On Wed, 06 Jul 2005 15:41:01 +0200 Micha__ Piotrowski wrote: | Hi, | | This patch is against 2.6.13-rc2. It cleans whitespaces in init/* and | crypto/*.
General comment: needs a Signed-off-by: line (see Documenation/SubmittingPatches ). Howver, I am having trouble seeing changes in lots of the -/+ lines. Did thunderbird perhaps mangle your patch? After that is fixed, we can see if it's worthwhile to do this kind of patch.... (some doubt here) | Regards, | Micha__ Piotrowski | | --- | | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/aes.c linux-2.6.13-rc2-ws/crypto/aes.c | --- linux-2.6.13-rc2/crypto/aes.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/aes.c 2005-07-06 15:14:45.000000000 +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API. | * | * AES Cipher Algorithm. | @@ -65,7 +65,7 @@ | #define AES_BLOCK_SIZE 16 | | /* | - * #define byte(x, nr) ((unsigned char)((x) >> (nr*8))) | + * #define byte(x, nr) ((unsigned char)((x) >> (nr*8))) | */ | inline static u8 | byte(const u32 x, const unsigned n) | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/api.c linux-2.6.13-rc2-ws/crypto/api.c | --- linux-2.6.13-rc2/crypto/api.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/api.c 2005-07-06 15:14:57.000000000 +0200 | @@ -9,7 +9,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/arc4.c linux-2.6.13-rc2-ws/crypto/arc4.c | --- linux-2.6.13-rc2/crypto/arc4.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/arc4.c 2005-07-06 15:15:09.000000000 +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API | * | * ARC4 Cipher Algorithm | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/blowfish.c linux-2.6.13-rc2-ws/crypto/blowfish.c | --- linux-2.6.13-rc2/crypto/blowfish.c 2005-06-17 21:48:29.000000000 | +0200 | +++ linux-2.6.13-rc2-ws/crypto/blowfish.c 2005-07-06 | 15:16:07.000000000 +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API. | * | * Blowfish Cipher Algorithm, by Bruce Schneier. | @@ -298,7 +298,7 @@ static const u32 bf_sbox[256 * 4] = { | 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6, | }; | | -/* | +/* | * Round loop unrolling macros, S is a pointer to a S-Box array | * organized in 4 unsigned longs at a row. | */ | @@ -314,7 +314,7 @@ static const u32 bf_sbox[256 * 4] = { | | /* | * The blowfish encipher, processes 64-bit blocks. | - * NOTE: This function MUSTN'T respect endianess | + * NOTE: This function MUSTN'T respect endianess | */ | static void encrypt_block(struct bf_ctx *bctx, u32 *dst, u32 *src) | { | @@ -393,7 +393,7 @@ static void bf_decrypt(void *ctx, u8 *ds | out_blk[1] = cpu_to_be32(yl); | } | | -/* | +/* | * Calculates the blowfish S and P boxes for encryption and decryption. | */ | static int bf_setkey(void *ctx, const u8 *key, unsigned int keylen, u32 | *flags) | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/cast6.c linux-2.6.13-rc2-ws/crypto/cast6.c | --- linux-2.6.13-rc2/crypto/cast6.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/cast6.c 2005-07-06 15:16:53.000000000 | +0200 | @@ -11,7 +11,7 @@ | * under the terms of GNU General Public License as published by the Free | * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | - * | + * | * You should have received a copy of the GNU General Public License | * along with this program; if not, write to the Free Software | * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA | 02111-1307, USA | @@ -310,7 +310,7 @@ static const u32 s4[256] = { | | static const u32 Tm[24][8] = { | { 0x5a827999, 0xc95c653a, 0x383650db, 0xa7103c7c, 0x15ea281d, | - 0x84c413be, 0xf39dff5f, 0x6277eb00 } , | + 0x84c413be, 0xf39dff5f, 0x6277eb00 } , | { 0xd151d6a1, 0x402bc242, 0xaf05ade3, 0x1ddf9984, 0x8cb98525, | 0xfb9370c6, 0x6a6d5c67, 0xd9474808 } , | { 0x482133a9, 0xb6fb1f4a, 0x25d50aeb, 0x94aef68c, 0x0388e22d, | @@ -445,7 +445,7 @@ static inline void QBAR (u32 * block, u8 | static void cast6_encrypt (void * ctx, u8 * outbuf, const u8 * inbuf) { | struct cast6_ctx * c = (struct cast6_ctx *)ctx; | u32 block[4]; | - u32 * Km; | + u32 * Km; | u8 * Kr; | | block[0] = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; | @@ -487,7 +487,7 @@ static void cast6_encrypt (void * ctx, u | static void cast6_decrypt (void * ctx, u8 * outbuf, const u8 * inbuf) { | struct cast6_ctx * c = (struct cast6_ctx *)ctx; | u32 block[4]; | - u32 * Km; | + u32 * Km; | u8 * Kr; | | block[0] = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3]; | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/cipher.c linux-2.6.13-rc2-ws/crypto/cipher.c | --- linux-2.6.13-rc2/crypto/cipher.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/cipher.c 2005-07-06 15:17:19.000000000 | +0200 | @@ -7,7 +7,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | @@ -39,7 +39,7 @@ static inline void xor_128(u8 *a, const | ((u32 *)a)[2] ^= ((u32 *)b)[2]; | ((u32 *)a)[3] ^= ((u32 *)b)[3]; | } | - | + | static inline void *prepare_src(struct scatter_walk *walk, int bsize, | void *tmp, int in_place) | { | @@ -81,7 +81,7 @@ static inline void complete_dst(struct s | scatterwalk_advance(walk, n); | } | | -/* | +/* | * Generic encrypt/decrypt wrapper for ciphers, handles operations across | * multiple page boundaries by using temporary blocks. In user context, | * the kernel is given a chance to schedule us once per block. | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/compress.c linux-2.6.13-rc2-ws/crypto/compress.c | --- linux-2.6.13-rc2/crypto/compress.c 2005-06-17 21:48:29.000000000 | +0200 | +++ linux-2.6.13-rc2-ws/crypto/compress.c 2005-07-06 | 15:17:29.000000000 +0200 | @@ -7,7 +7,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/crc32c.c linux-2.6.13-rc2-ws/crypto/crc32c.c | --- linux-2.6.13-rc2/crypto/crc32c.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/crc32c.c 2005-07-06 15:17:51.000000000 | +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API. | * | * CRC32C chksum | @@ -7,7 +7,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | @@ -26,7 +26,7 @@ struct chksum_ctx { | }; | | /* | - * Steps through buffer one byte at at time, calculates reflected | + * Steps through buffer one byte at at time, calculates reflected | * crc using table. | */ | | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/crypto_null.c | linux-2.6.13-rc2-ws/crypto/crypto_null.c | --- linux-2.6.13-rc2/crypto/crypto_null.c 2005-06-17 | 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/crypto_null.c 2005-07-06 | 15:18:03.000000000 +0200 | @@ -1,11 +1,11 @@ | -/* | +/* | * Cryptographic API. | * | * Null algorithms, aka Much Ado About Nothing. | * | * These are needed for IPsec, and may be useful in general for | * testing & debugging. | - * | + * | * The null cipher is compliant with RFC2410. | * | * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]> | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/deflate.c linux-2.6.13-rc2-ws/crypto/deflate.c | --- linux-2.6.13-rc2/crypto/deflate.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/deflate.c 2005-07-06 | 15:18:32.000000000 +0200 | @@ -1,14 +1,14 @@ | -/* | +/* | * Cryptographic API. | * | * Deflate algorithm (RFC 1951), implemented here primarily for use | * by IPCOMP (RFC 3173 & RFC 2394). | * | * Copyright (c) 2003 James Morris <[EMAIL PROTECTED]> | - * | + * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | * FIXME: deflate transforms will require up to a total of about 436k | of kernel | @@ -151,7 +151,7 @@ static int deflate_compress(void *ctx, c | out: | return ret; | } | - | + | static int deflate_decompress(void *ctx, const u8 *src, unsigned int slen, | u8 *dst, unsigned int *dlen) | { | @@ -180,7 +180,7 @@ static int deflate_decompress(void *ctx, | if (ret == Z_OK && !stream->avail_in && stream->avail_out) { | u8 zerostuff = 0; | stream->next_in = &zerostuff; | - stream->avail_in = 1; | + stream->avail_in = 1; | ret = zlib_inflate(stream, Z_FINISH); | } | if (ret != Z_STREAM_END) { | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/des.c linux-2.6.13-rc2-ws/crypto/des.c | --- linux-2.6.13-rc2/crypto/des.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/des.c 2005-07-06 15:19:18.000000000 +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API. | * | * DES & Triple DES EDE Cipher Algorithms. | @@ -9,7 +9,7 @@ | * scatterlist interface. Changed LGPL to GPL per section 3 of the LGPL. | * | * Copyright (c) 1992 Dana L. How. | - * Copyright (c) Raimar Falke <[EMAIL PROTECTED]> | + * Copyright (c) Raimar Falke <[EMAIL PROTECTED]> | * Copyright (c) Gisle S__lensminde <[EMAIL PROTECTED]> | * Copyright (C) 2001 Niels Möller. | * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]> | @@ -1185,7 +1185,7 @@ static void des_decrypt(void *ctx, u8 *d | des_small_fips_decrypt(((struct des_ctx *)ctx)->expkey, dst, src); | } | | -/* | +/* | * RFC2451: | * | * For DES-EDE3, there is no known need to reject weak or | @@ -1204,7 +1204,7 @@ static int des3_ede_setkey(void *ctx, co | unsigned int i, off; | struct des3_ede_ctx *dctx = ctx; | | - if (!(memcmp(key, &key[DES_KEY_SIZE], DES_KEY_SIZE) && | + if (!(memcmp(key, &key[DES_KEY_SIZE], DES_KEY_SIZE) && | memcmp(&key[DES_KEY_SIZE], &key[DES_KEY_SIZE * 2], | DES_KEY_SIZE))) { | | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/digest.c linux-2.6.13-rc2-ws/crypto/digest.c | --- linux-2.6.13-rc2/crypto/digest.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/digest.c 2005-07-06 15:19:51.000000000 | +0200 | @@ -7,7 +7,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | @@ -36,7 +36,7 @@ static void update(struct crypto_tfm *tf | | do { | unsigned int bytes_from_page = min(l, ((unsigned int) | - (PAGE_SIZE)) - | + (PAGE_SIZE)) - | offset); | char *p = crypto_kmap(pg, 0) + offset; | | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/hmac.c linux-2.6.13-rc2-ws/crypto/hmac.c | --- linux-2.6.13-rc2/crypto/hmac.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/hmac.c 2005-07-06 15:20:12.000000000 +0200 | @@ -10,7 +10,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/internal.h linux-2.6.13-rc2-ws/crypto/internal.h | --- linux-2.6.13-rc2/crypto/internal.h 2005-06-17 21:48:29.000000000 | +0200 | +++ linux-2.6.13-rc2-ws/crypto/internal.h 2005-07-06 | 15:20:24.000000000 +0200 | @@ -5,7 +5,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/khazad.c linux-2.6.13-rc2-ws/crypto/khazad.c | --- linux-2.6.13-rc2/crypto/khazad.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/khazad.c 2005-07-06 15:20:51.000000000 | +0200 | @@ -795,7 +795,7 @@ static int khazad_setkey(void *ctx_arg, | T6[(int)(K1 >> 8) & 0xff] ^ | T7[(int)(K1 ) & 0xff] ^ | c[r] ^ K2; | - K2 = K1; | + K2 = K1; | K1 = ctx->E[r]; | } | /* Setup the decrypt key */ | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/md4.c linux-2.6.13-rc2-ws/crypto/md4.c | --- linux-2.6.13-rc2/crypto/md4.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/md4.c 2005-07-06 15:21:05.000000000 +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API. | * | * MD4 Message Digest Algorithm (RFC1320). | @@ -57,7 +57,7 @@ static inline u32 H(u32 x, u32 y, u32 z) | { | return x ^ y ^ z; | } | - | + | #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) | #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + | (u32)0x5A827999,s)) | #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + | (u32)0x6ED9EBA1,s)) | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/md5.c linux-2.6.13-rc2-ws/crypto/md5.c | --- linux-2.6.13-rc2/crypto/md5.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/md5.c 2005-07-06 15:21:34.000000000 +0200 | @@ -1,4 +1,4 @@ | -/* | +/* | * Cryptographic API. | * | * MD5 Message Digest Algorithm (RFC1321). | @@ -8,10 +8,10 @@ | * | * Copyright (c) Cryptoapi developers. | * Copyright (c) 2002 James Morris <[EMAIL PROTECTED]> | - * | + * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/proc.c linux-2.6.13-rc2-ws/crypto/proc.c | --- linux-2.6.13-rc2/crypto/proc.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/proc.c 2005-07-06 15:22:04.000000000 +0200 | @@ -7,7 +7,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | @@ -94,7 +94,7 @@ static int crypto_info_open(struct inode | { | return seq_open(file, &crypto_seq_ops); | } | - | + | static struct file_operations proc_crypto_ops = { | .open = crypto_info_open, | .read = seq_read, | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/serpent.c linux-2.6.13-rc2-ws/crypto/serpent.c | --- linux-2.6.13-rc2/crypto/serpent.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/serpent.c 2005-07-06 | 15:22:39.000000000 +0200 | @@ -500,11 +500,11 @@ static int tnepres_setkey(void *ctx, con | || (keylen > SERPENT_MAX_KEY_SIZE)) { | *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN; | return -EINVAL; | - } | + } | | for (i = 0; i < keylen; ++i) | rev_key[keylen - i - 1] = key[i]; | - | + | return serpent_setkey(ctx, rev_key, keylen, flags); | } | | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/sha1.c linux-2.6.13-rc2-ws/crypto/sha1.c | --- linux-2.6.13-rc2/crypto/sha1.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/sha1.c 2005-07-06 15:22:55.000000000 +0200 | @@ -93,7 +93,7 @@ static void sha1_final(void* ctx, u8 *ou | sha1_update(sctx, padding, padlen); | | /* Append length */ | - sha1_update(sctx, bits, sizeof bits); | + sha1_update(sctx, bits, sizeof bits); | | /* Store state in digest */ | for (i = j = 0; i < 5; i++, j += 4) { | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/sha256.c linux-2.6.13-rc2-ws/crypto/sha256.c | --- linux-2.6.13-rc2/crypto/sha256.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/sha256.c 2005-07-06 15:23:11.000000000 | +0200 | @@ -12,7 +12,7 @@ | * | * This program is free software; you can redistribute it and/or modify it | * under the terms of the GNU General Public License as published by | the Free | - * Software Foundation; either version 2 of the License, or (at your | option) | + * Software Foundation; either version 2 of the License, or (at your | option) | * any later version. | * | */ | @@ -79,7 +79,7 @@ static void sha256_transform(u32 *state, | /* now blend */ | for (i = 16; i < 64; i++) | BLEND_OP(i, W); | - | + | /* load the state into our registers */ | a=state[0]; b=state[1]; c=state[2]; d=state[3]; | e=state[4]; f=state[5]; g=state[6]; h=state[7]; | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/sha512.c linux-2.6.13-rc2-ws/crypto/sha512.c | --- linux-2.6.13-rc2/crypto/sha512.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/sha512.c 2005-07-06 15:24:42.000000000 | +0200 | @@ -129,9 +129,9 @@ sha512_transform(u64 *state, u64 *W, con | } | | /* load the state into our registers */ | - a=state[0]; b=state[1]; c=state[2]; d=state[3]; | - e=state[4]; f=state[5]; g=state[6]; h=state[7]; | - | + a=state[0]; b=state[1]; c=state[2]; d=state[3]; | + e=state[4]; f=state[5]; g=state[6]; h=state[7]; | + | /* now iterate */ | for (i=0; i<80; i+=8) { | t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[i ]; | @@ -151,9 +151,9 @@ sha512_transform(u64 *state, u64 *W, con | t1 = a + e1(f) + Ch(f,g,h) + sha512_K[i+7] + W[i+7]; | t2 = e0(b) + Maj(b,c,d); e+=t1; a=t1+t2; | } | - | - state[0] += a; state[1] += b; state[2] += c; state[3] += d; | - state[4] += e; state[5] += f; state[6] += g; state[7] += h; | + | + state[0] += a; state[1] += b; state[2] += c; state[3] += d; | + state[4] += e; state[5] += f; state[6] += g; state[7] += h; | | /* erase our data */ | a = b = c = d = e = f = g = h = t1 = t2 = 0; | @@ -252,22 +252,22 @@ sha512_final(void *ctx, u8 *hash) | bits[15] = t; t>>=8; | bits[14] = t; t>>=8; | bits[13] = t; t>>=8; | - bits[12] = t; | + bits[12] = t; | t = sctx->count[1]; | bits[11] = t; t>>=8; | bits[10] = t; t>>=8; | bits[9 ] = t; t>>=8; | - bits[8 ] = t; | + bits[8 ] = t; | t = sctx->count[2]; | bits[7 ] = t; t>>=8; | bits[6 ] = t; t>>=8; | bits[5 ] = t; t>>=8; | - bits[4 ] = t; | + bits[4 ] = t; | t = sctx->count[3]; | bits[3 ] = t; t>>=8; | bits[2 ] = t; t>>=8; | bits[1 ] = t; t>>=8; | - bits[0 ] = t; | + bits[0 ] = t; | | /* Pad out to 112 mod 128. */ | index = (sctx->count[0] >> 3) & 0x7f; | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/tea.c linux-2.6.13-rc2-ws/crypto/tea.c | --- linux-2.6.13-rc2/crypto/tea.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/tea.c 2005-07-06 15:26:32.000000000 +0200 | @@ -1,9 +1,9 @@ | -/* | +/* | * Cryptographic API. | * | * TEA and Xtended TEA Algorithms | * | - * The TEA and Xtended TEA algorithms were developed by David Wheeler | + * The TEA and Xtended TEA algorithms were developed by David Wheeler | * and Roger Needham at the Computer Laboratory of Cambridge University. | * | * Copyright (c) 2004 Aaron Grothe [EMAIL PROTECTED] | @@ -44,7 +44,7 @@ struct xtea_ctx { | | static int tea_setkey(void *ctx_arg, const u8 *in_key, | unsigned int key_len, u32 *flags) | -{ | +{ | | struct tea_ctx *ctx = ctx_arg; | | @@ -59,12 +59,12 @@ static int tea_setkey(void *ctx_arg, con | ctx->KEY[2] = u32_in (in_key + 8); | ctx->KEY[3] = u32_in (in_key + 12); | | - return 0; | + return 0; | | } | | static void tea_encrypt(void *ctx_arg, u8 *dst, const u8 *src) | -{ | +{ | u32 y, z, n, sum = 0; | u32 k0, k1, k2, k3; | | @@ -91,7 +91,7 @@ static void tea_encrypt(void *ctx_arg, u | } | | static void tea_decrypt(void *ctx_arg, u8 *dst, const u8 *src) | -{ | +{ | u32 y, z, n, sum; | u32 k0, k1, k2, k3; | | @@ -122,7 +122,7 @@ static void tea_decrypt(void *ctx_arg, u | | static int xtea_setkey(void *ctx_arg, const u8 *in_key, | unsigned int key_len, u32 *flags) | -{ | +{ | | struct xtea_ctx *ctx = ctx_arg; | | @@ -137,12 +137,12 @@ static int xtea_setkey(void *ctx_arg, co | ctx->KEY[2] = u32_in (in_key + 8); | ctx->KEY[3] = u32_in (in_key + 12); | | - return 0; | + return 0; | | } | | static void xtea_encrypt(void *ctx_arg, u8 *dst, const u8 *src) | -{ | +{ | | u32 y, z, sum = 0; | u32 limit = XTEA_DELTA * XTEA_ROUNDS; | @@ -153,9 +153,9 @@ static void xtea_encrypt(void *ctx_arg, | z = u32_in (src + 4); | | while (sum != limit) { | - y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3]; | + y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3]; | sum += XTEA_DELTA; | - z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3]; | + z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3]; | } | | u32_out (dst, y); | @@ -164,7 +164,7 @@ static void xtea_encrypt(void *ctx_arg, | } | | static void xtea_decrypt(void *ctx_arg, u8 *dst, const u8 *src) | -{ | +{ | | u32 y, z, sum; | struct tea_ctx *ctx = ctx_arg; | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/tgr192.c linux-2.6.13-rc2-ws/crypto/tgr192.c | --- linux-2.6.13-rc2/crypto/tgr192.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/tgr192.c 2005-07-06 15:26:44.000000000 | +0200 | @@ -12,7 +12,7 @@ | * This version is derived from the GnuPG implementation and the | * Tiger-Perl interface written by Rafael Sevilla | * | - * Adapted for Linux Kernel Crypto by Aaron Grothe | + * Adapted for Linux Kernel Crypto by Aaron Grothe | * [EMAIL PROTECTED], February 22, 2005 | * | * This program is free software; you can redistribute it and/or modify | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/crypto/twofish.c linux-2.6.13-rc2-ws/crypto/twofish.c | --- linux-2.6.13-rc2/crypto/twofish.