diff options
Diffstat (limited to 'recipes-kernel/cryptodev/sdk_patches/0063-avoid-implicit-conversion-between-signed-and-unsigne.patch')
| -rw-r--r-- | recipes-kernel/cryptodev/sdk_patches/0063-avoid-implicit-conversion-between-signed-and-unsigne.patch | 698 |
1 files changed, 698 insertions, 0 deletions
diff --git a/recipes-kernel/cryptodev/sdk_patches/0063-avoid-implicit-conversion-between-signed-and-unsigne.patch b/recipes-kernel/cryptodev/sdk_patches/0063-avoid-implicit-conversion-between-signed-and-unsigne.patch new file mode 100644 index 000000000..133d46c10 --- /dev/null +++ b/recipes-kernel/cryptodev/sdk_patches/0063-avoid-implicit-conversion-between-signed-and-unsigne.patch | |||
| @@ -0,0 +1,698 @@ | |||
| 1 | From 5f3a9153f7685f6dde29f7cd2d58534126c5b9af Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Cristian Stoica <cristian.stoica@nxp.com> | ||
| 3 | Date: Wed, 26 Oct 2016 10:45:40 +0300 | ||
| 4 | Subject: [PATCH 063/104] avoid implicit conversion between signed and unsigned | ||
| 5 | char | ||
| 6 | |||
| 7 | Signed-off-by: Cristian Stoica <cristian.stoica@nxp.com> | ||
| 8 | --- | ||
| 9 | tests/async_cipher.c | 36 ++++++++++++++-------------- | ||
| 10 | tests/async_hmac.c | 8 +++---- | ||
| 11 | tests/async_speed.c | 2 +- | ||
| 12 | tests/cipher-aead-srtp.c | 50 +++++++++++++++++++------------------- | ||
| 13 | tests/cipher-aead.c | 48 ++++++++++++++++++------------------- | ||
| 14 | tests/cipher-gcm.c | 62 ++++++++++++++++++++++++------------------------ | ||
| 15 | tests/cipher.c | 35 ++++++++++++++------------- | ||
| 16 | tests/cipher_comp.c | 12 +++++----- | ||
| 17 | tests/fullspeed.c | 3 ++- | ||
| 18 | tests/hash_comp.c | 8 +++---- | ||
| 19 | tests/hmac.c | 8 +++---- | ||
| 20 | tests/speed.c | 3 ++- | ||
| 21 | 12 files changed, 138 insertions(+), 137 deletions(-) | ||
| 22 | |||
| 23 | diff --git a/tests/async_cipher.c b/tests/async_cipher.c | ||
| 24 | index 162a695..dd08403 100644 | ||
| 25 | --- a/tests/async_cipher.c | ||
| 26 | +++ b/tests/async_cipher.c | ||
| 27 | @@ -9,7 +9,7 @@ | ||
| 28 | #include <string.h> | ||
| 29 | #include <unistd.h> | ||
| 30 | #include <fcntl.h> | ||
| 31 | - | ||
| 32 | +#include <stdint.h> | ||
| 33 | #include <sys/ioctl.h> | ||
| 34 | #include <crypto/cryptodev.h> | ||
| 35 | |||
| 36 | @@ -26,10 +26,10 @@ static int debug = 0; | ||
| 37 | static int | ||
| 38 | test_crypto(int cfd) | ||
| 39 | { | ||
| 40 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 41 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 42 | - char iv[BLOCK_SIZE]; | ||
| 43 | - char key[KEY_SIZE]; | ||
| 44 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 45 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 46 | + uint8_t iv[BLOCK_SIZE]; | ||
| 47 | + uint8_t key[KEY_SIZE]; | ||
| 48 | |||
| 49 | struct session_op sess; | ||
| 50 | #ifdef CIOCGSESSINFO | ||
| 51 | @@ -62,8 +62,8 @@ test_crypto(int cfd) | ||
| 52 | perror("ioctl(CIOCGSESSINFO)"); | ||
| 53 | return 1; | ||
| 54 | } | ||
| 55 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 56 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 57 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 58 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 59 | #else | ||
| 60 | plaintext = plaintext_raw; | ||
| 61 | ciphertext = ciphertext_raw; | ||
| 62 | @@ -127,15 +127,15 @@ test_crypto(int cfd) | ||
| 63 | |||
| 64 | static int test_aes(int cfd) | ||
| 65 | { | ||
| 66 | - char plaintext1_raw[BLOCK_SIZE + 63], *plaintext1; | ||
| 67 | - char ciphertext1[BLOCK_SIZE] = { 0xdf, 0x55, 0x6a, 0x33, 0x43, 0x8d, 0xb8, 0x7b, 0xc4, 0x1b, 0x17, 0x52, 0xc5, 0x5e, 0x5e, 0x49 }; | ||
| 68 | - char iv1[BLOCK_SIZE]; | ||
| 69 | - char key1[KEY_SIZE] = { 0xff, 0xff, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; | ||
| 70 | - char plaintext2_data[BLOCK_SIZE] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc0, 0x00 }; | ||
| 71 | - char plaintext2_raw[BLOCK_SIZE + 63], *plaintext2; | ||
| 72 | - char ciphertext2[BLOCK_SIZE] = { 0xb7, 0x97, 0x2b, 0x39, 0x41, 0xc4, 0x4b, 0x90, 0xaf, 0xa7, 0xb2, 0x64, 0xbf, 0xba, 0x73, 0x87 }; | ||
| 73 | - char iv2[BLOCK_SIZE]; | ||
| 74 | - char key2[KEY_SIZE]; | ||
| 75 | + uint8_t plaintext1_raw[BLOCK_SIZE + 63], *plaintext1; | ||
| 76 | + uint8_t ciphertext1[BLOCK_SIZE] = { 0xdf, 0x55, 0x6a, 0x33, 0x43, 0x8d, 0xb8, 0x7b, 0xc4, 0x1b, 0x17, 0x52, 0xc5, 0x5e, 0x5e, 0x49 }; | ||
| 77 | + uint8_t iv1[BLOCK_SIZE]; | ||
| 78 | + uint8_t key1[KEY_SIZE] = { 0xff, 0xff, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; | ||
| 79 | + uint8_t plaintext2_data[BLOCK_SIZE] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc0, 0x00 }; | ||
| 80 | + uint8_t plaintext2_raw[BLOCK_SIZE + 63], *plaintext2; | ||
| 81 | + uint8_t ciphertext2[BLOCK_SIZE] = { 0xb7, 0x97, 0x2b, 0x39, 0x41, 0xc4, 0x4b, 0x90, 0xaf, 0xa7, 0xb2, 0x64, 0xbf, 0xba, 0x73, 0x87 }; | ||
| 82 | + uint8_t iv2[BLOCK_SIZE]; | ||
| 83 | + uint8_t key2[KEY_SIZE]; | ||
| 84 | |||
| 85 | struct session_op sess1, sess2; | ||
| 86 | #ifdef CIOCGSESSINFO | ||
| 87 | @@ -162,7 +162,7 @@ static int test_aes(int cfd) | ||
| 88 | perror("ioctl(CIOCGSESSINFO)"); | ||
| 89 | return 1; | ||
| 90 | } | ||
| 91 | - plaintext1 = (char *)(((unsigned long)plaintext1_raw + siop1.alignmask) & ~siop1.alignmask); | ||
| 92 | + plaintext1 = (uint8_t *)(((unsigned long)plaintext1_raw + siop1.alignmask) & ~siop1.alignmask); | ||
| 93 | #else | ||
| 94 | plaintext1 = plaintext1_raw; | ||
| 95 | #endif | ||
| 96 | @@ -185,7 +185,7 @@ static int test_aes(int cfd) | ||
| 97 | perror("ioctl(CIOCGSESSINFO)"); | ||
| 98 | return 1; | ||
| 99 | } | ||
| 100 | - plaintext2 = (char *)(((unsigned long)plaintext2_raw + siop2.alignmask) & ~siop2.alignmask); | ||
| 101 | + plaintext2 = (uint8_t *)(((unsigned long)plaintext2_raw + siop2.alignmask) & ~siop2.alignmask); | ||
| 102 | #else | ||
| 103 | plaintext2 = plaintext2_raw; | ||
| 104 | #endif | ||
| 105 | diff --git a/tests/async_hmac.c b/tests/async_hmac.c | ||
| 106 | index 97fd0c5..94a02c0 100644 | ||
| 107 | --- a/tests/async_hmac.c | ||
| 108 | +++ b/tests/async_hmac.c | ||
| 109 | @@ -61,7 +61,7 @@ test_crypto(int cfd) | ||
| 110 | |||
| 111 | cryp.ses = sess.ses; | ||
| 112 | cryp.len = sizeof("what do ya want for nothing?")-1; | ||
| 113 | - cryp.src = "what do ya want for nothing?"; | ||
| 114 | + cryp.src = (uint8_t*)"what do ya want for nothing?"; | ||
| 115 | cryp.mac = mac; | ||
| 116 | cryp.op = COP_ENCRYPT; | ||
| 117 | |||
| 118 | @@ -98,7 +98,7 @@ test_crypto(int cfd) | ||
| 119 | |||
| 120 | cryp.ses = sess.ses; | ||
| 121 | cryp.len = sizeof("what do ya want for nothing?")-1; | ||
| 122 | - cryp.src = "what do ya want for nothing?"; | ||
| 123 | + cryp.src = (uint8_t*)"what do ya want for nothing?"; | ||
| 124 | cryp.mac = mac; | ||
| 125 | cryp.op = COP_ENCRYPT; | ||
| 126 | |||
| 127 | @@ -208,7 +208,7 @@ test_extras(int cfd) | ||
| 128 | |||
| 129 | cryp.ses = sess.ses; | ||
| 130 | cryp.len = sizeof("what do")-1; | ||
| 131 | - cryp.src = "what do"; | ||
| 132 | + cryp.src = (uint8_t*)"what do"; | ||
| 133 | cryp.mac = mac; | ||
| 134 | cryp.op = COP_ENCRYPT; | ||
| 135 | cryp.flags = COP_FLAG_UPDATE; | ||
| 136 | @@ -218,7 +218,7 @@ test_extras(int cfd) | ||
| 137 | |||
| 138 | cryp.ses = sess.ses; | ||
| 139 | cryp.len = sizeof(" ya want for nothing?")-1; | ||
| 140 | - cryp.src = " ya want for nothing?"; | ||
| 141 | + cryp.src = (uint8_t*)" ya want for nothing?"; | ||
| 142 | cryp.mac = mac; | ||
| 143 | cryp.op = COP_ENCRYPT; | ||
| 144 | cryp.flags = COP_FLAG_FINAL; | ||
| 145 | diff --git a/tests/async_speed.c b/tests/async_speed.c | ||
| 146 | index a1a1b7e..dabbbc1 100644 | ||
| 147 | --- a/tests/async_speed.c | ||
| 148 | +++ b/tests/async_speed.c | ||
| 149 | @@ -140,7 +140,7 @@ int encrypt_data(int fdc, struct test_params tp, struct session_op *sess) | ||
| 150 | { | ||
| 151 | struct crypt_op cop; | ||
| 152 | char *buffer[64], iv[32]; | ||
| 153 | - char mac[64][HASH_MAX_LEN]; | ||
| 154 | + uint8_t mac[64][HASH_MAX_LEN]; | ||
| 155 | static int val = 23; | ||
| 156 | struct timeval start, end; | ||
| 157 | uint64_t total = 0; | ||
| 158 | diff --git a/tests/cipher-aead-srtp.c b/tests/cipher-aead-srtp.c | ||
