Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/opencrypto Apply C99-style struct initialization to enc_...
details: https://anonhg.NetBSD.org/src/rev/3db125a86a81
branches: trunk
changeset: 354956:3db125a86a81
user: ozaki-r <ozaki-r%NetBSD.org@localhost>
date: Thu Jul 06 08:27:07 2017 +0000
description:
Apply C99-style struct initialization to enc_xform, auth_hash and comp_algo
diffstat:
sys/opencrypto/xform.c | 259 ++++++++++++++++++++++++++++++++++++------------
1 files changed, 191 insertions(+), 68 deletions(-)
diffs (truncated from 377 to 300 lines):
diff -r 683526cb6c24 -r 3db125a86a81 sys/opencrypto/xform.c
--- a/sys/opencrypto/xform.c Thu Jul 06 08:22:45 2017 +0000
+++ b/sys/opencrypto/xform.c Thu Jul 06 08:27:07 2017 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: xform.c,v 1.28 2011/05/26 21:50:03 drochner Exp $ */
+/* $NetBSD: xform.c,v 1.29 2017/07/06 08:27:07 ozaki-r Exp $ */
/* $FreeBSD: src/sys/opencrypto/xform.c,v 1.1.2.1 2002/11/21 23:34:23 sam Exp $ */
/* $OpenBSD: xform.c,v 1.19 2002/08/16 22:47:25 dhartmei Exp $ */
@@ -40,7 +40,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xform.c,v 1.28 2011/05/26 21:50:03 drochner Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xform.c,v 1.29 2017/07/06 08:27:07 ozaki-r Exp $");
#include <sys/param.h>
#include <sys/malloc.h>
@@ -90,169 +90,292 @@
/* Encryption instances */
const struct enc_xform enc_xform_null = {
- CRYPTO_NULL_CBC, "NULL",
+ .type = CRYPTO_NULL_CBC,
+ .name = "NULL",
/* NB: blocksize of 4 is to generate a properly aligned ESP header */
- 4, 0, 0, 256 /* 2048 bits, max key */
+ .blocksize = 4,
+ .ivsize = 0,
+ .minkey = 0,
+ .maxkey = 256, /* 2048 bits, max key */
};
const struct enc_xform enc_xform_des = {
- CRYPTO_DES_CBC, "DES",
- 8, 8, 8, 8
+ .type = CRYPTO_DES_CBC,
+ .name = "DES",
+ .blocksize = 8,
+ .ivsize = 8,
+ .minkey = 8,
+ .maxkey = 8,
};
const struct enc_xform enc_xform_3des = {
- CRYPTO_3DES_CBC, "3DES",
- 8, 8, 24, 24
+ .type = CRYPTO_3DES_CBC,
+ .name = "3DES",
+ .blocksize = 8,
+ .ivsize = 8,
+ .minkey = 24,
+ .maxkey = 24,
};
const struct enc_xform enc_xform_blf = {
- CRYPTO_BLF_CBC, "Blowfish",
- 8, 8, 5, 56 /* 448 bits, max key */
+ .type = CRYPTO_BLF_CBC,
+ .name = "Blowfish",
+ .blocksize = 8,
+ .ivsize = 8,
+ .minkey = 5,
+ .maxkey = 56, /* 448 bits, max key */
};
const struct enc_xform enc_xform_cast5 = {
- CRYPTO_CAST_CBC, "CAST-128",
- 8, 8, 5, 16
+ .type = CRYPTO_CAST_CBC,
+ .name = "CAST-128",
+ .blocksize = 8,
+ .ivsize = 8,
+ .minkey = 5,
+ .maxkey = 16,
};
const struct enc_xform enc_xform_skipjack = {
- CRYPTO_SKIPJACK_CBC, "Skipjack",
- 8, 8, 10, 10
+ .type = CRYPTO_SKIPJACK_CBC,
+ .name = "Skipjack",
+ .blocksize = 8,
+ .ivsize = 8,
+ .minkey = 10,
+ .maxkey = 10,
};
const struct enc_xform enc_xform_rijndael128 = {
- CRYPTO_RIJNDAEL128_CBC, "Rijndael-128/AES",
- 16, 16, 16, 32
+ .type = CRYPTO_RIJNDAEL128_CBC,
+ .name = "Rijndael-128/AES",
+ .blocksize = 16,
+ .ivsize = 16,
+ .minkey = 16,
+ .maxkey = 32,
};
const struct enc_xform enc_xform_arc4 = {
- CRYPTO_ARC4, "ARC4",
- 1, 0, 1, 32
+ .type = CRYPTO_ARC4,
+ .name = "ARC4",
+ .blocksize = 1,
+ .ivsize = 0,
+ .minkey = 1,
+ .maxkey = 32,
};
const struct enc_xform enc_xform_camellia = {
- CRYPTO_CAMELLIA_CBC, "Camellia",
- 16, 16, 8, 32
+ .type = CRYPTO_CAMELLIA_CBC,
+ .name = "Camellia",
+ .blocksize = 16,
+ .ivsize = 16,
+ .minkey = 8,
+ .maxkey = 32,
};
const struct enc_xform enc_xform_aes_ctr = {
- CRYPTO_AES_CTR, "AES-CTR",
- 16, 8, 16+4, 32+4
+ .type = CRYPTO_AES_CTR,
+ .name = "AES-CTR",
+ .blocksize = 16,
+ .ivsize = 8,
+ .minkey = 16 + 4,
+ .maxkey = 32 + 4,
};
const struct enc_xform enc_xform_aes_gcm = {
- CRYPTO_AES_GCM_16, "AES-GCM",
- 4 /* ??? */, 8, 16+4, 32+4
+ .type = CRYPTO_AES_GCM_16,
+ .name = "AES-GCM",
+ .blocksize = 4, /* ??? */
+ .ivsize = 8,
+ .minkey = 16 + 4,
+ .maxkey = 32 + 4,
};
const struct enc_xform enc_xform_aes_gmac = {
- CRYPTO_AES_GMAC, "AES-GMAC",
- 4 /* ??? */, 8, 16+4, 32+4
+ .type = CRYPTO_AES_GMAC,
+ .name = "AES-GMAC",
+ .blocksize = 4, /* ??? */
+ .ivsize = 8,
+ .minkey = 16 + 4,
+ .maxkey = 32 + 4,
};
/* Authentication instances */
const struct auth_hash auth_hash_null = {
- CRYPTO_NULL_HMAC, "NULL-HMAC",
- 0, 0, 12, 64
+ .type = CRYPTO_NULL_HMAC,
+ .name = "NULL-HMAC",
+ .keysize = 0,
+ .hashsize = 0,
+ .authsize = 12,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_md5 = {
- CRYPTO_MD5_HMAC, "HMAC-MD5",
- 16, 16, 16, 64
+ .type = CRYPTO_MD5_HMAC,
+ .name = "HMAC-MD5",
+ .keysize = 16,
+ .hashsize = 16,
+ .authsize = 16,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_sha1 = {
- CRYPTO_SHA1_HMAC, "HMAC-SHA1",
- 20, 20, 20, 64
+ .type = CRYPTO_SHA1_HMAC,
+ .name = "HMAC-SHA1",
+ .keysize = 20,
+ .hashsize = 20,
+ .authsize = 20,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_ripemd_160 = {
- CRYPTO_RIPEMD160_HMAC, "HMAC-RIPEMD-160",
- 20, 20, 20, 64
+ .type = CRYPTO_RIPEMD160_HMAC,
+ .name = "HMAC-RIPEMD-160",
+ .keysize = 20,
+ .hashsize = 20,
+ .authsize = 20,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_md5_96 = {
- CRYPTO_MD5_HMAC_96, "HMAC-MD5-96",
- 16, 16, 12, 64
+ .type = CRYPTO_MD5_HMAC_96,
+ .name = "HMAC-MD5-96",
+ .keysize = 16,
+ .hashsize = 16,
+ .authsize = 12,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_sha1_96 = {
- CRYPTO_SHA1_HMAC_96, "HMAC-SHA1-96",
- 20, 20, 12, 64
+ .type = CRYPTO_SHA1_HMAC_96,
+ .name = "HMAC-SHA1-96",
+ .keysize = 20,
+ .hashsize = 20,
+ .authsize = 12,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_ripemd_160_96 = {
- CRYPTO_RIPEMD160_HMAC_96, "HMAC-RIPEMD-160",
- 20, 20, 12, 64
+ .type = CRYPTO_RIPEMD160_HMAC_96,
+ .name = "HMAC-RIPEMD-160",
+ .keysize = 20,
+ .hashsize = 20,
+ .authsize = 12,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_key_md5 = {
- CRYPTO_MD5_KPDK, "Keyed MD5",
- 0, 16, 16, 0
+ .type = CRYPTO_MD5_KPDK,
+ .name = "Keyed MD5",
+ .keysize = 0,
+ .hashsize = 16,
+ .authsize = 16,
+ .blocksize = 0,
};
const struct auth_hash auth_hash_key_sha1 = {
- CRYPTO_SHA1_KPDK, "Keyed SHA1",
- 0, 20, 20, 0
+ .type = CRYPTO_SHA1_KPDK,
+ .name = "Keyed SHA1",
+ .keysize = 0,
+ .hashsize = 20,
+ .authsize = 20,
+ .blocksize = 0,
};
const struct auth_hash auth_hash_md5 = {
- CRYPTO_MD5, "MD5",
- 0, 16, 16, 0
+ .type = CRYPTO_MD5,
+ .name = "MD5",
+ .keysize = 0,
+ .hashsize = 16,
+ .authsize = 16,
+ .blocksize = 0,
};
const struct auth_hash auth_hash_sha1 = {
- CRYPTO_SHA1, "SHA1",
- 0, 20, 20, 0
+ .type = CRYPTO_SHA1,
+ .name = "SHA1",
+ .keysize = 0,
+ .hashsize = 20,
+ .authsize = 20,
+ .blocksize = 0,
};
const struct auth_hash auth_hash_hmac_sha2_256 = {
- CRYPTO_SHA2_256_HMAC, "HMAC-SHA2",
- 32, 32, 16, 64
+ .type = CRYPTO_SHA2_256_HMAC,
+ .name = "HMAC-SHA2",
+ .keysize = 32,
+ .hashsize = 32,
+ .authsize = 16,
+ .blocksize = 64,
};
const struct auth_hash auth_hash_hmac_sha2_384 = {
- CRYPTO_SHA2_384_HMAC, "HMAC-SHA2-384",
- 48, 48, 24, 128
+ .type = CRYPTO_SHA2_384_HMAC,
+ .name = "HMAC-SHA2-384",
+ .keysize = 48,
+ .hashsize = 48,
+ .authsize = 24,
+ .blocksize = 128,
};
const struct auth_hash auth_hash_hmac_sha2_512 = {
- CRYPTO_SHA2_512_HMAC, "HMAC-SHA2-512",
Home |
Main Index |
Thread Index |
Old Index