Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3542701ybl; Fri, 20 Dec 2019 11:04:25 -0800 (PST) X-Google-Smtp-Source: APXvYqz/qtS9yU2zTd/a7kyHWbOr9Oo/QesVmGzO7kRb6DQRCFF7wmKrsl1PNJOqUdxz+BuSobQQ X-Received: by 2002:a05:6830:1ec9:: with SMTP id c9mr3779729otj.59.1576868665509; Fri, 20 Dec 2019 11:04:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576868665; cv=none; d=google.com; s=arc-20160816; b=Vjii38dj2ZsW3Vx4DnxQkW30/QBaWGU8IVXNs7OBCx3Bx+kjOw0gtwgHC1Hk5P2O4o YOrPkFvVoHLkyxOrMbmGz+JhhWcdPgiG99oz5tmFvqKYoH5D0ZOn0D0t7nryiszcQHfS QD3eKlrovVc6w6pVFZGwaYQO8tCWRmhTU4zXfbkwzfO9lEuROaxWRnK45orTwRc7fV1b T2CAu7UN6vuj46oXmVZcR+fjOWwR1qsTaBROFjwi4rpW1o9vd8sPbPTc57UVI5qmM3S0 5aqndOjasoLUaXgDIBGYMY25Hqdoq+xyEt78NPDkkAG8VpU91gbQ0FbHofCsM6ojKa6Y e2Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Az4hfXTopX7SrfF1whWHLS+fjneINDp+zU6Cq6OOuU4=; b=oRz05+brfCRw6nDSjOskv1uPP5bs3iW/OVi5PsWRrcyOigk4J1hsqkFat4DikTPhuC P2z5G7psDBV+XD3uMAoTd4T3iaiucJ9vH0NnQXg3g5yLkZY69PYw6NL1UAqT+v73X7K8 W2082Q5gL+hDyIekotJ8MXwjSynw8Cy0tcdBWnXT60QwgXWQUvutIzzgyMDOaHDD/BbJ MVbm4A8JnxxFl1tvckQdYYv3EtGy41y4gi8P0yyrHNPDzEhuzAyXVtzIihM6WP7Kk0L/ K1/8W4Ytgrg8J7rWdjQyn2Q2Ou8Bw+ZEoUnH/tbX5ROL5yNf8gaiBxEZZl0mticuYoQJ TpTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rPBICheQ; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j18si5581663otq.275.2019.12.20.11.04.14; Fri, 20 Dec 2019 11:04:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rPBICheQ; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727473AbfLTTDB (ORCPT + 99 others); Fri, 20 Dec 2019 14:03:01 -0500 Received: from mail-pj1-f68.google.com ([209.85.216.68]:34479 "EHLO mail-pj1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727390AbfLTTDB (ORCPT ); Fri, 20 Dec 2019 14:03:01 -0500 Received: by mail-pj1-f68.google.com with SMTP id s94so4197395pjc.1 for ; Fri, 20 Dec 2019 11:03:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Az4hfXTopX7SrfF1whWHLS+fjneINDp+zU6Cq6OOuU4=; b=rPBICheQoVAzsZ2tln0x+1e9/YenkBMqvTTvQ4+LtS6qG7ZaOVx2D9p5RkYNzux9jK nizzsKP+6Pzxl6f8MkQUUXQ6J2PiiQU/jZnEQj2umbVwYuQPU67Mds/e6/9WnRpHup/8 1kIi3xYAhAmSOrXPJPQp+lRMHpRoDbWtnrToQLugwLxrbCnYsV4gpGdxCA5MpeQfk75H auWeSk9zjw+7Msh6EFNHOrAsyVBkOB9mx100S1dOw91w1rZCkIG4YRGprbDqH8QEytGQ yR97LGTy93M3MCdQOSUV/BJfzElwI5lf1ZiodjvlDhyAbHf7rGEwRGpDSdHC+aJ+P/8o 05Ew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Az4hfXTopX7SrfF1whWHLS+fjneINDp+zU6Cq6OOuU4=; b=V+gC2ARDTkwNm6oErpsz31M+n6JFIOfiWC7IaZIfY3ZlWxHK1Py1UPQiAojO5R+9ZM NIc0V9b53c0GgGLA2tYcm+k673dP0Yd6+gHbmpbMzIW9Jt+QI/p7jlADG4VAYakLhTyN HxX1OTqD6jnStTxxkmPYcy1hOr/8E+5Y8/J1shHLO4JW4SCxbLx+6mbDvnW2m1zcmPSw RL/N/cpX0KIlD9aR5bWgOZmsumF8xPjLTZGc3ducsJFEzREgKwzfHrHD7WSB+56QH5YD Rz9nZP6K+z70gDIGN7LdelNZo7ocal9IjdiC3+p7QQCM73+Y0NhKk2Wq75bE7yR80xU/ HQCw== X-Gm-Message-State: APjAAAXBcKlrsMZYGmihYNjQjPDmb/8RjLdo1zcuIApMff/kreY4CpG2 rAjWowsxvA9OBWdpgYtOiPc= X-Received: by 2002:a17:90a:2004:: with SMTP id n4mr18027020pjc.20.1576868580484; Fri, 20 Dec 2019 11:03:00 -0800 (PST) Received: from gateway.troianet.com.br (ipv6.troianet.com.br. [2804:688:21:4::2]) by smtp.gmail.com with ESMTPSA id i4sm10833612pjw.28.2019.12.20.11.02.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 20 Dec 2019 11:03:00 -0800 (PST) From: Eneas U de Queiroz To: Herbert Xu , "David S. Miller" , linux-crypto@vger.kernel.org Cc: Eneas U de Queiroz Subject: [PATCH 1/6] crypto: qce - fix ctr-aes-qce block, chunk sizes Date: Fri, 20 Dec 2019 16:02:13 -0300 Message-Id: <20191220190218.28884-2-cotequeiroz@gmail.com> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191220190218.28884-1-cotequeiroz@gmail.com> References: <20191220190218.28884-1-cotequeiroz@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Set blocksize of ctr-aes-qce to 1, so it can operate as a stream cipher, adding the definition for chucksize instead, where the underlying block size belongs. Signed-off-by: Eneas U de Queiroz --- drivers/crypto/qce/skcipher.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/qce/skcipher.c b/drivers/crypto/qce/skcipher.c index fee07323f8f9..1f1f40a761fa 100644 --- a/drivers/crypto/qce/skcipher.c +++ b/drivers/crypto/qce/skcipher.c @@ -270,6 +270,7 @@ struct qce_skcipher_def { const char *name; const char *drv_name; unsigned int blocksize; + unsigned int chunksize; unsigned int ivsize; unsigned int min_keysize; unsigned int max_keysize; @@ -298,7 +299,8 @@ static const struct qce_skcipher_def skcipher_def[] = { .flags = QCE_ALG_AES | QCE_MODE_CTR, .name = "ctr(aes)", .drv_name = "ctr-aes-qce", - .blocksize = AES_BLOCK_SIZE, + .blocksize = 1, + .chunksize = AES_BLOCK_SIZE, .ivsize = AES_BLOCK_SIZE, .min_keysize = AES_MIN_KEY_SIZE, .max_keysize = AES_MAX_KEY_SIZE, @@ -368,6 +370,7 @@ static int qce_skcipher_register_one(const struct qce_skcipher_def *def, def->drv_name); alg->base.cra_blocksize = def->blocksize; + alg->chunksize = def->chunksize; alg->ivsize = def->ivsize; alg->min_keysize = def->min_keysize; alg->max_keysize = def->max_keysize;