From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR02-VI1-obe.outbound.protection.outlook.com (mail-vi1eur02on2062b.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe16::62b]) by sourceware.org (Postfix) with ESMTPS id 29681385828D for ; Wed, 15 Feb 2023 17:55:23 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 29681385828D Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EdQqG+Q5OG4GdhbuL2UROMGeXLF1QZFxszGdle0F0YM=; b=jAN58Wt6SZqRVhyGHrT0iEu0zeY87laujig9O+E71S6J5hVjZXohQoiqesC5crodhxI4epUwrj+8MWzSSC0+rncBwX87L+DQxP9cxzSpwhcYXXwaM9ALWZPK7KB58qoaGNjYnhr4fW+Eigaw6Jv84sbn11zrweVtBZyWjygZApM= Received: from AS9PR05CA0348.eurprd05.prod.outlook.com (2603:10a6:20b:490::18) by AS2PR08MB9475.eurprd08.prod.outlook.com (2603:10a6:20b:5e8::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6086.26; Wed, 15 Feb 2023 17:55:19 +0000 Received: from AM7EUR03FT042.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:490:cafe::93) by AS9PR05CA0348.outlook.office365.com (2603:10a6:20b:490::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6086.26 via Frontend Transport; Wed, 15 Feb 2023 17:55:19 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM7EUR03FT042.mail.protection.outlook.com (100.127.140.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6111.12 via Frontend Transport; Wed, 15 Feb 2023 17:55:19 +0000 Received: ("Tessian outbound 3ad958cd7492:v132"); Wed, 15 Feb 2023 17:55:19 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 8f9bf25eb7df2519 X-CR-MTA-TID: 64aa7808 Received: from 550ecb7eab95.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1792E900-9B64-410D-B636-9ADE246B704A.1; Wed, 15 Feb 2023 17:55:12 +0000 Received: from EUR03-AM7-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 550ecb7eab95.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 15 Feb 2023 17:55:12 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=I9Ys+W82ZfJKgf6I00dM5w0WzYmKaQb2jinXkuGnWjAg/4kJBMFxAA4OowuF5QZDTyxIYIpNt0zGnxVSSEuci44Lwfg6LZ8r2I4SNjQVtnX8PZG6ysjfy8mDhOCWW9DfpyWkmdCANByRDzsexylimxIhFdNI5/mdEANAfVLDldqLouxIJi00deqvKc5UnSrkGkmdd4nNyfBjFUMMbR5IaBAVJHzoNA4dR8vh8WgjyOfAGk3xknmKrlFHHpKG0kC01P7gmo22e1ikt5DrkymA46lIrQ0gd+tdt/flb6FFLbkycpECFNnTsN9U3q6XSMoNb+SuRtk/mIeRsVw6KXvQXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EdQqG+Q5OG4GdhbuL2UROMGeXLF1QZFxszGdle0F0YM=; b=Hk64e2XtmdS0dVCT61veP5gvq/3htYL33EvlyQpLn48oX4mnUw3BqC3nHgYQJc3KGHEHCb8kMlqTZ1D/8+yMn1ig2r+j3HRvcx9JJEet9Jvfbkldx7IKitrHTaWs7ppbr8Sm+ISkxO7cu+mI36MiH/7KkKqZLoIMOynz34Zbh+gHbdL7FMN4fQlpAHg2o6Q/0R9wMCse1xF/xReCOPpMrGCav1wAURR1m+K/xN4K1t+7K1WvEd5yIol2zaqHCwSWEwZgRyk3TaNnsE4a0CXKVlS5dogdtybO4P2eI939rYJ9tie99RmJwXdv57iLqjdH5DDy1XH5H+gmEsD19ReRjg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EdQqG+Q5OG4GdhbuL2UROMGeXLF1QZFxszGdle0F0YM=; b=jAN58Wt6SZqRVhyGHrT0iEu0zeY87laujig9O+E71S6J5hVjZXohQoiqesC5crodhxI4epUwrj+8MWzSSC0+rncBwX87L+DQxP9cxzSpwhcYXXwaM9ALWZPK7KB58qoaGNjYnhr4fW+Eigaw6Jv84sbn11zrweVtBZyWjygZApM= Received: from PAWPR08MB8982.eurprd08.prod.outlook.com (2603:10a6:102:33f::20) by GV2PR08MB8318.eurprd08.prod.outlook.com (2603:10a6:150:b5::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6086.26; Wed, 15 Feb 2023 17:55:10 +0000 Received: from PAWPR08MB8982.eurprd08.prod.outlook.com ([fe80::dc17:8fa2:cce5:3573]) by PAWPR08MB8982.eurprd08.prod.outlook.com ([fe80::dc17:8fa2:cce5:3573%6]) with mapi id 15.20.6086.026; Wed, 15 Feb 2023 17:55:09 +0000 From: Wilco Dijkstra To: Adhemerval Zanella , "libc-alpha@sourceware.org" Subject: Re: [PATCH 1/7] crypto: Remove _STRING_ARCH_unaligned usage Thread-Topic: [PATCH 1/7] crypto: Remove _STRING_ARCH_unaligned usage Thread-Index: AQHZP7LxPkfn59FUgkuFHeIcJ5EXt67QTMba Date: Wed, 15 Feb 2023 17:55:09 +0000 Message-ID: References: <20230213135558.3328727-1-adhemerval.zanella@linaro.org> <20230213135558.3328727-2-adhemerval.zanella@linaro.org> In-Reply-To: <20230213135558.3328727-2-adhemerval.zanella@linaro.org> Accept-Language: en-GB, en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; x-ms-traffictypediagnostic: PAWPR08MB8982:EE_|GV2PR08MB8318:EE_|AM7EUR03FT042:EE_|AS2PR08MB9475:EE_ X-MS-Office365-Filtering-Correlation-Id: 946c948c-73cc-4519-2415-08db0f7dcd66 x-checkrecipientrouted: true nodisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAWPR08MB8982.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230025)(4636009)(136003)(39860400002)(366004)(376002)(346002)(396003)(451199018)(9686003)(55016003)(316002)(38070700005)(83380400001)(2906002)(91956017)(66476007)(64756008)(66446008)(66946007)(66556008)(76116006)(122000001)(8676002)(38100700002)(5660300002)(6506007)(478600001)(41300700001)(33656002)(86362001)(71200400001)(52536014)(8936002)(110136005)(7696005)(186003)(26005);DIR:OUT;SFP:1101; Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV2PR08MB8318 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM7EUR03FT042.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 7bf436e0-f580-4de8-1d0e-08db0f7dc744 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230025)(4636009)(39860400002)(376002)(136003)(396003)(346002)(451199018)(46966006)(40470700004)(36840700001)(356005)(82740400003)(36860700001)(81166007)(41300700001)(33656002)(86362001)(2906002)(8936002)(52536014)(8676002)(5660300002)(70586007)(70206006)(82310400005)(40480700001)(40460700003)(55016003)(186003)(26005)(6506007)(336012)(83380400001)(110136005)(47076005)(9686003)(478600001)(7696005)(316002);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Feb 2023 17:55:19.3784 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 946c948c-73cc-4519-2415-08db0f7dcd66 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM7EUR03FT042.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR08MB9475 X-Spam-Status: No, score=-9.5 required=5.0 tests=BAYES_00,BODY_8BITS,DKIM_SIGNED,DKIM_VALID,FORGED_SPF_HELO,GIT_PATCH_0,KAM_DMARC_NONE,SPF_HELO_PASS,SPF_NONE,TXREP,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: Hi Adhemerval,=0A= =0A= This looks good to me.=0A= =0A= Reviewed-by: Wilco Dijkstra =0A= =0A= =0A= diff --git a/crypt/md5.c b/crypt/md5.c=0A= index c7a232ad38..03240a9a36 100644=0A= --- a/crypt/md5.c=0A= +++ b/crypt/md5.c=0A= @@ -229,27 +229,11 @@ md5_process_bytes (const void *buffer, size_t len, st= ruct md5_ctx *ctx)=0A= =A0=A0 /* Process available complete blocks.=A0 */=0A= =A0=A0 if (len >=3D 64)=0A= =A0=A0=A0=A0 {=0A= -#if !_STRING_ARCH_unaligned=0A= -/* To check alignment gcc has an appropriate operator.=A0 Other=0A= -=A0=A0 compilers don't.=A0 */=0A= -# if __GNUC__ >=3D 2=0A= -#=A0 define UNALIGNED_P(p) (((md5_uintptr) p) % __alignof__ (md5_uint32) != =3D 0)=0A= -# else=0A= -#=A0 define UNALIGNED_P(p) (((md5_uintptr) p) % sizeof (md5_uint32) !=3D 0= )=0A= -# endif=0A= -=A0=A0=A0=A0=A0 if (UNALIGNED_P (buffer))=0A= -=A0=A0=A0=A0=A0=A0 while (len > 64)=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 {=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 __md5_process_block (memcpy (ctx->buffer, b= uffer, 64), 64, ctx);=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + 64;=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 len -=3D 64;=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 }=0A= -=A0=A0=A0=A0=A0 else=0A= -#endif=0A= +=A0=A0=A0=A0=A0 while (len > 64)=0A= =A0=A0=A0=A0=A0=A0=A0=A0 {=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 __md5_process_block (buffer, len & ~63, ctx);=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + (len & ~63);= =0A= -=A0=A0=A0=A0=A0=A0=A0=A0 len &=3D 63;=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 __md5_process_block (memcpy (ctx->buffer, buffer,= 64), 64, ctx);=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + 64;=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 len -=3D 64;=0A= =A0=A0=A0=A0=A0=A0=A0=A0 }=0A= =A0=A0=A0=A0 }=0A= =A0=0A= OK=0A= diff --git a/crypt/sha256.c b/crypt/sha256.c=0A= index 93b73997c7..96153d67dc 100644=0A= --- a/crypt/sha256.c=0A= +++ b/crypt/sha256.c=0A= @@ -120,13 +120,9 @@ __sha256_finish_ctx (struct sha256_ctx *ctx, void *res= buf)=0A= =A0=A0 memcpy (&ctx->buffer[bytes], fillbuf, pad);=0A= =A0=0A= =A0=A0 /* Put the 64-bit file length in *bits* at the end of the buffer.=A0= */=0A= -#if _STRING_ARCH_unaligned=0A= -=A0 ctx->buffer64[(bytes + pad) / 8] =3D SWAP64 (ctx->total64 << 3);=0A= -#else=0A= =A0=A0 ctx->buffer32[(bytes + pad + 4) / 4] =3D SWAP (ctx->total[TOTAL64_lo= w] << 3);=0A= =A0=A0 ctx->buffer32[(bytes + pad) / 4] =3D SWAP ((ctx->total[TOTAL64_high]= << 3)=0A= =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0= =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 | (ctx->total[TOTAL6= 4_low] >> 29));=0A= -#endif=0A= =A0=0A= =A0=A0 /* Process last bytes.=A0 */=0A= =A0=A0 __sha256_process_block (ctx->buffer, bytes + pad + 8, ctx);=0A= @@ -169,27 +165,11 @@ __sha256_process_bytes (const void *buffer, size_t le= n, struct sha256_ctx *ctx)=0A= =A0=A0 /* Process available complete blocks.=A0 */=0A= =A0=A0 if (len >=3D 64)=0A= =A0=A0=A0=A0 {=0A= -#if !_STRING_ARCH_unaligned=0A= -/* To check alignment gcc has an appropriate operator.=A0 Other=0A= -=A0=A0 compilers don't.=A0 */=0A= -# if __GNUC__ >=3D 2=0A= -#=A0 define UNALIGNED_P(p) (((uintptr_t) p) % __alignof__ (uint32_t) !=3D = 0)=0A= -# else=0A= -#=A0 define UNALIGNED_P(p) (((uintptr_t) p) % sizeof (uint32_t) !=3D 0)=0A= -# endif=0A= -=A0=A0=A0=A0=A0 if (UNALIGNED_P (buffer))=0A= -=A0=A0=A0=A0=A0=A0 while (len > 64)=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 {=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 __sha256_process_block (memcpy (ctx->buffer= , buffer, 64), 64, ctx);=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + 64;=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 len -=3D 64;=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 }=0A= -=A0=A0=A0=A0=A0 else=0A= -#endif=0A= +=A0=A0=A0=A0=A0 while (len > 64)=0A= =A0=A0=A0=A0=A0=A0=A0=A0 {=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 __sha256_process_block (buffer, len & ~63, ctx);= =0A= -=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + (len & ~63);= =0A= -=A0=A0=A0=A0=A0=A0=A0=A0 len &=3D 63;=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 __sha256_process_block (memcpy (ctx->buffer, buff= er, 64), 64, ctx);=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + 64;=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 len -=3D 64;=0A= =A0=A0=A0=A0=A0=A0=A0=A0 }=0A= =A0=A0=A0=A0 }=0A= =A0=0A= OK=0A= =0A= diff --git a/crypt/sha512.c b/crypt/sha512.c=0A= index d7e51b3604..ceabad1bf7 100644=0A= --- a/crypt/sha512.c=0A= +++ b/crypt/sha512.c=0A= @@ -192,28 +192,12 @@ __sha512_process_bytes (const void *buffer, size_t le= n, struct sha512_ctx *ctx)=0A= =A0=A0 /* Process available complete blocks.=A0 */=0A= =A0=A0 if (len >=3D 128)=0A= =A0=A0=A0=A0 {=0A= -#if !_STRING_ARCH_unaligned=0A= -/* To check alignment gcc has an appropriate operator.=A0 Other=0A= -=A0=A0 compilers don't.=A0 */=0A= -# if __GNUC__ >=3D 2=0A= -#=A0 define UNALIGNED_P(p) (((uintptr_t) p) % __alignof__ (uint64_t) !=3D = 0)=0A= -# else=0A= -#=A0 define UNALIGNED_P(p) (((uintptr_t) p) % sizeof (uint64_t) !=3D 0)=0A= -# endif=0A= -=A0=A0=A0=A0=A0 if (UNALIGNED_P (buffer))=0A= -=A0=A0=A0=A0=A0=A0 while (len > 128)=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 {=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 __sha512_process_block (memcpy (ctx->buffer= , buffer, 128), 128,=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0= =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 ctx);=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + 128;=0A= -=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 len -=3D 128;=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 }=0A= -=A0=A0=A0=A0=A0 else=0A= -#endif=0A= +=A0=A0=A0=A0=A0 while (len > 128)=0A= =A0=A0=A0=A0=A0=A0=A0=A0 {=0A= -=A0=A0=A0=A0=A0=A0=A0=A0 __sha512_process_block (buffer, len & ~127, ctx);= =0A= -=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + (len & ~127);= =0A= -=A0=A0=A0=A0=A0=A0=A0=A0 len &=3D 127;=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 __sha512_process_block (memcpy (ctx->buffer, buff= er, 128), 128,=0A= +=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0= =A0=A0=A0=A0=A0=A0=A0=A0 ctx);=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 buffer =3D (const char *) buffer + 128;=0A= +=A0=A0=A0=A0=A0=A0=A0=A0 len -=3D 128;=0A= =A0=A0=A0=A0=A0=A0=A0=A0 }=0A= =A0=A0=A0=A0 }=0A= =A0=0A= OK=0A=