svn commit: r198627 - projects/mips/sys/dev/rmi/sec
Randall Stewart
rrs at FreeBSD.org
Thu Oct 29 21:23:44 UTC 2009
Author: rrs
Date: Thu Oct 29 21:23:44 2009
New Revision: 198627
URL: http://svn.freebsd.org/changeset/base/198627
Log:
white space changes
Modified:
projects/mips/sys/dev/rmi/sec/desc.h
projects/mips/sys/dev/rmi/sec/rmilib.c
projects/mips/sys/dev/rmi/sec/rmilib.h
projects/mips/sys/dev/rmi/sec/rmisec.c
Modified: projects/mips/sys/dev/rmi/sec/desc.h
==============================================================================
--- projects/mips/sys/dev/rmi/sec/desc.h Thu Oct 29 21:21:01 2009 (r198626)
+++ projects/mips/sys/dev/rmi/sec/desc.h Thu Oct 29 21:23:44 2009 (r198627)
@@ -70,7 +70,7 @@
(word) |= (((value) & (field ## _BITS)) << (field ## _LSB)); }
/*
- * NOTE: May be used to build value specific mask
+ * NOTE: May be used to build value specific mask
* (e.g. GEN_MASK(CTL_DSC_CPHR_3DES,CTL_DSC_CPHR_LSB)
*/
#define GEN_MASK(bits,lsb) ((bits) << (lsb))
@@ -122,7 +122,7 @@
* | Ctrl | Destination Id | 2'b00 | Desc Ctrl | 1'b0 | Data Error | Address of packet descriptor data structure |
* ----------------------------------------------------------------------------------------------------------------------------
*
- * The Instruction and Data Error codes are enumerated in the
+ * The Instruction and Data Error codes are enumerated in the
* ControlDescriptor and PacketDescriptor sections below
*
*/
@@ -132,12 +132,12 @@
* Operating assumptions
* =====================
*
- *
+ *
* -> For all IpSec ops, I assume that all the IP/IPSec/TCP headers
* and the data are present at the specified source addresses.
* I also assume that all necessary header data already exists
* at the destination. Additionally, in AH I assume that all
- * mutable fields (IP.{TOS, Flags, Offset, TTL, Header_Checksum})
+ * mutable fields (IP.{TOS, Flags, Offset, TTL, Header_Checksum})
* and the AH.Authentication_Data have been zeroed by the client.
*
*
@@ -183,9 +183,9 @@
*
* A) Rebuilding packets from fragments on dword boundaries. The discussion
* below is exemplified by tests memcpy_all_off_frags and memcpy_same_off_frags
- *
+ *
* 1) The Offset before data/iv on first fragment is ALWAYS written back
- * Non-zero dst dword or global offsets may cause more data to be
+ * Non-zero dst dword or global offsets may cause more data to be
* written than the user-specified length.
*
*
@@ -217,7 +217,7 @@
* Cipher_Offset = 3
* IV_Offset = 3
* Use_IV = ANY
- *
+ *
*
*
* 3 2 1 0 3 2 1 0
@@ -228,7 +228,7 @@
* ----------------------- -----------------------
* | | | | D05 | | | | D05 | D04 |
* ----------------------- -----------------------
- *
+ *
* 2) On fragments following the first, IV_Offset is overloaded to mean data offset
* (number of dwords to skip from beginning of cacheline before starting processing)
* and Use_IV is overloaded to mean do writeback the offset (in the clear).
@@ -253,7 +253,7 @@
* Packet_Legth = 104 Dst_dword_offset = 1
* IV_Offset = 1
* Use_IV = 0
- *
+ *
*
*
* 3 2 1 0 3 2 1 0
@@ -275,7 +275,7 @@
* engine always writes full lines, therefore ADD1 + 0x20 will be re-written. Setting Use_IV to 0
* will allow the sec pipe write back buffer to preserve D04, D05 from previous frag and only
* receive D10, D11 thereby preserving the integrity of the previous data.
- *
+ *
* 3) On fragments following the first, !UseIV in combination w/ Dst_dword_offset >= (4 - IV_Offset)
* will cause a wraparound of the write thus achieving all 16 possible (Initial_Location, Final_Location)
* combinations for the data.
@@ -284,7 +284,7 @@
* Example:
* --------
*
- * Contiguously merging 2 data sets above with a third located at ADD3. If this is the last fragment,
+ * Contiguously merging 2 data sets above with a third located at ADD3. If this is the last fragment,
* reset its Next bit.
*
*
@@ -295,7 +295,7 @@
* Packet_Legth = 152 Dst_dword_offset = 3
* IV_Offset = 3
* Use_IV = 0
- *
+ *
*
*
* 3 2 1 0 3 2 1 0
@@ -312,13 +312,13 @@
* ----------------------- -----------------------
* | D21 | D20 | D1b | D1a | <- ADD1 + 0x80
* -----------------------
- * | D25 | D24 | D23 | D22 |
+ * | D25 | D24 | D23 | D22 |
* -----------------------
- * | D29 | D28 | D27 | D26 |
+ * | D29 | D28 | D27 | D26 |
* -----------------------
- * | D2d | D2c | D2b | D2a |
+ * | D2d | D2c | D2b | D2a |
* -----------------------
- * |(D2d)|(D2c)| D2f | D2e |
+ * |(D2d)|(D2c)| D2f | D2e |
* -----------------------
*
* It is worth noticing that always writing full-lines causes the last 2 dwords in the reconstituted
@@ -327,7 +327,7 @@
*
*
* B) Implications of fragmentation on AES
- *
+ *
* 1) AES is a 128 bit block cipher; therefore it requires an even dword total data length
* Data fragments (provided there are more than 1) are allowed to have odd dword
* data lengths provided the total length (cumulated over fragments) is an even dword
@@ -354,9 +354,9 @@
* Use_IV = 1
* Cipher = Any AES
* Next = 1
- *
*
- *
+ *
+ *
*
* 3 2 1 0 3 2 1 0
* ----------------------- -----------------------
@@ -396,7 +396,7 @@
/* #define MSG_CMD_CTL_ADDR */
-#define MSG_CMD_CTL_ADDR_LSB 0
+#define MSG_CMD_CTL_ADDR_LSB 0
#define MSG_CMD_CTL_ADDR_BITS FOURTY_BITS
#define MSG_CMD_CTL_ADDR_MASK (MSG_CMD_CTL_ADDR_BITS << MSG_CMD_CTL_ADDR_LSB)
@@ -419,8 +419,8 @@
#define MSG_CMD_DATA_LEN_MASK (MSG_CMD_DATA_LEN_BITS << MSG_CMD_DATA_LEN_LSB)
/* #define MSG_CMD_DATA_ADDR */
-#define MSG_CMD_DATA_ADDR_LSB 0
-#define MSG_CMD_DATA_ADDR_BITS FOURTY_BITS
+#define MSG_CMD_DATA_ADDR_LSB 0
+#define MSG_CMD_DATA_ADDR_BITS FOURTY_BITS
#define MSG_CMD_DATA_ADDR_MASK (MSG_CMD_DATA_ADDR_BITS << MSG_CMD_DATA_ADDR_LSB)
#define MSG_CMD_DATA_MASK (MSG_CMD_DATA_CTL_MASK | \
@@ -620,7 +620,7 @@
* For ARC4, IFetch/IDecode will always read exactly 4
* consecutive dwords into its CipherKey{0,3} regardless
* of this quantity; it will however only use the specified
- * number of bytes.
+ * number of bytes.
* Cipher = 3'b000 Bypass
* 3'b001 DES
* 3'b010 3DES
@@ -642,7 +642,7 @@
* and recalculate the Arc4 Sbox if Arc4 Cipher chosen;
* This overrides LoadArc4State setting.
* HASH.HMAC = 1'b0 Hash without HMAC
- * 1'b1 Hash with HMAC
+ * 1'b1 Hash with HMAC
* Needs to be set to 0 for GCM and Kasumi F9 authenticators
* otherwise unpredictable results will be generated
* Hash = 2'b00 Hash NOP
@@ -712,7 +712,7 @@
#define CTL_DSC_ARC4_KEYLEN_MASK (CTL_DSC_ARC4_KEYLEN_BITS << CTL_DSC_ARC4_KEYLEN_LSB)
/* #define CTL_DSC_CPHR (cipher) */
-#define CTL_DSC_CPHR_BYPASS 0 /* undefined */
+#define CTL_DSC_CPHR_BYPASS 0 /* undefined */
#define CTL_DSC_CPHR_DES 1
#define CTL_DSC_CPHR_3DES 2
#define CTL_DSC_CPHR_AES128 3
@@ -736,8 +736,8 @@
#define CTL_DSC_MODE_MASK (CTL_DSC_MODE_BITS << CTL_DSC_MODE_LSB)
/* #define CTL_DSC_ICPHR */
-#define CTL_DSC_ICPHR_OKY 0 /* Old Keys */
-#define CTL_DSC_ICPHR_NKY 1 /* New Keys */
+#define CTL_DSC_ICPHR_OKY 0 /* Old Keys */
+#define CTL_DSC_ICPHR_NKY 1 /* New Keys */
#define CTL_DSC_ICPHR_LSB 28
#define CTL_DSC_ICPHR_BITS ONE_BIT
#define CTL_DSC_ICPHR_MASK (CTL_DSC_ICPHR_BITS << CTL_DSC_ICPHR_LSB)
@@ -788,1075 +788,1075 @@
/* AES256, (ECB, CBC, OFB, CTR, CFB), HMAC (MD5, SHA-1, SHA-256) - 96 bytes */
typedef struct AES256HMAC_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} AES256HMAC_t, *AES256HMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} AES256HMAC_t, *AES256HMAC_pt;
/* AES256, (ECB, CBC, OFB, CTR, CFB), HMAC (SHA-384, SHA-512) - 160 bytes */
typedef struct AES256HMAC2_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} AES256HMAC2_t, *AES256HMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
+} AES256HMAC2_t, *AES256HMAC2_pt;
/* AES256, (ECB, CBC, OFB, CTR, CFB), GCM - 56 bytes */
typedef struct AES256GCM_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t GCMH0;
- uint64_t GCMH1;
- uint64_t GCMSCI;
-} AES256GCM_t, *AES256GCM_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t GCMH0;
+ uint64_t GCMH1;
+ uint64_t GCMSCI;
+} AES256GCM_t, *AES256GCM_pt;
/* AES256, (ECB, CBC, OFB, CTR, CFB), F9 - 56 bytes */
typedef struct AES256F9_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t authKey0;
- uint64_t authKey1;
-} AES256F9_t, *AES256F9_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t authKey0;
+ uint64_t authKey1;
+} AES256F9_t, *AES256F9_pt;
/* AES256, (ECB, CBC, OFB, CTR, CFB), Non-HMAC (MD5, SHA-1, SHA-256) - 32 bytes */
typedef struct AES256_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
-} AES256_t, *AES256_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+} AES256_t, *AES256_pt;
/* All AES192 possibilities */
/* AES192, (ECB, CBC, OFB, CTR, CFB), HMAC (MD5, SHA-1, SHA-192) - 88 bytes */
typedef struct AES192HMAC_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} AES192HMAC_t, *AES192HMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} AES192HMAC_t, *AES192HMAC_pt;
/* AES192, (ECB, CBC, OFB, CTR, CFB), HMAC (SHA-384, SHA-512) - 152 bytes */
typedef struct AES192HMAC2_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} AES192HMAC2_t, *AES192HMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
+} AES192HMAC2_t, *AES192HMAC2_pt;
/* AES192, (ECB, CBC, OFB, CTR, CFB), GCM - 48 bytes */
typedef struct AES192GCM_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t GCMH0;
- uint64_t GCMH1;
- uint64_t GCMSCI;
-} AES192GCM_t, *AES192GCM_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t GCMH0;
+ uint64_t GCMH1;
+ uint64_t GCMSCI;
+} AES192GCM_t, *AES192GCM_pt;
/* AES192, (ECB, CBC, OFB, CTR, CFB), F9 - 48 bytes */
typedef struct AES192F9_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t authKey0;
- uint64_t authKey1;
-} AES192F9_t, *AES192F9_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t authKey0;
+ uint64_t authKey1;
+} AES192F9_t, *AES192F9_pt;
/* AES192, (ECB, CBC, OFB, CTR, CFB), Non-HMAC (MD5, SHA-1, SHA-192) - 24 bytes */
typedef struct AES192_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
-} AES192_t, *AES192_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+} AES192_t, *AES192_pt;
/* All AES128 possibilities */
