1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
|
--- src/crypto.c~ 2018-05-10 13:45:47.000000000 -0500
+++ src/crypto.c 2021-03-25 14:48:26.977246060 -0500
@@ -215,7 +215,7 @@
return 0;
}
-
+/*
void pbkdf2_hmac_sha512 (
unsigned key_length,
const uint8_t *key,
@@ -229,7 +229,7 @@
PBKDF2 (&sha512ctx, hmac_sha512_update, hmac_sha512_digest,
SHA512_DIGEST_SIZE, iterations, salt_length, salt, length, dst);
}
-
+*/
int increment_ctr_aes_iv(uint8_t *iv, uint64_t bytes_position)
{
if (bytes_position % AES_BLOCK_SIZE != 0) {
--- src/crypto.h~ 2018-05-10 13:45:47.000000000 -0500
+++ src/crypto.h 2021-03-25 14:48:16.384307537 -0500
@@ -39,13 +39,13 @@
int double_ripemd160sha256_as_string(uint8_t *data, uint64_t data_size,
char **digest);
-
+/*
void pbkdf2_hmac_sha512(unsigned key_length,
const uint8_t *key,
unsigned iterations,
unsigned salt_length, const uint8_t *salt,
unsigned length, uint8_t *dst);
-
+*/
/**
* @brief Generate a bucket's key
*
|