Merge git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
[safe/jmp/linux-2.6] / crypto / ahash.c
index a83e035..b2d1ee3 100644 (file)
@@ -13,7 +13,8 @@
  *
  */
 
-#include <crypto/algapi.h>
+#include <crypto/internal/hash.h>
+#include <crypto/scatterwalk.h>
 #include <linux/err.h>
 #include <linux/kernel.h>
 #include <linux/module.h>
 
 #include "internal.h"
 
+static int hash_walk_next(struct crypto_hash_walk *walk)
+{
+       unsigned int alignmask = walk->alignmask;
+       unsigned int offset = walk->offset;
+       unsigned int nbytes = min(walk->entrylen,
+                                 ((unsigned int)(PAGE_SIZE)) - offset);
+
+       walk->data = crypto_kmap(walk->pg, 0);
+       walk->data += offset;
+
+       if (offset & alignmask)
+               nbytes = alignmask + 1 - (offset & alignmask);
+
+       walk->entrylen -= nbytes;
+       return nbytes;
+}
+
+static int hash_walk_new_entry(struct crypto_hash_walk *walk)
+{
+       struct scatterlist *sg;
+
+       sg = walk->sg;
+       walk->pg = sg_page(sg);
+       walk->offset = sg->offset;
+       walk->entrylen = sg->length;
+
+       if (walk->entrylen > walk->total)
+               walk->entrylen = walk->total;
+       walk->total -= walk->entrylen;
+
+       return hash_walk_next(walk);
+}
+
+int crypto_hash_walk_done(struct crypto_hash_walk *walk, int err)
+{
+       unsigned int alignmask = walk->alignmask;
+       unsigned int nbytes = walk->entrylen;
+
+       walk->data -= walk->offset;
+
+       if (nbytes && walk->offset & alignmask && !err) {
+               walk->offset += alignmask - 1;
+               walk->offset = ALIGN(walk->offset, alignmask + 1);
+               walk->data += walk->offset;
+
+               nbytes = min(nbytes,
+                            ((unsigned int)(PAGE_SIZE)) - walk->offset);
+               walk->entrylen -= nbytes;
+
+               return nbytes;
+       }
+
+       crypto_kunmap(walk->data, 0);
+       crypto_yield(walk->flags);
+
+       if (err)
+               return err;
+
+       walk->offset = 0;
+
+       if (nbytes)
+               return hash_walk_next(walk);
+
+       if (!walk->total)
+               return 0;
+
+       walk->sg = scatterwalk_sg_next(walk->sg);
+
+       return hash_walk_new_entry(walk);
+}
+EXPORT_SYMBOL_GPL(crypto_hash_walk_done);
+
+int crypto_hash_walk_first(struct ahash_request *req,
+                          struct crypto_hash_walk *walk)
+{
+       walk->total = req->nbytes;
+
+       if (!walk->total)
+               return 0;
+
+       walk->alignmask = crypto_ahash_alignmask(crypto_ahash_reqtfm(req));
+       walk->sg = req->src;
+       walk->flags = req->base.flags;
+
+       return hash_walk_new_entry(walk);
+}
+EXPORT_SYMBOL_GPL(crypto_hash_walk_first);
+
+int crypto_hash_walk_first_compat(struct hash_desc *hdesc,
+                                 struct crypto_hash_walk *walk,
+                                 struct scatterlist *sg, unsigned int len)
+{
+       walk->total = len;
+
+       if (!walk->total)
+               return 0;
+
+       walk->alignmask = crypto_hash_alignmask(hdesc->tfm);
+       walk->sg = sg;
+       walk->flags = hdesc->flags;
+
+       return hash_walk_new_entry(walk);
+}
+
 static int ahash_setkey_unaligned(struct crypto_ahash *tfm, const u8 *key,
                                unsigned int keylen)
 {
@@ -57,6 +162,26 @@ static int ahash_setkey(struct crypto_ahash *tfm, const u8 *key,
        return ahash->setkey(tfm, key, keylen);
 }
 
+static int ahash_nosetkey(struct crypto_ahash *tfm, const u8 *key,
+                         unsigned int keylen)
+{
+       return -ENOSYS;
+}
+
+int crypto_ahash_import(struct ahash_request *req, const u8 *in)
+{
+       struct crypto_ahash *tfm = crypto_ahash_reqtfm(req);
+       struct ahash_alg *alg = crypto_ahash_alg(tfm);
+
+       memcpy(ahash_request_ctx(req), in, crypto_ahash_reqsize(tfm));
+
+       if (alg->reinit)
+               alg->reinit(req);
+
+       return 0;
+}
+EXPORT_SYMBOL_GPL(crypto_ahash_import);
+
 static unsigned int crypto_ahash_ctxsize(struct crypto_alg *alg, u32 type,
                                        u32 mask)
 {
@@ -68,15 +193,14 @@ static int crypto_init_ahash_ops(struct crypto_tfm *tfm, u32 type, u32 mask)
        struct ahash_alg *alg = &tfm->__crt_alg->cra_ahash;
        struct ahash_tfm *crt   = &tfm->crt_ahash;
 
-       if (alg->digestsize > crypto_tfm_alg_blocksize(tfm))
+       if (alg->digestsize > PAGE_SIZE / 8)
                return -EINVAL;
 
        crt->init = alg->init;
        crt->update = alg->update;
        crt->final  = alg->final;
        crt->digest = alg->digest;
-       crt->setkey = ahash_setkey;
-       crt->base   = __crypto_ahash_cast(tfm);
+       crt->setkey = alg->setkey ? ahash_setkey : ahash_nosetkey;
        crt->digestsize = alg->digestsize;
 
        return 0;
@@ -90,7 +214,7 @@ static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg)
        seq_printf(m, "async        : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ?
                                             "yes" : "no");
        seq_printf(m, "blocksize    : %u\n", alg->cra_blocksize);
-       seq_printf(m, "digestsize   : %u\n", alg->cra_hash.digestsize);
+       seq_printf(m, "digestsize   : %u\n", alg->cra_ahash.digestsize);
 }
 
 const struct crypto_type crypto_ahash_type = {