi (1):
crypto: sa2ul - Fix DMA mapping API usage
Qinglang Miao (8):
crypto: qat - remove unnecessary mutex_init()
crypto: allwinner - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: amlogic - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: caam - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: cavium/zip - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: hisilicon/qm - Convert to DEFINE_SHOW_ATTRIBUTE
crypto: marvell/octeontx - simplify the return expression of create_sysfs_eng_grps_info()
crypto: mediatek - simplify the return expression of mtk_dfe_dse_reset()
Ram Muthiah (1):
crypto: virtio - don't use 'default m'
Randy Dunlap (5):
crypto: algif_aead - delete duplicated word
crypto: crc32c_generic - delete and fix duplicated words
crypto: crct10dif_generic - fix duplicated words
crypto: engine - delete duplicated word
crypto: tcrypt - delete duplicated words in messages
Shukun Tan (4):
crypto: hisilicon/qm - clear used reference count when start qp
crypto: hisilicon/qm - fix event queue depth to 2048
crypto: hisilicon/qm - fix VF not available after PF FLR
crypto: hisilicon/zip - modify debugfs interface parameters
Sihang Chen (2):
crypto: hisilicon/qm - fix wrong release after using strsep
crypto: hisilicon/zip - fix the uninitalized 'curr_qm_qp_num'
Tero Kristo (3):
crypto: sa2ul - fix compiler warning produced by clang
crypto: omap-sham - convert to use crypto engine
crypto: omap-sham - fix digcnt register handling with export/import
Tianjia Zhang (12):
crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc()
crypto: sm3 - export crypto_sm3_final function
lib/mpi: Extend the MPI library
lib/mpi: Introduce ec implementation to MPI library
crypto: sm2 - introduce OSCCA SM2 asymmetric cipher algorithm
crypto: testmgr - support test with different ciphertext per encryption
crypto: testmgr - Fix potential memory leak in test_akcipher_one()
crypto: sm2 - add SM2 test vectors to testmgr
X.509: support OSCCA certificate parse
X.509: support OSCCA SM2-with-SM3 certificate verification
integrity: Asymmetric digsig supports SM2-with-SM3 algorithm
X.509: fix error return value on the failed path
Tom Rix (1):
hwrng: intel - cleanup initialization
Tomer Maimon (1):
hwrng: npcm - modify readl to readb
Uros Bizjak (3):
crypto: x86/crc32c-intel - Use CRC32 mnemonic
crypto: curve25519-x86_64 - Use XORL r32,32
crypto: poly1305-x86_64 - Use XORL r32,32
Weili Qian (2):
crypto: hisilicon/qm - fix the call trace when unbind device
crypto: hisilicon/qm - remove the update of flags
Xiaoliang Pang (1):
cypto: mediatek - fix leaks in mtk_desc_ring_alloc
Xu Wang (1):
crypto: s5p-sss - remove redundant null check
Yang Shen (15):
crypto: hisilicon/qm - fix print frequence in hisi_qp_send
crypto: hisilicon/qm - fix no stop reason when use 'hisi_qm_stop'
crypto: hisilicon/qm - register callback function to 'pci_driver.shutdown'
crypto: hisilicon/qm - fix the process of register algorithms to crypto
crypto: hisilicon/zip - remove some useless parameters
crypto: hisilicon/zip - unify naming style for functions and macros
crypto: hisilicon/zip - replace 'sprintf' with 'scnprintf'
crypto: hisilicon/zip - use a enum parameter instead of some macros
crypto: hisilicon/zip - add print for error branch
crypto: hisilicon/zip - fix static check warning
crypto: hisilicon/zip - move some private macros from 'zip.h' to 'zip_crypto.c'
crypto: hisilicon/zip - supplement some comments
crypto: hisilicon/zip - fix some coding styles
crypto: hisilicon/qm - fix wrong return type of 'pci_get_drvdata'
crypto: hisilicon/zip - fix the return value when device is busy
YueHaibing (1):
crypto: sa2ul - Fix pointer-to-int-cast warning
Zhang Qilong (1):
crypto: marvell/cesa - use devm_platform_ioremap_resource_byname
Zhou Wang (1):
crypto: hisilicon/zip - fix zero length input in GZIP decompress
dinghao.liu@zju.edu.cn (1):
crypto: ccree - fix runtime PM imbalance on error
周琰杰 (Zhou Yanjie) (2):
dt-bindings: RNG: Add Ingenic TRNG bindings.
hwrng: ingenic - Add hardware TRNG for Ingenic X1830
Documentation/crypto/userspace-if.rst | 20 +-
.../devicetree/bindings/rng/ingenic,trng.yaml | 43 +
.../bindings/rng/xiphera,xip8001b-trng.yaml | 33 +
.../devicetree/bindings/vendor-prefixes.yaml | 2 +
MAINTAINERS | 2 +
arch/arm/crypto/aes-neonbs-core.S | 54 +-
arch/arm/crypto/aes-neonbs-glue.c | 58 +-
arch/arm/crypto/curve25519-glue.c | 1 +
arch/arm/crypto/poly1305-glue.c | 1 +
arch/arm/crypto/sha256-armv4.pl | 4 +-
arch/arm/crypto/sha256-core.S_shipped | 4 +-
arch/arm/crypto/sha512-armv4.pl | 4 +-
arch/arm/crypto/sha512-core.S_shipped | 4 +-
arch/arm64/crypto/ghash-ce-glue.c | 4 +-
arch/arm64/crypto/sha1-ce-glue.c | 3 +
arch/arm64/crypto/sha2-ce-glue.c | 3 +
arch/powerpc/crypto/crc-vpmsum_test.c | 6 +-
arch/x86/crypto/blake2s-glue.c | 1 +
arch/x86/crypto/chacha_glue.c | 1 +
arch/x86/crypto/crc32c-intel_glue.c | 18 +-
arch/x86/crypto/curve25519-x86_64.c | 69 +-
arch/x86/crypto/nhpoly1305-avx2-glue.c | 1 +
arch/x86/crypto/nhpoly1305-sse2-glue.c | 1 +
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 8 +-
arch/x86/crypto/poly1305_glue.c | 4 +-
crypto/Kconfig | 40 +
crypto/Makefile | 8 +
crypto/af_alg.c | 14 +-
crypto/ahash.c | 54 +-
crypto/algif_aead.c | 9 +-
crypto/algif_rng.c | 175 ++-
crypto/algif_skcipher.c | 2 +-
crypto/arc4.c | 11 +
crypto/asymmetric_keys/public_key.c | 63 +
crypto/asymmetric_keys/x509_cert_parser.c | 27 +-
crypto/asymmetric_keys/x509_public_key.c | 3 +
crypto/cbc.c | 144 +-
crypto/crc32c_generic.c | 4 +-
crypto/crct10dif_generic.c | 2 +-
crypto/crypto_engine.c | 3 +-
crypto/ecrdsa.c | 1 +
crypto/internal.h | 16 +-
crypto/jitterentropy-kcapi.c | 2 +-
crypto/proc.c | 4 +-
crypto/rsa-pkcs1pad.c | 1 +
crypto/sm2.c | 481 +++++++
crypto/sm2signature.asn1 | 4 +
crypto/sm3_generic.c | 7 +-
crypto/tcrypt.c | 18 +-
crypto/tcrypt.h | 29 -
crypto/testmgr.c | 25 +-
crypto/testmgr.h | 59 +
crypto/xor.c | 69 +-
drivers/char/hw_random/Kconfig | 24 +
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/cctrng.c | 9 +-
drivers/char/hw_random/imx-rngc.c | 1 +
drivers/char/hw_random/ingenic-trng.c | 161 +++
drivers/char/hw_random/intel-rng.c | 2 +-
drivers/char/hw_random/iproc-rng200.c | 8 +-
drivers/char/hw_random/mxc-rnga.c | 6 +-
drivers/char/hw_random/npcm-rng.c | 14 +-
drivers/char/hw_random/optee-rng.c | 6 +-
drivers/char/hw_random/stm32-rng.c | 8 +-
drivers/char/hw_random/xiphera-trng.c | 150 ++
drivers/crypto/Kconfig | 1 +
drivers/crypto/allwinner/Kconfig | 43 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c | 17 +-
drivers/crypto/allwinner/sun8i-ce/Makefile | 3 +
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 131 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 405 +++++-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 413 ++++++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 164 +++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 127 ++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 139 +-
drivers/crypto/allwinner/sun8i-ss/Makefile | 2 +
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 16 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 229 ++-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 444 ++++++
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 173 +++
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 89 +-
drivers/crypto/amcc/crypto4xx_alg.c | 2 +-
drivers/crypto/amcc/crypto4xx_core.h | 1 +
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 12 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 16 +-
drivers/crypto/atmel-aes.c | 2 +-
drivers/crypto/atmel-tdes.c | 2 +-
drivers/crypto/bcm/cipher.c | 111 +-
drivers/crypto/bcm/cipher.h | 1 -
drivers/crypto/bcm/spu.c | 23 +-
drivers/crypto/bcm/spu.h | 1 -
drivers/crypto/bcm/spu2.c | 12 +-
drivers/crypto/bcm/spu2.h | 1 -
drivers/crypto/caam/Kconfig | 3 +
drivers/crypto/caam/Makefile | 2 +
drivers/crypto/caam/caamalg.c | 94 +-
drivers/crypto/caam/caamalg_desc.c | 28 +-
drivers/crypto/caam/caamalg_qi.c | 94 +-
drivers/crypto/caam/caamalg_qi2.c | 118 +-
drivers/crypto/caam/caamalg_qi2.h | 2 +
drivers/crypto/caam/ctrl.c | 88 +-
drivers/crypto/caam/debugfs.c | 96 ++
drivers/crypto/caam/debugfs.h | 26 +
drivers/crypto/caam/dpseci-debugfs.c | 23 +-
drivers/crypto/caam/intern.h | 17 -
drivers/crypto/caam/jr.c | 10 +-
drivers/crypto/caam/qi.c | 20 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 8 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 1 +
drivers/crypto/cavium/zip/zip_main.c | 44 +-
drivers/crypto/ccp/ccp-ops.c | 3 +-
drivers/crypto/ccree/cc_cipher.c | 282 +---
drivers/crypto/ccree/cc_crypto_ctx.h | 1 -
drivers/crypto/ccree/cc_driver.c | 7 +-
drivers/crypto/ccree/cc_driver.h | 1 -
drivers/crypto/ccree/cc_pm.c | 6 +-
drivers/crypto/chelsio/chcr_core.c | 2 +-
drivers/crypto/hifn_795x.c | 28 +-
drivers/crypto/hisilicon/hpre/hpre.h | 1 -
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 59 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 33 +-
drivers/crypto/hisilicon/qm.c | 237 ++-
drivers/crypto/hisilicon/qm.h | 31 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 51 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 39 +-
drivers/crypto/hisilicon/zip/zip.h | 15 -
drivers/crypto/hisilicon/zip/zip_crypto.c | 140 +-
drivers/crypto/hisilicon/zip/zip_main.c | 195 +--
drivers/crypto/img-hash.c | 1 +
drivers/crypto/inside-secure/safexcel.c | 44 +-
drivers/crypto/inside-secure/safexcel.h | 28 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 90 +-
drivers/crypto/inside-secure/safexcel_hash.c | 153 +-
drivers/crypto/inside-secure/safexcel_ring.c | 9 +-
drivers/crypto/ixp4xx_crypto.c | 2 +-
drivers/crypto/marvell/cesa/cesa.c | 4 +-
drivers/crypto/marvell/cesa/cesa.h | 20 +-
drivers/crypto/marvell/cesa/cipher.c | 5 +-
drivers/crypto/marvell/cesa/hash.c | 24 +-
drivers/crypto/marvell/cesa/tdma.c | 16 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 8 +-
drivers/crypto/mediatek/mtk-aes.c | 57 +-
drivers/crypto/mediatek/mtk-platform.c | 16 +-
drivers/crypto/mediatek/mtk-sha.c | 2 +-
drivers/crypto/n2_core.c | 60 +-
drivers/crypto/omap-sham.c | 189 ++-
drivers/crypto/padlock-aes.c | 1 +
drivers/crypto/picoxcell_crypto.c | 9 +-
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 19 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 17 +-
drivers/crypto/qat/qat_c62x/adf_drv.c | 19 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 17 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 6 -
drivers/crypto/qat/qat_common/adf_aer.c | 6 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 19 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 2 -
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 2 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 6 +-
.../crypto/qat/qat_common/adf_transport_debug.c | 42 +-
drivers/crypto/qat/qat_common/qat_algs.c | 10 +-
drivers/crypto/qat/qat_common/qat_hal.c | 7 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 9 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 19 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 17 +-
drivers/crypto/qce/core.c | 1 +
drivers/crypto/qce/sha.c | 1 +
drivers/crypto/qce/skcipher.c | 1 +
drivers/crypto/qcom-rng.c | 1 +
drivers/crypto/rockchip/rk3288_crypto.c | 1 +
drivers/crypto/rockchip/rk3288_crypto.h | 1 +
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 1 +
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 1 +
drivers/crypto/s5p-sss.c | 28 +-
drivers/crypto/sa2ul.c | 235 +--
drivers/crypto/sahara.c | 2 +-
drivers/crypto/stm32/Kconfig | 1 +
drivers/crypto/stm32/stm32-crc32.c | 22 +-
drivers/crypto/stm32/stm32-cryp.c | 47 +-
drivers/crypto/stm32/stm32-hash.c | 16 +-
drivers/crypto/talitos.c | 8 +-
drivers/crypto/ux500/cryp/cryp_core.c | 28 +-
drivers/crypto/ux500/hash/hash_core.c | 31 +-
drivers/crypto/virtio/Kconfig | 1 -
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 1 +
drivers/net/wireless/intel/ipw2x00/Kconfig | 4 -
drivers/net/wireless/intersil/hostap/Kconfig | 4 -
drivers/staging/rtl8192e/Kconfig | 4 +-
drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 70 +-
drivers/staging/rtl8192e/rtllib_crypt_wep.c | 72 +-
drivers/staging/rtl8192u/Kconfig | 1 +
.../rtl8192u/ieee80211/ieee80211_crypt_tkip.c | 81 +-
.../rtl8192u/ieee80211/ieee80211_crypt_wep.c | 64 +-
include/crypto/algapi.h | 8 +-
include/crypto/cbc.h | 141 --
include/crypto/hash.h | 18 +-
include/crypto/if_alg.h | 1 +
include/crypto/internal/hash.h | 19 +-
include/crypto/public_key.h | 3 +
include/crypto/sm2.h | 25 +
include/crypto/sm3.h | 2 +
include/linux/mpi.h | 192 +++
include/linux/oid_registry.h | 6 +
include/linux/sunrpc/gss_krb5.h | 11 -
include/linux/sunrpc/gss_krb5_enctypes.h | 9 +-
include/uapi/linux/if_alg.h | 1 +
lib/crypto/chacha20poly1305.c | 4 +-
lib/mpi/Makefile | 6 +
lib/mpi/ec.c | 1509 ++++++++++++++++++++
lib/mpi/mpi-add.c | 155 ++
lib/mpi/mpi-bit.c | 251 ++++
lib/mpi/mpi-cmp.c | 46 +-
lib/mpi/mpi-div.c | 234 +++
lib/mpi/mpi-internal.h | 53 +
lib/mpi/mpi-inv.c | 143 ++
lib/mpi/mpi-mod.c | 155 ++
lib/mpi/mpi-mul.c | 91 ++
lib/mpi/mpicoder.c | 336 +++++
lib/mpi/mpih-div.c | 294 ++++
lib/mpi/mpih-mul.c | 25 +
lib/mpi/mpiutil.c | 204 +++
net/sunrpc/Kconfig | 1 -
net/sunrpc/auth_gss/gss_krb5_crypto.c | 276 ----
net/sunrpc/auth_gss/gss_krb5_mech.c | 95 --
net/sunrpc/auth_gss/gss_krb5_seal.c | 1 -
net/sunrpc/auth_gss/gss_krb5_seqnum.c | 87 --
net/sunrpc/auth_gss/gss_krb5_unseal.c | 1 -
net/sunrpc/auth_gss/gss_krb5_wrap.c | 65 +-
security/integrity/digsig_asymmetric.c | 14 +-
229 files changed, 9465 insertions(+), 3102 deletions(-)
create mode 100644 Documentation/devicetree/bindings/rng/ingenic,trng.yaml
create mode 100644 Documentation/devicetree/bindings/rng/xiphera,xip8001b-trng.yaml
create mode 100644 crypto/sm2.c
create mode 100644 crypto/sm2signature.asn1
create mode 100644 drivers/char/hw_random/ingenic-trng.c
create mode 100644 drivers/char/hw_random/xiphera-trng.c
create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c
create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c
create mode 100644 drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c
create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
create mode 100644 drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c
create mode 100644 drivers/crypto/caam/debugfs.c
create mode 100644 drivers/crypto/caam/debugfs.h
delete mode 100644 include/crypto/cbc.h
create mode 100644 include/crypto/sm2.h
create mode 100644 lib/mpi/ec.c
create mode 100644 lib/mpi/mpi-add.c
create mode 100644 lib/mpi/mpi-div.c
create mode 100644 lib/mpi/mpi-inv.c
create mode 100644 lib/mpi/mpi-mod.c
create mode 100644 lib/mpi/mpi-mul.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.10
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
@ 2020-10-13 16:24 ` pr-tracker-bot
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-10-13 16:24 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 12 Oct 2020 14:32:49 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/39a5101f989e8d2be557136704d53990f9b402c8
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.10
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
2020-09-10 0:34 ` Herbert Xu
@ 2020-10-26 1:11 ` Herbert Xu
2020-10-26 17:52 ` pr-tracker-bot
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-10-26 1:11 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in x86/poly1305.
The following changes since commit 3093e7c16e12d729c325adb3c53dde7308cefbd8:
X.509: Fix modular build of public_key_sm2 (2020-10-08 16:39:14 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c3a98c3ad5c0dc60a1ac66bf91147a3f39cac96b:
crypto: x86/poly1305 - add back a needed assignment (2020-10-24 09:38:32 +1100)
----------------------------------------------------------------
Eric Biggers (1):
crypto: x86/poly1305 - add back a needed assignment
arch/x86/crypto/poly1305_glue.c | 1 +
1 file changed, 1 insertion(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.10
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
@ 2020-10-26 17:52 ` pr-tracker-bot
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-10-26 17:52 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 26 Oct 2020 12:11:59 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/41ba50b0572e90ed3d24fe4def54567e9050bc47
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.11
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2020-10-13 16:24 ` pr-tracker-bot
@ 2020-12-14 5:55 ` Herbert Xu
2020-12-14 20:56 ` pr-tracker-bot
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-12-14 5:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Add speed testing on 1420-byte blocks for networking.
Algorithms:
- Improve performance of chacha on ARM for network packets.
- Improve performance of aegis128 on ARM for network packets.
Drivers:
- Add support for Keem Bay OCS AES/SM4.
- Add support for QAT 4xxx devices.
- Enable crypto-engine retry mechanism in caam.
- Enable support for crypto engine on sdm845 in qce.
- Add HiSilicon PRNG driver support.
Please note that there is a merge conflict in the MAINTAINERS
file with the drm tree due to the Keem Bay driver.
The following changes since commit 3650b228f83adda7e5ee532e2b90429c03f7b9ec:
Linux 5.10-rc1 (2020-10-25 15:14:11 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 linus
for you to fetch changes up to 93cebeb1c21a65b92636aaa278a32fbc0415ec67:
crypto: qat - add capability detection logic in qat_4xxx (2020-12-11 21:54:16 +1100)
----------------------------------------------------------------
Adam Guerin (2):
crypto: qat - remove cast for mailbox CSR
crypto: qat - replace pci with PCI in comments
Ahsan Atta (1):
crypto: qat - num_rings_per_bank is device dependent
Ard Biesheuvel (14):
crypto: arm64/poly1305-neon - reorder PAC authentication with SP update
crypto: arm/chacha-neon - optimize for non-block size multiples
crypto: arm64/chacha - simplify tail block handling
crypto: arm64/gcm - move authentication tag check to SIMD domain
crypto: aegis128 - wipe plaintext and tag if decryption fails
crypto: aegis128/neon - optimize tail block handling
crypto: aegis128/neon - move final tag check to SIMD domain
crypto: aegis128 - expose SIMD code path as separate driver
crypto: tcrypt - don't initialize at subsys_initcall time
crypto: tcrypt - permit tcrypt.ko to be builtin
crypto: tcrypt - include 1420 byte blocks in aead and skcipher benchmarks
crypto: ecdh - avoid unaligned accesses in ecdh_set_secret()
crypto: arm/aes-ce - work around Cortex-A57/A72 silion errata
crypto: aegis128 - avoid spurious references crypto_aegis128_update_simd
Arnd Bergmann (1):
crypto: atmel-i2c - select CONFIG_BITREVERSE
Arvind Sankar (6):
crypto: lib/sha256 - Use memzero_explicit() for clearing state
crypto: hash - Use memzero_explicit() for clearing state
crypto: lib/sha256 - Don't clear temporary variables
crypto: lib/sha256 - Clear W[] in sha256_update() instead of sha256_transform()
crypto: lib/sha256 - Unroll SHA256 loop 8 times intead of 64
crypto: lib/sha256 - Unroll LOAD and BLEND loops
Christophe JAILLET (3):
crypto: cavium/zip - Use dma_set_mask_and_coherent to simplify code
crypto: marvell/octeontx - Use dma_set_mask_and_coherent to simplify code
crypto: cavium - Use dma_set_mask_and_coherent to simplify code
Christophe Leroy (2):
crypto: talitos - Endianess in current_desc_hdr()
crypto: talitos - Fix return type of current_desc_hdr()
Colin Ian King (2):
crypto: inside-secure - Fix sizeof() mismatch
crypto: kconfig - fix a couple of spelling mistakes
Corentin Labbe (1):
crypto: sun8i-ce - fix two error path's memory leak
Daniele Alessandrelli (1):
dt-bindings: Add Keem Bay OCS AES bindings
Eric Biggers (8):
crypto: x86/aes - remove unused file aes_glue.c
crypto: aead - add crypto_aead_driver_name()
crypto: testmgr - always print the actual hash driver name
crypto: testmgr - always print the actual AEAD driver name
crypto: testmgr - always print the actual skcipher driver name
crypto: testmgr - WARN on test failure
crypto: af_alg - avoid undefined behavior accessing salg_name
crypto: sha - split sha.h into sha1.h and sha2.h
Gilad Ben-Yossef (1):
crypto: ccree - rework cache parameters handling
Giovanni Cabiddu (33):
crypto: qat - remove unused function
crypto: qat - mask device capabilities with soft straps
crypto: qat - fix configuration of iov threads
crypto: qat - split transport CSR access logic
crypto: qat - relocate GEN2 CSR access code
crypto: qat - abstract admin interface
crypto: qat - add packed to init admin structures
crypto: qat - rename ME in AE
crypto: qat - change admin sequence
crypto: qat - use admin mask to send fw constants
crypto: qat - update constants table
crypto: qat - remove writes into WQCFG
crypto: qat - remove unused macros in arbiter module
crypto: qat - abstract arbiter access
crypto: qat - register crypto instances based on capability
crypto: qat - enable ring after pair is programmed
crypto: qat - abstract build ring base
crypto: qat - replace constant masks with GENMASK
crypto: qat - use BIT_ULL() - 1 pattern for masks
crypto: qat - abstract writes to arbiter enable
crypto: qat - remove hardcoded bank irq clear flag mask
crypto: qat - call functions in adf_sriov if available
crypto: qat - remove unnecessary void* casts
crypto: qat - change return value in adf_cfg_add_key_value_param()
crypto: qat - change return value in adf_cfg_key_val_get()
crypto: qat - refactor qat_crypto_create_instances()
crypto: qat - refactor qat_crypto_dev_config()
crypto: qat - allow for instances in different banks
crypto: qat - extend ae_mask
crypto: qat - support for mof format in fw loader
crypto: qat - target fw images to specific AEs
crypto: qat - add hook to initialize vector routing table
crypto: qat - add qat_4xxx driver
Gustavo A. R. Silva (1):
crypto: ccree - Fix fall-through warnings for Clang
Herbert Xu (10):
lib/mpi: Remove unused scalar_copied
crypto: sa2ul - Reduce stack usage
crypto: cavium/nitrox - Fix sparse warnings
crypto: lib/curve25519 - Move selftest prototype into header file
crypto: mips/octeon - Fix sparse endianness warnings
crypto: powerpc/sha256-spe - Fix sparse endianness warning
crypto: sparc - Fix sparse endianness warnings
crypto: lib/blake2s - Move selftest prototype into header file
hwrng: ks-sa - Add dependency on IOMEM and OF
crypto: cpt - Fix sparse warnings in cptpf
Horia Geantă (3):
crypto: arm/aes-neonbs - fix usage of cbc(aes) fallback
crypto: caam - fix printing on xts fallback allocation error path
crypto: caam/qi - simplify error path for context allocation
Iuliana Prodan (1):
crypto: caam - enable crypto-engine retry mechanism
Jack Xu (31):
crypto: qat - fix status check in qat_hal_put_rel_rd_xfer()
crypto: qat - fix CSR access
crypto: qat - fix error message
crypto: qat - remove unnecessary parenthesis
crypto: qat - introduce additional parenthesis
crypto: qat - rename qat_uclo_del_uof_obj()
crypto: qat - add support for relative FW ucode loading
crypto: qat - change type for ctx_mask
crypto: qat - change micro word data mask
crypto: qat - refactor AE start
crypto: qat - remove global CSRs helpers
crypto: qat - move defines to header files
crypto: qat - refactor qat_uclo_set_ae_mode()
crypto: qat - refactor long expressions
crypto: qat - introduce chip info structure
crypto: qat - replace check based on DID
crypto: qat - add next neighbor to chip_info
crypto: qat - add support for lm2 and lm3
crypto: qat - add local memory size to chip info
crypto: qat - add reset CSR and mask to chip info
crypto: qat - add clock enable CSR to chip info
crypto: qat - add wake up event to chip info
crypto: qat - add misc control CSR to chip info
crypto: qat - add check for null pointer
crypto: qat - use ae_mask
crypto: qat - add CSS3K support
crypto: qat - add FCU CSRs to chip info
crypto: qat - allow to target specific AEs
crypto: qat - add support for shared ustore
crypto: qat - add support for broadcasting mode
crypto: qat - add gen4 firmware loader
Jason A. Donenfeld (1):
crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager
Kai Ye (1):
crypto: hisilicon/sec2 - Fix aead authentication setting key error
Longfang Liu (2):
crypto: hisilicon - delete unused structure member variables
crypto: hisilicon - fixes some coding style
Marco Chiappero (5):
crypto: qat - update IV in software
crypto: qat - add support for capability detection
crypto: qat - add AES-CTR support for QAT GEN4 devices
crypto: qat - add AES-XTS support for QAT GEN4 devices
crypto: qat - add capability detection logic in qat_4xxx
Mike Healy (1):
crypto: keembay - Add support for Keem Bay OCS AES/SM4
Nathan Chancellor (1):
crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd
Nigel Christian (1):
hwrng: imx-rngc - irq already prints an error
Shiju Jose (1):
crypto: hisilicon - Fix doc warnings in sgl.c and qm.c
Thara Gopinath (2):
crypto: qce - Enable support for crypto engine on sdm845
crypto: qce - Fix SHA result buffer corruption issues
Tianjia Zhang (1):
crypto: sm2 - remove unnecessary reset operations
Tom Rix (4):
crypto: atmel-sha - remove unneeded break
crypto: cavium/nitrox - remove unneeded semicolon
crypto: qat - remove unneeded semicolon
crypto: seed - remove trailing semicolon in macro definition
Uros Bizjak (3):
crypto: aesni - Use TEST %reg,%reg instead of CMP $0,%reg
crypto: x86/sha512 - Use TEST %reg,%reg instead of CMP $0,%reg
crypto: x86/poly1305 - Use TEST %reg,%reg instead of CMP $0,%reg
Weili Qian (12):
crypto: hisilicon/qm - numbers are replaced by macros
crypto: hisilicon/qm - modify the return type of function
crypto: hisilicon/qm - modify the return type of debugfs interface
crypto: hisilicon/qm - modify return type of 'qm_set_sqctype'
crypto: hisilicon/qm - replace 'sprintf' with 'scnprintf'
crypto: hisilicon/qm - split 'qm_qp_ctx_cfg' into smaller pieces
crypto: hisilicon/qm - split 'qm_eq_ctx_cfg' into smaller pieces
crypto: hisilicon/qm - split 'hisi_qm_init' into smaller pieces
hwrng: hisi - remove HiSilicon TRNG driver
crypto: hisilicon/trng - add HiSilicon TRNG driver support
crypto: hisilicon/trng - add support for PRNG
MAINTAINERS: Move HiSilicon TRNG V2 driver
Yang Shen (1):
crypto: hisilicon/zip - add a work_queue for zip irq
Yejune Deng (1):
crypto: hisilicon/trng - replace atomic_add_return()
Zhang Qilong (2):
crypto: omap-aes - fix the reference count leak of omap device
crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe
kernel test robot (1):
crypto: qat - fix excluded_middle.cocci warnings
.../bindings/crypto/intel,keembay-ocs-aes.yaml | 45 +
MAINTAINERS | 12 +-
arch/arm/crypto/aes-ce-core.S | 32 +-
arch/arm/crypto/aes-neonbs-glue.c | 8 +-
arch/arm/crypto/chacha-glue.c | 34 +-
arch/arm/crypto/chacha-neon-core.S | 97 +-
arch/arm/crypto/sha1-ce-glue.c | 2 +-
arch/arm/crypto/sha1.h | 2 +-
arch/arm/crypto/sha1_glue.c | 2 +-
arch/arm/crypto/sha1_neon_glue.c | 2 +-
arch/arm/crypto/sha2-ce-glue.c | 2 +-
arch/arm/crypto/sha256_glue.c | 2 +-
arch/arm/crypto/sha256_neon_glue.c | 2 +-
arch/arm/crypto/sha512-glue.c | 2 +-
arch/arm/crypto/sha512-neon-glue.c | 2 +-
arch/arm64/configs/defconfig | 1 +
arch/arm64/crypto/aes-glue.c | 2 +-
arch/arm64/crypto/chacha-neon-core.S | 193 +--
arch/arm64/crypto/ghash-ce-core.S | 15 +
arch/arm64/crypto/ghash-ce-glue.c | 48 +-
arch/arm64/crypto/poly1305-armv8.pl | 2 +-
arch/arm64/crypto/poly1305-core.S_shipped | 2 +-
arch/arm64/crypto/poly1305-glue.c | 2 +-
arch/arm64/crypto/sha1-ce-glue.c | 2 +-
arch/arm64/crypto/sha2-ce-glue.c | 2 +-
arch/arm64/crypto/sha256-glue.c | 2 +-
arch/arm64/crypto/sha3-ce-glue.c | 2 +-
arch/arm64/crypto/sha512-ce-glue.c | 2 +-
arch/arm64/crypto/sha512-glue.c | 2 +-
arch/mips/cavium-octeon/crypto/octeon-crypto.h | 2 +-
arch/mips/cavium-octeon/crypto/octeon-md5.c | 14 +-
arch/mips/cavium-octeon/crypto/octeon-sha1.c | 2 +-
arch/mips/cavium-octeon/crypto/octeon-sha256.c | 2 +-
arch/mips/cavium-octeon/crypto/octeon-sha512.c | 2 +-
arch/powerpc/crypto/sha1-spe-glue.c | 2 +-
arch/powerpc/crypto/sha1.c | 2 +-
arch/powerpc/crypto/sha256-spe-glue.c | 4 +-
arch/s390/crypto/sha.h | 3 +-
arch/s390/crypto/sha1_s390.c | 2 +-
arch/s390/crypto/sha256_s390.c | 2 +-
arch/s390/crypto/sha3_256_s390.c | 1 -
arch/s390/crypto/sha3_512_s390.c | 1 -
arch/s390/crypto/sha512_s390.c | 2 +-
arch/s390/purgatory/purgatory.c | 2 +-
arch/sparc/crypto/crc32c_glue.c | 2 +-
arch/sparc/crypto/md5_glue.c | 9 +-
arch/sparc/crypto/sha1_glue.c | 2 +-
arch/sparc/crypto/sha256_glue.c | 2 +-
arch/sparc/crypto/sha512_glue.c | 2 +-
arch/x86/crypto/aes_glue.c | 1 -
arch/x86/crypto/aesni-intel_asm.S | 20 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 20 +-
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 2 +-
arch/x86/crypto/poly1305_glue.c | 2 +-
arch/x86/crypto/sha1_ssse3_glue.c | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 2 +-
arch/x86/crypto/sha512-avx-asm.S | 2 +-
arch/x86/crypto/sha512-ssse3-asm.S | 2 +-
arch/x86/crypto/sha512_ssse3_glue.c | 2 +-
arch/x86/purgatory/purgatory.c | 2 +-
crypto/Kconfig | 4 +-
crypto/aegis128-core.c | 245 ++-
crypto/aegis128-neon-inner.c | 122 +-
crypto/aegis128-neon.c | 21 +-
crypto/af_alg.c | 10 +-
crypto/asymmetric_keys/asym_tpm.c | 2 +-
crypto/ecdh.c | 9 +-
crypto/seed.c | 2 +-
crypto/sha1_generic.c | 2 +-
crypto/sha256_generic.c | 2 +-
crypto/sha512_generic.c | 2 +-
crypto/sm2.c | 75 +-
crypto/tcrypt.c | 83 +-
crypto/testmgr.c | 141 +-
drivers/char/hw_random/Kconfig | 14 +-
drivers/char/hw_random/Makefile | 1 -
drivers/char/hw_random/hisi-trng-v2.c | 99 --
drivers/char/hw_random/imx-rngc.c | 4 +-
drivers/char/random.c | 2 +-
drivers/crypto/Kconfig | 5 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/allwinner/Kconfig | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 23 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 3 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 3 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 3 +-
drivers/crypto/amcc/crypto4xx_alg.c | 2 +-
drivers/crypto/amcc/crypto4xx_core.c | 4 +-
drivers/crypto/atmel-authenc.h | 3 +-
drivers/crypto/atmel-sha.c | 4 +-
drivers/crypto/axis/artpec6_crypto.c | 3 +-
drivers/crypto/bcm/cipher.c | 3 +-
drivers/crypto/bcm/cipher.h | 3 +-
drivers/crypto/bcm/spu.h | 3 +-
drivers/crypto/caam/caamalg.c | 4 +-
drivers/crypto/caam/caamalg_qi.c | 12 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +-
drivers/crypto/caam/compat.h | 3 +-
drivers/crypto/caam/intern.h | 8 +
drivers/crypto/caam/jr.c | 4 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 16 +-
drivers/crypto/cavium/cpt/cptvf_main.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 11 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_hal.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_isr.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_isr.h | 9 +
drivers/crypto/cavium/nitrox/nitrox_main.c | 13 -
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_req.h | 4 +
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 7 +-
drivers/crypto/cavium/zip/zip_main.c | 10 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 3 +-
drivers/crypto/ccp/ccp-crypto.h | 3 +-
drivers/crypto/ccree/cc_cipher.c | 3 +
drivers/crypto/ccree/cc_driver.c | 75 +-
drivers/crypto/ccree/cc_driver.h | 9 +-
drivers/crypto/ccree/cc_pm.c | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 3 +-
drivers/crypto/hisilicon/Kconfig | 8 +
drivers/crypto/hisilicon/Makefile | 1 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 4 +-
drivers/crypto/hisilicon/qm.c | 220 ++-
drivers/crypto/hisilicon/qm.h | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 2 -
drivers/crypto/hisilicon/sec2/sec_crypto.c | 25 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 34 +-
drivers/crypto/hisilicon/sgl.c | 2 -
drivers/crypto/hisilicon/trng/Makefile | 2 +
drivers/crypto/hisilicon/trng/trng.c | 334 ++++
drivers/crypto/hisilicon/zip/zip_main.c | 30 +-
drivers/crypto/img-hash.c | 3 +-
drivers/crypto/inside-secure/safexcel.c | 2 +-
drivers/crypto/inside-secure/safexcel.h | 3 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 3 +-
drivers/crypto/inside-secure/safexcel_hash.c | 3 +-
drivers/crypto/ixp4xx_crypto.c | 2 +-
drivers/crypto/keembay/Kconfig | 39 +
drivers/crypto/keembay/Makefile | 5 +
drivers/crypto/keembay/keembay-ocs-aes-core.c | 1713 ++++++++++++++++++++
drivers/crypto/keembay/ocs-aes.c | 1489 +++++++++++++++++
drivers/crypto/keembay/ocs-aes.h | 129 ++
drivers/crypto/marvell/cesa/hash.c | 3 +-
drivers/crypto/marvell/octeontx/otx_cptpf_main.c | 10 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 3 +-
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 10 +-
drivers/crypto/mediatek/mtk-sha.c | 3 +-
drivers/crypto/mxs-dcp.c | 3 +-
drivers/crypto/n2_core.c | 3 +-
drivers/crypto/nx/nx-sha256.c | 2 +-
drivers/crypto/nx/nx-sha512.c | 2 +-
drivers/crypto/nx/nx.c | 2 +-
drivers/crypto/omap-aes.c | 4 +-
drivers/crypto/omap-sham.c | 3 +-
drivers/crypto/padlock-sha.c | 3 +-
drivers/crypto/picoxcell_crypto.c | 3 +-
drivers/crypto/qat/Kconfig | 11 +
drivers/crypto/qat/Makefile | 1 +
drivers/crypto/qat/qat_4xxx/Makefile | 4 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 242 +++
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 86 +
drivers/crypto/qat/qat_4xxx/adf_drv.c | 323 ++++
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 49 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 5 +
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 11 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 7 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 49 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 5 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 11 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 7 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_common/Makefile | 2 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 65 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 69 +-
drivers/crypto/qat/qat_common/adf_admin.c | 77 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 4 +-
drivers/crypto/qat/qat_common/adf_cfg_common.h | 3 +-
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 3 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 19 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 11 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 181 +++
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 123 ++
drivers/crypto/qat/qat_common/adf_gen4_hw_data.c | 101 ++
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 99 ++
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 94 +-
drivers/crypto/qat/qat_common/adf_isr.c | 7 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 78 +-
drivers/crypto/qat/qat_common/adf_transport.c | 130 +-
.../qat/qat_common/adf_transport_access_macros.h | 67 -
.../crypto/qat/qat_common/adf_transport_debug.c | 32 +-
.../crypto/qat/qat_common/adf_transport_internal.h | 2 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 5 +-
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 6 +-
drivers/crypto/qat/qat_common/icp_qat_fw_la.h | 7 +
.../qat/qat_common/icp_qat_fw_loader_handle.h | 26 +-
drivers/crypto/qat/qat_common/icp_qat_hal.h | 63 +-
drivers/crypto/qat/qat_common/icp_qat_hw.h | 40 +-
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 132 +-
drivers/crypto/qat/qat_common/qat_algs.c | 248 ++-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 13 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 162 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 26 +-
drivers/crypto/qat/qat_common/qat_hal.c | 421 +++--
drivers/crypto/qat/qat_common/qat_uclo.c | 737 +++++++--
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 60 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 5 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 9 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 7 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 4 +-
drivers/crypto/qce/common.c | 3 +-
drivers/crypto/qce/core.c | 18 +-
drivers/crypto/qce/sha.c | 2 +-
drivers/crypto/qce/sha.h | 3 +-
drivers/crypto/rockchip/rk3288_crypto.h | 3 +-
drivers/crypto/s5p-sss.c | 3 +-
drivers/crypto/sa2ul.c | 121 +-
drivers/crypto/sa2ul.h | 7 +-
drivers/crypto/sahara.c | 3 +-
drivers/crypto/stm32/stm32-hash.c | 3 +-
drivers/crypto/talitos.c | 13 +-
drivers/crypto/ux500/hash/hash_core.c | 3 +-
drivers/firmware/efi/embedded-firmware.c | 2 +-
.../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c | 3 +-
.../ethernet/chelsio/inline_crypto/chtls/chtls.h | 3 +-
drivers/nfc/s3fwrn5/firmware.c | 2 +-
drivers/tee/tee_core.c | 2 +-
fs/crypto/fname.c | 2 +-
fs/crypto/hkdf.c | 2 +-
fs/ubifs/auth.c | 1 -
fs/verity/fsverity_private.h | 2 +-
include/crypto/aead.h | 5 +
include/crypto/curve25519.h | 2 +
include/crypto/hash_info.h | 3 +-
include/crypto/internal/blake2s.h | 2 +
include/crypto/sha1.h | 46 +
include/crypto/sha1_base.h | 5 +-
include/crypto/{sha.h => sha2.h} | 41 +-
include/crypto/sha256_base.h | 5 +-
include/crypto/sha512_base.h | 5 +-
include/crypto/sm3_base.h | 3 +-
include/linux/ccp.h | 3 +-
include/linux/filter.h | 2 +-
include/linux/purgatory.h | 2 +-
include/uapi/linux/if_alg.h | 16 +
kernel/crash_core.c | 2 +-
kernel/kexec_core.c | 1 -
kernel/kexec_file.c | 2 +-
lib/crypto/blake2s-selftest.c | 2 +-
lib/crypto/blake2s.c | 2 -
lib/crypto/curve25519.c | 2 -
lib/crypto/sha256.c | 214 +--
lib/digsig.c | 2 +-
lib/mpi/ec.c | 3 -
lib/sha1.c | 2 +-
net/ipv6/seg6_hmac.c | 1 -
net/mptcp/crypto.c | 2 +-
net/mptcp/options.c | 2 +-
net/mptcp/subflow.c | 2 +-
security/integrity/integrity.h | 2 +-
security/keys/encrypted-keys/encrypted.c | 2 +-
security/keys/trusted-keys/trusted_tpm1.c | 2 +-
sound/soc/codecs/cros_ec_codec.c | 2 +-
264 files changed, 8427 insertions(+), 1992 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-aes.yaml
delete mode 100644 arch/x86/crypto/aes_glue.c
delete mode 100644 drivers/char/hw_random/hisi-trng-v2.c
create mode 100644 drivers/crypto/hisilicon/trng/Makefile
create mode 100644 drivers/crypto/hisilicon/trng/trng.c
create mode 100644 drivers/crypto/keembay/Kconfig
create mode 100644 drivers/crypto/keembay/Makefile
create mode 100644 drivers/crypto/keembay/keembay-ocs-aes-core.c
create mode 100644 drivers/crypto/keembay/ocs-aes.c
create mode 100644 drivers/crypto/keembay/ocs-aes.h
create mode 100644 drivers/crypto/qat/qat_4xxx/Makefile
create mode 100644 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c
create mode 100644 drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h
create mode 100644 drivers/crypto/qat/qat_4xxx/adf_drv.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_hw_data.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_hw_data.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_hw_data.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_hw_data.h
create mode 100644 include/crypto/sha1.h
rename include/crypto/{sha.h => sha2.h} (77%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.11
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
@ 2020-12-14 20:56 ` pr-tracker-bot
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-12-14 20:56 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 14 Dec 2020 16:55:16 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/9e4b0d55d84a66dbfede56890501dc96e696059c
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2020-10-26 17:52 ` pr-tracker-bot
@ 2020-12-27 11:32 ` Herbert Xu
2020-12-27 17:27 ` pr-tracker-bot
2021-01-08 3:54 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2020-12-27 11:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a number of autobuild failures due to missing
Kconfig dependencies.
The following changes since commit 93cebeb1c21a65b92636aaa278a32fbc0415ec67:
crypto: qat - add capability detection logic in qat_4xxx (2020-12-11 21:54:16 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c0e583ab2016de8dedfb73934d4c4e8ff5bd896c:
crypto: qat - add CRYPTO_AES to Kconfig dependencies (2020-12-23 18:45:23 +1100)
----------------------------------------------------------------
Daniele Alessandrelli (1):
crypto: keembay - Add dependency on HAS_IOMEM
Geert Uytterhoeven (1):
crypto: keembay - CRYPTO_DEV_KEEMBAY_OCS_AES_SM4 should depend on ARCH_KEEMBAY
Marco Chiappero (1):
crypto: qat - add CRYPTO_AES to Kconfig dependencies
drivers/crypto/keembay/Kconfig | 5 +++--
drivers/crypto/qat/Kconfig | 1 +
2 files changed, 4 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
@ 2020-12-27 17:27 ` pr-tracker-bot
2021-01-08 3:54 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2020-12-27 17:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sun, 27 Dec 2020 22:32:21 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/33c148a4ae7dc3cd440f6c0d746ac7f0ff320682
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2020-12-27 17:27 ` pr-tracker-bot
@ 2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2021-01-08 3:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a functional bug in arm/chacha-neon as well as a
potential buffer overflow in ecdh.
The following changes since commit 5c8fe583cce542aa0b84adc939ce85293de36e5e:
Linux 5.11-rc1 (2020-12-27 15:30:22 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:
crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)
----------------------------------------------------------------
Ard Biesheuvel (2):
crypto: arm/chacha-neon - add missing counter increment
crypto: ecdh - avoid buffer overflow in ecdh_set_secret()
arch/arm/crypto/chacha-glue.c | 1 +
crypto/ecdh.c | 3 ++-
2 files changed, 3 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2021-01-08 3:54 ` Herbert Xu
@ 2021-01-08 20:36 ` pr-tracker-bot
2021-01-18 5:13 ` Herbert Xu
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-01-08 20:36 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 8 Jan 2021 14:54:50 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ea1c87c156d94dd78b4f5267ec40c403b2da7e14
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
@ 2021-01-18 5:13 ` Herbert Xu
2021-01-18 21:16 ` pr-tracker-bot
2021-01-25 22:36 ` Herbert Xu
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-01-18 5:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a Kconfig dependency issue with omap-sham and a
divide by zero in xor on some platforms.
The following changes since commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:
crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 382811940303f7cd01d0f3dcdf432dfd89c5a98e:
crypto: omap-sham - Fix link error without crypto-engine (2021-01-08 15:37:55 +1100)
----------------------------------------------------------------
Arnd Bergmann (1):
crypto: omap-sham - Fix link error without crypto-engine
Kirill Tkhai (1):
crypto: xor - Fix divide error in do_xor_speed()
crypto/xor.c | 2 ++
drivers/crypto/Kconfig | 1 +
2 files changed, 3 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2021-01-18 5:13 ` Herbert Xu
@ 2021-01-18 21:16 ` pr-tracker-bot
2021-01-25 22:36 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-01-18 21:16 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 18 Jan 2021 16:13:13 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/fd3958eac387593d02e4d4287658ba04bcdb235a
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.11
2021-01-18 5:13 ` Herbert Xu
2021-01-18 21:16 ` pr-tracker-bot
@ 2021-01-25 22:36 ` Herbert Xu
2021-01-26 0:01 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2021-01-25 22:36 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in the cesa driver.
The following changes since commit 382811940303f7cd01d0f3dcdf432dfd89c5a98e:
crypto: omap-sham - Fix link error without crypto-engine (2021-01-08 15:37:55 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 4f6543f28bb05433d87b6de6c21e9c14c35ecf33:
crypto: marvel/cesa - Fix tdma descriptor on 64-bit (2021-01-22 14:57:31 +1100)
----------------------------------------------------------------
Herbert Xu (1):
crypto: marvel/cesa - Fix tdma descriptor on 64-bit
drivers/crypto/marvell/cesa/cesa.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.11
2021-01-25 22:36 ` Herbert Xu
@ 2021-01-26 0:01 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-01-26 0:01 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 26 Jan 2021 09:36:19 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/13391c60da3308ed9980de0168f74cce6c62ac1d
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.12
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2020-12-14 20:56 ` pr-tracker-bot
@ 2021-02-15 2:47 ` Herbert Xu
2021-02-22 1:28 ` pr-tracker-bot
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-02-15 2:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Restrict crypto_cipher to internal API users only.
Algorithms:
- Add x86 aesni acceleration for cts.
- Improve x86 aesni acceleration for xts.
- Remove x86 acceleration of some uncommon algorithms.
- Remove RIPE-MD, Tiger and Salsa20.
- Remove tnepres.
- Add ARM acceleration for BLAKE2s and BLAKE2b.
Drivers:
- Add Keem Bay OCS HCU driver.
- Add Marvell OcteonTX2 CPT PF driver.
- Remove PicoXcell driver.
- Remove mediatek driver.
The following changes since commit 0aa171e9b267ce7c52d3a3df7bc9c1fc0203dec5:
crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (2021-01-03 08:35:35 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0de9dc80625b0ca1cb9730c5ed1c5a8cab538369:
hwrng: timeriomem - Use device-managed registration API (2021-02-10 17:56:01 +1100)
----------------------------------------------------------------
Adam Guerin (3):
crypto: qat - fix potential spectre issue
crypto: qat - change format string and cast ring size
crypto: qat - reduce size of mapped region
Ard Biesheuvel (60):
crypto: aesni - implement support for cts(cbc(aes))
crypto: tcrypt - avoid signed overflow in byte count
chcr_ktls: use AES library for single use cipher
crypto: remove cipher routines from public crypto API
crypto: arm64/aes-ce - really hide slower algos when faster ones are enabled
crypto: arm64/aes-ctr - improve tail handling
crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
crypto: x86/aes-ni-xts - rewrite and drop indirections via glue helper
crypto: aesni - prevent misaligned buffers on the stack
crypto: aesni - drop unused asm prototypes
crypto: aesni - clean up mapping of associated data
crypto: aesni - refactor scatterlist processing
crypto: aesni - replace function pointers with static branches
crypto: x86/camellia - switch to XTS template
crypto: x86/cast6 - switch to XTS template
crypto: x86/serpent- switch to XTS template
crypto: x86/twofish - switch to XTS template
crypto: x86/glue-helper - drop XTS helper routines
crypto: x86/camellia - drop CTR mode implementation
crypto: x86/serpent - drop CTR mode implementation
crypto: x86/cast5 - drop CTR mode implementation
crypto: x86/cast6 - drop CTR mode implementation
crypto: x86/twofish - drop CTR mode implementation
crypto: x86/glue-helper - drop CTR helper routines
crypto: x86/des - drop CTR mode implementation
crypto: x86/blowfish - drop CTR mode implementation
crypto: x86 - add some helper macros for ECB and CBC modes
crypto: x86/camellia - drop dependency on glue helper
crypto: x86/serpent - drop dependency on glue helper
crypto: x86/cast5 - drop dependency on glue helper
crypto: x86/cast6 - drop dependency on glue helper
crypto: x86/twofish - drop dependency on glue helper
crypto: x86 - remove glue helper module
crypto: x86 - use local headers for x86 specific shared declarations
crypto - shash: reduce minimum alignment of shash_desc structure
crypto: arm64/sha - add missing module aliases
crypto: aesni - replace CTR function pointer with static call
crypto: aesni - release FPU during skcipher walk API calls
crypto: rmd128 - remove RIPE-MD 128 hash algorithm
crypto: rmd256 - remove RIPE-MD 256 hash algorithm
crypto: rmd320 - remove RIPE-MD 320 hash algorithm
crypto: tgr192 - remove Tiger 128/160/192 hash algorithms
crypto: salsa20 - remove Salsa20 stream cipher algorithm
arm64: assembler: add cond_yield macro
crypto: michael_mic - fix broken misalignment handling
crypto: serpent - get rid of obsolete tnepres variant
crypto: serpent - use unaligned accessors instead of alignmask
crypto: blowfish - use unaligned accessors instead of alignmask
crypto: camellia - use unaligned accessors instead of alignmask
crypto: cast5 - use unaligned accessors instead of alignmask
crypto: cast6 - use unaligned accessors instead of alignmask
crypto: fcrypt - drop unneeded alignmask
crypto: twofish - use unaligned accessors instead of alignmask
crypto: arm64/sha1-ce - simplify NEON yield
crypto: arm64/sha2-ce - simplify NEON yield
crypto: arm64/sha3-ce - simplify NEON yield
crypto: arm64/sha512-ce - simplify NEON yield
crypto: arm64/aes-neonbs - remove NEON yield calls
crypto: arm64/aes-ce-mac - simplify NEON yield
crypto: arm64/crc-t10dif - move NEON yield to C code
Arnd Bergmann (1):
crypto: octeontx2 - fix -Wpointer-bool-conversion warning
Bhaskar Chowdhury (2):
crypto: marvell/cesa - Fix a spelling s/fautly/faultly/ in comment
crypto: xor - Fix typo of optimization
Christophe JAILLET (1):
hwrng: ingenic - Fix a resource leak in an error handling path
Christophe Leroy (2):
crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error)
crypto: talitos - Fix ctr(aes) on SEC1
Corentin Labbe (8):
crypto: sun4i-ss - linearize buffers content must be kept
crypto: sun4i-ss - checking sg length is not sufficient
crypto: sun4i-ss - IV register does not work on A10 and A13
crypto: sun4i-ss - handle BigEndian for cipher
crypto: sun4i-ss - initialize need_fallback
crypto: sun4i-ss - fix kmap usage
crypto: sun4i-ss - enabled stats via debugfs
crypto: sun4i-ss - add SPDX header and remove blank lines
Dan Carpenter (2):
crypto: keembay-ocs-hcu - Fix a WARN() message
crypto: octeontx2 - fix signedness bug in cptvf_register_interrupts()
Daniele Alessandrelli (6):
crypto: keembay-ocs-hcu - Add HMAC support
crypto: keembay-ocs-hcu - Add optional support for sha224
MAINTAINERS: Add maintainers for Keem Bay OCS HCU driver
crypto: keembay-ocs-hcu - Add dependency on HAS_IOMEM and ARCH_KEEMBAY
crypto: ecdh_helper - Ensure 'len >= secret.len' in decode_key()
crypto: keembay-ocs-aes - Fix 'q' assignment during CCM B0 generation
Declan Murphy (2):
dt-bindings: crypto: Add Keem Bay OCS HCU bindings
crypto: keembay - Add Keem Bay OCS HCU driver
Eric Biggers (14):
crypto: blake2s - define shash_alg structs using macros
crypto: x86/blake2s - define shash_alg structs using macros
crypto: blake2s - remove unneeded includes
crypto: blake2s - move update and final logic to internal/blake2s.h
crypto: blake2s - share the "shash" API boilerplate code
crypto: blake2s - optimize blake2s initialization
crypto: blake2s - add comment for blake2s_state fields
crypto: blake2s - adjust include guard naming
crypto: blake2s - include <linux/bug.h> instead of <asm/bug.h>
crypto: arm/blake2s - add ARM scalar optimized BLAKE2s
wireguard: Kconfig: select CRYPTO_BLAKE2S_ARM
crypto: blake2b - sync with blake2s implementation
crypto: blake2b - update file comment
crypto: arm/blake2b - add NEON-accelerated BLAKE2b
Fabio Estevam (1):
crypto: sahara - Remove unused .id_table support
Florian Fainelli (1):
crypto: crypto4xx - Avoid linking failure with HW_RANDOM=m
Geert Uytterhoeven (1):
crypto: marvell - CRYPTO_DEV_OCTEONTX2_CPT should depend on ARCH_THUNDER2
Herbert Xu (6):
crypto: vmx - Move extern declarations into header file
crypto: stm32 - Fix last sparse warning in stm32_cryp_check_ctr_counter
crypto: bcm - Fix sparse warnings
crypto: marvell/cesa - Fix use of sg_pcopy on iomem pointer
crypto: octeontx2 - Add dependency on NET_VENDOR_MARVELL
Merge git://git.kernel.org/.../arm64/linux for-next/crypto
Hui Tang (6):
crypto: hisilicon/hpre - delete ECC 1bit error reported threshold
crypto: hisilicon/hpre - add two RAS correctable errors processing
crypto: hisilicon/hpre - add ecc algorithm inqury for uacce device
crypto: hisilicon/hpre - adapt the number of clusters
crypto: hisilicon/hpre - tiny fix
crypto: hisilicon/hpre - enable Elliptic curve cryptography
Jan Henrik Weinstock (1):
hwrng: timeriomem - Fix cooldown period calculation
Jason A. Donenfeld (1):
crypto: lib/chacha20poly1305 - define empty module exit function
Jiapeng Chong (1):
crypto: caam - Replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
Jiri Olsa (1):
crypto: bcm - Rename struct device_private to bcm_device_private
Kai Ye (4):
crypto: hisilicon/qm - SVA bugfixed on Kunpeng920
crypto: hisilicon - add ZIP device using mode parameter
crypto: hisilicon/hpre - register HPRE device to uacce
crypto: hisilicon/sec - register SEC device to uacce
Krzysztof Kozlowski (1):
MAINTAINERS: crypto: s5p-sss: drop Kamil Konieczny
Marco Chiappero (1):
crypto: qat - replace CRYPTO_AES with CRYPTO_LIB_AES in Kconfig
Matthias Brugger (2):
hwrng: iproc-rng200 - Fix disable of the block.
hwrng: iproc-rng200 - Move enable/disable in separate function
Ovidiu Panait (1):
crypto: keembay - use 64-bit arithmetic for computing bit_len
Rob Herring (1):
crypto: picoxcell - Remove PicoXcell driver
Sihang Chen (1):
crypto: hisilicon/qm - update irqflag
Srujana Challa (9):
crypto: marvell - add Marvell OcteonTX2 CPT PF driver
crypto: octeontx2 - add mailbox communication with AF
crypto: octeontx2 - enable SR-IOV and mailbox communication with VF
crypto: octeontx2 - load microcode and create engine groups
crypto: octeontx2 - add LF framework
crypto: octeontx2 - add support to get engine capabilities
crypto: octeontx2 - add virtual function driver support
crypto: octeontx2 - add support to process the crypto request
crypto: octeontx2 - register with linux crypto framework
Tian Tao (4):
crypto: ccree - remove unused including <linux/version.h>
crypto: inside-secure - fix platform_get_irq.cocci warnings
hwrng: optee - Use device-managed registration API
hwrng: timeriomem - Use device-managed registration API
Vic Wu (1):
crypto: mediatek - remove obsolete driver
Weili Qian (7):
crypto: hisilicon/qm - fix use of 'dma_map_single'
crypto: hisilicon - PASID fixed on Kunpeng 930
crypto: hisilicon/qm - removing driver after reset
crypto: hisilicon/qm - fix request missing error
crypto: hisilicon/qm - fix the value of 'QM_SQC_VFT_BASE_MASK_V2'
crypto: hisilicon/qm - do not reset hardware when CE happens
crypto: hisilicon/qm - fix printing format issue
Wojciech Ziemba (1):
crypto: qat - configure arbiter mapping based on engines enabled
Xu Wang (1):
crypto: cpt - remove casting dma_alloc_coherent
Yang Li (1):
crypto: powerpc/sha256 - remove unneeded semicolon
dingsenjie (1):
crypto: ccree - fix spelling typo of allocated
.mailmap | 1 -
.../admin-guide/device-mapper/dm-integrity.rst | 4 +-
Documentation/crypto/api-skcipher.rst | 4 +-
.../bindings/crypto/intel,keembay-ocs-hcu.yaml | 46 +
.../bindings/crypto/samsung-slimsss.yaml | 1 -
.../devicetree/bindings/crypto/samsung-sss.yaml | 1 -
MAINTAINERS | 12 +-
arch/arm/crypto/Kconfig | 19 +
arch/arm/crypto/Makefile | 4 +
arch/arm/crypto/aes-neonbs-glue.c | 3 +
arch/arm/crypto/blake2b-neon-core.S | 347 ++++
arch/arm/crypto/blake2b-neon-glue.c | 105 ++
arch/arm/crypto/blake2s-core.S | 285 +++
arch/arm/crypto/blake2s-glue.c | 78 +
arch/arm64/crypto/aes-glue.c | 71 +-
arch/arm64/crypto/aes-modes.S | 217 ++-
arch/arm64/crypto/aes-neonbs-core.S | 8 +-
arch/arm64/crypto/crct10dif-ce-core.S | 43 +-
arch/arm64/crypto/crct10dif-ce-glue.c | 30 +-
arch/arm64/crypto/sha1-ce-core.S | 47 +-
arch/arm64/crypto/sha1-ce-glue.c | 23 +-
arch/arm64/crypto/sha2-ce-core.S | 38 +-
arch/arm64/crypto/sha2-ce-glue.c | 24 +-
arch/arm64/crypto/sha3-ce-core.S | 81 +-
arch/arm64/crypto/sha3-ce-glue.c | 18 +-
arch/arm64/crypto/sha512-ce-core.S | 29 +-
arch/arm64/crypto/sha512-ce-glue.c | 55 +-
arch/arm64/include/asm/assembler.h | 16 +
arch/powerpc/crypto/sha256-spe-glue.c | 2 +-
arch/s390/crypto/aes_s390.c | 2 +
arch/x86/crypto/Makefile | 2 -
arch/x86/crypto/aesni-intel_asm.S | 482 +++++-
arch/x86/crypto/aesni-intel_glue.c | 753 ++++----
arch/x86/crypto/blake2s-glue.c | 150 +-
arch/x86/crypto/blowfish_glue.c | 107 --
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 298 ----
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 351 ----
arch/x86/{include/asm => }/crypto/camellia.h | 24 -
arch/x86/crypto/camellia_aesni_avx2_glue.c | 198 +--
arch/x86/crypto/camellia_aesni_avx_glue.c | 216 +--
arch/x86/crypto/camellia_glue.c | 145 +-
arch/x86/crypto/cast5_avx_glue.c | 287 +---
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 84 -
arch/x86/crypto/cast6_avx_glue.c | 207 +--
arch/x86/crypto/des3_ede_glue.c | 104 --
arch/x86/crypto/ecb_cbc_helpers.h | 76 +
arch/x86/crypto/glue_helper-asm-avx.S | 104 --
arch/x86/crypto/glue_helper-asm-avx2.S | 136 --
arch/x86/crypto/glue_helper.c | 381 -----
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 68 -
arch/x86/crypto/serpent-avx.h | 21 +
arch/x86/crypto/serpent-avx2-asm_64.S | 87 -
arch/x86/{include/asm => }/crypto/serpent-sse2.h | 0
arch/x86/crypto/serpent_avx2_glue.c | 185 +-
arch/x86/crypto/serpent_avx_glue.c | 215 +--
arch/x86/crypto/serpent_sse2_glue.c | 150 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 80 -
arch/x86/{include/asm => }/crypto/twofish.h | 4 -
arch/x86/crypto/twofish_avx_glue.c | 211 +--
arch/x86/crypto/twofish_glue_3way.c | 160 +-
arch/x86/include/asm/crypto/glue_helper.h | 118 --
arch/x86/include/asm/crypto/serpent-avx.h | 42 -
crypto/Kconfig | 96 +-
crypto/Makefile | 4 -
crypto/adiantum.c | 2 +
crypto/ansi_cprng.c | 2 +
crypto/blake2b_generic.c | 249 +--
crypto/blake2s_generic.c | 158 +-
crypto/blowfish_generic.c | 23 +-
crypto/camellia_generic.c | 45 +-
crypto/cast5_generic.c | 23 +-
crypto/cast6_generic.c | 39 +-
crypto/cbc.c | 1 +
crypto/ccm.c | 2 +
crypto/cfb.c | 2 +
crypto/cipher.c | 7 +-
crypto/cmac.c | 2 +
crypto/ctr.c | 2 +
crypto/drbg.c | 2 +
crypto/ecb.c | 1 +
crypto/ecdh_helper.c | 3 +
crypto/essiv.c | 2 +
crypto/fcrypt.c | 1 -
crypto/keywrap.c | 2 +
crypto/michael_mic.c | 31 +-
crypto/ofb.c | 2 +
crypto/pcbc.c | 2 +
crypto/ripemd.h | 14 -
crypto/rmd128.c | 323 ----
crypto/rmd256.c | 342 ----
crypto/rmd320.c | 391 -----
crypto/salsa20_generic.c | 212 ---
crypto/serpent_generic.c | 126 +-
crypto/skcipher.c | 8 +-
crypto/tcrypt.c | 113 +-
crypto/testmgr.c | 57 +-
crypto/testmgr.h | 1632 ------------------
crypto/tgr192.c | 682 --------
crypto/twofish_generic.c | 11 +-
crypto/vmac.c | 2 +
crypto/xcbc.c | 2 +
crypto/xor.c | 2 +-
crypto/xts.c | 2 +
drivers/char/hw_random/ingenic-trng.c | 6 +-
drivers/char/hw_random/iproc-rng200.c | 38 +-
drivers/char/hw_random/optee-rng.c | 3 +-
drivers/char/hw_random/timeriomem-rng.c | 5 +-
drivers/crypto/Kconfig | 35 +-
drivers/crypto/Makefile | 2 -
drivers/crypto/allwinner/Kconfig | 9 +
.../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 196 ++-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 52 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c | 6 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-prng.c | 6 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 8 +
drivers/crypto/bcm/cipher.c | 6 +-
drivers/crypto/bcm/cipher.h | 4 +-
drivers/crypto/bcm/spu.c | 20 +-
drivers/crypto/bcm/spu2.c | 6 +-
drivers/crypto/bcm/spu2.h | 8 +-
drivers/crypto/bcm/spum.h | 22 +-
drivers/crypto/bcm/util.c | 4 +-
drivers/crypto/bcm/util.h | 26 +-
drivers/crypto/caam/debugfs.c | 4 +-
drivers/crypto/cavium/cpt/cptvf_main.c | 8 +-
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/ccree/cc_driver.h | 1 -
drivers/crypto/geode-aes.c | 2 +
drivers/crypto/hisilicon/hpre/hpre.h | 8 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 169 +-
drivers/crypto/hisilicon/qm.c | 193 ++-
drivers/crypto/hisilicon/qm.h | 33 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 42 +-
drivers/crypto/hisilicon/zip/zip_main.c | 23 +-
drivers/crypto/inside-secure/safexcel.c | 6 +-
drivers/crypto/inside-secure/safexcel_hash.c | 1 +
drivers/crypto/keembay/Kconfig | 31 +
drivers/crypto/keembay/Makefile | 3 +
drivers/crypto/keembay/keembay-ocs-hcu-core.c | 1264 ++++++++++++++
drivers/crypto/keembay/ocs-aes.c | 10 +-
drivers/crypto/keembay/ocs-hcu.c | 840 +++++++++
drivers/crypto/keembay/ocs-hcu.h | 106 ++
drivers/crypto/marvell/Kconfig | 15 +
drivers/crypto/marvell/Makefile | 1 +
drivers/crypto/marvell/cesa/cesa.c | 10 +-
drivers/crypto/marvell/cesa/cesa.h | 31 +-
drivers/crypto/marvell/cesa/cipher.c | 34 +-
drivers/crypto/marvell/cesa/hash.c | 59 +-
drivers/crypto/marvell/cesa/tdma.c | 52 +-
drivers/crypto/marvell/octeontx2/Makefile | 10 +
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 137 ++
.../crypto/marvell/octeontx2/otx2_cpt_hw_types.h | 464 +++++
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 202 +++
drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h | 197 +++
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 428 +++++
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 353 ++++
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 61 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 713 ++++++++
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 356 ++++
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 1415 +++++++++++++++
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 162 ++
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 29 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 1758 +++++++++++++++++++
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h | 178 ++
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 410 +++++
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 167 ++
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 541 ++++++
drivers/crypto/mediatek/Makefile | 3 -
drivers/crypto/mediatek/mtk-aes.c | 1271 --------------
drivers/crypto/mediatek/mtk-platform.c | 586 -------
drivers/crypto/mediatek/mtk-platform.h | 231 ---
drivers/crypto/mediatek/mtk-regs.h | 190 --
drivers/crypto/mediatek/mtk-sha.c | 1353 ---------------
drivers/crypto/picoxcell_crypto.c | 1807 --------------------
drivers/crypto/picoxcell_crypto_regs.h | 115 --
drivers/crypto/qat/Kconfig | 2 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 14 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 17 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 27 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 3 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 1 +
drivers/crypto/qat/qat_common/adf_hw_arbiter.c | 8 +-
drivers/crypto/qat/qat_common/adf_transport.c | 2 +
.../crypto/qat/qat_common/adf_transport_debug.c | 4 +-
drivers/crypto/qat/qat_common/qat_algs.c | 1 +
drivers/crypto/qat/qat_common/qat_asym_algs.c | 12 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 28 +-
drivers/crypto/sahara.c | 7 -
drivers/crypto/stm32/stm32-cryp.c | 2 +-
drivers/crypto/talitos.c | 50 +-
drivers/crypto/talitos.h | 1 +
drivers/crypto/vmx/aes.c | 1 +
drivers/crypto/vmx/aesp8-ppc.h | 6 +
drivers/crypto/vmx/vmx.c | 7 +-
drivers/net/Kconfig | 1 +
drivers/net/ethernet/chelsio/inline_crypto/Kconfig | 1 +
.../chelsio/inline_crypto/ch_ktls/chcr_ktls.c | 19 +-
include/crypto/algapi.h | 39 -
include/crypto/blake2b.h | 67 +
include/crypto/blake2s.h | 63 +-
include/crypto/hash.h | 8 +-
include/crypto/internal/blake2b.h | 115 ++
include/crypto/internal/blake2s.h | 109 +-
include/crypto/internal/cipher.h | 218 +++
include/crypto/internal/skcipher.h | 2 +-
include/linux/crypto.h | 172 +-
lib/crypto/blake2s.c | 48 +-
lib/crypto/chacha20poly1305.c | 5 +
208 files changed, 13977 insertions(+), 15312 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-hcu.yaml
create mode 100644 arch/arm/crypto/blake2b-neon-core.S
create mode 100644 arch/arm/crypto/blake2b-neon-glue.c
create mode 100644 arch/arm/crypto/blake2s-core.S
create mode 100644 arch/arm/crypto/blake2s-glue.c
rename arch/x86/{include/asm => }/crypto/camellia.h (69%)
create mode 100644 arch/x86/crypto/ecb_cbc_helpers.h
delete mode 100644 arch/x86/crypto/glue_helper.c
create mode 100644 arch/x86/crypto/serpent-avx.h
rename arch/x86/{include/asm => }/crypto/serpent-sse2.h (100%)
rename arch/x86/{include/asm => }/crypto/twofish.h (80%)
delete mode 100644 arch/x86/include/asm/crypto/glue_helper.h
delete mode 100644 arch/x86/include/asm/crypto/serpent-avx.h
delete mode 100644 crypto/rmd128.c
delete mode 100644 crypto/rmd256.c
delete mode 100644 crypto/rmd320.c
delete mode 100644 crypto/salsa20_generic.c
delete mode 100644 crypto/tgr192.c
create mode 100644 drivers/crypto/keembay/keembay-ocs-hcu-core.c
create mode 100644 drivers/crypto/keembay/ocs-hcu.c
create mode 100644 drivers/crypto/keembay/ocs-hcu.h
create mode 100644 drivers/crypto/marvell/octeontx2/Makefile
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_common.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_hw_types.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_mbox_common.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptlf.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptlf.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c
delete mode 100644 drivers/crypto/mediatek/Makefile
delete mode 100644 drivers/crypto/mediatek/mtk-aes.c
delete mode 100644 drivers/crypto/mediatek/mtk-platform.c
delete mode 100644 drivers/crypto/mediatek/mtk-platform.h
delete mode 100644 drivers/crypto/mediatek/mtk-regs.h
delete mode 100644 drivers/crypto/mediatek/mtk-sha.c
delete mode 100644 drivers/crypto/picoxcell_crypto.c
delete mode 100644 drivers/crypto/picoxcell_crypto_regs.h
create mode 100644 include/crypto/blake2b.h
create mode 100644 include/crypto/internal/blake2b.h
create mode 100644 include/crypto/internal/cipher.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.12
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
@ 2021-02-22 1:28 ` pr-tracker-bot
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-02-22 1:28 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 15 Feb 2021 13:47:21 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/31caf8b2a847214be856f843e251fc2ed2cd1075
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.13
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
2021-02-22 1:28 ` pr-tracker-bot
@ 2021-04-26 12:32 ` Herbert Xu
2021-04-26 15:59 ` pr-tracker-bot
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-04-26 12:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- crypto_destroy_tfm now ignores errors as well as NULL pointers.
Algorithms:
- Add explicit curve IDs in ECDH algorithm names.
- Add NIST P384 curve parameters.
- Add ECDSA.
Drivers:
- Add support for Green Sardine in ccp.
- Add ecdh/curve25519 to hisilicon/hpre.
- Add support for AM64 in sa2ul.
The following changes since commit a38fd8748464831584a19438cbb3082b5a2dab15:
Linux 5.12-rc2 (2021-03-05 17:33:41 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to e3a606f2c544b231f6079c8c5fea451e772e1139:
fsverity: relax build time dependency on CRYPTO_SHA256 (2021-04-22 17:31:32 +1000)
----------------------------------------------------------------
Aditya Srivastava (4):
crypto: vmx - fix incorrect kernel-doc comment syntax in files
crypto: amcc - fix incorrect kernel-doc comment syntax in files
crypto: ux500 - fix incorrect kernel-doc comment syntax
crypto: nx - fix incorrect kernel-doc comment syntax in files
Ard Biesheuvel (6):
crypto: api - check for ERR pointers in crypto_destroy_tfm()
crypto: arm/aes-scalar - switch to common rev_l/mov_l macros
crypto: arm/chacha-scalar - switch to common rev_l macro
crypto: arm64/aes-ce - deal with oversight in new CTR carry code
fscrypt: relax Kconfig dependencies for crypto API algorithms
fsverity: relax build time dependency on CRYPTO_SHA256
Arnd Bergmann (1):
crypto: poly1305 - fix poly1305_core_setkey() declaration
Ayush Sawal (1):
crypto: chelsio - Read rxchannel-id from firmware
Bhaskar Chowdhury (2):
crypto: qat - fix spelling mistake: "messge" -> "message"
crypto: inside-secure - Minor typo fix in the file safexcel.c
Christophe JAILLET (1):
crypto: crc32-generic - Use SPDX-License-Identifier
Colin Ian King (3):
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
crypto: sun8i-ss - Fix memory leak of pad
crypto: sa2ul - Fix memory leak of rxd
Corentin Labbe (2):
crypto: sun8i-ss - fix result memory leak on error path
crypto: allwinner - add missing CRYPTO_ prefix
Devaraj Rangasamy (1):
ccp: ccp - add support for Green Sardine
Eric Biggers (5):
crypto: arm/blake2b - drop unnecessary return statement
crypto: arm/blake2s - fix for big endian
crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS
random: initialize ChaCha20 constants with correct endianness
random: remove dead code left over from blocking pool
Giovanni Cabiddu (1):
crypto: qat - fix error path in adf_isr_resource_alloc()
Guobin Huang (2):
crypto: geode - use DEFINE_SPINLOCK() for spinlock
crypto: ixp4xx - use DEFINE_SPINLOCK() for spinlock
Hao Fang (1):
crypto: hisilicon - use the correct HiSilicon copyright
Herbert Xu (3):
crypto: serpent - Fix sparse byte order warnings
crypto: aegis128 - Move simd prototypes into aegis.h
Merge branch 'ecc'
Hui Tang (14):
crypto: qat - fix unmap invalid dma address
crypto: qat - fix use of 'dma_map_single'
crypto: hisilicon/hpre - delete wrap of 'CONFIG_CRYPTO_DH'
crypto: hisilicon/hpre - optimise 'hpre_algs_register' error path
crypto: hisilicon - fix the check on dma address
crypto: hisilicon/hpre - fix "hpre_ctx_init" resource leak
crypto: hisilicon/hpre - fix Kconfig
crypto: hisilicon/hpre - fix PASID setting on kunpeng 920
crypto: hisilicon/hpre - fix a typo and delete redundant blank line
crypto: hisilicon/hpre - delete redundant '\n'
crypto: hisilicon/hpre - delete the rudundant space after return
crypto: hisilicon/hpre - use the correct variable type
crypto: hisilicon/hpre - add debug log
crypto: hisilicon/hpre - delete redundant log and return in advance
Jia-Ju Bai (1):
crypto: sun8i-ce - fix error return code in sun8i_ce_prng_generate()
Jiapeng Chong (2):
crypto: ccp - A value assigned to a variable is never used
crypto: chelsio - remove unused function
Kai Ye (11):
crypto: testmgr - delete some redundant code
crypto: rockchip - delete unneeded variable initialization
crypto: hisilicon/sec - fixup checking the 3DES weak key
crypto: hisilicon/qm - delete redundant code
crypto: atmel - use the correct print format
crypto: hisilicon/sec - use the correct print format
crypto: hisilicon/sgl - add a comment for block size initialization
crypto: hisilicon/sgl - delete unneeded variable initialization
crypto: hisilicon/sgl - add some dfx logs
crypto: hisilicon/sgl - fix the soft sg map to hardware sg
crypto: hisilicon/sgl - fix the sg buf unmap
Krzysztof Kozlowski (4):
crypto: s5p-sss - initialize APB clock after the AXI bus clock for SlimSSS
crypto: s5p-sss - simplify getting of_device_id match data
crypto: s5p-sss - remove unneeded local variable initialization
crypto: s5p-sss - consistently use local 'dev' variable in probe()
Lee Jones (10):
crypto: hisilicon/sec - Supply missing description for 'sec_queue_empty()'s 'queue' param
crypto: bcm - Fix a whole host of kernel-doc misdemeanours
crypto: chelsio - Fix some kernel-doc issues
crypto: ux500/hash - Fix worthy kernel-doc headers and remove others
crypto: keembay - Fix incorrectly named functions/structs
crypto: atmel-ecc - Struct headers need to start with keyword 'struct'
crypto: caam - Provide the name of the function and provide missing descriptions
crypto: vmx - Source headers are not good kernel-doc candidates
crypto: nx - Repair some kernel-doc problems
crypto: nitrox - Demote non-compliant kernel-doc headers
Longfang Liu (5):
crypto: hisilicon/sec - fixes a printing error
crypto: hisilicon/sec - fixes some coding style
crypto: hisilicon/sec - fixes some driver coding style
crypto: hisilicon/sec - Fixes AES algorithm mode parameter problem
crypto: hisilicon/sec - Fix a module parameter error
Lv Yunlong (1):
crypto: qat - Fix a double free in adf_create_ring
Meng Yu (10):
crypto: hisilicon/hpre - add version adapt to new algorithms
crypto: hisilicon/hpre - add algorithm type
crypto: ecdh - move curve_id of ECDH from the key to algorithm name
crypto: ecc - expose ecc curves
crypto: hisilicon/hpre - add 'ECDH' algorithm
crypto: ecc - add curve25519 params and expose them
crypto: hisilicon/hpre - add 'CURVE25519' algorithm
crypto: ecc - Correct an error in the comments
crypto: hisilicon/hpre - Add processing of src_data in 'CURVE25519'
crypto: ecc - delete a useless function declaration
Milan Djurovic (3):
crypto: jitterentropy - Put constants on the right side of the expression
crypto: keywrap - Remove else after break statement
crypto: fcrypt - Remove 'do while(0)' loop for single statement macro
Nathan Chancellor (1):
crypto: arm/curve25519 - Move '.fpu' after '.arch'
Peter Ujfalusi (3):
dt-bindings: crypto: ti,sa2ul: Add new compatible for AM64
crypto: sa2ul - Support for per channel coherency
crypto: sa2ul - Add support for AM64
Philipp Zabel (1):
crypto: sun4i-ss - simplify optional reset handling
Randy Dunlap (2):
crypto: doc - fix kernel-doc notation in chacha.c and af_alg.c
crypto: camellia - drop duplicate "depends on CRYPTO"
Rijo Thomas (2):
crypto: ccp - reduce tee command status polling interval from 5ms to 1ms
crypto: ccp - fix command queuing to TEE ring buffer
Ruiqi Gong (1):
crypto: hisilicon/hpre - fix a typo in hpre_crypto.c
Saulo Alessandre (4):
crypto: ecc - Add NIST P384 curve parameters
crypto: ecc - Add math to support fast NIST P384
crypto: ecdsa - Register NIST P384 and extend test suite
x509: Add OID for NIST P384 and extend parser for it
Shixin Liu (7):
crypto: sun4i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
crypto: sun8i-ss - Fix PM reference leak when pm_runtime_get_sync() fails
crypto: sun8i-ce - Fix PM reference leak in sun8i_ce_probe()
crypto: stm32/hash - Fix PM reference leak on stm32-hash.c
crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c
crypto: sa2ul - Fix PM reference leak in sa_ul_probe()
crypto: omap-aes - Fix PM reference leak on omap-aes.c
Srujana Challa (1):
crypto: octeontx2 - add support for OcteonTX2 98xx CPT block.
Stefan Berger (5):
oid_registry: Add OIDs for ECDSA with SHA224/256/384/512
crypto: ecdsa - Add support for ECDSA signature verification
x509: Detect sm2 keys by their parameters OID
x509: Add support for parsing x509 certs with ECDSA keys
ima: Support EC keys for signature verification
Tang Bin (1):
crypto: amlogic - Fix unnecessary check in meson_crypto_probe()
Tang Yizhou (1):
crypto: ccp - Use DEFINE_SPINLOCK() for spinlock
Thara Gopinath (11):
crypto: qce - Restore/save ahash state with custom struct in export/import
crypto: qce - Hold back a block of data to be transferred as part of final
crypto: qce - Return unsupported if key1 and key 2 are same for AES XTS algorithm
crypto: qce - Return unsupported if any three keys are same for DES3 algorithms
crypto: qce - Return error for zero length messages
crypto: qce - Return error for non-blocksize data(ECB/CBC algorithms)
crypto: qce - Set ivsize to 0 for ecb(aes)
crypto: qce - Improve the conditions for requesting AES fallback cipher
crypto: qce - Set data unit size to message length for AES XTS transformation
crypto: qce - Remover src_tbl from qce_cipher_reqctx
crypto: qce - Remove totallen and offset in qce_start
Tian Tao (13):
hwrng: ba431 - Use device-managed registration
hwrng: xiphera-trng - use devm_platform_ioremap_resource() to simplify
hwrng: bcm2835 - remove redundant null check
hwrng: omap - Fix included header from 'asm'
hwrng: cctrng - Use device-managed registration API
hwrng: pic32 - Use device-managed registration API
crypto: cavium - remove unused including <linux/version.h>
hwrng: cctrng - use devm_platform_ioremap_resource() to simplify
hwrng: ba431 - use devm_platform_ioremap_resource() to simplify
hwrng: intel - Fix included header from 'asm
hwrng: omap - Use of_device_get_match_data() helper
crypto: cavium/zip - remove unused including <linux/version.h>
crypto: ccp - Make ccp_dev_suspend and ccp_dev_resume void functions
Tom Lendacky (1):
crypto: ccp - Don't initialize SEV support without the SEV feature
Tong Zhang (2):
crypto: qat - don't release uninitialized resources
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
Vinay Kumar Yadav (1):
crypto: chelsio/chcr - Remove useless MODULE_VERSION
Wan Jiabing (1):
crypto: ux500/cryp - Remove duplicate argument
Wang Qing (1):
hwrng: cctrng - delete redundant printing of return value
Wei Yongjun (2):
crypto: keembay-ocs-hcu - Fix error return code in kmb_ocs_hcu_probe()
crypto: keembay-ocs-aes - Fix error return code in kmb_ocs_aes_probe()
Weili Qian (10):
crypto: hisilicon/qm - set the total number of queues
crypto: hisilicon/qm - move 'CURRENT_QM' code to qm.c
crypto: hisilicon/qm - set the number of queues for function
crypto: hisilicon/qm - add queue isolation support for Kunpeng930
crypto: hisilicon/qm - add stop queue by hardware
crypto: hisilicon/trng - add version to adapt new algorithm
crypto: hisilicon - dynamic configuration 'err_info'
crypto: hisilicon - support new error types for ZIP
crypto: hisilicon - add new error type for SEC
crypto: hisilicon - enable new error types for QM
Wojciech Ziemba (1):
crypto: qat - enable detection of accelerators hang
Xiang Chen (4):
crypto: amlogic - Fix the parameter of dma_unmap_sg()
crypto: cavium - Fix the parameter of dma_unmap_sg()
crypto: ux500 - Fix the parameter of dma_unmap_sg()
crypto: allwinner - Fix the parameter of dma_unmap_sg()
Yang Li (2):
crypto: powepc/sha1 - remove unneeded semicolon
crypto: nx - add missing call to of_node_put()
Yang Shen (4):
crypto: hisilicon/zip - adjust functions location
crypto: hisilicon/zip - add comments for 'hisi_zip_sqe'
crypto: hisilicon/zip - initialize operations about 'sqe' in 'acomp_alg.init'
crypto: hisilicon/zip - support new 'sqe' type in Kunpeng930
YueHaibing (5):
crypto: atmel-tdes - Remove redundant dev_err call in atmel_tdes_probe()
crypto: img-hash - Remove redundant dev_err call in img_hash_probe()
crypto: ux500 - Remove redundant dev_err calls
crypto: keembay - Remove redundant dev_err calls
crypto: ccree - Remove redundant dev_err call in init_cc_resources()
Zihao Tang (1):
hwrng: core - convert sysfs sprintf/snprintf family to sysfs_emit
Álvaro Fernández Rojas (3):
dt-bindings: rng: bcm2835: add clock constraints
dt-bindings: rng: bcm2835: document reset support
hwrng: bcm2835 - add reset support
.../devicetree/bindings/crypto/ti,sa2ul.yaml | 24 +-
.../devicetree/bindings/rng/brcm,bcm2835.yaml | 21 +
arch/arm/crypto/aes-cipher-core.S | 42 +-
arch/arm/crypto/blake2b-neon-glue.c | 4 +-
arch/arm/crypto/blake2s-core.S | 21 +
arch/arm/crypto/chacha-scalar-core.S | 43 +-
arch/arm/crypto/curve25519-core.S | 2 +-
arch/arm/crypto/poly1305-glue.c | 2 +-
arch/arm64/crypto/aes-modes.S | 1 +
arch/arm64/crypto/poly1305-glue.c | 2 +-
arch/mips/crypto/poly1305-glue.c | 2 +-
arch/powerpc/crypto/sha1-spe-glue.c | 2 +-
arch/x86/crypto/poly1305_glue.c | 6 +-
crypto/Kconfig | 15 +-
crypto/Makefile | 6 +
crypto/aegis.h | 19 +
crypto/aegis128-core.c | 15 -
crypto/aegis128-neon.c | 10 +-
crypto/af_alg.c | 94 ++-
crypto/api.c | 2 +-
crypto/asymmetric_keys/public_key.c | 4 +-
crypto/asymmetric_keys/x509_cert_parser.c | 49 +-
crypto/asymmetric_keys/x509_public_key.c | 4 +-
crypto/crc32_generic.c | 24 +-
crypto/ecc.c | 291 +++++--
crypto/ecc.h | 49 +-
crypto/ecc_curve_defs.h | 49 ++
crypto/ecdh.c | 72 +-
crypto/ecdh_helper.c | 4 +-
crypto/ecdsa.c | 376 +++++++++
crypto/ecdsasignature.asn1 | 4 +
crypto/fcrypt.c | 5 +-
crypto/jitterentropy.c | 8 +-
crypto/keywrap.c | 4 +-
crypto/rng.c | 10 +-
crypto/serpent_generic.c | 39 +-
crypto/testmgr.c | 42 +-
crypto/testmgr.h | 458 +++++++++-
drivers/char/hw_random/ba431-rng.c | 16 +-
drivers/char/hw_random/bcm2835-rng.c | 27 +-
drivers/char/hw_random/cctrng.c | 20 +-
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/intel-rng.c | 2 +-
drivers/char/hw_random/omap-rng.c | 14 +-
drivers/char/hw_random/pic32-rng.c | 3 +-
drivers/char/hw_random/xiphera-trng.c | 4 +-
drivers/char/random.c | 21 +-
drivers/crypto/allwinner/Kconfig | 14 +-
.../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 23 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-hash.c | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-prng.c | 2 +-
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 9 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 3 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 1 +
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 11 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 2 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 12 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 4 +-
drivers/crypto/amcc/crypto4xx_alg.c | 12 +-
drivers/crypto/amcc/crypto4xx_core.c | 18 +-
drivers/crypto/amcc/crypto4xx_core.h | 4 +-
drivers/crypto/amcc/crypto4xx_reg_def.h | 8 +-
drivers/crypto/amcc/crypto4xx_sa.h | 18 +-
drivers/crypto/amcc/crypto4xx_trng.h | 2 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 3 -
drivers/crypto/atmel-ecc.c | 30 +-
drivers/crypto/atmel-i2c.c | 2 +-
drivers/crypto/atmel-sha.c | 4 +-
drivers/crypto/atmel-tdes.c | 1 -
drivers/crypto/bcm/cipher.c | 7 +-
drivers/crypto/bcm/spu.c | 16 +-
drivers/crypto/bcm/spu2.c | 43 +-
drivers/crypto/bcm/util.c | 4 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +
drivers/crypto/caam/caampkc.c | 3 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 1 -
drivers/crypto/cavium/nitrox/nitrox_isr.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 9 +-
drivers/crypto/cavium/zip/common.h | 1 -
drivers/crypto/ccp/ccp-crypto-main.c | 3 +-
drivers/crypto/ccp/ccp-dev.c | 12 +-
drivers/crypto/ccp/ccp-ops.c | 1 -
drivers/crypto/ccp/sev-dev.c | 6 +
drivers/crypto/ccp/sp-dev.c | 12 +-
drivers/crypto/ccp/sp-dev.h | 15 +-
drivers/crypto/ccp/sp-pci.c | 1 +
drivers/crypto/ccp/tee-dev.c | 57 +-
drivers/crypto/ccp/tee-dev.h | 20 +-
drivers/crypto/ccree/cc_driver.c | 4 +-
drivers/crypto/chelsio/chcr_algo.c | 32 +-
drivers/crypto/chelsio/chcr_core.c | 5 +-
drivers/crypto/chelsio/chcr_core.h | 1 -
drivers/crypto/geode-aes.c | 4 +-
drivers/crypto/hisilicon/Kconfig | 2 +
drivers/crypto/hisilicon/hpre/hpre.h | 18 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 921 ++++++++++++++++++++-
drivers/crypto/hisilicon/hpre/hpre_main.c | 158 ++--
drivers/crypto/hisilicon/qm.c | 396 +++++++--
drivers/crypto/hisilicon/qm.h | 29 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 2 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 13 +-
drivers/crypto/hisilicon/sec/sec_drv.h | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 10 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 137 +--
drivers/crypto/hisilicon/sec2/sec_crypto.h | 6 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 267 +++---
drivers/crypto/hisilicon/sgl.c | 37 +-
drivers/crypto/hisilicon/trng/trng.c | 13 +-
drivers/crypto/hisilicon/zip/zip.h | 50 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 710 +++++++++-------
drivers/crypto/hisilicon/zip/zip_main.c | 99 +--
drivers/crypto/img-hash.c | 3 -
drivers/crypto/inside-secure/safexcel.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 7 +-
drivers/crypto/keembay/keembay-ocs-aes-core.c | 8 +-
drivers/crypto/keembay/keembay-ocs-hcu-core.c | 8 +-
drivers/crypto/keembay/ocs-hcu.c | 8 +-
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 10 +-
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 14 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 8 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 33 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 144 +++-
drivers/crypto/nx/nx-aes-cbc.c | 2 +-
drivers/crypto/nx/nx-aes-ccm.c | 2 +-
drivers/crypto/nx/nx-aes-ctr.c | 2 +-
drivers/crypto/nx/nx-aes-ecb.c | 2 +-
drivers/crypto/nx/nx-aes-gcm.c | 2 +-
drivers/crypto/nx/nx-aes-xcbc.c | 2 +-
drivers/crypto/nx/nx-common-powernv.c | 4 +-
drivers/crypto/nx/nx-sha256.c | 2 +-
drivers/crypto/nx/nx-sha512.c | 2 +-
drivers/crypto/nx/nx.c | 5 +-
drivers/crypto/nx/nx_debugfs.c | 2 +-
drivers/crypto/omap-aes.c | 7 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 1 +
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 1 +
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 4 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 +
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 25 +
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 13 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.c | 40 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 14 +-
drivers/crypto/qat/qat_common/adf_init.c | 4 +
drivers/crypto/qat/qat_common/adf_isr.c | 29 +-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 2 +-
drivers/crypto/qat/qat_common/adf_transport.c | 1 +
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 4 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 17 +-
drivers/crypto/qat/qat_common/qat_algs.c | 32 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 4 +-
drivers/crypto/qce/cipher.h | 1 -
drivers/crypto/qce/common.c | 25 +-
drivers/crypto/qce/common.h | 3 +-
drivers/crypto/qce/sha.c | 143 ++--
drivers/crypto/qce/skcipher.c | 69 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 2 +-
drivers/crypto/s5p-sss.c | 17 +-
drivers/crypto/sa2ul.c | 143 +++-
drivers/crypto/sa2ul.h | 4 +
drivers/crypto/stm32/stm32-cryp.c | 4 +-
drivers/crypto/stm32/stm32-hash.c | 8 +-
drivers/crypto/ux500/cryp/cryp.c | 5 +-
drivers/crypto/ux500/cryp/cryp.h | 2 +-
drivers/crypto/ux500/cryp/cryp_core.c | 10 +-
drivers/crypto/ux500/cryp/cryp_irq.c | 2 +-
drivers/crypto/ux500/cryp/cryp_irq.h | 4 +-
drivers/crypto/ux500/cryp/cryp_irqp.h | 4 +-
drivers/crypto/ux500/cryp/cryp_p.h | 15 +-
drivers/crypto/ux500/hash/hash_core.c | 18 +-
drivers/crypto/vmx/aes.c | 2 +-
drivers/crypto/vmx/aes_cbc.c | 2 +-
drivers/crypto/vmx/aes_ctr.c | 2 +-
drivers/crypto/vmx/aes_xts.c | 2 +-
drivers/crypto/vmx/ghash.c | 2 +-
drivers/crypto/vmx/vmx.c | 2 +-
fs/crypto/Kconfig | 30 +-
fs/verity/Kconfig | 8 +-
include/crypto/acompress.h | 2 +
include/crypto/aead.h | 2 +
include/crypto/akcipher.h | 2 +
include/crypto/chacha.h | 9 +-
include/crypto/ecc_curve.h | 60 ++
include/crypto/ecdh.h | 3 +-
include/crypto/hash.h | 4 +
include/crypto/internal/poly1305.h | 3 +-
include/crypto/kpp.h | 2 +
include/crypto/poly1305.h | 6 +-
include/crypto/rng.h | 2 +
include/crypto/skcipher.h | 2 +
include/keys/asymmetric-type.h | 6 +
include/linux/oid_registry.h | 10 +-
include/trace/events/random.h | 83 --
include/uapi/misc/uacce/hisi_qm.h | 1 +
lib/crypto/chacha.c | 4 +-
lib/crypto/poly1305-donna32.c | 3 +-
lib/crypto/poly1305-donna64.c | 3 +-
lib/crypto/poly1305.c | 3 +-
lib/oid_registry.c | 24 +
net/bluetooth/ecdh_helper.c | 2 -
net/bluetooth/selftest.c | 2 +-
net/bluetooth/smp.c | 6 +-
security/integrity/digsig_asymmetric.c | 30 +-
209 files changed, 4558 insertions(+), 1986 deletions(-)
create mode 100644 crypto/ecdsa.c
create mode 100644 crypto/ecdsasignature.asn1
create mode 100644 include/crypto/ecc_curve.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.13
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
@ 2021-04-26 15:59 ` pr-tracker-bot
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-04-26 15:59 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 26 Apr 2021 20:32:00 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a4a78bc8ead44c3cdb470c6e1f37afcabdddfc14
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.14
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
2021-04-26 15:59 ` pr-tracker-bot
@ 2021-06-28 11:00 ` Herbert Xu
2021-06-28 23:36 ` pr-tracker-bot
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-06-28 11:00 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Algorithms:
- Fix rmmod crash with x86/curve25519.
- Add ECDH NIST P384.
- Generate assembly files at build-time with perl scripts on arm.
- Switch to HMAC SHA512 DRBG as default DRBG.
Drivers:
- Add sl3516 crypto engine.
- Add ECDH NIST P384 support in hisilicon/hpre.
- Add {ofb,cfb,ctr} over {aes,sm4} in hisilicon/sec.
- Add {ccm,gcm} over {aes,sm4} in hisilicon/sec.
- Enable omap hwrng driver for TI K3 family.
- Add support for AEAD algorithms in qce.
Please note that there is a merge conflict with cavium/nitrox,
the fix is to simply use the version from the crypto tree.
The following changes since commit 6efb943b8616ec53a5e444193dccf1af9ad627b5:
Linux 5.13-rc1 (2021-05-09 14:17:44 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 9f38b678ffc4e2ccf167a1131c0403dc4f5e1bb7:
crypto: sl3516 - depends on HAS_IOMEM (2021-06-24 14:57:28 +0800)
----------------------------------------------------------------
Ard Biesheuvel (2):
crypto: tcrypt - enable tests for xxhash and blake2
crypto: shash - avoid comparing pointers to exported functions under CFI
Arnd Bergmann (1):
crypto: ixp4xx - convert to platform driver
Baokun Li (1):
crypto: ccp - Use list_move_tail instead of list_del/list_add_tail in ccp-dmaengine.c
Bixuan Cui (1):
crypto: nx - add missing MODULE_DEVICE_TABLE
Christophe JAILLET (3):
crypto: cpt - Use 'hlist_for_each_entry' to simplify code
crypto: ccp - Fix a resource leak in an error handling path
crypto: cavium/nitrox - Fix an error rhandling path in 'nitrox_probe()'
Colin Ian King (2):
hwrng: amd - remove redundant initialization of variable err
crypto: hisilicon/sec - Fix spelling mistake "fallbcak" -> "fallback"
Corentin Labbe (15):
crypto: ixp4xx - dma_unmap the correct address
crypto: ixp4xx - update IV after requests
crypto: ixp4xx - fallback when having more than one SG
crypto: ixp4xx - convert unsigned to unsigned int
crypto: ixp4xx - convert all printk to dev_xxx
crypto: ixp4xx - whitespace fixes
crypto: ixp4xx - Do not initialize static to NULL
crypto: ixp4xx - remove brackets from single statement
crypto: ixp4xx - Correct functions alignment
MAINTAINERS: add ixp4xx_crypto to the right arch list
MAINTAINERS: add myself as maintainer of ixp4xx_crypto
dt-bindings: crypto: Add documentation for sl3516-ce
crypto: sl3516 - Add sl3516 crypto engine
MAINTAINERS: add gemini crypto sl3516-ce
crypto: sl3516 - depends on HAS_IOMEM
Hangbin Liu (1):
crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit
Herbert Xu (4):
crypto: sa2ul - Remove unused auth_len variable
crypto: api - Move crypto attr definitions out of crypto.h
crypto: nx - Fix RCU warning in nx842_OF_upd_status
crypto: nx - Fix numerous sparse byte-order warnings
Hongbo Li (1):
crypto: sm2 - fix a memory leak in sm2
Horia Geantă (1):
MAINTAINERS: update caam crypto driver maintainers list
Hui Tang (20):
crypto: testmgr - fix initialization of 'secret_size'
crypto: ecdh - extend 'cra_driver_name' with curve name
crypto: hisilicon/hpre - extend 'cra_driver_name' with curve name
crypto: hisilicon/hpre - fix unmapping invalid dma address
crypto: hisilicon/hpre - the macro 'HPRE_ADDR' expands
crypto: hisilicon/hpre - init a structure member each line
crypto: hisilicon/hpre - replace macro with inline function
crypto: hisilicon/hpre - remove the macro of 'HPRE_DEV'
crypto: hisilicon/hpre - delete rudundant initialization
crypto: hisilicon/hpre - use 'GENMASK' to generate mask value
crypto: hisilicon/hpre - delete rudundant macro definition
crypto: hisilicon/hpre - add 'default' for switch statement
crypto: khazad,wp512 - remove leading spaces before tabs
crypto: ecdh - fix ecdh-nist-p192's entry in testmgr
crypto: ecdh - fix 'ecdh_init'
crypto: ecdh - register NIST P384 tfm
crypto: ecdh - add test suite for NIST P384
crypto: hisilicon/hpre - fix ecdh self test issue
crypto: hisilicon/hpre - add check before gx modulo p
crypto: hisilicon/hpre - register ecdh NIST P384
Jack Xu (5):
crypto: qat - return error when failing to map FW
crypto: qat - check MMP size before writing to the SRAM
crypto: qat - report an error if MMP file size is too large
crypto: qat - check return code of qat_hal_rd_rel_reg()
crypto: qat - remove unused macro in FW loader
Jiapeng Chong (1):
crypto: qce - Fix inconsistent indenting
Joerg Roedel (1):
crypto: ccp - Annotate SEV Firmware file names
Juerg Haefliger (1):
hwrng: Kconfig - Remove leading spaces
Kai Ye (19):
crypto: hisilicon/qm - add dfx log if not use hardware crypto algs
crypto: hisilicon/qm - fix the process of VF's list adding
crypto: hisilicon/sec - add new type of SQE
crypto: hisilicon/sec - driver adapt to new SQE
crypto: hisilicon/sec - add new skcipher mode for SEC
crypto: hisilicon/sec - add fallback tfm supporting for XTS mode
crypto: hisilicon/sec - fixup 3des minimum key size declaration
crypto: hisilicon/sec - add new algorithm mode for AEAD
crypto: hisilicon/sec - add fallback tfm supporting for aeads
crypto: hisilicon/sec - add hardware integrity check value process
crypto: hisilicon/sec - modify the SEC request structure
crypto: hisilicon/qm - supports writing QoS int the host
crypto: hisilicon/qm - add the "alg_qos" file node
crypto: hisilicon/qm - merges the work initialization process into a single function
crypto: hisilicon/qm - add pf ping single vf function
crypto: hisilicon/qm - supports to inquiry each function's QoS
crypto: hisilicon/sec - adds the max shaper type rate
crypto: hisilicon/hpre - adds the max shaper type rate
crypto: hisilicon/zip - adds the max shaper type rate
Kees Cook (1):
crypto: nx - Fix memcpy() over-reading in nonce
Lee Jones (3):
crypto: cavium: Fix a bunch of kernel-doc related issues
crypto: nx: nx-aes-gcm: Kernel-doc formatting should not be used for headers
crypto: ccp: ccp-dev: Fix a little doc-rot
Linus Walleij (2):
crypto: ixp4xx - Add DT bindings
crypto: ixp4xx - Add device tree support
Liu Shixin (1):
crypto: api - remove CRYPTOA_U32 and related functions
Longfang Liu (1):
crypto: hisilicon/qm - support address prefetching
Masahiro Yamada (4):
crypto: arm - generate *.S by Perl at build time instead of shipping them
crypto: arm - use a pattern rule for generating *.S files
crypto: arm64 - generate *.S by Perl at build time instead of shipping them
crypto: arm64 - use a pattern rule for generating *.S files
Shaokun Zhang (2):
hwrng: core - remove redundant initialization of variable err
crypto: nx - Fix typo in comment
Srujana Challa (4):
crypto: octeontx2 - Add mailbox support for CN10K
crypto: octeontx2 - add support to map LMTST region for CN10K
crypto: octeontx2 - add support for CPT operations on CN10K
crypto: octeontx2 - enable and handle ME interrupts
Stephan Müller (1):
crypto: DRBG - switch to HMAC SHA512 DRBG as default DRBG
Suman Anna (6):
hwrng: omap - Enable driver for TI K3 family
crypto: sa2ul - Fix leaks on failure paths with sa_dma_init()
crypto: sa2ul - Fix pm_runtime enable in sa_ul_probe()
crypto: sa2ul - Use of_device_get_match_data() helper
crypto: sa2ul - Use devm_platform_ioremap_resource()
crypto: sa2ul - Remove child devices in remove
Thara Gopinath (9):
crypto: qce - Add MAC failed error checking
crypto: qce - Make result dump optional
crypto: qce - Add mode for rfc4309
crypto: qce - Add support for AEAD algorithms
crypto: qce - Clean up qce_auth_cfg
crypto: qce - Add support for AEAD algorithms
crypto: qce - Schedule fallback aead algorithm
crypto: qce: skcipher: Fix incorrect sg count for dma transfers
MAINTAINERS: Add maintainer for Qualcomm crypto drivers
Tian Tao (3):
hwrng: exynos - Use pm_runtime_resume_and_get() to replace open coding
hwrng: omap - Use pm_runtime_resume_and_get() to replace open coding
hwrng: ks-sa - Use pm_runtime_resume_and_get() to replace open coding
Tom Rix (1):
crypto: marvell/cesa - change FPGA indirect article to an
Tong Tiangen (1):
crypto: nitrox - fix unchecked variable in nitrox_register_interrupts
Wei Yongjun (2):
crypto: qce - Fix some error handling path
crypto: qce - fix error return code in qce_skcipher_async_req_handle()
Weili Qian (9):
crypto: hisilicon/qm - initialize the device before doing tasks
crypto: hisilicon/qm - modify 'QM_RESETTING' clearing error
crypto: hisilicon/qm - adjust order of device error configuration
crypto: hisilicon/qm - enable to close master ooo when NFE occurs
crypto: hisilicon/qm - add MSI detection steps on Kunpeng930
crypto: hisilicon/qm - adjust reset interface
crypto: hisilicon/qm - enable PF and VFs communication
crypto: hisilicon/qm - add callback to support communication
crypto: hisilicon/qm - update reset flow
Wenkai Lin (1):
crypto: hisilicon/qm - implement for querying hardware tasks status.
Wu Bo (1):
crypto: af_alg - use DIV_ROUND_UP helper macro for calculations
Yang Li (2):
crypto: cavium/nitrox - Remove redundant initialization of 'sg'
crypto: cavium/nitrox - Fix kernel-doc
YueHaibing (2):
hwrng: core - Use DEVICE_ATTR_<RW|RO> macro
crypto: sl3516 - Fix build warning without CONFIG_PM
Zhang Qilong (2):
crypto: omap-des - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
crypto: omap-sham - Fix PM reference leak in omap sham ops
Zhen Lei (2):
crypto: ux500 - Fix error return code in hash_hw_final()
crypto: header - Fix spelling errors
Zou Wei (1):
crypto: hisilicon - switch to memdup_user_nul()
kernel test robot (1):
crypto: sl3516 - fix duplicated inclusion
Łukasz Stelmach (1):
hwrng: exynos - Fix runtime PM imbalance on error
.../bindings/crypto/cortina,sl3516-crypto.yaml | 50 +
.../bindings/crypto/intel,ixp4xx-crypto.yaml | 47 +
.../intel,ixp4xx-network-processing-engine.yaml | 22 +-
MAINTAINERS | 23 +-
arch/arm/crypto/Makefile | 10 +-
arch/arm/crypto/poly1305-core.S_shipped | 1158 --------
arch/arm/crypto/sha256-core.S_shipped | 2816 --------------------
arch/arm/crypto/sha512-core.S_shipped | 1869 -------------
arch/arm/mach-ixp4xx/common.c | 26 +
arch/arm64/crypto/Makefile | 10 +-
arch/arm64/crypto/poly1305-core.S_shipped | 835 ------
arch/arm64/crypto/sha256-core.S_shipped | 2069 --------------
arch/arm64/crypto/sha512-core.S_shipped | 1093 --------
arch/x86/crypto/curve25519-x86_64.c | 2 +-
crypto/af_alg.c | 2 +-
crypto/algapi.c | 18 -
crypto/algboss.c | 31 +-
crypto/drbg.c | 12 +-
crypto/ecdh.c | 49 +-
crypto/internal.h | 12 +
crypto/khazad.c | 2 +-
crypto/shash.c | 18 +-
crypto/sm2.c | 24 +-
crypto/tcrypt.c | 36 +
crypto/testmgr.c | 10 +-
crypto/testmgr.h | 71 +-
crypto/wp512.c | 40 +-
drivers/char/hw_random/Kconfig | 10 +-
drivers/char/hw_random/amd-rng.c | 2 +-
drivers/char/hw_random/core.c | 38 +-
drivers/char/hw_random/exynos-trng.c | 7 +-
drivers/char/hw_random/ks-sa-rng.c | 3 +-
drivers/char/hw_random/omap-rng.c | 6 +-
drivers/crypto/Kconfig | 41 +
drivers/crypto/Makefile | 1 +
drivers/crypto/cavium/cpt/cptpf_main.c | 2 +-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_isr.c | 4 +
drivers/crypto/cavium/nitrox/nitrox_main.c | 22 +-
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 16 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 2 +-
drivers/crypto/ccp/ccp-dev.c | 2 +-
drivers/crypto/ccp/ccp-dmaengine.c | 3 +-
drivers/crypto/ccp/sev-dev.c | 4 +
drivers/crypto/ccp/sp-pci.c | 6 +-
drivers/crypto/gemini/Makefile | 2 +
drivers/crypto/gemini/sl3516-ce-cipher.c | 387 +++
drivers/crypto/gemini/sl3516-ce-core.c | 535 ++++
drivers/crypto/gemini/sl3516-ce-rng.c | 61 +
drivers/crypto/gemini/sl3516-ce.h | 347 +++
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 185 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 256 +-
drivers/crypto/hisilicon/qm.c | 2181 +++++++++++----
drivers/crypto/hisilicon/qm.h | 17 +
drivers/crypto/hisilicon/sec2/sec.h | 23 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 1036 ++++++-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 193 ++
drivers/crypto/hisilicon/sec2/sec_main.c | 100 +-
drivers/crypto/hisilicon/zip/zip_main.c | 99 +-
drivers/crypto/ixp4xx_crypto.c | 413 +--
drivers/crypto/marvell/cesa/cesa.h | 2 +-
drivers/crypto/marvell/octeontx2/Makefile | 13 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 93 +
drivers/crypto/marvell/octeontx2/cn10k_cpt.h | 36 +
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 23 +
.../crypto/marvell/octeontx2/otx2_cpt_hw_types.h | 16 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 9 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 10 +
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 160 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 32 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 8 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 3 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 49 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 43 +
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 17 +-
drivers/crypto/nx/nx-842-pseries.c | 31 +-
drivers/crypto/nx/nx-aes-cbc.c | 2 +-
drivers/crypto/nx/nx-aes-ccm.c | 4 +-
drivers/crypto/nx/nx-aes-ctr.c | 4 +-
drivers/crypto/nx/nx-aes-ecb.c | 2 +-
drivers/crypto/nx/nx-aes-gcm.c | 2 +-
drivers/crypto/nx/nx-common-powernv.c | 4 +-
drivers/crypto/nx/nx-sha256.c | 19 +-
drivers/crypto/nx/nx-sha512.c | 19 +-
drivers/crypto/nx/nx_csbcpb.h | 4 +-
drivers/crypto/omap-des.c | 9 +-
drivers/crypto/omap-sham.c | 4 +-
.../qat/qat_common/icp_qat_fw_loader_handle.h | 2 +-
drivers/crypto/qat/qat_common/qat_hal.c | 14 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 12 +-
drivers/crypto/qce/Makefile | 1 +
drivers/crypto/qce/aead.c | 847 ++++++
drivers/crypto/qce/aead.h | 56 +
drivers/crypto/qce/common.c | 196 +-
drivers/crypto/qce/common.h | 9 +-
drivers/crypto/qce/core.c | 4 +
drivers/crypto/qce/skcipher.c | 19 +-
drivers/crypto/sa2ul.c | 50 +-
drivers/crypto/ux500/hash/hash_core.c | 1 +
drivers/soc/ixp4xx/ixp4xx-npe.c | 7 +
include/crypto/aead.h | 2 +-
include/crypto/algapi.h | 10 +-
include/crypto/engine.h | 2 +-
include/crypto/hash.h | 2 +-
include/crypto/internal/hash.h | 8 +-
include/linux/crypto.h | 26 -
108 files changed, 7084 insertions(+), 11176 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/cortina,sl3516-crypto.yaml
create mode 100644 Documentation/devicetree/bindings/crypto/intel,ixp4xx-crypto.yaml
delete mode 100644 arch/arm/crypto/poly1305-core.S_shipped
delete mode 100644 arch/arm/crypto/sha256-core.S_shipped
delete mode 100644 arch/arm/crypto/sha512-core.S_shipped
delete mode 100644 arch/arm64/crypto/poly1305-core.S_shipped
delete mode 100644 arch/arm64/crypto/sha256-core.S_shipped
delete mode 100644 arch/arm64/crypto/sha512-core.S_shipped
create mode 100644 drivers/crypto/gemini/Makefile
create mode 100644 drivers/crypto/gemini/sl3516-ce-cipher.c
create mode 100644 drivers/crypto/gemini/sl3516-ce-core.c
create mode 100644 drivers/crypto/gemini/sl3516-ce-rng.c
create mode 100644 drivers/crypto/gemini/sl3516-ce.h
create mode 100644 drivers/crypto/marvell/octeontx2/cn10k_cpt.c
create mode 100644 drivers/crypto/marvell/octeontx2/cn10k_cpt.h
create mode 100644 drivers/crypto/qce/aead.c
create mode 100644 drivers/crypto/qce/aead.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.14
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
@ 2021-06-28 23:36 ` pr-tracker-bot
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-06-28 23:36 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 28 Jun 2021 19:00:51 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6159c49e12284b4880fd60e0575a71a40556a67e
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.14
2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
2021-01-18 5:13 ` Herbert Xu
@ 2021-07-08 3:09 ` Herbert Xu
2021-07-09 19:20 ` pr-tracker-bot
2021-08-17 1:36 ` Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-07-08 3:09 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains the following fixes and changes:
- Regression in drbg due to missing self-test for new default algorithm.
- Add ratelimit on user-triggerable message in qat.
- Build failure due to missing dependency in sl3516.
- Remove obsolete PageSlab checks.
- Bogus hardware register writes on Kunpeng920 in hisilicon/sec.
The following changes since commit 9f38b678ffc4e2ccf167a1131c0403dc4f5e1bb7:
crypto: sl3516 - depends on HAS_IOMEM (2021-06-24 14:57:28 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 66192b2e3fd8ab97ed518d6c0240e26655a20b4b:
crypto: hisilicon/sec - fix the process of disabling sva prefetching (2021-06-28 11:28:09 +0800)
----------------------------------------------------------------
Colin Ian King (1):
crypto: qat - ratelimit invalid ioctl message and print the invalid cmd
Geert Uytterhoeven (2):
crypto: sl3516 - Typo s/Stormlink/Storlink/
crypto: sl3516 - Add dependency on ARCH_GEMINI
Herbert Xu (2):
crypto: scatterwalk - Remove obsolete PageSlab check
crypto: omap - Drop obsolete PageSlab check
Kai Ye (1):
crypto: hisilicon/sec - fix the process of disabling sva prefetching
Stephan Müller (1):
crypto: drbg - self test for HMAC(SHA-512)
crypto/testmgr.c | 5 ++-
crypto/testmgr.h | 49 +++++++++++++++++++++++++++++
drivers/crypto/Kconfig | 6 ++--
drivers/crypto/gemini/sl3516-ce-cipher.c | 2 +-
drivers/crypto/gemini/sl3516-ce-core.c | 2 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 3 ++
drivers/crypto/omap-crypto.c | 3 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 2 +-
include/crypto/scatterwalk.h | 7 +----
9 files changed, 64 insertions(+), 15 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.14
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
@ 2021-07-09 19:20 ` pr-tracker-bot
2021-08-17 1:36 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-07-09 19:20 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 8 Jul 2021 11:09:13 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8dc121eeab9abfbc510097f8db83e87560f753b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.14
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2021-07-09 19:20 ` pr-tracker-bot
@ 2021-08-17 1:36 ` Herbert Xu
2021-08-17 2:27 ` pr-tracker-bot
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-08-17 1:36 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains a fix for a potential boot failure due to
a missing Kconfig dependency for people upgrading with the DRBG
enabled.
The following changes since commit e73f0f0ee7541171d89f2e2491130c7771ba58d3:
Linux 5.14-rc1 (2021-07-11 15:07:40 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 5261cdf457ce3635bf18d393a3c1991dcfaf9d02:
crypto: drbg - select SHA512 (2021-07-16 15:49:31 +0800)
----------------------------------------------------------------
Stephan Mueller (1):
crypto: drbg - select SHA512
crypto/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.14
2021-08-17 1:36 ` Herbert Xu
@ 2021-08-17 2:27 ` pr-tracker-bot
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-08-17 2:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 17 Aug 2021 09:36:01 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/794c7931a2428a656551f2179e6a093233a6e0aa
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.15
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
2021-06-28 23:36 ` pr-tracker-bot
@ 2021-08-30 8:28 ` Herbert Xu
2021-08-30 20:17 ` pr-tracker-bot
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-08-30 8:28 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Algorithms:
- Add AES-NI/AVX/x86_64 implementation of SM4.
Drivers:
- Add Arm SMCCC TRNG based driver.
The following changes since commit 5261cdf457ce3635bf18d393a3c1991dcfaf9d02:
crypto: drbg - select SHA512 (2021-07-16 15:49:31 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 6ae51ffe5e768d9e25a7f4298e2e7a058472bcc3:
crypto: sha512 - remove imaginary and mystifying clearing of variables (2021-08-27 16:30:19 +0800)
----------------------------------------------------------------
Ahsan Atta (1):
crypto: qat - flush vf workqueue at driver removal
Andre Przywara (2):
firmware: smccc: Register smccc_trng platform device
hwrng: Add Arm SMCCC TRNG based driver
Ard Biesheuvel (1):
crypto: x86/aes-ni - add missing error checks in XTS code
Ben Hutchings (2):
crypto: omap - Avoid redundant copy when using truncated sg list
crypto: omap - Fix inconsistent locking of device lists
Brijesh Singh (1):
crypto: ccp - shutdown SEV firmware on kexec
Cai Huoqing (1):
padata: Remove repeated verbose license text
Changbin Du (1):
crypto: skcipher - in_irq() cleanup
Christophe JAILLET (3):
crypto: qat - simplify code and axe the use of a deprecated API
crypto: qat - disable AER if an error occurs in probe functions
crypto: qat - fix a typo in a comment
Giovanni Cabiddu (8):
crypto: qat - set DMA mask to 48 bits for Gen2
crypto: qat - use proper type for vf_mask
crypto: qat - do not ignore errors from enable_vf2pf_comms()
crypto: qat - handle both source of interrupt in VF ISR
crypto: qat - prevent spurious MSI interrupt in VF
crypto: qat - move IO virtualization functions
crypto: qat - do not export adf_iov_putmsg()
crypto: qat - store vf.compatible flag
Hongbo Li (1):
lib/mpi: use kcalloc in mpi_resize
Jason Wang (2):
crypto: sun8i-ss - Use kfree_sensitive
crypto: sun8i-ce - use kfree_sensitive to clear and free sensitive data
John Allen (1):
crypto: ccp - Add support for new CCP/PSP device ID
Kai Ye (2):
crypto: hisilicon/sec - fix the abnormal exiting process
crypto: hisilicon/sec - modify the hardware endian configuration
Kanchana Velusamy (1):
crypto: qat - protect interrupt mask CSRs with a spinlock
Lukas Bulwahn (2):
crypto: rmd320 - remove rmd320 in Makefile
crypto: sha512 - remove imaginary and mystifying clearing of variables
Marco Chiappero (10):
crypto: qat - remove empty sriov_configure()
crypto: qat - enable interrupts only after ISR allocation
crypto: qat - prevent spurious MSI interrupt in PF
crypto: qat - rename compatibility version definition
crypto: qat - fix reuse of completion variable
crypto: qat - move pf2vf interrupt [en|dis]able to adf_vf_isr.c
crypto: qat - fix naming for init/shutdown VF to PF notifications
crypto: qat - complete all the init steps before service notification
crypto: qat - fix naming of PF/VF enable functions
crypto: qat - remove the unnecessary get_vintmsk_offset()
Mian Yousaf Kaukab (1):
crypto: ecc - handle unaligned input buffer in ecc_swap_digits
Randy Dunlap (4):
crypto: arm/curve25519 - rename 'mod_init' & 'mod_exit' functions to be module-specific
hwrng: rename 'mod_init' & 'mod_exit' functions to be module-specific
crypto: lib - rename 'mod_init' & 'mod_exit' functions to be module-specific
crypto: wp512 - correct a non-kernel-doc comment
Salah Triki (1):
crypto: atmel-aes - use swap()
Sean Anderson (2):
crypto: mxs-dcp - Check for DMA mapping errors
crypto: mxs-dcp - Use sg_mapping_iter to copy data
Sebastian Andrzej Siewior (2):
crypto: virtio - Replace deprecated CPU-hotplug functions.
padata: Replace deprecated CPU-hotplug functions.
Shreyansh Chouhan (1):
crypto: aesni - xts_crypt() return if walk.nbytes is 0
Svyatoslav Pankratov (1):
crypto: qat - remove intermediate tasklet for vf2pf
Tianjia Zhang (9):
crypto: sm4 - create SM4 library based on sm4 generic code
crypto: arm64/sm4-ce - Make dependent on sm4 library instead of sm4-generic
crypto: x86/sm4 - add AES-NI/AVX/x86_64 implementation
crypto: tcrypt - add the asynchronous speed test for SM4
crypto: tcrypt - Fix missing return value check
crypto: testmgr - Add GCM/CCM mode test of SM4 algorithm
crypto: tcrypt - add GCM/CCM mode test for SM4 algorithm
crypto: x86/sm4 - export reusable AESNI/AVX functions
crypto: x86/sm4 - add AES-NI/AVX2/x86_64 implementation
Tony Lindgren (6):
crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop()
crypto: omap-sham - initialize req only after omap_sham_hw_init()
crypto: omap-sham - add missing pm_runtime_dontuse_autosuspend()
crypto: omap-sham - drop old hw_init and unused FLAGS_INIT
crypto: omap-sham - drop suspend and resume functions
crypto: omap-sham - drop pm_runtime_irqsafe() usage
Tudor Ambarus (9):
crypto: atmel-tdes - Clarify how tdes dev gets allocated to the tfm
crypto: atmel-tdes - Handle error messages
crypto: atmel-aes - Add blocksize constraint for ECB and CBC modes
crypto: atmel-aes - Add XTS input length constraint
crypto: atmel-aes - Add NIST 800-38A's zero length cryptlen constraint
crypto: atmel-tdes - Add FIPS81's zero length cryptlen constraint
crypto: atmel - Set OFB's blocksize to 1
crypto: atmel-aes - Add fallback to XTS software implementation
crypto: atmel-aes - Allocate aes dev at tfm init time
Weili Qian (8):
crypto: hisilicon - enable zip device clock gating
crypto: hisilicon - enable sec device clock gating
crypto: hisilicon - enable hpre device clock gating
crypto: hisilicon - using 'debugfs_create_file' instead of 'debugfs_create_regset32'
crypto: hisilicon - add runtime PM ops
crypto: hisilicon - support runtime PM for accelerator device
crypto: hisilicon - change parameter passing of debugfs function
crypto: hisilicon - check _PS0 and _PR0 method
Xiyu Yang (1):
padata: Convert from atomic_t to refcount_t on parallel_data->refcnt
arch/arm/crypto/curve25519-glue.c | 8 +-
arch/arm64/crypto/Kconfig | 2 +-
arch/arm64/crypto/sm4-ce-glue.c | 20 +-
arch/x86/crypto/Makefile | 6 +
arch/x86/crypto/aesni-intel_glue.c | 5 +
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 589 +++++++++++++++++++++
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 497 +++++++++++++++++
arch/x86/crypto/sm4-avx.h | 24 +
arch/x86/crypto/sm4_aesni_avx2_glue.c | 169 ++++++
arch/x86/crypto/sm4_aesni_avx_glue.c | 487 +++++++++++++++++
crypto/Kconfig | 44 ++
crypto/Makefile | 1 -
crypto/ecc.h | 5 +-
crypto/sha512_generic.c | 3 -
crypto/skcipher.c | 2 +-
crypto/sm4_generic.c | 180 +------
crypto/tcrypt.c | 100 +++-
crypto/testmgr.c | 29 +
crypto/testmgr.h | 148 ++++++
crypto/wp512.c | 2 +-
drivers/char/hw_random/Kconfig | 14 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/amd-rng.c | 8 +-
drivers/char/hw_random/arm_smccc_trng.c | 123 +++++
drivers/char/hw_random/geode-rng.c | 8 +-
drivers/char/hw_random/intel-rng.c | 8 +-
drivers/char/hw_random/via-rng.c | 8 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 9 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 3 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 9 +-
drivers/crypto/atmel-aes.c | 154 ++++--
drivers/crypto/atmel-tdes.c | 66 +--
drivers/crypto/ccp/sev-dev.c | 49 +-
drivers/crypto/ccp/sp-pci.c | 19 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 123 ++++-
drivers/crypto/hisilicon/qm.c | 430 ++++++++++++---
drivers/crypto/hisilicon/qm.h | 8 +
drivers/crypto/hisilicon/sec2/sec.h | 5 -
drivers/crypto/hisilicon/sec2/sec_main.c | 138 +++--
drivers/crypto/hisilicon/zip/zip_main.c | 83 ++-
drivers/crypto/mxs-dcp.c | 81 +--
drivers/crypto/omap-aes.c | 8 +-
drivers/crypto/omap-crypto.c | 2 +-
drivers/crypto/omap-des.c | 8 +-
drivers/crypto/omap-sham.c | 68 +--
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 8 +-
drivers/crypto/qat/qat_4xxx/adf_drv.c | 14 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 19 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 1 -
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 21 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 14 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 16 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 19 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 1 -
drivers/crypto/qat/qat_c62x/adf_drv.c | 21 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 14 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 16 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 8 +-
drivers/crypto/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 21 +-
drivers/crypto/qat/qat_common/adf_init.c | 13 +-
drivers/crypto/qat/qat_common/adf_isr.c | 42 +-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 78 +--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 2 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 8 +-
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 12 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 64 ++-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 19 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 1 -
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 21 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 14 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 1 -
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 16 +-
drivers/crypto/virtio/virtio_crypto_core.c | 4 +-
drivers/firmware/smccc/smccc.c | 17 +
include/crypto/sm4.h | 25 +-
include/linux/padata.h | 3 +-
kernel/padata.c | 35 +-
lib/crypto/Kconfig | 3 +
lib/crypto/Makefile | 3 +
lib/crypto/blake2s.c | 8 +-
lib/crypto/chacha20poly1305.c | 8 +-
lib/crypto/curve25519.c | 8 +-
lib/crypto/sm4.c | 176 ++++++
lib/mpi/mpiutil.c | 2 +-
87 files changed, 3695 insertions(+), 839 deletions(-)
create mode 100644 arch/x86/crypto/sm4-aesni-avx-asm_64.S
create mode 100644 arch/x86/crypto/sm4-aesni-avx2-asm_64.S
create mode 100644 arch/x86/crypto/sm4-avx.h
create mode 100644 arch/x86/crypto/sm4_aesni_avx2_glue.c
create mode 100644 arch/x86/crypto/sm4_aesni_avx_glue.c
create mode 100644 drivers/char/hw_random/arm_smccc_trng.c
create mode 100644 lib/crypto/sm4.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.15
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
@ 2021-08-30 20:17 ` pr-tracker-bot
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-08-30 20:17 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 30 Aug 2021 16:28:18 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/44a7d4441181d0f2d622dc9bb512d7f5ca13f768
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.15
2021-08-17 1:36 ` Herbert Xu
2021-08-17 2:27 ` pr-tracker-bot
@ 2021-09-29 2:38 ` Herbert Xu
2021-09-29 14:51 ` pr-tracker-bot
2021-10-29 4:14 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-09-29 2:38 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push contains fixes for a resource leak in ccp as well as
stack corruption in x86/sm4.
The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:
Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0e14ef38669ce4faa80589247fe8ed8a3780f414:
crypto: x86/sm4 - Fix frame pointer stack corruption (2021-09-24 15:58:50 +0800)
----------------------------------------------------------------
Dan Carpenter (1):
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
Josh Poimboeuf (1):
crypto: x86/sm4 - Fix frame pointer stack corruption
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 5 +++--
drivers/crypto/ccp/ccp-ops.c | 14 ++++++++------
2 files changed, 11 insertions(+), 8 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
@ 2021-09-29 14:51 ` pr-tracker-bot
2021-10-29 4:14 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-09-29 14:51 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 29 Sep 2021 10:38:43 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6e439bbd436e39f15abc9587cdd23d56257780cb
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.15
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
2021-09-29 14:51 ` pr-tracker-bot
@ 2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2021-10-29 4:14 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a build-time warning in x86/sm4.
The following changes since commit 0e14ef38669ce4faa80589247fe8ed8a3780f414:
crypto: x86/sm4 - Fix frame pointer stack corruption (2021-09-24 15:58:50 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to f8690a4b5a1b64f74ae5c4f7c4ea880d8a8e1a0d:
crypto: x86/sm4 - Fix invalid section entry size (2021-10-22 20:23:01 +0800)
----------------------------------------------------------------
Tianjia Zhang (1):
crypto: x86/sm4 - Fix invalid section entry size
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 6 +++++-
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 6 +++++-
2 files changed, 10 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-10-29 4:14 ` Herbert Xu
@ 2021-10-29 17:39 ` Linus Torvalds
2021-11-02 4:01 ` Herbert Xu
2021-10-29 18:49 ` pr-tracker-bot
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2021-10-29 17:39 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Thu, Oct 28, 2021 at 9:14 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes a build-time warning in x86/sm4.
Hmm..
> Tianjia Zhang (1):
> crypto: x86/sm4 - Fix invalid section entry size
So I do wonder why the crypto code asm tends to use such complex
".section" directives.
Almost everythign else in the kernel just uses
.section <name>,"a"
for data (and "ax" for text).
The crypto code uses that very subtle "M" flag which allows the linker
to merge data, but how much of a win is that added complexity? Now you
need to get the sizes exactly right, and you hit tooling issues.
Plus, I get the feeling that some people have just copied-and-pasted
those things, and don't necessarily realize just _how_ subtle 'M'
sections are.
How much of a data savings is it to have this complexity? Particularly
since I suspect most of the time these things end up being individual
modules, and never actually get linked together at all?
So I get this very strong feeling that the crypto code is doing
complicated and fragile things that cause tooling issues - and does so
for no good reason and no actual real-life upside.
I've pulled this, but I do suspect that all the fancy
.section .rodata.xyz, "aM", @progbits, abc
could just as well be
.section .rodata, "a"
instead, and you guys are only causing problems for yourself by trying
to be clever in pointless ways.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
@ 2021-10-29 18:49 ` pr-tracker-bot
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-10-29 18:49 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 29 Oct 2021 12:14:09 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/75c7a6c1ca63131875fe869cbfd404c94d0e1944
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.16
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
2021-08-30 20:17 ` pr-tracker-bot
@ 2021-11-02 3:52 ` Herbert Xu
2021-11-02 4:27 ` pr-tracker-bot
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-11-02 3:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
API:
- Delay boot-up self-test for built-in algorithms.
Algorithms:
- Remove fallback path on arm64 as SIMD now runs with softirq off.
Drivers:
- Add Keem Bay OCS ECC Driver.
The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:
Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 39ef08517082a424b5b65c3dbaa6c0fa9d3303b9:
crypto: testmgr - fix wrong key length for pkcs1pad (2021-10-29 21:04:04 +0800)
----------------------------------------------------------------
Ard Biesheuvel (7):
crypto: arm64/gcm-aes-ce - remove non-SIMD fallback path
crypto: arm64/aes-neonbs - stop using SIMD helper for skciphers
crypto: arm64/aes-ce - stop using SIMD helper for skciphers
crypto: arm64/aes-ccm - yield NEON when processing auth-only data
crypto: arm64/aes-ccm - remove non-SIMD fallback path
crypto: arm64/aes-ccm - reduce NEON begin/end calls for common case
crypto: arm64/aes-ccm - avoid by-ref argument for ce_aes_ccm_auth_data
Arnd Bergmann (2):
crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency
crypto: ccree - avoid out-of-range warnings from clang
Cai Huoqing (3):
hwrng: Kconfig - Add helper dependency on COMPILE_TEST
hwrng: ixp4xx - Make use of the helper function devm_platform_ioremap_resource()
crypto: ccp - Make use of the helper macro kthread_run()
Colin Ian King (2):
crypto: img-hash - remove need for error return variable ret
crypto: hisilicon/zip - Fix spelling mistake "COMSUMED" -> "CONSUMED"
Daniel Jordan (1):
crypto: pcrypt - Delay write to padata->info
Daniele Alessandrelli (2):
crypto: ecc - Move ecc.h to include/crypto/internal
crypto: ecc - Export additional helper functions
Giovanni Cabiddu (5):
crypto: qat - remove unneeded packed attribute
crypto: qat - power up 4xxx device
crypto: qat - detect PFVF collision after ACK
crypto: qat - disregard spurious PFVF interrupts
crypto: qat - use hweight for bit counting
Herbert Xu (4):
crypto: hisilicon - Fix sscanf format signedness
crypto: api - Fix built-in testing dependency failures
crypto: api - Export crypto_boot_test_finished
crypto: api - Do not create test larvals if manager is disabled
Horia Geantă (1):
crypto: tcrypt - fix skcipher multi-buffer tests for 1420B blocks
Kai Ye (3):
crypto: hisilicon/qm - fix the uacce mmap failed
crypto: hisilicon/qm - support the userspace task resetting
crypto: hisilicon/qm - modify the uacce mode check
Krzysztof Kozlowski (1):
crypto: marvell/cesa - drop unneeded MODULE_ALIAS
Lei He (1):
crypto: testmgr - fix wrong key length for pkcs1pad
Maksim Lukoshkov (1):
crypto: qat - free irqs only if allocated
Marco Chiappero (9):
crypto: qat - remove unnecessary collision prevention step in PFVF
crypto: qat - fix handling of VF to PF interrupts
crypto: qat - remove duplicated logic across GEN2 drivers
crypto: qat - make pfvf send message direction agnostic
crypto: qat - move pfvf collision detection values
crypto: qat - rename pfvf collision constants
crypto: qat - add VF and PF wrappers to common send function
crypto: qat - extract send and wait from adf_vf2pf_request_version()
crypto: qat - share adf_enable_pf2vf_comms() from adf_pf2vf_msg.c
Markus Schneider-Pargmann (1):
hwrng: mtk - Force runtime pm ops for sleep ops
Michael Walle (1):
crypto: caam - disable pkc for non-E SoCs
Nathan Chancellor (1):
crypto: sm4 - Do not change section of ck and sbox
Ovidiu Panait (1):
crypto: octeontx2 - set assoclen in aead_do_fallback()
Peter Gonda (1):
crypto: ccp - Fix whitespace in sev_cmd_buffer_len()
Prabhjot Khurana (3):
crypto: engine - Add KPP Support to Crypto Engine
dt-bindings: crypto: Add Keem Bay ECC bindings
crypto: keembay-ocs-ecc - Add Keem Bay OCS ECC Driver
Qing Wang (1):
hwrng: s390 - replace snprintf in show functions with sysfs_emit
Randy Dunlap (1):
crypto: jitter - drop kernel-doc notation
Sebastian Andrzej Siewior (1):
crypto: testmgr - Only disable migration in crypto_disable_simd_for_test()
Shreyansh Chouhan (1):
crypto: aesni - check walk.nbytes instead of err
Tang Bin (2):
crypto: s5p-sss - Add error handling in s5p_aes_probe()
crypto: sa2ul - Use the defined variable to clean code
Tim Gardner (1):
crypto: drbg - Fix unused value warning in drbg_healthcheck_sanity()
Uwe Kleine-König (1):
hwrng: meson - Improve error handling for core clock
Wojciech Ziemba (3):
crypto: qat - replace deprecated MSI API
crypto: qat - remove unmatched CPU affinity to cluster IRQ
crypto: qat - free irq in case of failure
Documentation/crypto/crypto_engine.rst | 4 +
.../bindings/crypto/intel,keembay-ocs-ecc.yaml | 47 +
MAINTAINERS | 11 +
arch/arm64/crypto/Kconfig | 6 -
arch/arm64/crypto/aes-ce-ccm-core.S | 24 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 203 ++--
arch/arm64/crypto/aes-glue.c | 102 +-
arch/arm64/crypto/aes-neonbs-glue.c | 122 +--
arch/arm64/crypto/ghash-ce-glue.c | 209 +---
arch/x86/crypto/aesni-intel_glue.c | 2 +-
crypto/Kconfig | 2 +-
crypto/algapi.c | 123 ++-
crypto/api.c | 50 +-
crypto/crypto_engine.c | 26 +
crypto/drbg.c | 2 +-
crypto/ecc.c | 14 +-
crypto/ecdh.c | 2 +-
crypto/ecdsa.c | 2 +-
crypto/ecrdsa.c | 2 +-
crypto/ecrdsa_defs.h | 2 +-
crypto/internal.h | 10 +
crypto/jitterentropy.c | 24 +-
crypto/pcrypt.c | 12 +-
crypto/tcrypt.c | 5 +-
crypto/testmgr.c | 4 +-
crypto/testmgr.h | 2 +-
drivers/char/hw_random/Kconfig | 12 +-
drivers/char/hw_random/ixp4xx-rng.c | 4 +-
drivers/char/hw_random/meson-rng.c | 5 +-
drivers/char/hw_random/mtk-rng.c | 9 +-
drivers/char/hw_random/s390-trng.c | 4 +-
drivers/crypto/caam/caampkc.c | 19 +-
drivers/crypto/caam/regs.h | 3 +
drivers/crypto/ccp/ccp-dev-v3.c | 5 +-
drivers/crypto/ccp/ccp-dev-v5.c | 5 +-
drivers/crypto/ccp/sev-dev.c | 2 +-
drivers/crypto/ccree/cc_driver.c | 3 +-
drivers/crypto/hisilicon/qm.c | 74 +-
drivers/crypto/hisilicon/zip/zip_main.c | 2 +-
drivers/crypto/img-hash.c | 7 +-
drivers/crypto/keembay/Kconfig | 19 +
drivers/crypto/keembay/Makefile | 2 +
drivers/crypto/keembay/keembay-ocs-ecc.c | 1017 ++++++++++++++++++++
drivers/crypto/marvell/cesa/cesa.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 1 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 35 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 10 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 89 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 13 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 87 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 12 -
drivers/crypto/qat/qat_common/adf_accel_devices.h | 29 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 9 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 98 ++
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 27 +
drivers/crypto/qat/qat_common/adf_init.c | 5 +
drivers/crypto/qat/qat_common/adf_isr.c | 190 ++--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 238 +++--
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 9 -
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 4 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 30 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 123 +--
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 14 +-
drivers/crypto/s5p-sss.c | 2 +
drivers/crypto/sa2ul.c | 13 +-
include/crypto/engine.h | 5 +
{crypto => include/crypto/internal}/ecc.h | 36 +
lib/crypto/sm4.c | 4 +-
68 files changed, 2130 insertions(+), 1158 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/intel,keembay-ocs-ecc.yaml
create mode 100644 drivers/crypto/keembay/keembay-ocs-ecc.c
rename {crypto => include/crypto/internal}/ecc.h (90%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.15
2021-10-29 17:39 ` Linus Torvalds
@ 2021-11-02 4:01 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2021-11-02 4:01 UTC (permalink / raw)
To: Linus Torvalds, Denys Vlasenko
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Tianjia Zhang
On Fri, Oct 29, 2021 at 10:39:35AM -0700, Linus Torvalds wrote:
>
> Plus, I get the feeling that some people have just copied-and-pasted
> those things, and don't necessarily realize just _how_ subtle 'M'
> sections are.
>
> How much of a data savings is it to have this complexity? Particularly
> since I suspect most of the time these things end up being individual
> modules, and never actually get linked together at all?
Let me copy Denys Vlasenko who introduced this.
But you're absolutely right that the recent additions are
more likely to be just cut-n-paste rather than deeply thought
through.
FWIW the original change that added this was:
ommit e183914af00e15eb41ae666d44e323bfa154be13
Author: Denys Vlasenko <dvlasenk@redhat.com>
Date: Thu Jan 19 22:33:04 2017 +0100
crypto: x86 - make constants readonly, allow linker to merge them
A lot of asm-optimized routines in arch/x86/crypto/ keep its
constants in .data. This is wrong, they should be on .rodata.
Mnay of these constants are the same in different modules.
For example, 128-bit shuffle mask 0x000102030405060708090A0B0C0D0E0F
exists in at least half a dozen places.
There is a way to let linker merge them and use just one copy.
The rules are as follows: mergeable objects of different sizes
should not share sections. You can't put them all in one .rodata
section, they will lose "mergeability".
GCC puts its mergeable constants in ".rodata.cstSIZE" sections,
or ".rodata.cstSIZE.<object_name>" if -fdata-sections is used.
This patch does the same:
.section .rodata.cst16.SHUF_MASK, "aM", @progbits, 16
It is important that all data in such section consists of
16-byte elements, not larger ones, and there are no implicit
use of one element from another.
When this is not the case, use non-mergeable section:
.section .rodata[.VAR_NAME], "a", @progbits
This reduces .data by ~15 kbytes:
text data bss dec hex filename
11097415 2705840 2630712 16433967 fac32f vmlinux-prev.o
11112095 2690672 2630712 16433479 fac147 vmlinux.o
Merged objects are visible in System.map:
ffffffff81a28810 r POLY
ffffffff81a28810 r POLY
ffffffff81a28820 r TWOONE
ffffffff81a28820 r TWOONE
ffffffff81a28830 r PSHUFFLE_BYTE_FLIP_MASK <- merged regardless of
ffffffff81a28830 r SHUF_MASK <------------- the name difference
ffffffff81a28830 r SHUF_MASK
ffffffff81a28830 r SHUF_MASK
..
ffffffff81a28d00 r K512 <- merged three identical 640-byte tables
ffffffff81a28d00 r K512
ffffffff81a28d00 r K512
Use of object names in section name suffixes is not strictly necessary,
but might help if someday link stage will use garbage collection
to eliminate unused sections (ld --gc-sections).
Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
CC: Herbert Xu <herbert@gondor.apana.org.au>
CC: Josh Poimboeuf <jpoimboe@redhat.com>
CC: Xiaodong Liu <xiaodong.liu@intel.com>
CC: Megha Dey <megha.dey@intel.com>
CC: linux-crypto@vger.kernel.org
CC: x86@kernel.org
CC: linux-kernel@vger.kernel.org
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.16
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
@ 2021-11-02 4:27 ` pr-tracker-bot
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-11-02 4:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 2 Nov 2021 11:52:02 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bfc484fe6abba4b89ec9330e0e68778e2a9856b2
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.16
2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
2021-10-29 18:49 ` pr-tracker-bot
@ 2021-11-12 10:48 ` Herbert Xu
2021-11-12 20:42 ` pr-tracker-bot
2021-12-22 5:13 ` Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-11-12 10:48 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a boot crash regression.
The following changes since commit 39ef08517082a424b5b65c3dbaa6c0fa9d3303b9:
crypto: testmgr - fix wrong key length for pkcs1pad (2021-10-29 21:04:04 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to beaaaa37c664e9afdf2913aee19185d8e3793b50:
crypto: api - Fix boot-up crash when crypto manager is disabled (2021-11-09 13:45:48 +0800)
----------------------------------------------------------------
Herbert Xu (1):
crypto: api - Fix boot-up crash when crypto manager is disabled
crypto/algapi.c | 2 ++
1 file changed, 2 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.16
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
@ 2021-11-12 20:42 ` pr-tracker-bot
2021-12-22 5:13 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-11-12 20:42 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 12 Nov 2021 18:48:15 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/66f4beaa6c1d28161f534471484b2daa2de1dce0
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.16
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2021-11-12 20:42 ` pr-tracker-bot
@ 2021-12-22 5:13 ` Herbert Xu
2021-12-22 19:02 ` pr-tracker-bot
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2021-12-22 5:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a regression in the qat driver.
The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf:
Linux 5.16-rc1 (2021-11-14 13:56:52 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 27750a315aba7e6675bb1c3dfd4481c4f6888af1:
crypto: qat - do not handle PFVF sources for qat_4xxx (2021-12-17 13:11:54 +1100)
----------------------------------------------------------------
Giovanni Cabiddu (1):
crypto: qat - do not handle PFVF sources for qat_4xxx
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 7 +++++++
1 file changed, 7 insertions(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.16
2021-12-22 5:13 ` Herbert Xu
@ 2021-12-22 19:02 ` pr-tracker-bot
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2021-12-22 19:02 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 22 Dec 2021 16:13:07 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e19e226345196649e83d49c6997e806a8ecdafe6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.17
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
2021-11-02 4:27 ` pr-tracker-bot
@ 2022-01-11 2:04 ` Herbert Xu
2022-01-11 20:53 ` pr-tracker-bot
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-01-11 2:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This update includes the following changes:
Algorithms:
- Drop alignment requirement for data in aesni.
- Use synchronous seeding from the /dev/random in DRBG.
- Reseed nopr DRBGs every 5 minutes from /dev/random.
- Add KDF algorithms currently used by security/DH.
- Fix lack of entropy on some AMD CPUs with jitter RNG.
Drivers:
- Add support for the D1 variant in sun8i-ce.
- Add SEV_INIT_EX support in ccp.
- PFVF support for GEN4 host driver in qat.
- Compression support for GEN4 devices in qat.
- Add cn10k random number generator support.
The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf:
Linux 5.16-rc1 (2021-11-14 13:56:52 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 5f21d7d283dd82865bdb0123795b3accf0d42b67:
crypto: af_alg - rewrite NULL pointer check (2022-01-07 14:30:01 +1100)
----------------------------------------------------------------
Andy Shevchenko (1):
crypto: api - Replace kernel.h with the necessary inclusions
Chengfeng Ye (3):
crypto: qce - fix uaf on qce_aead_register_one
crypto: qce - fix uaf on qce_ahash_register_one
crypto: qce - fix uaf on qce_skcipher_register_one
Christophe JAILLET (1):
crypto: ccree - remove redundant 'flush_workqueue()' calls
Colin Ian King (1):
crypto: x86/des3 - remove redundant assignment of variable nbytes
Corentin Labbe (2):
crypto: sun8i-ce - Add support for the D1 variant
crypto: omap - increase priority of DES/3DES
Dan Carpenter (3):
crypto: octeontx2 - uninitialized variable in kvf_limits_store()
crypto: octeontx2 - out of bounds access in otx2_cpt_dl_custom_egrp_delete()
crypto: octeontx2 - prevent underflow in get_cores_bmap()
David Rientjes (1):
crypto: ccp - Add SEV_INIT_EX support
Etienne Carriere (2):
crypto: stm32/cryp - defer probe for reset controller
crypto: stm32/cryp - don't print error on probe deferral
Gaurav Jain (1):
crypto: caam - save caam memory to support crypto engine retry mechanism.
Geert Uytterhoeven (1):
crypto: sa2ul - Use bitfield helpers
Giovanni Cabiddu (13):
crypto: qat - do not handle PFVF sources for qat_4xxx
crypto: qat - fix undetected PFVF timeout in ACK loop
crypto: qat - move vf2pf interrupt helpers
crypto: qat - change PFVF ACK behaviour
crypto: qat - re-enable interrupts for legacy PFVF messages
crypto: qat - relocate PFVF disabled function
crypto: qat - abstract PFVF receive logic
crypto: qat - get compression extended capabilities
crypto: qat - set CIPHER capability for QAT GEN2
crypto: qat - set COMPRESSION capability for QAT GEN2
crypto: qat - extend crypto capability detection for 4xxx
crypto: qat - allow detection of dc capabilities for 4xxx
crypto: qat - fix definition of ring reset results
Guo Zhengkui (1):
crypto: dh - remove duplicate includes
Gustavo A. R. Silva (2):
crypto: cavium - Use kcalloc() instead of kzalloc()
crypto: marvell/octeontx - Use kcalloc() instead of kzalloc()
Heiner Kallweit (1):
crypto: omap-aes - Fix broken pm_runtime_and_get() usage
Herbert Xu (1):
crypto: stm32 - Revert broken pm_runtime_resume_and_get changes
Jakub Kicinski (1):
crypto: x86/aesni - don't require alignment of data
Jason A. Donenfeld (1):
crypto: x86/curve25519 - use in/out register constraints more precisely
Jason Wang (1):
crypto: ccp - no need to initialise statics to 0
Jiapeng Chong (1):
crypto: octeontx2 - Use swap() instead of swap_engines()
Jiasheng Jiang (1):
crypto: af_alg - rewrite NULL pointer check
Kai Ye (5):
crypto: hisilicon - modify the value of engine type rate
crypto: hisilicon/qm - modify the value of qos initialization
crypto: hisilicon/qm - some optimizations of ths qos write process
crypto: hisilicon/qm - simplified the calculation of qos shaper parameters
MAINTAINERS: update SEC2 driver maintainers list
Lad Prabhakar (1):
crypto: ux500 - Use platform_get_irq() to get the interrupt
Lei He (1):
crypto: testmgr - Fix wrong test case of RSA
Lukas Bulwahn (1):
MAINTAINERS: rectify entry for INTEL KEEM BAY OCS ECC CRYPTO DRIVER
Marco Chiappero (36):
crypto: qat - refactor PF top half for PFVF
crypto: qat - move VF message handler to adf_vf2pf_msg.c
crypto: qat - move interrupt code out of the PFVF handler
crypto: qat - split PFVF message decoding from handling
crypto: qat - handle retries due to collisions in adf_iov_putmsg()
crypto: qat - relocate PFVF PF related logic
crypto: qat - relocate PFVF VF related logic
crypto: qat - add pfvf_ops
crypto: qat - differentiate between pf2vf and vf2pf offset
crypto: qat - abstract PFVF send function
crypto: qat - reorganize PFVF code
crypto: qat - reorganize PFVF protocol definitions
crypto: qat - use enums for PFVF protocol codes
crypto: qat - pass the PF2VF responses back to the callers
crypto: qat - refactor pfvf version request messages
crypto: qat - do not rely on min version
crypto: qat - fix VF IDs in PFVF log messages
crypto: qat - improve logging of PFVF messages
crypto: qat - support the reset of ring pairs on PF
crypto: qat - add the adf_get_pmisc_base() helper function
crypto: qat - make PFVF message construction direction agnostic
crypto: qat - make PFVF send and receive direction agnostic
crypto: qat - set PFVF_MSGORIGIN just before sending
crypto: qat - abstract PFVF messages with struct pfvf_message
crypto: qat - leverage bitfield.h utils for PFVF messages
crypto: qat - leverage read_poll_timeout in PFVF send
crypto: qat - improve the ACK timings in PFVF send
crypto: qat - store the PFVF protocol version of the endpoints
crypto: qat - store the ring-to-service mapping
crypto: qat - introduce support for PFVF block messages
crypto: qat - exchange device capabilities over PFVF
crypto: qat - support fast ACKs in the PFVF protocol
crypto: qat - exchange ring-to-service mappings over PFVF
crypto: qat - config VFs based on ring-to-svc mapping
crypto: qat - add PFVF support to the GEN4 host driver
crypto: qat - add PFVF support to enable the reset of ring pairs
Marek Vasut (1):
crypto: stm32/crc32 - Fix kernel BUG triggered in probe()
Meng Li (1):
crypto: caam - replace this_cpu_ptr with raw_cpu_ptr
Nicolai Stange (9):
crypto: drbg - prepare for more fine-grained tracking of seeding state
crypto: drbg - track whether DRBG was seeded with !rng_is_initialized()
crypto: drbg - move dynamic ->reseed_threshold adjustments to __drbg_seed()
crypto: drbg - make reseeding from get_random_bytes() synchronous
crypto: drbg - make drbg_prepare_hrng() handle jent instantiation errors
crypto: drbg - reseed 'nopr' drbgs periodically from get_random_bytes()
crypto: drbg - ignore jitterentropy errors if not in FIPS mode
crypto: jitter - don't limit ->health_failure check to FIPS mode
crypto: jitter - quit sample collection loop upon RCT failure
Nicolas Toromanoff (7):
crypto: stm32/cryp - fix CTR counter carry
crypto: stm32/cryp - fix xts and race condition in crypto_engine requests
crypto: stm32/cryp - check early input data
crypto: stm32/cryp - fix double pm exit
crypto: stm32/cryp - fix lrw chaining mode
crypto: stm32/cryp - fix bugs and crash in tests
crypto: stm32/cryp - reorder hw initialization
Pankaj Gupta (1):
MAINTAINERS: update caam crypto driver maintainers list
Peter Gonda (4):
crypto: ccp - Add SEV_INIT rc error logging on init
crypto: ccp - Move SEV_INIT retry for corrupted data
crypto: ccp - Refactor out sev_fw_alloc()
crypto: ccp - Add psp_init_on_probe module parameter
Srujana Challa (2):
crypto: octeontx2 - add apis for custom engine groups
crypto: octeontx2 - parameters for custom engine groups
Stephan Müller (10):
crypto: kdf - Add key derivation self-test support code
crypto: kdf - add SP800-108 counter key derivation function
security: DH - remove dead code for zero padding
security: DH - use KDF implementation from crypto API
crypto: jitter - consider 32 LSB for APT
crypto: rsa - limit key size to 2048 in FIPS mode
crypto: dh - limit key size to 2048 in FIPS mode
crypto: des - disallow des3 in FIPS mode
crypto: jitter - add oversampling of noise source
crypto: kdf - select SHA-256 required for self-test
Sunil Goutham (2):
hwrng: cavium - Check health status while reading random data
hwrng: cn10k - Add random number generator support
Tianjia Zhang (5):
crypto: sha256 - remove duplicate generic hash init function
crypto: mips/sha - remove duplicate hash init function
crypto: powerpc/sha - remove duplicate hash init function
crypto: sparc/sha - remove duplicate hash init function
crypto: s390/sha512 - Use macros instead of direct IV numbers
Tom Rix (1):
crypto: hisilicon - cleanup warning in qm_get_qos_value()
Tomasz Kowalik (1):
crypto: qat - add support for compression for 4xxx
Tudor Ambarus (1):
crypto: atmel-aes - Reestablish the correct tfm context at dequeue
Wei Yongjun (1):
crypto: keembay-ocs-ecc - Fix error return code in kmb_ocs_ecc_probe()
Weili Qian (9):
crypto: hisilicon/qm - fix incorrect return value of hisi_qm_resume()
crypto: hisilicon/hpre - fix memory leak in hpre_curve25519_src_init()
crypto: hisilicon/qm - remove unnecessary device memory reset
crypto: hisilicon/qm - code movement
crypto: hisilicon/qm - modify the handling method after abnormal interruption
crypto: hisilicon/qm - use request_threaded_irq instead
crypto: hisilicon/qm - reset function if event queue overflows
crypto: hisilicon/qm - disable queue when 'CQ' error
crypto: hisilicon/qm - disable qm clock-gating
Yang Guang (1):
crypto: hisilicon/hpre - use swap() to make code cleaner
Yang Li (1):
crypto: ccp - remove unneeded semicolon
Yang Shen (3):
crypto: hisilicon/zip - enable ssid for sva sgl
crypto: hisilicon/qm - fix deadlock for remove driver
crypto: hisilicon/zip - add new algorithms for uacce device
Zizhuang Deng (1):
lib/mpi: Add the return value check of kcalloc()
chiminghao (1):
crypto: octeontx2 - use swap() to make code cleaner
Documentation/virt/kvm/amd-memory-encryption.rst | 6 +
MAINTAINERS | 3 +-
arch/mips/cavium-octeon/crypto/octeon-sha1.c | 17 +-
arch/mips/cavium-octeon/crypto/octeon-sha256.c | 39 +-
arch/mips/cavium-octeon/crypto/octeon-sha512.c | 39 +-
arch/powerpc/crypto/sha1-spe-glue.c | 17 +-
arch/powerpc/crypto/sha1.c | 14 +-
arch/powerpc/crypto/sha256-spe-glue.c | 39 +-
arch/s390/crypto/sha512_s390.c | 32 +-
arch/sparc/crypto/sha1_glue.c | 14 +-
arch/sparc/crypto/sha256_glue.c | 37 +-
arch/sparc/crypto/sha512_glue.c | 37 +-
arch/x86/crypto/aesni-intel_glue.c | 4 +-
arch/x86/crypto/curve25519-x86_64.c | 767 ++++++++++------
arch/x86/crypto/des3_ede_glue.c | 4 +-
crypto/Kconfig | 4 +
crypto/Makefile | 5 +
crypto/af_alg.c | 7 +-
crypto/dh.c | 5 +-
crypto/drbg.c | 150 ++--
crypto/jitterentropy-kcapi.c | 6 -
crypto/jitterentropy.c | 32 +-
crypto/jitterentropy.h | 1 -
crypto/kdf_sp800108.c | 153 ++++
crypto/rsa.c | 4 +
crypto/sha256_generic.c | 16 +-
crypto/testmgr.c | 9 -
crypto/testmgr.h | 6 +-
drivers/char/hw_random/Kconfig | 13 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/cavium-rng-vf.c | 194 +++-
drivers/char/hw_random/cavium-rng.c | 11 +-
drivers/char/hw_random/cn10k-rng.c | 181 ++++
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 21 +
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 1 +
drivers/crypto/atmel-aes.c | 6 +-
drivers/crypto/caam/caamalg.c | 6 +
drivers/crypto/caam/caamalg_qi2.c | 2 +-
drivers/crypto/caam/caamhash.c | 3 +
drivers/crypto/caam/caampkc.c | 3 +
drivers/crypto/cavium/cpt/cptvf_main.c | 5 +-
drivers/crypto/ccp/ccp-dev.c | 2 +-
drivers/crypto/ccp/sev-dev.c | 259 +++++-
drivers/crypto/ccree/cc_request_mgr.c | 1 -
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 7 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 2 +-
drivers/crypto/hisilicon/qm.c | 483 ++++++----
drivers/crypto/hisilicon/sec2/sec_main.c | 2 +-
drivers/crypto/hisilicon/zip/zip_main.c | 12 +-
drivers/crypto/keembay/keembay-ocs-ecc.c | 1 +
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 4 +-
drivers/crypto/marvell/octeontx2/Makefile | 2 +-
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 1 +
.../crypto/marvell/octeontx2/otx2_cpt_devlink.c | 108 +++
.../crypto/marvell/octeontx2/otx2_cpt_devlink.h | 20 +
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 3 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 18 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 315 ++++++-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 7 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 5 +-
drivers/crypto/omap-aes.c | 2 +-
drivers/crypto/omap-des.c | 8 +-
drivers/crypto/qat/Kconfig | 1 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 151 +++-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 2 +
drivers/crypto/qat/qat_4xxx/adf_drv.c | 33 +
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 12 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 15 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 6 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 12 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 15 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.h | 1 -
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 6 +-
drivers/crypto/qat/qat_common/Makefile | 6 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 47 +-
drivers/crypto/qat/qat_common/adf_accel_engine.c | 8 +-
drivers/crypto/qat/qat_common/adf_admin.c | 47 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 1 +
drivers/crypto/qat/qat_common/adf_cfg_common.h | 13 +
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 3 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 42 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 105 +--
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 22 +-
drivers/crypto/qat/qat_common/adf_gen2_pfvf.c | 381 ++++++++
drivers/crypto/qat/qat_common/adf_gen2_pfvf.h | 29 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.c | 69 +-
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 17 +
drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 148 +++
drivers/crypto/qat/qat_common/adf_gen4_pfvf.h | 17 +
drivers/crypto/qat/qat_common/adf_init.c | 11 +-
drivers/crypto/qat/qat_common/adf_isr.c | 111 ++-
drivers/crypto/qat/qat_common/adf_pf2vf_msg.c | 416 ---------
drivers/crypto/qat/qat_common/adf_pf2vf_msg.h | 93 --
drivers/crypto/qat/qat_common/adf_pfvf_msg.h | 259 ++++++
drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.c | 52 ++
drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.h | 18 +
drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c | 346 ++++++++
drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.h | 13 +
drivers/crypto/qat/qat_common/adf_pfvf_utils.c | 65 ++
drivers/crypto/qat/qat_common/adf_pfvf_utils.h | 31 +
drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c | 167 ++++
drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.h | 23 +
drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.c | 368 ++++++++
drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.h | 17 +
drivers/crypto/qat/qat_common/adf_sriov.c | 59 +-
drivers/crypto/qat/qat_common/adf_vf2pf_msg.c | 48 -
drivers/crypto/qat/qat_common/adf_vf_isr.c | 106 +--
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 4 +-
drivers/crypto/qat/qat_common/icp_qat_hw.h | 13 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 25 +
drivers/crypto/qat/qat_common/qat_hal.c | 41 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 44 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 2 +
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 15 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 1 -
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 6 +-
drivers/crypto/qce/aead.c | 2 +-
drivers/crypto/qce/sha.c | 2 +-
drivers/crypto/qce/skcipher.c | 2 +-
drivers/crypto/sa2ul.c | 19 +-
drivers/crypto/stm32/stm32-crc32.c | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 988 +++++++++------------
drivers/crypto/stm32/stm32-hash.c | 6 +-
drivers/crypto/ux500/cryp/cryp.h | 2 +
drivers/crypto/ux500/cryp/cryp_core.c | 26 +-
include/crypto/aead.h | 4 +-
include/crypto/algapi.h | 5 +-
include/crypto/blake2b.h | 1 -
include/crypto/blake2s.h | 2 +-
include/crypto/cryptd.h | 3 +-
include/crypto/drbg.h | 11 +-
include/crypto/engine.h | 6 +-
include/crypto/internal/kdf_selftest.h | 71 ++
include/crypto/kdf_sp800108.h | 61 ++
include/crypto/pcrypt.h | 2 +-
include/crypto/scatterwalk.h | 3 +-
include/crypto/skcipher.h | 6 +-
include/linux/psp-sev.h | 21 +
lib/mpi/mpi-mod.c | 2 +
security/keys/Kconfig | 2 +-
security/keys/dh.c | 130 +--
142 files changed, 5484 insertions(+), 2637 deletions(-)
create mode 100644 crypto/kdf_sp800108.c
create mode 100644 drivers/char/hw_random/cn10k-rng.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_devlink.c
create mode 100644 drivers/crypto/marvell/octeontx2/otx2_cpt_devlink.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_pfvf.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_pfvf.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pfvf.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pfvf.h
delete mode 100644 drivers/crypto/qat/qat_common/adf_pf2vf_msg.c
delete mode 100644 drivers/crypto/qat/qat_common/adf_pf2vf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_utils.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_utils.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.h
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.c
create mode 100644 drivers/crypto/qat/qat_common/adf_pfvf_vf_proto.h
delete mode 100644 drivers/crypto/qat/qat_common/adf_vf2pf_msg.c
create mode 100644 include/crypto/internal/kdf_selftest.h
create mode 100644 include/crypto/kdf_sp800108.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.17
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
@ 2022-01-11 20:53 ` pr-tracker-bot
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-01-11 20:53 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 11 Jan 2022 13:04:19 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5c947d0dbae8038ec1c8b538891f6475350542ee
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.17
2021-12-22 5:13 ` Herbert Xu
2021-12-22 19:02 ` pr-tracker-bot
@ 2022-02-09 2:33 ` Herbert Xu
2022-02-09 18:01 ` pr-tracker-bot
2022-03-16 1:13 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-02-09 2:33 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes two regressions:
- Potential boot failure due to missing cryptomgr on initramfs.
- Stack overflow in octeontx2.
The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:
Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to c6ce9c5831cae515d375a01b97ae1778689acf19:
crypto: api - Move cryptomgr soft dependency into algapi (2022-02-05 15:10:07 +1100)
----------------------------------------------------------------
Herbert Xu (1):
crypto: api - Move cryptomgr soft dependency into algapi
Kees Cook (1):
crypto: octeontx2 - Avoid stack variable overflow
crypto/algapi.c | 1 +
crypto/api.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 3 ++-
3 files changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.17
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
@ 2022-02-09 18:01 ` pr-tracker-bot
2022-03-16 1:13 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-02-09 18:01 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 9 Feb 2022 13:33:31 +1100:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f9f94c9d2c070941a5688f0f751a489c7d0e5039
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.17
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
2022-02-09 18:01 ` pr-tracker-bot
@ 2022-03-16 1:13 ` Herbert Xu
2022-03-17 20:40 ` pr-tracker-bot
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-16 1:13 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This push fixes a bug where qcom-rng can return a buffer that is
not completely filled with random data.
The following changes since commit c6ce9c5831cae515d375a01b97ae1778689acf19:
crypto: api - Move cryptomgr soft dependency into algapi (2022-02-05 15:10:07 +1100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to a680b1832ced3b5fa7c93484248fd221ea0d614b:
crypto: qcom-rng - ensure buffer for generate is completely filled (2022-03-14 14:41:04 +1200)
----------------------------------------------------------------
Brian Masney (1):
crypto: qcom-rng - ensure buffer for generate is completely filled
drivers/crypto/qcom-rng.c | 17 ++++++++++-------
1 file changed, 10 insertions(+), 7 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.17
2022-03-16 1:13 ` Herbert Xu
@ 2022-03-17 20:40 ` pr-tracker-bot
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-03-17 20:40 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 16 Mar 2022 13:13:45 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d34c58247f73c5358ceae1ae648fb9daa408ef23
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.18
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
2022-01-11 20:53 ` pr-tracker-bot
@ 2022-03-20 23:42 ` Herbert Xu
2022-03-21 23:14 ` Linus Torvalds
2022-03-21 23:18 ` pr-tracker-bot
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-20 23:42 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
This update includes the following changes:
API:
- hwrng core now credits for low-quality RNG devices.
Algorithms:
- Optimisations for neon aes on arm/arm64.
- Add accelerated crc32_be on arm64.
- Add ffdheXYZ(dh) templates.
- Disallow hmac keys < 112 bits in FIPS mode.
- Add AVX assembly implementation for sm3 on x86.
Drivers:
- Add missing local_bh_disable calls for crypto_engine callback.
- Ensure BH is disabled in crypto_engine callback path.
- Fix zero length DMA mappings in ccree.
- Add synchronization between mailbox accesses in octeontx2.
- Add Xilinx SHA3 driver.
- Add support for the TDES IP available on sama7g5 SoC in atmel.
The following changes since commit e783362eb54cd99b2cac8b3a9aeac942e6f6ac07:
Linux 5.17-rc1 (2022-01-23 10:12:53 +0200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
for you to fetch changes up to 0e03b8fd29363f2df44e2a7a176d486de550757a:
crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST (2022-03-14 14:45:45 +1200)
----------------------------------------------------------------
Andy Shevchenko (2):
crypto: qat - don't cast parameter in bit operations
crypto: cavium/nitrox - don't cast parameter in bit operations
Ard Biesheuvel (8):
crypto: memneq - avoid implicit unaligned accesses
crypto: arm64/aes-neon-ctr - improve handling of single tail block
crypto: arm/aes-neonbs-ctr - deal with non-multiples of AES block size
crypto: arm64/aes-neonbs-ctr - fallback to plain NEON for final chunk
crypto: arm64/aes-neonbs-xts - use plain NEON for non-power-of-2 input sizes
lib/xor: make xor prototypes more friendly to compiler vectorization
crypto: arm/xor - make vectorized C code Clang-friendly
crypto: crypto_xor - use helpers for unaligned accesses
Claudiu Beznea (7):
hwrng: atmel - add wait for ready support on read
hwrng: atmel - disable trng on failure path
hwrng: atmel - rename enable/disable functions to init/cleanup
hwrng: atmel - move set of TRNG_HALFR in atmel_trng_init()
hwrng: atmel - use __maybe_unused and pm_ptr() for pm ops
hwrng: atmel - add runtime pm support
hwrng: atmel - remove extra line
Colin Ian King (2):
crypto: marvell/octeontx - remove redundant initialization of variable c_size
crypto: sl3516 - remove redundant initializations of pointers in_sg and out_sg
Corentin Labbe (10):
crypto: sun8i-ss - really disable hash on A80
crypto: cavium/nitrox - fix typo on crypto
crypto: rockchip - ECB does not need IV
crypto: cavium/zip - register algorithm only if hardware is present
crypto: sun8i-ss - call finalize with bh disabled
crypto: sun8i-ce - call finalize with bh disabled
crypto: amlogic - call finalize with bh disabled
crypto: gemini - call finalize with bh disabled
crypto: engine - check if BH is disabled during completion
crypto: xilinx: prevent probing on non-xilinx hardware
Dan Carpenter (1):
crypto: qat - fix a signedness bug in get_service_enabled()
Dominik Brodowski (10):
hwrng: core - explicit ordering of initcalls
hwrng: core - read() callback must be called for size of 32 or more bytes
hwrng: core - use rng_fillbuf in add_early_randomness()
hwrng: core - only set cur_rng_set_by_user if it is working
hwrng: core - break out of hwrng_fillfn if current rng is not trusted
hwrng: core - credit entropy for low quality sources of randomness
hwrng: core - do not bother to order list of devices by quality
hwrng: core - start and stop in-kernel rngd in separate function
hwrng: core - use per-rng quality value instead of global setting
hwrng: core - introduce rng_quality sysfs attribute
Dāvis Mosāns (1):
crypto: ccp - ccp_dmaengine_unregister release dma channels
Eric Biggers (5):
crypto: rsa-pkcs1pad - only allow with rsa
crypto: rsa-pkcs1pad - correctly get hash from source scatterlist
crypto: rsa-pkcs1pad - restore signature length check
crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete()
crypto: rsa-pkcs1pad - use clearer variable names
Geert Uytterhoeven (1):
hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER
Gilad Ben-Yossef (1):
crypto: ccree - don't attempt 0 len DMA mappings
Giovanni Cabiddu (5):
crypto: qat - fix access to PFVF interrupt registers for GEN4
crypto: qat - disable registration of algorithms
crypto: qat - remove unneeded assignment
crypto: qat - fix initialization of pfvf cap_msg structures
crypto: qat - fix initialization of pfvf rts_map_msg structures
Harman Kalra (1):
crypto: octeontx2 - add synchronization between mailbox accesses
Harsha (4):
crypto: xilinx - Updated Makefile for xilinx subdirectory
firmware: xilinx: Add ZynqMP SHA API for SHA3 functionality
crypto: xilinx - Add Xilinx SHA3 driver
MAINTAINERS: Add maintainer for Xilinx ZynqMP SHA3 driver
Herbert Xu (6):
crypto: testmgr - Move crypto_simd_disabled_for_test out
crypto: kdf - Select hmac in addition to sha256
crypto: authenc - Fix sleep in atomic context in decrypt_tail
crypto: xts - Add softdep on ecb
crypto: lrw - Add dependency on ecb
crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST
Jianglei Nie (1):
crypto: ccree - Fix use after free in cc_cipher_exit()
Jiapeng Chong (2):
crypto: marvell/octeontx - Use swap() instead of open coding it
crypto: dh - Remove the unused function dh_safe_prime_dh_alg()
Julia Lawall (1):
crypto: ux500 - use GFP_KERNEL
Kai Ye (14):
Documentation: use the tabs on all acc documentation
Documentation: update debugfs doc for Hisilicon SEC
Documentation: update debugfs doc for Hisilicon ZIP
Documentation: update debugfs doc for Hisilicon HPRE
crypto: hisilicon/sec - fixup icv checking enabled on Kunpeng 930
crypto: hisilicon/sec - add some comments for soft fallback
crypto: hisilicon/sec - fix the max length of AAD for the CCM mode
crypto: hisilicon/sec - fix the CTR mode BD configuration
crypto: hisilicon/sec - use the correct print format
crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos
crypto: hisilicon/sec - add the register configuration for HW V3
crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3
crypto: hisilicon/sec - fix the aead software fallback for engine
crypto: hisilicon/qm - fix memset during queues clearing
Kavyasree Kotagiri (1):
crypto: atmel - add support for AES and SHA IPs available on lan966x SoC
Kevin Bracey (4):
lib/crc32: remove unneeded casts
lib/crc32: Make crc32_be weak for arch override
lib/crc32test: correct printed bytes count
arm64: lib: accelerate crc32_be
Longfang Liu (1):
MAINTAINERS: update HPRE/SEC2/TRNG driver maintainers list
Miaoqian Lin (1):
hwrng: nomadik - Change clk_disable to clk_disable_unprepare
Minghao Chi (1):
crypto: ccp - remove redundant ret variable
Nathan Huckleberry (1):
crypto: x86 - Convert to SPDX identifier
Nicolai Stange (15):
crypto: kpp - provide support for KPP template instances
crypto: kpp - provide support for KPP spawns
crypto: dh - remove struct dh's ->q member
crypto: dh - constify struct dh's pointer members
crypto: dh - split out deserialization code from crypto_dh_decode()
crypto: dh - introduce common code for built-in safe-prime group support
crypto: dh - implement ffdheXYZ(dh) templates
crypto: testmgr - add known answer tests for ffdheXYZ(dh) templates
crypto: dh - implement private key generation primitive for ffdheXYZ(dh)
crypto: testmgr - add keygen tests for ffdheXYZ(dh) templates
crypto: dh - allow for passing NULL to the ffdheXYZ(dh)s' ->set_secret()
crypto: api - allow algs only in specific constructions in FIPS mode
crypto: dh - disallow plain "dh" usage in FIPS mode
lib/mpi: export mpi_rshift
crypto: dh - calculate Q from P for the full public key verification
Peter Gonda (1):
crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
Petr Vorel (1):
crypto: vmx - add missing dependencies
Rikard Falkeborn (3):
crypto: omap-aes - Constify static attribute_group
crypto: omap-sham - Constify static attribute_group
crypto: nx - Constify static attribute_group structs
Shijith Thotton (2):
crypto: octeontx2 - select CONFIG_NET_DEVLINK
crypto: octeontx2 - remove CONFIG_DM_CRYPT check
Srujana Challa (3):
crypto: octeontx2 - CN10K CPT to RNM workaround
crypto: octeontx2 - disable DMA black hole on an DMA fault
crypto: octeontx2 - increase CPT HW instruction queue length
Stephan Müller (2):
crypto: hmac - add fips_skip support
crypto: hmac - disallow keys < 112 bits in FIPS mode
Tianjia Zhang (7):
crypto: sm3 - create SM3 stand-alone library
crypto: arm64/sm3-ce - make dependent on sm3 library
crypto: sm2 - make dependent on sm3 library
crypto: sm3 - make dependent on sm3 library
crypto: x86/sm3 - add AVX assembly implementation
crypto: tcrypt - add asynchronous speed test for SM3
crypto: tcrypt - remove all multibuffer ahash tests
Tom Rix (2):
crypto: cleanup comments
crypto: arm64 - cleanup comments
Tomas Paukrt (1):
crypto: mxs-dcp - Fix scatterlist processing
Tudor Ambarus (1):
crypto: atmel-tdes - Add support for the TDES IP available on sama7g5 SoC
Wan Jiabing (1):
hwrng: cavium - fix NULL but dereferenced coccicheck error
Wojciech Ziemba (3):
crypto: qat - add misc workqueue
crypto: qat - move and rename GEN4 error register definitions
crypto: qat - enable power management for QAT GEN4
Yang Yingliang (1):
crypto: octeontx2 - fix missing unlock
YueHaibing (2):
crypto: x86/blowfish - Remove unused inline functions
crypto: x86/des3 - Remove unused inline function des3_ede_enc_blk_3way()
Yury Norov (1):
padata: replace cpumask_weight with cpumask_empty in padata.c
Documentation/ABI/testing/debugfs-hisi-hpre | 178 +--
Documentation/ABI/testing/debugfs-hisi-sec | 146 +-
Documentation/ABI/testing/debugfs-hisi-zip | 146 +-
MAINTAINERS | 11 +-
arch/alpha/include/asm/xor.h | 53 +-
arch/arm/crypto/aes-neonbs-core.S | 105 +-
arch/arm/crypto/aes-neonbs-glue.c | 35 +-
arch/arm/include/asm/xor.h | 42 +-
arch/arm/lib/xor-neon.c | 12 +-
arch/arm64/crypto/Kconfig | 2 +-
arch/arm64/crypto/aes-glue.c | 22 +-
arch/arm64/crypto/aes-modes.S | 18 +-
arch/arm64/crypto/aes-neonbs-core.S | 264 +---
arch/arm64/crypto/aes-neonbs-glue.c | 97 +-
arch/arm64/crypto/sha3-ce-glue.c | 2 +-
arch/arm64/crypto/sha512-armv8.pl | 2 +-
arch/arm64/crypto/sha512-ce-glue.c | 2 +-
arch/arm64/crypto/sm3-ce-glue.c | 28 +-
arch/arm64/include/asm/xor.h | 21 +-
arch/arm64/lib/crc32.S | 87 +-
arch/arm64/lib/xor-neon.c | 46 +-
arch/ia64/include/asm/xor.h | 21 +-
arch/powerpc/include/asm/xor_altivec.h | 25 +-
arch/powerpc/lib/xor_vmx.c | 28 +-
arch/powerpc/lib/xor_vmx.h | 27 +-
arch/powerpc/lib/xor_vmx_glue.c | 32 +-
arch/s390/lib/xor.c | 21 +-
arch/sparc/include/asm/xor_32.h | 21 +-
arch/sparc/include/asm/xor_64.h | 42 +-
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 63 +-
arch/x86/crypto/blowfish_glue.c | 12 -
arch/x86/crypto/des3_ede_glue.c | 8 -
arch/x86/crypto/sm3-avx-asm_64.S | 517 +++++++
arch/x86/crypto/sm3_avx_glue.c | 134 ++
arch/x86/include/asm/xor.h | 42 +-
arch/x86/include/asm/xor_32.h | 42 +-
arch/x86/include/asm/xor_avx.h | 21 +-
crypto/Kconfig | 25 +-
crypto/algapi.c | 48 +-
crypto/api.c | 19 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/asymmetric_keys/x509_parser.h | 2 +-
crypto/async_tx/async_xor.c | 8 +-
crypto/async_tx/raid6test.c | 4 +-
crypto/authenc.c | 2 +-
crypto/cfb.c | 2 +-
crypto/crypto_engine.c | 1 +
crypto/dh.c | 681 ++++++++-
crypto/dh_helper.c | 42 +-
crypto/hmac.c | 4 +
crypto/kpp.c | 29 +
crypto/lrw.c | 1 +
crypto/memneq.c | 22 +-
crypto/rsa-pkcs1pad.c | 38 +-
crypto/sm2.c | 40 +-
crypto/sm3_generic.c | 142 +-
crypto/tcrypt.c | 226 +--
crypto/testmgr.c | 67 +-
crypto/testmgr.h | 1456 +++++++++++++++++++-
crypto/xts.c | 1 +
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/atmel-rng.c | 148 +-
drivers/char/hw_random/cavium-rng-vf.c | 2 +-
drivers/char/hw_random/core.c | 161 ++-
drivers/char/hw_random/nomadik-rng.c | 4 +-
drivers/crypto/Kconfig | 10 +
drivers/crypto/Makefile | 2 +-
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 3 +
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 3 +
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 3 +
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 2 +
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 3 +
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 2 +
drivers/crypto/atmel-aes.c | 1 +
drivers/crypto/atmel-sha.c | 1 +
drivers/crypto/atmel-tdes.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 8 +-
drivers/crypto/cavium/nitrox/nitrox_req.h | 2 +-
drivers/crypto/cavium/zip/zip_main.c | 83 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 5 +-
drivers/crypto/ccp/ccp-dmaengine.c | 16 +
drivers/crypto/ccp/sev-dev.c | 2 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 7 +
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/gemini/sl3516-ce-cipher.c | 6 +-
drivers/crypto/hisilicon/qm.c | 4 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 43 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 6 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 59 +-
drivers/crypto/marvell/Kconfig | 1 +
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 5 +-
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 1 +
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 14 +
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 19 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 25 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 27 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 56 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 17 +-
drivers/crypto/mxs-dcp.c | 2 +-
drivers/crypto/nx/nx-common-pseries.c | 4 +-
drivers/crypto/omap-aes.c | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 23 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 24 -
drivers/crypto/qat/qat_4xxx/adf_drv.c | 7 +
drivers/crypto/qat/qat_common/Makefile | 1 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 2 +
drivers/crypto/qat/qat_common/adf_admin.c | 37 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 4 +
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 6 +
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 14 +
drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 42 +-
drivers/crypto/qat/qat_common/adf_gen4_pm.c | 137 ++
drivers/crypto/qat/qat_common/adf_gen4_pm.h | 44 +
drivers/crypto/qat/qat_common/adf_init.c | 6 +
drivers/crypto/qat/qat_common/adf_isr.c | 42 +
drivers/crypto/qat/qat_common/adf_pfvf_vf_msg.c | 4 +-
.../crypto/qat/qat_common/icp_qat_fw_init_admin.h | 1 +
drivers/crypto/qat/qat_common/qat_crypto.c | 7 +
drivers/crypto/qat/qat_common/qat_uclo.c | 9 +-
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 1 -
drivers/crypto/ux500/cryp/cryp_core.c | 2 +-
drivers/crypto/ux500/hash/hash_core.c | 2 +-
drivers/crypto/vmx/Kconfig | 4 +
drivers/crypto/xilinx/Makefile | 1 +
drivers/crypto/xilinx/zynqmp-sha.c | 264 ++++
drivers/firmware/xilinx/zynqmp.c | 26 +
.../net/ethernet/marvell/octeontx2/af/rvu_cpt.c | 1 +
include/asm-generic/xor.h | 84 +-
include/crypto/algapi.h | 10 +-
include/crypto/dh.h | 26 +-
include/crypto/internal/kpp.h | 158 +++
include/crypto/sm3.h | 34 +-
include/linux/crypto.h | 9 +
include/linux/firmware/xlnx-zynqmp.h | 8 +
include/linux/raid/xor.h | 21 +-
kernel/padata.c | 2 +-
lib/crc32.c | 14 +-
lib/crc32test.c | 2 +-
lib/crypto/Kconfig | 3 +
lib/crypto/Makefile | 3 +
lib/crypto/sm3.c | 246 ++++
lib/mpi/mpi-bit.c | 1 +
security/keys/dh.c | 2 +-
147 files changed, 5673 insertions(+), 1669 deletions(-)
create mode 100644 arch/x86/crypto/sm3-avx-asm_64.S
create mode 100644 arch/x86/crypto/sm3_avx_glue.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pm.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_pm.h
create mode 100644 drivers/crypto/xilinx/zynqmp-sha.c
create mode 100644 lib/crypto/sm3.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.18
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
@ 2022-03-21 23:14 ` Linus Torvalds
2022-03-22 5:49 ` Herbert Xu
2022-03-21 23:18 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2022-03-21 23:14 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sun, Mar 20, 2022 at 4:42 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
So perhaps somewhat ironically, the crypto tree is now the first tree
I'm merging in this merge window that doesn't have a signed tag.
I don't require signed tags for kernel.org pulls, but I really do
heavily prefer them, and they aren't that hard to do.
I'm sure there are several other non-signed pull requests waiting in
the queue, but still, your pull request stands out as being the first
one - out of 27 so far - that didn't have it.
Can I prod you in the direction of making signed tags a part of your
workflow? The tag can contain the details of the pull - in which case
git request-pull will populate the pull request with it - or it can be
just some dummy message and you write the details separately in the
pull request email like you do now.
I know you have a pgp key, because I have one in my keyring from you
going all the way back to 2011. And if you have lost sight of that one
and need to create a new one, that still better going forward than not
signing your pull requests at all..
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.18
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
2022-03-21 23:14 ` Linus Torvalds
@ 2022-03-21 23:18 ` pr-tracker-bot
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-03-21 23:18 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 21 Mar 2022 11:42:35 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93e220a62da36f766b3188e76e234607e41488f9
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.18
2022-03-21 23:14 ` Linus Torvalds
@ 2022-03-22 5:49 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-22 5:49 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Mar 21, 2022 at 04:14:50PM -0700, Linus Torvalds wrote:
>
> Can I prod you in the direction of making signed tags a part of your
> workflow? The tag can contain the details of the pull - in which case
> git request-pull will populate the pull request with it - or it can be
> just some dummy message and you write the details separately in the
> pull request email like you do now.
Sure, I can do that starting with the next push request.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.18
2022-03-16 1:13 ` Herbert Xu
2022-03-17 20:40 ` pr-tracker-bot
@ 2022-03-31 3:16 ` Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-03-31 3:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0e03b8fd29363f2df44e2a7a176d486de550757a:
crypto: xilinx - Turn SHA into a tristate and allow COMPILE_TEST (2022-03-14 14:45:45 +1200)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p1
for you to fetch changes up to aa8e73eed7d3084c18dd16d195748661c7e881b5:
crypto: x86/sm3 - Fixup SLS (2022-03-30 16:33:11 +1200)
----------------------------------------------------------------
This push fixes the following issues:
- Missing Kconfig dependency on arm that leads to boot failure.
- x86 SLS fixes.
- Reference leak in the stm32 driver.
----------------------------------------------------------------
Herbert Xu (1):
crypto: arm/aes-neonbs-cbc - Select generic cbc and aes
Peter Zijlstra (3):
crypto: x86/chacha20 - Avoid spurious jumps to other functions
crypto: x86/poly1305 - Fixup SLS
crypto: x86/sm3 - Fixup SLS
Zheng Yongjun (1):
crypto: stm32 - fix reference leak in stm32_crc_remove
arch/arm/crypto/Kconfig | 2 ++
arch/x86/crypto/chacha-avx512vl-x86_64.S | 4 +--
arch/x86/crypto/poly1305-x86_64-cryptogams.pl | 38 +++++++++++++--------------
arch/x86/crypto/sm3-avx-asm_64.S | 2 +-
drivers/crypto/stm32/stm32-crc32.c | 4 ++-
5 files changed, 27 insertions(+), 23 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.18
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
@ 2022-03-31 19:12 ` pr-tracker-bot
2022-05-20 5:41 ` Herbert Xu
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-03-31 19:12 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 31 Mar 2022 15:16:58 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/93235e3df29c084a37e0daed17801c6adfce4cb6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.18
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
@ 2022-05-20 5:41 ` Herbert Xu
2022-05-20 6:10 ` pr-tracker-bot
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2022-05-20 5:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17:
Linux 5.18-rc1 (2022-04-03 14:08:21 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p2
for you to fetch changes up to 16287397ec5c08aa58db6acf7dbc55470d78087d:
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (2022-05-13 17:13:38 +0800)
----------------------------------------------------------------
This push fixes a regression in a recent fix to qcom-rng.
----------------------------------------------------------------
Ondrej Mosnacek (1):
crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ
drivers/crypto/qcom-rng.c | 1 +
1 file changed, 1 insertion(+)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.18
2022-05-20 5:41 ` Herbert Xu
@ 2022-05-20 6:10 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-05-20 6:10 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 20 May 2022 13:41:04 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.18-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3d7285a335edaf23b699e87c528cf0b0070e3293
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.19
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
2022-05-20 5:41 ` Herbert Xu
@ 2022-05-27 11:29 ` Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
` (2 more replies)
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-05-27 11:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 3123109284176b1532874591f7c81f3837bbdc17:
Linux 5.18-rc1 (2022-04-03 14:08:21 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p1
for you to fetch changes up to e4e62bbc6aba49a5edb3156ec65f6698ff37d228:
hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (2022-05-20 13:54:45 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Test in-place en/decryption with two sglists in testmgr.
- Fix process vs. softirq race in cryptd.
Algorithms:
- Add arm64 acceleration for sm4.
- Add s390 acceleration for chacha20.
Drivers:
- Add polarfire soc hwrng support in mpsf.
- Add support for TI SoC AM62x in sa2ul.
- Add support for ATSHA204 cryptochip in atmel-sha204a.
- Add support for PRNG in caam.
- Restore support for storage encryption in qat.
- Restore support for storage encryption in hisilicon/sec.
----------------------------------------------------------------
Colin Ian King (1):
hwrng: optee - remove redundant initialization to variable rng_size
Conor Dooley (1):
hwrng: mpfs - add polarfire soc hwrng support
Corentin Labbe (20):
crypto: marvell/cesa - ECB does not IV
crypto: sun8i-ce - Fix minor style issue
crypto: sun8i-ce - do not allocate memory when handling requests
crypto: sun4i-ss - do not allocate backup IV on requests
crypto: sun8i-ss - rework handling of IV
crypto: sun8i-ss - handle zero sized sg
crypto: sun8i-ss - remove redundant test
crypto: sun8i-ss - test error before assigning
crypto: sun8i-ss - use sg_nents_for_len
crypto: sun8i-ss - do not allocate memory when handling hash requests
crypto: sun8i-ss - do not zeroize all pad
crypto: sun8i-ss - handle requests if last block is not modulo 64
crypto: sun8i-ss - rework debugging
crypto: sun8i-ss - Add function for handling hash padding
crypto: sun8i-ss - add hmac(sha1)
crypto: sun8i-ss - do not fallback if cryptlen is less than sg length
crypto: sun8i-ce - Add function for handling hash padding
crypto: sun8i-ce - use sg_nents_for_len
crypto: sun8i-ce - rework debugging
crypto: sun8i-ce - do not fallback if cryptlen is less than sg length
Eric Biggers (1):
crypto: testmgr - test in-place en/decryption with two sglists
Fabio Estevam (1):
crypto: caam - fix i.MX6SX entropy delay value
Gilad Ben-Yossef (2):
crypto: ccree - rearrange init calls to avoid race
crypto: ccree - use fine grained DMA mapping dir
Giovanni Cabiddu (15):
crypto: qat - set CIPHER capability for DH895XCC
crypto: qat - set COMPRESSION capability for DH895XCC
crypto: qat - remove unused PFVF stubs
crypto: qat - set to zero DH parameters before free
crypto: qat - use pre-allocated buffers in datapath
crypto: qat - refactor submission logic
crypto: qat - add backlog mechanism
crypto: qat - fix memory leak in RSA
crypto: qat - remove dma_free_coherent() for RSA
crypto: qat - remove dma_free_coherent() for DH
crypto: qat - add param check for RSA
crypto: qat - add param check for DH
crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag
crypto: qat - re-enable registration of algorithms
crypto: qat - add support for 401xx devices
Haowen Bai (1):
crypto: qat - Fix unsigned function returning negative constant
Herbert Xu (3):
hwrng: mpfs - Enable COMPILE_TEST
Revert "hwrng: mpfs - Enable COMPILE_TEST"
hwrng: cn10k - Enable compile testing
Hui Tang (1):
crypto: hisilicon/qm - optimize the barrier operation
Jacky Li (1):
crypto: ccp - Fix the INIT_EX data file open failure
Jakob Koschel (1):
crypto: cavium/nitrox - remove check of list iterator against head past the loop body
Jason A. Donenfeld (1):
crypto: sm3,sm4 - move into crypto directory
Jayesh Choudhary (2):
dt-bindings: crypto: ti,sa2ul: Add a new compatible for AM62
crypto: sa2ul - Add the new compatible for AM62
Juerg Haefliger (1):
crypto: inside-secure - Add MODULE_FIRMWARE macros
Kai Ye (13):
crypto: hisilicon/qm - add register checking for ACC
crypto: hisilicon/hpre - support register checking
crypto: hisilicon/sec - support register checking
crypto: hisilicon/zip - support register checking
Documentation: update debugfs doc for Hisilicon HPRE
Documentation: update debugfs doc for Hisilicon SEC
Documentation: update debugfs doc for Hisilicon ZIP
crypto: hisilicon/qm - add last word dumping for ACC
crypto: hisilicon/sec - support last word dumping
crypto: hisilicon/hpre - support last word dumping
crypto: hisilicon/zip - support last word dumping
crypto: hisilicon/sec - add sm4 generic selection
crypto: hisilicon/sec - delete the flag CRYPTO_ALG_ALLOCATES_MEMORY
Lv Ruyi (1):
crypto: keembay - Make use of devm helper function devm_platform_ioremap_resource()
Marco Chiappero (12):
crypto: qat - fix ETR sources enabled by default on GEN2 devices
crypto: qat - remove unneeded braces
crypto: qat - remove unnecessary tests to detect PFVF support
crypto: qat - add missing restarting event notification in VFs
crypto: qat - test PFVF registers for spurious interrupts on GEN4
crypto: qat - fix wording and formatting in code comment
crypto: qat - fix off-by-one error in PFVF debug print
crypto: qat - rework the VF2PF interrupt handling logic
crypto: qat - leverage the GEN2 VF mask definiton
crypto: qat - replace disable_vf2pf_interrupts()
crypto: qat - use u32 variables in all GEN4 pfvf_ops
crypto: qat - remove line wrapping for pfvf_ops functions
Mario Limonciello (4):
crypto: ccp - cache capability into psp device
crypto: ccp - Export PSP security bits to userspace
crypto: ccp - Allow PSP driver to load without SEV/TEE support
crypto: ccp - When TSME and SME both detected notify user
Masahiro Yamada (2):
crypto: vmx - Align the short log with Makefile cleanups
crypto: vmx - Fix build error
Meenakshi Aggarwal (1):
crypto: caam/rng - Add support for PRNG
Minghao Chi (3):
crypto: sun8i-ss - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
crypto: sun8i-ce - using pm_runtime_resume_and_get instead of pm_runtime_get_sync
crypto: octeontx2 - simplify the return expression of otx2_cpt_aead_cbc_aes_sha_setkey()
Pali Rohár (1):
crypto: atmel-sha204a - Add support for ATSHA204 cryptochip
Peter Gonda (1):
crypto: ccp - Log when resetting PSP SEV state
Randy Dunlap (1):
crypto: x86 - eliminate anonymous module_init & module_exit
Robin Murphy (1):
crypto: qat - stop using iommu_present()
Sebastian Andrzej Siewior (1):
crypto: cryptd - Protect per-CPU resource by disabling BH.
Tetsuo Handa (1):
crypto: atmel - Avoid flush_scheduled_work() usage
Tianjia Zhang (5):
crypto: sm4 - export sm4 constant arrays
crypto: arm64/sm4-ce - rename to sm4-ce-cipher
crypto: arm64/sm4 - add ARMv8 NEON implementation
crypto: arm64/sm4 - add ARMv8 Crypto Extensions implementation
crypto: arm64/sm4 - Fix wrong dependency of NEON/CE implementation
Uwe Kleine-König (3):
crypto: atmel-sha204a - Remove useless check
crypto: atmel-sha204a - Suppress duplicate error message
crypto: atmel-i2c - Simplify return code in probe function
Vitaly Chikunov (1):
crypto: ecrdsa - Fix incorrect use of vli_cmp
Vladis Dronov (3):
hwrng: cn10k - Optimize cn10k_rng_read()
hwrng: cn10k - Make check_rng_health() return an error code
crypto: s390 - add crypto library interface for ChaCha20
Weili Qian (4):
crypto: hisilicon/qm - remove unused function declaration
crypto: hisilicon/qm - set function with static
crypto: hisilicon/qm - replace hisi_qm_release_qp() with hisi_qm_free_qps()
crypto: hisilicon/qm - remove hisi_qm_get_free_qp_num()
Wojciech Ziemba (1):
crypto: qat - add check for invalid PFVF protocol version 0
Yang Li (1):
crypto: engine - Add parameter description in crypto_transfer_request() kernel-doc comment
Yang Shen (1):
crypto: hisilicon/sgl - align the hardware sgl dma address
Yang Yingliang (1):
hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume()
Yihao Han (1):
crypto: ux500/hash - simplify if-if to if-else
jianchunfu (1):
crypto: talitos - Uniform coding style with defined variable
Documentation/ABI/testing/debugfs-hisi-hpre | 14 +
Documentation/ABI/testing/debugfs-hisi-sec | 14 +
Documentation/ABI/testing/debugfs-hisi-zip | 14 +
Documentation/ABI/testing/sysfs-driver-ccp | 87 +++
.../devicetree/bindings/crypto/ti,sa2ul.yaml | 1 +
.../devicetree/bindings/trivial-devices.yaml | 4 +-
arch/arm64/crypto/Kconfig | 16 +-
arch/arm64/crypto/Makefile | 8 +-
arch/arm64/crypto/sm4-ce-cipher-core.S | 36 ++
arch/arm64/crypto/sm4-ce-cipher-glue.c | 82 +++
arch/arm64/crypto/sm4-ce-core.S | 688 ++++++++++++++++++++-
arch/arm64/crypto/sm4-ce-glue.c | 386 ++++++++++--
arch/arm64/crypto/sm4-neon-core.S | 487 +++++++++++++++
arch/arm64/crypto/sm4-neon-glue.c | 442 +++++++++++++
arch/s390/crypto/chacha-glue.c | 34 +-
arch/x86/crypto/blowfish_glue.c | 8 +-
arch/x86/crypto/camellia_glue.c | 8 +-
arch/x86/crypto/serpent_avx2_glue.c | 8 +-
arch/x86/crypto/twofish_glue.c | 8 +-
arch/x86/crypto/twofish_glue_3way.c | 8 +-
crypto/Kconfig | 18 +-
crypto/Makefile | 6 +-
crypto/cryptd.c | 23 +-
crypto/crypto_engine.c | 1 +
crypto/ecrdsa.c | 8 +-
{lib/crypto => crypto}/sm3.c | 0
{lib/crypto => crypto}/sm4.c | 10 +-
crypto/testmgr.c | 75 ++-
drivers/char/hw_random/Kconfig | 15 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/cn10k-rng.c | 31 +-
drivers/char/hw_random/mpfs-rng.c | 104 ++++
drivers/char/hw_random/omap3-rom-rng.c | 2 +-
drivers/char/hw_random/optee-rng.c | 2 +-
drivers/crypto/Kconfig | 4 +-
drivers/crypto/Makefile | 1 +
.../crypto/allwinner/sun4i-ss/sun4i-ss-cipher.c | 22 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss.h | 1 +
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 102 +--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 54 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 130 ++--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 6 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 19 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 180 ++++--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 92 ++-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 385 ++++++++++--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 6 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 33 +-
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-i2c.c | 30 +-
drivers/crypto/atmel-i2c.h | 1 +
drivers/crypto/atmel-sha204a.c | 11 +-
drivers/crypto/caam/Kconfig | 8 +
drivers/crypto/caam/Makefile | 1 +
drivers/crypto/caam/caamprng.c | 235 +++++++
drivers/crypto/caam/ctrl.c | 18 +
drivers/crypto/caam/intern.h | 15 +
drivers/crypto/caam/jr.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 10 +-
drivers/crypto/ccp/psp-dev.c | 49 +-
drivers/crypto/ccp/psp-dev.h | 22 +
drivers/crypto/ccp/sev-dev.c | 32 +-
drivers/crypto/ccp/sp-pci.c | 62 ++
drivers/crypto/ccree/cc_buffer_mgr.c | 27 +-
drivers/crypto/ccree/cc_driver.c | 24 +-
drivers/crypto/hisilicon/Kconfig | 1 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 222 +++++--
drivers/crypto/hisilicon/qm.c | 282 ++++++++-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 2 -
drivers/crypto/hisilicon/sec2/sec_main.c | 108 +++-
drivers/crypto/hisilicon/sgl.c | 6 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 2 +-
drivers/crypto/hisilicon/zip/zip_main.c | 185 +++++-
drivers/crypto/inside-secure/safexcel.c | 9 +
drivers/crypto/keembay/keembay-ocs-aes-core.c | 9 +-
drivers/crypto/marvell/cesa/cipher.c | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 7 +-
drivers/crypto/qat/qat_4xxx/adf_drv.c | 8 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 15 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 4 -
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 15 +-
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.h | 4 -
drivers/crypto/qat/qat_common/Makefile | 1 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 6 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 18 +-
drivers/crypto/qat/qat_common/adf_gen2_hw_data.c | 13 +
drivers/crypto/qat/qat_common/adf_gen2_hw_data.h | 6 +
drivers/crypto/qat/qat_common/adf_gen2_pfvf.c | 78 ++-
drivers/crypto/qat/qat_common/adf_gen4_pfvf.c | 61 +-
drivers/crypto/qat/qat_common/adf_isr.c | 21 +-
drivers/crypto/qat/qat_common/adf_pfvf_msg.h | 4 +-
drivers/crypto/qat/qat_common/adf_pfvf_pf_proto.c | 6 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 16 +-
drivers/crypto/qat/qat_common/adf_transport.c | 11 +
drivers/crypto/qat/qat_common/adf_transport.h | 1 +
.../crypto/qat/qat_common/adf_transport_internal.h | 1 +
drivers/crypto/qat/qat_common/adf_vf_isr.c | 1 +
drivers/crypto/qat/qat_common/qat_algs.c | 153 +++--
drivers/crypto/qat/qat_common/qat_algs_send.c | 86 +++
drivers/crypto/qat/qat_common/qat_algs_send.h | 11 +
drivers/crypto/qat/qat_common/qat_asym_algs.c | 307 +++++----
drivers/crypto/qat/qat_common/qat_crypto.c | 10 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 44 ++
drivers/crypto/qat/qat_common/qat_hal.c | 1 +
drivers/crypto/qat/qat_common/qat_uclo.c | 3 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 126 ++--
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 4 -
drivers/crypto/sa2ul.c | 1 +
drivers/crypto/talitos.c | 10 +-
drivers/crypto/ux500/hash/hash_core.c | 4 +-
drivers/crypto/vmx/Makefile | 17 +-
include/crypto/sm4.h | 4 +
include/linux/hisi_acc_qm.h | 23 +-
lib/crypto/Kconfig | 6 -
lib/crypto/Makefile | 6 -
tools/testing/crypto/chacha20-s390/Makefile | 12 +
tools/testing/crypto/chacha20-s390/run-tests.sh | 34 +
tools/testing/crypto/chacha20-s390/test-cipher.c | 372 +++++++++++
118 files changed, 5534 insertions(+), 1058 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-driver-ccp
create mode 100644 arch/arm64/crypto/sm4-ce-cipher-core.S
create mode 100644 arch/arm64/crypto/sm4-ce-cipher-glue.c
create mode 100644 arch/arm64/crypto/sm4-neon-core.S
create mode 100644 arch/arm64/crypto/sm4-neon-glue.c
rename {lib/crypto => crypto}/sm3.c (100%)
rename {lib/crypto => crypto}/sm4.c (94%)
create mode 100644 drivers/char/hw_random/mpfs-rng.c
create mode 100644 drivers/crypto/caam/caamprng.c
create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.c
create mode 100644 drivers/crypto/qat/qat_common/qat_algs_send.h
create mode 100644 tools/testing/crypto/chacha20-s390/Makefile
create mode 100644 tools/testing/crypto/chacha20-s390/run-tests.sh
create mode 100644 tools/testing/crypto/chacha20-s390/test-cipher.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.19
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
@ 2022-05-28 1:21 ` pr-tracker-bot
2022-06-17 8:29 ` Herbert Xu
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-05-28 1:21 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 27 May 2022 19:29:02 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d075c0c1be279c5f4c6688ac0442fff6494e56bc
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.19
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
@ 2022-06-17 8:29 ` Herbert Xu
2022-06-17 15:29 ` pr-tracker-bot
2022-06-30 7:56 ` Herbert Xu
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-06-17 8:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56:
Linux 5.19-rc1 (2022-06-05 17:18:54 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p2
for you to fetch changes up to abfed87e2a12bd246047d78c01d81eb9529f1d06:
crypto: memneq - move into lib/ (2022-06-12 14:51:51 +0800)
----------------------------------------------------------------
This push fixes a potential build failure when CRYPTO=m.
----------------------------------------------------------------
Jason A. Donenfeld (1):
crypto: memneq - move into lib/
crypto/Kconfig | 1 +
crypto/Makefile | 2 +-
lib/Kconfig | 3 +++
lib/Makefile | 1 +
lib/crypto/Kconfig | 1 +
{crypto => lib}/memneq.c | 0
6 files changed, 7 insertions(+), 1 deletion(-)
rename {crypto => lib}/memneq.c (100%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.19
2022-06-17 8:29 ` Herbert Xu
@ 2022-06-17 15:29 ` pr-tracker-bot
2022-06-30 7:56 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-06-17 15:29 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 17 Jun 2022 16:29:33 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/79fe0f863f920c5fcf9dea61676742f813f0b7a6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 5.19
2022-06-17 8:29 ` Herbert Xu
2022-06-17 15:29 ` pr-tracker-bot
@ 2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-06-30 7:56 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit abfed87e2a12bd246047d78c01d81eb9529f1d06:
crypto: memneq - move into lib/ (2022-06-12 14:51:51 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p3
for you to fetch changes up to 87d044096ea62f1f230e8c4679ee8abf03266f64:
crypto: ccp - Fix device IRQ counting by using platform_irq_count() (2022-06-24 17:09:01 +0800)
----------------------------------------------------------------
This push fixes a regression that breaks the ccp driver.
----------------------------------------------------------------
Tom Lendacky (1):
crypto: ccp - Fix device IRQ counting by using platform_irq_count()
drivers/crypto/ccp/sp-platform.c | 12 ++----------
1 file changed, 2 insertions(+), 10 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 5.19
2022-06-30 7:56 ` Herbert Xu
@ 2022-06-30 17:28 ` pr-tracker-bot
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-06-30 17:28 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 30 Jun 2022 15:56:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.19-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f5da5ddf81ad0bfb91fa5e7d087e2ad96f26b7b7
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 5.20
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
2022-06-17 8:29 ` Herbert Xu
@ 2022-08-02 6:05 ` Herbert Xu
2022-08-03 0:57 ` pr-tracker-bot
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-08-02 6:05 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit f2906aa863381afb0015a9eb7fefad885d4e5a56:
Linux 5.19-rc1 (2022-06-05 17:18:54 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.20-p1
for you to fetch changes up to af5d35b83f642399c719ea9a8599a13b8a0c4167:
crypto: tcrypt - Remove the static variable initialisations to NULL (2022-07-29 18:29:18 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Make proc files report fips module name and version.
Algorithms:
- Move generic SHA1 code into lib/crypto.
- Implement Chinese Remainder Theorem for RSA.
- Remove blake2s.
- Add XCTR with x86/arm64 acceleration.
- Add POLYVAL with x86/arm64 acceleration.
- Add HCTR2.
- Add ARIA.
Drivers:
- Add support for new CCP/PSP device ID in ccp.
----------------------------------------------------------------
Alexey Khoroshilov (1):
crypto: sun8i-ss - fix infinite loop in sun8i_ss_setup_ivs()
Andre Przywara (1):
crypto: qat - replace get_current_node() with numa_node_id()
Andrew Davis (2):
crypto: sa2ul - Set the supported_algos bits individually
crypto: sa2ul - Check engine status before enabling
Bagas Sanjaya (2):
Documentation: qat: Use code block for qat sysfs example
Documentation: qat: rewrite description
Christophe JAILLET (2):
crypto: ccree - Remove a useless dma_supported() call
crypto: hisilicon/zip - Use the bitmap API to allocate bitmaps
Claudiu Beznea (2):
crypto: atmel-sha - initialize sha_dd while declaring
crypto: atmel-tdes - initialize tdes_dd while declaring
Colin Ian King (1):
crypto: x86/blowfish - remove redundant assignment to variable nytes
Dan Carpenter (2):
crypto: sun8i-ss - fix error codes in allocate_flows()
crypto: sun8i-ss - Fix error codes for dma_mapping_error()
Eric Biggers (3):
crypto: lib - move lib/sha1.c into lib/crypto/
crypto: lib - make the sha1 library optional
crypto: lib - add module license to libsha1
GUO Zihua (1):
crypto: arm64/poly1305 - fix a read out-of-bound
Giovanni Cabiddu (4):
crypto: qat - expose device state through sysfs for 4xxx
crypto: qat - change behaviour of adf_cfg_add_key_value_param()
crypto: qat - relocate and rename adf_sriov_prepare_restart()
crypto: qat - expose device config through sysfs for 4xxx
Herbert Xu (1):
crypto: vmx - Fix warning on p8_ghash_alg
Ignat Korchagin (3):
crypto: rsa - implement Chinese Remainder Theorem for faster private key operations
crypto: testmgr - populate RSA CRT parameters in RSA test vectors
crypto: testmgr - some more fixes to RSA test vectors
Jakub Kicinski (1):
crypto: caam/qi2 - switch to netif_napi_add_tx_weight()
Jason A. Donenfeld (3):
crypto: memneq - move into lib/
crypto: blake2s - remove shash module
crypto: lib/blake2s - reduce stack frame usage in self test
Jason Wang (3):
crypto: twofish - Fix comment typo
hwrng: via - Fix comment typo
crypto: tcrypt - Remove the static variable initialisations to NULL
Jiang Jian (6):
crypto: nx - drop unexpected word "the"
crypto: ux500/hash - drop unexpected word "the"
crypto: cavium - fix typos in comments
crypto: caam - drop unexpected word 'a' in comments
crypto: caam - drop unexpected word 'for' in comments
crypto: vmx - drop unexpected word 'for' in comments
Jianglei Nie (1):
crypto: hisilicon/sec - fix inconsistent argument
Jilin Yuan (1):
crypto: arm64/aes-neon - Fix typo in comment
John Allen (1):
crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak
Julia Lawall (2):
crypto: hisilicon/sec - fix typos in comment
crypto: ccp - fix typo in comment
Kai Ye (2):
crypto: hisilicon/sec - only HW V2 needs to change the BD err detection
crypto: hisilicon/sec - fix auth key size error
Liang He (2):
crypto: amcc - Hold the reference returned by of_find_compatible_node
crypto: nx - Hold the reference returned by of_find_compatible_node
Mario Limonciello (1):
crypto: ccp - Add support for new CCP/PSP device ID
Nathan Huckleberry (9):
crypto: xctr - Add XCTR support
crypto: polyval - Add POLYVAL support
crypto: hctr2 - Add HCTR2 support
crypto: x86/aesni-xctr - Add accelerated implementation of XCTR
crypto: arm64/aes-xctr - Add accelerated implementation of XCTR
crypto: arm64/aes-xctr - Improve readability of XCTR and CTR modes
crypto: x86/polyval - Add PCLMULQDQ accelerated implementation of POLYVAL
crypto: arm64/polyval - Add PMULL accelerated implementation of POLYVAL
fscrypt: Add HCTR2 support for filename encryption
Ofer Heifetz (1):
crypto: inside-secure - fix packed bit-field result descriptor
Pali Rohár (1):
crypto: inside-secure - Add missing MODULE_DEVICE_TABLE for of
Peng Wu (1):
crypto: sun8i-ss - fix a NULL vs IS_ERR() check in sun8i_ss_hashkey
Qian Cai (1):
crypto: arm64/gcm - Select AEAD for GHASH_ARM64_CE
Randy Dunlap (1):
crypto: rmd160 - fix Kconfig "its" grammar
Shijith Thotton (2):
crypto: octeontx2 - add firmware version in devlink info
crypto: octeontx2 - fix potential null pointer access
Taehee Yoo (2):
crypto: aria - Implement ARIA symmetric cipher algorithm
crypto: testmgr - add ARIA testmgr tests
Tom Lendacky (1):
crypto: ccp - During shutdown, check SEV data pointer before using
Uwe Kleine-König (9):
crypto: atmel-ecc - Remove duplicated error reporting in .remove()
crypto: atmel-aes - Drop if with an always false condition
crypto: atmel-sha - Drop if with an always false condition
crypto: atmel-tdes - Drop if with an always false condition
crypto: omap-aes - Drop if with an always false condition
crypto: omap-des - Drop if with an always false condition
crypto: omap-sham - Drop if with an always false condition
crypto: s5p-sss - Drop if with an always false condition
crypto: keembay-ocs-ecc - Drop if with an always false condition
Vladis Dronov (1):
crypto: fips - make proc files report fips module name and version
Weili Qian (4):
crypto: hisilicon/trng - fix local variable type
crypto: hisilicon/qm - add functions for releasing resources
crypto: hisilicon/qm - move alloc qm->wq to qm.c
crypto: hisilicon/qm - modify event irq processing
Yoan Picchi (1):
crypto: qat - Removes the x86 dependency on the QAT drivers
Yuan Can (1):
crypto: ccree - Add missing clk_disable_unprepare() in cc_pm_resume()
Zhengchao Shao (3):
crypto: hisilicon/sec - don't sleep when in softirq
crypto: hisilicon - Kunpeng916 crypto driver don't sleep when in softirq
crypto: hisilicon/hpre - don't use GFP_KERNEL to alloc mem during softirq
Zhou Wang (1):
MAINTAINERS: update HiSilicon ZIP and QM maintainers
lei he (1):
crypto: testmgr - fix version number of RSA tests
shaom Deng (1):
cyrpto: powerpc/aes - delete the rebundant word "block" in comments
Documentation/ABI/testing/sysfs-driver-qat | 49 +
Documentation/filesystems/fscrypt.rst | 22 +-
MAINTAINERS | 15 +-
arch/arm/crypto/Kconfig | 2 +-
arch/arm/crypto/Makefile | 4 +-
arch/arm/crypto/blake2s-shash.c | 75 -
arch/arm64/crypto/Kconfig | 10 +-
arch/arm64/crypto/Makefile | 3 +
arch/arm64/crypto/aes-glue.c | 80 +-
arch/arm64/crypto/aes-modes.S | 349 +-
arch/arm64/crypto/aes-neon.S | 2 +-
arch/arm64/crypto/poly1305-glue.c | 2 +-
arch/arm64/crypto/polyval-ce-core.S | 361 ++
arch/arm64/crypto/polyval-ce-glue.c | 191 +
arch/powerpc/crypto/aes-spe-glue.c | 2 +-
arch/x86/crypto/Makefile | 7 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 232 +-
arch/x86/crypto/aesni-intel_glue.c | 114 +-
arch/x86/crypto/blake2s-glue.c | 3 +-
arch/x86/crypto/blake2s-shash.c | 77 -
arch/x86/crypto/blowfish_glue.c | 4 +-
arch/x86/crypto/polyval-clmulni_asm.S | 321 ++
arch/x86/crypto/polyval-clmulni_glue.c | 203 +
crypto/Kconfig | 99 +-
crypto/Makefile | 7 +-
crypto/aria.c | 288 ++
crypto/blake2s_generic.c | 75 -
crypto/fips.c | 35 +-
crypto/hctr2.c | 581 +++
crypto/polyval-generic.c | 245 +
crypto/rsa.c | 78 +-
crypto/tcrypt.c | 62 +-
crypto/testmgr.c | 75 +-
crypto/testmgr.h | 4830 ++++++++++++++++++--
crypto/twofish_common.c | 2 +-
crypto/xctr.c | 191 +
drivers/char/hw_random/via-rng.c | 2 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 1 +
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 16 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 10 +-
drivers/crypto/amcc/crypto4xx_core.c | 40 +-
drivers/crypto/atmel-aes.c | 3 +-
drivers/crypto/atmel-ecc.c | 12 +-
drivers/crypto/atmel-sha.c | 5 +-
drivers/crypto/atmel-tdes.c | 5 +-
drivers/crypto/caam/caamalg_qi2.c | 7 +-
drivers/crypto/caam/caamhash_desc.c | 2 +-
drivers/crypto/caam/qi.c | 6 +-
drivers/crypto/cavium/cpt/cpt_hw_types.h | 2 +-
drivers/crypto/ccp/ccp-dev.h | 2 +-
drivers/crypto/ccp/sev-dev.c | 12 +-
drivers/crypto/ccp/sp-pci.c | 7 +
drivers/crypto/ccree/cc_driver.c | 13 +-
drivers/crypto/ccree/cc_pm.c | 2 +
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 2 +-
drivers/crypto/hisilicon/qm.c | 203 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 14 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 2 +-
drivers/crypto/hisilicon/sec/sec_drv.h | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 6 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 26 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 1 +
drivers/crypto/hisilicon/sec2/sec_main.c | 39 +-
drivers/crypto/hisilicon/trng/trng.c | 2 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 10 +-
drivers/crypto/hisilicon/zip/zip_main.c | 17 +-
drivers/crypto/inside-secure/safexcel.c | 2 +
drivers/crypto/inside-secure/safexcel.h | 18 +-
drivers/crypto/keembay/keembay-ocs-ecc.c | 2 -
.../crypto/marvell/octeontx2/otx2_cpt_devlink.c | 40 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 17 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 3 +
drivers/crypto/nx/nx-common-powernv.c | 2 +-
drivers/crypto/nx/nx-common-pseries.c | 5 +-
drivers/crypto/omap-aes.c | 4 -
drivers/crypto/omap-des.c | 4 -
drivers/crypto/omap-sham.c | 3 +-
drivers/crypto/qat/Kconfig | 14 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 1 +
drivers/crypto/qat/qat_4xxx/adf_drv.c | 6 +-
drivers/crypto/qat/qat_common/Makefile | 1 +
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 +
drivers/crypto/qat/qat_common/adf_cfg.c | 41 +-
drivers/crypto/qat/qat_common/adf_common_drv.h | 8 +-
drivers/crypto/qat/qat_common/adf_init.c | 26 +
drivers/crypto/qat/qat_common/adf_sriov.c | 28 +-
drivers/crypto/qat/qat_common/adf_sysfs.c | 191 +
drivers/crypto/qat/qat_common/qat_algs.c | 4 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 4 +-
drivers/crypto/s5p-sss.c | 3 -
drivers/crypto/sa2ul.c | 25 +-
drivers/crypto/sa2ul.h | 1 +
drivers/crypto/ux500/hash/hash_core.c | 2 +-
drivers/crypto/vmx/ghash.c | 1 +
drivers/crypto/vmx/ghashp8-ppc.pl | 2 +-
fs/crypto/fscrypt_private.h | 2 +-
fs/crypto/keysetup.c | 7 +
fs/crypto/policy.c | 14 +-
include/crypto/aria.h | 461 ++
include/crypto/internal/blake2s.h | 108 -
include/crypto/polyval.h | 22 +
include/linux/hisi_acc_qm.h | 8 +-
include/uapi/linux/fscrypt.h | 3 +-
init/Kconfig | 1 +
lib/Kconfig | 3 +
lib/Makefile | 3 +-
lib/crypto/Kconfig | 4 +
lib/crypto/Makefile | 3 +
lib/crypto/blake2s-selftest.c | 41 +
lib/crypto/blake2s.c | 37 +-
lib/{ => crypto}/sha1.c | 3 +
{crypto => lib}/memneq.c | 0
lib/mpi/mpi-add.c | 2 +-
lib/mpi/mpi-mul.c | 1 +
net/ipv6/Kconfig | 1 +
116 files changed, 9147 insertions(+), 1204 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-driver-qat
delete mode 100644 arch/arm/crypto/blake2s-shash.c
create mode 100644 arch/arm64/crypto/polyval-ce-core.S
create mode 100644 arch/arm64/crypto/polyval-ce-glue.c
delete mode 100644 arch/x86/crypto/blake2s-shash.c
create mode 100644 arch/x86/crypto/polyval-clmulni_asm.S
create mode 100644 arch/x86/crypto/polyval-clmulni_glue.c
create mode 100644 crypto/aria.c
delete mode 100644 crypto/blake2s_generic.c
create mode 100644 crypto/hctr2.c
create mode 100644 crypto/polyval-generic.c
create mode 100644 crypto/xctr.c
create mode 100644 drivers/crypto/qat/qat_common/adf_sysfs.c
create mode 100644 include/crypto/aria.h
create mode 100644 include/crypto/polyval.h
rename lib/{ => crypto}/sha1.c (98%)
rename {crypto => lib}/memneq.c (100%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 5.20
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
@ 2022-08-03 0:57 ` pr-tracker-bot
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-08-03 0:57 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 2 Aug 2022 14:05:04 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v5.20-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c2a24a7a036b3bd3a2e6c66730dfc777cae6540a
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.0
2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
@ 2022-08-31 8:55 ` Herbert Xu
2022-08-31 17:20 ` pr-tracker-bot
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2022-08-31 8:55 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 568035b01cfb107af8d2e4bd2fb9aea22cf5b868:
Linux 6.0-rc1 (2022-08-14 15:50:18 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.0-p2
for you to fetch changes up to 874b301985ef2f89b8b592ad255e03fb6fbfe605:
crypto: lib - remove unneeded selection of XOR_BLOCKS (2022-08-26 18:40:14 +0800)
----------------------------------------------------------------
This push fixes a boot performance regression due to an unnecessary
dependency on XOR_BLOCKS.
----------------------------------------------------------------
Eric Biggers (1):
crypto: lib - remove unneeded selection of XOR_BLOCKS
lib/crypto/Kconfig | 1 -
1 file changed, 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.0
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
@ 2022-08-31 17:20 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-08-31 17:20 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 31 Aug 2022 16:55:31 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.0-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2361d3841fddffdd4b495a4510c507f0b8f17061
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.1
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2022-08-03 0:57 ` pr-tracker-bot
@ 2022-10-04 8:54 ` Herbert Xu
2022-10-10 20:56 ` pr-tracker-bot
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-10-04 8:54 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 874b301985ef2f89b8b592ad255e03fb6fbfe605:
crypto: lib - remove unneeded selection of XOR_BLOCKS (2022-08-26 18:40:14 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p1
for you to fetch changes up to b411b1a0c8bddd470fc8c3457629ac25a168cba0:
crypto: aspeed - Remove redundant dev_err call (2022-09-30 13:59:13 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Feed untrusted RNGs into /dev/random.
- Allow HWRNG sleeping to be more interruptible.
- Create lib/utils module.
- Setting private keys no longer required for akcipher.
- Remove tcrypt mode=1000.
- Reorganised Kconfig entries.
Algorithms:
- Load x86/sha512 based on CPU features.
- Add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher.
Drivers:
- Add HACE crypto driver aspeed.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - add limit to linked list parsing
Damian Muszynski (2):
crypto: qat - fix DMA transfer direction
crypto: qat - use reference to structure in dma_map_single()
Dan Carpenter (2):
crypto: marvell/octeontx - prevent integer overflows
crypto: cavium - prevent integer overflow loading firmware
Dominik Brodowski (1):
hwrng: core - start hwrng kthread also for untrusted sources
Dong Chuanjian (1):
crypto: drbg - remove unnecessary (void*) conversions
Eric Biggers (3):
crypto: lib - create utils module and move __crypto_memneq into it
crypto: lib - move __crypto_xor into utils
crypto: lib - remove __HAVE_ARCH_CRYPTO_MEMNEQ
Gaosheng Cui (3):
crypto: bcm - Simplify obtain the name for cipher
crypto: aead - Remove unused inline functions from aead
crypto: scatterwalk - Remove unused inline function scatterwalk_aligned()
Giovanni Cabiddu (1):
Revert "crypto: qat - reduce size of mapped region"
Herbert Xu (7):
crypto: qcom-rng - Fix qcom_rng_of_match unused warning
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Revert "crypto: gemini - Fix error check for dma_map_sg"
Revert "crypto: allwinner - Fix dma_map_sg error check"
crypto: aspeed - Enable compile testing
crypto: aspeed - Fix sparse warnings
crypto: artpec6 - Fix printk warning on size_t/%d
Ignat Korchagin (1):
crypto: akcipher - default implementation for setting a private key
Jack Wang (6):
crypto: gemini - Fix error check for dma_map_sg
crypto: sahara - Fix error check for dma_map_sg
crypto: qce - Fix dma_map_sg error check
crypto: amlogic - Fix dma_map_sg error check
crypto: allwinner - Fix dma_map_sg error check
crypto: ccree - Fix dma_map_sg error check
Jacky Li (2):
crypto: ccp - Initialize PSP when reading psp data file failed
crypto: ccp - Fail the PSP initialization when writing psp data file failed
James Cowgill (1):
hwrng: arm-smccc-trng - fix NO_ENTROPY handling
Jarkko Sakkinen (1):
crypto: ccp - Add a quirk to firmware update
Jason A. Donenfeld (1):
hwrng: core - let sleep be interrupted when unregistering hwrng
Jason Wang (2):
crypto: cavium - Fix comment typo
crypto: api - Fix comment typo
Jean Delvare (1):
crypto: keembay-ocs - Drop obsolete dependency on COMPILE_TEST
Junchong Pan (1):
crypto: hisilicon/qm - remove unneeded data storage
Kai Ye (3):
crypto: hisilicon/qm - no judgment in the back process
crypto: hisilicon/sec - delete redundant blank lines
crypto: hisilicon/qm - fix the qos value initialization
Koba Ko (1):
crypto: ccp - Release dma channels before dmaengine unrgister
Kshitiz Varshney (1):
hwrng: imx-rngc - Moving IRQ handler registering after imx_rngc_irq_mask_clear()
Liu Shixin (1):
crypto: sun4i-ss - use DEFINE_SHOW_ATTRIBUTE to simplify sun4i_ss_debugfs
Lucas Segarra Fernandez (3):
crypto: testmgr - extend acomp tests for NULL destination buffer
crypto: testmgr - fix indentation for test_acomp() args
crypto: qat - fix default value of WDT timer
Lukas Bulwahn (2):
crypto: arm64 - revert unintended config name change for CRYPTO_SHA1_ARM64_CE
crypto: blake2s - revert unintended config addition of CRYPTO_BLAKE2S
Martin Kaiser (3):
hwrng: imx-rngc - use KBUILD_MODNAME as driver name
hwrng: imx-rngc - use devm_clk_get_enabled
hwrng: imx-rngc - use devres for hwrng registration
Neal Liu (8):
crypto: aspeed - Add HACE hash driver
dt-bindings: clock: Add AST2500/AST2600 HACE reset definition
ARM: dts: aspeed: Add HACE device controller node
dt-bindings: crypto: add documentation for aspeed hace
crypto: aspeed - add HACE crypto driver
crypto: aspeed - fix build module error
crypto: aspeed: fix format unexpected build warning
crypto: aspeed - fix build error when only CRYPTO_DEV_ASPEED is enabled
Peter Harliman Liem (3):
crypto: inside-secure - Change swab to swab32
crypto: inside_secure - Avoid dma map if size is zero
crypto: inside-secure - Replace generic aes with libaes
Robert Elliott (20):
crypto: x86/sha512 - load based on CPU features
crypto: testmgr - don't generate WARN for missing modules
crypto: tcrypt - remove mode=1000
crypto: Kconfig - move mips entries to a submenu
crypto: Kconfig - move powerpc entries to a submenu
crypto: Kconfig - move s390 entries to a submenu
crypto: Kconfig - move sparc entries to a submenu
crypto: Kconfig - move x86 entries to a submenu
crypto: Kconfig - remove AES_ARM64 ref by SA2UL
crypto: Kconfig - submenus for arm and arm64
crypto: Kconfig - sort the arm64 entries
crypto: Kconfig - sort the arm entries
crypto: Kconfig - add submenus
crypto: Kconfig - simplify public-key entries
crypto: Kconfig - simplify CRC entries
crypto: Kconfig - simplify aead entries
crypto: Kconfig - simplify hash entries
crypto: Kconfig - simplify userspace entries
crypto: Kconfig - simplify cipher entries
crypto: Kconfig - simplify compression/RNG entries
Shang XiaoJing (1):
crypto: aspeed - Remove redundant dev_err call
Srinivas Kerekare (1):
crypto: qat - add check to validate firmware images
Sun Ke (1):
crypto: aspeed - fix return value check in aspeed_hace_probe()
Taehee Yoo (3):
crypto: aria - prepare generic module for optimized implementations
crypto: aria-avx - add AES-NI/AVX/x86_64/GFNI assembler implementation of aria cipher
crypto: tcrypt - add async speed test for aria cipher
Tuo Cao (1):
crypto: artpec6 - move spin_lock_bh to spin_lock in tasklet
Weili Qian (12):
crypto: hisilicon/hpre - change return type of hpre_cluster_inqry_write()
crypto: hisilicon/qm - fix missing destroy qp_idr
crypto: hisilicon/qm - remove unneeded hardware cache write back
crypto: hisilicon/qm - check mailbox operation result
crypto: hisilicon/qm - fix missing put dfx access
crypto: hisilicon/qm - return failure if vfs_num exceeds total VFs
crypto: hisilicon/qm - get hardware features from hardware registers
crypto: hisilicon/qm - get qp num and depth from hardware registers
crypto: hisilicon/qm - add UACCE_CMD_QM_SET_QP_INFO support
crypto: hisilicon/qm - get error type from hardware registers
crypto: hisilicon/qm - support get device irq information from hardware registers
crypto: hisilicon/zip - support zip capability
Wenkai Lin (1):
crypto: hisilicon/sec - get algorithm bitmap from registers
Wolfram Sang (2):
crypto: core - move from strlcpy with unused retval to strscpy
crypto: drivers - move from strlcpy with unused retval to strscpy
Xiu Jianfeng (1):
crypto: add __init/__exit annotations to init/exit funcs
Yang Shen (2):
crypto: hisilicon/zip - optimization for performance
crypto: hisilicon/zip - some misc cleanup
Ye Weihua (1):
crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr
YueHaibing (1):
crypto: aspeed - Fix check for platform_get_irq() errors
Zhengchao Shao (1):
crypto: sahara - don't sleep when in softirq
Zhiqi Song (3):
crypto: hisilicon/hpre - support hpre capability
crypto: hisilicon/hpre - optimize registration of ecdh
crypto: hisilicon - support get algs by the capability register
Zhuo Chen (1):
crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call
lei he (1):
crypto: virtio - fix memory-leak
wangjianli (3):
crypto: n2 - fix repeated words in comments
crypto: marvell/octeontx - fix repeated words in comments
crypto: bcm - fix repeated words in comments
ye xingchen (7):
crypto: sun8i-ce - using the pm_runtime_resume_and_get to simplify the code
crypto: octeontx - Remove the unneeded result variable
crypto: nx - Remove the unneeded result variable
crypto: ccp - Remove the unneeded result variable
crypto: octeontx2 - Remove the unneeded result variable
crypto: zip - remove the unneeded result variable
crypto: marvell/octeontx - use sysfs_emit() to instead of scnprintf()
.../bindings/crypto/aspeed,ast2500-hace.yaml | 53 +
.../virt/kvm/x86/amd-memory-encryption.rst | 5 +-
MAINTAINERS | 7 +
arch/arm/Kconfig | 4 -
arch/arm/boot/dts/aspeed-g5.dtsi | 8 +
arch/arm/boot/dts/aspeed-g6.dtsi | 8 +
arch/arm/configs/exynos_defconfig | 1 -
arch/arm/configs/milbeaut_m10v_defconfig | 1 -
arch/arm/configs/multi_v7_defconfig | 1 -
arch/arm/configs/omap2plus_defconfig | 1 -
arch/arm/configs/pxa_defconfig | 1 -
arch/arm/crypto/Kconfig | 238 ++-
arch/arm64/Kconfig | 3 -
arch/arm64/configs/defconfig | 1 -
arch/arm64/crypto/Kconfig | 279 ++-
arch/mips/crypto/Kconfig | 74 +
arch/powerpc/crypto/Kconfig | 97 +
arch/s390/crypto/Kconfig | 135 ++
arch/sparc/crypto/Kconfig | 90 +
arch/x86/crypto/Kconfig | 484 +++++
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aria-aesni-avx-asm_64.S | 1303 ++++++++++++
arch/x86/crypto/aria-avx.h | 16 +
arch/x86/crypto/aria_aesni_avx_glue.c | 213 ++
arch/x86/crypto/sha512_ssse3_glue.c | 10 +
crypto/Kconfig | 2225 +++++++-------------
crypto/Makefile | 2 +-
crypto/akcipher.c | 8 +
crypto/algapi.c | 71 -
crypto/api.c | 4 +-
crypto/{aria.c => aria_generic.c} | 39 +-
crypto/async_tx/raid6test.c | 4 +-
crypto/curve25519-generic.c | 4 +-
crypto/dh.c | 4 +-
crypto/drbg.c | 12 +-
crypto/ecdh.c | 4 +-
crypto/ecdsa.c | 4 +-
crypto/essiv.c | 2 +-
crypto/rsa.c | 4 +-
crypto/sm2.c | 4 +-
crypto/tcrypt.c | 53 +-
crypto/testmgr.c | 38 +-
drivers/char/hw_random/arm_smccc_trng.c | 4 +-
drivers/char/hw_random/core.c | 55 +-
drivers/char/hw_random/imx-rngc.c | 51 +-
drivers/crypto/Kconfig | 3 +-
drivers/crypto/Makefile | 1 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 16 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 6 +-
drivers/crypto/aspeed/Kconfig | 48 +
drivers/crypto/aspeed/Makefile | 7 +
drivers/crypto/aspeed/aspeed-hace-crypto.c | 1133 ++++++++++
drivers/crypto/aspeed/aspeed-hace-hash.c | 1391 ++++++++++++
drivers/crypto/aspeed/aspeed-hace.c | 284 +++
drivers/crypto/aspeed/aspeed-hace.h | 298 +++
drivers/crypto/axis/artpec6_crypto.c | 6 +-
drivers/crypto/bcm/cipher.c | 4 +-
drivers/crypto/bcm/cipher.h | 2 +-
drivers/crypto/cavium/cpt/cpt_hw_types.h | 2 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 6 +-
drivers/crypto/cavium/zip/zip_crypto.c | 30 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 5 +-
drivers/crypto/ccp/ccp-dmaengine.c | 6 +-
drivers/crypto/ccp/sev-dev.c | 78 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 2 +-
drivers/crypto/hisilicon/hpre/hpre.h | 8 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 250 ++-
drivers/crypto/hisilicon/hpre/hpre_main.c | 216 +-
drivers/crypto/hisilicon/qm.c | 906 ++++----
drivers/crypto/hisilicon/sec2/sec.h | 34 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 456 ++--
drivers/crypto/hisilicon/sec2/sec_main.c | 160 +-
drivers/crypto/hisilicon/zip/zip.h | 3 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 134 +-
drivers/crypto/hisilicon/zip/zip_main.c | 266 ++-
drivers/crypto/inside-secure/safexcel_cipher.c | 60 +-
drivers/crypto/inside-secure/safexcel_hash.c | 67 +-
drivers/crypto/keembay/Kconfig | 4 +-
drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h | 2 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 24 +-
drivers/crypto/marvell/octeontx/otx_cptvf_main.c | 8 +-
drivers/crypto/marvell/octeontx/otx_cptvf_mbox.c | 20 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 4 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 5 +-
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/nx/nx-aes-ccm.c | 5 +-
drivers/crypto/qat/qat_common/adf_cfg.c | 6 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 10 +-
drivers/crypto/qat/qat_common/adf_gen4_hw_data.h | 2 +-
.../crypto/qat/qat_common/adf_transport_debug.c | 2 +-
drivers/crypto/qat/qat_common/icp_qat_uclo.h | 3 +-
drivers/crypto/qat/qat_common/qat_algs.c | 18 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 24 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 56 +-
drivers/crypto/qce/aead.c | 4 +-
drivers/crypto/qce/sha.c | 8 +-
drivers/crypto/qce/skcipher.c | 8 +-
drivers/crypto/qcom-rng.c | 7 +-
drivers/crypto/sahara.c | 22 +-
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 4 +
drivers/net/Kconfig | 2 -
drivers/net/wireless/ath/ath9k/rng.c | 3 +-
include/crypto/aria.h | 17 +-
include/crypto/internal/aead.h | 25 -
include/crypto/scatterwalk.h | 6 -
include/dt-bindings/clock/aspeed-clock.h | 1 +
include/dt-bindings/clock/ast2600-clock.h | 1 +
include/linux/hisi_acc_qm.h | 63 +-
include/linux/hw_random.h | 3 +
include/uapi/misc/uacce/hisi_qm.h | 17 +-
lib/Kconfig | 3 -
lib/Makefile | 1 -
lib/crypto/Kconfig | 7 +-
lib/crypto/Makefile | 3 +
lib/{ => crypto}/memneq.c | 7 +-
lib/crypto/utils.c | 88 +
117 files changed, 9052 insertions(+), 2965 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/aspeed,ast2500-hace.yaml
create mode 100644 arch/mips/crypto/Kconfig
create mode 100644 arch/powerpc/crypto/Kconfig
create mode 100644 arch/s390/crypto/Kconfig
create mode 100644 arch/sparc/crypto/Kconfig
create mode 100644 arch/x86/crypto/Kconfig
create mode 100644 arch/x86/crypto/aria-aesni-avx-asm_64.S
create mode 100644 arch/x86/crypto/aria-avx.h
create mode 100644 arch/x86/crypto/aria_aesni_avx_glue.c
rename crypto/{aria.c => aria_generic.c} (86%)
create mode 100644 drivers/crypto/aspeed/Kconfig
create mode 100644 drivers/crypto/aspeed/Makefile
create mode 100644 drivers/crypto/aspeed/aspeed-hace-crypto.c
create mode 100644 drivers/crypto/aspeed/aspeed-hace-hash.c
create mode 100644 drivers/crypto/aspeed/aspeed-hace.c
create mode 100644 drivers/crypto/aspeed/aspeed-hace.h
rename lib/{ => crypto}/memneq.c (98%)
create mode 100644 lib/crypto/utils.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.1
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
@ 2022-10-10 20:56 ` pr-tracker-bot
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-10-10 20:56 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 4 Oct 2022 16:54:25 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3604a7f568d3f67be8c13736201411ee83b210a1
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.1
2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
@ 2022-10-17 4:38 ` Herbert Xu
2022-10-17 17:51 ` pr-tracker-bot
2022-10-28 4:58 ` Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-10-17 4:38 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b411b1a0c8bddd470fc8c3457629ac25a168cba0:
crypto: aspeed - Remove redundant dev_err call (2022-09-30 13:59:13 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p2
for you to fetch changes up to 96cb9d0554457086664d3bd10630b11193d863f1:
hwrng: bcm2835 - use hwrng_msleep() instead of cpu_relax() (2022-10-14 19:03:09 +0800)
----------------------------------------------------------------
This push fixes an issue exposed by the recent change to feed
untrusted sources into /dev/random.
----------------------------------------------------------------
Jason A. Donenfeld (1):
hwrng: bcm2835 - use hwrng_msleep() instead of cpu_relax()
drivers/char/hw_random/bcm2835-rng.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
@ 2022-10-17 17:51 ` pr-tracker-bot
2022-10-28 4:58 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-10-17 17:51 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 17 Oct 2022 12:38:48 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bbb8ceb5e2421184db9560e9d2cfaf858e1db616
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.1
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2022-10-17 17:51 ` pr-tracker-bot
@ 2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2022-10-28 4:58 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 9abf2313adc1ca1b6180c508c25f22f9395cc780:
Linux 6.1-rc1 (2022-10-16 15:36:24 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p3
for you to fetch changes up to 9f6035af06b526e678808d492fc0830aef6cfbd8:
crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned (2022-10-21 19:05:05 +0800)
----------------------------------------------------------------
This push fixes an alignment crash in x86/polyval.
----------------------------------------------------------------
Nathan Huckleberry (1):
crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned
arch/x86/crypto/polyval-clmulni_glue.c | 19 ++++++++++++++-----
1 file changed, 14 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-28 4:58 ` Herbert Xu
@ 2022-10-28 17:00 ` Linus Torvalds
2022-11-02 9:49 ` Herbert Xu
2022-10-28 17:02 ` pr-tracker-bot
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2022-10-28 17:00 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Thu, Oct 27, 2022 at 9:58 PM Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> This push fixes an alignment crash in x86/polyval.
I'm surprised that there isn't a cra_ctxalignment field. Instead there
is crypto_tfm_ctx_alignment(), but that is just an odd way to write
CRYPTO_MINALIGN.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
@ 2022-10-28 17:02 ` pr-tracker-bot
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-10-28 17:02 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 28 Oct 2022 12:58:15 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.1-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/05c31d25cc9678cc173cf12e259d638e8a641f66
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.1
2022-10-28 17:00 ` Linus Torvalds
@ 2022-11-02 9:49 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2022-11-02 9:49 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, Oct 28, 2022 at 10:00:34AM -0700, Linus Torvalds wrote:
>
> I'm surprised that there isn't a cra_ctxalignment field. Instead there
> is crypto_tfm_ctx_alignment(), but that is just an odd way to write
> CRYPTO_MINALIGN.
It's a micro-optimisation to elide the align operaton because
most algorithms don't need it.
I've been meaning to add a helper for it though:
https://lore.kernel.org/all/E1noNhu-00BzV4-4N@fornost.hmeau.com/
But I got side tracked by the vacillating DMA discussion.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.2
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2022-10-10 20:56 ` pr-tracker-bot
@ 2022-12-14 8:15 ` Herbert Xu
2022-12-14 22:25 ` pr-tracker-bot
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2022-12-14 8:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 9f6035af06b526e678808d492fc0830aef6cfbd8:
crypto: x86/polyval - Fix crashes when keys are not 16-byte aligned (2022-10-21 19:05:05 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p1
for you to fetch changes up to 453de3eb08c4b7e31b3019a4b0cc3ebce51a6219:
crypto: ux500/cryp - delete driver (2022-12-09 18:45:01 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Optimise away self-test overhead when they are disabled.
- Support symmetric encryption via keyring keys in af_alg.
- Flip hwrng default_quality, the default is now maximum entropy.
Algorithms:
- Add library version of aesgcm.
- CFI fixes for assembly code.
- Add arm/arm64 accelerated versions of sm3/sm4.
Drivers:
- Remove assumption on arm64 that kmalloc is DMA-aligned.
- Fix selftest failures in rockchip.
- Add support for RK3328/RK3399 in rockchip.
- Add deflate support in qat.
- Merge ux500 into stm32.
- Add support for TEE for PCI ID 0x14CA in ccp.
- Add mt7986 support in mtk.
- Add MaxLinear platform support in inside-secure.
- Add NPCM8XX support in npcm.
