summaryrefslogtreecommitdiff
path: root/rpmio
diff options
context:
space:
mode:
authorRalf Corsépius <corsepiu@fedoraproject.org>2007-11-26 10:42:39 +0100
committerRalf Corsépius <corsepiu@fedoraproject.org>2007-11-26 10:42:39 +0100
commit96e7f513cde29bbcec1d21f62d23b74cd1b26ed7 (patch)
treec69580d01cb36a3251b0e8a698527e83dbe45534 /rpmio
parentffd534e4b8893c13b4368b7c80bea873ffdadc67 (diff)
downloadrpm-96e7f513cde29bbcec1d21f62d23b74cd1b26ed7.tar.gz
rpm-96e7f513cde29bbcec1d21f62d23b74cd1b26ed7.tar.bz2
rpm-96e7f513cde29bbcec1d21f62d23b74cd1b26ed7.zip
Eliminate type "byte"
Diffstat (limited to 'rpmio')
-rw-r--r--rpmio/digest.c2
-rw-r--r--rpmio/digest.h22
-rw-r--r--rpmio/rpmio.c4
-rw-r--r--rpmio/rpmio_internal.h2
-rw-r--r--rpmio/rpmpgp.c80
-rw-r--r--rpmio/rpmpgp.h126
6 files changed, 117 insertions, 119 deletions
diff --git a/rpmio/digest.c b/rpmio/digest.c
index 3e9231616..10ed6d138 100644
--- a/rpmio/digest.c
+++ b/rpmio/digest.c
@@ -144,7 +144,7 @@ DPRINTF((stderr, "*** Final(%p,%p,%p,%d) hashctx %p digest %p\n", ctx, datap, le
} else {
if (lenp) *lenp = (2*digestlen) + 1;
if (datap) {
- const byte * s = (const byte *) digest;
+ const uint8_t * s = (const uint8_t *) digest;
static const char hex[] = "0123456789abcdef";
*datap = t = xmalloc((2*digestlen) + 1);
diff --git a/rpmio/digest.h b/rpmio/digest.h
index 1519baeb6..018a6d59a 100644
--- a/rpmio/digest.h
+++ b/rpmio/digest.h
@@ -14,20 +14,20 @@
*/
struct pgpDigParams_s {
const char * userid;
- const byte * hash;
+ const uint8_t * hash;
const char * params[4];
- byte tag;
+ uint8_t tag;
- byte version; /*!< version number. */
- byte time[4]; /*!< time that the key was created. */
- byte pubkey_algo; /*!< public key algorithm. */
+ uint8_t version; /*!< version number. */
+ uint8_t time[4]; /*!< time that the key was created. */
+ uint8_t pubkey_algo; /*!< public key algorithm. */
- byte hash_algo;
- byte sigtype;
- byte hashlen;
- byte signhash16[2];
- byte signid[8];
- byte saved;
+ uint8_t hash_algo;
+ uint8_t sigtype;
+ uint8_t hashlen;
+ uint8_t signhash16[2];
+ uint8_t signid[8];
+ uint8_t saved;
#define PGPDIG_SAVED_TIME (1 << 0)
#define PGPDIG_SAVED_ID (1 << 1)
diff --git a/rpmio/rpmio.c b/rpmio/rpmio.c
index 8cf969810..bf6bc8c3c 100644
--- a/rpmio/rpmio.c
+++ b/rpmio/rpmio.c
@@ -1696,11 +1696,11 @@ rpmop fdOp(FD_t fd, fdOpX opx)
return op;
}
-int rpmioSlurp(const char * fn, byte ** bp, ssize_t * blenp)
+int rpmioSlurp(const char * fn, uint8_t ** bp, ssize_t * blenp)
{
static ssize_t blenmax = (32 * BUFSIZ);
ssize_t blen = 0;
- byte * b = NULL;
+ uint8_t * b = NULL;
ssize_t size;
FD_t fd;
int rc = 0;
diff --git a/rpmio/rpmio_internal.h b/rpmio/rpmio_internal.h
index 43d08da8a..1d8322561 100644
--- a/rpmio/rpmio_internal.h
+++ b/rpmio/rpmio_internal.h
@@ -544,7 +544,7 @@ assert(dig->sha1ctx == NULL);
* @return 0 on success
*/
int rpmioSlurp(const char * fn,
- byte ** bp, ssize_t * blenp);
+ uint8_t ** bp, ssize_t * blenp);
#ifdef __cplusplus
}
diff --git a/rpmio/rpmpgp.c b/rpmio/rpmpgp.c
index 1949b0b4d..a188a99dc 100644
--- a/rpmio/rpmpgp.c
+++ b/rpmio/rpmpgp.c
@@ -201,7 +201,7 @@ static void pgpPrtStr(const char *pre, const char *s)
fprintf(stderr, " %s", s);
}
-static void pgpPrtHex(const char *pre, const byte *p, unsigned int plen)
+static void pgpPrtHex(const char *pre, const uint8_t *p, unsigned int plen)
{
if (!_print) return;
if (pre && *pre)
@@ -209,7 +209,7 @@ static void pgpPrtHex(const char *pre, const byte *p, unsigned int plen)
fprintf(stderr, " %s", pgpHexStr(p, plen));
}
-void pgpPrtVal(const char * pre, pgpValTbl vs, byte val)
+void pgpPrtVal(const char * pre, pgpValTbl vs, uint8_t val)
{
if (!_print) return;
if (pre && *pre)
@@ -220,7 +220,7 @@ void pgpPrtVal(const char * pre, pgpValTbl vs, byte val)
/**
*/
static
-const char * pgpMpiHex(const byte *p)
+const char * pgpMpiHex(const uint8_t *p)
{
static char prbuf[2048];
char *t = prbuf;
@@ -232,7 +232,7 @@ const char * pgpMpiHex(const byte *p)
* @return 0 on success
*/
static int pgpMpiSet(const char * pre, int lbits,
- void *dest, const byte * p, const byte * pend)
+ void *dest, const uint8_t * p, const uint8_t * pend)
{
unsigned int mbits = pgpMpiBits(p);
unsigned int nbits;
@@ -263,7 +263,7 @@ fprintf(stderr, "*** %s %s\n", pre, pgpHexStr(dest, nbytes));
/**
* @return NULL on error
*/
-static SECItem *pgpMpiItem(PRArenaPool *arena, SECItem *item, const byte *p)
+static SECItem *pgpMpiItem(PRArenaPool *arena, SECItem *item, const uint8_t *p)
{
unsigned int nbytes = pgpMpiLen(p)-2;
@@ -322,9 +322,9 @@ static SECKEYPublicKey *pgpNewDSAKey(void)
return pgpNewPublicKey(dsaKey);
}
-int pgpPrtSubType(const byte *h, unsigned int hlen, pgpSigType sigtype)
+int pgpPrtSubType(const uint8_t *h, unsigned int hlen, pgpSigType sigtype)
{
- const byte *p = h;
+ const uint8_t *p = h;
unsigned plen;
int i;
@@ -430,10 +430,10 @@ static const char * pgpSigDSA[] = {
#define DSA_SUBPRIME_LEN 20
#endif
-static int pgpPrtSigParams(pgpTag tag, byte pubkey_algo, byte sigtype,
- const byte *p, const byte *h, unsigned int hlen)
+static int pgpPrtSigParams(pgpTag tag, uint8_t pubkey_algo, uint8_t sigtype,
+ const uint8_t *p, const uint8_t *h, unsigned int hlen)
{
- const byte * pend = h + hlen;
+ const uint8_t * pend = h + hlen;
int i;
SECItem dsaraw;
unsigned char dsabuf[2*DSA_SUBPRIME_LEN];
@@ -501,10 +501,10 @@ static int pgpPrtSigParams(pgpTag tag, byte pubkey_algo, byte sigtype,
return 0;
}
-int pgpPrtSig(pgpTag tag, const byte *h, unsigned int hlen)
+int pgpPrtSig(pgpTag tag, const uint8_t *h, unsigned int hlen)
{
- byte version = h[0];
- byte * p;
+ uint8_t version = h[0];
+ uint8_t * p;
unsigned plen;
int rc;
@@ -542,7 +542,7 @@ int pgpPrtSig(pgpTag tag, const byte *h, unsigned int hlen)
memcpy(_digp->signhash16, v->signhash16, sizeof(_digp->signhash16));
}
- p = ((byte *)v) + sizeof(*v);
+ p = ((uint8_t *)v) + sizeof(*v);
rc = pgpPrtSigParams(tag, v->pubkey_algo, v->sigtype, p, h, hlen);
} break;
case 4:
@@ -651,8 +651,8 @@ static const char * pgpSecretELGAMAL[] = {
};
#endif
-static const byte * pgpPrtPubkeyParams(byte pubkey_algo,
- const byte *p, const byte *h, unsigned int hlen)
+static const uint8_t * pgpPrtPubkeyParams(uint8_t pubkey_algo,
+ const uint8_t *p, const uint8_t *h, unsigned int hlen)
{
int i;
@@ -717,8 +717,8 @@ static const byte * pgpPrtPubkeyParams(byte pubkey_algo,
return p;
}
-static const byte * pgpPrtSeckeyParams(byte pubkey_algo,
- const byte *p, const byte *h, unsigned int hlen)
+static const uint8_t * pgpPrtSeckeyParams(uint8_t pubkey_algo,
+ const uint8_t *p, const uint8_t *h, unsigned int hlen)
{
int i;
@@ -788,10 +788,10 @@ static const byte * pgpPrtSeckeyParams(byte pubkey_algo,
return p;
}
-int pgpPrtKey(pgpTag tag, const byte *h, unsigned int hlen)
+int pgpPrtKey(pgpTag tag, const uint8_t *h, unsigned int hlen)
{
- byte version = *h;
- const byte * p;
+ uint8_t version = *h;
+ const uint8_t * p;
unsigned plen;
time_t t;
int rc;
@@ -815,7 +815,7 @@ int pgpPrtKey(pgpTag tag, const byte *h, unsigned int hlen)
_digp->pubkey_algo = v->pubkey_algo;
}
- p = ((byte *)v) + sizeof(*v);
+ p = ((uint8_t *)v) + sizeof(*v);
p = pgpPrtPubkeyParams(v->pubkey_algo, p, h, hlen);
rc = 0;
} break;
@@ -834,7 +834,7 @@ int pgpPrtKey(pgpTag tag, const byte *h, unsigned int hlen)
_digp->pubkey_algo = v->pubkey_algo;
}
- p = ((byte *)v) + sizeof(*v);
+ p = ((uint8_t *)v) + sizeof(*v);
p = pgpPrtPubkeyParams(v->pubkey_algo, p, h, hlen);
if (!(tag == PGPTAG_PUBLIC_KEY || tag == PGPTAG_PUBLIC_SUBKEY))
p = pgpPrtSeckeyParams(v->pubkey_algo, p, h, hlen);
@@ -847,7 +847,7 @@ int pgpPrtKey(pgpTag tag, const byte *h, unsigned int hlen)
return rc;
}
-int pgpPrtUserID(pgpTag tag, const byte *h, unsigned int hlen)
+int pgpPrtUserID(pgpTag tag, const uint8_t *h, unsigned int hlen)
{
pgpPrtVal("", pgpTagTbl, tag);
if (_print)
@@ -861,7 +861,7 @@ int pgpPrtUserID(pgpTag tag, const byte *h, unsigned int hlen)
return 0;
}
-int pgpPrtComment(pgpTag tag, const byte *h, unsigned int hlen)
+int pgpPrtComment(pgpTag tag, const uint8_t *h, unsigned int hlen)
{
int i = hlen;
@@ -887,12 +887,12 @@ int pgpPrtComment(pgpTag tag, const byte *h, unsigned int hlen)
return 0;
}
-int pgpPubkeyFingerprint(const byte * pkt, unsigned int pktlen,
- byte * keyid)
+int pgpPubkeyFingerprint(const uint8_t * pkt, unsigned int pktlen,
+ uint8_t * keyid)
{
- const byte *s = pkt;
+ const uint8_t *s = pkt;
DIGEST_CTX ctx;
- byte version;
+ uint8_t version;
int rc = -1; /* assume failure. */
if (pkt[0] != 0x99)
@@ -916,7 +916,7 @@ int pgpPubkeyFingerprint(const byte * pkt, unsigned int pktlen,
} break;
case 4:
{ pgpPktKeyV4 v = (pgpPktKeyV4) (pkt + 3);
- byte * SHA1 = NULL;
+ uint8_t * SHA1 = NULL;
int i;
s += sizeof(pkt[0]) + sizeof(pkt[1]) + sizeof(pkt[2]) + sizeof(*v);
@@ -945,9 +945,9 @@ int pgpPubkeyFingerprint(const byte * pkt, unsigned int pktlen,
return rc;
}
-int pgpExtractPubkeyFingerprint(const char * b64pkt, byte * keyid)
+int pgpExtractPubkeyFingerprint(const char * b64pkt, uint8_t * keyid)
{
- const byte * pkt;
+ const uint8_t * pkt;
size_t pktlen;
if (b64decode(b64pkt, (void **)&pkt, &pktlen))
@@ -957,13 +957,13 @@ int pgpExtractPubkeyFingerprint(const char * b64pkt, byte * keyid)
return 8; /* no. of bytes of pubkey signid */
}
-int pgpPrtPkt(const byte *pkt, unsigned int pleft)
+int pgpPrtPkt(const uint8_t *pkt, unsigned int pleft)
{
unsigned int val = *pkt;
unsigned int pktlen;
pgpTag tag;
unsigned int plen;
- const byte *h;
+ const uint8_t *h;
unsigned int hlen = 0;
int rc = 0;
@@ -1117,10 +1117,10 @@ pgpDig pgpFreeDig(pgpDig dig)
return dig;
}
-int pgpPrtPkts(const byte * pkts, unsigned int pktlen, pgpDig dig, int printing)
+int pgpPrtPkts(const uint8_t * pkts, unsigned int pktlen, pgpDig dig, int printing)
{
unsigned int val = *pkts;
- const byte *p;
+ const uint8_t *p;
unsigned int pleft;
int len;
@@ -1143,14 +1143,14 @@ int pgpPrtPkts(const byte * pkts, unsigned int pktlen, pgpDig dig, int printing)
return 0;
}
-pgpArmor pgpReadPkts(const char * fn, const byte ** pkt, size_t * pktlen)
+pgpArmor pgpReadPkts(const char * fn, const uint8_t ** pkt, size_t * pktlen)
{
- byte * b = NULL;
+ uint8_t * b = NULL;
ssize_t blen;
const char * enc = NULL;
const char * crcenc = NULL;
- byte * dec;
- byte * crcdec;
+ uint8_t * dec;
+ uint8_t * crcdec;
size_t declen;
size_t crclen;
uint32_t crcpkt, crc;
diff --git a/rpmio/rpmpgp.h b/rpmio/rpmpgp.h
index 629ad56ce..84b0198f2 100644
--- a/rpmio/rpmpgp.h
+++ b/rpmio/rpmpgp.h
@@ -18,8 +18,6 @@
extern "C" {
#endif
-typedef unsigned char byte;
-
/**
*/
typedef struct DIGEST_CTX_s * DIGEST_CTX;
@@ -111,9 +109,9 @@ extern struct pgpValTbl_s pgpTagTbl[];
* - MPI of Elgamal (Diffie-Hellman) value m * y**k mod p.
*/
typedef struct pgpPktPubkey_s {
- byte version; /*!< version number (generate 3, accept 2). */
- byte keyid[8]; /*!< key ID of the public key for session key. */
- byte algo; /*!< public key algorithm used. */
+ uint8_t version; /*!< version number (generate 3, accept 2). */
+ uint8_t keyid[8]; /*!< key ID of the public key for session key. */
+ uint8_t algo; /*!< public key algorithm used. */
} pgpPktPubkey;
@@ -317,14 +315,14 @@ extern struct pgpValTbl_s pgpHashTbl[];
* - MPI of DSA value s.
*/
typedef struct pgpPktSigV3_s {
- byte version; /*!< version number (3). */
- byte hashlen; /*!< length of following hashed material. MUST be 5. */
- byte sigtype; /*!< signature type. */
- byte time[4]; /*!< 4 byte creation time. */
- byte signid[8]; /*!< key ID of signer. */
- byte pubkey_algo; /*!< public key algorithm. */
- byte hash_algo; /*!< hash algorithm. */
- byte signhash16[2]; /*!< left 16 bits of signed hash value. */
+ uint8_t version; /*!< version number (3). */
+ uint8_t hashlen; /*!< length of following hashed material. MUST be 5. */
+ uint8_t sigtype; /*!< signature type. */
+ uint8_t time[4]; /*!< 4 byte creation time. */
+ uint8_t signid[8]; /*!< key ID of signer. */
+ uint8_t pubkey_algo; /*!< public key algorithm. */
+ uint8_t hash_algo; /*!< hash algorithm. */
+ uint8_t signhash16[2]; /*!< left 16 bits of signed hash value. */
} * pgpPktSigV3;
/**
@@ -349,11 +347,11 @@ typedef struct pgpPktSigV3_s {
* - One or more multi-precision integers comprising the signature.
*/
typedef struct pgpPktSigV4_s {
- byte version; /*!< version number (4). */
- byte sigtype; /*!< signature type. */
- byte pubkey_algo; /*!< public key algorithm. */
- byte hash_algo; /*!< hash algorithm. */
- byte hashlen[2]; /*!< length of following hashed material. */
+ uint8_t version; /*!< version number (4). */
+ uint8_t sigtype; /*!< signature type. */
+ uint8_t pubkey_algo; /*!< public key algorithm. */
+ uint8_t hash_algo; /*!< hash algorithm. */
+ uint8_t hashlen[2]; /*!< length of following hashed material. */
} * pgpPktSigV4;
/**
@@ -522,9 +520,9 @@ typedef union pgpPktSig_u {
*
*/
typedef struct pgpPktSymkey_s {
- byte version; /*!< version number (4). */
- byte symkey_algo;
- byte s2k[1];
+ uint8_t version; /*!< version number (4). */
+ uint8_t symkey_algo;
+ uint8_t s2k[1];
} pgpPktSymkey;
/**
@@ -557,12 +555,12 @@ typedef struct pgpPktSymkey_s {
* pass packet.
*/
typedef struct pgpPktOnepass_s {
- byte version; /*!< version number (3). */
- byte sigtype; /*!< signature type. */
- byte hash_algo; /*!< hash algorithm. */
- byte pubkey_algo; /*!< public key algorithm. */
- byte signid[8]; /*!< key ID of signer. */
- byte nested;
+ uint8_t version; /*!< version number (3). */
+ uint8_t sigtype; /*!< signature type. */
+ uint8_t hash_algo; /*!< hash algorithm. */
+ uint8_t pubkey_algo; /*!< public key algorithm. */
+ uint8_t signid[8]; /*!< key ID of signer. */
+ uint8_t nested;
} * pgpPktOnepass;
/**
@@ -638,10 +636,10 @@ typedef struct pgpPktOnepass_s {
*
*/
typedef struct pgpPktKeyV3_s {
- byte version; /*!< version number (3). */
- byte time[4]; /*!< time that the key was created. */
- byte valid[2]; /*!< time in days that this key is valid. */
- byte pubkey_algo; /*!< public key algorithm. */
+ uint8_t version; /*!< version number (3). */
+ uint8_t time[4]; /*!< time that the key was created. */
+ uint8_t valid[2]; /*!< time in days that this key is valid. */
+ uint8_t pubkey_algo; /*!< public key algorithm. */
} * pgpPktKeyV3;
/**
@@ -676,9 +674,9 @@ typedef struct pgpPktKeyV3_s {
*
*/
typedef struct pgpPktKeyV4_s {
- byte version; /*!< version number (4). */
- byte time[4]; /*!< time that the key was created. */
- byte pubkey_algo; /*!< public key algorithm. */
+ uint8_t version; /*!< version number (4). */
+ uint8_t time[4]; /*!< time that the key was created. */
+ uint8_t pubkey_algo; /*!< public key algorithm. */
} * pgpPktKeyV4;
/**
@@ -775,8 +773,8 @@ typedef union pgpPktKey_u {
* blocks.
*/
typedef struct pgpPktCdata_s {
- byte compressalgo;
- byte data[1];
+ uint8_t compressalgo;
+ uint8_t data[1];
} pgpPktCdata;
/*
@@ -814,7 +812,7 @@ typedef struct pgpPktCdata_s {
* session key is incorrect.
*/
typedef struct pgpPktEdata_s {
- byte data[1];
+ uint8_t data[1];
} pgpPktEdata;
/*
@@ -865,9 +863,9 @@ typedef struct pgpPktEdata_s {
* the receiving software.
*/
typedef struct pgpPktLdata_s {
- byte format;
- byte filenamelen;
- byte filename[1];
+ uint8_t format;
+ uint8_t filenamelen;
+ uint8_t filename[1];
} pgpPktLdata;
/*
@@ -884,7 +882,7 @@ typedef struct pgpPktLdata_s {
* other than local keyring files.
*/
typedef struct pgpPktTrust_s {
- byte flag;
+ uint8_t flag;
} pgpPktTrust;
/*
@@ -898,7 +896,7 @@ typedef struct pgpPktTrust_s {
*
*/
typedef struct pgpPktUid_s {
- byte userid[1];
+ uint8_t userid[1];
} pgpPktUid;
/**
@@ -973,7 +971,7 @@ typedef enum rpmDigestFlags_e {
* @return native-endian integer
*/
static inline
-unsigned int pgpGrab(const byte *s, int nbytes)
+unsigned int pgpGrab(const uint8_t *s, int nbytes)
{
unsigned int i = 0;
int nb = (nbytes <= sizeof(i) ? nbytes : sizeof(i));
@@ -989,7 +987,7 @@ unsigned int pgpGrab(const byte *s, int nbytes)
* @return no. of bytes in length prefix
*/
static inline
-int pgpLen(const byte *s, unsigned int *lenp)
+int pgpLen(const uint8_t *s, unsigned int *lenp)
{
if (*s < 192) {
(*lenp) = *s++;
@@ -1009,7 +1007,7 @@ int pgpLen(const byte *s, unsigned int *lenp)
* @return no. of bits
*/
static inline
-unsigned int pgpMpiBits(const byte *p)
+unsigned int pgpMpiBits(const uint8_t *p)
{
return ((p[0] << 8) | p[1]);
}
@@ -1020,7 +1018,7 @@ unsigned int pgpMpiBits(const byte *p)
* @return no. of bytes
*/
static inline
-unsigned int pgpMpiLen(const byte *p)
+unsigned int pgpMpiLen(const uint8_t *p)
{
return (2 + ((pgpMpiBits(p)+7)>>3));
}
@@ -1033,7 +1031,7 @@ unsigned int pgpMpiLen(const byte *p)
* @return target buffer
*/
static inline
-char * pgpHexCvt(char *t, const byte *s, int nbytes)
+char * pgpHexCvt(char *t, const uint8_t *s, int nbytes)
{
static char hex[] = "0123456789abcdef";
while (nbytes-- > 0) {
@@ -1054,7 +1052,7 @@ char * pgpHexCvt(char *t, const byte *s, int nbytes)
* @return hex formatted string
*/
static inline
-char * pgpHexStr(const byte *p, unsigned int plen)
+char * pgpHexStr(const uint8_t *p, unsigned int plen)
{
static char prbuf[8*BUFSIZ]; /* XXX ick */
char *t = prbuf;
@@ -1069,7 +1067,7 @@ char * pgpHexStr(const byte *p, unsigned int plen)
* @return hex formatted string
*/
static inline
-const char * pgpMpiStr(const byte *p)
+const char * pgpMpiStr(const uint8_t *p)
{
static char prbuf[8*BUFSIZ]; /* XXX ick */
char *t = prbuf;
@@ -1086,7 +1084,7 @@ const char * pgpMpiStr(const byte *p)
* @return string value of byte
*/
static inline
-const char * pgpValStr(pgpValTbl vs, byte val)
+const char * pgpValStr(pgpValTbl vs, uint8_t val)
{
do {
if (vs->val == val)
@@ -1119,7 +1117,7 @@ int pgpValTok(pgpValTbl vs, const char * s, const char * se)
* @param vs table of (string,value) pairs
* @param val byte value to print
*/
-void pgpPrtVal(const char * pre, pgpValTbl vs, byte val);
+void pgpPrtVal(const char * pre, pgpValTbl vs, uint8_t val);
/**
* Print/parse an OpenPGP subtype packet.
@@ -1128,7 +1126,7 @@ void pgpPrtVal(const char * pre, pgpValTbl vs, byte val);
* @param sigtype signature type
* @return 0 on success
*/
-int pgpPrtSubType(const byte *h, unsigned int hlen, pgpSigType sigtype);
+int pgpPrtSubType(const uint8_t *h, unsigned int hlen, pgpSigType sigtype);
/**
* Print/parse an OpenPGP signature packet.
@@ -1137,7 +1135,7 @@ int pgpPrtSubType(const byte *h, unsigned int hlen, pgpSigType sigtype);
* @param hlen packet length (no. of bytes)
* @return 0 on success
*/
-int pgpPrtSig(pgpTag tag, const byte *h, unsigned int hlen);
+int pgpPrtSig(pgpTag tag, const uint8_t *h, unsigned int hlen);
/**
* Print/parse an OpenPGP key packet.
@@ -1146,7 +1144,7 @@ int pgpPrtSig(pgpTag tag, const byte *h, unsigned int hlen);
* @param hlen packet length (no. of bytes)
* @return 0 on success
*/
-int pgpPrtKey(pgpTag tag, const byte *h, unsigned int hlen);
+int pgpPrtKey(pgpTag tag, const uint8_t *h, unsigned int hlen);
/**
* Print/parse an OpenPGP userid packet.
@@ -1155,7 +1153,7 @@ int pgpPrtKey(pgpTag tag, const byte *h, unsigned int hlen);
* @param hlen packet length (no. of bytes)
* @return 0 on success
*/
-int pgpPrtUserID(pgpTag tag, const byte *h, unsigned int hlen);
+int pgpPrtUserID(pgpTag tag, const uint8_t *h, unsigned int hlen);
/**
* Print/parse an OpenPGP comment packet.
@@ -1164,7 +1162,7 @@ int pgpPrtUserID(pgpTag tag, const byte *h, unsigned int hlen);
* @param hlen packet length (no. of bytes)
* @return 0 on success
*/
-int pgpPrtComment(pgpTag tag, const byte *h, unsigned int hlen);
+int pgpPrtComment(pgpTag tag, const uint8_t *h, unsigned int hlen);
/**
* Calculate OpenPGP public key fingerprint.
@@ -1174,8 +1172,8 @@ int pgpPrtComment(pgpTag tag, const byte *h, unsigned int hlen);
* @retval keyid publick key fingerprint
* @return 0 on sucess, else -1
*/
-int pgpPubkeyFingerprint(const byte * pkt, unsigned int pktlen,
- byte * keyid);
+int pgpPubkeyFingerprint(const uint8_t * pkt, unsigned int pktlen,
+ uint8_t * keyid);
/**
* Extract OpenPGP public key fingerprint from base64 encoded packet.
@@ -1184,7 +1182,7 @@ int pgpPubkeyFingerprint(const byte * pkt, unsigned int pktlen,
* @retval keyid[8] public key fingerprint
* @return 8 (no. of bytes) on success, < 0 on error
*/
-int pgpExtractPubkeyFingerprint(const char * b64pkt, byte * keyid);
+int pgpExtractPubkeyFingerprint(const char * b64pkt, uint8_t * keyid);
/**
@@ -1193,7 +1191,7 @@ int pgpExtractPubkeyFingerprint(const char * b64pkt, byte * keyid);
* @param pleft no. bytes remaining
* @return -1 on error, otherwise this packet length
*/
-int pgpPrtPkt(const byte *pkt, unsigned int pleft);
+int pgpPrtPkt(const uint8_t *pkt, unsigned int pleft);
/**
* Print/parse a OpenPGP packet(s).
@@ -1203,7 +1201,7 @@ int pgpPrtPkt(const byte *pkt, unsigned int pleft);
* @param printing should packets be printed?
* @return -1 on error, 0 on success
*/
-int pgpPrtPkts(const byte *pkts, unsigned int pktlen, pgpDig dig, int printing);
+int pgpPrtPkts(const uint8_t *pkts, unsigned int pktlen, pgpDig dig, int printing);
/**
* Parse armored OpenPGP packets from a file.
@@ -1213,7 +1211,7 @@ int pgpPrtPkts(const byte *pkts, unsigned int pktlen, pgpDig dig, int printing);
* @return type of armor found
*/
pgpArmor pgpReadPkts(const char * fn,
- const byte ** pkt, size_t * pktlen);
+ const uint8_t ** pkt, size_t * pktlen);
/**
* Wrap a OpenPGP packets in ascii armor for transport.
@@ -1249,7 +1247,7 @@ pgpDig pgpFreeDig(pgpDig dig);
* @return 1 if an OpenPGP packet, 0 otherwise
*/
static inline
-int pgpIsPkt(const byte * p)
+int pgpIsPkt(const uint8_t * p)
{
unsigned int val = *p++;
pgpTag tag;
@@ -1308,7 +1306,7 @@ int pgpIsPkt(const byte * p)
* @return crc of buffer
*/
static inline
-unsigned int pgpCRC(const byte *octets, size_t len)
+unsigned int pgpCRC(const uint8_t *octets, size_t len)
{
unsigned int crc = CRC24_INIT;
int i;