From 9446e80b36a86c277986c0cb23239bdede1a3410 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Niels=20M=C3=B6ller?= <nisse@lysator.liu.se>
Date: Tue, 24 Aug 2004 17:52:51 +0200
Subject: [PATCH] * testsuite/arctwo-test.c, arctwo.h, arctwo.c
 (arctwo_set_key_ekb): Fixed typo; it should be "ekb", not "ebk".

Rev: src/nettle/arctwo.c:1.2
Rev: src/nettle/arctwo.h:1.2
Rev: src/nettle/testsuite/arctwo-test.c:1.2
---
 arctwo.c                | 18 +++++++++---------
 arctwo.h                | 10 +++++-----
 testsuite/arctwo-test.c |  4 ++--
 3 files changed, 16 insertions(+), 16 deletions(-)

diff --git a/arctwo.c b/arctwo.c
index a84cc250..9793467b 100644
--- a/arctwo.c
+++ b/arctwo.c
@@ -175,8 +175,8 @@ arctwo_decrypt (struct arctwo_ctx *ctx,
 }
 
 void
-arctwo_set_key_ebk (struct arctwo_ctx *ctx,
-		    unsigned length, const uint8_t *key, unsigned ebk)
+arctwo_set_key_ekb (struct arctwo_ctx *ctx,
+		    unsigned length, const uint8_t *key, unsigned ekb)
 {
   unsigned i;
   /* Expanded key, treated as octets */
@@ -185,7 +185,7 @@ arctwo_set_key_ebk (struct arctwo_ctx *ctx,
 
   assert (length >= ARCTWO_MIN_KEY_SIZE);
   assert (length <= ARCTWO_MAX_KEY_SIZE);
-  assert (ebk <= 1024);
+  assert (ekb <= 1024);
 
   for (i = 0; i < length; i++)
     S[i] = key[i];
@@ -196,12 +196,12 @@ arctwo_set_key_ebk (struct arctwo_ctx *ctx,
 
   S[0] = arctwo_sbox[S[0]];
 
-  /* Reduce effective key size to ebk bits, if requested by caller. */
-  if (ebk > 0 && ebk < 1024)
+  /* Reduce effective key size to ekb bits, if requested by caller. */
+  if (ekb > 0 && ekb < 1024)
     {
-      int len = (ebk + 7) >> 3;
+      int len = (ekb + 7) >> 3;
       i = 128 - len;
-      x = arctwo_sbox[S[i] & (255 >> (7 & -ebk))];
+      x = arctwo_sbox[S[i] & (255 >> (7 & -ekb))];
       S[i] = x;
 
       while (i--)
@@ -219,12 +219,12 @@ arctwo_set_key_ebk (struct arctwo_ctx *ctx,
 void
 arctwo_set_key (struct arctwo_ctx *ctx, unsigned length, const uint8_t *key)
 {
-  arctwo_set_key_ebk (ctx, length, key, 8 * length);
+  arctwo_set_key_ekb (ctx, length, key, 8 * length);
 }
 
 void
 arctwo_set_key_gutmann (struct arctwo_ctx *ctx,
 			unsigned length, const uint8_t *key)
 {
-  arctwo_set_key_ebk (ctx, length, key, 0);
+  arctwo_set_key_ekb (ctx, length, key, 0);
 }
diff --git a/arctwo.h b/arctwo.h
index 4f2a93f4..852564ac 100644
--- a/arctwo.h
+++ b/arctwo.h
@@ -31,7 +31,7 @@
 
 /* Name mangling */
 #define arctwo_set_key nettle_arctwo_set_key
-#define arctwo_set_key_ebk nettle_arctwo_set_key_ebk
+#define arctwo_set_key_ekb nettle_arctwo_set_key_ekb
 #define arctwo_encrypt nettle_arctwo_encrypt
 #define arctwo_decrypt nettle_arctwo_decrypt
 #define arctwo_set_key_gutmann nettle_arctwo_set_key_gutmann
@@ -52,14 +52,14 @@ struct arctwo_ctx
 /* Key expansion function that takes the "effective key bits", 1-1024,
    as an explicit argument. 0 means maximum key bits. */
 void
-arctwo_set_key_ebk (struct arctwo_ctx *ctx,
-		    unsigned length, const uint8_t * key, unsigned ebk);
+arctwo_set_key_ekb (struct arctwo_ctx *ctx,
+		    unsigned length, const uint8_t * key, unsigned ekb);
 
-/* Equvivalent to arctwo_set_key_ebk, with ebk = 8 * length */
+/* Equvivalent to arctwo_set_key_ekb, with ekb = 8 * length */
 void
 arctwo_set_key (struct arctwo_ctx *ctx, unsigned length, const uint8_t *key);
 
-/* Equvivalent to arctwo_set_key_ebk, with ebk = 1024 */
+/* Equvivalent to arctwo_set_key_ekb, with ekb = 1024 */
 /* FIXME: Is this function really needed, and if so, what's the right
    name for it? */
 void
diff --git a/testsuite/arctwo-test.c b/testsuite/arctwo-test.c
index 6a363ed6..17c3503f 100644
--- a/testsuite/arctwo-test.c
+++ b/testsuite/arctwo-test.c
@@ -24,7 +24,7 @@
 
 /* For tests with obscure values of ebk. */
 static void
-test_arctwo(unsigned ebk,
+test_arctwo(unsigned ekb,
 	    unsigned key_length,
 	    const uint8_t *key,
 	    unsigned length,
@@ -34,7 +34,7 @@ test_arctwo(unsigned ebk,
   struct arctwo_ctx ctx;
   uint8_t *data = xalloc(length);
 
-  arctwo_set_key_ebk(&ctx, key_length, key, ebk);
+  arctwo_set_key_ekb(&ctx, key_length, key, ekb);
   arctwo_encrypt(&ctx, length, data, cleartext);
 
   if (!MEMEQ(length, data, ciphertext))
-- 
GitLab