----------------------------------------------------------------
Angel Iglesias (1):
i2c: core: Introduce i2c_client_get_device_id helper function
Anirudh Venkataramanan (4):
crypto: tcrypt - Use pr_cont to print test results
crypto: tcrypt - Use pr_info/pr_err
crypto: tcrypt - Drop module name from print string
crypto: tcrypt - Drop leading newlines from prints
Ard Biesheuvel (7):
crypto: move gf128mul library into lib/crypto
crypto: lib/gf128mul - make gf128mul_lle time invariant
crypto: lib/aesgcm - Provide minimal library implementation
crypto: arm64/aes-neonbs - use frame_push/pop consistently
crypto: arm64/aes-modes - use frame_push/pop macros consistently
crypto: arm64/crct10dif - use frame_push/pop macros consistently
crypto: arm64/ghash-ce - use frame_push/pop macros consistently
Christophe JAILLET (1):
crypto: amlogic - Remove kcalloc without check
Colin Ian King (1):
crypto: stm32 - Fix spelling mistake "wite" -> "write"
Corentin Labbe (32):
crypto: sun8i-ss - use dma_addr instead u32
crypto: n2 - add missing hash statesize
crypto: rockchip - use dev_err for error message about interrupt
crypto: rockchip - do not use uninitialized variable
crypto: rockchip - do not do custom power management
crypto: rockchip - fix privete/private typo
crypto: rockchip - do not store mode globally
crypto: rockchip - add fallback for cipher
crypto: rockchip - add fallback for ahash
crypto: rockchip - better handle cipher key
crypto: rockchip - remove non-aligned handling
crypto: rockchip - rework by using crypto_engine
crypto: rockchip - rewrite type
crypto: rockchip - add debugfs
crypto: rockchip - introduce PM
crypto: rockchip - handle reset also in PM
crypto: rockchip - use clk_bulk to simplify clock management
crypto: rockchip - add myself as maintainer
crypto: rockchip - use read_poll_timeout
crypto: rockchip - fix style issue
crypto: rockchip - add support for rk3328
crypto: rockchip - rename ablk functions to cipher
crypto: rockchip - rework rk_handle_req function
crypto: rockchip - use a rk_crypto_info variable instead of lot of indirection
crypto: rockchip - use the rk_crypto_info given as parameter
dt-bindings: crypto: convert rockchip-crypto to YAML
dt-bindings: crypto: rockchip: add new compatible
crypto: rockchip - store crypto_info in request context
crypto: rockchip - Check for clocks numbers and their frequencies
crypto: rockchip - rk_ahash_reg_init use crypto_info from parameter
crypto: rockchip - permit to have more than one reset
crypto: rockchip - Add support for RK3399
Daniel Jordan (2):
padata: Always leave BHs disabled when running ->parallel()
padata: Fix list iterator in padata_do_serial()
Eric Biggers (18):
crypto: api - optimize algorithm registration when self-tests disabled
crypto: algboss - optimize registration of internal algorithms
crypto: api - compile out crypto_boot_test_finished when tests disabled
crypto: kdf - skip self-test when tests disabled
crypto: kdf - silence noisy self-test
crypto: algboss - compile out test-related code when tests disabled
crypto: x86/aegis128 - fix possible crash with CFI enabled
crypto: x86/aria - fix crash with CFI enabled
crypto: x86/nhpoly1305 - eliminate unnecessary CFI wrappers
crypto: x86/sha1 - fix possible crash with CFI enabled
crypto: x86/sha256 - fix possible crash with CFI enabled
crypto: x86/sha512 - fix possible crash with CFI enabled
crypto: x86/sm3 - fix possible crash with CFI enabled
crypto: x86/sm4 - fix crash with CFI enabled
crypto: arm64/nhpoly1305 - eliminate unnecessary CFI wrapper
crypto: arm64/sm3 - fix possible crash with CFI enabled
crypto: arm/nhpoly1305 - eliminate unnecessary CFI wrapper
Revert "crypto: shash - avoid comparing pointers to exported functions under CFI"
Frederick Lawler (1):
crypto: af_alg - Support symmetric encryption via keyring keys
Gaosheng Cui (2):
crypto: ccree - Remove debugfs when platform_driver_register failed
crypto: img-hash - Fix variable dereferenced before check 'hdev->req'
Giovanni Cabiddu (12):
crypto: qat - relocate bufferlist logic
crypto: qat - rename bufferlist functions
crypto: qat - change bufferlist logic interface
crypto: qat - generalize crypto request buffers
crypto: qat - extend buffer list interface
crypto: qat - relocate backlog related structures
crypto: qat - relocate qat_algs_alloc_flags()
crypto: qat - rename and relocate GEN2 config function
crypto: qat - expose deflate through acomp api for QAT GEN2
crypto: qat - enable deflate for QAT GEN4
crypto: acomp - define max size for destination
crypto: qat - add resubmit logic for decompression
Gustavo A. R. Silva (1):
crypto: talitos - Replace zero-length arrays with DECLARE_FLEX_ARRAY() helper
Herbert Xu (34):
crypto: ixp4xx - Fix sparse warnings
crypto: cryptd - Use request context instead of stack for sub-request
crypto: skcipher - Allow sync algorithms with large request contexts
Merge branch 'i2c/client_device_id_helper-immutable' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa/linux
crypto: rsa-pkcs1pad - Use helper to set reqsize
crypto: kpp - Add helper to set reqsize
crypto: hisilicon/hpre - Use helper to set reqsize
crypto: qat - Use helper to set reqsize
crypto: caam - Use helper to set reqsize
crypto: virtio - Use helper to set reqsize
crypto: akcipher - Move reqsize into tfm
crypto: dh - Use helper to set reqsize
crypto: kpp - Move reqsize into tfm
crypto: Prepare to move crypto_tfm_ctx
crypto: api - Add crypto_tfm_ctx_dma
crypto: aead - Add ctx helpers with DMA alignment
crypto: hash - Add ctx helpers with DMA alignment
crypto: skcipher - Add ctx helpers with DMA alignment
crypto: api - Increase MAX_ALGAPI_ALIGNMASK to 127
crypto: akcipher - Add ctx helpers with DMA alignment
crypto: kpp - Add ctx helpers with DMA alignment
crypto: caam - Set DMA alignment explicitly
crypto: api - Use linux/cache.h instead of asm/cache.h
crypto: chelsio - Fix flexible struct array warning
crypto: cavium - Set DMA alignment explicitly
crypto: ccp - Set DMA alignment explicitly
crypto: ccree - Set DMA alignment explicitly
crypto: chelsio - Set DMA alignment explicitly
crypto: hisilicon/hpre - Set DMA alignment explicitly
crypto: safexcel - Set DMA alignment explicitly
crypto: keembay - Set DMA alignment explicitly
crypto: octeontx - Set DMA alignment explicitly
crypto: octeontx2 - Set DMA alignment explicitly
crypto: qce - Set DMA alignment explicitly
Jason A. Donenfeld (2):
hwrng: core - treat default_quality as a maximum and default to 1024
hwrng: u2fzero - account for high quality RNG
Joe Fradley (1):
crypto: x86/curve25519 - disable gcov
Kai Ye (8):
crypto: hisilicon/qm - increase the memory of local variables
crypto: hisilicon/qm - add pci bdf number check
crypto: hisilicon/qm - delete redundancy check
crypto: hisilicon/qm - delete redundant null assignment operations
crypto: hisilicon/qm - modify the process of regs dfx
crypto: hisilicon/qm - split a debugfs.c from qm
crypto: hisilicon/qm - the command dump process is modified
crypto: hisilicon/sec - fix spelling mistake 'ckeck' -> 'check'
Linus Walleij (4):
dt-bindings: crypto: Let STM32 define Ux500 CRYP
crypto: stm32 - enable drivers to be used on Ux500
crypto: stm32/cryp - enable for use with Ux500
crypto: ux500/cryp - delete driver
Mario Limonciello (1):
crypto: ccp - Add support for TEE for PCI ID 0x14CA
Mingming.Su (1):
hwrng: mtk - add mt7986 support
Natalia Petrova (1):
crypto: nitrox - avoid double free on error path in nitrox_sriov_init()
Nikolaus Voss (1):
crypto: caam - warn if blob_gen key is insecure
Peter Harliman Liem (3):
crypto: inside-secure - Expand soc data structure
crypto: inside-secure - Add fw_little_endian option
crypto: inside-secure - Add MaxLinear platform
Ralph Siemsen (1):
crypto: doc - use correct function name
Robert Elliott (1):
crypto: tcrypt - fix return value for multiple subtests
Shang XiaoJing (1):
crypto: omap-sham - Use pm_runtime_resume_and_get() in omap_sham_probe()
Shashank Gupta (1):
crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe
Tianjia Zhang (17):
crypto: ccm - use local variables instead of indirect references
crypto: scatterwalk - remove duplicate function declarations
crypto: arm64/sm3 - raise the priority of the CE implementation
crypto: arm64/sm3 - add NEON assembly implementation
crypto: arm64/sm4 - refactor and simplify NEON implementation
crypto: testmgr - add SM4 cts-cbc/xts/xcbc test vectors
crypto: tcrypt - add SM4 cts-cbc/xts/xcbc test
crypto: arm64/sm4 - refactor and simplify CE implementation
crypto: arm64/sm4 - simplify sm4_ce_expand_key() of CE implementation
crypto: arm64/sm4 - export reusable CE acceleration functions
crypto: arm64/sm4 - add CE implementation for CTS-CBC mode
crypto: arm64/sm4 - add CE implementation for XTS mode
crypto: arm64/sm4 - add CE implementation for cmac/xcbc/cbcmac
crypto: arm64/sm4 - add CE implementation for CCM mode
crypto: arm64/sm4 - add CE implementation for GCM mode
crypto: arm64 - Fix unused variable compilation warnings of cpu_feature
crypto: ccree,hisilicon - Fix dependencies to correct algorithm
Tomas Marek (3):
hwrng: stm32 - fix number of returned bytes on read
hwrng: stm32 - fix read of the last word
hwrng: stm32 - rename readl return value
Tomer Maimon (2):
dt-bindings: rng: nuvoton,npcm-rng: Add npcm845 compatible string
hwrng: npcm - Add NPCM8XX support
Uwe Kleine-König (3):
crypto: ccree - Make cc_debugfs_global_fini() available for module init function
crypto: atmel-ecc - Convert to i2c's .probe_new()
crypto: atmel-sha204a - Convert to i2c's .probe_new()
Wang Yufen (1):
crypto: qat - fix error return code in adf_probe
Weili Qian (5):
crypto: hisilicon/qm - fix incorrect parameters usage
crypto: hisilicon/sec - enabling clock gating of the address prefetch module
crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF
crypto: hisilicon/qm - fix 'QM_XEQ_DEPTH_CAP' mask value
crypto: hisilicon/qm - add device status check when start fails
Wenkai Lin (1):
crypto: hisilicon/sec - remove continuous blank lines
Xiongfeng Wang (3):
crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set()
hwrng: amd - Fix PCI device refcount leak
hwrng: geode - Fix PCI device refcount leak
Yang Li (1):
crypto: rockchip - Remove surplus dev_err() when using platform_get_irq()
Yicong Yang (1):
crypto: hisilicon/qm - drop unnecessary IS_ENABLE(CONFIG_NUMA) check
Yuan Can (1):
crypto: ccp - Remove unused struct ccp_crypto_cpu
Yushan Zhou (1):
crypto: marvell/octeontx - remove redundant NULL check
Zhang Yiqun (1):
crypto: tcrypt - Fix multibuffer skcipher speed test mem leak
Zhiqi Song (1):
crypto: hisilicon/hpre - fix resource leak in remove process
jianchunfu (1):
crypto: talitos - Use the defined variable to clean code
ruanjinjie (1):
crypto: ccp - Add __init/__exit annotations to module init/exit funcs
wangjianli (1):
crypto: octeontx - fix repeated words in comments
Documentation/crypto/devel-algos.rst | 2 +-
Documentation/crypto/userspace-if.rst | 15 +-
.../bindings/crypto/rockchip,rk3288-crypto.yaml | 127 ++
.../devicetree/bindings/crypto/rockchip-crypto.txt | 28 -
.../devicetree/bindings/crypto/st,stm32-cryp.yaml | 19 +
.../devicetree/bindings/rng/nuvoton,npcm-rng.yaml | 4 +-
MAINTAINERS | 7 +
arch/arm/crypto/Kconfig | 2 +-
arch/arm/crypto/aes-cipher-glue.c | 2 +-
arch/arm/crypto/nh-neon-core.S | 2 +-
arch/arm/crypto/nhpoly1305-neon-glue.c | 11 +-
arch/arm64/crypto/Kconfig | 49 +-
arch/arm64/crypto/Makefile | 9 +
arch/arm64/crypto/aes-ce-glue.c | 2 +-
arch/arm64/crypto/aes-cipher-glue.c | 2 +-
arch/arm64/crypto/aes-modes.S | 34 +-
arch/arm64/crypto/aes-neonbs-core.S | 16 +-
arch/arm64/crypto/crct10dif-ce-core.S | 5 +-
arch/arm64/crypto/ghash-ce-core.S | 8 +-
arch/arm64/crypto/ghash-ce-glue.c | 2 +-
arch/arm64/crypto/nh-neon-core.S | 5 +-
arch/arm64/crypto/nhpoly1305-neon-glue.c | 11 +-
arch/arm64/crypto/sm3-ce-glue.c | 2 +-
arch/arm64/crypto/sm3-neon-core.S | 601 ++++++++
arch/arm64/crypto/sm3-neon-glue.c | 103 ++
arch/arm64/crypto/sm4-ce-asm.h | 209 +++
arch/arm64/crypto/sm4-ce-ccm-core.S | 328 ++++
arch/arm64/crypto/sm4-ce-ccm-glue.c | 303 ++++
arch/arm64/crypto/sm4-ce-cipher-glue.c | 2 +-
arch/arm64/crypto/sm4-ce-core.S | 1205 ++++++++++-----
arch/arm64/crypto/sm4-ce-gcm-core.S | 741 +++++++++
arch/arm64/crypto/sm4-ce-gcm-glue.c | 286 ++++
arch/arm64/crypto/sm4-ce-glue.c | 575 ++++++-
arch/arm64/crypto/sm4-ce.h | 16 +
arch/arm64/crypto/sm4-neon-core.S | 630 +++++---
arch/arm64/crypto/sm4-neon-glue.c | 172 +--
arch/um/drivers/random.c | 1 -
arch/x86/crypto/Makefile | 3 +
arch/x86/crypto/aegis128-aesni-asm.S | 9 +-
arch/x86/crypto/aria-aesni-avx-asm_64.S | 13 +-
arch/x86/crypto/nh-avx2-x86_64.S | 5 +-
arch/x86/crypto/nh-sse2-x86_64.S | 5 +-
arch/x86/crypto/nhpoly1305-avx2-glue.c | 11 +-
arch/x86/crypto/nhpoly1305-sse2-glue.c | 11 +-
arch/x86/crypto/sha1_ni_asm.S | 3 +-
arch/x86/crypto/sha1_ssse3_asm.S | 3 +-
arch/x86/crypto/sha256-avx-asm.S | 3 +-
arch/x86/crypto/sha256-avx2-asm.S | 3 +-
arch/x86/crypto/sha256-ssse3-asm.S | 3 +-
arch/x86/crypto/sha256_ni_asm.S | 3 +-
arch/x86/crypto/sha512-avx-asm.S | 3 +-
arch/x86/crypto/sha512-avx2-asm.S | 3 +-
arch/x86/crypto/sha512-ssse3-asm.S | 3 +-
arch/x86/crypto/sm3-avx-asm_64.S | 3 +-
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 7 +-
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 7 +-
arch/x86/crypto/twofish_glue.c | 2 +-
crypto/Kconfig | 9 +-
crypto/Makefile | 1 -
crypto/aes_generic.c | 2 +-
crypto/aes_ti.c | 2 +-
crypto/af_alg.c | 135 +-
crypto/algapi.c | 160 +-
crypto/algboss.c | 22 +-
crypto/anubis.c | 2 +-
crypto/api.c | 11 +-
crypto/blowfish_common.c | 3 +-
crypto/blowfish_generic.c | 3 +-
crypto/camellia_generic.c | 2 +-
crypto/cast5_generic.c | 2 +-
crypto/cast6_generic.c | 2 +-
crypto/ccm.c | 2 +-
crypto/cryptd.c | 36 +-
crypto/des_generic.c | 2 +-
crypto/dh.c | 4 +-
crypto/fcrypt.c | 2 +-
crypto/internal.h | 20 +-
crypto/kdf_sp800108.c | 10 +-
crypto/khazad.c | 2 +-
crypto/rsa-pkcs1pad.c | 5 +-
crypto/seed.c | 2 +-
crypto/serpent_generic.c | 2 +-
crypto/shash.c | 27 +-
crypto/skcipher.c | 2 +-
crypto/sm4_generic.c | 2 +-
crypto/tcrypt.c | 317 ++--
crypto/tea.c | 2 +-
crypto/testmgr.c | 19 +
crypto/testmgr.h | 977 ++++++++++++
crypto/twofish_common.c | 2 +-
crypto/twofish_generic.c | 2 +-
drivers/char/hw_random/amd-rng.c | 18 +-
drivers/char/hw_random/cavium-rng-vf.c | 1 -
drivers/char/hw_random/cn10k-rng.c | 1 -
drivers/char/hw_random/core.c | 9 +-
drivers/char/hw_random/geode-rng.c | 36 +-
drivers/char/hw_random/mpfs-rng.c | 1 -
drivers/char/hw_random/mtk-rng.c | 5 +-
drivers/char/hw_random/npcm-rng.c | 15 +-
drivers/char/hw_random/s390-trng.c | 1 -
drivers/char/hw_random/stm32-rng.c | 8 +-
drivers/char/hw_random/timeriomem-rng.c | 2 -
drivers/char/hw_random/virtio-rng.c | 1 -
drivers/crypto/Kconfig | 19 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 1 -
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 2 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 1 -
drivers/crypto/amlogic/amlogic-gxl.h | 2 +-
drivers/crypto/atmel-ecc.c | 6 +-
drivers/crypto/atmel-sha204a.c | 7 +-
drivers/crypto/caam/blob_gen.c | 9 +
drivers/crypto/caam/caamalg.c | 72 +-
drivers/crypto/caam/caamalg_qi.c | 52 +-
drivers/crypto/caam/caamalg_qi2.c | 173 +--
drivers/crypto/caam/caamhash.c | 87 +-
drivers/crypto/caam/caampkc.c | 50 +-
drivers/crypto/caam/caamrng.c | 1 -
drivers/crypto/caam/regs.h | 3 +
drivers/crypto/cavium/cpt/cptvf_algs.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 12 +-
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 1 +
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 21 +-
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 12 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 20 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 29 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 17 +-
drivers/crypto/ccp/ccp-crypto-main.c | 15 +-
drivers/crypto/ccp/ccp-crypto-rsa.c | 18 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 26 +-
drivers/crypto/ccp/sp-pci.c | 11 +-
drivers/crypto/ccree/cc_aead.c | 62 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 18 +-
drivers/crypto/ccree/cc_debugfs.c | 2 +-
drivers/crypto/ccree/cc_driver.c | 10 +-
drivers/crypto/ccree/cc_hash.c | 86 +-
drivers/crypto/chelsio/Kconfig | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 49 +-
drivers/crypto/chelsio/chcr_crypto.h | 6 +-
drivers/crypto/hisilicon/Kconfig | 2 +-
drivers/crypto/hisilicon/Makefile | 2 +-
drivers/crypto/hisilicon/debugfs.c | 1147 ++++++++++++++
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 47 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 17 +-
drivers/crypto/hisilicon/qm.c | 1427 ++---------------
drivers/crypto/hisilicon/qm_common.h | 87 ++
drivers/crypto/hisilicon/sec2/sec_crypto.c | 5 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 10 +-
drivers/crypto/hisilicon/zip/zip_main.c | 7 +-
drivers/crypto/img-hash.c | 8 +-
drivers/crypto/inside-secure/safexcel.c | 69 +-
drivers/crypto/inside-secure/safexcel.h | 10 +-
drivers/crypto/inside-secure/safexcel_hash.c | 99 +-
drivers/crypto/ixp4xx_crypto.c | 10 +-
drivers/crypto/keembay/keembay-ocs-hcu-core.c | 26 +-
drivers/crypto/marvell/octeontx/otx_cpt_hw_types.h | 2 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 3 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 69 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 79 +-
drivers/crypto/n2_core.c | 6 +
drivers/crypto/nx/nx-842.h | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.c | 4 +-
drivers/crypto/qat/qat_4xxx/adf_4xxx_hw_data.h | 2 +-
drivers/crypto/qat/qat_4xxx/adf_drv.c | 146 +-
drivers/crypto/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 4 +
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 2 +-
.../crypto/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 4 +
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 2 -
drivers/crypto/qat/qat_c62x/adf_c62x_hw_data.c | 4 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 2 +-
drivers/crypto/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 4 +
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 2 -
drivers/crypto/qat/qat_common/Makefile | 8 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 14 +
drivers/crypto/qat/qat_common/adf_cfg_strings.h | 1 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 9 +-
drivers/crypto/qat/qat_common/adf_ctl_drv.c | 6 +
drivers/crypto/qat/qat_common/adf_gen2_config.c | 206 +++
drivers/crypto/qat/qat_common/adf_gen2_config.h | 10 +
drivers/crypto/qat/qat_common/adf_gen2_dc.c | 70 +
drivers/crypto/qat/qat_common/adf_gen2_dc.h | 10 +
drivers/crypto/qat/qat_common/adf_gen4_dc.c | 83 +
drivers/crypto/qat/qat_common/adf_gen4_dc.h | 10 +
drivers/crypto/qat/qat_common/adf_init.c | 11 +
drivers/crypto/qat/qat_common/adf_sriov.c | 4 +
drivers/crypto/qat/qat_common/icp_qat_fw.h | 24 +
drivers/crypto/qat/qat_common/icp_qat_fw_comp.h | 404 +++++
drivers/crypto/qat/qat_common/icp_qat_hw.h | 66 +
drivers/crypto/qat/qat_common/icp_qat_hw_20_comp.h | 164 ++
.../qat/qat_common/icp_qat_hw_20_comp_defs.h | 300 ++++
drivers/crypto/qat/qat_common/qat_algs.c | 208 +--
drivers/crypto/qat/qat_common/qat_algs_send.h | 16 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 6 +-
drivers/crypto/qat/qat_common/qat_bl.c | 383 +++++
drivers/crypto/qat/qat_common/qat_bl.h | 67 +
drivers/crypto/qat/qat_common/qat_comp_algs.c | 344 +++++
drivers/crypto/qat/qat_common/qat_comp_req.h | 123 ++
drivers/crypto/qat/qat_common/qat_compression.c | 297 ++++
drivers/crypto/qat/qat_common/qat_compression.h | 37 +
drivers/crypto/qat/qat_common/qat_crypto.c | 120 +-
drivers/crypto/qat/qat_common/qat_crypto.h | 55 +-
.../crypto/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 4 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 2 +-
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 4 +
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 2 -
drivers/crypto/qce/aead.c | 22 +-
drivers/crypto/qce/common.c | 5 +-
drivers/crypto/qce/sha.c | 18 +-
drivers/crypto/rockchip/rk3288_crypto.c | 505 +++---
drivers/crypto/rockchip/rk3288_crypto.h | 107 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 267 ++--
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 543 ++++---
drivers/crypto/stm32/Kconfig | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 417 +++--
drivers/crypto/talitos.c | 6 +-
drivers/crypto/talitos.h | 4 +-
drivers/crypto/ux500/Kconfig | 10 -
drivers/crypto/ux500/Makefile | 1 -
drivers/crypto/ux500/cryp/Makefile | 10 -
drivers/crypto/ux500/cryp/cryp.c | 394 -----
drivers/crypto/ux500/cryp/cryp.h | 315 ----
drivers/crypto/ux500/cryp/cryp_core.c | 1600 --------------------
drivers/crypto/ux500/cryp/cryp_irq.c | 45 -
drivers/crypto/ux500/cryp/cryp_irq.h | 31 -
drivers/crypto/ux500/cryp/cryp_irqp.h | 125 --
drivers/crypto/ux500/cryp/cryp_p.h | 122 --
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 5 +-
drivers/firmware/turris-mox-rwtm.c | 1 -
drivers/hid/hid-u2fzero.c | 1 -
drivers/i2c/i2c-core-base.c | 14 +
drivers/s390/crypto/zcrypt_api.c | 6 -
drivers/usb/misc/chaoskey.c | 1 -
include/crypto/acompress.h | 1 +
include/crypto/akcipher.h | 7 +-
include/crypto/algapi.h | 43 +-
include/crypto/aria.h | 2 +-
include/crypto/gcm.h | 22 +
include/crypto/internal/acompress.h | 2 +
include/crypto/internal/aead.h | 22 +
include/crypto/internal/akcipher.h | 26 +-
include/crypto/internal/hash.h | 30 +-
include/crypto/internal/kpp.h | 30 +-
include/crypto/internal/scompress.h | 3 +-
include/crypto/internal/skcipher.h | 30 +
include/crypto/kpp.h | 9 +-
include/crypto/scatterwalk.h | 1 -
include/linux/crypto.h | 5 -
include/linux/hisi_acc_qm.h | 14 +-
include/linux/hw_random.h | 2 +-
include/linux/i2c.h | 1 +
include/uapi/linux/if_alg.h | 1 +
kernel/padata.c | 15 +-
lib/crypto/Kconfig | 9 +
lib/crypto/Makefile | 5 +
lib/crypto/aesgcm.c | 727 +++++++++
{crypto => lib/crypto}/gf128mul.c | 58 +-
257 files changed, 13380 insertions(+), 7088 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/rockchip,rk3288-crypto.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/rockchip-crypto.txt
create mode 100644 arch/arm64/crypto/sm3-neon-core.S
create mode 100644 arch/arm64/crypto/sm3-neon-glue.c
create mode 100644 arch/arm64/crypto/sm4-ce-asm.h
create mode 100644 arch/arm64/crypto/sm4-ce-ccm-core.S
create mode 100644 arch/arm64/crypto/sm4-ce-ccm-glue.c
create mode 100644 arch/arm64/crypto/sm4-ce-gcm-core.S
create mode 100644 arch/arm64/crypto/sm4-ce-gcm-glue.c
create mode 100644 arch/arm64/crypto/sm4-ce.h
create mode 100644 drivers/crypto/hisilicon/debugfs.c
create mode 100644 drivers/crypto/hisilicon/qm_common.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_config.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_config.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_dc.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen2_dc.h
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_dc.c
create mode 100644 drivers/crypto/qat/qat_common/adf_gen4_dc.h
create mode 100644 drivers/crypto/qat/qat_common/icp_qat_fw_comp.h
create mode 100644 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp.h
create mode 100644 drivers/crypto/qat/qat_common/icp_qat_hw_20_comp_defs.h
create mode 100644 drivers/crypto/qat/qat_common/qat_bl.c
create mode 100644 drivers/crypto/qat/qat_common/qat_bl.h
create mode 100644 drivers/crypto/qat/qat_common/qat_comp_algs.c
create mode 100644 drivers/crypto/qat/qat_common/qat_comp_req.h
create mode 100644 drivers/crypto/qat/qat_common/qat_compression.c
create mode 100644 drivers/crypto/qat/qat_common/qat_compression.h
delete mode 100644 drivers/crypto/ux500/cryp/Makefile
delete mode 100644 drivers/crypto/ux500/cryp/cryp.c
delete mode 100644 drivers/crypto/ux500/cryp/cryp.h
delete mode 100644 drivers/crypto/ux500/cryp/cryp_core.c
delete mode 100644 drivers/crypto/ux500/cryp/cryp_irq.c
delete mode 100644 drivers/crypto/ux500/cryp/cryp_irq.h
delete mode 100644 drivers/crypto/ux500/cryp/cryp_irqp.h
delete mode 100644 drivers/crypto/ux500/cryp/cryp_p.h
create mode 100644 lib/crypto/aesgcm.c
rename {crypto => lib/crypto}/gf128mul.c (87%)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.2
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
@ 2022-12-14 22:25 ` pr-tracker-bot
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2022-12-14 22:25 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 14 Dec 2022 16:15:22 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/64e7003c6b85626a533a67c1ba938b75a3db24e6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.2
2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
2022-10-28 17:02 ` pr-tracker-bot
@ 2023-01-06 9:15 ` Herbert Xu
2023-01-06 21:19 ` pr-tracker-bot
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-01-06 9:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 1b929c02afd37871d5afb9d498426f83432e71c2:
Linux 6.2-rc1 (2022-12-25 13:41:39 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p2
for you to fetch changes up to 736f88689c6912f05d0116917910603a7ba97de7:
crypto: arm64/sm4 - fix possible crash with CFI enabled (2022-12-30 17:57:42 +0800)
----------------------------------------------------------------
This push fixes a CFI crash in arm64/sm4 as well as a regression
in the caam driver.
----------------------------------------------------------------
Nikolaus Voss (1):
crypto: caam - fix CAAM io mem access in blob_gen
Tianjia Zhang (1):
crypto: arm64/sm4 - fix possible crash with CFI enabled
arch/arm64/crypto/sm4-ce-ccm-core.S | 5 +++--
arch/arm64/crypto/sm4-ce-gcm-core.S | 5 +++--
drivers/crypto/caam/blob_gen.c | 2 +-
3 files changed, 7 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.2
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
@ 2023-01-06 21:19 ` pr-tracker-bot
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-01-06 21:19 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 6 Jan 2023 17:15:32 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.2-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/90bc52c525fdac4ed8cbf13c08c813ec2a4fc856
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.3
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
2022-12-14 22:25 ` pr-tracker-bot
@ 2023-02-20 5:22 ` Herbert Xu
2023-02-22 2:50 ` pr-tracker-bot
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-02-20 5:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 736f88689c6912f05d0116917910603a7ba97de7:
crypto: arm64/sm4 - fix possible crash with CFI enabled (2022-12-30 17:57:42 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p1
for you to fetch changes up to 8b84475318641c2b89320859332544cf187e1cbd:
crypto: x86/aria-avx - Do not use avx2 instructions (2023-02-14 13:39:33 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Use kmap_local instead of kmap_atomic.
- Change request callback to take void pointer.
- Print FIPS status in /proc/crypto (when enabled).
Algorithms:
- Add rfc4106/gcm support on arm64.
- Add ARIA AVX2/512 support on x86.
Drivers:
- Add TRNG driver for StarFive SoC.
- Delete ux500/hash driver (subsumed by stm32/hash).
- Add zlib support in qat.
- Add RSA support in aspeed.
----------------------------------------------------------------
Alexander Lobakin (1):
crypto: octeontx2 - Fix objects shared between several modules
Ard Biesheuvel (5):
crypto: scatterwalk - use kmap_local() not kmap_atomic()
crypto: skcipher - Use scatterwalk (un)map interface for dst and src buffers
crypto: arm64/gcm - add RFC4106 support
crypto: tcrypt - include larger key sizes in RFC4106 benchmark
crypto: aead - fix inaccurate documentation
Arnd Bergmann (1):
crypto: wp512 - disable kmsan checks in wp512_process_buffer()
Christophe JAILLET (1):
crypto: virtio/akcipher - Do not use GFP_ATOMIC when not needed
Danny Tsen (6):
crypto: p10-aes-gcm - Update Kconfig and Makefile
crypto: p10-aes-gcm - Glue code for AES/GCM stitched implementation
crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation
crypto: p10-aes-gcm - Supporting functions for AES
crypto: p10-aes-gcm - Supporting functions for ghash
crypto: p10-aes-gcm - A perl script to process PowerPC assembler source
David Rientjes (1):
crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2
Eric Biggers (3):
crypto: x86/ghash - fix unaligned access in ghash_setkey()
crypto: x86/ghash - use le128 instead of u128
crypto: x86/ghash - add comment and fix broken link
Giovanni Cabiddu (2):
crypto: qat - fix out-of-bounds read
crypto: qat - drop log level of msg in get_instance_node()
Gustavo A. R. Silva (1):
crypto: aspeed - Replace zero-length array with flexible-array member
Herbert Xu (77):
crypto: arm/sha1 - Fix clang function cast warnings
crypto: lib/blake2s - Split up test function to halve stack usage
lib/mpi: Fix buffer overrun when SG is too long
crypto: caam - Avoid GCC memset bug warning
crypto: sun8i-ss - Remove GFP_DMA and add DMA alignment padding
crypto: caam - Remove GFP_DMA and add DMA alignment padding
crypto: talitos - Remove GFP_DMA and add DMA alignment padding
crypto: p10-aes-gcm - Revert implementation
crypto: essiv - Handle EBUSY correctly
crypto: seqiv - Handle EBUSY correctly
crypto: cryptd - Remove unnecessary skcipher_request_zero
crypto: bcm - Use subrequest for fallback
crypto: caam - Use ahash_request_complete
crypto: xts - Handle EBUSY correctly
crypto: engine - Fix excess parameter doc warning
Revert "crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete"
crypto: img-hash - Fix sparse endianness warning
crypto: marvell/cesa - Use crypto_wait_req
hwrng: starfive - Enable compile testing
crypto: arm64/aes-ccm - Rewrite skcipher walker loop
crypto: safexcel - Use crypto_wait_req
crypto: arm64/sm4-gcm - Fix possible crash in GCM cryption
crypto: api - Add scaffolding to change completion function signature
dm: Add scaffolding to change completion function signature
net: macsec: Add scaffolding to change completion function signature
fs: ecryptfs: Use crypto_wait_req
Bluetooth: Use crypto_wait_req
net: ipv4: Add scaffolding to change completion function signature
net: ipv6: Add scaffolding to change completion function signature
tipc: Add scaffolding to change completion function signature
tls: Only use data field in crypto completion function
KEYS: DH: Use crypto_wait_req
crypto: cryptd - Use subreq for AEAD
crypto: acompress - Use crypto_request_complete
crypto: aead - Use crypto_request_complete
crypto: akcipher - Use crypto_request_complete
crypto: hash - Use crypto_request_complete
crypto: kpp - Use crypto_request_complete
crypto: skcipher - Use crypto_request_complete
crypto: engine - Use crypto_request_complete
crypto: rsa-pkcs1pad - Use akcipher_request_complete
crypto: cryptd - Use request_complete helpers
crypto: atmel - Use request_complete helpers
crypto: artpec6 - Use request_complete helpers
crypto: bcm - Use request_complete helpers
crypto: cpt - Use request_complete helpers
crypto: nitrox - Use request_complete helpers
crypto: ccp - Use request_complete helpers
crypto: chelsio - Use request_complete helpers
crypto: hifn_795x - Use request_complete helpers
crypto: hisilicon - Use request_complete helpers
crypto: img-hash - Use request_complete helpers
crypto: safexcel - Use request_complete helpers
crypto: ixp4xx - Use request_complete helpers
crypto: marvell/cesa - Use request_complete helpers
crypto: octeontx - Use request_complete helpers
crypto: octeontx2 - Use request_complete helpers
crypto: mxs-dcp - Use request_complete helpers
crypto: qat - Use request_complete helpers
crypto: qce - Use request_complete helpers
crypto: s5p-sss - Use request_complete helpers
crypto: sahara - Use request_complete helpers
crypto: talitos - Use request_complete helpers
crypto: api - Use data directly in completion function
dm: Remove completion function scaffolding
net: macsec: Remove completion function scaffolding
net: ipv4: Remove completion function scaffolding
net: ipv6: Remove completion function scaffolding
tipc: Remove completion function scaffolding
tls: Remove completion function scaffolding
crypto: api - Remove completion function scaffolding
tls: Pass rec instead of aead_req into tls_encrypt_done
crypto: ecc - Silence sparse warning
crypto: nx - Fix sparse warnings
crypto: crypto4xx - Call dma_unmap_page when done
crypto: proc - Print fips status
crypto: aspeed - Fix modular aspeed-acry
Jia Jie Ho (2):
dt-bindings: rng: Add StarFive TRNG module
hwrng: starfive - Add TRNG driver for StarFive SoC
Koba Ko (1):
crypto: ccp - Failure on re-initialization due to duplicate sysfs filename
Linus Walleij (7):
crypto: stm32 - Use accelerated readsl/writesl
dt-bindings: crypto: Let STM32 define Ux500 HASH
crypto: stm32/hash - Simplify code
crypto: stm32/hash - Use existing busy poll function
crypto: stm32/hash - Wait for idle before final CPU xmit
crypto: stm32/hash - Support Ux500 hash
crypto: ux500/hash - delete driver
Lucas Segarra Fernandez (2):
crypto: qat - extend buffer list logic interface
crypto: qat - add qat_zlib_deflate
Lukas Bulwahn (4):
crypto: ux500 - update debug config after ux500 cryp driver removal
crypto: hisilicon - remove redundant config PCI dependency for some CRYPTO_DEV_HISI configs
crypto: atmel-i2c - avoid defines prefixed with CONFIG
MAINTAINERS: repair file entry for STARFIVE TRNG DRIVER
Meadhbh (1):
Documentation: qat: change kernel version
Meadhbh Fitzpatrick (1):
crypto: qat - fix spelling mistakes from 'bufer' to 'buffer'
Neal Liu (5):
crypto: aspeed - Add ACRY RSA driver
ARM: dts: aspeed: Add ACRY/AHBC device controller node
dt-bindings: crypto: add documentation for Aspeed ACRY
dt-bindings: bus: add documentation for Aspeed AHBC
crypto: aspeed - fix type warnings
Nicolai Stange (4):
crypto: xts - restrict key lengths to approved values in FIPS mode
crypto: testmgr - disallow plain cbcmac(aes) in FIPS mode
crypto: testmgr - disallow plain ghash in FIPS mode
crypto: testmgr - allow ecdsa-nist-p256 and -p384 in FIPS mode
Peter Lafreniere (4):
crypto: x86 - exit fpu context earlier in ECB/CBC macros
crypto: x86/blowfish - Remove unused encode parameter
crypto: x86/blowfish - Convert to use ECB/CBC helpers
crypto: x86/blowfish - Eliminate use of SYM_TYPED_FUNC_START in asm
Samuel Holland (2):
dt-bindings: crypto: sun8i-ce: Add compatible for D1
crypto: sun8i-ce - Add TRNG clock to the D1 variant
Sergiu Moga (1):
crypto: atmel - Add capability case for the 0x600 SHA and AES IP versions
Taehee Yoo (8):
crypto: x86/aria - add keystream array into request ctx
crypto: x86/aria - do not use magic number offsets of aria_ctx
crypto: x86/aria - implement aria-avx2
crypto: x86/aria - implement aria-avx512
crypto: x86/aria-avx - fix build failure with old binutils
crypto: x86/aria-avx2 - fix build failure with old binutils
crypto: x86/aria-avx512 - fix build failure with old binutils
crypto: x86/aria-avx - Do not use avx2 instructions
Tianjia Zhang (1):
crypto: arm64/sm4-ccm - Rewrite skcipher walker loop
Tom Lendacky (3):
crypto: ccp - Provide MMIO register naming for documenation
crypto: ccp - Add a firmware definition for EPYC gen 4 processors
crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware
Uwe Kleine-König (1):
crypto: atmel - Drop unused id parameter from atmel_i2c_probe()
Vladis Dronov (3):
crypto: xts - drop xts_check_key()
crypto: s390/aes - drop redundant xts key check
crypto: testmgr - disallow certain DRBG hash functions in FIPS mode
Weili Qian (5):
crypto: hisilicon/qm - remove some unused defines
crypto: hisilicon/qm - use min() instead of min_t()
crypto: hisilicon/qm - change function names
crypto: hisilicon/qm - update comments to match function
crypto: hisilicon/qm - fix coding style issues
Yang Yingliang (1):
crypto: aspeed - change aspeed_acry_akcipher_algs to static
Zhang Yiqun (1):
crypto: testmgr - add diff-splits of src/dst into default cipher config
ye xingchen (1):
crypto: aspeed - Use devm_platform_get_and_ioremap_resource()
Documentation/ABI/testing/sysfs-driver-qat | 4 +-
.../bindings/bus/aspeed,ast2600-ahbc.yaml | 37 +
.../bindings/crypto/allwinner,sun8i-ce.yaml | 33 +-
.../bindings/crypto/aspeed,ast2600-acry.yaml | 49 +
.../devicetree/bindings/crypto/st,stm32-hash.yaml | 23 +-
.../bindings/rng/starfive,jh7110-trng.yaml | 55 +
MAINTAINERS | 8 +-
arch/arm/boot/dts/aspeed-g6.dtsi | 13 +
arch/arm/crypto/sha1_glue.c | 14 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 57 +-
arch/arm64/crypto/ghash-ce-glue.c | 145 +-
arch/arm64/crypto/sm4-ce-ccm-glue.c | 44 +-
arch/arm64/crypto/sm4-ce-gcm-glue.c | 51 +-
arch/s390/crypto/aes_s390.c | 4 -
arch/s390/crypto/paes_s390.c | 2 +-
arch/x86/Kconfig.assembler | 5 +
arch/x86/crypto/Kconfig | 38 +
arch/x86/crypto/Makefile | 6 +
arch/x86/crypto/aria-aesni-avx-asm_64.S | 172 +-
arch/x86/crypto/aria-aesni-avx2-asm_64.S | 1441 ++++++++++++++
arch/x86/crypto/aria-avx.h | 48 +-
arch/x86/crypto/aria-gfni-avx512-asm_64.S | 971 ++++++++++
arch/x86/crypto/aria_aesni_avx2_glue.c | 254 +++
arch/x86/crypto/aria_aesni_avx_glue.c | 49 +-
arch/x86/crypto/aria_gfni_avx512_glue.c | 250 +++
arch/x86/crypto/blowfish-x86_64-asm_64.S | 71 +-
arch/x86/crypto/blowfish_glue.c | 200 +-
arch/x86/crypto/ecb_cbc_helpers.h | 19 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 6 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 45 +-
arch/x86/kernel/asm-offsets.c | 8 +
crypto/adiantum.c | 5 +-
crypto/af_alg.c | 6 +-
crypto/ahash.c | 195 +-
crypto/api.c | 4 +-
crypto/aria_generic.c | 4 +
crypto/authenc.c | 14 +-
crypto/authencesn.c | 15 +-
crypto/ccm.c | 9 +-
crypto/chacha20poly1305.c | 40 +-
crypto/cryptd.c | 290 +--
crypto/crypto_engine.c | 8 +-
crypto/cts.c | 12 +-
crypto/dh.c | 5 +-
crypto/ecc.c | 6 +-
crypto/essiv.c | 15 +-
crypto/gcm.c | 36 +-
crypto/hctr2.c | 5 +-
crypto/lrw.c | 4 +-
crypto/pcrypt.c | 4 +-
crypto/proc.c | 6 +
crypto/rsa-pkcs1pad.c | 51 +-
crypto/seqiv.c | 7 +-
crypto/shash.c | 4 +-
crypto/skcipher.c | 22 +-
crypto/tcrypt.c | 8 +-
crypto/tcrypt.h | 2 +-
crypto/testmgr.c | 16 +-
crypto/wp512.c | 2 +-
crypto/xts.c | 20 +-
drivers/char/hw_random/Kconfig | 10 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/jh7110-trng.c | 393 ++++
drivers/crypto/Kconfig | 10 -
drivers/crypto/Makefile | 1 -
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 1 +
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 2 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 4 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 13 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 4 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-prng.c | 11 +-
drivers/crypto/amcc/crypto4xx_core.c | 10 +-
drivers/crypto/aspeed/Kconfig | 11 +
drivers/crypto/aspeed/Makefile | 4 +
drivers/crypto/aspeed/aspeed-acry.c | 828 +++++++++
drivers/crypto/aspeed/aspeed-hace.c | 5 +-
drivers/crypto/aspeed/aspeed-hace.h | 2 +-
drivers/crypto/atmel-aes.c | 7 +-
drivers/crypto/atmel-ecc.c | 3 +-
drivers/crypto/atmel-i2c.c | 4 +-
drivers/crypto/atmel-i2c.h | 4 +-
drivers/crypto/atmel-sha.c | 10 +-
drivers/crypto/atmel-sha204a.c | 3 +-
drivers/crypto/atmel-tdes.c | 4 +-
drivers/crypto/axis/artpec6_crypto.c | 14 +-
drivers/crypto/bcm/cipher.c | 102 +-
drivers/crypto/bcm/cipher.h | 7 +-
drivers/crypto/caam/blob_gen.c | 2 +-
drivers/crypto/caam/caamalg.c | 16 +-
drivers/crypto/caam/caamalg_qi.c | 16 +-
drivers/crypto/caam/caamalg_qi2.c | 56 +-
drivers/crypto/caam/caamalg_qi2.h | 10 +-
drivers/crypto/caam/caamhash.c | 18 +-
drivers/crypto/caam/caampkc.c | 31 +-
drivers/crypto/caam/caamprng.c | 12 +-
drivers/crypto/caam/caamrng.c | 11 +-
drivers/crypto/caam/ctrl.c | 4 +-
drivers/crypto/caam/desc_constr.h | 3 +-
drivers/crypto/caam/key_gen.c | 2 +-
drivers/crypto/caam/qi.c | 4 +-
drivers/crypto/caam/qi.h | 12 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 10 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 8 +-
drivers/crypto/ccp/ccp-crypto-main.c | 12 +-
drivers/crypto/ccp/ccp-dmaengine.c | 21 +-
drivers/crypto/ccp/sev-dev.c | 16 +-
drivers/crypto/ccp/sp-pci.c | 46 +-
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 6 +-
drivers/crypto/hifn_795x.c | 4 +-
drivers/crypto/hisilicon/Kconfig | 8 +-
drivers/crypto/hisilicon/qm.c | 54 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 6 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 10 +-
drivers/crypto/hisilicon/sgl.c | 1 -
drivers/crypto/img-hash.c | 12 +-
drivers/crypto/inside-secure/safexcel.c | 15 +-
drivers/crypto/inside-secure/safexcel.h | 6 -
drivers/crypto/inside-secure/safexcel_cipher.c | 21 +-
drivers/crypto/inside-secure/safexcel_hash.c | 54 +-
drivers/crypto/ixp4xx_crypto.c | 4 +-
drivers/crypto/marvell/cesa/cesa.c | 4 +-
drivers/crypto/marvell/cesa/hash.c | 41 +-
drivers/crypto/marvell/cesa/tdma.c | 2 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 6 +-
drivers/crypto/marvell/octeontx2/Makefile | 11 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 9 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.h | 2 -
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 2 -
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 14 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 11 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 2 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 6 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 2 +
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/nx/nx-common-powernv.c | 13 +-
drivers/crypto/nx/nx-common-pseries.c | 6 +-
.../qat/qat_common/adf_transport_access_macros.h | 2 +-
drivers/crypto/qat/qat_common/qat_algs.c | 6 +-
drivers/crypto/qat/qat_common/qat_algs_send.c | 3 +-
drivers/crypto/qat/qat_common/qat_bl.c | 115 +-
drivers/crypto/qat/qat_common/qat_bl.h | 4 +-
drivers/crypto/qat/qat_common/qat_comp_algs.c | 169 +-
drivers/crypto/qat/qat_common/qat_compression.c | 2 +-
drivers/crypto/qat/qat_common/qat_crypto.c | 2 +-
drivers/crypto/qce/core.c | 4 +-
drivers/crypto/s5p-sss.c | 8 +-
drivers/crypto/sahara.c | 4 +-
drivers/crypto/stm32/stm32-cryp.c | 37 +-
drivers/crypto/stm32/stm32-hash.c | 266 ++-
drivers/crypto/talitos.c | 6 +-
drivers/crypto/ux500/Kconfig | 22 -
drivers/crypto/ux500/Makefile | 7 -
drivers/crypto/ux500/hash/Makefile | 11 -
drivers/crypto/ux500/hash/hash_alg.h | 398 ----
drivers/crypto/ux500/hash/hash_core.c | 1966 --------------------
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 2 +-
drivers/md/dm-crypt.c | 8 +-
drivers/md/dm-integrity.c | 4 +-
drivers/net/macsec.c | 8 +-
fs/ecryptfs/crypto.c | 30 +-
include/crypto/aead.h | 20 +-
include/crypto/algapi.h | 6 +
include/crypto/if_alg.h | 4 +-
include/crypto/internal/acompress.h | 2 +-
include/crypto/internal/aead.h | 2 +-
include/crypto/internal/akcipher.h | 2 +-
include/crypto/internal/hash.h | 2 +-
include/crypto/internal/kpp.h | 2 +-
include/crypto/internal/skcipher.h | 2 +-
include/crypto/scatterwalk.h | 4 +-
include/crypto/xts.h | 25 +-
include/linux/crypto.h | 4 +-
include/linux/hisi_acc_qm.h | 5 +-
lib/crypto/blake2s-selftest.c | 25 +-
lib/mpi/mpicoder.c | 3 +-
net/bluetooth/ecdh_helper.c | 37 +-
net/ipv4/ah4.c | 8 +-
net/ipv4/esp4.c | 20 +-
net/ipv6/ah6.c | 8 +-
net/ipv6/esp6.c | 20 +-
net/tipc/crypto.c | 12 +-
net/tls/tls.h | 2 +
net/tls/tls_sw.c | 42 +-
security/keys/dh.c | 30 +-
186 files changed, 6379 insertions(+), 4053 deletions(-)
create mode 100644 Documentation/devicetree/bindings/bus/aspeed,ast2600-ahbc.yaml
create mode 100644 Documentation/devicetree/bindings/crypto/aspeed,ast2600-acry.yaml
create mode 100644 Documentation/devicetree/bindings/rng/starfive,jh7110-trng.yaml
create mode 100644 arch/x86/crypto/aria-aesni-avx2-asm_64.S
create mode 100644 arch/x86/crypto/aria-gfni-avx512-asm_64.S
create mode 100644 arch/x86/crypto/aria_aesni_avx2_glue.c
create mode 100644 arch/x86/crypto/aria_gfni_avx512_glue.c
create mode 100644 drivers/char/hw_random/jh7110-trng.c
create mode 100644 drivers/crypto/aspeed/aspeed-acry.c
delete mode 100644 drivers/crypto/ux500/Kconfig
delete mode 100644 drivers/crypto/ux500/Makefile
delete mode 100644 drivers/crypto/ux500/hash/Makefile
delete mode 100644 drivers/crypto/ux500/hash/hash_alg.h
delete mode 100644 drivers/crypto/ux500/hash/hash_core.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.3
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
@ 2023-02-22 2:50 ` pr-tracker-bot
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-02-22 2:50 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 20 Feb 2023 13:22:32 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/36289a03bcd3aabdf66de75cb6d1b4ee15726438
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.3
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2023-01-06 21:19 ` pr-tracker-bot
@ 2023-03-05 10:15 ` Herbert Xu
2023-03-05 19:37 ` pr-tracker-bot
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-03-05 10:15 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 8b84475318641c2b89320859332544cf187e1cbd:
crypto: x86/aria-avx - Do not use avx2 instructions (2023-02-14 13:39:33 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p2
for you to fetch changes up to 660ca9470f9c613fa2c71a123a9469c80a697ee4:
crypto: caam - Fix edesc/iv ordering mixup (2023-02-28 16:30:58 +0800)
----------------------------------------------------------------
This push fixes a regression in the caam driver.
----------------------------------------------------------------
Herbert Xu (1):
crypto: caam - Fix edesc/iv ordering mixup
drivers/crypto/caam/caamalg.c | 26 +++++++++++++++++++-------
drivers/crypto/caam/caamalg_qi.c | 40 ++++++++++++++++++++++++++--------------
drivers/crypto/caam/qi.c | 10 ++++++++--
3 files changed, 53 insertions(+), 23 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.3
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
@ 2023-03-05 19:37 ` pr-tracker-bot
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-03-05 19:37 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sun, 5 Mar 2023 18:15:19 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.3-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f915322fe014c5c515119381e886faf07b3c9d31
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.4
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
2023-02-22 2:50 ` pr-tracker-bot
@ 2023-04-24 4:52 ` Herbert Xu
2023-04-26 17:06 ` pr-tracker-bot
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-04-24 4:52 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit fe15c26ee26efa11741a7b632e9f23b01aca4cc6:
Linux 6.3-rc1 (2023-03-05 14:52:03 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p1
for you to fetch changes up to 482c84e906e535072c55395acabd3a58e9443d12:
i2c: designware: Add doorbell support for Mendocino (2023-04-20 18:20:05 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Total usage stats now include all that returned error (instead of some).
- Remove maximum hash statesize limit.
- Add cloning support for hmac and unkeyed hashes.
- Demote BUG_ON in crypto_unregister_alg to a WARN_ON.
Algorithms:
- Use RIP-relative addressing on x86 to prepare for PIE build.
- Add accelerated AES/GCM stitched implementation on powerpc P10.
- Add some test vectors for cmac(camellia).
- Remove failure case where jent is unavailable outside of FIPS mode in drbg.
- Add permanent and intermittent health error checks in jitter RNG.
Drivers:
- Add support for 402xx devices in qat.
- Add support for HiSTB TRNG.
- Fix hash concurrency issues in stm32.
- Add OP-TEE firmware support in caam.
----------------------------------------------------------------
Anthony Yznaga (1):
padata: use alignment when calculating the number of worker threads
Ard Biesheuvel (13):
crypto: x86/aegis128 - Use RIP-relative addressing
crypto: x86/aesni - Use RIP-relative addressing
crypto: x86/aria - Use RIP-relative addressing
crypto: x86/camellia - Use RIP-relative addressing
crypto: x86/cast5 - Use RIP-relative addressing
crypto: x86/cast6 - Use RIP-relative addressing
crypto: x86/crc32c - Use RIP-relative addressing
crypto: x86/des3 - Use RIP-relative addressing
crypto: x86/ghash - Use RIP-relative addressing
crypto: x86/sha256 - Use RIP-relative addressing
crypto: x86/aesni - Use local .L symbols for code
crypto: x86/crc32 - Use local .L symbols for code
crypto: x86/sha - Use local .L symbols for code
Arnd Bergmann (1):
crypto: ixp4xx - fix building wiht 64-bit dma_addr_t
Bhupesh Sharma (4):
dt-bindings: qcom-qce: Convert bindings to yaml
MAINTAINERS: Add qcom-qce dt-binding file to QUALCOMM CRYPTO DRIVERS section
dt-bindings: qcom-qce: Add 'interconnects' and 'interconnect-names'
dt-bindings: qcom-qce: Add 'iommus' to optional properties
Bjorn Helgaas (6):
crypto: qat - drop redundant adf_enable_aer()
crypto: cavium/nitrox - remove unnecessary aer.h include
crypto: hisilicon/hpre - remove unnecessary aer.h include
crypto: hisilicon/qm - remove unnecessary aer.h include
crypto: hisilicon/sec - remove unnecessary aer.h include
crypto: hisilicon/zip - remove unnecessary aer.h include
Christophe JAILLET (2):
crypto: caam - Clear some memory in instantiate_rng
crypto: mxs-dcp - Use the devm_clk_get_optional_enabled() helper
Damian Muszynski (1):
crypto: qat - add support for 402xx devices
Danny Tsen (8):
crypto: p10-aes-gcm - Glue code for AES/GCM stitched implementation
crypto: p10-aes-gcm - An accelerated AES/GCM stitched implementation
crypto: p10-aes-gcm - Supporting functions for AES
crypto: p10-aes-gcm - Supporting functions for ghash
crypto: p10-aes-gcm - A perl script to process PowerPC assembler source.
crypto: p10-aes-gcm - Update Kconfig and Makefile
crypto: p10-aes-gcm - Remove POWER10_CPU dependency
powerpc: Move Power10 feature PPC_MODULE_FEATURE_P10
David Howells (1):
crypto: testmgr - Add some test vectors for cmac(camellia)
David Yang (1):
crypto: hisilicon/trng - add support for HiSTB TRNG
Eric Biggers (2):
crypto: arm64/aes-neonbs - fix crash with CFI enabled
crypto: testmgr - fix RNG performance in fuzz tests
Gaurav Jain (1):
crypto: caam/jr - add .shutdown hook
Heiner Kallweit (3):
hwrng: meson - remove unused member of struct meson_rng_data
hwrng: meson - use devm_clk_get_optional_enabled
hwrng: meson - remove not needed call to platform_set_drvdata
Herbert Xu (34):
crypto: acomp - Be more careful with request flags
crypto: qat - Include algapi.h for low-level Crypto API
crypto: algapi - Move stat reporting into algapi
crypto: aead - Count error stats differently
crypto: akcipher - Count error stats differently
crypto: hash - Count error stats differently
crypto: acomp - Count error stats differently
crypto: kpp - Count error stats differently
crypto: skcipher - Count error stats differently
crypto: rng - Count error stats differently
crypto: api - Move MODULE_ALIAS_CRYPTO to algapi.h
crypto: api - Check CRYPTO_USER instead of NET for report
crypto: stm32 - Save 54 CSR registers
crypto: stm32 - Move polling into do_one_request
crypto: stm32 - Simplify finup
crypto: stm32 - Remove unused hdev->err field
crypto: stm32 - Move hash state into separate structure
crypto: stm32 - Remove unused HASH_FLAGS_ERRORS
crypto: stm32 - Fix empty message processing
crypto: stm32 - Save and restore between each request
crypto: hash - Fix kdoc errors about HASH_ALG_COMMON
crypto: ccree - Depend on HAS_IOMEM
crypto: lib/utils - Move utilities into new header
crypto: drbg - Only fail when jent is unavailable in FIPS mode
crypto: algif_hash - Allocate hash state with kmalloc
crypto: hash - Remove maximum statesize limit
crypto: ixp4xx - Do not check word size when compile testing
crypto: api - Move low-level functions into algapi.h
crypto: api - Add crypto_tfm_get
crypto: api - Add crypto_clone_tfm
crypto: hash - Add crypto_clone_ahash/shash
crypto: hmac - Add support for cloning
crypto: cryptd - Convert hash to use modern init_tfm/exit_tfm
crypto: cryptd - Add support for cloning hashes
Horia GeantA (2):
crypto: caam - reduce page 0 regs access to minimum
crypto: caam - OP-TEE firmware support
Horia Geanta (1):
drivers: crypto: caam/jr - Allow quiesce when quiesced
Jeremi Piotrowski (1):
crypto: ccp - Clear PSP interrupt status register before calling handler
Jonathan McDowell (2):
crypto: safexcel - Raise firmware load failure message to error
crypto: safexcel - Cleanup ring IRQ workqueues on load failure
Krzysztof Kozlowski (2):
crypto: atmel-sha204a - Mark OF related data as maybe unused
crypto: img-hash - Fix img_hash_match unused warning
Luis Chamberlain (1):
crypto: fips - simplify one-level sysctl registration for crypto_sysctl_table
Mario Limonciello (13):
crypto: ccp - Drop TEE support for IRQ handler
crypto: ccp - Add a header for multiple drivers to use `__psp_pa`
crypto: ccp - Move some PSP mailbox bit definitions into common header
crypto: ccp - Add support for an interface for platform features
crypto: ccp - Enable platform access interface on client PSP parts
crypto: ccp - Add support for ringing a platform doorbell
crypto: ccp - Don't initialize CCP for PSP 0x1649
crypto: ccp - Drop extra doorbell checks
crypto: ccp - Bump up doorbell debug message to error
crypto: ccp - Return doorbell status code as an argument
crypto: ccp - Use lower 8 bytes to communicate with doorbell command register
i2c: designware: Use PCI PSP driver for communication
i2c: designware: Add doorbell support for Mendocino
Neal Liu (2):
crypto: aspeed - add error handling if dmam_alloc_coherent() failed
crypto: aspeed - fix uninitialized symbol 'idx' warning
Randy Dunlap (1):
async_tx: fix kernel-doc notation warnings
Ryan Wanner (4):
crypto: atmel-sha - Add zero length message digest support for hmac
crypto: atmel-tdes - Detecting in-place operations with two sg lists
crypto: atmel-aes - Detecting in-place operations two sg lists
crypto: atmel-aes - Match cfb block size with generic implementation
Shashank Gupta (6):
crypto: qat - delay sysfs initialization
crypto: qat - fix concurrency issue when device state changes
crypto: qat - replace state machine calls
crypto: qat - refactor device restart logic
crypto: qat - make state machine functions static
crypto: qat - fix apply custom thread-service mapping for dc service
Stephan Müller (1):
crypto: jitter - permanent and intermittent health errors
Suman Anna (1):
crypto: sa2ul - Select CRYPTO_DES
Thara Gopinath (2):
crypto: qce - Add support to initialize interconnect path
crypto: qce - Make clocks optional
Thomas Weißschuh (1):
padata: Make kobj_type structure constant
Toke Høiland-Jørgensen (1):
crypto: api - Demote BUG_ON() in crypto_unregister_alg() to a WARN_ON()
Tom Zanussi (3):
crypto: keembay - Move driver to drivers/crypto/intel/keembay
crypto: ixp4xx - Move driver to drivers/crypto/intel/ixp4xx
crypto: qat - Move driver to drivers/crypto/intel/qat
Uwe Kleine-König (4):
hwrng: xgene - Simplify using dev_err_probe()
hwrng: xgene - Simplify using devm_clk_get_optional_enabled()
hwrng: xgene - Improve error reporting for problems during .remove()
crypto: keembay - Drop if with an always false condition
Vladimir Zapolskiy (4):
dt-bindings: qcom-qce: Add new SoC compatible strings for Qualcomm QCE IP
dt-bindings: qcom-qce: document optional clocks and clock-names properties
arm64: dts: qcom: sm8550: add QCE IP family compatible values
crypto: qce - Add a QCE IP family compatible 'qcom,qce'
Yang Li (4):
crypto: aspeed - Use devm_platform_ioremap_resource()
crypto: ccree - Use devm_platform_get_and_ioremap_resource()
crypto: img-hash - Use devm_platform_get_and_ioremap_resource()
crypto: stm32 - Use devm_platform_get_and_ioremap_resource()
Ye Xingchen (1):
crypto: p10-aes-gcm - remove duplicate include header
Yu Zhe (4):
hwrng: xgene - remove unnecessary (void*) conversions
crypto: crypto4xx - remove unnecessary (void*) conversions
crypto: drivers - remove unnecessary (void*) conversions
crypto: caam - remove unnecessary (void*) conversions
.../devicetree/bindings/crypto/qcom-qce.txt | 25 -
.../devicetree/bindings/crypto/qcom-qce.yaml | 123 ++
MAINTAINERS | 33 +-
arch/arm64/boot/dts/qcom/sm8550.dtsi | 2 +-
arch/arm64/crypto/aes-neonbs-core.S | 9 +-
arch/powerpc/crypto/Kconfig | 17 +
arch/powerpc/crypto/Makefile | 13 +
arch/powerpc/crypto/aes-gcm-p10-glue.c | 343 +++++
arch/powerpc/crypto/aes-gcm-p10.S | 1521 ++++++++++++++++++++
arch/powerpc/crypto/aesp8-ppc.pl | 585 ++++++++
arch/powerpc/crypto/ghashp8-ppc.pl | 370 +++++
arch/powerpc/crypto/ppc-xlate.pl | 229 +++
arch/powerpc/include/asm/cpufeature.h | 1 +
arch/x86/crypto/aegis128-aesni-asm.S | 6 +-
arch/x86/crypto/aesni-intel_asm.S | 198 +--
arch/x86/crypto/aesni-intel_avx-x86_64.S | 254 ++--
arch/x86/crypto/aria-aesni-avx-asm_64.S | 28 +-
arch/x86/crypto/aria-aesni-avx2-asm_64.S | 28 +-
arch/x86/crypto/aria-gfni-avx512-asm_64.S | 24 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 30 +-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 30 +-
arch/x86/crypto/camellia-x86_64-asm_64.S | 6 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 38 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 32 +-
arch/x86/crypto/crc32-pclmul_asm.S | 16 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 70 +-
arch/x86/crypto/des3_ede-asm_64.S | 96 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 4 +-
arch/x86/crypto/sha1_avx2_x86_64_asm.S | 25 +-
arch/x86/crypto/sha256-avx-asm.S | 16 +-
arch/x86/crypto/sha256-avx2-asm.S | 54 +-
arch/x86/crypto/sha256-ssse3-asm.S | 16 +-
arch/x86/crypto/sha512-avx-asm.S | 8 +-
arch/x86/crypto/sha512-avx2-asm.S | 16 +-
arch/x86/crypto/sha512-ssse3-asm.S | 8 +-
arch/x86/kvm/svm/sev.c | 1 +
crypto/acompress.c | 81 +-
crypto/aead.c | 98 +-
crypto/ahash.c | 144 +-
crypto/akcipher.c | 52 +-
crypto/algapi.c | 219 +--
crypto/algif_hash.c | 19 +-
crypto/api.c | 63 +-
crypto/async_tx/async_pq.c | 10 +-
crypto/async_tx/async_tx.c | 4 +-
crypto/compress.h | 26 +
crypto/cryptd.c | 34 +-
crypto/crypto_user_stat.c | 183 +--
crypto/drbg.c | 2 +-
crypto/fips.c | 11 +-
crypto/hash.h | 40 +
crypto/hmac.c | 15 +
crypto/internal.h | 10 +
crypto/jitterentropy-kcapi.c | 51 +-
crypto/jitterentropy.c | 144 +-
crypto/jitterentropy.h | 1 -
crypto/kpp.c | 53 +-
crypto/rng.c | 65 +-
crypto/scompress.c | 39 +-
crypto/shash.c | 181 ++-
crypto/skcipher.c | 113 +-
crypto/tcrypt.c | 11 +-
crypto/testmgr.c | 272 ++--
crypto/testmgr.h | 47 +
drivers/char/hw_random/meson-rng.c | 29 +-
drivers/char/hw_random/xgene-rng.c | 46 +-
drivers/crypto/Kconfig | 21 +-
drivers/crypto/Makefile | 4 +-
drivers/crypto/amcc/crypto4xx_core.c | 2 +-
drivers/crypto/aspeed/aspeed-acry.c | 14 +-
drivers/crypto/atmel-aes.c | 16 +-
drivers/crypto/atmel-sha.c | 34 +-
drivers/crypto/atmel-sha204a.c | 2 +-
drivers/crypto/atmel-tdes.c | 15 +-
drivers/crypto/caam/caamalg.c | 21 +-
drivers/crypto/caam/caamhash.c | 10 +-
drivers/crypto/caam/caampkc.c | 6 +-
drivers/crypto/caam/caamrng.c | 6 +-
drivers/crypto/caam/ctrl.c | 112 +-
drivers/crypto/caam/debugfs.c | 12 +-
drivers/crypto/caam/debugfs.h | 7 +-
drivers/crypto/caam/dpseci-debugfs.c | 2 +-
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/jr.c | 61 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 1 -
drivers/crypto/ccp/Makefile | 3 +-
drivers/crypto/ccp/platform-access.c | 215 +++
drivers/crypto/ccp/platform-access.h | 35 +
drivers/crypto/ccp/psp-dev.c | 38 +-
drivers/crypto/ccp/psp-dev.h | 11 +-
drivers/crypto/ccp/sev-dev.c | 16 +-
drivers/crypto/ccp/sev-dev.h | 2 +-
drivers/crypto/ccp/sp-dev.h | 10 +
drivers/crypto/ccp/sp-pci.c | 11 +-
drivers/crypto/ccp/tee-dev.c | 17 +-
drivers/crypto/ccree/cc_driver.c | 4 +-
drivers/crypto/hifn_795x.c | 24 +-
drivers/crypto/hisilicon/Kconfig | 7 +
drivers/crypto/hisilicon/Makefile | 2 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 1 -
drivers/crypto/hisilicon/qm.c | 1 -
drivers/crypto/hisilicon/sec2/sec_main.c | 1 -
drivers/crypto/hisilicon/trng/Makefile | 3 +
drivers/crypto/hisilicon/trng/trng-stb.c | 176 +++
drivers/crypto/hisilicon/zip/zip_main.c | 1 -
drivers/crypto/img-hash.c | 7 +-
drivers/crypto/inside-secure/safexcel.c | 39 +-
drivers/crypto/intel/Kconfig | 5 +
drivers/crypto/intel/Makefile | 5 +
drivers/crypto/intel/ixp4xx/Kconfig | 14 +
drivers/crypto/intel/ixp4xx/Makefile | 2 +
drivers/crypto/{ => intel/ixp4xx}/ixp4xx_crypto.c | 15 +-
drivers/crypto/{ => intel}/keembay/Kconfig | 0
drivers/crypto/{ => intel}/keembay/Makefile | 0
.../{ => intel}/keembay/keembay-ocs-aes-core.c | 2 -
.../crypto/{ => intel}/keembay/keembay-ocs-ecc.c | 0
.../{ => intel}/keembay/keembay-ocs-hcu-core.c | 0
drivers/crypto/{ => intel}/keembay/ocs-aes.c | 0
drivers/crypto/{ => intel}/keembay/ocs-aes.h | 0
drivers/crypto/{ => intel}/keembay/ocs-hcu.c | 0
drivers/crypto/{ => intel}/keembay/ocs-hcu.h | 0
drivers/crypto/{ => intel}/qat/Kconfig | 0
drivers/crypto/{ => intel}/qat/Makefile | 0
drivers/crypto/{ => intel}/qat/qat_4xxx/Makefile | 0
.../{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.c | 62 +-
.../{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.h | 9 +-
drivers/crypto/{ => intel}/qat/qat_4xxx/adf_drv.c | 31 +-
drivers/crypto/{ => intel}/qat/qat_c3xxx/Makefile | 0
.../{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 2 +-
.../{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 0
drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_drv.c | 24 +-
.../crypto/{ => intel}/qat/qat_c3xxxvf/Makefile | 0
.../qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 0
.../qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h | 0
.../crypto/{ => intel}/qat/qat_c3xxxvf/adf_drv.c | 13 +-
drivers/crypto/{ => intel}/qat/qat_c62x/Makefile | 0
.../{ => intel}/qat/qat_c62x/adf_c62x_hw_data.c | 2 +-
.../{ => intel}/qat/qat_c62x/adf_c62x_hw_data.h | 0
drivers/crypto/{ => intel}/qat/qat_c62x/adf_drv.c | 24 +-
drivers/crypto/{ => intel}/qat/qat_c62xvf/Makefile | 0
.../qat/qat_c62xvf/adf_c62xvf_hw_data.c | 0
.../qat/qat_c62xvf/adf_c62xvf_hw_data.h | 0
.../crypto/{ => intel}/qat/qat_c62xvf/adf_drv.c | 13 +-
drivers/crypto/{ => intel}/qat/qat_common/Makefile | 0
.../{ => intel}/qat/qat_common/adf_accel_devices.h | 5 +-
.../{ => intel}/qat/qat_common/adf_accel_engine.c | 0
.../crypto/{ => intel}/qat/qat_common/adf_admin.c | 0
.../crypto/{ => intel}/qat/qat_common/adf_aer.c | 39 +-
.../crypto/{ => intel}/qat/qat_common/adf_cfg.c | 0
.../crypto/{ => intel}/qat/qat_common/adf_cfg.h | 0
.../{ => intel}/qat/qat_common/adf_cfg_common.h | 0
.../{ => intel}/qat/qat_common/adf_cfg_strings.h | 0
.../{ => intel}/qat/qat_common/adf_cfg_user.h | 0
.../{ => intel}/qat/qat_common/adf_common_drv.h | 10 +-
.../{ => intel}/qat/qat_common/adf_ctl_drv.c | 30 +-
.../{ => intel}/qat/qat_common/adf_dev_mgr.c | 2 +
.../{ => intel}/qat/qat_common/adf_gen2_config.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_config.h | 0
.../{ => intel}/qat/qat_common/adf_gen2_dc.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_dc.h | 0
.../{ => intel}/qat/qat_common/adf_gen2_hw_data.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_hw_data.h | 0
.../{ => intel}/qat/qat_common/adf_gen2_pfvf.c | 0
.../{ => intel}/qat/qat_common/adf_gen2_pfvf.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_dc.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_dc.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_hw_data.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_hw_data.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_pfvf.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_pfvf.h | 0
.../{ => intel}/qat/qat_common/adf_gen4_pm.c | 0
.../{ => intel}/qat/qat_common/adf_gen4_pm.h | 0
.../{ => intel}/qat/qat_common/adf_hw_arbiter.c | 2 +-
.../crypto/{ => intel}/qat/qat_common/adf_init.c | 96 +-
.../crypto/{ => intel}/qat/qat_common/adf_isr.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_msg.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_msg.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_msg.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_proto.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_pf_proto.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_utils.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_utils.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_msg.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_msg.h | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_proto.c | 0
.../{ => intel}/qat/qat_common/adf_pfvf_vf_proto.h | 0
.../crypto/{ => intel}/qat/qat_common/adf_sriov.c | 10 +-
.../crypto/{ => intel}/qat/qat_common/adf_sysfs.c | 23 +-
.../{ => intel}/qat/qat_common/adf_transport.c | 0
.../{ => intel}/qat/qat_common/adf_transport.h | 0
.../qat/qat_common/adf_transport_access_macros.h | 0
.../qat/qat_common/adf_transport_debug.c | 0
.../qat/qat_common/adf_transport_internal.h | 0
.../crypto/{ => intel}/qat/qat_common/adf_vf_isr.c | 3 +-
.../crypto/{ => intel}/qat/qat_common/icp_qat_fw.h | 0
.../{ => intel}/qat/qat_common/icp_qat_fw_comp.h | 0
.../qat/qat_common/icp_qat_fw_init_admin.h | 0
.../{ => intel}/qat/qat_common/icp_qat_fw_la.h | 0
.../qat/qat_common/icp_qat_fw_loader_handle.h | 0
.../{ => intel}/qat/qat_common/icp_qat_fw_pke.h | 0
.../{ => intel}/qat/qat_common/icp_qat_hal.h | 0
.../crypto/{ => intel}/qat/qat_common/icp_qat_hw.h | 0
.../qat/qat_common/icp_qat_hw_20_comp.h | 0
.../qat/qat_common/icp_qat_hw_20_comp_defs.h | 0
.../{ => intel}/qat/qat_common/icp_qat_uclo.h | 0
.../crypto/{ => intel}/qat/qat_common/qat_algs.c | 0
.../{ => intel}/qat/qat_common/qat_algs_send.c | 0
.../{ => intel}/qat/qat_common/qat_algs_send.h | 0
.../{ => intel}/qat/qat_common/qat_asym_algs.c | 0
drivers/crypto/{ => intel}/qat/qat_common/qat_bl.c | 0
drivers/crypto/{ => intel}/qat/qat_common/qat_bl.h | 0
.../{ => intel}/qat/qat_common/qat_comp_algs.c | 0
.../{ => intel}/qat/qat_common/qat_comp_req.h | 0
.../{ => intel}/qat/qat_common/qat_compression.c | 0
.../{ => intel}/qat/qat_common/qat_compression.h | 0
.../crypto/{ => intel}/qat/qat_common/qat_crypto.c | 0
.../crypto/{ => intel}/qat/qat_common/qat_crypto.h | 0
.../crypto/{ => intel}/qat/qat_common/qat_hal.c | 1 +
.../crypto/{ => intel}/qat/qat_common/qat_uclo.c | 1 +
.../crypto/{ => intel}/qat/qat_dh895xcc/Makefile | 0
.../qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 2 +-
.../qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 0
.../crypto/{ => intel}/qat/qat_dh895xcc/adf_drv.c | 24 +-
.../crypto/{ => intel}/qat/qat_dh895xccvf/Makefile | 0
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 0
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h | 0
.../{ => intel}/qat/qat_dh895xccvf/adf_drv.c | 13 +-
drivers/crypto/mxs-dcp.c | 21 +-
drivers/crypto/qce/core.c | 23 +-
drivers/crypto/qce/core.h | 1 +
drivers/crypto/sa2ul.c | 6 +-
drivers/crypto/sahara.c | 4 +-
drivers/crypto/stm32/stm32-hash.c | 361 ++---
drivers/i2c/busses/Kconfig | 5 +-
drivers/i2c/busses/i2c-designware-amdpsp.c | 205 +--
drivers/i2c/busses/i2c-designware-core.h | 1 -
drivers/i2c/busses/i2c-designware-platdrv.c | 1 -
drivers/tee/amdtee/call.c | 2 +-
drivers/tee/amdtee/shm_pool.c | 2 +-
include/crypto/acompress.h | 132 +-
include/crypto/aead.h | 22 +
include/crypto/akcipher.h | 102 +-
include/crypto/algapi.h | 93 +-
include/crypto/hash.h | 95 +-
include/crypto/internal/acompress.h | 43 +-
include/crypto/internal/hash.h | 2 -
include/crypto/internal/scompress.h | 15 +-
include/crypto/kpp.h | 73 +-
include/crypto/rng.h | 65 +-
include/crypto/skcipher.h | 22 +
include/crypto/utils.h | 73 +
include/linux/crypto.h | 236 +--
include/linux/psp-platform-access.h | 65 +
include/linux/psp-sev.h | 8 -
include/linux/psp.h | 29 +
kernel/padata.c | 4 +-
lib/crypto/utils.c | 2 +-
257 files changed, 6776 insertions(+), 2730 deletions(-)
delete mode 100644 Documentation/devicetree/bindings/crypto/qcom-qce.txt
create mode 100644 Documentation/devicetree/bindings/crypto/qcom-qce.yaml
create mode 100644 arch/powerpc/crypto/aes-gcm-p10-glue.c
create mode 100644 arch/powerpc/crypto/aes-gcm-p10.S
create mode 100644 arch/powerpc/crypto/aesp8-ppc.pl
create mode 100644 arch/powerpc/crypto/ghashp8-ppc.pl
create mode 100644 arch/powerpc/crypto/ppc-xlate.pl
create mode 100644 crypto/compress.h
create mode 100644 crypto/hash.h
create mode 100644 drivers/crypto/ccp/platform-access.c
create mode 100644 drivers/crypto/ccp/platform-access.h
create mode 100644 drivers/crypto/hisilicon/trng/trng-stb.c
create mode 100644 drivers/crypto/intel/Kconfig
create mode 100644 drivers/crypto/intel/Makefile
create mode 100644 drivers/crypto/intel/ixp4xx/Kconfig
create mode 100644 drivers/crypto/intel/ixp4xx/Makefile
rename drivers/crypto/{ => intel/ixp4xx}/ixp4xx_crypto.c (99%)
rename drivers/crypto/{ => intel}/keembay/Kconfig (100%)
rename drivers/crypto/{ => intel}/keembay/Makefile (100%)
rename drivers/crypto/{ => intel}/keembay/keembay-ocs-aes-core.c (99%)
rename drivers/crypto/{ => intel}/keembay/keembay-ocs-ecc.c (100%)
rename drivers/crypto/{ => intel}/keembay/keembay-ocs-hcu-core.c (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-aes.c (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-aes.h (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-hcu.c (100%)
rename drivers/crypto/{ => intel}/keembay/ocs-hcu.h (100%)
rename drivers/crypto/{ => intel}/qat/Kconfig (100%)
rename drivers/crypto/{ => intel}/qat/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.c (87%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_4xxx_hw_data.h (86%)
rename drivers/crypto/{ => intel}/qat/qat_4xxx/adf_drv.c (95%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.c (98%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_c3xxx_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxx/adf_drv.c (93%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c3xxxvf/adf_drv.c (96%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_c62x_hw_data.c (98%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_c62x_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62x/adf_drv.c (93%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_c62xvf_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_c62xvf_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_c62xvf/adf_drv.c (96%)
rename drivers/crypto/{ => intel}/qat/qat_common/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_accel_devices.h (97%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_accel_engine.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_admin.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_aer.c (82%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_common.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_strings.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_cfg_user.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_common_drv.h (96%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_ctl_drv.c (95%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_dev_mgr.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_config.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_config.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_dc.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_dc.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_pfvf.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen2_pfvf.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_dc.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_dc.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pfvf.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pfvf.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pm.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_gen4_pm.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_hw_arbiter.c (98%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_init.c (85%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_isr.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_msg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_msg.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_msg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_proto.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_pf_proto.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_utils.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_utils.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_msg.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_msg.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_proto.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_pfvf_vf_proto.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_sriov.c (96%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_sysfs.c (88%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_access_macros.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_debug.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_transport_internal.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/adf_vf_isr.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_comp.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_init_admin.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_la.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_loader_handle.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_fw_pke.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hal.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw_20_comp.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_hw_20_comp_defs.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/icp_qat_uclo.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs_send.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_algs_send.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_asym_algs.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_bl.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_bl.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_comp_algs.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_comp_req.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_compression.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_compression.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_crypto.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_crypto.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_hal.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_common/qat_uclo.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c (99%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xcc/adf_drv.c (93%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/Makefile (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.h (100%)
rename drivers/crypto/{ => intel}/qat/qat_dh895xccvf/adf_drv.c (96%)
create mode 100644 include/crypto/utils.h
create mode 100644 include/linux/psp-platform-access.h
create mode 100644 include/linux/psp.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.4
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
@ 2023-04-26 17:06 ` pr-tracker-bot
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-04-26 17:06 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 24 Apr 2023 12:52:27 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/733f7e9c18c5e377025c1bfdce6bc9a7d55649be
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.4
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2023-03-05 19:37 ` pr-tracker-bot
@ 2023-05-07 13:19 ` Herbert Xu
2023-05-07 18:12 ` pr-tracker-bot
2023-05-29 3:41 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-05-07 13:19 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 482c84e906e535072c55395acabd3a58e9443d12:
i2c: designware: Add doorbell support for Mendocino (2023-04-20 18:20:05 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p2
for you to fetch changes up to b8969a1b69672b163d057e7745ebc915df689211:
crypto: api - Fix CRYPTO_USER checks for report function (2023-05-02 18:22:24 +0800)
----------------------------------------------------------------
This push fixes the following problems:
- A long-standing bug in crypto_engine.
- A buggy but harmless check in the sun8i-ss driver.
- A regression in the CRYPTO_USER interface.
----------------------------------------------------------------
Christophe JAILLET (1):
crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs()
Olivier Bacon (1):
crypto: engine - fix crypto_queue backlog handling
Ondrej Mosnacek (1):
crypto: api - Fix CRYPTO_USER checks for report function
crypto/acompress.c | 2 +-
crypto/aead.c | 2 +-
crypto/ahash.c | 2 +-
crypto/akcipher.c | 2 +-
crypto/algapi.c | 3 +++
crypto/crypto_engine.c | 6 +++---
crypto/kpp.c | 2 +-
crypto/rng.c | 2 +-
crypto/scompress.c | 2 +-
crypto/shash.c | 2 +-
crypto/skcipher.c | 2 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 2 +-
12 files changed, 16 insertions(+), 13 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.4
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
@ 2023-05-07 18:12 ` pr-tracker-bot
2023-05-29 3:41 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-05-07 18:12 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sun, 7 May 2023 21:19:48 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.4-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6f69c981811c8b019d7882839e31c34ea8330860
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.4
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
2023-05-07 18:12 ` pr-tracker-bot
@ 2023-05-29 3:41 ` Herbert Xu
2023-05-29 11:39 ` pr-tracker-bot
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-05-29 3:41 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b8969a1b69672b163d057e7745ebc915df689211:
crypto: api - Fix CRYPTO_USER checks for report function (2023-05-02 18:22:24 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.4-p3
for you to fetch changes up to 6ab39f99927eed605728b02d512438d828183c97:
crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors (2023-05-24 18:10:27 +0800)
----------------------------------------------------------------
This push fixes an alignment crash in x86/aria.
----------------------------------------------------------------
Ard Biesheuvel (1):
crypto: x86/aria - Use 16 byte alignment for GFNI constant vectors
arch/x86/crypto/aria-aesni-avx-asm_64.S | 2 --
1 file changed, 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.4
2023-05-29 3:41 ` Herbert Xu
@ 2023-05-29 11:39 ` pr-tracker-bot
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-05-29 11:39 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 29 May 2023 11:41:40 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.4-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/7a6c8e512fa072cfe8ad7a3b26666b6f26435870
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.5
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
2023-04-26 17:06 ` pr-tracker-bot
@ 2023-06-29 5:06 ` Herbert Xu
2023-07-01 5:04 ` pr-tracker-bot
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-06-29 5:06 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
Please note that there is a nasty merge conflict in the directory
crypto/asymmetric because of the conflicting changes in mainline
versus what's in cryptodev.
For the resolution, please pick the code from cryptodev as the
linear interface makes the previous fix-up in mainline unnecessary.
For the time being there is still an unnecessary copy in the API
for the software case but hopefully that will go away once I
finish the conversion of the underlying algorithm code to use
linear addresses instead of SG lists.
The following changes since commit ac9a78681b921877518763ba0e89202254349d1b:
Linux 6.4-rc1 (2023-05-07 13:34:35 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.5-p1
for you to fetch changes up to 486bfb05913ac9969a3a71a4dc48f17f31cb162d:
crypto: akcipher - Do not copy dst if it is NULL (2023-06-27 17:59:52 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add linear akcipher/sig API.
- Add tfm cloning (hmac, cmac).
- Add statesize to crypto_ahash.
Algorithms:
- Allow only odd e and restrict value in FIPS mode for RSA.
- Replace LFSR with SHA3-256 in jitter.
- Add interface for gathering of raw entropy in jitter.
Drivers:
- Fix race on data_avail and actual data in hwrng/virtio.
- Add hash and HMAC support in starfive.
- Add RSA algo support in starfive.
- Add support for PCI device 0x156E in ccp.
----------------------------------------------------------------
Adam Guerin (2):
crypto: qat - move returns to default case
crypto: qat - extend configuration for 4xxx
Arnd Bergmann (2):
crypto: aegis128-neon - add header for internal prototypes
crypto: marvell/cesa - Fix type mismatch warning
Bharat Bhushan (1):
hwrng: cn10k - Add extended trng register support
Bhupesh Sharma (2):
dt-bindings: qcom-qce: Fix compatible combinations for SM8150 and IPQ4019 SoCs
dt-bindings: qcom-qce: Add compatibles for SM6115 and QCM2290
Damian Muszynski (1):
crypto: qat - move dbgfs init to separate file
Dan Carpenter (1):
crypto: ixp4xx - silence uninitialized variable warning
David Yang (2):
hwrng: histb - Move driver to drivers/char/hw_random/histb-rng.c
crypto: engine - Fix struct crypto_engine_op doc
Dmitry Safonov (2):
crypto: api - Remove crypto_init_ops()
crypto: cipher - On clone do crypto_mod_get()
Eric Biggers (1):
crypto: Kconfig - warn about performance overhead of CRYPTO_STATS
Franziska Naepelt (1):
crypto: hmac - Add missing blank line
Giovanni Cabiddu (4):
crypto: qat - add missing function declaration in adf_dbgfs.h
crypto: qat - make fw images name constant
crypto: qat - refactor fw config logic for 4xxx
crypto: qat - do not export adf_init_admin_pm()
Hareshx Sankar Raj (2):
crypto: qat - unmap buffer before free for DH
crypto: qat - unmap buffers before free for RSA
Herbert Xu (28):
hwrng: Kconfig - Add HAS_IOMEM dependencies for exynos/meson/mtk/npcm
crypto: arm/sha1-neon - Fix clang function cast warnings
crypto: arm/sha256-neon - Fix clang function cast warnings
crypto: arm/sha512-neon - Fix clang function cast warnings
crypto: hash - Add statesize to crypto_ahash
crypto: hash - Make crypto_ahash_alg helper available
hwrng: virtio - Fix race on data_avail and actual data
crypto: lib/sha256 - Remove redundant and unused sha224_update
crypto: lib/sha256 - Use generic code from sha256_base
crypto: arm64/sha256-glue - Include module.h
crypto: starfive - Depend on AMBA_PL08X instead of selecting it
crypto: cmac - Use modern init_tfm/exit_tfm
crypto: cipher - Add crypto_clone_cipher
crypto: cmac - Add support for cloning
crypto: shash - Allow cloning on algorithms with no init_tfm
dm crypt: Avoid using MAX_CIPHER_BLOCKSIZE
crypto: algboss - Add missing dependency on RNG2
crypto: geniv - Split geniv out of AEAD Kconfig option
crypto: api - Add __crypto_alloc_tfmgfp
crypto: akcipher - Add sync interface without SG lists
crypto: sig - Add interface for sign/verify
KEYS: Add forward declaration in asymmetric-parser.h
KEYS: asymmetric: Move sm2 code into x509_public_key
KEYS: asymmetric: Use new crypto interface without scatterlists
crypto: sm2 - Provide sm2_compute_z_digest when sm2 is disabled
crypto: akcipher - Set request tfm on sync path
crypto: sig - Fix verify call
crypto: akcipher - Do not copy dst if it is NULL
Horia GeantA (1):
crypto: caam - refactor RNG initialization
Jia Jie Ho (6):
dt-bindings: crypto: Add StarFive crypto module
crypto: starfive - Add crypto engine support
crypto: starfive - Add hash and HMAC support
crypto: starfive - Fix driver dependencies
crypto: starfive - Update hash module irq handling
crypto: starfive - Add RSA algo support
John Allen (1):
crypto: ccp - Add support for PCI device 0x156E
Karthikeyan Gopal (2):
crypto: qat - set deprecated capabilities as reserved
crypto: qat - update slice mask for 4xxx devices
Lucas Segarra Fernandez (1):
crypto: qat - expose pm_idle_enabled through sysfs
Mahmoud Adam (1):
crypto: rsa - allow only odd e and restrict value in FIPS mode
Mario Limonciello (2):
crypto: ccp - Validate that platform access mailbox registers are declared
crypto: ccp - Add support for PCI device 0x17E0
Martin Kaiser (9):
hwrng: imx-rngc - simpler check for available random bytes
hwrng: imx-rngc - use bitfield macros to read rng type
hwrng: imx-rngc - use BIT(x) for register bit defines
hwrng: imx-rngc - mark the probe function as __init
hwrng: imx-rngc - don't init of_device_id's data
hwrng: imx-rngc - fix the timeout for init and self check
hwrng: st - support compile-testing
hwrng: st - keep clock enabled while hwrng is registered
hwrng: imx-rngc - switch to DEFINE_SIMPLE_DEV_PM_OPS
Meenakshi Aggarwal (1):
crypto: caam - optimize RNG sample size
Pankaj Gupta (1):
crypto: caam - Fix soc_id matching
Randy Dunlap (1):
crypto: nx - fix build warnings when DEBUG_FS is not enabled
Rob Herring (1):
crypto: n2 - Use of_property_read_reg() to parse "reg"
Srujana Challa (2):
crypto: octeontx2 - add support for AF to CPT PF uplink mbox
crypto: octeontx2 - hardware configuration for inline IPsec
Stephan Müller (3):
crypto: jitter - replace LFSR with SHA3-256
crypto: jitter - add interface for gathering of raw entropy
crypto: jitter - correct health test during initialization
Tero Kristo (1):
crypto: sa2ul - change unsafe data size limit to 255 bytes
Uwe Kleine-König (1):
crypto: atmel - Switch i2c drivers back to use .probe()
Victoria Milhoan (1):
crypto: caam - adjust RNG timing to support more devices
Victoria Milhoan (b42089) (1):
crypto: caam - add a test for the RNG
Documentation/ABI/testing/sysfs-driver-qat | 46 ++
.../devicetree/bindings/crypto/qcom-qce.yaml | 52 +-
.../bindings/crypto/starfive,jh7110-crypto.yaml | 70 ++
MAINTAINERS | 7 +
arch/arm/crypto/sha1_neon_glue.c | 12 +-
arch/arm/crypto/sha256_neon_glue.c | 12 +-
arch/arm/crypto/sha512-neon-glue.c | 12 +-
arch/arm64/crypto/sha256-glue.c | 3 +-
crypto/Kconfig | 66 +-
crypto/Makefile | 4 +-
crypto/aegis-neon.h | 17 +
crypto/aegis128-neon-inner.c | 1 +
crypto/aegis128-neon.c | 12 +-
crypto/ahash.c | 9 +-
crypto/akcipher.c | 124 ++-
crypto/api.c | 27 +-
crypto/asymmetric_keys/public_key.c | 303 ++++---
crypto/asymmetric_keys/x509_public_key.c | 29 +-
crypto/cipher.c | 28 +
crypto/cmac.c | 36 +-
crypto/hmac.c | 1 +
crypto/internal.h | 22 +
crypto/jitterentropy-kcapi.c | 192 ++++-
crypto/jitterentropy-testing.c | 294 +++++++
crypto/jitterentropy.c | 152 ++--
crypto/jitterentropy.h | 20 +-
crypto/rsa.c | 36 +
crypto/shash.c | 12 +-
crypto/sig.c | 157 ++++
crypto/sm2.c | 104 ++-
drivers/char/hw_random/Kconfig | 27 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/cn10k-rng.c | 63 +-
.../trng/trng-stb.c => char/hw_random/histb-rng.c} | 83 +-
drivers/char/hw_random/imx-rngc.c | 53 +-
drivers/char/hw_random/st-rng.c | 21 +-
drivers/char/hw_random/virtio-rng.c | 10 +-
drivers/crypto/Kconfig | 1 +
drivers/crypto/Makefile | 1 +
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-sha204a.c | 2 +-
drivers/crypto/caam/Kconfig | 9 +
drivers/crypto/caam/caamrng.c | 48 ++
drivers/crypto/caam/ctrl.c | 272 ++++---
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/regs.h | 14 +-
drivers/crypto/ccp/platform-access.c | 5 +
drivers/crypto/ccp/sp-pci.c | 43 +
drivers/crypto/hisilicon/Kconfig | 7 -
drivers/crypto/hisilicon/Makefile | 2 +-
drivers/crypto/hisilicon/trng/Makefile | 3 -
drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c | 2 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 229 ++++--
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 2 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 45 +-
drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_c62x/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_common/Makefile | 4 +-
.../intel/qat/qat_common/adf_accel_devices.h | 2 +-
.../crypto/intel/qat/qat_common/adf_accel_engine.c | 2 +-
drivers/crypto/intel/qat/qat_common/adf_admin.c | 1 -
drivers/crypto/intel/qat/qat_common/adf_cfg.c | 28 +-
drivers/crypto/intel/qat/qat_common/adf_cfg.h | 2 +
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 8 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 69 ++
drivers/crypto/intel/qat/qat_common/adf_dbgfs.h | 29 +
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.c | 12 +-
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_init.c | 6 +
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 60 ++
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 3 +-
drivers/crypto/intel/qat/qat_common/qat_algs.c | 1 -
.../crypto/intel/qat/qat_common/qat_asym_algs.c | 14 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 8 +-
drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c | 12 +-
drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c | 12 +-
drivers/crypto/marvell/cesa/cipher.c | 2 +-
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 15 +
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 3 +
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 34 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 33 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 7 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 41 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 247 +++++-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 10 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 1 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 8 +-
drivers/crypto/n2_core.c | 9 +-
drivers/crypto/nx/Makefile | 2 +-
drivers/crypto/nx/nx.h | 4 +-
drivers/crypto/sa2ul.h | 2 +-
drivers/crypto/starfive/Kconfig | 20 +
drivers/crypto/starfive/Makefile | 4 +
drivers/crypto/starfive/jh7110-cryp.c | 258 ++++++
drivers/crypto/starfive/jh7110-cryp.h | 172 ++++
drivers/crypto/starfive/jh7110-hash.c | 899 +++++++++++++++++++++
drivers/crypto/starfive/jh7110-rsa.c | 617 ++++++++++++++
drivers/md/dm-crypt.c | 15 +-
include/crypto/akcipher.h | 36 +
include/crypto/algapi.h | 1 -
include/crypto/engine.h | 2 +-
include/crypto/hash.h | 3 +-
include/crypto/internal/cipher.h | 2 +
include/crypto/internal/hash.h | 12 +
include/crypto/internal/sig.h | 17 +
include/crypto/public_key.h | 2 -
include/crypto/sha2.h | 2 +-
include/crypto/sha256_base.h | 50 +-
include/crypto/sig.h | 140 ++++
include/crypto/sm2.h | 21 +-
include/keys/asymmetric-parser.h | 2 +
include/linux/crypto.h | 3 +-
lib/crypto/sha256.c | 79 +-
116 files changed, 4940 insertions(+), 965 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/starfive,jh7110-crypto.yaml
create mode 100644 crypto/aegis-neon.h
create mode 100644 crypto/jitterentropy-testing.c
create mode 100644 crypto/sig.c
rename drivers/{crypto/hisilicon/trng/trng-stb.c => char/hw_random/histb-rng.c} (53%)
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_dbgfs.h
create mode 100644 drivers/crypto/starfive/Kconfig
create mode 100644 drivers/crypto/starfive/Makefile
create mode 100644 drivers/crypto/starfive/jh7110-cryp.c
create mode 100644 drivers/crypto/starfive/jh7110-cryp.h
create mode 100644 drivers/crypto/starfive/jh7110-hash.c
create mode 100644 drivers/crypto/starfive/jh7110-rsa.c
create mode 100644 include/crypto/internal/sig.h
create mode 100644 include/crypto/sig.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.5
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
@ 2023-07-01 5:04 ` pr-tracker-bot
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-07-01 5:04 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 29 Jun 2023 13:06:18 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.5-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5d95ff84e62be914b4a4dabfa814e4096b05b1b0
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.5
2023-05-29 3:41 ` Herbert Xu
2023-05-29 11:39 ` pr-tracker-bot
@ 2023-07-09 23:51 ` Herbert Xu
2023-07-10 17:20 ` pr-tracker-bot
2023-08-21 3:37 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-07-09 23:51 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 5d95ff84e62be914b4a4dabfa814e4096b05b1b0:
Merge tag 'v6.5-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-06-30 21:27:13 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.5-p2
for you to fetch changes up to 0b7ec177b589842c0abf9e91459c83ba28d32452:
crypto: algif_hash - Fix race between MORE and non-MORE sends (2023-07-08 22:48:42 +1000)
----------------------------------------------------------------
This push fixes a couple of regressions in af_alg and incorrect
return values in crypto/asymmetric_keys/public_key.
