mirror of https://gitee.com/openkylin/linux.git
staging: ccree: Fix alignment issues in ssi_cipher.c
Fixes checkpatch.pl alignment warnings. Signed-off-by: Simon Sandström <simon@nikanor.nu> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
5dff9f5e69
commit
22aa4c93ee
|
@ -93,8 +93,7 @@ static int validate_keys_sizes(struct ssi_ablkcipher_ctx *ctx_p, u32 size)
|
|||
break;
|
||||
}
|
||||
case S_DIN_to_DES:
|
||||
if (likely(size == DES3_EDE_KEY_SIZE ||
|
||||
size == DES_KEY_SIZE))
|
||||
if (likely(size == DES3_EDE_KEY_SIZE || size == DES_KEY_SIZE))
|
||||
return 0;
|
||||
break;
|
||||
#if SSI_CC_HAS_MULTI2
|
||||
|
@ -185,8 +184,8 @@ static int ssi_blkcipher_init(struct crypto_tfm *tfm)
|
|||
int rc = 0;
|
||||
unsigned int max_key_buf_size = get_max_keysize(tfm);
|
||||
|
||||
SSI_LOG_DEBUG("Initializing context @%p for %s\n", ctx_p,
|
||||
crypto_tfm_alg_name(tfm));
|
||||
SSI_LOG_DEBUG("Initializing context @%p for %s\n",
|
||||
ctx_p, crypto_tfm_alg_name(tfm));
|
||||
|
||||
ctx_p->cipher_mode = ssi_alg->cipher_mode;
|
||||
ctx_p->flow_mode = ssi_alg->flow_mode;
|
||||
|
@ -207,12 +206,12 @@ static int ssi_blkcipher_init(struct crypto_tfm *tfm)
|
|||
max_key_buf_size, DMA_TO_DEVICE);
|
||||
if (dma_mapping_error(dev, ctx_p->user.key_dma_addr)) {
|
||||
SSI_LOG_ERR("Mapping Key %u B at va=%pK for DMA failed\n",
|
||||
max_key_buf_size, ctx_p->user.key);
|
||||
max_key_buf_size, ctx_p->user.key);
|
||||
return -ENOMEM;
|
||||
}
|
||||
SSI_LOG_DEBUG("Mapped key %u B at va=%pK to dma=0x%llX\n",
|
||||
max_key_buf_size, ctx_p->user.key,
|
||||
(unsigned long long)ctx_p->user.key_dma_addr);
|
||||
max_key_buf_size, ctx_p->user.key,
|
||||
(unsigned long long)ctx_p->user.key_dma_addr);
|
||||
|
||||
if (ctx_p->cipher_mode == DRV_CIPHER_ESSIV) {
|
||||
/* Alloc hash tfm for essiv */
|
||||
|
@ -233,7 +232,7 @@ static void ssi_blkcipher_exit(struct crypto_tfm *tfm)
|
|||
unsigned int max_key_buf_size = get_max_keysize(tfm);
|
||||
|
||||
SSI_LOG_DEBUG("Clearing context @%p for %s\n",
|
||||
crypto_tfm_ctx(tfm), crypto_tfm_alg_name(tfm));
|
||||
crypto_tfm_ctx(tfm), crypto_tfm_alg_name(tfm));
|
||||
|
||||
if (ctx_p->cipher_mode == DRV_CIPHER_ESSIV) {
|
||||
/* Free hash tfm for essiv */
|
||||
|
@ -243,9 +242,9 @@ static void ssi_blkcipher_exit(struct crypto_tfm *tfm)
|
|||
|
||||
/* Unmap key buffer */
|
||||
dma_unmap_single(dev, ctx_p->user.key_dma_addr, max_key_buf_size,
|
||||
DMA_TO_DEVICE);
|
||||
DMA_TO_DEVICE);
|
||||
SSI_LOG_DEBUG("Unmapped key buffer key_dma_addr=0x%llX\n",
|
||||
(unsigned long long)ctx_p->user.key_dma_addr);
|
||||
(unsigned long long)ctx_p->user.key_dma_addr);
|
||||
|
||||
/* Free key buffer in context */
|
||||
kfree(ctx_p->user.key);
|
||||
|
@ -270,7 +269,7 @@ static int ssi_verify_3des_keys(const u8 *key, unsigned int keylen)
|
|||
|
||||
/* verify key1 != key2 and key3 != key2*/
|
||||
if (unlikely((memcmp((u8 *)tdes_key->key1, (u8 *)tdes_key->key2, sizeof(tdes_key->key1)) == 0) ||
