<div dir="ltr">Ура!</div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, May 7, 2019 at 1:48 PM Vitaly Chikunov <<a href="mailto:vt@altlinux.org">vt@altlinux.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">FYI<br>
<br>
Herbert Xu послал а Торвальдс принял ГОСТ 34.10 в mainstream для<br>
будущего ядра 5.2.<br>
<br>
----- Forwarded message from <a href="mailto:pr-tracker-bot@kernel.org" target="_blank">pr-tracker-bot@kernel.org</a> -----<br>
<br>
Date: Tue, 07 May 2019 03:25:03 +0000<br>
From: <a href="mailto:pr-tracker-bot@kernel.org" target="_blank">pr-tracker-bot@kernel.org</a><br>
To: Herbert Xu <<a href="mailto:herbert@gondor.apana.org.au" target="_blank">herbert@gondor.apana.org.au</a>><br>
Cc: Linus Torvalds <<a href="mailto:torvalds@linux-foundation.org" target="_blank">torvalds@linux-foundation.org</a>>, "David S. Miller" <<a href="mailto:davem@davemloft.net" target="_blank">davem@davemloft.net</a>>, Linux Kernel Mailing List <<a href="mailto:linux-kernel@vger.kernel.org" target="_blank">linux-kernel@vger.kernel.org</a>>, Linux<br>
Crypto Mailing List <<a href="mailto:linux-crypto@vger.kernel.org" target="_blank">linux-crypto@vger.kernel.org</a>><br>
Subject: Re: [GIT] Crypto Update for 5.2<br>
<br>
The pull request you sent on Mon, 6 May 2019 11:29:38 +0800:<br>
<br>
> git://<a href="http://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git" rel="noreferrer" target="_blank">git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git</a> linus<br>
<br>
has been merged into torvalds/linux.git:<br>
<a href="https://git.kernel.org/torvalds/c/81ff5d2cba4f86cd850b9ee4a530cd221ee45aa3" rel="noreferrer" target="_blank">https://git.kernel.org/torvalds/c/81ff5d2cba4f86cd850b9ee4a530cd221ee45aa3</a><br>
<br>
Thank you!<br>
<br>
-- <br>
Deet-doot-dot, I am a bot.<br>
<a href="https://korg.wiki.kernel.org/userdoc/prtracker" rel="noreferrer" target="_blank">https://korg.wiki.kernel.org/userdoc/prtracker</a><br>
<br>
----- End forwarded message -----<br>
----- Forwarded message from Herbert Xu <<a href="mailto:herbert@gondor.apana.org.au" target="_blank">herbert@gondor.apana.org.au</a>> -----<br>
<br>
Date: Mon, 6 May 2019 11:29:38 +0800<br>
From: Herbert Xu <<a href="mailto:herbert@gondor.apana.org.au" target="_blank">herbert@gondor.apana.org.au</a>><br>
To: Linus Torvalds <<a href="mailto:torvalds@linux-foundation.org" target="_blank">torvalds@linux-foundation.org</a>>, "David S. Miller" <<a href="mailto:davem@davemloft.net" target="_blank">davem@davemloft.net</a>>, Linux Kernel Mailing List <<a href="mailto:linux-kernel@vger.kernel.org" target="_blank">linux-kernel@vger.kernel.org</a>>, Linux<br>
Crypto Mailing List <<a href="mailto:linux-crypto@vger.kernel.org" target="_blank">linux-crypto@vger.kernel.org</a>><br>
Subject: [GIT] Crypto Update for 5.2<br>
User-Agent: NeoMutt/20170113 (1.7.2)<br>
<br>
Hi Linus: <br>
<br>
Here is the crypto update for 5.2:<br>
<br>
API:<br>
<br>
- Add support for AEAD in simd.<br>
- Add fuzz testing to testmgr.<br>
- Add panic_on_fail module parameter to testmgr.<br>
- Use per-CPU struct instead multiple variables in scompress.<br>
- Change verify API for akcipher.<br>
<br>
Algorithms:<br>
<br>
- Convert x86 AEAD algorithms over to simd.<br>
- Forbid 2-key 3DES in FIPS mode.<br>
- Add EC-RDSA (GOST 34.10) algorithm.<br>
<br>
Drivers:<br>
<br>
- Set output IV with ctr-aes in crypto4xx.<br>
- Set output IV in rockchip.<br>
- Fix potential length overflow with hashing in sun4i-ss.<br>
- Fix computation error with ctr in vmx.<br>
- Add SM4 protected keys support in ccree.<br>