----------------------------------------------------------------
Dan Carpenter (1):
KEYS: asymmetric: Fix error codes
David Howells (2):
crypto: af_alg - Fix merging of written data into spliced pages
crypto: algif_hash - Fix race between MORE and non-MORE sends
crypto/af_alg.c | 7 ++++---
crypto/algif_hash.c | 4 +++-
crypto/asymmetric_keys/public_key.c | 20 +++++++++++++++-----
3 files changed, 22 insertions(+), 9 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.5
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
@ 2023-07-10 17:20 ` pr-tracker-bot
2023-08-21 3:37 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-07-10 17:20 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 10 Jul 2023 09:51:03 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 v6.5-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/419caed6cc77f19148faefe13515f8685ede219b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.5
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
2023-07-10 17:20 ` pr-tracker-bot
@ 2023-08-21 3:37 ` Herbert Xu
2023-08-21 5:09 ` pr-tracker-bot
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-08-21 3:37 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 419caed6cc77f19148faefe13515f8685ede219b:
Merge tag 'v6.5-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-07-10 09:53:11 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 tags/v6.5-p3
for you to fetch changes up to 080aa61e370b9c5cafe71cacadbfe0e72db4d6df:
crypto: fix uninit-value in af_alg_free_resources (2023-08-18 18:30:09 +0800)
----------------------------------------------------------------
This push fixes a regression in the caam driver and af_alg.
----------------------------------------------------------------
Herbert Xu (1):
Revert "crypto: caam - adjust RNG timing to support more devices"
Pavel Skripkin (1):
crypto: fix uninit-value in af_alg_free_resources
crypto/af_alg.c | 4 ++--
drivers/crypto/caam/ctrl.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.5
2023-08-21 3:37 ` Herbert Xu
@ 2023-08-21 5:09 ` pr-tracker-bot
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-08-21 5:09 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 21 Aug 2023 11:37:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 tags/v6.5-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f7757129e3dea336c407551c98f50057c22bb266
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.6
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
2023-07-01 5:04 ` pr-tracker-bot
@ 2023-08-28 9:22 ` Herbert Xu
2023-08-29 19:00 ` pr-tracker-bot
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-08-28 9:22 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 419caed6cc77f19148faefe13515f8685ede219b:
Merge tag 'v6.5-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2023-07-10 09:53:11 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p1
for you to fetch changes up to 85b9bf9a514d991fcecb118d0a8a35e754ff9265:
Revert "dt-bindings: crypto: qcom,prng: Add SM8450" (2023-08-25 19:01:45 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Move crypto engine callback from tfm ctx into algorithm object.
- Fix atomic sleep bug in crypto_destroy_instance.
- Move lib/mpi into lib/crypto.
Algorithms:
- Add chacha20 and poly1305 implementation for powerpc p10.
Drivers:
- Add AES skcipher and aead support to starfive.
- Add Dynamic Boost Control support to ccp.
- Add support for STM32P13 platform to stm32.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - fix crypto capability detection for 4xxx
Arnd Bergmann (2):
crypto: caam - fix PM operations definition
crypto: drivers - avoid memcpy size warning
Azeem Shaikh (1):
crypto: lrw,xts - Replace strlcpy with strscpy
Chang S. Bae (1):
crypto: x86/aesni - Align the address before aes_set_key_common()
Christophe JAILLET (2):
crypto: caam - Use struct_size()
crypto: caam - Remove messages related to memory allocation failure
Damian Muszynski (5):
crypto: qat - add internal timer for qat 4xxx
crypto: qat - drop obsolete heartbeat interface
crypto: qat - add measure clock frequency
crypto: qat - add heartbeat feature
crypto: qat - add heartbeat counters check
Danny Tsen (5):
crypto: chacha20-p10 - An optimized Chacha20 implementation with 8-way unrolling for ppc64le
crypt: chacha20-p10 - Glue code for optmized Chacha20 implementation for ppc64le
crypto: poly1305-p10 - An optimized Poly1305 implementation with 4-way unrolling for ppc64le
crypto: poly1305-p10 - Glue code for optmized Poly1305 implementation for ppc64le
crypto: powerpc - Add chacha20/poly1305-p10 to Kconfig and Makefile
David Howells (1):
crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390
Eric Biggers (1):
crypto: x86/aesni - remove unused parameter to aes_set_key_common()
Florian Fainelli (1):
hwrng: iproc-rng200 - Implement suspend and resume calls
Franck LENORMAND (1):
crypto: caam - Change structure type representing DECO MID
Frederick Lawler (1):
crypto: af_alg - Decrement struct key.usage in alg_set_by_key_serial()
GUO Zihua (1):
hwrng: core - Remove duplicated include
Gaosheng Cui (1):
KEYS: fix kernel-doc warnings in verify_pefile
Gaurav Jain (1):
crypto: caam - fix unchecked return value error
Giovanni Cabiddu (1):
crypto: qat - change value of default idle filter
Herbert Xu (38):
crypto: api - Use work queue in crypto_destroy_instance
crypto: lib - Move mpi into lib/crypto
crypto: sun8i-ce - Remove prepare/unprepare request
crypto: sun8i-ss - Remove prepare/unprepare request
crypto: amlogic - Remove prepare/unprepare request
crypto: aspeed - Remove prepare/unprepare request
crypto: sl3516 - Remove prepare/unprepare request
crypto: keembay - Remove prepare/unprepare request
crypto: omap - Remove prepare/unprepare request
crypto: rk3288 - Remove prepare/unprepare request
crypto: jh1100 - Remove prepare/unprepare request
crypto: stm32 - Remove prepare/unprepare request
crypto: virtio - Remove prepare/unprepare request
crypto: zynqmp - Remove prepare/unprepare request
crypto: engine - Remove prepare/unprepare request
crypto: jh7110 - Include crypto/hash.h in header file
crypto: engine - Move crypto inclusions out of header file
crypto: jh7110 - Include scatterwalk.h for struct scatter_walk
crypto: engine - Create internal/engine.h
crypto: omap - Include internal/engine.h
crypto: caam - Include internal/engine.h
crypto: engine - Move struct crypto_engine into internal/engine.h
crypto: engine - Move crypto_engine_ops from request into crypto_alg
crypto: sun8i-ce - Use new crypto_engine_op interface
crypto: sun8i-ss - Use new crypto_engine_op interface
crypto: amlogic - Use new crypto_engine_op interface
crypto: aspeed - Use new crypto_engine_op interface
crypto: aspeed - Remove non-standard sha512 algorithms
crypto: caam - Use new crypto_engine_op interface
crypto: sl3516 - Use new crypto_engine_op interface
crypto: keembay - Use new crypto_engine_op interface
crypto: omap - Use new crypto_engine_op interface
crypto: rk3288 - Use new crypto_engine_op interface
crypto: jh7110 - Use new crypto_engine_op interface
crypto: stm32 - Use new crypto_engine_op interface
crypto: virtio - Use new crypto_engine_op interface
crypto: zynqmp - Use new crypto_engine_op interface
crypto: engine - Remove crypto_engine_ctx
Horia Geanta (1):
crypto: caam - add power management support
Horia Geantă (1):
crypto: caam/jr - fix shared IRQ line handling
Iuliana Prodan (1):
crypto: caam - increase the domain of write memory barrier to full system
Jia Jie Ho (1):
crypto: starfive - Add AES skcipher and aead support
Jiapeng Chong (1):
crypto: sig - Remove some unused functions
Joachim Vandersmissen (1):
crypto: jitter - Add clarifying comments to Jitter Entropy RCT cutoff values
Konrad Dybcio (2):
dt-bindings: crypto: qcom,prng: Add SM8450
crypto: qcom-rng: Make the core clock optional regardless of ACPI presence
Krzysztof Kozlowski (1):
crypto: exynos - fix Wvoid-pointer-to-enum-cast warning
Lionel Debieve (1):
dt-bindings: crypto: add new compatible for stm32-hash
Lucas Segarra Fernandez (1):
crypto: qat - add fw_counters debugfs file
Mahmoud Adam (1):
KEYS: use kfree_sensitive with key
Mario Limonciello (11):
crypto: ccp - Rename macro for security attributes
crypto: ccp - Add support for displaying PSP firmware versions
crypto: ccp - Add bootloader and TEE version offsets
crypto: ccp - move setting PSP master to earlier in the init
crypto: ccp - Add support for fetching a nonce for dynamic boost control
crypto: ccp - Add support for setting user ID for dynamic boost control
crypto: ccp - Add support for getting and setting DBC parameters
crypto: ccp - Add a sample library for ioctl use
crypto: ccp - Add a sample python script for Dynamic Boost Control
crypto: ccp - Add unit tests for dynamic boost control
crypto: ccp - Add Mario to MAINTAINERS
Mark O'Donovan (1):
crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
Martin Kaiser (25):
hwrng: nomadik - keep clock enabled while hwrng is registered
hwrng: nomadik - use dev_err_probe
hwrng: imx-rngc - use dev_err_probe
hwrng: exynos - switch to DEFINE_SIMPLE_DEV_PM_OPS
hwrng: pic32 - enable compile-testing
hwrng: pic32 - use devm_clk_get_enabled
hwrng: pic32 - remove unused defines
hwrng: pic32 - enable TRNG only while it's used
hwrng: ingenic - enable compile testing
hwrng: ingenic - remove two unused defines
hwrng: ingenic - remove dead assignments
hwrng: ingenic - use devm_clk_get_enabled
hwrng: ingenic - use dev_err_probe in error paths
hwrng: ingenic - don't disable the rng in ingenic_trng_remove
hwrng: ingenic - switch to device managed registration
hwrng: ba431 - do not set drvdata
hwrng: ba431 - don't init of_device_id's data
hwrng: ba431 - use dev_err_probe after failed registration
hwrng: arm-smccc-trng - don't set drvdata
hwrng: cctrng - don't open code init and exit functions
hwrng: cctrng - let devres enable the clock
hwrng: cctrng - merge cc_trng_clk_init into its only caller
hwrng: cctrng - use dev_err_probe in error paths
hwrng: cn10k - delete empty remove function
hwrng: cn10k - use dev_err_probe
Masahiro Yamada (1):
crypto: arm64/aes - remove Makefile hack
Neil Armstrong (1):
Revert "dt-bindings: crypto: qcom,prng: Add SM8450"
Rob Herring (4):
hwrng: Explicitly include correct DT includes
hwrng: Enable COMPILE_TEST for more drivers
hwrng: xgene: Add explicit io.h include
crypto: drivers - Explicitly include correct DT includes
Ruan Jinjie (1):
crypto: hisilicon/sec - Do not check for 0 return after calling platform_get_irq()
Thomas Bourgoin (6):
crypto: stm32 - add new algorithms support
crypto: stm32 - remove bufcnt in stm32_hash_write_ctrl.
crypto: stm32 - fix loop iterating through scatterlist for DMA
crypto: stm32 - check request size and scatterlist size when using DMA.
crypto: stm32 - fix MDMAT condition
crypto: stm32 - remove flag HASH_FLAGS_DMA_READY
Thore Sommer (1):
X.509: if signature is unsupported skip validation
Uwe Kleine-König (4):
crypto: starfive - Convert to platform remove callback returning void
crypto: stm32 - Properly handle pm_runtime_get failing
crypto: stm32 - Drop if block with always false condition
crypto: stm32 - Convert to platform remove callback returning void
Wang Ming (1):
crypto: atmel - Use dev_err_probe instead of dev_err
Weili Qian (5):
crypto: hisilicon/hpre - ensure private key less than n
crypto: hisilicon/qm - flush all work before driver removed
crypto: hisilicon/qm - stop function and write data to memory
crypto: hisilicon/qm - increase device doorbell timeout
crypto: hisilicon/hpre - enable sva error interrupt event
Yang Yingliang (2):
crypto: starfive - fix return value check in starfive_aes_prepare_req()
crypto: qat - use kfree_sensitive instead of memset/kfree()
Yangtao Li (6):
crypto: omap-des - Use devm_platform_get_and_ioremap_resource()
crypto: keembay - Convert to devm_platform_ioremap_resource()
crypto: atmel-aes - Use devm_platform_get_and_ioremap_resource()
crypto: atmel-sha - Use devm_platform_get_and_ioremap_resource()
crypto: atmel-tdes - Use devm_platform_get_and_ioremap_resource()
hwrng: timeriomem - Use devm_platform_get_and_ioremap_resource()
You Kangren (1):
crypto: qat - replace the if statement with min()
Yue Haibing (3):
crypto: allwinner - Remove unused function declarations
crypto: qat - Remove unused function declarations
crypto: chelsio - Remove unused declarations
Documentation/ABI/testing/debugfs-driver-qat | 61 ++
Documentation/ABI/testing/sysfs-driver-ccp | 18 +
.../devicetree/bindings/crypto/st,stm32-hash.yaml | 1 +
MAINTAINERS | 12 +
arch/arm64/crypto/Makefile | 5 -
arch/arm64/crypto/aes-glue-ce.c | 2 +
arch/arm64/crypto/aes-glue-neon.c | 1 +
arch/powerpc/crypto/Kconfig | 26 +
arch/powerpc/crypto/Makefile | 4 +
arch/powerpc/crypto/chacha-p10-glue.c | 221 ++++
arch/powerpc/crypto/chacha-p10le-8x.S | 842 +++++++++++++++
arch/powerpc/crypto/poly1305-p10-glue.c | 186 ++++
arch/powerpc/crypto/poly1305-p10le_64.S | 1075 ++++++++++++++++++++
arch/x86/crypto/aesni-intel_glue.c | 22 +-
crypto/af_alg.c | 4 +
crypto/algapi.c | 16 +-
crypto/asymmetric_keys/public_key.c | 8 +-
crypto/asymmetric_keys/verify_pefile.c | 2 +-
crypto/asymmetric_keys/x509_public_key.c | 5 +
crypto/crypto_engine.c | 244 ++++-
crypto/jitterentropy.c | 10 +-
crypto/lrw.c | 6 +-
crypto/sig.c | 5 -
crypto/xts.c | 6 +-
drivers/char/hw_random/Kconfig | 37 +-
drivers/char/hw_random/amd-rng.c | 1 +
drivers/char/hw_random/arm_smccc_trng.c | 2 -
drivers/char/hw_random/atmel-rng.c | 2 +-
drivers/char/hw_random/ba431-rng.c | 10 +-
drivers/char/hw_random/bcm2835-rng.c | 3 +-
drivers/char/hw_random/cctrng.c | 93 +-
drivers/char/hw_random/cn10k-rng.c | 18 +-
drivers/char/hw_random/core.c | 3 +-
drivers/char/hw_random/exynos-trng.c | 8 +-
drivers/char/hw_random/imx-rngc.c | 24 +-
drivers/char/hw_random/ingenic-rng.c | 2 +-
drivers/char/hw_random/ingenic-trng.c | 59 +-
drivers/char/hw_random/iproc-rng200.c | 28 +-
drivers/char/hw_random/nomadik-rng.c | 19 +-
drivers/char/hw_random/npcm-rng.c | 3 +-
drivers/char/hw_random/omap-rng.c | 2 -
drivers/char/hw_random/omap3-rom-rng.c | 1 -
drivers/char/hw_random/pasemi-rng.c | 3 +-
drivers/char/hw_random/pic32-rng.c | 76 +-
drivers/char/hw_random/stm32-rng.c | 3 +-
drivers/char/hw_random/timeriomem-rng.c | 25 +-
drivers/char/hw_random/xgene-rng.c | 6 +-
drivers/char/hw_random/xiphera-trng.c | 1 -
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 1 -
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 41 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 172 ++--
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 100 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 16 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 27 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 155 +--
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 114 ++-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss.h | 19 +-
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 13 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 61 +-
drivers/crypto/amlogic/amlogic-gxl.h | 5 +-
drivers/crypto/aspeed/aspeed-acry.c | 40 +-
drivers/crypto/aspeed/aspeed-hace-crypto.c | 134 ++-
drivers/crypto/aspeed/aspeed-hace-hash.c | 285 ++----
drivers/crypto/aspeed/aspeed-hace.c | 9 +-
drivers/crypto/aspeed/aspeed-hace.h | 30 +-
drivers/crypto/atmel-aes.c | 21 +-
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-sha.c | 28 +-
drivers/crypto/atmel-tdes.c | 20 +-
drivers/crypto/bcm/cipher.c | 6 +-
drivers/crypto/caam/caamalg.c | 386 +++++--
drivers/crypto/caam/caamhash.c | 47 +-
drivers/crypto/caam/caampkc.c | 25 +-
drivers/crypto/caam/caampkc.h | 3 -
drivers/crypto/caam/ctrl.c | 107 ++
drivers/crypto/caam/intern.h | 25 +-
drivers/crypto/caam/jr.c | 206 +++-
drivers/crypto/caam/qi.c | 1 +
drivers/crypto/caam/regs.h | 9 +-
drivers/crypto/ccp/Makefile | 3 +-
drivers/crypto/ccp/dbc.c | 250 +++++
drivers/crypto/ccp/dbc.h | 56 +
drivers/crypto/ccp/psp-dev.c | 19 +-
drivers/crypto/ccp/psp-dev.h | 1 +
drivers/crypto/ccp/sp-dev.h | 7 +
drivers/crypto/ccp/sp-pci.c | 96 +-
drivers/crypto/ccree/cc_driver.c | 1 -
drivers/crypto/chelsio/chcr_algo.c | 3 +-
drivers/crypto/chelsio/chcr_core.h | 1 -
drivers/crypto/chelsio/chcr_crypto.h | 1 -
drivers/crypto/exynos-rng.c | 4 +-
drivers/crypto/gemini/sl3516-ce-cipher.c | 22 +-
drivers/crypto/gemini/sl3516-ce-core.c | 50 +-
drivers/crypto/gemini/sl3516-ce.h | 8 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 10 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 5 +-
drivers/crypto/hisilicon/qm.c | 28 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 4 +-
drivers/crypto/img-hash.c | 4 +-
.../crypto/intel/keembay/keembay-ocs-aes-core.c | 431 ++++----
drivers/crypto/intel/keembay/keembay-ocs-ecc.c | 73 +-
.../crypto/intel/keembay/keembay-ocs-hcu-core.c | 243 +++--
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 23 +
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 4 +
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 3 +
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 28 +
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.h | 7 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 28 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.h | 7 +
drivers/crypto/intel/qat/qat_common/Makefile | 5 +
.../intel/qat/qat_common/adf_accel_devices.h | 14 +
drivers/crypto/intel/qat/qat_common/adf_admin.c | 61 ++
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 2 +
drivers/crypto/intel/qat/qat_common/adf_clock.c | 131 +++
drivers/crypto/intel/qat/qat_common/adf_clock.h | 14 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 14 +-
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 12 +
.../crypto/intel/qat/qat_common/adf_fw_counters.c | 264 +++++
.../crypto/intel/qat/qat_common/adf_fw_counters.h | 11 +
.../crypto/intel/qat/qat_common/adf_gen2_config.c | 7 +
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.h | 3 +
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 3 +
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h | 2 +-
.../crypto/intel/qat/qat_common/adf_gen4_timer.c | 70 ++
.../crypto/intel/qat/qat_common/adf_gen4_timer.h | 21 +
.../crypto/intel/qat/qat_common/adf_heartbeat.c | 336 ++++++
.../crypto/intel/qat/qat_common/adf_heartbeat.h | 79 ++
.../intel/qat/qat_common/adf_heartbeat_dbgfs.c | 194 ++++
.../intel/qat/qat_common/adf_heartbeat_dbgfs.h | 12 +
drivers/crypto/intel/qat/qat_common/adf_init.c | 28 +
drivers/crypto/intel/qat/qat_common/adf_isr.c | 6 +
.../intel/qat/qat_common/icp_qat_fw_init_admin.h | 23 +-
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 5 +-
.../crypto/intel/qat/qat_common/qat_compression.c | 3 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 7 +-
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 13 +
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.h | 5 +
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/omap-aes-gcm.c | 39 +-
drivers/crypto/omap-aes.c | 264 ++---
drivers/crypto/omap-aes.h | 15 +-
drivers/crypto/omap-des.c | 212 ++--
drivers/crypto/omap-sham.c | 291 +++---
drivers/crypto/qcom-rng.c | 10 +-
drivers/crypto/rockchip/rk3288_crypto.c | 59 +-
drivers/crypto/rockchip/rk3288_crypto.h | 21 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 80 +-
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 60 +-
drivers/crypto/s5p-sss.c | 1 -
drivers/crypto/sa2ul.c | 3 +-
drivers/crypto/sahara.c | 1 -
drivers/crypto/starfive/Kconfig | 2 +
drivers/crypto/starfive/Makefile | 2 +-
drivers/crypto/starfive/jh7110-aes.c | 1024 +++++++++++++++++++
drivers/crypto/starfive/jh7110-cryp.c | 53 +-
drivers/crypto/starfive/jh7110-cryp.h | 74 +-
drivers/crypto/starfive/jh7110-hash.c | 290 +++---
drivers/crypto/stm32/Kconfig | 2 +
drivers/crypto/stm32/stm32-cryp.c | 356 +++----
drivers/crypto/stm32/stm32-hash.c | 988 +++++++++++++-----
drivers/crypto/talitos.c | 4 +-
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 35 +-
.../crypto/virtio/virtio_crypto_skcipher_algs.c | 25 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 41 +-
drivers/crypto/xilinx/zynqmp-sha.c | 1 -
include/crypto/algapi.h | 3 +
include/crypto/engine.h | 118 +--
include/crypto/internal/engine.h | 74 ++
include/linux/hisi_acc_qm.h | 2 +-
include/linux/psp-platform-access.h | 4 +
include/uapi/linux/psp-dbc.h | 147 +++
lib/Makefile | 1 -
lib/crypto/Makefile | 2 +
lib/{ => crypto}/mpi/Makefile | 0
lib/{ => crypto}/mpi/ec.c | 0
lib/{ => crypto}/mpi/generic_mpih-add1.c | 0
lib/{ => crypto}/mpi/generic_mpih-lshift.c | 0
lib/{ => crypto}/mpi/generic_mpih-mul1.c | 0
lib/{ => crypto}/mpi/generic_mpih-mul2.c | 0
lib/{ => crypto}/mpi/generic_mpih-mul3.c | 0
lib/{ => crypto}/mpi/generic_mpih-rshift.c | 0
lib/{ => crypto}/mpi/generic_mpih-sub1.c | 0
lib/{ => crypto}/mpi/longlong.h | 0
lib/{ => crypto}/mpi/mpi-add.c | 0
lib/{ => crypto}/mpi/mpi-bit.c | 0
lib/{ => crypto}/mpi/mpi-cmp.c | 8 +-
lib/{ => crypto}/mpi/mpi-div.c | 0
lib/{ => crypto}/mpi/mpi-inline.h | 0
lib/{ => crypto}/mpi/mpi-internal.h | 0
lib/{ => crypto}/mpi/mpi-inv.c | 0
lib/{ => crypto}/mpi/mpi-mod.c | 0
lib/{ => crypto}/mpi/mpi-mul.c | 0
lib/{ => crypto}/mpi/mpi-pow.c | 0
lib/{ => crypto}/mpi/mpi-sub-ui.c | 0
lib/{ => crypto}/mpi/mpicoder.c | 0
lib/{ => crypto}/mpi/mpih-cmp.c | 0
lib/{ => crypto}/mpi/mpih-div.c | 0
lib/{ => crypto}/mpi/mpih-mul.c | 0
lib/{ => crypto}/mpi/mpiutil.c | 0
tools/crypto/ccp/.gitignore | 1 +
tools/crypto/ccp/Makefile | 13 +
tools/crypto/ccp/dbc.c | 72 ++
tools/crypto/ccp/dbc.py | 64 ++
tools/crypto/ccp/dbc_cli.py | 134 +++
tools/crypto/ccp/test_dbc.py | 266 +++++
205 files changed, 10033 insertions(+), 2915 deletions(-)
create mode 100644 Documentation/ABI/testing/debugfs-driver-qat
create mode 100644 arch/arm64/crypto/aes-glue-ce.c
create mode 100644 arch/arm64/crypto/aes-glue-neon.c
create mode 100644 arch/powerpc/crypto/chacha-p10-glue.c
create mode 100644 arch/powerpc/crypto/chacha-p10le-8x.S
create mode 100644 arch/powerpc/crypto/poly1305-p10-glue.c
create mode 100644 arch/powerpc/crypto/poly1305-p10le_64.S
create mode 100644 drivers/crypto/ccp/dbc.c
create mode 100644 drivers/crypto/ccp/dbc.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_clock.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_clock.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_counters.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_counters.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_timer.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_timer.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_dbgfs.h
create mode 100644 drivers/crypto/starfive/jh7110-aes.c
create mode 100644 include/crypto/internal/engine.h
create mode 100644 include/uapi/linux/psp-dbc.h
rename lib/{ => crypto}/mpi/Makefile (100%)
rename lib/{ => crypto}/mpi/ec.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-add1.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-lshift.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-mul1.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-mul2.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-mul3.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-rshift.c (100%)
rename lib/{ => crypto}/mpi/generic_mpih-sub1.c (100%)
rename lib/{ => crypto}/mpi/longlong.h (100%)
rename lib/{ => crypto}/mpi/mpi-add.c (100%)
rename lib/{ => crypto}/mpi/mpi-bit.c (100%)
rename lib/{ => crypto}/mpi/mpi-cmp.c (96%)
rename lib/{ => crypto}/mpi/mpi-div.c (100%)
rename lib/{ => crypto}/mpi/mpi-inline.h (100%)
rename lib/{ => crypto}/mpi/mpi-internal.h (100%)
rename lib/{ => crypto}/mpi/mpi-inv.c (100%)
rename lib/{ => crypto}/mpi/mpi-mod.c (100%)
rename lib/{ => crypto}/mpi/mpi-mul.c (100%)
rename lib/{ => crypto}/mpi/mpi-pow.c (100%)
rename lib/{ => crypto}/mpi/mpi-sub-ui.c (100%)
rename lib/{ => crypto}/mpi/mpicoder.c (100%)
rename lib/{ => crypto}/mpi/mpih-cmp.c (100%)
rename lib/{ => crypto}/mpi/mpih-div.c (100%)
rename lib/{ => crypto}/mpi/mpih-mul.c (100%)
rename lib/{ => crypto}/mpi/mpiutil.c (100%)
create mode 100644 tools/crypto/ccp/.gitignore
create mode 100644 tools/crypto/ccp/Makefile
create mode 100644 tools/crypto/ccp/dbc.c
create mode 100644 tools/crypto/ccp/dbc.py
create mode 100755 tools/crypto/ccp/dbc_cli.py
create mode 100755 tools/crypto/ccp/test_dbc.py
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.6
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
@ 2023-08-29 19:00 ` pr-tracker-bot
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-08-29 19:00 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 28 Aug 2023 17:22:20 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/68cf01760bc0891074e813b9bb06d2696cac1c01
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-08-21 3:37 ` Herbert Xu
2023-08-21 5:09 ` pr-tracker-bot
@ 2023-08-31 5:16 ` Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2023-08-31 5:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 85b9bf9a514d991fcecb118d0a8a35e754ff9265:
Revert "dt-bindings: crypto: qcom,prng: Add SM8450" (2023-08-25 19:01:45 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p2
for you to fetch changes up to ba22e81872c1232ea4ba421251d8109a5ed68c52:
crypto: powerpc/chacha20,poly1305-p10 - Add dependency on VSX (2023-08-30 13:48:39 +0800)
----------------------------------------------------------------
This push fixes a random config build failure on powerpc.
----------------------------------------------------------------
Herbert Xu (1):
crypto: powerpc/chacha20,poly1305-p10 - Add dependency on VSX
arch/powerpc/crypto/Kconfig | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
@ 2023-09-01 23:19 ` pr-tracker-bot
2023-09-22 2:10 ` Herbert Xu
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-09-01 23:19 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 31 Aug 2023 13:16:33 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0fe2b86c21253bb365947ceed3531eb214d4c5b5
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
@ 2023-09-22 2:10 ` Herbert Xu
2023-09-22 16:43 ` pr-tracker-bot
2023-10-10 8:46 ` Herbert Xu
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-09-22 2:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0bb80ecc33a8fb5a682236443c1e740d5c917d1d:
Linux 6.6-rc1 (2023-09-10 16:28:41 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p3
for you to fetch changes up to 21155620fbf2edbb071144894ff9d67ba9a1faa0:
crypto: sm2 - Fix crash caused by uninitialized context (2023-09-20 13:10:10 +0800)
----------------------------------------------------------------
This push fixes a regression in sm2.
----------------------------------------------------------------
Tianjia Zhang (1):
crypto: sm2 - Fix crash caused by uninitialized context
crypto/sm2.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-09-22 2:10 ` Herbert Xu
@ 2023-09-22 16:43 ` pr-tracker-bot
2023-10-10 8:46 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-09-22 16:43 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 22 Sep 2023 10:10:51 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2f8d62daf2b5d9835ccd1ae0407de130156c17c1
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-09-22 2:10 ` Herbert Xu
2023-09-22 16:43 ` pr-tracker-bot
@ 2023-10-10 8:46 ` Herbert Xu
2023-10-10 18:54 ` pr-tracker-bot
2023-10-21 9:23 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-10-10 8:46 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 21155620fbf2edbb071144894ff9d67ba9a1faa0:
crypto: sm2 - Fix crash caused by uninitialized context (2023-09-20 13:10:10 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p4
for you to fetch changes up to 152d0bcdf1efcb54a4fa20f694e9c7bbb6d06cbf:
dm crypt: Fix reqsize in crypt_iv_eboiv_gen (2023-10-06 10:39:18 +0800)
----------------------------------------------------------------
This push fixes a 6.5 regression in dm-crypt.
----------------------------------------------------------------
Herbert Xu (1):
dm crypt: Fix reqsize in crypt_iv_eboiv_gen
drivers/md/dm-crypt.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-10-10 8:46 ` Herbert Xu
@ 2023-10-10 18:54 ` pr-tracker-bot
2023-10-21 9:23 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-10-10 18:54 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 10 Oct 2023 16:46:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/832b5d0bf94cab3ab1ca690fca3c3d931f5fa7cd
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.6
2023-10-10 8:46 ` Herbert Xu
2023-10-10 18:54 ` pr-tracker-bot
@ 2023-10-21 9:23 ` Herbert Xu
2023-10-21 17:57 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2023-10-21 9:23 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 152d0bcdf1efcb54a4fa20f694e9c7bbb6d06cbf:
dm crypt: Fix reqsize in crypt_iv_eboiv_gen (2023-10-06 10:39:18 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p5
for you to fetch changes up to b11950356c4b416d2e87941f3aa7a8bf089db72b:
KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash (2023-10-18 12:27:10 +0800)
----------------------------------------------------------------
This push fixes a 6.5 regression in crypto/asymmetric_keys.
----------------------------------------------------------------
Herbert Xu (1):
KEYS: asymmetric: Fix sign/verify on pkcs1pad without a hash
crypto/asymmetric_keys/public_key.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.6
2023-10-21 9:23 ` Herbert Xu
@ 2023-10-21 17:57 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-10-21 17:57 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sat, 21 Oct 2023 17:23:07 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.6-p5
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f1de9aced809f1751bc97703bdf678c75da3fed3
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.7
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
2023-08-29 19:00 ` pr-tracker-bot
@ 2023-11-02 6:56 ` Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2023-11-02 6:56 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0bb80ecc33a8fb5a682236443c1e740d5c917d1d:
Linux 6.6-rc1 (2023-09-10 16:28:41 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p1
for you to fetch changes up to a312e07a65fb598ed239b940434392721385c722:
crypto: adiantum - flush destination page before unmapping (2023-11-01 12:58:42 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add virtual-address based lskcipher interface.
- Optimise ahash/shash performance in light of costly indirect calls.
- Remove ahash alignmask attribute.
Algorithms:
- Improve AES/XTS performance of 6-way unrolling for ppc.
- Remove some uses of obsolete algorithms (md4, md5, sha1).
- Add FIPS 202 SHA-3 support in pkcs1pad.
- Add fast path for single-page messages in adiantum.
- Remove zlib-deflate.
Drivers:
- Add support for S4 in meson RNG driver.
- Add STM32MP13x support in stm32.
- Add hwrng interface support in qcom-rng.
- Add support for deflate algorithm in hisilicon/zip.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - enable dc chaining service
Alexey Romanov (2):
hwrng: meson - add support for S4
dt-bindings: rng: meson: add meson-rng-s4 compatible
Andrei Coardos (5):
hwrng: bcm2835 - removed call to platform_set_drvdata()
hwrng: hisi - removed unneeded call to platform_set_drvdata()
hwrng: mpfs - removed unneeded call to platform_set_drvdata()
hwrng: xgene - removed unneeded call to platform_set_drvdata()
hwrng: xiphera - removed unnneded platform_set_drvdata()
André Apitzsch (1):
crypto: qcom-rng - Add missing dependency on hw_random
Ashish Kalra (1):
MAINTAINERS: update AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SEV SUPPORT
Bartosz Golaszewski (1):
dt-bindings: crypto: ice: document the sa8775p inline crypto engine
Bo Liu (1):
crypto: aesni - Fix double word in comments
Chang S. Bae (3):
crypto: x86/aesni - Refactor the common address alignment code
crypto: x86/aesni - Correct the data type in struct aesni_xts_ctx
crypto: x86/aesni - Perform address alignment early for XTS mode
Christophe JAILLET (1):
crypto: hisilicon/hpre - Fix a erroneous check after snprintf()
Ciunas Bennett (3):
crypto: qat - add rate limiting sysfs interface
crypto: qat - add rp2svc sysfs attribute
crypto: qat - add num_rps sysfs attribute
Damian Muszynski (4):
units: Add BYTES_PER_*BIT
crypto: qat - add bits.h to icp_qat_hw.h
crypto: qat - add retrieval of fw capabilities
crypto: qat - add rate limiting feature to qat_4xxx
Danny Tsen (1):
crypto: vmx - Improved AES/XTS performance of 6-way unrolling for ppc
Dimitri John Ledkov (11):
crypto: pkcs7 - remove md4 md5 x.509 support
crypto: pkcs7 - remove sha1 support
crypto: mscode_parser - remove sha224 authenticode support
module: Do not offer sha224 for built-in module signing
certs: Limit MODULE_SIG_KEY_TYPE_ECDSA to SHA384 or SHA512
x509: Add OIDs for FIPS 202 SHA-3 hash and signatures
crypto: FIPS 202 SHA-3 register in hash info for IMA
crypto: rsa-pkcs1pad - Add FIPS 202 SHA-3 support
crypto: asymmetric_keys - allow FIPS 202 SHA-3 signatures
module: enable automatic module signing with FIPS 202 SHA-3
Documentation/module-signing.txt: bring up to date
Eric Biggers (65):
crypto: xts - use 'spawn' for underlying single-block cipher
crypto: shash - optimize the default digest and finup
crypto: shash - fold shash_digest_unaligned() into crypto_shash_digest()
crypto: arm64/sha2-ce - implement ->digest for sha256
crypto: x86/sha256 - implement ->digest for sha256
crypto: adiantum - add fast path for single-page messages
crypto: arm/nhpoly1305 - implement ->digest
crypto: arm64/nhpoly1305 - implement ->digest
crypto: x86/nhpoly1305 - implement ->digest
crypto: arm64/sha1-ce - clean up backwards function names
crypto: arm64/sha2-ce - clean up backwards function names
crypto: arm64/sha512-ce - clean up backwards function names
crypto: arm64/sha256 - clean up backwards function names
crypto: arm64/sha512 - clean up backwards function names
crypto: skcipher - fix weak key check for lskciphers
crypto: shash - eliminate indirect call for default import and export
crypto: sparc/crc32c - stop using the shash alignmask
crypto: stm32 - remove unnecessary alignmask
crypto: xilinx/zynqmp-sha - remove unnecessary alignmask
crypto: mips/crc32 - remove redundant setting of alignmask to 0
crypto: loongarch/crc32 - remove redundant setting of alignmask to 0
crypto: cbcmac - remove unnecessary alignment logic
crypto: cmac - remove unnecessary alignment logic
crypto: hmac - remove unnecessary alignment logic
crypto: vmac - don't set alignmask
crypto: xcbc - remove unnecessary alignment logic
crypto: shash - remove support for nonzero alignmask
libceph: stop checking crypto_shash_alignmask
crypto: drbg - stop checking crypto_shash_alignmask
crypto: testmgr - stop checking crypto_shash_alignmask
crypto: adiantum - stop using alignmask of shash_alg
crypto: hctr2 - stop using alignmask of shash_alg
crypto: shash - remove crypto_shash_alignmask
crypto: shash - remove crypto_shash_ctx_aligned()
crypto: sun4i-ss - remove unnecessary alignmask for ahashes
crypto: sun8i-ce - remove unnecessary alignmask for ahashes
crypto: sun8i-ss - remove unnecessary alignmask for ahashes
crypto: atmel - remove unnecessary alignmask for ahashes
crypto: artpec6 - stop setting alignmask for ahashes
crypto: mxs-dcp - remove unnecessary alignmask for ahashes
crypto: s5p-sss - remove unnecessary alignmask for ahashes
crypto: talitos - remove unnecessary alignmask for ahashes
crypto: omap-sham - stop setting alignmask for ahashes
crypto: rockchip - remove unnecessary alignmask for ahashes
crypto: starfive - remove unnecessary alignmask for ahashes
crypto: stm32 - remove unnecessary alignmask for ahashes
crypto: ahash - remove support for nonzero alignmask
crypto: authenc - stop using alignmask of ahash
crypto: authencesn - stop using alignmask of ahash
crypto: testmgr - stop checking crypto_ahash_alignmask
net: ipv4: stop checking crypto_ahash_alignmask
net: ipv6: stop checking crypto_ahash_alignmask
crypto: ccm - stop using alignmask of ahash
crypto: chacha20poly1305 - stop using alignmask of ahash
crypto: gcm - stop using alignmask of ahash
crypto: ahash - remove crypto_ahash_alignmask
crypto: ahash - remove struct ahash_request_priv
crypto: ahash - improve file comment
crypto: chelsio - stop using crypto_ahash::init
crypto: talitos - stop using crypto_ahash::init
crypto: hash - move "ahash wrapping shash" functions to ahash.c
crypto: ahash - check for shash type instead of not ahash type
crypto: ahash - optimize performance when wrapping shash
crypto: testmgr - move pkcs1pad(rsa,sha3-*) to correct place
crypto: adiantum - flush destination page before unmapping
Fabio Estevam (3):
dt-bindings: crypto: fsl-imx-sahara: Shorten the title
dt-bindings: crypto: fsl-imx-sahara: Document the clocks
dt-bindings: crypto: fsl-imx-sahara: Fix the number of irqs
Gatien Chevallier (8):
dt-bindings: rng: introduce new compatible for STM32MP13x
hwrng: stm32 - use devm_platform_get_and_ioremap_resource() API
hwrng: stm32 - implement STM32MP13x support
hwrng: stm32 - implement error concealment
hwrng: stm32 - rework error handling in stm32_rng_read()
hwrng: stm32 - restrain RNG noise source clock
hwrng: stm32 - support RNG configuration locking mechanism
hwrng: stm32 - rework power management sequences
Gaurav Jain (2):
crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure
crypto: caam/jr - fix Chacha20 + Poly1305 self test failure
Giovanni Cabiddu (15):
Documentation: ABI: debugfs-driver-qat: fix fw_counters path
crypto: qat - fix state machines cleanup paths
crypto: qat - do not shadow error code
crypto: qat - ignore subsequent state up commands
crypto: qat - fix unregistration of crypto algorithms
crypto: qat - fix unregistration of compression algorithms
crypto: qat - consolidate services structure
crypto: qat - increase size of buffers
crypto: qat - add namespace to driver
crypto: qat - refactor fw config related functions
crypto: qat - use masks for AE groups
crypto: qat - fix ring to service map for QAT GEN4
crypto: qat - move admin api
crypto: qat - move adf_cfg_services
crypto: qat - fix deadlock in backlog processing
Herbert Xu (45):
wireguard: do not include crypto/algapi.h
KEYS: Include linux/errno.h in linux/verification.h
hwrng: octeon - Fix warnings on 32-bit platforms
fscrypt: Do not include crypto/algapi.h
ubifs: Do not include crypto/algapi.h
Bluetooth: Do not include crypto/algapi.h
ah: Do not include crypto/algapi.h
mptcp: Do not include crypto/algapi.h
SUNRPC: Do not include crypto/algapi.h
evm: Do not include crypto/algapi.h
KEYS: encrypted: Do not include crypto/algapi.h
chelsio: Do not include crypto/algapi.h
crypto: aead - Add crypto_has_aead
ipsec: Stop using crypto_has_alg
crypto: hash - Hide CRYPTO_ALG_TYPE_AHASH_MASK
crypto: skcipher - Add lskcipher
crypto: lskcipher - Add compatibility wrapper around ECB
crypto: testmgr - Add support for lskcipher algorithms
crypto: ecb - Convert from skcipher to lskcipher
crypto: cbc - Convert from skcipher to lskcipher
ipsec: Select CRYPTO_AEAD
crypto: qat - Remove zlib-deflate
crypto: deflate - Remove zlib-deflate
crypto: testmgr - Remove zlib-deflate
crypto: skcipher - Add dependency on ecb
crypto: arc4 - Convert from skcipher to lskcipher
crypto: skcipher - Add crypto_spawn_skcipher_alg_common
crypto: essiv - Handle lskcipher spawns
crypto: cryptd - Only access common skcipher fields on spawn
crypto: adiantum - Only access common skcipher fields on spawn
crypto: authenc - Only access common skcipher fields on spawn
crypto: authencesn - Only access common skcipher fields on spawn
crypto: ccm - Only access common skcipher fields on spawn
crypto: chacha20poly1305 - Only access common skcipher fields on spawn
crypto: ctr - Only access common skcipher fields on spawn
crypto: cts - Only access common skcipher fields on spawn
crypto: gcm - Only access common skcipher fields on spawn
crypto: hctr2 - Only access common skcipher fields on spawn
crypto: lrw - Only access common skcipher fields on spawn
crypto: xts - Only access common skcipher fields on spawn
crypto: skcipher - Remove obsolete skcipher_alg helpers
crypto: lskcipher - Return EINVAL when ecb_name fails sanity checks
crypto: hifn_795x - Silence gcc format-truncation false positive warnings
certs: Break circular dependency when selftest is modular
crypto: rsa - Add module alias for pkcs1pad
Jinjie Ruan (1):
crypto: qat - Use list_for_each_entry() helper
John Allen (1):
crypto: ccp - Dump SEV command buffer registers on SEV command error
Jonas Gorski (1):
hwrng: geode - fix accessing registers
Justin Stitt (2):
crypto: cavium/nitrox - refactor deprecated strncpy
crypto: qat - refactor deprecated strncpy
Kees Cook (1):
crypto: qat - Annotate struct adf_fw_counters with __counted_by
Li zeming (1):
crypto: api - Remove unnecessary NULL initialisation
Longfang Liu (3):
crypto: hisilicon/qm - fix PF queue parameter issue
crypto: hisilicon/qm - fix EQ/AEQ interrupt issue
crypto: hisilicon/qm - prevent soft lockup in receive loop
Lu Jialin (1):
crypto: pcrypt - Fix hungtask for PADATA_RESET
Lucas Segarra Fernandez (3):
crypto: qat - refactor included headers
crypto: qat - add pm_status debugfs file
crypto: qat - add cnv_errors debugfs file
Lukas Wunner (2):
X.509: Add missing IMPLICIT annotations to AKID ASN.1 module
treewide: Add SPDX identifier to IETF ASN.1 modules
Mario Limonciello (9):
crypto: ccp - Get a free page to use while fetching initial nonce
crypto: ccp - Fix ioctl unit tests
crypto: ccp - Fix DBC sample application error handling
crypto: ccp - Fix sample application signature passing
crypto: ccp - Fix some unfused tests
crypto: ccp - Add support for extended PSP mailbox commands
crypto: ccp - Add a communication path abstraction for DBC
crypto: ccp - Add a macro to check capabilities register
crypto: ccp - Add support for DBC over PSP mailbox
Martin Kaiser (7):
hwrng: ks-sa - access private data via struct hwrng
hwrng: ks-sa - remove dev from struct ks_sa_rng
hwrng: ks-sa - use dev_err_probe
hwrng: nomadik - add MODULE_DESCRIPTION
hwrng: st - add MODULE_DESCRIPTION
hwrng: imx-rngc - reasonable timeout for selftest
hwrng: imx-rngc - reasonable timeout for initial seed
Neil Armstrong (2):
dt-bindings: crypto: qcom,prng: document that RNG on SM8450 is a TRNG
dt-bindings: crypto: qcom,prng: document SM8550
Om Prakash Singh (2):
crypto: qcom-rng - Add hw_random interface support
dt-bindings: crypto: qcom,prng: document SA8775P and SC7280
Randy Dunlap (2):
crypto: akcipher - fix kernel-doc typos
crypto: sig - fix kernel-doc typo
Rob Herring (2):
crypto: aspeed-hace - Use device_get_match_data()
hwrng: n2 - Use device_get_match_data()
Roxana Nicolescu (1):
crypto: x86/sha - load modules based on CPU features
Shashank Gupta (9):
crypto: qat - add infrastructure for error reporting
crypto: qat - add reporting of correctable errors for QAT GEN4
crypto: qat - add reporting of errors from ERRSOU1 for QAT GEN4
crypto: qat - add handling of errors from ERRSOU2 for QAT GEN4
crypto: qat - add handling of compression related errors for QAT GEN4
crypto: qat - add adf_get_aram_base() helper function
crypto: qat - add handling of errors from ERRSOU3 for QAT GEN4
crypto: qat - add error counters
crypto: qat - count QAT GEN4 errors
Stefan Wahren (1):
hwrng: bcm2835 - Fix hwrng throughput regression
Stephan Müller (5):
crypto: jitter - add RCT/APT support for different OSRs
crypto: jitter - Allow configuration of memory size
crypto: jitter - Allow configuration of oversampling rate
crypto: jitter - reuse allocated entropy collector
crypto: jitter - use permanent health test storage
Svyatoslav Pankratov (1):
crypto: qat - fix double free during reset
Tom Lendacky (1):
crypto: ccp - Move direct access to some PSP registers out of TEE
Uwe Kleine-König (44):
crypto: keembay - Don't pass errors to the caller in .remove()
crypto: engine - Make crypto_engine_exit() return void
crypto: sun4i-ss - Convert to platform remove callback returning void
crypto: sun8i-ce - Convert to platform remove callback returning void
crypto: sun8i-ss - Convert to platform remove callback returning void
crypto: amcc/crypto4xx - Convert to platform remove callback returning void
crypto: amlogic-gxl-core - Convert to platform remove callback returning void
crypto: aspeed-acry - Convert to platform remove callback returning void
crypto: aspeed-hace - Convert to platform remove callback returning void
crypto: atmel-aes - Convert to platform remove callback returning void
crypto: atmel-sha - Convert to platform remove callback returning void
crypto: atmel-tdes - Convert to platform remove callback returning void
crypto: axis/artpec6 - Convert to platform remove callback returning void
crypto: bcm/cipher - Convert to platform remove callback returning void
crypto: caam/jr - Convert to platform remove callback returning void
crypto: ccp/sp - Convert to platform remove callback returning void
crypto: ccree/cc - Convert to platform remove callback returning void
crypto: exynos-rng - Convert to platform remove callback returning void
crypto: gemini/sl3516-ce - Convert to platform remove callback returning void
crypto: hisilicon/sec - Convert to platform remove callback returning void
crypto: hisilicon/trng - Convert to platform remove callback returning void
crypto: img-hash - Convert to platform remove callback returning void
crypto: inside-secure/safexcel - Convert to platform remove callback returning void
crypto: intel/ixp4xx-crypto - Convert to platform remove callback returning void
crypto: intel/keembay-ocs-aes - Convert to platform remove callback returning void
crypto: intel/keembay-ocs-ecc - Convert to platform remove callback returning void
crypto: intel/keembay-ocs-hcu - Convert to platform remove callback returning void
crypto: marvell/cesa - Convert to platform remove callback returning void
crypto: mxs-dcp - Convert to platform remove callback returning void
crypto: n2_core - Convert to platform remove callback returning void
crypto: omap-aes - Convert to platform remove callback returning void
crypto: omap-des - Convert to platform remove callback returning void
crypto: omap-sham - Convert to platform remove callback returning void
crypto: qce - Convert to platform remove callback returning void
crypto: qcom-rng - Convert to platform remove callback returning void
crypto: rockchip/rk3288 - Convert to platform remove callback returning void
crypto: s5p-sss - Convert to platform remove callback returning void
crypto: sa2ul - Convert to platform remove callback returning void
crypto: sahara - Convert to platform remove callback returning void
crypto: stm32/crc32 - Convert to platform remove callback returning void
crypto: stm32/cryp - Convert to platform remove callback returning void
crypto: talitos - Convert to platform remove callback returning void
crypto: xilinx/zynqmp-aes-gcm - Convert to platform remove callback returning void
crypto: xilinx/zynqmp-sha - Convert to platform remove callback returning void
WangJinchao (1):
padata: Fix refcnt handling in padata_free_shell()
Weili Qian (3):
crypto: hisilicon/qm - fix the type value of aeq
crypto: hisilicon/qm - check function qp num before alg register
crypto: hisilicon/qm - alloc buffer to set and get xqc
Wenkai Lin (1):
crypto: hisilicon/sec - fix for sgl unmmap problem
Yang Shen (2):
crypto: hisilicon/zip - support deflate algorithm
crypto: hisilicon/zip - remove zlib and gzip
zhenwei pi (1):
crypto: virtio - handle config changed by work queue
Documentation/ABI/testing/debugfs-driver-qat | 24 +-
Documentation/ABI/testing/sysfs-driver-qat | 48 +
Documentation/ABI/testing/sysfs-driver-qat_ras | 41 +
Documentation/ABI/testing/sysfs-driver-qat_rl | 226 +++
Documentation/admin-guide/module-signing.rst | 17 +-
Documentation/crypto/devel-algos.rst | 4 +-
.../devicetree/bindings/crypto/fsl-imx-sahara.yaml | 43 +-
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../devicetree/bindings/crypto/qcom,prng.yaml | 28 +-
.../devicetree/bindings/rng/amlogic,meson-rng.yaml | 1 +
.../devicetree/bindings/rng/st,stm32-rng.yaml | 20 +-
MAINTAINERS | 2 +-
arch/arm/crypto/nhpoly1305-neon-glue.c | 9 +
arch/arm64/crypto/nhpoly1305-neon-glue.c | 9 +
arch/arm64/crypto/sha1-ce-core.S | 8 +-
arch/arm64/crypto/sha1-ce-glue.c | 21 +-
arch/arm64/crypto/sha2-ce-core.S | 8 +-
arch/arm64/crypto/sha2-ce-glue.c | 39 +-
arch/arm64/crypto/sha256-glue.c | 26 +-
arch/arm64/crypto/sha512-ce-core.S | 8 +-
arch/arm64/crypto/sha512-ce-glue.c | 26 +-
arch/arm64/crypto/sha512-glue.c | 12 +-
arch/loongarch/crypto/crc32-loongarch.c | 2 -
arch/mips/crypto/crc32-mips.c | 2 -
arch/sparc/crypto/crc32c_glue.c | 43 +-
arch/x86/crypto/aesni-intel_asm.S | 4 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 4 +-
arch/x86/crypto/aesni-intel_glue.c | 52 +-
arch/x86/crypto/nhpoly1305-avx2-glue.c | 9 +
arch/x86/crypto/nhpoly1305-sse2-glue.c | 9 +
arch/x86/crypto/sha1_ssse3_glue.c | 12 +
arch/x86/crypto/sha256_ssse3_glue.c | 44 +
certs/Kconfig | 6 +-
crypto/Kconfig | 63 +-
crypto/Makefile | 6 +-
crypto/adiantum.c | 80 +-
crypto/aead.c | 6 +
crypto/ahash.c | 406 +++--
crypto/api.c | 2 +-
crypto/arc4.c | 60 +-
crypto/asymmetric_keys/Kconfig | 3 +-
crypto/asymmetric_keys/Makefile | 3 +-
crypto/asymmetric_keys/mscode_parser.c | 19 +-
crypto/asymmetric_keys/pkcs7.asn1 | 7 +
crypto/asymmetric_keys/pkcs7_parser.c | 22 +-
crypto/asymmetric_keys/pkcs8.asn1 | 6 +
crypto/asymmetric_keys/public_key.c | 8 +-
crypto/asymmetric_keys/selftest.c | 15 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/asymmetric_keys/x509.asn1 | 7 +
crypto/asymmetric_keys/x509_akid.asn1 | 29 +-
crypto/asymmetric_keys/x509_cert_parser.c | 36 +-
crypto/asymmetric_keys/x509_parser.h | 9 -
crypto/asymmetric_keys/x509_public_key.c | 8 +-
crypto/authenc.c | 20 +-
crypto/authencesn.c | 28 +-
crypto/cbc.c | 159 +-
crypto/ccm.c | 29 +-
crypto/chacha20poly1305.c | 11 +-
crypto/cmac.c | 39 +-
crypto/cryptd.c | 14 +-
crypto/crypto_engine.c | 8 +-
crypto/ctr.c | 14 +-
crypto/cts.c | 12 +-
crypto/deflate.c | 61 +-
crypto/drbg.c | 2 +-
crypto/ecb.c | 206 ++-
crypto/essiv.c | 20 +-
crypto/gcm.c | 12 +-
crypto/hash.h | 14 +-
crypto/hash_info.c | 6 +
crypto/hctr2.c | 11 +-
crypto/hmac.c | 56 +-
crypto/jitterentropy-kcapi.c | 17 +-
crypto/jitterentropy.c | 342 +++--
crypto/jitterentropy.h | 5 +-
crypto/lrw.c | 12 +-
crypto/lskcipher.c | 634 ++++++++
crypto/pcrypt.c | 4 +
crypto/rsa-pkcs1pad.c | 27 +-
crypto/rsaprivkey.asn1 | 7 +
crypto/rsapubkey.asn1 | 7 +
crypto/shash.c | 387 +----
crypto/skcipher.c | 81 +-
crypto/skcipher.h | 28 +
crypto/testmgr.c | 57 +-
crypto/testmgr.h | 155 --
crypto/vmac.c | 1 -
crypto/xcbc.c | 32 +-
crypto/xts.c | 33 +-
drivers/char/hw_random/bcm2835-rng.c | 4 +-
drivers/char/hw_random/core.c | 6 +
drivers/char/hw_random/geode-rng.c | 6 +-
drivers/char/hw_random/hisi-rng.c | 2 -
drivers/char/hw_random/imx-rngc.c | 10 +-
drivers/char/hw_random/ks-sa-rng.c | 26 +-
drivers/char/hw_random/meson-rng.c | 80 +-
drivers/char/hw_random/mpfs-rng.c | 2 -
drivers/char/hw_random/n2-drv.c | 10 +-
drivers/char/hw_random/nomadik-rng.c | 1 +
drivers/char/hw_random/octeon-rng.c | 6 +-
drivers/char/hw_random/st-rng.c | 1 +
drivers/char/hw_random/stm32-rng.c | 519 +++++--
drivers/char/hw_random/xgene-rng.c | 1 -
drivers/char/hw_random/xiphera-trng.c | 2 -
drivers/crypto/Kconfig | 1 +
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 7 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 11 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 11 +-
drivers/crypto/amcc/crypto4xx_core.c | 6 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 5 +-
drivers/crypto/aspeed/aspeed-acry.c | 6 +-
drivers/crypto/aspeed/aspeed-hace.c | 16 +-
drivers/crypto/atmel-aes.c | 6 +-
drivers/crypto/atmel-sha.c | 8 +-
drivers/crypto/atmel-tdes.c | 6 +-
drivers/crypto/axis/artpec6_crypto.c | 8 +-
drivers/crypto/bcm/cipher.c | 5 +-
drivers/crypto/caam/caamalg.c | 3 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +-
drivers/crypto/caam/jr.c | 22 +-
drivers/crypto/cavium/nitrox/nitrox_hal.c | 2 +-
drivers/crypto/ccp/dbc.c | 74 +-
drivers/crypto/ccp/dbc.h | 29 +-
drivers/crypto/ccp/psp-dev.c | 122 +-
drivers/crypto/ccp/psp-dev.h | 55 +
drivers/crypto/ccp/sev-dev.c | 14 +
drivers/crypto/ccp/sp-dev.h | 4 +
drivers/crypto/ccp/sp-pci.c | 22 +-
drivers/crypto/ccp/sp-platform.c | 6 +-
drivers/crypto/ccp/tee-dev.c | 48 +-
drivers/crypto/ccp/tee-dev.h | 15 +-
drivers/crypto/ccree/cc_driver.c | 6 +-
drivers/crypto/chelsio/chcr_algo.c | 9 +-
drivers/crypto/exynos-rng.c | 6 +-
drivers/crypto/gemini/sl3516-ce-core.c | 6 +-
drivers/crypto/hifn_795x.c | 11 +-
drivers/crypto/hisilicon/debugfs.c | 79 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 25 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 21 +-
drivers/crypto/hisilicon/qm.c | 520 +++----
drivers/crypto/hisilicon/qm_common.h | 6 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 6 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 32 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 29 +-
drivers/crypto/hisilicon/trng/trng.c | 6 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 290 +---
drivers/crypto/hisilicon/zip/zip_main.c | 23 +-
drivers/crypto/img-hash.c | 6 +-
drivers/crypto/inside-secure/safexcel.c | 6 +-
drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c | 6 +-
.../crypto/intel/keembay/keembay-ocs-aes-core.c | 6 +-
drivers/crypto/intel/keembay/keembay-ocs-ecc.c | 6 +-
.../crypto/intel/keembay/keembay-ocs-hcu-core.c | 15 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 245 ++-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 30 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 36 +-
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c | 1 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_c62x/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_common/Makefile | 10 +
.../intel/qat/qat_common/adf_accel_devices.h | 61 +-
drivers/crypto/intel/qat/qat_common/adf_admin.c | 156 +-
drivers/crypto/intel/qat/qat_common/adf_admin.h | 27 +
drivers/crypto/intel/qat/qat_common/adf_aer.c | 3 +-
.../crypto/intel/qat/qat_common/adf_cfg_services.c | 20 +
.../crypto/intel/qat/qat_common/adf_cfg_services.h | 24 +
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_clock.c | 1 +
.../crypto/intel/qat/qat_common/adf_cnv_dbgfs.c | 300 ++++
.../crypto/intel/qat/qat_common/adf_cnv_dbgfs.h | 11 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 20 +-
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 6 +
.../crypto/intel/qat/qat_common/adf_fw_counters.c | 3 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 7 +
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.c | 27 +-
drivers/crypto/intel/qat/qat_common/adf_gen4_pm.h | 50 +-
.../intel/qat/qat_common/adf_gen4_pm_debugfs.c | 266 ++++
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c | 1566 ++++++++++++++++++++
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.h | 825 +++++++++++
.../crypto/intel/qat/qat_common/adf_gen4_timer.c | 1 +
.../crypto/intel/qat/qat_common/adf_heartbeat.c | 1 +
.../intel/qat/qat_common/adf_heartbeat_dbgfs.c | 1 +
drivers/crypto/intel/qat/qat_common/adf_init.c | 63 +-
drivers/crypto/intel/qat/qat_common/adf_isr.c | 18 +
drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.c | 48 +
drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.h | 12 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 1169 +++++++++++++++
drivers/crypto/intel/qat/qat_common/adf_rl.h | 176 +++
drivers/crypto/intel/qat/qat_common/adf_rl_admin.c | 97 ++
drivers/crypto/intel/qat/qat_common/adf_rl_admin.h | 18 +
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 112 +-
.../intel/qat/qat_common/adf_sysfs_ras_counters.c | 112 ++
.../intel/qat/qat_common/adf_sysfs_ras_counters.h | 27 +
drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c | 451 ++++++
drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.h | 11 +
.../intel/qat/qat_common/adf_transport_debug.c | 4 +-
.../intel/qat/qat_common/icp_qat_fw_init_admin.h | 82 +
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 2 +
.../crypto/intel/qat/qat_common/qat_algs_send.c | 46 +-
.../crypto/intel/qat/qat_common/qat_comp_algs.c | 129 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 2 +-
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c | 1 +
drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c | 1 +
drivers/crypto/marvell/cesa/cesa.c | 6 +-
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/n2_core.c | 12 +-
drivers/crypto/omap-aes.c | 6 +-
drivers/crypto/omap-des.c | 6 +-
drivers/crypto/omap-sham.c | 22 +-
drivers/crypto/qce/core.c | 5 +-
drivers/crypto/qcom-rng.c | 71 +-
drivers/crypto/rockchip/rk3288_crypto.c | 5 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 3 -
drivers/crypto/s5p-sss.c | 12 +-
drivers/crypto/sa2ul.c | 6 +-
drivers/crypto/sahara.c | 6 +-
drivers/crypto/starfive/jh7110-hash.c | 13 +-
drivers/crypto/stm32/stm32-crc32.c | 17 +-
drivers/crypto/stm32/stm32-cryp.c | 16 +-
drivers/crypto/stm32/stm32-hash.c | 20 -
drivers/crypto/talitos.c | 23 +-
drivers/crypto/virtio/virtio_crypto_common.h | 3 +
drivers/crypto/virtio/virtio_crypto_core.c | 14 +-
drivers/crypto/vmx/aesp8-ppc.pl | 141 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 6 +-
drivers/crypto/xilinx/zynqmp-sha.c | 7 +-
.../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c | 2 -
.../chelsio/inline_crypto/ch_ipsec/chcr_ipsec.h | 1 -
.../ethernet/chelsio/inline_crypto/chtls/chtls.h | 1 -
drivers/net/wireguard/cookie.c | 2 +-
drivers/net/wireguard/netlink.c | 2 +-
drivers/net/wireguard/noise.c | 2 +-
fs/crypto/keysetup_v1.c | 2 +-
fs/smb/server/ksmbd_spnego_negtokeninit.asn1 | 8 +
fs/smb/server/ksmbd_spnego_negtokentarg.asn1 | 7 +
fs/ubifs/auth.c | 3 +-
fs/ubifs/replay.c | 1 -
fs/ubifs/ubifs.h | 2 +-
include/crypto/aead.h | 12 +
include/crypto/akcipher.h | 4 +-
include/crypto/algapi.h | 5 -
include/crypto/engine.h | 2 +-
include/crypto/hash.h | 95 +-
include/crypto/hash_info.h | 1 +
include/crypto/internal/hash.h | 9 +-
include/crypto/internal/skcipher.h | 130 +-
include/crypto/sig.h | 2 +-
include/crypto/skcipher.h | 296 +++-
include/linux/crypto.h | 30 +-
include/linux/hisi_acc_qm.h | 39 +-
include/linux/hw_random.h | 1 +
include/linux/oid_registry.h | 23 +-
include/linux/units.h | 4 +
include/linux/verification.h | 1 +
include/uapi/linux/hash_info.h | 3 +
kernel/module/Kconfig | 25 +-
kernel/padata.c | 8 +-
net/bluetooth/smp.c | 3 +-
net/ceph/messenger_v2.c | 4 -
net/ipv4/ah4.c | 19 +-
net/ipv4/netfilter/nf_nat_snmp_basic.asn1 | 8 +
net/ipv6/ah6.c | 19 +-
net/mptcp/subflow.c | 2 +-
net/sunrpc/auth_gss/gss_krb5_crypto.c | 2 +-
net/sunrpc/auth_gss/gss_krb5_unseal.c | 2 -
net/xfrm/Kconfig | 1 +
net/xfrm/xfrm_algo.c | 19 +-
security/integrity/evm/evm_main.c | 3 +-
security/keys/encrypted-keys/encrypted.c | 2 +-
tools/crypto/ccp/dbc.c | 17 +-
tools/crypto/ccp/dbc.py | 8 +-
tools/crypto/ccp/test_dbc.py | 45 +-
277 files changed, 10706 insertions(+), 3352 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-driver-qat_ras
create mode 100644 Documentation/ABI/testing/sysfs-driver-qat_rl
create mode 100644 crypto/lskcipher.c
create mode 100644 crypto/skcipher.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_admin.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cfg_services.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cfg_services.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cnv_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_cnv_dbgfs.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_pm_debugfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_ras.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_pm_dbgfs.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl_admin.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_rl_admin.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_ras_counters.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_ras_counters.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
@ 2023-11-03 2:34 ` Linus Torvalds
2023-11-03 5:52 ` Herbert Xu
2023-11-03 2:37 ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2023-11-03 2:34 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, 1 Nov 2023 at 20:56, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Stephan Müller (5):
> crypto: jitter - add RCT/APT support for different OSRs
> crypto: jitter - Allow configuration of memory size
> crypto: jitter - Allow configuration of oversampling rate
> crypto: jitter - reuse allocated entropy collector
> crypto: jitter - use permanent health test storage
This is beyond annoying.
These are adding Kconfig questions that don't make sense. The whole
jitter thing is debatably useful in the first place, and now you just
annoy users with random questions.
And I mean truly random - the whole jitter entropy is voodoo
programming to begin with, and having some crazy 8MB buffer for it is
just ridiculous.
Honestly, this all smells like somebody's PhD thesis, not a real life thing.
And no, we don't make our Kconfig questions more annoying for some PhD thesis.
We also don't ask people questions that don't have valid answers. Just
because the whole "what is entropy in the first place" isn't
clear-cut, we don't then punt some tweaking question to the user.
We have a very simple and stupid jitter entropy thing AT BOOT TIME
just to try to generate some amount of entropy to make boots
non-repeatable (see "try_to_generate_entropy()" in
drivers/char/random.c).
Honestly, the whole crypto layer one is ridiculous overkill in the
first place, but the annoying new questions have now literally made me
consider just removing it entirely.
Because no, IT IS NOT OK TO ASK CRAZY QUESTIONS. If some developer
cannot come up with a reasonable answer, a random user sure has hell
cannot.
And no, any question that says "do you want to use 8MB of memory for
jitter entropy" is just batsh*t crazy.
This kind of crap needs to stop.
If somebody wants to do this kind of thing, just do it in user space.
It's ridiculously pointless in the kernel.
Convince me I'm wrong. But there is no way in *hell* you will convince
me that we should ask users about some jitter memory sizing.
Allocating memory for timing analysis is silly to begin with, since
any kernel thing could just use the physical memory mapping we already
have in the kernel. I suspect strongly that all this code has been
influenced by code running in user space, where it belongs, and where
you do need to allocate memory to have it available.
Please just make this noise go away.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
@ 2023-11-03 2:37 ` pr-tracker-bot
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-11-03 2:37 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 2 Nov 2023 14:56:05 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/bc3012f4e3a9765de81f454cb8f9bb16aafc6ff5
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-03 2:34 ` Linus Torvalds
@ 2023-11-03 5:52 ` Herbert Xu
2023-11-03 6:32 ` Linus Torvalds
0 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2023-11-03 5:52 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert
On Thu, Nov 02, 2023 at 04:34:11PM -1000, Linus Torvalds wrote:
> On Wed, 1 Nov 2023 at 20:56, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Stephan Müller (5):
> > crypto: jitter - add RCT/APT support for different OSRs
> > crypto: jitter - Allow configuration of memory size
> > crypto: jitter - Allow configuration of oversampling rate
> > crypto: jitter - reuse allocated entropy collector
> > crypto: jitter - use permanent health test storage
>
> This is beyond annoying.
...
> Please just make this noise go away.
Fair enough. How about adding an EXPERT dependency on this?
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.7
2023-11-03 5:52 ` Herbert Xu
@ 2023-11-03 6:32 ` Linus Torvalds
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2023-11-03 6:32 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert
On Thu, 2 Nov 2023 at 19:52, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Fair enough. How about adding an EXPERT dependency on this?
I think that would help the situation, but I assume the sizing for the
jitter buffer is at least partly due to trying to account for cache
sizing or similar issues?
Which really means that I assume any static compile-time answer to
that question is always wrong - whether you are an expert or not.
Unless you are just building the thing for one particular machine.
So I do think the problem is deeper than "this is a question only for
experts". I definitely don't think you should ask a regular user (or
even a distro kernel package manager). I suspect it's likely that the
question is just wrong in general - because any particular one buffer
size for any number of machines simply cannot be the right answer.
I realize that the commit says "*allow* for configuration of memory
size", but I really question the whole approach.
But yes - hiding these questions from any reasonable normal user is at
least a good first step.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
2023-11-03 6:32 ` Linus Torvalds
@ 2023-11-06 10:00 ` Herbert Xu
2023-11-06 15:25 ` Stephan Mueller
2023-11-10 9:04 ` Geert Uytterhoeven
0 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2023-11-06 10:00 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert, Stephan Müller
On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
>
> I think that would help the situation, but I assume the sizing for the
> jitter buffer is at least partly due to trying to account for cache
> sizing or similar issues?
>
> Which really means that I assume any static compile-time answer to
> that question is always wrong - whether you are an expert or not.
> Unless you are just building the thing for one particular machine.
>
> So I do think the problem is deeper than "this is a question only for
> experts". I definitely don't think you should ask a regular user (or
> even a distro kernel package manager). I suspect it's likely that the
> question is just wrong in general - because any particular one buffer
> size for any number of machines simply cannot be the right answer.
>
> I realize that the commit says "*allow* for configuration of memory
> size", but I really question the whole approach.
Yes I think these are all valid points. I just noticed that I
forgot to cc the author so let's see if Stephan has anything to
add.
> But yes - hiding these questions from any reasonable normal user is at
> least a good first step.
OK here's the patch:
---8<---
As JITTERENTROPY is selected by default if you enable the CRYPTO
API, any Kconfig options added there will show up for every single
user. Hide the esoteric options under EXPERT as well as FIPS so
that only distro makers will see them.
Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
diff --git a/crypto/Kconfig b/crypto/Kconfig
index bbf51d55724e..70661f58ee41 100644
--- a/crypto/Kconfig
+++ b/crypto/Kconfig
@@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
See https://www.chronox.de/jent.html
+if CRYPTO_JITTERENTROPY
+if CRYPTO_FIPS && EXPERT
+
choice
prompt "CPU Jitter RNG Memory Size"
default CRYPTO_JITTERENTROPY_MEMSIZE_2
- depends on CRYPTO_JITTERENTROPY
help
The Jitter RNG measures the execution time of memory accesses.
Multiple consecutive memory accesses are performed. If the memory
@@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
int "CPU Jitter RNG Oversampling Rate"
range 1 15
default 1
- depends on CRYPTO_JITTERENTROPY
help
The Jitter RNG allows the specification of an oversampling rate (OSR).
The Jitter RNG operation requires a fixed amount of timing
@@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
config CRYPTO_JITTERENTROPY_TESTINTERFACE
bool "CPU Jitter RNG Test Interface"
- depends on CRYPTO_JITTERENTROPY
help
The test interface allows a privileged process to capture
the raw unconditioned high resolution time stamp noise that
@@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
If unsure, select N.
+endif # if CRYPTO_FIPS && EXPERT
+
+if !(CRYPTO_FIPS && EXPERT)
+
+config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
+ int
+ default 64
+
+config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
+ int
+ default 32
+
+config CRYPTO_JITTERENTROPY_OSR
+ int
+ default 1
+
+config CRYPTO_JITTERENTROPY_TESTINTERFACE
+ bool
+
+endif # if !(CRYPTO_FIPS && EXPERT)
+endif # if CRYPTO_JITTERENTROPY
+
config CRYPTO_KDF800108_CTR
tristate
select CRYPTO_HMAC
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply related [flat|nested] 204+ messages in thread
* Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
@ 2023-11-06 15:25 ` Stephan Mueller
2023-11-10 9:04 ` Geert Uytterhoeven
1 sibling, 0 replies; 204+ messages in thread
From: Stephan Mueller @ 2023-11-06 15:25 UTC (permalink / raw)
To: Linus Torvalds, Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert
Am Montag, 6. November 2023, 11:00:08 CET schrieb Herbert Xu:
Hi Herbert,
> On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> > I think that would help the situation, but I assume the sizing for the
> > jitter buffer is at least partly due to trying to account for cache
> > sizing or similar issues?
> >
> > Which really means that I assume any static compile-time answer to
> > that question is always wrong - whether you are an expert or not.
> > Unless you are just building the thing for one particular machine.
> >
> > So I do think the problem is deeper than "this is a question only for
> > experts". I definitely don't think you should ask a regular user (or
> > even a distro kernel package manager). I suspect it's likely that the
> > question is just wrong in general - because any particular one buffer
> > size for any number of machines simply cannot be the right answer.
> >
> > I realize that the commit says "*allow* for configuration of memory
> > size", but I really question the whole approach.
>
> Yes I think these are all valid points. I just noticed that I
> forgot to cc the author so let's see if Stephan has anything to
> add.
I concur that these questions are more for experts.
>
> > But yes - hiding these questions from any reasonable normal user is at
> > least a good first step.
>
> OK here's the patch:
>
> ---8<---
> As JITTERENTROPY is selected by default if you enable the CRYPTO
> API, any Kconfig options added there will show up for every single
> user. Hide the esoteric options under EXPERT as well as FIPS so
> that only distro makers will see them.
>
> Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
>
> diff --git a/crypto/Kconfig b/crypto/Kconfig
> index bbf51d55724e..70661f58ee41 100644
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
>
> See https://www.chronox.de/jent.html
>
> +if CRYPTO_JITTERENTROPY
> +if CRYPTO_FIPS && EXPERT
> +
> choice
> prompt "CPU Jitter RNG Memory Size"
> default CRYPTO_JITTERENTROPY_MEMSIZE_2
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG measures the execution time of memory accesses.
> Multiple consecutive memory accesses are performed. If the memory
> @@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
> int "CPU Jitter RNG Oversampling Rate"
> range 1 15
> default 1
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG allows the specification of an oversampling rate (OSR).
> The Jitter RNG operation requires a fixed amount of timing
> @@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
>
> config CRYPTO_JITTERENTROPY_TESTINTERFACE
> bool "CPU Jitter RNG Test Interface"
> - depends on CRYPTO_JITTERENTROPY
> help
> The test interface allows a privileged process to capture
> the raw unconditioned high resolution time stamp noise that
> @@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
>
> If unsure, select N.
>
> +endif # if CRYPTO_FIPS && EXPERT
> +
> +if !(CRYPTO_FIPS && EXPERT)
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
> + int
> + default 64
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
> + int
> + default 32
> +
> +config CRYPTO_JITTERENTROPY_OSR
> + int
> + default 1
> +
> +config CRYPTO_JITTERENTROPY_TESTINTERFACE
> + bool
> +
> +endif # if !(CRYPTO_FIPS && EXPERT)
> +endif # if CRYPTO_JITTERENTROPY
> +
> config CRYPTO_KDF800108_CTR
> tristate
> select CRYPTO_HMAC
Reviewed-by: Stephan Mueller <smueller@chronox.de>
Ciao
Stephan
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.7
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
2023-09-22 2:10 ` Herbert Xu
@ 2023-11-09 4:30 ` Herbert Xu
2023-11-10 1:30 ` pr-tracker-bot
2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2023-11-09 4:30 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit a312e07a65fb598ed239b940434392721385c722:
crypto: adiantum - flush destination page before unmapping (2023-11-01 12:58:42 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p2
for you to fetch changes up to 9aedd10fe38418319bd8ed55dc68a40ec04aaa05:
crypto: ahash - Set using_shash for cloned ahash wrapper over shash (2023-11-07 16:44:36 +0800)
----------------------------------------------------------------
This push fixes a regression in ahash and hides the Kconfig
sub-options for the jitter RNG.
----------------------------------------------------------------
Dmitry Safonov (1):
crypto: ahash - Set using_shash for cloned ahash wrapper over shash
Herbert Xu (1):
crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
crypto/Kconfig | 28 +++++++++++++++++++++++++---
crypto/ahash.c | 1 +
2 files changed, 26 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.7
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
@ 2023-11-10 1:30 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2023-11-10 1:30 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 9 Nov 2023 12:30:43 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.7-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3b220413438184b352b297e7cf593fa56999b5b3
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
2023-11-06 15:25 ` Stephan Mueller
@ 2023-11-10 9:04 ` Geert Uytterhoeven
1 sibling, 0 replies; 204+ messages in thread
From: Geert Uytterhoeven @ 2023-11-10 9:04 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Steffen Klassert, Stephan Müller,
Masahiro Yamada, linux-kbuild
Hi Herbert, Yamada-san,
On Mon, Nov 6, 2023 at 11:00 AM Herbert Xu <herbert@gondor.apana.org.au> wrote:
> On Thu, Nov 02, 2023 at 08:32:36PM -1000, Linus Torvalds wrote:
> > I think that would help the situation, but I assume the sizing for the
> > jitter buffer is at least partly due to trying to account for cache
> > sizing or similar issues?
> >
> > Which really means that I assume any static compile-time answer to
> > that question is always wrong - whether you are an expert or not.
> > Unless you are just building the thing for one particular machine.
> >
> > So I do think the problem is deeper than "this is a question only for
> > experts". I definitely don't think you should ask a regular user (or
> > even a distro kernel package manager). I suspect it's likely that the
> > question is just wrong in general - because any particular one buffer
> > size for any number of machines simply cannot be the right answer.
> >
> > I realize that the commit says "*allow* for configuration of memory
> > size", but I really question the whole approach.
>
> Yes I think these are all valid points. I just noticed that I
> forgot to cc the author so let's see if Stephan has anything to
> add.
>
> > But yes - hiding these questions from any reasonable normal user is at
> > least a good first step.
>
> OK here's the patch:
>
> ---8<---
> As JITTERENTROPY is selected by default if you enable the CRYPTO
> API, any Kconfig options added there will show up for every single
> user. Hide the esoteric options under EXPERT as well as FIPS so
> that only distro makers will see them.
>
> Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Thanks for your patch, which is now commit e7ed6473c2c8c4e4 ("crypto:
jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT").
> --- a/crypto/Kconfig
> +++ b/crypto/Kconfig
> @@ -1297,10 +1297,12 @@ config CRYPTO_JITTERENTROPY
>
> See https://www.chronox.de/jent.html
>
> +if CRYPTO_JITTERENTROPY
> +if CRYPTO_FIPS && EXPERT
> +
> choice
> prompt "CPU Jitter RNG Memory Size"
> default CRYPTO_JITTERENTROPY_MEMSIZE_2
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG measures the execution time of memory accesses.
> Multiple consecutive memory accesses are performed. If the memory
> @@ -1344,7 +1346,6 @@ config CRYPTO_JITTERENTROPY_OSR
> int "CPU Jitter RNG Oversampling Rate"
> range 1 15
> default 1
> - depends on CRYPTO_JITTERENTROPY
> help
> The Jitter RNG allows the specification of an oversampling rate (OSR).
> The Jitter RNG operation requires a fixed amount of timing
> @@ -1359,7 +1360,6 @@ config CRYPTO_JITTERENTROPY_OSR
>
> config CRYPTO_JITTERENTROPY_TESTINTERFACE
> bool "CPU Jitter RNG Test Interface"
> - depends on CRYPTO_JITTERENTROPY
> help
> The test interface allows a privileged process to capture
> the raw unconditioned high resolution time stamp noise that
> @@ -1377,6 +1377,28 @@ config CRYPTO_JITTERENTROPY_TESTINTERFACE
>
> If unsure, select N.
>
> +endif # if CRYPTO_FIPS && EXPERT
> +
> +if !(CRYPTO_FIPS && EXPERT)
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKS
> + int
> + default 64
> +
> +config CRYPTO_JITTERENTROPY_MEMORY_BLOCKSIZE
> + int
> + default 32
> +
> +config CRYPTO_JITTERENTROPY_OSR
> + int
> + default 1
> +
> +config CRYPTO_JITTERENTROPY_TESTINTERFACE
> + bool
This duplicates the symbols in the CRYPTO_FIPS && EXPERT section above,
which is fragile.
For the int and bool symbols, this can be handled without duplication
using:
config CRYPTO_JITTERENTROPY_OSR
- int "CPU Jitter RNG Oversampling Rate"
+ int "CPU Jitter RNG Oversampling Rate" if CRYPTO_FIPS && EXPERT
config CRYPTO_JITTERENTROPY_TESTINTERFACE
- bool "CPU Jitter RNG Test Interface"
+ bool "CPU Jitter RNG Test Interface" if CRYPTO_FIPS && EXPERT
Unfortunately the following does not work for the choice statement,
although kconfig does not report an error:
choice
- prompt "CPU Jitter RNG Memory Size"
+ prompt "CPU Jitter RNG Memory Size" if CRYPTO_FIPS && EXPERT
default CRYPTO_JITTERENTROPY_MEMSIZE_2
Unlike for other symbol types, which just become silent if
!(CRYPTO_FIPS && EXPERT), the choice is skipped completely if
!(CRYPTO_FIPS && EXPERT), and CRYPTO_JITTERENTROPY_MEMSIZE_2 is not set.
Yamada-san: Do you know why choice behaves differently?
Is this easy to fix?
Thanks!
> +
> +endif # if !(CRYPTO_FIPS && EXPERT)
> +endif # if CRYPTO_JITTERENTROPY
> +
> config CRYPTO_KDF800108_CTR
> tristate
> select CRYPTO_HMAC
Gr{oetje,eeting}s,
Geert
--
Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org
In personal conversations with technical people, I call myself a hacker. But
when I'm talking to journalists I just say "programmer" or something like that.
-- Linus Torvalds
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.8
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
2023-11-03 2:37 ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
@ 2024-01-09 22:17 ` Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
` (2 more replies)
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-01-09 22:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b85ea95d086471afb4ad062012a4d73cd328fa86:
Linux 6.7-rc1 (2023-11-12 16:19:07 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p1
for you to fetch changes up to b8910630c967ffee582289451ddb5f9f19c26872:
crypto: iaa - Account for cpu-less numa nodes (2023-12-29 11:25:56 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add incremental lskcipher/skcipher processing.
Algorithms:
- Remove SHA1 from drbg.
- Remove CFB and OFB.
Drivers:
- Add comp high perf mode configuration in hisilicon/zip.
- Add support for 420xx devices in qat.
- Add IAA Compression Accelerator driver.