| 159 | index fae04e7..c44877d 100644 | ||
| 160 | --- a/tests/cipher-aead-srtp.c | ||
| 161 | +++ b/tests/cipher-aead-srtp.c | ||
| 162 | @@ -77,13 +77,13 @@ int i; | ||
| 163 | static int | ||
| 164 | test_crypto(int cfd) | ||
| 165 | { | ||
| 166 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 167 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 168 | - char iv[BLOCK_SIZE]; | ||
| 169 | - char key[KEY_SIZE]; | ||
| 170 | - unsigned char sha1mac[20]; | ||
| 171 | - unsigned char tag[20]; | ||
| 172 | - unsigned char mackey[] = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"; | ||
| 173 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 174 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 175 | + uint8_t iv[BLOCK_SIZE]; | ||
| 176 | + uint8_t key[KEY_SIZE]; | ||
| 177 | + uint8_t sha1mac[20]; | ||
| 178 | + uint8_t tag[20]; | ||
| 179 | + uint8_t mackey[] = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"; | ||
| 180 | int mackey_len = 16; | ||
| 181 | |||
| 182 | struct session_op sess; | ||
| 183 | @@ -122,8 +122,8 @@ test_crypto(int cfd) | ||
| 184 | printf("requested cipher CRYPTO_AES_CBC/HMAC-SHA1, got %s with driver %s\n", | ||
| 185 | siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 186 | |||
| 187 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 188 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 189 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 190 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 191 | |||
| 192 | memset(plaintext, 0x15, HEADER_SIZE); /* header */ | ||
| 193 | memset(&plaintext[HEADER_SIZE], 0x17, PLAINTEXT_SIZE); /* payload */ | ||
| 194 | @@ -225,12 +225,12 @@ test_crypto(int cfd) | ||
| 195 | static int | ||
| 196 | test_encrypt_decrypt(int cfd) | ||
| 197 | { | ||
| 198 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 199 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 200 | - char iv[BLOCK_SIZE]; | ||
| 201 | - char key[KEY_SIZE]; | ||
| 202 | - unsigned char tag[20]; | ||
| 203 | - unsigned char mackey[] = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"; | ||
| 204 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 205 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 206 | + uint8_t iv[BLOCK_SIZE]; | ||
| 207 | + uint8_t key[KEY_SIZE]; | ||
| 208 | + uint8_t tag[20]; | ||
| 209 | + uint8_t mackey[] = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"; | ||
| 210 | int mackey_len = 16; | ||
| 211 | |||
| 212 | struct session_op sess; | ||
| 213 | @@ -265,8 +265,8 @@ test_encrypt_decrypt(int cfd) | ||
| 214 | // printf("requested cipher CRYPTO_AES_CBC/HMAC-SHA1, got %s with driver %s\n", | ||
| 215 | // siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 216 | |||
| 217 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 218 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 219 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 220 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 221 | |||
| 222 | memset(plaintext, 0x15, HEADER_SIZE); /* header */ | ||
| 223 | memset(&plaintext[HEADER_SIZE], 0x17, PLAINTEXT_SIZE); /* payload */ | ||
| 224 | @@ -367,12 +367,12 @@ test_encrypt_decrypt(int cfd) | ||
| 225 | static int | ||
| 226 | test_encrypt_decrypt_error(int cfd, int err) | ||
| 227 | { | ||
| 228 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 229 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 230 | - char iv[BLOCK_SIZE]; | ||
| 231 | - char key[KEY_SIZE]; | ||
| 232 | - unsigned char tag[20]; | ||
| 233 | - unsigned char mackey[] = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"; | ||
| 234 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 235 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 236 | + uint8_t iv[BLOCK_SIZE]; | ||
| 237 | + uint8_t key[KEY_SIZE]; | ||
| 238 | + uint8_t tag[20]; | ||
| 239 | + uint8_t mackey[] = "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"; | ||
| 240 | int mackey_len = 16; | ||
| 241 | |||
| 242 | struct session_op sess; | ||
| 243 | @@ -407,8 +407,8 @@ test_encrypt_decrypt_error(int cfd, int err) | ||
