 3e3dc25fe7
			
		
	
	
	3e3dc25fe7
	
	
	
		
			
			Change formal parameters to not clash with global names to eliminate many W=2 warnings. Signed-off-by: Mark Rustad <mark.d.rustad@intel.com> Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
		
			
				
	
	
		
			110 lines
		
	
	
	
		
			2.7 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			110 lines
		
	
	
	
		
			2.7 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Symmetric key ciphers.
 | |
|  * 
 | |
|  * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or modify it
 | |
|  * under the terms of the GNU General Public License as published by the Free
 | |
|  * Software Foundation; either version 2 of the License, or (at your option) 
 | |
|  * any later version.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #ifndef _CRYPTO_SKCIPHER_H
 | |
| #define _CRYPTO_SKCIPHER_H
 | |
| 
 | |
| #include <linux/crypto.h>
 | |
| #include <linux/kernel.h>
 | |
| #include <linux/slab.h>
 | |
| 
 | |
| /**
 | |
|  *	struct skcipher_givcrypt_request - Crypto request with IV generation
 | |
|  *	@seq: Sequence number for IV generation
 | |
|  *	@giv: Space for generated IV
 | |
|  *	@creq: The crypto request itself
 | |
|  */
 | |
| struct skcipher_givcrypt_request {
 | |
| 	u64 seq;
 | |
| 	u8 *giv;
 | |
| 
 | |
| 	struct ablkcipher_request creq;
 | |
| };
 | |
| 
 | |
| static inline struct crypto_ablkcipher *skcipher_givcrypt_reqtfm(
 | |
| 	struct skcipher_givcrypt_request *req)
 | |
| {
 | |
| 	return crypto_ablkcipher_reqtfm(&req->creq);
 | |
| }
 | |
| 
 | |
| static inline int crypto_skcipher_givencrypt(
 | |
| 	struct skcipher_givcrypt_request *req)
 | |
| {
 | |
| 	struct ablkcipher_tfm *crt =
 | |
| 		crypto_ablkcipher_crt(skcipher_givcrypt_reqtfm(req));
 | |
| 	return crt->givencrypt(req);
 | |
| };
 | |
| 
 | |
| static inline int crypto_skcipher_givdecrypt(
 | |
| 	struct skcipher_givcrypt_request *req)
 | |
| {
 | |
| 	struct ablkcipher_tfm *crt =
 | |
| 		crypto_ablkcipher_crt(skcipher_givcrypt_reqtfm(req));
 | |
| 	return crt->givdecrypt(req);
 | |
| };
 | |
| 
 | |
| static inline void skcipher_givcrypt_set_tfm(
 | |
| 	struct skcipher_givcrypt_request *req, struct crypto_ablkcipher *tfm)
 | |
| {
 | |
| 	req->creq.base.tfm = crypto_ablkcipher_tfm(tfm);
 | |
| }
 | |
| 
 | |
| static inline struct skcipher_givcrypt_request *skcipher_givcrypt_cast(
 | |
| 	struct crypto_async_request *req)
 | |
| {
 | |
| 	return container_of(ablkcipher_request_cast(req),
 | |
| 			    struct skcipher_givcrypt_request, creq);
 | |
| }
 | |
| 
 | |
| static inline struct skcipher_givcrypt_request *skcipher_givcrypt_alloc(
 | |
| 	struct crypto_ablkcipher *tfm, gfp_t gfp)
 | |
| {
 | |
| 	struct skcipher_givcrypt_request *req;
 | |
| 
 | |
| 	req = kmalloc(sizeof(struct skcipher_givcrypt_request) +
 | |
| 		      crypto_ablkcipher_reqsize(tfm), gfp);
 | |
| 
 | |
| 	if (likely(req))
 | |
| 		skcipher_givcrypt_set_tfm(req, tfm);
 | |
| 
 | |
| 	return req;
 | |
| }
 | |
| 
 | |
| static inline void skcipher_givcrypt_free(struct skcipher_givcrypt_request *req)
 | |
| {
 | |
| 	kfree(req);
 | |
| }
 | |
| 
 | |
| static inline void skcipher_givcrypt_set_callback(
 | |
| 	struct skcipher_givcrypt_request *req, u32 flags,
 | |
| 	crypto_completion_t compl, void *data)
 | |
| {
 | |
| 	ablkcipher_request_set_callback(&req->creq, flags, compl, data);
 | |
| }
 | |
| 
 | |
| static inline void skcipher_givcrypt_set_crypt(
 | |
| 	struct skcipher_givcrypt_request *req,
 | |
| 	struct scatterlist *src, struct scatterlist *dst,
 | |
| 	unsigned int nbytes, void *iv)
 | |
| {
 | |
| 	ablkcipher_request_set_crypt(&req->creq, src, dst, nbytes, iv);
 | |
| }
 | |
| 
 | |
| static inline void skcipher_givcrypt_set_giv(
 | |
| 	struct skcipher_givcrypt_request *req, u8 *giv, u64 seq)
 | |
| {
 | |
| 	req->giv = giv;
 | |
| 	req->seq = seq;
 | |
| }
 | |
| 
 | |
| #endif	/* _CRYPTO_SKCIPHER_H */
 | |
| 
 |