34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
|
extern "C" {
#endif
extern void of_salsa20_8_core(uint32_t buffer[_Nonnull 16]);
extern void of_scrypt_block_mix(uint32_t *output, const uint32_t *input,
size_t blockSize);
extern void of_scrypt_romix(uint32_t *buffer, size_t blockSize,
size_t costFactor, uint32_t *tmp);
extern void of_scrypt(size_t blockSize, size_t costFactor,
size_t parallelization, const unsigned char *salt, size_t saltLength,
const char *password, size_t passwordLength,
unsigned char *key, size_t keyLength, bool allowsSwappableMemory);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
|
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
|
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
extern "C" {
#endif
extern void of_salsa20_8_core(uint32_t buffer[_Nonnull 16]);
extern void of_scrypt_block_mix(uint32_t *output, const uint32_t *input,
size_t blockSize);
extern void of_scrypt_romix(uint32_t *buffer, size_t blockSize,
size_t costFactor, uint32_t *tmp);
/*!
* @brief Derives a key from a password and a salt using scrypt.
*
* @param blockSize The block size to use
* @param costFactor The CPU/memory cost factor to use
* @param parallelization The parallelization to use
* @param salt The salt to derive a key with
* @param saltLength The length of the salt
* @param password The password to derive a key from
* @param passwordLength The length of the password
* @param key The buffer to write the key to
* @param keyLength The desired length for the derived key (`key` needs to have
* enough storage)
* @param allowsSwappableMemory Whether data may be stored in swappable memory
*/
extern void of_scrypt(size_t blockSize, size_t costFactor,
size_t parallelization, const unsigned char *salt, size_t saltLength,
const char *password, size_t passwordLength,
unsigned char *key, size_t keyLength, bool allowsSwappableMemory);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
|