diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2006-08-05 02:28:19 -0400 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2006-09-20 21:46:16 -0400 |
commit | efcf8023e299be605f217dc2c1b2754b5534569c (patch) | |
tree | 36baba6406dd270f64c4e039811893877f9f0499 /arch/s390 | |
parent | f12cc2090d721647c23dfce20834f4306db3b77d (diff) |
[CRYPTO] drivers: Remove obsolete block cipher operations
This patch removes obsolete block operations of the simple cipher type
from drivers. These were preserved so that existing users can make a
smooth transition. Now that the transition is complete, they are no
longer needed.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'arch/s390')
-rw-r--r-- | arch/s390/crypto/aes_s390.c | 112 | ||||
-rw-r--r-- | arch/s390/crypto/des_s390.c | 203 |
2 files changed, 0 insertions, 315 deletions
diff --git a/arch/s390/crypto/aes_s390.c b/arch/s390/crypto/aes_s390.c index 8f04b4e41b55..15c9eec02928 100644 --- a/arch/s390/crypto/aes_s390.c +++ b/arch/s390/crypto/aes_s390.c | |||
@@ -113,114 +113,6 @@ static void aes_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) | |||
113 | } | 113 | } |
114 | } | 114 | } |
115 | 115 | ||
116 | static unsigned int aes_encrypt_ecb(const struct cipher_desc *desc, u8 *out, | ||
117 | const u8 *in, unsigned int nbytes) | ||
118 | { | ||
119 | struct s390_aes_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
120 | int ret; | ||
121 | |||
122 | /* only use complete blocks */ | ||
123 | nbytes &= ~(AES_BLOCK_SIZE - 1); | ||
124 | |||
125 | switch (sctx->key_len) { | ||
126 | case 16: | ||
127 | ret = crypt_s390_km(KM_AES_128_ENCRYPT, &sctx->key, out, in, nbytes); | ||
128 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
129 | break; | ||
130 | case 24: | ||
131 | ret = crypt_s390_km(KM_AES_192_ENCRYPT, &sctx->key, out, in, nbytes); | ||
132 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
133 | break; | ||
134 | case 32: | ||
135 | ret = crypt_s390_km(KM_AES_256_ENCRYPT, &sctx->key, out, in, nbytes); | ||
136 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
137 | break; | ||
138 | } | ||
139 | return nbytes; | ||
140 | } | ||
141 | |||
142 | static unsigned int aes_decrypt_ecb(const struct cipher_desc *desc, u8 *out, | ||
143 | const u8 *in, unsigned int nbytes) | ||
144 | { | ||
145 | struct s390_aes_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
146 | int ret; | ||
147 | |||
148 | /* only use complete blocks */ | ||
149 | nbytes &= ~(AES_BLOCK_SIZE - 1); | ||
150 | |||
151 | switch (sctx->key_len) { | ||
152 | case 16: | ||
153 | ret = crypt_s390_km(KM_AES_128_DECRYPT, &sctx->key, out, in, nbytes); | ||
154 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
155 | break; | ||
156 | case 24: | ||
157 | ret = crypt_s390_km(KM_AES_192_DECRYPT, &sctx->key, out, in, nbytes); | ||
158 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
159 | break; | ||
160 | case 32: | ||
161 | ret = crypt_s390_km(KM_AES_256_DECRYPT, &sctx->key, out, in, nbytes); | ||
162 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
163 | break; | ||
164 | } | ||
165 | return nbytes; | ||
166 | } | ||
167 | |||
168 | static unsigned int aes_encrypt_cbc(const struct cipher_desc *desc, u8 *out, | ||
169 | const u8 *in, unsigned int nbytes) | ||
170 | { | ||