- Remove long-broken mxc-scc driver.<br>
- Add rfc4106(gcm(aes)) cipher support in cavium/nitrox.<br>
<br>
<br>
Please pull from<br>
<br>
git://<a href="http://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git" rel="noreferrer" target="_blank">git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git</a> linus<br>
<br>
<br>
Andi Kleen (1):<br>
crypto: aes - Use ___cacheline_aligned for aes data<br>
<br>
Arnd Bergmann (1):<br>
crypto: ccree - reduce kernel stack usage with clang<br>
<br>
Christian Lamparter (4):<br>
crypto: crypto4xx - fix ctr-aes missing output IV<br>
crypto: crypto4xx - fix cfb and ofb "overran dst buffer" issues<br>
crypto: crypto4xx - use sync skcipher for fallback<br>
crypto: crypto4xx - get rid of redundant using_sd variable<br>
<br>
Colin Ian King (2):<br>
crypto: caam - fix spelling mistake "cannote" -> "cannot"<br>
crypto: ccree - fix spelling mistake "protedcted" -> "protected"<br>
<br>
Corentin Labbe (4):<br>
crypto: sun4i-ss - Handle better absence/presence of IV<br>
crypto: sun4i-ss - remove ivsize from ECB<br>
crypto: sun4i-ss - Fix invalid calculation of hash end<br>
crypto: sun4i-ss - fallback when length is not multiple of blocksize<br>
<br>
Dan Carpenter (1):<br>
crypto: caam/qi - Change a couple IS_ERR_OR_NULL() checks to IS_ERR()<br>
<br>
Daniel Axtens (1):<br>
crypto: vmx - fix copy-paste error in CTR mode<br>
<br>
Eric Biggers (48):<br>
crypto: simd - support wrapping AEAD algorithms<br>
crypto: x86/aesni - convert to use skcipher SIMD bulk registration<br>
crypto: x86/aesni - convert to use AEAD SIMD helpers<br>
crypto: x86/aegis128 - convert to use AEAD SIMD helpers<br>
crypto: x86/aegis128l - convert to use AEAD SIMD helpers<br>
crypto: x86/aegis256 - convert to use AEAD SIMD helpers<br>
crypto: x86/morus640 - convert to use AEAD SIMD helpers<br>
crypto: x86/morus1280 - convert to use AEAD SIMD helpers<br>
crypto: testmgr - remove workaround for AEADs that modify aead_request<br>
crypto: chacha-generic - fix use as arm64 no-NEON fallback<br>
crypto: arm64/gcm-aes-ce - fix no-NEON fallback code<br>
crypto: simd,testmgr - introduce crypto_simd_usable()<br>
crypto: x86 - convert to use crypto_simd_usable()<br>
crypto: arm - convert to use crypto_simd_usable()<br>
crypto: arm64 - convert to use crypto_simd_usable()<br>
crypto: simd - convert to use crypto_simd_usable()<br>
crypto: testmgr - test the !may_use_simd() fallback code<br>
crypto: chacha-generic - use crypto_xor_cpy()<br>
crypto: salsa20-generic - use crypto_xor_cpy()<br>
crypto: crct10dif-generic - fix use via crypto_shash_digest()<br>
crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()<br>
crypto: skcipher - don't WARN on unprocessed data after slow walk step<br>
crypto: chacha20poly1305 - set cra_name correctly<br>
crypto: streebog - fix unaligned memory accesses<br>
crypto: cts - don't support empty messages<br>
crypto: arm64/cbcmac - handle empty messages in same way as template<br>
crypto: testmgr - add panic_on_fail module parameter<br>
crypto: lrw - don't access already-freed walk.iv<br>
crypto: salsa20 - don't access already-freed walk.iv<br>
crypto: arm/aes-neonbs - don't access already-freed walk.iv<br>
crypto: arm64/aes-neonbs - don't access already-freed walk.iv<br>
crypto: vmx - return correct error code on failed setkey<br>
crypto: testmgr - expand ability to test for errors<br>
crypto: testmgr - identify test vectors by name rather than number<br>
crypto: testmgr - add helpers for fuzzing against generic implementation<br>
crypto: testmgr - fuzz hashes against their generic implementation<br>
