From patchwork Thu Apr 13 06:23:00 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Herbert Xu X-Patchwork-Id: 675226 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C5EA9C77B6C for ; Thu, 13 Apr 2023 06:23:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229853AbjDMGXk (ORCPT ); Thu, 13 Apr 2023 02:23:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229836AbjDMGXj (ORCPT ); Thu, 13 Apr 2023 02:23:39 -0400 Received: from 167-179-156-38.a7b39c.syd.nbn.aussiebb.net (167-179-156-38.a7b39c.syd.nbn.aussiebb.net [167.179.156.38]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 57F8861A1; Wed, 12 Apr 2023 23:23:38 -0700 (PDT) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pmqMG-00FNRM-UJ; Thu, 13 Apr 2023 14:23:02 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Thu, 13 Apr 2023 14:23:00 +0800 Date: Thu, 13 Apr 2023 14:23:00 +0800 From: Herbert Xu To: Linux Crypto Mailing List Cc: David Ahern , Eric Dumazet , Paolo Abeni , Jakub Kicinski , "David S. Miller" , Dmitry Safonov , Andy Lutomirski , Ard Biesheuvel , Bob Gilligan , Dan Carpenter , David Laight , Dmitry Safonov <0x7f454c46@gmail.com>, Eric Biggers , "Eric W. Biederman" , Francesco Ruggeri , Hideaki YOSHIFUJI , Ivan Delalande , Leonard Crestez , Salam Noureddine , netdev@vger.kernel.org Subject: [PATCH 0/6] crypto: api - Add support for cloning tfms Message-ID: MIME-Version: 1.0 Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Over the years, various networking-related users have needed per-packet keys for hashing (and potentially for ciphers because hashing can be derived from ciphers, e.g., CMAC). Currently this is impossible to do with the Crypto API for two reasons. Each key is tied to a tfm object, which cannot be allocated on the network data path (as it requires sleeping). Secondly, various drivers rely on the fact that setkey is usually done right after allocating a tfm object and therefore sleep in their setkey functions. This series tries to resolve this by making it possible to clone an existing tfm object, thus making it possible to allocate new tfms on the data path. To do so you simply call crypto_clone_ahash/shash on an existing tfm object. Afterwards you may call setkey on it as usual. Cheers,