Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp599076rda; Sun, 22 Oct 2023 01:19:01 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH5MEs1O8sz6TlgccZ5j4RTBzlsL08J9bCYZgFupiJNvqZSb4ZmQbvm4XIxPf+pBK3vWP2f X-Received: by 2002:a05:6808:4a:b0:3b2:e0fa:61e4 with SMTP id v10-20020a056808004a00b003b2e0fa61e4mr6993569oic.25.1697962741499; Sun, 22 Oct 2023 01:19:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697962741; cv=none; d=google.com; s=arc-20160816; b=qJRGmuL4QN7WL6nqe2j9uaAUFUnpaZmIIdK3XtZY3tucPlokUugnB+sDIsO0rtlQqu mD6zqnySUXUNs6YydxmRV+cwsKMIdCBXTSaL+XXrz7BUPRyigoq1rTVvoiFZJMXN6KoO tfNUFamHVf35N/35AVdFddiZC6qASu4UoWwqweUArC6TEjbaAgslhjNySfu95/2GKRE7 6tUtZO/YMonD5yZSQL+xNM3l9AYFQKW/tZ3WMhzQSYlKD3hnlN5dzUcghlMt6FJAqUBf ObfTDxRUu6gXLpXaz6/IexXejAV9tVP61gS2km59NUYCdKZq2poLsmx/jh6m7FORaT1T DVgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=PCGH0OuwqTQKxaVGvO0aEXm3bJr1DoSWDC/w+hN5lzA=; fh=uKl1CTlin8qnxt56ErGp3UOINPCBskOXHDuKvJLDQbo=; b=aQAe2whLQHB54kCV/wz+zGa9MrwSLDetDBsHqDDuOQW2JsdSPFMw11eU5vJkUztjZz g9AUw2DgJjKpMGydJO2yHaax7wYQsB1NkQce+MdUGefjzOTT8ofjrWdOJapSqz6HCoF/ g1g7X55MPCJC8fSUcshE1u7XoProFN5qwQ1k/zxmcrheoNHyRoRG59Vz0zbYRHXhl01N 4wlaNRlBJhLIYdcUq2+SjLWl8DfdXGY3pRYJg95saTJMSAYI8BOQEZdKqQufjkJsSTA5 XAUHEMX0P/u0JvLH9mEYDljIMNwMHB13UhZVT1txXYEF6HA+USQdHE7IKzB30iZG1c+f Osxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pThQib2S; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id s24-20020aa78bd8000000b006b5273b8d14si4536487pfd.72.2023.10.22.01.19.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 Oct 2023 01:19:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pThQib2S; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 7967B8057475; Sun, 22 Oct 2023 01:18:58 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231411AbjJVISr (ORCPT + 99 others); Sun, 22 Oct 2023 04:18:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40070 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231305AbjJVISq (ORCPT ); Sun, 22 Oct 2023 04:18:46 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7CB8CD6 for ; Sun, 22 Oct 2023 01:18:44 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 139BAC433C7 for ; Sun, 22 Oct 2023 08:18:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697962724; bh=1OjWNO0YLj9rDW+dV3zDfZzVoSztg0mz8dCPVPlJWxU=; h=From:To:Subject:Date:In-Reply-To:References:From; b=pThQib2SsqSoxwTByG2qw3QeL3viYKYw9j4OZ35HyRPWV7Me9GRdA2j8Jmpe7j5VZ OY11WdIZMsxBBN5RfYetCs3J1XeP5K5VbE5CGAhZW2/BqJ0fILdaIgz5jjKu5I34Z7 6hoEWeH35F8J7vRWxgjSgtnyBd7h7CeP8DbqWGqEIBw7j8BnPrC/NJWNygsidSzlAs yTd/yvoQi10AYEkLWvL24BGiXCA0Qk7q7b+bDw96MVOCGLq5RdPG37YxV2rAr0zOzJ epl0R4NH3mDMSt7t5NvKl2nDax7et58Rwwu109hT7R8BJFsQeuo+ch7RLRg+KM8qXQ lnyZxQg0hLbxQ== From: Eric Biggers To: linux-crypto@vger.kernel.org Subject: [PATCH 02/30] crypto: sun4i-ss - remove unnecessary alignmask for ahashes Date: Sun, 22 Oct 2023 01:10:32 -0700 Message-ID: <20231022081100.123613-3-ebiggers@kernel.org> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20231022081100.123613-1-ebiggers@kernel.org> References: <20231022081100.123613-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Sun, 22 Oct 2023 01:18:58 -0700 (PDT) From: Eric Biggers The crypto API's support for alignmasks for ahash algorithms is nearly useless, as its only effect is to cause the API to align the key and result buffers. The drivers that happen to be specifying an alignmask for ahash rarely actually need it. When they do, it's easily fixable, especially considering that these buffers cannot be used for DMA. In preparation for removing alignmask support from ahash, this patch makes the sun4i-ss driver no longer use it. This driver didn't actually rely on it; it only writes to the result buffer in sun4i_hash(), already using the unaligned access helpers. And this driver only supports unkeyed hash algorithms, so the key buffer need not be considered. Signed-off-by: Eric Biggers --- drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c b/drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c index 3bcfcfc370842..e23a020a64628 100644 --- a/drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c +++ b/drivers/crypto/allwinner/sun4i-ss/sun4i-ss-core.c @@ -42,21 +42,20 @@ static struct sun4i_ss_alg_template ss_algs[] = { .digest = sun4i_hash_digest, .export = sun4i_hash_export_md5, .import = sun4i_hash_import_md5, .halg = { .digestsize = MD5_DIGEST_SIZE, .statesize = sizeof(struct md5_state), .base = { .cra_name = "md5", .cra_driver_name = "md5-sun4i-ss", .cra_priority = 300, - .cra_alignmask = 3, .cra_blocksize = MD5_HMAC_BLOCK_SIZE, .cra_ctxsize = sizeof(struct sun4i_req_ctx), .cra_module = THIS_MODULE, .cra_init = sun4i_hash_crainit, .cra_exit = sun4i_hash_craexit, } } } }, { .type = CRYPTO_ALG_TYPE_AHASH, @@ -69,21 +68,20 @@ static struct sun4i_ss_alg_template ss_algs[] = { .digest = sun4i_hash_digest, .export = sun4i_hash_export_sha1, .import = sun4i_hash_import_sha1, .halg = { .digestsize = SHA1_DIGEST_SIZE, .statesize = sizeof(struct sha1_state), .base = { .cra_name = "sha1", .cra_driver_name = "sha1-sun4i-ss", .cra_priority = 300, - .cra_alignmask = 3, .cra_blocksize = SHA1_BLOCK_SIZE, .cra_ctxsize = sizeof(struct sun4i_req_ctx), .cra_module = THIS_MODULE, .cra_init = sun4i_hash_crainit, .cra_exit = sun4i_hash_craexit, } } } }, { .type = CRYPTO_ALG_TYPE_SKCIPHER, -- 2.42.0