[ 42] = KO, ['U'] = 20, [128] = KO, [171] = KO, [214] = KO,
};
-int32_t base64_encode(const uint8_t *in,
+int32_t kr_base64_encode(const uint8_t *in,
const uint32_t in_len,
uint8_t *out,
const uint32_t out_len)
return (text - out);
}
-int32_t base64_encode_alloc(const uint8_t *in,
+int32_t kr_base64_encode_alloc(const uint8_t *in,
const uint32_t in_len,
uint8_t **out)
{
}
// Encode data.
- int32_t ret = base64_encode(in, in_len, *out, out_len);
+ int32_t ret = kr_base64_encode(in, in_len, *out, out_len);
if (ret < 0) {
free(*out);
}
return ret;
}
-int32_t base64_decode(const uint8_t *in,
+int32_t kr_base64_decode(const uint8_t *in,
const uint32_t in_len,
uint8_t *out,
const uint32_t out_len)
return (bin - out);
}
-int32_t base64_decode_alloc(const uint8_t *in,
+int32_t kr_base64_decode_alloc(const uint8_t *in,
const uint32_t in_len,
uint8_t **out)
{
}
// Decode data.
- int32_t ret = base64_decode(in, in_len, *out, out_len);
+ int32_t ret = kr_base64_decode(in, in_len, *out, out_len);
if (ret < 0) {
free(*out);
}
* \retval >=0 length of output string.
* \retval KNOT_E* if error.
*/
-int32_t base64_encode(const uint8_t *in,
+int32_t kr_base64_encode(const uint8_t *in,
const uint32_t in_len,
uint8_t *out,
const uint32_t out_len);
* \retval >=0 length of output string.
* \retval KNOT_E* if error.
*/
-int32_t base64_encode_alloc(const uint8_t *in,
+int32_t kr_base64_encode_alloc(const uint8_t *in,
const uint32_t in_len,
uint8_t **out);
* \retval >=0 length of output data.
* \retval KNOT_E* if error.
*/
-int32_t base64_decode(const uint8_t *in,
+int32_t kr_base64_decode(const uint8_t *in,
const uint32_t in_len,
uint8_t *out,
const uint32_t out_len);
* \retval >=0 length of output data.
* \retval KNOT_E* if error.
*/
-int32_t base64_decode_alloc(const uint8_t *in,
+int32_t kr_base64_decode_alloc(const uint8_t *in,
const uint32_t in_len,
uint8_t **out);
lua_createtable(L, e->pins.len, 0);
for (size_t i = 0; i < e->pins.len; ++i) {
uint8_t pin_base64[TLS_SHA256_BASE64_BUFLEN];
- int err = base64_encode(e->pins.at[i], TLS_SHA256_RAW_LEN,
+ int err = kr_base64_encode(e->pins.at[i], TLS_SHA256_RAW_LEN,
pin_base64, sizeof(pin_base64));
if (err < 0) {
assert(false);
free(pin_raw);
ERROR("%s", kr_strerror(ENOMEM));
}
- int ret = base64_decode((const uint8_t *)pin, strlen(pin),
+ int ret = kr_base64_decode((const uint8_t *)pin, strlen(pin),
pin_raw, TLS_SHA256_RAW_LEN + 8);
if (ret < 0) {
ERROR("not a valid pin_sha256: '%s' (length %d), %s\n",
if (raw && outchar_len < TLS_SHA256_RAW_LEN) {
assert(false);
return kr_error(ENOSPC);
- /* With !raw we have check inside base64_encode. */
+ /* With !raw we have check inside kr_base64_encode. */
}
gnutls_pubkey_t key;
int err = gnutls_pubkey_init(&key);
if (err != GNUTLS_E_SUCCESS || raw/*success*/)
goto leave;
/* Convert to non-raw. */
- err = base64_encode((uint8_t *)raw_pin, sizeof(raw_pin),
+ err = kr_base64_encode((uint8_t *)raw_pin, sizeof(raw_pin),
(uint8_t *)outchar, outchar_len);
if (err >= 0 && err < outchar_len) {
err = GNUTLS_E_SUCCESS;
- outchar[err] = '\0'; /* base64_encode() doesn't do it */
+ outchar[err] = '\0'; /* kr_base64_encode() doesn't do it */
} else if (err >= 0) {
assert(false);
err = kr_error(ENOSPC); /* base64 fits but '\0' doesn't */