summaryrefslogtreecommitdiff
path: root/include/crypto/skcipher.h
blob: 5989855d1894bf28efa883a07d38233061af9399 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
/*
 * Symmetric key ciphers.
 * 
 * Copyright (c) 2007-2015 Herbert Xu <herbert@gondor.apana.org.au>
 *
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the Free
 * Software Foundation; either version 2 of the License, or (at your option) 
 * any later version.
 *
 */

#ifndef _CRYPTO_SKCIPHER_H
#define _CRYPTO_SKCIPHER_H

#include <linux/crypto.h>

struct crypto_skcipher;
struct skcipher_request;

struct skcipher_alg {
	struct crypto_alg base;
};

int crypto_register_skcipher(struct skcipher_alg *alg);

struct crypto_skcipher {
	int (*setkey)(struct crypto_skcipher *tfm, const u8 *key,
	              unsigned int keylen);
	int (*encrypt)(struct skcipher_request *req);
	int (*decrypt)(struct skcipher_request *req);

	unsigned		ivsize;
	unsigned		keysize;

	struct crypto_tfm	base;
};

struct crypto_sync_skcipher {
	struct crypto_skcipher base;
};

struct crypto_skcipher *crypto_alloc_skcipher(const char *alg_name,
					      u32 type, u32 mask);

static inline struct crypto_sync_skcipher *
crypto_alloc_sync_skcipher(const char *alg_name, u32 type, u32 mask)
{
	return (void *) crypto_alloc_skcipher(alg_name, type, mask);
}

static inline void crypto_free_skcipher(struct crypto_skcipher *tfm)
{
	kfree(tfm);
}

static inline void crypto_free_sync_skcipher(struct crypto_sync_skcipher *tfm)
{
	crypto_free_skcipher(&tfm->base);
}

struct skcipher_request {
	unsigned		cryptlen;
	u8			*iv;

	struct scatterlist	*src;
	struct scatterlist	*dst;

	struct crypto_tfm	*tfm;
};

#define MAX_SYNC_SKCIPHER_REQSIZE      384
#define SYNC_SKCIPHER_REQUEST_ON_STACK(name, tfm) \
	char __##name##_desc[sizeof(struct skcipher_request) + \
			     MAX_SYNC_SKCIPHER_REQSIZE + \
			     (!(sizeof((struct crypto_sync_skcipher *)1 == \
				       (typeof(tfm))1))) \
			    ] CRYPTO_MINALIGN_ATTR; \
	struct skcipher_request *name = (void *)__##name##_desc

static inline int crypto_skcipher_setkey(struct crypto_skcipher *tfm,
					 const u8 *key, unsigned int keylen)
{
	return tfm->setkey(tfm, key, keylen);
}

static inline struct crypto_skcipher *crypto_skcipher_reqtfm(
	struct skcipher_request *req)
{
	return container_of(req->tfm, struct crypto_skcipher, base);
}

static inline int crypto_skcipher_encrypt(struct skcipher_request *req)
{
	return crypto_skcipher_reqtfm(req)->encrypt(req);
}

static inline int crypto_skcipher_decrypt(struct skcipher_request *req)
{
	return crypto_skcipher_reqtfm(req)->decrypt(req);
}

static inline void skcipher_request_set_tfm(struct skcipher_request *req,
					    struct crypto_skcipher *tfm)
{
	req->tfm = &tfm->base;
}

static inline void skcipher_request_set_sync_tfm(struct skcipher_request *req,
					    struct crypto_sync_skcipher *tfm)
{
	skcipher_request_set_tfm(req, &tfm->base);
}

static inline void skcipher_request_set_crypt(
	struct skcipher_request *req,
	struct scatterlist *src, struct scatterlist *dst,
	unsigned int cryptlen, void *iv)
{
	req->src	= src;
	req->dst	= dst;
	req->cryptlen	= cryptlen;
	req->iv		= iv;
}

#endif	/* _CRYPTO_SKCIPHER_H */