@@ -314,8 +314,8 @@ static int mtk_aes_map(struct mtk_cryp *cryp, struct mtk_aes_rec *aes)
314314 aes -> dst .sg_len = dma_map_sg (cryp -> dev , aes -> dst .sg ,
315315 aes -> dst .nents , DMA_FROM_DEVICE );
316316 if (unlikely (!aes -> dst .sg_len )) {
317- dma_unmap_sg (cryp -> dev , aes -> src .sg ,
318- aes -> src . nents , DMA_TO_DEVICE );
317+ dma_unmap_sg (cryp -> dev , aes -> src .sg , aes -> src . nents ,
318+ DMA_TO_DEVICE );
319319 goto sg_map_err ;
320320 }
321321 }
@@ -484,7 +484,7 @@ static int mtk_aes_setkey(struct crypto_ablkcipher *tfm,
484484 const u8 * key , u32 keylen )
485485{
486486 struct mtk_aes_base_ctx * ctx = crypto_ablkcipher_ctx (tfm );
487- const u32 * key_tmp = (const u32 * )key ;
487+ const u32 * aes_key = (const u32 * )key ;
488488 u32 * key_state = ctx -> tfm .state ;
489489 int i ;
490490
@@ -498,7 +498,7 @@ static int mtk_aes_setkey(struct crypto_ablkcipher *tfm,
498498 ctx -> keylen = SIZE_IN_WORDS (keylen );
499499
500500 for (i = 0 ; i < ctx -> keylen ; i ++ )
501- key_state [i ] = cpu_to_le32 (key_tmp [i ]);
501+ key_state [i ] = cpu_to_le32 (aes_key [i ]);
502502
503503 return 0 ;
504504}
@@ -512,26 +512,26 @@ static int mtk_aes_crypt(struct ablkcipher_request *req, u64 mode)
512512 rctx = ablkcipher_request_ctx (req );
513513 rctx -> mode = mode ;
514514
515- return mtk_aes_handle_queue (ctx -> cryp ,
516- !( mode & AES_FLAGS_ENCRYPT ), & req -> base );
515+ return mtk_aes_handle_queue (ctx -> cryp , !( mode & AES_FLAGS_ENCRYPT ),
516+ & req -> base );
517517}
518518
519- static int mtk_ecb_encrypt (struct ablkcipher_request * req )
519+ static int mtk_aes_ecb_encrypt (struct ablkcipher_request * req )
520520{
521521 return mtk_aes_crypt (req , AES_FLAGS_ENCRYPT | AES_FLAGS_ECB );
522522}
523523
524- static int mtk_ecb_decrypt (struct ablkcipher_request * req )
524+ static int mtk_aes_ecb_decrypt (struct ablkcipher_request * req )
525525{
526526 return mtk_aes_crypt (req , AES_FLAGS_ECB );
527527}
528528
529- static int mtk_cbc_encrypt (struct ablkcipher_request * req )
529+ static int mtk_aes_cbc_encrypt (struct ablkcipher_request * req )
530530{
531531 return mtk_aes_crypt (req , AES_FLAGS_ENCRYPT | AES_FLAGS_CBC );
532532}
533533
534- static int mtk_cbc_decrypt (struct ablkcipher_request * req )
534+ static int mtk_aes_cbc_decrypt (struct ablkcipher_request * req )
535535{
536536 return mtk_aes_crypt (req , AES_FLAGS_CBC );
537537}
@@ -554,44 +554,44 @@ static int mtk_aes_cra_init(struct crypto_tfm *tfm)
554554
555555static struct crypto_alg aes_algs [] = {
556556{
557- .cra_name = "cbc(aes)" ,
558- .cra_driver_name = "cbc-aes-mtk" ,
559- .cra_priority = 400 ,
560- .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER |
561- CRYPTO_ALG_ASYNC ,
562- .cra_init = mtk_aes_cra_init ,
563- .cra_blocksize = AES_BLOCK_SIZE ,
564- .cra_ctxsize = sizeof (struct mtk_aes_ctx ),
565- .cra_alignmask = 15 ,
566- .cra_type = & crypto_ablkcipher_type ,
567- .cra_module = THIS_MODULE ,
568- .cra_u .ablkcipher = {
569- .min_keysize = AES_MIN_KEY_SIZE ,
570- .max_keysize = AES_MAX_KEY_SIZE ,
571- .setkey = mtk_aes_setkey ,
572- .encrypt = mtk_cbc_encrypt ,
573- .decrypt = mtk_cbc_decrypt ,
574- .ivsize = AES_BLOCK_SIZE ,
557+ .cra_name = "cbc(aes)" ,
558+ .cra_driver_name = "cbc-aes-mtk" ,
559+ .cra_priority = 400 ,
560+ .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER |
561+ CRYPTO_ALG_ASYNC ,
562+ .cra_init = mtk_aes_cra_init ,
563+ .cra_blocksize = AES_BLOCK_SIZE ,
564+ .cra_ctxsize = sizeof (struct mtk_aes_ctx ),
565+ .cra_alignmask = 0xf ,
566+ .cra_type = & crypto_ablkcipher_type ,
567+ .cra_module = THIS_MODULE ,
568+ .cra_u .ablkcipher = {
569+ .min_keysize = AES_MIN_KEY_SIZE ,
570+ .max_keysize = AES_MAX_KEY_SIZE ,
571+ .setkey = mtk_aes_setkey ,
572+ .encrypt = mtk_aes_cbc_encrypt ,
573+ .decrypt = mtk_aes_cbc_decrypt ,
574+ .ivsize = AES_BLOCK_SIZE ,
575575 }
576576},
577577{
578- .cra_name = "ecb(aes)" ,
579- .cra_driver_name = "ecb-aes-mtk" ,
580- .cra_priority = 400 ,
581- .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER |
582- CRYPTO_ALG_ASYNC ,
583- .cra_init = mtk_aes_cra_init ,
584- .cra_blocksize = AES_BLOCK_SIZE ,
585- .cra_ctxsize = sizeof (struct mtk_aes_ctx ),
586- .cra_alignmask = 15 ,
587- .cra_type = & crypto_ablkcipher_type ,
588- .cra_module = THIS_MODULE ,
589- .cra_u .ablkcipher = {
590- .min_keysize = AES_MIN_KEY_SIZE ,
591- .max_keysize = AES_MAX_KEY_SIZE ,
592- .setkey = mtk_aes_setkey ,
593- .encrypt = mtk_ecb_encrypt ,
594- .decrypt = mtk_ecb_decrypt ,
578+ .cra_name = "ecb(aes)" ,
579+ .cra_driver_name = "ecb-aes-mtk" ,
580+ .cra_priority = 400 ,
581+ .cra_flags = CRYPTO_ALG_TYPE_ABLKCIPHER |
582+ CRYPTO_ALG_ASYNC ,
583+ .cra_init = mtk_aes_cra_init ,
584+ .cra_blocksize = AES_BLOCK_SIZE ,
585+ .cra_ctxsize = sizeof (struct mtk_aes_ctx ),
586+ .cra_alignmask = 0xf ,
587+ .cra_type = & crypto_ablkcipher_type ,
588+ .cra_module = THIS_MODULE ,
589+ .cra_u .ablkcipher = {
590+ .min_keysize = AES_MIN_KEY_SIZE ,
591+ .max_keysize = AES_MAX_KEY_SIZE ,
592+ .setkey = mtk_aes_setkey ,
593+ .encrypt = mtk_aes_ecb_encrypt ,
594+ .decrypt = mtk_aes_ecb_decrypt ,
595595 }
596596},
597597};
0 commit comments