crypto: testmgr - fuzz skciphers against their generic implementation<br>
crypto: testmgr - fuzz AEADs against their generic implementation<br>
crypto: run initcalls for generic implementations earlier<br>
crypto: cryptd - remove ability to instantiate ablkciphers<br>
crypto: cavium - remove bogus code handling cryptd<br>
crypto: powerpc - convert to use crypto_simd_usable()<br>
crypto: shash - fix missed optimization in shash_ahash_digest()<br>
crypto: gcm - fix incompatibility between "gcm" and "gcm_base"<br>
crypto: ccm - fix incompatibility between "ccm" and "ccm_base"<br>
crypto: shash - remove useless crypto_yield() in shash_ahash_digest()<br>
crypto: nx - don't abuse shash MAY_SLEEP flag<br>
crypto: shash - remove shash_desc::flags<br>
<br>
Geert Uytterhoeven (1):<br>
crypto: fips - Grammar s/options/option/, s/to/the/<br>
<br>
Gilad Ben-Yossef (31):<br>
crypto: testmgr - add missing self test entries for protected keys<br>
crypto: ccree - move key load desc. before flow desc.<br>
crypto: ccree - move MLLI desc. before key load<br>
crypto: ccree - add support for sec disabled mode<br>
crypto: ccree - add CPP completion handling<br>
crypto: ccree - add remaining logic for CPP<br>
crypto: ccree - add SM4 protected keys support<br>
crypto: ccree - adapt CPP descriptor to new HW<br>
crypto: ccree - read next IV from HW<br>
crypto: ccree - add CID and PID support<br>
crypto: ccree - fix backlog notifications<br>
crypto: ccree - use proper callback completion api<br>
crypto: ccree - remove special handling of chained sg<br>
crypto: ccree - fix typo in debugfs error path<br>
crypto: ccree - fix mem leak on error path<br>
crypto: ccree - use devm_kzalloc for device data<br>
crypto: ccree - use std api when possible<br>
crypto: ccree - copyright header update<br>
crypto: ccree - zero out internal struct before use<br>
crypto: ccree - do not copy zero size MLLI table<br>
crypto: ccree - remove unused defines<br>
crypto: ccree - simplify fragment ICV detection<br>
crypto: ccree - simplify AEAD ICV addr calculation<br>
crypto: ccree - don't mangle the request assoclen<br>
crypto: ccree - make AEAD sgl iterator well behaved<br>
crypto: ccree - zap entire sg on aead request unmap<br>
crypto: ccree - use correct internal state sizes for export<br>
crypto: ccree - allow more AEAD assoc data fragments<br>
crypto: ccree - don't map MAC key on stack<br>
crypto: ccree - don't map AEAD key and IV on stack<br>
crypto: ccree - use a proper le32 type for le32 val<br>
<br>
Herbert Xu (25):<br>
crypto: mxc-scc - Remove broken driver<br>
crypto: des_generic - Forbid 2-key in 3DES and add helpers<br>
crypto: s390 - Forbid 2-key 3DES in FIPS mode<br>
crypto: sparc - Forbid 2-key 3DES in FIPS mode<br>
crypto: atmel - Forbid 2-key 3DES in FIPS mode<br>
crypto: bcm - Forbid 2-key 3DES in FIPS mode<br>
crypto: caam - Forbid 2-key 3DES in FIPS mode<br>
crypto: cavium - Forbid 2-key 3DES in FIPS mode<br>
crypto: nitrox - Forbid 2-key 3DES in FIPS mode<br>
crypto: ccp - Forbid 2-key 3DES in FIPS mode<br>
crypto: ccree - Forbid 2-key 3DES in FIPS mode<br>
crypto: hifn_795x - Forbid 2-key 3DES in FIPS mode<br>
crypto: hisilicon - Forbid 2-key 3DES in FIPS mode<br>
crypto: inside-secure - Forbid 2-key 3DES in FIPS mode<br>
crypto: ixp4xx - Forbid 2-key 3DES in FIPS mode<br>
crypto: marvell - Forbid 2-key 3DES in FIPS mode<br>
crypto: n2 - Forbid 2-key 3DES in FIPS mode<br>
crypto: omap - Forbid 2-key 3DES in FIPS mode<br>
crypto: picoxcell - Forbid 2-key 3DES in FIPS mode<br>
crypto: qce - Forbid 2-key 3DES in FIPS mode<br>
crypto: rockchip - Forbid 2-key 3DES in FIPS mode<br>
crypto: stm32 - Forbid 2-key 3DES in FIPS mode<br>
crypto: sun4i-ss - Forbid 2-key 3DES in FIPS mode<br>
crypto: talitos - Forbid 2-key 3DES in FIPS mode<br>
crypto: ux500 - Forbid 2-key 3DES in FIPS mode<br>
<br>
Horia Geantă (4):<br>
crypto: caam/jr - update gcm detection logic<br>
crypto: caam/qi2 - fix zero-length buffer DMA mapping<br>
crypto: caam/qi2 - fix DMA mapping of stack memory<br>
crypto: caam/qi2 - generate hash keys in-place<br>
<br>
Iuliana Prodan (1):<br>
crypto: caam - limit AXI pipeline to a depth of 1<br>
<br>
Joe Perches (1):<br>
crypto: sahara - Convert IS_ENABLED uses to __is_defined<br>
<br>
Kefeng Wang (1):<br>
crypto: picoxcell - Use dev_get_drvdata()<br>
<br>
Lionel Debieve (6):<br>
hwrng: stm32 - fix unbalanced pm_runtime_enable<br>
hwrng: stm32 - set default random quality<br>
crypto: stm32/hash - Fix self test issue during export<br>
crypto: stm32/cryp - add weak key check for DES<br>
crypto: stm32/cryp - remove request mutex protection<br>
crypto: stm32/cryp - update to return iv_out<br>
<br>
Masahiro Yamada (1):<br>
crypto: ux500 - use ccflags-y instead of CFLAGS_<basename>.o<br>
<br>
Nagadheeraj Rottela (2):<br>
crypto: cavium/nitrox - Added rfc4106(gcm(aes)) cipher support<br>
crypto: cavium/nitrox - Fix HW family part name format<br>
<br>
Ofir Drang (5):<br>
crypto: ccree - pm resume first enable the source clk<br>
crypto: ccree - remove cc7x3 obsoleted AXIM configs<br>
crypto: ccree - HOST_POWER_DOWN_EN should be the last CC access during suspend<br>
crypto: ccree - add function to handle cryptocell tee fips error<br>
crypto: ccree - handle tee fips error during power management resume<br>
<br>
Ondrej Mosnacek (1):<br>
crypto: Kconfig - fix typos AEGSI -> AEGIS<br>
<br>
Rouven Czerwinski (1):<br>
hwrng: omap - Set default quality<br>
<br>
Sebastian Andrzej Siewior (3):<br>
crypto: scompress - return proper error code for allocation failure<br>
crypto: scompress - Use per-CPU struct instead multiple variables<br>
crypto: scompress - initialize per-CPU variables on each CPU<br>
<br>
Singh, Brijesh (2):<br>
crypto: ccp - introduce SEV_GET_ID2 command<br>
crypto: ccp - Do not free psp_master when PLATFORM_INIT fails<br>
<br>
Vakul Garg (5):<br>
crypto: caam/jr - optimize job ring enqueue and dequeue operations<br>
crypto: caam/jr - Remove spinlock for output job ring<br>
crypto: caam/jr - Removed redundant vars from job ring private data<br>
crypto: caam/jr - Remove extra memory barrier during job ring enqueue<br>
crypto: caam/jr - Remove extra memory barrier during job ring dequeue<br>
<br>
Vitaly Chikunov (11):<br>
crypto: akcipher - default implementations for request callbacks<br>
crypto: rsa - unimplement sign/verify for raw RSA backends<br>
crypto: akcipher - new verify API for public key algorithms<br>
KEYS: do not kmemdup digest in {public,tpm}_key_verify_signature<br>
X.509: parse public key parameters from x509 for akcipher<br>
crypto: Kconfig - create Public-key cryptography section<br>
crypto: ecc - make ecc into separate module<br>
crypto: ecrdsa - add EC-RDSA (GOST 34.10) algorithm<br>
crypto: ecrdsa - add EC-RDSA test vectors to testmgr<br>
integrity: support EC-RDSA signatures for asymmetric_verify<br>
crypto: ecrdsa - select ASN1 and OID_REGISTRY for EC-RDSA<br>
<br>
YueHaibing (15):<br>
crypto: cavium - remove unused fucntions<br>
crypto: cavium - Make some functions static<br>
crypto: ccp - Make ccp_register_rsa_alg static<br>
crypto: zip - Make some functions static<br>
crypto: bcm - remove unused array tag_to_hash_idx<br>
crypto: cavium - Make cptvf_device_init static<br>
crypto: vmx - Make p8_init and p8_exit static<br>
crypto: ccp - Use kmemdup in ccp_copy_and_save_keypart()<br>
crypto: marvell - remove set but not used variable 'index'<br>
crypto: mxs-dcp - return errcode in mxs_dcp_aes_enqueue and dcp_sha_update_fx<br>
crypto: nx842 - remove set but not used variables 'dpadding' and 'max_sync_size'<br>
crypto: mxs-dcp - remove set but not used variable 'fini'<br>
crypto: atmel - remove set but not used variable 'alg_name'<br>
crypto: ccree - Make cc_sec_disable static<br>
crypto: ccree - remove set but not used variable 'du_size'<br>
<br>
Zhang Zhijie (1):<br>
crypto: rockchip - update IV buffer to contain the next IV<br>
<br>
Documentation/crypto/api-samples.rst | 1 -<br>
arch/arm/crypto/aes-neonbs-glue.c | 2 +<br>
arch/arm/crypto/chacha-neon-glue.c | 5 +-<br>
arch/arm/crypto/crc32-ce-glue.c | 5 +-<br>
arch/arm/crypto/crct10dif-ce-glue.c | 3 +-<br>
arch/arm/crypto/ghash-ce-glue.c | 10 +-<br>
arch/arm/crypto/nhpoly1305-neon-glue.c | 3 +-<br>
arch/arm/crypto/sha1-ce-glue.c | 5 +-<br>
arch/arm/crypto/sha1_neon_glue.c | 5 +-<br>
arch/arm/crypto/sha2-ce-glue.c | 5 +-<br>
arch/arm/crypto/sha256_neon_glue.c | 5 +-<br>
arch/arm/crypto/sha512-neon-glue.c | 5 +-<br>
arch/arm64/crypto/aes-ce-ccm-glue.c | 7 +-<br>
arch/arm64/crypto/aes-ce-glue.c | 5 +-<br>
arch/arm64/crypto/aes-glue.c | 6 +-<br>
arch/arm64/crypto/aes-neonbs-glue.c | 4 +-<br>
arch/arm64/crypto/chacha-neon-glue.c | 5 +-<br>
arch/arm64/crypto/crct10dif-ce-glue.c | 5 +-<br>
arch/arm64/crypto/ghash-ce-glue.c | 17 +-<br>
arch/arm64/crypto/nhpoly1305-neon-glue.c | 3 +-<br>
arch/arm64/crypto/sha1-ce-glue.c | 7 +-<br>
arch/arm64/crypto/sha2-ce-glue.c | 7 +-<br>
arch/arm64/crypto/sha256-glue.c | 5 +-<br>
arch/arm64/crypto/sha3-ce-glue.c | 5 +-<br>
arch/arm64/crypto/sha512-ce-glue.c | 7 +-<br>
arch/arm64/crypto/sm3-ce-glue.c | 7 +-<br>
arch/arm64/crypto/sm4-ce-glue.c | 5 +-<br>
arch/powerpc/crypto/crc32c-vpmsum_glue.c | 4 +-<br>
arch/powerpc/crypto/crct10dif-vpmsum_glue.c | 4 +-<br>
arch/powerpc/include/asm/Kbuild | 1 +<br>
arch/s390/crypto/des_s390.c | 21 +-<br>
arch/sparc/crypto/des_glue.c | 11 +-<br>
arch/x86/crypto/aegis128-aesni-glue.c | 157 +--<br>
arch/x86/crypto/aegis128l-aesni-glue.c | 157 +--<br>
arch/x86/crypto/aegis256-aesni-glue.c | 157 +--<br>
arch/x86/crypto/aesni-intel_glue.c | 212 +---<br>
arch/x86/crypto/chacha_glue.c | 6 +-<br>
arch/x86/crypto/crc32-pclmul_glue.c | 5 +-<br>
arch/x86/crypto/crc32c-intel_glue.c | 7 +-<br>
arch/x86/crypto/crct10dif-pclmul_glue.c | 20 +-<br>
arch/x86/crypto/ghash-clmulni-intel_glue.c | 11 +-<br>
arch/x86/crypto/morus1280-avx2-glue.c | 12 +-<br>
arch/x86/crypto/morus1280-sse2-glue.c | 12 +-<br>
arch/x86/crypto/morus1280_glue.c | 85 --<br>
arch/x86/crypto/morus640-sse2-glue.c | 12 +-<br>
arch/x86/crypto/morus640_glue.c | 85 --<br>
arch/x86/crypto/nhpoly1305-avx2-glue.c | 5 +-<br>
arch/x86/crypto/nhpoly1305-sse2-glue.c | 5 +-<br>
arch/x86/crypto/poly1305_glue.c | 4 +-<br>
arch/x86/crypto/sha1_ssse3_glue.c | 7 +-<br>
arch/x86/crypto/sha256_ssse3_glue.c | 7 +-<br>
arch/x86/crypto/sha512_ssse3_glue.c | 10 +-<br>
arch/x86/power/hibernate.c | 1 -<br>
crypto/842.c | 2 +-<br>
crypto/Kconfig | 85 +-<br>
crypto/Makefile | 10 +-<br>
crypto/adiantum.c | 3 +-<br>
crypto/aegis128.c | 2 +-<br>
crypto/aegis128l.c | 2 +-<br>
crypto/aegis256.c | 2 +-<br>
crypto/aes_generic.c | 10 +-<br>
crypto/akcipher.c | 14 +<br>
crypto/algboss.c | 8 +-<br>
crypto/ansi_cprng.c | 2 +-<br>
crypto/anubis.c | 2 +-<br>
crypto/arc4.c | 2 +-<br>
crypto/asymmetric_keys/asym_tpm.c | 43 +-<br>
crypto/asymmetric_keys/pkcs7_verify.c | 1 -<br>
