Explorar o código

crypto: doc - update AEAD AD handling

The associated data handling with the kernel crypto API has been
updated. This needs to be reflected in the documentation.

Signed-off-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Stephan Mueller %!s(int64=9) %!d(string=hai) anos
pai
achega
3981d37ff3
Modificáronse 2 ficheiros con 3 adicións e 4 borrados
  1. 0 1
      Documentation/DocBook/crypto-API.tmpl
  2. 3 3
      include/crypto/aead.h

+ 0 - 1
Documentation/DocBook/crypto-API.tmpl

@@ -1736,7 +1736,6 @@ read(opfd, out, outlen);
 !Finclude/crypto/aead.h aead_request_free
 !Finclude/crypto/aead.h aead_request_free
 !Finclude/crypto/aead.h aead_request_set_callback
 !Finclude/crypto/aead.h aead_request_set_callback
 !Finclude/crypto/aead.h aead_request_set_crypt
 !Finclude/crypto/aead.h aead_request_set_crypt
-!Finclude/crypto/aead.h aead_request_set_assoc
 !Finclude/crypto/aead.h aead_request_set_ad
 !Finclude/crypto/aead.h aead_request_set_ad
    </sect1>
    </sect1>
    <sect1><title>Synchronous Block Cipher API</title>
    <sect1><title>Synchronous Block Cipher API</title>

+ 3 - 3
include/crypto/aead.h

@@ -31,10 +31,10 @@
  *
  *
  * For example: authenc(hmac(sha256), cbc(aes))
  * For example: authenc(hmac(sha256), cbc(aes))
  *
  *
- * The example code provided for the asynchronous block cipher operation
- * applies here as well. Naturally all *ablkcipher* symbols must be exchanged
+ * The example code provided for the symmetric key cipher operation
+ * applies here as well. Naturally all *skcipher* symbols must be exchanged
  * the *aead* pendants discussed in the following. In addition, for the AEAD
  * the *aead* pendants discussed in the following. In addition, for the AEAD
- * operation, the aead_request_set_assoc function must be used to set the
+ * operation, the aead_request_set_ad function must be used to set the
  * pointer to the associated data memory location before performing the
  * pointer to the associated data memory location before performing the
  * encryption or decryption operation. In case of an encryption, the associated
  * encryption or decryption operation. In case of an encryption, the associated
  * data memory is filled during the encryption operation. For decryption, the
  * data memory is filled during the encryption operation. For decryption, the