Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Jul 2018 07:21:38 +0000 (UTC)
From:      Conrad Meyer <cem@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r336122 - in head/sys: crypto/aesni crypto/ccp crypto/via dev/cesa dev/safe dev/ubsec opencrypto
Message-ID:  <201807090721.w697Lctp022608@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cem
Date: Mon Jul  9 07:21:37 2018
New Revision: 336122
URL: https://svnweb.freebsd.org/changeset/base/336122

Log:
  Remove "HMAC" from <HASH>_HMAC_BLOCK_LEN macro names
  
  The block size is a property of the underlying hash algorithm, and has
  nothing to do with the HMAC construction.
  
  No functional change.

Modified:
  head/sys/crypto/aesni/aesni.h
  head/sys/crypto/ccp/ccp.h
  head/sys/crypto/via/padlock_hash.c
  head/sys/dev/cesa/cesa.c
  head/sys/dev/safe/safe.c
  head/sys/dev/ubsec/ubsec.c
  head/sys/opencrypto/cryptodev.h
  head/sys/opencrypto/xform_md5.c
  head/sys/opencrypto/xform_rmd160.c
  head/sys/opencrypto/xform_sha1.c
  head/sys/opencrypto/xform_sha2.c

Modified: head/sys/crypto/aesni/aesni.h
==============================================================================
--- head/sys/crypto/aesni/aesni.h	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/crypto/aesni/aesni.h	Mon Jul  9 07:21:37 2018	(r336122)
@@ -57,7 +57,7 @@ struct aesni_session {
 	uint8_t dec_schedule[AES_SCHED_LEN] __aligned(16);
 	uint8_t xts_schedule[AES_SCHED_LEN] __aligned(16);
 	/* Same as the SHA256 Blocksize. */
-	uint8_t hmac_key[SHA1_HMAC_BLOCK_LEN] __aligned(16);
+	uint8_t hmac_key[SHA1_BLOCK_LEN] __aligned(16);
 	int algo;
 	int rounds;
 	/* uint8_t *ses_ictx; */

Modified: head/sys/crypto/ccp/ccp.h
==============================================================================
--- head/sys/crypto/ccp/ccp.h	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/crypto/ccp/ccp.h	Mon Jul  9 07:21:37 2018	(r336122)
@@ -35,7 +35,7 @@
  * SHA3-224 is the next largest block size, at 1152 bits.  However, crypto(4)
  * doesn't support any SHA3 hash, so SHA2 is the constraint:
  */
-#define CCP_HASH_MAX_BLOCK_SIZE	(SHA2_512_HMAC_BLOCK_LEN)
+#define CCP_HASH_MAX_BLOCK_SIZE	(SHA2_512_BLOCK_LEN)
 
 #define CCP_AES_MAX_KEY_LEN	(AES_XTS_MAX_KEY)
 #define CCP_MAX_CRYPTO_IV_LEN	32	/* GCM IV + GHASH context */

Modified: head/sys/crypto/via/padlock_hash.c
==============================================================================
--- head/sys/crypto/via/padlock_hash.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/crypto/via/padlock_hash.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -83,10 +83,10 @@ static void padlock_sha256_final(uint8_t *hash, struct
 static struct auth_hash padlock_hmac_sha1 = {
 	.type = CRYPTO_SHA1_HMAC,
 	.name = "HMAC-SHA1",
-	.keysize = SHA1_HMAC_BLOCK_LEN,
+	.keysize = SHA1_BLOCK_LEN,
 	.hashsize = SHA1_HASH_LEN,
 	.ctxsize = sizeof(struct padlock_sha_ctx),
-	.blocksize = SHA1_HMAC_BLOCK_LEN,
+	.blocksize = SHA1_BLOCK_LEN,
         .Init = (void (*)(void *))padlock_sha_init,
 	.Update = (int (*)(void *, const uint8_t *, uint16_t))padlock_sha_update,
 	.Final = (void (*)(uint8_t *, void *))padlock_sha1_final,
@@ -95,10 +95,10 @@ static struct auth_hash padlock_hmac_sha1 = {
 static struct auth_hash padlock_hmac_sha256 = {
 	.type = CRYPTO_SHA2_256_HMAC,
 	.name = "HMAC-SHA2-256",
-	.keysize = SHA2_256_HMAC_BLOCK_LEN,
+	.keysize = SHA2_256_BLOCK_LEN,
 	.hashsize = SHA2_256_HASH_LEN,
 	.ctxsize = sizeof(struct padlock_sha_ctx),
-	.blocksize = SHA2_256_HMAC_BLOCK_LEN,
+	.blocksize = SHA2_256_BLOCK_LEN,
         .Init = (void (*)(void *))padlock_sha_init,
 	.Update = (int (*)(void *, const uint8_t *, uint16_t))padlock_sha_update,
 	.Final = (void (*)(uint8_t *, void *))padlock_sha256_final,

Modified: head/sys/dev/cesa/cesa.c
==============================================================================
--- head/sys/dev/cesa/cesa.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/dev/cesa/cesa.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -471,26 +471,26 @@ cesa_set_mkey(struct cesa_session *cs, int alg, const 
 	switch (alg) {
 	case CRYPTO_MD5_HMAC:
 		MD5Init(&md5ctx);
-		MD5Update(&md5ctx, ipad, MD5_HMAC_BLOCK_LEN);
+		MD5Update(&md5ctx, ipad, MD5_BLOCK_LEN);
 		memcpy(hin, md5ctx.state, sizeof(md5ctx.state));
 		MD5Init(&md5ctx);
-		MD5Update(&md5ctx, opad, MD5_HMAC_BLOCK_LEN);
+		MD5Update(&md5ctx, opad, MD5_BLOCK_LEN);
 		memcpy(hout, md5ctx.state, sizeof(md5ctx.state));
 		break;
 	case CRYPTO_SHA1_HMAC:
 		SHA1Init(&sha1ctx);
-		SHA1Update(&sha1ctx, ipad, SHA1_HMAC_BLOCK_LEN);
+		SHA1Update(&sha1ctx, ipad, SHA1_BLOCK_LEN);
 		memcpy(hin, sha1ctx.h.b32, sizeof(sha1ctx.h.b32));
 		SHA1Init(&sha1ctx);
-		SHA1Update(&sha1ctx, opad, SHA1_HMAC_BLOCK_LEN);
+		SHA1Update(&sha1ctx, opad, SHA1_BLOCK_LEN);
 		memcpy(hout, sha1ctx.h.b32, sizeof(sha1ctx.h.b32));
 		break;
 	case CRYPTO_SHA2_256_HMAC:
 		SHA256_Init(&sha256ctx);
-		SHA256_Update(&sha256ctx, ipad, SHA2_256_HMAC_BLOCK_LEN);
+		SHA256_Update(&sha256ctx, ipad, SHA2_256_BLOCK_LEN);
 		memcpy(hin, sha256ctx.state, sizeof(sha256ctx.state));
 		SHA256_Init(&sha256ctx);
-		SHA256_Update(&sha256ctx, opad, SHA2_256_HMAC_BLOCK_LEN);
+		SHA256_Update(&sha256ctx, opad, SHA2_256_BLOCK_LEN);
 		memcpy(hout, sha256ctx.state, sizeof(sha256ctx.state));
 		break;
 	default:
@@ -1684,7 +1684,7 @@ cesa_newsession(device_t dev, uint32_t *sidp, struct c
 			cs->cs_config |= CESA_CSHD_MD5;
 			break;
 		case CRYPTO_MD5_HMAC:
-			cs->cs_mblen = MD5_HMAC_BLOCK_LEN;
+			cs->cs_mblen = MD5_BLOCK_LEN;
 			cs->cs_hlen = (mac->cri_mlen == 0) ? MD5_HASH_LEN :
 			    mac->cri_mlen;
 			cs->cs_config |= CESA_CSHD_MD5_HMAC;
@@ -1698,7 +1698,7 @@ cesa_newsession(device_t dev, uint32_t *sidp, struct c
 			cs->cs_config |= CESA_CSHD_SHA1;
 			break;
 		case CRYPTO_SHA1_HMAC:
-			cs->cs_mblen = SHA1_HMAC_BLOCK_LEN;
+			cs->cs_mblen = SHA1_BLOCK_LEN;
 			cs->cs_hlen = (mac->cri_mlen == 0) ? SHA1_HASH_LEN :
 			    mac->cri_mlen;
 			cs->cs_config |= CESA_CSHD_SHA1_HMAC;
@@ -1706,7 +1706,7 @@ cesa_newsession(device_t dev, uint32_t *sidp, struct c
 				cs->cs_config |= CESA_CSHD_96_BIT_HMAC;
 			break;
 		case CRYPTO_SHA2_256_HMAC:
-			cs->cs_mblen = SHA2_256_HMAC_BLOCK_LEN;
+			cs->cs_mblen = SHA2_256_BLOCK_LEN;
 			cs->cs_hlen = (mac->cri_mlen == 0) ? SHA2_256_HASH_LEN :
 			    mac->cri_mlen;
 			cs->cs_config |= CESA_CSHD_SHA2_256_HMAC;

Modified: head/sys/dev/safe/safe.c
==============================================================================
--- head/sys/dev/safe/safe.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/dev/safe/safe.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -655,13 +655,13 @@ safe_setup_mackey(struct safe_session *ses, int algo, 
 	if (algo == CRYPTO_MD5_HMAC) {
 		MD5Init(&md5ctx);
 		MD5Update(&md5ctx, key, klen);
-		MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen);
+		MD5Update(&md5ctx, hmac_ipad_buffer, MD5_BLOCK_LEN - klen);
 		bcopy(md5ctx.state, ses->ses_hminner, sizeof(md5ctx.state));
 	} else {
 		SHA1Init(&sha1ctx);
 		SHA1Update(&sha1ctx, key, klen);
 		SHA1Update(&sha1ctx, hmac_ipad_buffer,
-		    SHA1_HMAC_BLOCK_LEN - klen);
+		    SHA1_BLOCK_LEN - klen);
 		bcopy(sha1ctx.h.b32, ses->ses_hminner, sizeof(sha1ctx.h.b32));
 	}
 
@@ -671,13 +671,13 @@ safe_setup_mackey(struct safe_session *ses, int algo, 
 	if (algo == CRYPTO_MD5_HMAC) {
 		MD5Init(&md5ctx);
 		MD5Update(&md5ctx, key, klen);
-		MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen);
+		MD5Update(&md5ctx, hmac_opad_buffer, MD5_BLOCK_LEN - klen);
 		bcopy(md5ctx.state, ses->ses_hmouter, sizeof(md5ctx.state));
 	} else {
 		SHA1Init(&sha1ctx);
 		SHA1Update(&sha1ctx, key, klen);
 		SHA1Update(&sha1ctx, hmac_opad_buffer,
-		    SHA1_HMAC_BLOCK_LEN - klen);
+		    SHA1_BLOCK_LEN - klen);
 		bcopy(sha1ctx.h.b32, ses->ses_hmouter, sizeof(sha1ctx.h.b32));
 	}
 

Modified: head/sys/dev/ubsec/ubsec.c
==============================================================================
--- head/sys/dev/ubsec/ubsec.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/dev/ubsec/ubsec.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -859,13 +859,13 @@ ubsec_setup_mackey(struct ubsec_session *ses, int algo
 	if (algo == CRYPTO_MD5_HMAC) {
 		MD5Init(&md5ctx);
 		MD5Update(&md5ctx, key, klen);
-		MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen);
+		MD5Update(&md5ctx, hmac_ipad_buffer, MD5_BLOCK_LEN - klen);
 		bcopy(md5ctx.state, ses->ses_hminner, sizeof(md5ctx.state));
 	} else {
 		SHA1Init(&sha1ctx);
 		SHA1Update(&sha1ctx, key, klen);
 		SHA1Update(&sha1ctx, hmac_ipad_buffer,
-		    SHA1_HMAC_BLOCK_LEN - klen);
+		    SHA1_BLOCK_LEN - klen);
 		bcopy(sha1ctx.h.b32, ses->ses_hminner, sizeof(sha1ctx.h.b32));
 	}
 
@@ -875,13 +875,13 @@ ubsec_setup_mackey(struct ubsec_session *ses, int algo
 	if (algo == CRYPTO_MD5_HMAC) {
 		MD5Init(&md5ctx);
 		MD5Update(&md5ctx, key, klen);
-		MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen);
+		MD5Update(&md5ctx, hmac_opad_buffer, MD5_BLOCK_LEN - klen);
 		bcopy(md5ctx.state, ses->ses_hmouter, sizeof(md5ctx.state));
 	} else {
 		SHA1Init(&sha1ctx);
 		SHA1Update(&sha1ctx, key, klen);
 		SHA1Update(&sha1ctx, hmac_opad_buffer,
-		    SHA1_HMAC_BLOCK_LEN - klen);
+		    SHA1_BLOCK_LEN - klen);
 		bcopy(sha1ctx.h.b32, ses->ses_hmouter, sizeof(sha1ctx.h.b32));
 	}
 

Modified: head/sys/opencrypto/cryptodev.h
==============================================================================
--- head/sys/opencrypto/cryptodev.h	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/opencrypto/cryptodev.h	Mon Jul  9 07:21:37 2018	(r336122)
@@ -83,16 +83,17 @@
 /* Maximum hash algorithm result length */
 #define	HASH_MAX_LEN		SHA2_512_HASH_LEN /* Keep this updated */
 
+#define	MD5_BLOCK_LEN		64
+#define	SHA1_BLOCK_LEN		64
+#define	RIPEMD160_BLOCK_LEN	64
+#define	SHA2_256_BLOCK_LEN	64
+#define	SHA2_384_BLOCK_LEN	128
+#define	SHA2_512_BLOCK_LEN	128
+
 /* HMAC values */
 #define	NULL_HMAC_BLOCK_LEN		64
-#define	MD5_HMAC_BLOCK_LEN		64
-#define	SHA1_HMAC_BLOCK_LEN		64
-#define	RIPEMD160_HMAC_BLOCK_LEN	64
-#define	SHA2_256_HMAC_BLOCK_LEN	64
-#define	SHA2_384_HMAC_BLOCK_LEN	128
-#define	SHA2_512_HMAC_BLOCK_LEN	128
 /* Maximum HMAC block length */
-#define	HMAC_MAX_BLOCK_LEN	SHA2_512_HMAC_BLOCK_LEN /* Keep this updated */
+#define	HMAC_MAX_BLOCK_LEN	SHA2_512_BLOCK_LEN /* Keep this updated */
 #define	HMAC_IPAD_VAL			0x36
 #define	HMAC_OPAD_VAL			0x5C
 /* HMAC Key Length */

Modified: head/sys/opencrypto/xform_md5.c
==============================================================================
--- head/sys/opencrypto/xform_md5.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/opencrypto/xform_md5.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -59,10 +59,10 @@ static	int MD5Update_int(void *, const u_int8_t *, u_i
 struct auth_hash auth_hash_hmac_md5 = {
 	.type = CRYPTO_MD5_HMAC,
 	.name = "HMAC-MD5",
-	.keysize = MD5_HMAC_BLOCK_LEN,
+	.keysize = MD5_BLOCK_LEN,
 	.hashsize = MD5_HASH_LEN,
 	.ctxsize = sizeof(MD5_CTX),
-	.blocksize = MD5_HMAC_BLOCK_LEN,
+	.blocksize = MD5_BLOCK_LEN,
 	.Init = (void (*) (void *)) MD5Init,
 	.Update = MD5Update_int,
 	.Final = (void (*) (u_int8_t *, void *)) MD5Final,

Modified: head/sys/opencrypto/xform_rmd160.c
==============================================================================
--- head/sys/opencrypto/xform_rmd160.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/opencrypto/xform_rmd160.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -59,10 +59,10 @@ static	int RMD160Update_int(void *, const u_int8_t *, 
 struct auth_hash auth_hash_hmac_ripemd_160 = {
 	.type = CRYPTO_RIPEMD160_HMAC,
 	.name = "HMAC-RIPEMD-160",
-	.keysize = RIPEMD160_HMAC_BLOCK_LEN,
+	.keysize = RIPEMD160_BLOCK_LEN,
 	.hashsize = RIPEMD160_HASH_LEN,
 	.ctxsize = sizeof(RMD160_CTX),
-	.blocksize = RIPEMD160_HMAC_BLOCK_LEN,
+	.blocksize = RIPEMD160_BLOCK_LEN,
 	.Init = (void (*)(void *)) RMD160Init,
 	.Update = RMD160Update_int,
 	.Final = (void (*)(u_int8_t *, void *)) RMD160Final,

