2016-11-19 10:29:01

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.9

Hi Linus:

This push fixes the following issues:

- Compiler warning in caam driver that was the last one remaining.
- Do not register aes-xts in caam drivers on unsupported platforms.
- Regression in algif_hash interface that may lead to an oops.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Arnd Bergmann (1):
crypto: caam - fix type mismatch warning

Herbert Xu (1):
crypto: algif_hash - Fix NULL hash crash with shash

Sven Ebenfeld (1):
crypto: caam - do not register AES-XTS mode on LP units

crypto/algif_hash.c | 17 ++++++++++-------
drivers/crypto/caam/caamalg.c | 11 ++++++++++-
2 files changed, 20 insertions(+), 8 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt


2016-11-23 05:42:15

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.9

Hi Linus:

The last push broke algif_hash for all shash implementations,
so this is a follow-up to fix that. It also fixes a problem
in the crypto scatterwalk that triggers a BUG_ON with certain
debugging options due to the new vmalloced-stack code.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (2):
crypto: algif_hash - Fix result clobbering in recvmsg
crypto: scatterwalk - Remove unnecessary aliasing check in map_and_copy

crypto/algif_hash.c | 2 +-
crypto/scatterwalk.c | 4 ----
2 files changed, 1 insertion(+), 5 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2016-12-05 06:38:28

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.9

Hi Linus:

This push fixes the following issues:

- Intermittent build failure in RSA.
- Memory corruption in chelsio crypto driver.
- Regression in DRBG due to vmalloced stack.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


David Michael (1):
crypto: rsa - Add Makefile dependencies to fix parallel builds

Harsh Jain (1):
crypto: chcr - Fix memory corruption

Stephan Mueller (1):
crypto: drbg - prevent invalid SG mappings

crypto/Makefile | 1 +
crypto/drbg.c | 29 ++++++++++++++++++++++++-----
drivers/crypto/chelsio/chcr_algo.h | 3 ++-
include/crypto/drbg.h | 2 ++
4 files changed, 29 insertions(+), 6 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2016-12-10 06:01:07

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.9

Hi Linus:

This push fixes the following issues:

- Fix pointer size when caam is used with AArch64 boot loader on
AArch32 kernel.
- Fix ahash state corruption in marvell driver.
- Fix buggy algif_aed tag handling.
- Prevent mcryptd from being used with incompatible algorithms
which can cause crashes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Horia Geantă (1):
crypto: caam - fix pointer size for AArch64 boot loader, AArch32 kernel

Romain Perier (2):
crypto: marvell - Don't copy hash operation twice into the SRAM
crypto: marvell - Don't corrupt state of an STD req for re-stepped ahash

Stephan Mueller (2):
crypto: algif_aead - fix AEAD tag memory handling
crypto: algif_aead - fix uninitialized variable warning

tim (1):
crypto: mcryptd - Check mcryptd algorithm compatibility

crypto/algif_aead.c | 59 ++++++++++++++++++++++++++---------------
crypto/mcryptd.c | 19 ++++++++-----
drivers/crypto/caam/ctrl.c | 5 ++--
drivers/crypto/marvell/hash.c | 11 ++++----
4 files changed, 57 insertions(+), 37 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2016-12-13 13:24:33

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.10

Hi Linus:

Here is the crypto update for 4.10:

API:

- Add skcipher walk interface.
- Add asynchronous compression (acomp) interface.
- Fix algif_aed AIO handling of zero buffer.

Algorithms:

- Fix unaligned access in poly1305.
- Fix DRBG output to large buffers.

Drivers:

- Add support for iMX6UL to caam.
- Fix givenc descriptors (used by IPsec) in caam.
- Accelerated SHA256/SHA512 for ARM64 from OpenSSL.
- Add SSE CRCT10DIF and CRC32 to ARM/ARM64.
- Add AEAD support to Chelsio chcr.
- Add Armada 8K support to omap-rng.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Alec Ari (1):
crypto: api - Fix Kconfig dependencies for FIPS

Alex Cope (2):
crypto: gf128mul - remove dead gf128mul_64k_lle code
crypto: gf128mul - Zero memory when freeing multiplication table

Alex Porosanu (1):
crypto: caam - fix AEAD givenc descriptors

Ard Biesheuvel (21):
crypto: arm64/aes-ce - fix for big endian
crypto: arm64/ghash-ce - fix for big endian
crypto: arm64/sha1-ce - fix for big endian
crypto: arm64/sha2-ce - fix for big endian
crypto: arm64/aes-ccm-ce: fix for big endian
crypto: arm64/aes-neon - fix for big endian
crypto: arm64/aes-xts-ce: fix for big endian
crypto: arm/aes-ce - fix for big endian
crypto: arm64/sha2 - integrate OpenSSL implementations of SHA256/SHA512
crypto: arm64/sha2 - add generated .S files to .gitignore
crypto: arm/aes-ce - fix broken monolithic build
crypto: skcipher - fix crash in skcipher_walk_aead()
crypto: arm64/aes-ce-ctr - fix skcipher conversion
crypto: arm/aesbs - fix brokenness after skcipher conversion
crypto: testmgr - avoid overlap in chunked tests
crypto: testmgr - add/enhance test cases for CRC-T10DIF
crypto: arm64/crct10dif - port x86 SSE implementation to arm64
crypto: arm/crct10dif - port x86 SSE implementation to ARM
crypto: arm64/crc32 - accelerated support based on x86 SSE implementation
crypto: arm/crc32 - accelerated support based on x86 SSE implementation
crypto: testmgr - fix overlap in chunked tests again

Arnd Bergmann (3):
crypto: caam - fix type mismatch warning
crypto: caam - pass key buffers with typesafe pointers
crypto: caam - make aamalg_desc a proper module

Baruch Siach (4):
crypto: api - fix comment typo
crypto: doc - fix header file name
crypt: doc - remove misleading mention of async API
MAINTAINERS: add crypto headers to crypto entry

Christophe Jaillet (1):
crypto: crypto4xx - Fix size used in dma_free_coherent()

Colin Ian King (2):
crypto: sahara - fix typo "Decidated" -> "Dedicated"
crypto: talitos - fix spelling mistake

Cyrille Pitchen (2):
crypto: atmel-aes - fix compiler error when VERBOSE_DEBUG is defined
crypto: atmel-aes - add support to the XTS mode

Dan Carpenter (1):
crypto: chcr - checking for IS_ERR() instead of NULL

Eric Biggers (7):
crypto: skcipher - Remove unused crypto_lookup_skcipher() declaration
crypto: api - Remove no-op exit_ops code
crypto: cmac - return -EINVAL if block size is unsupported
crypto: cmac - fix alignment of 'consts'
crypto: skcipher - Get rid of crypto_grab_skcipher2()
crypto: skcipher - Get rid of crypto_spawn_skcipher2()
crypto: testmgr - don't use stack buffer in test_acomp()

Gary R Hook (5):
crypto: ccp - change type of struct member lsb to signed
crypto: ccp - change bitfield type to unsigned ints
crypto: ccp - remove unneeded code
crypto: ccp - Clean up the LSB slot allocation code
crypto: ccp - Fix handling of RSA exponent on a v5 device

Geliang Tang (2):
crypto: jitterentropy - drop duplicate header module.h
crypto: nx - drop duplicate header types.h

Giovanni Cabiddu (9):
crypto: acomp - add asynchronous compression api
crypto: acomp - add driver-side scomp interface
crypto: acomp - add support for lzo via scomp
crypto: acomp - add support for lz4 via scomp
crypto: acomp - add support for lz4hc via scomp
crypto: acomp - add support for 842 via scomp
crypto: acomp - add support for deflate via scomp
crypto: acomp - update testmgr with support for acomp
crypto: acomp - fix dependency in Makefile

Greg Tucker (1):
crypto: sha-mb - Fix total_len for correct hash when larger than 512MB

Harsh Jain (9):
crypto: chcr - Cosmetic change
crypto: chcr - Added new structure chcr_wr
crypto: chcr - Fixes Unchecked dereference inside function
crypto: chcr - Remove dynamic allocation
crypto: chcr - Calculate Reverse round key in setkey callback.
crypto: chcr - Adjust Dest. buffer size
crypto: chcr - Use SHASH_DESC_ON_STACK
crypto: chcr - Move tfm ctx variable to request context
crypto: chcr - Add AEAD algos.

Herbert Xu (22):
crypto: skcipher - Add skcipher walk interface
crypto: aes-ce-ccm - Use skcipher walk interface
crypto: lrw - Convert to skcipher
crypto: xts - Convert to skcipher
crypto: api - Do not clear type bits in crypto_larval_lookup
crypto: cryptd - Add support for skcipher
crypto: simd - Add simd skcipher helper
crypto: pcbc - Convert to skcipher
crypto: glue_helper - Add skcipher xts helpers
crypto: testmgr - Do not test internal algorithms
crypto: aesni - Convert to skcipher
crypto: arm64/aes - Convert to skcipher
crypto: aes-ce - Convert to skcipher
crypto: cbc - Convert to skcipher
crypto: cbc - Export CBC implementation
crypto: aesbs - Convert to skcipher
crypto: arm/aes - Select SIMD in Kconfig
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
crypto: arm/aes - Add missing SIMD select for aesbs
crypto: skcipher - Add separate walker for AEAD decryption
crypto: arm64/aes-ce-ccm - Fix AEAD decryption length
crypto: aes-ce - Make aes_simd_algs static

Horia Geantă (23):
crypto: caam - completely remove error propagation handling
crypto: caam - desc.h fixes
crypto: caam - fix sparse warnings
crypto: caam - fix smatch warnings
crypto: caam - remove unused may_sleep in dbg_dump_sg()
crypto: caam - remove unused command from aead givencrypt
crypto: caam - trivial code clean-up
crypto: caam - remove unreachable code in report_ccb_status()
crypto: caam - fix DMA API mapping leak in ablkcipher code
Revert "crypto: caam - get rid of tasklet"
crypto: caam - move sec4_sg_entry to sg_sw_sec4.h
crypto: caam - constify pointer to descriptor buffer
crypto: caam - merge identical ahash_final/finup shared desc
crypto: caam - move append_key_aead() into init_sh_desc_key_aead()
crypto: caam - group algorithm related params
crypto: caam - remove superfluous alg_op algorithm param
crypto: caam - improve key inlining
crypto: caam - rewrite some generic inline append cmds
crypto: caam - remove unneded dependencies on CRYPTO_DEV_FSL_CAAM
crypto: caam - refactor encryption descriptors generation
crypto: caam - consolidate split key length computation
crypto: caam - refactor ahash shared descriptor generation
MAINTAINERS: add maintainers for caam crypto driver

Jason A. Donenfeld (1):
crypto: poly1305 - Use unaligned access where required

Javier Martinez Canillas (2):
hwrng: meson - Fix module autoload for OF registration
hwrng: meson - Remove unneeded platform MODULE_ALIAS

Jean Delvare (1):
crypto: crc32c-vpmsum - Rename CRYPT_CRC32C_VPMSUM option

Marcus Folkesson (2):
crypto: caam - add support for iMX6UL
crypto: caam - check caam_emi_slow instead of re-lookup platform

Mat Martineau (1):
crypto: dh - Consistenly return negative error codes

Nadim almas (1):
Crypto: mv_cesa - Switch to using managed resources

Naveen N. Rao (1):
crypto: vmx - various build fixes

Pan Bian (1):
crypto: algif_skcipher - set error code when kcalloc fails

Paul Bolle (1):
crypto: ccp - fix typo "CPP"

Petr Mladek (1):
crypto: engine - Handle the kthread worker using the new API

PrasannaKumar Muralidharan (1):
hwrng: Make explicit that max >= 32 always

Romain Perier (10):
dt-bindings: Add vendor prefix for INSIDE Secure
dt-bindings: omap-rng: Document SafeXcel IP-76 device variant
hwrng: omap - Switch to non-obsolete read API implementation
hwrng: omap - Remove global definition of hwrng
hwrng: omap - Add support for 128-bit output of data
hwrng: omap - Don't prefix the probe message with OMAP
hwrng: omap - Add device variant for SafeXcel IP-76 found in Armada 8K
arm64: dts: marvell: add TRNG description for Armada 8K CP
crypto: marvell - Use an unique pool to copy results of requests
crypto: marvell - Don't break chain for computable last ahash requests

Stephan Mueller (3):
hwrng: core - zeroize buffers with random data
crypto: drbg - advance output buffer pointer
crypto: algif_aead - fix AIO handling of zero buffer

Tobias Klauser (2):
padata: Remove unused but set variables
crypto: cryptd - Remove unused but set variable 'tfm'

Wei Yongjun (4):
crypto: ccp - Fix non static symbol warning
crypto: gcm - Fix error return code in crypto_gcm_create_common()
crypto: atmel - drop pointless static qualifier in atmel_aes_probe()
hwrng: atmel - use clk_disable_unprepare instead of clk_disable

Wenyou Yang (1):
hwrng: atmel - disable TRNG during suspend

Documentation/crypto/api-intro.txt | 5 +-
.../devicetree/bindings/crypto/fsl-sec4.txt | 20 +
Documentation/devicetree/bindings/rng/omap_rng.txt | 14 +-
.../devicetree/bindings/vendor-prefixes.txt | 1 +
MAINTAINERS | 9 +
arch/arm/crypto/Kconfig | 18 +-
arch/arm/crypto/Makefile | 4 +
arch/arm/crypto/aes-ce-glue.c | 395 ++--
arch/arm/crypto/aesbs-glue.c | 380 ++--
arch/arm/crypto/crc32-ce-core.S | 306 +++
arch/arm/crypto/crc32-ce-glue.c | 242 +++
arch/arm/crypto/crct10dif-ce-core.S | 427 ++++
arch/arm/crypto/crct10dif-ce-glue.c | 101 +
.../boot/dts/marvell/armada-cp110-master.dtsi | 8 +
.../arm64/boot/dts/marvell/armada-cp110-slave.dtsi | 8 +
arch/arm64/crypto/.gitignore | 2 +
arch/arm64/crypto/Kconfig | 23 +-
arch/arm64/crypto/Makefile | 23 +
arch/arm64/crypto/aes-ce-ccm-core.S | 53 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 50 +-
arch/arm64/crypto/aes-ce-cipher.c | 25 +-
arch/arm64/crypto/aes-ce.S | 1 +
arch/arm64/crypto/aes-glue.c | 381 ++--
arch/arm64/crypto/aes-modes.S | 3 +-
arch/arm64/crypto/aes-neon.S | 25 +-
arch/arm64/crypto/crc32-ce-core.S | 266 +++
arch/arm64/crypto/crc32-ce-glue.c | 212 ++
arch/arm64/crypto/crct10dif-ce-core.S | 392 ++++
arch/arm64/crypto/crct10dif-ce-glue.c | 95 +
arch/arm64/crypto/ghash-ce-core.S | 6 +-
arch/arm64/crypto/sha1-ce-core.S | 4 +-
arch/arm64/crypto/sha2-ce-core.S | 4 +-
arch/arm64/crypto/sha256-core.S_shipped | 2061 ++++++++++++++++++++
arch/arm64/crypto/sha256-glue.c | 185 ++
arch/arm64/crypto/sha512-armv8.pl | 778 ++++++++
arch/arm64/crypto/sha512-core.S_shipped | 1085 +++++++++++
arch/arm64/crypto/sha512-glue.c | 94 +
arch/powerpc/crypto/Makefile | 2 +-
arch/x86/crypto/aesni-intel_glue.c | 705 +++----
arch/x86/crypto/fpu.c | 207 +-
arch/x86/crypto/glue_helper.c | 74 +-
arch/x86/crypto/sha1-mb/sha1_mb.c | 2 +-
arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 2 +-
arch/x86/crypto/sha256-mb/sha256_mb.c | 2 +-
arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 2 +-
arch/x86/crypto/sha512-mb/sha512_mb.c | 2 +-
arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 2 +-
arch/x86/include/asm/crypto/glue_helper.h | 39 +-
crypto/842.c | 81 +-
crypto/Kconfig | 32 +-
crypto/Makefile | 6 +
crypto/acompress.c | 169 ++
crypto/algboss.c | 8 +-
crypto/algif_aead.c | 5 +-
crypto/algif_skcipher.c | 4 +-
crypto/api.c | 22 +-
crypto/authenc.c | 8 +-
crypto/authencesn.c | 8 +-
crypto/cbc.c | 269 +--
crypto/ccm.c | 8 +-
crypto/chacha20poly1305.c | 8 +-
crypto/cipher.c | 4 -
crypto/cmac.c | 14 +-
crypto/compress.c | 4 -
crypto/cryptd.c | 286 ++-
crypto/crypto_engine.c | 26 +-
crypto/crypto_user.c | 19 +
crypto/ctr.c | 8 +-
crypto/cts.c | 8 +-
crypto/deflate.c | 111 +-
crypto/dh.c | 2 +-
crypto/drbg.c | 1 +
crypto/gcm.c | 10 +-
crypto/gf128mul.c | 59 +-
crypto/internal.h | 3 -
crypto/jitterentropy-kcapi.c | 1 -
crypto/lrw.c | 507 +++--
crypto/lz4.c | 91 +-
crypto/lz4hc.c | 92 +-
crypto/lzo.c | 97 +-
crypto/pcbc.c | 201 +-
crypto/poly1305_generic.c | 34 +-
crypto/scompress.c | 356 ++++
crypto/simd.c | 226 +++
crypto/skcipher.c | 540 +++++
crypto/testmgr.c | 318 +--
crypto/testmgr.h | 70 +-
crypto/xts.c | 547 ++++--
drivers/char/hw_random/Kconfig | 2 +-
drivers/char/hw_random/atmel-rng.c | 26 +-
drivers/char/hw_random/core.c | 3 +
drivers/char/hw_random/meson-rng.c | 2 +-
drivers/char/hw_random/msm-rng.c | 4 -
drivers/char/hw_random/omap-rng.c | 162 +-
drivers/char/hw_random/pic32-rng.c | 3 -
drivers/char/hw_random/pseries-rng.c | 5 +-
drivers/crypto/amcc/crypto4xx_core.c | 3 +-
drivers/crypto/atmel-aes-regs.h | 4 +
drivers/crypto/atmel-aes.c | 189 +-
drivers/crypto/caam/Kconfig | 11 +-
drivers/crypto/caam/Makefile | 1 +
drivers/crypto/caam/caamalg.c | 1505 +++-----------
drivers/crypto/caam/caamalg_desc.c | 1306 +++++++++++++
drivers/crypto/caam/caamalg_desc.h | 97 +
drivers/crypto/caam/caamhash.c | 227 +--
drivers/crypto/caam/caampkc.c | 4 +-
drivers/crypto/caam/caamrng.c | 10 +-
drivers/crypto/caam/ctrl.c | 75 +-
drivers/crypto/caam/desc.h | 22 +-
drivers/crypto/caam/desc_constr.h | 133 +-
drivers/crypto/caam/error.c | 5 +-
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/jr.c | 27 +-
drivers/crypto/caam/key_gen.c | 62 +-
drivers/crypto/caam/key_gen.h | 6 +-
drivers/crypto/caam/sg_sw_sec4.h | 6 +-
drivers/crypto/ccp/ccp-dev-v3.c | 4 -
drivers/crypto/ccp/ccp-dev-v5.c | 30 +-
drivers/crypto/ccp/ccp-dev.c | 6 +-
drivers/crypto/ccp/ccp-dev.h | 45 +-
drivers/crypto/chelsio/Kconfig | 1 +
drivers/crypto/chelsio/chcr_algo.c | 2001 ++++++++++++++++---
drivers/crypto/chelsio/chcr_algo.h | 103 +-
drivers/crypto/chelsio/chcr_core.c | 8 +-
drivers/crypto/chelsio/chcr_core.h | 18 +-
drivers/crypto/chelsio/chcr_crypto.h | 115 +-
drivers/crypto/marvell/cesa.c | 4 -
drivers/crypto/marvell/cesa.h | 5 +-
drivers/crypto/marvell/cipher.c | 8 +-
drivers/crypto/marvell/hash.c | 65 +-
drivers/crypto/marvell/tdma.c | 33 +-
drivers/crypto/mv_cesa.c | 4 +-
drivers/crypto/nx/nx.c | 1 -
drivers/crypto/sahara.c | 2 +-
drivers/crypto/talitos.c | 2 +-
drivers/crypto/vmx/Makefile | 12 +-
include/crypto/acompress.h | 269 +++
include/crypto/cbc.h | 146 ++
include/crypto/cryptd.h | 13 +-
include/crypto/engine.h | 6 +-
include/crypto/gf128mul.h | 15 +-
include/crypto/internal/acompress.h | 81 +
include/crypto/internal/scompress.h | 136 ++
include/crypto/internal/simd.h | 17 +
include/crypto/internal/skcipher.h | 65 +-
include/crypto/xts.h | 26 +-
include/linux/ccp.h | 6 +-
include/linux/crypto.h | 5 +-
include/linux/hw_random.h | 3 +-
include/uapi/linux/cryptouser.h | 5 +
kernel/padata.c | 4 -
151 files changed, 15711 insertions(+), 4462 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2016-12-15 16:07:32

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.10

Hi Linus:

This push fixes the following issues:

- A crash regression in the new skcipher walker.
- Incorrect return value in public_key_verify_signature.
- Fix for in-place signing in the sign-file utility.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Alex Yashchenko (1):
sign-file: Fix inplace signing when src and dst names are both specified

Ard Biesheuvel (1):
crypto: skcipher - fix crash in virtual walk

Pan Bian (1):
crypto: asymmetric_keys - set error code on failure

crypto/asymmetric_keys/public_key.c | 1 +
crypto/skcipher.c | 4 +++-
scripts/sign-file.c | 2 +-
3 files changed, 5 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2016-12-27 09:46:16

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.10

Hi Linus:

This push fixes a hash corruption bug in the marvell driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Romain Perier (1):
crypto: marvell - Copy IVDIG before launching partial DMA ahash requests

drivers/crypto/marvell/cesa.h | 3 ++-
drivers/crypto/marvell/hash.c | 34 +++++++++++++++++++++++++++++++++-
drivers/crypto/marvell/tdma.c | 9 ++++++++-
3 files changed, 43 insertions(+), 3 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2016-12-30 10:19:55

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.10

Hi Linus:

This push fixes a boot failure on some platforms when crypto self
test is enabled along with the new acomp interface.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Laura Abbott (1):
crypto: testmgr - Use heap buffer for acomp test input

crypto/testmgr.c | 30 ++++++++++++++++++++++++++++--
1 file changed, 28 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-01-11 11:56:46

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.10

Hi Linus:

This push fixes a regression in aesni that renders it useless
if it's built-in with a modular pcbc configuration.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
crypto: aesni - Fix failure when built-in with modular pcbc

arch/x86/crypto/aesni-intel_glue.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-02-01 09:04:30

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.10

Hi Linus:

This push fixes a bug in CBC/CTR on ARM64 that breaks chaining
as well as a bug in the core API that causes registration failures
when a driver unloads and then reloads an algorithm.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (1):
crypto: arm64/aes-blk - honour iv_out requirement in CBC and CTR modes

Salvatore Benedetto (1):
crypto: api - Clear CRYPTO_ALG_DEAD bit before registering an alg

arch/arm64/crypto/aes-modes.S | 88 ++++++++++++++++++++---------------------
crypto/algapi.c | 1 +
2 files changed, 43 insertions(+), 46 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-02-06 09:25:13

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.10

Hi Linus:

This push fixes the following issues:

- Use after free in algif_aead.
- Modular aesni regression when pcbc is modular but absent.
- Bug causing IO page faults in ccp.
- Double list add in ccp.
- Null pointer dereference in qat (two patches).
- Panic in chcr.
- Null pointer dereference in chcr.
- Out-of-bound access in chcr.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Gary R Hook (2):
crypto: ccp - Fix DMA operations when IOMMU is enabled
crypto: ccp - Fix double add when creating new DMA command

Giovanni Cabiddu (2):
crypto: qat - fix bar discovery for c62x
crypto: qat - zero esram only for DH85x devices

Harsh Jain (4):
crypto: chcr - Fix panic on dma_unmap_sg
crypto: chcr - Check device is allocated before use
crypto: algif_aead - Fix kernel panic on list_del
crypto: chcr - Fix key length for RFC4106

Herbert Xu (1):
crypto: aesni - Fix failure when pcbc module is absent

arch/x86/crypto/aesni-intel_glue.c | 8 ++--
crypto/algif_aead.c | 2 +-
drivers/crypto/ccp/ccp-dev-v5.c | 2 +-
drivers/crypto/ccp/ccp-dev.h | 1 +
drivers/crypto/ccp/ccp-dmaengine.c | 6 ++-
drivers/crypto/chelsio/chcr_algo.c | 53 +++++++++++----------
drivers/crypto/chelsio/chcr_core.c | 18 ++++---
drivers/crypto/chelsio/chcr_crypto.h | 3 ++
drivers/crypto/qat/qat_c62x/adf_drv.c | 2 +-
drivers/crypto/qat/qat_common/adf_accel_devices.h | 1 +
drivers/crypto/qat/qat_common/qat_hal.c | 4 +-
11 files changed, 55 insertions(+), 45 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-02-23 12:54:34

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.11

Hi Linus:

Here is the crypto update for 4.11:

API:

- Try to catch hash output overrun in testmgr.
- Introduce walksize attribute for batched walking.
- Make crypto_xor() and crypto_inc() alignment agnostic.

Algorithms:

- Add time-invariant AES algorithm.
- Add standalone CBCMAC algorithm.

Drivers:

- Add NEON acclerated chacha20 on ARM/ARM64.
- Expose AES-CTR as synchronous skcipher on ARM64.
- Add scalar AES implementation on ARM64.
- Improve scalar AES implementation on ARM.
- Improve NEON AES implementation on ARM/ARM64.
- Merge CRC32 and PMULL instruction based drivers on ARM64.
- Add NEON acclerated CBCMAC/CMAC/XCBC AES on ARM64.
- Add IPsec AUTHENC implementation in atmel.
- Add Support for Octeon-tx CPT Engine.
- Add Broadcom SPU driver.
- Add MediaTek driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ahsan Atta (2):
crypto: qat - fix indentation
crypto: qat - fix comments describing adf_disable_sriov()

Andrew Lutomirski (1):
crypto: testmgr - Allocate only the required output size for hash tests

Ard Biesheuvel (33):
crypto: arm64/chacha20 - implement NEON version based on SSE3 code
crypto: arm/chacha20 - implement NEON version based on SSE3 code
crypto: chacha20 - convert generic and x86 versions to skcipher
crypto: skcipher - introduce walksize attribute for SIMD algos
crypto: arm64/aes-blk - expose AES-CTR as synchronous cipher as well
crypto: arm64/aes - add scalar implementation
crypto: arm/aes - replace scalar AES cipher
crypto: arm64/aes - reimplement bit-sliced ARM/NEON implementation for arm64
crypto: arm/aes - replace bit-sliced OpenSSL NEON code
crypto: testmgr - use calculated count for number of test vectors
crypto: arm/aes - avoid reserved 'tt' mnemonic in asm code
crypto: arm64/aes-blk - honour iv_out requirement in CBC and CTR modes
crypto: arm/aes-neonbs - fix issue with v2.22 and older assembler
crypto: arm/aes-ce - remove cra_alignmask
crypto: arm/chacha20 - remove cra_alignmask
crypto: arm64/aes-ce-ccm - remove cra_alignmask
crypto: arm64/aes-blk - remove cra_alignmask
crypto: arm64/chacha20 - remove cra_alignmask
crypto: arm64/aes - avoid literals for cross-module symbol references
crypto: arm64/aes - performance tweak
crypto: arm64/aes-neon-blk - tweak performance for low end cores
crypto: arm64/aes - replace scalar fallback with plain NEON fallback
crypto: arm64/aes - don't use IV buffer to return final keystream block
crypto: arm/aes - don't use IV buffer to return final keystream block
crypto: arm64/crc32 - merge CRC32 and PMULL instruction based drivers
crypto: aes-generic - drop alignment requirement
crypto: aes - add generic time invariant AES cipher
crypto: testmgr - add test cases for cbcmac(aes)
crypto: ccm - switch to separate cbcmac driver
crypto: arm64/aes - add NEON/Crypto Extensions CBCMAC/CMAC/XCBC driver
crypto: algapi - make crypto_xor() and crypto_inc() alignment agnostic
crypto: ccm - honour alignmask of subordinate MAC cipher
crypto: ccm - drop unnecessary minimum 32-bit alignment

Arnd Bergmann (6):
crypto: mediatek - remove ARM dependencies
crypto: mediatek - fix format string for 64-bit builds
crypto: improve gcc optimization flags for serpent and wp512
crypto: atmel - refine Kconfig dependencies
crypto: atmel - fix 64-bit build warnings
crypto: cavium - fix Kconfig dependencies

Christoph Hellwig (3):
crypto: cavium - remove dead MSI-X related define
crypto: cavium - switch to pci_alloc_irq_vectors
crypto: cavium - switch to pci_alloc_irq_vectors

Colin Ian King (1):
crypto: mediatek - don't return garbage err on successful return

Corentin LABBE (9):
crypto: drivers - bring back alphabetical order of Makefile
hwrng: core - do not use multiple blank lines
hwrng: core - rewrite better comparison to NULL
hwrng: core - Rewrite the header
hwrng: core - Replace asm/uaccess.h by linux/uaccess.h
hwrng: core - Move hwrng miscdev minor number to include/linux/miscdevice.h
hwrng: core - remove unused PFX macro
crypto: bfin_crc - Fix format printing warning
crypto: bfin_crc - Remove unneeded linux/miscdevice.h include

Cyrille Pitchen (14):
crypto: atmel-sha - create function to get an Atmel SHA device
crypto: atmel-sha - update request queue management to make it more generic
crypto: atmel-sha - make atmel_sha_done_task more generic
crypto: atmel-sha - redefine SHA_FLAGS_SHA* flags to match SHA_MR_ALGO_SHA*
crypto: atmel-sha - add atmel_sha_wait_for_data_ready()
crypto: atmel-sha - add SHA_MR_MODE_IDATAR0
crypto: atmel-sha - add atmel_sha_cpu_start()
crypto: atmel-sha - add simple DMA transfers
crypto: atmel-sha - add support to hmac(shaX)
crypto: atmel-aes - fix atmel_aes_handle_queue()
crypto: atmel-authenc - add support to authenc(hmac(shaX), Y(aes)) modes
crypto: atmel-sha - add verbose debug facilities to print hw register names
crypto: atmel-sha - fix missing "return" instructions
crypto: atmel-sha - fix error management in atmel_sha_start()

David Daney (1):
hwrng: cavium - Use per device name to allow for multiple devices.

Denys Vlasenko (2):
crypto: x86/crc32c - fix %progbits -> @progbits
crypto: x86 - make constants readonly, allow linker to merge them

Eric Biggers (1):
crypto: testmgr - use kmemdup instead of kmalloc+memcpy

Gary R Hook (6):
crypto: ccp - Fix DMA operations when IOMMU is enabled
crypto: ccp - Fix double add when creating new DMA command
crypto: ccp - Set the AES size field for all modes
crypto: ccp - Change mode for detailed CCP init messages
crypto: ccp - Update the command queue on errors
crypto: ccp - Simplify some buffer management routines

George Cherian (4):
crypto: cavium - Add Support for Octeon-tx CPT Engine
crypto: cavium - Add the Virtual Function driver for CPT
crypto: cavium - Enable CPT options crypto for build
crypto: cavium - cpt_bind_vq_to_grp could return an error code

Gideon Israel Dsouza (1):
crypto: Replaced gcc specific attributes with macros from compiler.h

Gilad Ben-Yossef (1):
crypto: doc - fix typo

Giovanni Cabiddu (3):
crypto: qat - replace hardcoded BIT(0) in vf_isr
crypto: qat - fix bar discovery for c62x
crypto: qat - zero esram only for DH85x devices

Gonglei \(Arei\) (2):
crypto: virtio - support crypto engine framework
crypto: virtio - adjust priority of algorithm

Harsh Jain (11):
crypto: chcr - Fix panic on dma_unmap_sg
crypto: chcr - Check device is allocated before use
crypto: algif_aead - Fix kernel panic on list_del
crypto: chcr - Fix key length for RFC4106
crypto: chcr - Change flow IDs
crypto: chcr - fix itnull.cocci warnings
crypto: chcr - Use cipher instead of Block Cipher in gcm setkey
crypto: chcr - Change cra_flags for cipher algos
crypto: chcr - Change algo priority
crypto: chcr - Fix wrong typecasting
crypto: chcr - Fix Smatch Complaint

Herbert Xu (7):
Revert "crypto: arm64/ARM: NEON accelerated ChaCha20"
crypto: aesni - Fix failure when built-in with modular pcbc
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
crypto: x86/chacha20 - Manually align stack buffer
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Horia Geantă (11):
crypto: caam - don't include unneeded headers
crypto: caam - check return code of dma_set_mask_and_coherent()
crypto: caam - fix HW S/G in ablkcipher_giv_edesc_alloc()
crypto: caam - check sg_count() return value
crypto: caam - replace sg_count() with sg_nents_for_len()
crypto: caam - use dma_map_sg() return code
crypto: caam - don't dma_map key for hash algorithms
crypto: caam - fix DMA API leaks for multiple setkey() calls
crypto: caam - fix error path for ctx_dma mapping failure
crypto: caam - abstract ahash request double buffering
crypto: caam - fix state buffer DMA (un)mapping

Ilya Lesokhin (1):
crypto: aesni-intel - RFC4106 can zero copy when !PageHighMem

Javier Martinez Canillas (3):
crypto: picoxcell - Allow driver to build COMPILE_TEST is enabled
crypto: picoxcell - Remove platform device ID table
crypto: picoxcell - Remove spacc_is_compatible() wrapper function

Jiri Slaby (1):
crypto: algif_hash - avoid zero-sized array

Laura Abbott (1):
crypto: testmgr - Use heap buffer for acomp test input

Li Zhong (1):
crypto: vmx - disable preemption to enable vsx in aes_ctr.c

Milan Broz (1):
crypto: xts - Add ECB dependency

Nicolas Iooss (1):
crypto: img-hash - use dma_data_direction when calling dma_map_sg

Pablo Marcos Oltra (1):
crypto: qat - modify format of dev top level debugfs entries

Rabin Vincent (2):
crypto: tcrypt - Add debug prints
crypto: doc - Fix hash export state information

Rob Rice (3):
crypto: brcm - DT documentation for Broadcom SPU hardware
crypto: brcm - Add Broadcom SPU driver
crypto: brcm - Avoid double free in ahash_finup()

Russell King (1):
hwrng: omap - update Kconfig help description

Ryder Lee (10):
crypto: mediatek - Add crypto driver support for some MediaTek chips
crypto: mediatek - add DT bindings documentation
crypto: mediatek - move HW control data to transformation context
crypto: mediatek - fix incorrect data transfer result
crypto: mediatek - make crypto request queue management more generic
crypto: mediatek - rework crypto request completion
crypto: mediatek - regroup functions by usage
crypto: mediatek - fix typo and indentation
crypto: mediatek - add support to CTR mode
crypto: mediatek - add support to GCM mode

Salvatore Benedetto (1):
crypto: api - Clear CRYPTO_ALG_DEAD bit before registering an alg

Shannon Nelson (4):
hwrng: n2 - limit error spewage when self-test fails
hwrng: n2 - add device data descriptions
hwrng: n2 - support new hardware register layout
hwrng: n2 - update version info

Tim Chen (1):
crypto: sha512-mb - Protect sha512 mb ctx mgr access

Tudor Ambarus (1):
crypto: caam - fix JR IO mapping if one fails

Wei Yongjun (1):
crypto: mediatek - make symbol of_crypto_id static

Xin Zeng (2):
crypto: qat - increase number of supported devices

Documentation/crypto/api-digest.rst | 2 +-
Documentation/crypto/api-skcipher.rst | 2 +-
.../devicetree/bindings/crypto/brcm,spu-crypto.txt | 22 +
.../devicetree/bindings/crypto/mediatek-crypto.txt | 27 +
MAINTAINERS | 7 +
arch/arm/crypto/Kconfig | 27 +-
arch/arm/crypto/Makefile | 11 +-
arch/arm/crypto/aes-armv4.S | 1089 -----
arch/arm/crypto/aes-ce-core.S | 84 +-
arch/arm/crypto/aes-ce-glue.c | 15 +-
arch/arm/crypto/aes-cipher-core.S | 179 +
arch/arm/crypto/aes-cipher-glue.c | 74 +
arch/arm/crypto/aes-neonbs-core.S | 1023 ++++
arch/arm/crypto/aes-neonbs-glue.c | 406 ++
arch/arm/crypto/aes_glue.c | 98 -
arch/arm/crypto/aes_glue.h | 19 -
arch/arm/crypto/aesbs-core.S_shipped | 2548 ----------
arch/arm/crypto/aesbs-glue.c | 367 --
arch/arm/crypto/bsaes-armv7.pl | 2471 ----------
arch/arm/crypto/chacha20-neon-core.S | 523 +++
arch/arm/crypto/chacha20-neon-glue.c | 127 +
arch/arm64/configs/defconfig | 1 -
arch/arm64/crypto/Kconfig | 24 +-
arch/arm64/crypto/Makefile | 13 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 1 -
arch/arm64/crypto/aes-cipher-core.S | 110 +
arch/arm64/crypto/aes-cipher-glue.c | 69 +
arch/arm64/crypto/aes-glue.c | 281 +-
arch/arm64/crypto/aes-modes.S | 37 +-
arch/arm64/crypto/aes-neon.S | 235 +-
arch/arm64/crypto/aes-neonbs-core.S | 972 ++++
arch/arm64/crypto/aes-neonbs-glue.c | 439 ++
arch/arm64/crypto/chacha20-neon-core.S | 450 ++
arch/arm64/crypto/chacha20-neon-glue.c | 126 +
arch/arm64/crypto/crc32-arm64.c | 290 --
arch/arm64/crypto/crc32-ce-glue.c | 49 +-
arch/x86/crypto/aesni-intel_asm.S | 37 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 32 +-
arch/x86/crypto/aesni-intel_glue.c | 12 +-
arch/x86/crypto/camellia-aesni-avx-asm_64.S | 5 +-
arch/x86/crypto/camellia-aesni-avx2-asm_64.S | 12 +-
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 14 +-
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 12 +-
arch/x86/crypto/chacha20-avx2-x86_64.S | 9 +-
arch/x86/crypto/chacha20-ssse3-x86_64.S | 7 +-
arch/x86/crypto/chacha20_glue.c | 70 +-
arch/x86/crypto/crc32c-pcl-intel-asm_64.S | 2 +-
arch/x86/crypto/crct10dif-pcl-asm_64.S | 14 +-
arch/x86/crypto/des3_ede-asm_64.S | 2 +-
arch/x86/crypto/ghash-clmulni-intel_asm.S | 3 +-
arch/x86/crypto/poly1305-avx2-x86_64.S | 6 +-
arch/x86/crypto/poly1305-sse2-x86_64.S | 6 +-
arch/x86/crypto/serpent-avx-x86_64-asm_64.S | 5 +-
arch/x86/crypto/serpent-avx2-asm_64.S | 9 +-
arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 6 +-
arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S | 3 +-
arch/x86/crypto/sha1-mb/sha1_x8_avx2.S | 15 +-
arch/x86/crypto/sha1_ni_asm.S | 8 +-
arch/x86/crypto/sha256-avx-asm.S | 9 +-
arch/x86/crypto/sha256-avx2-asm.S | 9 +-
.../crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S | 6 +-
.../crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S | 3 +-
arch/x86/crypto/sha256-mb/sha256_x8_avx2.S | 7 +-
arch/x86/crypto/sha256-ssse3-asm.S | 8 +-
arch/x86/crypto/sha256_ni_asm.S | 4 +-
arch/x86/crypto/sha512-avx-asm.S | 9 +-
arch/x86/crypto/sha512-avx2-asm.S | 10 +-
arch/x86/crypto/sha512-mb/sha512_mb.c | 64 +-
.../crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S | 10 +-
.../crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S | 4 +-
arch/x86/crypto/sha512-mb/sha512_x4_avx2.S | 4 +-
arch/x86/crypto/sha512-ssse3-asm.S | 9 +-
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 6 +-
crypto/Kconfig | 19 +
crypto/Makefile | 3 +
crypto/ablkcipher.c | 5 +-
crypto/acompress.c | 3 +-
crypto/aead.c | 3 +-
crypto/aes_generic.c | 64 +-
crypto/aes_ti.c | 375 ++
crypto/ahash.c | 3 +-
crypto/akcipher.c | 3 +-
crypto/algapi.c | 68 +-
crypto/algif_hash.c | 2 +-
crypto/blkcipher.c | 7 +-
crypto/cbc.c | 3 -
crypto/ccm.c | 386 +-
crypto/chacha20_generic.c | 73 +-
crypto/cmac.c | 3 +-
crypto/ctr.c | 2 +-
crypto/cts.c | 8 +-
crypto/kpp.c | 3 +-
crypto/pcbc.c | 6 +-
crypto/rng.c | 3 +-
crypto/scompress.c | 3 +-
crypto/seqiv.c | 2 -
crypto/shash.c | 9 +-
crypto/skcipher.c | 23 +-
crypto/tcrypt.c | 6 +
crypto/testmgr.c | 1055 +----
crypto/testmgr.h | 330 +-
drivers/char/hw_random/Kconfig | 4 +-
drivers/char/hw_random/cavium-rng-vf.c | 6 +-
drivers/char/hw_random/core.c | 64 +-
drivers/char/hw_random/n2-drv.c | 204 +-
drivers/char/hw_random/n2rng.h | 51 +-
drivers/crypto/Kconfig | 53 +-
drivers/crypto/Makefile | 17 +-
drivers/crypto/atmel-aes-regs.h | 16 +
drivers/crypto/atmel-aes.c | 455 +-
drivers/crypto/atmel-authenc.h | 64 +
drivers/crypto/atmel-sha-regs.h | 20 +
drivers/crypto/atmel-sha.c | 1481 +++++-
drivers/crypto/atmel-tdes.c | 14 +-
drivers/crypto/bcm/Makefile | 15 +
drivers/crypto/bcm/cipher.c | 4963 ++++++++++++++++++++
drivers/crypto/bcm/cipher.h | 483 ++
drivers/crypto/bcm/spu.c | 1251 +++++
drivers/crypto/bcm/spu.h | 287 ++
drivers/crypto/bcm/spu2.c | 1401 ++++++
drivers/crypto/bcm/spu2.h | 228 +
drivers/crypto/bcm/spum.h | 174 +
drivers/crypto/bcm/util.c | 581 +++
drivers/crypto/bcm/util.h | 116 +
drivers/crypto/bfin_crc.c | 6 +-
drivers/crypto/bfin_crc.h | 1 -
drivers/crypto/caam/caamalg.c | 589 +--
drivers/crypto/caam/caamhash.c | 268 +-
drivers/crypto/caam/ctrl.c | 33 +-
drivers/crypto/caam/error.c | 2 -
drivers/crypto/caam/jr.c | 19 +-
drivers/crypto/caam/sg_sw_sec4.h | 11 -
drivers/crypto/cavium/cpt/Kconfig | 17 +
drivers/crypto/cavium/cpt/Makefile | 3 +
drivers/crypto/cavium/cpt/cpt_common.h | 156 +
drivers/crypto/cavium/cpt/cpt_hw_types.h | 658 +++
drivers/crypto/cavium/cpt/cptpf.h | 64 +
drivers/crypto/cavium/cpt/cptpf_main.c | 670 +++
drivers/crypto/cavium/cpt/cptpf_mbox.c | 163 +
drivers/crypto/cavium/cpt/cptvf.h | 132 +
drivers/crypto/cavium/cpt/cptvf_algs.c | 444 ++
drivers/crypto/cavium/cpt/cptvf_algs.h | 113 +
drivers/crypto/cavium/cpt/cptvf_main.c | 863 ++++
drivers/crypto/cavium/cpt/cptvf_mbox.c | 211 +
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 593 +++
drivers/crypto/cavium/cpt/request_manager.h | 147 +
drivers/crypto/ccp/ccp-dev-v5.c | 15 +-
drivers/crypto/ccp/ccp-dev.h | 1 +
drivers/crypto/ccp/ccp-ops.c | 150 +-
drivers/crypto/chelsio/chcr_algo.c | 49 +-
drivers/crypto/chelsio/chcr_algo.h | 9 +-
drivers/crypto/chelsio/chcr_core.c | 11 +-
drivers/crypto/chelsio/chcr_core.h | 1 +
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
drivers/crypto/img-hash.c | 4 +-
drivers/crypto/mediatek/Makefile | 2 +
drivers/crypto/mediatek/mtk-aes.c | 1299 +++++
drivers/crypto/mediatek/mtk-platform.c | 604 +++
drivers/crypto/mediatek/mtk-platform.h | 231 +
drivers/crypto/mediatek/mtk-regs.h | 194 +
drivers/crypto/mediatek/mtk-sha.c | 1435 ++++++
drivers/crypto/picoxcell_crypto.c | 28 +-
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 2 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 2 +-
drivers/crypto/qat/qat_c62x/adf_drv.c | 2 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 2 +-
drivers/crypto/qat/qat_common/adf_cfg_common.h | 1 +
drivers/crypto/qat/qat_common/adf_common_drv.h | 4 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 2 +-
drivers/crypto/qat/qat_common/adf_init.c | 28 +-
drivers/crypto/qat/qat_common/adf_sriov.c | 4 +-
drivers/crypto/qat/qat_common/adf_vf_isr.c | 4 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 2 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 2 +-
drivers/crypto/virtio/Kconfig | 1 +
drivers/crypto/virtio/virtio_crypto_algs.c | 54 +-
drivers/crypto/virtio/virtio_crypto_common.h | 16 +
drivers/crypto/virtio/virtio_crypto_core.c | 74 +-
drivers/crypto/vmx/aes_ctr.c | 6 +
drivers/net/ethernet/chelsio/cxgb4/t4fw_api.h | 8 +
include/crypto/algapi.h | 20 +-
include/crypto/chacha20.h | 6 +-
include/crypto/hash.h | 18 +-
include/crypto/internal/skcipher.h | 2 +-
include/crypto/skcipher.h | 34 +
include/linux/compiler-gcc.h | 1 +
include/linux/miscdevice.h | 1 +
187 files changed, 26983 insertions(+), 9598 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-03-04 07:41:20

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.11

Hi Linus:

This push fixes the following issues:

- vmalloc stack regression in CCM.
- Build problem in CRC32 on ARM.
- Memory leak in cavium.
- Missing Kconfig dependencies in atmel and mediatek.
- XTS Regression on some platforms (s390 and ppc).
- Memory overrun in CCM test vector.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (3):
crypto: ccm - move cbcmac input off the stack
crypto: arm/crc32 - fix build error with outdated binutils
crypto: arm/crc32 - add build time test for CRC instruction support

Colin Ian King (1):
crypto: cavium - fix leak on curr if curr->head fails to be allocated

Geert Uytterhoeven (2):
crypto: atmel - CRYPTO_DEV_ATMEL_TDES and CRYPTO_DEV_ATMEL_SHA should depend on HAS_DMA
crypto: atmel - CRYPTO_DEV_MEDIATEK should depend on HAS_DMA

George Cherian (1):
crypto: cavium - Fix couple of static checker errors

Herbert Xu (2):
crypto: api - Add crypto_requires_off helper
crypto: xts - Propagate NEED_FALLBACK bit

Laura Abbott (1):
crypto: testmgr - Pad aes_ccm_enc_tv_template vector

Paulo Flabiano Smorigo (2):
crypto: vmx - Use skcipher for cbc fallback
crypto: vmx - Use skcipher for xts fallback

arch/arm/crypto/Makefile | 12 ++++++-
arch/arm/crypto/crc32-ce-core.S | 2 +-
crypto/ccm.c | 5 +--
crypto/testmgr.h | 2 +-
crypto/xts.c | 14 ++++----
drivers/crypto/Kconfig | 3 ++
drivers/crypto/cavium/cpt/cptvf_main.c | 5 ++-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 4 +--
drivers/crypto/vmx/aes_cbc.c | 47 +++++++++++++-------------
drivers/crypto/vmx/aes_xts.c | 32 +++++++++---------
include/crypto/algapi.h | 7 +++-
11 files changed, 79 insertions(+), 54 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-03-15 06:32:10

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.11

Hi Linus:

This push fixes the following issues:

- Self-test failure of crc32c on powerpc.
- Regressions of ecb(aes) when used with xts/lrw in s5p-sss.
- A number of bugs in the omap RNG driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Daniel Axtens (1):
crypto: powerpc - Fix initialisation of crc32c context

Krzysztof Kozlowski (2):
crypto: s5p-sss - Fix completing crypto request in IRQ handler
crypto: s5p-sss - Fix spinlock recursion on LRW(AES)

Thomas Petazzoni (3):
hwrng: omap - write registers after enabling the clock
hwrng: omap - use devm_clk_get() instead of of_clk_get()
hwrng: omap - Do not access INTMASK_REG on EIP76

arch/powerpc/crypto/crc32c-vpmsum_glue.c | 2 +-
drivers/char/hw_random/omap-rng.c | 16 +++-
drivers/crypto/s5p-sss.c | 132 +++++++++++++++++++-----------
3 files changed, 100 insertions(+), 50 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-03-24 13:46:48

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.11

Hi Linus:

This push fixes regressions in the crypto ccp driver and the
hwrng drivers amd and geode.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Gary R Hook (1):
crypto: ccp - Assign DMA commands to the channel's CCP

Prarit Bhargava (2):
hwrng: amd - Revert managed API changes
hwrng: geode - Revert managed API changes

drivers/char/hw_random/amd-rng.c | 42 ++++++++++++++++++++++++------
drivers/char/hw_random/geode-rng.c | 50 +++++++++++++++++++++++++-----------
drivers/crypto/ccp/ccp-dev.c | 5 +++-
drivers/crypto/ccp/ccp-dmaengine.c | 1 +
include/linux/ccp.h | 2 +-
5 files changed, 75 insertions(+), 25 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-03-31 10:29:38

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.11

Hi Linus:

This push fixes the following issues:

- Memory corruption when kmalloc fails in xts/lrw.
- Mark some CCP DMA channels as private.
- Fix reordering race in padata.
- Regression in omap-rng DT description.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (1):
crypto: xts,lrw - fix out-of-bounds write after kmalloc failure

Gary R Hook (1):
crypto: ccp - Make some CCP DMA channels private

Jason A. Donenfeld (1):
padata: avoid race in reordering

Thomas Petazzoni (1):
dt-bindings: rng: clocks property on omap_rng not always mandatory

Documentation/devicetree/bindings/rng/omap_rng.txt | 3 +-
crypto/lrw.c | 7 +++-
crypto/xts.c | 7 +++-
drivers/crypto/ccp/ccp-dev-v5.c | 1 +
drivers/crypto/ccp/ccp-dev.h | 5 +++
drivers/crypto/ccp/ccp-dmaengine.c | 41 ++++++++++++++++++++
kernel/padata.c | 5 ++-
7 files changed, 62 insertions(+), 7 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-04-10 11:04:32

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.11

Hi Linus:

This push fixes a number of bugs in the caam driver:

- Device creation fails after release.
- Error-path NULL-pointer dereference.
- Spurious hardware error in RNG deinstantiation.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Horia Geantă (3):
crypto: caam - fix JR platform device subsequent (re)creations
crypto: caam - fix invalid dereference in caam_rsa_init_tfm()
crypto: caam - fix RNG deinstantiation error checking

drivers/crypto/caam/caampkc.c | 2 +-
drivers/crypto/caam/ctrl.c | 66 +++++++++++++----------------------------
drivers/crypto/caam/intern.h | 1 -
3 files changed, 22 insertions(+), 47 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-04-18 10:28:21

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.11

Hi Linus:

This push fixes the following problems:

- Regression in new XTS/LRW code when used with async crypto.
- Long-standing bug in ahash API when used with certain algos.
- Bogus memory dereference in async algif_aead with certain algos.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (4):
crypto: xts - Fix use-after-free on EINPROGRESS
crypto: lrw - Fix use-after-free on EINPROGRESS
crypto: ahash - Fix EINPROGRESS notification callback
crypto: algif_aead - Fix bogus request dereference in completion function

crypto/ahash.c | 79 +++++++++++++++++++++++++---------------
crypto/algif_aead.c | 12 +++---
crypto/lrw.c | 16 ++++++++
crypto/xts.c | 16 ++++++++
include/crypto/internal/hash.h | 10 +++++
5 files changed, 98 insertions(+), 35 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-05-01 14:26:43

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.12

Hi Linus:

Here is the crypto update for 4.12:

API:

- Add batch registration for acomp/scomp.
- Change acomp testing to non-unique compressed result.
- Extend algorithm name limit to 128 bytes.
- Require setkey before accept(2) in algif_aead.

Algorithms:

- Add support for deflate rfc1950 (zlib).

Drivers:

- Add accelerated crct10dif for powerpc.
- Add crc32 in stm32.
- Add sha384/sha512 in ccp.
- Add 3des/gcm(aes) for v5 devices in ccp.
- Add Queue Interface (QI) backend support in caam.
- Add new Exynos RNG driver.
- Add ThunderX ZIP driver.
- Add driver for hardware random generator on MT7623 SoC.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (2):
crypto: arm/aes-neonbs - resolve fallback cipher at runtime
crypto: algapi - annotate expected branch behavior in crypto_inc()

Arnd Bergmann (1):
crypto: zip - add a cast for printing atomic64_t values

Christophe Jaillet (1):
crypto: chcr - Fix error handling related to 'chcr_alloc_shash'

Colin Ian King (2):
crypto: bcm - fix spelling mistake: "genereate" -> "generate"
crypto: crypto4xx - rename ce_ring_contol to ce_ring_control

Dan Carpenter (1):
crypto: zip - Memory corruption in zip_clear_stats()

Daniel Axtens (4):
crypto: powerpc - Factor out the core CRC vpmsum algorithm
crypto: powerpc - Re-enable non-REFLECTed CRCs
crypto: powerpc - Add CRC-T10DIF acceleration
crypto: powerpc - Stress test for vpmsum implementations

Eric Biggers (7):
crypto: gf128mul - fix some comments
crypto: gf128mul - remove xx() macro
crypto: gf128mul - rename the byte overflow tables
crypto: gf128mul - constify 4k and 64k multiplication tables
crypto: kpp - constify buffer passed to crypto_kpp_set_secret()
crypto: testmgr - constify all test vectors
crypto: xts,lrw - fix out-of-bounds write after kmalloc failure

Fabien DESSENNE (6):
crypto: doc - fix typo (struct sdesc)
dt-bindings: Document STM32 CRC bindings
crypto: stm32 - Support for STM32 CRC32 crypto module
ARM: dts: stm32: Add CRC support to stm32f746
ARM: dts: stm32: enable CRC on stm32746g-eval board
ARM: configs: stm32: Add crypto support

Gary R Hook (11):
crypto: ccp - Assign DMA commands to the channel's CCP
crypto: ccp - Make some CCP DMA channels private
crypto: ccp - Add SHA-2 384- and 512-bit support
crypto: ccp - Enable 3DES function on v5 CCPs
crypto: ccp - Enable support for AES GCM on v5 CCPs
crypto: ccp - Remove redundant cpu-to-le32 macros
crypto: ccp - Rearrange structure members to minimize size
crypto: ccp - Use only the relevant interrupt bits
crypto: ccp - Disable interrupts early on unload
crypto: ccp - Change ISR handler method for a v3 CCP
crypto: ccp - Change ISR handler method for a v5 CCP

Geliang Tang (1):
crypto: ixp4xx - Use sg_virt()

Giovanni Cabiddu (4):
crypto: acomp - allow registration of multiple acomps
crypto: testmgr - replace compression known answer test
crypto: scomp - allow registration of multiple scomps
crypto: scomp - add support for deflate rfc1950 (zlib)

Haren Myneni (1):
crypto: nx - Update MAINTAINERS entry for 842 compression

Harsh Jain (4):
crypto: chcr - Increase priority of AEAD algos.
crypto: chcr - Set hmac_ctrl bit to use HW register HMAC_CFG[456]
crypto: chcr - Fix txq ids.
crypto: chcr - Add fallback for AEAD algos

Heiner Kallweit (4):
clk: meson-gxbb: expose clock CLKID_RNG0
dt-bindings: rng: add clock to DT binding documentation for hwrng
ARM64: dts: meson-gx: add clock CLKID_RNG0 to hwrng node
hwrng: meson - add clock handling to driver

Herbert Xu (7):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
crypto: user - Prepare for CRYPTO_MAX_ALG_NAME expansion
crypto: af_alg - Allow arbitrarily long algorithm names
xfrm: Prepare for CRYPTO_MAX_ALG_NAME expansion
crypto: api - Extend algorithm name limit to 128 bytes
Revert "crypto: arm64/sha - Add constant operand modifier to ASM_EXPORT"

Horia Geantă (10):
soc/qman: export volatile dequeue related structs
soc/qman: add dedicated channel ID for CAAM
soc/qman: export non-programmable FQD fields query
soc/qman: add macros needed by caam/qi driver
crypto: caam - avoid double inclusion in desc_constr.h
crypto: caam - add Queue Interface (QI) backend support
crypto: caam/qi - add ablkcipher and authenc algorithms
crypto: caam - fix JR platform device subsequent (re)creations
crypto: caam - fix invalid dereference in caam_rsa_init_tfm()
crypto: caam - fix RNG deinstantiation error checking

Jason A. Donenfeld (4):
padata: avoid race in reordering
md5: remove from lib and only live in crypto
padata: free correct variable
padata: get_next is never NULL

Krzysztof Kozlowski (6):
MAINTAINERS: Add maintianer entry for crypto/s5p-sss
crypto: s5p-sss - Close possible race for completed requests
crypto: s5p-sss - Remove unused variant field from state container
crypto: s5p-sss - Document the struct s5p_aes_dev
linux/kernel.h: Add ALIGN_DOWN macro
crypto: exynos - Add new Exynos RNG driver

Mahipal Challa (3):
crypto: zip - Add ThunderX ZIP driver core
crypto: zip - Wire-up Compression / decompression HW offload
crypto: zip - Add Compression/Decompression statistics

Marcelo Cerri (3):
crypto: cbc - Propagate NEED_FALLBACK bit
crypto: ctr - Propagate NEED_FALLBACK bit
crypto: testmgr - mark ctr(des3_ede) as fips_allowed

Markus Elfring (1):
hwrng: n2 - Use devm_kcalloc() in n2rng_probe()

Matthias Kaehlcke (1):
crypto: arm64/sha - Add constant operand modifier to ASM_EXPORT

Michael Davidson (1):
crypto, x86: aesni - fix token pasting for clang

Michael Ellerman (1):
crypto: crct10dif-vpmsum - Fix missing preempt_disable()

Milan Broz (1):
crypto: testmgr - Allow ecb(cipher_null) in FIPS mode

Myungho Jung (1):
crypto: lz4 - fixed decompress function to return error code

Ondrej Mosnáček (4):
crypto: gf128mul - define gf128mul_x_* in gf128mul.h
crypto: gf128mul - switch gf128mul_x_ble to le128
crypto: glue_helper - remove the le128_gf128mul_x_ble function
crypto: xts - drop gf128mul dependency

Prarit Bhargava (2):
hwrng: amd - Revert managed API changes
hwrng: geode - Revert managed API changes

Rick Altherr (3):
hwrng: timeriomem - Migrate to new API
hwrng: timeriomem - Shorten verbose type and variable names
hwrng: timeriomem - Improve performance for sub-jiffie update periods

Ryder Lee (8):
crypto: mediatek - rework interrupt handler
crypto: mediatek - add MTK_* prefix and correct annotations.
crypto: mediatek - make mtk_sha_xmit() more generic
crypto: mediatek - simplify descriptor ring management
crypto: mediatek - add queue_task tasklet
crypto: mediatek - fix error handling in mtk_aes_complete()
crypto: mediatek - add mtk_aes_gcm_tag_verify()
crypto: mediatek - make hardware operation flow more efficient

Sean Wang (2):
dt-bindings: hwrng: Add Mediatek hardware random generator bindings
hwrng: mtk - Add driver for hardware random generator on MT7623 SoC

Stephan Mueller (2):
crypto: DRBG - initialize SGL only once
crypto: algif_aead - Require setkey before accept(2)

Thomas Petazzoni (2):
hwrng: omap - move clock related code to omap_rng_probe()
dt-bindings: rng: clocks property on omap_rng not always mandatory

Wei Yongjun (2):
crypto: caam - fix error return code in caam_qi_init()
crypto: stm32 - Fix OF module alias information

Documentation/crypto/api-samples.rst | 6 +-
.../devicetree/bindings/crypto/st,stm32-crc.txt | 16 +
.../devicetree/bindings/rng/amlogic,meson-rng.txt | 11 +-
Documentation/devicetree/bindings/rng/mtk-rng.txt | 18 +
Documentation/devicetree/bindings/rng/omap_rng.txt | 3 +-
MAINTAINERS | 18 +-
arch/arm/boot/dts/stm32746g-eval.dts | 4 +
arch/arm/boot/dts/stm32f746.dtsi | 7 +
arch/arm/configs/stm32_defconfig | 2 +
arch/arm/crypto/Kconfig | 2 +-
arch/arm/crypto/aes-neonbs-glue.c | 60 +-
arch/arm64/boot/dts/amlogic/meson-gx.dtsi | 2 +-
arch/arm64/boot/dts/amlogic/meson-gxbb.dtsi | 5 +
arch/metag/kernel/stacktrace.c | 2 -
arch/powerpc/crypto/Makefile | 3 +
arch/powerpc/crypto/crc-vpmsum_test.c | 137 ++
arch/powerpc/crypto/crc32-vpmsum_core.S | 755 +++++++
arch/powerpc/crypto/crc32c-vpmsum_asm.S | 715 +-----
arch/powerpc/crypto/crct10dif-vpmsum_asm.S | 850 +++++++
arch/powerpc/crypto/crct10dif-vpmsum_glue.c | 128 ++
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 +-
arch/x86/crypto/camellia_glue.c | 4 +-
arch/x86/crypto/glue_helper.c | 3 +-
arch/x86/crypto/serpent_sse2_glue.c | 4 +-
arch/x86/crypto/twofish_glue_3way.c | 4 +-
arch/x86/include/asm/crypto/glue_helper.h | 10 -
crypto/Kconfig | 18 +-
crypto/acompress.c | 29 +
crypto/af_alg.c | 4 +-
crypto/algapi.c | 4 +-
crypto/algif_aead.c | 157 +-
crypto/cbc.c | 15 +-
crypto/crypto_user.c | 18 +-
crypto/ctr.c | 23 +-
crypto/deflate.c | 61 +-
crypto/dh.c | 3 +-
crypto/drbg.c | 5 +-
crypto/ecdh.c | 3 +-
crypto/gf128mul.c | 111 +-
crypto/lrw.c | 7 +-
crypto/lz4.c | 2 +-
crypto/lz4hc.c | 2 +-
crypto/md5.c | 95 +-
crypto/scompress.c | 29 +
crypto/testmgr.c | 112 +-
crypto/testmgr.h | 587 ++---
crypto/xts.c | 45 +-
drivers/char/hw_random/Kconfig | 28 +-
drivers/char/hw_random/Makefile | 2 +-
drivers/char/hw_random/amd-rng.c | 42 +-
drivers/char/hw_random/exynos-rng.c | 231 --
drivers/char/hw_random/geode-rng.c | 50 +-
drivers/char/hw_random/meson-rng.c | 22 +
drivers/char/hw_random/mtk-rng.c | 168 ++
drivers/char/hw_random/n2-drv.c | 4 +-
drivers/char/hw_random/omap-rng.c | 22 +-
drivers/char/hw_random/timeriomem-rng.c | 157 +-
drivers/clk/meson/gxbb.h | 2 +-
drivers/crypto/Kconfig | 24 +
drivers/crypto/Makefile | 3 +
drivers/crypto/amcc/crypto4xx_core.c | 2 +-
drivers/crypto/amcc/crypto4xx_reg_def.h | 2 +-
drivers/crypto/bcm/util.c | 2 +-
drivers/crypto/caam/Kconfig | 20 +-
drivers/crypto/caam/Makefile | 5 +
drivers/crypto/caam/caamalg.c | 9 +-
drivers/crypto/caam/caamalg_desc.c | 77 +-
drivers/crypto/caam/caamalg_desc.h | 15 +-
drivers/crypto/caam/caamalg_qi.c | 2387 ++++++++++++++++++++
drivers/crypto/caam/caampkc.c | 2 +-
drivers/crypto/caam/ctrl.c | 121 +-
drivers/crypto/caam/desc_constr.h | 5 +
drivers/crypto/caam/intern.h | 25 +-
drivers/crypto/caam/qi.c | 805 +++++++
drivers/crypto/caam/qi.h | 201 ++
drivers/crypto/caam/sg_sw_qm.h | 108 +
drivers/crypto/cavium/Makefile | 4 +
drivers/crypto/cavium/zip/Makefile | 11 +
drivers/crypto/cavium/zip/common.h | 202 ++
drivers/crypto/cavium/zip/zip_crypto.c | 313 +++
drivers/crypto/cavium/zip/zip_crypto.h | 79 +
drivers/crypto/cavium/zip/zip_deflate.c | 200 ++
drivers/crypto/cavium/zip/zip_deflate.h | 62 +
drivers/crypto/cavium/zip/zip_device.c | 202 ++
drivers/crypto/cavium/zip/zip_device.h | 108 +
drivers/crypto/cavium/zip/zip_inflate.c | 223 ++
drivers/crypto/cavium/zip/zip_inflate.h | 62 +
drivers/crypto/cavium/zip/zip_main.c | 729 ++++++
drivers/crypto/cavium/zip/zip_main.h | 121 +
drivers/crypto/cavium/zip/zip_mem.c | 114 +
drivers/crypto/cavium/zip/zip_mem.h | 78 +
drivers/crypto/cavium/zip/zip_regs.h | 1347 +++++++++++
drivers/crypto/ccp/Makefile | 2 +
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 252 +++
drivers/crypto/ccp/ccp-crypto-des3.c | 254 +++
drivers/crypto/ccp/ccp-crypto-main.c | 22 +
drivers/crypto/ccp/ccp-crypto-sha.c | 22 +
drivers/crypto/ccp/ccp-crypto.h | 44 +-
drivers/crypto/ccp/ccp-dev-v3.c | 121 +-
drivers/crypto/ccp/ccp-dev-v5.c | 169 +-
drivers/crypto/ccp/ccp-dev.c | 5 +-
drivers/crypto/ccp/ccp-dev.h | 35 +-
drivers/crypto/ccp/ccp-dmaengine.c | 42 +
drivers/crypto/ccp/ccp-ops.c | 522 +++++
drivers/crypto/ccp/ccp-pci.c | 2 +
drivers/crypto/chelsio/chcr_algo.c | 304 ++-
drivers/crypto/chelsio/chcr_algo.h | 4 +
drivers/crypto/chelsio/chcr_core.h | 2 +
drivers/crypto/chelsio/chcr_crypto.h | 10 +-
drivers/crypto/exynos-rng.c | 389 ++++
drivers/crypto/ixp4xx_crypto.c | 2 +-
drivers/crypto/mediatek/mtk-aes.c | 421 ++--
drivers/crypto/mediatek/mtk-platform.c | 15 +-
drivers/crypto/mediatek/mtk-platform.h | 56 +-
drivers/crypto/mediatek/mtk-sha.c | 309 +--
drivers/crypto/qat/qat_common/qat_asym_algs.c | 2 +-
drivers/crypto/s5p-sss.c | 35 +-
drivers/crypto/stm32/Kconfig | 7 +
drivers/crypto/stm32/Makefile | 2 +
drivers/crypto/stm32/stm32_crc32.c | 324 +++
drivers/gpu/drm/udl/udl_fb.c | 2 +-
drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c | 9 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.h | 1 +
drivers/net/ethernet/chelsio/cxgb4/t4fw_api.h | 3 +-
drivers/soc/fsl/qbman/qman.c | 4 +-
drivers/soc/fsl/qbman/qman_ccsr.c | 6 +-
drivers/soc/fsl/qbman/qman_priv.h | 97 -
include/crypto/gf128mul.h | 87 +-
include/crypto/internal/acompress.h | 3 +
include/crypto/internal/scompress.h | 3 +
include/crypto/kpp.h | 6 +-
include/crypto/xts.h | 2 +-
include/dt-bindings/clock/gxbb-clkc.h | 3 +-
include/linux/ccp.h | 70 +-
include/linux/crypto.h | 2 +-
include/linux/cryptohash.h | 5 -
include/linux/kernel.h | 1 +
include/soc/fsl/qman.h | 109 +
include/uapi/linux/cryptouser.h | 10 +-
include/video/udlfb.h | 2 +-
kernel/padata.c | 20 +-
lib/Makefile | 2 +-
lib/md5.c | 95 -
net/xfrm/xfrm_user.c | 6 +-
144 files changed, 13867 insertions(+), 2557 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-05-23 03:42:32

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.12

Hi Linus:

This push fixes a regression in the skcipher interface that allows
bogus key parameters to hit underlying implementations which can
cause crashes.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
crypto: skcipher - Add missing API setkey checks

crypto/skcipher.c | 40 +++++++++++++++++++++++++++++++++++++++-
1 file changed, 39 insertions(+), 1 deletion(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-06-08 09:23:46

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.12

Hi Linus:

This push fixes a couple of places in the crypto code that were
doing interruptible sleeps dangerously. They have been converted
to use non-interruptible sleeps. This push also fixes a bug in
asymmetric_keys where it would trigger a use-after-free if a
request returned EBUSY due to a full device queue.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Gilad Ben-Yossef (3):
crypto: asymmetric_keys - handle EBUSY due to backlog correctly
crypto: drbg - wait for crypto op not signal safe
crypto: gcm - wait for crypto op not signal safe

crypto/asymmetric_keys/public_key.c | 2 +-
crypto/drbg.c | 5 ++---
crypto/gcm.c | 6 ++----
3 files changed, 5 insertions(+), 8 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-06-08 14:05:02

by David Miller

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

From: Herbert Xu <[email protected]>
Date: Thu, 8 Jun 2017 17:23:21 +0800

> This push fixes a couple of places in the crypto code that were
> doing interruptible sleeps dangerously. They have been converted
> to use non-interruptible sleeps. This push also fixes a bug in
> asymmetric_keys where it would trigger a use-after-free if a
> request returned EBUSY due to a full device queue.

Where is the gcc shash miscompile workaround?

Thanks.

2017-06-09 02:52:33

by Herbert Xu

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

On Thu, Jun 08, 2017 at 10:05:02AM -0400, David Miller wrote:
> From: Herbert Xu <[email protected]>
> Date: Thu, 8 Jun 2017 17:23:21 +0800
>
> > This push fixes a couple of places in the crypto code that were
> > doing interruptible sleeps dangerously. They have been converted
> > to use non-interruptible sleeps. This push also fixes a bug in
> > asymmetric_keys where it would trigger a use-after-free if a
> > request returned EBUSY due to a full device queue.
>
> Where is the gcc shash miscompile workaround?

I'll push it to Linus in a couple of days.

Cheers,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-06-15 00:54:43

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.12

Hi Linus:

This push fixes a bug on sparc where we may dereference freed stack
memory.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


David Miller (1):
crypto: Work around deallocated stack frame reference gcc bug on sparc.

drivers/infiniband/sw/rxe/rxe.h | 5 ++++-
fs/btrfs/hash.c | 5 ++++-
fs/f2fs/f2fs.h | 5 ++++-
lib/libcrc32c.c | 6 ++++--
4 files changed, 16 insertions(+), 5 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-06-15 09:04:46

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

On Thu, Jun 15, 2017 at 9:54 AM, Herbert Xu <[email protected]> wrote:
>
> This push fixes a bug on sparc where we may dereference freed stack
> memory.

Ugh, that's a particularly ugly fix for a random gcc bug on a random
architecture that almost nobody tests.

In other words, it's nasty. It's nasty because nobody sane will ever
realize this pattern, and the code will either bit-rot or just happen
again somewhere else.

I'd have been *much* happier if this had been some nicer abstraction
that is built up around the use of SHASH_DESC_ON_STACK(), and just
have some rule that "SHASH_DESC_ON_STACK()" needs to be paired with
retrieving the final value and then a SHASH_DESC_DEALLOC() or
whatever.

Then you *could* implement SHASH_DESC_ON_STACK() as a kmalloc, and
SHASH_DESC_DEALLOC() would be a kfree - but with an alloca()-like
allocation the SHASH_DESC_DEALLOC() would be that "barrier_data()".

At that point the interface would make _sense_ at some conceptual
level, rather than being a random hack for a small collection of
random users of this thing.

There's a fair number of SHASH_DESC_ON_STACK users, are all the others
safe for some random reason that just happens to be about code
generation? Did people actually verify that?

Linus

2017-06-15 09:05:16

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

On Thu, Jun 15, 2017 at 6:04 PM, Linus Torvalds
<[email protected]> wrote:
>
> Ugh, that's a particularly ugly fix for a random gcc bug on a random
> architecture that almost nobody tests.

.. anway, I pulled it, but I don't have to like it.

Linus

2017-06-15 09:42:39

by Herbert Xu

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

On Thu, Jun 15, 2017 at 06:04:44PM +0900, Linus Torvalds wrote:
>
> Then you *could* implement SHASH_DESC_ON_STACK() as a kmalloc, and
> SHASH_DESC_DEALLOC() would be a kfree - but with an alloca()-like
> allocation the SHASH_DESC_DEALLOC() would be that "barrier_data()".
>
> At that point the interface would make _sense_ at some conceptual
> level, rather than being a random hack for a small collection of
> random users of this thing.

Yes we could probably do that.

> There's a fair number of SHASH_DESC_ON_STACK users, are all the others
> safe for some random reason that just happens to be about code
> generation? Did people actually verify that?

If I understand this correctly this is only an issue if you directly
return a value from the shash_desc struct allocated on the stack.
This is usually rare as normally you'd return an error code and the
hash result would be written directly to some memory passed in from
the caller.

Cheers,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-06-15 15:01:20

by David Miller

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

From: Linus Torvalds <[email protected]>
Date: Thu, 15 Jun 2017 18:04:44 +0900

> There's a fair number of SHASH_DESC_ON_STACK users, are all the others
> safe for some random reason that just happens to be about code
> generation? Did people actually verify that?

I looked at the code generated in every case.

As a side note, ext4 does something similar with a private
implementation, but it doesn't use something the evaluates to an
alloca. Instead it uses a fixed 4-byte size for the shash context
value in the on-stack declaration.

We can tidy it up with abstraction macros as a follow-up, thanks
for the suggestion. I'll look into it.

2017-06-15 15:02:04

by David Miller

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

From: Herbert Xu <[email protected]>
Date: Thu, 15 Jun 2017 17:42:10 +0800

> On Thu, Jun 15, 2017 at 06:04:44PM +0900, Linus Torvalds wrote:
>> There's a fair number of SHASH_DESC_ON_STACK users, are all the others
>> safe for some random reason that just happens to be about code
>> generation? Did people actually verify that?
>
> If I understand this correctly this is only an issue if you directly
> return a value from the shash_desc struct allocated on the stack.
> This is usually rare as normally you'd return an error code and the
> hash result would be written directly to some memory passed in from
> the caller.

Correct.

2017-06-16 12:50:07

by Theodore Ts'o

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

On Thu, Jun 15, 2017 at 11:01:18AM -0400, David Miller wrote:
> As a side note, ext4 does something similar with a private
> implementation, but it doesn't use something the evaluates to an
> alloca. Instead it uses a fixed 4-byte size for the shash context
> value in the on-stack declaration.

In ext4's case, we're doing it inside an inline function, and then
using the "return" value from inside the calling function. Assuming
that gcc actually inlines the function, are we in danger of tripping
over the bug?

- Ted

2017-06-16 16:49:55

by David Miller

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.12

From: Theodore Ts'o <[email protected]>
Date: Fri, 16 Jun 2017 08:50:07 -0400

> On Thu, Jun 15, 2017 at 11:01:18AM -0400, David Miller wrote:
>> As a side note, ext4 does something similar with a private
>> implementation, but it doesn't use something the evaluates to an
>> alloca. Instead it uses a fixed 4-byte size for the shash context
>> value in the on-stack declaration.
>
> In ext4's case, we're doing it inside an inline function, and then
> using the "return" value from inside the calling function. Assuming
> that gcc actually inlines the function, are we in danger of tripping
> over the bug?

Again, the bug can only be triggered if you do a dynamically sized
object on the stack.

Which ext4 is not doing, since it uses fixed size elements in the
on-stack shash context.

2017-07-05 13:01:24

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.13

Hi Linus:

Here is the crypto update for 4.13:

Algorithms:

- Add private key generation to ecdh.

Drivers:

- Add generic gcm(aes) to aesni-intel.
- Add SafeXcel EIP197 crypto engine driver.
- Add ecb(aes), cfb(aes) and ecb(des3_ede) to cavium.
- Add support for CNN55XX adapters in cavium.
- Add ctr mode to chcr.
- Add support for gcm(aes) to omap.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine Ténart (24):
crypto: inside-secure - add SafeXcel EIP197 crypto engine driver
MAINTAINERS: add a maintainer for the Inside Secure crypto driver
crypto: sun4i-ss - group variable definitions in sun4i_hash()
crypto: sun4i-ss - remove conditional checks against 0
crypto: sun4i-ss - use lower/upper_32_bits helpers
crypto: sun4i-ss - cannot use DMA is the request is 0 length
crypto: sun4i-ss - do not dynamically set parts of the last buffer to 0
crypto: sun4i-ss - simplify the pad length calculation
crypto: sun4i-ss - simplify the appended bit assignment
crypto: sun4i-ss - use GENMASK to generate masks
crypto: sun4i-ss - move from ablkcipher to skcipher API
crypto: sun4i-ss - add the CRYPTO_ALG_KERN_DRIVER_ONLY flag
crypto: sun4i-ss - fix large block size support
crypto: inside-secure - use hmac ipad/opad constants
crypto: inside-secure - fix the ring wr_cache offset
crypto: inside-secure - fix incorrect DSE data cache setting
crypto: inside-secure - update the context and request later
crypto: inside-secure - use one queue per hw ring
crypto: inside-secure - stop requeueing failed requests
crypto: inside-secure - get the backlog before dequeueing the request
crypto: inside-secure - only dequeue when needed
crypto: inside-secure - increase the batch size
crypto: inside-secure - use the base_end pointer in ring rollback
Documentation/bindings: Document the SafeXel cryptographic engine driver

Ard Biesheuvel (6):
crypto: arm64/sha - avoid non-standard inline asm tricks
crypto: arm/aes-ce - enable module autoloading based on CPU feature bits
crypto: arm/ghash-ce - enable module autoloading based on CPU feature bits
crypto: arm/sha1-ce - enable module autoloading based on CPU feature bits
crypto: arm/sha2-ce - enable module autoloading based on CPU feature bits
crypto: arm/crc32 - enable module autoloading based on CPU feature bits

Arvind Yadav (4):
hwrng: omap3-rom - Handle return value of clk_prepare_enable
crypto: img-hash - Handle return value of clk_prepare_enable
crypto: n2 - make of_device_ids const
crypto: caam - make of_device_ids const.

Benjamin Peterson (1):
crypto: doc - fix typo in docs

Christoph Hellwig (1):
crypto: qat - use pcie_flr instead of duplicating it

Christophe Jaillet (1):
crypto: crypto4xx - fix an error code

Colin Ian King (3):
crypto: brcm - fix spelling mistake: "fallbck" -> "fallback"
crypto: omap-aes - fix spelling mistake "Encryptio" -> "Encryption"
crypto: cavium - fix spelling mistake "Revsion" -> "Revision"

Corentin LABBE (10):
crypto: hmac - add hmac IPAD/OPAD constant
crypto: brcm - Use IPAD/OPAD constant
crypto: ixp4xx - Use IPAD/OPAD constant
crypto: marvell - Use IPAD/OPAD constant
crypto: mv_cesa - Use IPAD/OPAD constant
crypto: omap-sham - Use IPAD/OPAD constant
crypto: qat - Use IPAD/OPAD constant
crypto: mediatek - Use IPAD/OPAD constant
crypto: ccp - Use IPAD/OPAD constant
crypto: engine - replace pr_xxx by dev_xxx

Dan Carpenter (4):
crypto: sha512-mb - add some missing unlock on error
X.509: Fix error code in x509_cert_parse()
crypto: glue_helper - Delete some dead code
crypto: cavium/nitrox - dma_mapping_error() returns bool

Eric Biggers (2):
crypto: x86/aes - Don't use %rbp as temporary register
crypto: aes_ti - fix comment for MixColumns step

Gary R Hook (3):
crypto: ccp - Add a module author
crypto: ccp - Add debugfs entries for CCP information
crypto: ccp - Release locks before returning

Geliang Tang (1):
crypto: mediatek - drop .owner field in mtk_crypto_driver

George Cherian (3):
crypto: cavium - Downgrade the annoying misc interrupt print from dev_err to dev_dbg
crypto: cavium - Remove the individual encrypt/decrypt function for each algorithm
crypto: cavium - Add more algorithms

Gilad Ben-Yossef (2):
crypto: tcrypt - don't disable irqs and wait
crypto: testmgr - use consistent format for errors

Harsh Jain (9):
crypto: chcr - Pass lcb bit setting to firmware
crypto: chcr - Fix fallback key setting
crypto: chcr - Return correct error code
crypto: chcr - Avoid changing request structure
crypto: chcr - Add ctr mode and process large sg entries for cipher
chcr - Add debug counters
MAINTAINERS: Add maintainer for chelsio crypto driver
crypto: chcr - Ensure Destination sg entry size less than 2k
crypto: chcr - Select device in Round Robin fashion

Herbert Xu (2):
crypto: testmgr - Reenable sha1/aes in FIPS mode
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Horia Geantă (2):
crypto: caam - fix gfp allocation flags (part I)
crypto: caam - fix gfp allocation flags (part II)

Igal Liberman (2):
crypto: inside-secure - enable single WR in DSE configuration
crypto: inside-secure - optimize DSE bufferability control

Jason A. Donenfeld (1):
crypto: rsa-pkcs1pad - use constant time memory comparison for MACs

Kamil Konieczny (1):
crypto: doc - Fixed bugs, added example usage of calc_hash().

Karim Eshapa (1):
crypto: algapi - Use pr_err common logging style.

Martin Hicks (1):
crypto: talitos - Extend max key length for SHA384/512-HMAC and AEAD

Matthias Kaehlcke (1):
crypto: rng - Remove unused function __crypto_rng_cast()

Ofer Heifetz (1):
crypto: inside-secure - align the cipher and hash send functions

Radu Alexe (3):
crypto: caam - incapsulate dropping leading zeros into function
crypto: caam - add support for RSA key form 2
crypto: caam - add support for RSA key form 3

Rick Altherr (2):
dt-bindings: timeriomem_rng: Add entropy quality property
hw_random: timeriomem_rng: Allow setting RNG quality from platform data

Ryder Lee (2):
crypto: mediatek - remove redundant clock setting
dt-bindings: crypto: remove mediatek ethif clock

Sabrina Dubroca (7):
crypto: aesni - make non-AVX AES-GCM work with any aadlen
crypto: aesni - make non-AVX AES-GCM work with all valid auth_tag_len
crypto: aesni - make AVX AES-GCM work with any aadlen
crypto: aesni - make AVX AES-GCM work with all valid auth_tag_len
crypto: aesni - make AVX2 AES-GCM work with any aadlen
crypto: aesni - make AVX2 AES-GCM work with all valid auth_tag_len
crypto: aesni - add generic gcm(aes)

Sean Wang (3):
dt-bindings: rng: add MediaTek MT7622 Hardware Random Generator bindings
hwrng: mtk - add runtime PM support
MAINTAINERS: add entry for MediaTek Random Number Generator

Srikanth Jampala (3):
crypto: cavium - Add support for CNN55XX adapters.
crypto: cavium - Add debugfs support in CNN55XX driver.
crypto: cavium - Register the CNN55XX supported crypto algorithms.

Stephan Mueller (3):
crypto: drbg - Fixes panic in wait_for_completion call
crypto: testmgr - add testvector for pkcs1pad(rsa)
crypto: drbg - Fixes panic in wait_for_completion call

Tero Kristo (13):
crypto: omap-aes - drop unused flags attribute from omap_aes_ctx
crypto: omap-aes - fix context handling for multiple cores
crypto: omap-des - add check for weak keys
crypto: omap-des - use runtime_pm autosuspend for clock handling
crypto: omap - add base support library for common routines
crypto: omap-des - use base omap crypto support library
crypto: omap-aes - use base omap crypto support library
crypto: omap-aes - move definitions over to a separate header file
crypto: omap-aes - export some AES driver functionality locally
crypto: omap-aes - Add support for GCM mode
crypto: omap-sham - buffer handling fixes for hashing later
crypto: omap-sham - fix closing of hash with separate finalize call
crypto: omap-sham - force word alignment on the xmit-buf also

Tudor Ambarus (1):
crypto: caam - avoid kzalloc(0) in caam_read_raw_data

Tudor-Dan Ambarus (17):
crypto: kpp, (ec)dh - fix typos
crypto: ecc - remove unused function arguments
crypto: ecc - remove unnecessary casts
crypto: ecc - rename ecdh_make_pub_key()
crypto: dh - fix memleak in setkey
crypto: kpp - assume key is already set in maxsize
crypto: dh - comply with crypto_kpp_maxsize()
crypto: ecdh - comply with crypto_kpp_maxsize()
crypto: qat - comply with crypto_kpp_maxsize()
crypto: akcipher - assume key is already set in maxsize
crypto: rsa - comply with crypto_akcipher_maxsize()
crypto: caampkc - comply with crypto_akcipher_maxsize()
crypto: qat - comply with crypto_akcipher_maxsize()
crypto: pkcs1pad - comply with crypto_akcipher_maxsize()
crypto: ecdh - add privkey generation support
crypto: testmgr - add genkey kpp test
crypto: vmx - remove unnecessary check

pjambhlekar (1):
crypto: ccp - return NULL instead of 0

Documentation/crypto/api-samples.rst | 38 +-
Documentation/crypto/userspace-if.rst | 2 +-
.../bindings/crypto/inside-secure-safexcel.txt | 29 +
.../devicetree/bindings/crypto/mediatek-crypto.txt | 8 +-
Documentation/devicetree/bindings/rng/mtk-rng.txt | 4 +-
.../devicetree/bindings/rng/timeriomem_rng.txt | 7 +
MAINTAINERS | 18 +
arch/arm/crypto/aes-ce-glue.c | 6 +-
arch/arm/crypto/crc32-ce-glue.c | 6 +
arch/arm/crypto/ghash-ce-glue.c | 6 +-
arch/arm/crypto/sha1-ce-glue.c | 5 +-
arch/arm/crypto/sha2-ce-glue.c | 5 +-
arch/arm64/crypto/sha1-ce-core.S | 6 +-
arch/arm64/crypto/sha1-ce-glue.c | 11 +-
arch/arm64/crypto/sha2-ce-core.S | 6 +-
arch/arm64/crypto/sha2-ce-glue.c | 13 +-
arch/x86/crypto/aes-x86_64-asm_64.S | 47 +-
arch/x86/crypto/aesni-intel_asm.S | 231 ++++-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 283 +++--
arch/x86/crypto/aesni-intel_glue.c | 208 +++-
arch/x86/crypto/glue_helper.c | 3 -
arch/x86/crypto/sha512-mb/sha512_mb.c | 7 +-
crypto/Kconfig | 1 +
crypto/Makefile | 9 +-
crypto/aes_ti.c | 2 +-
crypto/algapi.c | 2 +-
crypto/asymmetric_keys/x509_cert_parser.c | 1 +
crypto/crypto_engine.c | 23 +-
crypto/dh.c | 9 +-
crypto/dh_helper.c | 4 +-
crypto/drbg.c | 1 +
crypto/ecc.c | 88 +-
crypto/ecc.h | 41 +-
crypto/ecdh.c | 29 +-
crypto/ecdh_helper.c | 4 +-
crypto/hmac.c | 5 +-
crypto/rng.c | 5 -
crypto/rsa-pkcs1pad.c | 12 +-
crypto/rsa.c | 4 +-
crypto/tcrypt.c | 4 -
crypto/testmgr.c | 128 ++-
crypto/testmgr.h | 143 +++
drivers/char/hw_random/mtk-rng.c | 42 +
drivers/char/hw_random/omap3-rom-rng.c | 11 +-
drivers/char/hw_random/timeriomem-rng.c | 7 +
drivers/crypto/Kconfig | 30 +
drivers/crypto/Makefile | 6 +-
drivers/crypto/amcc/crypto4xx_core.c | 1 +
drivers/crypto/bcm/cipher.c | 7 +-
drivers/crypto/caam/caamalg.c | 10 +-
drivers/crypto/caam/caamalg_qi.c | 10 +-
drivers/crypto/caam/caamhash.c | 32 +-
drivers/crypto/caam/caampkc.c | 472 ++++++++-
drivers/crypto/caam/caampkc.h | 58 ++
drivers/crypto/caam/jr.c | 2 +-
drivers/crypto/caam/pdb.h | 62 ++
drivers/crypto/caam/pkc_desc.c | 36 +
drivers/crypto/cavium/cpt/cptvf_algs.c | 234 +++--
drivers/crypto/cavium/cpt/cptvf_algs.h | 7 +
drivers/crypto/cavium/cpt/cptvf_main.c | 2 +-
drivers/crypto/cavium/nitrox/Kconfig | 21 +
drivers/crypto/cavium/nitrox/Makefile | 8 +
drivers/crypto/cavium/nitrox/nitrox_algs.c | 457 ++++++++
drivers/crypto/cavium/nitrox/nitrox_common.h | 42 +
drivers/crypto/cavium/nitrox/nitrox_csr.h | 1084 +++++++++++++++++++
drivers/crypto/cavium/nitrox/nitrox_dev.h | 179 ++++
drivers/crypto/cavium/nitrox/nitrox_hal.c | 401 +++++++
drivers/crypto/cavium/nitrox/nitrox_isr.c | 467 +++++++++
drivers/crypto/cavium/nitrox/nitrox_lib.c | 210 ++++
drivers/crypto/cavium/nitrox/nitrox_main.c | 640 ++++++++++++
drivers/crypto/cavium/nitrox/nitrox_req.h | 445 ++++++++
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 735 +++++++++++++
drivers/crypto/ccp/Makefile | 3 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 5 +-
drivers/crypto/ccp/ccp-debugfs.c | 344 ++++++
drivers/crypto/ccp/ccp-dev-v5.c | 28 +-
drivers/crypto/ccp/ccp-dev.c | 3 +-
drivers/crypto/ccp/ccp-dev.h | 20 +
drivers/crypto/ccp/ccp-platform.c | 4 +-
drivers/crypto/chelsio/chcr_algo.c | 1096 ++++++++++++++++----
drivers/crypto/chelsio/chcr_algo.h | 30 +-
drivers/crypto/chelsio/chcr_core.c | 56 +-
drivers/crypto/chelsio/chcr_core.h | 5 +-
drivers/crypto/chelsio/chcr_crypto.h | 25 +-
drivers/crypto/img-hash.c | 12 +-
drivers/crypto/inside-secure/Makefile | 2 +
drivers/crypto/inside-secure/safexcel.c | 926 +++++++++++++++++
drivers/crypto/inside-secure/safexcel.h | 574 ++++++++++
drivers/crypto/inside-secure/safexcel_cipher.c | 561 ++++++++++
drivers/crypto/inside-secure/safexcel_hash.c | 1052 +++++++++++++++++++
drivers/crypto/inside-secure/safexcel_ring.c | 157 +++
drivers/crypto/ixp4xx_crypto.c | 3 +-
drivers/crypto/marvell/hash.c | 5 +-
drivers/crypto/mediatek/mtk-platform.c | 11 +-
drivers/crypto/mediatek/mtk-platform.h | 2 -
drivers/crypto/mediatek/mtk-sha.c | 5 +-
drivers/crypto/mv_cesa.c | 5 +-
drivers/crypto/n2_core.c | 4 +-
drivers/crypto/omap-aes-gcm.c | 408 ++++++++
drivers/crypto/omap-aes.c | 461 ++++----
drivers/crypto/omap-aes.h | 214 ++++
drivers/crypto/omap-crypto.c | 184 ++++
drivers/crypto/omap-crypto.h | 37 +
drivers/crypto/omap-des.c | 138 +--
drivers/crypto/omap-sham.c | 38 +-
drivers/crypto/qat/qat_common/adf_aer.c | 15 +-
drivers/crypto/qat/qat_common/qat_algs.c | 5 +-
drivers/crypto/qat/qat_common/qat_asym_algs.c | 8 +-
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 213 ++--
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 237 +++--
drivers/crypto/sunxi-ss/sun4i-ss-hash.c | 138 +--
drivers/crypto/sunxi-ss/sun4i-ss.h | 34 +-
drivers/crypto/talitos.c | 7 +-
drivers/crypto/vmx/aes.c | 7 +-
drivers/crypto/vmx/aes_cbc.c | 7 +-
drivers/crypto/vmx/aes_ctr.c | 7 +-
drivers/crypto/vmx/aes_xts.c | 7 +-
drivers/net/ethernet/chelsio/cxgb4/cxgb4.h | 1 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_debugfs.c | 35 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c | 1 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.h | 10 +
include/crypto/akcipher.h | 11 +-
include/crypto/dh.h | 4 +-
include/crypto/ecdh.h | 4 +-
include/crypto/engine.h | 1 +
include/crypto/hmac.h | 7 +
include/crypto/kpp.h | 15 +-
include/linux/timeriomem-rng.h | 3 +
128 files changed, 12842 insertions(+), 1535 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-07-05 20:02:59

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Update for 4.13

On Wed, Jul 5, 2017 at 6:01 AM, Herbert Xu <[email protected]> wrote:
>
> Drivers:
>
> - Add support for CNN55XX adapters in cavium.

Grr. I noticed this too late to fix it in the merge.

That stupid CNN55XX driver was added with a default of "m"?

WTF? Hell no. We don't add random new drivers and default them on -
and we do so even less when they are for very unusual hardware.

Linus

2017-07-06 02:19:47

by Herbert Xu

[permalink] [raw]
Subject: Re: Crypto Update for 4.13

On Wed, Jul 05, 2017 at 01:02:59PM -0700, Linus Torvalds wrote:
>
> That stupid CNN55XX driver was added with a default of "m"?
>
> WTF? Hell no. We don't add random new drivers and default them on -
> and we do so even less when they are for very unusual hardware.

Sorry, I'll make sure the default gets removed.
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-07-14 14:18:55

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.13

Hi Linus:

This push fixes the following issues:

- New compiler warnings in cavium.
- Set post-op IV properly in caam (this fixes chaining).
- Fix potential use-after-free in atmel in case of EBUSY.
- Fix sleeping in softirq path in chcr.
- Disable buggy sha1-avx2 driver (may overread and page fault).
- Fix use-after-free on signals in caam.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Colin Ian King (1):
crypto: cavium - make several functions static

David Gstir (1):
crypto: caam - properly set IV after {en,de}crypt

Gilad Ben-Yossef (1):
crypto: atmel - only treat EBUSY as transient if backlog

Harsh Jain (1):
crypto: chcr - Avoid algo allocation in softirq.

Herbert Xu (2):
crypto: sha1-ssse3 - Disable avx2

Horia Geantă (1):
crypto: caam - fix signals handling

arch/x86/crypto/sha1_ssse3_glue.c | 2 +-
crypto/af_alg.c | 2 +-
drivers/crypto/atmel-sha.c | 4 +++-
drivers/crypto/caam/caamalg.c | 20 ++++++++++++++++++--
drivers/crypto/caam/caamhash.c | 2 +-
drivers/crypto/caam/key_gen.c | 2 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 8 ++++----
drivers/crypto/chelsio/chcr_algo.c | 23 +++++++++++++++--------
drivers/crypto/chelsio/chcr_crypto.h | 1 +
9 files changed, 45 insertions(+), 19 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-07-28 08:50:12

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.13

Hi Linus:

This push fixes the following issues:

- Remove broken dt bindings in inside-secure.
- Fix authencesn crash when used with digest_null.
- Fix cavium/nitrox firmware path.
- Fix SHA3 failure in brcm.
- Fix Kconfig dependency for brcm.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine Tenart (2):
crypto: inside-secure - do not parse the dma mask from dt
Documentation/bindings: crypto: remove the dma-mask property

Herbert Xu (1):
crypto: authencesn - Fix digest_null crash

Srikanth Jampala (1):
crypto: cavium/nitrox - Change in firmware path.

raveendra padasalagi (2):
crypto: brcm - Fix SHA3-512 algorithm failure
crypto: brcm - remove BCM_PDC_MBOX dependency in Kconfig

.../devicetree/bindings/crypto/inside-secure-safexcel.txt | 2 --
crypto/authencesn.c | 5 +++++
drivers/crypto/Kconfig | 2 +-
drivers/crypto/bcm/spu2.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_main.c | 3 ++-
drivers/crypto/inside-secure/safexcel.c | 5 +----
6 files changed, 10 insertions(+), 8 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-08-09 12:04:24

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.13

Hi Linus:

This push fixes two regressions in the inside-secure driver with
respect to hmac(sha1).


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine Tenart (2):
crypto: inside-secure - fix invalidation check in hmac_sha1_setkey
crypto: inside-secure - fix the sha state length in hmac_sha1_setkey

drivers/crypto/inside-secure/safexcel_hash.c | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-08-14 09:44:02

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.13

Hi Linus:

This push fixes an error path bug in ixp4xx as well as a read
overrun in sha1-avx2.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
crypto: ixp4xx - Fix error handling path in 'aead_perform()'

[email protected] (1):
crypto: x86/sha1 - Fix reads beyond the number of blocks passed

arch/x86/crypto/sha1_avx2_x86_64_asm.S | 67 +++++++++++++++++---------------
arch/x86/crypto/sha1_ssse3_glue.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 6 +--
3 files changed, 40 insertions(+), 35 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-09-01 07:53:58

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.13

Hi Linus:

This push fixes the following issues:

- Regression in chacha20 handling of chunked input.
- Crash in algif_skcipher when used with async io.
- Potential bogus pointer dereference in lib/mpi.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (2):
crypto: chacha20 - fix handling of chunked input
crypto: testmgr - add chunked test cases for chacha20

Stephan Mueller (2):
lib/mpi: kunmap after finishing accessing buffer
crypto: algif_skcipher - only call put_page on referenced and used pages

crypto/algif_skcipher.c | 9 +++++++--
crypto/chacha20_generic.c | 9 +++++++--
crypto/testmgr.h | 7 +++++++
lib/mpi/mpicoder.c | 4 +++-
4 files changed, 24 insertions(+), 5 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-09-04 10:12:25

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.14

Hi Linus:

Here is the crypto update for 4.14:

API:

- Defer scompress scratch buffer allocation to first use.
- Add __crypto_xor that takes separte src and dst operands.
- Add ahash multiple registration interface.
- Revamped aead/skcipher algif code to fix async IO properly.

Drivers:

- Add non-SIMD fallback code path on ARM for SVE.
- Add AMD Security Processor framework for ccp.
- Add support for RSA in ccp.
- Add XTS-AES-256 support for CCP version 5.
- Add support for PRNG in sun4i-ss.
- Add support for DPAA2 in caam.
- Add ARTPEC crypto support.
- Add Freescale RNGC hwrng support.
- Add Microchip / Atmel ECC driver.
- Add support for STM32 HASH module.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (21):
crypto: scompress - don't sleep with preemption disabled
crypto: scompress - free partially allocated scratch buffers on failure
crypto: scompress - defer allocation of scratch buffer to first use
crypto: algapi - use separate dst and src operands for __crypto_xor()
crypto: algapi - make crypto_xor() take separate dst and src arguments
crypto: arm64/ghash-ce - add non-SIMD scalar fallback
crypto: arm64/crct10dif - add non-SIMD generic fallback
crypto: arm64/crc32 - add non-SIMD scalar fallback
crypto: arm64/sha1-ce - add non-SIMD generic fallback
crypto: arm64/sha2-ce - add non-SIMD scalar fallback
crypto: arm64/aes-ce-cipher - match round key endianness with generic code
crypto: arm64/aes-ce-cipher: add non-SIMD generic fallback
crypto: arm64/aes-ce-ccm: add non-SIMD generic fallback
crypto: arm64/aes-blk - add a non-SIMD fallback for synchronous CTR
crypto: arm64/chacha20 - take may_use_simd() into account
crypto: arm64/aes-bs - implement non-SIMD fallback for AES-CTR
crypto: arm64/gcm - implement native driver using v8 Crypto Extensions
crypto: arm/ghash - add NEON accelerated fallback for vmull.p64
crypto: arm64/ghash - add NEON accelerated fallback for 64-bit PMULL
crypto: arm/aes - avoid expanded lookup tables in the final round
crypto: arm64/aes - avoid expanded lookup tables in the final round

Arnd Bergmann (3):
crypto: serpent - improve __serpent_setkey with UBSAN
crypto: ccp - avoid uninitialized variable warning
crypto: ccp - select CONFIG_CRYPTO_RSA

Arvind Yadav (2):
crypto: sahara - make of_device_ids const
crypto: sahara - constify platform_device_id

Brijesh Singh (6):
crypto: ccp - Use devres interface to allocate PCI/iomap and cleanup
crypto: ccp - Introduce the AMD Secure Processor device
crypto: ccp - Abstract interrupt registeration
crypto: ccp - rename ccp driver initialize files as sp device
crypto: ccp - remove ccp_present() check from device initialize
crypto: ccp - remove duplicate module version and author entry

Chris Gorman (1):
crypto: geode-aes - fixed coding style warnings and error

Christophe Jaillet (2):
crypto: inside-secure - fix an error handling path in safexcel_probe()
crypto: cavium/nitrox - Fix an error handling path in 'nitrox_probe()'

Colin Ian King (2):
crypto: qat - fix spelling mistake: "runing" -> "running"
Crypto: atmel-ecc: Make a couple of local functions static

Corentin LABBE (2):
crypto: sun4i-ss - support the Security System PRNG
crypto: cavium - add release_firmware to all return case

Fabio Estevam (1):
crypto: caam - Remove unused dentry members

Gary R Hook (12):
crypto: ccp - Fix some line spacing
crypto: ccp - Change all references to use the JOB ID macro
crypto: ccp - Provide an error path for debugfs setup failure
crypto: ccp - Update copyright dates for 2017.
crypto: ccp - Fix base RSA function for version 5 CCPs
crypto: Add akcipher_set_reqsize() function
crypto: ccp - Add support for RSA on the CCP
csrypto: ccp - Expand RSA support for a v5 ccp
crypto: ccp - Fix XTS-AES-128 support on v5 CCPs
crypto: ccp - Add a call to xts_check_key()
crypto: ccp - Rework the unit-size check for XTS-AES
crypto: ccp - Add XTS-AES-256 support for CCP version 5

Gustavo A. R. Silva (11):
crypto: ccp - print error message on platform_get_irq failure
crypto: mediatek - fix error return code in mtk_crypto_probe()
crypto: mxc-scc - fix error code in mxc_scc_probe()
crypto: mxs-dcp - print error message on platform_get_irq failure
crypto: omap-aes - fix error return code in omap_aes_probe()
crypto: omap-des - fix error return code in omap_des_probe()
crypto: brcm - add NULL check on of_match_device() return value
crypto: omap-sham - remove unnecessary static in omap_sham_remove()
crypto: atmel-sha - remove unnecessary static in atmel_sha_remove()
crypto: atmel-tdes - remove unnecessary static in atmel_tdes_remove()
crypto: img-hash - remove unnecessary static in img_hash_remove()

Harald Freudenberger (2):
hwrng: use rng source with best quality
hwrng: remember rng chosen by user

Herbert Xu (1):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Horia Geantă (13):
crypto: caam/qi - fix typo in authenc alg driver name
crypto: caam/qi - fix compilation with DEBUG enabled
crypto: caam/qi - fix compilation with CONFIG_DEBUG_FORCE_WEAK_PER_CPU=y
crypto: caam/qi - properly set IV after {en,de}crypt
crypto: caam/qi - handle large number of S/Gs case
crypto: caam/qi - fix AD length endianness in S/G entry
crypto: caam/qi - explicitly set dma_ops
crypto: caam/qi - remove unused header sg_sw_sec4.h
crypto: caam/qi - lower driver verbosity
crypto: caam - remove unused sg_to_sec4_sg_len()
crypto: caam - clean-up in caam_init_rng()
crypto: caam/jr - add support for DPAA2 parts
crypto: tcrypt - remove AES-XTS-192 speed tests

Jason A. Donenfeld (1):
crypto: rng - ensure that the RNG is ready before using

Lars Persson (3):
dt-bindings: crypto: add ARTPEC crypto
crypto: axis - add ARTPEC-6/7 crypto accelerator driver
MAINTAINERS: Add ARTPEC crypto maintainer

Martin Kaiser (1):
hwrng: mx-rngc - add a driver for Freescale RNGC

Mogens Lauridsen (2):
crypto: sahara - Fix dma unmap direction
crypto: sahara - Remove leftover from previous used spinlock

Pan Bian (1):
crypto: ccp - use dma_mapping_error to check map error

PrasannaKumar Muralidharan (1):
hwrng: Kconfig - Correct help text about feeding entropy pool

Rabin Vincent (1):
crypto: hash - add crypto_(un)register_ahashes()

Rob Herring (1):
crypto: n2 - Convert to using %pOF instead of full_name

Stefan Agner (1):
lib/mpi: fix build with clang

Steffen Trumtrar (1):
Documentation: devicetree: add Freescale RNGC binding

Stephan Mueller (7):
crypto: algif_skcipher - overhaul memory management
crypto: algif_aead - overhaul memory management
crypto: algif - return error code when no data was processed
crypto: algif_aead - copy AAD from src to dst
crypto: af_alg - consolidation of duplicate code
crypto: algif_aead - fix comment regarding memory layout
crypto: af_alg - get_page upon reassignment to TX SGL

Tudor Ambarus (2):
crypto: caam - remove unused variables in caam_drv_private
crypto: caam - fix condition for the jump over key(s) command

Tudor-Dan Ambarus (5):
crypto: kpp - add get/set_flags helpers
crypto: atmel-ecc - introduce Microchip / Atmel ECC driver
MAINTAINERS: add a maintainer for Microchip / Atmel ECC driver
crypto: ecdh - fix concurrency on shared secret and pubkey
crypto: atmel-ecc - fix signed integer to u8 assignment

Xulin Sun (1):
crypto: caam - free qman_fq after kill_fq

Zain Wang (3):
crypto: rockchip - move the crypto completion from interrupt context
crypto: rockchip - return the err code when unable dequeue the crypto request
crypto: rockchip - Don't dequeue the request when device is busy

Zeng, Xin (1):
crypto: virtio - Refacotor virtio_crypto driver for new virito crypto services

[email protected] (5):
crypto: stm32 - CRC use relaxed function
crypto: stm32 - solve crc issue during unbind
crypto: stm32 - Rename module to use generic crypto
dt-bindings: Document STM32 HASH bindings
crypto: stm32 - Support for STM32 HASH module

raveendra padasalagi (1):
crypto: brcm - Support more FlexRM rings than SPU engines.

.../devicetree/bindings/crypto/artpec6-crypto.txt | 16 +
.../devicetree/bindings/crypto/atmel-crypto.txt | 13 +
.../devicetree/bindings/crypto/st,stm32-hash.txt | 30 +
Documentation/devicetree/bindings/rng/imx-rngc.txt | 21 +
MAINTAINERS | 7 +
arch/arm/crypto/Kconfig | 5 +-
arch/arm/crypto/aes-ce-glue.c | 4 +-
arch/arm/crypto/aes-cipher-core.S | 88 +-
arch/arm/crypto/aes-neonbs-glue.c | 5 +-
arch/arm/crypto/ghash-ce-core.S | 234 +-
arch/arm/crypto/ghash-ce-glue.c | 24 +-
arch/arm64/crypto/Kconfig | 22 +-
arch/arm64/crypto/aes-ce-ccm-core.S | 30 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 174 +-
arch/arm64/crypto/aes-ce-cipher.c | 55 +-
arch/arm64/crypto/aes-ce.S | 12 +-
arch/arm64/crypto/aes-cipher-core.S | 152 +-
arch/arm64/crypto/aes-ctr-fallback.h | 53 +
arch/arm64/crypto/aes-glue.c | 63 +-
arch/arm64/crypto/aes-neonbs-glue.c | 53 +-
arch/arm64/crypto/chacha20-neon-glue.c | 5 +-
arch/arm64/crypto/crc32-ce-glue.c | 11 +-
arch/arm64/crypto/crct10dif-ce-glue.c | 13 +-
arch/arm64/crypto/ghash-ce-core.S | 401 ++-
arch/arm64/crypto/ghash-ce-glue.c | 517 +++-
arch/arm64/crypto/sha1-ce-glue.c | 18 +-
arch/arm64/crypto/sha2-ce-glue.c | 30 +-
arch/arm64/crypto/sha256-glue.c | 1 +
arch/sparc/crypto/aes_glue.c | 3 +-
arch/x86/crypto/aesni-intel_glue.c | 4 +-
arch/x86/crypto/blowfish_glue.c | 3 +-
arch/x86/crypto/cast5_avx_glue.c | 3 +-
arch/x86/crypto/des3_ede_glue.c | 3 +-
crypto/Kconfig | 2 +
crypto/af_alg.c | 691 +++++
crypto/ahash.c | 29 +
crypto/algapi.c | 25 +-
crypto/algif_aead.c | 864 ++----
crypto/algif_skcipher.c | 834 +----
crypto/ctr.c | 3 +-
crypto/ecdh.c | 51 +-
crypto/pcbc.c | 12 +-
crypto/rng.c | 6 +-
crypto/scompress.c | 55 +-
crypto/serpent_generic.c | 77 +-
crypto/tcrypt.c | 8 +-
drivers/char/hw_random/Kconfig | 20 +-
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/core.c | 42 +-
drivers/char/hw_random/imx-rngc.c | 331 ++
drivers/crypto/Kconfig | 49 +-
drivers/crypto/Makefile | 4 +-
drivers/crypto/atmel-ecc.c | 781 +++++
drivers/crypto/atmel-ecc.h | 128 +
drivers/crypto/atmel-sha.c | 2 +-
drivers/crypto/atmel-tdes.c | 2 +-
drivers/crypto/axis/Makefile | 1 +
drivers/crypto/axis/artpec6_crypto.c | 3192 ++++++++++++++++++++
drivers/crypto/bcm/cipher.c | 114 +-
drivers/crypto/bcm/cipher.h | 13 +-
drivers/crypto/caam/caamalg.c | 66 +-
drivers/crypto/caam/caamalg_desc.c | 5 +-
drivers/crypto/caam/caamalg_qi.c | 55 +-
drivers/crypto/caam/caamhash.c | 7 +-
drivers/crypto/caam/caamrng.c | 6 +-
drivers/crypto/caam/ctrl.c | 127 +-
drivers/crypto/caam/ctrl.h | 2 +
drivers/crypto/caam/error.c | 40 +
drivers/crypto/caam/error.h | 4 +
drivers/crypto/caam/intern.h | 11 -
drivers/crypto/caam/jr.c | 7 +-
drivers/crypto/caam/qi.c | 30 +-
drivers/crypto/caam/qi.h | 3 +
drivers/crypto/caam/regs.h | 1 +
drivers/crypto/caam/sg_sw_qm2.h | 81 +
drivers/crypto/caam/sg_sw_sec4.h | 43 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 13 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 4 +-
drivers/crypto/ccp/Kconfig | 22 +-
drivers/crypto/ccp/Makefile | 7 +-
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 2 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 96 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 2 +-
drivers/crypto/ccp/ccp-crypto-main.c | 21 +-
drivers/crypto/ccp/ccp-crypto-rsa.c | 299 ++
drivers/crypto/ccp/ccp-crypto-sha.c | 2 +-
drivers/crypto/ccp/ccp-crypto.h | 36 +-
drivers/crypto/ccp/ccp-debugfs.c | 15 +-
drivers/crypto/ccp/ccp-dev-v3.c | 20 +-
drivers/crypto/ccp/ccp-dev-v5.c | 28 +-
drivers/crypto/ccp/ccp-dev.c | 134 +-
drivers/crypto/ccp/ccp-dev.h | 30 +-
drivers/crypto/ccp/ccp-dmaengine.c | 2 +-
drivers/crypto/ccp/ccp-ops.c | 133 +-
drivers/crypto/ccp/ccp-pci.c | 356 ---
drivers/crypto/ccp/ccp-platform.c | 293 --
drivers/crypto/ccp/sp-dev.c | 277 ++
drivers/crypto/ccp/sp-dev.h | 133 +
drivers/crypto/ccp/sp-pci.c | 276 ++
drivers/crypto/ccp/sp-platform.c | 256 ++
drivers/crypto/geode-aes.c | 17 +-
drivers/crypto/img-hash.c | 2 +-
drivers/crypto/inside-secure/safexcel.c | 5 +-
drivers/crypto/mediatek/mtk-platform.c | 2 +-
drivers/crypto/mxc-scc.c | 4 +-
drivers/crypto/mxs-dcp.c | 8 +-
drivers/crypto/n2_core.c | 60 +-
drivers/crypto/omap-aes.c | 1 +
drivers/crypto/omap-des.c | 3 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/rockchip/rk3288_crypto.c | 74 +-
drivers/crypto/rockchip/rk3288_crypto.h | 15 +-
drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 103 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 119 +-
drivers/crypto/sahara.c | 14 +-
drivers/crypto/stm32/Kconfig | 19 +-
drivers/crypto/stm32/Makefile | 4 +-
drivers/crypto/stm32/stm32-hash.c | 1575 ++++++++++
drivers/crypto/stm32/stm32_crc32.c | 17 +-
drivers/crypto/sunxi-ss/Makefile | 1 +
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 30 +
drivers/crypto/sunxi-ss/sun4i-ss-prng.c | 56 +
drivers/crypto/sunxi-ss/sun4i-ss.h | 11 +
drivers/crypto/virtio/virtio_crypto_algs.c | 109 +-
drivers/crypto/virtio/virtio_crypto_common.h | 22 +-
drivers/crypto/virtio/virtio_crypto_core.c | 37 +-
drivers/crypto/vmx/aes_ctr.c | 3 +-
drivers/md/dm-crypt.c | 11 +-
include/crypto/algapi.h | 23 +-
include/crypto/if_alg.h | 170 ++
include/crypto/internal/akcipher.h | 6 +
include/crypto/internal/hash.h | 2 +
include/crypto/kpp.h | 10 +
include/linux/ccp.h | 11 +-
lib/mpi/longlong.h | 24 +-
136 files changed, 11758 insertions(+), 3169 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-09-22 08:44:01

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.14

Hi Linus:

This push fixes the following issues:

- Fix compiler warnings in inside-secure.
- Fix LS1021A support in caam.
- Avoid using RBP in x86 crypto code.
- Fix bug in talitos that prevents hashing with algif.
- Fix bugs talitos hashing code that cause incorrect hash result.
- Fix memory freeing path bug in drbg.
- Fix af_alg crash when two SG lists are chained.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Arnd Bergmann (1):
crypto: inside-secure - fix gcc-4.9 warnings

Horia Geantă (1):
crypto: caam - fix LS1021A support on ARMv7 multiplatform kernel

Josh Poimboeuf (12):
crypto: x86/blowfish - Fix RBP usage
crypto: x86/camellia - Fix RBP usage
crypto: x86/cast5 - Fix RBP usage
crypto: x86/cast6 - Fix RBP usage
crypto: x86/des3_ede - Fix RBP usage
crypto: x86/sha1-avx2 - Fix RBP usage
crypto: x86/sha1-ssse3 - Fix RBP usage
crypto: x86/sha256-avx - Fix RBP usage
crypto: x86/sha256-avx2 - Fix RBP usage
crypto: x86/sha256-ssse3 - Fix RBP usage
crypto: sha512-avx2 - Fix RBP usage
crypto: x86/twofish - Fix RBP usage

LEROY Christophe (3):
crypto: talitos - fix sha224
crypto: talitos - fix hashing
crypto: talitos - Don't provide setkey for non hmac hashing algs.

Stephan Mueller (2):
crypto: drbg - fix freeing of resources
crypto: af_alg - update correct dst SGL entry

arch/x86/crypto/blowfish-x86_64-asm_64.S | 48 ++++++++-------
arch/x86/crypto/camellia-x86_64-asm_64.S | 26 ++++----
arch/x86/crypto/cast5-avx-x86_64-asm_64.S | 47 +++++++++------
arch/x86/crypto/cast6-avx-x86_64-asm_64.S | 50 +++++++++++-----
arch/x86/crypto/des3_ede-asm_64.S | 15 +++--
arch/x86/crypto/sha1_avx2_x86_64_asm.S | 4 +-
arch/x86/crypto/sha1_ssse3_asm.S | 11 ++--
arch/x86/crypto/sha256-avx-asm.S | 15 +++--
arch/x86/crypto/sha256-avx2-asm.S | 22 +++----
arch/x86/crypto/sha256-ssse3-asm.S | 15 +++--
arch/x86/crypto/sha512-avx2-asm.S | 75 ++++++++++++------------
arch/x86/crypto/twofish-avx-x86_64-asm_64.S | 12 ++--
crypto/af_alg.c | 4 +-
crypto/drbg.c | 8 +--
drivers/crypto/caam/Kconfig | 5 +-
drivers/crypto/caam/ctrl.c | 19 +++---
drivers/crypto/caam/regs.h | 59 +++++++++----------
drivers/crypto/inside-secure/safexcel_cipher.c | 2 +-
drivers/crypto/inside-secure/safexcel_hash.c | 2 +-
drivers/crypto/talitos.c | 9 +--
20 files changed, 236 insertions(+), 212 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-10-12 10:51:01

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.14

Hi Linus:

This push fixes the following issues:

- Crashes in skcipher/shash from zero-length input.
- Fix softirq GFP_KERNEL allocation in shash_setkey_unaligned.
- Error path bug in xts create function.
- Compiler warning regressions in axis and stm32.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Arnd Bergmann (2):
crypto: axis - hide an unused variable
crypto: stm32 - Try to fix hash padding

Christophe Jaillet (1):
crypto: xts - Fix an error handling path in 'create()'

Herbert Xu (2):
crypto: skcipher - Fix crash on zero-length input
crypto: shash - Fix zero-length shash ahash digest crash

Jia-Ju Bai (1):
crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned

crypto/shash.c | 10 ++++++----
crypto/skcipher.c | 17 +++++++++++------
crypto/xts.c | 6 ++++--
drivers/crypto/axis/artpec6_crypto.c | 4 ++--
drivers/crypto/stm32/stm32-hash.c | 15 +++++++++------
5 files changed, 32 insertions(+), 20 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-10-30 07:21:18

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.14

Hi Linus:

This push fixes an objtool regression.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Jason A. Donenfeld (1):
crypto: x86/chacha20 - satisfy stack validation 2.0

arch/x86/crypto/chacha20-avx2-x86_64.S | 4 ++--
arch/x86/crypto/chacha20-ssse3-x86_64.S | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-11-06 06:38:12

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.14

Hi Linus:

This push fixes an unaligned panic in x86/sha-mb and a bug in ccm
that triggers with certain underlying implementations.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Andrey Ryabinin (2):
crypto: x86/sha256-mb - fix panic due to unaligned access
crypto: x86/sha1-mb - fix panic due to unaligned access

Romain Izard (1):
crypto: ccm - preserve the IV buffer

arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 12 ++++++------
arch/x86/crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S | 12 ++++++------
crypto/ccm.c | 4 +++-
3 files changed, 15 insertions(+), 13 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-11-13 07:44:02

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.15

Hi Linus:

Here is the crypto update for 4.15:

API:

- Disambiguate EBUSY when queueing crypto request by adding ENOSPC.
This change touches code outside the crypto API.
- Reset settings when empty string is written to rng_current.

Algorithms:

- Add OSCCA SM3 secure hash.

Drivers:

- Remove old mv_cesa driver (replaced by marvell/cesa).
- Enable rfc3686/ecb/cfb/ofb AES in crypto4xx.
- Add ccm/gcm AES in crypto4xx.
- Add support for BCM7278 in iproc-rng200.
- Add hash support on Exynos in s5p-sss.
- Fix fallback-induced error in vmx.
- Fix output IV in atmel-aes.
- Fix empty GCM hash in mediatek.

Others:

- Fix DoS potential in lib/mpi.
- Fix potential out-of-order issues with padata.

Please note that there may be a conflict with the tips tree due
to the timer_setup patch being applied in both cryptodev and
the tips tree. The version in the tips tree also touchs the
mv_cesa driver which just happens to have been removed in this
cycle in cryptodev. Any changes to mv_cesa may be safely discarded.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Allen (1):
crypto: omap - return -ENOMEM on allocation failure.

Arnd Bergmann (1):
crypto: axis - hide an unused variable

Arvind Yadav (11):
crypto: nx - constify vio_device_id
crypto: nx-842 - constify vio_device_id
hwrng: pseries - constify vio_device_id
crypto: padlock-aes - constify x86_cpu_id
crypto: padlock-sha - constify x86_cpu_id
hwrng: core - pr_err() strings should end with newlines
crypto: omap-aes - pr_err() strings should end with newlines
crypto: virtio - pr_err() strings should end with newlines
crypto: chelsio - pr_err() strings should end with newlines
crypto: qat - pr_err() strings should end with newlines
crypto: bcm - pr_err() strings should end with newlines

Boris BREZILLON (5):
crypto: marvell - Add a platform_device_id table
ARM: configs: Stop selecting the old CESA driver
crypto: marvell - Remove the old mv_cesa driver
crypto: marvell - Switch cipher algs to the skcipher interface
crypto: marvell - Add a NULL entry at the end of mv_cesa_plat_id_table[]

Christian Lamparter (25):
crypto: crypto4xx - remove bad list_del
crypto: crypto4xx - remove unused definitions and write-only variables
crypto: crypto4xx - set CRYPTO_ALG_KERN_DRIVER_ONLY flag
crypto: crypto4xx - remove extern statement before function declaration
crypto: crypto4xx - remove double assignment of pd_uinfo->state
crypto: crypto4xx - fix dynamic_sa_ctl's sa_contents declaration
crypto: crypto4xx - move and refactor dynamic_contents helpers
crypto: crypto4xx - enable AES RFC3686, ECB, CFB and OFB offloads
crypto: crypto4xx - refactor crypto4xx_copy_pkt_to_dst()
crypto: crypto4xx - replace crypto4xx_dev's scatter_buffer_size with constant
crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak
crypto: crypto4xx - pointer arithmetic overhaul
crypto: crypto4xx - wire up hmac_mc to hmac_muting
crypto: crypto4xx - fix off-by-one AES-OFB
crypto: crypto4xx - fix type mismatch compiler error
crypto: crypto4xx - increase context and scatter ring buffer elements
crypto: crypto4xx - add backlog queue support
crypto: crypto4xx - use the correct LE32 format for IV and key defs
crypto: crypto4xx - overhaul crypto4xx_build_pd()
crypto: crypto4xx - fix various warnings
crypto: crypto4xx - fix stalls under heavy load
crypto: crypto4xx - simplify sa and state context acquisition
crypto: crypto4xx - prepare for AEAD support
crypto: crypto4xx - add aes-ccm support
crypto: crypto4xx - add aes-gcm support

Christophe Jaillet (2):
crypto: lrw - Fix an error handling path in 'create()'
crypto: lrw - Check for incorrect cipher name

Colin Ian King (5):
crypto: aesni - make arrays aesni_simd_skciphers and aesni_simd_skciphers2 static
crypto: algboss - remove redundant setting of len to zero
crypto: cavium - clean up clang warning on unread variable offset
crypto: ccp - remove unused variable qim
crypto: qat - remove unused and redundant pointer vf_info

Corentin LABBE (14):
crypto: gcm - add GCM IV size constant
crypto: caam - Use GCM IV size constant
crypto: ccp - Use GCM IV size constant
crypto: nx - Use GCM IV size constant
crypto: atmel - Use GCM IV size constant
crypto: bcm - Use GCM IV size constant
crypto: mediatek - Use GCM IV size constant
crypto: chelsio - Use GCM IV size constant
crypto: omap - Use GCM IV size constant
crypto: gcm - Use GCM IV size constant
crypto: aesni - Use GCM IV size constant
crypto: stm32 - use of_device_get_match_data
crypto: omap - use of_device_get_match_data
crypto: bcm - use of_device_get_match_data

Eric Biggers (6):
crypto: dh - Fix double free of ctx->p
crypto: dh - Don't permit 'p' to be 0
crypto: dh - Don't permit 'key' or 'g' size longer than 'p'
crypto: qat - Clean up error handling in qat_dh_set_secret()
crypto: dh - Remove pointless checks for NULL 'p' and 'g'
lib/mpi: call cond_resched() from mpi_powm() loop

Florian Fainelli (2):
dt-bindings: rng: Document BCM7278 RNG200 compatible
hwrng: iproc-rng200 - Add support for BCM7278

Geliang Tang (1):
crypto: drop unnecessary return statements

Gilad Ben-Yossef (22):
crypto: sm3 - add OSCCA SM3 secure hash
crypto: sm3 - add SM3 test vectors
crypto: change transient busy return code to -ENOSPC
crypto: ccp - use -ENOSPC for transient busy indication
net: use -ENOSPC for transient busy indication
crypto: remove redundant backlog checks on EBUSY
crypto: marvell/cesa - remove redundant backlog checks on EBUSY
crypto: introduce crypto wait for async op
crypto: algif - move to generic async completion
crypto: move pub key to generic async completion
crypto: drbg - move to generic async completion
crypto: gcm - move to generic async completion
crypto: testmgr - move to generic async completion
fscrypt: move to generic async completion
dm: move dm-verity to generic async completion
cifs: move to generic async completion
ima: move to generic async completion
crypto: tcrypt - move to generic async completion
crypto: talitos - move to generic async completion
crypto: qce - move to generic async completion
crypto: mediatek - move to generic async completion
crypto: doc - adapt api sample to use async. op wait

Gustavo A. R. Silva (3):
crypto: tcrypt - mark expected switch fall-throughs in do_test()
crypto: qat - mark expected switch fall-throughs in qat_uclo
crypto: chcr - Replace _manual_ swap with swap macro

Harsh Jain (5):
crypto: gf128mul - The x8_ble multiplication functions
crypto: chelsio - Use x8_ble gf multiplication to calculate IV.
crypto: chelsio - Remove allocation of sg list to implement 2K limit of dsgl header
crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver
crypto: chelsio - Fix memory leak

Herbert Xu (1):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux

Himanshu Jha (3):
crypto: n2 - remove null check before kfree
crypto: inside-secure - remove null check before kfree
crypto: Use PTR_ERR_ZERO

Horia Geantă (4):
MAINTAINERS: update caam crypto driver maintainers list
crypto: caam/qi - abort algorithm setup on DPAA2 parts
crypto: caam - remove unneeded edesc zeroization
crypto: caam - remove unused param of ctx_map_to_sec4_sg()

Jim Quigley (1):
hwrng: virtio - Virtio RNG devices need to be re-registered after suspend/resume

Kamil Konieczny (3):
crypto: doc - clarify return values for async hash methods
crypto: s5p-sss - Change spaces to tabs
crypto: s5p-sss - Add HASH support for Exynos

Kees Cook (2):
hwrng: xgene - Convert timers to use timer_setup()
crypto: drivers - Convert timers to use timer_setup()

LEROY Christophe (18):
crypto: talitos - fix AEAD test failures
crypto: talitos - fix memory corruption on SEC2
crypto: talitos - fix setkey to check key weakness
crypto: talitos - fix AEAD for sha224 on non sha224 capable chips
crypto: talitos - fix use of sg_link_tbl_len
crypto: talitos - fix ctr-aes-talitos
crypto: talitos - zeroize the descriptor with memset()
crypto: talitos - declare local functions static
crypto: talitos - use devm_kmalloc()
crypto: talitos - use of_property_read_u32()
crypto: talitos - use devm_ioremap()
crypto: talitos - don't check the number of channels at each interrupt
crypto: talitos - remove to_talitos_ptr_len()
crypto: talitos - simplify tests in ipsec_esp()
crypto: talitos - DMA map key in setkey()
crypto: talitos - do hw_context DMA mapping outside the requests
crypto: talitos - chain in buffered data for ahash on SEC1
crypto: talitos - avoid useless copy

Lionel Debieve (1):
crypto: stm32/hash - Fix return issue on update

Mathias Krause (3):
padata: set cpu_index of unused CPUs to -1
padata: ensure the reorder timer callback runs on the correct CPU
padata: ensure padata_do_serial() runs on the correct CPU

Mikulas Patocka (1):
crypto: crc32-pclmul - remove useless relative addressing

Paulo Flabiano Smorigo (1):
crypto: vmx - Use skcipher for ctr fallback

PrasannaKumar Muralidharan (3):
hwrng: timeriomem - Remove 'max < 4' condition check
dt/bindings: exynos-rng: Move dt binding documentation to bindings/crypto
hwrng: core - Reset user selected rng by writing "" to rng_current

Radu Alexe (1):
crypto: caam - fix incorrect define

Robert Baronescu (1):
crypto: tcrypt - fix buffer lengths in test_aead_speed()

Romain Izard (2):
crypto: atmel-aes - properly set IV after {en,de}crypt
crypto: atmel-aes - Reset the controller before each use

Ryder Lee (1):
crypto: mediatek - Add empty messages check in GCM mode

Salvatore Benedetto (1):
MAINTAINERS: update maintainer for qat

Stephan Mueller (1):
crypto: keywrap - simplify code

Tudor-Dan Ambarus (7):
crypto: ecdh - return unsigned value for crypto_ecdh_key_len()
crypto: dh - return unsigned int for dh_data_size()
crypto: dh - return unsigned value for crypto_dh_key_len()
crypto: atmel - return appropriate error code
crypto: atmel - remove useless irq init
crypto: ecdh - remove empty exit()
crypto: atmel - remove empty functions

Yeshaswi M R Gowda (2):
crypto: chelsio - Remove unused parameter
crypto: chelsio - Check error code with IS_ERR macro

amd (2):
crypto: ccp - unmap pages and remove unmap objects in callback
crypto:ccp - invoke the DMA callback in a standard way

[email protected] (1):
crypto: stm32/hash - Remove uninitialized symbol

raveendra padasalagi (1):
crypto: brcm - Explicity ACK mailbox message

Documentation/crypto/api-samples.rst | 52 +-
.../{rng => crypto}/samsung,exynos-rng4.txt | 0
.../devicetree/bindings/rng/brcm,iproc-rng200.txt | 4 +-
MAINTAINERS | 5 +-
arch/arm/configs/dove_defconfig | 2 +-
arch/arm/configs/multi_v5_defconfig | 2 +-
arch/arm/configs/orion5x_defconfig | 2 +-
arch/x86/crypto/aesni-intel_glue.c | 10 +-
arch/x86/crypto/crc32-pclmul_asm.S | 17 +-
crypto/Kconfig | 11 +
crypto/Makefile | 1 +
crypto/af_alg.c | 27 -
crypto/ahash.c | 12 +-
crypto/algapi.c | 6 +-
crypto/algboss.c | 1 -
crypto/algif_aead.c | 8 +-
crypto/algif_hash.c | 30 +-
crypto/algif_skcipher.c | 9 +-
crypto/api.c | 13 +
crypto/asymmetric_keys/public_key.c | 28 +-
crypto/cryptd.c | 4 +-
crypto/cts.c | 6 +-
crypto/dh.c | 36 +-
crypto/dh_helper.c | 20 +-
crypto/drbg.c | 36 +-
crypto/ecdh.c | 6 -
crypto/ecdh_helper.c | 2 +-
crypto/gcm.c | 55 +-
crypto/gf128mul.c | 13 +
crypto/keywrap.c | 84 +-
crypto/lrw.c | 17 +-
crypto/rmd128.c | 2 -
crypto/rmd160.c | 2 -
crypto/rmd256.c | 2 -
crypto/rmd320.c | 2 -
crypto/rsa-pkcs1pad.c | 16 +-
crypto/sm3_generic.c | 210 +++
crypto/tcrypt.c | 209 +--
crypto/testmgr.c | 210 +--
crypto/testmgr.h | 67 +
crypto/xts.c | 8 +-
drivers/char/hw_random/Kconfig | 6 +-
drivers/char/hw_random/core.c | 53 +-
drivers/char/hw_random/iproc-rng200.c | 1 +
drivers/char/hw_random/pseries-rng.c | 2 +-
drivers/char/hw_random/timeriomem-rng.c | 7 -
drivers/char/hw_random/virtio-rng.c | 21 +-
drivers/char/hw_random/xgene-rng.c | 8 +-
drivers/crypto/Kconfig | 40 +-
drivers/crypto/Makefile | 1 -
drivers/crypto/amcc/Makefile | 2 +-
drivers/crypto/amcc/crypto4xx_alg.c | 512 +++++-
drivers/crypto/amcc/crypto4xx_core.c | 831 +++++----
drivers/crypto/amcc/crypto4xx_core.h | 199 ++-
drivers/crypto/amcc/crypto4xx_reg_def.h | 3 +
drivers/crypto/amcc/crypto4xx_sa.c | 85 -
drivers/crypto/amcc/crypto4xx_sa.h | 99 +-
drivers/crypto/atmel-aes.c | 80 +-
drivers/crypto/atmel-sha.c | 5 +-
drivers/crypto/atmel-tdes.c | 23 +-
drivers/crypto/axis/artpec6_crypto.c | 10 +-
drivers/crypto/bcm/cipher.c | 116 +-
drivers/crypto/bcm/cipher.h | 3 +-
drivers/crypto/bcm/util.c | 14 +-
drivers/crypto/caam/caamalg.c | 10 +-
drivers/crypto/caam/caamalg_qi.c | 7 +-
drivers/crypto/caam/caamhash.c | 12 +-
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/desc.h | 2 +-
drivers/crypto/cavium/nitrox/nitrox_hal.c | 2 +-
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 9 +-
drivers/crypto/ccp/ccp-crypto-main.c | 8 +-
drivers/crypto/ccp/ccp-dev-v5.c | 3 +-
drivers/crypto/ccp/ccp-dev.c | 7 +-
drivers/crypto/ccp/ccp-dmaengine.c | 5 +-
drivers/crypto/chelsio/chcr_algo.c | 1798 ++++++++++++--------
drivers/crypto/chelsio/chcr_algo.h | 57 +-
drivers/crypto/chelsio/chcr_core.c | 10 +-
drivers/crypto/chelsio/chcr_core.h | 2 +-
drivers/crypto/chelsio/chcr_crypto.h | 121 +-
drivers/crypto/inside-secure/safexcel_hash.c | 6 +-
drivers/crypto/ixp4xx_crypto.c | 1 -
drivers/crypto/marvell/cesa.c | 29 +-
drivers/crypto/marvell/cesa.h | 27 +-
drivers/crypto/marvell/cipher.c | 476 +++---
drivers/crypto/marvell/tdma.c | 5 +-
drivers/crypto/mediatek/mtk-aes.c | 39 +-
drivers/crypto/mv_cesa.c | 1216 -------------
drivers/crypto/mv_cesa.h | 150 --
drivers/crypto/n2_core.c | 12 +-
drivers/crypto/nx/nx-842-pseries.c | 2 +-
drivers/crypto/nx/nx-aes-gcm.c | 9 +-
drivers/crypto/nx/nx.c | 2 +-
drivers/crypto/omap-aes-gcm.c | 11 +-
drivers/crypto/omap-aes.c | 12 +-
drivers/crypto/omap-des.c | 7 +-
drivers/crypto/omap-sham.c | 7 +-
drivers/crypto/padlock-aes.c | 2 +-
drivers/crypto/padlock-sha.c | 2 +-
drivers/crypto/picoxcell_crypto.c | 7 +-
drivers/crypto/qat/qat_common/adf_dev_mgr.c | 3 -
drivers/crypto/qat/qat_common/qat_asym_algs.c | 18 +-
drivers/crypto/qat/qat_common/qat_uclo.c | 15 +-
drivers/crypto/qce/ablkcipher.c | 5 +-
drivers/crypto/qce/sha.c | 30 +-
drivers/crypto/s5p-sss.c | 1596 +++++++++++++++--
drivers/crypto/stm32/stm32-hash.c | 20 +-
drivers/crypto/talitos.c | 582 ++++---
drivers/crypto/talitos.h | 7 +-
drivers/crypto/ux500/cryp/cryp_core.c | 1 -
drivers/crypto/virtio/virtio_crypto_algs.c | 2 +-
drivers/crypto/vmx/aes_ctr.c | 33 +-
drivers/md/dm-verity-target.c | 81 +-
drivers/md/dm-verity.h | 5 -
drivers/net/ethernet/chelsio/cxgb4/sge.c | 8 +-
fs/cifs/smb2ops.c | 30 +-
fs/crypto/crypto.c | 28 +-
fs/crypto/fname.c | 36 +-
fs/crypto/fscrypt_private.h | 10 -
fs/crypto/keyinfo.c | 21 +-
include/crypto/dh.h | 2 +-
include/crypto/drbg.h | 3 +-
include/crypto/ecdh.h | 2 +-
include/crypto/gcm.h | 8 +
include/crypto/gf128mul.h | 2 +-
include/crypto/hash.h | 28 +-
include/crypto/if_alg.h | 15 +-
include/crypto/sm3.h | 40 +
include/crypto/sm3_base.h | 117 ++
include/linux/crypto.h | 40 +
include/linux/padata.h | 4 +
kernel/padata.c | 71 +-
lib/mpi/mpi-pow.c | 2 +
net/ipv4/ah4.c | 2 +-
net/ipv4/esp4.c | 2 +-
net/ipv6/ah6.c | 2 +-
net/ipv6/esp6.c | 2 +-
security/integrity/ima/ima_crypto.c | 56 +-
138 files changed, 5712 insertions(+), 4661 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-11-28 23:09:46

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.15

Hi Linus:

This push fixes the following issues:

- Potential bogus alignment for some AEAD operations.
- Crash in algif_aead.
- Sleeping in softirq context with async af_alg.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ondrej Mosnáček (1):
crypto: skcipher - Fix skcipher_walk_aead_common

Stephan Mueller (2):
crypto: algif_aead - skip SGL entries with NULL page
crypto: af_alg - remove locking in async callback

crypto/af_alg.c | 21 ++++++++++++------
crypto/algif_aead.c | 56 ++++++++++++++++++++++++++++++-----------------
crypto/algif_skcipher.c | 23 +++++++++----------
crypto/skcipher.c | 3 +++
include/crypto/if_alg.h | 1 +
5 files changed, 66 insertions(+), 38 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-12-11 07:22:30

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.15

Hi Linus:

This push fixes the following issues:

- Buffer overread in RSA.
- Potential use after free in algif_aead.
- Error path null pointer dereference in af_alg.
- Forbid combinations such as hmac(hmac(sha3)) which may crash.
- Crash in salsa20 due to incorrect API usage.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (5):
crypto: rsa - fix buffer overread when stripping leading zeroes
crypto: algif_aead - fix reference counting of null skcipher
crypto: af_alg - fix NULL pointer dereference in
crypto: hmac - require that the underlying hash algorithm is unkeyed
crypto: salsa20 - fix blkcipher_walk API usage

arch/x86/crypto/salsa20_glue.c | 7 -------
crypto/af_alg.c | 13 +++++++------
crypto/algif_aead.c | 2 +-
crypto/hmac.c | 6 +++++-
crypto/rsa_helper.c | 2 +-
crypto/salsa20_generic.c | 7 -------
crypto/shash.c | 5 +++--
include/crypto/internal/hash.h | 8 ++++++++
8 files changed, 25 insertions(+), 25 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2017-12-22 06:50:18

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.15

Hi Linus:

This push fixes the following issues:

- Fix chacha20 crash on zero-length input due to unset IV.
- Fix potential race conditions in mcryptd with spinlock.
- Only wait once at top of algif recvmsg to avoid inconsistencies.
- Fix potential use-after-free in algif_aead/algif_skcipher.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (1):
crypto: skcipher - set walk.iv for zero-length inputs

Sebastian Andrzej Siewior (1):
crypto: mcryptd - protect the per-CPU queue with a lock

Stephan Mueller (2):
crypto: af_alg - wait for data at beginning of recvmsg
crypto: af_alg - fix race accessing cipher request

crypto/af_alg.c | 6 ------
crypto/algif_aead.c | 16 +++++++++++-----
crypto/algif_skcipher.c | 16 +++++++++++-----
crypto/mcryptd.c | 23 ++++++++++-------------
crypto/skcipher.c | 10 ++++------
include/crypto/mcryptd.h | 1 +
6 files changed, 37 insertions(+), 35 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-01-05 07:38:20

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.15

Hi Linus:

This push fixes the following issues:

- Racy use of ctx->rcvused in af_alg.
- algif_aead crash in chacha20poly1305.
- Freeing bogus pointer in pcrypt.
- Build error on MIPS in mpi.
- Memory leak in inside-secure.
- Memory overwrite in inside-secure.
- NULL pointer dereference in inside-secure.
- State corruption in inside-secure.
- Build error without CRYPTO_GF128MUL in chelsio.
- Use after free in n2.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine T?nart (3):
crypto: inside-secure - free requests even if their handling failed
crypto: inside-secure - fix request allocations in invalidation path
crypto: inside-secure - do not use areq->result for partial results

Arnd Bergmann (1):
crypto: chelsio - select CRYPTO_GF128MUL

Eric Biggers (2):
crypto: chacha20poly1305 - validate the digest size
crypto: pcrypt - fix freeing pcrypt instances

James Hogan (1):
lib/mpi: Fix umul_ppmm() for MIPS64r6

Jan Engelhardt (1):
crypto: n2 - cure use after free

Jonathan Cameron (1):
crypto: af_alg - Fix race around ctx->rcvused by making it atomic_t

Ofer Heifetz (1):
crypto: inside-secure - per request invalidation

crypto/af_alg.c | 4 +-
crypto/algif_aead.c | 2 +-
crypto/algif_skcipher.c | 2 +-
crypto/chacha20poly1305.c | 6 +-
crypto/pcrypt.c | 19 ++---
drivers/crypto/chelsio/Kconfig | 1 +
drivers/crypto/inside-secure/safexcel.c | 1 +
drivers/crypto/inside-secure/safexcel_cipher.c | 85 ++++++++++++++++------
drivers/crypto/inside-secure/safexcel_hash.c | 89 +++++++++++++++++-------
drivers/crypto/n2_core.c | 3 +
include/crypto/if_alg.h | 5 +-
lib/mpi/longlong.h | 18 ++++-
12 files changed, 173 insertions(+), 62 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-01-12 06:45:11

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.15

Hi Linus:

This push fixes a NULL pointer dereference in crypto_remove_spawns
that can be triggered through af_alg.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (1):
crypto: algapi - fix NULL dereference in crypto_remove_spawns()

crypto/algapi.c | 12 ++++++++++++
1 file changed, 12 insertions(+)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-01-29 14:50:28

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.16

Hi Linus:

Here is the crypto update for 4.16:

API:

- Enforce the setting of keys for keyed aead/hash/skcipher
algorithms.
- Add multibuf speed tests in tcrypt.

Algorithms:

- Improve performance of sha3-generic.
- Add native sha512 support on arm64.
- Add v8.2 Crypto Extentions version of sha3/sm3 on arm64.
- Avoid hmac nesting by requiring underlying algorithm to be unkeyed.
- Add cryptd_max_cpu_qlen module parameter to cryptd.

Drivers:

- Add support for EIP97 engine in inside-secure.
- Add inline IPsec support to chelsio.
- Add RevB core support to crypto4xx.
- Fix AEAD ICV check in crypto4xx.
- Add stm32 crypto driver.
- Add support for BCM63xx platforms in bcm2835 and remove bcm63xx.
- Add Derived Key Protocol (DKP) support in caam.
- Add Samsung Exynos True RNG driver.
- Add support for Exynos5250+ SoCs in exynos PRNG driver.

Please note that there will be a conflict with the net tree due
updates to the same header file in the chelsio driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Alexey Khoroshilov (1):
crypto: picoxcell - Fix error handling in spacc_probe()

Antoine Tenart (1):
Documentation/bindings: crypto: document the SafeXcel EIP97 compatible

Antoine Ténart (14):
crypto: inside-secure - remove extra empty line
crypto: inside-secure - fix typo in a comment
crypto: inside-secure - remove useless memset
crypto: inside-secure - comment the caching function
crypto: inside-secure - move request dequeueing into a workqueue
crypto: inside-secure - use threaded IRQs for result handling
crypto: inside-secure - dequeue all requests at once
crypto: inside-secure - increase the ring size
crypto: inside-secure - acknowledge the result requests all at once
crypto: inside-secure - handle more result requests when counter is full
crypto: inside-secure - retry to proceed the request later on fail
crypto: inside-secure - EIP97 support
crypto: inside-secure - avoid unmapping DMA memory that was not mapped
crypto: inside-secure - fix hash when length is a multiple of a block

Ard Biesheuvel (16):
crypto: arm64/aes-ce-cipher - move assembler code to .S file
crypto: arm64 - implement SHA-512 using special instructions
crypto: arm64/aes-cipher - move S-box to .rodata section
crypto: arm64/aes-neon - move literal data to .rodata section
crypto: arm64/crc32 - move literal data to .rodata section
crypto: arm64/crct10dif - move literal data to .rodata section
crypto: arm64/sha2-ce - move the round constant table to .rodata section
crypto: arm64/sha1-ce - get rid of literal pool
crypto: sha3-generic - fixes for alignment and big endian operation
crypto: sha3-generic - rewrite KECCAK transform to help the compiler optimize
crypto: sha3-generic - simplify code
crypto: sha3-generic - export init/update/final routines
crypto: testmgr - add new testcases for sha3
crypto: arm64/sha3 - new v8.2 Crypto Extensions implementation
crypto: arm64/sm3 - new v8.2 Crypto Extensions implementation
crypto: arm64/sha512 - fix/improve new v8.2 Crypto Extensions code

Arnd Bergmann (3):
crypto: qat - reduce stack size with KASAN
crypto: aes-generic - build with -Os on gcc-7+
crypto: aes-generic - fix aes-generic regression on powerpc

Atul Gupta (3):
cxgb4: Add support for Inline IPSec Tx
chcr: Add support for Inline IPSec
crypto: chelsio - fix a type cast error

Cheah Kok Cheong (1):
padata: add SPDX identifier

Christian Lamparter (5):
crypto: crypto4xx - shuffle iomap in front of request_irq
crypto: crypto4xx - support Revision B parts
crypto: crypto4xx - fix missing irq devname
crypto: crypto4xx - kill MODULE_NAME
crypto: crypto4xx - perform aead icv check in the driver

Christophe Jaillet (1):
crypto: hifn_795x - Fix a memory leak in the error handling path of 'hifn_probe()'

Colin Ian King (10):
crypto: chelsio - remove redundant assignments to reqctx and dst_size
crypto: nx - fix spelling mistake: "availavle" -> "available"
crypto: cavium - fix memory leak on info
crypto: cryptd - make cryptd_max_cpu_qlen module parameter static
crypto: chelsio - make arrays sgl_ent_len and dsgl_ent_len static
chcr: remove unused variables net_device, pi, adap and cntrl
chcr: ensure cntrl is initialized to fix bit-wise or'ing of garabage data
crypto: tcrypt - fix spelling mistake: "bufufer"-> "buffer"
crypto: tcrypt - free xoutbuf instead of axbuf
crypto: inside-secure - make function safexcel_try_push_requests static

Corentin LABBE (2):
crypto: stm32 - fix module device table name
crypto: artpec6 - remove select on non-existing CRYPTO_SHA384

Corentin Labbe (4):
crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error
crypto: echainiv - Remove unused alg/spawn variable
crypto: seqiv - Remove unused alg/spawn variable
crypto: stm32 - Use standard CONFIG name

Dan Carpenter (3):
crypto: chelsio - Fix an error code in chcr_hash_dma_map()
crypto: s5p-sss - Remove a stray tab
hwrng: exynos - Signedness bug in exynos_trng_do_read()

Eric Biggers (32):
crypto: rsa - fix buffer overread when stripping leading zeroes
crypto: algif_aead - fix reference counting of null skcipher
crypto: af_alg - fix NULL pointer dereference in
crypto: hmac - require that the underlying hash algorithm is unkeyed
crypto: salsa20 - fix blkcipher_walk API usage
crypto: chacha20 - Fix unaligned access when loading constants
crypto: chacha20 - Use unaligned access macros when loading key and IV
crypto: chacha20 - Remove cra_alignmask
crypto: x86/chacha20 - Remove cra_alignmask
crypto: chacha20 - Fix keystream alignment for chacha20_block()
crypto: api - Unexport crypto_larval_lookup()
crypto: null - Get rid of crypto_{get,put}_default_null_skcipher2()
crypto: gf128mul - remove incorrect comment
crypto: x86/twofish-3way - Fix %rbp usage
crypto: algapi - convert cra_refcnt to refcount_t
crypto: algapi - remove unused notifications
crypto: poly1305 - use unaligned access macros to output digest
crypto: poly1305 - remove cra_alignmask
crypto: x86/poly1305 - remove cra_alignmask
crypto: chacha20 - use rol32() macro from bitops.h
crypto: hash - introduce crypto_hash_alg_has_setkey()
crypto: cryptd - pass through absence of ->setkey()
crypto: mcryptd - pass through absence of ->setkey()
crypto: poly1305 - remove ->setkey() method
crypto: hash - annotate algorithms taking optional key
crypto: hash - prevent using keyed hashes without setting key
crypto: ghash - remove checks for key being set
crypto: skcipher - prevent using skciphers without setting key
crypto: aead - prevent using AEADs without setting key
crypto: salsa20-generic - cleanup and convert to skcipher API
crypto: salsa20 - export generic helpers
crypto: x86/salsa20 - cleanup and convert to skcipher API

Fabien DESSENNE (2):
dt-bindings: Document STM32 CRYP bindings
crypto: stm32 - Support for STM32 CRYP crypto module

Florian Fainelli (12):
hwrng: bcm2835 - Obtain base register via resource
hwrng: bcm2835 - Define a driver private context
hwrng: bcm2835 - Move enabling to hwrng::init
hwrng: bcm2835 - Implementation cleanup callback
hwrng: bcm2835 - Use device managed helpers
hwrng: bcm2835 - Rework interrupt masking
hwrng: bcm2835 - Manage an optional clock
hwrng: bcm2835 - Abstract I/O accessors
hwrng: bcm2835 - Add Broadcom MIPS I/O accessors
dt-bindings: rng: Incorporate brcm,bcm6368.txt binding
hwrng: bcm2835 - Enable BCM2835 RNG to work on BCM63xx platforms
hwrng: bcm63xx - Remove since bcm2835-rng takes over

Gary R Hook (1):
hwrng: core - Clean up RNG list when last hwrng is unregistered

Geert Uytterhoeven (1):
crypto: keywrap - Add missing ULL suffixes for 64-bit constants

Gilad Ben-Yossef (7):
dt-bindings: add device tree binding for Arm TrustZone CryptoCell crypto engine
crypto: tcrypt - use multi buf for ahash mb test
crypto: tcrypt - fix AEAD decryption speed test
crypto: tcrypt - allow setting num of bufs
crypto: tcrypt - add multi buf ahash jiffies test
crypto: tcrypt - add multibuf skcipher speed test
crypto: tcrypt - add multibuf aead speed test

Gomonovych, Vasyl (1):
crypto: arm/aes-neonbs - Use PTR_ERR_OR_ZERO()

Harsh Jain (6):
crypto: chelsio - Fix Indentation
crypto: chelsio - check for sg null
crypto: chelsio - Fix IV updated in XTS operation
crypto: chelsio - Add authenc versions of ctr and sha
crypto: chelsio - Remove dst sg size zero check
crypto: chelsio - Fix indentation warning

Hauke Mehrtens (1):
crypto: ecdh - fix typo in KPP dependency of CRYPTO_ECDH

Herbert Xu (1):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Himanshu Jha (1):
crypto: Use zeroing memory allocator instead of allocator/memset

Horia Geantă (5):
crypto: caam/qi - use correct print specifier for size_t
crypto: caam - constify key data
crypto: caam - remove needless ablkcipher key copy
crypto: caam - save Era in driver's private data
crypto: caam - add Derived Key Protocol (DKP) support

Joey Pabalinas (1):
crypto: testmgr - change `guard` to unsigned char

Jon Maxwell (1):
crypto: cryptd - Add cryptd_max_cpu_qlen module parameter

Junaid Shahid (2):
crypto: aesni - Fix out-of-bounds access of the data buffer in generic-gcm-aesni
crypto: aesni - Fix out-of-bounds access of the AAD buffer in generic-gcm-aesni

Kamil Konieczny (2):
MAINTAINERS: Add myself as co-maintainer for s5p-sss.c
crypto: testmgr - test misuse of result in ahash

Krzysztof Kozlowski (2):
crypto: exynos-rng - Add SPDX license identifier and correct module license
crypto: s5p-sss - Add SPDX license identifier

Lars Persson (1):
crypto: artpec6 - set correct iv size for gcm(aes)

Martin Kaiser (1):
hwrng: imx-rngc - simplify the power management definitions

Martin Kepplinger (1):
crypto: replace FSF address with web source in license notices

Ofer Heifetz (4):
crypto: inside-secure - refrain from unneeded invalidations
crypto: inside-secure - EBUSY is not an error on async request
crypto: inside-secure - move cipher crypto mode to request context
crypto: inside-secure - remove unused parameter in invalidate_cache

Pierre (1):
crypto: ecc - Fix NULL pointer deref. on no default_rng

Pravin Shedge (1):
crypto: drivers - remove duplicate includes

Robert Baronescu (1):
crypto: tcrypt - fix S/G table for test_aead_speed()

Robin Murphy (1):
crypto: marvell/cesa - Fix DMA API misuse

Sabrina Dubroca (2):
crypto: aesni - fix typo in generic_gcmaes_decrypt
crypto: aesni - add wrapper for generic gcm(aes)

Sean Wang (1):
hwrng: mediatek - Setup default RNG quality

Stephan Mueller (2):
crypto: af_alg - whitelist mask and type
crypto: aesni - handle zero length dst buffer

Tudor-Dan Ambarus (1):
crypto: tcrypt - set assoc in sg_init_aead()

Yang Shi (1):
crypto: remove unused hardirq.h

Zhou Wang (1):
crypto: scomp - delete unused comments

tcharding (1):
crypto: doc - clear htmldocs build warnings for crypto/hash

weiyongjun \(A\) (4):
hwrng: exynos - remove redundant dev_err call in exynos_trng_probe()
crypto: axis - remove unnecessary platform_get_resource() error check
crypto: stm32 - remove redundant dev_err call in stm32_cryp_probe()
hwrng: bcm2835 - Remove redundant dev_err call in bcm2835_rng_probe()

Łukasz Stelmach (6):
crypto: exynos - Icrease the priority of the driver
crypto: exynos - Support Exynos5250+ SoCs
crypto: exynos - Improve performance of PRNG
crypto: exynos - Reseed PRNG after generating 2^16 random bytes
crypto: exynos - Introduce mutex to prevent concurrent access to hardware
hwrng: exynos - add Samsung Exynos True RNG driver

.../devicetree/bindings/crypto/arm-cryptocell.txt | 22 +
.../bindings/crypto/inside-secure-safexcel.txt | 3 +-
.../bindings/crypto/samsung,exynos-rng4.txt | 4 +-
.../devicetree/bindings/crypto/st,stm32-cryp.txt | 19 +
.../devicetree/bindings/rng/brcm,bcm2835.txt | 22 +-
.../devicetree/bindings/rng/brcm,bcm6368.txt | 17 -
MAINTAINERS | 8 +
arch/arm/crypto/aes-neonbs-glue.c | 10 +-
arch/arm/crypto/crc32-ce-glue.c | 2 +
arch/arm64/crypto/Kconfig | 18 +
arch/arm64/crypto/Makefile | 11 +-
arch/arm64/crypto/aes-ce-core.S | 87 ++
.../crypto/{aes-ce-cipher.c => aes-ce-glue.c} | 115 +-
arch/arm64/crypto/aes-cipher-core.S | 19 +-
arch/arm64/crypto/aes-glue.c | 1 +
arch/arm64/crypto/aes-neon.S | 8 +-
arch/arm64/crypto/crc32-ce-core.S | 7 +-
arch/arm64/crypto/crc32-ce-glue.c | 2 +
arch/arm64/crypto/crct10dif-ce-core.S | 17 +-
arch/arm64/crypto/sha1-ce-core.S | 20 +-
arch/arm64/crypto/sha2-ce-core.S | 4 +-
arch/arm64/crypto/sha3-ce-core.S | 210 ++++
arch/arm64/crypto/sha3-ce-glue.c | 161 +++
arch/arm64/crypto/sha512-ce-core.S | 204 ++++
arch/arm64/crypto/sha512-ce-glue.c | 119 ++
arch/arm64/crypto/sha512-glue.c | 1 +
arch/arm64/crypto/sm3-ce-core.S | 141 +++
arch/arm64/crypto/sm3-ce-glue.c | 92 ++
arch/powerpc/crypto/crc32c-vpmsum_glue.c | 1 +
arch/s390/crypto/crc32-vx.c | 3 +
arch/sparc/crypto/crc32c_glue.c | 1 +
arch/x86/crypto/aesni-intel_asm.S | 199 +---
arch/x86/crypto/aesni-intel_glue.c | 70 +-
arch/x86/crypto/chacha20_glue.c | 1 -
arch/x86/crypto/crc32-pclmul_glue.c | 1 +
arch/x86/crypto/crc32c-intel_glue.c | 1 +
arch/x86/crypto/poly1305_glue.c | 2 -
arch/x86/crypto/salsa20-i586-asm_32.S | 184 +--
arch/x86/crypto/salsa20-x86_64-asm_64.S | 114 --
arch/x86/crypto/salsa20_glue.c | 110 +-
arch/x86/crypto/twofish-x86_64-asm_64-3way.S | 112 +-
crypto/Kconfig | 4 +-
crypto/Makefile | 1 +
crypto/ablk_helper.c | 5 +-
crypto/aead.c | 19 +-
crypto/af_alg.c | 23 +-
crypto/ahash.c | 33 +-
crypto/algapi.c | 13 +-
crypto/algif_aead.c | 15 +-
crypto/algif_hash.c | 52 +-
crypto/algif_skcipher.c | 59 +-
crypto/api.c | 6 +-
crypto/authenc.c | 4 +-
crypto/authencesn.c | 4 +-
crypto/blkcipher.c | 1 -
crypto/camellia_generic.c | 3 +-
crypto/cast5_generic.c | 3 +-
crypto/cast6_generic.c | 3 +-
crypto/chacha20_generic.c | 33 +-
crypto/crc32_generic.c | 1 +
crypto/crc32c_generic.c | 1 +
crypto/cryptd.c | 17 +-
crypto/crypto_user.c | 4 +-
crypto/ecc.c | 2 +-
crypto/echainiv.c | 5 -
crypto/gcm.c | 4 +-
crypto/gf128mul.c | 2 -
crypto/ghash-generic.c | 6 -
crypto/hmac.c | 6 +-
crypto/internal.h | 8 +-
crypto/keywrap.c | 4 +-
crypto/mcryptd.c | 11 +-
crypto/poly1305_generic.c | 27 +-
crypto/proc.c | 2 +-
crypto/rsa_helper.c | 2 +-
crypto/salsa20_generic.c | 245 ++--
crypto/seqiv.c | 5 -
crypto/sha3_generic.c | 332 +++---
crypto/shash.c | 30 +-
crypto/simd.c | 4 +-
crypto/skcipher.c | 30 +-
crypto/tcrypt.c | 1085 ++++++++++++++++--
crypto/testmgr.c | 41 +-
crypto/testmgr.h | 550 +++++++++
crypto/twofish_common.c | 5 +-
crypto/twofish_generic.c | 5 +-
crypto/xcbc.c | 3 +-
drivers/char/hw_random/Kconfig | 32 +-
drivers/char/hw_random/Makefile | 2 +-
drivers/char/hw_random/bcm2835-rng.c | 169 ++-
drivers/char/hw_random/bcm63xx-rng.c | 154 ---
drivers/char/hw_random/core.c | 4 +
drivers/char/hw_random/exynos-trng.c | 235 ++++
drivers/char/hw_random/imx-rngc.c | 13 +-
drivers/char/hw_random/mtk-rng.c | 1 +
drivers/char/random.c | 24 +-
drivers/crypto/Kconfig | 1 -
drivers/crypto/amcc/crypto4xx_alg.c | 6 +-
drivers/crypto/amcc/crypto4xx_core.c | 131 ++-
drivers/crypto/amcc/crypto4xx_core.h | 4 +-
drivers/crypto/amcc/crypto4xx_reg_def.h | 4 +-
drivers/crypto/amcc/crypto4xx_trng.c | 2 +-
drivers/crypto/axis/artpec6_crypto.c | 8 +-
drivers/crypto/bcm/cipher.c | 1 -
drivers/crypto/bfin_crc.c | 3 +-
drivers/crypto/caam/caamalg.c | 120 +-
drivers/crypto/caam/caamalg_desc.c | 182 +--
drivers/crypto/caam/caamalg_desc.h | 10 +-
drivers/crypto/caam/caamalg_qi.c | 68 +-
drivers/crypto/caam/caamhash.c | 73 +-
drivers/crypto/caam/ctrl.c | 4 +-
drivers/crypto/caam/desc.h | 29 +
drivers/crypto/caam/desc_constr.h | 51 +-
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/key_gen.c | 30 -
drivers/crypto/caam/key_gen.h | 30 +
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 1 -
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 1 -
drivers/crypto/chelsio/Kconfig | 10 +
drivers/crypto/chelsio/Makefile | 1 +
drivers/crypto/chelsio/chcr_algo.c | 540 +++++----
drivers/crypto/chelsio/chcr_algo.h | 15 -
drivers/crypto/chelsio/chcr_core.c | 14 +
drivers/crypto/chelsio/chcr_core.h | 38 +
drivers/crypto/chelsio/chcr_crypto.h | 76 +-
drivers/crypto/chelsio/chcr_ipsec.c | 654 +++++++++++
drivers/crypto/exynos-rng.c | 108 +-
drivers/crypto/hifn_795x.c | 1 +
drivers/crypto/inside-secure/safexcel.c | 370 ++++---
drivers/crypto/inside-secure/safexcel.h | 173 ++-
drivers/crypto/inside-secure/safexcel_cipher.c | 53 +-
drivers/crypto/inside-secure/safexcel_hash.c | 125 ++-
drivers/crypto/ixp4xx_crypto.c | 7 +-
drivers/crypto/marvell/cesa.c | 19 +-
drivers/crypto/nx/nx-842-powernv.c | 4 +-
drivers/crypto/picoxcell_crypto.c | 27 +-
drivers/crypto/qat/qat_common/qat_hal.c | 133 +--
drivers/crypto/s5p-sss.c | 26 +-
drivers/crypto/stm32/Kconfig | 13 +-
drivers/crypto/stm32/Makefile | 5 +-
drivers/crypto/stm32/stm32-cryp.c | 1170 ++++++++++++++++++++
drivers/crypto/stm32/stm32_crc32.c | 2 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4.h | 23 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_debugfs.c | 2 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c | 2 +-
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c | 1 +
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.h | 3 +
drivers/net/ethernet/chelsio/cxgb4/sge.c | 102 +-
drivers/net/ethernet/chelsio/cxgb4/t4fw_api.h | 7 +
.../lustre/lnet/libcfs/linux/linux-crypto-adler.c | 1 +
include/crypto/aead.h | 10 +-
include/crypto/chacha20.h | 3 +-
include/crypto/hash.h | 46 +-
include/crypto/internal/hash.h | 10 +
include/crypto/internal/scompress.h | 11 -
include/crypto/null.h | 10 -
include/crypto/poly1305.h | 2 -
include/crypto/salsa20.h | 27 +
include/crypto/sha3.h | 6 +-
include/crypto/skcipher.h | 11 +-
include/linux/crypto.h | 10 +-
kernel/padata.c | 1 +
lib/chacha20.c | 71 +-
164 files changed, 7495 insertions(+), 2706 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-02-12 03:17:02

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.16

Hi Linus:

This push fixes the following issues:

- Fix oversize stack frames on mn10300 in sha3-generic.
- Fix warning on old compilers in sha3-generic.
- Fix API error in sun4i_ss_prng.
- Fix potential dead-lock in sun4i_ss_prng.
- Fix null-pointer dereference in sha512-mb.
- Fix endless loop when DECO acquire fails in caam.
- Fix kernel oops when hashing empty message in talitos.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (1):
crypto: sha3-generic - deal with oversize stack frames

Artem Savkov (2):
crypto: sun4i_ss_prng - fix return value of sun4i_ss_prng_generate
crypto: sun4i_ss_prng - convert lock to _bh in sun4i_ss_prng_generate

Eric Biggers (1):
crypto: sha512-mb - initialize pending lengths correctly

Geert Uytterhoeven (3):
compiler-gcc.h: Introduce __optimize function attribute
compiler-gcc.h: __nostackprotector needs gcc-4.4 and up
crypto: sha3-generic - Use __optimize to support old compilers

Horia Geantă (1):
crypto: caam - fix endless loop when DECO acquire fails

LEROY Christophe (1):
crypto: talitos - fix Kernel Oops on hashing an empty file

.../x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c | 10 +-
crypto/sha3_generic.c | 218 +++++++++++---------
drivers/crypto/caam/ctrl.c | 8 +-
drivers/crypto/sunxi-ss/sun4i-ss-prng.c | 6 +-
drivers/crypto/talitos.c | 4 +
include/linux/compiler-gcc.h | 7 +-
include/linux/compiler.h | 4 +
7 files changed, 146 insertions(+), 111 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-04-04 15:27:52

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.17

Hi Linus:

Here is the crypto update for 4.17:

API:

- Add AEAD support to crypto engine.
- Allow batch registration in simd.

Algorithms:

- Add CFB mode.
- Add speck block cipher.
- Add sm4 block cipher.
- Add new test case for crct10dif.
- Improve scheduling latency on ARM.
- Add scatter/gather support to gcm in aesni.
- Convert x86 crypto algorithms to skcihper.

Drivers:

- Add hmac(sha224/sha256) support in inside-secure.
- Add aes gcm/ccm support in stm32.
- Add stm32mp1 support in stm32.
- Add ccree driver from staging tree.
- Add gcm support over QI in caam.
- Add ks-sa hwrng driver.

Please note that there will be a conflict with the net tree due
updates to the same header file in the chelsio driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Andy Shevchenko (1):
crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()

Antoine Tenart (20):
MAINTAINERS: update the Inside Secure maintainer email
crypto: inside-secure - do not overwrite the threshold value
crypto: inside-secure - fix the extra cache computation
crypto: inside-secure - fix the cache_len computation
crypto: inside-secure - do not process request if no command was issued
crypto: inside-secure - fix the invalidation step during cra_exit
crypto: inside-secure - keep the requests push/pop synced
crypto: inside-secure - unmap the result in the hash send error path
crypto: atmel-aes - fix the keys zeroing on errors
crypto: inside-secure - move cache result dma mapping to request
crypto: inside-secure - wait for the request to complete if in the backlog
crypto: inside-secure - move the digest to the request context
crypto: inside-secure - fix typo s/allways/always/ in a define
crypto: inside-secure - fix a typo in a register name
crypto: inside-secure - improve the send error path
crypto: inside-secure - do not access buffers mapped to the device
crypto: inside-secure - improve the skcipher token
crypto: inside-secure - the context ipad/opad should use the state sz
crypto: inside-secure - hmac(sha256) support
crypto: inside-secure - hmac(sha224) support

Ard Biesheuvel (9):
crypto: testmgr - add a new test case for CRC-T10DIF
crypto: arm64/aes-ce-ccm - move kernel mode neon en/disable into loop
crypto: arm64/aes-blk - move kernel mode neon en/disable into loop
crypto: arm64/aes-bs - move kernel mode neon en/disable into loop
crypto: arm64/chacha20 - move kernel mode neon en/disable into loop
crypto: arm64/aes-blk - remove configurable interleave
crypto: arm64/aes-blk - add 4 way interleave to CBC encrypt path
crypto: arm64/aes-blk - add 4 way interleave to CBC-MAC encrypt path
crypto: arm64/sha256-neon - play nice with CONFIG_PREEMPT kernels

Arnd Bergmann (1):
crypto: bfin_crc - remove blackfin CRC driver

Atul Gupta (1):
crypto: chelsio - no csum offload for ipsec path

Brijesh Singh (3):
crypto: ccp - add check to get PSP master only when PSP is detected
crypto: ccp - Fix sparse, use plain integer as NULL pointer
include: psp-sev: Capitalize invalid length enum

Colin Ian King (4):
crypto: chelsio - Make function aead_ccm_validate_input static
crypto: ccp - Make function ccp_get_dma_chan_attr static
crypto: qat - Make several functions static
hwrng: cavium - make two functions static

Conor McLoughlin (1):
crypto: testmgr - Fix incorrect values in PKCS#1 test vector

Corentin LABBE (6):
crypto: doc - document crypto engine API
crypto: engine - Permit to enqueue all async requests
crypto: omap - convert to new crypto engine API
crypto: virtio - convert to new crypto engine API
crypto: stm32-hash - convert to the new crypto engine API
crypto: stm32-cryp - convert to the new crypto engine API

Dave Watson (14):
crypto: aesni - Merge INITIAL_BLOCKS_ENC/DEC
crypto: aesni - Macro-ify func save/restore
crypto: aesni - Add GCM_INIT macro
crypto: aesni - Add GCM_COMPLETE macro
crypto: aesni - Merge encode and decode to GCM_ENC_DEC macro
crypto: aesni - Introduce gcm_context_data
crypto: aesni - Split AAD hash calculation to separate macro
crypto: aesni - Fill in new context data structures
crypto: aesni - Move ghash_mul to GCM_COMPLETE
crypto: aesni - Move HashKey computation from stack to gcm_context
crypto: aesni - Introduce partial block macro
crypto: aesni - Add fast path for > 16 byte update
crypto: aesni - Introduce scatter/gather asm function stubs
crypto: aesni - Update aesni-intel_glue to use scatter/gather

Eric Biggers (40):
crypto: mcryptd - remove pointless wrapper functions
crypto: sha1-mb - remove HASH_FIRST flag
crypto: sha256-mb - remove HASH_FIRST flag
crypto: sha512-mb - remove HASH_FIRST flag
crypto: speck - add support for the Speck block cipher
crypto: speck - export common helpers
crypto: arm/speck - add NEON-accelerated implementation of Speck-XTS
crypto: speck - add test vectors for Speck128-XTS
crypto: speck - add test vectors for Speck64-XTS
crypto: simd - allow registering multiple algorithms at once
crypto: x86/glue_helper - add skcipher_walk functions
crypto: x86/serpent-sse2 - remove LRW algorithm
crypto: x86/serpent-sse2 - remove XTS algorithm
crypto: x86/serpent-sse2 - convert to skcipher interface
crypto: x86/serpent-avx2 - remove LRW algorithm
crypto: x86/serpent-avx - remove LRW algorithm
crypto: x86/serpent-avx,avx2 - convert to skcipher interface
crypto: x86/twofish-3way - remove LRW algorithm
crypto: x86/twofish-3way - remove XTS algorithm
crypto: x86/twofish-3way - convert to skcipher interface
crypto: x86/twofish-avx - remove LRW algorithm
crypto: x86/twofish-avx - convert to skcipher interface
crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one
crypto: x86/cast5-avx - convert to skcipher interface
crypto: x86/cast6-avx - remove LRW algorithm
crypto: x86/cast6-avx - convert to skcipher interface
crypto: x86/blowfish: convert to skcipher interface
crypto: x86/des3_ede - convert to skcipher interface
crypto: x86/camellia-aesni-avx - remove LRW algorithm
crypto: x86/camellia-aesni-avx2 - remove LRW algorithm
crypto: x86/camellia - remove LRW algorithm
crypto: x86/camellia - remove XTS algorithm
crypto: x86/camellia - convert to skcipher interface
crypto: x86/camellia-aesni-avx, avx2 - convert to skcipher interface
crypto: xts - remove xts_crypt()
crypto: lrw - remove lrw_crypt()
crypto: x86/glue_helper - remove blkcipher_walk functions
crypto: x86/glue_helper - rename glue_skwalk_fpu_begin()
crypto: ablk_helper - remove ablk_helper
crypto: arm64/speck - add NEON-accelerated implementation of Speck-XTS

Fabien DESSENNE (2):
crypto: stm32/cryp - add aes gcm / ccm support
crypto: stm32/cryp - add stm32mp1 support

Fengguang Wu (1):
crypto: ccree - fix memdup.cocci warnings

Gary R Hook (3):
crypto: ccp - Fill the result buffer only on digest, finup, and final ops
crypto: ccp - Validate buffer lengths for copy operations
crypto: doc - Document remaining members in struct crypto_alg

Gilad Ben-Yossef (14):
staging: ccree: rename staging ver and mark as broken
crypto: ccree - introduce CryptoCell driver
crypto: ccree - add skcipher support
crypto: ccree - add ahash support
crypto: ccree - add AEAD support
crypto: ccree - add FIPS support
MAINTAINERS: update ccree entry
crypto: ccree - remove unused definitions
dt-bindings: Add DT bindings for ccree 710 and 630p
crypto: ccree - add support for older HW revs
crypto: ccree - replace memset+kfree with kzfree
crypto: sm4 - introduce SM4 symmetric cipher algorithm
crypto: testmgr - introduce SM4 tests
crypto: ccree - remove unused enums

Gregory CLEMENT (5):
hwrng: omap - Remove useless test before clk_disable_unprepare
hwrng: omap - Fix clock resource by adding a register clock
crypto: inside-secure - fix clock management
crypto: inside-secure - improve clock initialization
crypto: inside-secure - fix clock resource by adding a register clock

Harsh Jain (6):
crypto: chelsio - Use kernel round function to align lengths
crypto: chelsio - Fix src buffer dma length
crypto: chelsio - Update IV before sending request to HW
crypto: chelsio - Fix iv passed in fallback path for rfc3686
crypto: chelsio -Split Hash requests for large scatter gather list
crypto: chelsio - Remove declaration of static function from header

Herbert Xu (5):
crypto: api - Remove unused crypto_type lookup function
crypto: api - Make crypto_alg_lookup static
crypto: api - Keep failed instances alive
crypto: lrw - Free rctx->ext with kzfree
crypto: ahash - Fix early termination in hash walk

Horia Geantă (4):
crypto: caam/qi - return -EBADMSG for ICV check failure
crypto: caam - prepare for gcm(aes) support over QI interface
crypto: caam/qi - add GCM support
crypto: doc - clarify hash callbacks state machine

James Bottomley (2):
crypto: cfb - add support for Cipher FeedBack mode
crypto: ecdh - fix to allow multi segment scatterlists

Jia-Ju Bai (3):
crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
crypto: user - Replace GFP_ATOMIC with GFP_KERNEL in crypto_report
crypto: cavium - Replace mdelay with msleep in cpt_device_init

Jinbum Park (1):
crypto: arm/aes-cipher - move S-box to .rodata section

Kamil Konieczny (6):
crypto: mxs-dcp - Add empty hash export and import
crypto: n2 - Add empty hash export and import
crypto: ux500/hash - Add empty export and import
crypto: bfin_crc - Add empty hash export and import
crypto: hash - Require export/import in ahash
crypto: hash - Prevent use of req->result in ahash update

Kees Cook (1):
crypto: ecc - Remove stack VLA usage

Krzysztof Kozlowski (4):
crypto: omap-sham - Remove useless check for non-null request
crypto: omap-sham - Fix misleading indentation
crypto: s5p-sss - Remove useless check for non-null request
crypto: s5p-sss - Constify pointed data (arguments and local variables)

LEROY Christophe (3):
crypto: talitos - don't persistently map req_ctx->hw_context and req_ctx->buf
crypto: talitos - do not perform unnecessary dma synchronisation
crypto: talitos - fix IPsec cipher in length

Leonard Crestez (1):
crypto: arm,arm64 - Fix random regeneration of S_shipped

Lionel Debieve (3):
crypto: stm32/hash - avoid error if maxburst not defined
crypto: stm32/hash - fix performance issues
crypto: stm32/hash - rework padding length

Maciej S. Szmigiero (1):
crypto: ccp - return an actual key size from RSA max_size callback

Markus Elfring (12):
crypto: ux500 - Delete an error message for a failed memory allocation in ux500_cryp_probe()
crypto: ux500 - Adjust two condition checks in ux500_cryp_probe()
crypto: ux500 - Adjust an error message in ux500_cryp_probe()
crypto: ux500 - Delete two unnecessary variable initialisations in ux500_cryp_probe()
crypto: sahara - Delete an error message for a failed memory allocation in sahara_probe()
crypto: sahara - Improve a size determination in sahara_probe()
crypto: nx-842 - Delete an error message for a failed memory allocation in nx842_pseries_init()
crypto: bfin_crc - Delete an error message for a failed memory allocation in bfin_crypto_crc_probe()
crypto: bcm - Delete an error message for a failed memory allocation in do_shash()
crypto: atmel - Delete error messages for a failed memory allocation in six functions
crypto: ccp - Use memdup_user() rather than duplicating its implementation
crypto: talitos - Delete an error message for a failed memory allocation in talitos_edesc_alloc()

Ofer Heifetz (1):
crypto: inside-secure - move hash result dma mapping to request

Peter Robinson (1):
crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss

Peter Wu (1):
crypto: virtio - remove dependency on CRYPTO_AUTHENC

Robin Murphy (1):
crypto: marvell/cesa - Clean up redundant #include

Rui Miguel Silva (2):
crypto: caam - Fix null dereference at error path
crypto: caam - do not use mem and emi_slow clock for imx7x

Sebastian Andrzej Siewior (1):
crypto: ccp - don't disable interrupts while setting up debugfs

Stefan Agner (1):
crypto: brcm - explicitly cast cipher to hash type

Stefan Wahren (1):
hwrng: bcm2835 - Handle deferred clock properly

Tero Kristo (6):
crypto: omap-sham - Verify page zone of scatterlists before starting DMA
crypto: omap-crypto - Verify page zone scatterlists before starting DMA
crypto: omap-sham - make fallback size configurable
crypto: omap-sham - make queue length configurable
crypto: omap-aes - make fallback size configurable
crypto: omap-aes - make queue length configurable

Tim Chen (1):
x86/crypto: Designate maintainer for SHA-1/256/512

Tudor-Dan Ambarus (7):
crypto: caam - don't leak pointers to authenc keys
crypto: caam/qi - don't leak pointers to authenc keys
crypto: chelsio - don't leak pointers to authenc keys
crypto: ixp4xx - don't leak pointers to authenc keys
crypto: picoxcell - don't leak pointers to authenc keys
crypto: qat - don't leak pointers to authenc keys
crypto: talitos - don't leak pointers to authenc keys

Vitaly Andrianov (2):
dt-bindings: rng: add bindings doc for Keystone SA HWRNG driver
hwrng: ks-sa - add hw_random driver

Vladimir Zapolskiy (2):
dt-bindings: rng: Document Freescale i.MX21 and i.MX31 RNGA compatibles
hwrng: mxc-rnga - add driver support on boards with device tree

Wu Fengguang (1):
crypto: x86/des3_ede - des3_ede_skciphers[] can be static

[email protected] (5):
hwrng: stm32 - add reset during probe
dt-bindings: rng: add reset node for stm32
hwrng: stm32 - allow disable clock error detection
dt-bindings: rng: add clock detection error for stm32
hwrng: stm32 - rework read timeout calculation

weiyongjun \(A\) (2):
hwrng: imx-rngc - make symbol imx_rngc_pm_ops static
crypto: inside-secure - fix missing unlock on error in safexcel_ahash_send_req()

Documentation/crypto/crypto_engine.rst | 48 +
Documentation/crypto/devel-algos.rst | 8 +
.../devicetree/bindings/crypto/arm-cryptocell.txt | 3 +-
.../bindings/crypto/inside-secure-safexcel.txt | 6 +-
.../bindings/rng/{imx-rngc.txt => imx-rng.txt} | 11 +-
.../devicetree/bindings/rng/ks-sa-rng.txt | 21 +
Documentation/devicetree/bindings/rng/omap_rng.txt | 7 +-
.../devicetree/bindings/rng/st,stm32-rng.txt | 4 +
MAINTAINERS | 15 +-
arch/arm/crypto/Kconfig | 6 +
arch/arm/crypto/Makefile | 4 +
arch/arm/crypto/aes-cipher-core.S | 19 +-
arch/arm/crypto/speck-neon-core.S | 432 ++
arch/arm/crypto/speck-neon-glue.c | 288 ++
arch/arm64/crypto/Kconfig | 6 +
arch/arm64/crypto/Makefile | 8 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 47 +-
arch/arm64/crypto/aes-glue.c | 95 +-
arch/arm64/crypto/aes-modes.S | 355 +-
arch/arm64/crypto/aes-neonbs-glue.c | 48 +-
arch/arm64/crypto/chacha20-neon-glue.c | 12 +-
arch/arm64/crypto/sha256-glue.c | 36 +-
arch/arm64/crypto/speck-neon-core.S | 352 ++
arch/arm64/crypto/speck-neon-glue.c | 282 ++
arch/x86/crypto/aesni-intel_asm.S | 1414 +++---
arch/x86/crypto/aesni-intel_glue.c | 230 +-
arch/x86/crypto/blowfish_glue.c | 230 +-
arch/x86/crypto/camellia_aesni_avx2_glue.c | 491 +-
arch/x86/crypto/camellia_aesni_avx_glue.c | 495 +-
arch/x86/crypto/camellia_glue.c | 356 +-
arch/x86/crypto/cast5_avx_glue.c | 352 +-
arch/x86/crypto/cast6_avx_glue.c | 489 +-
arch/x86/crypto/des3_ede_glue.c | 238 +-
arch/x86/crypto/glue_helper.c | 391 +-
arch/x86/crypto/serpent_avx2_glue.c | 478 +-
arch/x86/crypto/serpent_avx_glue.c | 518 +--
arch/x86/crypto/serpent_sse2_glue.c | 519 +--
arch/x86/crypto/sha1-mb/sha1_mb.c | 28 +-
arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 8 +-
arch/x86/crypto/sha256-mb/sha256_mb.c | 27 +-
arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 8 +-
arch/x86/crypto/sha512-mb/sha512_mb.c | 30 +-
arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 8 +-
arch/x86/crypto/twofish_avx_glue.c | 493 +-
arch/x86/crypto/twofish_glue_3way.c | 339 +-
arch/x86/include/asm/crypto/camellia.h | 16 +-
arch/x86/include/asm/crypto/glue_helper.h | 75 +-
arch/x86/include/asm/crypto/serpent-avx.h | 17 +-
arch/x86/include/asm/crypto/twofish.h | 19 -
crypto/Kconfig | 129 +-
crypto/Makefile | 4 +-
crypto/ablk_helper.c | 150 -
crypto/ahash.c | 25 +-
crypto/algapi.c | 8 -
crypto/api.c | 34 +-
crypto/cfb.c | 353 ++
crypto/crypto_engine.c | 301 +-
crypto/crypto_user.c | 2 +-
crypto/ecc.c | 23 +-
crypto/ecdh.c | 23 +-
crypto/internal.h | 1 -
crypto/lrw.c | 154 +-
crypto/mcryptd.c | 34 +-
crypto/md4.c | 17 -
crypto/md5.c | 17 -
crypto/rsa-pkcs1pad.c | 2 +-
crypto/simd.c | 50 +
crypto/sm4_generic.c | 244 +
crypto/speck.c | 307 ++
crypto/tcrypt.c | 3 +
crypto/testmgr.c | 45 +
crypto/testmgr.h | 4766 ++++++++++++++------
crypto/xts.c | 72 -
drivers/char/hw_random/Kconfig | 7 +
drivers/char/hw_random/Makefile | 1 +
drivers/char/hw_random/bcm2835-rng.c | 2 +
drivers/char/hw_random/cavium-rng-vf.c | 2 +-
drivers/char/hw_random/cavium-rng.c | 2 +-
drivers/char/hw_random/imx-rngc.c | 2 +-
drivers/char/hw_random/ks-sa-rng.c | 257 ++
drivers/char/hw_random/mxc-rnga.c | 23 +-
drivers/char/hw_random/omap-rng.c | 22 +-
drivers/char/hw_random/stm32-rng.c | 44 +-
drivers/crypto/Kconfig | 34 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/atmel-aes.c | 8 +-
drivers/crypto/atmel-sha.c | 9 +-
drivers/crypto/atmel-tdes.c | 9 +-
drivers/crypto/bcm/cipher.c | 4 +-
drivers/crypto/bcm/util.c | 1 -
drivers/crypto/bfin_crc.c | 743 ---
drivers/crypto/bfin_crc.h | 124 -
drivers/crypto/caam/caamalg.c | 21 +-
drivers/crypto/caam/caamalg_desc.c | 165 +-
drivers/crypto/caam/caamalg_desc.h | 24 +-
drivers/crypto/caam/caamalg_qi.c | 388 +-
drivers/crypto/caam/ctrl.c | 42 +-
drivers/crypto/caam/qi.c | 11 +-
drivers/crypto/cavium/cpt/cptpf_main.c | 2 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 2 +-
drivers/crypto/ccp/ccp-crypto-rsa.c | 7 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 2 +-
drivers/crypto/ccp/ccp-debugfs.c | 7 +-
drivers/crypto/ccp/ccp-dmaengine.c | 2 +-
drivers/crypto/ccp/ccp-ops.c | 108 +-
drivers/crypto/ccp/psp-dev.c | 23 +-
drivers/crypto/ccp/sp-dev.c | 6 +-
drivers/crypto/ccree/Makefile | 7 +
drivers/crypto/ccree/cc_aead.c | 2718 +++++++++++
drivers/crypto/ccree/cc_aead.h | 109 +
drivers/crypto/ccree/cc_buffer_mgr.c | 1651 +++++++
drivers/crypto/ccree/cc_buffer_mgr.h | 71 +
drivers/crypto/ccree/cc_cipher.c | 1150 +++++
drivers/crypto/ccree/cc_cipher.h | 59 +
drivers/crypto/ccree/cc_crypto_ctx.h | 133 +
drivers/crypto/ccree/cc_debugfs.c | 101 +
drivers/crypto/ccree/cc_debugfs.h | 32 +
drivers/crypto/ccree/cc_driver.c | 518 +++
drivers/crypto/ccree/cc_driver.h | 208 +
drivers/crypto/ccree/cc_fips.c | 120 +
drivers/crypto/ccree/cc_fips.h | 36 +
drivers/crypto/ccree/cc_hash.c | 2296 ++++++++++
drivers/crypto/ccree/cc_hash.h | 109 +
drivers/crypto/ccree/cc_host_regs.h | 145 +
drivers/crypto/ccree/cc_hw_queue_defs.h | 576 +++
drivers/crypto/ccree/cc_ivgen.c | 279 ++
drivers/crypto/ccree/cc_ivgen.h | 55 +
drivers/crypto/ccree/cc_kernel_regs.h | 168 +
drivers/crypto/ccree/cc_lli_defs.h | 59 +
drivers/crypto/ccree/cc_pm.c | 122 +
drivers/crypto/ccree/cc_pm.h | 56 +
drivers/crypto/ccree/cc_request_mgr.c | 711 +++
drivers/crypto/ccree/cc_request_mgr.h | 51 +
drivers/crypto/ccree/cc_sram_mgr.c | 120 +
drivers/crypto/ccree/cc_sram_mgr.h | 65 +
drivers/crypto/chelsio/chcr_algo.c | 577 ++-
drivers/crypto/chelsio/chcr_algo.h | 11 +-
drivers/crypto/chelsio/chcr_core.h | 6 +-
drivers/crypto/chelsio/chcr_crypto.h | 31 +-
drivers/crypto/chelsio/chcr_ipsec.c | 5 +-
drivers/crypto/inside-secure/safexcel.c | 114 +-
drivers/crypto/inside-secure/safexcel.h | 22 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 5 +-
drivers/crypto/inside-secure/safexcel_hash.c | 258 +-
drivers/crypto/ixp4xx_crypto.c | 2 +
drivers/crypto/marvell/cesa.c | 1 -
drivers/crypto/mxs-dcp.c | 14 +
drivers/crypto/n2_core.c | 12 +
drivers/crypto/nx/nx-842-pseries.c | 5 +-
drivers/crypto/omap-aes.c | 112 +-
drivers/crypto/omap-aes.h | 3 +
drivers/crypto/omap-crypto.c | 4 +
drivers/crypto/omap-des.c | 24 +-
drivers/crypto/omap-sham.c | 106 +-
drivers/crypto/picoxcell_crypto.c | 2 +
drivers/crypto/qat/qat_common/qat_algs.c | 3 +
drivers/crypto/qat/qat_common/qat_asym_algs.c | 9 +-
drivers/crypto/s5p-sss.c | 34 +-
drivers/crypto/sahara.c | 6 +-
drivers/crypto/stm32/stm32-cryp.c | 964 +++-
drivers/crypto/stm32/stm32-hash.c | 41 +-
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 1 +
drivers/crypto/talitos.c | 218 +-
drivers/crypto/ux500/cryp/cryp_core.c | 14 +-
drivers/crypto/ux500/hash/hash_core.c | 18 +
drivers/crypto/virtio/Kconfig | 1 -
drivers/crypto/virtio/virtio_crypto_algs.c | 16 +-
drivers/crypto/virtio/virtio_crypto_common.h | 4 +-
drivers/crypto/virtio/virtio_crypto_core.c | 3 -
drivers/staging/ccree/Kconfig | 4 +-
drivers/staging/ccree/Makefile | 2 +-
include/crypto/ablk_helper.h | 32 -
include/crypto/algapi.h | 1 -
include/crypto/engine.h | 68 +-
include/crypto/hash.h | 11 +-
include/crypto/internal/hash.h | 5 -
include/crypto/internal/simd.h | 7 +
include/crypto/lrw.h | 44 -
include/crypto/sm4.h | 28 +
include/crypto/speck.h | 62 +
include/crypto/xts.h | 17 -
include/linux/byteorder/generic.h | 17 +
include/linux/crypto.h | 8 +
include/uapi/linux/psp-sev.h | 2 +-
184 files changed, 23716 insertions(+), 9215 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-04-28 08:05:17

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.17

Hi Linus:

This push fixes the following issues:

- Crypto API regression that may cause sporadic alloc failures.
- Double-free bug in drbg.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (1):
crypto: api - fix finding algorithm currently being tested

Stephan Mueller (1):
crypto: drbg - set freed buffers to NULL

crypto/api.c | 11 ++++++++---
crypto/drbg.c | 2 ++
2 files changed, 10 insertions(+), 3 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-05-30 16:17:04

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.17

Hi Linus:

This push fixes a potential kernel panic in the inside-secure driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine Tenart (1):
crypto: inside-secure - do not use memset on MMIO

drivers/crypto/inside-secure/safexcel.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-06-04 17:15:52

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.18

Hi Linus:

Here is the crypto update for 4.18:

API:

- Decryption test vectors are now automatically generated from
encryption test vectors.

