view lib/arctwo.h @ 15727:144db791c6fa

Ensure EBADF returns for socket functions on mingw. * lib/accept.c (rpl_accept): Fail with error EBADF if the file descriptor is invalid. * lib/bind.c (rpl_bind): Likewise. * lib/connect.c (rpl_connect): Likewise. * lib/getpeername.c (rpl_getpeername): Likewise. * lib/getsockname.c (rpl_getsockname): Likewise. * lib/getsockopt.c (rpl_getsockopt): Likewise. * lib/listen.c (rpl_listen): Likewise. * lib/recv.c (rpl_recv): Likewise. * lib/recvfrom.c (rpl_recvfrom): Likewise. * lib/send.c (rpl_send): Likewise. * lib/sendto.c (rpl_sendto): Likewise. * lib/setsockopt.c (rpl_setsockopt): Likewise. * lib/shutdown.c (rpl_shutdown): Likewise.
author Bruno Haible <bruno@clisp.org>
date Wed, 21 Sep 2011 00:20:59 +0200
parents 97fc9a21a8fb
children 8250f2777afc
line wrap: on
line source

/* arctwo.h --- The arctwo block cipher
 * Copyright (C) 2000-2003, 2005, 2009-2011 Free Software Foundation, Inc.
 *
 * This file is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published
 * by the Free Software Foundation; either version 2, or (at your
 * option) any later version.
 *
 * This file is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this file; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA.
 *
 */

/* Code from Libgcrypt adapted for gnulib by Simon Josefsson. */

#ifndef ARCTWO_H
# define ARCTWO_H

# include <stddef.h>
# include <stdint.h>

typedef struct
{
  uint16_t S[64];
} arctwo_context;

#define ARCTWO_BLOCK_SIZE 8

/* Initialize CONTEXT using KEY of KEYLEN length.  If
   EFFECTIVE_KEYLEN, truncate the key (using a special algorithm) to
   only be of EFFECTIVE_KEYLEN bits.  Normally, you use
   EFFECTIVE_KEYLEN of 0, but see RFC 2268 for more information. */
void
arctwo_setkey_ekb (arctwo_context *context,
                   size_t keylen, const char *key, size_t effective_keylen);

#define arctwo_setkey(context,keylen,key) \
  arctwo_setkey_ekb (context, keylen, key, 8 * (keylen))

/* Encrypt INBUF of size LENGTH into OUTBUF.  LENGTH must be a
   multiple of ARCTWO_BLOCK_SIZE.  CONTEXT hold the encryption key,
   and must have been initialized with arctwo_setkey or
   arctwo_setkey_ekb. */
extern void
arctwo_encrypt (arctwo_context *context, const char *inbuf,
                char *outbuf, size_t length);

/* Decrypt INBUF of size LENGTH into OUTBUF.  LENGTH must be a
   multiple of ARCTWO_BLOCK_SIZE.  CONTEXT hold the decryption key,
   and must have been initialized with arctwo_setkey or
   arctwo_setkey_ekb. */
extern void
arctwo_decrypt (arctwo_context *context, const char *inbuf,
                char *outbuf, size_t length);

#endif /* ARCTWO_H */