aboutsummaryrefslogtreecommitdiffstats
path: root/librecrypt_verify.c
diff options
context:
space:
mode:
authorMattias Andrée <m@maandree.se>2026-05-20 23:04:11 +0200
committerMattias Andrée <m@maandree.se>2026-05-20 23:04:11 +0200
commitc35b47228f5494f4d806e9166628110af6dd2469 (patch)
tree3b5a123af999a5e047b8565efee293a5d95c3f6c /librecrypt_verify.c
parentPrepare for supporting custom algorithms (diff)
downloadlibrecrypt-c35b47228f5494f4d806e9166628110af6dd2469.tar.gz
librecrypt-c35b47228f5494f4d806e9166628110af6dd2469.tar.bz2
librecrypt-c35b47228f5494f4d806e9166628110af6dd2469.tar.xz
Add (so far untested and undocument) support for pepperHEADmaster
Signed-off-by: Mattias Andrée <m@maandree.se>
Diffstat (limited to 'librecrypt_verify.c')
-rw-r--r--librecrypt_verify.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/librecrypt_verify.c b/librecrypt_verify.c
index 990f37e..04efff4 100644
--- a/librecrypt_verify.c
+++ b/librecrypt_verify.c
@@ -4,7 +4,7 @@
int
-librecrypt_verify(const char *phrase, size_t len, const char *settings, void *reserved)
+librecrypt_verify(const char *phrase, size_t len, const char *settings, LIBRECRYPT_CONTEXT *ctx)
{
char *hash = NULL;
size_t size = 0u;
@@ -13,7 +13,7 @@ librecrypt_verify(const char *phrase, size_t len, const char *settings, void *re
int ret, err;
/* Measure base64 hash size */
- n = librecrypt_hash_(NULL, 0u, phrase, len, settings, reserved, ASCII_HASH);
+ n = librecrypt_hash_(NULL, 0u, phrase, len, settings, ctx, ASCII_HASH);
if (n < 0) {
if (errno == EOVERFLOW)
errno = ENOMEM; /* $covered$ (on 32-bit) */
@@ -21,7 +21,7 @@ librecrypt_verify(const char *phrase, size_t len, const char *settings, void *re
}
/* Get position of hash in `settings` */
- off = librecrypt_settings_prefix(settings, NULL, reserved);
+ off = librecrypt_settings_prefix(settings, NULL, ctx);
if (settings[off] == '*') {
if ('0' <= settings[off + 1u] && settings[off + 1u] <= '9') {
errno = EINVAL;
@@ -39,7 +39,7 @@ librecrypt_verify(const char *phrase, size_t len, const char *settings, void *re
return -1;
/* Calculate password hash and encode to base64 */
- n = librecrypt_hash_(hash, size, phrase, len, settings, reserved, ASCII_HASH);
+ n = librecrypt_hash_(hash, size, phrase, len, settings, ctx, ASCII_HASH);
if (n < 0) {
err = errno;
librecrypt_wipe(hash, size);