Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3768pxb; Wed, 11 Nov 2020 17:50:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJw1Vu5TvVPSzeSjGfA1mNO+lHtl13N9u1vk7WmhTInIWybYcKM3/WRMszh9Wa8R22GmEQPP X-Received: by 2002:a17:906:d1c3:: with SMTP id bs3mr26736441ejb.246.1605145828165; Wed, 11 Nov 2020 17:50:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605145828; cv=none; d=google.com; s=arc-20160816; b=Bm3kVlovRmrysyHg/P6sfwNJpKTdkLrZGPcd5L1Qv6HAaP+Dus57TehywtMdqKRddz JzEWmh/mxQ8lYp82AYLxpIi7pqWFMhDUOXIZf8ZALUFwBHl44GXhg1Dc+I5KS0xNB/by 8RYUOlRBEbZZ9/jh4FnqeKTUEiLys+U8QZOx8x2u0eSe3M8/4w2mqVtQilGyFxAcGBqU jypQEpP4LoVv7xrXBXjWYtYzM3WpsiKm+87aP28dtvLkOUV733jamnsom2yWh2JQrx8m cd9E26uH0bu/8ySnQA4InbBUhMeAfaBS0NZoVUvqez6syzIVK+Nh9RacqipeLObGr1d5 BE2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=IkQwr5GfrAi6XRFilydtztziWyztLxol18+rhw0E5ds=; b=gj2Xaa7ugkyQ7aks2xsKhyF1mSHJsmUp/qJQeDhBuVYT62VkOztnza/qHal7wwM2UY O7xa1UThXAs7ytTbHwVeQuTfAhgdf78R23Nft6hq3N8F0GdlLfqLYRBCT+fc9f/YAUSq TIcQikdwSZVnmBa/2qGFy1hpG8YCz1W0NoB+ZWxf6O3o3LHebcMEVaKu+34mRO5Xyl3q QVWqOkffkXCNrbg855daglzJ4bsrVMC2LE/rd2biaLc+drogw16jCCFpcutiQcOEFS7P 7ylAaNP+gvTiud/AE28pfxqcQCvyM5WlhNnVooBOct4Fuk1VIP6rYjGLXnFViE498D/1 jGyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hjuG5H1M; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b17si2961856edw.47.2020.11.11.17.49.56; Wed, 11 Nov 2020 17:50:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hjuG5H1M; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727988AbgKLBdn (ORCPT + 99 others); Wed, 11 Nov 2020 20:33:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:34926 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728025AbgKLAKm (ORCPT ); Wed, 11 Nov 2020 19:10:42 -0500 Received: from kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com (unknown [163.114.132.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CFCC320759; Thu, 12 Nov 2020 00:10:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605139841; bh=K6GhIf09wG7HHL3UYGzXcboTjOl6PZZmZ/yPx05msC4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=hjuG5H1MFSXO4Pn6Y4mA+hQm5e9CoTR/c9ooufK/0dJ17lOXFdALJ+dpMYW5S4io/ QuFmFbcoAA1eTyjBRDojX3/lZJ/QTKmkzoSMtXDC/i6uYGso7L4RnlWIm3Kz5oxT3+ l1G1zVdXPbis9A+rwWkzYLOctmJxOpmHyf0BMtxU= Date: Wed, 11 Nov 2020 16:10:39 -0800 From: Jakub Kicinski To: Cc: Srujana Challa , , , , , , , , , Lukasz Bartosik Subject: Re: [PATCH v9,net-next,12/12] crypto: octeontx2: register with linux crypto framework Message-ID: <20201111161039.64830a68@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> In-Reply-To: <20201109120924.358-13-schalla@marvell.com> References: <20201109120924.358-1-schalla@marvell.com> <20201109120924.358-13-schalla@marvell.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, 9 Nov 2020 17:39:24 +0530 Srujana Challa wrote: > CPT offload module utilises the linux crypto framework to offload > crypto processing. This patch registers supported algorithms by > calling registration functions provided by the kernel crypto API. > > The module currently supports: > - AES block cipher in CBC,ECB,XTS and CFB mode. > - 3DES block cipher in CBC and ECB mode. > - AEAD algorithms. > authenc(hmac(sha1),cbc(aes)), > authenc(hmac(sha256),cbc(aes)), > authenc(hmac(sha384),cbc(aes)), > authenc(hmac(sha512),cbc(aes)), > authenc(hmac(sha1),ecb(cipher_null)), > authenc(hmac(sha256),ecb(cipher_null)), > authenc(hmac(sha384),ecb(cipher_null)), > authenc(hmac(sha512),ecb(cipher_null)), > rfc4106(gcm(aes)). Herbert, could someone who knows about crypto take a look at this, if the intention is to merge this via net-next?