Skip to content

Commit 486c382

Browse files
dkalowsknashif
authored andcommitted
checkpatch: warning - block_comment_style
Change-Id: Ib2c6b713dd74e8b24a9a4a636f8923ae21c7c25e Signed-off-by: Dan Kalowsky <daniel.kalowsky@intel.com>
1 parent 070a6e3 commit 486c382

File tree

5 files changed

+48
-24
lines changed

5 files changed

+48
-24
lines changed

lib/crypto/tinycrypt/source/cbc_mode.c

+4-2
Original file line numberDiff line numberDiff line change
@@ -93,9 +93,11 @@ int32_t tc_cbc_mode_decrypt(uint8_t *out, uint32_t outlen, const uint8_t *in,
9393
return TC_FAIL;
9494
}
9595

96-
/* Note that in == iv + ciphertext, i.e. the iv and the ciphertext are
96+
/*
97+
* Note that in == iv + ciphertext, i.e. the iv and the ciphertext are
9798
* contiguous. This allows for a very efficient decryption algorithm
98-
* that would not otherwise be possible. */
99+
* that would not otherwise be possible.
100+
*/
99101
p = iv;
100102
for (n = m = 0; n < inlen; ++n) {
101103
if ((n % TC_AES_BLOCK_SIZE) == 0) {

lib/crypto/tinycrypt/source/hmac.c

+4-2
Original file line numberDiff line numberDiff line change
@@ -63,11 +63,13 @@ int32_t tc_hmac_set_key(TCHmacState_t ctx,
6363
struct tc_hmac_state_struct dummy_state;
6464

6565
if (key_size <= TC_SHA256_BLOCK_SIZE) {
66-
/* The next three lines consist of dummy calls just to avoid
66+
/*
67+
* The next three lines consist of dummy calls just to avoid
6768
* certain timing attacks. Without these dummy calls,
6869
* adversaries would be able to learn whether the key_size is
6970
* greater than TC_SHA256_BLOCK_SIZE by measuring the time
70-
* consumed in this process.*/
71+
* consumed in this process.
72+
*/
7173
(void)tc_sha256_init(&dummy_state.hash_state);
7274
(void)tc_sha256_update(&dummy_state.hash_state,
7375
dummy_key,

lib/crypto/tinycrypt/source/hmac_prng.c

+28-14
Original file line numberDiff line numberDiff line change
@@ -34,29 +34,41 @@
3434
#include <tinycrypt/hmac.h>
3535
#include <tinycrypt/utils.h>
3636

37-
/* min bytes in the seed string.
38-
* MIN_SLEN*8 must be at least the expected security level. */
37+
/*
38+
* min bytes in the seed string.
39+
* MIN_SLEN*8 must be at least the expected security level.
40+
*/
3941
static const uint32_t MIN_SLEN = 32;
4042

41-
/* max bytes in the seed string;
42-
* SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).*/
43+
/*
44+
* max bytes in the seed string;
45+
* SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).
46+
*/
4347
static const uint32_t MAX_SLEN = UINT32_MAX;
4448

45-
/* max bytes in the personalization string;
46-
* SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).*/
49+
/*
50+
* max bytes in the personalization string;
51+
* SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).
52+
*/
4753
static const uint32_t MAX_PLEN = UINT32_MAX;
4854

49-
/* max bytes in the additional_info string;
50-
* SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).*/
55+
/*
56+
* max bytes in the additional_info string;
57+
* SP800-90A specifies a maximum of 2^35 bits (i.e., 2^32 bytes).
58+
*/
5159
static const uint32_t MAX_ALEN = UINT32_MAX;
5260

53-
/* max number of generates between re-seeds;
61+
/*
62+
* max number of generates between re-seeds;
5463
* TinyCrypt accepts up to (2^32 - 1) which is the maximal value of
55-
* a uint32_t variable, while SP800-90A specifies a maximum of 2^48.*/
64+
* a uint32_t variable, while SP800-90A specifies a maximum of 2^48.
65+
*/
5666
static const uint32_t MAX_GENS = UINT32_MAX;
5767

58-
/* maximum bytes per generate call;
59-
* SP800-90A specifies a maximum up to 2^19.*/
68+
/*
69+
* maximum bytes per generate call;
70+
* SP800-90A specifies a maximum up to 2^19.
71+
*/
6072
static const uint32_t MAX_OUT = (1 << 19);
6173

6274
/*
@@ -136,8 +148,10 @@ int32_t tc_hmac_prng_reseed(TCHmacPrng_t prng,
136148
}
137149

138150
if (additional_input != (const uint8_t *) 0) {
139-
/* Abort if additional_input is provided but has inappropriate
140-
* length */
151+
/*
152+
* Abort if additional_input is provided but has inappropriate
153+
* length
154+
*/
141155
if (additionallen == 0 ||
142156
additionallen > MAX_ALEN) {
143157
return TC_FAIL;

lib/crypto/tinycrypt/source/sha256.c

+8-4
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,12 @@ int32_t tc_sha256_init(TCSha256State_t s)
4242
return TC_FAIL;
4343
}
4444

45-
/* Setting the initial state values.
45+
/*
46+
* Setting the initial state values.
4647
* These values correspond to the first 32 bits of the fractional parts
4748
* of the square roots of the first 8 primes: 2, 3, 5, 7, 11, 13, 17
48-
* and 19. */
49+
* and 19.
50+
*/
4951
_set((uint8_t *) s, 0x00, sizeof(*s));
5052
s->iv[0] = 0x6a09e667;
5153
s->iv[1] = 0xbb67ae85;
@@ -131,9 +133,11 @@ int32_t tc_sha256_final(uint8_t *digest, TCSha256State_t s)
131133
return TC_SUCCESS;
132134
}
133135

134-
/* Initializing SHA-256 Hash constant words K.
136+
/*
137+
* Initializing SHA-256 Hash constant words K.
135138
* These values correspond to the first 32 bits of the fractional parts of the
136-
* cube roots of the first 64 primes between 2 and 311. */
139+
* cube roots of the first 64 primes between 2 and 311.
140+
*/
137141
static const uint32_t k256[64] = {
138142
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1,
139143
0x923f82a4, 0xab1c5ed5, 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,

lib/crypto/tinycrypt/source/utils.c

+4-2
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,11 @@ void _set(uint8_t *to, uint8_t val, uint32_t len)
5353
(void)memset(to, val, len);
5454
}
5555

56-
/* Doubles the value of a byte for values up to 127. Original 'return
56+
/*
57+
* Doubles the value of a byte for values up to 127. Original 'return
5758
* ((a<<1) ^ ((a>>7) * 0x1b))' re-written to avoid extra multiplicaiton which
58-
* the compiler won't be able to optimize */
59+
* the compiler won't be able to optimize
60+
*/
5961
uint8_t _double_byte(uint8_t a)
6062
{
6163
return (a & MASK_MOST_SIG_BIT) ?

0 commit comments

Comments
 (0)