crypto/asymmetric_keys/public_key.c | 105 +-<br>
crypto/asymmetric_keys/verify_pefile.c | 1 -<br>
crypto/asymmetric_keys/x509.asn1 | 2 +-<br>
crypto/asymmetric_keys/x509_cert_parser.c | 57 +-<br>
crypto/asymmetric_keys/x509_public_key.c | 1 -<br>
crypto/authenc.c | 2 +-<br>
crypto/authencesn.c | 2 +-<br>
crypto/blowfish_generic.c | 2 +-<br>
crypto/camellia_generic.c | 2 +-<br>
crypto/cast5_generic.c | 2 +-<br>
crypto/cast6_generic.c | 2 +-<br>
crypto/cbc.c | 2 +-<br>
crypto/ccm.c | 46 +-<br>
crypto/cfb.c | 2 +-<br>
crypto/chacha20poly1305.c | 6 +-<br>
crypto/chacha_generic.c | 12 +-<br>
crypto/cmac.c | 2 +-<br>
crypto/crc32_generic.c | 2 +-<br>
crypto/crc32c_generic.c | 2 +-<br>
crypto/crct10dif_generic.c | 13 +-<br>
crypto/cryptd.c | 252 ----<br>
crypto/crypto_null.c | 2 +-<br>
crypto/ctr.c | 2 +-<br>
crypto/cts.c | 20 +-<br>
crypto/deflate.c | 2 +-<br>
crypto/des_generic.c | 13 +-<br>
crypto/dh.c | 2 +-<br>
crypto/drbg.c | 3 +-<br>
crypto/ecb.c | 2 +-<br>
crypto/ecc.c | 417 ++++++-<br>
crypto/ecc.h | 153 ++-<br>
crypto/ecc_curve_defs.h | 15 -<br>
crypto/ecdh.c | 2 +-<br>
crypto/echainiv.c | 2 +-<br>
crypto/ecrdsa.c | 296 +++++<br>
crypto/ecrdsa_defs.h | 225 ++++<br>
crypto/ecrdsa_params.asn1 | 4 +<br>
crypto/ecrdsa_pub_key.asn1 | 1 +<br>
crypto/fcrypt.c | 2 +-<br>
crypto/fips.c | 2 +-<br>
crypto/gcm.c | 36 +-<br>
crypto/ghash-generic.c | 2 +-<br>
crypto/hmac.c | 13 +-<br>
crypto/jitterentropy-kcapi.c | 2 +-<br>
crypto/keywrap.c | 2 +-<br>
crypto/khazad.c | 2 +-<br>
crypto/lrw.c | 6 +-<br>
crypto/lz4.c | 2 +-<br>
crypto/lz4hc.c | 2 +-<br>
crypto/lzo-rle.c | 2 +-<br>
crypto/lzo.c | 2 +-<br>
crypto/md4.c | 2 +-<br>
crypto/md5.c | 2 +-<br>
crypto/michael_mic.c | 2 +-<br>
crypto/morus1280.c | 2 +-<br>
crypto/morus640.c | 2 +-<br>
crypto/nhpoly1305.c | 2 +-<br>
crypto/ofb.c | 2 +-<br>
crypto/pcbc.c | 2 +-<br>
crypto/pcrypt.c | 2 +-<br>
crypto/poly1305_generic.c | 2 +-<br>
crypto/rmd128.c | 2 +-<br>
crypto/rmd160.c | 2 +-<br>
crypto/rmd256.c | 2 +-<br>
crypto/rmd320.c | 2 +-<br>
crypto/rsa-pkcs1pad.c | 33 +-<br>
crypto/rsa.c | 111 +-<br>
crypto/salsa20_generic.c | 13 +-<br>
crypto/scompress.c | 129 +-<br>
crypto/seed.c | 2 +-<br>
crypto/seqiv.c | 2 +-<br>
crypto/serpent_generic.c | 2 +-<br>
crypto/sha1_generic.c | 2 +-<br>
crypto/sha256_generic.c | 2 +-<br>
crypto/sha3_generic.c | 2 +-<br>
crypto/sha512_generic.c | 2 +-<br>
crypto/shash.c | 7 +-<br>
crypto/simd.c | 273 ++++-<br>
crypto/skcipher.c | 9 +-<br>
crypto/sm3_generic.c | 2 +-<br>
crypto/sm4_generic.c | 2 +-<br>
crypto/streebog_generic.c | 27 +-<br>
crypto/tcrypt.c | 2 +-<br>
crypto/tea.c | 2 +-<br>
crypto/testmgr.c | 1242 +++++++++++++++++---<br>
crypto/testmgr.h | 181 ++-<br>
crypto/tgr192.c | 2 +-<br>
crypto/twofish_generic.c | 2 +-<br>
crypto/vmac.c | 2 +-<br>
crypto/wp512.c | 2 +-<br>
crypto/xcbc.c | 2 +-<br>
crypto/xts.c | 2 +-<br>
crypto/zstd.c | 2 +-<br>
drivers/block/drbd/drbd_receiver.c | 1 -<br>
drivers/block/drbd/drbd_worker.c | 2 -<br>
drivers/char/hw_random/omap-rng.c | 1 +<br>
drivers/char/hw_random/stm32-rng.c | 9 +<br>
drivers/crypto/Kconfig | 9 -<br>
drivers/crypto/Makefile | 1 -<br>
drivers/crypto/amcc/crypto4xx_alg.c | 24 +-<br>
drivers/crypto/amcc/crypto4xx_core.c | 48 +-<br>
drivers/crypto/amcc/crypto4xx_core.h | 3 +-<br>
drivers/crypto/atmel-tdes.c | 106 +-<br>
drivers/crypto/axis/artpec6_crypto.c | 2 -<br>
drivers/crypto/bcm/cipher.c | 22 +-<br>
drivers/crypto/bcm/spu.c | 3 -<br>
drivers/crypto/bcm/util.c | 1 -<br>
drivers/crypto/caam/caamalg.c | 75 +-<br>
drivers/crypto/caam/caamalg_qi.c | 66 +-<br>
drivers/crypto/caam/caamalg_qi2.c | 243 ++--<br>
