Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2225831pxa; Mon, 24 Aug 2020 08:31:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyV4UUckqE4ihAtxUzupXbbk8Y5dKFLpGZ/ah1tq9WJUb0e0iTRtXb3FBIV3Y5KlCm2kAGr X-Received: by 2002:a50:fc02:: with SMTP id i2mr5975147edr.121.1598283083039; Mon, 24 Aug 2020 08:31:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598283083; cv=none; d=google.com; s=arc-20160816; b=TGX4eWaiTVQF9pDPjddpwFjt3D9fyIa1YeNRj1C9XykVmZJnN94P4WQtWIcdiv3tcy eNi+VgjBfVaXZ4ZUKiS0m95IkT91HavM6fvlRKQvGWvSLAfZolyWdkjDYivt1IVmiMoy kHC4KEtlnV2G9k1rPWuPa8P2Xcbc0E/HlZ8rzoadRLtnayfiEaBdQOxN8iHs4RbieQwl crmXp3P2f+mWsVFTqYrSI8FrBOa6eD1qnwKCCGr3V/rPab6aEh6AtdaCxOSZfDWseqOC PVYKuwhtFvRxD9NBLgQZHYN73WiiSjkj+HJaYuhyMEkMGM8NgbR+MNgndR/4cmfdakGX GJfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=/yMlEPzuPqgye73MfE9Zc71sZL5jO9wYOUpSwiehvFM=; b=bu8VWb9mGI7QL4F2gob95m29oG1NmjYcOo1kK4Gtmad8F9s8HbfbvZ0kZfnOfQJEJd 5ypmQ8A7zZsNefHu5s/u5nnTpeAzRM878lYW2rrWOeDYm9TyIA8zWtm7uQ0yM2fi3h01 G0KagnkQ6+u47PYsDJJNDnZ2jWtyAbjmmegTnqoXuGhHfyO5jwR99pAv95y+WmKKKP3B 9Cy7RUyoHAprBd9RH9YXkc3GuL/zIDpG7OpjcEoPJMvswaPBNaUb9ZToWs98yAle2t0W AjYXZMwpA85mQjNWsCRve55APYI7yGJwrKkh5t+b17adS3Bg+g5FwZplc9Ome8fWUKCd htVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=lwOG3IGD; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yl15si519161ejb.301.2020.08.24.08.30.54; Mon, 24 Aug 2020 08:31:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=lwOG3IGD; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727106AbgHXPae (ORCPT + 99 others); Mon, 24 Aug 2020 11:30:34 -0400 Received: from mo4-p00-ob.smtp.rzone.de ([81.169.146.163]:13501 "EHLO mo4-p00-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727039AbgHXPaa (ORCPT ); Mon, 24 Aug 2020 11:30:30 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1598283019; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:To:From: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=/yMlEPzuPqgye73MfE9Zc71sZL5jO9wYOUpSwiehvFM=; b=lwOG3IGDalubdLMGpyp6HPdmazPHGAoNObRU3Q20NjlBRG3RC8cFGJr3VqfLmeWXx3 aMiNvNnluupXsBm2CE80dkKcL9KdFg09uN7t74RVTpcnXUMC7TZNINxPTCADsJ7mECtO UDphnj9y9JPwFSFu/C04ibEI60Q6vVAaLsoBobLWwBpXf+00vKqT5B318gL5APnXzKFH FX4cKRJ9jX1XAE7qDbDx52L5yHc2KPvJRNoJbA2/0qbI9nJ0qQkLiKKgpi6TsCqV3A/g oPVmvp42e/QNN4AlDFwXwykZmP9wUJnlmKWFPQ+v/NPwQJ4NDnNOd9gMMm8TDkvmeznN mxYQ== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xmwdNnzHHXPSI/Sc5clZ" X-RZG-CLASS-ID: mo00 Received: from tauon.chronox.de by smtp.strato.de (RZmta 46.10.7 DYNA|AUTH) with ESMTPSA id 002e9aw7OFUHWer (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Mon, 24 Aug 2020 17:30:17 +0200 (CEST) From: Stephan Mueller To: "linux-crypto@vger.kernel.org" , "Bhat, Jayalakshmi Manjunath" Subject: Re: HMAC test fails for big key using libkcapi Date: Mon, 24 Aug 2020 17:30:16 +0200 Message-ID: <6448041.Y6S9NjorxK@tauon.chronox.de> In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Am Montag, 24. August 2020, 16:41:13 CEST schrieb Bhat, Jayalakshmi Manjunath: Hi Jayalakshmi, > Hi All, > > I am using libkcapi to execute HMAC tests. One of key size is 229248 bytes. > setsockopt(tfmfd, SOL_ALG, ALG_SET_KEY API fails to set the key. I am not > getting an option to set the buffer size to higher value. > > Can you please provide me inputs on how to set the higher buffer size to > socket? Update your network write buffer size? /proc/sys/net/core/wmem_default > > Regards, > Jayalakshmi Ciao Stephan