On Wed, Aug 19, 2015 at 12:31:13PM +0200, Stephan Mueller wrote: > > > > with the latest cryptodev-2.6 tree I find the following: > > > > name : cbc(aes) > > driver : cbc(aes-aesni) > > module : kernel > > priority : 300 > > refcnt : 1 > > selftest : passed > > internal : no > > type : givcipher > > async : no > > blocksize : 16 > > min keysize : 16 > > max keysize : 32 > > ivsize : 16 > > geniv : eseqiv > > > > name : cbc(aes) > > driver : cbc(aes-aesni) > > module : cbc > > priority : 300 > > refcnt : 1 > > selftest : passed > > internal : no > > type : blkcipher > > blocksize : 16 > > min keysize : 16 > > max keysize : 32 > > ivsize : 16 > > geniv : <default> This is how it's supposed to look like as ablkcipher also has implicit IV generators like AEAD used to have. I'm working on a patch set to get rid of them just like what we did to AEAD. > > Note the type of the ciphers. With this, an allocation of cbc(aes-aesni) > > does not work (ENOENT). > > Just a followup: I think I see how I triggered it; I used cbc(aes-aesni) with > crypto_alloc_aead due to an accident. So are you saying that crypto_alloc_blkcipher is failing? If it's only crypto_alloc_aead failing then I don't see the problem. Cheers, -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html