Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp602909yba; Thu, 18 Apr 2019 06:40:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqw9VobloAekR7aS/TN/dFwECyklBHHqT8QESjyWRhs5HMPF+eEbFNVRYwV4xZBb66elUiHH X-Received: by 2002:a17:902:8ecc:: with SMTP id x12mr95651759plo.0.1555594852257; Thu, 18 Apr 2019 06:40:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555594852; cv=none; d=google.com; s=arc-20160816; b=oKLh+manHEwIjs6uobPisXUI5RJZZ4EBfxHrfqj8ZGlBZ2BgcO1WVchTsGMWsQF68O JjkxkCFuscSFS3vZr80jfJDINRb0nlxoioIeWvlxdxHBhI1coScq2E0ao8h6JLj8CX7G 2u9kV9nzd5+c0xM37eLDpdt8fPuX3tzWZUR1JHgDXtVISsdbFwkj4IWEB4tt9lM5AnME 2fXkO2qEU3GduxYRsVWpV5XfIAfcsngYKBFHSnfYAd0ghweGNosSAeoDndqkbp0MXxg/ OVsqj0ay3TG4yc270A06HGeWBpRnLZMUOJJv8kRfq0JyDggN8HyCgFbt3D/fEEMwVmV8 8UGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=IjjkC6SsRVvZS/VotXX6GCn5rMQUM0/cZdOGuhXojrI=; b=ogQH5utylJ5MCDN3wvMmpqO8T1MSV0h2kRZBh79zWzleBObAgstryyealB2vfyXa0y 3oYZzLfadbXYY1Sc4MGJdBST0yh82YkprDGekGwBSMlGGc1VIyLtfkfYOYvLFB0vclXM 4gw66wwEctb5iyHo6QtHhVY9fFBbT/tbviAEFjQKbSbnnIJqWgxaf5DcZ+2O/SF5tCVc whfzPxiDyPtdSw8FbYwToRTjz9W/B+dwMgr5RbXZftFDNoMTA+u3eu2SnBEqnj0CVNkV D8fHZRHfmyWc6bUdqR1oQTyLhFtcYTGXCCOzngnqaZr9HJUALLTcHzxrvUVaNfuJkivf NwKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u10si1904690pga.205.2019.04.18.06.40.37; Thu, 18 Apr 2019 06:40:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389059AbfDRNjX (ORCPT + 99 others); Thu, 18 Apr 2019 09:39:23 -0400 Received: from foss.arm.com ([217.140.101.70]:33396 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388375AbfDRNjW (ORCPT ); Thu, 18 Apr 2019 09:39:22 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 548D280D; Thu, 18 Apr 2019 06:39:21 -0700 (PDT) Received: from e110176-lin.kfn.arm.com (e110176-lin.kfn.arm.com [10.50.4.178]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D8D763F5AF; Thu, 18 Apr 2019 06:39:19 -0700 (PDT) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2 Date: Thu, 18 Apr 2019 16:38:35 +0300 Message-Id: <20190418133913.9122-1-gilad@benyossef.com> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org A set of new features, mostly support for CryptoCell 713 features including protected keys, security disable mode and new HW revision indetification interface alongside many bug fixes. Gilad Ben-Yossef (30): crypto: testmgr: add missing self test entries for protected keys crypto: ccree: move key load desc. before flow desc. crypto: ccree: move MLLI desc. before key load crypto: ccree: add support for sec disabled mode crypto: ccree: add CPP completion handling crypto: ccree: add remaining logic for CPP crypto: ccree: add SM4 protected keys support crypto: ccree: adapt CPP descriptor to new HW crypto: ccree: read next IV from HW crypto: ccree: add CID and PID support crypto: ccree: fix backlog notifications crypto: ccree: use proper callback completion api crypto: ccree: remove special handling of chained sg crypto: ccree: fix typo in debugfs error path crypto: ccree: fix mem leak on error path crypto: ccree: use devm_kzalloc for device data crypto: ccree: use std api when possible crypto: ccree: copyright header update crypto: ccree: zero out internal struct before use crypto: ccree: do not copy zero size MLLI table crypto: ccree: remove unused defines crypto: ccree: simplify fragment ICV detection crypto: ccree: simplify AEAD ICV addr calculation crypto: ccree: don't mangle the request assoclen crypto: ccree: make AEAD sgl iterator well behaved crypto: ccree: zap entire sg on aead request unmap crypto: ccree: use correct internal state sizes for export crypto: ccree: allow more AEAD assoc data fragments crypto: ccree: don't map MAC key on stack crypto: ccree: don't map AEAD key and IV on stack Ofir Drang (5): crypto: ccree: pm resume first enable the source clk crypto: ccree: remove cc7x3 obsoleted AXIM configs crypto: ccree: HOST_POWER_DOWN_EN should be the last CC access during suspend crypto: ccree: add function to handle cryptocell tee fips error crypto: ccree: handle tee fips error during power management resume crypto/testmgr.c | 20 + drivers/crypto/ccree/Makefile | 1 + drivers/crypto/ccree/cc_aead.c | 81 +++- drivers/crypto/ccree/cc_aead.h | 3 +- drivers/crypto/ccree/cc_buffer_mgr.c | 341 ++++---------- drivers/crypto/ccree/cc_buffer_mgr.h | 2 +- drivers/crypto/ccree/cc_cipher.c | 591 +++++++++++++++--------- drivers/crypto/ccree/cc_cipher.h | 3 +- drivers/crypto/ccree/cc_crypto_ctx.h | 10 +- drivers/crypto/ccree/cc_debugfs.c | 44 +- drivers/crypto/ccree/cc_debugfs.h | 2 +- drivers/crypto/ccree/cc_driver.c | 120 ++++- drivers/crypto/ccree/cc_driver.h | 36 +- drivers/crypto/ccree/cc_fips.c | 29 +- drivers/crypto/ccree/cc_fips.h | 4 +- drivers/crypto/ccree/cc_hash.c | 64 ++- drivers/crypto/ccree/cc_hash.h | 2 +- drivers/crypto/ccree/cc_host_regs.h | 123 ++++- drivers/crypto/ccree/cc_hw_queue_defs.h | 35 +- drivers/crypto/ccree/cc_ivgen.c | 11 +- drivers/crypto/ccree/cc_ivgen.h | 2 +- drivers/crypto/ccree/cc_kernel_regs.h | 2 +- drivers/crypto/ccree/cc_lli_defs.h | 4 +- drivers/crypto/ccree/cc_pm.c | 11 +- drivers/crypto/ccree/cc_pm.h | 2 +- drivers/crypto/ccree/cc_request_mgr.c | 116 +++-- drivers/crypto/ccree/cc_request_mgr.h | 2 +- drivers/crypto/ccree/cc_sram_mgr.c | 7 +- drivers/crypto/ccree/cc_sram_mgr.h | 2 +- 29 files changed, 1068 insertions(+), 602 deletions(-) -- 2.21.0