Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp781729ybi; Thu, 30 May 2019 06:42:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqxGEhreC+D8K2pBNIWq/dxjSAosSE3wBqV+rO8pToIBd9vdQeWMcwGCYTvnVVoU2YrBBq50 X-Received: by 2002:aa7:864e:: with SMTP id a14mr3883666pfo.132.1559223753139; Thu, 30 May 2019 06:42:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559223753; cv=none; d=google.com; s=arc-20160816; b=UrInyBuxILxZ5HSSmYgpRcGAhIKr7V/9OAraG2/ej4PkMNhPoKdQ04gTE6V1Jx0SGY 1koC5sro+KPDDo7Hk6v2T9P+FBu+9BVLj1m+VhCl1mL9TM+Lg1a0vR2333zws2QsLXHL tGzr1ol2ETF+BUeDGk0lnhmBnM7thJb4qjYJSOYRmUw6654COrRo3ghrN9rzjyrBUsVn abLqKKBRoTLFinqs4esdRLbWSnaJX9k37VKUJXgck9iHnfJrI6e1bpexZ1Kw90UXeE1q uUc+cqXCU/26WljskTlUC02FNMCk7paeTA/jJ/TmHNHLU4yB89twrj4h60sFb7HDvmNT iKVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=phpfREc6zh0oLFsvsyA3Pf3nUvBbFF0Jtlj8UbykUlM=; b=LxETbOKEjgqUOpTNsmmmqmHPEw4Nnx45D0KjvQiYkEiIW1afkFGhrPebs6dlTvOGhM F/PzJ2kc0T4Z2WnSWIaXbeS8uvGv6O3gCnxNVgV4WAgq7bmIx42WPYrkTPk0qoEg8han yLgkbUjxeamkqWnFN/R/Qt30lmDL3OYMGDBbBzX7/6Axi6TU/THPvVKnZhAfzW2G5Yf/ zBXWSLykXD5kI+PIFmI3bUZglBV9Vqbz/23Jb7OvnMe5qIIMYWbcVHqaYBpklsfZElVH TZKIcpieT51jTe0GEKMmgnvB83VRlxN7XxH8hdRFMSzCZA79RO4xrnSkRa0EUpmtrRcq SG2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b1si3052924pls.93.2019.05.30.06.42.19; Thu, 30 May 2019 06:42:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726509AbfE3NmS (ORCPT + 99 others); Thu, 30 May 2019 09:42:18 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:38042 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725913AbfE3NmS (ORCPT ); Thu, 30 May 2019 09:42:18 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1hWLJq-0005bs-ME; Thu, 30 May 2019 21:42:10 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1hWLJo-0003f3-NQ; Thu, 30 May 2019 21:42:08 +0800 Date: Thu, 30 May 2019 21:42:08 +0800 From: Herbert Xu To: Christophe Leroy Cc: "David S. Miller" , horia.geanta@nxp.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v1 00/15] Fixing selftests failure on Talitos driver Message-ID: <20190530134208.frpozzmqtafw35hy@gondor.apana.org.au> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, May 21, 2019 at 01:34:06PM +0000, Christophe Leroy wrote: > Several test failures have popped up following recent changes to crypto > selftests. > > This series fixes (most of) them. > > The last three patches are trivial cleanups. > > Christophe Leroy (15): > crypto: talitos - fix skcipher failure due to wrong output IV > crypto: talitos - rename alternative AEAD algos. > crypto: talitos - reduce max key size for SEC1 > crypto: talitos - check AES key size > crypto: talitos - fix CTR alg blocksize > crypto: talitos - check data blocksize in ablkcipher. > crypto: talitos - fix ECB algs ivsize > crypto: talitos - Do not modify req->cryptlen on decryption. > crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking. > crypto: talitos - properly handle split ICV. > crypto: talitos - Align SEC1 accesses to 32 bits boundaries. > crypto: talitos - fix AEAD processing. > Revert "crypto: talitos - export the talitos_submit function" > crypto: talitos - use IS_ENABLED() in has_ftr_sec1() > crypto: talitos - use SPDX-License-Identifier > > drivers/crypto/talitos.c | 281 ++++++++++++++++++++++------------------------- > drivers/crypto/talitos.h | 45 ++------ > 2 files changed, 139 insertions(+), 187 deletions(-) Patch 1 was already applied. 2-15 applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt