svn commit: r198627 - projects/mips/sys/dev/rmi/sec

Randall Stewart rrs at FreeBSD.org
Thu Oct 29 21:23:44 UTC 2009


Author: rrs
Date: Thu Oct 29 21:23:44 2009
New Revision: 198627
URL: http://svn.freebsd.org/changeset/base/198627

Log:
  white space changes

Modified:
  projects/mips/sys/dev/rmi/sec/desc.h
  projects/mips/sys/dev/rmi/sec/rmilib.c
  projects/mips/sys/dev/rmi/sec/rmilib.h
  projects/mips/sys/dev/rmi/sec/rmisec.c

Modified: projects/mips/sys/dev/rmi/sec/desc.h
==============================================================================
--- projects/mips/sys/dev/rmi/sec/desc.h	Thu Oct 29 21:21:01 2009	(r198626)
+++ projects/mips/sys/dev/rmi/sec/desc.h	Thu Oct 29 21:23:44 2009	(r198627)
@@ -70,7 +70,7 @@
    (word) |=  (((value) & (field ## _BITS)) << (field ## _LSB)); }
 
 /*
- * NOTE: May be used to build value specific mask 
+ * NOTE: May be used to build value specific mask
  *        (e.g.  GEN_MASK(CTL_DSC_CPHR_3DES,CTL_DSC_CPHR_LSB)
  */
 #define GEN_MASK(bits,lsb) ((bits) << (lsb))
@@ -122,7 +122,7 @@
  * | Ctrl | Destination Id | 2'b00 | Desc Ctrl | 1'b0 |     Data Error    |    Address of packet descriptor data structure      |
  *  ----------------------------------------------------------------------------------------------------------------------------
  *
- * The Instruction and Data Error codes are enumerated in the 
+ * The Instruction and Data Error codes are enumerated in the
  * ControlDescriptor and PacketDescriptor sections below
  *
  */
@@ -132,12 +132,12 @@
  * Operating assumptions
  * =====================
  *
- * 
+ *
  *	        -> For all IpSec ops, I assume that all the IP/IPSec/TCP headers
  *		   and the data are present at the specified source addresses.
  *		   I also assume that all necessary header data already exists
  *		   at the destination. Additionally, in AH I assume that all
- *		   mutable fields (IP.{TOS, Flags, Offset, TTL, Header_Checksum}) 
+ *		   mutable fields (IP.{TOS, Flags, Offset, TTL, Header_Checksum})
  *		   and the AH.Authentication_Data have been zeroed by the client.
  *
  *
@@ -183,9 +183,9 @@
  *
  *      A) Rebuilding packets from fragments on dword boundaries. The discussion
  *         below is exemplified by tests memcpy_all_off_frags and memcpy_same_off_frags
- * 
+ *
  *	        1) The Offset before data/iv on first fragment is ALWAYS written back
- *                 Non-zero dst dword or global offsets may cause more data to be 
+ *                 Non-zero dst dword or global offsets may cause more data to be
  *                 written than the user-specified length.
  *
  *
@@ -217,7 +217,7 @@
  *                      Cipher_Offset       = 3
  *                      IV_Offset           = 3
  *                      Use_IV              = ANY
- *                      
+ *
  *
  *
  *                         3     2     1     0                                  3     2     1     0
@@ -228,7 +228,7 @@
  *                       -----------------------                              -----------------------
  *                      |     |     |     | D05 |                            |     |     | D05 | D04 |
  *                       -----------------------                              -----------------------
- * 
+ *
  *	        2) On fragments following the first, IV_Offset is overloaded to mean data offset
  *                 (number of dwords to skip from beginning of cacheline before starting processing)
  *                 and Use_IV is overloaded to mean do writeback the offset (in the clear).
@@ -253,7 +253,7 @@
  *                      Packet_Legth        = 104                               Dst_dword_offset   = 1
  *                      IV_Offset           = 1
  *                      Use_IV              = 0
- *                      
+ *
  *
  *
  *                         3     2     1     0                                  3     2     1     0
@@ -275,7 +275,7 @@
  *                 engine always writes full lines, therefore ADD1 + 0x20 will be re-written. Setting Use_IV to 0
  *                 will allow the sec pipe write back buffer to preserve D04, D05 from previous frag and only
  *                 receive D10, D11 thereby preserving the integrity of the previous data.
- * 
+ *
  *	        3) On fragments following the first, !UseIV in combination w/ Dst_dword_offset >= (4 - IV_Offset)
  *                 will cause a wraparound of the write thus achieving all 16 possible (Initial_Location, Final_Location)
  *                 combinations for the data.
@@ -284,7 +284,7 @@
  *                 Example:
  *                 --------
  *
- *                 Contiguously merging 2 data sets above with a third located at ADD3. If this is the last fragment, 
+ *                 Contiguously merging 2 data sets above with a third located at ADD3. If this is the last fragment,
  *                 reset its Next bit.
  *
  *
@@ -295,7 +295,7 @@
  *                      Packet_Legth        = 152                               Dst_dword_offset   = 3
  *                      IV_Offset           = 3
  *                      Use_IV              = 0
- *                      
+ *
  *
  *
  *                         3     2     1     0                                  3     2     1     0
@@ -312,13 +312,13 @@
  *                       -----------------------                              -----------------------
  *                                                                           | D21 | D20 | D1b | D1a | <- ADD1 + 0x80
  *                                                                            -----------------------
- *                                                                           | D25 | D24 | D23 | D22 | 
+ *                                                                           | D25 | D24 | D23 | D22 |
  *                                                                            -----------------------
- *                                                                           | D29 | D28 | D27 | D26 | 
+ *                                                                           | D29 | D28 | D27 | D26 |
  *                                                                            -----------------------
- *                                                                           | D2d | D2c | D2b | D2a | 
+ *                                                                           | D2d | D2c | D2b | D2a |
  *                                                                            -----------------------
- *                                                                           |(D2d)|(D2c)| D2f | D2e | 
+ *                                                                           |(D2d)|(D2c)| D2f | D2e |
  *                                                                            -----------------------
  *
  *                 It is worth noticing that always writing full-lines causes the last 2 dwords in the reconstituted
@@ -327,7 +327,7 @@
  *
  *
  *      B) Implications of fragmentation on AES
- * 
+ *
  *	        1) AES is a 128 bit block cipher; therefore it requires an even dword total data length
  *                 Data fragments (provided there are more than 1) are allowed to have odd dword
  *                 data lengths provided the total length (cumulated over fragments) is an even dword
@@ -354,9 +354,9 @@
  *                      Use_IV              = 1
  *                      Cipher              = Any AES
  *                      Next                = 1
- *                      
  *
- * 
+ *
+ *
  *
  *                         3     2     1     0                                  3     2     1     0
  *                       -----------------------                              -----------------------
@@ -396,7 +396,7 @@
 
 
 /* #define MSG_CMD_CTL_ADDR */
-#define MSG_CMD_CTL_ADDR_LSB  0 
+#define MSG_CMD_CTL_ADDR_LSB  0
 #define MSG_CMD_CTL_ADDR_BITS FOURTY_BITS
 #define MSG_CMD_CTL_ADDR_MASK (MSG_CMD_CTL_ADDR_BITS << MSG_CMD_CTL_ADDR_LSB)
 
@@ -419,8 +419,8 @@
 #define MSG_CMD_DATA_LEN_MASK  (MSG_CMD_DATA_LEN_BITS << MSG_CMD_DATA_LEN_LSB)
 
 /* #define MSG_CMD_DATA_ADDR */
-#define MSG_CMD_DATA_ADDR_LSB  0 
-#define MSG_CMD_DATA_ADDR_BITS FOURTY_BITS 
+#define MSG_CMD_DATA_ADDR_LSB  0
+#define MSG_CMD_DATA_ADDR_BITS FOURTY_BITS
 #define MSG_CMD_DATA_ADDR_MASK (MSG_CMD_DATA_ADDR_BITS << MSG_CMD_DATA_ADDR_LSB)
 
 #define MSG_CMD_DATA_MASK      (MSG_CMD_DATA_CTL_MASK | \
@@ -620,7 +620,7 @@
  *                                                 For ARC4, IFetch/IDecode will always read exactly 4
  *                                                 consecutive dwords into its CipherKey{0,3} regardless
  *                                                 of this quantity; it will however only use the specified
- *                                                 number of bytes.        
+ *                                                 number of bytes.
  *             Cipher          =        3'b000     Bypass
  *                                      3'b001     DES
  *                                      3'b010     3DES
@@ -642,7 +642,7 @@
  *                                                 and recalculate the Arc4 Sbox if Arc4 Cipher chosen;
  *                                                 This overrides LoadArc4State setting.
  *        HASH.HMAC            =        1'b0       Hash without HMAC
- *                                      1'b1       Hash with HMAC 
+ *                                      1'b1       Hash with HMAC
  *                                                 Needs to be set to 0 for GCM and Kasumi F9 authenticators
  *                                                 otherwise unpredictable results will be generated
  *             Hash            =        2'b00      Hash NOP
@@ -712,7 +712,7 @@
 #define CTL_DSC_ARC4_KEYLEN_MASK         (CTL_DSC_ARC4_KEYLEN_BITS << CTL_DSC_ARC4_KEYLEN_LSB)
 
 /* #define CTL_DSC_CPHR  (cipher) */
-#define CTL_DSC_CPHR_BYPASS       0 /* undefined */
+#define CTL_DSC_CPHR_BYPASS       0	/* undefined */
 #define CTL_DSC_CPHR_DES          1
 #define CTL_DSC_CPHR_3DES         2
 #define CTL_DSC_CPHR_AES128       3
@@ -736,8 +736,8 @@
 #define CTL_DSC_MODE_MASK         (CTL_DSC_MODE_BITS << CTL_DSC_MODE_LSB)
 
 /* #define CTL_DSC_ICPHR */
-#define CTL_DSC_ICPHR_OKY          0 /* Old Keys */
-#define CTL_DSC_ICPHR_NKY          1 /* New Keys */
+#define CTL_DSC_ICPHR_OKY          0	/* Old Keys */
+#define CTL_DSC_ICPHR_NKY          1	/* New Keys */
 #define CTL_DSC_ICPHR_LSB          28
 #define CTL_DSC_ICPHR_BITS         ONE_BIT
 #define CTL_DSC_ICPHR_MASK         (CTL_DSC_ICPHR_BITS << CTL_DSC_ICPHR_LSB)
@@ -788,1075 +788,1075 @@
 
 /* AES256, (ECB, CBC, OFB, CTR, CFB), HMAC (MD5, SHA-1, SHA-256)      - 96  bytes */
 typedef struct AES256HMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} AES256HMAC_t, *AES256HMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}            AES256HMAC_t, *AES256HMAC_pt;
 
 /* AES256, (ECB, CBC, OFB, CTR, CFB), HMAC (SHA-384, SHA-512)      - 160  bytes */
 typedef struct AES256HMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} AES256HMAC2_t, *AES256HMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;
+}             AES256HMAC2_t, *AES256HMAC2_pt;
 
 /* AES256, (ECB, CBC, OFB, CTR, CFB), GCM      - 56  bytes */
 typedef struct AES256GCM_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             GCMH0;
-  uint64_t             GCMH1;
-  uint64_t             GCMSCI;
-} AES256GCM_t, *AES256GCM_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t GCMH0;
+	uint64_t GCMH1;
+	uint64_t GCMSCI;
+}           AES256GCM_t, *AES256GCM_pt;
 
 /* AES256, (ECB, CBC, OFB, CTR, CFB), F9      - 56  bytes */
 typedef struct AES256F9_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             authKey0;
-  uint64_t             authKey1;
-} AES256F9_t, *AES256F9_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t authKey0;
+	uint64_t authKey1;
+}          AES256F9_t, *AES256F9_pt;
 
 /* AES256, (ECB, CBC, OFB, CTR, CFB), Non-HMAC (MD5, SHA-1, SHA-256)  - 32  bytes */
 typedef struct AES256_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-} AES256_t, *AES256_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+}        AES256_t, *AES256_pt;
 
 
 /* All AES192 possibilities */
 
 /* AES192, (ECB, CBC, OFB, CTR, CFB), HMAC (MD5, SHA-1, SHA-192)      - 88  bytes */
 typedef struct AES192HMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} AES192HMAC_t, *AES192HMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}            AES192HMAC_t, *AES192HMAC_pt;
 
 /* AES192, (ECB, CBC, OFB, CTR, CFB), HMAC (SHA-384, SHA-512)      - 152  bytes */
 typedef struct AES192HMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} AES192HMAC2_t, *AES192HMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;
+}             AES192HMAC2_t, *AES192HMAC2_pt;
 
 /* AES192, (ECB, CBC, OFB, CTR, CFB), GCM      - 48  bytes */
 typedef struct AES192GCM_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             GCMH0;
-  uint64_t             GCMH1;
-  uint64_t             GCMSCI;
-} AES192GCM_t, *AES192GCM_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t GCMH0;
+	uint64_t GCMH1;
+	uint64_t GCMSCI;
+}           AES192GCM_t, *AES192GCM_pt;
 
 /* AES192, (ECB, CBC, OFB, CTR, CFB), F9      - 48  bytes */
 typedef struct AES192F9_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             authKey0;
-  uint64_t             authKey1;
-} AES192F9_t, *AES192F9_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t authKey0;
+	uint64_t authKey1;
+}          AES192F9_t, *AES192F9_pt;
 
 /* AES192, (ECB, CBC, OFB, CTR, CFB), Non-HMAC (MD5, SHA-1, SHA-192)  - 24  bytes */
 typedef struct AES192_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-} AES192_t, *AES192_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+}        AES192_t, *AES192_pt;
 
 
 /* All AES128 possibilities */
 
 /* AES128, (ECB, CBC, OFB, CTR, CFB), HMAC (MD5, SHA-1, SHA-128)      - 80  bytes */
 typedef struct AES128HMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} AES128HMAC_t, *AES128HMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}            AES128HMAC_t, *AES128HMAC_pt;
 
 /* AES128, (ECB, CBC, OFB, CTR, CFB), HMAC (SHA-384, SHA-612)      - 144  bytes */
 typedef struct AES128HMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} AES128HMAC2_t, *AES128HMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;
+}             AES128HMAC2_t, *AES128HMAC2_pt;
 
 /* AES128, (ECB, CBC, OFB, CTR, CFB), GCM      - 40  bytes */
 typedef struct AES128GCM_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             GCMH0;
-  uint64_t             GCMH1;
-  uint64_t             GCMSCI;
-} AES128GCM_t, *AES128GCM_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t GCMH0;
+	uint64_t GCMH1;
+	uint64_t GCMSCI;
+}           AES128GCM_t, *AES128GCM_pt;
 
 /* AES128, (ECB, CBC, OFB, CTR, CFB), F9      - 48  bytes */
 typedef struct AES128F9_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             authKey0;
-  uint64_t             authKey1;
-} AES128F9_t, *AES128F9_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t authKey0;
+	uint64_t authKey1;
+}          AES128F9_t, *AES128F9_pt;
 
 /* AES128, (ECB, CBC, OFB, CTR, CFB), Non-HMAC (MD5, SHA-1, SHA-128)  - 16  bytes */
 typedef struct AES128_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-} AES128_t, *AES128_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+}        AES128_t, *AES128_pt;
 
 /* AES128, (OFB F8), Non-HMAC (MD5, SHA-1, SHA-256)  - 32  bytes */
 typedef struct AES128F8_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-} AES128F8_t, *AES128F8_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+}          AES128F8_t, *AES128F8_pt;
 
 /* AES128, (OFB F8), HMAC (MD5, SHA-1, SHA-256)  - 96  bytes */
 typedef struct AES128F8HMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} AES128F8HMAC_t, *AES128F8HMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}              AES128F8HMAC_t, *AES128F8HMAC_pt;
 
 /* AES128, (OFB F8), HMAC (SHA-384, SHA-512)  - 160  bytes */
 typedef struct AES128F8HMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} AES128F8HMAC2_t, *AES128F8HMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;
+}               AES128F8HMAC2_t, *AES128F8HMAC2_pt;
 
 /* AES192, (OFB F8), Non-HMAC (MD5, SHA-1, SHA-256)  - 48  bytes */
 typedef struct AES192F8_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             cipherKeyMask2;
-} AES192F8_t, *AES192F8_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t cipherKeyMask2;
+}          AES192F8_t, *AES192F8_pt;
 
 /* AES192, (OFB F8), HMAC (MD5, SHA-1, SHA-256)  - 112 bytes */
 typedef struct AES192F8HMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             cipherKeyMask2;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} AES192F8HMAC_t, *AES192F8HMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t cipherKeyMask2;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}              AES192F8HMAC_t, *AES192F8HMAC_pt;
 
 /* AES192, (OFB F8), HMAC (SHA-384, SHA-512)  - 176 bytes */
 typedef struct AES192F8HMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             cipherKeyMask2;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} AES192F8HMAC2_t, *AES192F8HMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t cipherKeyMask2;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;
+}               AES192F8HMAC2_t, *AES192F8HMAC2_pt;
 
 /* AES256, (OFB F8), Non-HMAC (MD5, SHA-1, SHA-256)  - 64  bytes */
 typedef struct AES256F8_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             cipherKeyMask2;
-  uint64_t             cipherKeyMask3;
-} AES256F8_t, *AES256F8_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t cipherKeyMask2;
+	uint64_t cipherKeyMask3;
+}          AES256F8_t, *AES256F8_pt;
 
 /* AES256, (OFB F8), HMAC (MD5, SHA-1, SHA-256)  - 128  bytes */
 typedef struct AES256F8HMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             cipherKeyMask2;
-  uint64_t             cipherKeyMask3;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} AES256F8HMAC_t, *AES256F8HMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t cipherKeyMask2;
+	uint64_t cipherKeyMask3;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}              AES256F8HMAC_t, *AES256F8HMAC_pt;
 
 /* AES256, (OFB F8), HMAC (SHA-384, SHA-512)  - 192  bytes */
 typedef struct AES256F8HMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             cipherKeyMask0;
-  uint64_t             cipherKeyMask1;
-  uint64_t             cipherKeyMask2;
-  uint64_t             cipherKeyMask3;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} AES256F8HMAC2_t, *AES256F8HMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t cipherKeyMask0;
+	uint64_t cipherKeyMask1;
+	uint64_t cipherKeyMask2;
+	uint64_t cipherKeyMask3;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;
+}               AES256F8HMAC2_t, *AES256F8HMAC2_pt;
 
 /* AES256, (F8), GCM      - 40  bytes */
 typedef struct AES128F8GCM_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey2;
-  uint64_t             GCMH0;
-  uint64_t             GCMH1;
-  uint64_t             GCMSCI;
-} AES128F8GCM_t, *AES128F8GCM_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey2;
+	uint64_t GCMH0;
+	uint64_t GCMH1;
+	uint64_t GCMSCI;
+}             AES128F8GCM_t, *AES128F8GCM_pt;
 
 /* AES256, (F8), GCM      - 48  bytes */
 typedef struct AES192F8GCM_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             GCMH0;
-  uint64_t             GCMH1;
-  uint64_t             GCMSCI;
-} AES192F8GCM_t, *AES192F8GCM_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t GCMH0;
+	uint64_t GCMH1;
+	uint64_t GCMSCI;
+}             AES192F8GCM_t, *AES192F8GCM_pt;
 
