mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-12 19:38:26 -06:00
Avoid conflict with C++17 features std::byte by using uint8 type instead of byte
This commit is contained in:
@@ -834,7 +834,7 @@ namespace VeraCrypt
|
||||
if (wxCONV_FAILED == ulen)
|
||||
throw PasswordUTF8Invalid (SRC_POS);
|
||||
SecureBuffer passwordBuf(ulen);
|
||||
ulen = utf8.FromWChar ((char*) (byte*) passwordBuf, ulen, str, charCount);
|
||||
ulen = utf8.FromWChar ((char*) (uint8*) passwordBuf, ulen, str, charCount);
|
||||
if (wxCONV_FAILED == ulen)
|
||||
throw PasswordUTF8Invalid (SRC_POS);
|
||||
if (ulen > maxUtf8Len)
|
||||
@@ -845,7 +845,7 @@ namespace VeraCrypt
|
||||
throw PasswordUTF8TooLong (SRC_POS);
|
||||
}
|
||||
|
||||
ConstBufferPtr utf8Buffer ((byte*) passwordBuf, ulen);
|
||||
ConstBufferPtr utf8Buffer ((uint8*) passwordBuf, ulen);
|
||||
return shared_ptr<SecureBuffer>(new SecureBuffer (utf8Buffer));
|
||||
}
|
||||
else
|
||||
|
||||
@@ -281,7 +281,7 @@ namespace VeraCrypt
|
||||
const char *tmp_salt = {"\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF\x01\x23\x45\x67\x89\xAB\xCD\xEF\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF\x01\x23\x45\x67\x89\xAB\xCD\xEF\x00\x11\x22\x33\x44\x55\x66\x77\x88\x99\xAA\xBB\xCC\xDD\xEE\xFF"};
|
||||
unsigned long pim;
|
||||
Pkcs5KdfList prfList = Pkcs5Kdf::GetAvailableAlgorithms ();
|
||||
VolumePassword password ((const byte*) "passphrase-1234567890", 21);
|
||||
VolumePassword password ((const uint8*) "passphrase-1234567890", 21);
|
||||
|
||||
memcpy (&pim, buffer.Ptr (), sizeof (unsigned long));
|
||||
memcpy (salt.Ptr(), tmp_salt, 64);
|
||||
|
||||
@@ -141,7 +141,7 @@ namespace VeraCrypt
|
||||
|
||||
void EncryptionTestDialog::GetTextCtrlData (wxTextCtrl *textCtrl, Buffer &buffer) const
|
||||
{
|
||||
vector <byte> data;
|
||||
vector <uint8> data;
|
||||
string dataStr = StringConverter::ToSingle (wstring (textCtrl->GetValue()));
|
||||
|
||||
for (size_t i = 0; i < dataStr.size() / 2; ++i)
|
||||
@@ -153,7 +153,7 @@ namespace VeraCrypt
|
||||
throw StringConversionFailed (SRC_POS);
|
||||
}
|
||||
|
||||
data.push_back ((byte) dataByte);
|
||||
data.push_back ((uint8) dataByte);
|
||||
}
|
||||
|
||||
if (data.empty())
|
||||
|
||||
@@ -164,12 +164,12 @@ namespace VeraCrypt
|
||||
{
|
||||
event.Skip();
|
||||
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&event), sizeof (event)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&event), sizeof (event)));
|
||||
|
||||
long coord = event.GetX();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&coord), sizeof (coord)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&coord), sizeof (coord)));
|
||||
coord = event.GetY();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&coord), sizeof (coord)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&coord), sizeof (coord)));
|
||||
|
||||
if (ShowRandomPoolCheckBox->IsChecked())
|
||||
ShowBytes (RandomPoolStaticText, RandomNumberGenerator::PeekPool().GetRange (0, 24));
|
||||
|
||||
@@ -1437,7 +1437,7 @@ namespace VeraCrypt
|
||||
#if defined(TC_UNIX) && !defined(TC_MACOSX)
|
||||
try
|
||||
{
|
||||
byte buf[128];
|
||||
uint8 buf[128];
|
||||
if (read (ShowRequestFifo, buf, sizeof (buf)) > 0 && Gui->IsInBackgroundMode())
|
||||
Gui->SetBackgroundMode (false);
|
||||
}
|
||||
|
||||
@@ -63,12 +63,12 @@ namespace VeraCrypt
|
||||
{
|
||||
event.Skip();
|
||||
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&event), sizeof (event)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&event), sizeof (event)));
|
||||
|
||||
long coord = event.GetX();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&coord), sizeof (coord)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&coord), sizeof (coord)));
|
||||
coord = event.GetY();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&coord), sizeof (coord)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&coord), sizeof (coord)));
|
||||
|
||||
if (ShowRandomPoolCheckBox->IsChecked())
|
||||
ShowBytes (RandomPoolStaticText, RandomNumberGenerator::PeekPool().GetRange (0, 24));
|
||||
|
||||
@@ -103,7 +103,7 @@ namespace VeraCrypt
|
||||
{
|
||||
wxBusyCursor busy;
|
||||
|
||||
vector <byte> keyfileData;
|
||||
vector <uint8> keyfileData;
|
||||
keyfile->GetKeyfileData (keyfileData);
|
||||
|
||||
BufferPtr keyfileDataBuf (&keyfileData.front(), keyfileData.size());
|
||||
@@ -141,7 +141,7 @@ namespace VeraCrypt
|
||||
|
||||
if (keyfile.Length() > 0)
|
||||
{
|
||||
vector <byte> keyfileData (keyfile.Length());
|
||||
vector <uint8> keyfileData (keyfile.Length());
|
||||
BufferPtr keyfileDataBuf (&keyfileData.front(), keyfileData.size());
|
||||
|
||||
keyfile.ReadCompleteBuffer (keyfileDataBuf);
|
||||
|
||||
@@ -390,12 +390,12 @@ namespace VeraCrypt
|
||||
event.Skip();
|
||||
if (!IsWorkInProgress() && RandomNumberGenerator::IsRunning())
|
||||
{
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&event), sizeof (event)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&event), sizeof (event)));
|
||||
|
||||
long coord = event.GetX();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&coord), sizeof (coord)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&coord), sizeof (coord)));
|
||||
coord = event.GetY();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&coord), sizeof (coord)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&coord), sizeof (coord)));
|
||||
|
||||
VolumeCreationProgressWizardPage *page = dynamic_cast <VolumeCreationProgressWizardPage *> (GetCurrentPage());
|
||||
if (page)
|
||||
@@ -442,7 +442,7 @@ namespace VeraCrypt
|
||||
if (!IsWorkInProgress())
|
||||
{
|
||||
wxLongLong time = wxGetLocalTimeMillis();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <byte *> (&time), sizeof (time)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr (reinterpret_cast <uint8 *> (&time), sizeof (time)));
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -214,7 +214,7 @@ namespace VeraCrypt
|
||||
shared_ptr <VolumePassword> password;
|
||||
wchar_t passwordBuf[VolumePassword::MaxSize + 1];
|
||||
size_t maxPasswordLength = (bLegacyPassword || CmdLine->ArgUseLegacyPassword)? VolumePassword::MaxLegacySize: VolumePassword::MaxSize;
|
||||
finally_do_arg (BufferPtr, BufferPtr (reinterpret_cast <byte *> (passwordBuf), sizeof (passwordBuf)), { finally_arg.Erase(); });
|
||||
finally_do_arg (BufferPtr, BufferPtr (reinterpret_cast <uint8 *> (passwordBuf), sizeof (passwordBuf)), { finally_arg.Erase(); });
|
||||
|
||||
#ifdef TC_WINDOWS
|
||||
int len = GetWindowText (static_cast <HWND> (textCtrl->GetHandle()), passwordBuf, VolumePassword::MaxSize + 1);
|
||||
|
||||
@@ -992,7 +992,7 @@ namespace VeraCrypt
|
||||
int showFifo = open (string (MainFrame::GetShowRequestFifoPath()).c_str(), O_WRONLY | O_NONBLOCK);
|
||||
throw_sys_if (showFifo == -1);
|
||||
|
||||
byte buf[1] = { 1 };
|
||||
uint8 buf[1] = { 1 };
|
||||
if (write (showFifo, buf, 1) == 1)
|
||||
{
|
||||
close (showFifo);
|
||||
|
||||
@@ -43,7 +43,7 @@ namespace VeraCrypt
|
||||
|
||||
void LanguageStrings::Init ()
|
||||
{
|
||||
static byte LanguageXml[] =
|
||||
static uint8 LanguageXml[] =
|
||||
{
|
||||
# include "Common/Language.xml.h"
|
||||
, 0
|
||||
|
||||
@@ -40,7 +40,7 @@ namespace VeraCrypt
|
||||
hResL = LoadResource (NULL, hRes);
|
||||
throw_sys_if (!hResL);
|
||||
|
||||
const byte *resPtr = (const byte *) LockResource (hResL);
|
||||
const uint8 *resPtr = (const uint8 *) LockResource (hResL);
|
||||
throw_sys_if (!resPtr);
|
||||
|
||||
return ConstBufferPtr (resPtr, SizeofResource (NULL, hRes));
|
||||
@@ -132,14 +132,14 @@ namespace VeraCrypt
|
||||
if ( xml.IsFile() ){
|
||||
File file;
|
||||
file.Open (xml, File::OpenRead, File::ShareRead);
|
||||
vector <byte> keyfileData (file.Length());
|
||||
vector <uint8> keyfileData (file.Length());
|
||||
BufferPtr keyfileDataBuf (&keyfileData.front(), keyfileData.size());
|
||||
file.ReadCompleteBuffer (keyfileDataBuf);
|
||||
file.Close();
|
||||
string langxml(keyfileData.begin(), keyfileData.end());
|
||||
return langxml;
|
||||
}
|
||||
static byte LanguageXml[] =
|
||||
static uint8 LanguageXml[] =
|
||||
{
|
||||
# include "Common/Language.xml.h"
|
||||
, 0
|
||||
@@ -158,7 +158,7 @@ namespace VeraCrypt
|
||||
strBuf.CopyFrom (res);
|
||||
return string (reinterpret_cast <char *> (strBuf.Ptr()));
|
||||
#else
|
||||
static byte License[] =
|
||||
static uint8 License[] =
|
||||
{
|
||||
# include "License.txt.h"
|
||||
, 0
|
||||
@@ -176,7 +176,7 @@ namespace VeraCrypt
|
||||
#ifdef TC_WINDOWS
|
||||
return wxBitmap (L"IDB_DRIVE_ICON", wxBITMAP_TYPE_BMP_RESOURCE).ConvertToImage().Resize (wxSize (16, 12), wxPoint (0, 0));
|
||||
#else
|
||||
static const byte DriveIcon[] =
|
||||
static const uint8 DriveIcon[] =
|
||||
{
|
||||
# include "Mount/Drive_icon_96dpi.bmp.h"
|
||||
};
|
||||
@@ -192,7 +192,7 @@ namespace VeraCrypt
|
||||
wxImage image = wxBitmap (L"IDB_DRIVE_ICON_MASK", wxBITMAP_TYPE_BMP_RESOURCE).ConvertToImage().Resize (wxSize (16, 12), wxPoint (0, 0));
|
||||
return wxBitmap (image.ConvertToMono (0, 0, 0), 1);
|
||||
#else
|
||||
static const byte DriveIconMask[] =
|
||||
static const uint8 DriveIconMask[] =
|
||||
{
|
||||
# include "Mount/Drive_icon_mask_96dpi.bmp.h"
|
||||
};
|
||||
@@ -215,7 +215,7 @@ namespace VeraCrypt
|
||||
#ifdef TC_WINDOWS
|
||||
return wxBitmap (L"IDB_LOGO", wxBITMAP_TYPE_BMP_RESOURCE);
|
||||
#else
|
||||
static const byte Logo[] =
|
||||
static const uint8 Logo[] =
|
||||
{
|
||||
# include "Mount/Logo_96dpi.bmp.h"
|
||||
};
|
||||
@@ -230,7 +230,7 @@ namespace VeraCrypt
|
||||
#ifdef TC_WINDOWS
|
||||
return wxBitmap (L"IDB_TEXTUAL_LOGO", wxBITMAP_TYPE_BMP_RESOURCE);
|
||||
#else
|
||||
static const byte Logo[] =
|
||||
static const uint8 Logo[] =
|
||||
{
|
||||
# include "Common/Textual_logo_96dpi.bmp.h"
|
||||
};
|
||||
@@ -255,7 +255,7 @@ namespace VeraCrypt
|
||||
#ifdef TC_WINDOWS
|
||||
return wxBitmap (L"IDB_VOLUME_WIZARD_BITMAP", wxBITMAP_TYPE_BMP_RESOURCE);
|
||||
#else
|
||||
static const byte VolumeWizardIcon[] =
|
||||
static const uint8 VolumeWizardIcon[] =
|
||||
{
|
||||
# include "Format/VeraCrypt_Wizard.bmp.h"
|
||||
};
|
||||
|
||||
@@ -100,7 +100,7 @@ namespace VeraCrypt
|
||||
finally_do ({ TextUserInterface::SetTerminalEcho (true); });
|
||||
|
||||
wchar_t passwordBuf[4096];
|
||||
finally_do_arg (BufferPtr, BufferPtr (reinterpret_cast <byte *> (passwordBuf), sizeof (passwordBuf)), { finally_arg.Erase(); });
|
||||
finally_do_arg (BufferPtr, BufferPtr (reinterpret_cast <uint8 *> (passwordBuf), sizeof (passwordBuf)), { finally_arg.Erase(); });
|
||||
|
||||
shared_ptr<VolumePassword> password;
|
||||
|
||||
@@ -1077,7 +1077,7 @@ namespace VeraCrypt
|
||||
|
||||
shared_ptr<TokenKeyfile> tokenKeyfile = Token::getTokenKeyfile(keyfilePath);
|
||||
|
||||
vector <byte> keyfileData;
|
||||
vector <uint8> keyfileData;
|
||||
tokenKeyfile->GetKeyfileData (keyfileData);
|
||||
|
||||
BufferPtr keyfileDataBuf (&keyfileData.front(), keyfileData.size());
|
||||
@@ -1164,7 +1164,7 @@ namespace VeraCrypt
|
||||
|
||||
if (keyfile.Length() > 0)
|
||||
{
|
||||
vector <byte> keyfileData (keyfile.Length());
|
||||
vector <uint8> keyfileData (keyfile.Length());
|
||||
BufferPtr keyfileDataBuf (&keyfileData.front(), keyfileData.size());
|
||||
|
||||
keyfile.ReadCompleteBuffer (keyfileDataBuf);
|
||||
@@ -1784,7 +1784,7 @@ namespace VeraCrypt
|
||||
while (randCharsRequired > 0)
|
||||
{
|
||||
wstring randStr = AskString();
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr ((byte *) randStr.c_str(), randStr.size() * sizeof (wchar_t)));
|
||||
RandomNumberGenerator::AddToPool (ConstBufferPtr ((uint8 *) randStr.c_str(), randStr.size() * sizeof (wchar_t)));
|
||||
|
||||
randCharsRequired -= randStr.size();
|
||||
|
||||
|
||||
@@ -108,7 +108,7 @@ namespace VeraCrypt
|
||||
*TextOutStream << L"</VeraCrypt>" << endl;
|
||||
|
||||
wxStreamBuffer *buf = MemOutStream->GetOutputStreamBuffer();
|
||||
OutFile.Write (ConstBufferPtr (reinterpret_cast <byte *> (buf->GetBufferStart()), buf->GetBufferSize()));
|
||||
OutFile.Write (ConstBufferPtr (reinterpret_cast <uint8 *> (buf->GetBufferStart()), buf->GetBufferSize()));
|
||||
OutFile.Close();
|
||||
|
||||
TextOutStream.reset();
|
||||
|
||||
Reference in New Issue
Block a user