/* AES128, (ECB, CBC, OFB, CTR, CFB), HMAC (MD5, SHA-1, SHA-128) - 80 bytes */
typedef struct AES128HMAC_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} AES128HMAC_t, *AES128HMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} AES128HMAC_t, *AES128HMAC_pt;
/* AES128, (ECB, CBC, OFB, CTR, CFB), HMAC (SHA-384, SHA-612) - 144 bytes */
typedef struct AES128HMAC2_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} AES128HMAC2_t, *AES128HMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
+} AES128HMAC2_t, *AES128HMAC2_pt;
/* AES128, (ECB, CBC, OFB, CTR, CFB), GCM - 40 bytes */
typedef struct AES128GCM_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t GCMH0;
- uint64_t GCMH1;
- uint64_t GCMSCI;
-} AES128GCM_t, *AES128GCM_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t GCMH0;
+ uint64_t GCMH1;
+ uint64_t GCMSCI;
+} AES128GCM_t, *AES128GCM_pt;
/* AES128, (ECB, CBC, OFB, CTR, CFB), F9 - 48 bytes */
typedef struct AES128F9_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t authKey0;
- uint64_t authKey1;
-} AES128F9_t, *AES128F9_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t authKey0;
+ uint64_t authKey1;
+} AES128F9_t, *AES128F9_pt;
/* AES128, (ECB, CBC, OFB, CTR, CFB), Non-HMAC (MD5, SHA-1, SHA-128) - 16 bytes */
typedef struct AES128_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
-} AES128_t, *AES128_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+} AES128_t, *AES128_pt;
/* AES128, (OFB F8), Non-HMAC (MD5, SHA-1, SHA-256) - 32 bytes */
typedef struct AES128F8_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
-} AES128F8_t, *AES128F8_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+} AES128F8_t, *AES128F8_pt;
/* AES128, (OFB F8), HMAC (MD5, SHA-1, SHA-256) - 96 bytes */
typedef struct AES128F8HMAC_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} AES128F8HMAC_t, *AES128F8HMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} AES128F8HMAC_t, *AES128F8HMAC_pt;
/* AES128, (OFB F8), HMAC (SHA-384, SHA-512) - 160 bytes */
typedef struct AES128F8HMAC2_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} AES128F8HMAC2_t, *AES128F8HMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
+} AES128F8HMAC2_t, *AES128F8HMAC2_pt;
/* AES192, (OFB F8), Non-HMAC (MD5, SHA-1, SHA-256) - 48 bytes */
typedef struct AES192F8_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t cipherKeyMask2;
-} AES192F8_t, *AES192F8_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t cipherKeyMask2;
+} AES192F8_t, *AES192F8_pt;
/* AES192, (OFB F8), HMAC (MD5, SHA-1, SHA-256) - 112 bytes */
typedef struct AES192F8HMAC_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t cipherKeyMask2;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} AES192F8HMAC_t, *AES192F8HMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t cipherKeyMask2;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} AES192F8HMAC_t, *AES192F8HMAC_pt;
/* AES192, (OFB F8), HMAC (SHA-384, SHA-512) - 176 bytes */
typedef struct AES192F8HMAC2_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t cipherKeyMask2;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} AES192F8HMAC2_t, *AES192F8HMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t cipherKeyMask2;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
+} AES192F8HMAC2_t, *AES192F8HMAC2_pt;
/* AES256, (OFB F8), Non-HMAC (MD5, SHA-1, SHA-256) - 64 bytes */
typedef struct AES256F8_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t cipherKeyMask2;
- uint64_t cipherKeyMask3;
-} AES256F8_t, *AES256F8_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t cipherKeyMask2;
+ uint64_t cipherKeyMask3;
+} AES256F8_t, *AES256F8_pt;
/* AES256, (OFB F8), HMAC (MD5, SHA-1, SHA-256) - 128 bytes */
typedef struct AES256F8HMAC_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t cipherKeyMask2;
- uint64_t cipherKeyMask3;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} AES256F8HMAC_t, *AES256F8HMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t cipherKeyMask2;
+ uint64_t cipherKeyMask3;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} AES256F8HMAC_t, *AES256F8HMAC_pt;
/* AES256, (OFB F8), HMAC (SHA-384, SHA-512) - 192 bytes */
typedef struct AES256F8HMAC2_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t cipherKeyMask0;
- uint64_t cipherKeyMask1;
- uint64_t cipherKeyMask2;
- uint64_t cipherKeyMask3;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} AES256F8HMAC2_t, *AES256F8HMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t cipherKeyMask0;
+ uint64_t cipherKeyMask1;
+ uint64_t cipherKeyMask2;
+ uint64_t cipherKeyMask3;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
+} AES256F8HMAC2_t, *AES256F8HMAC2_pt;
/* AES256, (F8), GCM - 40 bytes */
typedef struct AES128F8GCM_s {
- uint64_t cipherKey0;
- uint64_t cipherKey2;
- uint64_t GCMH0;
- uint64_t GCMH1;
- uint64_t GCMSCI;
-} AES128F8GCM_t, *AES128F8GCM_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey2;
+ uint64_t GCMH0;
+ uint64_t GCMH1;
+ uint64_t GCMSCI;
+} AES128F8GCM_t, *AES128F8GCM_pt;
/* AES256, (F8), GCM - 48 bytes */
typedef struct AES192F8GCM_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t GCMH0;
- uint64_t GCMH1;
- uint64_t GCMSCI;
-} AES192F8GCM_t, *AES192F8GCM_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t GCMH0;
+ uint64_t GCMH1;
+ uint64_t GCMSCI;
+} AES192F8GCM_t, *AES192F8GCM_pt;
/* AES256, (F8), GCM - 56 bytes */
typedef struct AES256F8GCM_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t GCMH0;
- uint64_t GCMH1;
- uint64_t GCMSCI;
-} AES256F8GCM_t, *AES256F8GCM_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t GCMH0;
+ uint64_t GCMH1;
+ uint64_t GCMSCI;
+} AES256F8GCM_t, *AES256F8GCM_pt;
/* AES256, (F8), F9 - 40 bytes */
typedef struct AES128F8F9_s {
- uint64_t cipherKey0;
- uint64_t cipherKey2;
- uint64_t authKey0;
- uint64_t authKey1;
-} AES128F8F9_t, *AES128F8F9_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey2;
+ uint64_t authKey0;
+ uint64_t authKey1;
+} AES128F8F9_t, *AES128F8F9_pt;
/* AES256, (F8), F9 - 48 bytes */
typedef struct AES192F8F9_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t authKey0;
- uint64_t authKey1;
-} AES192F8F9_t, *AES192F8F9_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t authKey0;
+ uint64_t authKey1;
+} AES192F8F9_t, *AES192F8F9_pt;
/* AES256F8, (F8), F9 - 56 bytes */
typedef struct AES256F8F9_s {
- uint64_t cipherKey0;
- uint64_t cipherKey1;
- uint64_t cipherKey2;
- uint64_t cipherKey3;
- uint64_t authKey0;
- uint64_t authKey1;
-} AES256F8F9_t, *AES256F8F9_pt;
+ uint64_t cipherKey0;
+ uint64_t cipherKey1;
+ uint64_t cipherKey2;
+ uint64_t cipherKey3;
+ uint64_t authKey0;
+ uint64_t authKey1;
+} AES256F8F9_t, *AES256F8F9_pt;
/* All DES possibilities */
/* DES, (ECB, CBC), HMAC (MD5, SHA-1, SHA-128) - 72 bytes */
typedef struct DESHMAC_s {
- uint64_t cipherKey0;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
-} DESHMAC_t, *DESHMAC_pt;
+ uint64_t cipherKey0;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+} DESHMAC_t, *DESHMAC_pt;
/* DES, (ECB, CBC), HMAC (SHA-384, SHA-512) - 136 bytes */
typedef struct DESHMAC2_s {
- uint64_t cipherKey0;
- uint64_t hmacKey0;
- uint64_t hmacKey1;
- uint64_t hmacKey2;
- uint64_t hmacKey3;
- uint64_t hmacKey4;
- uint64_t hmacKey5;
- uint64_t hmacKey6;
- uint64_t hmacKey7;
- uint64_t hmacKey8;
- uint64_t hmacKey9;
- uint64_t hmacKey10;
- uint64_t hmacKey11;
- uint64_t hmacKey12;
- uint64_t hmacKey13;
- uint64_t hmacKey14;
- uint64_t hmacKey15;
-} DESHMAC2_t, *DESHMAC2_pt;
+ uint64_t cipherKey0;
+ uint64_t hmacKey0;
+ uint64_t hmacKey1;
+ uint64_t hmacKey2;
+ uint64_t hmacKey3;
+ uint64_t hmacKey4;
+ uint64_t hmacKey5;
+ uint64_t hmacKey6;
+ uint64_t hmacKey7;
+ uint64_t hmacKey8;
+ uint64_t hmacKey9;
+ uint64_t hmacKey10;
+ uint64_t hmacKey11;
+ uint64_t hmacKey12;
+ uint64_t hmacKey13;
+ uint64_t hmacKey14;
+ uint64_t hmacKey15;
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
More information about the svn-src-projects
mailing list