171 | struct s390_aes_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
172 | int ret; | ||
173 | |||
174 | /* only use complete blocks */ | ||
175 | nbytes &= ~(AES_BLOCK_SIZE - 1); | ||
176 | |||
177 | memcpy(&sctx->iv, desc->info, AES_BLOCK_SIZE); | ||
178 | switch (sctx->key_len) { | ||
179 | case 16: | ||
180 | ret = crypt_s390_kmc(KMC_AES_128_ENCRYPT, &sctx->iv, out, in, nbytes); | ||
181 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
182 | break; | ||
183 | case 24: | ||
184 | ret = crypt_s390_kmc(KMC_AES_192_ENCRYPT, &sctx->iv, out, in, nbytes); | ||
185 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
186 | break; | ||
187 | case 32: | ||
188 | ret = crypt_s390_kmc(KMC_AES_256_ENCRYPT, &sctx->iv, out, in, nbytes); | ||
189 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
190 | break; | ||
191 | } | ||
192 | memcpy(desc->info, &sctx->iv, AES_BLOCK_SIZE); | ||
193 | |||
194 | return nbytes; | ||
195 | } | ||
196 | |||
197 | static unsigned int aes_decrypt_cbc(const struct cipher_desc *desc, u8 *out, | ||
198 | const u8 *in, unsigned int nbytes) | ||
199 | { | ||
200 | struct s390_aes_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
201 | int ret; | ||
202 | |||
203 | /* only use complete blocks */ | ||
204 | nbytes &= ~(AES_BLOCK_SIZE - 1); | ||
205 | |||
206 | memcpy(&sctx->iv, desc->info, AES_BLOCK_SIZE); | ||
207 | switch (sctx->key_len) { | ||
208 | case 16: | ||
209 | ret = crypt_s390_kmc(KMC_AES_128_DECRYPT, &sctx->iv, out, in, nbytes); | ||
210 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
211 | break; | ||
212 | case 24: | ||
213 | ret = crypt_s390_kmc(KMC_AES_192_DECRYPT, &sctx->iv, out, in, nbytes); | ||
214 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
215 | break; | ||
216 | case 32: | ||
217 | ret = crypt_s390_kmc(KMC_AES_256_DECRYPT, &sctx->iv, out, in, nbytes); | ||
218 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
219 | break; | ||
220 | } | ||
221 | return nbytes; | ||
222 | } | ||
223 | |||
224 | 116 | ||
225 | static struct crypto_alg aes_alg = { | 117 | static struct crypto_alg aes_alg = { |
226 | .cra_name = "aes", | 118 | .cra_name = "aes", |
@@ -238,10 +130,6 @@ static struct crypto_alg aes_alg = { | |||
238 | .cia_setkey = aes_set_key, | 130 | .cia_setkey = aes_set_key, |
239 | .cia_encrypt = aes_encrypt, | 131 | .cia_encrypt = aes_encrypt, |
240 | .cia_decrypt = aes_decrypt, | 132 | .cia_decrypt = aes_decrypt, |
241 | .cia_encrypt_ecb = aes_encrypt_ecb, | ||
242 | .cia_decrypt_ecb = aes_decrypt_ecb, | ||
243 | .cia_encrypt_cbc = aes_encrypt_cbc, | ||
244 | .cia_decrypt_cbc = aes_decrypt_cbc, | ||
245 | } | 133 | } |
246 | } | 134 | } |
247 | }; | 135 | }; |
diff --git a/arch/s390/crypto/des_s390.c b/arch/s390/crypto/des_s390.c index a6d2385ccb7a..2aba04852fe3 100644 --- a/arch/s390/crypto/des_s390.c +++ b/arch/s390/crypto/des_s390.c | |||
@@ -73,67 +73,6 @@ static void des_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) | |||
73 | crypt_s390_km(KM_DEA_DECRYPT, dctx->key, out, in, DES_BLOCK_SIZE); | 73 | crypt_s390_km(KM_DEA_DECRYPT, dctx->key, out, in, DES_BLOCK_SIZE); |
74 | } | 74 | } |
75 | 75 | ||
76 | static unsigned int des_encrypt_ecb(const struct cipher_desc *desc, u8 *out, | ||
77 | const u8 *in, unsigned int nbytes) | ||
78 | { | ||
