 560c06ae1a
			
		
	
	
	560c06ae1a
	
	
	
		
			
			Now that the tfm is passed directly to setkey instead of the ctx, we no longer need to pass the &tfm->crt_flags pointer. This patch also gets rid of a few unnecessary checks on the key length for ciphers as the cipher layer guarantees that the key length is within the bounds specified by the algorithm. Rather than testing dia_setkey every time, this patch does it only once during crypto_alloc_tfm. The redundant check from crypto_digest_setkey is also removed. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
		
			
				
	
	
		
			22 lines
		
	
	
	
		
			613 B
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			22 lines
		
	
	
	
		
			613 B
			
		
	
	
	
		
			C
		
	
	
	
	
	
| #ifndef _CRYPTO_TWOFISH_H
 | |
| #define _CRYPTO_TWOFISH_H
 | |
| 
 | |
| #include <linux/types.h>
 | |
| 
 | |
| #define TF_MIN_KEY_SIZE 16
 | |
| #define TF_MAX_KEY_SIZE 32
 | |
| #define TF_BLOCK_SIZE 16
 | |
| 
 | |
| struct crypto_tfm;
 | |
| 
 | |
| /* Structure for an expanded Twofish key.  s contains the key-dependent
 | |
|  * S-boxes composed with the MDS matrix; w contains the eight "whitening"
 | |
|  * subkeys, K[0] through K[7].	k holds the remaining, "round" subkeys.  Note
 | |
|  * that k[i] corresponds to what the Twofish paper calls K[i+8]. */
 | |
| struct twofish_ctx {
 | |
| 	u32 s[4][256], w[8], k[32];
 | |
| };
 | |
| 
 | |
| int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
 | |
| 
 | |
| #endif
 |