Skip to content

Commit 469eeaf

Browse files
committed
prefix static function in multi2 with s_
This fixes #540
1 parent c5d7bfb commit 469eeaf

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

src/ciphers/multi2.c

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@
99

1010
#ifdef LTC_MULTI2
1111

12-
static void pi1(ulong32 *p)
12+
static void s_pi1(ulong32 *p)
1313
{
1414
p[1] ^= p[0];
1515
}
1616

17-
static void pi2(ulong32 *p, const ulong32 *k)
17+
static void s_pi2(ulong32 *p, const ulong32 *k)
1818
{
1919
ulong32 t;
2020
t = (p[1] + k[0]) & 0xFFFFFFFFUL;
@@ -23,7 +23,7 @@ static void pi2(ulong32 *p, const ulong32 *k)
2323
p[0] ^= t;
2424
}
2525

26-
static void pi3(ulong32 *p, const ulong32 *k)
26+
static void s_pi3(ulong32 *p, const ulong32 *k)
2727
{
2828
ulong32 t;
2929
t = p[0] + k[1];
@@ -35,15 +35,15 @@ static void pi3(ulong32 *p, const ulong32 *k)
3535
p[1] ^= t;
3636
}
3737

38-
static void pi4(ulong32 *p, const ulong32 *k)
38+
static void s_pi4(ulong32 *p, const ulong32 *k)
3939
{
4040
ulong32 t;
4141
t = (p[1] + k[3]) & 0xFFFFFFFFUL;
4242
t = (ROL(t, 2) + t + 1) & 0xFFFFFFFFUL;
4343
p[0] ^= t;
4444
}
4545

46-
static void setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk)
46+
static void s_setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk)
4747
{
4848
int n, t;
4949
ulong32 p[2];
@@ -52,46 +52,46 @@ static void setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk)
5252

5353
t = 4;
5454
n = 0;
55-
pi1(p);
56-
pi2(p, k);
55+
s_pi1(p);
56+
s_pi2(p, k);
5757
uk[n++] = p[0];
58-
pi3(p, k);
58+
s_pi3(p, k);
5959
uk[n++] = p[1];
60-
pi4(p, k);
60+
s_pi4(p, k);
6161
uk[n++] = p[0];
62-
pi1(p);
62+
s_pi1(p);
6363
uk[n++] = p[1];
64-
pi2(p, k+t);
64+
s_pi2(p, k+t);
6565
uk[n++] = p[0];
66-
pi3(p, k+t);
66+
s_pi3(p, k+t);
6767
uk[n++] = p[1];
68-
pi4(p, k+t);
68+
s_pi4(p, k+t);
6969
uk[n++] = p[0];
70-
pi1(p);
70+
s_pi1(p);
7171
uk[n++] = p[1];
7272
}
7373

74-
static void encrypt(ulong32 *p, int N, const ulong32 *uk)
74+
static void s_encrypt(ulong32 *p, int N, const ulong32 *uk)
7575
{
7676
int n, t;
7777
for (t = n = 0; ; ) {
78-
pi1(p); if (++n == N) break;
79-
pi2(p, uk+t); if (++n == N) break;
80-
pi3(p, uk+t); if (++n == N) break;
81-
pi4(p, uk+t); if (++n == N) break;
78+
s_pi1(p); if (++n == N) break;
79+
s_pi2(p, uk+t); if (++n == N) break;
80+
s_pi3(p, uk+t); if (++n == N) break;
81+
s_pi4(p, uk+t); if (++n == N) break;
8282
t ^= 4;
8383
}
8484
}
8585

86-
static void decrypt(ulong32 *p, int N, const ulong32 *uk)
86+
static void s_decrypt(ulong32 *p, int N, const ulong32 *uk)
8787
{
8888
int n, t;
8989
for (t = 4*(((N-1)>>2)&1), n = N; ; ) {
9090
switch (n<=4 ? n : ((n-1)%4)+1) {
91-
case 4: pi4(p, uk+t); --n; /* FALLTHROUGH */
92-
case 3: pi3(p, uk+t); --n; /* FALLTHROUGH */
93-
case 2: pi2(p, uk+t); --n; /* FALLTHROUGH */
94-
case 1: pi1(p); --n; break;
91+
case 4: s_pi4(p, uk+t); --n; /* FALLTHROUGH */
92+
case 3: s_pi3(p, uk+t); --n; /* FALLTHROUGH */
93+
case 2: s_pi2(p, uk+t); --n; /* FALLTHROUGH */
94+
case 1: s_pi1(p); --n; break;
9595
case 0: return;
9696
}
9797
t ^= 4;
@@ -128,7 +128,7 @@ int multi2_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
128128
}
129129
LOAD32H(dk[0], key + 32);
130130
LOAD32H(dk[1], key + 36);
131-
setup(dk, sk, skey->multi2.uk);
131+
s_setup(dk, sk, skey->multi2.uk);
132132

133133
zeromem(sk, sizeof(sk));
134134
zeromem(dk, sizeof(dk));
@@ -150,7 +150,7 @@ int multi2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetr
150150
LTC_ARGCHK(skey != NULL);
151151
LOAD32H(p[0], pt);
152152
LOAD32H(p[1], pt+4);
153-
encrypt(p, skey->multi2.N, skey->multi2.uk);
153+
s_encrypt(p, skey->multi2.N, skey->multi2.uk);
154154
STORE32H(p[0], ct);
155155
STORE32H(p[1], ct+4);
156156
return CRYPT_OK;
@@ -171,7 +171,7 @@ int multi2_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetr
171171
LTC_ARGCHK(skey != NULL);
172172
LOAD32H(p[0], ct);
173173
LOAD32H(p[1], ct+4);
174-
decrypt(p, skey->multi2.N, skey->multi2.uk);
174+
s_decrypt(p, skey->multi2.N, skey->multi2.uk);
175175
STORE32H(p[0], pt);
176176
STORE32H(p[1], pt+4);
177177
return CRYPT_OK;

0 commit comments

Comments
 (0)