| 244 | // printf("requested cipher CRYPTO_AES_CBC/HMAC-SHA1, got %s with driver %s\n", | ||
| 245 | // siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 246 | |||
| 247 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 248 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 249 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 250 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 251 | |||
| 252 | memset(plaintext, 0x15, HEADER_SIZE); /* header */ | ||
| 253 | memset(&plaintext[HEADER_SIZE], 0x17, PLAINTEXT_SIZE); /* payload */ | ||
| 254 | diff --git a/tests/cipher-aead.c b/tests/cipher-aead.c | ||
| 255 | index 164327f..da43aa6 100644 | ||
| 256 | --- a/tests/cipher-aead.c | ||
| 257 | +++ b/tests/cipher-aead.c | ||
| 258 | @@ -89,12 +89,12 @@ int i; | ||
| 259 | static int | ||
| 260 | test_crypto(int cfd) | ||
| 261 | { | ||
| 262 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 263 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 264 | - char iv[BLOCK_SIZE]; | ||
| 265 | - char key[KEY_SIZE]; | ||
| 266 | - char auth[AUTH_SIZE]; | ||
| 267 | - unsigned char sha1mac[20]; | ||
| 268 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 269 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 270 | + uint8_t iv[BLOCK_SIZE]; | ||
| 271 | + uint8_t key[KEY_SIZE]; | ||
| 272 | + uint8_t auth[AUTH_SIZE]; | ||
| 273 | + uint8_t sha1mac[20]; | ||
| 274 | int pad, i; | ||
| 275 | |||
| 276 | struct session_op sess; | ||
| 277 | @@ -133,8 +133,8 @@ test_crypto(int cfd) | ||
| 278 | printf("requested cipher CRYPTO_AES_CBC/HMAC-SHA1, got %s with driver %s\n", | ||
| 279 | siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 280 | |||
| 281 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 282 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 283 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 284 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 285 | memset(plaintext, 0x15, DATA_SIZE); | ||
| 286 | |||
| 287 | if (get_sha1_hmac(cfd, sess.mackey, sess.mackeylen, auth, sizeof(auth), plaintext, DATA_SIZE, sha1mac) != 0) { | ||
| 288 | @@ -242,12 +242,12 @@ test_crypto(int cfd) | ||
| 289 | static int | ||
| 290 | test_encrypt_decrypt(int cfd) | ||
| 291 | { | ||
| 292 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 293 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 294 | - char iv[BLOCK_SIZE]; | ||
| 295 | - char key[KEY_SIZE]; | ||
| 296 | - char auth[AUTH_SIZE]; | ||
| 297 | - unsigned char sha1mac[20]; | ||
| 298 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 299 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 300 | + uint8_t iv[BLOCK_SIZE]; | ||
| 301 | + uint8_t key[KEY_SIZE]; | ||
| 302 | + uint8_t auth[AUTH_SIZE]; | ||
| 303 | + uint8_t sha1mac[20]; | ||
| 304 | int enc_len; | ||
| 305 | |||
| 306 | struct session_op sess; | ||
| 307 | @@ -285,8 +285,8 @@ test_encrypt_decrypt(int cfd) | ||
| 308 | // printf("requested cipher CRYPTO_AES_CBC/HMAC-SHA1, got %s with driver %s\n", | ||
| 309 | // siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 310 | |||
| 311 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 312 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 313 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 314 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 315 | |||
| 316 | memset(plaintext, 0x15, DATA_SIZE); | ||
| 317 | |||
| 318 | @@ -391,12 +391,12 @@ test_encrypt_decrypt(int cfd) | ||
| 319 | static int | ||
| 320 | test_encrypt_decrypt_error(int cfd, int err) | ||
| 321 | { | ||
| 322 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 323 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 324 | - char iv[BLOCK_SIZE]; | ||
| 325 | - char key[KEY_SIZE]; | ||
| 326 | - char auth[AUTH_SIZE]; | ||
| 327 | - unsigned char sha1mac[20]; | ||
| 328 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 329 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 330 | + uint8_t iv[BLOCK_SIZE]; | ||
| 331 | + uint8_t key[KEY_SIZE]; | ||
| 332 | + uint8_t auth[AUTH_SIZE]; | ||
| 333 | + uint8_t sha1mac[20]; | ||
| 334 | int enc_len; | ||
| 335 | |||
| 336 | struct session_op sess; | ||
| 337 | @@ -434,8 +434,8 @@ test_encrypt_decrypt_error(int cfd, int err) | ||
| 338 | // printf("requested cipher CRYPTO_AES_CBC/HMAC-SHA1, got %s with driver %s\n", | ||
| 339 | // siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 340 | |||
| 341 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 342 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 343 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 344 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 345 | memset(plaintext, 0x15, DATA_SIZE); | ||
| 346 | |||
| 347 | if (get_sha1_hmac(cfd, sess.mackey, sess.mackeylen, auth, sizeof(auth), plaintext, DATA_SIZE, sha1mac) != 0) { | ||
| 348 | diff --git a/tests/cipher-gcm.c b/tests/cipher-gcm.c | ||
| 349 | index dfc3d84..3f6cc7b 100644 | ||
| 350 | --- a/tests/cipher-gcm.c | ||
| 351 | +++ b/tests/cipher-gcm.c | ||
| 352 | @@ -45,45 +45,45 @@ struct aes_gcm_vectors_st { | ||
| 353 | |||
| 354 | struct aes_gcm_vectors_st aes_gcm_vectors[] = { | ||
| 355 | { | ||
| 356 | - .key = | ||
| 357 | + .key = (uint8_t*) | ||
| 358 | "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", | ||
| 359 | .auth = NULL, | ||
| 360 | .auth_size = 0, | ||
| 361 | - .plaintext = | ||
| 362 | + .plaintext = (uint8_t*) | ||
| 363 | "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", | ||
| 364 | .plaintext_size = 16, | ||
| 365 | - .ciphertext = | ||
| 366 | + .ciphertext = (uint8_t*) | ||
| 367 | "\x03\x88\xda\xce\x60\xb6\xa3\x92\xf3\x28\xc2\xb9\x71\xb2\xfe\x78", | ||
| 368 | - .iv = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", | ||
| 369 | - .tag = | ||
| 370 | + .iv = (uint8_t*)"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", | ||
| 371 | + .tag = (uint8_t*) | ||
| 372 | "\xab\x6e\x47\xd4\x2c\xec\x13\xbd\xf5\x3a\x67\xb2\x12\x57\xbd\xdf" | ||
| 373 | }, | ||
| 374 | { | ||
| 375 | - .key = | ||
| 376 | + .key = (uint8_t*) | ||
| 377 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", | ||
| 378 | .auth = NULL, | ||
| 379 | .auth_size = 0, | ||
| 380 | - .plaintext = | ||
| 381 | + .plaintext = (uint8_t*) | ||
| 382 | "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55", | ||
| 383 | .plaintext_size = 64, | ||
| 384 | - .ciphertext = | ||
| 385 | + .ciphertext = (uint8_t*) | ||
| 386 | "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91\x47\x3f\x59\x85", | ||
| 387 | - .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", | ||
| 388 | - .tag = "\x4d\x5c\x2a\xf3\x27\xcd\x64\xa6\x2c\xf3\x5a\xbd\x2b\xa6\xfa\xb4" | ||
| 389 | + .iv = (uint8_t*)"\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", | ||
| 390 | + .tag = (uint8_t*)"\x4d\x5c\x2a\xf3\x27\xcd\x64\xa6\x2c\xf3\x5a\xbd\x2b\xa6\xfa\xb4" | ||
| 391 | }, | ||
| 392 | { | ||
| 393 | - .key = | ||
| 394 | + .key = (uint8_t*) | ||
| 395 | "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", | ||
| 396 | - .auth = | ||
| 397 | + .auth = (uint8_t*) | ||
| 398 | "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef\xab\xad\xda\xd2", | ||
| 399 | .auth_size = 20, | ||
| 400 | - .plaintext = | ||
| 401 | + .plaintext = (uint8_t*) | ||
| 402 | "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39", | ||
| 403 | .plaintext_size = 60, | ||
| 404 | - .ciphertext = | ||
| 405 | + .ciphertext = (uint8_t*) | ||
| 406 | "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91", | ||
| 407 | - .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", | ||
| 408 | - .tag = | ||
| 409 | + .iv = (uint8_t*)"\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", | ||
| 410 | + .tag = (uint8_t*) | ||
| 411 | "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb\x94\xfa\xe9\x5a\xe7\x12\x1a\x47" | ||
| 412 | } | ||
| 413 | }; | ||
| 414 | @@ -94,7 +94,7 @@ struct aes_gcm_vectors_st aes_gcm_vectors[] = { | ||
| 415 | static int test_crypto(int cfd) | ||
| 416 | { | ||
| 417 | int i; | ||
| 418 | - int8_t tmp[128]; | ||
| 419 | + uint8_t tmp[128]; | ||
| 420 | |||
| 421 | struct session_op sess; | ||
| 422 | struct crypt_auth_op cao; | ||
| 423 | @@ -191,11 +191,11 @@ static int test_crypto(int cfd) | ||
| 424 | */ | ||
| 425 | static int test_encrypt_decrypt(int cfd) | ||
| 426 | { | ||
| 427 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 428 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 429 | - char iv[BLOCK_SIZE]; | ||
| 430 | - char key[KEY_SIZE]; | ||
| 431 | - char auth[AUTH_SIZE]; | ||
| 432 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 433 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 434 | + uint8_t iv[BLOCK_SIZE]; | ||
| 435 | + uint8_t key[KEY_SIZE]; | ||
| 436 | + uint8_t auth[AUTH_SIZE]; | ||
| 437 | int enc_len; | ||
| 438 | |||
| 439 | struct session_op sess; | ||
| 440 | @@ -233,10 +233,10 @@ static int test_encrypt_decrypt(int cfd) | ||
| 441 | // siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 442 | |||
| 443 | plaintext = | ||
| 444 | - (char *) (((unsigned long) plaintext_raw + siop.alignmask) & | ||
| 445 | + (uint8_t *) (((unsigned long) plaintext_raw + siop.alignmask) & | ||
| 446 | ~siop.alignmask); | ||
| 447 | ciphertext = | ||
| 448 | - (char *) (((unsigned long) ciphertext_raw + siop.alignmask) & | ||
| 449 | + (uint8_t *) (((unsigned long) ciphertext_raw + siop.alignmask) & | ||
| 450 | ~siop.alignmask); | ||
| 451 | |||
| 452 | memset(plaintext, 0x15, DATA_SIZE); | ||
| 453 | @@ -336,11 +336,11 @@ static int test_encrypt_decrypt(int cfd) | ||
| 454 | |||
| 455 | static int test_encrypt_decrypt_error(int cfd, int err) | ||
| 456 | { | ||
| 457 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 458 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 459 | - char iv[BLOCK_SIZE]; | ||
| 460 | - char key[KEY_SIZE]; | ||
| 461 | - char auth[AUTH_SIZE]; | ||
| 462 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 463 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 464 | + uint8_t iv[BLOCK_SIZE]; | ||
| 465 | + uint8_t key[KEY_SIZE]; | ||
| 466 | + uint8_t auth[AUTH_SIZE]; | ||
| 467 | int enc_len; | ||
| 468 | |||
| 469 | struct session_op sess; | ||
| 470 | @@ -386,10 +386,10 @@ static int test_encrypt_decrypt_error(int cfd, int err) | ||
| 471 | // siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 472 | |||
| 473 | plaintext = | ||
| 474 | - (char *) (((unsigned long) plaintext_raw + siop.alignmask) & | ||
| 475 | + (uint8_t *) (((unsigned long) plaintext_raw + siop.alignmask) & | ||
| 476 | ~siop.alignmask); | ||
| 477 | ciphertext = | ||
| 478 | - (char *) (((unsigned long) ciphertext_raw + siop.alignmask) & | ||
| 479 | + (uint8_t *) (((unsigned long) ciphertext_raw + siop.alignmask) & | ||
| 480 | ~siop.alignmask); | ||
| 481 | |||
| 482 | memset(plaintext, 0x15, DATA_SIZE); | ||
| 483 | diff --git a/tests/cipher.c b/tests/cipher.c | ||
| 484 | index 07144f2..f3ca2f0 100644 | ||
| 485 | --- a/tests/cipher.c | ||
| 486 | +++ b/tests/cipher.c | ||
| 487 | @@ -8,6 +8,7 @@ | ||
| 488 | #include <string.h> | ||
| 489 | #include <unistd.h> | ||
| 490 | #include <fcntl.h> | ||
| 491 | +#include <stdint.h> | ||
| 492 | |||
| 493 | #include <sys/ioctl.h> | ||
| 494 | #include <crypto/cryptodev.h> | ||
| 495 | @@ -21,10 +22,10 @@ static int debug = 0; | ||
| 496 | static int | ||
| 497 | test_crypto(int cfd) | ||
| 498 | { | ||
| 499 | - char plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 500 | - char ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 501 | - char iv[BLOCK_SIZE]; | ||
| 502 | - char key[KEY_SIZE]; | ||
| 503 | + uint8_t plaintext_raw[DATA_SIZE + 63], *plaintext; | ||
| 504 | + uint8_t ciphertext_raw[DATA_SIZE + 63], *ciphertext; | ||
| 505 | + uint8_t iv[BLOCK_SIZE]; | ||
| 506 | + uint8_t key[KEY_SIZE]; | ||
| 507 | |||
| 508 | struct session_op sess; | ||
| 509 | #ifdef CIOCGSESSINFO | ||
| 510 | @@ -57,8 +58,8 @@ test_crypto(int cfd) | ||
| 511 | printf("requested cipher CRYPTO_AES_CBC, got %s with driver %s\n", | ||
| 512 | siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 513 | |||
| 514 | - plaintext = (char *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 515 | - ciphertext = (char *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 516 | + plaintext = (uint8_t *)(((unsigned long)plaintext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 517 | + ciphertext = (uint8_t *)(((unsigned long)ciphertext_raw + siop.alignmask) & ~siop.alignmask); | ||
| 518 | #else | ||
| 519 | plaintext = plaintext_raw; | ||
| 520 | ciphertext = ciphertext_raw; | ||
| 521 | @@ -143,15 +144,15 @@ test_crypto(int cfd) | ||
| 522 | |||
| 523 | static int test_aes(int cfd) | ||
| 524 | { | ||
| 525 | - char plaintext1_raw[BLOCK_SIZE + 63], *plaintext1; | ||
| 526 | - char ciphertext1[BLOCK_SIZE] = { 0xdf, 0x55, 0x6a, 0x33, 0x43, 0x8d, 0xb8, 0x7b, 0xc4, 0x1b, 0x17, 0x52, 0xc5, 0x5e, 0x5e, 0x49 }; | ||
| 527 | - char iv1[BLOCK_SIZE]; | ||
| 528 | - char key1[KEY_SIZE] = { 0xff, 0xff, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; | ||
| 529 | - char plaintext2_data[BLOCK_SIZE] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc0, 0x00 }; | ||
| 530 | - char plaintext2_raw[BLOCK_SIZE + 63], *plaintext2; | ||
| 531 | - char ciphertext2[BLOCK_SIZE] = { 0xb7, 0x97, 0x2b, 0x39, 0x41, 0xc4, 0x4b, 0x90, 0xaf, 0xa7, 0xb2, 0x64, 0xbf, 0xba, 0x73, 0x87 }; | ||
| 532 | - char iv2[BLOCK_SIZE]; | ||
| 533 | - char key2[KEY_SIZE]; | ||
| 534 | + uint8_t plaintext1_raw[BLOCK_SIZE + 63], *plaintext1; | ||
| 535 | + uint8_t ciphertext1[BLOCK_SIZE] = { 0xdf, 0x55, 0x6a, 0x33, 0x43, 0x8d, 0xb8, 0x7b, 0xc4, 0x1b, 0x17, 0x52, 0xc5, 0x5e, 0x5e, 0x49 }; | ||
| 536 | + uint8_t iv1[BLOCK_SIZE]; | ||
| 537 | + uint8_t key1[KEY_SIZE] = { 0xff, 0xff, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; | ||
| 538 | + uint8_t plaintext2_data[BLOCK_SIZE] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc0, 0x00 }; | ||
| 539 | + uint8_t plaintext2_raw[BLOCK_SIZE + 63], *plaintext2; | ||
| 540 | + uint8_t ciphertext2[BLOCK_SIZE] = { 0xb7, 0x97, 0x2b, 0x39, 0x41, 0xc4, 0x4b, 0x90, 0xaf, 0xa7, 0xb2, 0x64, 0xbf, 0xba, 0x73, 0x87 }; | ||
| 541 | + uint8_t iv2[BLOCK_SIZE]; | ||
| 542 | + uint8_t key2[KEY_SIZE]; | ||
| 543 | |||
| 544 | struct session_op sess; | ||
| 545 | #ifdef CIOCGSESSINFO | ||
| 546 | @@ -176,7 +177,7 @@ static int test_aes(int cfd) | ||
| 547 | perror("ioctl(CIOCGSESSINFO)"); | ||
| 548 | return 1; | ||
| 549 | } | ||
| 550 | - plaintext1 = (char *)(((unsigned long)plaintext1_raw + siop.alignmask) & ~siop.alignmask); | ||
| 551 | + plaintext1 = (uint8_t *)(((unsigned long)plaintext1_raw + siop.alignmask) & ~siop.alignmask); | ||
| 552 | #else | ||
| 553 | plaintext1 = plaintext1_raw; | ||
| 554 | #endif | ||
| 555 | @@ -226,7 +227,7 @@ static int test_aes(int cfd) | ||
| 556 | printf("requested cipher CRYPTO_AES_CBC, got %s with driver %s\n", | ||
| 557 | siop.cipher_info.cra_name, siop.cipher_info.cra_driver_name); | ||
| 558 | |||
| 559 | - plaintext2 = (char *)(((unsigned long)plaintext2_raw + siop.alignmask) & ~siop.alignmask); | ||
| 560 | + plaintext2 = (uint8_t *)(((unsigned long)plaintext2_raw + siop.alignmask) & ~siop.alignmask); | ||
| 561 | #else | ||
| 562 | plaintext2 = plaintext2_raw; | ||
| 563 | #endif | ||
| 564 | diff --git a/tests/cipher_comp.c b/tests/cipher_comp.c | ||
| 565 | index b2bc5af..03f67bf 100644 | ||
| 566 | --- a/tests/cipher_comp.c | ||
| 567 | +++ b/tests/cipher_comp.c | ||
| 568 | @@ -24,12 +24,12 @@ | ||
| 569 | static int | ||
| 570 | test_crypto(int cfd, struct session_op *sess, int datalen) | ||
| 571 | { | ||
| 572 | - char *data, *encrypted; | ||
| 573 | - char *encrypted_comp; | ||
| 574 | + uint8_t *data, *encrypted; | ||
| 575 | + uint8_t *encrypted_comp; | ||
| 576 | |||
| 577 | - char iv_in[BLOCK_SIZE]; | ||
| 578 | - char iv[BLOCK_SIZE]; | ||
| 579 | - char iv_comp[BLOCK_SIZE]; | ||
| 580 | + uint8_t iv_in[BLOCK_SIZE]; | ||
| 581 | + uint8_t iv[BLOCK_SIZE]; | ||
| 582 | + uint8_t iv_comp[BLOCK_SIZE]; | ||
| 583 | |||
| 584 | struct crypt_op cryp; | ||
| 585 | |||
| 586 | @@ -90,7 +90,7 @@ main(int argc, char **argv) | ||
| 587 | { | ||
| 588 | int fd; | ||
| 589 | struct session_op sess; | ||
| 590 | - unsigned char key[KEY_SIZE]; | ||
| 591 | + uint8_t key[KEY_SIZE]; | ||
| 592 | int datalen = BLOCK_SIZE; | ||
| 593 | int datalen_end = MAX_DATALEN; | ||
| 594 | int i; | ||
| 595 | diff --git a/tests/fullspeed.c b/tests/fullspeed.c | ||
| 596 | index 611859d..c025130 100644 | ||
| 597 | --- a/tests/fullspeed.c | ||
| 598 | +++ b/tests/fullspeed.c | ||
| 599 | @@ -25,6 +25,7 @@ | ||
| 600 | #include <sys/types.h> | ||
| 601 | #include <signal.h> | ||
| 602 | #include <unistd.h> | ||
| 603 | +#include <stdint.h> | ||
| 604 | |||
| 605 | #include <crypto/cryptodev.h> | ||
| 606 | |||
| 607 | @@ -74,7 +75,7 @@ static void value2human(int si, double bytes, double time, double* data, double* | ||
| 608 | int encrypt_data(int algo, void* keybuf, int key_size, int fdc, int chunksize) | ||
| 609 | { | ||
| 610 | struct crypt_op cop; | ||
| 611 | - char *buffer, iv[32]; | ||
| 612 | + uint8_t *buffer, iv[32]; | ||
| 613 | static int val = 23; | ||
| 614 | struct timeval start, end; | ||
| 615 | double total = 0; | ||
| 616 | diff --git a/tests/hash_comp.c b/tests/hash_comp.c | ||
| 617 | index 9e700a1..e6a4346 100644 | ||
| 618 | --- a/tests/hash_comp.c | ||
| 619 | +++ b/tests/hash_comp.c | ||
| 620 | @@ -30,11 +30,9 @@ static void printhex(unsigned char *buf, int buflen) | ||
| 621 | static int | ||
| 622 | test_crypto(int cfd, struct session_op *sess, int datalen) | ||
| 623 | { | ||
| 624 | - unsigned char *data; | ||
| 625 | - | ||
| 626 | - unsigned char mac[AALG_MAX_RESULT_LEN]; | ||
| 627 | - | ||
| 628 | - unsigned char mac_comp[AALG_MAX_RESULT_LEN]; | ||
| 629 | + uint8_t *data; | ||
| 630 | + uint8_t mac[AALG_MAX_RESULT_LEN]; | ||
| 631 | + uint8_t mac_comp[AALG_MAX_RESULT_LEN]; | ||
| 632 | |||
| 633 | struct crypt_op cryp; | ||
| 634 | |||
| 635 | diff --git a/tests/hmac.c b/tests/hmac.c | ||
| 636 | index 1d9349e..80a2c42 100644 | ||
| 637 | --- a/tests/hmac.c | ||
| 638 | +++ b/tests/hmac.c | ||
| 639 | @@ -69,7 +69,7 @@ test_crypto(int cfd) | ||
| 640 | |||
| 641 | cryp.ses = sess.ses; | ||
| 642 | cryp.len = sizeof("what do ya want for nothing?")-1; | ||
| 643 | - cryp.src = "what do ya want for nothing?"; | ||
| 644 | + cryp.src = (uint8_t*)"what do ya want for nothing?"; | ||
| 645 | cryp.mac = mac; | ||
| 646 | cryp.op = COP_ENCRYPT; | ||
| 647 | if (ioctl(cfd, CIOCCRYPT, &cryp)) { | ||
| 648 | @@ -113,7 +113,7 @@ test_crypto(int cfd) | ||
| 649 | |||
| 650 | cryp.ses = sess.ses; | ||
| 651 | cryp.len = sizeof("what do ya want for nothing?")-1; | ||
| 652 | - cryp.src = "what do ya want for nothing?"; | ||
| 653 | + cryp.src = (uint8_t*)"what do ya want for nothing?"; | ||
| 654 | cryp.mac = mac; | ||
| 655 | cryp.op = COP_ENCRYPT; | ||
| 656 | if (ioctl(cfd, CIOCCRYPT, &cryp)) { | ||
| 657 | @@ -246,7 +246,7 @@ test_extras(int cfd) | ||
| 658 | |||
| 659 | cryp.ses = sess.ses; | ||
| 660 | cryp.len = sizeof("what do")-1; | ||
| 661 | - cryp.src = "what do"; | ||
| 662 | + cryp.src = (uint8_t*)"what do"; | ||
| 663 | cryp.mac = mac; | ||
| 664 | cryp.op = COP_ENCRYPT; | ||
| 665 | cryp.flags = COP_FLAG_UPDATE; | ||
| 666 | @@ -257,7 +257,7 @@ test_extras(int cfd) | ||
| 667 | |||
| 668 | cryp.ses = sess.ses; | ||
| 669 | cryp.len = sizeof(" ya want for nothing?")-1; | ||
| 670 | - cryp.src = " ya want for nothing?"; | ||
| 671 | + cryp.src = (uint8_t*)" ya want for nothing?"; | ||
| 672 | cryp.mac = mac; | ||
| 673 | cryp.op = COP_ENCRYPT; | ||
| 674 | cryp.flags = COP_FLAG_FINAL; | ||
| 675 | diff --git a/tests/speed.c b/tests/speed.c | ||
| 676 | index d2e1aed..0e2bbc3 100644 | ||
| 677 | --- a/tests/speed.c | ||
| 678 | +++ b/tests/speed.c | ||
| 679 | @@ -25,6 +25,7 @@ | ||
| 680 | #include <sys/types.h> | ||
| 681 | #include <signal.h> | ||
| 682 | #include <unistd.h> | ||
| 683 | +#include <stdint.h> | ||
| 684 | |||
| 685 | #include <crypto/cryptodev.h> | ||
| 686 | |||
| 687 | @@ -75,7 +76,7 @@ int encrypt_data(struct session_op *sess, int fdc, int chunksize, int alignmask) | ||
| 688 | { | ||
| 689 | struct crypt_op cop; | ||
| 690 | char *buffer, iv[32]; | ||
| 691 | - char mac[HASH_MAX_LEN]; | ||
| 692 | + uint8_t mac[HASH_MAX_LEN]; | ||
| 693 | static int val = 23; | ||
| 694 | struct timeval start, end; | ||
| 695 | double total = 0; | ||
| 696 | -- | ||
| 697 | 2.10.2 | ||
| 698 | |||
