forked from torvalds/linux
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto update from Herbert Xu: "Here is the crypto update for 4.1: New interfaces: - user-space interface for AEAD - user-space interface for RNG (i.e., pseudo RNG) New hashes: - ARMv8 SHA1/256 - ARMv8 AES - ARMv8 GHASH - ARM assembler and NEON SHA256 - MIPS OCTEON SHA1/256/512 - MIPS img-hash SHA1/256 and MD5 - Power 8 VMX AES/CBC/CTR/GHASH - PPC assembler AES, SHA1/256 and MD5 - Broadcom IPROC RNG driver Cleanups/fixes: - prevent internal helper algos from being exposed to user-space - merge common code from assembly/C SHA implementations - misc fixes" * git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (169 commits) crypto: arm - workaround for building with old binutils crypto: arm/sha256 - avoid sha256 code on ARMv7-M crypto: x86/sha512_ssse3 - move SHA-384/512 SSSE3 implementation to base layer crypto: x86/sha256_ssse3 - move SHA-224/256 SSSE3 implementation to base layer crypto: x86/sha1_ssse3 - move SHA-1 SSSE3 implementation to base layer crypto: arm64/sha2-ce - move SHA-224/256 ARMv8 implementation to base layer crypto: arm64/sha1-ce - move SHA-1 ARMv8 implementation to base layer crypto: arm/sha2-ce - move SHA-224/256 ARMv8 implementation to base layer crypto: arm/sha256 - move SHA-224/256 ASM/NEON implementation to base layer crypto: arm/sha1-ce - move SHA-1 ARMv8 implementation to base layer crypto: arm/sha1_neon - move SHA-1 NEON implementation to base layer crypto: arm/sha1 - move SHA-1 ARM asm implementation to base layer crypto: sha512-generic - move to generic glue implementation crypto: sha256-generic - move to generic glue implementation crypto: sha1-generic - move to generic glue implementation crypto: sha512 - implement base layer for SHA-512 crypto: sha256 - implement base layer for SHA-256 crypto: sha1 - implement base layer for SHA-1 crypto: api - remove instance when test failed crypto: api - Move alg ref count init to crypto_check_alg ...
- Loading branch information
Showing
168 changed files
with
18,223 additions
and
2,202 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
Imagination Technologies hardware hash accelerator | ||
|
||
The hash accelerator provides hardware hashing acceleration for | ||
SHA1, SHA224, SHA256 and MD5 hashes | ||
|
||
Required properties: | ||
|
||
- compatible : "img,hash-accelerator" | ||
- reg : Offset and length of the register set for the module, and the DMA port | ||
- interrupts : The designated IRQ line for the hashing module. | ||
- dmas : DMA specifier as per Documentation/devicetree/bindings/dma/dma.txt | ||
- dma-names : Should be "tx" | ||
- clocks : Clock specifiers | ||
- clock-names : "sys" Used to clock the hash block registers | ||
"hash" Used to clock data through the accelerator | ||
|
||
Example: | ||
|
||
hash: hash@18149600 { | ||
compatible = "img,hash-accelerator"; | ||
reg = <0x18149600 0x100>, <0x18101100 0x4>; | ||
interrupts = <GIC_SHARED 59 IRQ_TYPE_LEVEL_HIGH>; | ||
dmas = <&dma 8 0xffffffff 0>; | ||
dma-names = "tx"; | ||
clocks = <&cr_periph SYS_CLK_HASH>, <&clk_periph PERIPH_CLK_ROM>; | ||
clock-names = "sys", "hash"; | ||
}; |
12 changes: 12 additions & 0 deletions
12
Documentation/devicetree/bindings/hwrng/brcm,iproc-rng200.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
HWRNG support for the iproc-rng200 driver | ||
|
||
Required properties: | ||
- compatible : "brcm,iproc-rng200" | ||
- reg : base address and size of control register block | ||
|
||
Example: | ||
|
||
rng { | ||
compatible = "brcm,iproc-rng200"; | ||
reg = <0x18032000 0x28>; | ||
}; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2825,6 +2825,7 @@ L: [email protected] | |
T: git git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git | ||
S: Maintained | ||
F: Documentation/crypto/ | ||
F: Documentation/DocBook/crypto-API.tmpl | ||
F: arch/*/crypto/ | ||
F: crypto/ | ||
F: drivers/crypto/ | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,130 @@ | ||
|
||
menuconfig ARM_CRYPTO | ||
bool "ARM Accelerated Cryptographic Algorithms" | ||
depends on ARM | ||
help | ||
Say Y here to choose from a selection of cryptographic algorithms | ||
implemented using ARM specific CPU features or instructions. | ||
|
||
if ARM_CRYPTO | ||
|
||
