Page MenuHomeFreeBSD

D27061.diff
No OneTemporary

D27061.diff

Index: head/sys/crypto/chacha20/chacha-sw.c
===================================================================
--- head/sys/crypto/chacha20/chacha-sw.c
+++ head/sys/crypto/chacha20/chacha-sw.c
@@ -18,7 +18,7 @@
}
static void
-chacha20_xform_reinit(void *ctx, const u_int8_t *iv)
+chacha20_xform_reinit(void *ctx, const uint8_t *iv)
{
chacha_ivsetup(ctx, iv + 8, iv);
Index: head/sys/crypto/des/des.h
===================================================================
--- head/sys/crypto/des/des.h
+++ head/sys/crypto/des/des.h
@@ -56,7 +56,7 @@
#endif
/* must be 32bit quantity */
-#define DES_LONG u_int32_t
+#define DES_LONG uint32_t
typedef unsigned char des_cblock[8];
typedef struct des_ks_struct
Index: head/sys/crypto/rijndael/rijndael-api-fst.c
===================================================================
--- head/sys/crypto/rijndael/rijndael-api-fst.c
+++ head/sys/crypto/rijndael/rijndael-api-fst.c
@@ -32,7 +32,7 @@
#define TRUE 1
#endif
-typedef u_int8_t BYTE;
+typedef uint8_t BYTE;
int rijndael_makeKey(keyInstance *key, BYTE direction, int keyLen,
const char *keyMaterial) {
@@ -84,7 +84,7 @@
int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key,
const BYTE *input, int inputLen, BYTE *outBuffer) {
int i, k, numBlocks;
- u_int8_t block[16], iv[4][4];
+ uint8_t block[16], iv[4][4];
if (cipher == NULL ||
key == NULL ||
@@ -110,15 +110,15 @@
#if 1 /*STRICT_ALIGN*/
memcpy(block, cipher->IV, 16);
memcpy(iv, input, 16);
- ((u_int32_t*)block)[0] ^= ((u_int32_t*)iv)[0];
- ((u_int32_t*)block)[1] ^= ((u_int32_t*)iv)[1];
- ((u_int32_t*)block)[2] ^= ((u_int32_t*)iv)[2];
- ((u_int32_t*)block)[3] ^= ((u_int32_t*)iv)[3];
+ ((uint32_t*)block)[0] ^= ((uint32_t*)iv)[0];
+ ((uint32_t*)block)[1] ^= ((uint32_t*)iv)[1];
+ ((uint32_t*)block)[2] ^= ((uint32_t*)iv)[2];
+ ((uint32_t*)block)[3] ^= ((uint32_t*)iv)[3];
#else
- ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0];
- ((u_int32_t*)block)[1] = ((u_int32_t*)cipher->IV)[1] ^ ((u_int32_t*)input)[1];
- ((u_int32_t*)block)[2] = ((u_int32_t*)cipher->IV)[2] ^ ((u_int32_t*)input)[2];
- ((u_int32_t*)block)[3] = ((u_int32_t*)cipher->IV)[3] ^ ((u_int32_t*)input)[3];
+ ((uint32_t*)block)[0] = ((uint32_t*)cipher->IV)[0] ^ ((uint32_t*)input)[0];
+ ((uint32_t*)block)[1] = ((uint32_t*)cipher->IV)[1] ^ ((uint32_t*)input)[1];
+ ((uint32_t*)block)[2] = ((uint32_t*)cipher->IV)[2] ^ ((uint32_t*)input)[2];
+ ((uint32_t*)block)[3] = ((uint32_t*)cipher->IV)[3] ^ ((uint32_t*)input)[3];
#endif
rijndaelEncrypt(key->rk, key->Nr, block, outBuffer);
input += 16;
@@ -126,15 +126,15 @@
#if 1 /*STRICT_ALIGN*/
memcpy(block, outBuffer, 16);
memcpy(iv, input, 16);
- ((u_int32_t*)block)[0] ^= ((u_int32_t*)iv)[0];
- ((u_int32_t*)block)[1] ^= ((u_int32_t*)iv)[1];
- ((u_int32_t*)block)[2] ^= ((u_int32_t*)iv)[2];
- ((u_int32_t*)block)[3] ^= ((u_int32_t*)iv)[3];
+ ((uint32_t*)block)[0] ^= ((uint32_t*)iv)[0];
+ ((uint32_t*)block)[1] ^= ((uint32_t*)iv)[1];
+ ((uint32_t*)block)[2] ^= ((uint32_t*)iv)[2];
+ ((uint32_t*)block)[3] ^= ((uint32_t*)iv)[3];
#else
- ((u_int32_t*)block)[0] = ((u_int32_t*)outBuffer)[0] ^ ((u_int32_t*)input)[0];
- ((u_int32_t*)block)[1] = ((u_int32_t*)outBuffer)[1] ^ ((u_int32_t*)input)[1];
- ((u_int32_t*)block)[2] = ((u_int32_t*)outBuffer)[2] ^ ((u_int32_t*)input)[2];
- ((u_int32_t*)block)[3] = ((u_int32_t*)outBuffer)[3] ^ ((u_int32_t*)input)[3];
+ ((uint32_t*)block)[0] = ((uint32_t*)outBuffer)[0] ^ ((uint32_t*)input)[0];
+ ((uint32_t*)block)[1] = ((uint32_t*)outBuffer)[1] ^ ((uint32_t*)input)[1];
+ ((uint32_t*)block)[2] = ((uint32_t*)outBuffer)[2] ^ ((uint32_t*)input)[2];
+ ((uint32_t*)block)[3] = ((uint32_t*)outBuffer)[3] ^ ((uint32_t*)input)[3];
#endif
outBuffer += 16;
rijndaelEncrypt(key->rk, key->Nr, block, outBuffer);
@@ -146,17 +146,17 @@
#if 1 /*STRICT_ALIGN*/
memcpy(iv, cipher->IV, 16);
#else /* !STRICT_ALIGN */
- *((u_int32_t*)iv[0]) = *((u_int32_t*)(cipher->IV ));
- *((u_int32_t*)iv[1]) = *((u_int32_t*)(cipher->IV+ 4));
- *((u_int32_t*)iv[2]) = *((u_int32_t*)(cipher->IV+ 8));
- *((u_int32_t*)iv[3]) = *((u_int32_t*)(cipher->IV+12));
+ *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV ));
+ *((uint32_t*)iv[1]) = *((uint32_t*)(cipher->IV+ 4));
+ *((uint32_t*)iv[2]) = *((uint32_t*)(cipher->IV+ 8));
+ *((uint32_t*)iv[3]) = *((uint32_t*)(cipher->IV+12));
#endif /* ?STRICT_ALIGN */
for (i = numBlocks; i > 0; i--) {
for (k = 0; k < 128; k++) {
- *((u_int32_t*) block ) = *((u_int32_t*)iv[0]);
- *((u_int32_t*)(block+ 4)) = *((u_int32_t*)iv[1]);
- *((u_int32_t*)(block+ 8)) = *((u_int32_t*)iv[2]);
- *((u_int32_t*)(block+12)) = *((u_int32_t*)iv[3]);
+ *((uint32_t*) block ) = *((uint32_t*)iv[0]);
+ *((uint32_t*)(block+ 4)) = *((uint32_t*)iv[1]);
+ *((uint32_t*)(block+ 8)) = *((uint32_t*)iv[2]);
+ *((uint32_t*)(block+12)) = *((uint32_t*)iv[3]);
rijndaelEncrypt(key->ek, key->Nr, block,
block);
outBuffer[k/8] ^= (block[0] & 0x80) >> (k & 7);
@@ -200,7 +200,7 @@
int rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key,
const BYTE *input, int inputOctets, BYTE *outBuffer) {
int i, numBlocks, padLen;
- u_int8_t block[16], *iv, *cp;
+ uint8_t block[16], *iv, *cp;
if (cipher == NULL ||
key == NULL ||
@@ -232,10 +232,10 @@
case MODE_CBC:
iv = cipher->IV;
for (i = numBlocks; i > 0; i--) {
- ((u_int32_t*)block)[0] = ((const u_int32_t*)input)[0] ^ ((u_int32_t*)iv)[0];
- ((u_int32_t*)block)[1] = ((const u_int32_t*)input)[1] ^ ((u_int32_t*)iv)[1];
- ((u_int32_t*)block)[2] = ((const u_int32_t*)input)[2] ^ ((u_int32_t*)iv)[2];
- ((u_int32_t*)block)[3] = ((const u_int32_t*)input)[3] ^ ((u_int32_t*)iv)[3];
+ ((uint32_t*)block)[0] = ((const uint32_t*)input)[0] ^ ((uint32_t*)iv)[0];
+ ((uint32_t*)block)[1] = ((const uint32_t*)input)[1] ^ ((uint32_t*)iv)[1];
+ ((uint32_t*)block)[2] = ((const uint32_t*)input)[2] ^ ((uint32_t*)iv)[2];
+ ((uint32_t*)block)[3] = ((const uint32_t*)input)[3] ^ ((uint32_t*)iv)[3];
rijndaelEncrypt(key->rk, key->Nr, block, outBuffer);
iv = outBuffer;
input += 16;
@@ -264,7 +264,7 @@
int rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key,
const BYTE *input, int inputLen, BYTE *outBuffer) {
int i, k, numBlocks;
- u_int8_t block[16], iv[4][4];
+ uint8_t block[16], iv[4][4];
if (cipher == NULL ||
key == NULL ||
@@ -290,25 +290,25 @@
#if 1 /*STRICT_ALIGN */
memcpy(iv, cipher->IV, 16);
#else
- *((u_int32_t*)iv[0]) = *((u_int32_t*)(cipher->IV ));
- *((u_int32_t*)iv[1]) = *((u_int32_t*)(cipher->IV+ 4));
- *((u_int32_t*)iv[2]) = *((u_int32_t*)(cipher->IV+ 8));
- *((u_int32_t*)iv[3]) = *((u_int32_t*)(cipher->IV+12));
+ *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV ));
+ *((uint32_t*)iv[1]) = *((uint32_t*)(cipher->IV+ 4));
+ *((uint32_t*)iv[2]) = *((uint32_t*)(cipher->IV+ 8));
+ *((uint32_t*)iv[3]) = *((uint32_t*)(cipher->IV+12));
#endif
for (i = numBlocks; i > 0; i--) {
rijndaelDecrypt(key->rk, key->Nr, input, block);
- ((u_int32_t*)block)[0] ^= *((u_int32_t*)iv[0]);
- ((u_int32_t*)block)[1] ^= *((u_int32_t*)iv[1]);
- ((u_int32_t*)block)[2] ^= *((u_int32_t*)iv[2]);
- ((u_int32_t*)block)[3] ^= *((u_int32_t*)iv[3]);
+ ((uint32_t*)block)[0] ^= *((uint32_t*)iv[0]);
+ ((uint32_t*)block)[1] ^= *((uint32_t*)iv[1]);
+ ((uint32_t*)block)[2] ^= *((uint32_t*)iv[2]);
+ ((uint32_t*)block)[3] ^= *((uint32_t*)iv[3]);
#if 1 /*STRICT_ALIGN*/
memcpy(iv, input, 16);
memcpy(outBuffer, block, 16);
#else
- *((u_int32_t*)iv[0]) = ((u_int32_t*)input)[0]; ((u_int32_t*)outBuffer)[0] = ((u_int32_t*)block)[0];
- *((u_int32_t*)iv[1]) = ((u_int32_t*)input)[1]; ((u_int32_t*)outBuffer)[1] = ((u_int32_t*)block)[1];
- *((u_int32_t*)iv[2]) = ((u_int32_t*)input)[2]; ((u_int32_t*)outBuffer)[2] = ((u_int32_t*)block)[2];
- *((u_int32_t*)iv[3]) = ((u_int32_t*)input)[3]; ((u_int32_t*)outBuffer)[3] = ((u_int32_t*)block)[3];
+ *((uint32_t*)iv[0]) = ((uint32_t*)input)[0]; ((uint32_t*)outBuffer)[0] = ((uint32_t*)block)[0];
+ *((uint32_t*)iv[1]) = ((uint32_t*)input)[1]; ((uint32_t*)outBuffer)[1] = ((uint32_t*)block)[1];
+ *((uint32_t*)iv[2]) = ((uint32_t*)input)[2]; ((uint32_t*)outBuffer)[2] = ((uint32_t*)block)[2];
+ *((uint32_t*)iv[3]) = ((uint32_t*)input)[3]; ((uint32_t*)outBuffer)[3] = ((uint32_t*)block)[3];
#endif
input += 16;
outBuffer += 16;
@@ -319,17 +319,17 @@
#if 1 /*STRICT_ALIGN */
memcpy(iv, cipher->IV, 16);
#else
- *((u_int32_t*)iv[0]) = *((u_int32_t*)(cipher->IV));
- *((u_int32_t*)iv[1]) = *((u_int32_t*)(cipher->IV+ 4));
- *((u_int32_t*)iv[2]) = *((u_int32_t*)(cipher->IV+ 8));
- *((u_int32_t*)iv[3]) = *((u_int32_t*)(cipher->IV+12));
+ *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV));
+ *((uint32_t*)iv[1]) = *((uint32_t*)(cipher->IV+ 4));
+ *((uint32_t*)iv[2]) = *((uint32_t*)(cipher->IV+ 8));
+ *((uint32_t*)iv[3]) = *((uint32_t*)(cipher->IV+12));
#endif
for (i = numBlocks; i > 0; i--) {
for (k = 0; k < 128; k++) {
- *((u_int32_t*) block ) = *((u_int32_t*)iv[0]);
- *((u_int32_t*)(block+ 4)) = *((u_int32_t*)iv[1]);
- *((u_int32_t*)(block+ 8)) = *((u_int32_t*)iv[2]);
- *((u_int32_t*)(block+12)) = *((u_int32_t*)iv[3]);
+ *((uint32_t*) block ) = *((uint32_t*)iv[0]);
+ *((uint32_t*)(block+ 4)) = *((uint32_t*)iv[1]);
+ *((uint32_t*)(block+ 8)) = *((uint32_t*)iv[2]);
+ *((uint32_t*)(block+12)) = *((uint32_t*)iv[3]);
rijndaelEncrypt(key->ek, key->Nr, block,
block);
iv[0][0] = (iv[0][0] << 1) | (iv[0][1] >> 7);
@@ -364,8 +364,8 @@
int rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key,
const BYTE *input, int inputOctets, BYTE *outBuffer) {
int i, numBlocks, padLen, rval;
- u_int8_t block[16];
- u_int32_t iv[4];
+ uint8_t block[16];
+ uint32_t iv[4];
if (cipher == NULL ||
key == NULL ||
@@ -410,10 +410,10 @@
/* all blocks but last */
for (i = numBlocks - 1; i > 0; i--) {
rijndaelDecrypt(key->rk, key->Nr, input, block);
- ((u_int32_t*)block)[0] ^= iv[0];
- ((u_int32_t*)block)[1] ^= iv[1];
- ((u_int32_t*)block)[2] ^= iv[2];
- ((u_int32_t*)block)[3] ^= iv[3];
+ ((uint32_t*)block)[0] ^= iv[0];
+ ((uint32_t*)block)[1] ^= iv[1];
+ ((uint32_t*)block)[2] ^= iv[2];
+ ((uint32_t*)block)[3] ^= iv[3];
memcpy(iv, input, 16);
memcpy(outBuffer, block, 16);
input += 16;
@@ -421,10 +421,10 @@
}
/* last block */
rijndaelDecrypt(key->rk, key->Nr, input, block);
- ((u_int32_t*)block)[0] ^= iv[0];
- ((u_int32_t*)block)[1] ^= iv[1];
- ((u_int32_t*)block)[2] ^= iv[2];
- ((u_int32_t*)block)[3] ^= iv[3];
+ ((uint32_t*)block)[0] ^= iv[0];
+ ((uint32_t*)block)[1] ^= iv[1];
+ ((uint32_t*)block)[2] ^= iv[2];
+ ((uint32_t*)block)[3] ^= iv[3];
padLen = block[15];
if (padLen <= 0 || padLen > 16) {
rval = BAD_DATA;
Index: head/sys/crypto/rijndael/rijndael.h
===================================================================
--- head/sys/crypto/rijndael/rijndael.h
+++ head/sys/crypto/rijndael/rijndael.h
@@ -45,11 +45,11 @@
void rijndael_decrypt(const rijndael_ctx *, const u_char *, u_char *);
void rijndael_encrypt(const rijndael_ctx *, const u_char *, u_char *);
-int rijndaelKeySetupEnc(u_int32_t [/*4*(Nr+1)*/], const u_int8_t [], int);
-int rijndaelKeySetupDec(u_int32_t [/*4*(Nr+1)*/], const u_int8_t [], int);
-void rijndaelEncrypt(const u_int32_t [/*4*(Nr+1)*/], int,
- const u_int8_t[16], u_int8_t [16]);
-void rijndaelDecrypt(const u_int32_t [/*4*(Nr+1)*/], int,
- const u_int8_t [16], u_int8_t [16]);
+int rijndaelKeySetupEnc(uint32_t [/*4*(Nr+1)*/], const uint8_t [], int);
+int rijndaelKeySetupDec(uint32_t [/*4*(Nr+1)*/], const uint8_t [], int);
+void rijndaelEncrypt(const uint32_t [/*4*(Nr+1)*/], int,
+ const uint8_t[16], uint8_t [16]);
+void rijndaelDecrypt(const uint32_t [/*4*(Nr+1)*/], int,
+ const uint8_t [16], uint8_t [16]);
#endif /* __RIJNDAEL_H */
Index: head/sys/crypto/rijndael/rijndael_local.h
===================================================================
--- head/sys/crypto/rijndael/rijndael_local.h
+++ head/sys/crypto/rijndael/rijndael_local.h
@@ -2,6 +2,6 @@
/* $FreeBSD$ */
/* the file should not be used from outside */
-typedef u_int8_t u8;
-typedef u_int16_t u16;
-typedef u_int32_t u32;
+typedef uint8_t u8;
+typedef uint16_t u16;
+typedef uint32_t u32;
Index: head/sys/crypto/sha1.h
===================================================================
--- head/sys/crypto/sha1.h
+++ head/sys/crypto/sha1.h
@@ -42,18 +42,18 @@
struct sha1_ctxt {
union {
- u_int8_t b8[20];
- u_int32_t b32[5];
+ uint8_t b8[20];
+ uint32_t b32[5];
} h;
union {
- u_int8_t b8[8];
- u_int64_t b64[1];
+ uint8_t b8[8];
+ uint64_t b64[1];
} c;
union {
- u_int8_t b8[64];
- u_int32_t b32[16];
+ uint8_t b8[64];
+ uint32_t b32[16];
} m;
- u_int8_t count;
+ uint8_t count;
};
typedef struct sha1_ctxt SHA1_CTX;
@@ -62,7 +62,7 @@
#ifdef _KERNEL
extern void sha1_init(struct sha1_ctxt *);
extern void sha1_pad(struct sha1_ctxt *);
-extern void sha1_loop(struct sha1_ctxt *, const u_int8_t *, size_t);
+extern void sha1_loop(struct sha1_ctxt *, const uint8_t *, size_t);
extern void sha1_result(struct sha1_ctxt *, char[__min_size(SHA1_RESULTLEN)]);
/* compatibilty with other SHA1 source codes */
Index: head/sys/crypto/sha1.c
===================================================================
--- head/sys/crypto/sha1.c
+++ head/sys/crypto/sha1.c
@@ -56,7 +56,7 @@
#ifndef unsupported
/* constant table */
-static u_int32_t _K[] = { 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6 };
+static uint32_t _K[] = { 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6 };
#define K(t) _K[(t) / 20]
#define F0(b, c, d) (((b) & (c)) | ((~(b)) & (d)))
@@ -94,9 +94,9 @@
sha1_step(ctxt)
struct sha1_ctxt *ctxt;
{
- u_int32_t a, b, c, d, e;
+ uint32_t a, b, c, d, e;
size_t t, s;
- u_int32_t tmp;
+ uint32_t tmp;
#if BYTE_ORDER == LITTLE_ENDIAN
struct sha1_ctxt tctxt;
@@ -225,7 +225,7 @@
void
sha1_loop(ctxt, input, len)
struct sha1_ctxt *ctxt;
- const u_int8_t *input;
+ const uint8_t *input;
size_t len;
{
size_t gaplen;
@@ -253,9 +253,9 @@
void
sha1_result(struct sha1_ctxt *ctxt, char digest0[static SHA1_RESULTLEN])
{
- u_int8_t *digest;
+ uint8_t *digest;
- digest = (u_int8_t *)digest0;
+ digest = (uint8_t *)digest0;
sha1_pad(ctxt);
#if BYTE_ORDER == BIG_ENDIAN
bcopy(&ctxt->h.b8[0], digest, SHA1_RESULTLEN);
Index: head/sys/crypto/skein/skein_port.h
===================================================================
--- head/sys/crypto/skein/skein_port.h
+++ head/sys/crypto/skein/skein_port.h
@@ -22,9 +22,9 @@
#ifndef _OPENSOLARIS_SYS_TYPES_H_ /* Avoid redefining this typedef */
typedef unsigned int uint_t; /* native unsigned integer */
#endif
-typedef u_int8_t u08b_t; /* 8-bit unsigned integer */
-typedef u_int32_t uint_32t; /* 32-bit unsigned integer */
-typedef u_int64_t u64b_t; /* 64-bit unsigned integer */
+typedef uint8_t u08b_t; /* 8-bit unsigned integer */
+typedef uint32_t uint_32t; /* 32-bit unsigned integer */
+typedef uint64_t u64b_t; /* 64-bit unsigned integer */
#ifndef RotL_64
#define RotL_64(x,N) (((x) << (N)) | ((x) >> (64-(N))))
Index: head/sys/opencrypto/crypto.c
===================================================================
--- head/sys/opencrypto/crypto.c
+++ head/sys/opencrypto/crypto.c
@@ -117,9 +117,9 @@
struct cryptocap {
device_t cc_dev;
uint32_t cc_hid;
- u_int32_t cc_sessions; /* (d) # of sessions */
- u_int32_t cc_koperations; /* (d) # os asym operations */
- u_int8_t cc_kalg[CRK_ALGORITHM_MAX + 1];
+ uint32_t cc_sessions; /* (d) # of sessions */
+ uint32_t cc_koperations; /* (d) # os asym operations */
+ uint8_t cc_kalg[CRK_ALGORITHM_MAX + 1];
int cc_flags; /* (d) flags */
#define CRYPTOCAP_F_CLEANUP 0x80000000 /* needs resource cleanup */
@@ -173,8 +173,8 @@
TAILQ_HEAD(,cryptop) crp_ret_q; /* callback queue for symetric jobs */
TAILQ_HEAD(,cryptkop) crp_ret_kq; /* callback queue for asym jobs */
- u_int32_t reorder_ops; /* total ordered sym jobs received */
- u_int32_t reorder_cur_seq; /* current sym job dispatched */
+ uint32_t reorder_ops; /* total ordered sym jobs received */
+ uint32_t reorder_cur_seq; /* current sym job dispatched */
struct proc *cryptoretproc;
};
@@ -611,7 +611,7 @@
}
static struct cryptocap *
-crypto_checkdriver(u_int32_t hid)
+crypto_checkdriver(uint32_t hid)
{
return (hid >= crypto_drivers_size ? NULL : crypto_drivers[hid]);
@@ -1119,7 +1119,7 @@
* is called once for each algorithm supported a driver.
*/
int
-crypto_kregister(u_int32_t driverid, int kalg, u_int32_t flags)
+crypto_kregister(uint32_t driverid, int kalg, uint32_t flags)
{
struct cryptocap *cap;
int err;
@@ -1159,7 +1159,7 @@
* requests.
*/
int
-crypto_unregister_all(u_int32_t driverid)
+crypto_unregister_all(uint32_t driverid)
{
struct cryptocap *cap;
@@ -1190,7 +1190,7 @@
* the driver is now ready for cryptop's and/or cryptokop's.
*/
int
-crypto_unblock(u_int32_t driverid, int what)
+crypto_unblock(uint32_t driverid, int what)
{
struct cryptocap *cap;
int err;
Index: head/sys/opencrypto/cryptodeflate.c
===================================================================
--- head/sys/opencrypto/cryptodeflate.c
+++ head/sys/opencrypto/cryptodeflate.c
@@ -49,13 +49,13 @@
SDT_PROVIDER_DECLARE(opencrypto);
SDT_PROBE_DEFINE2(opencrypto, deflate, deflate_global, entry,
- "int", "u_int32_t");
+ "int", "uint32_t");
SDT_PROBE_DEFINE6(opencrypto, deflate, deflate_global, bad,
"int", "int", "int", "int", "int", "int");
SDT_PROBE_DEFINE6(opencrypto, deflate, deflate_global, iter,
"int", "int", "int", "int", "int", "int");
SDT_PROBE_DEFINE2(opencrypto, deflate, deflate_global, return,
- "int", "u_int32_t");
+ "int", "uint32_t");
int window_inflate = -1 * MAX_WBITS;
int window_deflate = -12;
@@ -81,18 +81,18 @@
* algorithm
*/
-u_int32_t
+uint32_t
deflate_global(data, size, decomp, out)
- u_int8_t *data;
- u_int32_t size;
+ uint8_t *data;
+ uint32_t size;
int decomp;
- u_int8_t **out;
+ uint8_t **out;
{
/* decomp indicates whether we compress (0) or decompress (1) */
z_stream zbuf;
- u_int8_t *output;
- u_int32_t count, result;
+ uint8_t *output;
+ uint32_t count, result;
int error, i;
struct deflate_buf *bufh, *bufp;
Index: head/sys/opencrypto/cryptodev.h
===================================================================
--- head/sys/opencrypto/cryptodev.h
+++ head/sys/opencrypto/cryptodev.h
@@ -216,15 +216,15 @@
/* NB: deprecated */
struct session_op {
- u_int32_t cipher; /* ie. CRYPTO_AES_CBC */
- u_int32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */
+ uint32_t cipher; /* ie. CRYPTO_AES_CBC */
+ uint32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */
- u_int32_t keylen; /* cipher key */
+ uint32_t keylen; /* cipher key */
c_caddr_t key;
int mackeylen; /* mac key */
c_caddr_t mackey;
- u_int32_t ses; /* returns: session # */
+ uint32_t ses; /* returns: session # */
};
/*
@@ -233,25 +233,25 @@
* "cryptop" (no underscore).
*/
struct session2_op {
- u_int32_t cipher; /* ie. CRYPTO_AES_CBC */
- u_int32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */
+ uint32_t cipher; /* ie. CRYPTO_AES_CBC */
+ uint32_t mac; /* ie. CRYPTO_SHA2_256_HMAC */
- u_int32_t keylen; /* cipher key */
+ uint32_t keylen; /* cipher key */
c_caddr_t key;
int mackeylen; /* mac key */
c_caddr_t mackey;
- u_int32_t ses; /* returns: session # */
+ uint32_t ses; /* returns: session # */
int crid; /* driver id + flags (rw) */
int pad[4]; /* for future expansion */
};
struct crypt_op {
- u_int32_t ses;
- u_int16_t op; /* i.e. COP_ENCRYPT */
+ uint32_t ses;
+ uint16_t op; /* i.e. COP_ENCRYPT */
#define COP_ENCRYPT 1
#define COP_DECRYPT 2
- u_int16_t flags;
+ uint16_t flags;
#define COP_F_CIPHER_FIRST 0x0001 /* Cipher before MAC. */
#define COP_F_BATCH 0x0008 /* Batch op if possible */
u_int len;
@@ -263,9 +263,9 @@
/* op and flags the same as crypt_op */
struct crypt_aead {
- u_int32_t ses;
- u_int16_t op; /* i.e. COP_ENCRYPT */
- u_int16_t flags;
+ uint32_t ses;
+ uint16_t op; /* i.e. COP_ENCRYPT */
+ uint16_t flags;
u_int len;
u_int aadlen;
u_int ivlen;
@@ -320,16 +320,16 @@
* done against open of /dev/crypto, to get a cloned descriptor.
* Please use F_SETFD against the cloned descriptor.
*/
-#define CRIOGET _IOWR('c', 100, u_int32_t)
+#define CRIOGET _IOWR('c', 100, uint32_t)
#define CRIOASYMFEAT CIOCASYMFEAT
#define CRIOFINDDEV CIOCFINDDEV
/* the following are done against the cloned descriptor */
#define CIOCGSESSION _IOWR('c', 101, struct session_op)
-#define CIOCFSESSION _IOW('c', 102, u_int32_t)
+#define CIOCFSESSION _IOW('c', 102, uint32_t)
#define CIOCCRYPT _IOWR('c', 103, struct crypt_op)
#define CIOCKEY _IOWR('c', 104, struct crypt_kop)
-#define CIOCASYMFEAT _IOR('c', 105, u_int32_t)
+#define CIOCASYMFEAT _IOR('c', 105, uint32_t)
#define CIOCGSESSION2 _IOWR('c', 106, struct session2_op)
#define CIOCKEY2 _IOWR('c', 107, struct crypt_kop)
#define CIOCFINDDEV _IOWR('c', 108, struct crypt_find_op)
@@ -656,13 +656,13 @@
extern int crypto_find_driver(const char *);
extern device_t crypto_find_device_byhid(int hid);
extern int crypto_getcaps(int hid);
-extern int crypto_kregister(u_int32_t, int, u_int32_t);
-extern int crypto_unregister_all(u_int32_t driverid);
+extern int crypto_kregister(uint32_t, int, uint32_t);
+extern int crypto_unregister_all(uint32_t driverid);
extern int crypto_dispatch(struct cryptop *crp);
extern int crypto_kdispatch(struct cryptkop *);
#define CRYPTO_SYMQ 0x1
#define CRYPTO_ASYMQ 0x2
-extern int crypto_unblock(u_int32_t, int);
+extern int crypto_unblock(uint32_t, int);
extern void crypto_done(struct cryptop *crp);
extern void crypto_kdone(struct cryptkop *);
extern int crypto_getfeat(int *);
Index: head/sys/opencrypto/cryptodev.c
===================================================================
--- head/sys/opencrypto/cryptodev.c
+++ head/sys/opencrypto/cryptodev.c
@@ -72,53 +72,53 @@
#include <compat/freebsd32/freebsd32.h>
struct session_op32 {
- u_int32_t cipher;
- u_int32_t mac;
- u_int32_t keylen;
- u_int32_t key;
+ uint32_t cipher;
+ uint32_t mac;
+ uint32_t keylen;
+ uint32_t key;
int mackeylen;
- u_int32_t mackey;
- u_int32_t ses;
+ uint32_t mackey;
+ uint32_t ses;
};
struct session2_op32 {
- u_int32_t cipher;
- u_int32_t mac;
- u_int32_t keylen;
- u_int32_t key;
+ uint32_t cipher;
+ uint32_t mac;
+ uint32_t keylen;
+ uint32_t key;
int mackeylen;
- u_int32_t mackey;
- u_int32_t ses;
+ uint32_t mackey;
+ uint32_t ses;
int crid;
int pad[4];
};
struct crypt_op32 {
- u_int32_t ses;
- u_int16_t op;
- u_int16_t flags;
+ uint32_t ses;
+ uint16_t op;
+ uint16_t flags;
u_int len;
- u_int32_t src, dst;
- u_int32_t mac;
- u_int32_t iv;
+ uint32_t src, dst;
+ uint32_t mac;
+ uint32_t iv;
};
struct crypt_aead32 {
- u_int32_t ses;
- u_int16_t op;
- u_int16_t flags;
+ uint32_t ses;
+ uint16_t op;
+ uint16_t flags;
u_int len;
u_int aadlen;
u_int ivlen;
- u_int32_t src;
- u_int32_t dst;
- u_int32_t aad;
- u_int32_t tag;
- u_int32_t iv;
+ uint32_t src;
+ uint32_t dst;
+ uint32_t aad;
+ uint32_t tag;
+ uint32_t iv;
};
struct crparam32 {
- u_int32_t crp_p;
+ uint32_t crp_p;
u_int crp_nbits;
};
@@ -309,7 +309,7 @@
TAILQ_ENTRY(csession) next;
crypto_session_t cses;
volatile u_int refs;
- u_int32_t ses;
+ uint32_t ses;
struct mtx lock; /* for op submission */
struct enc_xform *txform;
@@ -437,7 +437,7 @@
void *mackey = NULL;
struct crypt_kop *kop;
crypto_session_t cses;
- u_int32_t ses;
+ uint32_t ses;
int error = 0, crid;
union {
struct session2_op sopc;
@@ -806,7 +806,7 @@
session2_op_to_op(sop, data);
break;
case CIOCFSESSION:
- ses = *(u_int32_t *)data;
+ ses = *(uint32_t *)data;
if (!csedelete(fcr, ses)) {
SDT_PROBE1(opencrypto, dev, ioctl, error, __LINE__);
return (EINVAL);
Index: head/sys/opencrypto/cryptosoft.c
===================================================================
--- head/sys/opencrypto/cryptosoft.c
+++ head/sys/opencrypto/cryptosoft.c
@@ -893,10 +893,10 @@
static int
swcr_compdec(struct swcr_session *ses, struct cryptop *crp)
{
- u_int8_t *data, *out;
+ uint8_t *data, *out;
struct comp_algo *cxf;
int adj;
- u_int32_t result;
+ uint32_t result;
cxf = ses->swcr_compdec.sw_cxf;
Index: head/sys/opencrypto/deflate.h
===================================================================
--- head/sys/opencrypto/deflate.h
+++ head/sys/opencrypto/deflate.h
@@ -41,7 +41,7 @@
#define MINCOMP 2 /* won't be used, but must be defined */
#define ZBUF 10
-u_int32_t deflate_global(u_int8_t *, u_int32_t, int, u_int8_t **);
+uint32_t deflate_global(uint8_t *, uint32_t, int, uint8_t **);
/*
* We are going to use a combined allocation to hold the metadata
Index: head/sys/opencrypto/rmd160.h
===================================================================
--- head/sys/opencrypto/rmd160.h
+++ head/sys/opencrypto/rmd160.h
@@ -28,14 +28,14 @@
/* RMD160 context. */
typedef struct RMD160Context {
- u_int32_t state[5]; /* state */
- u_int64_t count; /* number of bits, modulo 2^64 */
+ uint32_t state[5]; /* state */
+ uint64_t count; /* number of bits, modulo 2^64 */
u_char buffer[64]; /* input buffer */
} RMD160_CTX;
void RMD160Init(RMD160_CTX *);
-void RMD160Transform(u_int32_t [5], const u_char [64]);
-void RMD160Update(RMD160_CTX *, const u_char *, u_int32_t);
+void RMD160Transform(uint32_t [5], const u_char [64]);
+void RMD160Update(RMD160_CTX *, const u_char *, uint32_t);
void RMD160Final(u_char [20], RMD160_CTX *);
#endif /* _RMD160_H */
Index: head/sys/opencrypto/rmd160.c
===================================================================
--- head/sys/opencrypto/rmd160.c
+++ head/sys/opencrypto/rmd160.c
@@ -106,9 +106,9 @@
}
void
-RMD160Update(RMD160_CTX *ctx, const u_char *input, u_int32_t len)
+RMD160Update(RMD160_CTX *ctx, const u_char *input, uint32_t len)
{
- u_int32_t have, off, need;
+ uint32_t have, off, need;
have = (ctx->count/8) % 64;
need = 64 - have;
@@ -137,7 +137,7 @@
{
int i;
u_char size[8];
- u_int32_t padlen;
+ uint32_t padlen;
PUT_64BIT_LE(size, ctx->count);
@@ -159,9 +159,9 @@
}
void
-RMD160Transform(u_int32_t state[5], const u_char block[64])
+RMD160Transform(uint32_t state[5], const u_char block[64])
{
- u_int32_t a, b, c, d, e, aa, bb, cc, dd, ee, t, x[16];
+ uint32_t a, b, c, d, e, aa, bb, cc, dd, ee, t, x[16];
#if BYTE_ORDER == LITTLE_ENDIAN
memcpy(x, block, 64);
@@ -169,7 +169,7 @@
int i;
for (i = 0; i < 16; i++)
- x[i] = bswap32(*(const u_int32_t*)(block+i*4));
+ x[i] = bswap32(*(const uint32_t*)(block+i*4));
#endif
a = state[0];
Index: head/sys/opencrypto/xform_auth.h
===================================================================
--- head/sys/opencrypto/xform_auth.h
+++ head/sys/opencrypto/xform_auth.h
@@ -52,15 +52,15 @@
struct auth_hash {
int type;
char *name;
- u_int16_t keysize;
- u_int16_t hashsize;
- u_int16_t ctxsize;
- u_int16_t blocksize;
+ uint16_t keysize;
+ uint16_t hashsize;
+ uint16_t ctxsize;
+ uint16_t blocksize;
void (*Init) (void *);
void (*Setkey) (void *, const uint8_t *, u_int);
void (*Reinit) (void *, const uint8_t *, u_int);
int (*Update) (void *, const void *, u_int);
- void (*Final) (u_int8_t *, void *);
+ void (*Final) (uint8_t *, void *);
};
extern struct auth_hash auth_hash_null;
Index: head/sys/opencrypto/xform_comp.h
===================================================================
--- head/sys/opencrypto/xform_comp.h
+++ head/sys/opencrypto/xform_comp.h
@@ -42,8 +42,8 @@
int type;
char *name;
size_t minlen;
- u_int32_t (*compress) (u_int8_t *, u_int32_t, u_int8_t **);
- u_int32_t (*decompress) (u_int8_t *, u_int32_t, u_int8_t **);
+ uint32_t (*compress) (uint8_t *, uint32_t, uint8_t **);
+ uint32_t (*decompress) (uint8_t *, uint32_t, uint8_t **);
};
extern struct comp_algo comp_algo_deflate;
Index: head/sys/opencrypto/xform_deflate.c
===================================================================
--- head/sys/opencrypto/xform_deflate.c
+++ head/sys/opencrypto/xform_deflate.c
@@ -53,8 +53,8 @@
#include <opencrypto/deflate.h>
#include <opencrypto/xform_comp.h>
-static u_int32_t deflate_compress(u_int8_t *, u_int32_t, u_int8_t **);
-static u_int32_t deflate_decompress(u_int8_t *, u_int32_t, u_int8_t **);
+static uint32_t deflate_compress(uint8_t *, uint32_t, uint8_t **);
+static uint32_t deflate_decompress(uint8_t *, uint32_t, uint8_t **);
/* Compression instance */
struct comp_algo comp_algo_deflate = {
@@ -67,20 +67,20 @@
* And compression
*/
-static u_int32_t
+static uint32_t
deflate_compress(data, size, out)
- u_int8_t *data;
- u_int32_t size;
- u_int8_t **out;
+ uint8_t *data;
+ uint32_t size;
+ uint8_t **out;
{
return deflate_global(data, size, 0, out);
}
-static u_int32_t
+static uint32_t
deflate_decompress(data, size, out)
- u_int8_t *data;
- u_int32_t size;
- u_int8_t **out;
+ uint8_t *data;
+ uint32_t size;
+ uint8_t **out;
{
return deflate_global(data, size, 1, out);
}
Index: head/sys/opencrypto/xform_enc.h
===================================================================
--- head/sys/opencrypto/xform_enc.h
+++ head/sys/opencrypto/xform_enc.h
@@ -50,10 +50,10 @@
int type;
char *name;
size_t ctxsize;
- u_int16_t blocksize; /* Required input block size -- 1 for stream ciphers. */
+ uint16_t blocksize; /* Required input block size -- 1 for stream ciphers. */
uint16_t native_blocksize; /* Used for stream ciphers. */
- u_int16_t ivsize;
- u_int16_t minkey, maxkey;
+ uint16_t ivsize;
+ uint16_t minkey, maxkey;
/*
* Encrypt/decrypt a single block. For stream ciphers this
@@ -62,7 +62,7 @@
void (*encrypt) (void *, const uint8_t *, uint8_t *);
void (*decrypt) (void *, const uint8_t *, uint8_t *);
int (*setkey) (void *, const uint8_t *, int len);
- void (*reinit) (void *, const u_int8_t *);
+ void (*reinit) (void *, const uint8_t *);
/*
* For stream ciphers, encrypt/decrypt the final partial block
@@ -84,16 +84,16 @@
extern struct enc_xform enc_xform_ccm;
struct aes_icm_ctx {
- u_int32_t ac_ek[4*(RIJNDAEL_MAXNR + 1)];
+ uint32_t ac_ek[4*(RIJNDAEL_MAXNR + 1)];
/* ac_block is initialized to IV */
- u_int8_t ac_block[AESICM_BLOCKSIZE];
+ uint8_t ac_block[AESICM_BLOCKSIZE];
int ac_nr;
};
struct aes_xts_ctx {
rijndael_ctx key1;
rijndael_ctx key2;
- u_int8_t tweak[AES_XTS_BLOCKSIZE];
+ uint8_t tweak[AES_XTS_BLOCKSIZE];
};
#endif /* _CRYPTO_XFORM_ENC_H_ */
Index: head/sys/opencrypto/xform_null.c
===================================================================
--- head/sys/opencrypto/xform_null.c
+++ head/sys/opencrypto/xform_null.c
@@ -53,13 +53,13 @@
#include <opencrypto/xform_auth.h>
#include <opencrypto/xform_enc.h>
-static int null_setkey(void *, const u_int8_t *, int);
+static int null_setkey(void *, const uint8_t *, int);
static void null_crypt(void *, const uint8_t *, uint8_t *);
static void null_init(void *);
static void null_reinit(void *ctx, const uint8_t *buf, u_int len);
static int null_update(void *, const void *, u_int);
-static void null_final(u_int8_t *, void *);
+static void null_final(uint8_t *, void *);
/* Encryption instances */
struct enc_xform enc_xform_null = {
@@ -125,8 +125,8 @@
}
static void
-null_final(u_int8_t *buf, void *ctx)
+null_final(uint8_t *buf, void *ctx)
{
- if (buf != (u_int8_t *) 0)
+ if (buf != (uint8_t *) 0)
bzero(buf, 12);
}
Index: head/sys/opencrypto/xform_rijndael.c
===================================================================
--- head/sys/opencrypto/xform_rijndael.c
+++ head/sys/opencrypto/xform_rijndael.c
@@ -53,7 +53,7 @@
#include <crypto/rijndael/rijndael.h>
#include <opencrypto/xform_enc.h>
-static int rijndael128_setkey(void *, const u_int8_t *, int);
+static int rijndael128_setkey(void *, const uint8_t *, int);
static void rijndael128_encrypt(void *, const uint8_t *, uint8_t *);
static void rijndael128_decrypt(void *, const uint8_t *, uint8_t *);
Index: head/sys/opencrypto/xform_sha1.c
===================================================================
--- head/sys/opencrypto/xform_sha1.c
+++ head/sys/opencrypto/xform_sha1.c
@@ -55,7 +55,7 @@
static void SHA1Init_int(void *);
static int SHA1Update_int(void *, const void *, u_int);
-static void SHA1Final_int(u_int8_t *, void *);
+static void SHA1Final_int(uint8_t *, void *);
/* Plain hash */
struct auth_hash auth_hash_sha1 = {
@@ -99,7 +99,7 @@
}
static void
-SHA1Final_int(u_int8_t *blk, void *ctx)
+SHA1Final_int(uint8_t *blk, void *ctx)
{
SHA1Final(blk, ctx);
}
Index: head/sys/opencrypto/xform_sha2.c
===================================================================
--- head/sys/opencrypto/xform_sha2.c
+++ head/sys/opencrypto/xform_sha2.c
@@ -70,7 +70,7 @@
.blocksize = SHA2_224_BLOCK_LEN,
.Init = (void (*)(void *)) SHA224_Init,
.Update = SHA224Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA224_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA224_Final,
};
struct auth_hash auth_hash_sha2_256 = {
@@ -82,7 +82,7 @@
.blocksize = SHA2_256_BLOCK_LEN,
.Init = (void (*)(void *)) SHA256_Init,
.Update = SHA256Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA256_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA256_Final,
};
struct auth_hash auth_hash_sha2_384 = {
@@ -94,7 +94,7 @@
.blocksize = SHA2_384_BLOCK_LEN,
.Init = (void (*)(void *)) SHA384_Init,
.Update = SHA384Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA384_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA384_Final,
};
struct auth_hash auth_hash_sha2_512 = {
@@ -106,7 +106,7 @@
.blocksize = SHA2_512_BLOCK_LEN,
.Init = (void (*)(void *)) SHA512_Init,
.Update = SHA512Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA512_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA512_Final,
};
/* Authentication instances */
@@ -119,7 +119,7 @@
.blocksize = SHA2_224_BLOCK_LEN,
.Init = (void (*)(void *)) SHA224_Init,
.Update = SHA224Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA224_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA224_Final,
};
struct auth_hash auth_hash_hmac_sha2_256 = {
@@ -131,7 +131,7 @@
.blocksize = SHA2_256_BLOCK_LEN,
.Init = (void (*)(void *)) SHA256_Init,
.Update = SHA256Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA256_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA256_Final,
};
struct auth_hash auth_hash_hmac_sha2_384 = {
@@ -143,7 +143,7 @@
.blocksize = SHA2_384_BLOCK_LEN,
.Init = (void (*)(void *)) SHA384_Init,
.Update = SHA384Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA384_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA384_Final,
};
struct auth_hash auth_hash_hmac_sha2_512 = {
@@ -155,7 +155,7 @@
.blocksize = SHA2_512_BLOCK_LEN,
.Init = (void (*)(void *)) SHA512_Init,
.Update = SHA512Update_int,
- .Final = (void (*)(u_int8_t *, void *)) SHA512_Final,
+ .Final = (void (*)(uint8_t *, void *)) SHA512_Final,
};
/*

File Metadata

Mime Type
text/plain
Expires
Sat, Feb 8, 10:51 PM (21 h, 6 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
16534761
Default Alt Text
D27061.diff (34 KB)

Event Timeline