staging: crypto: skein: rename camelcase vars
camelCase is not accepted in the Linux Kernel. To prepare skein
driver for mainline inclusion, we rename all vars to
non-camelCase equivalents.
Signed-off-by: Anton Saraev <antonysaraev@gmail.com>
Reviewed-by: Jake Edge <jake@lwn.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
diff --git a/drivers/staging/skein/threefishApi.c b/drivers/staging/skein/threefishApi.c
index fce613b..67ba9a6 100644
--- a/drivers/staging/skein/threefishApi.c
+++ b/drivers/staging/skein/threefishApi.c
@@ -3,76 +3,76 @@
#include <linux/string.h>
#include <threefishApi.h>
-void threefish_set_key(struct threefish_key *keyCtx,
- enum threefish_size stateSize,
- u64 *keyData, u64 *tweak)
+void threefish_set_key(struct threefish_key *key_ctx,
+ enum threefish_size state_size,
+ u64 *key_data, u64 *tweak)
{
- int keyWords = stateSize / 64;
+ int key_words = state_size / 64;
int i;
u64 parity = KeyScheduleConst;
- keyCtx->tweak[0] = tweak[0];
- keyCtx->tweak[1] = tweak[1];
- keyCtx->tweak[2] = tweak[0] ^ tweak[1];
+ key_ctx->tweak[0] = tweak[0];
+ key_ctx->tweak[1] = tweak[1];
+ key_ctx->tweak[2] = tweak[0] ^ tweak[1];
- for (i = 0; i < keyWords; i++) {
- keyCtx->key[i] = keyData[i];
- parity ^= keyData[i];
+ for (i = 0; i < key_words; i++) {
+ key_ctx->key[i] = key_data[i];
+ parity ^= key_data[i];
}
- keyCtx->key[i] = parity;
- keyCtx->stateSize = stateSize;
+ key_ctx->key[i] = parity;
+ key_ctx->state_size = state_size;
}
-void threefish_encrypt_block_bytes(struct threefish_key *keyCtx, u8 *in,
+void threefish_encrypt_block_bytes(struct threefish_key *key_ctx, u8 *in,
u8 *out)
{
u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
u64 cipher[SKEIN_MAX_STATE_WORDS];
- Skein_Get64_LSB_First(plain, in, keyCtx->stateSize / 64);
- threefish_encrypt_block_words(keyCtx, plain, cipher);
- Skein_Put64_LSB_First(out, cipher, keyCtx->stateSize / 8);
+ Skein_Get64_LSB_First(plain, in, key_ctx->state_size / 64);
+ threefish_encrypt_block_words(key_ctx, plain, cipher);
+ Skein_Put64_LSB_First(out, cipher, key_ctx->state_size / 8);
}
-void threefish_encrypt_block_words(struct threefish_key *keyCtx, u64 *in,
+void threefish_encrypt_block_words(struct threefish_key *key_ctx, u64 *in,
u64 *out)
{
- switch (keyCtx->stateSize) {
+ switch (key_ctx->state_size) {
case Threefish256:
- threefish_encrypt_256(keyCtx, in, out);
+ threefish_encrypt_256(key_ctx, in, out);
break;
case Threefish512:
- threefish_encrypt_512(keyCtx, in, out);
+ threefish_encrypt_512(key_ctx, in, out);
break;
case Threefish1024:
- threefish_encrypt_1024(keyCtx, in, out);
+ threefish_encrypt_1024(key_ctx, in, out);
break;
}
}
-void threefish_decrypt_block_bytes(struct threefish_key *keyCtx, u8 *in,
+void threefish_decrypt_block_bytes(struct threefish_key *key_ctx, u8 *in,
u8 *out)
{
u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
u64 cipher[SKEIN_MAX_STATE_WORDS];
- Skein_Get64_LSB_First(cipher, in, keyCtx->stateSize / 64);
- threefish_decrypt_block_words(keyCtx, cipher, plain);
- Skein_Put64_LSB_First(out, plain, keyCtx->stateSize / 8);
+ Skein_Get64_LSB_First(cipher, in, key_ctx->state_size / 64);
+ threefish_decrypt_block_words(key_ctx, cipher, plain);
+ Skein_Put64_LSB_First(out, plain, key_ctx->state_size / 8);
}
-void threefish_decrypt_block_words(struct threefish_key *keyCtx, u64 *in,
+void threefish_decrypt_block_words(struct threefish_key *key_ctx, u64 *in,
u64 *out)
{
- switch (keyCtx->stateSize) {
+ switch (key_ctx->state_size) {
case Threefish256:
- threefish_decrypt_256(keyCtx, in, out);
+ threefish_decrypt_256(key_ctx, in, out);
break;
case Threefish512:
- threefish_decrypt_512(keyCtx, in, out);
+ threefish_decrypt_512(key_ctx, in, out);
break;
case Threefish1024:
- threefish_decrypt_1024(keyCtx, in, out);
+ threefish_decrypt_1024(key_ctx, in, out);
break;
}
}