Overview
| Comment: | Add missing documentation |
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA3-256: |
7d71c669ecd2a77dc1d9d5cc9b610ca6 |
| User & Date: | js on 2020-06-20 15:36:04 |
| Other Links: | manifest | tags |
Context
|
2020-06-21
| ||
| 15:57 | Ignore return value from _Unwind_RaiseException() (check-in: 0d383aeb8a user: js tags: trunk) | |
|
2020-06-20
| ||
| 23:11 | Merge trunk into amiga-library branch (check-in: 1fbccc9a53 user: js tags: amiga-library) | |
| 15:36 | Add missing documentation (check-in: 7d71c669ec user: js tags: trunk) | |
| 13:56 | OFRunLoop: Make of_run_loop_mode_default const (check-in: d6709240fd user: js tags: trunk) | |
Changes
Modified src/OFHTTPResponse.h from [453ae309af] to [8433880375].
| ︙ | ︙ | |||
70 71 72 73 74 75 76 77 78 79 80 81 82 |
*/
- (OFString *)stringWithEncoding: (of_string_encoding_t)encoding;
@end
#ifdef __cplusplus
extern "C" {
#endif
extern OFString *_Nonnull of_http_status_code_to_string(short code);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
| > > > > > > | 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 |
*/
- (OFString *)stringWithEncoding: (of_string_encoding_t)encoding;
@end
#ifdef __cplusplus
extern "C" {
#endif
/*!
* @brief Returns a description string for the specified HTTP status code.
*
* @param code The HTTP status code to return a description string for
* @return A description string for the specified HTTP status code
*/
extern OFString *_Nonnull of_http_status_code_to_string(short code);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
|
Modified src/pbkdf2.h from [f610170817] to [e1a5b71855].
| ︙ | ︙ | |||
30 31 32 33 34 35 36 |
@class OFHMAC;
#ifdef __cplusplus
extern "C" {
#endif
/*!
| | | | | < | | 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 |
@class OFHMAC;
#ifdef __cplusplus
extern "C" {
#endif
/*!
* @brief Derives a key from a password and a salt using PBKDF2.
*
* @note This will call @ref OFHMAC::reset on the `HMAC` first, making it
* possible to reuse the `HMAC`, but also meaning all previous results
* from the `HMAC` get invalidated if they have not been copied.
*
* @param HMAC The HMAC to use to derive a key
* @param iterations The number of iterations to perform
* @param salt The salt to derive a key with
* @param saltLength The length of the salt
* @param password The password to derive a key from
* @param passwordLength The length of the password
* @param key The buffer to write the key to
* @param keyLength The desired length for the derived key (`key` needs to have
* enough storage)
* @param allowsSwappableMemory Whether data may be stored in swappable memory
*/
extern void of_pbkdf2(OFHMAC *HMAC, size_t iterations,
const unsigned char *salt, size_t saltLength,
const char *password, size_t passwordLength,
unsigned char *key, size_t keyLength, bool allowsSwappableMemory);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
|
Modified src/scrypt.h from [aaee93f1b6] to [73098e0bc6].
| ︙ | ︙ | |||
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 |
extern "C" {
#endif
extern void of_salsa20_8_core(uint32_t buffer[_Nonnull 16]);
extern void of_scrypt_block_mix(uint32_t *output, const uint32_t *input,
size_t blockSize);
extern void of_scrypt_romix(uint32_t *buffer, size_t blockSize,
size_t costFactor, uint32_t *tmp);
extern void of_scrypt(size_t blockSize, size_t costFactor,
size_t parallelization, const unsigned char *salt, size_t saltLength,
const char *password, size_t passwordLength,
unsigned char *key, size_t keyLength, bool allowsSwappableMemory);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
| > > > > > > > > > > > > > > > > | 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 |
extern "C" {
#endif
extern void of_salsa20_8_core(uint32_t buffer[_Nonnull 16]);
extern void of_scrypt_block_mix(uint32_t *output, const uint32_t *input,
size_t blockSize);
extern void of_scrypt_romix(uint32_t *buffer, size_t blockSize,
size_t costFactor, uint32_t *tmp);
/*!
* @brief Derives a key from a password and a salt using scrypt.
*
* @param blockSize The block size to use
* @param costFactor The CPU/memory cost factor to use
* @param parallelization The parallelization to use
* @param salt The salt to derive a key with
* @param saltLength The length of the salt
* @param password The password to derive a key from
* @param passwordLength The length of the password
* @param key The buffer to write the key to
* @param keyLength The desired length for the derived key (`key` needs to have
* enough storage)
* @param allowsSwappableMemory Whether data may be stored in swappable memory
*/
extern void of_scrypt(size_t blockSize, size_t costFactor,
size_t parallelization, const unsigned char *salt, size_t saltLength,
const char *password, size_t passwordLength,
unsigned char *key, size_t keyLength, bool allowsSwappableMemory);
#ifdef __cplusplus
}
#endif
OF_ASSUME_NONNULL_END
|