Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp599086rda; Sun, 22 Oct 2023 01:19:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFY57hcxIhFqwzvNBStf1J3h3SJOv5So4xB1yTmze101PifykjdvyNBvM1HUi0VhJlRZ6PH X-Received: by 2002:a05:6a00:813:b0:68e:3eab:9e18 with SMTP id m19-20020a056a00081300b0068e3eab9e18mr5278339pfk.12.1697962742849; Sun, 22 Oct 2023 01:19:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697962742; cv=none; d=google.com; s=arc-20160816; b=0BUNKtVMy/0007dCYK7p+Ij4TAXaF0IBsQTUqxYKP8/gdNHCXlioB4oLHOiCRv8m4x swSnWQjrkUB77C2d5/zGCkkAaVHfUMAs4B0rNe16phYIXsYnOYiro+r79zJVTrym7pwg 2zJ0qGFU4eAiX2C/LmbzPKeXHER/16EH24R6W1s/BrOG5ZhPMoJE3tOeZb7K6pY5iXUZ f0kfolNNgfee4rA9wmMVo/KPuiSr81Cwa206IVBgagRe5mGb4s3G6/OyKt2RL3dm+VpB 3BFCnI01S7Z1ApQilEVLd8K5wPGNv4js2u1f69+nl3qx+P9Eu2zygchuyxk5I214D9iZ 1yig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=uGfgoEjHm9Bvc3Yax/7tfiHneuwcq8L+6dGfc4H08OM=; fh=uKl1CTlin8qnxt56ErGp3UOINPCBskOXHDuKvJLDQbo=; b=CwM3Gs6soEOFe4dpfXRyQLcfIKxN8fx470Br3raTpmqInSoP9AmInZxGdqd9Y6WjDB cp0HYakdnPbsFg0EvqB+fidfJOXIaW93eBHvsviMV8EB2xslJ90Mu9y/YlFWfF16zMWf qKPHHAbLX9PfZ3xJGDZNe/wvriUbep4oilHjrwvrSTo5ckrKiZl2XoqmUsCINCllj9U5 Rg50f7Hooy4tdTwlJ5DfJK2yGB/izPwnaK8Lm8jI5rK9T3ab8AMcoNFEbzrJWfVDR1Jn TfOL1Ptldo2iYW+Q0Q+T7KfqWhn6gIs/9eKXLgo44taIQYxC/gA+IX2cMh4QsFUrwc5s N97A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=NjH2+gb9; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id y184-20020a638ac1000000b00578d3f8d4d4si4498065pgd.448.2023.10.22.01.19.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 Oct 2023 01:19:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=NjH2+gb9; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 70911808BDB4; Sun, 22 Oct 2023 01:19:00 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231770AbjJVISx (ORCPT + 99 others); Sun, 22 Oct 2023 04:18:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231594AbjJVISr (ORCPT ); Sun, 22 Oct 2023 04:18:47 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 30221F4 for ; Sun, 22 Oct 2023 01:18:46 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id F1D6CC43395 for ; Sun, 22 Oct 2023 08:18:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697962726; bh=WXgzK4O6+fvazhY9rDTpzwXQKpRF0dnRpBE1ykWmc+k=; h=From:To:Subject:Date:In-Reply-To:References:From; b=NjH2+gb9AhK/ol8kAreWX6MEOf75cm233hTnviYBhIgDJoaI5+SwzaLYa3KADhxDN xN+BCk9FAsdVR+ErQ0+sadJSOD6g/3Pmool03s/+n1xM1EvsXAUnWuL5q9ATjF1QFw vE4bBDGl81OGIawB369aqMNAbg2Mnwk/Qz1qIPT4ccFnvpl34mWok20gvihlvk1jop XxvPrtSzLTM99c+4LfM0gsh2Moo5a7146rtMyDO9ohEzRq5NSJwcWjfVItCkFqJ9CJ jY9nRjh00+mCtnYxACacznKBoDEfl9ESUfdCwcCPTEQBwX6UbU2cWyQS0WRB+yYq6i OrPHjO3VJICNQ== From: Eric Biggers To: linux-crypto@vger.kernel.org Subject: [PATCH 11/30] crypto: rockchip - remove unnecessary alignmask for ahashes Date: Sun, 22 Oct 2023 01:10:41 -0700 Message-ID: <20231022081100.123613-12-ebiggers@kernel.org> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20231022081100.123613-1-ebiggers@kernel.org> References: <20231022081100.123613-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Sun, 22 Oct 2023 01:19:00 -0700 (PDT) From: Eric Biggers The crypto API's support for alignmasks for ahash algorithms is nearly useless, as its only effect is to cause the API to align the key and result buffers. The drivers that happen to be specifying an alignmask for ahash rarely actually need it. When they do, it's easily fixable, especially considering that these buffers cannot be used for DMA. In preparation for removing alignmask support from ahash, this patch makes the rockchip driver no longer use it. This driver didn't actually rely on it; it only writes to the result buffer in rk_hash_run(), already using put_unaligned_le32(). And this driver only supports unkeyed hash algorithms, so the key buffer need not be considered. Signed-off-by: Eric Biggers --- drivers/crypto/rockchip/rk3288_crypto_ahash.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/drivers/crypto/rockchip/rk3288_crypto_ahash.c b/drivers/crypto/rockchip/rk3288_crypto_ahash.c index 8c143180645e5..1b13b4aa16ecc 100644 --- a/drivers/crypto/rockchip/rk3288_crypto_ahash.c +++ b/drivers/crypto/rockchip/rk3288_crypto_ahash.c @@ -386,21 +386,20 @@ struct rk_crypto_tmp rk_ahash_sha1 = { .digestsize = SHA1_DIGEST_SIZE, .statesize = sizeof(struct sha1_state), .base = { .cra_name = "sha1", .cra_driver_name = "rk-sha1", .cra_priority = 300, .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, .cra_blocksize = SHA1_BLOCK_SIZE, .cra_ctxsize = sizeof(struct rk_ahash_ctx), - .cra_alignmask = 3, .cra_module = THIS_MODULE, } } }, .alg.hash.op = { .do_one_request = rk_hash_run, }, }; struct rk_crypto_tmp rk_ahash_sha256 = { @@ -419,21 +418,20 @@ struct rk_crypto_tmp rk_ahash_sha256 = { .digestsize = SHA256_DIGEST_SIZE, .statesize = sizeof(struct sha256_state), .base = { .cra_name = "sha256", .cra_driver_name = "rk-sha256", .cra_priority = 300, .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, .cra_blocksize = SHA256_BLOCK_SIZE, .cra_ctxsize = sizeof(struct rk_ahash_ctx), - .cra_alignmask = 3, .cra_module = THIS_MODULE, } } }, .alg.hash.op = { .do_one_request = rk_hash_run, }, }; struct rk_crypto_tmp rk_ahash_md5 = { @@ -452,19 +450,18 @@ struct rk_crypto_tmp rk_ahash_md5 = { .digestsize = MD5_DIGEST_SIZE, .statesize = sizeof(struct md5_state), .base = { .cra_name = "md5", .cra_driver_name = "rk-md5", .cra_priority = 300, .cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_NEED_FALLBACK, .cra_blocksize = SHA1_BLOCK_SIZE, .cra_ctxsize = sizeof(struct rk_ahash_ctx), - .cra_alignmask = 3, .cra_module = THIS_MODULE, } } }, .alg.hash.op = { .do_one_request = rk_hash_run, }, }; -- 2.42.0