summaryrefslogtreecommitdiff
path: root/linux
diff options
context:
space:
mode:
authorKent Overstreet <kent.overstreet@gmail.com>2019-04-04 22:15:36 -0400
committerKent Overstreet <kent.overstreet@gmail.com>2019-04-04 22:25:40 -0400
commitd13bbb2955f899f10be4ab315ad229d2951fdcda (patch)
treed84a27d61361ac6b884c8c6decabfbaed02a7be0 /linux
parentbe02db130bf75c28e402d890f4d994f3608707ff (diff)
Update bcachefs sources to d83b992f65 bcachefs: Rewrite journal_seq_blacklist machinery
Diffstat (limited to 'linux')
-rw-r--r--linux/crypto/chacha20_generic.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/linux/crypto/chacha20_generic.c b/linux/crypto/chacha20_generic.c
index c6f14945..914189e7 100644
--- a/linux/crypto/chacha20_generic.c
+++ b/linux/crypto/chacha20_generic.c
@@ -17,7 +17,7 @@
#include <linux/crypto.h>
#include <crypto/algapi.h>
-#include <crypto/chacha20.h>
+#include <crypto/chacha.h>
#include <crypto/skcipher.h>
#include <sodium/crypto_stream_chacha20.h>
@@ -36,7 +36,7 @@ static int crypto_chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key,
container_of(tfm, struct chacha20_tfm, tfm);
int i;
- if (keysize != CHACHA20_KEY_SIZE)
+ if (keysize != CHACHA_KEY_SIZE)
return -EINVAL;
for (i = 0; i < ARRAY_SIZE(ctx->key); i++)
@@ -72,8 +72,8 @@ static int crypto_chacha20_crypt(struct skcipher_request *req)
if (sg_is_last(sg))
break;
- BUG_ON(sg->length % CHACHA20_BLOCK_SIZE);
- iv[0] += sg->length / CHACHA20_BLOCK_SIZE;
+ BUG_ON(sg->length % CHACHA_BLOCK_SIZE);
+ iv[0] += sg->length / CHACHA_BLOCK_SIZE;
sg = sg_next(sg);
};
@@ -93,8 +93,8 @@ static void *crypto_chacha20_alloc_tfm(void)
tfm->tfm.setkey = crypto_chacha20_setkey;
tfm->tfm.encrypt = crypto_chacha20_crypt;
tfm->tfm.decrypt = crypto_chacha20_crypt;
- tfm->tfm.ivsize = CHACHA20_IV_SIZE;
- tfm->tfm.keysize = CHACHA20_KEY_SIZE;
+ tfm->tfm.ivsize = CHACHA_IV_SIZE;
+ tfm->tfm.keysize = CHACHA_KEY_SIZE;
return tfm;
}