Algorithms:

- Fix unaligned access issues in crc32/crc32c.
- Add zstd compression algorithm.
- Add AEGIS.
- Add MORUS.

Drivers:

- Add accelerated AEGIS/MORUS on x86.
- Add accelerated SM4 on arm64.
- Removed x86 assembly salsa implementation as it is slower than C.
- Add authenc(hmac(sha*), cbc(aes)) support in inside-secure.
- Add ctr(aes) support in crypto4xx.
- Add hardware key support in ccree.
- Add support for new Centaur CPU in via-rng.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Adam Langley (1):
crypto: clarify licensing of OpenSSL asm code

Antoine Tenart (10):
crypto: inside-secure - remove VLAs
crypto: inside-secure - rework cipher functions for future AEAD support
crypto: inside-secure - rework the alg type settings in the context
crypto: inside-secure - make the context control size dynamic
crypto: inside-secure - make the key and context size computation dynamic
crypto: inside-secure - fix the hash then encrypt/decrypt types
crypto: inside-secure - improve error reporting
crypto: inside-secure - authenc(hmac(sha256), cbc(aes)) support
crypto: inside-secure - authenc(hmac(sha224), cbc(aes)) support
crypto: inside-secure - authenc(hmac(sha1), cbc(aes)) support

Ard Biesheuvel (12):
crypto: sm4 - export encrypt/decrypt routines to other drivers
crypto: arm64 - add support for SM4 encryption using special instructions
crypto: arm64/sha1-ce - yield NEON after every block of input
crypto: arm64/sha2-ce - yield NEON after every block of input
crypto: arm64/aes-ccm - yield NEON after every block of input
crypto: arm64/aes-blk - yield NEON after every block of input
crypto: arm64/aes-bs - yield NEON after every block of input
crypto: arm64/aes-ghash - yield NEON after every block of input
crypto: arm64/crc32-ce - yield NEON after every block of input
crypto: arm64/crct10dif-ce - yield NEON after every block of input
crypto: arm64/sha3-ce - yield NEON after every block of input
crypto: arm64/sha512-ce - yield NEON after every block of input

Atul Gupta (7):
crypto: chelsio - request to HW should wrap
crypto: chtls - generic handling of data and hdr
crypto: chtls - key len correction
crypto: chtls - wait for memory sendmsg, sendpage
crypto: chtls - dereference null variable
crypto: chtls - kbuild warnings
crypto: chtls - free beyond end rspq_skb_cache

Bin Liu (1):
crypto: omap-sham - fix memleak

Christian Lamparter (7):
crypto: crypto4xx - performance optimizations
crypto: crypto4xx - convert to skcipher
crypto: crypto4xx - avoid VLA use
crypto: crypto4xx - add aes-ctr support
crypto: crypto4xx - properly set IV after de- and encrypt
crypto: crypto4xx - extend aead fallback checks
crypto: crypto4xx - put temporary dst sg into request ctx

Colin Ian King (5):
crypto: chelsio - don't leak information from the stack to userspace
crypto: chelsio - remove redundant assignment to cdev->ports
crypto: ghash-clmulni - fix spelling mistake: "acclerated" -> "accelerated"
hwrng: n2 - fix spelling mistake: "restesting" -> "retesting"
crypto: nx - fix spelling mistake: "seqeunce" -> "sequence"

Conor McLoughlin (1):
crypto: qat - Add MODULE_FIRMWARE for all qat drivers

Eric Biggers (13):
crypto: crc32-generic - use unaligned access macros when needed
crypto: crc32c-generic - remove cra_alignmask
crypto: crc32-generic - remove __crc32_le()
crypto: testmgr - remove bfin_crc "hmac(crc32)" test vectors
crypto: testmgr - fix testing OPTIONAL_KEY hash algorithms
crypto: testmgr - add more unkeyed crc32 and crc32c test vectors
crypto: testmgr - add extra ecb(des) encryption test vectors
crypto: testmgr - make an cbc(des) encryption test vector chunked
crypto: testmgr - add extra ecb(tnepres) encryption test vectors
crypto: testmgr - add extra kw(aes) encryption test vector
crypto: testmgr - eliminate redundant decryption test vectors
crypto: x86/salsa20 - remove x86 salsa20 implementations
crypto: salsa20 - Revert "crypto: salsa20 - export generic helpers"

Fabio Estevam (4):
crypto: caam - staticize caam_get_era()
crypto: caam - allow retrieving 'era' from register
crypto: rsa - Remove unneeded error assignment
crypto: caam: - Use kmemdup() function

Geert Uytterhoeven (1):
crypto: drivers - Remove depends on HAS_DMA in case of platform dependency

Gilad Ben-Yossef (6):
crypto: ccree - enable support for hardware keys
crypto: ccree - use proper printk format
crypto: testmgr - reorder paes test lexicographically
crypto: ccree - correct host regs offset
crypto: ccree - better clock handling
crypto: ccree - silence debug prints

Gustavo A. R. Silva (1):
crypto: chelsio - Fix potential NULL pointer dereferences

Harsh Jain (3):
crypto: chelsio - Return -ENOSPC for transient busy indication.
crypt: chelsio - Send IV as Immediate for cipher algo
crypto: chelsio - Remove separate buffer used for DMA map B0 block in CCM

Horia Geantă (8):
crypto: caam - fix DMA mapping dir for generated IV
crypto: caam - fix IV DMA mapping and updating
crypto: caam/qi - fix IV DMA mapping and updating
crypto: caam - strip input zeros from RSA input buffer
crypto: caam - fix size of RSA prime factor q
crypto: caam - fix MC firmware detection
crypto: caam - fix rfc4543 descriptors
crypto: caam/qi - fix warning in init_cgr()

Jan Glauber (5):
crypto: cavium - Fix fallout from CONFIG_VMAP_STACK
crypto: cavium - Limit result reading attempts
crypto: cavium - Prevent division by zero
crypto: cavium - Fix statistics pending request value
crypto: cavium - Fix smp_processor_id() warnings

Janakarajan Natarajan (2):
crypto: ccp - Add DOWNLOAD_FIRMWARE SEV command
crypto: ccp - Add GET_ID SEV command

Kees Cook (2):
crypto: ecc - Actually remove stack VLA usage
crypto: tcrypt - Remove VLA usage

Mahipal Challa (1):
crypto: testmgr - Allow different compression results

Michael Ellerman (2):
crypto: vmx - Remove overly verbose printk from AES init routines
crypto: vmx - Remove overly verbose printk from AES XTS init

Nick Terrell (1):
crypto: zstd - Add zstd support

Ondrej Mosnacek (9):
crypto: aegis - Add generic AEGIS AEAD implementations
crypto: testmgr - Add test vectors for AEGIS
crypto: x86 - Add optimized AEGIS implementations
crypto: morus - Add generic MORUS AEAD implementations
crypto: testmgr - Add test vectors for MORUS
crypto: morus - Add common SIMD glue code for MORUS
crypto: x86 - Add optimized MORUS implementations
crypto: x86/aegis256 - Fix wrong key buffer size
crypto: morus - Mark MORUS SIMD glue as x86-specific

Salvatore Mesoraca (2):
crypto: api - laying defines and checks for statically allocated buffers
crypto: remove several VLAs

Tudor-Dan Ambarus (2):
crypto: authenc - don't leak pointers to authenc keys
crypto: authencesn - don't leak pointers to authenc keys

Varsha Rao (1):
crypto: cavium - Remove unnecessary parentheses

Wenwen Wang (1):
crypto: chtls - fix a missing-check bug

Wolfram Sang (1):
crypto: drivers - simplify getting .drvdata

davidwang (1):
hwrng: via - support new Centaur CPU

[email protected] (2):
hwrng: stm32 - define default state for rng driver
hwrng: stm32 - fix pm_suspend issue

arch/arm/crypto/sha1-armv4-large.S | 10 +
arch/arm/crypto/sha256-armv4.pl | 11 +-
arch/arm/crypto/sha256-core.S_shipped | 11 +-
arch/arm/crypto/sha512-armv4.pl | 11 +-
arch/arm/crypto/sha512-core.S_shipped | 11 +-
arch/arm64/crypto/Kconfig | 6 +
arch/arm64/crypto/Makefile | 3 +
arch/arm64/crypto/aes-ce-ccm-core.S | 150 +-
arch/arm64/crypto/aes-ce.S | 15 +-
arch/arm64/crypto/aes-modes.S | 331 +-
arch/arm64/crypto/aes-neonbs-core.S | 305 +-
arch/arm64/crypto/crc32-ce-core.S | 40 +-
arch/arm64/crypto/crct10dif-ce-core.S | 32 +-
arch/arm64/crypto/ghash-ce-core.S | 113 +-
arch/arm64/crypto/ghash-ce-glue.c | 28 +-
arch/arm64/crypto/sha1-ce-core.S | 42 +-
arch/arm64/crypto/sha2-ce-core.S | 37 +-
arch/arm64/crypto/sha256-core.S_shipped | 12 +-
arch/arm64/crypto/sha3-ce-core.S | 77 +-
arch/arm64/crypto/sha512-armv8.pl | 12 +-
arch/arm64/crypto/sha512-ce-core.S | 27 +-
arch/arm64/crypto/sha512-core.S_shipped | 12 +-
arch/arm64/crypto/sm4-ce-core.S | 36 +
arch/arm64/crypto/sm4-ce-glue.c | 73 +
arch/x86/crypto/Makefile | 25 +-
arch/x86/crypto/aegis128-aesni-asm.S | 749 +
arch/x86/crypto/aegis128-aesni-glue.c | 407 +
arch/x86/crypto/aegis128l-aesni-asm.S | 825 +
arch/x86/crypto/aegis128l-aesni-glue.c | 407 +
arch/x86/crypto/aegis256-aesni-asm.S | 702 +
arch/x86/crypto/aegis256-aesni-glue.c | 407 +
arch/x86/crypto/ghash-clmulni-intel_glue.c | 2 +-
arch/x86/crypto/morus1280-avx2-asm.S | 621 +
arch/x86/crypto/morus1280-avx2-glue.c | 68 +
arch/x86/crypto/morus1280-sse2-asm.S | 895 +
arch/x86/crypto/morus1280-sse2-glue.c | 68 +
arch/x86/crypto/morus1280_glue.c | 302 +
arch/x86/crypto/morus640-sse2-asm.S | 614 +
arch/x86/crypto/morus640-sse2-glue.c | 68 +
arch/x86/crypto/morus640_glue.c | 298 +
arch/x86/crypto/salsa20-i586-asm_32.S | 938 -
arch/x86/crypto/salsa20-x86_64-asm_64.S | 805 -
arch/x86/crypto/salsa20_glue.c | 91 -
crypto/Kconfig | 138 +-
crypto/Makefile | 6 +
crypto/aegis.h | 80 +
crypto/aegis128.c | 463 +
crypto/aegis128l.c | 527 +
crypto/aegis256.c | 478 +
crypto/algapi.c | 10 +
crypto/authenc.c | 1 +
crypto/authencesn.c | 1 +
crypto/cfb.c | 7 +-
crypto/cipher.c | 3 +-
crypto/crc32_generic.c | 15 +-
crypto/crc32c_generic.c | 8 +-
crypto/ctr.c | 4 +-
crypto/cts.c | 5 +-
crypto/ecc.c | 66 +-
crypto/ecc.h | 4 +-
crypto/ecdh.c | 4 +-
crypto/morus1280.c | 549 +
crypto/morus640.c | 544 +
crypto/pcbc.c | 5 +-
crypto/rsa.c | 1 -
crypto/salsa20_generic.c | 20 +-
crypto/sm4_generic.c | 10 +-
crypto/tcrypt.c | 122 +-
crypto/testmgr.c | 613 +-
crypto/testmgr.h |47127 +++++++++++-------------
crypto/zstd.c | 265 +
drivers/char/hw_random/Kconfig | 1 +
drivers/char/hw_random/n2-drv.c | 2 +-
drivers/char/hw_random/stm32-rng.c | 9 +-
drivers/char/hw_random/via-rng.c | 2 +-
drivers/crypto/Kconfig | 16 +-
drivers/crypto/amcc/crypto4xx_alg.c | 231 +-
drivers/crypto/amcc/crypto4xx_core.c | 317 +-
drivers/crypto/amcc/crypto4xx_core.h | 35 +-
drivers/crypto/caam/caamalg.c | 231 +-
drivers/crypto/caam/caamalg_desc.c | 4 +-
drivers/crypto/caam/caamalg_qi.c | 227 +-
drivers/crypto/caam/caampkc.c | 71 +-
drivers/crypto/caam/caampkc.h | 8 +
drivers/crypto/caam/ctrl.c | 78 +-
drivers/crypto/caam/ctrl.h | 2 -
drivers/crypto/caam/intern.h | 1 +
drivers/crypto/caam/qi.c | 5 +-
drivers/crypto/caam/regs.h | 6 +
drivers/crypto/cavium/zip/common.h | 21 +
drivers/crypto/cavium/zip/zip_crypto.c | 22 +-
drivers/crypto/cavium/zip/zip_deflate.c | 4 +-
drivers/crypto/cavium/zip/zip_device.c | 4 +-
drivers/crypto/cavium/zip/zip_inflate.c | 4 +-
drivers/crypto/cavium/zip/zip_main.c | 24 +-
drivers/crypto/cavium/zip/zip_main.h | 1 -
drivers/crypto/cavium/zip/zip_regs.h | 42 +-
drivers/crypto/ccp/psp-dev.c | 143 +-
drivers/crypto/ccp/psp-dev.h | 4 +
drivers/crypto/ccree/cc_cipher.c | 350 +-
drivers/crypto/ccree/cc_cipher.h | 30 +-
drivers/crypto/ccree/cc_debugfs.c | 7 +-
drivers/crypto/ccree/cc_driver.c | 36 +-
drivers/crypto/ccree/cc_driver.h | 2 +
drivers/crypto/ccree/cc_host_regs.h | 6 +-
drivers/crypto/chelsio/chcr_algo.c | 303 +-
drivers/crypto/chelsio/chcr_algo.h | 3 +-
drivers/crypto/chelsio/chcr_core.h | 2 +-
drivers/crypto/chelsio/chcr_crypto.h | 15 +-
drivers/crypto/chelsio/chcr_ipsec.c | 35 +-
drivers/crypto/chelsio/chtls/chtls.h | 11 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 28 +-
drivers/crypto/chelsio/chtls/chtls_hw.c | 6 +-
drivers/crypto/chelsio/chtls/chtls_io.c | 158 +-
drivers/crypto/chelsio/chtls/chtls_main.c | 16 +-
drivers/crypto/exynos-rng.c | 6 +-
drivers/crypto/inside-secure/safexcel.c | 32 +
drivers/crypto/inside-secure/safexcel.h | 44 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 642 +-
drivers/crypto/inside-secure/safexcel_hash.c | 23 +-
drivers/crypto/nx/nx-842-powernv.c | 2 +-
drivers/crypto/omap-sham.c | 2 +-
drivers/crypto/picoxcell_crypto.c | 6 +-
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 2 +
drivers/crypto/qat/qat_c62x/adf_drv.c | 2 +
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 1 +
drivers/crypto/vmx/aes.c | 2 -
drivers/crypto/vmx/aes_cbc.c | 3 -
drivers/crypto/vmx/aes_ctr.c | 2 -
drivers/crypto/vmx/aes_xts.c | 2 -
drivers/crypto/vmx/aesp8-ppc.pl | 49 +-
drivers/crypto/vmx/ghash.c | 2 -
drivers/crypto/vmx/ghashp8-ppc.pl | 9 +
include/crypto/algapi.h | 8 +
include/crypto/morus1280_glue.h | 137 +
include/crypto/morus640_glue.h | 137 +
include/crypto/morus_common.h | 23 +
include/crypto/salsa20.h | 27 -
include/crypto/sm4.h | 3 +
include/linux/psp-sev.h | 23 +
include/uapi/linux/psp-sev.h | 12 +
141 files changed, 34902 insertions(+), 29595 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-06-22 14:54:03

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.18

Hi Linus:

This push fixes the following issues:

- Fix use after free in chtls.
- Fix RBP breakage in sha3.
- Fix use after free in hwrng_unregister.
- Fix overread in morus640.
- Move sleep out of kernel_neon in arm64/aes-blk.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Dan Carpenter (1):
crypto: chtls - use after free in chtls_pt_recvmsg()

Dmitry Vyukov (1):
crypto: don't optimize keccakf()

Jia He (1):
crypto: arm64/aes-blk - fix and move skcipher_walk_done out of kernel_neon_begin, _end

Michael Büsch (1):
hwrng: core - Always drop the RNG in hwrng_unregister()

Ondrej Mosnáček (1):
crypto: morus640 - Fix out-of-bounds access

arch/arm64/crypto/aes-glue.c | 2 +-
crypto/morus640.c | 3 ++-
crypto/sha3_generic.c | 2 +-
drivers/char/hw_random/core.c | 11 +++++++++--
drivers/crypto/chelsio/chtls/chtls_io.c | 5 ++---
5 files changed, 15 insertions(+), 8 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-07-08 16:20:35

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.18

Hi Linus:

This push fixes the following issues:

- Add missing RETs in x86 aegis/morus.
- Fix build error in arm speck.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Borislav Petkov (1):
crypto: x86 - Add missing RETs

Eric Biggers (1):
crypto: arm/speck - fix building in Thumb2 mode

arch/arm/crypto/speck-neon-core.S | 6 ++++--
arch/x86/crypto/aegis128-aesni-asm.S | 1 +
arch/x86/crypto/aegis128l-aesni-asm.S | 1 +
arch/x86/crypto/aegis256-aesni-asm.S | 1 +
arch/x86/crypto/morus1280-avx2-asm.S | 1 +
arch/x86/crypto/morus1280-sse2-asm.S | 1 +
arch/x86/crypto/morus640-sse2-asm.S | 1 +
7 files changed, 10 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-07-08 18:31:16

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.18

On Sun, Jul 8, 2018 at 9:20 AM Herbert Xu <[email protected]> wrote:
>
> - Add missing RETs in x86 aegis/morus.

Side note - I queried earlier during the discussion about this: how
was this code taken despite having clearly never tested on _anything_?

That's a serious question. Code that simply has never had any testing
AT ALL should not have gotten in.

The use of 'int3' in padding showed the issue, but I don't believe the
code could possibly have worked with the nops and fallthroughs.

Linus

2018-07-09 09:47:42

by Ondrej Mosnáček

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.18

Hi Linus,

ne 8. 7. 2018 o 20:32 Linus Torvalds <[email protected]> napísal(a):
>
> On Sun, Jul 8, 2018 at 9:20 AM Herbert Xu <[email protected]> wrote:
> >
> > - Add missing RETs in x86 aegis/morus.
>
> Side note - I queried earlier during the discussion about this: how
> was this code taken despite having clearly never tested on _anything_?
>
> That's a serious question. Code that simply has never had any testing
> AT ALL should not have gotten in.

I did test the code using the included test vectors (and I found and
resolved lots of issues before submitting the patches thanks to that).
A good deal of the test vectors actually do trigger the code path that
calls the buggy function, so somehow it must have been working despite
the bug (see below).

> The use of 'int3' in padding showed the issue, but I don't believe the
> code could possibly have worked with the nops and fallthroughs.

I just looked at the disassembly of the function and its surroundings
(as compiled by my testing environment) and it seems that by a curious
but logical coincidence, the code actually *did* work and without any
side effects (other than executing a few useless instructions before
returning).

This is what the C signatures of the relevant functions look like (for
aegis128, the other cases are analogical):

asmlinkage void crypto_aegis128_aesni_enc_tail(
void *state, unsigned int length, const void *src, void *dst);

asmlinkage void crypto_aegis128_aesni_dec(
void *state, unsigned int length, const void *src, void *dst);

Notice that these two functions have identical signatures, this will
be important later. Now, the disassembly for
crypto_aegis128_aesni_enc_tail looks roughly like this:

0000000000000950 <crypto_aegis128_aesni_enc_tail>:
[some code...]
9c3: 0f 1f 00 nopl (%rax)
9c6: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1)
9cd: 00 00 00

00000000000009d0 <crypto_aegis128_aesni_dec>:
9d0: 48 83 fe 10 cmp $0x10,%rsi
9d4: 0f 82 c3 03 00 00 jb d9d <crypto_aegis128_aesni_dec+0x3cd>
[some code...]
d9d: c3 retq # <---
<crypto_aegis128_aesni_dec+0x3cd> is here
d9e: 66 90 xchg %ax,%ax

So... thanks to the NOP padding, the control after the end of the
_enc_tail function walks right into the _dec function. This looks
scary at first glance, but here we are "saved" by the combination of
the following:
1. The second argument of the _enc_tail function (length; passed via
%rsi) is implictly always less than the block size (16 or 32 bytes).
2. The second argument of the _dec function (length; also passed via
%rsi) is checked to be greater than or equal to the block size (16 or
32 bytes); if it is less, then the function does nothing and just
returns.
3. _enc_tail does not modify the value in %rsi.

In conclusion, the bug remained undiscovered not because of lack of
testing, but because by sheer luck it was "working" anyway...

Sorry for introducing this (and other) bugs that had to be fixed
post-merging (I am the one who wrote the code). It is a lot of new
code that is hard to review, as it contains a lot of repetitive
boilerplate and assembly code.

Cheers,
Ondrej

2018-07-09 15:52:49

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.18

On Mon, Jul 9, 2018 at 2:47 AM Ondrej Mosnáček
<[email protected]> wrote:
>
> In conclusion, the bug remained undiscovered not because of lack of
> testing, but because by sheer luck it was "working" anyway...

Thanks for checking this out. That makes me a lot happier about this
whole thing.

Linus

2018-07-19 07:39:31

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.18

Hi Linus:

This push fixes an allocation error-path bug in af_alg discovered by
syzkaller.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Stephan Mueller (1):
crypto: af_alg - Initialize sg_num_bytes in error code path

crypto/af_alg.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-08-03 05:44:20

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.18

Hi Linus:

This push fixes memory corruption in the padlock-aes driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
crypto: padlock-aes - Fix Nano workaround data corruption

drivers/crypto/padlock-aes.c | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-08-09 05:47:09

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.18

Hi Linus:

This push fixes a performance regression in arm64 NEON crypto as
well as a crash in x86 aegis/morus on unsupported CPUs.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (1):
crypto: arm64 - revert NEON yield for fast AEAD implementations

Ondrej Mosnacek (1):
crypto: x86/aegis,morus - Fix and simplify CPUID checks

arch/arm64/crypto/aes-ce-ccm-core.S | 150 ++++++++++++--------------------
arch/arm64/crypto/ghash-ce-core.S | 76 ++++++----------
arch/x86/crypto/aegis128-aesni-glue.c | 12 +--
arch/x86/crypto/aegis128l-aesni-glue.c | 12 +--
arch/x86/crypto/aegis256-aesni-glue.c | 12 +--
arch/x86/crypto/morus1280-avx2-glue.c | 10 +--
arch/x86/crypto/morus1280-sse2-glue.c | 10 +--
arch/x86/crypto/morus640-sse2-glue.c | 10 +--
8 files changed, 101 insertions(+), 191 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-08-15 12:05:46

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.19

Hi Linus:

Here is the crypto update for 4.19:

API:

- Fix dcache flushing crash in skcipher.
- Add hash finup self-tests.
- Reschedule during speed tests.

Algorithms:

- Remove insecure vmac and replace it with vmac64.
- Add public key verification for DH/ECDH.

Drivers:

- Decrease priority of sha-mb on x86.
- Improve NEON latency/throughput on ARM64.
- Add md5/sha384/sha512/des/3des to inside-secure.
- Support eip197d in inside-secure.
- Only register algorithms supported by the host in virtio.
- Add cts and remove incompatible cts1 from ccree.
- Add hisilicon SEC security accelerator driver.
- Replace msm hwrng driver with qcom pseudo rng driver.

Misc:

- Centralise CRC polynomials.

Please note that there are conflicts between the crypto tree and
the staging tree due to the removal of skein, to resolve that
conflict simply remove skein as is done in the staging tree.

There is also a conflict with the net tree because of changes in
CRC code that was touched in both trees. To resolve this conflict,
simply use the net tree version of the driver but remove the CRC
polynomial macros as is done in the crypto tree.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine Tenart (19):
crypto: inside-secure - use the error handler for invalidation requests
crypto: inside-secure - improve the counter computation
crypto: sha512_generic - add a sha512 0-length pre-computed hash
crypto: inside-secure - sha512 support
crypto: inside-secure - hmac(sha512) support
crypto: inside-secure - authenc(hmac(sha512), cbc(aes)) support
crypto: sha512_generic - add a sha384 0-length pre-computed hash
crypto: inside-secure - sha384 support
crypto: inside-secure - hmac(sha384) support
crypto: inside-secure - authenc(hmac(sha384), cbc(aes)) support
crypto: inside-secure - move the firmware to a better location
crypto: inside-secure - use precise compatibles
Documentation/bindings: crypto: inside-secure: update the compatibles
crypto: inside-secure - filter out the algorithms by engine
crypto: inside-secure - add an invalidation flag
crypto: inside-secure - eip197d support
Documentation/bindings: crypto: inside-secure: eip197d support
crypto: inside-secure - switch to SPDX identifiers
crypto: inside-secure - initialize first_rdesc to make GCC happy

Ard Biesheuvel (5):
crypto: arm64/aes-ce-gcm - operate on two input blocks at a time
crypto: arm64/aes-ce-gcm - implement 2-way aggregation
crypto: arm64/aes-ce-gcm - don't reload key schedule if avoidable
crypto: arm64/ghash-ce - replace NEON yield check with block limit
crypto: arm64/ghash-ce - implement 4-way aggregation

Colin Ian King (3):
lib/mpi: remove redundant variable esign
crypto: aegis - fix indentation of a statement
crypto: cavium - make structure algs static

Denis Efremov (1):
crypto: skcipher - remove the exporting of skcipher_walk_next

Eric Biggers (27):
crypto: vmac - require a block cipher with 128-bit block size
crypto: vmac - separate tfm and request context
crypto: vmac - add nonced version with big endian digest
crypto: vmac - remove insecure version with hardcoded nonce
crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2()
crypto: MAINTAINERS - fix file path for SHA multibuffer code
crypto: sha1_generic - add cra_priority
crypto: sha256_generic - add cra_priority
crypto: sha512_generic - add cra_priority
crypto: x86/sha-mb - decrease priority of multibuffer algorithms
crypto: shash - remove useless setting of type flags
crypto: ahash - remove useless setting of type flags
crypto: ahash - remove useless setting of cra_type
crypto: aead - remove useless setting of type flags
crypto: skcipher - remove useless setting of type flags
crypto: remove redundant type flags from tfm allocation
crypto: arm64/sha256 - increase cra_priority of scalar implementations
crypto: skcipher - fix aligning block size in skcipher_copy_iv()
crypto: scatterwalk - remove 'chain' argument from scatterwalk_crypto_chain()
crypto: scatterwalk - remove scatterwalk_samebuf()
crypto: skcipher - remove unnecessary setting of walk->nbytes
crypto: skcipher - fix crash flushing dcache in error path
crypto: blkcipher - fix crash flushing dcache in error path
crypto: ablkcipher - fix crash flushing dcache in error path
crypto: arm/chacha20 - always use vrev for 16-bit rotates
crypto: dh - fix calculating encoded key size
crypto: dh - make crypto_dh_encode_key() make robust

Farhan Ali (2):
crypto: virtio - Read crypto services and algorithm masks
crypto: virtio - Register an algo only if it's supported

Gilad Ben-Yossef (9):
crypto: testmgr - add hash finup tests
crypto: ccree - fix iv handling
crypto: ccree - remove dead legacy code
crypto: ccree - use CBC-CS3 CTS mode
crypto: ccree - rate limit debug print
crypto: ccree - drop useless type flag during reg
crypto: ccree - remove cipher ivgen left overs
crypto: ccree - zero all of request ctx before use
crypto: ccree - allow bigger than sector XTS op

Gustavo A. R. Silva (4):
crypto: chtls - use 64-bit arithmetic instead of 32-bit
crypto: dh - fix memory leak
crypto: rmd256 - use swap macro in rmd256_transform
crypto: rmd320 - use swap macro in rmd320_transform

Hadar Gat (1):
crypto: ccree - fix finup

Herbert Xu (2):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Horia Geantă (1):
crypto: tcrypt - reschedule during speed tests

Jia-Ju Bai (3):
crypto: cavium/nitrox - Replace GFP_ATOMIC with GFP_KERNEL in crypto_alloc_context()
crypto: qat/adf_aer - Replace GFP_ATOMIC with GFP_KERNEL in adf_dev_aer_schedule_reset()
crypto: virtio - Replace GFP_ATOMIC with GFP_KERNEL in __virtio_crypto_ablkcipher_do_req()

Jonathan Cameron (3):
dt-bindings: Add bindings for Hisilicon SEC crypto accelerators.
crypto: hisilicon - SEC security accelerator driver
arm64: dts: hisi: add SEC crypto accelerator nodes for hip07 SoC

Krzysztof Kozlowski (6):
lib/crc: Move polynomial definition to separate header
lib/crc: Use consistent naming for CRC-32 polynomials
crypto: stm32_crc32 - Use existing define with polynomial
net: ethernet: Use existing define with polynomial
staging: rtl: Use existing define with polynomial
lib: Use existing define with polynomial

Michael Müller (1):
crypto: sharah - Unregister correct algorithms for SAHARA 3

Ofer Heifetz (11):
crypto: inside-secure - increase minimum transfer size
crypto: inside-secure - dynamic ring configuration allocation
crypto: inside-secure - add multiple processing engine support
crypto: inside-secure - adjust the TRC configuration for EIP197D
crypto: inside-secure - reset CDR and RDR rings on module removal
crypto: inside-secure - set tx_max_cmd_queue to 32
crypto: inside-secure - md5 support
crypto: inside-secure - hmac(md5) support
crypto: inside-secure - ecb(des) and cbc(des) support
crypto: inside-secure - ecb(des3_ede) and cbc(des3_ede) support
crypto: inside-secure - remove request list to improve performance

Stafford Horne (1):
crypto: skcipher - Fix -Wstringop-truncation warnings

Stephan Mueller (5):
crypto: ecdh - add public key verification test
crypto: dh - add public key verification test
crypto: drbg - eliminate constant reinitialization of SGL
crypto: dh - update test for public key verification
crypto: ecdh - fix typo of P-192 b value

Stephan Müller (1):
crypto: drbg - in-place cipher operation for CTR

Timur Tabi (1):
crypto: qcom-rng - Add ACPI support

Tom Lendacky (6):
crypto: ccp - Fix command completion detection race
crypto: ccp - Add psp enabled message when initialization succeeds
crypto: ccp - Remove unused #defines
crypto: ccp - Support register differences between PSP devices
crypto: ccp - Add support for new CCP/PSP device ID
crypto: ccp - Check for NULL PSP pointer at module unload

Tudor-Dan Ambarus (2):
crypto: atmel-ecc - fix to allow multi segment scatterlists
crypto: atmel-ecc - remove overly verbose dev_info

Vinod Koul (5):
hwrng: msm - remove msm hw_random driver
dt-bindings: crypto: Move prng binding to crypto
crypto: qcom-rng - Add Qcom prng driver
dt-bindings: crypto: Add new compatible qcom, prng-ee
crypto: qcom-rng - Add support for prng-ee

kbuild test robot (1):
crypto: hisilicon - sec_send_request() can be static

[email protected] (3):
crypto: stm32/cryp - Add power management support
crypto: stm32/hash - Add power management support
crypto: stm32/crc - Add power management support

Documentation/crypto/api-samples.rst | 2 +-
.../bindings/crypto/hisilicon,hip07-sec.txt | 67 +
.../bindings/crypto/inside-secure-safexcel.txt | 15 +-
.../bindings/{rng => crypto}/qcom,prng.txt | 4 +-
MAINTAINERS | 2 +-
arch/arm/crypto/chacha20-neon-core.S | 10 +-
arch/arm/crypto/ghash-ce-glue.c | 5 +-
arch/arm/crypto/sha1-ce-glue.c | 1 -
arch/arm/crypto/sha1_glue.c | 1 -
arch/arm/crypto/sha1_neon_glue.c | 1 -
arch/arm/crypto/sha2-ce-glue.c | 2 -
arch/arm/crypto/sha256_glue.c | 2 -
arch/arm/crypto/sha256_neon_glue.c | 2 -
arch/arm/crypto/sha512-glue.c | 2 -
arch/arm/crypto/sha512-neon-glue.c | 2 -
arch/arm64/boot/dts/hisilicon/hip07.dtsi | 284 +++++
arch/arm64/crypto/aes-glue.c | 3 -
arch/arm64/crypto/ghash-ce-core.S | 271 ++--
arch/arm64/crypto/ghash-ce-glue.c | 204 +--
arch/arm64/crypto/sha1-ce-glue.c | 1 -
arch/arm64/crypto/sha2-ce-glue.c | 2 -
arch/arm64/crypto/sha256-glue.c | 8 +-
arch/arm64/crypto/sha3-ce-glue.c | 4 -
arch/arm64/crypto/sha512-ce-glue.c | 2 -
arch/arm64/crypto/sha512-glue.c | 2 -
arch/arm64/crypto/sm3-ce-glue.c | 1 -
arch/mips/cavium-octeon/crypto/octeon-md5.c | 1 -
arch/mips/cavium-octeon/crypto/octeon-sha1.c | 1 -
arch/mips/cavium-octeon/crypto/octeon-sha256.c | 2 -
arch/mips/cavium-octeon/crypto/octeon-sha512.c | 2 -
arch/powerpc/crypto/md5-glue.c | 1 -
arch/powerpc/crypto/sha1-spe-glue.c | 1 -
arch/powerpc/crypto/sha1.c | 1 -
arch/powerpc/crypto/sha256-spe-glue.c | 2 -
arch/s390/crypto/aes_s390.c | 1 -
arch/s390/crypto/ghash_s390.c | 1 -
arch/s390/crypto/sha1_s390.c | 1 -
arch/s390/crypto/sha256_s390.c | 2 -
arch/s390/crypto/sha512_s390.c | 2 -
arch/sparc/crypto/md5_glue.c | 1 -
arch/sparc/crypto/sha1_glue.c | 1 -
arch/sparc/crypto/sha256_glue.c | 2 -
arch/sparc/crypto/sha512_glue.c | 2 -
arch/x86/crypto/ghash-clmulni-intel_glue.c | 6 +-
arch/x86/crypto/poly1305_glue.c | 1 -
arch/x86/crypto/sha1-mb/sha1_mb.c | 17 +-
arch/x86/crypto/sha1_ssse3_glue.c | 4 -
arch/x86/crypto/sha256-mb/sha256_mb.c | 18 +-
.../crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S | 2 +-
arch/x86/crypto/sha256_ssse3_glue.c | 8 -
arch/x86/crypto/sha512-mb/sha512_mb.c | 18 +-
arch/x86/crypto/sha512_ssse3_glue.c | 6 -
crypto/ablkcipher.c | 59 +-
crypto/aegis128.c | 1 -
crypto/aegis128l.c | 3 +-
crypto/aegis256.c | 1 -
crypto/blkcipher.c | 55 +-
crypto/crypto_null.c | 1 -
crypto/dh.c | 66 +-
crypto/dh_helper.c | 43 +-
crypto/drbg.c | 39 +-
crypto/ecc.c | 42 +-
crypto/ecc_curve_defs.h | 22 +-
crypto/ghash-generic.c | 1 -
crypto/lrw.c | 4 +-
crypto/md4.c | 1 -
crypto/md5.c | 1 -
crypto/morus1280.c | 1 -
crypto/morus640.c | 1 -
crypto/poly1305_generic.c | 1 -
crypto/rmd128.c | 1 -
crypto/rmd160.c | 1 -
crypto/rmd256.c | 11 +-
crypto/rmd320.c | 13 +-
crypto/scatterwalk.c | 2 +-
crypto/sha1_generic.c | 2 +-
crypto/sha256_generic.c | 4 +-
crypto/sha3_generic.c | 4 -
crypto/sha512_generic.c | 26 +-
crypto/skcipher.c | 57 +-
crypto/sm3_generic.c | 1 -
crypto/tcrypt.c | 38 +-
crypto/testmgr.c | 59 +-
crypto/testmgr.h | 233 ++--
crypto/tgr192.c | 3 -
crypto/vmac.c | 444 ++++---
crypto/wp512.c | 3 -
crypto/xts.c | 4 +-
drivers/char/hw_random/Kconfig | 13 -
drivers/char/hw_random/Makefile | 1 -
drivers/char/hw_random/msm-rng.c | 183 ---
drivers/crypto/Kconfig | 15 +
drivers/crypto/Makefile | 2 +
drivers/crypto/amcc/crypto4xx_core.c | 18 +-
drivers/crypto/atmel-ecc.c | 35 +-
drivers/crypto/atmel-sha.c | 4 +-
drivers/crypto/axis/artpec6_crypto.c | 28 +-
drivers/crypto/bcm/cipher.c | 8 +-
drivers/crypto/caam/caamhash.c | 3 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 2 +-
drivers/crypto/cavium/nitrox/nitrox_lib.c | 2 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 3 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 3 +-
drivers/crypto/ccp/psp-dev.c | 35 +-
drivers/crypto/ccp/psp-dev.h | 19 +-
drivers/crypto/ccp/sp-dev.h | 7 +-
drivers/crypto/ccp/sp-pci.c | 36 +-
drivers/crypto/ccree/cc_aead.c | 16 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 8 +-
drivers/crypto/ccree/cc_cipher.c | 170 +--
drivers/crypto/ccree/cc_cipher.h | 1 -
drivers/crypto/ccree/cc_driver.c | 4 +-
drivers/crypto/ccree/cc_driver.h | 1 -
drivers/crypto/ccree/cc_hash.c | 85 +-
drivers/crypto/chelsio/chcr_algo.c | 7 +-
drivers/crypto/chelsio/chtls/chtls_hw.c | 2 +-
drivers/crypto/hisilicon/Kconfig | 14 +
drivers/crypto/hisilicon/Makefile | 2 +
drivers/crypto/hisilicon/sec/Makefile | 3 +
drivers/crypto/hisilicon/sec/sec_algs.c | 1122 +++++++++++++++++
drivers/crypto/hisilicon/sec/sec_drv.c | 1323 ++++++++++++++++++++
drivers/crypto/hisilicon/sec/sec_drv.h | 428 +++++++
drivers/crypto/inside-secure/safexcel.c | 474 ++++---
drivers/crypto/inside-secure/safexcel.h | 201 +--
drivers/crypto/inside-secure/safexcel_cipher.c | 492 ++++++--
drivers/crypto/inside-secure/safexcel_hash.c | 560 +++++++--
drivers/crypto/inside-secure/safexcel_ring.c | 63 +-
drivers/crypto/marvell/hash.c | 3 +-
drivers/crypto/n2_core.c | 3 +-
drivers/crypto/nx/nx-aes-xcbc.c | 1 -
drivers/crypto/nx/nx-sha256.c | 1 -
drivers/crypto/nx/nx-sha512.c | 1 -
drivers/crypto/omap-sham.c | 36 +-
drivers/crypto/padlock-sha.c | 8 +-
drivers/crypto/qat/qat_common/adf_aer.c | 2 +-
drivers/crypto/qce/sha.c | 3 +-
drivers/crypto/qcom-rng.c | 229 ++++
drivers/crypto/s5p-sss.c | 9 +-
drivers/crypto/sahara.c | 10 +-
drivers/crypto/stm32/stm32-cryp.c | 62 +
drivers/crypto/stm32/stm32-hash.c | 95 +-
drivers/crypto/stm32/stm32_crc32.c | 71 +-
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 20 +-
drivers/crypto/talitos.c | 37 +-
drivers/crypto/ux500/hash/hash_core.c | 15 +-
drivers/crypto/virtio/virtio_crypto_algs.c | 116 +-
drivers/crypto/virtio/virtio_crypto_common.h | 25 +-
drivers/crypto/virtio/virtio_crypto_core.c | 29 +
drivers/crypto/virtio/virtio_crypto_mgr.c | 81 +-
drivers/crypto/vmx/ghash.c | 2 +-
drivers/net/ethernet/amd/xgbe/xgbe-dev.c | 4 +-
drivers/net/ethernet/apple/bmac.c | 8 +-
drivers/net/ethernet/broadcom/tg3.c | 3 +-
drivers/net/ethernet/freescale/fec_main.c | 4 +-
drivers/net/ethernet/freescale/fs_enet/fec.h | 3 -
drivers/net/ethernet/freescale/fs_enet/mac-fec.c | 3 +-
drivers/net/ethernet/micrel/ks8851_mll.c | 3 +-
drivers/net/ethernet/synopsys/dwc-xlgmac-hw.c | 4 +-
drivers/staging/rtl8712/rtl871x_security.c | 5 +-
drivers/staging/rtl8723bs/core/rtw_security.c | 5 +-
drivers/staging/skein/skein_generic.c | 3 -
include/crypto/dh.h | 4 +
include/crypto/drbg.h | 3 +-
include/crypto/scatterwalk.h | 15 +-
include/crypto/sha.h | 4 +
include/crypto/vmac.h | 63 -
include/linux/crc32poly.h | 20 +
lib/crc32.c | 11 +-
lib/crc32defs.h | 14 -
lib/decompress_bunzip2.c | 3 +-
lib/gen_crc32table.c | 5 +-
lib/mpi/mpi-pow.c | 3 +-
lib/xz/xz_crc32.c | 3 +-
net/tls/tls_device_fallback.c | 2 +-
security/keys/dh.c | 2 +-
175 files changed, 6690 insertions(+), 2011 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-08-29 03:33:53

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.19

Hi Linus:

This push fixes the following issues:

- Check for the right CPU feature bit in sm4-ce on arm64.
- Fix scatterwalk WARN_ON in aes-gcm-ce on arm64.
- Fix unaligned fault in aesni on x86.
- Fix potential NULL pointer dereference on exit in chtls.
- Fix DMA mapping direction for RSA in caam.
- Fix error path return value for xts setkey in caam.
- Fix address endianness when DMA unmapping in caam.
- Fix sleep-in-atomic in vmx.
- Fix command corruption when queue is full in cavium/nitrox.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (2):
crypto: arm64/sm4-ce - check for the right CPU feature bit
crypto: arm64/aes-gcm-ce - fix scatterwalk API violation

Dave Watson (1):
crypto: aesni - Use unaligned loads from gcm_context_data

Ganesh Goudar (1):
crypto: chtls - fix null dereference chtls_free_uld()

Horia Geantă (3):
crypto: caam/jr - fix descriptor DMA unmapping
crypto: caam/qi - fix error path in xts setkey
crypto: caam - fix DMA mapping direction for RSA forms 2 & 3

Ondrej Mosnacek (1):
crypto: vmx - Fix sleep-in-atomic bugs

Srikanth Jampala (1):
crypto: cavium/nitrox - fix for command corruption in queue full case with backlog submissions.

arch/arm64/crypto/ghash-ce-glue.c | 29 ++++++++---
arch/arm64/crypto/sm4-ce-glue.c | 2 +-
arch/x86/crypto/aesni-intel_asm.S | 66 +++++++++++++-------------
drivers/crypto/caam/caamalg_qi.c | 6 +--
drivers/crypto/caam/caampkc.c | 20 ++++----
drivers/crypto/caam/jr.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_dev.h | 3 +-
drivers/crypto/cavium/nitrox/nitrox_lib.c | 1 +
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 57 ++++++++++++----------
drivers/crypto/chelsio/chtls/chtls.h | 5 ++
drivers/crypto/chelsio/chtls/chtls_main.c | 7 ++-
drivers/crypto/vmx/aes_cbc.c | 30 ++++++------
drivers/crypto/vmx/aes_xts.c | 21 +++++---
13 files changed, 144 insertions(+), 106 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-09-19 06:22:01

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.19

Hi Greg:

This push fixes a potential boot hang in ccp and an incorrect
CPU capability check in aegis/morus on x86.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Brijesh Singh (1):
crypto: ccp - add timeout support in the SEV command

Ondrej Mosnacek (1):
crypto: x86/aegis,morus - Do not require OSXSAVE for SSE2

arch/x86/crypto/aegis128-aesni-glue.c | 1 -
arch/x86/crypto/aegis128l-aesni-glue.c | 1 -
arch/x86/crypto/aegis256-aesni-glue.c | 1 -
arch/x86/crypto/morus1280-sse2-glue.c | 1 -
arch/x86/crypto/morus640-sse2-glue.c | 1 -
drivers/crypto/ccp/psp-dev.c | 46 ++++++++++++++++++++++++++++++----
6 files changed, 41 insertions(+), 10 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-09-19 13:23:24

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.19

On Wed, Sep 19, 2018 at 02:22:01PM +0800, Herbert Xu wrote:
> Hi Greg:
>
> This push fixes a potential boot hang in ccp and an incorrect
> CPU capability check in aegis/morus on x86.
>
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

Now pulled, thanks.

greg k-h

2018-09-19 16:10:55

by Randy Dunlap

[permalink] [raw]
Subject: process? [Re: Crypto Fixes for 4.19]

On 9/19/18 6:23 AM, Greg KH wrote:
> On Wed, Sep 19, 2018 at 02:22:01PM +0800, Herbert Xu wrote:
>> Hi Greg:
>>
>> This push fixes a potential boot hang in ccp and an incorrect
>> CPU capability check in aegis/morus on x86.
>>
>>
>> Please pull from
>>
>> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
>
> Now pulled, thanks.
>
> greg k-h

Hi,
Just a process question:

It looks like Greg is not adding Signed-of-by: <himself>
to mainline git commits, although the prior mainline git committer did so.

