Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp89946ybg; Tue, 28 Jul 2020 00:19:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZi7rhUQ1TyZJgnoYeoVUH0MR3dY9EffIcU2c+78vju6q6LqUGAeSH/DcbsM0bLWwihBJt X-Received: by 2002:a05:6402:1803:: with SMTP id g3mr23845849edy.377.1595920798791; Tue, 28 Jul 2020 00:19:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595920798; cv=none; d=google.com; s=arc-20160816; b=oZ/I9ld57zdx9SgsfV8KtyYSmvB1aMAGE67TD0ZrFS8mMRbah5x3GI+M8t71tCH4u1 YJm+d4qSk09nB4u4zpW41rr1ckcM/GU9uCcaPgnrS38yt9dRcyPgg4OaWDwe5dyVkbKo eSmCvAlHWZovL5p+7IdwAUO/3tQE2cUfTDIep2Y4tv3501opHo8VyngjU8J6w0aPmVZt QVY1aU0Mm5IMy8fk1rOgsXwoVsVkonEIgwvcxSoxOl27LLo+Vhl2Xp1CVo5YgNmBoZdv r/dmryD/fnGpyV/nav89rwK4U6f1+SoRlt+0JBISzWKLeaNMDMUJ2xeuPlad7bnmGo4g 3JkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:to:references:subject:date :from; bh=oIN7oRGaMYfDZisr8lyb5PjjjruOTbNFVkEDB6OG5xw=; b=wZy1vcuyegqBMJ47v+hRZv/19eZI2weEnHmOxuQqeLX9tlayQ7nABjsOZecukr63GE 4EX6uqJ6bku+tU+Sg9Qz8qzdV7dM7phcyWY0Z6sMbW6bNsimeE3vnCnQjAsvUaFHn3x1 LU14G4XicuoJwUV4+7+bXyR7z2gaJypuxmYbBO7QsFZL0FFZRNFxBOcuB8ep1pNqIiqr RUG4tEYfOZWbJ+OTM8ec8WPKPRnb8LpcyyyVd0ZZP/lAx49DAGS2+6MlhFhJdiXPb3cy IoI/BGo8/tR+wNW5JzHTUk8/LhK93gZgYU7rrFUx5sSZgQBWKzGiCbtFAtFT/KLtmwC3 7vNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si7543666eje.56.2020.07.28.00.19.35; Tue, 28 Jul 2020 00:19:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727939AbgG1HTS (ORCPT + 99 others); Tue, 28 Jul 2020 03:19:18 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:54846 "EHLO fornost.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727852AbgG1HTR (ORCPT ); Tue, 28 Jul 2020 03:19:17 -0400 Received: from gwarestrin.arnor.me.apana.org.au ([192.168.0.7]) by fornost.hmeau.com with smtp (Exim 4.92 #5 (Debian)) id 1k0JtK-0006QL-VA; Tue, 28 Jul 2020 17:19:16 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Tue, 28 Jul 2020 17:19:14 +1000 From: "Herbert Xu" Date: Tue, 28 Jul 2020 17:19:14 +1000 Subject: [v3 PATCH 16/31] crypto: caam/qi2 - Set final_chunksize on chacha References: <20200728071746.GA22352@gondor.apana.org.au> To: Ard Biesheuvel , Stephan Mueller , Linux Crypto Mailing List , Eric Biggers Message-Id: Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The chacha implementation in caam/qi2 does not support partial operation and therefore this patch sets its final_chunksize to -1 to mark this fact. This patch also sets the chunksize to the chacha block size. Signed-off-by: Herbert Xu --- drivers/crypto/caam/caamalg_qi2.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/crypto/caam/caamalg_qi2.c b/drivers/crypto/caam/caamalg_qi2.c index 1b0c286759065..6294c104bf7a9 100644 --- a/drivers/crypto/caam/caamalg_qi2.c +++ b/drivers/crypto/caam/caamalg_qi2.c @@ -1689,6 +1689,8 @@ static struct caam_skcipher_alg driver_algs[] = { .min_keysize = CHACHA_KEY_SIZE, .max_keysize = CHACHA_KEY_SIZE, .ivsize = CHACHA_IV_SIZE, + .chunksize = CHACHA_BLOCK_SIZE, + .final_chunksize = -1, }, .caam.class1_alg_type = OP_ALG_ALGSEL_CHACHA20, },