diff options
author | EuAndreh <eu@euandre.org> | 2023-12-29 12:47:15 -0300 |
---|---|---|
committer | EuAndreh <eu@euandre.org> | 2025-03-20 15:58:40 -0300 |
commit | 51437318493e6f623631a73bd7f9389708cea537 (patch) | |
tree | 903ad1612db315d69d578db50c879f767bcc0c4f /src/impl.h | |
parent | Add complete "Makefile" for standard packaging (diff) | |
download | agahu-main.tar.gz agahu-main.tar.xz |
- remove `#ifndef TWEETNACL_H` guard inside `tweetnacl.h`: as headers
shouldn't include other headers;
- remove `#define sv static void` golfing alias;
- remove `#define FOR(i,n) for (i = 0;i < n;++i)` golfing alias;
- assert that the generated `tweetnacl.o` code is identical to the
original code, available at `tests/assert-identical.sh`;
- remove all extra definitions from tweetnacl.h;
- rewrite code with the correct indentation, spacing and formatting;
- use C99 constructs over C89 (for loop variable declarations inside
the parentheses);
- use smaller types on loop variables, mostly `u8` over `int`,
`i64`, etc.;
- fix the public API;
- add fuzz targets;
Diffstat (limited to '')
-rw-r--r-- | src/impl.h | 121 |
1 files changed, 121 insertions, 0 deletions
diff --git a/src/impl.h b/src/impl.h new file mode 100644 index 0000000..ddd9e27 --- /dev/null +++ b/src/impl.h @@ -0,0 +1,121 @@ +int +crypto_verify_16( // 113 + const unsigned char *, + const unsigned char * +); + +int +crypto_hash( // 907 + unsigned char *, + const unsigned char *, + unsigned long long +); + +int +crypto_onetimeauth( // 309 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char * +); + +int +crypto_onetimeauth_verify( //407 + const unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char * +); + +int +crypto_secretbox( // 419 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char *, + const unsigned char * +); + +int +crypto_secretbox_open( // 441 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char *, + const unsigned char * +); + +int +crypto_sign_keypair( // 1023 + unsigned char *, + unsigned char * +); + +int +crypto_sign( // 1107 + unsigned char *, + unsigned long long *, + const unsigned char *, + unsigned long long, + const unsigned char * +); + +int +crypto_sign_open( // 1218 + unsigned char *, + unsigned long long *, + const unsigned char *, + unsigned long long, + const unsigned char * +); + +int +crypto_box_keypair( // 709 + unsigned char *, + unsigned char * +); + +int +crypto_box( // 743 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char *, + const unsigned char *, + const unsigned char * +); + +int +crypto_box_open( // 757 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char *, + const unsigned char *, + const unsigned char * +); + +int +crypto_box_beforenm( // 715 + unsigned char *, + const unsigned char *, + const unsigned char * +); + +int +crypto_box_afternm( // 722 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char *, + const unsigned char * +); + +int +crypto_box_open_afternm( // 733 + unsigned char *, + const unsigned char *, + unsigned long long, + const unsigned char *, + const unsigned char * +); |