aboutsummaryrefslogtreecommitdiff
path: root/lib/std
diff options
context:
space:
mode:
authorAndrew Kelley <andrew@ziglang.org>2023-11-01 06:33:40 -0400
committerGitHub <noreply@github.com>2023-11-01 06:33:40 -0400
commit725f765c376dda291d3d5afe5446221a97c189f7 (patch)
treed2c1d77794ba13140aa4a3f0303d56bbec2bd27f /lib/std
parent46062f1c13d8ee9eebf49806660c2271f2acc613 (diff)
parent13b1e10b8f3d8df92417999ed972e5f682c82a46 (diff)
downloadzig-725f765c376dda291d3d5afe5446221a97c189f7.tar.gz
zig-725f765c376dda291d3d5afe5446221a97c189f7.zip
Merge pull request #17802 from jacobly0/read-write-int
mem: fix UB in `readInt`/`writeInt` and delete variants
Diffstat (limited to 'lib/std')
-rw-r--r--lib/std/Build/Step/CheckObject.zig4
-rw-r--r--lib/std/base64.zig8
-rw-r--r--lib/std/builtin.zig4
-rw-r--r--lib/std/child_process.zig4
-rw-r--r--lib/std/coff.zig40
-rw-r--r--lib/std/compress/gzip.zig10
-rw-r--r--lib/std/compress/lzma/decode.zig6
-rw-r--r--lib/std/compress/lzma/decode/rangecoder.zig2
-rw-r--r--lib/std/compress/lzma2/decode.zig6
-rw-r--r--lib/std/compress/xz.zig10
-rw-r--r--lib/std/compress/xz/block.zig6
-rw-r--r--lib/std/compress/zlib.zig8
-rw-r--r--lib/std/compress/zstandard.zig2
-rw-r--r--lib/std/compress/zstandard/decode/block.zig8
-rw-r--r--lib/std/compress/zstandard/decompress.zig31
-rw-r--r--lib/std/compress/zstandard/readers.zig8
-rw-r--r--lib/std/crypto/25519/field.zig20
-rw-r--r--lib/std/crypto/25519/scalar.zig12
-rw-r--r--lib/std/crypto/Certificate.zig8
-rw-r--r--lib/std/crypto/Certificate/Bundle/macos.zig4
-rw-r--r--lib/std/crypto/aegis.zig8
-rw-r--r--lib/std/crypto/aes.zig2
-rw-r--r--lib/std/crypto/aes/soft.zig36
-rw-r--r--lib/std/crypto/aes_gcm.zig20
-rw-r--r--lib/std/crypto/aes_ocb.zig8
-rw-r--r--lib/std/crypto/argon2.zig34
-rw-r--r--lib/std/crypto/ascon.zig19
-rw-r--r--lib/std/crypto/bcrypt.zig4
-rw-r--r--lib/std/crypto/blake2.zig20
-rw-r--r--lib/std/crypto/blake3.zig4
-rw-r--r--lib/std/crypto/chacha20.zig146
-rw-r--r--lib/std/crypto/cmac.zig4
-rw-r--r--lib/std/crypto/ecdsa.zig32
-rw-r--r--lib/std/crypto/ff.zig40
-rw-r--r--lib/std/crypto/ghash_polyval.zig4
-rw-r--r--lib/std/crypto/isap.zig24
-rw-r--r--lib/std/crypto/keccak_p.zig24
-rw-r--r--lib/std/crypto/md5.zig4
-rw-r--r--lib/std/crypto/pcurves/common.zig22
-rw-r--r--lib/std/crypto/pcurves/p256.zig24
-rw-r--r--lib/std/crypto/pcurves/p256/scalar.zig10
-rw-r--r--lib/std/crypto/pcurves/p384.zig24
-rw-r--r--lib/std/crypto/pcurves/p384/scalar.zig8
-rw-r--r--lib/std/crypto/pcurves/secp256k1.zig52
-rw-r--r--lib/std/crypto/pcurves/secp256k1/scalar.zig10
-rw-r--r--lib/std/crypto/pcurves/tests/p256.zig40
-rw-r--r--lib/std/crypto/pcurves/tests/p384.zig40
-rw-r--r--lib/std/crypto/pcurves/tests/secp256k1.zig48
-rw-r--r--lib/std/crypto/poly1305.zig16
-rw-r--r--lib/std/crypto/salsa20.zig68
-rw-r--r--lib/std/crypto/scrypt.zig8
-rw-r--r--lib/std/crypto/sha1.zig4
-rw-r--r--lib/std/crypto/sha2.zig8
-rw-r--r--lib/std/crypto/siphash.zig8
-rw-r--r--lib/std/crypto/tls.zig2
-rw-r--r--lib/std/crypto/tls/Client.zig14
-rw-r--r--lib/std/crypto/utils.zig20
-rw-r--r--lib/std/debug.zig16
-rw-r--r--lib/std/dwarf.zig7
-rw-r--r--lib/std/dwarf/call_frame.zig9
-rw-r--r--lib/std/dwarf/expressions.zig33
-rw-r--r--lib/std/elf.zig4
-rw-r--r--lib/std/fmt/parse_float/FloatStream.zig2
-rw-r--r--lib/std/fmt/parse_float/decimal.zig2
-rw-r--r--lib/std/fs/path.zig2
-rw-r--r--lib/std/hash/cityhash.zig4
-rw-r--r--lib/std/hash/crc.zig2
-rw-r--r--lib/std/hash/murmur.zig14
-rw-r--r--lib/std/hash/verify.zig2
-rw-r--r--lib/std/hash/wyhash.zig2
-rw-r--r--lib/std/hash/xxhash.zig24
-rw-r--r--lib/std/heap/WasmPageAllocator.zig2
-rw-r--r--lib/std/http/Client.zig2
-rw-r--r--lib/std/http/Server.zig2
-rw-r--r--lib/std/http/protocol.zig4
-rw-r--r--lib/std/io.zig16
-rw-r--r--lib/std/io/Reader.zig28
-rw-r--r--lib/std/io/bit_reader.zig12
-rw-r--r--lib/std/io/bit_writer.zig20
-rw-r--r--lib/std/io/test.zig2
-rw-r--r--lib/std/io/writer.zig30
-rw-r--r--lib/std/math/big/int.zig18
-rw-r--r--lib/std/math/big/int_test.zig82
-rw-r--r--lib/std/mem.zig582
-rw-r--r--lib/std/net.zig10
-rw-r--r--lib/std/os/linux.zig6
-rw-r--r--lib/std/os/linux/bpf.zig8
-rw-r--r--lib/std/os/linux/seccomp.zig2
-rw-r--r--lib/std/os/test.zig6
-rw-r--r--lib/std/os/windows.zig4
-rw-r--r--lib/std/packed_int_array.zig40
-rw-r--r--lib/std/pdb.zig28
-rw-r--r--lib/std/rand.zig9
-rw-r--r--lib/std/rand/Ascon.zig2
-rw-r--r--lib/std/rand/Isaac64.zig2
-rw-r--r--lib/std/rand/Pcg.zig4
-rw-r--r--lib/std/rand/RomuTrio.zig2
-rw-r--r--lib/std/rand/Sfc64.zig2
-rw-r--r--lib/std/rand/Xoroshiro128.zig2
-rw-r--r--lib/std/rand/Xoshiro256.zig2
-rw-r--r--lib/std/rand/test.zig2
-rw-r--r--lib/std/target.zig4
-rw-r--r--lib/std/tz.zig12
-rw-r--r--lib/std/unicode.zig49
-rw-r--r--lib/std/zig/Server.zig6
-rw-r--r--lib/std/zig/system/NativeTargetInfo.zig8
106 files changed, 900 insertions, 1293 deletions
diff --git a/lib/std/Build/Step/CheckObject.zig b/lib/std/Build/Step/CheckObject.zig
index 2534298854..66bf5cadf3 100644
--- a/lib/std/Build/Step/CheckObject.zig
+++ b/lib/std/Build/Step/CheckObject.zig
@@ -1624,8 +1624,8 @@ const WasmDumper = struct {
switch (opcode) {
.i32_const => try writer.print("i32.const {x}\n", .{try std.leb.readILEB128(i32, reader)}),
.i64_const => try writer.print("i64.const {x}\n", .{try std.leb.readILEB128(i64, reader)}),
- .f32_const => try writer.print("f32.const {x}\n", .{@as(f32, @bitCast(try reader.readIntLittle(u32)))}),
- .f64_const => try writer.print("f64.const {x}\n", .{@as(f64, @bitCast(try reader.readIntLittle(u64)))}),
+ .f32_const => try writer.print("f32.const {x}\n", .{@as(f32, @bitCast(try reader.readInt(u32, .little)))}),
+ .f64_const => try writer.print("f64.const {x}\n", .{@as(f64, @bitCast(try reader.readInt(u64, .little)))}),
.global_get => try writer.print("global.get {x}\n", .{try std.leb.readULEB128(u32, reader)}),
else => unreachable,
}
diff --git a/lib/std/base64.zig b/lib/std/base64.zig
index 2ec8fb5678..bca829de38 100644
--- a/lib/std/base64.zig
+++ b/lib/std/base64.zig
@@ -104,14 +104,14 @@ pub const Base64Encoder = struct {
var idx: usize = 0;
var out_idx: usize = 0;
while (idx + 15 < source.len) : (idx += 12) {
- const bits = std.mem.readIntBig(u128, source[idx..][0..16]);
+ const bits = std.mem.readInt(u128, source[idx..][0..16], .big);
inline for (0..16) |i| {
dest[out_idx + i] = encoder.alphabet_chars[@truncate((bits >> (122 - i * 6)) & 0x3f)];
}
out_idx += 16;
}
while (idx + 3 < source.len) : (idx += 3) {
- const bits = std.mem.readIntBig(u32, source[idx..][0..4]);
+ const bits = std.mem.readInt(u32, source[idx..][0..4], .big);
dest[out_idx] = encoder.alphabet_chars[(bits >> 26) & 0x3f];
dest[out_idx + 1] = encoder.alphabet_chars[(bits >> 20) & 0x3f];
dest[out_idx + 2] = encoder.alphabet_chars[(bits >> 14) & 0x3f];
@@ -226,7 +226,7 @@ pub const Base64Decoder = struct {
if ((new_bits & invalid_char_tst) != 0) return error.InvalidCharacter;
bits |= (new_bits << (24 * i));
}
- std.mem.writeIntLittle(u128, dest[dest_idx..][0..16], bits);
+ std.mem.writeInt(u128, dest[dest_idx..][0..16], bits, .little);
}
while (fast_src_idx + 4 < source.len and dest_idx + 3 < dest.len) : ({
fast_src_idx += 4;
@@ -237,7 +237,7 @@ pub const Base64Decoder = struct {
bits |= decoder.fast_char_to_index[2][source[fast_src_idx + 2]];
bits |= decoder.fast_char_to_index[3][source[fast_src_idx + 3]];
if ((bits & invalid_char_tst) != 0) return error.InvalidCharacter;
- std.mem.writeIntLittle(u32, dest[dest_idx..][0..4], bits);
+ std.mem.writeInt(u32, dest[dest_idx..][0..4], bits, .little);
}
var remaining = source[fast_src_idx..];
for (remaining, fast_src_idx..) |c, src_idx| {
diff --git a/lib/std/builtin.zig b/lib/std/builtin.zig
index c83bfb4276..4042bc2743 100644
--- a/lib/std/builtin.zig
+++ b/lib/std/builtin.zig
@@ -450,8 +450,8 @@ pub const FloatMode = enum {
/// This data structure is used by the Zig language code generation and
/// therefore must be kept in sync with the compiler implementation.
pub const Endian = enum {
- Big,
- Little,
+ big,
+ little,
};
/// This data structure is used by the Zig language code generation and
diff --git a/lib/std/child_process.zig b/lib/std/child_process.zig
index 81c5bc1e03..b3edbcd76a 100644
--- a/lib/std/child_process.zig
+++ b/lib/std/child_process.zig
@@ -1376,7 +1376,7 @@ fn writeIntFd(fd: i32, value: ErrInt) !void {
.capable_io_mode = .blocking,
.intended_io_mode = .blocking,
};
- file.writer().writeIntNative(u64, @as(u64, @intCast(value))) catch return error.SystemResources;
+ file.writer().writeInt(u64, @intCast(value), .little) catch return error.SystemResources;
}
fn readIntFd(fd: i32) !ErrInt {
@@ -1385,7 +1385,7 @@ fn readIntFd(fd: i32) !ErrInt {
.capable_io_mode = .blocking,
.intended_io_mode = .blocking,
};
- return @as(ErrInt, @intCast(file.reader().readIntNative(u64) catch return error.SystemResources));
+ return @as(ErrInt, @intCast(file.reader().readInt(u64, .little) catch return error.SystemResources));
}
/// Caller must free result.
diff --git a/lib/std/coff.zig b/lib/std/coff.zig
index 13e420308e..b2bf09ef2a 100644
--- a/lib/std/coff.zig
+++ b/lib/std/coff.zig
@@ -663,7 +663,7 @@ pub const Symbol = struct {
pub fn getNameOffset(self: Symbol) ?u32 {
if (!std.mem.eql(u8, self.name[0..4], "\x00\x00\x00\x00")) return null;
- const offset = std.mem.readIntLittle(u32, self.name[4..8]);
+ const offset = std.mem.readInt(u32, self.name[4..8], .little);
return offset;
}
};
@@ -1075,7 +1075,7 @@ pub const Coff = struct {
var stream = std.io.fixedBufferStream(data);
const reader = stream.reader();
try stream.seekTo(pe_pointer_offset);
- var coff_header_offset = try reader.readIntLittle(u32);
+ var coff_header_offset = try reader.readInt(u32, .little);
try stream.seekTo(coff_header_offset);
var buf: [4]u8 = undefined;
try reader.readNoEof(&buf);
@@ -1142,7 +1142,7 @@ pub const Coff = struct {
if (!mem.eql(u8, &cv_signature, "RSDS"))
return error.InvalidPEMagic;
try reader.readNoEof(self.guid[0..]);
- self.age = try reader.readIntLittle(u32);
+ self.age = try reader.readInt(u32, .little);
// Finally read the null-terminated string.
var byte = try reader.readByte();
@@ -1223,7 +1223,7 @@ pub const Coff = struct {
if (coff_header.pointer_to_symbol_table == 0) return null;
const offset = coff_header.pointer_to_symbol_table + Symbol.sizeOf() * coff_header.number_of_symbols;
- const size = mem.readIntLittle(u32, self.data[offset..][0..4]);
+ const size = mem.readInt(u32, self.data[offset..][0..4], .little);
if ((offset + size) > self.data.len) return error.InvalidStrtabSize;
return Strtab{ .buffer = self.data[offset..][0..size] };
@@ -1324,9 +1324,9 @@ pub const Symtab = struct {
fn asSymbol(raw: []const u8) Symbol {
return .{
.name = raw[0..8].*,
- .value = mem.readIntLittle(u32, raw[8..12]),
- .section_number = @as(SectionNumber, @enumFromInt(mem.readIntLittle(u16, raw[12..14]))),
- .type = @as(SymType, @bitCast(mem.readIntLittle(u16, raw[14..16]))),
+ .value = mem.readInt(u32, raw[8..12], .little),
+ .section_number = @as(SectionNumber, @enumFromInt(mem.readInt(u16, raw[12..14], .little))),
+ .type = @as(SymType, @bitCast(mem.readInt(u16, raw[14..16], .little))),
.storage_class = @as(StorageClass, @enumFromInt(raw[16])),
.number_of_aux_symbols = raw[17],
};
@@ -1335,27 +1335,27 @@ pub const Symtab = struct {
fn asDebugInfo(raw: []const u8) DebugInfoDefinition {
return .{
.unused_1 = raw[0..4].*,
- .linenumber = mem.readIntLittle(u16, raw[4..6]),
+ .linenumber = mem.readInt(u16, raw[4..6], .little),
.unused_2 = raw[6..12].*,
- .pointer_to_next_function = mem.readIntLittle(u32, raw[12..16]),
+ .pointer_to_next_function = mem.readInt(u32, raw[12..16], .little),
.unused_3 = raw[16..18].*,
};
}
fn asFuncDef(raw: []const u8) FunctionDefinition {
return .{
- .tag_index = mem.readIntLittle(u32, raw[0..4]),
- .total_size = mem.readIntLittle(u32, raw[4..8]),
- .pointer_to_linenumber = mem.readIntLittle(u32, raw[8..12]),
- .pointer_to_next_function = mem.readIntLittle(u32, raw[12..16]),
+ .tag_index = mem.readInt(u32, raw[0..4], .little),
+ .total_size = mem.readInt(u32, raw[4..8], .little),
+ .pointer_to_linenumber = mem.readInt(u32, raw[8..12], .little),
+ .pointer_to_next_function = mem.readInt(u32, raw[12..16], .little),
.unused = raw[16..18].*,
};
}
fn asWeakExtDef(raw: []const u8) WeakExternalDefinition {
return .{
- .tag_index = mem.readIntLittle(u32, raw[0..4]),
- .flag = @as(WeakExternalFlag, @enumFromInt(mem.readIntLittle(u32, raw[4..8]))),
+ .tag_index = mem.readInt(u32, raw[0..4], .little),
+ .flag = @as(WeakExternalFlag, @enumFromInt(mem.readInt(u32, raw[4..8], .little))),
.unused = raw[8..18].*,
};
}
@@ -1368,11 +1368,11 @@ pub const Symtab = struct {
fn asSectDef(raw: []const u8) SectionDefinition {
return .{
- .length = mem.readIntLittle(u32, raw[0..4]),
- .number_of_relocations = mem.readIntLittle(u16, raw[4..6]),
- .number_of_linenumbers = mem.readIntLittle(u16, raw[6..8]),
- .checksum = mem.readIntLittle(u32, raw[8..12]),
- .number = mem.readIntLittle(u16, raw[12..14]),
+ .length = mem.readInt(u32, raw[0..4], .little),
+ .number_of_relocations = mem.readInt(u16, raw[4..6], .little),
+ .number_of_linenumbers = mem.readInt(u16, raw[6..8], .little),
+ .checksum = mem.readInt(u32, raw[8..12], .little),
+ .number = mem.readInt(u16, raw[12..14], .little),
.selection = @as(ComdatSelection, @enumFromInt(raw[14])),
.unused = raw[15..18].*,
};
diff --git a/lib/std/compress/gzip.zig b/lib/std/compress/gzip.zig
index f6fb038ae3..bb94687114 100644
--- a/lib/std/compress/gzip.zig
+++ b/lib/std/compress/gzip.zig
@@ -58,7 +58,7 @@ pub fn Decompress(comptime ReaderType: type) type {
const FLG = header[3];
// Modification time, as a Unix timestamp.
// If zero there's no timestamp available.
- const MTIME = mem.readIntLittle(u32, header[4..8]);
+ const MTIME = mem.readInt(u32, header[4..8], .little);
// Extra flags
const XFL = header[8];
// Operating system where the compression took place
@@ -66,7 +66,7 @@ pub fn Decompress(comptime ReaderType: type) type {
_ = XFL;
const extra = if (FLG & FEXTRA != 0) blk: {
- const len = try hashed_reader.readIntLittle(u16);
+ const len = try hashed_reader.readInt(u16, .little);
const tmp_buf = try allocator.alloc(u8, len);
errdefer allocator.free(tmp_buf);
@@ -88,7 +88,7 @@ pub fn Decompress(comptime ReaderType: type) type {
errdefer if (comment) |p| allocator.free(p);
if (FLG & FHCRC != 0) {
- const hash = try source.readIntLittle(u16);
+ const hash = try source.readInt(u16, .little);
if (hash != @as(u16, @truncate(hasher.hasher.final())))
return error.WrongChecksum;
}
@@ -133,12 +133,12 @@ pub fn Decompress(comptime ReaderType: type) type {
}
// We've reached the end of stream, check if the checksum matches
- const hash = try self.in_reader.readIntLittle(u32);
+ const hash = try self.in_reader.readInt(u32, .little);
if (hash != self.hasher.final())
return error.WrongChecksum;
// The ISIZE field is the size of the uncompressed input modulo 2^32
- const input_size = try self.in_reader.readIntLittle(u32);
+ const input_size = try self.in_reader.readInt(u32, .little);
if (self.read_amt & 0xffffffff != input_size)
return error.CorruptedData;
diff --git a/lib/std/compress/lzma/decode.zig b/lib/std/compress/lzma/decode.zig
index 0dae9281e8..ec0619ba57 100644
--- a/lib/std/compress/lzma/decode.zig
+++ b/lib/std/compress/lzma/decode.zig
@@ -58,12 +58,12 @@ pub const Params = struct {
props /= 5;
const pb = @as(u3, @intCast(props));
- const dict_size_provided = try reader.readIntLittle(u32);
+ const dict_size_provided = try reader.readInt(u32, .little);
const dict_size = @max(0x1000, dict_size_provided);
const unpacked_size = switch (options.unpacked_size) {
.read_from_header => blk: {
- const unpacked_size_provided = try reader.readIntLittle(u64);
+ const unpacked_size_provided = try reader.readInt(u64, .little);
const marker_mandatory = unpacked_size_provided == 0xFFFF_FFFF_FFFF_FFFF;
break :blk if (marker_mandatory)
null
@@ -71,7 +71,7 @@ pub const Params = struct {
unpacked_size_provided;
},
.read_header_but_use_provided => |x| blk: {
- _ = try reader.readIntLittle(u64);
+ _ = try reader.readInt(u64, .little);
break :blk x;
},
.use_provided => |x| x,
diff --git a/lib/std/compress/lzma/decode/rangecoder.zig b/lib/std/compress/lzma/decode/rangecoder.zig
index 54d2195e33..515420a7d4 100644
--- a/lib/std/compress/lzma/decode/rangecoder.zig
+++ b/lib/std/compress/lzma/decode/rangecoder.zig
@@ -12,7 +12,7 @@ pub const RangeDecoder = struct {
}
return RangeDecoder{
.range = 0xFFFF_FFFF,
- .code = try reader.readIntBig(u32),
+ .code = try reader.readInt(u32, .big),
};
}
diff --git a/lib/std/compress/lzma2/decode.zig b/lib/std/compress/lzma2/decode.zig
index a23007d42a..938c2d437b 100644
--- a/lib/std/compress/lzma2/decode.zig
+++ b/lib/std/compress/lzma2/decode.zig
@@ -97,12 +97,12 @@ pub const Decoder = struct {
const unpacked_size = blk: {
var tmp: u64 = status & 0x1F;
tmp <<= 16;
- tmp |= try reader.readIntBig(u16);
+ tmp |= try reader.readInt(u16, .big);
break :blk tmp + 1;
};
const packed_size = blk: {
- const tmp: u17 = try reader.readIntBig(u16);
+ const tmp: u17 = try reader.readInt(u16, .big);
break :blk tmp + 1;
};
@@ -155,7 +155,7 @@ pub const Decoder = struct {
accum: *LzAccumBuffer,
reset_dict: bool,
) !void {
- const unpacked_size = @as(u17, try reader.readIntBig(u16)) + 1;
+ const unpacked_size = @as(u17, try reader.readInt(u16, .big)) + 1;
if (reset_dict) {
try accum.reset(writer);
diff --git a/lib/std/compress/xz.zig b/lib/std/compress/xz.zig
index 3ceec90a7a..e844c234ff 100644
--- a/lib/std/compress/xz.zig
+++ b/lib/std/compress/xz.zig
@@ -12,7 +12,7 @@ pub const Check = enum(u4) {
};
fn readStreamFlags(reader: anytype, check: *Check) !void {
- var bit_reader = std.io.bitReader(.Little, reader);
+ var bit_reader = std.io.bitReader(.little, reader);
const reserved1 = try bit_reader.readBitsNoEof(u8, 8);
if (reserved1 != 0)
@@ -52,7 +52,7 @@ pub fn Decompress(comptime ReaderType: type) type {
break :blk hasher.hasher.final();
};
- const hash_b = try source.readIntLittle(u32);
+ const hash_b = try source.readInt(u32, .little);
if (hash_a != hash_b)
return error.WrongChecksum;
@@ -105,20 +105,20 @@ pub fn Decompress(comptime ReaderType: type) type {
}
const hash_a = hasher.hasher.final();
- const hash_b = try counting_reader.readIntLittle(u32);
+ const hash_b = try counting_reader.readInt(u32, .little);
if (hash_a != hash_b)
return error.WrongChecksum;
break :blk counter.bytes_read;
};
- const hash_a = try self.in_reader.readIntLittle(u32);
+ const hash_a = try self.in_reader.readInt(u32, .little);
const hash_b = blk: {
var hasher = std.compress.hashedReader(self.in_reader, Crc32.init());
const hashed_reader = hasher.reader();
- const backward_size = (@as(u64, try hashed_reader.readIntLittle(u32)) + 1) * 4;
+ const backward_size = (@as(u64, try hashed_reader.readInt(u32, .little)) + 1) * 4;
if (backward_size != index_size)
return error.CorruptInput;
diff --git a/lib/std/compress/xz/block.zig b/lib/std/compress/xz/block.zig
index 6f4fad1c7f..cd2c465dc5 100644
--- a/lib/std/compress/xz/block.zig
+++ b/lib/std/compress/xz/block.zig
@@ -148,7 +148,7 @@ pub fn Decoder(comptime ReaderType: type) type {
}
const hash_a = header_hasher.hasher.final();
- const hash_b = try header_reader.readIntLittle(u32);
+ const hash_b = try header_reader.readInt(u32, .little);
if (hash_a != hash_b)
return error.WrongChecksum;
}
@@ -182,13 +182,13 @@ pub fn Decoder(comptime ReaderType: type) type {
.none => {},
.crc32 => {
const hash_a = Crc32.hash(unpacked_bytes);
- const hash_b = try self.inner_reader.readIntLittle(u32);
+ const hash_b = try self.inner_reader.readInt(u32, .little);
if (hash_a != hash_b)
return error.WrongChecksum;
},
.crc64 => {
const hash_a = Crc64.hash(unpacked_bytes);
- const hash_b = try self.inner_reader.readIntLittle(u64);
+ const hash_b = try self.inner_reader.readInt(u64, .little);
if (hash_a != hash_b)
return error.WrongChecksum;
},
diff --git a/lib/std/compress/zlib.zig b/lib/std/compress/zlib.zig
index 5580192537..6708875930 100644
--- a/lib/std/compress/zlib.zig
+++ b/lib/std/compress/zlib.zig
@@ -36,7 +36,7 @@ pub fn DecompressStream(comptime ReaderType: type) type {
fn init(allocator: mem.Allocator, source: ReaderType) !Self {
// Zlib header format is specified in RFC1950
- const header_u16 = try source.readIntBig(u16);
+ const header_u16 = try source.readInt(u16, .big);
// verify the header checksum
if (header_u16 % 31 != 0)
@@ -81,7 +81,7 @@ pub fn DecompressStream(comptime ReaderType: type) type {
}
// We've reached the end of stream, check if the checksum matches
- const hash = try self.in_reader.readIntBig(u32);
+ const hash = try self.in_reader.readInt(u32, .big);
if (hash != self.hasher.final())
return error.WrongChecksum;
@@ -132,7 +132,7 @@ pub fn CompressStream(comptime WriterType: type) type {
};
header.checksum = @as(u5, @truncate(31 - @as(u16, @bitCast(header)) % 31));
- try dest.writeIntBig(u16, @as(u16, @bitCast(header)));
+ try dest.writeInt(u16, @as(u16, @bitCast(header)), .big);
const compression_level: deflate.Compression = switch (options.level) {
.no_compression => .no_compression,
@@ -171,7 +171,7 @@ pub fn CompressStream(comptime WriterType: type) type {
pub fn finish(self: *Self) !void {
const hash = self.hasher.final();
try self.deflator.close();
- try self.in_writer.writeIntBig(u32, hash);
+ try self.in_writer.writeInt(u32, hash, .big);
}
};
}
diff --git a/lib/std/compress/zstandard.zig b/lib/std/compress/zstandard.zig
index ef2ccc2f1c..10eb878a1c 100644
--- a/lib/std/compress/zstandard.zig
+++ b/lib/std/compress/zstandard.zig
@@ -201,7 +201,7 @@ pub fn DecompressStream(
if (block_header.last_block) {
self.state = .LastBlock;
if (self.frame_context.has_checksum) {
- const checksum = source_reader.readIntLittle(u32) catch
+ const checksum = source_reader.readInt(u32, .little) catch
return error.MalformedFrame;
if (comptime options.verify_checksum) {
if (self.frame_context.hasher_opt) |*hasher| {
diff --git a/lib/std/compress/zstandard/decode/block.zig b/lib/std/compress/zstandard/decode/block.zig
index 4a035fb543..36837a6b53 100644
--- a/lib/std/compress/zstandard/decode/block.zig
+++ b/lib/std/compress/zstandard/decode/block.zig
@@ -13,8 +13,6 @@ const readers = @import("../readers.zig");
const decodeFseTable = @import("fse.zig").decodeFseTable;
-const readInt = std.mem.readIntLittle;
-
pub const Error = error{
BlockSizeOverMaximum,
MalformedBlockSize,
@@ -1031,9 +1029,9 @@ fn decodeStreams(size_format: u2, stream_data: []const u8) !LiteralsSection.Stre
if (stream_data.len < 6) return error.MalformedLiteralsSection;
- const stream_1_length = @as(usize, readInt(u16, stream_data[0..2]));
- const stream_2_length = @as(usize, readInt(u16, stream_data[2..4]));
- const stream_3_length = @as(usize, readInt(u16, stream_data[4..6]));
+ const stream_1_length: usize = std.mem.readInt(u16, stream_data[0..2], .little);
+ const stream_2_length: usize = std.mem.readInt(u16, stream_data[2..4], .little);
+ const stream_3_length: usize = std.mem.readInt(u16, stream_data[4..6], .little);
const stream_1_start = 6;
const stream_2_start = stream_1_start + stream_1_length;
diff --git a/lib/std/compress/zstandard/decompress.zig b/lib/std/compress/zstandard/decompress.zig
index bc977d1fba..c33d87379a 100644
--- a/lib/std/compress/zstandard/decompress.zig
+++ b/lib/std/compress/zstandard/decompress.zig
@@ -15,9 +15,6 @@ pub const block = @import("decode/block.zig");
const readers = @import("readers.zig");
-const readInt = std.mem.readIntLittle;
-const readIntSlice = std.mem.readIntSliceLittle;
-
/// Returns `true` is `magic` is a valid magic number for a skippable frame
pub fn isSkippableMagic(magic: u32) bool {
return frame.Skippable.magic_number_min <= magic and magic <= frame.Skippable.magic_number_max;
@@ -31,7 +28,7 @@ pub fn isSkippableMagic(magic: u32) bool {
/// skippable frames.
/// - `error.EndOfStream` if `source` contains fewer than 4 bytes
pub fn decodeFrameType(source: anytype) error{ BadMagic, EndOfStream }!frame.Kind {
- const magic = try source.readIntLittle(u32);
+ const magic = try source.readInt(u32, .little);
return frameType(magic);
}
@@ -65,14 +62,14 @@ pub const HeaderError = error{ BadMagic, EndOfStream, ReservedBitSet };
/// - `error.ReservedBitSet` if the frame is a Zstandard frame and any of the
/// reserved bits are set
pub fn decodeFrameHeader(source: anytype) (@TypeOf(source).Error || HeaderError)!FrameHeader {
- const magic = try source.readIntLittle(u32);
+ const magic = try source.readInt(u32, .little);
const frame_type = try frameType(magic);
switch (frame_type) {
.zstandard => return FrameHeader{ .zstandard = try decodeZstandardHeader(source) },
.skippable => return FrameHeader{
.skippable = .{
.magic_number = magic,
- .frame_size = try source.readIntLittle(u32),
+ .frame_size = try source.readInt(u32, .little),
},
},
}
@@ -193,7 +190,7 @@ pub fn decodeFrame(
switch (try decodeFrameType(fbs.reader())) {
.zstandard => return decodeZstandardFrame(dest, src, verify_checksum),
.skippable => {
- const content_size = try fbs.reader().readIntLittle(u32);
+ const content_size = try fbs.reader().readInt(u32, .little);
if (content_size > std.math.maxInt(usize) - 8) return error.SkippableSizeTooLarge;
const read_count = @as(usize, content_size) + 8;
if (read_count > src.len) return error.SkippableSizeTooLarge;
@@ -238,7 +235,7 @@ pub fn decodeFrameArrayList(
) (error{ BadMagic, OutOfMemory, SkippableSizeTooLarge } || FrameContext.Error || FrameError)!usize {
var fbs = std.io.fixedBufferStream(src);
const reader = fbs.reader();
- const magic = try reader.readIntLittle(u32);
+ const magic = try reader.readInt(u32, .little);
switch (try frameType(magic)) {
.zstandard => return decodeZstandardFrameArrayList(
allocator,
@@ -248,7 +245,7 @@ pub fn decodeFrameArrayList(
window_size_max,
),
.skippable => {
- const content_size = try fbs.reader().readIntLittle(u32);
+ const content_size = try fbs.reader().readInt(u32, .little);
if (content_size > std.math.maxInt(usize) - 8) return error.SkippableSizeTooLarge;
const read_count = @as(usize, content_size) + 8;
if (read_count > src.len) return error.SkippableSizeTooLarge;
@@ -302,7 +299,7 @@ pub fn decodeZstandardFrame(
WindowSizeUnknown,
DictionaryIdFlagUnsupported,
} || FrameError)!ReadWriteCount {
- assert(readInt(u32, src[0..4]) == frame.Zstandard.magic_number);
+ assert(std.mem.readInt(u32, src[0..4], .little) == frame.Zstandard.magic_number);
var consumed_count: usize = 4;
var frame_context = context: {
@@ -354,7 +351,7 @@ pub fn decodeZStandardFrameBlocks(
if (written_count != content_size) return error.BadContentSize;
if (frame_context.has_checksum) {
if (src.len < consumed_count + 4) return error.EndOfStream;
- const checksum = readIntSlice(u32, src[consumed_count .. consumed_count + 4]);
+ const checksum = std.mem.readInt(u32, src[consumed_count..][0..4], .little);
consumed_count += 4;
if (frame_context.hasher_opt) |*hasher| {
if (checksum != computeChecksum(hasher)) return error.ChecksumFailure;
@@ -445,7 +442,7 @@ pub fn decodeZstandardFrameArrayList(
verify_checksum: bool,
window_size_max: usize,
) (error{OutOfMemory} || FrameContext.Error || FrameError)!usize {
- assert(readInt(u32, src[0..4]) == frame.Zstandard.magic_number);
+ assert(std.mem.readInt(u32, src[0..4], .little) == frame.Zstandard.magic_number);
var consumed_count: usize = 4;
var frame_context = context: {
@@ -520,7 +517,7 @@ pub fn decodeZstandardFrameBlocksArrayList(
if (frame_context.has_checksum) {
if (src.len < consumed_count + 4) return error.EndOfStream;
- const checksum = readIntSlice(u32, src[consumed_count .. consumed_count + 4]);
+ const checksum = std.mem.readInt(u32, src[consumed_count..][0..4], .little);
consumed_count += 4;
if (frame_context.hasher_opt) |*hasher| {
if (checksum != computeChecksum(hasher)) return error.ChecksumFailure;
@@ -569,9 +566,9 @@ fn decodeFrameBlocksInner(
/// Decode the header of a skippable frame. The first four bytes of `src` must
/// be a valid magic number for a skippable frame.
pub fn decodeSkippableHeader(src: *const [8]u8) SkippableHeader {
- const magic = readInt(u32, src[0..4]);
+ const magic = std.mem.readInt(u32, src[0..4], .little);
assert(isSkippableMagic(magic));
- const frame_size = readInt(u32, src[4..8]);
+ const frame_size = std.mem.readInt(u32, src[4..8], .little);
return .{
.magic_number = magic,
.frame_size = frame_size,
@@ -612,13 +609,13 @@ pub fn decodeZstandardHeader(
if (descriptor.dictionary_id_flag > 0) {
// if flag is 3 then field_size = 4, else field_size = flag
const field_size = (@as(u4, 1) << descriptor.dictionary_id_flag) >> 1;
- dictionary_id = try source.readVarInt(u32, .Little, field_size);
+ dictionary_id = try source.readVarInt(u32, .little, field_size);
}
var content_size: ?u64 = null;
if (descriptor.single_segment_flag or descriptor.content_size_flag > 0) {
const field_size = @as(u4, 1) << descriptor.content_size_flag;
- content_size = try source.readVarInt(u64, .Little, field_size);
+ content_size = try source.readVarInt(u64, .little, field_size);
if (field_size == 2) content_size.? += 256;
}
diff --git a/lib/std/compress/zstandard/readers.zig b/lib/std/compress/zstandard/readers.zig
index e2f62ddc51..f95573f77b 100644
--- a/lib/std/compress/zstandard/readers.zig
+++ b/lib/std/compress/zstandard/readers.zig
@@ -31,11 +31,11 @@ pub const ReversedByteReader = struct {
/// FSE compressed data.
pub const ReverseBitReader = struct {
byte_reader: ReversedByteReader,
- bit_reader: std.io.BitReader(.Big, ReversedByteReader.Reader),
+ bit_reader: std.io.BitReader(.big, ReversedByteReader.Reader),
pub fn init(self: *ReverseBitReader, bytes: []const u8) error{BitStreamHasNoStartBit}!void {
self.byte_reader = ReversedByteReader.init(bytes);
- self.bit_reader = std.io.bitReader(.Big, self.byte_reader.reader());
+ self.bit_reader = std.io.bitReader(.big, self.byte_reader.reader());
if (bytes.len == 0) return;
var i: usize = 0;
while (i < 8 and 0 == self.readBitsNoEof(u1, 1) catch unreachable) : (i += 1) {}
@@ -61,7 +61,7 @@ pub const ReverseBitReader = struct {
pub fn BitReader(comptime Reader: type) type {
return struct {
- underlying: std.io.BitReader(.Little, Reader),
+ underlying: std.io.BitReader(.little, Reader),
pub fn readBitsNoEof(self: *@This(), comptime U: type, num_bits: usize) !U {
return self.underlying.readBitsNoEof(U, num_bits);
@@ -78,5 +78,5 @@ pub fn BitReader(comptime Reader: type) type {
}
pub fn bitReader(reader: anytype) BitReader(@TypeOf(reader)) {
- return .{ .underlying = std.io.bitReader(.Little, reader) };
+ return .{ .underlying = std.io.bitReader(.little, reader) };
}
diff --git a/lib/std/crypto/25519/field.zig b/lib/std/crypto/25519/field.zig
index 627df9d4cb..401616f1b8 100644
--- a/lib/std/crypto/25519/field.zig
+++ b/lib/std/crypto/25519/field.zig
@@ -1,8 +1,6 @@
const std = @import("std");
const builtin = @import("builtin");
const crypto = std.crypto;
-const readIntLittle = std.mem.readIntLittle;
-const writeIntLittle = std.mem.writeIntLittle;
const NonCanonicalError = crypto.errors.NonCanonicalError;
const NotSquareError = crypto.errors.NotSquareError;
@@ -73,11 +71,11 @@ pub const Fe = struct {
/// Unpack a field element
pub fn fromBytes(s: [32]u8) Fe {
var fe: Fe = undefined;
- fe.limbs[0] = readIntLittle(u64, s[0..8]) & MASK51;
- fe.limbs[1] = (readIntLittle(u64, s[6..14]) >> 3) & MASK51;
- fe.limbs[2] = (readIntLittle(u64, s[12..20]) >> 6) & MASK51;
- fe.limbs[3] = (readIntLittle(u64, s[19..27]) >> 1) & MASK51;
- fe.limbs[4] = (readIntLittle(u64, s[24..32]) >> 12) & MASK51;
+ fe.limbs[0] = std.mem.readInt(u64, s[0..8], .little) & MASK51;
+ fe.limbs[1] = (std.mem.readInt(u64, s[6..14], .little) >> 3) & MASK51;
+ fe.limbs[2] = (std.mem.readInt(u64, s[12..20], .little) >> 6) & MASK51;
+ fe.limbs[3] = (std.mem.readInt(u64, s[19..27], .little) >> 1) & MASK51;
+ fe.limbs[4] = (std.mem.readInt(u64, s[24..32], .little) >> 12) & MASK51;
return fe;
}
@@ -87,10 +85,10 @@ pub const Fe = struct {
var reduced = fe;
reduced.reduce();
var s: [32]u8 = undefined;
- writeIntLittle(u64, s[0..8], reduced.limbs[0] | (reduced.limbs[1] << 51));
- writeIntLittle(u64, s[8..16], (reduced.limbs[1] >> 13) | (reduced.limbs[2] << 38));
- writeIntLittle(u64, s[16..24], (reduced.limbs[2] >> 26) | (reduced.limbs[3] << 25));
- writeIntLittle(u64, s[24..32], (reduced.limbs[3] >> 39) | (reduced.limbs[4] << 12));
+ std.mem.writeInt(u64, s[0..8], reduced.limbs[0] | (reduced.limbs[1] << 51), .little);
+ std.mem.writeInt(u64, s[8..16], (reduced.limbs[1] >> 13) | (reduced.limbs[2] << 38), .little);
+ std.mem.writeInt(u64, s[16..24], (reduced.limbs[2] >> 26) | (reduced.limbs[3] << 25), .little);
+ std.mem.writeInt(u64, s[24..32], (reduced.limbs[3] >> 39) | (reduced.limbs[4] << 12), .little);
return s;
}
diff --git a/lib/std/crypto/25519/scalar.zig b/lib/std/crypto/25519/scalar.zig
index 1699c68e12..e7e74bf618 100644
--- a/lib/std/crypto/25519/scalar.zig
+++ b/lib/std/crypto/25519/scalar.zig
@@ -15,7 +15,7 @@ pub const zero = [_]u8{0} ** 32;
const field_order_s = s: {
var s: [32]u8 = undefined;
- mem.writeIntLittle(u256, &s, field_order);
+ mem.writeInt(u256, &s, field_order, .little);
break :s s;
};
@@ -127,9 +127,9 @@ pub const Scalar = struct {
var bytes: CompressedScalar = undefined;
var i: usize = 0;
while (i < 4) : (i += 1) {
- mem.writeIntLittle(u64, bytes[i * 7 ..][0..8], expanded.limbs[i]);
+ mem.writeInt(u64, bytes[i * 7 ..][0..8], expanded.limbs[i], .little);
}
- mem.writeIntLittle(u32, bytes[i * 7 ..][0..4], @as(u32, @intCast(expanded.limbs[i])));
+ mem.writeInt(u32, bytes[i * 7 ..][0..4], @intCast(expanded.limbs[i]), .little);
return bytes;
}
@@ -580,7 +580,7 @@ const ScalarDouble = struct {
var limbs: Limbs = undefined;
var i: usize = 0;
while (i < 9) : (i += 1) {
- limbs[i] = mem.readIntLittle(u64, bytes[i * 7 ..][0..8]) & 0xffffffffffffff;
+ limbs[i] = mem.readInt(u64, bytes[i * 7 ..][0..8], .little) & 0xffffffffffffff;
}
limbs[i] = @as(u64, bytes[i * 7]);
return ScalarDouble{ .limbs = limbs };
@@ -590,9 +590,9 @@ const ScalarDouble = struct {
var limbs: Limbs = undefined;
var i: usize = 0;
while (i < 4) : (i += 1) {
- limbs[i] = mem.readIntLittle(u64, bytes[i * 7 ..][0..8]) & 0xffffffffffffff;
+ limbs[i] = mem.readInt(u64, bytes[i * 7 ..][0..8], .little) & 0xffffffffffffff;
}
- limbs[i] = @as(u64, mem.readIntLittle(u32, bytes[i * 7 ..][0..4]));
+ limbs[i] = @as(u64, mem.readInt(u32, bytes[i * 7 ..][0..4], .little));
@memset(limbs[5..], 0);
return ScalarDouble{ .limbs = limbs };
}
diff --git a/lib/std/crypto/Certificate.zig b/lib/std/crypto/Certificate.zig
index 1b1d4812d3..b7d24de0d6 100644
--- a/lib/std/crypto/Certificate.zig
+++ b/lib/std/crypto/Certificate.zig
@@ -1075,7 +1075,7 @@ pub const rsa = struct {
// Reject modulus below 512 bits.
// 512-bit RSA was factored in 1999, so this limit barely means anything,
// but establish some limit now to ratchet in what we can.
- const _n = Modulus.fromBytes(modulus_bytes, .Big) catch return error.CertificatePublicKeyInvalid;
+ const _n = Modulus.fromBytes(modulus_bytes, .big) catch return error.CertificatePublicKeyInvalid;
if (_n.bits() < 512) return error.CertificatePublicKeyInvalid;
// Exponent must be odd and greater than 2.
@@ -1085,7 +1085,7 @@ pub const rsa = struct {
// Windows commonly does.
// [1] https://learn.microsoft.com/en-us/windows/win32/api/wincrypt/ns-wincrypt-rsapubkey
if (pub_bytes.len > 4) return error.CertificatePublicKeyInvalid;
- const _e = Fe.fromBytes(_n, pub_bytes, .Big) catch return error.CertificatePublicKeyInvalid;
+ const _e = Fe.fromBytes(_n, pub_bytes, .big) catch return error.CertificatePublicKeyInvalid;
if (!_e.isOdd()) return error.CertificatePublicKeyInvalid;
const e_v = _e.toPrimitive(u32) catch return error.CertificatePublicKeyInvalid;
if (e_v < 2) return error.CertificatePublicKeyInvalid;
@@ -1116,10 +1116,10 @@ pub const rsa = struct {
};
fn encrypt(comptime modulus_len: usize, msg: [modulus_len]u8, public_key: PublicKey) ![modulus_len]u8 {
- const m = Fe.fromBytes(public_key.n, &msg, .Big) catch return error.MessageTooLong;
+ const m = Fe.fromBytes(public_key.n, &msg, .big) catch return error.MessageTooLong;
const e = public_key.n.powPublic(m, public_key.e) catch unreachable;
var res: [modulus_len]u8 = undefined;
- e.toBytes(&res, .Big) catch unreachable;
+ e.toBytes(&res, .big) catch unreachable;
return res;
}
};
diff --git a/lib/std/crypto/Certificate/Bundle/macos.zig b/lib/std/crypto/Certificate/Bundle/macos.zig
index 028275a06b..860c1599e4 100644
--- a/lib/std/crypto/Certificate/Bundle/macos.zig
+++ b/lib/std/crypto/Certificate/Bundle/macos.zig
@@ -32,7 +32,7 @@ pub fn rescanMac(cb: *Bundle, gpa: Allocator) RescanMacError!void {
var table_idx: u32 = 0;
while (table_idx < table_list.len) : (table_idx += 1) {
- table_list[table_idx] = try reader.readIntBig(u32);
+ table_list[table_idx] = try reader.readInt(u32, .big);
}
const now_sec = std.time.timestamp();
@@ -51,7 +51,7 @@ pub fn rescanMac(cb: *Bundle, gpa: Allocator) RescanMacError!void {
var record_idx: u32 = 0;
while (record_idx < record_list.len) : (record_idx += 1) {
- record_list[record_idx] = try reader.readIntBig(u32);
+ record_list[record_idx] = try reader.readInt(u32, .big);
}
for (record_list) |record_offset| {
diff --git a/lib/std/crypto/aegis.zig b/lib/std/crypto/aegis.zig
index 18047a13b5..9aff9f0776 100644
--- a/lib/std/crypto/aegis.zig
+++ b/lib/std/crypto/aegis.zig
@@ -106,8 +106,8 @@ const State128L = struct {
fn mac(state: *State128L, comptime tag_bits: u9, adlen: usize, mlen: usize) [tag_bits / 8]u8 {
const blocks = &state.blocks;
var sizes: [16]u8 = undefined;
- mem.writeIntLittle(u64, sizes[0..8], adlen * 8);
- mem.writeIntLittle(u64, sizes[8..16], mlen * 8);
+ mem.writeInt(u64, sizes[0..8], adlen * 8, .little);
+ mem.writeInt(u64, sizes[8..16], mlen * 8, .little);
const tmp = AesBlock.fromBytes(&sizes).xorBlocks(blocks[2]);
var i: usize = 0;
while (i < 7) : (i += 1) {
@@ -284,8 +284,8 @@ const State256 = struct {
fn mac(state: *State256, comptime tag_bits: u9, adlen: usize, mlen: usize) [tag_bits / 8]u8 {
const blocks = &state.blocks;
var sizes: [16]u8 = undefined;
- mem.writeIntLittle(u64, sizes[0..8], adlen * 8);
- mem.writeIntLittle(u64, sizes[8..16], mlen * 8);
+ mem.writeInt(u64, sizes[0..8], adlen * 8, .little);
+ mem.writeInt(u64, sizes[8..16], mlen * 8, .little);
const tmp = AesBlock.fromBytes(&sizes).xorBlocks(blocks[3]);
var i: usize = 0;
while (i < 7) : (i += 1) {
diff --git a/lib/std/crypto/aes.zig b/lib/std/crypto/aes.zig
index fb3246b0a0..c4f709d631 100644
--- a/lib/std/crypto/aes.zig
+++ b/lib/std/crypto/aes.zig
@@ -50,7 +50,7 @@ test "ctr" {
var out: [exp_out.len]u8 = undefined;
var ctx = Aes128.initEnc(key);
- ctr(AesEncryptCtx(Aes128), ctx, out[0..], in[0..], iv, std.builtin.Endian.Big);
+ ctr(AesEncryptCtx(Aes128), ctx, out[0..], in[0..], iv, std.builtin.Endian.big);
try testing.expectEqualSlices(u8, exp_out[0..], out[0..]);
}
diff --git a/lib/std/crypto/aes/soft.zig b/lib/std/crypto/aes/soft.zig
index 68a661a93a..9e7af0606d 100644
--- a/lib/std/crypto/aes/soft.zig
+++ b/lib/std/crypto/aes/soft.zig
@@ -15,20 +15,20 @@ pub const Block = struct {
/// Convert a byte sequence into an internal representation.
pub inline fn fromBytes(bytes: *const [16]u8) Block {
- const s0 = mem.readIntLittle(u32, bytes[0..4]);
- const s1 = mem.readIntLittle(u32, bytes[4..8]);
- const s2 = mem.readIntLittle(u32, bytes[8..12]);
- const s3 = mem.readIntLittle(u32, bytes[12..16]);
+ const s0 = mem.readInt(u32, bytes[0..4], .little);
+ const s1 = mem.readInt(u32, bytes[4..8], .little);
+ const s2 = mem.readInt(u32, bytes[8..12], .little);
+ const s3 = mem.readInt(u32, bytes[12..16], .little);
return Block{ .repr = BlockVec{ s0, s1, s2, s3 } };
}
/// Convert the internal representation of a block into a byte sequence.
pub inline fn toBytes(block: Block) [16]u8 {
var bytes: [16]u8 = undefined;
- mem.writeIntLittle(u32, bytes[0..4], block.repr[0]);
- mem.writeIntLittle(u32, bytes[4..8], block.repr[1]);
- mem.writeIntLittle(u32, bytes[8..12], block.repr[2]);
- mem.writeIntLittle(u32, bytes[12..16], block.repr[3]);
+ mem.writeInt(u32, bytes[0..4], block.repr[0], .little);
+ mem.writeInt(u32, bytes[4..8], block.repr[1], .little);
+ mem.writeInt(u32, bytes[8..12], block.repr[2], .little);
+ mem.writeInt(u32, bytes[12..16], block.repr[3], .little);
return bytes;
}
@@ -123,13 +123,13 @@ pub const Block = struct {
// Last round uses s-box directly and XORs to produce output.
var x: [4]u8 = undefined;
x = sbox_lookup(&sbox_encrypt, @as(u8, @truncate(s0)), @as(u8, @truncate(s1 >> 8)), @as(u8, @truncate(s2 >> 16)), @as(u8, @truncate(s3 >> 24)));
- var t0 = mem.readIntLittle(u32, &x);
+ var t0 = mem.readInt(u32, &x, .little);
x = sbox_lookup(&sbox_encrypt, @as(u8, @truncate(s1)), @as(u8, @truncate(s2 >> 8)), @as(u8, @truncate(s3 >> 16)), @as(u8, @truncate(s0 >> 24)));
- var t1 = mem.readIntLittle(u32, &x);
+ var t1 = mem.readInt(u32, &x, .little);
x = sbox_lookup(&sbox_encrypt, @as(u8, @truncate(s2)), @as(u8, @truncate(s3 >> 8)), @as(u8, @truncate(s0 >> 16)), @as(u8, @truncate(s1 >> 24)));
- var t2 = mem.readIntLittle(u32, &x);
+ var t2 = mem.readInt(u32, &x, .little);
x = sbox_lookup(&sbox_encrypt, @as(u8, @truncate(s3)), @as(u8, @truncate(s0 >> 8)), @as(u8, @truncate(s1 >> 16)), @as(u8, @truncate(s2 >> 24)));
- var t3 = mem.readIntLittle(u32, &x);
+ var t3 = mem.readInt(u32, &x, .little);
t0 ^= round_key.repr[0];
t1 ^= round_key.repr[1];
@@ -219,13 +219,13 @@ pub const Block = struct {
// Last round uses s-box directly and XORs to produce output.
var x: [4]u8 = undefined;
x = sbox_lookup(&sbox_decrypt, @as(u8, @truncate(s0)), @as(u8, @truncate(s3 >> 8)), @as(u8, @truncate(s2 >> 16)), @as(u8, @truncate(s1 >> 24)));
- var t0 = mem.readIntLittle(u32, &x);
+ var t0 = mem.readInt(u32, &x, .little);
x = sbox_lookup(&sbox_decrypt, @as(u8, @truncate(s1)), @as(u8, @truncate(s0 >> 8)), @as(u8, @truncate(s3 >> 16)), @as(u8, @truncate(s2 >> 24)));
- var t1 = mem.readIntLittle(u32, &x);
+ var t1 = mem.readInt(u32, &x, .little);
x = sbox_lookup(&sbox_decrypt, @as(u8, @truncate(s2)), @as(u8, @truncate(s1 >> 8)), @as(u8, @truncate(s0 >> 16)), @as(u8, @truncate(s3 >> 24)));
- var t2 = mem.readIntLittle(u32, &x);
+ var t2 = mem.readInt(u32, &x, .little);
x = sbox_lookup(&sbox_decrypt, @as(u8, @truncate(s3)), @as(u8, @truncate(s2 >> 8)), @as(u8, @truncate(s1 >> 16)), @as(u8, @truncate(s0 >> 24)));
- var t3 = mem.readIntLittle(u32, &x);
+ var t3 = mem.readInt(u32, &x, .little);
t0 ^= round_key.repr[0];
t1 ^= round_key.repr[1];
@@ -349,14 +349,14 @@ fn KeySchedule(comptime Aes: type) type {
// Apply sbox_encrypt to each byte in w.
fn func(w: u32) u32 {
const x = sbox_lookup(&sbox_key_schedule, @as(u8, @truncate(w)), @as(u8, @truncate(w >> 8)), @as(u8, @truncate(w >> 16)), @as(u8, @truncate(w >> 24)));
- return mem.readIntLittle(u32, &x);
+ return mem.readInt(u32, &x, .little);
}
}.func;
var round_keys: [rounds + 1]Block = undefined;
comptime var i: usize = 0;
inline while (i < words_in_key) : (i += 1) {
- round_keys[i / 4].repr[i % 4] = mem.readIntBig(u32, key[4 * i ..][0..4]);
+ round_keys[i / 4].repr[i % 4] = mem.readInt(u32, key[4 * i ..][0..4], .big);
}
inline while (i < round_keys.len * 4) : (i += 1) {
var t = round_keys[(i - 1) / 4].repr[(i - 1) % 4];
diff --git a/lib/std/crypto/aes_gcm.zig b/lib/std/crypto/aes_gcm.zig
index 1715636bed..e276c9dfd8 100644
--- a/lib/std/crypto/aes_gcm.zig
+++ b/lib/std/crypto/aes_gcm.zig
@@ -33,7 +33,7 @@ fn AesGcm(comptime Aes: anytype) type {
var t: [16]u8 = undefined;
var j: [16]u8 = undefined;
j[0..nonce_length].* = npub;
- mem.writeIntBig(u32, j[nonce_length..][0..4], 1);
+ mem.writeInt(u32, j[nonce_length..][0..4], 1, .big);
aes.encrypt(&t, &j);
const block_count = (math.divCeil(usize, ad.len, Ghash.block_length) catch unreachable) + (math.divCeil(usize, c.len, Ghash.block_length) catch unreachable) + 1;
@@ -41,14 +41,14 @@ fn AesGcm(comptime Aes: anytype) type {
mac.update(ad);
mac.pad();
- mem.writeIntBig(u32, j[nonce_length..][0..4], 2);
- modes.ctr(@TypeOf(aes), aes, c, m, j, std.builtin.Endian.Big);
+ mem.writeInt(u32, j[nonce_length..][0..4], 2, .big);
+ modes.ctr(@TypeOf(aes), aes, c, m, j, std.builtin.Endian.big);
mac.update(c[0..m.len][0..]);
mac.pad();
var final_block = h;
- mem.writeIntBig(u64, final_block[0..8], ad.len * 8);
- mem.writeIntBig(u64, final_block[8..16], m.len * 8);
+ mem.writeInt(u64, final_block[0..8], ad.len * 8, .big);
+ mem.writeInt(u64, final_block[8..16], m.len * 8, .big);
mac.update(&final_block);
mac.final(tag);
for (t, 0..) |x, i| {
@@ -75,7 +75,7 @@ fn AesGcm(comptime Aes: anytype) type {
var t: [16]u8 = undefined;
var j: [16]u8 = undefined;
j[0..nonce_length].* = npub;
- mem.writeIntBig(u32, j[nonce_length..][0..4], 1);
+ mem.writeInt(u32, j[nonce_length..][0..4], 1, .big);
aes.encrypt(&t, &j);
const block_count = (math.divCeil(usize, ad.len, Ghash.block_length) catch unreachable) + (math.divCeil(usize, c.len, Ghash.block_length) catch unreachable) + 1;
@@ -87,8 +87,8 @@ fn AesGcm(comptime Aes: anytype) type {
mac.pad();
var final_block = h;
- mem.writeIntBig(u64, final_block[0..8], ad.len * 8);
- mem.writeIntBig(u64, final_block[8..16], m.len * 8);
+ mem.writeInt(u64, final_block[0..8], ad.len * 8, .big);
+ mem.writeInt(u64, final_block[8..16], m.len * 8, .big);
mac.update(&final_block);
var computed_tag: [Ghash.mac_length]u8 = undefined;
mac.final(&computed_tag);
@@ -103,8 +103,8 @@ fn AesGcm(comptime Aes: anytype) type {
return error.AuthenticationFailed;
}
- mem.writeIntBig(u32, j[nonce_length..][0..4], 2);
- modes.ctr(@TypeOf(aes), aes, m, c, j, std.builtin.Endian.Big);
+ mem.writeInt(u32, j[nonce_length..][0..4], 2, .big);
+ modes.ctr(@TypeOf(aes), aes, m, c, j, std.builtin.Endian.big);
}
};
}
diff --git a/lib/std/crypto/aes_ocb.zig b/lib/std/crypto/aes_ocb.zig
index 26f98ff362..05353a3c82 100644
--- a/lib/std/crypto/aes_ocb.zig
+++ b/lib/std/crypto/aes_ocb.zig
@@ -29,10 +29,10 @@ fn AesOcb(comptime Aes: anytype) type {
upto: usize,
inline fn double(l: Block) Block {
- const l_ = mem.readIntBig(u128, &l);
+ const l_ = mem.readInt(u128, &l, .big);
const l_2 = (l_ << 1) ^ (0x87 & -%(l_ >> 127));
var l2: Block = undefined;
- mem.writeIntBig(u128, &l2, l_2);
+ mem.writeInt(u128, &l2, l_2, .big);
return l2;
}
@@ -94,10 +94,10 @@ fn AesOcb(comptime Aes: anytype) type {
nx[15] &= 0xc0;
var ktop_: Block = undefined;
aes_enc_ctx.encrypt(&ktop_, &nx);
- const ktop = mem.readIntBig(u128, &ktop_);
+ const ktop = mem.readInt(u128, &ktop_, .big);
var stretch = (@as(u192, ktop) << 64) | @as(u192, @as(u64, @truncate(ktop >> 64)) ^ @as(u64, @truncate(ktop >> 56)));
var offset: Block = undefined;
- mem.writeIntBig(u128, &offset, @as(u128, @truncate(stretch >> (64 - @as(u7, bottom)))));
+ mem.writeInt(u128, &offset, @as(u128, @truncate(stretch >> (64 - @as(u7, bottom)))), .big);
return offset;
}
diff --git a/lib/std/crypto/argon2.zig b/lib/std/crypto/argon2.zig
index 3625bb39fd..500bebd09c 100644
--- a/lib/std/crypto/argon2.zig
+++ b/lib/std/crypto/argon2.zig
@@ -110,27 +110,27 @@ fn initHash(
var parameters: [24]u8 = undefined;
var tmp: [4]u8 = undefined;
var b2 = Blake2b512.init(.{});
- mem.writeIntLittle(u32, parameters[0..4], params.p);
- mem.writeIntLittle(u32, parameters[4..8], @as(u32, @intCast(dk_len)));
- mem.writeIntLittle(u32, parameters[8..12], params.m);
- mem.writeIntLittle(u32, parameters[12..16], params.t);
- mem.writeIntLittle(u32, parameters[16..20], version);
- mem.writeIntLittle(u32, parameters[20..24], @intFromEnum(mode));
+ mem.writeInt(u32, parameters[0..4], params.p, .little);
+ mem.writeInt(u32, parameters[4..8], @as(u32, @intCast(dk_len)), .little);
+ mem.writeInt(u32, parameters[8..12], params.m, .little);
+ mem.writeInt(u32, parameters[12..16], params.t, .little);
+ mem.writeInt(u32, parameters[16..20], version, .little);
+ mem.writeInt(u32, parameters[20..24], @intFromEnum(mode), .little);
b2.update(&parameters);
- mem.writeIntLittle(u32, &tmp, @as(u32, @intCast(password.len)));
+ mem.writeInt(u32, &tmp, @as(u32, @intCast(password.len)), .little);
b2.update(&tmp);
b2.update(password);
- mem.writeIntLittle(u32, &tmp, @as(u32, @intCast(salt.len)));
+ mem.writeInt(u32, &tmp, @as(u32, @intCast(salt.len)), .little);
b2.update(&tmp);
b2.update(salt);
const secret = params.secret orelse "";
std.debug.assert(secret.len <= max_int);
- mem.writeIntLittle(u32, &tmp, @as(u32, @intCast(secret.len)));
+ mem.writeInt(u32, &tmp, @as(u32, @intCast(secret.len)), .little);
b2.update(&tmp);
b2.update(secret);
const ad = params.ad orelse "";
std.debug.assert(ad.len <= max_int);
- mem.writeIntLittle(u32, &tmp, @as(u32, @intCast(ad.len)));
+ mem.writeInt(u32, &tmp, @as(u32, @intCast(ad.len)), .little);
b2.update(&tmp);
b2.update(ad);
b2.final(h0[0..Blake2b512.digest_length]);
@@ -140,7 +140,7 @@ fn initHash(
fn blake2bLong(out: []u8, in: []const u8) void {
const H = Blake2b512;
var outlen_bytes: [4]u8 = undefined;
- mem.writeIntLittle(u32, &outlen_bytes, @as(u32, @intCast(out.len)));
+ mem.writeInt(u32, &outlen_bytes, @as(u32, @intCast(out.len)), .little);
var out_buf: [H.digest_length]u8 = undefined;
@@ -183,18 +183,18 @@ fn initBlocks(
var lane: u24 = 0;
while (lane < threads) : (lane += 1) {
const j = lane * (memory / threads);
- mem.writeIntLittle(u32, h0[Blake2b512.digest_length + 4 ..][0..4], lane);
+ mem.writeInt(u32, h0[Blake2b512.digest_length + 4 ..][0..4], lane, .little);
- mem.writeIntLittle(u32, h0[Blake2b512.digest_length..][0..4], 0);
+ mem.writeInt(u32, h0[Blake2b512.digest_length..][0..4], 0, .little);
blake2bLong(&block0, h0);
for (&blocks.items[j + 0], 0..) |*v, i| {
- v.* = mem.readIntLittle(u64, block0[i * 8 ..][0..8]);
+ v.* = mem.readInt(u64, block0[i * 8 ..][0..8], .little);
}
- mem.writeIntLittle(u32, h0[Blake2b512.digest_length..][0..4], 1);
+ mem.writeInt(u32, h0[Blake2b512.digest_length..][0..4], 1, .little);
blake2bLong(&block0, h0);
for (&blocks.items[j + 1], 0..) |*v, i| {
- v.* = mem.readIntLittle(u64, block0[i * 8 ..][0..8]);
+ v.* = mem.readInt(u64, block0[i * 8 ..][0..8], .little);
}
}
}
@@ -433,7 +433,7 @@ fn finalize(
}
var block: [1024]u8 = undefined;
for (blocks.items[memory - 1], 0..) |v, i| {
- mem.writeIntLittle(u64, block[i * 8 ..][0..8], v);
+ mem.writeInt(u64, block[i * 8 ..][0..8], v, .little);
}
blake2bLong(out, &block);
}
diff --git a/lib/std/crypto/ascon.zig b/lib/std/crypto/ascon.zig
index 8aa0b109f2..521f9c922e 100644
--- a/lib/std/crypto/ascon.zig
+++ b/lib/std/crypto/ascon.zig
@@ -8,11 +8,12 @@
//! It is not meant to be used directly, but as a building block for symmetric cryptography.
const std = @import("std");
-const builtin = std.builtin;
+const builtin = @import("builtin");
const debug = std.debug;
const mem = std.mem;
const testing = std.testing;
const rotr = std.math.rotr;
+const native_endian = builtin.cpu.arch.endian();
/// An Ascon state.
///
@@ -20,7 +21,7 @@ const rotr = std.math.rotr;
///
/// The NIST submission (v1.2) serializes these words as big-endian,
/// but software implementations are free to use native endianness.
-pub fn State(comptime endian: builtin.Endian) type {
+pub fn State(comptime endian: std.builtin.Endian) type {
return struct {
const Self = @This();
@@ -95,8 +96,8 @@ pub fn State(comptime endian: builtin.Endian) type {
/// XOR a byte into the state at a given offset.
pub fn addByte(self: *Self, byte: u8, offset: usize) void {
const z = switch (endian) {
- .Big => 64 - 8 - 8 * @as(u6, @truncate(offset % 8)),
- .Little => 8 * @as(u6, @truncate(offset % 8)),
+ .big => 64 - 8 - 8 * @as(u6, @truncate(offset % 8)),
+ .little => 8 * @as(u6, @truncate(offset % 8)),
};
self.st[offset / 8] ^= @as(u64, byte) << z;
}
@@ -133,14 +134,14 @@ pub fn State(comptime endian: builtin.Endian) type {
var i: usize = 0;
while (i + 8 <= in.len) : (i += 8) {
- const x = mem.readIntNative(u64, in[i..][0..8]) ^ mem.nativeTo(u64, self.st[i / 8], endian);
- mem.writeIntNative(u64, out[i..][0..8], x);
+ const x = mem.readInt(u64, in[i..][0..8], native_endian) ^ mem.nativeTo(u64, self.st[i / 8], endian);
+ mem.writeInt(u64, out[i..][0..8], x, native_endian);
}
if (i < in.len) {
var padded = [_]u8{0} ** 8;
@memcpy(padded[0 .. in.len - i], in[i..]);
- const x = mem.readIntNative(u64, &padded) ^ mem.nativeTo(u64, self.st[i / 8], endian);
- mem.writeIntNative(u64, &padded, x);
+ const x = mem.readInt(u64, &padded, native_endian) ^ mem.nativeTo(u64, self.st[i / 8], endian);
+ mem.writeInt(u64, &padded, x, native_endian);
@memcpy(out[i..], padded[0 .. in.len - i]);
}
}
@@ -214,7 +215,7 @@ pub fn State(comptime endian: builtin.Endian) type {
}
test "ascon" {
- const Ascon = State(.Big);
+ const Ascon = State(.big);
const bytes = [_]u8{0x01} ** Ascon.block_bytes;
var st = Ascon.init(bytes);
var out: [Ascon.block_bytes]u8 = undefined;
diff --git a/lib/std/crypto/bcrypt.zig b/lib/std/crypto/bcrypt.zig
index ce3a5aec79..9fc2ecb63b 100644
--- a/lib/std/crypto/bcrypt.zig
+++ b/lib/std/crypto/bcrypt.zig
@@ -451,7 +451,7 @@ pub fn bcrypt(
var ct: [ct_length]u8 = undefined;
for (cdata, 0..) |c, i| {
- mem.writeIntBig(u32, ct[i * 4 ..][0..4], c);
+ mem.writeInt(u32, ct[i * 4 ..][0..4], c, .big);
}
return ct[0..dk_length].*;
}
@@ -547,7 +547,7 @@ const pbkdf_prf = struct {
// copy out
var out: [32]u8 = undefined;
for (cdata, 0..) |v, i| {
- std.mem.writeIntLittle(u32, out[4 * i ..][0..4], v);
+ std.mem.writeInt(u32, out[4 * i ..][0..4], v, .little);
}
// zap
diff --git a/lib/std/crypto/blake2.zig b/lib/std/crypto/blake2.zig
index ba07226d08..255011de87 100644
--- a/lib/std/crypto/blake2.zig
+++ b/lib/std/crypto/blake2.zig
@@ -85,12 +85,12 @@ pub fn Blake2s(comptime out_bits: usize) type {
d.buf_len = 0;
if (options.salt) |salt| {
- d.h[4] ^= mem.readIntLittle(u32, salt[0..4]);
- d.h[5] ^= mem.readIntLittle(u32, salt[4..8]);
+ d.h[4] ^= mem.readInt(u32, salt[0..4], .little);
+ d.h[5] ^= mem.readInt(u32, salt[4..8], .little);
}
if (options.context) |context| {
- d.h[6] ^= mem.readIntLittle(u32, context[0..4]);
- d.h[7] ^= mem.readIntLittle(u32, context[4..8]);
+ d.h[6] ^= mem.readInt(u32, context[0..4], .little);
+ d.h[7] ^= mem.readInt(u32, context[4..8], .little);
}
if (key_len > 0) {
@memset(d.buf[key_len..], 0);
@@ -143,7 +143,7 @@ pub fn Blake2s(comptime out_bits: usize) type {
var v: [16]u32 = undefined;
for (&m, 0..) |*r, i| {
- r.* = mem.readIntLittle(u32, b[4 * i ..][0..4]);
+ r.* = mem.readInt(u32, b[4 * i ..][0..4], .little);
}
var k: usize = 0;
@@ -521,12 +521,12 @@ pub fn Blake2b(comptime out_bits: usize) type {
d.buf_len = 0;
if (options.salt) |salt| {
- d.h[4] ^= mem.readIntLittle(u64, salt[0..8]);
- d.h[5] ^= mem.readIntLittle(u64, salt[8..16]);
+ d.h[4] ^= mem.readInt(u64, salt[0..8], .little);
+ d.h[5] ^= mem.readInt(u64, salt[8..16], .little);
}
if (options.context) |context| {
- d.h[6] ^= mem.readIntLittle(u64, context[0..8]);
- d.h[7] ^= mem.readIntLittle(u64, context[8..16]);
+ d.h[6] ^= mem.readInt(u64, context[0..8], .little);
+ d.h[7] ^= mem.readInt(u64, context[8..16], .little);
}
if (key_len > 0) {
@memset(d.buf[key_len..], 0);
@@ -579,7 +579,7 @@ pub fn Blake2b(comptime out_bits: usize) type {
var v: [16]u64 = undefined;
for (&m, 0..) |*r, i| {
- r.* = mem.readIntLittle(u64, b[8 * i ..][0..8]);
+ r.* = mem.readInt(u64, b[8 * i ..][0..8], .little);
}
var k: usize = 0;
diff --git a/lib/std/crypto/blake3.zig b/lib/std/crypto/blake3.zig
index 6923ec378d..04becf6789 100644
--- a/lib/std/crypto/blake3.zig
+++ b/lib/std/crypto/blake3.zig
@@ -212,7 +212,7 @@ fn first8Words(words: [16]u32) [8]u32 {
fn wordsFromLittleEndianBytes(comptime count: usize, bytes: [count * 4]u8) [count]u32 {
var words: [count]u32 = undefined;
for (&words, 0..) |*word, i| {
- word.* = mem.readIntSliceLittle(u32, bytes[4 * i ..]);
+ word.* = mem.readInt(u32, bytes[4 * i ..][0..4], .little);
}
return words;
}
@@ -252,7 +252,7 @@ const Output = struct {
var word_counter: usize = 0;
while (out_word_it.next()) |out_word| {
var word_bytes: [4]u8 = undefined;
- mem.writeIntLittle(u32, &word_bytes, words[word_counter]);
+ mem.writeInt(u32, &word_bytes, words[word_counter], .little);
@memcpy(out_word, word_bytes[0..out_word.len]);
word_counter += 1;
}
diff --git a/lib/std/crypto/chacha20.zig b/lib/std/crypto/chacha20.zig
index 26743232cb..7e0c891747 100644
--- a/lib/std/crypto/chacha20.zig
+++ b/lib/std/crypto/chacha20.zig
@@ -87,10 +87,10 @@ fn ChaChaVecImpl(comptime rounds_nb: usize, comptime degree: comptime_int) type
switch (degree) {
1 => {
const constant_le = Lane{
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
};
return BlockVec{
constant_le,
@@ -101,14 +101,14 @@ fn ChaChaVecImpl(comptime rounds_nb: usize, comptime degree: comptime_int) type
},
2 => {
const constant_le = Lane{
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
};
const n1 = @addWithOverflow(d[0], 1);
return BlockVec{
@@ -123,22 +123,22 @@ fn ChaChaVecImpl(comptime rounds_nb: usize, comptime degree: comptime_int) type
const n2 = @addWithOverflow(d[0], 2);
const n3 = @addWithOverflow(d[0], 3);
const constant_le = Lane{
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
};
return BlockVec{
constant_le,
@@ -218,10 +218,10 @@ fn ChaChaVecImpl(comptime rounds_nb: usize, comptime degree: comptime_int) type
inline fn hashToBytes(comptime dm: usize, out: *[64 * dm]u8, x: BlockVec) void {
for (0..dm) |d| {
for (0..4) |i| {
- mem.writeIntLittle(u32, out[64 * d + 16 * i + 0 ..][0..4], x[i][0 + 4 * d]);
- mem.writeIntLittle(u32, out[64 * d + 16 * i + 4 ..][0..4], x[i][1 + 4 * d]);
- mem.writeIntLittle(u32, out[64 * d + 16 * i + 8 ..][0..4], x[i][2 + 4 * d]);
- mem.writeIntLittle(u32, out[64 * d + 16 * i + 12 ..][0..4], x[i][3 + 4 * d]);
+ mem.writeInt(u32, out[64 * d + 16 * i + 0 ..][0..4], x[i][0 + 4 * d], .little);
+ mem.writeInt(u32, out[64 * d + 16 * i + 4 ..][0..4], x[i][1 + 4 * d], .little);
+ mem.writeInt(u32, out[64 * d + 16 * i + 8 ..][0..4], x[i][2 + 4 * d], .little);
+ mem.writeInt(u32, out[64 * d + 16 * i + 12 ..][0..4], x[i][3 + 4 * d], .little);
}
}
}
@@ -309,20 +309,20 @@ fn ChaChaVecImpl(comptime rounds_nb: usize, comptime degree: comptime_int) type
fn hchacha20(input: [16]u8, key: [32]u8) [32]u8 {
var c: [4]u32 = undefined;
for (c, 0..) |_, i| {
- c[i] = mem.readIntLittle(u32, input[4 * i ..][0..4]);
+ c[i] = mem.readInt(u32, input[4 * i ..][0..4], .little);
}
const ctx = initContext(keyToWords(key), c);
var x: BlockVec = undefined;
chacha20Core(x[0..], ctx);
var out: [32]u8 = undefined;
- mem.writeIntLittle(u32, out[0..4], x[0][0]);
- mem.writeIntLittle(u32, out[4..8], x[0][1]);
- mem.writeIntLittle(u32, out[8..12], x[0][2]);
- mem.writeIntLittle(u32, out[12..16], x[0][3]);
- mem.writeIntLittle(u32, out[16..20], x[3][0]);
- mem.writeIntLittle(u32, out[20..24], x[3][1]);
- mem.writeIntLittle(u32, out[24..28], x[3][2]);
- mem.writeIntLittle(u32, out[28..32], x[3][3]);
+ mem.writeInt(u32, out[0..4], x[0][0], .little);
+ mem.writeInt(u32, out[4..8], x[0][1], .little);
+ mem.writeInt(u32, out[8..12], x[0][2], .little);
+ mem.writeInt(u32, out[12..16], x[0][3], .little);
+ mem.writeInt(u32, out[16..20], x[3][0], .little);
+ mem.writeInt(u32, out[20..24], x[3][1], .little);
+ mem.writeInt(u32, out[24..28], x[3][2], .little);
+ mem.writeInt(u32, out[28..32], x[3][3], .little);
return out;
}
};
@@ -336,10 +336,10 @@ fn ChaChaNonVecImpl(comptime rounds_nb: usize) type {
fn initContext(key: [8]u32, d: [4]u32) BlockVec {
const c = "expand 32-byte k";
const constant_le = comptime [4]u32{
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
};
return BlockVec{
constant_le[0], constant_le[1], constant_le[2], constant_le[3],
@@ -396,10 +396,10 @@ fn ChaChaNonVecImpl(comptime rounds_nb: usize) type {
inline fn hashToBytes(out: *[64]u8, x: BlockVec) void {
for (0..4) |i| {
- mem.writeIntLittle(u32, out[16 * i + 0 ..][0..4], x[i * 4 + 0]);
- mem.writeIntLittle(u32, out[16 * i + 4 ..][0..4], x[i * 4 + 1]);
- mem.writeIntLittle(u32, out[16 * i + 8 ..][0..4], x[i * 4 + 2]);
- mem.writeIntLittle(u32, out[16 * i + 12 ..][0..4], x[i * 4 + 3]);
+ mem.writeInt(u32, out[16 * i + 0 ..][0..4], x[i * 4 + 0], .little);
+ mem.writeInt(u32, out[16 * i + 4 ..][0..4], x[i * 4 + 1], .little);
+ mem.writeInt(u32, out[16 * i + 8 ..][0..4], x[i * 4 + 2], .little);
+ mem.writeInt(u32, out[16 * i + 12 ..][0..4], x[i * 4 + 3], .little);
}
}
@@ -477,20 +477,20 @@ fn ChaChaNonVecImpl(comptime rounds_nb: usize) type {
fn hchacha20(input: [16]u8, key: [32]u8) [32]u8 {
var c: [4]u32 = undefined;
for (c, 0..) |_, i| {
- c[i] = mem.readIntLittle(u32, input[4 * i ..][0..4]);
+ c[i] = mem.readInt(u32, input[4 * i ..][0..4], .little);
}
const ctx = initContext(keyToWords(key), c);
var x: BlockVec = undefined;
chacha20Core(x[0..], ctx);
var out: [32]u8 = undefined;
- mem.writeIntLittle(u32, out[0..4], x[0]);
- mem.writeIntLittle(u32, out[4..8], x[1]);
- mem.writeIntLittle(u32, out[8..12], x[2]);
- mem.writeIntLittle(u32, out[12..16], x[3]);
- mem.writeIntLittle(u32, out[16..20], x[12]);
- mem.writeIntLittle(u32, out[20..24], x[13]);
- mem.writeIntLittle(u32, out[24..28], x[14]);
- mem.writeIntLittle(u32, out[28..32], x[15]);
+ mem.writeInt(u32, out[0..4], x[0], .little);
+ mem.writeInt(u32, out[4..8], x[1], .little);
+ mem.writeInt(u32, out[8..12], x[2], .little);
+ mem.writeInt(u32, out[12..16], x[3], .little);
+ mem.writeInt(u32, out[16..20], x[12], .little);
+ mem.writeInt(u32, out[20..24], x[13], .little);
+ mem.writeInt(u32, out[24..28], x[14], .little);
+ mem.writeInt(u32, out[28..32], x[15], .little);
return out;
}
};
@@ -519,7 +519,7 @@ fn ChaChaImpl(comptime rounds_nb: usize) type {
fn keyToWords(key: [32]u8) [8]u32 {
var k: [8]u32 = undefined;
for (0..8) |i| {
- k[i] = mem.readIntLittle(u32, key[i * 4 ..][0..4]);
+ k[i] = mem.readInt(u32, key[i * 4 ..][0..4], .little);
}
return k;
}
@@ -552,9 +552,9 @@ fn ChaChaIETF(comptime rounds_nb: usize) type {
var d: [4]u32 = undefined;
d[0] = counter;
- d[1] = mem.readIntLittle(u32, nonce[0..4]);
- d[2] = mem.readIntLittle(u32, nonce[4..8]);
- d[3] = mem.readIntLittle(u32, nonce[8..12]);
+ d[1] = mem.readInt(u32, nonce[0..4], .little);
+ d[2] = mem.readInt(u32, nonce[4..8], .little);
+ d[3] = mem.readInt(u32, nonce[8..12], .little);
ChaChaImpl(rounds_nb).chacha20Xor(out, in, keyToWords(key), d, false);
}
@@ -564,9 +564,9 @@ fn ChaChaIETF(comptime rounds_nb: usize) type {
var d: [4]u32 = undefined;
d[0] = counter;
- d[1] = mem.readIntLittle(u32, nonce[0..4]);
- d[2] = mem.readIntLittle(u32, nonce[4..8]);
- d[3] = mem.readIntLittle(u32, nonce[8..12]);
+ d[1] = mem.readInt(u32, nonce[0..4], .little);
+ d[2] = mem.readInt(u32, nonce[4..8], .little);
+ d[3] = mem.readInt(u32, nonce[8..12], .little);
ChaChaImpl(rounds_nb).chacha20Stream(out, keyToWords(key), d, false);
}
};
@@ -592,8 +592,8 @@ fn ChaChaWith64BitNonce(comptime rounds_nb: usize) type {
var c: [4]u32 = undefined;
c[0] = @as(u32, @truncate(counter));
c[1] = @as(u32, @truncate(counter >> 32));
- c[2] = mem.readIntLittle(u32, nonce[0..4]);
- c[3] = mem.readIntLittle(u32, nonce[4..8]);
+ c[2] = mem.readInt(u32, nonce[0..4], .little);
+ c[3] = mem.readInt(u32, nonce[4..8], .little);
ChaChaImpl(rounds_nb).chacha20Xor(out, in, k, c, true);
}
@@ -605,8 +605,8 @@ fn ChaChaWith64BitNonce(comptime rounds_nb: usize) type {
var c: [4]u32 = undefined;
c[0] = @as(u32, @truncate(counter));
c[1] = @as(u32, @truncate(counter >> 32));
- c[2] = mem.readIntLittle(u32, nonce[0..4]);
- c[3] = mem.readIntLittle(u32, nonce[4..8]);
+ c[2] = mem.readInt(u32, nonce[0..4], .little);
+ c[3] = mem.readInt(u32, nonce[4..8], .little);
ChaChaImpl(rounds_nb).chacha20Stream(out, k, c, true);
}
};
@@ -672,8 +672,8 @@ fn ChaChaPoly1305(comptime rounds_nb: usize) type {
mac.update(zeros[0..padding]);
}
var lens: [16]u8 = undefined;
- mem.writeIntLittle(u64, lens[0..8], ad.len);
- mem.writeIntLittle(u64, lens[8..16], m.len);
+ mem.writeInt(u64, lens[0..8], ad.len, .little);
+ mem.writeInt(u64, lens[8..16], m.len, .little);
mac.update(lens[0..]);
mac.final(tag);
}
@@ -708,8 +708,8 @@ fn ChaChaPoly1305(comptime rounds_nb: usize) type {
mac.update(zeros[0..padding]);
}
var lens: [16]u8 = undefined;
- mem.writeIntLittle(u64, lens[0..8], ad.len);
- mem.writeIntLittle(u64, lens[8..16], c.len);
+ mem.writeInt(u64, lens[0..8], ad.len, .little);
+ mem.writeInt(u64, lens[8..16], c.len, .little);
mac.update(lens[0..]);
var computed_tag: [16]u8 = undefined;
mac.final(computed_tag[0..]);
diff --git a/lib/std/crypto/cmac.zig b/lib/std/crypto/cmac.zig
index 5f2d332c01..32ba7f4b99 100644
--- a/lib/std/crypto/cmac.zig
+++ b/lib/std/crypto/cmac.zig
@@ -76,7 +76,7 @@ pub fn Cmac(comptime BlockCipher: type) type {
fn double(l: Block) Block {
const Int = std.meta.Int(.unsigned, block_length * 8);
- const l_ = mem.readIntBig(Int, &l);
+ const l_ = mem.readInt(Int, &l, .big);
const l_2 = switch (block_length) {
8 => (l_ << 1) ^ (0x1b & -%(l_ >> 63)), // mod x^64 + x^4 + x^3 + x + 1
16 => (l_ << 1) ^ (0x87 & -%(l_ >> 127)), // mod x^128 + x^7 + x^2 + x + 1
@@ -85,7 +85,7 @@ pub fn Cmac(comptime BlockCipher: type) type {
else => @compileError("unsupported block length"),
};
var l2: Block = undefined;
- mem.writeIntBig(Int, &l2, l_2);
+ mem.writeInt(Int, &l2, l_2, .big);
return l2;
}
};
diff --git a/lib/std/crypto/ecdsa.zig b/lib/std/crypto/ecdsa.zig
index 8da7100f8f..e705fcf79b 100644
--- a/lib/std/crypto/ecdsa.zig
+++ b/lib/std/crypto/ecdsa.zig
@@ -209,17 +209,17 @@ pub fn Ecdsa(comptime Curve: type, comptime Hash: type) type {
const k = deterministicScalar(h_slice.*, self.secret_key.bytes, self.noise);
- const p = try Curve.basePoint.mul(k.toBytes(.Big), .Big);
- const xs = p.affineCoordinates().x.toBytes(.Big);
+ const p = try Curve.basePoint.mul(k.toBytes(.big), .big);
+ const xs = p.affineCoordinates().x.toBytes(.big);
const r = reduceToScalar(Curve.Fe.encoded_length, xs);
if (r.isZero()) return error.IdentityElement;
const k_inv = k.invert();
- const zrs = z.add(r.mul(try Curve.scalar.Scalar.fromBytes(self.secret_key.bytes, .Big)));
+ const zrs = z.add(r.mul(try Curve.scalar.Scalar.fromBytes(self.secret_key.bytes, .big)));
const s = k_inv.mul(zrs);
if (s.isZero()) return error.IdentityElement;
- return Signature{ .r = r.toBytes(.Big), .s = s.toBytes(.Big) };
+ return Signature{ .r = r.toBytes(.big), .s = s.toBytes(.big) };
}
};
@@ -232,8 +232,8 @@ pub fn Ecdsa(comptime Curve: type, comptime Hash: type) type {
public_key: PublicKey,
fn init(sig: Signature, public_key: PublicKey) (IdentityElementError || NonCanonicalError)!Verifier {
- const r = try Curve.scalar.Scalar.fromBytes(sig.r, .Big);
- const s = try Curve.scalar.Scalar.fromBytes(sig.s, .Big);
+ const r = try Curve.scalar.Scalar.fromBytes(sig.r, .big);
+ const s = try Curve.scalar.Scalar.fromBytes(sig.s, .big);
if (r.isZero() or s.isZero()) return error.IdentityElement;
return Verifier{
@@ -262,11 +262,11 @@ pub fn Ecdsa(comptime Curve: type, comptime Hash: type) type {
}
const s_inv = self.s.invert();
- const v1 = z.mul(s_inv).toBytes(.Little);
- const v2 = self.r.mul(s_inv).toBytes(.Little);
- const v1g = try Curve.basePoint.mulPublic(v1, .Little);
- const v2pk = try self.public_key.p.mulPublic(v2, .Little);
- const vxs = v1g.add(v2pk).affineCoordinates().x.toBytes(.Big);
+ const v1 = z.mul(s_inv).toBytes(.little);
+ const v2 = self.r.mul(s_inv).toBytes(.little);
+ const v1g = try Curve.basePoint.mulPublic(v1, .little);
+ const v2pk = try self.public_key.p.mulPublic(v2, .little);
+ const vxs = v1g.add(v2pk).affineCoordinates().x.toBytes(.big);
const vr = reduceToScalar(Curve.Fe.encoded_length, vxs);
if (!self.r.equivalent(vr)) {
return error.SignatureVerificationFailed;
@@ -295,13 +295,13 @@ pub fn Ecdsa(comptime Curve: type, comptime Hash: type) type {
}
const h = [_]u8{0x00} ** Hash.digest_length;
const k0 = [_]u8{0x01} ** SecretKey.encoded_length;
- const secret_key = deterministicScalar(h, k0, seed_).toBytes(.Big);
+ const secret_key = deterministicScalar(h, k0, seed_).toBytes(.big);
return fromSecretKey(SecretKey{ .bytes = secret_key });
}
/// Return the public key corresponding to the secret key.
pub fn fromSecretKey(secret_key: SecretKey) IdentityElementError!KeyPair {
- const public_key = try Curve.basePoint.mul(secret_key.bytes, .Big);
+ const public_key = try Curve.basePoint.mul(secret_key.bytes, .big);
return KeyPair{ .secret_key = secret_key, .public_key = PublicKey{ .p = public_key } };
}
@@ -326,11 +326,11 @@ pub fn Ecdsa(comptime Curve: type, comptime Hash: type) type {
if (unreduced_len >= 48) {
var xs = [_]u8{0} ** 64;
@memcpy(xs[xs.len - s.len ..], s[0..]);
- return Curve.scalar.Scalar.fromBytes64(xs, .Big);
+ return Curve.scalar.Scalar.fromBytes64(xs, .big);
}
var xs = [_]u8{0} ** 48;
@memcpy(xs[xs.len - s.len ..], s[0..]);
- return Curve.scalar.Scalar.fromBytes48(xs, .Big);
+ return Curve.scalar.Scalar.fromBytes48(xs, .big);
}
// Create a deterministic scalar according to a secret key and optional noise.
@@ -362,7 +362,7 @@ pub fn Ecdsa(comptime Curve: type, comptime Hash: type) type {
Hmac.create(m_v, m_v, &k);
@memcpy(t[t_off..t_end], m_v[0 .. t_end - t_off]);
}
- if (Curve.scalar.Scalar.fromBytes(t, .Big)) |s| return s else |_| {}
+ if (Curve.scalar.Scalar.fromBytes(t, .big)) |s| return s else |_| {}
m_i.* = 0x00;
Hmac.create(&k, m[0 .. m_v.len + 1], &k);
Hmac.create(m_v, m_v, &k);
diff --git a/lib/std/crypto/ff.zig b/lib/std/crypto/ff.zig
index e00a3741da..932575e936 100644
--- a/lib/std/crypto/ff.zig
+++ b/lib/std/crypto/ff.zig
@@ -137,8 +137,8 @@ pub fn Uint(comptime max_bits: comptime_int) type {
@memset(bytes, 0);
var shift: usize = 0;
var out_i: usize = switch (endian) {
- .Big => bytes.len - 1,
- .Little => 0,
+ .big => bytes.len - 1,
+ .little => 0,
};
for (0..self.limbs.len) |i| {
var remaining_bits = t_bits;
@@ -150,7 +150,7 @@ pub fn Uint(comptime max_bits: comptime_int) type {
remaining_bits -= consumed;
shift = 0;
switch (endian) {
- .Big => {
+ .big => {
if (out_i == 0) {
if (i != self.limbs.len - 1 or limb != 0) {
return error.Overflow;
@@ -159,7 +159,7 @@ pub fn Uint(comptime max_bits: comptime_int) type {
}
out_i -= 1;
},
- .Little => {
+ .little => {
out_i += 1;
if (out_i == bytes.len) {
if (i != self.limbs.len - 1 or limb != 0) {
@@ -182,8 +182,8 @@ pub fn Uint(comptime max_bits: comptime_int) type {
var out = Self.zero;
var out_i: usize = 0;
var i: usize = switch (endian) {
- .Big => bytes.len - 1,
- .Little => 0,
+ .big => bytes.len - 1,
+ .little => 0,
};
while (true) {
const bi = bytes[i];
@@ -203,11 +203,11 @@ pub fn Uint(comptime max_bits: comptime_int) type {
out.limbs.set(out_i, overflow);
}
switch (endian) {
- .Big => {
+ .big => {
if (i == 0) break;
i -= 1;
},
- .Little => {
+ .little => {
i += 1;
if (i == bytes.len) break;
},
@@ -227,7 +227,7 @@ pub fn Uint(comptime max_bits: comptime_int) type {
Limb,
x.limbs.constSlice(),
y.limbs.constSlice(),
- .Little,
+ .little,
);
}
@@ -667,15 +667,15 @@ pub fn Modulus(comptime max_bits: comptime_int) type {
var out = self.one();
self.toMontgomery(&out) catch unreachable;
- if (public and e.len < 3 or (e.len == 3 and e[if (endian == .Big) 0 else 2] <= 0b1111)) {
+ if (public and e.len < 3 or (e.len == 3 and e[if (endian == .big) 0 else 2] <= 0b1111)) {
// Do not use a precomputation table for short, public exponents
var x_m = x;
if (x.montgomery == false) {
self.toMontgomery(&x_m) catch unreachable;
}
var s = switch (endian) {
- .Big => 0,
- .Little => e.len - 1,
+ .big => 0,
+ .little => e.len - 1,
};
while (true) {
const b = e[s];
@@ -690,11 +690,11 @@ pub fn Modulus(comptime max_bits: comptime_int) type {
if (j == 0) break;
}
switch (endian) {
- .Big => {
+ .big => {
s += 1;
if (s == e.len) break;
},
- .Little => {
+ .little => {
if (s == 0) break;
s -= 1;
},
@@ -711,8 +711,8 @@ pub fn Modulus(comptime max_bits: comptime_int) type {
}
var t0 = self.zero;
var s = switch (endian) {
- .Big => 0,
- .Little => e.len - 1,
+ .big => 0,
+ .little => e.len - 1,
};
while (true) {
const b = e[s];
@@ -737,11 +737,11 @@ pub fn Modulus(comptime max_bits: comptime_int) type {
}
}
switch (endian) {
- .Big => {
+ .big => {
s += 1;
if (s == e.len) break;
},
- .Little => {
+ .little => {
if (s == 0) break;
s -= 1;
},
@@ -791,10 +791,10 @@ pub fn Modulus(comptime max_bits: comptime_int) type {
var e_normalized = Fe{ .v = e.v.normalize() };
var buf_: [Fe.encoded_bytes]u8 = undefined;
var buf = buf_[0 .. math.divCeil(usize, e_normalized.v.limbs_count() * t_bits, 8) catch unreachable];
- e_normalized.toBytes(buf, .Little) catch unreachable;
+ e_normalized.toBytes(buf, .little) catch unreachable;
const leading = @clz(e_normalized.v.limbs.get(e_normalized.v.limbs_count() - carry_bits));
buf = buf[0 .. buf.len - leading / 8];
- return self.powWithEncodedPublicExponent(x, buf, .Little);
+ return self.powWithEncodedPublicExponent(x, buf, .little);
}
/// Returns x^e (mod m), with the exponent provided as a byte string.
diff --git a/lib/std/crypto/ghash_polyval.zig b/lib/std/crypto/ghash_polyval.zig
index 47e2a65a94..6949553ad5 100644
--- a/lib/std/crypto/ghash_polyval.zig
+++ b/lib/std/crypto/ghash_polyval.zig
@@ -13,7 +13,7 @@ const Precomp = u128;
/// It is not a general purpose hash function - The key must be secret, unpredictable and never reused.
///
/// GHASH is typically used to compute the authentication tag in the AES-GCM construction.
-pub const Ghash = Hash(.Big, true);
+pub const Ghash = Hash(.big, true);
/// POLYVAL is a universal hash function that uses multiplication by a fixed
/// parameter within a Galois field.
@@ -21,7 +21,7 @@ pub const Ghash = Hash(.Big, true);
/// It is not a general purpose hash function - The key must be secret, unpredictable and never reused.
///
/// POLYVAL is typically used to compute the authentication tag in the AES-GCM-SIV construction.
-pub const Polyval = Hash(.Little, false);
+pub const Polyval = Hash(.little, false);
fn Hash(comptime endian: std.builtin.Endian, comptime shift_key: bool) type {
return struct {
diff --git a/lib/std/crypto/isap.zig b/lib/std/crypto/isap.zig
index 0f27625a30..2db733a8ac 100644
--- a/lib/std/crypto/isap.zig
+++ b/lib/std/crypto/isap.zig
@@ -4,7 +4,7 @@ const debug = std.debug;
const mem = std.mem;
const math = std.math;
const testing = std.testing;
-const Ascon = crypto.core.Ascon(.Big);
+const Ascon = crypto.core.Ascon(.big);
const AuthenticationError = crypto.errors.AuthenticationError;
/// ISAPv2 is an authenticated encryption system hardened against side channels and fault attacks.
@@ -55,9 +55,9 @@ pub const IsapA128A = struct {
fn trickle(k: [16]u8, iv: [8]u8, y: []const u8, comptime out_len: usize) [out_len]u8 {
var isap = IsapA128A{
.st = Ascon.initFromWords(.{
- mem.readIntBig(u64, k[0..8]),
- mem.readIntBig(u64, k[8..16]),
- mem.readIntBig(u64, iv[0..8]),
+ mem.readInt(u64, k[0..8], .big),
+ mem.readInt(u64, k[8..16], .big),
+ mem.readInt(u64, iv[0..8], .big),
0,
0,
}),
@@ -85,9 +85,9 @@ pub const IsapA128A = struct {
fn mac(c: []const u8, ad: []const u8, npub: [16]u8, key: [16]u8) [16]u8 {
var isap = IsapA128A{
.st = Ascon.initFromWords(.{
- mem.readIntBig(u64, npub[0..8]),
- mem.readIntBig(u64, npub[8..16]),
- mem.readIntBig(u64, iv1[0..]),
+ mem.readInt(u64, npub[0..8], .big),
+ mem.readInt(u64, npub[8..16], .big),
+ mem.readInt(u64, iv1[0..], .big),
0,
0,
}),
@@ -116,11 +116,11 @@ pub const IsapA128A = struct {
const nb = trickle(key, iv3, npub[0..], 24);
var isap = IsapA128A{
.st = Ascon.initFromWords(.{
- mem.readIntBig(u64, nb[0..8]),
- mem.readIntBig(u64, nb[8..16]),
- mem.readIntBig(u64, nb[16..24]),
- mem.readIntBig(u64, npub[0..8]),
- mem.readIntBig(u64, npub[8..16]),
+ mem.readInt(u64, nb[0..8], .big),
+ mem.readInt(u64, nb[8..16], .big),
+ mem.readInt(u64, nb[16..24], .big),
+ mem.readInt(u64, npub[0..8], .big),
+ mem.readInt(u64, npub[8..16], .big),
}),
};
isap.st.permuteR(6);
diff --git a/lib/std/crypto/keccak_p.zig b/lib/std/crypto/keccak_p.zig
index f877a5f135..d04373269e 100644
--- a/lib/std/crypto/keccak_p.zig
+++ b/lib/std/crypto/keccak_p.zig
@@ -1,7 +1,9 @@
const std = @import("std");
+const builtin = @import("builtin");
const assert = std.debug.assert;
const math = std.math;
const mem = std.mem;
+const native_endian = builtin.cpu.arch.endian();
/// The Keccak-f permutation.
pub fn KeccakF(comptime f: u11) type {
@@ -43,7 +45,7 @@ pub fn KeccakF(comptime f: u11) type {
pub fn init(bytes: [block_bytes]u8) Self {
var self: Self = undefined;
inline for (&self.st, 0..) |*r, i| {
- r.* = mem.readIntLittle(T, bytes[@sizeOf(T) * i ..][0..@sizeOf(T)]);
+ r.* = mem.readInt(T, bytes[@sizeOf(T) * i ..][0..@sizeOf(T)], .little);
}
return self;
}
@@ -64,12 +66,12 @@ pub fn KeccakF(comptime f: u11) type {
pub fn setBytes(self: *Self, bytes: []const u8) void {
var i: usize = 0;
while (i + @sizeOf(T) <= bytes.len) : (i += @sizeOf(T)) {
- self.st[i / @sizeOf(T)] = mem.readIntLittle(T, bytes[i..][0..@sizeOf(T)]);
+ self.st[i / @sizeOf(T)] = mem.readInt(T, bytes[i..][0..@sizeOf(T)], .little);
}
if (i < bytes.len) {
var padded = [_]u8{0} ** @sizeOf(T);
@memcpy(padded[0 .. bytes.len - i], bytes[i..]);
- self.st[i / @sizeOf(T)] = mem.readIntLittle(T, padded[0..]);
+ self.st[i / @sizeOf(T)] = mem.readInt(T, padded[0..], .little);
}
}
@@ -83,12 +85,12 @@ pub fn KeccakF(comptime f: u11) type {
pub fn addBytes(self: *Self, bytes: []const u8) void {
var i: usize = 0;
while (i + @sizeOf(T) <= bytes.len) : (i += @sizeOf(T)) {
- self.st[i / @sizeOf(T)] ^= mem.readIntLittle(T, bytes[i..][0..@sizeOf(T)]);
+ self.st[i / @sizeOf(T)] ^= mem.readInt(T, bytes[i..][0..@sizeOf(T)], .little);
}
if (i < bytes.len) {
var padded = [_]u8{0} ** @sizeOf(T);
@memcpy(padded[0 .. bytes.len - i], bytes[i..]);
- self.st[i / @sizeOf(T)] ^= mem.readIntLittle(T, padded[0..]);
+ self.st[i / @sizeOf(T)] ^= mem.readInt(T, padded[0..], .little);
}
}
@@ -96,11 +98,11 @@ pub fn KeccakF(comptime f: u11) type {
pub fn extractBytes(self: *Self, out: []u8) void {
var i: usize = 0;
while (i + @sizeOf(T) <= out.len) : (i += @sizeOf(T)) {
- mem.writeIntLittle(T, out[i..][0..@sizeOf(T)], self.st[i / @sizeOf(T)]);
+ mem.writeInt(T, out[i..][0..@sizeOf(T)], self.st[i / @sizeOf(T)], .little);
}
if (i < out.len) {
var padded = [_]u8{0} ** @sizeOf(T);
- mem.writeIntLittle(T, padded[0..], self.st[i / @sizeOf(T)]);
+ mem.writeInt(T, padded[0..], self.st[i / @sizeOf(T)], .little);
@memcpy(out[i..], padded[0 .. out.len - i]);
}
}
@@ -111,14 +113,14 @@ pub fn KeccakF(comptime f: u11) type {
var i: usize = 0;
while (i + @sizeOf(T) <= in.len) : (i += @sizeOf(T)) {
- const x = mem.readIntNative(T, in[i..][0..@sizeOf(T)]) ^ mem.nativeToLittle(T, self.st[i / @sizeOf(T)]);
- mem.writeIntNative(T, out[i..][0..@sizeOf(T)], x);
+ const x = mem.readInt(T, in[i..][0..@sizeOf(T)], native_endian) ^ mem.nativeToLittle(T, self.st[i / @sizeOf(T)]);
+ mem.writeInt(T, out[i..][0..@sizeOf(T)], x, native_endian);
}
if (i < in.len) {
var padded = [_]u8{0} ** @sizeOf(T);
@memcpy(padded[0 .. in.len - i], in[i..]);
- const x = mem.readIntNative(T, &padded) ^ mem.nativeToLittle(T, self.st[i / @sizeOf(T)]);
- mem.writeIntNative(T, &padded, x);
+ const x = mem.readInt(T, &padded, native_endian) ^ mem.nativeToLittle(T, self.st[i / @sizeOf(T)]);
+ mem.writeInt(T, &padded, x, native_endian);
@memcpy(out[i..], padded[0 .. in.len - i]);
}
}
diff --git a/lib/std/crypto/md5.zig b/lib/std/crypto/md5.zig
index 839c7b5ed8..2fcdbbcc8c 100644
--- a/lib/std/crypto/md5.zig
+++ b/lib/std/crypto/md5.zig
@@ -112,7 +112,7 @@ pub const Md5 = struct {
d.round(d.buf[0..]);
for (d.s, 0..) |s, j| {
- mem.writeIntLittle(u32, out[4 * j ..][0..4], s);
+ mem.writeInt(u32, out[4 * j ..][0..4], s, .little);
}
}
@@ -121,7 +121,7 @@ pub const Md5 = struct {
var i: usize = 0;
while (i < 16) : (i += 1) {
- s[i] = mem.readIntLittle(u32, b[i * 4 ..][0..4]);
+ s[i] = mem.readInt(u32, b[i * 4 ..][0..4], .little);
}
var v: [4]u32 = [_]u32{
diff --git a/lib/std/crypto/pcurves/common.zig b/lib/std/crypto/pcurves/common.zig
index edc437517c..4a6815ae05 100644
--- a/lib/std/crypto/pcurves/common.zig
+++ b/lib/std/crypto/pcurves/common.zig
@@ -51,13 +51,13 @@ pub fn Field(comptime params: FieldParams) type {
/// Reject non-canonical encodings of an element.
pub fn rejectNonCanonical(s_: [encoded_length]u8, endian: std.builtin.Endian) NonCanonicalError!void {
- var s = if (endian == .Little) s_ else orderSwap(s_);
+ var s = if (endian == .little) s_ else orderSwap(s_);
const field_order_s = comptime fos: {
var fos: [encoded_length]u8 = undefined;
- mem.writeIntLittle(std.meta.Int(.unsigned, encoded_length * 8), &fos, field_order);
+ mem.writeInt(std.meta.Int(.unsigned, encoded_length * 8), &fos, field_order, .little);
break :fos fos;
};
- if (crypto.utils.timingSafeCompare(u8, &s, &field_order_s, .Little) != .lt) {
+ if (crypto.utils.timingSafeCompare(u8, &s, &field_order_s, .little) != .lt) {
return error.NonCanonical;
}
}
@@ -71,8 +71,8 @@ pub fn Field(comptime params: FieldParams) type {
/// Unpack a field element.
pub fn fromBytes(s_: [encoded_length]u8, endian: std.builtin.Endian) NonCanonicalError!Fe {
- var s = if (endian == .Little) s_ else orderSwap(s_);
- try rejectNonCanonical(s, .Little);
+ var s = if (endian == .little) s_ else orderSwap(s_);
+ try rejectNonCanonical(s, .little);
var limbs_z: NonMontgomeryDomainFieldElement = undefined;
fiat.fromBytes(&limbs_z, s);
var limbs: MontgomeryDomainFieldElement = undefined;
@@ -86,7 +86,7 @@ pub fn Field(comptime params: FieldParams) type {
fiat.fromMontgomery(&limbs_z, fe.limbs);
var s: [encoded_length]u8 = undefined;
fiat.toBytes(&s, limbs_z);
- return if (endian == .Little) s else orderSwap(s);
+ return if (endian == .little) s else orderSwap(s);
}
/// Element as an integer.
@@ -95,14 +95,14 @@ pub fn Field(comptime params: FieldParams) type {
/// Create a field element from an integer.
pub fn fromInt(comptime x: IntRepr) NonCanonicalError!Fe {
var s: [encoded_length]u8 = undefined;
- mem.writeIntLittle(IntRepr, &s, x);
- return fromBytes(s, .Little);
+ mem.writeInt(IntRepr, &s, x, .little);
+ return fromBytes(s, .little);
}
/// Return the field element as an integer.
pub fn toInt(fe: Fe) IntRepr {
- const s = fe.toBytes(.Little);
- return mem.readIntLittle(IntRepr, &s);
+ const s = fe.toBytes(.little);
+ return mem.readInt(IntRepr, &s, .little);
}
/// Return true if the field element is zero.
@@ -119,7 +119,7 @@ pub fn Field(comptime params: FieldParams) type {
/// Return true if the element is odd.
pub fn isOdd(fe: Fe) bool {
- const s = fe.toBytes(.Little);
+ const s = fe.toBytes(.little);
return @as(u1, @truncate(s[0])) != 0;
}
diff --git a/lib/std/crypto/pcurves/p256.zig b/lib/std/crypto/pcurves/p256.zig
index 87c963f834..37f16715f4 100644
--- a/lib/std/crypto/pcurves/p256.zig
+++ b/lib/std/crypto/pcurves/p256.zig
@@ -87,15 +87,15 @@ pub const P256 = struct {
},
2, 3 => {
if (encoded.len != 32) return error.InvalidEncoding;
- const x = try Fe.fromBytes(encoded[0..32].*, .Big);
+ const x = try Fe.fromBytes(encoded[0..32].*, .big);
const y_is_odd = (encoding_type == 3);
const y = try recoverY(x, y_is_odd);
return P256{ .x = x, .y = y };
},
4 => {
if (encoded.len != 64) return error.InvalidEncoding;
- const x = try Fe.fromBytes(encoded[0..32].*, .Big);
- const y = try Fe.fromBytes(encoded[32..64].*, .Big);
+ const x = try Fe.fromBytes(encoded[0..32].*, .big);
+ const y = try Fe.fromBytes(encoded[32..64].*, .big);
return P256.fromAffineCoordinates(.{ .x = x, .y = y });
},
else => return error.InvalidEncoding,
@@ -107,7 +107,7 @@ pub const P256 = struct {
var out: [33]u8 = undefined;
const xy = p.affineCoordinates();
out[0] = if (xy.y.isOdd()) 3 else 2;
- out[1..].* = xy.x.toBytes(.Big);
+ out[1..].* = xy.x.toBytes(.big);
return out;
}
@@ -116,15 +116,15 @@ pub const P256 = struct {
var out: [65]u8 = undefined;
out[0] = 4;
const xy = p.affineCoordinates();
- out[1..33].* = xy.x.toBytes(.Big);
- out[33..65].* = xy.y.toBytes(.Big);
+ out[1..33].* = xy.x.toBytes(.big);
+ out[33..65].* = xy.y.toBytes(.big);
return out;
}
/// Return a random point.
pub fn random() P256 {
- const n = scalar.random(.Little);
- return basePoint.mul(n, .Little) catch unreachable;
+ const n = scalar.random(.little);
+ return basePoint.mul(n, .little) catch unreachable;
}
/// Flip the sign of the X coordinate.
@@ -400,7 +400,7 @@ pub const P256 = struct {
/// Multiply an elliptic curve point by a scalar.
/// Return error.IdentityElement if the result is the identity element.
pub fn mul(p: P256, s_: [32]u8, endian: std.builtin.Endian) IdentityElementError!P256 {
- const s = if (endian == .Little) s_ else Fe.orderSwap(s_);
+ const s = if (endian == .little) s_ else Fe.orderSwap(s_);
if (p.is_base) {
return pcMul16(&basePointPc, s, false);
}
@@ -412,7 +412,7 @@ pub const P256 = struct {
/// Multiply an elliptic curve point by a *PUBLIC* scalar *IN VARIABLE TIME*
/// This can be used for signature verification.
pub fn mulPublic(p: P256, s_: [32]u8, endian: std.builtin.Endian) IdentityElementError!P256 {
- const s = if (endian == .Little) s_ else Fe.orderSwap(s_);
+ const s = if (endian == .little) s_ else Fe.orderSwap(s_);
if (p.is_base) {
return pcMul16(&basePointPc, s, true);
}
@@ -424,8 +424,8 @@ pub const P256 = struct {
/// Double-base multiplication of public parameters - Compute (p1*s1)+(p2*s2) *IN VARIABLE TIME*
/// This can be used for signature verification.
pub fn mulDoubleBasePublic(p1: P256, s1_: [32]u8, p2: P256, s2_: [32]u8, endian: std.builtin.Endian) IdentityElementError!P256 {
- const s1 = if (endian == .Little) s1_ else Fe.orderSwap(s1_);
- const s2 = if (endian == .Little) s2_ else Fe.orderSwap(s2_);
+ const s1 = if (endian == .little) s1_ else Fe.orderSwap(s1_);
+ const s2 = if (endian == .little) s2_ else Fe.orderSwap(s2_);
try p1.rejectIdentity();
var pc1_array: [9]P256 = undefined;
const pc1 = if (p1.is_base) basePointPc[0..9] else pc: {
diff --git a/lib/std/crypto/pcurves/p256/scalar.zig b/lib/std/crypto/pcurves/p256/scalar.zig
index 9506a5e57a..d7d8ed5256 100644
--- a/lib/std/crypto/pcurves/p256/scalar.zig
+++ b/lib/std/crypto/pcurves/p256/scalar.zig
@@ -174,7 +174,7 @@ pub const Scalar = struct {
var s: [48]u8 = undefined;
while (true) {
crypto.random.bytes(&s);
- const n = Scalar.fromBytes48(s, .Little);
+ const n = Scalar.fromBytes48(s, .little);
if (!n.isZero()) {
return n;
}
@@ -191,7 +191,7 @@ const ScalarDouble = struct {
debug.assert(bits > 0 and bits <= 512 and bits >= Fe.saturated_bits and bits <= Fe.saturated_bits * 3);
var s = s_;
- if (endian == .Big) {
+ if (endian == .big) {
for (s_, 0..) |x, i| s[s.len - 1 - i] = x;
}
var t = ScalarDouble{ .x1 = undefined, .x2 = Fe.zero, .x3 = Fe.zero };
@@ -199,19 +199,19 @@ const ScalarDouble = struct {
var b = [_]u8{0} ** encoded_length;
const len = @min(s.len, 24);
b[0..len].* = s[0..len].*;
- t.x1 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x1 = Fe.fromBytes(b, .little) catch unreachable;
}
if (s_.len >= 24) {
var b = [_]u8{0} ** encoded_length;
const len = @min(s.len - 24, 24);
b[0..len].* = s[24..][0..len].*;
- t.x2 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x2 = Fe.fromBytes(b, .little) catch unreachable;
}
if (s_.len >= 48) {
var b = [_]u8{0} ** encoded_length;
const len = s.len - 48;
b[0..len].* = s[48..][0..len].*;
- t.x3 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x3 = Fe.fromBytes(b, .little) catch unreachable;
}
return t;
}
diff --git a/lib/std/crypto/pcurves/p384.zig b/lib/std/crypto/pcurves/p384.zig
index 9fb84625fb..6585a0adfd 100644
--- a/lib/std/crypto/pcurves/p384.zig
+++ b/lib/std/crypto/pcurves/p384.zig
@@ -87,15 +87,15 @@ pub const P384 = struct {
},
2, 3 => {
if (encoded.len != 48) return error.InvalidEncoding;
- const x = try Fe.fromBytes(encoded[0..48].*, .Big);
+ const x = try Fe.fromBytes(encoded[0..48].*, .big);
const y_is_odd = (encoding_type == 3);
const y = try recoverY(x, y_is_odd);
return P384{ .x = x, .y = y };
},
4 => {
if (encoded.len != 96) return error.InvalidEncoding;
- const x = try Fe.fromBytes(encoded[0..48].*, .Big);
- const y = try Fe.fromBytes(encoded[48..96].*, .Big);
+ const x = try Fe.fromBytes(encoded[0..48].*, .big);
+ const y = try Fe.fromBytes(encoded[48..96].*, .big);
return P384.fromAffineCoordinates(.{ .x = x, .y = y });
},
else => return error.InvalidEncoding,
@@ -107,7 +107,7 @@ pub const P384 = struct {
var out: [49]u8 = undefined;
const xy = p.affineCoordinates();
out[0] = if (xy.y.isOdd()) 3 else 2;
- out[1..].* = xy.x.toBytes(.Big);
+ out[1..].* = xy.x.toBytes(.big);
return out;
}
@@ -116,15 +116,15 @@ pub const P384 = struct {
var out: [97]u8 = undefined;
out[0] = 4;
const xy = p.affineCoordinates();
- out[1..49].* = xy.x.toBytes(.Big);
- out[49..97].* = xy.y.toBytes(.Big);
+ out[1..49].* = xy.x.toBytes(.big);
+ out[49..97].* = xy.y.toBytes(.big);
return out;
}
/// Return a random point.
pub fn random() P384 {
- const n = scalar.random(.Little);
- return basePoint.mul(n, .Little) catch unreachable;
+ const n = scalar.random(.little);
+ return basePoint.mul(n, .little) catch unreachable;
}
/// Flip the sign of the X coordinate.
@@ -400,7 +400,7 @@ pub const P384 = struct {
/// Multiply an elliptic curve point by a scalar.
/// Return error.IdentityElement if the result is the identity element.
pub fn mul(p: P384, s_: [48]u8, endian: std.builtin.Endian) IdentityElementError!P384 {
- const s = if (endian == .Little) s_ else Fe.orderSwap(s_);
+ const s = if (endian == .little) s_ else Fe.orderSwap(s_);
if (p.is_base) {
return pcMul16(&basePointPc, s, false);
}
@@ -412,7 +412,7 @@ pub const P384 = struct {
/// Multiply an elliptic curve point by a *PUBLIC* scalar *IN VARIABLE TIME*
/// This can be used for signature verification.
pub fn mulPublic(p: P384, s_: [48]u8, endian: std.builtin.Endian) IdentityElementError!P384 {
- const s = if (endian == .Little) s_ else Fe.orderSwap(s_);
+ const s = if (endian == .little) s_ else Fe.orderSwap(s_);
if (p.is_base) {
return pcMul16(&basePointPc, s, true);
}
@@ -424,8 +424,8 @@ pub const P384 = struct {
/// Double-base multiplication of public parameters - Compute (p1*s1)+(p2*s2) *IN VARIABLE TIME*
/// This can be used for signature verification.
pub fn mulDoubleBasePublic(p1: P384, s1_: [48]u8, p2: P384, s2_: [48]u8, endian: std.builtin.Endian) IdentityElementError!P384 {
- const s1 = if (endian == .Little) s1_ else Fe.orderSwap(s1_);
- const s2 = if (endian == .Little) s2_ else Fe.orderSwap(s2_);
+ const s1 = if (endian == .little) s1_ else Fe.orderSwap(s1_);
+ const s2 = if (endian == .little) s2_ else Fe.orderSwap(s2_);
try p1.rejectIdentity();
var pc1_array: [9]P384 = undefined;
const pc1 = if (p1.is_base) basePointPc[0..9] else pc: {
diff --git a/lib/std/crypto/pcurves/p384/scalar.zig b/lib/std/crypto/pcurves/p384/scalar.zig
index 499305bfec..d29d5ba655 100644
--- a/lib/std/crypto/pcurves/p384/scalar.zig
+++ b/lib/std/crypto/pcurves/p384/scalar.zig
@@ -163,7 +163,7 @@ pub const Scalar = struct {
var s: [64]u8 = undefined;
while (true) {
crypto.random.bytes(&s);
- const n = Scalar.fromBytes64(s, .Little);
+ const n = Scalar.fromBytes64(s, .little);
if (!n.isZero()) {
return n;
}
@@ -179,7 +179,7 @@ const ScalarDouble = struct {
debug.assert(bits > 0 and bits <= 512 and bits >= Fe.saturated_bits and bits <= Fe.saturated_bits * 2);
var s = s_;
- if (endian == .Big) {
+ if (endian == .big) {
for (s_, 0..) |x, i| s[s.len - 1 - i] = x;
}
var t = ScalarDouble{ .x1 = undefined, .x2 = Fe.zero };
@@ -187,13 +187,13 @@ const ScalarDouble = struct {
var b = [_]u8{0} ** encoded_length;
const len = @min(s.len, 32);
b[0..len].* = s[0..len].*;
- t.x1 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x1 = Fe.fromBytes(b, .little) catch unreachable;
}
if (s_.len >= 32) {
var b = [_]u8{0} ** encoded_length;
const len = @min(s.len - 32, 32);
b[0..len].* = s[32..][0..len].*;
- t.x2 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x2 = Fe.fromBytes(b, .little) catch unreachable;
}
return t;
}
diff --git a/lib/std/crypto/pcurves/secp256k1.zig b/lib/std/crypto/pcurves/secp256k1.zig
index b871306ade..a623e25de4 100644
--- a/lib/std/crypto/pcurves/secp256k1.zig
+++ b/lib/std/crypto/pcurves/secp256k1.zig
@@ -41,7 +41,7 @@ pub const Secp256k1 = struct {
const lambda_s = s: {
var buf: [32]u8 = undefined;
- mem.writeIntLittle(u256, &buf, Endormorphism.lambda);
+ mem.writeInt(u256, &buf, Endormorphism.lambda, .little);
break :s buf;
};
@@ -54,12 +54,12 @@ pub const Secp256k1 = struct {
pub fn splitScalar(s: [32]u8, endian: std.builtin.Endian) NonCanonicalError!SplitScalar {
const b1_neg_s = comptime s: {
var buf: [32]u8 = undefined;
- mem.writeIntLittle(u256, &buf, 303414439467246543595250775667605759171);
+ mem.writeInt(u256, &buf, 303414439467246543595250775667605759171, .little);
break :s buf;
};
const b2_neg_s = comptime s: {
var buf: [32]u8 = undefined;
- mem.writeIntLittle(u256, &buf, scalar.field_order - 64502973549206556628585045361533709077);
+ mem.writeInt(u256, &buf, scalar.field_order - 64502973549206556628585045361533709077, .little);
break :s buf;
};
const k = mem.readInt(u256, &s, endian);
@@ -72,16 +72,16 @@ pub const Secp256k1 = struct {
var buf: [32]u8 = undefined;
- mem.writeIntLittle(u256, &buf, c1);
- const c1x = try scalar.mul(buf, b1_neg_s, .Little);
+ mem.writeInt(u256, &buf, c1, .little);
+ const c1x = try scalar.mul(buf, b1_neg_s, .little);
- mem.writeIntLittle(u256, &buf, c2);
- const c2x = try scalar.mul(buf, b2_neg_s, .Little);
+ mem.writeInt(u256, &buf, c2, .little);
+ const c2x = try scalar.mul(buf, b2_neg_s, .little);
- const r2 = try scalar.add(c1x, c2x, .Little);
+ const r2 = try scalar.add(c1x, c2x, .little);
- var r1 = try scalar.mul(r2, lambda_s, .Little);
- r1 = try scalar.sub(s, r1, .Little);
+ var r1 = try scalar.mul(r2, lambda_s, .little);
+ r1 = try scalar.sub(s, r1, .little);
return SplitScalar{ .r1 = r1, .r2 = r2 };
}
@@ -140,15 +140,15 @@ pub const Secp256k1 = struct {
},
2, 3 => {
if (encoded.len != 32) return error.InvalidEncoding;
- const x = try Fe.fromBytes(encoded[0..32].*, .Big);
+ const x = try Fe.fromBytes(encoded[0..32].*, .big);
const y_is_odd = (encoding_type == 3);
const y = try recoverY(x, y_is_odd);
return Secp256k1{ .x = x, .y = y };
},
4 => {
if (encoded.len != 64) return error.InvalidEncoding;
- const x = try Fe.fromBytes(encoded[0..32].*, .Big);
- const y = try Fe.fromBytes(encoded[32..64].*, .Big);
+ const x = try Fe.fromBytes(encoded[0..32].*, .big);
+ const y = try Fe.fromBytes(encoded[32..64].*, .big);
return Secp256k1.fromAffineCoordinates(.{ .x = x, .y = y });
},
else => return error.InvalidEncoding,
@@ -160,7 +160,7 @@ pub const Secp256k1 = struct {
var out: [33]u8 = undefined;
const xy = p.affineCoordinates();
out[0] = if (xy.y.isOdd()) 3 else 2;
- out[1..].* = xy.x.toBytes(.Big);
+ out[1..].* = xy.x.toBytes(.big);
return out;
}
@@ -169,15 +169,15 @@ pub const Secp256k1 = struct {
var out: [65]u8 = undefined;
out[0] = 4;
const xy = p.affineCoordinates();
- out[1..33].* = xy.x.toBytes(.Big);
- out[33..65].* = xy.y.toBytes(.Big);
+ out[1..33].* = xy.x.toBytes(.big);
+ out[33..65].* = xy.y.toBytes(.big);
return out;
}
/// Return a random point.
pub fn random() Secp256k1 {
- const n = scalar.random(.Little);
- return basePoint.mul(n, .Little) catch unreachable;
+ const n = scalar.random(.little);
+ return basePoint.mul(n, .little) catch unreachable;
}
/// Flip the sign of the X coordinate.
@@ -428,7 +428,7 @@ pub const Secp256k1 = struct {
/// Multiply an elliptic curve point by a scalar.
/// Return error.IdentityElement if the result is the identity element.
pub fn mul(p: Secp256k1, s_: [32]u8, endian: std.builtin.Endian) IdentityElementError!Secp256k1 {
- const s = if (endian == .Little) s_ else Fe.orderSwap(s_);
+ const s = if (endian == .little) s_ else Fe.orderSwap(s_);
if (p.is_base) {
return pcMul16(&basePointPc, s, false);
}
@@ -440,24 +440,24 @@ pub const Secp256k1 = struct {
/// Multiply an elliptic curve point by a *PUBLIC* scalar *IN VARIABLE TIME*
/// This can be used for signature verification.
pub fn mulPublic(p: Secp256k1, s_: [32]u8, endian: std.builtin.Endian) (IdentityElementError || NonCanonicalError)!Secp256k1 {
- const s = if (endian == .Little) s_ else Fe.orderSwap(s_);
- const zero = comptime scalar.Scalar.zero.toBytes(.Little);
+ const s = if (endian == .little) s_ else Fe.orderSwap(s_);
+ const zero = comptime scalar.Scalar.zero.toBytes(.little);
if (mem.eql(u8, &zero, &s)) {
return error.IdentityElement;
}
const pc = precompute(p, 8);
var lambda_p = try pcMul(&pc, Endormorphism.lambda_s, true);
- var split_scalar = try Endormorphism.splitScalar(s, .Little);
+ var split_scalar = try Endormorphism.splitScalar(s, .little);
var px = p;
// If a key is negative, flip the sign to keep it half-sized,
// and flip the sign of the Y point coordinate to compensate.
if (split_scalar.r1[split_scalar.r1.len / 2] != 0) {
- split_scalar.r1 = scalar.neg(split_scalar.r1, .Little) catch zero;
+ split_scalar.r1 = scalar.neg(split_scalar.r1, .little) catch zero;
px = px.neg();
}
if (split_scalar.r2[split_scalar.r2.len / 2] != 0) {
- split_scalar.r2 = scalar.neg(split_scalar.r2, .Little) catch zero;
+ split_scalar.r2 = scalar.neg(split_scalar.r2, .little) catch zero;
lambda_p = lambda_p.neg();
}
return mulDoubleBasePublicEndo(px, split_scalar.r1, lambda_p, split_scalar.r2);
@@ -502,8 +502,8 @@ pub const Secp256k1 = struct {
/// Double-base multiplication of public parameters - Compute (p1*s1)+(p2*s2) *IN VARIABLE TIME*
/// This can be used for signature verification.
pub fn mulDoubleBasePublic(p1: Secp256k1, s1_: [32]u8, p2: Secp256k1, s2_: [32]u8, endian: std.builtin.Endian) IdentityElementError!Secp256k1 {
- const s1 = if (endian == .Little) s1_ else Fe.orderSwap(s1_);
- const s2 = if (endian == .Little) s2_ else Fe.orderSwap(s2_);
+ const s1 = if (endian == .little) s1_ else Fe.orderSwap(s1_);
+ const s2 = if (endian == .little) s2_ else Fe.orderSwap(s2_);
try p1.rejectIdentity();
var pc1_array: [9]Secp256k1 = undefined;
const pc1 = if (p1.is_base) basePointPc[0..9] else pc: {
diff --git a/lib/std/crypto/pcurves/secp256k1/scalar.zig b/lib/std/crypto/pcurves/secp256k1/scalar.zig
index 2a40c9bf96..dfb9a7f5e6 100644
--- a/lib/std/crypto/pcurves/secp256k1/scalar.zig
+++ b/lib/std/crypto/pcurves/secp256k1/scalar.zig
@@ -174,7 +174,7 @@ pub const Scalar = struct {
var s: [48]u8 = undefined;
while (true) {
crypto.random.bytes(&s);
- const n = Scalar.fromBytes48(s, .Little);
+ const n = Scalar.fromBytes48(s, .little);
if (!n.isZero()) {
return n;
}
@@ -191,7 +191,7 @@ const ScalarDouble = struct {
debug.assert(bits > 0 and bits <= 512 and bits >= Fe.saturated_bits and bits <= Fe.saturated_bits * 3);
var s = s_;
- if (endian == .Big) {
+ if (endian == .big) {
for (s_, 0..) |x, i| s[s.len - 1 - i] = x;
}
var t = ScalarDouble{ .x1 = undefined, .x2 = Fe.zero, .x3 = Fe.zero };
@@ -199,19 +199,19 @@ const ScalarDouble = struct {
var b = [_]u8{0} ** encoded_length;
const len = @min(s.len, 24);
b[0..len].* = s[0..len].*;
- t.x1 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x1 = Fe.fromBytes(b, .little) catch unreachable;
}
if (s_.len >= 24) {
var b = [_]u8{0} ** encoded_length;
const len = @min(s.len - 24, 24);
b[0..len].* = s[24..][0..len].*;
- t.x2 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x2 = Fe.fromBytes(b, .little) catch unreachable;
}
if (s_.len >= 48) {
var b = [_]u8{0} ** encoded_length;
const len = s.len - 48;
b[0..len].* = s[48..][0..len].*;
- t.x3 = Fe.fromBytes(b, .Little) catch unreachable;
+ t.x3 = Fe.fromBytes(b, .little) catch unreachable;
}
return t;
}
diff --git a/lib/std/crypto/pcurves/tests/p256.zig b/lib/std/crypto/pcurves/tests/p256.zig
index 716f730dc7..7da68044f8 100644
--- a/lib/std/crypto/pcurves/tests/p256.zig
+++ b/lib/std/crypto/pcurves/tests/p256.zig
@@ -5,12 +5,12 @@ const testing = std.testing;
const P256 = @import("../p256.zig").P256;
test "p256 ECDH key exchange" {
- const dha = P256.scalar.random(.Little);
- const dhb = P256.scalar.random(.Little);
- const dhA = try P256.basePoint.mul(dha, .Little);
- const dhB = try P256.basePoint.mul(dhb, .Little);
- const shareda = try dhA.mul(dhb, .Little);
- const sharedb = try dhB.mul(dha, .Little);
+ const dha = P256.scalar.random(.little);
+ const dhb = P256.scalar.random(.little);
+ const dhA = try P256.basePoint.mul(dha, .little);
+ const dhB = try P256.basePoint.mul(dhb, .little);
+ const shareda = try dhA.mul(dhb, .little);
+ const sharedb = try dhB.mul(dha, .little);
try testing.expect(shareda.equivalent(sharedb));
}
@@ -21,7 +21,7 @@ test "p256 point from affine coordinates" {
_ = try fmt.hexToBytes(&xs, xh);
var ys: [32]u8 = undefined;
_ = try fmt.hexToBytes(&ys, yh);
- var p = try P256.fromSerializedAffineCoordinates(xs, ys, .Big);
+ var p = try P256.fromSerializedAffineCoordinates(xs, ys, .big);
try testing.expect(p.equivalent(P256.basePoint));
}
@@ -44,7 +44,7 @@ test "p256 test vectors" {
p = p.add(P256.basePoint);
var xs: [32]u8 = undefined;
_ = try fmt.hexToBytes(&xs, xh);
- try testing.expectEqualSlices(u8, &x.toBytes(.Big), &xs);
+ try testing.expectEqualSlices(u8, &x.toBytes(.big), &xs);
}
}
@@ -61,7 +61,7 @@ test "p256 test vectors - doubling" {
p = p.dbl();
var xs: [32]u8 = undefined;
_ = try fmt.hexToBytes(&xs, xh);
- try testing.expectEqualSlices(u8, &x.toBytes(.Big), &xs);
+ try testing.expectEqualSlices(u8, &x.toBytes(.big), &xs);
}
}
@@ -80,20 +80,20 @@ test "p256 uncompressed sec1 encoding/decoding" {
}
test "p256 public key is the neutral element" {
- const n = P256.scalar.Scalar.zero.toBytes(.Little);
+ const n = P256.scalar.Scalar.zero.toBytes(.little);
const p = P256.random();
- try testing.expectError(error.IdentityElement, p.mul(n, .Little));
+ try testing.expectError(error.IdentityElement, p.mul(n, .little));
}
test "p256 public key is the neutral element (public verification)" {
- const n = P256.scalar.Scalar.zero.toBytes(.Little);
+ const n = P256.scalar.Scalar.zero.toBytes(.little);
const p = P256.random();
- try testing.expectError(error.IdentityElement, p.mulPublic(n, .Little));
+ try testing.expectError(error.IdentityElement, p.mulPublic(n, .little));
}
test "p256 field element non-canonical encoding" {
const s = [_]u8{0xff} ** 32;
- try testing.expectError(error.NonCanonical, P256.Fe.fromBytes(s, .Little));
+ try testing.expectError(error.NonCanonical, P256.Fe.fromBytes(s, .little));
}
test "p256 neutral element decoding" {
@@ -107,8 +107,8 @@ test "p256 double base multiplication" {
const p2 = P256.basePoint.dbl();
const s1 = [_]u8{0x01} ** 32;
const s2 = [_]u8{0x02} ** 32;
- const pr1 = try P256.mulDoubleBasePublic(p1, s1, p2, s2, .Little);
- const pr2 = (try p1.mul(s1, .Little)).add(try p2.mul(s2, .Little));
+ const pr1 = try P256.mulDoubleBasePublic(p1, s1, p2, s2, .little);
+ const pr2 = (try p1.mul(s1, .little)).add(try p2.mul(s2, .little));
try testing.expect(pr1.equivalent(pr2));
}
@@ -117,8 +117,8 @@ test "p256 double base multiplication with large scalars" {
const p2 = P256.basePoint.dbl();
const s1 = [_]u8{0xee} ** 32;
const s2 = [_]u8{0xdd} ** 32;
- const pr1 = try P256.mulDoubleBasePublic(p1, s1, p2, s2, .Little);
- const pr2 = (try p1.mul(s1, .Little)).add(try p2.mul(s2, .Little));
+ const pr1 = try P256.mulDoubleBasePublic(p1, s1, p2, s2, .little);
+ const pr2 = (try p1.mul(s1, .little)).add(try p2.mul(s2, .little));
try testing.expect(pr1.equivalent(pr2));
}
@@ -130,9 +130,9 @@ test "p256 scalar inverse" {
const scalar = try P256.scalar.Scalar.fromBytes(.{
0x94, 0xa1, 0xbb, 0xb1, 0x4b, 0x90, 0x6a, 0x61, 0xa2, 0x80, 0xf2, 0x45, 0xf9, 0xe9, 0x3c, 0x7f,
0x3b, 0x4a, 0x62, 0x47, 0x82, 0x4f, 0x5d, 0x33, 0xb9, 0x67, 0x07, 0x87, 0x64, 0x2a, 0x68, 0xde,
- }, .Big);
+ }, .big);
const inverse = scalar.invert();
- try std.testing.expectEqualSlices(u8, &out, &inverse.toBytes(.Big));
+ try std.testing.expectEqualSlices(u8, &out, &inverse.toBytes(.big));
}
test "p256 scalar parity" {
diff --git a/lib/std/crypto/pcurves/tests/p384.zig b/lib/std/crypto/pcurves/tests/p384.zig
index 1763cfcfa5..e51a683136 100644
--- a/lib/std/crypto/pcurves/tests/p384.zig
+++ b/lib/std/crypto/pcurves/tests/p384.zig
@@ -5,12 +5,12 @@ const testing = std.testing;
const P384 = @import("../p384.zig").P384;
test "p384 ECDH key exchange" {
- const dha = P384.scalar.random(.Little);
- const dhb = P384.scalar.random(.Little);
- const dhA = try P384.basePoint.mul(dha, .Little);
- const dhB = try P384.basePoint.mul(dhb, .Little);
- const shareda = try dhA.mul(dhb, .Little);
- const sharedb = try dhB.mul(dha, .Little);
+ const dha = P384.scalar.random(.little);
+ const dhb = P384.scalar.random(.little);
+ const dhA = try P384.basePoint.mul(dha, .little);
+ const dhB = try P384.basePoint.mul(dhb, .little);
+ const shareda = try dhA.mul(dhb, .little);
+ const sharedb = try dhB.mul(dha, .little);
try testing.expect(shareda.equivalent(sharedb));
}
@@ -21,7 +21,7 @@ test "p384 point from affine coordinates" {
_ = try fmt.hexToBytes(&xs, xh);
var ys: [48]u8 = undefined;
_ = try fmt.hexToBytes(&ys, yh);
- var p = try P384.fromSerializedAffineCoordinates(xs, ys, .Big);
+ var p = try P384.fromSerializedAffineCoordinates(xs, ys, .big);
try testing.expect(p.equivalent(P384.basePoint));
}
@@ -45,7 +45,7 @@ test "p384 test vectors" {
p = p.add(P384.basePoint);
var xs: [48]u8 = undefined;
_ = try fmt.hexToBytes(&xs, xh);
- try testing.expectEqualSlices(u8, &x.toBytes(.Big), &xs);
+ try testing.expectEqualSlices(u8, &x.toBytes(.big), &xs);
}
}
@@ -62,7 +62,7 @@ test "p384 test vectors - doubling" {
p = p.dbl();
var xs: [48]u8 = undefined;
_ = try fmt.hexToBytes(&xs, xh);
- try testing.expectEqualSlices(u8, &x.toBytes(.Big), &xs);
+ try testing.expectEqualSlices(u8, &x.toBytes(.big), &xs);
}
}
@@ -83,20 +83,20 @@ test "p384 uncompressed sec1 encoding/decoding" {
}
test "p384 public key is the neutral element" {
- const n = P384.scalar.Scalar.zero.toBytes(.Little);
+ const n = P384.scalar.Scalar.zero.toBytes(.little);
const p = P384.random();
- try testing.expectError(error.IdentityElement, p.mul(n, .Little));
+ try testing.expectError(error.IdentityElement, p.mul(n, .little));
}
test "p384 public key is the neutral element (public verification)" {
- const n = P384.scalar.Scalar.zero.toBytes(.Little);
+ const n = P384.scalar.Scalar.zero.toBytes(.little);
const p = P384.random();
- try testing.expectError(error.IdentityElement, p.mulPublic(n, .Little));
+ try testing.expectError(error.IdentityElement, p.mulPublic(n, .little));
}
test "p384 field element non-canonical encoding" {
const s = [_]u8{0xff} ** 48;
- try testing.expectError(error.NonCanonical, P384.Fe.fromBytes(s, .Little));
+ try testing.expectError(error.NonCanonical, P384.Fe.fromBytes(s, .little));
}
test "p384 neutral element decoding" {
@@ -110,8 +110,8 @@ test "p384 double base multiplication" {
const p2 = P384.basePoint.dbl();
const s1 = [_]u8{0x01} ** 48;
const s2 = [_]u8{0x02} ** 48;
- const pr1 = try P384.mulDoubleBasePublic(p1, s1, p2, s2, .Little);
- const pr2 = (try p1.mul(s1, .Little)).add(try p2.mul(s2, .Little));
+ const pr1 = try P384.mulDoubleBasePublic(p1, s1, p2, s2, .little);
+ const pr2 = (try p1.mul(s1, .little)).add(try p2.mul(s2, .little));
try testing.expect(pr1.equivalent(pr2));
}
@@ -120,8 +120,8 @@ test "p384 double base multiplication with large scalars" {
const p2 = P384.basePoint.dbl();
const s1 = [_]u8{0xee} ** 48;
const s2 = [_]u8{0xdd} ** 48;
- const pr1 = try P384.mulDoubleBasePublic(p1, s1, p2, s2, .Little);
- const pr2 = (try p1.mul(s1, .Little)).add(try p2.mul(s2, .Little));
+ const pr1 = try P384.mulDoubleBasePublic(p1, s1, p2, s2, .little);
+ const pr2 = (try p1.mul(s1, .little)).add(try p2.mul(s2, .little));
try testing.expect(pr1.equivalent(pr2));
}
@@ -134,10 +134,10 @@ test "p384 scalar inverse" {
0x94, 0xa1, 0xbb, 0xb1, 0x4b, 0x90, 0x6a, 0x61, 0xa2, 0x80, 0xf2, 0x45, 0xf9, 0xe9, 0x3c, 0x7f,
0x3b, 0x4a, 0x62, 0x47, 0x82, 0x4f, 0x5d, 0x33, 0xb9, 0x67, 0x07, 0x87, 0x64, 0x2a, 0x68, 0xde,
0x38, 0x36, 0xe8, 0x0f, 0xa2, 0x84, 0x6b, 0x4e, 0xf3, 0x9a, 0x02, 0x31, 0x24, 0x41, 0x22, 0xca,
- }, .Big);
+ }, .big);
const inverse = scalar.invert();
const inverse2 = inverse.invert();
- try testing.expectEqualSlices(u8, &out, &inverse.toBytes(.Big));
+ try testing.expectEqualSlices(u8, &out, &inverse.toBytes(.big));
try testing.expect(inverse2.equivalent(scalar));
const sq = scalar.sq();
diff --git a/lib/std/crypto/pcurves/tests/secp256k1.zig b/lib/std/crypto/pcurves/tests/secp256k1.zig
index b651f01e04..0fb2a13cf8 100644
--- a/lib/std/crypto/pcurves/tests/secp256k1.zig
+++ b/lib/std/crypto/pcurves/tests/secp256k1.zig
@@ -5,22 +5,22 @@ const testing = std.testing;
const Secp256k1 = @import("../secp256k1.zig").Secp256k1;
test "secp256k1 ECDH key exchange" {
- const dha = Secp256k1.scalar.random(.Little);
- const dhb = Secp256k1.scalar.random(.Little);
- const dhA = try Secp256k1.basePoint.mul(dha, .Little);
- const dhB = try Secp256k1.basePoint.mul(dhb, .Little);
- const shareda = try dhA.mul(dhb, .Little);
- const sharedb = try dhB.mul(dha, .Little);
+ const dha = Secp256k1.scalar.random(.little);
+ const dhb = Secp256k1.scalar.random(.little);
+ const dhA = try Secp256k1.basePoint.mul(dha, .little);
+ const dhB = try Secp256k1.basePoint.mul(dhb, .little);
+ const shareda = try dhA.mul(dhb, .little);
+ const sharedb = try dhB.mul(dha, .little);
try testing.expect(shareda.equivalent(sharedb));
}
test "secp256k1 ECDH key exchange including public multiplication" {
- const dha = Secp256k1.scalar.random(.Little);
- const dhb = Secp256k1.scalar.random(.Little);
- const dhA = try Secp256k1.basePoint.mul(dha, .Little);
- const dhB = try Secp256k1.basePoint.mulPublic(dhb, .Little);
- const shareda = try dhA.mul(dhb, .Little);
- const sharedb = try dhB.mulPublic(dha, .Little);
+ const dha = Secp256k1.scalar.random(.little);
+ const dhb = Secp256k1.scalar.random(.little);
+ const dhA = try Secp256k1.basePoint.mul(dha, .little);
+ const dhB = try Secp256k1.basePoint.mulPublic(dhb, .little);
+ const shareda = try dhA.mul(dhb, .little);
+ const sharedb = try dhB.mulPublic(dha, .little);
try testing.expect(shareda.equivalent(sharedb));
}
@@ -31,7 +31,7 @@ test "secp256k1 point from affine coordinates" {
_ = try fmt.hexToBytes(&xs, xh);
var ys: [32]u8 = undefined;
_ = try fmt.hexToBytes(&ys, yh);
- var p = try Secp256k1.fromSerializedAffineCoordinates(xs, ys, .Big);
+ var p = try Secp256k1.fromSerializedAffineCoordinates(xs, ys, .big);
try testing.expect(p.equivalent(Secp256k1.basePoint));
}
@@ -54,7 +54,7 @@ test "secp256k1 test vectors" {
p = p.add(Secp256k1.basePoint);
var xs: [32]u8 = undefined;
_ = try fmt.hexToBytes(&xs, xh);
- try testing.expectEqualSlices(u8, &x.toBytes(.Big), &xs);
+ try testing.expectEqualSlices(u8, &x.toBytes(.big), &xs);
}
}
@@ -72,7 +72,7 @@ test "secp256k1 test vectors - doubling" {
p = p.dbl();
var xs: [32]u8 = undefined;
_ = try fmt.hexToBytes(&xs, xh);
- try testing.expectEqualSlices(u8, &x.toBytes(.Big), &xs);
+ try testing.expectEqualSlices(u8, &x.toBytes(.big), &xs);
}
}
@@ -91,20 +91,20 @@ test "secp256k1 uncompressed sec1 encoding/decoding" {
}
test "secp256k1 public key is the neutral element" {
- const n = Secp256k1.scalar.Scalar.zero.toBytes(.Little);
+ const n = Secp256k1.scalar.Scalar.zero.toBytes(.little);
const p = Secp256k1.random();
- try testing.expectError(error.IdentityElement, p.mul(n, .Little));
+ try testing.expectError(error.IdentityElement, p.mul(n, .little));
}
test "secp256k1 public key is the neutral element (public verification)" {
- const n = Secp256k1.scalar.Scalar.zero.toBytes(.Little);
+ const n = Secp256k1.scalar.Scalar.zero.toBytes(.little);
const p = Secp256k1.random();
- try testing.expectError(error.IdentityElement, p.mulPublic(n, .Little));
+ try testing.expectError(error.IdentityElement, p.mulPublic(n, .little));
}
test "secp256k1 field element non-canonical encoding" {
const s = [_]u8{0xff} ** 32;
- try testing.expectError(error.NonCanonical, Secp256k1.Fe.fromBytes(s, .Little));
+ try testing.expectError(error.NonCanonical, Secp256k1.Fe.fromBytes(s, .little));
}
test "secp256k1 neutral element decoding" {
@@ -118,8 +118,8 @@ test "secp256k1 double base multiplication" {
const p2 = Secp256k1.basePoint.dbl();
const s1 = [_]u8{0x01} ** 32;
const s2 = [_]u8{0x02} ** 32;
- const pr1 = try Secp256k1.mulDoubleBasePublic(p1, s1, p2, s2, .Little);
- const pr2 = (try p1.mul(s1, .Little)).add(try p2.mul(s2, .Little));
+ const pr1 = try Secp256k1.mulDoubleBasePublic(p1, s1, p2, s2, .little);
+ const pr2 = (try p1.mul(s1, .little)).add(try p2.mul(s2, .little));
try testing.expect(pr1.equivalent(pr2));
}
@@ -131,9 +131,9 @@ test "secp256k1 scalar inverse" {
const scalar = try Secp256k1.scalar.Scalar.fromBytes(.{
0x94, 0xa1, 0xbb, 0xb1, 0x4b, 0x90, 0x6a, 0x61, 0xa2, 0x80, 0xf2, 0x45, 0xf9, 0xe9, 0x3c, 0x7f,
0x3b, 0x4a, 0x62, 0x47, 0x82, 0x4f, 0x5d, 0x33, 0xb9, 0x67, 0x07, 0x87, 0x64, 0x2a, 0x68, 0xde,
- }, .Big);
+ }, .big);
const inverse = scalar.invert();
- try std.testing.expectEqualSlices(u8, &out, &inverse.toBytes(.Big));
+ try std.testing.expectEqualSlices(u8, &out, &inverse.toBytes(.big));
}
test "secp256k1 scalar parity" {
diff --git a/lib/std/crypto/poly1305.zig b/lib/std/crypto/poly1305.zig
index 5bcb75169d..67e1b630c1 100644
--- a/lib/std/crypto/poly1305.zig
+++ b/lib/std/crypto/poly1305.zig
@@ -22,12 +22,12 @@ pub const Poly1305 = struct {
pub fn init(key: *const [key_length]u8) Poly1305 {
return Poly1305{
.r = [_]u64{
- mem.readIntLittle(u64, key[0..8]) & 0x0ffffffc0fffffff,
- mem.readIntLittle(u64, key[8..16]) & 0x0ffffffc0ffffffc,
+ mem.readInt(u64, key[0..8], .little) & 0x0ffffffc0fffffff,
+ mem.readInt(u64, key[8..16], .little) & 0x0ffffffc0ffffffc,
},
.pad = [_]u64{
- mem.readIntLittle(u64, key[16..24]),
- mem.readIntLittle(u64, key[24..32]),
+ mem.readInt(u64, key[16..24], .little),
+ mem.readInt(u64, key[24..32], .little),
},
};
}
@@ -56,8 +56,8 @@ pub const Poly1305 = struct {
var i: usize = 0;
while (i + block_length <= m.len) : (i += block_length) {
- const in0 = mem.readIntLittle(u64, m[i..][0..8]);
- const in1 = mem.readIntLittle(u64, m[i + 8 ..][0..8]);
+ const in0 = mem.readInt(u64, m[i..][0..8], .little);
+ const in1 = mem.readInt(u64, m[i + 8 ..][0..8], .little);
// Add the input message to H
var v = @addWithOverflow(h0, in0);
@@ -182,8 +182,8 @@ pub const Poly1305 = struct {
const c = ((h0 & st.pad[0]) | ((h0 | st.pad[0]) & ~st.h[0])) >> 63;
st.h[1] = h1 +% st.pad[1] +% c;
- mem.writeIntLittle(u64, out[0..8], st.h[0]);
- mem.writeIntLittle(u64, out[8..16], st.h[1]);
+ mem.writeInt(u64, out[0..8], st.h[0], .little);
+ mem.writeInt(u64, out[8..16], st.h[1], .little);
utils.secureZero(u8, @as([*]u8, @ptrCast(st))[0..@sizeOf(Poly1305)]);
}
diff --git a/lib/std/crypto/salsa20.zig b/lib/std/crypto/salsa20.zig
index a2368fc3b6..b83db0a317 100644
--- a/lib/std/crypto/salsa20.zig
+++ b/lib/std/crypto/salsa20.zig
@@ -29,10 +29,10 @@ fn SalsaVecImpl(comptime rounds: comptime_int) type {
fn initContext(key: [8]u32, d: [4]u32) BlockVec {
const c = "expand 32-byte k";
const constant_le = comptime [4]u32{
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
};
return BlockVec{
Lane{ key[0], key[1], key[2], key[3] },
@@ -112,10 +112,10 @@ fn SalsaVecImpl(comptime rounds: comptime_int) type {
fn hashToBytes(out: *[64]u8, x: BlockVec) void {
var i: usize = 0;
while (i < 4) : (i += 1) {
- mem.writeIntLittle(u32, out[16 * i + 0 ..][0..4], x[i][0]);
- mem.writeIntLittle(u32, out[16 * i + 4 ..][0..4], x[i][1]);
- mem.writeIntLittle(u32, out[16 * i + 8 ..][0..4], x[i][2]);
- mem.writeIntLittle(u32, out[16 * i + 12 ..][0..4], x[i][3]);
+ mem.writeInt(u32, out[16 * i + 0 ..][0..4], x[i][0], .little);
+ mem.writeInt(u32, out[16 * i + 4 ..][0..4], x[i][1], .little);
+ mem.writeInt(u32, out[16 * i + 8 ..][0..4], x[i][2], .little);
+ mem.writeInt(u32, out[16 * i + 12 ..][0..4], x[i][3], .little);
}
}
@@ -158,20 +158,20 @@ fn SalsaVecImpl(comptime rounds: comptime_int) type {
fn hsalsa(input: [16]u8, key: [32]u8) [32]u8 {
var c: [4]u32 = undefined;
for (c, 0..) |_, i| {
- c[i] = mem.readIntLittle(u32, input[4 * i ..][0..4]);
+ c[i] = mem.readInt(u32, input[4 * i ..][0..4], .little);
}
const ctx = initContext(keyToWords(key), c);
var x: BlockVec = undefined;
salsaCore(x[0..], ctx, false);
var out: [32]u8 = undefined;
- mem.writeIntLittle(u32, out[0..4], x[0][0]);
- mem.writeIntLittle(u32, out[4..8], x[1][1]);
- mem.writeIntLittle(u32, out[8..12], x[2][2]);
- mem.writeIntLittle(u32, out[12..16], x[3][3]);
- mem.writeIntLittle(u32, out[16..20], x[1][2]);
- mem.writeIntLittle(u32, out[20..24], x[1][3]);
- mem.writeIntLittle(u32, out[24..28], x[2][0]);
- mem.writeIntLittle(u32, out[28..32], x[2][1]);
+ mem.writeInt(u32, out[0..4], x[0][0], .little);
+ mem.writeInt(u32, out[4..8], x[1][1], .little);
+ mem.writeInt(u32, out[8..12], x[2][2], .little);
+ mem.writeInt(u32, out[12..16], x[3][3], .little);
+ mem.writeInt(u32, out[16..20], x[1][2], .little);
+ mem.writeInt(u32, out[20..24], x[1][3], .little);
+ mem.writeInt(u32, out[24..28], x[2][0], .little);
+ mem.writeInt(u32, out[28..32], x[2][1], .little);
return out;
}
};
@@ -184,10 +184,10 @@ fn SalsaNonVecImpl(comptime rounds: comptime_int) type {
fn initContext(key: [8]u32, d: [4]u32) BlockVec {
const c = "expand 32-byte k";
const constant_le = comptime [4]u32{
- mem.readIntLittle(u32, c[0..4]),
- mem.readIntLittle(u32, c[4..8]),
- mem.readIntLittle(u32, c[8..12]),
- mem.readIntLittle(u32, c[12..16]),
+ mem.readInt(u32, c[0..4], .little),
+ mem.readInt(u32, c[4..8], .little),
+ mem.readInt(u32, c[8..12], .little),
+ mem.readInt(u32, c[12..16], .little),
};
return BlockVec{
constant_le[0], key[0], key[1], key[2],
@@ -241,7 +241,7 @@ fn SalsaNonVecImpl(comptime rounds: comptime_int) type {
fn hashToBytes(out: *[64]u8, x: BlockVec) void {
for (x, 0..) |w, i| {
- mem.writeIntLittle(u32, out[i * 4 ..][0..4], w);
+ mem.writeInt(u32, out[i * 4 ..][0..4], w, .little);
}
}
@@ -283,20 +283,20 @@ fn SalsaNonVecImpl(comptime rounds: comptime_int) type {
fn hsalsa(input: [16]u8, key: [32]u8) [32]u8 {
var c: [4]u32 = undefined;
for (c, 0..) |_, i| {
- c[i] = mem.readIntLittle(u32, input[4 * i ..][0..4]);
+ c[i] = mem.readInt(u32, input[4 * i ..][0..4], .little);
}
const ctx = initContext(keyToWords(key), c);
var x: BlockVec = undefined;
salsaCore(x[0..], ctx, false);
var out: [32]u8 = undefined;
- mem.writeIntLittle(u32, out[0..4], x[0]);
- mem.writeIntLittle(u32, out[4..8], x[5]);
- mem.writeIntLittle(u32, out[8..12], x[10]);
- mem.writeIntLittle(u32, out[12..16], x[15]);
- mem.writeIntLittle(u32, out[16..20], x[6]);
- mem.writeIntLittle(u32, out[20..24], x[7]);
- mem.writeIntLittle(u32, out[24..28], x[8]);
- mem.writeIntLittle(u32, out[28..32], x[9]);
+ mem.writeInt(u32, out[0..4], x[0], .little);
+ mem.writeInt(u32, out[4..8], x[5], .little);
+ mem.writeInt(u32, out[8..12], x[10], .little);
+ mem.writeInt(u32, out[12..16], x[15], .little);
+ mem.writeInt(u32, out[16..20], x[6], .little);
+ mem.writeInt(u32, out[20..24], x[7], .little);
+ mem.writeInt(u32, out[24..28], x[8], .little);
+ mem.writeInt(u32, out[28..32], x[9], .little);
return out;
}
};
@@ -308,7 +308,7 @@ fn keyToWords(key: [32]u8) [8]u32 {
var k: [8]u32 = undefined;
var i: usize = 0;
while (i < 8) : (i += 1) {
- k[i] = mem.readIntLittle(u32, key[i * 4 ..][0..4]);
+ k[i] = mem.readInt(u32, key[i * 4 ..][0..4], .little);
}
return k;
}
@@ -335,8 +335,8 @@ pub fn Salsa(comptime rounds: comptime_int) type {
debug.assert(in.len == out.len);
var d: [4]u32 = undefined;
- d[0] = mem.readIntLittle(u32, nonce[0..4]);
- d[1] = mem.readIntLittle(u32, nonce[4..8]);
+ d[0] = mem.readInt(u32, nonce[0..4], .little);
+ d[1] = mem.readInt(u32, nonce[4..8], .little);
d[2] = @as(u32, @truncate(counter));
d[3] = @as(u32, @truncate(counter >> 32));
SalsaImpl(rounds).salsaXor(out, in, keyToWords(key), d);
diff --git a/lib/std/crypto/scrypt.zig b/lib/std/crypto/scrypt.zig
index 8745a3b34e..cf16476d92 100644
--- a/lib/std/crypto/scrypt.zig
+++ b/lib/std/crypto/scrypt.zig
@@ -91,7 +91,7 @@ fn smix(b: []align(16) u8, r: u30, n: usize, v: []align(16) u32, xy: []align(16)
var y: []align(16) u32 = @alignCast(xy[32 * r ..]);
for (x, 0..) |*v1, j| {
- v1.* = mem.readIntSliceLittle(u32, b[4 * j ..]);
+ v1.* = mem.readInt(u32, b[4 * j ..][0..4], .little);
}
var tmp: [16]u32 align(16) = undefined;
@@ -116,7 +116,7 @@ fn smix(b: []align(16) u8, r: u30, n: usize, v: []align(16) u32, xy: []align(16)
}
for (x, 0..) |v1, j| {
- mem.writeIntLittle(u32, b[4 * j ..][0..4], v1);
+ mem.writeInt(u32, b[4 * j ..][0..4], v1, .little);
}
}
@@ -361,7 +361,7 @@ const crypt_format = struct {
std.debug.assert(dst.len == decodedLen(src.len));
var i: usize = 0;
while (i < src.len / 4) : (i += 1) {
- mem.writeIntSliceLittle(u24, dst[i * 3 ..], try intDecode(u24, src[i * 4 ..][0..4]));
+ mem.writeInt(u24, dst[i * 3 ..][0..3], try intDecode(u24, src[i * 4 ..][0..4]), .little);
}
const leftover = src[i * 4 ..];
var v: u24 = 0;
@@ -377,7 +377,7 @@ const crypt_format = struct {
std.debug.assert(dst.len == encodedLen(src.len));
var i: usize = 0;
while (i < src.len / 3) : (i += 1) {
- intEncode(dst[i * 4 ..][0..4], mem.readIntSliceLittle(u24, src[i * 3 ..]));
+ intEncode(dst[i * 4 ..][0..4], mem.readInt(u24, src[i * 3 ..][0..3], .little));
}
const leftover = src[i * 3 ..];
var v: u24 = 0;
diff --git a/lib/std/crypto/sha1.zig b/lib/std/crypto/sha1.zig
index ee892237a7..2968517b68 100644
--- a/lib/std/crypto/sha1.zig
+++ b/lib/std/crypto/sha1.zig
@@ -111,7 +111,7 @@ pub const Sha1 = struct {
d.round(d.buf[0..]);
for (d.s, 0..) |s, j| {
- mem.writeIntBig(u32, out[4 * j ..][0..4], s);
+ mem.writeInt(u32, out[4 * j ..][0..4], s, .big);
}
}
@@ -151,7 +151,7 @@ pub const Sha1 = struct {
roundParam(0, 1, 2, 3, 4, 15),
};
inline for (round0a) |r| {
- s[r.i] = mem.readIntBig(u32, b[r.i * 4 ..][0..4]);
+ s[r.i] = mem.readInt(u32, b[r.i * 4 ..][0..4], .big);
v[r.e] = v[r.e] +% math.rotl(u32, v[r.a], @as(u32, 5)) +% 0x5A827999 +% s[r.i & 0xf] +% ((v[r.b] & v[r.c]) | (~v[r.b] & v[r.d]));
v[r.b] = math.rotl(u32, v[r.b], @as(u32, 30));
diff --git a/lib/std/crypto/sha2.zig b/lib/std/crypto/sha2.zig
index f87ea90d92..31884c7381 100644
--- a/lib/std/crypto/sha2.zig
+++ b/lib/std/crypto/sha2.zig
@@ -171,7 +171,7 @@ fn Sha2x32(comptime params: Sha2Params32) type {
const rr = d.s[0 .. params.digest_bits / 32];
for (rr, 0..) |s, j| {
- mem.writeIntBig(u32, out[4 * j ..][0..4], s);
+ mem.writeInt(u32, out[4 * j ..][0..4], s, .big);
}
}
@@ -195,7 +195,7 @@ fn Sha2x32(comptime params: Sha2Params32) type {
fn round(d: *Self, b: *const [64]u8) void {
var s: [64]u32 align(16) = undefined;
for (@as(*align(1) const [16]u32, @ptrCast(b)), 0..) |*elem, i| {
- s[i] = mem.readIntBig(u32, mem.asBytes(elem));
+ s[i] = mem.readInt(u32, mem.asBytes(elem), .big);
}
if (!@inComptime()) {
@@ -663,7 +663,7 @@ fn Sha2x64(comptime params: Sha2Params64) type {
const rr = d.s[0 .. params.digest_bits / 64];
for (rr, 0..) |s, j| {
- mem.writeIntBig(u64, out[8 * j ..][0..8], s);
+ mem.writeInt(u64, out[8 * j ..][0..8], s, .big);
}
}
@@ -678,7 +678,7 @@ fn Sha2x64(comptime params: Sha2Params64) type {
var i: usize = 0;
while (i < 16) : (i += 1) {
- s[i] = mem.readIntBig(u64, b[i * 8 ..][0..8]);
+ s[i] = mem.readInt(u64, b[i * 8 ..][0..8], .big);
}
while (i < 80) : (i += 1) {
s[i] = s[i - 16] +% s[i - 7] +%
diff --git a/lib/std/crypto/siphash.zig b/lib/std/crypto/siphash.zig
index 4399587397..5d1ac4f874 100644
--- a/lib/std/crypto/siphash.zig
+++ b/lib/std/crypto/siphash.zig
@@ -56,8 +56,8 @@ fn SipHashStateless(comptime T: type, comptime c_rounds: usize, comptime d_round
msg_len: u8,
fn init(key: *const [key_length]u8) Self {
- const k0 = mem.readIntLittle(u64, key[0..8]);
- const k1 = mem.readIntLittle(u64, key[8..16]);
+ const k0 = mem.readInt(u64, key[0..8], .little);
+ const k1 = mem.readInt(u64, key[8..16], .little);
var d = Self{
.v0 = k0 ^ 0x736f6d6570736575,
@@ -124,7 +124,7 @@ fn SipHashStateless(comptime T: type, comptime c_rounds: usize, comptime d_round
}
fn round(self: *Self, b: [8]u8) void {
- const m = mem.readIntLittle(u64, &b);
+ const m = mem.readInt(u64, &b, .little);
self.v3 ^= m;
comptime var i: usize = 0;
@@ -213,7 +213,7 @@ fn SipHash(comptime T: type, comptime c_rounds: usize, comptime d_rounds: usize)
/// Return an authentication tag for the current state
/// Assumes `out` is less than or equal to `mac_length`.
pub fn final(self: *Self, out: *[mac_length]u8) void {
- mem.writeIntLittle(T, out, self.state.final(self.buf[0..self.buf_len]));
+ mem.writeInt(T, out, self.state.final(self.buf[0..self.buf_len]), .little);
}
pub fn finalResult(self: *Self) [mac_length]u8 {
diff --git a/lib/std/crypto/tls.zig b/lib/std/crypto/tls.zig
index eb5a6b4c1a..ae19307b6f 100644
--- a/lib/std/crypto/tls.zig
+++ b/lib/std/crypto/tls.zig
@@ -370,7 +370,7 @@ pub fn hkdfExpandLabel(
const max_context_len = 255;
const tls13 = "tls13 ";
var buf: [2 + 1 + tls13.len + max_label_len + 1 + max_context_len]u8 = undefined;
- mem.writeIntBig(u16, buf[0..2], len);
+ mem.writeInt(u16, buf[0..2], len, .big);
buf[2] = @as(u8, @intCast(tls13.len + label.len));
buf[3..][0..tls13.len].* = tls13.*;
var i: usize = 3 + tls13.len;
diff --git a/lib/std/crypto/tls/Client.zig b/lib/std/crypto/tls/Client.zig
index 7671d06469..5f6b1e4c14 100644
--- a/lib/std/crypto/tls/Client.zig
+++ b/lib/std/crypto/tls/Client.zig
@@ -332,10 +332,10 @@ pub fn init(stream: anytype, ca_bundle: Certificate.Bundle, host: []const u8) In
const pk = PublicKey.fromSec1(server_pub_key) catch {
return error.TlsDecryptFailure;
};
- const mul = pk.p.mulPublic(secp256r1_kp.secret_key.bytes, .Big) catch {
+ const mul = pk.p.mulPublic(secp256r1_kp.secret_key.bytes, .big) catch {
return error.TlsDecryptFailure;
};
- shared_key = &mul.affineCoordinates().x.toBytes(.Big);
+ shared_key = &mul.affineCoordinates().x.toBytes(.big);
},
else => {
return error.TlsIllegalParameter;
@@ -1049,10 +1049,10 @@ pub fn readvAdvanced(c: *Client, stream: anytype, iovecs: []const std.os.iovec)
}
const ct: tls.ContentType = @enumFromInt(frag[in]);
in += 1;
- const legacy_version = mem.readIntBig(u16, frag[in..][0..2]);
+ const legacy_version = mem.readInt(u16, frag[in..][0..2], .big);
in += 2;
_ = legacy_version;
- const record_len = mem.readIntBig(u16, frag[in..][0..2]);
+ const record_len = mem.readInt(u16, frag[in..][0..2], .big);
if (record_len > max_ciphertext_len) return error.TlsRecordOverflow;
in += 2;
const end = in + record_len;
@@ -1136,7 +1136,7 @@ pub fn readvAdvanced(c: *Client, stream: anytype, iovecs: []const std.os.iovec)
while (true) {
const handshake_type: tls.HandshakeType = @enumFromInt(cleartext[ct_i]);
ct_i += 1;
- const handshake_len = mem.readIntBig(u24, cleartext[ct_i..][0..3]);
+ const handshake_len = mem.readInt(u24, cleartext[ct_i..][0..3], .big);
ct_i += 3;
const next_handshake_i = ct_i + handshake_len;
if (next_handshake_i > cleartext.len - 1)
@@ -1284,8 +1284,8 @@ const native_endian = builtin.cpu.arch.endian();
inline fn big(x: anytype) @TypeOf(x) {
return switch (native_endian) {
- .Big => x,
- .Little => @byteSwap(x),
+ .big => x,
+ .little => @byteSwap(x),
};
}
diff --git a/lib/std/crypto/utils.zig b/lib/std/crypto/utils.zig
index 4eb7281bc8..85e0730a44 100644
--- a/lib/std/crypto/utils.zig
+++ b/lib/std/crypto/utils.zig
@@ -54,7 +54,7 @@ pub fn timingSafeCompare(comptime T: type, a: []const T, b: []const T, endian: E
const Cext = std.meta.Int(.unsigned, bits + 1);
var gt: T = 0;
var eq: T = 1;
- if (endian == .Little) {
+ if (endian == .little) {
var i = a.len;
while (i != 0) {
i -= 1;
@@ -84,7 +84,7 @@ pub fn timingSafeAdd(comptime T: type, a: []const T, b: []const T, result: []T,
const len = a.len;
debug.assert(len == b.len and len == result.len);
var carry: u1 = 0;
- if (endian == .Little) {
+ if (endian == .little) {
var i: usize = 0;
while (i < len) : (i += 1) {
const ov1 = @addWithOverflow(a[i], b[i]);
@@ -111,7 +111,7 @@ pub fn timingSafeSub(comptime T: type, a: []const T, b: []const T, result: []T,
const len = a.len;
debug.assert(len == b.len and len == result.len);
var borrow: u1 = 0;
- if (endian == .Little) {
+ if (endian == .little) {
var i: usize = 0;
while (i < len) : (i += 1) {
const ov1 = @subWithOverflow(a[i], b[i]);
@@ -165,14 +165,14 @@ test "crypto.utils.timingSafeEql (vectors)" {
test "crypto.utils.timingSafeCompare" {
var a = [_]u8{10} ** 32;
var b = [_]u8{10} ** 32;
- try testing.expectEqual(timingSafeCompare(u8, &a, &b, .Big), .eq);
- try testing.expectEqual(timingSafeCompare(u8, &a, &b, .Little), .eq);
+ try testing.expectEqual(timingSafeCompare(u8, &a, &b, .big), .eq);
+ try testing.expectEqual(timingSafeCompare(u8, &a, &b, .little), .eq);
a[31] = 1;
- try testing.expectEqual(timingSafeCompare(u8, &a, &b, .Big), .lt);
- try testing.expectEqual(timingSafeCompare(u8, &a, &b, .Little), .lt);
+ try testing.expectEqual(timingSafeCompare(u8, &a, &b, .big), .lt);
+ try testing.expectEqual(timingSafeCompare(u8, &a, &b, .little), .lt);
a[0] = 20;
- try testing.expectEqual(timingSafeCompare(u8, &a, &b, .Big), .gt);
- try testing.expectEqual(timingSafeCompare(u8, &a, &b, .Little), .lt);
+ try testing.expectEqual(timingSafeCompare(u8, &a, &b, .big), .gt);
+ try testing.expectEqual(timingSafeCompare(u8, &a, &b, .little), .lt);
}
test "crypto.utils.timingSafe{Add,Sub}" {
@@ -185,7 +185,7 @@ test "crypto.utils.timingSafe{Add,Sub}" {
while (iterations != 0) : (iterations -= 1) {
random.bytes(&a);
random.bytes(&b);
- const endian = if (iterations % 2 == 0) Endian.Big else Endian.Little;
+ const endian = if (iterations % 2 == 0) Endian.big else Endian.little;
_ = timingSafeSub(u8, &a, &b, &c, endian); // a-b
_ = timingSafeAdd(u8, &c, &b, &c, endian); // (a-b)+b
try testing.expectEqualSlices(u8, &c, &a);
diff --git a/lib/std/debug.zig b/lib/std/debug.zig
index 5302105fe9..9247ab4047 100644
--- a/lib/std/debug.zig
+++ b/lib/std/debug.zig
@@ -1098,8 +1098,8 @@ pub fn readElfDebugInfo(
if (hdr.e_ident[elf.EI_VERSION] != 1) return error.InvalidElfVersion;
const endian: std.builtin.Endian = switch (hdr.e_ident[elf.EI_DATA]) {
- elf.ELFDATA2LSB => .Little,
- elf.ELFDATA2MSB => .Big,
+ elf.ELFDATA2LSB => .little,
+ elf.ELFDATA2MSB => .big,
else => return error.InvalidElfEndian,
};
assert(endian == native_endian); // this is our own debug info
@@ -1135,8 +1135,8 @@ pub fn readElfDebugInfo(
const gnu_debuglink = try chopSlice(mapped_mem, shdr.sh_offset, shdr.sh_size);
const debug_filename = mem.sliceTo(@as([*:0]const u8, @ptrCast(gnu_debuglink.ptr)), 0);
const crc_offset = mem.alignForward(usize, @intFromPtr(&debug_filename[debug_filename.len]) + 1, 4) - @intFromPtr(gnu_debuglink.ptr);
- const crc_bytes = gnu_debuglink[crc_offset .. crc_offset + 4];
- separate_debug_crc = mem.readIntSliceNative(u32, crc_bytes);
+ const crc_bytes = gnu_debuglink[crc_offset..][0..4];
+ separate_debug_crc = mem.readInt(u32, crc_bytes, native_endian);
separate_debug_filename = debug_filename;
continue;
}
@@ -1868,10 +1868,10 @@ pub const DebugInfo = struct {
elf.PT_NOTE => {
// Look for .note.gnu.build-id
const note_bytes = @as([*]const u8, @ptrFromInt(info.dlpi_addr + phdr.p_vaddr))[0..phdr.p_memsz];
- const name_size = mem.readIntSliceNative(u32, note_bytes[0..4]);
+ const name_size = mem.readInt(u32, note_bytes[0..4], native_endian);
if (name_size != 4) continue;
- const desc_size = mem.readIntSliceNative(u32, note_bytes[4..8]);
- const note_type = mem.readIntSliceNative(u32, note_bytes[8..12]);
+ const desc_size = mem.readInt(u32, note_bytes[4..8], native_endian);
+ const note_type = mem.readInt(u32, note_bytes[8..12], native_endian);
if (note_type != elf.NT_GNU_BUILD_ID) continue;
if (!mem.eql(u8, "GNU\x00", note_bytes[12..16])) continue;
context.build_id = note_bytes[16..][0..desc_size];
@@ -2040,7 +2040,7 @@ pub const ModuleDebugInfo = switch (native_os) {
if (missing_debug_info) return error.MissingDebugInfo;
var di = DW.DwarfInfo{
- .endian = .Little,
+ .endian = .little,
.sections = sections,
.is_macho = true,
};
diff --git a/lib/std/dwarf.zig b/lib/std/dwarf.zig
index 9a296d3d98..7b4aa0fdec 100644
--- a/lib/std/dwarf.zig
+++ b/lib/std/dwarf.zig
@@ -7,6 +7,7 @@ const mem = std.mem;
const math = std.math;
const leb = @import("leb128.zig");
const assert = std.debug.assert;
+const native_endian = builtin.cpu.arch.endian();
pub const TAG = @import("dwarf/TAG.zig");
pub const AT = @import("dwarf/AT.zig");
@@ -1741,7 +1742,7 @@ pub const DwarfInfo = struct {
context.cfa = switch (row.cfa.rule) {
.val_offset => |offset| blk: {
const register = row.cfa.register orelse return error.InvalidCFARule;
- const value = mem.readIntSliceNative(usize, try abi.regBytes(context.thread_context, register, context.reg_context));
+ const value = mem.readInt(usize, (try abi.regBytes(context.thread_context, register, context.reg_context))[0..@sizeOf(usize)], native_endian);
break :blk try call_frame.applyOffset(value, offset);
},
.expression => |expression| blk: {
@@ -1814,11 +1815,11 @@ pub const DwarfInfo = struct {
}
if (has_return_address) {
- context.pc = abi.stripInstructionPtrAuthCode(mem.readIntSliceNative(usize, try abi.regBytes(
+ context.pc = abi.stripInstructionPtrAuthCode(mem.readInt(usize, (try abi.regBytes(
context.thread_context,
cie.return_address_register,
context.reg_context,
- )));
+ ))[0..@sizeOf(usize)], native_endian));
} else {
context.pc = 0;
}
diff --git a/lib/std/dwarf/call_frame.zig b/lib/std/dwarf/call_frame.zig
index f238fd178e..3b9c940aed 100644
--- a/lib/std/dwarf/call_frame.zig
+++ b/lib/std/dwarf/call_frame.zig
@@ -7,6 +7,7 @@ const dwarf = std.dwarf;
const abi = dwarf.abi;
const expressions = dwarf.expressions;
const assert = std.debug.assert;
+const native_endian = builtin.cpu.arch.endian();
const Opcode = enum(u8) {
advance_loc = 0x1 << 6,
@@ -386,12 +387,12 @@ pub const VirtualMachine = struct {
const addr = try applyOffset(cfa, offset);
if (expression_context.isValidMemory) |isValidMemory| if (!isValidMemory(addr)) return error.InvalidAddress;
const ptr: *const usize = @ptrFromInt(addr);
- mem.writeIntSliceNative(usize, out, ptr.*);
+ mem.writeInt(usize, out[0..@sizeOf(usize)], ptr.*, native_endian);
} else return error.InvalidCFA;
},
.val_offset => |offset| {
if (context.cfa) |cfa| {
- mem.writeIntSliceNative(usize, out, try applyOffset(cfa, offset));
+ mem.writeInt(usize, out[0..@sizeOf(usize)], try applyOffset(cfa, offset), native_endian);
} else return error.InvalidCFA;
},
.register => |register| {
@@ -409,14 +410,14 @@ pub const VirtualMachine = struct {
if (!context.isValidMemory(addr)) return error.InvalidExpressionAddress;
const ptr: *usize = @ptrFromInt(addr);
- mem.writeIntSliceNative(usize, out, ptr.*);
+ mem.writeInt(usize, out[0..@sizeOf(usize)], ptr.*, native_endian);
},
.val_expression => |expression| {
context.stack_machine.reset();
const value = try context.stack_machine.run(expression, context.allocator, expression_context, context.cfa.?);
if (value) |v| {
if (v != .generic) return error.InvalidExpressionValue;
- mem.writeIntSliceNative(usize, out, v.generic);
+ mem.writeInt(usize, out[0..@sizeOf(usize)], v.generic, native_endian);
} else return error.NoExpressionValue;
},
.architectural => return error.UnimplementedRegisterRule,
diff --git a/lib/std/dwarf/expressions.zig b/lib/std/dwarf/expressions.zig
index f89edc08a1..729ff0de9b 100644
--- a/lib/std/dwarf/expressions.zig
+++ b/lib/std/dwarf/expressions.zig
@@ -6,6 +6,7 @@ const dwarf = std.dwarf;
const abi = dwarf.abi;
const mem = std.mem;
const assert = std.debug.assert;
+const native_endian = builtin.cpu.arch.endian();
/// Expressions can be evaluated in different contexts, each requiring its own set of inputs.
/// Callers should specify all the fields relevant to their context. If a field is required
@@ -147,10 +148,10 @@ pub fn StackMachine(comptime options: ExpressionOptions) type {
.regval_type => |regval_type| regval_type.value,
.const_type => |const_type| {
const value: u64 = switch (const_type.value_bytes.len) {
- 1 => mem.readIntSliceNative(u8, const_type.value_bytes),
- 2 => mem.readIntSliceNative(u16, const_type.value_bytes),
- 4 => mem.readIntSliceNative(u32, const_type.value_bytes),
- 8 => mem.readIntSliceNative(u64, const_type.value_bytes),
+ 1 => mem.readInt(u8, const_type.value_bytes[0..1], native_endian),
+ 2 => mem.readInt(u16, const_type.value_bytes[0..2], native_endian),
+ 4 => mem.readInt(u32, const_type.value_bytes[0..4], native_endian),
+ 8 => mem.readInt(u64, const_type.value_bytes[0..8], native_endian),
else => return error.InvalidIntegralTypeSize,
};
@@ -352,7 +353,7 @@ pub fn StackMachine(comptime options: ExpressionOptions) type {
const debug_addr_index = operand.?.generic;
const offset = context.compile_unit.?.addr_base + debug_addr_index;
if (offset >= context.debug_addr.?.len) return error.InvalidExpression;
- const value = mem.readIntSliceNative(usize, context.debug_addr.?[offset..][0..@sizeOf(usize)]);
+ const value = mem.readInt(usize, context.debug_addr.?[offset..][0..@sizeOf(usize)], native_endian);
try self.stack.append(allocator, .{ .generic = value });
},
@@ -386,21 +387,21 @@ pub fn StackMachine(comptime options: ExpressionOptions) type {
if (context.thread_context == null) return error.IncompleteExpressionContext;
const base_register = operand.?.base_register;
- var value: i64 = @intCast(mem.readIntSliceNative(usize, try abi.regBytes(
+ var value: i64 = @intCast(mem.readInt(usize, (try abi.regBytes(
context.thread_context.?,
base_register.base_register,
context.reg_context,
- )));
+ ))[0..@sizeOf(usize)], native_endian));
value += base_register.offset;
try self.stack.append(allocator, .{ .generic = @intCast(value) });
},
OP.regval_type => {
const register_type = operand.?.register_type;
- const value = mem.readIntSliceNative(usize, try abi.regBytes(
+ const value = mem.readInt(usize, (try abi.regBytes(
context.thread_context.?,
register_type.register,
context.reg_context,
- ));
+ ))[0..@sizeOf(usize)], native_endian);
try self.stack.append(allocator, .{
.regval_type = .{
.type_offset = register_type.type_offset,
@@ -756,7 +757,7 @@ pub fn StackMachine(comptime options: ExpressionOptions) type {
var block_stream = std.io.fixedBufferStream(block);
const register = (try readOperand(&block_stream, block[0], context)).?.register;
- const value = mem.readIntSliceNative(usize, try abi.regBytes(context.thread_context.?, register, context.reg_context));
+ const value = mem.readInt(usize, (try abi.regBytes(context.thread_context.?, register, context.reg_context))[0..@sizeOf(usize)], native_endian);
try self.stack.append(allocator, .{ .generic = value });
} else {
var stack_machine: Self = .{};
@@ -1121,9 +1122,9 @@ test "DWARF expressions" {
var mock_debug_addr = std.ArrayList(u8).init(allocator);
defer mock_debug_addr.deinit();
- try mock_debug_addr.writer().writeIntNative(u16, 0);
- try mock_debug_addr.writer().writeIntNative(usize, input[11]);
- try mock_debug_addr.writer().writeIntNative(usize, input[12]);
+ try mock_debug_addr.writer().writeInt(u16, 0, native_endian);
+ try mock_debug_addr.writer().writeInt(usize, input[11], native_endian);
+ try mock_debug_addr.writer().writeInt(usize, input[12], native_endian);
const context = ExpressionContext{
.compile_unit = &mock_compile_unit,
@@ -1185,7 +1186,7 @@ test "DWARF expressions" {
// TODO: Test fbreg (once implemented): mock a DIE and point compile_unit.frame_base at it
- mem.writeIntSliceNative(usize, reg_bytes, 0xee);
+ mem.writeInt(usize, reg_bytes[0..@sizeOf(usize)], 0xee, native_endian);
(try abi.regValueNative(usize, &thread_context, abi.fpRegNum(reg_context), reg_context)).* = 1;
(try abi.regValueNative(usize, &thread_context, abi.spRegNum(reg_context), reg_context)).* = 2;
(try abi.regValueNative(usize, &thread_context, abi.ipRegNum(), reg_context)).* = 3;
@@ -1538,7 +1539,7 @@ test "DWARF expressions" {
const value: usize = @truncate(0xffeeffee_ffeeffee);
var value_bytes: [options.addr_size]u8 = undefined;
- mem.writeIntSliceNative(usize, &value_bytes, value);
+ mem.writeInt(usize, &value_bytes, value, native_endian);
// Convert to generic type
stack_machine.reset();
@@ -1613,7 +1614,7 @@ test "DWARF expressions" {
};
if (abi.regBytes(&thread_context, 0, reg_context)) |reg_bytes| {
- mem.writeIntSliceNative(usize, reg_bytes, 0xee);
+ mem.writeInt(usize, reg_bytes[0..@sizeOf(usize)], 0xee, native_endian);
var sub_program = std.ArrayList(u8).init(allocator);
defer sub_program.deinit();
diff --git a/lib/std/elf.zig b/lib/std/elf.zig
index 4bb30b854d..7cb36a17ee 100644
--- a/lib/std/elf.zig
+++ b/lib/std/elf.zig
@@ -497,8 +497,8 @@ pub const Header = struct {
if (hdr32.e_ident[EI_VERSION] != 1) return error.InvalidElfVersion;
const endian: std.builtin.Endian = switch (hdr32.e_ident[EI_DATA]) {
- ELFDATA2LSB => .Little,
- ELFDATA2MSB => .Big,
+ ELFDATA2LSB => .little,
+ ELFDATA2MSB => .big,
else => return error.InvalidElfEndian,
};
const need_bswap = endian != native_endian;
diff --git a/lib/std/fmt/parse_float/FloatStream.zig b/lib/std/fmt/parse_float/FloatStream.zig
index 803ac65e6d..ad31d15919 100644
--- a/lib/std/fmt/parse_float/FloatStream.zig
+++ b/lib/std/fmt/parse_float/FloatStream.zig
@@ -98,7 +98,7 @@ pub fn skipChars2(self: *FloatStream, c1: u8, c2: u8) void {
}
pub fn readU64Unchecked(self: FloatStream) u64 {
- return std.mem.readIntSliceLittle(u64, self.slice[self.offset..]);
+ return std.mem.readInt(u64, self.slice[self.offset..][0..8], .little);
}
pub fn readU64(self: FloatStream) ?u64 {
diff --git a/lib/std/fmt/parse_float/decimal.zig b/lib/std/fmt/parse_float/decimal.zig
index f8d736a065..f7612cffa3 100644
--- a/lib/std/fmt/parse_float/decimal.zig
+++ b/lib/std/fmt/parse_float/decimal.zig
@@ -260,7 +260,7 @@ pub fn Decimal(comptime T: type) type {
if (!isEightDigits(v)) {
break;
}
- std.mem.writeIntSliceLittle(u64, d.digits[d.num_digits..], v - 0x3030_3030_3030_3030);
+ std.mem.writeInt(u64, d.digits[d.num_digits..][0..8], v - 0x3030_3030_3030_3030, .little);
d.num_digits += 8;
stream.advance(8);
}
diff --git a/lib/std/fs/path.zig b/lib/std/fs/path.zig
index 395b5a335d..55d4490053 100644
--- a/lib/std/fs/path.zig
+++ b/lib/std/fs/path.zig
@@ -1828,7 +1828,7 @@ test "ComponentIterator windows" {
test "ComponentIterator windows UTF-16" {
// TODO: Fix on big endian architectures
- if (builtin.cpu.arch.endian() != .Little) {
+ if (builtin.cpu.arch.endian() != .little) {
return error.SkipZigTest;
}
diff --git a/lib/std/hash/cityhash.zig b/lib/std/hash/cityhash.zig
index 2fab089095..cd240da964 100644
--- a/lib/std/hash/cityhash.zig
+++ b/lib/std/hash/cityhash.zig
@@ -6,11 +6,11 @@ inline fn offsetPtr(ptr: [*]const u8, offset: usize) [*]const u8 {
}
fn fetch32(ptr: [*]const u8, offset: usize) u32 {
- return std.mem.readIntLittle(u32, offsetPtr(ptr, offset)[0..4]);
+ return std.mem.readInt(u32, offsetPtr(ptr, offset)[0..4], .little);
}
fn fetch64(ptr: [*]const u8, offset: usize) u64 {
- return std.mem.readIntLittle(u64, offsetPtr(ptr, offset)[0..8]);
+ return std.mem.readInt(u64, offsetPtr(ptr, offset)[0..8], .little);
}
pub const CityHash32 = struct {
diff --git a/lib/std/hash/crc.zig b/lib/std/hash/crc.zig
index cbd3c75d4d..0ac4de761e 100644
--- a/lib/std/hash/crc.zig
+++ b/lib/std/hash/crc.zig
@@ -163,7 +163,7 @@ pub fn Crc32WithPoly(comptime poly: Polynomial) type {
const p = input[i..][0..8];
// Unrolling this way gives ~50Mb/s increase
- self.crc ^= std.mem.readIntLittle(u32, p[0..4]);
+ self.crc ^= std.mem.readInt(u32, p[0..4], .little);
self.crc =
lookup_tables[0][p[7]] ^
diff --git a/lib/std/hash/murmur.zig b/lib/std/hash/murmur.zig
index 80496be24f..a9299f245d 100644
--- a/lib/std/hash/murmur.zig
+++ b/lib/std/hash/murmur.zig
@@ -18,7 +18,7 @@ pub const Murmur2_32 = struct {
var h1: u32 = seed ^ len;
for (@as([*]align(1) const u32, @ptrCast(str.ptr))[0..(len >> 2)]) |v| {
var k1: u32 = v;
- if (native_endian == .Big)
+ if (native_endian == .big)
k1 = @byteSwap(k1);
k1 *%= m;
k1 ^= k1 >> 24;
@@ -102,7 +102,7 @@ pub const Murmur2_64 = struct {
var h1: u64 = seed ^ (@as(u64, str.len) *% m);
for (@as([*]align(1) const u64, @ptrCast(str.ptr))[0 .. str.len / 8]) |v| {
var k1: u64 = v;
- if (native_endian == .Big)
+ if (native_endian == .big)
k1 = @byteSwap(k1);
k1 *%= m;
k1 ^= k1 >> 47;
@@ -115,7 +115,7 @@ pub const Murmur2_64 = struct {
if (rest > 0) {
var k1: u64 = 0;
@memcpy(@as([*]u8, @ptrCast(&k1))[0..rest], str[offset..]);
- if (native_endian == .Big)
+ if (native_endian == .big)
k1 = @byteSwap(k1);
h1 ^= k1;
h1 *%= m;
@@ -182,7 +182,7 @@ pub const Murmur3_32 = struct {
var h1: u32 = seed;
for (@as([*]align(1) const u32, @ptrCast(str.ptr))[0..(len >> 2)]) |v| {
var k1: u32 = v;
- if (native_endian == .Big)
+ if (native_endian == .big)
k1 = @byteSwap(k1);
k1 *%= c1;
k1 = rotl32(k1, 15);
@@ -286,7 +286,7 @@ test "murmur2_32" {
var v1: u64 = 0x1234567812345678;
var v0le: u32 = v0;
var v1le: u64 = v1;
- if (native_endian == .Big) {
+ if (native_endian == .big) {
v0le = @byteSwap(v0le);
v1le = @byteSwap(v1le);
}
@@ -310,7 +310,7 @@ test "murmur2_64" {
var v1: u64 = 0x1234567812345678;
var v0le: u32 = v0;
var v1le: u64 = v1;
- if (native_endian == .Big) {
+ if (native_endian == .big) {
v0le = @byteSwap(v0le);
v1le = @byteSwap(v1le);
}
@@ -334,7 +334,7 @@ test "murmur3_32" {
var v1: u64 = 0x1234567812345678;
var v0le: u32 = v0;
var v1le: u64 = v1;
- if (native_endian == .Big) {
+ if (native_endian == .big) {
v0le = @byteSwap(v0le);
v1le = @byteSwap(v1le);
}
diff --git a/lib/std/hash/verify.zig b/lib/std/hash/verify.zig
index 1a20d8d1a3..485a1fd976 100644
--- a/lib/std/hash/verify.zig
+++ b/lib/std/hash/verify.zig
@@ -37,7 +37,7 @@ pub fn smhasher(comptime hash_fn: anytype) u32 {
for (0..256) |i| {
buf[i] = @intCast(i);
const h = hashMaybeSeed(hash_fn, 256 - i, buf[0..i]);
- std.mem.writeIntLittle(HashResult, buf_all[i * hash_size ..][0..hash_size], h);
+ std.mem.writeInt(HashResult, buf_all[i * hash_size ..][0..hash_size], h, .little);
}
return @truncate(hashMaybeSeed(hash_fn, 0, buf_all[0..]));
diff --git a/lib/std/hash/wyhash.zig b/lib/std/hash/wyhash.zig
index 91cdf5007f..4dda2b9b14 100644
--- a/lib/std/hash/wyhash.zig
+++ b/lib/std/hash/wyhash.zig
@@ -131,7 +131,7 @@ pub const Wyhash = struct {
inline fn read(comptime bytes: usize, data: []const u8) u64 {
std.debug.assert(bytes <= 8);
const T = std.meta.Int(.unsigned, 8 * bytes);
- return @as(u64, std.mem.readIntLittle(T, data[0..bytes]));
+ return @as(u64, std.mem.readInt(T, data[0..bytes], .little));
}
inline fn mum(a: *u64, b: *u64) void {
diff --git a/lib/std/hash/xxhash.zig b/lib/std/hash/xxhash.zig
index 6ca57973a1..2e4c11e333 100644
--- a/lib/std/hash/xxhash.zig
+++ b/lib/std/hash/xxhash.zig
@@ -53,10 +53,10 @@ pub const XxHash64 = struct {
}
fn processStripe(self: *Accumulator, buf: *const [32]u8) void {
- self.acc1 = round(self.acc1, mem.readIntLittle(u64, buf[0..8]));
- self.acc2 = round(self.acc2, mem.readIntLittle(u64, buf[8..16]));
- self.acc3 = round(self.acc3, mem.readIntLittle(u64, buf[16..24]));
- self.acc4 = round(self.acc4, mem.readIntLittle(u64, buf[24..32]));
+ self.acc1 = round(self.acc1, mem.readInt(u64, buf[0..8], .little));
+ self.acc2 = round(self.acc2, mem.readInt(u64, buf[8..16], .little));
+ self.acc3 = round(self.acc3, mem.readInt(u64, buf[16..24], .little));
+ self.acc4 = round(self.acc4, mem.readInt(u64, buf[24..32], .little));
}
fn merge(self: Accumulator) u64 {
@@ -139,7 +139,7 @@ pub const XxHash64 = struct {
fn finalize8(v: u64, bytes: *const [8]u8) u64 {
var acc = v;
- const lane = mem.readIntLittle(u64, bytes);
+ const lane = mem.readInt(u64, bytes, .little);
acc ^= round(0, lane);
acc = rotl(u64, acc, 27) *% prime_1;
acc +%= prime_4;
@@ -148,7 +148,7 @@ pub const XxHash64 = struct {
fn finalize4(v: u64, bytes: *const [4]u8) u64 {
var acc = v;
- const lane = @as(u64, mem.readIntLittle(u32, bytes));
+ const lane = @as(u64, mem.readInt(u32, bytes, .little));
acc ^= lane *% prime_1;
acc = rotl(u64, acc, 23) *% prime_2;
acc +%= prime_3;
@@ -291,10 +291,10 @@ pub const XxHash32 = struct {
}
fn processStripe(self: *Accumulator, buf: *const [16]u8) void {
- self.acc1 = round(self.acc1, mem.readIntLittle(u32, buf[0..4]));
- self.acc2 = round(self.acc2, mem.readIntLittle(u32, buf[4..8]));
- self.acc3 = round(self.acc3, mem.readIntLittle(u32, buf[8..12]));
- self.acc4 = round(self.acc4, mem.readIntLittle(u32, buf[12..16]));
+ self.acc1 = round(self.acc1, mem.readInt(u32, buf[0..4], .little));
+ self.acc2 = round(self.acc2, mem.readInt(u32, buf[4..8], .little));
+ self.acc3 = round(self.acc3, mem.readInt(u32, buf[8..12], .little));
+ self.acc4 = round(self.acc4, mem.readInt(u32, buf[12..16], .little));
}
fn merge(self: Accumulator) u32 {
@@ -390,7 +390,7 @@ pub const XxHash32 = struct {
fn finalize4(v: u32, bytes: *const [4]u8) u32 {
var acc = v;
- const lane = mem.readIntLittle(u32, bytes);
+ const lane = mem.readInt(u32, bytes, .little);
acc +%= lane *% prime_3;
acc = rotl(u32, acc, 17) *% prime_4;
return acc;
@@ -472,7 +472,7 @@ pub const XxHash3 = struct {
}
inline fn swap(x: anytype) @TypeOf(x) {
- return if (builtin.cpu.arch.endian() == .Big) @byteSwap(x) else x;
+ return if (builtin.cpu.arch.endian() == .big) @byteSwap(x) else x;
}
inline fn disableAutoVectorization(x: anytype) void {
diff --git a/lib/std/heap/WasmPageAllocator.zig b/lib/std/heap/WasmPageAllocator.zig
index 8f484c52f6..0fb45b70d4 100644
--- a/lib/std/heap/WasmPageAllocator.zig
+++ b/lib/std/heap/WasmPageAllocator.zig
@@ -28,7 +28,7 @@ const PageStatus = enum(u1) {
const FreeBlock = struct {
data: []u128,
- const Io = std.packed_int_array.PackedIntIo(u1, .Little);
+ const Io = std.packed_int_array.PackedIntIo(u1, .little);
fn totalPages(self: FreeBlock) usize {
return self.data.len * 128;
diff --git a/lib/std/http/Client.zig b/lib/std/http/Client.zig
index 74afe53a3e..dd143cc83d 100644
--- a/lib/std/http/Client.zig
+++ b/lib/std/http/Client.zig
@@ -1581,7 +1581,7 @@ pub fn fetch(client: *Client, allocator: Allocator, options: FetchOptions) !Fetc
test {
const native_endian = comptime builtin.cpu.arch.endian();
- if (builtin.zig_backend == .stage2_llvm and native_endian == .Big) {
+ if (builtin.zig_backend == .stage2_llvm and native_endian == .big) {
// https://github.com/ziglang/zig/issues/13782
return error.SkipZigTest;
}
diff --git a/lib/std/http/Server.zig b/lib/std/http/Server.zig
index adb1ea0812..cd111ca42f 100644
--- a/lib/std/http/Server.zig
+++ b/lib/std/http/Server.zig
@@ -739,7 +739,7 @@ test "HTTP server handles a chunked transfer coding request" {
if (builtin.zig_backend == .stage2_x86_64) return error.SkipZigTest;
const native_endian = comptime builtin.cpu.arch.endian();
- if (builtin.zig_backend == .stage2_llvm and native_endian == .Big) {
+ if (builtin.zig_backend == .stage2_llvm and native_endian == .big) {
// https://github.com/ziglang/zig/issues/13782
return error.SkipZigTest;
}
diff --git a/lib/std/http/protocol.zig b/lib/std/http/protocol.zig
index 74e0207f34..8e458ed09c 100644
--- a/lib/std/http/protocol.zig
+++ b/lib/std/http/protocol.zig
@@ -617,8 +617,8 @@ inline fn int32(array: *const [4]u8) u32 {
inline fn intShift(comptime T: type, x: anytype) T {
switch (@import("builtin").cpu.arch.endian()) {
- .Little => return @as(T, @truncate(x >> (@bitSizeOf(@TypeOf(x)) - @bitSizeOf(T)))),
- .Big => return @as(T, @truncate(x)),
+ .little => return @as(T, @truncate(x >> (@bitSizeOf(@TypeOf(x)) - @bitSizeOf(T)))),
+ .big => return @as(T, @truncate(x)),
}
}
diff --git a/lib/std/io.zig b/lib/std/io.zig
index 8bbc8d6150..e19b2e0e16 100644
--- a/lib/std/io.zig
+++ b/lib/std/io.zig
@@ -269,22 +269,6 @@ pub fn GenericReader(
return @errorCast(self.any().readBoundedBytes(num_bytes));
}
- pub inline fn readIntNative(self: Self, comptime T: type) NoEofError!T {
- return @errorCast(self.any().readIntNative(T));
- }
-
- pub inline fn readIntForeign(self: Self, comptime T: type) NoEofError!T {
- return @errorCast(self.any().readIntForeign(T));
- }
-
- pub inline fn readIntLittle(self: Self, comptime T: type) NoEofError!T {
- return @errorCast(self.any().readIntLittle(T));
- }
-
- pub inline fn readIntBig(self: Self, comptime T: type) NoEofError!T {
- return @errorCast(self.any().readIntBig(T));
- }
-
pub inline fn readInt(self: Self, comptime T: type, endian: std.builtin.Endian) NoEofError!T {
return @errorCast(self.any().readInt(T, endian));
}
diff --git a/lib/std/io/Reader.zig b/lib/std/io/Reader.zig
index 4a03eb0b54..b5dd046867 100644
--- a/lib/std/io/Reader.zig
+++ b/lib/std/io/Reader.zig
@@ -276,30 +276,8 @@ pub fn readBoundedBytes(self: Self, comptime num_bytes: usize) anyerror!std.Boun
return result;
}
-/// Reads a native-endian integer
-pub fn readIntNative(self: Self, comptime T: type) anyerror!T {
- const bytes = try self.readBytesNoEof(@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8)));
- return mem.readIntNative(T, &bytes);
-}
-
-/// Reads a foreign-endian integer
-pub fn readIntForeign(self: Self, comptime T: type) anyerror!T {
- const bytes = try self.readBytesNoEof(@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8)));
- return mem.readIntForeign(T, &bytes);
-}
-
-pub fn readIntLittle(self: Self, comptime T: type) anyerror!T {
- const bytes = try self.readBytesNoEof(@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8)));
- return mem.readIntLittle(T, &bytes);
-}
-
-pub fn readIntBig(self: Self, comptime T: type) anyerror!T {
- const bytes = try self.readBytesNoEof(@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8)));
- return mem.readIntBig(T, &bytes);
-}
-
-pub fn readInt(self: Self, comptime T: type, endian: std.builtin.Endian) anyerror!T {
- const bytes = try self.readBytesNoEof(@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8)));
+pub inline fn readInt(self: Self, comptime T: type, endian: std.builtin.Endian) anyerror!T {
+ const bytes = try self.readBytesNoEof(@divExact(@typeInfo(T).Int.bits, 8));
return mem.readInt(T, &bytes, endian);
}
@@ -356,7 +334,7 @@ pub fn readStruct(self: Self, comptime T: type) anyerror!T {
pub fn readStructBig(self: Self, comptime T: type) anyerror!T {
var res = try self.readStruct(T);
- if (native_endian != std.builtin.Endian.Big) {
+ if (native_endian != std.builtin.Endian.big) {
mem.byteSwapAllFields(T, &res);
}
return res;
diff --git a/lib/std/io/bit_reader.zig b/lib/std/io/bit_reader.zig
index 7ea2ff5009..1e3911ff57 100644
--- a/lib/std/io/bit_reader.zig
+++ b/lib/std/io/bit_reader.zig
@@ -63,14 +63,14 @@ pub fn BitReader(comptime endian: std.builtin.Endian, comptime ReaderType: type)
const n = if (self.bit_count >= bits) @as(u3, @intCast(bits)) else self.bit_count;
const shift = u7_bit_count - n;
switch (endian) {
- .Big => {
+ .big => {
out_buffer = @as(Buf, self.bit_buffer >> shift);
if (n >= u7_bit_count)
self.bit_buffer = 0
else
self.bit_buffer <<= n;
},
- .Little => {
+ .little => {
const value = (self.bit_buffer << shift) >> shift;
out_buffer = @as(Buf, value);
if (n >= u7_bit_count)
@@ -93,7 +93,7 @@ pub fn BitReader(comptime endian: std.builtin.Endian, comptime ReaderType: type)
};
switch (endian) {
- .Big => {
+ .big => {
if (n >= u8_bit_count) {
out_buffer <<= @as(u3, @intCast(u8_bit_count - 1));
out_buffer <<= 1;
@@ -109,7 +109,7 @@ pub fn BitReader(comptime endian: std.builtin.Endian, comptime ReaderType: type)
self.bit_buffer = @as(u7, @truncate(next_byte << @as(u3, @intCast(n - 1))));
self.bit_count = shift;
},
- .Little => {
+ .little => {
if (n >= u8_bit_count) {
out_buffer |= @as(Buf, next_byte) << @as(BufShift, @intCast(out_bits.*));
out_bits.* += u8_bit_count;
@@ -168,7 +168,7 @@ test "api coverage" {
const mem_le = [_]u8{ 0b00011101, 0b10010101 };
var mem_in_be = io.fixedBufferStream(&mem_be);
- var bit_stream_be = bitReader(.Big, mem_in_be.reader());
+ var bit_stream_be = bitReader(.big, mem_in_be.reader());
var out_bits: usize = undefined;
@@ -205,7 +205,7 @@ test "api coverage" {
try expectError(error.EndOfStream, bit_stream_be.readBitsNoEof(u1, 1));
var mem_in_le = io.fixedBufferStream(&mem_le);
- var bit_stream_le = bitReader(.Little, mem_in_le.reader());
+ var bit_stream_le = bitReader(.little, mem_in_le.reader());
try expect(1 == try bit_stream_le.readBits(u2, 1, &out_bits));
try expect(out_bits == 1);
diff --git a/lib/std/io/bit_writer.zig b/lib/std/io/bit_writer.zig
index ef8f007264..40fd603555 100644
--- a/lib/std/io/bit_writer.zig
+++ b/lib/std/io/bit_writer.zig
@@ -51,8 +51,8 @@ pub fn BitWriter(comptime endian: std.builtin.Endian, comptime WriterType: type)
const high_byte_shift = @as(BufShift, @intCast(buf_bit_count - u8_bit_count));
var in_buffer = switch (endian) {
- .Big => buf_value << @as(BufShift, @intCast(buf_bit_count - bits)),
- .Little => buf_value,
+ .big => buf_value << @as(BufShift, @intCast(buf_bit_count - bits)),
+ .little => buf_value,
};
var in_bits = bits;
@@ -60,13 +60,13 @@ pub fn BitWriter(comptime endian: std.builtin.Endian, comptime WriterType: type)
const bits_remaining = u8_bit_count - self.bit_count;
const n = @as(u3, @intCast(if (bits_remaining > bits) bits else bits_remaining));
switch (endian) {
- .Big => {
+ .big => {
const shift = @as(BufShift, @intCast(high_byte_shift + self.bit_count));
const v = @as(u8, @intCast(in_buffer >> shift));
self.bit_buffer |= v;
in_buffer <<= n;
},
- .Little => {
+ .little => {
const v = @as(u8, @truncate(in_buffer)) << @as(u3, @intCast(self.bit_count));
self.bit_buffer |= v;
in_buffer >>= n;
@@ -86,13 +86,13 @@ pub fn BitWriter(comptime endian: std.builtin.Endian, comptime WriterType: type)
//copy bytes until we can't fill one anymore, then leave the rest in bit_buffer
while (in_bits >= u8_bit_count) {
switch (endian) {
- .Big => {
+ .big => {
const v = @as(u8, @intCast(in_buffer >> high_byte_shift));
try self.forward_writer.writeByte(v);
in_buffer <<= @as(u3, @intCast(u8_bit_count - 1));
in_buffer <<= 1;
},
- .Little => {
+ .little => {
const v = @as(u8, @truncate(in_buffer));
try self.forward_writer.writeByte(v);
in_buffer >>= @as(u3, @intCast(u8_bit_count - 1));
@@ -105,8 +105,8 @@ pub fn BitWriter(comptime endian: std.builtin.Endian, comptime WriterType: type)
if (in_bits > 0) {
self.bit_count = @as(u4, @intCast(in_bits));
self.bit_buffer = switch (endian) {
- .Big => @as(u8, @truncate(in_buffer >> high_byte_shift)),
- .Little => @as(u8, @truncate(in_buffer)),
+ .big => @as(u8, @truncate(in_buffer >> high_byte_shift)),
+ .little => @as(u8, @truncate(in_buffer)),
};
}
}
@@ -148,7 +148,7 @@ test "api coverage" {
var mem_le = [_]u8{0} ** 2;
var mem_out_be = io.fixedBufferStream(&mem_be);
- var bit_stream_be = bitWriter(.Big, mem_out_be.writer());
+ var bit_stream_be = bitWriter(.big, mem_out_be.writer());
try bit_stream_be.writeBits(@as(u2, 1), 1);
try bit_stream_be.writeBits(@as(u5, 2), 2);
@@ -172,7 +172,7 @@ test "api coverage" {
try bit_stream_be.writeBits(@as(u0, 0), 0);
var mem_out_le = io.fixedBufferStream(&mem_le);
- var bit_stream_le = bitWriter(.Little, mem_out_le.writer());
+ var bit_stream_le = bitWriter(.little, mem_out_le.writer());
try bit_stream_le.writeBits(@as(u2, 1), 1);
try bit_stream_le.writeBits(@as(u5, 2), 2);
diff --git a/lib/std/io/test.zig b/lib/std/io/test.zig
index 81d7b211cb..6de0fe1e53 100644
--- a/lib/std/io/test.zig
+++ b/lib/std/io/test.zig
@@ -183,7 +183,7 @@ test "GenericReader methods can return error.EndOfStream" {
var fbs = std.io.fixedBufferStream("");
try std.testing.expectError(
error.EndOfStream,
- fbs.reader().readEnum(enum(u8) { a, b }, .Little),
+ fbs.reader().readEnum(enum(u8) { a, b }, .little),
);
try std.testing.expectError(
error.EndOfStream,
diff --git a/lib/std/io/writer.zig b/lib/std/io/writer.zig
index 41dcf9b6e7..f1c0efda90 100644
--- a/lib/std/io/writer.zig
+++ b/lib/std/io/writer.zig
@@ -45,34 +45,8 @@ pub fn Writer(
}
}
- /// Write a native-endian integer.
- pub fn writeIntNative(self: Self, comptime T: type, value: T) Error!void {
- var bytes: [@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8))]u8 = undefined;
- mem.writeIntNative(std.math.ByteAlignedInt(@TypeOf(value)), &bytes, value);
- return self.writeAll(&bytes);
- }
-
- /// Write a foreign-endian integer.
- pub fn writeIntForeign(self: Self, comptime T: type, value: T) Error!void {
- var bytes: [@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8))]u8 = undefined;
- mem.writeIntForeign(std.math.ByteAlignedInt(@TypeOf(value)), &bytes, value);
- return self.writeAll(&bytes);
- }
-
- pub fn writeIntLittle(self: Self, comptime T: type, value: T) Error!void {
- var bytes: [@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8))]u8 = undefined;
- mem.writeIntLittle(std.math.ByteAlignedInt(@TypeOf(value)), &bytes, value);
- return self.writeAll(&bytes);
- }
-
- pub fn writeIntBig(self: Self, comptime T: type, value: T) Error!void {
- var bytes: [@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8))]u8 = undefined;
- mem.writeIntBig(std.math.ByteAlignedInt(@TypeOf(value)), &bytes, value);
- return self.writeAll(&bytes);
- }
-
- pub fn writeInt(self: Self, comptime T: type, value: T, endian: std.builtin.Endian) Error!void {
- var bytes: [@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8))]u8 = undefined;
+ pub inline fn writeInt(self: Self, comptime T: type, value: T, endian: std.builtin.Endian) Error!void {
+ var bytes: [@divExact(@typeInfo(T).Int.bits, 8)]u8 = undefined;
mem.writeInt(std.math.ByteAlignedInt(@TypeOf(value)), &bytes, value, endian);
return self.writeAll(&bytes);
}
diff --git a/lib/std/math/big/int.zig b/lib/std/math/big/int.zig
index a761151e7b..4051a8cd31 100644
--- a/lib/std/math/big/int.zig
+++ b/lib/std/math/big/int.zig
@@ -798,7 +798,7 @@ pub const Mutable = struct {
const endian_mask: usize = (@sizeOf(Limb) - 1) << 3;
var bytes = std.mem.sliceAsBytes(r.limbs);
- var bits = std.packed_int_array.PackedIntSliceEndian(u1, .Little).init(bytes, limbs_required * @bitSizeOf(Limb));
+ var bits = std.packed_int_array.PackedIntSliceEndian(u1, .little).init(bytes, limbs_required * @bitSizeOf(Limb));
var k: usize = 0;
while (k < ((bit_count + 1) / 2)) : (k += 1) {
@@ -807,7 +807,7 @@ pub const Mutable = struct {
// This "endian mask" remaps a low (LE) byte to the corresponding high
// (BE) byte in the Limb, without changing which limbs we are indexing
- if (native_endian == .Big) {
+ if (native_endian == .big) {
i ^= endian_mask;
rev_i ^= endian_mask;
}
@@ -821,8 +821,8 @@ pub const Mutable = struct {
// Calculate signed-magnitude representation for output
if (signedness == .signed) {
const last_bit = switch (native_endian) {
- .Little => bits.get(bit_count - 1),
- .Big => bits.get((bit_count - 1) ^ endian_mask),
+ .little => bits.get(bit_count - 1),
+ .big => bits.get((bit_count - 1) ^ endian_mask),
};
if (last_bit == 1) {
r.bitNotWrap(r.toConst(), .unsigned, bit_count); // Bitwise NOT.
@@ -869,7 +869,7 @@ pub const Mutable = struct {
// This "endian mask" remaps a low (LE) byte to the corresponding high
// (BE) byte in the Limb, without changing which limbs we are indexing
- if (native_endian == .Big) {
+ if (native_endian == .big) {
i ^= endian_mask;
rev_i ^= endian_mask;
}
@@ -883,8 +883,8 @@ pub const Mutable = struct {
// Calculate signed-magnitude representation for output
if (signedness == .signed) {
const last_byte = switch (native_endian) {
- .Little => bytes[byte_count - 1],
- .Big => bytes[(byte_count - 1) ^ endian_mask],
+ .little => bytes[byte_count - 1],
+ .big => bytes[(byte_count - 1) ^ endian_mask],
};
if (last_byte & (1 << 7) != 0) { // Check sign bit of last byte
@@ -1912,8 +1912,8 @@ pub const Mutable = struct {
if (signedness == .signed) {
const total_bits = bit_offset + bit_count;
var last_byte = switch (endian) {
- .Little => ((total_bits + 7) / 8) - 1,
- .Big => buffer.len - ((total_bits + 7) / 8),
+ .little => ((total_bits + 7) / 8) - 1,
+ .big => buffer.len - ((total_bits + 7) / 8),
};
const sign_bit = @as(u8, 1) << @as(u3, @intCast((total_bits - 1) % 8));
diff --git a/lib/std/math/big/int_test.zig b/lib/std/math/big/int_test.zig
index d85c10f5c9..4a3bf10fcd 100644
--- a/lib/std/math/big/int_test.zig
+++ b/lib/std/math/big/int_test.zig
@@ -2774,7 +2774,7 @@ test "big int conversion read/write twos complement" {
var buffer1 = try testing.allocator.alloc(u8, 64);
defer testing.allocator.free(buffer1);
- const endians = [_]std.builtin.Endian{ .Little, .Big };
+ const endians = [_]std.builtin.Endian{ .little, .big };
const abi_size = 64;
for (endians) |endian| {
@@ -2804,26 +2804,26 @@ test "big int conversion read twos complement with padding" {
// (3) should sign-extend any bits from bit_count to 8 * abi_size
var bit_count: usize = 12 * 8 + 1;
- a.toConst().writeTwosComplement(buffer1[0..13], .Little);
+ a.toConst().writeTwosComplement(buffer1[0..13], .little);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0xd, 0xc, 0xb, 0xa, 0x9, 0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0x1, 0xaa, 0xaa, 0xaa }));
- a.toConst().writeTwosComplement(buffer1[0..13], .Big);
+ a.toConst().writeTwosComplement(buffer1[0..13], .big);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xa, 0xb, 0xc, 0xd, 0xaa, 0xaa, 0xaa }));
- a.toConst().writeTwosComplement(buffer1[0..16], .Little);
+ a.toConst().writeTwosComplement(buffer1[0..16], .little);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0xd, 0xc, 0xb, 0xa, 0x9, 0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0x1, 0x0, 0x0, 0x0 }));
- a.toConst().writeTwosComplement(buffer1[0..16], .Big);
+ a.toConst().writeTwosComplement(buffer1[0..16], .big);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0x0, 0x0, 0x0, 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xa, 0xb, 0xc, 0xd }));
@memset(buffer1, 0xaa);
try a.set(-0x01_02030405_06070809_0a0b0c0d);
bit_count = 12 * 8 + 2;
- a.toConst().writeTwosComplement(buffer1[0..13], .Little);
+ a.toConst().writeTwosComplement(buffer1[0..13], .little);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0xf3, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xaa, 0xaa, 0xaa }));
- a.toConst().writeTwosComplement(buffer1[0..13], .Big);
+ a.toConst().writeTwosComplement(buffer1[0..13], .big);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0xfe, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf3, 0xaa, 0xaa, 0xaa }));
- a.toConst().writeTwosComplement(buffer1[0..16], .Little);
+ a.toConst().writeTwosComplement(buffer1[0..16], .little);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0xf3, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, 0xff, 0xff }));
- a.toConst().writeTwosComplement(buffer1[0..16], .Big);
+ a.toConst().writeTwosComplement(buffer1[0..16], .big);
try testing.expect(std.mem.eql(u8, buffer1, &[_]u8{ 0xff, 0xff, 0xff, 0xfe, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf3 }));
}
@@ -2838,13 +2838,13 @@ test "big int write twos complement +/- zero" {
// Test zero
- m.toConst().writeTwosComplement(buffer1[0..13], .Little);
+ m.toConst().writeTwosComplement(buffer1[0..13], .little);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 13) ++ ([_]u8{0xaa} ** 3))));
- m.toConst().writeTwosComplement(buffer1[0..13], .Big);
+ m.toConst().writeTwosComplement(buffer1[0..13], .big);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 13) ++ ([_]u8{0xaa} ** 3))));
- m.toConst().writeTwosComplement(buffer1[0..16], .Little);
+ m.toConst().writeTwosComplement(buffer1[0..16], .little);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 16))));
- m.toConst().writeTwosComplement(buffer1[0..16], .Big);
+ m.toConst().writeTwosComplement(buffer1[0..16], .big);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 16))));
@memset(buffer1, 0xaa);
@@ -2852,13 +2852,13 @@ test "big int write twos complement +/- zero" {
// Test negative zero
- m.toConst().writeTwosComplement(buffer1[0..13], .Little);
+ m.toConst().writeTwosComplement(buffer1[0..13], .little);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 13) ++ ([_]u8{0xaa} ** 3))));
- m.toConst().writeTwosComplement(buffer1[0..13], .Big);
+ m.toConst().writeTwosComplement(buffer1[0..13], .big);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 13) ++ ([_]u8{0xaa} ** 3))));
- m.toConst().writeTwosComplement(buffer1[0..16], .Little);
+ m.toConst().writeTwosComplement(buffer1[0..16], .little);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 16))));
- m.toConst().writeTwosComplement(buffer1[0..16], .Big);
+ m.toConst().writeTwosComplement(buffer1[0..16], .big);
try testing.expect(std.mem.eql(u8, buffer1, &(([_]u8{0} ** 16))));
}
@@ -2881,19 +2881,19 @@ test "big int conversion write twos complement with padding" {
// Test 0x01_02030405_06070809_0a0b0c0d
buffer = &[_]u8{ 0xd, 0xc, 0xb, 0xa, 0x9, 0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0xb };
- m.readTwosComplement(buffer[0..13], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x01_02030405_06070809_0a0b0c0d) == .eq);
buffer = &[_]u8{ 0xb, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xa, 0xb, 0xc, 0xd };
- m.readTwosComplement(buffer[0..13], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x01_02030405_06070809_0a0b0c0d) == .eq);
buffer = &[_]u8{ 0xd, 0xc, 0xb, 0xa, 0x9, 0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0xab, 0xaa, 0xaa, 0xaa };
- m.readTwosComplement(buffer[0..16], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x01_02030405_06070809_0a0b0c0d) == .eq);
buffer = &[_]u8{ 0xaa, 0xaa, 0xaa, 0xab, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xa, 0xb, 0xc, 0xd };
- m.readTwosComplement(buffer[0..16], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x01_02030405_06070809_0a0b0c0d) == .eq);
bit_count = @sizeOf(Limb) * 8;
@@ -2901,19 +2901,19 @@ test "big int conversion write twos complement with padding" {
// Test 0x0a0a0a0a_02030405_06070809_0a0b0c0d
buffer = &[_]u8{ 0xd, 0xc, 0xb, 0xa, 0x9, 0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0xaa };
- m.readTwosComplement(buffer[0..13], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(@as(Limb, @truncate(0xaa_02030405_06070809_0a0b0c0d))) == .eq);
buffer = &[_]u8{ 0xaa, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xa, 0xb, 0xc, 0xd };
- m.readTwosComplement(buffer[0..13], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(@as(Limb, @truncate(0xaa_02030405_06070809_0a0b0c0d))) == .eq);
buffer = &[_]u8{ 0xd, 0xc, 0xb, 0xa, 0x9, 0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0xaa, 0xaa, 0xaa, 0xaa };
- m.readTwosComplement(buffer[0..16], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(@as(Limb, @truncate(0xaaaaaaaa_02030405_06070809_0a0b0c0d))) == .eq);
buffer = &[_]u8{ 0xaa, 0xaa, 0xaa, 0xaa, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7, 0x8, 0x9, 0xa, 0xb, 0xc, 0xd };
- m.readTwosComplement(buffer[0..16], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(@as(Limb, @truncate(0xaaaaaaaa_02030405_06070809_0a0b0c0d))) == .eq);
bit_count = 12 * 8 + 2;
@@ -2921,42 +2921,42 @@ test "big int conversion write twos complement with padding" {
// Test -0x01_02030405_06070809_0a0b0c0d
buffer = &[_]u8{ 0xf3, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0x02 };
- m.readTwosComplement(buffer[0..13], bit_count, .Little, .signed);
+ m.readTwosComplement(buffer[0..13], bit_count, .little, .signed);
try testing.expect(m.toConst().orderAgainstScalar(-0x01_02030405_06070809_0a0b0c0d) == .eq);
buffer = &[_]u8{ 0x02, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf3 };
- m.readTwosComplement(buffer[0..13], bit_count, .Big, .signed);
+ m.readTwosComplement(buffer[0..13], bit_count, .big, .signed);
try testing.expect(m.toConst().orderAgainstScalar(-0x01_02030405_06070809_0a0b0c0d) == .eq);
buffer = &[_]u8{ 0xf3, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0x02, 0xaa, 0xaa, 0xaa };
- m.readTwosComplement(buffer[0..16], bit_count, .Little, .signed);
+ m.readTwosComplement(buffer[0..16], bit_count, .little, .signed);
try testing.expect(m.toConst().orderAgainstScalar(-0x01_02030405_06070809_0a0b0c0d) == .eq);
buffer = &[_]u8{ 0xaa, 0xaa, 0xaa, 0x02, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf3 };
- m.readTwosComplement(buffer[0..16], bit_count, .Big, .signed);
+ m.readTwosComplement(buffer[0..16], bit_count, .big, .signed);
try testing.expect(m.toConst().orderAgainstScalar(-0x01_02030405_06070809_0a0b0c0d) == .eq);
// Test 0
buffer = &([_]u8{0} ** 16);
- m.readTwosComplement(buffer[0..13], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..13], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..16], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..16], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
bit_count = 0;
buffer = &([_]u8{0xaa} ** 16);
- m.readTwosComplement(buffer[0..13], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..13], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..16], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..16], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
}
@@ -2975,15 +2975,15 @@ test "big int conversion write twos complement zero" {
var buffer: []const u8 = undefined;
buffer = &([_]u8{0} ** 13);
- m.readTwosComplement(buffer[0..13], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..13], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..13], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
buffer = &([_]u8{0} ** 16);
- m.readTwosComplement(buffer[0..16], bit_count, .Little, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .little, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
- m.readTwosComplement(buffer[0..16], bit_count, .Big, .unsigned);
+ m.readTwosComplement(buffer[0..16], bit_count, .big, .unsigned);
try testing.expect(m.toConst().orderAgainstScalar(0x0) == .eq);
}
diff --git a/lib/std/mem.zig b/lib/std/mem.zig
index 9d769d465b..420e461ae5 100644
--- a/lib/std/mem.zig
+++ b/lib/std/mem.zig
@@ -1499,12 +1499,12 @@ test "containsAtLeast" {
pub fn readVarInt(comptime ReturnType: type, bytes: []const u8, endian: Endian) ReturnType {
var result: ReturnType = 0;
switch (endian) {
- .Big => {
+ .big => {
for (bytes) |b| {
result = (result << 8) | b;
}
},
- .Little => {
+ .little => {
const ShiftType = math.Log2Int(ReturnType);
for (bytes, 0..) |b, index| {
result = result | (@as(ReturnType, b) << @as(ShiftType, @intCast(index * 8)));
@@ -1539,8 +1539,8 @@ pub fn readVarPackedInt(
const pad = @as(Log2N, @intCast(@bitSizeOf(T) - bit_count));
const lowest_byte = switch (endian) {
- .Big => bytes.len - (bit_offset / 8) - read_size,
- .Little => bit_offset / 8,
+ .big => bytes.len - (bit_offset / 8) - read_size,
+ .little => bit_offset / 8,
};
const read_bytes = bytes[lowest_byte..][0..read_size];
@@ -1550,7 +1550,7 @@ pub fn readVarPackedInt(
const value = if (read_size == 1) b: {
break :b @as(uN, @truncate(read_bytes[0] >> bit_shift));
} else b: {
- const i: u1 = @intFromBool(endian == .Big);
+ const i: u1 = @intFromBool(endian == .big);
const head = @as(uN, @truncate(read_bytes[i] >> bit_shift));
const tail_shift = @as(Log2N, @intCast(@as(u4, 8) - bit_shift));
const tail = @as(uN, @truncate(read_bytes[1 - i]));
@@ -1565,13 +1565,13 @@ pub fn readVarPackedInt(
// Copy the value out (respecting endianness), accounting for bit_shift
var int: uN = 0;
switch (endian) {
- .Big => {
+ .big => {
for (read_bytes[0 .. read_size - 1]) |elem| {
int = elem | (int << 8);
}
int = (read_bytes[read_size - 1] >> bit_shift) | (int << (@as(u4, 8) - bit_shift));
},
- .Little => {
+ .little => {
int = read_bytes[0] >> bit_shift;
for (read_bytes[1..], 0..) |elem, i| {
int |= (@as(uN, elem) << @as(Log2N, @intCast((8 * (i + 1) - bit_shift))));
@@ -1587,68 +1587,29 @@ pub fn readVarPackedInt(
/// Reads an integer from memory with bit count specified by T.
/// The bit count of T must be evenly divisible by 8.
/// This function cannot fail and cannot cause undefined behavior.
-/// Assumes the endianness of memory is native. This means the function can
-/// simply pointer cast memory.
-pub fn readIntNative(comptime T: type, bytes: *const [@divExact(@typeInfo(T).Int.bits, 8)]u8) T {
- return @as(*align(1) const T, @ptrCast(bytes)).*;
+pub inline fn readInt(comptime T: type, buffer: *const [@divExact(@typeInfo(T).Int.bits, 8)]u8, endian: Endian) T {
+ const value: T = @bitCast(buffer.*);
+ return if (endian == native_endian) value else @byteSwap(value);
}
-/// Reads an integer from memory with bit count specified by T.
-/// The bit count of T must be evenly divisible by 8.
-/// This function cannot fail and cannot cause undefined behavior.
-/// Assumes the endianness of memory is foreign, so it must byte-swap.
-pub fn readIntForeign(comptime T: type, bytes: *const [@divExact(@typeInfo(T).Int.bits, 8)]u8) T {
- return @byteSwap(readIntNative(T, bytes));
-}
+test readInt {
+ try testing.expect(readInt(u0, &[_]u8{}, .big) == 0x0);
+ try testing.expect(readInt(u0, &[_]u8{}, .little) == 0x0);
-pub const readIntLittle = switch (native_endian) {
- .Little => readIntNative,
- .Big => readIntForeign,
-};
-
-pub const readIntBig = switch (native_endian) {
- .Little => readIntForeign,
- .Big => readIntNative,
-};
-
-/// Asserts that bytes.len >= @typeInfo(T).Int.bits / 8. Reads the integer starting from index 0
-/// and ignores extra bytes.
-/// The bit count of T must be evenly divisible by 8.
-/// Assumes the endianness of memory is native. This means the function can
-/// simply pointer cast memory.
-pub fn readIntSliceNative(comptime T: type, bytes: []const u8) T {
- const n = @divExact(@typeInfo(T).Int.bits, 8);
- assert(bytes.len >= n);
- return readIntNative(T, bytes[0..n]);
-}
+ try testing.expect(readInt(u8, &[_]u8{0x32}, .big) == 0x32);
+ try testing.expect(readInt(u8, &[_]u8{0x12}, .little) == 0x12);
-/// Asserts that bytes.len >= @typeInfo(T).Int.bits / 8. Reads the integer starting from index 0
-/// and ignores extra bytes.
-/// The bit count of T must be evenly divisible by 8.
-/// Assumes the endianness of memory is foreign, so it must byte-swap.
-pub fn readIntSliceForeign(comptime T: type, bytes: []const u8) T {
- return @byteSwap(readIntSliceNative(T, bytes));
-}
+ try testing.expect(readInt(u16, &[_]u8{ 0x12, 0x34 }, .big) == 0x1234);
+ try testing.expect(readInt(u16, &[_]u8{ 0x12, 0x34 }, .little) == 0x3412);
-pub const readIntSliceLittle = switch (native_endian) {
- .Little => readIntSliceNative,
- .Big => readIntSliceForeign,
-};
+ try testing.expect(readInt(u72, &[_]u8{ 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0, 0x24 }, .big) == 0x123456789abcdef024);
+ try testing.expect(readInt(u72, &[_]u8{ 0xec, 0x10, 0x32, 0x54, 0x76, 0x98, 0xba, 0xdc, 0xfe }, .little) == 0xfedcba9876543210ec);
-pub const readIntSliceBig = switch (native_endian) {
- .Little => readIntSliceForeign,
- .Big => readIntSliceNative,
-};
+ try testing.expect(readInt(i8, &[_]u8{0xff}, .big) == -1);
+ try testing.expect(readInt(i8, &[_]u8{0xfe}, .little) == -2);
-/// Reads an integer from memory with bit count specified by T.
-/// The bit count of T must be evenly divisible by 8.
-/// This function cannot fail and cannot cause undefined behavior.
-pub fn readInt(comptime T: type, bytes: *const [@divExact(@typeInfo(T).Int.bits, 8)]u8, endian: Endian) T {
- if (endian == native_endian) {
- return readIntNative(T, bytes);
- } else {
- return readIntForeign(T, bytes);
- }
+ try testing.expect(readInt(i16, &[_]u8{ 0xff, 0xfd }, .big) == -3);
+ try testing.expect(readInt(i16, &[_]u8{ 0xfc, 0xff }, .little) == -4);
}
fn readPackedIntLittle(comptime T: type, bytes: []const u8, bit_offset: usize) T {
@@ -1668,7 +1629,7 @@ fn readPackedIntLittle(comptime T: type, bytes: []const u8, bit_offset: usize) T
// Read by loading a LoadInt, and then follow it up with a 1-byte read
// of the tail if bit_offset pushed us over a byte boundary.
const read_bytes = bytes[bit_offset / 8 ..];
- const val = @as(uN, @truncate(readIntLittle(LoadInt, read_bytes[0..load_size]) >> bit_shift));
+ const val = @as(uN, @truncate(readInt(LoadInt, read_bytes[0..load_size], .little) >> bit_shift));
if (bit_shift > load_tail_bits) {
const tail_bits = @as(Log2N, @intCast(bit_shift - load_tail_bits));
const tail_byte = read_bytes[load_size];
@@ -1696,7 +1657,7 @@ fn readPackedIntBig(comptime T: type, bytes: []const u8, bit_offset: usize) T {
// of the tail if bit_offset pushed us over a byte boundary.
const end = bytes.len - (bit_offset / 8);
const read_bytes = bytes[(end - byte_count)..end];
- const val = @as(uN, @truncate(readIntBig(LoadInt, bytes[(end - load_size)..end][0..load_size]) >> bit_shift));
+ const val = @as(uN, @truncate(readInt(LoadInt, bytes[(end - load_size)..end][0..load_size], .big) >> bit_shift));
if (bit_shift > load_tail_bits) {
const tail_bits = @as(Log2N, @intCast(bit_shift - load_tail_bits));
const tail_byte = if (bit_count < 8) @as(uN, @truncate(read_bytes[0])) else @as(uN, read_bytes[0]);
@@ -1705,13 +1666,13 @@ fn readPackedIntBig(comptime T: type, bytes: []const u8, bit_offset: usize) T {
}
pub const readPackedIntNative = switch (native_endian) {
- .Little => readPackedIntLittle,
- .Big => readPackedIntBig,
+ .little => readPackedIntLittle,
+ .big => readPackedIntBig,
};
pub const readPackedIntForeign = switch (native_endian) {
- .Little => readPackedIntBig,
- .Big => readPackedIntLittle,
+ .little => readPackedIntBig,
+ .big => readPackedIntLittle,
};
/// Loads an integer from packed memory.
@@ -1724,94 +1685,68 @@ pub const readPackedIntForeign = switch (native_endian) {
///
pub fn readPackedInt(comptime T: type, bytes: []const u8, bit_offset: usize, endian: Endian) T {
switch (endian) {
- .Little => return readPackedIntLittle(T, bytes, bit_offset),
- .Big => return readPackedIntBig(T, bytes, bit_offset),
+ .little => return readPackedIntLittle(T, bytes, bit_offset),
+ .big => return readPackedIntBig(T, bytes, bit_offset),
}
}
-/// Asserts that bytes.len >= @typeInfo(T).Int.bits / 8. Reads the integer starting from index 0
-/// and ignores extra bytes.
-/// The bit count of T must be evenly divisible by 8.
-pub fn readIntSlice(comptime T: type, bytes: []const u8, endian: Endian) T {
- const n = @divExact(@typeInfo(T).Int.bits, 8);
- assert(bytes.len >= n);
- return readInt(T, bytes[0..n], endian);
-}
-
test "comptime read/write int" {
comptime {
var bytes: [2]u8 = undefined;
- writeIntLittle(u16, &bytes, 0x1234);
- const result = readIntBig(u16, &bytes);
+ writeInt(u16, &bytes, 0x1234, .little);
+ const result = readInt(u16, &bytes, .big);
try testing.expect(result == 0x3412);
}
comptime {
var bytes: [2]u8 = undefined;
- writeIntBig(u16, &bytes, 0x1234);
- const result = readIntLittle(u16, &bytes);
+ writeInt(u16, &bytes, 0x1234, .big);
+ const result = readInt(u16, &bytes, .little);
try testing.expect(result == 0x3412);
}
}
-test "readIntBig and readIntLittle" {
- if (builtin.zig_backend == .stage2_c) return error.SkipZigTest;
- if (builtin.zig_backend == .stage2_x86_64) return error.SkipZigTest;
-
- try testing.expect(readIntSliceBig(u0, &[_]u8{}) == 0x0);
- try testing.expect(readIntSliceLittle(u0, &[_]u8{}) == 0x0);
-
- try testing.expect(readIntSliceBig(u8, &[_]u8{0x32}) == 0x32);
- try testing.expect(readIntSliceLittle(u8, &[_]u8{0x12}) == 0x12);
-
- try testing.expect(readIntSliceBig(u16, &[_]u8{ 0x12, 0x34 }) == 0x1234);
- try testing.expect(readIntSliceLittle(u16, &[_]u8{ 0x12, 0x34 }) == 0x3412);
-
- try testing.expect(readIntSliceBig(u72, &[_]u8{ 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0, 0x24 }) == 0x123456789abcdef024);
- try testing.expect(readIntSliceLittle(u72, &[_]u8{ 0xec, 0x10, 0x32, 0x54, 0x76, 0x98, 0xba, 0xdc, 0xfe }) == 0xfedcba9876543210ec);
-
- try testing.expect(readIntSliceBig(i8, &[_]u8{0xff}) == -1);
- try testing.expect(readIntSliceLittle(i8, &[_]u8{0xfe}) == -2);
-
- try testing.expect(readIntSliceBig(i16, &[_]u8{ 0xff, 0xfd }) == -3);
- try testing.expect(readIntSliceLittle(i16, &[_]u8{ 0xfc, 0xff }) == -4);
-}
-
-/// Writes an integer to memory, storing it in twos-complement.
-/// This function always succeeds, has defined behavior for all inputs, and
-/// accepts any integer bit width.
-/// This function stores in native endian, which means it is implemented as a simple
-/// memory store.
-pub fn writeIntNative(comptime T: type, buf: *[@as(u16, @intCast((@as(u17, @typeInfo(T).Int.bits) + 7) / 8))]u8, value: T) void {
- @as(*align(1) T, @ptrCast(buf)).* = value;
-}
-
/// Writes an integer to memory, storing it in twos-complement.
/// This function always succeeds, has defined behavior for all inputs, but
/// the integer bit width must be divisible by 8.
-/// This function stores in foreign endian, which means it does a @byteSwap first.
-pub fn writeIntForeign(comptime T: type, buf: *[@divExact(@typeInfo(T).Int.bits, 8)]u8, value: T) void {
- writeIntNative(T, buf, @byteSwap(value));
+pub inline fn writeInt(comptime T: type, buffer: *[@divExact(@typeInfo(T).Int.bits, 8)]u8, value: T, endian: Endian) void {
+ buffer.* = @bitCast(if (endian == native_endian) value else @byteSwap(value));
}
-pub const writeIntLittle = switch (native_endian) {
- .Little => writeIntNative,
- .Big => writeIntForeign,
-};
+test writeInt {
+ var buf0: [0]u8 = undefined;
+ var buf1: [1]u8 = undefined;
+ var buf2: [2]u8 = undefined;
+ var buf9: [9]u8 = undefined;
-pub const writeIntBig = switch (native_endian) {
- .Little => writeIntForeign,
- .Big => writeIntNative,
-};
+ writeInt(u0, &buf0, 0x0, .big);
+ try testing.expect(eql(u8, buf0[0..], &[_]u8{}));
+ writeInt(u0, &buf0, 0x0, .little);
+ try testing.expect(eql(u8, buf0[0..], &[_]u8{}));
-/// Writes an integer to memory, storing it in twos-complement.
-/// This function always succeeds, has defined behavior for all inputs, but
-/// the integer bit width must be divisible by 8.
-pub fn writeInt(comptime T: type, buffer: *[@divExact(@typeInfo(T).Int.bits, 8)]u8, value: T, endian: Endian) void {
- if (endian == native_endian) {
- return writeIntNative(T, buffer, value);
- } else {
- return writeIntForeign(T, buffer, value);
- }
+ writeInt(u8, &buf1, 0x12, .big);
+ try testing.expect(eql(u8, buf1[0..], &[_]u8{0x12}));
+ writeInt(u8, &buf1, 0x34, .little);
+ try testing.expect(eql(u8, buf1[0..], &[_]u8{0x34}));
+
+ writeInt(u16, &buf2, 0x1234, .big);
+ try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0x12, 0x34 }));
+ writeInt(u16, &buf2, 0x5678, .little);
+ try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0x78, 0x56 }));
+
+ writeInt(u72, &buf9, 0x123456789abcdef024, .big);
+ try testing.expect(eql(u8, buf9[0..], &[_]u8{ 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0, 0x24 }));
+ writeInt(u72, &buf9, 0xfedcba9876543210ec, .little);
+ try testing.expect(eql(u8, buf9[0..], &[_]u8{ 0xec, 0x10, 0x32, 0x54, 0x76, 0x98, 0xba, 0xdc, 0xfe }));
+
+ writeInt(i8, &buf1, -1, .big);
+ try testing.expect(eql(u8, buf1[0..], &[_]u8{0xff}));
+ writeInt(i8, &buf1, -2, .little);
+ try testing.expect(eql(u8, buf1[0..], &[_]u8{0xfe}));
+
+ writeInt(i16, &buf2, -3, .big);
+ try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0xff, 0xfd }));
+ writeInt(i16, &buf2, -4, .little);
+ try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0xfc, 0xff }));
}
fn writePackedIntLittle(comptime T: type, bytes: []u8, bit_offset: usize, value: T) void {
@@ -1844,7 +1779,7 @@ fn writePackedIntLittle(comptime T: type, bytes: []u8, bit_offset: usize, value:
write_value |= @as(StoreInt, tail) << (8 * (store_size - 1));
}
- writeIntLittle(StoreInt, write_bytes[0..store_size], write_value);
+ writeInt(StoreInt, write_bytes[0..store_size], write_value, .little);
}
fn writePackedIntBig(comptime T: type, bytes: []u8, bit_offset: usize, value: T) void {
@@ -1879,17 +1814,17 @@ fn writePackedIntBig(comptime T: type, bytes: []u8, bit_offset: usize, value: T)
write_value |= @as(StoreInt, tail) << (8 * (store_size - 1));
}
- writeIntBig(StoreInt, write_bytes[(byte_count - store_size)..][0..store_size], write_value);
+ writeInt(StoreInt, write_bytes[(byte_count - store_size)..][0..store_size], write_value, .big);
}
pub const writePackedIntNative = switch (native_endian) {
- .Little => writePackedIntLittle,
- .Big => writePackedIntBig,
+ .little => writePackedIntLittle,
+ .big => writePackedIntBig,
};
pub const writePackedIntForeign = switch (native_endian) {
- .Little => writePackedIntBig,
- .Big => writePackedIntLittle,
+ .little => writePackedIntBig,
+ .big => writePackedIntLittle,
};
/// Stores an integer to packed memory.
@@ -1903,94 +1838,9 @@ pub const writePackedIntForeign = switch (native_endian) {
///
pub fn writePackedInt(comptime T: type, bytes: []u8, bit_offset: usize, value: T, endian: Endian) void {
switch (endian) {
- .Little => writePackedIntLittle(T, bytes, bit_offset, value),
- .Big => writePackedIntBig(T, bytes, bit_offset, value),
- }
-}
-
-/// Writes a twos-complement little-endian integer to memory.
-/// Asserts that buf.len >= @typeInfo(T).Int.bits / 8.
-/// The bit count of T must be divisible by 8.
-/// Any extra bytes in buffer after writing the integer are set to zero. To
-/// avoid the branch to check for extra buffer bytes, use writeIntLittle
-/// instead.
-fn writeIntSliceLittleNative(comptime T: type, buffer: []u8, value: T) void {
- assert(buffer.len >= @divExact(@typeInfo(T).Int.bits, 8));
-
- if (@typeInfo(T).Int.bits == 0) {
- return @memset(buffer, 0);
- } else if (@typeInfo(T).Int.bits == 8) {
- @memset(buffer, 0);
- buffer[0] = @as(u8, @bitCast(value));
- return;
- }
-
- const write_end = @divExact(@typeInfo(T).Int.bits, 8);
- @as(*align(1) T, @ptrCast(buffer)).* = value;
- @memset(buffer[write_end..], 0);
-}
-
-fn writeIntSliceLittleForeign(comptime T: type, buffer: []u8, value: T) void {
- return writeIntSliceLittleNative(T, buffer, @byteSwap(value));
-}
-
-pub const writeIntSliceLittle = switch (native_endian) {
- .Little => writeIntSliceLittleNative,
- .Big => writeIntSliceLittleForeign,
-};
-
-/// Writes a twos-complement big-endian integer to memory.
-/// Asserts that buffer.len >= @typeInfo(T).Int.bits / 8.
-/// The bit count of T must be divisible by 8.
-/// Any extra bytes in buffer before writing the integer are set to zero. To
-/// avoid the branch to check for extra buffer bytes, use writeIntBig instead.
-fn writeIntSliceBigNative(comptime T: type, buffer: []u8, value: T) void {
- assert(buffer.len >= @divExact(@typeInfo(T).Int.bits, 8));
-
- if (@typeInfo(T).Int.bits == 0) {
- return @memset(buffer, 0);
- } else if (@typeInfo(T).Int.bits == 8) {
- @memset(buffer, 0);
- buffer[buffer.len - 1] = @as(u8, @bitCast(value));
- return;
+ .little => writePackedIntLittle(T, bytes, bit_offset, value),
+ .big => writePackedIntBig(T, bytes, bit_offset, value),
}
-
- const write_start = buffer.len - @divExact(@typeInfo(T).Int.bits, 8);
- @memset(buffer[0..write_start], 0);
- @as(*align(1) T, @ptrCast(buffer[write_start..])).* = value;
-}
-
-fn writeIntSliceBigForeign(comptime T: type, buffer: []u8, value: T) void {
- return writeIntSliceBigNative(T, buffer, @byteSwap(value));
-}
-
-pub const writeIntSliceBig = switch (native_endian) {
- .Little => writeIntSliceBigForeign,
- .Big => writeIntSliceBigNative,
-};
-
-pub const writeIntSliceNative = switch (native_endian) {
- .Little => writeIntSliceLittleNative,
- .Big => writeIntSliceBigNative,
-};
-
-pub const writeIntSliceForeign = switch (native_endian) {
- .Little => writeIntSliceBigForeign,
- .Big => writeIntSliceLittleForeign,
-};
-
-/// Writes a twos-complement integer to memory, with the specified endianness.
-/// Asserts that buf.len >= @typeInfo(T).Int.bits / 8.
-/// The bit count of T must be evenly divisible by 8.
-/// Any extra bytes in buffer not part of the integer are set to zero, with
-/// respect to endianness. To avoid the branch to check for extra buffer bytes,
-/// use writeInt instead.
-pub fn writeIntSlice(comptime T: type, buffer: []u8, value: T, endian: Endian) void {
- comptime assert(@typeInfo(T).Int.bits % 8 == 0);
- return switch (endian) {
- .Little => writeIntSliceLittle(T, buffer, value),
- .Big => writeIntSliceBig(T, buffer, value),
- };
}
/// Stores an integer to packed memory with provided bit_count, bit_offset, and signedness.
@@ -2010,8 +1860,8 @@ pub fn writeVarPackedInt(bytes: []u8, bit_offset: usize, bit_count: usize, value
const bit_shift = @as(u3, @intCast(bit_offset % 8));
const write_size = (bit_count + bit_shift + 7) / 8;
const lowest_byte = switch (endian) {
- .Big => bytes.len - (bit_offset / 8) - write_size,
- .Little => bit_offset / 8,
+ .big => bytes.len - (bit_offset / 8) - write_size,
+ .little => bit_offset / 8,
};
const write_bytes = bytes[lowest_byte..][0..write_size];
@@ -2027,8 +1877,8 @@ pub fn writeVarPackedInt(bytes: []u8, bit_offset: usize, bit_count: usize, value
var remaining: T = value;
// Iterate bytes forward for Little-endian, backward for Big-endian
- const delta: i2 = if (endian == .Big) -1 else 1;
- const start = if (endian == .Big) @as(isize, @intCast(write_bytes.len - 1)) else 0;
+ const delta: i2 = if (endian == .big) -1 else 1;
+ const start = if (endian == .big) @as(isize, @intCast(write_bytes.len - 1)) else 0;
var i: isize = start; // isize for signed index arithmetic
@@ -2055,45 +1905,6 @@ pub fn writeVarPackedInt(bytes: []u8, bit_offset: usize, bit_count: usize, value
write_bytes[@as(usize, @intCast(i))] |= @as(u8, @intCast(@as(uN, @bitCast(remaining)) & tail_mask));
}
-test "writeIntBig and writeIntLittle" {
- if (builtin.zig_backend == .stage2_c) return error.SkipZigTest;
-
- var buf0: [0]u8 = undefined;
- var buf1: [1]u8 = undefined;
- var buf2: [2]u8 = undefined;
- var buf9: [9]u8 = undefined;
-
- writeIntBig(u0, &buf0, 0x0);
- try testing.expect(eql(u8, buf0[0..], &[_]u8{}));
- writeIntLittle(u0, &buf0, 0x0);
- try testing.expect(eql(u8, buf0[0..], &[_]u8{}));
-
- writeIntBig(u8, &buf1, 0x12);
- try testing.expect(eql(u8, buf1[0..], &[_]u8{0x12}));
- writeIntLittle(u8, &buf1, 0x34);
- try testing.expect(eql(u8, buf1[0..], &[_]u8{0x34}));
-
- writeIntBig(u16, &buf2, 0x1234);
- try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0x12, 0x34 }));
- writeIntLittle(u16, &buf2, 0x5678);
- try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0x78, 0x56 }));
-
- writeIntBig(u72, &buf9, 0x123456789abcdef024);
- try testing.expect(eql(u8, buf9[0..], &[_]u8{ 0x12, 0x34, 0x56, 0x78, 0x9a, 0xbc, 0xde, 0xf0, 0x24 }));
- writeIntLittle(u72, &buf9, 0xfedcba9876543210ec);
- try testing.expect(eql(u8, buf9[0..], &[_]u8{ 0xec, 0x10, 0x32, 0x54, 0x76, 0x98, 0xba, 0xdc, 0xfe }));
-
- writeIntBig(i8, &buf1, -1);
- try testing.expect(eql(u8, buf1[0..], &[_]u8{0xff}));
- writeIntLittle(i8, &buf1, -2);
- try testing.expect(eql(u8, buf1[0..], &[_]u8{0xfe}));
-
- writeIntBig(i16, &buf2, -3);
- try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0xff, 0xfd }));
- writeIntLittle(i16, &buf2, -4);
- try testing.expect(eql(u8, buf2[0..], &[_]u8{ 0xfc, 0xff }));
-}
-
/// Swap the byte order of all the members of the fields of a struct
/// (Changing their endianness)
pub fn byteSwapAllFields(comptime S: type, ptr: *S) void {
@@ -3311,12 +3122,12 @@ fn testReadIntImpl() !void {
0x56,
0x78,
};
- try testing.expect(readInt(u32, &bytes, Endian.Big) == 0x12345678);
- try testing.expect(readIntBig(u32, &bytes) == 0x12345678);
- try testing.expect(readIntBig(i32, &bytes) == 0x12345678);
- try testing.expect(readInt(u32, &bytes, Endian.Little) == 0x78563412);
- try testing.expect(readIntLittle(u32, &bytes) == 0x78563412);
- try testing.expect(readIntLittle(i32, &bytes) == 0x78563412);
+ try testing.expect(readInt(u32, &bytes, .big) == 0x12345678);
+ try testing.expect(readInt(u32, &bytes, .big) == 0x12345678);
+ try testing.expect(readInt(i32, &bytes, .big) == 0x12345678);
+ try testing.expect(readInt(u32, &bytes, .little) == 0x78563412);
+ try testing.expect(readInt(u32, &bytes, .little) == 0x78563412);
+ try testing.expect(readInt(i32, &bytes, .little) == 0x78563412);
}
{
const buf = [_]u8{
@@ -3325,7 +3136,7 @@ fn testReadIntImpl() !void {
0x12,
0x34,
};
- const answer = readInt(u32, &buf, Endian.Big);
+ const answer = readInt(u32, &buf, .big);
try testing.expect(answer == 0x00001234);
}
{
@@ -3335,7 +3146,7 @@ fn testReadIntImpl() !void {
0x00,
0x00,
};
- const answer = readInt(u32, &buf, Endian.Little);
+ const answer = readInt(u32, &buf, .little);
try testing.expect(answer == 0x00003412);
}
{
@@ -3343,153 +3154,13 @@ fn testReadIntImpl() !void {
0xff,
0xfe,
};
- try testing.expect(readIntBig(u16, &bytes) == 0xfffe);
- try testing.expect(readIntBig(i16, &bytes) == -0x0002);
- try testing.expect(readIntLittle(u16, &bytes) == 0xfeff);
- try testing.expect(readIntLittle(i16, &bytes) == -0x0101);
+ try testing.expect(readInt(u16, &bytes, .big) == 0xfffe);
+ try testing.expect(readInt(i16, &bytes, .big) == -0x0002);
+ try testing.expect(readInt(u16, &bytes, .little) == 0xfeff);
+ try testing.expect(readInt(i16, &bytes, .little) == -0x0101);
}
}
-test writeIntSlice {
- try testWriteIntImpl();
- try comptime testWriteIntImpl();
-}
-fn testWriteIntImpl() !void {
- var bytes: [8]u8 = undefined;
-
- writeIntSlice(u0, bytes[0..], 0, Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00,
- }));
-
- writeIntSlice(u0, bytes[0..], 0, Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00,
- }));
-
- writeIntSlice(u64, bytes[0..], 0x12345678CAFEBABE, Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x12,
- 0x34,
- 0x56,
- 0x78,
- 0xCA,
- 0xFE,
- 0xBA,
- 0xBE,
- }));
-
- writeIntSlice(u64, bytes[0..], 0xBEBAFECA78563412, Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x12,
- 0x34,
- 0x56,
- 0x78,
- 0xCA,
- 0xFE,
- 0xBA,
- 0xBE,
- }));
-
- writeIntSlice(u32, bytes[0..], 0x12345678, Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x12,
- 0x34,
- 0x56,
- 0x78,
- }));
-
- writeIntSlice(u32, bytes[0..], 0x78563412, Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x12,
- 0x34,
- 0x56,
- 0x78,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- }));
-
- writeIntSlice(u16, bytes[0..], 0x1234, Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x12,
- 0x34,
- }));
-
- writeIntSlice(u16, bytes[0..], 0x1234, Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x34,
- 0x12,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- }));
-
- writeIntSlice(i16, bytes[0..], @as(i16, -21555), Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0xCD,
- 0xAB,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- }));
-
- writeIntSlice(i16, bytes[0..], @as(i16, -21555), Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0x00,
- 0xAB,
- 0xCD,
- }));
-
- writeIntSlice(u8, bytes[0..], 0x12, Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x12,
- }));
-
- writeIntSlice(u8, bytes[0..], 0x12, Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x12, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00,
- }));
-
- writeIntSlice(i8, bytes[0..], -1, Endian.Big);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0xff,
- }));
-
- writeIntSlice(i8, bytes[0..], -1, Endian.Little);
- try testing.expect(eql(u8, &bytes, &[_]u8{
- 0xff, 0x00, 0x00, 0x00,
- 0x00, 0x00, 0x00, 0x00,
- }));
-}
-
/// Returns the smallest number in a slice. O(n).
/// `slice` must not be empty.
pub fn min(comptime T: type, slice: []const T) T {
@@ -3932,48 +3603,48 @@ test "replaceOwned" {
/// Converts a little-endian integer to host endianness.
pub fn littleToNative(comptime T: type, x: T) T {
return switch (native_endian) {
- .Little => x,
- .Big => @byteSwap(x),
+ .little => x,
+ .big => @byteSwap(x),
};
}
/// Converts a big-endian integer to host endianness.
pub fn bigToNative(comptime T: type, x: T) T {
return switch (native_endian) {
- .Little => @byteSwap(x),
- .Big => x,
+ .little => @byteSwap(x),
+ .big => x,
};
}
/// Converts an integer from specified endianness to host endianness.
pub fn toNative(comptime T: type, x: T, endianness_of_x: Endian) T {
return switch (endianness_of_x) {
- .Little => littleToNative(T, x),
- .Big => bigToNative(T, x),
+ .little => littleToNative(T, x),
+ .big => bigToNative(T, x),
};
}
/// Converts an integer which has host endianness to the desired endianness.
pub fn nativeTo(comptime T: type, x: T, desired_endianness: Endian) T {
return switch (desired_endianness) {
- .Little => nativeToLittle(T, x),
- .Big => nativeToBig(T, x),
+ .little => nativeToLittle(T, x),
+ .big => nativeToBig(T, x),
};
}
/// Converts an integer which has host endianness to little endian.
pub fn nativeToLittle(comptime T: type, x: T) T {
return switch (native_endian) {
- .Little => x,
- .Big => @byteSwap(x),
+ .little => x,
+ .big => @byteSwap(x),
};
}
/// Converts an integer which has host endianness to big endian.
pub fn nativeToBig(comptime T: type, x: T) T {
return switch (native_endian) {
- .Little => @byteSwap(x),
- .Big => x,
+ .little => @byteSwap(x),
+ .big => x,
};
}
@@ -4077,8 +3748,8 @@ pub fn asBytes(ptr: anytype) AsBytesReturnType(@TypeOf(ptr)) {
test "asBytes" {
const deadbeef = @as(u32, 0xDEADBEEF);
const deadbeef_bytes = switch (native_endian) {
- .Big => "\xDE\xAD\xBE\xEF",
- .Little => "\xEF\xBE\xAD\xDE",
+ .big => "\xDE\xAD\xBE\xEF",
+ .little => "\xEF\xBE\xAD\xDE",
};
try testing.expect(eql(u8, asBytes(&deadbeef), deadbeef_bytes));
@@ -4102,10 +3773,10 @@ test "asBytes" {
.d = 0xA1,
};
switch (native_endian) {
- .Little => {
+ .little => {
try testing.expect(eql(u8, asBytes(&inst), "\xBE\xEF\xDE\xA1"));
},
- .Big => {
+ .big => {
try testing.expect(eql(u8, asBytes(&inst), "\xA1\xDE\xEF\xBE"));
},
}
@@ -4137,14 +3808,14 @@ pub fn toBytes(value: anytype) [@sizeOf(@TypeOf(value))]u8 {
test "toBytes" {
var my_bytes = toBytes(@as(u32, 0x12345678));
switch (native_endian) {
- .Big => try testing.expect(eql(u8, &my_bytes, "\x12\x34\x56\x78")),
- .Little => try testing.expect(eql(u8, &my_bytes, "\x78\x56\x34\x12")),
+ .big => try testing.expect(eql(u8, &my_bytes, "\x12\x34\x56\x78")),
+ .little => try testing.expect(eql(u8, &my_bytes, "\x78\x56\x34\x12")),
}
my_bytes[0] = '\x99';
switch (native_endian) {
- .Big => try testing.expect(eql(u8, &my_bytes, "\x99\x34\x56\x78")),
- .Little => try testing.expect(eql(u8, &my_bytes, "\x99\x56\x34\x12")),
+ .big => try testing.expect(eql(u8, &my_bytes, "\x99\x34\x56\x78")),
+ .little => try testing.expect(eql(u8, &my_bytes, "\x99\x56\x34\x12")),
}
}
@@ -4169,15 +3840,15 @@ pub fn bytesAsValue(comptime T: type, bytes: anytype) BytesAsValueReturnType(T,
test "bytesAsValue" {
const deadbeef = @as(u32, 0xDEADBEEF);
const deadbeef_bytes = switch (native_endian) {
- .Big => "\xDE\xAD\xBE\xEF",
- .Little => "\xEF\xBE\xAD\xDE",
+ .big => "\xDE\xAD\xBE\xEF",
+ .little => "\xEF\xBE\xAD\xDE",
};
try testing.expect(deadbeef == bytesAsValue(u32, deadbeef_bytes).*);
var codeface_bytes: [4]u8 = switch (native_endian) {
- .Big => "\xC0\xDE\xFA\xCE",
- .Little => "\xCE\xFA\xDE\xC0",
+ .big => "\xC0\xDE\xFA\xCE",
+ .little => "\xCE\xFA\xDE\xC0",
}.*;
var codeface = bytesAsValue(u32, &codeface_bytes);
try testing.expect(codeface.* == 0xC0DEFACE);
@@ -4199,8 +3870,8 @@ test "bytesAsValue" {
.d = 0xA1,
};
const inst_bytes = switch (native_endian) {
- .Little => "\xBE\xEF\xDE\xA1",
- .Big => "\xA1\xDE\xEF\xBE",
+ .little => "\xBE\xEF\xDE\xA1",
+ .big => "\xA1\xDE\xEF\xBE",
};
const inst2 = bytesAsValue(S, inst_bytes);
try testing.expect(meta.eql(inst, inst2.*));
@@ -4227,8 +3898,8 @@ pub fn bytesToValue(comptime T: type, bytes: anytype) T {
}
test "bytesToValue" {
const deadbeef_bytes = switch (native_endian) {
- .Big => "\xDE\xAD\xBE\xEF",
- .Little => "\xEF\xBE\xAD\xDE",
+ .big => "\xDE\xAD\xBE\xEF",
+ .little => "\xEF\xBE\xAD\xDE",
};
const deadbeef = bytesToValue(u32, deadbeef_bytes);
@@ -4357,8 +4028,8 @@ test "sliceAsBytes" {
const slice = sliceAsBytes(bytes[0..]);
try testing.expect(slice.len == 4);
try testing.expect(eql(u8, slice, switch (native_endian) {
- .Big => "\xDE\xAD\xBE\xEF",
- .Little => "\xAD\xDE\xEF\xBE",
+ .big => "\xDE\xAD\xBE\xEF",
+ .little => "\xAD\xDE\xEF\xBE",
}));
}
@@ -4533,7 +4204,7 @@ test "doNotOptimizeAway" {
doNotOptimizeAway(@as(f64, 0.0));
doNotOptimizeAway([_]u8{0} ** 4);
doNotOptimizeAway([_]u8{0} ** 100);
- doNotOptimizeAway(@as(std.builtin.Endian, .Little));
+ doNotOptimizeAway(@as(std.builtin.Endian, .little));
}
test "alignForward" {
@@ -4671,7 +4342,6 @@ pub fn alignInSlice(slice: anytype, comptime new_alignment: usize) ?AlignedSlice
}
test "read/write(Var)PackedInt" {
- if (builtin.zig_backend == .stage2_c) return error.SkipZigTest;
if (builtin.zig_backend == .stage2_x86_64) return error.SkipZigTest;
switch (builtin.cpu.arch) {
@@ -4686,7 +4356,7 @@ test "read/write(Var)PackedInt" {
return error.SkipZigTest;
}
- const foreign_endian: Endian = if (native_endian == .Big) .Little else .Big;
+ const foreign_endian: Endian = if (native_endian == .big) .little else .big;
const expect = std.testing.expect;
var prng = std.rand.DefaultPrng.init(1234);
const random = prng.random();
diff --git a/lib/std/net.zig b/lib/std/net.zig
index b6f0f20f2c..9e32fe613f 100644
--- a/lib/std/net.zig
+++ b/lib/std/net.zig
@@ -602,8 +602,8 @@ pub const Ip6Address = extern struct {
}
const big_endian_parts = @as(*align(1) const [8]u16, @ptrCast(&self.sa.addr));
const native_endian_parts = switch (native_endian) {
- .Big => big_endian_parts.*,
- .Little => blk: {
+ .big => big_endian_parts.*,
+ .little => blk: {
var buf: [8]u16 = undefined;
for (big_endian_parts, 0..) |part, i| {
buf[i] = mem.bigToNative(u16, part);
@@ -1052,7 +1052,7 @@ fn linuxLookupName(
} else {
sa6.addr[0..12].* = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff".*;
da6.addr[0..12].* = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff".*;
- mem.writeIntNative(u32, da6.addr[12..], addr.addr.in.sa.addr);
+ mem.writeInt(u32, da6.addr[12..], addr.addr.in.sa.addr, native_endian);
da4.addr = addr.addr.in.sa.addr;
da = @ptrCast(&da4);
dalen = @sizeOf(os.sockaddr.in);
@@ -1073,7 +1073,7 @@ fn linuxLookupName(
os.getsockname(fd, sa, &salen) catch break :syscalls;
if (addr.addr.any.family == os.AF.INET) {
// TODO sa6.addr[12..16] should return *[4]u8, making this cast unnecessary.