----------------------------------------------------------------
Bharat Bhushan (2):
crypto: octeontx2 - By default allocate one CPT LF per CPT VF
crypto: octeontx2 - Fix cptvf driver cleanup
Chanho Park (1):
crypto: jh7110 - Correct deferred probe return
Chen Ni (1):
crypto: sa2ul - Return crypto_aead_setkey to transfer the error
Chenghai Huang (3):
crypto: hisilicon/zip - add zip comp high perf mode configuration
crypto: hisilicon/qm - delete a dbg function
crypto: hisilicon/sec2 - optimize the error return process
Chengming Zhou (1):
crypto: scomp - fix req->dst buffer overflow
Christophe JAILLET (1):
hwrng: virtio - Remove usage of the deprecated ida_simple_xx() API
Damian Muszynski (5):
crypto: qat - add sysfs_added flag for ras
crypto: qat - add sysfs_added flag for rate limiting
crypto: qat - fix error path in add_update_sla()
crypto: qat - fix mutex ordering in adf_rl
crypto: qat - generate dynamically arbiter mappings
Dan Carpenter (2):
crypto: rsa - add a check for allocation failure
crypto: qat - prevent underflow in rp2srv_store()
Dave Jiang (1):
dmaengine: idxd: add external module driver support for dsa_bus_type
Dimitri John Ledkov (4):
crypto: drbg - ensure most preferred type is FIPS health checked
crypto: drbg - update FIPS CTR self-checks to aes256
crypto: drbg - ensure drbg hmac sha512 is used in FIPS selftests
crypto: drbg - Remove SHA1 from drbg
Dinghao Liu (1):
crypto: ccp - fix memleak in ccp_init_dm_workarea
Eric Biggers (4):
crypto: sun8i-ss - use crypto_shash_tfm_digest() in sun8i_ss_hashkey()
crypto: shash - don't exclude async statuses from error stats
crypto: x86/sha1 - autoload if SHA-NI detected
crypto: x86/sha256 - autoload if SHA-NI detected
Giovanni Cabiddu (1):
crypto: qat - add NULL pointer check
Gonglei (Arei) (1):
crypto: virtio - Handle dataq logic with tasklet
Gustavo A. R. Silva (1):
crypto: p10-aes-gcm - Avoid -Wstringop-overflow warnings
Herbert Xu (31):
crypto: ccree - Silence gcc format-truncation false positive warnings
crypto: marvell/cesa - Silence gcc format-truncation false positive warnings
crypto: n2 - Silence gcc format-truncation false positive warnings
crypto: af_alg - Disallow multiple in-flight AIO requests
hwrng: core - Fix page fault dead lock on mmap-ed hwrng
crypto: s390/aes - Fix buffer overread in CTR mode
crypto: arm64/sm4 - Remove cfb(sm4)
crypto: x86/sm4 - Remove cfb(sm4)
crypto: crypto4xx - Remove cfb and ofb
crypto: aspeed - Remove cfb and ofb
crypto: atmel - Remove cfb and ofb
crypto: cpt - Remove cfb
crypto: nitrox - Remove cfb
crypto: ccp - Remove cfb and ofb
crypto: hifn_795x - Remove cfb and ofb
crypto: hisilicon/sec2 - Remove cfb and ofb
crypto: safexcel - Remove cfb and ofb
crypto: octeontx - Remove cfb
crypto: n2 - Remove cfb
crypto: starfive - Remove cfb and ofb
crypto: bcm - Remove ofb
crypto: ccree - Remove ofb
crypto: tcrypt - Remove cfb and ofb
crypto: testmgr - Remove cfb and ofb
crypto: cfb,ofb - Remove cfb and ofb
crypto: skcipher - Add internal state support
crypto: skcipher - Make use of internal state
crypto: arc4 - Add internal state
crypto: algif_skcipher - Fix stream cipher chaining
crypto: api - Disallow identical driver names
crypto: skcipher - Pass statesize for simple lskcipher instances
Jia Jie Ho (8):
crypto: starfive - Update driver dependencies
crypto: starfive - RSA poll csr for done status
crypto: starfive - Pad adata with zeroes
hwrng: starfive - Fix dev_err_probe return error
crypto: starfive - Remove unneeded NULL checks
crypto: starfive - Fix dev_err_probe return error
dt-bindings: rng: starfive: Add jh8100 compatible string
hwrng: starfive - Add runtime pm ops
Jiapeng Chong (1):
crypto: iaa - remove unneeded semicolon
Jie Wang (5):
crypto: qat - relocate and rename get_service_enabled()
crypto: qat - change signature of uof_get_num_objs()
crypto: qat - relocate portions of qat_4xxx code
crypto: qat - move fw config related structures
crypto: qat - add support for 420xx devices
Krzysztof Kozlowski (2):
dt-bindings: crypto: qcom-qce: constrain clocks for IPQ9574 QCE
dt-bindings: crypto: qcom-qce: constrain clocks for SM8150-compatible QCE
Longfang Liu (1):
MAINTAINERS: update SEC2/HPRE driver maintainers list
Lucas Segarra Fernandez (4):
crypto: qat - include pci.h for GET_DEV()
crypto: qat - add admin msgs for telemetry
crypto: qat - add support for device telemetry
crypto: qat - add support for ring pair level telemetry
Martin Kaiser (1):
hwrng: virtio - remove #ifdef guards for PM functions
Neil Armstrong (3):
dt-bindings: crypto: qcom,inline-crypto-engine: document the SM8650 ICE
dt-bindings: crypto: qcom-qce: document the SM8650 crypto engine
dt-bindings: crypto: qcom,prng: document SM8650
Nikita Zhandarovich (1):
crypto: safexcel - Add error handling for dma_map_sg() calls
Nithin Dabilpuram (2):
crypto: octeontx2 - register error interrupts for inline cptlf
crypto: octeontx2 - support setting ctx ilen for inline CPT LF
Om Prakash Singh (1):
dt-bindings: crypto: qcom-qce: document the SC7280 crypto engine
Ovidiu Panait (28):
crypto: sahara - remove FLAGS_NEW_KEY logic
crypto: sahara - fix cbc selftest failure
crypto: sahara - fix ahash selftest failure
crypto: sahara - fix processing requests with cryptlen < sg->length
crypto: sahara - fix error handling in sahara_hw_descriptor_create()
crypto: sahara - remove unused error field in sahara_dev
crypto: sahara - avoid skcipher fallback code duplication
crypto: rk3288 - Use helper to set reqsize
crypto: amlogic - Use helper to set reqsize
crypto: artpec6 - Use helper to set reqsize
crypto: stm32/cryp - Use helper to set reqsize
crypto: sl3516 - Use helper to set reqsize
crypto: sun8i-ce - Use helper to set reqsize
crypto: sun8i-ss - Use helper to set reqsize
crypto: sahara - handle zero-length aes requests
crypto: sahara - fix ahash reqsize
crypto: sahara - fix wait_for_completion_timeout() error handling
crypto: sahara - improve error handling in sahara_sha_process()
crypto: sahara - fix processing hash requests with req->nbytes < sg->length
crypto: sahara - do not resize req->src when doing hash operations
crypto: sahara - clean up macro indentation
crypto: sahara - use BIT() macro
crypto: sahara - use devm_clk_get_enabled()
crypto: sahara - use dev_err_probe()
crypto: sahara - remove 'active' flag from sahara_aes_reqctx struct
crypto: sahara - remove unnecessary NULL assignments
crypto: sahara - remove error message for bad aes request size
crypto: sahara - add support for crypto_engine
Rafał Miłecki (1):
dt-bindings: crypto: convert Inside Secure SafeXcel to the json-schema
Rob Herring (1):
hwrng: ingenic - Replace of_device.h with explicit of.h include
Sagar Vashnav (1):
crypto: lib/aesgcm - Add kernel docs for aesgcm_mac
Srujana Challa (7):
crypto: octeontx2 - remove CPT block reset
crypto: octeontx2 - add SGv2 support for CN10KB or CN10KA B0
crypto: octeontx2 - add devlink option to set t106 mode
crypto: octeontx2 - remove errata workaround for CN10KB or CN10KA B0 chip.
crypto: octeontx2 - add LF reset on queue disable
crypto: octeontx2 - update CPT inbound inline IPsec mailbox
crypto: octeontx2 - add ctx_val workaround
Thomas Bourgoin (1):
crypto: stm32/crc32 - fix parsing list of devices
Tianjia Zhang (1):
crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init
Tom Zanussi (16):
dmaengine: idxd: Rename drv_enable/disable_wq to idxd_drv_enable/disable_wq, and export
dmaengine: idxd: Export descriptor management functions
dmaengine: idxd: Export wq resource management functions
dmaengine: idxd: Add wq private data accessors
dmaengine: idxd: add callback support for iaa crypto
crypto: iaa - Add IAA Compression Accelerator Documentation
crypto: iaa - Add Intel IAA Compression Accelerator crypto driver core
crypto: iaa - Add per-cpu workqueue table with rebalancing
crypto: iaa - Add compression mode management along with fixed mode
crypto: iaa - Add support for deflate-iaa compression algorithm
crypto: iaa - Add irq support for the crypto async interface
crypto: iaa - Add IAA Compression Accelerator stats
dmaengine: idxd: Add support for device/wq defaults
crypto: iaa - Change desc->priv to 0
crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
crypto: iaa - Account for cpu-less numa nodes
Uwe Kleine-König (12):
hwrng: atmel - Convert to platform remove callback returning void
hwrng: cctrng - Convert to platform remove callback returning void
hwrng: exynos - Convert to platform remove callback returning void
hwrng: ingenic - Convert to platform remove callback returning void
hwrng: ks-sa - Convert to platform remove callback returning void
hwrng: mxc - Convert to platform remove callback returning void
hwrng: n2 - Convert to platform remove callback returning void
hwrng: npcm - Convert to platform remove callback returning void
hwrng: omap - Convert to platform remove callback returning void
hwrng: stm32 - Convert to platform remove callback returning void
hwrng: timeriomem - Convert to platform remove callback returning void
hwrng: xgene - Convert to platform remove callback returning void
Vegard Nossum (2):
crypto: shash - remove excess kerneldoc members
crypto: skcipher - remove excess kerneldoc members
WangJinchao (1):
crypto: tcrypt - add script tcrypt_speed_compare.py
Weili Qian (5):
crypto: hisilicon/qm - print device abnormal information
crypto: hisilicon/qm - remove incorrect type cast
crypto: hisilicon/sgl - small cleanups for sgl.c
crypto: hisilicon/qm - simplify the status of qm
crypto: hisilicon/qm - add comments and remove redundant array element
Wenkai Lin (1):
crypto: hisilicon/qm - add a function to set qm algs
Yang Yingliang (1):
hwrng: stm32 - add missing clk_disable_unprepare() in stm32_rng_init()
Zhiqi Song (4):
crypto: hisilicon/qm - save capability registers in qm init process
crypto: hisilicon/hpre - save capability registers in probe process
crypto: hisilicon/sec2 - save capability registers in probe process
crypto: hisilicon/zip - save capability registers in probe process
wangyangxin (1):
crypto: virtio - Wait for tasklet to complete on device remove
.../ABI/testing/debugfs-driver-qat_telemetry | 228 ++
Documentation/ABI/testing/debugfs-hisi-hpre | 2 +-
Documentation/ABI/testing/debugfs-hisi-sec | 2 +-
Documentation/ABI/testing/debugfs-hisi-zip | 2 +-
Documentation/crypto/device_drivers/index.rst | 9 +
Documentation/crypto/device_drivers/octeontx2.rst | 25 +
Documentation/crypto/index.rst | 1 +
.../bindings/crypto/inside-secure,safexcel.yaml | 86 +
.../bindings/crypto/inside-secure-safexcel.txt | 40 -
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../devicetree/bindings/crypto/qcom,prng.yaml | 1 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 14 +
.../bindings/rng/starfive,jh7110-trng.yaml | 6 +-
Documentation/driver-api/crypto/iaa/iaa-crypto.rst | 824 ++++++++
Documentation/driver-api/crypto/iaa/index.rst | 20 +
Documentation/driver-api/crypto/index.rst | 20 +
Documentation/driver-api/index.rst | 1 +
MAINTAINERS | 15 +-
arch/arm64/crypto/Kconfig | 6 +-
arch/arm64/crypto/sm4-ce-core.S | 158 --
arch/arm64/crypto/sm4-ce-glue.c | 108 +-
arch/arm64/crypto/sm4-ce.h | 3 -
arch/arm64/crypto/sm4-neon-core.S | 113 -
arch/arm64/crypto/sm4-neon-glue.c | 105 +-
arch/powerpc/crypto/aes-gcm-p10-glue.c | 2 +-
arch/s390/crypto/aes_s390.c | 4 +-
arch/s390/crypto/paes_s390.c | 4 +-
arch/x86/crypto/Kconfig | 8 +-
arch/x86/crypto/sha1_ssse3_glue.c | 7 +-
arch/x86/crypto/sha256_ssse3_glue.c | 7 +-
arch/x86/crypto/sm4-aesni-avx-asm_64.S | 52 -
arch/x86/crypto/sm4-aesni-avx2-asm_64.S | 55 -
arch/x86/crypto/sm4-avx.h | 4 -
arch/x86/crypto/sm4_aesni_avx2_glue.c | 26 -
arch/x86/crypto/sm4_aesni_avx_glue.c | 130 --
crypto/Kconfig | 23 -
crypto/Makefile | 2 -
crypto/af_alg.c | 14 +-
crypto/algapi.c | 1 +
crypto/algif_skcipher.c | 72 +-
crypto/arc4.c | 11 +-
crypto/cbc.c | 6 +-
crypto/cfb.c | 254 ---
crypto/drbg.c | 40 +-
crypto/ecb.c | 10 +-
crypto/lskcipher.c | 43 +-
crypto/ofb.c | 106 -
crypto/rsa.c | 2 +
crypto/scompress.c | 6 +
crypto/shash.c | 6 +-
crypto/skcipher.c | 80 +-
crypto/tcrypt.c | 76 -
crypto/testmgr.c | 74 +-
crypto/testmgr.h | 1148 ----------
drivers/char/hw_random/atmel-rng.c | 6 +-
drivers/char/hw_random/cctrng.c | 6 +-
drivers/char/hw_random/core.c | 36 +-
drivers/char/hw_random/exynos-trng.c | 6 +-
drivers/char/hw_random/ingenic-rng.c | 8 +-
drivers/char/hw_random/jh7110-trng.c | 10 +-
drivers/char/hw_random/ks-sa-rng.c | 6 +-
drivers/char/hw_random/mxc-rnga.c | 6 +-
drivers/char/hw_random/n2-drv.c | 6 +-
drivers/char/hw_random/npcm-rng.c | 6 +-
drivers/char/hw_random/omap-rng.c | 6 +-
drivers/char/hw_random/stm32-rng.c | 7 +-
drivers/char/hw_random/timeriomem-rng.c | 6 +-
drivers/char/hw_random/virtio-rng.c | 14 +-
drivers/char/hw_random/xgene-rng.c | 6 +-
drivers/crypto/Kconfig | 1 +
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 4 +-
.../crypto/allwinner/sun8i-ss/sun8i-ss-cipher.c | 5 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c | 25 +-
drivers/crypto/amcc/crypto4xx_alg.c | 14 -
drivers/crypto/amcc/crypto4xx_core.c | 40 -
drivers/crypto/amcc/crypto4xx_core.h | 4 -
drivers/crypto/amlogic/amlogic-gxl-cipher.c | 4 +-
drivers/crypto/aspeed/Kconfig | 4 +-
drivers/crypto/aspeed/aspeed-hace-crypto.c | 230 --
drivers/crypto/atmel-aes.c | 214 +-
drivers/crypto/atmel-tdes.c | 205 +-
drivers/crypto/axis/artpec6_crypto.c | 12 +-
drivers/crypto/bcm/cipher.c | 57 -
drivers/crypto/cavium/cpt/cptvf_algs.c | 24 -
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 19 -
drivers/crypto/ccp/ccp-crypto-aes.c | 18 -
drivers/crypto/ccp/ccp-ops.c | 5 +-
drivers/crypto/ccree/cc_aead.c | 10 +-
drivers/crypto/ccree/cc_cipher.c | 45 +-
drivers/crypto/gemini/sl3516-ce-cipher.c | 4 +-
drivers/crypto/hifn_795x.c | 126 +-
drivers/crypto/hisilicon/debugfs.c | 54 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 122 +-
drivers/crypto/hisilicon/qm.c | 264 ++-
drivers/crypto/hisilicon/qm_common.h | 4 -
drivers/crypto/hisilicon/sec2/sec.h | 7 +
drivers/crypto/hisilicon/sec2/sec_crypto.c | 43 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 2 -
drivers/crypto/hisilicon/sec2/sec_main.c | 72 +-
drivers/crypto/hisilicon/sgl.c | 12 +-
drivers/crypto/hisilicon/zip/zip_main.c | 227 +-
drivers/crypto/inside-secure/safexcel.c | 4 -
drivers/crypto/inside-secure/safexcel.h | 4 -
drivers/crypto/inside-secure/safexcel_cipher.c | 171 +-
drivers/crypto/intel/Kconfig | 1 +
drivers/crypto/intel/Makefile | 1 +
drivers/crypto/intel/iaa/Kconfig | 19 +
drivers/crypto/intel/iaa/Makefile | 12 +
drivers/crypto/intel/iaa/iaa_crypto.h | 173 ++
drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c | 92 +
drivers/crypto/intel/iaa/iaa_crypto_main.c | 2193 ++++++++++++++++++++
drivers/crypto/intel/iaa/iaa_crypto_stats.c | 312 +++
drivers/crypto/intel/iaa/iaa_crypto_stats.h | 53 +
drivers/crypto/intel/qat/Kconfig | 11 +
drivers/crypto/intel/qat/Makefile | 1 +
drivers/crypto/intel/qat/qat_420xx/Makefile | 4 +
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 528 +++++
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.h | 55 +
drivers/crypto/intel/qat/qat_420xx/adf_drv.c | 202 ++
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 339 +--
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.h | 52 -
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 277 +--
drivers/crypto/intel/qat/qat_common/Makefile | 4 +
.../intel/qat/qat_common/adf_accel_devices.h | 16 +-
.../crypto/intel/qat/qat_common/adf_accel_engine.c | 2 +-
drivers/crypto/intel/qat/qat_common/adf_admin.c | 37 +
drivers/crypto/intel/qat/qat_common/adf_admin.h | 4 +
.../crypto/intel/qat/qat_common/adf_cfg_common.h | 1 +
.../crypto/intel/qat/qat_common/adf_cfg_services.c | 27 +
.../crypto/intel/qat/qat_common/adf_cfg_services.h | 4 +
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 3 +
.../crypto/intel/qat/qat_common/adf_fw_config.h | 18 +
.../crypto/intel/qat/qat_common/adf_gen4_config.c | 287 +++
.../crypto/intel/qat/qat_common/adf_gen4_config.h | 11 +
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 238 +++
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 87 +
drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c | 153 ++
drivers/crypto/intel/qat/qat_common/adf_gen4_tl.h | 158 ++
drivers/crypto/intel/qat/qat_common/adf_init.c | 12 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 7 +-
drivers/crypto/intel/qat/qat_common/adf_rl.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 6 +-
.../intel/qat/qat_common/adf_sysfs_ras_counters.c | 7 +-
drivers/crypto/intel/qat/qat_common/adf_sysfs_rl.c | 8 +
.../crypto/intel/qat/qat_common/adf_telemetry.c | 288 +++
.../crypto/intel/qat/qat_common/adf_telemetry.h | 99 +
.../crypto/intel/qat/qat_common/adf_tl_debugfs.c | 710 +++++++
.../crypto/intel/qat/qat_common/adf_tl_debugfs.h | 117 ++
.../intel/qat/qat_common/icp_qat_fw_init_admin.h | 10 +
drivers/crypto/intel/qat/qat_common/icp_qat_hw.h | 14 +-
drivers/crypto/intel/qat/qat_common/icp_qat_uclo.h | 2 +-
drivers/crypto/intel/qat/qat_common/qat_hal.c | 6 +-
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 1 +
drivers/crypto/marvell/cesa/cesa.c | 6 +-
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 23 -
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 86 +-
drivers/crypto/marvell/octeontx2/cn10k_cpt.h | 27 +
drivers/crypto/marvell/octeontx2/otx2_cpt_common.h | 54 +-
.../crypto/marvell/octeontx2/otx2_cpt_devlink.c | 44 +-
.../crypto/marvell/octeontx2/otx2_cpt_hw_types.h | 9 +-
.../marvell/octeontx2/otx2_cpt_mbox_common.c | 26 +
drivers/crypto/marvell/octeontx2/otx2_cpt_reqmgr.h | 298 +++
drivers/crypto/marvell/octeontx2/otx2_cptlf.c | 139 +-
drivers/crypto/marvell/octeontx2/otx2_cptlf.h | 103 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf.h | 4 +
drivers/crypto/marvell/octeontx2/otx2_cptpf_main.c | 74 +-
drivers/crypto/marvell/octeontx2/otx2_cptpf_mbox.c | 82 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 49 +-
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 3 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf.h | 2 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 31 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h | 5 +
drivers/crypto/marvell/octeontx2/otx2_cptvf_main.c | 29 +-
drivers/crypto/marvell/octeontx2/otx2_cptvf_mbox.c | 28 +
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 162 +-
drivers/crypto/n2_core.c | 36 +-
drivers/crypto/rockchip/rk3288_crypto_skcipher.c | 4 +-
drivers/crypto/sa2ul.c | 3 +-
drivers/crypto/sahara.c | 845 ++++----
drivers/crypto/starfive/Kconfig | 2 +-
drivers/crypto/starfive/jh7110-aes.c | 77 +-
drivers/crypto/starfive/jh7110-cryp.c | 20 +-
drivers/crypto/starfive/jh7110-cryp.h | 12 +-
drivers/crypto/starfive/jh7110-rsa.c | 58 +-
drivers/crypto/stm32/stm32-crc32.c | 2 +-
drivers/crypto/stm32/stm32-cryp.c | 2 +-
drivers/crypto/virtio/virtio_crypto_common.h | 2 +
drivers/crypto/virtio/virtio_crypto_core.c | 26 +-
drivers/dma/idxd/Makefile | 2 +-
drivers/dma/idxd/bus.c | 6 +
drivers/dma/idxd/cdev.c | 6 +-
drivers/dma/idxd/defaults.c | 53 +
drivers/dma/idxd/device.c | 13 +-
drivers/dma/idxd/dma.c | 9 +-
drivers/dma/idxd/idxd.h | 83 +-
drivers/dma/idxd/init.c | 7 +
drivers/dma/idxd/irq.c | 12 +-
drivers/dma/idxd/submit.c | 9 +-
include/crypto/hash.h | 4 -
include/crypto/if_alg.h | 5 +
include/crypto/skcipher.h | 133 +-
include/linux/hisi_acc_qm.h | 28 +-
lib/crypto/aesgcm.c | 13 +
lib/crypto/mpi/ec.c | 3 +
tools/crypto/tcrypt/tcrypt_speed_compare.py | 190 ++
205 files changed, 10087 insertions(+), 5779 deletions(-)
create mode 100644 Documentation/ABI/testing/debugfs-driver-qat_telemetry
create mode 100644 Documentation/crypto/device_drivers/index.rst
create mode 100644 Documentation/crypto/device_drivers/octeontx2.rst
create mode 100644 Documentation/devicetree/bindings/crypto/inside-secure,safexcel.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/inside-secure-safexcel.txt
create mode 100644 Documentation/driver-api/crypto/iaa/iaa-crypto.rst
create mode 100644 Documentation/driver-api/crypto/iaa/index.rst
create mode 100644 Documentation/driver-api/crypto/index.rst
delete mode 100644 crypto/cfb.c
delete mode 100644 crypto/ofb.c
create mode 100644 drivers/crypto/intel/iaa/Kconfig
create mode 100644 drivers/crypto/intel/iaa/Makefile
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto.h
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_main.c
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_stats.c
create mode 100644 drivers/crypto/intel/iaa/iaa_crypto_stats.h
create mode 100644 drivers/crypto/intel/qat/qat_420xx/Makefile
create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c
create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_420xx_hw_data.h
create mode 100644 drivers/crypto/intel/qat/qat_420xx/adf_drv.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_fw_config.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_config.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_config.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_tl.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_telemetry.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_telemetry.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_tl_debugfs.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_tl_debugfs.h
create mode 100644 drivers/dma/idxd/defaults.c
create mode 100755 tools/crypto/tcrypt/tcrypt_speed_compare.py
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.8
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
@ 2024-01-10 20:38 ` pr-tracker-bot
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-01-10 20:38 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 10 Jan 2024 06:17:32 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0cb552aa97843f24549ce808883494138471c16b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
@ 2024-02-01 5:32 ` Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
` (2 more replies)
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-01 5:32 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 6613476e225e090cc9aad49be7fa504e290dd33d:
Linux 6.8-rc1 (2024-01-21 14:11:32 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p2
for you to fetch changes up to c5a2f74db71a849f3a60bc153d684d6d28a0c665:
crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)
----------------------------------------------------------------
This push fixes regressions in caam and qat.
----------------------------------------------------------------
Damian Muszynski (1):
crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
Gaurav Jain (1):
crypto: caam - fix asynchronous hash
drivers/crypto/caam/caamalg_qi2.c | 7 +++++--
drivers/crypto/caam/caamhash.c | 7 +++++--
drivers/crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 1 +
3 files changed, 11 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2024-02-01 18:23 ` pr-tracker-bot
2024-02-08 4:29 ` Herbert Xu
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-01 18:23 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 1 Feb 2024 13:32:53 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/8a2514c0c61f7d4587071b96b4be7481350b5bc9
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
@ 2024-02-08 4:29 ` Herbert Xu
2024-02-08 6:24 ` pr-tracker-bot
2024-02-21 9:10 ` Herbert Xu
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-08 4:29 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c5a2f74db71a849f3a60bc153d684d6d28a0c665:
crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p3
for you to fetch changes up to 24c890dd712f6345e382256cae8c97abb0406b70:
crypto: algif_hash - Remove bogus SGL free on zero-length error path (2024-02-02 18:08:12 +0800)
----------------------------------------------------------------
This push fixes regressions in cbc and algif_hash, as well as an
older NULL-pointer dereference in ccp.
----------------------------------------------------------------
Herbert Xu (2):
crypto: cbc - Ensure statesize is zero
crypto: algif_hash - Remove bogus SGL free on zero-length error path
Kim Phillips (1):
crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
crypto/algif_hash.c | 5 +++--
crypto/cbc.c | 3 +++
drivers/crypto/ccp/sev-dev.c | 10 ++++++++--
3 files changed, 14 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-08 4:29 ` Herbert Xu
@ 2024-02-08 6:24 ` pr-tracker-bot
2024-02-21 9:10 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-08 6:24 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 8 Feb 2024 12:29:53 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/047371968ffc470769f541d6933e262dc7085456
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-08 4:29 ` Herbert Xu
2024-02-08 6:24 ` pr-tracker-bot
@ 2024-02-21 9:10 ` Herbert Xu
2024-02-21 17:17 ` pr-tracker-bot
2024-02-28 8:07 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-21 9:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 24c890dd712f6345e382256cae8c97abb0406b70:
crypto: algif_hash - Remove bogus SGL free on zero-length error path (2024-02-02 18:08:12 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p4
for you to fetch changes up to c0ec2a712daf133d9996a8a1b7ee2d4996080363:
crypto: virtio/akcipher - Fix stack overflow on memcpy (2024-02-09 12:55:53 +0800)
----------------------------------------------------------------
This push fixes a stack overflow in virtio.
----------------------------------------------------------------
zhenwei pi (1):
crypto: virtio/akcipher - Fix stack overflow on memcpy
drivers/crypto/virtio/virtio_crypto_akcipher_algs.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-21 9:10 ` Herbert Xu
@ 2024-02-21 17:17 ` pr-tracker-bot
2024-02-28 8:07 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-21 17:17 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 21 Feb 2024 17:10:48 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d8be5a55b8e3f7eab8f36ceed2512f457f914318
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-21 9:10 ` Herbert Xu
2024-02-21 17:17 ` pr-tracker-bot
@ 2024-02-28 8:07 ` Herbert Xu
2024-02-28 17:48 ` pr-tracker-bot
2024-03-06 9:47 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-02-28 8:07 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c0ec2a712daf133d9996a8a1b7ee2d4996080363:
crypto: virtio/akcipher - Fix stack overflow on memcpy (2024-02-09 12:55:53 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p5
for you to fetch changes up to 1c0cf6d19690141002889d72622b90fc01562ce4:
crypto: arm64/neonbs - fix out-of-bounds access on short input (2024-02-24 08:37:24 +0800)
----------------------------------------------------------------
This push fixes a regression in lskcipher and an out-of-bound
access in arm64/neonbs.
----------------------------------------------------------------
Ard Biesheuvel (1):
crypto: arm64/neonbs - fix out-of-bounds access on short input
Herbert Xu (1):
crypto: lskcipher - Copy IV in lskcipher glue code always
arch/arm64/crypto/aes-neonbs-glue.c | 11 +++++++++++
crypto/lskcipher.c | 6 ++----
2 files changed, 13 insertions(+), 4 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-02-28 8:07 ` Herbert Xu
@ 2024-02-28 17:48 ` pr-tracker-bot
2024-03-06 9:47 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-02-28 17:48 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 28 Feb 2024 16:07:59 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p5
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e326df53af0021f48a481ce9d489efda636c2dc6
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.8
2024-02-28 8:07 ` Herbert Xu
2024-02-28 17:48 ` pr-tracker-bot
@ 2024-03-06 9:47 ` Herbert Xu
2024-03-06 16:33 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-03-06 9:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 1c0cf6d19690141002889d72622b90fc01562ce4:
crypto: arm64/neonbs - fix out-of-bounds access on short input (2024-02-24 08:37:24 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p6
for you to fetch changes up to c0afb6b88fbbc177fa322a835f874be217bffe45:
crypto: rk3288 - Fix use after free in unprepare (2024-03-01 18:33:29 +0800)
----------------------------------------------------------------
This push fixes potential use-after-frees in rk3288 and sun8i-ce.
----------------------------------------------------------------
Andrey Skvortsov (1):
crypto: sun8i-ce - Fix use after free in unprepare
Herbert Xu (1):
crypto: rk3288 - Fix use after free in unprepare
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 34 +++++++++++-----------
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 4 +--
2 files changed, 19 insertions(+), 19 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.8
2024-03-06 9:47 ` Herbert Xu
@ 2024-03-06 16:33 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-03-06 16:33 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 6 Mar 2024 17:47:40 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.8-p6
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/09dcdbac54f4e60c917251fea98a69e46817fe27
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.9
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
@ 2024-03-15 3:04 ` Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
` (2 more replies)
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-03-15 3:04 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c5a2f74db71a849f3a60bc153d684d6d28a0c665:
crypto: caam - fix asynchronous hash (2024-01-26 16:35:55 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p1
for you to fetch changes up to 6a8dbd71a70620c42d4fa82509204ba18231f28d:
Revert "crypto: remove CONFIG_CRYPTO_STATS" (2024-03-13 09:49:37 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Avoid unnecessary copying in scomp for trivial SG lists.
Algorithms:
- Optimise NEON CCM implementation on ARM64.
Drivers:
- Add queue stop/query debugfs support in hisilicon/qm.
----------------------------------------------------------------
Adam Guerin (6):
crypto: qat - remove unused macros in qat_comp_alg.c
crypto: qat - removed unused macro in adf_cnv_dbgfs.c
crypto: qat - avoid division by zero
crypto: qat - remove double initialization of value
crypto: qat - remove unnecessary description from comment
crypto: qat - fix comment structure
Ard Biesheuvel (8):
crypto: arm64/aes-ccm - Revert "Rewrite skcipher walker loop"
crypto: arm64/aes-ccm - Keep NEON enabled during skcipher walk
crypto: arm64/aes-ccm - Pass short inputs via stack buffer
crypto: arm64/aes-ccm - Replace bytewise tail handling with NEON permute
crypto: arm64/aes-ccm - Reuse existing MAC update for AAD input
crypto: arm64/aes-ccm - Cache round keys and unroll AES loops
crypto: arm64/aes-ccm - Merge encrypt and decrypt tail handling
crypto: arm64/aes-ccm - Merge finalization into en/decrypt asm helpers
Arnd Bergmann (2):
crypto: qat - avoid memcpy() overflow warning
crypto: arm/sha - fix function cast warnings
Barry Song (3):
crypto: hisilicon/zip - fix the missing CRYPTO_ALG_ASYNC in cra_flags
crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags
crypto: scomp - remove memcpy if sg_nents is 1 and pages are lowmem
Borislav Petkov (AMD) (1):
crypto: ccp - State in dmesg that TSME is enabled
Clay Chang (1):
KEYS: include header for EINVAL definition
Colin Ian King (2):
crypto: pcbc - remove redundant assignment to nbytes
crypto: asymmetric_keys - remove redundant pointer secs
Damian Muszynski (7):
crypto: qat - add heartbeat error simulator
crypto: qat - add auto reset on error
crypto: qat - change SLAs cleanup flow at shutdown
crypto: qat - resolve race condition during AER recovery
crypto: qat - fix ring to service map for dcc in 4xxx
crypto: qat - fix ring to service map for dcc in 420xx
crypto: qat - make ring to service map common for QAT GEN4
Dan Carpenter (1):
crypto: qat - uninitialized variable in adf_hb_error_inject_write()
Danny Tsen (1):
crypto: vmx - Move to arch/powerpc/crypto
David Wronek (1):
dt-bindings: crypto: ice: Document SC7180 inline crypto engine
Eric Biggers (2):
crypto: ahash - unexport crypto_hash_alg_has_setkey()
crypto: remove CONFIG_CRYPTO_STATS
Erick Archer (2):
crypto: sun8i-ce - Use kcalloc() instead of kzalloc()
crypto: qat - use kcalloc_node() instead of kzalloc_node()
Furong Zhou (3):
crypto: qat - add fatal error notify method
crypto: qat - disable arbitration before reset
crypto: qat - limit heartbeat notifications
Giovanni Cabiddu (1):
Documentation: qat: fix auto_reset section
Herbert Xu (2):
crypto: dh - Make public key test FIPS-only
Revert "crypto: remove CONFIG_CRYPTO_STATS"
Joachim Vandersmissen (2):
crypto: testmgr - remove unused xts4096 and xts512 algorithms from testmgr.c
crypto: rsa - restrict plaintext/ciphertext values more
Kilian Zinnecker (1):
crypto: rockchip - fix to check return value
Li RongQing (1):
crypto: virtio - remove duplicate check if queue is broken
Luca Weiss (1):
dt-bindings: qcom-qce: Add compatible for SM6350
Lukas Bulwahn (1):
MAINTAINERS: adjust file entries after crypto vmx file movement
Mario Limonciello (2):
crypto: ccp - Avoid discarding errors in psp_send_platform_access_msg()
crypto: ccp - Update return values for some unit tests
Markus Elfring (1):
crypto: virtio - Less function calls in __virtio_crypto_akcipher_do_req() after error detection
Martin Kaiser (1):
hwrng: hisi - use dev_err_probe
Minjie Du (1):
crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init()
Mun Chun Yep (4):
crypto: qat - update PFVF protocol for recovery
crypto: qat - re-enable sriov after pf reset
crypto: qat - add fatal error notification
crypto: qat - improve aer error reset handling
Qi Tao (3):
crypto: hisilicon/sec2 - updates the sec DFX function register
crypto: hisilicon/sec2 - modify nested macro call
crypto: hisilicon/sec2 - fix some cleanup issues
Quanyang Wang (1):
crypto: xilinx - call finalize with bh disabled
Randy Dunlap (1):
crypto: jitter - fix CRYPTO_JITTERENTROPY help text
Tom Zanussi (3):
crypto: iaa - Remove header table code
crypto: iaa - Fix async_disable descriptor leak
crypto: iaa - Fix comp/decomp delay statistics
Tudor Ambarus (1):
MAINTAINERS: Remove T Ambarus from few mchp entries
Varshini Rajendran (4):
dt-bindings: crypto: add sam9x7 in Atmel AES
dt-bindings: crypto: add sam9x7 in Atmel SHA
dt-bindings: crypto: add sam9x7 in Atmel TDES
dt-bindings: rng: atmel,at91-trng: add sam9x7 TRNG
Vladis Dronov (1):
crypto: tcrypt - add ffdhe2048(dh) test
Weili Qian (5):
crypto: hisilicon/qm - support get device state
crypto: hisilicon/qm - dump important registers values before resetting
crypto: hisilicon/qm - add stop function by hardware
crypto: hisilicon/qm - obtain stop queue status
crypto: hisilicon/qm - change function type to void
Wenkai Lin (2):
crypto: hisilicon - Fix smp_processor_id() warnings
crypto: hisilicon/sec - remove unused parameter
Documentation/ABI/testing/debugfs-driver-qat | 26 ++
Documentation/ABI/testing/debugfs-hisi-hpre | 22 ++
Documentation/ABI/testing/debugfs-hisi-sec | 22 ++
Documentation/ABI/testing/debugfs-hisi-zip | 22 ++
Documentation/ABI/testing/sysfs-driver-qat | 20 ++
.../bindings/crypto/atmel,at91sam9g46-aes.yaml | 6 +-
.../bindings/crypto/atmel,at91sam9g46-sha.yaml | 6 +-
.../bindings/crypto/atmel,at91sam9g46-tdes.yaml | 6 +-
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 1 +
.../devicetree/bindings/rng/atmel,at91-trng.yaml | 4 +
MAINTAINERS | 25 +-
arch/arm/crypto/sha256_glue.c | 13 +-
arch/arm/crypto/sha512-glue.c | 12 +-
arch/arm64/crypto/Kconfig | 1 +
arch/arm64/crypto/aes-ce-ccm-core.S | 265 ++++++++-------------
arch/arm64/crypto/aes-ce-ccm-glue.c | 154 ++++++++----
arch/arm64/crypto/aes-glue.c | 1 +
arch/powerpc/crypto/Kconfig | 20 ++
arch/powerpc/crypto/Makefile | 20 +-
{drivers/crypto/vmx => arch/powerpc/crypto}/aes.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aes_cbc.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aes_ctr.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aes_xts.c | 0
.../crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.h | 0
.../vmx => arch/powerpc/crypto}/aesp8-ppc.pl | 0
.../crypto/vmx => arch/powerpc/crypto}/ghash.c | 0
.../vmx => arch/powerpc/crypto}/ghashp8-ppc.pl | 0
{drivers/crypto/vmx => arch/powerpc/crypto}/vmx.c | 0
crypto/Kconfig | 5 +-
crypto/ahash.c | 21 +-
crypto/asymmetric_keys/verify_pefile.c | 4 +-
crypto/dh.c | 63 ++---
crypto/pcbc.c | 4 +-
crypto/rsa.c | 36 ++-
crypto/scompress.c | 38 ++-
crypto/tcrypt.c | 3 +
crypto/testmgr.c | 8 -
drivers/char/hw_random/hisi-rng.c | 6 +-
drivers/crypto/Kconfig | 14 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 2 +-
drivers/crypto/ccp/platform-access.c | 11 +-
drivers/crypto/ccp/psp-dev.c | 11 +-
drivers/crypto/hisilicon/debugfs.c | 58 +++++
drivers/crypto/hisilicon/hpre/hpre_main.c | 2 +-
drivers/crypto/hisilicon/qm.c | 184 +++++++++-----
drivers/crypto/hisilicon/sec2/sec_crypto.c | 33 +--
drivers/crypto/hisilicon/sec2/sec_main.c | 7 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 1 +
drivers/crypto/hisilicon/zip/zip_main.c | 2 +-
drivers/crypto/intel/iaa/iaa_crypto.h | 25 --
drivers/crypto/intel/iaa/iaa_crypto_comp_fixed.c | 1 -
drivers/crypto/intel/iaa/iaa_crypto_main.c | 122 ++--------
drivers/crypto/intel/iaa/iaa_crypto_stats.c | 30 ---
drivers/crypto/intel/iaa/iaa_crypto_stats.h | 8 +-
drivers/crypto/intel/qat/Kconfig | 14 ++
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 64 ++---
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 64 ++---
drivers/crypto/intel/qat/qat_common/Makefile | 2 +
.../intel/qat/qat_common/adf_accel_devices.h | 3 +
drivers/crypto/intel/qat/qat_common/adf_aer.c | 138 ++++++++++-
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_clock.c | 3 +
.../crypto/intel/qat/qat_common/adf_cnv_dbgfs.c | 1 -
.../crypto/intel/qat/qat_common/adf_common_drv.h | 10 +
drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c | 4 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 59 +++++
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c | 6 +-
.../crypto/intel/qat/qat_common/adf_heartbeat.c | 20 +-
.../crypto/intel/qat/qat_common/adf_heartbeat.h | 21 ++
.../intel/qat/qat_common/adf_heartbeat_dbgfs.c | 53 +++++
.../intel/qat/qat_common/adf_heartbeat_inject.c | 76 ++++++
.../crypto/intel/qat/qat_common/adf_hw_arbiter.c | 25 ++
drivers/crypto/intel/qat/qat_common/adf_init.c | 12 +
drivers/crypto/intel/qat/qat_common/adf_isr.c | 11 +-
drivers/crypto/intel/qat/qat_common/adf_pfvf_msg.h | 7 +-
.../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.c | 64 ++++-
.../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.h | 21 ++
.../intel/qat/qat_common/adf_pfvf_pf_proto.c | 8 +
.../intel/qat/qat_common/adf_pfvf_vf_proto.c | 6 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 20 +-
drivers/crypto/intel/qat/qat_common/adf_sriov.c | 38 ++-
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 37 +++
drivers/crypto/intel/qat/qat_common/adf_vf_isr.c | 2 -
.../crypto/intel/qat/qat_common/qat_comp_algs.c | 9 -
drivers/crypto/intel/qat/qat_common/qat_crypto.c | 4 +-
drivers/crypto/rockchip/rk3288_crypto.c | 5 +
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 12 +-
drivers/crypto/virtio/virtio_crypto_core.c | 2 -
drivers/crypto/vmx/.gitignore | 3 -
drivers/crypto/vmx/Kconfig | 14 --
drivers/crypto/vmx/Makefile | 23 --
drivers/crypto/vmx/ppc-xlate.pl | 231 ------------------
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 3 +
include/crypto/internal/hash.h | 2 -
include/crypto/public_key.h | 1 +
include/linux/hisi_acc_qm.h | 10 +-
tools/crypto/ccp/test_dbc.py | 8 +-
100 files changed, 1450 insertions(+), 1016 deletions(-)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_cbc.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_ctr.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aes_xts.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.h (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/aesp8-ppc.pl (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/ghash.c (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/ghashp8-ppc.pl (100%)
rename {drivers/crypto/vmx => arch/powerpc/crypto}/vmx.c (100%)
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_heartbeat_inject.c
delete mode 100644 drivers/crypto/vmx/.gitignore
delete mode 100644 drivers/crypto/vmx/Kconfig
delete mode 100644 drivers/crypto/vmx/Makefile
delete mode 100644 drivers/crypto/vmx/ppc-xlate.pl
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.9
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
@ 2024-03-15 21:51 ` Linus Torvalds
2024-03-16 4:39 ` Herbert Xu
2024-03-15 21:59 ` pr-tracker-bot
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2024-03-15 21:51 UTC (permalink / raw)
To: Herbert Xu
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Thu, 14 Mar 2024 at 20:04, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Drivers:
>
> - Add queue stop/query debugfs support in hisilicon/qm.
There's a lot more than that in there. Fairl ybig Intel qat updates
from what I can see, for example.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.9
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
@ 2024-03-15 21:59 ` pr-tracker-bot
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-03-15 21:59 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 15 Mar 2024 11:04:44 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c8e769961668ef56acabc67f040c58ed769c57e4
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.9
2024-03-15 21:51 ` Linus Torvalds
@ 2024-03-16 4:39 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2024-03-16 4:39 UTC (permalink / raw)
To: Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, Mar 15, 2024 at 02:51:47PM -0700, Linus Torvalds wrote:
> On Thu, 14 Mar 2024 at 20:04, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Drivers:
> >
> > - Add queue stop/query debugfs support in hisilicon/qm.
>
> There's a lot more than that in there. Fairl ybig Intel qat updates
> from what I can see, for example.
Sorry, one line got chopped off while I was creating the signed
tag:
- Improve error recovery in qat.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.9
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
2024-02-08 4:29 ` Herbert Xu
@ 2024-03-25 9:47 ` Herbert Xu
2024-03-25 18:18 ` pr-tracker-bot
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-03-25 9:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 6a8dbd71a70620c42d4fa82509204ba18231f28d:
Revert "crypto: remove CONFIG_CRYPTO_STATS" (2024-03-13 09:49:37 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p2
for you to fetch changes up to 5a7e89d3315d1be86aff8a8bf849023cda6547f7:
crypto: iaa - Fix nr_cpus < nr_iaa case (2024-03-22 19:42:20 +0800)
----------------------------------------------------------------
This push fixes a regression that broke iwd as well as a divide by
zero in iaa.
----------------------------------------------------------------
Eric Biggers (1):
Revert "crypto: pkcs7 - remove sha1 support"
Tom Zanussi (1):
crypto: iaa - Fix nr_cpus < nr_iaa case
crypto/asymmetric_keys/mscode_parser.c | 3 ++
crypto/asymmetric_keys/pkcs7_parser.c | 4 ++
crypto/asymmetric_keys/public_key.c | 3 +-
crypto/asymmetric_keys/signature.c | 2 +-
crypto/asymmetric_keys/x509_cert_parser.c | 8 +++
crypto/testmgr.h | 80 ++++++++++++++++++++++++++++++
drivers/crypto/intel/iaa/iaa_crypto_main.c | 10 ++--
include/linux/oid_registry.h | 4 ++
kernel/module/Kconfig | 5 ++
9 files changed, 114 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.9
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
@ 2024-03-25 18:18 ` pr-tracker-bot
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-03-25 18:18 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 25 Mar 2024 17:47:43 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.9-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/174fdc93a241af54772ae3e745ec719e9f6cebfc
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.10
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
2024-03-15 21:59 ` pr-tracker-bot
@ 2024-05-13 3:50 ` Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
` (2 more replies)
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-13 3:50 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 174fdc93a241af54772ae3e745ec719e9f6cebfc:
Merge tag 'v6.9-p2' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 (2024-03-25 10:48:23 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p1
for you to fetch changes up to 13909a0c88972c5ef5d13f44d1a8bf065a31bdf4:
crypto: atmel-sha204a - provide the otp content (2024-05-10 17:15:25 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Remove crypto stats interface.
Algorithms:
- Add faster AES-XTS on modern x86_64 CPUs.
- Forbid curves with order less than 224 bits in ecc (FIPS 186-5).
- Add ECDSA NIST P521.
Drivers:
- Expose otp zone in atmel.
- Add dh fallback for primes > 4K in qat.
- Add interface for live migration in qat.
- Use dma for aes requests in starfive.
- Add full DMA support for stm32mpx in stm32.
- Add Tegra Security Engine driver.
Others:
- Introduce scope-based x509_certificate allocation.
----------------------------------------------------------------
Adam Guerin (2):
crypto: qat - improve error message in adf_get_arbiter_mapping()
crypto: qat - improve error logging to be consistent across features
Akhil R (3):
dt-bindings: crypto: Add Tegra Security Engine
gpu: host1x: Add Tegra SE to SID table
crypto: tegra - Add Tegra Security Engine driver
Aleksandr Mishin (1):
crypto: bcm - Fix pointer arithmetic
Animesh Agarwal (1):
dt-bindings: crypto: ti,omap-sham: Convert to dtschema
Ard Biesheuvel (1):
crypto: arm64/aes-ce - Simplify round key load sequence
Arnd Bergmann (1):
crypto: ccp - drop platform ifdef checks
Chang S. Bae (2):
crypto: x86/aesni - Rearrange AES key size check
crypto: x86/aesni - Update aesni_set_key() to return void
Chen Ni (1):
crypto: octeontx2 - add missing check for dma_map_single
Chenghai Huang (10):
crypto: hisilicon/sec - Add the condition for configuring the sriov function
crypto: hisilicon/debugfs - Fix debugfs uninit process issue
crypto: hisilicon/sgl - Delete redundant parameter verification
crypto: hisilicon/debugfs - Fix the processing logic issue in the debugfs creation
crypto: hisilicon/qm - Add the default processing branch
crypto: hisilicon - Adjust debugfs creation and release order
crypto: hisilicon/sec - Fix memory leak for sec resource release
crypto: hisilicon/debugfs - Resolve the problem of applying for redundant space in sq dump
crypto: hisilicon/qm - Add the err memory release process to qm uninit
crypto: hisilicon/debugfs - mask the unnecessary info from the dump
Colin Ian King (1):
crypto: qat - Fix spelling mistake "Invalide" -> "Invalid"
Damian Muszynski (1):
crypto: qat - implement dh fallback for primes > 4K
Dan Carpenter (1):
crypto: tegra - Fix some error codes
Eric Biggers (24):
crypto: remove CONFIG_CRYPTO_STATS
x86: add kconfig symbols for assembler VAES and VPCLMULQDQ support
crypto: x86/aes-xts - add AES-XTS assembly macro for modern CPUs
crypto: x86/aes-xts - wire up AESNI + AVX implementation
crypto: x86/aes-xts - wire up VAES + AVX2 implementation
crypto: x86/aes-xts - wire up VAES + AVX10/256 implementation
crypto: x86/aes-xts - wire up VAES + AVX10/512 implementation
crypto: x86/nh-avx2 - add missing vzeroupper
crypto: x86/sha256-avx2 - add missing vzeroupper
crypto: x86/sha512-avx2 - add missing vzeroupper
crypto: x86/aes-xts - make non-AVX implementation use new glue code
crypto: x86/aes-xts - access round keys using single-byte offsets
crypto: x86/sha256-ni - convert to use rounds macros
crypto: x86/sha256-ni - rename some register aliases
crypto: x86/sha256-ni - optimize code size
crypto: x86/sha256-ni - simplify do_4rounds
crypto: x86/aes-xts - handle CTS encryption more efficiently
crypto: x86/aesni-xts - deduplicate aesni_xts_enc() and aesni_xts_dec()
crypto: x86/aes-xts - handle AES-128 and AES-192 more efficiently
crypto: x86/aes-xts - eliminate a few more instructions
crypto: x86/aes-xts - optimize size of instructions operating on lengths
crypto: x86/aes-xts - simplify loop in xts_crypt_slowpath()
crypto: x86/aes-gcm - delete unused GCM assembly code
crypto: x86/aes-gcm - simplify GCM hash subkey derivation
Geert Uytterhoeven (1):
dt-bindings: crypto: starfive: Restore sort order
Giovanni Cabiddu (3):
crypto: qat - adf_get_etr_base() helper
crypto: qat - relocate CSR access code
crypto: qat - specify firmware files for 402xx
Gustavo A. R. Silva (2):
crypto: nx - Avoid -Wflex-array-member-not-at-end warning
crypto: qat - Avoid -Wflex-array-member-not-at-end warnings
Hailey Mothershead (1):
crypto: aead,cipher - zeroize key buffer after use
Herbert Xu (1):
padata: Disable BH when taking works lock on MT path
Jerry Snitselaar (1):
crypto: iaa - Fix some errors in IAA documentation
Jia Jie Ho (8):
dt-bindings: crypto: starfive: Add jh8100 support
crypto: starfive - Update hash dma usage
crypto: starfive - Skip unneeded key free
crypto: starfive - Use dma for aes requests
crypto: starfive - Skip dma setup for zeroed message
crypto: starfive - Skip unneeded fallback allocation
crypto: starfive - Do not free stack buffer
crypto: starfive - Use fallback for unaligned dma access
Joachim Vandersmissen (2):
crypto: ecc - update ecc_gen_privkey for FIPS 186-5
crypto: ecdh - explicitly zeroize private_key
Joel Granados (1):
crypto: fips - Remove the now superfluous sentinel element from ctl_table array
Li Zhijian (1):
hwrng: core - Convert sprintf/snprintf to sysfs_emit
Lothar Rubusch (4):
crypto: atmel-i2c - add missing arg description
crypto: atmel-i2c - rename read function
crypto: atmel-sha204a - add reading from otp zone
crypto: atmel-sha204a - provide the otp content
Luca Weiss (1):
dt-bindings: crypto: ice: Document sc7280 inline crypto engine
Lucas Segarra Fernandez (1):
crypto: qat - validate slices count returned by FW
Lukas Wunner (1):
X.509: Introduce scope-based x509_certificate allocation
Marek Vasut (3):
hwrng: stm32 - use logical OR in conditional
hwrng: stm32 - put IP into RPM suspend on failure
hwrng: stm32 - repair clock handling
Maxime Méré (1):
crypto: stm32/hash - add full DMA support for stm32mpx
Pankaj Gupta (2):
crypto: caam - init-clk based on caam-page0-access
crypto: caam - i.MX8ULP donot have CAAM page0 access
Roman Smirnov (2):
crypto: ecc - remove checks in crypto_ecdh_shared_secret() and ecc_make_pub_key()
crypto: algboss - remove NULL check in cryptomgr_schedule_probe()
Siming Wan (3):
crypto: qat - rename get_sla_arr_of_type()
crypto: qat - expand CSR operations for QAT GEN4 devices
crypto: qat - add bank save and restore flows
Stefan Berger (16):
crypto: ecdsa - Fix module auto-load on add-key
crypto: ecc - Use ECC_CURVE_NIST_P192/256/384_DIGITS where possible
crypto: ecdsa - Convert byte arrays with key coordinates to digits
crypto: ecdsa - Adjust tests on length of key parameters
crypto: ecdsa - Extend res.x mod n calculation for NIST P521
crypto: ecc - Add nbits field to ecc_curve structure
crypto: ecc - Implement vli_mmod_fast_521 for NIST p521
crypto: ecc - Add special case for NIST P521 in ecc_point_mult
crypto: ecc - Add NIST P521 curve parameters
crypto: ecdsa - Replace ndigits with nbits where precision is needed
crypto: ecdsa - Rename keylen to bufsize where necessary
crypto: ecdsa - Register NIST P521 and extend test suite
crypto: asymmetric_keys - Adjust signature size calculation for NIST P521
crypto: x509 - Add OID for NIST P521 and extend parser for it
crypto: ecdh - Pass private key in proper byte order to check valid key
crypto: ecdh - Initialize ctx->private_key in proper byte order
Thorsten Blum (4):
crypto: jitter - Use kvfree_sensitive() to fix Coccinelle warning
crypto: jitter - Remove duplicate word in comment
crypto: jitter - Replace http with https
crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
Tom Zanussi (5):
crypto: iaa - fix decomp_bytes_in stats
crypto: iaa - Remove comp/decomp delay statistics
crypto: iaa - Add global_stats file and remove individual stat files
crypto: iaa - Change iaa statistics to atomic64_t
crypto: iaa - Use cpumask_weight() when rebalancing
Uwe Kleine-König (2):
hwrng: mxc-rnga - Drop usage of platform_driver_probe()
crypto: tegra - Convert to platform remove callback returning void
Vitaly Chikunov (1):
crypto: ecrdsa - Fix module auto-load on add_key
Wenkai Lin (1):
crypto: hisilicon/sec2 - fix for register offset
Wolfram Sang (2):
crypto: api - use 'time_left' variable with wait_for_completion_killable_timeout()
crypto: sahara - use 'time_left' variable with wait_for_completion_timeout()
Xin Zeng (4):
crypto: qat - relocate and rename 4xxx PF2VM definitions
crypto: qat - move PFVF compat checker to a function
crypto: qat - add interface for live migration
crypto: qat - implement interface for live migration
.../bindings/crypto/nvidia,tegra234-se-aes.yaml | 52 +
.../bindings/crypto/nvidia,tegra234-se-hash.yaml | 52 +
.../devicetree/bindings/crypto/omap-sham.txt | 28 -
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 1 +
.../bindings/crypto/starfive,jh7110-crypto.yaml | 30 +-
.../devicetree/bindings/crypto/ti,omap-sham.yaml | 56 +
Documentation/driver-api/crypto/iaa/iaa-crypto.rst | 96 +-
MAINTAINERS | 5 +
arch/arm64/crypto/aes-ce.S | 34 +-
arch/arm64/crypto/aes-neon.S | 20 +-
arch/s390/configs/debug_defconfig | 1 -
arch/s390/configs/defconfig | 1 -
arch/x86/Kconfig.assembler | 10 +
arch/x86/crypto/Makefile | 3 +-
arch/x86/crypto/aes-xts-avx-x86_64.S | 845 +++++++++
arch/x86/crypto/aesni-intel_asm.S | 469 +----
arch/x86/crypto/aesni-intel_glue.c | 420 +++--
arch/x86/crypto/nh-avx2-x86_64.S | 1 +
arch/x86/crypto/sha256-avx2-asm.S | 1 +
arch/x86/crypto/sha256_ni_asm.S | 251 +--
arch/x86/crypto/sha512-avx2-asm.S | 1 +
crypto/Kconfig | 20 -
crypto/Makefile | 2 -
crypto/acompress.c | 33 -
crypto/aead.c | 87 +-
crypto/ahash.c | 63 +-
crypto/akcipher.c | 31 -
crypto/algboss.c | 3 -
crypto/api.c | 8 +-
crypto/asymmetric_keys/public_key.c | 14 +-
crypto/asymmetric_keys/x509_cert_parser.c | 46 +-
crypto/asymmetric_keys/x509_parser.h | 3 +
crypto/asymmetric_keys/x509_public_key.c | 31 +-
crypto/cipher.c | 3 +-
crypto/compress.h | 3 -
crypto/{crypto_user_base.c => crypto_user.c} | 10 +-
crypto/crypto_user_stat.c | 176 --
crypto/ecc.c | 100 +-
crypto/ecc_curve_defs.h | 49 +
crypto/ecdh.c | 11 +-
crypto/ecdsa.c | 66 +-
crypto/ecrdsa.c | 1 +
crypto/ecrdsa_defs.h | 5 +
crypto/fips.c | 1 -
crypto/hash.h | 30 -
crypto/jitterentropy-kcapi.c | 3 +-
crypto/jitterentropy.c | 4 +-
crypto/kpp.c | 30 -
crypto/lskcipher.c | 73 +-
crypto/rng.c | 44 +-
crypto/scompress.c | 3 -
crypto/shash.c | 75 +-
crypto/sig.c | 13 -
crypto/skcipher.c | 86 +-
crypto/skcipher.h | 10 -
crypto/testmgr.c | 7 +
crypto/testmgr.h | 146 ++
drivers/char/hw_random/core.c | 2 +-
drivers/char/hw_random/mxc-rnga.c | 9 +-
drivers/char/hw_random/stm32-rng.c | 18 +-
drivers/crypto/Kconfig | 8 +
drivers/crypto/Makefile | 1 +
drivers/crypto/atmel-i2c.c | 30 +-
drivers/crypto/atmel-i2c.h | 8 +-
drivers/crypto/atmel-sha204a.c | 68 +
drivers/crypto/bcm/spu2.c | 2 +-
drivers/crypto/caam/ctrl.c | 19 +-
drivers/crypto/ccp/sp-platform.c | 14 +-
drivers/crypto/hisilicon/debugfs.c | 65 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 23 +-
drivers/crypto/hisilicon/qm.c | 8 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 4 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 32 +-
drivers/crypto/hisilicon/sgl.c | 5 +-
drivers/crypto/hisilicon/zip/zip_main.c | 24 +-
drivers/crypto/intel/iaa/iaa_crypto.h | 16 +-
drivers/crypto/intel/iaa/iaa_crypto_main.c | 23 +-
drivers/crypto/intel/iaa/iaa_crypto_stats.c | 183 +-
drivers/crypto/intel/iaa/iaa_crypto_stats.h | 8 -
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 5 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 7 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 2 +
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 1 +
.../intel/qat/qat_c3xxxvf/adf_c3xxxvf_hw_data.c | 1 +
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 1 +
.../intel/qat/qat_c62xvf/adf_c62xvf_hw_data.c | 1 +
drivers/crypto/intel/qat/qat_common/Makefile | 6 +-
.../intel/qat/qat_common/adf_accel_devices.h | 88 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 10 +
.../intel/qat/qat_common/adf_gen2_hw_csr_data.c | 101 +
.../intel/qat/qat_common/adf_gen2_hw_csr_data.h | 86 +
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.c | 97 -
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.h | 76 -
.../intel/qat/qat_common/adf_gen4_hw_csr_data.c | 231 +++
.../intel/qat/qat_common/adf_gen4_hw_csr_data.h | 188 ++
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 380 +++-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 127 +-
.../crypto/intel/qat/qat_common/adf_gen4_pfvf.c | 8 +-
drivers/crypto/intel/qat/qat_common/adf_gen4_tl.c | 1 +
.../crypto/intel/qat/qat_common/adf_gen4_vf_mig.c | 1010 ++++++++++
.../crypto/intel/qat/qat_common/adf_gen4_vf_mig.h | 10 +
.../crypto/intel/qat/qat_common/adf_mstate_mgr.c | 318 ++++
.../crypto/intel/qat/qat_common/adf_mstate_mgr.h | 89 +
.../intel/qat/qat_common/adf_pfvf_pf_proto.c | 8 +-
.../crypto/intel/qat/qat_common/adf_pfvf_utils.h | 11 +
drivers/crypto/intel/qat/qat_common/adf_rl.c | 12 +-
drivers/crypto/intel/qat/qat_common/adf_rl.h | 2 +
drivers/crypto/intel/qat/qat_common/adf_sriov.c | 7 +-
.../crypto/intel/qat/qat_common/adf_telemetry.c | 21 +
.../crypto/intel/qat/qat_common/adf_telemetry.h | 1 +
.../crypto/intel/qat/qat_common/adf_transport.c | 4 +-
.../crypto/intel/qat/qat_common/qat_asym_algs.c | 66 +-
drivers/crypto/intel/qat/qat_common/qat_bl.c | 6 +-
drivers/crypto/intel/qat/qat_common/qat_bl.h | 11 +-
drivers/crypto/intel/qat/qat_common/qat_mig_dev.c | 130 ++
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 1 +
.../qat/qat_dh895xccvf/adf_dh895xccvf_hw_data.c | 1 +
drivers/crypto/marvell/octeontx2/cn10k_cpt.c | 4 +
drivers/crypto/nx/nx-842.c | 6 +-
drivers/crypto/nx/nx-842.h | 10 +-
drivers/crypto/sahara.c | 16 +-
drivers/crypto/starfive/Kconfig | 4 +
drivers/crypto/starfive/jh7110-aes.c | 603 ++++--
drivers/crypto/starfive/jh7110-cryp.c | 43 -
drivers/crypto/starfive/jh7110-cryp.h | 10 +-
drivers/crypto/starfive/jh7110-hash.c | 285 ++-
drivers/crypto/starfive/jh7110-rsa.c | 14 +-
drivers/crypto/stm32/stm32-hash.c | 570 ++++--
drivers/crypto/tegra/Makefile | 9 +
drivers/crypto/tegra/tegra-se-aes.c | 1933 ++++++++++++++++++++
drivers/crypto/tegra/tegra-se-hash.c | 1060 +++++++++++
drivers/crypto/tegra/tegra-se-key.c | 156 ++
drivers/crypto/tegra/tegra-se-main.c | 437 +++++
drivers/crypto/tegra/tegra-se.h | 560 ++++++
drivers/gpu/host1x/dev.c | 24 +
include/crypto/acompress.h | 73 +-
include/crypto/aead.h | 21 -
include/crypto/akcipher.h | 78 +-
include/crypto/algapi.h | 3 -
include/crypto/ecc_curve.h | 2 +
include/crypto/ecdh.h | 1 +
include/crypto/hash.h | 22 -
include/crypto/internal/acompress.h | 1 -
include/crypto/internal/cryptouser.h | 16 -
include/crypto/internal/ecc.h | 27 +-
include/crypto/internal/scompress.h | 1 -
include/crypto/kpp.h | 58 +-
include/crypto/rng.h | 51 +-
include/crypto/skcipher.h | 25 -
include/linux/compiler.h | 2 +
include/linux/oid_registry.h | 1 +
include/linux/qat/qat_mig_dev.h | 31 +
include/uapi/linux/cryptouser.h | 30 +-
kernel/padata.c | 8 +-
154 files changed, 10335 insertions(+), 3222 deletions(-)
create mode 100644 Documentation/devicetree/bindings/crypto/nvidia,tegra234-se-aes.yaml
create mode 100644 Documentation/devicetree/bindings/crypto/nvidia,tegra234-se-hash.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/omap-sham.txt
create mode 100644 Documentation/devicetree/bindings/crypto/ti,omap-sham.yaml
create mode 100644 arch/x86/crypto/aes-xts-avx-x86_64.S
rename crypto/{crypto_user_base.c => crypto_user.c} (98%)
delete mode 100644 crypto/crypto_user_stat.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen2_hw_csr_data.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen2_hw_csr_data.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_hw_csr_data.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_hw_csr_data.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_vf_mig.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_gen4_vf_mig.h
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_mstate_mgr.c
create mode 100644 drivers/crypto/intel/qat/qat_common/adf_mstate_mgr.h
create mode 100644 drivers/crypto/intel/qat/qat_common/qat_mig_dev.c
create mode 100644 drivers/crypto/tegra/Makefile
create mode 100644 drivers/crypto/tegra/tegra-se-aes.c
create mode 100644 drivers/crypto/tegra/tegra-se-hash.c
create mode 100644 drivers/crypto/tegra/tegra-se-key.c
create mode 100644 drivers/crypto/tegra/tegra-se-main.c
create mode 100644 drivers/crypto/tegra/tegra-se.h
delete mode 100644 include/crypto/internal/cryptouser.h
create mode 100644 include/linux/qat/qat_mig_dev.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
@ 2024-05-13 22:12 ` Linus Torvalds
2024-05-14 5:17 ` Herbert Xu
2024-05-14 6:54 ` Lukas Wunner
2024-05-13 22:38 ` pr-tracker-bot
2024-07-18 13:49 ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Linus Torvalds @ 2024-05-13 22:12 UTC (permalink / raw)
To: Herbert Xu, Lukas Wunner
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sun, 12 May 2024 at 20:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Lukas Wunner (1):
> X.509: Introduce scope-based x509_certificate allocation
I absolutely hate how this commit tries to remove one single compare
instruction by introducing a *very* dangerous hack.
The whole 'assume()' thing will generate actively wrong code if that
assumption conditional doesn't hold, to the point of being completely
impossible to debug.
Having random kernel code add random "assume()" lines is absolutely
not what we should do. Particularly not in some random code sequence
where it absolutely does not matter ONE WHIT.
Now, I've pulled this, but I killed that "assume()" hackery in my merge.
Because there is no way we will ever encourage random code to make
these kinds of patterns, and I most definitely do not want anybody
else to try to copy that horrendous thing.
Yes, yes, we have "unreachable()" in other places, and yes, you can
make compilers generate garbage by using that incorrectly. But they
should be about obvious code warning issues, not about "let's save one
conditional instruction".
Now, if somebody really *really* cares about that one extraneous
conditional, particularly if it shows up in some more important place
than some random certificate parsing routine where is most definitely
is not in the least critical, there are better models for this
optimization.
Maybe somebody can teach the kernel build in *general* that
"kmalloc()" and friends never return an error pointer, only NULL or
success? That would not necessarily be a bad idea if the scope-based
cleanup otherwise causes issues.
But this kind of hacky "one random piece of kernel code uses a very
dangerous pattern to state that some *other* piece of kernel code has
particular return patterns" - that is not at all acceptable.
Put another way: it would probably be ok if the SLAB people added some
"this function cannot return error codes" annotation on their core
declaration and it fixed an issue in _general_.
But it is *not* ok if random kernel code starts randomly asserting the
same thing.
Quod licet Iovi, non licet bovi.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
@ 2024-05-13 22:38 ` pr-tracker-bot
2024-07-18 13:49 ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-05-13 22:38 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 13 May 2024 11:50:03 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/84c7d76b5ab6a52e1b3d8101b9f910c128dca396
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 22:12 ` Linus Torvalds
@ 2024-05-14 5:17 ` Herbert Xu
2024-05-14 5:41 ` Linus Torvalds
2024-05-14 6:54 ` Lukas Wunner
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-05-14 5:17 UTC (permalink / raw)
To: Linus Torvalds
Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
>
> Maybe somebody can teach the kernel build in *general* that
> "kmalloc()" and friends never return an error pointer, only NULL or
> success? That would not necessarily be a bad idea if the scope-based
> cleanup otherwise causes issues.
Yes he did try this out:
https://lore.kernel.org/all/20240302082751.GA25828@wunner.de/
It resulted in an increase in total vmlinux size although I don't
think anyone looked into the reason for it.
> But this kind of hacky "one random piece of kernel code uses a very
> dangerous pattern to state that some *other* piece of kernel code has
> particular return patterns" - that is not at all acceptable.
Agreed.
However, this patch still has two outstanding build defects which
have not been addressed:
https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
So I might end up just reverting it.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-14 5:17 ` Herbert Xu
@ 2024-05-14 5:41 ` Linus Torvalds
2024-05-14 6:02 ` Herbert Xu
0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2024-05-14 5:41 UTC (permalink / raw)
To: Herbert Xu
Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, 13 May 2024 at 22:17, Herbert Xu <herbert@gondor.apana.org.au> wrote:
>
> Yes he did try this out:
>
> https://lore.kernel.org/all/20240302082751.GA25828@wunner.de/
>
> It resulted in an increase in total vmlinux size although I don't
> think anyone looked into the reason for it.
I think the basic issue is that the whole 'assume()' logic of "if (x)
unreachable()" is very fragile.
Basically, it *can* generate the exact code you want by basically
telling the compiler that if some condition is true, then the compiler
can jump to unreachable code, and then depending on the phase of the
moon, the compiler may get the whole "I can assume this is never
true".
BUT.
The reason I hated seeing it so much is exactly that it's basically
depending on everything going just right.
When things do *not* go right, it causes the compiler to instead
actually generate the extra code for the conditional, and actually
generate a conditional jump to something that the compiler then
decides it can do anything to, since it's unreachable.
So now you generate extra code, and generate a branch to nonsense.
> However, this patch still has two outstanding build defects which
> have not been addressed:
>
> https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
This one just seems to be a sanity check for "you shouldn't check
kmalloc() for ERR_PTR", so it's a validation test that then doesn't
like the new test in that 'assume()'.
And the second one:
> https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
looks *very* much like the cases we've seen with clang in particular
where clang goes "this code isn't reachable, so I'll just drop
everything on the floor", and then it just becomes a fallthrough to
whatever else code happens to come next. Most of the time that's just
more (unrelated) code in the same function, but sometimes it causes
that "falls through to next function" instead, entirely randomly
depending on how the code was laid out.
> So I might end up just reverting it.
I suspect that because I removed the whole 'assume()' hackery, neither
of the above issues will now happen, and the code nwo works.
But yes, the above is *exactly* why I don't want to see that
'unreachable()' hackery.
Now, if we had some *other* way to tell the compiler "this condition
never happens", that would be fine. Some compiler builtin for
asserting some condition.
But a conditional "unreachable()" is absolutely not it.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-14 5:41 ` Linus Torvalds
@ 2024-05-14 6:02 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-14 6:02 UTC (permalink / raw)
To: Linus Torvalds
Cc: Lukas Wunner, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, May 13, 2024 at 10:41:58PM -0700, Linus Torvalds wrote:
>
> I suspect that because I removed the whole 'assume()' hackery, neither
> of the above issues will now happen, and the code nwo works.
Alright I'll let it stay and see if any new issues crop up.
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-13 22:12 ` Linus Torvalds
2024-05-14 5:17 ` Herbert Xu
@ 2024-05-14 6:54 ` Lukas Wunner
2024-05-14 17:07 ` Linus Torvalds
1 sibling, 1 reply; 204+ messages in thread
From: Lukas Wunner @ 2024-05-14 6:54 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Julia Lawall, Nicolas Palix, cocci
On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
> On Sun, 12 May 2024 at 20:50, Herbert Xu <herbert@gondor.apana.org.au> wrote:
> >
> > Lukas Wunner (1):
> > X.509: Introduce scope-based x509_certificate allocation
[...]
> Having random kernel code add random "assume()" lines is absolutely
> not what we should do. Particularly not in some random code sequence
> where it absolutely does not matter ONE WHIT.
>
> Now, I've pulled this, but I killed that "assume()" hackery in my merge.
Thanks, appreciated. This way of handling it spares me from having
to resubmit the patch without assume(). (The patch is prep work
for upcoming PCI device authentication.)
> > However, this patch still has two outstanding build defects which
> > have not been addressed:
> >
> > https://lore.kernel.org/all/202404240904.Qi3nM37B-lkp@intel.com/
>
> This one just seems to be a sanity check for "you shouldn't check
> kmalloc() for ERR_PTR", so it's a validation test that then doesn't
> like the new test in that 'assume()'.
I've been in touch with Julia (+cc) to silence this coccinelle
false-positive. But now that the assume() is gone, the coccinelle
warning won't appear anyway:
https://lore.kernel.org/all/alpine.DEB.2.22.394.2405062136410.3284@hadrien/
> And the second one:
>
> > https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
>
> looks *very* much like the cases we've seen with clang in particular
> where clang goes "this code isn't reachable, so I'll just drop
> everything on the floor", and then it just becomes a fallthrough to
> whatever else code happens to come next. Most of the time that's just
> more (unrelated) code in the same function, but sometimes it causes
> that "falls through to next function" instead, entirely randomly
> depending on how the code was laid out.
Curiously, this particular 0-day report is for gcc 13.2.0 though,
not clang.
The assume() macro had no effect with clang when I tested it.
So the unnecessary IS_ERR() check persisted despite the macro when
compiling with clang. Only gcc honors it. Probably another reason
why you would hate the macro. :)
clang supports __builtin_assume(). In theory that should have the
same effect as __builtin_unreachable() on gcc (albeit with inverse
boolean semantics). In practice it had no effect. (Tested with
clang 15.0.6.)
https://clang.llvm.org/docs/LanguageExtensions.html#builtin-assume
So with clang there doesn't seem to be a working way to tell the
compiler about assumptions it can make. And with gcc it's apparently
"hit and miss" depending on the exact gcc version and code. :(
> I suspect that because I removed the whole 'assume()' hackery, neither
> of the above issues will now happen, and the code nwo works.
Yes.
I guess this effort was over the top, so apologies for the noise!
Thanks,
Lukas
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.10
2024-05-14 6:54 ` Lukas Wunner
@ 2024-05-14 17:07 ` Linus Torvalds
0 siblings, 0 replies; 204+ messages in thread
From: Linus Torvalds @ 2024-05-14 17:07 UTC (permalink / raw)
To: Lukas Wunner
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Julia Lawall, Nicolas Palix, cocci
On Mon, 13 May 2024 at 23:54, Lukas Wunner <lukas@wunner.de> wrote:
>
> On Mon, May 13, 2024 at 03:12:53PM -0700, Linus Torvalds wrote:
> >
> > > https://lore.kernel.org/all/202404252210.KJE6Uw1h-lkp@intel.com/
> >
> > looks *very* much like the cases we've seen with clang in particular
> > where clang goes "this code isn't reachable, so I'll just drop
> > everything on the floor", and then it just becomes a fallthrough to
> > whatever else code happens to come next. Most of the time that's just
> > more (unrelated) code in the same function, but sometimes it causes
> > that "falls through to next function" instead, entirely randomly
> > depending on how the code was laid out.
>
> Curiously, this particular 0-day report is for gcc 13.2.0 though,
> not clang.
Hmm. I think all the previous reports of "falls through to next
function" that I have seen have been with clang, but that is probably
be selection bias: the gcc cases of this tend to be found so much more
quickly (because gcc is still more common at least on x86) that by the
time I see the reports, it's because of some clang issue.
And in fact, when I go test this theory by going to search on lore, I
do see several gcc reports.
So no, it was never just clang-only, it was just that the ones I had
looked at were about clang.
> The assume() macro had no effect with clang when I tested it.
I suspect that the issue is that with *normal* kernel configurations,
the code generation is simple and straightforward enough that gcc did
the right thing.
And then some more complicated setup with more debugging support
enabled (particularly things like UBSAN or KASAN) the code gets
complicated enough that gcc doesn't do the optimization any more, and
then the conditional in assume() doesn't get optimized away at an
early stage any more, and remains as a conditional branch to
la-la-land.
And you actually don't even see this as a warning unless the
la-la-land happens to be at the end of a function. IOW, the "branch to
nowhere" _could_ just branch to some label inside the function, and
the objtool sanity check would never even have triggered.
That's why "unreachable()" can be so dangerous. It tells the compiler
that code generation in one place no longer matters, and then the
compiler can decide to leave things just dangling in odd ways.
The code presumably still *works* - because the actual conditional
never triggers, so in that sense it's safe and fine. But it's still
just horrendous to try to figure out, which is why I was so down on
it.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.10
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2024-03-25 18:18 ` pr-tracker-bot
@ 2024-05-20 3:26 ` Herbert Xu
2024-05-20 16:33 ` pr-tracker-bot
` (2 more replies)
1 sibling, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-20 3:26 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 13909a0c88972c5ef5d13f44d1a8bf065a31bdf4:
crypto: atmel-sha204a - provide the otp content (2024-05-10 17:15:25 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p2
for you to fetch changes up to c6ab5c915da460c0397960af3c308386c3f3247b:
crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (2024-05-17 18:55:07 +0800)
----------------------------------------------------------------
This push fixes a bug in the new ecc P521 code as well as a buggy
fix in qat.
----------------------------------------------------------------
Herbert Xu (1):
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
Stefan Berger (1):
crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes
crypto/ecc.c | 22 ++++++++++++++++++++++
drivers/crypto/intel/qat/qat_common/adf_aer.c | 19 +++++--------------
include/crypto/internal/ecc.h | 15 ++-------------
3 files changed, 29 insertions(+), 27 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.10
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
@ 2024-05-20 16:33 ` pr-tracker-bot
2024-05-29 4:17 ` Herbert Xu
2024-09-23 3:08 ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-05-20 16:33 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 20 May 2024 11:26:42 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/568c98a0f6eff6d44accfe56d0c58008bf0d498e
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.10
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2024-05-20 16:33 ` pr-tracker-bot
@ 2024-05-29 4:17 ` Herbert Xu
2024-05-29 17:11 ` pr-tracker-bot
2024-06-28 0:40 ` Herbert Xu
2024-09-23 3:08 ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-05-29 4:17 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit c6ab5c915da460c0397960af3c308386c3f3247b:
crypto: ecc - Prevent ecc_digits_from_bytes from reading too many bytes (2024-05-17 18:55:07 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p3
for you to fetch changes up to 67ec8cdf29971677b2fb4b6d92871eb5d5e95597:
hwrng: core - Remove add_early_randomness (2024-05-26 18:32:16 +0800)
----------------------------------------------------------------
This push fixes a new run-time warning triggered by tpm.
----------------------------------------------------------------
Herbert Xu (1):
hwrng: core - Remove add_early_randomness
drivers/char/hw_random/core.c | 47 ++++---------------------------------------
1 file changed, 4 insertions(+), 43 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.10
2024-05-29 4:17 ` Herbert Xu
@ 2024-05-29 17:11 ` pr-tracker-bot
2024-06-28 0:40 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-05-29 17:11 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 29 May 2024 12:17:54 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/db163660b02abbffebfad1bcd6dbce1201c72731
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.10
2024-05-29 4:17 ` Herbert Xu
2024-05-29 17:11 ` pr-tracker-bot
@ 2024-06-28 0:40 ` Herbert Xu
2024-06-28 1:01 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-06-28 0:40 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 67ec8cdf29971677b2fb4b6d92871eb5d5e95597:
hwrng: core - Remove add_early_randomness (2024-05-26 18:32:16 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p4
for you to fetch changes up to a5d8922ab2aec39336ebc78d7cefe3b84647b058:
crypto: qat - fix linking errors when PCI_IOV is disabled (2024-06-21 21:51:51 +1000)
----------------------------------------------------------------
This push fixes a build failure in qat.
----------------------------------------------------------------
Xin Zeng (1):
crypto: qat - fix linking errors when PCI_IOV is disabled
drivers/crypto/intel/qat/qat_common/Makefile | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.10
2024-06-28 0:40 ` Herbert Xu
@ 2024-06-28 1:01 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-06-28 1:01 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 28 Jun 2024 10:40:19 +1000:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.10-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5bbd9b249880dba032bffa002dd9cd12cd5af09c
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.11
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
2024-05-13 22:38 ` pr-tracker-bot
@ 2024-07-18 13:49 ` Herbert Xu
2024-07-19 18:09 ` pr-tracker-bot
2024-09-16 3:59 ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-07-18 13:49 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 1613e604df0cd359cf2a7fbd9be7a0bcfacfabd0:
Linux 6.10-rc1 (2024-05-26 15:20:12 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.11-p1
for you to fetch changes up to df1e9791998a92fe9f1e7d3f031b34daaad39e2f:
hwrng: core - remove (un)register_miscdev() (2024-07-13 11:50:28 +1200)
----------------------------------------------------------------
This update includes the following changes:
API:
- Test setkey in no-SIMD context.
- Add skcipher speed test for user-specified algorithm.
Algorithms:
- Add x25519 support on ppc64le.
- Add VAES and AVX512 / AVX10 optimized AES-GCM on x86.
- Remove sm2 algorithm.
Drivers:
- Add Allwinner H616 support to sun8i-ce.
- Use DMA in stm32.
- Add Exynos850 hwrng support to exynos.
----------------------------------------------------------------
Andre Przywara (3):
dt-bindings: crypto: sun8i-ce: Add compatible for H616
crypto: sun8i-ce - wrap accesses to descriptor address fields
crypto: sun8i-ce - add Allwinner H616 support
Andy Shevchenko (1):
hwrng: core - Remove list.h from the hw_random.h
Ard Biesheuvel (1):
crypto: arm/crc32 - add kCFI annotations to asm routines
Chenghai Huang (2):
crypto: hisilicon/qm - adjust the internal processing sequence of the vf enable and disable
crypto: hisilicon/zip - optimize the address offset of the reg query function
Christophe JAILLET (1):
crypto: tegra - Remove an incorrect iommu_fwspec_free() call in tegra_se_remove()
Damian Muszynski (1):
Documentation: qat: fix auto_reset attribute details
Dan Carpenter (1):
crypto: lib/mpi - delete unnecessary condition
Danny Tsen (3):
crypto: ppc/curve25519 - Low-level primitives for ppc64le
crypto: ppc/curve25519 - Core functions for ppc64le
crypto: ppc/curve25519 - Update Kconfig and Makefile for ppc64le
David Gstir (1):
crypto: mxs-dcp - Ensure payload is zero when using key slot
Deming Wang (1):
crypto: qat - Fix typo
Dr. David Alan Gilbert (4):
crypto: axis - Remove unused struct 'dbgfs_u32'
crypto: ccree - Remove unused struct 'tdes_keys'
crypto: hifn_795x - Remove unused hifn_*_command structs
crypto: n2 - Remove unused struct 'n2_skcipher_request_context'
Eric Biggers (4):
crypto: testmgr - test setkey in no-SIMD context
crypto: x86/aes-gcm - add VAES and AVX512 / AVX10 optimized AES-GCM
crypto: x86/aes-gcm - rewrite the AES-NI optimized AES-GCM
crypto: testmgr - generate power-of-2 lengths more often
Francesco Dolcini (1):
hwrng: Kconfig - Do not enable by default CN10K driver
Greg Kroah-Hartman (1):
crypto: qat - make adf_ctl_class constant
Harald Freudenberger (1):
hwrng: core - Fix wrong quality calculation at hw rng registration
Hareshx Sankar Raj (1):
crypto: qat - fix unintentional re-enabling of error interrupts
Herbert Xu (2):
crypto: api - Disable boot-test-finished if algapi is a module
crypto: sm2 - Remove sm2 algorithm
Ilpo Järvinen (1):
hwrng: amd - Convert PCIBIOS_* return codes to errnos
Jarkko Sakkinen (1):
crypto: ecdsa - Fix the public key format description
Jeff Johnson (13):
crypto: Add missing MODULE_DESCRIPTION() macros
crypto: lib - add missing MODULE_DESCRIPTION() macros
crypto: x86 - add missing MODULE_DESCRIPTION() macros
crypto: atmel-sha204a - add missing MODULE_DESCRIPTION() macro
crypto: keembay - add missing MODULE_DESCRIPTION() macro
crypto: sa2ul - add missing MODULE_DESCRIPTION() macro
crypto: xilinx - add missing MODULE_DESCRIPTION() macro
hwrng: omap - add missing MODULE_DESCRIPTION() macro
crypto: arm64 - add missing MODULE_DESCRIPTION() macros
hwrng: drivers - add missing Arm & Cavium MODULE_DESCRIPTION() macros
crypto: arm/poly1305 - add missing MODULE_DESCRIPTION() macro
crypto: arm - add missing MODULE_DESCRIPTION() macros
crypto: lib - add missing MODULE_DESCRIPTION() macros
Jia Jie Ho (2):
crypto: starfive - Align rsa input data to 32-bit
crypto: starfive - Fix nent assignment in rsa dec
Jiapeng Chong (2):
crypto: lib/mpi - Use swap() in mpi_ec_mul_point()
crypto: lib/mpi - Use swap() in mpi_powm()
Jiwei Sun (1):
crypto: qat - initialize user_input.lock for rate_limiting
Kim Phillips (1):
crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
Kyle Meyer (1):
crypto: deflate - Add aliases to deflate
Lothar Rubusch (1):
crypto: atmel-sha204a - fix negated return value
Marek Vasut (3):
hwrng: stm32 - use pm_runtime_resume_and_get()
hwrng: stm32 - cache device pointer in struct stm32_rng_private
hwrng: stm32 - use sizeof(*priv) instead of sizeof(struct stm32_rng_private)
Mario Limonciello (5):
crypto: ccp - Represent capabilities register as a union
crypto: ccp - Move security attributes to their own file
crypto: ccp - align psp_platform_access_msg
crypto: ccp - Add support for getting security attributes on some older systems
crypto: ccp - Move message about TSME being enabled later in init
Mark Brown (1):
crypto: arm64/crc10dif - Raise priority of NEON crct10dif implementation
Masahiro Yamada (1):
hwrng: core - remove (un)register_miscdev()
Maxime Méré (4):
crypto: stm32/cryp - use dma when possible
crypto: stm32/cryp - increase priority
crypto: stm32/cryp - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
crypto: stm32/cryp - call finalize with bh disabled
Neil Armstrong (1):
dt-bindings: rng: meson: add optional power-domains
Nivas Varadharajan Mugunthakumar (1):
crypto: qat - extend scope of lock in adf_cfg_add_key_value_param()
Sam Protsenko (6):
dt-bindings: rng: Add Exynos850 support to exynos-trng
hwrng: exynos - Improve coding style
hwrng: exynos - Use devm_clk_get_enabled() to get the clock
hwrng: exynos - Implement bus clock control
hwrng: exynos - Add SMC based TRNG operation
hwrng: exynos - Enable Exynos850 support
Sergey Portnoy (1):
crypto: tcrypt - add skcipher speed for given alg
Stefan Berger (4):
crypto: ecdsa - Use ecc_digits_from_bytes to create hash digits array
crypto: ecdsa - Use ecc_digits_from_bytes to convert signature
crypto: ecc - Add comment to ecc_digits_from_bytes about input byte array
crypto: ecc - Fix off-by-one missing to clear most significant digit
Tony Luck (2):
crypto: x86/twofish - Switch to new Intel CPU model defines
crypto: x86/poly1305 - Switch to new Intel CPU model defines
Documentation/ABI/testing/sysfs-driver-qat | 4 +-
.../bindings/crypto/allwinner,sun8i-ce.yaml | 2 +
.../devicetree/bindings/rng/amlogic,meson-rng.yaml | 3 +
.../bindings/rng/samsung,exynos5250-trng.yaml | 40 +-
MAINTAINERS | 6 +
arch/arm/crypto/aes-neonbs-glue.c | 1 +
arch/arm/crypto/crc32-ce-core.S | 17 +-
arch/arm/crypto/crc32-ce-glue.c | 1 +
arch/arm/crypto/crct10dif-ce-glue.c | 1 +
arch/arm/crypto/curve25519-glue.c | 1 +
arch/arm/crypto/poly1305-glue.c | 1 +
arch/arm64/crypto/aes-neonbs-glue.c | 1 +
arch/arm64/crypto/crct10dif-ce-glue.c | 3 +-
arch/arm64/crypto/poly1305-glue.c | 1 +
arch/powerpc/crypto/Kconfig | 11 +
arch/powerpc/crypto/Makefile | 2 +
arch/powerpc/crypto/curve25519-ppc64le-core.c | 299 +++
arch/powerpc/crypto/curve25519-ppc64le_asm.S | 671 +++++
arch/x86/crypto/Kconfig | 1 +
arch/x86/crypto/Makefile | 8 +-
arch/x86/crypto/aes-gcm-aesni-x86_64.S | 1128 ++++++++
arch/x86/crypto/aes-gcm-avx10-x86_64.S | 1222 +++++++++
arch/x86/crypto/aesni-intel_asm.S | 1503 +----------
arch/x86/crypto/aesni-intel_avx-x86_64.S | 2804 --------------------
arch/x86/crypto/aesni-intel_glue.c | 1269 +++++----
arch/x86/crypto/crc32-pclmul_glue.c | 1 +
arch/x86/crypto/curve25519-x86_64.c | 1 +
arch/x86/crypto/poly1305_glue.c | 4 +-
arch/x86/crypto/twofish_glue_3way.c | 9 +-
crypto/Kconfig | 18 -
crypto/Makefile | 8 -
crypto/af_alg.c | 1 +
crypto/algapi.c | 3 +
crypto/algif_hash.c | 1 +
crypto/algif_skcipher.c | 1 +
crypto/api.c | 4 +-
crypto/asymmetric_keys/pkcs7_parser.c | 4 -
crypto/asymmetric_keys/public_key.c | 7 -
crypto/asymmetric_keys/x509_cert_parser.c | 16 -
crypto/asymmetric_keys/x509_public_key.c | 17 +-
crypto/cast_common.c | 1 +
crypto/curve25519-generic.c | 1 +
crypto/deflate.c | 1 +
crypto/ecc.c | 3 +-
crypto/ecdsa.c | 34 +-
crypto/internal.h | 7 +-
crypto/simd.c | 1 +
crypto/sm2.c | 498 ----
crypto/sm2signature.asn1 | 4 -
crypto/tcrypt.c | 9 +
crypto/testmgr.c | 51 +-
crypto/testmgr.h | 59 -
crypto/xor.c | 1 +
drivers/char/hw_random/Kconfig | 1 -
drivers/char/hw_random/amd-rng.c | 4 +-
drivers/char/hw_random/arm_smccc_trng.c | 1 +
drivers/char/hw_random/cavium-rng-vf.c | 1 +
drivers/char/hw_random/cavium-rng.c | 1 +
drivers/char/hw_random/core.c | 18 +-
drivers/char/hw_random/exynos-trng.c | 217 +-
drivers/char/hw_random/omap-rng.c | 1 +
drivers/char/hw_random/omap3-rom-rng.c | 1 +
drivers/char/hw_random/stm32-rng.c | 35 +-
.../crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c | 8 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 28 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 6 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-prng.c | 6 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-trng.c | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce.h | 15 +
drivers/crypto/atmel-sha204a.c | 3 +-
drivers/crypto/axis/artpec6_crypto.c | 7 -
drivers/crypto/ccp/Makefile | 3 +-
drivers/crypto/ccp/dbc.c | 2 +-
drivers/crypto/ccp/hsti.c | 138 +
drivers/crypto/ccp/hsti.h | 17 +
drivers/crypto/ccp/psp-dev.c | 23 +-
drivers/crypto/ccp/psp-dev.h | 46 +-
drivers/crypto/ccp/sev-dev.c | 8 +-
drivers/crypto/ccp/sp-dev.h | 2 +-
drivers/crypto/ccp/sp-pci.c | 67 +-
drivers/crypto/ccree/cc_cipher.c | 6 -
drivers/crypto/hifn_795x.c | 17 -
drivers/crypto/hisilicon/qm.c | 11 +-
drivers/crypto/hisilicon/zip/zip_main.c | 48 +-
drivers/crypto/intel/keembay/ocs-hcu.c | 1 +
drivers/crypto/intel/qat/qat_common/adf_cfg.c | 6 +-
drivers/crypto/intel/qat/qat_common/adf_ctl_drv.c | 21 +-
drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c | 2 +-
.../crypto/intel/qat/qat_common/adf_gen2_pfvf.c | 4 +-
drivers/crypto/intel/qat/qat_common/adf_rl.c | 1 +
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 8 +-
drivers/crypto/mxs-dcp.c | 3 +-
drivers/crypto/n2_core.c | 4 -
drivers/crypto/sa2ul.c | 1 +
drivers/crypto/starfive/jh7110-cryp.h | 4 +-
drivers/crypto/starfive/jh7110-rsa.c | 15 +-
drivers/crypto/stm32/stm32-cryp.c | 719 ++++-
drivers/crypto/tegra/tegra-se-main.c | 1 -
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 1 +
include/crypto/internal/ecc.h | 3 +
include/crypto/sm2.h | 28 -
include/linux/hw_random.h | 3 +-
include/linux/psp-platform-access.h | 5 +-
lib/crypto/arc4.c | 1 +
lib/crypto/des.c | 1 +
lib/crypto/libchacha.c | 1 +
lib/crypto/mpi/ec.c | 6 +-
lib/crypto/mpi/mpi-bit.c | 10 +-
lib/crypto/mpi/mpi-pow.c | 9 +-
lib/crypto/poly1305.c | 1 +
lib/crypto/sha1.c | 1 +
lib/crypto/sha256.c | 1 +
lib/crypto/utils.c | 1 +
security/integrity/digsig_asymmetric.c | 3 +-
114 files changed, 5480 insertions(+), 5893 deletions(-)
create mode 100644 arch/powerpc/crypto/curve25519-ppc64le-core.c
create mode 100644 arch/powerpc/crypto/curve25519-ppc64le_asm.S
create mode 100644 arch/x86/crypto/aes-gcm-aesni-x86_64.S
create mode 100644 arch/x86/crypto/aes-gcm-avx10-x86_64.S
delete mode 100644 arch/x86/crypto/aesni-intel_avx-x86_64.S
delete mode 100644 crypto/sm2.c
delete mode 100644 crypto/sm2signature.asn1
create mode 100644 drivers/crypto/ccp/hsti.c
create mode 100644 drivers/crypto/ccp/hsti.h
delete mode 100644 include/crypto/sm2.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.11
2024-07-18 13:49 ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
@ 2024-07-19 18:09 ` pr-tracker-bot
2024-09-16 3:59 ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-07-19 18:09 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 19 Jul 2024 01:49:26 +1200:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.11-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c434e25b62f8efcfbb6bf1f7ce55960206c1137e
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.12
2024-07-18 13:49 ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
2024-07-19 18:09 ` pr-tracker-bot
@ 2024-09-16 3:59 ` Herbert Xu
2024-09-16 4:55 ` pr-tracker-bot
2024-11-18 3:18 ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-09-16 3:59 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Fri, Jul 19, 2024 at 01:49:26AM +1200, Herbert Xu wrote:
The following changes since commit 8400291e289ee6b2bf9779ff1c83a291501f017b:
Linux 6.11-rc1 (2024-07-28 14:19:55 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p1
for you to fetch changes up to ce212d2afca47acd366a2e74c76fe82c31f785ab:
crypto: n2 - Set err to EINVAL if snprintf fails for hmac (2024-09-13 18:26:53 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Make self-test asynchronous.
Algorithms:
- Remove MPI functions added for SM3.
- Add allocation error checks to remaining MPI functions (introduced for SM3).
- Set default Jitter RNG OSR to 3.
Drivers:
- Add hwrng driver for Rockchip RK3568 SoC.
- Allow disabling SR-IOV VFs through sysfs in qat.
- Fix device reset bugs in hisilicon.
- Fix authenc key parsing by using generic helper in octeontx*.
Others:
- Fix xor benchmarking on parisc.
----------------------------------------------------------------
Adam Guerin (1):
crypto: qat - preserve ADF_GENERAL_SEC
Amit Shah (1):
crypto: ccp - do not request interrupt on cmd completion when irqs disabled
Aurelien Jarno (2):
dt-bindings: rng: Add Rockchip RK3568 TRNG
hwrng: rockchip - add hwrng driver for Rockchip RK3568 SoC
Brian Masney (2):
crypto: qcom-rng - fix support for ACPI-based systems
crypto: qcom-rng - rename *_of_data to *_match_data
Chen Yufan (1):
crypto: camm/qi - Use ERR_CAST() to return error-valued pointer
Chenghai Huang (2):
crypto: hisilicon - add a lock for the qp send operation
crypto: hisilicon/trng - modifying the order of header files
Chunhai Guo (2):
crypto: atmel - use devm_clk_get_prepared() helpers
crypto: img-hash - use devm_clk_get_enabled() helpers
Colin Ian King (2):
crypto: hisilicon/sec - Remove trailing space after \n newline
crypto: qat - Remove trailing space after \n newline
Dan Carpenter (7):
crypto: iaa - Fix potential use after free bug
crypto: spacc - Fix bounds checking on spacc->job[]
crypto: spacc - Fix off by one in spacc_isenabled()
crypto: spacc - Add a new line in spacc_open()
crypto: spacc - Fix uninitialized variable in spacc_aead_process()
crypto: spacc - Fix NULL vs IS_ERR() check in spacc_aead_fallback()
crypto: spacc - Check for allocation failure in spacc_skcipher_fallback()
Eric Biggers (3):
crypto: x86/aes-gcm - fix PREEMPT_RT issue in gcm_crypt()
crypto: arm/aes-neonbs - go back to using aes-arm directly
crypto: x86/aesni - update docs for aesni-intel module
Fangrui Song (1):
crypto: x86/sha256 - Add parentheses around macros' single arguments
Francesco Dolcini (1):
hwrng: cn10k - Enable by default CN10K driver if Thunder SoC is enabled
Frank Li (1):
dt-bindings: crypto: fsl,sec-v4.0: add second register space for rtic
Gaosheng Cui (2):
hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init
hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume
Guoqing Jiang (1):
hwrng: mtk - Use devm_pm_runtime_enable
Gustavo A. R. Silva (2):
crypto: qat - Use static_assert() to check struct sizes
crypto: nx - Use static_assert() to check struct sizes
Helge Deller (1):
crypto: xor - fix template benchmarking
Herbert Xu (19):
Revert "crypto: arm64/poly1305 - move data to rodata section"
crypto: caam/qi* - Use cpumask_var_t instead of cpumask_t
Revert "lib/mpi: Introduce ec implementation to MPI library"
Revert "lib/mpi: Extend the MPI library"
crypto: lib/mpi - Add error checks to extension
crypto: dh - Check mpi_rshift errors
crypto: rsa - Check MPI allocation errors
crypto: spacc - Use crypto_authenc_extractkeys
crypto: octeontx - Fix authenc setkey
crypto: octeontx2 - Fix authenc setkey
crypto: api - Remove instance larval fulfilment
crypto: api - Do not wait for tests during registration
crypto: simd - Do not call crypto_alloc_tfm during registration
Revert "crypto: spacc - Add SPAcc Skcipher support"
crypto: api - Fix generic algorithm self-test races
crypto: algboss - Pass instance creation error up
crypto: testmgr - Hide ENOENT errors
crypto: octeontx* - Select CRYPTO_AUTHENC
crypto: n2 - Set err to EINVAL if snprintf fails for hmac
Huan Yang (1):
hwrng: mxc-rnga - Use devm_clk_get_enabled() helpers
Jeff Johnson (1):
crypto: ppc/curve25519 - add missing MODULE_DESCRIPTION() macro
Jia He (2):
crypto: arm64/poly1305 - move data to rodata section
crypto: arm64/poly1305 - move data to rodata section
Kamlesh Gurudasani (1):
padata: Honor the caller's alignment in case of chunk_size 0
Kuan-Wei Chiu (3):
crypto: octeontx - Remove custom swap function in favor of built-in sort swap
crypto: octeontx2 - Remove custom swap functions in favor of built-in sort swap
crypto: hisilicon/zip - Optimize performance by replacing rw_lock with spinlock
Liao Chen (1):
crypto: keembay - fix module autoloading
Martin Kaiser (2):
hwrng: rockchip - rst is used only during probe
hwrng: rockchip - handle devm_pm_runtime_enable errors
Michal Witwicki (4):
crypto: qat - disable IOV in adf_dev_stop()
crypto: qat - fix recovery flow for VFs
crypto: qat - ensure correct order in VF restarting handler
crypto: qat - allow disabling SR-IOV VFs
Nikunj Kela (1):
dt-bindings: crypto: qcom,prng: document support for SA8255p
Pavan Kumar Paluri (1):
crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure
Pavitrakumar M (8):
crypto: spacc - Add SPAcc Skcipher support
crypto: spacc - Enable SPAcc AUTODETECT
crypto: spacc - Add SPAcc ahash support
crypto: spacc - Add SPAcc aead support
crypto: spacc - Add SPAcc Kconfig and Makefile
crypto: spacc - Enable Driver compilation in crypto Kconfig and Makefile
crypto: spacc - Fix counter width checks
crypto: spacc - Fixed return to CRYPTO_OK
Riyan Dhiman (1):
crypto: aegis128 - Fix indentation issue in crypto_aegis128_process_crypt()
Stephan Mueller (1):
crypto: jitter - set default OSR to 3
Stephen Rothwell (1):
crypto: spacc - Add ifndef around MIN
Svyatoslav Pankratov (1):
crypto: qat - fix "Full Going True" macro definition
Thorsten Blum (2):
crypto: chacha20poly1305 - Annotate struct chachapoly_ctx with __counted_by()
crypto: jitter - Use min() to simplify jent_read_entropy()
Tom Lendacky (1):
crypto: ccp - Add additional information about an SEV firmware upgrade
VanGiang Nguyen (1):
padata: use integer wrap around to prevent deadlock on seq_nr overflow
WangYuli (1):
crypto: mips/crc32 - Clean up useless assignment operations
Weili Qian (3):
crypto: hisilicon/qm - reset device before enabling it
crypto: hisilicon/hpre - mask cluster timeout error
crypto: hisilicon/qm - inject error before stopping queue
Yang Shen (1):
crypto: hisilicon - fix missed error branch
Yue Haibing (6):
crypto: safexcel - Remove unused declaration safexcel_ring_first_rptr()
crypto: sl3516 - Remove unused declaration sl3516_ce_enqueue()
crypto: octeontx - Remove unused declaration otx_cpt_callback()
crypto: ccp - Remove unused declaration sp_get_master()
crypto: amlogic - Remove unused declaration meson_enqueue()
crypto: crypto4xx - Remove unused declaration crypto4xx_free_ctx()
Zhu Jun (1):
crypto: tools/ccp - Remove unused variable
.../devicetree/bindings/crypto/fsl,sec-v4.0.yaml | 5 +-
.../devicetree/bindings/crypto/qcom,prng.yaml | 1 +
.../bindings/rng/rockchip,rk3568-rng.yaml | 61 +
MAINTAINERS | 7 +
arch/arm/crypto/Kconfig | 14 +-
arch/arm/crypto/aes-ce-glue.c | 2 +-
arch/arm/crypto/aes-cipher-glue.c | 5 +-
arch/arm/crypto/aes-cipher.h | 13 +
arch/arm/crypto/aes-neonbs-glue.c | 131 +-
arch/arm64/crypto/poly1305-armv8.pl | 6 +-
arch/mips/crypto/crc32-mips.c | 64 +-
arch/powerpc/crypto/curve25519-ppc64le-core.c | 1 +
arch/x86/crypto/Kconfig | 8 +-
arch/x86/crypto/aesni-intel_glue.c | 61 +-
arch/x86/crypto/sha256-avx2-asm.S | 16 +-
crypto/Kconfig | 2 +-
crypto/aegis128-core.c | 5 +-
crypto/algapi.c | 71 +-
crypto/algboss.c | 4 +-
crypto/api.c | 75 +-
crypto/chacha20poly1305.c | 2 +-
crypto/dh.c | 4 +-
crypto/internal.h | 3 +-
crypto/jitterentropy.c | 6 +-
crypto/rsa.c | 19 +-
crypto/simd.c | 76 +-
crypto/testmgr.c | 23 +-
crypto/xor.c | 31 +-
drivers/char/hw_random/Kconfig | 15 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/bcm2835-rng.c | 4 +-
drivers/char/hw_random/cctrng.c | 1 +
drivers/char/hw_random/mtk-rng.c | 2 +-
drivers/char/hw_random/mxc-rnga.c | 16 +-
drivers/char/hw_random/rockchip-rng.c | 228 +++
drivers/crypto/amcc/crypto4xx_core.h | 1 -
drivers/crypto/amlogic/amlogic-gxl.h | 2 -
drivers/crypto/atmel-aes.c | 16 +-
drivers/crypto/atmel-sha.c | 14 +-
drivers/crypto/caam/caamalg_qi.c | 4 +-
drivers/crypto/caam/caamalg_qi2.c | 17 +-
drivers/crypto/caam/qi.c | 31 +-
drivers/crypto/ccp/sev-dev.c | 28 +-
drivers/crypto/ccp/sp-dev.h | 1 -
drivers/crypto/gemini/sl3516-ce.h | 2 -
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 2 +
drivers/crypto/hisilicon/hpre/hpre_main.c | 54 +-
drivers/crypto/hisilicon/qm.c | 151 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 2 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 16 +-
drivers/crypto/hisilicon/sgl.c | 14 +-
drivers/crypto/hisilicon/trng/trng.c | 4 +-
drivers/crypto/hisilicon/zip/zip_crypto.c | 17 +-
drivers/crypto/hisilicon/zip/zip_main.c | 23 +-
drivers/crypto/img-hash.c | 21 +-
drivers/crypto/inside-secure/safexcel.h | 1 -
drivers/crypto/intel/iaa/iaa_crypto_main.c | 4 +-
.../crypto/intel/keembay/keembay-ocs-hcu-core.c | 1 +
drivers/crypto/intel/qat/qat_420xx/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_c3xxxvf/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_c62x/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_c62xvf/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/intel/qat/qat_common/adf_cfg.c | 29 +
drivers/crypto/intel/qat/qat_common/adf_cfg.h | 2 +
.../crypto/intel/qat/qat_common/adf_common_drv.h | 2 +-
drivers/crypto/intel/qat/qat_common/adf_ctl_drv.c | 6 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 2 +-
drivers/crypto/intel/qat/qat_common/adf_init.c | 44 +-
.../crypto/intel/qat/qat_common/adf_pfvf_pf_msg.c | 9 +-
.../crypto/intel/qat/qat_common/adf_pfvf_vf_msg.c | 14 +
.../crypto/intel/qat/qat_common/adf_pfvf_vf_msg.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_sriov.c | 194 ++-
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 4 +-
drivers/crypto/intel/qat/qat_common/adf_vf_isr.c | 4 +-
drivers/crypto/intel/qat/qat_common/qat_bl.h | 2 +
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 2 +-
drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_dh895xccvf/adf_drv.c | 4 +-
drivers/crypto/marvell/Kconfig | 2 +
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c | 277 ++--
drivers/crypto/marvell/octeontx/otx_cptvf_algs.h | 1 -
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c | 266 ++--
drivers/crypto/n2_core.c | 1 +
drivers/crypto/nx/nx-842.h | 3 +
drivers/crypto/qcom-rng.c | 24 +-
include/crypto/internal/simd.h | 12 +-
include/linux/mpi.h | 192 +--
kernel/padata.c | 6 +-
lib/crypto/mpi/Makefile | 2 -
lib/crypto/mpi/ec.c | 1507 --------------------
lib/crypto/mpi/mpi-add.c | 89 +-
lib/crypto/mpi/mpi-bit.c | 168 +--
lib/crypto/mpi/mpi-cmp.c | 46 +-
lib/crypto/mpi/mpi-div.c | 82 +-
lib/crypto/mpi/mpi-internal.h | 21 +-
lib/crypto/mpi/mpi-inv.c | 143 --
lib/crypto/mpi/mpi-mod.c | 148 +-
lib/crypto/mpi/mpi-mul.c | 29 +-
lib/crypto/mpi/mpicoder.c | 336 -----
lib/crypto/mpi/mpih-mul.c | 25 -
lib/crypto/mpi/mpiutil.c | 184 +--
tools/crypto/ccp/dbc.c | 1 -
105 files changed, 1423 insertions(+), 3900 deletions(-)
create mode 100644 Documentation/devicetree/bindings/rng/rockchip,rk3568-rng.yaml
create mode 100644 arch/arm/crypto/aes-cipher.h
create mode 100644 drivers/char/hw_random/rockchip-rng.c
delete mode 100644 lib/crypto/mpi/ec.c
delete mode 100644 lib/crypto/mpi/mpi-inv.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.12
2024-09-16 3:59 ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
@ 2024-09-16 4:55 ` pr-tracker-bot
2024-11-18 3:18 ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-09-16 4:55 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 16 Sep 2024 11:59:01 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/85ffc6e4ed3712f8b3fedb3fbe42afae644a699c
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.12
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2024-05-20 16:33 ` pr-tracker-bot
2024-05-29 4:17 ` Herbert Xu
@ 2024-09-23 3:08 ` Herbert Xu
2024-09-24 18:04 ` pr-tracker-bot
` (2 more replies)
2 siblings, 3 replies; 204+ messages in thread
From: Herbert Xu @ 2024-09-23 3:08 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit ce212d2afca47acd366a2e74c76fe82c31f785ab:
crypto: n2 - Set err to EINVAL if snprintf fails for hmac (2024-09-13 18:26:53 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p2
for you to fetch changes up to 44ac4625ea002deecd0c227336c95b724206c698:
crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (2024-09-21 17:14:59 +0800)
----------------------------------------------------------------
This push fixes the following issues:
- Disable buggy p10 aes-gcm code on powerpc.
- Fix module aliases in paes_s390.
- Fix buffer overread in caam.
----------------------------------------------------------------
Danny Tsen (1):
crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10
Herbert Xu (2):
crypto: caam - Pad SG length when allocating hash edesc
crypto: s390/paes - Fix module aliases
arch/powerpc/crypto/Kconfig | 1 +
arch/s390/crypto/paes_s390.c | 5 ++++-
drivers/crypto/caam/caamhash.c | 1 +
3 files changed, 6 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.12
2024-09-23 3:08 ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
@ 2024-09-24 18:04 ` pr-tracker-bot
2024-10-16 5:37 ` Herbert Xu
2024-12-14 9:21 ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
2 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-09-24 18:04 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 23 Sep 2024 11:08:15 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/1cfb46051db9ddb68e297eaf17270e09874ec5f3
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.12
2024-09-23 3:08 ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
2024-09-24 18:04 ` pr-tracker-bot
@ 2024-10-16 5:37 ` Herbert Xu
2024-10-16 20:51 ` pr-tracker-bot
2024-10-21 5:45 ` Herbert Xu
2024-12-14 9:21 ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-10-16 5:37 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 44ac4625ea002deecd0c227336c95b724206c698:
crypto: powerpc/p10-aes-gcm - Disable CRYPTO_AES_GCM_P10 (2024-09-21 17:14:59 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p3
for you to fetch changes up to e845d2399a00f866f287e0cefbd4fc7d8ef0d2f7:
crypto: marvell/cesa - Disable hash algorithms (2024-10-10 17:03:35 +0800)
----------------------------------------------------------------
This push fixes the following issues:
- Remove bogus ENOENT error messages.
- Ensure algorithm is still alive before marking it as tested.
- Disable buggy hash algorithms in marvell/cesa.
----------------------------------------------------------------
Herbert Xu (3):
crypto: api - Fix liveliness check in crypto_alg_tested
crypto: testmgr - Hide ENOENT errors better
crypto: marvell/cesa - Disable hash algorithms
crypto/algapi.c | 2 +-
crypto/testmgr.c | 23 +++++++++++------------
drivers/crypto/marvell/cesa/hash.c | 12 ++++++------
3 files changed, 18 insertions(+), 19 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.12
2024-10-16 5:37 ` Herbert Xu
@ 2024-10-16 20:51 ` pr-tracker-bot
2024-10-21 5:45 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-10-16 20:51 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 16 Oct 2024 13:37:55 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/6f6fc393f4dbaa149962a4662f5dd08513c28905
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.12
2024-10-16 5:37 ` Herbert Xu
2024-10-16 20:51 ` pr-tracker-bot
@ 2024-10-21 5:45 ` Herbert Xu
2024-10-21 18:27 ` pr-tracker-bot
2024-11-15 11:51 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-10-21 5:45 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit e845d2399a00f866f287e0cefbd4fc7d8ef0d2f7:
crypto: marvell/cesa - Disable hash algorithms (2024-10-10 17:03:35 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p4
for you to fetch changes up to cd843399d706411ff80520fb7883afeeefa76e98:
crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue (2024-10-16 13:38:16 +0800)
----------------------------------------------------------------
This push fixes a regression in mpi that broke RSA.
----------------------------------------------------------------
Qianqiang Liu (1):
crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue
lib/crypto/mpi/mpi-mul.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.12
2024-10-21 5:45 ` Herbert Xu
@ 2024-10-21 18:27 ` pr-tracker-bot
2024-11-15 11:51 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-10-21 18:27 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 21 Oct 2024 13:45:16 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a777c32ca42b9a8a5e5abd915883a73620d9044b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.12
2024-10-21 5:45 ` Herbert Xu
2024-10-21 18:27 ` pr-tracker-bot
@ 2024-11-15 11:51 ` Herbert Xu
2024-11-15 18:59 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2024-11-15 11:51 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit cd843399d706411ff80520fb7883afeeefa76e98:
crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue (2024-10-16 13:38:16 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p5
for you to fetch changes up to dd41b283ef2f028e414312706b48f2880b7050b5:
crypto: mips/crc32 - fix the CRC32C implementation (2024-10-26 14:39:30 +0800)
----------------------------------------------------------------
This push fixes a regression in the MIPS CRC32C code.
----------------------------------------------------------------
Eric Biggers (1):
crypto: mips/crc32 - fix the CRC32C implementation
arch/mips/crypto/crc32-mips.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.12
2024-11-15 11:51 ` Herbert Xu
@ 2024-11-15 18:59 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-11-15 18:59 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Fri, 15 Nov 2024 19:51:58 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.12-p5
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/842c7e5834af1fd20b3c79f894be51b2059e3c88
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.13
2024-09-16 3:59 ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
2024-09-16 4:55 ` pr-tracker-bot
@ 2024-11-18 3:18 ` Herbert Xu
2024-11-19 19:06 ` pr-tracker-bot
2025-01-23 11:10 ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-11-18 3:18 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 9852d85ec9d492ebef56dc5f229416c925758edc:
Linux 6.12-rc1 (2024-09-29 15:06:19 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p1
for you to fetch changes up to 4223414efeae3a8efb4da1e9c9c52a1a44c1c5bf:
crypto: marvell/cesa - fix uninit value for struct mv_cesa_op_ctx (2024-11-15 19:52:51 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Add sig driver API.
- Remove signing/verification from akcipher API.
- Move crypto_simd_disabled_for_test to lib/crypto.
- Add WARN_ON for return values from driver that indicates memory corruption.
Algorithms:
- Provide crc32-arch and crc32c-arch through Crypto API.
- Optimise crc32c code size on x86.
- Optimise crct10dif on arm/arm64.
- Optimise p10-aes-gcm on powerpc.
- Optimise aegis128 on x86.
- Output full sample from test interface in jitter RNG.
- Retry without padata when it fails in pcrypt.
Drivers:
- Add support for Airoha EN7581 TRNG.
- Add support for STM32MP25x platforms in stm32.
- Enable iproc-r200 RNG driver on BCMBCA.
- Add Broadcom BCM74110 RNG driver.
----------------------------------------------------------------
Ahsan Atta (1):
crypto: qat - remove faulty arbiter config reset
Ard Biesheuvel (8):
crypto: crc32 - Provide crc32-arch driver for accelerated library code
crypto: crc32c - Provide crc32c-arch driver for accelerated library code
crypto: arm64/crct10dif - Remove obsolete chunking logic
crypto: arm64/crct10dif - Use faster 16x64 bit polynomial multiply
crypto: arm64/crct10dif - Remove remaining 64x64 PMULL fallback code
crypto: arm/crct10dif - Use existing mov_l macro instead of __adrl
crypto: arm/crct10dif - Macroify PMULL asm code
crypto: arm/crct10dif - Implement plain NEON variant
Cabiddu, Giovanni (1):
crypto: qat - remove check after debugfs_create_dir()
Chen Ridong (2):
crypto: caam - add error check to caam_rsa_set_priv_key_form
crypto: bcm - add error check in the ahash_hmac_init function
Chenghai Huang (1):
crypto: hisilicon/qm - fix the coding specifications issue
Christian Marangi (2):
dt-bindings: rng: add support for Airoha EN7581 TRNG
hwrng: airoha - add support for Airoha EN7581 TRNG
Christophe JAILLET (4):
crypto: caam - Fix the pointer passed to caam_qi_shutdown()
crypto: caam - Slightly simplify platform_device()
crypto: qat - Constify struct pm_status_row
crypto: cavium - Fix an error handling path in cpt_ucode_load_fw()
Colin Ian King (1):
crypto: tegra - remove redundant error check on ret
Dan Carpenter (2):
crypto: qat/qat_420xx - fix off by one in uof_get_name()
crypto: qat/qat_4xxx - fix off by one in uof_get_name()
Danny Tsen (3):
crypto: powerpc/p10-aes-gcm - Re-write AES/GCM stitched implementation
crypto: powerpc/p10-aes-gcm - Register modules as SIMD
crypto: powerpc/p10-aes-gcm - Add dependency on CRYPTO_SIMDand re-enable CRYPTO_AES_GCM_P10
Dr. David Alan Gilbert (3):
crypto: qat - remove unused adf_devmgr_get_first
crypto: x86/cast5 - Remove unused cast5_ctr_16way
crypto: asymmetric_keys - Remove unused functions
Eric Biggers (14):
crypto: x86/crc32c - simplify code for handling fewer than 200 bytes
crypto: x86/crc32c - access 32-bit arguments as 32-bit
crypto: x86/crc32c - eliminate jump table and excessive unrolling
crypto: x86/aegis128 - access 32-bit arguments as 32-bit
crypto: x86/aegis128 - remove no-op init and exit functions
crypto: x86/aegis128 - eliminate some indirect calls
crypto: x86/aegis128 - don't bother with special code for aligned data
crypto: x86/aegis128 - optimize length block preparation using SSE4.1
crypto: x86/aegis128 - improve assembly function prototypes
crypto: x86/aegis128 - optimize partial block handling using SSE4.1
crypto: x86/aegis128 - take advantage of block-aligned len
crypto: x86/aegis128 - remove unneeded FRAME_BEGIN and FRAME_END
crypto: x86/aegis128 - remove unneeded RETs
crypto: api - move crypto_simd_disabled_for_test to lib
Everest K.C (1):
crypto: cavium - Fix the if condition to exit loop after timeout
Fabio Estevam (1):
dt-bindings: imx-rng: Allow passing only "fsl,imx31-rnga"
Gatien Chevallier (3):
dt-bindings: rng: add st,stm32mp25-rng support
hwrng: stm32 - implement support for STM32MP25x platforms
hwrng: stm32 - update STM32MP15 RNG max clock frequency
Herbert Xu (3):
hwrng: core - Add WARN_ON for buggy read return values
crypto: lib/mpi - Export mpi_set_bit
crypto: aesni - Move back to module_init
Joachim Vandersmissen (1):
crypto: jitter - output full sample from test interface
Karol Przybylski (1):
crypto: marvell/cesa - fix uninit value for struct mv_cesa_op_ctx
Li Huafei (1):
crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init()
Linus Walleij (1):
hwrng: iproc-r200 - enable on BCMBCA
Lukas Bulwahn (1):
hwrng: amd - remove reference to removed PPC_MAPLE config
Lukas Wunner (23):
crypto: ecdsa - Drop unused test vector elements
crypto: sig - Introduce sig_alg backend
crypto: ecdsa - Migrate to sig_alg backend
crypto: ecrdsa - Migrate to sig_alg backend
crypto: rsa-pkcs1pad - Deduplicate set_{pub,priv}_key callbacks
crypto: rsassa-pkcs1 - Migrate to sig_alg backend
crypto: rsassa-pkcs1 - Harden digest length verification
crypto: rsassa-pkcs1 - Avoid copying hash prefix
crypto: virtio - Drop sign/verify operations
crypto: drivers - Drop sign/verify operations
crypto: akcipher - Drop sign/verify operations
crypto: sig - Move crypto_sig_*() API calls to include file
ASN.1: Clean up include statements in public headers
crypto: ecdsa - Avoid signed integer overflow on signature decoding
crypto: ecdsa - Move X9.62 signature decoding into template
crypto: sig - Rename crypto_sig_maxsize() to crypto_sig_keysize()
crypto: ecdsa - Move X9.62 signature size calculation into template
crypto: ecdsa - Support P1363 signature decoding
crypto: ecrdsa - Fix signature size calculation
crypto: doc - Fix akcipher title reference
crypto: sig - Fix oops on KEYCTL_PKEY_QUERY for RSA keys
crypto: ecdsa - Update Kconfig help text for NIST P521
crypto: rsassa-pkcs1 - Reinstate support for legacy protocols
Markus Mayer (2):
dt-bindings: rng: add binding for BCM74110 RNG
hwrng: bcm74110 - Add Broadcom BCM74110 RNG driver
Michal Suchanek (1):
crypto: aes-gcm-p10 - Use the correct bit to test for P10
Ovidiu Panait (2):
crypto: tegra - remove unneeded crypto_engine_stop() call
crypto: starfive - remove unneeded crypto_engine_stop() call
Qi Tao (1):
crypto: hisilicon - support querying the capability register
Qianqiang Liu (1):
crypto: lib/mpi - Fix an "Uninitialized scalar variable" issue
Rob Herring (Arm) (1):
dt-bindings: rng: Add Marvell Armada RNG support
Rosen Penev (6):
crypto: cesa - add COMPILE_TEST
crypto: cesa - use enabled variants for clk_get
crypto: cesa - remove irq_set_affinity_hint
crypto: cesa - use devm_platform_get_and_ioremap_resource
crypto: crypto4xx - avoid explicit resource
crypto: crypto4xx - use devm in probe
Shen Lichuan (1):
crypto: drivers - Correct multiple typos in comments
Tang Bin (1):
crypto: amlogic - Remove redundant assignment and error messages
Thorsten Blum (1):
crypto: drbg - Use str_true_false() and str_enabled_disabled() helpers
Tomas Paukrt (1):
crypto: mxs-dcp - Fix AES-CBC with hardware-bound keys
Uwe Kleine-König (3):
crypto: atmel - Drop explicit initialization of struct i2c_device_id::driver_data to 0
crypto: drivers - Switch back to struct platform_driver::remove()
hwrng: drivers - Switch back to struct platform_driver::remove()
Vishal Chourasia (2):
crypto: nx - Rename devdata_mutex to devdata_spinlock
crypto: nx - Fix invalid wait context during kexec reboot
Wang Hai (1):
crypto: qat - Fix missing destroy_workqueue in adf_init_aer()
WangYuli (1):
crypto: qat - Fix typo "accelaration"
Weili Qian (2):
crypto: hisilicon/hpre - enable all clusters clock gating
crypto: hisilicon/qm - disable same error report before resetting
Yi Yang (1):
crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
Yu Jiaoliang (1):
crypto: ccree - Fix typo in comment
Yuvaraj Ranganathan (1):
dt-bindings: crypto: qcom-qce: document the SA8775P crypto engine
Zanussi, Tom (2):
crypto: iaa - Remove potential infinite loop in check_completion()
MAINTAINERS: Make Kristen Accardi the IAA crypto driver maintainer
Zhu Jun (1):
hwrng: histb - Fix the wrong format specifier
Zicheng Qu (1):
padata: Clean up in padata_do_multithreaded()
Documentation/ABI/testing/debugfs-hisi-hpre | 7 +
Documentation/ABI/testing/debugfs-hisi-sec | 7 +
Documentation/ABI/testing/debugfs-hisi-zip | 7 +
Documentation/crypto/api-akcipher.rst | 4 +-
Documentation/crypto/api-sig.rst | 15 +
Documentation/crypto/api.rst | 1 +
Documentation/crypto/architecture.rst | 2 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 1 +
.../bindings/rng/airoha,en7581-trng.yaml | 38 +
.../devicetree/bindings/rng/brcm,bcm74110-rng.yaml | 35 +
Documentation/devicetree/bindings/rng/imx-rng.yaml | 2 +-
..._rng.yaml => inside-secure,safexcel-eip76.yaml} | 17 +-
.../devicetree/bindings/rng/st,stm32-rng.yaml | 28 +-
MAINTAINERS | 2 +-
arch/arm/crypto/crct10dif-ce-core.S | 249 +-
arch/arm/crypto/crct10dif-ce-glue.c | 55 +-
arch/arm64/crypto/crct10dif-ce-core.S | 331 ++-
arch/arm64/crypto/crct10dif-ce-glue.c | 44 +-
arch/powerpc/crypto/Kconfig | 2 +-
arch/powerpc/crypto/aes-gcm-p10-glue.c | 141 +-
arch/powerpc/crypto/aes-gcm-p10.S | 2481 +++++++++-----------
arch/x86/crypto/Kconfig | 4 +-
arch/x86/crypto/aegis128-aesni-asm.S | 516 ++--
arch/x86/crypto/aegis128-aesni-glue.c | 145 +-
arch/x86/crypto/aesni-intel_glue.c | 2 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 76 -
arch/x86/crypto/crc32c-intel_glue.c | 2 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 348 +--
crypto/Kconfig | 7 +-
crypto/Makefile | 7 +-
crypto/akcipher.c | 64 +-
crypto/algapi.c | 6 -
crypto/asymmetric_keys/public_key.c | 58 +-
crypto/asymmetric_keys/signature.c | 63 -
crypto/crc32_generic.c | 94 +-
crypto/crc32c_generic.c | 94 +-
crypto/drbg.c | 5 +-
crypto/ecdsa-p1363.c | 159 ++
crypto/ecdsa-x962.c | 237 ++
crypto/ecdsa.c | 209 +-
crypto/ecrdsa.c | 64 +-
crypto/internal.h | 19 -
crypto/jitterentropy-testing.c | 31 +-
crypto/jitterentropy.h | 4 +-
crypto/pcrypt.c | 12 +-
crypto/rsa-pkcs1pad.c | 369 +--
crypto/rsa.c | 17 +-
crypto/rsassa-pkcs1.c | 454 ++++
crypto/sig.c | 149 +-
crypto/testmgr.c | 332 ++-
crypto/testmgr.h | 1225 +++++++---
drivers/char/hw_random/Kconfig | 30 +-
drivers/char/hw_random/Makefile | 2 +
drivers/char/hw_random/airoha-trng.c | 243 ++
drivers/char/hw_random/atmel-rng.c | 2 +-
drivers/char/hw_random/bcm74110-rng.c | 125 +
drivers/char/hw_random/cctrng.c | 2 +-
drivers/char/hw_random/core.c | 11 +-
drivers/char/hw_random/exynos-trng.c | 2 +-
drivers/char/hw_random/histb-rng.c | 2 +-
drivers/char/hw_random/ingenic-rng.c | 2 +-
drivers/char/hw_random/ks-sa-rng.c | 2 +-
drivers/char/hw_random/mxc-rnga.c | 2 +-
drivers/char/hw_random/n2-drv.c | 2 +-
drivers/char/hw_random/npcm-rng.c | 2 +-
drivers/char/hw_random/omap-rng.c | 2 +-
drivers/char/hw_random/stm32-rng.c | 78 +-
drivers/char/hw_random/timeriomem-rng.c | 2 +-
drivers/char/hw_random/xgene-rng.c | 2 +-
drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 2 +-
drivers/crypto/allwinner/sun8i-ce/sun8i-ce-core.c | 2 +-
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-core.c | 2 +-
drivers/crypto/amcc/crypto4xx_core.c | 58 +-
drivers/crypto/amlogic/amlogic-gxl-core.c | 10 +-
drivers/crypto/aspeed/aspeed-acry.c | 4 +-
drivers/crypto/aspeed/aspeed-hace.c | 2 +-
drivers/crypto/atmel-aes.c | 2 +-
drivers/crypto/atmel-ecc.c | 2 +-
drivers/crypto/atmel-sha.c | 2 +-
drivers/crypto/atmel-sha204a.c | 4 +-
drivers/crypto/atmel-tdes.c | 4 +-
drivers/crypto/axis/artpec6_crypto.c | 2 +-
drivers/crypto/bcm/cipher.c | 7 +-
drivers/crypto/caam/caampkc.c | 11 +-
drivers/crypto/caam/jr.c | 2 +-
drivers/crypto/caam/qi.c | 7 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 6 +-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_lib.c | 2 +-
drivers/crypto/ccp/sp-platform.c | 2 +-
drivers/crypto/ccree/cc_aead.c | 4 +-
drivers/crypto/ccree/cc_cipher.c | 2 +-
drivers/crypto/ccree/cc_driver.c | 2 +-
drivers/crypto/ccree/cc_hash.c | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 2 +-
drivers/crypto/exynos-rng.c | 2 +-
drivers/crypto/gemini/sl3516-ce-core.c | 2 +-
drivers/crypto/hisilicon/hpre/hpre.h | 23 +
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 2 -
drivers/crypto/hisilicon/hpre/hpre_main.c | 190 +-
drivers/crypto/hisilicon/qm.c | 166 +-
drivers/crypto/hisilicon/sec/sec_drv.c | 2 +-
drivers/crypto/hisilicon/sec2/sec.h | 26 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 8 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 108 +-
drivers/crypto/hisilicon/trng/trng.c | 2 +-
drivers/crypto/hisilicon/zip/zip.h | 18 +
drivers/crypto/hisilicon/zip/zip_main.c | 153 +-
drivers/crypto/img-hash.c | 2 +-
drivers/crypto/inside-secure/safexcel.c | 2 +-
drivers/crypto/inside-secure/safexcel_hash.c | 2 +-
drivers/crypto/intel/iaa/iaa_crypto_main.c | 10 +
drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c | 2 +-
.../crypto/intel/keembay/keembay-ocs-aes-core.c | 2 +-
drivers/crypto/intel/keembay/keembay-ocs-ecc.c | 2 +-
.../crypto/intel/keembay/keembay-ocs-hcu-core.c | 2 +-
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 2 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 2 +-
drivers/crypto/intel/qat/qat_common/adf_aer.c | 5 +-
.../crypto/intel/qat/qat_common/adf_common_drv.h | 1 -
drivers/crypto/intel/qat/qat_common/adf_dbgfs.c | 13 +-
drivers/crypto/intel/qat/qat_common/adf_dev_mgr.c | 10 -
.../intel/qat/qat_common/adf_gen4_pm_debugfs.c | 18 +-
.../crypto/intel/qat/qat_common/adf_hw_arbiter.c | 4 -
drivers/crypto/intel/qat/qat_common/qat_hal.c | 2 +-
drivers/crypto/marvell/Kconfig | 2 +-
drivers/crypto/marvell/cesa/cesa.c | 54 +-
drivers/crypto/marvell/cesa/cipher.c | 24 +-
drivers/crypto/mxs-dcp.c | 22 +-
drivers/crypto/n2_core.c | 4 +-
drivers/crypto/nx/nx-common-pseries.c | 37 +-
drivers/crypto/omap-aes.c | 2 +-
drivers/crypto/omap-des.c | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/qce/core.c | 2 +-
drivers/crypto/qcom-rng.c | 2 +-
drivers/crypto/rockchip/rk3288_crypto.c | 2 +-
drivers/crypto/s5p-sss.c | 2 +-
drivers/crypto/sa2ul.c | 4 +-
drivers/crypto/sahara.c | 2 +-
drivers/crypto/starfive/jh7110-cryp.c | 7 +-
drivers/crypto/starfive/jh7110-rsa.c | 2 -
drivers/crypto/stm32/stm32-crc32.c | 2 +-
drivers/crypto/stm32/stm32-cryp.c | 2 +-
drivers/crypto/stm32/stm32-hash.c | 2 +-
drivers/crypto/talitos.c | 2 +-
drivers/crypto/tegra/tegra-se-aes.c | 2 -
drivers/crypto/tegra/tegra-se-main.c | 4 +-
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 65 +-
drivers/crypto/xilinx/zynqmp-aes-gcm.c | 2 +-
drivers/crypto/xilinx/zynqmp-sha.c | 2 +-
include/crypto/akcipher.h | 69 +-
include/crypto/internal/akcipher.h | 4 +-
include/crypto/internal/ecc.h | 14 +
include/crypto/internal/rsa.h | 29 +
include/crypto/internal/sig.h | 80 +
include/crypto/public_key.h | 3 -
include/crypto/sig.h | 152 +-
include/linux/asn1_decoder.h | 1 +
include/linux/asn1_encoder.h | 1 -
include/linux/hisi_acc_qm.h | 56 +-
include/linux/slab.h | 1 +
include/uapi/linux/cryptouser.h | 5 +
include/uapi/linux/virtio_crypto.h | 1 +
kernel/padata.c | 7 -
lib/crc32.c | 4 +
lib/crypto/Makefile | 2 +
lib/crypto/mpi/mpi-bit.c | 1 +
lib/crypto/mpi/mpi-mul.c | 2 +-
lib/crypto/simd.c | 11 +
security/integrity/ima/ima_main.c | 6 +-
171 files changed, 6125 insertions(+), 4265 deletions(-)
create mode 100644 Documentation/crypto/api-sig.rst
create mode 100644 Documentation/devicetree/bindings/rng/airoha,en7581-trng.yaml
create mode 100644 Documentation/devicetree/bindings/rng/brcm,bcm74110-rng.yaml
rename Documentation/devicetree/bindings/rng/{omap_rng.yaml => inside-secure,safexcel-eip76.yaml} (79%)
create mode 100644 crypto/ecdsa-p1363.c
create mode 100644 crypto/ecdsa-x962.c
create mode 100644 crypto/rsassa-pkcs1.c
create mode 100644 drivers/char/hw_random/airoha-trng.c
create mode 100644 drivers/char/hw_random/bcm74110-rng.c
create mode 100644 lib/crypto/simd.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.13
2024-11-18 3:18 ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
@ 2024-11-19 19:06 ` pr-tracker-bot
2025-01-23 11:10 ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-11-19 19:06 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Mon, 18 Nov 2024 11:18:25 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/02b2f1a7b8ef340e57cae640a52ec7199b0b887d
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.13
2024-09-23 3:08 ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
2024-09-24 18:04 ` pr-tracker-bot
2024-10-16 5:37 ` Herbert Xu
@ 2024-12-14 9:21 ` Herbert Xu
2024-12-14 17:18 ` pr-tracker-bot
2025-03-31 4:50 ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2024-12-14 9:21 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit fac04efc5c793dccbd07e2d59af9f90b7fc0dca4:
Linux 6.13-rc2 (2024-12-08 14:03:39 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p2
for you to fetch changes up to cd26cd65476711e2c69e0a049c0eeef4b743f5ac:
crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem (2024-12-10 13:40:25 +0800)
----------------------------------------------------------------
This push fixes a regression in rsassa-pkcs1 as well as a buffer
overrun in hisilicon/debugfs.
----------------------------------------------------------------
Chenghai Huang (1):
crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem
Herbert Xu (1):
crypto: rsassa-pkcs1 - Copy source data for SG list
crypto/rsassa-pkcs1.c | 45 ++++++++++++--------------------------
drivers/crypto/hisilicon/debugfs.c | 4 ++--
2 files changed, 16 insertions(+), 33 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.13
2024-12-14 9:21 ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
@ 2024-12-14 17:18 ` pr-tracker-bot
2025-03-31 4:50 ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2024-12-14 17:18 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sat, 14 Dec 2024 17:21:16 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.13-p2
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ec2092915d60df2700f7062f171a7fbbad93166b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.14
2024-11-18 3:18 ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
2024-11-19 19:06 ` pr-tracker-bot
@ 2025-01-23 11:10 ` Herbert Xu
2025-01-24 16:05 ` pr-tracker-bot
2025-03-25 5:53 ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-01-23 11:10 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit cd26cd65476711e2c69e0a049c0eeef4b743f5ac:
crypto: hisilicon/debugfs - fix the struct pointer incorrectly offset problem (2024-12-10 13:40:25 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.14-p1
for you to fetch changes up to 9d4f8e54cef2c42e23ef258833dbd06a1eaff89b:
rhashtable: Fix rhashtable_try_insert test (2025-01-19 12:44:28 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Remove physical address skcipher walking.
- Fix boot-up self-test race.
Algorithms:
- Optimisations for x86/aes-gcm.
- Optimisations for x86/aes-xts.
- Remove VMAC.
- Remove keywrap.
Drivers:
- Remove n2.
Others:
- Fixes for padata UAF.
- Fix potential rhashtable deadlock by moving schedule_work outside lock.
----------------------------------------------------------------
Bartosz Golaszewski (9):
crypto: qce - fix goto jump in error path
crypto: qce - unregister previously registered algos in error path
crypto: qce - remove unneeded call to icc_set_bw() in error path
crypto: qce - shrink code with devres clk helpers
crypto: qce - convert qce_dma_request() to use devres
crypto: qce - make qce_register_algs() a managed interface
crypto: qce - use __free() for a buffer that's always freed
crypto: qce - convert tasklet to workqueue
crypto: qce - switch to using a mutex
Breno Leitao (1):
rhashtable: Fix potential deadlock by moving schedule_work outside lock
Chen Ridong (4):
crypto: tegra - do not transfer req when tegra init fails
padata: add pd get/put refcnt helper
padata: fix UAF in padata_reorder
padata: avoid UAF for reorder_work
Dr. David Alan Gilbert (2):
crypto: lib/gf128mul - Remove some bbe deadcode
crypto: asymmetric_keys - Remove unused key_being_used_for[]
Eric Biggers (32):
crypto: qce - fix priority to be less than ARMv8 CE
crypto: n2 - remove Niagara2 SPU driver
crypto: skcipher - remove support for physical address walks
crypto: anubis - stop using cra_alignmask
crypto: aria - stop using cra_alignmask
crypto: tea - stop using cra_alignmask
crypto: khazad - stop using cra_alignmask
crypto: seed - stop using cra_alignmask
crypto: x86 - remove assignments of 0 to cra_alignmask
crypto: aegis - remove assignments of 0 to cra_alignmask
crypto: keywrap - remove assignment of 0 to cra_alignmask
crypto: x86/aes-gcm - code size optimization
crypto: x86/aes-gcm - tune better for AMD CPUs
crypto: x86/aes-xts - use .irp when useful
crypto: x86/aes-xts - make the register aliases per-function
crypto: x86/aes-xts - improve some comments
crypto: x86/aes-xts - change len parameter to int
crypto: x86/aes-xts - more code size optimizations
crypto: x86/aes-xts - additional optimizations
crypto: vmac - remove unused VMAC algorithm
crypto: keywrap - remove unused keywrap algorithm
crypto: ahash - make hash walk functions private to ahash.c
crypto: powerpc/p10-aes-gcm - simplify handling of linear associated data
crypto: omap - switch from scatter_walk to plain offset
crypto: skcipher - document skcipher_walk_done() and rename some vars
crypto: skcipher - remove unnecessary page alignment of bounce buffer
crypto: skcipher - remove redundant clamping to page size
crypto: skcipher - remove redundant check for SKCIPHER_WALK_SLOW
crypto: skcipher - fold skcipher_walk_skcipher() into skcipher_walk_virt()
crypto: skcipher - clean up initialization of skcipher_walk::flags
crypto: skcipher - optimize initializing skcipher_walk fields
crypto: skcipher - call cond_resched() directly
Gaurav Jain (1):
crypto: caam - use JobR's space to access page 0 regs
Gaurav Kashyap (3):
dt-bindings: crypto: qcom-qce: Document the SM8750 crypto engine
dt-bindings: crypto: qcom,prng: Document SM8750 RNG
dt-bindings: crypto: qcom,inline-crypto-engine: Document the SM8750 ICE
Herbert Xu (6):
crypto: api - Fix boot-up self-test race
crypto: api - Call crypto_schedule_test outside of mutex
MAINTAINERS: Move rhashtable over to linux-crypto
crypto: sig - Set maskset to CRYPTO_ALG_TYPE_MASK
crypto: lib/aesgcm - Reduce stack usage in libaesgcm_init
rhashtable: Fix rhashtable_try_insert test
Joe Hattori (1):
crypto: ixp4xx - fix OF node reference leaks in init_ixp_crypto()
Kanchana P Sridhar (1):
crypto: iaa - Fix IAA disabling that occurs when sync_mode is set to 'async'
Krzysztof Kozlowski (1):
crypto: bcm - Drop unused setting of local 'ptr' variable
Mario Limonciello (1):
crypto: ccp - Use scoped guard for mutex
Md Sadre Alam (1):
dt-bindings: crypto: qcom,prng: document ipq9574, ipq5424 and ipq5322
Nathan Chancellor (1):
crypto: qce - revert "use __free() for a buffer that's always freed"
Thomas Weißschuh (1):
padata: fix sysfs store callback check
Thorsten Blum (2):
crypto: fips - Use str_enabled_disabled() helper in fips_enable()
crypto: proc - Use str_yes_no() and str_no_yes() helpers
Weili Qian (2):
crypto: hisilicon/zip - add data aggregation feature
crypto: hisilicon/zip - support new error report
Wenkai Lin (2):
crypto: hisilicon/sec2 - fix for aead icv error
crypto: hisilicon/sec2 - fix for aead invalid authsize
Yang Shen (1):
crypto: hisilicon/qm - support new function communication
Yuvaraj Ranganathan (3):
dt-bindings: crypto: qcom,prng: document QCS8300
dt-bindings: crypto: ice: document the qcs8300 inline crypto engine
dt-bindings: crypto: qcom-qce: document the QCS8300 crypto engine
.../bindings/crypto/qcom,inline-crypto-engine.yaml | 2 +
.../devicetree/bindings/crypto/qcom,prng.yaml | 5 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 2 +
Documentation/driver-api/crypto/iaa/iaa-crypto.rst | 9 +-
MAINTAINERS | 2 +-
arch/arm/configs/pxa_defconfig | 1 -
arch/loongarch/configs/loongson3_defconfig | 1 -
arch/m68k/configs/amiga_defconfig | 2 -
arch/m68k/configs/apollo_defconfig | 2 -
arch/m68k/configs/atari_defconfig | 2 -
arch/m68k/configs/bvme6000_defconfig | 2 -
arch/m68k/configs/hp300_defconfig | 2 -
arch/m68k/configs/mac_defconfig | 2 -
arch/m68k/configs/multi_defconfig | 2 -
arch/m68k/configs/mvme147_defconfig | 2 -
arch/m68k/configs/mvme16x_defconfig | 2 -
arch/m68k/configs/q40_defconfig | 2 -
arch/m68k/configs/sun3_defconfig | 2 -
arch/m68k/configs/sun3x_defconfig | 2 -
arch/mips/configs/bigsur_defconfig | 1 -
arch/mips/configs/decstation_64_defconfig | 2 -
arch/mips/configs/decstation_defconfig | 2 -
arch/mips/configs/decstation_r4k_defconfig | 2 -
arch/mips/configs/ip27_defconfig | 1 -
arch/mips/configs/ip30_defconfig | 1 -
arch/powerpc/crypto/aes-gcm-p10-glue.c | 9 +-
arch/s390/configs/debug_defconfig | 2 -
arch/s390/configs/defconfig | 2 -
arch/x86/crypto/aegis128-aesni-glue.c | 1 -
arch/x86/crypto/aes-gcm-avx10-x86_64.S | 119 +-
arch/x86/crypto/aes-xts-avx-x86_64.S | 329 +--
arch/x86/crypto/aesni-intel_glue.c | 10 +-
arch/x86/crypto/blowfish_glue.c | 1 -
arch/x86/crypto/camellia_glue.c | 1 -
arch/x86/crypto/des3_ede_glue.c | 1 -
arch/x86/crypto/twofish_glue.c | 1 -
crypto/Kconfig | 18 -
crypto/Makefile | 2 -
crypto/aegis128-core.c | 2 -
crypto/ahash.c | 158 +-
crypto/algapi.c | 31 +-
crypto/anubis.c | 14 +-
crypto/aria_generic.c | 37 +-
crypto/asymmetric_keys/asymmetric_type.c | 10 -
crypto/fips.c | 4 +-
crypto/keywrap.c | 320 ---
crypto/khazad.c | 17 +-
crypto/proc.c | 9 +-
crypto/seed.c | 48 +-
crypto/sig.c | 4 +-
crypto/skcipher.c | 367 +---
crypto/tcrypt.c | 4 -
crypto/tea.c | 83 +-
crypto/testmgr.c | 26 +-
crypto/testmgr.h | 192 --
crypto/vmac.c | 696 -------
drivers/crypto/Kconfig | 17 -
drivers/crypto/Makefile | 2 -
drivers/crypto/bcm/spu.c | 7 +-
drivers/crypto/caam/blob_gen.c | 3 +-
drivers/crypto/ccp/dbc.c | 53 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 13 +-
drivers/crypto/hisilicon/qm.c | 291 ++-
drivers/crypto/hisilicon/sec2/sec.h | 3 +-
drivers/crypto/hisilicon/sec2/sec_crypto.c | 157 +-
drivers/crypto/hisilicon/sec2/sec_crypto.h | 11 -
drivers/crypto/hisilicon/sec2/sec_main.c | 13 +-
drivers/crypto/hisilicon/zip/Makefile | 2 +-
drivers/crypto/hisilicon/zip/dae_main.c | 262 +++
drivers/crypto/hisilicon/zip/zip.h | 8 +
drivers/crypto/hisilicon/zip/zip_main.c | 52 +-
drivers/crypto/intel/iaa/iaa_crypto_main.c | 2 +-
drivers/crypto/intel/ixp4xx/ixp4xx_crypto.c | 3 +
drivers/crypto/n2_asm.S | 96 -
drivers/crypto/n2_core.c | 2168 --------------------
drivers/crypto/n2_core.h | 232 ---
drivers/crypto/omap-aes.c | 34 +-
drivers/crypto/omap-aes.h | 6 +-
drivers/crypto/omap-des.c | 40 +-
drivers/crypto/qce/aead.c | 2 +-
drivers/crypto/qce/core.c | 131 +-
drivers/crypto/qce/core.h | 9 +-
drivers/crypto/qce/dma.c | 22 +-
drivers/crypto/qce/dma.h | 3 +-
drivers/crypto/qce/sha.c | 2 +-
drivers/crypto/qce/skcipher.c | 2 +-
drivers/crypto/tegra/tegra-se-aes.c | 7 +-
drivers/crypto/tegra/tegra-se-hash.c | 7 +-
include/crypto/gf128mul.h | 6 +-
include/crypto/internal/hash.h | 23 -
include/crypto/internal/skcipher.h | 14 +-
include/linux/hisi_acc_qm.h | 8 +
include/linux/verification.h | 2 -
kernel/padata.c | 45 +-
lib/crypto/aesgcm.c | 2 +-
lib/crypto/gf128mul.c | 75 -
lib/rhashtable.c | 12 +-
97 files changed, 1359 insertions(+), 5061 deletions(-)
delete mode 100644 crypto/keywrap.c
delete mode 100644 crypto/vmac.c
create mode 100644 drivers/crypto/hisilicon/zip/dae_main.c
delete mode 100644 drivers/crypto/n2_asm.S
delete mode 100644 drivers/crypto/n2_core.c
delete mode 100644 drivers/crypto/n2_core.h
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.14
2025-01-23 11:10 ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
@ 2025-01-24 16:05 ` pr-tracker-bot
2025-03-25 5:53 ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-01-24 16:05 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 23 Jan 2025 19:10:34 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.14-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/454cb97726fe62a04b187a0d631ec0a69f6b713a
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Update for 6.15
2025-01-23 11:10 ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
2025-01-24 16:05 ` pr-tracker-bot
@ 2025-03-25 5:53 ` Herbert Xu
2025-03-25 15:25 ` Eric Biggers
2025-03-29 18:24 ` pr-tracker-bot
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-03-25 5:53 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 2014c95afecee3e76ca4a56956a936e23283f05b:
Linux 6.14-rc1 (2025-02-02 15:39:26 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.15-p1
for you to fetch changes up to 99585c2192cb1ce212876e82ef01d1c98c7f4699:
crypto: testmgr - Add multibuffer acomp testing (2025-03-22 07:25:19 +0800)
----------------------------------------------------------------
This update includes the following changes:
API:
- Remove legacy compression interface.
- Improve scatterwalk API.
- Add request chaining to ahash and acomp.
- Add virtual address support to ahash and acomp.
- Add folio support to acomp.
- Remove NULL dst support from acomp.
Algorithms:
- Library options are fuly hidden (selected by kernel users only).
- Add Kerberos5 algorithms.
- Add VAES-based ctr(aes) on x86.
- Ensure LZO respects output buffer length on compression.
- Remove obsolete SIMD fallback code path from arm/ghash-ce.
Drivers:
- Add support for PCI device 0x1134 in ccp.
- Add support for rk3588's standalone TRNG in rockchip.
- Add Inside Secure SafeXcel EIP-93 crypto engine support in eip93.
- Fix bugs in tegra uncovered by multi-threaded self-test.
- Fix corner cases in hisilicon/sec2.
Others:
- Add SG_MITER_LOCAL to sg miter.
- Convert ubifs, hibernate and xfrm_ipcomp from legacy API to acomp.
----------------------------------------------------------------
Abel Vesa (1):
dt-bindings: crypto: qcom-qce: Document the X1E80100 crypto engine
Abhinaba Rakshit (1):
dt-bindings: crypto: qcom,prng: document QCS615
Akhil R (10):
crypto: tegra - Use separate buffer for setkey
crypto: tegra - Do not use fixed size buffers
crypto: tegra - finalize crypto req on error
crypto: tegra - check return value for hash do_one_req
crypto: tegra - Transfer HASH init function to crypto engine
crypto: tegra - Fix HASH intermediate result handling
crypto: tegra - Fix CMAC intermediate result handling
crypto: tegra - Set IV to NULL explicitly for AES ECB
crypto: tegra - Reserve keyslots to allocate dynamically
crypto: tegra - Use HMAC fallback when keyslots are full
Ard Biesheuvel (12):
crypto: lib/chachapoly - Drop dependency on CRYPTO_ALGAPI
crypto: nx - Migrate to scomp API
crypto: 842 - drop obsolete 'comp' implementation
crypto: deflate - drop obsolete 'comp' implementation
crypto: lz4 - drop obsolete 'comp' implementation
crypto: lz4hc - drop obsolete 'comp' implementation
crypto: lzo-rle - drop obsolete 'comp' implementation
crypto: lzo - drop obsolete 'comp' implementation
crypto: zstd - drop obsolete 'comp' implementation
crypto: cavium/zip - drop obsolete 'comp' implementation
crypto: compress_null - drop obsolete 'comp' implementation
crypto: remove obsolete 'comp' compression API
Arnd Bergmann (2):
crypto: bpf - Add MODULE_DESCRIPTION for skcipher
crypto: lib/Kconfig - hide library options
Bairavi Alagappan (2):
crypto: qat - set parity error mask for qat_420xx
crypto: qat - remove access to parity register for QAT GEN4
Christian Marangi (4):
spinlock: extend guard with spinlock_bh variants
dt-bindings: crypto: Add Inside Secure SafeXcel EIP-93 crypto engine
crypto: eip93 - Add Inside Secure SafeXcel EIP-93 crypto engine support
crypto: inside-secure/eip93 - Correctly handle return of for sg_nents_for_len
Christophe JAILLET (1):
crypto: virtio - Erase some sensitive memory when it is freed
David Howells (17):
crypto/krb5: Add API Documentation
crypto/krb5: Add some constants out of sunrpc headers
crypto: Add 'krb5enc' hash and cipher AEAD algorithm
crypto/krb5: Test manager data
crypto/krb5: Implement Kerberos crypto core
crypto/krb5: Add an API to query the layout of the crypto section
crypto/krb5: Add an API to alloc and prepare a crypto object
crypto/krb5: Add an API to perform requests
crypto/krb5: Provide infrastructure and key derivation
crypto/krb5: Implement the Kerberos5 rfc3961 key derivation
crypto/krb5: Provide RFC3961 setkey packaging functions
crypto/krb5: Implement the Kerberos5 rfc3961 encrypt and decrypt functions
crypto/krb5: Implement the Kerberos5 rfc3961 get_mic and verify_mic
crypto/krb5: Implement the AES enctypes from rfc3962
crypto/krb5: Implement the AES enctypes from rfc8009
crypto/krb5: Implement the Camellia enctypes from rfc6803
crypto/krb5: Implement crypto self-testing
David Sterba (1):
MAINTAINERS: add myself to co-maintain ZSTD
Devaraj Rangasamy (1):
crypto: ccp - Add support for PCI device 0x1134
Dionna Glaze (1):
crypto: ccp - Fix uAPI definitions of PSP errors
Dr. David Alan Gilbert (3):
crypto: octeontx2 - Remove unused otx2_cpt_print_uc_dbg_info
crypto: octeontx - Remove unused function otx_cpt_eng_grp_has_eng_type
async_xor: Remove unused 'async_xor_val'
Dragan Simic (2):
hwrng: Kconfig - Use tabs as leading whitespace consistently in Kconfig
hwrng: Kconfig - Move one "tristate" Kconfig description to the usual place
Eric Biggers (25):
crypto: x86/aes-xts - make the fast path 64-bit specific
crypto: x86/aes-ctr - rewrite AESNI+AVX optimized CTR and add VAES support
crypto: x86/aes-xts - change license to Apache-2.0 OR BSD-2-Clause
crypto: scatterwalk - move to next sg entry just in time
crypto: scatterwalk - add new functions for skipping data
crypto: scatterwalk - add new functions for iterating through data
crypto: scatterwalk - add new functions for copying data
crypto: scatterwalk - add scatterwalk_get_sglist()
crypto: skcipher - use scatterwalk_start_at_pos()
crypto: aegis - use the new scatterwalk functions
crypto: arm/ghash - use the new scatterwalk functions
crypto: arm64 - use the new scatterwalk functions
crypto: nx - use the new scatterwalk functions
crypto: s390/aes-gcm - use the new scatterwalk functions
crypto: s5p-sss - use the new scatterwalk functions
crypto: stm32 - use the new scatterwalk functions
crypto: x86/aes-gcm - use the new scatterwalk functions
crypto: x86/aegis - use the new scatterwalk functions
net/tls: use the new scatterwalk functions
crypto: skcipher - use the new scatterwalk functions
crypto: scatterwalk - remove obsolete functions
crypto: scatterwalk - don't split at page boundaries when !HIGHMEM
crypto: skcipher - fix mismatch between mapping and unmapping order
crypto: scatterwalk - simplify map and unmap calling convention
crypto: lib/chacha - remove unused arch-specific init support
Ethan Carter Edwards (1):
crypto: artpec6 - change from kzalloc to kcalloc in artpec6_crypto_probe()
Geert Uytterhoeven (1):
hwrng: Kconfig - Fix indentation of HW_RANDOM_CN10K help text
Giovanni Cabiddu (3):
crypto: qat - fix object goals in Makefiles
crypto: qat - reorder objects in qat_common Makefile
crypto: qat - do not export adf_cfg_services
Herbert Xu (59):
crypto: inside-secure - Eliminate duplication in top-level Makefile
crypto: lib/Kconfig - Fix lib built-in failure when arch is modular
crypto: null - Use spin lock instead of mutex
crypto: api - Fix larval relookup type and mask
crypto: skcipher - Set tfm in SYNC_SKCIPHER_REQUEST_ON_STACK
crypto: skcipher - Zap type in crypto_alloc_sync_skcipher
crypto: ahash - Only save callback and data in ahash_save_req
crypto: x86/ghash - Use proper helpers to clone request
crypto: hash - Add request chaining API
crypto: tcrypt - Restore multibuffer ahash tests
crypto: ahash - Add virtual address support
crypto: ahash - Set default reqsize from ahash_alg
crypto: skcipher - Use restrict rather than hand-rolling accesses
crypto: lib/Kconfig - Hide arch options from user
Merge tag 'crypto-krb5-20250303' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
crypto: api - Move struct crypto_type into internal.h
crypto: lzo - Fix compression buffer overrun
crypto: iaa - Test the correct request flag
crypto: acomp - Remove acomp request flags
crypto: Kconfig - Select LIB generic option
crypto: scatterwalk - Change scatterwalk_next calling convention
crypto: scatterwalk - Add memcpy_sglist
crypto: skcipher - Eliminate duplicate virt.addr field
crypto: skcipher - Make skcipher_walk src.virt.addr const
crypto: api - Add cra_type->destroy hook
crypto: scomp - Remove tfm argument from alloc/free_ctx
crypto: acomp - Move stream management into scomp layer
crypto: scomp - Disable BH when taking per-cpu spin lock
crypto: acomp - Add request chaining and virtual addresses
crypto: testmgr - Remove NULL dst acomp tests
lib/scatterlist: Add SG_MITER_LOCAL and use it
crypto: krb5 - Use SG miter instead of doing it by hand
crypto: hash - Fix test underflow in shash_ahash_digest
crypto: scatterwalk - Use nth_page instead of doing it by hand
crypto: hash - Use nth_page instead of doing it by hand
crypto: padlock - Use zero page instead of stack buffer
crypto: nx - Fix uninitialised hv_nxc on error
xfrm: ipcomp: Call pskb_may_pull in ipcomp_input
crypto: scomp - Remove support for some non-trivial SG lists
crypto: iaa - Remove dst_null support
crypto: qat - Remove dst_null support
crypto: acomp - Remove dst_free
crypto: scomp - Add chaining and virtual address support
crypto: acomp - Add ACOMP_REQUEST_ALLOC and acomp_request_alloc_extra
crypto: iaa - Use acomp stack fallback
crypto: acomp - Add async nondma fallback
crypto: acomp - Add support for folios
xfrm: ipcomp: Use crypto_acomp interface
PM: hibernate: Use crypto_acomp interface
ubifs: Use crypto_acomp interface
ubifs: Pass folios to acomp
crypto: scompress - Fix scratch allocation failure handling
crypto: scompress - Fix incorrect stream freeing
crypto: api - Call crypto_alg_put in crypto_unregister_alg
crypto: arm/ghash-ce - Remove SIMD fallback code path
crypto: hash - Fix synchronous ahash chaining fallback
crypto: testmgr - Add multibuffer hash testing
crypto: acomp - Fix synchronous acomp chaining fallback
crypto: testmgr - Add multibuffer acomp testing
J. Neuschäfer (1):
dt-bindings: crypto: Convert fsl,sec-2.0 to YAML
Jack Xu (3):
crypto: qat - remove unused members in suof structure
crypto: qat - remove redundant FW image size check
crypto: qat - optimize allocations for fw authentication
Kristen Carlson Accardi (1):
MAINTAINERS: Add Vinicius Gomes to MAINTAINERS for IAA Crypto
Krzysztof Kozlowski (2):
crypto: drivers - Use str_enable_disable-like helpers
dt-bindings: rng: rockchip,rk3588-rng: Drop unnecessary status from example
Lukas Wunner (8):
crypto: sig - Prepare for algorithms with variable signature size
crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()
crypto: virtio - Fix kernel-doc of virtcrypto_dev_stop()
crypto: virtio - Simplify RSA key size caching
crypto: virtio - Drop superfluous ctx->tfm backpointer
crypto: virtio - Drop superfluous [as]kcipher_ctx pointer
crypto: virtio - Drop superfluous [as]kcipher_req pointer
MAINTAINERS: Add Lukas & Ignat & Stefan for asymmetric keys
Martin Kaiser (1):
hwrng: imx-rngc - add runtime pm
Małgorzata Mielnik (1):
crypto: qat - refactor service parsing logic
Nathan Chancellor (1):
crypto: tegra - Fix format specifier in tegra_sha_prep_cmd()
Nicolas Frattaroli (6):
dt-bindings: reset: Add SCMI reset IDs for RK3588
dt-bindings: rng: add binding for Rockchip RK3588 RNG
hwrng: rockchip - store dev pointer in driver struct
hwrng: rockchip - eliminate some unnecessary dereferences
hwrng: rockchip - add support for rk3588's standalone TRNG
MAINTAINERS: add Nicolas Frattaroli to rockchip-rng maintainers
Rob Herring (Arm) (1):
dt-bindings: crypto: inside-secure,safexcel: Allow dma-coherent
Shashank Gupta (1):
crypto: octeontx2 - suppress auth failure screaming due to negative tests
Suman Kumar Chakraborty (3):
crypto: qat - set command ids as reserved
crypto: qat - add macro to write 64-bit values to registers
crypto: qat - introduce fuse array
Sven Schwermer (1):
crypto: mxs-dcp - Only set OTP_KEY bit for OTP key
Tanya Agarwal (1):
lib: 842: Improve error handling in sw842_compress()
Thorsten Blum (5):
crypto: skcipher - use str_yes_no() helper in crypto_skcipher_show()
crypto: ahash - use str_yes_no() helper in crypto_ahash_show()
crypto: bcm - set memory to zero only once
crypto: aead - use str_yes_no() helper in crypto_aead_show()
crypto: essiv - Replace memcpy() + NUL-termination with strscpy()
Tom Lendacky (1):
crypto: ccp - Fix check for the primary ASP device
Wenkai Lin (3):
crypto: hisilicon/sec2 - fix for aead auth key length
crypto: hisilicon/sec2 - fix for aead authsize alignment
crypto: hisilicon/sec2 - fix for sec spec check
lizhi (1):
crypto: hisilicon/hpre - adapt ECDH for high-performance cores
Documentation/crypto/architecture.rst | 2 -
Documentation/crypto/index.rst | 1 +
Documentation/crypto/krb5.rst | 262 +++++++
.../devicetree/bindings/crypto/fsl,sec2.0.yaml | 144 ++++
.../devicetree/bindings/crypto/fsl-sec2.txt | 65 --
.../crypto/inside-secure,safexcel-eip93.yaml | 67 ++
.../bindings/crypto/inside-secure,safexcel.yaml | 2 +
.../devicetree/bindings/crypto/qcom,prng.yaml | 1 +
.../devicetree/bindings/crypto/qcom-qce.yaml | 1 +
.../bindings/rng/rockchip,rk3588-rng.yaml | 59 ++
MAINTAINERS | 39 +
arch/arm/crypto/Kconfig | 10 +-
arch/arm/crypto/aes-ce-glue.c | 2 +-
arch/arm/crypto/chacha-glue.c | 10 +-
arch/arm/crypto/ghash-ce-glue.c | 213 +----
arch/arm64/crypto/Kconfig | 6 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 20 +-
arch/arm64/crypto/aes-neonbs-glue.c | 3 +-
arch/arm64/crypto/chacha-neon-glue.c | 10 +-
arch/arm64/crypto/ghash-ce-glue.c | 17 +-
arch/arm64/crypto/sm4-ce-ccm-glue.c | 27 +-
arch/arm64/crypto/sm4-ce-gcm-glue.c | 31 +-
arch/mips/crypto/Kconfig | 7 +-
arch/mips/crypto/chacha-glue.c | 10 +-
arch/powerpc/crypto/Kconfig | 7 +-
arch/powerpc/crypto/aes-gcm-p10-glue.c | 6 +-
arch/powerpc/crypto/aes_ctr.c | 2 +-
arch/powerpc/crypto/chacha-p10-glue.c | 10 +-
arch/riscv/crypto/Kconfig | 1 -
arch/s390/crypto/Kconfig | 3 +-
arch/s390/crypto/aes_s390.c | 45 +-
arch/s390/crypto/chacha-glue.c | 8 +-
arch/sparc/crypto/aes_glue.c | 2 +-
arch/x86/crypto/Kconfig | 11 +-
arch/x86/crypto/Makefile | 2 +-
arch/x86/crypto/aegis128-aesni-glue.c | 9 +-
arch/x86/crypto/aes-ctr-avx-x86_64.S | 592 ++++++++++++++
arch/x86/crypto/aes-xts-avx-x86_64.S | 55 +-
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 597 --------------
arch/x86/crypto/aesni-intel_glue.c | 461 +++++------
arch/x86/crypto/chacha_glue.c | 10 +-
arch/x86/crypto/des3_ede_glue.c | 2 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 23 +-
crypto/842.c | 70 +-
crypto/Kconfig | 16 +
crypto/Makefile | 5 +-
crypto/acompress.c | 276 ++++++-
crypto/aead.c | 5 +-
crypto/aegis128-core.c | 9 +-
crypto/ahash.c | 601 +++++++++++---
crypto/algapi.c | 5 +-
crypto/api.c | 31 +-
crypto/asymmetric_keys/public_key.c | 9 +-
crypto/async_tx/async_xor.c | 26 -
crypto/bpf_crypto_skcipher.c | 1 +
crypto/chacha_generic.c | 4 +-
crypto/compress.c | 32 -
crypto/compress.h | 2 -
crypto/crypto_null.c | 68 +-
crypto/crypto_user.c | 16 -
crypto/ctr.c | 10 +-
crypto/deflate.c | 62 +-
crypto/ecc.c | 2 +-
crypto/ecdsa-p1363.c | 2 +-
crypto/ecdsa-x962.c | 4 +-
crypto/essiv.c | 3 +-
crypto/internal.h | 20 +-
crypto/krb5/Kconfig | 26 +
crypto/krb5/Makefile | 18 +
crypto/krb5/internal.h | 247 ++++++
crypto/krb5/krb5_api.c | 452 +++++++++++
crypto/krb5/krb5_kdf.c | 145 ++++
crypto/krb5/rfc3961_simplified.c | 792 +++++++++++++++++++
crypto/krb5/rfc3962_aes.c | 115 +++
crypto/krb5/rfc6803_camellia.c | 237 ++++++
crypto/krb5/rfc8009_aes2.c | 362 +++++++++
crypto/krb5/selftest.c | 544 +++++++++++++
crypto/krb5/selftest_data.c | 291 +++++++
crypto/krb5enc.c | 504 ++++++++++++
crypto/lrw.c | 2 +-
crypto/lz4.c | 65 +-
crypto/lz4hc.c | 70 +-
crypto/lzo-rle.c | 76 +-
crypto/lzo.c | 76 +-
crypto/pcbc.c | 28 +-
crypto/proc.c | 3 -
crypto/rsassa-pkcs1.c | 2 +-
crypto/scatterwalk.c | 126 ++-
crypto/scompress.c | 279 ++++---
crypto/skcipher.c | 151 ++--
crypto/tcrypt.c | 231 ++++++
crypto/testmgr.c | 505 ++++++------
crypto/testmgr.h | 351 +++++++++
crypto/xctr.c | 2 +-
crypto/xts.c | 2 +-
crypto/zstd.c | 60 +-
drivers/char/hw_random/Kconfig | 21 +-
drivers/char/hw_random/imx-rngc.c | 69 +-
drivers/char/hw_random/rockchip-rng.c | 254 +++++-
drivers/crypto/Kconfig | 1 +
drivers/crypto/Makefile | 2 +-
drivers/crypto/axis/artpec6_crypto.c | 4 +-
drivers/crypto/bcm/cipher.c | 27 +-
drivers/crypto/bcm/spu2.c | 3 +-
drivers/crypto/caam/caamalg_qi2.c | 3 +-
drivers/crypto/cavium/zip/zip_crypto.c | 46 +-
drivers/crypto/cavium/zip/zip_crypto.h | 17 +-
drivers/crypto/cavium/zip/zip_main.c | 50 +-
drivers/crypto/ccp/sp-pci.c | 16 +-
drivers/crypto/hisilicon/hpre/hpre_crypto.c | 7 +
drivers/crypto/hisilicon/sec2/sec.h | 1 -
drivers/crypto/hisilicon/sec2/sec_crypto.c | 125 ++-
drivers/crypto/inside-secure/Makefile | 1 +
drivers/crypto/inside-secure/eip93/Kconfig | 20 +
drivers/crypto/inside-secure/eip93/Makefile | 5 +
drivers/crypto/inside-secure/eip93/eip93-aead.c | 711 +++++++++++++++++
drivers/crypto/inside-secure/eip93/eip93-aead.h | 38 +
drivers/crypto/inside-secure/eip93/eip93-aes.h | 16 +
drivers/crypto/inside-secure/eip93/eip93-cipher.c | 413 ++++++++++
drivers/crypto/inside-secure/eip93/eip93-cipher.h | 60 ++
drivers/crypto/inside-secure/eip93/eip93-common.c | 822 +++++++++++++++++++
drivers/crypto/inside-secure/eip93/eip93-common.h | 24 +
drivers/crypto/inside-secure/eip93/eip93-des.h | 16 +
drivers/crypto/inside-secure/eip93/eip93-hash.c | 866 +++++++++++++++++++++
drivers/crypto/inside-secure/eip93/eip93-hash.h | 82 ++
drivers/crypto/inside-secure/eip93/eip93-main.c | 501 ++++++++++++
drivers/crypto/inside-secure/eip93/eip93-main.h | 151 ++++
drivers/crypto/inside-secure/eip93/eip93-regs.h | 335 ++++++++
drivers/crypto/intel/iaa/iaa_crypto_main.c | 164 +---
drivers/crypto/intel/qat/qat_420xx/Makefile | 2 +-
.../crypto/intel/qat/qat_420xx/adf_420xx_hw_data.c | 19 +-
drivers/crypto/intel/qat/qat_420xx/adf_drv.c | 2 +-
drivers/crypto/intel/qat/qat_4xxx/Makefile | 2 +-
.../crypto/intel/qat/qat_4xxx/adf_4xxx_hw_data.c | 13 +-
drivers/crypto/intel/qat/qat_4xxx/adf_drv.c | 2 +-
drivers/crypto/intel/qat/qat_c3xxx/Makefile | 2 +-
.../crypto/intel/qat/qat_c3xxx/adf_c3xxx_hw_data.c | 4 +-
drivers/crypto/intel/qat/qat_c3xxx/adf_drv.c | 2 +-
drivers/crypto/intel/qat/qat_c3xxxvf/Makefile | 2 +-
drivers/crypto/intel/qat/qat_c62x/Makefile | 2 +-
.../crypto/intel/qat/qat_c62x/adf_c62x_hw_data.c | 4 +-
drivers/crypto/intel/qat/qat_c62x/adf_drv.c | 4 +-
drivers/crypto/intel/qat/qat_c62xvf/Makefile | 2 +-
drivers/crypto/intel/qat/qat_common/Makefile | 68 +-
.../intel/qat/qat_common/adf_accel_devices.h | 23 +-
.../crypto/intel/qat/qat_common/adf_cfg_services.c | 167 +++-
.../crypto/intel/qat/qat_common/adf_cfg_services.h | 28 +-
.../crypto/intel/qat/qat_common/adf_cfg_strings.h | 6 +-
.../crypto/intel/qat/qat_common/adf_gen2_hw_data.c | 2 +-
.../crypto/intel/qat/qat_common/adf_gen4_config.c | 15 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.c | 54 +-
.../crypto/intel/qat/qat_common/adf_gen4_hw_data.h | 1 +
drivers/crypto/intel/qat/qat_common/adf_gen4_ras.c | 59 +-
drivers/crypto/intel/qat/qat_common/adf_sysfs.c | 22 +-
.../crypto/intel/qat/qat_common/icp_qat_fw_comp.h | 4 +-
drivers/crypto/intel/qat/qat_common/icp_qat_uclo.h | 10 -
drivers/crypto/intel/qat/qat_common/qat_bl.c | 159 ----
drivers/crypto/intel/qat/qat_common/qat_bl.h | 6 -
.../crypto/intel/qat/qat_common/qat_comp_algs.c | 85 +-
drivers/crypto/intel/qat/qat_common/qat_comp_req.h | 10 -
drivers/crypto/intel/qat/qat_common/qat_uclo.c | 38 +-
drivers/crypto/intel/qat/qat_dh895xcc/Makefile | 2 +-
.../intel/qat/qat_dh895xcc/adf_dh895xcc_hw_data.c | 6 +-
drivers/crypto/intel/qat/qat_dh895xcc/adf_drv.c | 2 +-
drivers/crypto/intel/qat/qat_dh895xccvf/Makefile | 2 +-
drivers/crypto/marvell/Kconfig | 4 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 16 +-
drivers/crypto/marvell/octeontx/otx_cptpf_ucode.h | 2 -
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.c | 100 +--
.../crypto/marvell/octeontx2/otx2_cptpf_ucode.h | 1 -
.../crypto/marvell/octeontx2/otx2_cptvf_reqmgr.c | 7 +-
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/nx/nx-842.c | 33 +-
drivers/crypto/nx/nx-842.h | 15 +-
drivers/crypto/nx/nx-aes-ccm.c | 16 +-
drivers/crypto/nx/nx-aes-gcm.c | 17 +-
drivers/crypto/nx/nx-common-powernv.c | 31 +-
drivers/crypto/nx/nx-common-pseries.c | 70 +-
drivers/crypto/nx/nx.c | 34 +-
drivers/crypto/nx/nx.h | 3 -
drivers/crypto/padlock-sha.c | 4 +-
drivers/crypto/s5p-sss.c | 38 +-
drivers/crypto/stm32/stm32-cryp.c | 34 +-
drivers/crypto/tegra/tegra-se-aes.c | 401 ++++++----
drivers/crypto/tegra/tegra-se-hash.c | 287 ++++---
drivers/crypto/tegra/tegra-se-key.c | 29 +-
drivers/crypto/tegra/tegra-se-main.c | 16 +-
drivers/crypto/tegra/tegra-se.h | 39 +-
.../crypto/virtio/virtio_crypto_akcipher_algs.c | 41 +-
drivers/crypto/virtio/virtio_crypto_core.c | 6 +-
drivers/crypto/virtio/virtio_crypto_mgr.c | 2 +-
.../crypto/virtio/virtio_crypto_skcipher_algs.c | 17 +-
fs/ubifs/compress.c | 208 ++++-
fs/ubifs/file.c | 74 +-
fs/ubifs/journal.c | 11 +-
fs/ubifs/ubifs.h | 26 +-
include/crypto/acompress.h | 382 ++++++++-
include/crypto/algapi.h | 33 +-
include/crypto/authenc.h | 2 +
include/crypto/chacha.h | 11 +-
include/crypto/ctr.h | 2 +-
include/crypto/hash.h | 72 +-
include/crypto/internal/acompress.h | 85 +-
include/crypto/internal/hash.h | 15 +
include/crypto/internal/scompress.h | 18 +-
include/crypto/internal/skcipher.h | 40 +-
include/crypto/krb5.h | 160 ++++
include/crypto/scatterwalk.h | 234 ++++--
include/crypto/sig.h | 5 +-
include/crypto/skcipher.h | 19 +-
include/dt-bindings/reset/rockchip,rk3588-cru.h | 41 +-
include/linux/async_tx.h | 5 -
include/linux/crypto.h | 83 +-
include/linux/lzo.h | 8 +
include/linux/math.h | 12 +
include/linux/scatterlist.h | 1 +
include/linux/spinlock.h | 13 +
include/net/ipcomp.h | 13 +-
include/uapi/linux/psp-sev.h | 21 +-
kernel/power/hibernate.c | 5 +-
kernel/power/swap.c | 58 +-
lib/842/842_compress.c | 2 +
lib/crypto/Kconfig | 45 +-
lib/crypto/chacha20poly1305.c | 7 +-
lib/lzo/Makefile | 2 +-
lib/lzo/lzo1x_compress.c | 102 ++-
lib/lzo/lzo1x_compress_safe.c | 18 +
lib/scatterlist.c | 12 +-
net/tls/tls_device_fallback.c | 31 +-
net/xfrm/xfrm_algo.c | 7 +-
net/xfrm/xfrm_ipcomp.c | 479 ++++++------
security/keys/Kconfig | 2 +-
tools/testing/crypto/chacha20-s390/test-cipher.c | 4 +-
233 files changed, 14511 insertions(+), 4726 deletions(-)
create mode 100644 Documentation/crypto/krb5.rst
create mode 100644 Documentation/devicetree/bindings/crypto/fsl,sec2.0.yaml
delete mode 100644 Documentation/devicetree/bindings/crypto/fsl-sec2.txt
create mode 100644 Documentation/devicetree/bindings/crypto/inside-secure,safexcel-eip93.yaml
create mode 100644 Documentation/devicetree/bindings/rng/rockchip,rk3588-rng.yaml
create mode 100644 arch/x86/crypto/aes-ctr-avx-x86_64.S
delete mode 100644 arch/x86/crypto/aes_ctrby8_avx-x86_64.S
delete mode 100644 crypto/compress.c
create mode 100644 crypto/krb5/Kconfig
create mode 100644 crypto/krb5/Makefile
create mode 100644 crypto/krb5/internal.h
create mode 100644 crypto/krb5/krb5_api.c
create mode 100644 crypto/krb5/krb5_kdf.c
create mode 100644 crypto/krb5/rfc3961_simplified.c
create mode 100644 crypto/krb5/rfc3962_aes.c
create mode 100644 crypto/krb5/rfc6803_camellia.c
create mode 100644 crypto/krb5/rfc8009_aes2.c
create mode 100644 crypto/krb5/selftest.c
create mode 100644 crypto/krb5/selftest_data.c
create mode 100644 crypto/krb5enc.c
create mode 100644 drivers/crypto/inside-secure/eip93/Kconfig
create mode 100644 drivers/crypto/inside-secure/eip93/Makefile
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-aead.c
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-aead.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-aes.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-cipher.c
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-cipher.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-common.c
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-common.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-des.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-hash.c
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-hash.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-main.c
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-main.h
create mode 100644 drivers/crypto/inside-secure/eip93/eip93-regs.h
create mode 100644 include/crypto/krb5.h
create mode 100644 lib/lzo/lzo1x_compress_safe.c
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-25 5:53 ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
@ 2025-03-25 15:25 ` Eric Biggers
2025-03-25 16:59 ` Ard Biesheuvel
` (2 more replies)
2025-03-29 18:24 ` pr-tracker-bot
1 sibling, 3 replies; 204+ messages in thread
From: Eric Biggers @ 2025-03-25 15:25 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Mar 25, 2025 at 01:53:28PM +0800, Herbert Xu wrote:
>
> crypto: hash - Add request chaining API
Herbert didn't mention that I have nacked this patch, which he is insisting on
pushing for some reason instead of my original version that is much better.