79 | struct crypt_s390_des_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
80 | int ret; | ||
81 | |||
82 | /* only use complete blocks */ | ||
83 | nbytes &= ~(DES_BLOCK_SIZE - 1); | ||
84 | ret = crypt_s390_km(KM_DEA_ENCRYPT, sctx->key, out, in, nbytes); | ||
85 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
86 | |||
87 | return nbytes; | ||
88 | } | ||
89 | |||
90 | static unsigned int des_decrypt_ecb(const struct cipher_desc *desc, u8 *out, | ||
91 | const u8 *in, unsigned int nbytes) | ||
92 | { | ||
93 | struct crypt_s390_des_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
94 | int ret; | ||
95 | |||
96 | /* only use complete blocks */ | ||
97 | nbytes &= ~(DES_BLOCK_SIZE - 1); | ||
98 | ret = crypt_s390_km(KM_DEA_DECRYPT, sctx->key, out, in, nbytes); | ||
99 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
100 | |||
101 | return nbytes; | ||
102 | } | ||
103 | |||
104 | static unsigned int des_encrypt_cbc(const struct cipher_desc *desc, u8 *out, | ||
105 | const u8 *in, unsigned int nbytes) | ||
106 | { | ||
107 | struct crypt_s390_des_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
108 | int ret; | ||
109 | |||
110 | /* only use complete blocks */ | ||
111 | nbytes &= ~(DES_BLOCK_SIZE - 1); | ||
112 | |||
113 | memcpy(sctx->iv, desc->info, DES_BLOCK_SIZE); | ||
114 | ret = crypt_s390_kmc(KMC_DEA_ENCRYPT, &sctx->iv, out, in, nbytes); | ||
115 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
116 | |||
117 | memcpy(desc->info, sctx->iv, DES_BLOCK_SIZE); | ||
118 | return nbytes; | ||
119 | } | ||
120 | |||
121 | static unsigned int des_decrypt_cbc(const struct cipher_desc *desc, u8 *out, | ||
122 | const u8 *in, unsigned int nbytes) | ||
123 | { | ||
124 | struct crypt_s390_des_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
125 | int ret; | ||
126 | |||
127 | /* only use complete blocks */ | ||
128 | nbytes &= ~(DES_BLOCK_SIZE - 1); | ||
129 | |||
130 | memcpy(&sctx->iv, desc->info, DES_BLOCK_SIZE); | ||
131 | ret = crypt_s390_kmc(KMC_DEA_DECRYPT, &sctx->iv, out, in, nbytes); | ||
132 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
133 | |||
134 | return nbytes; | ||
135 | } | ||
136 | |||
137 | static struct crypto_alg des_alg = { | 76 | static struct crypto_alg des_alg = { |
138 | .cra_name = "des", | 77 | .cra_name = "des", |
139 | .cra_driver_name = "des-s390", | 78 | .cra_driver_name = "des-s390", |
@@ -150,10 +89,6 @@ static struct crypto_alg des_alg = { | |||
150 | .cia_setkey = des_setkey, | 89 | .cia_setkey = des_setkey, |
151 | .cia_encrypt = des_encrypt, | 90 | .cia_encrypt = des_encrypt, |
152 | .cia_decrypt = des_decrypt, | 91 | .cia_decrypt = des_decrypt, |
153 | .cia_encrypt_ecb = des_encrypt_ecb, | ||
154 | .cia_decrypt_ecb = des_decrypt_ecb, | ||
155 | .cia_encrypt_cbc = des_encrypt_cbc, | ||
156 | .cia_decrypt_cbc = des_decrypt_cbc, | ||
157 | } | 92 | } |
158 | } | 93 | } |
159 | }; | 94 | }; |
@@ -344,71 +279,6 @@ static void des3_128_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) | |||
344 | DES3_128_BLOCK_SIZE); | 279 | DES3_128_BLOCK_SIZE); |
345 | } | 280 | } |
346 | 281 | ||
347 | static unsigned int des3_128_encrypt_ecb(const struct cipher_desc *desc, | ||
348 | u8 *out, const u8 *in, | ||
349 | unsigned int nbytes) | ||
350 | { | ||
351 | struct crypt_s390_des3_128_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
