Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp850800ybi; Fri, 12 Jul 2019 05:42:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqyyRr8yMfWf8/FEPlt6WwWEBATB+7XlKim5XlxHFOsyMMlxyEI9VLLARQrEAU31BIsAI+3N X-Received: by 2002:a65:5a42:: with SMTP id z2mr10841946pgs.421.1562935320207; Fri, 12 Jul 2019 05:42:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562935320; cv=none; d=google.com; s=arc-20160816; b=yYU3H+aWbmf2oJplsHPPOWEWQjrYSg5ed20np70wfH539b0TAS/Y/t8uUQDlg84Dky d7M3wqVGur5xlNM/s8UhvVDJHw+sE9p51779J2nDh+OWiH0fOwijJdBSATolX27cEHD+ +QesV1OdAyiQbYe+7lGuKjdoi3rWVnZLpgQRjl7w790zwLoPGX+CZ0yOrAe2n/Fo8nSH PQQhfNhK/oGbGDKfRJHuBQdMnyRl6WXX2pCxtHIeaCzj563oyucCeTVJuu4OYIHm9Iw7 K3Dy0i+j9JSjpPU3WixtsSxjXdxl1Wmj4G1FMkl5gKBJhEBw8GgTFz0agv8NllGhbhm4 CvMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=55U3r+cyWbe0kpI4oWIrSktd7P6vubjxxhhio4SmLXg=; b=ArYTa6GwL/w5BlmlSVUL6hmmmpbwuF+rJ4aonqUkZFp33wyBn6uYLykTdYvTnzQcfB zKDNAUYdeNHRCTYthx+50O++slIk8rkVG9DVRRUJxtPtW0AkQqDClAm6TrO4/Xz3L4tC c0gxOeLkgguY2V8r1rHxM8GOm30Wnbaj/ajNZVIBUpLkE2TZepZgRMuO6yR7t9GE++Qo 9Y3yTyjQqps1doOoe7z6WasEo+qiw92rF7sTjDZm0e8D/S1xPj2ou1gwFJHnVZ8f07zP fCDpAfCd3mE4WgLYzTrgmVWssoQ+53K1fPbsmoUSpvJySsiMwh1pT1Vl9xeG2dRTZ5AC cDpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KkM+7JRY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11si7979526plm.390.2019.07.12.05.41.45; Fri, 12 Jul 2019 05:42:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KkM+7JRY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727749AbfGLMZ4 (ORCPT + 99 others); Fri, 12 Jul 2019 08:25:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:36334 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727526AbfGLMZv (ORCPT ); Fri, 12 Jul 2019 08:25:51 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 08B562084B; Fri, 12 Jul 2019 12:25:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562934350; bh=N+Y9qxi6MPnG3VpMI98wdfm1lWSTyn7eeINjyhf+uY0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KkM+7JRYu/MpXwC2S14eOcHmt1dbMKl7/fPzwZposhLVgRRTKzWWDvosGOde3R1WS RS5hhaqtOybxdBF44tmLqSI2yuUmtMLhUQBMiCMcEAPPnwITFLeBsAsN+vylLNj4WF Axdn8tMkiECpLDwt0L2oAtsjLdklJG+3le0XJab0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe Leroy , Herbert Xu Subject: [PATCH 5.1 003/138] crypto: talitos - rename alternative AEAD algos. Date: Fri, 12 Jul 2019 14:17:47 +0200 Message-Id: <20190712121628.865516968@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190712121628.731888964@linuxfoundation.org> References: <20190712121628.731888964@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe Leroy commit a1a42f84011fae6ff08441a91aefeb7febc984fc upstream. The talitos driver has two ways to perform AEAD depending on the HW capability. Some HW support both. It is needed to give them different names to distingish which one it is for instance when a test fails. Signed-off-by: Christophe Leroy Fixes: 7405c8d7ff97 ("crypto: talitos - templates for AEAD using HMAC_SNOOP_NO_AFEU") Cc: stable@vger.kernel.org Signed-off-by: Herbert Xu Signed-off-by: Greg Kroah-Hartman --- drivers/crypto/talitos.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -2299,7 +2299,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(sha1),cbc(aes))", .cra_driver_name = "authenc-hmac-sha1-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2343,7 +2343,7 @@ static struct talitos_alg_template drive .cra_name = "authenc(hmac(sha1)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha1-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2385,7 +2385,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(sha224),cbc(aes))", .cra_driver_name = "authenc-hmac-sha224-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2429,7 +2429,7 @@ static struct talitos_alg_template drive .cra_name = "authenc(hmac(sha224)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha224-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2471,7 +2471,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(sha256),cbc(aes))", .cra_driver_name = "authenc-hmac-sha256-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2515,7 +2515,7 @@ static struct talitos_alg_template drive .cra_name = "authenc(hmac(sha256)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha256-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2641,7 +2641,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(md5),cbc(aes))", .cra_driver_name = "authenc-hmac-md5-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2683,7 +2683,7 @@ static struct talitos_alg_template drive .base = { .cra_name = "authenc(hmac(md5),cbc(des3_ede))", .cra_driver_name = "authenc-hmac-md5-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, },