summaryrefslogtreecommitdiffstats
path: root/cryptodev_cipher.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2010-09-06 17:18:08 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2010-09-06 17:18:41 +0200
commit943f9ab50c110133a5cd1118b5b19cb09301168f (patch)
tree1cef7570d78539ad84de9ce81debb4dc12188df5 /cryptodev_cipher.c
parentdf05d27b761295820f3b13ec31c67c0ab0198bfc (diff)
downloadcryptodev-linux-943f9ab50c110133a5cd1118b5b19cb09301168f.tar.gz
cryptodev-linux-943f9ab50c110133a5cd1118b5b19cb09301168f.tar.xz
cryptodev-linux-943f9ab50c110133a5cd1118b5b19cb09301168f.zip
run scripts/Lindent.
Diffstat (limited to 'cryptodev_cipher.c')
-rw-r--r--cryptodev_cipher.c142
1 files changed, 77 insertions, 65 deletions
diff --git a/cryptodev_cipher.c b/cryptodev_cipher.c
index 1fb1147..591e4eb 100644
--- a/cryptodev_cipher.c
+++ b/cryptodev_cipher.c
@@ -33,7 +33,6 @@
#include <crypto/hash.h>
#include "cryptodev_int.h"
-
struct cryptodev_result {
struct completion completion;
int err;
@@ -50,18 +49,19 @@ static void cryptodev_complete(struct crypto_async_request *req, int err)
complete(&res->completion);
}
-int cryptodev_cipher_init(struct cipher_data* out, const char* alg_name, uint8_t * keyp, size_t keylen)
+int cryptodev_cipher_init(struct cipher_data *out, const char *alg_name,
+ uint8_t * keyp, size_t keylen)
{
-
- struct ablkcipher_alg* alg;
+
+ struct ablkcipher_alg *alg;
int ret;
memset(out, 0, sizeof(*out));
out->async.s = crypto_alloc_ablkcipher(alg_name, 0, 0);
if (unlikely(IS_ERR(out->async.s))) {
- dprintk(1,KERN_DEBUG,"%s: Failed to load cipher %s\n", __func__,
- alg_name);
+ dprintk(1, KERN_DEBUG, "%s: Failed to load cipher %s\n",
+ __func__, alg_name);
return -EINVAL;
}
@@ -69,11 +69,13 @@ int cryptodev_cipher_init(struct cipher_data* out, const char* alg_name, uint8_t
if (alg != NULL) {
/* Was correct key length supplied? */
- if (alg->max_keysize > 0 && unlikely((keylen < alg->min_keysize) ||
- (keylen > alg->max_keysize))) {
- dprintk(1,KERN_DEBUG,"Wrong keylen '%zu' for algorithm '%s'. Use %u to %u.\n",
- keylen, alg_name, alg->min_keysize,
- alg->max_keysize);
+ if (alg->max_keysize > 0
+ && unlikely((keylen < alg->min_keysize)
+ || (keylen > alg->max_keysize))) {
+ dprintk(1, KERN_DEBUG,
+ "Wrong keylen '%zu' for algorithm '%s'. Use %u to %u.\n",
+ keylen, alg_name, alg->min_keysize,
+ alg->max_keysize);
ret = -EINVAL;
goto error;
}
@@ -81,8 +83,8 @@ int cryptodev_cipher_init(struct cipher_data* out, const char* alg_name, uint8_t
ret = crypto_ablkcipher_setkey(out->async.s, keyp, keylen);
if (unlikely(ret)) {
- dprintk(1,KERN_DEBUG,"Setting key failed for %s-%zu.\n",
- alg_name, keylen*8);
+ dprintk(1, KERN_DEBUG, "Setting key failed for %s-%zu.\n",
+ alg_name, keylen * 8);
ret = -EINVAL;
goto error;
}
@@ -101,12 +103,13 @@ int cryptodev_cipher_init(struct cipher_data* out, const char* alg_name, uint8_t
out->async.request = ablkcipher_request_alloc(out->async.s, GFP_KERNEL);
if (unlikely(!out->async.request)) {
- dprintk(1,KERN_ERR,"error allocating async crypto request\n");
+ dprintk(1, KERN_ERR, "error allocating async crypto request\n");
ret = -ENOMEM;
goto error;
}
- ablkcipher_request_set_callback(out->async.request, CRYPTO_TFM_REQ_MAY_BACKLOG,
+ ablkcipher_request_set_callback(out->async.request,
+ CRYPTO_TFM_REQ_MAY_BACKLOG,
cryptodev_complete, out->async.result);
out->init = 1;
@@ -121,7 +124,7 @@ error:
return ret;
}
-void cryptodev_cipher_deinit(struct cipher_data* cdata)
+void cryptodev_cipher_deinit(struct cipher_data *cdata)
{
if (cdata->init) {
if (cdata->async.request)
@@ -134,12 +137,13 @@ void cryptodev_cipher_deinit(struct cipher_data* cdata)
}
}
-void cryptodev_cipher_set_iv(struct cipher_data* cdata, void *iv, size_t iv_size)
+void cryptodev_cipher_set_iv(struct cipher_data *cdata, void *iv,
+ size_t iv_size)
{
- memcpy(cdata->async.iv, iv, min(iv_size,sizeof(cdata->async.iv)));
+ memcpy(cdata->async.iv, iv, min(iv_size, sizeof(cdata->async.iv)));
}
-static inline int waitfor (struct cryptodev_result* cr, ssize_t ret)
+static inline int waitfor(struct cryptodev_result *cr, ssize_t ret)
{
switch (ret) {
case 0:
@@ -154,8 +158,9 @@ static inline int waitfor (struct cryptodev_result* cr, ssize_t ret)
* another request. */
if (unlikely(cr->err)) {
- dprintk(0,KERN_ERR,"error from async request: %d \n", cr->err);
- return cr->err;
+ dprintk(0, KERN_ERR, "error from async request: %d \n",
+ cr->err);
+ return cr->err;
}
break;
@@ -166,49 +171,55 @@ static inline int waitfor (struct cryptodev_result* cr, ssize_t ret)
return 0;
}
-
-int _cryptodev_cipher_encrypt(struct cipher_data* cdata, const void* plaintext,
- size_t plaintext_size, void* ciphertext, size_t ciphertext_size)
+int _cryptodev_cipher_encrypt(struct cipher_data *cdata, const void *plaintext,
+ size_t plaintext_size, void *ciphertext,
+ size_t ciphertext_size)
{
-struct scatterlist sg, sg2;
+ struct scatterlist sg, sg2;
sg_init_one(&sg, plaintext, plaintext_size);
sg_init_one(&sg2, ciphertext, ciphertext_size);
- return cryptodev_cipher_encrypt( cdata, &sg, &sg2, plaintext_size);
+ return cryptodev_cipher_encrypt(cdata, &sg, &sg2, plaintext_size);
}
-int _cryptodev_cipher_decrypt(struct cipher_data* cdata, const void* ciphertext,
- size_t ciphertext_size, void* plaintext, size_t plaintext_size)
+int _cryptodev_cipher_decrypt(struct cipher_data *cdata, const void *ciphertext,
+ size_t ciphertext_size, void *plaintext,
+ size_t plaintext_size)
{
-struct scatterlist sg, sg2;
+ struct scatterlist sg, sg2;
sg_init_one(&sg, ciphertext, ciphertext_size);
sg_init_one(&sg2, plaintext, plaintext_size);
- return cryptodev_cipher_decrypt( cdata, &sg, &sg2, ciphertext_size);
+ return cryptodev_cipher_decrypt(cdata, &sg, &sg2, ciphertext_size);
}
-
-ssize_t cryptodev_cipher_encrypt( struct cipher_data* cdata, const struct scatterlist *sg1, struct scatterlist *sg2, size_t len)
+ssize_t cryptodev_cipher_encrypt(struct cipher_data * cdata,
+ const struct scatterlist * sg1,
+ struct scatterlist * sg2, size_t len)
{
int ret;
INIT_COMPLETION(cdata->async.result->completion);
- ablkcipher_request_set_crypt(cdata->async.request, (struct scatterlist*)sg1, sg2,
- len, cdata->async.iv);
+ ablkcipher_request_set_crypt(cdata->async.request,
+ (struct scatterlist *)sg1, sg2, len,
+ cdata->async.iv);
ret = crypto_ablkcipher_encrypt(cdata->async.request);
- return waitfor(cdata->async.result,ret);
+ return waitfor(cdata->async.result, ret);
}
-ssize_t cryptodev_cipher_decrypt( struct cipher_data* cdata, const struct scatterlist *sg1, struct scatterlist *sg2, size_t len)
+ssize_t cryptodev_cipher_decrypt(struct cipher_data * cdata,
+ const struct scatterlist * sg1,
+ struct scatterlist * sg2, size_t len)
{
int ret;
INIT_COMPLETION(cdata->async.result->completion);
- ablkcipher_request_set_crypt(cdata->async.request, (struct scatterlist*)sg1, sg2,
- len, cdata->async.iv);
+ ablkcipher_request_set_crypt(cdata->async.request,
+ (struct scatterlist *)sg1, sg2, len,
+ cdata->async.iv);
ret = crypto_ablkcipher_decrypt(cdata->async.request);
return waitfor(cdata->async.result, ret);
@@ -216,14 +227,15 @@ ssize_t cryptodev_cipher_decrypt( struct cipher_data* cdata, const struct scatte
/* Hash functions */
-int cryptodev_hash_init(struct hash_data *hdata, const char *alg_name, const void *mackey, size_t mackeylen)
+int cryptodev_hash_init(struct hash_data *hdata, const char *alg_name,
+ const void *mackey, size_t mackeylen)
{
-int ret;
+ int ret;
hdata->async.s = crypto_alloc_ahash(alg_name, 0, 0);
if (unlikely(IS_ERR(hdata->async.s))) {
- dprintk(1,KERN_DEBUG,"%s: Failed to load transform for %s\n", __func__,
- alg_name);
+ dprintk(1, KERN_DEBUG, "%s: Failed to load transform for %s\n",
+ __func__, alg_name);
return -EINVAL;
}
@@ -232,8 +244,9 @@ int ret;
ret = crypto_ahash_setkey(hdata->async.s, mackey, mackeylen);
if (unlikely(ret)) {
- dprintk(1,KERN_DEBUG,"Setting hmac key failed for %s-%zu.\n",
- alg_name, mackeylen*8);
+ dprintk(1, KERN_DEBUG,
+ "Setting hmac key failed for %s-%zu.\n",
+ alg_name, mackeylen * 8);
ret = -EINVAL;
goto error;
}
@@ -252,18 +265,18 @@ int ret;
hdata->async.request = ahash_request_alloc(hdata->async.s, GFP_KERNEL);
if (unlikely(!hdata->async.request)) {
- dprintk(0,KERN_ERR,"error allocating async crypto request\n");
+ dprintk(0, KERN_ERR, "error allocating async crypto request\n");
ret = -ENOMEM;
goto error;
}
- ahash_request_set_callback(hdata->async.request, CRYPTO_TFM_REQ_MAY_BACKLOG,
- cryptodev_complete, hdata->async.result);
+ ahash_request_set_callback(hdata->async.request,
+ CRYPTO_TFM_REQ_MAY_BACKLOG,
+ cryptodev_complete, hdata->async.result);
ret = crypto_ahash_init(hdata->async.request);
if (unlikely(ret)) {
- dprintk(0,KERN_ERR,
- "error in crypto_hash_init()\n");
+ dprintk(0, KERN_ERR, "error in crypto_hash_init()\n");
goto error_request;
}
@@ -304,8 +317,7 @@ int cryptodev_hash_clone(struct hash_data *hdata, struct hash_data *old_data,
}
ret = crypto_ahash_import(hdata->async.request, state);
if (unlikely(ret != 0)) {
- dprintk(0,KERN_ERR,
- "error in crypto_hash_init()\n");
+ dprintk(0, KERN_ERR, "error in crypto_hash_init()\n");
goto err;
}
@@ -320,7 +332,7 @@ err:
return ret;
}
-void cryptodev_hash_deinit(struct hash_data* hdata)
+void cryptodev_hash_deinit(struct hash_data *hdata)
{
if (hdata->init) {
if (hdata->async.request)
@@ -332,13 +344,12 @@ void cryptodev_hash_deinit(struct hash_data* hdata)
}
}
-int cryptodev_hash_reset( struct hash_data* hdata)
+int cryptodev_hash_reset(struct hash_data *hdata)
{
-int ret;
+ int ret;
ret = crypto_ahash_init(hdata->async.request);
if (unlikely(ret)) {
- dprintk(0,KERN_ERR,
- "error in crypto_hash_init()\n");
+ dprintk(0, KERN_ERR, "error in crypto_hash_init()\n");
return ret;
}
@@ -346,29 +357,30 @@ int ret;
}
-ssize_t cryptodev_hash_update( struct hash_data* hdata, struct scatterlist *sg, size_t len)
+ssize_t cryptodev_hash_update(struct hash_data * hdata, struct scatterlist * sg,
+ size_t len)
{
int ret;
INIT_COMPLETION(hdata->async.result->completion);
- ahash_request_set_crypt(hdata->async.request, sg, NULL,
- len);
+ ahash_request_set_crypt(hdata->async.request, sg, NULL, len);
ret = crypto_ahash_update(hdata->async.request);
- return waitfor(hdata->async.result,ret);
+ return waitfor(hdata->async.result, ret);
}
-ssize_t _cryptodev_hash_update( struct hash_data* hdata, const void* data, size_t len)
+ssize_t _cryptodev_hash_update(struct hash_data * hdata, const void *data,
+ size_t len)
{
-struct scatterlist sg;
+ struct scatterlist sg;
sg_init_one(&sg, data, len);
- return cryptodev_hash_update( hdata, &sg, len);
+ return cryptodev_hash_update(hdata, &sg, len);
}
-int cryptodev_hash_final( struct hash_data* hdata, void* output)
+int cryptodev_hash_final(struct hash_data *hdata, void *output)
{
int ret;
@@ -377,5 +389,5 @@ int cryptodev_hash_final( struct hash_data* hdata, void* output)
ret = crypto_ahash_final(hdata->async.request);
- return waitfor(hdata->async.result,ret);
+ return waitfor(hdata->async.result, ret);
}