Let me reiterate why "request chaining" is a bad idea and is going to cause
problems.
It makes it so that now a single hash request can now actually be a list of hash
requests. It makes some of the crypto code operate on the whole list. However,
most code still operates only on the first request in the list. It's
undocumented and inconsistent which code is doing which, which is going to cause
bugs. The first request in the list is also being treated specially in
undocumented ways, so submitting a list of requests is not necessarily
equivalent to submitting them all individually. Another recipe for bugs.
Each hash request can also contain an entire scatterlist. It's overkill for
what is actually needed for multibuffer hashing, which is a simple API that
hashes two buffers specified by virtual address. Herbert's API creates lots of
unnecessary edge cases, most of which lack any testing. It continues many of
the worst practices of the crypto API that we *know* are not working, like
requiring per-request memory allocations and optimizing for legacy hardware
offload rather than the CPU-based crypto that almost everyone actually uses.
In contrast, my patchset
https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
multibuffer hashing in a much better way and has been ready for a year already.
It actually works; it has a smaller diffstat; it is faster; it has a much
simpler API; and it actually includes all needed pieces including x86 and arm64
support, dm-verity and fs-verity support, and full documentation and tests.
I've been spending a lot of time fixing the kernel's crypto code over the years.
I'm not looking forward to having another set of major issues to fix.
And this latest set of issues will be totally unnecessary.
We can do better than this, especially for cryptography code.
Nacked-by: Eric Biggers <ebiggers@kernel.org>
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-25 15:25 ` Eric Biggers
@ 2025-03-25 16:59 ` Ard Biesheuvel
2025-03-26 1:49 ` Herbert Xu
2025-03-29 17:40 ` Linus Torvalds
2 siblings, 0 replies; 204+ messages in thread
From: Ard Biesheuvel @ 2025-03-25 16:59 UTC (permalink / raw)
To: Eric Biggers, Herbert Xu, Linus Torvalds
Cc: David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, 25 Mar 2025 at 16:25, Eric Biggers <ebiggers@kernel.org> wrote:
>
> On Tue, Mar 25, 2025 at 01:53:28PM +0800, Herbert Xu wrote:
> >
> > crypto: hash - Add request chaining API
>
> Herbert didn't mention that I have nacked this patch, which he is insisting on
> pushing for some reason instead of my original version that is much better.
>
> Let me reiterate why "request chaining" is a bad idea and is going to cause
> problems.
>
> It makes it so that now a single hash request can now actually be a list of hash
> requests. It makes some of the crypto code operate on the whole list. However,
> most code still operates only on the first request in the list. It's
> undocumented and inconsistent which code is doing which, which is going to cause
> bugs. The first request in the list is also being treated specially in
> undocumented ways, so submitting a list of requests is not necessarily
> equivalent to submitting them all individually. Another recipe for bugs.
>
> Each hash request can also contain an entire scatterlist. It's overkill for
> what is actually needed for multibuffer hashing, which is a simple API that
> hashes two buffers specified by virtual address. Herbert's API creates lots of
> unnecessary edge cases, most of which lack any testing. It continues many of
> the worst practices of the crypto API that we *know* are not working, like
> requiring per-request memory allocations and optimizing for legacy hardware
> offload rather than the CPU-based crypto that almost everyone actually uses.
>
> In contrast, my patchset
> https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
> multibuffer hashing in a much better way and has been ready for a year already.
> It actually works; it has a smaller diffstat; it is faster; it has a much
> simpler API; and it actually includes all needed pieces including x86 and arm64
> support, dm-verity and fs-verity support, and full documentation and tests.
>
> I've been spending a lot of time fixing the kernel's crypto code over the years.
> I'm not looking forward to having another set of major issues to fix.
>
> And this latest set of issues will be totally unnecessary.
>
> We can do better than this, especially for cryptography code.
>
> Nacked-by: Eric Biggers <ebiggers@kernel.org>
>
It's sad that it is coming to this, but I have to second Eric here:
for CPU based crypto, the flexibility of Herbert's approach has no
added value. SHA CPU instructions can be interleaved at the
instruction level to get almost 2x speedup in some cases, and this
works very well when operating on equal sized inputs. However,
generalizing this to arbitrary request chains to accommodate async h/w
offload introduces a lot of complexity for use cases that are only
imaginary.
Given Eric's track record as a contributor to the crypto subsystem and
as a maintainer of subsystems that are closely tied to it, I would
expect Herbert to take his opinion more seriously, but it is just
being ignored. Instead, a lightly tested alternative with no
integration into existing users has been merged in its place, with
very little input from the community.
So Herbert, please withdraw this pull request, and work with Eric and
the rest of us to converge on something that we can all get behind.
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-25 15:25 ` Eric Biggers
2025-03-25 16:59 ` Ard Biesheuvel
@ 2025-03-26 1:49 ` Herbert Xu
2025-03-26 2:16 ` Herbert Xu
2025-03-26 3:20 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
2025-03-29 17:40 ` Linus Torvalds
2 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-03-26 1:49 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Mar 25, 2025 at 08:25:41AM -0700, Eric Biggers wrote:
>
> Herbert didn't mention that I have nacked this patch, which he is insisting on
> pushing for some reason instead of my original version that is much better.
Let's see how your version is so much better:
https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/
- /* Up to 1 + FS_VERITY_MAX_LEVELS pages may be mapped at once */
- BUILD_BUG_ON(1 + FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
+ /*
+ * Up to FS_VERITY_MAX_PENDING_DATA_BLOCKS + FS_VERITY_MAX_LEVELS pages
+ * may be mapped at once.
+ */
+ BUILD_BUG_ON(FS_VERITY_MAX_PENDING_DATA_BLOCKS +
+ FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
This arbitrary limit is a direct result of your welded-on commitment
to an API that supports virtually mapped addresses only. Make no
mistake, virtual addresses are simple and easy to use, but the kernel
added more complicated constructs for real reasons.
I've gone through your use-case in fsverity/dm-verity, and they
never touch the data at all so the only reason for it to kmap the
data at all is to feed it to the Crypto API, which is capable of
doing its own kmap but you elected not to use that because you
hate the interface.
In fact it's a recurring theme, the zswap code jumps through multiple
hoops to map the data they're working on so that they can feed it to
the Crypto API as a virtually mapped pointer, even though they never
touch the mapped data at all. The same thing also happened in ubifs,
which I managed to simplify by switching away from kmapped pointers:
https://patchwork.kernel.org/project/linux-crypto/patch/99ae6a15afc1478bab201949dc3dbb2c7634b687.1742034499.git.herbert@gondor.apana.org.au/
- addr += UBIFS_BLOCK_SIZE;
- if (folio_test_highmem(folio) && (offset_in_page(addr) == 0)) {
- kunmap_local(addr - UBIFS_BLOCK_SIZE);
- addr = kmap_local_folio(folio, i * UBIFS_BLOCK_SIZE);
- }
+ offset += UBIFS_BLOCK_SIZE;
All this complexity was added because the legacy compression
interface only supported virtually mapped addresses.
Sure the ahash/acomp interface was suboptimal for *only* supporting
SG lists, which is what this pull request addresses by adding virtual
address (and folio) support.
> Let me reiterate why "request chaining" is a bad idea and is going to cause
> problems.
I'm more than willing to discuss with you the implementation details
of how the chaining is done and improving it. However, if you proceed
to only issue blanket nacks without providing any constructive feedback,
then the only thing I can do is ignore you.
> In contrast, my patchset
> https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
> multibuffer hashing in a much better way and has been ready for a year already.
> It actually works; it has a smaller diffstat; it is faster; it has a much
> simpler API; and it actually includes all needed pieces including x86 and arm64
> support, dm-verity and fs-verity support, and full documentation and tests.
Everybody wants to sratch their itch but my job as the maintainer is
to ensure that the subsystem doesn't collapse into an unmaintainable
hodgepodge of individual contributions.
Yes I get that batching is useful for you, but your use-case is not
unique at all. The compression people are proposing pretty much the
same thing
https://patchwork.kernel.org/project/linux-crypto/patch/20250303084724.6490-15-kanchana.p.sridhar@intel.com/
I don't want to be pressured by you into committing to an interface
that works for you only.
> Nacked-by: Eric Biggers <ebiggers@kernel.org>
This pull request doesn't even contain the meat of the hash changes
since I've been busy with the compression work. So this is simply
a pre-emptive strike to stop further work from rendering your patches
obsolete.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-26 1:49 ` Herbert Xu
@ 2025-03-26 2:16 ` Herbert Xu
2025-03-26 3:34 ` Eric Biggers
2025-03-26 3:20 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-26 2:16 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Mar 26, 2025 at 09:49:14AM +0800, Herbert Xu wrote:
>
> Let's see how your version is so much better:
>
> https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/
BTW, I absolutely hate how the fs/block layer uses work queues
for everything. It's been used as an argument for async being
unnecessary because you can always wait for completion since
you're in a work queue.
But this is exactly the wrong way to do asynchronous completion.
In fact, now that async support has been removed because of
religious opposition to ahash, we now end up with the worst of
both worlds where hashing is punted off to a work queue where
it is simply executed on the CPU:
/**
* fsverity_enqueue_verify_work() - enqueue work on the fs-verity workqueue
* @work: the work to enqueue
*
* Enqueue verification work for asynchronous processing.
*/
void fsverity_enqueue_verify_work(struct work_struct *work)
{
queue_work(fsverity_read_workqueue, work);
}
The correct way to do async offload is to do it conditionally:
ret = submit_request(rq);
if (unlikely(needs_async(ret))) {
allocate for async path with fallback to sync
processing in case of OOM
return;
}
execute normal synchronous path
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-26 1:49 ` Herbert Xu
2025-03-26 2:16 ` Herbert Xu
@ 2025-03-26 3:20 ` Eric Biggers
2025-03-26 3:30 ` Herbert Xu
1 sibling, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-26 3:20 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Mar 26, 2025 at 09:49:14AM +0800, Herbert Xu wrote:
> On Tue, Mar 25, 2025 at 08:25:41AM -0700, Eric Biggers wrote:
> >
> > Herbert didn't mention that I have nacked this patch, which he is insisting on
> > pushing for some reason instead of my original version that is much better.
>
> Let's see how your version is so much better:
>
> https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/
>
> - /* Up to 1 + FS_VERITY_MAX_LEVELS pages may be mapped at once */
> - BUILD_BUG_ON(1 + FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
> + /*
> + * Up to FS_VERITY_MAX_PENDING_DATA_BLOCKS + FS_VERITY_MAX_LEVELS pages
> + * may be mapped at once.
> + */
> + BUILD_BUG_ON(FS_VERITY_MAX_PENDING_DATA_BLOCKS +
> + FS_VERITY_MAX_LEVELS > KM_MAX_IDX);
>
> This arbitrary limit is a direct result of your welded-on commitment
> to an API that supports virtually mapped addresses only. Make no
> mistake, virtual addresses are simple and easy to use, but the kernel
> added more complicated constructs for real reasons.
Umm, so you think someone is going to do multibuffer hashing with more buffers
than kmap_local supports (16)? Why? Regardless of the exact API, that case
would require kmap() to support. It's hard to see how it would ever be worth
it, even if theoretically a CPU was capable of taking advantage of that much
instruction-level parallelism (this is implausible with SHA-256 instructions)
and ignoring the other issues like code size bloat and increased memory usage
that a very high interleaving factor would cause.
Of course, in practice this is just going to be used with 2x, which is what CPUs
can actually do with the SHA-256 instructions and avoids the various downsides
of overly-large interleaving factors.
> I've gone through your use-case in fsverity/dm-verity, and they
> never touch the data at all so the only reason for it to kmap the
> data at all is to feed it to the Crypto API, which is capable of
> doing its own kmap but you elected not to use that because you
> hate the interface.
Which is incorrect and just shows that you still haven't even read the code.
Take a look at cf715f4b7eb521a5bf67d391387b754c2fcde8d2. Switching dm-verity to
always "map" the data blocks significantly simplified the dm-verity code (-138
line diffstat), *even before switching to shash*. So we really want to just
pass virtual addresses to the crypto API too. It's much simpler.
> In fact it's a recurring theme, the zswap code jumps through multiple
> hoops to map the data they're working on so that they can feed it to
> the Crypto API as a virtually mapped pointer, even though they never
> touch the mapped data at all.
Compression and hashing are not the same and use different APIs. So this is a
straw man. But I think you are on the wrong track for compression too. What
zswap needs is relatively limited: only the compressed data (not the
uncompressed data) can be split across pages, and only 2 pages. A complex API
with source and destination scatterlists isn't needed for this use case either,
even assuming that the best solution is to make all the compression algorithms
support this "natively" (most don't yet, or don't support it efficiently).
Other solutions that could be faster include just continuing to linearize the
data, or rethinking zswap to not create non-linear compressed data in the first
place, e.g. by putting compressed data only in large folios.
And yes, the zswap patchset is using request chaining, but that's because you
forced the zswap people to use it. It wasn't their original proposal. And
based on the discussions and various versions of the patchset, they've been
having quite a bit of trouble making sense of your API.
But again, this is compression, not hashing. They don't use the same API.
> which I managed to simplify by switching away from kmapped pointers:
>
> https://patchwork.kernel.org/project/linux-crypto/patch/99ae6a15afc1478bab201949dc3dbb2c7634b687.1742034499.git.herbert@gondor.apana.org.au/
>
"Simplify" by a +90 line diffstat. Sure.
> > Let me reiterate why "request chaining" is a bad idea and is going to cause
> > problems.
>
> I'm more than willing to discuss with you the implementation details
> of how the chaining is done and improving it. However, if you proceed
> to only issue blanket nacks without providing any constructive feedback,
> then the only thing I can do is ignore you.
I've given you extensive constructive feedback over the past year, while you've
continued to nack my patches for inconsistent and bogus reasons.
> > In contrast, my patchset
> > https://lore.kernel.org/r/20250212154718.44255-1-ebiggers@kernel.org/ supports
> > multibuffer hashing in a much better way and has been ready for a year already.
> > It actually works; it has a smaller diffstat; it is faster; it has a much
> > simpler API; and it actually includes all needed pieces including x86 and arm64
> > support, dm-verity and fs-verity support, and full documentation and tests.
>
> Everybody wants to sratch their itch but my job as the maintainer is
> to ensure that the subsystem doesn't collapse into an unmaintainable
> hodgepodge of individual contributions.
But when there is only one such contribution, why overengineer it with something
that is slower, more complex, more error-prone, and harder to maintain?
Especially when this is a kernel-internal API that we can change whenever we
want to suit what is actually being used in the kernel.
And your vague plan to use multibuffer hashing in IPsec doesn't count. I keep
explaining why it doesn't actually make sense, and how I've *actually* been
optimizing IPsec in other ways that actually matter and actually work, but you
haven't been listening.
> This pull request doesn't even contain the meat of the hash changes
> since I've been busy with the compression work. So this is simply
> a pre-emptive strike to stop further work from rendering your patches
> obsolete.
I'd love for your work to make my patches obsolete, but unfortunately your
version is just worse. And besides it being very incomplete, the main issue is
fundamental with the design. So it doesn't really make sense to use it,
especially when I'm going to get stuck cleaning up your mess again.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-26 3:20 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
@ 2025-03-26 3:30 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2025-03-26 3:30 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Mar 25, 2025 at 08:20:38PM -0700, Eric Biggers wrote:
>
> I'd love for your work to make my patches obsolete, but unfortunately your
> version is just worse. And besides it being very incomplete, the main issue is
> fundamental with the design. So it doesn't really make sense to use it,
> especially when I'm going to get stuck cleaning up your mess again.
I haven't even pushed the bulk of my hash work and yet you're trying
stop my pull request, so it's your way or the high way.
I don't see how that is constructive feedback.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-26 2:16 ` Herbert Xu
@ 2025-03-26 3:34 ` Eric Biggers
2025-03-26 3:52 ` Herbert Xu
0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-26 3:34 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Mar 26, 2025 at 10:16:10AM +0800, Herbert Xu wrote:
> On Wed, Mar 26, 2025 at 09:49:14AM +0800, Herbert Xu wrote:
> >
> > Let's see how your version is so much better:
> >
> > https://lore.kernel.org/all/20250212154718.44255-6-ebiggers@kernel.org/
>
> BTW, I absolutely hate how the fs/block layer uses work queues
> for everything. It's been used as an argument for async being
> unnecessary because you can always wait for completion since
> you're in a work queue.
>
> But this is exactly the wrong way to do asynchronous completion.
> In fact, now that async support has been removed because of
> religious opposition to ahash, we now end up with the worst of
> both worlds where hashing is punted off to a work queue where
> it is simply executed on the CPU:
>
> /**
> * fsverity_enqueue_verify_work() - enqueue work on the fs-verity workqueue
> * @work: the work to enqueue
> *
> * Enqueue verification work for asynchronous processing.
> */
> void fsverity_enqueue_verify_work(struct work_struct *work)
> {
> queue_work(fsverity_read_workqueue, work);
> }
>
> The correct way to do async offload is to do it conditionally:
>
> ret = submit_request(rq);
> if (unlikely(needs_async(ret))) {
> allocate for async path with fallback to sync
> processing in case of OOM
> return;
> }
>
> execute normal synchronous path
>
In the general case, the workqueue is needed anyway because the work can block
(e.g. to read Merkle tree blocks) or can take longer than should be spent in
softirq context. But in many cases the workqueue is indeed overkill and hurts
I/O performance. For that reason, dm-verity and dm-crypt already support doing
the read completion work in softirq context in some cases. It's not enabled by
default though, and isn't implemented in quite the way it should be. Several
people, including me, have been looking into improving that.
So I think your observation about the workqueue being unhelpful is generally
correct, but fixing that is already partially implemented and is being worked on
further. And regardless, this does not have that much relevance to the crypto
API. Yes, you can't sleep from a softirq, which means you can't wait for an
async crypto request to complete (other than polling). So if you want to do
that, you have to go down the workqueue code path. But in practice 99% of users
are just using the CPU-based crypto that is synchronous and does not block.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-26 3:34 ` Eric Biggers
@ 2025-03-26 3:52 ` Herbert Xu
2025-03-30 2:33 ` Chaining is dead Herbert Xu
0 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-26 3:52 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Mar 25, 2025 at 08:34:04PM -0700, Eric Biggers wrote:
>
> So I think your observation about the workqueue being unhelpful is generally
> correct, but fixing that is already partially implemented and is being worked on
> further. And regardless, this does not have that much relevance to the crypto
> API. Yes, you can't sleep from a softirq, which means you can't wait for an
> async crypto request to complete (other than polling). So if you want to do
> that, you have to go down the workqueue code path. But in practice 99% of users
> are just using the CPU-based crypto that is synchronous and does not block.
The point is that you don't have to wait. Once verity verification
is done, all you do is mark the page/folio as up-to-date. That work
can be done directly from softirq context. So all you need to do to
support async crypto is to mark the page/folio as up-to-date from the
completion function, no work queues are needed anywhere.
Look, right now you've got this crazy cargo cult programming paradigm
of work queues that is worshipped because it lets you wait for async
completion. In reality it is forcing everybody to go async even when
they don't need it. Take ext4 as an example:
ext4 calls verity
schedule_work(verity_work);
return asynchronously!
verity_work:
do the crypto work
__read_end_io(bio);
Just get rid of the work queue, it is not needed for async crypto,
which you don't even support anymore because you hate the interface
so much.
Even if we want to support async crypto, all you have to do is move
the __read_end_io call into the async completion function. Voila,
no work queues are needed.
ext4 calls verity
verity:
ret = do the crypto work
if (is_async(ret))
return asynchronously;
__read_end_io(bio)
return synchronously;
async completion:
__read_end_io(bio)
Networking has been doing this since 2008, I have no idea why storage
insists on the crazy workqueue paradigm.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-25 15:25 ` Eric Biggers
2025-03-25 16:59 ` Ard Biesheuvel
2025-03-26 1:49 ` Herbert Xu
@ 2025-03-29 17:40 ` Linus Torvalds
2025-03-29 18:06 ` Eric Biggers
2 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 17:40 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, 25 Mar 2025 at 08:25, Eric Biggers <ebiggers@kernel.org> wrote:
>
> Each hash request can also contain an entire scatterlist. It's overkill for
> what is actually needed for multibuffer hashing, which is a simple API that
> hashes two buffers specified by virtual address. Herbert's API creates lots of
> unnecessary edge cases, most of which lack any testing.
Isn't that the whole *point* of the generic crypto layer?
Honestly, I think anybody who cares about modern CPU-based crypto
should do what wireguard did: stop using the generic crypto layer,
because it's fundamentally designed for odd async hardware in strange
*legacy* models, and the whole basic design is around the indirection
that allows different crypto engines.
Because that's the *point* of that code. I mean, a large part of the
*design* of it is centered around having external crypto engines. And
the thing you worry about is pretty much the opposite of that.
So if what you want is just fast modern crypto on the CPU, the generic
interfaces are just odd and complicated.
Yes, they get less complicated if you limit yourself to the
synchronous interfaces - which is, as you point out - why most people
do exactly that.
Put another way: I don't disagree with you, but at the same time my
reaction is that the generic crypto layer does what it has always
done.
I get the feeling that you are arguing for avoiding the overheads and
abstractions, and I'm not disagreeing. But overheads and abstractions
is what that crypto layer is *for*.
I mean, you can do
tfm = crypto_alloc_shash("crc32c", 0, 0);
and jump through the crazy hoops with the indirection of going through
that tfm ("transformation object") that allocates a lot of extra info
and works with other things. And it's designed to work with various
non-CPU addresses etc.
Or you can just do
crc = crc32c(crc, virt, cur_len);
and you're done - at the cost of only working with regular virtually
mapped addresses. Your choice.
So I think you want to do the wireguard thing, and use the fixed and
simple cases.
Yes, those interfaces only exist for a subset of things, but I think
that subset of things is (a) the relevant subset and (b) the ones
you'd do the whole parallel execution for anyway (afaik you did
sha256).
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-29 17:40 ` Linus Torvalds
@ 2025-03-29 18:06 ` Eric Biggers
2025-03-29 18:17 ` Linus Torvalds
0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-29 18:06 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sat, Mar 29, 2025 at 10:40:23AM -0700, Linus Torvalds wrote:
> On Tue, 25 Mar 2025 at 08:25, Eric Biggers <ebiggers@kernel.org> wrote:
> >
> > Each hash request can also contain an entire scatterlist. It's overkill for
> > what is actually needed for multibuffer hashing, which is a simple API that
> > hashes two buffers specified by virtual address. Herbert's API creates lots of
> > unnecessary edge cases, most of which lack any testing.
>
> Isn't that the whole *point* of the generic crypto layer?
>
> Honestly, I think anybody who cares about modern CPU-based crypto
> should do what wireguard did: stop using the generic crypto layer,
> because it's fundamentally designed for odd async hardware in strange
> *legacy* models, and the whole basic design is around the indirection
> that allows different crypto engines.
>
> Because that's the *point* of that code. I mean, a large part of the
> *design* of it is centered around having external crypto engines. And
> the thing you worry about is pretty much the opposite of that.
>
> So if what you want is just fast modern crypto on the CPU, the generic
> interfaces are just odd and complicated.
>
> Yes, they get less complicated if you limit yourself to the
> synchronous interfaces - which is, as you point out - why most people
> do exactly that.
>
> Put another way: I don't disagree with you, but at the same time my
> reaction is that the generic crypto layer does what it has always
> done.
>
> I get the feeling that you are arguing for avoiding the overheads and
> abstractions, and I'm not disagreeing. But overheads and abstractions
> is what that crypto layer is *for*.
>
> I mean, you can do
>
> tfm = crypto_alloc_shash("crc32c", 0, 0);
>
> and jump through the crazy hoops with the indirection of going through
> that tfm ("transformation object") that allocates a lot of extra info
> and works with other things. And it's designed to work with various
> non-CPU addresses etc.
>
> Or you can just do
>
> crc = crc32c(crc, virt, cur_len);
>
> and you're done - at the cost of only working with regular virtually
> mapped addresses. Your choice.
>
> So I think you want to do the wireguard thing, and use the fixed and
> simple cases.
>
> Yes, those interfaces only exist for a subset of things, but I think
> that subset of things is (a) the relevant subset and (b) the ones
> you'd do the whole parallel execution for anyway (afaik you did
> sha256).
The crypto_shash API is synchronous and operates on virtual addresses. So it
just provides a simple way to support multiple hash algorithms, and none of the
legacy asynchronous hardware offload stuff. It's crypto_ahash that has that.
Multibuffer hashing (interleaving multiple hashes) is CPU-based, and it requires
that all the lengths be synced up for it to work, which makes it very difficult
to support scatterlists. So considering just crypto_shash and crypto_ahash, it
really belongs in crypto_shash (whereas Herbert wants it to go in crypto_ahash).
You're correct that it could go in a SHA-256 library function instead of either
crypto_shash or crypto_ahash. I think it would be slightly more convenient to
have it in crypto_shash, since the users that want this (dm-verity and
fs-verity) do support multiple hash algorithms and appreciate having the
*simple* abstraction layer of crypto_shash.
But I'd be okay with having a separate code path for SHA-256 too, and maybe this
is the best way out of this... No need to use the "Crypto API" at all if it's
not going to provide what is needed.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-29 18:06 ` Eric Biggers
@ 2025-03-29 18:17 ` Linus Torvalds
2025-03-29 18:19 ` Linus Torvalds
0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 18:17 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sat, 29 Mar 2025 at 11:06, Eric Biggers <ebiggers@kernel.org> wrote:
>
> The crypto_shash API is synchronous and operates on virtual addresses. So it
> just provides a simple way to support multiple hash algorithms, and none of the
> legacy asynchronous hardware offload stuff. It's crypto_ahash that has that.
Well, it's "simple" only compared to ahash.
It's still a complete nightmare compared to just doing the obvious
thing directly when that is an option.
I happened to just merge the rdma updates a couple of minutes ago, and
they actually removed the example I was using (ie the whole "use
crypto layer for crc32c" insanity).
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-29 18:17 ` Linus Torvalds
@ 2025-03-29 18:19 ` Linus Torvalds
2025-03-29 18:38 ` Eric Biggers
0 siblings, 1 reply; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 18:19 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sat, 29 Mar 2025 at 11:17, Linus Torvalds
<torvalds@linux-foundation.org> wrote:
>
> I happened to just merge the rdma updates a couple of minutes ago, and
> they actually removed the example I was using (ie the whole "use
> crypto layer for crc32c" insanity).
Heh. Looking closer, the "they" was actually you who did the patch and
Leon who applied it.
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-25 5:53 ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
2025-03-25 15:25 ` Eric Biggers
@ 2025-03-29 18:24 ` pr-tracker-bot
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-03-29 18:24 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Tue, 25 Mar 2025 13:53:28 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.15-p1
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e5e0e6bebef3a21081fd1057c40468d4cff1a60d
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-29 18:19 ` Linus Torvalds
@ 2025-03-29 18:38 ` Eric Biggers
2025-03-29 18:52 ` Linus Torvalds
0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-03-29 18:38 UTC (permalink / raw)
To: Linus Torvalds
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sat, Mar 29, 2025 at 11:19:19AM -0700, Linus Torvalds wrote:
> On Sat, 29 Mar 2025 at 11:17, Linus Torvalds
> <torvalds@linux-foundation.org> wrote:
> >
> > I happened to just merge the rdma updates a couple of minutes ago, and
> > they actually removed the example I was using (ie the whole "use
> > crypto layer for crc32c" insanity).
>
> Heh. Looking closer, the "they" was actually you who did the patch and
> Leon who applied it.
>
> Linus
Yes. Those cases were just a single algorithm, though, so of course the library
was simpler. fs-verity supports two hash algorithms (SHA-256 and SHA-512), and
dm-verity unfortunately supports every hash algorithm the crypto API supports
since it accepts it as a string and passes it directly to the crypto API. I
know for sure dm-verity is used with at least SHA-256, SHA-1, and BLAKE2b, but
there could be more. The crypto API also supports various "national pride"
algorithms like SM3 and Streebog, for example, and some people might expect
those to work with dm-verity. (Unfortunately SM3 keeps getting pushed into
various standards, libraries, CPU instruction sets, etc.)
So for fs-verity we'd basically need:
if (using SHA-256)
sha256()
else
sha512()
(and the same for any other algorithms that may get added in the future)
And for dm-verity we'd basically need:
if (using SHA-256)
sha256()
else
Use crypto_ahash or crypto_shash to handle arbitrary algorithm
And that's okay -- we can do that. Just crypto_shash ends up being
approximately what is needed already, so just using it seems slightly
preferable. But using the libraries whenever possible would be fine with me
too.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Update for 6.15
2025-03-29 18:38 ` Eric Biggers
@ 2025-03-29 18:52 ` Linus Torvalds
0 siblings, 0 replies; 204+ messages in thread
From: Linus Torvalds @ 2025-03-29 18:52 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sat, 29 Mar 2025 at 11:38, Eric Biggers <ebiggers@kernel.org> wrote:
>
> Yes. Those cases were just a single algorithm, though, so of course the library
> was simpler.
Yeah, I realize. It's the extreme case of "using the generic crypto
infrastructure is just silly to the point of being stupid".
I just think that there's a continuum of that situation.
There are cases where you *obviously* want to use the crypto
infrastructure, because you really have lots of different users, and
you actually need the flexibility (and in the extreme case you do have
the whole external async crypto engine case even if I can't for the
life of me see the point).
And there are the cases where it's just stupid to do it, because you
have one single hash you are doing and the flexibility is only pure
pointless overhead and it makes the code bigger, slower, and harder to
understand.
But I think then there are the middle grounds.
The cases where you may well just say "this is the common case that I
want to optimize for, and I know it's more efficient if I just do two
blocks in parallel and I'll do that case directly, and fall back to
the generic code for any odd cases".
Linus
^ permalink raw reply [flat|nested] 204+ messages in thread
* Chaining is dead
2025-03-26 3:52 ` Herbert Xu
@ 2025-03-30 2:33 ` Herbert Xu
2025-03-31 16:56 ` Eric Biggers
0 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-30 2:33 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Wed, Mar 26, 2025 at 11:52:05AM +0800, Herbert Xu wrote:
>
> they don't need it. Take ext4 as an example:
>
> ext4 calls verity
> schedule_work(verity_work);
> return asynchronously!
>
> verity_work:
> do the crypto work
> __read_end_io(bio);
I went ahead and removed the work queue for fsverity and fscrypt
(except for the reading of the Merkle tree which is still done in
a work queue because I'm too lazy to make that async), and it
actually turned out to be slower than using a work queue.
I was testing with an encrypted 8GB file over ext4 mounted over a
loopback device in tmpfs. The encryption is with xts-vaes. It turns
out that not using a work queue actually made reading the entire file
go from 2.4s to 2.5s.
I then tried passing the whole bio (256KB per crypto request in my
test as opposed to the data unit size of 4KB per crypto request)
through using chaining to skcipher, with xts-vaes doing the requests
one-by-one. Against my expectations, this didn't speed things up at
all (but at least it didn't slow things down either). All the
benefits of aggregating the data were offset by the extra setup cost
of creating the chained requests.
So chaining is clearly not the way to go because it involves cutting
up into data units at the start of the process, rather than the end.
Finally I hacked up a patch (this goes on top of the skcipher branch
in cryptodev) to pass the whole bio through the Crypto API all the
way to xts-vaes which then unbundled it. This turned out to be a
winner, taking the read time for 8GB from 2.4s down to 2.1s.
In view of this result, I'm going to throw away chaining, and instead
work on an interface that can take a whole bio (or folio), then cut
it up into the specified data unit size before processing.
The bottom-end of the interface should be able to feed two (or whatever
number you fancy) data units to the actual algorithm.
This should work just as well for compression, since their batching
input is simply a order-N folio. The compression output is a bit
harder because the data unit size is not constant, but I think I
have a way of making it work by adding a bit to the scatterlist data
structure to indicate the end of each data unit.
PS For fsverity a 256KB bio size equates to 64 units of hash input.
My strategy is to allocate the whole thing if we can (2KB or 4KB
depending on your digest size), and if that fails, fall back to
a stack buffer of 512 bytes (or whatever number that keeps the
compiler quiet regarding stack usage). Even if we're on the stack,
it should still give more than enough to data to satiate your
multibuffer hash code.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
diff --git a/arch/x86/crypto/aesni-intel_glue.c b/arch/x86/crypto/aesni-intel_glue.c
index 4f721760ebf1..57d149c223bd 100644
--- a/arch/x86/crypto/aesni-intel_glue.c
+++ b/arch/x86/crypto/aesni-intel_glue.c
@@ -17,6 +17,7 @@
* Copyright 2024 Google LLC
*/
+#include <linux/bio.h>
#include <linux/hardirq.h>
#include <linux/types.h>
#include <linux/module.h>
@@ -480,7 +481,7 @@ xts_crypt_slowpath(struct skcipher_request *req, xts_crypt_func crypt_func)
/* __always_inline to avoid indirect call in fastpath */
static __always_inline int
-xts_crypt(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
+xts_crypt_one(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
xts_crypt_func crypt_func)
{
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
@@ -511,6 +512,42 @@ xts_crypt(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
return xts_crypt_slowpath(req, crypt_func);
}
+static __always_inline int
+xts_crypt(struct skcipher_request *req, xts_encrypt_iv_func encrypt_iv,
+ xts_crypt_func crypt_func)
+{
+ unsigned int du_bits = req->cryptlen;
+ unsigned int du_size = 1U << du_bits;
+ __le64 *iv = (void *)req->iv;
+ struct folio_iter fi;
+ struct bio *bio;
+ int err;
+
+ if (!(req->base.flags & CRYPTO_SKCIPHER_REQ_BIO))
+ return xts_crypt_one(req, encrypt_iv, crypt_func);
+
+ bio = (void *)req->src;
+
+ for (bio_first_folio(&fi, bio, 0); fi.folio; bio_next_folio(&fi, bio)) {
+ size_t i = fi.offset;
+
+ for (; i < fi.offset + fi.length; i += du_size) {
+ skcipher_request_set_folio(req, fi.folio, i, fi.folio, i, du_size, iv);
+ err = xts_crypt_one(req, encrypt_iv, crypt_func);
+ if (err)
+ goto out;
+
+ *iv = cpu_to_le64(le64_to_cpu(*iv) + 1);
+ }
+ }
+
+out:
+ req->src = (void *)bio;
+ req->dst = (void *)bio;
+ req->cryptlen = du_bits;
+ return err;
+}
+
static void aesni_xts_encrypt_iv(const struct crypto_aes_ctx *tweak_key,
u8 iv[AES_BLOCK_SIZE])
{
diff --git a/fs/crypto/bio.c b/fs/crypto/bio.c
index 0ad8c30b8fa5..9f52dc7f7889 100644
--- a/fs/crypto/bio.c
+++ b/fs/crypto/bio.c
@@ -7,6 +7,7 @@
* Copyright (C) 2015, Motorola Mobility
*/
+#include <crypto/skcipher.h>
#include <linux/pagemap.h>
#include <linux/module.h>
#include <linux/bio.h>
@@ -30,16 +31,49 @@
*/
bool fscrypt_decrypt_bio(struct bio *bio)
{
+ struct folio *folio = bio_first_folio_all(bio);
+ const struct inode *inode = folio->mapping->host;
+ const struct fscrypt_inode_info *ci = inode->i_crypt_info;
+ const unsigned int du_bits = ci->ci_data_unit_bits;
+ struct crypto_skcipher *tfm = ci->ci_enc_key.tfm;
+ SKCIPHER_REQUEST_ON_STACK(req, tfm, sizeof(bio));
+ struct bio **ctx = skcipher_request_extra(req);
+ DECLARE_CRYPTO_WAIT(wait);
struct folio_iter fi;
+ union fscrypt_iv iv;
+ u64 index;
+ int err;
- bio_for_each_folio_all(fi, bio) {
- int err = fscrypt_decrypt_pagecache_blocks(fi.folio, fi.length,
- fi.offset);
+ *ctx = bio;
- if (err) {
- bio->bi_status = errno_to_blk_status(err);
- return false;
- }
+ bio_first_folio(&fi, bio, 0);
+ if (!fi.folio)
+ return true;
+
+ index = fi.offset;
+ index = ((u64)fi.folio->index << (PAGE_SHIFT - du_bits)) +
+ (index >> du_bits);
+ fscrypt_generate_iv(&iv, index, ci);
+
+ skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG |
+ CRYPTO_SKCIPHER_REQ_BIO,
+ NULL, NULL);
+ skcipher_request_set_crypt(req, (struct scatterlist *)bio,
+ (struct scatterlist *)bio, du_bits, &iv);
+
+ err = crypto_skcipher_decrypt(req);
+ if (err == -EAGAIN) {
+ req = SKCIPHER_REQUEST_CLONE(req, GFP_ATOMIC);
+ skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG |
+ CRYPTO_SKCIPHER_REQ_BIO,
+ crypto_req_done, &wait);
+ err = crypto_skcipher_decrypt(req);
+ }
+ err = crypto_wait_req(err, &wait);
+ skcipher_request_free(req);
+ if (err) {
+ bio->bi_status = errno_to_blk_status(err);
+ return false;
}
return true;
}
diff --git a/include/crypto/skcipher.h b/include/crypto/skcipher.h
index e159ea68124e..931585f864d1 100644
--- a/include/crypto/skcipher.h
+++ b/include/crypto/skcipher.h
@@ -26,6 +26,8 @@
#define CRYPTO_SKCIPHER_REQ_CONT 0x00000001
/* Set this bit if the skcipher operation is not final. */
#define CRYPTO_SKCIPHER_REQ_NOTFINAL 0x00000002
+/* Set this bit if the skcipher is made of bio. */
+#define CRYPTO_SKCIPHER_REQ_BIO 0x00000004
/**
* struct skcipher_request - Symmetric key cipher request
^ permalink raw reply related [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.15
2024-12-14 9:21 ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
2024-12-14 17:18 ` pr-tracker-bot
@ 2025-03-31 4:50 ` Herbert Xu
2025-04-05 2:23 ` Herbert Xu
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-03-31 4:50 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 99585c2192cb1ce212876e82ef01d1c98c7f4699:
crypto: testmgr - Add multibuffer acomp testing (2025-03-22 07:25:19 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git v6.15-p2 v6.15-p2
for you to fetch changes up to 9764d5b0cd0ea4846fd46c7d0b4238ea122075a9:
Revert "crypto: testmgr - Add multibuffer hash testing" (2025-03-30 09:39:57 +0800)
----------------------------------------------------------------
This push fixes reverts the multibuffer hash testing as it is buggy.
----------------------------------------------------------------
Herbert Xu (1):
Revert "crypto: testmgr - Add multibuffer hash testing"
crypto/testmgr.c | 157 +++++++++----------------------------------------------
1 file changed, 24 insertions(+), 133 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-03-30 2:33 ` Chaining is dead Herbert Xu
@ 2025-03-31 16:56 ` Eric Biggers
2025-04-01 2:44 ` Herbert Xu
` (2 more replies)
0 siblings, 3 replies; 204+ messages in thread
From: Eric Biggers @ 2025-03-31 16:56 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Sun, Mar 30, 2025 at 10:33:23AM +0800, Herbert Xu wrote:
> On Wed, Mar 26, 2025 at 11:52:05AM +0800, Herbert Xu wrote:
> >
> > they don't need it. Take ext4 as an example:
> >
> > ext4 calls verity
> > schedule_work(verity_work);
> > return asynchronously!
> >
> > verity_work:
> > do the crypto work
> > __read_end_io(bio);
>
> I went ahead and removed the work queue for fsverity and fscrypt
> (except for the reading of the Merkle tree which is still done in
> a work queue because I'm too lazy to make that async), and it
> actually turned out to be slower than using a work queue.
>
> I was testing with an encrypted 8GB file over ext4 mounted over a
> loopback device in tmpfs. The encryption is with xts-vaes. It turns
> out that not using a work queue actually made reading the entire file
> go from 2.4s to 2.5s.
>
> I then tried passing the whole bio (256KB per crypto request in my
> test as opposed to the data unit size of 4KB per crypto request)
> through using chaining to skcipher, with xts-vaes doing the requests
> one-by-one. Against my expectations, this didn't speed things up at
> all (but at least it didn't slow things down either). All the
> benefits of aggregating the data were offset by the extra setup cost
> of creating the chained requests.
Yes, your chaining API has poor performance and is difficult to test, as I've
been saying all along.
> So chaining is clearly not the way to go because it involves cutting
> up into data units at the start of the process, rather than the end.
Certainly agreed that chaining is not the way to go, but I think you're
overlooking that Linus's suggestion to use the libraries directly would also
solve this, while also not being restricted to bios and folios (note that not
all filesystems are block-based, for example...). That would avoid the
per-request overhead from the generic crypto infrastructure, which is the real
source of the problem.
> Finally I hacked up a patch (this goes on top of the skcipher branch
> in cryptodev) to pass the whole bio through the Crypto API all the
> way to xts-vaes which then unbundled it. This turned out to be a
> winner, taking the read time for 8GB from 2.4s down to 2.1s.
>
> In view of this result, I'm going to throw away chaining, and instead
> work on an interface that can take a whole bio (or folio), then cut
> it up into the specified data unit size before processing.
>
> The bottom-end of the interface should be able to feed two (or whatever
> number you fancy) data units to the actual algorithm.
>
> This should work just as well for compression, since their batching
> input is simply a order-N folio. The compression output is a bit
> harder because the data unit size is not constant, but I think I
> have a way of making it work by adding a bit to the scatterlist data
> structure to indicate the end of each data unit.
>
> PS For fsverity a 256KB bio size equates to 64 units of hash input.
> My strategy is to allocate the whole thing if we can (2KB or 4KB
> depending on your digest size), and if that fails, fall back to
> a stack buffer of 512 bytes (or whatever number that keeps the
> compiler quiet regarding stack usage). Even if we're on the stack,
> it should still give more than enough to data to satiate your
> multibuffer hash code.
Extending the generic crypto infrastructure to support bios and folios is an
interesting idea.
But TBH I think it's worse than Linus's suggestion of just extending lib/crypto/
to support the needed functionality and using that directly. Your proposal is
again solving a problem created by the generic crypto infrastructure being too
complex, by making the generic crypto infrastructure even more complex.
With the bio and folio support in the generic crypto infrastructure, there would
be lots of work to do with adding support in all the underlying algorithms, and
adding tests for all the new APIs.
For hashing, users would need to allocate an array to hold the digest for every
block in the bio or folio. That would add an additional memory allocation to
every I/O. You said you'd like to fall back to a smaller buffer if the memory
allocation fails. But that's silly; if we have to support that anyway, we might
as well do it that way only. In which case the bio interface is pointless.
Also note that the kernel also *already* has an abstraction layer that allows
doing en/decryption on bios. It's called blk-crypto, and it makes it possible
to do the en/decryption using either inline encryption hardware (i.e., the newer
style of crypto accelerator that is actually commonly used and doesn't use the
Crypto API at all) or the Crypto API. I have plans to remove the fs-layer bio
en/decryption code from fscrypt and always use blk-crypto instead.
Adding bio support to the Crypto API feels duplicative of blk-crypto, and we'd
end up with too many abstraction layers. I think my preferred approach is that
blk-crypto-fallback would directly call the library functions. The legacy
Crypto API really has no useful role to play anymore.
FWIW, there are also people thinking about developing inline hashing hardware,
in which case something similar would apply to blk-integrity.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-03-31 16:56 ` Eric Biggers
@ 2025-04-01 2:44 ` Herbert Xu
2025-04-01 3:33 ` Eric Biggers
2025-04-01 3:30 ` Herbert Xu
2025-04-04 8:46 ` Christoph Hellwig
2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-04-01 2:44 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
>
> With the bio and folio support in the generic crypto infrastructure, there would
> be lots of work to do with adding support in all the underlying algorithms, and
> adding tests for all the new APIs.
It doesn't need to be all that complex. My plan is to add a fallback
template at the top, which could then be implemented by strategic
algorithms at the bottom through an extension of the skcipher walk
mechanism.
So you'd allocate "fscrypt(xts(aes))" instead of "xts(aes)", and
the xts-vaes code could simply use the normal skcipher walker with
zero changes. The only changes needed in the aesni module is to
hook up the xts code to the new "fscrypt(xts(aes))" algorithm.
The real reason why I think this is the way to go is that the same
speed-up would apply everywhere. So just as I could gain a 15%
speed-up with xts in fscrypt without any actual multibuffer code,
a similar speed-up is expected with gcm in networking. In fact
if anything the speed-up could be greater there because the data
unit size is smaller at under 1500 bytes.
You see the Crypto API as the problem here, but for me the problem
is the legacy data unit size. It's 2025 and there is no reason why
anyone should be dealing with units of 1500 or 4096 bytes.
> For hashing, users would need to allocate an array to hold the digest for every
> block in the bio or folio. That would add an additional memory allocation to
> every I/O. You said you'd like to fall back to a smaller buffer if the memory
> allocation fails. But that's silly; if we have to support that anyway, we might
> as well do it that way only. In which case the bio interface is pointless.
Sure if you decide to go down the lib/crypto route then there is
no gain. All it means is that you can't support hardware offload,
but neither of us really care about that.
> Also note that the kernel also *already* has an abstraction layer that allows
> doing en/decryption on bios. It's called blk-crypto, and it makes it possible
> to do the en/decryption using either inline encryption hardware (i.e., the newer
> style of crypto accelerator that is actually commonly used and doesn't use the
> Crypto API at all) or the Crypto API. I have plans to remove the fs-layer bio
> en/decryption code from fscrypt and always use blk-crypto instead.
Thanks for the pointer, I wasn't aware of its existence. Yes
there should definitely be only one code path for this. So
what's stopping you from removing fscrypt right now? IOW what's
missing from blk-crypto?
> Adding bio support to the Crypto API feels duplicative of blk-crypto, and we'd
> end up with too many abstraction layers. I think my preferred approach is that
> blk-crypto-fallback would directly call the library functions. The legacy
> Crypto API really has no useful role to play anymore.
I'd certainly like to see that :)
> FWIW, there are also people thinking about developing inline hashing hardware,
> in which case something similar would apply to blk-integrity.
Offloading a whole bio rather than a page or two is definitely
the way to go.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-03-31 16:56 ` Eric Biggers
2025-04-01 2:44 ` Herbert Xu
@ 2025-04-01 3:30 ` Herbert Xu
2025-04-01 3:39 ` Eric Biggers
2025-04-04 8:46 ` Christoph Hellwig
2 siblings, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-04-01 3:30 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
>
> For hashing, users would need to allocate an array to hold the digest for every
> block in the bio or folio. That would add an additional memory allocation to
> every I/O. You said you'd like to fall back to a smaller buffer if the memory
> allocation fails. But that's silly; if we have to support that anyway, we might
> as well do it that way only. In which case the bio interface is pointless.
BTW, the existing verity code is hilarious. In my test, for each
256KB bio, it was dividing them up into 4KB pages, and then for each
one of them, it's looking up the correct hash in the Merkle tree.
Surely there is some locality here so if you zoom out from 4KB (or
even 8KB with your multibuffer patch-set) to 256KB you could get all
the correct hashes in one go, rather than 64 times.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-04-01 2:44 ` Herbert Xu
@ 2025-04-01 3:33 ` Eric Biggers
2025-04-01 3:55 ` Herbert Xu
2025-04-01 7:20 ` Milan Broz
0 siblings, 2 replies; 204+ messages in thread
From: Eric Biggers @ 2025-04-01 3:33 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Apr 01, 2025 at 10:44:34AM +0800, Herbert Xu wrote:
> Thanks for the pointer, I wasn't aware of its existence. Yes
> there should definitely be only one code path for this. So
> what's stopping you from removing fscrypt right now? IOW what's
> missing from blk-crypto?
Well, fscrypt (ext4/f2fs/ubifs/ceph encryption) wouldn't be removed; its
implementation would just change on ext4 and f2fs. Instead of providing a
choice of whether to use blk-crypto or fs-layer crypto for file contents
en/decryption, ext4 and f2fs would always use blk-crypto. Supporting code such
as fscrypt_decrypt_bio() that would become unused by that would be removed.
A few reasons I've waited so long:
- The fs-layer file contents en/decryption code was there first, and there
hasn't been a strong need to remove it yet
- Much of the file contents en/decryption code in fs/crypto/ would still be
needed, since ubifs and ceph still use it as they are not block-based
- It would make CONFIG_BLK_INLINE_ENCRYPTION, which adds a field to struct bio,
required on more systems
- It would add the overhead of keyslot management to software crypto
- blk-crypto currently always uses inline encryption hardware when it's
available; but, I'd like to preserve ext4's and f2fs's existing behavior where
the use of inline encryption hardware is opt-in via a mount option.
But I'm thinking it's finally time, especially with the conversions of
filesystems to operate on folios that's going on.
dm-crypt could of course use blk-crypto too, but the dm people haven't been
super comfortable so far with delegating en/decryption to the block layer.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-04-01 3:30 ` Herbert Xu
@ 2025-04-01 3:39 ` Eric Biggers
0 siblings, 0 replies; 204+ messages in thread
From: Eric Biggers @ 2025-04-01 3:39 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Apr 01, 2025 at 11:30:33AM +0800, Herbert Xu wrote:
> On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
> >
> > For hashing, users would need to allocate an array to hold the digest for every
> > block in the bio or folio. That would add an additional memory allocation to
> > every I/O. You said you'd like to fall back to a smaller buffer if the memory
> > allocation fails. But that's silly; if we have to support that anyway, we might
> > as well do it that way only. In which case the bio interface is pointless.
>
> BTW, the existing verity code is hilarious. In my test, for each
> 256KB bio, it was dividing them up into 4KB pages, and then for each
> one of them, it's looking up the correct hash in the Merkle tree.
>
> Surely there is some locality here so if you zoom out from 4KB (or
> even 8KB with your multibuffer patch-set) to 256KB you could get all
> the correct hashes in one go, rather than 64 times.
Well, it looks up the bottom-level block before falling back to walking the full
path, and it's cached. The cache lookup is fast compared to the actual hashing,
or at least traditionally has been. You're right that it does often look up the
same block repeatedly, and that it's one of the things that needs to be better
optimized now that hashing is so fast that overheads like this become
significant.
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-04-01 3:33 ` Eric Biggers
@ 2025-04-01 3:55 ` Herbert Xu
2025-04-01 4:08 ` Eric Biggers
2025-04-01 7:20 ` Milan Broz
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-04-01 3:55 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Mar 31, 2025 at 08:33:03PM -0700, Eric Biggers wrote:
>
> - It would add the overhead of keyslot management to software crypto
That seems to be a design error in blk_crypto. Why should we
model the inadequacies of hardware in software?
If we're going through the software crypto path in blk_crypto,
it should be done as a first-clsas citizen, and not as a poor
man's version of hardware crypto.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-04-01 3:55 ` Herbert Xu
@ 2025-04-01 4:08 ` Eric Biggers
2025-04-01 4:14 ` Herbert Xu
0 siblings, 1 reply; 204+ messages in thread
From: Eric Biggers @ 2025-04-01 4:08 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Tue, Apr 01, 2025 at 11:55:02AM +0800, Herbert Xu wrote:
> On Mon, Mar 31, 2025 at 08:33:03PM -0700, Eric Biggers wrote:
> >
> > - It would add the overhead of keyslot management to software crypto
>
> That seems to be a design error in blk_crypto. Why should we
> model the inadequacies of hardware in software?
>
> If we're going through the software crypto path in blk_crypto,
> it should be done as a first-clsas citizen, and not as a poor
> man's version of hardware crypto.
Interesting seeing this argument coming from you when the whole Crypto API is
built around forcing software crypto to use interfaces designed for hardware.
Currently the blk-crypto keyslots are "needed" even for blk-crypto-fallback
since otherwise it would be necessary to expand the key
(crypto_skcipher_setkey() in the Crypto API, or its library equivalent like
aes_expandkey() if we switch to that) for every I/O request. The blk-crypto
interface could be reworked to support pre-expansion of the key, but that would
differ from what actual inline encryption hardware needs. So this is just
another case where the needs of hardware vs. software diverge...
- Eric
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-04-01 4:08 ` Eric Biggers
@ 2025-04-01 4:14 ` Herbert Xu
0 siblings, 0 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-01 4:14 UTC (permalink / raw)
To: Eric Biggers
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
On Mon, Mar 31, 2025 at 09:08:52PM -0700, Eric Biggers wrote:
>
> Interesting seeing this argument coming from you when the whole Crypto API is
> built around forcing software crypto to use interfaces designed for hardware.
Perhaps you should take your rose-coloured glasses off? :)
> aes_expandkey() if we switch to that) for every I/O request. The blk-crypto
> interface could be reworked to support pre-expansion of the key, but that would
> differ from what actual inline encryption hardware needs. So this is just
> another case where the needs of hardware vs. software diverge...
If we're going to converge on one interface, then it better put
the needs of software crypto first and foremost. Now that doesn't
mean throwing out support for hardware altogether, but hardware
does need to take a backseat every now and then.
Cheers,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-04-01 3:33 ` Eric Biggers
2025-04-01 3:55 ` Herbert Xu
@ 2025-04-01 7:20 ` Milan Broz
1 sibling, 0 replies; 204+ messages in thread
From: Milan Broz @ 2025-04-01 7:20 UTC (permalink / raw)
To: Eric Biggers, Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List, Mikulas Patocka
On 4/1/25 5:33 AM, Eric Biggers wrote:
> On Tue, Apr 01, 2025 at 10:44:34AM +0800, Herbert Xu wrote:
>> Thanks for the pointer, I wasn't aware of its existence. Yes
>> there should definitely be only one code path for this. So
>> what's stopping you from removing fscrypt right now? IOW what's
>> missing from blk-crypto?
>
> Well, fscrypt (ext4/f2fs/ubifs/ceph encryption) wouldn't be removed; its
> implementation would just change on ext4 and f2fs. Instead of providing a
> choice of whether to use blk-crypto or fs-layer crypto for file contents
> en/decryption, ext4 and f2fs would always use blk-crypto. Supporting code such
> as fscrypt_decrypt_bio() that would become unused by that would be removed.
>
> A few reasons I've waited so long:
>
> - The fs-layer file contents en/decryption code was there first, and there
> hasn't been a strong need to remove it yet
> - Much of the file contents en/decryption code in fs/crypto/ would still be
> needed, since ubifs and ceph still use it as they are not block-based
> - It would make CONFIG_BLK_INLINE_ENCRYPTION, which adds a field to struct bio,
> required on more systems
> - It would add the overhead of keyslot management to software crypto
> - blk-crypto currently always uses inline encryption hardware when it's
> available; but, I'd like to preserve ext4's and f2fs's existing behavior where
> the use of inline encryption hardware is opt-in via a mount option.
>
> But I'm thinking it's finally time, especially with the conversions of
> filesystems to operate on folios that's going on.
>
> dm-crypt could of course use blk-crypto too, but the dm people haven't been
> super comfortable so far with delegating en/decryption to the block layer.
Hi,
I cannot speak for device-mapper maintainers, but as it was me who complained about
block layer inline crypto introduction in dm-crypt, perhaps some clarification here:
I have no problem if there is a different block-layer/crypto API that guarantees
that the content of the bio is encrypted/decrypted, it could simplify dm-crypt a lot.
But it must not send plaintext to a random hardware device underneath by default
as it changes the dm-crypt threat model (and I see you mention the opt-in hw option
for fs mount as well).
However, dm-crypt also needs AEAD (authenticated encryption) support.
This is becoming important for devices that natively support additional per-sector metadata.
If we can access all these features through ublk in userspace one day, even better :)
Milan
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: Chaining is dead
2025-03-31 16:56 ` Eric Biggers
2025-04-01 2:44 ` Herbert Xu
2025-04-01 3:30 ` Herbert Xu
@ 2025-04-04 8:46 ` Christoph Hellwig
2 siblings, 0 replies; 204+ messages in thread
From: Christoph Hellwig @ 2025-04-04 8:46 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, Linus Torvalds, David S. Miller,
Linux Kernel Mailing List, Linux Crypto Mailing List,
David Howells
On Mon, Mar 31, 2025 at 04:56:30PM +0000, Eric Biggers wrote:
> > My strategy is to allocate the whole thing if we can (2KB or 4KB
> > depending on your digest size), and if that fails, fall back to
> > a stack buffer of 512 bytes (or whatever number that keeps the
> > compiler quiet regarding stack usage). Even if we're on the stack,
> > it should still give more than enough to data to satiate your
> > multibuffer hash code.
>
> Extending the generic crypto infrastructure to support bios and folios is an
> interesting idea.
The right way to do that is to make it work on an iov_iter. David
Howells talked about that at LSF/MM and might even have done that work
at least at a POC level. That way you can trivially pass in a bio
because it's just an ITER_BVEC iter, and for a folio you'd build a
single entry bvec.
The primary intent here is to avoid building the scatterlist for crypto
work in network file systems, but just about any other caller would
benefit as well, but that scatterlist isn't a good fit for any of the
callers I've looked at, it a really bad fit for software crypto and at
least once we get the new two step DMA API also a bad fit for hardware
offload.
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.15
2025-03-31 4:50 ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
@ 2025-04-05 2:23 ` Herbert Xu
2025-04-05 3:09 ` pr-tracker-bot
2025-04-16 5:16 ` Herbert Xu
0 siblings, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-05 2:23 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 9764d5b0cd0ea4846fd46c7d0b4238ea122075a9:
Revert "crypto: testmgr - Add multibuffer hash testing" (2025-03-30 09:39:57 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p3
for you to fetch changes up to 12e0b15b1986736af8c64b920efad00c655a3c79:
crypto: inside-secure/eip93 - acquire lock on eip93_put_descriptor hash (2025-04-03 19:04:33 +0800)
----------------------------------------------------------------
This push fixes a race condition in the newly added eip93 driver.
----------------------------------------------------------------
Christian Marangi (1):
crypto: inside-secure/eip93 - acquire lock on eip93_put_descriptor hash
drivers/crypto/inside-secure/eip93/eip93-hash.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.15
2025-04-05 2:23 ` Herbert Xu
@ 2025-04-05 3:09 ` pr-tracker-bot
2025-04-16 5:16 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-05 3:09 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Sat, 5 Apr 2025 10:23:16 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p3
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a8662bcd2ff152bfbc751cab20f33053d74d0963
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.15
2025-04-05 2:23 ` Herbert Xu
2025-04-05 3:09 ` pr-tracker-bot
@ 2025-04-16 5:16 ` Herbert Xu
2025-04-16 15:24 ` pr-tracker-bot
2025-04-24 9:07 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-16 5:16 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 0af2f6be1b4281385b618cb86ad946eded089ac8:
Linux 6.15-rc1 (2025-04-06 13:11:33 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p4
for you to fetch changes up to b2e689baf220408aff8ee5dfb4edb0817e1632bb:
crypto: ahash - Disable request chaining (2025-04-12 09:33:09 +0800)
----------------------------------------------------------------
This push fixes the following issues:
- Disable ahash request chaining as it causes problems with the sa2ul driver.
- Fix a couple of bugs in the new scomp stream freeing code.
- Fix an old caam refcount underflow that is possibly showing up now
because of the new parallel self-tests.
- Fix regression in the tegra driver.
----------------------------------------------------------------
Akhil R (1):
crypto: tegra - Fix IV usage for AES ECB
Herbert Xu (4):
crypto: scomp - Fix null-pointer deref when freeing streams
crypto: caam/qi - Fix drv_ctx refcount bug
crypto: scomp - Fix wild memory accesses in scomp_free_streams
crypto: ahash - Disable request chaining
crypto/ahash.c | 76 +------------------------------------
crypto/scompress.c | 10 +++--
drivers/crypto/caam/qi.c | 6 +--
drivers/crypto/tegra/tegra-se-aes.c | 5 +--
include/crypto/hash.h | 6 ++-
include/crypto/internal/hash.h | 2 +-
6 files changed, 18 insertions(+), 87 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.15
2025-04-16 5:16 ` Herbert Xu
@ 2025-04-16 15:24 ` pr-tracker-bot
2025-04-24 9:07 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-16 15:24 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 16 Apr 2025 13:16:27 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p4
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/c62f4b82d57155f35befb5c8bbae176614b87623
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.15
2025-04-16 5:16 ` Herbert Xu
2025-04-16 15:24 ` pr-tracker-bot
@ 2025-04-24 9:07 ` Herbert Xu
2025-04-24 16:29 ` pr-tracker-bot
2025-04-30 2:47 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-24 9:07 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit b2e689baf220408aff8ee5dfb4edb0817e1632bb:
crypto: ahash - Disable request chaining (2025-04-12 09:33:09 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p5
for you to fetch changes up to 8006aff15516a170640239c5a8e6696c0ba18d8e:
crypto: atmel-sha204a - Set hwrng quality to lowest possible (2025-04-23 09:32:57 +0800)
----------------------------------------------------------------
This push fixes the following issues:
- Revert acomp multibuffer tests which were buggy.
- Fix off-by-one regression in new scomp code.
- Lower quality setting on atmel-sha204a as it may not be random.
----------------------------------------------------------------
Herbert Xu (2):
Revert "crypto: testmgr - Add multibuffer acomp testing"
crypto: scomp - Fix off-by-one bug when calculating last page
Marek Behún (1):
crypto: atmel-sha204a - Set hwrng quality to lowest possible
crypto/scompress.c | 10 +--
crypto/testmgr.c | 145 ++++++++++++++++++-----------------------
drivers/crypto/atmel-sha204a.c | 6 ++
3 files changed, 74 insertions(+), 87 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.15
2025-04-24 9:07 ` Herbert Xu
@ 2025-04-24 16:29 ` pr-tracker-bot
2025-04-30 2:47 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-24 16:29 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Thu, 24 Apr 2025 17:07:01 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p5
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/288537d9c9364356a4b2f6bd947f2e89cdaa353e
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.15
2025-04-24 9:07 ` Herbert Xu
2025-04-24 16:29 ` pr-tracker-bot
@ 2025-04-30 2:47 ` Herbert Xu
2025-04-30 4:19 ` pr-tracker-bot
2025-05-21 1:59 ` Herbert Xu
1 sibling, 2 replies; 204+ messages in thread
From: Herbert Xu @ 2025-04-30 2:47 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit 8006aff15516a170640239c5a8e6696c0ba18d8e:
crypto: atmel-sha204a - Set hwrng quality to lowest possible (2025-04-23 09:32:57 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p6
for you to fetch changes up to a32f1923c6d6e9e727d00558a15ec0af6639de19:
crypto: scompress - increment scomp_scratch_users when already allocated (2025-04-25 10:33:30 +0800)
----------------------------------------------------------------
This push fixes a regression in scompress.
----------------------------------------------------------------
Sabrina Dubroca (1):
crypto: scompress - increment scomp_scratch_users when already allocated
crypto/scompress.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.15
2025-04-30 2:47 ` Herbert Xu
@ 2025-04-30 4:19 ` pr-tracker-bot
2025-05-21 1:59 ` Herbert Xu
1 sibling, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-04-30 4:19 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 30 Apr 2025 10:47:38 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p6
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/b6ea1680d0ac0e45157a819c41b46565f4616186
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
* [GIT PULL] Crypto Fixes for 6.15
2025-04-30 2:47 ` Herbert Xu
2025-04-30 4:19 ` pr-tracker-bot
@ 2025-05-21 1:59 ` Herbert Xu
2025-05-21 3:15 ` pr-tracker-bot
1 sibling, 1 reply; 204+ messages in thread
From: Herbert Xu @ 2025-05-21 1:59 UTC (permalink / raw)
To: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
Hi Linus:
The following changes since commit a32f1923c6d6e9e727d00558a15ec0af6639de19:
crypto: scompress - increment scomp_scratch_users when already allocated (2025-04-25 10:33:30 +0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p7
for you to fetch changes up to b2df03ed4052e97126267e8c13ad4204ea6ba9b6:
crypto: algif_hash - fix double free in hash_accept (2025-05-19 13:44:16 +0800)
----------------------------------------------------------------
This push fixes a regression in padata as well as an ancient
double-free bug in af_alg.
----------------------------------------------------------------
Dominik Grzegorzek (1):
padata: do not leak refcount in reorder_work
Ivan Pravdin (1):
crypto: algif_hash - fix double free in hash_accept
crypto/algif_hash.c | 4 ----
kernel/padata.c | 3 ++-
2 files changed, 2 insertions(+), 5 deletions(-)
Thanks,
--
Email: Herbert Xu <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
^ permalink raw reply [flat|nested] 204+ messages in thread
* Re: [GIT PULL] Crypto Fixes for 6.15
2025-05-21 1:59 ` Herbert Xu
@ 2025-05-21 3:15 ` pr-tracker-bot
0 siblings, 0 replies; 204+ messages in thread
From: pr-tracker-bot @ 2025-05-21 3:15 UTC (permalink / raw)
To: Herbert Xu
Cc: Linus Torvalds, David S. Miller, Linux Kernel Mailing List,
Linux Crypto Mailing List
The pull request you sent on Wed, 21 May 2025 09:59:47 +0800:
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git tags/v6.15-p7
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/5da472ae1f128840b27795fa461b47a85d882ce2
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 204+ messages in thread
end of thread, other threads:[~2025-05-21 3:15 UTC | newest]
Thread overview: 204+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-08-03 4:40 [GIT PULL] Crypto Update for 5.9 Herbert Xu
2020-08-03 17:55 ` pr-tracker-bot
2020-08-30 22:33 ` [GIT PULL] Crypto Fixes " Herbert Xu
2020-08-30 23:02 ` pr-tracker-bot
2020-09-10 0:34 ` Herbert Xu
2020-09-10 2:48 ` pr-tracker-bot
2020-10-26 1:11 ` [GIT PULL] Crypto Fixes for 5.10 Herbert Xu
2020-10-26 17:52 ` pr-tracker-bot
2020-12-27 11:32 ` [GIT PULL] Crypto Fixes for 5.11 Herbert Xu
2020-12-27 17:27 ` pr-tracker-bot
2021-01-08 3:54 ` Herbert Xu
2021-01-08 20:36 ` pr-tracker-bot
2021-01-18 5:13 ` Herbert Xu
2021-01-18 21:16 ` pr-tracker-bot
2021-01-25 22:36 ` Herbert Xu
2021-01-26 0:01 ` pr-tracker-bot
2021-07-08 3:09 ` [GIT PULL] Crypto Fixes for 5.14 Herbert Xu
2021-07-09 19:20 ` pr-tracker-bot
2021-08-17 1:36 ` Herbert Xu
2021-08-17 2:27 ` pr-tracker-bot
2021-09-29 2:38 ` [GIT PULL] Crypto Fixes for 5.15 Herbert Xu
2021-09-29 14:51 ` pr-tracker-bot
2021-10-29 4:14 ` Herbert Xu
2021-10-29 17:39 ` Linus Torvalds
2021-11-02 4:01 ` Herbert Xu
2021-10-29 18:49 ` pr-tracker-bot
2021-11-12 10:48 ` [GIT PULL] Crypto Fixes for 5.16 Herbert Xu
2021-11-12 20:42 ` pr-tracker-bot
2021-12-22 5:13 ` Herbert Xu
2021-12-22 19:02 ` pr-tracker-bot
2022-02-09 2:33 ` [GIT PULL] Crypto Fixes for 5.17 Herbert Xu
2022-02-09 18:01 ` pr-tracker-bot
2022-03-16 1:13 ` Herbert Xu
2022-03-17 20:40 ` pr-tracker-bot
2022-03-31 3:16 ` [GIT PULL] Crypto Fixes for 5.18 Herbert Xu
2022-03-31 19:12 ` pr-tracker-bot
2022-05-20 5:41 ` Herbert Xu
2022-05-20 6:10 ` pr-tracker-bot
2022-05-27 11:29 ` [GIT PULL] Crypto Fixes for 5.19 Herbert Xu
2022-05-28 1:21 ` pr-tracker-bot
2022-06-17 8:29 ` Herbert Xu
2022-06-17 15:29 ` pr-tracker-bot
2022-06-30 7:56 ` Herbert Xu
2022-06-30 17:28 ` pr-tracker-bot
2022-08-31 8:55 ` [GIT PULL] Crypto Fixes for 6.0 Herbert Xu
2022-08-31 17:20 ` pr-tracker-bot
2022-10-17 4:38 ` [GIT PULL] Crypto Fixes for 6.1 Herbert Xu
2022-10-17 17:51 ` pr-tracker-bot
2022-10-28 4:58 ` Herbert Xu
2022-10-28 17:00 ` Linus Torvalds
2022-11-02 9:49 ` Herbert Xu
2022-10-28 17:02 ` pr-tracker-bot
2023-01-06 9:15 ` [GIT PULL] Crypto Fixes for 6.2 Herbert Xu
2023-01-06 21:19 ` pr-tracker-bot
2023-03-05 10:15 ` [GIT PULL] Crypto Fixes for 6.3 Herbert Xu
2023-03-05 19:37 ` pr-tracker-bot
2023-05-07 13:19 ` [GIT PULL] Crypto Fixes for 6.4 Herbert Xu
2023-05-07 18:12 ` pr-tracker-bot
2023-05-29 3:41 ` Herbert Xu
2023-05-29 11:39 ` pr-tracker-bot
2023-07-09 23:51 ` [GIT PULL] Crypto Fixes for 6.5 Herbert Xu
2023-07-10 17:20 ` pr-tracker-bot
2023-08-21 3:37 ` Herbert Xu
2023-08-21 5:09 ` pr-tracker-bot
2023-08-31 5:16 ` [GIT PULL] Crypto Fixes for 6.6 Herbert Xu
2023-09-01 23:19 ` pr-tracker-bot
2023-09-22 2:10 ` Herbert Xu
2023-09-22 16:43 ` pr-tracker-bot
2023-10-10 8:46 ` Herbert Xu
2023-10-10 18:54 ` pr-tracker-bot
2023-10-21 9:23 ` Herbert Xu
2023-10-21 17:57 ` pr-tracker-bot
2023-11-09 4:30 ` [GIT PULL] Crypto Fixes for 6.7 Herbert Xu
2023-11-10 1:30 ` pr-tracker-bot
2022-08-02 6:05 ` [GIT PULL] Crypto Update for 5.20 Herbert Xu
2022-08-03 0:57 ` pr-tracker-bot
2022-10-04 8:54 ` [GIT PULL] Crypto Update for 6.1 Herbert Xu
2022-10-10 20:56 ` pr-tracker-bot
2022-12-14 8:15 ` [GIT PULL] Crypto Update for 6.2 Herbert Xu
2022-12-14 22:25 ` pr-tracker-bot
2023-02-20 5:22 ` [GIT PULL] Crypto Update for 6.3 Herbert Xu
2023-02-22 2:50 ` pr-tracker-bot
2023-04-24 4:52 ` [GIT PULL] Crypto Update for 6.4 Herbert Xu
2023-04-26 17:06 ` pr-tracker-bot
2023-06-29 5:06 ` [GIT PULL] Crypto Update for 6.5 Herbert Xu
2023-07-01 5:04 ` pr-tracker-bot
2023-08-28 9:22 ` [GIT PULL] Crypto Update for 6.6 Herbert Xu
2023-08-29 19:00 ` pr-tracker-bot
2023-11-02 6:56 ` [GIT PULL] Crypto Update for 6.7 Herbert Xu
2023-11-03 2:34 ` Linus Torvalds
2023-11-03 5:52 ` Herbert Xu
2023-11-03 6:32 ` Linus Torvalds
2023-11-06 10:00 ` [PATCH] crypto: jitterentropy - Hide esoteric Kconfig options under FIPS and EXPERT Herbert Xu
2023-11-06 15:25 ` Stephan Mueller
2023-11-10 9:04 ` Geert Uytterhoeven
2023-11-03 2:37 ` [GIT PULL] Crypto Update for 6.7 pr-tracker-bot
2024-01-09 22:17 ` [GIT PULL] Crypto Update for 6.8 Herbert Xu
2024-01-10 20:38 ` pr-tracker-bot
2024-02-01 5:32 ` [GIT PULL] Crypto Fixes " Herbert Xu
2024-02-01 18:23 ` pr-tracker-bot
2024-02-08 4:29 ` Herbert Xu
2024-02-08 6:24 ` pr-tracker-bot
2024-02-21 9:10 ` Herbert Xu
2024-02-21 17:17 ` pr-tracker-bot
2024-02-28 8:07 ` Herbert Xu
2024-02-28 17:48 ` pr-tracker-bot
2024-03-06 9:47 ` Herbert Xu
2024-03-06 16:33 ` pr-tracker-bot
2024-03-25 9:47 ` [GIT PULL] Crypto Fixes for 6.9 Herbert Xu
2024-03-25 18:18 ` pr-tracker-bot
2024-05-20 3:26 ` [GIT PULL] Crypto Fixes for 6.10 Herbert Xu
2024-05-20 16:33 ` pr-tracker-bot
2024-05-29 4:17 ` Herbert Xu
2024-05-29 17:11 ` pr-tracker-bot
2024-06-28 0:40 ` Herbert Xu
2024-06-28 1:01 ` pr-tracker-bot
2024-09-23 3:08 ` [GIT PULL] Crypto Fixes for 6.12 Herbert Xu
2024-09-24 18:04 ` pr-tracker-bot
2024-10-16 5:37 ` Herbert Xu
2024-10-16 20:51 ` pr-tracker-bot
2024-10-21 5:45 ` Herbert Xu
2024-10-21 18:27 ` pr-tracker-bot
2024-11-15 11:51 ` Herbert Xu
2024-11-15 18:59 ` pr-tracker-bot
2024-12-14 9:21 ` [GIT PULL] Crypto Fixes for 6.13 Herbert Xu
2024-12-14 17:18 ` pr-tracker-bot
2025-03-31 4:50 ` [GIT PULL] Crypto Fixes for 6.15 Herbert Xu
2025-04-05 2:23 ` Herbert Xu
2025-04-05 3:09 ` pr-tracker-bot
2025-04-16 5:16 ` Herbert Xu
2025-04-16 15:24 ` pr-tracker-bot
2025-04-24 9:07 ` Herbert Xu
2025-04-24 16:29 ` pr-tracker-bot
2025-04-30 2:47 ` Herbert Xu
2025-04-30 4:19 ` pr-tracker-bot
2025-05-21 1:59 ` Herbert Xu
2025-05-21 3:15 ` pr-tracker-bot
2024-03-15 3:04 ` [GIT PULL] Crypto Update for 6.9 Herbert Xu
2024-03-15 21:51 ` Linus Torvalds
2024-03-16 4:39 ` Herbert Xu
2024-03-15 21:59 ` pr-tracker-bot
2024-05-13 3:50 ` [GIT PULL] Crypto Update for 6.10 Herbert Xu
2024-05-13 22:12 ` Linus Torvalds
2024-05-14 5:17 ` Herbert Xu
2024-05-14 5:41 ` Linus Torvalds
2024-05-14 6:02 ` Herbert Xu
2024-05-14 6:54 ` Lukas Wunner
2024-05-14 17:07 ` Linus Torvalds
2024-05-13 22:38 ` pr-tracker-bot
2024-07-18 13:49 ` [GIT PULL] Crypto Update for 6.11 Herbert Xu
2024-07-19 18:09 ` pr-tracker-bot
2024-09-16 3:59 ` [GIT PULL] Crypto Update for 6.12 Herbert Xu
2024-09-16 4:55 ` pr-tracker-bot
2024-11-18 3:18 ` [GIT PULL] Crypto Update for 6.13 Herbert Xu
2024-11-19 19:06 ` pr-tracker-bot
2025-01-23 11:10 ` [GIT PULL] Crypto Update for 6.14 Herbert Xu
2025-01-24 16:05 ` pr-tracker-bot
2025-03-25 5:53 ` [GIT PULL] Crypto Update for 6.15 Herbert Xu
2025-03-25 15:25 ` Eric Biggers
2025-03-25 16:59 ` Ard Biesheuvel
2025-03-26 1:49 ` Herbert Xu
2025-03-26 2:16 ` Herbert Xu
2025-03-26 3:34 ` Eric Biggers
2025-03-26 3:52 ` Herbert Xu
2025-03-30 2:33 ` Chaining is dead Herbert Xu
2025-03-31 16:56 ` Eric Biggers
2025-04-01 2:44 ` Herbert Xu
2025-04-01 3:33 ` Eric Biggers
2025-04-01 3:55 ` Herbert Xu
2025-04-01 4:08 ` Eric Biggers
2025-04-01 4:14 ` Herbert Xu
2025-04-01 7:20 ` Milan Broz
2025-04-01 3:30 ` Herbert Xu
2025-04-01 3:39 ` Eric Biggers
2025-04-04 8:46 ` Christoph Hellwig
2025-03-26 3:20 ` [GIT PULL] Crypto Update for 6.15 Eric Biggers
2025-03-26 3:30 ` Herbert Xu
2025-03-29 17:40 ` Linus Torvalds
2025-03-29 18:06 ` Eric Biggers
2025-03-29 18:17 ` Linus Torvalds
2025-03-29 18:19 ` Linus Torvalds
2025-03-29 18:38 ` Eric Biggers
2025-03-29 18:52 ` Linus Torvalds
2025-03-29 18:24 ` pr-tracker-bot
2020-10-12 3:32 ` [GIT PULL] Crypto Update for 5.10 Herbert Xu
2020-10-13 16:24 ` pr-tracker-bot
2020-12-14 5:55 ` [GIT PULL] Crypto Update for 5.11 Herbert Xu
2020-12-14 20:56 ` pr-tracker-bot
2021-02-15 2:47 ` [GIT PULL] Crypto Update for 5.12 Herbert Xu
2021-02-22 1:28 ` pr-tracker-bot
2021-04-26 12:32 ` [GIT PULL] Crypto Update for 5.13 Herbert Xu
2021-04-26 15:59 ` pr-tracker-bot
2021-06-28 11:00 ` [GIT PULL] Crypto Update for 5.14 Herbert Xu
2021-06-28 23:36 ` pr-tracker-bot
2021-08-30 8:28 ` [GIT PULL] Crypto Update for 5.15 Herbert Xu
2021-08-30 20:17 ` pr-tracker-bot
2021-11-02 3:52 ` [GIT PULL] Crypto Update for 5.16 Herbert Xu
2021-11-02 4:27 ` pr-tracker-bot
2022-01-11 2:04 ` [GIT PULL] Crypto Update for 5.17 Herbert Xu
2022-01-11 20:53 ` pr-tracker-bot
2022-03-20 23:42 ` [GIT PULL] Crypto Update for 5.18 Herbert Xu
2022-03-21 23:14 ` Linus Torvalds
2022-03-22 5:49 ` Herbert Xu
2022-03-21 23:18 ` pr-tracker-bot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox