On Wed, 2005-02-02 at 17:46 -0500, James Morris wrote:

> This code tests ok with IPSec, and delivers some good performance
> improvements.  e.g. FTP transfers over transport mode AES over GigE sped
> up with this patch applied on one side of the connection by 20% for send
> and 15% for receive.
>
> There are quite a few coding style and minor issues to be fixed (per
> below), and the code should probably then be tested in the -mm tree for a
> while (2.6.11 is too soon for mainline merge).

Fixed formating and white-spaces. The biggest change is, that I stripped
a redundant check from scatterwalk.c. This omission seems justified and
shows no regression on my system. ( http://lkml.org/lkml/2005/2/3/87 )
Can you give it a quick test with ipsec anyhow? Just to make sure.

http://clemens.endorphin.org/interdiff-sw.diff is an interdiff to last patch
posted, to ease the work of any reviewers. Mostly whitespace changes..

Outlook for the next patches: tweakable cipher modes interface, LRW
core, Michal's multiblock rewrite. Fortunately, none of them is as
intruding as the scatterwalk change.

Signed-off-by: Fruhwirth Clemens <[EMAIL PROTECTED]>

--- 1/crypto/cipher.c   2005-01-20 10:15:40.000000000 +0100
+++ 2/crypto/cipher.c   2005-02-05 09:52:30.000000000 +0100
@@ -22,7 +22,7 @@
 
 typedef void (cryptfn_t)(void *, u8 *, const u8 *);
 typedef void (procfn_t)(struct crypto_tfm *, u8 *,
-                        u8*, cryptfn_t, int enc, void *, int);
+                       u8*, cryptfn_t, int enc, void *, int);
 
 static inline void xor_64(u8 *a, const u8 *b)
 {
@@ -38,177 +38,219 @@
        ((u32 *)a)[3] ^= ((u32 *)b)[3];
 }
 
+static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen)
+{
+       struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher;
+       
+       if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) {
+               tfm->crt_flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
+               return -EINVAL;
+       } else
+               return cia->cia_setkey(crypto_tfm_ctx(tfm), key, keylen,
+                                      &tfm->crt_flags);
+}
 
 /* 
- * Generic encrypt/decrypt wrapper for ciphers, handles operations across
- * multiple page boundaries by using temporary blocks.  In user context,
- * the kernel is given a chance to schedule us once per block.
+ * Electronic Code Book (ECB) mode implementation 
  */
-static int crypt(struct crypto_tfm *tfm,
-                struct scatterlist *dst,
-                struct scatterlist *src,
-                 unsigned int nbytes, cryptfn_t crfn,
-                 procfn_t prfn, int enc, void *info)
-{
-       struct scatter_walk walk_in, walk_out;
-       const unsigned int bsize = crypto_tfm_alg_blocksize(tfm);
-       u8 tmp_src[bsize];
-       u8 tmp_dst[bsize];
+
+struct ecb_process_priv {
+       struct crypto_tfm       *tfm;
+       cryptfn_t               *crfn;
+};
+
+static int ecb_process_gw(void *priv, int nsg, void **buf) 
+{
+       struct ecb_process_priv *ecb_priv = priv;
+       ecb_priv->crfn(crypto_tfm_ctx(ecb_priv->tfm), buf[0], buf[1]);
+       return 0;
+}
+
+static inline int ecb_template(struct crypto_tfm *tfm,
+                              struct scatterlist *dst,
+                              struct scatterlist *src, unsigned int nbytes, 
cryptfn_t crfn)
+{
+       int bsize = crypto_tfm_alg_blocksize(tfm);
+
+       struct ecb_process_priv priv = { 
+               .tfm = tfm,
+               .crfn = crfn,
+       };
+
+       struct walk_info ecb_info[3];
+
+       scatterwalk_info_init(ecb_info+0, dst, bsize, (char[bsize]){}, 
+                             SCATTERWALK_IO_OUTPUT);
+       scatterwalk_info_init(ecb_info+1, src, bsize, (char[bsize]){}, 
+                             SCATTERWALK_IO_INPUT);
+       scatterwalk_info_endtag(ecb_info+2);
 
        if (!nbytes)
                return 0;
-
        if (nbytes % bsize) {
                tfm->crt_flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN;
                return -EINVAL;
        }
 
-       scatterwalk_start(&walk_in, src);
-       scatterwalk_start(&walk_out, dst);
-
-       for(;;) {
-               u8 *src_p, *dst_p;
-               int in_place;
-
-               scatterwalk_map(&walk_in, 0);
-               scatterwalk_map(&walk_out, 1);
-               src_p = scatterwalk_whichbuf(&walk_in, bsize, tmp_src);
-               dst_p = scatterwalk_whichbuf(&walk_out, bsize, tmp_dst);
-               in_place = scatterwalk_samebuf(&walk_in, &walk_out,
-                                              src_p, dst_p);
-
-               nbytes -= bsize;
-
-               scatterwalk_copychunks(src_p, &walk_in, bsize, 0);
-
-               prfn(tfm, dst_p, src_p, crfn, enc, info, in_place);
-
-               scatterwalk_done(&walk_in, 0, nbytes);
-
-               scatterwalk_copychunks(dst_p, &walk_out, bsize, 1);
-               scatterwalk_done(&walk_out, 1, nbytes);
-
-               if (!nbytes)
-                       return 0;
+       return scatterwalk_walk(ecb_process_gw, &priv, nbytes/bsize, ecb_info);
+}
 
-               crypto_yield(tfm);
-       }
+static int ecb_encrypt(struct crypto_tfm *tfm,
+                      struct scatterlist *dst,
+                      struct scatterlist *src,
+                      unsigned int nbytes)
+{
+       return 
ecb_template(tfm,dst,src,nbytes,tfm->__crt_alg->cra_cipher.cia_encrypt);
 }
 
-static void cbc_process(struct crypto_tfm *tfm, u8 *dst, u8 *src,
-                       cryptfn_t fn, int enc, void *info, int in_place)
+static int ecb_decrypt(struct crypto_tfm *tfm,
+                      struct scatterlist *dst,
+                      struct scatterlist *src,
+                      unsigned int nbytes)
 {
-       u8 *iv = info;
+       return 
ecb_template(tfm,dst,src,nbytes,tfm->__crt_alg->cra_cipher.cia_decrypt);
+}
+
+/* Cipher Block Chaining (CBC) mode implementation */
+
+struct cbc_process_priv {
+       struct crypto_tfm *tfm;
+       int enc;
+       cryptfn_t *crfn;
+       u8 *curr_iv;
+       u8 *next_iv;
+};
+
+static int cbc_process_gw(void *priv, int nsg, void **buf) 
+{
+       struct cbc_process_priv *cbc_priv = priv;
+       u8 *iv = cbc_priv->curr_iv;
+       struct crypto_tfm *tfm = cbc_priv->tfm;
+       int bsize = crypto_tfm_alg_blocksize(tfm);
+       u8 *dst = buf[0];
+       u8 *src = buf[1];
        
        /* Null encryption */
        if (!iv)
-               return;
-               
-       if (enc) {
+               return 0;
+
+       if (cbc_priv->enc == CRYPTO_DIR_ENCRYPT) {
+               /* Encryption can be done in place */
                tfm->crt_u.cipher.cit_xor_block(iv, src);
-               fn(crypto_tfm_ctx(tfm), dst, iv);
-               memcpy(iv, dst, crypto_tfm_alg_blocksize(tfm));
+               cbc_priv->crfn(crypto_tfm_ctx(tfm), dst, iv);
+               memcpy(iv, dst, bsize);
        } else {
-               u8 stack[in_place ? crypto_tfm_alg_blocksize(tfm) : 0];
-               u8 *buf = in_place ? stack : dst;
-
-               fn(crypto_tfm_ctx(tfm), buf, src);
-               tfm->crt_u.cipher.cit_xor_block(buf, iv);
-               memcpy(iv, src, crypto_tfm_alg_blocksize(tfm));
-               if (buf != dst)
-                       memcpy(dst, buf, crypto_tfm_alg_blocksize(tfm));
+               /* Current cipher text in "src" needs to be saved, as
+                * it's going to be the next iv, exchange IV buffers
+                * after processing
+                */
+               memcpy(cbc_priv->next_iv,src,bsize);
+               cbc_priv->crfn(crypto_tfm_ctx(tfm), dst, src);
+               tfm->crt_u.cipher.cit_xor_block(dst, iv);
+               cbc_priv->curr_iv = cbc_priv->next_iv;
+               cbc_priv->next_iv = iv;
        }
+       return 0;
 }
 
-static void ecb_process(struct crypto_tfm *tfm, u8 *dst, u8 *src,
-                       cryptfn_t fn, int enc, void *info, int in_place)
-{
-       fn(crypto_tfm_ctx(tfm), dst, src);
-}
 
-static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen)
-{
-       struct cipher_alg *cia = &tfm->__crt_alg->cra_cipher;
-       
-       if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) {
-               tfm->crt_flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
+static int cbc_encrypt_iv(struct crypto_tfm *tfm,
+                         struct scatterlist *dst,
+                         struct scatterlist *src,
+                         unsigned int nbytes, u8 *iv)
+{
+       int bsize = crypto_tfm_alg_blocksize(tfm);
+
+       struct cbc_process_priv priv = {
+               .tfm = tfm,
+               .enc = CRYPTO_DIR_ENCRYPT,
+               .curr_iv = iv,
+               .crfn = tfm->__crt_alg->cra_cipher.cia_encrypt
+       };
+
+       struct walk_info cbc_info[3];
+
+       if (!nbytes)
+               return 0;
+       if (nbytes % bsize) {
+               tfm->crt_flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN;
                return -EINVAL;
-       } else
-               return cia->cia_setkey(crypto_tfm_ctx(tfm), key, keylen,
-                                      &tfm->crt_flags);
-}
+       }
 
-static int ecb_encrypt(struct crypto_tfm *tfm,
-                      struct scatterlist *dst,
-                       struct scatterlist *src, unsigned int nbytes)
-{
-       return crypt(tfm, dst, src, nbytes,
-                    tfm->__crt_alg->cra_cipher.cia_encrypt,
-                    ecb_process, 1, NULL);
-}
+       scatterwalk_info_init(cbc_info+0, dst, bsize, (char[bsize]){}, 
+                             SCATTERWALK_IO_OUTPUT);
+       scatterwalk_info_init(cbc_info+1, src, bsize, (char[bsize]){}, 
+                             SCATTERWALK_IO_INPUT); 
+       scatterwalk_info_endtag(cbc_info+2);
 
-static int ecb_decrypt(struct crypto_tfm *tfm,
-                       struct scatterlist *dst,
-                       struct scatterlist *src,
-                      unsigned int nbytes)
-{
-       return crypt(tfm, dst, src, nbytes,
-                    tfm->__crt_alg->cra_cipher.cia_decrypt,
-                    ecb_process, 1, NULL);
+       return scatterwalk_walk(cbc_process_gw, &priv, nbytes/bsize, cbc_info);
 }
 
-static int cbc_encrypt(struct crypto_tfm *tfm,
-                       struct scatterlist *dst,
-                       struct scatterlist *src,
-                      unsigned int nbytes)
-{
-       return crypt(tfm, dst, src, nbytes,
-                    tfm->__crt_alg->cra_cipher.cia_encrypt,
-                    cbc_process, 1, tfm->crt_cipher.cit_iv);
-}
+static int cbc_decrypt_iv(struct crypto_tfm *tfm,
+                         struct scatterlist *dst,
+                         struct scatterlist *src,
+                         unsigned int nbytes, u8 *iv)
+{
+       int bsize = crypto_tfm_alg_blocksize(tfm);
+       int r = -EINVAL;
+
+       char scratch1[bsize]; 
+
+       struct cbc_process_priv priv = {
+               .tfm = tfm,
+               .enc = CRYPTO_DIR_DECRYPT,
+               .curr_iv = iv,
+               .next_iv = scratch1,
+               .crfn = tfm->__crt_alg->cra_cipher.cia_decrypt,
+       };
+       struct walk_info cbc_info[3];
 
-static int cbc_encrypt_iv(struct crypto_tfm *tfm,
-                          struct scatterlist *dst,
-                          struct scatterlist *src,
-                          unsigned int nbytes, u8 *iv)
-{
-       return crypt(tfm, dst, src, nbytes,
-                    tfm->__crt_alg->cra_cipher.cia_encrypt,
-                    cbc_process, 1, iv);
+       if (!nbytes)
+               return 0;
+       if (nbytes % bsize) {
+               tfm->crt_flags |= CRYPTO_TFM_RES_BAD_BLOCK_LEN;
+               return -EINVAL;
+       }
+
+       scatterwalk_info_init(cbc_info+0, dst, bsize, (char[bsize]){}, 
SCATTERWALK_IO_OUTPUT);
+       scatterwalk_info_init(cbc_info+1, src, bsize, (char[bsize]){}, 
SCATTERWALK_IO_INPUT);
+       scatterwalk_info_endtag(cbc_info+2);
+
+       r = scatterwalk_walk(cbc_process_gw, &priv, nbytes/bsize, cbc_info);
+
+       if (priv.curr_iv != iv) 
+               memcpy(iv,priv.curr_iv,bsize);
+       return r;
 }
 
 static int cbc_decrypt(struct crypto_tfm *tfm,
-                       struct scatterlist *dst,
-                       struct scatterlist *src,
+                      struct scatterlist *dst,
+                      struct scatterlist *src,
                       unsigned int nbytes)
 {
-       return crypt(tfm, dst, src, nbytes,
-                    tfm->__crt_alg->cra_cipher.cia_decrypt,
-                    cbc_process, 0, tfm->crt_cipher.cit_iv);
+       return cbc_decrypt_iv(tfm, dst, src, nbytes, tfm->crt_cipher.cit_iv);
 }
 
-static int cbc_decrypt_iv(struct crypto_tfm *tfm,
-                          struct scatterlist *dst,
-                          struct scatterlist *src,
-                          unsigned int nbytes, u8 *iv)
-{
-       return crypt(tfm, dst, src, nbytes,
-                    tfm->__crt_alg->cra_cipher.cia_decrypt,
-                    cbc_process, 0, iv);
+static int cbc_encrypt(struct crypto_tfm *tfm,
+                      struct scatterlist *dst,
+                      struct scatterlist *src,
+                      unsigned int nbytes)
+{
+       return cbc_encrypt_iv(tfm, dst, src, nbytes, tfm->crt_cipher.cit_iv);
 }
 
 static int nocrypt(struct crypto_tfm *tfm,
-                   struct scatterlist *dst,
-                   struct scatterlist *src,
+                  struct scatterlist *dst,
+                  struct scatterlist *src,
                   unsigned int nbytes)
 {
        return -ENOSYS;
 }
 
 static int nocrypt_iv(struct crypto_tfm *tfm,
-                      struct scatterlist *dst,
-                      struct scatterlist *src,
-                      unsigned int nbytes, u8 *iv)
+                     struct scatterlist *dst,
+                     struct scatterlist *src,
+                     unsigned int nbytes, u8 *iv)
 {
        return -ENOSYS;
 }
@@ -263,26 +305,26 @@
        }
        
        if (ops->cit_mode == CRYPTO_TFM_MODE_CBC) {
-               
-               switch (crypto_tfm_alg_blocksize(tfm)) {
-               case 8:
-                       ops->cit_xor_block = xor_64;
-                       break;
-                       
-               case 16:
-                       ops->cit_xor_block = xor_128;
-                       break;
-                       
-               default:
-                       printk(KERN_WARNING "%s: block size %u not supported\n",
-                              crypto_tfm_alg_name(tfm),
-                              crypto_tfm_alg_blocksize(tfm));
-                       ret = -EINVAL;
-                       goto out;
-               }
-               
+               
+               switch (crypto_tfm_alg_blocksize(tfm)) {
+               case 8:
+                       ops->cit_xor_block = xor_64;
+                       break;
+                       
+               case 16:
+                       ops->cit_xor_block = xor_128;
+                       break;
+                       
+               default:
+                       printk(KERN_WARNING "%s: block size %u not supported\n",
+                              crypto_tfm_alg_name(tfm),
+                              crypto_tfm_alg_blocksize(tfm));
+                       ret = -EINVAL;
+                       goto out;
+               }
+               
                ops->cit_ivsize = crypto_tfm_alg_blocksize(tfm);
-               ops->cit_iv = kmalloc(ops->cit_ivsize, GFP_KERNEL);
+               ops->cit_iv = kmalloc(ops->cit_ivsize, GFP_KERNEL);
                if (ops->cit_iv == NULL)
                        ret = -ENOMEM;
        }
--- 1/crypto/scatterwalk.h      2005-01-20 10:15:40.000000000 +0100
+++ 2/crypto/scatterwalk.h      2005-02-03 10:07:57.000000000 +0100
@@ -4,6 +4,7 @@
  * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]>
  * Copyright (c) 2002 Adam J. Richter <[EMAIL PROTECTED]>
  * Copyright (c) 2004 Jean-Luc Cooke <[EMAIL PROTECTED]>
+ * Copyright (c) 2005 Clemens Fruhwirth <[EMAIL PROTECTED]>
  *
  * This program is free software; you can redistribute it and/or modify it
  * under the terms of the GNU General Public License as published by the Free
@@ -16,6 +17,7 @@
 #define _CRYPTO_SCATTERWALK_H
 #include <linux/mm.h>
 #include <asm/scatterlist.h>
+#include <linux/pagemap.h>
 
 struct scatter_walk {
        struct scatterlist      *sg;
@@ -26,6 +28,16 @@
        unsigned int            offset;
 };
 
+struct walk_info {
+       struct scatter_walk   sw;
+       int                   stepsize;
+       int                   ioflag;
+       char                  *buf;
+};
+
+#define SCATTERWALK_IO_OUTPUT  1
+#define SCATTERWALK_IO_INPUT   0
+
 /* Define sg_next is an inline routine now in case we want to change
    scatterlist to a linked list later. */
 static inline struct scatterlist *sg_next(struct scatterlist *sg)
@@ -33,19 +45,13 @@
        return sg + 1;
 }
 
-static inline int scatterwalk_samebuf(struct scatter_walk *walk_in,
-                                     struct scatter_walk *walk_out,
-                                     void *src_p, void *dst_p)
-{
-       return walk_in->page == walk_out->page &&
-              walk_in->offset == walk_out->offset &&
-              walk_in->data == src_p && walk_out->data == dst_p;
-}
+typedef int (*sw_proc_func_t)(void *priv, int length, void **buflist);
+
+int scatterwalk_walk(sw_proc_func_t function, void *priv, int steps, struct 
walk_info *walk_info_l);
+
+#define scatterwalk_info_endtag(winfo) (winfo)->sw.sg = NULL;
+
+void scatterwalk_info_init(struct walk_info *winfo, struct scatterlist *sg, 
int stepsize, void *buf, int io);
 
-void *scatterwalk_whichbuf(struct scatter_walk *walk, unsigned int nbytes, 
void *scratch);
-void scatterwalk_start(struct scatter_walk *walk, struct scatterlist *sg);
-int scatterwalk_copychunks(void *buf, struct scatter_walk *walk, size_t 
nbytes, int out);
-void scatterwalk_map(struct scatter_walk *walk, int out);
-void scatterwalk_done(struct scatter_walk *walk, int out, int more);
 
 #endif  /* _CRYPTO_SCATTERWALK_H */
--- 1/crypto/scatterwalk.c      2005-01-20 10:15:40.000000000 +0100
+++ 2/crypto/scatterwalk.c      2005-02-05 00:14:28.000000000 +0100
@@ -6,6 +6,7 @@
  * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]>
  *               2002 Adam J. Richter <[EMAIL PROTECTED]>
  *               2004 Jean-Luc Cooke <[EMAIL PROTECTED]>
+ *               2005 Clemens Fruhwirth <[EMAIL PROTECTED]>
  *
  * This program is free software; you can redistribute it and/or modify it
  * under the terms of the GNU General Public License as published by the Free
@@ -28,17 +29,7 @@
        KM_SOFTIRQ1,
 };
 
-void *scatterwalk_whichbuf(struct scatter_walk *walk, unsigned int nbytes, 
void *scratch)
-{
-       if (nbytes <= walk->len_this_page &&
-           (((unsigned long)walk->data) & (PAGE_CACHE_SIZE - 1)) + nbytes <=
-           PAGE_CACHE_SIZE)
-               return walk->data;
-       else
-               return scratch;
-}
-
-static void memcpy_dir(void *buf, void *sgdata, size_t nbytes, int out)
+static inline void memcpy_dir(void *buf, void *sgdata, size_t nbytes, int out)
 {
        if (out)
                memcpy(sgdata, buf, nbytes);
@@ -46,7 +37,12 @@
                memcpy(buf, sgdata, nbytes);
 }
 
-void scatterwalk_start(struct scatter_walk *walk, struct scatterlist *sg)
+static inline int scatterwalk_needscratch(struct scatter_walk *walk, int 
nbytes) 
+{
+       return (nbytes <= walk->len_this_page);
+}
+
+static inline void scatterwalk_start(struct scatter_walk *walk, struct 
scatterlist *sg)
 {
        unsigned int rest_of_page;
 
@@ -60,12 +56,19 @@
        walk->offset = sg->offset;
 }
 
-void scatterwalk_map(struct scatter_walk *walk, int out)
+void scatterwalk_info_init(struct walk_info *winfo, struct scatterlist *sg, 
+                          int stepsize, void *buf, int io)
 {
-       walk->data = crypto_kmap(walk->page, out) + walk->offset;
+       scatterwalk_start(&winfo->sw, sg);
+       winfo->stepsize = stepsize;
+       winfo->ioflag = io;
+       winfo->buf = buf;
 }
 
-static void scatterwalk_pagedone(struct scatter_walk *walk, int out,
+#define scatterwalk_map(walk,out) \
+       (walk)->data = crypto_kmap((walk)->page, (out)) + (walk)->offset; 
+
+static inline void scatterwalk_pagedone(struct scatter_walk *walk, int out,
                                 unsigned int more)
 {
        /* walk->data may be pointing the first byte of the next page;
@@ -89,36 +92,103 @@
        }
 }
 