drivers/crypto/caam/caamalg_qi2.h | 2 -<br>
drivers/crypto/caam/caampkc.c | 2 -<br>
drivers/crypto/caam/ctrl.c | 20 +<br>
drivers/crypto/caam/error.c | 2 +-<br>
drivers/crypto/caam/intern.h | 4 +-<br>
drivers/crypto/caam/jr.c | 33 +-<br>
drivers/crypto/caam/qi.c | 4 +-<br>
drivers/crypto/caam/regs.h | 11 +<br>
drivers/crypto/cavium/cpt/cptvf_algs.c | 30 +-<br>
drivers/crypto/cavium/cpt/cptvf_main.c | 2 +-<br>
drivers/crypto/cavium/cpt/cptvf_mbox.c | 17 -<br>
drivers/crypto/cavium/cpt/cptvf_reqmanager.c | 6 +-<br>
drivers/crypto/cavium/nitrox/nitrox_aead.c | 337 ++++--<br>
drivers/crypto/cavium/nitrox/nitrox_hal.c | 65 +-<br>
drivers/crypto/cavium/nitrox/nitrox_req.h | 46 +-<br>
drivers/crypto/cavium/nitrox/nitrox_skcipher.c | 8 +-<br>
drivers/crypto/cavium/zip/zip_crypto.c | 8 +-<br>
drivers/crypto/ccp/ccp-crypto-des3.c | 21 +-<br>
drivers/crypto/ccp/ccp-crypto-rsa.c | 8 +-<br>
drivers/crypto/ccp/ccp-crypto-sha.c | 2 -<br>
drivers/crypto/ccp/psp-dev.c | 69 +-<br>
drivers/crypto/ccree/Makefile | 1 +<br>
drivers/crypto/ccree/cc_aead.c | 118 +-<br>
drivers/crypto/ccree/cc_aead.h | 3 +-<br>
drivers/crypto/ccree/cc_buffer_mgr.c | 341 ++----<br>
drivers/crypto/ccree/cc_buffer_mgr.h | 2 +-<br>
drivers/crypto/ccree/cc_cipher.c | 585 +++++----<br>
drivers/crypto/ccree/cc_cipher.h | 3 +-<br>
drivers/crypto/ccree/cc_crypto_ctx.h | 10 +-<br>
drivers/crypto/ccree/cc_debugfs.c | 44 +-<br>
drivers/crypto/ccree/cc_debugfs.h | 2 +-<br>
drivers/crypto/ccree/cc_driver.c | 120 +-<br>
drivers/crypto/ccree/cc_driver.h | 36 +-<br>
drivers/crypto/ccree/cc_fips.c | 29 +-<br>
drivers/crypto/ccree/cc_fips.h | 4 +-<br>
drivers/crypto/ccree/cc_hash.c | 64 +-<br>
drivers/crypto/ccree/cc_hash.h | 2 +-<br>
drivers/crypto/ccree/cc_host_regs.h | 123 +-<br>
drivers/crypto/ccree/cc_hw_queue_defs.h | 35 +-<br>
drivers/crypto/ccree/cc_ivgen.c | 11 +-<br>
drivers/crypto/ccree/cc_ivgen.h | 2 +-<br>
drivers/crypto/ccree/cc_kernel_regs.h | 2 +-<br>
drivers/crypto/ccree/cc_lli_defs.h | 4 +-<br>
drivers/crypto/ccree/cc_pm.c | 11 +-<br>
drivers/crypto/ccree/cc_pm.h | 2 +-<br>
drivers/crypto/ccree/cc_request_mgr.c | 116 +-<br>
drivers/crypto/ccree/cc_request_mgr.h | 2 +-<br>
drivers/crypto/ccree/cc_sram_mgr.c | 7 +-<br>
drivers/crypto/ccree/cc_sram_mgr.h | 2 +-<br>
drivers/crypto/chelsio/chcr_algo.c | 2 -<br>
drivers/crypto/hifn_795x.c | 31 +-<br>
drivers/crypto/hisilicon/sec/sec_algs.c | 12 +-<br>
drivers/crypto/inside-secure/safexcel_cipher.c | 11 +-<br>
drivers/crypto/ixp4xx_crypto.c | 64 +-<br>
drivers/crypto/marvell/cipher.c | 11 +-<br>
drivers/crypto/marvell/hash.c | 3 +-<br>
drivers/crypto/mediatek/mtk-sha.c | 3 -<br>
drivers/crypto/mxc-scc.c | 767 ------------<br>
drivers/crypto/mxs-dcp.c | 14 +-<br>
drivers/crypto/n2_core.c | 15 +-<br>
drivers/crypto/nx/nx-842-pseries.c | 6 +-<br>
drivers/crypto/nx/nx-842.c | 3 +-<br>
drivers/crypto/nx/nx-aes-xcbc.c | 12 +-<br>
drivers/crypto/nx/nx-sha256.c | 6 +-<br>
drivers/crypto/nx/nx-sha512.c | 6 +-<br>
drivers/crypto/omap-des.c | 29 +-<br>
drivers/crypto/omap-sham.c | 2 -<br>
drivers/crypto/padlock-sha.c | 5 -<br>
drivers/crypto/picoxcell_crypto.c | 35 +-<br>
drivers/crypto/qat/qat_common/qat_algs.c | 1 -<br>
drivers/crypto/qat/qat_common/qat_asym_algs.c | 2 -<br>
drivers/crypto/qce/ablkcipher.c | 22 +-<br>
drivers/crypto/rockchip/rk3288_crypto_ablkcipher.c | 61 +-<br>
drivers/crypto/s5p-sss.c | 1 -<br>
drivers/crypto/sahara.c | 6 +-<br>
drivers/crypto/stm32/Kconfig | 1 +<br>
drivers/crypto/stm32/stm32-cryp.c | 74 +-<br>
drivers/crypto/stm32/stm32-hash.c | 4 +-<br>
drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 78 +-<br>
