Received: by 2002:ab2:6816:0:b0:1f9:5764:f03e with SMTP id t22csp36716lqo; Wed, 15 May 2024 20:12:17 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW3RZ6tTX9NQJAh2Uf6XNX/FubuALpyX3Y2bFvjSdu5WxE7uRGg2y7B7rT8zwaK8Lo7IN7JiChKdokWw5C5tJCOCFiKhZM1NHQPGnKK4w== X-Google-Smtp-Source: AGHT+IGOi/YrUohIiV9MGX+oOwRalh+yq3wbK33vX37G8SkWsKd68CdpHrg6satiOpeM/OajNnTW X-Received: by 2002:a17:906:5655:b0:a59:8786:3850 with SMTP id a640c23a62f3a-a5a2d681266mr1176766066b.72.1715829137522; Wed, 15 May 2024 20:12:17 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715829137; cv=pass; d=google.com; s=arc-20160816; b=dutUZO5XFQRiy9cRpm9H2cQBDcqvdlkwgzQFPfz63ztJwNcuvusGd+vZn1p/ZJuEK9 5yCYmKn4eU5xlgFEyq/316n7zzu2OVfkPOmCQuop+kZfdBCtlhjaxQ0qQj1bozbd3/7P 3yhkrldVBcWP+mcTHRjK9v0jj21T+/dryZAuvPKbAaTjivWCl7ZfGz7nwI0gGPb4dDR9 F1vwSwJoPyKD7EWfHtrDwgIhxbDWvSP3eIDAGF/0jmqQPTfl1WmnzYDGnRYsPiFeZlqm JJi2bceXf14OwR5YI0EC4jHfyw+W6t/n/J/qyiP2rk527DU0hVk+ux0HbJKkEHkEMq7G l2Yw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=arhi97mOaQdG99l3e6G5fKeBVU4MWUpNsqgpVpnh/jg=; fh=at+TcqNxcZ5x+Uf2GbARaxkWTOX2mfqzzQrkXRVfXgo=; b=e3OVv6YehrM6IRpaM809kyxImwFMUDm7dME/c+i2a+XsFrBbVYlHtiTch/+f5JbCba 6f2lO+nviUlIeRE421N5GEwInyGIpM7Gm8QF1HItdUGhg2EqFgKf+4hkw418bt8T52o/ lAVLY3A/IO16Bvg+pmLyDw4PrGuDVOpgPQdfSiy+m32LTrkDZ0auFdfxDxNM9IbW7tyL J9mJT673xHSBd72nvPPxRdGb7jIKlYiSuOYJ/vHy8P8U+MBYffwp9JoNDi3H7RoeSWtm hgU2X4R12D8pbFJmq49bCuJdEFJq1EK7zz11dq+c8GVrkeSXrkf1LlNMrsoJkaw9s90K Xplw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@vayavyalabs.com header.s=google header.b=C5Ikvfp1; arc=pass (i=1 spf=pass spfdomain=vayavyalabs.com dkim=pass dkdomain=vayavyalabs.com dmarc=pass fromdomain=vayavyalabs.com); spf=pass (google.com: domain of linux-crypto+bounces-4192-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-crypto+bounces-4192-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=vayavyalabs.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id a640c23a62f3a-a5a3a018610si659341066b.211.2024.05.15.20.12.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 May 2024 20:12:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto+bounces-4192-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@vayavyalabs.com header.s=google header.b=C5Ikvfp1; arc=pass (i=1 spf=pass spfdomain=vayavyalabs.com dkim=pass dkdomain=vayavyalabs.com dmarc=pass fromdomain=vayavyalabs.com); spf=pass (google.com: domain of linux-crypto+bounces-4192-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-crypto+bounces-4192-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=vayavyalabs.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 392BF1F211D6 for ; Thu, 16 May 2024 03:12:17 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 743063FEF; Thu, 16 May 2024 03:12:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=vayavyalabs.com header.i=@vayavyalabs.com header.b="C5Ikvfp1" X-Original-To: linux-crypto@vger.kernel.org Received: from mail-yb1-f178.google.com (mail-yb1-f178.google.com [209.85.219.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C4F6E2566 for ; Thu, 16 May 2024 03:12:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.178 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715829131; cv=none; b=UO2nJQDGeGaNQLj4jq4WShGItDLBkVvZxL6aUG2NRUu02aipo1txYcnKRQrhjyCxGlTgwfeKMkLvdIfFUrqT8GZ4mztYdp5sdqaNLs90eibsx7AwoOFkDdBdLHfyOG0T/8N0xmi6AykPEVfz9vUEhG9VYNoblU8yoyNbRYS60Hg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715829131; c=relaxed/simple; bh=GeayfmFw5bI1wsDSlpFOMEcNK5ns1Ba1gDkmHP5rC+A=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=cLKF0OOiXO35FYJCSxEiF8XJFIuDR6UhfsDkMMrEa42VkdCnD2nIN5b/0Pa+tVgMQjXtIC4W1UQq/vbYDd+mvqVNWXaKs/WTZ2V+YxbE1/PwhkDwEKPbCKeJb0J2AYE8sga6WqNScM7JTXiEsjgkX3zD1jiycKKFWH7UBkzRPZA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=vayavyalabs.com; spf=pass smtp.mailfrom=vayavyalabs.com; dkim=pass (1024-bit key) header.d=vayavyalabs.com header.i=@vayavyalabs.com header.b=C5Ikvfp1; arc=none smtp.client-ip=209.85.219.178 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=vayavyalabs.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=vayavyalabs.com Received: by mail-yb1-f178.google.com with SMTP id 3f1490d57ef6-de5ea7edb90so7648471276.1 for ; Wed, 15 May 2024 20:12:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vayavyalabs.com; s=google; t=1715829129; x=1716433929; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=arhi97mOaQdG99l3e6G5fKeBVU4MWUpNsqgpVpnh/jg=; b=C5Ikvfp1zquuHINySPcYcquKtpN1H6jBgi5MCPHmBqXbGBA5/ciok9BPsuGzhSQ20V NN2J7B0qbWM73QKeXlyBWU0E9jnAFICRm2oiLwmXRVLyU7qae3r5ChzI8rr9vlWS30O/ fBeQPX/o3eHm3NGpoLnZVjnwtfNwjRANroCvU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715829129; x=1716433929; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=arhi97mOaQdG99l3e6G5fKeBVU4MWUpNsqgpVpnh/jg=; b=gpdIOejxcZmEPs/ZU373xLvrIdi+I8rL/Y7MuMxPHdVtOZmi4N90f6sq+e+sNu5PTZ wl8kTFs9ZmDOAQnTbqBXTY9eqRVPOyI/gGQboQS2sedG/tLYRS52C1T9cMYLFVGHGiRz vmg02NyB+xkwDKr2DLDaTQMyBA7Z+Gkk+GOPqugIj2D4SdvnnrKBfPSUQirjyzuoTwth FtPQG/PK2KDR6ks7L5FDau9n9C16bT5YIPDON4hLPzJ3MxfLMB4jz5wGK7K/F7d2jerM u9M67bP+3550IeNHjXmNQwWsUHKMlgb1Ho/Hij6rcZDgu1qg53/kzK/lKostBjUm41ei a12Q== X-Gm-Message-State: AOJu0YzpG6s1+pVY+LAWsIwPAfr2kyIk5qs08zYUWkSxI/YC4O895XWB T438yKWaio5FPZbK7lMXBHziNX2S8EfoaiGGuIJ4Lc0TwrkOXNiV/BbF8fDmycVbTNWBHiqFgbS 6OR8MIY/QrSWTZCxaVlgeSCTiuPg4sXwHjDAgLwMeth+1bJh/ X-Received: by 2002:a25:9702:0:b0:de6:4ff:3164 with SMTP id 3f1490d57ef6-dee4f2eb5b2mr16897416276.36.1715829128723; Wed, 15 May 2024 20:12:08 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240426042544.3545690-1-pavitrakumarm@vayavyalabs.com> <20240426042544.3545690-4-pavitrakumarm@vayavyalabs.com> In-Reply-To: From: Pavitrakumar Managutte Date: Thu, 16 May 2024 08:41:57 +0530 Message-ID: Subject: Re: [PATCH v3 3/7] Add SPAcc ahash support To: Herbert Xu Cc: linux-crypto@vger.kernel.org, Ruud.Derwig@synopsys.com, manjunath.hadli@vayavyalabs.com, bhoomikak@vayavyalabs.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Herbert, The SPAcc crypto accelerator has the below design 1. The SPAcc does not allow us to read internal context (including the intermediate hash). The hardware context is inaccessible for security reasons. 2. SPAcc has multiple hardware contexts and every request uses a hardwar= e context that's obtained using 'spacc_open' and released with 'spacc_close'. The export/import is supposed to save the intermediate hash and since SPAcc hardware does not provide that, I was using it to save my driver state. This is redundant and I tested the same by removing it from export/import. An empty import/export function is what I have in the latest driver code and that works for me. Appreciate your inputs. Warm regards, PK On Fri, May 10, 2024 at 1:33=E2=80=AFPM Herbert Xu wrote: > > On Tue, May 07, 2024 at 09:49:57AM +0530, Pavitrakumar Managutte wrote: > > > > About the export function, yes its hash state that's present inside > > "spacc_crypto_ctx". > > Please show me exactly where the partial hash state is stored in the > request context because I couldn't find the spot. It can't be in > spacc_crypto_ctx as that is the tfm context and shared by multiple > reqeusts. > > Thanks, > -- > Email: Herbert Xu > Home Page: http://gondor.apana.org.au/~herbert/ > PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt