struct SRPVerifier;
struct SRPUser;
-typedef enum
-{
+typedef enum {
SRP_NG_1024,
SRP_NG_2048,
SRP_NG_4096,
SRP_NG_CUSTOM
} SRP_NGType;
-typedef enum
-{
+typedef enum {
/*SRP_SHA1,*/
/*SRP_SHA224,*/
SRP_SHA256,
SRP_SHA512*/
} SRP_HashAlgorithm;
-typedef enum
-{
+typedef enum {
SRP_ERR,
SRP_OK,
} SRP_Result;
/* key_length may be null */
const unsigned char *srp_verifier_get_session_key(
- struct SRPVerifier *ver, size_t *key_length);
+ struct SRPVerifier *ver, size_t *key_length);
size_t srp_verifier_get_session_key_length(struct SRPVerifier *ver);
/* Verifies session, on success, it writes bytes_HAMK.
* user_M must be exactly srp_verifier_get_session_key_length() bytes in size
*/
-void srp_verifier_verify_session(struct SRPVerifier *ver, const unsigned char *user_M,
- unsigned char **bytes_HAMK);
+void srp_verifier_verify_session(
+ struct SRPVerifier *ver, const unsigned char *user_M, unsigned char **bytes_HAMK);
/*******************************************************************************/
/* The n_hex and g_hex parameters should be 0 unless SRP_NG_CUSTOM is used for ng_type */
struct SRPUser *srp_user_new(SRP_HashAlgorithm alg, SRP_NGType ng_type,
- const char *username, const char *username_for_verifier,
- const unsigned char *bytes_password, size_t len_password,
- const char *n_hex, const char *g_hex);
+ const char *username, const char *username_for_verifier,
+ const unsigned char *bytes_password, size_t len_password, const char *n_hex,
+ const char *g_hex);
void srp_user_delete(struct SRPUser *usr);