forked from Qortal/Brooklyn
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
191 lines
4.7 KiB
191 lines
4.7 KiB
/* |
|
* AEAD: Authenticated Encryption with Associated Data |
|
* |
|
* Copyright (c) 2007-2015 Herbert Xu <[email protected]> |
|
* |
|
* This program is free software; you can redistribute it and/or modify it |
|
* under the terms of the GNU General Public License as published by the Free |
|
* Software Foundation; either version 2 of the License, or (at your option) |
|
* any later version. |
|
* |
|
*/ |
|
|
|
#ifndef _CRYPTO_INTERNAL_AEAD_H |
|
#define _CRYPTO_INTERNAL_AEAD_H |
|
|
|
#include <crypto/aead.h> |
|
#include <crypto/algapi.h> |
|
#include <linux/stddef.h> |
|
#include <linux/types.h> |
|
|
|
struct rtattr; |
|
|
|
struct aead_instance { |
|
void (*free)(struct aead_instance *inst); |
|
union { |
|
struct { |
|
char head[offsetof(struct aead_alg, base)]; |
|
struct crypto_instance base; |
|
} s; |
|
struct aead_alg alg; |
|
}; |
|
}; |
|
|
|
struct crypto_aead_spawn { |
|
struct crypto_spawn base; |
|
}; |
|
|
|
struct aead_queue { |
|
struct crypto_queue base; |
|
}; |
|
|
|
static inline void *crypto_aead_ctx(struct crypto_aead *tfm) |
|
{ |
|
return crypto_tfm_ctx(&tfm->base); |
|
} |
|
|
|
static inline struct crypto_instance *aead_crypto_instance( |
|
struct aead_instance *inst) |
|
{ |
|
return container_of(&inst->alg.base, struct crypto_instance, alg); |
|
} |
|
|
|
static inline struct aead_instance *aead_instance(struct crypto_instance *inst) |
|
{ |
|
return container_of(&inst->alg, struct aead_instance, alg.base); |
|
} |
|
|
|
static inline struct aead_instance *aead_alg_instance(struct crypto_aead *aead) |
|
{ |
|
return aead_instance(crypto_tfm_alg_instance(&aead->base)); |
|
} |
|
|
|
static inline void *aead_instance_ctx(struct aead_instance *inst) |
|
{ |
|
return crypto_instance_ctx(aead_crypto_instance(inst)); |
|
} |
|
|
|
static inline void *aead_request_ctx(struct aead_request *req) |
|
{ |
|
return req->__ctx; |
|
} |
|
|
|
static inline void aead_request_complete(struct aead_request *req, int err) |
|
{ |
|
req->base.complete(&req->base, err); |
|
} |
|
|
|
static inline u32 aead_request_flags(struct aead_request *req) |
|
{ |
|
return req->base.flags; |
|
} |
|
|
|
static inline struct aead_request *aead_request_cast( |
|
struct crypto_async_request *req) |
|
{ |
|
return container_of(req, struct aead_request, base); |
|
} |
|
|
|
static inline void crypto_set_aead_spawn( |
|
struct crypto_aead_spawn *spawn, struct crypto_instance *inst) |
|
{ |
|
crypto_set_spawn(&spawn->base, inst); |
|
} |
|
|
|
int crypto_grab_aead(struct crypto_aead_spawn *spawn, const char *name, |
|
u32 type, u32 mask); |
|
|
|
static inline void crypto_drop_aead(struct crypto_aead_spawn *spawn) |
|
{ |
|
crypto_drop_spawn(&spawn->base); |
|
} |
|
|
|
static inline struct aead_alg *crypto_spawn_aead_alg( |
|
struct crypto_aead_spawn *spawn) |
|
{ |
|
return container_of(spawn->base.alg, struct aead_alg, base); |
|
} |
|
|
|
static inline struct crypto_aead *crypto_spawn_aead( |
|
struct crypto_aead_spawn *spawn) |
|
{ |
|
return crypto_spawn_tfm2(&spawn->base); |
|
} |
|
|
|
static inline void crypto_aead_set_reqsize(struct crypto_aead *aead, |
|
unsigned int reqsize) |
|
{ |
|
aead->reqsize = reqsize; |
|
} |
|
|
|
static inline unsigned int crypto_aead_alg_maxauthsize(struct aead_alg *alg) |
|
{ |
|
return alg->maxauthsize; |
|
} |
|
|
|
static inline unsigned int crypto_aead_maxauthsize(struct crypto_aead *aead) |
|
{ |
|
return crypto_aead_alg_maxauthsize(crypto_aead_alg(aead)); |
|
} |
|
|
|
static inline void aead_init_queue(struct aead_queue *queue, |
|
unsigned int max_qlen) |
|
{ |
|
crypto_init_queue(&queue->base, max_qlen); |
|
} |
|
|
|
static inline int aead_enqueue_request(struct aead_queue *queue, |
|
struct aead_request *request) |
|
{ |
|
return crypto_enqueue_request(&queue->base, &request->base); |
|
} |
|
|
|
static inline struct aead_request *aead_dequeue_request( |
|
struct aead_queue *queue) |
|
{ |
|
struct crypto_async_request *req; |
|
|
|
req = crypto_dequeue_request(&queue->base); |
|
|
|
return req ? container_of(req, struct aead_request, base) : NULL; |
|
} |
|
|
|
static inline struct aead_request *aead_get_backlog(struct aead_queue *queue) |
|
{ |
|
struct crypto_async_request *req; |
|
|
|
req = crypto_get_backlog(&queue->base); |
|
|
|
return req ? container_of(req, struct aead_request, base) : NULL; |
|
} |
|
|
|
static inline unsigned int crypto_aead_alg_chunksize(struct aead_alg *alg) |
|
{ |
|
return alg->chunksize; |
|
} |
|
|
|
/** |
|
* crypto_aead_chunksize() - obtain chunk size |
|
* @tfm: cipher handle |
|
* |
|
* The block size is set to one for ciphers such as CCM. However, |
|
* you still need to provide incremental updates in multiples of |
|
* the underlying block size as the IV does not have sub-block |
|
* granularity. This is known in this API as the chunk size. |
|
* |
|
* Return: chunk size in bytes |
|
*/ |
|
static inline unsigned int crypto_aead_chunksize(struct crypto_aead *tfm) |
|
{ |
|
return crypto_aead_alg_chunksize(crypto_aead_alg(tfm)); |
|
} |
|
|
|
int crypto_register_aead(struct aead_alg *alg); |
|
void crypto_unregister_aead(struct aead_alg *alg); |
|
int crypto_register_aeads(struct aead_alg *algs, int count); |
|
void crypto_unregister_aeads(struct aead_alg *algs, int count); |
|
int aead_register_instance(struct crypto_template *tmpl, |
|
struct aead_instance *inst); |
|
|
|
#endif /* _CRYPTO_INTERNAL_AEAD_H */ |
|
|
|
|