diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2016-12-09 14:33:51 +0000 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2016-12-27 17:47:31 +0800 |
commit | 9ae433bc79f97bae221d53bb1a8e21415ea58625 (patch) | |
tree | a6eb8988adfcc7ba73bdca2b580db55a31e3077f /include/crypto | |
parent | 8096667273477e735b0072b11a6d617ccee45e5f (diff) | |
download | op-kernel-dev-9ae433bc79f97bae221d53bb1a8e21415ea58625.zip op-kernel-dev-9ae433bc79f97bae221d53bb1a8e21415ea58625.tar.gz |
crypto: chacha20 - convert generic and x86 versions to skcipher
This converts the ChaCha20 code from a blkcipher to a skcipher, which
is now the preferred way to implement symmetric block and stream ciphers.
This ports the generic and x86 versions at the same time because the
latter reuses routines of the former.
Note that the skcipher_walk() API guarantees that all presented blocks
except the final one are a multiple of the chunk size, so we can simplify
the encrypt() routine somewhat.
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'include/crypto')
-rw-r--r-- | include/crypto/chacha20.h | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/include/crypto/chacha20.h b/include/crypto/chacha20.h index 20d20f68..445fc45 100644 --- a/include/crypto/chacha20.h +++ b/include/crypto/chacha20.h @@ -5,6 +5,7 @@ #ifndef _CRYPTO_CHACHA20_H #define _CRYPTO_CHACHA20_H +#include <crypto/skcipher.h> #include <linux/types.h> #include <linux/crypto.h> @@ -18,9 +19,8 @@ struct chacha20_ctx { void chacha20_block(u32 *state, void *stream); void crypto_chacha20_init(u32 *state, struct chacha20_ctx *ctx, u8 *iv); -int crypto_chacha20_setkey(struct crypto_tfm *tfm, const u8 *key, +int crypto_chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize); -int crypto_chacha20_crypt(struct blkcipher_desc *desc, struct scatterlist *dst, - struct scatterlist *src, unsigned int nbytes); +int crypto_chacha20_crypt(struct skcipher_request *req); #endif |