 /* AES256, (F8), GCM      - 56  bytes */
 typedef struct AES256F8GCM_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             GCMH0;
-  uint64_t             GCMH1;
-  uint64_t             GCMSCI;
-} AES256F8GCM_t, *AES256F8GCM_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t GCMH0;
+	uint64_t GCMH1;
+	uint64_t GCMSCI;
+}             AES256F8GCM_t, *AES256F8GCM_pt;
 
 /* AES256, (F8), F9      - 40  bytes */
 typedef struct AES128F8F9_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey2;
-  uint64_t             authKey0;
-  uint64_t             authKey1;
-} AES128F8F9_t, *AES128F8F9_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey2;
+	uint64_t authKey0;
+	uint64_t authKey1;
+}            AES128F8F9_t, *AES128F8F9_pt;
 
 /* AES256, (F8), F9      - 48  bytes */
 typedef struct AES192F8F9_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             authKey0;
-  uint64_t             authKey1;
-} AES192F8F9_t, *AES192F8F9_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t authKey0;
+	uint64_t authKey1;
+}            AES192F8F9_t, *AES192F8F9_pt;
 
 /* AES256F8, (F8), F9      - 56  bytes */
 typedef struct AES256F8F9_s {
-  uint64_t             cipherKey0;
-  uint64_t             cipherKey1;
-  uint64_t             cipherKey2;
-  uint64_t             cipherKey3;
-  uint64_t             authKey0;
-  uint64_t             authKey1;
-} AES256F8F9_t, *AES256F8F9_pt;
+	uint64_t cipherKey0;
+	uint64_t cipherKey1;
+	uint64_t cipherKey2;
+	uint64_t cipherKey3;
+	uint64_t authKey0;
+	uint64_t authKey1;
+}            AES256F8F9_t, *AES256F8F9_pt;
 
 /* All DES possibilities */
 
 /* DES, (ECB, CBC), HMAC (MD5, SHA-1, SHA-128)              - 72  bytes */
 typedef struct DESHMAC_s {
-  uint64_t             cipherKey0;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-} DESHMAC_t, *DESHMAC_pt;
+	uint64_t cipherKey0;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+}         DESHMAC_t, *DESHMAC_pt;
 
 /* DES, (ECB, CBC), HMAC (SHA-384, SHA-512)              - 136  bytes */
 typedef struct DESHMAC2_s {
-  uint64_t             cipherKey0;
-  uint64_t             hmacKey0;
-  uint64_t             hmacKey1;
-  uint64_t             hmacKey2;
-  uint64_t             hmacKey3;
-  uint64_t             hmacKey4;
-  uint64_t             hmacKey5;
-  uint64_t             hmacKey6;
-  uint64_t             hmacKey7;
-  uint64_t             hmacKey8;
-  uint64_t             hmacKey9;
-  uint64_t             hmacKey10;
-  uint64_t             hmacKey11;
-  uint64_t             hmacKey12;
-  uint64_t             hmacKey13;
-  uint64_t             hmacKey14;
-  uint64_t             hmacKey15;
-} DESHMAC2_t, *DESHMAC2_pt;
+	uint64_t cipherKey0;
+	uint64_t hmacKey0;
+	uint64_t hmacKey1;
+	uint64_t hmacKey2;
+	uint64_t hmacKey3;
+	uint64_t hmacKey4;
+	uint64_t hmacKey5;
+	uint64_t hmacKey6;
+	uint64_t hmacKey7;
+	uint64_t hmacKey8;
+	uint64_t hmacKey9;
+	uint64_t hmacKey10;
+	uint64_t hmacKey11;
+	uint64_t hmacKey12;
+	uint64_t hmacKey13;
+	uint64_t hmacKey14;
+	uint64_t hmacKey15;

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***


More information about the svn-src-projects mailing list