summaryrefslogtreecommitdiff
path: root/toxencryptsave
diff options
context:
space:
mode:
authoriphydf <iphydf@users.noreply.github.com>2018-10-08 21:05:14 +0000
committeriphydf <iphydf@users.noreply.github.com>2018-10-09 17:33:37 +0000
commit605dfe882c52bfad4dee9678a69e4b816d93431d (patch)
tree10432adc5d3716cb28b833c6e156218b67c23494 /toxencryptsave
parent77e025fae48a4f9cf6cf19a359b6c423545f3cc7 (diff)
Consistently use camel case enum names.
Including in tests and implementation files.
Diffstat (limited to 'toxencryptsave')
-rw-r--r--toxencryptsave/toxencryptsave.api.h5
-rw-r--r--toxencryptsave/toxencryptsave.c16
-rw-r--r--toxencryptsave/toxencryptsave.h5
3 files changed, 18 insertions, 8 deletions
diff --git a/toxencryptsave/toxencryptsave.api.h b/toxencryptsave/toxencryptsave.api.h
index 28d7a650..c6a395f3 100644
--- a/toxencryptsave/toxencryptsave.api.h
+++ b/toxencryptsave/toxencryptsave.api.h
@@ -313,5 +313,10 @@ static bool is_data_encrypted(const uint8_t *data);
313} 313}
314#endif 314#endif
315 315
316typedef TOX_ERR_KEY_DERIVATION Tox_Err_Key_Derivation;
317typedef TOX_ERR_ENCRYPTION Tox_Err_Encryption;
318typedef TOX_ERR_DECRYPTION Tox_Err_Decryption;
319typedef TOX_ERR_GET_SALT Tox_Err_Get_Salt;
320
316#endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H 321#endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H
317%} 322%}
diff --git a/toxencryptsave/toxencryptsave.c b/toxencryptsave/toxencryptsave.c
index 6221b0b6..a3e70b2f 100644
--- a/toxencryptsave/toxencryptsave.c
+++ b/toxencryptsave/toxencryptsave.c
@@ -91,7 +91,7 @@ void tox_pass_key_free(Tox_Pass_Key *pass_key)
91 * success does not say anything about the validity of the data, only that data of 91 * success does not say anything about the validity of the data, only that data of
92 * the appropriate size was copied 92 * the appropriate size was copied
93 */ 93 */
94bool tox_get_salt(const uint8_t *data, uint8_t *salt, TOX_ERR_GET_SALT *error) 94bool tox_get_salt(const uint8_t *data, uint8_t *salt, Tox_Err_Get_Salt *error)
95{ 95{
96 if (!data || !salt) { 96 if (!data || !salt) {
97 SET_ERROR_PARAMETER(error, TOX_ERR_GET_SALT_NULL); 97 SET_ERROR_PARAMETER(error, TOX_ERR_GET_SALT_NULL);
@@ -121,7 +121,7 @@ bool tox_get_salt(const uint8_t *data, uint8_t *salt, TOX_ERR_GET_SALT *error)
121 * returns true on success 121 * returns true on success
122 */ 122 */
123Tox_Pass_Key *tox_pass_key_derive(const uint8_t *passphrase, size_t pplength, 123Tox_Pass_Key *tox_pass_key_derive(const uint8_t *passphrase, size_t pplength,
124 TOX_ERR_KEY_DERIVATION *error) 124 Tox_Err_Key_Derivation *error)
125{ 125{
126 uint8_t salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES]; 126 uint8_t salt[crypto_pwhash_scryptsalsa208sha256_SALTBYTES];
127 random_bytes(salt, sizeof salt); 127 random_bytes(salt, sizeof salt);
@@ -132,7 +132,7 @@ Tox_Pass_Key *tox_pass_key_derive(const uint8_t *passphrase, size_t pplength,
132 * The salt must be TOX_PASS_SALT_LENGTH bytes in length. 132 * The salt must be TOX_PASS_SALT_LENGTH bytes in length.
133 */ 133 */
134Tox_Pass_Key *tox_pass_key_derive_with_salt(const uint8_t *passphrase, size_t pplength, 134Tox_Pass_Key *tox_pass_key_derive_with_salt(const uint8_t *passphrase, size_t pplength,
135 const uint8_t *salt, TOX_ERR_KEY_DERIVATION *error) 135 const uint8_t *salt, Tox_Err_Key_Derivation *error)
136{ 136{
137 if (!salt || (!passphrase && pplength != 0)) { 137 if (!salt || (!passphrase && pplength != 0)) {
138 SET_ERROR_PARAMETER(error, TOX_ERR_KEY_DERIVATION_NULL); 138 SET_ERROR_PARAMETER(error, TOX_ERR_KEY_DERIVATION_NULL);
@@ -181,7 +181,7 @@ Tox_Pass_Key *tox_pass_key_derive_with_salt(const uint8_t *passphrase, size_t pp
181 * returns true on success 181 * returns true on success
182 */ 182 */
183bool tox_pass_key_encrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t data_len, uint8_t *out, 183bool tox_pass_key_encrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t data_len, uint8_t *out,
184 TOX_ERR_ENCRYPTION *error) 184 Tox_Err_Encryption *error)
185{ 185{
186 if (data_len == 0 || !data || !key || !out) { 186 if (data_len == 0 || !data || !key || !out) {
187 SET_ERROR_PARAMETER(error, TOX_ERR_ENCRYPTION_NULL); 187 SET_ERROR_PARAMETER(error, TOX_ERR_ENCRYPTION_NULL);
@@ -227,9 +227,9 @@ bool tox_pass_key_encrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t d
227 * returns true on success 227 * returns true on success
228 */ 228 */
229bool tox_pass_encrypt(const uint8_t *data, size_t data_len, const uint8_t *passphrase, size_t pplength, uint8_t *out, 229bool tox_pass_encrypt(const uint8_t *data, size_t data_len, const uint8_t *passphrase, size_t pplength, uint8_t *out,
230 TOX_ERR_ENCRYPTION *error) 230 Tox_Err_Encryption *error)
231{ 231{
232 TOX_ERR_KEY_DERIVATION _error; 232 Tox_Err_Key_Derivation _error;
233 Tox_Pass_Key *key = tox_pass_key_derive(passphrase, pplength, &_error); 233 Tox_Pass_Key *key = tox_pass_key_derive(passphrase, pplength, &_error);
234 234
235 if (!key) { 235 if (!key) {
@@ -255,7 +255,7 @@ bool tox_pass_encrypt(const uint8_t *data, size_t data_len, const uint8_t *passp
255 * returns true on success 255 * returns true on success
256 */ 256 */
257bool tox_pass_key_decrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t length, uint8_t *out, 257bool tox_pass_key_decrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t length, uint8_t *out,
258 TOX_ERR_DECRYPTION *error) 258 Tox_Err_Decryption *error)
259{ 259{
260 if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) { 260 if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) {
261 SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH); 261 SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH);
@@ -301,7 +301,7 @@ bool tox_pass_key_decrypt(const Tox_Pass_Key *key, const uint8_t *data, size_t l
301 * returns true on success 301 * returns true on success
302 */ 302 */
303bool tox_pass_decrypt(const uint8_t *data, size_t length, const uint8_t *passphrase, size_t pplength, uint8_t *out, 303bool tox_pass_decrypt(const uint8_t *data, size_t length, const uint8_t *passphrase, size_t pplength, uint8_t *out,
304 TOX_ERR_DECRYPTION *error) 304 Tox_Err_Decryption *error)
305{ 305{
306 if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) { 306 if (length <= TOX_PASS_ENCRYPTION_EXTRA_LENGTH) {
307 SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH); 307 SET_ERROR_PARAMETER(error, TOX_ERR_DECRYPTION_INVALID_LENGTH);
diff --git a/toxencryptsave/toxencryptsave.h b/toxencryptsave/toxencryptsave.h
index 400483cb..0d608b1c 100644
--- a/toxencryptsave/toxencryptsave.h
+++ b/toxencryptsave/toxencryptsave.h
@@ -375,4 +375,9 @@ bool tox_is_data_encrypted(const uint8_t *data);
375} 375}
376#endif 376#endif
377 377
378typedef TOX_ERR_KEY_DERIVATION Tox_Err_Key_Derivation;
379typedef TOX_ERR_ENCRYPTION Tox_Err_Encryption;
380typedef TOX_ERR_DECRYPTION Tox_Err_Decryption;
381typedef TOX_ERR_GET_SALT Tox_Err_Get_Salt;
382
378#endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H 383#endif // C_TOXCORE_TOXENCRYPTSAVE_TOXENCRYPTSAVE_H