Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2266352imm; Thu, 7 Jun 2018 07:57:48 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIa8aHfIDe3uK7Z/U1DEX4U4taRIzurfxD/MVJLXnzswwaNdFPC1D2380Bm2IpQh/CAcUWa X-Received: by 2002:a17:902:3343:: with SMTP id a61-v6mr2360314plc.241.1528383468334; Thu, 07 Jun 2018 07:57:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528383468; cv=none; d=google.com; s=arc-20160816; b=CFXlRx0g/qUaOgwRmkCpujSofNX9C8jENYjlAhpIjnXI9ulm0kCijaMTws5p3kkxK6 R+63FLb5l8E8KnvPYpmu2yuIDX+ze/0PGwaHyWtS4sBVA9yHYpqTf/CUmXqx2ZIMuaaW iL97uFq3Jwv9oQJc6Q6DvXsEgEtWG8HhvSr7Z719dqh3kkNxjmXm7/6krQN4BqvgC5FP Cu/WEbKKv+rpnIo+ykuUMQErs0Uq58rGHQjhsQG6SKFFAeOgtb7tWzhvzAqOISvNTQfu clNw7Df00DWSkPhxqoXvCM2Z3WSwm6YI/Hof2v+P6r2eH1/DHCaKItVEhpjXjboO1+zm AMGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition :arc-authentication-results; bh=GdrcoIgp14yao4FclwCHjL5slbJkO8TG3JeH23aZYD8=; b=sMgEBVmHy56FiT3sUkEUhMdV/aLug/CHlmY5c5YSsPC66vLTEpQSp2HmZ34OFdENRu of9CXcpzblztByaotvYOYyC60AOBDXgUZRQ6BGx46gTbhEqVFDL4Tf1iXeq9J2vdaujI ECRvERIW9kwxbVXNYrsjSYrIyC7zSeYcw955HUnQKOcQGk1BZQ6SyaV+vFmnCQ0hOUFi 5oa0de2v/YKIBltF1tRIj3akm8GH02QMglFJbDhklZjvqpU6E1lhJG+LM9gkyc7v3R1c xluIGRobgau51YxIe2W9vsuMxnwmaoPOjFiFsEHxOInT+/MBiL6YZR7JMNYgGW6K1Jna f0Eg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q4-v6si52982682plb.312.2018.06.07.07.57.34; Thu, 07 Jun 2018 07:57:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935476AbeFGOzp (ORCPT + 99 others); Thu, 7 Jun 2018 10:55:45 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:41073 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934853AbeFGOzm (ORCPT ); Thu, 7 Jun 2018 10:55:42 -0400 Received: from [148.252.241.226] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1fQvbp-0005hL-Ni; Thu, 07 Jun 2018 15:09:49 +0100 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1fQvb2-0002r0-9n; Thu, 07 Jun 2018 15:09:00 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Herbert Xu" , "Eric Biggers" Date: Thu, 07 Jun 2018 15:05:21 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) Subject: [PATCH 3.16 121/410] crypto: hash - introduce crypto_hash_alg_has_setkey() In-Reply-To: X-SA-Exim-Connect-IP: 148.252.241.226 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.57-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Eric Biggers commit cd6ed77ad5d223dc6299fb58f62e0f5267f7e2ba upstream. Templates that use an shash spawn can use crypto_shash_alg_has_setkey() to determine whether the underlying algorithm requires a key or not. But there was no corresponding function for ahash spawns. Add it. Note that the new function actually has to support both shash and ahash algorithms, since the ahash API can be used with either. Signed-off-by: Eric Biggers Signed-off-by: Herbert Xu Signed-off-by: Ben Hutchings --- crypto/ahash.c | 11 +++++++++++ include/crypto/internal/hash.h | 2 ++ 2 files changed, 13 insertions(+) --- a/crypto/ahash.c +++ b/crypto/ahash.c @@ -630,5 +630,16 @@ struct hash_alg_common *ahash_attr_alg(s } EXPORT_SYMBOL_GPL(ahash_attr_alg); +bool crypto_hash_alg_has_setkey(struct hash_alg_common *halg) +{ + struct crypto_alg *alg = &halg->base; + + if (alg->cra_type != &crypto_ahash_type) + return crypto_shash_alg_has_setkey(__crypto_shash_alg(alg)); + + return __crypto_ahash_alg(alg)->setkey != NULL; +} +EXPORT_SYMBOL_GPL(crypto_hash_alg_has_setkey); + MODULE_LICENSE("GPL"); MODULE_DESCRIPTION("Asynchronous cryptographic hash type"); --- a/include/crypto/internal/hash.h +++ b/include/crypto/internal/hash.h @@ -91,6 +91,8 @@ static inline bool crypto_shash_alg_has_ return alg->setkey != shash_no_setkey; } +bool crypto_hash_alg_has_setkey(struct hash_alg_common *halg); + int crypto_init_ahash_spawn(struct crypto_ahash_spawn *spawn, struct hash_alg_common *alg, struct crypto_instance *inst);