Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp1628294ybh; Sun, 8 Mar 2020 08:58:42 -0700 (PDT) X-Google-Smtp-Source: ADFU+vs8YupPxunCMe1zs2YSsMhW8CyH+d+0k607p/WPGwYOBW0F7x2LuUbLkmapv6xmM9jhl9oG X-Received: by 2002:aca:3d7:: with SMTP id 206mr8965546oid.98.1583683121969; Sun, 08 Mar 2020 08:58:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583683121; cv=none; d=google.com; s=arc-20160816; b=x44OXTdR7EMDsiJmc0dpjhXJ8iDRnMBphoLgJH8lckxHmAc+e0O3ONqkYoqh/RLYCk zN/Res9J2kBiVsNg6Z5pNFXo9QZ8oK+O51bmXIlCsKT7PhFlUBVTQ1HyRrrmw2lVB3rf SGuHqxyqrNMX7mrQrqlK25O3Iwv5nXcH143OGyc/HjS4FdDML3ZN2N5O6C51C+Cztjix /q84ZSP585/phERoer+4ROEH7NJOAM3jCUDZQoqJJY/Zli2vLgnprUF0DdhTfT1UPq9R ELvMUBCNl5vgU0sCA+DdUXUCh+BXetxtHRy+Edt6pj0vXKg2Crq4eLhjNAk2ojhKtTN+ edUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=aR6RwwsWK9ccMQbzq5TeuzMrK44PzRva8HvwQt9q0L4=; b=H9aI6obpoSUdjmLjzKueZkZ2JkJ37XZSTETgORud0fSqRPvFybcdAhIydWPQyav8dy xgmg99h1gOUT9ra0sAUsfqgQFvhZ4ieQ8MbYI/1ZRuA1fYCqgA8T3m6WN4wYDpbNABnn Sl5mqHT0/HBJ7TA33UFAc9lpnm+6860aGNmAV7rBT7c3wqTvPrDS9I5rx8VZNpBQp3bN BbylaxjzJj4XXJlcc3Zj1KzWo3fJmxlOi77FwstVn32J8+4RR2C+23T9piXVLkPvG0Y7 PV6Qa3+SPYYJnCRHzXW4J43oUh01V+QhgchVgJEhyb/edb1CtD45TsKvhvdFB+mKl9Nf XpXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g144si1771998oib.40.2020.03.08.08.58.30; Sun, 08 Mar 2020 08:58:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726450AbgCHP5d (ORCPT + 99 others); Sun, 8 Mar 2020 11:57:33 -0400 Received: from foss.arm.com ([217.140.110.172]:45758 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726330AbgCHP5a (ORCPT ); Sun, 8 Mar 2020 11:57:30 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C32111FB; Sun, 8 Mar 2020 08:57:29 -0700 (PDT) Received: from e110176-lin.kfn.arm.com (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8B36B3F6CF; Sun, 8 Mar 2020 08:57:28 -0700 (PDT) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 3/6] crypto: ccree - remove ancient TODO remarks Date: Sun, 8 Mar 2020 17:57:06 +0200 Message-Id: <20200308155710.14546-4-gilad@benyossef.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200308155710.14546-1-gilad@benyossef.com> References: <20200308155710.14546-1-gilad@benyossef.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Remove left over ancient and now misleading TODO remarks. Signed-off-by: Gilad Ben-Yossef --- drivers/crypto/ccree/cc_aead.c | 1 - drivers/crypto/ccree/cc_buffer_mgr.c | 2 -- drivers/crypto/ccree/cc_cipher.c | 1 - drivers/crypto/ccree/cc_hash.c | 3 --- drivers/crypto/ccree/cc_request_mgr.c | 1 - 5 files changed, 8 deletions(-) diff --git a/drivers/crypto/ccree/cc_aead.c b/drivers/crypto/ccree/cc_aead.c index 904aa66752b3..1c5d927d632c 100644 --- a/drivers/crypto/ccree/cc_aead.c +++ b/drivers/crypto/ccree/cc_aead.c @@ -1990,7 +1990,6 @@ static int cc_proc_aead(struct aead_request *req, /* Load MLLI tables to SRAM if necessary */ cc_mlli_to_sram(req, desc, &seq_len); - /*TODO: move seq len by reference */ switch (ctx->auth_mode) { case DRV_HASH_SHA1: case DRV_HASH_SHA256: diff --git a/drivers/crypto/ccree/cc_buffer_mgr.c b/drivers/crypto/ccree/cc_buffer_mgr.c index 1ea4812e9354..526da532a0a3 100644 --- a/drivers/crypto/ccree/cc_buffer_mgr.c +++ b/drivers/crypto/ccree/cc_buffer_mgr.c @@ -606,7 +606,6 @@ static int cc_aead_chain_iv(struct cc_drvdata *drvdata, dev_dbg(dev, "Mapped iv %u B at va=%pK to dma=%pad\n", hw_iv_size, req->iv, &areq_ctx->gen_ctx.iv_dma_addr); - // TODO: what about CTR?? ask Ron if (do_chain && areq_ctx->plaintext_authenticate_only) { struct crypto_aead *tfm = crypto_aead_reqtfm(req); unsigned int iv_size_to_authenc = crypto_aead_ivsize(tfm); @@ -1225,7 +1224,6 @@ int cc_map_hash_request_final(struct cc_drvdata *drvdata, void *ctx, return 0; } - /*TODO: copy data in case that buffer is enough for operation */ /* map the previous buffer */ if (*curr_buff_cnt) { rc = cc_set_hash_buf(dev, areq_ctx, curr_buff, *curr_buff_cnt, diff --git a/drivers/crypto/ccree/cc_cipher.c b/drivers/crypto/ccree/cc_cipher.c index d8e6a103a637..a84335328f37 100644 --- a/drivers/crypto/ccree/cc_cipher.c +++ b/drivers/crypto/ccree/cc_cipher.c @@ -859,7 +859,6 @@ static int cc_cipher_process(struct skcipher_request *req, /* STAT_PHASE_0: Init and sanity checks */ - /* TODO: check data length according to mode */ if (validate_data_size(ctx_p, nbytes)) { dev_dbg(dev, "Unsupported data size %d.\n", nbytes); rc = -EINVAL; diff --git a/drivers/crypto/ccree/cc_hash.c b/drivers/crypto/ccree/cc_hash.c index 0c32aa2e6801..d5310783af15 100644 --- a/drivers/crypto/ccree/cc_hash.c +++ b/drivers/crypto/ccree/cc_hash.c @@ -349,7 +349,6 @@ static int cc_fin_result(struct cc_hw_desc *desc, struct ahash_request *req, /* Get final MAC result */ hw_desc_init(&desc[idx]); set_hash_cipher_mode(&desc[idx], ctx->hw_mode, ctx->hash_mode); - /* TODO */ set_dout_dlli(&desc[idx], state->digest_result_dma_addr, digestsize, NS_BIT, 1); set_queue_last_ind(ctx->drvdata, &desc[idx]); @@ -1319,7 +1318,6 @@ static int cc_mac_final(struct ahash_request *req) /* Get final MAC result */ hw_desc_init(&desc[idx]); - /* TODO */ set_dout_dlli(&desc[idx], state->digest_result_dma_addr, digestsize, NS_BIT, 1); set_queue_last_ind(ctx->drvdata, &desc[idx]); @@ -1401,7 +1399,6 @@ static int cc_mac_finup(struct ahash_request *req) /* Get final MAC result */ hw_desc_init(&desc[idx]); - /* TODO */ set_dout_dlli(&desc[idx], state->digest_result_dma_addr, digestsize, NS_BIT, 1); set_queue_last_ind(ctx->drvdata, &desc[idx]); diff --git a/drivers/crypto/ccree/cc_request_mgr.c b/drivers/crypto/ccree/cc_request_mgr.c index 2671cffb3b58..1d7649ecf44e 100644 --- a/drivers/crypto/ccree/cc_request_mgr.c +++ b/drivers/crypto/ccree/cc_request_mgr.c @@ -296,7 +296,6 @@ static void cc_do_send_request(struct cc_drvdata *drvdata, req_mgr_h->req_queue[req_mgr_h->req_queue_head] = *cc_req; req_mgr_h->req_queue_head = (req_mgr_h->req_queue_head + 1) & (MAX_REQUEST_QUEUE_SIZE - 1); - /* TODO: Use circ_buf.h ? */ dev_dbg(dev, "Enqueue request head=%u\n", req_mgr_h->req_queue_head); -- 2.25.1