Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1991721ybl; Thu, 15 Aug 2019 04:49:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqzJD7ZoAV3XEjmgRiS/oWyklUydunVgxFwrgYGR3LtE7FaYk4R+vJ1lrvmDT3pouRyHPj+6 X-Received: by 2002:a65:6114:: with SMTP id z20mr3220900pgu.141.1565869760831; Thu, 15 Aug 2019 04:49:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565869760; cv=none; d=google.com; s=arc-20160816; b=mRM5MDV1WaAv2tlZuY8iKESm445pthhQqQrwar8aAIaWcqn3KVR3lH4/UyQzUCIzAF TSgVuywfa1lqkq767xtg4CROyt8oZZtoL2C+CLQADWs3Uayz6Xk2QXMkOeK2nCNLTHq4 DWg2dZKjD8bTWswy/h9M0VlZjL4KrHWuSdgUGgAVrEiiJudSBh9gr2mqSbyyhro3pVGg 0WyiikgtVM51+LYY+U321ZFKvL1aBwJV3BzaPDoqIPwkpWaLZFm39vPX5eD3TseKRNpb 8D8xFtxXPUfASS92U0gA4mzXVo3ZtVSQU7rhk0HGoi8mwJOOdh4OCixxDJzeJy5J/hS3 RFyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=OeIgw33Lqlg4+QLwBBuMcPeaaJQYgJmHCF9WEIn/lcI=; b=PAVdhn3C+CuCOrSG4uLelnUr35ZtPRsMe24kmsREViLLQCN9+cNz7L/Qf+AnJC3sJM J1YcCkQLxu0YxB2aanz15LV5ebUK9qbAY75maet4Pb1AHtd6bBnZvKbk48Yr8C4GUQSQ 8TYdeYumT5O6xlgt9qMnX6qIrGjpaNF404ESKsoNpEyJFFQ5FO0Yx3NVEq54jOPsO1jm kvfZoaCCdwOveGcPqC1PdrerYioNR/vVvL/mX5NvchPalQ5IwY49aFSI3O1DWKRE1ncT fglMXCsPqlo/qULWAicFsU+c76DtLVnJYINhZUgOo1sGFqN+SvrkFJXb2rJ/eke0rKhf ceMA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s31si1829910plb.362.2019.08.15.04.49.07; Thu, 15 Aug 2019 04:49:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731294AbfHOLhh (ORCPT + 99 others); Thu, 15 Aug 2019 07:37:37 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:57156 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726008AbfHOLhh (ORCPT ); Thu, 15 Aug 2019 07:37:37 -0400 Received: from gondolin.me.apana.org.au ([192.168.0.6] helo=gondolin.hengli.com.au) by fornost.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1hyE4U-0002nS-L7; Thu, 15 Aug 2019 21:37:34 +1000 Received: from herbert by gondolin.hengli.com.au with local (Exim 4.80) (envelope-from ) id 1hyE4S-0007FI-Oq; Thu, 15 Aug 2019 21:37:32 +1000 Date: Thu, 15 Aug 2019 21:37:32 +1000 From: Herbert Xu To: Ard Biesheuvel Cc: "open list:HARDWARE RANDOM NUMBER GENERATOR CORE" , Eric Biggers , Horia =?utf-8?Q?Geant=C4=83?= Subject: Re: [PATCH v4 06/30] crypto: caam/des - switch to new verification routines Message-ID: <20190815113732.GB27723@gondor.apana.org.au> References: <20190805170037.31330-1-ard.biesheuvel@linaro.org> <20190805170037.31330-7-ard.biesheuvel@linaro.org> <20190815045421.GA24765@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, Aug 15, 2019 at 08:43:38AM +0300, Ard Biesheuvel wrote: > > So I will end up with > > static inline int verify_skcipher_des_key(struct crypto_skcipher *tfm, > const u8 *key) > static inline int verify_skcipher_des3_key(struct crypto_skcipher *tfm, > const u8 *key) > static inline int verify_ablkcipher_des_key(struct crypto_skcipher *tfm, > const u8 *key) > static inline int verify_ablkcipher_des3_key(struct crypto_skcipher *tfm, > const u8 *key) > static inline int verify_aead_des3_key(struct crypto_aead *tfm, const u8 *key, > int keylen) > static inline int verify_aead_des_key(struct crypto_aead *tfm, const u8 *key, > int keylen) > > Is that what you had in mind? Yes and hopefully we will be able to get rid of ablkcipher at some point. As a rule we want to make the job as easy as possible for driver authors so we should leave the burden of such trivial things with the API. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt