RE: [PATCH 2/3] crypto: engine - find request type with cra_type

From: Fabien DESSENNE
Date: Tue Aug 15 2017 - 03:51:36 EST


Hi Corentin,

Since I have just sent a patch to add the support of "aead_request" to crypto engine, I am wondering if your proposed change (checking cra_type instead of crypto_tfm_alg_type) and mine are compatible.
It looks like they are (assuming we export crypto_aead_type): can you confirm?
BR

Fabien.

>-----Original Message-----
>From: linux-crypto-owner@xxxxxxxxxxxxxxx [mailto:linux-crypto-
>owner@xxxxxxxxxxxxxxx] On Behalf Of Corentin Labbe
>Sent: lundi 14 août 2017 15:17
>To: herbert@xxxxxxxxxxxxxxxxxxx; davem@xxxxxxxxxxxxx
>Cc: linux-crypto@xxxxxxxxxxxxxxx; linux-kernel@xxxxxxxxxxxxxxx; Corentin Labbe
><clabbe.montjoie@xxxxxxxxx>
>Subject: [PATCH 2/3] crypto: engine - find request type with cra_type
>
>The current method for finding request type is based on crypto_tfm_alg_type.
>
>But in case of skcipher, it is the same than ablkcipher.
>Using cra_type for this work permits to make the distinction between the two.
>
>Signed-off-by: Corentin Labbe <clabbe.montjoie@xxxxxxxxx>
>---
> crypto/crypto_engine.c | 19 ++++++++-----------
> 1 file changed, 8 insertions(+), 11 deletions(-)
>
>diff --git a/crypto/crypto_engine.c b/crypto/crypto_engine.c index
>61e7c4e02fd2..74b840749074 100644
>--- a/crypto/crypto_engine.c
>+++ b/crypto/crypto_engine.c
>@@ -38,7 +38,8 @@ static void crypto_pump_requests(struct crypto_engine
>*engine,
> struct ablkcipher_request *breq;
> unsigned long flags;
> bool was_busy = false;
>- int ret, rtype;
>+ int ret;
>+ const struct crypto_type *cratype;
>
> spin_lock_irqsave(&engine->queue_lock, flags);
>
>@@ -94,7 +95,7 @@ static void crypto_pump_requests(struct crypto_engine
>*engine,
>
> spin_unlock_irqrestore(&engine->queue_lock, flags);
>
>- rtype = crypto_tfm_alg_type(engine->cur_req->tfm);
>+ cratype = engine->cur_req->tfm->__crt_alg->cra_type;
> /* Until here we get the request need to be encrypted successfully */
> if (!was_busy && engine->prepare_crypt_hardware) {
> ret = engine->prepare_crypt_hardware(engine);
>@@ -104,8 +105,7 @@ static void crypto_pump_requests(struct crypto_engine
>*engine,
> }
> }
>
>- switch (rtype) {
>- case CRYPTO_ALG_TYPE_AHASH:
>+ if (cratype == &crypto_ahash_type) {
> hreq = ahash_request_cast(engine->cur_req);
> if (engine->prepare_hash_request) {
> ret = engine->prepare_hash_request(engine, hreq); @@
>-122,7 +122,7 @@ static void crypto_pump_requests(struct crypto_engine
>*engine,
> goto req_err;
> }
> return;
>- case CRYPTO_ALG_TYPE_ABLKCIPHER:
>+ } else if (cratype == &crypto_ablkcipher_type) {
> breq = ablkcipher_request_cast(engine->cur_req);
> if (engine->prepare_cipher_request) {
> ret = engine->prepare_cipher_request(engine, breq);
>@@ -139,21 +139,18 @@ static void crypto_pump_requests(struct
>crypto_engine *engine,
> goto req_err;
> }
> return;
>- default:
>+ } else {
> dev_err(engine->dev, "failed to prepare request of unknown
>type\n");
> return;
> }
>
> req_err:
>- switch (rtype) {
>- case CRYPTO_ALG_TYPE_AHASH:
>+ if (cratype == &crypto_ahash_type) {
> hreq = ahash_request_cast(engine->cur_req);
> crypto_finalize_hash_request(engine, hreq, ret);
>- break;
>- case CRYPTO_ALG_TYPE_ABLKCIPHER:
>+ } else if (cratype == &crypto_ablkcipher_type) {
> breq = ablkcipher_request_cast(engine->cur_req);
> crypto_finalize_cipher_request(engine, breq, ret);
>- break;
> }
> return;
>
>--
>2.13.0