Author: jhb Date: Tue Nov 3 22:27:54 2020 New Revision: 367309 URL: https://svnweb.freebsd.org/changeset/base/367309
Log: Consistently use C99 fixed-width types in the in-kernel crypto code. Reviewed by: markj Sponsored by: Chelsio Communications Differential Revision: https://reviews.freebsd.org/D27061 Modified: head/sys/crypto/chacha20/chacha-sw.c head/sys/crypto/des/des.h head/sys/crypto/rijndael/rijndael-api-fst.c head/sys/crypto/rijndael/rijndael.h head/sys/crypto/rijndael/rijndael_local.h head/sys/crypto/sha1.c head/sys/crypto/sha1.h head/sys/crypto/skein/skein_port.h head/sys/opencrypto/crypto.c head/sys/opencrypto/cryptodeflate.c head/sys/opencrypto/cryptodev.c head/sys/opencrypto/cryptodev.h head/sys/opencrypto/cryptosoft.c head/sys/opencrypto/deflate.h head/sys/opencrypto/rmd160.c head/sys/opencrypto/rmd160.h head/sys/opencrypto/xform_auth.h head/sys/opencrypto/xform_comp.h head/sys/opencrypto/xform_deflate.c head/sys/opencrypto/xform_enc.h head/sys/opencrypto/xform_null.c head/sys/opencrypto/xform_rijndael.c head/sys/opencrypto/xform_sha1.c head/sys/opencrypto/xform_sha2.c Modified: head/sys/crypto/chacha20/chacha-sw.c ============================================================================== --- head/sys/crypto/chacha20/chacha-sw.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/chacha20/chacha-sw.c Tue Nov 3 22:27:54 2020 (r367309) @@ -18,7 +18,7 @@ chacha20_xform_setkey(void *ctx, const uint8_t *key, i } static void -chacha20_xform_reinit(void *ctx, const u_int8_t *iv) +chacha20_xform_reinit(void *ctx, const uint8_t *iv) { chacha_ivsetup(ctx, iv + 8, iv); Modified: head/sys/crypto/des/des.h ============================================================================== --- head/sys/crypto/des/des.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/des/des.h Tue Nov 3 22:27:54 2020 (r367309) @@ -56,7 +56,7 @@ extern "C" { #endif /* must be 32bit quantity */ -#define DES_LONG u_int32_t +#define DES_LONG uint32_t typedef unsigned char des_cblock[8]; typedef struct des_ks_struct Modified: head/sys/crypto/rijndael/rijndael-api-fst.c ============================================================================== --- head/sys/crypto/rijndael/rijndael-api-fst.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/rijndael/rijndael-api-fst.c Tue Nov 3 22:27:54 2020 (r367309) @@ -32,7 +32,7 @@ __FBSDID("$FreeBSD$"); #define TRUE 1 #endif -typedef u_int8_t BYTE; +typedef uint8_t BYTE; int rijndael_makeKey(keyInstance *key, BYTE direction, int keyLen, const char *keyMaterial) { @@ -84,7 +84,7 @@ int rijndael_cipherInit(cipherInstance *cipher, BYTE m int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputLen, BYTE *outBuffer) { int i, k, numBlocks; - u_int8_t block[16], iv[4][4]; + uint8_t block[16], iv[4][4]; if (cipher == NULL || key == NULL || @@ -110,15 +110,15 @@ int rijndael_blockEncrypt(cipherInstance *cipher, keyI #if 1 /*STRICT_ALIGN*/ memcpy(block, cipher->IV, 16); memcpy(iv, input, 16); - ((u_int32_t*)block)[0] ^= ((u_int32_t*)iv)[0]; - ((u_int32_t*)block)[1] ^= ((u_int32_t*)iv)[1]; - ((u_int32_t*)block)[2] ^= ((u_int32_t*)iv)[2]; - ((u_int32_t*)block)[3] ^= ((u_int32_t*)iv)[3]; + ((uint32_t*)block)[0] ^= ((uint32_t*)iv)[0]; + ((uint32_t*)block)[1] ^= ((uint32_t*)iv)[1]; + ((uint32_t*)block)[2] ^= ((uint32_t*)iv)[2]; + ((uint32_t*)block)[3] ^= ((uint32_t*)iv)[3]; #else - ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0]; - ((u_int32_t*)block)[1] = ((u_int32_t*)cipher->IV)[1] ^ ((u_int32_t*)input)[1]; - ((u_int32_t*)block)[2] = ((u_int32_t*)cipher->IV)[2] ^ ((u_int32_t*)input)[2]; - ((u_int32_t*)block)[3] = ((u_int32_t*)cipher->IV)[3] ^ ((u_int32_t*)input)[3]; + ((uint32_t*)block)[0] = ((uint32_t*)cipher->IV)[0] ^ ((uint32_t*)input)[0]; + ((uint32_t*)block)[1] = ((uint32_t*)cipher->IV)[1] ^ ((uint32_t*)input)[1]; + ((uint32_t*)block)[2] = ((uint32_t*)cipher->IV)[2] ^ ((uint32_t*)input)[2]; + ((uint32_t*)block)[3] = ((uint32_t*)cipher->IV)[3] ^ ((uint32_t*)input)[3]; #endif rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); input += 16; @@ -126,15 +126,15 @@ int rijndael_blockEncrypt(cipherInstance *cipher, keyI #if 1 /*STRICT_ALIGN*/ memcpy(block, outBuffer, 16); memcpy(iv, input, 16); - ((u_int32_t*)block)[0] ^= ((u_int32_t*)iv)[0]; - ((u_int32_t*)block)[1] ^= ((u_int32_t*)iv)[1]; - ((u_int32_t*)block)[2] ^= ((u_int32_t*)iv)[2]; - ((u_int32_t*)block)[3] ^= ((u_int32_t*)iv)[3]; + ((uint32_t*)block)[0] ^= ((uint32_t*)iv)[0]; + ((uint32_t*)block)[1] ^= ((uint32_t*)iv)[1]; + ((uint32_t*)block)[2] ^= ((uint32_t*)iv)[2]; + ((uint32_t*)block)[3] ^= ((uint32_t*)iv)[3]; #else - ((u_int32_t*)block)[0] = ((u_int32_t*)outBuffer)[0] ^ ((u_int32_t*)input)[0]; - ((u_int32_t*)block)[1] = ((u_int32_t*)outBuffer)[1] ^ ((u_int32_t*)input)[1]; - ((u_int32_t*)block)[2] = ((u_int32_t*)outBuffer)[2] ^ ((u_int32_t*)input)[2]; - ((u_int32_t*)block)[3] = ((u_int32_t*)outBuffer)[3] ^ ((u_int32_t*)input)[3]; + ((uint32_t*)block)[0] = ((uint32_t*)outBuffer)[0] ^ ((uint32_t*)input)[0]; + ((uint32_t*)block)[1] = ((uint32_t*)outBuffer)[1] ^ ((uint32_t*)input)[1]; + ((uint32_t*)block)[2] = ((uint32_t*)outBuffer)[2] ^ ((uint32_t*)input)[2]; + ((uint32_t*)block)[3] = ((uint32_t*)outBuffer)[3] ^ ((uint32_t*)input)[3]; #endif outBuffer += 16; rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); @@ -146,17 +146,17 @@ int rijndael_blockEncrypt(cipherInstance *cipher, keyI #if 1 /*STRICT_ALIGN*/ memcpy(iv, cipher->IV, 16); #else /* !STRICT_ALIGN */ - *((u_int32_t*)iv[0]) = *((u_int32_t*)(cipher->IV )); - *((u_int32_t*)iv[1]) = *((u_int32_t*)(cipher->IV+ 4)); - *((u_int32_t*)iv[2]) = *((u_int32_t*)(cipher->IV+ 8)); - *((u_int32_t*)iv[3]) = *((u_int32_t*)(cipher->IV+12)); + *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV )); + *((uint32_t*)iv[1]) = *((uint32_t*)(cipher->IV+ 4)); + *((uint32_t*)iv[2]) = *((uint32_t*)(cipher->IV+ 8)); + *((uint32_t*)iv[3]) = *((uint32_t*)(cipher->IV+12)); #endif /* ?STRICT_ALIGN */ for (i = numBlocks; i > 0; i--) { for (k = 0; k < 128; k++) { - *((u_int32_t*) block ) = *((u_int32_t*)iv[0]); - *((u_int32_t*)(block+ 4)) = *((u_int32_t*)iv[1]); - *((u_int32_t*)(block+ 8)) = *((u_int32_t*)iv[2]); - *((u_int32_t*)(block+12)) = *((u_int32_t*)iv[3]); + *((uint32_t*) block ) = *((uint32_t*)iv[0]); + *((uint32_t*)(block+ 4)) = *((uint32_t*)iv[1]); + *((uint32_t*)(block+ 8)) = *((uint32_t*)iv[2]); + *((uint32_t*)(block+12)) = *((uint32_t*)iv[3]); rijndaelEncrypt(key->ek, key->Nr, block, block); outBuffer[k/8] ^= (block[0] & 0x80) >> (k & 7); @@ -200,7 +200,7 @@ int rijndael_blockEncrypt(cipherInstance *cipher, keyI int rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputOctets, BYTE *outBuffer) { int i, numBlocks, padLen; - u_int8_t block[16], *iv, *cp; + uint8_t block[16], *iv, *cp; if (cipher == NULL || key == NULL || @@ -232,10 +232,10 @@ int rijndael_padEncrypt(cipherInstance *cipher, keyIns case MODE_CBC: iv = cipher->IV; for (i = numBlocks; i > 0; i--) { - ((u_int32_t*)block)[0] = ((const u_int32_t*)input)[0] ^ ((u_int32_t*)iv)[0]; - ((u_int32_t*)block)[1] = ((const u_int32_t*)input)[1] ^ ((u_int32_t*)iv)[1]; - ((u_int32_t*)block)[2] = ((const u_int32_t*)input)[2] ^ ((u_int32_t*)iv)[2]; - ((u_int32_t*)block)[3] = ((const u_int32_t*)input)[3] ^ ((u_int32_t*)iv)[3]; + ((uint32_t*)block)[0] = ((const uint32_t*)input)[0] ^ ((uint32_t*)iv)[0]; + ((uint32_t*)block)[1] = ((const uint32_t*)input)[1] ^ ((uint32_t*)iv)[1]; + ((uint32_t*)block)[2] = ((const uint32_t*)input)[2] ^ ((uint32_t*)iv)[2]; + ((uint32_t*)block)[3] = ((const uint32_t*)input)[3] ^ ((uint32_t*)iv)[3]; rijndaelEncrypt(key->rk, key->Nr, block, outBuffer); iv = outBuffer; input += 16; @@ -264,7 +264,7 @@ int rijndael_padEncrypt(cipherInstance *cipher, keyIns int rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputLen, BYTE *outBuffer) { int i, k, numBlocks; - u_int8_t block[16], iv[4][4]; + uint8_t block[16], iv[4][4]; if (cipher == NULL || key == NULL || @@ -290,25 +290,25 @@ int rijndael_blockDecrypt(cipherInstance *cipher, keyI #if 1 /*STRICT_ALIGN */ memcpy(iv, cipher->IV, 16); #else - *((u_int32_t*)iv[0]) = *((u_int32_t*)(cipher->IV )); - *((u_int32_t*)iv[1]) = *((u_int32_t*)(cipher->IV+ 4)); - *((u_int32_t*)iv[2]) = *((u_int32_t*)(cipher->IV+ 8)); - *((u_int32_t*)iv[3]) = *((u_int32_t*)(cipher->IV+12)); + *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV )); + *((uint32_t*)iv[1]) = *((uint32_t*)(cipher->IV+ 4)); + *((uint32_t*)iv[2]) = *((uint32_t*)(cipher->IV+ 8)); + *((uint32_t*)iv[3]) = *((uint32_t*)(cipher->IV+12)); #endif for (i = numBlocks; i > 0; i--) { rijndaelDecrypt(key->rk, key->Nr, input, block); - ((u_int32_t*)block)[0] ^= *((u_int32_t*)iv[0]); - ((u_int32_t*)block)[1] ^= *((u_int32_t*)iv[1]); - ((u_int32_t*)block)[2] ^= *((u_int32_t*)iv[2]); - ((u_int32_t*)block)[3] ^= *((u_int32_t*)iv[3]); + ((uint32_t*)block)[0] ^= *((uint32_t*)iv[0]); + ((uint32_t*)block)[1] ^= *((uint32_t*)iv[1]); + ((uint32_t*)block)[2] ^= *((uint32_t*)iv[2]); + ((uint32_t*)block)[3] ^= *((uint32_t*)iv[3]); #if 1 /*STRICT_ALIGN*/ memcpy(iv, input, 16); memcpy(outBuffer, block, 16); #else - *((u_int32_t*)iv[0]) = ((u_int32_t*)input)[0]; ((u_int32_t*)outBuffer)[0] = ((u_int32_t*)block)[0]; - *((u_int32_t*)iv[1]) = ((u_int32_t*)input)[1]; ((u_int32_t*)outBuffer)[1] = ((u_int32_t*)block)[1]; - *((u_int32_t*)iv[2]) = ((u_int32_t*)input)[2]; ((u_int32_t*)outBuffer)[2] = ((u_int32_t*)block)[2]; - *((u_int32_t*)iv[3]) = ((u_int32_t*)input)[3]; ((u_int32_t*)outBuffer)[3] = ((u_int32_t*)block)[3]; + *((uint32_t*)iv[0]) = ((uint32_t*)input)[0]; ((uint32_t*)outBuffer)[0] = ((uint32_t*)block)[0]; + *((uint32_t*)iv[1]) = ((uint32_t*)input)[1]; ((uint32_t*)outBuffer)[1] = ((uint32_t*)block)[1]; + *((uint32_t*)iv[2]) = ((uint32_t*)input)[2]; ((uint32_t*)outBuffer)[2] = ((uint32_t*)block)[2]; + *((uint32_t*)iv[3]) = ((uint32_t*)input)[3]; ((uint32_t*)outBuffer)[3] = ((uint32_t*)block)[3]; #endif input += 16; outBuffer += 16; @@ -319,17 +319,17 @@ int rijndael_blockDecrypt(cipherInstance *cipher, keyI #if 1 /*STRICT_ALIGN */ memcpy(iv, cipher->IV, 16); #else - *((u_int32_t*)iv[0]) = *((u_int32_t*)(cipher->IV)); - *((u_int32_t*)iv[1]) = *((u_int32_t*)(cipher->IV+ 4)); - *((u_int32_t*)iv[2]) = *((u_int32_t*)(cipher->IV+ 8)); - *((u_int32_t*)iv[3]) = *((u_int32_t*)(cipher->IV+12)); + *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV)); + *((uint32_t*)iv[1]) = *((uint32_t*)(cipher->IV+ 4)); + *((uint32_t*)iv[2]) = *((uint32_t*)(cipher->IV+ 8)); + *((uint32_t*)iv[3]) = *((uint32_t*)(cipher->IV+12)); #endif for (i = numBlocks; i > 0; i--) { for (k = 0; k < 128; k++) { - *((u_int32_t*) block ) = *((u_int32_t*)iv[0]); - *((u_int32_t*)(block+ 4)) = *((u_int32_t*)iv[1]); - *((u_int32_t*)(block+ 8)) = *((u_int32_t*)iv[2]); - *((u_int32_t*)(block+12)) = *((u_int32_t*)iv[3]); + *((uint32_t*) block ) = *((uint32_t*)iv[0]); + *((uint32_t*)(block+ 4)) = *((uint32_t*)iv[1]); + *((uint32_t*)(block+ 8)) = *((uint32_t*)iv[2]); + *((uint32_t*)(block+12)) = *((uint32_t*)iv[3]); rijndaelEncrypt(key->ek, key->Nr, block, block); iv[0][0] = (iv[0][0] << 1) | (iv[0][1] >> 7); @@ -364,8 +364,8 @@ int rijndael_blockDecrypt(cipherInstance *cipher, keyI int rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputOctets, BYTE *outBuffer) { int i, numBlocks, padLen, rval; - u_int8_t block[16]; - u_int32_t iv[4]; + uint8_t block[16]; + uint32_t iv[4]; if (cipher == NULL || key == NULL || @@ -410,10 +410,10 @@ int rijndael_padDecrypt(cipherInstance *cipher, keyIns /* all blocks but last */ for (i = numBlocks - 1; i > 0; i--) { rijndaelDecrypt(key->rk, key->Nr, input, block); - ((u_int32_t*)block)[0] ^= iv[0]; - ((u_int32_t*)block)[1] ^= iv[1]; - ((u_int32_t*)block)[2] ^= iv[2]; - ((u_int32_t*)block)[3] ^= iv[3]; + ((uint32_t*)block)[0] ^= iv[0]; + ((uint32_t*)block)[1] ^= iv[1]; + ((uint32_t*)block)[2] ^= iv[2]; + ((uint32_t*)block)[3] ^= iv[3]; memcpy(iv, input, 16); memcpy(outBuffer, block, 16); input += 16; @@ -421,10 +421,10 @@ int rijndael_padDecrypt(cipherInstance *cipher, keyIns } /* last block */ rijndaelDecrypt(key->rk, key->Nr, input, block); - ((u_int32_t*)block)[0] ^= iv[0]; - ((u_int32_t*)block)[1] ^= iv[1]; - ((u_int32_t*)block)[2] ^= iv[2]; - ((u_int32_t*)block)[3] ^= iv[3]; + ((uint32_t*)block)[0] ^= iv[0]; + ((uint32_t*)block)[1] ^= iv[1]; + ((uint32_t*)block)[2] ^= iv[2]; + ((uint32_t*)block)[3] ^= iv[3]; padLen = block[15]; if (padLen <= 0 || padLen > 16) { rval = BAD_DATA; Modified: head/sys/crypto/rijndael/rijndael.h ============================================================================== --- head/sys/crypto/rijndael/rijndael.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/rijndael/rijndael.h Tue Nov 3 22:27:54 2020 (r367309) @@ -45,11 +45,11 @@ void rijndael_set_key(rijndael_ctx *, const u_char *, void rijndael_decrypt(const rijndael_ctx *, const u_char *, u_char *); void rijndael_encrypt(const rijndael_ctx *, const u_char *, u_char *); -int rijndaelKeySetupEnc(u_int32_t [/*4*(Nr+1)*/], const u_int8_t [], int); -int rijndaelKeySetupDec(u_int32_t [/*4*(Nr+1)*/], const u_int8_t [], int); -void rijndaelEncrypt(const u_int32_t [/*4*(Nr+1)*/], int, - const u_int8_t[16], u_int8_t [16]); -void rijndaelDecrypt(const u_int32_t [/*4*(Nr+1)*/], int, - const u_int8_t [16], u_int8_t [16]); +int rijndaelKeySetupEnc(uint32_t [/*4*(Nr+1)*/], const uint8_t [], int); +int rijndaelKeySetupDec(uint32_t [/*4*(Nr+1)*/], const uint8_t [], int); +void rijndaelEncrypt(const uint32_t [/*4*(Nr+1)*/], int, + const uint8_t[16], uint8_t [16]); +void rijndaelDecrypt(const uint32_t [/*4*(Nr+1)*/], int, + const uint8_t [16], uint8_t [16]); #endif /* __RIJNDAEL_H */ Modified: head/sys/crypto/rijndael/rijndael_local.h ============================================================================== --- head/sys/crypto/rijndael/rijndael_local.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/rijndael/rijndael_local.h Tue Nov 3 22:27:54 2020 (r367309) @@ -2,6 +2,6 @@ /* $FreeBSD$ */ /* the file should not be used from outside */ -typedef u_int8_t u8; -typedef u_int16_t u16; -typedef u_int32_t u32; +typedef uint8_t u8; +typedef uint16_t u16; +typedef uint32_t u32; Modified: head/sys/crypto/sha1.c ============================================================================== --- head/sys/crypto/sha1.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/sha1.c Tue Nov 3 22:27:54 2020 (r367309) @@ -56,7 +56,7 @@ __FBSDID("$FreeBSD$"); #ifndef unsupported /* constant table */ -static u_int32_t _K[] = { 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6 }; +static uint32_t _K[] = { 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6 }; #define K(t) _K[(t) / 20] #define F0(b, c, d) (((b) & (c)) | ((~(b)) & (d))) @@ -94,9 +94,9 @@ static void sha1_step(ctxt) struct sha1_ctxt *ctxt; { - u_int32_t a, b, c, d, e; + uint32_t a, b, c, d, e; size_t t, s; - u_int32_t tmp; + uint32_t tmp; #if BYTE_ORDER == LITTLE_ENDIAN struct sha1_ctxt tctxt; @@ -225,7 +225,7 @@ sha1_pad(ctxt) void sha1_loop(ctxt, input, len) struct sha1_ctxt *ctxt; - const u_int8_t *input; + const uint8_t *input; size_t len; { size_t gaplen; @@ -253,9 +253,9 @@ sha1_loop(ctxt, input, len) void sha1_result(struct sha1_ctxt *ctxt, char digest0[static SHA1_RESULTLEN]) { - u_int8_t *digest; + uint8_t *digest; - digest = (u_int8_t *)digest0; + digest = (uint8_t *)digest0; sha1_pad(ctxt); #if BYTE_ORDER == BIG_ENDIAN bcopy(&ctxt->h.b8[0], digest, SHA1_RESULTLEN); Modified: head/sys/crypto/sha1.h ============================================================================== --- head/sys/crypto/sha1.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/sha1.h Tue Nov 3 22:27:54 2020 (r367309) @@ -42,18 +42,18 @@ struct sha1_ctxt { union { - u_int8_t b8[20]; - u_int32_t b32[5]; + uint8_t b8[20]; + uint32_t b32[5]; } h; union { - u_int8_t b8[8]; - u_int64_t b64[1]; + uint8_t b8[8]; + uint64_t b64[1]; } c; union { - u_int8_t b8[64]; - u_int32_t b32[16]; + uint8_t b8[64]; + uint32_t b32[16]; } m; - u_int8_t count; + uint8_t count; }; typedef struct sha1_ctxt SHA1_CTX; @@ -62,7 +62,7 @@ typedef struct sha1_ctxt SHA1_CTX; #ifdef _KERNEL extern void sha1_init(struct sha1_ctxt *); extern void sha1_pad(struct sha1_ctxt *); -extern void sha1_loop(struct sha1_ctxt *, const u_int8_t *, size_t); +extern void sha1_loop(struct sha1_ctxt *, const uint8_t *, size_t); extern void sha1_result(struct sha1_ctxt *, char[__min_size(SHA1_RESULTLEN)]); /* compatibilty with other SHA1 source codes */ Modified: head/sys/crypto/skein/skein_port.h ============================================================================== --- head/sys/crypto/skein/skein_port.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/crypto/skein/skein_port.h Tue Nov 3 22:27:54 2020 (r367309) @@ -22,9 +22,9 @@ #ifndef _OPENSOLARIS_SYS_TYPES_H_ /* Avoid redefining this typedef */ typedef unsigned int uint_t; /* native unsigned integer */ #endif -typedef u_int8_t u08b_t; /* 8-bit unsigned integer */ -typedef u_int32_t uint_32t; /* 32-bit unsigned integer */ -typedef u_int64_t u64b_t; /* 64-bit unsigned integer */ +typedef uint8_t u08b_t; /* 8-bit unsigned integer */ +typedef uint32_t uint_32t; /* 32-bit unsigned integer */ +typedef uint64_t u64b_t; /* 64-bit unsigned integer */ #ifndef RotL_64 #define RotL_64(x,N) (((x) << (N)) | ((x) >> (64-(N)))) Modified: head/sys/opencrypto/crypto.c ============================================================================== --- head/sys/opencrypto/crypto.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/crypto.c Tue Nov 3 22:27:54 2020 (r367309) @@ -117,9 +117,9 @@ static struct mtx crypto_drivers_mtx; /* lock on driv struct cryptocap { device_t cc_dev; uint32_t cc_hid; - u_int32_t cc_sessions; /* (d) # of sessions */ - u_int32_t cc_koperations; /* (d) # os asym operations */ - u_int8_t cc_kalg[CRK_ALGORITHM_MAX + 1]; + uint32_t cc_sessions; /* (d) # of sessions */ + uint32_t cc_koperations; /* (d) # os asym operations */ + uint8_t cc_kalg[CRK_ALGORITHM_MAX + 1]; int cc_flags; /* (d) flags */ #define CRYPTOCAP_F_CLEANUP 0x80000000 /* needs resource cleanup */ @@ -173,8 +173,8 @@ struct crypto_ret_worker { TAILQ_HEAD(,cryptop) crp_ret_q; /* callback queue for symetric jobs */ TAILQ_HEAD(,cryptkop) crp_ret_kq; /* callback queue for asym jobs */ - u_int32_t reorder_ops; /* total ordered sym jobs received */ - u_int32_t reorder_cur_seq; /* current sym job dispatched */ + uint32_t reorder_ops; /* total ordered sym jobs received */ + uint32_t reorder_cur_seq; /* current sym job dispatched */ struct proc *cryptoretproc; }; @@ -611,7 +611,7 @@ crypto_cipher(const struct crypto_session_params *csp) } static struct cryptocap * -crypto_checkdriver(u_int32_t hid) +crypto_checkdriver(uint32_t hid) { return (hid >= crypto_drivers_size ? NULL : crypto_drivers[hid]); @@ -1119,7 +1119,7 @@ crypto_getcaps(int hid) * is called once for each algorithm supported a driver. */ int -crypto_kregister(u_int32_t driverid, int kalg, u_int32_t flags) +crypto_kregister(uint32_t driverid, int kalg, uint32_t flags) { struct cryptocap *cap; int err; @@ -1159,7 +1159,7 @@ crypto_kregister(u_int32_t driverid, int kalg, u_int32 * requests. */ int -crypto_unregister_all(u_int32_t driverid) +crypto_unregister_all(uint32_t driverid) { struct cryptocap *cap; @@ -1190,7 +1190,7 @@ crypto_unregister_all(u_int32_t driverid) * the driver is now ready for cryptop's and/or cryptokop's. */ int -crypto_unblock(u_int32_t driverid, int what) +crypto_unblock(uint32_t driverid, int what) { struct cryptocap *cap; int err; Modified: head/sys/opencrypto/cryptodeflate.c ============================================================================== --- head/sys/opencrypto/cryptodeflate.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/cryptodeflate.c Tue Nov 3 22:27:54 2020 (r367309) @@ -49,13 +49,13 @@ __FBSDID("$FreeBSD$"); SDT_PROVIDER_DECLARE(opencrypto); SDT_PROBE_DEFINE2(opencrypto, deflate, deflate_global, entry, - "int", "u_int32_t"); + "int", "uint32_t"); SDT_PROBE_DEFINE6(opencrypto, deflate, deflate_global, bad, "int", "int", "int", "int", "int", "int"); SDT_PROBE_DEFINE6(opencrypto, deflate, deflate_global, iter, "int", "int", "int", "int", "int", "int"); SDT_PROBE_DEFINE2(opencrypto, deflate, deflate_global, return, - "int", "u_int32_t"); + "int", "uint32_t"); int window_inflate = -1 * MAX_WBITS; int window_deflate = -12; @@ -81,18 +81,18 @@ crypto_zfree(void *nil, void *ptr) * algorithm */ -u_int32_t +uint32_t deflate_global(data, size, decomp, out) - u_int8_t *data; - u_int32_t size; + uint8_t *data; + uint32_t size; int decomp; - u_int8_t **out; + uint8_t **out; { /* decomp indicates whether we compress (0) or decompress (1) */ z_stream zbuf; - u_int8_t *output; - u_int32_t count, result; + uint8_t *output; + uint32_t count, result; int error, i; struct deflate_buf *bufh, *bufp; Modified: head/sys/opencrypto/cryptodev.c ============================================================================== --- head/sys/opencrypto/cryptodev.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/cryptodev.c Tue Nov 3 22:27:54 2020 (r367309) @@ -72,53 +72,53 @@ SDT_PROBE_DEFINE1(opencrypto, dev, ioctl, error, "int" #include <compat/freebsd32/freebsd32.h> struct session_op32 { - u_int32_t cipher; - u_int32_t mac; - u_int32_t keylen; - u_int32_t key; + uint32_t cipher; + uint32_t mac; + uint32_t keylen; + uint32_t key; int mackeylen; - u_int32_t mackey; - u_int32_t ses; + uint32_t mackey; + uint32_t ses; }; struct session2_op32 { - u_int32_t cipher; - u_int32_t mac; - u_int32_t keylen; - u_int32_t key; + uint32_t cipher; + uint32_t mac; + uint32_t keylen; + uint32_t key; int mackeylen; - u_int32_t mackey; - u_int32_t ses; + uint32_t mackey; + uint32_t ses; int crid; int pad[4]; }; struct crypt_op32 { - u_int32_t ses; - u_int16_t op; - u_int16_t flags; + uint32_t ses; + uint16_t op; + uint16_t flags; u_int len; - u_int32_t src, dst; - u_int32_t mac; - u_int32_t iv; + uint32_t src, dst; + uint32_t mac; + uint32_t iv; }; struct crypt_aead32 { - u_int32_t ses; - u_int16_t op; - u_int16_t flags; + uint32_t ses; + uint16_t op; + uint16_t flags; u_int len; u_int aadlen; u_int ivlen; - u_int32_t src; - u_int32_t dst; - u_int32_t aad; - u_int32_t tag; - u_int32_t iv; + uint32_t src; + uint32_t dst; + uint32_t aad; + uint32_t tag; + uint32_t iv; }; struct crparam32 { - u_int32_t crp_p; + uint32_t crp_p; u_int crp_nbits; }; @@ -309,7 +309,7 @@ struct csession { TAILQ_ENTRY(csession) next; crypto_session_t cses; volatile u_int refs; - u_int32_t ses; + uint32_t ses; struct mtx lock; /* for op submission */ struct enc_xform *txform; @@ -437,7 +437,7 @@ cryptof_ioctl( void *mackey = NULL; struct crypt_kop *kop; crypto_session_t cses; - u_int32_t ses; + uint32_t ses; int error = 0, crid; union { struct session2_op sopc; @@ -806,7 +806,7 @@ bail: session2_op_to_op(sop, data); break; case CIOCFSESSION: - ses = *(u_int32_t *)data; + ses = *(uint32_t *)data; if (!csedelete(fcr, ses)) { SDT_PROBE1(opencrypto, dev, ioctl, error, __LINE__); return (EINVAL); Modified: head/sys/opencrypto/cryptodev.h ============================================================================== --- head/sys/opencrypto/cryptodev.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/cryptodev.h Tue Nov 3 22:27:54 2020 (r367309) @@ -216,15 +216,15 @@ /* NB: deprecated */ struct session_op { - u_int32_t cipher; /* ie. CRYPTO_AES_CBC */ - u_int32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */ + uint32_t cipher; /* ie. CRYPTO_AES_CBC */ + uint32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */ - u_int32_t keylen; /* cipher key */ + uint32_t keylen; /* cipher key */ c_caddr_t key; int mackeylen; /* mac key */ c_caddr_t mackey; - u_int32_t ses; /* returns: session # */ + uint32_t ses; /* returns: session # */ }; /* @@ -233,25 +233,25 @@ struct session_op { * "cryptop" (no underscore). */ struct session2_op { - u_int32_t cipher; /* ie. CRYPTO_AES_CBC */ - u_int32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */ + uint32_t cipher; /* ie. CRYPTO_AES_CBC */ + uint32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */ - u_int32_t keylen; /* cipher key */ + uint32_t keylen; /* cipher key */ c_caddr_t key; int mackeylen; /* mac key */ c_caddr_t mackey; - u_int32_t ses; /* returns: session # */ + uint32_t ses; /* returns: session # */ int crid; /* driver id + flags (rw) */ int pad[4]; /* for future expansion */ }; struct crypt_op { - u_int32_t ses; - u_int16_t op; /* i.e. COP_ENCRYPT */ + uint32_t ses; + uint16_t op; /* i.e. COP_ENCRYPT */ #define COP_ENCRYPT 1 #define COP_DECRYPT 2 - u_int16_t flags; + uint16_t flags; #define COP_F_CIPHER_FIRST 0x0001 /* Cipher before MAC. */ #define COP_F_BATCH 0x0008 /* Batch op if possible */ u_int len; @@ -263,9 +263,9 @@ struct crypt_op { /* op and flags the same as crypt_op */ struct crypt_aead { - u_int32_t ses; - u_int16_t op; /* i.e. COP_ENCRYPT */ - u_int16_t flags; + uint32_t ses; + uint16_t op; /* i.e. COP_ENCRYPT */ + uint16_t flags; u_int len; u_int aadlen; u_int ivlen; @@ -320,16 +320,16 @@ struct crypt_kop { * done against open of /dev/crypto, to get a cloned descriptor. * Please use F_SETFD against the cloned descriptor. */ -#define CRIOGET _IOWR('c', 100, u_int32_t) +#define CRIOGET _IOWR('c', 100, uint32_t) #define CRIOASYMFEAT CIOCASYMFEAT #define CRIOFINDDEV CIOCFINDDEV /* the following are done against the cloned descriptor */ #define CIOCGSESSION _IOWR('c', 101, struct session_op) -#define CIOCFSESSION _IOW('c', 102, u_int32_t) +#define CIOCFSESSION _IOW('c', 102, uint32_t) #define CIOCCRYPT _IOWR('c', 103, struct crypt_op) #define CIOCKEY _IOWR('c', 104, struct crypt_kop) -#define CIOCASYMFEAT _IOR('c', 105, u_int32_t) +#define CIOCASYMFEAT _IOR('c', 105, uint32_t) #define CIOCGSESSION2 _IOWR('c', 106, struct session2_op) #define CIOCKEY2 _IOWR('c', 107, struct crypt_kop) #define CIOCFINDDEV _IOWR('c', 108, struct crypt_find_op) @@ -656,13 +656,13 @@ extern int32_t crypto_get_driverid(device_t dev, size_ extern int crypto_find_driver(const char *); extern device_t crypto_find_device_byhid(int hid); extern int crypto_getcaps(int hid); -extern int crypto_kregister(u_int32_t, int, u_int32_t); -extern int crypto_unregister_all(u_int32_t driverid); +extern int crypto_kregister(uint32_t, int, uint32_t); +extern int crypto_unregister_all(uint32_t driverid); extern int crypto_dispatch(struct cryptop *crp); extern int crypto_kdispatch(struct cryptkop *); #define CRYPTO_SYMQ 0x1 #define CRYPTO_ASYMQ 0x2 -extern int crypto_unblock(u_int32_t, int); +extern int crypto_unblock(uint32_t, int); extern void crypto_done(struct cryptop *crp); extern void crypto_kdone(struct cryptkop *); extern int crypto_getfeat(int *); Modified: head/sys/opencrypto/cryptosoft.c ============================================================================== --- head/sys/opencrypto/cryptosoft.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/cryptosoft.c Tue Nov 3 22:27:54 2020 (r367309) @@ -893,10 +893,10 @@ swcr_eta(struct swcr_session *ses, struct cryptop *crp static int swcr_compdec(struct swcr_session *ses, struct cryptop *crp) { - u_int8_t *data, *out; + uint8_t *data, *out; struct comp_algo *cxf; int adj; - u_int32_t result; + uint32_t result; cxf = ses->swcr_compdec.sw_cxf; Modified: head/sys/opencrypto/deflate.h ============================================================================== --- head/sys/opencrypto/deflate.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/deflate.h Tue Nov 3 22:27:54 2020 (r367309) @@ -41,7 +41,7 @@ #define MINCOMP 2 /* won't be used, but must be defined */ #define ZBUF 10 -u_int32_t deflate_global(u_int8_t *, u_int32_t, int, u_int8_t **); +uint32_t deflate_global(uint8_t *, uint32_t, int, uint8_t **); /* * We are going to use a combined allocation to hold the metadata Modified: head/sys/opencrypto/rmd160.c ============================================================================== --- head/sys/opencrypto/rmd160.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/rmd160.c Tue Nov 3 22:27:54 2020 (r367309) @@ -106,9 +106,9 @@ RMD160Init(RMD160_CTX *ctx) } void -RMD160Update(RMD160_CTX *ctx, const u_char *input, u_int32_t len) +RMD160Update(RMD160_CTX *ctx, const u_char *input, uint32_t len) { - u_int32_t have, off, need; + uint32_t have, off, need; have = (ctx->count/8) % 64; need = 64 - have; @@ -137,7 +137,7 @@ RMD160Final(u_char digest[20], RMD160_CTX *ctx) { int i; u_char size[8]; - u_int32_t padlen; + uint32_t padlen; PUT_64BIT_LE(size, ctx->count); @@ -159,9 +159,9 @@ RMD160Final(u_char digest[20], RMD160_CTX *ctx) } void -RMD160Transform(u_int32_t state[5], const u_char block[64]) +RMD160Transform(uint32_t state[5], const u_char block[64]) { - u_int32_t a, b, c, d, e, aa, bb, cc, dd, ee, t, x[16]; + uint32_t a, b, c, d, e, aa, bb, cc, dd, ee, t, x[16]; #if BYTE_ORDER == LITTLE_ENDIAN memcpy(x, block, 64); @@ -169,7 +169,7 @@ RMD160Transform(u_int32_t state[5], const u_char block int i; for (i = 0; i < 16; i++) - x[i] = bswap32(*(const u_int32_t*)(block+i*4)); + x[i] = bswap32(*(const uint32_t*)(block+i*4)); #endif a = state[0]; Modified: head/sys/opencrypto/rmd160.h ============================================================================== --- head/sys/opencrypto/rmd160.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/rmd160.h Tue Nov 3 22:27:54 2020 (r367309) @@ -28,14 +28,14 @@ /* RMD160 context. */ typedef struct RMD160Context { - u_int32_t state[5]; /* state */ - u_int64_t count; /* number of bits, modulo 2^64 */ + uint32_t state[5]; /* state */ + uint64_t count; /* number of bits, modulo 2^64 */ u_char buffer[64]; /* input buffer */ } RMD160_CTX; void RMD160Init(RMD160_CTX *); -void RMD160Transform(u_int32_t [5], const u_char [64]); -void RMD160Update(RMD160_CTX *, const u_char *, u_int32_t); +void RMD160Transform(uint32_t [5], const u_char [64]); +void RMD160Update(RMD160_CTX *, const u_char *, uint32_t); void RMD160Final(u_char [20], RMD160_CTX *); #endif /* _RMD160_H */ Modified: head/sys/opencrypto/xform_auth.h ============================================================================== --- head/sys/opencrypto/xform_auth.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_auth.h Tue Nov 3 22:27:54 2020 (r367309) @@ -52,15 +52,15 @@ struct auth_hash { int type; char *name; - u_int16_t keysize; - u_int16_t hashsize; - u_int16_t ctxsize; - u_int16_t blocksize; + uint16_t keysize; + uint16_t hashsize; + uint16_t ctxsize; + uint16_t blocksize; void (*Init) (void *); void (*Setkey) (void *, const uint8_t *, u_int); void (*Reinit) (void *, const uint8_t *, u_int); int (*Update) (void *, const void *, u_int); - void (*Final) (u_int8_t *, void *); + void (*Final) (uint8_t *, void *); }; extern struct auth_hash auth_hash_null; Modified: head/sys/opencrypto/xform_comp.h ============================================================================== --- head/sys/opencrypto/xform_comp.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_comp.h Tue Nov 3 22:27:54 2020 (r367309) @@ -42,8 +42,8 @@ struct comp_algo { int type; char *name; size_t minlen; - u_int32_t (*compress) (u_int8_t *, u_int32_t, u_int8_t **); - u_int32_t (*decompress) (u_int8_t *, u_int32_t, u_int8_t **); + uint32_t (*compress) (uint8_t *, uint32_t, uint8_t **); + uint32_t (*decompress) (uint8_t *, uint32_t, uint8_t **); }; extern struct comp_algo comp_algo_deflate; Modified: head/sys/opencrypto/xform_deflate.c ============================================================================== --- head/sys/opencrypto/xform_deflate.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_deflate.c Tue Nov 3 22:27:54 2020 (r367309) @@ -53,8 +53,8 @@ __FBSDID("$FreeBSD$"); #include <opencrypto/deflate.h> #include <opencrypto/xform_comp.h> -static u_int32_t deflate_compress(u_int8_t *, u_int32_t, u_int8_t **); -static u_int32_t deflate_decompress(u_int8_t *, u_int32_t, u_int8_t **); +static uint32_t deflate_compress(uint8_t *, uint32_t, uint8_t **); +static uint32_t deflate_decompress(uint8_t *, uint32_t, uint8_t **); /* Compression instance */ struct comp_algo comp_algo_deflate = { @@ -67,20 +67,20 @@ struct comp_algo comp_algo_deflate = { * And compression */ -static u_int32_t +static uint32_t deflate_compress(data, size, out) - u_int8_t *data; - u_int32_t size; - u_int8_t **out; + uint8_t *data; + uint32_t size; + uint8_t **out; { return deflate_global(data, size, 0, out); } -static u_int32_t +static uint32_t deflate_decompress(data, size, out) - u_int8_t *data; - u_int32_t size; - u_int8_t **out; + uint8_t *data; + uint32_t size; + uint8_t **out; { return deflate_global(data, size, 1, out); } Modified: head/sys/opencrypto/xform_enc.h ============================================================================== --- head/sys/opencrypto/xform_enc.h Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_enc.h Tue Nov 3 22:27:54 2020 (r367309) @@ -50,10 +50,10 @@ struct enc_xform { int type; char *name; size_t ctxsize; - u_int16_t blocksize; /* Required input block size -- 1 for stream ciphers. */ + uint16_t blocksize; /* Required input block size -- 1 for stream ciphers. */ uint16_t native_blocksize; /* Used for stream ciphers. */ - u_int16_t ivsize; - u_int16_t minkey, maxkey; + uint16_t ivsize; + uint16_t minkey, maxkey; /* * Encrypt/decrypt a single block. For stream ciphers this @@ -62,7 +62,7 @@ struct enc_xform { void (*encrypt) (void *, const uint8_t *, uint8_t *); void (*decrypt) (void *, const uint8_t *, uint8_t *); int (*setkey) (void *, const uint8_t *, int len); - void (*reinit) (void *, const u_int8_t *); + void (*reinit) (void *, const uint8_t *); /* * For stream ciphers, encrypt/decrypt the final partial block @@ -84,16 +84,16 @@ extern struct enc_xform enc_xform_chacha20; extern struct enc_xform enc_xform_ccm; struct aes_icm_ctx { - u_int32_t ac_ek[4*(RIJNDAEL_MAXNR + 1)]; + uint32_t ac_ek[4*(RIJNDAEL_MAXNR + 1)]; /* ac_block is initialized to IV */ - u_int8_t ac_block[AESICM_BLOCKSIZE]; + uint8_t ac_block[AESICM_BLOCKSIZE]; int ac_nr; }; struct aes_xts_ctx { rijndael_ctx key1; rijndael_ctx key2; - u_int8_t tweak[AES_XTS_BLOCKSIZE]; + uint8_t tweak[AES_XTS_BLOCKSIZE]; }; #endif /* _CRYPTO_XFORM_ENC_H_ */ Modified: head/sys/opencrypto/xform_null.c ============================================================================== --- head/sys/opencrypto/xform_null.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_null.c Tue Nov 3 22:27:54 2020 (r367309) @@ -53,13 +53,13 @@ __FBSDID("$FreeBSD$"); #include <opencrypto/xform_auth.h> #include <opencrypto/xform_enc.h> -static int null_setkey(void *, const u_int8_t *, int); +static int null_setkey(void *, const uint8_t *, int); static void null_crypt(void *, const uint8_t *, uint8_t *); static void null_init(void *); static void null_reinit(void *ctx, const uint8_t *buf, u_int len); static int null_update(void *, const void *, u_int); -static void null_final(u_int8_t *, void *); +static void null_final(uint8_t *, void *); /* Encryption instances */ struct enc_xform enc_xform_null = { @@ -125,8 +125,8 @@ null_update(void *ctx, const void *buf, u_int len) } static void -null_final(u_int8_t *buf, void *ctx) +null_final(uint8_t *buf, void *ctx) { - if (buf != (u_int8_t *) 0) + if (buf != (uint8_t *) 0) bzero(buf, 12); } Modified: head/sys/opencrypto/xform_rijndael.c ============================================================================== --- head/sys/opencrypto/xform_rijndael.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_rijndael.c Tue Nov 3 22:27:54 2020 (r367309) @@ -53,7 +53,7 @@ __FBSDID("$FreeBSD$"); #include <crypto/rijndael/rijndael.h> #include <opencrypto/xform_enc.h> -static int rijndael128_setkey(void *, const u_int8_t *, int); +static int rijndael128_setkey(void *, const uint8_t *, int); static void rijndael128_encrypt(void *, const uint8_t *, uint8_t *); static void rijndael128_decrypt(void *, const uint8_t *, uint8_t *); Modified: head/sys/opencrypto/xform_sha1.c ============================================================================== --- head/sys/opencrypto/xform_sha1.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_sha1.c Tue Nov 3 22:27:54 2020 (r367309) @@ -55,7 +55,7 @@ __FBSDID("$FreeBSD$"); static void SHA1Init_int(void *); static int SHA1Update_int(void *, const void *, u_int); -static void SHA1Final_int(u_int8_t *, void *); +static void SHA1Final_int(uint8_t *, void *); /* Plain hash */ struct auth_hash auth_hash_sha1 = { @@ -99,7 +99,7 @@ SHA1Update_int(void *ctx, const void *buf, u_int len) } static void -SHA1Final_int(u_int8_t *blk, void *ctx) +SHA1Final_int(uint8_t *blk, void *ctx) { SHA1Final(blk, ctx); } Modified: head/sys/opencrypto/xform_sha2.c ============================================================================== --- head/sys/opencrypto/xform_sha2.c Tue Nov 3 22:13:16 2020 (r367308) +++ head/sys/opencrypto/xform_sha2.c Tue Nov 3 22:27:54 2020 (r367309) @@ -70,7 +70,7 @@ struct auth_hash auth_hash_sha2_224 = { .blocksize = SHA2_224_BLOCK_LEN, .Init = (void (*)(void *)) SHA224_Init, .Update = SHA224Update_int, - .Final = (void (*)(u_int8_t *, void *)) SHA224_Final, + .Final = (void (*)(uint8_t *, void *)) SHA224_Final, }; struct auth_hash auth_hash_sha2_256 = { @@ -82,7 +82,7 @@ struct auth_hash auth_hash_sha2_256 = { .blocksize = SHA2_256_BLOCK_LEN, .Init = (void (*)(void *)) SHA256_Init, .Update = SHA256Update_int, - .Final = (void (*)(u_int8_t *, void *)) SHA256_Final, + .Final = (void (*)(uint8_t *, void *)) SHA256_Final, }; struct auth_hash auth_hash_sha2_384 = { @@ -94,7 +94,7 @@ struct auth_hash auth_hash_sha2_384 = { .blocksize = SHA2_384_BLOCK_LEN, .Init = (void (*)(void *)) SHA384_Init, .Update = SHA384Update_int, *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** _______________________________________________ svn-src-all@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/svn-src-all To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"