* [PATCH] crypto: caam/hash - fix asynchronous hash
@ 2024-01-16 9:44 Gaurav Jain
2024-01-17 4:33 ` Eric Biggers
0 siblings, 1 reply; 5+ messages in thread
From: Gaurav Jain @ 2024-01-16 9:44 UTC (permalink / raw)
To: Herbert Xu, David S . Miller, Eric Biggers, Horia Geanta,
Pankaj Gupta, Varun Sethi, Meenakshi Aggarwal, Aisheng Dong
Cc: Silvano Di Ninno, linux-crypto, linux-kernel, linux-imx,
Gaurav Jain
ahash_alg->setkey is updated to ahash_nosetkey in ahash.c
so updating the handling of setkey in caam driver.
Fixes: 2f1f34c1bf7b ("crypto: ahash - optimize performance when wrapping shash")
Signed-off-by: Gaurav Jain <gaurav.jain@nxp.com>
---
drivers/crypto/caam/caamalg_qi2.c | 4 ++--
drivers/crypto/caam/caamhash.c | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/crypto/caam/caamalg_qi2.c b/drivers/crypto/caam/caamalg_qi2.c
index a148ff1f0872..93a400e286b4 100644
--- a/drivers/crypto/caam/caamalg_qi2.c
+++ b/drivers/crypto/caam/caamalg_qi2.c
@@ -4571,7 +4571,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
ctx->dev = caam_hash->dev;
- if (alg->setkey) {
+ if (crypto_hash_alg_has_setkey(halg)) {
ctx->adata.key_dma = dma_map_single_attrs(ctx->dev, ctx->key,
ARRAY_SIZE(ctx->key),
DMA_TO_DEVICE,
@@ -4611,7 +4611,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
* For keyed hash algorithms shared descriptors
* will be created later in setkey() callback
*/
- return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
+ return crypto_hash_alg_has_setkey(halg) ? 0 : ahash_set_sh_desc(ahash);
}
static void caam_hash_cra_exit(struct crypto_tfm *tfm)
diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
index 290c8500c247..4d50356b593c 100644
--- a/drivers/crypto/caam/caamhash.c
+++ b/drivers/crypto/caam/caamhash.c
@@ -1804,7 +1804,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
} else {
if (priv->era >= 6) {
ctx->dir = DMA_BIDIRECTIONAL;
- ctx->key_dir = alg->setkey ? DMA_TO_DEVICE : DMA_NONE;
+ ctx->key_dir = crypto_hash_alg_has_setkey(halg) ? DMA_TO_DEVICE : DMA_NONE;
} else {
ctx->dir = DMA_TO_DEVICE;
ctx->key_dir = DMA_NONE;
@@ -1862,7 +1862,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
* For keyed hash algorithms shared descriptors
* will be created later in setkey() callback
*/
- return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
+ return crypto_hash_alg_has_setkey(halg) ? 0 : ahash_set_sh_desc(ahash);
}
static void caam_hash_cra_exit(struct crypto_tfm *tfm)
--
2.25.1
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH] crypto: caam/hash - fix asynchronous hash
2024-01-16 9:44 [PATCH] crypto: caam/hash - fix asynchronous hash Gaurav Jain
@ 2024-01-17 4:33 ` Eric Biggers
2024-01-17 10:48 ` [EXT] " Gaurav Jain
0 siblings, 1 reply; 5+ messages in thread
From: Eric Biggers @ 2024-01-17 4:33 UTC (permalink / raw)
To: Gaurav Jain
Cc: Herbert Xu, David S . Miller, Horia Geanta, Pankaj Gupta,
Varun Sethi, Meenakshi Aggarwal, Aisheng Dong, Silvano Di Ninno,
linux-crypto, linux-kernel, linux-imx
On Tue, Jan 16, 2024 at 03:14:05PM +0530, Gaurav Jain wrote:
> ahash_alg->setkey is updated to ahash_nosetkey in ahash.c
> so updating the handling of setkey in caam driver.
>
> Fixes: 2f1f34c1bf7b ("crypto: ahash - optimize performance when wrapping shash")
> Signed-off-by: Gaurav Jain <gaurav.jain@nxp.com>
> ---
> drivers/crypto/caam/caamalg_qi2.c | 4 ++--
> drivers/crypto/caam/caamhash.c | 4 ++--
> 2 files changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/drivers/crypto/caam/caamalg_qi2.c b/drivers/crypto/caam/caamalg_qi2.c
> index a148ff1f0872..93a400e286b4 100644
> --- a/drivers/crypto/caam/caamalg_qi2.c
> +++ b/drivers/crypto/caam/caamalg_qi2.c
> @@ -4571,7 +4571,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
>
> ctx->dev = caam_hash->dev;
>
> - if (alg->setkey) {
> + if (crypto_hash_alg_has_setkey(halg)) {
> ctx->adata.key_dma = dma_map_single_attrs(ctx->dev, ctx->key,
> ARRAY_SIZE(ctx->key),
> DMA_TO_DEVICE,
> @@ -4611,7 +4611,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
> * For keyed hash algorithms shared descriptors
> * will be created later in setkey() callback
> */
> - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> + return crypto_hash_alg_has_setkey(halg) ? 0 : ahash_set_sh_desc(ahash);
> }
>
> static void caam_hash_cra_exit(struct crypto_tfm *tfm)
> diff --git a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
> index 290c8500c247..4d50356b593c 100644
> --- a/drivers/crypto/caam/caamhash.c
> +++ b/drivers/crypto/caam/caamhash.c
> @@ -1804,7 +1804,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
> } else {
> if (priv->era >= 6) {
> ctx->dir = DMA_BIDIRECTIONAL;
> - ctx->key_dir = alg->setkey ? DMA_TO_DEVICE : DMA_NONE;
> + ctx->key_dir = crypto_hash_alg_has_setkey(halg) ? DMA_TO_DEVICE : DMA_NONE;
> } else {
> ctx->dir = DMA_TO_DEVICE;
> ctx->key_dir = DMA_NONE;
> @@ -1862,7 +1862,7 @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
> * For keyed hash algorithms shared descriptors
> * will be created later in setkey() callback
> */
> - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> + return crypto_hash_alg_has_setkey(halg) ? 0 : ahash_set_sh_desc(ahash);
> }
>
Thanks. Did you also consider putting something in struct caam_hash_alg (the
struct in which this driver embeds its ahash_alg structure) that indicates
whether the algorithm is an HMAC or not? Other drivers use that solution.
- Eric
^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
2024-01-17 4:33 ` Eric Biggers
@ 2024-01-17 10:48 ` Gaurav Jain
2024-01-18 3:43 ` Eric Biggers
0 siblings, 1 reply; 5+ messages in thread
From: Gaurav Jain @ 2024-01-17 10:48 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, David S . Miller, Horia Geanta, Pankaj Gupta,
Varun Sethi, Meenakshi Aggarwal, Aisheng Dong, Silvano Di Ninno,
linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org,
dl-linux-imx
> -----Original Message-----
> From: Eric Biggers <ebiggers@kernel.org>
> Sent: Wednesday, January 17, 2024 10:03 AM
> To: Gaurav Jain <gaurav.jain@nxp.com>
> Cc: Herbert Xu <herbert@gondor.apana.org.au>; David S . Miller
> <davem@davemloft.net>; Horia Geanta <horia.geanta@nxp.com>; Pankaj
> Gupta <pankaj.gupta@nxp.com>; Varun Sethi <V.Sethi@nxp.com>; Meenakshi
> Aggarwal <meenakshi.aggarwal@nxp.com>; Aisheng Dong
> <aisheng.dong@nxp.com>; Silvano Di Ninno <silvano.dininno@nxp.com>; linux-
> crypto@vger.kernel.org; linux-kernel@vger.kernel.org; dl-linux-imx <linux-
> imx@nxp.com>
> Subject: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
>
> Caution: This is an external email. Please take care when clicking links or
> opening attachments. When in doubt, report the message using the 'Report this
> email' button
>
>
> On Tue, Jan 16, 2024 at 03:14:05PM +0530, Gaurav Jain wrote:
> > ahash_alg->setkey is updated to ahash_nosetkey in ahash.c so updating
> > the handling of setkey in caam driver.
> >
> > Fixes: 2f1f34c1bf7b ("crypto: ahash - optimize performance when
> > wrapping shash")
> > Signed-off-by: Gaurav Jain <gaurav.jain@nxp.com>
> > ---
> > drivers/crypto/caam/caamalg_qi2.c | 4 ++--
> > drivers/crypto/caam/caamhash.c | 4 ++--
> > 2 files changed, 4 insertions(+), 4 deletions(-)
> >
> > diff --git a/drivers/crypto/caam/caamalg_qi2.c
> > b/drivers/crypto/caam/caamalg_qi2.c
> > index a148ff1f0872..93a400e286b4 100644
> > --- a/drivers/crypto/caam/caamalg_qi2.c
> > +++ b/drivers/crypto/caam/caamalg_qi2.c
> > @@ -4571,7 +4571,7 @@ static int caam_hash_cra_init(struct crypto_tfm
> > *tfm)
> >
> > ctx->dev = caam_hash->dev;
> >
> > - if (alg->setkey) {
> > + if (crypto_hash_alg_has_setkey(halg)) {
> > ctx->adata.key_dma = dma_map_single_attrs(ctx->dev, ctx->key,
> > ARRAY_SIZE(ctx->key),
> > DMA_TO_DEVICE,
> > @@ -4611,7 +4611,7 @@ static int caam_hash_cra_init(struct crypto_tfm
> *tfm)
> > * For keyed hash algorithms shared descriptors
> > * will be created later in setkey() callback
> > */
> > - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> > + return crypto_hash_alg_has_setkey(halg) ? 0 :
> > + ahash_set_sh_desc(ahash);
> > }
> >
> > static void caam_hash_cra_exit(struct crypto_tfm *tfm) diff --git
> > a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
> > index 290c8500c247..4d50356b593c 100644
> > --- a/drivers/crypto/caam/caamhash.c
> > +++ b/drivers/crypto/caam/caamhash.c
> > @@ -1804,7 +1804,7 @@ static int caam_hash_cra_init(struct crypto_tfm
> *tfm)
> > } else {
> > if (priv->era >= 6) {
> > ctx->dir = DMA_BIDIRECTIONAL;
> > - ctx->key_dir = alg->setkey ? DMA_TO_DEVICE : DMA_NONE;
> > + ctx->key_dir = crypto_hash_alg_has_setkey(halg)
> > + ? DMA_TO_DEVICE : DMA_NONE;
> > } else {
> > ctx->dir = DMA_TO_DEVICE;
> > ctx->key_dir = DMA_NONE; @@ -1862,7 +1862,7 @@
> > static int caam_hash_cra_init(struct crypto_tfm *tfm)
> > * For keyed hash algorithms shared descriptors
> > * will be created later in setkey() callback
> > */
> > - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> > + return crypto_hash_alg_has_setkey(halg) ? 0 :
> > + ahash_set_sh_desc(ahash);
> > }
> >
>
> Thanks. Did you also consider putting something in struct caam_hash_alg (the
> struct in which this driver embeds its ahash_alg structure) that indicates whether
> the algorithm is an HMAC or not? Other drivers use that solution.
Crypto/ahash.c has this API to check the setkey so I used to differentiate between HMAC & only hash.
Let me know if this change is not sufficient, will add the flag in caam_hash_alg.
Gaurav
>
> - Eric
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
2024-01-17 10:48 ` [EXT] " Gaurav Jain
@ 2024-01-18 3:43 ` Eric Biggers
2024-01-18 9:28 ` Gaurav Jain
0 siblings, 1 reply; 5+ messages in thread
From: Eric Biggers @ 2024-01-18 3:43 UTC (permalink / raw)
To: Gaurav Jain
Cc: Herbert Xu, David S . Miller, Horia Geanta, Pankaj Gupta,
Varun Sethi, Meenakshi Aggarwal, Aisheng Dong, Silvano Di Ninno,
linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org,
dl-linux-imx
On Wed, Jan 17, 2024 at 10:48:39AM +0000, Gaurav Jain wrote:
>
>
> > -----Original Message-----
> > From: Eric Biggers <ebiggers@kernel.org>
> > Sent: Wednesday, January 17, 2024 10:03 AM
> > To: Gaurav Jain <gaurav.jain@nxp.com>
> > Cc: Herbert Xu <herbert@gondor.apana.org.au>; David S . Miller
> > <davem@davemloft.net>; Horia Geanta <horia.geanta@nxp.com>; Pankaj
> > Gupta <pankaj.gupta@nxp.com>; Varun Sethi <V.Sethi@nxp.com>; Meenakshi
> > Aggarwal <meenakshi.aggarwal@nxp.com>; Aisheng Dong
> > <aisheng.dong@nxp.com>; Silvano Di Ninno <silvano.dininno@nxp.com>; linux-
> > crypto@vger.kernel.org; linux-kernel@vger.kernel.org; dl-linux-imx <linux-
> > imx@nxp.com>
> > Subject: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
> >
> > Caution: This is an external email. Please take care when clicking links or
> > opening attachments. When in doubt, report the message using the 'Report this
> > email' button
> >
> >
> > On Tue, Jan 16, 2024 at 03:14:05PM +0530, Gaurav Jain wrote:
> > > ahash_alg->setkey is updated to ahash_nosetkey in ahash.c so updating
> > > the handling of setkey in caam driver.
> > >
> > > Fixes: 2f1f34c1bf7b ("crypto: ahash - optimize performance when
> > > wrapping shash")
> > > Signed-off-by: Gaurav Jain <gaurav.jain@nxp.com>
> > > ---
> > > drivers/crypto/caam/caamalg_qi2.c | 4 ++--
> > > drivers/crypto/caam/caamhash.c | 4 ++--
> > > 2 files changed, 4 insertions(+), 4 deletions(-)
> > >
> > > diff --git a/drivers/crypto/caam/caamalg_qi2.c
> > > b/drivers/crypto/caam/caamalg_qi2.c
> > > index a148ff1f0872..93a400e286b4 100644
> > > --- a/drivers/crypto/caam/caamalg_qi2.c
> > > +++ b/drivers/crypto/caam/caamalg_qi2.c
> > > @@ -4571,7 +4571,7 @@ static int caam_hash_cra_init(struct crypto_tfm
> > > *tfm)
> > >
> > > ctx->dev = caam_hash->dev;
> > >
> > > - if (alg->setkey) {
> > > + if (crypto_hash_alg_has_setkey(halg)) {
> > > ctx->adata.key_dma = dma_map_single_attrs(ctx->dev, ctx->key,
> > > ARRAY_SIZE(ctx->key),
> > > DMA_TO_DEVICE,
> > > @@ -4611,7 +4611,7 @@ static int caam_hash_cra_init(struct crypto_tfm
> > *tfm)
> > > * For keyed hash algorithms shared descriptors
> > > * will be created later in setkey() callback
> > > */
> > > - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> > > + return crypto_hash_alg_has_setkey(halg) ? 0 :
> > > + ahash_set_sh_desc(ahash);
> > > }
> > >
> > > static void caam_hash_cra_exit(struct crypto_tfm *tfm) diff --git
> > > a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
> > > index 290c8500c247..4d50356b593c 100644
> > > --- a/drivers/crypto/caam/caamhash.c
> > > +++ b/drivers/crypto/caam/caamhash.c
> > > @@ -1804,7 +1804,7 @@ static int caam_hash_cra_init(struct crypto_tfm
> > *tfm)
> > > } else {
> > > if (priv->era >= 6) {
> > > ctx->dir = DMA_BIDIRECTIONAL;
> > > - ctx->key_dir = alg->setkey ? DMA_TO_DEVICE : DMA_NONE;
> > > + ctx->key_dir = crypto_hash_alg_has_setkey(halg)
> > > + ? DMA_TO_DEVICE : DMA_NONE;
> > > } else {
> > > ctx->dir = DMA_TO_DEVICE;
> > > ctx->key_dir = DMA_NONE; @@ -1862,7 +1862,7 @@
> > > static int caam_hash_cra_init(struct crypto_tfm *tfm)
> > > * For keyed hash algorithms shared descriptors
> > > * will be created later in setkey() callback
> > > */
> > > - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> > > + return crypto_hash_alg_has_setkey(halg) ? 0 :
> > > + ahash_set_sh_desc(ahash);
> > > }
> > >
> >
> > Thanks. Did you also consider putting something in struct caam_hash_alg (the
> > struct in which this driver embeds its ahash_alg structure) that indicates whether
> > the algorithm is an HMAC or not? Other drivers use that solution.
>
> Crypto/ahash.c has this API to check the setkey so I used to differentiate between HMAC & only hash.
> Let me know if this change is not sufficient, will add the flag in caam_hash_alg.
>
Currently crypto_hash_alg_has_setkey() isn't used outside of crypto/ahash.c.
Since there's an alternative that matches what the other drivers do, I think I'd
prefer that you did that. We can then make crypto_hash_alg_has_setkey() a
static function, private to crypto/ahash.c.
- Eric
^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
2024-01-18 3:43 ` Eric Biggers
@ 2024-01-18 9:28 ` Gaurav Jain
0 siblings, 0 replies; 5+ messages in thread
From: Gaurav Jain @ 2024-01-18 9:28 UTC (permalink / raw)
To: Eric Biggers
Cc: Herbert Xu, David S . Miller, Horia Geanta, Pankaj Gupta,
Varun Sethi, Meenakshi Aggarwal, Aisheng Dong, Silvano Di Ninno,
linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org,
dl-linux-imx
> -----Original Message-----
> From: Eric Biggers <ebiggers@kernel.org>
> Sent: Thursday, January 18, 2024 9:14 AM
> To: Gaurav Jain <gaurav.jain@nxp.com>
> Cc: Herbert Xu <herbert@gondor.apana.org.au>; David S . Miller
> <davem@davemloft.net>; Horia Geanta <horia.geanta@nxp.com>; Pankaj
> Gupta <pankaj.gupta@nxp.com>; Varun Sethi <V.Sethi@nxp.com>; Meenakshi
> Aggarwal <meenakshi.aggarwal@nxp.com>; Aisheng Dong
> <aisheng.dong@nxp.com>; Silvano Di Ninno <silvano.dininno@nxp.com>; linux-
> crypto@vger.kernel.org; linux-kernel@vger.kernel.org; dl-linux-imx <linux-
> imx@nxp.com>
> Subject: Re: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
>
> Caution: This is an external email. Please take care when clicking links or
> opening attachments. When in doubt, report the message using the 'Report this
> email' button
>
>
> On Wed, Jan 17, 2024 at 10:48:39AM +0000, Gaurav Jain wrote:
> >
> >
> > > -----Original Message-----
> > > From: Eric Biggers <ebiggers@kernel.org>
> > > Sent: Wednesday, January 17, 2024 10:03 AM
> > > To: Gaurav Jain <gaurav.jain@nxp.com>
> > > Cc: Herbert Xu <herbert@gondor.apana.org.au>; David S . Miller
> > > <davem@davemloft.net>; Horia Geanta <horia.geanta@nxp.com>; Pankaj
> > > Gupta <pankaj.gupta@nxp.com>; Varun Sethi <V.Sethi@nxp.com>;
> > > Meenakshi Aggarwal <meenakshi.aggarwal@nxp.com>; Aisheng Dong
> > > <aisheng.dong@nxp.com>; Silvano Di Ninno <silvano.dininno@nxp.com>;
> > > linux- crypto@vger.kernel.org; linux-kernel@vger.kernel.org;
> > > dl-linux-imx <linux- imx@nxp.com>
> > > Subject: [EXT] Re: [PATCH] crypto: caam/hash - fix asynchronous hash
> > >
> > > Caution: This is an external email. Please take care when clicking
> > > links or opening attachments. When in doubt, report the message
> > > using the 'Report this email' button
> > >
> > >
> > > On Tue, Jan 16, 2024 at 03:14:05PM +0530, Gaurav Jain wrote:
> > > > ahash_alg->setkey is updated to ahash_nosetkey in ahash.c so
> > > > updating the handling of setkey in caam driver.
> > > >
> > > > Fixes: 2f1f34c1bf7b ("crypto: ahash - optimize performance when
> > > > wrapping shash")
> > > > Signed-off-by: Gaurav Jain <gaurav.jain@nxp.com>
> > > > ---
> > > > drivers/crypto/caam/caamalg_qi2.c | 4 ++--
> > > > drivers/crypto/caam/caamhash.c | 4 ++--
> > > > 2 files changed, 4 insertions(+), 4 deletions(-)
> > > >
> > > > diff --git a/drivers/crypto/caam/caamalg_qi2.c
> > > > b/drivers/crypto/caam/caamalg_qi2.c
> > > > index a148ff1f0872..93a400e286b4 100644
> > > > --- a/drivers/crypto/caam/caamalg_qi2.c
> > > > +++ b/drivers/crypto/caam/caamalg_qi2.c
> > > > @@ -4571,7 +4571,7 @@ static int caam_hash_cra_init(struct
> > > > crypto_tfm
> > > > *tfm)
> > > >
> > > > ctx->dev = caam_hash->dev;
> > > >
> > > > - if (alg->setkey) {
> > > > + if (crypto_hash_alg_has_setkey(halg)) {
> > > > ctx->adata.key_dma = dma_map_single_attrs(ctx->dev, ctx->key,
> > > > ARRAY_SIZE(ctx->key),
> > > >
> > > > DMA_TO_DEVICE, @@ -4611,7 +4611,7 @@ static int
> > > > caam_hash_cra_init(struct crypto_tfm
> > > *tfm)
> > > > * For keyed hash algorithms shared descriptors
> > > > * will be created later in setkey() callback
> > > > */
> > > > - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> > > > + return crypto_hash_alg_has_setkey(halg) ? 0 :
> > > > + ahash_set_sh_desc(ahash);
> > > > }
> > > >
> > > > static void caam_hash_cra_exit(struct crypto_tfm *tfm) diff --git
> > > > a/drivers/crypto/caam/caamhash.c b/drivers/crypto/caam/caamhash.c
> > > > index 290c8500c247..4d50356b593c 100644
> > > > --- a/drivers/crypto/caam/caamhash.c
> > > > +++ b/drivers/crypto/caam/caamhash.c
> > > > @@ -1804,7 +1804,7 @@ static int caam_hash_cra_init(struct
> > > > crypto_tfm
> > > *tfm)
> > > > } else {
> > > > if (priv->era >= 6) {
> > > > ctx->dir = DMA_BIDIRECTIONAL;
> > > > - ctx->key_dir = alg->setkey ? DMA_TO_DEVICE : DMA_NONE;
> > > > + ctx->key_dir =
> > > > + crypto_hash_alg_has_setkey(halg) ? DMA_TO_DEVICE : DMA_NONE;
> > > > } else {
> > > > ctx->dir = DMA_TO_DEVICE;
> > > > ctx->key_dir = DMA_NONE; @@ -1862,7 +1862,7
> > > > @@ static int caam_hash_cra_init(struct crypto_tfm *tfm)
> > > > * For keyed hash algorithms shared descriptors
> > > > * will be created later in setkey() callback
> > > > */
> > > > - return alg->setkey ? 0 : ahash_set_sh_desc(ahash);
> > > > + return crypto_hash_alg_has_setkey(halg) ? 0 :
> > > > + ahash_set_sh_desc(ahash);
> > > > }
> > > >
> > >
> > > Thanks. Did you also consider putting something in struct
> > > caam_hash_alg (the struct in which this driver embeds its ahash_alg
> > > structure) that indicates whether the algorithm is an HMAC or not? Other
> drivers use that solution.
> >
> > Crypto/ahash.c has this API to check the setkey so I used to differentiate
> between HMAC & only hash.
> > Let me know if this change is not sufficient, will add the flag in caam_hash_alg.
> >
>
> Currently crypto_hash_alg_has_setkey() isn't used outside of crypto/ahash.c.
> Since there's an alternative that matches what the other drivers do, I think I'd
> prefer that you did that. We can then make crypto_hash_alg_has_setkey() a
> static function, private to crypto/ahash.c.
Understood. Changes done in v2.
Thanks
Gaurav
>
> - Eric
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2024-01-18 9:28 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-01-16 9:44 [PATCH] crypto: caam/hash - fix asynchronous hash Gaurav Jain
2024-01-17 4:33 ` Eric Biggers
2024-01-17 10:48 ` [EXT] " Gaurav Jain
2024-01-18 3:43 ` Eric Biggers
2024-01-18 9:28 ` Gaurav Jain
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).