Commit 20bb4ef0 authored by Ard Biesheuvel's avatar Ard Biesheuvel Committed by Herbert Xu

crypto: arm/aes-ce - cosmetic/whitespace cleanup

Rearrange the aes_algs[] array for legibility.
Signed-off-by: default avatarArd Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 85b36ee8
...@@ -334,30 +334,28 @@ static int xts_decrypt(struct skcipher_request *req) ...@@ -334,30 +334,28 @@ static int xts_decrypt(struct skcipher_request *req)
} }
static struct skcipher_alg aes_algs[] = { { static struct skcipher_alg aes_algs[] = { {
.base = { .base.cra_name = "__ecb(aes)",
.cra_name = "__ecb(aes)", .base.cra_driver_name = "__ecb-aes-ce",
.cra_driver_name = "__ecb-aes-ce", .base.cra_priority = 300,
.cra_priority = 300, .base.cra_flags = CRYPTO_ALG_INTERNAL,
.cra_flags = CRYPTO_ALG_INTERNAL, .base.cra_blocksize = AES_BLOCK_SIZE,
.cra_blocksize = AES_BLOCK_SIZE, .base.cra_ctxsize = sizeof(struct crypto_aes_ctx),
.cra_ctxsize = sizeof(struct crypto_aes_ctx), .base.cra_module = THIS_MODULE,
.cra_module = THIS_MODULE,
},
.min_keysize = AES_MIN_KEY_SIZE, .min_keysize = AES_MIN_KEY_SIZE,
.max_keysize = AES_MAX_KEY_SIZE, .max_keysize = AES_MAX_KEY_SIZE,
.setkey = ce_aes_setkey, .setkey = ce_aes_setkey,
.encrypt = ecb_encrypt, .encrypt = ecb_encrypt,
.decrypt = ecb_decrypt, .decrypt = ecb_decrypt,
}, { }, {
.base = { .base.cra_name = "__cbc(aes)",
.cra_name = "__cbc(aes)", .base.cra_driver_name = "__cbc-aes-ce",
.cra_driver_name = "__cbc-aes-ce", .base.cra_priority = 300,
.cra_priority = 300, .base.cra_flags = CRYPTO_ALG_INTERNAL,
.cra_flags = CRYPTO_ALG_INTERNAL, .base.cra_blocksize = AES_BLOCK_SIZE,
.cra_blocksize = AES_BLOCK_SIZE, .base.cra_ctxsize = sizeof(struct crypto_aes_ctx),
.cra_ctxsize = sizeof(struct crypto_aes_ctx), .base.cra_module = THIS_MODULE,
.cra_module = THIS_MODULE,
},
.min_keysize = AES_MIN_KEY_SIZE, .min_keysize = AES_MIN_KEY_SIZE,
.max_keysize = AES_MAX_KEY_SIZE, .max_keysize = AES_MAX_KEY_SIZE,
.ivsize = AES_BLOCK_SIZE, .ivsize = AES_BLOCK_SIZE,
...@@ -365,15 +363,14 @@ static struct skcipher_alg aes_algs[] = { { ...@@ -365,15 +363,14 @@ static struct skcipher_alg aes_algs[] = { {
.encrypt = cbc_encrypt, .encrypt = cbc_encrypt,
.decrypt = cbc_decrypt, .decrypt = cbc_decrypt,
}, { }, {
.base = { .base.cra_name = "__ctr(aes)",
.cra_name = "__ctr(aes)", .base.cra_driver_name = "__ctr-aes-ce",
.cra_driver_name = "__ctr-aes-ce", .base.cra_priority = 300,
.cra_priority = 300, .base.cra_flags = CRYPTO_ALG_INTERNAL,
.cra_flags = CRYPTO_ALG_INTERNAL, .base.cra_blocksize = 1,
.cra_blocksize = 1, .base.cra_ctxsize = sizeof(struct crypto_aes_ctx),
.cra_ctxsize = sizeof(struct crypto_aes_ctx), .base.cra_module = THIS_MODULE,
.cra_module = THIS_MODULE,
},
.min_keysize = AES_MIN_KEY_SIZE, .min_keysize = AES_MIN_KEY_SIZE,
.max_keysize = AES_MAX_KEY_SIZE, .max_keysize = AES_MAX_KEY_SIZE,
.ivsize = AES_BLOCK_SIZE, .ivsize = AES_BLOCK_SIZE,
...@@ -382,15 +379,14 @@ static struct skcipher_alg aes_algs[] = { { ...@@ -382,15 +379,14 @@ static struct skcipher_alg aes_algs[] = { {
.encrypt = ctr_encrypt, .encrypt = ctr_encrypt,
.decrypt = ctr_encrypt, .decrypt = ctr_encrypt,
}, { }, {
.base = { .base.cra_name = "__xts(aes)",
.cra_name = "__xts(aes)", .base.cra_driver_name = "__xts-aes-ce",
.cra_driver_name = "__xts-aes-ce", .base.cra_priority = 300,
.cra_priority = 300, .base.cra_flags = CRYPTO_ALG_INTERNAL,
.cra_flags = CRYPTO_ALG_INTERNAL, .base.cra_blocksize = AES_BLOCK_SIZE,
.cra_blocksize = AES_BLOCK_SIZE, .base.cra_ctxsize = sizeof(struct crypto_aes_xts_ctx),
.cra_ctxsize = sizeof(struct crypto_aes_xts_ctx), .base.cra_module = THIS_MODULE,
.cra_module = THIS_MODULE,
},
.min_keysize = 2 * AES_MIN_KEY_SIZE, .min_keysize = 2 * AES_MIN_KEY_SIZE,
.max_keysize = 2 * AES_MAX_KEY_SIZE, .max_keysize = 2 * AES_MAX_KEY_SIZE,
.ivsize = AES_BLOCK_SIZE, .ivsize = AES_BLOCK_SIZE,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment