Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp844776ybi; Fri, 12 Jul 2019 05:35:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqw5jUlHyAVYqfqID2gosrnYEhiPst0PrbwjPPz/5jpbpS5PqN90Vc5nosZtuwUA0hDkVkQ5 X-Received: by 2002:a63:231c:: with SMTP id j28mr10466191pgj.430.1562934947204; Fri, 12 Jul 2019 05:35:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562934947; cv=none; d=google.com; s=arc-20160816; b=rLAUu5E9iEKoLcVk3tINhzmhbDjd0M8d6B6D8DA4KQZlydp3iBqKBdDOgdRUvgbm27 FareD4jqvNonPtFZa+dSWq6AddeBz8qemaqNkdMpMoVAi5TPDeuK81wlkTo90iMPitve Y+Vetwllb29TxGhL8o+T5lcoEyPgY8XeDt5QRl36FM1he17Felq6mY6gUrTWb+jWCtSk vmwVYSXo6tnWsZJSJ3OuKIZEpUPdd4p+hTe+cTFH8Y+PKq/vltaOu85WM0rRpBOSJ5yR ZtaqOsEymQATdY4qEnebL844Hz2KrgsK/L9Ur+DRlQWjo12mRCevRIw2fq/Uf4Mz+Ui+ lQwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DLyGf8erwr6FGnN7L+vWxo/cjwkTx6aSKemnzcMCjCY=; b=mCp75KYOaKhW/+sVCkNwemIEcSGZPKFvVOc8h8uSVuCiW6s980YZf63KoHq2wEkMXg Kj34dCTwWRMunfQFDjSSsVPFkMVHKAEmt/J/4qwGp+Ted/5oiofbRGLjsGrubgZZVUt3 Xh9Mkul1i1FabsjHGpwMy9ceYT9qz4V89I+8tZOo2zo1Ie+UQkZor2qr9oOoCZ18oiXy iDK2TEuo4zfwwbvT+ecse8mvv8ho3NWy/HGYYU+N0dNoYxsCq51zPfAeL8fBhQoaAX1n LpE71WJiNX3gg395a2Zkcn+0M2V0/l+N0gg8v9o+ArO3vCXI2eysT/y6LC+2jLO4jZHt v9KA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TYimfjnh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31si7736093pld.245.2019.07.12.05.35.31; Fri, 12 Jul 2019 05:35:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TYimfjnh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729583AbfGLMdJ (ORCPT + 99 others); Fri, 12 Jul 2019 08:33:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:51984 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729577AbfGLMdH (ORCPT ); Fri, 12 Jul 2019 08:33:07 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BD4EB2166E; Fri, 12 Jul 2019 12:33:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562934786; bh=w2Mla/p4PjybQS54QgZANvsxxpQKNbj0heX9OK1ESHU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TYimfjnh2V9k3UJQegLwJ4frvue3cKKAfSnkLdQVJ0qWn6bacrkNOmo+taB3/zf9R m5S50QscL7OszjzYSFQuOXMeUT74LWJLXTYUbmWlWEwVvt1G6jyfhvPj4F3LmHT4nW 0lQ4tjhDuK7yGA1+MJTINsIEh/Qqsed/0z1lUx5M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe Leroy , Herbert Xu Subject: [PATCH 5.2 03/61] crypto: talitos - rename alternative AEAD algos. Date: Fri, 12 Jul 2019 14:19:16 +0200 Message-Id: <20190712121620.802125011@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190712121620.632595223@linuxfoundation.org> References: <20190712121620.632595223@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe Leroy commit a1a42f84011fae6ff08441a91aefeb7febc984fc upstream. The talitos driver has two ways to perform AEAD depending on the HW capability. Some HW support both. It is needed to give them different names to distingish which one it is for instance when a test fails. Signed-off-by: Christophe Leroy Fixes: 7405c8d7ff97 ("crypto: talitos - templates for AEAD using HMAC_SNOOP_NO_AFEU") Cc: stable@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/talitos.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -2352,7 +2352,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(sha1),cbc(aes))", .cra_driver_name = "authenc-hmac-sha1-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2397,7 +2397,7 @@ static struct talitos_alg_template drive .cra_name = "authenc(hmac(sha1)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha1-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2440,7 +2440,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(sha224),cbc(aes))", .cra_driver_name = "authenc-hmac-sha224-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2485,7 +2485,7 @@ static struct talitos_alg_template drive .cra_name = "authenc(hmac(sha224)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha224-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2528,7 +2528,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(sha256),cbc(aes))", .cra_driver_name = "authenc-hmac-sha256-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2573,7 +2573,7 @@ static struct talitos_alg_template drive .cra_name = "authenc(hmac(sha256)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha256-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2702,7 +2702,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(md5),cbc(aes))", .cra_driver_name = "authenc-hmac-md5-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2745,7 +2745,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(md5),cbc(des3_ede))", .cra_driver_name = "authenc-hmac-md5-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, },