Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp960740ybm; Tue, 21 May 2019 06:35:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzekGWg0yXRek71x+eJWe6V8ObKk7lirs0Fn9l9qSt2Pk5VRjTptWN9MJgokQBC8HgnfrkQ X-Received: by 2002:a65:5c82:: with SMTP id a2mr82838699pgt.378.1558445731750; Tue, 21 May 2019 06:35:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558445731; cv=none; d=google.com; s=arc-20160816; b=v7n3/9rB2UwPHveSJSjKwDvqE2ZFXbhaEwrcDNFPQrG76xrLGq58xPOMVNipfm2hvZ J7jBgy4S6TF5Iz+86fDVO4VvX43SUk3HlAA6v+npSbusBcxyyLl3Q2ymrad+x25Ohy8P N7s5RxO8tahgJ6Fe+G78JTPE9A0uU9cD+UTVlala+634xSLzHjhgZzgg1SmCmChJieBA T5SbZo233dkFpZ6qmPL+2aguunr4Y8mJGm1WFLL2Dnev4nykPZHDWRD8RtnK9VJ6uotB iBWhhmytGvfPJ91Z8YaEqe0mh3XQKTk5GyWX/16KqDqQ43q8oS8DzeTRe9kQSsuFLu1s BKOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:references :in-reply-to:message-id:dkim-signature; bh=Pj8NPn3ToXw4Az2KUmiYsb3YMZGrjiZdUaHQKVpoKcM=; b=I2ki5VHsvcr494l4lQuSIOS7g5SnO3jGCkDLAP1J8vmdMXK9wzeBkJ4oCpM+g3fW/U rsqEVmTV8xxXzZrA7N+YZdEk9IAIHhzut4PyPgalF82kki+HnGdP9Ck+EGQ/MmsjzKWY lZGzR/42gL4Jvofzdn3a3rfgpmF/SvIbrpIvw4b42HrNGFwrzoiUPSj0No6gS/6mU6WO Jt8shAH6t4AWmlMZCfB8+c1/mDT6PkUkyh3DISE/pe5FcCLpsjmYrsWyjkIcUBw3LdLv yEyYatVBX15zB6YbGsF9N/LSwyaipzZTpeay/UYWS6xbXphHk/v9mnizXD60awd3zbEt BiDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=XIHuLsPd; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h19si21161170pgg.125.2019.05.21.06.35.17; Tue, 21 May 2019 06:35:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=XIHuLsPd; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728435AbfEUNeO (ORCPT + 99 others); Tue, 21 May 2019 09:34:14 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:48517 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727986AbfEUNeL (ORCPT ); Tue, 21 May 2019 09:34:11 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 457cDb6mhbz9v2XX; Tue, 21 May 2019 15:34:07 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=XIHuLsPd; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id YXHpUBfgEOpy; Tue, 21 May 2019 15:34:07 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 457cDb5ktpz9v1nh; Tue, 21 May 2019 15:34:07 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1558445647; bh=Pj8NPn3ToXw4Az2KUmiYsb3YMZGrjiZdUaHQKVpoKcM=; h=In-Reply-To:References:From:Subject:To:Cc:Date:From; b=XIHuLsPdpLGd6Sq47Czk47Zs4qvMgFIy0gZcy375C4q9XydsfuRzBq2HbQZJSQhqQ pa/QHYlfdUVCSEhnpaAhyXnX9uV7TrMWDTwsTA5rKU8UztxDSHp2Io12RG0wcxoSFP 4/fLH446QJU2kdPYrrM6I5aWxZ6g6v8vdX2rt660= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 3F5C08B80C; Tue, 21 May 2019 15:34:09 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id 47YGaZkbQ2_P; Tue, 21 May 2019 15:34:09 +0200 (CEST) Received: from po16846vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id F40448B803; Tue, 21 May 2019 15:34:08 +0200 (CEST) Received: by po16846vm.idsi0.si.c-s.fr (Postfix, from userid 0) id C7C4C68458; Tue, 21 May 2019 13:34:08 +0000 (UTC) Message-Id: <1449c1a24e2e06ac6c8c2e1b7f73feedfd51894c.1558445259.git.christophe.leroy@c-s.fr> In-Reply-To: References: From: Christophe Leroy Subject: [PATCH v1 02/15] crypto: talitos - rename alternative AEAD algos. To: Herbert Xu , "David S. Miller" , horia.geanta@nxp.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Tue, 21 May 2019 13:34:08 +0000 (UTC) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The talitos driver has two ways to perform AEAD depending on the HW capability. Some HW support both. It is needed to give them different names to distingish which one it is for instance when a test fails. Signed-off-by: Christophe Leroy Fixes: 7405c8d7ff97 ("crypto: talitos - templates for AEAD using HMAC_SNOOP_NO_AFEU") Cc: stable@vger.kernel.org --- drivers/crypto/talitos.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c index f443cbe7da80..6f8bc6467706 100644 --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -2356,7 +2356,7 @@ static struct talitos_alg_template driver_algs[] = { .base = { .cra_name = "authenc(hmac(sha1),cbc(aes))", .cra_driver_name = "authenc-hmac-sha1-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2401,7 +2401,7 @@ static struct talitos_alg_template driver_algs[] = { .cra_name = "authenc(hmac(sha1)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha1-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2444,7 +2444,7 @@ static struct talitos_alg_template driver_algs[] = { .base = { .cra_name = "authenc(hmac(sha224),cbc(aes))", .cra_driver_name = "authenc-hmac-sha224-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2489,7 +2489,7 @@ static struct talitos_alg_template driver_algs[] = { .cra_name = "authenc(hmac(sha224)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha224-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2532,7 +2532,7 @@ static struct talitos_alg_template driver_algs[] = { .base = { .cra_name = "authenc(hmac(sha256),cbc(aes))", .cra_driver_name = "authenc-hmac-sha256-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2577,7 +2577,7 @@ static struct talitos_alg_template driver_algs[] = { .cra_name = "authenc(hmac(sha256)," "cbc(des3_ede))", .cra_driver_name = "authenc-hmac-sha256-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2706,7 +2706,7 @@ static struct talitos_alg_template driver_algs[] = { .base = { .cra_name = "authenc(hmac(md5),cbc(aes))", .cra_driver_name = "authenc-hmac-md5-" - "cbc-aes-talitos", + "cbc-aes-talitos-hsna", .cra_blocksize = AES_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, @@ -2749,7 +2749,7 @@ static struct talitos_alg_template driver_algs[] = { .base = { .cra_name = "authenc(hmac(md5),cbc(des3_ede))", .cra_driver_name = "authenc-hmac-md5-" - "cbc-3des-talitos", + "cbc-3des-talitos-hsna", .cra_blocksize = DES3_EDE_BLOCK_SIZE, .cra_flags = CRYPTO_ALG_ASYNC, }, -- 2.13.3