Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp599105rda; Sun, 22 Oct 2023 01:19:07 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF4TNy9FpgDSeIDZHSNIosuABBYhnh8xwVdSrLN2yi/8ZQQA/JApDyPpfuy2lkDOesZEfDN X-Received: by 2002:a05:6e02:1cab:b0:351:4cdd:f533 with SMTP id x11-20020a056e021cab00b003514cddf533mr8361026ill.4.1697962747678; Sun, 22 Oct 2023 01:19:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697962747; cv=none; d=google.com; s=arc-20160816; b=NKxpVZlu0XSw+Zz7QFIwuNLzoVAwwu9GmVL3+Do0n+EcvJ7hjaVpBKL0gYYYUbn6wx zrUW5ym2HVbIhaYLEysUEEc+3fm9lW/AEtr79aE/RAqdYrJsaUTOpUiKMqLYAwRnNfeK OOuV2L4KJ9K9fXCPs8J+7xGgWhjYQlJxfga2aaQoQaA/MzUOkSIIoV8iO04eFazQCYNf BnN4R0uF8PuZ3dN5yovFPFELPJGnydIjFhxRB/Zo9Dtltm9CQmoRQwmLTr7wm/xLHLAw Ifb3oVYqXw01rwbopB98m9dG9qHaz687XiFo3z09GG6g1hmnTGEpp6WHsgEvMzOIlA7g QIMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=BI5dxH3204AeT2YawNYeHuWzez0Iv1vr8dvRl92++uM=; fh=uKl1CTlin8qnxt56ErGp3UOINPCBskOXHDuKvJLDQbo=; b=pqsdcupaMhlC+Em/5T8CwMjNfIU1RHt8juISJHvEd8iIihEfbncleonBVW0IOnISYw ykUvieFd9HPxbecoxZOPvl3Og558hZB9KlwVM3hOMdNQcMsQzBGo3NLhIKA9oNGNYwAY 2j+qyYJCn9/gqRBy2m7NLOuxHd4yypM6za5HRghjHYSfdbsFgiqZ4SSHEgyhYNjpXyIa AzkCFv1RlLS9cIr/Ga1jFMMeIVxyVwUvezIWuDWF8SHZQ3BBgjFwx6Wb3kZ3eCNfN894 k26Y/2StOOKpherKF6oiLXcOURmkmcbMR+LiwZWCc5eldJ8yCmB88j2+UZ137JWKMP87 432g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ICc33dfX; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id fz15-20020a17090b024f00b002680e08a877si6987557pjb.186.2023.10.22.01.19.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 Oct 2023 01:19:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ICc33dfX; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id D161E80597A5; Sun, 22 Oct 2023 01:19:04 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231669AbjJVISw (ORCPT + 99 others); Sun, 22 Oct 2023 04:18:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231463AbjJVISr (ORCPT ); Sun, 22 Oct 2023 04:18:47 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EADDEE7 for ; Sun, 22 Oct 2023 01:18:45 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 89BDFC433D9 for ; Sun, 22 Oct 2023 08:18:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697962725; bh=ONmdFDGh+bdASoYWSvdDq7sIj09NLUwaduP/l6rcSpA=; h=From:To:Subject:Date:In-Reply-To:References:From; b=ICc33dfXP9GE11uZHc2PmYJrJYcHN/hRmoX4WA9v95VLTCpdb1eznoHL/sJZszu52 hav8ltLlbvgRUSC/OAqj+fk8qe3/3Hix5GvSo8x5OQESiqxA+RdnQO7Lc5uskTxJVE m8p3Ojo5nBkiFOuJQJpkdsufjQu6v9BhBkkMQPXF/jJcSBUXHR5A/gB1ZMpFzPOlpa VYtfZpanksWJLJqkISyg7aU9iBTnUGuNRL0P08lg1/4qw021SHtsdrf5hw10aIqKZz 4F8/M/YFJiAjhHSYm0ULvPwl23PyxFVdrIUvVA9UwDSE+/4snqPaaRQeYZrP934INz gExJ2UFN+HjkQ== From: Eric Biggers To: linux-crypto@vger.kernel.org Subject: [PATCH 09/30] crypto: talitos - remove unnecessary alignmask for ahashes Date: Sun, 22 Oct 2023 01:10:39 -0700 Message-ID: <20231022081100.123613-10-ebiggers@kernel.org> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20231022081100.123613-1-ebiggers@kernel.org> References: <20231022081100.123613-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Sun, 22 Oct 2023 01:19:05 -0700 (PDT) From: Eric Biggers The crypto API's support for alignmasks for ahash algorithms is nearly useless, as its only effect is to cause the API to align the key and result buffers. The drivers that happen to be specifying an alignmask for ahash rarely actually need it. When they do, it's easily fixable, especially considering that these buffers cannot be used for DMA. In preparation for removing alignmask support from ahash, this patch makes the talitos driver no longer use it. This driver didn't actually rely on it; it only writes to the result buffer in common_nonsnoop_hash_unmap(), simply using memcpy(). And this driver's "ahash_setkey()" function does not assume any alignment for the key buffer. Signed-off-by: Eric Biggers --- drivers/crypto/talitos.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/talitos.c b/drivers/crypto/talitos.c index 4ca4fbd227bce..e8f710d87007b 100644 --- a/drivers/crypto/talitos.c +++ b/drivers/crypto/talitos.c @@ -3252,21 +3252,21 @@ static struct talitos_crypto_alg *talitos_alg_alloc(struct device *dev, dev_err(dev, "unknown algorithm type %d\n", t_alg->algt.type); devm_kfree(dev, t_alg); return ERR_PTR(-EINVAL); } alg->cra_module = THIS_MODULE; if (t_alg->algt.priority) alg->cra_priority = t_alg->algt.priority; else alg->cra_priority = TALITOS_CRA_PRIORITY; - if (has_ftr_sec1(priv)) + if (has_ftr_sec1(priv) && t_alg->algt.type != CRYPTO_ALG_TYPE_AHASH) alg->cra_alignmask = 3; else alg->cra_alignmask = 0; alg->cra_ctxsize = sizeof(struct talitos_ctx); alg->cra_flags |= CRYPTO_ALG_KERN_DRIVER_ONLY; t_alg->dev = dev; return t_alg; } -- 2.42.0