Is that omission on purpose?

submitting-patches.rst says:
The Signed-off-by: tag indicates that the signer was involved in the
development of the patch, or that he/she was in the patch's delivery path.


thanks,
--
~Randy

2018-09-19 16:40:19

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: process? [Re: Crypto Fixes for 4.19]

On Wed, Sep 19, 2018 at 09:10:55AM -0700, Randy Dunlap wrote:
> On 9/19/18 6:23 AM, Greg KH wrote:
> > On Wed, Sep 19, 2018 at 02:22:01PM +0800, Herbert Xu wrote:
> >> Hi Greg:
> >>
> >> This push fixes a potential boot hang in ccp and an incorrect
> >> CPU capability check in aegis/morus on x86.
> >>
> >>
> >> Please pull from
> >>
> >> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
> >
> > Now pulled, thanks.
> >
> > greg k-h
>
> Hi,
> Just a process question:
>
> It looks like Greg is not adding Signed-of-by: <himself>
> to mainline git commits, although the prior mainline git committer did so.
>
> Is that omission on purpose?

s-o-b does not get added to git pulls, I "trust" the subsystem
maintainer got it correct. That's what Linus has always done in the
past, what am I doing differently here?

> submitting-patches.rst says:
> The Signed-off-by: tag indicates that the signer was involved in the
> development of the patch, or that he/she was in the patch's delivery path.

Yes, but not for git pulls.

I have not applied any patches sent in emails at this point in time, so
there's nothing that I could have even signed off on.

confused,

greg k-h

2018-09-19 16:48:42

by Randy Dunlap

[permalink] [raw]
Subject: Re: process? [Re: Crypto Fixes for 4.19]

On 9/19/18 9:40 AM, Greg KH wrote:
> On Wed, Sep 19, 2018 at 09:10:55AM -0700, Randy Dunlap wrote:
>> On 9/19/18 6:23 AM, Greg KH wrote:
>>> On Wed, Sep 19, 2018 at 02:22:01PM +0800, Herbert Xu wrote:
>>>> Hi Greg:
>>>>
>>>> This push fixes a potential boot hang in ccp and an incorrect
>>>> CPU capability check in aegis/morus on x86.
>>>>
>>>>
>>>> Please pull from
>>>>
>>>> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
>>>
>>> Now pulled, thanks.
>>>
>>> greg k-h
>>
>> Hi,
>> Just a process question:
>>
>> It looks like Greg is not adding Signed-of-by: <himself>
>> to mainline git commits, although the prior mainline git committer did so.
>>
>> Is that omission on purpose?
>
> s-o-b does not get added to git pulls, I "trust" the subsystem
> maintainer got it correct. That's what Linus has always done in the
> past, what am I doing differently here?
>
>> submitting-patches.rst says:
>> The Signed-off-by: tag indicates that the signer was involved in the
>> development of the patch, or that he/she was in the patch's delivery path.
>
> Yes, but not for git pulls.
>
> I have not applied any patches sent in emails at this point in time, so
> there's nothing that I could have even signed off on.

OK, I see.

> confused,

no, that's me :)


thanks,
--
~Randy

2018-09-19 17:00:55

by Willy Tarreau

[permalink] [raw]
Subject: Re: process? [Re: Crypto Fixes for 4.19]

On Wed, Sep 19, 2018 at 09:48:42AM -0700, Randy Dunlap wrote:
> On 9/19/18 9:40 AM, Greg KH wrote:
> > On Wed, Sep 19, 2018 at 09:10:55AM -0700, Randy Dunlap wrote:
> >> submitting-patches.rst says:
> >> The Signed-off-by: tag indicates that the signer was involved in the
> >> development of the patch, or that he/she was in the patch's delivery path.
> >
> > Yes, but not for git pulls.
> >
> > I have not applied any patches sent in emails at this point in time, so
> > there's nothing that I could have even signed off on.
>
> OK, I see.

Just FWIW, if this line was added, it would change the commit message
hence the resulting hash. That's why it only appears on patches really
committed by the mentioned people (typically using "git am").

Willy

2018-10-26 08:21:21

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Update for 4.20

On Tue, Oct 23, 2018 at 3:10 AM Herbert Xu <[email protected]> wrote:
>
> Here is the crypto update for 4.20:

Pulled.

> Please note that there is a conflict with the compiler-attributes
> tree as one of the lines that was removed by a patch in the crypto
> tree was moved to a different file in the compiler-attributes tree.
> The fix is to remove that line from the moved file.

Thanks for noting that. I haven't pulled the compiler-attributes tree
yet, but I will hopefully remember this note when I do.

The lib80211 conflicts looked trivial, but I'm building the tree to
verify that I didn't screw something up..

Linus

2018-10-23 18:32:51

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.20

Hi Linus:

Here is the crypto update for 4.20:

API:

- Remove VLA usage.
- Add cryptostat user-space interface.
- Add notifier for new crypto algorithms.

Algorithms:

- Add OFB mode.
- Remove speck.

Drivers:

- Remove x86/sha*-mb as they are buggy.
- Remove pcbc(aes) from x86/aesni.
- Improve performance of arm/ghash-ce by up to 85%.
- Implement CTS-CBC in arm64/aes-blk, faster by up to 50%.
- Remove PMULL based arm64/crc32 driver.
- Use PMULL in arm64/crct10dif.
- Add aes-ctr support in s5p-sss.
- Add caam/qi2 driver.

Others:

- Pick better transform if one becomes available in crc-t10dif.

Please note that there is a conflict with the compiler-attributes
tree as one of the lines that was removed by a patch in the crypto
tree was moved to a different file in the compiler-attributes tree.
The fix is to remove that line from the moved file.

There is also a conflict with the mac80211 tree because the code
modified by the VLA fixes in the crypto tree has been removed in
the mac80211 tree. The resolution is to simply use the mac80211
file.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (17):
crypto: ccm - Remove VLA usage
crypto: x86 - remove SHA multibuffer routines and mcryptd
crypto: arm/ghash-ce - implement support for 4-way aggregation
crypto: arm64/aes-modes - get rid of literal load of addend vector
crypto: arm64/crc32 - remove PMULL based CRC32 driver
crypto: arm64/crct10dif - preparatory refactor for 8x8 PMULL version
crypto: arm64/crct10dif - implement non-Crypto Extensions alternative
crypto: arm64/aes-blk - remove pointless (u8 *) casts
crypto: arm64/aes-blk - revert NEON yield for skciphers
crypto: arm64/aes-blk - add support for CTS-CBC mode
crypto: arm64/aes-blk - improve XTS mask handling
crypto: x86/aes-ni - remove special handling of AES in PCBC mode
crypto: qat - move temp buffers off the stack
crypto: lrw - fix rebase error after out of bounds fix
crypto: morus/generic - fix for big endian systems
crypto: aegis/generic - fix for big endian systems
crypto: arm64/aes-blk - ensure XTS mask is always loaded

Arnd Bergmann (2):
crypto: caam/qi2 - add CONFIG_NETDEVICES dependency
crypto: caam/qi2 - avoid double export

Brijesh Singh (1):
crypto: ccp - add timeout support in the SEV command

Christoph Manszewski (4):
crypto: s5p-sss: Fix race in error handling
crypto: s5p-sss: Fix Fix argument list alignment
crypto: s5p-sss: Minor code cleanup
crypto: s5p-sss: Add aes-ctr support

Corentin Labbe (2):
crypto: user - Implement a generic crypto statistics
crypto: tools - Add cryptostat userspace

Dan Aloni (1):
crypto: fix a memory leak in rsa-kcs1pad's encryption mode

Dan Douglass (1):
crypto: mxs-dcp - Implement sha import/export

Eric Biggers (4):
crypto: arm/chacha20 - faster 8-bit rotations and other optimizations
crypto: chacha20 - Fix chacha20_block() keystream alignment (again)
crypto: arm64/aes - fix handling sub-block CTS-CBC inputs
crypto: x86/aes-ni - fix build error following fpu template removal

Gilad Ben-Yossef (3):
crypto: testmgr - update sm4 test vectors
crypto: ofb - add output feedback mode
crypto: tcrypt - add OFB functional tests

Harsh Jain (1):
crypto: chelsio - Update ntx queue received from cxgb4

Herbert Xu (2):
Merge git://git.kernel.org/.../herbert/crypto-2.6
Merge git://git.kernel.org/.../herbert/crypto-2.6

Horia Geantă (20):
crypto: caam/jr - remove ablkcipher IV generation
crypto: caam/qi - remove ablkcipher IV generation
crypto: caam/jr - ablkcipher -> skcipher conversion
crypto: caam/qi - ablkcipher -> skcipher conversion
bus: fsl-mc: add support for dpseci device type
soc: fsl: dpio: add back some frame queue functions
soc: fsl: dpio: add frame list format support
soc: fsl: dpio: add congestion notification support
crypto: caam - fix implicit casts in endianness helpers
crypto: caam - add DPAA2-CAAM (DPSECI) backend API
crypto: caam - add Queue Interface v2 error codes
crypto: caam/qi2 - add DPAA2-CAAM driver
crypto: caam/qi2 - add skcipher algorithms
crypto: caam - export ahash shared descriptor generation
crypto: caam/qi2 - add support for ahash algorithms
arm64: defconfig: enable CAAM crypto engine on QorIQ DPAA2 SoCs
crypto: tcrypt - fix ghash-generic speed test
crypto: tcrypt - remove remnants of pcomp-based zlib
crypto: caam/qi - simplify CGR allocation, freeing
crypto: caam - add SPDX license identifier to all files

Janakarajan Natarajan (2):
crypto: ccp - Fix static checker warning
crypto: ccp - Allow SEV firmware to be chosen based on Family and Model

Jason A. Donenfeld (1):
crypto: speck - remove Speck

Kees Cook (30):
crypto: xcbc - Remove VLA usage
crypto: cbc - Remove VLA usage
crypto: hash - Remove VLA usage
crypto: api - Introduce generic max blocksize and alignmask
crypto: qat - Remove VLA usage
crypto: shash - Remove VLA usage in unaligned hashing
dm: Remove VLA usage from hashes
crypto: skcipher - Introduce crypto_sync_skcipher
gss_krb5: Remove VLA usage of skcipher
lib80211: Remove VLA usage of skcipher
mac802154: Remove VLA usage of skcipher
s390/crypto: Remove VLA usage of skcipher
x86/fpu: Remove VLA usage of skcipher
block: cryptoloop: Remove VLA usage of skcipher
libceph: Remove VLA usage of skcipher
ppp: mppe: Remove VLA usage of skcipher
rxrpc: Remove VLA usage of skcipher
wusb: Remove VLA usage of skcipher
crypto: ccp - Remove VLA usage of skcipher
crypto: vmx - Remove VLA usage of skcipher
crypto: null - Remove VLA usage of skcipher
crypto: cryptd - Remove VLA usage of skcipher
crypto: sahara - Remove VLA usage of skcipher
crypto: qce - Remove VLA usage of skcipher
crypto: artpec6 - Remove VLA usage of skcipher
crypto: chelsio - Remove VLA usage of skcipher
crypto: mxs-dcp - Remove VLA usage of skcipher
crypto: omap-aes - Remove VLA usage of skcipher
crypto: picoxcell - Remove VLA usage of skcipher
crypto: skcipher - Remove SKCIPHER_REQUEST_ON_STACK()

Martin K. Petersen (3):
crypto: api - Introduce notifier for new crypto algorithms
crc-t10dif: Pick better transform if one becomes available
crc-t10dif: Allow current transform to be inspected in sysfs

Michael S. Tsirkin (1):
hwrng: core - document the quality field

Michael Schupikov (1):
crypto: testmgr - fix sizeof() on COMP_BUF_SIZE

Mikulas Patocka (1):
crypto: aesni - don't use GFP_ATOMIC allocation if the request doesn't cross a page in gcm

Nathan Chancellor (2):
crypto: ccp - Remove forward declaration
crypto: ccree - avoid implicit enum conversion

Ondrej Mosnacek (5):
crypto: xts - Drop use of auxiliary buffer
crypto: lrw - Fix out-of bounds access on counter overflow
crypto: testmgr - Add test for LRW counter wrap-around
crypto: lrw - Optimize tweak computation
crypto: lrw - Do not use auxiliary buffer

Radu Solea (2):
crypto: mxs-dcp - Fix SHA null hashes and output length
crypto: mxs-dcp - Fix AES issues

Srikanth Jampala (9):
crypto: cavium/nitrox - Added support for SR-IOV configuration.
crypto: cavium/nitrox - use dma_pool_zalloc()
crypto: cavium/nitrox - added support to identify the NITROX device partname.
crypto: cavium/nitrox - add support for per device request statistics.
crypto: cavium/nitrox - updated debugfs information.
crypto: cavium/nitrox - fix warnings while printing atomic64_t types
crypto: cavium/nitrox - use pcie_flr instead of duplicating it
crypto: cavium/nitrox - NITROX command queue changes.
crypto: cavium/nitrox - use pci_alloc_irq_vectors() while enabling MSI-X.

Stefan Agner (2):
cpufeature: avoid warning when compiling with clang
crypto: arm/crc32 - avoid warning when compiling with Clang

Tudor Ambarus (1):
crypto: atmel - switch to SPDX license identifiers

Valdis Kletnieks (1):
crypto/morus(640,1280) - make crypto_...-algs static

Wei Yongjun (2):
crypto: ccp - Make function sev_get_firmware() static
crypto: mxs-dcp - make symbols 'sha1_null_hash' and 'sha256_null_hash' static

YueHaibing (2):
crypto: axis - fix platform_no_drv_owner.cocci warnings
crypto: chtls - remove set but not used variable 'csk'

kbuild test robot (1):
crc-t10dif: crc_t10dif_mutex can be static

zhong jiang (2):
crypto: chtls - remove redundant null pointer check before kfree_skb
crypto: cavium - remove redundant null pointer check before kfree

Documentation/filesystems/fscrypt.rst | 10 -
MAINTAINERS | 8 -
arch/arm/crypto/Kconfig | 7 +-
arch/arm/crypto/Makefile | 2 -
arch/arm/crypto/chacha20-neon-core.S | 277 +-
arch/arm/crypto/crc32-ce-glue.c | 2 +-
arch/arm/crypto/ghash-ce-core.S | 108 +-
arch/arm/crypto/ghash-ce-glue.c | 38 +-
arch/arm/crypto/speck-neon-core.S | 434 --
arch/arm/crypto/speck-neon-glue.c | 288 --
arch/arm64/configs/defconfig | 2 +-
arch/arm64/crypto/Kconfig | 11 -
arch/arm64/crypto/Makefile | 6 -
arch/arm64/crypto/aes-ce.S | 5 +
arch/arm64/crypto/aes-glue.c | 217 +-
arch/arm64/crypto/aes-modes.S | 416 +-
arch/arm64/crypto/aes-neon.S | 6 +
arch/arm64/crypto/crc32-ce-core.S | 287 --
arch/arm64/crypto/crc32-ce-glue.c | 244 -
arch/arm64/crypto/crct10dif-ce-core.S | 314 +-
arch/arm64/crypto/crct10dif-ce-glue.c | 14 +-
arch/arm64/crypto/speck-neon-core.S | 352 --
arch/arm64/crypto/speck-neon-glue.c | 282 --
arch/m68k/configs/amiga_defconfig | 2 -
arch/m68k/configs/apollo_defconfig | 2 -
arch/m68k/configs/atari_defconfig | 2 -
arch/m68k/configs/bvme6000_defconfig | 2 -
arch/m68k/configs/hp300_defconfig | 2 -
arch/m68k/configs/mac_defconfig | 2 -
arch/m68k/configs/multi_defconfig | 2 -
arch/m68k/configs/mvme147_defconfig | 2 -
arch/m68k/configs/mvme16x_defconfig | 2 -
arch/m68k/configs/q40_defconfig | 2 -
arch/m68k/configs/sun3_defconfig | 2 -
arch/m68k/configs/sun3x_defconfig | 2 -
arch/s390/configs/debug_defconfig | 1 -
arch/s390/configs/performance_defconfig | 1 -
arch/s390/crypto/aes_s390.c | 48 +-
arch/s390/defconfig | 1 -
arch/x86/crypto/Makefile | 5 +-
arch/x86/crypto/aesni-intel_glue.c | 47 +-
arch/x86/crypto/fpu.c | 207 -
arch/x86/crypto/sha1-mb/Makefile | 14 -
arch/x86/crypto/sha1-mb/sha1_mb.c | 1011 ----
arch/x86/crypto/sha1-mb/sha1_mb_ctx.h | 134 -
arch/x86/crypto/sha1-mb/sha1_mb_mgr.h | 110 -
arch/x86/crypto/sha1-mb/sha1_mb_mgr_datastruct.S | 287 --
arch/x86/crypto/sha1-mb/sha1_mb_mgr_flush_avx2.S | 304 --
arch/x86/crypto/sha1-mb/sha1_mb_mgr_init_avx2.c | 64 -
arch/x86/crypto/sha1-mb/sha1_mb_mgr_submit_avx2.S | 209 -
arch/x86/crypto/sha1-mb/sha1_x8_avx2.S | 492 --
arch/x86/crypto/sha256-mb/Makefile | 14 -
arch/x86/crypto/sha256-mb/sha256_mb.c | 1013 ----
arch/x86/crypto/sha256-mb/sha256_mb_ctx.h | 134 -
arch/x86/crypto/sha256-mb/sha256_mb_mgr.h | 108 -
.../crypto/sha256-mb/sha256_mb_mgr_datastruct.S | 304 --
.../crypto/sha256-mb/sha256_mb_mgr_flush_avx2.S | 307 --
.../x86/crypto/sha256-mb/sha256_mb_mgr_init_avx2.c | 65 -
.../crypto/sha256-mb/sha256_mb_mgr_submit_avx2.S | 214 -
arch/x86/crypto/sha256-mb/sha256_x8_avx2.S | 598 ---
arch/x86/crypto/sha512-mb/Makefile | 12 -
arch/x86/crypto/sha512-mb/sha512_mb.c | 1047 ----
arch/x86/crypto/sha512-mb/sha512_mb_ctx.h | 128 -
arch/x86/crypto/sha512-mb/sha512_mb_mgr.h | 104 -
.../crypto/sha512-mb/sha512_mb_mgr_datastruct.S | 281 --
.../crypto/sha512-mb/sha512_mb_mgr_flush_avx2.S | 297 --
.../x86/crypto/sha512-mb/sha512_mb_mgr_init_avx2.c | 69 -
.../crypto/sha512-mb/sha512_mb_mgr_submit_avx2.S | 224 -
arch/x86/crypto/sha512-mb/sha512_x4_avx2.S | 531 --
crypto/Kconfig | 101 +-
crypto/Makefile | 4 +-
crypto/aegis.h | 20 +-
crypto/ahash.c | 25 +-
crypto/algapi.c | 17 +-
crypto/algboss.c | 2 +
crypto/algif_aead.c | 12 +-
crypto/algif_hash.c | 2 +-
crypto/authenc.c | 8 +-
crypto/authencesn.c | 8 +-
crypto/ccm.c | 9 +-
crypto/chacha20_generic.c | 7 +-
crypto/cryptd.c | 32 +-
crypto/crypto_null.c | 11 +-
crypto/{crypto_user.c => crypto_user_base.c} | 9 +-
crypto/crypto_user_stat.c | 463 ++
crypto/echainiv.c | 4 +-
crypto/gcm.c | 8 +-
crypto/internal.h | 8 -
crypto/lrw.c | 339 +-
crypto/mcryptd.c | 675 ---
crypto/morus1280.c | 7 +-
crypto/morus640.c | 16 +-
crypto/ofb.c | 225 +
crypto/rng.c | 1 +
crypto/rsa-pkcs1pad.c | 9 -
crypto/seqiv.c | 4 +-
crypto/shash.c | 33 +-
crypto/skcipher.c | 24 +
crypto/speck.c | 307 --
crypto/tcrypt.c | 27 +-
crypto/tcrypt.h | 1 +
crypto/testmgr.c | 42 +-
crypto/testmgr.h | 863 +---
crypto/xcbc.c | 8 +-
crypto/xts.c | 269 +-
drivers/block/cryptoloop.c | 22 +-
drivers/bus/fsl-mc/fsl-mc-bus.c | 5 +
drivers/char/hw_random/core.c | 4 +-
drivers/char/random.c | 24 +-
drivers/crypto/Makefile | 2 +-
drivers/crypto/atmel-aes.c | 5 +-
drivers/crypto/atmel-authenc.h | 13 +-
drivers/crypto/atmel-ecc.c | 11 +-
drivers/crypto/atmel-ecc.h | 14 +-
drivers/crypto/atmel-sha.c | 5 +-
drivers/crypto/atmel-tdes.c | 5 +-
drivers/crypto/axis/artpec6_crypto.c | 20 +-
drivers/crypto/caam/Kconfig | 57 +-
drivers/crypto/caam/Makefile | 10 +-
drivers/crypto/caam/caamalg.c | 728 +--
drivers/crypto/caam/caamalg_desc.c | 143 +-
drivers/crypto/caam/caamalg_desc.h | 28 +-
drivers/crypto/caam/caamalg_qi.c | 627 +--
drivers/crypto/caam/caamalg_qi2.c | 5165 ++++++++++++++++++++
drivers/crypto/caam/caamalg_qi2.h | 223 +
drivers/crypto/caam/caamhash.c | 80 +-
drivers/crypto/caam/caamhash_desc.c | 80 +
drivers/crypto/caam/caamhash_desc.h | 21 +
drivers/crypto/caam/caampkc.c | 1 +
drivers/crypto/caam/caamrng.c | 1 +
drivers/crypto/caam/compat.h | 2 +
drivers/crypto/caam/ctrl.c | 1 +
drivers/crypto/caam/dpseci.c | 426 ++
drivers/crypto/caam/dpseci.h | 333 ++
drivers/crypto/caam/dpseci_cmd.h | 149 +
drivers/crypto/caam/error.c | 79 +-
drivers/crypto/caam/error.h | 6 +-
drivers/crypto/caam/jr.c | 1 +
drivers/crypto/caam/qi.c | 43 +-
drivers/crypto/caam/qi.h | 3 +-
drivers/crypto/caam/regs.h | 30 +-
drivers/crypto/caam/sg_sw_qm.h | 29 +-
drivers/crypto/caam/sg_sw_qm2.h | 30 +-
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 20 +-
drivers/crypto/cavium/nitrox/Makefile | 3 +
drivers/crypto/cavium/nitrox/nitrox_common.h | 19 +-
drivers/crypto/cavium/nitrox/nitrox_csr.h | 111 +
drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 115 +
drivers/crypto/cavium/nitrox/nitrox_dev.h | 162 +-
drivers/crypto/cavium/nitrox/nitrox_hal.c | 71 +-
drivers/crypto/cavium/nitrox/nitrox_hal.h | 23 +
drivers/crypto/cavium/nitrox/nitrox_isr.c | 337 +-
drivers/crypto/cavium/nitrox/nitrox_isr.h | 10 +
drivers/crypto/cavium/nitrox/nitrox_lib.c | 98 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 203 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 49 +-
drivers/crypto/cavium/nitrox/nitrox_sriov.c | 151 +
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 13 +-
drivers/crypto/ccp/ccp-crypto.h | 2 +-
drivers/crypto/ccp/psp-dev.c | 47 +-
drivers/crypto/ccp/sp-platform.c | 53 +-
drivers/crypto/ccree/cc_hw_queue_defs.h | 6 +-
drivers/crypto/chelsio/chcr_algo.c | 30 +-
drivers/crypto/chelsio/chcr_core.c | 2 +-
drivers/crypto/chelsio/chcr_crypto.h | 2 +-
drivers/crypto/chelsio/chtls/chtls_cm.c | 7 +-
drivers/crypto/chelsio/chtls/chtls_main.c | 3 +-
drivers/crypto/mxs-dcp.c | 142 +-
drivers/crypto/omap-aes.c | 17 +-
drivers/crypto/omap-aes.h | 2 +-
drivers/crypto/picoxcell_crypto.c | 21 +-
drivers/crypto/qat/qat_common/qat_algs.c | 60 +-
drivers/crypto/qce/ablkcipher.c | 13 +-
drivers/crypto/qce/cipher.h | 2 +-
drivers/crypto/s5p-sss.c | 113 +-
drivers/crypto/sahara.c | 31 +-
drivers/crypto/vmx/aes_cbc.c | 22 +-
drivers/crypto/vmx/aes_ctr.c | 18 +-
drivers/crypto/vmx/aes_xts.c | 18 +-
drivers/md/dm-integrity.c | 23 +-
drivers/md/dm-verity-fec.c | 5 +-
drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c | 20 +-
drivers/net/ppp/ppp_mppe.c | 27 +-
drivers/soc/fsl/dpio/dpio-service.c | 58 +
drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 34 +-
drivers/staging/rtl8192e/rtllib_crypt_wep.c | 28 +-
.../rtl8192u/ieee80211/ieee80211_crypt_tkip.c | 34 +-
.../rtl8192u/ieee80211/ieee80211_crypt_wep.c | 26 +-
drivers/usb/wusbcore/crypto.c | 16 +-
fs/crypto/fscrypt_private.h | 4 -
fs/crypto/keyinfo.c | 10 -
include/crypto/acompress.h | 38 +-
include/crypto/aead.h | 51 +-
include/crypto/akcipher.h | 76 +-
include/crypto/algapi.h | 14 +-
include/crypto/cbc.h | 2 +-
include/crypto/chacha20.h | 3 +-
include/crypto/hash.h | 38 +-
include/crypto/internal/cryptouser.h | 8 +
include/crypto/internal/geniv.h | 2 +-
include/crypto/kpp.h | 51 +-
include/crypto/mcryptd.h | 114 -
include/crypto/morus1280_glue.h | 2 +-
include/crypto/morus640_glue.h | 2 +-
include/crypto/null.h | 2 +-
include/crypto/rng.h | 29 +-
include/crypto/skcipher.h | 118 +-
include/crypto/speck.h | 62 -
include/linux/compiler_types.h | 1 -
include/linux/cpufeature.h | 2 +-
include/linux/crc-t10dif.h | 1 +
include/linux/crypto.h | 110 +-
include/linux/fsl/mc.h | 6 +
include/linux/hw_random.h | 3 +-
include/linux/sunrpc/gss_krb5.h | 30 +-
include/soc/fsl/dpaa2-fd.h | 242 +
include/soc/fsl/dpaa2-global.h | 15 +
include/soc/fsl/dpaa2-io.h | 4 +
include/uapi/linux/cryptouser.h | 52 +
include/uapi/linux/fs.h | 4 +-
lib/chacha20.c | 6 +-
lib/crc-t10dif.c | 57 +-
net/ceph/crypto.c | 12 +-
net/ceph/crypto.h | 2 +-
net/mac802154/llsec.c | 16 +-
net/mac802154/llsec.h | 2 +-
net/rxrpc/ar-internal.h | 2 +-
net/rxrpc/rxkad.c | 44 +-
net/sunrpc/auth_gss/gss_krb5_crypto.c | 87 +-
net/sunrpc/auth_gss/gss_krb5_keys.c | 9 +-
net/sunrpc/auth_gss/gss_krb5_mech.c | 53 +-
net/sunrpc/auth_gss/gss_krb5_seqnum.c | 18 +-
net/sunrpc/auth_gss/gss_krb5_wrap.c | 20 +-
net/wireless/lib80211_crypt_tkip.c | 34 +-
net/wireless/lib80211_crypt_wep.c | 28 +-
tools/crypto/getstat.c | 294 ++
236 files changed, 11951 insertions(+), 15861 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-10-05 02:08:30

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.19

Hi Greg:

This push fixes the following issues:

- Out-of-bound stack access in qat.
- Illegal schedule in mxs-dcp.
- Memory corruption in chelsio.
- Incorrect pointer computation in caam.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Harsh Jain (1):
crypto: chelsio - Fix memory corruption in DMA Mapped buffers.

Horia Geantă (1):
crypto: caam/jr - fix ablkcipher_edesc pointer arithmetic

Leonard Crestez (1):
crypto: mxs-dcp - Fix wait logic on chan threads

Waiman Long (1):
crypto: qat - Fix KASAN stack-out-of-bounds bug in adf_probe()

drivers/crypto/caam/caamalg.c | 8 ++---
drivers/crypto/chelsio/chcr_algo.c | 32 +++++++++++------
drivers/crypto/chelsio/chcr_crypto.h | 2 ++
drivers/crypto/mxs-dcp.c | 53 ++++++++++++++++-------------
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 6 ++--
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 6 ++--
drivers/crypto/qat/qat_c62x/adf_drv.c | 6 ++--
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 6 ++--
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 6 ++--
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 6 ++--
10 files changed, 76 insertions(+), 55 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-10-05 15:37:02

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: Crypto Fixes for 4.19

On Fri, Oct 05, 2018 at 10:08:30AM +0800, Herbert Xu wrote:
> Hi Greg:
>
> This push fixes the following issues:
>
> - Out-of-bound stack access in qat.
> - Illegal schedule in mxs-dcp.
> - Memory corruption in chelsio.
> - Incorrect pointer computation in caam.
>
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

Now merged, thanks.

greg k-h

2018-11-16 16:42:59

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.20

Hi Linus:

This push fixes the following issues:

- Potential memory overwrite in simd.
- Kernel info leaks in crypto_user.
- NULL dereference and use-after-free in hisilicon.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (1):
crypto: simd - correctly take reqsize of wrapped skcipher into account

Corentin Labbe (1):
crypto: user - Zeroize whole structure given to user space

Eric Biggers (1):
crypto: user - fix leaking uninitialized memory to userspace

John Garry (2):
crypto: hisilicon - Fix NULL dereference for same dst and src
crypto: hisilicon - Fix reference after free of memories on error path

crypto/crypto_user_base.c | 18 +++++++++---------
crypto/crypto_user_stat.c | 21 +++++++++++++++++++++
crypto/simd.c | 5 +++--
drivers/crypto/hisilicon/sec/sec_algs.c | 31 +++++++++++++++++--------------
4 files changed, 50 insertions(+), 25 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-12-07 06:14:16

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 4.20

Hi Linus:

This push fixes the following issues:

- Disable the new crypto stats interface as it's still being changed.
- Fix potential uses-after-free in cbc/cfb/pcbc.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (1):
crypto: user - Disable statistics interface

Pan Bian (1):
crypto: do not free algorithm before using

crypto/Kconfig | 2 +-
crypto/cbc.c | 6 ++++--
crypto/cfb.c | 6 ++++--
crypto/pcbc.c | 6 ++++--
4 files changed, 13 insertions(+), 7 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-12-26 13:23:09

by Herbert Xu

[permalink] [raw]
Subject: Crypto Update for 4.21

Hi Linus:

Here is the crypto update for 4.21:

API:

- Add 1472-byte test to tcrypt for IPsec.
- Reintroduced crypto stats interface with numerous changes.
- Support incremental algorithm dumps.

Algorithms:

- Add xchacha12/20.
- Add nhpoly1305.
- Add adiantum.
- Add streebog hash.
- Mark cts(cbc(aes)) as FIPS allowed.

Drivers:

- Improve performance of arm64/chacha20.
- Improve performance of x86/chacha20.
- Add NEON-accelerated nhpoly1305.
- Add SSE2 accelerated nhpoly1305.
- Add AVX2 accelerated nhpoly1305.
- Add support for 192/256-bit keys in gcmaes AVX.
- Add SG support in gcmaes AVX.
- ESN for inline IPsec tx in chcr.
- Add support for CryptoCell 703 in ccree.
- Add support for CryptoCell 713 in ccree.
- Add SM4 support in ccree.
- Add SM3 support in ccree.
- Add support for chacha20 in caam/qi2.
- Add support for chacha20 + poly1305 in caam/jr.
- Add support for chacha20 + poly1305 in caam/qi2.
- Add AEAD cipher support in cavium/nitrox.

Please note that there is a conflict with the rcu tree as both
changed the same MAINTAINERS entries for IBM Power Crypto. Please
use the version from the crypto tree when resolving this conflict.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (3):
crypto: tcrypt - add block size of 1472 to skcipher template
crypto: arm64/chacha - optimize for arbitrary length inputs
crypto: arm64/chacha - use combined SIMD/ALU routine for more speed

Atul Gupta (2):
crypto: chcr - small packet Tx stalls the queue
crypto: chcr - ESN for Inline IPSec Tx

Brajeswar Ghosh (1):
crypto: aes-ce - Remove duplicate header

Colin Ian King (3):
pcrypt: use format specifier in kobject_add
crypto: chelsio - clean up various indentation issues
padata: clean an indentation issue, remove extraneous space

Corentin Labbe (13):
crypto: user - made crypto_user_stat optional
crypto: user - CRYPTO_STATS should depend on CRYPTO_USER
crypto: user - convert all stats from u32 to u64
crypto: user - split user space crypto stat structures
crypto: tool: getstat: convert user space example to the new crypto_user_stat uapi
crypto: user - fix use_after_free of struct xxx_request
crypto: user - Fix invalid stat reporting
crypto: user - remove intermediate variable
crypto: user - Split stats in multiple structures
crypto: user - rename err_cnt parameter
crypto: user - Add crypto_stats_init
crypto: user - remove unused dump functions
crypto: api - document missing stats member

Cristian Stoica (1):
crypto: chacha20poly1305 - export CHACHAPOLY_IV_SIZE

Dave Watson (12):
crypto: aesni - Merge GCM_ENC_DEC
crypto: aesni - Introduce gcm_context_data
crypto: aesni - Macro-ify func save/restore
crypto: aesni - support 256 byte keys in avx asm
crypto: aesni - Add GCM_COMPLETE macro
crypto: aesni - Split AAD hash calculation to separate macro
crypto: aesni - Merge avx precompute functions
crypto: aesni - Fill in new context data structures
crypto: aesni - Move ghash_mul to GCM_COMPLETE
crypto: aesni - Introduce READ_PARTIAL_BLOCK macro
crypto: aesni - Introduce partial block macro
crypto: aesni - Add scatter/gather avx stubs, and use them in C

Dmitry Eremin-Solenikov (2):
crypto: cfb - fix decryption
crypto: testmgr - add AES-CFB tests

Eric Biggers (43):
crypto: aes_ti - disable interrupts while accessing S-box
crypto: arm/aes - add some hardening against cache-timing attacks
crypto: user - remove redundant reporting functions
crypto: user - clean up report structure copying
crypto: inside-secure - remove useless setting of type flags
crypto: remove useless initializations of cra_list
crypto: drop mask=CRYPTO_ALG_ASYNC from 'cipher' tfm allocations
crypto: drop mask=CRYPTO_ALG_ASYNC from 'shash' tfm allocations
crypto: chacha20-generic - add HChaCha20 library function
crypto: chacha20-generic - don't unnecessarily use atomic walk
crypto: chacha20-generic - add XChaCha20 support
crypto: chacha20-generic - refactor to allow varying number of rounds
crypto: chacha - add XChaCha12 support
crypto: arm/chacha20 - limit the preemption-disabled section
crypto: arm/chacha20 - add XChaCha20 support
crypto: arm/chacha20 - refactor to allow varying number of rounds
crypto: arm/chacha - add XChaCha12 support
crypto: poly1305 - use structures for key and accumulator
crypto: poly1305 - add Poly1305 core API
crypto: nhpoly1305 - add NHPoly1305 support
crypto: arm/nhpoly1305 - add NEON-accelerated NHPoly1305
crypto: adiantum - add Adiantum support
crypto: arm64/nhpoly1305 - add NEON-accelerated NHPoly1305
crypto: arm64/chacha20 - add XChaCha20 support
crypto: arm64/chacha20 - refactor to allow varying number of rounds
crypto: arm64/chacha - add XChaCha12 support
crypto: adiantum - propagate CRYPTO_ALG_ASYNC flag to instance
crypto: x86/nhpoly1305 - add SSE2 accelerated NHPoly1305
crypto: x86/nhpoly1305 - add AVX2 accelerated NHPoly1305
crypto: x86/chacha20 - add XChaCha20 support
crypto: x86/chacha20 - refactor to allow varying number of rounds
crypto: x86/chacha - add XChaCha12 support
crypto: x86/chacha - yield the FPU occasionally
crypto: xchacha - add test vector from XChaCha20 draft RFC
crypto: xchacha20 - fix comments for test vectors
crypto: adiantum - adjust some comments to match latest paper
crypto: user - support incremental algorithm dumps
crypto: adiantum - fix leaking reference to hash algorithm
crypto: x86/chacha - avoid sleeping under kernel_fpu_begin()
crypto: skcipher - add might_sleep() to skcipher_walk_virt()
crypto: salsa20-generic - don't unnecessarily use atomic walk
crypto: cavium/nitrox - Fix build with !CONFIG_DEBUG_FS
crypto: skcipher - remove remnants of internal IV generators

Fabio Estevam (1):
crypto: mxc-scc - fix build warnings on ARM64

Gilad Ben-Yossef (8):
crypto: ccree - add support for CryptoCell 713
dt-bindings: crypto: ccree: add ccree 713
crypto: ccree - add SM4 support
crypto: testmgr - mark cts(cbc(aes)) as FIPS allowed
crypto: cts - document NIST standard status
crypto: ccree - add support for CryptoCell 703
dt-bindings: crypto: ccree: add dt bindings for ccree 703
MAINTAINERS: ccree: add co-maintainer

Harsh Jain (6):
crypto: chelsio - Swap location of AAD and IV sent in WR
crypto: chelsio - Use same value for both channel in single WR
crypto: chelsio - cleanup:send addr as value in function argument
crypto: chelsio - Handle PCI shutdown event
crypto: chelsio - Reset counters on cxgb4 Detach
crypto: chelsio - Fix wrong error counter increments

Herbert Xu (1):
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6

Horia Geantă (4):
crypto: caam - add register map changes cf. Era 10
crypto: caam/qi2 - add support for ChaCha20
crypto: caam/jr - add support for Chacha20 + Poly1305
crypto: caam/qi2 - add support for Chacha20 + Poly1305

Leonard Crestez (2):
dt-bindings: crypto: Mention clocks for mxs-dcp
crypto: mxs-dcp - Add support for dcp clk

Martin Willi (9):
crypto: x86/chacha20 - Support partial lengths in 1-block SSSE3 variant
crypto: x86/chacha20 - Support partial lengths in 4-block SSSE3 variant
crypto: x86/chacha20 - Support partial lengths in 8-block AVX2 variant
crypto: x86/chacha20 - Use larger block functions more aggressively
crypto: x86/chacha20 - Add a 2-block AVX2 variant
crypto: x86/chacha20 - Add a 4-block AVX2 variant
crypto: x86/chacha20 - Add a 8-block AVX-512VL variant
crypto: x86/chacha20 - Add a 2-block AVX-512VL variant
crypto: x86/chacha20 - Add a 4-block AVX-512VL variant

Nagadheeraj Rottela (1):
crypto: cavium/nitrox - Added AEAD cipher support

Nagadheeraj, Rottela (1):
crypto: cavium/nitrox - crypto request format changes

Nathan Chancellor (2):
crypto: ux500 - Use proper enum in cryp_set_dma_transfer
crypto: ux500 - Use proper enum in hash_set_dma_transfer

Paulo Flabiano Smorigo (1):
MAINTAINERS: change NX/VMX maintainers

Raveendra Padasalagi (1):
crypto: bcm - fix normal/non key hash algorithm failure

Srikanth, Jampala (2):
crypto: cavium/nitrox - Enable interrups for PF in SR-IOV mode.
crypto: cavium/nitrox - Enabled Mailbox support

Stefan Wahren (1):
hwrng: bcm2835 - Switch to SPDX identifier

Vitaly Chikunov (5):
crypto: ecc - check for invalid values in the key verification test
crypto: streebog - add Streebog hash function
crypto: streebog - register Streebog in hash info for IMA
crypto: streebog - add Streebog test vectors
crypto: ecc - regularize scalar for scalar multiplication

Wenwen Wang (1):
crypto: cavium/nitrox - fix a DMA pool free failure

Yael Chemla (3):
crypto: ccree - adjust hash length to suit certain context specifics
crypto: ccree - modify set_cipher_mode usage from cc_hash
crypto: ccree - add SM3 support

Yangtao Li (1):
crypto: cavium/nitrox - convert to DEFINE_SHOW_ATTRIBUTE

YueHaibing (1):
crypto: chelsio - remove set but not used variable 'kctx_len'

Documentation/crypto/api.rst | 9 -
Documentation/crypto/architecture.rst | 31 +-
.../devicetree/bindings/crypto/arm-cryptocell.txt | 8 +-
.../devicetree/bindings/crypto/fsl-dcp.txt | 2 +
MAINTAINERS | 11 +-
arch/arm/crypto/Kconfig | 16 +-
arch/arm/crypto/Makefile | 6 +-
arch/arm/crypto/aes-ce-glue.c | 1 -
arch/arm/crypto/aes-cipher-core.S | 62 +-
.../{chacha20-neon-core.S => chacha-neon-core.S} | 98 +-
arch/arm/crypto/chacha-neon-glue.c | 201 ++
arch/arm/crypto/chacha20-neon-glue.c | 127 -
arch/arm/crypto/nh-neon-core.S | 116 +
arch/arm/crypto/nhpoly1305-neon-glue.c | 77 +
arch/arm64/crypto/Kconfig | 7 +-
arch/arm64/crypto/Makefile | 7 +-
.../{chacha20-neon-core.S => chacha-neon-core.S} | 484 ++-
arch/arm64/crypto/chacha-neon-glue.c | 198 ++
arch/arm64/crypto/chacha20-neon-glue.c | 133 -
arch/arm64/crypto/nh-neon-core.S | 103 +
arch/arm64/crypto/nhpoly1305-neon-glue.c | 77 +
arch/s390/crypto/aes_s390.c | 2 +-
arch/sparc/crypto/aes_glue.c | 5 -
arch/sparc/crypto/camellia_glue.c | 5 -
arch/sparc/crypto/des_glue.c | 5 -
arch/x86/crypto/Makefile | 18 +-
arch/x86/crypto/aesni-intel_avx-x86_64.S | 3665 ++++++++++----------
arch/x86/crypto/aesni-intel_glue.c | 353 +-
arch/x86/crypto/chacha-avx2-x86_64.S | 1025 ++++++
arch/x86/crypto/chacha-avx512vl-x86_64.S | 836 +++++
...acha20-ssse3-x86_64.S => chacha-ssse3-x86_64.S} | 327 +-
arch/x86/crypto/chacha20-avx2-x86_64.S | 448 ---
arch/x86/crypto/chacha20_glue.c | 146 -
arch/x86/crypto/chacha_glue.c | 304 ++
arch/x86/crypto/nh-avx2-x86_64.S | 157 +
arch/x86/crypto/nh-sse2-x86_64.S | 123 +
arch/x86/crypto/nhpoly1305-avx2-glue.c | 77 +
arch/x86/crypto/nhpoly1305-sse2-glue.c | 76 +
arch/x86/crypto/poly1305_glue.c | 20 +-
crypto/Kconfig | 99 +-
crypto/Makefile | 8 +-
crypto/ablkcipher.c | 94 +-
crypto/acompress.c | 10 +-
crypto/adiantum.c | 664 ++++
crypto/aead.c | 14 +-
crypto/aes_generic.c | 9 +-
crypto/aes_ti.c | 18 +
crypto/ahash.c | 29 +-
crypto/akcipher.c | 11 +-
crypto/algapi.c | 247 +-
crypto/blkcipher.c | 20 +-
crypto/cfb.c | 2 +-
crypto/chacha20_generic.c | 137 -
crypto/chacha20poly1305.c | 12 +-
crypto/chacha_generic.c | 217 ++
crypto/cryptd.c | 4 +-
crypto/crypto_user_base.c | 136 +-
crypto/crypto_user_stat.c | 301 +-
crypto/ctr.c | 2 -
crypto/ecc.c | 58 +-
crypto/hash_info.c | 4 +
crypto/kpp.c | 10 +-
crypto/lz4.c | 1 -
crypto/lz4hc.c | 1 -
crypto/nhpoly1305.c | 254 ++
crypto/pcrypt.c | 2 +-
crypto/poly1305_generic.c | 174 +-
crypto/rng.c | 16 +-
crypto/salsa20_generic.c | 2 +-
crypto/scompress.c | 11 +-
crypto/shash.c | 12 +-
crypto/skcipher.c | 23 +-
crypto/streebog_generic.c | 1140 ++++++
crypto/tcrypt.c | 59 +-
crypto/testmgr.c | 62 +
crypto/testmgr.h | 3220 ++++++++++++++++-
drivers/block/drbd/drbd_receiver.c | 2 +-
drivers/char/hw_random/bcm2835-rng.c | 7 +-
drivers/char/random.c | 51 +-
drivers/crypto/Kconfig | 4 +-
drivers/crypto/amcc/crypto4xx_alg.c | 3 +-
drivers/crypto/bcm/cipher.c | 9 +-
drivers/crypto/caam/caamalg.c | 266 +-
drivers/crypto/caam/caamalg_desc.c | 139 +-
drivers/crypto/caam/caamalg_desc.h | 5 +
drivers/crypto/caam/caamalg_qi.c | 37 +-
drivers/crypto/caam/caamalg_qi2.c | 156 +-
drivers/crypto/caam/caamhash.c | 20 +-
drivers/crypto/caam/caampkc.c | 10 +-
drivers/crypto/caam/caamrng.c | 10 +-
drivers/crypto/caam/compat.h | 2 +
drivers/crypto/caam/ctrl.c | 28 +-
drivers/crypto/caam/desc.h | 28 +
drivers/crypto/caam/desc_constr.h | 7 +-
drivers/crypto/caam/regs.h | 74 +-
drivers/crypto/cavium/nitrox/Makefile | 5 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 364 ++
drivers/crypto/cavium/nitrox/nitrox_algs.c | 456 +--
drivers/crypto/cavium/nitrox/nitrox_common.h | 6 +-
drivers/crypto/cavium/nitrox/nitrox_csr.h | 12 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 48 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.h | 21 +
drivers/crypto/cavium/nitrox/nitrox_dev.h | 74 +-
drivers/crypto/cavium/nitrox/nitrox_hal.c | 114 +-
drivers/crypto/cavium/nitrox/nitrox_hal.h | 2 +
drivers/crypto/cavium/nitrox/nitrox_isr.c | 92 +-
drivers/crypto/cavium/nitrox/nitrox_isr.h | 2 +
drivers/crypto/cavium/nitrox/nitrox_lib.c | 22 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 3 +-
drivers/crypto/cavium/nitrox/nitrox_mbx.c | 204 ++
drivers/crypto/cavium/nitrox/nitrox_mbx.h | 9 +
drivers/crypto/cavium/nitrox/nitrox_req.h | 326 +-
drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 302 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 498 +++
drivers/crypto/cavium/nitrox/nitrox_sriov.c | 94 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 4 +-
drivers/crypto/ccree/cc_aead.c | 35 +-
drivers/crypto/ccree/cc_cipher.c | 104 +-
drivers/crypto/ccree/cc_crypto_ctx.h | 4 +-
drivers/crypto/ccree/cc_driver.c | 50 +-
drivers/crypto/ccree/cc_driver.h | 15 +-
drivers/crypto/ccree/cc_hash.c | 189 +-
drivers/crypto/ccree/cc_hw_queue_defs.h | 30 +
drivers/crypto/chelsio/chcr_algo.c | 418 ++-
drivers/crypto/chelsio/chcr_algo.h | 2 +-
drivers/crypto/chelsio/chcr_core.c | 195 +-
drivers/crypto/chelsio/chcr_core.h | 44 +-
drivers/crypto/chelsio/chcr_crypto.h | 10 +-
drivers/crypto/chelsio/chcr_ipsec.c | 183 +-
drivers/crypto/geode-aes.c | 2 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 8 +-
drivers/crypto/ixp4xx_crypto.c | 5 -
drivers/crypto/mxc-scc.c | 12 +-
drivers/crypto/mxs-dcp.c | 28 +-
drivers/crypto/nx/nx-aes-ctr.c | 1 -
drivers/crypto/omap-aes.c | 3 -
drivers/crypto/omap-des.c | 1 -
drivers/crypto/picoxcell_crypto.c | 3 +-
drivers/crypto/qce/ablkcipher.c | 1 -
drivers/crypto/qce/sha.c | 1 -
drivers/crypto/sahara.c | 1 -
drivers/crypto/talitos.c | 1 -
drivers/crypto/ux500/cryp/cryp_core.c | 4 +-
drivers/crypto/ux500/hash/hash_core.c | 2 +-
drivers/md/dm-crypt.c | 2 +-
drivers/md/dm-integrity.c | 2 +-
drivers/net/wireless/cisco/airo.c | 2 +-
drivers/net/wireless/intersil/orinoco/mic.c | 6 +-
drivers/staging/rtl8192e/rtllib_crypt_ccmp.c | 2 +-
.../rtl8192u/ieee80211/ieee80211_crypt_ccmp.c | 2 +-
drivers/usb/wusbcore/crypto.c | 2 +-
fs/ubifs/auth.c | 5 +-
include/crypto/acompress.h | 38 +-
include/crypto/aead.h | 41 +-
include/crypto/akcipher.h | 74 +-
include/crypto/chacha.h | 54 +
include/crypto/chacha20.h | 27 -
include/crypto/hash.h | 32 +-
include/crypto/hash_info.h | 1 +
include/crypto/internal/cryptouser.h | 9 +-
include/crypto/internal/skcipher.h | 2 -
include/crypto/kpp.h | 48 +-
include/crypto/nhpoly1305.h | 74 +
include/crypto/poly1305.h | 28 +-
include/crypto/rng.h | 27 +-
include/crypto/skcipher.h | 49 +-
include/crypto/streebog.h | 34 +
include/linux/crypto.h | 331 +-
include/uapi/linux/cryptouser.h | 102 +-
include/uapi/linux/hash_info.h | 2 +
kernel/padata.c | 2 +-
lib/Makefile | 2 +-
lib/{chacha20.c => chacha.c} | 59 +-
net/bluetooth/smp.c | 8 +-
net/mac80211/wep.c | 4 +-
net/wireless/lib80211_crypt_ccmp.c | 2 +-
net/wireless/lib80211_crypt_tkip.c | 4 +-
net/wireless/lib80211_crypt_wep.c | 4 +-
security/apparmor/crypto.c | 2 +-
security/integrity/evm/evm_crypto.c | 3 +-
security/keys/encrypted-keys/encrypted.c | 4 +-
security/keys/trusted.c | 4 +-
tools/crypto/getstat.c | 72 +-
183 files changed, 16615 insertions(+), 5868 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-12-27 01:03:16

by Herbert Xu

[permalink] [raw]
Subject: Re: Crypto Update for 4.21

On Wed, Dec 26, 2018 at 10:49:08AM -0600, Eric Biggers wrote:
> On Wed, Dec 26, 2018 at 09:22:57PM +0800, Herbert Xu wrote:
> >
> > Please pull from
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
> >
>
> Hi Herbert, that branch is still on an old commit. Probably you forgot to push.

