Re: [PATCH 00/35] crypto: ccree: features and bug fixes for 5.2

From: Herbert Xu
Date: Thu Apr 25 2019 - 03:51:08 EST


On Thu, Apr 18, 2019 at 04:38:35PM +0300, Gilad Ben-Yossef wrote:
> A set of new features, mostly support for CryptoCell 713
> features including protected keys, security disable mode and
> new HW revision indetification interface alongside many bug fixes.
>
> Gilad Ben-Yossef (30):
> crypto: testmgr: add missing self test entries for protected keys
> crypto: ccree: move key load desc. before flow desc.
> crypto: ccree: move MLLI desc. before key load
> crypto: ccree: add support for sec disabled mode
> crypto: ccree: add CPP completion handling
> crypto: ccree: add remaining logic for CPP
> crypto: ccree: add SM4 protected keys support
> crypto: ccree: adapt CPP descriptor to new HW
> crypto: ccree: read next IV from HW
> crypto: ccree: add CID and PID support
> crypto: ccree: fix backlog notifications
> crypto: ccree: use proper callback completion api
> crypto: ccree: remove special handling of chained sg
> crypto: ccree: fix typo in debugfs error path
> crypto: ccree: fix mem leak on error path
> crypto: ccree: use devm_kzalloc for device data
> crypto: ccree: use std api when possible
> crypto: ccree: copyright header update
> crypto: ccree: zero out internal struct before use
> crypto: ccree: do not copy zero size MLLI table
> crypto: ccree: remove unused defines
> crypto: ccree: simplify fragment ICV detection
> crypto: ccree: simplify AEAD ICV addr calculation
> crypto: ccree: don't mangle the request assoclen
> crypto: ccree: make AEAD sgl iterator well behaved
> crypto: ccree: zap entire sg on aead request unmap
> crypto: ccree: use correct internal state sizes for export
> crypto: ccree: allow more AEAD assoc data fragments
> crypto: ccree: don't map MAC key on stack
> crypto: ccree: don't map AEAD key and IV on stack
>
> Ofir Drang (5):
> crypto: ccree: pm resume first enable the source clk
> crypto: ccree: remove cc7x3 obsoleted AXIM configs
> crypto: ccree: HOST_POWER_DOWN_EN should be the last CC access during
> suspend
> crypto: ccree: add function to handle cryptocell tee fips error
> crypto: ccree: handle tee fips error during power management resume
>
> crypto/testmgr.c | 20 +
> drivers/crypto/ccree/Makefile | 1 +
> drivers/crypto/ccree/cc_aead.c | 81 +++-
> drivers/crypto/ccree/cc_aead.h | 3 +-
> drivers/crypto/ccree/cc_buffer_mgr.c | 341 ++++----------
> drivers/crypto/ccree/cc_buffer_mgr.h | 2 +-
> drivers/crypto/ccree/cc_cipher.c | 591 +++++++++++++++---------
> drivers/crypto/ccree/cc_cipher.h | 3 +-
> drivers/crypto/ccree/cc_crypto_ctx.h | 10 +-
> drivers/crypto/ccree/cc_debugfs.c | 44 +-
> drivers/crypto/ccree/cc_debugfs.h | 2 +-
> drivers/crypto/ccree/cc_driver.c | 120 ++++-
> drivers/crypto/ccree/cc_driver.h | 36 +-
> drivers/crypto/ccree/cc_fips.c | 29 +-
> drivers/crypto/ccree/cc_fips.h | 4 +-
> drivers/crypto/ccree/cc_hash.c | 64 ++-
> drivers/crypto/ccree/cc_hash.h | 2 +-
> drivers/crypto/ccree/cc_host_regs.h | 123 ++++-
> drivers/crypto/ccree/cc_hw_queue_defs.h | 35 +-
> drivers/crypto/ccree/cc_ivgen.c | 11 +-
> drivers/crypto/ccree/cc_ivgen.h | 2 +-
> drivers/crypto/ccree/cc_kernel_regs.h | 2 +-
> drivers/crypto/ccree/cc_lli_defs.h | 4 +-
> drivers/crypto/ccree/cc_pm.c | 11 +-
> drivers/crypto/ccree/cc_pm.h | 2 +-
> drivers/crypto/ccree/cc_request_mgr.c | 116 +++--
> drivers/crypto/ccree/cc_request_mgr.h | 2 +-
> drivers/crypto/ccree/cc_sram_mgr.c | 7 +-
> drivers/crypto/ccree/cc_sram_mgr.h | 2 +-
> 29 files changed, 1068 insertions(+), 602 deletions(-)

All applied. Thanks.
--
Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt