Index: crypto/kernel/key.c |
diff --git a/srtp/crypto/kernel/key.c b/crypto/kernel/key.c |
similarity index 50% |
rename from srtp/crypto/kernel/key.c |
rename to crypto/kernel/key.c |
index 3521e2f8805c824ae215c9ba04b48bcb66d24574..2895a6d862aacf8d29fd0dee765a14759a632ecf 100644 |
--- a/srtp/crypto/kernel/key.c |
+++ b/crypto/kernel/key.c |
@@ -2,31 +2,31 @@ |
* key.c |
* |
* key usage limits enforcement |
- * |
+ * |
* David A. Mcgrew |
* Cisco Systems, Inc. |
*/ |
/* |
- * |
+ * |
* Copyright (c) 2001-2006 Cisco Systems, Inc. |
* All rights reserved. |
- * |
+ * |
* Redistribution and use in source and binary forms, with or without |
* modification, are permitted provided that the following conditions |
* are met: |
- * |
+ * |
* Redistributions of source code must retain the above copyright |
* notice, this list of conditions and the following disclaimer. |
- * |
+ * |
* Redistributions in binary form must reproduce the above |
* copyright notice, this list of conditions and the following |
* disclaimer in the documentation and/or other materials provided |
* with the distribution. |
- * |
+ * |
* Neither the name of the Cisco Systems, Inc. nor the names of its |
* contributors may be used to endorse or promote products derived |
* from this software without specific prior written permission. |
- * |
+ * |
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
@@ -50,70 +50,71 @@ |
#define soft_limit 0x10000 |
-err_status_t |
-key_limit_set(key_limit_t key, const xtd_seq_num_t s) { |
+srtp_err_status_t srtp_key_limit_set (srtp_key_limit_t key, const srtp_xtd_seq_num_t s) |
+{ |
#ifdef NO_64BIT_MATH |
- if (high32(s) == 0 && low32(s) < soft_limit) |
- return err_status_bad_param; |
+ if (high32(s) == 0 && low32(s) < soft_limit) { |
+ return srtp_err_status_bad_param; |
+ } |
#else |
- if (s < soft_limit) |
- return err_status_bad_param; |
+ if (s < soft_limit) { |
+ return srtp_err_status_bad_param; |
+ } |
#endif |
- key->num_left = s; |
- key->state = key_state_normal; |
- return err_status_ok; |
+ key->num_left = s; |
+ key->state = srtp_key_state_normal; |
+ return srtp_err_status_ok; |
} |
-err_status_t |
-key_limit_clone(key_limit_t original, key_limit_t *new_key) { |
- if (original == NULL) |
- return err_status_bad_param; |
- *new_key = original; |
- return err_status_ok; |
+srtp_err_status_t srtp_key_limit_clone (srtp_key_limit_t original, srtp_key_limit_t *new_key) |
+{ |
+ if (original == NULL) { |
+ return srtp_err_status_bad_param; |
+ } |
+ *new_key = original; |
+ return srtp_err_status_ok; |
} |
-err_status_t |
-key_limit_check(const key_limit_t key) { |
- if (key->state == key_state_expired) |
- return err_status_key_expired; |
- return err_status_ok; |
+srtp_err_status_t srtp_key_limit_check (const srtp_key_limit_t key) |
+{ |
+ if (key->state == srtp_key_state_expired) { |
+ return srtp_err_status_key_expired; |
+ } |
+ return srtp_err_status_ok; |
} |
-key_event_t |
-key_limit_update(key_limit_t key) { |
+srtp_key_event_t srtp_key_limit_update (srtp_key_limit_t key) |
+{ |
#ifdef NO_64BIT_MATH |
- if (low32(key->num_left) == 0) |
- { |
- // carry |
- key->num_left = make64(high32(key->num_left)-1,low32(key->num_left) - 1); |
- } |
- else |
- { |
- // no carry |
- key->num_left = make64(high32(key->num_left),low32(key->num_left) - 1); |
- } |
- if (high32(key->num_left) != 0 || low32(key->num_left) >= soft_limit) { |
- return key_event_normal; /* we're above the soft limit */ |
- } |
+ if (low32(key->num_left) == 0) { |
+ // carry |
+ key->num_left = make64(high32(key->num_left) - 1, low32(key->num_left) - 1); |
+ }else { |
+ // no carry |
+ key->num_left = make64(high32(key->num_left), low32(key->num_left) - 1); |
+ } |
+ if (high32(key->num_left) != 0 || low32(key->num_left) >= soft_limit) { |
+ return srtp_key_event_normal; /* we're above the soft limit */ |
+ } |
#else |
- key->num_left--; |
- if (key->num_left >= soft_limit) { |
- return key_event_normal; /* we're above the soft limit */ |
- } |
+ key->num_left--; |
+ if (key->num_left >= soft_limit) { |
+ return srtp_key_event_normal; /* we're above the soft limit */ |
+ } |
#endif |
- if (key->state == key_state_normal) { |
- /* we just passed the soft limit, so change the state */ |
- key->state = key_state_past_soft_limit; |
- } |
+ if (key->state == srtp_key_state_normal) { |
+ /* we just passed the soft limit, so change the state */ |
+ key->state = srtp_key_state_past_soft_limit; |
+ } |
#ifdef NO_64BIT_MATH |
- if (low32(key->num_left) == 0 && high32(key->num_left == 0)) |
+ if (low32(key->num_left) == 0 && high32(key->num_left == 0)) |
#else |
- if (key->num_left < 1) |
+ if (key->num_left < 1) |
#endif |
- { /* we just hit the hard limit */ |
- key->state = key_state_expired; |
- return key_event_hard_limit; |
- } |
- return key_event_soft_limit; |
+ { /* we just hit the hard limit */ |
+ key->state = srtp_key_state_expired; |
+ return srtp_key_event_hard_limit; |
+ } |
+ return srtp_key_event_soft_limit; |
} |