Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp960061ybm; Tue, 21 May 2019 06:34:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqxPvDxHZzT0fpkPoUxJK1fz6MNxLWdwLc4dhNoqnZjBNe16EMQ8Kn61N8GIUgjpTw9YO47Z X-Received: by 2002:a17:902:2924:: with SMTP id g33mr56242786plb.57.1558445695862; Tue, 21 May 2019 06:34:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558445695; cv=none; d=google.com; s=arc-20160816; b=GM6FxMdBK9bpDRUrMG5n34ONLSxNN9WXdwUj4l43b8cvGvocNnqd+9giSaQiyJmZRz k0Ppyu+hb2kK2IV35LPlFcp0k+pZXOCkoDKb9hmT0xA9qorMFOj3jfmpCFGOpR8zobvk LPwNFmWzOkCU0CES85xDlkurr+iDLvfSDh8sx9ffkKtfcCsAx11oXLyCqjSHpXRxACjD x6b2abcgOggtLyz9pOMAghfJRGnZLJyvcuWpTESI6rApefuUjVbLotoLEtQStrAgTv3E B5IMdWmtUo4gK017EVCQnqffCkb7q8i7kCwQVcZu8wXSms9GiL+8x9ROaitqvwza9IV1 goUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:message-id :dkim-signature; bh=4k6PLmXdY0SvqmTbZLBIzVnywVWKh7ktdtBKLg7zhR0=; b=xF4DPYx34UNSKNZNCcn5GJuHKd0+ZNMUJHc6mkTol+EGNtmBIbIcDKEQJ9zPOq8ZXU NzgAMhUoJTrtGdqDGUGY2jnsf9ty+Qxvk+Z4CgTKGkOgQqKq1AH/kPJyKgE/aV4VXxJk ToYWTPDJ0hgfoNGR3vEEMkPc/Z6NT82+gszumGMk/2cwWdrdvb5x1zbQ16aKmBGpQagk lkmxRpA1VR2k2KJ5gBmZYHsNJNQPYB6a+0BQX76271+5a+1nNobZH9zczYX+sEH3r7WD R9rubfi344yEU2ellAySqaT+zieGkrPOGpbOIuh29O0JclekXluq+vb1yszWj3Zm42Dm tXlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=v5L0ne9l; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k185si10515043pge.229.2019.05.21.06.34.30; Tue, 21 May 2019 06:34:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=v5L0ne9l; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728357AbfEUNeI (ORCPT + 99 others); Tue, 21 May 2019 09:34:08 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:51174 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727986AbfEUNeI (ORCPT ); Tue, 21 May 2019 09:34:08 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 457cDY6p7wz9v1nn; Tue, 21 May 2019 15:34:05 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=v5L0ne9l; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id n2tkmpse9POB; Tue, 21 May 2019 15:34:05 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 457cDY5mh8z9v1nh; Tue, 21 May 2019 15:34:05 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1558445645; bh=4k6PLmXdY0SvqmTbZLBIzVnywVWKh7ktdtBKLg7zhR0=; h=From:Subject:To:Cc:Date:From; b=v5L0ne9l7IeJ6j1RlEtDlB3tznGmL91nYxqqzqAQ9628UCkLw7a61V7lU7BlOMeaI b0O1Pfn3sC/WTzObfEfPlukMzbiQDm5GZ/6SBtxI8+0WZYgmM+uRDgWxmfFVG8vyhS VJTPMoNWaUD4+epVtwrFHblur8GZGQQvo7qCoHJ0= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 455248B80D; Tue, 21 May 2019 15:34:07 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id 45QZsARu0znr; Tue, 21 May 2019 15:34:07 +0200 (CEST) Received: from po16846vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 0F4598B803; Tue, 21 May 2019 15:34:07 +0200 (CEST) Received: by po16846vm.idsi0.si.c-s.fr (Postfix, from userid 0) id A260268458; Tue, 21 May 2019 13:34:06 +0000 (UTC) Message-Id: From: Christophe Leroy Subject: [PATCH v1 00/15] Fixing selftests failure on Talitos driver To: Herbert Xu , "David S. Miller" , horia.geanta@nxp.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Tue, 21 May 2019 13:34:06 +0000 (UTC) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Several test failures have popped up following recent changes to crypto selftests. This series fixes (most of) them. The last three patches are trivial cleanups. Christophe Leroy (15): crypto: talitos - fix skcipher failure due to wrong output IV crypto: talitos - rename alternative AEAD algos. crypto: talitos - reduce max key size for SEC1 crypto: talitos - check AES key size crypto: talitos - fix CTR alg blocksize crypto: talitos - check data blocksize in ablkcipher. crypto: talitos - fix ECB algs ivsize crypto: talitos - Do not modify req->cryptlen on decryption. crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking. crypto: talitos - properly handle split ICV. crypto: talitos - Align SEC1 accesses to 32 bits boundaries. crypto: talitos - fix AEAD processing. Revert "crypto: talitos - export the talitos_submit function" crypto: talitos - use IS_ENABLED() in has_ftr_sec1() crypto: talitos - use SPDX-License-Identifier drivers/crypto/talitos.c | 281 ++++++++++++++++++++++------------------------- drivers/crypto/talitos.h | 45 ++------ 2 files changed, 139 insertions(+), 187 deletions(-) -- 2.13.3