ObjFW  Diff

Differences From Artifact [93e24e60c7]:

To Artifact [77817a66d6]:


225
226
227
228
229
230
231
232

233
234
235
236
237
238
239
240
241

242
243
244
245
246
247

248
249
250
251
252
253
254
255
225
226
227
228
229
230
231

232



233





234




235

236

237
238
239
240
241
242
243







-
+
-
-
-

-
-
-
-
-
+
-
-
-
-

-
+
-







	M68K_ARG(uint16_t, tag, d0)
	M68K_ARG(uint16_t *, size, a1)

	return of_zip_archive_entry_extra_field_find(extraField, tag, size);
}

void __saveds
glue_of_pbkdf2 PPC_PARAMS(OFHMAC *HMAC, size_t iterations,
glue_of_pbkdf2 PPC_PARAMS(const of_pbkdf2_parameters_t *param)
    const unsigned char *salt, size_t saltLength, const char *password,
    size_t passwordLength, unsigned char *key, size_t keyLength,
    bool allowsSwappableMemory)
{
	M68K_ARG(OFHMAC *, HMAC, a0)
	M68K_ARG(size_t, iterations, d0)
	M68K_ARG(const unsigned char *, salt, a1)
	M68K_ARG(size_t, saltLength, d1)
	M68K_ARG(const char *, password, a2)
	M68K_ARG(const of_pbkdf2_parameters_t *, param, a0)
	M68K_ARG(size_t, passwordLength, d2)
	M68K_ARG(unsigned char *, key, a3)
	M68K_ARG(size_t, keyLength, d3)
	M68K_ARG(bool, allowsSwappableMemory, d4)

	of_pbkdf2(HMAC, iterations, salt, saltLength, password, passwordLength,
	of_pbkdf2(*param);
	    key, keyLength, allowsSwappableMemory);
}

void __saveds
glue_of_salsa20_8_core PPC_PARAMS(uint32_t *buffer)
{
	M68K_ARG(uint32_t *, buffer, a0)

276
277
278
279
280
281
282
283

284
285
286
287
288
289
290
291
292
293

294
295
296
297
298
299

300
301
302
303
304
305
306
307
264
265
266
267
268
269
270

271



272






273




274

275

276
277
278
279
280
281
282







-
+
-
-
-

-
-
-
-
-
-
+
-
-
-
-

-
+
-







	M68K_ARG(size_t, costFactor, d1)
	M68K_ARG(uint32_t *, tmp, a1)

	of_scrypt_romix(buffer, blockSize, costFactor, tmp);
}

void __saveds
glue_of_scrypt PPC_PARAMS(size_t blockSize, size_t costFactor,
glue_of_scrypt PPC_PARAMS(const of_scrypt_parameters_t *param)
    size_t parallelization, const unsigned char *salt, size_t saltLength,
    const char *password, size_t passwordLength, unsigned char *key,
    size_t keyLength, bool allowsSwappableMemory)
{
	M68K_ARG(size_t, blockSize, d0)
	M68K_ARG(size_t, costFactor, d1)
	M68K_ARG(size_t, parallelization, d2)
	M68K_ARG(const unsigned char *, salt, a0)
	M68K_ARG(size_t, saltLength, d3)
	M68K_ARG(const char *, password, a1)
	M68K_ARG(const of_scrypt_parameters_t *, param, a0)
	M68K_ARG(size_t, passwordLength, d4)
	M68K_ARG(unsigned char *, key, a2)
	M68K_ARG(size_t, keyLength, d5)
	M68K_ARG(bool, allowsSwappableMemory, d6)

	of_scrypt(blockSize, costFactor, parallelization, salt, saltLength,
	of_scrypt(*param);
	    password, passwordLength, key, keyLength, allowsSwappableMemory);
}

const char *__saveds
glue_of_strptime PPC_PARAMS(const char *buf, const char *fmt, struct tm *tm,
    int16_t *tz)
{
	M68K_ARG(const char *, buf, a0)