Hi Pascal,

On Fri, Jul 05, 2019 at 08:49:22AM +0200, Pascal van Leeuwen wrote:
> Signed-off-by: Pascal van Leeuwen <[email protected]>

Could you provide a commit message, explaining briefly what the patch is
doing?

> @@ -199,6 +201,15 @@ static int safexcel_aead_aes_setkey(struct crypto_aead 
> *ctfm, const u8 *key,
>               goto badkey;
>  
>       /* Encryption key */
> +     if (ctx->alg == SAFEXCEL_3DES) {
> +             flags = crypto_aead_get_flags(ctfm);
> +             err = __des3_verify_key(&flags, keys.enckey);
> +             crypto_aead_set_flags(ctfm, flags);

You could use directly des3_verify_key() which does exactly this.

> +struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_des3_ede = {
> +     .type = SAFEXCEL_ALG_TYPE_AEAD,

You either missed to fill .engines member of this struct, or this series
is based on another one not merged yet.

> +     .alg.aead = {
> +             .setkey = safexcel_aead_setkey,
> +             .encrypt = safexcel_aead_encrypt_3des,
> +             .decrypt = safexcel_aead_decrypt_3des,
> +             .ivsize = DES3_EDE_BLOCK_SIZE,
> +             .maxauthsize = SHA1_DIGEST_SIZE,
> +             .base = {
> +                     .cra_name = "authenc(hmac(sha1),cbc(des3_ede))",
> +                     .cra_driver_name = 
> "safexcel-authenc-hmac-sha1-cbc-des3_ede",

You could drop "_ede" here, or s/_/-/.

Apart from those small comments, the patch looks good.

Thanks!
Antoine

-- 
Antoine Ténart, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

Reply via email to