Index: net/quic/test_tools/crypto_test_utils_openssl.cc |
diff --git a/net/quic/test_tools/crypto_test_utils_openssl.cc b/net/quic/test_tools/crypto_test_utils_openssl.cc |
index a7f968d490e63398dc42eeb6d7609e0e57a27fbd..80228ee90ce7b49b636d330581e5de7ab2e28239 100644 |
--- a/net/quic/test_tools/crypto_test_utils_openssl.cc |
+++ b/net/quic/test_tools/crypto_test_utils_openssl.cc |
@@ -49,21 +49,21 @@ class TestChannelIDKey : public ChannelIDKey { |
return false; |
} |
- scoped_ptr<uint8[]> der_sig(new uint8[sig_len]); |
+ scoped_ptr<uint8_t[]> der_sig(new uint8_t[sig_len]); |
if (!EVP_DigestSignFinal(md_ctx.get(), der_sig.get(), &sig_len)) { |
return false; |
} |
- uint8* derp = der_sig.get(); |
+ uint8_t* derp = der_sig.get(); |
crypto::ScopedECDSA_SIG sig( |
- d2i_ECDSA_SIG(nullptr, const_cast<const uint8**>(&derp), sig_len)); |
+ d2i_ECDSA_SIG(nullptr, const_cast<const uint8_t**>(&derp), sig_len)); |
if (sig.get() == nullptr) { |
return false; |
} |
// The signature consists of a pair of 32-byte numbers. |
static const size_t kSignatureLength = 32 * 2; |
- scoped_ptr<uint8[]> signature(new uint8[kSignatureLength]); |
+ scoped_ptr<uint8_t[]> signature(new uint8_t[kSignatureLength]); |
if (!BN_bn2bin_padded(&signature[0], 32, sig->r) || |
!BN_bn2bin_padded(&signature[32], 32, sig->s)) { |
return false; |
@@ -86,8 +86,8 @@ class TestChannelIDKey : public ChannelIDKey { |
return ""; |
} |
- uint8 buf[kExpectedKeyLength]; |
- uint8* derp = buf; |
+ uint8_t buf[kExpectedKeyLength]; |
+ uint8_t* derp = buf; |
i2d_PublicKey(ecdsa_key_.get(), &derp); |
return string(reinterpret_cast<char*>(buf + 1), kExpectedKeyLength - 1); |