lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aQSFbEdedID5f5B8@gondor.apana.org.au>
Date: Fri, 31 Oct 2025 17:46:20 +0800
From: Herbert Xu <herbert@...dor.apana.org.au>
To: T Pratham <t-pratham@...com>
Cc: "David S. Miller" <davem@...emloft.net>,
	Manorit Chawdhry <m-chawdhry@...com>,
	Kamlesh Gurudasani <kamlesh@...com>,
	Shiva Tripathi <s-tripathi1@...com>,
	Kavitha Malarvizhi <k-malarvizhi@...com>,
	Vishal Mahaveer <vishalm@...com>,
	Praneeth Bajjuri <praneeth@...com>, linux-crypto@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] crypto: aead - Add support for on-stack AEAD req
 allocation

On Wed, Oct 22, 2025 at 10:48:42PM +0530, T Pratham wrote:
> This patch introduces infrastructure for allocating req objects on the
> stack for AEADs. The additions mirror the existing sync skcipher APIs.
> This can be used in cases where simple sync AEAD operations are being
> done. So allocating the request on stack avoides possible out-of-memory
> errors.
> 
> The struct crypto_sync_aead is a wrapper around crypto_aead and should
> be used in its place when sync only requests will be done on the stack.
> Correspondingly, the request should be allocated with
> SYNC_AEAD_REQUEST_ON_STACK().
> 
> Similar to sync_skcipher APIs, the new sync_aead APIs are wrappers
> around the regular aead APIs to facilitate sync only operations. The
> following crypto APIs are added:
>  - struct crypto_sync_aead
>  - crypto_alloc_sync_aead()
>  - crypto_free_sync_aead()
>  - crypto_aync_aead_tfm()
>  - crypto_sync_aead_setkey()
>  - crypto_sync_aead_setauthsize()
>  - crypto_sync_aead_authsize()
>  - crypto_sync_aead_maxauthsize()
>  - crypto_sync_aead_ivsize()
>  - crypto_sync_aead_blocksize()
>  - crypto_sync_aead_get_flags()
>  - crypto_sync_aead_set_flags()
>  - crypto_sync_aead_clear_flags()
>  - crypto_sync_aead_reqtfm()
>  - aead_request_set_sync_tfm()
>  - SYNC_AEAD_REQUEST_ON_STACK()
> 
> Signed-off-by: T Pratham <t-pratham@...com>
> ---
>  crypto/aead.c         | 19 ++++++++++
>  include/crypto/aead.h | 87 +++++++++++++++++++++++++++++++++++++++++++
>  2 files changed, 106 insertions(+)

Patch applied.  Thanks.
-- 
Email: Herbert Xu <herbert@...dor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