summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorpukkamustard <pukkamustard@posteo.net>2021-04-05 17:42:04 +0200
committerpukkamustard <pukkamustard@posteo.net>2021-04-05 17:42:04 +0200
commit5d441264c4d6fce3138ce083f659c66fcc715a33 (patch)
treebecfb782eff9207917e45fa1a35aea01cf8a3a70
parentb46391bbb8d0ea750d9a0b3129b9a6f5c7973b79 (diff)
c_src/monocypher_nif.c: Remove empty lines (cosmetic changes).
-rw-r--r--c_src/monocypher_nif.c19
1 files changed, 5 insertions, 14 deletions
diff --git a/c_src/monocypher_nif.c b/c_src/monocypher_nif.c
index 7e25d90..c8390e2 100644
--- a/c_src/monocypher_nif.c
+++ b/c_src/monocypher_nif.c
@@ -10,7 +10,6 @@
static ERL_NIF_TERM crypto_lock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ErlNifBinary mac;
if(!enif_inspect_binary(env, argv[0], &mac)) {
return enif_make_badarg(env);
@@ -57,7 +56,6 @@ static ERL_NIF_TERM crypto_lock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM
static ERL_NIF_TERM crypto_unlock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ErlNifBinary key;
if(!enif_inspect_binary(env, argv[0], &key)) {
return enif_make_badarg(env);
@@ -96,7 +94,7 @@ static ERL_NIF_TERM crypto_unlock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TE
// create a new binary for the plain_text
ERL_NIF_TERM plain_text_term;
unsigned char* plain_text = enif_make_new_binary(env, cipher_text.size, &plain_text_term);
-
+
int unlock_return_value = crypto_unlock(plain_text, key.data, nonce.data, mac.data, cipher_text.data, cipher_text.size);
if (unlock_return_value == 0) {
@@ -110,7 +108,6 @@ static ERL_NIF_TERM crypto_unlock_nif(ErlNifEnv* env, int argc, const ERL_NIF_TE
static ERL_NIF_TERM crypto_blake2b_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ERL_NIF_TERM hash_term;
unsigned char* hash = enif_make_new_binary(env, 64, &hash_term);
@@ -126,7 +123,6 @@ static ERL_NIF_TERM crypto_blake2b_nif(ErlNifEnv* env, int argc, const ERL_NIF_T
static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
size_t hash_size;
if (!enif_get_ulong(env, argv[0], &hash_size)) {
return enif_make_badarg(env);
@@ -139,7 +135,7 @@ static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const E
ERL_NIF_TERM hash_term;
unsigned char* hash = enif_make_new_binary(env, hash_size, &hash_term);
-
+
ErlNifBinary key;
if(!enif_inspect_binary(env, argv[1], &key)) {
return enif_make_badarg(env);
@@ -150,7 +146,6 @@ static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const E
return enif_make_badarg(env);
}
-
ErlNifBinary message;
if(!enif_inspect_binary(env, argv[2], &message)) {
return enif_make_badarg(env);
@@ -166,7 +161,6 @@ static ERL_NIF_TERM crypto_blake2b_general_nif(ErlNifEnv* env, int argc, const E
static ERL_NIF_TERM crypto_ietf_chacha20_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ErlNifBinary plain_text;
if(!enif_inspect_binary(env, argv[0], &plain_text)) {
return enif_make_badarg(env);
@@ -200,7 +194,6 @@ static ERL_NIF_TERM crypto_ietf_chacha20_nif(ErlNifEnv* env, int argc, const ERL
static ERL_NIF_TERM crypto_ietf_chacha20_ctr_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ErlNifBinary plain_text;
if(!enif_inspect_binary(env, argv[0], &plain_text)) {
return enif_make_badarg(env);
@@ -242,7 +235,6 @@ static ERL_NIF_TERM crypto_ietf_chacha20_ctr_nif(ErlNifEnv* env, int argc, const
static ERL_NIF_TERM crypto_ed25519_public_key_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ErlNifBinary secret_key;
if(!enif_inspect_binary(env, argv[0], &secret_key)) {
return enif_make_badarg(env);
@@ -262,7 +254,6 @@ static ERL_NIF_TERM crypto_ed25519_public_key_nif(ErlNifEnv* env, int argc, cons
static ERL_NIF_TERM crypto_ed25519_sign_nif(ErlNifEnv* env, int argc, const ERL_NIF_TERM argv[])
{
-
ErlNifBinary secret_key;
if(!enif_inspect_binary(env, argv[0], &secret_key)) {
return enif_make_badarg(env);
@@ -271,7 +262,7 @@ static ERL_NIF_TERM crypto_ed25519_sign_nif(ErlNifEnv* env, int argc, const ERL_
if(secret_key.size != 32) {
return enif_make_badarg(env);
}
-
+
ErlNifBinary public_key;
if(!enif_inspect_binary(env, argv[1], &public_key)) {
return enif_make_badarg(env);
@@ -290,7 +281,7 @@ static ERL_NIF_TERM crypto_ed25519_sign_nif(ErlNifEnv* env, int argc, const ERL_
unsigned char* signature = enif_make_new_binary(env, 64, &signature_term);
crypto_ed25519_sign(signature, secret_key.data, public_key.data, message.data, message.size);
-
+
return signature_term;
}
@@ -304,7 +295,7 @@ static ERL_NIF_TERM crypto_ed25519_check_nif(ErlNifEnv* env, int argc, const ERL
if(signature.size != 64) {
return enif_make_badarg(env);
}
-
+
ErlNifBinary public_key;
if(!enif_inspect_binary(env, argv[1], &public_key)) {
return enif_make_badarg(env);