Modified: head/sys/opencrypto/xform_sha1.c
==============================================================================
--- head/sys/opencrypto/xform_sha1.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/opencrypto/xform_sha1.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -61,10 +61,10 @@ static	void SHA1Final_int(u_int8_t *, void *);
 struct auth_hash auth_hash_hmac_sha1 = {
 	.type = CRYPTO_SHA1_HMAC,
 	.name = "HMAC-SHA1",
-	.keysize = SHA1_HMAC_BLOCK_LEN,
+	.keysize = SHA1_BLOCK_LEN,
 	.hashsize = SHA1_HASH_LEN,
 	.ctxsize = sizeof(SHA1_CTX),
-	.blocksize = SHA1_HMAC_BLOCK_LEN,
+	.blocksize = SHA1_BLOCK_LEN,
 	.Init = SHA1Init_int,
 	.Update = SHA1Update_int,
 	.Final = SHA1Final_int,

Modified: head/sys/opencrypto/xform_sha2.c
==============================================================================
--- head/sys/opencrypto/xform_sha2.c	Mon Jul  9 06:19:33 2018	(r336121)
+++ head/sys/opencrypto/xform_sha2.c	Mon Jul  9 07:21:37 2018	(r336122)
@@ -63,10 +63,10 @@ static	int SHA512Update_int(void *, const u_int8_t *, 
 struct auth_hash auth_hash_hmac_sha2_256 = {
 	.type = CRYPTO_SHA2_256_HMAC,
 	.name = "HMAC-SHA2-256",
-	.keysize = SHA2_256_HMAC_BLOCK_LEN,
+	.keysize = SHA2_256_BLOCK_LEN,
 	.hashsize = SHA2_256_HASH_LEN,
 	.ctxsize = sizeof(SHA256_CTX),
-	.blocksize = SHA2_256_HMAC_BLOCK_LEN,
+	.blocksize = SHA2_256_BLOCK_LEN,
 	.Init = (void (*)(void *)) SHA256_Init,
 	.Update = SHA256Update_int,
 	.Final = (void (*)(u_int8_t *, void *)) SHA256_Final,
@@ -75,10 +75,10 @@ struct auth_hash auth_hash_hmac_sha2_256 = {
 struct auth_hash auth_hash_hmac_sha2_384 = {
 	.type = CRYPTO_SHA2_384_HMAC,
 	.name = "HMAC-SHA2-384",
-	.keysize = SHA2_384_HMAC_BLOCK_LEN,
+	.keysize = SHA2_384_BLOCK_LEN,
 	.hashsize = SHA2_384_HASH_LEN,
 	.ctxsize = sizeof(SHA384_CTX),
-	.blocksize = SHA2_384_HMAC_BLOCK_LEN,
+	.blocksize = SHA2_384_BLOCK_LEN,
 	.Init = (void (*)(void *)) SHA384_Init,
 	.Update = SHA384Update_int,
 	.Final = (void (*)(u_int8_t *, void *)) SHA384_Final,
@@ -87,10 +87,10 @@ struct auth_hash auth_hash_hmac_sha2_384 = {
 struct auth_hash auth_hash_hmac_sha2_512 = {
 	.type = CRYPTO_SHA2_512_HMAC,
 	.name = "HMAC-SHA2-512",
-	.keysize = SHA2_512_HMAC_BLOCK_LEN,
+	.keysize = SHA2_512_BLOCK_LEN,
 	.hashsize = SHA2_512_HASH_LEN,
 	.ctxsize = sizeof(SHA512_CTX),
-	.blocksize = SHA2_512_HMAC_BLOCK_LEN,
+	.blocksize = SHA2_512_BLOCK_LEN,
 	.Init = (void (*)(void *)) SHA512_Init,
 	.Update = SHA512Update_int,
 	.Final = (void (*)(u_int8_t *, void *)) SHA512_Final,



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201807090721.w697Lctp022608>