crypto: safexcel - Use crypto_wait_req
authorHerbert Xu <herbert@gondor.apana.org.au>
Tue, 31 Jan 2023 05:44:05 +0000 (13:44 +0800)
committerHerbert Xu <herbert@gondor.apana.org.au>
Fri, 10 Feb 2023 09:20:19 +0000 (17:20 +0800)
This patch replaces the custom crypto completion function with
crypto_req_done.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
drivers/crypto/inside-secure/safexcel.c
drivers/crypto/inside-secure/safexcel.h
drivers/crypto/inside-secure/safexcel_cipher.c
drivers/crypto/inside-secure/safexcel_hash.c

index ae61103..baff012 100644 (file)
@@ -970,17 +970,6 @@ void safexcel_complete(struct safexcel_crypto_priv *priv, int ring)
        } while (!cdesc->last_seg);
 }
 
-void safexcel_inv_complete(struct crypto_async_request *req, int error)
-{
-       struct safexcel_inv_result *result = req->data;
-
-       if (error == -EINPROGRESS)
-               return;
-
-       result->error = error;
-       complete(&result->completion);
-}
-
 int safexcel_invalidate_cache(struct crypto_async_request *async,
                              struct safexcel_crypto_priv *priv,
                              dma_addr_t ctxr_dma, int ring)
index 6c2fc66..47ef6c7 100644 (file)
@@ -884,11 +884,6 @@ struct safexcel_alg_template {
        } alg;
 };
 
-struct safexcel_inv_result {
-       struct completion completion;
-       int error;
-};
-
 void safexcel_dequeue(struct safexcel_crypto_priv *priv, int ring);
 int safexcel_rdesc_check_errors(struct safexcel_crypto_priv *priv,
                                void *rdp);
@@ -927,7 +922,6 @@ void safexcel_rdr_req_set(struct safexcel_crypto_priv *priv,
                          struct crypto_async_request *req);
 inline struct crypto_async_request *
 safexcel_rdr_req_get(struct safexcel_crypto_priv *priv, int ring);
-void safexcel_inv_complete(struct crypto_async_request *req, int error);
 int safexcel_hmac_setkey(struct safexcel_context *base, const u8 *key,
                         unsigned int keylen, const char *alg,
                         unsigned int state_sz);
index 32a37e3..272c28b 100644 (file)
@@ -1091,13 +1091,12 @@ static int safexcel_aead_send(struct crypto_async_request *async, int ring,
 static int safexcel_cipher_exit_inv(struct crypto_tfm *tfm,
                                    struct crypto_async_request *base,
                                    struct safexcel_cipher_req *sreq,
-                                   struct safexcel_inv_result *result)
+                                   struct crypto_wait *result)
 {
        struct safexcel_cipher_ctx *ctx = crypto_tfm_ctx(tfm);
        struct safexcel_crypto_priv *priv = ctx->base.priv;
        int ring = ctx->base.ring;
-
-       init_completion(&result->completion);
+       int err;
 
        ctx = crypto_tfm_ctx(base->tfm);
        ctx->base.exit_inv = true;
@@ -1110,13 +1109,13 @@ static int safexcel_cipher_exit_inv(struct crypto_tfm *tfm,
        queue_work(priv->ring[ring].workqueue,
                   &priv->ring[ring].work_data.work);
 
-       wait_for_completion(&result->completion);
+       err = crypto_wait_req(-EINPROGRESS, result);
 
-       if (result->error) {
+       if (err) {
                dev_warn(priv->dev,
                        "cipher: sync: invalidate: completion error %d\n",
-                        result->error);
-               return result->error;
+                        err);
+               return err;
        }
 
        return 0;
@@ -1126,12 +1125,12 @@ static int safexcel_skcipher_exit_inv(struct crypto_tfm *tfm)
 {
        EIP197_REQUEST_ON_STACK(req, skcipher, EIP197_SKCIPHER_REQ_SIZE);
        struct safexcel_cipher_req *sreq = skcipher_request_ctx(req);
-       struct safexcel_inv_result result = {};
+       DECLARE_CRYPTO_WAIT(result);
 
        memset(req, 0, sizeof(struct skcipher_request));
 
        skcipher_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
-                                     safexcel_inv_complete, &result);
+                                     crypto_req_done, &result);
        skcipher_request_set_tfm(req, __crypto_skcipher_cast(tfm));
 
        return safexcel_cipher_exit_inv(tfm, &req->base, sreq, &result);
@@ -1141,12 +1140,12 @@ static int safexcel_aead_exit_inv(struct crypto_tfm *tfm)
 {
        EIP197_REQUEST_ON_STACK(req, aead, EIP197_AEAD_REQ_SIZE);
        struct safexcel_cipher_req *sreq = aead_request_ctx(req);
-       struct safexcel_inv_result result = {};
+       DECLARE_CRYPTO_WAIT(result);
 
        memset(req, 0, sizeof(struct aead_request));
 
        aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
-                                 safexcel_inv_complete, &result);
+                                 crypto_req_done, &result);
        aead_request_set_tfm(req, __crypto_aead_cast(tfm));
 
        return safexcel_cipher_exit_inv(tfm, &req->base, sreq, &result);
index ca46328..e17577b 100644 (file)
@@ -625,15 +625,16 @@ static int safexcel_ahash_exit_inv(struct crypto_tfm *tfm)
        struct safexcel_crypto_priv *priv = ctx->base.priv;
        EIP197_REQUEST_ON_STACK(req, ahash, EIP197_AHASH_REQ_SIZE);
        struct safexcel_ahash_req *rctx = ahash_request_ctx_dma(req);
-       struct safexcel_inv_result result = {};
+       DECLARE_CRYPTO_WAIT(result);
        int ring = ctx->base.ring;
+       int err;
 
        memset(req, 0, EIP197_AHASH_REQ_SIZE);
 
        /* create invalidation request */
        init_completion(&result.completion);
        ahash_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
-                                  safexcel_inv_complete, &result);
+                                  crypto_req_done, &result);
 
        ahash_request_set_tfm(req, __crypto_ahash_cast(tfm));
        ctx = crypto_tfm_ctx(req->base.tfm);
@@ -647,12 +648,11 @@ static int safexcel_ahash_exit_inv(struct crypto_tfm *tfm)
        queue_work(priv->ring[ring].workqueue,
                   &priv->ring[ring].work_data.work);
 
-       wait_for_completion(&result.completion);
+       err = crypto_wait_req(-EINPROGRESS, &result);
 
-       if (result.error) {
-               dev_warn(priv->dev, "hash: completion error (%d)\n",
-                        result.error);
-               return result.error;
+       if (err) {
+               dev_warn(priv->dev, "hash: completion error (%d)\n", err);
+               return err;
        }
 
        return 0;
@@ -1042,27 +1042,11 @@ static int safexcel_hmac_sha1_digest(struct ahash_request *areq)
        return safexcel_ahash_finup(areq);
 }
 
-struct safexcel_ahash_result {
-       struct completion completion;
-       int error;
-};
-
-static void safexcel_ahash_complete(struct crypto_async_request *req, int error)
-{
-       struct safexcel_ahash_result *result = req->data;
-
-       if (error == -EINPROGRESS)
-               return;
-
-       result->error = error;
-       complete(&result->completion);
-}
-
 static int safexcel_hmac_init_pad(struct ahash_request *areq,
                                  unsigned int blocksize, const u8 *key,
                                  unsigned int keylen, u8 *ipad, u8 *opad)
 {
-       struct safexcel_ahash_result result;
+       DECLARE_CRYPTO_WAIT(result);
        struct scatterlist sg;
        int ret, i;
        u8 *keydup;
@@ -1075,16 +1059,12 @@ static int safexcel_hmac_init_pad(struct ahash_request *areq,
                        return -ENOMEM;
 
                ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_BACKLOG,
-                                          safexcel_ahash_complete, &result);
+                                          crypto_req_done, &result);
                sg_init_one(&sg, keydup, keylen);
                ahash_request_set_crypt(areq, &sg, ipad, keylen);
-               init_completion(&result.completion);
 
                ret = crypto_ahash_digest(areq);
-               if (ret == -EINPROGRESS || ret == -EBUSY) {
-                       wait_for_completion_interruptible(&result.completion);
-                       ret = result.error;
-               }
+               ret = crypto_wait_req(ret, &result);
 
                /* Avoid leaking */
                kfree_sensitive(keydup);
@@ -1109,16 +1089,15 @@ static int safexcel_hmac_init_pad(struct ahash_request *areq,
 static int safexcel_hmac_init_iv(struct ahash_request *areq,
                                 unsigned int blocksize, u8 *pad, void *state)
 {
-       struct safexcel_ahash_result result;
        struct safexcel_ahash_req *req;
+       DECLARE_CRYPTO_WAIT(result);
        struct scatterlist sg;
        int ret;
 
        ahash_request_set_callback(areq, CRYPTO_TFM_REQ_MAY_BACKLOG,
-                                  safexcel_ahash_complete, &result);
+                                  crypto_req_done, &result);
        sg_init_one(&sg, pad, blocksize);
        ahash_request_set_crypt(areq, &sg, pad, blocksize);
-       init_completion(&result.completion);
 
        ret = crypto_ahash_init(areq);
        if (ret)
@@ -1129,14 +1108,9 @@ static int safexcel_hmac_init_iv(struct ahash_request *areq,
        req->last_req = true;
 
        ret = crypto_ahash_update(areq);
-       if (ret && ret != -EINPROGRESS && ret != -EBUSY)
-               return ret;
-
-       wait_for_completion_interruptible(&result.completion);
-       if (result.error)
-               return result.error;
+       ret = crypto_wait_req(ret, &result);
 
-       return crypto_ahash_export(areq, state);
+       return ret ?: crypto_ahash_export(areq, state);
 }
 
 static int __safexcel_hmac_setkey(const char *alg, const u8 *key,