diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-02-20 09:12:51 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-02-20 09:12:51 +0100 |
commit | 78905baffa23c95020899d18298bdde2edaf6ea3 (patch) | |
tree | 0d3b39e6b13d6f66c0f523706ff34267935b946f /cryptodev_main.c | |
parent | 74a3fa37f57e49df0ce0275677b45282735d9570 (diff) | |
download | cryptodev-linux-78905baffa23c95020899d18298bdde2edaf6ea3.tar.gz cryptodev-linux-78905baffa23c95020899d18298bdde2edaf6ea3.tar.xz cryptodev-linux-78905baffa23c95020899d18298bdde2edaf6ea3.zip |
Use only async API since it is a superset of the synchronous one.
Cleanup in structures.
Diffstat (limited to 'cryptodev_main.c')
-rw-r--r-- | cryptodev_main.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/cryptodev_main.c b/cryptodev_main.c index 0162486..1d6b614 100644 --- a/cryptodev_main.c +++ b/cryptodev_main.c @@ -369,7 +369,7 @@ crypto_run(struct fcrypt *fcr, struct crypt_op *cop) nbytes = cop->len; - if (ses_ptr->hdata.type != 0) { + if (ses_ptr->hdata.init != 0) { ret = cryptodev_hash_reset(&ses_ptr->hdata); if (unlikely(ret)) { dprintk(1, KERN_ERR, @@ -378,7 +378,7 @@ crypto_run(struct fcrypt *fcr, struct crypt_op *cop) } } - if (ses_ptr->cdata.type != 0) { + if (ses_ptr->cdata.init != 0) { int blocksize = ses_ptr->cdata.blocksize; if (unlikely(nbytes % blocksize)) { @@ -411,14 +411,14 @@ crypto_run(struct fcrypt *fcr, struct crypt_op *cop) * we should introduce a flag to switch... TBD later on. */ if (cop->op == COP_ENCRYPT) { - if (ses_ptr->hdata.type != 0) { + if (ses_ptr->hdata.init != 0) { ret = cryptodev_hash_update(&ses_ptr->hdata, &sg, current_len); if (unlikely(ret)) { dprintk(0, KERN_ERR, "CryptoAPI failure: %d\n",ret); goto out; } } - if (ses_ptr->cdata.type != 0) { + if (ses_ptr->cdata.init != 0) { ret = cryptodev_cipher_encrypt( &ses_ptr->cdata, &sg, &sg, current_len); if (unlikely(ret)) { @@ -429,7 +429,7 @@ crypto_run(struct fcrypt *fcr, struct crypt_op *cop) dst += current_len; } } else { - if (ses_ptr->cdata.type != 0) { + if (ses_ptr->cdata.init != 0) { ret = cryptodev_cipher_decrypt( &ses_ptr->cdata, &sg, &sg, current_len); if (unlikely(ret)) { @@ -441,7 +441,7 @@ crypto_run(struct fcrypt *fcr, struct crypt_op *cop) } - if (ses_ptr->hdata.type != 0) { + if (ses_ptr->hdata.init != 0) { ret = cryptodev_hash_update(&ses_ptr->hdata, &sg, current_len); if (unlikely(ret)) { dprintk(0, KERN_ERR, "CryptoAPI failure: %d\n",ret); @@ -454,7 +454,7 @@ crypto_run(struct fcrypt *fcr, struct crypt_op *cop) src += current_len; } - if (ses_ptr->hdata.type != 0) { + if (ses_ptr->hdata.init != 0) { ret = cryptodev_hash_final(&ses_ptr->hdata, hash_output); if (unlikely(ret)) { dprintk(0, KERN_ERR, "CryptoAPI failure: %d\n",ret); |