diff options
author | Luiz Otavio O Souza <luiz@netgate.com> | 2015-09-16 08:10:04 -0500 |
---|---|---|
committer | Luiz Otavio O Souza <luiz@netgate.com> | 2015-10-20 12:09:29 -0500 |
commit | 3ea55b2f2e728e5b8ffd683de15aaae03c7ed71a (patch) | |
tree | bd1a8d9bb059bac6740599d0c2c1f128cd5f076d /sys/crypto | |
parent | f777614c20ed6cd6ad10bfce3191ac8b1431bd5f (diff) | |
download | FreeBSD-src-3ea55b2f2e728e5b8ffd683de15aaae03c7ed71a.zip FreeBSD-src-3ea55b2f2e728e5b8ffd683de15aaae03c7ed71a.tar.gz |
MFC r286049:
const'ify an arg that we don't update...
TAG: IPSEC-HEAD
Issue: #4841
Diffstat (limited to 'sys/crypto')
-rw-r--r-- | sys/crypto/aesni/aesni.h | 2 | ||||
-rw-r--r-- | sys/crypto/aesni/aesni_ghash.c | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/sys/crypto/aesni/aesni.h b/sys/crypto/aesni/aesni.h index 0594176..3d5adec 100644 --- a/sys/crypto/aesni/aesni.h +++ b/sys/crypto/aesni/aesni.h @@ -104,7 +104,7 @@ void AES_GCM_encrypt(const unsigned char *in, unsigned char *out, const unsigned char *key, int nr); int AES_GCM_decrypt(const unsigned char *in, unsigned char *out, const unsigned char *addt, const unsigned char *ivec, - unsigned char *tag, uint32_t nbytes, uint32_t abytes, int ibytes, + const unsigned char *tag, uint32_t nbytes, uint32_t abytes, int ibytes, const unsigned char *key, int nr); int aesni_cipher_setup_common(struct aesni_session *ses, const uint8_t *key, diff --git a/sys/crypto/aesni/aesni_ghash.c b/sys/crypto/aesni/aesni_ghash.c index f7be6c0..54c8815 100644 --- a/sys/crypto/aesni/aesni_ghash.c +++ b/sys/crypto/aesni/aesni_ghash.c @@ -528,7 +528,7 @@ AES_GCM_encrypt(const unsigned char *in, unsigned char *out, int AES_GCM_decrypt(const unsigned char *in, unsigned char *out, const unsigned char *addt, const unsigned char *ivec, - unsigned char *tag, uint32_t nbytes, uint32_t abytes, int ibytes, + const unsigned char *tag, uint32_t nbytes, uint32_t abytes, int ibytes, const unsigned char *key, int nr) { int i, j ,k; @@ -677,7 +677,7 @@ AES_GCM_decrypt(const unsigned char *in, unsigned char *out, X = _mm_shuffle_epi8(X, BSWAP_MASK); T = _mm_xor_si128(X, T); - if (!m128icmp(T, _mm_loadu_si128((__m128i*)tag))) + if (!m128icmp(T, _mm_loadu_si128((const __m128i*)tag))) return 0; //in case the authentication failed ctr1 = _mm_shuffle_epi8(Y, BSWAP_EPI64); |