On Fri, 14 Feb 2025 at 04:51, Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> wrote: > > On Thu, Feb 13, 2025 at 07:35:18PM -0800, Eric Biggers wrote: > > > > It absolutely is designed for an obsolete form of hardware offload. Have you > > ever tried actually using it? Here's how to hash a buffer of data with shash: > > > > return crypto_shash_tfm_digest(tfm, data, size, out) > > > > ... and here's how to do it with the SHA-256 library, for what it's worth: > > > > sha256(data, size, out) > > > > and here's how to do it with ahash: > > Try the new virt ahash interface, and we could easily put the > request object on the stack for sync algorithms: > > SYNC_AHASH_REQUEST_ON_STACK(req, alg); > > ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_SLEEP, NULL, NULL); > ahash_request_set_virt(req, data, out, size); > > return crypto_ahash_digest(req); > Whatever happened to not adding infrastructure to the kernel without a user? You keep saying how great this will all work for hypothetical cases, and from any other contributor, we would expect to see working code that demonstrates the advantages of the approach. But it seems you have no interest in actually writing this networking code, and nor has anybody else, as far as I can tell, which makes your claims rather dubious. IOW, even if all your claims are correct, it really makes no difference when nobody can be bothered to take advantage of it, and we should just go with Eric's working code.