mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 14:53:58 -04:00
lib/crypto: blake2s: Rename blake2s_state to blake2s_ctx
For consistency with the SHA-1, SHA-2, SHA-3 (in development), and MD5 library APIs, rename blake2s_state to blake2s_ctx. As a refresher, the ctx name: - Is a bit shorter. - Avoids confusion with the compression function state, which is also often called the state (but is just part of the full context). - Is consistent with OpenSSL. Not a big deal, of course. But consistency is nice. With a BLAKE2b library API about to be added, this is a convenient time to update this. Reviewed-by: Ard Biesheuvel <ardb@kernel.org> Link: https://lore.kernel.org/r/20251018043106.375964-3-ebiggers@kernel.org Signed-off-by: Eric Biggers <ebiggers@kernel.org>
This commit is contained in:
@@ -17,9 +17,9 @@ static void blake2s_default(const u8 *data, size_t len,
|
||||
blake2s(NULL, 0, data, len, out, BLAKE2S_HASH_SIZE);
|
||||
}
|
||||
|
||||
static void blake2s_init_default(struct blake2s_state *state)
|
||||
static void blake2s_init_default(struct blake2s_ctx *ctx)
|
||||
{
|
||||
blake2s_init(state, BLAKE2S_HASH_SIZE);
|
||||
blake2s_init(ctx, BLAKE2S_HASH_SIZE);
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -27,7 +27,7 @@ static void blake2s_init_default(struct blake2s_state *state)
|
||||
* with a key length of 0 and a hash length of BLAKE2S_HASH_SIZE.
|
||||
*/
|
||||
#define HASH blake2s_default
|
||||
#define HASH_CTX blake2s_state
|
||||
#define HASH_CTX blake2s_ctx
|
||||
#define HASH_SIZE BLAKE2S_HASH_SIZE
|
||||
#define HASH_INIT blake2s_init_default
|
||||
#define HASH_UPDATE blake2s_update
|
||||
@@ -44,19 +44,19 @@ static void test_blake2s_all_key_and_hash_lens(struct kunit *test)
|
||||
u8 *data = &test_buf[0];
|
||||
u8 *key = data + data_len;
|
||||
u8 *hash = key + BLAKE2S_KEY_SIZE;
|
||||
struct blake2s_state main_state;
|
||||
struct blake2s_ctx main_ctx;
|
||||
u8 main_hash[BLAKE2S_HASH_SIZE];
|
||||
|
||||
rand_bytes_seeded_from_len(data, data_len);
|
||||
blake2s_init(&main_state, BLAKE2S_HASH_SIZE);
|
||||
blake2s_init(&main_ctx, BLAKE2S_HASH_SIZE);
|
||||
for (int key_len = 0; key_len <= BLAKE2S_KEY_SIZE; key_len++) {
|
||||
rand_bytes_seeded_from_len(key, key_len);
|
||||
for (int out_len = 1; out_len <= BLAKE2S_HASH_SIZE; out_len++) {
|
||||
blake2s(key, key_len, data, data_len, hash, out_len);
|
||||
blake2s_update(&main_state, hash, out_len);
|
||||
blake2s_update(&main_ctx, hash, out_len);
|
||||
}
|
||||
}
|
||||
blake2s_final(&main_state, main_hash);
|
||||
blake2s_final(&main_ctx, main_hash);
|
||||
KUNIT_ASSERT_MEMEQ(test, main_hash, blake2s_keyed_testvec_consolidated,
|
||||
BLAKE2S_HASH_SIZE);
|
||||
}
|
||||
@@ -75,7 +75,7 @@ static void test_blake2s_with_guarded_key_buf(struct kunit *test)
|
||||
u8 *guarded_key = &test_buf[TEST_BUF_LEN - key_len];
|
||||
u8 hash1[BLAKE2S_HASH_SIZE];
|
||||
u8 hash2[BLAKE2S_HASH_SIZE];
|
||||
struct blake2s_state state;
|
||||
struct blake2s_ctx ctx;
|
||||
|
||||
rand_bytes(key, key_len);
|
||||
memcpy(guarded_key, key, key_len);
|
||||
@@ -86,10 +86,9 @@ static void test_blake2s_with_guarded_key_buf(struct kunit *test)
|
||||
hash2, BLAKE2S_HASH_SIZE);
|
||||
KUNIT_ASSERT_MEMEQ(test, hash1, hash2, BLAKE2S_HASH_SIZE);
|
||||
|
||||
blake2s_init_key(&state, BLAKE2S_HASH_SIZE,
|
||||
guarded_key, key_len);
|
||||
blake2s_update(&state, test_buf, data_len);
|
||||
blake2s_final(&state, hash2);
|
||||
blake2s_init_key(&ctx, BLAKE2S_HASH_SIZE, guarded_key, key_len);
|
||||
blake2s_update(&ctx, test_buf, data_len);
|
||||
blake2s_final(&ctx, hash2);
|
||||
KUNIT_ASSERT_MEMEQ(test, hash1, hash2, BLAKE2S_HASH_SIZE);
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user