-void scatterwalk_done(struct scatter_walk *walk, int out, int more)
-{
-       crypto_kunmap(walk->data, out);
-       if (walk->len_this_page == 0 || !more)
-               scatterwalk_pagedone(walk, out, more);
-}
-
-/*
- * Do not call this unless the total length of all of the fragments
- * has been verified as multiple of the block size.
- */
-int scatterwalk_copychunks(void *buf, struct scatter_walk *walk,
-                          size_t nbytes, int out)
+static inline void scatterwalk_copychunks(void *buf, struct scatter_walk *walk,
+                           size_t nbytes, int out)
 {
        if (buf != walk->data) {
                while (nbytes > walk->len_this_page) {
-                       memcpy_dir(buf, walk->data, walk->len_this_page, out);
-                       buf += walk->len_this_page;
-                       nbytes -= walk->len_this_page;
-
+                       if (walk->len_this_page) {
+                               memcpy_dir(buf, walk->data, 
walk->len_this_page, out);
+                               buf += walk->len_this_page;
+                               nbytes -= walk->len_this_page;
+                       }
                        crypto_kunmap(walk->data, out);
-                       scatterwalk_pagedone(walk, out, 1);
+                       scatterwalk_pagedone(walk, 
+                                            out, 
+                                            1); /* more processing steps */
                        scatterwalk_map(walk, out);
                }
-
                memcpy_dir(buf, walk->data, nbytes, out);
        }
-
+       walk->data += nbytes;
        walk->offset += nbytes;
        walk->len_this_page -= nbytes;
        walk->len_this_segment -= nbytes;
-       return 0;
+}
+
+/*  
+ * The generic scatterwalker can manipulate data associated with one
+ * or more scatterlist with a processing function, pf. It's purpose is
+ * to hide the mapping, unalignment and page switching logic.
+ * 
+ * The generic scatterwalker applies a certain function, pf, utilising
+ * an arbitrary number of scatterlist data as it's arguments. These
+ * arguments are supplied as an array of pointers to buffers. These
+ * buffers are prepared and processed block-wise by the function
+ * (stepsize) and might be input or output buffers.
+ *
+ * All this informations and the underlaying scatterlist is handed to
+ * the generic walker as an array of descriptors of type
+ * walk_info. The sg, stepsize, ioflag and buf field of this struct
+ * must be initialised.
+ *
+ * The sg field points to the scatterlist the function should work on,
+ * the stepsize is the number of successive bytes that should be
+ * handed to the function, ioflag denotes input or output scatterlist
+ * and the buf field is either null, or points to a stepsize-width
+ * byte block, which can be used as copy buffer, when the stepsize
+ * does not align with page or scatterlist boundaries.
+ *
+ * A list of buffers are compiled and handed to the function, as char
+ * **buf, with buf[0] corresponds to the first walk_info descriptor,
+ * buf[1] to the second, and so on. The function is also handed a priv
+ * object, which does not change. Think of it as a "this" object, to
+ * collect/store processing information.
+ */
+
+int scatterwalk_walk(sw_proc_func_t pf, void *priv, int steps,
+                    struct walk_info *walk_infos) 
+{
+       int r = -EINVAL;
+       
+       int i;
+
+       struct walk_info *csg;
+       int nsl = 0;
+
+       void **cbuf;
+       void **dispatch_list;
+
+       for (csg = walk_infos; csg->sw.sg; csg++) {
+               scatterwalk_map(&csg->sw, csg->ioflag);
+               nsl++;
+       }
+
+       dispatch_list = (void *[nsl]){}; /* This alien thing is a C99 compound 
literal */
+
+       while (steps--) {
+               for (csg = walk_infos, cbuf = dispatch_list; csg->sw.sg; i--, 
csg++, cbuf++) {
+                       *cbuf = 
scatterwalk_needscratch(&csg->sw,csg->stepsize)?csg->sw.data:csg->buf;
+
+                       if (csg->ioflag == 0)
+                               
scatterwalk_copychunks(*cbuf,&csg->sw,csg->stepsize,0);
+               }
+
+               r = pf(priv, nsl, dispatch_list);
+               if (unlikely(r < 0))
+                       goto out;
+
+               for (csg = walk_infos, cbuf = dispatch_list; csg->sw.sg; csg++, 
cbuf++) {       
+                       if (csg->ioflag == 1) 
+                               
scatterwalk_copychunks(*cbuf,&csg->sw,csg->stepsize,1);
+               }
+       }
+
+       r = 0;
+out:
+       for (csg = walk_infos; csg->sw.sg; csg++) {
+               crypto_kunmap(csg->sw.data, csg->ioflag);
+               scatterwalk_pagedone(&csg->sw, csg->ioflag, 0);
+       }
+       return r;
 }
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to