staging: crypto: skein: fix leading whitespace
Signed-off-by: Jason Cooper <jason@lakedaemon.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
diff --git a/drivers/staging/skein/threefishApi.c b/drivers/staging/skein/threefishApi.c
index 53f46f6..e8ce06a 100644
--- a/drivers/staging/skein/threefishApi.c
+++ b/drivers/staging/skein/threefishApi.c
@@ -4,75 +4,75 @@
#include <threefishApi.h>
void threefishSetKey(struct threefish_key *keyCtx, enum threefish_size stateSize,
- u64 *keyData, u64 *tweak)
+ u64 *keyData, u64 *tweak)
{
- int keyWords = stateSize / 64;
- int i;
- u64 parity = KeyScheduleConst;
+ int keyWords = stateSize / 64;
+ int i;
+ u64 parity = KeyScheduleConst;
- keyCtx->tweak[0] = tweak[0];
- keyCtx->tweak[1] = tweak[1];
- keyCtx->tweak[2] = tweak[0] ^ tweak[1];
+ keyCtx->tweak[0] = tweak[0];
+ keyCtx->tweak[1] = tweak[1];
+ keyCtx->tweak[2] = tweak[0] ^ tweak[1];
- for (i = 0; i < keyWords; i++) {
- keyCtx->key[i] = keyData[i];
- parity ^= keyData[i];
- }
- keyCtx->key[i] = parity;
- keyCtx->stateSize = stateSize;
+ for (i = 0; i < keyWords; i++) {
+ keyCtx->key[i] = keyData[i];
+ parity ^= keyData[i];
+ }
+ keyCtx->key[i] = parity;
+ keyCtx->stateSize = stateSize;
}
void threefishEncryptBlockBytes(struct threefish_key *keyCtx, u8 *in,
- u8 *out)
+ u8 *out)
{
- u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
- u64 cipher[SKEIN_MAX_STATE_WORDS];
-
- Skein_Get64_LSB_First(plain, in, keyCtx->stateSize / 64); /* bytes to words */
- threefishEncryptBlockWords(keyCtx, plain, cipher);
- Skein_Put64_LSB_First(out, cipher, keyCtx->stateSize / 8); /* words to bytes */
+ u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
+ u64 cipher[SKEIN_MAX_STATE_WORDS];
+
+ Skein_Get64_LSB_First(plain, in, keyCtx->stateSize / 64); /* bytes to words */
+ threefishEncryptBlockWords(keyCtx, plain, cipher);
+ Skein_Put64_LSB_First(out, cipher, keyCtx->stateSize / 8); /* words to bytes */
}
void threefishEncryptBlockWords(struct threefish_key *keyCtx, u64 *in,
- u64 *out)
+ u64 *out)
{
- switch (keyCtx->stateSize) {
- case Threefish256:
- threefishEncrypt256(keyCtx, in, out);
- break;
- case Threefish512:
- threefishEncrypt512(keyCtx, in, out);
- break;
- case Threefish1024:
- threefishEncrypt1024(keyCtx, in, out);
- break;
- }
+ switch (keyCtx->stateSize) {
+ case Threefish256:
+ threefishEncrypt256(keyCtx, in, out);
+ break;
+ case Threefish512:
+ threefishEncrypt512(keyCtx, in, out);
+ break;
+ case Threefish1024:
+ threefishEncrypt1024(keyCtx, in, out);
+ break;
+ }
}
void threefishDecryptBlockBytes(struct threefish_key *keyCtx, u8 *in,
- u8 *out)
+ u8 *out)
{
- u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
- u64 cipher[SKEIN_MAX_STATE_WORDS];
-
- Skein_Get64_LSB_First(cipher, in, keyCtx->stateSize / 64); /* bytes to words */
- threefishDecryptBlockWords(keyCtx, cipher, plain);
- Skein_Put64_LSB_First(out, plain, keyCtx->stateSize / 8); /* words to bytes */
+ u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
+ u64 cipher[SKEIN_MAX_STATE_WORDS];
+
+ Skein_Get64_LSB_First(cipher, in, keyCtx->stateSize / 64); /* bytes to words */
+ threefishDecryptBlockWords(keyCtx, cipher, plain);
+ Skein_Put64_LSB_First(out, plain, keyCtx->stateSize / 8); /* words to bytes */
}
void threefishDecryptBlockWords(struct threefish_key *keyCtx, u64 *in,
- u64 *out)
+ u64 *out)
{
- switch (keyCtx->stateSize) {
- case Threefish256:
- threefishDecrypt256(keyCtx, in, out);
- break;
- case Threefish512:
- threefishDecrypt512(keyCtx, in, out);
- break;
- case Threefish1024:
- threefishDecrypt1024(keyCtx, in, out);
- break;
- }
+ switch (keyCtx->stateSize) {
+ case Threefish256:
+ threefishDecrypt256(keyCtx, in, out);
+ break;
+ case Threefish512:
+ threefishDecrypt512(keyCtx, in, out);
+ break;
+ case Threefish1024:
+ threefishDecrypt1024(keyCtx, in, out);
+ break;
+ }
}