Blame view

kernel/linux-imx6_3.14.28/include/crypto/skcipher.h 2.74 KB
6b13f685e   김민수   BSP 최초 추가
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
  /*
   * Symmetric key ciphers.
   * 
   * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>
   *
   * This program is free software; you can redistribute it and/or modify it
   * under the terms of the GNU General Public License as published by the Free
   * Software Foundation; either version 2 of the License, or (at your option) 
   * any later version.
   *
   */
  
  #ifndef _CRYPTO_SKCIPHER_H
  #define _CRYPTO_SKCIPHER_H
  
  #include <linux/crypto.h>
  #include <linux/kernel.h>
  #include <linux/slab.h>
  
  /**
   *	struct skcipher_givcrypt_request - Crypto request with IV generation
   *	@seq: Sequence number for IV generation
   *	@giv: Space for generated IV
   *	@creq: The crypto request itself
   */
  struct skcipher_givcrypt_request {
  	u64 seq;
  	u8 *giv;
  
  	struct ablkcipher_request creq;
  };
  
  static inline struct crypto_ablkcipher *skcipher_givcrypt_reqtfm(
  	struct skcipher_givcrypt_request *req)
  {
  	return crypto_ablkcipher_reqtfm(&req->creq);
  }
  
  static inline int crypto_skcipher_givencrypt(
  	struct skcipher_givcrypt_request *req)
  {
  	struct ablkcipher_tfm *crt =
  		crypto_ablkcipher_crt(skcipher_givcrypt_reqtfm(req));
  	return crt->givencrypt(req);
  };
  
  static inline int crypto_skcipher_givdecrypt(
  	struct skcipher_givcrypt_request *req)
  {
  	struct ablkcipher_tfm *crt =
  		crypto_ablkcipher_crt(skcipher_givcrypt_reqtfm(req));
  	return crt->givdecrypt(req);
  };
  
  static inline void skcipher_givcrypt_set_tfm(
  	struct skcipher_givcrypt_request *req, struct crypto_ablkcipher *tfm)
  {
  	req->creq.base.tfm = crypto_ablkcipher_tfm(tfm);
  }
  
  static inline struct skcipher_givcrypt_request *skcipher_givcrypt_cast(
  	struct crypto_async_request *req)
  {
  	return container_of(ablkcipher_request_cast(req),
  			    struct skcipher_givcrypt_request, creq);
  }
  
  static inline struct skcipher_givcrypt_request *skcipher_givcrypt_alloc(
  	struct crypto_ablkcipher *tfm, gfp_t gfp)
  {
  	struct skcipher_givcrypt_request *req;
  
  	req = kmalloc(sizeof(struct skcipher_givcrypt_request) +
  		      crypto_ablkcipher_reqsize(tfm), gfp);
  
  	if (likely(req))
  		skcipher_givcrypt_set_tfm(req, tfm);
  
  	return req;
  }
  
  static inline void skcipher_givcrypt_free(struct skcipher_givcrypt_request *req)
  {
  	kfree(req);
  }
  
  static inline void skcipher_givcrypt_set_callback(
  	struct skcipher_givcrypt_request *req, u32 flags,
  	crypto_completion_t complete, void *data)
  {
  	ablkcipher_request_set_callback(&req->creq, flags, complete, data);
  }
  
  static inline void skcipher_givcrypt_set_crypt(
  	struct skcipher_givcrypt_request *req,
  	struct scatterlist *src, struct scatterlist *dst,
  	unsigned int nbytes, void *iv)
  {
  	ablkcipher_request_set_crypt(&req->creq, src, dst, nbytes, iv);
  }
  
  static inline void skcipher_givcrypt_set_giv(
  	struct skcipher_givcrypt_request *req, u8 *giv, u64 seq)
  {
  	req->giv = giv;
  	req->seq = seq;
  }
  
  #endif	/* _CRYPTO_SKCIPHER_H */