Re: 2.6.13-rc2 white spaces patch

From: randy_dunlap
Date: Wed Jul 06 2005 - 16:59:17 EST


On Wed, 06 Jul 2005 15:41:01 +0200 Micha__ Piotrowski wrote:

| Hi,
|
| This patch is against 2.6.13-rc2. It cleans whitespaces in init/* and
| crypto/*.

General comment: needs a Signed-off-by: line (see
Documenation/SubmittingPatches ).

Howver, I am having trouble seeing changes in lots of the
-/+ lines. Did thunderbird perhaps mangle your patch?

After that is fixed, we can see if it's worthwhile to do this
kind of patch.... (some doubt here)


| Regards,
| Micha__ Piotrowski
|
| ---
|
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/aes.c linux-2.6.13-rc2-ws/crypto/aes.c
| --- linux-2.6.13-rc2/crypto/aes.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/aes.c 2005-07-06 15:14:45.000000000 +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * AES Cipher Algorithm.
| @@ -65,7 +65,7 @@
| #define AES_BLOCK_SIZE 16
|
| /*
| - * #define byte(x, nr) ((unsigned char)((x) >> (nr*8)))
| + * #define byte(x, nr) ((unsigned char)((x) >> (nr*8)))
| */
| inline static u8
| byte(const u32 x, const unsigned n)
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/api.c linux-2.6.13-rc2-ws/crypto/api.c
| --- linux-2.6.13-rc2/crypto/api.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/api.c 2005-07-06 15:14:57.000000000 +0200
| @@ -9,7 +9,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/arc4.c linux-2.6.13-rc2-ws/crypto/arc4.c
| --- linux-2.6.13-rc2/crypto/arc4.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/arc4.c 2005-07-06 15:15:09.000000000 +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API
| *
| * ARC4 Cipher Algorithm
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/blowfish.c linux-2.6.13-rc2-ws/crypto/blowfish.c
| --- linux-2.6.13-rc2/crypto/blowfish.c 2005-06-17 21:48:29.000000000
| +0200
| +++ linux-2.6.13-rc2-ws/crypto/blowfish.c 2005-07-06
| 15:16:07.000000000 +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * Blowfish Cipher Algorithm, by Bruce Schneier.
| @@ -298,7 +298,7 @@ static const u32 bf_sbox[256 * 4] = {
| 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6,
| };
|
| -/*
| +/*
| * Round loop unrolling macros, S is a pointer to a S-Box array
| * organized in 4 unsigned longs at a row.
| */
| @@ -314,7 +314,7 @@ static const u32 bf_sbox[256 * 4] = {
|
| /*
| * The blowfish encipher, processes 64-bit blocks.
| - * NOTE: This function MUSTN'T respect endianess
| + * NOTE: This function MUSTN'T respect endianess
| */
| static void encrypt_block(struct bf_ctx *bctx, u32 *dst, u32 *src)
| {
| @@ -393,7 +393,7 @@ static void bf_decrypt(void *ctx, u8 *ds
| out_blk[1] = cpu_to_be32(yl);
| }
|
| -/*
| +/*
| * Calculates the blowfish S and P boxes for encryption and decryption.
| */
| static int bf_setkey(void *ctx, const u8 *key, unsigned int keylen, u32
| *flags)
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/cast6.c linux-2.6.13-rc2-ws/crypto/cast6.c
| --- linux-2.6.13-rc2/crypto/cast6.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/cast6.c 2005-07-06 15:16:53.000000000
| +0200
| @@ -11,7 +11,7 @@
| * under the terms of GNU General Public License as published by the Free
| * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| - *
| + *
| * You should have received a copy of the GNU General Public License
| * along with this program; if not, write to the Free Software
| * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
| 02111-1307, USA
| @@ -310,7 +310,7 @@ static const u32 s4[256] = {
|
| static const u32 Tm[24][8] = {
| { 0x5a827999, 0xc95c653a, 0x383650db, 0xa7103c7c, 0x15ea281d,
| - 0x84c413be, 0xf39dff5f, 0x6277eb00 } ,
| + 0x84c413be, 0xf39dff5f, 0x6277eb00 } ,
| { 0xd151d6a1, 0x402bc242, 0xaf05ade3, 0x1ddf9984, 0x8cb98525,
| 0xfb9370c6, 0x6a6d5c67, 0xd9474808 } ,
| { 0x482133a9, 0xb6fb1f4a, 0x25d50aeb, 0x94aef68c, 0x0388e22d,
| @@ -445,7 +445,7 @@ static inline void QBAR (u32 * block, u8
| static void cast6_encrypt (void * ctx, u8 * outbuf, const u8 * inbuf) {
| struct cast6_ctx * c = (struct cast6_ctx *)ctx;
| u32 block[4];
| - u32 * Km;
| + u32 * Km;
| u8 * Kr;
|
| block[0] = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3];
| @@ -487,7 +487,7 @@ static void cast6_encrypt (void * ctx, u
| static void cast6_decrypt (void * ctx, u8 * outbuf, const u8 * inbuf) {
| struct cast6_ctx * c = (struct cast6_ctx *)ctx;
| u32 block[4];
| - u32 * Km;
| + u32 * Km;
| u8 * Kr;
|
| block[0] = inbuf[0] << 24 | inbuf[1] << 16 | inbuf[2] << 8 | inbuf[3];
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/cipher.c linux-2.6.13-rc2-ws/crypto/cipher.c
| --- linux-2.6.13-rc2/crypto/cipher.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/cipher.c 2005-07-06 15:17:19.000000000
| +0200
| @@ -7,7 +7,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| @@ -39,7 +39,7 @@ static inline void xor_128(u8 *a, const
| ((u32 *)a)[2] ^= ((u32 *)b)[2];
| ((u32 *)a)[3] ^= ((u32 *)b)[3];
| }
| -
| +
| static inline void *prepare_src(struct scatter_walk *walk, int bsize,
| void *tmp, int in_place)
| {
| @@ -81,7 +81,7 @@ static inline void complete_dst(struct s
| scatterwalk_advance(walk, n);
| }
|
| -/*
| +/*
| * Generic encrypt/decrypt wrapper for ciphers, handles operations across
| * multiple page boundaries by using temporary blocks. In user context,
| * the kernel is given a chance to schedule us once per block.
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/compress.c linux-2.6.13-rc2-ws/crypto/compress.c
| --- linux-2.6.13-rc2/crypto/compress.c 2005-06-17 21:48:29.000000000
| +0200
| +++ linux-2.6.13-rc2-ws/crypto/compress.c 2005-07-06
| 15:17:29.000000000 +0200
| @@ -7,7 +7,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/crc32c.c linux-2.6.13-rc2-ws/crypto/crc32c.c
| --- linux-2.6.13-rc2/crypto/crc32c.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/crc32c.c 2005-07-06 15:17:51.000000000
| +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * CRC32C chksum
| @@ -7,7 +7,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| @@ -26,7 +26,7 @@ struct chksum_ctx {
| };
|
| /*
| - * Steps through buffer one byte at at time, calculates reflected
| + * Steps through buffer one byte at at time, calculates reflected
| * crc using table.
| */
|
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/crypto_null.c
| linux-2.6.13-rc2-ws/crypto/crypto_null.c
| --- linux-2.6.13-rc2/crypto/crypto_null.c 2005-06-17
| 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/crypto_null.c 2005-07-06
| 15:18:03.000000000 +0200
| @@ -1,11 +1,11 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * Null algorithms, aka Much Ado About Nothing.
| *
| * These are needed for IPsec, and may be useful in general for
| * testing & debugging.
| - *
| + *
| * The null cipher is compliant with RFC2410.
| *
| * Copyright (c) 2002 James Morris <jmorris@xxxxxxxxxxxxxxxx>
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/deflate.c linux-2.6.13-rc2-ws/crypto/deflate.c
| --- linux-2.6.13-rc2/crypto/deflate.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/deflate.c 2005-07-06
| 15:18:32.000000000 +0200
| @@ -1,14 +1,14 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * Deflate algorithm (RFC 1951), implemented here primarily for use
| * by IPCOMP (RFC 3173 & RFC 2394).
| *
| * Copyright (c) 2003 James Morris <jmorris@xxxxxxxxxxxxxxxx>
| - *
| + *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| * FIXME: deflate transforms will require up to a total of about 436k
| of kernel
| @@ -151,7 +151,7 @@ static int deflate_compress(void *ctx, c
| out:
| return ret;
| }
| -
| +
| static int deflate_decompress(void *ctx, const u8 *src, unsigned int slen,
| u8 *dst, unsigned int *dlen)
| {
| @@ -180,7 +180,7 @@ static int deflate_decompress(void *ctx,
| if (ret == Z_OK && !stream->avail_in && stream->avail_out) {
| u8 zerostuff = 0;
| stream->next_in = &zerostuff;
| - stream->avail_in = 1;
| + stream->avail_in = 1;
| ret = zlib_inflate(stream, Z_FINISH);
| }
| if (ret != Z_STREAM_END) {
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/des.c linux-2.6.13-rc2-ws/crypto/des.c
| --- linux-2.6.13-rc2/crypto/des.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/des.c 2005-07-06 15:19:18.000000000 +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * DES & Triple DES EDE Cipher Algorithms.
| @@ -9,7 +9,7 @@
| * scatterlist interface. Changed LGPL to GPL per section 3 of the LGPL.
| *
| * Copyright (c) 1992 Dana L. How.
| - * Copyright (c) Raimar Falke <rf13@xxxxxxxxxxxxxxxxx>
| + * Copyright (c) Raimar Falke <rf13@xxxxxxxxxxxxxxxxx>
| * Copyright (c) Gisle S__lensminde <gisle@xxxxxxxxx>
| * Copyright (C) 2001 Niels Möller.
| * Copyright (c) 2002 James Morris <jmorris@xxxxxxxxxxxxxxxx>
| @@ -1185,7 +1185,7 @@ static void des_decrypt(void *ctx, u8 *d
| des_small_fips_decrypt(((struct des_ctx *)ctx)->expkey, dst, src);
| }
|
| -/*
| +/*
| * RFC2451:
| *
| * For DES-EDE3, there is no known need to reject weak or
| @@ -1204,7 +1204,7 @@ static int des3_ede_setkey(void *ctx, co
| unsigned int i, off;
| struct des3_ede_ctx *dctx = ctx;
|
| - if (!(memcmp(key, &key[DES_KEY_SIZE], DES_KEY_SIZE) &&
| + if (!(memcmp(key, &key[DES_KEY_SIZE], DES_KEY_SIZE) &&
| memcmp(&key[DES_KEY_SIZE], &key[DES_KEY_SIZE * 2],
| DES_KEY_SIZE))) {
|
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/digest.c linux-2.6.13-rc2-ws/crypto/digest.c
| --- linux-2.6.13-rc2/crypto/digest.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/digest.c 2005-07-06 15:19:51.000000000
| +0200
| @@ -7,7 +7,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| @@ -36,7 +36,7 @@ static void update(struct crypto_tfm *tf
|
| do {
| unsigned int bytes_from_page = min(l, ((unsigned int)
| - (PAGE_SIZE)) -
| + (PAGE_SIZE)) -
| offset);
| char *p = crypto_kmap(pg, 0) + offset;
|
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/hmac.c linux-2.6.13-rc2-ws/crypto/hmac.c
| --- linux-2.6.13-rc2/crypto/hmac.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/hmac.c 2005-07-06 15:20:12.000000000 +0200
| @@ -10,7 +10,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/internal.h linux-2.6.13-rc2-ws/crypto/internal.h
| --- linux-2.6.13-rc2/crypto/internal.h 2005-06-17 21:48:29.000000000
| +0200
| +++ linux-2.6.13-rc2-ws/crypto/internal.h 2005-07-06
| 15:20:24.000000000 +0200
| @@ -5,7 +5,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/khazad.c linux-2.6.13-rc2-ws/crypto/khazad.c
| --- linux-2.6.13-rc2/crypto/khazad.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/khazad.c 2005-07-06 15:20:51.000000000
| +0200
| @@ -795,7 +795,7 @@ static int khazad_setkey(void *ctx_arg,
| T6[(int)(K1 >> 8) & 0xff] ^
| T7[(int)(K1 ) & 0xff] ^
| c[r] ^ K2;
| - K2 = K1;
| + K2 = K1;
| K1 = ctx->E[r];
| }
| /* Setup the decrypt key */
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/md4.c linux-2.6.13-rc2-ws/crypto/md4.c
| --- linux-2.6.13-rc2/crypto/md4.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/md4.c 2005-07-06 15:21:05.000000000 +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * MD4 Message Digest Algorithm (RFC1320).
| @@ -57,7 +57,7 @@ static inline u32 H(u32 x, u32 y, u32 z)
| {
| return x ^ y ^ z;
| }
| -
| +
| #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s))
| #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k +
| (u32)0x5A827999,s))
| #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k +
| (u32)0x6ED9EBA1,s))
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/md5.c linux-2.6.13-rc2-ws/crypto/md5.c
| --- linux-2.6.13-rc2/crypto/md5.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/md5.c 2005-07-06 15:21:34.000000000 +0200
| @@ -1,4 +1,4 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * MD5 Message Digest Algorithm (RFC1321).
| @@ -8,10 +8,10 @@
| *
| * Copyright (c) Cryptoapi developers.
| * Copyright (c) 2002 James Morris <jmorris@xxxxxxxxxxxxxxxx>
| - *
| + *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/proc.c linux-2.6.13-rc2-ws/crypto/proc.c
| --- linux-2.6.13-rc2/crypto/proc.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/proc.c 2005-07-06 15:22:04.000000000 +0200
| @@ -7,7 +7,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| @@ -94,7 +94,7 @@ static int crypto_info_open(struct inode
| {
| return seq_open(file, &crypto_seq_ops);
| }
| -
| +
| static struct file_operations proc_crypto_ops = {
| .open = crypto_info_open,
| .read = seq_read,
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/serpent.c linux-2.6.13-rc2-ws/crypto/serpent.c
| --- linux-2.6.13-rc2/crypto/serpent.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/serpent.c 2005-07-06
| 15:22:39.000000000 +0200
| @@ -500,11 +500,11 @@ static int tnepres_setkey(void *ctx, con
| || (keylen > SERPENT_MAX_KEY_SIZE)) {
| *flags |= CRYPTO_TFM_RES_BAD_KEY_LEN;
| return -EINVAL;
| - }
| + }
|
| for (i = 0; i < keylen; ++i)
| rev_key[keylen - i - 1] = key[i];
| -
| +
| return serpent_setkey(ctx, rev_key, keylen, flags);
| }
|
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/sha1.c linux-2.6.13-rc2-ws/crypto/sha1.c
| --- linux-2.6.13-rc2/crypto/sha1.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/sha1.c 2005-07-06 15:22:55.000000000 +0200
| @@ -93,7 +93,7 @@ static void sha1_final(void* ctx, u8 *ou
| sha1_update(sctx, padding, padlen);
|
| /* Append length */
| - sha1_update(sctx, bits, sizeof bits);
| + sha1_update(sctx, bits, sizeof bits);
|
| /* Store state in digest */
| for (i = j = 0; i < 5; i++, j += 4) {
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/sha256.c linux-2.6.13-rc2-ws/crypto/sha256.c
| --- linux-2.6.13-rc2/crypto/sha256.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/sha256.c 2005-07-06 15:23:11.000000000
| +0200
| @@ -12,7 +12,7 @@
| *
| * This program is free software; you can redistribute it and/or modify it
| * under the terms of the GNU General Public License as published by
| the Free
| - * Software Foundation; either version 2 of the License, or (at your
| option)
| + * Software Foundation; either version 2 of the License, or (at your
| option)
| * any later version.
| *
| */
| @@ -79,7 +79,7 @@ static void sha256_transform(u32 *state,
| /* now blend */
| for (i = 16; i < 64; i++)
| BLEND_OP(i, W);
| -
| +
| /* load the state into our registers */
| a=state[0]; b=state[1]; c=state[2]; d=state[3];
| e=state[4]; f=state[5]; g=state[6]; h=state[7];
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/sha512.c linux-2.6.13-rc2-ws/crypto/sha512.c
| --- linux-2.6.13-rc2/crypto/sha512.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/sha512.c 2005-07-06 15:24:42.000000000
| +0200
| @@ -129,9 +129,9 @@ sha512_transform(u64 *state, u64 *W, con
| }
|
| /* load the state into our registers */
| - a=state[0]; b=state[1]; c=state[2]; d=state[3];
| - e=state[4]; f=state[5]; g=state[6]; h=state[7];
| -
| + a=state[0]; b=state[1]; c=state[2]; d=state[3];
| + e=state[4]; f=state[5]; g=state[6]; h=state[7];
| +
| /* now iterate */
| for (i=0; i<80; i+=8) {
| t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[i ];
| @@ -151,9 +151,9 @@ sha512_transform(u64 *state, u64 *W, con
| t1 = a + e1(f) + Ch(f,g,h) + sha512_K[i+7] + W[i+7];
| t2 = e0(b) + Maj(b,c,d); e+=t1; a=t1+t2;
| }
| -
| - state[0] += a; state[1] += b; state[2] += c; state[3] += d;
| - state[4] += e; state[5] += f; state[6] += g; state[7] += h;
| +
| + state[0] += a; state[1] += b; state[2] += c; state[3] += d;
| + state[4] += e; state[5] += f; state[6] += g; state[7] += h;
|
| /* erase our data */
| a = b = c = d = e = f = g = h = t1 = t2 = 0;
| @@ -252,22 +252,22 @@ sha512_final(void *ctx, u8 *hash)
| bits[15] = t; t>>=8;
| bits[14] = t; t>>=8;
| bits[13] = t; t>>=8;
| - bits[12] = t;
| + bits[12] = t;
| t = sctx->count[1];
| bits[11] = t; t>>=8;
| bits[10] = t; t>>=8;
| bits[9 ] = t; t>>=8;
| - bits[8 ] = t;
| + bits[8 ] = t;
| t = sctx->count[2];
| bits[7 ] = t; t>>=8;
| bits[6 ] = t; t>>=8;
| bits[5 ] = t; t>>=8;
| - bits[4 ] = t;
| + bits[4 ] = t;
| t = sctx->count[3];
| bits[3 ] = t; t>>=8;
| bits[2 ] = t; t>>=8;
| bits[1 ] = t; t>>=8;
| - bits[0 ] = t;
| + bits[0 ] = t;
|
| /* Pad out to 112 mod 128. */
| index = (sctx->count[0] >> 3) & 0x7f;
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/tea.c linux-2.6.13-rc2-ws/crypto/tea.c
| --- linux-2.6.13-rc2/crypto/tea.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/tea.c 2005-07-06 15:26:32.000000000 +0200
| @@ -1,9 +1,9 @@
| -/*
| +/*
| * Cryptographic API.
| *
| * TEA and Xtended TEA Algorithms
| *
| - * The TEA and Xtended TEA algorithms were developed by David Wheeler
| + * The TEA and Xtended TEA algorithms were developed by David Wheeler
| * and Roger Needham at the Computer Laboratory of Cambridge University.
| *
| * Copyright (c) 2004 Aaron Grothe ajgrothe@xxxxxxxxx
| @@ -44,7 +44,7 @@ struct xtea_ctx {
|
| static int tea_setkey(void *ctx_arg, const u8 *in_key,
| unsigned int key_len, u32 *flags)
| -{
| +{
|
| struct tea_ctx *ctx = ctx_arg;
|
| @@ -59,12 +59,12 @@ static int tea_setkey(void *ctx_arg, con
| ctx->KEY[2] = u32_in (in_key + 8);
| ctx->KEY[3] = u32_in (in_key + 12);
|
| - return 0;
| + return 0;
|
| }
|
| static void tea_encrypt(void *ctx_arg, u8 *dst, const u8 *src)
| -{
| +{
| u32 y, z, n, sum = 0;
| u32 k0, k1, k2, k3;
|
| @@ -91,7 +91,7 @@ static void tea_encrypt(void *ctx_arg, u
| }
|
| static void tea_decrypt(void *ctx_arg, u8 *dst, const u8 *src)
| -{
| +{
| u32 y, z, n, sum;
| u32 k0, k1, k2, k3;
|
| @@ -122,7 +122,7 @@ static void tea_decrypt(void *ctx_arg, u
|
| static int xtea_setkey(void *ctx_arg, const u8 *in_key,
| unsigned int key_len, u32 *flags)
| -{
| +{
|
| struct xtea_ctx *ctx = ctx_arg;
|
| @@ -137,12 +137,12 @@ static int xtea_setkey(void *ctx_arg, co
| ctx->KEY[2] = u32_in (in_key + 8);
| ctx->KEY[3] = u32_in (in_key + 12);
|
| - return 0;
| + return 0;
|
| }
|
| static void xtea_encrypt(void *ctx_arg, u8 *dst, const u8 *src)
| -{
| +{
|
| u32 y, z, sum = 0;
| u32 limit = XTEA_DELTA * XTEA_ROUNDS;
| @@ -153,9 +153,9 @@ static void xtea_encrypt(void *ctx_arg,
| z = u32_in (src + 4);
|
| while (sum != limit) {
| - y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3];
| + y += (z << 4 ^ z >> 5) + (z ^ sum) + ctx->KEY[sum&3];
| sum += XTEA_DELTA;
| - z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3];
| + z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3];
| }
|
| u32_out (dst, y);
| @@ -164,7 +164,7 @@ static void xtea_encrypt(void *ctx_arg,
| }
|
| static void xtea_decrypt(void *ctx_arg, u8 *dst, const u8 *src)
| -{
| +{
|
| u32 y, z, sum;
| struct tea_ctx *ctx = ctx_arg;
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/tgr192.c linux-2.6.13-rc2-ws/crypto/tgr192.c
| --- linux-2.6.13-rc2/crypto/tgr192.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/tgr192.c 2005-07-06 15:26:44.000000000
| +0200
| @@ -12,7 +12,7 @@
| * This version is derived from the GnuPG implementation and the
| * Tiger-Perl interface written by Rafael Sevilla
| *
| - * Adapted for Linux Kernel Crypto by Aaron Grothe
| + * Adapted for Linux Kernel Crypto by Aaron Grothe
| * ajgrothe@xxxxxxxxx, February 22, 2005
| *
| * This program is free software; you can redistribute it and/or modify
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/crypto/twofish.c linux-2.6.13-rc2-ws/crypto/twofish.c
| --- linux-2.6.13-rc2/crypto/twofish.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/crypto/twofish.c 2005-07-06
| 15:27:14.000000000 +0200
| @@ -9,7 +9,7 @@
| * Ported to CryptoAPI by Colin Slater <hoho@xxxxxxxxxxxx>
| *
| * The original author has disclaimed all copyright interest in this
| - * code and thus put it in the public domain. The subsequent authors
| + * code and thus put it in the public domain. The subsequent authors
| * have put this under the GNU General Public License.
| *
| * This program is free software; you can redistribute it and/or modify
| @@ -21,7 +21,7 @@
| * but WITHOUT ANY WARRANTY; without even the implied warranty of
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
| * GNU General Public License for more details.
| - *
| + *
| * You should have received a copy of the GNU General Public License
| * along with this program; if not, write to the Free Software
| * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
| @@ -839,7 +839,7 @@ static void twofish_encrypt(void *cx, u8
| static void twofish_decrypt(void *cx, u8 *out, const u8 *in)
| {
| struct twofish_ctx *ctx = cx;
| -
| +
| /* The four 32-bit chunks of the text. */
| u32 a, b, c, d;
|
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/init/do_mounts.c linux-2.6.13-rc2-ws/init/do_mounts.c
| --- linux-2.6.13-rc2/init/do_mounts.c 2005-06-17 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/init/do_mounts.c 2005-07-06
| 15:06:36.000000000 +0200
| @@ -277,7 +277,7 @@ static int __init do_mount_root(char *na
| ROOT_DEV = current->fs->pwdmnt->mnt_sb->s_dev;
| printk("VFS: Mounted root (%s filesystem)%s.\n",
| current->fs->pwdmnt->mnt_sb->s_type->name,
| - current->fs->pwdmnt->mnt_sb->s_flags & MS_RDONLY ?
| + current->fs->pwdmnt->mnt_sb->s_flags & MS_RDONLY ?
| " readonly" : "");
| return 0;
| }
| @@ -316,7 +316,7 @@ retry:
| out:
| putname(fs_names);
| }
| -
| +
| #ifdef CONFIG_ROOT_NFS
| static int __init mount_nfs_root(void)
| {
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/init/do_mounts_rd.c linux-2.6.13-rc2-ws/init/do_mounts_rd.c
| --- linux-2.6.13-rc2/init/do_mounts_rd.c 2005-06-17
| 21:48:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/init/do_mounts_rd.c 2005-07-06
| 15:07:19.000000000 +0200
| @@ -45,7 +45,7 @@ static int __init crd_load(int in_fd, in
| * cramfs
| * gzip
| */
| -static int __init
| +static int __init
| identify_ramdisk_image(int fd, int start_block)
| {
| const int size = 512;
| @@ -369,7 +369,7 @@ static void __init flush_window(void)
| ulg c = crc; /* temporary variable */
| unsigned n, written;
| uch *in, ch;
| -
| +
| written = sys_write(crd_outfd, window, outcnt);
| if (written != outcnt && unzip_error == 0) {
| printk(KERN_ERR "RAMDISK: incomplete write (%d != %d) %ld\n",
| diff -uprN -X linux-2.6.13-rc2/Documentation/dontdiff
| linux-2.6.13-rc2/init/main.c linux-2.6.13-rc2-ws/init/main.c
| --- linux-2.6.13-rc2/init/main.c 2005-07-06 15:11:29.000000000 +0200
| +++ linux-2.6.13-rc2-ws/init/main.c 2005-07-06 15:08:27.000000000 +0200
| @@ -6,7 +6,7 @@
| * GK 2/5/95 - Changed to support mounting root fs via NFS
| * Added initrd & change_root: Werner Almesberger & Hans Lermen, Feb '96
| * Moan early if gcc is old, avoiding bogus kernels - Paul Gortmaker,
| May '96
| - * Simplified starting of init: Michael A. Griffith <grif@xxxxxxx>
| + * Simplified starting of init: Michael A. Griffith <grif@xxxxxxx>
| */
|
| #define __KERNEL_SYSCALLS__
| @@ -391,7 +391,7 @@ static void noinline rest_init(void)
| schedule();
|
| cpu_idle();
| -}
| +}
|
| /* Check for early params. */
| static int __init do_early_param(char *param, char *val)
| @@ -600,7 +600,7 @@ static void __init do_basic_setup(void)
| sysctl_init();
| #endif
|
| - /* Networking initialization needs a process context */
| + /* Networking initialization needs a process context */
| sock_init();
|
| do_initcalls();
| @@ -705,7 +705,7 @@ static int init(void * unused)
| /*
| * We try each of these until one succeeds.
| *
| - * The Bourne shell can be used instead of init if we are
| + * The Bourne shell can be used instead of init if we are
| * trying to recover a really broken machine.
| */
|
|
| -

---
~Randy
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/