Mercurial > vim
comparison src/proto/blowfish.pro @ 6122:18ac55444b37 v7.4.399
updated for version 7.4.399
Problem: Encryption implementation is messy. Blowfish encryption has a
weakness.
Solution: Refactor the encryption, store the state in an allocated struct
instead of using a save/restore mechanism. Introduce the
"blowfish2" method, which does not have the weakness and encrypts
the whole undo file. (largely by David Leadbeater)
author | Bram Moolenaar <bram@vim.org> |
---|---|
date | Sun, 10 Aug 2014 13:38:34 +0200 |
parents | 391e10afccf6 |
children | 21b0a39d13ed |
comparison
equal
deleted
inserted
replaced
6121:913d16b4904c | 6122:18ac55444b37 |
---|---|
1 /* blowfish.c */ | 1 /* blowfish.c */ |
2 void bf_key_init __ARGS((char_u *password, char_u *salt, int salt_len)); | 2 void crypt_blowfish_encode __ARGS((cryptstate_T *state, char_u *from, size_t len, char_u *to)); |
3 void bf_cfb_init __ARGS((char_u *iv, int iv_len)); | 3 void crypt_blowfish_decode __ARGS((cryptstate_T *state, char_u *from, size_t len, char_u *to)); |
4 void bf_crypt_encode __ARGS((char_u *from, size_t len, char_u *to)); | 4 void crypt_blowfish_init __ARGS((cryptstate_T *state, char_u *key, char_u *salt, int salt_len, char_u *seed, int seed_len)); |
5 void bf_crypt_decode __ARGS((char_u *ptr, long len)); | |
6 void bf_crypt_init_keys __ARGS((char_u *passwd)); | |
7 void bf_crypt_save __ARGS((void)); | |
8 void bf_crypt_restore __ARGS((void)); | |
9 int blowfish_self_test __ARGS((void)); | 5 int blowfish_self_test __ARGS((void)); |
10 /* vim: set ft=c : */ | 6 /* vim: set ft=c : */ |