Hi Pascal,
On Fri, Jul 05, 2019 at 08:49:22AM +0200, Pascal van Leeuwen wrote:
> Signed-off-by: Pascal van Leeuwen <[email protected]>
Could you provide a commit message, explaining briefly what the patch is
doing?
> @@ -199,6 +201,15 @@ static int safexcel_aead_aes_setkey(struct crypto_aead
> *ctfm, const u8 *key,
> goto badkey;
>
> /* Encryption key */
> + if (ctx->alg == SAFEXCEL_3DES) {
> + flags = crypto_aead_get_flags(ctfm);
> + err = __des3_verify_key(&flags, keys.enckey);
> + crypto_aead_set_flags(ctfm, flags);
You could use directly des3_verify_key() which does exactly this.
> +struct safexcel_alg_template safexcel_alg_authenc_hmac_sha1_cbc_des3_ede = {
> + .type = SAFEXCEL_ALG_TYPE_AEAD,
You either missed to fill .engines member of this struct, or this series
is based on another one not merged yet.
> + .alg.aead = {
> + .setkey = safexcel_aead_setkey,
> + .encrypt = safexcel_aead_encrypt_3des,
> + .decrypt = safexcel_aead_decrypt_3des,
> + .ivsize = DES3_EDE_BLOCK_SIZE,
> + .maxauthsize = SHA1_DIGEST_SIZE,
> + .base = {
> + .cra_name = "authenc(hmac(sha1),cbc(des3_ede))",
> + .cra_driver_name =
> "safexcel-authenc-hmac-sha1-cbc-des3_ede",
You could drop "_ede" here, or s/_/-/.
Apart from those small comments, the patch looks good.
Thanks!
Antoine
--
Antoine Ténart, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com