From nobody Thu Dec 9 20:17:44 2021 X-Original-To: dev-commits-src-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 27D3918DA705; Thu, 9 Dec 2021 20:17:47 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4J951j4mLmz4r9q; Thu, 9 Dec 2021 20:17:45 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E264C5499; Thu, 9 Dec 2021 20:17:44 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 1B9KHiVP053781; Thu, 9 Dec 2021 20:17:44 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 1B9KHii4053780; Thu, 9 Dec 2021 20:17:44 GMT (envelope-from git) Date: Thu, 9 Dec 2021 20:17:44 GMT Message-Id: <202112092017.1B9KHii4053780@gitrepo.freebsd.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org From: John Baldwin Subject: git: f313909a5047 - main - cryptosoft: Rename sw_kschedule member to sw_ctx. List-Id: Commit messages for all branches of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-src-all@freebsd.org X-BeenThere: dev-commits-src-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jhb X-Git-Repository: src X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: f313909a504700556a143df468eeef6eed3f8647 Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1639081066; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=x5bT8iY48FKJz8z90lN5kJW8FDSpO1fqP1pXH517FyI=; b=BLhSZFiUCF10TozyMSLTejJ/j3XY+DcQHETBDShmB/RH2uYO1M3FFDFiieis1CUPUVn6Pd 2pRQYE/60AAj2iWUiq09Muk0v8kECnm149/vKfw2sOf5ixkN1Ct8z08k8nqfApHn/99HA8 fM5qQOOg71G2Vw8PjZ6al5tg203NmJ1sEi/VsqrYTHZn14pnItqglaMNJNYCPi/mBAMDnM dw6t/M9m8PIX8YCI6OTeqp131ivTrtot93HYWgLD5T+bm/QAIVnvp/ob62kDxlIC4v4tte 4Xh8C5J+y1JcPYRHd2ySXQNUKFTPKRTIyr7xoFKbautS+8t0ejOeuQOvX4XdLA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1639081066; a=rsa-sha256; cv=none; b=Lzzsjkohr/Z1NWuIzFeCffl0deSm06U8UUoEOSS787H79XZsnQWHMWNI/RGFDxQkh0JdWs 847amv7cpxrRAHmEXY2dkSmbOF5XkA9v2T0cAslVeuq6Lq9+VyNfGi/XvK9MdsJ/vUXkYl bQ5K7A26By697DXFH3SK3pew51ahFKGoMvtZ7CoU7iDcwCIK09Jg2MzWsGZC3VSswCZ4bd BFPKM62rP+tx3OabCA1ZMFClWWFqchrvItuEmpwDaEu26TenAEsoKLAYyyik7oyyY0J3pW 8UlExzu7XamND9wd3oCqeacbllASNHFdT9DFYY4xLlHEP2f34CYEJlEcYqu6jA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by jhb: URL: https://cgit.FreeBSD.org/src/commit/?id=f313909a504700556a143df468eeef6eed3f8647 commit f313909a504700556a143df468eeef6eed3f8647 Author: John Baldwin AuthorDate: 2021-12-09 19:52:42 +0000 Commit: John Baldwin CommitDate: 2021-12-09 19:52:42 +0000 cryptosoft: Rename sw_kschedule member to sw_ctx. The cipher context isn't always a key schedule, so use a more generic name. Reviewed by: markj Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D33197 --- sys/opencrypto/cryptosoft.c | 124 ++++++++++++++++++++++---------------------- 1 file changed, 62 insertions(+), 62 deletions(-) diff --git a/sys/opencrypto/cryptosoft.c b/sys/opencrypto/cryptosoft.c index fe320047f5f6..9f61b49c8b3c 100644 --- a/sys/opencrypto/cryptosoft.c +++ b/sys/opencrypto/cryptosoft.c @@ -68,7 +68,7 @@ struct swcr_auth { }; struct swcr_encdec { - void *sw_kschedule; + void *sw_ctx; const struct enc_xform *sw_exf; }; @@ -136,7 +136,7 @@ swcr_encdec(struct swcr_session *ses, struct cryptop *crp) return (EINVAL); if (crp->crp_cipher_key != NULL) { - error = exf->setkey(sw->sw_kschedule, + error = exf->setkey(sw->sw_ctx, crp->crp_cipher_key, csp->csp_cipher_klen); if (error) return (error); @@ -149,7 +149,7 @@ swcr_encdec(struct swcr_session *ses, struct cryptop *crp) * xforms that provide a reinit method perform all IV * handling themselves. */ - exf->reinit(sw->sw_kschedule, iv, csp->csp_ivlen); + exf->reinit(sw->sw_ctx, iv, csp->csp_ivlen); } ivp = iv; @@ -192,15 +192,15 @@ swcr_encdec(struct swcr_session *ses, struct cryptop *crp) */ if (exf->reinit != NULL) { if (encrypting) - exf->encrypt(sw->sw_kschedule, inblk, outblk); + exf->encrypt(sw->sw_ctx, inblk, outblk); else - exf->decrypt(sw->sw_kschedule, inblk, outblk); + exf->decrypt(sw->sw_ctx, inblk, outblk); } else if (encrypting) { /* XOR with previous block */ for (i = 0; i < blks; i++) outblk[i] = inblk[i] ^ ivp[i]; - exf->encrypt(sw->sw_kschedule, outblk, outblk); + exf->encrypt(sw->sw_ctx, outblk, outblk); /* * Keep encrypted block for XOR'ing @@ -216,7 +216,7 @@ swcr_encdec(struct swcr_session *ses, struct cryptop *crp) nivp = (ivp == iv) ? iv2 : iv; memcpy(nivp, inblk, blks); - exf->decrypt(sw->sw_kschedule, inblk, outblk); + exf->decrypt(sw->sw_ctx, inblk, outblk); /* XOR with previous block */ for (i = 0; i < blks; i++) @@ -264,10 +264,10 @@ swcr_encdec(struct swcr_session *ses, struct cryptop *crp) if (outlen < resid) outblk = blk; if (encrypting) - exf->encrypt_last(sw->sw_kschedule, inblk, outblk, + exf->encrypt_last(sw->sw_ctx, inblk, outblk, resid); else - exf->decrypt_last(sw->sw_kschedule, inblk, outblk, + exf->decrypt_last(sw->sw_ctx, inblk, outblk, resid); if (outlen < resid) crypto_cursor_copyback(&cc_out, resid, blk); @@ -487,20 +487,20 @@ swcr_gcm(struct swcr_session *ses, struct cryptop *crp) /* Supply cipher with nonce. */ if (crp->crp_cipher_key != NULL) - exf->setkey(swe->sw_kschedule, crp->crp_cipher_key, + exf->setkey(swe->sw_ctx, crp->crp_cipher_key, crypto_get_params(crp->crp_session)->csp_cipher_klen); - exf->reinit(swe->sw_kschedule, crp->crp_iv, ivlen); + exf->reinit(swe->sw_ctx, crp->crp_iv, ivlen); /* Supply MAC with AAD */ if (crp->crp_aad != NULL) { len = rounddown(crp->crp_aad_length, blksz); if (len != 0) - exf->update(swe->sw_kschedule, crp->crp_aad, len); + exf->update(swe->sw_ctx, crp->crp_aad, len); if (crp->crp_aad_length != len) { memset(blk, 0, blksz); memcpy(blk, (char *)crp->crp_aad + len, crp->crp_aad_length - len); - exf->update(swe->sw_kschedule, blk, blksz); + exf->update(swe->sw_ctx, blk, blksz); } } else { crypto_cursor_init(&cc_in, &crp->crp_buf); @@ -516,12 +516,12 @@ swcr_gcm(struct swcr_session *ses, struct cryptop *crp) crypto_cursor_copydata(&cc_in, len, blk); inblk = blk; } - exf->update(swe->sw_kschedule, inblk, len); + exf->update(swe->sw_ctx, inblk, len); } if (resid > 0) { memset(blk, 0, blksz); crypto_cursor_copydata(&cc_in, resid, blk); - exf->update(swe->sw_kschedule, blk, blksz); + exf->update(swe->sw_ctx, blk, blksz); } } @@ -545,23 +545,23 @@ swcr_gcm(struct swcr_session *ses, struct cryptop *crp) outblk = crypto_cursor_segment(&cc_out, &len); if (len < blksz) outblk = blk; - exf->encrypt(swe->sw_kschedule, inblk, outblk); - exf->update(swe->sw_kschedule, outblk, blksz); + exf->encrypt(swe->sw_ctx, inblk, outblk); + exf->update(swe->sw_ctx, outblk, blksz); if (outblk == blk) crypto_cursor_copyback(&cc_out, blksz, blk); else crypto_cursor_advance(&cc_out, blksz); } else { - exf->update(swe->sw_kschedule, inblk, blksz); + exf->update(swe->sw_ctx, inblk, blksz); } } if (resid > 0) { crypto_cursor_copydata(&cc_in, resid, blk); if (CRYPTO_OP_IS_ENCRYPT(crp->crp_op)) { - exf->encrypt_last(swe->sw_kschedule, blk, blk, resid); + exf->encrypt_last(swe->sw_ctx, blk, blk, resid); crypto_cursor_copyback(&cc_out, resid, blk); } - exf->update(swe->sw_kschedule, blk, resid); + exf->update(swe->sw_ctx, blk, resid); } /* length block */ @@ -570,10 +570,10 @@ swcr_gcm(struct swcr_session *ses, struct cryptop *crp) *blkp = htobe32(crp->crp_aad_length * 8); blkp = (uint32_t *)blk + 3; *blkp = htobe32(crp->crp_payload_length * 8); - exf->update(swe->sw_kschedule, blk, blksz); + exf->update(swe->sw_ctx, blk, blksz); /* Finalize MAC */ - exf->final(tag, swe->sw_kschedule); + exf->final(tag, swe->sw_ctx); /* Validate tag */ error = 0; @@ -603,7 +603,7 @@ swcr_gcm(struct swcr_session *ses, struct cryptop *crp) outblk = crypto_cursor_segment(&cc_out, &len); if (len < blksz) outblk = blk; - exf->decrypt(swe->sw_kschedule, inblk, outblk); + exf->decrypt(swe->sw_ctx, inblk, outblk); if (outblk == blk) crypto_cursor_copyback(&cc_out, blksz, blk); else @@ -611,7 +611,7 @@ swcr_gcm(struct swcr_session *ses, struct cryptop *crp) } if (resid > 0) { crypto_cursor_copydata(&cc_in, resid, blk); - exf->decrypt_last(swe->sw_kschedule, blk, blk, resid); + exf->decrypt_last(swe->sw_ctx, blk, blk, resid); crypto_cursor_copyback(&cc_out, resid, blk); } } else { @@ -769,35 +769,35 @@ swcr_ccm(struct swcr_session *ses, struct cryptop *crp) ivlen = csp->csp_ivlen; if (crp->crp_cipher_key != NULL) - exf->setkey(swe->sw_kschedule, crp->crp_cipher_key, + exf->setkey(swe->sw_ctx, crp->crp_cipher_key, crypto_get_params(crp->crp_session)->csp_cipher_klen); - exf->reinit(swe->sw_kschedule, crp->crp_iv, ivlen); + exf->reinit(swe->sw_ctx, crp->crp_iv, ivlen); /* Supply MAC with b0. */ _Static_assert(sizeof(blkbuf) >= CCM_CBC_BLOCK_LEN, "blkbuf too small for b0"); build_ccm_b0(crp->crp_iv, ivlen, crp->crp_aad_length, crp->crp_payload_length, swa->sw_mlen, blk); - exf->update(swe->sw_kschedule, blk, CCM_CBC_BLOCK_LEN); + exf->update(swe->sw_ctx, blk, CCM_CBC_BLOCK_LEN); /* Supply MAC with AAD */ if (crp->crp_aad_length != 0) { len = build_ccm_aad_length(crp->crp_aad_length, blk); - exf->update(swe->sw_kschedule, blk, len); + exf->update(swe->sw_ctx, blk, len); if (crp->crp_aad != NULL) - exf->update(swe->sw_kschedule, crp->crp_aad, + exf->update(swe->sw_ctx, crp->crp_aad, crp->crp_aad_length); else crypto_apply(crp, crp->crp_aad_start, crp->crp_aad_length, exf->update, - swe->sw_kschedule); + swe->sw_ctx); /* Pad the AAD (including length field) to a full block. */ len = (len + crp->crp_aad_length) % CCM_CBC_BLOCK_LEN; if (len != 0) { len = CCM_CBC_BLOCK_LEN - len; memset(blk, 0, CCM_CBC_BLOCK_LEN); - exf->update(swe->sw_kschedule, blk, len); + exf->update(swe->sw_ctx, blk, len); } } @@ -820,8 +820,8 @@ swcr_ccm(struct swcr_session *ses, struct cryptop *crp) outblk = crypto_cursor_segment(&cc_out, &len); if (len < blksz) outblk = blk; - exf->update(swe->sw_kschedule, inblk, blksz); - exf->encrypt(swe->sw_kschedule, inblk, outblk); + exf->update(swe->sw_ctx, inblk, blksz); + exf->encrypt(swe->sw_ctx, inblk, outblk); if (outblk == blk) crypto_cursor_copyback(&cc_out, blksz, blk); else @@ -835,24 +835,24 @@ swcr_ccm(struct swcr_session *ses, struct cryptop *crp) * the tag and a second time after the tag is * verified. */ - exf->decrypt(swe->sw_kschedule, inblk, blk); - exf->update(swe->sw_kschedule, blk, blksz); + exf->decrypt(swe->sw_ctx, inblk, blk); + exf->update(swe->sw_ctx, blk, blksz); } } if (resid > 0) { crypto_cursor_copydata(&cc_in, resid, blk); if (CRYPTO_OP_IS_ENCRYPT(crp->crp_op)) { - exf->update(swe->sw_kschedule, blk, resid); - exf->encrypt_last(swe->sw_kschedule, blk, blk, resid); + exf->update(swe->sw_ctx, blk, resid); + exf->encrypt_last(swe->sw_ctx, blk, blk, resid); crypto_cursor_copyback(&cc_out, resid, blk); } else { - exf->decrypt_last(swe->sw_kschedule, blk, blk, resid); - exf->update(swe->sw_kschedule, blk, resid); + exf->decrypt_last(swe->sw_ctx, blk, blk, resid); + exf->update(swe->sw_ctx, blk, resid); } } /* Finalize MAC */ - exf->final(tag, swe->sw_kschedule); + exf->final(tag, swe->sw_ctx); /* Validate tag */ error = 0; @@ -870,7 +870,7 @@ swcr_ccm(struct swcr_session *ses, struct cryptop *crp) } /* tag matches, decrypt data */ - exf->reinit(swe->sw_kschedule, crp->crp_iv, ivlen); + exf->reinit(swe->sw_ctx, crp->crp_iv, ivlen); crypto_cursor_init(&cc_in, &crp->crp_buf); crypto_cursor_advance(&cc_in, crp->crp_payload_start); for (resid = crp->crp_payload_length; resid > blksz; @@ -884,7 +884,7 @@ swcr_ccm(struct swcr_session *ses, struct cryptop *crp) outblk = crypto_cursor_segment(&cc_out, &len); if (len < blksz) outblk = blk; - exf->decrypt(swe->sw_kschedule, inblk, outblk); + exf->decrypt(swe->sw_ctx, inblk, outblk); if (outblk == blk) crypto_cursor_copyback(&cc_out, blksz, blk); else @@ -892,7 +892,7 @@ swcr_ccm(struct swcr_session *ses, struct cryptop *crp) } if (resid > 0) { crypto_cursor_copydata(&cc_in, resid, blk); - exf->decrypt_last(swe->sw_kschedule, blk, blk, resid); + exf->decrypt_last(swe->sw_ctx, blk, blk, resid); crypto_cursor_copyback(&cc_out, resid, blk); } } else { @@ -935,21 +935,21 @@ swcr_chacha20_poly1305(struct swcr_session *ses, struct cryptop *crp) csp = crypto_get_params(crp->crp_session); if (crp->crp_cipher_key != NULL) - exf->setkey(swe->sw_kschedule, crp->crp_cipher_key, + exf->setkey(swe->sw_ctx, crp->crp_cipher_key, csp->csp_cipher_klen); - exf->reinit(swe->sw_kschedule, crp->crp_iv, csp->csp_ivlen); + exf->reinit(swe->sw_ctx, crp->crp_iv, csp->csp_ivlen); /* Supply MAC with AAD */ if (crp->crp_aad != NULL) - exf->update(swe->sw_kschedule, crp->crp_aad, + exf->update(swe->sw_ctx, crp->crp_aad, crp->crp_aad_length); else crypto_apply(crp, crp->crp_aad_start, - crp->crp_aad_length, exf->update, swe->sw_kschedule); + crp->crp_aad_length, exf->update, swe->sw_ctx); if (crp->crp_aad_length % 16 != 0) { /* padding1 */ memset(blk, 0, 16); - exf->update(swe->sw_kschedule, blk, + exf->update(swe->sw_ctx, blk, 16 - crp->crp_aad_length % 16); } @@ -972,27 +972,27 @@ swcr_chacha20_poly1305(struct swcr_session *ses, struct cryptop *crp) outblk = crypto_cursor_segment(&cc_out, &len); if (len < blksz) outblk = blk; - exf->encrypt(swe->sw_kschedule, inblk, outblk); - exf->update(swe->sw_kschedule, outblk, blksz); + exf->encrypt(swe->sw_ctx, inblk, outblk); + exf->update(swe->sw_ctx, outblk, blksz); if (outblk == blk) crypto_cursor_copyback(&cc_out, blksz, blk); else crypto_cursor_advance(&cc_out, blksz); } else { - exf->update(swe->sw_kschedule, inblk, blksz); + exf->update(swe->sw_ctx, inblk, blksz); } } if (resid > 0) { crypto_cursor_copydata(&cc_in, resid, blk); if (CRYPTO_OP_IS_ENCRYPT(crp->crp_op)) { - exf->encrypt_last(swe->sw_kschedule, blk, blk, resid); + exf->encrypt_last(swe->sw_ctx, blk, blk, resid); crypto_cursor_copyback(&cc_out, resid, blk); } - exf->update(swe->sw_kschedule, blk, resid); + exf->update(swe->sw_ctx, blk, resid); if (resid % 16 != 0) { /* padding2 */ memset(blk, 0, 16); - exf->update(swe->sw_kschedule, blk, 16 - resid % 16); + exf->update(swe->sw_ctx, blk, 16 - resid % 16); } } @@ -1000,10 +1000,10 @@ swcr_chacha20_poly1305(struct swcr_session *ses, struct cryptop *crp) blkp = (uint64_t *)blk; blkp[0] = htole64(crp->crp_aad_length); blkp[1] = htole64(crp->crp_payload_length); - exf->update(swe->sw_kschedule, blk, sizeof(uint64_t) * 2); + exf->update(swe->sw_ctx, blk, sizeof(uint64_t) * 2); /* Finalize MAC */ - exf->final(tag, swe->sw_kschedule); + exf->final(tag, swe->sw_ctx); /* Validate tag */ error = 0; @@ -1033,7 +1033,7 @@ swcr_chacha20_poly1305(struct swcr_session *ses, struct cryptop *crp) outblk = crypto_cursor_segment(&cc_out, &len); if (len < blksz) outblk = blk; - exf->decrypt(swe->sw_kschedule, inblk, outblk); + exf->decrypt(swe->sw_ctx, inblk, outblk); if (outblk == blk) crypto_cursor_copyback(&cc_out, blksz, blk); else @@ -1041,7 +1041,7 @@ swcr_chacha20_poly1305(struct swcr_session *ses, struct cryptop *crp) } if (resid > 0) { crypto_cursor_copydata(&cc_in, resid, blk); - exf->decrypt_last(swe->sw_kschedule, blk, blk, resid); + exf->decrypt_last(swe->sw_ctx, blk, blk, resid); crypto_cursor_copyback(&cc_out, resid, blk); } } else { @@ -1172,13 +1172,13 @@ swcr_setup_cipher(struct swcr_session *ses, swe = &ses->swcr_encdec; txf = crypto_cipher(csp); if (txf->ctxsize != 0) { - swe->sw_kschedule = malloc(txf->ctxsize, M_CRYPTO_DATA, + swe->sw_ctx = malloc(txf->ctxsize, M_CRYPTO_DATA, M_NOWAIT); - if (swe->sw_kschedule == NULL) + if (swe->sw_ctx == NULL) return (ENOMEM); } if (csp->csp_cipher_key != NULL) { - error = txf->setkey(swe->sw_kschedule, + error = txf->setkey(swe->sw_ctx, csp->csp_cipher_key, csp->csp_cipher_klen); if (error) return (error); @@ -1549,7 +1549,7 @@ swcr_freesession(device_t dev, crypto_session_t cses) mtx_destroy(&ses->swcr_lock); - zfree(ses->swcr_encdec.sw_kschedule, M_CRYPTO_DATA); + zfree(ses->swcr_encdec.sw_ctx, M_CRYPTO_DATA); zfree(ses->swcr_auth.sw_ictx, M_CRYPTO_DATA); zfree(ses->swcr_auth.sw_octx, M_CRYPTO_DATA); }