Module Name:    src
Committed By:   riastradh
Date:           Sat Jun 13 18:39:36 UTC 2020

Modified Files:
        src/sys/dev: cgd_crypto.c

Log Message:
Convert malloc -> kmem.


To generate a diff of this commit:
cvs rdiff -u -r1.20 -r1.21 src/sys/dev/cgd_crypto.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/dev/cgd_crypto.c
diff -u src/sys/dev/cgd_crypto.c:1.20 src/sys/dev/cgd_crypto.c:1.21
--- src/sys/dev/cgd_crypto.c:1.20	Sat Jun 13 18:39:06 2020
+++ src/sys/dev/cgd_crypto.c	Sat Jun 13 18:39:36 2020
@@ -1,4 +1,4 @@
-/* $NetBSD: cgd_crypto.c,v 1.20 2020/06/13 18:39:06 riastradh Exp $ */
+/* $NetBSD: cgd_crypto.c,v 1.21 2020/06/13 18:39:36 riastradh Exp $ */
 
 /*-
  * Copyright (c) 2002 The NetBSD Foundation, Inc.
@@ -37,10 +37,10 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: cgd_crypto.c,v 1.20 2020/06/13 18:39:06 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: cgd_crypto.c,v 1.21 2020/06/13 18:39:36 riastradh Exp $");
 
 #include <sys/param.h>
-#include <sys/malloc.h>
+#include <sys/kmem.h>
 #include <sys/systm.h>
 
 #include <dev/cgd_crypto.h>
@@ -196,9 +196,7 @@ cgd_cipher_aes_cbc_init(size_t keylen, c
 		*blocksize = 128;
 	if (*blocksize != 128)
 		return NULL;
-	ap = malloc(sizeof(*ap), M_DEVBUF, 0);
-	if (!ap)
-		return NULL;
+	ap = kmem_zalloc(sizeof(*ap), KM_SLEEP);
 	rijndael_makeKey(&ap->ap_enckey, DIR_ENCRYPT, keylen, key);
 	rijndael_makeKey(&ap->ap_deckey, DIR_DECRYPT, keylen, key);
 	return ap;
@@ -210,7 +208,7 @@ cgd_cipher_aes_cbc_destroy(void *data)
 	struct aes_privdata *apd = data;
 
 	explicit_memset(apd, 0, sizeof(*apd));
-	free(apd, M_DEVBUF);
+	kmem_free(apd, sizeof(*apd));
 }
 
 static void
@@ -286,10 +284,8 @@ cgd_cipher_aes_xts_init(size_t keylen, c
 		*blocksize = 128;
 	if (*blocksize != 128)
 		return NULL;
-	ap = malloc(2 * sizeof(*ap), M_DEVBUF, 0);
-	if (!ap)
-		return NULL;
 
+	ap = kmem_zalloc(2 * sizeof(*ap), KM_SLEEP);
 	keylen /= 2;
 	key = xtskey;
 	key2 = key + keylen / CHAR_BIT;
@@ -307,7 +303,7 @@ cgd_cipher_aes_xts_destroy(void *data)
 	struct aes_privdata *apd = data;
 
 	explicit_memset(apd, 0, 2 * sizeof(*apd));
-	free(apd, M_DEVBUF);
+	kmem_free(apd, 2 * sizeof(*apd));
 }
 
 static void
@@ -396,16 +392,14 @@ cgd_cipher_3des_init(size_t keylen, cons
 		*blocksize = 64;
 	if (keylen != (DES_KEY_SZ * 3 * 8) || *blocksize != 64)
 		return NULL;
-	cp = malloc(sizeof(*cp), M_DEVBUF, 0);
-	if (!cp)
-		return NULL;
+	cp = kmem_zalloc(sizeof(*cp), KM_SLEEP);
 	block = __UNCONST(key);
 	error  = des_key_sched(block, cp->cp_key1);
 	error |= des_key_sched(block + 1, cp->cp_key2);
 	error |= des_key_sched(block + 2, cp->cp_key3);
 	if (error) {
 		explicit_memset(cp, 0, sizeof(*cp));
-		free(cp, M_DEVBUF);
+		kmem_free(cp, sizeof(*cp));
 		return NULL;
 	}
 	return cp;
@@ -417,7 +411,7 @@ cgd_cipher_3des_destroy(void *data)
 	struct c3des_privdata *cp = data;
 
 	explicit_memset(cp, 0, sizeof(*cp));
-	free(cp, M_DEVBUF);
+	kmem_free(cp, sizeof(*cp));
 }
 
 static void
@@ -496,7 +490,7 @@ cgd_cipher_bf_init(size_t keylen, const 
 		*blocksize = 64;
 	if (*blocksize != 64)
 		return NULL;
-	bp = malloc(sizeof(*bp), M_DEVBUF, 0);
+	bp = kmem_zalloc(sizeof(*bp), KM_SLEEP);
 	if (!bp)
 		return NULL;
 	BF_set_key(&bp->bp_key, keylen / 8, key);
@@ -509,7 +503,7 @@ cgd_cipher_bf_destroy(void *data)
 	struct	bf_privdata *bp = data;
 
 	explicit_memset(bp, 0, sizeof(*bp));
-	free(bp, M_DEVBUF);
+	kmem_free(bp, sizeof(*bp));
 }
 
 static void

Reply via email to