diff options
author | iphydf <iphydf@users.noreply.github.com> | 2018-10-08 21:05:14 +0000 |
---|---|---|
committer | iphydf <iphydf@users.noreply.github.com> | 2018-10-09 17:33:37 +0000 |
commit | 605dfe882c52bfad4dee9678a69e4b816d93431d (patch) | |
tree | 10432adc5d3716cb28b833c6e156218b67c23494 /toxencryptsave | |
parent | 77e025fae48a4f9cf6cf19a359b6c423545f3cc7 (diff) |
Consistently use camel case enum names.
Including in tests and implementation files.
Diffstat (limited to 'toxencryptsave')
-rw-r--r-- | toxencryptsave/toxencryptsave.api.h | 5 | ||||
-rw-r--r-- | toxencryptsave/toxencryptsave.c | 16 | ||||
-rw-r--r-- | toxencryptsave/toxencryptsave.h | 5 |
3 files changed, 18 insertions, 8 deletions
diff --git a/toxencryptsave/toxencryptsave.api.h b/toxencryptsave/toxencryptsave.api.h index 28d7a650..c6a395f3 100644 --- a/toxencryptsave/toxencryptsave.api.h +++ b/toxencryptsave/toxencryptsave.api.h | |||
@@ -313,5 +313,10 @@ static bool is_data_encrypted(const uint8_t *data); | |||
313 | } | 313 | } |
314 | #endif | 314 | #endif |
315 | 315 | ||
316 | typedef TOX_ERR_KEY_DERIVATION Tox_Err_Key_Derivation; | ||
317 | typedef TOX_ERR_ENCRYPTION Tox_Err_Encryption; | ||
318 | typedef TOX_ERR_DECRYPTION Tox_Err_Decryption; | ||
319 | typedef TOX_ERR_GET_SALT Tox_Err_Get_Salt; | ||
320 | |||
316 | #endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H | 321 | #endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H |
317 | %} | 322 | %} |
diff --git a/toxencryptsave/toxencryptsave.c b/toxencryptsave/toxencryptsave.c index 6221b0b6..a3e70b2f 100644 --- a/toxencryptsave/toxencryptsave.c +++ b/toxencryptsave/toxencryptsave.c | |||
@@ -91,7 +91,7 @@ void tox_pass_key_free(Tox_Pass_Key *pass_key) | |||
91 | * success does not say anything about the validity of the data, only that data of | 91 | * success does not say anything about the validity of the data, only that data of |
92 | * the appropriate size was copied | 92 | * the appropriate size was copied |
93 | */ | 93 | */ |
94 | bool tox_get_salt(const uint8_t *data, uint8_t *salt, TOX_ERR_GET_SALT *error) | 94 | bool tox_get_salt(const uint8_t *data, uint8_t *salt, Tox_Err_Get_Salt *error) |
95 | { | 95 | { |
96 | if (!data || !salt) { | 96 | if (!data || !salt) { |
97 | SET_ERROR_PARAMETER(error, TOX_ERR_GET_SALT_NULL); | 97 | SET_ERROR_PARAMETER(error, TOX_ERR_GET_SALT_NULL); |
@@ -121,7 +121,7 @@ bool tox_get_salt(const uint8_t *data, uint8_t *salt, TOX_ERR_GET_SALT *error) | |||
121 | * returns true on success | 121 | * returns true on success |
122 | */ | 122 | */ |
123 | Tox_Pass_Key *tox_pass_key_derive(const uint8_t *passphrase, size_t pplength, | 123 | Tox_Pass_Key *tox_pass_key_derive(const uint8_t *passphrase, size_t pplength, |
124 | TOX_ERR_KEY_DERIVATION *error) | 124 | Tox_Err_Key_Derivation *error) |
125 | { | 125 | { |
126 | uint8_t salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; | 126 | uint8_t salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; |
127 | random_bytes(salt, sizeof salt); | 127 | random_bytes(salt, sizeof salt); |
@@ -132,7 +132,7 @@ Tox_Pass_Key *tox_pass_key_derive(const uint8_t *passphrase, size_t pplength, | |||
132 | * The salt must be TOX_PASS_SALT_LENGTH bytes in length. | 132 | * The salt must be TOX_PASS_SALT_LENGTH bytes in length. |
133 | */ | 133 | */ |
134 | Tox_Pass_Key *tox_pass_key_derive_with_salt(const uint8_t *passphrase, size_t pplength, | 134 | Tox_Pass_Key *tox_pass_key_derive_with_salt(const uint8_t *passphrase, size_t pplength, |
135 | const uint8_t *salt, TOX_ERR_KEY_DERIVATION *error) | 135 | const uint8_t *salt, Tox_Err_Key_Derivation *error) |
136 | { | 136 | { |
137 | if (!salt || (!passphrase && pplength != 0)) { | 137 | if (!salt || (!passphrase && pplength != 0)) { |
138 | SET_ERROR_PARAMETER(error, TOX_ERR_KEY_DERIVATION_NULL); | 138 | SET_ERROR_PARAMETER(error, TOX_ERR_KEY_DERIVATION_NULL); |
@@ -181,7 +181,7 @@ Tox_Pass_Key *tox_pass_key_derive_with_salt(const uint8_t *passphrase, size_t pp | |||
181 | * returns true on success | 181 | * returns true on success |
182 | */ | 182 | */ |
183 | bool tox_pass_key_encrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t data_len, uint8_t *out, | 183 | bool tox_pass_key_encrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t data_len, uint8_t *out, |
184 | TOX_ERR_ENCRYPTION *error) | 184 | Tox_Err_Encryption *error) |
185 | { | 185 | { |
186 | if (data_len == 0 || !data || !key || !out) { | 186 | if (data_len == 0 || !data || !key || !out) { |
187 | SET_ERROR_PARAMETER(error, TOX_ERR_ENCRYPTION_NULL); | 187 | SET_ERROR_PARAMETER(error, TOX_ERR_ENCRYPTION_NULL); |
@@ -227,9 +227,9 @@ bool tox_pass_key_encrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t d | |||
227 | * returns true on success | 227 | * returns true on success |
228 | */ | 228 | */ |
229 | bool tox_pass_encrypt(const uint8_t *data, size_t data_len, const uint8_t *passphrase, size_t pplength, uint8_t *out, | 229 | bool tox_pass_encrypt(const uint8_t *data, size_t data_len, const uint8_t *passphrase, size_t pplength, uint8_t *out, |
230 | TOX_ERR_ENCRYPTION *error) | 230 | Tox_Err_Encryption *error) |
231 | { | 231 | { |
232 | TOX_ERR_KEY_DERIVATION _error; | 232 | Tox_Err_Key_Derivation _error; |
233 | Tox_Pass_Key *key = tox_pass_key_derive(passphrase, pplength, &_error); | 233 | Tox_Pass_Key *key = tox_pass_key_derive(passphrase, pplength, &_error); |
234 | 234 | ||
235 | if (!key) { | 235 | if (!key) { |
@@ -255,7 +255,7 @@ bool tox_pass_encrypt(const uint8_t *data, size_t data_len, const uint8_t *passp | |||
255 | * returns true on success | 255 | * returns true on success |
256 | */ | 256 | */ |
257 | bool tox_pass_key_decrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t length, uint8_t *out, | 257 | bool tox_pass_key_decrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t length, uint8_t *out, |
258 | TOX_ERR_DECRYPTION *error) | 258 | Tox_Err_Decryption *error) |
259 | { | 259 | { |
260 | if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) { | 260 | if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) { |
261 | SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH); | 261 | SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH); |
@@ -301,7 +301,7 @@ bool tox_pass_key_decrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t l | |||
301 | * returns true on success | 301 | * returns true on success |
302 | */ | 302 | */ |
303 | bool tox_pass_decrypt(const uint8_t *data, size_t length, const uint8_t *passphrase, size_t pplength, uint8_t *out, | 303 | bool tox_pass_decrypt(const uint8_t *data, size_t length, const uint8_t *passphrase, size_t pplength, uint8_t *out, |
304 | TOX_ERR_DECRYPTION *error) | 304 | Tox_Err_Decryption *error) |
305 | { | 305 | { |
306 | if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) { | 306 | if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) { |
307 | SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH); | 307 | SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH); |
diff --git a/toxencryptsave/toxencryptsave.h b/toxencryptsave/toxencryptsave.h index 400483cb..0d608b1c 100644 --- a/toxencryptsave/toxencryptsave.h +++ b/toxencryptsave/toxencryptsave.h | |||
@@ -375,4 +375,9 @@ bool tox_is_data_encrypted(const uint8_t *data); | |||
375 | } | 375 | } |
376 | #endif | 376 | #endif |
377 | 377 | ||
378 | typedef TOX_ERR_KEY_DERIVATION Tox_Err_Key_Derivation; | ||
379 | typedef TOX_ERR_ENCRYPTION Tox_Err_Encryption; | ||
380 | typedef TOX_ERR_DECRYPTION Tox_Err_Decryption; | ||
381 | typedef TOX_ERR_GET_SALT Tox_Err_Get_Salt; | ||
382 | |||
378 | #endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H | 383 | #endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H |