diff options
Diffstat (limited to 'src')
| -rw-r--r-- | src/blowfish.c | 36 | ||||
| -rw-r--r-- | src/fileio.c | 2 | ||||
| -rw-r--r-- | src/sha256.c | 20 | ||||
| -rw-r--r-- | src/sha256.h | 6 | ||||
| -rw-r--r-- | src/undo.c | 2 | ||||
| -rw-r--r-- | src/vim.h | 17 | 
6 files changed, 33 insertions, 50 deletions
| diff --git a/src/blowfish.c b/src/blowfish.c index 354f66ab95..acf01b9a46 100644 --- a/src/blowfish.c +++ b/src/blowfish.c @@ -23,20 +23,20 @@  #define BF_OFB_LEN  (8*(BF_BLOCK))  typedef union { -  UINT32_T ul[2]; +  uint32_t ul[2];    char_u uc[8];  } block8; -static void bf_e_block(UINT32_T *p_xl, UINT32_T *p_xr); +static void bf_e_block(uint32_t *p_xl, uint32_t *p_xr);  static void bf_e_cblock(char_u *block); -static int bf_check_tables(UINT32_T a_ipa[18], UINT32_T a_sbi[4][256], -                           UINT32_T val); +static int bf_check_tables(uint32_t a_ipa[18], uint32_t a_sbi[4][256], +                           uint32_t val);  static int bf_self_test(void);  /* Blowfish code */ -static UINT32_T pax[18]; -static UINT32_T ipa[18] = { +static uint32_t pax[18]; +static uint32_t ipa[18] = {    0x243f6a88u, 0x85a308d3u, 0x13198a2eu,    0x03707344u, 0xa4093822u, 0x299f31d0u,    0x082efa98u, 0xec4e6c89u, 0x452821e6u, @@ -45,8 +45,8 @@ static UINT32_T ipa[18] = {    0xb5470917u, 0x9216d5d9u, 0x8979fb1bu  }; -static UINT32_T sbx[4][256]; -static UINT32_T sbi[4][256] = { +static uint32_t sbx[4][256]; +static uint32_t sbi[4][256] = {    {0xd1310ba6u, 0x98dfb5acu, 0x2ffd72dbu, 0xd01adfb7u,     0xb8e1afedu, 0x6a267e96u, 0xba7c9045u, 0xf12c7f99u,     0x24a19947u, 0xb3916cf7u, 0x0801f2e2u, 0x858efc16u, @@ -321,9 +321,9 @@ static UINT32_T sbi[4][256] = {          sbx[3][xr & 0xFF]; -static void bf_e_block(UINT32_T *p_xl, UINT32_T *p_xr) +static void bf_e_block(uint32_t *p_xl, uint32_t *p_xr)  { -  UINT32_T temp, xl = *p_xl, xr = *p_xr; +  uint32_t temp, xl = *p_xl, xr = *p_xr;    F1(0) F2(1) F1(2) F2(3) F1(4) F2(5) F1(6) F2(7)    F1(8) F2(9) F1(10) F2(11) F1(12) F2(13) F1(14) F2(15) @@ -368,7 +368,7 @@ void bf_key_init(char_u *password, char_u *salt, int salt_len)  {    int i, j, keypos = 0;    unsigned u; -  UINT32_T val, data_l, data_r; +  uint32_t val, data_l, data_r;    char_u   *key;    int keylen; @@ -417,10 +417,10 @@ void bf_key_init(char_u *password, char_u *salt, int salt_len)  /*   * BF Self test for corrupted tables or instructions   */ -static int bf_check_tables(UINT32_T a_ipa[18], UINT32_T a_sbi[4][256], UINT32_T val) +static int bf_check_tables(uint32_t a_ipa[18], uint32_t a_sbi[4][256], uint32_t val)  {    int i, j; -  UINT32_T c = 0; +  uint32_t c = 0;    for (i = 0; i < 18; i++)      c ^= a_ipa[i]; @@ -436,7 +436,7 @@ typedef struct {    char_u plaintxt[9];    char_u cryptxt[9];    char_u badcryptxt[9];     /* cryptxt when big/little endian is wrong */ -  UINT32_T keysum; +  uint32_t keysum;  } struct_bf_test_data;  /* @@ -461,9 +461,9 @@ static int bf_self_test(void)                {    int i, bn;    int err = 0;    block8 bk; -  UINT32_T ui = 0xffffffffUL; +  uint32_t ui = 0xffffffffUL; -  /* We can't simply use sizeof(UINT32_T), it would generate a compiler +  /* We can't simply use sizeof(uint32_t), it would generate a compiler     * warning. */    if (ui != 0xffffffffUL || ui + 1 != 0) {      err++; @@ -580,8 +580,8 @@ bf_crypt_init_keys (  static int save_randbyte_offset;  static int save_update_offset;  static char_u save_ofb_buffer[BF_OFB_LEN]; -static UINT32_T save_pax[18]; -static UINT32_T save_sbx[4][256]; +static uint32_t save_pax[18]; +static uint32_t save_sbx[4][256];  /*   * Save the current crypt state.  Can only be used once before diff --git a/src/fileio.c b/src/fileio.c index 5062924d2d..83efddfd28 100644 --- a/src/fileio.c +++ b/src/fileio.c @@ -3652,7 +3652,7 @@ restore_backup:       */      ptr = ml_get_buf(buf, lnum, FALSE) - 1;      if (write_undo_file) -      sha256_update(&sha_ctx, ptr + 1, (UINT32_T)(STRLEN(ptr + 1) + 1)); +      sha256_update(&sha_ctx, ptr + 1, (uint32_t)(STRLEN(ptr + 1) + 1));      while ((c = *++ptr) != NUL) {        if (c == NL)          *s = NUL;                       /* replace newlines with NULs */ diff --git a/src/sha256.c b/src/sha256.c index 0aaf07d5e5..1a3216fc17 100644 --- a/src/sha256.c +++ b/src/sha256.c @@ -27,10 +27,10 @@ static void sha256_process(context_sha256_T *ctx, char_u data[64]);  #define GET_UINT32(n, b, i)                 \    {                                           \ -    (n) = ( (UINT32_T)(b)[(i)    ] << 24)   \ -          | ( (UINT32_T)(b)[(i) + 1] << 16)   \ -          | ( (UINT32_T)(b)[(i) + 2] <<  8)   \ -          | ( (UINT32_T)(b)[(i) + 3]      );  \ +    (n) = ( (uint32_t)(b)[(i)    ] << 24)   \ +          | ( (uint32_t)(b)[(i) + 1] << 16)   \ +          | ( (uint32_t)(b)[(i) + 2] <<  8)   \ +          | ( (uint32_t)(b)[(i) + 3]      );  \    }  #define PUT_UINT32(n,b,i)                 \ @@ -58,8 +58,8 @@ void sha256_start(context_sha256_T *ctx)  static void sha256_process(context_sha256_T *ctx, char_u data[64])  { -  UINT32_T temp1, temp2, W[64]; -  UINT32_T A, B, C, D, E, F, G, H; +  uint32_t temp1, temp2, W[64]; +  uint32_t A, B, C, D, E, F, G, H;    GET_UINT32(W[0],  data,  0);    GET_UINT32(W[1],  data,  4); @@ -187,9 +187,9 @@ static void sha256_process(context_sha256_T *ctx, char_u data[64])    ctx->state[7] += H;  } -void sha256_update(context_sha256_T *ctx, char_u *input, UINT32_T length) +void sha256_update(context_sha256_T *ctx, char_u *input, uint32_t length)  { -  UINT32_T left, fill; +  uint32_t left, fill;    if (length == 0)      return; @@ -230,8 +230,8 @@ static char_u sha256_padding[64] = {  void sha256_finish(context_sha256_T *ctx, char_u digest[32])  { -  UINT32_T last, padn; -  UINT32_T high, low; +  uint32_t last, padn; +  uint32_t high, low;    char_u msglen[8];    high = (ctx->total[0] >> 29) | (ctx->total[1] <<  3); diff --git a/src/sha256.h b/src/sha256.h index c7c93672d9..5501e468d1 100644 --- a/src/sha256.h +++ b/src/sha256.h @@ -2,14 +2,14 @@  #define NEOVIM_SHA256_H  typedef struct { -  UINT32_T total[2]; -  UINT32_T state[8]; +  uint32_t total[2]; +  uint32_t state[8];    char_u buffer[64];  } context_sha256_T;  void sha256_start(context_sha256_T *ctx);  void sha256_update(context_sha256_T *ctx, char_u *input, -                   UINT32_T length); +                   uint32_t length);  void sha256_finish(context_sha256_T *ctx, char_u digest[32]);  char_u *sha256_bytes(char_u *buf, int buf_len, char_u *salt,                       int salt_len); diff --git a/src/undo.c b/src/undo.c index 62984b5c76..d1c3cc92ed 100644 --- a/src/undo.c +++ b/src/undo.c @@ -666,7 +666,7 @@ void u_compute_hash(char_u *hash)    sha256_start(&ctx);    for (lnum = 1; lnum <= curbuf->b_ml.ml_line_count; ++lnum) {      p = ml_get(lnum); -    sha256_update(&ctx, p, (UINT32_T)(STRLEN(p) + 1)); +    sha256_update(&ctx, p, (uint32_t)(STRLEN(p) + 1));    }    sha256_finish(&ctx, hash);  } @@ -41,19 +41,6 @@ Error: configure did not run properly.Check auto/config.log.   * doesn't work well and avoiding it keeps the binary backward compatible.   */ -/* We may need to define the uint32_t on non-Unix system, but using the same - * identifier causes conflicts.  Therefore use UINT32_T. */ -# define UINT32_TYPEDEF uint32_t -#endif - -#if !defined(UINT32_TYPEDEF) -# if defined(uint32_t)  /* this doesn't catch typedefs, unfortunately */ -#  define UINT32_TYPEDEF uint32_t -# else -/* Fall back to assuming unsigned int is 32 bit.  If this is wrong then the - * test in blowfish.c will fail. */ -#  define UINT32_TYPEDEF unsigned int -# endif  #endif  /* user ID of root is usually zero, but not for everybody */ @@ -937,10 +924,6 @@ typedef enum {  #define MAYBE   2           /* sometimes used for a variant on TRUE */ -#ifndef UINT32_T -typedef UINT32_TYPEDEF UINT32_T; -#endif -  /*   * Operator IDs; The order must correspond to opchars[] in ops.c!   */ | 