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/crypto/twofish.c 2005-07-06 | 15:27:14.000000000 +0200 | @@ -9,7 +9,7 @@ | * Ported to CryptoAPI by Colin Slater <[EMAIL PROTECTED]> | * | * The original author has disclaimed all copyright interest in this | - * code and thus put it in the public domain. The subsequent authors | + * code and thus put it in the public domain. The subsequent authors | * have put this under the GNU General Public License. | * | * This program is free software; you can redistribute it and/or modify | @@ -21,7 +21,7 @@ | * but WITHOUT ANY WARRANTY; without even the implied warranty of | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | * GNU General Public License for more details. | - * | + * | * You should have received a copy of the GNU General Public License | * along with this program; if not, write to the Free Software | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | @@ -839,7 +839,7 @@ static void twofish_encrypt(void *cx, u8 | static void twofish_decrypt(void *cx, u8 *out, const u8 *in) | { | struct twofish_ctx *ctx = cx; | - | + | /* The four 32-bit chunks of the text. */ | u32 a, b, c, d; | | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/init/do_mounts.c linux-2.6.13-rc2-ws/init/do_mounts.c | --- linux-2.6.13-rc2/init/do_mounts.c 2005-06-17 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/init/do_mounts.c 2005-07-06 | 15:06:36.000000000 +0200 | @@ -277,7 +277,7 @@ static int __init do_mount_root(char *na | ROOT_DEV = current->fs->pwdmnt->mnt_sb->s_dev; | printk("VFS: Mounted root (%s filesystem)%s.\n", | current->fs->pwdmnt->mnt_sb->s_type->name, | - current->fs->pwdmnt->mnt_sb->s_flags & MS_RDONLY ? | + current->fs->pwdmnt->mnt_sb->s_flags & MS_RDONLY ? | " readonly" : ""); | return 0; | } | @@ -316,7 +316,7 @@ retry: | out: | putname(fs_names); | } | - | + | #ifdef CONFIG_ROOT_NFS | static int __init mount_nfs_root(void) | { | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/init/do_mounts_rd.c linux-2.6.13-rc2-ws/init/do_mounts_rd.c | --- linux-2.6.13-rc2/init/do_mounts_rd.c 2005-06-17 | 21:48:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/init/do_mounts_rd.c 2005-07-06 | 15:07:19.000000000 +0200 | @@ -45,7 +45,7 @@ static int __init crd_load(int in_fd, in | * cramfs | * gzip | */ | -static int __init | +static int __init | identify_ramdisk_image(int fd, int start_block) | { | const int size = 512; | @@ -369,7 +369,7 @@ static void __init flush_window(void) | ulg c = crc; /* temporary variable */ | unsigned n, written; | uch *in, ch; | - | + | written = sys_write(crd_outfd, window, outcnt); | if (written != outcnt && unzip_error == 0) { | printk(KERN_ERR "RAMDISK: incomplete write (%d != %d) %ld\n", | diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff | linux-2.6.13-rc2/init/main.c linux-2.6.13-rc2-ws/init/main.c | --- linux-2.6.13-rc2/init/main.c 2005-07-06 15:11:29.000000000 +0200 | +++ linux-2.6.13-rc2-ws/init/main.c 2005-07-06 15:08:27.000000000 +0200 | @@ -6,7 +6,7 @@ | * GK 2/5/95 - Changed to support mounting root fs via NFS | * Added initrd & change_root: Werner Almesberger & Hans Lermen, Feb '96 | * Moan early if gcc is old, avoiding bogus kernels - Paul Gortmaker, | May '96 | - * Simplified starting of init: Michael A. Griffith <[EMAIL PROTECTED]> | + * Simplified starting of init: Michael A. Griffith <[EMAIL PROTECTED]> | */ | | #define __KERNEL_SYSCALLS__ | @@ -391,7 +391,7 @@ static void noinline rest_init(void) | schedule(); | | cpu_idle(); | -} | +} | | /* Check for early params. */ | static int __init do_early_param(char *param, char *val) | @@ -600,7 +600,7 @@ static void __init do_basic_setup(void) | sysctl_init(); | #endif | | - /* Networking initialization needs a process context */ | + /* Networking initialization needs a process context */ | sock_init(); | | do_initcalls(); | @@ -705,7 +705,7 @@ static int init(void * unused) | /* | * We try each of these until one succeeds. | * | - * The Bourne shell can be used instead of init if we are | + * The Bourne shell can be used instead of init if we are | * trying to recover a really broken machine. | */ | | | - --- ~Randy - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/