Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp961722ybm; Tue, 21 May 2019 06:36:22 -0700 (PDT) X-Google-Smtp-Source: APXvYqzT+268GWzSAXZEZyql7Qf2wb7LWn17rdd91dzPi/WjuB4jHYzFCyYEBBoa8gCnplx0QoC4 X-Received: by 2002:a63:1061:: with SMTP id 33mr55789828pgq.328.1558445782701; Tue, 21 May 2019 06:36:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558445782; cv=none; d=google.com; s=arc-20160816; b=rmT2dvNrQ/45xV7IxUpdmI7vsy4TPWHNhOA3MQRNehbiv2cfnHJmSG0Lvkuq1+7Nq3 /TqdRhbWCJqOyCsY9b/lDx1x+z13232OZlFH8BvvCxj01ZHcBoudl8kjHN35E/QGm4Uu 8POlQCK0zRFOfPNJVXN8jI8uUT1RO31Sg8P/HIYar472XCBHhomzpgI5LWzGUla/80rv hF2vcOmmosX/VF2chVWG8zaD9fXTS/0LagxPGTpp2bxgUaDhGCi69DJlYeAkMHrexJGf YINKLdfPB88pDIj+z0trDLUBCPKZGwM6h7gf8b4d3cHMQmWcCrLurm32CAxQGGns7wNU R/8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:references :in-reply-to:message-id:dkim-signature; bh=pa7vl8a//DSmJcXNbFqorY8WvZK4+qW8qWntTf4Yza4=; b=kh6EThDlMKHq4+Uiuqxkb3eOGzpSVPwwpBxPOp8PBV4rBT8wSbafAD/kU1aEr3e00L HZmdPqKY6OO1/vbvM2zS02kTecb4tB2BYoGsrKFDKMuJpagWNEW4QRqkjy7cpJS4lEMv PVuEze5JZa52VuEICCPrHGPs9l80TU44TnD5gdsEyzDc4pPganIeuVQZRgQ88aHydWjZ pjQi++F5i8AIbDmGjROhimnsbz2Jar2wC+IFdP4yd+IqgkUWrBsSDOR4LgOjXiZORepO osvpk0OwktT1eJEPGezSIJEMcSQtXEie3Mipy+wPz1UlNmuo5ju6ltB3X60H+3dcG7pv fFQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=OE9LtBbv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d185si23821731pfa.182.2019.05.21.06.36.05; Tue, 21 May 2019 06:36:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=OE9LtBbv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728474AbfEUNeR (ORCPT + 99 others); Tue, 21 May 2019 09:34:17 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:60749 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728389AbfEUNeL (ORCPT ); Tue, 21 May 2019 09:34:11 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 457cDc5tfsz9v2XZ; Tue, 21 May 2019 15:34:08 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=OE9LtBbv; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id llxTgzOPOP6u; Tue, 21 May 2019 15:34:08 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 457cDc4s3pz9v2XY; Tue, 21 May 2019 15:34:08 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1558445648; bh=pa7vl8a//DSmJcXNbFqorY8WvZK4+qW8qWntTf4Yza4=; h=In-Reply-To:References:From:Subject:To:Cc:Date:From; b=OE9LtBbvaUzvcxrv7hQbRZaoo/POV51uzrKh1cxT9rza+02xMSPe/PrjvDkXVaDvm VXwcgfHuF2Njjjowfws5ROeg03A6V7qAhU9g4xGZO57pQsHQUz/0k/cqE0ccJ/LFEk 35GdTzT2edQtJkWkVBLozUpeiVJnw826zT6Mq+p0= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 252AE8B80C; Tue, 21 May 2019 15:34:10 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id 9yYx09vm-5o2; Tue, 21 May 2019 15:34:10 +0200 (CEST) Received: from po16846vm.idsi0.si.c-s.fr (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 031EE8B803; Tue, 21 May 2019 15:34:10 +0200 (CEST) Received: by po16846vm.idsi0.si.c-s.fr (Postfix, from userid 0) id CD25468458; Tue, 21 May 2019 13:34:09 +0000 (UTC) Message-Id: <310b67004e02da826322e7cc96b85f46c9ef35b2.1558445259.git.christophe.leroy@c-s.fr> In-Reply-To: References: From: Christophe Leroy Subject: [PATCH v1 03/15] crypto: talitos - reduce max key size for SEC1 To: Herbert Xu , "David S. Miller" , horia.geanta@nxp.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Tue, 21 May 2019 13:34:09 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org SEC1 doesn't support SHA384/512, so it doesn't require longer keys. This patch reduces the max key size when the driver is built for SEC1 only. Signed-off-by: Christophe Leroy Fixes: 03d2c5114c95 ("crypto: talitos - Extend max key length for SHA384/512-HMAC and AEAD") --- drivers/crypto/talitos.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c index 6f8bc6467706..6312f8d501b1 100644 --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -837,7 +837,11 @@ static void talitos_unregister_rng(struct device *dev) * HMAC_SNOOP_NO_AFEA (HSNA) instead of type IPSEC_ESP */ #define TALITOS_CRA_PRIORITY_AEAD_HSNA (TALITOS_CRA_PRIORITY - 1) +#ifdef CONFIG_CRYPTO_DEV_TALITOS_SEC2 #define TALITOS_MAX_KEY_SIZE (AES_MAX_KEY_SIZE + SHA512_BLOCK_SIZE) +#else +#define TALITOS_MAX_KEY_SIZE (AES_MAX_KEY_SIZE + SHA256_BLOCK_SIZE) +#endif #define TALITOS_MAX_IV_LENGTH 16 /* max of AES_BLOCK_SIZE, DES3_EDE_BLOCK_SIZE */ struct talitos_ctx { -- 2.13.3