config CRYPTO_SHA1_ARM | ||
tristate "SHA1 digest algorithm (ARM-asm)" | ||
select CRYPTO_SHA1 | ||
select CRYPTO_HASH | ||
help | ||
SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented | ||
using optimized ARM assembler. | ||
|
||
config CRYPTO_SHA1_ARM_NEON | ||
tristate "SHA1 digest algorithm (ARM NEON)" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_SHA1_ARM | ||
select CRYPTO_SHA1 | ||
select CRYPTO_HASH | ||
help | ||
SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented | ||
using optimized ARM NEON assembly, when NEON instructions are | ||
available. | ||
|
||
config CRYPTO_SHA1_ARM_CE | ||
tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_SHA1_ARM | ||
select CRYPTO_HASH | ||
help | ||
SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented | ||
using special ARMv8 Crypto Extensions. | ||
|
||
config CRYPTO_SHA2_ARM_CE | ||
tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_SHA256_ARM | ||
select CRYPTO_HASH | ||
help | ||
SHA-256 secure hash standard (DFIPS 180-2) implemented | ||
using special ARMv8 Crypto Extensions. | ||
|
||
config CRYPTO_SHA256_ARM | ||
tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" | ||
select CRYPTO_HASH | ||
depends on !CPU_V7M | ||
help | ||
SHA-256 secure hash standard (DFIPS 180-2) implemented | ||
using optimized ARM assembler and NEON, when available. | ||
|
||
config CRYPTO_SHA512_ARM_NEON | ||
tristate "SHA384 and SHA512 digest algorithm (ARM NEON)" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_SHA512 | ||
select CRYPTO_HASH | ||
help | ||
SHA-512 secure hash standard (DFIPS 180-2) implemented | ||
using ARM NEON instructions, when available. | ||
|
||
This version of SHA implements a 512 bit hash with 256 bits of | ||
security against collision attacks. | ||
|
||
This code also includes SHA-384, a 384 bit hash with 192 bits | ||
of security against collision attacks. | ||
|
||
config CRYPTO_AES_ARM | ||
tristate "AES cipher algorithms (ARM-asm)" | ||
depends on ARM | ||
select CRYPTO_ALGAPI | ||
select CRYPTO_AES | ||
help | ||
Use optimized AES assembler routines for ARM platforms. | ||
|
||
AES cipher algorithms (FIPS-197). AES uses the Rijndael | ||
algorithm. | ||
|
||
Rijndael appears to be consistently a very good performer in | ||
both hardware and software across a wide range of computing | ||
environments regardless of its use in feedback or non-feedback | ||
modes. Its key setup time is excellent, and its key agility is | ||
good. Rijndael's very low memory requirements make it very well | ||
suited for restricted-space environments, in which it also | ||
demonstrates excellent performance. Rijndael's operations are | ||
among the easiest to defend against power and timing attacks. | ||
|
||
The AES specifies three key sizes: 128, 192 and 256 bits | ||
|
||
See <http://csrc.nist.gov/encryption/aes/> for more information. | ||
|
||
config CRYPTO_AES_ARM_BS | ||
tristate "Bit sliced AES using NEON instructions" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_ALGAPI | ||
select CRYPTO_AES_ARM | ||
select CRYPTO_ABLK_HELPER | ||
help | ||
Use a faster and more secure NEON based implementation of AES in CBC, | ||
CTR and XTS modes | ||
|
||
Bit sliced AES gives around 45% speedup on Cortex-A15 for CTR mode | ||
and for XTS mode encryption, CBC and XTS mode decryption speedup is | ||
around 25%. (CBC encryption speed is not affected by this driver.) | ||
This implementation does not rely on any lookup tables so it is | ||
believed to be invulnerable to cache timing attacks. | ||
|
||
config CRYPTO_AES_ARM_CE | ||
tristate "Accelerated AES using ARMv8 Crypto Extensions" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_ALGAPI | ||
select CRYPTO_ABLK_HELPER | ||
help | ||
Use an implementation of AES in CBC, CTR and XTS modes that uses | ||
ARMv8 Crypto Extensions | ||
|
||
config CRYPTO_GHASH_ARM_CE | ||
tristate "PMULL-accelerated GHASH using ARMv8 Crypto Extensions" | ||
depends on KERNEL_MODE_NEON | ||
select CRYPTO_HASH | ||
select CRYPTO_CRYPTD | ||
help | ||
Use an implementation of GHASH (used by the GCM AEAD chaining mode) | ||
that uses the 64x64 to 128 bit polynomial multiplication (vmull.p64) | ||
that is part of the ARMv8 Crypto Extensions | ||
|
||
endif |
Oops, something went wrong.