|
||||
(memcmp((u8 *)tdes_key->key3, (u8 *)tdes_key->key2, sizeof(tdes_key->key3)) == 0))) {
|
||||
(memcmp((u8 *)tdes_key->key3, (u8 *)tdes_key->key2, sizeof(tdes_key->key3)) == 0))) {
|
||||
return -ENOEXEC;
|
||||
}
|
||||
|
||||
|
@ -302,7 +301,7 @@ static int ssi_blkcipher_setkey(struct crypto_tfm *tfm,
|
|||
unsigned int max_key_buf_size = get_max_keysize(tfm);
|
||||
|
||||
SSI_LOG_DEBUG("Setting key in context @%p for %s. keylen=%u\n",
|
||||
ctx_p, crypto_tfm_alg_name(tfm), keylen);
|
||||
ctx_p, crypto_tfm_alg_name(tfm), keylen);
|
||||
dump_byte_array("key", (u8 *)key, keylen);
|
||||
|
||||
SSI_LOG_DEBUG("ssi_blkcipher_setkey: after FIPS check");
|
||||
|
@ -379,7 +378,7 @@ static int ssi_blkcipher_setkey(struct crypto_tfm *tfm,
|
|||
|
||||
/* STAT_PHASE_1: Copy key to ctx */
|
||||
dma_sync_single_for_cpu(dev, ctx_p->user.key_dma_addr,
|
||||
max_key_buf_size, DMA_TO_DEVICE);
|
||||
max_key_buf_size, DMA_TO_DEVICE);
|
||||
|
||||
if (ctx_p->flow_mode == S_DIN_to_MULTI2) {
|
||||
#if SSI_CC_HAS_MULTI2
|
||||
|
@ -412,7 +411,7 @@ static int ssi_blkcipher_setkey(struct crypto_tfm *tfm,
|
|||
}
|
||||
}
|
||||
dma_sync_single_for_device(dev, ctx_p->user.key_dma_addr,
|
||||
max_key_buf_size, DMA_TO_DEVICE);
|
||||
max_key_buf_size, DMA_TO_DEVICE);
|
||||
ctx_p->keylen = keylen;
|
||||
|
||||
SSI_LOG_DEBUG("ssi_blkcipher_setkey: return safely");
|
||||
|
@ -621,11 +620,9 @@ ssi_blkcipher_create_data_desc(
|
|||
/* Process */
|
||||
if (likely(req_ctx->dma_buf_type == SSI_DMA_BUF_DLLI)) {
|
||||
SSI_LOG_DEBUG(" data params addr 0x%llX length 0x%X \n",
|
||||
(unsigned long long)sg_dma_address(src),
|
||||
nbytes);
|
||||
(unsigned long long)sg_dma_address(src), nbytes);
|
||||
SSI_LOG_DEBUG(" data params addr 0x%llX length 0x%X \n",
|
||||
(unsigned long long)sg_dma_address(dst),
|
||||
nbytes);
|
||||
(unsigned long long)sg_dma_address(dst), nbytes);
|
||||
hw_desc_init(&desc[*seq_size]);
|
||||
set_din_type(&desc[*seq_size], DMA_DLLI, sg_dma_address(src),
|
||||
nbytes, NS_BIT);
|
||||
|
@ -689,13 +686,13 @@ ssi_blkcipher_create_data_desc(
|
|||
}
|
||||
|
||||
static int ssi_blkcipher_complete(struct device *dev,
|
||||
struct ssi_ablkcipher_ctx *ctx_p,
|
||||
struct blkcipher_req_ctx *req_ctx,
|
||||
struct scatterlist *dst,
|
||||
struct scatterlist *src,
|
||||
unsigned int ivsize,
|
||||
void *areq,
|
||||
void __iomem *cc_base)
|
||||
struct ssi_ablkcipher_ctx *ctx_p,
|
||||
struct blkcipher_req_ctx *req_ctx,
|
||||
struct scatterlist *dst,
|
||||
struct scatterlist *src,
|
||||
unsigned int ivsize,
|
||||
void *areq,
|
||||
void __iomem *cc_base)
|
||||
{
|
||||
int completion_error = 0;
|
||||
u32 inflight_counter;
|
||||
|
@ -732,8 +729,8 @@ static int ssi_blkcipher_process(
|
|||
int rc, seq_len = 0, cts_restore_flag = 0;
|
||||
|
||||
SSI_LOG_DEBUG("%s areq=%p info=%p nbytes=%d\n",
|
||||
((direction == DRV_CRYPTO_DIRECTION_ENCRYPT) ? "Encrypt" : "Decrypt"),
|
||||
areq, info, nbytes);
|
||||
((direction == DRV_CRYPTO_DIRECTION_ENCRYPT) ? "Encrypt" : "Decrypt"),
|
||||
areq, info, nbytes);
|
||||
|
||||
/* STAT_PHASE_0: Init and sanity checks */
|
||||
|
||||
|
@ -786,12 +783,8 @@ static int ssi_blkcipher_process(
|
|||
ssi_blkcipher_create_setup_desc(tfm, req_ctx, ivsize, nbytes,
|
||||
desc, &seq_len);
|
||||
/* Data processing */
|
||||
ssi_blkcipher_create_data_desc(tfm,
|
||||
req_ctx,
|
||||
dst, src,
|
||||
nbytes,
|
||||
areq,
|
||||
desc, &seq_len);
|
||||
ssi_blkcipher_create_data_desc(tfm, req_ctx, dst, src, nbytes, areq,
|
||||
desc, &seq_len);
|
||||
|
||||
/* do we need to generate IV? */
|
||||
if (req_ctx->is_giv) {
|
||||
|
@ -851,8 +844,8 @@ static int ssi_ablkcipher_init(struct crypto_tfm *tfm)
|
|||
}
|
||||
|
||||
static int ssi_ablkcipher_setkey(struct crypto_ablkcipher *tfm,
|
||||
const u8 *key,
|
||||
unsigned int keylen)
|
||||
const u8 *key,
|
||||
unsigned int keylen)
|
||||
{
|
||||
return ssi_blkcipher_setkey(crypto_ablkcipher_tfm(tfm), key, keylen);
|
||||
}
|
||||
|
@ -1266,7 +1259,7 @@ int ssi_ablkcipher_free(struct ssi_drvdata *drvdata)
|
|||
if (blkcipher_handle) {
|
||||
/* Remove registered algs */
|
||||
list_for_each_entry_safe(t_alg, n,
|
||||
&blkcipher_handle->blkcipher_alg_list,
|
||||
&blkcipher_handle->blkcipher_alg_list,
|
||||
entry) {
|
||||
crypto_unregister_alg(&t_alg->crypto_alg);
|
||||
list_del(&t_alg->entry);
|
||||
|
@ -1286,7 +1279,7 @@ int ssi_ablkcipher_alloc(struct ssi_drvdata *drvdata)
|
|||
int alg;
|
||||
|
||||
ablkcipher_handle = kmalloc(sizeof(struct ssi_blkcipher_handle),
|
||||
GFP_KERNEL);
|
||||
GFP_KERNEL);
|
||||
if (!ablkcipher_handle)
|
||||
return -ENOMEM;
|
||||
|
||||
|
@ -1302,7 +1295,7 @@ int ssi_ablkcipher_alloc(struct ssi_drvdata *drvdata)
|
|||
if (IS_ERR(t_alg)) {
|
||||
rc = PTR_ERR(t_alg);
|
||||
SSI_LOG_ERR("%s alg allocation failed\n",
|
||||
blkcipher_algs[alg].driver_name);
|
||||
blkcipher_algs[alg].driver_name);
|
||||
goto fail0;
|
||||
}
|
||||
t_alg->drvdata = drvdata;
|
||||
|
@ -1310,17 +1303,17 @@ int ssi_ablkcipher_alloc(struct ssi_drvdata *drvdata)
|
|||
SSI_LOG_DEBUG("registering %s\n", blkcipher_algs[alg].driver_name);
|
||||
rc = crypto_register_alg(&t_alg->crypto_alg);
|
||||
SSI_LOG_DEBUG("%s alg registration rc = %x\n",
|
||||
t_alg->crypto_alg.cra_driver_name, rc);
|
||||
t_alg->crypto_alg.cra_driver_name, rc);
|
||||
if (unlikely(rc != 0)) {
|
||||
SSI_LOG_ERR("%s alg registration failed\n",
|
||||
t_alg->crypto_alg.cra_driver_name);
|
||||
t_alg->crypto_alg.cra_driver_name);
|
||||
kfree(t_alg);
|
||||
goto fail0;
|
||||
} else {
|
||||
list_add_tail(&t_alg->entry,
|
||||
&ablkcipher_handle->blkcipher_alg_list);
|
||||
SSI_LOG_DEBUG("Registered %s\n",
|
||||
t_alg->crypto_alg.cra_driver_name);
|
||||
t_alg->crypto_alg.cra_driver_name);
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
|
|
Loading…
Reference in New Issue