drivers/crypto/sunxi-ss/sun4i-ss-core.c | 19 +-<br>
drivers/crypto/sunxi-ss/sun4i-ss-hash.c | 5 +-<br>
drivers/crypto/sunxi-ss/sun4i-ss.h | 2 +<br>
drivers/crypto/talitos.c | 108 +-<br>
drivers/crypto/ux500/cryp/Makefile | 6 +-<br>
drivers/crypto/ux500/cryp/cryp_core.c | 86 +-<br>
drivers/crypto/vmx/aes.c | 14 +-<br>
drivers/crypto/vmx/aes_cbc.c | 14 +-<br>
drivers/crypto/vmx/aes_ctr.c | 10 +-<br>
drivers/crypto/vmx/aes_xts.c | 14 +-<br>
drivers/crypto/vmx/<a href="http://aesp8-ppc.pl" rel="noreferrer" target="_blank">aesp8-ppc.pl</a> | 4 +-<br>
drivers/crypto/vmx/ghash.c | 10 +-<br>
drivers/crypto/vmx/vmx.c | 4 +-<br>
drivers/infiniband/sw/rxe/rxe.h | 1 -<br>
drivers/md/dm-crypt.c | 3 -<br>
drivers/md/dm-integrity.c | 2 -<br>
drivers/net/ppp/ppp_mppe.c | 1 -<br>
drivers/net/wireless/intersil/orinoco/mic.c | 1 -<br>
drivers/nfc/s3fwrn5/firmware.c | 1 -<br>
drivers/staging/ks7010/ks_hostif.c | 1 -<br>
drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 1 -<br>
.../rtl8192u/ieee80211/ieee80211_crypt_tkip.c | 1 -<br>
drivers/target/iscsi/iscsi_target_auth.c | 1 -<br>
drivers/thunderbolt/domain.c | 1 -<br>
fs/cifs/misc.c | 1 -<br>
fs/crypto/keyinfo.c | 1 -<br>
fs/ecryptfs/crypto.c | 1 -<br>
fs/ecryptfs/keystore.c | 1 -<br>
fs/ext4/ext4.h | 1 -<br>
fs/f2fs/f2fs.h | 1 -<br>
fs/nfsd/nfs4recover.c | 1 -<br>
fs/ubifs/auth.c | 6 -<br>
fs/ubifs/replay.c | 2 -<br>
include/crypto/aes.h | 8 +-<br>
include/crypto/akcipher.h | 54 +-<br>
include/crypto/cryptd.h | 18 +-<br>
include/crypto/des.h | 43 +<br>
include/crypto/hash.h | 10 +-<br>
include/crypto/internal/simd.h | 44 +<br>
include/crypto/morus1280_glue.h | 79 +-<br>
include/crypto/morus640_glue.h | 79 +-<br>
include/crypto/public_key.h | 4 +<br>
include/crypto/streebog.h | 5 +-<br>
include/linux/jbd2.h | 1 -<br>
include/linux/oid_registry.h | 18 +<br>
include/linux/psp-sev.h | 3 +-<br>
include/uapi/linux/psp-sev.h | 18 +-<br>
kernel/kexec_file.c | 1 -<br>
lib/crc-t10dif.c | 1 -<br>
lib/digsig.c | 1 -<br>
lib/libcrc32c.c | 1 -<br>
net/bluetooth/amp.c | 1 -<br>
net/bluetooth/smp.c | 1 -<br>
net/sctp/auth.c | 1 -<br>
net/sctp/sm_make_chunk.c | 2 -<br>
net/sunrpc/auth_gss/gss_krb5_crypto.c | 2 -<br>
net/sunrpc/auth_gss/gss_krb5_mech.c | 1 -<br>
net/wireless/lib80211_crypt_tkip.c | 1 -<br>
security/apparmor/crypto.c | 2 -<br>
security/integrity/digsig_asymmetric.c | 11 +-<br>
security/integrity/evm/evm_crypto.c | 1 -<br>
security/integrity/ima/ima_crypto.c | 4 -<br>
security/keys/dh.c | 1 -<br>
security/keys/encrypted-keys/encrypted.c | 1 -<br>
security/keys/trusted.c | 1 -<br>
322 files changed, 5973 insertions(+), 4248 deletions(-)<br>
<br>
Thanks,<br>
-- <br>
Email: Herbert Xu <<a href="mailto:herbert@gondor.apana.org.au" target="_blank">herbert@gondor.apana.org.au</a>><br>
Home Page: <a href="http://gondor.apana.org.au/~herbert/" rel="noreferrer" target="_blank">http://gondor.apana.org.au/~herbert/</a><br>
PGP Key: <a href="http://gondor.apana.org.au/~herbert/pubkey.txt" rel="noreferrer" target="_blank">http://gondor.apana.org.au/~herbert/pubkey.txt</a><br>
<br>
----- End forwarded message -----<br>
_______________________________________________<br>
oss-gost-crypto mailing list<br>
<a href="mailto:oss-gost-crypto@lists.altlinux.org" target="_blank">oss-gost-crypto@lists.altlinux.org</a><br>
<a href="https://lists.altlinux.org/mailman/listinfo/oss-gost-crypto" rel="noreferrer" target="_blank">https://lists.altlinux.org/mailman/listinfo/oss-gost-crypto</a><br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="gmail_signature">SY, Dmitry Belyavsky</div>