ltq-deu: fix 6.12 kernel build warnings on lantiq/xrx200
This patch fixes various missing-prototypes build warnings by: * Mark some functions as static. * Add missing prototypes. Signed-off-by: Shiji Yang <yangshiji66@outlook.com> Link: https://github.com/openwrt/openwrt/pull/18744 Signed-off-by: Robert Marko <robimarko@gmail.com>
This commit is contained in:
parent
e839da1911
commit
d81f8e159a
3 changed files with 55 additions and 46 deletions
|
@ -148,7 +148,7 @@ extern int disable_multiblock;
|
|||
* \param key_len key lengths of 16, 24 and 32 bytes supported
|
||||
* \return -EINVAL - bad key length, 0 - SUCCESS
|
||||
*/
|
||||
int aes_set_key (struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len)
|
||||
static int aes_set_key (struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||
|
||||
|
@ -177,7 +177,7 @@ int aes_set_key (struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len)
|
|||
* \param key_len key lengths of 16, 24 and 32 bytes supported
|
||||
* \return -EINVAL - bad key length, 0 - SUCCESS
|
||||
*/
|
||||
int aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len)
|
||||
static int aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len)
|
||||
{
|
||||
return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len);
|
||||
}
|
||||
|
@ -189,7 +189,7 @@ int aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigne
|
|||
* \param ctx_arg crypto algo context
|
||||
* \return
|
||||
*/
|
||||
void aes_set_key_hw (void *ctx_arg)
|
||||
static void aes_set_key_hw (void *ctx_arg)
|
||||
{
|
||||
/*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */
|
||||
volatile struct aes_t *aes = (volatile struct aes_t *) AES_START;
|
||||
|
@ -343,7 +343,7 @@ void ifx_deu_aes (void *ctx_arg, u8 *out_arg, const u8 *in_arg,
|
|||
* \return 0 - SUCCESS
|
||||
* -EINVAL - bad key length
|
||||
*/
|
||||
int ctr_rfc3686_aes_set_key (struct crypto_tfm *tfm, const uint8_t *in_key, unsigned int key_len)
|
||||
static int ctr_rfc3686_aes_set_key (struct crypto_tfm *tfm, const uint8_t *in_key, unsigned int key_len)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||
|
||||
|
@ -376,7 +376,7 @@ int ctr_rfc3686_aes_set_key (struct crypto_tfm *tfm, const uint8_t *in_key, unsi
|
|||
* \return 0 - SUCCESS
|
||||
* -EINVAL - bad key length
|
||||
*/
|
||||
int ctr_rfc3686_aes_set_key_skcipher (struct crypto_skcipher *tfm, const uint8_t *in_key, unsigned int key_len)
|
||||
static int ctr_rfc3686_aes_set_key_skcipher (struct crypto_skcipher *tfm, const uint8_t *in_key, unsigned int key_len)
|
||||
{
|
||||
return ctr_rfc3686_aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len);
|
||||
}
|
||||
|
@ -413,7 +413,7 @@ int ctr_rfc3686_aes_set_key_skcipher (struct crypto_skcipher *tfm, const uint8_t
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_aes_ecb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_aes_ecb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_aes (ctx, dst, src, NULL, nbytes, encdec, 0);
|
||||
|
@ -430,7 +430,7 @@ void ifx_deu_aes_ecb (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_aes_cbc (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_aes_cbc (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 1);
|
||||
|
@ -447,7 +447,7 @@ void ifx_deu_aes_cbc (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_aes_ofb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_aes_ofb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 2);
|
||||
|
@ -464,7 +464,7 @@ void ifx_deu_aes_ofb (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_aes_cfb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_aes_cfb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 3);
|
||||
|
@ -481,7 +481,7 @@ void ifx_deu_aes_cfb (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_aes_ctr (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_aes_ctr (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_aes (ctx, dst, src, iv, nbytes, encdec, 4);
|
||||
|
@ -494,7 +494,7 @@ void ifx_deu_aes_ctr (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param out output bytestream
|
||||
* \param in input bytestream
|
||||
*/
|
||||
void ifx_deu_aes_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in)
|
||||
static void ifx_deu_aes_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||
ifx_deu_aes (ctx, out, in, NULL, AES_BLOCK_SIZE,
|
||||
|
@ -508,7 +508,7 @@ void ifx_deu_aes_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *i
|
|||
* \param out output bytestream
|
||||
* \param in input bytestream
|
||||
*/
|
||||
void ifx_deu_aes_decrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in)
|
||||
static void ifx_deu_aes_decrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||
ifx_deu_aes (ctx, out, in, NULL, AES_BLOCK_SIZE,
|
||||
|
@ -544,7 +544,7 @@ struct crypto_alg ifxdeu_aes_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ecb_aes_encrypt(struct skcipher_request *req)
|
||||
static int ecb_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -570,7 +570,7 @@ int ecb_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ecb_aes_decrypt(struct skcipher_request *req)
|
||||
static int ecb_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -615,7 +615,7 @@ struct skcipher_alg ifxdeu_ecb_aes_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int cbc_aes_encrypt(struct skcipher_request *req)
|
||||
static int cbc_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -642,7 +642,7 @@ int cbc_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int cbc_aes_decrypt(struct skcipher_request *req)
|
||||
static int cbc_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -694,7 +694,7 @@ struct skcipher_alg ifxdeu_cbc_aes_alg = {
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
*
|
||||
*/
|
||||
void ifx_deu_aes_xts (void *ctx_arg, u8 *out_arg, const u8 *in_arg,
|
||||
static void ifx_deu_aes_xts (void *ctx_arg, u8 *out_arg, const u8 *in_arg,
|
||||
u8 *iv_arg, size_t nbytes, int encdec)
|
||||
{
|
||||
/*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ */
|
||||
|
@ -797,7 +797,7 @@ void ifx_deu_aes_xts (void *ctx_arg, u8 *out_arg, const u8 *in_arg,
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int xts_aes_encrypt(struct skcipher_request *req)
|
||||
static int xts_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -853,7 +853,7 @@ int xts_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int xts_aes_decrypt(struct skcipher_request *req)
|
||||
static int xts_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -911,7 +911,7 @@ int xts_aes_decrypt(struct skcipher_request *req)
|
|||
* \param key_len key lengths of 16, 24 and 32 bytes supported
|
||||
* \return -EINVAL - bad key length, 0 - SUCCESS
|
||||
*/
|
||||
int xts_aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len)
|
||||
static int xts_aes_set_key_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(crypto_skcipher_tfm(tfm));
|
||||
unsigned int keylen = (key_len / 2);
|
||||
|
@ -958,7 +958,7 @@ struct skcipher_alg ifxdeu_xts_aes_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ofb_aes_encrypt(struct skcipher_request *req)
|
||||
static int ofb_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -991,7 +991,7 @@ int ofb_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ofb_aes_decrypt(struct skcipher_request *req)
|
||||
static int ofb_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1046,7 +1046,7 @@ struct skcipher_alg ifxdeu_ofb_aes_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int cfb_aes_encrypt(struct skcipher_request *req)
|
||||
static int cfb_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1079,7 +1079,7 @@ int cfb_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int cfb_aes_decrypt(struct skcipher_request *req)
|
||||
static int cfb_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1134,7 +1134,7 @@ struct skcipher_alg ifxdeu_cfb_aes_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ctr_basic_aes_encrypt(struct skcipher_request *req)
|
||||
static int ctr_basic_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1167,7 +1167,7 @@ int ctr_basic_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ctr_basic_aes_decrypt(struct skcipher_request *req)
|
||||
static int ctr_basic_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1221,7 +1221,7 @@ struct skcipher_alg ifxdeu_ctr_basic_aes_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ctr_rfc3686_aes_encrypt(struct skcipher_request *req)
|
||||
static int ctr_rfc3686_aes_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1264,7 +1264,7 @@ int ctr_rfc3686_aes_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ctr_rfc3686_aes_decrypt(struct skcipher_request *req)
|
||||
static int ctr_rfc3686_aes_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1576,7 +1576,7 @@ static struct shash_alg ifxdeu_cbcmac_aes_alg = {
|
|||
* \param key_len key lengths of 16, 24 and 32 bytes supported
|
||||
* \return -EINVAL - bad key length, 0 - SUCCESS
|
||||
*/
|
||||
int aes_set_key_aead (struct crypto_aead *aead, const u8 *in_key, unsigned int key_len)
|
||||
static int aes_set_key_aead (struct crypto_aead *aead, const u8 *in_key, unsigned int key_len)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_aead_ctx(aead);
|
||||
int err;
|
||||
|
@ -1601,7 +1601,7 @@ int aes_set_key_aead (struct crypto_aead *aead, const u8 *in_key, unsigned int k
|
|||
* \param in_key input authsize
|
||||
* \return -EINVAL - bad authsize length, 0 - SUCCESS
|
||||
*/
|
||||
int gcm_aes_setauthsize (struct crypto_aead *aead, unsigned int authsize)
|
||||
static int gcm_aes_setauthsize (struct crypto_aead *aead, unsigned int authsize)
|
||||
{
|
||||
return crypto_gcm_check_authsize(authsize);
|
||||
}
|
||||
|
@ -1612,7 +1612,7 @@ int gcm_aes_setauthsize (struct crypto_aead *aead, unsigned int authsize)
|
|||
* \param req aead request
|
||||
* \return err
|
||||
*/
|
||||
int gcm_aes_encrypt(struct aead_request *req)
|
||||
static int gcm_aes_encrypt(struct aead_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -1726,7 +1726,7 @@ int gcm_aes_encrypt(struct aead_request *req)
|
|||
* \param req aead request
|
||||
* \return err
|
||||
*/
|
||||
int gcm_aes_decrypt(struct aead_request *req)
|
||||
static int gcm_aes_decrypt(struct aead_request *req)
|
||||
{
|
||||
struct aes_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
|
|
@ -126,7 +126,7 @@ extern int disable_deudma;
|
|||
* \param key input key
|
||||
* \param keylen key length
|
||||
*/
|
||||
int des_setkey(struct crypto_tfm *tfm, const u8 *key,
|
||||
static int des_setkey(struct crypto_tfm *tfm, const u8 *key,
|
||||
unsigned int keylen)
|
||||
{
|
||||
struct ifx_deu_des_ctx *dctx = crypto_tfm_ctx(tfm);
|
||||
|
@ -161,7 +161,7 @@ int des_setkey(struct crypto_tfm *tfm, const u8 *key,
|
|||
* \param key_len key lengths of 16, 24 and 32 bytes supported
|
||||
* \return -EINVAL - bad key length, 0 - SUCCESS
|
||||
*/
|
||||
int des_setkey_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len)
|
||||
static int des_setkey_skcipher (struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len)
|
||||
{
|
||||
return des_setkey(crypto_skcipher_tfm(tfm), in_key, key_len);
|
||||
}
|
||||
|
@ -296,7 +296,7 @@ void ifx_deu_des (void *ctx_arg, u8 *out_arg, const u8 *in_arg,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_des_ecb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_des_ecb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_des (ctx, dst, src, NULL, nbytes, encdec, 0);
|
||||
|
@ -313,7 +313,7 @@ void ifx_deu_des_ecb (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_des_cbc (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
static void ifx_deu_des_cbc (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 1);
|
||||
|
@ -330,11 +330,13 @@ void ifx_deu_des_cbc (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
void ifx_deu_des_ofb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
/*
|
||||
static void ifx_deu_des_ofb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 2);
|
||||
}
|
||||
*/
|
||||
|
||||
/*! \fn void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
\ingroup IFX_DES_FUNCTIONS
|
||||
|
@ -347,11 +349,13 @@ void ifx_deu_des_ofb (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
