diff options
author | Miloslav Trmač <mitr@redhat.com> | 2010-09-06 20:40:43 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2010-09-06 23:15:24 +0200 |
commit | 95496890180536231adfb983dc67c629f26f0caf (patch) | |
tree | d0cdb577dac177d42d2e048fe75544679c8a2d20 /ncr-key.c | |
parent | a92443718f19ffc36fbe55d85a4785130a4b33c7 (diff) | |
download | cryptodev-linux-95496890180536231adfb983dc67c629f26f0caf.tar.gz cryptodev-linux-95496890180536231adfb983dc67c629f26f0caf.tar.xz cryptodev-linux-95496890180536231adfb983dc67c629f26f0caf.zip |
Rename CONFIG_AS*YM*METRIC, push into headers
Diffstat (limited to 'ncr-key.c')
-rw-r--r-- | ncr-key.c | 23 |
1 files changed, 6 insertions, 17 deletions
@@ -251,7 +251,6 @@ int ncr_key_export(struct ncr_lists *lst, const struct ncr_key_export *data, ret = item->key.secret.size; break; -#ifdef CONFIG_ASSYMETRIC case NCR_KEY_TYPE_PUBLIC: case NCR_KEY_TYPE_PRIVATE: tmp_size = data->buffer_size; @@ -278,7 +277,6 @@ int ncr_key_export(struct ncr_lists *lst, const struct ncr_key_export *data, ret = tmp_size; break; -#endif default: err(); ret = -EINVAL; @@ -382,7 +380,6 @@ int ncr_key_import(struct ncr_lists *lst, const struct ncr_key_import *data, memcpy(item->key.secret.data, tmp, tmp_size); item->key.secret.size = tmp_size; break; -#ifdef CONFIG_ASSYMETRIC case NCR_KEY_TYPE_PRIVATE: case NCR_KEY_TYPE_PUBLIC: ret = ncr_pk_unpack(item, tmp, tmp_size); @@ -391,7 +388,6 @@ int ncr_key_import(struct ncr_lists *lst, const struct ncr_key_import *data, goto fail; } break; -#endif default: err(); ret = -EINVAL; @@ -411,13 +407,10 @@ fail: void ncr_key_clear(struct key_item_st *item) { /* clears any previously allocated parameters */ -#ifdef CONFIG_ASSYMETRIC if (item->type == NCR_KEY_TYPE_PRIVATE || item->type == NCR_KEY_TYPE_PUBLIC) { - ncr_pk_clear(item); } -#endif memset(&item->key, 0, sizeof(item->key)); memset(item->key_id, 0, sizeof(item->key_id)); item->key_id_size = 0; @@ -501,7 +494,7 @@ fail: return ret; } -#ifdef CONFIG_ASSYMETRIC +#ifdef CONFIG_CRYPTO_USERSPACE_ASYMMETRIC /* Those values are derived from "ECRYPT II Yearly Report on Algorithms and * Keysizes (2009-2010)". It maps the strength of public key algorithms to @@ -561,7 +554,7 @@ static unsigned int dlog_to_bits(unsigned int dlog_bits) return ecrypt_vals[i - 1].bits; } -#endif +#endif /* CONFIG_CRYPTO_USERSPACE_ASYMMETRIC */ /* returns the security level of the key in bits. Private/Public keys * are mapped to symmetric key bits using the ECRYPT II 2010 recommendation. @@ -576,7 +569,7 @@ int _ncr_key_get_sec_level(struct key_item_st *item) return 112; return item->key.secret.size * 8; -#ifdef CONFIG_ASSYMETRIC +#ifdef CONFIG_CRYPTO_USERSPACE_ASYMMETRIC } else if (item->type == NCR_KEY_TYPE_PRIVATE) { int bits; @@ -608,7 +601,7 @@ int _ncr_key_get_sec_level(struct key_item_st *item) default: return -EINVAL; } -#endif +#endif /* CONFIG_CRYPTO_USERSPACE_ASYMMETRIC */ } else { return -EINVAL; } @@ -676,11 +669,11 @@ fail: return ret; } +#ifdef CONFIG_CRYPTO_USERSPACE_ASYMMETRIC int ncr_key_generate_pair(struct ncr_lists *lst, const struct ncr_key_generate_pair *gen, struct nlattr *tb[]) { -#ifdef CONFIG_ASSYMETRIC struct key_item_st *private = NULL; struct key_item_st *public = NULL; int ret; @@ -748,10 +741,8 @@ fail: _ncr_key_item_put(private); } return ret; -#else - return -EOPNOTSUPP; -#endif } +#endif /* CONFIG_CRYPTO_USERSPACE_ASYMMETRIC */ int ncr_key_derive(struct ncr_lists *lst, const struct ncr_key_derive *data, struct nlattr *tb[]) @@ -790,7 +781,6 @@ int ncr_key_derive(struct ncr_lists *lst, const struct ncr_key_derive *data, } switch (key->type) { -#ifdef CONFIG_ASSYMETRIC case NCR_KEY_TYPE_PUBLIC: case NCR_KEY_TYPE_PRIVATE: ret = ncr_pk_derive(newkey, key, tb); @@ -799,7 +789,6 @@ int ncr_key_derive(struct ncr_lists *lst, const struct ncr_key_derive *data, goto fail; } break; -#endif default: err(); ret = -EINVAL; |