2424
2525#ifdef LTC_SAFER
2626
27- #define __LTC_SAFER_TAB_C__
27+ #define LTC_SAFER_TAB_C
2828#include "safer_tab.c"
2929
3030const struct ltc_cipher_descriptor safer_k64_desc = {
@@ -91,13 +91,13 @@ const struct ltc_cipher_descriptor safer_k64_desc = {
9191/******************* Types ****************************************************/
9292
9393#ifdef LTC_CLEAN_STACK
94- static void _Safer_Expand_Userkey (const unsigned char * userkey_1 ,
94+ static void _safer_expand_userkey (const unsigned char * userkey_1 ,
9595 const unsigned char * userkey_2 ,
9696 unsigned int nof_rounds ,
9797 int strengthened ,
9898 safer_key_t key )
9999#else
100- static void Safer_Expand_Userkey (const unsigned char * userkey_1 ,
100+ static void safer_expand_userkey (const unsigned char * userkey_1 ,
101101 const unsigned char * userkey_2 ,
102102 unsigned int nof_rounds ,
103103 int strengthened ,
@@ -160,13 +160,13 @@ static void Safer_Expand_Userkey(const unsigned char *userkey_1,
160160}
161161
162162#ifdef LTC_CLEAN_STACK
163- static void Safer_Expand_Userkey (const unsigned char * userkey_1 ,
163+ static void safer_expand_userkey (const unsigned char * userkey_1 ,
164164 const unsigned char * userkey_2 ,
165165 unsigned int nof_rounds ,
166166 int strengthened ,
167167 safer_key_t key )
168168{
169- _Safer_Expand_Userkey (userkey_1 , userkey_2 , nof_rounds , strengthened , key );
169+ _safer_expand_userkey (userkey_1 , userkey_2 , nof_rounds , strengthened , key );
170170 burn_stack (sizeof (unsigned char ) * (2 * (LTC_SAFER_BLOCK_LEN + 1 )) + sizeof (unsigned int )* 2 );
171171}
172172#endif
@@ -184,7 +184,7 @@ int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmet
184184 return CRYPT_INVALID_KEYSIZE ;
185185 }
186186
187- Safer_Expand_Userkey (key , key , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_K64_DEFAULT_NOF_ROUNDS ), 0 , skey -> safer .key );
187+ safer_expand_userkey (key , key , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_K64_DEFAULT_NOF_ROUNDS ), 0 , skey -> safer .key );
188188 return CRYPT_OK ;
189189}
190190
@@ -201,7 +201,7 @@ int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symme
201201 return CRYPT_INVALID_KEYSIZE ;
202202 }
203203
204- Safer_Expand_Userkey (key , key , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS ), 1 , skey -> safer .key );
204+ safer_expand_userkey (key , key , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS ), 1 , skey -> safer .key );
205205 return CRYPT_OK ;
206206}
207207
@@ -218,7 +218,7 @@ int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symme
218218 return CRYPT_INVALID_KEYSIZE ;
219219 }
220220
221- Safer_Expand_Userkey (key , key + 8 , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_K128_DEFAULT_NOF_ROUNDS ), 0 , skey -> safer .key );
221+ safer_expand_userkey (key , key + 8 , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_K128_DEFAULT_NOF_ROUNDS ), 0 , skey -> safer .key );
222222 return CRYPT_OK ;
223223}
224224
@@ -235,7 +235,7 @@ int safer_sk128_setup(const unsigned char *key, int keylen, int num_rounds, symm
235235 return CRYPT_INVALID_KEYSIZE ;
236236 }
237237
238- Safer_Expand_Userkey (key , key + 8 , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_SK128_DEFAULT_NOF_ROUNDS ), 1 , skey -> safer .key );
238+ safer_expand_userkey (key , key + 8 , (unsigned int )(num_rounds != 0 ?num_rounds :LTC_SAFER_SK128_DEFAULT_NOF_ROUNDS ), 1 , skey -> safer .key );
239239 return CRYPT_OK ;
240240}
241241
0 commit comments