\param encdec 1 for encrypt; 0 for decrypt
|
||||
\param inplace not used
|
||||
*/
|
||||
void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
/*
|
||||
static void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 3);
|
||||
}
|
||||
*/
|
||||
|
||||
/*! \fn void ifx_deu_des_ctr (void *ctx, uint8_t *dst, const uint8_t *src, uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
* \ingroup IFX_DES_FUNCTIONS
|
||||
|
@ -364,11 +368,13 @@ void ifx_deu_des_cfb (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param encdec 1 for encrypt; 0 for decrypt
|
||||
* \param inplace not used
|
||||
*/
|
||||
/*
|
||||
void ifx_deu_des_ctr (void *ctx, uint8_t *dst, const uint8_t *src,
|
||||
uint8_t *iv, size_t nbytes, int encdec, int inplace)
|
||||
{
|
||||
ifx_deu_des (ctx, dst, src, iv, nbytes, encdec, 4);
|
||||
}
|
||||
*/
|
||||
|
||||
/*! \fn void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t *out, const uint8_t *in)
|
||||
* \ingroup IFX_DES_FUNCTIONS
|
||||
|
@ -377,7 +383,7 @@ void ifx_deu_des_ctr (void *ctx, uint8_t *dst, const uint8_t *src,
|
|||
* \param out output bytestream
|
||||
* \param in input bytestream
|
||||
*/
|
||||
void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in)
|
||||
static void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in)
|
||||
{
|
||||
struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||
ifx_deu_des (ctx, out, in, NULL, DES_BLOCK_SIZE,
|
||||
|
@ -392,7 +398,7 @@ void ifx_deu_des_encrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t *
|
|||
* \param out output bytestream
|
||||
* \param in input bytestream
|
||||
*/
|
||||
void ifx_deu_des_decrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in)
|
||||
static void ifx_deu_des_decrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t * in)
|
||||
{
|
||||
struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(tfm);
|
||||
ifx_deu_des (ctx, out, in, NULL, DES_BLOCK_SIZE,
|
||||
|
@ -420,7 +426,7 @@ void ifx_deu_des_decrypt (struct crypto_tfm *tfm, uint8_t * out, const uint8_t *
|
|||
* \param key input key
|
||||
* \param keylen key length
|
||||
*/
|
||||
int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key,
|
||||
static int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key,
|
||||
unsigned int keylen)
|
||||
{
|
||||
struct ifx_deu_des_ctx *dctx = crypto_tfm_ctx(tfm);
|
||||
|
@ -454,7 +460,7 @@ int des3_ede_setkey(struct crypto_tfm *tfm, const u8 *key,
|
|||
* \param key input key
|
||||
* \param keylen key length
|
||||
*/
|
||||
int des3_ede_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key,
|
||||
static int des3_ede_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key,
|
||||
unsigned int keylen)
|
||||
{
|
||||
return des3_ede_setkey(crypto_skcipher_tfm(tfm), key, keylen);
|
||||
|
@ -508,7 +514,7 @@ struct crypto_alg ifxdeu_des3_ede_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ecb_des_encrypt(struct skcipher_request *req)
|
||||
static int ecb_des_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -534,7 +540,7 @@ int ecb_des_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int ecb_des_decrypt(struct skcipher_request *req)
|
||||
static int ecb_des_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -599,7 +605,7 @@ struct skcipher_alg ifxdeu_ecb_des3_ede_alg = {
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int cbc_des_encrypt(struct skcipher_request *req)
|
||||
static int cbc_des_encrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
@ -627,7 +633,7 @@ int cbc_des_encrypt(struct skcipher_request *req)
|
|||
* \param req skcipher request
|
||||
* \return err
|
||||
*/
|
||||
int cbc_des_decrypt(struct skcipher_request *req)
|
||||
static int cbc_des_decrypt(struct skcipher_request *req)
|
||||
{
|
||||
struct ifx_deu_des_ctx *ctx = crypto_tfm_ctx(req->base.tfm);
|
||||
struct skcipher_walk walk;
|
||||
|
|
|
@ -321,4 +321,7 @@ struct deu_dma_t {
|
|||
} controlr;
|
||||
};
|
||||
|
||||
u32 input_swap(u32 input);
|
||||
void chip_version(void);
|
||||
|
||||
#endif /* IFXMIPS_DEU_VR9_H */
|
||||
|
|
Loading…
Reference in a new issue