352 | int ret; | ||
353 | |||
354 | /* only use complete blocks */ | ||
355 | nbytes &= ~(DES3_128_BLOCK_SIZE - 1); | ||
356 | ret = crypt_s390_km(KM_TDEA_128_ENCRYPT, sctx->key, out, in, nbytes); | ||
357 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
358 | |||
359 | return nbytes; | ||
360 | } | ||
361 | |||
362 | static unsigned int des3_128_decrypt_ecb(const struct cipher_desc *desc, | ||
363 | u8 *out, const u8 *in, | ||
364 | unsigned int nbytes) | ||
365 | { | ||
366 | struct crypt_s390_des3_128_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
367 | int ret; | ||
368 | |||
369 | /* only use complete blocks */ | ||
370 | nbytes &= ~(DES3_128_BLOCK_SIZE - 1); | ||
371 | ret = crypt_s390_km(KM_TDEA_128_DECRYPT, sctx->key, out, in, nbytes); | ||
372 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
373 | |||
374 | return nbytes; | ||
375 | } | ||
376 | |||
377 | static unsigned int des3_128_encrypt_cbc(const struct cipher_desc *desc, | ||
378 | u8 *out, const u8 *in, | ||
379 | unsigned int nbytes) | ||
380 | { | ||
381 | struct crypt_s390_des3_128_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
382 | int ret; | ||
383 | |||
384 | /* only use complete blocks */ | ||
385 | nbytes &= ~(DES3_128_BLOCK_SIZE - 1); | ||
386 | |||
387 | memcpy(sctx->iv, desc->info, DES3_128_BLOCK_SIZE); | ||
388 | ret = crypt_s390_kmc(KMC_TDEA_128_ENCRYPT, &sctx->iv, out, in, nbytes); | ||
389 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
390 | |||
391 | memcpy(desc->info, sctx->iv, DES3_128_BLOCK_SIZE); | ||
392 | return nbytes; | ||
393 | } | ||
394 | |||
395 | static unsigned int des3_128_decrypt_cbc(const struct cipher_desc *desc, | ||
396 | u8 *out, const u8 *in, | ||
397 | unsigned int nbytes) | ||
398 | { | ||
399 | struct crypt_s390_des3_128_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
400 | int ret; | ||
401 | |||
402 | /* only use complete blocks */ | ||
403 | nbytes &= ~(DES3_128_BLOCK_SIZE - 1); | ||
404 | |||
405 | memcpy(&sctx->iv, desc->info, DES3_128_BLOCK_SIZE); | ||
406 | ret = crypt_s390_kmc(KMC_TDEA_128_DECRYPT, &sctx->iv, out, in, nbytes); | ||
407 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
408 | |||
409 | return nbytes; | ||
410 | } | ||
411 | |||
412 | static struct crypto_alg des3_128_alg = { | 282 | static struct crypto_alg des3_128_alg = { |
413 | .cra_name = "des3_ede128", | 283 | .cra_name = "des3_ede128", |
414 | .cra_driver_name = "des3_ede128-s390", | 284 | .cra_driver_name = "des3_ede128-s390", |
@@ -425,10 +295,6 @@ static struct crypto_alg des3_128_alg = { | |||
425 | .cia_setkey = des3_128_setkey, | 295 | .cia_setkey = des3_128_setkey, |
426 | .cia_encrypt = des3_128_encrypt, | 296 | .cia_encrypt = des3_128_encrypt, |
427 | .cia_decrypt = des3_128_decrypt, | 297 | .cia_decrypt = des3_128_decrypt, |
428 | .cia_encrypt_ecb = des3_128_encrypt_ecb, | ||
429 | .cia_decrypt_ecb = des3_128_decrypt_ecb, | ||
430 | .cia_encrypt_cbc = des3_128_encrypt_cbc, | ||
431 | .cia_decrypt_cbc = des3_128_decrypt_cbc, | ||
432 | } | 298 | } |
433 | } | 299 | } |
434 | }; | 300 | }; |
@@ -575,71 +441,6 @@ static void des3_192_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) | |||
575 | DES3_192_BLOCK_SIZE); | 441 | DES3_192_BLOCK_SIZE); |
576 | } | 442 | } |
577 | 443 | ||
578 | static unsigned int des3_192_encrypt_ecb(const struct cipher_desc *desc, | ||
579 | u8 *out, const u8 *in, | ||
580 | unsigned int nbytes) | ||
581 | { | ||
582 | struct crypt_s390_des3_192_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
583 | int ret; | ||
584 | |||
585 | /* only use complete blocks */ | ||
586 | nbytes &= ~(DES3_192_BLOCK_SIZE - 1); | ||
587 | ret = crypt_s390_km(KM_TDEA_192_ENCRYPT, sctx->key, out, in, nbytes); | ||
588 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
589 | |||
590 | return nbytes; | ||
591 | } | ||
592 | |||
593 | static unsigned int des3_192_decrypt_ecb(const struct cipher_desc *desc, | ||
594 | u8 *out, const u8 *in, | ||
595 | unsigned int nbytes) | ||
596 | { | ||
597 | struct crypt_s390_des3_192_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
598 | int ret; | ||
599 | |||
600 | /* only use complete blocks */ | ||
601 | nbytes &= ~(DES3_192_BLOCK_SIZE - 1); | ||
602 | ret = crypt_s390_km(KM_TDEA_192_DECRYPT, sctx->key, out, in, nbytes); | ||
603 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
604 | |||
605 | return nbytes; | ||
606 | } | ||
607 | |||
608 | static unsigned int des3_192_encrypt_cbc(const struct cipher_desc *desc, | ||
609 | u8 *out, const u8 *in, | ||
610 | unsigned int nbytes) | ||
611 | { | ||
612 | struct crypt_s390_des3_192_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
613 | int ret; | ||
614 | |||
615 | /* only use complete blocks */ | ||
616 | nbytes &= ~(DES3_192_BLOCK_SIZE - 1); | ||
617 | |||
618 | memcpy(sctx->iv, desc->info, DES3_192_BLOCK_SIZE); | ||
619 | ret = crypt_s390_kmc(KMC_TDEA_192_ENCRYPT, &sctx->iv, out, in, nbytes); | ||
620 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
621 | |||
622 | memcpy(desc->info, sctx->iv, DES3_192_BLOCK_SIZE); | ||
623 | return nbytes; | ||
624 | } | ||
625 | |||
626 | static unsigned int des3_192_decrypt_cbc(const struct cipher_desc *desc, | ||
627 | u8 *out, const u8 *in, | ||
628 | unsigned int nbytes) | ||
629 | { | ||
630 | struct crypt_s390_des3_192_ctx *sctx = crypto_tfm_ctx(desc->tfm); | ||
631 | int ret; | ||
632 | |||
633 | /* only use complete blocks */ | ||
634 | nbytes &= ~(DES3_192_BLOCK_SIZE - 1); | ||
635 | |||
636 | memcpy(&sctx->iv, desc->info, DES3_192_BLOCK_SIZE); | ||
637 | ret = crypt_s390_kmc(KMC_TDEA_192_DECRYPT, &sctx->iv, out, in, nbytes); | ||
638 | BUG_ON((ret < 0) || (ret != nbytes)); | ||
639 | |||
640 | return nbytes; | ||
641 | } | ||
642 | |||
643 | static struct crypto_alg des3_192_alg = { | 444 | static struct crypto_alg des3_192_alg = { |
644 | .cra_name = "des3_ede", | 445 | .cra_name = "des3_ede", |
645 | .cra_driver_name = "des3_ede-s390", | 446 | .cra_driver_name = "des3_ede-s390", |
@@ -656,10 +457,6 @@ static struct crypto_alg des3_192_alg = { | |||
656 | .cia_setkey = des3_192_setkey, | 457 | .cia_setkey = des3_192_setkey, |
657 | .cia_encrypt = des3_192_encrypt, | 458 | .cia_encrypt = des3_192_encrypt, |
658 | .cia_decrypt = des3_192_decrypt, | 459 | .cia_decrypt = des3_192_decrypt, |
659 | .cia_encrypt_ecb = des3_192_encrypt_ecb, | ||
660 | .cia_decrypt_ecb = des3_192_decrypt_ecb, | ||
661 | .cia_encrypt_cbc = des3_192_encrypt_cbc, | ||
662 | .cia_decrypt_cbc = des3_192_decrypt_cbc, | ||
663 | } | 460 | } |
664 | } | 461 | } |
665 | }; | 462 | }; |