aboutsummaryrefslogtreecommitdiff
path: root/sys/crypto/via
diff options
context:
space:
mode:
authorMark Johnston <markj@FreeBSD.org>2021-07-26 20:41:05 +0000
committerMark Johnston <markj@FreeBSD.org>2021-07-26 20:41:05 +0000
commitd8787d4f7848bad8bd69325969806e1a76d0c3df (patch)
treee4a527273715df2fa754b500a51a64f1457bd599 /sys/crypto/via
parent45cd18ec73dcd262612898bf1a263cacde17d348 (diff)
downloadsrc-d8787d4f7848bad8bd69325969806e1a76d0c3df.tar.gz
src-d8787d4f7848bad8bd69325969806e1a76d0c3df.zip
crypto: Constify all transform descriptors
No functional change intended. Reviewed by: ae, jhb MFC after: 1 week Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D31196
Diffstat (limited to 'sys/crypto/via')
-rw-r--r--sys/crypto/via/padlock.h2
-rw-r--r--sys/crypto/via/padlock_hash.c16
2 files changed, 9 insertions, 9 deletions
diff --git a/sys/crypto/via/padlock.h b/sys/crypto/via/padlock.h
index a22e88ba6ee9..da85771f3663 100644
--- a/sys/crypto/via/padlock.h
+++ b/sys/crypto/via/padlock.h
@@ -64,7 +64,7 @@ struct padlock_session {
union padlock_cw ses_cw __aligned(16);
uint32_t ses_ekey[4 * (RIJNDAEL_MAXNR + 1) + 4] __aligned(16); /* 128 bit aligned */
uint32_t ses_dkey[4 * (RIJNDAEL_MAXNR + 1) + 4] __aligned(16); /* 128 bit aligned */
- struct auth_hash *ses_axf;
+ const struct auth_hash *ses_axf;
uint8_t *ses_ictx;
uint8_t *ses_octx;
int ses_mlen;
diff --git a/sys/crypto/via/padlock_hash.c b/sys/crypto/via/padlock_hash.c
index 1640bad4ea74..f09024af4ed5 100644
--- a/sys/crypto/via/padlock_hash.c
+++ b/sys/crypto/via/padlock_hash.c
@@ -78,7 +78,7 @@ static int padlock_sha_update(void *vctx, const void *buf, u_int bufsize);
static void padlock_sha1_final(uint8_t *hash, void *vctx);
static void padlock_sha256_final(uint8_t *hash, void *vctx);
-static struct auth_hash padlock_hmac_sha1 = {
+static const struct auth_hash padlock_hmac_sha1 = {
.type = CRYPTO_SHA1_HMAC,
.name = "HMAC-SHA1",
.keysize = SHA1_BLOCK_LEN,
@@ -90,7 +90,7 @@ static struct auth_hash padlock_hmac_sha1 = {
.Final = padlock_sha1_final,
};
-static struct auth_hash padlock_hmac_sha256 = {
+static const struct auth_hash padlock_hmac_sha256 = {
.type = CRYPTO_SHA2_256_HMAC,
.name = "HMAC-SHA2-256",
.keysize = SHA2_256_BLOCK_LEN,
@@ -227,7 +227,7 @@ padlock_sha256_final(uint8_t *hash, void *vctx)
}
static void
-padlock_copy_ctx(struct auth_hash *axf, void *sctx, void *dctx)
+padlock_copy_ctx(const struct auth_hash *axf, void *sctx, void *dctx)
{
if ((via_feature_xcrypt & VIA_HAS_SHA) != 0 &&
@@ -245,7 +245,7 @@ padlock_copy_ctx(struct auth_hash *axf, void *sctx, void *dctx)
}
static void
-padlock_free_ctx(struct auth_hash *axf, void *ctx)
+padlock_free_ctx(const struct auth_hash *axf, void *ctx)
{
if ((via_feature_xcrypt & VIA_HAS_SHA) != 0 &&
@@ -259,7 +259,7 @@ static void
padlock_hash_key_setup(struct padlock_session *ses, const uint8_t *key,
int klen)
{
- struct auth_hash *axf;
+ const struct auth_hash *axf;
axf = ses->ses_axf;
@@ -282,7 +282,7 @@ static int
padlock_authcompute(struct padlock_session *ses, struct cryptop *crp)
{
u_char hash[HASH_MAX_LEN], hash2[HASH_MAX_LEN];
- struct auth_hash *axf;
+ const struct auth_hash *axf;
union authctx ctx;
int error;
@@ -319,10 +319,10 @@ padlock_authcompute(struct padlock_session *ses, struct cryptop *crp)
}
/* Find software structure which describes HMAC algorithm. */
-static struct auth_hash *
+static const struct auth_hash *
padlock_hash_lookup(int alg)
{
- struct auth_hash *axf;
+ const struct auth_hash *axf;
switch (alg) {
case CRYPTO_NULL_HMAC: