From patchwork Wed Nov 30 23:47:59 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 101438 Delivered-To: patch@linaro.org Received: by 10.140.20.101 with SMTP id 92csp461120qgi; Wed, 30 Nov 2016 15:49:43 -0800 (PST) X-Received: by 10.98.196.89 with SMTP id y86mr35422896pff.172.1480549783600; Wed, 30 Nov 2016 15:49:43 -0800 (PST) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s21si28030840pgi.284.2016.11.30.15.49.43; Wed, 30 Nov 2016 15:49:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753591AbcK3Xtk (ORCPT + 1 other); Wed, 30 Nov 2016 18:49:40 -0500 Received: from mout.kundenserver.de ([212.227.126.134]:64508 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752602AbcK3Xtf (ORCPT ); Wed, 30 Nov 2016 18:49:35 -0500 Received: from wuerfel.lan ([78.43.21.235]) by mrelayeu.kundenserver.de (mreue002 [212.227.15.129]) with ESMTPA (Nemesis) id 0LmzQD-1cdcHI3bH3-00hKBi; Thu, 01 Dec 2016 00:48:30 +0100 From: Arnd Bergmann To: Herbert Xu Cc: Arnd Bergmann , "David S. Miller" , Russell King , linux-crypto@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: arm/aesbs - Select SIMD in Kconfig Date: Thu, 1 Dec 2016 00:47:59 +0100 Message-Id: <20161130234826.854879-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:Nh6WMHUprwnwsOAyQBZmb64AvwcMoznZnykNp4UNxkK7uUWDErM Bacg/Y75CE9FLBJeuF4pAeblVz8fLC2mGX9QvIKhbfvFMZDmlRdSoHI/g12N7YuPM4JExKL 3tRHj2nDd+dBbDzr8NcQUJs3dI8XBrlCqTdebefJHXiKaRxoLmX4ENJwCOUBoqhRVM/KYJW 3ZcQenBQw5bNdsMPPg2ng== X-UI-Out-Filterresults: notjunk:1; V01:K0:qn93ifCX1Ps=:UlxmvR+/MTCeHil0U3dr/Y PdApjt9f+firdQIa5s1kG8uH84XP2tQ8vNrfgDboN9n0Z30oQPB1EppaouPA8X7RrCjqTygvw Ob4OOU/kQh6OW8DlYy+meCEedkwu9JnnoLdXoebHzWT0ABUIJx9MnIh/GURNSij6bozHdGHQ4 T5ftL+hyaxylr/Ra9EI7bczxxB8ry/lAejWkG1rUlqp3MbHDrGEH4w5ow280gIMhfwhaPRvDx sPiZ9tRiK+V7JHoJxAUscMe7sntIsfnhpHHrinoLdgNfABiPPNMVAsbQGaBebzWv7SDZoZOem 0spiv4VGCfIPWlGL4GBzb7BxRD2mM60IGvZRXY+SbJj+ZM04ARqPak9i7az5wokJQBdKVTLlx p3U4KxGs00DQ4opJeRDqjWuP6xNXReLt6fdyxfSGv9sD3IcrcyM6/ys0adDqstuzKf9lCNtx6 CmOlGFuZI95yR48nKcVZFbe/pa4Lhht6eNj6M0gvNFzvW1lqa5qfU9bDKSe5c18pmmETnm6Dd AEPCKFw0jvNvKAGyuZl5xEqSOL+yju7rdZWlfBHlCfJg8+MO9mJ3BQo6bYGLkyEh58BpVhffc tJs0WfL1l4ADTSOCGDGl8DRA6SVud7I86Fuh2QZVZHRxOot8HUSt2CFTYsnmhjhByC2LoXxA4 kj4O+KGbfKpU35MHKkUKOWNO3XexmiwD/FaRyDfRcnz/zQdsTIPNYIsXdnoHYi927Z6c= Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Commit 585b5fa63da9 ("crypto: arm/aes - Select SIMD in Kconfig") added the dependency for CRYPTO_AES_ARM_CE, but missed the same change for CRYPTO_AES_ARM_BS: arch/arm/crypto/aes-arm-bs.o: In function `aesbs_mod_init': aesbs-glue.c:(.init.text+0x38): undefined reference to `simd_skcipher_create_compat' Fixes: 211f41af534a ("crypto: aesbs - Convert to skcipher") Signed-off-by: Arnd Bergmann --- arch/arm/crypto/Kconfig | 1 + 1 file changed, 1 insertion(+) -- 2.9.0 -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/arch/arm/crypto/Kconfig b/arch/arm/crypto/Kconfig index 81348883450d..3251d385fddb 100644 --- a/arch/arm/crypto/Kconfig +++ b/arch/arm/crypto/Kconfig @@ -91,6 +91,7 @@ config CRYPTO_AES_ARM_BS select CRYPTO_ALGAPI select CRYPTO_AES_ARM select CRYPTO_ABLK_HELPER + select CRYPTO_SIMD help Use a faster and more secure NEON based implementation of AES in CBC, CTR and XTS modes