- mem.writeIntNative(u32, @as(*[4]u8, @ptrCast(&sa6.addr[12])), sa4.addr);
+ mem.writeInt(u32, @as(*[4]u8, @ptrCast(&sa6.addr[12])), sa4.addr, native_endian);
}
if (dscope == @as(i32, scopeOf(sa6.addr))) key |= DAS_MATCHINGSCOPE;
if (dlabel == labelOf(sa6.addr)) key |= DAS_MATCHINGLABEL;
@@ -1569,7 +1569,7 @@ fn resMSendRc(
);
for (0..ns.len) |i| {
if (ns[i].any.family != os.AF.INET) continue;
- mem.writeIntNative(u32, ns[i].in6.sa.addr[12..], ns[i].in.sa.addr);
+ mem.writeInt(u32, ns[i].in6.sa.addr[12..], ns[i].in.sa.addr, native_endian);
ns[i].in6.sa.addr[0..12].* = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff".*;
ns[i].any.family = os.AF.INET6;
ns[i].in6.sa.flowinfo = 0;
diff --git a/lib/std/os/linux.zig b/lib/std/os/linux.zig
index d1202dc2ed..08fef213e9 100644
--- a/lib/std/os/linux.zig
+++ b/lib/std/os/linux.zig
@@ -206,11 +206,11 @@ fn splitValueBE64(val: i64) [2]u32 {
fn splitValue64(val: i64) [2]u32 {
const u: u64 = @bitCast(val);
switch (native_endian) {
- .Little => return [2]u32{
+ .little => return [2]u32{
@as(u32, @truncate(u)),
@as(u32, @truncate(u >> 32)),
},
- .Big => return [2]u32{
+ .big => return [2]u32{
@as(u32, @truncate(u >> 32)),
@as(u32, @truncate(u)),
},
@@ -6028,7 +6028,7 @@ pub const AUDIT = struct {
fn toAudit(arch: std.Target.Cpu.Arch) u32 {
var res: u32 = @intFromEnum(arch.toElfMachine());
- if (arch.endian() == .Little) res |= LE;
+ if (arch.endian() == .little) res |= LE;
switch (arch) {
.aarch64,
.mips64,
diff --git a/lib/std/os/linux/bpf.zig b/lib/std/os/linux/bpf.zig
index 4828b1d8ea..48561012c5 100644
--- a/lib/std/os/linux/bpf.zig
+++ b/lib/std/os/linux/bpf.zig
@@ -696,8 +696,8 @@ pub const Insn = packed struct {
fn endian_swap(endian: std.builtin.Endian, comptime size: Size, dst: Reg) Insn {
return Insn{
.code = switch (endian) {
- .Big => 0xdc,
- .Little => 0xd4,
+ .big => 0xdc,
+ .little => 0xd4,
},
.dst = @intFromEnum(dst),
.src = 0,
@@ -712,11 +712,11 @@ pub const Insn = packed struct {
}
pub fn le(comptime size: Size, dst: Reg) Insn {
- return endian_swap(.Little, size, dst);
+ return endian_swap(.little, size, dst);
}
pub fn be(comptime size: Size, dst: Reg) Insn {
- return endian_swap(.Big, size, dst);
+ return endian_swap(.big, size, dst);
}
pub fn call(helper: Helper) Insn {
diff --git a/lib/std/os/linux/seccomp.zig b/lib/std/os/linux/seccomp.zig
index f10cb84aa0..8e38598c69 100644
--- a/lib/std/os/linux/seccomp.zig
+++ b/lib/std/os/linux/seccomp.zig
@@ -54,7 +54,7 @@
//! manner to the OpenSSH example:
//!
//! ```zig
-//! const offset = if (native_endian == .Little) struct {
+//! const offset = if (native_endian == .little) struct {
//! pub const low = 0;
//! pub const high = @sizeOf(u32);
//! } else struct {
diff --git a/lib/std/os/test.zig b/lib/std/os/test.zig
index 734f56490f..b7c1b7b675 100644
--- a/lib/std/os/test.zig
+++ b/lib/std/os/test.zig
@@ -609,7 +609,7 @@ test "mmap" {
var i: u32 = 0;
while (i < alloc_size / @sizeOf(u32)) : (i += 1) {
- try stream.writeIntNative(u32, i);
+ try stream.writeInt(u32, i, .little);
}
}
@@ -633,7 +633,7 @@ test "mmap" {
var i: u32 = 0;
while (i < alloc_size / @sizeOf(u32)) : (i += 1) {
- try testing.expectEqual(i, try stream.readIntNative(u32));
+ try testing.expectEqual(i, try stream.readInt(u32, .little));
}
}
@@ -657,7 +657,7 @@ test "mmap" {
var i: u32 = alloc_size / 2 / @sizeOf(u32);
while (i < alloc_size / @sizeOf(u32)) : (i += 1) {
- try testing.expectEqual(i, try stream.readIntNative(u32));
+ try testing.expectEqual(i, try stream.readInt(u32, .little));
}
}
diff --git a/lib/std/os/windows.zig b/lib/std/os/windows.zig
index c327d38dd6..e6d97ecbf3 100644
--- a/lib/std/os/windows.zig
+++ b/lib/std/os/windows.zig
@@ -3360,13 +3360,13 @@ pub const GUID = extern struct {
Data4: [8]u8,
const hex_offsets = switch (builtin.target.cpu.arch.endian()) {
- .Big => [16]u6{
+ .big => [16]u6{
0, 2, 4, 6,
9, 11, 14, 16,
19, 21, 24, 26,
28, 30, 32, 34,
},
- .Little => [16]u6{
+ .little => [16]u6{
6, 4, 2, 0,
11, 9, 16, 14,
19, 21, 24, 26,
diff --git a/lib/std/packed_int_array.zig b/lib/std/packed_int_array.zig
index cff9eb8cf1..7264fed599 100644
--- a/lib/std/packed_int_array.zig
+++ b/lib/std/packed_int_array.zig
@@ -79,12 +79,12 @@ pub fn PackedIntIo(comptime Int: type, comptime endian: Endian) type {
if (endian != native_endian) value = @byteSwap(value);
switch (endian) {
- .Big => {
+ .big => {
value <<= @as(Shift, @intCast(head_keep_bits));
value >>= @as(Shift, @intCast(head_keep_bits));
value >>= @as(Shift, @intCast(tail_keep_bits));
},
- .Little => {
+ .little => {
value <<= @as(Shift, @intCast(tail_keep_bits));
value >>= @as(Shift, @intCast(tail_keep_bits));
value >>= @as(Shift, @intCast(head_keep_bits));
@@ -115,8 +115,8 @@ pub fn PackedIntIo(comptime Int: type, comptime endian: Endian) type {
const head_keep_bits = bit_index - (start_byte * 8);
const tail_keep_bits = container_bits - (int_bits + head_keep_bits);
const keep_shift = switch (endian) {
- .Big => @as(Shift, @intCast(tail_keep_bits)),
- .Little => @as(Shift, @intCast(head_keep_bits)),
+ .big => @as(Shift, @intCast(tail_keep_bits)),
+ .little => @as(Shift, @intCast(head_keep_bits)),
};
//position the bits where they need to be in the container
@@ -388,10 +388,10 @@ test "PackedIntArray" {
test "PackedIntIo" {
const bytes = [_]u8{ 0b01101_000, 0b01011_110, 0b00011_101 };
- try testing.expectEqual(@as(u15, 0x2bcd), PackedIntIo(u15, .Little).get(&bytes, 0, 3));
- try testing.expectEqual(@as(u16, 0xabcd), PackedIntIo(u16, .Little).get(&bytes, 0, 3));
- try testing.expectEqual(@as(u17, 0x1abcd), PackedIntIo(u17, .Little).get(&bytes, 0, 3));
- try testing.expectEqual(@as(u18, 0x3abcd), PackedIntIo(u18, .Little).get(&bytes, 0, 3));
+ try testing.expectEqual(@as(u15, 0x2bcd), PackedIntIo(u15, .little).get(&bytes, 0, 3));
+ try testing.expectEqual(@as(u16, 0xabcd), PackedIntIo(u16, .little).get(&bytes, 0, 3));
+ try testing.expectEqual(@as(u17, 0x1abcd), PackedIntIo(u17, .little).get(&bytes, 0, 3));
+ try testing.expectEqual(@as(u18, 0x3abcd), PackedIntIo(u18, .little).get(&bytes, 0, 3));
}
test "PackedIntArray init" {
@@ -555,16 +555,16 @@ test "PackedInt(Array/Slice) sliceCast" {
var i = @as(usize, 0);
while (i < packed_slice_cast_2.len) : (i += 1) {
const val = switch (native_endian) {
- .Big => 0b01,
- .Little => 0b10,
+ .big => 0b01,
+ .little => 0b10,
};
try testing.expect(packed_slice_cast_2.get(i) == val);
}
i = 0;
while (i < packed_slice_cast_4.len) : (i += 1) {
const val = switch (native_endian) {
- .Big => 0b0101,
- .Little => 0b1010,
+ .big => 0b0101,
+ .little => 0b1010,
};
try testing.expect(packed_slice_cast_4.get(i) == val);
}
@@ -577,8 +577,8 @@ test "PackedInt(Array/Slice) sliceCast" {
i = 0;
while (i < packed_slice_cast_3.len) : (i += 1) {
const val = switch (native_endian) {
- .Big => if (i % 2 == 0) @as(u3, 0b111) else @as(u3, 0b000),
- .Little => if (i % 2 == 0) @as(u3, 0b111) else @as(u3, 0b000),
+ .big => if (i % 2 == 0) @as(u3, 0b111) else @as(u3, 0b000),
+ .little => if (i % 2 == 0) @as(u3, 0b111) else @as(u3, 0b000),
};
try testing.expect(packed_slice_cast_3.get(i) == val);
}
@@ -586,7 +586,7 @@ test "PackedInt(Array/Slice) sliceCast" {
test "PackedInt(Array/Slice)Endian" {
{
- const PackedArrayBe = PackedIntArrayEndian(u4, .Big, 8);
+ const PackedArrayBe = PackedIntArrayEndian(u4, .big, 8);
var packed_array_be = PackedArrayBe.init([_]u4{ 0, 1, 2, 3, 4, 5, 6, 7 });
try testing.expect(packed_array_be.bytes[0] == 0b00000001);
try testing.expect(packed_array_be.bytes[1] == 0b00100011);
@@ -596,14 +596,14 @@ test "PackedInt(Array/Slice)Endian" {
try testing.expect(packed_array_be.get(i) == i);
}
- var packed_slice_le = packed_array_be.sliceCastEndian(u4, .Little);
+ var packed_slice_le = packed_array_be.sliceCastEndian(u4, .little);
i = 0;
while (i < packed_slice_le.len) : (i += 1) {
const val = if (i % 2 == 0) i + 1 else i - 1;
try testing.expect(packed_slice_le.get(i) == val);
}
- var packed_slice_le_shift = packed_array_be.slice(1, 5).sliceCastEndian(u4, .Little);
+ var packed_slice_le_shift = packed_array_be.slice(1, 5).sliceCastEndian(u4, .little);
i = 0;
while (i < packed_slice_le_shift.len) : (i += 1) {
const val = if (i % 2 == 0) i else i + 2;
@@ -612,7 +612,7 @@ test "PackedInt(Array/Slice)Endian" {
}
{
- const PackedArrayBe = PackedIntArrayEndian(u11, .Big, 8);
+ const PackedArrayBe = PackedIntArrayEndian(u11, .big, 8);
var packed_array_be = PackedArrayBe.init([_]u11{ 0, 1, 2, 3, 4, 5, 6, 7 });
try testing.expect(packed_array_be.bytes[0] == 0b00000000);
try testing.expect(packed_array_be.bytes[1] == 0b00000000);
@@ -625,7 +625,7 @@ test "PackedInt(Array/Slice)Endian" {
try testing.expect(packed_array_be.get(i) == i);
}
- var packed_slice_le = packed_array_be.sliceCastEndian(u11, .Little);
+ var packed_slice_le = packed_array_be.sliceCastEndian(u11, .little);
try testing.expect(packed_slice_le.get(0) == 0b00000000000);
try testing.expect(packed_slice_le.get(1) == 0b00010000000);
try testing.expect(packed_slice_le.get(2) == 0b00000000100);
@@ -635,7 +635,7 @@ test "PackedInt(Array/Slice)Endian" {
try testing.expect(packed_slice_le.get(6) == 0b10000010000);
try testing.expect(packed_slice_le.get(7) == 0b00000111001);
- var packed_slice_le_shift = packed_array_be.slice(1, 5).sliceCastEndian(u11, .Little);
+ var packed_slice_le_shift = packed_array_be.slice(1, 5).sliceCastEndian(u11, .little);
try testing.expect(packed_slice_le_shift.get(0) == 0b00010000000);
try testing.expect(packed_slice_le_shift.get(1) == 0b00000000100);
try testing.expect(packed_slice_le_shift.get(2) == 0b00000000000);
diff --git a/lib/std/pdb.zig b/lib/std/pdb.zig
index 0f77279677..acc8aa1ec7 100644
--- a/lib/std/pdb.zig
+++ b/lib/std/pdb.zig
@@ -464,12 +464,12 @@ pub const PDBStringTableHeader = extern struct {
};
fn readSparseBitVector(stream: anytype, allocator: mem.Allocator) ![]u32 {
- const num_words = try stream.readIntLittle(u32);
+ const num_words = try stream.readInt(u32, .little);
var list = ArrayList(u32).init(allocator);
errdefer list.deinit();
var word_i: u32 = 0;
while (word_i != num_words) : (word_i += 1) {
- const word = try stream.readIntLittle(u32);
+ const word = try stream.readInt(u32, .little);
var bit_i: u5 = 0;
while (true) : (bit_i += 1) {
if (word & (@as(u32, 1) << bit_i) != 0) {
@@ -599,7 +599,7 @@ pub const Pdb = struct {
var sect_cont_offset: usize = 0;
if (section_contrib_size != 0) {
- const version = reader.readEnum(SectionContrSubstreamVersion, .Little) catch |err| switch (err) {
+ const version = reader.readEnum(SectionContrSubstreamVersion, .little) catch |err| switch (err) {
error.InvalidValue => return error.InvalidDebugInfo,
else => |e| return e,
};
@@ -625,10 +625,10 @@ pub const Pdb = struct {
const reader = stream.reader();
// Parse the InfoStreamHeader.
- const version = try reader.readIntLittle(u32);
- const signature = try reader.readIntLittle(u32);
+ const version = try reader.readInt(u32, .little);
+ const signature = try reader.readInt(u32, .little);
_ = signature;
- const age = try reader.readIntLittle(u32);
+ const age = try reader.readInt(u32, .little);
const guid = try reader.readBytesNoEof(16);
if (version != 20000404) // VC70, only value observed by LLVM team
@@ -639,7 +639,7 @@ pub const Pdb = struct {
// Find the string table.
const string_table_index = str_tab_index: {
- const name_bytes_len = try reader.readIntLittle(u32);
+ const name_bytes_len = try reader.readInt(u32, .little);
const name_bytes = try self.allocator.alloc(u8, name_bytes_len);
defer self.allocator.free(name_bytes);
try reader.readNoEof(name_bytes);
@@ -667,8 +667,8 @@ pub const Pdb = struct {
defer self.allocator.free(deleted);
for (present) |_| {
- const name_offset = try reader.readIntLittle(u32);
- const name_index = try reader.readIntLittle(u32);
+ const name_offset = try reader.readInt(u32, .little);
+ const name_index = try reader.readInt(u32, .little);
if (name_offset > name_bytes.len)
return error.InvalidDebugInfo;
const name = mem.sliceTo(name_bytes[name_offset..], 0);
@@ -821,7 +821,7 @@ pub const Pdb = struct {
return error.MissingDebugInfo;
const reader = stream.reader();
- const signature = try reader.readIntLittle(u32);
+ const signature = try reader.readInt(u32, .little);
if (signature != 4)
return error.InvalidDebugInfo;
@@ -899,7 +899,7 @@ const Msf = struct {
try file.seekTo(superblock.BlockSize * superblock.BlockMapAddr);
var dir_blocks = try allocator.alloc(u32, dir_block_count);
for (dir_blocks) |*b| {
- b.* = try in.readIntLittle(u32);
+ b.* = try in.readInt(u32, .little);
}
var directory = MsfStream.init(
superblock.BlockSize,
@@ -908,7 +908,7 @@ const Msf = struct {
);
const begin = directory.pos;
- const stream_count = try directory.reader().readIntLittle(u32);
+ const stream_count = try directory.reader().readInt(u32, .little);
const stream_sizes = try allocator.alloc(u32, stream_count);
defer allocator.free(stream_sizes);
@@ -917,7 +917,7 @@ const Msf = struct {
// and must be taken into account when resolving stream indices.
const Nil = 0xFFFFFFFF;
for (stream_sizes) |*s| {
- const size = try directory.reader().readIntLittle(u32);
+ const size = try directory.reader().readInt(u32, .little);
s.* = if (size == Nil) 0 else blockCountFromSize(size, superblock.BlockSize);
}
@@ -932,7 +932,7 @@ const Msf = struct {
var blocks = try allocator.alloc(u32, size);
var j: u32 = 0;
while (j < size) : (j += 1) {
- const block_id = try directory.reader().readIntLittle(u32);
+ const block_id = try directory.reader().readInt(u32, .little);
const n = (block_id % superblock.BlockSize);
// 0 is for SuperBlock, 1 and 2 for FPMs.
if (block_id == 0 or n == 1 or n == 2 or block_id * superblock.BlockSize > file_len)
diff --git a/lib/std/rand.zig b/lib/std/rand.zig
index c573a94d61..aec461883b 100644
--- a/lib/std/rand.zig
+++ b/lib/std/rand.zig
@@ -104,15 +104,16 @@ pub const Random = struct {
pub fn int(r: Random, comptime T: type) T {
const bits = @typeInfo(T).Int.bits;
const UnsignedT = std.meta.Int(.unsigned, bits);
- const ByteAlignedT = std.meta.Int(.unsigned, @divTrunc(bits + 7, 8) * 8);
+ const ceil_bytes = comptime std.math.divCeil(u16, bits, 8) catch unreachable;
+ const ByteAlignedT = std.meta.Int(.unsigned, ceil_bytes * 8);
- var rand_bytes: [@sizeOf(ByteAlignedT)]u8 = undefined;
- r.bytes(rand_bytes[0..]);
+ var rand_bytes: [ceil_bytes]u8 = undefined;
+ r.bytes(&rand_bytes);
// use LE instead of native endian for better portability maybe?
// TODO: endian portability is pointless if the underlying prng isn't endian portable.
// TODO: document the endian portability of this library.
- const byte_aligned_result = mem.readIntSliceLittle(ByteAlignedT, &rand_bytes);
+ const byte_aligned_result = mem.readInt(ByteAlignedT, &rand_bytes, .little);
const unsigned_result: UnsignedT = @truncate(byte_aligned_result);
return @bitCast(unsigned_result);
}
diff --git a/lib/std/rand/Ascon.zig b/lib/std/rand/Ascon.zig
index da0ce66259..6a3cb13165 100644
--- a/lib/std/rand/Ascon.zig
+++ b/lib/std/rand/Ascon.zig
@@ -13,7 +13,7 @@ const mem = std.mem;
const Random = std.rand.Random;
const Self = @This();
-const Ascon = std.crypto.core.Ascon(.Little);
+const Ascon = std.crypto.core.Ascon(.little);
state: Ascon,
diff --git a/lib/std/rand/Isaac64.zig b/lib/std/rand/Isaac64.zig
index 785c551dfd..8684ba8e22 100644
--- a/lib/std/rand/Isaac64.zig
+++ b/lib/std/rand/Isaac64.zig
@@ -228,7 +228,7 @@ test "isaac64 fill" {
for (seq) |s| {
var buf0: [8]u8 = undefined;
var buf1: [7]u8 = undefined;
- std.mem.writeIntLittle(u64, &buf0, s);
+ std.mem.writeInt(u64, &buf0, s, .little);
r.fill(&buf1);
try std.testing.expect(std.mem.eql(u8, buf0[0..7], buf1[0..]));
}
diff --git a/lib/std/rand/Pcg.zig b/lib/std/rand/Pcg.zig
index b682197b23..d7d233659f 100644
--- a/lib/std/rand/Pcg.zig
+++ b/lib/std/rand/Pcg.zig
@@ -111,8 +111,8 @@ test "pcg fill" {
var i: u32 = 0;
while (i < seq.len) : (i += 2) {
var buf0: [8]u8 = undefined;
- std.mem.writeIntLittle(u32, buf0[0..4], seq[i]);
- std.mem.writeIntLittle(u32, buf0[4..8], seq[i + 1]);
+ std.mem.writeInt(u32, buf0[0..4], seq[i], .little);
+ std.mem.writeInt(u32, buf0[4..8], seq[i + 1], .little);
var buf1: [7]u8 = undefined;
r.fill(&buf1);
diff --git a/lib/std/rand/RomuTrio.zig b/lib/std/rand/RomuTrio.zig
index 4ce2b7af01..4caf5f0ce8 100644
--- a/lib/std/rand/RomuTrio.zig
+++ b/lib/std/rand/RomuTrio.zig
@@ -115,7 +115,7 @@ test "RomuTrio fill" {
for (seq) |s| {
var buf0: [8]u8 = undefined;
var buf1: [7]u8 = undefined;
- std.mem.writeIntLittle(u64, &buf0, s);
+ std.mem.writeInt(u64, &buf0, s, .little);
r.fill(&buf1);
try std.testing.expect(std.mem.eql(u8, buf0[0..7], buf1[0..]));
}
diff --git a/lib/std/rand/Sfc64.zig b/lib/std/rand/Sfc64.zig
index af439b115b..b4a8988e4d 100644
--- a/lib/std/rand/Sfc64.zig
+++ b/lib/std/rand/Sfc64.zig
@@ -125,7 +125,7 @@ test "Sfc64 fill" {
for (seq) |s| {
var buf0: [8]u8 = undefined;
var buf1: [7]u8 = undefined;
- std.mem.writeIntLittle(u64, &buf0, s);
+ std.mem.writeInt(u64, &buf0, s, .little);
r.fill(&buf1);
try std.testing.expect(std.mem.eql(u8, buf0[0..7], buf1[0..]));
}
diff --git a/lib/std/rand/Xoroshiro128.zig b/lib/std/rand/Xoroshiro128.zig
index 56c4980e6d..0272419ba2 100644
--- a/lib/std/rand/Xoroshiro128.zig
+++ b/lib/std/rand/Xoroshiro128.zig
@@ -140,7 +140,7 @@ test "xoroshiro fill" {
for (seq) |s| {
var buf0: [8]u8 = undefined;
var buf1: [7]u8 = undefined;
- std.mem.writeIntLittle(u64, &buf0, s);
+ std.mem.writeInt(u64, &buf0, s, .little);
r.fill(&buf1);
try std.testing.expect(std.mem.eql(u8, buf0[0..7], buf1[0..]));
}
diff --git a/lib/std/rand/Xoshiro256.zig b/lib/std/rand/Xoshiro256.zig
index 5c30dc3fa7..85ae669ecd 100644
--- a/lib/std/rand/Xoshiro256.zig
+++ b/lib/std/rand/Xoshiro256.zig
@@ -139,7 +139,7 @@ test "xoroshiro fill" {
for (seq) |s| {
var buf0: [8]u8 = undefined;
var buf1: [7]u8 = undefined;
- std.mem.writeIntLittle(u64, &buf0, s);
+ std.mem.writeInt(u64, &buf0, s, .little);
r.fill(&buf1);
try std.testing.expect(std.mem.eql(u8, buf0[0..7], buf1[0..]));
}
diff --git a/lib/std/rand/test.zig b/lib/std/rand/test.zig
index 2f4995b3fe..e8a1d4de8a 100644
--- a/lib/std/rand/test.zig
+++ b/lib/std/rand/test.zig
@@ -71,7 +71,7 @@ const Dilbert = struct {
for (seq) |s| {
var buf0: [8]u8 = undefined;
var buf1: [8]u8 = undefined;
- std.mem.writeIntBig(u64, &buf0, s);
+ std.mem.writeInt(u64, &buf0, s, .big);
r.fill(&buf1);
try std.testing.expect(std.mem.eql(u8, buf0[0..], buf1[0..]));
}
diff --git a/lib/std/target.zig b/lib/std/target.zig
index 7296b30434..3764b71d8f 100644
--- a/lib/std/target.zig
+++ b/lib/std/target.zig
@@ -1191,7 +1191,7 @@ pub const Target = struct {
.loongarch32,
.loongarch64,
.arc,
- => .Little,
+ => .little,
.armeb,
.aarch64_be,
@@ -1207,7 +1207,7 @@ pub const Target = struct {
.tce,
.lanai,
.s390x,
- => .Big,
+ => .big,
};
}
diff --git a/lib/std/tz.zig b/lib/std/tz.zig
index 16288bd4ce..bff0101439 100644
--- a/lib/std/tz.zig
+++ b/lib/std/tz.zig
@@ -59,7 +59,7 @@ pub const Tz = struct {
if (!std.mem.eql(u8, &legacy_header.magic, "TZif")) return error.BadHeader;
if (legacy_header.version != 0 and legacy_header.version != '2' and legacy_header.version != '3') return error.BadVersion;
- if (builtin.target.cpu.arch.endian() != std.builtin.Endian.Big) {
+ if (builtin.target.cpu.arch.endian() != std.builtin.Endian.big) {
std.mem.byteSwapAllFields(@TypeOf(legacy_header.counts), &legacy_header.counts);
}
@@ -73,7 +73,7 @@ pub const Tz = struct {
var header = try reader.readStruct(Header);
if (!std.mem.eql(u8, &header.magic, "TZif")) return error.BadHeader;
if (header.version != '2' and header.version != '3') return error.BadVersion;
- if (builtin.target.cpu.arch.endian() != std.builtin.Endian.Big) {
+ if (builtin.target.cpu.arch.endian() != std.builtin.Endian.big) {
std.mem.byteSwapAllFields(@TypeOf(header.counts), &header.counts);
}
@@ -98,7 +98,7 @@ pub const Tz = struct {
// Parse transition types
var i: usize = 0;
while (i < header.counts.timecnt) : (i += 1) {
- transitions[i].ts = if (legacy) try reader.readIntBig(i32) else try reader.readIntBig(i64);
+ transitions[i].ts = if (legacy) try reader.readInt(i32, .big) else try reader.readInt(i64, .big);
}
i = 0;
@@ -111,7 +111,7 @@ pub const Tz = struct {
// Parse time types
i = 0;
while (i < header.counts.typecnt) : (i += 1) {
- const offset = try reader.readIntBig(i32);
+ const offset = try reader.readInt(i32, .big);
if (offset < -2147483648) return error.Malformed; // rfc8536: utoff [...] MUST NOT be -2**31
const dst = try reader.readByte();
if (dst != 0 and dst != 1) return error.Malformed; // rfc8536: (is)dst [...] The value MUST be 0 or 1.
@@ -144,12 +144,12 @@ pub const Tz = struct {
// Parse leap seconds
i = 0;
while (i < header.counts.leapcnt) : (i += 1) {
- const occur: i64 = if (legacy) try reader.readIntBig(i32) else try reader.readIntBig(i64);
+ const occur: i64 = if (legacy) try reader.readInt(i32, .big) else try reader.readInt(i64, .big);
if (occur < 0) return error.Malformed; // rfc8536: occur [...] MUST be nonnegative
if (i > 0 and leapseconds[i - 1].occurrence + 2419199 > occur) return error.Malformed; // rfc8536: occur [...] each later value MUST be at least 2419199 greater than the previous value
if (occur > std.math.maxInt(i48)) return error.Malformed; // Unreasonably far into the future
- const corr = try reader.readIntBig(i32);
+ const corr = try reader.readInt(i32, .big);
if (i == 0 and corr != -1 and corr != 1) return error.Malformed; // rfc8536: The correction value in the first leap-second record, if present, MUST be either one (1) or minus one (-1)
if (i > 0 and leapseconds[i - 1].correction != corr + 1 and leapseconds[i - 1].correction != corr - 1) return error.Malformed; // rfc8536: The correction values in adjacent leap-second records MUST differ by exactly one (1)
if (corr > std.math.maxInt(i16)) return error.Malformed; // Unreasonably large correction
diff --git a/lib/std/unicode.zig b/lib/std/unicode.zig
index 4a4a1b10d1..bd73a3bea3 100644
--- a/lib/std/unicode.zig
+++ b/lib/std/unicode.zig
@@ -1,8 +1,9 @@
const std = @import("./std.zig");
+const builtin = @import("builtin");
const assert = std.debug.assert;
const testing = std.testing;
const mem = std.mem;
-const builtin = @import("builtin");
+const native_endian = builtin.cpu.arch.endian();
/// Use this to replace an unknown, unrecognized, or unrepresentable character.
///
@@ -175,7 +176,7 @@ pub fn utf8CountCodepoints(s: []const u8) !usize {
while (i < s.len) {
// Fast path for ASCII sequences
while (i + N <= s.len) : (i += N) {
- const v = mem.readIntNative(usize, s[i..][0..N]);
+ const v = mem.readInt(usize, s[i..][0..N], native_endian);
if (v & MASK != 0) break;
len += N;
}
@@ -451,12 +452,12 @@ pub const Utf16LeIterator = struct {
assert(it.i <= it.bytes.len);
if (it.i == it.bytes.len) return null;
var code_units: [2]u16 = undefined;
- code_units[0] = mem.readIntLittle(u16, it.bytes[it.i..][0..2]);
+ code_units[0] = mem.readInt(u16, it.bytes[it.i..][0..2], .little);
it.i += 2;
if (utf16IsHighSurrogate(code_units[0])) {
// surrogate pair
if (it.i >= it.bytes.len) return error.DanglingSurrogateHalf;
- code_units[1] = mem.readIntLittle(u16, it.bytes[it.i..][0..2]);
+ code_units[1] = mem.readInt(u16, it.bytes[it.i..][0..2], .little);
const codepoint = try utf16DecodeSurrogatePair(&code_units);
it.i += 2;
return codepoint;
@@ -877,16 +878,16 @@ test "utf16leToUtf8" {
const utf16le_as_bytes = mem.sliceAsBytes(utf16le[0..]);
{
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 'A');
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 'a');
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 'A', .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 'a', .little);
const utf8 = try utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
defer std.testing.allocator.free(utf8);
try testing.expect(mem.eql(u8, utf8, "Aa"));
}
{
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 0x80);
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 0xffff);
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 0x80, .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 0xffff, .little);
const utf8 = try utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
defer std.testing.allocator.free(utf8);
try testing.expect(mem.eql(u8, utf8, "\xc2\x80" ++ "\xef\xbf\xbf"));
@@ -894,8 +895,8 @@ test "utf16leToUtf8" {
{
// the values just outside the surrogate half range
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 0xd7ff);
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 0xe000);
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 0xd7ff, .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 0xe000, .little);
const utf8 = try utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
defer std.testing.allocator.free(utf8);
try testing.expect(mem.eql(u8, utf8, "\xed\x9f\xbf" ++ "\xee\x80\x80"));
@@ -903,8 +904,8 @@ test "utf16leToUtf8" {
{
// smallest surrogate pair
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 0xd800);
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 0xdc00);
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 0xd800, .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 0xdc00, .little);
const utf8 = try utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
defer std.testing.allocator.free(utf8);
try testing.expect(mem.eql(u8, utf8, "\xf0\x90\x80\x80"));
@@ -912,24 +913,24 @@ test "utf16leToUtf8" {
{
// largest surrogate pair
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 0xdbff);
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 0xdfff);
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 0xdbff, .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 0xdfff, .little);
const utf8 = try utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
defer std.testing.allocator.free(utf8);
try testing.expect(mem.eql(u8, utf8, "\xf4\x8f\xbf\xbf"));
}
{
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 0xdbff);
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 0xdc00);
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 0xdbff, .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 0xdc00, .little);
const utf8 = try utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
defer std.testing.allocator.free(utf8);
try testing.expect(mem.eql(u8, utf8, "\xf4\x8f\xb0\x80"));
}
{
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[0..], 0xdcdc);
- mem.writeIntSliceLittle(u16, utf16le_as_bytes[2..], 0xdcdc);
+ mem.writeInt(u16, utf16le_as_bytes[0..2], 0xdcdc, .little);
+ mem.writeInt(u16, utf16le_as_bytes[2..4], 0xdcdc, .little);
const result = utf16leToUtf8Alloc(std.testing.allocator, &utf16le);
try std.testing.expectError(error.UnexpectedSecondSurrogateHalf, result);
}
@@ -1140,12 +1141,12 @@ test "fmtUtf16le" {
try expectFmt("", "{}", .{fmtUtf16le(utf8ToUtf16LeStringLiteral(""))});
try expectFmt("foo", "{}", .{fmtUtf16le(utf8ToUtf16LeStringLiteral("foo"))});
try expectFmt("𐐷", "{}", .{fmtUtf16le(utf8ToUtf16LeStringLiteral("𐐷"))});
- try expectFmt("퟿", "{}", .{fmtUtf16le(&[_]u16{std.mem.readIntNative(u16, "\xff\xd7")})});
- try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readIntNative(u16, "\x00\xd8")})});
- try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readIntNative(u16, "\xff\xdb")})});
- try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readIntNative(u16, "\x00\xdc")})});
- try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readIntNative(u16, "\xff\xdf")})});
- try expectFmt("", "{}", .{fmtUtf16le(&[_]u16{std.mem.readIntNative(u16, "\x00\xe0")})});
+ try expectFmt("퟿", "{}", .{fmtUtf16le(&[_]u16{std.mem.readInt(u16, "\xff\xd7", native_endian)})});
+ try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readInt(u16, "\x00\xd8", native_endian)})});
+ try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readInt(u16, "\xff\xdb", native_endian)})});
+ try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readInt(u16, "\x00\xdc", native_endian)})});
+ try expectFmt("�", "{}", .{fmtUtf16le(&[_]u16{std.mem.readInt(u16, "\xff\xdf", native_endian)})});
+ try expectFmt("", "{}", .{fmtUtf16le(&[_]u16{std.mem.readInt(u16, "\x00\xe0", native_endian)})});
}
test "utf8ToUtf16LeStringLiteral" {
diff --git a/lib/std/zig/Server.zig b/lib/std/zig/Server.zig
index 15795176a0..7d5abaf6ea 100644
--- a/lib/std/zig/Server.zig
+++ b/lib/std/zig/Server.zig
@@ -279,12 +279,12 @@ fn bswap_u32_array(slice: []u32) void {
/// workaround for https://github.com/ziglang/zig/issues/14904
fn bswap_and_workaround_u32(bytes_ptr: *const [4]u8) u32 {
- return std.mem.readIntLittle(u32, bytes_ptr);
+ return std.mem.readInt(u32, bytes_ptr, .little);
}
/// workaround for https://github.com/ziglang/zig/issues/14904
fn bswap_and_workaround_tag(bytes_ptr: *const [4]u8) InMessage.Tag {
- const int = std.mem.readIntLittle(u32, bytes_ptr);
+ const int = std.mem.readInt(u32, bytes_ptr, .little);
return @as(InMessage.Tag, @enumFromInt(int));
}
@@ -297,4 +297,4 @@ const std = @import("std");
const Allocator = std.mem.Allocator;
const assert = std.debug.assert;
const native_endian = builtin.target.cpu.arch.endian();
-const need_bswap = native_endian != .Little;
+const need_bswap = native_endian != .little;
diff --git a/lib/std/zig/system/NativeTargetInfo.zig b/lib/std/zig/system/NativeTargetInfo.zig
index f2700b48ce..ba0d699f91 100644
--- a/lib/std/zig/system/NativeTargetInfo.zig
+++ b/lib/std/zig/system/NativeTargetInfo.zig
@@ -488,8 +488,8 @@ fn glibcVerFromSoFile(file: fs.File) !std.SemanticVersion {
const hdr64 = @as(*elf.Elf64_Ehdr, @ptrCast(&hdr_buf));
if (!mem.eql(u8, hdr32.e_ident[0..4], elf.MAGIC)) return error.InvalidElfMagic;
const elf_endian: std.builtin.Endian = switch (hdr32.e_ident[elf.EI_DATA]) {
- elf.ELFDATA2LSB => .Little,
- elf.ELFDATA2MSB => .Big,
+ elf.ELFDATA2LSB => .little,
+ elf.ELFDATA2MSB => .big,
else => return error.InvalidElfEndian,
};
const need_bswap = elf_endian != native_endian;
@@ -635,8 +635,8 @@ pub fn abiAndDynamicLinkerFromFile(
const hdr64 = @as(*elf.Elf64_Ehdr, @ptrCast(&hdr_buf));
if (!mem.eql(u8, hdr32.e_ident[0..4], elf.MAGIC)) return error.InvalidElfMagic;
const elf_endian: std.builtin.Endian = switch (hdr32.e_ident[elf.EI_DATA]) {
- elf.ELFDATA2LSB => .Little,
- elf.ELFDATA2MSB => .Big,
+ elf.ELFDATA2LSB => .little,
+ elf.ELFDATA2MSB => .big,
else => return error.InvalidElfEndian,
};
const need_bswap = elf_endian != native_endian;