mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-21 19:53:59 +08:00
560c06ae1a
Now that the tfm is passed directly to setkey instead of the ctx, we no longer need to pass the &tfm->crt_flags pointer. This patch also gets rid of a few unnecessary checks on the key length for ciphers as the cipher layer guarantees that the key length is within the bounds specified by the algorithm. Rather than testing dia_setkey every time, this patch does it only once during crypto_alloc_tfm. The redundant check from crypto_digest_setkey is also removed. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
23 lines
613 B
C
23 lines
613 B
C
#ifndef _CRYPTO_TWOFISH_H
|
|
#define _CRYPTO_TWOFISH_H
|
|
|
|
#include <linux/types.h>
|
|
|
|
#define TF_MIN_KEY_SIZE 16
|
|
#define TF_MAX_KEY_SIZE 32
|
|
#define TF_BLOCK_SIZE 16
|
|
|
|
struct crypto_tfm;
|
|
|
|
/* Structure for an expanded Twofish key. s contains the key-dependent
|
|
* S-boxes composed with the MDS matrix; w contains the eight "whitening"
|
|
* subkeys, K[0] through K[7]. k holds the remaining, "round" subkeys. Note
|
|
* that k[i] corresponds to what the Twofish paper calls K[i+8]. */
|
|
struct twofish_ctx {
|
|
u32 s[4][256], w[8], k[32];
|
|
};
|
|
|
|
int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
|
|
|
|
#endif
|