In order to process the data incrementally, adiantum needs see the source data twice. This patch series adds support for such algorithms in lskcipher including adaptations to algif_skcipher. For now this capability isn't actually exported completely through algif_skcipher. That is, if the source data is too large to be fed at once through an SG list the operation will fail with ENOSYS. As a future extension, the incremental processing can be extended through algif_skcipher (and perhaps even algif_aead). However, I'd like to see some real uses for it before adding this complexity. For example, one valid use-case would be some hardware that directly supported such incremental processing. In addition to converting adiantum, the underlying chacha algorithm is also converted over to lskcipher. The algorithms cts + xts have been converted too to ensure that the tailsize mechanism works properly for them. While doing this the parameters for cts + xts have been modified so that blocksize is now 1. This entails changing the paramters of all drivers that support cts and/or xts. Herbert Xu (15): crypto: skcipher - Add tailsize attribute crypto: algif_skcipher - Add support for tailsize crypto: skcipher - Remove ivsize check for lskcipher simple templates crypto: xts - Convert from skcipher to lskcipher crypto: skcipher - Add twopass attribute crypto: algif_skcipher - Disallow nonincremental algorithms crypto: adiantum - Use lskcipher instead of cipher crypto: skcipher - Add incremental support to lskcipher wrapper crypto: chacha-generic - Convert from skcipher to lskcipher crypto: skcipher - Move nesting check into ecb crypto: skcipher - Propagate zero-length requests to lskcipher crypto: cts - Convert from skcipher to lskcipher crypto: cts,xts - Update parameters blocksize/chunksize/tailsize crypto: lskcipher - Export incremental interface internally crypto: adiantum - Convert from skcipher to lskcipher arch/arm/crypto/aes-ce-glue.c | 8 +- arch/arm/crypto/aes-neonbs-glue.c | 4 +- arch/arm64/crypto/aes-glue.c | 8 +- arch/arm64/crypto/aes-neonbs-glue.c | 4 +- arch/arm64/crypto/sm4-ce-glue.c | 8 +- arch/powerpc/crypto/aes-spe-glue.c | 4 +- arch/powerpc/crypto/aes_xts.c | 4 +- arch/s390/crypto/aes_s390.c | 4 +- arch/s390/crypto/paes_s390.c | 4 +- arch/x86/crypto/aesni-intel_glue.c | 8 +- crypto/adiantum.c | 573 ++++++++++-------- crypto/algif_skcipher.c | 11 +- crypto/cbc.c | 5 + crypto/chacha_generic.c | 161 ++--- crypto/cts.c | 355 +++-------- crypto/ecb.c | 4 + crypto/lskcipher.c | 94 ++- crypto/skcipher.c | 18 +- crypto/xts.c | 572 +++++++---------- drivers/crypto/atmel-aes.c | 4 +- drivers/crypto/axis/artpec6_crypto.c | 2 + drivers/crypto/bcm/cipher.c | 4 +- drivers/crypto/caam/caamalg.c | 4 +- drivers/crypto/caam/caamalg_qi.c | 4 +- drivers/crypto/caam/caamalg_qi2.c | 4 +- drivers/crypto/cavium/cpt/cptvf_algs.c | 4 +- .../crypto/cavium/nitrox/nitrox_skcipher.c | 8 +- drivers/crypto/ccp/ccp-crypto-aes-xts.c | 4 +- drivers/crypto/ccree/cc_cipher.c | 12 +- drivers/crypto/chelsio/chcr_algo.c | 4 +- drivers/crypto/hisilicon/sec/sec_algs.c | 4 +- drivers/crypto/hisilicon/sec2/sec_crypto.c | 23 +- .../crypto/inside-secure/safexcel_cipher.c | 4 +- .../intel/keembay/keembay-ocs-aes-core.c | 11 +- .../crypto/intel/qat/qat_common/qat_algs.c | 4 +- .../crypto/marvell/octeontx/otx_cptvf_algs.c | 4 +- .../marvell/octeontx2/otx2_cptvf_algs.c | 4 +- drivers/crypto/qce/skcipher.c | 6 +- include/crypto/internal/chacha.h | 22 +- include/crypto/internal/skcipher.h | 43 ++ include/crypto/skcipher.h | 65 ++ include/crypto/xts.h | 24 +- 42 files changed, 1067 insertions(+), 1050 deletions(-) -- Email: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt