* @returns the size of the encrypted block, -1 for errors
*/
ssize_t
-GNUNET_CRYPTO_symmetric_encrypt (const void *block, size_t len,
- const struct GNUNET_CRYPTO_SymmetricSessionKey *
- sessionkey,
- const struct GNUNET_CRYPTO_SymmetricInitializationVector *
- iv, void *result)
+GNUNET_CRYPTO_symmetric_encrypt (const void *block,
+ size_t len,
+ const struct GNUNET_CRYPTO_SymmetricSessionKey *sessionkey,
+ const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv,
+ void *result)
{
gcry_cipher_hd_t handle;
char tmp[len];
*/
ssize_t
GNUNET_CRYPTO_symmetric_decrypt (const void *block, size_t size,
- const struct GNUNET_CRYPTO_SymmetricSessionKey *sessionkey,
- const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv,
- void *result)
+ const struct GNUNET_CRYPTO_SymmetricSessionKey *sessionkey,
+ const struct GNUNET_CRYPTO_SymmetricInitializationVector *iv,
+ void *result)
{
gcry_cipher_hd_t handle;
char tmp[size];
memcpy (key.twofish_key, raw_key_twofish, GNUNET_CRYPTO_AES_KEY_LENGTH);
if (GNUNET_CRYPTO_AES_KEY_LENGTH !=
GNUNET_CRYPTO_symmetric_encrypt (plain, GNUNET_CRYPTO_AES_KEY_LENGTH, &key,
- (const struct
- GNUNET_CRYPTO_SymmetricInitializationVector *)
- "testtesttesttest", result))
+ (const struct
+ GNUNET_CRYPTO_SymmetricInitializationVector *)
+ "testtesttesttesttesttesttesttest",
+ result))
{
printf ("Wrong return value from encrypt block.\n");
ret = 1;
GNUNET_CRYPTO_symmetric_decrypt (result, GNUNET_CRYPTO_AES_KEY_LENGTH, &key,
(const struct
GNUNET_CRYPTO_SymmetricInitializationVector *)
- "testtesttesttest", res))
+ "testtesttesttesttesttesttesttest", res))
{
printf ("Wrong return value from decrypt block.\n");
ret = 1;