Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp3348125ybd; Tue, 25 Jun 2019 00:43:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqylH40+3GkdQ319dOzU1OLqzO0+hYfeu5cU6JYvIcryqlWvTgg2Lg2zRrjaMBV+Lz9VGmAO X-Received: by 2002:a17:90a:208d:: with SMTP id f13mr29279012pjg.68.1561448602915; Tue, 25 Jun 2019 00:43:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561448602; cv=none; d=google.com; s=arc-20160816; b=RR7ZfhME4hltq8ctZlMcy5LVNVPsCV57cWjVVgcSSwe+Dvh1Z8vDaDaUuv6kJr9IEO NsFtYopm4pESfLnbDertIT57inEWAB2oRkFRB9mGZc3ipYP2KrCSzWcSrFNG6uMifz0z iizSJj11Aa40TUSCqCH081JyQiJXrz79pt2cmDsHBeQ3D4jhcR8tJqHPCJo5oTi6aIlw DeM4fvXGXQsuXAWGf00Nyj2jj5QPBO4BfSFE6CQC6HwRDkfH45+0t/hChzsAThJ9TqKT wpoiCiQAcN/BsVVe5/4iNa6ykMVWszbHi3rleIGx6SQoGI0xY1mbLlbtnmaXSF8Z/1WF LRVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=UU8Xvu7Rban/YsR+rkyJrUrC/X+EqMbYIRQgUmJpEsI=; b=Vpq8Nj7xzAZH23BNWEjCYifoG0DS2F2doqhI7Seq6V9EjU9aIDWtkJKOsDgy1SP0vD M0HxbucXGzGzPYTfjm0tlRxmbCJO6fpdMWopSlgoMBWokIqQDfY9YEGYeS/JkBWBhHYw 9fj34XKZv4aRsTnscAdy47U9gAr9bSY//pR8XHDOEz8g96Z4ZxV/D4bTHF9fsnPx+MzR RdprZw4k+DD7yzWzGTN9aSm8ec4e11c4/O0nfXSt6o2PNVLtTJ7t9UwkE+5EOmTv5Xwb gVKk+v0ntzowiehI81It705a9iFuBGnD8KlTraGNWGpjo/6CC5+MWNxMN57pjk7d7VN5 IaxQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@insidesecure.com header.s=selector1 header.b=mDD1SubO; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d4si12579328pla.358.2019.06.25.00.43.04; Tue, 25 Jun 2019 00:43:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@insidesecure.com header.s=selector1 header.b=mDD1SubO; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729361AbfFYGlK (ORCPT + 99 others); Tue, 25 Jun 2019 02:41:10 -0400 Received: from mail-eopbgr80119.outbound.protection.outlook.com ([40.107.8.119]:5697 "EHLO EUR04-VI1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727141AbfFYGlK (ORCPT ); Tue, 25 Jun 2019 02:41:10 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=insidesecure.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UU8Xvu7Rban/YsR+rkyJrUrC/X+EqMbYIRQgUmJpEsI=; b=mDD1SubOHgolhCMOOt+Z591c0UzKylm+z0w6lYZNi9+LaKzrWIAvn++WwHa7ncEWWbPhBJAAWlaWYm/K/IipPbw3QZtcKOS8x2TkoffzBRwKHyi+JDoMjVmesGhVjs2lpqAzSEiPjE29HZ09kifRlCRrXjp9YNwEOz6ihBkmkcI= Received: from AM6PR09MB3523.eurprd09.prod.outlook.com (10.255.99.206) by AM6PR09MB3333.eurprd09.prod.outlook.com (20.179.245.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2008.17; Tue, 25 Jun 2019 06:41:05 +0000 Received: from AM6PR09MB3523.eurprd09.prod.outlook.com ([fe80::c1ca:f973:dad2:a91f]) by AM6PR09MB3523.eurprd09.prod.outlook.com ([fe80::c1ca:f973:dad2:a91f%6]) with mapi id 15.20.2008.014; Tue, 25 Jun 2019 06:41:05 +0000 From: Pascal Van Leeuwen To: Herbert Xu , Antoine Tenart CC: Pascal van Leeuwen , "linux-crypto@vger.kernel.org" , "davem@davemloft.net" Subject: RE: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images Thread-Topic: [PATCH 3/3] crypto: inside-secure - add support for using the EIP197 without firmware images Thread-Index: AQHVJaNNu6u4U0xf7kGF/n6JpxvKYaai6XuAgAAgPJCAAX9kAIAAGfRAgAAPVoCABjI2gIABEFAw Date: Tue, 25 Jun 2019 06:41:05 +0000 Message-ID: References: <1560837384-29814-1-git-send-email-pvanleeuwen@insidesecure.com> <1560837384-29814-4-git-send-email-pvanleeuwen@insidesecure.com> <20190619122737.GB3254@kwain> <20190620131512.GB4642@kwain> <20190620154259.GE4642@kwain> <20190624142015.udlec3ho57a47hps@gondor.apana.org.au> In-Reply-To: <20190624142015.udlec3ho57a47hps@gondor.apana.org.au> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=pvanleeuwen@insidesecure.com; x-originating-ip: [188.204.2.113] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 076df896-9abb-46a3-14f5-08d6f938191f x-microsoft-antispam: BCL:0;PCL:0;RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020);SRVR:AM6PR09MB3333; x-ms-traffictypediagnostic: AM6PR09MB3333: x-ms-exchange-purlcount: 1 x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8882; x-forefront-prvs: 0079056367 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(376002)(366004)(136003)(346002)(39850400004)(396003)(13464003)(199004)(189003)(3846002)(6116002)(446003)(486006)(6246003)(99286004)(76116006)(7696005)(256004)(76176011)(476003)(11346002)(53546011)(102836004)(26005)(6506007)(316002)(66476007)(66556008)(64756008)(66446008)(14454004)(66066001)(52536014)(110136005)(5660300002)(66946007)(73956011)(4744005)(54906003)(4326008)(74316002)(33656002)(71200400001)(7736002)(15974865002)(25786009)(71190400001)(478600001)(186003)(81166006)(81156014)(8676002)(8936002)(86362001)(68736007)(9686003)(6436002)(55016002)(2906002)(53936002)(229853002)(305945005)(18886075002);DIR:OUT;SFP:1102;SCL:1;SRVR:AM6PR09MB3333;H:AM6PR09MB3523.eurprd09.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; received-spf: None (protection.outlook.com: insidesecure.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: BaFww7FR6DKL75NC31cTZkU0RHQZxU6cDlfB2Qg2zjvr7d5ibTg8WMJS6cjAyus8GveayOOBPQ41+NglzD4zwNH1JkMZcFaxg2gR5V/P9E+diiUdDjJlBfMVfL64zJ+KShl+r/RgXhr5wBfNWdOdSqXHOm9nzdVbazlkl9H9najC+z3uTgjX4LQG9WIF/8e6ImtwJhVo8qnmigEpxFuA1/GZhJs4DhzQOK6d3p/pVXSKkfvB47w3/rz+not58StOb8kBU1P01OAOQAA0v48aOpkAi9hDXdWJonO29p+o7nT0zdm/OB2OeJygeI0H+IiSwec2zbZHcjHhSPRRnYHAxf+5xMWgNKg1a+OcNcdBfxXthsNlrV+p5YIYy04ewbNddgChmPkZf9pQB8FAloySszoDfb9cT/27NvQaWTqJdGw= Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: insidesecure.com X-MS-Exchange-CrossTenant-Network-Message-Id: 076df896-9abb-46a3-14f5-08d6f938191f X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Jun 2019 06:41:05.4096 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 3c07df58-7760-4e85-afd5-84803eac70ce X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: pvanleeuwen@insidesecure.com X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR09MB3333 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org > -----Original Message----- > From: Herbert Xu > Sent: Monday, June 24, 2019 4:20 PM > To: Antoine Tenart > Cc: Pascal Van Leeuwen ; Pascal van Leeuwen= ; linux- > crypto@vger.kernel.org; davem@davemloft.net > Subject: Re: [PATCH 3/3] crypto: inside-secure - add support for using th= e EIP197 without firmware images >=20 > On Thu, Jun 20, 2019 at 05:42:59PM +0200, Antoine Tenart wrote: > > > > Yes, you either have to choice to put it in /lib/firmware (and in the > > linux-firmwares project!) or to convince people to allow releasing this= . >=20 > I agree. We should not be adding firmware into the driver itself. >=20 OK, so I guess the alternative would be to get the firmware binaries into t= he linux-firmwares=20 project? I can do that ... Regards, Pascal van Leeuwen Silicon IP Architect, Multi-Protocol Engines @ Inside Secure www.insidesecure.com