Thanks Eric, it should be right now.
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2018-12-26 16:49:12

by Eric Biggers

[permalink] [raw]
Subject: Re: Crypto Update for 4.21

On Wed, Dec 26, 2018 at 09:22:57PM +0800, Herbert Xu wrote:
>
> Please pull from
>
> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus
>

Hi Herbert, that branch is still on an old commit. Probably you forgot to push.

- Eric

2019-01-18 10:40:10

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 5.0

Hi Linus:

This push fixes the following issues:

- Zero-length DMA mapping in caam.
- Illegalling mapping stack memory for DMA in talitos.
- Use after free in cavium/nitrox.
- Key parsing in authenc.
- Undefined shift in sm3.
- Bogus completion call in authencesn.
- SHA support detection in caam.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Aymen Sghaier (1):
crypto: caam - fix zero-length buffer DMA mapping

Christophe Leroy (2):
crypto: talitos - reorder code in talitos_edesc_alloc()
crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK

Dan Carpenter (1):
crypto: cavium/nitrox - Use after free in process_response_list()

Eric Biggers (5):
crypto: authenc - fix parsing key with misaligned rta_len
crypto: bcm - convert to use crypto_authenc_extractkeys()
crypto: ccree - convert to use crypto_authenc_extractkeys()
crypto: adiantum - initialize crypto_spawn::inst
crypto: sm3 - fix undefined shift by >= width of value

Harsh Jain (1):
crypto: authencesn - Avoid twice completion call in decrypt path

Horia Geantă (1):
crypto: caam - fix SHA support detection

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-02-01 05:42:12

by Herbert Xu

[permalink] [raw]
Subject: Crypto Fixes for 5.0

Hi Linus:

This push fixes a bug in cavium/nitrox where the callback is invoked
prior to the DMA unmap.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Nagadheeraj Rottela (1):
crypto: cavium/nitrox - Invoke callback after DMA unmap

drivers/crypto/cavium/nitrox/nitrox_reqmgr.c | 10 ++++++----
1 file changed, 6 insertions(+), 4 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-02-01 07:39:09

by Linus Torvalds

[permalink] [raw]
Subject: Re: Crypto Fixes for 5.0

On Thu, Jan 31, 2019 at 9:42 PM Herbert Xu <[email protected]> wrote:
>
> This push fixes a bug in cavium/nitrox where the callback is invoked
> prior to the DMA unmap.

This is not so much a comment about the pull itself (which I did half
an hour ago), as about the fact that it looks like the pr-tracker
robot doesn't seem to trigger for your pull requests, even if they are
cc'd to lkml.

Maybe you don't care, but while I stopped doing the manual "ack"
emails for pulls, I've continued to try to notice when some pull of
mine doesn't get the attention of the pr-tracker. I've probably missed
several cases of them...

The reason seems to be that the pr-tracker bot only tracks pull
requests from emails with one of

- ^[GIT
- ^[PULL
- ^[PLEASE PULL

in the subject line (case insensitive, afaik), and so your plain
"Crypto Fixes for 5.0" doesn't trigger it.

(My list of what triggers the pr-tracker bot may be old, I suspect
Konstantin has ended up tweaking the bot more since the early
descriptions he gave, so take the above more as a rough guide than any
set-in-stone rules)

Anyway, if you do care, maybe whatever script or workflow you use for
pull requests could just add that "[GIT PULL]" to the subject line,
and you'd get that automatic ack email when I've pulled and pushed
out?

Linus

2019-02-15 02:47:47

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.0

Hi Linus:

This push fixes a crash on resume in the ccree driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Gilad Ben-Yossef (1):
crypto: ccree - fix resume race condition on init

drivers/crypto/ccree/cc_driver.c | 7 ++++---
drivers/crypto/ccree/cc_pm.c | 13 ++++++-------
drivers/crypto/ccree/cc_pm.h | 3 +++
3 files changed, 13 insertions(+), 10 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-02-15 17:10:06

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.0

The pull request you sent on Fri, 15 Feb 2019 10:47:39 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/2aba322074de0d6781f4ae6b44d3e792b9bd2243

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-02-28 05:56:27

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.0

Hi Linus:

This push fixes a compiler warning introduced by a previous fix,
as well as two crash bugs on ARM.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (2):
crypto: sha256/arm - fix crash bug in Thumb2 build
crypto: sha512/arm - fix crash bug in Thumb2 build

Gilad Ben-Yossef (1):
crypto: ccree - add missing inline qualifier

arch/arm/crypto/sha256-armv4.pl | 3 ++-
arch/arm/crypto/sha256-core.S_shipped | 3 ++-
arch/arm/crypto/sha512-armv4.pl | 3 ++-
arch/arm/crypto/sha512-core.S_shipped | 3 ++-
drivers/crypto/ccree/cc_pm.h | 2 +-
5 files changed, 9 insertions(+), 5 deletions(-)

Cheers,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-03-02 00:20:05

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.0

The pull request you sent on Thu, 28 Feb 2019 13:56:18 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3f25a5990d9d32e8f77ce830b9ea6c0e4f4bea4b

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-03-02 02:42:16

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.0

Hi Linus:

This push fixes a couple of issues in arm64/chacha that was
introduced in 5.0.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (2):
crypto: arm64/chacha - fix chacha_4block_xor_neon() for big endian
crypto: arm64/chacha - fix hchacha_block_neon() for big endian

arch/arm64/crypto/chacha-neon-core.S | 20 ++++++++++++++++++--
1 file changed, 18 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-03-02 17:10:04

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.0

The pull request you sent on Sat, 2 Mar 2019 10:42:07 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/fa3294c58c58c4fa87ee0356b6cb1901db00533e

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-03-05 08:12:07

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Update for 5.1

Hi Linus:

Here is the crypto update for 5.1:

Please note that there is a merge of the Freescale SoC tree in
order to pull in changes required by patches to the caam/qi2 driver.

API:

- Add helper for simple skcipher modes.
- Add helper to register multiple templates.
- Set CRYPTO_TFM_NEED_KEY when setkey fails.
- Require neither or both of export/import in shash.
- AEAD decryption test vectors are now generated from encryption ones.
- New option CONFIG_CRYPTO_MANAGER_EXTRA_TESTS that includes random fuzzing.

Algorithms:

- Conversions to skcipher and helper for many templates.
- Add more test vectors for nhpoly1305 and adiantum.

Drivers:

- Add crypto4xx prng support.
- Add xcbc/cmac/ecb support in caam.
- Add AES support for Exynos5433 in s5p.
- Remove sha384/sha512 from artpec7 as hardware cannot do partial hash.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Ard Biesheuvel (9):
crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling
crypto: arm64/aes-ccm - fix bugs in non-NEON fallback routine
crypto: arm64/aes-ccm - don't use an atomic walk needlessly
crypto: arm64/ghash - register PMULL variants as separate algos
crypto: arm/crct10dif - revert to C code for short inputs
crypto: arm64/crct10dif - revert to C code for short inputs
crypto: arm/crct10dif - remove dead code
crypto: arm64/crct10dif - remove dead code
crypto: arm64/crct10dif - register PMULL variants as separate algos

Atul Gupta (3):
crypto: chelsio - avoid using sa_entry imm
crypto: chelsio - Inline single pdu only
crypto: chelsio - Fixed Traffic Stall

Chengguang Xu (1):
crypto: caam - remove redundant likely/unlikely annotation

Christian Lamparter (1):
crypto: crypto4xx - add prng crypto support

Christopher Diaz Riveros (1):
crypto: testmgr - use kmemdup

Colin Ian King (1):
crypto: virtio - clean up indentation, replace spaces with tab

Corentin Labbe (1):
crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments

David Tolnay (1):
hwrng: virtio - Avoid repeated init of completion

Eric Biggers (69):
crypto: cipher - remove struct cipher_desc
crypto: cfb - add missing 'chunksize' property
crypto: cfb - remove bogus memcpy() with src == dest
crypto: ofb - fix handling partial blocks and make thread-safe
crypto: pcbc - remove bogus memcpy()s with src == dest
crypto: skcipher - add helper for simple block cipher modes
crypto: cbc - convert to skcipher_alloc_instance_simple()
crypto: cfb - convert to skcipher_alloc_instance_simple()
crypto: ctr - convert to skcipher API
crypto: ecb - convert to skcipher API
crypto: keywrap - convert to skcipher API
crypto: ofb - convert to skcipher_alloc_instance_simple()
crypto: pcbc - remove ability to wrap internal ciphers
crypto: pcbc - convert to skcipher_alloc_instance_simple()
crypto: arc4 - convert to skcipher API
crypto: null - convert ecb-cipher_null to skcipher API
crypto: algapi - remove crypto_alloc_instance()
crypto: algapi - reject NULL crypto_spawn::inst
crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails
crypto: skcipher - set CRYPTO_TFM_NEED_KEY if ->setkey() fails
crypto: aead - set CRYPTO_TFM_NEED_KEY if ->setkey() fails
crypto: shash - require neither or both ->export() and ->import()
crypto: shash - remove pointless checks of shash_alg::{export,import}
crypto: gcm - use correct endianness type in gcm_hash_len()
crypto: rsa-pkcs1pad - include <crypto/internal/rsa.h>
crypto: streebog - use correct endianness type
crypto: testmgr - handle endianness correctly in alg_test_crc32c()
crypto: user - forward declare crypto_nlsk
crypto: x86/aesni-gcm - make 'struct aesni_gcm_tfm_s' static const
crypto: tgr192 - fix unaligned memory access
crypto: stat - remove unused mutex
crypto: af_alg - make some functions static
crypto: af_alg - use list_for_each_entry() in af_alg_count_tsgl()
crypto: af_alg - remove redundant initializations of sk_family
crypto: testmgr - skip AEAD encryption test vectors with novrfy set
crypto: testmgr - add ccm(aes) decryption tests to encryption tests
crypto: testmgr - add gcm(aes) decryption tests to encryption tests
crypto: testmgr - add rfc4543(gcm(aes)) decryption test to encryption tests
crypto: testmgr - unify the AEAD encryption and decryption test vectors
crypto: bcm - remove unused function do_decrypt()
crypto: clarify name of WEAK_KEY request flag
crypto: testmgr - skip crc32c context test for ahash algorithms
crypto: x86/crct10dif-pcl - cleanup and optimizations
crypto: arm/crct10dif-ce - cleanup and optimizations
crypto: arm64/crct10dif-ce - cleanup and optimizations
crypto: aegis - fix handling chunked inputs
crypto: morus - fix handling chunked inputs
crypto: x86/aegis - fix handling chunked inputs and MAY_SLEEP
crypto: x86/morus - fix handling chunked inputs and MAY_SLEEP
crypto: x86/aesni-gcm - fix crash on empty plaintext
crypto: ahash - fix another early termination in hash walk
crypto: arm64/aes-neonbs - fix returning final keystream block
crypto: testmgr - add testvec_config struct and helper functions
crypto: testmgr - introduce CONFIG_CRYPTO_MANAGER_EXTRA_TESTS
crypto: testmgr - implement random testvec_config generation
crypto: testmgr - convert skcipher testing to use testvec_configs
crypto: testmgr - convert aead testing to use testvec_configs
crypto: testmgr - convert hash testing to use testvec_configs
crypto: testmgr - check for skcipher_request corruption
crypto: testmgr - check for aead_request corruption
crypto: testmgr - remove extra bytes from 3DES-CTR IVs
crypto: testmgr - support checking skcipher output IV
crypto: testmgr - add iv_out to all CBC test vectors
crypto: testmgr - add iv_out to all CTR test vectors
crypto: arm64/aes-blk - update IV after partial final CTR block
crypto: arm/aes-ce - update IV after partial final CTR block
crypto: nhpoly1305 - add a test vector with len % 16 != 0
crypto: adiantum - add 1536 and 4096-byte test vectors
crypto: cavium/zip - fix collision with generic cra_driver_name

Franck LENORMAND (1):
crypto: caam - fix hash context DMA unmap size

Gilad Ben-Yossef (4):
crypto: ccree - unmap buffer before copying IV
crypto: ccree - shared irq lines are not a bug
crypto: ccree - don't copy zero size ciphertext
MAINTAINERS: crypto: ccree: remove co-maintainer

Greg Kroah-Hartman (7):
crypto: qat - no need to check return value of debugfs_create functions
crypto: ccree - no need to check return value of debugfs_create functions
crypto: axis - no need to check return value of debugfs_create functions
crypto: cavium/zip - no need to check return value of debugfs_create functions
crypto: cavium/nitrox - no need to check return value of debugfs_create functions
crypto: ccp - no need to check return value of debugfs_create functions
crypto: caam - no need to check return value of debugfs_create functions

Gustavo A. R. Silva (2):
crypto: ccree - fix missing break in switch statement
crypto: af_alg - use struct_size() in sock_kfree_s()

Hadar Gat (4):
crypto: ccree - improve error handling
crypto: ccree - add error message
crypto: ccree - fix free of unallocated mlli buffer
crypto: ccree - remove legacy leftover

Herbert Xu (2):
crypto: qat - Remove unused goto label
Merge git://git.kernel.org/pub/scm/linux/kernel/git/leo/linux next

Hook, Gary (1):
crypto: ccp - Update copyright notices and dates

Horia Geantă (8):
crypto: caam - move shared symbols in a common location
crypto: caam - handle zero-length AEAD output
crypto: caam - fix DMA mapping of stack memory
crypto: caam/qi2 - use affine DPIOs
crypto: caam/qi2 - rate-limit enqueue failure prints
crypto: caam/qi2 - relax busy polling while enqueuing FDs
crypto: caam - fix DMA mapping xcbc key twice
crypto: caam - generate hash keys in-place

Ioana Ciornei (6):
soc: fsl: dpio: cleanup the cpu array on dpaa2_io_down
soc: fsl: dpio: use a cpumask to identify which cpus are unused
soc: fsl: dpio: keep a per dpio device MC portal
soc: fsl: dpio: store a backpointer to the device backing the dpaa2_io
soc: fsl: dpio: add a device_link at dpaa2_io_service_register
bus: fsl-mc: automatically add a device_link on fsl_mc_[portal,object]_allocate

Iuliana Prodan (8):
crypto: caam - fix error reporting for caam_hash_alloc
crypto: caam - create ahash shared descriptors only once
crypto: caam - add support for xcbc(aes)
crypto: caam - add support for cmac(aes)
crypto: caam - use mapped_{src,dst}_nents for job descriptor
crypto: export arc4 defines
crypto: caam - add ecb(*) support
crypto: caam - weak key checking for cbc des, 3des

Jonas Gorski (1):
hwrng: bcm2835 - fix probe as platform device

Julia Lawall (1):
crypto: crypto4xx - add missing of_node_put after of_device_is_available

Kamil Konieczny (3):
crypto: s5p - update iv after AES-CBC op end
dt-bindings: crypto: document Exynos5433 SlimSSS
crypto: s5p - add AES support for Exynos5433

Krzysztof Kozlowski (1):
crypto: s5p-sss - Use AES_BLOCK_SIZE define instead of number

Lars Persson (6):
crypto: axis - remove sha384 support for artpec7
crypto: axis - remove sha512 support for artpec7
crypto: axis - fix for recursive locking from bottom half
crypto: axis - give DMA the start of the status buffer
crypto: axis - support variable AEAD tag length
crypto: axis - use a constant time tag compare

Lendacky, Thomas (1):
crypto: ccp - Update driver messages to remove some confusion

Mao Wenan (1):
crypto: stm32 - drop pointless static qualifier in stm32_hash_remove()

Masahiro Yamada (2):
crypto: prefix header search paths with $(srctree)/
crypto: bcm - remove -I. header search path and unused macro define

Milan Broz (1):
crypto: testmgr - mark crc32 checksum as FIPS allowed

Pankaj Gupta (1):
crypto: caam - fixed handling of sg list

Roland Hieber (1):
crypto: caam - fix indentation of goto label

Roy Pledge (1):
soc: fsl: dpio: perform DPIO Reset on Probe

Sebastian Andrzej Siewior (1):
crypto: chtls - remove cdev_list_lock

Singh, Brijesh (1):
crypto: ccp - fix the SEV probe in kexec boot path

Thomas Gleixner (4):
crypto: aegis - Cleanup license mess
crypto: morus - Cleanup license mess
crypto: aegis - Convert to SPDX license identifiers
crypto: morus - Convert to SPDX license identifiers

Tommi Hirvola (1):
crypto: x86/poly1305 - Clear key material from stack in SSE2 variant

Vincent Whitchurch (1):
crypto: axis - move request unmap outside of the queue lock

Vitaly Chikunov (1):
crypto: testmgr - split akcipher tests by a key type

Xiongfeng Wang (5):
crypto: api - add a helper to (un)register a array of templates
crypto: ccm - use template array registering API to simplify the code
crypto: gcm - use template array registering API to simplify the code
crypto: ctr - use template array registering API to simplify the code
crypto: chacha20poly1305 - use template array registering API to simplify the code

YueHaibing (8):
crypto: chtls - remove set but not used variables 'err, adap, request, hws'
crypto: ux500 - catch dma submission error
crypto: chelsio - check set_msg_len overflow in generate_b0
crypto: chelsio - remove set but not used variables 'adap'
crypto: brcm - Fix some set-but-not-used warning
crypto: seqiv - Use kmemdup in seqiv_aead_encrypt()
crypto: chelsio - Fix passing zero to 'PTR_ERR' warning in chcr_aead_op
crypto: marvell - Remove set but not used variable 'ivsize'

Zhang Zhijie (2):
crypto: rockchip - fix scatterlist nents error
crypto: rockchip - update new iv to device in multiple operations

haco (1):
crypto: Kconfig - Fix typo in "pclmul"

.../devicetree/bindings/crypto/samsung-slimsss.txt | 19 +
MAINTAINERS | 1 -
arch/arm/crypto/aes-ce-core.S | 26 +-
arch/arm/crypto/crct10dif-ce-core.S | 568 +-
arch/arm/crypto/crct10dif-ce-glue.c | 25 +-
arch/arm64/crypto/aes-ce-ccm-core.S | 5 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 8 +-
arch/arm64/crypto/aes-modes.S | 3 +-
arch/arm64/crypto/aes-neonbs-core.S | 8 +-
arch/arm64/crypto/crct10dif-ce-core.S | 513 +-
arch/arm64/crypto/crct10dif-ce-glue.c | 75 +-
arch/arm64/crypto/ghash-ce-glue.c | 118 +-
arch/s390/crypto/des_s390.c | 4 +-
arch/sparc/crypto/des_glue.c | 4 +-
arch/x86/crypto/aegis128-aesni-glue.c | 38 +-
arch/x86/crypto/aegis128l-aesni-glue.c | 38 +-
arch/x86/crypto/aegis256-aesni-glue.c | 38 +-
arch/x86/crypto/aesni-intel_glue.c | 47 +-
arch/x86/crypto/crct10dif-pcl-asm_64.S | 782 +-
arch/x86/crypto/crct10dif-pclmul_glue.c | 12 +-
arch/x86/crypto/morus1280_glue.c | 40 +-
arch/x86/crypto/morus640_glue.c | 39 +-
arch/x86/crypto/poly1305-sse2-x86_64.S | 4 +
crypto/Kconfig | 14 +-
crypto/aead.c | 4 +-
crypto/aegis.h | 7 +-
crypto/aegis128.c | 20 +-
crypto/aegis128l.c | 20 +-
crypto/aegis256.c | 20 +-
crypto/af_alg.c | 36 +-
crypto/ahash.c | 42 +-
crypto/algapi.c | 63 +-
crypto/arc4.c | 87 +-
crypto/cbc.c | 131 +-
crypto/ccm.c | 78 +-
crypto/cfb.c | 139 +-
crypto/chacha20poly1305.c | 37 +-
crypto/crypto_null.c | 57 +-
crypto/crypto_user_stat.c | 4 -
crypto/ctr.c | 200 +-
crypto/des_generic.c | 4 +-
crypto/ecb.c | 151 +-
crypto/gcm.c | 75 +-
crypto/keywrap.c | 198 +-
crypto/morus1280.c | 19 +-
crypto/morus640.c | 19 +-
crypto/ofb.c | 202 +-
crypto/pcbc.c | 143 +-
crypto/rsa-pkcs1pad.c | 1 +
crypto/seqiv.c | 7 +-
crypto/shash.c | 27 +-
crypto/skcipher.c | 158 +-
crypto/streebog_generic.c | 2 +-
crypto/testmgr.c | 2760 ++--
crypto/testmgr.h | 15649 ++++++++-----------
crypto/tgr192.c | 6 +-
drivers/bus/fsl-mc/fsl-mc-allocator.c | 11 +
drivers/bus/fsl-mc/mc-io.c | 13 +
drivers/char/hw_random/bcm2835-rng.c | 18 +-
drivers/char/hw_random/virtio-rng.c | 2 +-
drivers/crypto/amcc/crypto4xx_core.c | 87 +
drivers/crypto/amcc/crypto4xx_core.h | 4 +
drivers/crypto/amcc/crypto4xx_reg_def.h | 1 +
drivers/crypto/amcc/crypto4xx_trng.c | 4 +-
drivers/crypto/amcc/crypto4xx_trng.h | 4 +-
drivers/crypto/atmel-tdes.c | 2 +-
drivers/crypto/axis/artpec6_crypto.c | 326 +-
drivers/crypto/bcm/Makefile | 2 -
drivers/crypto/bcm/cipher.c | 10 +-
drivers/crypto/bcm/cipher.h | 4 +-
drivers/crypto/bcm/util.c | 40 -
drivers/crypto/bcm/util.h | 6 -
drivers/crypto/caam/Kconfig | 1 +
drivers/crypto/caam/caamalg.c | 238 +-
drivers/crypto/caam/caamalg_desc.c | 18 +-
drivers/crypto/caam/caamalg_qi.c | 29 +-
drivers/crypto/caam/caamalg_qi2.c | 85 +-
drivers/crypto/caam/caamalg_qi2.h | 2 +
drivers/crypto/caam/caamhash.c | 429 +-
drivers/crypto/caam/caamhash_desc.c | 68 +-
drivers/crypto/caam/caamhash_desc.h | 8 +
drivers/crypto/caam/compat.h | 1 +
drivers/crypto/caam/ctrl.c | 25 +-
drivers/crypto/caam/error.c | 6 +
drivers/crypto/caam/intern.h | 1 -
drivers/crypto/caam/key_gen.c | 30 +-
drivers/crypto/caam/qi.c | 4 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 27 +-
drivers/crypto/cavium/nitrox/nitrox_debugfs.h | 5 +-
drivers/crypto/cavium/nitrox/nitrox_main.c | 4 +-
drivers/crypto/cavium/zip/zip_main.c | 58 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 2 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 2 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 2 +-
drivers/crypto/ccp/ccp-debugfs.c | 36 +-
drivers/crypto/ccp/ccp-ops.c | 2 +-
drivers/crypto/ccp/psp-dev.c | 37 +-
drivers/crypto/ccp/psp-dev.h | 2 +-
drivers/crypto/ccp/sp-dev.c | 2 +-
drivers/crypto/ccp/sp-dev.h | 2 +-
drivers/crypto/ccp/sp-pci.c | 6 +-
drivers/crypto/ccp/sp-platform.c | 2 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 87 +-
drivers/crypto/ccree/cc_cipher.c | 10 +-
drivers/crypto/ccree/cc_debugfs.c | 22 +-
drivers/crypto/ccree/cc_debugfs.h | 8 +-
drivers/crypto/ccree/cc_driver.c | 13 +-
drivers/crypto/ccree/cc_driver.h | 2 -
drivers/crypto/chelsio/Makefile | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 12 +-
drivers/crypto/chelsio/chcr_core.h | 2 +-
drivers/crypto/chelsio/chcr_ipsec.c | 42 +-
drivers/crypto/chelsio/chtls/Makefile | 3 +-
drivers/crypto/chelsio/chtls/chtls_io.c | 12 +-
drivers/crypto/chelsio/chtls/chtls_main.c | 1 -
drivers/crypto/hifn_795x.c | 3 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 2 +-
drivers/crypto/ixp4xx_crypto.c | 4 +-
drivers/crypto/marvell/cipher.c | 4 +-
drivers/crypto/n2_core.c | 2 +-
drivers/crypto/omap-des.c | 2 +-
drivers/crypto/picoxcell_crypto.c | 3 +-
drivers/crypto/qat/qat_c3xxx/Makefile | 2 +-
drivers/crypto/qat/qat_c3xxx/adf_drv.c | 5 -
drivers/crypto/qat/qat_c3xxxvf/Makefile | 2 +-
drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 5 -
drivers/crypto/qat/qat_c62x/Makefile | 2 +-
drivers/crypto/qat/qat_c62x/adf_drv.c | 5 -
drivers/crypto/qat/qat_c62xvf/Makefile | 2 +-
drivers/crypto/qat/qat_c62xvf/adf_drv.c | 5 -
drivers/crypto/qat/qat_common/adf_cfg.c | 7 -
drivers/crypto/qat/qat_common/adf_transport.c | 7 -
.../crypto/qat/qat_common/adf_transport_debug.c | 15 -
drivers/crypto/qat/qat_dh895xcc/Makefile | 2 +-
drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 5 -
drivers/crypto/qat/qat_dh895xccvf/Makefile | 2 +-
drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 5 -
drivers/crypto/qce/ablkcipher.c | 4 +-
drivers/crypto/rockchip/rk3288_crypto.c | 2 +-
drivers/crypto/rockchip/rk3288_crypto.h | 4 +-
drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 41 +-
drivers/crypto/rockchip/rk3288_crypto_ahash.c | 2 +-
drivers/crypto/s5p-sss.c | 64 +-
drivers/crypto/stm32/stm32-hash.c | 2 +-
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 2 +-
drivers/crypto/talitos.c | 2 +-
drivers/crypto/ux500/cryp/cryp_core.c | 26 +-
drivers/crypto/virtio/virtio_crypto_algs.c | 2 +-
drivers/net/ethernet/freescale/dpaa2/dpaa2-eth.c | 9 +-
drivers/soc/fsl/dpio/dpio-cmd.h | 1 +
drivers/soc/fsl/dpio/dpio-driver.c | 41 +-
drivers/soc/fsl/dpio/dpio-service.c | 41 +-
drivers/soc/fsl/dpio/dpio.c | 23 +
drivers/soc/fsl/dpio/dpio.h | 4 +
fs/crypto/keyinfo.c | 4 +-
fs/ecryptfs/crypto.c | 5 +-
include/crypto/algapi.h | 8 +-
include/crypto/arc4.h | 13 +
include/crypto/if_alg.h | 7 -
include/crypto/internal/cryptouser.h | 2 +
include/crypto/internal/hash.h | 6 +-
include/crypto/internal/skcipher.h | 15 +
include/crypto/morus1280_glue.h | 7 +-
include/crypto/morus640_glue.h | 7 +-
include/crypto/morus_common.h | 7 +-
include/crypto/streebog.h | 2 +-
include/crypto/xts.h | 4 +-
include/linux/crypto.h | 10 +-
include/linux/fsl/mc.h | 1 +
include/soc/fsl/dpaa2-io.h | 11 +-
170 files changed, 11316 insertions(+), 13833 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-03-05 17:40:11

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Update for 5.1

The pull request you sent on Tue, 5 Mar 2019 16:11:55 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/63bdf4284c38a48af21745ceb148a087b190cd21

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-03-12 04:58:28

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.1

Hi Linus:

This push fixes a bug in the newly added Exynos5433 AES code as well
as an old one in the caam driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Kamil Konieczny (1):
crypto: s5p-sss - fix AES support for Exynos5433

Wen Yang (1):
crypto: caam - add missing put_device() call

drivers/crypto/caam/caamalg.c | 12 +++++++-----
drivers/crypto/caam/caamalg_qi.c | 11 ++++++++---
drivers/crypto/caam/caamhash.c | 18 +++++++++++-------
drivers/crypto/caam/caampkc.c | 14 ++++++++++----
drivers/crypto/caam/caamrng.c | 22 ++++++++++++++--------
drivers/crypto/s5p-sss.c | 2 +-
6 files changed, 51 insertions(+), 28 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-03-13 17:10:16

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.1

The pull request you sent on Tue, 12 Mar 2019 12:58:18 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/dac0bde43b0b3685390b68c9058bee36d4d5c747

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-04-08 05:48:35

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.1

Hi Linus:

This push fixes a bug in the implementation of xcbc and cmac in caam.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Iuliana Prodan (1):
crypto: caam - fix copy of next buffer for xcbc and cmac

drivers/crypto/caam/caamhash.c | 13 ++++++-------
1 file changed, 6 insertions(+), 7 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-04-08 06:25:09

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.1

The pull request you sent on Mon, 8 Apr 2019 13:48:23 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/fd008d1a7a204695f0e5e003af16448bb9c34b7b

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-04-18 05:17:50

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.1

Hi Linus:

This push fixes a bug in the implementation of the x86 accelerated
version of poly1305.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (1):
crypto: x86/poly1305 - fix overflow during partial reduction

arch/x86/crypto/poly1305-avx2-x86_64.S | 14 +++++++----
arch/x86/crypto/poly1305-sse2-x86_64.S | 22 ++++++++++-------
crypto/testmgr.h | 44 +++++++++++++++++++++++++++++++++-
3 files changed, 67 insertions(+), 13 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-04-18 15:20:16

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.1

The pull request you sent on Thu, 18 Apr 2019 13:17:41 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d3ce3b1879ffb991d3894b57cda8610827fbdef3

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-04-25 07:26:57

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.1

Hi Linus:

This push fixes a bug in xts and lrw where they may sleep in an
atomic context.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Herbert Xu (2):
crypto: xts - Fix atomic sleep when walking skcipher
crypto: lrw - Fix atomic sleep when walking skcipher

crypto/lrw.c | 6 +++++-
crypto/xts.c | 6 +++++-
2 files changed, 10 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-04-25 16:40:00

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.1

The pull request you sent on Thu, 25 Apr 2019 15:26:48 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/f6f3e747454fc539bbd7904cf70672368289d820

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-05-06 03:30:20

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Update for 5.2

Hi Linus:

Here is the crypto update for 5.2:

API:

- Add support for AEAD in simd.
- Add fuzz testing to testmgr.
- Add panic_on_fail module parameter to testmgr.
- Use per-CPU struct instead multiple variables in scompress.
- Change verify API for akcipher.

Algorithms:

- Convert x86 AEAD algorithms over to simd.
- Forbid 2-key 3DES in FIPS mode.
- Add EC-RDSA (GOST 34.10) algorithm.

Drivers:

- Set output IV with ctr-aes in crypto4xx.
- Set output IV in rockchip.
- Fix potential length overflow with hashing in sun4i-ss.
- Fix computation error with ctr in vmx.
- Add SM4 protected keys support in ccree.
- Remove long-broken mxc-scc driver.
- Add rfc4106(gcm(aes)) cipher support in cavium/nitrox.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Andi Kleen (1):
crypto: aes - Use ___cacheline_aligned for aes data

Arnd Bergmann (1):
crypto: ccree - reduce kernel stack usage with clang

Christian Lamparter (4):
crypto: crypto4xx - fix ctr-aes missing output IV
crypto: crypto4xx - fix cfb and ofb "overran dst buffer" issues
crypto: crypto4xx - use sync skcipher for fallback
crypto: crypto4xx - get rid of redundant using_sd variable

Colin Ian King (2):
crypto: caam - fix spelling mistake "cannote" -> "cannot"
crypto: ccree - fix spelling mistake "protedcted" -> "protected"

Corentin Labbe (4):
crypto: sun4i-ss - Handle better absence/presence of IV
crypto: sun4i-ss - remove ivsize from ECB
crypto: sun4i-ss - Fix invalid calculation of hash end
crypto: sun4i-ss - fallback when length is not multiple of blocksize

Dan Carpenter (1):
crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()

Daniel Axtens (1):
crypto: vmx - fix copy-paste error in CTR mode

Eric Biggers (48):
crypto: simd - support wrapping AEAD algorithms
crypto: x86/aesni - convert to use skcipher SIMD bulk registration
crypto: x86/aesni - convert to use AEAD SIMD helpers
crypto: x86/aegis128 - convert to use AEAD SIMD helpers
crypto: x86/aegis128l - convert to use AEAD SIMD helpers
crypto: x86/aegis256 - convert to use AEAD SIMD helpers
crypto: x86/morus640 - convert to use AEAD SIMD helpers
crypto: x86/morus1280 - convert to use AEAD SIMD helpers
crypto: testmgr - remove workaround for AEADs that modify aead_request
crypto: chacha-generic - fix use as arm64 no-NEON fallback
crypto: arm64/gcm-aes-ce - fix no-NEON fallback code
crypto: simd,testmgr - introduce crypto_simd_usable()
crypto: x86 - convert to use crypto_simd_usable()
crypto: arm - convert to use crypto_simd_usable()
crypto: arm64 - convert to use crypto_simd_usable()
crypto: simd - convert to use crypto_simd_usable()
crypto: testmgr - test the !may_use_simd() fallback code
crypto: chacha-generic - use crypto_xor_cpy()
crypto: salsa20-generic - use crypto_xor_cpy()
crypto: crct10dif-generic - fix use via crypto_shash_digest()
crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
crypto: skcipher - don't WARN on unprocessed data after slow walk step
crypto: chacha20poly1305 - set cra_name correctly
crypto: streebog - fix unaligned memory accesses
crypto: cts - don't support empty messages
crypto: arm64/cbcmac - handle empty messages in same way as template
crypto: testmgr - add panic_on_fail module parameter
crypto: lrw - don't access already-freed walk.iv
crypto: salsa20 - don't access already-freed walk.iv
crypto: arm/aes-neonbs - don't access already-freed walk.iv
crypto: arm64/aes-neonbs - don't access already-freed walk.iv
crypto: vmx - return correct error code on failed setkey
crypto: testmgr - expand ability to test for errors
crypto: testmgr - identify test vectors by name rather than number
crypto: testmgr - add helpers for fuzzing against generic implementation
crypto: testmgr - fuzz hashes against their generic implementation
crypto: testmgr - fuzz skciphers against their generic implementation
crypto: testmgr - fuzz AEADs against their generic implementation
crypto: run initcalls for generic implementations earlier
crypto: cryptd - remove ability to instantiate ablkciphers
crypto: cavium - remove bogus code handling cryptd
crypto: powerpc - convert to use crypto_simd_usable()
crypto: shash - fix missed optimization in shash_ahash_digest()
crypto: gcm - fix incompatibility between "gcm" and "gcm_base"
crypto: ccm - fix incompatibility between "ccm" and "ccm_base"
crypto: shash - remove useless crypto_yield() in shash_ahash_digest()
crypto: nx - don't abuse shash MAY_SLEEP flag
crypto: shash - remove shash_desc::flags

Geert Uytterhoeven (1):
crypto: fips - Grammar s/options/option/, s/to/the/

Gilad Ben-Yossef (31):
crypto: testmgr - add missing self test entries for protected keys
crypto: ccree - move key load desc. before flow desc.
crypto: ccree - move MLLI desc. before key load
crypto: ccree - add support for sec disabled mode
crypto: ccree - add CPP completion handling
crypto: ccree - add remaining logic for CPP
crypto: ccree - add SM4 protected keys support
crypto: ccree - adapt CPP descriptor to new HW
crypto: ccree - read next IV from HW
crypto: ccree - add CID and PID support
crypto: ccree - fix backlog notifications
crypto: ccree - use proper callback completion api
crypto: ccree - remove special handling of chained sg
crypto: ccree - fix typo in debugfs error path
crypto: ccree - fix mem leak on error path
crypto: ccree - use devm_kzalloc for device data
crypto: ccree - use std api when possible
crypto: ccree - copyright header update
crypto: ccree - zero out internal struct before use
crypto: ccree - do not copy zero size MLLI table
crypto: ccree - remove unused defines
crypto: ccree - simplify fragment ICV detection
crypto: ccree - simplify AEAD ICV addr calculation
crypto: ccree - don't mangle the request assoclen
crypto: ccree - make AEAD sgl iterator well behaved
crypto: ccree - zap entire sg on aead request unmap
crypto: ccree - use correct internal state sizes for export
crypto: ccree - allow more AEAD assoc data fragments
crypto: ccree - don't map MAC key on stack
crypto: ccree - don't map AEAD key and IV on stack
crypto: ccree - use a proper le32 type for le32 val

Herbert Xu (25):
crypto: mxc-scc - Remove broken driver
crypto: des_generic - Forbid 2-key in 3DES and add helpers
crypto: s390 - Forbid 2-key 3DES in FIPS mode
crypto: sparc - Forbid 2-key 3DES in FIPS mode
crypto: atmel - Forbid 2-key 3DES in FIPS mode
crypto: bcm - Forbid 2-key 3DES in FIPS mode
crypto: caam - Forbid 2-key 3DES in FIPS mode
crypto: cavium - Forbid 2-key 3DES in FIPS mode
crypto: nitrox - Forbid 2-key 3DES in FIPS mode
crypto: ccp - Forbid 2-key 3DES in FIPS mode
crypto: ccree - Forbid 2-key 3DES in FIPS mode
crypto: hifn_795x - Forbid 2-key 3DES in FIPS mode
crypto: hisilicon - Forbid 2-key 3DES in FIPS mode
crypto: inside-secure - Forbid 2-key 3DES in FIPS mode
crypto: ixp4xx - Forbid 2-key 3DES in FIPS mode
crypto: marvell - Forbid 2-key 3DES in FIPS mode
crypto: n2 - Forbid 2-key 3DES in FIPS mode
crypto: omap - Forbid 2-key 3DES in FIPS mode
crypto: picoxcell - Forbid 2-key 3DES in FIPS mode
crypto: qce - Forbid 2-key 3DES in FIPS mode
crypto: rockchip - Forbid 2-key 3DES in FIPS mode
crypto: stm32 - Forbid 2-key 3DES in FIPS mode
crypto: sun4i-ss - Forbid 2-key 3DES in FIPS mode
crypto: talitos - Forbid 2-key 3DES in FIPS mode
crypto: ux500 - Forbid 2-key 3DES in FIPS mode

Horia Geantă (4):
crypto: caam/jr - update gcm detection logic
crypto: caam/qi2 - fix zero-length buffer DMA mapping
crypto: caam/qi2 - fix DMA mapping of stack memory
crypto: caam/qi2 - generate hash keys in-place

Iuliana Prodan (1):
crypto: caam - limit AXI pipeline to a depth of 1

Joe Perches (1):
crypto: sahara - Convert IS_ENABLED uses to __is_defined

Kefeng Wang (1):
crypto: picoxcell - Use dev_get_drvdata()

Lionel Debieve (6):
hwrng: stm32 - fix unbalanced pm_runtime_enable
hwrng: stm32 - set default random quality
crypto: stm32/hash - Fix self test issue during export
crypto: stm32/cryp - add weak key check for DES
crypto: stm32/cryp - remove request mutex protection
crypto: stm32/cryp - update to return iv_out

Masahiro Yamada (1):
crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o

Nagadheeraj Rottela (2):
crypto: cavium/nitrox - Added rfc4106(gcm(aes)) cipher support
crypto: cavium/nitrox - Fix HW family part name format

Ofir Drang (5):
crypto: ccree - pm resume first enable the source clk
crypto: ccree - remove cc7x3 obsoleted AXIM configs
crypto: ccree - HOST_POWER_DOWN_EN should be the last CC access during suspend
crypto: ccree - add function to handle cryptocell tee fips error
crypto: ccree - handle tee fips error during power management resume

Ondrej Mosnacek (1):
crypto: Kconfig - fix typos AEGSI -> AEGIS

Rouven Czerwinski (1):
hwrng: omap - Set default quality

Sebastian Andrzej Siewior (3):
crypto: scompress - return proper error code for allocation failure
crypto: scompress - Use per-CPU struct instead multiple variables
crypto: scompress - initialize per-CPU variables on each CPU

Singh, Brijesh (2):
crypto: ccp - introduce SEV_GET_ID2 command
crypto: ccp - Do not free psp_master when PLATFORM_INIT fails

Vakul Garg (5):
crypto: caam/jr - optimize job ring enqueue and dequeue operations
crypto: caam/jr - Remove spinlock for output job ring
crypto: caam/jr - Removed redundant vars from job ring private data
crypto: caam/jr - Remove extra memory barrier during job ring enqueue
crypto: caam/jr - Remove extra memory barrier during job ring dequeue

Vitaly Chikunov (11):
crypto: akcipher - default implementations for request callbacks
crypto: rsa - unimplement sign/verify for raw RSA backends
crypto: akcipher - new verify API for public key algorithms
KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature
X.509: parse public key parameters from x509 for akcipher
crypto: Kconfig - create Public-key cryptography section
crypto: ecc - make ecc into separate module
crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm
crypto: ecrdsa - add EC-RDSA test vectors to testmgr
integrity: support EC-RDSA signatures for asymmetric_verify
crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA

YueHaibing (15):
crypto: cavium - remove unused fucntions
crypto: cavium - Make some functions static
crypto: ccp - Make ccp_register_rsa_alg static
crypto: zip - Make some functions static
crypto: bcm - remove unused array tag_to_hash_idx
crypto: cavium - Make cptvf_device_init static
crypto: vmx - Make p8_init and p8_exit static
crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()
crypto: marvell - remove set but not used variable 'index'
crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx
crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'
crypto: mxs-dcp - remove set but not used variable 'fini'
crypto: atmel - remove set but not used variable 'alg_name'
crypto: ccree - Make cc_sec_disable static
crypto: ccree - remove set but not used variable 'du_size'

Zhang Zhijie (1):
crypto: rockchip - update IV buffer to contain the next IV

Documentation/crypto/api-samples.rst | 1 -
arch/arm/crypto/aes-neonbs-glue.c | 2 +
arch/arm/crypto/chacha-neon-glue.c | 5 +-
arch/arm/crypto/crc32-ce-glue.c | 5 +-
arch/arm/crypto/crct10dif-ce-glue.c | 3 +-
arch/arm/crypto/ghash-ce-glue.c | 10 +-
arch/arm/crypto/nhpoly1305-neon-glue.c | 3 +-
arch/arm/crypto/sha1-ce-glue.c | 5 +-
arch/arm/crypto/sha1_neon_glue.c | 5 +-
arch/arm/crypto/sha2-ce-glue.c | 5 +-
arch/arm/crypto/sha256_neon_glue.c | 5 +-
arch/arm/crypto/sha512-neon-glue.c | 5 +-
arch/arm64/crypto/aes-ce-ccm-glue.c | 7 +-
arch/arm64/crypto/aes-ce-glue.c | 5 +-
arch/arm64/crypto/aes-glue.c | 6 +-
arch/arm64/crypto/aes-neonbs-glue.c | 4 +-
arch/arm64/crypto/chacha-neon-glue.c | 5 +-
arch/arm64/crypto/crct10dif-ce-glue.c | 5 +-
arch/arm64/crypto/ghash-ce-glue.c | 17 +-
arch/arm64/crypto/nhpoly1305-neon-glue.c | 3 +-
arch/arm64/crypto/sha1-ce-glue.c | 7 +-
arch/arm64/crypto/sha2-ce-glue.c | 7 +-
arch/arm64/crypto/sha256-glue.c | 5 +-
arch/arm64/crypto/sha3-ce-glue.c | 5 +-
arch/arm64/crypto/sha512-ce-glue.c | 7 +-
arch/arm64/crypto/sm3-ce-glue.c | 7 +-
arch/arm64/crypto/sm4-ce-glue.c | 5 +-
arch/powerpc/crypto/crc32c-vpmsum_glue.c | 4 +-
arch/powerpc/crypto/crct10dif-vpmsum_glue.c | 4 +-
arch/powerpc/include/asm/Kbuild | 1 +
arch/s390/crypto/des_s390.c | 21 +-
arch/sparc/crypto/des_glue.c | 11 +-
arch/x86/crypto/aegis128-aesni-glue.c | 157 +--
arch/x86/crypto/aegis128l-aesni-glue.c | 157 +--
arch/x86/crypto/aegis256-aesni-glue.c | 157 +--
arch/x86/crypto/aesni-intel_glue.c | 212 +---
arch/x86/crypto/chacha_glue.c | 6 +-
arch/x86/crypto/crc32-pclmul_glue.c | 5 +-
arch/x86/crypto/crc32c-intel_glue.c | 7 +-
arch/x86/crypto/crct10dif-pclmul_glue.c | 20 +-
arch/x86/crypto/ghash-clmulni-intel_glue.c | 11 +-
arch/x86/crypto/morus1280-avx2-glue.c | 12 +-
arch/x86/crypto/morus1280-sse2-glue.c | 12 +-
arch/x86/crypto/morus1280_glue.c | 85 --
arch/x86/crypto/morus640-sse2-glue.c | 12 +-
arch/x86/crypto/morus640_glue.c | 85 --
arch/x86/crypto/nhpoly1305-avx2-glue.c | 5 +-
arch/x86/crypto/nhpoly1305-sse2-glue.c | 5 +-
arch/x86/crypto/poly1305_glue.c | 4 +-
arch/x86/crypto/sha1_ssse3_glue.c | 7 +-
arch/x86/crypto/sha256_ssse3_glue.c | 7 +-
arch/x86/crypto/sha512_ssse3_glue.c | 10 +-
arch/x86/power/hibernate.c | 1 -
crypto/842.c | 2 +-
crypto/Kconfig | 85 +-
crypto/Makefile | 10 +-
crypto/adiantum.c | 3 +-
crypto/aegis128.c | 2 +-
crypto/aegis128l.c | 2 +-
crypto/aegis256.c | 2 +-
crypto/aes_generic.c | 10 +-
crypto/akcipher.c | 14 +
crypto/algboss.c | 8 +-
crypto/ansi_cprng.c | 2 +-
crypto/anubis.c | 2 +-
crypto/arc4.c | 2 +-
crypto/asymmetric_keys/asym_tpm.c | 43 +-
crypto/asymmetric_keys/pkcs7_verify.c | 1 -
crypto/asymmetric_keys/public_key.c | 105 +-
crypto/asymmetric_keys/verify_pefile.c | 1 -
crypto/asymmetric_keys/x509.asn1 | 2 +-
crypto/asymmetric_keys/x509_cert_parser.c | 57 +-
crypto/asymmetric_keys/x509_public_key.c | 1 -
crypto/authenc.c | 2 +-
crypto/authencesn.c | 2 +-
crypto/blowfish_generic.c | 2 +-
crypto/camellia_generic.c | 2 +-
crypto/cast5_generic.c | 2 +-
crypto/cast6_generic.c | 2 +-
crypto/cbc.c | 2 +-
crypto/ccm.c | 46 +-
crypto/cfb.c | 2 +-
crypto/chacha20poly1305.c | 6 +-
crypto/chacha_generic.c | 12 +-
crypto/cmac.c | 2 +-
crypto/crc32_generic.c | 2 +-
crypto/crc32c_generic.c | 2 +-
crypto/crct10dif_generic.c | 13 +-
crypto/cryptd.c | 252 ----
crypto/crypto_null.c | 2 +-
crypto/ctr.c | 2 +-
crypto/cts.c | 20 +-
crypto/deflate.c | 2 +-
crypto/des_generic.c | 13 +-
crypto/dh.c | 2 +-
crypto/drbg.c | 3 +-
crypto/ecb.c | 2 +-
crypto/ecc.c | 417 ++++++-
crypto/ecc.h | 153 ++-
crypto/ecc_curve_defs.h | 15 -
crypto/ecdh.c | 2 +-
crypto/echainiv.c | 2 +-
crypto/ecrdsa.c | 296 +++++
crypto/ecrdsa_defs.h | 225 ++++
crypto/ecrdsa_params.asn1 | 4 +
crypto/ecrdsa_pub_key.asn1 | 1 +
crypto/fcrypt.c | 2 +-
crypto/fips.c | 2 +-
crypto/gcm.c | 36 +-
crypto/ghash-generic.c | 2 +-
crypto/hmac.c | 13 +-
crypto/jitterentropy-kcapi.c | 2 +-
crypto/keywrap.c | 2 +-
crypto/khazad.c | 2 +-
crypto/lrw.c | 6 +-
crypto/lz4.c | 2 +-
crypto/lz4hc.c | 2 +-
crypto/lzo-rle.c | 2 +-
crypto/lzo.c | 2 +-
crypto/md4.c | 2 +-
crypto/md5.c | 2 +-
crypto/michael_mic.c | 2 +-
crypto/morus1280.c | 2 +-
crypto/morus640.c | 2 +-
crypto/nhpoly1305.c | 2 +-
crypto/ofb.c | 2 +-
crypto/pcbc.c | 2 +-
crypto/pcrypt.c | 2 +-
crypto/poly1305_generic.c | 2 +-
crypto/rmd128.c | 2 +-
crypto/rmd160.c | 2 +-
crypto/rmd256.c | 2 +-
crypto/rmd320.c | 2 +-
crypto/rsa-pkcs1pad.c | 33 +-
crypto/rsa.c | 111 +-
crypto/salsa20_generic.c | 13 +-
crypto/scompress.c | 129 +-
crypto/seed.c | 2 +-
crypto/seqiv.c | 2 +-
crypto/serpent_generic.c | 2 +-
crypto/sha1_generic.c | 2 +-
crypto/sha256_generic.c | 2 +-
crypto/sha3_generic.c | 2 +-
crypto/sha512_generic.c | 2 +-
crypto/shash.c | 7 +-
crypto/simd.c | 273 ++++-
crypto/skcipher.c | 9 +-
crypto/sm3_generic.c | 2 +-
crypto/sm4_generic.c | 2 +-
crypto/streebog_generic.c | 27 +-
crypto/tcrypt.c | 2 +-
crypto/tea.c | 2 +-
crypto/testmgr.c | 1242 +++++++++++++++++---
crypto/testmgr.h | 181 ++-
crypto/tgr192.c | 2 +-
crypto/twofish_generic.c | 2 +-
crypto/vmac.c | 2 +-
crypto/wp512.c | 2 +-
crypto/xcbc.c | 2 +-
crypto/xts.c | 2 +-
crypto/zstd.c | 2 +-
drivers/block/drbd/drbd_receiver.c | 1 -
drivers/block/drbd/drbd_worker.c | 2 -
drivers/char/hw_random/omap-rng.c | 1 +
drivers/char/hw_random/stm32-rng.c | 9 +
drivers/crypto/Kconfig | 9 -
drivers/crypto/Makefile | 1 -
drivers/crypto/amcc/crypto4xx_alg.c | 24 +-
drivers/crypto/amcc/crypto4xx_core.c | 48 +-
drivers/crypto/amcc/crypto4xx_core.h | 3 +-
drivers/crypto/atmel-tdes.c | 106 +-
drivers/crypto/axis/artpec6_crypto.c | 2 -
drivers/crypto/bcm/cipher.c | 22 +-
drivers/crypto/bcm/spu.c | 3 -
drivers/crypto/bcm/util.c | 1 -
drivers/crypto/caam/caamalg.c | 75 +-
drivers/crypto/caam/caamalg_qi.c | 66 +-
drivers/crypto/caam/caamalg_qi2.c | 243 ++--
drivers/crypto/caam/caamalg_qi2.h | 2 -
drivers/crypto/caam/caampkc.c | 2 -
drivers/crypto/caam/ctrl.c | 20 +
drivers/crypto/caam/error.c | 2 +-
drivers/crypto/caam/intern.h | 4 +-
drivers/crypto/caam/jr.c | 33 +-
drivers/crypto/caam/qi.c | 4 +-
drivers/crypto/caam/regs.h | 11 +
drivers/crypto/cavium/cpt/cptvf_algs.c | 30 +-
drivers/crypto/cavium/cpt/cptvf_main.c | 2 +-
drivers/crypto/cavium/cpt/cptvf_mbox.c | 17 -
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 6 +-
drivers/crypto/cavium/nitrox/nitrox_aead.c | 337 ++++--
drivers/crypto/cavium/nitrox/nitrox_hal.c | 65 +-
drivers/crypto/cavium/nitrox/nitrox_req.h | 46 +-
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 8 +-
drivers/crypto/cavium/zip/zip_crypto.c | 8 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 21 +-
drivers/crypto/ccp/ccp-crypto-rsa.c | 8 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 2 -
drivers/crypto/ccp/psp-dev.c | 69 +-
drivers/crypto/ccree/Makefile | 1 +
drivers/crypto/ccree/cc_aead.c | 118 +-
drivers/crypto/ccree/cc_aead.h | 3 +-
drivers/crypto/ccree/cc_buffer_mgr.c | 341 ++----
drivers/crypto/ccree/cc_buffer_mgr.h | 2 +-
drivers/crypto/ccree/cc_cipher.c | 585 +++++----
drivers/crypto/ccree/cc_cipher.h | 3 +-
drivers/crypto/ccree/cc_crypto_ctx.h | 10 +-
drivers/crypto/ccree/cc_debugfs.c | 44 +-
drivers/crypto/ccree/cc_debugfs.h | 2 +-
drivers/crypto/ccree/cc_driver.c | 120 +-
drivers/crypto/ccree/cc_driver.h | 36 +-
drivers/crypto/ccree/cc_fips.c | 29 +-
drivers/crypto/ccree/cc_fips.h | 4 +-
drivers/crypto/ccree/cc_hash.c | 64 +-
drivers/crypto/ccree/cc_hash.h | 2 +-
drivers/crypto/ccree/cc_host_regs.h | 123 +-
drivers/crypto/ccree/cc_hw_queue_defs.h | 35 +-
drivers/crypto/ccree/cc_ivgen.c | 11 +-
drivers/crypto/ccree/cc_ivgen.h | 2 +-
drivers/crypto/ccree/cc_kernel_regs.h | 2 +-
drivers/crypto/ccree/cc_lli_defs.h | 4 +-
drivers/crypto/ccree/cc_pm.c | 11 +-
drivers/crypto/ccree/cc_pm.h | 2 +-
drivers/crypto/ccree/cc_request_mgr.c | 116 +-
drivers/crypto/ccree/cc_request_mgr.h | 2 +-
drivers/crypto/ccree/cc_sram_mgr.c | 7 +-
drivers/crypto/ccree/cc_sram_mgr.h | 2 +-
drivers/crypto/chelsio/chcr_algo.c | 2 -
drivers/crypto/hifn_795x.c | 31 +-
drivers/crypto/hisilicon/sec/sec_algs.c | 12 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 11 +-
drivers/crypto/ixp4xx_crypto.c | 64 +-
drivers/crypto/marvell/cipher.c | 11 +-
drivers/crypto/marvell/hash.c | 3 +-
drivers/crypto/mediatek/mtk-sha.c | 3 -
drivers/crypto/mxc-scc.c | 767 ------------
drivers/crypto/mxs-dcp.c | 14 +-
drivers/crypto/n2_core.c | 15 +-
drivers/crypto/nx/nx-842-pseries.c | 6 +-
drivers/crypto/nx/nx-842.c | 3 +-
drivers/crypto/nx/nx-aes-xcbc.c | 12 +-
drivers/crypto/nx/nx-sha256.c | 6 +-
drivers/crypto/nx/nx-sha512.c | 6 +-
drivers/crypto/omap-des.c | 29 +-
drivers/crypto/omap-sham.c | 2 -
drivers/crypto/padlock-sha.c | 5 -
drivers/crypto/picoxcell_crypto.c | 35 +-
drivers/crypto/qat/qat_common/qat_algs.c | 1 -
drivers/crypto/qat/qat_common/qat_asym_algs.c | 2 -
drivers/crypto/qce/ablkcipher.c | 22 +-
drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 61 +-
drivers/crypto/s5p-sss.c | 1 -
drivers/crypto/sahara.c | 6 +-
drivers/crypto/stm32/Kconfig | 1 +
drivers/crypto/stm32/stm32-cryp.c | 74 +-
drivers/crypto/stm32/stm32-hash.c | 4 +-
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 78 +-
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 19 +-
drivers/crypto/sunxi-ss/sun4i-ss-hash.c | 5 +-
drivers/crypto/sunxi-ss/sun4i-ss.h | 2 +
drivers/crypto/talitos.c | 108 +-
drivers/crypto/ux500/cryp/Makefile | 6 +-
drivers/crypto/ux500/cryp/cryp_core.c | 86 +-
drivers/crypto/vmx/aes.c | 14 +-
drivers/crypto/vmx/aes_cbc.c | 14 +-
drivers/crypto/vmx/aes_ctr.c | 10 +-
drivers/crypto/vmx/aes_xts.c | 14 +-
drivers/crypto/vmx/aesp8-ppc.pl | 4 +-
drivers/crypto/vmx/ghash.c | 10 +-
drivers/crypto/vmx/vmx.c | 4 +-
drivers/infiniband/sw/rxe/rxe.h | 1 -
drivers/md/dm-crypt.c | 3 -
drivers/md/dm-integrity.c | 2 -
drivers/net/ppp/ppp_mppe.c | 1 -
drivers/net/wireless/intersil/orinoco/mic.c | 1 -
drivers/nfc/s3fwrn5/firmware.c | 1 -
drivers/staging/ks7010/ks_hostif.c | 1 -
drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 1 -
.../rtl8192u/ieee80211/ieee80211_crypt_tkip.c | 1 -
drivers/target/iscsi/iscsi_target_auth.c | 1 -
drivers/thunderbolt/domain.c | 1 -
fs/cifs/misc.c | 1 -
fs/crypto/keyinfo.c | 1 -
fs/ecryptfs/crypto.c | 1 -
fs/ecryptfs/keystore.c | 1 -
fs/ext4/ext4.h | 1 -
fs/f2fs/f2fs.h | 1 -
fs/nfsd/nfs4recover.c | 1 -
fs/ubifs/auth.c | 6 -
fs/ubifs/replay.c | 2 -
include/crypto/aes.h | 8 +-
include/crypto/akcipher.h | 54 +-
include/crypto/cryptd.h | 18 +-
include/crypto/des.h | 43 +
include/crypto/hash.h | 10 +-
include/crypto/internal/simd.h | 44 +
include/crypto/morus1280_glue.h | 79 +-
include/crypto/morus640_glue.h | 79 +-
include/crypto/public_key.h | 4 +
include/crypto/streebog.h | 5 +-
include/linux/jbd2.h | 1 -
include/linux/oid_registry.h | 18 +
include/linux/psp-sev.h | 3 +-
include/uapi/linux/psp-sev.h | 18 +-
kernel/kexec_file.c | 1 -
lib/crc-t10dif.c | 1 -
lib/digsig.c | 1 -
lib/libcrc32c.c | 1 -
net/bluetooth/amp.c | 1 -
net/bluetooth/smp.c | 1 -
net/sctp/auth.c | 1 -
net/sctp/sm_make_chunk.c | 2 -
net/sunrpc/auth_gss/gss_krb5_crypto.c | 2 -
net/sunrpc/auth_gss/gss_krb5_mech.c | 1 -
net/wireless/lib80211_crypt_tkip.c | 1 -
security/apparmor/crypto.c | 2 -
security/integrity/digsig_asymmetric.c | 11 +-
security/integrity/evm/evm_crypto.c | 1 -
security/integrity/ima/ima_crypto.c | 4 -
security/keys/dh.c | 1 -
security/keys/encrypted-keys/encrypted.c | 1 -
security/keys/trusted.c | 1 -
322 files changed, 5973 insertions(+), 4248 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-05-07 03:25:50

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Update for 5.2

The pull request you sent on Mon, 6 May 2019 11:29:38 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/81ff5d2cba4f86cd850b9ee4a530cd221ee45aa3

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-05-15 06:07:10

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.2

Hi Linus:

This push fixes a number of issues in the chelsio driver and the
caam driver.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Atul Gupta (4):
crypto: chelsio - Fix NULL pointer dereference
crypto: chelsio - Fix softlockup with heavy I/O
crypto: chelsio - count incomplete block in IV
MAINTAINERS: Maintainer for Chelsio crypto driver

Herbert Xu (2):
crypto: caam - fix DKP detection logic
Revert "crypto: caam/jr - Remove extra memory barrier during job ring dequeue"

Iuliana Prodan (1):
crypto: caam - fix caam_dump_sg that iterates through scatterlist

MAINTAINERS | 2 +-
drivers/crypto/caam/caamalg.c | 9 +++++++--
drivers/crypto/caam/caamalg_qi.c | 7 +++++--
drivers/crypto/caam/caamalg_qi2.c | 8 +++++++-
drivers/crypto/caam/error.c | 2 +-
drivers/crypto/caam/jr.c | 2 +-
drivers/crypto/caam/regs.h | 8 --------
drivers/crypto/chelsio/chcr_algo.c | 17 +++++------------
drivers/crypto/chelsio/chcr_core.c | 4 ----
drivers/crypto/chelsio/chcr_ipsec.c | 3 ++-
10 files changed, 29 insertions(+), 33 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-05-15 16:10:41

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.2

The pull request you sent on Wed, 15 May 2019 14:05:52 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/88f76bc31b93cc228f5a43d5b565dc53615970ae

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-05-21 19:55:49

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.2

The pull request you sent on Tue, 21 May 2019 20:58:17 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/d53e860fd46f3d95c437bb67518f7374500de467

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-06-06 06:04:42

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.2

Hi Linus:

This push fixes a regression that breaks the jitterentropy RNG and
a potential memory leak in hmac.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (2):
crypto: jitterentropy - change back to module_init()
crypto: hmac - fix memory leak in hmac_init_tfm()

crypto/hmac.c | 4 +++-
crypto/jitterentropy-kcapi.c | 2 +-
2 files changed, 4 insertions(+), 2 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-06-06 20:21:33

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.2

The pull request you sent on Thu, 6 Jun 2019 14:03:24 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ae8766042beee814c9e16e9ae1e84cd6eaa7ffaa

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-07-05 04:27:18

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.2

Hi Linus:

This push fixes two memory leaks and a list corruption bug.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Eric Biggers (1):
crypto: user - prevent operating on larval algorithms

Herbert Xu (1):
lib/mpi: Fix karactx leak in mpi_powm

Vincent Whitchurch (1):
crypto: cryptd - Fix skcipher instance memory leak

crypto/cryptd.c | 1 +
crypto/crypto_user_base.c | 3 +++
lib/mpi/mpi-pow.c | 6 ++----
3 files changed, 6 insertions(+), 4 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-07-05 04:43:17

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.2

The pull request you sent on Fri, 5 Jul 2019 12:24:49 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/ee39d46dcaf8f25894f13236d3d984d9a4d2fd3e

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-07-08 15:29:31

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Update for 5.3

Hi Linus:

Here is the crypto update for 5.3:

API:

- Test shash interface directly in testmgr.
- cra_driver_name is now mandatory.

Algorithms:

- Replace arc4 crypto_cipher with library helper.
- Implement 5 way interleave for ECB, CBC and CTR on arm64.
- Add xxhash.
- Add continuous self-test on noise source to drbg.
- Update jitter RNG.

Drivers:

- Add support for SHA204A random number generator.
- Add support for 7211 in iproc-rng200.
- Fix fuzz test failures in inside-secure.
- Fix fuzz test failures in talitos.
- Fix fuzz test failures in qat.


Please pull from

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus


Antoine Tenart (14):
crypto: inside-secure - remove empty line
crypto: inside-secure - move comment
crypto: inside-secure - fix coding style for a condition
crypto: inside-secure - remove useless check
crypto: inside-secure - improve the result error format when displayed
crypto: inside-secure - change returned error when a descriptor reports an error
crypto: inside-secure - enable context reuse
crypto: inside-secure - unify cache reset
crypto: inside-secure - fix zeroing of the request in ahash_exit_inv
crypto: inside-secure - fix queued len computation
crypto: inside-secure - implement IV retrieval
crypto: inside-secure - add support for HMAC updates
crypto: inside-secure - fix use of the SG list
crypto: inside-secure - do not rely on the hardware last bit for result descriptors

Ard Biesheuvel (16):
i2c: acpi: permit bus speed to be discovered after enumeration
crypto: atmel-ecc - add support for ACPI probing on non-AT91 platforms
crypto: atmel-ecc - factor out code that can be shared
crypto: atmel-i2c - add support for SHA204A random number generator
dt-bindings: add Atmel SHA204A I2C crypto processor
dt-bindings: move Atmel ECC508A I2C crypto processor to trivial-devices
crypto: caam - limit output IV to CBC to work around CTR mode DMA issue
crypto: arc4 - refactor arc4 core code into separate library
net/mac80211: move WEP handling to ARC4 library interface
net/lib80211: move WEP handling to ARC4 library code
net/lib80211: move TKIP handling to ARC4 library code
crypto: arc4 - remove cipher implementation
ppp: mppe: switch to RC4 library interface
fs: cifs: switch to RC4 library interface
crypto: arm64/aes-ce - add 5 way interleave routines
crypto: arm64/aes-ce - implement 5 way interleave for ECB, CBC and CTR

Arnd Bergmann (5):
crypto: sun4i-ss - reduce stack usage
crypto: testmgr - dynamically allocate testvec_config
crypto: testmgr - dynamically allocate crypto_shash
crypto: serpent - mark __serpent_setkey_sbox noinline
crypto: asymmetric_keys - select CRYPTO_HASH where needed

Christian Lamparter (3):
crypto: crypto4xx - fix AES CTR blocksize value
crypto: crypto4xx - fix blocksize for cfb and ofb
crypto: crypto4xx - block ciphers should only accept complete blocks

Christophe Leroy (21):
crypto: talitos - fix skcipher failure due to wrong output IV
crypto: talitos - rename alternative AEAD algos.
crypto: talitos - reduce max key size for SEC1
crypto: talitos - check AES key size
crypto: talitos - fix CTR alg blocksize
crypto: talitos - check data blocksize in ablkcipher.
crypto: talitos - fix ECB algs ivsize
crypto: talitos - Do not modify req->cryptlen on decryption.
crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking.
crypto: talitos - properly handle split ICV.
crypto: talitos - Align SEC1 accesses to 32 bits boundaries.
crypto: talitos - fix AEAD processing.
Revert "crypto: talitos - export the talitos_submit function"
crypto: talitos - use IS_ENABLED() in has_ftr_sec1()
crypto: talitos - use SPDX-License-Identifier
crypto: talitos - fix max key size for sha384 and sha512
crypto: talitos - eliminate unneeded 'done' functions at build time
lib/scatterlist: Fix mapping iterator when sg->offset is greater than PAGE_SIZE
crypto: talitos - move struct talitos_edesc into talitos.h
crypto: talitos - fix hash on SEC1.
crypto: talitos - drop icv_ool

Daniel Axtens (3):
crypto: vmx - CTR: always increment IV as quadword
crypto: vmx - ghash: do nosimd fallback manually
crypto: vmx - Document CTR mode counter width quirks

Elena Petrova (2):
crypto: arm64/sha1-ce - correct digest for empty data in finup
crypto: arm64/sha2-ce - correct digest for empty data in finup

Eric Biggers (27):
crypto: hash - fix incorrect HASH_MAX_DESCSIZE
crypto: jitterentropy - change back to module_init()
crypto: hmac - fix memory leak in hmac_init_tfm()
crypto: vmx - convert to SPDX license identifiers
crypto: vmx - convert to skcipher API
crypto: testmgr - fix length truncation with large page size
crypto: testmgr - make extra tests depend on cryptomgr
crypto: make all templates select CRYPTO_MANAGER
crypto: echainiv - change to 'default n'
crypto: gf128mul - make unselectable by user
crypto: cryptd - move kcrypto_wq into cryptd
crypto: hash - remove CRYPTO_ALG_TYPE_DIGEST
crypto: algapi - remove crypto_tfm_in_queue()
crypto: testmgr - test the shash API
crypto: ghash - fix unaligned memory access in ghash_setkey()
crypto: lrw - use correct alignmask
crypto: chacha20poly1305 - fix atomic sleep when using async algorithm
crypto: make all generic algorithms set cra_driver_name
crypto: algapi - require cra_name and cra_driver_name
crypto: testmgr - add some more preemption points
crypto: doc - improve the skcipher API example code
crypto: x86/aesni - remove unused internal cipher algorithm
crypto: aead - un-inline encrypt and decrypt functions
crypto: skcipher - un-inline encrypt and decrypt functions
crypto: skcipher - make chunksize and walksize accessors internal
crypto: chacha20poly1305 - a few cleanups
crypto: chacha - constify ctx and iv arguments

Fabio Estevam (2):
crypto: mxs-dcp - Use devm_platform_ioremap_resource()
crypto: sahara - Use devm_platform_ioremap_resource()

Florian Fainelli (2):
dt-bindings: rng: Document BCM7211 RNG compatible string
hwrng: iproc-rng200 - Add support for 7211

Fuqian Huang (1):
crypto: amcc - remove memset after dma_alloc_coherent

Gilad Ben-Yossef (1):
crypto: ccree - add HW engine config check

Giovanni Cabiddu (5):
crypto: qat - update iv after encryption or decryption operations
crypto: qat - fix block size for aes ctr mode
crypto: qat - return proper error code in setkey
crypto: qat - return error for block ciphers for invalid requests
crypto: qat - do not offload zero length requests

Greg Kroah-Hartman (1):
crypto: nx - no need to check return value of debugfs_create functions

Gustavo A. R. Silva (1):
crypto: qat - use struct_size() helper

Haren Myneni (1):
crypto/NX: Set receive window credits to max number of CRBs in RxFIFO

Herbert Xu (3):
crypto: ixp4xx - Fix cross-compile errors due to type mismatch
crypto: atmel - Fix sparse endianness warnings
Merge git://git.kernel.org/.../herbert/crypto-2.6

Hook, Gary (7):
crypto: ccp - AES CFB mode is a stream cipher
crypto: ccp - fix AES CFB error exposed by new test vectors
crypto: ccp - Fix 3DES complaint from ccp-crypto module
crypto: doc - Add parameter documentation
crypto: doc - Fix formatting of new crypto engine content
crypto: ccp - Validate the the error value used to index error messages
crypto: ccp - Switch to SPDX license identifiers

Horia Geantă (8):
crypto: caam - avoid S/G table fetching for AEAD zero-length output
crypto: caam - fix S/G table passing page boundary
crypto: caam - convert top level drivers to libraries
crypto: caam/qi - don't allocate an extra platform device
crypto: caam/qi - fix address translations with IOMMU enabled
crypto: caam/qi - DMA map keys using proper device
crypto: caam - use len instead of nents for bulding HW S/G table
crypto: caam - update IV using HW support

Iuliana Prodan (5):
crypto: caam - fix typo in i.MX6 devices list for errata
crypto: caam - fix pkcs1pad(rsa-caam, sha256) failure because of invalid input
crypto: caam - strip input without changing crypto request
crypto: caam - disable some clock checks for iMX7ULP
ARM: dts: imx7ulp: add crypto support

Lionel Debieve (3):
crypto: stm32/crc32 - rename driver file
crypto: stm32/hash - Fix hmac issue more than 256 bytes
crypto: stm32/hash - remove interruptible condition for dma

Neil Armstrong (1):
hwrng: meson - update with SPDX Licence identifier

Nikolay Borisov (1):
crypto: xxhash - Implement xxhash support

Nishad Kamdar (2):
crypto: cavium/nitrox - Use the correct style for SPDX License Identifier
crypto: hisilicon - Use the correct style for SPDX License Identifier

Ofir Drang (2):
crypto: ccree - check that cryptocell reset completed
crypto: ccree - prevent isr handling in case driver is suspended

Sascha Hauer (5):
crypto: caam - print debugging hex dumps after unmapping
crypto: caam - print IV only when non NULL
crypto: caam - remove unused defines
crypto: caam - print debug messages at debug level
crypto: caam - print messages in caam_dump_sg at debug level

Shant KumarX Sonnad (1):
crypto: qat - add check for negative offset in alg precompute function

Stephan Mueller (1):
crypto: drbg - add FIPS 140-2 CTRNG for noise source

Stephan Müller (1):
crypto: jitter - update implementation to 2.1.2

Xin Zeng (1):
crypto: qat - remove spin_lock in qat_ablkcipher_setkey

YueHaibing (3):
crypto: arm/sha512 - Make sha512_arm_final static
crypto: atmel-i2c - Fix build error while CRC16 set to m
crypto: bcm - Make some symbols static

[email protected] (1):
crypto: ccree - Relocate driver irq registration after clk init

Documentation/crypto/api-samples.rst | 176 ++++----
Documentation/crypto/api-skcipher.rst | 2 +-
Documentation/crypto/architecture.rst | 4 +-
Documentation/crypto/crypto_engine.rst | 111 +++--
.../devicetree/bindings/crypto/atmel-crypto.txt | 13 -
.../devicetree/bindings/rng/brcm,iproc-rng200.txt | 1 +
.../devicetree/bindings/trivial-devices.yaml | 4 +
MAINTAINERS | 1 +
arch/arm/boot/dts/imx7ulp.dtsi | 23 +
arch/arm/crypto/chacha-neon-glue.c | 2 +-
arch/arm/crypto/sha512-glue.c | 2 +-
arch/arm64/crypto/aes-ce.S | 60 ++-
arch/arm64/crypto/aes-modes.S | 118 +++--
arch/arm64/crypto/aes-neon.S | 48 +--
arch/arm64/crypto/chacha-neon-glue.c | 2 +-
arch/arm64/crypto/sha1-ce-glue.c | 2 +-
arch/arm64/crypto/sha2-ce-glue.c | 2 +-
arch/x86/crypto/aesni-intel_glue.c | 45 +-
arch/x86/crypto/chacha_glue.c | 2 +-
crypto/Kconfig | 39 +-
crypto/Makefile | 3 +-
crypto/aead.c | 36 ++
crypto/algapi.c | 35 +-
crypto/anubis.c | 1 +
crypto/arc4.c | 125 +-----
crypto/asymmetric_keys/Kconfig | 3 +
crypto/chacha20poly1305.c | 73 ++--
crypto/chacha_generic.c | 4 +-
crypto/cryptd.c | 26 +-
crypto/crypto_null.c | 3 +
crypto/crypto_wq.c | 40 --
crypto/deflate.c | 1 +
crypto/drbg.c | 94 +++-
crypto/fcrypt.c | 1 +
crypto/ghash-generic.c | 8 +-
crypto/hmac.c | 4 +
crypto/jitterentropy-kcapi.c | 7 +-
crypto/jitterentropy.c | 305 ++++---------
crypto/khazad.c | 1 +
crypto/lrw.c | 2 +-
crypto/lz4.c | 1 +
crypto/lz4hc.c | 1 +
crypto/lzo-rle.c | 1 +
crypto/lzo.c | 1 +
crypto/md4.c | 7 +-
crypto/md5.c | 7 +-
crypto/michael_mic.c | 1 +
crypto/rmd128.c | 1 +
crypto/rmd160.c | 1 +
crypto/rmd256.c | 1 +
crypto/rmd320.c | 1 +
crypto/serpent_generic.c | 9 +-
crypto/skcipher.c | 34 ++
crypto/tea.c | 3 +
crypto/testmgr.c | 478 +++++++++++++++++----
crypto/testmgr.h | 116 ++++-
crypto/tgr192.c | 21 +-
crypto/wp512.c | 21 +-
crypto/xxhash_generic.c | 108 +++++
crypto/zstd.c | 1 +
drivers/char/hw_random/iproc-rng200.c | 1 +
drivers/char/hw_random/meson-rng.c | 52 +--
drivers/crypto/Kconfig | 20 +-
drivers/crypto/Makefile | 2 +
drivers/crypto/amcc/crypto4xx_alg.c | 36 +-
drivers/crypto/amcc/crypto4xx_core.c | 25 +-
drivers/crypto/amcc/crypto4xx_core.h | 10 +-
drivers/crypto/atmel-ecc.c | 403 +----------------
drivers/crypto/atmel-ecc.h | 116 -----
drivers/crypto/atmel-i2c.c | 364 ++++++++++++++++
drivers/crypto/atmel-i2c.h | 197 +++++++++
drivers/crypto/atmel-sha204a.c | 171 ++++++++
drivers/crypto/bcm/cipher.c | 8 +-
drivers/crypto/bcm/spu2.c | 10 +-
drivers/crypto/caam/Kconfig | 46 +-
drivers/crypto/caam/Makefile | 18 +-
drivers/crypto/caam/caamalg.c | 338 +++++++--------
drivers/crypto/caam/caamalg_desc.c | 147 +++----
drivers/crypto/caam/caamalg_desc.h | 4 +-
drivers/crypto/caam/caamalg_qi.c | 267 ++++++------
drivers/crypto/caam/caamalg_qi2.c | 202 +++++----
drivers/crypto/caam/caamhash.c | 329 ++++++--------
drivers/crypto/caam/caampkc.c | 177 ++++----
drivers/crypto/caam/caampkc.h | 9 +-
drivers/crypto/caam/caamrng.c | 76 +---
drivers/crypto/caam/ctrl.c | 58 +--
drivers/crypto/caam/desc_constr.h | 11 +
drivers/crypto/caam/error.c | 8 +-
drivers/crypto/caam/error.h | 2 +-
drivers/crypto/caam/intern.h | 102 ++++-
drivers/crypto/caam/jr.c | 43 ++
drivers/crypto/caam/key_gen.c | 28 +-
drivers/crypto/caam/qi.c | 52 +--
drivers/crypto/caam/sg_sw_qm.h | 18 +-
drivers/crypto/caam/sg_sw_qm2.h | 18 +-
drivers/crypto/caam/sg_sw_sec4.h | 26 +-
drivers/crypto/cavium/cpt/cptvf_algs.c | 1 -
drivers/crypto/cavium/nitrox/nitrox_debugfs.h | 2 +-
drivers/crypto/cavium/nitrox/nitrox_mbx.h | 2 +-
drivers/crypto/ccp/ccp-crypto-aes-cmac.c | 5 +-
drivers/crypto/ccp/ccp-crypto-aes-galois.c | 5 +-
drivers/crypto/ccp/ccp-crypto-aes-xts.c | 5 +-
drivers/crypto/ccp/ccp-crypto-aes.c | 12 +-
drivers/crypto/ccp/ccp-crypto-des3.c | 5 +-
drivers/crypto/ccp/ccp-crypto-main.c | 5 +-
drivers/crypto/ccp/ccp-crypto-rsa.c | 5 +-
drivers/crypto/ccp/ccp-crypto-sha.c | 5 +-
drivers/crypto/ccp/ccp-crypto.h | 5 +-
drivers/crypto/ccp/ccp-debugfs.c | 5 +-
drivers/crypto/ccp/ccp-dev-v3.c | 5 +-
drivers/crypto/ccp/ccp-dev-v5.c | 5 +-
drivers/crypto/ccp/ccp-dev.c | 101 ++---
drivers/crypto/ccp/ccp-dev.h | 7 +-
drivers/crypto/ccp/ccp-dmaengine.c | 5 +-
drivers/crypto/ccp/ccp-ops.c | 25 +-
drivers/crypto/ccp/psp-dev.c | 5 +-
drivers/crypto/ccp/psp-dev.h | 5 +-
drivers/crypto/ccp/sp-dev.c | 5 +-
drivers/crypto/ccp/sp-dev.h | 5 +-
drivers/crypto/ccp/sp-pci.c | 5 +-
drivers/crypto/ccp/sp-platform.c | 5 +-
drivers/crypto/ccree/cc_driver.c | 70 ++-
drivers/crypto/ccree/cc_driver.h | 6 +
drivers/crypto/ccree/cc_host_regs.h | 20 +
drivers/crypto/ccree/cc_pm.c | 11 +
drivers/crypto/ccree/cc_pm.h | 7 +
drivers/crypto/hisilicon/sec/sec_drv.h | 2 +-
drivers/crypto/inside-secure/safexcel.c | 13 +-
drivers/crypto/inside-secure/safexcel.h | 17 +-
drivers/crypto/inside-secure/safexcel_cipher.c | 116 +++--
drivers/crypto/inside-secure/safexcel_hash.c | 92 ++--
drivers/crypto/inside-secure/safexcel_ring.c | 3 +
drivers/crypto/ixp4xx_crypto.c | 15 +-
drivers/crypto/mxs-dcp.c | 5 +-
drivers/crypto/nx/nx-842-powernv.c | 8 +-
drivers/crypto/nx/nx.c | 4 +-
drivers/crypto/nx/nx.h | 12 +-
drivers/crypto/nx/nx_debugfs.c | 71 +--
drivers/crypto/qat/qat_common/qat_algs.c | 294 ++++++++-----
drivers/crypto/qat/qat_common/qat_crypto.h | 2 +
drivers/crypto/sahara.c | 4 +-
drivers/crypto/stm32/Makefile | 2 +-
.../crypto/stm32/{stm32_crc32.c => stm32-crc32.c} | 0
drivers/crypto/stm32/stm32-hash.c | 6 +-
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 47 +-
drivers/crypto/talitos.c | 383 ++++++++---------
drivers/crypto/talitos.h | 73 ++--
drivers/crypto/vmx/aes.c | 14 +-
drivers/crypto/vmx/aes_cbc.c | 197 +++------
drivers/crypto/vmx/aes_ctr.c | 179 +++-----
drivers/crypto/vmx/aes_xts.c | 189 ++++----
drivers/crypto/vmx/aesp8-ppc.h | 2 -
drivers/crypto/vmx/aesp8-ppc.pl | 22 +-
drivers/crypto/vmx/ghash.c | 211 ++++-----
drivers/crypto/vmx/vmx.c | 86 ++--
drivers/i2c/i2c-core-acpi.c | 6 +-
drivers/net/ppp/Kconfig | 3 +-
drivers/net/ppp/ppp_mppe.c | 97 +----
fs/cifs/Kconfig | 2 +-
fs/cifs/cifsencrypt.c | 62 +--
fs/cifs/cifsfs.c | 1 -
include/crypto/aead.h | 34 +-
include/crypto/algapi.h | 7 -
include/crypto/arc4.h | 10 +
include/crypto/chacha.h | 2 +-
include/crypto/crypto_wq.h | 8 -
include/crypto/drbg.h | 2 +
include/crypto/hash.h | 8 +-
include/crypto/internal/hash.h | 6 -
include/crypto/internal/skcipher.h | 60 +++
include/crypto/skcipher.h | 92 +---
include/linux/crypto.h | 12 +-
lib/Makefile | 2 +-
lib/crypto/Makefile | 4 +
lib/crypto/arc4.c | 74 ++++
lib/scatterlist.c | 9 +-
net/mac80211/Kconfig | 2 +-
net/mac80211/cfg.c | 4 +-
net/mac80211/ieee80211_i.h | 4 +-
net/mac80211/key.h | 1 +
net/mac80211/main.c | 6 +-
net/mac80211/mlme.c | 3 +-
net/mac80211/tkip.c | 8 +-
net/mac80211/tkip.h | 4 +-
net/mac80211/wep.c | 49 +--
net/mac80211/wep.h | 5 +-
net/mac80211/wpa.c | 4 +-
net/wireless/Kconfig | 2 +
net/wireless/lib80211_crypt_tkip.c | 48 +--
net/wireless/lib80211_crypt_wep.c | 51 +--
190 files changed, 4654 insertions(+), 4098 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-07-09 04:46:14

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Update for 5.3

The pull request you sent on Mon, 8 Jul 2019 23:08:00 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/4d2fa8b44b891f0da5ceda3e5a1402ccf0ab6f26

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-07-19 03:12:41

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.3

Hi Linus:

This push fixes the following issues:

- Fix missed wake-up race in padata.
- Use crypto_memneq in ccp.
- Fix version check in ccp.
- Fix fuzz test failure in ccp.
- Fix potential double free in crypto4xx.
- Fix compile warning in stm32.


The following changes since commit f3880a23564e3172437285ebcb5b8a124539fdae:

crypto: stm32/hash - remove interruptible condition for dma (2019-07-03 22:15:08 +0800)

are available in the git repository at:

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to cf144f81a99d1a3928f90b0936accfd3f45c9a0a:

padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (2019-07-18 13:39:54 +0800)

----------------------------------------------------------------
Cfir Cohen (1):
crypto: ccp/gcm - use const time tag comparison.

Daniel Jordan (1):
padata: use smp_mb in padata_reorder to avoid orphaned padata jobs

David Rientjes (1):
crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL

Herbert Xu (1):
crypto: stm32/hash - Fix incorrect printk modifier for size_t

Hook, Gary (1):
crypto: ccp - memset structure fields to zero before reuse

Wen Yang (1):
crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe

drivers/crypto/amcc/crypto4xx_trng.c | 1 -
drivers/crypto/ccp/ccp-ops.c | 15 +++++++++++++--
drivers/crypto/ccp/psp-dev.c | 19 ++++++++++++-------
drivers/crypto/stm32/stm32-hash.c | 2 +-
kernel/padata.c | 12 ++++++++++++
5 files changed, 38 insertions(+), 11 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-07-20 00:31:16

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.3

The pull request you sent on Fri, 19 Jul 2019 11:12:06 +0800:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/dd4542d2823ac55cb86450960423f55e818aa182

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-08-09 06:16:16

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.3

Hi Linus:

This push fixes a number of bugs in the ccp driver.


The following changes since commit cf144f81a99d1a3928f90b0936accfd3f45c9a0a:

padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (2019-07-18 13:39:54 +0800)

are available in the git repository at:

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to e2664ecbb2f26225ac6646876f2899558ffb2604:

crypto: ccp - Ignore tag length when decrypting GCM ciphertext (2019-08-02 14:36:36 +1000)

----------------------------------------------------------------
Gary R Hook (3):
crypto: ccp - Fix oops by properly managing allocated structures
crypto: ccp - Add support for valid authsize values less than 16
crypto: ccp - Ignore tag length when decrypting GCM ciphertext

drivers/crypto/ccp/ccp-crypto-aes-galois.c | 14 ++++++++++++
drivers/crypto/ccp/ccp-ops.c | 33 ++++++++++++++++++++--------
include/linux/ccp.h | 2 ++
3 files changed, 40 insertions(+), 9 deletions(-)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-08-30 07:40:47

by Herbert Xu

[permalink] [raw]
Subject: [GIT] Crypto Fixes for 5.3

Hi Linus:

This push fixes a potential crash in the ccp driver.


The following changes since commit e2664ecbb2f26225ac6646876f2899558ffb2604:

crypto: ccp - Ignore tag length when decrypting GCM ciphertext (2019-08-02 14:36:36 +1000)

are available in the Git repository at:

git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

for you to fetch changes up to 5871cd93692c8071fb9358daccb715b5081316ac:

crypto: ccp - Ignore unconfigured CCP device on suspend/resume (2019-08-22 14:22:43 +1000)

----------------------------------------------------------------
Gary R Hook (1):
crypto: ccp - Ignore unconfigured CCP device on suspend/resume

drivers/crypto/ccp/ccp-dev.c | 8 ++++++++
1 file changed, 8 insertions(+)

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

2019-08-31 02:02:56

by Linus Torvalds

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.3

On Fri, Aug 30, 2019 at 12:39 AM Herbert Xu <[email protected]> wrote:
>
> This push fixes a potential crash in the ccp driver.

Btw, Herbert, can you add "pull" somewhere in your pull request email?

It could be in the subject line (ie change the "[GIT]" to "[GIT
PULL]") but it could also be anywhere in the email body (ie a "please
pull" or something like that).

As it is, your pull requests don't actually trigger my search terms. I
eventually get to them anyway (I do try to look at _all_ my emails),
but it does mean that they don't get the priority action that other
peoples pull requests do...

Linus

2019-08-31 02:10:24

by pr-tracker-bot

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.3

The pull request you sent on Fri, 30 Aug 2019 17:39:06 +1000:

> git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git linus

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/e0f14b8ca3882988d15f0b1b853ae3c29d8c9a83

Thank you!

--
Deet-doot-dot, I am a bot.
https://korg.wiki.kernel.org/userdoc/prtracker

2019-08-31 12:13:30

by Herbert Xu

[permalink] [raw]
Subject: Re: [GIT] Crypto Fixes for 5.3

On Fri, Aug 30, 2019 at 07:01:42PM -0700, Linus Torvalds wrote:
>
> It could be in the subject line (ie change the "[GIT]" to "[GIT
> PULL]") but it could also be anywhere in the email body (ie a "please
> pull" or something like that).

Sure I'll do that for the next pull request.

I used to have the word pull in my email body but since I switched
over to git request-pull the pull word isn't there anymore.

Thanks,
--
Email: Herbert Xu <[email protected]>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt