diff options
author | James Bottomley <jejb@mulgrave.il.steeleye.com> | 2006-06-28 14:06:39 -0400 |
---|---|---|
committer | James Bottomley <jejb@mulgrave.il.steeleye.com> | 2006-06-28 14:06:39 -0400 |
commit | f28e71617ddaf2483e3e5c5237103484a303743f (patch) | |
tree | 67627d2d8ddbf6a4449371e9261d796c013b1fa1 /crypto/khazad.c | |
parent | dc6a78f1af10d28fb8c395034ae1e099b85c05b0 (diff) | |
parent | a39727f212426b9d5f9267b3318a2afaf9922d3b (diff) |
Merge ../linux-2.6/
Conflicts:
drivers/scsi/aacraid/comminit.c
Fixed up by removing the now renamed CONFIG_IOMMU option from
aacraid
Signed-off-by: James Bottomley <James.Bottomley@SteelEye.com>
Diffstat (limited to 'crypto/khazad.c')
-rw-r--r-- | crypto/khazad.c | 21 |
1 files changed, 11 insertions, 10 deletions
diff --git a/crypto/khazad.c b/crypto/khazad.c index 807f2bf4ea24..d4c9d3657b36 100644 --- a/crypto/khazad.c +++ b/crypto/khazad.c | |||
@@ -754,11 +754,11 @@ static const u64 c[KHAZAD_ROUNDS + 1] = { | |||
754 | 0xccc41d14c363da5dULL, 0x5fdc7dcd7f5a6c5cULL, 0xf726ffede89d6f8eULL | 754 | 0xccc41d14c363da5dULL, 0x5fdc7dcd7f5a6c5cULL, 0xf726ffede89d6f8eULL |
755 | }; | 755 | }; |
756 | 756 | ||
757 | static int khazad_setkey(void *ctx_arg, const u8 *in_key, | 757 | static int khazad_setkey(struct crypto_tfm *tfm, const u8 *in_key, |
758 | unsigned int key_len, u32 *flags) | 758 | unsigned int key_len, u32 *flags) |
759 | { | 759 | { |
760 | struct khazad_ctx *ctx = ctx_arg; | 760 | struct khazad_ctx *ctx = crypto_tfm_ctx(tfm); |
761 | const __be64 *key = (const __be64 *)in_key; | 761 | const __be32 *key = (const __be32 *)in_key; |
762 | int r; | 762 | int r; |
763 | const u64 *S = T7; | 763 | const u64 *S = T7; |
764 | u64 K2, K1; | 764 | u64 K2, K1; |
@@ -769,8 +769,9 @@ static int khazad_setkey(void *ctx_arg, const u8 *in_key, | |||
769 | return -EINVAL; | 769 | return -EINVAL; |
770 | } | 770 | } |
771 | 771 | ||
772 | K2 = be64_to_cpu(key[0]); | 772 | /* key is supposed to be 32-bit aligned */ |
773 | K1 = be64_to_cpu(key[1]); | 773 | K2 = ((u64)be32_to_cpu(key[0]) << 32) | be32_to_cpu(key[1]); |
774 | K1 = ((u64)be32_to_cpu(key[2]) << 32) | be32_to_cpu(key[3]); | ||
774 | 775 | ||
775 | /* setup the encrypt key */ | 776 | /* setup the encrypt key */ |
776 | for (r = 0; r <= KHAZAD_ROUNDS; r++) { | 777 | for (r = 0; r <= KHAZAD_ROUNDS; r++) { |
@@ -840,15 +841,15 @@ static void khazad_crypt(const u64 roundKey[KHAZAD_ROUNDS + 1], | |||
840 | *dst = cpu_to_be64(state); | 841 | *dst = cpu_to_be64(state); |
841 | } | 842 | } |
842 | 843 | ||
843 | static void khazad_encrypt(void *ctx_arg, u8 *dst, const u8 *src) | 844 | static void khazad_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) |
844 | { | 845 | { |
845 | struct khazad_ctx *ctx = ctx_arg; | 846 | struct khazad_ctx *ctx = crypto_tfm_ctx(tfm); |
846 | khazad_crypt(ctx->E, dst, src); | 847 | khazad_crypt(ctx->E, dst, src); |
847 | } | 848 | } |
848 | 849 | ||
849 | static void khazad_decrypt(void *ctx_arg, u8 *dst, const u8 *src) | 850 | static void khazad_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) |
850 | { | 851 | { |
851 | struct khazad_ctx *ctx = ctx_arg; | 852 | struct khazad_ctx *ctx = crypto_tfm_ctx(tfm); |
852 | khazad_crypt(ctx->D, dst, src); | 853 | khazad_crypt(ctx->D, dst, src); |
853 | } | 854 | } |
854 | 855 | ||