diff --git a/.gitignore b/.gitignore deleted file mode 100644 index 74a4ed0..0000000 --- a/.gitignore +++ /dev/null @@ -1,26 +0,0 @@ -# Edit your git config file, default in ~/.gitconfig -# add following 2 line(without prefix '#'): -# -# [core] -# excludesfile = ~/.gitignore -# -# ~/.gitignore is the path your place this file. - -*.swp - -# Mac OS X -.DS_Store - -# XCode -xcuserdata/ -project.xcworkspace/ -*.pbxuser -*.mode1v3 -*.mode2v3 -*.perspective -*.perspectivev3 - -build/* -*/build/* -!build/README.md - diff --git a/LICENSE b/LICENSE deleted file mode 100644 index 94a9ed0..0000000 --- a/LICENSE +++ /dev/null @@ -1,674 +0,0 @@ - GNU GENERAL PUBLIC LICENSE - Version 3, 29 June 2007 - - Copyright (C) 2007 Free Software Foundation, Inc. - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - Preamble - - The GNU General Public License is a free, copyleft license for -software and other kinds of works. - - The licenses for most software and other practical works are designed -to take away your freedom to share and change the works. By contrast, -the GNU General Public License is intended to guarantee your freedom to -share and change all versions of a program--to make sure it remains free -software for all its users. We, the Free Software Foundation, use the -GNU General Public License for most of our software; it applies also to -any other work released this way by its authors. You can apply it to -your programs, too. - - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -them if you wish), that you receive source code or can get it if you -want it, that you can change the software or use pieces of it in new -free programs, and that you know you can do these things. - - To protect your rights, we need to prevent others from denying you -these rights or asking you to surrender the rights. Therefore, you have -certain responsibilities if you distribute copies of the software, or if -you modify it: responsibilities to respect the freedom of others. - - For example, if you distribute copies of such a program, whether -gratis or for a fee, you must pass on to the recipients the same -freedoms that you received. You must make sure that they, too, receive -or can get the source code. And you must show them these terms so they -know their rights. - - Developers that use the GNU GPL protect your rights with two steps: -(1) assert copyright on the software, and (2) offer you this License -giving you legal permission to copy, distribute and/or modify it. - - For the developers' and authors' protection, the GPL clearly explains -that there is no warranty for this free software. For both users' and -authors' sake, the GPL requires that modified versions be marked as -changed, so that their problems will not be attributed erroneously to -authors of previous versions. - - Some devices are designed to deny users access to install or run -modified versions of the software inside them, although the manufacturer -can do so. This is fundamentally incompatible with the aim of -protecting users' freedom to change the software. The systematic -pattern of such abuse occurs in the area of products for individuals to -use, which is precisely where it is most unacceptable. Therefore, we -have designed this version of the GPL to prohibit the practice for those -products. If such problems arise substantially in other domains, we -stand ready to extend this provision to those domains in future versions -of the GPL, as needed to protect the freedom of users. - - Finally, every program is threatened constantly by software patents. -States should not allow patents to restrict development and use of -software on general-purpose computers, but in those that do, we wish to -avoid the special danger that patents applied to a free program could -make it effectively proprietary. To prevent this, the GPL assures that -patents cannot be used to render the program non-free. - - The precise terms and conditions for copying, distribution and -modification follow. - - TERMS AND CONDITIONS - - 0. Definitions. - - "This License" refers to version 3 of the GNU General Public License. - - "Copyright" also means copyright-like laws that apply to other kinds of -works, such as semiconductor masks. - - "The Program" refers to any copyrightable work licensed under this -License. Each licensee is addressed as "you". "Licensees" and -"recipients" may be individuals or organizations. - - To "modify" a work means to copy from or adapt all or part of the work -in a fashion requiring copyright permission, other than the making of an -exact copy. The resulting work is called a "modified version" of the -earlier work or a work "based on" the earlier work. - - A "covered work" means either the unmodified Program or a work based -on the Program. - - To "propagate" a work means to do anything with it that, without -permission, would make you directly or secondarily liable for -infringement under applicable copyright law, except executing it on a -computer or modifying a private copy. Propagation includes copying, -distribution (with or without modification), making available to the -public, and in some countries other activities as well. - - To "convey" a work means any kind of propagation that enables other -parties to make or receive copies. Mere interaction with a user through -a computer network, with no transfer of a copy, is not conveying. - - An interactive user interface displays "Appropriate Legal Notices" -to the extent that it includes a convenient and prominently visible -feature that (1) displays an appropriate copyright notice, and (2) -tells the user that there is no warranty for the work (except to the -extent that warranties are provided), that licensees may convey the -work under this License, and how to view a copy of this License. If -the interface presents a list of user commands or options, such as a -menu, a prominent item in the list meets this criterion. - - 1. Source Code. - - The "source code" for a work means the preferred form of the work -for making modifications to it. "Object code" means any non-source -form of a work. - - A "Standard Interface" means an interface that either is an official -standard defined by a recognized standards body, or, in the case of -interfaces specified for a particular programming language, one that -is widely used among developers working in that language. - - The "System Libraries" of an executable work include anything, other -than the work as a whole, that (a) is included in the normal form of -packaging a Major Component, but which is not part of that Major -Component, and (b) serves only to enable use of the work with that -Major Component, or to implement a Standard Interface for which an -implementation is available to the public in source code form. A -"Major Component", in this context, means a major essential component -(kernel, window system, and so on) of the specific operating system -(if any) on which the executable work runs, or a compiler used to -produce the work, or an object code interpreter used to run it. - - The "Corresponding Source" for a work in object code form means all -the source code needed to generate, install, and (for an executable -work) run the object code and to modify the work, including scripts to -control those activities. However, it does not include the work's -System Libraries, or general-purpose tools or generally available free -programs which are used unmodified in performing those activities but -which are not part of the work. For example, Corresponding Source -includes interface definition files associated with source files for -the work, and the source code for shared libraries and dynamically -linked subprograms that the work is specifically designed to require, -such as by intimate data communication or control flow between those -subprograms and other parts of the work. - - The Corresponding Source need not include anything that users -can regenerate automatically from other parts of the Corresponding -Source. - - The Corresponding Source for a work in source code form is that -same work. - - 2. Basic Permissions. - - All rights granted under this License are granted for the term of -copyright on the Program, and are irrevocable provided the stated -conditions are met. This License explicitly affirms your unlimited -permission to run the unmodified Program. The output from running a -covered work is covered by this License only if the output, given its -content, constitutes a covered work. This License acknowledges your -rights of fair use or other equivalent, as provided by copyright law. - - You may make, run and propagate covered works that you do not -convey, without conditions so long as your license otherwise remains -in force. You may convey covered works to others for the sole purpose -of having them make modifications exclusively for you, or provide you -with facilities for running those works, provided that you comply with -the terms of this License in conveying all material for which you do -not control copyright. Those thus making or running the covered works -for you must do so exclusively on your behalf, under your direction -and control, on terms that prohibit them from making any copies of -your copyrighted material outside their relationship with you. - - Conveying under any other circumstances is permitted solely under -the conditions stated below. Sublicensing is not allowed; section 10 -makes it unnecessary. - - 3. Protecting Users' Legal Rights From Anti-Circumvention Law. - - No covered work shall be deemed part of an effective technological -measure under any applicable law fulfilling obligations under article -11 of the WIPO copyright treaty adopted on 20 December 1996, or -similar laws prohibiting or restricting circumvention of such -measures. - - When you convey a covered work, you waive any legal power to forbid -circumvention of technological measures to the extent such circumvention -is effected by exercising rights under this License with respect to -the covered work, and you disclaim any intention to limit operation or -modification of the work as a means of enforcing, against the work's -users, your or third parties' legal rights to forbid circumvention of -technological measures. - - 4. Conveying Verbatim Copies. - - You may convey verbatim copies of the Program's source code as you -receive it, in any medium, provided that you conspicuously and -appropriately publish on each copy an appropriate copyright notice; -keep intact all notices stating that this License and any -non-permissive terms added in accord with section 7 apply to the code; -keep intact all notices of the absence of any warranty; and give all -recipients a copy of this License along with the Program. - - You may charge any price or no price for each copy that you convey, -and you may offer support or warranty protection for a fee. - - 5. Conveying Modified Source Versions. - - You may convey a work based on the Program, or the modifications to -produce it from the Program, in the form of source code under the -terms of section 4, provided that you also meet all of these conditions: - - a) The work must carry prominent notices stating that you modified - it, and giving a relevant date. - - b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - "keep intact all notices". - - c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it. - - d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so. - - A compilation of a covered work with other separate and independent -works, which are not by their nature extensions of the covered work, -and which are not combined with it such as to form a larger program, -in or on a volume of a storage or distribution medium, is called an -"aggregate" if the compilation and its resulting copyright are not -used to limit the access or legal rights of the compilation's users -beyond what the individual works permit. Inclusion of a covered work -in an aggregate does not cause this License to apply to the other -parts of the aggregate. - - 6. Conveying Non-Source Forms. - - You may convey a covered work in object code form under the terms -of sections 4 and 5, provided that you also convey the -machine-readable Corresponding Source under the terms of this License, -in one of these ways: - - a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange. - - b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge. - - c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b. - - d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements. - - e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d. - - A separable portion of the object code, whose source code is excluded -from the Corresponding Source as a System Library, need not be -included in conveying the object code work. - - A "User Product" is either (1) a "consumer product", which means any -tangible personal property which is normally used for personal, family, -or household purposes, or (2) anything designed or sold for incorporation -into a dwelling. In determining whether a product is a consumer product, -doubtful cases shall be resolved in favor of coverage. For a particular -product received by a particular user, "normally used" refers to a -typical or common use of that class of product, regardless of the status -of the particular user or of the way in which the particular user -actually uses, or expects or is expected to use, the product. A product -is a consumer product regardless of whether the product has substantial -commercial, industrial or non-consumer uses, unless such uses represent -the only significant mode of use of the product. - - "Installation Information" for a User Product means any methods, -procedures, authorization keys, or other information required to install -and execute modified versions of a covered work in that User Product from -a modified version of its Corresponding Source. The information must -suffice to ensure that the continued functioning of the modified object -code is in no case prevented or interfered with solely because -modification has been made. - - If you convey an object code work under this section in, or with, or -specifically for use in, a User Product, and the conveying occurs as -part of a transaction in which the right of possession and use of the -User Product is transferred to the recipient in perpetuity or for a -fixed term (regardless of how the transaction is characterized), the -Corresponding Source conveyed under this section must be accompanied -by the Installation Information. But this requirement does not apply -if neither you nor any third party retains the ability to install -modified object code on the User Product (for example, the work has -been installed in ROM). - - The requirement to provide Installation Information does not include a -requirement to continue to provide support service, warranty, or updates -for a work that has been modified or installed by the recipient, or for -the User Product in which it has been modified or installed. Access to a -network may be denied when the modification itself materially and -adversely affects the operation of the network or violates the rules and -protocols for communication across the network. - - Corresponding Source conveyed, and Installation Information provided, -in accord with this section must be in a format that is publicly -documented (and with an implementation available to the public in -source code form), and must require no special password or key for -unpacking, reading or copying. - - 7. Additional Terms. - - "Additional permissions" are terms that supplement the terms of this -License by making exceptions from one or more of its conditions. -Additional permissions that are applicable to the entire Program shall -be treated as though they were included in this License, to the extent -that they are valid under applicable law. If additional permissions -apply only to part of the Program, that part may be used separately -under those permissions, but the entire Program remains governed by -this License without regard to the additional permissions. - - When you convey a copy of a covered work, you may at your option -remove any additional permissions from that copy, or from any part of -it. (Additional permissions may be written to require their own -removal in certain cases when you modify the work.) You may place -additional permissions on material, added by you to a covered work, -for which you have or can give appropriate copyright permission. - - Notwithstanding any other provision of this License, for material you -add to a covered work, you may (if authorized by the copyright holders of -that material) supplement the terms of this License with terms: - - a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or - - b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or - - c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or - - d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or - - e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or - - f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors. - - All other non-permissive additional terms are considered "further -restrictions" within the meaning of section 10. If the Program as you -received it, or any part of it, contains a notice stating that it is -governed by this License along with a term that is a further -restriction, you may remove that term. If a license document contains -a further restriction but permits relicensing or conveying under this -License, you may add to a covered work material governed by the terms -of that license document, provided that the further restriction does -not survive such relicensing or conveying. - - If you add terms to a covered work in accord with this section, you -must place, in the relevant source files, a statement of the -additional terms that apply to those files, or a notice indicating -where to find the applicable terms. - - Additional terms, permissive or non-permissive, may be stated in the -form of a separately written license, or stated as exceptions; -the above requirements apply either way. - - 8. Termination. - - You may not propagate or modify a covered work except as expressly -provided under this License. Any attempt otherwise to propagate or -modify it is void, and will automatically terminate your rights under -this License (including any patent licenses granted under the third -paragraph of section 11). - - However, if you cease all violation of this License, then your -license from a particular copyright holder is reinstated (a) -provisionally, unless and until the copyright holder explicitly and -finally terminates your license, and (b) permanently, if the copyright -holder fails to notify you of the violation by some reasonable means -prior to 60 days after the cessation. - - Moreover, your license from a particular copyright holder is -reinstated permanently if the copyright holder notifies you of the -violation by some reasonable means, this is the first time you have -received notice of violation of this License (for any work) from that -copyright holder, and you cure the violation prior to 30 days after -your receipt of the notice. - - Termination of your rights under this section does not terminate the -licenses of parties who have received copies or rights from you under -this License. If your rights have been terminated and not permanently -reinstated, you do not qualify to receive new licenses for the same -material under section 10. - - 9. Acceptance Not Required for Having Copies. - - You are not required to accept this License in order to receive or -run a copy of the Program. Ancillary propagation of a covered work -occurring solely as a consequence of using peer-to-peer transmission -to receive a copy likewise does not require acceptance. However, -nothing other than this License grants you permission to propagate or -modify any covered work. These actions infringe copyright if you do -not accept this License. Therefore, by modifying or propagating a -covered work, you indicate your acceptance of this License to do so. - - 10. Automatic Licensing of Downstream Recipients. - - Each time you convey a covered work, the recipient automatically -receives a license from the original licensors, to run, modify and -propagate that work, subject to this License. You are not responsible -for enforcing compliance by third parties with this License. - - An "entity transaction" is a transaction transferring control of an -organization, or substantially all assets of one, or subdividing an -organization, or merging organizations. If propagation of a covered -work results from an entity transaction, each party to that -transaction who receives a copy of the work also receives whatever -licenses to the work the party's predecessor in interest had or could -give under the previous paragraph, plus a right to possession of the -Corresponding Source of the work from the predecessor in interest, if -the predecessor has it or can get it with reasonable efforts. - - You may not impose any further restrictions on the exercise of the -rights granted or affirmed under this License. For example, you may -not impose a license fee, royalty, or other charge for exercise of -rights granted under this License, and you may not initiate litigation -(including a cross-claim or counterclaim in a lawsuit) alleging that -any patent claim is infringed by making, using, selling, offering for -sale, or importing the Program or any portion of it. - - 11. Patents. - - A "contributor" is a copyright holder who authorizes use under this -License of the Program or a work on which the Program is based. The -work thus licensed is called the contributor's "contributor version". - - A contributor's "essential patent claims" are all patent claims -owned or controlled by the contributor, whether already acquired or -hereafter acquired, that would be infringed by some manner, permitted -by this License, of making, using, or selling its contributor version, -but do not include claims that would be infringed only as a -consequence of further modification of the contributor version. For -purposes of this definition, "control" includes the right to grant -patent sublicenses in a manner consistent with the requirements of -this License. - - Each contributor grants you a non-exclusive, worldwide, royalty-free -patent license under the contributor's essential patent claims, to -make, use, sell, offer for sale, import and otherwise run, modify and -propagate the contents of its contributor version. - - In the following three paragraphs, a "patent license" is any express -agreement or commitment, however denominated, not to enforce a patent -(such as an express permission to practice a patent or covenant not to -sue for patent infringement). To "grant" such a patent license to a -party means to make such an agreement or commitment not to enforce a -patent against the party. - - If you convey a covered work, knowingly relying on a patent license, -and the Corresponding Source of the work is not available for anyone -to copy, free of charge and under the terms of this License, through a -publicly available network server or other readily accessible means, -then you must either (1) cause the Corresponding Source to be so -available, or (2) arrange to deprive yourself of the benefit of the -patent license for this particular work, or (3) arrange, in a manner -consistent with the requirements of this License, to extend the patent -license to downstream recipients. "Knowingly relying" means you have -actual knowledge that, but for the patent license, your conveying the -covered work in a country, or your recipient's use of the covered work -in a country, would infringe one or more identifiable patents in that -country that you have reason to believe are valid. - - If, pursuant to or in connection with a single transaction or -arrangement, you convey, or propagate by procuring conveyance of, a -covered work, and grant a patent license to some of the parties -receiving the covered work authorizing them to use, propagate, modify -or convey a specific copy of the covered work, then the patent license -you grant is automatically extended to all recipients of the covered -work and works based on it. - - A patent license is "discriminatory" if it does not include within -the scope of its coverage, prohibits the exercise of, or is -conditioned on the non-exercise of one or more of the rights that are -specifically granted under this License. You may not convey a covered -work if you are a party to an arrangement with a third party that is -in the business of distributing software, under which you make payment -to the third party based on the extent of your activity of conveying -the work, and under which the third party grants, to any of the -parties who would receive the covered work from you, a discriminatory -patent license (a) in connection with copies of the covered work -conveyed by you (or copies made from those copies), or (b) primarily -for and in connection with specific products or compilations that -contain the covered work, unless you entered into that arrangement, -or that patent license was granted, prior to 28 March 2007. - - Nothing in this License shall be construed as excluding or limiting -any implied license or other defenses to infringement that may -otherwise be available to you under applicable patent law. - - 12. No Surrender of Others' Freedom. - - If conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot convey a -covered work so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you may -not convey it at all. For example, if you agree to terms that obligate you -to collect a royalty for further conveying from those to whom you convey -the Program, the only way you could satisfy both those terms and this -License would be to refrain entirely from conveying the Program. - - 13. Use with the GNU Affero General Public License. - - Notwithstanding any other provision of this License, you have -permission to link or combine any covered work with a work licensed -under version 3 of the GNU Affero General Public License into a single -combined work, and to convey the resulting work. The terms of this -License will continue to apply to the part which is the covered work, -but the special requirements of the GNU Affero General Public License, -section 13, concerning interaction through a network will apply to the -combination as such. - - 14. Revised Versions of this License. - - The Free Software Foundation may publish revised and/or new versions of -the GNU General Public License from time to time. Such new versions will -be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. - - Each version is given a distinguishing version number. If the -Program specifies that a certain numbered version of the GNU General -Public License "or any later version" applies to it, you have the -option of following the terms and conditions either of that numbered -version or of any later version published by the Free Software -Foundation. If the Program does not specify a version number of the -GNU General Public License, you may choose any version ever published -by the Free Software Foundation. - - If the Program specifies that a proxy can decide which future -versions of the GNU General Public License can be used, that proxy's -public statement of acceptance of a version permanently authorizes you -to choose that version for the Program. - - Later license versions may give you additional or different -permissions. However, no additional obligations are imposed on any -author or copyright holder as a result of your choosing to follow a -later version. - - 15. Disclaimer of Warranty. - - THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY -APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT -HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY -OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, -THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR -PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM -IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF -ALL NECESSARY SERVICING, REPAIR OR CORRECTION. - - 16. Limitation of Liability. - - IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS -THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY -GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE -USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF -DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD -PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), -EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF -SUCH DAMAGES. - - 17. Interpretation of Sections 15 and 16. - - If the disclaimer of warranty and limitation of liability provided -above cannot be given local legal effect according to their terms, -reviewing courts shall apply local law that most closely approximates -an absolute waiver of all civil liability in connection with the -Program, unless a warranty or assumption of liability accompanies a -copy of the Program in return for a fee. - - END OF TERMS AND CONDITIONS - - How to Apply These Terms to Your New Programs - - If you develop a new program, and you want it to be of the greatest -possible use to the public, the best way to achieve this is to make it -free software which everyone can redistribute and change under these terms. - - To do so, attach the following notices to the program. It is safest -to attach them to the start of each source file to most effectively -state the exclusion of warranty; and each file should have at least -the "copyright" line and a pointer to where the full notice is found. - - - Copyright (C) - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -Also add information on how to contact you by electronic and paper mail. - - If the program does terminal interaction, make it output a short -notice like this when it starts in an interactive mode: - - Copyright (C) - This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. - This is free software, and you are welcome to redistribute it - under certain conditions; type `show c' for details. - -The hypothetical commands `show w' and `show c' should show the appropriate -parts of the General Public License. Of course, your program's commands -might be different; for a GUI interface, you would use an "about box". - - You should also get your employer (if you work as a programmer) or school, -if any, to sign a "copyright disclaimer" for the program, if necessary. -For more information on this, and how to apply and follow the GNU GPL, see -. - - The GNU General Public License does not permit incorporating your program -into proprietary programs. If your program is a subroutine library, you -may consider it more useful to permit linking proprietary applications with -the library. If this is what you want to do, use the GNU Lesser General -Public License instead of this License. But first, please read -. diff --git a/Podfile b/Podfile deleted file mode 100644 index 4574078..0000000 --- a/Podfile +++ /dev/null @@ -1,15 +0,0 @@ -# Uncomment this line to define a global platform for your project -# platform :ios, '6.0' - -target 'ShadowVPN' do - -end - -target 'tunnel' do - -platform:ios, '9.0' - -pod 'libsodium' - -end - diff --git a/Podfile.lock b/Podfile.lock deleted file mode 100644 index c2f277f..0000000 --- a/Podfile.lock +++ /dev/null @@ -1,10 +0,0 @@ -PODS: - - libsodium (1.0.3) - -DEPENDENCIES: - - libsodium - -SPEC CHECKSUMS: - libsodium: be547e31dc75725629acc5717dc0a40fc05ef243 - -COCOAPODS: 0.37.1 diff --git a/Pods/Headers/Private/crypto_auth/hmacsha256/cp/api.h b/Pods/Headers/Private/crypto_auth/hmacsha256/cp/api.h deleted file mode 120000 index 191d616..0000000 --- a/Pods/Headers/Private/crypto_auth/hmacsha256/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_auth/hmacsha256/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_auth/hmacsha512/cp/api.h b/Pods/Headers/Private/crypto_auth/hmacsha512/cp/api.h deleted file mode 120000 index 5098466..0000000 --- a/Pods/Headers/Private/crypto_auth/hmacsha512/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_auth/hmacsha512/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_auth/hmacsha512256/cp/api.h b/Pods/Headers/Private/crypto_auth/hmacsha512256/cp/api.h deleted file mode 120000 index 5582c32..0000000 --- a/Pods/Headers/Private/crypto_auth/hmacsha512256/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_box/curve25519xsalsa20poly1305/ref/api.h b/Pods/Headers/Private/crypto_box/curve25519xsalsa20poly1305/ref/api.h deleted file mode 120000 index ee980dc..0000000 --- a/Pods/Headers/Private/crypto_box/curve25519xsalsa20poly1305/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_core/hsalsa20/ref2/api.h b/Pods/Headers/Private/crypto_core/hsalsa20/ref2/api.h deleted file mode 120000 index f1a3e1b..0000000 --- a/Pods/Headers/Private/crypto_core/hsalsa20/ref2/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/hsalsa20/ref2/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_core/salsa20/ref/api.h b/Pods/Headers/Private/crypto_core/salsa20/ref/api.h deleted file mode 120000 index 35c145b..0000000 --- a/Pods/Headers/Private/crypto_core/salsa20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/salsa20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_core/salsa2012/ref/api.h b/Pods/Headers/Private/crypto_core/salsa2012/ref/api.h deleted file mode 120000 index 1373ef4..0000000 --- a/Pods/Headers/Private/crypto_core/salsa2012/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/salsa2012/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_core/salsa208/ref/api.h b/Pods/Headers/Private/crypto_core/salsa208/ref/api.h deleted file mode 120000 index 98d599f..0000000 --- a/Pods/Headers/Private/crypto_core/salsa208/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/salsa208/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_generichash/blake2/ref/api.h b/Pods/Headers/Private/crypto_generichash/blake2/ref/api.h deleted file mode 120000 index edc6ad5..0000000 --- a/Pods/Headers/Private/crypto_generichash/blake2/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_generichash/blake2/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_generichash/blake2/ref/blake2-impl.h b/Pods/Headers/Private/crypto_generichash/blake2/ref/blake2-impl.h deleted file mode 120000 index 7498fab..0000000 --- a/Pods/Headers/Private/crypto_generichash/blake2/ref/blake2-impl.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2-impl.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_generichash/blake2/ref/blake2.h b/Pods/Headers/Private/crypto_generichash/blake2/ref/blake2.h deleted file mode 120000 index 1c40294..0000000 --- a/Pods/Headers/Private/crypto_generichash/blake2/ref/blake2.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_hash/sha256/cp/api.h b/Pods/Headers/Private/crypto_hash/sha256/cp/api.h deleted file mode 120000 index 2671958..0000000 --- a/Pods/Headers/Private/crypto_hash/sha256/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_hash/sha256/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_hash/sha512/cp/api.h b/Pods/Headers/Private/crypto_hash/sha512/cp/api.h deleted file mode 120000 index 6060596..0000000 --- a/Pods/Headers/Private/crypto_hash/sha512/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_hash/sha512/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna.h b/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna.h deleted file mode 120000 index 279f92a..0000000 --- a/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h b/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h deleted file mode 120000 index 385f3cb..0000000 --- a/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h b/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h deleted file mode 120000 index 8bd1a45..0000000 --- a/Pods/Headers/Private/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h b/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h deleted file mode 120000 index e8afff6..0000000 --- a/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h b/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h deleted file mode 120000 index ffe8e0c..0000000 --- a/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/sysendian.h b/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/sysendian.h deleted file mode 120000 index de3944b..0000000 --- a/Pods/Headers/Private/crypto_pwhash/scryptsalsa208sha256/sysendian.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sysendian.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_scalarmult/curve25519/donna_c64/api.h b/Pods/Headers/Private/crypto_scalarmult/curve25519/donna_c64/api.h deleted file mode 120000 index 7e7967b..0000000 --- a/Pods/Headers/Private/crypto_scalarmult/curve25519/donna_c64/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/api.h b/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/api.h deleted file mode 120000 index 2c39197..0000000 --- a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/fe.h b/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/fe.h deleted file mode 120000 index a148d1c..0000000 --- a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/fe.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/montgomery.h b/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/montgomery.h deleted file mode 120000 index 901eef5..0000000 --- a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/montgomery.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/montgomery.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/pow225521.h b/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/pow225521.h deleted file mode 120000 index af6a6b3..0000000 --- a/Pods/Headers/Private/crypto_scalarmult/curve25519/ref10/pow225521.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/pow225521.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_secretbox/xsalsa20poly1305/ref/api.h b/Pods/Headers/Private/crypto_secretbox/xsalsa20poly1305/ref/api.h deleted file mode 120000 index e12fd16..0000000 --- a/Pods/Headers/Private/crypto_secretbox/xsalsa20poly1305/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_shorthash/siphash24/ref/api.h b/Pods/Headers/Private/crypto_shorthash/siphash24/ref/api.h deleted file mode 120000 index ac9c201..0000000 --- a/Pods/Headers/Private/crypto_shorthash/siphash24/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_shorthash/siphash24/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/api.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/api.h deleted file mode 120000 index b23ab36..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/base.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/base.h deleted file mode 120000 index 2c59196..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/base.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/base.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/base2.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/base2.h deleted file mode 120000 index bba3400..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/base2.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/base2.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/d.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/d.h deleted file mode 120000 index 14da446..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/d.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/d.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/d2.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/d2.h deleted file mode 120000 index 464f17d..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/d2.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/d2.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/fe.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/fe.h deleted file mode 120000 index b40ef8c..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/fe.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge.h deleted file mode 120000 index 2f67ea2..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_add.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_add.h deleted file mode 120000 index f200eb1..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_add.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_madd.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_madd.h deleted file mode 120000 index 5636873..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_madd.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_msub.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_msub.h deleted file mode 120000 index bd0fb67..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_msub.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_p2_dbl.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_p2_dbl.h deleted file mode 120000 index 8d5f4e9..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_p2_dbl.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_sub.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_sub.h deleted file mode 120000 index e1719c9..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/ge_sub.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/pow22523.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/pow22523.h deleted file mode 120000 index 8e04eb2..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/pow22523.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow22523.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/pow225521.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/pow225521.h deleted file mode 120000 index de9c566..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/pow225521.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow225521.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/sc.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/sc.h deleted file mode 120000 index 2b1acad..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/sc.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/sc.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/ed25519/ref10/sqrtm1.h b/Pods/Headers/Private/crypto_sign/ed25519/ref10/sqrtm1.h deleted file mode 120000 index e3fa877..0000000 --- a/Pods/Headers/Private/crypto_sign/ed25519/ref10/sqrtm1.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/sqrtm1.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/api.h b/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/api.h deleted file mode 120000 index eb11944..0000000 --- a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/fe25519.h b/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/fe25519.h deleted file mode 120000 index 5dd7e4d..0000000 --- a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/fe25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/ge25519.h b/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/ge25519.h deleted file mode 120000 index d86dd86..0000000 --- a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/ge25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/sc25519.h b/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/sc25519.h deleted file mode 120000 index b43cb03..0000000 --- a/Pods/Headers/Private/crypto_sign/edwards25519sha512batch/ref/sc25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/api.h b/Pods/Headers/Private/crypto_stream/aes128ctr/portable/api.h deleted file mode 120000 index 42e3b01..0000000 --- a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/common.h b/Pods/Headers/Private/crypto_stream/aes128ctr/portable/common.h deleted file mode 120000 index 418d9e7..0000000 --- a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/common.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/consts.h b/Pods/Headers/Private/crypto_stream/aes128ctr/portable/consts.h deleted file mode 120000 index 9539c98..0000000 --- a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/consts.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/int128.h b/Pods/Headers/Private/crypto_stream/aes128ctr/portable/int128.h deleted file mode 120000 index 4d64a5b..0000000 --- a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/int128.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/types.h b/Pods/Headers/Private/crypto_stream/aes128ctr/portable/types.h deleted file mode 120000 index 0fa3dd1..0000000 --- a/Pods/Headers/Private/crypto_stream/aes128ctr/portable/types.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/types.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/chacha20/ref/api.h b/Pods/Headers/Private/crypto_stream/chacha20/ref/api.h deleted file mode 120000 index ba242bd..0000000 --- a/Pods/Headers/Private/crypto_stream/chacha20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/chacha20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/salsa20/amd64_xmm6/api.h b/Pods/Headers/Private/crypto_stream/salsa20/amd64_xmm6/api.h deleted file mode 120000 index 796b7b3..0000000 --- a/Pods/Headers/Private/crypto_stream/salsa20/amd64_xmm6/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa20/amd64_xmm6/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/salsa20/ref/api.h b/Pods/Headers/Private/crypto_stream/salsa20/ref/api.h deleted file mode 120000 index 77213d7..0000000 --- a/Pods/Headers/Private/crypto_stream/salsa20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/salsa2012/ref/api.h b/Pods/Headers/Private/crypto_stream/salsa2012/ref/api.h deleted file mode 120000 index 99f4584..0000000 --- a/Pods/Headers/Private/crypto_stream/salsa2012/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa2012/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/salsa208/ref/api.h b/Pods/Headers/Private/crypto_stream/salsa208/ref/api.h deleted file mode 120000 index ab20d0b..0000000 --- a/Pods/Headers/Private/crypto_stream/salsa208/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa208/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_stream/xsalsa20/ref/api.h b/Pods/Headers/Private/crypto_stream/xsalsa20/ref/api.h deleted file mode 120000 index b0949d3..0000000 --- a/Pods/Headers/Private/crypto_stream/xsalsa20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/xsalsa20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_verify/16/ref/api.h b/Pods/Headers/Private/crypto_verify/16/ref/api.h deleted file mode 120000 index 9412a5d..0000000 --- a/Pods/Headers/Private/crypto_verify/16/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_verify/16/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_verify/32/ref/api.h b/Pods/Headers/Private/crypto_verify/32/ref/api.h deleted file mode 120000 index dcb446c..0000000 --- a/Pods/Headers/Private/crypto_verify/32/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_verify/32/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/crypto_verify/64/ref/api.h b/Pods/Headers/Private/crypto_verify/64/ref/api.h deleted file mode 120000 index 6c1ea56..0000000 --- a/Pods/Headers/Private/crypto_verify/64/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_verify/64/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium.h b/Pods/Headers/Private/libsodium/sodium.h deleted file mode 120000 index 979d0f4..0000000 --- a/Pods/Headers/Private/libsodium/sodium.h +++ /dev/null @@ -1 +0,0 @@ -../../../libsodium/src/libsodium/include/sodium.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/core.h b/Pods/Headers/Private/libsodium/sodium/core.h deleted file mode 120000 index b5f3382..0000000 --- a/Pods/Headers/Private/libsodium/sodium/core.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/core.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_aead_chacha20poly1305.h b/Pods/Headers/Private/libsodium/sodium/crypto_aead_chacha20poly1305.h deleted file mode 120000 index 420043f..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_aead_chacha20poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_aead_chacha20poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_auth.h b/Pods/Headers/Private/libsodium/sodium/crypto_auth.h deleted file mode 120000 index 0f352f4..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_auth.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha256.h b/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha256.h deleted file mode 120000 index 10b428f..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha256.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha512.h b/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha512.h deleted file mode 120000 index 995d7bb..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha512.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha512256.h b/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha512256.h deleted file mode 120000 index cecab5c..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_auth_hmacsha512256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512256.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_box.h b/Pods/Headers/Private/libsodium/sodium/crypto_box.h deleted file mode 120000 index 210421c..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_box.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_box.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_box_curve25519xsalsa20poly1305.h b/Pods/Headers/Private/libsodium/sodium/crypto_box_curve25519xsalsa20poly1305.h deleted file mode 120000 index 7007b85..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_box_curve25519xsalsa20poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_box_curve25519xsalsa20poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_core_hsalsa20.h b/Pods/Headers/Private/libsodium/sodium/crypto_core_hsalsa20.h deleted file mode 120000 index c94ebfd..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_core_hsalsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_hsalsa20.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa20.h b/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa20.h deleted file mode 120000 index 8835e90..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_salsa20.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa2012.h b/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa2012.h deleted file mode 120000 index 0fa2ae3..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa2012.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_salsa2012.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa208.h b/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa208.h deleted file mode 120000 index f0a3e82..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_core_salsa208.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_salsa208.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_generichash.h b/Pods/Headers/Private/libsodium/sodium/crypto_generichash.h deleted file mode 120000 index d00caf5..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_generichash.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_generichash.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_generichash_blake2b.h b/Pods/Headers/Private/libsodium/sodium/crypto_generichash_blake2b.h deleted file mode 120000 index d936e1c..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_generichash_blake2b.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_generichash_blake2b.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_hash.h b/Pods/Headers/Private/libsodium/sodium/crypto_hash.h deleted file mode 120000 index 19730fe..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_hash.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_hash.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_hash_sha256.h b/Pods/Headers/Private/libsodium/sodium/crypto_hash_sha256.h deleted file mode 120000 index 8886e2a..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_hash_sha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_hash_sha256.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_hash_sha512.h b/Pods/Headers/Private/libsodium/sodium/crypto_hash_sha512.h deleted file mode 120000 index b9d8fa1..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_hash_sha512.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_hash_sha512.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_int32.h b/Pods/Headers/Private/libsodium/sodium/crypto_int32.h deleted file mode 120000 index 60eee49..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_int32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_int32.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_int64.h b/Pods/Headers/Private/libsodium/sodium/crypto_int64.h deleted file mode 120000 index ed13f4e..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_int64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_int64.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_onetimeauth.h b/Pods/Headers/Private/libsodium/sodium/crypto_onetimeauth.h deleted file mode 120000 index 89c4f28..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_onetimeauth.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_onetimeauth.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_onetimeauth_poly1305.h b/Pods/Headers/Private/libsodium/sodium/crypto_onetimeauth_poly1305.h deleted file mode 120000 index 2f8df0f..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_onetimeauth_poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_onetimeauth_poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_pwhash_scryptsalsa208sha256.h b/Pods/Headers/Private/libsodium/sodium/crypto_pwhash_scryptsalsa208sha256.h deleted file mode 120000 index 395ca0b..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_pwhash_scryptsalsa208sha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_pwhash_scryptsalsa208sha256.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_scalarmult.h b/Pods/Headers/Private/libsodium/sodium/crypto_scalarmult.h deleted file mode 120000 index 69d5117..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_scalarmult.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_scalarmult.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_scalarmult_curve25519.h b/Pods/Headers/Private/libsodium/sodium/crypto_scalarmult_curve25519.h deleted file mode 120000 index 4b1adca..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_scalarmult_curve25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_scalarmult_curve25519.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_secretbox.h b/Pods/Headers/Private/libsodium/sodium/crypto_secretbox.h deleted file mode 120000 index 5cf2c75..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_secretbox.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_secretbox.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_secretbox_xsalsa20poly1305.h b/Pods/Headers/Private/libsodium/sodium/crypto_secretbox_xsalsa20poly1305.h deleted file mode 120000 index a79a049..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_secretbox_xsalsa20poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_secretbox_xsalsa20poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_shorthash.h b/Pods/Headers/Private/libsodium/sodium/crypto_shorthash.h deleted file mode 120000 index 7935fbb..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_shorthash.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_shorthash.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_shorthash_siphash24.h b/Pods/Headers/Private/libsodium/sodium/crypto_shorthash_siphash24.h deleted file mode 120000 index 7554bb4..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_shorthash_siphash24.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_shorthash_siphash24.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_sign.h b/Pods/Headers/Private/libsodium/sodium/crypto_sign.h deleted file mode 120000 index 10fb3cf..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_sign.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_sign.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_sign_ed25519.h b/Pods/Headers/Private/libsodium/sodium/crypto_sign_ed25519.h deleted file mode 120000 index 4e9930d..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_sign_ed25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_sign_ed25519.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_sign_edwards25519sha512batch.h b/Pods/Headers/Private/libsodium/sodium/crypto_sign_edwards25519sha512batch.h deleted file mode 120000 index f4cd355..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_sign_edwards25519sha512batch.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_sign_edwards25519sha512batch.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream.h deleted file mode 120000 index d207478..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream_aes128ctr.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream_aes128ctr.h deleted file mode 120000 index 920bd2a..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream_aes128ctr.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_aes128ctr.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream_chacha20.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream_chacha20.h deleted file mode 120000 index cdd7301..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream_chacha20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_chacha20.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa20.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa20.h deleted file mode 120000 index 471a485..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_salsa20.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa2012.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa2012.h deleted file mode 120000 index b35935e..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa2012.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_salsa2012.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa208.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa208.h deleted file mode 120000 index c76bb0d..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream_salsa208.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_salsa208.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_stream_xsalsa20.h b/Pods/Headers/Private/libsodium/sodium/crypto_stream_xsalsa20.h deleted file mode 120000 index 6c56ba3..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_stream_xsalsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_xsalsa20.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_uint16.h b/Pods/Headers/Private/libsodium/sodium/crypto_uint16.h deleted file mode 120000 index cdc35ec..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_uint16.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint16.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_uint32.h b/Pods/Headers/Private/libsodium/sodium/crypto_uint32.h deleted file mode 120000 index 6f0619d..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_uint32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint32.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_uint64.h b/Pods/Headers/Private/libsodium/sodium/crypto_uint64.h deleted file mode 120000 index 9ad776c..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_uint64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint64.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_uint8.h b/Pods/Headers/Private/libsodium/sodium/crypto_uint8.h deleted file mode 120000 index 923c275..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_uint8.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint8.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_verify_16.h b/Pods/Headers/Private/libsodium/sodium/crypto_verify_16.h deleted file mode 120000 index 3888aa8..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_verify_16.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_verify_16.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_verify_32.h b/Pods/Headers/Private/libsodium/sodium/crypto_verify_32.h deleted file mode 120000 index b38c3f3..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_verify_32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_verify_32.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/crypto_verify_64.h b/Pods/Headers/Private/libsodium/sodium/crypto_verify_64.h deleted file mode 120000 index 3a10e3f..0000000 --- a/Pods/Headers/Private/libsodium/sodium/crypto_verify_64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_verify_64.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/export.h b/Pods/Headers/Private/libsodium/sodium/export.h deleted file mode 120000 index 7786c94..0000000 --- a/Pods/Headers/Private/libsodium/sodium/export.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/export.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/randombytes.h b/Pods/Headers/Private/libsodium/sodium/randombytes.h deleted file mode 120000 index 42c7dd9..0000000 --- a/Pods/Headers/Private/libsodium/sodium/randombytes.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/randombytes.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/randombytes_salsa20_random.h b/Pods/Headers/Private/libsodium/sodium/randombytes_salsa20_random.h deleted file mode 120000 index 10a311a..0000000 --- a/Pods/Headers/Private/libsodium/sodium/randombytes_salsa20_random.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/randombytes_salsa20_random.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/randombytes_sysrandom.h b/Pods/Headers/Private/libsodium/sodium/randombytes_sysrandom.h deleted file mode 120000 index a7cffa6..0000000 --- a/Pods/Headers/Private/libsodium/sodium/randombytes_sysrandom.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/randombytes_sysrandom.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/runtime.h b/Pods/Headers/Private/libsodium/sodium/runtime.h deleted file mode 120000 index 2fc66d5..0000000 --- a/Pods/Headers/Private/libsodium/sodium/runtime.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/runtime.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/utils.h b/Pods/Headers/Private/libsodium/sodium/utils.h deleted file mode 120000 index 1f34ca5..0000000 --- a/Pods/Headers/Private/libsodium/sodium/utils.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/utils.h \ No newline at end of file diff --git a/Pods/Headers/Private/libsodium/sodium/version.h b/Pods/Headers/Private/libsodium/sodium/version.h deleted file mode 120000 index 11ab70a..0000000 --- a/Pods/Headers/Private/libsodium/sodium/version.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/version.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_auth/hmacsha256/cp/api.h b/Pods/Headers/Public/crypto_auth/hmacsha256/cp/api.h deleted file mode 120000 index 191d616..0000000 --- a/Pods/Headers/Public/crypto_auth/hmacsha256/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_auth/hmacsha256/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_auth/hmacsha512/cp/api.h b/Pods/Headers/Public/crypto_auth/hmacsha512/cp/api.h deleted file mode 120000 index 5098466..0000000 --- a/Pods/Headers/Public/crypto_auth/hmacsha512/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_auth/hmacsha512/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_auth/hmacsha512256/cp/api.h b/Pods/Headers/Public/crypto_auth/hmacsha512256/cp/api.h deleted file mode 120000 index 5582c32..0000000 --- a/Pods/Headers/Public/crypto_auth/hmacsha512256/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref/api.h b/Pods/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref/api.h deleted file mode 120000 index ee980dc..0000000 --- a/Pods/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_core/hsalsa20/ref2/api.h b/Pods/Headers/Public/crypto_core/hsalsa20/ref2/api.h deleted file mode 120000 index f1a3e1b..0000000 --- a/Pods/Headers/Public/crypto_core/hsalsa20/ref2/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/hsalsa20/ref2/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_core/salsa20/ref/api.h b/Pods/Headers/Public/crypto_core/salsa20/ref/api.h deleted file mode 120000 index 35c145b..0000000 --- a/Pods/Headers/Public/crypto_core/salsa20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/salsa20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_core/salsa2012/ref/api.h b/Pods/Headers/Public/crypto_core/salsa2012/ref/api.h deleted file mode 120000 index 1373ef4..0000000 --- a/Pods/Headers/Public/crypto_core/salsa2012/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/salsa2012/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_core/salsa208/ref/api.h b/Pods/Headers/Public/crypto_core/salsa208/ref/api.h deleted file mode 120000 index 98d599f..0000000 --- a/Pods/Headers/Public/crypto_core/salsa208/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_core/salsa208/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_generichash/blake2/ref/api.h b/Pods/Headers/Public/crypto_generichash/blake2/ref/api.h deleted file mode 120000 index edc6ad5..0000000 --- a/Pods/Headers/Public/crypto_generichash/blake2/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_generichash/blake2/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_generichash/blake2/ref/blake2-impl.h b/Pods/Headers/Public/crypto_generichash/blake2/ref/blake2-impl.h deleted file mode 120000 index 7498fab..0000000 --- a/Pods/Headers/Public/crypto_generichash/blake2/ref/blake2-impl.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2-impl.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_generichash/blake2/ref/blake2.h b/Pods/Headers/Public/crypto_generichash/blake2/ref/blake2.h deleted file mode 120000 index 1c40294..0000000 --- a/Pods/Headers/Public/crypto_generichash/blake2/ref/blake2.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_hash/sha256/cp/api.h b/Pods/Headers/Public/crypto_hash/sha256/cp/api.h deleted file mode 120000 index 2671958..0000000 --- a/Pods/Headers/Public/crypto_hash/sha256/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_hash/sha256/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_hash/sha512/cp/api.h b/Pods/Headers/Public/crypto_hash/sha512/cp/api.h deleted file mode 120000 index 6060596..0000000 --- a/Pods/Headers/Public/crypto_hash/sha512/cp/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_hash/sha512/cp/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna.h b/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna.h deleted file mode 120000 index 279f92a..0000000 --- a/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h b/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h deleted file mode 120000 index 385f3cb..0000000 --- a/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h b/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h deleted file mode 120000 index 8bd1a45..0000000 --- a/Pods/Headers/Public/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h b/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h deleted file mode 120000 index e8afff6..0000000 --- a/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h b/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h deleted file mode 120000 index ffe8e0c..0000000 --- a/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/sysendian.h b/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/sysendian.h deleted file mode 120000 index de3944b..0000000 --- a/Pods/Headers/Public/crypto_pwhash/scryptsalsa208sha256/sysendian.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sysendian.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_scalarmult/curve25519/donna_c64/api.h b/Pods/Headers/Public/crypto_scalarmult/curve25519/donna_c64/api.h deleted file mode 120000 index 7e7967b..0000000 --- a/Pods/Headers/Public/crypto_scalarmult/curve25519/donna_c64/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/api.h b/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/api.h deleted file mode 120000 index 2c39197..0000000 --- a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/fe.h b/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/fe.h deleted file mode 120000 index a148d1c..0000000 --- a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/fe.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/montgomery.h b/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/montgomery.h deleted file mode 120000 index 901eef5..0000000 --- a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/montgomery.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/montgomery.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/pow225521.h b/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/pow225521.h deleted file mode 120000 index af6a6b3..0000000 --- a/Pods/Headers/Public/crypto_scalarmult/curve25519/ref10/pow225521.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/pow225521.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref/api.h b/Pods/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref/api.h deleted file mode 120000 index e12fd16..0000000 --- a/Pods/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_shorthash/siphash24/ref/api.h b/Pods/Headers/Public/crypto_shorthash/siphash24/ref/api.h deleted file mode 120000 index ac9c201..0000000 --- a/Pods/Headers/Public/crypto_shorthash/siphash24/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_shorthash/siphash24/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/api.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/api.h deleted file mode 120000 index b23ab36..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/base.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/base.h deleted file mode 120000 index 2c59196..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/base.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/base.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/base2.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/base2.h deleted file mode 120000 index bba3400..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/base2.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/base2.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/d.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/d.h deleted file mode 120000 index 14da446..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/d.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/d.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/d2.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/d2.h deleted file mode 120000 index 464f17d..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/d2.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/d2.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/fe.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/fe.h deleted file mode 120000 index b40ef8c..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/fe.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge.h deleted file mode 120000 index 2f67ea2..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_add.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_add.h deleted file mode 120000 index f200eb1..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_add.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_madd.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_madd.h deleted file mode 120000 index 5636873..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_madd.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_msub.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_msub.h deleted file mode 120000 index bd0fb67..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_msub.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_p2_dbl.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_p2_dbl.h deleted file mode 120000 index 8d5f4e9..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_p2_dbl.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_sub.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_sub.h deleted file mode 120000 index e1719c9..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/ge_sub.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/pow22523.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/pow22523.h deleted file mode 120000 index 8e04eb2..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/pow22523.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow22523.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/pow225521.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/pow225521.h deleted file mode 120000 index de9c566..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/pow225521.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow225521.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/sc.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/sc.h deleted file mode 120000 index 2b1acad..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/sc.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/sc.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/ed25519/ref10/sqrtm1.h b/Pods/Headers/Public/crypto_sign/ed25519/ref10/sqrtm1.h deleted file mode 120000 index e3fa877..0000000 --- a/Pods/Headers/Public/crypto_sign/ed25519/ref10/sqrtm1.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/ed25519/ref10/sqrtm1.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/api.h b/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/api.h deleted file mode 120000 index eb11944..0000000 --- a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/fe25519.h b/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/fe25519.h deleted file mode 120000 index 5dd7e4d..0000000 --- a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/fe25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/ge25519.h b/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/ge25519.h deleted file mode 120000 index d86dd86..0000000 --- a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/ge25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/sc25519.h b/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/sc25519.h deleted file mode 120000 index b43cb03..0000000 --- a/Pods/Headers/Public/crypto_sign/edwards25519sha512batch/ref/sc25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/api.h b/Pods/Headers/Public/crypto_stream/aes128ctr/portable/api.h deleted file mode 120000 index 42e3b01..0000000 --- a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/common.h b/Pods/Headers/Public/crypto_stream/aes128ctr/portable/common.h deleted file mode 120000 index 418d9e7..0000000 --- a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/common.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/consts.h b/Pods/Headers/Public/crypto_stream/aes128ctr/portable/consts.h deleted file mode 120000 index 9539c98..0000000 --- a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/consts.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/int128.h b/Pods/Headers/Public/crypto_stream/aes128ctr/portable/int128.h deleted file mode 120000 index 4d64a5b..0000000 --- a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/int128.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/types.h b/Pods/Headers/Public/crypto_stream/aes128ctr/portable/types.h deleted file mode 120000 index 0fa3dd1..0000000 --- a/Pods/Headers/Public/crypto_stream/aes128ctr/portable/types.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/aes128ctr/portable/types.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/chacha20/ref/api.h b/Pods/Headers/Public/crypto_stream/chacha20/ref/api.h deleted file mode 120000 index ba242bd..0000000 --- a/Pods/Headers/Public/crypto_stream/chacha20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/chacha20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/salsa20/amd64_xmm6/api.h b/Pods/Headers/Public/crypto_stream/salsa20/amd64_xmm6/api.h deleted file mode 120000 index 796b7b3..0000000 --- a/Pods/Headers/Public/crypto_stream/salsa20/amd64_xmm6/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa20/amd64_xmm6/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/salsa20/ref/api.h b/Pods/Headers/Public/crypto_stream/salsa20/ref/api.h deleted file mode 120000 index 77213d7..0000000 --- a/Pods/Headers/Public/crypto_stream/salsa20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/salsa2012/ref/api.h b/Pods/Headers/Public/crypto_stream/salsa2012/ref/api.h deleted file mode 120000 index 99f4584..0000000 --- a/Pods/Headers/Public/crypto_stream/salsa2012/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa2012/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/salsa208/ref/api.h b/Pods/Headers/Public/crypto_stream/salsa208/ref/api.h deleted file mode 120000 index ab20d0b..0000000 --- a/Pods/Headers/Public/crypto_stream/salsa208/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/salsa208/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_stream/xsalsa20/ref/api.h b/Pods/Headers/Public/crypto_stream/xsalsa20/ref/api.h deleted file mode 120000 index b0949d3..0000000 --- a/Pods/Headers/Public/crypto_stream/xsalsa20/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_stream/xsalsa20/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_verify/16/ref/api.h b/Pods/Headers/Public/crypto_verify/16/ref/api.h deleted file mode 120000 index 9412a5d..0000000 --- a/Pods/Headers/Public/crypto_verify/16/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_verify/16/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_verify/32/ref/api.h b/Pods/Headers/Public/crypto_verify/32/ref/api.h deleted file mode 120000 index dcb446c..0000000 --- a/Pods/Headers/Public/crypto_verify/32/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_verify/32/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/crypto_verify/64/ref/api.h b/Pods/Headers/Public/crypto_verify/64/ref/api.h deleted file mode 120000 index 6c1ea56..0000000 --- a/Pods/Headers/Public/crypto_verify/64/ref/api.h +++ /dev/null @@ -1 +0,0 @@ -../../../../../libsodium/src/libsodium/crypto_verify/64/ref/api.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium.h b/Pods/Headers/Public/libsodium/sodium.h deleted file mode 120000 index 979d0f4..0000000 --- a/Pods/Headers/Public/libsodium/sodium.h +++ /dev/null @@ -1 +0,0 @@ -../../../libsodium/src/libsodium/include/sodium.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/core.h b/Pods/Headers/Public/libsodium/sodium/core.h deleted file mode 120000 index b5f3382..0000000 --- a/Pods/Headers/Public/libsodium/sodium/core.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/core.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_aead_chacha20poly1305.h b/Pods/Headers/Public/libsodium/sodium/crypto_aead_chacha20poly1305.h deleted file mode 120000 index 420043f..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_aead_chacha20poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_aead_chacha20poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_auth.h b/Pods/Headers/Public/libsodium/sodium/crypto_auth.h deleted file mode 120000 index 0f352f4..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_auth.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha256.h b/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha256.h deleted file mode 120000 index 10b428f..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha256.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha512.h b/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha512.h deleted file mode 120000 index 995d7bb..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha512.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha512256.h b/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha512256.h deleted file mode 120000 index cecab5c..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_auth_hmacsha512256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512256.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_box.h b/Pods/Headers/Public/libsodium/sodium/crypto_box.h deleted file mode 120000 index 210421c..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_box.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_box.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_box_curve25519xsalsa20poly1305.h b/Pods/Headers/Public/libsodium/sodium/crypto_box_curve25519xsalsa20poly1305.h deleted file mode 120000 index 7007b85..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_box_curve25519xsalsa20poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_box_curve25519xsalsa20poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_core_hsalsa20.h b/Pods/Headers/Public/libsodium/sodium/crypto_core_hsalsa20.h deleted file mode 120000 index c94ebfd..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_core_hsalsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_hsalsa20.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa20.h b/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa20.h deleted file mode 120000 index 8835e90..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_salsa20.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa2012.h b/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa2012.h deleted file mode 120000 index 0fa2ae3..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa2012.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_salsa2012.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa208.h b/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa208.h deleted file mode 120000 index f0a3e82..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_core_salsa208.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_core_salsa208.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_generichash.h b/Pods/Headers/Public/libsodium/sodium/crypto_generichash.h deleted file mode 120000 index d00caf5..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_generichash.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_generichash.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_generichash_blake2b.h b/Pods/Headers/Public/libsodium/sodium/crypto_generichash_blake2b.h deleted file mode 120000 index d936e1c..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_generichash_blake2b.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_generichash_blake2b.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_hash.h b/Pods/Headers/Public/libsodium/sodium/crypto_hash.h deleted file mode 120000 index 19730fe..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_hash.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_hash.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_hash_sha256.h b/Pods/Headers/Public/libsodium/sodium/crypto_hash_sha256.h deleted file mode 120000 index 8886e2a..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_hash_sha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_hash_sha256.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_hash_sha512.h b/Pods/Headers/Public/libsodium/sodium/crypto_hash_sha512.h deleted file mode 120000 index b9d8fa1..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_hash_sha512.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_hash_sha512.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_int32.h b/Pods/Headers/Public/libsodium/sodium/crypto_int32.h deleted file mode 120000 index 60eee49..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_int32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_int32.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_int64.h b/Pods/Headers/Public/libsodium/sodium/crypto_int64.h deleted file mode 120000 index ed13f4e..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_int64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_int64.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_onetimeauth.h b/Pods/Headers/Public/libsodium/sodium/crypto_onetimeauth.h deleted file mode 120000 index 89c4f28..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_onetimeauth.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_onetimeauth.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_onetimeauth_poly1305.h b/Pods/Headers/Public/libsodium/sodium/crypto_onetimeauth_poly1305.h deleted file mode 120000 index 2f8df0f..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_onetimeauth_poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_onetimeauth_poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_pwhash_scryptsalsa208sha256.h b/Pods/Headers/Public/libsodium/sodium/crypto_pwhash_scryptsalsa208sha256.h deleted file mode 120000 index 395ca0b..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_pwhash_scryptsalsa208sha256.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_pwhash_scryptsalsa208sha256.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_scalarmult.h b/Pods/Headers/Public/libsodium/sodium/crypto_scalarmult.h deleted file mode 120000 index 69d5117..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_scalarmult.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_scalarmult.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_scalarmult_curve25519.h b/Pods/Headers/Public/libsodium/sodium/crypto_scalarmult_curve25519.h deleted file mode 120000 index 4b1adca..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_scalarmult_curve25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_scalarmult_curve25519.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_secretbox.h b/Pods/Headers/Public/libsodium/sodium/crypto_secretbox.h deleted file mode 120000 index 5cf2c75..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_secretbox.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_secretbox.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_secretbox_xsalsa20poly1305.h b/Pods/Headers/Public/libsodium/sodium/crypto_secretbox_xsalsa20poly1305.h deleted file mode 120000 index a79a049..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_secretbox_xsalsa20poly1305.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_secretbox_xsalsa20poly1305.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_shorthash.h b/Pods/Headers/Public/libsodium/sodium/crypto_shorthash.h deleted file mode 120000 index 7935fbb..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_shorthash.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_shorthash.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_shorthash_siphash24.h b/Pods/Headers/Public/libsodium/sodium/crypto_shorthash_siphash24.h deleted file mode 120000 index 7554bb4..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_shorthash_siphash24.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_shorthash_siphash24.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_sign.h b/Pods/Headers/Public/libsodium/sodium/crypto_sign.h deleted file mode 120000 index 10fb3cf..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_sign.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_sign.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_sign_ed25519.h b/Pods/Headers/Public/libsodium/sodium/crypto_sign_ed25519.h deleted file mode 120000 index 4e9930d..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_sign_ed25519.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_sign_ed25519.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_sign_edwards25519sha512batch.h b/Pods/Headers/Public/libsodium/sodium/crypto_sign_edwards25519sha512batch.h deleted file mode 120000 index f4cd355..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_sign_edwards25519sha512batch.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_sign_edwards25519sha512batch.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream.h deleted file mode 120000 index d207478..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream_aes128ctr.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream_aes128ctr.h deleted file mode 120000 index 920bd2a..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream_aes128ctr.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_aes128ctr.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream_chacha20.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream_chacha20.h deleted file mode 120000 index cdd7301..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream_chacha20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_chacha20.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa20.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa20.h deleted file mode 120000 index 471a485..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_salsa20.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa2012.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa2012.h deleted file mode 120000 index b35935e..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa2012.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_salsa2012.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa208.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa208.h deleted file mode 120000 index c76bb0d..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream_salsa208.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_salsa208.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_stream_xsalsa20.h b/Pods/Headers/Public/libsodium/sodium/crypto_stream_xsalsa20.h deleted file mode 120000 index 6c56ba3..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_stream_xsalsa20.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_stream_xsalsa20.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_uint16.h b/Pods/Headers/Public/libsodium/sodium/crypto_uint16.h deleted file mode 120000 index cdc35ec..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_uint16.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint16.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_uint32.h b/Pods/Headers/Public/libsodium/sodium/crypto_uint32.h deleted file mode 120000 index 6f0619d..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_uint32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint32.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_uint64.h b/Pods/Headers/Public/libsodium/sodium/crypto_uint64.h deleted file mode 120000 index 9ad776c..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_uint64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint64.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_uint8.h b/Pods/Headers/Public/libsodium/sodium/crypto_uint8.h deleted file mode 120000 index 923c275..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_uint8.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_uint8.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_verify_16.h b/Pods/Headers/Public/libsodium/sodium/crypto_verify_16.h deleted file mode 120000 index 3888aa8..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_verify_16.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_verify_16.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_verify_32.h b/Pods/Headers/Public/libsodium/sodium/crypto_verify_32.h deleted file mode 120000 index b38c3f3..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_verify_32.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_verify_32.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/crypto_verify_64.h b/Pods/Headers/Public/libsodium/sodium/crypto_verify_64.h deleted file mode 120000 index 3a10e3f..0000000 --- a/Pods/Headers/Public/libsodium/sodium/crypto_verify_64.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/crypto_verify_64.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/export.h b/Pods/Headers/Public/libsodium/sodium/export.h deleted file mode 120000 index 7786c94..0000000 --- a/Pods/Headers/Public/libsodium/sodium/export.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/export.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/randombytes.h b/Pods/Headers/Public/libsodium/sodium/randombytes.h deleted file mode 120000 index 42c7dd9..0000000 --- a/Pods/Headers/Public/libsodium/sodium/randombytes.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/randombytes.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/randombytes_salsa20_random.h b/Pods/Headers/Public/libsodium/sodium/randombytes_salsa20_random.h deleted file mode 120000 index 10a311a..0000000 --- a/Pods/Headers/Public/libsodium/sodium/randombytes_salsa20_random.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/randombytes_salsa20_random.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/randombytes_sysrandom.h b/Pods/Headers/Public/libsodium/sodium/randombytes_sysrandom.h deleted file mode 120000 index a7cffa6..0000000 --- a/Pods/Headers/Public/libsodium/sodium/randombytes_sysrandom.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/randombytes_sysrandom.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/runtime.h b/Pods/Headers/Public/libsodium/sodium/runtime.h deleted file mode 120000 index 2fc66d5..0000000 --- a/Pods/Headers/Public/libsodium/sodium/runtime.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/runtime.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/utils.h b/Pods/Headers/Public/libsodium/sodium/utils.h deleted file mode 120000 index 1f34ca5..0000000 --- a/Pods/Headers/Public/libsodium/sodium/utils.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/utils.h \ No newline at end of file diff --git a/Pods/Headers/Public/libsodium/sodium/version.h b/Pods/Headers/Public/libsodium/sodium/version.h deleted file mode 120000 index 11ab70a..0000000 --- a/Pods/Headers/Public/libsodium/sodium/version.h +++ /dev/null @@ -1 +0,0 @@ -../../../../libsodium/src/libsodium/include/sodium/version.h \ No newline at end of file diff --git a/Pods/Manifest.lock b/Pods/Manifest.lock deleted file mode 100644 index c2f277f..0000000 --- a/Pods/Manifest.lock +++ /dev/null @@ -1,10 +0,0 @@ -PODS: - - libsodium (1.0.3) - -DEPENDENCIES: - - libsodium - -SPEC CHECKSUMS: - libsodium: be547e31dc75725629acc5717dc0a40fc05ef243 - -COCOAPODS: 0.37.1 diff --git a/Pods/Pods.xcodeproj/project.pbxproj b/Pods/Pods.xcodeproj/project.pbxproj deleted file mode 100644 index f76e24a..0000000 --- a/Pods/Pods.xcodeproj/project.pbxproj +++ /dev/null @@ -1,1499 +0,0 @@ -// !$*UTF8*$! -{ - archiveVersion = 1; - classes = { - }; - objectVersion = 46; - objects = { - -/* Begin PBXBuildFile section */ - 01711C9D035E5280DBF16003 /* fe_1_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 7ED005C5A4DDFF00C9E4B83A /* fe_1_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 02D4F33196B8900AF78948F6 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = CC78DEE2431E01BDC712AC48 /* api.h */; }; - 03A12D7CBC03B363EB902A0F /* auth_poly1305_donna.c in Sources */ = {isa = PBXBuildFile; fileRef = EB5B9E39E330FA2BAE825267 /* auth_poly1305_donna.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 0426E67099767A4DF8E7C74C /* ge_add.c in Sources */ = {isa = PBXBuildFile; fileRef = 723539479CC51BD74EFE1CFE /* ge_add.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 05FCEBA239A8C312024FCAF2 /* ge_add.h in Headers */ = {isa = PBXBuildFile; fileRef = 367EA4D4E191530172845BC8 /* ge_add.h */; }; - 07123F8A61CB68A66469F666 /* crypto_aead_chacha20poly1305.h in Headers */ = {isa = PBXBuildFile; fileRef = EC0E4834D3C3B5E655AA15F4 /* crypto_aead_chacha20poly1305.h */; }; - 07F2EC6239B362DB7FDD5E00 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 25529243AAFD42DDF95514B5 /* api.h */; }; - 0885AD4961CA23E21B935908 /* pwhash_scryptsalsa208sha256.c in Sources */ = {isa = PBXBuildFile; fileRef = 90A60C3579D53C5F6D0AD562 /* pwhash_scryptsalsa208sha256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 0889CE50719C3916BF386C63 /* int128_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = D03ED01925588701B90FD7FF /* int128_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 098EDD5FE766D2EE5E343359 /* core_hsalsa20_api.c in Sources */ = {isa = PBXBuildFile; fileRef = E07D016A392CD071573E2DA1 /* core_hsalsa20_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 099E8717DE84A18FBFC80C08 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 5637715786C139B9D11CC612 /* api.h */; }; - 0B717E224DCAF350F4D9EF46 /* stream_salsa2012.c in Sources */ = {isa = PBXBuildFile; fileRef = 3FE70303F1A369116244E874 /* stream_salsa2012.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 0C9C957A72337B23E74B22C3 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = CF259D23E5C254F354F8C8C9 /* api.h */; }; - 0EFF177AD66A0346172F10B4 /* ge_p3_0.c in Sources */ = {isa = PBXBuildFile; fileRef = 3D8C5DED4359DDC7CFB5D4BA /* ge_p3_0.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 11A269E99577529B59D0079C /* ge_tobytes.c in Sources */ = {isa = PBXBuildFile; fileRef = EF08BFCA79B1006D5D36B23E /* ge_tobytes.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 132140FD9DF25F7975EB9150 /* ge_sub.c in Sources */ = {isa = PBXBuildFile; fileRef = DF0832E3DA791B7E40A3CE90 /* ge_sub.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 13A9688FB4CE690644762733 /* ge_p3_to_cached.c in Sources */ = {isa = PBXBuildFile; fileRef = FB86AB9A94EEBC70A0C8A684 /* ge_p3_to_cached.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 1411513F3ADEAC118E277D02 /* aead_chacha20poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = BFD8FA9B008322ACF1796251 /* aead_chacha20poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 15013AA66C0241B9CD3C8EFC /* fe_isnonzero.c in Sources */ = {isa = PBXBuildFile; fileRef = 30C513C462D9055D9989AC7C /* fe_isnonzero.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 165A34428D49B129074F76DB /* fe_mul.c in Sources */ = {isa = PBXBuildFile; fileRef = 4D6310B9318EF66834224898 /* fe_mul.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 17723F7EE21975B88F982025 /* core_salsa2012.c in Sources */ = {isa = PBXBuildFile; fileRef = 26D61DE1B97AB08C24C6DE69 /* core_salsa2012.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 1B6130BDFD63C448E1748590 /* keypair_curve25519xsalsa20poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = 33113E14D3DFD631967878DE /* keypair_curve25519xsalsa20poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 1D4BEDC0116C15A0E293EE61 /* crypto_scrypt.h in Headers */ = {isa = PBXBuildFile; fileRef = 5725A0158D8FE8487E59BB05 /* crypto_scrypt.h */; }; - 1DD7525E8BCB2261E04927D0 /* ge_double_scalarmult.c in Sources */ = {isa = PBXBuildFile; fileRef = 3873AE14E475E423F1E123C0 /* ge_double_scalarmult.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 1DD90A6E95320DA321C1A023 /* crypto_shorthash_siphash24.h in Headers */ = {isa = PBXBuildFile; fileRef = F31562DD4C1711894B0CF902 /* crypto_shorthash_siphash24.h */; }; - 1E0173E612FB8CFF311554AE /* verify_hmacsha512.c in Sources */ = {isa = PBXBuildFile; fileRef = 5D98CF0F0084FD611FB18EDC /* verify_hmacsha512.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 20B368B0CC85E06CF6B957DE /* stream_xsalsa20.c in Sources */ = {isa = PBXBuildFile; fileRef = C7F8694654F49C05A86A3BDC /* stream_xsalsa20.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 215C908151239A0CA6666013 /* box_curve25519xsalsa20poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = 65415428101F20CFFFEDEC8A /* box_curve25519xsalsa20poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 215F4FE4BE34D14E9C3952AF /* sysendian.h in Headers */ = {isa = PBXBuildFile; fileRef = 28FBC3E5997D8CD343594DA5 /* sysendian.h */; }; - 21811E3C3BA0FAB105E0EF85 /* crypto_box_curve25519xsalsa20poly1305.h in Headers */ = {isa = PBXBuildFile; fileRef = 01A497FF72EAB0B2CAA6C540 /* crypto_box_curve25519xsalsa20poly1305.h */; }; - 21DFD3890F69A25E72C09C49 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 2EBA3AB16F34BB99C95D1970 /* api.h */; }; - 223677B1C1F7205F3A600C5F /* crypto_stream_salsa20.h in Headers */ = {isa = PBXBuildFile; fileRef = B286E9D1BCC17C31E361A1BB /* crypto_stream_salsa20.h */; }; - 22E47C94130E1FC2E3C3B787 /* fe_frombytes_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 86DF2B6CE6335EE5EF5BEFFA /* fe_frombytes_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 23933ED87BEEB76673B2A450 /* crypto_box.c in Sources */ = {isa = PBXBuildFile; fileRef = 63B0DA706FD08AD12D8B6AD8 /* crypto_box.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 23D5D95011C5F4903E000ACB /* sign_ed25519_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 0A8D08049439A1B0E857530D /* sign_ed25519_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2710AF5DB21E849E6AC62374 /* auth_hmacsha512_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 4B152261A5CDE869DB101E6E /* auth_hmacsha512_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 275B423E00ED28F70D656F87 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 56763F43853DEFDBCE12543A /* api.h */; }; - 2806B990DCAD19C2B838A7AD /* randombytes.h in Headers */ = {isa = PBXBuildFile; fileRef = E4150F87742BCC5EE50ECC6A /* randombytes.h */; }; - 29645A66652BD295374EB719 /* auth_hmacsha256_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 2794A3EE0ABDFA441E3F6C59 /* auth_hmacsha256_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2AE819AD1A999F0551DCD4AE /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 2514BC50F5DC3AF58A295071 /* api.h */; }; - 2B4BD2074D1ABC7757E2D17A /* ge_scalarmult_base.c in Sources */ = {isa = PBXBuildFile; fileRef = 1713D7C57439456E7C712F98 /* ge_scalarmult_base.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2BBD4A438752DF8E332826A8 /* blake2.h in Headers */ = {isa = PBXBuildFile; fileRef = C3D77D841EC4DDC1383C8AFA /* blake2.h */; }; - 2CA2F883E0E7F3384A10BD24 /* crypto_hash.c in Sources */ = {isa = PBXBuildFile; fileRef = 85EE7273A3A5255017CE8398 /* crypto_hash.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2D62EA79D7F826DFE4D1D38E /* core.c in Sources */ = {isa = PBXBuildFile; fileRef = F94A9E129DBC0ABCA959D25F /* core.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2DED7D50EA1B9971B0D34D7F /* ge_frombytes.c in Sources */ = {isa = PBXBuildFile; fileRef = 19EDFE452C6F34D295D1F3BC /* ge_frombytes.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2E243E72009D38BF202D77B2 /* fe_1.c in Sources */ = {isa = PBXBuildFile; fileRef = CC4AA5E3964AFDB2610B54CE /* fe_1.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 2F6C70A291C9305D54514753 /* onetimeauth_poly1305_try.c in Sources */ = {isa = PBXBuildFile; fileRef = 365969BB2ED5AD3028E72B73 /* onetimeauth_poly1305_try.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 31212B8D3CF37E75805ADAD9 /* xor_xsalsa20.c in Sources */ = {isa = PBXBuildFile; fileRef = B79781E9CC0289F6E56E5C1E /* xor_xsalsa20.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3222D2A2495929EDBD3D0E47 /* stream_chacha20_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 4AA9E8BC7D940C4F9C2263F2 /* stream_chacha20_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 32BBB1B7341FD57E43E984CE /* core_salsa2012_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 6DDB9E7CF1BDEECAD8AD3D8F /* core_salsa2012_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3463C0FA13C4A5E03B2AD96D /* crypto_shorthash.c in Sources */ = {isa = PBXBuildFile; fileRef = B75F70AAB0A7370E7C67F9BC /* crypto_shorthash.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3585224020FBF499B59F6A05 /* poly1305_donna32.h in Headers */ = {isa = PBXBuildFile; fileRef = A241E2106FFF43EA0ED7F70E /* poly1305_donna32.h */; }; - 35B728EEC5F0AE9F4559BBFD /* hmac_hmacsha512256.c in Sources */ = {isa = PBXBuildFile; fileRef = 03A7E927EF488D7F5380F641 /* hmac_hmacsha512256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 36108E791558D1CECB6281DE /* generichash_blake2_api.c in Sources */ = {isa = PBXBuildFile; fileRef = AC7A444150796259DAFAE685 /* generichash_blake2_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 37D1935B796CC883B5F74C1D /* crypto_verify_64.h in Headers */ = {isa = PBXBuildFile; fileRef = E271645FE94568F7DAE51C1A /* crypto_verify_64.h */; }; - 3812C517E3FF135CB94773B2 /* montgomery.h in Headers */ = {isa = PBXBuildFile; fileRef = 59B849DB4178F152329030FA /* montgomery.h */; }; - 3B2D25EC39A3DF4D3B4DA94F /* scalarmult_curve25519_api.c in Sources */ = {isa = PBXBuildFile; fileRef = F03D415134AD76EEAADEB91D /* scalarmult_curve25519_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3CC909B91755CCC7DB501B38 /* ge_p1p1_to_p2.c in Sources */ = {isa = PBXBuildFile; fileRef = 3B27A1516A02E20569E86068 /* ge_p1p1_to_p2.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3D36228F8C2B8BDCDEE9772B /* crypto_hash_sha512.h in Headers */ = {isa = PBXBuildFile; fileRef = B6D9E094227A21FD59753747 /* crypto_hash_sha512.h */; }; - 3D9824B78F91168A6EDD4C33 /* fe_frombytes.c in Sources */ = {isa = PBXBuildFile; fileRef = 2F90F69215B53DF524540863 /* fe_frombytes.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3DD4E36B256A0933BFA7B6D6 /* core_salsa20.c in Sources */ = {isa = PBXBuildFile; fileRef = 3E8D5633B3CF6884F7F1318B /* core_salsa20.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 3E8AE14969CEBEDAAEBF7590 /* crypto_scalarmult.c in Sources */ = {isa = PBXBuildFile; fileRef = 99892E4B5B13801B958F4D8A /* crypto_scalarmult.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 40BCA6C1C368A2B3123E3B08 /* fe_isnegative.c in Sources */ = {isa = PBXBuildFile; fileRef = 3C31FBD4C7750F2A2ACF9A5F /* fe_isnegative.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 4161C58657E6C3BE99902C7B /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = E4FF64DB21FB7B664121B952 /* api.h */; }; - 4423959997041922BB4F816A /* common_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = 427949CCCDB8AE45CEF2CFDD /* common_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 44290A8E0BDAC6E88D477DC7 /* crypto_core_salsa208.h in Headers */ = {isa = PBXBuildFile; fileRef = 2371B0B7FB4AA82BFD863BA0 /* crypto_core_salsa208.h */; }; - 44D78426DA70395299736B94 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = B8635166E75C93366B19ED25 /* api.h */; }; - 44E7175EF935D20A382DD4E9 /* crypto_box_seal.c in Sources */ = {isa = PBXBuildFile; fileRef = 768A100B6899C00552DC7A00 /* crypto_box_seal.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 456E082B261B5A637A57E5EA /* crypto_box.h in Headers */ = {isa = PBXBuildFile; fileRef = B06C3F859BB350401B69D350 /* crypto_box.h */; }; - 4868FE4D35D2DC73E1997E1C /* sc_reduce.c in Sources */ = {isa = PBXBuildFile; fileRef = 786FBF4246CFDA038FD37DCC /* sc_reduce.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 495CBB998A5D5A2EB41BCB00 /* verify_16.c in Sources */ = {isa = PBXBuildFile; fileRef = 76F194ACD3C5AA2BA71732E2 /* verify_16.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 49ECD32A666BFBEA1A2EA70D /* fe_sq.c in Sources */ = {isa = PBXBuildFile; fileRef = C51774E5369842AA53D340F6 /* fe_sq.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 4BC4019AB708B4B431D141E6 /* fe25519.h in Headers */ = {isa = PBXBuildFile; fileRef = 6DB78F818477151BF07666ED /* fe25519.h */; }; - 4C627EA74C3CC84C52EF4BAB /* crypto_secretbox_easy.c in Sources */ = {isa = PBXBuildFile; fileRef = E581CB80CD8206DCA8FBA62B /* crypto_secretbox_easy.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 4D3EA0F2CDF589D11BD02A99 /* ge_msub.h in Headers */ = {isa = PBXBuildFile; fileRef = AD2E2C6C187FAF335798FEC4 /* ge_msub.h */; }; - 4D5AA7077DA9ECC1F86F3695 /* fe_add_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 1938369B9C465443CE45AAFD /* fe_add_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 4FD09D1EDA19A0D8AB77708A /* crypto_onetimeauth_poly1305.h in Headers */ = {isa = PBXBuildFile; fileRef = CF127642348F68F53A657706 /* crypto_onetimeauth_poly1305.h */; }; - 4FE9E8ECC8B8B313176EE0D6 /* crypto_secretbox.c in Sources */ = {isa = PBXBuildFile; fileRef = D245C98D3586B936BFD95530 /* crypto_secretbox.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 52DCAF63DAE10AF002BD160D /* d.h in Headers */ = {isa = PBXBuildFile; fileRef = 13BB77AA6A7D293F220B3F7F /* d.h */; }; - 535FF098D3DC005734E100F2 /* pow22523.h in Headers */ = {isa = PBXBuildFile; fileRef = CCA7366EE21E142AB5455133 /* pow22523.h */; }; - 56332DEA4E0F779F484D127A /* crypto_int32.h in Headers */ = {isa = PBXBuildFile; fileRef = 9ADC87EFE9E50BBE8F7CD55B /* crypto_int32.h */; }; - 56EA9C4B2E290D7361A328B1 /* ge_p2_0.c in Sources */ = {isa = PBXBuildFile; fileRef = 2650B4B3ECEB95C79760CC5A /* ge_p2_0.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 58F1722FEC0DD06A3C765520 /* blake2b-ref.c in Sources */ = {isa = PBXBuildFile; fileRef = C7106A9333FF1E683CA0ADCD /* blake2b-ref.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 597FCEA2963B8C87AA332A77 /* fe_pow22523.c in Sources */ = {isa = PBXBuildFile; fileRef = 518EA6234FF14F3E0F05617D /* fe_pow22523.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 59806B07E2683309F4AAFE07 /* fe_tobytes.c in Sources */ = {isa = PBXBuildFile; fileRef = EDA6C6E0086AB1856357F874 /* fe_tobytes.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 5ABAFBE725B46118FFB7CF22 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 37A70325C8922E2AFD448AC3 /* api.h */; }; - 5AFE56E16DA7CAFAD9248C8B /* crypto_core_salsa2012.h in Headers */ = {isa = PBXBuildFile; fileRef = B4D969DE62BB664A67A93036 /* crypto_core_salsa2012.h */; }; - 5B297EBAEA2AC9C70AE25520 /* crypto_secretbox_xsalsa20poly1305.h in Headers */ = {isa = PBXBuildFile; fileRef = 709E9BBA823D2D70E7A8C1DB /* crypto_secretbox_xsalsa20poly1305.h */; }; - 5B8E072A42A4AEB33FF6DDCB /* stream_aes128ctr_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 831177D95FB3B619E0D79FEE /* stream_aes128ctr_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 5BA2D3015027C794921A2CF7 /* fe_invert_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = AFBDA2E3B12E2F1A6E8318F1 /* fe_invert_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 5C6E72AAEF5B14E3B6CB0889 /* sc25519_edwards25519sha512batch.c in Sources */ = {isa = PBXBuildFile; fileRef = 37E5BE3C8B4B294513A848DD /* sc25519_edwards25519sha512batch.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 5C9D99E91F13D8B7A72B9893 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 020A37012972D4298E29E3F1 /* api.h */; }; - 5EC4E42B4D4B68A9F3A33B1E /* crypto_scrypt-common.c in Sources */ = {isa = PBXBuildFile; fileRef = 99EFAA6F4EFCE2CCF7A37027 /* crypto_scrypt-common.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 603AA8247899700A79821D0B /* ge_p3_tobytes.c in Sources */ = {isa = PBXBuildFile; fileRef = 6EE962CBDDE4384282CC3CC4 /* ge_p3_tobytes.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 6157E0A545408ABF47E9B5F0 /* crypto_generichash.h in Headers */ = {isa = PBXBuildFile; fileRef = C74A193384A062C825A6C34F /* crypto_generichash.h */; }; - 615D14260B3E4F7E410A23DC /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 9A279D50F69DDE8E9E56CDEC /* api.h */; }; - 6200497FC3412CCDEA8E9114 /* fe_0.c in Sources */ = {isa = PBXBuildFile; fileRef = 0E13DB7335CD6E4A5C43BAF4 /* fe_0.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 6228E7211DE6CF2C485B60AF /* crypto_sign.c in Sources */ = {isa = PBXBuildFile; fileRef = 3E664EEA2A86DB3B9C442413 /* crypto_sign.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 623F70E878AD66CF1D6F73D8 /* stream_salsa20_api.c in Sources */ = {isa = PBXBuildFile; fileRef = F684C8E1D9020E7D3D1CEA4A /* stream_salsa20_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 6300825671758E4ABD393856 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 195F677F0A0599938D7951D7 /* api.h */; }; - 6312968433AD9F2C1DAF7D19 /* core.h in Headers */ = {isa = PBXBuildFile; fileRef = B577385F8D2E92F11980F829 /* core.h */; }; - 63E448F37155ED7B2089A7C4 /* runtime.h in Headers */ = {isa = PBXBuildFile; fileRef = B25E3E58B02C6FDF8471D99B /* runtime.h */; }; - 668410AEDBC27E302EA18DA3 /* sign.c in Sources */ = {isa = PBXBuildFile; fileRef = 6DF1E2635210A36B9F759872 /* sign.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 67133A082C89C004518EE99C /* version.h in Headers */ = {isa = PBXBuildFile; fileRef = DCEA864ED72A0C3DA9A31359 /* version.h */; }; - 6A72411EFE5527FF17E46821 /* crypto_sign_edwards25519sha512batch.h in Headers */ = {isa = PBXBuildFile; fileRef = BCCE9C915DC5F0CF15042B7D /* crypto_sign_edwards25519sha512batch.h */; }; - 6AE98BAB4DF036BFB2B4FCD9 /* crypto_box_easy.c in Sources */ = {isa = PBXBuildFile; fileRef = E77F57BF7ED1AB45C1620122 /* crypto_box_easy.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 6AEB4CFCA875F8FF152962C0 /* utils.h in Headers */ = {isa = PBXBuildFile; fileRef = 69C76E94B58CEF60391A27A7 /* utils.h */; }; - 6B2D05AA2F9473EE9AEBD67A /* version.c in Sources */ = {isa = PBXBuildFile; fileRef = F2BF47060AC5416E58311063 /* version.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 6C9BD87FB359A9DC408B4CFA /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = D547B5A6DADC5C3D9959B8A9 /* api.h */; }; - 6CBAD4B96AC1662A6AF59431 /* utils.c in Sources */ = {isa = PBXBuildFile; fileRef = 2273AF24AA43FE64B33E29C2 /* utils.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 6DC32BE1115CDE7664F4A188 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = B8E30F20DFD57F541BFACCB8 /* api.h */; }; - 703DDDA1FF0528E0654AEB81 /* crypto_onetimeauth.h in Headers */ = {isa = PBXBuildFile; fileRef = 06E6692C6483E2CC63302DBE /* crypto_onetimeauth.h */; }; - 7243B769CAA134F5E795CD6C /* scrypt_platform.c in Sources */ = {isa = PBXBuildFile; fileRef = A2399F9697708F12641C8E08 /* scrypt_platform.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 749ED22CBDEF17FBC8B47B7E /* crypto_verify_16.h in Headers */ = {isa = PBXBuildFile; fileRef = B7A12BABF2799A7E02441B18 /* crypto_verify_16.h */; }; - 75352F132350A6077A2FB36A /* xor_afternm_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = 0727881AFE434091D3E51C50 /* xor_afternm_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 75521617E34E3864C0041056 /* verify_64_api.c in Sources */ = {isa = PBXBuildFile; fileRef = C64296F57429EF7C8CE7A201 /* verify_64_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 76340507656E3F71F64EA5AC /* verify_64.c in Sources */ = {isa = PBXBuildFile; fileRef = 29A21DDE753201AEC0AE7F86 /* verify_64.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 77A9D0FE949F167C1B02A08B /* sodium.h in Headers */ = {isa = PBXBuildFile; fileRef = BD307648ACA4467FECFC174B /* sodium.h */; }; - 7AE71A114339A4BEF2FCAFBF /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 7AB43E7C4B9521F96A9BDA8D /* api.h */; }; - 7B75D648B2361EB1B80A606C /* crypto_stream.h in Headers */ = {isa = PBXBuildFile; fileRef = E614448361C8D1D66645A995 /* crypto_stream.h */; }; - 7B9A757F6E1BF0FAE74D4BF9 /* hash_sha512.c in Sources */ = {isa = PBXBuildFile; fileRef = EF78AA825EF6AD102E7DCFDB /* hash_sha512.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 7C7DC3A30BDF97DCF62C9CAD /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 2ED32CFFA073329EBFFB4F24 /* api.h */; }; - 7CA10F8C01B2824ED92102FB /* crypto_sign.h in Headers */ = {isa = PBXBuildFile; fileRef = 493B72DC069061B67C0A17F6 /* crypto_sign.h */; }; - 7CCBB0D0CB27FCD4FA043AC9 /* sqrtm1.h in Headers */ = {isa = PBXBuildFile; fileRef = 22D801B543A74C07DBAA66F5 /* sqrtm1.h */; }; - 7CDEF5C25DD4E18B73216F38 /* generichash_blake2b.c in Sources */ = {isa = PBXBuildFile; fileRef = 4602E462319BE6376D1AE541 /* generichash_blake2b.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 7E5586CA3B240E8E0B6D2495 /* smult_curve25519_donna_c64.c in Sources */ = {isa = PBXBuildFile; fileRef = B5252F27C1B2E2A4E6EFFCFC /* smult_curve25519_donna_c64.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 7F2AAA8F4AD34B3A254292AA /* fe_cmov.c in Sources */ = {isa = PBXBuildFile; fileRef = 150B3C6BFE5BF957C676BB99 /* fe_cmov.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 7F8677EE1E150F48FB73277B /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 95791D3BE0C165F975456F0B /* api.h */; }; - 7FBC41EA3978802EB4F05ED6 /* verify_32_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 1959AB333A2A1D98FB91B5A2 /* verify_32_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 7FBDA6D5BB7D84B8DBC615E3 /* stream_xsalsa20_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 8C8CDDE5589DD8CB205E2A55 /* stream_xsalsa20_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 7FD666181536A5E3C943AEB7 /* crypto_shorthash.h in Headers */ = {isa = PBXBuildFile; fileRef = 4B867DB2872926EB5EC732E6 /* crypto_shorthash.h */; }; - 806A50728833429A3BC50C13 /* crypto_hash_sha256.h in Headers */ = {isa = PBXBuildFile; fileRef = 80198EBD6EB8CD0AD3FEB08F /* crypto_hash_sha256.h */; }; - 80E86A64A1C7152B67DDE335 /* ge_madd.h in Headers */ = {isa = PBXBuildFile; fileRef = 8A63634BFD14C8EA43626054 /* ge_madd.h */; }; - 8216C62F58B51B9FE77CF4DB /* core_salsa208.c in Sources */ = {isa = PBXBuildFile; fileRef = 8C3818070309CD8D833394F4 /* core_salsa208.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 830FC1815B1F5C62D2876E2F /* crypto_generichash_blake2b.h in Headers */ = {isa = PBXBuildFile; fileRef = 61FEEC5F11A373E1941A46D7 /* crypto_generichash_blake2b.h */; }; - 835DDAC9FC2096367B7FACCD /* fe_sq2.c in Sources */ = {isa = PBXBuildFile; fileRef = D75547E46784491B8BD08B37 /* fe_sq2.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 8663B240D8A984DBF7C2589B /* fe25519_edwards25519sha512batch.c in Sources */ = {isa = PBXBuildFile; fileRef = 6DE3EA8AF034E71AB50CD9E4 /* fe25519_edwards25519sha512batch.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 86711C5E179AC4CFFF678144 /* fe.h in Headers */ = {isa = PBXBuildFile; fileRef = 956B33854CDE0F7144A873A2 /* fe.h */; }; - 86A739D54FE23799266E6176 /* crypto_uint8.h in Headers */ = {isa = PBXBuildFile; fileRef = 95C101C7B94625E63636C04C /* crypto_uint8.h */; }; - 87F49EA8106D6064BCA83723 /* core_salsa20_api.c in Sources */ = {isa = PBXBuildFile; fileRef = C3C74D894188286BD858E431 /* core_salsa20_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 888C7365E324FCE05162AC21 /* fe_cswap_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 81A9FF8AB3D68CEFAFBC15F3 /* fe_cswap_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 88E12D5C4BEBB1B6F853C136 /* runtime.c in Sources */ = {isa = PBXBuildFile; fileRef = ECF7B3C03073B9F186632D91 /* runtime.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 8976FE102AF5058C401F9D65 /* fe_tobytes_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = C8510E2D3E614D5BE15CB491 /* fe_tobytes_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 8B5E07C0E7EF69F4B54BABBD /* pbkdf2-sha256.c in Sources */ = {isa = PBXBuildFile; fileRef = 319BD90F9417C61EFBA28D44 /* pbkdf2-sha256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 8C1AE1D89B6AF0CC4AB9BBED /* crypto_hash.h in Headers */ = {isa = PBXBuildFile; fileRef = 31DB52C77394C80674393C18 /* crypto_hash.h */; }; - 8D55C037BAFAA3D3A76BF9FD /* crypto_scalarmult_curve25519.h in Headers */ = {isa = PBXBuildFile; fileRef = 6244A39CDA0636BDDFDB6A7D /* crypto_scalarmult_curve25519.h */; }; - 8E917D49098297FBEBA4BF35 /* verify_hmacsha512256.c in Sources */ = {isa = PBXBuildFile; fileRef = E61D231C1FAA7DD9E35055EC /* verify_hmacsha512256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 8F1CD70C7B9418102D08A5AB /* crypto_auth.h in Headers */ = {isa = PBXBuildFile; fileRef = 3F0F47830D5A395DB404CCF1 /* crypto_auth.h */; }; - 8FC0088D5D3C24447D8715D1 /* ge_precomp_0.c in Sources */ = {isa = PBXBuildFile; fileRef = 071C5BA551E9529C4E2C441B /* ge_precomp_0.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 903421D6443715E4E264CEC5 /* onetimeauth_poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = CEECEC265FE0FF38F298584D /* onetimeauth_poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 90F6441CCA0D79685E1C5A7D /* Pods-tunnel-libsodium-dummy.m in Sources */ = {isa = PBXBuildFile; fileRef = 276E9E389A0F31D27F19C627 /* Pods-tunnel-libsodium-dummy.m */; }; - 913D96F6639A2A4671529937 /* blake2-impl.h in Headers */ = {isa = PBXBuildFile; fileRef = 2D1C07DA7D984E770C207414 /* blake2-impl.h */; }; - 92038F22B628AEECFF814E0B /* scalarmult_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 2F869655F6B64B120E21446F /* scalarmult_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 9212F9F082465931F5074D6C /* core_hsalsa20.c in Sources */ = {isa = PBXBuildFile; fileRef = D02FCD814541B84EE5C9C635 /* core_hsalsa20.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 92F008FF63C81C2CFCA78CDB /* ge_p2_dbl.c in Sources */ = {isa = PBXBuildFile; fileRef = D22C48E11116925FE158876B /* ge_p2_dbl.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 94CDCB4FD28D82AC9C3EFA50 /* fe_neg.c in Sources */ = {isa = PBXBuildFile; fileRef = 759520B57632B96F388D7C8C /* fe_neg.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 94F932C506D0ADED4236937C /* export.h in Headers */ = {isa = PBXBuildFile; fileRef = CAD94B5683A401522B535F34 /* export.h */; }; - 9516CFF3644552C570B7D87A /* crypto_secretbox.h in Headers */ = {isa = PBXBuildFile; fileRef = 3EAC82063DFF101CD226B4D3 /* crypto_secretbox.h */; }; - 955303B881D2F2B7631B231D /* crypto_verify_32.h in Headers */ = {isa = PBXBuildFile; fileRef = 05AA29E97EDA5EDFA48B345D /* crypto_verify_32.h */; }; - 9636B80C6DB691A018A55B55 /* sc_muladd.c in Sources */ = {isa = PBXBuildFile; fileRef = AD92BF9F6E1246344CAC96A9 /* sc_muladd.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 9676651832BA1E02A06A6116 /* ge.h in Headers */ = {isa = PBXBuildFile; fileRef = 9555C83472AAFDE29656B225 /* ge.h */; }; - 9685EB6F640ED8652263947A /* pwhash_scryptsalsa208sha256_nosse.c in Sources */ = {isa = PBXBuildFile; fileRef = 24A5B00799A2F5E3D685DB2B /* pwhash_scryptsalsa208sha256_nosse.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 96DBC9A4BE35AA6E5CD35B2E /* verify_16_api.c in Sources */ = {isa = PBXBuildFile; fileRef = F4649197A50C23B34C0B338C /* verify_16_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 977A32DCCB94FE45BEDC4E73 /* ge_msub.c in Sources */ = {isa = PBXBuildFile; fileRef = C3EAE71A26EE484EE15253D7 /* ge_msub.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 97D55343D4834E6A5C08AD4E /* crypto_sign_ed25519.h in Headers */ = {isa = PBXBuildFile; fileRef = 79F9DA32782783D6295CD029 /* crypto_sign_ed25519.h */; }; - 989E558DB81702E7C965153E /* crypto_onetimeauth.c in Sources */ = {isa = PBXBuildFile; fileRef = 00707E8D704955E3AC0FB5C6 /* crypto_onetimeauth.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 98E8D684513A60602642FAE2 /* base_curve25519_donna_c64.c in Sources */ = {isa = PBXBuildFile; fileRef = 7CA6C56D883E55E040770F9A /* base_curve25519_donna_c64.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 9976B32DA7ABA8628F0B4068 /* stream_salsa20_ref.c in Sources */ = {isa = PBXBuildFile; fileRef = 75A915A0226F0839B5AB69B6 /* stream_salsa20_ref.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 9A2417B95E0468772605EF8E /* fe_copy.c in Sources */ = {isa = PBXBuildFile; fileRef = 903D2A2C61508AFDC32715AC /* fe_copy.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 9BCCB402881CB7EF4E71D773 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = A325D26842B99A8DFD3BAC59 /* api.h */; }; - 9D7D3D317787CA6923B33109 /* crypto_auth.c in Sources */ = {isa = PBXBuildFile; fileRef = 577F46D6E71994828662A9CD /* crypto_auth.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - 9F3B1D731A9E76B0E29C8168 /* shorthash_siphash24.c in Sources */ = {isa = PBXBuildFile; fileRef = 9421587B3BF5B6F3791680F0 /* shorthash_siphash24.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - A015757BCF7E2D3437A7F8B0 /* stream_salsa208.c in Sources */ = {isa = PBXBuildFile; fileRef = EC00FF72B6EF01DF68E6E694 /* stream_salsa208.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - A1328C04848E049C13A838CB /* d2.h in Headers */ = {isa = PBXBuildFile; fileRef = 6654B0AA2F0E7A315578F3DC /* d2.h */; }; - A1549C31A9B914FBFA586B05 /* base.h in Headers */ = {isa = PBXBuildFile; fileRef = C68B2714CAE229C33DF77560 /* base.h */; }; - A2B129D0C8C235DAFCF584DE /* crypto_auth_hmacsha512256.h in Headers */ = {isa = PBXBuildFile; fileRef = 53FC28C746A1E6FE2FFF1011 /* crypto_auth_hmacsha512256.h */; }; - A3EC596B6B93A9CE98AC7552 /* sc25519.h in Headers */ = {isa = PBXBuildFile; fileRef = 2C828B6A278B3AB54565DC3C /* sc25519.h */; }; - A5DE66115E8BF4AD2384801E /* verify_32.c in Sources */ = {isa = PBXBuildFile; fileRef = 4405EAE71BFB3B55D65C890E /* verify_32.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - A631B9C3DBA6F82FA476E5BA /* ge_p3_dbl.c in Sources */ = {isa = PBXBuildFile; fileRef = 0F4C7D03C2C6188B2AF80B71 /* ge_p3_dbl.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - A94F7838B8D3EC5608CE9B06 /* crypto_generichash.c in Sources */ = {isa = PBXBuildFile; fileRef = 8E39325FCEC1AFA5F6289EEF /* crypto_generichash.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - A9A28C6B4E9556EAFB0CCA07 /* core_salsa208_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 66B3010936D50A5959DD45B7 /* core_salsa208_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - AA192EEA2C6D3930BF2EB1BE /* fe_invert.c in Sources */ = {isa = PBXBuildFile; fileRef = 408413F992230ED7A379B041 /* fe_invert.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - AA48713E384217E2521D5911 /* hmac_hmacsha512.c in Sources */ = {isa = PBXBuildFile; fileRef = CFE44E91401D6C98EF8CD496 /* hmac_hmacsha512.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - AAA876C28827947F8ED37A22 /* crypto_stream_xsalsa20.h in Headers */ = {isa = PBXBuildFile; fileRef = 5C879DA600DD4222443ECA3D /* crypto_stream_xsalsa20.h */; }; - AB378BDC3350FB4E79D5CB90 /* stream_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = 26B7C0F56D4026A4F2785A4A /* stream_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - AB69199D55AA724700FAFC76 /* xor_salsa208.c in Sources */ = {isa = PBXBuildFile; fileRef = 0BEB316B164159804822BC16 /* xor_salsa208.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - ACA02C53CFA1037A9DA7B8F0 /* hmac_hmacsha256.c in Sources */ = {isa = PBXBuildFile; fileRef = 5F60BECA4484423123ACA672 /* hmac_hmacsha256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - ACE46207A3D920DBB260B283 /* common.h in Headers */ = {isa = PBXBuildFile; fileRef = 371715F198BC4C201140F062 /* common.h */; }; - B045B2634E4CF1073C2504E2 /* crypto_uint64.h in Headers */ = {isa = PBXBuildFile; fileRef = DB8893EAE6713000237E0F50 /* crypto_uint64.h */; }; - B0AD90B67FBA5C574C097E5B /* fe_sub.c in Sources */ = {isa = PBXBuildFile; fileRef = C902EB4FC10A7B3510E3CF21 /* fe_sub.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - B107EB691DC8E2D8A690A4A2 /* xor_salsa20_ref.c in Sources */ = {isa = PBXBuildFile; fileRef = 8D3630A9EE835623597C3F22 /* xor_salsa20_ref.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - B257E10FA52D909CA316A70A /* crypto_uint32.h in Headers */ = {isa = PBXBuildFile; fileRef = FFD442520C5DDA56ADA748C0 /* crypto_uint32.h */; }; - B33391FB614F24DBF7266B3A /* randombytes_sysrandom.c in Sources */ = {isa = PBXBuildFile; fileRef = C20FBFA753379CB6DD68F7BA /* randombytes_sysrandom.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - B3519BB63D2370DC8E9EFC53 /* crypto_auth_hmacsha512.h in Headers */ = {isa = PBXBuildFile; fileRef = BA79F309715603BED61CF993 /* crypto_auth_hmacsha512.h */; }; - B3BA4B8CB554CE4AED0BB83B /* open.c in Sources */ = {isa = PBXBuildFile; fileRef = 1749135A603803E9A8FF244B /* open.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - B3C1E215B4F494110F26B5B5 /* shorthash_siphash24_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 1D2884055587BE23E501C5EF /* shorthash_siphash24_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - B4AE3EBF04227F9C1F708C9F /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 9A25C095AF475745BF03786C /* api.h */; }; - B8663E0DB9D4E8D337827052 /* crypto_stream_salsa208.h in Headers */ = {isa = PBXBuildFile; fileRef = 37F7327008A60A557C15C802 /* crypto_stream_salsa208.h */; }; - B8B75D84677238C66233ACDF /* onetimeauth_poly1305_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 0E12B9F230B9798ED34FDD89 /* onetimeauth_poly1305_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - B969F6DA5FDA28BF195B834D /* ge_p2_dbl.h in Headers */ = {isa = PBXBuildFile; fileRef = 96044DC98EBA5637F2B29D50 /* ge_p2_dbl.h */; }; - B9C7808CF0CEF60CC652002F /* ge25519_edwards25519sha512batch.c in Sources */ = {isa = PBXBuildFile; fileRef = DAE50519077C79FCA266F110 /* ge25519_edwards25519sha512batch.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - BA5EB68B8F23770832DF0EA4 /* box_xsalsa20poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = 491AD13C6CD2213E240384B5 /* box_xsalsa20poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - BA7D8C674613B0A9EB4665FD /* pbkdf2-sha256.h in Headers */ = {isa = PBXBuildFile; fileRef = 5875FE95C134585B0402A950 /* pbkdf2-sha256.h */; }; - BB42DB7AB25D2DF477E82C3D /* xor_salsa2012.c in Sources */ = {isa = PBXBuildFile; fileRef = 97AD806A5805CF401F2BEC86 /* xor_salsa2012.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - BCD72E3D0DBC5B9CB3520A76 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = CE2DDA71EC5A6326FBC456EC /* api.h */; }; - BEFCD55A3FF80417FEDC6ED5 /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = D4E2DC8C4B7C79AEC4B33EE4 /* Foundation.framework */; }; - C0E648BD9203C687BA3BB1BF /* hash_sha256.c in Sources */ = {isa = PBXBuildFile; fileRef = 11028F2FF9AF5AD25C90ECDF /* hash_sha256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - C28622A8717D0A1BFA4F4301 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 72A19831A471CF1382EA4593 /* api.h */; }; - C29D918E5E1A4773AC0B3E43 /* fe_0_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 65C37A56EAAAFDCB9F190276 /* fe_0_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - C45150BE1101A4C50D400428 /* pow225521.h in Headers */ = {isa = PBXBuildFile; fileRef = D222554AE7AA358158562F3A /* pow225521.h */; }; - C482B59A34DA311CB2470D98 /* ge25519.h in Headers */ = {isa = PBXBuildFile; fileRef = 2432A1187CA0FE5334177FD2 /* ge25519.h */; }; - C4F802462ADB2CE49288A829 /* afternm_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = DA6222CE3B5C1B0A5AAC6A3B /* afternm_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - C5981E850108B8D84D540EEA /* verify_hmacsha256.c in Sources */ = {isa = PBXBuildFile; fileRef = 9F05FAB70F81751A5BEF13E4 /* verify_hmacsha256.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - C94CBB1F97D6A30971CBD299 /* fe.h in Headers */ = {isa = PBXBuildFile; fileRef = C32D5866787E3B8D592E631F /* fe.h */; }; - CA13E5B41E0D4B163ECC6B01 /* crypto_stream_salsa2012.h in Headers */ = {isa = PBXBuildFile; fileRef = 30211B1A9E97C0DBA492D72F /* crypto_stream_salsa2012.h */; }; - CB1090BAF3DFCB8C62B63F1B /* crypto_core_hsalsa20.h in Headers */ = {isa = PBXBuildFile; fileRef = 9198EFEC7CD551CE29D66D66 /* crypto_core_hsalsa20.h */; }; - CC19B17F02709698F0D1C2FD /* beforenm_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = 86448ED32443F62CCDC72FD9 /* beforenm_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - CCD18E74CB59F7B550289E91 /* pwhash_scryptsalsa208sha256_sse.c in Sources */ = {isa = PBXBuildFile; fileRef = 058B070BA3B6B5BCA64CA3C4 /* pwhash_scryptsalsa208sha256_sse.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - CF07EAFF4074B2B13CA70DF3 /* randombytes_salsa20_random.h in Headers */ = {isa = PBXBuildFile; fileRef = 29876F5318BDF8517D4C3ADD /* randombytes_salsa20_random.h */; }; - D16E5CC64C814437EDC24131 /* fe_sq_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 2E685A7C56329D9A9C5022F7 /* fe_sq_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - D1DCEE0F03D3BA9322C0DBDC /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 3C5A79ABC7C3252C7549BFA3 /* api.h */; }; - D2FF0E60222CB2D6435232C1 /* before_curve25519xsalsa20poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = 7F5122533F1D1F275DF7DE03 /* before_curve25519xsalsa20poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - D3266E12B1E1F559C562450C /* base_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = D58FA1D54D49FCDA2733C60E /* base_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - D4FE13B559AF15A1FD951B2F /* pow225521.h in Headers */ = {isa = PBXBuildFile; fileRef = 2C847439A693155AFE2C0E56 /* pow225521.h */; }; - D858CF2FDEDBF4B841047F3C /* stream_salsa2012_api.c in Sources */ = {isa = PBXBuildFile; fileRef = C6D0025BE4C1273A29F9E765 /* stream_salsa2012_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - D9B31E990B2539E13FE7575B /* sign_edwards25519sha512batch.c in Sources */ = {isa = PBXBuildFile; fileRef = 414E8F8F75CF6EC36226C8E9 /* sign_edwards25519sha512batch.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - DA8A62D094D7BAFBD3DF0AA7 /* secretbox_xsalsa20poly1305_api.c in Sources */ = {isa = PBXBuildFile; fileRef = A41213709C1EFB7052A7A41F /* secretbox_xsalsa20poly1305_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - DAFBB2CCF246EF7CD604FBCA /* consts.h in Headers */ = {isa = PBXBuildFile; fileRef = 46187615A88F584F635D3671 /* consts.h */; }; - DAFF54510BF95C2CEA72DFDB /* int128.h in Headers */ = {isa = PBXBuildFile; fileRef = A10FCFBE21C652B6F2101144 /* int128.h */; }; - DB0BA8193B26F932EACF5873 /* hash_sha256_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 895A11B6A59DC77FBB4732FC /* hash_sha256_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - DBBF673FF85AFD7B04A44C63 /* fe_mul_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 0A6BC2523760419BF5916DE7 /* fe_mul_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - DD958B0E636F4A044C5DF404 /* base2.h in Headers */ = {isa = PBXBuildFile; fileRef = 5972B14511EA99D60F57C9CF /* base2.h */; }; - DE4F21B8E078961070474F4C /* ge_p1p1_to_p3.c in Sources */ = {isa = PBXBuildFile; fileRef = 721D4E4E60DE823367032F04 /* ge_p1p1_to_p3.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - DE7DFFE420C94011292D2B95 /* types.h in Headers */ = {isa = PBXBuildFile; fileRef = FBD2DC802ABDF4070E8FE275 /* types.h */; }; - DE9BC43BB09FF6A7C1201EB4 /* crypto_core_salsa20.h in Headers */ = {isa = PBXBuildFile; fileRef = 1E5A5E53476DCE82C25ADF5B /* crypto_core_salsa20.h */; }; - DF0068A714778F682AAB9D80 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 4E1EA929F1044F6284578EB6 /* api.h */; }; - DFFE2D8571D9BF864D6080A7 /* hash_sha512_api.c in Sources */ = {isa = PBXBuildFile; fileRef = F8EB822587E34A0A11A58BBF /* hash_sha512_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - E1F939EB319E2FD4CE472A91 /* randombytes.c in Sources */ = {isa = PBXBuildFile; fileRef = 1725A0E61459D49A02399050 /* randombytes.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - E4F0B67C3E70CAA5DFF85A4E /* randombytes_sysrandom.h in Headers */ = {isa = PBXBuildFile; fileRef = C7AC311D628DA701F7ED9554 /* randombytes_sysrandom.h */; }; - E58A366D0954F686FB958F1A /* crypto_stream.c in Sources */ = {isa = PBXBuildFile; fileRef = 0B915CFE92C911E1EBD36EAF /* crypto_stream.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - E6012374014646B0A1DCAE4B /* fe_add.c in Sources */ = {isa = PBXBuildFile; fileRef = 94AE296601CF4D10128D621E /* fe_add.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - E8C3015A8EEB68DC2AA41DE8 /* fe_sub_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 42F89E6AF4AA77AE0468F851 /* fe_sub_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - E8D4163542B4D6C69DD76549 /* crypto_auth_hmacsha256.h in Headers */ = {isa = PBXBuildFile; fileRef = 509D0E694E83C968E34FA1CD /* crypto_auth_hmacsha256.h */; }; - E903A2C256A3003209C37501 /* stream_salsa208_api.c in Sources */ = {isa = PBXBuildFile; fileRef = F41CEA266482611E49B7FF23 /* stream_salsa208_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - E92F21BB0D9E9183AFDF701D /* after_curve25519xsalsa20poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = 5D5401DEFB2EE8A3872A761F /* after_curve25519xsalsa20poly1305.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - EAA29F3B5617A3698F3A92D1 /* crypto_stream_aes128ctr.h in Headers */ = {isa = PBXBuildFile; fileRef = 50C8665993978345700711D5 /* crypto_stream_aes128ctr.h */; }; - EC19678FC4687AAE50176B65 /* keypair.c in Sources */ = {isa = PBXBuildFile; fileRef = 6ABE0D9584CEBA971F5A368F /* keypair.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - EDD50E56BBA7EBB844E78E3B /* randombytes_salsa20_random.c in Sources */ = {isa = PBXBuildFile; fileRef = A70E46D2A5C546CA6FA79722 /* randombytes_salsa20_random.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - EE41B5E8CB5DD6B4093EC1AD /* crypto_pwhash_scryptsalsa208sha256.h in Headers */ = {isa = PBXBuildFile; fileRef = 22A14C9769A36AE61FB96CBA /* crypto_pwhash_scryptsalsa208sha256.h */; }; - EF593A902FA281DF921A3035 /* fe_copy_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 45177EB1A81E2754ED9AD21D /* fe_copy_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F05778093FA0ADD91701C730 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = E85C0B63CDEC844AC5C26903 /* api.h */; }; - F0A13064051FAE0FCF47BF11 /* ge_sub.h in Headers */ = {isa = PBXBuildFile; fileRef = 0F391700127E0DB54E2DE4AD /* ge_sub.h */; }; - F1CCB7D4709CF20ED3CD6184 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = C200545DEE4752315199A764 /* api.h */; }; - F1E1932410DDA00F49E33E98 /* ge_p3_to_p2.c in Sources */ = {isa = PBXBuildFile; fileRef = 68FBD3E992C8BBE7DB4E81B1 /* ge_p3_to_p2.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F2E68BE1BD2399446AE8F8F1 /* verify_poly1305_donna.c in Sources */ = {isa = PBXBuildFile; fileRef = 248AFA9CBAF954B97AFE264A /* verify_poly1305_donna.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F311286413A75EE369994001 /* ge_madd.c in Sources */ = {isa = PBXBuildFile; fileRef = 138FC5DF8F882025C931357A /* ge_madd.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F376A746A98DA9E64873AB71 /* sign_edwards25519sha512batch_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 159DAAF8F2C2E2FD98381064 /* sign_edwards25519sha512batch_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F4D93CDC2796EB6031799F69 /* crypto_uint16.h in Headers */ = {isa = PBXBuildFile; fileRef = 429BE12B88755FAFC48333F1 /* crypto_uint16.h */; }; - F4E7711E1607CDF00DA9F381 /* box_curve25519xsalsa20poly1305_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 5C72552919FB32E5B002DE09 /* box_curve25519xsalsa20poly1305_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F595A66F3DD56F552FCD5C63 /* Pods-tunnel-dummy.m in Sources */ = {isa = PBXBuildFile; fileRef = 4B373A2CB7A2F97F6566CD28 /* Pods-tunnel-dummy.m */; }; - F6F4A94AA84237EF6F3C7360 /* consts_aes128ctr.c in Sources */ = {isa = PBXBuildFile; fileRef = 67973A836F3717B61A960888 /* consts_aes128ctr.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F7250ED3AE9966B9FC1EEC11 /* poly1305_donna.h in Headers */ = {isa = PBXBuildFile; fileRef = 1C5338461A2AB2A2A6FD19C4 /* poly1305_donna.h */; }; - F7EED2E37E7B6055C00E6E6C /* auth_hmacsha512256_api.c in Sources */ = {isa = PBXBuildFile; fileRef = 6E5DE37777DBA77A0AE94514 /* auth_hmacsha512256_api.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - F83DBD683D2EB9D096B69634 /* poly1305_donna64.h in Headers */ = {isa = PBXBuildFile; fileRef = 4C0CAFBB4CC8D03C10A6D91B /* poly1305_donna64.h */; }; - F8D49D930B3EB1F1AAEE3BB1 /* crypto_int64.h in Headers */ = {isa = PBXBuildFile; fileRef = 17867EEC2B8D5B188BFB1010 /* crypto_int64.h */; }; - FC2157522BAE2E476A51EF0D /* crypto_scalarmult.h in Headers */ = {isa = PBXBuildFile; fileRef = 978FD50DAF5FBA41A615BE9C /* crypto_scalarmult.h */; }; - FC63C28C8DECD3956EA4F4F6 /* api.h in Headers */ = {isa = PBXBuildFile; fileRef = 28E1C7D7DB817D902EA0EC37 /* api.h */; }; - FDA2C067FAD5EB333C10932B /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = D4E2DC8C4B7C79AEC4B33EE4 /* Foundation.framework */; }; - FDD26A84EC169211EF123070 /* sc.h in Headers */ = {isa = PBXBuildFile; fileRef = 5D5A7A9722F9D6DC0BCAF736 /* sc.h */; }; - FE50C3948CB5768CB16E6277 /* fe_mul121666_curve25519_ref10.c in Sources */ = {isa = PBXBuildFile; fileRef = 488E66FCFEF14FC236DD1D7E /* fe_mul121666_curve25519_ref10.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; - FE96023AA9FCEB3C588AF8C0 /* crypto_stream_chacha20.h in Headers */ = {isa = PBXBuildFile; fileRef = 4E24E80F9678824F0A930CC0 /* crypto_stream_chacha20.h */; }; - FF2C9C8FA227566248BF93A5 /* stream_chacha20_ref.c in Sources */ = {isa = PBXBuildFile; fileRef = ABA40A93004519B3EE4DF071 /* stream_chacha20_ref.c */; settings = {COMPILER_FLAGS = "-DNATIVE_LITTLE_ENDIAN=1 -DHAVE_MADVISE -DHAVE_MMAP -DHAVE_MPROTECT -DHAVE_POSIX_MEMALIGN -DHAVE_WEAK_SYMBOLS -fno-objc-arc"; }; }; -/* End PBXBuildFile section */ - -/* Begin PBXContainerItemProxy section */ - 1FA52C570427034ABA2038B5 /* PBXContainerItemProxy */ = { - isa = PBXContainerItemProxy; - containerPortal = 13EA2FA015042E5E02522CCE /* Project object */; - proxyType = 1; - remoteGlobalIDString = 86536A03F9FAF70FD063F9C7; - remoteInfo = "Pods-tunnel-libsodium"; - }; -/* End PBXContainerItemProxy section */ - -/* Begin PBXFileReference section */ - 00707E8D704955E3AC0FB5C6 /* crypto_onetimeauth.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_onetimeauth.c; path = src/libsodium/crypto_onetimeauth/crypto_onetimeauth.c; sourceTree = ""; }; - 012F163BDD546E80000455EE /* Pods-tunnel-acknowledgements.plist */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.plist.xml; path = "Pods-tunnel-acknowledgements.plist"; sourceTree = ""; }; - 01A497FF72EAB0B2CAA6C540 /* crypto_box_curve25519xsalsa20poly1305.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_box_curve25519xsalsa20poly1305.h; path = src/libsodium/include/sodium/crypto_box_curve25519xsalsa20poly1305.h; sourceTree = ""; }; - 020A37012972D4298E29E3F1 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/aes128ctr/portable/api.h; sourceTree = ""; }; - 03A7E927EF488D7F5380F641 /* hmac_hmacsha512256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hmac_hmacsha512256.c; path = src/libsodium/crypto_auth/hmacsha512256/cp/hmac_hmacsha512256.c; sourceTree = ""; }; - 058B070BA3B6B5BCA64CA3C4 /* pwhash_scryptsalsa208sha256_sse.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = pwhash_scryptsalsa208sha256_sse.c; path = src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/pwhash_scryptsalsa208sha256_sse.c; sourceTree = ""; }; - 05AA29E97EDA5EDFA48B345D /* crypto_verify_32.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_verify_32.h; path = src/libsodium/include/sodium/crypto_verify_32.h; sourceTree = ""; }; - 06E6692C6483E2CC63302DBE /* crypto_onetimeauth.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_onetimeauth.h; path = src/libsodium/include/sodium/crypto_onetimeauth.h; sourceTree = ""; }; - 071C5BA551E9529C4E2C441B /* ge_precomp_0.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_precomp_0.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_precomp_0.c; sourceTree = ""; }; - 0727881AFE434091D3E51C50 /* xor_afternm_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = xor_afternm_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/xor_afternm_aes128ctr.c; sourceTree = ""; }; - 0A6BC2523760419BF5916DE7 /* fe_mul_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_mul_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul_curve25519_ref10.c; sourceTree = ""; }; - 0A8D08049439A1B0E857530D /* sign_ed25519_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sign_ed25519_api.c; path = src/libsodium/crypto_sign/ed25519/sign_ed25519_api.c; sourceTree = ""; }; - 0B915CFE92C911E1EBD36EAF /* crypto_stream.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_stream.c; path = src/libsodium/crypto_stream/crypto_stream.c; sourceTree = ""; }; - 0BEB316B164159804822BC16 /* xor_salsa208.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = xor_salsa208.c; path = src/libsodium/crypto_stream/salsa208/ref/xor_salsa208.c; sourceTree = ""; }; - 0E12B9F230B9798ED34FDD89 /* onetimeauth_poly1305_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = onetimeauth_poly1305_api.c; path = src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_api.c; sourceTree = ""; }; - 0E13DB7335CD6E4A5C43BAF4 /* fe_0.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_0.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_0.c; sourceTree = ""; }; - 0F0A4E7D02D6840162080E75 /* Podfile */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text; name = Podfile; path = ../Podfile; sourceTree = SOURCE_ROOT; xcLanguageSpecificationIdentifier = xcode.lang.ruby; }; - 0F391700127E0DB54E2DE4AD /* ge_sub.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge_sub.h; path = src/libsodium/crypto_sign/ed25519/ref10/ge_sub.h; sourceTree = ""; }; - 0F4C7D03C2C6188B2AF80B71 /* ge_p3_dbl.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p3_dbl.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p3_dbl.c; sourceTree = ""; }; - 11028F2FF9AF5AD25C90ECDF /* hash_sha256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hash_sha256.c; path = src/libsodium/crypto_hash/sha256/cp/hash_sha256.c; sourceTree = ""; }; - 138FC5DF8F882025C931357A /* ge_madd.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_madd.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_madd.c; sourceTree = ""; }; - 13BB77AA6A7D293F220B3F7F /* d.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = d.h; path = src/libsodium/crypto_sign/ed25519/ref10/d.h; sourceTree = ""; }; - 150B3C6BFE5BF957C676BB99 /* fe_cmov.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_cmov.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_cmov.c; sourceTree = ""; }; - 159DAAF8F2C2E2FD98381064 /* sign_edwards25519sha512batch_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sign_edwards25519sha512batch_api.c; path = src/libsodium/crypto_sign/edwards25519sha512batch/sign_edwards25519sha512batch_api.c; sourceTree = ""; }; - 1713D7C57439456E7C712F98 /* ge_scalarmult_base.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_scalarmult_base.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_scalarmult_base.c; sourceTree = ""; }; - 1725A0E61459D49A02399050 /* randombytes.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = randombytes.c; path = src/libsodium/randombytes/randombytes.c; sourceTree = ""; }; - 1749135A603803E9A8FF244B /* open.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = open.c; path = src/libsodium/crypto_sign/ed25519/ref10/open.c; sourceTree = ""; }; - 17867EEC2B8D5B188BFB1010 /* crypto_int64.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_int64.h; path = src/libsodium/include/sodium/crypto_int64.h; sourceTree = ""; }; - 1938369B9C465443CE45AAFD /* fe_add_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_add_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_add_curve25519_ref10.c; sourceTree = ""; }; - 1959AB333A2A1D98FB91B5A2 /* verify_32_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_32_api.c; path = src/libsodium/crypto_verify/32/verify_32_api.c; sourceTree = ""; }; - 195F677F0A0599938D7951D7 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/chacha20/ref/api.h; sourceTree = ""; }; - 19EDFE452C6F34D295D1F3BC /* ge_frombytes.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_frombytes.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_frombytes.c; sourceTree = ""; }; - 1C5338461A2AB2A2A6FD19C4 /* poly1305_donna.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = poly1305_donna.h; path = src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna.h; sourceTree = ""; }; - 1D2884055587BE23E501C5EF /* shorthash_siphash24_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = shorthash_siphash24_api.c; path = src/libsodium/crypto_shorthash/siphash24/shorthash_siphash24_api.c; sourceTree = ""; }; - 1E5A5E53476DCE82C25ADF5B /* crypto_core_salsa20.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_core_salsa20.h; path = src/libsodium/include/sodium/crypto_core_salsa20.h; sourceTree = ""; }; - 2273AF24AA43FE64B33E29C2 /* utils.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = utils.c; path = src/libsodium/sodium/utils.c; sourceTree = ""; }; - 22A14C9769A36AE61FB96CBA /* crypto_pwhash_scryptsalsa208sha256.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_pwhash_scryptsalsa208sha256.h; path = src/libsodium/include/sodium/crypto_pwhash_scryptsalsa208sha256.h; sourceTree = ""; }; - 22D46F98EA4E91DA6BEC2EF0 /* libPods-tunnel.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-tunnel.a"; sourceTree = BUILT_PRODUCTS_DIR; }; - 22D801B543A74C07DBAA66F5 /* sqrtm1.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = sqrtm1.h; path = src/libsodium/crypto_sign/ed25519/ref10/sqrtm1.h; sourceTree = ""; }; - 2371B0B7FB4AA82BFD863BA0 /* crypto_core_salsa208.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_core_salsa208.h; path = src/libsodium/include/sodium/crypto_core_salsa208.h; sourceTree = ""; }; - 2432A1187CA0FE5334177FD2 /* ge25519.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge25519.h; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519.h; sourceTree = ""; }; - 248AFA9CBAF954B97AFE264A /* verify_poly1305_donna.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_poly1305_donna.c; path = src/libsodium/crypto_onetimeauth/poly1305/donna/verify_poly1305_donna.c; sourceTree = ""; }; - 24A5B00799A2F5E3D685DB2B /* pwhash_scryptsalsa208sha256_nosse.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = pwhash_scryptsalsa208sha256_nosse.c; path = src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/pwhash_scryptsalsa208sha256_nosse.c; sourceTree = ""; }; - 2514BC50F5DC3AF58A295071 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_verify/64/ref/api.h; sourceTree = ""; }; - 25529243AAFD42DDF95514B5 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/salsa20/amd64_xmm6/api.h; sourceTree = ""; }; - 2650B4B3ECEB95C79760CC5A /* ge_p2_0.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p2_0.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p2_0.c; sourceTree = ""; }; - 26B7C0F56D4026A4F2785A4A /* stream_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/stream_aes128ctr.c; sourceTree = ""; }; - 26D61DE1B97AB08C24C6DE69 /* core_salsa2012.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_salsa2012.c; path = src/libsodium/crypto_core/salsa2012/ref/core_salsa2012.c; sourceTree = ""; }; - 276E9E389A0F31D27F19C627 /* Pods-tunnel-libsodium-dummy.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = "Pods-tunnel-libsodium-dummy.m"; sourceTree = ""; }; - 2794A3EE0ABDFA441E3F6C59 /* auth_hmacsha256_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = auth_hmacsha256_api.c; path = src/libsodium/crypto_auth/hmacsha256/auth_hmacsha256_api.c; sourceTree = ""; }; - 28E1C7D7DB817D902EA0EC37 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_core/salsa2012/ref/api.h; sourceTree = ""; }; - 28FBC3E5997D8CD343594DA5 /* sysendian.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = sysendian.h; path = src/libsodium/crypto_pwhash/scryptsalsa208sha256/sysendian.h; sourceTree = ""; }; - 29876F5318BDF8517D4C3ADD /* randombytes_salsa20_random.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = randombytes_salsa20_random.h; path = src/libsodium/include/sodium/randombytes_salsa20_random.h; sourceTree = ""; }; - 29A21DDE753201AEC0AE7F86 /* verify_64.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_64.c; path = src/libsodium/crypto_verify/64/ref/verify_64.c; sourceTree = ""; }; - 2C828B6A278B3AB54565DC3C /* sc25519.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = sc25519.h; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519.h; sourceTree = ""; }; - 2C847439A693155AFE2C0E56 /* pow225521.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pow225521.h; path = src/libsodium/crypto_scalarmult/curve25519/ref10/pow225521.h; sourceTree = ""; }; - 2D1C07DA7D984E770C207414 /* blake2-impl.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = "blake2-impl.h"; path = "src/libsodium/crypto_generichash/blake2/ref/blake2-impl.h"; sourceTree = ""; }; - 2E685A7C56329D9A9C5022F7 /* fe_sq_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_sq_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sq_curve25519_ref10.c; sourceTree = ""; }; - 2EBA3AB16F34BB99C95D1970 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_scalarmult/curve25519/donna_c64/api.h; sourceTree = ""; }; - 2ED32CFFA073329EBFFB4F24 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/salsa2012/ref/api.h; sourceTree = ""; }; - 2F869655F6B64B120E21446F /* scalarmult_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = scalarmult_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/scalarmult_curve25519_ref10.c; sourceTree = ""; }; - 2F90F69215B53DF524540863 /* fe_frombytes.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_frombytes.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_frombytes.c; sourceTree = ""; }; - 30211B1A9E97C0DBA492D72F /* crypto_stream_salsa2012.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream_salsa2012.h; path = src/libsodium/include/sodium/crypto_stream_salsa2012.h; sourceTree = ""; }; - 30C513C462D9055D9989AC7C /* fe_isnonzero.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_isnonzero.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_isnonzero.c; sourceTree = ""; }; - 319BD90F9417C61EFBA28D44 /* pbkdf2-sha256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = "pbkdf2-sha256.c"; path = "src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.c"; sourceTree = ""; }; - 31DB52C77394C80674393C18 /* crypto_hash.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_hash.h; path = src/libsodium/include/sodium/crypto_hash.h; sourceTree = ""; }; - 33113E14D3DFD631967878DE /* keypair_curve25519xsalsa20poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = keypair_curve25519xsalsa20poly1305.c; path = src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/keypair_curve25519xsalsa20poly1305.c; sourceTree = ""; }; - 365969BB2ED5AD3028E72B73 /* onetimeauth_poly1305_try.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = onetimeauth_poly1305_try.c; path = src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_try.c; sourceTree = ""; }; - 367EA4D4E191530172845BC8 /* ge_add.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge_add.h; path = src/libsodium/crypto_sign/ed25519/ref10/ge_add.h; sourceTree = ""; }; - 371715F198BC4C201140F062 /* common.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = common.h; path = src/libsodium/crypto_stream/aes128ctr/portable/common.h; sourceTree = ""; }; - 37A70325C8922E2AFD448AC3 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_core/salsa20/ref/api.h; sourceTree = ""; }; - 37E5BE3C8B4B294513A848DD /* sc25519_edwards25519sha512batch.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sc25519_edwards25519sha512batch.c; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519_edwards25519sha512batch.c; sourceTree = ""; }; - 37F7327008A60A557C15C802 /* crypto_stream_salsa208.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream_salsa208.h; path = src/libsodium/include/sodium/crypto_stream_salsa208.h; sourceTree = ""; }; - 3873AE14E475E423F1E123C0 /* ge_double_scalarmult.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_double_scalarmult.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_double_scalarmult.c; sourceTree = ""; }; - 3B27A1516A02E20569E86068 /* ge_p1p1_to_p2.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p1p1_to_p2.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p2.c; sourceTree = ""; }; - 3C31FBD4C7750F2A2ACF9A5F /* fe_isnegative.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_isnegative.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_isnegative.c; sourceTree = ""; }; - 3C5A79ABC7C3252C7549BFA3 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_auth/hmacsha512/cp/api.h; sourceTree = ""; }; - 3D8C5DED4359DDC7CFB5D4BA /* ge_p3_0.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p3_0.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p3_0.c; sourceTree = ""; }; - 3E664EEA2A86DB3B9C442413 /* crypto_sign.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_sign.c; path = src/libsodium/crypto_sign/crypto_sign.c; sourceTree = ""; }; - 3E8D5633B3CF6884F7F1318B /* core_salsa20.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_salsa20.c; path = src/libsodium/crypto_core/salsa20/ref/core_salsa20.c; sourceTree = ""; }; - 3EAC82063DFF101CD226B4D3 /* crypto_secretbox.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_secretbox.h; path = src/libsodium/include/sodium/crypto_secretbox.h; sourceTree = ""; }; - 3F0F47830D5A395DB404CCF1 /* crypto_auth.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_auth.h; path = src/libsodium/include/sodium/crypto_auth.h; sourceTree = ""; }; - 3FE70303F1A369116244E874 /* stream_salsa2012.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_salsa2012.c; path = src/libsodium/crypto_stream/salsa2012/ref/stream_salsa2012.c; sourceTree = ""; }; - 408413F992230ED7A379B041 /* fe_invert.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_invert.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_invert.c; sourceTree = ""; }; - 414E8F8F75CF6EC36226C8E9 /* sign_edwards25519sha512batch.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sign_edwards25519sha512batch.c; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/sign_edwards25519sha512batch.c; sourceTree = ""; }; - 427949CCCDB8AE45CEF2CFDD /* common_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = common_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/common_aes128ctr.c; sourceTree = ""; }; - 429BE12B88755FAFC48333F1 /* crypto_uint16.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_uint16.h; path = src/libsodium/include/sodium/crypto_uint16.h; sourceTree = ""; }; - 42F89E6AF4AA77AE0468F851 /* fe_sub_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_sub_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sub_curve25519_ref10.c; sourceTree = ""; }; - 4405EAE71BFB3B55D65C890E /* verify_32.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_32.c; path = src/libsodium/crypto_verify/32/ref/verify_32.c; sourceTree = ""; }; - 45177EB1A81E2754ED9AD21D /* fe_copy_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_copy_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_copy_curve25519_ref10.c; sourceTree = ""; }; - 4602E462319BE6376D1AE541 /* generichash_blake2b.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = generichash_blake2b.c; path = src/libsodium/crypto_generichash/blake2/ref/generichash_blake2b.c; sourceTree = ""; }; - 46187615A88F584F635D3671 /* consts.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = consts.h; path = src/libsodium/crypto_stream/aes128ctr/portable/consts.h; sourceTree = ""; }; - 488E66FCFEF14FC236DD1D7E /* fe_mul121666_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_mul121666_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul121666_curve25519_ref10.c; sourceTree = ""; }; - 491AD13C6CD2213E240384B5 /* box_xsalsa20poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = box_xsalsa20poly1305.c; path = src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/box_xsalsa20poly1305.c; sourceTree = ""; }; - 493B72DC069061B67C0A17F6 /* crypto_sign.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_sign.h; path = src/libsodium/include/sodium/crypto_sign.h; sourceTree = ""; }; - 4AA9E8BC7D940C4F9C2263F2 /* stream_chacha20_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_chacha20_api.c; path = src/libsodium/crypto_stream/chacha20/stream_chacha20_api.c; sourceTree = ""; }; - 4B152261A5CDE869DB101E6E /* auth_hmacsha512_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = auth_hmacsha512_api.c; path = src/libsodium/crypto_auth/hmacsha512/auth_hmacsha512_api.c; sourceTree = ""; }; - 4B373A2CB7A2F97F6566CD28 /* Pods-tunnel-dummy.m */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.objc; path = "Pods-tunnel-dummy.m"; sourceTree = ""; }; - 4B867DB2872926EB5EC732E6 /* crypto_shorthash.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_shorthash.h; path = src/libsodium/include/sodium/crypto_shorthash.h; sourceTree = ""; }; - 4C0CAFBB4CC8D03C10A6D91B /* poly1305_donna64.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = poly1305_donna64.h; path = src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h; sourceTree = ""; }; - 4D6310B9318EF66834224898 /* fe_mul.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_mul.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_mul.c; sourceTree = ""; }; - 4E1EA929F1044F6284578EB6 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_hash/sha512/cp/api.h; sourceTree = ""; }; - 4E24E80F9678824F0A930CC0 /* crypto_stream_chacha20.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream_chacha20.h; path = src/libsodium/include/sodium/crypto_stream_chacha20.h; sourceTree = ""; }; - 509D0E694E83C968E34FA1CD /* crypto_auth_hmacsha256.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_auth_hmacsha256.h; path = src/libsodium/include/sodium/crypto_auth_hmacsha256.h; sourceTree = ""; }; - 50C8665993978345700711D5 /* crypto_stream_aes128ctr.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream_aes128ctr.h; path = src/libsodium/include/sodium/crypto_stream_aes128ctr.h; sourceTree = ""; }; - 518EA6234FF14F3E0F05617D /* fe_pow22523.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_pow22523.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_pow22523.c; sourceTree = ""; }; - 5285A8C8877DD4DEBDC67C8F /* Pods-tunnel-libsodium-Private.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-tunnel-libsodium-Private.xcconfig"; sourceTree = ""; }; - 53FC28C746A1E6FE2FFF1011 /* crypto_auth_hmacsha512256.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_auth_hmacsha512256.h; path = src/libsodium/include/sodium/crypto_auth_hmacsha512256.h; sourceTree = ""; }; - 5637715786C139B9D11CC612 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_verify/32/ref/api.h; sourceTree = ""; }; - 56763F43853DEFDBCE12543A /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_core/salsa208/ref/api.h; sourceTree = ""; }; - 5683CAB36F4425F1C5D1BF34 /* libPods-tunnel-libsodium.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-tunnel-libsodium.a"; sourceTree = BUILT_PRODUCTS_DIR; }; - 5725A0158D8FE8487E59BB05 /* crypto_scrypt.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_scrypt.h; path = src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h; sourceTree = ""; }; - 577F46D6E71994828662A9CD /* crypto_auth.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_auth.c; path = src/libsodium/crypto_auth/crypto_auth.c; sourceTree = ""; }; - 5875FE95C134585B0402A950 /* pbkdf2-sha256.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = "pbkdf2-sha256.h"; path = "src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h"; sourceTree = ""; }; - 58810358CDBEA2D923F35911 /* Pods-tunnel-resources.sh */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.script.sh; path = "Pods-tunnel-resources.sh"; sourceTree = ""; }; - 5972B14511EA99D60F57C9CF /* base2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = base2.h; path = src/libsodium/crypto_sign/ed25519/ref10/base2.h; sourceTree = ""; }; - 59B849DB4178F152329030FA /* montgomery.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = montgomery.h; path = src/libsodium/crypto_scalarmult/curve25519/ref10/montgomery.h; sourceTree = ""; }; - 5C72552919FB32E5B002DE09 /* box_curve25519xsalsa20poly1305_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = box_curve25519xsalsa20poly1305_api.c; path = src/libsodium/crypto_box/curve25519xsalsa20poly1305/box_curve25519xsalsa20poly1305_api.c; sourceTree = ""; }; - 5C879DA600DD4222443ECA3D /* crypto_stream_xsalsa20.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream_xsalsa20.h; path = src/libsodium/include/sodium/crypto_stream_xsalsa20.h; sourceTree = ""; }; - 5D5401DEFB2EE8A3872A761F /* after_curve25519xsalsa20poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = after_curve25519xsalsa20poly1305.c; path = src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/after_curve25519xsalsa20poly1305.c; sourceTree = ""; }; - 5D5A7A9722F9D6DC0BCAF736 /* sc.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = sc.h; path = src/libsodium/crypto_sign/ed25519/ref10/sc.h; sourceTree = ""; }; - 5D98CF0F0084FD611FB18EDC /* verify_hmacsha512.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_hmacsha512.c; path = src/libsodium/crypto_auth/hmacsha512/cp/verify_hmacsha512.c; sourceTree = ""; }; - 5F60BECA4484423123ACA672 /* hmac_hmacsha256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hmac_hmacsha256.c; path = src/libsodium/crypto_auth/hmacsha256/cp/hmac_hmacsha256.c; sourceTree = ""; }; - 61FEEC5F11A373E1941A46D7 /* crypto_generichash_blake2b.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_generichash_blake2b.h; path = src/libsodium/include/sodium/crypto_generichash_blake2b.h; sourceTree = ""; }; - 6244A39CDA0636BDDFDB6A7D /* crypto_scalarmult_curve25519.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_scalarmult_curve25519.h; path = src/libsodium/include/sodium/crypto_scalarmult_curve25519.h; sourceTree = ""; }; - 63B0DA706FD08AD12D8B6AD8 /* crypto_box.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_box.c; path = src/libsodium/crypto_box/crypto_box.c; sourceTree = ""; }; - 65415428101F20CFFFEDEC8A /* box_curve25519xsalsa20poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = box_curve25519xsalsa20poly1305.c; path = src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/box_curve25519xsalsa20poly1305.c; sourceTree = ""; }; - 65C37A56EAAAFDCB9F190276 /* fe_0_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_0_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_0_curve25519_ref10.c; sourceTree = ""; }; - 6654B0AA2F0E7A315578F3DC /* d2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = d2.h; path = src/libsodium/crypto_sign/ed25519/ref10/d2.h; sourceTree = ""; }; - 66B3010936D50A5959DD45B7 /* core_salsa208_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_salsa208_api.c; path = src/libsodium/crypto_core/salsa208/core_salsa208_api.c; sourceTree = ""; }; - 67973A836F3717B61A960888 /* consts_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = consts_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/consts_aes128ctr.c; sourceTree = ""; }; - 68FBD3E992C8BBE7DB4E81B1 /* ge_p3_to_p2.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p3_to_p2.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_p2.c; sourceTree = ""; }; - 69C76E94B58CEF60391A27A7 /* utils.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = utils.h; path = src/libsodium/include/sodium/utils.h; sourceTree = ""; }; - 6ABE0D9584CEBA971F5A368F /* keypair.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = keypair.c; path = src/libsodium/crypto_sign/ed25519/ref10/keypair.c; sourceTree = ""; }; - 6DB78F818477151BF07666ED /* fe25519.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = fe25519.h; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519.h; sourceTree = ""; }; - 6DDB9E7CF1BDEECAD8AD3D8F /* core_salsa2012_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_salsa2012_api.c; path = src/libsodium/crypto_core/salsa2012/core_salsa2012_api.c; sourceTree = ""; }; - 6DE3EA8AF034E71AB50CD9E4 /* fe25519_edwards25519sha512batch.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe25519_edwards25519sha512batch.c; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519_edwards25519sha512batch.c; sourceTree = ""; }; - 6DF1E2635210A36B9F759872 /* sign.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sign.c; path = src/libsodium/crypto_sign/ed25519/ref10/sign.c; sourceTree = ""; }; - 6E5DE37777DBA77A0AE94514 /* auth_hmacsha512256_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = auth_hmacsha512256_api.c; path = src/libsodium/crypto_auth/hmacsha512256/auth_hmacsha512256_api.c; sourceTree = ""; }; - 6EE962CBDDE4384282CC3CC4 /* ge_p3_tobytes.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p3_tobytes.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p3_tobytes.c; sourceTree = ""; }; - 709E9BBA823D2D70E7A8C1DB /* crypto_secretbox_xsalsa20poly1305.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_secretbox_xsalsa20poly1305.h; path = src/libsodium/include/sodium/crypto_secretbox_xsalsa20poly1305.h; sourceTree = ""; }; - 721D4E4E60DE823367032F04 /* ge_p1p1_to_p3.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p1p1_to_p3.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p3.c; sourceTree = ""; }; - 723539479CC51BD74EFE1CFE /* ge_add.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_add.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_add.c; sourceTree = ""; }; - 72A19831A471CF1382EA4593 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_auth/hmacsha512256/cp/api.h; sourceTree = ""; }; - 759520B57632B96F388D7C8C /* fe_neg.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_neg.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_neg.c; sourceTree = ""; }; - 75A915A0226F0839B5AB69B6 /* stream_salsa20_ref.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_salsa20_ref.c; path = src/libsodium/crypto_stream/salsa20/ref/stream_salsa20_ref.c; sourceTree = ""; }; - 768A100B6899C00552DC7A00 /* crypto_box_seal.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_box_seal.c; path = src/libsodium/crypto_box/crypto_box_seal.c; sourceTree = ""; }; - 76F194ACD3C5AA2BA71732E2 /* verify_16.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_16.c; path = src/libsodium/crypto_verify/16/ref/verify_16.c; sourceTree = ""; }; - 786FBF4246CFDA038FD37DCC /* sc_reduce.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sc_reduce.c; path = src/libsodium/crypto_sign/ed25519/ref10/sc_reduce.c; sourceTree = ""; }; - 79F9DA32782783D6295CD029 /* crypto_sign_ed25519.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_sign_ed25519.h; path = src/libsodium/include/sodium/crypto_sign_ed25519.h; sourceTree = ""; }; - 7AB43E7C4B9521F96A9BDA8D /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_generichash/blake2/ref/api.h; sourceTree = ""; }; - 7CA6C56D883E55E040770F9A /* base_curve25519_donna_c64.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = base_curve25519_donna_c64.c; path = src/libsodium/crypto_scalarmult/curve25519/donna_c64/base_curve25519_donna_c64.c; sourceTree = ""; }; - 7ED005C5A4DDFF00C9E4B83A /* fe_1_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_1_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_1_curve25519_ref10.c; sourceTree = ""; }; - 7F5122533F1D1F275DF7DE03 /* before_curve25519xsalsa20poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = before_curve25519xsalsa20poly1305.c; path = src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/before_curve25519xsalsa20poly1305.c; sourceTree = ""; }; - 80198EBD6EB8CD0AD3FEB08F /* crypto_hash_sha256.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_hash_sha256.h; path = src/libsodium/include/sodium/crypto_hash_sha256.h; sourceTree = ""; }; - 81A9FF8AB3D68CEFAFBC15F3 /* fe_cswap_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_cswap_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_cswap_curve25519_ref10.c; sourceTree = ""; }; - 831177D95FB3B619E0D79FEE /* stream_aes128ctr_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_aes128ctr_api.c; path = src/libsodium/crypto_stream/aes128ctr/stream_aes128ctr_api.c; sourceTree = ""; }; - 85EE7273A3A5255017CE8398 /* crypto_hash.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_hash.c; path = src/libsodium/crypto_hash/crypto_hash.c; sourceTree = ""; }; - 86448ED32443F62CCDC72FD9 /* beforenm_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = beforenm_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/beforenm_aes128ctr.c; sourceTree = ""; }; - 86DF2B6CE6335EE5EF5BEFFA /* fe_frombytes_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_frombytes_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_frombytes_curve25519_ref10.c; sourceTree = ""; }; - 895A11B6A59DC77FBB4732FC /* hash_sha256_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hash_sha256_api.c; path = src/libsodium/crypto_hash/sha256/hash_sha256_api.c; sourceTree = ""; }; - 8A63634BFD14C8EA43626054 /* ge_madd.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge_madd.h; path = src/libsodium/crypto_sign/ed25519/ref10/ge_madd.h; sourceTree = ""; }; - 8B0AC198F0C58CF0034D5A4C /* Pods-tunnel.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-tunnel.debug.xcconfig"; sourceTree = ""; }; - 8C3818070309CD8D833394F4 /* core_salsa208.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_salsa208.c; path = src/libsodium/crypto_core/salsa208/ref/core_salsa208.c; sourceTree = ""; }; - 8C8CDDE5589DD8CB205E2A55 /* stream_xsalsa20_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_xsalsa20_api.c; path = src/libsodium/crypto_stream/xsalsa20/stream_xsalsa20_api.c; sourceTree = ""; }; - 8D3630A9EE835623597C3F22 /* xor_salsa20_ref.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = xor_salsa20_ref.c; path = src/libsodium/crypto_stream/salsa20/ref/xor_salsa20_ref.c; sourceTree = ""; }; - 8E39325FCEC1AFA5F6289EEF /* crypto_generichash.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_generichash.c; path = src/libsodium/crypto_generichash/crypto_generichash.c; sourceTree = ""; }; - 903D2A2C61508AFDC32715AC /* fe_copy.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_copy.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_copy.c; sourceTree = ""; }; - 90A60C3579D53C5F6D0AD562 /* pwhash_scryptsalsa208sha256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = pwhash_scryptsalsa208sha256.c; path = src/libsodium/crypto_pwhash/scryptsalsa208sha256/pwhash_scryptsalsa208sha256.c; sourceTree = ""; }; - 90C4C7CDE8784FB3D98A615A /* Pods-tunnel-libsodium-prefix.pch */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = "Pods-tunnel-libsodium-prefix.pch"; sourceTree = ""; }; - 9198EFEC7CD551CE29D66D66 /* crypto_core_hsalsa20.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_core_hsalsa20.h; path = src/libsodium/include/sodium/crypto_core_hsalsa20.h; sourceTree = ""; }; - 9421587B3BF5B6F3791680F0 /* shorthash_siphash24.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = shorthash_siphash24.c; path = src/libsodium/crypto_shorthash/siphash24/ref/shorthash_siphash24.c; sourceTree = ""; }; - 94AE296601CF4D10128D621E /* fe_add.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_add.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_add.c; sourceTree = ""; }; - 9555C83472AAFDE29656B225 /* ge.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge.h; path = src/libsodium/crypto_sign/ed25519/ref10/ge.h; sourceTree = ""; }; - 956B33854CDE0F7144A873A2 /* fe.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = fe.h; path = src/libsodium/crypto_sign/ed25519/ref10/fe.h; sourceTree = ""; }; - 95791D3BE0C165F975456F0B /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_sign/ed25519/ref10/api.h; sourceTree = ""; }; - 95C101C7B94625E63636C04C /* crypto_uint8.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_uint8.h; path = src/libsodium/include/sodium/crypto_uint8.h; sourceTree = ""; }; - 96044DC98EBA5637F2B29D50 /* ge_p2_dbl.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge_p2_dbl.h; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.h; sourceTree = ""; }; - 978FD50DAF5FBA41A615BE9C /* crypto_scalarmult.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_scalarmult.h; path = src/libsodium/include/sodium/crypto_scalarmult.h; sourceTree = ""; }; - 97AD806A5805CF401F2BEC86 /* xor_salsa2012.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = xor_salsa2012.c; path = src/libsodium/crypto_stream/salsa2012/ref/xor_salsa2012.c; sourceTree = ""; }; - 99892E4B5B13801B958F4D8A /* crypto_scalarmult.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_scalarmult.c; path = src/libsodium/crypto_scalarmult/crypto_scalarmult.c; sourceTree = ""; }; - 99EFAA6F4EFCE2CCF7A37027 /* crypto_scrypt-common.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = "crypto_scrypt-common.c"; path = "src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt-common.c"; sourceTree = ""; }; - 9A25C095AF475745BF03786C /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_verify/16/ref/api.h; sourceTree = ""; }; - 9A279D50F69DDE8E9E56CDEC /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_hash/sha256/cp/api.h; sourceTree = ""; }; - 9ADC87EFE9E50BBE8F7CD55B /* crypto_int32.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_int32.h; path = src/libsodium/include/sodium/crypto_int32.h; sourceTree = ""; }; - 9F05FAB70F81751A5BEF13E4 /* verify_hmacsha256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_hmacsha256.c; path = src/libsodium/crypto_auth/hmacsha256/cp/verify_hmacsha256.c; sourceTree = ""; }; - A10FCFBE21C652B6F2101144 /* int128.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = int128.h; path = src/libsodium/crypto_stream/aes128ctr/portable/int128.h; sourceTree = ""; }; - A2399F9697708F12641C8E08 /* scrypt_platform.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = scrypt_platform.c; path = src/libsodium/crypto_pwhash/scryptsalsa208sha256/scrypt_platform.c; sourceTree = ""; }; - A241E2106FFF43EA0ED7F70E /* poly1305_donna32.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = poly1305_donna32.h; path = src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h; sourceTree = ""; }; - A325D26842B99A8DFD3BAC59 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/api.h; sourceTree = ""; }; - A41213709C1EFB7052A7A41F /* secretbox_xsalsa20poly1305_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = secretbox_xsalsa20poly1305_api.c; path = src/libsodium/crypto_secretbox/xsalsa20poly1305/secretbox_xsalsa20poly1305_api.c; sourceTree = ""; }; - A6C218AF0542EB64CFC681A8 /* Pods-tunnel-environment.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; path = "Pods-tunnel-environment.h"; sourceTree = ""; }; - A70E46D2A5C546CA6FA79722 /* randombytes_salsa20_random.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = randombytes_salsa20_random.c; path = src/libsodium/randombytes/salsa20/randombytes_salsa20_random.c; sourceTree = ""; }; - ABA40A93004519B3EE4DF071 /* stream_chacha20_ref.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_chacha20_ref.c; path = src/libsodium/crypto_stream/chacha20/ref/stream_chacha20_ref.c; sourceTree = ""; }; - AC7A444150796259DAFAE685 /* generichash_blake2_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = generichash_blake2_api.c; path = src/libsodium/crypto_generichash/blake2/generichash_blake2_api.c; sourceTree = ""; }; - AD2E2C6C187FAF335798FEC4 /* ge_msub.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = ge_msub.h; path = src/libsodium/crypto_sign/ed25519/ref10/ge_msub.h; sourceTree = ""; }; - AD92BF9F6E1246344CAC96A9 /* sc_muladd.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = sc_muladd.c; path = src/libsodium/crypto_sign/ed25519/ref10/sc_muladd.c; sourceTree = ""; }; - AE6E3C354E16164F9F0A1DF6 /* Pods-tunnel.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-tunnel.release.xcconfig"; sourceTree = ""; }; - AFBDA2E3B12E2F1A6E8318F1 /* fe_invert_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_invert_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_invert_curve25519_ref10.c; sourceTree = ""; }; - B06C3F859BB350401B69D350 /* crypto_box.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_box.h; path = src/libsodium/include/sodium/crypto_box.h; sourceTree = ""; }; - B25E3E58B02C6FDF8471D99B /* runtime.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = runtime.h; path = src/libsodium/include/sodium/runtime.h; sourceTree = ""; }; - B286E9D1BCC17C31E361A1BB /* crypto_stream_salsa20.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream_salsa20.h; path = src/libsodium/include/sodium/crypto_stream_salsa20.h; sourceTree = ""; }; - B3CB202E34EAD35433CE317D /* Pods-tunnel-acknowledgements.markdown */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text; path = "Pods-tunnel-acknowledgements.markdown"; sourceTree = ""; }; - B4D969DE62BB664A67A93036 /* crypto_core_salsa2012.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_core_salsa2012.h; path = src/libsodium/include/sodium/crypto_core_salsa2012.h; sourceTree = ""; }; - B5252F27C1B2E2A4E6EFFCFC /* smult_curve25519_donna_c64.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = smult_curve25519_donna_c64.c; path = src/libsodium/crypto_scalarmult/curve25519/donna_c64/smult_curve25519_donna_c64.c; sourceTree = ""; }; - B577385F8D2E92F11980F829 /* core.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = core.h; path = src/libsodium/include/sodium/core.h; sourceTree = ""; }; - B6D9E094227A21FD59753747 /* crypto_hash_sha512.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_hash_sha512.h; path = src/libsodium/include/sodium/crypto_hash_sha512.h; sourceTree = ""; }; - B75F70AAB0A7370E7C67F9BC /* crypto_shorthash.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_shorthash.c; path = src/libsodium/crypto_shorthash/crypto_shorthash.c; sourceTree = ""; }; - B79781E9CC0289F6E56E5C1E /* xor_xsalsa20.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = xor_xsalsa20.c; path = src/libsodium/crypto_stream/xsalsa20/ref/xor_xsalsa20.c; sourceTree = ""; }; - B7A12BABF2799A7E02441B18 /* crypto_verify_16.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_verify_16.h; path = src/libsodium/include/sodium/crypto_verify_16.h; sourceTree = ""; }; - B8635166E75C93366B19ED25 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_core/hsalsa20/ref2/api.h; sourceTree = ""; }; - B8E30F20DFD57F541BFACCB8 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/salsa20/ref/api.h; sourceTree = ""; }; - BA79F309715603BED61CF993 /* crypto_auth_hmacsha512.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_auth_hmacsha512.h; path = src/libsodium/include/sodium/crypto_auth_hmacsha512.h; sourceTree = ""; }; - BBB91FDBF11B5D264F9F7846 /* Pods-tunnel-libsodium.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; path = "Pods-tunnel-libsodium.xcconfig"; sourceTree = ""; }; - BCCE9C915DC5F0CF15042B7D /* crypto_sign_edwards25519sha512batch.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_sign_edwards25519sha512batch.h; path = src/libsodium/include/sodium/crypto_sign_edwards25519sha512batch.h; sourceTree = ""; }; - BD307648ACA4467FECFC174B /* sodium.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = sodium.h; path = src/libsodium/include/sodium.h; sourceTree = ""; }; - BFD8FA9B008322ACF1796251 /* aead_chacha20poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = aead_chacha20poly1305.c; path = src/libsodium/crypto_aead/chacha20poly1305/sodium/aead_chacha20poly1305.c; sourceTree = ""; }; - C200545DEE4752315199A764 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_scalarmult/curve25519/ref10/api.h; sourceTree = ""; }; - C20FBFA753379CB6DD68F7BA /* randombytes_sysrandom.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = randombytes_sysrandom.c; path = src/libsodium/randombytes/sysrandom/randombytes_sysrandom.c; sourceTree = ""; }; - C32D5866787E3B8D592E631F /* fe.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = fe.h; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe.h; sourceTree = ""; }; - C3C74D894188286BD858E431 /* core_salsa20_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_salsa20_api.c; path = src/libsodium/crypto_core/salsa20/core_salsa20_api.c; sourceTree = ""; }; - C3D77D841EC4DDC1383C8AFA /* blake2.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = blake2.h; path = src/libsodium/crypto_generichash/blake2/ref/blake2.h; sourceTree = ""; }; - C3EAE71A26EE484EE15253D7 /* ge_msub.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_msub.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_msub.c; sourceTree = ""; }; - C51774E5369842AA53D340F6 /* fe_sq.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_sq.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_sq.c; sourceTree = ""; }; - C64296F57429EF7C8CE7A201 /* verify_64_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_64_api.c; path = src/libsodium/crypto_verify/64/verify_64_api.c; sourceTree = ""; }; - C68B2714CAE229C33DF77560 /* base.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = base.h; path = src/libsodium/crypto_sign/ed25519/ref10/base.h; sourceTree = ""; }; - C6D0025BE4C1273A29F9E765 /* stream_salsa2012_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_salsa2012_api.c; path = src/libsodium/crypto_stream/salsa2012/stream_salsa2012_api.c; sourceTree = ""; }; - C7106A9333FF1E683CA0ADCD /* blake2b-ref.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = "blake2b-ref.c"; path = "src/libsodium/crypto_generichash/blake2/ref/blake2b-ref.c"; sourceTree = ""; }; - C74A193384A062C825A6C34F /* crypto_generichash.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_generichash.h; path = src/libsodium/include/sodium/crypto_generichash.h; sourceTree = ""; }; - C7AC311D628DA701F7ED9554 /* randombytes_sysrandom.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = randombytes_sysrandom.h; path = src/libsodium/include/sodium/randombytes_sysrandom.h; sourceTree = ""; }; - C7F8694654F49C05A86A3BDC /* stream_xsalsa20.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_xsalsa20.c; path = src/libsodium/crypto_stream/xsalsa20/ref/stream_xsalsa20.c; sourceTree = ""; }; - C8510E2D3E614D5BE15CB491 /* fe_tobytes_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_tobytes_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/fe_tobytes_curve25519_ref10.c; sourceTree = ""; }; - C902EB4FC10A7B3510E3CF21 /* fe_sub.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_sub.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_sub.c; sourceTree = ""; }; - CAD94B5683A401522B535F34 /* export.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = export.h; path = src/libsodium/include/sodium/export.h; sourceTree = ""; }; - CC4AA5E3964AFDB2610B54CE /* fe_1.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_1.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_1.c; sourceTree = ""; }; - CC78DEE2431E01BDC712AC48 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_auth/hmacsha256/cp/api.h; sourceTree = ""; }; - CCA7366EE21E142AB5455133 /* pow22523.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pow22523.h; path = src/libsodium/crypto_sign/ed25519/ref10/pow22523.h; sourceTree = ""; }; - CE2DDA71EC5A6326FBC456EC /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_shorthash/siphash24/ref/api.h; sourceTree = ""; }; - CEECEC265FE0FF38F298584D /* onetimeauth_poly1305.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = onetimeauth_poly1305.c; path = src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305.c; sourceTree = ""; }; - CF127642348F68F53A657706 /* crypto_onetimeauth_poly1305.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_onetimeauth_poly1305.h; path = src/libsodium/include/sodium/crypto_onetimeauth_poly1305.h; sourceTree = ""; }; - CF259D23E5C254F354F8C8C9 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/api.h; sourceTree = ""; }; - CFE44E91401D6C98EF8CD496 /* hmac_hmacsha512.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hmac_hmacsha512.c; path = src/libsodium/crypto_auth/hmacsha512/cp/hmac_hmacsha512.c; sourceTree = ""; }; - D02FCD814541B84EE5C9C635 /* core_hsalsa20.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_hsalsa20.c; path = src/libsodium/crypto_core/hsalsa20/ref2/core_hsalsa20.c; sourceTree = ""; }; - D03ED01925588701B90FD7FF /* int128_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = int128_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/int128_aes128ctr.c; sourceTree = ""; }; - D222554AE7AA358158562F3A /* pow225521.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = pow225521.h; path = src/libsodium/crypto_sign/ed25519/ref10/pow225521.h; sourceTree = ""; }; - D22C48E11116925FE158876B /* ge_p2_dbl.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p2_dbl.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.c; sourceTree = ""; }; - D245C98D3586B936BFD95530 /* crypto_secretbox.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_secretbox.c; path = src/libsodium/crypto_secretbox/crypto_secretbox.c; sourceTree = ""; }; - D4E2DC8C4B7C79AEC4B33EE4 /* Foundation.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = Foundation.framework; path = Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS8.3.sdk/System/Library/Frameworks/Foundation.framework; sourceTree = DEVELOPER_DIR; }; - D547B5A6DADC5C3D9959B8A9 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/api.h; sourceTree = ""; }; - D58FA1D54D49FCDA2733C60E /* base_curve25519_ref10.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = base_curve25519_ref10.c; path = src/libsodium/crypto_scalarmult/curve25519/ref10/base_curve25519_ref10.c; sourceTree = ""; }; - D75547E46784491B8BD08B37 /* fe_sq2.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_sq2.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_sq2.c; sourceTree = ""; }; - DA6222CE3B5C1B0A5AAC6A3B /* afternm_aes128ctr.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = afternm_aes128ctr.c; path = src/libsodium/crypto_stream/aes128ctr/portable/afternm_aes128ctr.c; sourceTree = ""; }; - DAE50519077C79FCA266F110 /* ge25519_edwards25519sha512batch.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge25519_edwards25519sha512batch.c; path = src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519_edwards25519sha512batch.c; sourceTree = ""; }; - DB8893EAE6713000237E0F50 /* crypto_uint64.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_uint64.h; path = src/libsodium/include/sodium/crypto_uint64.h; sourceTree = ""; }; - DCEA864ED72A0C3DA9A31359 /* version.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = version.h; path = src/libsodium/include/sodium/version.h; sourceTree = ""; }; - DF0832E3DA791B7E40A3CE90 /* ge_sub.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_sub.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_sub.c; sourceTree = ""; }; - E07D016A392CD071573E2DA1 /* core_hsalsa20_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core_hsalsa20_api.c; path = src/libsodium/crypto_core/hsalsa20/core_hsalsa20_api.c; sourceTree = ""; }; - E271645FE94568F7DAE51C1A /* crypto_verify_64.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_verify_64.h; path = src/libsodium/include/sodium/crypto_verify_64.h; sourceTree = ""; }; - E4150F87742BCC5EE50ECC6A /* randombytes.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = randombytes.h; path = src/libsodium/include/sodium/randombytes.h; sourceTree = ""; }; - E4FF64DB21FB7B664121B952 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/xsalsa20/ref/api.h; sourceTree = ""; }; - E581CB80CD8206DCA8FBA62B /* crypto_secretbox_easy.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_secretbox_easy.c; path = src/libsodium/crypto_secretbox/crypto_secretbox_easy.c; sourceTree = ""; }; - E614448361C8D1D66645A995 /* crypto_stream.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_stream.h; path = src/libsodium/include/sodium/crypto_stream.h; sourceTree = ""; }; - E61D231C1FAA7DD9E35055EC /* verify_hmacsha512256.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_hmacsha512256.c; path = src/libsodium/crypto_auth/hmacsha512256/cp/verify_hmacsha512256.c; sourceTree = ""; }; - E77F57BF7ED1AB45C1620122 /* crypto_box_easy.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = crypto_box_easy.c; path = src/libsodium/crypto_box/crypto_box_easy.c; sourceTree = ""; }; - E85C0B63CDEC844AC5C26903 /* api.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = api.h; path = src/libsodium/crypto_stream/salsa208/ref/api.h; sourceTree = ""; }; - EB5B9E39E330FA2BAE825267 /* auth_poly1305_donna.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = auth_poly1305_donna.c; path = src/libsodium/crypto_onetimeauth/poly1305/donna/auth_poly1305_donna.c; sourceTree = ""; }; - EC00FF72B6EF01DF68E6E694 /* stream_salsa208.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_salsa208.c; path = src/libsodium/crypto_stream/salsa208/ref/stream_salsa208.c; sourceTree = ""; }; - EC0E4834D3C3B5E655AA15F4 /* crypto_aead_chacha20poly1305.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_aead_chacha20poly1305.h; path = src/libsodium/include/sodium/crypto_aead_chacha20poly1305.h; sourceTree = ""; }; - ECF7B3C03073B9F186632D91 /* runtime.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = runtime.c; path = src/libsodium/sodium/runtime.c; sourceTree = ""; }; - EDA6C6E0086AB1856357F874 /* fe_tobytes.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = fe_tobytes.c; path = src/libsodium/crypto_sign/ed25519/ref10/fe_tobytes.c; sourceTree = ""; }; - EF08BFCA79B1006D5D36B23E /* ge_tobytes.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_tobytes.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_tobytes.c; sourceTree = ""; }; - EF78AA825EF6AD102E7DCFDB /* hash_sha512.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hash_sha512.c; path = src/libsodium/crypto_hash/sha512/cp/hash_sha512.c; sourceTree = ""; }; - F03D415134AD76EEAADEB91D /* scalarmult_curve25519_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = scalarmult_curve25519_api.c; path = src/libsodium/crypto_scalarmult/curve25519/scalarmult_curve25519_api.c; sourceTree = ""; }; - F2BF47060AC5416E58311063 /* version.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = version.c; path = src/libsodium/sodium/version.c; sourceTree = ""; }; - F31562DD4C1711894B0CF902 /* crypto_shorthash_siphash24.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_shorthash_siphash24.h; path = src/libsodium/include/sodium/crypto_shorthash_siphash24.h; sourceTree = ""; }; - F41CEA266482611E49B7FF23 /* stream_salsa208_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_salsa208_api.c; path = src/libsodium/crypto_stream/salsa208/stream_salsa208_api.c; sourceTree = ""; }; - F4649197A50C23B34C0B338C /* verify_16_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = verify_16_api.c; path = src/libsodium/crypto_verify/16/verify_16_api.c; sourceTree = ""; }; - F684C8E1D9020E7D3D1CEA4A /* stream_salsa20_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = stream_salsa20_api.c; path = src/libsodium/crypto_stream/salsa20/stream_salsa20_api.c; sourceTree = ""; }; - F8EB822587E34A0A11A58BBF /* hash_sha512_api.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = hash_sha512_api.c; path = src/libsodium/crypto_hash/sha512/hash_sha512_api.c; sourceTree = ""; }; - F94A9E129DBC0ABCA959D25F /* core.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = core.c; path = src/libsodium/sodium/core.c; sourceTree = ""; }; - FB86AB9A94EEBC70A0C8A684 /* ge_p3_to_cached.c */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.c; name = ge_p3_to_cached.c; path = src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_cached.c; sourceTree = ""; }; - FBD2DC802ABDF4070E8FE275 /* types.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = types.h; path = src/libsodium/crypto_stream/aes128ctr/portable/types.h; sourceTree = ""; }; - FFD442520C5DDA56ADA748C0 /* crypto_uint32.h */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = sourcecode.c.h; name = crypto_uint32.h; path = src/libsodium/include/sodium/crypto_uint32.h; sourceTree = ""; }; -/* End PBXFileReference section */ - -/* Begin PBXFrameworksBuildPhase section */ - 08D4665C9619E5DDFAA84391 /* Frameworks */ = { - isa = PBXFrameworksBuildPhase; - buildActionMask = 2147483647; - files = ( - BEFCD55A3FF80417FEDC6ED5 /* Foundation.framework in Frameworks */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - D41DA5A1B2209B2EE93289E7 /* Frameworks */ = { - isa = PBXFrameworksBuildPhase; - buildActionMask = 2147483647; - files = ( - FDA2C067FAD5EB333C10932B /* Foundation.framework in Frameworks */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXFrameworksBuildPhase section */ - -/* Begin PBXGroup section */ - 1725CA401A8CAA35EDE1F594 /* Products */ = { - isa = PBXGroup; - children = ( - 22D46F98EA4E91DA6BEC2EF0 /* libPods-tunnel.a */, - 5683CAB36F4425F1C5D1BF34 /* libPods-tunnel-libsodium.a */, - ); - name = Products; - sourceTree = ""; - }; - 4FB36FC6DC28C09B46BD33E2 /* Pods-tunnel */ = { - isa = PBXGroup; - children = ( - B3CB202E34EAD35433CE317D /* Pods-tunnel-acknowledgements.markdown */, - 012F163BDD546E80000455EE /* Pods-tunnel-acknowledgements.plist */, - 4B373A2CB7A2F97F6566CD28 /* Pods-tunnel-dummy.m */, - A6C218AF0542EB64CFC681A8 /* Pods-tunnel-environment.h */, - 58810358CDBEA2D923F35911 /* Pods-tunnel-resources.sh */, - 8B0AC198F0C58CF0034D5A4C /* Pods-tunnel.debug.xcconfig */, - AE6E3C354E16164F9F0A1DF6 /* Pods-tunnel.release.xcconfig */, - ); - name = "Pods-tunnel"; - path = "Target Support Files/Pods-tunnel"; - sourceTree = ""; - }; - 5A0EA8F59D255284050548EE /* Pods */ = { - isa = PBXGroup; - children = ( - 9B3BC89EC955F2AE1DB8C1FE /* libsodium */, - ); - name = Pods; - sourceTree = ""; - }; - 7F7069F03EDA16AD0421904B = { - isa = PBXGroup; - children = ( - 0F0A4E7D02D6840162080E75 /* Podfile */, - B394294E8401D73DB9F7B3BE /* Frameworks */, - 5A0EA8F59D255284050548EE /* Pods */, - 1725CA401A8CAA35EDE1F594 /* Products */, - D28842A49BBB05A9E63737F0 /* Targets Support Files */, - ); - sourceTree = ""; - }; - 88F7E780A8C13FB9D2466940 /* Support Files */ = { - isa = PBXGroup; - children = ( - BBB91FDBF11B5D264F9F7846 /* Pods-tunnel-libsodium.xcconfig */, - 5285A8C8877DD4DEBDC67C8F /* Pods-tunnel-libsodium-Private.xcconfig */, - 276E9E389A0F31D27F19C627 /* Pods-tunnel-libsodium-dummy.m */, - 90C4C7CDE8784FB3D98A615A /* Pods-tunnel-libsodium-prefix.pch */, - ); - name = "Support Files"; - path = "../Target Support Files/Pods-tunnel-libsodium"; - sourceTree = ""; - }; - 9B3BC89EC955F2AE1DB8C1FE /* libsodium */ = { - isa = PBXGroup; - children = ( - BFD8FA9B008322ACF1796251 /* aead_chacha20poly1305.c */, - 5D5401DEFB2EE8A3872A761F /* after_curve25519xsalsa20poly1305.c */, - DA6222CE3B5C1B0A5AAC6A3B /* afternm_aes128ctr.c */, - E4FF64DB21FB7B664121B952 /* api.h */, - A325D26842B99A8DFD3BAC59 /* api.h */, - D547B5A6DADC5C3D9959B8A9 /* api.h */, - 020A37012972D4298E29E3F1 /* api.h */, - 3C5A79ABC7C3252C7549BFA3 /* api.h */, - 195F677F0A0599938D7951D7 /* api.h */, - 25529243AAFD42DDF95514B5 /* api.h */, - B8E30F20DFD57F541BFACCB8 /* api.h */, - 72A19831A471CF1382EA4593 /* api.h */, - 2ED32CFFA073329EBFFB4F24 /* api.h */, - E85C0B63CDEC844AC5C26903 /* api.h */, - CC78DEE2431E01BDC712AC48 /* api.h */, - 9A25C095AF475745BF03786C /* api.h */, - 5637715786C139B9D11CC612 /* api.h */, - 2514BC50F5DC3AF58A295071 /* api.h */, - CE2DDA71EC5A6326FBC456EC /* api.h */, - CF259D23E5C254F354F8C8C9 /* api.h */, - C200545DEE4752315199A764 /* api.h */, - 2EBA3AB16F34BB99C95D1970 /* api.h */, - 28E1C7D7DB817D902EA0EC37 /* api.h */, - 4E1EA929F1044F6284578EB6 /* api.h */, - B8635166E75C93366B19ED25 /* api.h */, - 9A279D50F69DDE8E9E56CDEC /* api.h */, - 7AB43E7C4B9521F96A9BDA8D /* api.h */, - 37A70325C8922E2AFD448AC3 /* api.h */, - 56763F43853DEFDBCE12543A /* api.h */, - 95791D3BE0C165F975456F0B /* api.h */, - 2794A3EE0ABDFA441E3F6C59 /* auth_hmacsha256_api.c */, - 6E5DE37777DBA77A0AE94514 /* auth_hmacsha512256_api.c */, - 4B152261A5CDE869DB101E6E /* auth_hmacsha512_api.c */, - EB5B9E39E330FA2BAE825267 /* auth_poly1305_donna.c */, - C68B2714CAE229C33DF77560 /* base.h */, - 5972B14511EA99D60F57C9CF /* base2.h */, - 7CA6C56D883E55E040770F9A /* base_curve25519_donna_c64.c */, - D58FA1D54D49FCDA2733C60E /* base_curve25519_ref10.c */, - 7F5122533F1D1F275DF7DE03 /* before_curve25519xsalsa20poly1305.c */, - 86448ED32443F62CCDC72FD9 /* beforenm_aes128ctr.c */, - C3D77D841EC4DDC1383C8AFA /* blake2.h */, - 2D1C07DA7D984E770C207414 /* blake2-impl.h */, - C7106A9333FF1E683CA0ADCD /* blake2b-ref.c */, - 65415428101F20CFFFEDEC8A /* box_curve25519xsalsa20poly1305.c */, - 5C72552919FB32E5B002DE09 /* box_curve25519xsalsa20poly1305_api.c */, - 491AD13C6CD2213E240384B5 /* box_xsalsa20poly1305.c */, - 371715F198BC4C201140F062 /* common.h */, - 427949CCCDB8AE45CEF2CFDD /* common_aes128ctr.c */, - 46187615A88F584F635D3671 /* consts.h */, - 67973A836F3717B61A960888 /* consts_aes128ctr.c */, - F94A9E129DBC0ABCA959D25F /* core.c */, - B577385F8D2E92F11980F829 /* core.h */, - D02FCD814541B84EE5C9C635 /* core_hsalsa20.c */, - E07D016A392CD071573E2DA1 /* core_hsalsa20_api.c */, - 3E8D5633B3CF6884F7F1318B /* core_salsa20.c */, - 26D61DE1B97AB08C24C6DE69 /* core_salsa2012.c */, - 6DDB9E7CF1BDEECAD8AD3D8F /* core_salsa2012_api.c */, - 8C3818070309CD8D833394F4 /* core_salsa208.c */, - 66B3010936D50A5959DD45B7 /* core_salsa208_api.c */, - C3C74D894188286BD858E431 /* core_salsa20_api.c */, - EC0E4834D3C3B5E655AA15F4 /* crypto_aead_chacha20poly1305.h */, - 577F46D6E71994828662A9CD /* crypto_auth.c */, - 3F0F47830D5A395DB404CCF1 /* crypto_auth.h */, - 509D0E694E83C968E34FA1CD /* crypto_auth_hmacsha256.h */, - BA79F309715603BED61CF993 /* crypto_auth_hmacsha512.h */, - 53FC28C746A1E6FE2FFF1011 /* crypto_auth_hmacsha512256.h */, - 63B0DA706FD08AD12D8B6AD8 /* crypto_box.c */, - B06C3F859BB350401B69D350 /* crypto_box.h */, - 01A497FF72EAB0B2CAA6C540 /* crypto_box_curve25519xsalsa20poly1305.h */, - E77F57BF7ED1AB45C1620122 /* crypto_box_easy.c */, - 768A100B6899C00552DC7A00 /* crypto_box_seal.c */, - 9198EFEC7CD551CE29D66D66 /* crypto_core_hsalsa20.h */, - 1E5A5E53476DCE82C25ADF5B /* crypto_core_salsa20.h */, - B4D969DE62BB664A67A93036 /* crypto_core_salsa2012.h */, - 2371B0B7FB4AA82BFD863BA0 /* crypto_core_salsa208.h */, - 8E39325FCEC1AFA5F6289EEF /* crypto_generichash.c */, - C74A193384A062C825A6C34F /* crypto_generichash.h */, - 61FEEC5F11A373E1941A46D7 /* crypto_generichash_blake2b.h */, - 85EE7273A3A5255017CE8398 /* crypto_hash.c */, - 31DB52C77394C80674393C18 /* crypto_hash.h */, - 80198EBD6EB8CD0AD3FEB08F /* crypto_hash_sha256.h */, - B6D9E094227A21FD59753747 /* crypto_hash_sha512.h */, - 9ADC87EFE9E50BBE8F7CD55B /* crypto_int32.h */, - 17867EEC2B8D5B188BFB1010 /* crypto_int64.h */, - 00707E8D704955E3AC0FB5C6 /* crypto_onetimeauth.c */, - 06E6692C6483E2CC63302DBE /* crypto_onetimeauth.h */, - CF127642348F68F53A657706 /* crypto_onetimeauth_poly1305.h */, - 22A14C9769A36AE61FB96CBA /* crypto_pwhash_scryptsalsa208sha256.h */, - 99892E4B5B13801B958F4D8A /* crypto_scalarmult.c */, - 978FD50DAF5FBA41A615BE9C /* crypto_scalarmult.h */, - 6244A39CDA0636BDDFDB6A7D /* crypto_scalarmult_curve25519.h */, - 5725A0158D8FE8487E59BB05 /* crypto_scrypt.h */, - 99EFAA6F4EFCE2CCF7A37027 /* crypto_scrypt-common.c */, - D245C98D3586B936BFD95530 /* crypto_secretbox.c */, - 3EAC82063DFF101CD226B4D3 /* crypto_secretbox.h */, - E581CB80CD8206DCA8FBA62B /* crypto_secretbox_easy.c */, - 709E9BBA823D2D70E7A8C1DB /* crypto_secretbox_xsalsa20poly1305.h */, - B75F70AAB0A7370E7C67F9BC /* crypto_shorthash.c */, - 4B867DB2872926EB5EC732E6 /* crypto_shorthash.h */, - F31562DD4C1711894B0CF902 /* crypto_shorthash_siphash24.h */, - 3E664EEA2A86DB3B9C442413 /* crypto_sign.c */, - 493B72DC069061B67C0A17F6 /* crypto_sign.h */, - 79F9DA32782783D6295CD029 /* crypto_sign_ed25519.h */, - BCCE9C915DC5F0CF15042B7D /* crypto_sign_edwards25519sha512batch.h */, - 0B915CFE92C911E1EBD36EAF /* crypto_stream.c */, - E614448361C8D1D66645A995 /* crypto_stream.h */, - 50C8665993978345700711D5 /* crypto_stream_aes128ctr.h */, - 4E24E80F9678824F0A930CC0 /* crypto_stream_chacha20.h */, - B286E9D1BCC17C31E361A1BB /* crypto_stream_salsa20.h */, - 30211B1A9E97C0DBA492D72F /* crypto_stream_salsa2012.h */, - 37F7327008A60A557C15C802 /* crypto_stream_salsa208.h */, - 5C879DA600DD4222443ECA3D /* crypto_stream_xsalsa20.h */, - 429BE12B88755FAFC48333F1 /* crypto_uint16.h */, - FFD442520C5DDA56ADA748C0 /* crypto_uint32.h */, - DB8893EAE6713000237E0F50 /* crypto_uint64.h */, - 95C101C7B94625E63636C04C /* crypto_uint8.h */, - B7A12BABF2799A7E02441B18 /* crypto_verify_16.h */, - 05AA29E97EDA5EDFA48B345D /* crypto_verify_32.h */, - E271645FE94568F7DAE51C1A /* crypto_verify_64.h */, - 13BB77AA6A7D293F220B3F7F /* d.h */, - 6654B0AA2F0E7A315578F3DC /* d2.h */, - CAD94B5683A401522B535F34 /* export.h */, - 956B33854CDE0F7144A873A2 /* fe.h */, - C32D5866787E3B8D592E631F /* fe.h */, - 6DB78F818477151BF07666ED /* fe25519.h */, - 6DE3EA8AF034E71AB50CD9E4 /* fe25519_edwards25519sha512batch.c */, - 0E13DB7335CD6E4A5C43BAF4 /* fe_0.c */, - 65C37A56EAAAFDCB9F190276 /* fe_0_curve25519_ref10.c */, - CC4AA5E3964AFDB2610B54CE /* fe_1.c */, - 7ED005C5A4DDFF00C9E4B83A /* fe_1_curve25519_ref10.c */, - 94AE296601CF4D10128D621E /* fe_add.c */, - 1938369B9C465443CE45AAFD /* fe_add_curve25519_ref10.c */, - 150B3C6BFE5BF957C676BB99 /* fe_cmov.c */, - 903D2A2C61508AFDC32715AC /* fe_copy.c */, - 45177EB1A81E2754ED9AD21D /* fe_copy_curve25519_ref10.c */, - 81A9FF8AB3D68CEFAFBC15F3 /* fe_cswap_curve25519_ref10.c */, - 2F90F69215B53DF524540863 /* fe_frombytes.c */, - 86DF2B6CE6335EE5EF5BEFFA /* fe_frombytes_curve25519_ref10.c */, - 408413F992230ED7A379B041 /* fe_invert.c */, - AFBDA2E3B12E2F1A6E8318F1 /* fe_invert_curve25519_ref10.c */, - 3C31FBD4C7750F2A2ACF9A5F /* fe_isnegative.c */, - 30C513C462D9055D9989AC7C /* fe_isnonzero.c */, - 4D6310B9318EF66834224898 /* fe_mul.c */, - 488E66FCFEF14FC236DD1D7E /* fe_mul121666_curve25519_ref10.c */, - 0A6BC2523760419BF5916DE7 /* fe_mul_curve25519_ref10.c */, - 759520B57632B96F388D7C8C /* fe_neg.c */, - 518EA6234FF14F3E0F05617D /* fe_pow22523.c */, - C51774E5369842AA53D340F6 /* fe_sq.c */, - D75547E46784491B8BD08B37 /* fe_sq2.c */, - 2E685A7C56329D9A9C5022F7 /* fe_sq_curve25519_ref10.c */, - C902EB4FC10A7B3510E3CF21 /* fe_sub.c */, - 42F89E6AF4AA77AE0468F851 /* fe_sub_curve25519_ref10.c */, - EDA6C6E0086AB1856357F874 /* fe_tobytes.c */, - C8510E2D3E614D5BE15CB491 /* fe_tobytes_curve25519_ref10.c */, - 9555C83472AAFDE29656B225 /* ge.h */, - 2432A1187CA0FE5334177FD2 /* ge25519.h */, - DAE50519077C79FCA266F110 /* ge25519_edwards25519sha512batch.c */, - 723539479CC51BD74EFE1CFE /* ge_add.c */, - 367EA4D4E191530172845BC8 /* ge_add.h */, - 3873AE14E475E423F1E123C0 /* ge_double_scalarmult.c */, - 19EDFE452C6F34D295D1F3BC /* ge_frombytes.c */, - 138FC5DF8F882025C931357A /* ge_madd.c */, - 8A63634BFD14C8EA43626054 /* ge_madd.h */, - C3EAE71A26EE484EE15253D7 /* ge_msub.c */, - AD2E2C6C187FAF335798FEC4 /* ge_msub.h */, - 3B27A1516A02E20569E86068 /* ge_p1p1_to_p2.c */, - 721D4E4E60DE823367032F04 /* ge_p1p1_to_p3.c */, - 2650B4B3ECEB95C79760CC5A /* ge_p2_0.c */, - D22C48E11116925FE158876B /* ge_p2_dbl.c */, - 96044DC98EBA5637F2B29D50 /* ge_p2_dbl.h */, - 3D8C5DED4359DDC7CFB5D4BA /* ge_p3_0.c */, - 0F4C7D03C2C6188B2AF80B71 /* ge_p3_dbl.c */, - FB86AB9A94EEBC70A0C8A684 /* ge_p3_to_cached.c */, - 68FBD3E992C8BBE7DB4E81B1 /* ge_p3_to_p2.c */, - 6EE962CBDDE4384282CC3CC4 /* ge_p3_tobytes.c */, - 071C5BA551E9529C4E2C441B /* ge_precomp_0.c */, - 1713D7C57439456E7C712F98 /* ge_scalarmult_base.c */, - DF0832E3DA791B7E40A3CE90 /* ge_sub.c */, - 0F391700127E0DB54E2DE4AD /* ge_sub.h */, - EF08BFCA79B1006D5D36B23E /* ge_tobytes.c */, - AC7A444150796259DAFAE685 /* generichash_blake2_api.c */, - 4602E462319BE6376D1AE541 /* generichash_blake2b.c */, - 11028F2FF9AF5AD25C90ECDF /* hash_sha256.c */, - 895A11B6A59DC77FBB4732FC /* hash_sha256_api.c */, - EF78AA825EF6AD102E7DCFDB /* hash_sha512.c */, - F8EB822587E34A0A11A58BBF /* hash_sha512_api.c */, - 5F60BECA4484423123ACA672 /* hmac_hmacsha256.c */, - CFE44E91401D6C98EF8CD496 /* hmac_hmacsha512.c */, - 03A7E927EF488D7F5380F641 /* hmac_hmacsha512256.c */, - A10FCFBE21C652B6F2101144 /* int128.h */, - D03ED01925588701B90FD7FF /* int128_aes128ctr.c */, - 6ABE0D9584CEBA971F5A368F /* keypair.c */, - 33113E14D3DFD631967878DE /* keypair_curve25519xsalsa20poly1305.c */, - 59B849DB4178F152329030FA /* montgomery.h */, - CEECEC265FE0FF38F298584D /* onetimeauth_poly1305.c */, - 0E12B9F230B9798ED34FDD89 /* onetimeauth_poly1305_api.c */, - 365969BB2ED5AD3028E72B73 /* onetimeauth_poly1305_try.c */, - 1749135A603803E9A8FF244B /* open.c */, - 319BD90F9417C61EFBA28D44 /* pbkdf2-sha256.c */, - 5875FE95C134585B0402A950 /* pbkdf2-sha256.h */, - 1C5338461A2AB2A2A6FD19C4 /* poly1305_donna.h */, - A241E2106FFF43EA0ED7F70E /* poly1305_donna32.h */, - 4C0CAFBB4CC8D03C10A6D91B /* poly1305_donna64.h */, - CCA7366EE21E142AB5455133 /* pow22523.h */, - D222554AE7AA358158562F3A /* pow225521.h */, - 2C847439A693155AFE2C0E56 /* pow225521.h */, - 90A60C3579D53C5F6D0AD562 /* pwhash_scryptsalsa208sha256.c */, - 24A5B00799A2F5E3D685DB2B /* pwhash_scryptsalsa208sha256_nosse.c */, - 058B070BA3B6B5BCA64CA3C4 /* pwhash_scryptsalsa208sha256_sse.c */, - 1725A0E61459D49A02399050 /* randombytes.c */, - E4150F87742BCC5EE50ECC6A /* randombytes.h */, - A70E46D2A5C546CA6FA79722 /* randombytes_salsa20_random.c */, - 29876F5318BDF8517D4C3ADD /* randombytes_salsa20_random.h */, - C20FBFA753379CB6DD68F7BA /* randombytes_sysrandom.c */, - C7AC311D628DA701F7ED9554 /* randombytes_sysrandom.h */, - ECF7B3C03073B9F186632D91 /* runtime.c */, - B25E3E58B02C6FDF8471D99B /* runtime.h */, - 5D5A7A9722F9D6DC0BCAF736 /* sc.h */, - 2C828B6A278B3AB54565DC3C /* sc25519.h */, - 37E5BE3C8B4B294513A848DD /* sc25519_edwards25519sha512batch.c */, - AD92BF9F6E1246344CAC96A9 /* sc_muladd.c */, - 786FBF4246CFDA038FD37DCC /* sc_reduce.c */, - F03D415134AD76EEAADEB91D /* scalarmult_curve25519_api.c */, - 2F869655F6B64B120E21446F /* scalarmult_curve25519_ref10.c */, - A2399F9697708F12641C8E08 /* scrypt_platform.c */, - A41213709C1EFB7052A7A41F /* secretbox_xsalsa20poly1305_api.c */, - 9421587B3BF5B6F3791680F0 /* shorthash_siphash24.c */, - 1D2884055587BE23E501C5EF /* shorthash_siphash24_api.c */, - 6DF1E2635210A36B9F759872 /* sign.c */, - 0A8D08049439A1B0E857530D /* sign_ed25519_api.c */, - 414E8F8F75CF6EC36226C8E9 /* sign_edwards25519sha512batch.c */, - 159DAAF8F2C2E2FD98381064 /* sign_edwards25519sha512batch_api.c */, - B5252F27C1B2E2A4E6EFFCFC /* smult_curve25519_donna_c64.c */, - BD307648ACA4467FECFC174B /* sodium.h */, - 22D801B543A74C07DBAA66F5 /* sqrtm1.h */, - 26B7C0F56D4026A4F2785A4A /* stream_aes128ctr.c */, - 831177D95FB3B619E0D79FEE /* stream_aes128ctr_api.c */, - 4AA9E8BC7D940C4F9C2263F2 /* stream_chacha20_api.c */, - ABA40A93004519B3EE4DF071 /* stream_chacha20_ref.c */, - 3FE70303F1A369116244E874 /* stream_salsa2012.c */, - C6D0025BE4C1273A29F9E765 /* stream_salsa2012_api.c */, - EC00FF72B6EF01DF68E6E694 /* stream_salsa208.c */, - F41CEA266482611E49B7FF23 /* stream_salsa208_api.c */, - F684C8E1D9020E7D3D1CEA4A /* stream_salsa20_api.c */, - 75A915A0226F0839B5AB69B6 /* stream_salsa20_ref.c */, - C7F8694654F49C05A86A3BDC /* stream_xsalsa20.c */, - 8C8CDDE5589DD8CB205E2A55 /* stream_xsalsa20_api.c */, - 28FBC3E5997D8CD343594DA5 /* sysendian.h */, - FBD2DC802ABDF4070E8FE275 /* types.h */, - 2273AF24AA43FE64B33E29C2 /* utils.c */, - 69C76E94B58CEF60391A27A7 /* utils.h */, - 76F194ACD3C5AA2BA71732E2 /* verify_16.c */, - F4649197A50C23B34C0B338C /* verify_16_api.c */, - 4405EAE71BFB3B55D65C890E /* verify_32.c */, - 1959AB333A2A1D98FB91B5A2 /* verify_32_api.c */, - 29A21DDE753201AEC0AE7F86 /* verify_64.c */, - C64296F57429EF7C8CE7A201 /* verify_64_api.c */, - 9F05FAB70F81751A5BEF13E4 /* verify_hmacsha256.c */, - 5D98CF0F0084FD611FB18EDC /* verify_hmacsha512.c */, - E61D231C1FAA7DD9E35055EC /* verify_hmacsha512256.c */, - 248AFA9CBAF954B97AFE264A /* verify_poly1305_donna.c */, - F2BF47060AC5416E58311063 /* version.c */, - DCEA864ED72A0C3DA9A31359 /* version.h */, - 0727881AFE434091D3E51C50 /* xor_afternm_aes128ctr.c */, - 97AD806A5805CF401F2BEC86 /* xor_salsa2012.c */, - 0BEB316B164159804822BC16 /* xor_salsa208.c */, - 8D3630A9EE835623597C3F22 /* xor_salsa20_ref.c */, - B79781E9CC0289F6E56E5C1E /* xor_xsalsa20.c */, - 88F7E780A8C13FB9D2466940 /* Support Files */, - ); - path = libsodium; - sourceTree = ""; - }; - 9CF16FC6973D3EEE81939B51 /* iOS */ = { - isa = PBXGroup; - children = ( - D4E2DC8C4B7C79AEC4B33EE4 /* Foundation.framework */, - ); - name = iOS; - sourceTree = ""; - }; - B394294E8401D73DB9F7B3BE /* Frameworks */ = { - isa = PBXGroup; - children = ( - 9CF16FC6973D3EEE81939B51 /* iOS */, - ); - name = Frameworks; - sourceTree = ""; - }; - D28842A49BBB05A9E63737F0 /* Targets Support Files */ = { - isa = PBXGroup; - children = ( - 4FB36FC6DC28C09B46BD33E2 /* Pods-tunnel */, - ); - name = "Targets Support Files"; - sourceTree = ""; - }; -/* End PBXGroup section */ - -/* Begin PBXHeadersBuildPhase section */ - 2DD17F7733456265D18799D7 /* Headers */ = { - isa = PBXHeadersBuildPhase; - buildActionMask = 2147483647; - files = ( - 02D4F33196B8900AF78948F6 /* api.h in Headers */, - D1DCEE0F03D3BA9322C0DBDC /* api.h in Headers */, - C28622A8717D0A1BFA4F4301 /* api.h in Headers */, - 0C9C957A72337B23E74B22C3 /* api.h in Headers */, - 44D78426DA70395299736B94 /* api.h in Headers */, - 5ABAFBE725B46118FFB7CF22 /* api.h in Headers */, - FC63C28C8DECD3956EA4F4F6 /* api.h in Headers */, - 275B423E00ED28F70D656F87 /* api.h in Headers */, - 7AE71A114339A4BEF2FCAFBF /* api.h in Headers */, - 2AE819AD1A999F0551DCD4AE /* api.h in Headers */, - 099E8717DE84A18FBFC80C08 /* api.h in Headers */, - 615D14260B3E4F7E410A23DC /* api.h in Headers */, - DF0068A714778F682AAB9D80 /* api.h in Headers */, - B4AE3EBF04227F9C1F708C9F /* api.h in Headers */, - 7F8677EE1E150F48FB73277B /* api.h in Headers */, - F05778093FA0ADD91701C730 /* api.h in Headers */, - 7C7DC3A30BDF97DCF62C9CAD /* api.h in Headers */, - 6DC32BE1115CDE7664F4A188 /* api.h in Headers */, - 07F2EC6239B362DB7FDD5E00 /* api.h in Headers */, - 21DFD3890F69A25E72C09C49 /* api.h in Headers */, - F1CCB7D4709CF20ED3CD6184 /* api.h in Headers */, - 6300825671758E4ABD393856 /* api.h in Headers */, - 5C9D99E91F13D8B7A72B9893 /* api.h in Headers */, - 6C9BD87FB359A9DC408B4CFA /* api.h in Headers */, - 9BCCB402881CB7EF4E71D773 /* api.h in Headers */, - BCD72E3D0DBC5B9CB3520A76 /* api.h in Headers */, - 4161C58657E6C3BE99902C7B /* api.h in Headers */, - A1549C31A9B914FBFA586B05 /* base.h in Headers */, - DD958B0E636F4A044C5DF404 /* base2.h in Headers */, - 913D96F6639A2A4671529937 /* blake2-impl.h in Headers */, - 2BBD4A438752DF8E332826A8 /* blake2.h in Headers */, - ACE46207A3D920DBB260B283 /* common.h in Headers */, - DAFBB2CCF246EF7CD604FBCA /* consts.h in Headers */, - 6312968433AD9F2C1DAF7D19 /* core.h in Headers */, - 07123F8A61CB68A66469F666 /* crypto_aead_chacha20poly1305.h in Headers */, - 8F1CD70C7B9418102D08A5AB /* crypto_auth.h in Headers */, - E8D4163542B4D6C69DD76549 /* crypto_auth_hmacsha256.h in Headers */, - B3519BB63D2370DC8E9EFC53 /* crypto_auth_hmacsha512.h in Headers */, - A2B129D0C8C235DAFCF584DE /* crypto_auth_hmacsha512256.h in Headers */, - 456E082B261B5A637A57E5EA /* crypto_box.h in Headers */, - 21811E3C3BA0FAB105E0EF85 /* crypto_box_curve25519xsalsa20poly1305.h in Headers */, - CB1090BAF3DFCB8C62B63F1B /* crypto_core_hsalsa20.h in Headers */, - DE9BC43BB09FF6A7C1201EB4 /* crypto_core_salsa20.h in Headers */, - 5AFE56E16DA7CAFAD9248C8B /* crypto_core_salsa2012.h in Headers */, - 44290A8E0BDAC6E88D477DC7 /* crypto_core_salsa208.h in Headers */, - 6157E0A545408ABF47E9B5F0 /* crypto_generichash.h in Headers */, - 830FC1815B1F5C62D2876E2F /* crypto_generichash_blake2b.h in Headers */, - 8C1AE1D89B6AF0CC4AB9BBED /* crypto_hash.h in Headers */, - 806A50728833429A3BC50C13 /* crypto_hash_sha256.h in Headers */, - 3D36228F8C2B8BDCDEE9772B /* crypto_hash_sha512.h in Headers */, - 56332DEA4E0F779F484D127A /* crypto_int32.h in Headers */, - F8D49D930B3EB1F1AAEE3BB1 /* crypto_int64.h in Headers */, - 703DDDA1FF0528E0654AEB81 /* crypto_onetimeauth.h in Headers */, - 4FD09D1EDA19A0D8AB77708A /* crypto_onetimeauth_poly1305.h in Headers */, - EE41B5E8CB5DD6B4093EC1AD /* crypto_pwhash_scryptsalsa208sha256.h in Headers */, - FC2157522BAE2E476A51EF0D /* crypto_scalarmult.h in Headers */, - 8D55C037BAFAA3D3A76BF9FD /* crypto_scalarmult_curve25519.h in Headers */, - 1D4BEDC0116C15A0E293EE61 /* crypto_scrypt.h in Headers */, - 9516CFF3644552C570B7D87A /* crypto_secretbox.h in Headers */, - 5B297EBAEA2AC9C70AE25520 /* crypto_secretbox_xsalsa20poly1305.h in Headers */, - 7FD666181536A5E3C943AEB7 /* crypto_shorthash.h in Headers */, - 1DD90A6E95320DA321C1A023 /* crypto_shorthash_siphash24.h in Headers */, - 7CA10F8C01B2824ED92102FB /* crypto_sign.h in Headers */, - 97D55343D4834E6A5C08AD4E /* crypto_sign_ed25519.h in Headers */, - 6A72411EFE5527FF17E46821 /* crypto_sign_edwards25519sha512batch.h in Headers */, - 7B75D648B2361EB1B80A606C /* crypto_stream.h in Headers */, - EAA29F3B5617A3698F3A92D1 /* crypto_stream_aes128ctr.h in Headers */, - FE96023AA9FCEB3C588AF8C0 /* crypto_stream_chacha20.h in Headers */, - 223677B1C1F7205F3A600C5F /* crypto_stream_salsa20.h in Headers */, - CA13E5B41E0D4B163ECC6B01 /* crypto_stream_salsa2012.h in Headers */, - B8663E0DB9D4E8D337827052 /* crypto_stream_salsa208.h in Headers */, - AAA876C28827947F8ED37A22 /* crypto_stream_xsalsa20.h in Headers */, - F4D93CDC2796EB6031799F69 /* crypto_uint16.h in Headers */, - B257E10FA52D909CA316A70A /* crypto_uint32.h in Headers */, - B045B2634E4CF1073C2504E2 /* crypto_uint64.h in Headers */, - 86A739D54FE23799266E6176 /* crypto_uint8.h in Headers */, - 749ED22CBDEF17FBC8B47B7E /* crypto_verify_16.h in Headers */, - 955303B881D2F2B7631B231D /* crypto_verify_32.h in Headers */, - 37D1935B796CC883B5F74C1D /* crypto_verify_64.h in Headers */, - 52DCAF63DAE10AF002BD160D /* d.h in Headers */, - A1328C04848E049C13A838CB /* d2.h in Headers */, - 94F932C506D0ADED4236937C /* export.h in Headers */, - 86711C5E179AC4CFFF678144 /* fe.h in Headers */, - C94CBB1F97D6A30971CBD299 /* fe.h in Headers */, - 4BC4019AB708B4B431D141E6 /* fe25519.h in Headers */, - 9676651832BA1E02A06A6116 /* ge.h in Headers */, - C482B59A34DA311CB2470D98 /* ge25519.h in Headers */, - 05FCEBA239A8C312024FCAF2 /* ge_add.h in Headers */, - 80E86A64A1C7152B67DDE335 /* ge_madd.h in Headers */, - 4D3EA0F2CDF589D11BD02A99 /* ge_msub.h in Headers */, - B969F6DA5FDA28BF195B834D /* ge_p2_dbl.h in Headers */, - F0A13064051FAE0FCF47BF11 /* ge_sub.h in Headers */, - DAFF54510BF95C2CEA72DFDB /* int128.h in Headers */, - 3812C517E3FF135CB94773B2 /* montgomery.h in Headers */, - BA7D8C674613B0A9EB4665FD /* pbkdf2-sha256.h in Headers */, - F7250ED3AE9966B9FC1EEC11 /* poly1305_donna.h in Headers */, - 3585224020FBF499B59F6A05 /* poly1305_donna32.h in Headers */, - F83DBD683D2EB9D096B69634 /* poly1305_donna64.h in Headers */, - 535FF098D3DC005734E100F2 /* pow22523.h in Headers */, - C45150BE1101A4C50D400428 /* pow225521.h in Headers */, - D4FE13B559AF15A1FD951B2F /* pow225521.h in Headers */, - 2806B990DCAD19C2B838A7AD /* randombytes.h in Headers */, - CF07EAFF4074B2B13CA70DF3 /* randombytes_salsa20_random.h in Headers */, - E4F0B67C3E70CAA5DFF85A4E /* randombytes_sysrandom.h in Headers */, - 63E448F37155ED7B2089A7C4 /* runtime.h in Headers */, - FDD26A84EC169211EF123070 /* sc.h in Headers */, - A3EC596B6B93A9CE98AC7552 /* sc25519.h in Headers */, - 77A9D0FE949F167C1B02A08B /* sodium.h in Headers */, - 7CCBB0D0CB27FCD4FA043AC9 /* sqrtm1.h in Headers */, - 215F4FE4BE34D14E9C3952AF /* sysendian.h in Headers */, - DE7DFFE420C94011292D2B95 /* types.h in Headers */, - 6AEB4CFCA875F8FF152962C0 /* utils.h in Headers */, - 67133A082C89C004518EE99C /* version.h in Headers */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXHeadersBuildPhase section */ - -/* Begin PBXNativeTarget section */ - 86536A03F9FAF70FD063F9C7 /* Pods-tunnel-libsodium */ = { - isa = PBXNativeTarget; - buildConfigurationList = 38A31BA5204BF5E41164C812 /* Build configuration list for PBXNativeTarget "Pods-tunnel-libsodium" */; - buildPhases = ( - 968436743EC1E2192E1B1D55 /* Sources */, - 08D4665C9619E5DDFAA84391 /* Frameworks */, - 2DD17F7733456265D18799D7 /* Headers */, - ); - buildRules = ( - ); - dependencies = ( - ); - name = "Pods-tunnel-libsodium"; - productName = "Pods-tunnel-libsodium"; - productReference = 5683CAB36F4425F1C5D1BF34 /* libPods-tunnel-libsodium.a */; - productType = "com.apple.product-type.library.static"; - }; - F845435C4F67920693C75BDE /* Pods-tunnel */ = { - isa = PBXNativeTarget; - buildConfigurationList = 5E99FCDEB019A1247E35E050 /* Build configuration list for PBXNativeTarget "Pods-tunnel" */; - buildPhases = ( - B13035EFA6432618E6DA00EB /* Sources */, - D41DA5A1B2209B2EE93289E7 /* Frameworks */, - ); - buildRules = ( - ); - dependencies = ( - 8100755CFF5D545D4A0BE971 /* PBXTargetDependency */, - ); - name = "Pods-tunnel"; - productName = "Pods-tunnel"; - productReference = 22D46F98EA4E91DA6BEC2EF0 /* libPods-tunnel.a */; - productType = "com.apple.product-type.library.static"; - }; -/* End PBXNativeTarget section */ - -/* Begin PBXProject section */ - 13EA2FA015042E5E02522CCE /* Project object */ = { - isa = PBXProject; - attributes = { - LastUpgradeCheck = 0640; - }; - buildConfigurationList = C4FDE648F8DFA524A2085D94 /* Build configuration list for PBXProject "Pods" */; - compatibilityVersion = "Xcode 3.2"; - developmentRegion = English; - hasScannedForEncodings = 0; - knownRegions = ( - en, - ); - mainGroup = 7F7069F03EDA16AD0421904B; - productRefGroup = 1725CA401A8CAA35EDE1F594 /* Products */; - projectDirPath = ""; - projectRoot = ""; - targets = ( - F845435C4F67920693C75BDE /* Pods-tunnel */, - 86536A03F9FAF70FD063F9C7 /* Pods-tunnel-libsodium */, - ); - }; -/* End PBXProject section */ - -/* Begin PBXSourcesBuildPhase section */ - 968436743EC1E2192E1B1D55 /* Sources */ = { - isa = PBXSourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - 90F6441CCA0D79685E1C5A7D /* Pods-tunnel-libsodium-dummy.m in Sources */, - 1411513F3ADEAC118E277D02 /* aead_chacha20poly1305.c in Sources */, - E92F21BB0D9E9183AFDF701D /* after_curve25519xsalsa20poly1305.c in Sources */, - C4F802462ADB2CE49288A829 /* afternm_aes128ctr.c in Sources */, - 29645A66652BD295374EB719 /* auth_hmacsha256_api.c in Sources */, - F7EED2E37E7B6055C00E6E6C /* auth_hmacsha512256_api.c in Sources */, - 2710AF5DB21E849E6AC62374 /* auth_hmacsha512_api.c in Sources */, - 03A12D7CBC03B363EB902A0F /* auth_poly1305_donna.c in Sources */, - 98E8D684513A60602642FAE2 /* base_curve25519_donna_c64.c in Sources */, - D3266E12B1E1F559C562450C /* base_curve25519_ref10.c in Sources */, - D2FF0E60222CB2D6435232C1 /* before_curve25519xsalsa20poly1305.c in Sources */, - CC19B17F02709698F0D1C2FD /* beforenm_aes128ctr.c in Sources */, - 58F1722FEC0DD06A3C765520 /* blake2b-ref.c in Sources */, - 215C908151239A0CA6666013 /* box_curve25519xsalsa20poly1305.c in Sources */, - F4E7711E1607CDF00DA9F381 /* box_curve25519xsalsa20poly1305_api.c in Sources */, - BA5EB68B8F23770832DF0EA4 /* box_xsalsa20poly1305.c in Sources */, - 4423959997041922BB4F816A /* common_aes128ctr.c in Sources */, - F6F4A94AA84237EF6F3C7360 /* consts_aes128ctr.c in Sources */, - 2D62EA79D7F826DFE4D1D38E /* core.c in Sources */, - 9212F9F082465931F5074D6C /* core_hsalsa20.c in Sources */, - 098EDD5FE766D2EE5E343359 /* core_hsalsa20_api.c in Sources */, - 3DD4E36B256A0933BFA7B6D6 /* core_salsa20.c in Sources */, - 17723F7EE21975B88F982025 /* core_salsa2012.c in Sources */, - 32BBB1B7341FD57E43E984CE /* core_salsa2012_api.c in Sources */, - 8216C62F58B51B9FE77CF4DB /* core_salsa208.c in Sources */, - A9A28C6B4E9556EAFB0CCA07 /* core_salsa208_api.c in Sources */, - 87F49EA8106D6064BCA83723 /* core_salsa20_api.c in Sources */, - 9D7D3D317787CA6923B33109 /* crypto_auth.c in Sources */, - 23933ED87BEEB76673B2A450 /* crypto_box.c in Sources */, - 6AE98BAB4DF036BFB2B4FCD9 /* crypto_box_easy.c in Sources */, - 44E7175EF935D20A382DD4E9 /* crypto_box_seal.c in Sources */, - A94F7838B8D3EC5608CE9B06 /* crypto_generichash.c in Sources */, - 2CA2F883E0E7F3384A10BD24 /* crypto_hash.c in Sources */, - 989E558DB81702E7C965153E /* crypto_onetimeauth.c in Sources */, - 3E8AE14969CEBEDAAEBF7590 /* crypto_scalarmult.c in Sources */, - 5EC4E42B4D4B68A9F3A33B1E /* crypto_scrypt-common.c in Sources */, - 4FE9E8ECC8B8B313176EE0D6 /* crypto_secretbox.c in Sources */, - 4C627EA74C3CC84C52EF4BAB /* crypto_secretbox_easy.c in Sources */, - 3463C0FA13C4A5E03B2AD96D /* crypto_shorthash.c in Sources */, - 6228E7211DE6CF2C485B60AF /* crypto_sign.c in Sources */, - E58A366D0954F686FB958F1A /* crypto_stream.c in Sources */, - 8663B240D8A984DBF7C2589B /* fe25519_edwards25519sha512batch.c in Sources */, - 6200497FC3412CCDEA8E9114 /* fe_0.c in Sources */, - C29D918E5E1A4773AC0B3E43 /* fe_0_curve25519_ref10.c in Sources */, - 2E243E72009D38BF202D77B2 /* fe_1.c in Sources */, - 01711C9D035E5280DBF16003 /* fe_1_curve25519_ref10.c in Sources */, - E6012374014646B0A1DCAE4B /* fe_add.c in Sources */, - 4D5AA7077DA9ECC1F86F3695 /* fe_add_curve25519_ref10.c in Sources */, - 7F2AAA8F4AD34B3A254292AA /* fe_cmov.c in Sources */, - 9A2417B95E0468772605EF8E /* fe_copy.c in Sources */, - EF593A902FA281DF921A3035 /* fe_copy_curve25519_ref10.c in Sources */, - 888C7365E324FCE05162AC21 /* fe_cswap_curve25519_ref10.c in Sources */, - 3D9824B78F91168A6EDD4C33 /* fe_frombytes.c in Sources */, - 22E47C94130E1FC2E3C3B787 /* fe_frombytes_curve25519_ref10.c in Sources */, - AA192EEA2C6D3930BF2EB1BE /* fe_invert.c in Sources */, - 5BA2D3015027C794921A2CF7 /* fe_invert_curve25519_ref10.c in Sources */, - 40BCA6C1C368A2B3123E3B08 /* fe_isnegative.c in Sources */, - 15013AA66C0241B9CD3C8EFC /* fe_isnonzero.c in Sources */, - 165A34428D49B129074F76DB /* fe_mul.c in Sources */, - FE50C3948CB5768CB16E6277 /* fe_mul121666_curve25519_ref10.c in Sources */, - DBBF673FF85AFD7B04A44C63 /* fe_mul_curve25519_ref10.c in Sources */, - 94CDCB4FD28D82AC9C3EFA50 /* fe_neg.c in Sources */, - 597FCEA2963B8C87AA332A77 /* fe_pow22523.c in Sources */, - 49ECD32A666BFBEA1A2EA70D /* fe_sq.c in Sources */, - 835DDAC9FC2096367B7FACCD /* fe_sq2.c in Sources */, - D16E5CC64C814437EDC24131 /* fe_sq_curve25519_ref10.c in Sources */, - B0AD90B67FBA5C574C097E5B /* fe_sub.c in Sources */, - E8C3015A8EEB68DC2AA41DE8 /* fe_sub_curve25519_ref10.c in Sources */, - 59806B07E2683309F4AAFE07 /* fe_tobytes.c in Sources */, - 8976FE102AF5058C401F9D65 /* fe_tobytes_curve25519_ref10.c in Sources */, - B9C7808CF0CEF60CC652002F /* ge25519_edwards25519sha512batch.c in Sources */, - 0426E67099767A4DF8E7C74C /* ge_add.c in Sources */, - 1DD7525E8BCB2261E04927D0 /* ge_double_scalarmult.c in Sources */, - 2DED7D50EA1B9971B0D34D7F /* ge_frombytes.c in Sources */, - F311286413A75EE369994001 /* ge_madd.c in Sources */, - 977A32DCCB94FE45BEDC4E73 /* ge_msub.c in Sources */, - 3CC909B91755CCC7DB501B38 /* ge_p1p1_to_p2.c in Sources */, - DE4F21B8E078961070474F4C /* ge_p1p1_to_p3.c in Sources */, - 56EA9C4B2E290D7361A328B1 /* ge_p2_0.c in Sources */, - 92F008FF63C81C2CFCA78CDB /* ge_p2_dbl.c in Sources */, - 0EFF177AD66A0346172F10B4 /* ge_p3_0.c in Sources */, - A631B9C3DBA6F82FA476E5BA /* ge_p3_dbl.c in Sources */, - 13A9688FB4CE690644762733 /* ge_p3_to_cached.c in Sources */, - F1E1932410DDA00F49E33E98 /* ge_p3_to_p2.c in Sources */, - 603AA8247899700A79821D0B /* ge_p3_tobytes.c in Sources */, - 8FC0088D5D3C24447D8715D1 /* ge_precomp_0.c in Sources */, - 2B4BD2074D1ABC7757E2D17A /* ge_scalarmult_base.c in Sources */, - 132140FD9DF25F7975EB9150 /* ge_sub.c in Sources */, - 11A269E99577529B59D0079C /* ge_tobytes.c in Sources */, - 36108E791558D1CECB6281DE /* generichash_blake2_api.c in Sources */, - 7CDEF5C25DD4E18B73216F38 /* generichash_blake2b.c in Sources */, - C0E648BD9203C687BA3BB1BF /* hash_sha256.c in Sources */, - DB0BA8193B26F932EACF5873 /* hash_sha256_api.c in Sources */, - 7B9A757F6E1BF0FAE74D4BF9 /* hash_sha512.c in Sources */, - DFFE2D8571D9BF864D6080A7 /* hash_sha512_api.c in Sources */, - ACA02C53CFA1037A9DA7B8F0 /* hmac_hmacsha256.c in Sources */, - AA48713E384217E2521D5911 /* hmac_hmacsha512.c in Sources */, - 35B728EEC5F0AE9F4559BBFD /* hmac_hmacsha512256.c in Sources */, - 0889CE50719C3916BF386C63 /* int128_aes128ctr.c in Sources */, - EC19678FC4687AAE50176B65 /* keypair.c in Sources */, - 1B6130BDFD63C448E1748590 /* keypair_curve25519xsalsa20poly1305.c in Sources */, - 903421D6443715E4E264CEC5 /* onetimeauth_poly1305.c in Sources */, - B8B75D84677238C66233ACDF /* onetimeauth_poly1305_api.c in Sources */, - 2F6C70A291C9305D54514753 /* onetimeauth_poly1305_try.c in Sources */, - B3BA4B8CB554CE4AED0BB83B /* open.c in Sources */, - 8B5E07C0E7EF69F4B54BABBD /* pbkdf2-sha256.c in Sources */, - 0885AD4961CA23E21B935908 /* pwhash_scryptsalsa208sha256.c in Sources */, - 9685EB6F640ED8652263947A /* pwhash_scryptsalsa208sha256_nosse.c in Sources */, - CCD18E74CB59F7B550289E91 /* pwhash_scryptsalsa208sha256_sse.c in Sources */, - E1F939EB319E2FD4CE472A91 /* randombytes.c in Sources */, - EDD50E56BBA7EBB844E78E3B /* randombytes_salsa20_random.c in Sources */, - B33391FB614F24DBF7266B3A /* randombytes_sysrandom.c in Sources */, - 88E12D5C4BEBB1B6F853C136 /* runtime.c in Sources */, - 5C6E72AAEF5B14E3B6CB0889 /* sc25519_edwards25519sha512batch.c in Sources */, - 9636B80C6DB691A018A55B55 /* sc_muladd.c in Sources */, - 4868FE4D35D2DC73E1997E1C /* sc_reduce.c in Sources */, - 3B2D25EC39A3DF4D3B4DA94F /* scalarmult_curve25519_api.c in Sources */, - 92038F22B628AEECFF814E0B /* scalarmult_curve25519_ref10.c in Sources */, - 7243B769CAA134F5E795CD6C /* scrypt_platform.c in Sources */, - DA8A62D094D7BAFBD3DF0AA7 /* secretbox_xsalsa20poly1305_api.c in Sources */, - 9F3B1D731A9E76B0E29C8168 /* shorthash_siphash24.c in Sources */, - B3C1E215B4F494110F26B5B5 /* shorthash_siphash24_api.c in Sources */, - 668410AEDBC27E302EA18DA3 /* sign.c in Sources */, - 23D5D95011C5F4903E000ACB /* sign_ed25519_api.c in Sources */, - D9B31E990B2539E13FE7575B /* sign_edwards25519sha512batch.c in Sources */, - F376A746A98DA9E64873AB71 /* sign_edwards25519sha512batch_api.c in Sources */, - 7E5586CA3B240E8E0B6D2495 /* smult_curve25519_donna_c64.c in Sources */, - AB378BDC3350FB4E79D5CB90 /* stream_aes128ctr.c in Sources */, - 5B8E072A42A4AEB33FF6DDCB /* stream_aes128ctr_api.c in Sources */, - 3222D2A2495929EDBD3D0E47 /* stream_chacha20_api.c in Sources */, - FF2C9C8FA227566248BF93A5 /* stream_chacha20_ref.c in Sources */, - 0B717E224DCAF350F4D9EF46 /* stream_salsa2012.c in Sources */, - D858CF2FDEDBF4B841047F3C /* stream_salsa2012_api.c in Sources */, - A015757BCF7E2D3437A7F8B0 /* stream_salsa208.c in Sources */, - E903A2C256A3003209C37501 /* stream_salsa208_api.c in Sources */, - 623F70E878AD66CF1D6F73D8 /* stream_salsa20_api.c in Sources */, - 9976B32DA7ABA8628F0B4068 /* stream_salsa20_ref.c in Sources */, - 20B368B0CC85E06CF6B957DE /* stream_xsalsa20.c in Sources */, - 7FBDA6D5BB7D84B8DBC615E3 /* stream_xsalsa20_api.c in Sources */, - 6CBAD4B96AC1662A6AF59431 /* utils.c in Sources */, - 495CBB998A5D5A2EB41BCB00 /* verify_16.c in Sources */, - 96DBC9A4BE35AA6E5CD35B2E /* verify_16_api.c in Sources */, - A5DE66115E8BF4AD2384801E /* verify_32.c in Sources */, - 7FBC41EA3978802EB4F05ED6 /* verify_32_api.c in Sources */, - 76340507656E3F71F64EA5AC /* verify_64.c in Sources */, - 75521617E34E3864C0041056 /* verify_64_api.c in Sources */, - C5981E850108B8D84D540EEA /* verify_hmacsha256.c in Sources */, - 1E0173E612FB8CFF311554AE /* verify_hmacsha512.c in Sources */, - 8E917D49098297FBEBA4BF35 /* verify_hmacsha512256.c in Sources */, - F2E68BE1BD2399446AE8F8F1 /* verify_poly1305_donna.c in Sources */, - 6B2D05AA2F9473EE9AEBD67A /* version.c in Sources */, - 75352F132350A6077A2FB36A /* xor_afternm_aes128ctr.c in Sources */, - BB42DB7AB25D2DF477E82C3D /* xor_salsa2012.c in Sources */, - AB69199D55AA724700FAFC76 /* xor_salsa208.c in Sources */, - B107EB691DC8E2D8A690A4A2 /* xor_salsa20_ref.c in Sources */, - 31212B8D3CF37E75805ADAD9 /* xor_xsalsa20.c in Sources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - B13035EFA6432618E6DA00EB /* Sources */ = { - isa = PBXSourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - F595A66F3DD56F552FCD5C63 /* Pods-tunnel-dummy.m in Sources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXSourcesBuildPhase section */ - -/* Begin PBXTargetDependency section */ - 8100755CFF5D545D4A0BE971 /* PBXTargetDependency */ = { - isa = PBXTargetDependency; - name = "Pods-tunnel-libsodium"; - target = 86536A03F9FAF70FD063F9C7 /* Pods-tunnel-libsodium */; - targetProxy = 1FA52C570427034ABA2038B5 /* PBXContainerItemProxy */; - }; -/* End PBXTargetDependency section */ - -/* Begin XCBuildConfiguration section */ - 352644B2356BFCF0C9ABB970 /* Release */ = { - isa = XCBuildConfiguration; - buildSettings = { - ALWAYS_SEARCH_USER_PATHS = NO; - CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; - CLANG_CXX_LIBRARY = "libc++"; - CLANG_ENABLE_MODULES = YES; - CLANG_ENABLE_OBJC_ARC = YES; - CLANG_WARN_BOOL_CONVERSION = YES; - CLANG_WARN_CONSTANT_CONVERSION = YES; - CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES; - CLANG_WARN_EMPTY_BODY = YES; - CLANG_WARN_ENUM_CONVERSION = YES; - CLANG_WARN_INT_CONVERSION = YES; - CLANG_WARN_OBJC_ROOT_CLASS = YES; - CLANG_WARN_UNREACHABLE_CODE = YES; - CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; - COPY_PHASE_STRIP = YES; - ENABLE_NS_ASSERTIONS = NO; - GCC_C_LANGUAGE_STANDARD = gnu99; - GCC_PREPROCESSOR_DEFINITIONS = "RELEASE=1"; - GCC_WARN_64_TO_32_BIT_CONVERSION = YES; - GCC_WARN_ABOUT_RETURN_TYPE = YES; - GCC_WARN_UNDECLARED_SELECTOR = YES; - GCC_WARN_UNINITIALIZED_AUTOS = YES; - GCC_WARN_UNUSED_FUNCTION = YES; - GCC_WARN_UNUSED_VARIABLE = YES; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - STRIP_INSTALLED_PRODUCT = NO; - SYMROOT = "${SRCROOT}/../build"; - VALIDATE_PRODUCT = YES; - }; - name = Release; - }; - 5A6E00ED6B3FC65593941677 /* Debug */ = { - isa = XCBuildConfiguration; - buildSettings = { - ALWAYS_SEARCH_USER_PATHS = NO; - CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; - CLANG_CXX_LIBRARY = "libc++"; - CLANG_ENABLE_MODULES = YES; - CLANG_ENABLE_OBJC_ARC = YES; - CLANG_WARN_BOOL_CONVERSION = YES; - CLANG_WARN_CONSTANT_CONVERSION = YES; - CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES; - CLANG_WARN_EMPTY_BODY = YES; - CLANG_WARN_ENUM_CONVERSION = YES; - CLANG_WARN_INT_CONVERSION = YES; - CLANG_WARN_OBJC_ROOT_CLASS = YES; - CLANG_WARN_UNREACHABLE_CODE = YES; - CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; - COPY_PHASE_STRIP = NO; - GCC_C_LANGUAGE_STANDARD = gnu99; - GCC_DYNAMIC_NO_PIC = NO; - GCC_OPTIMIZATION_LEVEL = 0; - GCC_PREPROCESSOR_DEFINITIONS = ( - "DEBUG=1", - "$(inherited)", - ); - GCC_SYMBOLS_PRIVATE_EXTERN = NO; - GCC_WARN_64_TO_32_BIT_CONVERSION = YES; - GCC_WARN_ABOUT_RETURN_TYPE = YES; - GCC_WARN_UNDECLARED_SELECTOR = YES; - GCC_WARN_UNINITIALIZED_AUTOS = YES; - GCC_WARN_UNUSED_FUNCTION = YES; - GCC_WARN_UNUSED_VARIABLE = YES; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - ONLY_ACTIVE_ARCH = YES; - STRIP_INSTALLED_PRODUCT = NO; - SYMROOT = "${SRCROOT}/../build"; - }; - name = Debug; - }; - ACD4D96ED5FBA3714425CA4F /* Release */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = 5285A8C8877DD4DEBDC67C8F /* Pods-tunnel-libsodium-Private.xcconfig */; - buildSettings = { - APPLICATION_EXTENSION_API_ONLY = YES; - ENABLE_STRICT_OBJC_MSGSEND = YES; - GCC_PREFIX_HEADER = "Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-prefix.pch"; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - MTL_ENABLE_DEBUG_INFO = NO; - OTHER_LDFLAGS = ""; - OTHER_LIBTOOLFLAGS = ""; - PRODUCT_NAME = "$(TARGET_NAME)"; - SDKROOT = iphoneos; - SKIP_INSTALL = YES; - }; - name = Release; - }; - C8FD200D8E002DB88D9FD3DD /* Debug */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = 5285A8C8877DD4DEBDC67C8F /* Pods-tunnel-libsodium-Private.xcconfig */; - buildSettings = { - APPLICATION_EXTENSION_API_ONLY = YES; - ENABLE_STRICT_OBJC_MSGSEND = YES; - GCC_PREFIX_HEADER = "Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-prefix.pch"; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - MTL_ENABLE_DEBUG_INFO = YES; - OTHER_LDFLAGS = ""; - OTHER_LIBTOOLFLAGS = ""; - PRODUCT_NAME = "$(TARGET_NAME)"; - SDKROOT = iphoneos; - SKIP_INSTALL = YES; - }; - name = Debug; - }; - F5CD4E7B27EC36E85E4EB8CC /* Release */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = AE6E3C354E16164F9F0A1DF6 /* Pods-tunnel.release.xcconfig */; - buildSettings = { - APPLICATION_EXTENSION_API_ONLY = YES; - ENABLE_STRICT_OBJC_MSGSEND = YES; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - MTL_ENABLE_DEBUG_INFO = NO; - OTHER_LDFLAGS = ""; - OTHER_LIBTOOLFLAGS = ""; - PODS_ROOT = "$(SRCROOT)"; - PRODUCT_NAME = "$(TARGET_NAME)"; - SDKROOT = iphoneos; - SKIP_INSTALL = YES; - }; - name = Release; - }; - F9B9CDB3B6524344EE624F46 /* Debug */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = 8B0AC198F0C58CF0034D5A4C /* Pods-tunnel.debug.xcconfig */; - buildSettings = { - APPLICATION_EXTENSION_API_ONLY = YES; - ENABLE_STRICT_OBJC_MSGSEND = YES; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - MTL_ENABLE_DEBUG_INFO = YES; - OTHER_LDFLAGS = ""; - OTHER_LIBTOOLFLAGS = ""; - PODS_ROOT = "$(SRCROOT)"; - PRODUCT_NAME = "$(TARGET_NAME)"; - SDKROOT = iphoneos; - SKIP_INSTALL = YES; - }; - name = Debug; - }; -/* End XCBuildConfiguration section */ - -/* Begin XCConfigurationList section */ - 38A31BA5204BF5E41164C812 /* Build configuration list for PBXNativeTarget "Pods-tunnel-libsodium" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - C8FD200D8E002DB88D9FD3DD /* Debug */, - ACD4D96ED5FBA3714425CA4F /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; - 5E99FCDEB019A1247E35E050 /* Build configuration list for PBXNativeTarget "Pods-tunnel" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - F9B9CDB3B6524344EE624F46 /* Debug */, - F5CD4E7B27EC36E85E4EB8CC /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; - C4FDE648F8DFA524A2085D94 /* Build configuration list for PBXProject "Pods" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - 5A6E00ED6B3FC65593941677 /* Debug */, - 352644B2356BFCF0C9ABB970 /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; -/* End XCConfigurationList section */ - }; - rootObject = 13EA2FA015042E5E02522CCE /* Project object */; -} diff --git a/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/Pods-tunnel-libsodium.xcscheme b/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/Pods-tunnel-libsodium.xcscheme deleted file mode 100644 index 890db29..0000000 --- a/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/Pods-tunnel-libsodium.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/Pods-tunnel.xcscheme b/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/Pods-tunnel.xcscheme deleted file mode 100644 index b993a95..0000000 --- a/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/Pods-tunnel.xcscheme +++ /dev/null @@ -1,59 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/xcschememanagement.plist b/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/xcschememanagement.plist deleted file mode 100644 index 99f1b96..0000000 --- a/Pods/Pods.xcodeproj/xcuserdata/clowwindy.xcuserdatad/xcschemes/xcschememanagement.plist +++ /dev/null @@ -1,32 +0,0 @@ - - - - - SchemeUserState - - Pods-tunnel-libsodium.xcscheme - - isShown - - - Pods-tunnel.xcscheme - - isShown - - - - SuppressBuildableAutocreation - - 86536A03F9FAF70FD063F9C7 - - primary - - - F845435C4F67920693C75BDE - - primary - - - - - diff --git a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-Private.xcconfig b/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-Private.xcconfig deleted file mode 100644 index ecc6192..0000000 --- a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-Private.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -#include "Pods-tunnel-libsodium.xcconfig" -GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 -HEADER_SEARCH_PATHS = "${PODS_ROOT}/Headers/Private" "${PODS_ROOT}/Headers/Private/crypto_auth/hmacsha256/cp" "${PODS_ROOT}/Headers/Private/crypto_auth/hmacsha512/cp" "${PODS_ROOT}/Headers/Private/crypto_auth/hmacsha512256/cp" "${PODS_ROOT}/Headers/Private/crypto_box/curve25519xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Private/crypto_core/hsalsa20/ref2" "${PODS_ROOT}/Headers/Private/crypto_core/salsa20/ref" "${PODS_ROOT}/Headers/Private/crypto_core/salsa2012/ref" "${PODS_ROOT}/Headers/Private/crypto_core/salsa208/ref" "${PODS_ROOT}/Headers/Private/crypto_generichash/blake2/ref" "${PODS_ROOT}/Headers/Private/crypto_hash/sha256/cp" "${PODS_ROOT}/Headers/Private/crypto_hash/sha512/cp" "${PODS_ROOT}/Headers/Private/crypto_onetimeauth/poly1305/donna" "${PODS_ROOT}/Headers/Private/crypto_pwhash/scryptsalsa208sha256" "${PODS_ROOT}/Headers/Private/crypto_scalarmult/curve25519/donna_c64" "${PODS_ROOT}/Headers/Private/crypto_scalarmult/curve25519/ref10" "${PODS_ROOT}/Headers/Private/crypto_secretbox/xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Private/crypto_shorthash/siphash24/ref" "${PODS_ROOT}/Headers/Private/crypto_sign/ed25519/ref10" "${PODS_ROOT}/Headers/Private/crypto_sign/edwards25519sha512batch/ref" "${PODS_ROOT}/Headers/Private/crypto_stream/aes128ctr/portable" "${PODS_ROOT}/Headers/Private/crypto_stream/chacha20/ref" "${PODS_ROOT}/Headers/Private/crypto_stream/salsa20/amd64_xmm6" "${PODS_ROOT}/Headers/Private/crypto_stream/salsa20/ref" "${PODS_ROOT}/Headers/Private/crypto_stream/salsa2012/ref" "${PODS_ROOT}/Headers/Private/crypto_stream/salsa208/ref" "${PODS_ROOT}/Headers/Private/crypto_stream/xsalsa20/ref" "${PODS_ROOT}/Headers/Private/crypto_verify/16/ref" "${PODS_ROOT}/Headers/Private/crypto_verify/32/ref" "${PODS_ROOT}/Headers/Private/crypto_verify/64/ref" "${PODS_ROOT}/Headers/Private/libsodium" "${PODS_ROOT}/Headers/Private/libsodium/sodium" "${PODS_ROOT}/Headers/Public" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha256/cp" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512/cp" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512256/cp" "${PODS_ROOT}/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Public/crypto_core/hsalsa20/ref2" "${PODS_ROOT}/Headers/Public/crypto_core/salsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_core/salsa2012/ref" "${PODS_ROOT}/Headers/Public/crypto_core/salsa208/ref" "${PODS_ROOT}/Headers/Public/crypto_generichash/blake2/ref" "${PODS_ROOT}/Headers/Public/crypto_hash/sha256/cp" "${PODS_ROOT}/Headers/Public/crypto_hash/sha512/cp" "${PODS_ROOT}/Headers/Public/crypto_onetimeauth/poly1305/donna" "${PODS_ROOT}/Headers/Public/crypto_pwhash/scryptsalsa208sha256" "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/donna_c64" "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/ref10" "${PODS_ROOT}/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Public/crypto_shorthash/siphash24/ref" "${PODS_ROOT}/Headers/Public/crypto_sign/ed25519/ref10" "${PODS_ROOT}/Headers/Public/crypto_sign/edwards25519sha512batch/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/aes128ctr/portable" "${PODS_ROOT}/Headers/Public/crypto_stream/chacha20/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/amd64_xmm6" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa2012/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa208/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/xsalsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/16/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/32/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/64/ref" "${PODS_ROOT}/Headers/Public/libsodium" "${PODS_ROOT}/Headers/Public/libsodium/sodium" -OTHER_LDFLAGS = -ObjC -PODS_ROOT = ${SRCROOT} -SKIP_INSTALL = YES \ No newline at end of file diff --git a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-dummy.m b/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-dummy.m deleted file mode 100644 index 2cbf67a..0000000 --- a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-dummy.m +++ /dev/null @@ -1,5 +0,0 @@ -#import -@interface PodsDummy_Pods_tunnel_libsodium : NSObject -@end -@implementation PodsDummy_Pods_tunnel_libsodium -@end diff --git a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-prefix.pch b/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-prefix.pch deleted file mode 100644 index 622eb67..0000000 --- a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium-prefix.pch +++ /dev/null @@ -1,5 +0,0 @@ -#ifdef __OBJC__ -#import -#endif - -#import "Pods-tunnel-environment.h" diff --git a/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium.xcconfig b/Pods/Target Support Files/Pods-tunnel-libsodium/Pods-tunnel-libsodium.xcconfig deleted file mode 100644 index e69de29..0000000 diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-acknowledgements.markdown b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-acknowledgements.markdown deleted file mode 100644 index 6982119..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-acknowledgements.markdown +++ /dev/null @@ -1,7 +0,0 @@ -# Acknowledgements -This application makes use of the following third party libraries: - -## libsodium - -Copyright © 2013\nFrank Denis \n\nPermission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\n\n -Generated by CocoaPods - http://cocoapods.org diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-acknowledgements.plist b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-acknowledgements.plist deleted file mode 100644 index 5111585..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-acknowledgements.plist +++ /dev/null @@ -1,37 +0,0 @@ - - - - - PreferenceSpecifiers - - - FooterText - This application makes use of the following third party libraries: - Title - Acknowledgements - Type - PSGroupSpecifier - - - FooterText - Copyright © 2013\nFrank Denis <j at pureftpd dot org>\n\nPermission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.\n\n - Title - libsodium - Type - PSGroupSpecifier - - - FooterText - Generated by CocoaPods - http://cocoapods.org - Title - - Type - PSGroupSpecifier - - - StringsTable - Acknowledgements - Title - Acknowledgements - - diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-dummy.m b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-dummy.m deleted file mode 100644 index ed7fe74..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-dummy.m +++ /dev/null @@ -1,5 +0,0 @@ -#import -@interface PodsDummy_Pods_tunnel : NSObject -@end -@implementation PodsDummy_Pods_tunnel -@end diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-environment.h b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-environment.h deleted file mode 100644 index 600eccb..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-environment.h +++ /dev/null @@ -1,14 +0,0 @@ - -// To check if a library is compiled with CocoaPods you -// can use the `COCOAPODS` macro definition which is -// defined in the xcconfigs so it is available in -// headers also when they are imported in the client -// project. - - -// libsodium -#define COCOAPODS_POD_AVAILABLE_libsodium -#define COCOAPODS_VERSION_MAJOR_libsodium 1 -#define COCOAPODS_VERSION_MINOR_libsodium 0 -#define COCOAPODS_VERSION_PATCH_libsodium 3 - diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-resources.sh b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-resources.sh deleted file mode 100755 index 43f0852..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-resources.sh +++ /dev/null @@ -1,93 +0,0 @@ -#!/bin/sh -set -e - -mkdir -p "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" - -RESOURCES_TO_COPY=${PODS_ROOT}/resources-to-copy-${TARGETNAME}.txt -> "$RESOURCES_TO_COPY" - -XCASSET_FILES=() - -realpath() { - DIRECTORY=$(cd "${1%/*}" && pwd) - FILENAME="${1##*/}" - echo "$DIRECTORY/$FILENAME" -} - -install_resource() -{ - case $1 in - *.storyboard) - echo "ibtool --reference-external-strings-file --errors --warnings --notices --output-format human-readable-text --compile ${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .storyboard`.storyboardc ${PODS_ROOT}/$1 --sdk ${SDKROOT}" - ibtool --reference-external-strings-file --errors --warnings --notices --output-format human-readable-text --compile "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .storyboard`.storyboardc" "${PODS_ROOT}/$1" --sdk "${SDKROOT}" - ;; - *.xib) - echo "ibtool --reference-external-strings-file --errors --warnings --notices --output-format human-readable-text --compile ${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .xib`.nib ${PODS_ROOT}/$1 --sdk ${SDKROOT}" - ibtool --reference-external-strings-file --errors --warnings --notices --output-format human-readable-text --compile "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename \"$1\" .xib`.nib" "${PODS_ROOT}/$1" --sdk "${SDKROOT}" - ;; - *.framework) - echo "mkdir -p ${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - mkdir -p "${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - echo "rsync -av ${PODS_ROOT}/$1 ${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - rsync -av "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${FRAMEWORKS_FOLDER_PATH}" - ;; - *.xcdatamodel) - echo "xcrun momc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1"`.mom\"" - xcrun momc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodel`.mom" - ;; - *.xcdatamodeld) - echo "xcrun momc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodeld`.momd\"" - xcrun momc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcdatamodeld`.momd" - ;; - *.xcmappingmodel) - echo "xcrun mapc \"${PODS_ROOT}/$1\" \"${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcmappingmodel`.cdm\"" - xcrun mapc "${PODS_ROOT}/$1" "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/`basename "$1" .xcmappingmodel`.cdm" - ;; - *.xcassets) - ABSOLUTE_XCASSET_FILE=$(realpath "${PODS_ROOT}/$1") - XCASSET_FILES+=("$ABSOLUTE_XCASSET_FILE") - ;; - /*) - echo "$1" - echo "$1" >> "$RESOURCES_TO_COPY" - ;; - *) - echo "${PODS_ROOT}/$1" - echo "${PODS_ROOT}/$1" >> "$RESOURCES_TO_COPY" - ;; - esac -} - -rsync -avr --copy-links --no-relative --exclude '*/.svn/*' --files-from="$RESOURCES_TO_COPY" / "${CONFIGURATION_BUILD_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" -if [[ "${ACTION}" == "install" ]]; then - rsync -avr --copy-links --no-relative --exclude '*/.svn/*' --files-from="$RESOURCES_TO_COPY" / "${INSTALL_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" -fi -rm -f "$RESOURCES_TO_COPY" - -if [[ -n "${WRAPPER_EXTENSION}" ]] && [ "`xcrun --find actool`" ] && [ -n "$XCASSET_FILES" ] -then - case "${TARGETED_DEVICE_FAMILY}" in - 1,2) - TARGET_DEVICE_ARGS="--target-device ipad --target-device iphone" - ;; - 1) - TARGET_DEVICE_ARGS="--target-device iphone" - ;; - 2) - TARGET_DEVICE_ARGS="--target-device ipad" - ;; - *) - TARGET_DEVICE_ARGS="--target-device mac" - ;; - esac - - # Find all other xcassets (this unfortunately includes those of path pods and other targets). - OTHER_XCASSETS=$(find "$PWD" -iname "*.xcassets" -type d) - while read line; do - if [[ $line != "`realpath $PODS_ROOT`*" ]]; then - XCASSET_FILES+=("$line") - fi - done <<<"$OTHER_XCASSETS" - - printf "%s\0" "${XCASSET_FILES[@]}" | xargs -0 xcrun actool --output-format human-readable-text --notices --warnings --platform "${PLATFORM_NAME}" --minimum-deployment-target "${IPHONEOS_DEPLOYMENT_TARGET}" ${TARGET_DEVICE_ARGS} --compress-pngs --compile "${BUILT_PRODUCTS_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}" -fi diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel.debug.xcconfig b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel.debug.xcconfig deleted file mode 100644 index 0b33c8d..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel.debug.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 -HEADER_SEARCH_PATHS = $(inherited) "${PODS_ROOT}/Headers/Public" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha256/cp" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512/cp" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512256/cp" "${PODS_ROOT}/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Public/crypto_core/hsalsa20/ref2" "${PODS_ROOT}/Headers/Public/crypto_core/salsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_core/salsa2012/ref" "${PODS_ROOT}/Headers/Public/crypto_core/salsa208/ref" "${PODS_ROOT}/Headers/Public/crypto_generichash/blake2/ref" "${PODS_ROOT}/Headers/Public/crypto_hash/sha256/cp" "${PODS_ROOT}/Headers/Public/crypto_hash/sha512/cp" "${PODS_ROOT}/Headers/Public/crypto_onetimeauth/poly1305/donna" "${PODS_ROOT}/Headers/Public/crypto_pwhash/scryptsalsa208sha256" "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/donna_c64" "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/ref10" "${PODS_ROOT}/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Public/crypto_shorthash/siphash24/ref" "${PODS_ROOT}/Headers/Public/crypto_sign/ed25519/ref10" "${PODS_ROOT}/Headers/Public/crypto_sign/edwards25519sha512batch/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/aes128ctr/portable" "${PODS_ROOT}/Headers/Public/crypto_stream/chacha20/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/amd64_xmm6" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa2012/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa208/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/xsalsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/16/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/32/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/64/ref" "${PODS_ROOT}/Headers/Public/libsodium" "${PODS_ROOT}/Headers/Public/libsodium/sodium" -OTHER_CFLAGS = $(inherited) -isystem "${PODS_ROOT}/Headers/Public" -isystem "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha256/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512256/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/hsalsa20/ref2" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/salsa20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/salsa2012/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/salsa208/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_generichash/blake2/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_hash/sha256/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_hash/sha512/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_onetimeauth/poly1305/donna" -isystem "${PODS_ROOT}/Headers/Public/crypto_pwhash/scryptsalsa208sha256" -isystem "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/donna_c64" -isystem "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/ref10" -isystem "${PODS_ROOT}/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_shorthash/siphash24/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_sign/ed25519/ref10" -isystem "${PODS_ROOT}/Headers/Public/crypto_sign/edwards25519sha512batch/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/aes128ctr/portable" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/chacha20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/amd64_xmm6" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa2012/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa208/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/xsalsa20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_verify/16/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_verify/32/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_verify/64/ref" -isystem "${PODS_ROOT}/Headers/Public/libsodium" -isystem "${PODS_ROOT}/Headers/Public/libsodium/sodium" -OTHER_LDFLAGS = $(inherited) -ObjC -l"Pods-tunnel-libsodium" -OTHER_LIBTOOLFLAGS = $(OTHER_LDFLAGS) -PODS_ROOT = ${SRCROOT}/Pods \ No newline at end of file diff --git a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel.release.xcconfig b/Pods/Target Support Files/Pods-tunnel/Pods-tunnel.release.xcconfig deleted file mode 100644 index 0b33c8d..0000000 --- a/Pods/Target Support Files/Pods-tunnel/Pods-tunnel.release.xcconfig +++ /dev/null @@ -1,6 +0,0 @@ -GCC_PREPROCESSOR_DEFINITIONS = $(inherited) COCOAPODS=1 -HEADER_SEARCH_PATHS = $(inherited) "${PODS_ROOT}/Headers/Public" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha256/cp" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512/cp" "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512256/cp" "${PODS_ROOT}/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Public/crypto_core/hsalsa20/ref2" "${PODS_ROOT}/Headers/Public/crypto_core/salsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_core/salsa2012/ref" "${PODS_ROOT}/Headers/Public/crypto_core/salsa208/ref" "${PODS_ROOT}/Headers/Public/crypto_generichash/blake2/ref" "${PODS_ROOT}/Headers/Public/crypto_hash/sha256/cp" "${PODS_ROOT}/Headers/Public/crypto_hash/sha512/cp" "${PODS_ROOT}/Headers/Public/crypto_onetimeauth/poly1305/donna" "${PODS_ROOT}/Headers/Public/crypto_pwhash/scryptsalsa208sha256" "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/donna_c64" "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/ref10" "${PODS_ROOT}/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref" "${PODS_ROOT}/Headers/Public/crypto_shorthash/siphash24/ref" "${PODS_ROOT}/Headers/Public/crypto_sign/ed25519/ref10" "${PODS_ROOT}/Headers/Public/crypto_sign/edwards25519sha512batch/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/aes128ctr/portable" "${PODS_ROOT}/Headers/Public/crypto_stream/chacha20/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/amd64_xmm6" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa2012/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/salsa208/ref" "${PODS_ROOT}/Headers/Public/crypto_stream/xsalsa20/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/16/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/32/ref" "${PODS_ROOT}/Headers/Public/crypto_verify/64/ref" "${PODS_ROOT}/Headers/Public/libsodium" "${PODS_ROOT}/Headers/Public/libsodium/sodium" -OTHER_CFLAGS = $(inherited) -isystem "${PODS_ROOT}/Headers/Public" -isystem "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha256/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_auth/hmacsha512256/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_box/curve25519xsalsa20poly1305/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/hsalsa20/ref2" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/salsa20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/salsa2012/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_core/salsa208/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_generichash/blake2/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_hash/sha256/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_hash/sha512/cp" -isystem "${PODS_ROOT}/Headers/Public/crypto_onetimeauth/poly1305/donna" -isystem "${PODS_ROOT}/Headers/Public/crypto_pwhash/scryptsalsa208sha256" -isystem "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/donna_c64" -isystem "${PODS_ROOT}/Headers/Public/crypto_scalarmult/curve25519/ref10" -isystem "${PODS_ROOT}/Headers/Public/crypto_secretbox/xsalsa20poly1305/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_shorthash/siphash24/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_sign/ed25519/ref10" -isystem "${PODS_ROOT}/Headers/Public/crypto_sign/edwards25519sha512batch/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/aes128ctr/portable" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/chacha20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/amd64_xmm6" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa2012/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/salsa208/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_stream/xsalsa20/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_verify/16/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_verify/32/ref" -isystem "${PODS_ROOT}/Headers/Public/crypto_verify/64/ref" -isystem "${PODS_ROOT}/Headers/Public/libsodium" -isystem "${PODS_ROOT}/Headers/Public/libsodium/sodium" -OTHER_LDFLAGS = $(inherited) -ObjC -l"Pods-tunnel-libsodium" -OTHER_LIBTOOLFLAGS = $(OTHER_LDFLAGS) -PODS_ROOT = ${SRCROOT}/Pods \ No newline at end of file diff --git a/Pods/libsodium/LICENSE b/Pods/libsodium/LICENSE deleted file mode 100644 index 3edb000..0000000 --- a/Pods/libsodium/LICENSE +++ /dev/null @@ -1,16 +0,0 @@ -/* - * Copyright (c) 2013-2015 - * Frank Denis - * - * Permission to use, copy, modify, and/or distribute this software for any - * purpose with or without fee is hereby granted, provided that the above - * copyright notice and this permission notice appear in all copies. - * - * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES - * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF - * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR - * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES - * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN - * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF - * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. - */ diff --git a/Pods/libsodium/README b/Pods/libsodium/README deleted file mode 100644 index 1dbff7a..0000000 --- a/Pods/libsodium/README +++ /dev/null @@ -1 +0,0 @@ -See README.markdown diff --git a/Pods/libsodium/README.markdown b/Pods/libsodium/README.markdown deleted file mode 100644 index 9db4c1d..0000000 --- a/Pods/libsodium/README.markdown +++ /dev/null @@ -1,36 +0,0 @@ -[![Build Status](https://travis-ci.org/jedisct1/libsodium.png?branch=master)](https://travis-ci.org/jedisct1/libsodium?branch=master) -[![Coverity Scan Build Status](https://scan.coverity.com/projects/2397/badge.svg)](https://scan.coverity.com/projects/2397) - -![libsodium](https://raw.github.com/jedisct1/libsodium/master/logo.png) -============ - -Sodium is a new, easy-to-use software library for encryption, -decryption, signatures, password hashing and more. - -It is a portable, cross-compilable, installable, packageable -fork of [NaCl](http://nacl.cr.yp.to/), with a compatible API, and an -extended API to improve usability even further. - -Its goal is to provide all of the core operations needed to build -higher-level cryptographic tools. - -Sodium supports a variety of compilers and operating systems, -including Windows (with MingW or Visual Studio, x86 and x64), iOS and Android. - -## Documentation - -The documentation is a work-in-progress, and is being written using -Gitbook: - -[libsodium documentation](https://download.libsodium.org/doc/) - -## Community - -A mailing-list is available to discuss libsodium. - -In order to join, just send a random mail to `sodium-subscribe` {at} -`pureftpd` {dot} `org`. - -## License - -[ISC license](https://en.wikipedia.org/wiki/ISC_license). diff --git a/Pods/libsodium/src/libsodium/crypto_aead/chacha20poly1305/sodium/aead_chacha20poly1305.c b/Pods/libsodium/src/libsodium/crypto_aead/chacha20poly1305/sodium/aead_chacha20poly1305.c deleted file mode 100644 index 945efe3..0000000 --- a/Pods/libsodium/src/libsodium/crypto_aead/chacha20poly1305/sodium/aead_chacha20poly1305.c +++ /dev/null @@ -1,148 +0,0 @@ - -#include -#include - -#include "crypto_aead_chacha20poly1305.h" -#include "crypto_onetimeauth_poly1305.h" -#include "crypto_stream_chacha20.h" -#include "crypto_verify_16.h" -#include "utils.h" - -static inline void -_u64_le_from_ull(unsigned char out[8U], unsigned long long x) -{ - out[0] = (unsigned char) (x & 0xff); x >>= 8; - out[1] = (unsigned char) (x & 0xff); x >>= 8; - out[2] = (unsigned char) (x & 0xff); x >>= 8; - out[3] = (unsigned char) (x & 0xff); x >>= 8; - out[4] = (unsigned char) (x & 0xff); x >>= 8; - out[5] = (unsigned char) (x & 0xff); x >>= 8; - out[6] = (unsigned char) (x & 0xff); x >>= 8; - out[7] = (unsigned char) (x & 0xff); -} - -int -crypto_aead_chacha20poly1305_encrypt(unsigned char *c, - unsigned long long *clen, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *ad, - unsigned long long adlen, - const unsigned char *nsec, - const unsigned char *npub, - const unsigned char *k) -{ - crypto_onetimeauth_poly1305_state state; - unsigned char block0[64U]; - unsigned char slen[8U]; - - (void) nsec; -/* LCOV_EXCL_START */ -#ifdef ULONG_LONG_MAX - if (mlen > ULONG_LONG_MAX - crypto_aead_chacha20poly1305_ABYTES) { - if (clen != NULL) { - *clen = 0ULL; - } - return -1; - } -#endif -/* LCOV_EXCL_STOP */ - - crypto_stream_chacha20(block0, sizeof block0, npub, k); - crypto_onetimeauth_poly1305_init(&state, block0); - sodium_memzero(block0, sizeof block0); - - crypto_onetimeauth_poly1305_update(&state, ad, adlen); - _u64_le_from_ull(slen, adlen); - crypto_onetimeauth_poly1305_update(&state, slen, sizeof slen); - - crypto_stream_chacha20_xor_ic(c, m, mlen, npub, 1U, k); - - crypto_onetimeauth_poly1305_update(&state, c, mlen); - _u64_le_from_ull(slen, mlen); - crypto_onetimeauth_poly1305_update(&state, slen, sizeof slen); - - crypto_onetimeauth_poly1305_final(&state, c + mlen); - sodium_memzero(&state, sizeof state); - - if (clen != NULL) { - *clen = mlen + crypto_aead_chacha20poly1305_ABYTES; - } - return 0; -} - -int -crypto_aead_chacha20poly1305_decrypt(unsigned char *m, - unsigned long long *mlen, - unsigned char *nsec, - const unsigned char *c, - unsigned long long clen, - const unsigned char *ad, - unsigned long long adlen, - const unsigned char *npub, - const unsigned char *k) -{ - crypto_onetimeauth_poly1305_state state; - unsigned char block0[64U]; - unsigned char slen[8U]; - unsigned char mac[crypto_aead_chacha20poly1305_ABYTES]; - int ret; - - (void) nsec; - if (mlen != NULL) { - *mlen = 0ULL; - } - if (clen < crypto_aead_chacha20poly1305_ABYTES) { - return -1; - } - crypto_stream_chacha20(block0, sizeof block0, npub, k); - crypto_onetimeauth_poly1305_init(&state, block0); - sodium_memzero(block0, sizeof block0); - - crypto_onetimeauth_poly1305_update(&state, ad, adlen); - _u64_le_from_ull(slen, adlen); - crypto_onetimeauth_poly1305_update(&state, slen, sizeof slen); - - crypto_onetimeauth_poly1305_update - (&state, c, clen - crypto_aead_chacha20poly1305_ABYTES); - _u64_le_from_ull(slen, clen - crypto_aead_chacha20poly1305_ABYTES); - crypto_onetimeauth_poly1305_update(&state, slen, sizeof slen); - - crypto_onetimeauth_poly1305_final(&state, mac); - sodium_memzero(&state, sizeof state); - - (void) sizeof(int[sizeof mac == 16U ? 1 : -1]); - ret = crypto_verify_16(mac, - c + clen - crypto_aead_chacha20poly1305_ABYTES); - sodium_memzero(mac, sizeof mac); - if (ret != 0) { - memset(m, 0, clen - crypto_aead_chacha20poly1305_ABYTES); - return -1; - } - crypto_stream_chacha20_xor_ic - (m, c, clen - crypto_aead_chacha20poly1305_ABYTES, npub, 1U, k); - if (mlen != NULL) { - *mlen = clen - crypto_aead_chacha20poly1305_ABYTES; - } - return 0; -} - -size_t -crypto_aead_chacha20poly1305_keybytes(void) { - return crypto_aead_chacha20poly1305_KEYBYTES; -} - -size_t -crypto_aead_chacha20poly1305_npubbytes(void) { - return crypto_aead_chacha20poly1305_NPUBBYTES; -} - -size_t -crypto_aead_chacha20poly1305_nsecbytes(void) { - return crypto_aead_chacha20poly1305_NSECBYTES; -} - -size_t -crypto_aead_chacha20poly1305_abytes(void) { - return crypto_aead_chacha20poly1305_ABYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/crypto_auth.c b/Pods/libsodium/src/libsodium/crypto_auth/crypto_auth.c deleted file mode 100644 index e76b149..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/crypto_auth.c +++ /dev/null @@ -1,34 +0,0 @@ - -#include "crypto_auth.h" - -size_t -crypto_auth_bytes(void) -{ - return crypto_auth_BYTES; -} - -size_t -crypto_auth_keybytes(void) -{ - return crypto_auth_KEYBYTES; -} - -const char * -crypto_auth_primitive(void) -{ - return crypto_auth_PRIMITIVE; -} - -int -crypto_auth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - return crypto_auth_hmacsha512256(out, in, inlen, k); -} - -int -crypto_auth_verify(const unsigned char *h, const unsigned char *in, - unsigned long long inlen,const unsigned char *k) -{ - return crypto_auth_hmacsha512256_verify(h, in, inlen, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/auth_hmacsha256_api.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/auth_hmacsha256_api.c deleted file mode 100644 index 9b8353f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/auth_hmacsha256_api.c +++ /dev/null @@ -1,16 +0,0 @@ -#include "crypto_auth_hmacsha256.h" - -size_t -crypto_auth_hmacsha256_bytes(void) { - return crypto_auth_hmacsha256_BYTES; -} - -size_t -crypto_auth_hmacsha256_keybytes(void) { - return crypto_auth_hmacsha256_KEYBYTES; -} - -size_t -crypto_auth_hmacsha256_statebytes(void) { - return sizeof(crypto_auth_hmacsha256_state); -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/api.h b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/api.h deleted file mode 100644 index cd4d38e..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/api.h +++ /dev/null @@ -1,9 +0,0 @@ - -#include "crypto_auth_hmacsha256.h" - -#define crypto_auth crypto_auth_hmacsha256 -#define crypto_auth_verify crypto_auth_hmacsha256_verify -#define crypto_auth_BYTES crypto_auth_hmacsha256_BYTES -#define crypto_auth_KEYBYTES crypto_auth_hmacsha256_KEYBYTES -#define crypto_auth_IMPLEMENTATION crypto_auth_hmacsha256_IMPLEMENTATION -#define crypto_auth_VERSION crypto_auth_hmacsha256_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/hmac_hmacsha256.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/hmac_hmacsha256.c deleted file mode 100644 index 9cd69ac..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/hmac_hmacsha256.c +++ /dev/null @@ -1,110 +0,0 @@ - -/*- - * Copyright 2005,2007,2009 Colin Percival - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - */ - -#include "api.h" -#include "crypto_auth_hmacsha256.h" -#include "crypto_hash_sha256.h" -#include "utils.h" - -#include - -#include -#include - -int -crypto_auth_hmacsha256_init(crypto_auth_hmacsha256_state *state, - const unsigned char *key, - size_t keylen) -{ - unsigned char pad[64]; - unsigned char khash[32]; - size_t i; - - if (keylen > 64) { - crypto_hash_sha256_init(&state->ictx); - crypto_hash_sha256_update(&state->ictx, key, keylen); - crypto_hash_sha256_final(&state->ictx, khash); - key = khash; - keylen = 32; - } - crypto_hash_sha256_init(&state->ictx); - memset(pad, 0x36, 64); - for (i = 0; i < keylen; i++) { - pad[i] ^= key[i]; - } - crypto_hash_sha256_update(&state->ictx, pad, 64); - - crypto_hash_sha256_init(&state->octx); - memset(pad, 0x5c, 64); - for (i = 0; i < keylen; i++) { - pad[i] ^= key[i]; - } - crypto_hash_sha256_update(&state->octx, pad, 64); - - sodium_memzero((void *) khash, sizeof khash); - - return 0; -} - -int -crypto_auth_hmacsha256_update(crypto_auth_hmacsha256_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - crypto_hash_sha256_update(&state->ictx, in, inlen); - - return 0; -} - -int -crypto_auth_hmacsha256_final(crypto_auth_hmacsha256_state *state, - unsigned char *out) -{ - unsigned char ihash[32]; - - crypto_hash_sha256_final(&state->ictx, ihash); - crypto_hash_sha256_update(&state->octx, ihash, 32); - crypto_hash_sha256_final(&state->octx, out); - - sodium_memzero((void *) ihash, sizeof ihash); - - return 0; -} - -int -crypto_auth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - crypto_auth_hmacsha256_state state; - - crypto_auth_hmacsha256_init(&state, k, crypto_auth_KEYBYTES); - crypto_auth_hmacsha256_update(&state, in, inlen); - crypto_auth_hmacsha256_final(&state, out); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/verify_hmacsha256.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/verify_hmacsha256.c deleted file mode 100644 index b30e5fc..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha256/cp/verify_hmacsha256.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "api.h" -#include "crypto_verify_32.h" -#include "utils.h" - -int crypto_auth_verify(const unsigned char *h,const unsigned char *in,unsigned long long inlen,const unsigned char *k) -{ - unsigned char correct[32]; - crypto_auth(correct,in,inlen,k); - return crypto_verify_32(h,correct) | (-(h == correct)) | - sodium_memcmp(correct,h,32); -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/auth_hmacsha512_api.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/auth_hmacsha512_api.c deleted file mode 100644 index 49b8c2d..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/auth_hmacsha512_api.c +++ /dev/null @@ -1,16 +0,0 @@ -#include "crypto_auth_hmacsha512.h" - -size_t -crypto_auth_hmacsha512_bytes(void) { - return crypto_auth_hmacsha512_BYTES; -} - -size_t -crypto_auth_hmacsha512_keybytes(void) { - return crypto_auth_hmacsha512_KEYBYTES; -} - -size_t -crypto_auth_hmacsha512_statebytes(void) { - return sizeof(crypto_auth_hmacsha512_state); -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/api.h b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/api.h deleted file mode 100644 index 0ce4043..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/api.h +++ /dev/null @@ -1,9 +0,0 @@ - -#include "crypto_auth_hmacsha512.h" - -#define crypto_auth crypto_auth_hmacsha512 -#define crypto_auth_verify crypto_auth_hmacsha512_verify -#define crypto_auth_BYTES crypto_auth_hmacsha512_BYTES -#define crypto_auth_KEYBYTES crypto_auth_hmacsha512_KEYBYTES -#define crypto_auth_IMPLEMENTATION crypto_auth_hmacsha512_IMPLEMENTATION -#define crypto_auth_VERSION crypto_auth_hmacsha512_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/hmac_hmacsha512.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/hmac_hmacsha512.c deleted file mode 100644 index 4ffd264..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/hmac_hmacsha512.c +++ /dev/null @@ -1,110 +0,0 @@ - -/*- - * Copyright 2005,2007,2009 Colin Percival - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - */ - -#include "api.h" -#include "crypto_auth_hmacsha512.h" -#include "crypto_hash_sha512.h" -#include "utils.h" - -#include - -#include -#include - -int -crypto_auth_hmacsha512_init(crypto_auth_hmacsha512_state *state, - const unsigned char *key, - size_t keylen) -{ - unsigned char pad[128]; - unsigned char khash[64]; - size_t i; - - if (keylen > 128) { - crypto_hash_sha512_init(&state->ictx); - crypto_hash_sha512_update(&state->ictx, key, keylen); - crypto_hash_sha512_final(&state->ictx, khash); - key = khash; - keylen = 64; - } - crypto_hash_sha512_init(&state->ictx); - memset(pad, 0x36, 128); - for (i = 0; i < keylen; i++) { - pad[i] ^= key[i]; - } - crypto_hash_sha512_update(&state->ictx, pad, 128); - - crypto_hash_sha512_init(&state->octx); - memset(pad, 0x5c, 128); - for (i = 0; i < keylen; i++) { - pad[i] ^= key[i]; - } - crypto_hash_sha512_update(&state->octx, pad, 128); - - sodium_memzero((void *) khash, sizeof khash); - - return 0; -} - -int -crypto_auth_hmacsha512_update(crypto_auth_hmacsha512_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - crypto_hash_sha512_update(&state->ictx, in, inlen); - - return 0; -} - -int -crypto_auth_hmacsha512_final(crypto_auth_hmacsha512_state *state, - unsigned char *out) -{ - unsigned char ihash[64]; - - crypto_hash_sha512_final(&state->ictx, ihash); - crypto_hash_sha512_update(&state->octx, ihash, 64); - crypto_hash_sha512_final(&state->octx, out); - - sodium_memzero((void *) ihash, sizeof ihash); - - return 0; -} - -int -crypto_auth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - crypto_auth_hmacsha512_state state; - - crypto_auth_hmacsha512_init(&state, k, crypto_auth_KEYBYTES); - crypto_auth_hmacsha512_update(&state, in, inlen); - crypto_auth_hmacsha512_final(&state, out); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/verify_hmacsha512.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/verify_hmacsha512.c deleted file mode 100644 index 342cd91..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512/cp/verify_hmacsha512.c +++ /dev/null @@ -1,12 +0,0 @@ -#include "api.h" -#include "crypto_verify_64.h" -#include "utils.h" - -int crypto_auth_verify(const unsigned char *h, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - unsigned char correct[64]; - crypto_auth(correct,in,inlen,k); - return crypto_verify_64(h,correct) | (-(h == correct)) | - sodium_memcmp(correct,h,64); -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/auth_hmacsha512256_api.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/auth_hmacsha512256_api.c deleted file mode 100644 index 9405bbb..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/auth_hmacsha512256_api.c +++ /dev/null @@ -1,16 +0,0 @@ -#include "crypto_auth_hmacsha512256.h" - -size_t -crypto_auth_hmacsha512256_bytes(void) { - return crypto_auth_hmacsha512256_BYTES; -} - -size_t -crypto_auth_hmacsha512256_keybytes(void) { - return crypto_auth_hmacsha512256_KEYBYTES; -} - -size_t -crypto_auth_hmacsha512256_statebytes(void) { - return sizeof(crypto_auth_hmacsha512256_state); -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/api.h b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/api.h deleted file mode 100644 index 645b278..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/api.h +++ /dev/null @@ -1,9 +0,0 @@ - -#include "crypto_auth_hmacsha512256.h" - -#define crypto_auth crypto_auth_hmacsha512256 -#define crypto_auth_verify crypto_auth_hmacsha512256_verify -#define crypto_auth_BYTES crypto_auth_hmacsha512256_BYTES -#define crypto_auth_KEYBYTES crypto_auth_hmacsha512256_KEYBYTES -#define crypto_auth_IMPLEMENTATION crypto_auth_hmacsha512256_IMPLEMENTATION -#define crypto_auth_VERSION crypto_auth_hmacsha512256_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/hmac_hmacsha512256.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/hmac_hmacsha512256.c deleted file mode 100644 index 4b476c3..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/hmac_hmacsha512256.c +++ /dev/null @@ -1,54 +0,0 @@ - -#include "api.h" -#include "crypto_auth_hmacsha512256.h" -#include "crypto_auth_hmacsha512.h" -#include "crypto_hash_sha512.h" -#include "utils.h" - -#include - -#include -#include - -int -crypto_auth_hmacsha512256_init(crypto_auth_hmacsha512256_state *state, - const unsigned char *key, - size_t keylen) -{ - return crypto_auth_hmacsha512_init((crypto_auth_hmacsha512_state *) state, - key, keylen); -} - -int -crypto_auth_hmacsha512256_update(crypto_auth_hmacsha512256_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - return crypto_auth_hmacsha512_update((crypto_auth_hmacsha512_state *) state, - in, inlen); -} - -int -crypto_auth_hmacsha512256_final(crypto_auth_hmacsha512256_state *state, - unsigned char *out) -{ - unsigned char out0[64]; - - crypto_auth_hmacsha512_final((crypto_auth_hmacsha512_state *) state, out0); - memcpy(out, out0, 32); - - return 0; -} - -int -crypto_auth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - crypto_auth_hmacsha512256_state state; - - crypto_auth_hmacsha512256_init(&state, k, crypto_auth_KEYBYTES); - crypto_auth_hmacsha512256_update(&state, in, inlen); - crypto_auth_hmacsha512256_final(&state, out); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/verify_hmacsha512256.c b/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/verify_hmacsha512256.c deleted file mode 100644 index e707591..0000000 --- a/Pods/libsodium/src/libsodium/crypto_auth/hmacsha512256/cp/verify_hmacsha512256.c +++ /dev/null @@ -1,12 +0,0 @@ -#include "api.h" -#include "crypto_verify_32.h" -#include "utils.h" - -int crypto_auth_verify(const unsigned char *h, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - unsigned char correct[32]; - crypto_auth(correct,in,inlen,k); - return crypto_verify_32(h,correct) | (-(h == correct)) | - sodium_memcmp(correct,h,32); -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/crypto_box.c b/Pods/libsodium/src/libsodium/crypto_box/crypto_box.c deleted file mode 100644 index 7ae4297..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/crypto_box.c +++ /dev/null @@ -1,108 +0,0 @@ - -#include "crypto_box.h" - -size_t -crypto_box_seedbytes(void) -{ - return crypto_box_SEEDBYTES; -} - -size_t -crypto_box_publickeybytes(void) -{ - return crypto_box_PUBLICKEYBYTES; -} - -size_t -crypto_box_secretkeybytes(void) -{ - return crypto_box_SECRETKEYBYTES; -} - -size_t -crypto_box_beforenmbytes(void) -{ - return crypto_box_BEFORENMBYTES; -} - -size_t -crypto_box_noncebytes(void) -{ - return crypto_box_NONCEBYTES; -} - -size_t -crypto_box_zerobytes(void) -{ - return crypto_box_ZEROBYTES; -} - -size_t -crypto_box_boxzerobytes(void) -{ - return crypto_box_BOXZEROBYTES; -} - -size_t -crypto_box_macbytes(void) -{ - return crypto_box_MACBYTES; -} - -const char * -crypto_box_primitive(void) -{ - return crypto_box_PRIMITIVE; -} - -int -crypto_box_seed_keypair(unsigned char *pk, unsigned char *sk, - const unsigned char *seed) -{ - return crypto_box_curve25519xsalsa20poly1305_seed_keypair(pk, sk, seed); -} - -int -crypto_box_keypair(unsigned char *pk, unsigned char *sk) -{ - return crypto_box_curve25519xsalsa20poly1305_keypair(pk, sk); -} - -int -crypto_box_beforenm(unsigned char *k, const unsigned char *pk, - const unsigned char *sk) -{ - return crypto_box_curve25519xsalsa20poly1305_beforenm(k, pk, sk); -} - -int -crypto_box_afternm(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_box_curve25519xsalsa20poly1305_afternm(c, m, mlen, n, k); -} - -int -crypto_box_open_afternm(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_box_curve25519xsalsa20poly1305_open_afternm(m, c, clen, n, k); -} - -int -crypto_box(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk) -{ - return crypto_box_curve25519xsalsa20poly1305(c, m, mlen, n, pk, sk); -} - -int -crypto_box_open(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk) -{ - return crypto_box_curve25519xsalsa20poly1305_open(m, c, clen, n, pk, sk); -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/crypto_box_easy.c b/Pods/libsodium/src/libsodium/crypto_box/crypto_box_easy.c deleted file mode 100644 index a4066c5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/crypto_box_easy.c +++ /dev/null @@ -1,109 +0,0 @@ - -#include -#include -#include - -#include "crypto_box.h" -#include "crypto_secretbox.h" -#include "utils.h" - -int -crypto_box_detached_afternm(unsigned char *c, unsigned char *mac, - const unsigned char *m, unsigned long long mlen, - const unsigned char *n, const unsigned char *k) -{ - return crypto_secretbox_detached(c, mac, m, mlen, n, k); -} - -int -crypto_box_detached(unsigned char *c, unsigned char *mac, - const unsigned char *m, unsigned long long mlen, - const unsigned char *n, const unsigned char *pk, - const unsigned char *sk) -{ - unsigned char k[crypto_box_BEFORENMBYTES]; - int ret; - - (void) sizeof(int[crypto_box_BEFORENMBYTES >= - crypto_secretbox_KEYBYTES ? 1 : -1]); - crypto_box_beforenm(k, pk, sk); - ret = crypto_box_detached_afternm(c, mac, m, mlen, n, k); - sodium_memzero(k, sizeof k); - - return ret; -} - -int -crypto_box_easy_afternm(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - if (mlen > SIZE_MAX - crypto_box_MACBYTES) { - return -1; - } - return crypto_box_detached_afternm(c + crypto_box_MACBYTES, c, m, mlen, n, - k); -} - -int -crypto_box_easy(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk) -{ - if (mlen > SIZE_MAX - crypto_box_MACBYTES) { - return -1; - } - return crypto_box_detached(c + crypto_box_MACBYTES, c, m, mlen, n, - pk, sk); -} - -int -crypto_box_open_detached_afternm(unsigned char *m, const unsigned char *c, - const unsigned char *mac, - unsigned long long clen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_secretbox_open_detached(m, c, mac, clen, n, k); -} - -int -crypto_box_open_detached(unsigned char *m, const unsigned char *c, - const unsigned char *mac, - unsigned long long clen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk) -{ - unsigned char k[crypto_box_BEFORENMBYTES]; - int ret; - - crypto_box_beforenm(k, pk, sk); - ret = crypto_box_open_detached_afternm(m, c, mac, clen, n, k); - sodium_memzero(k, sizeof k); - - return ret; -} - -int -crypto_box_open_easy_afternm(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k) -{ - if (clen < crypto_box_MACBYTES) { - return -1; - } - return crypto_box_open_detached_afternm(m, c + crypto_box_MACBYTES, c, - clen - crypto_box_MACBYTES, - n, k); -} - -int -crypto_box_open_easy(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk) -{ - if (clen < crypto_box_MACBYTES) { - return -1; - } - return crypto_box_open_detached(m, c + crypto_box_MACBYTES, c, - clen - crypto_box_MACBYTES, - n, pk, sk); -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/crypto_box_seal.c b/Pods/libsodium/src/libsodium/crypto_box/crypto_box_seal.c deleted file mode 100644 index e494b07..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/crypto_box_seal.c +++ /dev/null @@ -1,67 +0,0 @@ - -#include - -#include "crypto_box.h" -#include "crypto_generichash.h" -#include "utils.h" - -static int -_crypto_box_seal_nonce(unsigned char *nonce, - const unsigned char *pk1, const unsigned char *pk2) -{ - crypto_generichash_state st; - - crypto_generichash_init(&st, NULL, 0U, crypto_box_NONCEBYTES); - crypto_generichash_update(&st, pk1, crypto_box_PUBLICKEYBYTES); - crypto_generichash_update(&st, pk2, crypto_box_PUBLICKEYBYTES); - crypto_generichash_final(&st, nonce, crypto_box_NONCEBYTES); - - return 0; -} - -int -crypto_box_seal(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *pk) -{ - unsigned char nonce[crypto_box_NONCEBYTES]; - unsigned char epk[crypto_box_PUBLICKEYBYTES]; - unsigned char esk[crypto_box_SECRETKEYBYTES]; - int ret; - - if (crypto_box_keypair(epk, esk) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - memcpy(c, epk, crypto_box_PUBLICKEYBYTES); - _crypto_box_seal_nonce(nonce, epk, pk); - ret = crypto_box_easy(c + crypto_box_PUBLICKEYBYTES, m, mlen, - nonce, pk, esk); - sodium_memzero(nonce, sizeof nonce); - sodium_memzero(epk, sizeof epk); - sodium_memzero(esk, sizeof esk); - - return ret; -} - -int -crypto_box_seal_open(unsigned char *m, const unsigned char *c, - unsigned long long clen, - const unsigned char *pk, const unsigned char *sk) -{ - unsigned char nonce[crypto_box_NONCEBYTES]; - - if (clen < crypto_box_SEALBYTES) { - return -1; - } - _crypto_box_seal_nonce(nonce, c, pk); - - (void) sizeof(int[crypto_box_PUBLICKEYBYTES < crypto_box_SEALBYTES ? 1 : -1]); - return crypto_box_open_easy(m, c + crypto_box_PUBLICKEYBYTES, - clen - crypto_box_PUBLICKEYBYTES, - nonce, c, sk); -} - -size_t -crypto_box_sealbytes(void) -{ - return crypto_box_SEALBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/box_curve25519xsalsa20poly1305_api.c b/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/box_curve25519xsalsa20poly1305_api.c deleted file mode 100644 index 1c002d2..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/box_curve25519xsalsa20poly1305_api.c +++ /dev/null @@ -1,41 +0,0 @@ -#include "crypto_box_curve25519xsalsa20poly1305.h" - -size_t -crypto_box_curve25519xsalsa20poly1305_seedbytes(void) { - return crypto_box_curve25519xsalsa20poly1305_SEEDBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_publickeybytes(void) { - return crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_secretkeybytes(void) { - return crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_beforenmbytes(void) { - return crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_noncebytes(void) { - return crypto_box_curve25519xsalsa20poly1305_NONCEBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_zerobytes(void) { - return crypto_box_curve25519xsalsa20poly1305_ZEROBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_boxzerobytes(void) { - return crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES; -} - -size_t -crypto_box_curve25519xsalsa20poly1305_macbytes(void) { - return crypto_box_curve25519xsalsa20poly1305_MACBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/after_curve25519xsalsa20poly1305.c b/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/after_curve25519xsalsa20poly1305.c deleted file mode 100644 index a830936..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/after_curve25519xsalsa20poly1305.c +++ /dev/null @@ -1,22 +0,0 @@ -#include "api.h" -#include "crypto_secretbox_xsalsa20poly1305.h" - -int crypto_box_afternm( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -) -{ - return crypto_secretbox_xsalsa20poly1305(c,m,mlen,n,k); -} - -int crypto_box_open_afternm( - unsigned char *m, - const unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - return crypto_secretbox_xsalsa20poly1305_open(m,c,clen,n,k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/api.h b/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/api.h deleted file mode 100644 index 7f320c6..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/api.h +++ /dev/null @@ -1,20 +0,0 @@ - -#include "crypto_box_curve25519xsalsa20poly1305.h" - -#define crypto_box crypto_box_curve25519xsalsa20poly1305 -#define crypto_box_open crypto_box_curve25519xsalsa20poly1305_open -#define crypto_box_seed_keypair crypto_box_curve25519xsalsa20poly1305_seed_keypair -#define crypto_box_keypair crypto_box_curve25519xsalsa20poly1305_keypair -#define crypto_box_beforenm crypto_box_curve25519xsalsa20poly1305_beforenm -#define crypto_box_afternm crypto_box_curve25519xsalsa20poly1305_afternm -#define crypto_box_open_afternm crypto_box_curve25519xsalsa20poly1305_open_afternm -#define crypto_box_SEEDBYTES crypto_box_curve25519xsalsa20poly1305_SEEDBYTES -#define crypto_box_PUBLICKEYBYTES crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES -#define crypto_box_SECRETKEYBYTES crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES -#define crypto_box_BEFORENMBYTES crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES -#define crypto_box_NONCEBYTES crypto_box_curve25519xsalsa20poly1305_NONCEBYTES -#define crypto_box_ZEROBYTES crypto_box_curve25519xsalsa20poly1305_ZEROBYTES -#define crypto_box_BOXZEROBYTES crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES -#define crypto_box_MACBYTES (crypto_box_ZEROBYTES - crypto_box_BOXZEROBYTES) -#define crypto_box_IMPLEMENTATION crypto_box_curve25519xsalsa20poly1305_IMPLEMENTATION -#define crypto_box_VERSION crypto_box_curve25519xsalsa20poly1305_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/before_curve25519xsalsa20poly1305.c b/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/before_curve25519xsalsa20poly1305.c deleted file mode 100644 index 40d4300..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/before_curve25519xsalsa20poly1305.c +++ /dev/null @@ -1,19 +0,0 @@ -#include "api.h" -#include "crypto_core_hsalsa20.h" -#include "crypto_scalarmult_curve25519.h" - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; -static const unsigned char n[16] = {0}; - -int crypto_box_beforenm( - unsigned char *k, - const unsigned char *pk, - const unsigned char *sk -) -{ - unsigned char s[32]; - crypto_scalarmult_curve25519(s,sk,pk); - return crypto_core_hsalsa20(k,n,s,sigma); -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/box_curve25519xsalsa20poly1305.c b/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/box_curve25519xsalsa20poly1305.c deleted file mode 100644 index ebc208a..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/box_curve25519xsalsa20poly1305.c +++ /dev/null @@ -1,38 +0,0 @@ -#include "api.h" -#include "utils.h" - -int crypto_box( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *pk, - const unsigned char *sk -) -{ - unsigned char k[crypto_box_BEFORENMBYTES]; - int ret; - - crypto_box_beforenm(k,pk,sk); - ret = crypto_box_afternm(c,m,mlen,n,k); - sodium_memzero(k, sizeof k); - - return ret; -} - -int crypto_box_open( - unsigned char *m, - const unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *pk, - const unsigned char *sk -) -{ - unsigned char k[crypto_box_BEFORENMBYTES]; - int ret; - - crypto_box_beforenm(k,pk,sk); - ret = crypto_box_open_afternm(m,c,clen,n,k); - sodium_memzero(k, sizeof k); - - return ret; -} diff --git a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/keypair_curve25519xsalsa20poly1305.c b/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/keypair_curve25519xsalsa20poly1305.c deleted file mode 100644 index e2a03fa..0000000 --- a/Pods/libsodium/src/libsodium/crypto_box/curve25519xsalsa20poly1305/ref/keypair_curve25519xsalsa20poly1305.c +++ /dev/null @@ -1,27 +0,0 @@ -#include - -#include "crypto_hash_sha512.h" -#include "crypto_scalarmult_curve25519.h" -#include "api.h" -#include "randombytes.h" - -int crypto_box_seed_keypair( - unsigned char *pk, - unsigned char *sk, - const unsigned char *seed -) -{ - unsigned char hash[64]; - crypto_hash_sha512(hash,seed,32); - memmove(sk,hash,32); - return crypto_scalarmult_curve25519_base(pk,sk); -} - -int crypto_box_keypair( - unsigned char *pk, - unsigned char *sk -) -{ - randombytes_buf(sk,32); - return crypto_scalarmult_curve25519_base(pk,sk); -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/core_hsalsa20_api.c b/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/core_hsalsa20_api.c deleted file mode 100644 index 37c4923..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/core_hsalsa20_api.c +++ /dev/null @@ -1,21 +0,0 @@ -#include "crypto_core_hsalsa20.h" - -size_t -crypto_core_hsalsa20_outputbytes(void) { - return crypto_core_hsalsa20_OUTPUTBYTES; -} - -size_t -crypto_core_hsalsa20_inputbytes(void) { - return crypto_core_hsalsa20_INPUTBYTES; -} - -size_t -crypto_core_hsalsa20_keybytes(void) { - return crypto_core_hsalsa20_KEYBYTES; -} - -size_t -crypto_core_hsalsa20_constbytes(void) { - return crypto_core_hsalsa20_CONSTBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/ref2/api.h b/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/ref2/api.h deleted file mode 100644 index 582cba6..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/ref2/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_core_hsalsa20.h" - -#define crypto_core crypto_core_hsalsa20 -#define crypto_core_OUTPUTBYTES crypto_core_hsalsa20_OUTPUTBYTES -#define crypto_core_INPUTBYTES crypto_core_hsalsa20_INPUTBYTES -#define crypto_core_KEYBYTES crypto_core_hsalsa20_KEYBYTES -#define crypto_core_CONSTBYTES crypto_core_hsalsa20_CONSTBYTES -#define crypto_core_IMPLEMENTATION crypto_core_hsalsa20_IMPLEMENTATION -#define crypto_core_VERSION crypto_core_hsalsa20_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/ref2/core_hsalsa20.c b/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/ref2/core_hsalsa20.c deleted file mode 100644 index c9bd359..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/hsalsa20/ref2/core_hsalsa20.c +++ /dev/null @@ -1,108 +0,0 @@ -/* -version 20080912 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" - -#define ROUNDS 20 - -typedef unsigned int uint32; - -static uint32 rotate(uint32 u,int c) -{ - return (u << c) | (u >> (32 - c)); -} - -static uint32 load_littleendian(const unsigned char *x) -{ - return - (uint32) (x[0]) \ - | (((uint32) (x[1])) << 8) \ - | (((uint32) (x[2])) << 16) \ - | (((uint32) (x[3])) << 24) - ; -} - -static void store_littleendian(unsigned char *x,uint32 u) -{ - x[0] = u; u >>= 8; - x[1] = u; u >>= 8; - x[2] = u; u >>= 8; - x[3] = u; -} - -int crypto_core( - unsigned char *out, - const unsigned char *in, - const unsigned char *k, - const unsigned char *c -) -{ - uint32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15; - int i; - - x0 = load_littleendian(c + 0); - x1 = load_littleendian(k + 0); - x2 = load_littleendian(k + 4); - x3 = load_littleendian(k + 8); - x4 = load_littleendian(k + 12); - x5 = load_littleendian(c + 4); - x6 = load_littleendian(in + 0); - x7 = load_littleendian(in + 4); - x8 = load_littleendian(in + 8); - x9 = load_littleendian(in + 12); - x10 = load_littleendian(c + 8); - x11 = load_littleendian(k + 16); - x12 = load_littleendian(k + 20); - x13 = load_littleendian(k + 24); - x14 = load_littleendian(k + 28); - x15 = load_littleendian(c + 12); - - for (i = ROUNDS;i > 0;i -= 2) { - x4 ^= rotate( x0+x12, 7); - x8 ^= rotate( x4+ x0, 9); - x12 ^= rotate( x8+ x4,13); - x0 ^= rotate(x12+ x8,18); - x9 ^= rotate( x5+ x1, 7); - x13 ^= rotate( x9+ x5, 9); - x1 ^= rotate(x13+ x9,13); - x5 ^= rotate( x1+x13,18); - x14 ^= rotate(x10+ x6, 7); - x2 ^= rotate(x14+x10, 9); - x6 ^= rotate( x2+x14,13); - x10 ^= rotate( x6+ x2,18); - x3 ^= rotate(x15+x11, 7); - x7 ^= rotate( x3+x15, 9); - x11 ^= rotate( x7+ x3,13); - x15 ^= rotate(x11+ x7,18); - x1 ^= rotate( x0+ x3, 7); - x2 ^= rotate( x1+ x0, 9); - x3 ^= rotate( x2+ x1,13); - x0 ^= rotate( x3+ x2,18); - x6 ^= rotate( x5+ x4, 7); - x7 ^= rotate( x6+ x5, 9); - x4 ^= rotate( x7+ x6,13); - x5 ^= rotate( x4+ x7,18); - x11 ^= rotate(x10+ x9, 7); - x8 ^= rotate(x11+x10, 9); - x9 ^= rotate( x8+x11,13); - x10 ^= rotate( x9+ x8,18); - x12 ^= rotate(x15+x14, 7); - x13 ^= rotate(x12+x15, 9); - x14 ^= rotate(x13+x12,13); - x15 ^= rotate(x14+x13,18); - } - - store_littleendian(out + 0,x0); - store_littleendian(out + 4,x5); - store_littleendian(out + 8,x10); - store_littleendian(out + 12,x15); - store_littleendian(out + 16,x6); - store_littleendian(out + 20,x7); - store_littleendian(out + 24,x8); - store_littleendian(out + 28,x9); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa20/core_salsa20_api.c b/Pods/libsodium/src/libsodium/crypto_core/salsa20/core_salsa20_api.c deleted file mode 100644 index 910b461..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa20/core_salsa20_api.c +++ /dev/null @@ -1,21 +0,0 @@ -#include "crypto_core_salsa20.h" - -size_t -crypto_core_salsa20_outputbytes(void) { - return crypto_core_salsa20_OUTPUTBYTES; -} - -size_t -crypto_core_salsa20_inputbytes(void) { - return crypto_core_salsa20_INPUTBYTES; -} - -size_t -crypto_core_salsa20_keybytes(void) { - return crypto_core_salsa20_KEYBYTES; -} - -size_t -crypto_core_salsa20_constbytes(void) { - return crypto_core_salsa20_CONSTBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa20/ref/api.h b/Pods/libsodium/src/libsodium/crypto_core/salsa20/ref/api.h deleted file mode 100644 index d34ddeb..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa20/ref/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_core_salsa20.h" - -#define crypto_core crypto_core_salsa20 -#define crypto_core_OUTPUTBYTES crypto_core_salsa20_OUTPUTBYTES -#define crypto_core_INPUTBYTES crypto_core_salsa20_INPUTBYTES -#define crypto_core_KEYBYTES crypto_core_salsa20_KEYBYTES -#define crypto_core_CONSTBYTES crypto_core_salsa20_CONSTBYTES -#define crypto_core_IMPLEMENTATION crypto_core_salsa20_IMPLEMENTATION -#define crypto_core_VERSION crypto_core_salsa20_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa20/ref/core_salsa20.c b/Pods/libsodium/src/libsodium/crypto_core/salsa20/ref/core_salsa20.c deleted file mode 100644 index b2f6f5c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa20/ref/core_salsa20.c +++ /dev/null @@ -1,134 +0,0 @@ -/* -version 20080912 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" - -#define ROUNDS 20 - -typedef unsigned int uint32; - -static uint32 rotate(uint32 u,int c) -{ - return (u << c) | (u >> (32 - c)); -} - -static uint32 load_littleendian(const unsigned char *x) -{ - return - (uint32) (x[0]) \ - | (((uint32) (x[1])) << 8) \ - | (((uint32) (x[2])) << 16) \ - | (((uint32) (x[3])) << 24) - ; -} - -static void store_littleendian(unsigned char *x,uint32 u) -{ - x[0] = u; u >>= 8; - x[1] = u; u >>= 8; - x[2] = u; u >>= 8; - x[3] = u; -} - -int crypto_core( - unsigned char *out, - const unsigned char *in, - const unsigned char *k, - const unsigned char *c -) -{ - uint32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15; - uint32 j0, j1, j2, j3, j4, j5, j6, j7, j8, j9, j10, j11, j12, j13, j14, j15; - int i; - - j0 = x0 = load_littleendian(c + 0); - j1 = x1 = load_littleendian(k + 0); - j2 = x2 = load_littleendian(k + 4); - j3 = x3 = load_littleendian(k + 8); - j4 = x4 = load_littleendian(k + 12); - j5 = x5 = load_littleendian(c + 4); - j6 = x6 = load_littleendian(in + 0); - j7 = x7 = load_littleendian(in + 4); - j8 = x8 = load_littleendian(in + 8); - j9 = x9 = load_littleendian(in + 12); - j10 = x10 = load_littleendian(c + 8); - j11 = x11 = load_littleendian(k + 16); - j12 = x12 = load_littleendian(k + 20); - j13 = x13 = load_littleendian(k + 24); - j14 = x14 = load_littleendian(k + 28); - j15 = x15 = load_littleendian(c + 12); - - for (i = ROUNDS;i > 0;i -= 2) { - x4 ^= rotate( x0+x12, 7); - x8 ^= rotate( x4+ x0, 9); - x12 ^= rotate( x8+ x4,13); - x0 ^= rotate(x12+ x8,18); - x9 ^= rotate( x5+ x1, 7); - x13 ^= rotate( x9+ x5, 9); - x1 ^= rotate(x13+ x9,13); - x5 ^= rotate( x1+x13,18); - x14 ^= rotate(x10+ x6, 7); - x2 ^= rotate(x14+x10, 9); - x6 ^= rotate( x2+x14,13); - x10 ^= rotate( x6+ x2,18); - x3 ^= rotate(x15+x11, 7); - x7 ^= rotate( x3+x15, 9); - x11 ^= rotate( x7+ x3,13); - x15 ^= rotate(x11+ x7,18); - x1 ^= rotate( x0+ x3, 7); - x2 ^= rotate( x1+ x0, 9); - x3 ^= rotate( x2+ x1,13); - x0 ^= rotate( x3+ x2,18); - x6 ^= rotate( x5+ x4, 7); - x7 ^= rotate( x6+ x5, 9); - x4 ^= rotate( x7+ x6,13); - x5 ^= rotate( x4+ x7,18); - x11 ^= rotate(x10+ x9, 7); - x8 ^= rotate(x11+x10, 9); - x9 ^= rotate( x8+x11,13); - x10 ^= rotate( x9+ x8,18); - x12 ^= rotate(x15+x14, 7); - x13 ^= rotate(x12+x15, 9); - x14 ^= rotate(x13+x12,13); - x15 ^= rotate(x14+x13,18); - } - - x0 += j0; - x1 += j1; - x2 += j2; - x3 += j3; - x4 += j4; - x5 += j5; - x6 += j6; - x7 += j7; - x8 += j8; - x9 += j9; - x10 += j10; - x11 += j11; - x12 += j12; - x13 += j13; - x14 += j14; - x15 += j15; - - store_littleendian(out + 0,x0); - store_littleendian(out + 4,x1); - store_littleendian(out + 8,x2); - store_littleendian(out + 12,x3); - store_littleendian(out + 16,x4); - store_littleendian(out + 20,x5); - store_littleendian(out + 24,x6); - store_littleendian(out + 28,x7); - store_littleendian(out + 32,x8); - store_littleendian(out + 36,x9); - store_littleendian(out + 40,x10); - store_littleendian(out + 44,x11); - store_littleendian(out + 48,x12); - store_littleendian(out + 52,x13); - store_littleendian(out + 56,x14); - store_littleendian(out + 60,x15); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa2012/core_salsa2012_api.c b/Pods/libsodium/src/libsodium/crypto_core/salsa2012/core_salsa2012_api.c deleted file mode 100644 index e49a81e..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa2012/core_salsa2012_api.c +++ /dev/null @@ -1,21 +0,0 @@ -#include "crypto_core_salsa2012.h" - -size_t -crypto_core_salsa2012_outputbytes(void) { - return crypto_core_salsa2012_OUTPUTBYTES; -} - -size_t -crypto_core_salsa2012_inputbytes(void) { - return crypto_core_salsa2012_INPUTBYTES; -} - -size_t -crypto_core_salsa2012_keybytes(void) { - return crypto_core_salsa2012_KEYBYTES; -} - -size_t -crypto_core_salsa2012_constbytes(void) { - return crypto_core_salsa2012_CONSTBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa2012/ref/api.h b/Pods/libsodium/src/libsodium/crypto_core/salsa2012/ref/api.h deleted file mode 100644 index 76919a0..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa2012/ref/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_core_salsa2012.h" - -#define crypto_core crypto_core_salsa2012 -#define crypto_core_OUTPUTBYTES crypto_core_salsa2012_OUTPUTBYTES -#define crypto_core_INPUTBYTES crypto_core_salsa2012_INPUTBYTES -#define crypto_core_KEYBYTES crypto_core_salsa2012_KEYBYTES -#define crypto_core_CONSTBYTES crypto_core_salsa2012_CONSTBYTES -#define crypto_core_IMPLEMENTATION crypto_core_salsa2012_IMPLEMENTATION -#define crypto_core_VERSION crypto_core_salsa2012_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa2012/ref/core_salsa2012.c b/Pods/libsodium/src/libsodium/crypto_core/salsa2012/ref/core_salsa2012.c deleted file mode 100644 index 07a72e7..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa2012/ref/core_salsa2012.c +++ /dev/null @@ -1,134 +0,0 @@ -/* -version 20080913 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" - -#define ROUNDS 12 - -typedef unsigned int uint32; - -static uint32 rotate(uint32 u,int c) -{ - return (u << c) | (u >> (32 - c)); -} - -static uint32 load_littleendian(const unsigned char *x) -{ - return - (uint32) (x[0]) \ - | (((uint32) (x[1])) << 8) \ - | (((uint32) (x[2])) << 16) \ - | (((uint32) (x[3])) << 24) - ; -} - -static void store_littleendian(unsigned char *x,uint32 u) -{ - x[0] = u; u >>= 8; - x[1] = u; u >>= 8; - x[2] = u; u >>= 8; - x[3] = u; -} - -int crypto_core( - unsigned char *out, - const unsigned char *in, - const unsigned char *k, - const unsigned char *c -) -{ - uint32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15; - uint32 j0, j1, j2, j3, j4, j5, j6, j7, j8, j9, j10, j11, j12, j13, j14, j15; - int i; - - j0 = x0 = load_littleendian(c + 0); - j1 = x1 = load_littleendian(k + 0); - j2 = x2 = load_littleendian(k + 4); - j3 = x3 = load_littleendian(k + 8); - j4 = x4 = load_littleendian(k + 12); - j5 = x5 = load_littleendian(c + 4); - j6 = x6 = load_littleendian(in + 0); - j7 = x7 = load_littleendian(in + 4); - j8 = x8 = load_littleendian(in + 8); - j9 = x9 = load_littleendian(in + 12); - j10 = x10 = load_littleendian(c + 8); - j11 = x11 = load_littleendian(k + 16); - j12 = x12 = load_littleendian(k + 20); - j13 = x13 = load_littleendian(k + 24); - j14 = x14 = load_littleendian(k + 28); - j15 = x15 = load_littleendian(c + 12); - - for (i = ROUNDS;i > 0;i -= 2) { - x4 ^= rotate( x0+x12, 7); - x8 ^= rotate( x4+ x0, 9); - x12 ^= rotate( x8+ x4,13); - x0 ^= rotate(x12+ x8,18); - x9 ^= rotate( x5+ x1, 7); - x13 ^= rotate( x9+ x5, 9); - x1 ^= rotate(x13+ x9,13); - x5 ^= rotate( x1+x13,18); - x14 ^= rotate(x10+ x6, 7); - x2 ^= rotate(x14+x10, 9); - x6 ^= rotate( x2+x14,13); - x10 ^= rotate( x6+ x2,18); - x3 ^= rotate(x15+x11, 7); - x7 ^= rotate( x3+x15, 9); - x11 ^= rotate( x7+ x3,13); - x15 ^= rotate(x11+ x7,18); - x1 ^= rotate( x0+ x3, 7); - x2 ^= rotate( x1+ x0, 9); - x3 ^= rotate( x2+ x1,13); - x0 ^= rotate( x3+ x2,18); - x6 ^= rotate( x5+ x4, 7); - x7 ^= rotate( x6+ x5, 9); - x4 ^= rotate( x7+ x6,13); - x5 ^= rotate( x4+ x7,18); - x11 ^= rotate(x10+ x9, 7); - x8 ^= rotate(x11+x10, 9); - x9 ^= rotate( x8+x11,13); - x10 ^= rotate( x9+ x8,18); - x12 ^= rotate(x15+x14, 7); - x13 ^= rotate(x12+x15, 9); - x14 ^= rotate(x13+x12,13); - x15 ^= rotate(x14+x13,18); - } - - x0 += j0; - x1 += j1; - x2 += j2; - x3 += j3; - x4 += j4; - x5 += j5; - x6 += j6; - x7 += j7; - x8 += j8; - x9 += j9; - x10 += j10; - x11 += j11; - x12 += j12; - x13 += j13; - x14 += j14; - x15 += j15; - - store_littleendian(out + 0,x0); - store_littleendian(out + 4,x1); - store_littleendian(out + 8,x2); - store_littleendian(out + 12,x3); - store_littleendian(out + 16,x4); - store_littleendian(out + 20,x5); - store_littleendian(out + 24,x6); - store_littleendian(out + 28,x7); - store_littleendian(out + 32,x8); - store_littleendian(out + 36,x9); - store_littleendian(out + 40,x10); - store_littleendian(out + 44,x11); - store_littleendian(out + 48,x12); - store_littleendian(out + 52,x13); - store_littleendian(out + 56,x14); - store_littleendian(out + 60,x15); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa208/core_salsa208_api.c b/Pods/libsodium/src/libsodium/crypto_core/salsa208/core_salsa208_api.c deleted file mode 100644 index 72c336c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa208/core_salsa208_api.c +++ /dev/null @@ -1,21 +0,0 @@ -#include "crypto_core_salsa208.h" - -size_t -crypto_core_salsa208_outputbytes(void) { - return crypto_core_salsa208_OUTPUTBYTES; -} - -size_t -crypto_core_salsa208_inputbytes(void) { - return crypto_core_salsa208_INPUTBYTES; -} - -size_t -crypto_core_salsa208_keybytes(void) { - return crypto_core_salsa208_KEYBYTES; -} - -size_t -crypto_core_salsa208_constbytes(void) { - return crypto_core_salsa208_CONSTBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa208/ref/api.h b/Pods/libsodium/src/libsodium/crypto_core/salsa208/ref/api.h deleted file mode 100644 index 07d090b..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa208/ref/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_core_salsa208.h" - -#define crypto_core crypto_core_salsa208 -#define crypto_core_OUTPUTBYTES crypto_core_salsa208_OUTPUTBYTES -#define crypto_core_INPUTBYTES crypto_core_salsa208_INPUTBYTES -#define crypto_core_KEYBYTES crypto_core_salsa208_KEYBYTES -#define crypto_core_CONSTBYTES crypto_core_salsa208_CONSTBYTES -#define crypto_core_IMPLEMENTATION crypto_core_salsa208_IMPLEMENTATION -#define crypto_core_VERSION crypto_core_salsa208_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_core/salsa208/ref/core_salsa208.c b/Pods/libsodium/src/libsodium/crypto_core/salsa208/ref/core_salsa208.c deleted file mode 100644 index be26f82..0000000 --- a/Pods/libsodium/src/libsodium/crypto_core/salsa208/ref/core_salsa208.c +++ /dev/null @@ -1,134 +0,0 @@ -/* -version 20080913 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" - -#define ROUNDS 8 - -typedef unsigned int uint32; - -static uint32 rotate(uint32 u,int c) -{ - return (u << c) | (u >> (32 - c)); -} - -static uint32 load_littleendian(const unsigned char *x) -{ - return - (uint32) (x[0]) \ - | (((uint32) (x[1])) << 8) \ - | (((uint32) (x[2])) << 16) \ - | (((uint32) (x[3])) << 24) - ; -} - -static void store_littleendian(unsigned char *x,uint32 u) -{ - x[0] = u; u >>= 8; - x[1] = u; u >>= 8; - x[2] = u; u >>= 8; - x[3] = u; -} - -int crypto_core( - unsigned char *out, - const unsigned char *in, - const unsigned char *k, - const unsigned char *c -) -{ - uint32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15; - uint32 j0, j1, j2, j3, j4, j5, j6, j7, j8, j9, j10, j11, j12, j13, j14, j15; - int i; - - j0 = x0 = load_littleendian(c + 0); - j1 = x1 = load_littleendian(k + 0); - j2 = x2 = load_littleendian(k + 4); - j3 = x3 = load_littleendian(k + 8); - j4 = x4 = load_littleendian(k + 12); - j5 = x5 = load_littleendian(c + 4); - j6 = x6 = load_littleendian(in + 0); - j7 = x7 = load_littleendian(in + 4); - j8 = x8 = load_littleendian(in + 8); - j9 = x9 = load_littleendian(in + 12); - j10 = x10 = load_littleendian(c + 8); - j11 = x11 = load_littleendian(k + 16); - j12 = x12 = load_littleendian(k + 20); - j13 = x13 = load_littleendian(k + 24); - j14 = x14 = load_littleendian(k + 28); - j15 = x15 = load_littleendian(c + 12); - - for (i = ROUNDS;i > 0;i -= 2) { - x4 ^= rotate( x0+x12, 7); - x8 ^= rotate( x4+ x0, 9); - x12 ^= rotate( x8+ x4,13); - x0 ^= rotate(x12+ x8,18); - x9 ^= rotate( x5+ x1, 7); - x13 ^= rotate( x9+ x5, 9); - x1 ^= rotate(x13+ x9,13); - x5 ^= rotate( x1+x13,18); - x14 ^= rotate(x10+ x6, 7); - x2 ^= rotate(x14+x10, 9); - x6 ^= rotate( x2+x14,13); - x10 ^= rotate( x6+ x2,18); - x3 ^= rotate(x15+x11, 7); - x7 ^= rotate( x3+x15, 9); - x11 ^= rotate( x7+ x3,13); - x15 ^= rotate(x11+ x7,18); - x1 ^= rotate( x0+ x3, 7); - x2 ^= rotate( x1+ x0, 9); - x3 ^= rotate( x2+ x1,13); - x0 ^= rotate( x3+ x2,18); - x6 ^= rotate( x5+ x4, 7); - x7 ^= rotate( x6+ x5, 9); - x4 ^= rotate( x7+ x6,13); - x5 ^= rotate( x4+ x7,18); - x11 ^= rotate(x10+ x9, 7); - x8 ^= rotate(x11+x10, 9); - x9 ^= rotate( x8+x11,13); - x10 ^= rotate( x9+ x8,18); - x12 ^= rotate(x15+x14, 7); - x13 ^= rotate(x12+x15, 9); - x14 ^= rotate(x13+x12,13); - x15 ^= rotate(x14+x13,18); - } - - x0 += j0; - x1 += j1; - x2 += j2; - x3 += j3; - x4 += j4; - x5 += j5; - x6 += j6; - x7 += j7; - x8 += j8; - x9 += j9; - x10 += j10; - x11 += j11; - x12 += j12; - x13 += j13; - x14 += j14; - x15 += j15; - - store_littleendian(out + 0,x0); - store_littleendian(out + 4,x1); - store_littleendian(out + 8,x2); - store_littleendian(out + 12,x3); - store_littleendian(out + 16,x4); - store_littleendian(out + 20,x5); - store_littleendian(out + 24,x6); - store_littleendian(out + 28,x7); - store_littleendian(out + 32,x8); - store_littleendian(out + 36,x9); - store_littleendian(out + 40,x10); - store_littleendian(out + 44,x11); - store_littleendian(out + 48,x12); - store_littleendian(out + 52,x13); - store_littleendian(out + 56,x14); - store_littleendian(out + 60,x15); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/generichash_blake2_api.c b/Pods/libsodium/src/libsodium/crypto_generichash/blake2/generichash_blake2_api.c deleted file mode 100644 index b775921..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/generichash_blake2_api.c +++ /dev/null @@ -1,41 +0,0 @@ -#include "crypto_generichash_blake2b.h" - -size_t -crypto_generichash_blake2b_bytes_min(void) { - return crypto_generichash_blake2b_BYTES_MIN; -} - -size_t -crypto_generichash_blake2b_bytes_max(void) { - return crypto_generichash_blake2b_BYTES_MAX; -} - -size_t -crypto_generichash_blake2b_bytes(void) { - return crypto_generichash_blake2b_BYTES; -} - -size_t -crypto_generichash_blake2b_keybytes_min(void) { - return crypto_generichash_blake2b_KEYBYTES_MIN; -} - -size_t -crypto_generichash_blake2b_keybytes_max(void) { - return crypto_generichash_blake2b_KEYBYTES_MAX; -} - -size_t -crypto_generichash_blake2b_keybytes(void) { - return crypto_generichash_blake2b_KEYBYTES; -} - -size_t -crypto_generichash_blake2b_saltbytes(void) { - return crypto_generichash_blake2b_SALTBYTES; -} - -size_t -crypto_generichash_blake2b_personalbytes(void) { - return crypto_generichash_blake2b_PERSONALBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/api.h b/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/api.h deleted file mode 100644 index 130d246..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/api.h +++ /dev/null @@ -1,2 +0,0 @@ - -#include "crypto_generichash_blake2b.h" diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2-impl.h b/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2-impl.h deleted file mode 100644 index b4b0229..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2-impl.h +++ /dev/null @@ -1,137 +0,0 @@ -/* - BLAKE2 reference source code package - reference C implementations - - Written in 2012 by Samuel Neves - - To the extent possible under law, the author(s) have dedicated all copyright - and related and neighboring rights to this software to the public domain - worldwide. This software is distributed without any warranty. - - You should have received a copy of the CC0 Public Domain Dedication along with - this software. If not, see . -*/ - -#ifndef blake2_impl_H -#define blake2_impl_H - -#include -#include - -#include "utils.h" - -static inline uint32_t load32( const void *src ) -{ -#if defined(NATIVE_LITTLE_ENDIAN) - uint32_t w; - memcpy(&w, src, sizeof w); - return w; -#else - const uint8_t *p = ( const uint8_t * )src; - uint32_t w = *p++; - w |= ( uint32_t )( *p++ ) << 8; - w |= ( uint32_t )( *p++ ) << 16; - w |= ( uint32_t )( *p++ ) << 24; - return w; -#endif -} - -static inline uint64_t load64( const void *src ) -{ -#if defined(NATIVE_LITTLE_ENDIAN) - uint64_t w; - memcpy(&w, src, sizeof w); - return w; -#else - const uint8_t *p = ( const uint8_t * )src; - uint64_t w = *p++; - w |= ( uint64_t )( *p++ ) << 8; - w |= ( uint64_t )( *p++ ) << 16; - w |= ( uint64_t )( *p++ ) << 24; - w |= ( uint64_t )( *p++ ) << 32; - w |= ( uint64_t )( *p++ ) << 40; - w |= ( uint64_t )( *p++ ) << 48; - w |= ( uint64_t )( *p++ ) << 56; - return w; -#endif -} - -static inline void store32( void *dst, uint32_t w ) -{ -#if defined(NATIVE_LITTLE_ENDIAN) - memcpy(dst, &w, sizeof w); -#else - uint8_t *p = ( uint8_t * )dst; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; -#endif -} - -static inline void store64( void *dst, uint64_t w ) -{ -#if defined(NATIVE_LITTLE_ENDIAN) - memcpy(dst, &w, sizeof w); -#else - uint8_t *p = ( uint8_t * )dst; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; -#endif -} - -static inline uint64_t load48( const void *src ) -{ - const uint8_t *p = ( const uint8_t * )src; - uint64_t w = *p++; - w |= ( uint64_t )( *p++ ) << 8; - w |= ( uint64_t )( *p++ ) << 16; - w |= ( uint64_t )( *p++ ) << 24; - w |= ( uint64_t )( *p++ ) << 32; - w |= ( uint64_t )( *p++ ) << 40; - return w; -} - -static inline void store48( void *dst, uint64_t w ) -{ - uint8_t *p = ( uint8_t * )dst; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; w >>= 8; - *p++ = ( uint8_t )w; -} - -static inline uint32_t rotl32( const uint32_t w, const unsigned c ) -{ - return ( w << c ) | ( w >> ( 32 - c ) ); -} - -static inline uint64_t rotl64( const uint64_t w, const unsigned c ) -{ - return ( w << c ) | ( w >> ( 64 - c ) ); -} - -static inline uint32_t rotr32( const uint32_t w, const unsigned c ) -{ - return ( w >> c ) | ( w << ( 32 - c ) ); -} - -static inline uint64_t rotr64( const uint64_t w, const unsigned c ) -{ - return ( w >> c ) | ( w << ( 64 - c ) ); -} - -/* prevents compiler optimizing out memset() */ -static inline void secure_zero_memory( void *v, size_t n ) -{ - sodium_memzero(v, n); -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2.h b/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2.h deleted file mode 100644 index e44aac6..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2.h +++ /dev/null @@ -1,177 +0,0 @@ -/* - BLAKE2 reference source code package - reference C implementations - - Written in 2012 by Samuel Neves - - To the extent possible under law, the author(s) have dedicated all copyright - and related and neighboring rights to this software to the public domain - worldwide. This software is distributed without any warranty. - - You should have received a copy of the CC0 Public Domain Dedication along with - this software. If not, see . -*/ - -#ifndef blake2_H -#define blake2_H - -#include -#include - -#include "crypto_generichash_blake2b.h" - -#define blake2b_init_param crypto_generichash_blake2b__init_param -#define blake2b_init crypto_generichash_blake2b__init -#define blake2b_init_salt_personal crypto_generichash_blake2b__init_salt_personal -#define blake2b_init_key crypto_generichash_blake2b__init_key -#define blake2b_init_key_salt_personal crypto_generichash_blake2b__init_key_salt_personal -#define blake2b_update crypto_generichash_blake2b__update -#define blake2b_final crypto_generichash_blake2b__final -#define blake2b crypto_generichash_blake2b__blake2b -#define blake2b_salt_personal crypto_generichash_blake2b__blake2b_salt_personal - -#if defined(_MSC_VER) -#define ALIGN(x) __declspec(align(x)) -#else -#define ALIGN(x) __attribute__((aligned(x))) -#endif - -#if defined(__cplusplus) -extern "C" { -#endif - - enum blake2s_constant - { - BLAKE2S_BLOCKBYTES = 64, - BLAKE2S_OUTBYTES = 32, - BLAKE2S_KEYBYTES = 32, - BLAKE2S_SALTBYTES = 8, - BLAKE2S_PERSONALBYTES = 8 - }; - - enum blake2b_constant - { - BLAKE2B_BLOCKBYTES = 128, - BLAKE2B_OUTBYTES = 64, - BLAKE2B_KEYBYTES = 64, - BLAKE2B_SALTBYTES = 16, - BLAKE2B_PERSONALBYTES = 16 - }; - -#pragma pack(push, 1) - typedef struct blake2s_param_ - { - uint8_t digest_length; // 1 - uint8_t key_length; // 2 - uint8_t fanout; // 3 - uint8_t depth; // 4 - uint32_t leaf_length; // 8 - uint8_t node_offset[6];// 14 - uint8_t node_depth; // 15 - uint8_t inner_length; // 16 - // uint8_t reserved[0]; - uint8_t salt[BLAKE2S_SALTBYTES]; // 24 - uint8_t personal[BLAKE2S_PERSONALBYTES]; // 32 - } blake2s_param; - - ALIGN( 64 ) typedef struct blake2s_state_ - { - uint32_t h[8]; - uint32_t t[2]; - uint32_t f[2]; - uint8_t buf[2 * BLAKE2S_BLOCKBYTES]; - size_t buflen; - uint8_t last_node; - } blake2s_state ; - - typedef struct blake2b_param_ - { - uint8_t digest_length; // 1 - uint8_t key_length; // 2 - uint8_t fanout; // 3 - uint8_t depth; // 4 - uint32_t leaf_length; // 8 - uint64_t node_offset; // 16 - uint8_t node_depth; // 17 - uint8_t inner_length; // 18 - uint8_t reserved[14]; // 32 - uint8_t salt[BLAKE2B_SALTBYTES]; // 48 - uint8_t personal[BLAKE2B_PERSONALBYTES]; // 64 - } blake2b_param; - -#ifndef DEFINE_BLAKE2B_STATE -typedef crypto_generichash_blake2b_state blake2b_state; -#else - ALIGN( 64 ) typedef struct blake2b_state_ - { - uint64_t h[8]; - uint64_t t[2]; - uint64_t f[2]; - uint8_t buf[2 * BLAKE2B_BLOCKBYTES]; - size_t buflen; - uint8_t last_node; - } blake2b_state; -#endif - - typedef struct blake2sp_state_ - { - blake2s_state S[8][1]; - blake2s_state R[1]; - uint8_t buf[8 * BLAKE2S_BLOCKBYTES]; - size_t buflen; - } blake2sp_state; - - typedef struct blake2bp_state_ - { - blake2b_state S[4][1]; - blake2b_state R[1]; - uint8_t buf[4 * BLAKE2B_BLOCKBYTES]; - size_t buflen; - } blake2bp_state; -#pragma pack(pop) - - // Streaming API - int blake2s_init( blake2s_state *S, const uint8_t outlen ); - int blake2s_init_key( blake2s_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); - int blake2s_init_param( blake2s_state *S, const blake2s_param *P ); - int blake2s_update( blake2s_state *S, const uint8_t *in, uint64_t inlen ); - int blake2s_final( blake2s_state *S, uint8_t *out, uint8_t outlen ); - - int blake2b_init( blake2b_state *S, const uint8_t outlen ); - int blake2b_init_salt_personal( blake2b_state *S, const uint8_t outlen, - const void *personal, const void *salt ); - int blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); - int blake2b_init_key_salt_personal( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen, - const void *salt, const void *personal ); - int blake2b_init_param( blake2b_state *S, const blake2b_param *P ); - int blake2b_update( blake2b_state *S, const uint8_t *in, uint64_t inlen ); - int blake2b_final( blake2b_state *S, uint8_t *out, uint8_t outlen ); - - int blake2sp_init( blake2sp_state *S, const uint8_t outlen ); - int blake2sp_init_key( blake2sp_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); - int blake2sp_update( blake2sp_state *S, const uint8_t *in, uint64_t inlen ); - int blake2sp_final( blake2sp_state *S, uint8_t *out, uint8_t outlen ); - - int blake2bp_init( blake2bp_state *S, const uint8_t outlen ); - int blake2bp_init_key( blake2bp_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ); - int blake2bp_update( blake2bp_state *S, const uint8_t *in, uint64_t inlen ); - int blake2bp_final( blake2bp_state *S, uint8_t *out, uint8_t outlen ); - - // Simple API - int blake2s( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); - int blake2b( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); - int blake2b_salt_personal( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen, const void *salt, const void *personal ); - - int blake2sp( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); - int blake2bp( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ); - - static inline int blake2( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) - { - return blake2b( out, in, key, outlen, inlen, keylen ); - } - -#if defined(__cplusplus) -} -#endif - -#endif - diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2b-ref.c b/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2b-ref.c deleted file mode 100644 index 2610477..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/blake2b-ref.c +++ /dev/null @@ -1,465 +0,0 @@ -/* - BLAKE2 reference source code package - reference C implementations - - Written in 2012 by Samuel Neves - - To the extent possible under law, the author(s) have dedicated all copyright - and related and neighboring rights to this software to the public domain - worldwide. This software is distributed without any warranty. - - You should have received a copy of the CC0 Public Domain Dedication along with - this software. If not, see . -*/ - -#include -#include -#include - -#include "blake2.h" -#include "blake2-impl.h" - -static const uint64_t blake2b_IV[8] = -{ - 0x6a09e667f3bcc908ULL, 0xbb67ae8584caa73bULL, - 0x3c6ef372fe94f82bULL, 0xa54ff53a5f1d36f1ULL, - 0x510e527fade682d1ULL, 0x9b05688c2b3e6c1fULL, - 0x1f83d9abfb41bd6bULL, 0x5be0cd19137e2179ULL -}; - -static const uint8_t blake2b_sigma[12][16] = -{ - { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } , - { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } , - { 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 } , - { 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 } , - { 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 } , - { 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 } , - { 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 } , - { 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 } , - { 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 } , - { 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13 , 0 } , - { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } , - { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } -}; - - -/* LCOV_EXCL_START */ -static inline int blake2b_set_lastnode( blake2b_state *S ) -{ - S->f[1] = ~0ULL; - return 0; -} -/* LCOV_EXCL_STOP */ -#if 0 -static inline int blake2b_clear_lastnode( blake2b_state *S ) -{ - S->f[1] = 0ULL; - return 0; -} -#endif -/* Some helper functions, not necessarily useful */ -static inline int blake2b_set_lastblock( blake2b_state *S ) -{ - if( S->last_node ) blake2b_set_lastnode( S ); - - S->f[0] = ~0ULL; - return 0; -} -#if 0 -static inline int blake2b_clear_lastblock( blake2b_state *S ) -{ - if( S->last_node ) blake2b_clear_lastnode( S ); - - S->f[0] = 0ULL; - return 0; -} -#endif -static inline int blake2b_increment_counter( blake2b_state *S, const uint64_t inc ) -{ - S->t[0] += inc; - S->t[1] += ( S->t[0] < inc ); - return 0; -} - - - -// Parameter-related functions -#if 0 -static inline int blake2b_param_set_digest_length( blake2b_param *P, const uint8_t digest_length ) -{ - P->digest_length = digest_length; - return 0; -} - -static inline int blake2b_param_set_fanout( blake2b_param *P, const uint8_t fanout ) -{ - P->fanout = fanout; - return 0; -} - -static inline int blake2b_param_set_max_depth( blake2b_param *P, const uint8_t depth ) -{ - P->depth = depth; - return 0; -} - -static inline int blake2b_param_set_leaf_length( blake2b_param *P, const uint32_t leaf_length ) -{ - store32( &P->leaf_length, leaf_length ); - return 0; -} - -static inline int blake2b_param_set_node_offset( blake2b_param *P, const uint64_t node_offset ) -{ - store64( &P->node_offset, node_offset ); - return 0; -} - -static inline int blake2b_param_set_node_depth( blake2b_param *P, const uint8_t node_depth ) -{ - P->node_depth = node_depth; - return 0; -} - -static inline int blake2b_param_set_inner_length( blake2b_param *P, const uint8_t inner_length ) -{ - P->inner_length = inner_length; - return 0; -} -#endif -static inline int blake2b_param_set_salt( blake2b_param *P, const uint8_t salt[BLAKE2B_SALTBYTES] ) -{ - memcpy( P->salt, salt, BLAKE2B_SALTBYTES ); - return 0; -} - -static inline int blake2b_param_set_personal( blake2b_param *P, const uint8_t personal[BLAKE2B_PERSONALBYTES] ) -{ - memcpy( P->personal, personal, BLAKE2B_PERSONALBYTES ); - return 0; -} - -static inline int blake2b_init0( blake2b_state *S ) -{ - int i; - memset( S, 0, sizeof( blake2b_state ) ); - - for( i = 0; i < 8; ++i ) S->h[i] = blake2b_IV[i]; - - return 0; -} - -/* init xors IV with input parameter block */ -int blake2b_init_param( blake2b_state *S, const blake2b_param *P ) -{ - size_t i; - const uint8_t *p; - - blake2b_init0( S ); - p = ( const uint8_t * )( P ); - - /* IV XOR ParamBlock */ - for( i = 0; i < 8; ++i ) - S->h[i] ^= load64( p + sizeof( S->h[i] ) * i ); - - return 0; -} - - - -int blake2b_init( blake2b_state *S, const uint8_t outlen ) -{ - blake2b_param P[1]; - - if ( ( !outlen ) || ( outlen > BLAKE2B_OUTBYTES ) ) return -1; - - P->digest_length = outlen; - P->key_length = 0; - P->fanout = 1; - P->depth = 1; - store32( &P->leaf_length, 0 ); - store64( &P->node_offset, 0 ); - P->node_depth = 0; - P->inner_length = 0; - memset( P->reserved, 0, sizeof( P->reserved ) ); - memset( P->salt, 0, sizeof( P->salt ) ); - memset( P->personal, 0, sizeof( P->personal ) ); - return blake2b_init_param( S, P ); -} - -int blake2b_init_salt_personal( blake2b_state *S, const uint8_t outlen, - const void *salt, const void *personal ) -{ - blake2b_param P[1]; - - if ( ( !outlen ) || ( outlen > BLAKE2B_OUTBYTES ) ) return -1; - - P->digest_length = outlen; - P->key_length = 0; - P->fanout = 1; - P->depth = 1; - store32( &P->leaf_length, 0 ); - store64( &P->node_offset, 0 ); - P->node_depth = 0; - P->inner_length = 0; - memset( P->reserved, 0, sizeof( P->reserved ) ); - if (salt != NULL) { - blake2b_param_set_salt( P, (const uint8_t *) salt ); - } else { - memset( P->salt, 0, sizeof( P->salt ) ); - } - if (personal != NULL) { - blake2b_param_set_personal( P, (const uint8_t *) personal ); - } else { - memset( P->personal, 0, sizeof( P->personal ) ); - } - return blake2b_init_param( S, P ); -} - -int blake2b_init_key( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen ) -{ - blake2b_param P[1]; - - if ( ( !outlen ) || ( outlen > BLAKE2B_OUTBYTES ) ) return -1; - - if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; - - P->digest_length = outlen; - P->key_length = keylen; - P->fanout = 1; - P->depth = 1; - store32( &P->leaf_length, 0 ); - store64( &P->node_offset, 0 ); - P->node_depth = 0; - P->inner_length = 0; - memset( P->reserved, 0, sizeof( P->reserved ) ); - memset( P->salt, 0, sizeof( P->salt ) ); - memset( P->personal, 0, sizeof( P->personal ) ); - - if( blake2b_init_param( S, P ) < 0 ) return -1; - - { - uint8_t block[BLAKE2B_BLOCKBYTES]; - memset( block, 0, BLAKE2B_BLOCKBYTES ); - memcpy( block, key, keylen ); - blake2b_update( S, block, BLAKE2B_BLOCKBYTES ); - secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */ - } - return 0; -} - -int blake2b_init_key_salt_personal( blake2b_state *S, const uint8_t outlen, const void *key, const uint8_t keylen, - const void *salt, const void *personal ) -{ - blake2b_param P[1]; - - if ( ( !outlen ) || ( outlen > BLAKE2B_OUTBYTES ) ) return -1; - - if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1; - - P->digest_length = outlen; - P->key_length = keylen; - P->fanout = 1; - P->depth = 1; - store32( &P->leaf_length, 0 ); - store64( &P->node_offset, 0 ); - P->node_depth = 0; - P->inner_length = 0; - memset( P->reserved, 0, sizeof( P->reserved ) ); - if (salt != NULL) { - blake2b_param_set_salt( P, (const uint8_t *) salt ); - } else { - memset( P->salt, 0, sizeof( P->salt ) ); - } - if (personal != NULL) { - blake2b_param_set_personal( P, (const uint8_t *) personal ); - } else { - memset( P->personal, 0, sizeof( P->personal ) ); - } - - if( blake2b_init_param( S, P ) < 0 ) return -1; - - { - uint8_t block[BLAKE2B_BLOCKBYTES]; - memset( block, 0, BLAKE2B_BLOCKBYTES ); - memcpy( block, key, keylen ); - blake2b_update( S, block, BLAKE2B_BLOCKBYTES ); - secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */ - } - return 0; -} - -static int blake2b_compress( blake2b_state *S, const uint8_t block[BLAKE2B_BLOCKBYTES] ) -{ - uint64_t m[16]; - uint64_t v[16]; - int i; - - for( i = 0; i < 16; ++i ) - m[i] = load64( block + i * sizeof( m[i] ) ); - - for( i = 0; i < 8; ++i ) - v[i] = S->h[i]; - - v[ 8] = blake2b_IV[0]; - v[ 9] = blake2b_IV[1]; - v[10] = blake2b_IV[2]; - v[11] = blake2b_IV[3]; - v[12] = S->t[0] ^ blake2b_IV[4]; - v[13] = S->t[1] ^ blake2b_IV[5]; - v[14] = S->f[0] ^ blake2b_IV[6]; - v[15] = S->f[1] ^ blake2b_IV[7]; -#define G(r,i,a,b,c,d) \ - do { \ - a = a + b + m[blake2b_sigma[r][2*i+0]]; \ - d = rotr64(d ^ a, 32); \ - c = c + d; \ - b = rotr64(b ^ c, 24); \ - a = a + b + m[blake2b_sigma[r][2*i+1]]; \ - d = rotr64(d ^ a, 16); \ - c = c + d; \ - b = rotr64(b ^ c, 63); \ - } while(0) -#define ROUND(r) \ - do { \ - G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \ - G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \ - G(r,2,v[ 2],v[ 6],v[10],v[14]); \ - G(r,3,v[ 3],v[ 7],v[11],v[15]); \ - G(r,4,v[ 0],v[ 5],v[10],v[15]); \ - G(r,5,v[ 1],v[ 6],v[11],v[12]); \ - G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \ - G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \ - } while(0) - ROUND( 0 ); - ROUND( 1 ); - ROUND( 2 ); - ROUND( 3 ); - ROUND( 4 ); - ROUND( 5 ); - ROUND( 6 ); - ROUND( 7 ); - ROUND( 8 ); - ROUND( 9 ); - ROUND( 10 ); - ROUND( 11 ); - - for( i = 0; i < 8; ++i ) - S->h[i] = S->h[i] ^ v[i] ^ v[i + 8]; - -#undef G -#undef ROUND - return 0; -} - -/* inlen now in bytes */ -int blake2b_update( blake2b_state *S, const uint8_t *in, uint64_t inlen ) -{ - while( inlen > 0 ) - { - size_t left = S->buflen; - size_t fill = 2 * BLAKE2B_BLOCKBYTES - left; - - if( inlen > fill ) - { - memcpy( S->buf + left, in, fill ); // Fill buffer - S->buflen += fill; - blake2b_increment_counter( S, BLAKE2B_BLOCKBYTES ); - blake2b_compress( S, S->buf ); // Compress - memcpy( S->buf, S->buf + BLAKE2B_BLOCKBYTES, BLAKE2B_BLOCKBYTES ); // Shift buffer left - S->buflen -= BLAKE2B_BLOCKBYTES; - in += fill; - inlen -= fill; - } - else // inlen <= fill - { - memcpy( S->buf + left, in, inlen ); - S->buflen += inlen; // Be lazy, do not compress - in += inlen; - inlen -= inlen; - } - } - - return 0; -} - -/* Is this correct? */ -int blake2b_final( blake2b_state *S, uint8_t *out, uint8_t outlen ) -{ - uint8_t buffer[BLAKE2B_OUTBYTES]; - int i; - - if( outlen > BLAKE2B_OUTBYTES ) { - return -1; - } - if( S->buflen > BLAKE2B_BLOCKBYTES ) - { - blake2b_increment_counter( S, BLAKE2B_BLOCKBYTES ); - blake2b_compress( S, S->buf ); - S->buflen -= BLAKE2B_BLOCKBYTES; - memmove( S->buf, S->buf + BLAKE2B_BLOCKBYTES, S->buflen ); - } - - blake2b_increment_counter( S, S->buflen ); - blake2b_set_lastblock( S ); - memset( S->buf + S->buflen, 0, 2 * BLAKE2B_BLOCKBYTES - S->buflen ); /* Padding */ - blake2b_compress( S, S->buf ); - - for( i = 0; i < 8; ++i ) /* Output full hash to temp buffer */ - store64( buffer + sizeof( S->h[i] ) * i, S->h[i] ); - - memcpy( out, buffer, outlen ); - return 0; -} - -/* inlen, at least, should be uint64_t. Others can be size_t. */ -int blake2b( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen ) -{ - blake2b_state S[1]; - - /* Verify parameters */ - if ( NULL == in ) return -1; - - if ( NULL == out ) return -1; - - if( NULL == key ) keylen = 0; - - if( keylen > 0 ) - { - if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1; - } - else - { - if( blake2b_init( S, outlen ) < 0 ) return -1; - } - - blake2b_update( S, ( const uint8_t * )in, inlen ); - blake2b_final( S, out, outlen ); - return 0; -} - -int blake2b_salt_personal( uint8_t *out, const void *in, const void *key, const uint8_t outlen, const uint64_t inlen, uint8_t keylen, - const void *salt, const void *personal ) -{ - blake2b_state S[1]; - - /* Verify parameters */ - if ( NULL == in ) return -1; - - if ( NULL == out ) return -1; - - if( NULL == key ) keylen = 0; - - if( keylen > 0 ) - { - if( blake2b_init_key_salt_personal( S, outlen, key, keylen, salt, personal ) < 0 ) return -1; - } - else - { - if( blake2b_init_salt_personal( S, outlen, salt, personal ) < 0 ) return -1; - } - - blake2b_update( S, ( const uint8_t * )in, inlen ); - blake2b_final( S, out, outlen ); - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/generichash_blake2b.c b/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/generichash_blake2b.c deleted file mode 100644 index 7253cbf..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/blake2/ref/generichash_blake2b.c +++ /dev/null @@ -1,108 +0,0 @@ - -#include -#include -#include - -#include "api.h" -#include "blake2.h" - -int -crypto_generichash_blake2b(unsigned char *out, size_t outlen, - const unsigned char *in, unsigned long long inlen, - const unsigned char *key, size_t keylen) -{ - if (outlen <= 0U || outlen > BLAKE2B_OUTBYTES || - keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { - return -1; - } - assert(outlen <= UINT8_MAX); - assert(keylen <= UINT8_MAX); - - return blake2b((uint8_t *) out, in, key, - (uint8_t) outlen, (uint64_t) inlen, (uint8_t) keylen); -} - -int -crypto_generichash_blake2b_salt_personal(unsigned char *out, size_t outlen, - const unsigned char *in, unsigned long long inlen, - const unsigned char *key, size_t keylen, - const unsigned char *salt, - const unsigned char *personal) -{ - if (outlen <= 0U || outlen > BLAKE2B_OUTBYTES || - keylen > BLAKE2B_KEYBYTES || inlen > UINT64_MAX) { - return -1; - } - assert(outlen <= UINT8_MAX); - assert(keylen <= UINT8_MAX); - - return blake2b_salt_personal((uint8_t *) out, in, key, - (uint8_t) outlen, (uint64_t) inlen, (uint8_t) keylen, - salt, personal); -} - -int -crypto_generichash_blake2b_init(crypto_generichash_blake2b_state *state, - const unsigned char *key, - const size_t keylen, const size_t outlen) -{ - if (outlen <= 0U || outlen > BLAKE2B_OUTBYTES || - keylen > BLAKE2B_KEYBYTES) { - return -1; - } - assert(outlen <= UINT8_MAX); - assert(keylen <= UINT8_MAX); - if (key == NULL || keylen <= 0U) { - if (blake2b_init(state, (uint8_t) outlen) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - } else if (blake2b_init_key(state, (uint8_t) outlen, key, - (uint8_t) keylen) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - return 0; -} - -int -crypto_generichash_blake2b_init_salt_personal(crypto_generichash_blake2b_state *state, - const unsigned char *key, - const size_t keylen, const size_t outlen, - const unsigned char *salt, - const unsigned char *personal) -{ - if (outlen <= 0U || outlen > BLAKE2B_OUTBYTES || - keylen > BLAKE2B_KEYBYTES) { - return -1; - } - assert(outlen <= UINT8_MAX); - assert(keylen <= UINT8_MAX); - if (key == NULL || keylen <= 0U) { - if (blake2b_init_salt_personal(state, (uint8_t) outlen, - salt, personal) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - } else if (blake2b_init_key_salt_personal(state, - (uint8_t) outlen, key, - (uint8_t) keylen, - salt, personal) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - return 0; -} - -int -crypto_generichash_blake2b_update(crypto_generichash_blake2b_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - return blake2b_update(state, (const uint8_t *) in, (uint64_t) inlen); -} - -int -crypto_generichash_blake2b_final(crypto_generichash_blake2b_state *state, - unsigned char *out, - const size_t outlen) -{ - assert(outlen <= UINT8_MAX); - return blake2b_final(state, (uint8_t *) out, (uint8_t) outlen); -} diff --git a/Pods/libsodium/src/libsodium/crypto_generichash/crypto_generichash.c b/Pods/libsodium/src/libsodium/crypto_generichash/crypto_generichash.c deleted file mode 100644 index e454708..0000000 --- a/Pods/libsodium/src/libsodium/crypto_generichash/crypto_generichash.c +++ /dev/null @@ -1,85 +0,0 @@ - -#include "crypto_generichash.h" - -size_t -crypto_generichash_bytes_min(void) -{ - return crypto_generichash_BYTES_MIN; -} - -size_t -crypto_generichash_bytes_max(void) -{ - return crypto_generichash_BYTES_MAX; -} - -size_t -crypto_generichash_bytes(void) -{ - return crypto_generichash_BYTES; -} - -size_t -crypto_generichash_keybytes_min(void) -{ - return crypto_generichash_KEYBYTES_MIN; -} - -size_t -crypto_generichash_keybytes_max(void) -{ - return crypto_generichash_KEYBYTES_MAX; -} - -size_t -crypto_generichash_keybytes(void) -{ - return crypto_generichash_KEYBYTES; -} - -const char * -crypto_generichash_primitive(void) -{ - return crypto_generichash_PRIMITIVE; -} - -size_t -crypto_generichash_statebytes(void) -{ - return sizeof(crypto_generichash_state); -} - -int -crypto_generichash(unsigned char *out, size_t outlen, const unsigned char *in, - unsigned long long inlen, const unsigned char *key, - size_t keylen) -{ - return crypto_generichash_blake2b(out, outlen, in, inlen, key, keylen); -} - -int -crypto_generichash_init(crypto_generichash_state *state, - const unsigned char *key, - const size_t keylen, const size_t outlen) -{ - return crypto_generichash_blake2b_init - ((crypto_generichash_blake2b_state *) state, - key, keylen, outlen); -} - -int -crypto_generichash_update(crypto_generichash_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - return crypto_generichash_blake2b_update - ((crypto_generichash_blake2b_state *) state, in, inlen); -} - -int -crypto_generichash_final(crypto_generichash_state *state, - unsigned char *out, const size_t outlen) -{ - return crypto_generichash_blake2b_final - ((crypto_generichash_blake2b_state *) state, out, outlen); -} diff --git a/Pods/libsodium/src/libsodium/crypto_hash/crypto_hash.c b/Pods/libsodium/src/libsodium/crypto_hash/crypto_hash.c deleted file mode 100644 index 855c560..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/crypto_hash.c +++ /dev/null @@ -1,20 +0,0 @@ - -#include "crypto_hash.h" - -size_t -crypto_hash_bytes(void) -{ - return crypto_hash_BYTES; -} - -int -crypto_hash(unsigned char *out, const unsigned char *in, - unsigned long long inlen) -{ - return crypto_hash_sha512(out, in, inlen); -} - -const char * -crypto_hash_primitive(void) { - return crypto_hash_PRIMITIVE; -} diff --git a/Pods/libsodium/src/libsodium/crypto_hash/sha256/cp/api.h b/Pods/libsodium/src/libsodium/crypto_hash/sha256/cp/api.h deleted file mode 100644 index b38a563..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/sha256/cp/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_hash_sha256.h" - -#define crypto_hash crypto_hash_sha256 -#define crypto_hash_init crypto_hash_sha256_init -#define crypto_hash_update crypto_hash_sha256_update -#define crypto_hash_final crypto_hash_sha256_final -#define crypto_hash_BYTES crypto_hash_sha256_BYTES -#define crypto_hash_IMPLEMENTATION crypto_hash_sha256_IMPLEMENTATION -#define crypto_hash_VERSION crypto_hash_sha256_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_hash/sha256/cp/hash_sha256.c b/Pods/libsodium/src/libsodium/crypto_hash/sha256/cp/hash_sha256.c deleted file mode 100644 index 738794a..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/sha256/cp/hash_sha256.c +++ /dev/null @@ -1,296 +0,0 @@ - -/*- - * Copyright 2005,2007,2009 Colin Percival - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - */ - -#include "api.h" -#include "crypto_hash_sha256.h" -#include "utils.h" - -#include - -#include -#include -#include -#include - -/* Avoid namespace collisions with BSD . */ -#define be32dec _sha256_be32dec -#define be32enc _sha256_be32enc - -static inline uint32_t -be32dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint32_t)(p[3]) + ((uint32_t)(p[2]) << 8) + - ((uint32_t)(p[1]) << 16) + ((uint32_t)(p[0]) << 24)); -} - -static inline void -be32enc(void *pp, uint32_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[3] = x & 0xff; - p[2] = (x >> 8) & 0xff; - p[1] = (x >> 16) & 0xff; - p[0] = (x >> 24) & 0xff; -} - -static void -be32enc_vect(unsigned char *dst, const uint32_t *src, size_t len) -{ - size_t i; - - for (i = 0; i < len / 4; i++) { - be32enc(dst + i * 4, src[i]); - } -} - -static void -be32dec_vect(uint32_t *dst, const unsigned char *src, size_t len) -{ - size_t i; - - for (i = 0; i < len / 4; i++) { - dst[i] = be32dec(src + i * 4); - } -} - -#define Ch(x, y, z) ((x & (y ^ z)) ^ z) -#define Maj(x, y, z) ((x & (y | z)) | (y & z)) -#define SHR(x, n) (x >> n) -#define ROTR(x, n) ((x >> n) | (x << (32 - n))) -#define S0(x) (ROTR(x, 2) ^ ROTR(x, 13) ^ ROTR(x, 22)) -#define S1(x) (ROTR(x, 6) ^ ROTR(x, 11) ^ ROTR(x, 25)) -#define s0(x) (ROTR(x, 7) ^ ROTR(x, 18) ^ SHR(x, 3)) -#define s1(x) (ROTR(x, 17) ^ ROTR(x, 19) ^ SHR(x, 10)) - -#define RND(a, b, c, d, e, f, g, h, k) \ - t0 = h + S1(e) + Ch(e, f, g) + k; \ - t1 = S0(a) + Maj(a, b, c); \ - d += t0; \ - h = t0 + t1; - -#define RNDr(S, W, i, k) \ - RND(S[(64 - i) % 8], S[(65 - i) % 8], \ - S[(66 - i) % 8], S[(67 - i) % 8], \ - S[(68 - i) % 8], S[(69 - i) % 8], \ - S[(70 - i) % 8], S[(71 - i) % 8], \ - W[i] + k) - -static void -SHA256_Transform(uint32_t *state, const unsigned char block[64]) -{ - uint32_t W[64]; - uint32_t S[8]; - uint32_t t0, t1; - int i; - - be32dec_vect(W, block, 64); - for (i = 16; i < 64; i++) { - W[i] = s1(W[i - 2]) + W[i - 7] + s0(W[i - 15]) + W[i - 16]; - } - - memcpy(S, state, 32); - - RNDr(S, W, 0, 0x428a2f98); - RNDr(S, W, 1, 0x71374491); - RNDr(S, W, 2, 0xb5c0fbcf); - RNDr(S, W, 3, 0xe9b5dba5); - RNDr(S, W, 4, 0x3956c25b); - RNDr(S, W, 5, 0x59f111f1); - RNDr(S, W, 6, 0x923f82a4); - RNDr(S, W, 7, 0xab1c5ed5); - RNDr(S, W, 8, 0xd807aa98); - RNDr(S, W, 9, 0x12835b01); - RNDr(S, W, 10, 0x243185be); - RNDr(S, W, 11, 0x550c7dc3); - RNDr(S, W, 12, 0x72be5d74); - RNDr(S, W, 13, 0x80deb1fe); - RNDr(S, W, 14, 0x9bdc06a7); - RNDr(S, W, 15, 0xc19bf174); - RNDr(S, W, 16, 0xe49b69c1); - RNDr(S, W, 17, 0xefbe4786); - RNDr(S, W, 18, 0x0fc19dc6); - RNDr(S, W, 19, 0x240ca1cc); - RNDr(S, W, 20, 0x2de92c6f); - RNDr(S, W, 21, 0x4a7484aa); - RNDr(S, W, 22, 0x5cb0a9dc); - RNDr(S, W, 23, 0x76f988da); - RNDr(S, W, 24, 0x983e5152); - RNDr(S, W, 25, 0xa831c66d); - RNDr(S, W, 26, 0xb00327c8); - RNDr(S, W, 27, 0xbf597fc7); - RNDr(S, W, 28, 0xc6e00bf3); - RNDr(S, W, 29, 0xd5a79147); - RNDr(S, W, 30, 0x06ca6351); - RNDr(S, W, 31, 0x14292967); - RNDr(S, W, 32, 0x27b70a85); - RNDr(S, W, 33, 0x2e1b2138); - RNDr(S, W, 34, 0x4d2c6dfc); - RNDr(S, W, 35, 0x53380d13); - RNDr(S, W, 36, 0x650a7354); - RNDr(S, W, 37, 0x766a0abb); - RNDr(S, W, 38, 0x81c2c92e); - RNDr(S, W, 39, 0x92722c85); - RNDr(S, W, 40, 0xa2bfe8a1); - RNDr(S, W, 41, 0xa81a664b); - RNDr(S, W, 42, 0xc24b8b70); - RNDr(S, W, 43, 0xc76c51a3); - RNDr(S, W, 44, 0xd192e819); - RNDr(S, W, 45, 0xd6990624); - RNDr(S, W, 46, 0xf40e3585); - RNDr(S, W, 47, 0x106aa070); - RNDr(S, W, 48, 0x19a4c116); - RNDr(S, W, 49, 0x1e376c08); - RNDr(S, W, 50, 0x2748774c); - RNDr(S, W, 51, 0x34b0bcb5); - RNDr(S, W, 52, 0x391c0cb3); - RNDr(S, W, 53, 0x4ed8aa4a); - RNDr(S, W, 54, 0x5b9cca4f); - RNDr(S, W, 55, 0x682e6ff3); - RNDr(S, W, 56, 0x748f82ee); - RNDr(S, W, 57, 0x78a5636f); - RNDr(S, W, 58, 0x84c87814); - RNDr(S, W, 59, 0x8cc70208); - RNDr(S, W, 60, 0x90befffa); - RNDr(S, W, 61, 0xa4506ceb); - RNDr(S, W, 62, 0xbef9a3f7); - RNDr(S, W, 63, 0xc67178f2); - - for (i = 0; i < 8; i++) { - state[i] += S[i]; - } - - sodium_memzero((void *) W, sizeof W); - sodium_memzero((void *) S, sizeof S); - sodium_memzero((void *) &t0, sizeof t0); - sodium_memzero((void *) &t1, sizeof t1); -} - -static unsigned char PAD[64] = { - 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 -}; - -static void -SHA256_Pad(crypto_hash_sha256_state *state) -{ - unsigned char len[8]; - uint32_t r, plen; - - be32enc_vect(len, state->count, 8); - - r = (state->count[1] >> 3) & 0x3f; - plen = (r < 56) ? (56 - r) : (120 - r); - crypto_hash_sha256_update(state, PAD, (unsigned long long) plen); - - crypto_hash_sha256_update(state, len, 8); -} - -int -crypto_hash_sha256_init(crypto_hash_sha256_state *state) -{ - state->count[0] = state->count[1] = 0; - - state->state[0] = 0x6A09E667; - state->state[1] = 0xBB67AE85; - state->state[2] = 0x3C6EF372; - state->state[3] = 0xA54FF53A; - state->state[4] = 0x510E527F; - state->state[5] = 0x9B05688C; - state->state[6] = 0x1F83D9AB; - state->state[7] = 0x5BE0CD19; - - return 0; -} - -int -crypto_hash_sha256_update(crypto_hash_sha256_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - uint32_t bitlen[2]; - uint32_t r; - - r = (state->count[1] >> 3) & 0x3f; - - bitlen[1] = ((uint32_t)inlen) << 3; - bitlen[0] = (uint32_t)(inlen >> 29); - - /* LCOV_EXCL_START */ - if ((state->count[1] += bitlen[1]) < bitlen[1]) { - state->count[0]++; - } - /* LCOV_EXCL_STOP */ - state->count[0] += bitlen[0]; - - if (inlen < 64 - r) { - memcpy(&state->buf[r], in, inlen); - return 0; - } - memcpy(&state->buf[r], in, 64 - r); - SHA256_Transform(state->state, state->buf); - in += 64 - r; - inlen -= 64 - r; - - while (inlen >= 64) { - SHA256_Transform(state->state, in); - in += 64; - inlen -= 64; - } - memcpy(state->buf, in, inlen); - - return 0; -} - -int -crypto_hash_sha256_final(crypto_hash_sha256_state *state, - unsigned char *out) -{ - SHA256_Pad(state); - be32enc_vect(out, state->state, 32); - sodium_memzero((void *) state, sizeof *state); - - return 0; -} - -int -crypto_hash(unsigned char *out, const unsigned char *in, - unsigned long long inlen) -{ - crypto_hash_sha256_state state; - - crypto_hash_sha256_init(&state); - crypto_hash_sha256_update(&state, in, inlen); - crypto_hash_sha256_final(&state, out); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_hash/sha256/hash_sha256_api.c b/Pods/libsodium/src/libsodium/crypto_hash/sha256/hash_sha256_api.c deleted file mode 100644 index ca208ff..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/sha256/hash_sha256_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_hash_sha256.h" - -size_t -crypto_hash_sha256_bytes(void) { - return crypto_hash_sha256_BYTES; -} - -size_t -crypto_hash_sha256_statebytes(void) { - return sizeof(crypto_hash_sha256_state); -} diff --git a/Pods/libsodium/src/libsodium/crypto_hash/sha512/cp/api.h b/Pods/libsodium/src/libsodium/crypto_hash/sha512/cp/api.h deleted file mode 100644 index c3a3188..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/sha512/cp/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_hash_sha512.h" - -#define crypto_hash crypto_hash_sha512 -#define crypto_hash_init crypto_hash_sha512_init -#define crypto_hash_update crypto_hash_sha512_update -#define crypto_hash_final crypto_hash_sha512_final -#define crypto_hash_BYTES crypto_hash_sha512_BYTES -#define crypto_hash_IMPLEMENTATION crypto_hash_sha512_IMPLEMENTATION -#define crypto_hash_VERSION crypto_hash_sha512_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_hash/sha512/cp/hash_sha512.c b/Pods/libsodium/src/libsodium/crypto_hash/sha512/cp/hash_sha512.c deleted file mode 100644 index e85be74..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/sha512/cp/hash_sha512.c +++ /dev/null @@ -1,323 +0,0 @@ - -/*- - * Copyright 2005,2007,2009 Colin Percival - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - */ - -#include "api.h" -#include "crypto_hash_sha512.h" -#include "utils.h" - -#include - -#include -#include -#include -#include - -/* Avoid namespace collisions with BSD . */ -#define be64dec _sha512_be64dec -#define be64enc _sha512_be64enc - -static inline uint64_t -be64dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint64_t)(p[7]) + ((uint64_t)(p[6]) << 8) + - ((uint64_t)(p[5]) << 16) + ((uint64_t)(p[4]) << 24) + - ((uint64_t)(p[3]) << 32) + ((uint64_t)(p[2]) << 40) + - ((uint64_t)(p[1]) << 48) + ((uint64_t)(p[0]) << 56)); -} - -static inline void -be64enc(void *pp, uint64_t x) -{ - uint8_t *p = (uint8_t *)pp; - - p[7] = x & 0xff; - p[6] = (x >> 8) & 0xff; - p[5] = (x >> 16) & 0xff; - p[4] = (x >> 24) & 0xff; - p[3] = (x >> 32) & 0xff; - p[2] = (x >> 40) & 0xff; - p[1] = (x >> 48) & 0xff; - p[0] = (x >> 56) & 0xff; -} - -static void -be64enc_vect(unsigned char *dst, const uint64_t *src, size_t len) -{ - size_t i; - - for (i = 0; i < len / 8; i++) { - be64enc(dst + i * 8, src[i]); - } -} - -static void -be64dec_vect(uint64_t *dst, const unsigned char *src, size_t len) -{ - size_t i; - - for (i = 0; i < len / 8; i++) { - dst[i] = be64dec(src + i * 8); - } -} - -#define Ch(x, y, z) ((x & (y ^ z)) ^ z) -#define Maj(x, y, z) ((x & (y | z)) | (y & z)) -#define SHR(x, n) (x >> n) -#define ROTR(x, n) ((x >> n) | (x << (64 - n))) -#define S0(x) (ROTR(x, 28) ^ ROTR(x, 34) ^ ROTR(x, 39)) -#define S1(x) (ROTR(x, 14) ^ ROTR(x, 18) ^ ROTR(x, 41)) -#define s0(x) (ROTR(x, 1) ^ ROTR(x, 8) ^ SHR(x, 7)) -#define s1(x) (ROTR(x, 19) ^ ROTR(x, 61) ^ SHR(x, 6)) - -#define RND(a, b, c, d, e, f, g, h, k) \ - t0 = h + S1(e) + Ch(e, f, g) + k; \ - t1 = S0(a) + Maj(a, b, c); \ - d += t0; \ - h = t0 + t1; - -#define RNDr(S, W, i, k) \ - RND(S[(80 - i) % 8], S[(81 - i) % 8], \ - S[(82 - i) % 8], S[(83 - i) % 8], \ - S[(84 - i) % 8], S[(85 - i) % 8], \ - S[(86 - i) % 8], S[(87 - i) % 8], \ - W[i] + k) - -static void -SHA512_Transform(uint64_t *state, const unsigned char block[128]) -{ - uint64_t W[80]; - uint64_t S[8]; - uint64_t t0, t1; - int i; - - be64dec_vect(W, block, 128); - for (i = 16; i < 80; i++) { - W[i] = s1(W[i - 2]) + W[i - 7] + s0(W[i - 15]) + W[i - 16]; - } - - memcpy(S, state, 64); - - RNDr(S, W, 0, 0x428a2f98d728ae22ULL); - RNDr(S, W, 1, 0x7137449123ef65cdULL); - RNDr(S, W, 2, 0xb5c0fbcfec4d3b2fULL); - RNDr(S, W, 3, 0xe9b5dba58189dbbcULL); - RNDr(S, W, 4, 0x3956c25bf348b538ULL); - RNDr(S, W, 5, 0x59f111f1b605d019ULL); - RNDr(S, W, 6, 0x923f82a4af194f9bULL); - RNDr(S, W, 7, 0xab1c5ed5da6d8118ULL); - RNDr(S, W, 8, 0xd807aa98a3030242ULL); - RNDr(S, W, 9, 0x12835b0145706fbeULL); - RNDr(S, W, 10, 0x243185be4ee4b28cULL); - RNDr(S, W, 11, 0x550c7dc3d5ffb4e2ULL); - RNDr(S, W, 12, 0x72be5d74f27b896fULL); - RNDr(S, W, 13, 0x80deb1fe3b1696b1ULL); - RNDr(S, W, 14, 0x9bdc06a725c71235ULL); - RNDr(S, W, 15, 0xc19bf174cf692694ULL); - RNDr(S, W, 16, 0xe49b69c19ef14ad2ULL); - RNDr(S, W, 17, 0xefbe4786384f25e3ULL); - RNDr(S, W, 18, 0x0fc19dc68b8cd5b5ULL); - RNDr(S, W, 19, 0x240ca1cc77ac9c65ULL); - RNDr(S, W, 20, 0x2de92c6f592b0275ULL); - RNDr(S, W, 21, 0x4a7484aa6ea6e483ULL); - RNDr(S, W, 22, 0x5cb0a9dcbd41fbd4ULL); - RNDr(S, W, 23, 0x76f988da831153b5ULL); - RNDr(S, W, 24, 0x983e5152ee66dfabULL); - RNDr(S, W, 25, 0xa831c66d2db43210ULL); - RNDr(S, W, 26, 0xb00327c898fb213fULL); - RNDr(S, W, 27, 0xbf597fc7beef0ee4ULL); - RNDr(S, W, 28, 0xc6e00bf33da88fc2ULL); - RNDr(S, W, 29, 0xd5a79147930aa725ULL); - RNDr(S, W, 30, 0x06ca6351e003826fULL); - RNDr(S, W, 31, 0x142929670a0e6e70ULL); - RNDr(S, W, 32, 0x27b70a8546d22ffcULL); - RNDr(S, W, 33, 0x2e1b21385c26c926ULL); - RNDr(S, W, 34, 0x4d2c6dfc5ac42aedULL); - RNDr(S, W, 35, 0x53380d139d95b3dfULL); - RNDr(S, W, 36, 0x650a73548baf63deULL); - RNDr(S, W, 37, 0x766a0abb3c77b2a8ULL); - RNDr(S, W, 38, 0x81c2c92e47edaee6ULL); - RNDr(S, W, 39, 0x92722c851482353bULL); - RNDr(S, W, 40, 0xa2bfe8a14cf10364ULL); - RNDr(S, W, 41, 0xa81a664bbc423001ULL); - RNDr(S, W, 42, 0xc24b8b70d0f89791ULL); - RNDr(S, W, 43, 0xc76c51a30654be30ULL); - RNDr(S, W, 44, 0xd192e819d6ef5218ULL); - RNDr(S, W, 45, 0xd69906245565a910ULL); - RNDr(S, W, 46, 0xf40e35855771202aULL); - RNDr(S, W, 47, 0x106aa07032bbd1b8ULL); - RNDr(S, W, 48, 0x19a4c116b8d2d0c8ULL); - RNDr(S, W, 49, 0x1e376c085141ab53ULL); - RNDr(S, W, 50, 0x2748774cdf8eeb99ULL); - RNDr(S, W, 51, 0x34b0bcb5e19b48a8ULL); - RNDr(S, W, 52, 0x391c0cb3c5c95a63ULL); - RNDr(S, W, 53, 0x4ed8aa4ae3418acbULL); - RNDr(S, W, 54, 0x5b9cca4f7763e373ULL); - RNDr(S, W, 55, 0x682e6ff3d6b2b8a3ULL); - RNDr(S, W, 56, 0x748f82ee5defb2fcULL); - RNDr(S, W, 57, 0x78a5636f43172f60ULL); - RNDr(S, W, 58, 0x84c87814a1f0ab72ULL); - RNDr(S, W, 59, 0x8cc702081a6439ecULL); - RNDr(S, W, 60, 0x90befffa23631e28ULL); - RNDr(S, W, 61, 0xa4506cebde82bde9ULL); - RNDr(S, W, 62, 0xbef9a3f7b2c67915ULL); - RNDr(S, W, 63, 0xc67178f2e372532bULL); - RNDr(S, W, 64, 0xca273eceea26619cULL); - RNDr(S, W, 65, 0xd186b8c721c0c207ULL); - RNDr(S, W, 66, 0xeada7dd6cde0eb1eULL); - RNDr(S, W, 67, 0xf57d4f7fee6ed178ULL); - RNDr(S, W, 68, 0x06f067aa72176fbaULL); - RNDr(S, W, 69, 0x0a637dc5a2c898a6ULL); - RNDr(S, W, 70, 0x113f9804bef90daeULL); - RNDr(S, W, 71, 0x1b710b35131c471bULL); - RNDr(S, W, 72, 0x28db77f523047d84ULL); - RNDr(S, W, 73, 0x32caab7b40c72493ULL); - RNDr(S, W, 74, 0x3c9ebe0a15c9bebcULL); - RNDr(S, W, 75, 0x431d67c49c100d4cULL); - RNDr(S, W, 76, 0x4cc5d4becb3e42b6ULL); - RNDr(S, W, 77, 0x597f299cfc657e2aULL); - RNDr(S, W, 78, 0x5fcb6fab3ad6faecULL); - RNDr(S, W, 79, 0x6c44198c4a475817ULL); - - for (i = 0; i < 8; i++) { - state[i] += S[i]; - } - - sodium_memzero((void *) W, sizeof W); - sodium_memzero((void *) S, sizeof S); - sodium_memzero((void *) &t0, sizeof t0); - sodium_memzero((void *) &t1, sizeof t1); -} - -static unsigned char PAD[128] = { - 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 -}; - -static void -SHA512_Pad(crypto_hash_sha512_state *state) -{ - unsigned char len[16]; - uint64_t r, plen; - - be64enc_vect(len, state->count, 16); - - r = (state->count[1] >> 3) & 0x7f; - plen = (r < 112) ? (112 - r) : (240 - r); - crypto_hash_sha512_update(state, PAD, (unsigned long long) plen); - - crypto_hash_sha512_update(state, len, 16); -} - -int -crypto_hash_sha512_init(crypto_hash_sha512_state *state) -{ - state->count[0] = state->count[1] = 0; - - state->state[0] = 0x6a09e667f3bcc908ULL; - state->state[1] = 0xbb67ae8584caa73bULL; - state->state[2] = 0x3c6ef372fe94f82bULL; - state->state[3] = 0xa54ff53a5f1d36f1ULL; - state->state[4] = 0x510e527fade682d1ULL; - state->state[5] = 0x9b05688c2b3e6c1fULL; - state->state[6] = 0x1f83d9abfb41bd6bULL; - state->state[7] = 0x5be0cd19137e2179ULL; - - return 0; -} - -int -crypto_hash_sha512_update(crypto_hash_sha512_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - uint64_t bitlen[2]; - uint64_t r; - const unsigned char *src = in; - - r = (state->count[1] >> 3) & 0x7f; - - bitlen[1] = ((uint64_t)inlen) << 3; - bitlen[0] = ((uint64_t)inlen) >> 61; - - /* LCOV_EXCL_START */ - if ((state->count[1] += bitlen[1]) < bitlen[1]) { - state->count[0]++; - } - /* LCOV_EXCL_STOP */ - state->count[0] += bitlen[0]; - - if (inlen < 128 - r) { - memcpy(&state->buf[r], src, inlen); - return 0; - } - memcpy(&state->buf[r], src, 128 - r); - SHA512_Transform(state->state, state->buf); - src += 128 - r; - inlen -= 128 - r; - - while (inlen >= 128) { - SHA512_Transform(state->state, src); - src += 128; - inlen -= 128; - } - memcpy(state->buf, src, inlen); - - return 0; -} - -int -crypto_hash_sha512_final(crypto_hash_sha512_state *state, - unsigned char *out) -{ - SHA512_Pad(state); - be64enc_vect(out, state->state, 64); - sodium_memzero((void *) state, sizeof *state); - - return 0; -} - -int -crypto_hash(unsigned char *out, const unsigned char *in, - unsigned long long inlen) -{ - crypto_hash_sha512_state state; - - crypto_hash_sha512_init(&state); - crypto_hash_sha512_update(&state, in, inlen); - crypto_hash_sha512_final(&state, out); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_hash/sha512/hash_sha512_api.c b/Pods/libsodium/src/libsodium/crypto_hash/sha512/hash_sha512_api.c deleted file mode 100644 index b2629a8..0000000 --- a/Pods/libsodium/src/libsodium/crypto_hash/sha512/hash_sha512_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_hash_sha512.h" - -size_t -crypto_hash_sha512_bytes(void) { - return crypto_hash_sha512_BYTES; -} - -size_t -crypto_hash_sha512_statebytes(void) { - return sizeof(crypto_hash_sha512_state); -} diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/crypto_onetimeauth.c b/Pods/libsodium/src/libsodium/crypto_onetimeauth/crypto_onetimeauth.c deleted file mode 100644 index 1e90d62..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/crypto_onetimeauth.c +++ /dev/null @@ -1,65 +0,0 @@ - -#include "crypto_onetimeauth.h" - -size_t -crypto_onetimeauth_statebytes(void) -{ - return sizeof(crypto_onetimeauth_state); -} - -size_t -crypto_onetimeauth_bytes(void) -{ - return crypto_onetimeauth_BYTES; -} - -size_t -crypto_onetimeauth_keybytes(void) -{ - return crypto_onetimeauth_KEYBYTES; -} - -int -crypto_onetimeauth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - return crypto_onetimeauth_poly1305(out, in, inlen, k); -} - -int -crypto_onetimeauth_verify(const unsigned char *h, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - return crypto_onetimeauth_poly1305_verify(h, in, inlen, k); -} - -int -crypto_onetimeauth_init(crypto_onetimeauth_state *state, - const unsigned char *key) -{ - return crypto_onetimeauth_poly1305_init - ((crypto_onetimeauth_poly1305_state *) state, key); -} - -int -crypto_onetimeauth_update(crypto_onetimeauth_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - return crypto_onetimeauth_poly1305_update - ((crypto_onetimeauth_poly1305_state *) state, in, inlen); -} - -int -crypto_onetimeauth_final(crypto_onetimeauth_state *state, - unsigned char *out) -{ - return crypto_onetimeauth_poly1305_final - ((crypto_onetimeauth_poly1305_state *) state, out); -} - -const char * -crypto_onetimeauth_primitive(void) -{ - return crypto_onetimeauth_PRIMITIVE; -} diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/auth_poly1305_donna.c b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/auth_poly1305_donna.c deleted file mode 100644 index 42e21e3..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/auth_poly1305_donna.c +++ /dev/null @@ -1,105 +0,0 @@ - -#include "utils.h" -#include "poly1305_donna.h" -#ifdef HAVE_TI_MODE -# include "poly1305_donna64.h" -#else -# include "poly1305_donna32.h" -#endif - -static void -poly1305_update(poly1305_context *ctx, const unsigned char *m, - unsigned long long bytes) { - poly1305_state_internal_t *st = (poly1305_state_internal_t *)(void *)ctx; - unsigned long long i; - - /* handle leftover */ - if (st->leftover) { - unsigned long long want = (poly1305_block_size - st->leftover); - if (want > bytes) - want = bytes; - for (i = 0; i < want; i++) - st->buffer[st->leftover + i] = m[i]; - bytes -= want; - m += want; - st->leftover += want; - if (st->leftover < poly1305_block_size) - return; - poly1305_blocks(st, st->buffer, poly1305_block_size); - st->leftover = 0; - } - - /* process full blocks */ - if (bytes >= poly1305_block_size) { - unsigned long long want = (bytes & ~(poly1305_block_size - 1)); - poly1305_blocks(st, m, want); - m += want; - bytes -= want; - } - - /* store leftover */ - if (bytes) { - for (i = 0; i < bytes; i++) - st->buffer[st->leftover + i] = m[i]; - st->leftover += bytes; - } -} - -int -crypto_onetimeauth_poly1305_donna(unsigned char *out, const unsigned char *m, - unsigned long long inlen, - const unsigned char *key) -{ - poly1305_context ctx; - poly1305_init(&ctx, key); - poly1305_update(&ctx, m, inlen); - poly1305_finish(&ctx, out); - - return 0; -} - -int -crypto_onetimeauth_poly1305_donna_init(crypto_onetimeauth_poly1305_state *state, - const unsigned char *key) -{ - poly1305_init((poly1305_context *) state, key); - - return 0; -} - -int -crypto_onetimeauth_poly1305_donna_update(crypto_onetimeauth_poly1305_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - poly1305_update((poly1305_context *) state, in, inlen); - - return 0; -} - -int -crypto_onetimeauth_poly1305_donna_final(crypto_onetimeauth_poly1305_state *state, - unsigned char *out) -{ - poly1305_finish((poly1305_context *) state, out); - - return 0; -} - -/* LCOV_EXCL_START */ -const char * -crypto_onetimeauth_poly1305_donna_implementation_name(void) -{ - return POLY1305_IMPLEMENTATION_NAME; -} -/* LCOV_EXCL_STOP */ - -struct crypto_onetimeauth_poly1305_implementation -crypto_onetimeauth_poly1305_donna_implementation = { - SODIUM_C99(.implementation_name =) crypto_onetimeauth_poly1305_donna_implementation_name, - SODIUM_C99(.onetimeauth =) crypto_onetimeauth_poly1305_donna, - SODIUM_C99(.onetimeauth_verify =) crypto_onetimeauth_poly1305_donna_verify, - SODIUM_C99(.onetimeauth_init =) crypto_onetimeauth_poly1305_donna_init, - SODIUM_C99(.onetimeauth_update =) crypto_onetimeauth_poly1305_donna_update, - SODIUM_C99(.onetimeauth_final =) crypto_onetimeauth_poly1305_donna_final -}; diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna.h b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna.h deleted file mode 100644 index 3c58158..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna.h +++ /dev/null @@ -1,35 +0,0 @@ -#ifndef poly1305_donna_H -#define poly1305_donna_H - -#include - -#include "crypto_onetimeauth_poly1305.h" - -typedef crypto_onetimeauth_poly1305_state poly1305_context; - -extern struct crypto_onetimeauth_poly1305_implementation - crypto_onetimeauth_poly1305_donna_implementation; - -const char *crypto_onetimeauth_poly1305_donna_implementation_name(void); - -int crypto_onetimeauth_poly1305_donna(unsigned char *out, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -int crypto_onetimeauth_poly1305_donna_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -int crypto_onetimeauth_poly1305_donna_init(crypto_onetimeauth_poly1305_state *state, - const unsigned char *key); - -int crypto_onetimeauth_poly1305_donna_update(crypto_onetimeauth_poly1305_state *state, - const unsigned char *in, - unsigned long long inlen); - -int crypto_onetimeauth_poly1305_donna_final(crypto_onetimeauth_poly1305_state *state, - unsigned char *out); - -#endif /* __POLY1305_DONNA_H__ */ diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h deleted file mode 100644 index a469663..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna32.h +++ /dev/null @@ -1,208 +0,0 @@ -/* - poly1305 implementation using 32 bit * 32 bit = 64 bit multiplication and 64 bit addition -*/ - -#define POLY1305_IMPLEMENTATION_NAME "donna32" - -#if defined(_MSC_VER) -# define POLY1305_NOINLINE __declspec(noinline) -#elif defined(__GNUC__) -# define POLY1305_NOINLINE __attribute__((noinline)) -#else -# define POLY1305_NOINLINE -#endif - -#define poly1305_block_size 16 - -/* 17 + sizeof(unsigned long long) + 14*sizeof(unsigned long) */ -typedef struct poly1305_state_internal_t { - unsigned long r[5]; - unsigned long h[5]; - unsigned long pad[4]; - unsigned long long leftover; - unsigned char buffer[poly1305_block_size]; - unsigned char final; -} poly1305_state_internal_t; - -/* interpret four 8 bit unsigned integers as a 32 bit unsigned integer in little endian */ -static unsigned long -U8TO32(const unsigned char *p) { - return - (((unsigned long)(p[0] & 0xff) ) | - ((unsigned long)(p[1] & 0xff) << 8) | - ((unsigned long)(p[2] & 0xff) << 16) | - ((unsigned long)(p[3] & 0xff) << 24)); -} - -/* store a 32 bit unsigned integer as four 8 bit unsigned integers in little endian */ -static void -U32TO8(unsigned char *p, unsigned long v) { - p[0] = (v ) & 0xff; - p[1] = (v >> 8) & 0xff; - p[2] = (v >> 16) & 0xff; - p[3] = (v >> 24) & 0xff; -} - -static void -poly1305_init(poly1305_context *ctx, const unsigned char key[32]) { - poly1305_state_internal_t *st = (poly1305_state_internal_t *)(void *)ctx; - - /* r &= 0xffffffc0ffffffc0ffffffc0fffffff */ - st->r[0] = (U8TO32(&key[ 0]) ) & 0x3ffffff; - st->r[1] = (U8TO32(&key[ 3]) >> 2) & 0x3ffff03; - st->r[2] = (U8TO32(&key[ 6]) >> 4) & 0x3ffc0ff; - st->r[3] = (U8TO32(&key[ 9]) >> 6) & 0x3f03fff; - st->r[4] = (U8TO32(&key[12]) >> 8) & 0x00fffff; - - /* h = 0 */ - st->h[0] = 0; - st->h[1] = 0; - st->h[2] = 0; - st->h[3] = 0; - st->h[4] = 0; - - /* save pad for later */ - st->pad[0] = U8TO32(&key[16]); - st->pad[1] = U8TO32(&key[20]); - st->pad[2] = U8TO32(&key[24]); - st->pad[3] = U8TO32(&key[28]); - - st->leftover = 0; - st->final = 0; -} - -static void -poly1305_blocks(poly1305_state_internal_t *st, const unsigned char *m, unsigned long long bytes) { - const unsigned long hibit = (st->final) ? 0 : (1 << 24); /* 1 << 128 */ - unsigned long r0,r1,r2,r3,r4; - unsigned long s1,s2,s3,s4; - unsigned long h0,h1,h2,h3,h4; - unsigned long long d0,d1,d2,d3,d4; - unsigned long c; - - r0 = st->r[0]; - r1 = st->r[1]; - r2 = st->r[2]; - r3 = st->r[3]; - r4 = st->r[4]; - - s1 = r1 * 5; - s2 = r2 * 5; - s3 = r3 * 5; - s4 = r4 * 5; - - h0 = st->h[0]; - h1 = st->h[1]; - h2 = st->h[2]; - h3 = st->h[3]; - h4 = st->h[4]; - - while (bytes >= poly1305_block_size) { - /* h += m[i] */ - h0 += (U8TO32(m+ 0) ) & 0x3ffffff; - h1 += (U8TO32(m+ 3) >> 2) & 0x3ffffff; - h2 += (U8TO32(m+ 6) >> 4) & 0x3ffffff; - h3 += (U8TO32(m+ 9) >> 6) & 0x3ffffff; - h4 += (U8TO32(m+12) >> 8) | hibit; - - /* h *= r */ - d0 = ((unsigned long long)h0 * r0) + ((unsigned long long)h1 * s4) + ((unsigned long long)h2 * s3) + ((unsigned long long)h3 * s2) + ((unsigned long long)h4 * s1); - d1 = ((unsigned long long)h0 * r1) + ((unsigned long long)h1 * r0) + ((unsigned long long)h2 * s4) + ((unsigned long long)h3 * s3) + ((unsigned long long)h4 * s2); - d2 = ((unsigned long long)h0 * r2) + ((unsigned long long)h1 * r1) + ((unsigned long long)h2 * r0) + ((unsigned long long)h3 * s4) + ((unsigned long long)h4 * s3); - d3 = ((unsigned long long)h0 * r3) + ((unsigned long long)h1 * r2) + ((unsigned long long)h2 * r1) + ((unsigned long long)h3 * r0) + ((unsigned long long)h4 * s4); - d4 = ((unsigned long long)h0 * r4) + ((unsigned long long)h1 * r3) + ((unsigned long long)h2 * r2) + ((unsigned long long)h3 * r1) + ((unsigned long long)h4 * r0); - - /* (partial) h %= p */ - c = (unsigned long)(d0 >> 26); h0 = (unsigned long)d0 & 0x3ffffff; - d1 += c; c = (unsigned long)(d1 >> 26); h1 = (unsigned long)d1 & 0x3ffffff; - d2 += c; c = (unsigned long)(d2 >> 26); h2 = (unsigned long)d2 & 0x3ffffff; - d3 += c; c = (unsigned long)(d3 >> 26); h3 = (unsigned long)d3 & 0x3ffffff; - d4 += c; c = (unsigned long)(d4 >> 26); h4 = (unsigned long)d4 & 0x3ffffff; - h0 += c * 5; c = (h0 >> 26); h0 = h0 & 0x3ffffff; - h1 += c; - - m += poly1305_block_size; - bytes -= poly1305_block_size; - } - - st->h[0] = h0; - st->h[1] = h1; - st->h[2] = h2; - st->h[3] = h3; - st->h[4] = h4; -} - -static POLY1305_NOINLINE void -poly1305_finish(poly1305_context *ctx, unsigned char mac[16]) { - poly1305_state_internal_t *st = (poly1305_state_internal_t *)(void *)ctx; - unsigned long h0,h1,h2,h3,h4,c; - unsigned long g0,g1,g2,g3,g4; - unsigned long long f; - unsigned long mask; - - /* process the remaining block */ - if (st->leftover) { - unsigned long long i = st->leftover; - st->buffer[i++] = 1; - for (; i < poly1305_block_size; i++) - st->buffer[i] = 0; - st->final = 1; - poly1305_blocks(st, st->buffer, poly1305_block_size); - } - - /* fully carry h */ - h0 = st->h[0]; - h1 = st->h[1]; - h2 = st->h[2]; - h3 = st->h[3]; - h4 = st->h[4]; - - c = h1 >> 26; h1 = h1 & 0x3ffffff; - h2 += c; c = h2 >> 26; h2 = h2 & 0x3ffffff; - h3 += c; c = h3 >> 26; h3 = h3 & 0x3ffffff; - h4 += c; c = h4 >> 26; h4 = h4 & 0x3ffffff; - h0 += c * 5; c = h0 >> 26; h0 = h0 & 0x3ffffff; - h1 += c; - - /* compute h + -p */ - g0 = h0 + 5; c = g0 >> 26; g0 &= 0x3ffffff; - g1 = h1 + c; c = g1 >> 26; g1 &= 0x3ffffff; - g2 = h2 + c; c = g2 >> 26; g2 &= 0x3ffffff; - g3 = h3 + c; c = g3 >> 26; g3 &= 0x3ffffff; - g4 = h4 + c - (1 << 26); - - /* select h if h < p, or h + -p if h >= p */ - mask = (g4 >> ((sizeof(unsigned long) * 8) - 1)) - 1; - g0 &= mask; - g1 &= mask; - g2 &= mask; - g3 &= mask; - g4 &= mask; - mask = ~mask; - h0 = (h0 & mask) | g0; - h1 = (h1 & mask) | g1; - h2 = (h2 & mask) | g2; - h3 = (h3 & mask) | g3; - h4 = (h4 & mask) | g4; - - /* h = h % (2^128) */ - h0 = ((h0 ) | (h1 << 26)) & 0xffffffff; - h1 = ((h1 >> 6) | (h2 << 20)) & 0xffffffff; - h2 = ((h2 >> 12) | (h3 << 14)) & 0xffffffff; - h3 = ((h3 >> 18) | (h4 << 8)) & 0xffffffff; - - /* mac = (h + pad) % (2^128) */ - f = (unsigned long long)h0 + st->pad[0] ; h0 = (unsigned long)f; - f = (unsigned long long)h1 + st->pad[1] + (f >> 32); h1 = (unsigned long)f; - f = (unsigned long long)h2 + st->pad[2] + (f >> 32); h2 = (unsigned long)f; - f = (unsigned long long)h3 + st->pad[3] + (f >> 32); h3 = (unsigned long)f; - - U32TO8(mac + 0, h0); - U32TO8(mac + 4, h1); - U32TO8(mac + 8, h2); - U32TO8(mac + 12, h3); - - /* zero out the state */ - sodium_memzero((void *)st, sizeof *st); -} - diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h deleted file mode 100644 index 8b5c764..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/poly1305_donna64.h +++ /dev/null @@ -1,202 +0,0 @@ -/* - poly1305 implementation using 64 bit * 64 bit = 128 bit multiplication and 128 bit addition -*/ - -#define POLY1305_IMPLEMENTATION_NAME "donna64" - -#if defined(__SIZEOF_INT128__) -typedef unsigned __int128 uint128_t; -#else -typedef unsigned uint128_t __attribute__((mode(TI))); -#endif - -#define MUL(out, x, y) out = ((uint128_t)x * y) -#define ADD(out, in) out += in -#define ADDLO(out, in) out += in -#define SHR(in, shift) (unsigned long long)(in >> (shift)) -#define LO(in) (unsigned long long)(in) - -#define POLY1305_NOINLINE __attribute__((noinline)) - -#define poly1305_block_size 16 - -/* 17 + sizeof(unsigned long long) + 8*sizeof(unsigned long long) */ -typedef struct poly1305_state_internal_t { - unsigned long long r[3]; - unsigned long long h[3]; - unsigned long long pad[2]; - unsigned long long leftover; - unsigned char buffer[poly1305_block_size]; - unsigned char final; -} poly1305_state_internal_t; - -/* interpret eight 8 bit unsigned integers as a 64 bit unsigned integer in little endian */ -static unsigned long long -U8TO64(const unsigned char *p) { - return - (((unsigned long long)(p[0] & 0xff) ) | - ((unsigned long long)(p[1] & 0xff) << 8) | - ((unsigned long long)(p[2] & 0xff) << 16) | - ((unsigned long long)(p[3] & 0xff) << 24) | - ((unsigned long long)(p[4] & 0xff) << 32) | - ((unsigned long long)(p[5] & 0xff) << 40) | - ((unsigned long long)(p[6] & 0xff) << 48) | - ((unsigned long long)(p[7] & 0xff) << 56)); -} - -/* store a 64 bit unsigned integer as eight 8 bit unsigned integers in little endian */ -static void -U64TO8(unsigned char *p, unsigned long long v) { - p[0] = (v ) & 0xff; - p[1] = (v >> 8) & 0xff; - p[2] = (v >> 16) & 0xff; - p[3] = (v >> 24) & 0xff; - p[4] = (v >> 32) & 0xff; - p[5] = (v >> 40) & 0xff; - p[6] = (v >> 48) & 0xff; - p[7] = (v >> 56) & 0xff; -} - -static void -poly1305_init(poly1305_context *ctx, const unsigned char key[32]) { - poly1305_state_internal_t *st = (poly1305_state_internal_t *)(void *)ctx; - unsigned long long t0,t1; - - /* r &= 0xffffffc0ffffffc0ffffffc0fffffff */ - t0 = U8TO64(&key[0]); - t1 = U8TO64(&key[8]); - - st->r[0] = ( t0 ) & 0xffc0fffffff; - st->r[1] = ((t0 >> 44) | (t1 << 20)) & 0xfffffc0ffff; - st->r[2] = ((t1 >> 24) ) & 0x00ffffffc0f; - - /* h = 0 */ - st->h[0] = 0; - st->h[1] = 0; - st->h[2] = 0; - - /* save pad for later */ - st->pad[0] = U8TO64(&key[16]); - st->pad[1] = U8TO64(&key[24]); - - st->leftover = 0; - st->final = 0; -} - -static void -poly1305_blocks(poly1305_state_internal_t *st, const unsigned char *m, unsigned long long bytes) { - const unsigned long long hibit = (st->final) ? 0 : ((unsigned long long)1 << 40); /* 1 << 128 */ - unsigned long long r0,r1,r2; - unsigned long long s1,s2; - unsigned long long h0,h1,h2; - unsigned long long c; - uint128_t d0,d1,d2,d; - - r0 = st->r[0]; - r1 = st->r[1]; - r2 = st->r[2]; - - h0 = st->h[0]; - h1 = st->h[1]; - h2 = st->h[2]; - - s1 = r1 * (5 << 2); - s2 = r2 * (5 << 2); - - while (bytes >= poly1305_block_size) { - unsigned long long t0,t1; - - /* h += m[i] */ - t0 = U8TO64(&m[0]); - t1 = U8TO64(&m[8]); - - h0 += (( t0 ) & 0xfffffffffff); - h1 += (((t0 >> 44) | (t1 << 20)) & 0xfffffffffff); - h2 += (((t1 >> 24) ) & 0x3ffffffffff) | hibit; - - /* h *= r */ - MUL(d0, h0, r0); MUL(d, h1, s2); ADD(d0, d); MUL(d, h2, s1); ADD(d0, d); - MUL(d1, h0, r1); MUL(d, h1, r0); ADD(d1, d); MUL(d, h2, s2); ADD(d1, d); - MUL(d2, h0, r2); MUL(d, h1, r1); ADD(d2, d); MUL(d, h2, r0); ADD(d2, d); - - /* (partial) h %= p */ - c = SHR(d0, 44); h0 = LO(d0) & 0xfffffffffff; - ADDLO(d1, c); c = SHR(d1, 44); h1 = LO(d1) & 0xfffffffffff; - ADDLO(d2, c); c = SHR(d2, 42); h2 = LO(d2) & 0x3ffffffffff; - h0 += c * 5; c = (h0 >> 44); h0 = h0 & 0xfffffffffff; - h1 += c; - - m += poly1305_block_size; - bytes -= poly1305_block_size; - } - - st->h[0] = h0; - st->h[1] = h1; - st->h[2] = h2; -} - - -static POLY1305_NOINLINE void -poly1305_finish(poly1305_context *ctx, unsigned char mac[16]) { - poly1305_state_internal_t *st = (poly1305_state_internal_t *)(void *)ctx; - unsigned long long h0,h1,h2,c; - unsigned long long g0,g1,g2; - unsigned long long t0,t1; - - /* process the remaining block */ - if (st->leftover) { - unsigned long long i = st->leftover; - st->buffer[i] = 1; - for (i = i + 1; i < poly1305_block_size; i++) - st->buffer[i] = 0; - st->final = 1; - poly1305_blocks(st, st->buffer, poly1305_block_size); - } - - /* fully carry h */ - h0 = st->h[0]; - h1 = st->h[1]; - h2 = st->h[2]; - - c = (h1 >> 44); h1 &= 0xfffffffffff; - h2 += c; c = (h2 >> 42); h2 &= 0x3ffffffffff; - h0 += c * 5; c = (h0 >> 44); h0 &= 0xfffffffffff; - h1 += c; c = (h1 >> 44); h1 &= 0xfffffffffff; - h2 += c; c = (h2 >> 42); h2 &= 0x3ffffffffff; - h0 += c * 5; c = (h0 >> 44); h0 &= 0xfffffffffff; - h1 += c; - - /* compute h + -p */ - g0 = h0 + 5; c = (g0 >> 44); g0 &= 0xfffffffffff; - g1 = h1 + c; c = (g1 >> 44); g1 &= 0xfffffffffff; - g2 = h2 + c - ((unsigned long long)1 << 42); - - /* select h if h < p, or h + -p if h >= p */ - c = (g2 >> ((sizeof(unsigned long long) * 8) - 1)) - 1; - g0 &= c; - g1 &= c; - g2 &= c; - c = ~c; - h0 = (h0 & c) | g0; - h1 = (h1 & c) | g1; - h2 = (h2 & c) | g2; - - /* h = (h + pad) */ - t0 = st->pad[0]; - t1 = st->pad[1]; - - h0 += (( t0 ) & 0xfffffffffff) ; c = (h0 >> 44); h0 &= 0xfffffffffff; - h1 += (((t0 >> 44) | (t1 << 20)) & 0xfffffffffff) + c; c = (h1 >> 44); h1 &= 0xfffffffffff; - h2 += (((t1 >> 24) ) & 0x3ffffffffff) + c; h2 &= 0x3ffffffffff; - - /* mac = h % (2^128) */ - h0 = ((h0 ) | (h1 << 44)); - h1 = ((h1 >> 20) | (h2 << 24)); - - U64TO8(&mac[0], h0); - U64TO8(&mac[8], h1); - - /* zero out the state */ - sodium_memzero((void *)st, sizeof *st); -} - diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/verify_poly1305_donna.c b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/verify_poly1305_donna.c deleted file mode 100644 index e059842..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/donna/verify_poly1305_donna.c +++ /dev/null @@ -1,15 +0,0 @@ -#include "crypto_onetimeauth_poly1305.h" -#include "crypto_verify_16.h" -#include "poly1305_donna.h" - -int -crypto_onetimeauth_poly1305_donna_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k) -{ - unsigned char correct[16]; - - crypto_onetimeauth_poly1305_donna(correct,in,inlen,k); - return crypto_verify_16(h,correct); -} diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305.c b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305.c deleted file mode 100644 index 14253b7..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305.c +++ /dev/null @@ -1,60 +0,0 @@ - -#include "crypto_onetimeauth_poly1305.h" -#include "donna/poly1305_donna.h" - -/* LCOV_EXCL_START */ -static const crypto_onetimeauth_poly1305_implementation *implementation = - &crypto_onetimeauth_poly1305_donna_implementation; - -int -crypto_onetimeauth_poly1305_set_implementation(crypto_onetimeauth_poly1305_implementation *impl) -{ - implementation = impl; - - return 0; -} - -const char * -crypto_onetimeauth_poly1305_implementation_name(void) -{ - return implementation->implementation_name(); -} -/* LCOV_EXCL_STOP */ - -int -crypto_onetimeauth_poly1305(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - return implementation->onetimeauth(out, in, inlen, k); -} - -int -crypto_onetimeauth_poly1305_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k) -{ - return implementation->onetimeauth_verify(h, in, inlen, k); -} - -int -crypto_onetimeauth_poly1305_init(crypto_onetimeauth_poly1305_state *state, - const unsigned char *key) -{ - return implementation->onetimeauth_init(state, key); -} - -int -crypto_onetimeauth_poly1305_update(crypto_onetimeauth_poly1305_state *state, - const unsigned char *in, - unsigned long long inlen) -{ - return implementation->onetimeauth_update(state, in, inlen); -} - -int -crypto_onetimeauth_poly1305_final(crypto_onetimeauth_poly1305_state *state, - unsigned char *out) -{ - return implementation->onetimeauth_final(state, out); -} diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_api.c b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_api.c deleted file mode 100644 index b8878d5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_onetimeauth_poly1305.h" - -size_t -crypto_onetimeauth_poly1305_bytes(void) { - return crypto_onetimeauth_poly1305_BYTES; -} - -size_t -crypto_onetimeauth_poly1305_keybytes(void) { - return crypto_onetimeauth_poly1305_KEYBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_try.c b/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_try.c deleted file mode 100644 index 10084e5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_onetimeauth/poly1305/onetimeauth_poly1305_try.c +++ /dev/null @@ -1,13 +0,0 @@ - -#include -#include -#include "crypto_onetimeauth.h" -#include "crypto_onetimeauth_poly1305.h" -#include "utils.h" -#include "donna/poly1305_donna.h" - -crypto_onetimeauth_poly1305_implementation * -crypto_onetimeauth_pick_best_implementation(void) -{ - return &crypto_onetimeauth_poly1305_donna_implementation; -} diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt-common.c b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt-common.c deleted file mode 100644 index 77be6ab..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt-common.c +++ /dev/null @@ -1,250 +0,0 @@ -/*- - * Copyright 2013 Alexander Peslyak - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - */ - -#include -#include - -#include "crypto_pwhash_scryptsalsa208sha256.h" -#include "crypto_scrypt.h" -#include "runtime.h" -#include "utils.h" - -static const char * const itoa64 = - "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; - -static uint8_t * -encode64_uint32(uint8_t * dst, size_t dstlen, uint32_t src, uint32_t srcbits) -{ - uint32_t bit; - - for (bit = 0; bit < srcbits; bit += 6) { - if (dstlen < 1) { - return NULL; /* LCOV_EXCL_LINE */ - } - *dst++ = itoa64[src & 0x3f]; - dstlen--; - src >>= 6; - } - - return dst; -} - -static uint8_t * -encode64(uint8_t * dst, size_t dstlen, const uint8_t * src, size_t srclen) -{ - size_t i; - - for (i = 0; i < srclen; ) { - uint8_t * dnext; - uint32_t value = 0, bits = 0; - do { - value |= (uint32_t)src[i++] << bits; - bits += 8; - } while (bits < 24 && i < srclen); - dnext = encode64_uint32(dst, dstlen, value, bits); - if (!dnext) { - return NULL; /* LCOV_EXCL_LINE */ - } - dstlen -= dnext - dst; - dst = dnext; - } - - return dst; -} - -static int -decode64_one(uint32_t * dst, uint8_t src) -{ - const char *ptr = strchr(itoa64, src); - - if (ptr) { - *dst = (uint32_t) (ptr - itoa64); - return 0; - } - *dst = 0; - return -1; -} - -static const uint8_t * -decode64_uint32(uint32_t * dst, uint32_t dstbits, const uint8_t * src) -{ - uint32_t bit; - uint32_t value; - - value = 0; - for (bit = 0; bit < dstbits; bit += 6) { - uint32_t one; - if (decode64_one(&one, *src)) { - *dst = 0; - return NULL; - } - src++; - value |= one << bit; - } - - *dst = value; - return src; -} - -uint8_t * -escrypt_r(escrypt_local_t * local, const uint8_t * passwd, size_t passwdlen, - const uint8_t * setting, uint8_t * buf, size_t buflen) -{ - uint8_t hash[crypto_pwhash_scryptsalsa208sha256_STRHASHBYTES]; - escrypt_kdf_t escrypt_kdf; - const uint8_t *src; - const uint8_t *salt; - uint8_t *dst; - size_t prefixlen; - size_t saltlen; - size_t need; - uint64_t N; - uint32_t N_log2; - uint32_t r; - uint32_t p; - - if (setting[0] != '$' || setting[1] != '7' || setting[2] != '$') { - return NULL; - } - src = setting + 3; - - if (decode64_one(&N_log2, *src)) { - return NULL; - } - src++; - N = (uint64_t)1 << N_log2; - - src = decode64_uint32(&r, 30, src); - if (!src) { - return NULL; - } - src = decode64_uint32(&p, 30, src); - if (!src) { - return NULL; - } - prefixlen = src - setting; - - salt = src; - src = (uint8_t *) strrchr((char *)salt, '$'); - if (src) { - saltlen = src - salt; - } else { - saltlen = strlen((char *)salt); - } - need = prefixlen + saltlen + 1 + - crypto_pwhash_scryptsalsa208sha256_STRHASHBYTES_ENCODED + 1; - if (need > buflen || need < saltlen) { - return NULL; - } -#if defined(HAVE_EMMINTRIN_H) || defined(_MSC_VER) - escrypt_kdf = - sodium_runtime_has_sse2() ? escrypt_kdf_sse : escrypt_kdf_nosse; -#else - escrypt_kdf = escrypt_kdf_nosse; -#endif - if (escrypt_kdf(local, passwd, passwdlen, salt, saltlen, - N, r, p, hash, sizeof(hash))) { - return NULL; - } - - dst = buf; - memcpy(dst, setting, prefixlen + saltlen); - dst += prefixlen + saltlen; - *dst++ = '$'; - - dst = encode64(dst, buflen - (dst - buf), hash, sizeof(hash)); - sodium_memzero(hash, sizeof hash); - if (!dst || dst >= buf + buflen) { - return NULL; /* Can't happen LCOV_EXCL_LINE */ - } - *dst = 0; /* NUL termination */ - - return buf; -} - -uint8_t * -escrypt_gensalt_r(uint32_t N_log2, uint32_t r, uint32_t p, - const uint8_t * src, size_t srclen, - uint8_t * buf, size_t buflen) -{ - uint8_t *dst; - size_t prefixlen = - (sizeof "$7$" - 1U) + (1U /* N_log2 */) + (5U /* r */) + (5U /* p */); - size_t saltlen = BYTES2CHARS(srclen); - size_t need; - - need = prefixlen + saltlen + 1; - if (need > buflen || need < saltlen || saltlen < srclen) { - return NULL; /* LCOV_EXCL_LINE */ - } - if (N_log2 > 63 || ((uint64_t)r * (uint64_t)p >= (1U << 30))) { - return NULL; - } - dst = buf; - *dst++ = '$'; - *dst++ = '7'; - *dst++ = '$'; - - *dst++ = itoa64[N_log2]; - - dst = encode64_uint32(dst, buflen - (dst - buf), r, 30); - if (!dst) { - return NULL; /* Can't happen LCOV_EXCL_LINE */ - } - dst = encode64_uint32(dst, buflen - (dst - buf), p, 30); - if (!dst) { - return NULL; /* Can't happen LCOV_EXCL_LINE */ - } - dst = encode64(dst, buflen - (dst - buf), src, srclen); - if (!dst || dst >= buf + buflen) { - return NULL; /* Can't happen LCOV_EXCL_LINE */ - } - *dst = 0; /* NUL termination */ - - return buf; -} - -int -crypto_pwhash_scryptsalsa208sha256_ll(const uint8_t * passwd, size_t passwdlen, - const uint8_t * salt, size_t saltlen, - uint64_t N, uint32_t r, uint32_t p, - uint8_t * buf, size_t buflen) -{ - escrypt_kdf_t escrypt_kdf; - escrypt_local_t local; - int retval; - - if (escrypt_init_local(&local)) { - return -1; /* LCOV_EXCL_LINE */ - } -#if defined(HAVE_EMMINTRIN_H) || defined(_MSC_VER) - escrypt_kdf = - sodium_runtime_has_sse2() ? escrypt_kdf_sse : escrypt_kdf_nosse; -#else - escrypt_kdf = escrypt_kdf_nosse; -#endif - retval = escrypt_kdf(&local, - passwd, passwdlen, salt, saltlen, - N, r, p, buf, buflen); - if (escrypt_free_local(&local)) { - return -1; /* LCOV_EXCL_LINE */ - } - return retval; -} diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h deleted file mode 100644 index 2100ecc..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/crypto_scrypt.h +++ /dev/null @@ -1,97 +0,0 @@ -/*- - * Copyright 2009 Colin Percival - * Copyright 2013 Alexander Peslyak - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * This file was originally written by Colin Percival as part of the Tarsnap - * online backup system. - */ -#ifndef crypto_scrypt_H -#define crypto_scrypt_H - -#include - -#if SIZE_MAX > 0xffffffffULL -# define ARCH_BITS 64 -#else -# define ARCH_BITS 32 -#endif - -#define crypto_pwhash_scryptsalsa208sha256_STRPREFIXBYTES 14 -#define crypto_pwhash_scryptsalsa208sha256_STRSETTINGBYTES 57 -#define crypto_pwhash_scryptsalsa208sha256_STRSALTBYTES 32 -#define crypto_pwhash_scryptsalsa208sha256_STRSALTBYTES_ENCODED 43 -#define crypto_pwhash_scryptsalsa208sha256_STRHASHBYTES 32 -#define crypto_pwhash_scryptsalsa208sha256_STRHASHBYTES_ENCODED 43 - -#define BYTES2CHARS(bytes) ((((bytes) * 8) + 5) / 6) - -typedef struct { - void * base, * aligned; - size_t size; -} escrypt_region_t; - -typedef union { - uint64_t d[8]; - uint32_t w[16]; -} escrypt_block_t; - -typedef escrypt_region_t escrypt_local_t; - -extern int escrypt_init_local(escrypt_local_t * __local); - -extern int escrypt_free_local(escrypt_local_t * __local); - -extern void *alloc_region(escrypt_region_t * region, size_t size); -extern int free_region(escrypt_region_t * region); - -typedef int (*escrypt_kdf_t)(escrypt_local_t * __local, - const uint8_t * __passwd, size_t __passwdlen, - const uint8_t * __salt, size_t __saltlen, - uint64_t __N, uint32_t __r, uint32_t __p, - uint8_t * __buf, size_t __buflen); - -extern int escrypt_kdf_nosse(escrypt_local_t * __local, - const uint8_t * __passwd, size_t __passwdlen, - const uint8_t * __salt, size_t __saltlen, - uint64_t __N, uint32_t __r, uint32_t __p, - uint8_t * __buf, size_t __buflen); - -extern int escrypt_kdf_sse(escrypt_local_t * __local, - const uint8_t * __passwd, size_t __passwdlen, - const uint8_t * __salt, size_t __saltlen, - uint64_t __N, uint32_t __r, uint32_t __p, - uint8_t * __buf, size_t __buflen); - -extern uint8_t * escrypt_r(escrypt_local_t * __local, - const uint8_t * __passwd, size_t __passwdlen, - const uint8_t * __setting, - uint8_t * __buf, size_t __buflen); - -extern uint8_t * escrypt_gensalt_r( - uint32_t __N_log2, uint32_t __r, uint32_t __p, - const uint8_t * __src, size_t __srclen, - uint8_t * __buf, size_t __buflen); - -#endif /* !_CRYPTO_SCRYPT_H_ */ diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/pwhash_scryptsalsa208sha256_nosse.c b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/pwhash_scryptsalsa208sha256_nosse.c deleted file mode 100644 index a9eec74..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/pwhash_scryptsalsa208sha256_nosse.c +++ /dev/null @@ -1,337 +0,0 @@ -/*- - * Copyright 2009 Colin Percival - * Copyright 2013 Alexander Peslyak - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * This file was originally written by Colin Percival as part of the Tarsnap - * online backup system. - */ - -#include -#include -#include -#include -#include - -#include "../pbkdf2-sha256.h" -#include "../sysendian.h" -#include "../crypto_scrypt.h" - -static inline void -blkcpy_64(escrypt_block_t *dest, const escrypt_block_t *src) -{ - int i; - -#if (ARCH_BITS==32) - for (i = 0; i < 16; ++i) - dest->w[i] = src->w[i]; -#else - for (i = 0; i < 8; ++i) - dest->d[i] = src->d[i]; -#endif -} - -static inline void -blkxor_64(escrypt_block_t *dest, const escrypt_block_t *src) -{ - int i; - -#if (ARCH_BITS==32) - for (i = 0; i < 16; ++i) - dest->w[i] ^= src->w[i]; -#else - for (i = 0; i < 8; ++i) - dest->d[i] ^= src->d[i]; -#endif -} - -static inline void -blkcpy(escrypt_block_t *dest, const escrypt_block_t *src, size_t len) -{ - size_t i, L; -#if (ARCH_BITS==32) - L = (len>>2); - for (i = 0; i < L; ++i) - dest->w[i] = src->w[i]; -#else - L = (len>>3); - for (i = 0; i < L; ++i) - dest->d[i] = src->d[i]; -#endif -} - -static inline void -blkxor(escrypt_block_t *dest, const escrypt_block_t *src, size_t len) -{ - size_t i, L; -#if (ARCH_BITS==32) - L = (len>>2); - for (i = 0; i < L; ++i) - dest->w[i] ^= src->w[i]; -#else - L = (len>>3); - for (i = 0; i < L; ++i) - dest->d[i] ^= src->d[i]; -#endif -} - -/** - * salsa20_8(B): - * Apply the salsa20/8 core to the provided block. - */ -static void -salsa20_8(uint32_t B[16]) -{ - escrypt_block_t X; - uint32_t *x = X.w; - size_t i; - - blkcpy_64(&X, (escrypt_block_t*)B); - for (i = 0; i < 8; i += 2) { -#define R(a,b) (((a) << (b)) | ((a) >> (32 - (b)))) - /* Operate on columns. */ - x[ 4] ^= R(x[ 0]+x[12], 7); x[ 8] ^= R(x[ 4]+x[ 0], 9); - x[12] ^= R(x[ 8]+x[ 4],13); x[ 0] ^= R(x[12]+x[ 8],18); - - x[ 9] ^= R(x[ 5]+x[ 1], 7); x[13] ^= R(x[ 9]+x[ 5], 9); - x[ 1] ^= R(x[13]+x[ 9],13); x[ 5] ^= R(x[ 1]+x[13],18); - - x[14] ^= R(x[10]+x[ 6], 7); x[ 2] ^= R(x[14]+x[10], 9); - x[ 6] ^= R(x[ 2]+x[14],13); x[10] ^= R(x[ 6]+x[ 2],18); - - x[ 3] ^= R(x[15]+x[11], 7); x[ 7] ^= R(x[ 3]+x[15], 9); - x[11] ^= R(x[ 7]+x[ 3],13); x[15] ^= R(x[11]+x[ 7],18); - - /* Operate on rows. */ - x[ 1] ^= R(x[ 0]+x[ 3], 7); x[ 2] ^= R(x[ 1]+x[ 0], 9); - x[ 3] ^= R(x[ 2]+x[ 1],13); x[ 0] ^= R(x[ 3]+x[ 2],18); - - x[ 6] ^= R(x[ 5]+x[ 4], 7); x[ 7] ^= R(x[ 6]+x[ 5], 9); - x[ 4] ^= R(x[ 7]+x[ 6],13); x[ 5] ^= R(x[ 4]+x[ 7],18); - - x[11] ^= R(x[10]+x[ 9], 7); x[ 8] ^= R(x[11]+x[10], 9); - x[ 9] ^= R(x[ 8]+x[11],13); x[10] ^= R(x[ 9]+x[ 8],18); - - x[12] ^= R(x[15]+x[14], 7); x[13] ^= R(x[12]+x[15], 9); - x[14] ^= R(x[13]+x[12],13); x[15] ^= R(x[14]+x[13],18); -#undef R - } - for (i = 0; i < 16; i++) - B[i] += x[i]; -} - -/** - * blockmix_salsa8(Bin, Bout, X, r): - * Compute Bout = BlockMix_{salsa20/8, r}(Bin). The input Bin must be 128r - * bytes in length; the output Bout must also be the same size. The - * temporary space X must be 64 bytes. - */ -static void -blockmix_salsa8(const uint32_t * Bin, uint32_t * Bout, uint32_t * X, size_t r) -{ - size_t i; - - /* 1: X <-- B_{2r - 1} */ - blkcpy_64((escrypt_block_t*)X, (escrypt_block_t*)&Bin[(2 * r - 1) * 16]); - - /* 2: for i = 0 to 2r - 1 do */ - for (i = 0; i < 2 * r; i += 2) { - /* 3: X <-- H(X \xor B_i) */ - blkxor_64((escrypt_block_t*)X, (escrypt_block_t*)&Bin[i * 16]); - salsa20_8(X); - - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - blkcpy_64((escrypt_block_t*)&Bout[i * 8], (escrypt_block_t*)X); - - /* 3: X <-- H(X \xor B_i) */ - blkxor_64((escrypt_block_t*)X, (escrypt_block_t*)&Bin[i * 16 + 16]); - salsa20_8(X); - - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - blkcpy_64((escrypt_block_t*)&Bout[i * 8 + r * 16], (escrypt_block_t*)X); - } -} - -/** - * integerify(B, r): - * Return the result of parsing B_{2r-1} as a little-endian integer. - */ -static inline uint64_t -integerify(const void * B, size_t r) -{ - const uint32_t * X = (const uint32_t *)((uintptr_t)(B) + (2 * r - 1) * 64); - - return (((uint64_t)(X[1]) << 32) + X[0]); -} - -/** - * smix(B, r, N, V, XY): - * Compute B = SMix_r(B, N). The input B must be 128r bytes in length; - * the temporary storage V must be 128rN bytes in length; the temporary - * storage XY must be 256r + 64 bytes in length. The value N must be a - * power of 2 greater than 1. The arrays B, V, and XY must be aligned to a - * multiple of 64 bytes. - */ -static void -smix(uint8_t * B, size_t r, uint64_t N, uint32_t * V, uint32_t * XY) -{ - uint32_t * X = XY; - uint32_t * Y = &XY[32 * r]; - uint32_t * Z = &XY[64 * r]; - uint64_t i; - uint64_t j; - size_t k; - - /* 1: X <-- B */ - for (k = 0; k < 32 * r; k++) - X[k] = le32dec(&B[4 * k]); - - /* 2: for i = 0 to N - 1 do */ - for (i = 0; i < N; i += 2) { - /* 3: V_i <-- X */ - blkcpy((escrypt_block_t*)&V[i * (32 * r)], (escrypt_block_t*)X, 128 * r); - - /* 4: X <-- H(X) */ - blockmix_salsa8(X, Y, Z, r); - - /* 3: V_i <-- X */ - blkcpy((escrypt_block_t*)&V[(i + 1) * (32 * r)], (escrypt_block_t*)Y, 128 * r); - - /* 4: X <-- H(X) */ - blockmix_salsa8(Y, X, Z, r); - } - - /* 6: for i = 0 to N - 1 do */ - for (i = 0; i < N; i += 2) { - /* 7: j <-- Integerify(X) mod N */ - j = integerify(X, r) & (N - 1); - - /* 8: X <-- H(X \xor V_j) */ - blkxor((escrypt_block_t*)X, (escrypt_block_t*)&V[j * (32 * r)], 128 * r); - blockmix_salsa8(X, Y, Z, r); - - /* 7: j <-- Integerify(X) mod N */ - j = integerify(Y, r) & (N - 1); - - /* 8: X <-- H(X \xor V_j) */ - blkxor((escrypt_block_t*)Y, (escrypt_block_t*)&V[j * (32 * r)], 128 * r); - blockmix_salsa8(Y, X, Z, r); - } - /* 10: B' <-- X */ - for (k = 0; k < 32 * r; k++) - le32enc(&B[4 * k], X[k]); -} - -/** - * escrypt_kdf(local, passwd, passwdlen, salt, saltlen, - * N, r, p, buf, buflen): - * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, - * p, buflen) and write the result into buf. The parameters r, p, and buflen - * must satisfy r * p < 2^30 and buflen <= (2^32 - 1) * 32. The parameter N - * must be a power of 2 greater than 1. - * - * Return 0 on success; or -1 on error. - */ -int -escrypt_kdf_nosse(escrypt_local_t * local, - const uint8_t * passwd, size_t passwdlen, - const uint8_t * salt, size_t saltlen, - uint64_t N, uint32_t _r, uint32_t _p, - uint8_t * buf, size_t buflen) -{ - size_t B_size, V_size, XY_size, need; - uint8_t * B; - uint32_t * V, * XY; - size_t r = _r, p = _p; - uint32_t i; - - /* Sanity-check parameters. */ -#if SIZE_MAX > UINT32_MAX - if (buflen > (((uint64_t)(1) << 32) - 1) * 32) { - errno = EFBIG; - return -1; - } -#endif - if ((uint64_t)(r) * (uint64_t)(p) >= (1 << 30)) { - errno = EFBIG; - return -1; - } - if (((N & (N - 1)) != 0) || (N < 2)) { - errno = EINVAL; - return -1; - } - if (r == 0 || p == 0) { - errno = EINVAL; - return -1; - } - if ((r > SIZE_MAX / 128 / p) || -#if SIZE_MAX / 256 <= UINT32_MAX - (r > SIZE_MAX / 256) || -#endif - (N > SIZE_MAX / 128 / r)) { - errno = ENOMEM; - return -1; - } - - /* Allocate memory. */ - B_size = (size_t)128 * r * p; - V_size = (size_t)128 * r * N; - need = B_size + V_size; - if (need < V_size) { - errno = ENOMEM; - return -1; - } - XY_size = (size_t)256 * r + 64; - need += XY_size; - if (need < XY_size) { - errno = ENOMEM; - return -1; - } - if (local->size < need) { - if (free_region(local)) - return -1; - if (!alloc_region(local, need)) - return -1; - } - B = (uint8_t *)local->aligned; - V = (uint32_t *)((uint8_t *)B + B_size); - XY = (uint32_t *)((uint8_t *)V + V_size); - - /* 1: (B_0 ... B_{p-1}) <-- PBKDF2(P, S, 1, p * MFLen) */ - PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size); - - /* 2: for i = 0 to p - 1 do */ - for (i = 0; i < p; i++) { - /* 3: B_i <-- MF(B_i, N) */ - smix(&B[(size_t)128 * i * r], r, N, V, XY); - } - - /* 5: DK <-- PBKDF2(P, B, 1, dkLen) */ - PBKDF2_SHA256(passwd, passwdlen, B, B_size, 1, buf, buflen); - - /* Success! */ - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.c b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.c deleted file mode 100644 index 9b585a2..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.c +++ /dev/null @@ -1,85 +0,0 @@ -/*- - * Copyright 2005,2007,2009 Colin Percival - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - */ - -#include - -#include -#include -#include - -#include "crypto_auth_hmacsha256.h" -#include "pbkdf2-sha256.h" -#include "sysendian.h" -#include "utils.h" - -/** - * PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, c, buf, dkLen): - * Compute PBKDF2(passwd, salt, c, dkLen) using HMAC-SHA256 as the PRF, and - * write the output to buf. The value dkLen must be at most 32 * (2^32 - 1). - */ -void -PBKDF2_SHA256(const uint8_t * passwd, size_t passwdlen, const uint8_t * salt, - size_t saltlen, uint64_t c, uint8_t * buf, size_t dkLen) -{ - crypto_auth_hmacsha256_state PShctx, hctx; - size_t i; - uint8_t ivec[4]; - uint8_t U[32]; - uint8_t T[32]; - uint64_t j; - int k; - size_t clen; - - crypto_auth_hmacsha256_init(&PShctx, passwd, passwdlen); - crypto_auth_hmacsha256_update(&PShctx, salt, saltlen); - - for (i = 0; i * 32 < dkLen; i++) { - be32enc(ivec, (uint32_t)(i + 1)); - memcpy(&hctx, &PShctx, sizeof(crypto_auth_hmacsha256_state)); - crypto_auth_hmacsha256_update(&hctx, ivec, 4); - crypto_auth_hmacsha256_final(&hctx, U); - - memcpy(T, U, 32); - /* LCOV_EXCL_START */ - for (j = 2; j <= c; j++) { - crypto_auth_hmacsha256_init(&hctx, passwd, passwdlen); - crypto_auth_hmacsha256_update(&hctx, U, 32); - crypto_auth_hmacsha256_final(&hctx, U); - - for (k = 0; k < 32; k++) { - T[k] ^= U[k]; - } - } - /* LCOV_EXCL_STOP */ - - clen = dkLen - i * 32; - if (clen > 32) { - clen = 32; - } - memcpy(&buf[i * 32], T, clen); - } - sodium_memzero((void *) &PShctx, sizeof PShctx); -} diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h deleted file mode 100644 index dbe1875..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pbkdf2-sha256.h +++ /dev/null @@ -1,45 +0,0 @@ -/*- - * Copyright 2005,2007,2009 Colin Percival - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - */ - -#ifndef pbkdf2_sha256_H -#define pbkdf2_sha256_H - -#include - -#include - -#include "crypto_auth_hmacsha256.h" - -/** - * PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, c, buf, dkLen): - * Compute PBKDF2(passwd, salt, c, dkLen) using HMAC-SHA256 as the PRF, and - * write the output to buf. The value dkLen must be at most 32 * (2^32 - 1). - */ -void PBKDF2_SHA256(const uint8_t *, size_t, const uint8_t *, size_t, - uint64_t, uint8_t *, size_t); - -#endif /* !_SHA256_H_ */ diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pwhash_scryptsalsa208sha256.c b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pwhash_scryptsalsa208sha256.c deleted file mode 100644 index 94eb7d9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/pwhash_scryptsalsa208sha256.c +++ /dev/null @@ -1,207 +0,0 @@ - -#include -#include -#include -#include -#include - -#include "crypto_pwhash_scryptsalsa208sha256.h" -#include "crypto_scrypt.h" -#include "randombytes.h" -#include "utils.h" - -#define SETTING_SIZE(saltbytes) \ - (sizeof "$7$" - 1U) + \ - (1U /* N_log2 */) + (5U /* r */) + (5U /* p */) + BYTES2CHARS(saltbytes) - -static int -pickparams(unsigned long long opslimit, const size_t memlimit, - uint32_t * const N_log2, uint32_t * const p, uint32_t * const r) -{ - unsigned long long maxN; - unsigned long long maxrp; - - if (opslimit < 32768) { - opslimit = 32768; - } - *r = 8; - if (opslimit < memlimit / 32) { - *p = 1; - maxN = opslimit / (*r * 4); - for (*N_log2 = 1; *N_log2 < 63; *N_log2 += 1) { - if ((uint64_t)(1) << *N_log2 > maxN / 2) { - break; - } - } - } else { - maxN = memlimit / ((size_t) *r * 128); - for (*N_log2 = 1; *N_log2 < 63; *N_log2 += 1) { - if ((uint64_t) (1) << *N_log2 > maxN / 2) { - break; - } - } - maxrp = (opslimit / 4) / ((uint64_t) (1) << *N_log2); - /* LCOV_EXCL_START */ - if (maxrp > 0x3fffffff) { - maxrp = 0x3fffffff; - } - /* LCOV_EXCL_STOP */ - *p = (uint32_t) (maxrp) / *r; - } - return 0; -} - -size_t -crypto_pwhash_scryptsalsa208sha256_saltbytes(void) -{ - return crypto_pwhash_scryptsalsa208sha256_SALTBYTES; -} - -size_t -crypto_pwhash_scryptsalsa208sha256_strbytes(void) -{ - return crypto_pwhash_scryptsalsa208sha256_STRBYTES; -} - -const char * -crypto_pwhash_scryptsalsa208sha256_strprefix(void) -{ - return crypto_pwhash_scryptsalsa208sha256_STRPREFIX; -} - -size_t -crypto_pwhash_scryptsalsa208sha256_opslimit_interactive(void) -{ - return crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVE; -} - -size_t -crypto_pwhash_scryptsalsa208sha256_memlimit_interactive(void) -{ - return crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVE; -} - -size_t -crypto_pwhash_scryptsalsa208sha256_opslimit_sensitive(void) -{ - return crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_SENSITIVE; -} - -size_t -crypto_pwhash_scryptsalsa208sha256_memlimit_sensitive(void) -{ - return crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_SENSITIVE; -} - -int -crypto_pwhash_scryptsalsa208sha256(unsigned char * const out, - unsigned long long outlen, - const char * const passwd, - unsigned long long passwdlen, - const unsigned char * const salt, - unsigned long long opslimit, - size_t memlimit) -{ - uint32_t N_log2; - uint32_t p; - uint32_t r; - - memset(out, 0, outlen); - if (passwdlen > SIZE_MAX || outlen > SIZE_MAX) { - errno = EFBIG; /* LCOV_EXCL_LINE */ - return -1; /* LCOV_EXCL_LINE */ - } - if (pickparams(opslimit, memlimit, &N_log2, &p, &r) != 0) { - errno = EINVAL; /* LCOV_EXCL_LINE */ - return -1; /* LCOV_EXCL_LINE */ - } - return crypto_pwhash_scryptsalsa208sha256_ll((const uint8_t *) passwd, - (size_t) passwdlen, - (const uint8_t *) salt, - crypto_pwhash_scryptsalsa208sha256_SALTBYTES, - (uint64_t) (1) << N_log2, r, p, - out, (size_t) outlen); -} - -int -crypto_pwhash_scryptsalsa208sha256_str(char out[crypto_pwhash_scryptsalsa208sha256_STRBYTES], - const char * const passwd, - unsigned long long passwdlen, - unsigned long long opslimit, - size_t memlimit) -{ - uint8_t salt[crypto_pwhash_scryptsalsa208sha256_STRSALTBYTES]; - char setting[crypto_pwhash_scryptsalsa208sha256_STRSETTINGBYTES + 1U]; - escrypt_local_t escrypt_local; - uint32_t N_log2; - uint32_t p; - uint32_t r; - - memset(out, 0, crypto_pwhash_scryptsalsa208sha256_STRBYTES); - if (passwdlen > SIZE_MAX) { - errno = EFBIG; /* LCOV_EXCL_LINE */ - return -1; /* LCOV_EXCL_LINE */ - } - if (pickparams(opslimit, memlimit, &N_log2, &p, &r) != 0) { - errno = EINVAL; /* LCOV_EXCL_LINE */ - return -1; /* LCOV_EXCL_LINE */ - } - randombytes_buf(salt, sizeof salt); - if (escrypt_gensalt_r(N_log2, r, p, salt, sizeof salt, - (uint8_t *) setting, sizeof setting) == NULL) { - errno = EINVAL; /* LCOV_EXCL_LINE */ - return -1; /* LCOV_EXCL_LINE */ - } - if (escrypt_init_local(&escrypt_local) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - if (escrypt_r(&escrypt_local, (const uint8_t *) passwd, (size_t) passwdlen, - (const uint8_t *) setting, (uint8_t *) out, - crypto_pwhash_scryptsalsa208sha256_STRBYTES) == NULL) { - /* LCOV_EXCL_START */ - escrypt_free_local(&escrypt_local); - errno = EINVAL; - return -1; - /* LCOV_EXCL_STOP */ - } - escrypt_free_local(&escrypt_local); - - (void) sizeof - (int[SETTING_SIZE(crypto_pwhash_scryptsalsa208sha256_STRSALTBYTES) - == crypto_pwhash_scryptsalsa208sha256_STRSETTINGBYTES ? 1 : -1]); - (void) sizeof - (int[crypto_pwhash_scryptsalsa208sha256_STRSETTINGBYTES + 1U + - crypto_pwhash_scryptsalsa208sha256_STRHASHBYTES_ENCODED + 1U - == crypto_pwhash_scryptsalsa208sha256_STRBYTES ? 1 : -1]); - - return 0; -} - -int -crypto_pwhash_scryptsalsa208sha256_str_verify(const char str[crypto_pwhash_scryptsalsa208sha256_STRBYTES], - const char * const passwd, - unsigned long long passwdlen) -{ - char wanted[crypto_pwhash_scryptsalsa208sha256_STRBYTES]; - escrypt_local_t escrypt_local; - int ret = -1; - - if (memchr(str, 0, crypto_pwhash_scryptsalsa208sha256_STRBYTES) != - &str[crypto_pwhash_scryptsalsa208sha256_STRBYTES - 1U]) { - return -1; - } - if (escrypt_init_local(&escrypt_local) != 0) { - return -1; /* LCOV_EXCL_LINE */ - } - if (escrypt_r(&escrypt_local, (const uint8_t *) passwd, (size_t) passwdlen, - (const uint8_t *) str, (uint8_t *) wanted, - sizeof wanted) == NULL) { - escrypt_free_local(&escrypt_local); - return -1; - } - escrypt_free_local(&escrypt_local); - ret = sodium_memcmp(wanted, str, sizeof wanted); - sodium_memzero(wanted, sizeof wanted); - - return ret; -} diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/scrypt_platform.c b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/scrypt_platform.c deleted file mode 100644 index 85d4267..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/scrypt_platform.c +++ /dev/null @@ -1,100 +0,0 @@ -/*- - * Copyright 2013 Alexander Peslyak - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - */ - -#ifdef HAVE_SYS_MMAN_H -# include -#endif -#include -#include - -#include "crypto_scrypt.h" -#include "runtime.h" - -#if !defined(MAP_ANON) && defined(MAP_ANONYMOUS) -# define MAP_ANON MAP_ANONYMOUS -#endif - -void * -alloc_region(escrypt_region_t * region, size_t size) -{ - uint8_t * base, * aligned; -#if defined(MAP_ANON) && defined(HAVE_MMAP) - if ((base = (uint8_t *) mmap(NULL, size, PROT_READ | PROT_WRITE, -#ifdef MAP_NOCORE - MAP_ANON | MAP_PRIVATE | MAP_NOCORE, -#else - MAP_ANON | MAP_PRIVATE, -#endif - -1, 0)) == MAP_FAILED) - base = NULL; /* LCOV_EXCL_LINE */ - aligned = base; -#elif defined(HAVE_POSIX_MEMALIGN) - if ((errno = posix_memalign((void **) &base, 64, size)) != 0) - base = NULL; - aligned = base; -#else - base = aligned = NULL; - if (size + 63 < size) - errno = ENOMEM; - else if ((base = (uint8_t *) malloc(size + 63)) != NULL) { - aligned = base + 63; - aligned -= (uintptr_t)aligned & 63; - } -#endif - region->base = base; - region->aligned = aligned; - region->size = base ? size : 0; - return aligned; -} - -static inline void -init_region(escrypt_region_t * region) -{ - region->base = region->aligned = NULL; - region->size = 0; -} - -int -free_region(escrypt_region_t * region) -{ - if (region->base) { -#if defined(MAP_ANON) && defined(HAVE_MMAP) - if (munmap(region->base, region->size)) - return -1; /* LCOV_EXCL_LINE */ -#else - free(region->base); -#endif - } - init_region(region); - return 0; -} - -int -escrypt_init_local(escrypt_local_t * local) -{ - init_region(local); - return 0; -} - -int -escrypt_free_local(escrypt_local_t * local) -{ - return free_region(local); -} diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/pwhash_scryptsalsa208sha256_sse.c b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/pwhash_scryptsalsa208sha256_sse.c deleted file mode 100644 index a5202ed..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/pwhash_scryptsalsa208sha256_sse.c +++ /dev/null @@ -1,391 +0,0 @@ -/*- - * Copyright 2009 Colin Percival - * Copyright 2012,2013 Alexander Peslyak - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions - * are met: - * 1. Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * 2. Redistributions in binary form must reproduce the above copyright - * notice, this list of conditions and the following disclaimer in the - * documentation and/or other materials provided with the distribution. - * - * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE - * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF - * SUCH DAMAGE. - * - * This file was originally written by Colin Percival as part of the Tarsnap - * online backup system. - */ - -#if defined(HAVE_EMMINTRIN_H) || defined(_MSC_VER) -#if __GNUC__ -# pragma GCC target("sse2") -#endif -#include -#if defined(__XOP__) && defined(DISABLED) -# include -#endif - -#include -#include -#include -#include -#include - -#include "../pbkdf2-sha256.h" -#include "../sysendian.h" -#include "../crypto_scrypt.h" - -#if defined(__XOP__) && defined(DISABLED) -#define ARX(out, in1, in2, s) \ - out = _mm_xor_si128(out, _mm_roti_epi32(_mm_add_epi32(in1, in2), s)); -#else -#define ARX(out, in1, in2, s) \ - { \ - __m128i T = _mm_add_epi32(in1, in2); \ - out = _mm_xor_si128(out, _mm_slli_epi32(T, s)); \ - out = _mm_xor_si128(out, _mm_srli_epi32(T, 32-s)); \ - } -#endif - -#define SALSA20_2ROUNDS \ - /* Operate on "columns". */ \ - ARX(X1, X0, X3, 7) \ - ARX(X2, X1, X0, 9) \ - ARX(X3, X2, X1, 13) \ - ARX(X0, X3, X2, 18) \ -\ - /* Rearrange data. */ \ - X1 = _mm_shuffle_epi32(X1, 0x93); \ - X2 = _mm_shuffle_epi32(X2, 0x4E); \ - X3 = _mm_shuffle_epi32(X3, 0x39); \ -\ - /* Operate on "rows". */ \ - ARX(X3, X0, X1, 7) \ - ARX(X2, X3, X0, 9) \ - ARX(X1, X2, X3, 13) \ - ARX(X0, X1, X2, 18) \ -\ - /* Rearrange data. */ \ - X1 = _mm_shuffle_epi32(X1, 0x39); \ - X2 = _mm_shuffle_epi32(X2, 0x4E); \ - X3 = _mm_shuffle_epi32(X3, 0x93); - -/** - * Apply the salsa20/8 core to the block provided in (X0 ... X3) ^ (Z0 ... Z3). - */ -#define SALSA20_8_XOR(in, out) \ - { \ - __m128i Y0 = X0 = _mm_xor_si128(X0, (in)[0]); \ - __m128i Y1 = X1 = _mm_xor_si128(X1, (in)[1]); \ - __m128i Y2 = X2 = _mm_xor_si128(X2, (in)[2]); \ - __m128i Y3 = X3 = _mm_xor_si128(X3, (in)[3]); \ - SALSA20_2ROUNDS \ - SALSA20_2ROUNDS \ - SALSA20_2ROUNDS \ - SALSA20_2ROUNDS \ - (out)[0] = X0 = _mm_add_epi32(X0, Y0); \ - (out)[1] = X1 = _mm_add_epi32(X1, Y1); \ - (out)[2] = X2 = _mm_add_epi32(X2, Y2); \ - (out)[3] = X3 = _mm_add_epi32(X3, Y3); \ - } - -/** - * blockmix_salsa8(Bin, Bout, r): - * Compute Bout = BlockMix_{salsa20/8, r}(Bin). The input Bin must be 128r - * bytes in length; the output Bout must also be the same size. - */ -static inline void -blockmix_salsa8(const __m128i * Bin, __m128i * Bout, size_t r) -{ - __m128i X0, X1, X2, X3; - size_t i; - - /* 1: X <-- B_{2r - 1} */ - X0 = Bin[8 * r - 4]; - X1 = Bin[8 * r - 3]; - X2 = Bin[8 * r - 2]; - X3 = Bin[8 * r - 1]; - - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - SALSA20_8_XOR(Bin, Bout) - - /* 2: for i = 0 to 2r - 1 do */ - r--; - for (i = 0; i < r;) { - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - SALSA20_8_XOR(&Bin[i * 8 + 4], &Bout[(r + i) * 4 + 4]) - - i++; - - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - SALSA20_8_XOR(&Bin[i * 8], &Bout[i * 4]) - } - - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - SALSA20_8_XOR(&Bin[i * 8 + 4], &Bout[(r + i) * 4 + 4]) -} - -#define XOR4(in) \ - X0 = _mm_xor_si128(X0, (in)[0]); \ - X1 = _mm_xor_si128(X1, (in)[1]); \ - X2 = _mm_xor_si128(X2, (in)[2]); \ - X3 = _mm_xor_si128(X3, (in)[3]); - -#define XOR4_2(in1, in2) \ - X0 = _mm_xor_si128((in1)[0], (in2)[0]); \ - X1 = _mm_xor_si128((in1)[1], (in2)[1]); \ - X2 = _mm_xor_si128((in1)[2], (in2)[2]); \ - X3 = _mm_xor_si128((in1)[3], (in2)[3]); - -static inline uint32_t -blockmix_salsa8_xor(const __m128i * Bin1, const __m128i * Bin2, __m128i * Bout, - size_t r) -{ - __m128i X0, X1, X2, X3; - size_t i; - - /* 1: X <-- B_{2r - 1} */ - XOR4_2(&Bin1[8 * r - 4], &Bin2[8 * r - 4]) - - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - XOR4(Bin1) - SALSA20_8_XOR(Bin2, Bout) - - /* 2: for i = 0 to 2r - 1 do */ - r--; - for (i = 0; i < r;) { - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - XOR4(&Bin1[i * 8 + 4]) - SALSA20_8_XOR(&Bin2[i * 8 + 4], &Bout[(r + i) * 4 + 4]) - - i++; - - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - XOR4(&Bin1[i * 8]) - SALSA20_8_XOR(&Bin2[i * 8], &Bout[i * 4]) - } - - /* 3: X <-- H(X \xor B_i) */ - /* 4: Y_i <-- X */ - /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */ - XOR4(&Bin1[i * 8 + 4]) - SALSA20_8_XOR(&Bin2[i * 8 + 4], &Bout[(r + i) * 4 + 4]) - - return _mm_cvtsi128_si32(X0); -} - -#undef ARX -#undef SALSA20_2ROUNDS -#undef SALSA20_8_XOR -#undef XOR4 -#undef XOR4_2 - -/** - * integerify(B, r): - * Return the result of parsing B_{2r-1} as a little-endian integer. - */ -static inline uint32_t -integerify(const void * B, size_t r) -{ - return *(const uint32_t *)((uintptr_t)(B) + (2 * r - 1) * 64); -} - -/** - * smix(B, r, N, V, XY): - * Compute B = SMix_r(B, N). The input B must be 128r bytes in length; - * the temporary storage V must be 128rN bytes in length; the temporary - * storage XY must be 256r + 64 bytes in length. The value N must be a - * power of 2 greater than 1. The arrays B, V, and XY must be aligned to a - * multiple of 64 bytes. - */ -static void -smix(uint8_t * B, size_t r, uint32_t N, void * V, void * XY) -{ - size_t s = 128 * r; - __m128i * X = (__m128i *) V, * Y; - uint32_t * X32 = (uint32_t *) V; - uint32_t i, j; - size_t k; - - /* 1: X <-- B */ - /* 3: V_i <-- X */ - for (k = 0; k < 2 * r; k++) { - for (i = 0; i < 16; i++) { - X32[k * 16 + i] = - le32dec(&B[(k * 16 + (i * 5 % 16)) * 4]); - } - } - - /* 2: for i = 0 to N - 1 do */ - for (i = 1; i < N - 1; i += 2) { - /* 4: X <-- H(X) */ - /* 3: V_i <-- X */ - Y = (__m128i *)((uintptr_t)(V) + i * s); - blockmix_salsa8(X, Y, r); - - /* 4: X <-- H(X) */ - /* 3: V_i <-- X */ - X = (__m128i *)((uintptr_t)(V) + (i + 1) * s); - blockmix_salsa8(Y, X, r); - } - - /* 4: X <-- H(X) */ - /* 3: V_i <-- X */ - Y = (__m128i *)((uintptr_t)(V) + i * s); - blockmix_salsa8(X, Y, r); - - /* 4: X <-- H(X) */ - /* 3: V_i <-- X */ - X = (__m128i *) XY; - blockmix_salsa8(Y, X, r); - - X32 = (uint32_t *) XY; - Y = (__m128i *)((uintptr_t)(XY) + s); - - /* 7: j <-- Integerify(X) mod N */ - j = integerify(X, r) & (N - 1); - - /* 6: for i = 0 to N - 1 do */ - for (i = 0; i < N; i += 2) { - __m128i * V_j = (__m128i *)((uintptr_t)(V) + j * s); - - /* 8: X <-- H(X \xor V_j) */ - /* 7: j <-- Integerify(X) mod N */ - j = blockmix_salsa8_xor(X, V_j, Y, r) & (N - 1); - V_j = (__m128i *)((uintptr_t)(V) + j * s); - - /* 8: X <-- H(X \xor V_j) */ - /* 7: j <-- Integerify(X) mod N */ - j = blockmix_salsa8_xor(Y, V_j, X, r) & (N - 1); - } - - /* 10: B' <-- X */ - for (k = 0; k < 2 * r; k++) { - for (i = 0; i < 16; i++) { - le32enc(&B[(k * 16 + (i * 5 % 16)) * 4], - X32[k * 16 + i]); - } - } -} - -/** - * escrypt_kdf(local, passwd, passwdlen, salt, saltlen, - * N, r, p, buf, buflen): - * Compute scrypt(passwd[0 .. passwdlen - 1], salt[0 .. saltlen - 1], N, r, - * p, buflen) and write the result into buf. The parameters r, p, and buflen - * must satisfy r * p < 2^30 and buflen <= (2^32 - 1) * 32. The parameter N - * must be a power of 2 greater than 1. - * - * Return 0 on success; or -1 on error. - */ -int -escrypt_kdf_sse(escrypt_local_t * local, - const uint8_t * passwd, size_t passwdlen, - const uint8_t * salt, size_t saltlen, - uint64_t N, uint32_t _r, uint32_t _p, - uint8_t * buf, size_t buflen) -{ - size_t B_size, V_size, XY_size, need; - uint8_t * B; - uint32_t * V, * XY; - size_t r = _r, p = _p; - uint32_t i; - - /* Sanity-check parameters. */ -#if SIZE_MAX > UINT32_MAX - if (buflen > (((uint64_t)(1) << 32) - 1) * 32) { - errno = EFBIG; - return -1; - } -#endif - if ((uint64_t)(r) * (uint64_t)(p) >= (1 << 30)) { - errno = EFBIG; - return -1; - } - if (N > UINT32_MAX) { - errno = EFBIG; - return -1; - } - if (((N & (N - 1)) != 0) || (N < 2)) { - errno = EINVAL; - return -1; - } - if (r == 0 || p == 0) { - errno = EINVAL; - return -1; - } - if ((r > SIZE_MAX / 128 / p) || -#if SIZE_MAX / 256 <= UINT32_MAX - (r > SIZE_MAX / 256) || -#endif - (N > SIZE_MAX / 128 / r)) { - errno = ENOMEM; - return -1; - } - - /* Allocate memory. */ - B_size = (size_t)128 * r * p; - V_size = (size_t)128 * r * N; - need = B_size + V_size; - if (need < V_size) { - errno = ENOMEM; - return -1; - } - XY_size = (size_t)256 * r + 64; - need += XY_size; - if (need < XY_size) { - errno = ENOMEM; - return -1; - } - if (local->size < need) { - if (free_region(local)) - return -1; /* LCOV_EXCL_LINE */ - if (!alloc_region(local, need)) - return -1; /* LCOV_EXCL_LINE */ - } - B = (uint8_t *)local->aligned; - V = (uint32_t *)((uint8_t *)B + B_size); - XY = (uint32_t *)((uint8_t *)V + V_size); - - /* 1: (B_0 ... B_{p-1}) <-- PBKDF2(P, S, 1, p * MFLen) */ - PBKDF2_SHA256(passwd, passwdlen, salt, saltlen, 1, B, B_size); - - /* 2: for i = 0 to p - 1 do */ - for (i = 0; i < p; i++) { - /* 3: B_i <-- MF(B_i, N) */ - smix(&B[(size_t)128 * i * r], r, (uint32_t) N, V, XY); - } - - /* 5: DK <-- PBKDF2(P, B, 1, dkLen) */ - PBKDF2_SHA256(passwd, passwdlen, B, B_size, 1, buf, buflen); - - /* Success! */ - return 0; -} -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sysendian.h b/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sysendian.h deleted file mode 100644 index 080aae8..0000000 --- a/Pods/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sysendian.h +++ /dev/null @@ -1,146 +0,0 @@ -#ifndef sysendian_H -#define sysendian_H - -#include - -/* Avoid namespace collisions with BSD . */ -#define be16dec scrypt_be16dec -#define be16enc scrypt_be16enc -#define be32dec scrypt_be32dec -#define be32enc scrypt_be32enc -#define be64dec scrypt_be64dec -#define be64enc scrypt_be64enc -#define le16dec scrypt_le16dec -#define le16enc scrypt_le16enc -#define le32dec scrypt_le32dec -#define le32enc scrypt_le32enc -#define le64dec scrypt_le64dec -#define le64enc scrypt_le64enc - -static inline uint16_t -be16dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint16_t)(p[1]) + ((uint16_t)(p[0]) << 8)); -} - -static inline void -be16enc(void *pp, uint16_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[1] = x & 0xff; - p[0] = (x >> 8) & 0xff; -} - -static inline uint32_t -be32dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint32_t)(p[3]) + ((uint32_t)(p[2]) << 8) + - ((uint32_t)(p[1]) << 16) + ((uint32_t)(p[0]) << 24)); -} - -static inline void -be32enc(void *pp, uint32_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[3] = x & 0xff; - p[2] = (x >> 8) & 0xff; - p[1] = (x >> 16) & 0xff; - p[0] = (x >> 24) & 0xff; -} - -static inline uint64_t -be64dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint64_t)(p[7]) + ((uint64_t)(p[6]) << 8) + - ((uint64_t)(p[5]) << 16) + ((uint64_t)(p[4]) << 24) + - ((uint64_t)(p[3]) << 32) + ((uint64_t)(p[2]) << 40) + - ((uint64_t)(p[1]) << 48) + ((uint64_t)(p[0]) << 56)); -} - -static inline void -be64enc(void *pp, uint64_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[7] = x & 0xff; - p[6] = (x >> 8) & 0xff; - p[5] = (x >> 16) & 0xff; - p[4] = (x >> 24) & 0xff; - p[3] = (x >> 32) & 0xff; - p[2] = (x >> 40) & 0xff; - p[1] = (x >> 48) & 0xff; - p[0] = (x >> 56) & 0xff; -} - -static inline uint16_t -le16dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint16_t)(p[0]) + ((uint16_t)(p[1]) << 8)); -} - -static inline void -le16enc(void *pp, uint16_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[0] = x & 0xff; - p[1] = (x >> 8) & 0xff; -} - -static inline uint32_t -le32dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint32_t)(p[0]) + ((uint32_t)(p[1]) << 8) + - ((uint32_t)(p[2]) << 16) + ((uint32_t)(p[3]) << 24)); -} - -static inline void -le32enc(void *pp, uint32_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[0] = x & 0xff; - p[1] = (x >> 8) & 0xff; - p[2] = (x >> 16) & 0xff; - p[3] = (x >> 24) & 0xff; -} - -static inline uint64_t -le64dec(const void *pp) -{ - const uint8_t *p = (uint8_t const *)pp; - - return ((uint64_t)(p[0]) + ((uint64_t)(p[1]) << 8) + - ((uint64_t)(p[2]) << 16) + ((uint64_t)(p[3]) << 24) + - ((uint64_t)(p[4]) << 32) + ((uint64_t)(p[5]) << 40) + - ((uint64_t)(p[6]) << 48) + ((uint64_t)(p[7]) << 56)); -} - -static inline void -le64enc(void *pp, uint64_t x) -{ - uint8_t * p = (uint8_t *)pp; - - p[0] = x & 0xff; - p[1] = (x >> 8) & 0xff; - p[2] = (x >> 16) & 0xff; - p[3] = (x >> 24) & 0xff; - p[4] = (x >> 32) & 0xff; - p[5] = (x >> 40) & 0xff; - p[6] = (x >> 48) & 0xff; - p[7] = (x >> 56) & 0xff; -} - -#endif /* !_SYSENDIAN_H_ */ diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/crypto_scalarmult.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/crypto_scalarmult.c deleted file mode 100644 index 25d7397..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/crypto_scalarmult.c +++ /dev/null @@ -1,34 +0,0 @@ - -#include "crypto_scalarmult.h" - -size_t -crypto_scalarmult_bytes(void) -{ - return crypto_scalarmult_BYTES; -} - -size_t -crypto_scalarmult_scalarbytes(void) -{ - return crypto_scalarmult_SCALARBYTES; -} - -const char * -crypto_scalarmult_primitive(void) -{ - return crypto_scalarmult_PRIMITIVE; -} - -int -crypto_scalarmult_base(unsigned char *q, const unsigned char *n) -{ - return crypto_scalarmult_curve25519_base(q, n); -} - -int -crypto_scalarmult(unsigned char *q, const unsigned char *n, - const unsigned char *p) -{ - return crypto_scalarmult_curve25519(q, n, p); -} - diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/api.h b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/api.h deleted file mode 100644 index 5c9bba7..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/api.h +++ /dev/null @@ -1,9 +0,0 @@ - -#include "crypto_scalarmult_curve25519.h" - -#define crypto_scalarmult_curve25519_implementation_name \ - crypto_scalarmult_curve25519_donna_c64_implementation_name - -#define crypto_scalarmult crypto_scalarmult_curve25519 -#define crypto_scalarmult_base crypto_scalarmult_curve25519_base - diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/base_curve25519_donna_c64.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/base_curve25519_donna_c64.c deleted file mode 100644 index 58a3f1c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/base_curve25519_donna_c64.c +++ /dev/null @@ -1,13 +0,0 @@ - -#include "api.h" - -#ifdef HAVE_TI_MODE - -static const unsigned char basepoint[32] = {9}; - -int crypto_scalarmult_base(unsigned char *q,const unsigned char *n) -{ - return crypto_scalarmult(q, n, basepoint); -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/smult_curve25519_donna_c64.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/smult_curve25519_donna_c64.c deleted file mode 100644 index d4d0aed..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/donna_c64/smult_curve25519_donna_c64.c +++ /dev/null @@ -1,464 +0,0 @@ -/* Copyright 2008, Google Inc. - * All rights reserved. - * - * Code released into the public domain. - * - * curve25519-donna: Curve25519 elliptic curve, public key function - * - * http://code.google.com/p/curve25519-donna/ - * - * Adam Langley - * Parts optimised by floodyberry - * Derived from public domain C code by Daniel J. Bernstein - * - * More information about curve25519 can be found here - * http://cr.yp.to/ecdh.html - * - * djb's sample implementation of curve25519 is written in a special assembly - * language called qhasm and uses the floating point registers. - * - * This is, almost, a clean room reimplementation from the curve25519 paper. It - * uses many of the tricks described therein. Only the crecip function is taken - * from the sample implementation. - */ - -#include -#include -#include "api.h" - -#ifdef HAVE_TI_MODE - -typedef uint8_t u8; -typedef uint64_t limb; -typedef limb felem[5]; -// This is a special gcc mode for 128-bit integers. It's implemented on 64-bit -// platforms only as far as I know. -typedef unsigned uint128_t __attribute__((mode(TI))); - -#undef force_inline -#define force_inline __attribute__((always_inline)) - -/* Sum two numbers: output += in */ -static inline void force_inline -fsum(limb *output, const limb *in) { - output[0] += in[0]; - output[1] += in[1]; - output[2] += in[2]; - output[3] += in[3]; - output[4] += in[4]; -} - -/* Find the difference of two numbers: output = in - output - * (note the order of the arguments!) - * - * Assumes that out[i] < 2**52 - * On return, out[i] < 2**55 - */ -static inline void force_inline -fdifference_backwards(felem out, const felem in) { - /* 152 is 19 << 3 */ - static const limb two54m152 = (((limb)1) << 54) - 152; - static const limb two54m8 = (((limb)1) << 54) - 8; - - out[0] = in[0] + two54m152 - out[0]; - out[1] = in[1] + two54m8 - out[1]; - out[2] = in[2] + two54m8 - out[2]; - out[3] = in[3] + two54m8 - out[3]; - out[4] = in[4] + two54m8 - out[4]; -} - -/* Multiply a number by a scalar: output = in * scalar */ -static inline void force_inline -fscalar_product(felem output, const felem in, const limb scalar) { - uint128_t a; - - a = ((uint128_t) in[0]) * scalar; - output[0] = ((limb)a) & 0x7ffffffffffff; - - a = ((uint128_t) in[1]) * scalar + ((limb) (a >> 51)); - output[1] = ((limb)a) & 0x7ffffffffffff; - - a = ((uint128_t) in[2]) * scalar + ((limb) (a >> 51)); - output[2] = ((limb)a) & 0x7ffffffffffff; - - a = ((uint128_t) in[3]) * scalar + ((limb) (a >> 51)); - output[3] = ((limb)a) & 0x7ffffffffffff; - - a = ((uint128_t) in[4]) * scalar + ((limb) (a >> 51)); - output[4] = ((limb)a) & 0x7ffffffffffff; - - output[0] += (a >> 51) * 19; -} - -/* Multiply two numbers: output = in2 * in - * - * output must be distinct to both inputs. The inputs are reduced coefficient - * form, the output is not. - * - * Assumes that in[i] < 2**55 and likewise for in2. - * On return, output[i] < 2**52 - */ -static inline void force_inline -fmul(felem output, const felem in2, const felem in) { - uint128_t t[5]; - limb r0,r1,r2,r3,r4,s0,s1,s2,s3,s4,c; - - r0 = in[0]; - r1 = in[1]; - r2 = in[2]; - r3 = in[3]; - r4 = in[4]; - - s0 = in2[0]; - s1 = in2[1]; - s2 = in2[2]; - s3 = in2[3]; - s4 = in2[4]; - - t[0] = ((uint128_t) r0) * s0; - t[1] = ((uint128_t) r0) * s1 + ((uint128_t) r1) * s0; - t[2] = ((uint128_t) r0) * s2 + ((uint128_t) r2) * s0 + ((uint128_t) r1) * s1; - t[3] = ((uint128_t) r0) * s3 + ((uint128_t) r3) * s0 + ((uint128_t) r1) * s2 + ((uint128_t) r2) * s1; - t[4] = ((uint128_t) r0) * s4 + ((uint128_t) r4) * s0 + ((uint128_t) r3) * s1 + ((uint128_t) r1) * s3 + ((uint128_t) r2) * s2; - - r4 *= 19; - r1 *= 19; - r2 *= 19; - r3 *= 19; - - t[0] += ((uint128_t) r4) * s1 + ((uint128_t) r1) * s4 + ((uint128_t) r2) * s3 + ((uint128_t) r3) * s2; - t[1] += ((uint128_t) r4) * s2 + ((uint128_t) r2) * s4 + ((uint128_t) r3) * s3; - t[2] += ((uint128_t) r4) * s3 + ((uint128_t) r3) * s4; - t[3] += ((uint128_t) r4) * s4; - - r0 = (limb)t[0] & 0x7ffffffffffff; c = (limb)(t[0] >> 51); - t[1] += c; r1 = (limb)t[1] & 0x7ffffffffffff; c = (limb)(t[1] >> 51); - t[2] += c; r2 = (limb)t[2] & 0x7ffffffffffff; c = (limb)(t[2] >> 51); - t[3] += c; r3 = (limb)t[3] & 0x7ffffffffffff; c = (limb)(t[3] >> 51); - t[4] += c; r4 = (limb)t[4] & 0x7ffffffffffff; c = (limb)(t[4] >> 51); - r0 += c * 19; c = r0 >> 51; r0 = r0 & 0x7ffffffffffff; - r1 += c; c = r1 >> 51; r1 = r1 & 0x7ffffffffffff; - r2 += c; - - output[0] = r0; - output[1] = r1; - output[2] = r2; - output[3] = r3; - output[4] = r4; -} - -static inline void force_inline -fsquare_times(felem output, const felem in, limb count) { - uint128_t t[5]; - limb r0,r1,r2,r3,r4,c; - limb d0,d1,d2,d4,d419; - - r0 = in[0]; - r1 = in[1]; - r2 = in[2]; - r3 = in[3]; - r4 = in[4]; - - do { - d0 = r0 * 2; - d1 = r1 * 2; - d2 = r2 * 2 * 19; - d419 = r4 * 19; - d4 = d419 * 2; - - t[0] = ((uint128_t) r0) * r0 + ((uint128_t) d4) * r1 + (((uint128_t) d2) * (r3 )); - t[1] = ((uint128_t) d0) * r1 + ((uint128_t) d4) * r2 + (((uint128_t) r3) * (r3 * 19)); - t[2] = ((uint128_t) d0) * r2 + ((uint128_t) r1) * r1 + (((uint128_t) d4) * (r3 )); - t[3] = ((uint128_t) d0) * r3 + ((uint128_t) d1) * r2 + (((uint128_t) r4) * (d419 )); - t[4] = ((uint128_t) d0) * r4 + ((uint128_t) d1) * r3 + (((uint128_t) r2) * (r2 )); - - r0 = (limb)t[0] & 0x7ffffffffffff; c = (limb)(t[0] >> 51); - t[1] += c; r1 = (limb)t[1] & 0x7ffffffffffff; c = (limb)(t[1] >> 51); - t[2] += c; r2 = (limb)t[2] & 0x7ffffffffffff; c = (limb)(t[2] >> 51); - t[3] += c; r3 = (limb)t[3] & 0x7ffffffffffff; c = (limb)(t[3] >> 51); - t[4] += c; r4 = (limb)t[4] & 0x7ffffffffffff; c = (limb)(t[4] >> 51); - r0 += c * 19; c = r0 >> 51; r0 = r0 & 0x7ffffffffffff; - r1 += c; c = r1 >> 51; r1 = r1 & 0x7ffffffffffff; - r2 += c; - } while(--count); - - output[0] = r0; - output[1] = r1; - output[2] = r2; - output[3] = r3; - output[4] = r4; -} - -#ifdef NATIVE_LITTLE_ENDIAN -static inline limb force_inline -load_limb(const u8 *in) { - limb out; - memcpy(&out, in, sizeof (limb)); - return out; -} -static inline void force_inline -store_limb(u8 *out, limb in) { - memcpy(out, &in, sizeof (limb)); -} -#else -static inline limb force_inline -load_limb(const u8 *in) { - return - ((limb)in[0]) | - (((limb)in[1]) << 8) | - (((limb)in[2]) << 16) | - (((limb)in[3]) << 24) | - (((limb)in[4]) << 32) | - (((limb)in[5]) << 40) | - (((limb)in[6]) << 48) | - (((limb)in[7]) << 56); -} - -static inline void force_inline -store_limb(u8 *out, limb in) { - out[0] = in & 0xff; - out[1] = (in >> 8) & 0xff; - out[2] = (in >> 16) & 0xff; - out[3] = (in >> 24) & 0xff; - out[4] = (in >> 32) & 0xff; - out[5] = (in >> 40) & 0xff; - out[6] = (in >> 48) & 0xff; - out[7] = (in >> 56) & 0xff; -} -#endif - -/* Take a little-endian, 32-byte number and expand it into polynomial form */ -static void -fexpand(limb *output, const u8 *in) { - output[0] = load_limb(in) & 0x7ffffffffffff; - output[1] = (load_limb(in+6) >> 3) & 0x7ffffffffffff; - output[2] = (load_limb(in+12) >> 6) & 0x7ffffffffffff; - output[3] = (load_limb(in+19) >> 1) & 0x7ffffffffffff; - output[4] = (load_limb(in+24) >> 12) & 0x7ffffffffffff; -} - -/* Take a fully reduced polynomial form number and contract it into a - * little-endian, 32-byte array - */ -static void -fcontract(u8 *output, const felem input) { - uint128_t t[5]; - - t[0] = input[0]; - t[1] = input[1]; - t[2] = input[2]; - t[3] = input[3]; - t[4] = input[4]; - - t[1] += t[0] >> 51; t[0] &= 0x7ffffffffffff; - t[2] += t[1] >> 51; t[1] &= 0x7ffffffffffff; - t[3] += t[2] >> 51; t[2] &= 0x7ffffffffffff; - t[4] += t[3] >> 51; t[3] &= 0x7ffffffffffff; - t[0] += 19 * (t[4] >> 51); t[4] &= 0x7ffffffffffff; - - t[1] += t[0] >> 51; t[0] &= 0x7ffffffffffff; - t[2] += t[1] >> 51; t[1] &= 0x7ffffffffffff; - t[3] += t[2] >> 51; t[2] &= 0x7ffffffffffff; - t[4] += t[3] >> 51; t[3] &= 0x7ffffffffffff; - t[0] += 19 * (t[4] >> 51); t[4] &= 0x7ffffffffffff; - - /* now t is between 0 and 2^255-1, properly carried. */ - /* case 1: between 0 and 2^255-20. case 2: between 2^255-19 and 2^255-1. */ - - t[0] += 19; - - t[1] += t[0] >> 51; t[0] &= 0x7ffffffffffff; - t[2] += t[1] >> 51; t[1] &= 0x7ffffffffffff; - t[3] += t[2] >> 51; t[2] &= 0x7ffffffffffff; - t[4] += t[3] >> 51; t[3] &= 0x7ffffffffffff; - t[0] += 19 * (t[4] >> 51); t[4] &= 0x7ffffffffffff; - - /* now between 19 and 2^255-1 in both cases, and offset by 19. */ - - t[0] += 0x8000000000000 - 19; - t[1] += 0x8000000000000 - 1; - t[2] += 0x8000000000000 - 1; - t[3] += 0x8000000000000 - 1; - t[4] += 0x8000000000000 - 1; - - /* now between 2^255 and 2^256-20, and offset by 2^255. */ - - t[1] += t[0] >> 51; t[0] &= 0x7ffffffffffff; - t[2] += t[1] >> 51; t[1] &= 0x7ffffffffffff; - t[3] += t[2] >> 51; t[2] &= 0x7ffffffffffff; - t[4] += t[3] >> 51; t[3] &= 0x7ffffffffffff; - t[4] &= 0x7ffffffffffff; - - store_limb(output, t[0] | (t[1] << 51)); - store_limb(output + 8, (t[1] >> 13) | (t[2] << 38)); - store_limb(output + 16, (t[2] >> 26) | (t[3] << 25)); - store_limb(output + 24, (t[3] >> 39) | (t[4] << 12)); -} - -/* Input: Q, Q', Q-Q' - * Output: 2Q, Q+Q' - * - * x2 z3: long form - * x3 z3: long form - * x z: short form, destroyed - * xprime zprime: short form, destroyed - * qmqp: short form, preserved - */ -static void -fmonty(limb *x2, limb *z2, /* output 2Q */ - limb *x3, limb *z3, /* output Q + Q' */ - limb *x, limb *z, /* input Q */ - limb *xprime, limb *zprime, /* input Q' */ - const limb *qmqp /* input Q - Q' */) { - limb origx[5], origxprime[5], zzz[5], xx[5], zz[5], xxprime[5], - zzprime[5], zzzprime[5]; - - memcpy(origx, x, 5 * sizeof(limb)); - fsum(x, z); - fdifference_backwards(z, origx); // does x - z - - memcpy(origxprime, xprime, sizeof(limb) * 5); - fsum(xprime, zprime); - fdifference_backwards(zprime, origxprime); - fmul(xxprime, xprime, z); - fmul(zzprime, x, zprime); - memcpy(origxprime, xxprime, sizeof(limb) * 5); - fsum(xxprime, zzprime); - fdifference_backwards(zzprime, origxprime); - fsquare_times(x3, xxprime, 1); - fsquare_times(zzzprime, zzprime, 1); - fmul(z3, zzzprime, qmqp); - - fsquare_times(xx, x, 1); - fsquare_times(zz, z, 1); - fmul(x2, xx, zz); - fdifference_backwards(zz, xx); // does zz = xx - zz - fscalar_product(zzz, zz, 121665); - fsum(zzz, xx); - fmul(z2, zz, zzz); -} - -// ----------------------------------------------------------------------------- -// Maybe swap the contents of two limb arrays (@a and @b), each @len elements -// long. Perform the swap iff @swap is non-zero. -// -// This function performs the swap without leaking any side-channel -// information. -// ----------------------------------------------------------------------------- -static void -swap_conditional(limb a[5], limb b[5], limb iswap) { - unsigned i; - const limb swap = -iswap; - - for (i = 0; i < 5; ++i) { - const limb x = swap & (a[i] ^ b[i]); - a[i] ^= x; - b[i] ^= x; - } -} - -/* Calculates nQ where Q is the x-coordinate of a point on the curve - * - * resultx/resultz: the x coordinate of the resulting curve point (short form) - * n: a little endian, 32-byte number - * q: a point of the curve (short form) - */ -static void -cmult(limb *resultx, limb *resultz, const u8 *n, const limb *q) { - limb a[5] = {0}, b[5] = {1}, c[5] = {1}, d[5] = {0}; - limb *nqpqx = a, *nqpqz = b, *nqx = c, *nqz = d, *t; - limb e[5] = {0}, f[5] = {1}, g[5] = {0}, h[5] = {1}; - limb *nqpqx2 = e, *nqpqz2 = f, *nqx2 = g, *nqz2 = h; - - unsigned i, j; - - memcpy(nqpqx, q, sizeof(limb) * 5); - - for (i = 0; i < 32; ++i) { - u8 byte = n[31 - i]; - for (j = 0; j < 8; ++j) { - const limb bit = byte >> 7; - - swap_conditional(nqx, nqpqx, bit); - swap_conditional(nqz, nqpqz, bit); - fmonty(nqx2, nqz2, - nqpqx2, nqpqz2, - nqx, nqz, - nqpqx, nqpqz, - q); - swap_conditional(nqx2, nqpqx2, bit); - swap_conditional(nqz2, nqpqz2, bit); - - t = nqx; - nqx = nqx2; - nqx2 = t; - t = nqz; - nqz = nqz2; - nqz2 = t; - t = nqpqx; - nqpqx = nqpqx2; - nqpqx2 = t; - t = nqpqz; - nqpqz = nqpqz2; - nqpqz2 = t; - - byte <<= 1; - } - } - - memcpy(resultx, nqx, sizeof(limb) * 5); - memcpy(resultz, nqz, sizeof(limb) * 5); -} - - -// ----------------------------------------------------------------------------- -// Shamelessly copied from djb's code, tightened a little -// ----------------------------------------------------------------------------- -static void -crecip(felem out, const felem z) { - felem a,t0,b,c; - - /* 2 */ fsquare_times(a, z, 1); // a = 2 - /* 8 */ fsquare_times(t0, a, 2); - /* 9 */ fmul(b, t0, z); // b = 9 - /* 11 */ fmul(a, b, a); // a = 11 - /* 22 */ fsquare_times(t0, a, 1); - /* 2^5 - 2^0 = 31 */ fmul(b, t0, b); - /* 2^10 - 2^5 */ fsquare_times(t0, b, 5); - /* 2^10 - 2^0 */ fmul(b, t0, b); - /* 2^20 - 2^10 */ fsquare_times(t0, b, 10); - /* 2^20 - 2^0 */ fmul(c, t0, b); - /* 2^40 - 2^20 */ fsquare_times(t0, c, 20); - /* 2^40 - 2^0 */ fmul(t0, t0, c); - /* 2^50 - 2^10 */ fsquare_times(t0, t0, 10); - /* 2^50 - 2^0 */ fmul(b, t0, b); - /* 2^100 - 2^50 */ fsquare_times(t0, b, 50); - /* 2^100 - 2^0 */ fmul(c, t0, b); - /* 2^200 - 2^100 */ fsquare_times(t0, c, 100); - /* 2^200 - 2^0 */ fmul(t0, t0, c); - /* 2^250 - 2^50 */ fsquare_times(t0, t0, 50); - /* 2^250 - 2^0 */ fmul(t0, t0, b); - /* 2^255 - 2^5 */ fsquare_times(t0, t0, 5); - /* 2^255 - 21 */ fmul(out, t0, a); -} - -int -crypto_scalarmult(u8 *mypublic, const u8 *secret, const u8 *basepoint) { - limb bp[5], x[5], z[5], zmone[5]; - uint8_t e[32]; - int i; - - for (i = 0;i < 32;++i) e[i] = secret[i]; - e[0] &= 248; - e[31] &= 127; - e[31] |= 64; - - fexpand(bp, basepoint); - cmult(x, z, e, bp); - crecip(zmone, z); - fmul(z, x, zmone); - fcontract(mypublic, z); - return 0; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/api.h b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/api.h deleted file mode 100644 index 40a4206..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/api.h +++ /dev/null @@ -1,5 +0,0 @@ - -#include "crypto_scalarmult_curve25519.h" - -#define crypto_scalarmult crypto_scalarmult_curve25519 -#define crypto_scalarmult_base crypto_scalarmult_curve25519_base diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/base_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/base_curve25519_ref10.c deleted file mode 100644 index ce123dd..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/base_curve25519_ref10.c +++ /dev/null @@ -1,14 +0,0 @@ - -#include "api.h" -#include "crypto_scalarmult.h" - -#ifndef HAVE_TI_MODE - -static const unsigned char basepoint[32] = {9}; - -int crypto_scalarmult_base(unsigned char *q,const unsigned char *n) -{ - return crypto_scalarmult(q,n,basepoint); -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe.h b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe.h deleted file mode 100644 index 0567120..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe.h +++ /dev/null @@ -1,44 +0,0 @@ -#ifndef FE_H -#define FE_H - -#include "crypto_int32.h" - -typedef crypto_int32 fe[10]; - -/* -fe means field element. -Here the field is \Z/(2^255-19). -An element t, entries t[0]...t[9], represents the integer -t[0]+2^26 t[1]+2^51 t[2]+2^77 t[3]+2^102 t[4]+...+2^230 t[9]. -Bounds on each t[i] vary depending on context. -*/ - -#define fe_frombytes crypto_scalarmult_curve25519_ref10_fe_frombytes -#define fe_tobytes crypto_scalarmult_curve25519_ref10_fe_tobytes -#define fe_copy crypto_scalarmult_curve25519_ref10_fe_copy -#define fe_0 crypto_scalarmult_curve25519_ref10_fe_0 -#define fe_1 crypto_scalarmult_curve25519_ref10_fe_1 -#define fe_cswap crypto_scalarmult_curve25519_ref10_fe_cswap -#define fe_add crypto_scalarmult_curve25519_ref10_fe_add -#define fe_sub crypto_scalarmult_curve25519_ref10_fe_sub -#define fe_mul crypto_scalarmult_curve25519_ref10_fe_mul -#define fe_sq crypto_scalarmult_curve25519_ref10_fe_sq -#define fe_mul121666 crypto_scalarmult_curve25519_ref10_fe_mul121666 -#define fe_invert crypto_scalarmult_curve25519_ref10_fe_invert - -extern void fe_frombytes(fe,const unsigned char *); -extern void fe_tobytes(unsigned char *,fe); - -extern void fe_copy(fe,fe); -extern void fe_0(fe); -extern void fe_1(fe); -extern void fe_cswap(fe,fe,unsigned int); - -extern void fe_add(fe,fe,fe); -extern void fe_sub(fe,fe,fe); -extern void fe_mul(fe,fe,fe); -extern void fe_sq(fe,fe); -extern void fe_mul121666(fe,fe); -extern void fe_invert(fe,fe); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_0_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_0_curve25519_ref10.c deleted file mode 100644 index f351eea..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_0_curve25519_ref10.c +++ /dev/null @@ -1,23 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -h = 0 -*/ - -void fe_0(fe h) -{ - h[0] = 0; - h[1] = 0; - h[2] = 0; - h[3] = 0; - h[4] = 0; - h[5] = 0; - h[6] = 0; - h[7] = 0; - h[8] = 0; - h[9] = 0; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_1_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_1_curve25519_ref10.c deleted file mode 100644 index 3ef13aa..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_1_curve25519_ref10.c +++ /dev/null @@ -1,23 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -h = 1 -*/ - -void fe_1(fe h) -{ - h[0] = 1; - h[1] = 0; - h[2] = 0; - h[3] = 0; - h[4] = 0; - h[5] = 0; - h[6] = 0; - h[7] = 0; - h[8] = 0; - h[9] = 0; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_add_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_add_curve25519_ref10.c deleted file mode 100644 index 488805b..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_add_curve25519_ref10.c +++ /dev/null @@ -1,61 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -h = f + g -Can overlap h with f or g. - -Preconditions: - |f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - |g| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - -Postconditions: - |h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. -*/ - -void fe_add(fe h,fe f,fe g) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 h0 = f0 + g0; - crypto_int32 h1 = f1 + g1; - crypto_int32 h2 = f2 + g2; - crypto_int32 h3 = f3 + g3; - crypto_int32 h4 = f4 + g4; - crypto_int32 h5 = f5 + g5; - crypto_int32 h6 = f6 + g6; - crypto_int32 h7 = f7 + g7; - crypto_int32 h8 = f8 + g8; - crypto_int32 h9 = f9 + g9; - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_copy_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_copy_curve25519_ref10.c deleted file mode 100644 index 2f6a5f5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_copy_curve25519_ref10.c +++ /dev/null @@ -1,33 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -h = f -*/ - -void fe_copy(fe h,fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - h[0] = f0; - h[1] = f1; - h[2] = f2; - h[3] = f3; - h[4] = f4; - h[5] = f5; - h[6] = f6; - h[7] = f7; - h[8] = f8; - h[9] = f9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_cswap_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_cswap_curve25519_ref10.c deleted file mode 100644 index f460674..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_cswap_curve25519_ref10.c +++ /dev/null @@ -1,77 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -Replace (f,g) with (g,f) if b == 1; -replace (f,g) with (f,g) if b == 0. - -Preconditions: b in {0,1}. -*/ - -void fe_cswap(fe f,fe g,unsigned int b) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 x0 = f0 ^ g0; - crypto_int32 x1 = f1 ^ g1; - crypto_int32 x2 = f2 ^ g2; - crypto_int32 x3 = f3 ^ g3; - crypto_int32 x4 = f4 ^ g4; - crypto_int32 x5 = f5 ^ g5; - crypto_int32 x6 = f6 ^ g6; - crypto_int32 x7 = f7 ^ g7; - crypto_int32 x8 = f8 ^ g8; - crypto_int32 x9 = f9 ^ g9; - b = -b; - x0 &= b; - x1 &= b; - x2 &= b; - x3 &= b; - x4 &= b; - x5 &= b; - x6 &= b; - x7 &= b; - x8 &= b; - x9 &= b; - f[0] = f0 ^ x0; - f[1] = f1 ^ x1; - f[2] = f2 ^ x2; - f[3] = f3 ^ x3; - f[4] = f4 ^ x4; - f[5] = f5 ^ x5; - f[6] = f6 ^ x6; - f[7] = f7 ^ x7; - f[8] = f8 ^ x8; - f[9] = f9 ^ x9; - g[0] = g0 ^ x0; - g[1] = g1 ^ x1; - g[2] = g2 ^ x2; - g[3] = g3 ^ x3; - g[4] = g4 ^ x4; - g[5] = g5 ^ x5; - g[6] = g6 ^ x6; - g[7] = g7 ^ x7; - g[8] = g8 ^ x8; - g[9] = g9 ^ x9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_frombytes_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_frombytes_curve25519_ref10.c deleted file mode 100644 index f5d92ef..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_frombytes_curve25519_ref10.c +++ /dev/null @@ -1,73 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" -#include "crypto_uint64.h" - -#ifndef HAVE_TI_MODE - -static crypto_uint64 load_3(const unsigned char *in) -{ - crypto_uint64 result; - result = (crypto_uint64) in[0]; - result |= ((crypto_uint64) in[1]) << 8; - result |= ((crypto_uint64) in[2]) << 16; - return result; -} - -static crypto_uint64 load_4(const unsigned char *in) -{ - crypto_uint64 result; - result = (crypto_uint64) in[0]; - result |= ((crypto_uint64) in[1]) << 8; - result |= ((crypto_uint64) in[2]) << 16; - result |= ((crypto_uint64) in[3]) << 24; - return result; -} - -void fe_frombytes(fe h,const unsigned char *s) -{ - crypto_int64 h0 = load_4(s); - crypto_int64 h1 = load_3(s + 4) << 6; - crypto_int64 h2 = load_3(s + 7) << 5; - crypto_int64 h3 = load_3(s + 10) << 3; - crypto_int64 h4 = load_3(s + 13) << 2; - crypto_int64 h5 = load_4(s + 16); - crypto_int64 h6 = load_3(s + 20) << 7; - crypto_int64 h7 = load_3(s + 23) << 5; - crypto_int64 h8 = load_3(s + 26) << 4; - crypto_int64 h9 = (load_3(s + 29) & 8388607) << 2; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_invert_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_invert_curve25519_ref10.c deleted file mode 100644 index 764bf69..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_invert_curve25519_ref10.c +++ /dev/null @@ -1,18 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -void fe_invert(fe out,fe z) -{ - fe t0; - fe t1; - fe t2; - fe t3; - int i; - -#include "pow225521.h" - - return; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul121666_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul121666_curve25519_ref10.c deleted file mode 100644 index 7b222e1..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul121666_curve25519_ref10.c +++ /dev/null @@ -1,74 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" - -#ifndef HAVE_TI_MODE - -/* -h = f * 121666 -Can overlap h with f. - -Preconditions: - |f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. - -Postconditions: - |h| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. -*/ - -void fe_mul121666(fe h,fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int64 h0 = f0 * (crypto_int64) 121666; - crypto_int64 h1 = f1 * (crypto_int64) 121666; - crypto_int64 h2 = f2 * (crypto_int64) 121666; - crypto_int64 h3 = f3 * (crypto_int64) 121666; - crypto_int64 h4 = f4 * (crypto_int64) 121666; - crypto_int64 h5 = f5 * (crypto_int64) 121666; - crypto_int64 h6 = f6 * (crypto_int64) 121666; - crypto_int64 h7 = f7 * (crypto_int64) 121666; - crypto_int64 h8 = f8 * (crypto_int64) 121666; - crypto_int64 h9 = f9 * (crypto_int64) 121666; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul_curve25519_ref10.c deleted file mode 100644 index 96772b9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_mul_curve25519_ref10.c +++ /dev/null @@ -1,257 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" - -#ifndef HAVE_TI_MODE - -/* -h = f * g -Can overlap h with f or g. - -Preconditions: - |f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. - |g| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. - -Postconditions: - |h| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. -*/ - -/* -Notes on implementation strategy: - -Using schoolbook multiplication. -Karatsuba would save a little in some cost models. - -Most multiplications by 2 and 19 are 32-bit precomputations; -cheaper than 64-bit postcomputations. - -There is one remaining multiplication by 19 in the carry chain; -one *19 precomputation can be merged into this, -but the resulting data flow is considerably less clean. - -There are 12 carries below. -10 of them are 2-way parallelizable and vectorizable. -Can get away with 11 carries, but then data flow is much deeper. - -With tighter constraints on inputs can squeeze carries into int32. -*/ - -void fe_mul(fe h,fe f,fe g) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 g1_19 = 19 * g1; /* 1.4*2^29 */ - crypto_int32 g2_19 = 19 * g2; /* 1.4*2^30; still ok */ - crypto_int32 g3_19 = 19 * g3; - crypto_int32 g4_19 = 19 * g4; - crypto_int32 g5_19 = 19 * g5; - crypto_int32 g6_19 = 19 * g6; - crypto_int32 g7_19 = 19 * g7; - crypto_int32 g8_19 = 19 * g8; - crypto_int32 g9_19 = 19 * g9; - crypto_int32 f1_2 = 2 * f1; - crypto_int32 f3_2 = 2 * f3; - crypto_int32 f5_2 = 2 * f5; - crypto_int32 f7_2 = 2 * f7; - crypto_int32 f9_2 = 2 * f9; - crypto_int64 f0g0 = f0 * (crypto_int64) g0; - crypto_int64 f0g1 = f0 * (crypto_int64) g1; - crypto_int64 f0g2 = f0 * (crypto_int64) g2; - crypto_int64 f0g3 = f0 * (crypto_int64) g3; - crypto_int64 f0g4 = f0 * (crypto_int64) g4; - crypto_int64 f0g5 = f0 * (crypto_int64) g5; - crypto_int64 f0g6 = f0 * (crypto_int64) g6; - crypto_int64 f0g7 = f0 * (crypto_int64) g7; - crypto_int64 f0g8 = f0 * (crypto_int64) g8; - crypto_int64 f0g9 = f0 * (crypto_int64) g9; - crypto_int64 f1g0 = f1 * (crypto_int64) g0; - crypto_int64 f1g1_2 = f1_2 * (crypto_int64) g1; - crypto_int64 f1g2 = f1 * (crypto_int64) g2; - crypto_int64 f1g3_2 = f1_2 * (crypto_int64) g3; - crypto_int64 f1g4 = f1 * (crypto_int64) g4; - crypto_int64 f1g5_2 = f1_2 * (crypto_int64) g5; - crypto_int64 f1g6 = f1 * (crypto_int64) g6; - crypto_int64 f1g7_2 = f1_2 * (crypto_int64) g7; - crypto_int64 f1g8 = f1 * (crypto_int64) g8; - crypto_int64 f1g9_38 = f1_2 * (crypto_int64) g9_19; - crypto_int64 f2g0 = f2 * (crypto_int64) g0; - crypto_int64 f2g1 = f2 * (crypto_int64) g1; - crypto_int64 f2g2 = f2 * (crypto_int64) g2; - crypto_int64 f2g3 = f2 * (crypto_int64) g3; - crypto_int64 f2g4 = f2 * (crypto_int64) g4; - crypto_int64 f2g5 = f2 * (crypto_int64) g5; - crypto_int64 f2g6 = f2 * (crypto_int64) g6; - crypto_int64 f2g7 = f2 * (crypto_int64) g7; - crypto_int64 f2g8_19 = f2 * (crypto_int64) g8_19; - crypto_int64 f2g9_19 = f2 * (crypto_int64) g9_19; - crypto_int64 f3g0 = f3 * (crypto_int64) g0; - crypto_int64 f3g1_2 = f3_2 * (crypto_int64) g1; - crypto_int64 f3g2 = f3 * (crypto_int64) g2; - crypto_int64 f3g3_2 = f3_2 * (crypto_int64) g3; - crypto_int64 f3g4 = f3 * (crypto_int64) g4; - crypto_int64 f3g5_2 = f3_2 * (crypto_int64) g5; - crypto_int64 f3g6 = f3 * (crypto_int64) g6; - crypto_int64 f3g7_38 = f3_2 * (crypto_int64) g7_19; - crypto_int64 f3g8_19 = f3 * (crypto_int64) g8_19; - crypto_int64 f3g9_38 = f3_2 * (crypto_int64) g9_19; - crypto_int64 f4g0 = f4 * (crypto_int64) g0; - crypto_int64 f4g1 = f4 * (crypto_int64) g1; - crypto_int64 f4g2 = f4 * (crypto_int64) g2; - crypto_int64 f4g3 = f4 * (crypto_int64) g3; - crypto_int64 f4g4 = f4 * (crypto_int64) g4; - crypto_int64 f4g5 = f4 * (crypto_int64) g5; - crypto_int64 f4g6_19 = f4 * (crypto_int64) g6_19; - crypto_int64 f4g7_19 = f4 * (crypto_int64) g7_19; - crypto_int64 f4g8_19 = f4 * (crypto_int64) g8_19; - crypto_int64 f4g9_19 = f4 * (crypto_int64) g9_19; - crypto_int64 f5g0 = f5 * (crypto_int64) g0; - crypto_int64 f5g1_2 = f5_2 * (crypto_int64) g1; - crypto_int64 f5g2 = f5 * (crypto_int64) g2; - crypto_int64 f5g3_2 = f5_2 * (crypto_int64) g3; - crypto_int64 f5g4 = f5 * (crypto_int64) g4; - crypto_int64 f5g5_38 = f5_2 * (crypto_int64) g5_19; - crypto_int64 f5g6_19 = f5 * (crypto_int64) g6_19; - crypto_int64 f5g7_38 = f5_2 * (crypto_int64) g7_19; - crypto_int64 f5g8_19 = f5 * (crypto_int64) g8_19; - crypto_int64 f5g9_38 = f5_2 * (crypto_int64) g9_19; - crypto_int64 f6g0 = f6 * (crypto_int64) g0; - crypto_int64 f6g1 = f6 * (crypto_int64) g1; - crypto_int64 f6g2 = f6 * (crypto_int64) g2; - crypto_int64 f6g3 = f6 * (crypto_int64) g3; - crypto_int64 f6g4_19 = f6 * (crypto_int64) g4_19; - crypto_int64 f6g5_19 = f6 * (crypto_int64) g5_19; - crypto_int64 f6g6_19 = f6 * (crypto_int64) g6_19; - crypto_int64 f6g7_19 = f6 * (crypto_int64) g7_19; - crypto_int64 f6g8_19 = f6 * (crypto_int64) g8_19; - crypto_int64 f6g9_19 = f6 * (crypto_int64) g9_19; - crypto_int64 f7g0 = f7 * (crypto_int64) g0; - crypto_int64 f7g1_2 = f7_2 * (crypto_int64) g1; - crypto_int64 f7g2 = f7 * (crypto_int64) g2; - crypto_int64 f7g3_38 = f7_2 * (crypto_int64) g3_19; - crypto_int64 f7g4_19 = f7 * (crypto_int64) g4_19; - crypto_int64 f7g5_38 = f7_2 * (crypto_int64) g5_19; - crypto_int64 f7g6_19 = f7 * (crypto_int64) g6_19; - crypto_int64 f7g7_38 = f7_2 * (crypto_int64) g7_19; - crypto_int64 f7g8_19 = f7 * (crypto_int64) g8_19; - crypto_int64 f7g9_38 = f7_2 * (crypto_int64) g9_19; - crypto_int64 f8g0 = f8 * (crypto_int64) g0; - crypto_int64 f8g1 = f8 * (crypto_int64) g1; - crypto_int64 f8g2_19 = f8 * (crypto_int64) g2_19; - crypto_int64 f8g3_19 = f8 * (crypto_int64) g3_19; - crypto_int64 f8g4_19 = f8 * (crypto_int64) g4_19; - crypto_int64 f8g5_19 = f8 * (crypto_int64) g5_19; - crypto_int64 f8g6_19 = f8 * (crypto_int64) g6_19; - crypto_int64 f8g7_19 = f8 * (crypto_int64) g7_19; - crypto_int64 f8g8_19 = f8 * (crypto_int64) g8_19; - crypto_int64 f8g9_19 = f8 * (crypto_int64) g9_19; - crypto_int64 f9g0 = f9 * (crypto_int64) g0; - crypto_int64 f9g1_38 = f9_2 * (crypto_int64) g1_19; - crypto_int64 f9g2_19 = f9 * (crypto_int64) g2_19; - crypto_int64 f9g3_38 = f9_2 * (crypto_int64) g3_19; - crypto_int64 f9g4_19 = f9 * (crypto_int64) g4_19; - crypto_int64 f9g5_38 = f9_2 * (crypto_int64) g5_19; - crypto_int64 f9g6_19 = f9 * (crypto_int64) g6_19; - crypto_int64 f9g7_38 = f9_2 * (crypto_int64) g7_19; - crypto_int64 f9g8_19 = f9 * (crypto_int64) g8_19; - crypto_int64 f9g9_38 = f9_2 * (crypto_int64) g9_19; - crypto_int64 h0 = f0g0+f1g9_38+f2g8_19+f3g7_38+f4g6_19+f5g5_38+f6g4_19+f7g3_38+f8g2_19+f9g1_38; - crypto_int64 h1 = f0g1+f1g0 +f2g9_19+f3g8_19+f4g7_19+f5g6_19+f6g5_19+f7g4_19+f8g3_19+f9g2_19; - crypto_int64 h2 = f0g2+f1g1_2 +f2g0 +f3g9_38+f4g8_19+f5g7_38+f6g6_19+f7g5_38+f8g4_19+f9g3_38; - crypto_int64 h3 = f0g3+f1g2 +f2g1 +f3g0 +f4g9_19+f5g8_19+f6g7_19+f7g6_19+f8g5_19+f9g4_19; - crypto_int64 h4 = f0g4+f1g3_2 +f2g2 +f3g1_2 +f4g0 +f5g9_38+f6g8_19+f7g7_38+f8g6_19+f9g5_38; - crypto_int64 h5 = f0g5+f1g4 +f2g3 +f3g2 +f4g1 +f5g0 +f6g9_19+f7g8_19+f8g7_19+f9g6_19; - crypto_int64 h6 = f0g6+f1g5_2 +f2g4 +f3g3_2 +f4g2 +f5g1_2 +f6g0 +f7g9_38+f8g8_19+f9g7_38; - crypto_int64 h7 = f0g7+f1g6 +f2g5 +f3g4 +f4g3 +f5g2 +f6g1 +f7g0 +f8g9_19+f9g8_19; - crypto_int64 h8 = f0g8+f1g7_2 +f2g6 +f3g5_2 +f4g4 +f5g3_2 +f6g2 +f7g1_2 +f8g0 +f9g9_38; - crypto_int64 h9 = f0g9+f1g8 +f2g7 +f3g6 +f4g5 +f5g4 +f6g3 +f7g2 +f8g1 +f9g0 ; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - /* - |h0| <= (1.1*1.1*2^52*(1+19+19+19+19)+1.1*1.1*2^50*(38+38+38+38+38)) - i.e. |h0| <= 1.2*2^59; narrower ranges for h2, h4, h6, h8 - |h1| <= (1.1*1.1*2^51*(1+1+19+19+19+19+19+19+19+19)) - i.e. |h1| <= 1.5*2^58; narrower ranges for h3, h5, h7, h9 - */ - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - /* |h0| <= 2^25 */ - /* |h4| <= 2^25 */ - /* |h1| <= 1.51*2^58 */ - /* |h5| <= 1.51*2^58 */ - - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - /* |h1| <= 2^24; from now on fits into int32 */ - /* |h5| <= 2^24; from now on fits into int32 */ - /* |h2| <= 1.21*2^59 */ - /* |h6| <= 1.21*2^59 */ - - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - /* |h2| <= 2^25; from now on fits into int32 unchanged */ - /* |h6| <= 2^25; from now on fits into int32 unchanged */ - /* |h3| <= 1.51*2^58 */ - /* |h7| <= 1.51*2^58 */ - - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - /* |h3| <= 2^24; from now on fits into int32 unchanged */ - /* |h7| <= 2^24; from now on fits into int32 unchanged */ - /* |h4| <= 1.52*2^33 */ - /* |h8| <= 1.52*2^33 */ - - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - /* |h4| <= 2^25; from now on fits into int32 unchanged */ - /* |h8| <= 2^25; from now on fits into int32 unchanged */ - /* |h5| <= 1.01*2^24 */ - /* |h9| <= 1.51*2^58 */ - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - /* |h9| <= 2^24; from now on fits into int32 unchanged */ - /* |h0| <= 1.8*2^37 */ - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - /* |h0| <= 2^25; from now on fits into int32 unchanged */ - /* |h1| <= 1.01*2^24 */ - - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sq_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sq_curve25519_ref10.c deleted file mode 100644 index b5a6211..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sq_curve25519_ref10.c +++ /dev/null @@ -1,153 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" - -#ifndef HAVE_TI_MODE - -/* -h = f * f -Can overlap h with f. - -Preconditions: - |f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. - -Postconditions: - |h| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. -*/ - -/* -See fe_mul.c for discussion of implementation strategy. -*/ - -void fe_sq(fe h,fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 f0_2 = 2 * f0; - crypto_int32 f1_2 = 2 * f1; - crypto_int32 f2_2 = 2 * f2; - crypto_int32 f3_2 = 2 * f3; - crypto_int32 f4_2 = 2 * f4; - crypto_int32 f5_2 = 2 * f5; - crypto_int32 f6_2 = 2 * f6; - crypto_int32 f7_2 = 2 * f7; - crypto_int32 f5_38 = 38 * f5; /* 1.31*2^30 */ - crypto_int32 f6_19 = 19 * f6; /* 1.31*2^30 */ - crypto_int32 f7_38 = 38 * f7; /* 1.31*2^30 */ - crypto_int32 f8_19 = 19 * f8; /* 1.31*2^30 */ - crypto_int32 f9_38 = 38 * f9; /* 1.31*2^30 */ - crypto_int64 f0f0 = f0 * (crypto_int64) f0; - crypto_int64 f0f1_2 = f0_2 * (crypto_int64) f1; - crypto_int64 f0f2_2 = f0_2 * (crypto_int64) f2; - crypto_int64 f0f3_2 = f0_2 * (crypto_int64) f3; - crypto_int64 f0f4_2 = f0_2 * (crypto_int64) f4; - crypto_int64 f0f5_2 = f0_2 * (crypto_int64) f5; - crypto_int64 f0f6_2 = f0_2 * (crypto_int64) f6; - crypto_int64 f0f7_2 = f0_2 * (crypto_int64) f7; - crypto_int64 f0f8_2 = f0_2 * (crypto_int64) f8; - crypto_int64 f0f9_2 = f0_2 * (crypto_int64) f9; - crypto_int64 f1f1_2 = f1_2 * (crypto_int64) f1; - crypto_int64 f1f2_2 = f1_2 * (crypto_int64) f2; - crypto_int64 f1f3_4 = f1_2 * (crypto_int64) f3_2; - crypto_int64 f1f4_2 = f1_2 * (crypto_int64) f4; - crypto_int64 f1f5_4 = f1_2 * (crypto_int64) f5_2; - crypto_int64 f1f6_2 = f1_2 * (crypto_int64) f6; - crypto_int64 f1f7_4 = f1_2 * (crypto_int64) f7_2; - crypto_int64 f1f8_2 = f1_2 * (crypto_int64) f8; - crypto_int64 f1f9_76 = f1_2 * (crypto_int64) f9_38; - crypto_int64 f2f2 = f2 * (crypto_int64) f2; - crypto_int64 f2f3_2 = f2_2 * (crypto_int64) f3; - crypto_int64 f2f4_2 = f2_2 * (crypto_int64) f4; - crypto_int64 f2f5_2 = f2_2 * (crypto_int64) f5; - crypto_int64 f2f6_2 = f2_2 * (crypto_int64) f6; - crypto_int64 f2f7_2 = f2_2 * (crypto_int64) f7; - crypto_int64 f2f8_38 = f2_2 * (crypto_int64) f8_19; - crypto_int64 f2f9_38 = f2 * (crypto_int64) f9_38; - crypto_int64 f3f3_2 = f3_2 * (crypto_int64) f3; - crypto_int64 f3f4_2 = f3_2 * (crypto_int64) f4; - crypto_int64 f3f5_4 = f3_2 * (crypto_int64) f5_2; - crypto_int64 f3f6_2 = f3_2 * (crypto_int64) f6; - crypto_int64 f3f7_76 = f3_2 * (crypto_int64) f7_38; - crypto_int64 f3f8_38 = f3_2 * (crypto_int64) f8_19; - crypto_int64 f3f9_76 = f3_2 * (crypto_int64) f9_38; - crypto_int64 f4f4 = f4 * (crypto_int64) f4; - crypto_int64 f4f5_2 = f4_2 * (crypto_int64) f5; - crypto_int64 f4f6_38 = f4_2 * (crypto_int64) f6_19; - crypto_int64 f4f7_38 = f4 * (crypto_int64) f7_38; - crypto_int64 f4f8_38 = f4_2 * (crypto_int64) f8_19; - crypto_int64 f4f9_38 = f4 * (crypto_int64) f9_38; - crypto_int64 f5f5_38 = f5 * (crypto_int64) f5_38; - crypto_int64 f5f6_38 = f5_2 * (crypto_int64) f6_19; - crypto_int64 f5f7_76 = f5_2 * (crypto_int64) f7_38; - crypto_int64 f5f8_38 = f5_2 * (crypto_int64) f8_19; - crypto_int64 f5f9_76 = f5_2 * (crypto_int64) f9_38; - crypto_int64 f6f6_19 = f6 * (crypto_int64) f6_19; - crypto_int64 f6f7_38 = f6 * (crypto_int64) f7_38; - crypto_int64 f6f8_38 = f6_2 * (crypto_int64) f8_19; - crypto_int64 f6f9_38 = f6 * (crypto_int64) f9_38; - crypto_int64 f7f7_38 = f7 * (crypto_int64) f7_38; - crypto_int64 f7f8_38 = f7_2 * (crypto_int64) f8_19; - crypto_int64 f7f9_76 = f7_2 * (crypto_int64) f9_38; - crypto_int64 f8f8_19 = f8 * (crypto_int64) f8_19; - crypto_int64 f8f9_38 = f8 * (crypto_int64) f9_38; - crypto_int64 f9f9_38 = f9 * (crypto_int64) f9_38; - crypto_int64 h0 = f0f0 +f1f9_76+f2f8_38+f3f7_76+f4f6_38+f5f5_38; - crypto_int64 h1 = f0f1_2+f2f9_38+f3f8_38+f4f7_38+f5f6_38; - crypto_int64 h2 = f0f2_2+f1f1_2 +f3f9_76+f4f8_38+f5f7_76+f6f6_19; - crypto_int64 h3 = f0f3_2+f1f2_2 +f4f9_38+f5f8_38+f6f7_38; - crypto_int64 h4 = f0f4_2+f1f3_4 +f2f2 +f5f9_76+f6f8_38+f7f7_38; - crypto_int64 h5 = f0f5_2+f1f4_2 +f2f3_2 +f6f9_38+f7f8_38; - crypto_int64 h6 = f0f6_2+f1f5_4 +f2f4_2 +f3f3_2 +f7f9_76+f8f8_19; - crypto_int64 h7 = f0f7_2+f1f6_2 +f2f5_2 +f3f4_2 +f8f9_38; - crypto_int64 h8 = f0f8_2+f1f7_4 +f2f6_2 +f3f5_4 +f4f4 +f9f9_38; - crypto_int64 h9 = f0f9_2+f1f8_2 +f2f7_2 +f3f6_2 +f4f5_2; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sub_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sub_curve25519_ref10.c deleted file mode 100644 index 0fa4932..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_sub_curve25519_ref10.c +++ /dev/null @@ -1,61 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -h = f - g -Can overlap h with f or g. - -Preconditions: - |f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - |g| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - -Postconditions: - |h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. -*/ - -void fe_sub(fe h,fe f,fe g) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 h0 = f0 - g0; - crypto_int32 h1 = f1 - g1; - crypto_int32 h2 = f2 - g2; - crypto_int32 h3 = f3 - g3; - crypto_int32 h4 = f4 - g4; - crypto_int32 h5 = f5 - g5; - crypto_int32 h6 = f6 - g6; - crypto_int32 h7 = f7 - g7; - crypto_int32 h8 = f8 - g8; - crypto_int32 h9 = f9 - g9; - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_tobytes_curve25519_ref10.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_tobytes_curve25519_ref10.c deleted file mode 100644 index 4e033fb..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/fe_tobytes_curve25519_ref10.c +++ /dev/null @@ -1,123 +0,0 @@ -#include "fe.h" - -#ifndef HAVE_TI_MODE - -/* -Preconditions: - |h| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - -Write p=2^255-19; q=floor(h/p). -Basic claim: q = floor(2^(-255)(h + 19 2^(-25)h9 + 2^(-1))). - -Proof: - Have |h|<=p so |q|<=1 so |19^2 2^(-255) q|<1/4. - Also have |h-2^230 h9|<2^230 so |19 2^(-255)(h-2^230 h9)|<1/4. - - Write y=2^(-1)-19^2 2^(-255)q-19 2^(-255)(h-2^230 h9). - Then 0> 25; - q = (h0 + q) >> 26; - q = (h1 + q) >> 25; - q = (h2 + q) >> 26; - q = (h3 + q) >> 25; - q = (h4 + q) >> 26; - q = (h5 + q) >> 25; - q = (h6 + q) >> 26; - q = (h7 + q) >> 25; - q = (h8 + q) >> 26; - q = (h9 + q) >> 25; - - /* Goal: Output h-(2^255-19)q, which is between 0 and 2^255-20. */ - h0 += 19 * q; - /* Goal: Output h-2^255 q, which is between 0 and 2^255-20. */ - - carry0 = h0 >> 26; h1 += carry0; h0 -= carry0 << 26; - carry1 = h1 >> 25; h2 += carry1; h1 -= carry1 << 25; - carry2 = h2 >> 26; h3 += carry2; h2 -= carry2 << 26; - carry3 = h3 >> 25; h4 += carry3; h3 -= carry3 << 25; - carry4 = h4 >> 26; h5 += carry4; h4 -= carry4 << 26; - carry5 = h5 >> 25; h6 += carry5; h5 -= carry5 << 25; - carry6 = h6 >> 26; h7 += carry6; h6 -= carry6 << 26; - carry7 = h7 >> 25; h8 += carry7; h7 -= carry7 << 25; - carry8 = h8 >> 26; h9 += carry8; h8 -= carry8 << 26; - carry9 = h9 >> 25; h9 -= carry9 << 25; - /* h10 = carry9 */ - - /* - Goal: Output h0+...+2^255 h10-2^255 q, which is between 0 and 2^255-20. - Have h0+...+2^230 h9 between 0 and 2^255-1; - evidently 2^255 h10-2^255 q = 0. - Goal: Output h0+...+2^230 h9. - */ - - s[0] = h0 >> 0; - s[1] = h0 >> 8; - s[2] = h0 >> 16; - s[3] = (h0 >> 24) | (h1 << 2); - s[4] = h1 >> 6; - s[5] = h1 >> 14; - s[6] = (h1 >> 22) | (h2 << 3); - s[7] = h2 >> 5; - s[8] = h2 >> 13; - s[9] = (h2 >> 21) | (h3 << 5); - s[10] = h3 >> 3; - s[11] = h3 >> 11; - s[12] = (h3 >> 19) | (h4 << 6); - s[13] = h4 >> 2; - s[14] = h4 >> 10; - s[15] = h4 >> 18; - s[16] = h5 >> 0; - s[17] = h5 >> 8; - s[18] = h5 >> 16; - s[19] = (h5 >> 24) | (h6 << 1); - s[20] = h6 >> 7; - s[21] = h6 >> 15; - s[22] = (h6 >> 23) | (h7 << 3); - s[23] = h7 >> 5; - s[24] = h7 >> 13; - s[25] = (h7 >> 21) | (h8 << 4); - s[26] = h8 >> 4; - s[27] = h8 >> 12; - s[28] = (h8 >> 20) | (h9 << 6); - s[29] = h9 >> 2; - s[30] = h9 >> 10; - s[31] = h9 >> 18; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/montgomery.h b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/montgomery.h deleted file mode 100644 index 91e28c0..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/ref10/montgomery.h +++ /dev/null @@ -1,140 +0,0 @@ - -/* qhasm: fe X2 */ - -/* qhasm: fe Z2 */ - -/* qhasm: fe X3 */ - -/* qhasm: fe Z3 */ - -/* qhasm: fe X4 */ - -/* qhasm: fe Z4 */ - -/* qhasm: fe X5 */ - -/* qhasm: fe Z5 */ - -/* qhasm: fe A */ - -/* qhasm: fe B */ - -/* qhasm: fe C */ - -/* qhasm: fe D */ - -/* qhasm: fe E */ - -/* qhasm: fe AA */ - -/* qhasm: fe BB */ - -/* qhasm: fe DA */ - -/* qhasm: fe CB */ - -/* qhasm: fe t0 */ - -/* qhasm: fe t1 */ - -/* qhasm: fe t2 */ - -/* qhasm: fe t3 */ - -/* qhasm: fe t4 */ - -/* qhasm: enter ladder */ - -/* qhasm: D = X3-Z3 */ -/* asm 1: fe_sub(>D=fe#5,D=tmp0,B=fe#6,B=tmp1,A=fe#1,A=x2,C=fe#2,C=z2,DA=fe#4,DA=z3,CB=fe#2,CB=z2,BB=fe#5,BB=tmp0,AA=fe#6,AA=tmp1,t0=fe#3,t0=x3,t1=fe#2,t1=z2,X4=fe#1,X4=x2,E=fe#6,E=tmp1,t2=fe#2,t2=z2,t3=fe#4,t3=z3,X5=fe#3,X5=x3,t4=fe#5,t4=tmp0,Z5=fe#4,x1,Z5=z3,x1,Z4=fe#2,Z4=z2,z2=fe#1,z2=fe#1,>z2=fe#1); */ -/* asm 2: fe_sq(>z2=t0,z2=t0,>z2=t0); */ -fe_sq(t0,z); /* for (i = 1;i < 1;++i) fe_sq(t0,t0); */ - -/* qhasm: z8 = z2^2^2 */ -/* asm 1: fe_sq(>z8=fe#2,z8=fe#2,>z8=fe#2); */ -/* asm 2: fe_sq(>z8=t1,z8=t1,>z8=t1); */ -fe_sq(t1,t0); for (i = 1;i < 2;++i) fe_sq(t1,t1); - -/* qhasm: z9 = z1*z8 */ -/* asm 1: fe_mul(>z9=fe#2,z9=t1,z11=fe#1,z11=t0,z22=fe#3,z22=fe#3,>z22=fe#3); */ -/* asm 2: fe_sq(>z22=t2,z22=t2,>z22=t2); */ -fe_sq(t2,t0); /* for (i = 1;i < 1;++i) fe_sq(t2,t2); */ - -/* qhasm: z_5_0 = z9*z22 */ -/* asm 1: fe_mul(>z_5_0=fe#2,z_5_0=t1,z_10_5=fe#3,z_10_5=fe#3,>z_10_5=fe#3); */ -/* asm 2: fe_sq(>z_10_5=t2,z_10_5=t2,>z_10_5=t2); */ -fe_sq(t2,t1); for (i = 1;i < 5;++i) fe_sq(t2,t2); - -/* qhasm: z_10_0 = z_10_5*z_5_0 */ -/* asm 1: fe_mul(>z_10_0=fe#2,z_10_0=t1,z_20_10=fe#3,z_20_10=fe#3,>z_20_10=fe#3); */ -/* asm 2: fe_sq(>z_20_10=t2,z_20_10=t2,>z_20_10=t2); */ -fe_sq(t2,t1); for (i = 1;i < 10;++i) fe_sq(t2,t2); - -/* qhasm: z_20_0 = z_20_10*z_10_0 */ -/* asm 1: fe_mul(>z_20_0=fe#3,z_20_0=t2,z_40_20=fe#4,z_40_20=fe#4,>z_40_20=fe#4); */ -/* asm 2: fe_sq(>z_40_20=t3,z_40_20=t3,>z_40_20=t3); */ -fe_sq(t3,t2); for (i = 1;i < 20;++i) fe_sq(t3,t3); - -/* qhasm: z_40_0 = z_40_20*z_20_0 */ -/* asm 1: fe_mul(>z_40_0=fe#3,z_40_0=t2,z_50_10=fe#3,z_50_10=fe#3,>z_50_10=fe#3); */ -/* asm 2: fe_sq(>z_50_10=t2,z_50_10=t2,>z_50_10=t2); */ -fe_sq(t2,t2); for (i = 1;i < 10;++i) fe_sq(t2,t2); - -/* qhasm: z_50_0 = z_50_10*z_10_0 */ -/* asm 1: fe_mul(>z_50_0=fe#2,z_50_0=t1,z_100_50=fe#3,z_100_50=fe#3,>z_100_50=fe#3); */ -/* asm 2: fe_sq(>z_100_50=t2,z_100_50=t2,>z_100_50=t2); */ -fe_sq(t2,t1); for (i = 1;i < 50;++i) fe_sq(t2,t2); - -/* qhasm: z_100_0 = z_100_50*z_50_0 */ -/* asm 1: fe_mul(>z_100_0=fe#3,z_100_0=t2,z_200_100=fe#4,z_200_100=fe#4,>z_200_100=fe#4); */ -/* asm 2: fe_sq(>z_200_100=t3,z_200_100=t3,>z_200_100=t3); */ -fe_sq(t3,t2); for (i = 1;i < 100;++i) fe_sq(t3,t3); - -/* qhasm: z_200_0 = z_200_100*z_100_0 */ -/* asm 1: fe_mul(>z_200_0=fe#3,z_200_0=t2,z_250_50=fe#3,z_250_50=fe#3,>z_250_50=fe#3); */ -/* asm 2: fe_sq(>z_250_50=t2,z_250_50=t2,>z_250_50=t2); */ -fe_sq(t2,t2); for (i = 1;i < 50;++i) fe_sq(t2,t2); - -/* qhasm: z_250_0 = z_250_50*z_50_0 */ -/* asm 1: fe_mul(>z_250_0=fe#2,z_250_0=t1,z_255_5=fe#2,z_255_5=fe#2,>z_255_5=fe#2); */ -/* asm 2: fe_sq(>z_255_5=t1,z_255_5=t1,>z_255_5=t1); */ -fe_sq(t1,t1); for (i = 1;i < 5;++i) fe_sq(t1,t1); - -/* qhasm: z_255_21 = z_255_5*z11 */ -/* asm 1: fe_mul(>z_255_21=fe#12,z_255_21=out,= 0;--pos) { - b = e[pos / 8] >> (pos & 7); - b &= 1; - swap ^= b; - fe_cswap(x2,x3,swap); - fe_cswap(z2,z3,swap); - swap = b; -#include "montgomery.h" - } - fe_cswap(x2,x3,swap); - fe_cswap(z2,z3,swap); - - fe_invert(z2,z2); - fe_mul(x2,x2,z2); - fe_tobytes(q,x2); - return 0; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/scalarmult_curve25519_api.c b/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/scalarmult_curve25519_api.c deleted file mode 100644 index 94c720a..0000000 --- a/Pods/libsodium/src/libsodium/crypto_scalarmult/curve25519/scalarmult_curve25519_api.c +++ /dev/null @@ -1,14 +0,0 @@ - -#include "crypto_scalarmult_curve25519.h" - -size_t -crypto_scalarmult_curve25519_bytes(void) -{ - return crypto_scalarmult_curve25519_BYTES; -} - -size_t -crypto_scalarmult_curve25519_scalarbytes(void) -{ - return crypto_scalarmult_curve25519_SCALARBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_secretbox/crypto_secretbox.c b/Pods/libsodium/src/libsodium/crypto_secretbox/crypto_secretbox.c deleted file mode 100644 index 456f9f0..0000000 --- a/Pods/libsodium/src/libsodium/crypto_secretbox/crypto_secretbox.c +++ /dev/null @@ -1,54 +0,0 @@ - -#include "crypto_secretbox.h" - -size_t -crypto_secretbox_keybytes(void) -{ - return crypto_secretbox_KEYBYTES; -} - -size_t -crypto_secretbox_noncebytes(void) -{ - return crypto_secretbox_NONCEBYTES; -} - -size_t -crypto_secretbox_zerobytes(void) -{ - return crypto_secretbox_ZEROBYTES; -} - -size_t -crypto_secretbox_boxzerobytes(void) -{ - return crypto_secretbox_BOXZEROBYTES; -} - -size_t -crypto_secretbox_macbytes(void) -{ - return crypto_secretbox_MACBYTES; -} - -const char * -crypto_secretbox_primitive(void) -{ - return crypto_secretbox_PRIMITIVE; -} - -int -crypto_secretbox(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_secretbox_xsalsa20poly1305(c, m, mlen, n, k); -} - -int -crypto_secretbox_open(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_secretbox_xsalsa20poly1305_open(m, c, clen, n, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_secretbox/crypto_secretbox_easy.c b/Pods/libsodium/src/libsodium/crypto_secretbox/crypto_secretbox_easy.c deleted file mode 100644 index e9b594c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_secretbox/crypto_secretbox_easy.c +++ /dev/null @@ -1,139 +0,0 @@ - -#include -#include -#include -#include -#include - -#include "crypto_core_hsalsa20.h" -#include "crypto_onetimeauth_poly1305.h" -#include "crypto_secretbox.h" -#include "crypto_stream_salsa20.h" -#include "utils.h" - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int -crypto_secretbox_detached(unsigned char *c, unsigned char *mac, - const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - crypto_onetimeauth_poly1305_state state; - unsigned char block0[64U]; - unsigned char subkey[crypto_stream_salsa20_KEYBYTES]; - unsigned long long i; - unsigned long long mlen0; - - crypto_core_hsalsa20(subkey, n, k, sigma); - - if (((uintptr_t) c >= (uintptr_t) m && - (uintptr_t) c - (uintptr_t) m < mlen) || - ((uintptr_t) m >= (uintptr_t) c && - (uintptr_t) m - (uintptr_t) c < mlen)) { - memmove(c, m, mlen); - m = c; - } - memset(block0, 0U, crypto_secretbox_ZEROBYTES); - (void) sizeof(int[64U >= crypto_secretbox_ZEROBYTES ? 1 : -1]); - mlen0 = mlen; - if (mlen0 > 64U - crypto_secretbox_ZEROBYTES) { - mlen0 = 64U - crypto_secretbox_ZEROBYTES; - } - for (i = 0U; i < mlen0; i++) { - block0[i + crypto_secretbox_ZEROBYTES] = m[i]; - } - crypto_stream_salsa20_xor(block0, block0, - mlen0 + crypto_secretbox_ZEROBYTES, - n + 16, subkey); - (void) sizeof(int[crypto_secretbox_ZEROBYTES >= - crypto_onetimeauth_poly1305_KEYBYTES ? 1 : -1]); - crypto_onetimeauth_poly1305_init(&state, block0); - - memcpy(c, block0 + crypto_secretbox_ZEROBYTES, mlen0); - sodium_memzero(block0, sizeof block0); - if (mlen > mlen0) { - crypto_stream_salsa20_xor_ic(c + mlen0, m + mlen0, mlen - mlen0, - n + 16, 1U, subkey); - } - sodium_memzero(subkey, sizeof subkey); - - crypto_onetimeauth_poly1305_update(&state, c, mlen); - crypto_onetimeauth_poly1305_final(&state, mac); - sodium_memzero(&state, sizeof state); - - return 0; -} - -int -crypto_secretbox_easy(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - if (mlen > SIZE_MAX - crypto_secretbox_MACBYTES) { - return -1; - } - return crypto_secretbox_detached(c + crypto_secretbox_MACBYTES, - c, m, mlen, n, k); -} - -int -crypto_secretbox_open_detached(unsigned char *m, const unsigned char *c, - const unsigned char *mac, - unsigned long long clen, - const unsigned char *n, - const unsigned char *k) -{ - unsigned char block0[64U]; - unsigned char subkey[crypto_stream_salsa20_KEYBYTES]; - unsigned long long i; - unsigned long long mlen0; - - crypto_core_hsalsa20(subkey, n, k, sigma); - crypto_stream_salsa20(block0, crypto_stream_salsa20_KEYBYTES, - n + 16, subkey); - if (crypto_onetimeauth_poly1305_verify(mac, c, clen, block0) != 0) { - sodium_memzero(subkey, sizeof subkey); - return -1; - } - if (((uintptr_t) c >= (uintptr_t) m && - (uintptr_t) c - (uintptr_t) m < clen) || - ((uintptr_t) m >= (uintptr_t) c && - (uintptr_t) m - (uintptr_t) c < clen)) { - memmove(m, c, clen); - c = m; - } - mlen0 = clen; - if (mlen0 > 64U - crypto_secretbox_ZEROBYTES) { - mlen0 = 64U - crypto_secretbox_ZEROBYTES; - } - memcpy(block0 + crypto_secretbox_ZEROBYTES, c, mlen0); - crypto_stream_salsa20_xor(block0, block0, - crypto_secretbox_ZEROBYTES + mlen0, - n + 16, subkey); - for (i = 0U; i < mlen0; i++) { - m[i] = block0[i + crypto_secretbox_ZEROBYTES]; - } - if (clen > mlen0) { - crypto_stream_salsa20_xor_ic(m + mlen0, c + mlen0, clen - mlen0, - n + 16, 1U, subkey); - } - sodium_memzero(subkey, sizeof subkey); - - return 0; -} - -int -crypto_secretbox_open_easy(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k) -{ - if (clen < crypto_secretbox_MACBYTES) { - return -1; - } - return crypto_secretbox_open_detached(m, c + crypto_secretbox_MACBYTES, c, - clen - crypto_secretbox_MACBYTES, - n, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/api.h b/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/api.h deleted file mode 100644 index 5eff3d2..0000000 --- a/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/api.h +++ /dev/null @@ -1,11 +0,0 @@ - -#include "crypto_secretbox_xsalsa20poly1305.h" - -#define crypto_secretbox crypto_secretbox_xsalsa20poly1305 -#define crypto_secretbox_open crypto_secretbox_xsalsa20poly1305_open -#define crypto_secretbox_KEYBYTES crypto_secretbox_xsalsa20poly1305_KEYBYTES -#define crypto_secretbox_NONCEBYTES crypto_secretbox_xsalsa20poly1305_NONCEBYTES -#define crypto_secretbox_ZEROBYTES crypto_secretbox_xsalsa20poly1305_ZEROBYTES -#define crypto_secretbox_BOXZEROBYTES crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES -#define crypto_secretbox_IMPLEMENTATION crypto_secretbox_xsalsa20poly1305_IMPLEMENTATION -#define crypto_secretbox_VERSION crypto_secretbox_xsalsa20poly1305_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/box_xsalsa20poly1305.c b/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/box_xsalsa20poly1305.c deleted file mode 100644 index f68334e..0000000 --- a/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/ref/box_xsalsa20poly1305.c +++ /dev/null @@ -1,35 +0,0 @@ -#include "api.h" -#include "crypto_onetimeauth_poly1305.h" -#include "crypto_stream_xsalsa20.h" - -int crypto_secretbox( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -) -{ - int i; - if (mlen < 32) return -1; - crypto_stream_xsalsa20_xor(c,m,mlen,n,k); - crypto_onetimeauth_poly1305(c + 16,c + 32,mlen - 32,c); - for (i = 0;i < 16;++i) c[i] = 0; - return 0; -} - -int crypto_secretbox_open( - unsigned char *m, - const unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - int i; - unsigned char subkey[32]; - if (clen < 32) return -1; - crypto_stream_xsalsa20(subkey,32,n,k); - if (crypto_onetimeauth_poly1305_verify(c + 16,c + 32,clen - 32,subkey) != 0) return -1; - crypto_stream_xsalsa20_xor(m,c,clen,n,k); - for (i = 0;i < 32;++i) m[i] = 0; - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/secretbox_xsalsa20poly1305_api.c b/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/secretbox_xsalsa20poly1305_api.c deleted file mode 100644 index 3ab68b1..0000000 --- a/Pods/libsodium/src/libsodium/crypto_secretbox/xsalsa20poly1305/secretbox_xsalsa20poly1305_api.c +++ /dev/null @@ -1,26 +0,0 @@ -#include "crypto_secretbox_xsalsa20poly1305.h" - -size_t -crypto_secretbox_xsalsa20poly1305_keybytes(void) { - return crypto_secretbox_xsalsa20poly1305_KEYBYTES; -} - -size_t -crypto_secretbox_xsalsa20poly1305_noncebytes(void) { - return crypto_secretbox_xsalsa20poly1305_NONCEBYTES; -} - -size_t -crypto_secretbox_xsalsa20poly1305_zerobytes(void) { - return crypto_secretbox_xsalsa20poly1305_ZEROBYTES; -} - -size_t -crypto_secretbox_xsalsa20poly1305_boxzerobytes(void) { - return crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES; -} - -size_t -crypto_secretbox_xsalsa20poly1305_macbytes(void) { - return crypto_secretbox_xsalsa20poly1305_MACBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_shorthash/crypto_shorthash.c b/Pods/libsodium/src/libsodium/crypto_shorthash/crypto_shorthash.c deleted file mode 100644 index b68b58a..0000000 --- a/Pods/libsodium/src/libsodium/crypto_shorthash/crypto_shorthash.c +++ /dev/null @@ -1,27 +0,0 @@ - -#include "crypto_shorthash.h" - -size_t -crypto_shorthash_bytes(void) -{ - return crypto_shorthash_BYTES; -} - -size_t -crypto_shorthash_keybytes(void) -{ - return crypto_shorthash_KEYBYTES; -} - -const char * -crypto_shorthash_primitive(void) -{ - return crypto_shorthash_PRIMITIVE; -} - -int -crypto_shorthash(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k) -{ - return crypto_shorthash_siphash24(out, in, inlen, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/ref/api.h b/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/ref/api.h deleted file mode 100644 index a837c8a..0000000 --- a/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/ref/api.h +++ /dev/null @@ -1,7 +0,0 @@ - -#include "crypto_shorthash_siphash24.h" - -#define crypto_shorthash crypto_shorthash_siphash24 -#define crypto_shorthash_BYTES crypto_shorthash_siphash24_BYTES -#define crypto_shorthash_IMPLEMENTATION crypto_shorthash_siphash24_IMPLEMENTATION -#define crypto_shorthash_VERSION crypto_shorthash_siphash24_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/ref/shorthash_siphash24.c b/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/ref/shorthash_siphash24.c deleted file mode 100644 index 3676382..0000000 --- a/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/ref/shorthash_siphash24.c +++ /dev/null @@ -1,91 +0,0 @@ -#include "api.h" -#include "crypto_uint64.h" -#include "crypto_uint32.h" -#include "crypto_uint8.h" - -typedef crypto_uint64 u64; -typedef crypto_uint32 u32; -typedef crypto_uint8 u8; - -#define ROTL(x,b) (u64)( ((x) << (b)) | ( (x) >> (64 - (b))) ) - -#define U32TO8_LE(p, v) \ - (p)[0] = (u8)((v) ); (p)[1] = (u8)((v) >> 8); \ - (p)[2] = (u8)((v) >> 16); (p)[3] = (u8)((v) >> 24); - -#define U64TO8_LE(p, v) \ - U32TO8_LE((p), (u32)((v) )); \ - U32TO8_LE((p) + 4, (u32)((v) >> 32)); - -#define U8TO64_LE(p) \ - (((u64)((p)[0]) ) | \ - ((u64)((p)[1]) << 8) | \ - ((u64)((p)[2]) << 16) | \ - ((u64)((p)[3]) << 24) | \ - ((u64)((p)[4]) << 32) | \ - ((u64)((p)[5]) << 40) | \ - ((u64)((p)[6]) << 48) | \ - ((u64)((p)[7]) << 56)) - -#define SIPROUND \ - do { \ - v0 += v1; v1=ROTL(v1,13); v1 ^= v0; v0=ROTL(v0,32); \ - v2 += v3; v3=ROTL(v3,16); v3 ^= v2; \ - v0 += v3; v3=ROTL(v3,21); v3 ^= v0; \ - v2 += v1; v1=ROTL(v1,17); v1 ^= v2; v2=ROTL(v2,32); \ - } while(0) - -int crypto_shorthash(unsigned char *out,const unsigned char *in,unsigned long long inlen,const unsigned char *k) -{ - /* "somepseudorandomlygeneratedbytes" */ - u64 v0 = 0x736f6d6570736575ULL; - u64 v1 = 0x646f72616e646f6dULL; - u64 v2 = 0x6c7967656e657261ULL; - u64 v3 = 0x7465646279746573ULL; - u64 b; - u64 k0 = U8TO64_LE( k ); - u64 k1 = U8TO64_LE( k + 8 ); - u64 m; - const u8 *end = in + inlen - ( inlen % sizeof( u64 ) ); - const int left = inlen & 7; - b = ( ( u64 )inlen ) << 56; - v3 ^= k1; - v2 ^= k0; - v1 ^= k1; - v0 ^= k0; - - for ( ; in != end; in += 8 ) - { - m = U8TO64_LE( in ); - v3 ^= m; - SIPROUND; - SIPROUND; - v0 ^= m; - } - - switch( left ) - { - case 7: b |= ( ( u64 )in[ 6] ) << 48; - case 6: b |= ( ( u64 )in[ 5] ) << 40; - case 5: b |= ( ( u64 )in[ 4] ) << 32; - case 4: b |= ( ( u64 )in[ 3] ) << 24; - case 3: b |= ( ( u64 )in[ 2] ) << 16; - case 2: b |= ( ( u64 )in[ 1] ) << 8; - case 1: b |= ( ( u64 )in[ 0] ); break; - case 0: break; - } - - v3 ^= b; - SIPROUND; - SIPROUND; - v0 ^= b; - v2 ^= 0xff; - SIPROUND; - SIPROUND; - SIPROUND; - SIPROUND; - b = v0 ^ v1 ^ v2 ^ v3; - U64TO8_LE( out, b ); - return 0; -} - diff --git a/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/shorthash_siphash24_api.c b/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/shorthash_siphash24_api.c deleted file mode 100644 index e2cea77..0000000 --- a/Pods/libsodium/src/libsodium/crypto_shorthash/siphash24/shorthash_siphash24_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_shorthash_siphash24.h" - -size_t -crypto_shorthash_siphash24_bytes(void) { - return crypto_shorthash_siphash24_BYTES; -} - -size_t -crypto_shorthash_siphash24_keybytes(void) { - return crypto_shorthash_siphash24_KEYBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/crypto_sign.c b/Pods/libsodium/src/libsodium/crypto_sign/crypto_sign.c deleted file mode 100644 index b5508fb..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/crypto_sign.c +++ /dev/null @@ -1,76 +0,0 @@ - -#include "crypto_sign.h" - -size_t -crypto_sign_bytes(void) -{ - return crypto_sign_BYTES; -} - -size_t -crypto_sign_seedbytes(void) -{ - return crypto_sign_SEEDBYTES; -} - -size_t -crypto_sign_publickeybytes(void) -{ - return crypto_sign_PUBLICKEYBYTES; -} - -size_t -crypto_sign_secretkeybytes(void) -{ - return crypto_sign_SECRETKEYBYTES; -} - -const char * -crypto_sign_primitive(void) -{ - return crypto_sign_PRIMITIVE; -} - -int -crypto_sign_seed_keypair(unsigned char *pk, unsigned char *sk, - const unsigned char *seed) -{ - return crypto_sign_ed25519_seed_keypair(pk, sk, seed); -} - -int -crypto_sign_keypair(unsigned char *pk, unsigned char *sk) -{ - return crypto_sign_ed25519_keypair(pk, sk); -} - -int -crypto_sign(unsigned char *sm, unsigned long long *smlen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk) -{ - return crypto_sign_ed25519(sm, smlen_p, m, mlen, sk); -} - -int -crypto_sign_open(unsigned char *m, unsigned long long *mlen_p, - const unsigned char *sm, unsigned long long smlen, - const unsigned char *pk) -{ - return crypto_sign_ed25519_open(m, mlen_p, sm, smlen, pk); -} - -int -crypto_sign_detached(unsigned char *sig, unsigned long long *siglen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk) -{ - return crypto_sign_ed25519_detached(sig, siglen_p, m, mlen, sk); -} - -int -crypto_sign_verify_detached(const unsigned char *sig, const unsigned char *m, - unsigned long long mlen, const unsigned char *pk) -{ - return crypto_sign_ed25519_verify_detached(sig, m, mlen, pk); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/api.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/api.h deleted file mode 100644 index 0106cf1..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/api.h +++ /dev/null @@ -1,15 +0,0 @@ - -#include "crypto_sign_ed25519.h" - -#define crypto_sign crypto_sign_ed25519 -#define crypto_sign_detached crypto_sign_ed25519_detached -#define crypto_sign_open crypto_sign_ed25519_open -#define crypto_sign_verify_detached crypto_sign_ed25519_verify_detached -#define crypto_sign_keypair crypto_sign_ed25519_keypair -#define crypto_sign_seed_keypair crypto_sign_ed25519_seed_keypair -#define crypto_sign_BYTES crypto_sign_ed25519_BYTES -#define crypto_sign_SEEDBYTES crypto_sign_ed25519_SEEDBYTES -#define crypto_sign_PUBLICKEYBYTES crypto_sign_ed25519_PUBLICKEYBYTES -#define crypto_sign_SECRETKEYBYTES crypto_sign_ed25519_SECRETKEYBYTES -#define crypto_sign_IMPLEMENTATION crypto_sign_ed25519_IMPLEMENTATION -#define crypto_sign_VERSION crypto_sign_ed25519_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/base.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/base.h deleted file mode 100644 index 573bd8a..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/base.h +++ /dev/null @@ -1,1344 +0,0 @@ -{ - { - { 25967493,-14356035,29566456,3660896,-12694345,4014787,27544626,-11754271,-6079156,2047605 }, - { -12545711,934262,-2722910,3049990,-727428,9406986,12720692,5043384,19500929,-15469378 }, - { -8738181,4489570,9688441,-14785194,10184609,-12363380,29287919,11864899,-24514362,-4438546 }, - }, - { - { -12815894,-12976347,-21581243,11784320,-25355658,-2750717,-11717903,-3814571,-358445,-10211303 }, - { -21703237,6903825,27185491,6451973,-29577724,-9554005,-15616551,11189268,-26829678,-5319081 }, - { 26966642,11152617,32442495,15396054,14353839,-12752335,-3128826,-9541118,-15472047,-4166697 }, - }, - { - { 15636291,-9688557,24204773,-7912398,616977,-16685262,27787600,-14772189,28944400,-1550024 }, - { 16568933,4717097,-11556148,-1102322,15682896,-11807043,16354577,-11775962,7689662,11199574 }, - { 30464156,-5976125,-11779434,-15670865,23220365,15915852,7512774,10017326,-17749093,-9920357 }, - }, - { - { -17036878,13921892,10945806,-6033431,27105052,-16084379,-28926210,15006023,3284568,-6276540 }, - { 23599295,-8306047,-11193664,-7687416,13236774,10506355,7464579,9656445,13059162,10374397 }, - { 7798556,16710257,3033922,2874086,28997861,2835604,32406664,-3839045,-641708,-101325 }, - }, - { - { 10861363,11473154,27284546,1981175,-30064349,12577861,32867885,14515107,-15438304,10819380 }, - { 4708026,6336745,20377586,9066809,-11272109,6594696,-25653668,12483688,-12668491,5581306 }, - { 19563160,16186464,-29386857,4097519,10237984,-4348115,28542350,13850243,-23678021,-15815942 }, - }, - { - { -15371964,-12862754,32573250,4720197,-26436522,5875511,-19188627,-15224819,-9818940,-12085777 }, - { -8549212,109983,15149363,2178705,22900618,4543417,3044240,-15689887,1762328,14866737 }, - { -18199695,-15951423,-10473290,1707278,-17185920,3916101,-28236412,3959421,27914454,4383652 }, - }, - { - { 5153746,9909285,1723747,-2777874,30523605,5516873,19480852,5230134,-23952439,-15175766 }, - { -30269007,-3463509,7665486,10083793,28475525,1649722,20654025,16520125,30598449,7715701 }, - { 28881845,14381568,9657904,3680757,-20181635,7843316,-31400660,1370708,29794553,-1409300 }, - }, - { - { 14499471,-2729599,-33191113,-4254652,28494862,14271267,30290735,10876454,-33154098,2381726 }, - { -7195431,-2655363,-14730155,462251,-27724326,3941372,-6236617,3696005,-32300832,15351955 }, - { 27431194,8222322,16448760,-3907995,-18707002,11938355,-32961401,-2970515,29551813,10109425 }, - }, -}, -{ - { - { -13657040,-13155431,-31283750,11777098,21447386,6519384,-2378284,-1627556,10092783,-4764171 }, - { 27939166,14210322,4677035,16277044,-22964462,-12398139,-32508754,12005538,-17810127,12803510 }, - { 17228999,-15661624,-1233527,300140,-1224870,-11714777,30364213,-9038194,18016357,4397660 }, - }, - { - { -10958843,-7690207,4776341,-14954238,27850028,-15602212,-26619106,14544525,-17477504,982639 }, - { 29253598,15796703,-2863982,-9908884,10057023,3163536,7332899,-4120128,-21047696,9934963 }, - { 5793303,16271923,-24131614,-10116404,29188560,1206517,-14747930,4559895,-30123922,-10897950 }, - }, - { - { -27643952,-11493006,16282657,-11036493,28414021,-15012264,24191034,4541697,-13338309,5500568 }, - { 12650548,-1497113,9052871,11355358,-17680037,-8400164,-17430592,12264343,10874051,13524335 }, - { 25556948,-3045990,714651,2510400,23394682,-10415330,33119038,5080568,-22528059,5376628 }, - }, - { - { -26088264,-4011052,-17013699,-3537628,-6726793,1920897,-22321305,-9447443,4535768,1569007 }, - { -2255422,14606630,-21692440,-8039818,28430649,8775819,-30494562,3044290,31848280,12543772 }, - { -22028579,2943893,-31857513,6777306,13784462,-4292203,-27377195,-2062731,7718482,14474653 }, - }, - { - { 2385315,2454213,-22631320,46603,-4437935,-15680415,656965,-7236665,24316168,-5253567 }, - { 13741529,10911568,-33233417,-8603737,-20177830,-1033297,33040651,-13424532,-20729456,8321686 }, - { 21060490,-2212744,15712757,-4336099,1639040,10656336,23845965,-11874838,-9984458,608372 }, - }, - { - { -13672732,-15087586,-10889693,-7557059,-6036909,11305547,1123968,-6780577,27229399,23887 }, - { -23244140,-294205,-11744728,14712571,-29465699,-2029617,12797024,-6440308,-1633405,16678954 }, - { -29500620,4770662,-16054387,14001338,7830047,9564805,-1508144,-4795045,-17169265,4904953 }, - }, - { - { 24059557,14617003,19037157,-15039908,19766093,-14906429,5169211,16191880,2128236,-4326833 }, - { -16981152,4124966,-8540610,-10653797,30336522,-14105247,-29806336,916033,-6882542,-2986532 }, - { -22630907,12419372,-7134229,-7473371,-16478904,16739175,285431,2763829,15736322,4143876 }, - }, - { - { 2379352,11839345,-4110402,-5988665,11274298,794957,212801,-14594663,23527084,-16458268 }, - { 33431127,-11130478,-17838966,-15626900,8909499,8376530,-32625340,4087881,-15188911,-14416214 }, - { 1767683,7197987,-13205226,-2022635,-13091350,448826,5799055,4357868,-4774191,-16323038 }, - }, -}, -{ - { - { 6721966,13833823,-23523388,-1551314,26354293,-11863321,23365147,-3949732,7390890,2759800 }, - { 4409041,2052381,23373853,10530217,7676779,-12885954,21302353,-4264057,1244380,-12919645 }, - { -4421239,7169619,4982368,-2957590,30256825,-2777540,14086413,9208236,15886429,16489664 }, - }, - { - { 1996075,10375649,14346367,13311202,-6874135,-16438411,-13693198,398369,-30606455,-712933 }, - { -25307465,9795880,-2777414,14878809,-33531835,14780363,13348553,12076947,-30836462,5113182 }, - { -17770784,11797796,31950843,13929123,-25888302,12288344,-30341101,-7336386,13847711,5387222 }, - }, - { - { -18582163,-3416217,17824843,-2340966,22744343,-10442611,8763061,3617786,-19600662,10370991 }, - { 20246567,-14369378,22358229,-543712,18507283,-10413996,14554437,-8746092,32232924,16763880 }, - { 9648505,10094563,26416693,14745928,-30374318,-6472621,11094161,15689506,3140038,-16510092 }, - }, - { - { -16160072,5472695,31895588,4744994,8823515,10365685,-27224800,9448613,-28774454,366295 }, - { 19153450,11523972,-11096490,-6503142,-24647631,5420647,28344573,8041113,719605,11671788 }, - { 8678025,2694440,-6808014,2517372,4964326,11152271,-15432916,-15266516,27000813,-10195553 }, - }, - { - { -15157904,7134312,8639287,-2814877,-7235688,10421742,564065,5336097,6750977,-14521026 }, - { 11836410,-3979488,26297894,16080799,23455045,15735944,1695823,-8819122,8169720,16220347 }, - { -18115838,8653647,17578566,-6092619,-8025777,-16012763,-11144307,-2627664,-5990708,-14166033 }, - }, - { - { -23308498,-10968312,15213228,-10081214,-30853605,-11050004,27884329,2847284,2655861,1738395 }, - { -27537433,-14253021,-25336301,-8002780,-9370762,8129821,21651608,-3239336,-19087449,-11005278 }, - { 1533110,3437855,23735889,459276,29970501,11335377,26030092,5821408,10478196,8544890 }, - }, - { - { 32173121,-16129311,24896207,3921497,22579056,-3410854,19270449,12217473,17789017,-3395995 }, - { -30552961,-2228401,-15578829,-10147201,13243889,517024,15479401,-3853233,30460520,1052596 }, - { -11614875,13323618,32618793,8175907,-15230173,12596687,27491595,-4612359,3179268,-9478891 }, - }, - { - { 31947069,-14366651,-4640583,-15339921,-15125977,-6039709,-14756777,-16411740,19072640,-9511060 }, - { 11685058,11822410,3158003,-13952594,33402194,-4165066,5977896,-5215017,473099,5040608 }, - { -20290863,8198642,-27410132,11602123,1290375,-2799760,28326862,1721092,-19558642,-3131606 }, - }, -}, -{ - { - { 7881532,10687937,7578723,7738378,-18951012,-2553952,21820786,8076149,-27868496,11538389 }, - { -19935666,3899861,18283497,-6801568,-15728660,-11249211,8754525,7446702,-5676054,5797016 }, - { -11295600,-3793569,-15782110,-7964573,12708869,-8456199,2014099,-9050574,-2369172,-5877341 }, - }, - { - { -22472376,-11568741,-27682020,1146375,18956691,16640559,1192730,-3714199,15123619,10811505 }, - { 14352098,-3419715,-18942044,10822655,32750596,4699007,-70363,15776356,-28886779,-11974553 }, - { -28241164,-8072475,-4978962,-5315317,29416931,1847569,-20654173,-16484855,4714547,-9600655 }, - }, - { - { 15200332,8368572,19679101,15970074,-31872674,1959451,24611599,-4543832,-11745876,12340220 }, - { 12876937,-10480056,33134381,6590940,-6307776,14872440,9613953,8241152,15370987,9608631 }, - { -4143277,-12014408,8446281,-391603,4407738,13629032,-7724868,15866074,-28210621,-8814099 }, - }, - { - { 26660628,-15677655,8393734,358047,-7401291,992988,-23904233,858697,20571223,8420556 }, - { 14620715,13067227,-15447274,8264467,14106269,15080814,33531827,12516406,-21574435,-12476749 }, - { 236881,10476226,57258,-14677024,6472998,2466984,17258519,7256740,8791136,15069930 }, - }, - { - { 1276410,-9371918,22949635,-16322807,-23493039,-5702186,14711875,4874229,-30663140,-2331391 }, - { 5855666,4990204,-13711848,7294284,-7804282,1924647,-1423175,-7912378,-33069337,9234253 }, - { 20590503,-9018988,31529744,-7352666,-2706834,10650548,31559055,-11609587,18979186,13396066 }, - }, - { - { 24474287,4968103,22267082,4407354,24063882,-8325180,-18816887,13594782,33514650,7021958 }, - { -11566906,-6565505,-21365085,15928892,-26158305,4315421,-25948728,-3916677,-21480480,12868082 }, - { -28635013,13504661,19988037,-2132761,21078225,6443208,-21446107,2244500,-12455797,-8089383 }, - }, - { - { -30595528,13793479,-5852820,319136,-25723172,-6263899,33086546,8957937,-15233648,5540521 }, - { -11630176,-11503902,-8119500,-7643073,2620056,1022908,-23710744,-1568984,-16128528,-14962807 }, - { 23152971,775386,27395463,14006635,-9701118,4649512,1689819,892185,-11513277,-15205948 }, - }, - { - { 9770129,9586738,26496094,4324120,1556511,-3550024,27453819,4763127,-19179614,5867134 }, - { -32765025,1927590,31726409,-4753295,23962434,-16019500,27846559,5931263,-29749703,-16108455 }, - { 27461885,-2977536,22380810,1815854,-23033753,-3031938,7283490,-15148073,-19526700,7734629 }, - }, -}, -{ - { - { -8010264,-9590817,-11120403,6196038,29344158,-13430885,7585295,-3176626,18549497,15302069 }, - { -32658337,-6171222,-7672793,-11051681,6258878,13504381,10458790,-6418461,-8872242,8424746 }, - { 24687205,8613276,-30667046,-3233545,1863892,-1830544,19206234,7134917,-11284482,-828919 }, - }, - { - { 11334899,-9218022,8025293,12707519,17523892,-10476071,10243738,-14685461,-5066034,16498837 }, - { 8911542,6887158,-9584260,-6958590,11145641,-9543680,17303925,-14124238,6536641,10543906 }, - { -28946384,15479763,-17466835,568876,-1497683,11223454,-2669190,-16625574,-27235709,8876771 }, - }, - { - { -25742899,-12566864,-15649966,-846607,-33026686,-796288,-33481822,15824474,-604426,-9039817 }, - { 10330056,70051,7957388,-9002667,9764902,15609756,27698697,-4890037,1657394,3084098 }, - { 10477963,-7470260,12119566,-13250805,29016247,-5365589,31280319,14396151,-30233575,15272409 }, - }, - { - { -12288309,3169463,28813183,16658753,25116432,-5630466,-25173957,-12636138,-25014757,1950504 }, - { -26180358,9489187,11053416,-14746161,-31053720,5825630,-8384306,-8767532,15341279,8373727 }, - { 28685821,7759505,-14378516,-12002860,-31971820,4079242,298136,-10232602,-2878207,15190420 }, - }, - { - { -32932876,13806336,-14337485,-15794431,-24004620,10940928,8669718,2742393,-26033313,-6875003 }, - { -1580388,-11729417,-25979658,-11445023,-17411874,-10912854,9291594,-16247779,-12154742,6048605 }, - { -30305315,14843444,1539301,11864366,20201677,1900163,13934231,5128323,11213262,9168384 }, - }, - { - { -26280513,11007847,19408960,-940758,-18592965,-4328580,-5088060,-11105150,20470157,-16398701 }, - { -23136053,9282192,14855179,-15390078,-7362815,-14408560,-22783952,14461608,14042978,5230683 }, - { 29969567,-2741594,-16711867,-8552442,9175486,-2468974,21556951,3506042,-5933891,-12449708 }, - }, - { - { -3144746,8744661,19704003,4581278,-20430686,6830683,-21284170,8971513,-28539189,15326563 }, - { -19464629,10110288,-17262528,-3503892,-23500387,1355669,-15523050,15300988,-20514118,9168260 }, - { -5353335,4488613,-23803248,16314347,7780487,-15638939,-28948358,9601605,33087103,-9011387 }, - }, - { - { -19443170,-15512900,-20797467,-12445323,-29824447,10229461,-27444329,-15000531,-5996870,15664672 }, - { 23294591,-16632613,-22650781,-8470978,27844204,11461195,13099750,-2460356,18151676,13417686 }, - { -24722913,-4176517,-31150679,5988919,-26858785,6685065,1661597,-12551441,15271676,-15452665 }, - }, -}, -{ - { - { 11433042,-13228665,8239631,-5279517,-1985436,-725718,-18698764,2167544,-6921301,-13440182 }, - { -31436171,15575146,30436815,12192228,-22463353,9395379,-9917708,-8638997,12215110,12028277 }, - { 14098400,6555944,23007258,5757252,-15427832,-12950502,30123440,4617780,-16900089,-655628 }, - }, - { - { -4026201,-15240835,11893168,13718664,-14809462,1847385,-15819999,10154009,23973261,-12684474 }, - { -26531820,-3695990,-1908898,2534301,-31870557,-16550355,18341390,-11419951,32013174,-10103539 }, - { -25479301,10876443,-11771086,-14625140,-12369567,1838104,21911214,6354752,4425632,-837822 }, - }, - { - { -10433389,-14612966,22229858,-3091047,-13191166,776729,-17415375,-12020462,4725005,14044970 }, - { 19268650,-7304421,1555349,8692754,-21474059,-9910664,6347390,-1411784,-19522291,-16109756 }, - { -24864089,12986008,-10898878,-5558584,-11312371,-148526,19541418,8180106,9282262,10282508 }, - }, - { - { -26205082,4428547,-8661196,-13194263,4098402,-14165257,15522535,8372215,5542595,-10702683 }, - { -10562541,14895633,26814552,-16673850,-17480754,-2489360,-2781891,6993761,-18093885,10114655 }, - { -20107055,-929418,31422704,10427861,-7110749,6150669,-29091755,-11529146,25953725,-106158 }, - }, - { - { -4234397,-8039292,-9119125,3046000,2101609,-12607294,19390020,6094296,-3315279,12831125 }, - { -15998678,7578152,5310217,14408357,-33548620,-224739,31575954,6326196,7381791,-2421839 }, - { -20902779,3296811,24736065,-16328389,18374254,7318640,6295303,8082724,-15362489,12339664 }, - }, - { - { 27724736,2291157,6088201,-14184798,1792727,5857634,13848414,15768922,25091167,14856294 }, - { -18866652,8331043,24373479,8541013,-701998,-9269457,12927300,-12695493,-22182473,-9012899 }, - { -11423429,-5421590,11632845,3405020,30536730,-11674039,-27260765,13866390,30146206,9142070 }, - }, - { - { 3924129,-15307516,-13817122,-10054960,12291820,-668366,-27702774,9326384,-8237858,4171294 }, - { -15921940,16037937,6713787,16606682,-21612135,2790944,26396185,3731949,345228,-5462949 }, - { -21327538,13448259,25284571,1143661,20614966,-8849387,2031539,-12391231,-16253183,-13582083 }, - }, - { - { 31016211,-16722429,26371392,-14451233,-5027349,14854137,17477601,3842657,28012650,-16405420 }, - { -5075835,9368966,-8562079,-4600902,-15249953,6970560,-9189873,16292057,-8867157,3507940 }, - { 29439664,3537914,23333589,6997794,-17555561,-11018068,-15209202,-15051267,-9164929,6580396 }, - }, -}, -{ - { - { -12185861,-7679788,16438269,10826160,-8696817,-6235611,17860444,-9273846,-2095802,9304567 }, - { 20714564,-4336911,29088195,7406487,11426967,-5095705,14792667,-14608617,5289421,-477127 }, - { -16665533,-10650790,-6160345,-13305760,9192020,-1802462,17271490,12349094,26939669,-3752294 }, - }, - { - { -12889898,9373458,31595848,16374215,21471720,13221525,-27283495,-12348559,-3698806,117887 }, - { 22263325,-6560050,3984570,-11174646,-15114008,-566785,28311253,5358056,-23319780,541964 }, - { 16259219,3261970,2309254,-15534474,-16885711,-4581916,24134070,-16705829,-13337066,-13552195 }, - }, - { - { 9378160,-13140186,-22845982,-12745264,28198281,-7244098,-2399684,-717351,690426,14876244 }, - { 24977353,-314384,-8223969,-13465086,28432343,-1176353,-13068804,-12297348,-22380984,6618999 }, - { -1538174,11685646,12944378,13682314,-24389511,-14413193,8044829,-13817328,32239829,-5652762 }, - }, - { - { -18603066,4762990,-926250,8885304,-28412480,-3187315,9781647,-10350059,32779359,5095274 }, - { -33008130,-5214506,-32264887,-3685216,9460461,-9327423,-24601656,14506724,21639561,-2630236 }, - { -16400943,-13112215,25239338,15531969,3987758,-4499318,-1289502,-6863535,17874574,558605 }, - }, - { - { -13600129,10240081,9171883,16131053,-20869254,9599700,33499487,5080151,2085892,5119761 }, - { -22205145,-2519528,-16381601,414691,-25019550,2170430,30634760,-8363614,-31999993,-5759884 }, - { -6845704,15791202,8550074,-1312654,29928809,-12092256,27534430,-7192145,-22351378,12961482 }, - }, - { - { -24492060,-9570771,10368194,11582341,-23397293,-2245287,16533930,8206996,-30194652,-5159638 }, - { -11121496,-3382234,2307366,6362031,-135455,8868177,-16835630,7031275,7589640,8945490 }, - { -32152748,8917967,6661220,-11677616,-1192060,-15793393,7251489,-11182180,24099109,-14456170 }, - }, - { - { 5019558,-7907470,4244127,-14714356,-26933272,6453165,-19118182,-13289025,-6231896,-10280736 }, - { 10853594,10721687,26480089,5861829,-22995819,1972175,-1866647,-10557898,-3363451,-6441124 }, - { -17002408,5906790,221599,-6563147,7828208,-13248918,24362661,-2008168,-13866408,7421392 }, - }, - { - { 8139927,-6546497,32257646,-5890546,30375719,1886181,-21175108,15441252,28826358,-4123029 }, - { 6267086,9695052,7709135,-16603597,-32869068,-1886135,14795160,-7840124,13746021,-1742048 }, - { 28584902,7787108,-6732942,-15050729,22846041,-7571236,-3181936,-363524,4771362,-8419958 }, - }, -}, -{ - { - { 24949256,6376279,-27466481,-8174608,-18646154,-9930606,33543569,-12141695,3569627,11342593 }, - { 26514989,4740088,27912651,3697550,19331575,-11472339,6809886,4608608,7325975,-14801071 }, - { -11618399,-14554430,-24321212,7655128,-1369274,5214312,-27400540,10258390,-17646694,-8186692 }, - }, - { - { 11431204,15823007,26570245,14329124,18029990,4796082,-31446179,15580664,9280358,-3973687 }, - { -160783,-10326257,-22855316,-4304997,-20861367,-13621002,-32810901,-11181622,-15545091,4387441 }, - { -20799378,12194512,3937617,-5805892,-27154820,9340370,-24513992,8548137,20617071,-7482001 }, - }, - { - { -938825,-3930586,-8714311,16124718,24603125,-6225393,-13775352,-11875822,24345683,10325460 }, - { -19855277,-1568885,-22202708,8714034,14007766,6928528,16318175,-1010689,4766743,3552007 }, - { -21751364,-16730916,1351763,-803421,-4009670,3950935,3217514,14481909,10988822,-3994762 }, - }, - { - { 15564307,-14311570,3101243,5684148,30446780,-8051356,12677127,-6505343,-8295852,13296005 }, - { -9442290,6624296,-30298964,-11913677,-4670981,-2057379,31521204,9614054,-30000824,12074674 }, - { 4771191,-135239,14290749,-13089852,27992298,14998318,-1413936,-1556716,29832613,-16391035 }, - }, - { - { 7064884,-7541174,-19161962,-5067537,-18891269,-2912736,25825242,5293297,-27122660,13101590 }, - { -2298563,2439670,-7466610,1719965,-27267541,-16328445,32512469,-5317593,-30356070,-4190957 }, - { -30006540,10162316,-33180176,3981723,-16482138,-13070044,14413974,9515896,19568978,9628812 }, - }, - { - { 33053803,199357,15894591,1583059,27380243,-4580435,-17838894,-6106839,-6291786,3437740 }, - { -18978877,3884493,19469877,12726490,15913552,13614290,-22961733,70104,7463304,4176122 }, - { -27124001,10659917,11482427,-16070381,12771467,-6635117,-32719404,-5322751,24216882,5944158 }, - }, - { - { 8894125,7450974,-2664149,-9765752,-28080517,-12389115,19345746,14680796,11632993,5847885 }, - { 26942781,-2315317,9129564,-4906607,26024105,11769399,-11518837,6367194,-9727230,4782140 }, - { 19916461,-4828410,-22910704,-11414391,25606324,-5972441,33253853,8220911,6358847,-1873857 }, - }, - { - { 801428,-2081702,16569428,11065167,29875704,96627,7908388,-4480480,-13538503,1387155 }, - { 19646058,5720633,-11416706,12814209,11607948,12749789,14147075,15156355,-21866831,11835260 }, - { 19299512,1155910,28703737,14890794,2925026,7269399,26121523,15467869,-26560550,5052483 }, - }, -}, -{ - { - { -3017432,10058206,1980837,3964243,22160966,12322533,-6431123,-12618185,12228557,-7003677 }, - { 32944382,14922211,-22844894,5188528,21913450,-8719943,4001465,13238564,-6114803,8653815 }, - { 22865569,-4652735,27603668,-12545395,14348958,8234005,24808405,5719875,28483275,2841751 }, - }, - { - { -16420968,-1113305,-327719,-12107856,21886282,-15552774,-1887966,-315658,19932058,-12739203 }, - { -11656086,10087521,-8864888,-5536143,-19278573,-3055912,3999228,13239134,-4777469,-13910208 }, - { 1382174,-11694719,17266790,9194690,-13324356,9720081,20403944,11284705,-14013818,3093230 }, - }, - { - { 16650921,-11037932,-1064178,1570629,-8329746,7352753,-302424,16271225,-24049421,-6691850 }, - { -21911077,-5927941,-4611316,-5560156,-31744103,-10785293,24123614,15193618,-21652117,-16739389 }, - { -9935934,-4289447,-25279823,4372842,2087473,10399484,31870908,14690798,17361620,11864968 }, - }, - { - { -11307610,6210372,13206574,5806320,-29017692,-13967200,-12331205,-7486601,-25578460,-16240689 }, - { 14668462,-12270235,26039039,15305210,25515617,4542480,10453892,6577524,9145645,-6443880 }, - { 5974874,3053895,-9433049,-10385191,-31865124,3225009,-7972642,3936128,-5652273,-3050304 }, - }, - { - { 30625386,-4729400,-25555961,-12792866,-20484575,7695099,17097188,-16303496,-27999779,1803632 }, - { -3553091,9865099,-5228566,4272701,-5673832,-16689700,14911344,12196514,-21405489,7047412 }, - { 20093277,9920966,-11138194,-5343857,13161587,12044805,-32856851,4124601,-32343828,-10257566 }, - }, - { - { -20788824,14084654,-13531713,7842147,19119038,-13822605,4752377,-8714640,-21679658,2288038 }, - { -26819236,-3283715,29965059,3039786,-14473765,2540457,29457502,14625692,-24819617,12570232 }, - { -1063558,-11551823,16920318,12494842,1278292,-5869109,-21159943,-3498680,-11974704,4724943 }, - }, - { - { 17960970,-11775534,-4140968,-9702530,-8876562,-1410617,-12907383,-8659932,-29576300,1903856 }, - { 23134274,-14279132,-10681997,-1611936,20684485,15770816,-12989750,3190296,26955097,14109738 }, - { 15308788,5320727,-30113809,-14318877,22902008,7767164,29425325,-11277562,31960942,11934971 }, - }, - { - { -27395711,8435796,4109644,12222639,-24627868,14818669,20638173,4875028,10491392,1379718 }, - { -13159415,9197841,3875503,-8936108,-1383712,-5879801,33518459,16176658,21432314,12180697 }, - { -11787308,11500838,13787581,-13832590,-22430679,10140205,1465425,12689540,-10301319,-13872883 }, - }, -}, -{ - { - { 5414091,-15386041,-21007664,9643570,12834970,1186149,-2622916,-1342231,26128231,6032912 }, - { -26337395,-13766162,32496025,-13653919,17847801,-12669156,3604025,8316894,-25875034,-10437358 }, - { 3296484,6223048,24680646,-12246460,-23052020,5903205,-8862297,-4639164,12376617,3188849 }, - }, - { - { 29190488,-14659046,27549113,-1183516,3520066,-10697301,32049515,-7309113,-16109234,-9852307 }, - { -14744486,-9309156,735818,-598978,-20407687,-5057904,25246078,-15795669,18640741,-960977 }, - { -6928835,-16430795,10361374,5642961,4910474,12345252,-31638386,-494430,10530747,1053335 }, - }, - { - { -29265967,-14186805,-13538216,-12117373,-19457059,-10655384,-31462369,-2948985,24018831,15026644 }, - { -22592535,-3145277,-2289276,5953843,-13440189,9425631,25310643,13003497,-2314791,-15145616 }, - { -27419985,-603321,-8043984,-1669117,-26092265,13987819,-27297622,187899,-23166419,-2531735 }, - }, - { - { -21744398,-13810475,1844840,5021428,-10434399,-15911473,9716667,16266922,-5070217,726099 }, - { 29370922,-6053998,7334071,-15342259,9385287,2247707,-13661962,-4839461,30007388,-15823341 }, - { -936379,16086691,23751945,-543318,-1167538,-5189036,9137109,730663,9835848,4555336 }, - }, - { - { -23376435,1410446,-22253753,-12899614,30867635,15826977,17693930,544696,-11985298,12422646 }, - { 31117226,-12215734,-13502838,6561947,-9876867,-12757670,-5118685,-4096706,29120153,13924425 }, - { -17400879,-14233209,19675799,-2734756,-11006962,-5858820,-9383939,-11317700,7240931,-237388 }, - }, - { - { -31361739,-11346780,-15007447,-5856218,-22453340,-12152771,1222336,4389483,3293637,-15551743 }, - { -16684801,-14444245,11038544,11054958,-13801175,-3338533,-24319580,7733547,12796905,-6335822 }, - { -8759414,-10817836,-25418864,10783769,-30615557,-9746811,-28253339,3647836,3222231,-11160462 }, - }, - { - { 18606113,1693100,-25448386,-15170272,4112353,10045021,23603893,-2048234,-7550776,2484985 }, - { 9255317,-3131197,-12156162,-1004256,13098013,-9214866,16377220,-2102812,-19802075,-3034702 }, - { -22729289,7496160,-5742199,11329249,19991973,-3347502,-31718148,9936966,-30097688,-10618797 }, - }, - { - { 21878590,-5001297,4338336,13643897,-3036865,13160960,19708896,5415497,-7360503,-4109293 }, - { 27736861,10103576,12500508,8502413,-3413016,-9633558,10436918,-1550276,-23659143,-8132100 }, - { 19492550,-12104365,-29681976,-852630,-3208171,12403437,30066266,8367329,13243957,8709688 }, - }, -}, -{ - { - { 12015105,2801261,28198131,10151021,24818120,-4743133,-11194191,-5645734,5150968,7274186 }, - { 2831366,-12492146,1478975,6122054,23825128,-12733586,31097299,6083058,31021603,-9793610 }, - { -2529932,-2229646,445613,10720828,-13849527,-11505937,-23507731,16354465,15067285,-14147707 }, - }, - { - { 7840942,14037873,-33364863,15934016,-728213,-3642706,21403988,1057586,-19379462,-12403220 }, - { 915865,-16469274,15608285,-8789130,-24357026,6060030,-17371319,8410997,-7220461,16527025 }, - { 32922597,-556987,20336074,-16184568,10903705,-5384487,16957574,52992,23834301,6588044 }, - }, - { - { 32752030,11232950,3381995,-8714866,22652988,-10744103,17159699,16689107,-20314580,-1305992 }, - { -4689649,9166776,-25710296,-10847306,11576752,12733943,7924251,-2752281,1976123,-7249027 }, - { 21251222,16309901,-2983015,-6783122,30810597,12967303,156041,-3371252,12331345,-8237197 }, - }, - { - { 8651614,-4477032,-16085636,-4996994,13002507,2950805,29054427,-5106970,10008136,-4667901 }, - { 31486080,15114593,-14261250,12951354,14369431,-7387845,16347321,-13662089,8684155,-10532952 }, - { 19443825,11385320,24468943,-9659068,-23919258,2187569,-26263207,-6086921,31316348,14219878 }, - }, - { - { -28594490,1193785,32245219,11392485,31092169,15722801,27146014,6992409,29126555,9207390 }, - { 32382935,1110093,18477781,11028262,-27411763,-7548111,-4980517,10843782,-7957600,-14435730 }, - { 2814918,7836403,27519878,-7868156,-20894015,-11553689,-21494559,8550130,28346258,1994730 }, - }, - { - { -19578299,8085545,-14000519,-3948622,2785838,-16231307,-19516951,7174894,22628102,8115180 }, - { -30405132,955511,-11133838,-15078069,-32447087,-13278079,-25651578,3317160,-9943017,930272 }, - { -15303681,-6833769,28856490,1357446,23421993,1057177,24091212,-1388970,-22765376,-10650715 }, - }, - { - { -22751231,-5303997,-12907607,-12768866,-15811511,-7797053,-14839018,-16554220,-1867018,8398970 }, - { -31969310,2106403,-4736360,1362501,12813763,16200670,22981545,-6291273,18009408,-15772772 }, - { -17220923,-9545221,-27784654,14166835,29815394,7444469,29551787,-3727419,19288549,1325865 }, - }, - { - { 15100157,-15835752,-23923978,-1005098,-26450192,15509408,12376730,-3479146,33166107,-8042750 }, - { 20909231,13023121,-9209752,16251778,-5778415,-8094914,12412151,10018715,2213263,-13878373 }, - { 32529814,-11074689,30361439,-16689753,-9135940,1513226,22922121,6382134,-5766928,8371348 }, - }, -}, -{ - { - { 9923462,11271500,12616794,3544722,-29998368,-1721626,12891687,-8193132,-26442943,10486144 }, - { -22597207,-7012665,8587003,-8257861,4084309,-12970062,361726,2610596,-23921530,-11455195 }, - { 5408411,-1136691,-4969122,10561668,24145918,14240566,31319731,-4235541,19985175,-3436086 }, - }, - { - { -13994457,16616821,14549246,3341099,32155958,13648976,-17577068,8849297,65030,8370684 }, - { -8320926,-12049626,31204563,5839400,-20627288,-1057277,-19442942,6922164,12743482,-9800518 }, - { -2361371,12678785,28815050,4759974,-23893047,4884717,23783145,11038569,18800704,255233 }, - }, - { - { -5269658,-1773886,13957886,7990715,23132995,728773,13393847,9066957,19258688,-14753793 }, - { -2936654,-10827535,-10432089,14516793,-3640786,4372541,-31934921,2209390,-1524053,2055794 }, - { 580882,16705327,5468415,-2683018,-30926419,-14696000,-7203346,-8994389,-30021019,7394435 }, - }, - { - { 23838809,1822728,-15738443,15242727,8318092,-3733104,-21672180,-3492205,-4821741,14799921 }, - { 13345610,9759151,3371034,-16137791,16353039,8577942,31129804,13496856,-9056018,7402518 }, - { 2286874,-4435931,-20042458,-2008336,-13696227,5038122,11006906,-15760352,8205061,1607563 }, - }, - { - { 14414086,-8002132,3331830,-3208217,22249151,-5594188,18364661,-2906958,30019587,-9029278 }, - { -27688051,1585953,-10775053,931069,-29120221,-11002319,-14410829,12029093,9944378,8024 }, - { 4368715,-3709630,29874200,-15022983,-20230386,-11410704,-16114594,-999085,-8142388,5640030 }, - }, - { - { 10299610,13746483,11661824,16234854,7630238,5998374,9809887,-16694564,15219798,-14327783 }, - { 27425505,-5719081,3055006,10660664,23458024,595578,-15398605,-1173195,-18342183,9742717 }, - { 6744077,2427284,26042789,2720740,-847906,1118974,32324614,7406442,12420155,1994844 }, - }, - { - { 14012521,-5024720,-18384453,-9578469,-26485342,-3936439,-13033478,-10909803,24319929,-6446333 }, - { 16412690,-4507367,10772641,15929391,-17068788,-4658621,10555945,-10484049,-30102368,-4739048 }, - { 22397382,-7767684,-9293161,-12792868,17166287,-9755136,-27333065,6199366,21880021,-12250760 }, - }, - { - { -4283307,5368523,-31117018,8163389,-30323063,3209128,16557151,8890729,8840445,4957760 }, - { -15447727,709327,-6919446,-10870178,-29777922,6522332,-21720181,12130072,-14796503,5005757 }, - { -2114751,-14308128,23019042,15765735,-25269683,6002752,10183197,-13239326,-16395286,-2176112 }, - }, -}, -{ - { - { -19025756,1632005,13466291,-7995100,-23640451,16573537,-32013908,-3057104,22208662,2000468 }, - { 3065073,-1412761,-25598674,-361432,-17683065,-5703415,-8164212,11248527,-3691214,-7414184 }, - { 10379208,-6045554,8877319,1473647,-29291284,-12507580,16690915,2553332,-3132688,16400289 }, - }, - { - { 15716668,1254266,-18472690,7446274,-8448918,6344164,-22097271,-7285580,26894937,9132066 }, - { 24158887,12938817,11085297,-8177598,-28063478,-4457083,-30576463,64452,-6817084,-2692882 }, - { 13488534,7794716,22236231,5989356,25426474,-12578208,2350710,-3418511,-4688006,2364226 }, - }, - { - { 16335052,9132434,25640582,6678888,1725628,8517937,-11807024,-11697457,15445875,-7798101 }, - { 29004207,-7867081,28661402,-640412,-12794003,-7943086,31863255,-4135540,-278050,-15759279 }, - { -6122061,-14866665,-28614905,14569919,-10857999,-3591829,10343412,-6976290,-29828287,-10815811 }, - }, - { - { 27081650,3463984,14099042,-4517604,1616303,-6205604,29542636,15372179,17293797,960709 }, - { 20263915,11434237,-5765435,11236810,13505955,-10857102,-16111345,6493122,-19384511,7639714 }, - { -2830798,-14839232,25403038,-8215196,-8317012,-16173699,18006287,-16043750,29994677,-15808121 }, - }, - { - { 9769828,5202651,-24157398,-13631392,-28051003,-11561624,-24613141,-13860782,-31184575,709464 }, - { 12286395,13076066,-21775189,-1176622,-25003198,4057652,-32018128,-8890874,16102007,13205847 }, - { 13733362,5599946,10557076,3195751,-5557991,8536970,-25540170,8525972,10151379,10394400 }, - }, - { - { 4024660,-16137551,22436262,12276534,-9099015,-2686099,19698229,11743039,-33302334,8934414 }, - { -15879800,-4525240,-8580747,-2934061,14634845,-698278,-9449077,3137094,-11536886,11721158 }, - { 17555939,-5013938,8268606,2331751,-22738815,9761013,9319229,8835153,-9205489,-1280045 }, - }, - { - { -461409,-7830014,20614118,16688288,-7514766,-4807119,22300304,505429,6108462,-6183415 }, - { -5070281,12367917,-30663534,3234473,32617080,-8422642,29880583,-13483331,-26898490,-7867459 }, - { -31975283,5726539,26934134,10237677,-3173717,-605053,24199304,3795095,7592688,-14992079 }, - }, - { - { 21594432,-14964228,17466408,-4077222,32537084,2739898,6407723,12018833,-28256052,4298412 }, - { -20650503,-11961496,-27236275,570498,3767144,-1717540,13891942,-1569194,13717174,10805743 }, - { -14676630,-15644296,15287174,11927123,24177847,-8175568,-796431,14860609,-26938930,-5863836 }, - }, -}, -{ - { - { 12962541,5311799,-10060768,11658280,18855286,-7954201,13286263,-12808704,-4381056,9882022 }, - { 18512079,11319350,-20123124,15090309,18818594,5271736,-22727904,3666879,-23967430,-3299429 }, - { -6789020,-3146043,16192429,13241070,15898607,-14206114,-10084880,-6661110,-2403099,5276065 }, - }, - { - { 30169808,-5317648,26306206,-11750859,27814964,7069267,7152851,3684982,1449224,13082861 }, - { 10342826,3098505,2119311,193222,25702612,12233820,23697382,15056736,-21016438,-8202000 }, - { -33150110,3261608,22745853,7948688,19370557,-15177665,-26171976,6482814,-10300080,-11060101 }, - }, - { - { 32869458,-5408545,25609743,15678670,-10687769,-15471071,26112421,2521008,-22664288,6904815 }, - { 29506923,4457497,3377935,-9796444,-30510046,12935080,1561737,3841096,-29003639,-6657642 }, - { 10340844,-6630377,-18656632,-2278430,12621151,-13339055,30878497,-11824370,-25584551,5181966 }, - }, - { - { 25940115,-12658025,17324188,-10307374,-8671468,15029094,24396252,-16450922,-2322852,-12388574 }, - { -21765684,9916823,-1300409,4079498,-1028346,11909559,1782390,12641087,20603771,-6561742 }, - { -18882287,-11673380,24849422,11501709,13161720,-4768874,1925523,11914390,4662781,7820689 }, - }, - { - { 12241050,-425982,8132691,9393934,32846760,-1599620,29749456,12172924,16136752,15264020 }, - { -10349955,-14680563,-8211979,2330220,-17662549,-14545780,10658213,6671822,19012087,3772772 }, - { 3753511,-3421066,10617074,2028709,14841030,-6721664,28718732,-15762884,20527771,12988982 }, - }, - { - { -14822485,-5797269,-3707987,12689773,-898983,-10914866,-24183046,-10564943,3299665,-12424953 }, - { -16777703,-15253301,-9642417,4978983,3308785,8755439,6943197,6461331,-25583147,8991218 }, - { -17226263,1816362,-1673288,-6086439,31783888,-8175991,-32948145,7417950,-30242287,1507265 }, - }, - { - { 29692663,6829891,-10498800,4334896,20945975,-11906496,-28887608,8209391,14606362,-10647073 }, - { -3481570,8707081,32188102,5672294,22096700,1711240,-33020695,9761487,4170404,-2085325 }, - { -11587470,14855945,-4127778,-1531857,-26649089,15084046,22186522,16002000,-14276837,-8400798 }, - }, - { - { -4811456,13761029,-31703877,-2483919,-3312471,7869047,-7113572,-9620092,13240845,10965870 }, - { -7742563,-8256762,-14768334,-13656260,-23232383,12387166,4498947,14147411,29514390,4302863 }, - { -13413405,-12407859,20757302,-13801832,14785143,8976368,-5061276,-2144373,17846988,-13971927 }, - }, -}, -{ - { - { -2244452,-754728,-4597030,-1066309,-6247172,1455299,-21647728,-9214789,-5222701,12650267 }, - { -9906797,-16070310,21134160,12198166,-27064575,708126,387813,13770293,-19134326,10958663 }, - { 22470984,12369526,23446014,-5441109,-21520802,-9698723,-11772496,-11574455,-25083830,4271862 }, - }, - { - { -25169565,-10053642,-19909332,15361595,-5984358,2159192,75375,-4278529,-32526221,8469673 }, - { 15854970,4148314,-8893890,7259002,11666551,13824734,-30531198,2697372,24154791,-9460943 }, - { 15446137,-15806644,29759747,14019369,30811221,-9610191,-31582008,12840104,24913809,9815020 }, - }, - { - { -4709286,-5614269,-31841498,-12288893,-14443537,10799414,-9103676,13438769,18735128,9466238 }, - { 11933045,9281483,5081055,-5183824,-2628162,-4905629,-7727821,-10896103,-22728655,16199064 }, - { 14576810,379472,-26786533,-8317236,-29426508,-10812974,-102766,1876699,30801119,2164795 }, - }, - { - { 15995086,3199873,13672555,13712240,-19378835,-4647646,-13081610,-15496269,-13492807,1268052 }, - { -10290614,-3659039,-3286592,10948818,23037027,3794475,-3470338,-12600221,-17055369,3565904 }, - { 29210088,-9419337,-5919792,-4952785,10834811,-13327726,-16512102,-10820713,-27162222,-14030531 }, - }, - { - { -13161890,15508588,16663704,-8156150,-28349942,9019123,-29183421,-3769423,2244111,-14001979 }, - { -5152875,-3800936,-9306475,-6071583,16243069,14684434,-25673088,-16180800,13491506,4641841 }, - { 10813417,643330,-19188515,-728916,30292062,-16600078,27548447,-7721242,14476989,-12767431 }, - }, - { - { 10292079,9984945,6481436,8279905,-7251514,7032743,27282937,-1644259,-27912810,12651324 }, - { -31185513,-813383,22271204,11835308,10201545,15351028,17099662,3988035,21721536,-3148940 }, - { 10202177,-6545839,-31373232,-9574638,-32150642,-8119683,-12906320,3852694,13216206,14842320 }, - }, - { - { -15815640,-10601066,-6538952,-7258995,-6984659,-6581778,-31500847,13765824,-27434397,9900184 }, - { 14465505,-13833331,-32133984,-14738873,-27443187,12990492,33046193,15796406,-7051866,-8040114 }, - { 30924417,-8279620,6359016,-12816335,16508377,9071735,-25488601,15413635,9524356,-7018878 }, - }, - { - { 12274201,-13175547,32627641,-1785326,6736625,13267305,5237659,-5109483,15663516,4035784 }, - { -2951309,8903985,17349946,601635,-16432815,-4612556,-13732739,-15889334,-22258478,4659091 }, - { -16916263,-4952973,-30393711,-15158821,20774812,15897498,5736189,15026997,-2178256,-13455585 }, - }, -}, -{ - { - { -8858980,-2219056,28571666,-10155518,-474467,-10105698,-3801496,278095,23440562,-290208 }, - { 10226241,-5928702,15139956,120818,-14867693,5218603,32937275,11551483,-16571960,-7442864 }, - { 17932739,-12437276,-24039557,10749060,11316803,7535897,22503767,5561594,-3646624,3898661 }, - }, - { - { 7749907,-969567,-16339731,-16464,-25018111,15122143,-1573531,7152530,21831162,1245233 }, - { 26958459,-14658026,4314586,8346991,-5677764,11960072,-32589295,-620035,-30402091,-16716212 }, - { -12165896,9166947,33491384,13673479,29787085,13096535,6280834,14587357,-22338025,13987525 }, - }, - { - { -24349909,7778775,21116000,15572597,-4833266,-5357778,-4300898,-5124639,-7469781,-2858068 }, - { 9681908,-6737123,-31951644,13591838,-6883821,386950,31622781,6439245,-14581012,4091397 }, - { -8426427,1470727,-28109679,-1596990,3978627,-5123623,-19622683,12092163,29077877,-14741988 }, - }, - { - { 5269168,-6859726,-13230211,-8020715,25932563,1763552,-5606110,-5505881,-20017847,2357889 }, - { 32264008,-15407652,-5387735,-1160093,-2091322,-3946900,23104804,-12869908,5727338,189038 }, - { 14609123,-8954470,-6000566,-16622781,-14577387,-7743898,-26745169,10942115,-25888931,-14884697 }, - }, - { - { 20513500,5557931,-15604613,7829531,26413943,-2019404,-21378968,7471781,13913677,-5137875 }, - { -25574376,11967826,29233242,12948236,-6754465,4713227,-8940970,14059180,12878652,8511905 }, - { -25656801,3393631,-2955415,-7075526,-2250709,9366908,-30223418,6812974,5568676,-3127656 }, - }, - { - { 11630004,12144454,2116339,13606037,27378885,15676917,-17408753,-13504373,-14395196,8070818 }, - { 27117696,-10007378,-31282771,-5570088,1127282,12772488,-29845906,10483306,-11552749,-1028714 }, - { 10637467,-5688064,5674781,1072708,-26343588,-6982302,-1683975,9177853,-27493162,15431203 }, - }, - { - { 20525145,10892566,-12742472,12779443,-29493034,16150075,-28240519,14943142,-15056790,-7935931 }, - { -30024462,5626926,-551567,-9981087,753598,11981191,25244767,-3239766,-3356550,9594024 }, - { -23752644,2636870,-5163910,-10103818,585134,7877383,11345683,-6492290,13352335,-10977084 }, - }, - { - { -1931799,-5407458,3304649,-12884869,17015806,-4877091,-29783850,-7752482,-13215537,-319204 }, - { 20239939,6607058,6203985,3483793,-18386976,-779229,-20723742,15077870,-22750759,14523817 }, - { 27406042,-6041657,27423596,-4497394,4996214,10002360,-28842031,-4545494,-30172742,-4805667 }, - }, -}, -{ - { - { 11374242,12660715,17861383,-12540833,10935568,1099227,-13886076,-9091740,-27727044,11358504 }, - { -12730809,10311867,1510375,10778093,-2119455,-9145702,32676003,11149336,-26123651,4985768 }, - { -19096303,341147,-6197485,-239033,15756973,-8796662,-983043,13794114,-19414307,-15621255 }, - }, - { - { 6490081,11940286,25495923,-7726360,8668373,-8751316,3367603,6970005,-1691065,-9004790 }, - { 1656497,13457317,15370807,6364910,13605745,8362338,-19174622,-5475723,-16796596,-5031438 }, - { -22273315,-13524424,-64685,-4334223,-18605636,-10921968,-20571065,-7007978,-99853,-10237333 }, - }, - { - { 17747465,10039260,19368299,-4050591,-20630635,-16041286,31992683,-15857976,-29260363,-5511971 }, - { 31932027,-4986141,-19612382,16366580,22023614,88450,11371999,-3744247,4882242,-10626905 }, - { 29796507,37186,19818052,10115756,-11829032,3352736,18551198,3272828,-5190932,-4162409 }, - }, - { - { 12501286,4044383,-8612957,-13392385,-32430052,5136599,-19230378,-3529697,330070,-3659409 }, - { 6384877,2899513,17807477,7663917,-2358888,12363165,25366522,-8573892,-271295,12071499 }, - { -8365515,-4042521,25133448,-4517355,-6211027,2265927,-32769618,1936675,-5159697,3829363 }, - }, - { - { 28425966,-5835433,-577090,-4697198,-14217555,6870930,7921550,-6567787,26333140,14267664 }, - { -11067219,11871231,27385719,-10559544,-4585914,-11189312,10004786,-8709488,-21761224,8930324 }, - { -21197785,-16396035,25654216,-1725397,12282012,11008919,1541940,4757911,-26491501,-16408940 }, - }, - { - { 13537262,-7759490,-20604840,10961927,-5922820,-13218065,-13156584,6217254,-15943699,13814990 }, - { -17422573,15157790,18705543,29619,24409717,-260476,27361681,9257833,-1956526,-1776914 }, - { -25045300,-10191966,15366585,15166509,-13105086,8423556,-29171540,12361135,-18685978,4578290 }, - }, - { - { 24579768,3711570,1342322,-11180126,-27005135,14124956,-22544529,14074919,21964432,8235257 }, - { -6528613,-2411497,9442966,-5925588,12025640,-1487420,-2981514,-1669206,13006806,2355433 }, - { -16304899,-13605259,-6632427,-5142349,16974359,-10911083,27202044,1719366,1141648,-12796236 }, - }, - { - { -12863944,-13219986,-8318266,-11018091,-6810145,-4843894,13475066,-3133972,32674895,13715045 }, - { 11423335,-5468059,32344216,8962751,24989809,9241752,-13265253,16086212,-28740881,-15642093 }, - { -1409668,12530728,-6368726,10847387,19531186,-14132160,-11709148,7791794,-27245943,4383347 }, - }, -}, -{ - { - { -28970898,5271447,-1266009,-9736989,-12455236,16732599,-4862407,-4906449,27193557,6245191 }, - { -15193956,5362278,-1783893,2695834,4960227,12840725,23061898,3260492,22510453,8577507 }, - { -12632451,11257346,-32692994,13548177,-721004,10879011,31168030,13952092,-29571492,-3635906 }, - }, - { - { 3877321,-9572739,32416692,5405324,-11004407,-13656635,3759769,11935320,5611860,8164018 }, - { -16275802,14667797,15906460,12155291,-22111149,-9039718,32003002,-8832289,5773085,-8422109 }, - { -23788118,-8254300,1950875,8937633,18686727,16459170,-905725,12376320,31632953,190926 }, - }, - { - { -24593607,-16138885,-8423991,13378746,14162407,6901328,-8288749,4508564,-25341555,-3627528 }, - { 8884438,-5884009,6023974,10104341,-6881569,-4941533,18722941,-14786005,-1672488,827625 }, - { -32720583,-16289296,-32503547,7101210,13354605,2659080,-1800575,-14108036,-24878478,1541286 }, - }, - { - { 2901347,-1117687,3880376,-10059388,-17620940,-3612781,-21802117,-3567481,20456845,-1885033 }, - { 27019610,12299467,-13658288,-1603234,-12861660,-4861471,-19540150,-5016058,29439641,15138866 }, - { 21536104,-6626420,-32447818,-10690208,-22408077,5175814,-5420040,-16361163,7779328,109896 }, - }, - { - { 30279744,14648750,-8044871,6425558,13639621,-743509,28698390,12180118,23177719,-554075 }, - { 26572847,3405927,-31701700,12890905,-19265668,5335866,-6493768,2378492,4439158,-13279347 }, - { -22716706,3489070,-9225266,-332753,18875722,-1140095,14819434,-12731527,-17717757,-5461437 }, - }, - { - { -5056483,16566551,15953661,3767752,-10436499,15627060,-820954,2177225,8550082,-15114165 }, - { -18473302,16596775,-381660,15663611,22860960,15585581,-27844109,-3582739,-23260460,-8428588 }, - { -32480551,15707275,-8205912,-5652081,29464558,2713815,-22725137,15860482,-21902570,1494193 }, - }, - { - { -19562091,-14087393,-25583872,-9299552,13127842,759709,21923482,16529112,8742704,12967017 }, - { -28464899,1553205,32536856,-10473729,-24691605,-406174,-8914625,-2933896,-29903758,15553883 }, - { 21877909,3230008,9881174,10539357,-4797115,2841332,11543572,14513274,19375923,-12647961 }, - }, - { - { 8832269,-14495485,13253511,5137575,5037871,4078777,24880818,-6222716,2862653,9455043 }, - { 29306751,5123106,20245049,-14149889,9592566,8447059,-2077124,-2990080,15511449,4789663 }, - { -20679756,7004547,8824831,-9434977,-4045704,-3750736,-5754762,108893,23513200,16652362 }, - }, -}, -{ - { - { -33256173,4144782,-4476029,-6579123,10770039,-7155542,-6650416,-12936300,-18319198,10212860 }, - { 2756081,8598110,7383731,-6859892,22312759,-1105012,21179801,2600940,-9988298,-12506466 }, - { -24645692,13317462,-30449259,-15653928,21365574,-10869657,11344424,864440,-2499677,-16710063 }, - }, - { - { -26432803,6148329,-17184412,-14474154,18782929,-275997,-22561534,211300,2719757,4940997 }, - { -1323882,3911313,-6948744,14759765,-30027150,7851207,21690126,8518463,26699843,5276295 }, - { -13149873,-6429067,9396249,365013,24703301,-10488939,1321586,149635,-15452774,7159369 }, - }, - { - { 9987780,-3404759,17507962,9505530,9731535,-2165514,22356009,8312176,22477218,-8403385 }, - { 18155857,-16504990,19744716,9006923,15154154,-10538976,24256460,-4864995,-22548173,9334109 }, - { 2986088,-4911893,10776628,-3473844,10620590,-7083203,-21413845,14253545,-22587149,536906 }, - }, - { - { 4377756,8115836,24567078,15495314,11625074,13064599,7390551,10589625,10838060,-15420424 }, - { -19342404,867880,9277171,-3218459,-14431572,-1986443,19295826,-15796950,6378260,699185 }, - { 7895026,4057113,-7081772,-13077756,-17886831,-323126,-716039,15693155,-5045064,-13373962 }, - }, - { - { -7737563,-5869402,-14566319,-7406919,11385654,13201616,31730678,-10962840,-3918636,-9669325 }, - { 10188286,-15770834,-7336361,13427543,22223443,14896287,30743455,7116568,-21786507,5427593 }, - { 696102,13206899,27047647,-10632082,15285305,-9853179,10798490,-4578720,19236243,12477404 }, - }, - { - { -11229439,11243796,-17054270,-8040865,-788228,-8167967,-3897669,11180504,-23169516,7733644 }, - { 17800790,-14036179,-27000429,-11766671,23887827,3149671,23466177,-10538171,10322027,15313801 }, - { 26246234,11968874,32263343,-5468728,6830755,-13323031,-15794704,-101982,-24449242,10890804 }, - }, - { - { -31365647,10271363,-12660625,-6267268,16690207,-13062544,-14982212,16484931,25180797,-5334884 }, - { -586574,10376444,-32586414,-11286356,19801893,10997610,2276632,9482883,316878,13820577 }, - { -9882808,-4510367,-2115506,16457136,-11100081,11674996,30756178,-7515054,30696930,-3712849 }, - }, - { - { 32988917,-9603412,12499366,7910787,-10617257,-11931514,-7342816,-9985397,-32349517,7392473 }, - { -8855661,15927861,9866406,-3649411,-2396914,-16655781,-30409476,-9134995,25112947,-2926644 }, - { -2504044,-436966,25621774,-5678772,15085042,-5479877,-24884878,-13526194,5537438,-13914319 }, - }, -}, -{ - { - { -11225584,2320285,-9584280,10149187,-33444663,5808648,-14876251,-1729667,31234590,6090599 }, - { -9633316,116426,26083934,2897444,-6364437,-2688086,609721,15878753,-6970405,-9034768 }, - { -27757857,247744,-15194774,-9002551,23288161,-10011936,-23869595,6503646,20650474,1804084 }, - }, - { - { -27589786,15456424,8972517,8469608,15640622,4439847,3121995,-10329713,27842616,-202328 }, - { -15306973,2839644,22530074,10026331,4602058,5048462,28248656,5031932,-11375082,12714369 }, - { 20807691,-7270825,29286141,11421711,-27876523,-13868230,-21227475,1035546,-19733229,12796920 }, - }, - { - { 12076899,-14301286,-8785001,-11848922,-25012791,16400684,-17591495,-12899438,3480665,-15182815 }, - { -32361549,5457597,28548107,7833186,7303070,-11953545,-24363064,-15921875,-33374054,2771025 }, - { -21389266,421932,26597266,6860826,22486084,-6737172,-17137485,-4210226,-24552282,15673397 }, - }, - { - { -20184622,2338216,19788685,-9620956,-4001265,-8740893,-20271184,4733254,3727144,-12934448 }, - { 6120119,814863,-11794402,-622716,6812205,-15747771,2019594,7975683,31123697,-10958981 }, - { 30069250,-11435332,30434654,2958439,18399564,-976289,12296869,9204260,-16432438,9648165 }, - }, - { - { 32705432,-1550977,30705658,7451065,-11805606,9631813,3305266,5248604,-26008332,-11377501 }, - { 17219865,2375039,-31570947,-5575615,-19459679,9219903,294711,15298639,2662509,-16297073 }, - { -1172927,-7558695,-4366770,-4287744,-21346413,-8434326,32087529,-1222777,32247248,-14389861 }, - }, - { - { 14312628,1221556,17395390,-8700143,-4945741,-8684635,-28197744,-9637817,-16027623,-13378845 }, - { -1428825,-9678990,-9235681,6549687,-7383069,-468664,23046502,9803137,17597934,2346211 }, - { 18510800,15337574,26171504,981392,-22241552,7827556,-23491134,-11323352,3059833,-11782870 }, - }, - { - { 10141598,6082907,17829293,-1947643,9830092,13613136,-25556636,-5544586,-33502212,3592096 }, - { 33114168,-15889352,-26525686,-13343397,33076705,8716171,1151462,1521897,-982665,-6837803 }, - { -32939165,-4255815,23947181,-324178,-33072974,-12305637,-16637686,3891704,26353178,693168 }, - }, - { - { 30374239,1595580,-16884039,13186931,4600344,406904,9585294,-400668,31375464,14369965 }, - { -14370654,-7772529,1510301,6434173,-18784789,-6262728,32732230,-13108839,17901441,16011505 }, - { 18171223,-11934626,-12500402,15197122,-11038147,-15230035,-19172240,-16046376,8764035,12309598 }, - }, -}, -{ - { - { 5975908,-5243188,-19459362,-9681747,-11541277,14015782,-23665757,1228319,17544096,-10593782 }, - { 5811932,-1715293,3442887,-2269310,-18367348,-8359541,-18044043,-15410127,-5565381,12348900 }, - { -31399660,11407555,25755363,6891399,-3256938,14872274,-24849353,8141295,-10632534,-585479 }, - }, - { - { -12675304,694026,-5076145,13300344,14015258,-14451394,-9698672,-11329050,30944593,1130208 }, - { 8247766,-6710942,-26562381,-7709309,-14401939,-14648910,4652152,2488540,23550156,-271232 }, - { 17294316,-3788438,7026748,15626851,22990044,113481,2267737,-5908146,-408818,-137719 }, - }, - { - { 16091085,-16253926,18599252,7340678,2137637,-1221657,-3364161,14550936,3260525,-7166271 }, - { -4910104,-13332887,18550887,10864893,-16459325,-7291596,-23028869,-13204905,-12748722,2701326 }, - { -8574695,16099415,4629974,-16340524,-20786213,-6005432,-10018363,9276971,11329923,1862132 }, - }, - { - { 14763076,-15903608,-30918270,3689867,3511892,10313526,-21951088,12219231,-9037963,-940300 }, - { 8894987,-3446094,6150753,3013931,301220,15693451,-31981216,-2909717,-15438168,11595570 }, - { 15214962,3537601,-26238722,-14058872,4418657,-15230761,13947276,10730794,-13489462,-4363670 }, - }, - { - { -2538306,7682793,32759013,263109,-29984731,-7955452,-22332124,-10188635,977108,699994 }, - { -12466472,4195084,-9211532,550904,-15565337,12917920,19118110,-439841,-30534533,-14337913 }, - { 31788461,-14507657,4799989,7372237,8808585,-14747943,9408237,-10051775,12493932,-5409317 }, - }, - { - { -25680606,5260744,-19235809,-6284470,-3695942,16566087,27218280,2607121,29375955,6024730 }, - { 842132,-2794693,-4763381,-8722815,26332018,-12405641,11831880,6985184,-9940361,2854096 }, - { -4847262,-7969331,2516242,-5847713,9695691,-7221186,16512645,960770,12121869,16648078 }, - }, - { - { -15218652,14667096,-13336229,2013717,30598287,-464137,-31504922,-7882064,20237806,2838411 }, - { -19288047,4453152,15298546,-16178388,22115043,-15972604,12544294,-13470457,1068881,-12499905 }, - { -9558883,-16518835,33238498,13506958,30505848,-1114596,-8486907,-2630053,12521378,4845654 }, - }, - { - { -28198521,10744108,-2958380,10199664,7759311,-13088600,3409348,-873400,-6482306,-12885870 }, - { -23561822,6230156,-20382013,10655314,-24040585,-11621172,10477734,-1240216,-3113227,13974498 }, - { 12966261,15550616,-32038948,-1615346,21025980,-629444,5642325,7188737,18895762,12629579 }, - }, -}, -{ - { - { 14741879,-14946887,22177208,-11721237,1279741,8058600,11758140,789443,32195181,3895677 }, - { 10758205,15755439,-4509950,9243698,-4879422,6879879,-2204575,-3566119,-8982069,4429647 }, - { -2453894,15725973,-20436342,-10410672,-5803908,-11040220,-7135870,-11642895,18047436,-15281743 }, - }, - { - { -25173001,-11307165,29759956,11776784,-22262383,-15820455,10993114,-12850837,-17620701,-9408468 }, - { 21987233,700364,-24505048,14972008,-7774265,-5718395,32155026,2581431,-29958985,8773375 }, - { -25568350,454463,-13211935,16126715,25240068,8594567,20656846,12017935,-7874389,-13920155 }, - }, - { - { 6028182,6263078,-31011806,-11301710,-818919,2461772,-31841174,-5468042,-1721788,-2776725 }, - { -12278994,16624277,987579,-5922598,32908203,1248608,7719845,-4166698,28408820,6816612 }, - { -10358094,-8237829,19549651,-12169222,22082623,16147817,20613181,13982702,-10339570,5067943 }, - }, - { - { -30505967,-3821767,12074681,13582412,-19877972,2443951,-19719286,12746132,5331210,-10105944 }, - { 30528811,3601899,-1957090,4619785,-27361822,-15436388,24180793,-12570394,27679908,-1648928 }, - { 9402404,-13957065,32834043,10838634,-26580150,-13237195,26653274,-8685565,22611444,-12715406 }, - }, - { - { 22190590,1118029,22736441,15130463,-30460692,-5991321,19189625,-4648942,4854859,6622139 }, - { -8310738,-2953450,-8262579,-3388049,-10401731,-271929,13424426,-3567227,26404409,13001963 }, - { -31241838,-15415700,-2994250,8939346,11562230,-12840670,-26064365,-11621720,-15405155,11020693 }, - }, - { - { 1866042,-7949489,-7898649,-10301010,12483315,13477547,3175636,-12424163,28761762,1406734 }, - { -448555,-1777666,13018551,3194501,-9580420,-11161737,24760585,-4347088,25577411,-13378680 }, - { -24290378,4759345,-690653,-1852816,2066747,10693769,-29595790,9884936,-9368926,4745410 }, - }, - { - { -9141284,6049714,-19531061,-4341411,-31260798,9944276,-15462008,-11311852,10931924,-11931931 }, - { -16561513,14112680,-8012645,4817318,-8040464,-11414606,-22853429,10856641,-20470770,13434654 }, - { 22759489,-10073434,-16766264,-1871422,13637442,-10168091,1765144,-12654326,28445307,-5364710 }, - }, - { - { 29875063,12493613,2795536,-3786330,1710620,15181182,-10195717,-8788675,9074234,1167180 }, - { -26205683,11014233,-9842651,-2635485,-26908120,7532294,-18716888,-9535498,3843903,9367684 }, - { -10969595,-6403711,9591134,9582310,11349256,108879,16235123,8601684,-139197,4242895 }, - }, -}, -{ - { - { 22092954,-13191123,-2042793,-11968512,32186753,-11517388,-6574341,2470660,-27417366,16625501 }, - { -11057722,3042016,13770083,-9257922,584236,-544855,-7770857,2602725,-27351616,14247413 }, - { 6314175,-10264892,-32772502,15957557,-10157730,168750,-8618807,14290061,27108877,-1180880 }, - }, - { - { -8586597,-7170966,13241782,10960156,-32991015,-13794596,33547976,-11058889,-27148451,981874 }, - { 22833440,9293594,-32649448,-13618667,-9136966,14756819,-22928859,-13970780,-10479804,-16197962 }, - { -7768587,3326786,-28111797,10783824,19178761,14905060,22680049,13906969,-15933690,3797899 }, - }, - { - { 21721356,-4212746,-12206123,9310182,-3882239,-13653110,23740224,-2709232,20491983,-8042152 }, - { 9209270,-15135055,-13256557,-6167798,-731016,15289673,25947805,15286587,30997318,-6703063 }, - { 7392032,16618386,23946583,-8039892,-13265164,-1533858,-14197445,-2321576,17649998,-250080 }, - }, - { - { -9301088,-14193827,30609526,-3049543,-25175069,-1283752,-15241566,-9525724,-2233253,7662146 }, - { -17558673,1763594,-33114336,15908610,-30040870,-12174295,7335080,-8472199,-3174674,3440183 }, - { -19889700,-5977008,-24111293,-9688870,10799743,-16571957,40450,-4431835,4862400,1133 }, - }, - { - { -32856209,-7873957,-5422389,14860950,-16319031,7956142,7258061,311861,-30594991,-7379421 }, - { -3773428,-1565936,28985340,7499440,24445838,9325937,29727763,16527196,18278453,15405622 }, - { -4381906,8508652,-19898366,-3674424,-5984453,15149970,-13313598,843523,-21875062,13626197 }, - }, - { - { 2281448,-13487055,-10915418,-2609910,1879358,16164207,-10783882,3953792,13340839,15928663 }, - { 31727126,-7179855,-18437503,-8283652,2875793,-16390330,-25269894,-7014826,-23452306,5964753 }, - { 4100420,-5959452,-17179337,6017714,-18705837,12227141,-26684835,11344144,2538215,-7570755 }, - }, - { - { -9433605,6123113,11159803,-2156608,30016280,14966241,-20474983,1485421,-629256,-15958862 }, - { -26804558,4260919,11851389,9658551,-32017107,16367492,-20205425,-13191288,11659922,-11115118 }, - { 26180396,10015009,-30844224,-8581293,5418197,9480663,2231568,-10170080,33100372,-1306171 }, - }, - { - { 15121113,-5201871,-10389905,15427821,-27509937,-15992507,21670947,4486675,-5931810,-14466380 }, - { 16166486,-9483733,-11104130,6023908,-31926798,-1364923,2340060,-16254968,-10735770,-10039824 }, - { 28042865,-3557089,-12126526,12259706,-3717498,-6945899,6766453,-8689599,18036436,5803270 }, - }, -}, -{ - { - { -817581,6763912,11803561,1585585,10958447,-2671165,23855391,4598332,-6159431,-14117438 }, - { -31031306,-14256194,17332029,-2383520,31312682,-5967183,696309,50292,-20095739,11763584 }, - { -594563,-2514283,-32234153,12643980,12650761,14811489,665117,-12613632,-19773211,-10713562 }, - }, - { - { 30464590,-11262872,-4127476,-12734478,19835327,-7105613,-24396175,2075773,-17020157,992471 }, - { 18357185,-6994433,7766382,16342475,-29324918,411174,14578841,8080033,-11574335,-10601610 }, - { 19598397,10334610,12555054,2555664,18821899,-10339780,21873263,16014234,26224780,16452269 }, - }, - { - { -30223925,5145196,5944548,16385966,3976735,2009897,-11377804,-7618186,-20533829,3698650 }, - { 14187449,3448569,-10636236,-10810935,-22663880,-3433596,7268410,-10890444,27394301,12015369 }, - { 19695761,16087646,28032085,12999827,6817792,11427614,20244189,-1312777,-13259127,-3402461 }, - }, - { - { 30860103,12735208,-1888245,-4699734,-16974906,2256940,-8166013,12298312,-8550524,-10393462 }, - { -5719826,-11245325,-1910649,15569035,26642876,-7587760,-5789354,-15118654,-4976164,12651793 }, - { -2848395,9953421,11531313,-5282879,26895123,-12697089,-13118820,-16517902,9768698,-2533218 }, - }, - { - { -24719459,1894651,-287698,-4704085,15348719,-8156530,32767513,12765450,4940095,10678226 }, - { 18860224,15980149,-18987240,-1562570,-26233012,-11071856,-7843882,13944024,-24372348,16582019 }, - { -15504260,4970268,-29893044,4175593,-20993212,-2199756,-11704054,15444560,-11003761,7989037 }, - }, - { - { 31490452,5568061,-2412803,2182383,-32336847,4531686,-32078269,6200206,-19686113,-14800171 }, - { -17308668,-15879940,-31522777,-2831,-32887382,16375549,8680158,-16371713,28550068,-6857132 }, - { -28126887,-5688091,16837845,-1820458,-6850681,12700016,-30039981,4364038,1155602,5988841 }, - }, - { - { 21890435,-13272907,-12624011,12154349,-7831873,15300496,23148983,-4470481,24618407,8283181 }, - { -33136107,-10512751,9975416,6841041,-31559793,16356536,3070187,-7025928,1466169,10740210 }, - { -1509399,-15488185,-13503385,-10655916,32799044,909394,-13938903,-5779719,-32164649,-15327040 }, - }, - { - { 3960823,-14267803,-28026090,-15918051,-19404858,13146868,15567327,951507,-3260321,-573935 }, - { 24740841,5052253,-30094131,8961361,25877428,6165135,-24368180,14397372,-7380369,-6144105 }, - { -28888365,3510803,-28103278,-1158478,-11238128,-10631454,-15441463,-14453128,-1625486,-6494814 }, - }, -}, -{ - { - { 793299,-9230478,8836302,-6235707,-27360908,-2369593,33152843,-4885251,-9906200,-621852 }, - { 5666233,525582,20782575,-8038419,-24538499,14657740,16099374,1468826,-6171428,-15186581 }, - { -4859255,-3779343,-2917758,-6748019,7778750,11688288,-30404353,-9871238,-1558923,-9863646 }, - }, - { - { 10896332,-7719704,824275,472601,-19460308,3009587,25248958,14783338,-30581476,-15757844 }, - { 10566929,12612572,-31944212,11118703,-12633376,12362879,21752402,8822496,24003793,14264025 }, - { 27713862,-7355973,-11008240,9227530,27050101,2504721,23886875,-13117525,13958495,-5732453 }, - }, - { - { -23481610,4867226,-27247128,3900521,29838369,-8212291,-31889399,-10041781,7340521,-15410068 }, - { 4646514,-8011124,-22766023,-11532654,23184553,8566613,31366726,-1381061,-15066784,-10375192 }, - { -17270517,12723032,-16993061,14878794,21619651,-6197576,27584817,3093888,-8843694,3849921 }, - }, - { - { -9064912,2103172,25561640,-15125738,-5239824,9582958,32477045,-9017955,5002294,-15550259 }, - { -12057553,-11177906,21115585,-13365155,8808712,-12030708,16489530,13378448,-25845716,12741426 }, - { -5946367,10645103,-30911586,15390284,-3286982,-7118677,24306472,15852464,28834118,-7646072 }, - }, - { - { -17335748,-9107057,-24531279,9434953,-8472084,-583362,-13090771,455841,20461858,5491305 }, - { 13669248,-16095482,-12481974,-10203039,-14569770,-11893198,-24995986,11293807,-28588204,-9421832 }, - { 28497928,6272777,-33022994,14470570,8906179,-1225630,18504674,-14165166,29867745,-8795943 }, - }, - { - { -16207023,13517196,-27799630,-13697798,24009064,-6373891,-6367600,-13175392,22853429,-4012011 }, - { 24191378,16712145,-13931797,15217831,14542237,1646131,18603514,-11037887,12876623,-2112447 }, - { 17902668,4518229,-411702,-2829247,26878217,5258055,-12860753,608397,16031844,3723494 }, - }, - { - { -28632773,12763728,-20446446,7577504,33001348,-13017745,17558842,-7872890,23896954,-4314245 }, - { -20005381,-12011952,31520464,605201,2543521,5991821,-2945064,7229064,-9919646,-8826859 }, - { 28816045,298879,-28165016,-15920938,19000928,-1665890,-12680833,-2949325,-18051778,-2082915 }, - }, - { - { 16000882,-344896,3493092,-11447198,-29504595,-13159789,12577740,16041268,-19715240,7847707 }, - { 10151868,10572098,27312476,7922682,14825339,4723128,-32855931,-6519018,-10020567,3852848 }, - { -11430470,15697596,-21121557,-4420647,5386314,15063598,16514493,-15932110,29330899,-15076224 }, - }, -}, -{ - { - { -25499735,-4378794,-15222908,-6901211,16615731,2051784,3303702,15490,-27548796,12314391 }, - { 15683520,-6003043,18109120,-9980648,15337968,-5997823,-16717435,15921866,16103996,-3731215 }, - { -23169824,-10781249,13588192,-1628807,-3798557,-1074929,-19273607,5402699,-29815713,-9841101 }, - }, - { - { 23190676,2384583,-32714340,3462154,-29903655,-1529132,-11266856,8911517,-25205859,2739713 }, - { 21374101,-3554250,-33524649,9874411,15377179,11831242,-33529904,6134907,4931255,11987849 }, - { -7732,-2978858,-16223486,7277597,105524,-322051,-31480539,13861388,-30076310,10117930 }, - }, - { - { -29501170,-10744872,-26163768,13051539,-25625564,5089643,-6325503,6704079,12890019,15728940 }, - { -21972360,-11771379,-951059,-4418840,14704840,2695116,903376,-10428139,12885167,8311031 }, - { -17516482,5352194,10384213,-13811658,7506451,13453191,26423267,4384730,1888765,-5435404 }, - }, - { - { -25817338,-3107312,-13494599,-3182506,30896459,-13921729,-32251644,-12707869,-19464434,-3340243 }, - { -23607977,-2665774,-526091,4651136,5765089,4618330,6092245,14845197,17151279,-9854116 }, - { -24830458,-12733720,-15165978,10367250,-29530908,-265356,22825805,-7087279,-16866484,16176525 }, - }, - { - { -23583256,6564961,20063689,3798228,-4740178,7359225,2006182,-10363426,-28746253,-10197509 }, - { -10626600,-4486402,-13320562,-5125317,3432136,-6393229,23632037,-1940610,32808310,1099883 }, - { 15030977,5768825,-27451236,-2887299,-6427378,-15361371,-15277896,-6809350,2051441,-15225865 }, - }, - { - { -3362323,-7239372,7517890,9824992,23555850,295369,5148398,-14154188,-22686354,16633660 }, - { 4577086,-16752288,13249841,-15304328,19958763,-14537274,18559670,-10759549,8402478,-9864273 }, - { -28406330,-1051581,-26790155,-907698,-17212414,-11030789,9453451,-14980072,17983010,9967138 }, - }, - { - { -25762494,6524722,26585488,9969270,24709298,1220360,-1677990,7806337,17507396,3651560 }, - { -10420457,-4118111,14584639,15971087,-15768321,8861010,26556809,-5574557,-18553322,-11357135 }, - { 2839101,14284142,4029895,3472686,14402957,12689363,-26642121,8459447,-5605463,-7621941 }, - }, - { - { -4839289,-3535444,9744961,2871048,25113978,3187018,-25110813,-849066,17258084,-7977739 }, - { 18164541,-10595176,-17154882,-1542417,19237078,-9745295,23357533,-15217008,26908270,12150756 }, - { -30264870,-7647865,5112249,-7036672,-1499807,-6974257,43168,-5537701,-32302074,16215819 }, - }, -}, -{ - { - { -6898905,9824394,-12304779,-4401089,-31397141,-6276835,32574489,12532905,-7503072,-8675347 }, - { -27343522,-16515468,-27151524,-10722951,946346,16291093,254968,7168080,21676107,-1943028 }, - { 21260961,-8424752,-16831886,-11920822,-23677961,3968121,-3651949,-6215466,-3556191,-7913075 }, - }, - { - { 16544754,13250366,-16804428,15546242,-4583003,12757258,-2462308,-8680336,-18907032,-9662799 }, - { -2415239,-15577728,18312303,4964443,-15272530,-12653564,26820651,16690659,25459437,-4564609 }, - { -25144690,11425020,28423002,-11020557,-6144921,-15826224,9142795,-2391602,-6432418,-1644817 }, - }, - { - { -23104652,6253476,16964147,-3768872,-25113972,-12296437,-27457225,-16344658,6335692,7249989 }, - { -30333227,13979675,7503222,-12368314,-11956721,-4621693,-30272269,2682242,25993170,-12478523 }, - { 4364628,5930691,32304656,-10044554,-8054781,15091131,22857016,-10598955,31820368,15075278 }, - }, - { - { 31879134,-8918693,17258761,90626,-8041836,-4917709,24162788,-9650886,-17970238,12833045 }, - { 19073683,14851414,-24403169,-11860168,7625278,11091125,-19619190,2074449,-9413939,14905377 }, - { 24483667,-11935567,-2518866,-11547418,-1553130,15355506,-25282080,9253129,27628530,-7555480 }, - }, - { - { 17597607,8340603,19355617,552187,26198470,-3176583,4593324,-9157582,-14110875,15297016 }, - { 510886,14337390,-31785257,16638632,6328095,2713355,-20217417,-11864220,8683221,2921426 }, - { 18606791,11874196,27155355,-5281482,-24031742,6265446,-25178240,-1278924,4674690,13890525 }, - }, - { - { 13609624,13069022,-27372361,-13055908,24360586,9592974,14977157,9835105,4389687,288396 }, - { 9922506,-519394,13613107,5883594,-18758345,-434263,-12304062,8317628,23388070,16052080 }, - { 12720016,11937594,-31970060,-5028689,26900120,8561328,-20155687,-11632979,-14754271,-10812892 }, - }, - { - { 15961858,14150409,26716931,-665832,-22794328,13603569,11829573,7467844,-28822128,929275 }, - { 11038231,-11582396,-27310482,-7316562,-10498527,-16307831,-23479533,-9371869,-21393143,2465074 }, - { 20017163,-4323226,27915242,1529148,12396362,15675764,13817261,-9658066,2463391,-4622140 }, - }, - { - { -16358878,-12663911,-12065183,4996454,-1256422,1073572,9583558,12851107,4003896,12673717 }, - { -1731589,-15155870,-3262930,16143082,19294135,13385325,14741514,-9103726,7903886,2348101 }, - { 24536016,-16515207,12715592,-3862155,1511293,10047386,-3842346,-7129159,-28377538,10048127 }, - }, -}, -{ - { - { -12622226,-6204820,30718825,2591312,-10617028,12192840,18873298,-7297090,-32297756,15221632 }, - { -26478122,-11103864,11546244,-1852483,9180880,7656409,-21343950,2095755,29769758,6593415 }, - { -31994208,-2907461,4176912,3264766,12538965,-868111,26312345,-6118678,30958054,8292160 }, - }, - { - { 31429822,-13959116,29173532,15632448,12174511,-2760094,32808831,3977186,26143136,-3148876 }, - { 22648901,1402143,-22799984,13746059,7936347,365344,-8668633,-1674433,-3758243,-2304625 }, - { -15491917,8012313,-2514730,-12702462,-23965846,-10254029,-1612713,-1535569,-16664475,8194478 }, - }, - { - { 27338066,-7507420,-7414224,10140405,-19026427,-6589889,27277191,8855376,28572286,3005164 }, - { 26287124,4821776,25476601,-4145903,-3764513,-15788984,-18008582,1182479,-26094821,-13079595 }, - { -7171154,3178080,23970071,6201893,-17195577,-4489192,-21876275,-13982627,32208683,-1198248 }, - }, - { - { -16657702,2817643,-10286362,14811298,6024667,13349505,-27315504,-10497842,-27672585,-11539858 }, - { 15941029,-9405932,-21367050,8062055,31876073,-238629,-15278393,-1444429,15397331,-4130193 }, - { 8934485,-13485467,-23286397,-13423241,-32446090,14047986,31170398,-1441021,-27505566,15087184 }, - }, - { - { -18357243,-2156491,24524913,-16677868,15520427,-6360776,-15502406,11461896,16788528,-5868942 }, - { -1947386,16013773,21750665,3714552,-17401782,-16055433,-3770287,-10323320,31322514,-11615635 }, - { 21426655,-5650218,-13648287,-5347537,-28812189,-4920970,-18275391,-14621414,13040862,-12112948 }, - }, - { - { 11293895,12478086,-27136401,15083750,-29307421,14748872,14555558,-13417103,1613711,4896935 }, - { -25894883,15323294,-8489791,-8057900,25967126,-13425460,2825960,-4897045,-23971776,-11267415 }, - { -15924766,-5229880,-17443532,6410664,3622847,10243618,20615400,12405433,-23753030,-8436416 }, - }, - { - { -7091295,12556208,-20191352,9025187,-17072479,4333801,4378436,2432030,23097949,-566018 }, - { 4565804,-16025654,20084412,-7842817,1724999,189254,24767264,10103221,-18512313,2424778 }, - { 366633,-11976806,8173090,-6890119,30788634,5745705,-7168678,1344109,-3642553,12412659 }, - }, - { - { -24001791,7690286,14929416,-168257,-32210835,-13412986,24162697,-15326504,-3141501,11179385 }, - { 18289522,-14724954,8056945,16430056,-21729724,7842514,-6001441,-1486897,-18684645,-11443503 }, - { 476239,6601091,-6152790,-9723375,17503545,-4863900,27672959,13403813,11052904,5219329 }, - }, -}, -{ - { - { 20678546,-8375738,-32671898,8849123,-5009758,14574752,31186971,-3973730,9014762,-8579056 }, - { -13644050,-10350239,-15962508,5075808,-1514661,-11534600,-33102500,9160280,8473550,-3256838 }, - { 24900749,14435722,17209120,-15292541,-22592275,9878983,-7689309,-16335821,-24568481,11788948 }, - }, - { - { -3118155,-11395194,-13802089,14797441,9652448,-6845904,-20037437,10410733,-24568470,-1458691 }, - { -15659161,16736706,-22467150,10215878,-9097177,7563911,11871841,-12505194,-18513325,8464118 }, - { -23400612,8348507,-14585951,-861714,-3950205,-6373419,14325289,8628612,33313881,-8370517 }, - }, - { - { -20186973,-4967935,22367356,5271547,-1097117,-4788838,-24805667,-10236854,-8940735,-5818269 }, - { -6948785,-1795212,-32625683,-16021179,32635414,-7374245,15989197,-12838188,28358192,-4253904 }, - { -23561781,-2799059,-32351682,-1661963,-9147719,10429267,-16637684,4072016,-5351664,5596589 }, - }, - { - { -28236598,-3390048,12312896,6213178,3117142,16078565,29266239,2557221,1768301,15373193 }, - { -7243358,-3246960,-4593467,-7553353,-127927,-912245,-1090902,-4504991,-24660491,3442910 }, - { -30210571,5124043,14181784,8197961,18964734,-11939093,22597931,7176455,-18585478,13365930 }, - }, - { - { -7877390,-1499958,8324673,4690079,6261860,890446,24538107,-8570186,-9689599,-3031667 }, - { 25008904,-10771599,-4305031,-9638010,16265036,15721635,683793,-11823784,15723479,-15163481 }, - { -9660625,12374379,-27006999,-7026148,-7724114,-12314514,11879682,5400171,519526,-1235876 }, - }, - { - { 22258397,-16332233,-7869817,14613016,-22520255,-2950923,-20353881,7315967,16648397,7605640 }, - { -8081308,-8464597,-8223311,9719710,19259459,-15348212,23994942,-5281555,-9468848,4763278 }, - { -21699244,9220969,-15730624,1084137,-25476107,-2852390,31088447,-7764523,-11356529,728112 }, - }, - { - { 26047220,-11751471,-6900323,-16521798,24092068,9158119,-4273545,-12555558,-29365436,-5498272 }, - { 17510331,-322857,5854289,8403524,17133918,-3112612,-28111007,12327945,10750447,10014012 }, - { -10312768,3936952,9156313,-8897683,16498692,-994647,-27481051,-666732,3424691,7540221 }, - }, - { - { 30322361,-6964110,11361005,-4143317,7433304,4989748,-7071422,-16317219,-9244265,15258046 }, - { 13054562,-2779497,19155474,469045,-12482797,4566042,5631406,2711395,1062915,-5136345 }, - { -19240248,-11254599,-29509029,-7499965,-5835763,13005411,-6066489,12194497,32960380,1459310 }, - }, -}, -{ - { - { 19852034,7027924,23669353,10020366,8586503,-6657907,394197,-6101885,18638003,-11174937 }, - { 31395534,15098109,26581030,8030562,-16527914,-5007134,9012486,-7584354,-6643087,-5442636 }, - { -9192165,-2347377,-1997099,4529534,25766844,607986,-13222,9677543,-32294889,-6456008 }, - }, - { - { -2444496,-149937,29348902,8186665,1873760,12489863,-30934579,-7839692,-7852844,-8138429 }, - { -15236356,-15433509,7766470,746860,26346930,-10221762,-27333451,10754588,-9431476,5203576 }, - { 31834314,14135496,-770007,5159118,20917671,-16768096,-7467973,-7337524,31809243,7347066 }, - }, - { - { -9606723,-11874240,20414459,13033986,13716524,-11691881,19797970,-12211255,15192876,-2087490 }, - { -12663563,-2181719,1168162,-3804809,26747877,-14138091,10609330,12694420,33473243,-13382104 }, - { 33184999,11180355,15832085,-11385430,-1633671,225884,15089336,-11023903,-6135662,14480053 }, - }, - { - { 31308717,-5619998,31030840,-1897099,15674547,-6582883,5496208,13685227,27595050,8737275 }, - { -20318852,-15150239,10933843,-16178022,8335352,-7546022,-31008351,-12610604,26498114,66511 }, - { 22644454,-8761729,-16671776,4884562,-3105614,-13559366,30540766,-4286747,-13327787,-7515095 }, - }, - { - { -28017847,9834845,18617207,-2681312,-3401956,-13307506,8205540,13585437,-17127465,15115439 }, - { 23711543,-672915,31206561,-8362711,6164647,-9709987,-33535882,-1426096,8236921,16492939 }, - { -23910559,-13515526,-26299483,-4503841,25005590,-7687270,19574902,10071562,6708380,-6222424 }, - }, - { - { 2101391,-4930054,19702731,2367575,-15427167,1047675,5301017,9328700,29955601,-11678310 }, - { 3096359,9271816,-21620864,-15521844,-14847996,-7592937,-25892142,-12635595,-9917575,6216608 }, - { -32615849,338663,-25195611,2510422,-29213566,-13820213,24822830,-6146567,-26767480,7525079 }, - }, - { - { -23066649,-13985623,16133487,-7896178,-3389565,778788,-910336,-2782495,-19386633,11994101 }, - { 21691500,-13624626,-641331,-14367021,3285881,-3483596,-25064666,9718258,-7477437,13381418 }, - { 18445390,-4202236,14979846,11622458,-1727110,-3582980,23111648,-6375247,28535282,15779576 }, - }, - { - { 30098053,3089662,-9234387,16662135,-21306940,11308411,-14068454,12021730,9955285,-16303356 }, - { 9734894,-14576830,-7473633,-9138735,2060392,11313496,-18426029,9924399,20194861,13380996 }, - { -26378102,-7965207,-22167821,15789297,-18055342,-6168792,-1984914,15707771,26342023,10146099 }, - }, -}, -{ - { - { -26016874,-219943,21339191,-41388,19745256,-2878700,-29637280,2227040,21612326,-545728 }, - { -13077387,1184228,23562814,-5970442,-20351244,-6348714,25764461,12243797,-20856566,11649658 }, - { -10031494,11262626,27384172,2271902,26947504,-15997771,39944,6114064,33514190,2333242 }, - }, - { - { -21433588,-12421821,8119782,7219913,-21830522,-9016134,-6679750,-12670638,24350578,-13450001 }, - { -4116307,-11271533,-23886186,4843615,-30088339,690623,-31536088,-10406836,8317860,12352766 }, - { 18200138,-14475911,-33087759,-2696619,-23702521,-9102511,-23552096,-2287550,20712163,6719373 }, - }, - { - { 26656208,6075253,-7858556,1886072,-28344043,4262326,11117530,-3763210,26224235,-3297458 }, - { -17168938,-14854097,-3395676,-16369877,-19954045,14050420,21728352,9493610,18620611,-16428628 }, - { -13323321,13325349,11432106,5964811,18609221,6062965,-5269471,-9725556,-30701573,-16479657 }, - }, - { - { -23860538,-11233159,26961357,1640861,-32413112,-16737940,12248509,-5240639,13735342,1934062 }, - { 25089769,6742589,17081145,-13406266,21909293,-16067981,-15136294,-3765346,-21277997,5473616 }, - { 31883677,-7961101,1083432,-11572403,22828471,13290673,-7125085,12469656,29111212,-5451014 }, - }, - { - { 24244947,-15050407,-26262976,2791540,-14997599,16666678,24367466,6388839,-10295587,452383 }, - { -25640782,-3417841,5217916,16224624,19987036,-4082269,-24236251,-5915248,15766062,8407814 }, - { -20406999,13990231,15495425,16395525,5377168,15166495,-8917023,-4388953,-8067909,2276718 }, - }, - { - { 30157918,12924066,-17712050,9245753,19895028,3368142,-23827587,5096219,22740376,-7303417 }, - { 2041139,-14256350,7783687,13876377,-25946985,-13352459,24051124,13742383,-15637599,13295222 }, - { 33338237,-8505733,12532113,7977527,9106186,-1715251,-17720195,-4612972,-4451357,-14669444 }, - }, - { - { -20045281,5454097,-14346548,6447146,28862071,1883651,-2469266,-4141880,7770569,9620597 }, - { 23208068,7979712,33071466,8149229,1758231,-10834995,30945528,-1694323,-33502340,-14767970 }, - { 1439958,-16270480,-1079989,-793782,4625402,10647766,-5043801,1220118,30494170,-11440799 }, - }, - { - { -5037580,-13028295,-2970559,-3061767,15640974,-6701666,-26739026,926050,-1684339,-13333647 }, - { 13908495,-3549272,30919928,-6273825,-21521863,7989039,9021034,9078865,3353509,4033511 }, - { -29663431,-15113610,32259991,-344482,24295849,-12912123,23161163,8839127,27485041,7356032 }, - }, -}, -{ - { - { 9661027,705443,11980065,-5370154,-1628543,14661173,-6346142,2625015,28431036,-16771834 }, - { -23839233,-8311415,-25945511,7480958,-17681669,-8354183,-22545972,14150565,15970762,4099461 }, - { 29262576,16756590,26350592,-8793563,8529671,-11208050,13617293,-9937143,11465739,8317062 }, - }, - { - { -25493081,-6962928,32500200,-9419051,-23038724,-2302222,14898637,3848455,20969334,-5157516 }, - { -20384450,-14347713,-18336405,13884722,-33039454,2842114,-21610826,-3649888,11177095,14989547 }, - { -24496721,-11716016,16959896,2278463,12066309,10137771,13515641,2581286,-28487508,9930240 }, - }, - { - { -17751622,-2097826,16544300,-13009300,-15914807,-14949081,18345767,-13403753,16291481,-5314038 }, - { -33229194,2553288,32678213,9875984,8534129,6889387,-9676774,6957617,4368891,9788741 }, - { 16660756,7281060,-10830758,12911820,20108584,-8101676,-21722536,-8613148,16250552,-11111103 }, - }, - { - { -19765507,2390526,-16551031,14161980,1905286,6414907,4689584,10604807,-30190403,4782747 }, - { -1354539,14736941,-7367442,-13292886,7710542,-14155590,-9981571,4383045,22546403,437323 }, - { 31665577,-12180464,-16186830,1491339,-18368625,3294682,27343084,2786261,-30633590,-14097016 }, - }, - { - { -14467279,-683715,-33374107,7448552,19294360,14334329,-19690631,2355319,-19284671,-6114373 }, - { 15121312,-15796162,6377020,-6031361,-10798111,-12957845,18952177,15496498,-29380133,11754228 }, - { -2637277,-13483075,8488727,-14303896,12728761,-1622493,7141596,11724556,22761615,-10134141 }, - }, - { - { 16918416,11729663,-18083579,3022987,-31015732,-13339659,-28741185,-12227393,32851222,11717399 }, - { 11166634,7338049,-6722523,4531520,-29468672,-7302055,31474879,3483633,-1193175,-4030831 }, - { -185635,9921305,31456609,-13536438,-12013818,13348923,33142652,6546660,-19985279,-3948376 }, - }, - { - { -32460596,11266712,-11197107,-7899103,31703694,3855903,-8537131,-12833048,-30772034,-15486313 }, - { -18006477,12709068,3991746,-6479188,-21491523,-10550425,-31135347,-16049879,10928917,3011958 }, - { -6957757,-15594337,31696059,334240,29576716,14796075,-30831056,-12805180,18008031,10258577 }, - }, - { - { -22448644,15655569,7018479,-4410003,-30314266,-1201591,-1853465,1367120,25127874,6671743 }, - { 29701166,-14373934,-10878120,9279288,-17568,13127210,21382910,11042292,25838796,4642684 }, - { -20430234,14955537,-24126347,8124619,-5369288,-5990470,30468147,-13900640,18423289,4177476 }, - }, -}, diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/base2.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/base2.h deleted file mode 100644 index 8c53844..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/base2.h +++ /dev/null @@ -1,40 +0,0 @@ - { - { 25967493,-14356035,29566456,3660896,-12694345,4014787,27544626,-11754271,-6079156,2047605 }, - { -12545711,934262,-2722910,3049990,-727428,9406986,12720692,5043384,19500929,-15469378 }, - { -8738181,4489570,9688441,-14785194,10184609,-12363380,29287919,11864899,-24514362,-4438546 }, - }, - { - { 15636291,-9688557,24204773,-7912398,616977,-16685262,27787600,-14772189,28944400,-1550024 }, - { 16568933,4717097,-11556148,-1102322,15682896,-11807043,16354577,-11775962,7689662,11199574 }, - { 30464156,-5976125,-11779434,-15670865,23220365,15915852,7512774,10017326,-17749093,-9920357 }, - }, - { - { 10861363,11473154,27284546,1981175,-30064349,12577861,32867885,14515107,-15438304,10819380 }, - { 4708026,6336745,20377586,9066809,-11272109,6594696,-25653668,12483688,-12668491,5581306 }, - { 19563160,16186464,-29386857,4097519,10237984,-4348115,28542350,13850243,-23678021,-15815942 }, - }, - { - { 5153746,9909285,1723747,-2777874,30523605,5516873,19480852,5230134,-23952439,-15175766 }, - { -30269007,-3463509,7665486,10083793,28475525,1649722,20654025,16520125,30598449,7715701 }, - { 28881845,14381568,9657904,3680757,-20181635,7843316,-31400660,1370708,29794553,-1409300 }, - }, - { - { -22518993,-6692182,14201702,-8745502,-23510406,8844726,18474211,-1361450,-13062696,13821877 }, - { -6455177,-7839871,3374702,-4740862,-27098617,-10571707,31655028,-7212327,18853322,-14220951 }, - { 4566830,-12963868,-28974889,-12240689,-7602672,-2830569,-8514358,-10431137,2207753,-3209784 }, - }, - { - { -25154831,-4185821,29681144,7868801,-6854661,-9423865,-12437364,-663000,-31111463,-16132436 }, - { 25576264,-2703214,7349804,-11814844,16472782,9300885,3844789,15725684,171356,6466918 }, - { 23103977,13316479,9739013,-16149481,817875,-15038942,8965339,-14088058,-30714912,16193877 }, - }, - { - { -33521811,3180713,-2394130,14003687,-16903474,-16270840,17238398,4729455,-18074513,9256800 }, - { -25182317,-4174131,32336398,5036987,-21236817,11360617,22616405,9761698,-19827198,630305 }, - { -13720693,2639453,-24237460,-7406481,9494427,-5774029,-6554551,-15960994,-2449256,-14291300 }, - }, - { - { -3151181,-5046075,9282714,6866145,-31907062,-863023,-18940575,15033784,25105118,-7894876 }, - { -24326370,15950226,-31801215,-14592823,-11662737,-5090925,1573892,-2625887,2198790,-15804619 }, - { -3099351,10324967,-2241613,7453183,-5446979,-2735503,-13812022,-16236442,-32461234,-12290683 }, - }, diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/d.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/d.h deleted file mode 100644 index e25f578..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/d.h +++ /dev/null @@ -1 +0,0 @@ --10913610,13857413,-15372611,6949391,114729,-8787816,-6275908,-3247719,-18696448,-12055116 diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/d2.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/d2.h deleted file mode 100644 index 01aaec7..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/d2.h +++ /dev/null @@ -1 +0,0 @@ --21827239,-5839606,-30745221,13898782,229458,15978800,-12551817,-6495438,29715968,9444199 diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe.h deleted file mode 100644 index 60c308b..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe.h +++ /dev/null @@ -1,56 +0,0 @@ -#ifndef FE_H -#define FE_H - -#include "crypto_int32.h" - -typedef crypto_int32 fe[10]; - -/* -fe means field element. -Here the field is \Z/(2^255-19). -An element t, entries t[0]...t[9], represents the integer -t[0]+2^26 t[1]+2^51 t[2]+2^77 t[3]+2^102 t[4]+...+2^230 t[9]. -Bounds on each t[i] vary depending on context. -*/ - -#define fe_frombytes crypto_sign_ed25519_ref10_fe_frombytes -#define fe_tobytes crypto_sign_ed25519_ref10_fe_tobytes -#define fe_copy crypto_sign_ed25519_ref10_fe_copy -#define fe_isnonzero crypto_sign_ed25519_ref10_fe_isnonzero -#define fe_isnegative crypto_sign_ed25519_ref10_fe_isnegative -#define fe_0 crypto_sign_ed25519_ref10_fe_0 -#define fe_1 crypto_sign_ed25519_ref10_fe_1 -#define fe_cswap crypto_sign_ed25519_ref10_fe_cswap -#define fe_cmov crypto_sign_ed25519_ref10_fe_cmov -#define fe_add crypto_sign_ed25519_ref10_fe_add -#define fe_sub crypto_sign_ed25519_ref10_fe_sub -#define fe_neg crypto_sign_ed25519_ref10_fe_neg -#define fe_mul crypto_sign_ed25519_ref10_fe_mul -#define fe_sq crypto_sign_ed25519_ref10_fe_sq -#define fe_sq2 crypto_sign_ed25519_ref10_fe_sq2 -#define fe_mul121666 crypto_sign_ed25519_ref10_fe_mul121666 -#define fe_invert crypto_sign_ed25519_ref10_fe_invert -#define fe_pow22523 crypto_sign_ed25519_ref10_fe_pow22523 - -extern void fe_frombytes(fe,const unsigned char *); -extern void fe_tobytes(unsigned char *,const fe); - -extern void fe_copy(fe,const fe); -extern int fe_isnonzero(const fe); -extern int fe_isnegative(const fe); -extern void fe_0(fe); -extern void fe_1(fe); -extern void fe_cswap(fe,fe,unsigned int); -extern void fe_cmov(fe,const fe,unsigned int); - -extern void fe_add(fe,const fe,const fe); -extern void fe_sub(fe,const fe,const fe); -extern void fe_neg(fe,const fe); -extern void fe_mul(fe,const fe,const fe); -extern void fe_sq(fe,const fe); -extern void fe_sq2(fe,const fe); -extern void fe_mul121666(fe,const fe); -extern void fe_invert(fe,const fe); -extern void fe_pow22523(fe,const fe); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_0.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_0.c deleted file mode 100644 index ec879d7..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_0.c +++ /dev/null @@ -1,19 +0,0 @@ -#include "fe.h" - -/* -h = 0 -*/ - -void fe_0(fe h) -{ - h[0] = 0; - h[1] = 0; - h[2] = 0; - h[3] = 0; - h[4] = 0; - h[5] = 0; - h[6] = 0; - h[7] = 0; - h[8] = 0; - h[9] = 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_1.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_1.c deleted file mode 100644 index 8cf7784..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_1.c +++ /dev/null @@ -1,19 +0,0 @@ -#include "fe.h" - -/* -h = 1 -*/ - -void fe_1(fe h) -{ - h[0] = 1; - h[1] = 0; - h[2] = 0; - h[3] = 0; - h[4] = 0; - h[5] = 0; - h[6] = 0; - h[7] = 0; - h[8] = 0; - h[9] = 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_add.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_add.c deleted file mode 100644 index e6a81da..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_add.c +++ /dev/null @@ -1,57 +0,0 @@ -#include "fe.h" - -/* -h = f + g -Can overlap h with f or g. - -Preconditions: - |f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - |g| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - -Postconditions: - |h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. -*/ - -void fe_add(fe h,const fe f,const fe g) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 h0 = f0 + g0; - crypto_int32 h1 = f1 + g1; - crypto_int32 h2 = f2 + g2; - crypto_int32 h3 = f3 + g3; - crypto_int32 h4 = f4 + g4; - crypto_int32 h5 = f5 + g5; - crypto_int32 h6 = f6 + g6; - crypto_int32 h7 = f7 + g7; - crypto_int32 h8 = f8 + g8; - crypto_int32 h9 = f9 + g9; - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_cmov.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_cmov.c deleted file mode 100644 index 8ca584f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_cmov.c +++ /dev/null @@ -1,63 +0,0 @@ -#include "fe.h" - -/* -Replace (f,g) with (g,g) if b == 1; -replace (f,g) with (f,g) if b == 0. - -Preconditions: b in {0,1}. -*/ - -void fe_cmov(fe f,const fe g,unsigned int b) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 x0 = f0 ^ g0; - crypto_int32 x1 = f1 ^ g1; - crypto_int32 x2 = f2 ^ g2; - crypto_int32 x3 = f3 ^ g3; - crypto_int32 x4 = f4 ^ g4; - crypto_int32 x5 = f5 ^ g5; - crypto_int32 x6 = f6 ^ g6; - crypto_int32 x7 = f7 ^ g7; - crypto_int32 x8 = f8 ^ g8; - crypto_int32 x9 = f9 ^ g9; - b = -b; - x0 &= b; - x1 &= b; - x2 &= b; - x3 &= b; - x4 &= b; - x5 &= b; - x6 &= b; - x7 &= b; - x8 &= b; - x9 &= b; - f[0] = f0 ^ x0; - f[1] = f1 ^ x1; - f[2] = f2 ^ x2; - f[3] = f3 ^ x3; - f[4] = f4 ^ x4; - f[5] = f5 ^ x5; - f[6] = f6 ^ x6; - f[7] = f7 ^ x7; - f[8] = f8 ^ x8; - f[9] = f9 ^ x9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_copy.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_copy.c deleted file mode 100644 index 9c5bf86..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_copy.c +++ /dev/null @@ -1,29 +0,0 @@ -#include "fe.h" - -/* -h = f -*/ - -void fe_copy(fe h,const fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - h[0] = f0; - h[1] = f1; - h[2] = f2; - h[3] = f3; - h[4] = f4; - h[5] = f5; - h[6] = f6; - h[7] = f7; - h[8] = f8; - h[9] = f9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_frombytes.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_frombytes.c deleted file mode 100644 index 87e2494..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_frombytes.c +++ /dev/null @@ -1,73 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" -#include "crypto_uint64.h" - -static crypto_uint64 load_3(const unsigned char *in) -{ - crypto_uint64 result; - result = (crypto_uint64) in[0]; - result |= ((crypto_uint64) in[1]) << 8; - result |= ((crypto_uint64) in[2]) << 16; - return result; -} - -static crypto_uint64 load_4(const unsigned char *in) -{ - crypto_uint64 result; - result = (crypto_uint64) in[0]; - result |= ((crypto_uint64) in[1]) << 8; - result |= ((crypto_uint64) in[2]) << 16; - result |= ((crypto_uint64) in[3]) << 24; - return result; -} - -/* -Ignores top bit of h. -*/ - -void fe_frombytes(fe h,const unsigned char *s) -{ - crypto_int64 h0 = load_4(s); - crypto_int64 h1 = load_3(s + 4) << 6; - crypto_int64 h2 = load_3(s + 7) << 5; - crypto_int64 h3 = load_3(s + 10) << 3; - crypto_int64 h4 = load_3(s + 13) << 2; - crypto_int64 h5 = load_4(s + 16); - crypto_int64 h6 = load_3(s + 20) << 7; - crypto_int64 h7 = load_3(s + 23) << 5; - crypto_int64 h8 = load_3(s + 26) << 4; - crypto_int64 h9 = (load_3(s + 29) & 8388607) << 2; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - - h[0] = (crypto_int32) h0; - h[1] = (crypto_int32) h1; - h[2] = (crypto_int32) h2; - h[3] = (crypto_int32) h3; - h[4] = (crypto_int32) h4; - h[5] = (crypto_int32) h5; - h[6] = (crypto_int32) h6; - h[7] = (crypto_int32) h7; - h[8] = (crypto_int32) h8; - h[9] = (crypto_int32) h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_invert.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_invert.c deleted file mode 100644 index bcfdb8f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_invert.c +++ /dev/null @@ -1,14 +0,0 @@ -#include "fe.h" - -void fe_invert(fe out,const fe z) -{ - fe t0; - fe t1; - fe t2; - fe t3; - int i; - -#include "pow225521.h" - - return; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_isnegative.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_isnegative.c deleted file mode 100644 index 3b2c8b8..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_isnegative.c +++ /dev/null @@ -1,16 +0,0 @@ -#include "fe.h" - -/* -return 1 if f is in {1,3,5,...,q-2} -return 0 if f is in {0,2,4,...,q-1} - -Preconditions: - |f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. -*/ - -int fe_isnegative(const fe f) -{ - unsigned char s[32]; - fe_tobytes(s,f); - return s[0] & 1; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_isnonzero.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_isnonzero.c deleted file mode 100644 index db29c25..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_isnonzero.c +++ /dev/null @@ -1,19 +0,0 @@ -#include "fe.h" -#include "crypto_verify_32.h" - -/* -return 1 if f == 0 -return 0 if f != 0 - -Preconditions: - |f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. -*/ - -static unsigned char zero[32]; - -int fe_isnonzero(const fe f) -{ - unsigned char s[32]; - fe_tobytes(s,f); - return crypto_verify_32(s,zero); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_mul.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_mul.c deleted file mode 100644 index d68e210..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_mul.c +++ /dev/null @@ -1,253 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" - -/* -h = f * g -Can overlap h with f or g. - -Preconditions: - |f| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc. - |g| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc. - -Postconditions: - |h| bounded by 1.01*2^25,1.01*2^24,1.01*2^25,1.01*2^24,etc. -*/ - -/* -Notes on implementation strategy: - -Using schoolbook multiplication. -Karatsuba would save a little in some cost models. - -Most multiplications by 2 and 19 are 32-bit precomputations; -cheaper than 64-bit postcomputations. - -There is one remaining multiplication by 19 in the carry chain; -one *19 precomputation can be merged into this, -but the resulting data flow is considerably less clean. - -There are 12 carries below. -10 of them are 2-way parallelizable and vectorizable. -Can get away with 11 carries, but then data flow is much deeper. - -With tighter constraints on inputs can squeeze carries into int32. -*/ - -void fe_mul(fe h,const fe f,const fe g) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 g1_19 = 19 * g1; /* 1.959375*2^29 */ - crypto_int32 g2_19 = 19 * g2; /* 1.959375*2^30; still ok */ - crypto_int32 g3_19 = 19 * g3; - crypto_int32 g4_19 = 19 * g4; - crypto_int32 g5_19 = 19 * g5; - crypto_int32 g6_19 = 19 * g6; - crypto_int32 g7_19 = 19 * g7; - crypto_int32 g8_19 = 19 * g8; - crypto_int32 g9_19 = 19 * g9; - crypto_int32 f1_2 = 2 * f1; - crypto_int32 f3_2 = 2 * f3; - crypto_int32 f5_2 = 2 * f5; - crypto_int32 f7_2 = 2 * f7; - crypto_int32 f9_2 = 2 * f9; - crypto_int64 f0g0 = f0 * (crypto_int64) g0; - crypto_int64 f0g1 = f0 * (crypto_int64) g1; - crypto_int64 f0g2 = f0 * (crypto_int64) g2; - crypto_int64 f0g3 = f0 * (crypto_int64) g3; - crypto_int64 f0g4 = f0 * (crypto_int64) g4; - crypto_int64 f0g5 = f0 * (crypto_int64) g5; - crypto_int64 f0g6 = f0 * (crypto_int64) g6; - crypto_int64 f0g7 = f0 * (crypto_int64) g7; - crypto_int64 f0g8 = f0 * (crypto_int64) g8; - crypto_int64 f0g9 = f0 * (crypto_int64) g9; - crypto_int64 f1g0 = f1 * (crypto_int64) g0; - crypto_int64 f1g1_2 = f1_2 * (crypto_int64) g1; - crypto_int64 f1g2 = f1 * (crypto_int64) g2; - crypto_int64 f1g3_2 = f1_2 * (crypto_int64) g3; - crypto_int64 f1g4 = f1 * (crypto_int64) g4; - crypto_int64 f1g5_2 = f1_2 * (crypto_int64) g5; - crypto_int64 f1g6 = f1 * (crypto_int64) g6; - crypto_int64 f1g7_2 = f1_2 * (crypto_int64) g7; - crypto_int64 f1g8 = f1 * (crypto_int64) g8; - crypto_int64 f1g9_38 = f1_2 * (crypto_int64) g9_19; - crypto_int64 f2g0 = f2 * (crypto_int64) g0; - crypto_int64 f2g1 = f2 * (crypto_int64) g1; - crypto_int64 f2g2 = f2 * (crypto_int64) g2; - crypto_int64 f2g3 = f2 * (crypto_int64) g3; - crypto_int64 f2g4 = f2 * (crypto_int64) g4; - crypto_int64 f2g5 = f2 * (crypto_int64) g5; - crypto_int64 f2g6 = f2 * (crypto_int64) g6; - crypto_int64 f2g7 = f2 * (crypto_int64) g7; - crypto_int64 f2g8_19 = f2 * (crypto_int64) g8_19; - crypto_int64 f2g9_19 = f2 * (crypto_int64) g9_19; - crypto_int64 f3g0 = f3 * (crypto_int64) g0; - crypto_int64 f3g1_2 = f3_2 * (crypto_int64) g1; - crypto_int64 f3g2 = f3 * (crypto_int64) g2; - crypto_int64 f3g3_2 = f3_2 * (crypto_int64) g3; - crypto_int64 f3g4 = f3 * (crypto_int64) g4; - crypto_int64 f3g5_2 = f3_2 * (crypto_int64) g5; - crypto_int64 f3g6 = f3 * (crypto_int64) g6; - crypto_int64 f3g7_38 = f3_2 * (crypto_int64) g7_19; - crypto_int64 f3g8_19 = f3 * (crypto_int64) g8_19; - crypto_int64 f3g9_38 = f3_2 * (crypto_int64) g9_19; - crypto_int64 f4g0 = f4 * (crypto_int64) g0; - crypto_int64 f4g1 = f4 * (crypto_int64) g1; - crypto_int64 f4g2 = f4 * (crypto_int64) g2; - crypto_int64 f4g3 = f4 * (crypto_int64) g3; - crypto_int64 f4g4 = f4 * (crypto_int64) g4; - crypto_int64 f4g5 = f4 * (crypto_int64) g5; - crypto_int64 f4g6_19 = f4 * (crypto_int64) g6_19; - crypto_int64 f4g7_19 = f4 * (crypto_int64) g7_19; - crypto_int64 f4g8_19 = f4 * (crypto_int64) g8_19; - crypto_int64 f4g9_19 = f4 * (crypto_int64) g9_19; - crypto_int64 f5g0 = f5 * (crypto_int64) g0; - crypto_int64 f5g1_2 = f5_2 * (crypto_int64) g1; - crypto_int64 f5g2 = f5 * (crypto_int64) g2; - crypto_int64 f5g3_2 = f5_2 * (crypto_int64) g3; - crypto_int64 f5g4 = f5 * (crypto_int64) g4; - crypto_int64 f5g5_38 = f5_2 * (crypto_int64) g5_19; - crypto_int64 f5g6_19 = f5 * (crypto_int64) g6_19; - crypto_int64 f5g7_38 = f5_2 * (crypto_int64) g7_19; - crypto_int64 f5g8_19 = f5 * (crypto_int64) g8_19; - crypto_int64 f5g9_38 = f5_2 * (crypto_int64) g9_19; - crypto_int64 f6g0 = f6 * (crypto_int64) g0; - crypto_int64 f6g1 = f6 * (crypto_int64) g1; - crypto_int64 f6g2 = f6 * (crypto_int64) g2; - crypto_int64 f6g3 = f6 * (crypto_int64) g3; - crypto_int64 f6g4_19 = f6 * (crypto_int64) g4_19; - crypto_int64 f6g5_19 = f6 * (crypto_int64) g5_19; - crypto_int64 f6g6_19 = f6 * (crypto_int64) g6_19; - crypto_int64 f6g7_19 = f6 * (crypto_int64) g7_19; - crypto_int64 f6g8_19 = f6 * (crypto_int64) g8_19; - crypto_int64 f6g9_19 = f6 * (crypto_int64) g9_19; - crypto_int64 f7g0 = f7 * (crypto_int64) g0; - crypto_int64 f7g1_2 = f7_2 * (crypto_int64) g1; - crypto_int64 f7g2 = f7 * (crypto_int64) g2; - crypto_int64 f7g3_38 = f7_2 * (crypto_int64) g3_19; - crypto_int64 f7g4_19 = f7 * (crypto_int64) g4_19; - crypto_int64 f7g5_38 = f7_2 * (crypto_int64) g5_19; - crypto_int64 f7g6_19 = f7 * (crypto_int64) g6_19; - crypto_int64 f7g7_38 = f7_2 * (crypto_int64) g7_19; - crypto_int64 f7g8_19 = f7 * (crypto_int64) g8_19; - crypto_int64 f7g9_38 = f7_2 * (crypto_int64) g9_19; - crypto_int64 f8g0 = f8 * (crypto_int64) g0; - crypto_int64 f8g1 = f8 * (crypto_int64) g1; - crypto_int64 f8g2_19 = f8 * (crypto_int64) g2_19; - crypto_int64 f8g3_19 = f8 * (crypto_int64) g3_19; - crypto_int64 f8g4_19 = f8 * (crypto_int64) g4_19; - crypto_int64 f8g5_19 = f8 * (crypto_int64) g5_19; - crypto_int64 f8g6_19 = f8 * (crypto_int64) g6_19; - crypto_int64 f8g7_19 = f8 * (crypto_int64) g7_19; - crypto_int64 f8g8_19 = f8 * (crypto_int64) g8_19; - crypto_int64 f8g9_19 = f8 * (crypto_int64) g9_19; - crypto_int64 f9g0 = f9 * (crypto_int64) g0; - crypto_int64 f9g1_38 = f9_2 * (crypto_int64) g1_19; - crypto_int64 f9g2_19 = f9 * (crypto_int64) g2_19; - crypto_int64 f9g3_38 = f9_2 * (crypto_int64) g3_19; - crypto_int64 f9g4_19 = f9 * (crypto_int64) g4_19; - crypto_int64 f9g5_38 = f9_2 * (crypto_int64) g5_19; - crypto_int64 f9g6_19 = f9 * (crypto_int64) g6_19; - crypto_int64 f9g7_38 = f9_2 * (crypto_int64) g7_19; - crypto_int64 f9g8_19 = f9 * (crypto_int64) g8_19; - crypto_int64 f9g9_38 = f9_2 * (crypto_int64) g9_19; - crypto_int64 h0 = f0g0+f1g9_38+f2g8_19+f3g7_38+f4g6_19+f5g5_38+f6g4_19+f7g3_38+f8g2_19+f9g1_38; - crypto_int64 h1 = f0g1+f1g0 +f2g9_19+f3g8_19+f4g7_19+f5g6_19+f6g5_19+f7g4_19+f8g3_19+f9g2_19; - crypto_int64 h2 = f0g2+f1g1_2 +f2g0 +f3g9_38+f4g8_19+f5g7_38+f6g6_19+f7g5_38+f8g4_19+f9g3_38; - crypto_int64 h3 = f0g3+f1g2 +f2g1 +f3g0 +f4g9_19+f5g8_19+f6g7_19+f7g6_19+f8g5_19+f9g4_19; - crypto_int64 h4 = f0g4+f1g3_2 +f2g2 +f3g1_2 +f4g0 +f5g9_38+f6g8_19+f7g7_38+f8g6_19+f9g5_38; - crypto_int64 h5 = f0g5+f1g4 +f2g3 +f3g2 +f4g1 +f5g0 +f6g9_19+f7g8_19+f8g7_19+f9g6_19; - crypto_int64 h6 = f0g6+f1g5_2 +f2g4 +f3g3_2 +f4g2 +f5g1_2 +f6g0 +f7g9_38+f8g8_19+f9g7_38; - crypto_int64 h7 = f0g7+f1g6 +f2g5 +f3g4 +f4g3 +f5g2 +f6g1 +f7g0 +f8g9_19+f9g8_19; - crypto_int64 h8 = f0g8+f1g7_2 +f2g6 +f3g5_2 +f4g4 +f5g3_2 +f6g2 +f7g1_2 +f8g0 +f9g9_38; - crypto_int64 h9 = f0g9+f1g8 +f2g7 +f3g6 +f4g5 +f5g4 +f6g3 +f7g2 +f8g1 +f9g0 ; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - /* - |h0| <= (1.65*1.65*2^52*(1+19+19+19+19)+1.65*1.65*2^50*(38+38+38+38+38)) - i.e. |h0| <= 1.4*2^60; narrower ranges for h2, h4, h6, h8 - |h1| <= (1.65*1.65*2^51*(1+1+19+19+19+19+19+19+19+19)) - i.e. |h1| <= 1.7*2^59; narrower ranges for h3, h5, h7, h9 - */ - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - /* |h0| <= 2^25 */ - /* |h4| <= 2^25 */ - /* |h1| <= 1.71*2^59 */ - /* |h5| <= 1.71*2^59 */ - - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - /* |h1| <= 2^24; from now on fits into int32 */ - /* |h5| <= 2^24; from now on fits into int32 */ - /* |h2| <= 1.41*2^60 */ - /* |h6| <= 1.41*2^60 */ - - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - /* |h2| <= 2^25; from now on fits into int32 unchanged */ - /* |h6| <= 2^25; from now on fits into int32 unchanged */ - /* |h3| <= 1.71*2^59 */ - /* |h7| <= 1.71*2^59 */ - - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - /* |h3| <= 2^24; from now on fits into int32 unchanged */ - /* |h7| <= 2^24; from now on fits into int32 unchanged */ - /* |h4| <= 1.72*2^34 */ - /* |h8| <= 1.41*2^60 */ - - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - /* |h4| <= 2^25; from now on fits into int32 unchanged */ - /* |h8| <= 2^25; from now on fits into int32 unchanged */ - /* |h5| <= 1.01*2^24 */ - /* |h9| <= 1.71*2^59 */ - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - /* |h9| <= 2^24; from now on fits into int32 unchanged */ - /* |h0| <= 1.1*2^39 */ - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - /* |h0| <= 2^25; from now on fits into int32 unchanged */ - /* |h1| <= 1.01*2^24 */ - - h[0] = (crypto_int32) h0; - h[1] = (crypto_int32) h1; - h[2] = (crypto_int32) h2; - h[3] = (crypto_int32) h3; - h[4] = (crypto_int32) h4; - h[5] = (crypto_int32) h5; - h[6] = (crypto_int32) h6; - h[7] = (crypto_int32) h7; - h[8] = (crypto_int32) h8; - h[9] = (crypto_int32) h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_neg.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_neg.c deleted file mode 100644 index 2078ce5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_neg.c +++ /dev/null @@ -1,45 +0,0 @@ -#include "fe.h" - -/* -h = -f - -Preconditions: - |f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - -Postconditions: - |h| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. -*/ - -void fe_neg(fe h,const fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 h0 = -f0; - crypto_int32 h1 = -f1; - crypto_int32 h2 = -f2; - crypto_int32 h3 = -f3; - crypto_int32 h4 = -f4; - crypto_int32 h5 = -f5; - crypto_int32 h6 = -f6; - crypto_int32 h7 = -f7; - crypto_int32 h8 = -f8; - crypto_int32 h9 = -f9; - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_pow22523.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_pow22523.c deleted file mode 100644 index 56675a5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_pow22523.c +++ /dev/null @@ -1,13 +0,0 @@ -#include "fe.h" - -void fe_pow22523(fe out,const fe z) -{ - fe t0; - fe t1; - fe t2; - int i; - -#include "pow22523.h" - - return; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sq.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sq.c deleted file mode 100644 index 54a3949..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sq.c +++ /dev/null @@ -1,149 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" - -/* -h = f * f -Can overlap h with f. - -Preconditions: - |f| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc. - -Postconditions: - |h| bounded by 1.01*2^25,1.01*2^24,1.01*2^25,1.01*2^24,etc. -*/ - -/* -See fe_mul.c for discussion of implementation strategy. -*/ - -void fe_sq(fe h,const fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 f0_2 = 2 * f0; - crypto_int32 f1_2 = 2 * f1; - crypto_int32 f2_2 = 2 * f2; - crypto_int32 f3_2 = 2 * f3; - crypto_int32 f4_2 = 2 * f4; - crypto_int32 f5_2 = 2 * f5; - crypto_int32 f6_2 = 2 * f6; - crypto_int32 f7_2 = 2 * f7; - crypto_int32 f5_38 = 38 * f5; /* 1.959375*2^30 */ - crypto_int32 f6_19 = 19 * f6; /* 1.959375*2^30 */ - crypto_int32 f7_38 = 38 * f7; /* 1.959375*2^30 */ - crypto_int32 f8_19 = 19 * f8; /* 1.959375*2^30 */ - crypto_int32 f9_38 = 38 * f9; /* 1.959375*2^30 */ - crypto_int64 f0f0 = f0 * (crypto_int64) f0; - crypto_int64 f0f1_2 = f0_2 * (crypto_int64) f1; - crypto_int64 f0f2_2 = f0_2 * (crypto_int64) f2; - crypto_int64 f0f3_2 = f0_2 * (crypto_int64) f3; - crypto_int64 f0f4_2 = f0_2 * (crypto_int64) f4; - crypto_int64 f0f5_2 = f0_2 * (crypto_int64) f5; - crypto_int64 f0f6_2 = f0_2 * (crypto_int64) f6; - crypto_int64 f0f7_2 = f0_2 * (crypto_int64) f7; - crypto_int64 f0f8_2 = f0_2 * (crypto_int64) f8; - crypto_int64 f0f9_2 = f0_2 * (crypto_int64) f9; - crypto_int64 f1f1_2 = f1_2 * (crypto_int64) f1; - crypto_int64 f1f2_2 = f1_2 * (crypto_int64) f2; - crypto_int64 f1f3_4 = f1_2 * (crypto_int64) f3_2; - crypto_int64 f1f4_2 = f1_2 * (crypto_int64) f4; - crypto_int64 f1f5_4 = f1_2 * (crypto_int64) f5_2; - crypto_int64 f1f6_2 = f1_2 * (crypto_int64) f6; - crypto_int64 f1f7_4 = f1_2 * (crypto_int64) f7_2; - crypto_int64 f1f8_2 = f1_2 * (crypto_int64) f8; - crypto_int64 f1f9_76 = f1_2 * (crypto_int64) f9_38; - crypto_int64 f2f2 = f2 * (crypto_int64) f2; - crypto_int64 f2f3_2 = f2_2 * (crypto_int64) f3; - crypto_int64 f2f4_2 = f2_2 * (crypto_int64) f4; - crypto_int64 f2f5_2 = f2_2 * (crypto_int64) f5; - crypto_int64 f2f6_2 = f2_2 * (crypto_int64) f6; - crypto_int64 f2f7_2 = f2_2 * (crypto_int64) f7; - crypto_int64 f2f8_38 = f2_2 * (crypto_int64) f8_19; - crypto_int64 f2f9_38 = f2 * (crypto_int64) f9_38; - crypto_int64 f3f3_2 = f3_2 * (crypto_int64) f3; - crypto_int64 f3f4_2 = f3_2 * (crypto_int64) f4; - crypto_int64 f3f5_4 = f3_2 * (crypto_int64) f5_2; - crypto_int64 f3f6_2 = f3_2 * (crypto_int64) f6; - crypto_int64 f3f7_76 = f3_2 * (crypto_int64) f7_38; - crypto_int64 f3f8_38 = f3_2 * (crypto_int64) f8_19; - crypto_int64 f3f9_76 = f3_2 * (crypto_int64) f9_38; - crypto_int64 f4f4 = f4 * (crypto_int64) f4; - crypto_int64 f4f5_2 = f4_2 * (crypto_int64) f5; - crypto_int64 f4f6_38 = f4_2 * (crypto_int64) f6_19; - crypto_int64 f4f7_38 = f4 * (crypto_int64) f7_38; - crypto_int64 f4f8_38 = f4_2 * (crypto_int64) f8_19; - crypto_int64 f4f9_38 = f4 * (crypto_int64) f9_38; - crypto_int64 f5f5_38 = f5 * (crypto_int64) f5_38; - crypto_int64 f5f6_38 = f5_2 * (crypto_int64) f6_19; - crypto_int64 f5f7_76 = f5_2 * (crypto_int64) f7_38; - crypto_int64 f5f8_38 = f5_2 * (crypto_int64) f8_19; - crypto_int64 f5f9_76 = f5_2 * (crypto_int64) f9_38; - crypto_int64 f6f6_19 = f6 * (crypto_int64) f6_19; - crypto_int64 f6f7_38 = f6 * (crypto_int64) f7_38; - crypto_int64 f6f8_38 = f6_2 * (crypto_int64) f8_19; - crypto_int64 f6f9_38 = f6 * (crypto_int64) f9_38; - crypto_int64 f7f7_38 = f7 * (crypto_int64) f7_38; - crypto_int64 f7f8_38 = f7_2 * (crypto_int64) f8_19; - crypto_int64 f7f9_76 = f7_2 * (crypto_int64) f9_38; - crypto_int64 f8f8_19 = f8 * (crypto_int64) f8_19; - crypto_int64 f8f9_38 = f8 * (crypto_int64) f9_38; - crypto_int64 f9f9_38 = f9 * (crypto_int64) f9_38; - crypto_int64 h0 = f0f0 +f1f9_76+f2f8_38+f3f7_76+f4f6_38+f5f5_38; - crypto_int64 h1 = f0f1_2+f2f9_38+f3f8_38+f4f7_38+f5f6_38; - crypto_int64 h2 = f0f2_2+f1f1_2 +f3f9_76+f4f8_38+f5f7_76+f6f6_19; - crypto_int64 h3 = f0f3_2+f1f2_2 +f4f9_38+f5f8_38+f6f7_38; - crypto_int64 h4 = f0f4_2+f1f3_4 +f2f2 +f5f9_76+f6f8_38+f7f7_38; - crypto_int64 h5 = f0f5_2+f1f4_2 +f2f3_2 +f6f9_38+f7f8_38; - crypto_int64 h6 = f0f6_2+f1f5_4 +f2f4_2 +f3f3_2 +f7f9_76+f8f8_19; - crypto_int64 h7 = f0f7_2+f1f6_2 +f2f5_2 +f3f4_2 +f8f9_38; - crypto_int64 h8 = f0f8_2+f1f7_4 +f2f6_2 +f3f5_4 +f4f4 +f9f9_38; - crypto_int64 h9 = f0f9_2+f1f8_2 +f2f7_2 +f3f6_2 +f4f5_2; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - - h[0] = (crypto_int32) h0; - h[1] = (crypto_int32) h1; - h[2] = (crypto_int32) h2; - h[3] = (crypto_int32) h3; - h[4] = (crypto_int32) h4; - h[5] = (crypto_int32) h5; - h[6] = (crypto_int32) h6; - h[7] = (crypto_int32) h7; - h[8] = (crypto_int32) h8; - h[9] = (crypto_int32) h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sq2.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sq2.c deleted file mode 100644 index 01b149f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sq2.c +++ /dev/null @@ -1,160 +0,0 @@ -#include "fe.h" -#include "crypto_int64.h" - -/* -h = 2 * f * f -Can overlap h with f. - -Preconditions: - |f| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc. - -Postconditions: - |h| bounded by 1.01*2^25,1.01*2^24,1.01*2^25,1.01*2^24,etc. -*/ - -/* -See fe_mul.c for discussion of implementation strategy. -*/ - -void fe_sq2(fe h,const fe f) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 f0_2 = 2 * f0; - crypto_int32 f1_2 = 2 * f1; - crypto_int32 f2_2 = 2 * f2; - crypto_int32 f3_2 = 2 * f3; - crypto_int32 f4_2 = 2 * f4; - crypto_int32 f5_2 = 2 * f5; - crypto_int32 f6_2 = 2 * f6; - crypto_int32 f7_2 = 2 * f7; - crypto_int32 f5_38 = 38 * f5; /* 1.959375*2^30 */ - crypto_int32 f6_19 = 19 * f6; /* 1.959375*2^30 */ - crypto_int32 f7_38 = 38 * f7; /* 1.959375*2^30 */ - crypto_int32 f8_19 = 19 * f8; /* 1.959375*2^30 */ - crypto_int32 f9_38 = 38 * f9; /* 1.959375*2^30 */ - crypto_int64 f0f0 = f0 * (crypto_int64) f0; - crypto_int64 f0f1_2 = f0_2 * (crypto_int64) f1; - crypto_int64 f0f2_2 = f0_2 * (crypto_int64) f2; - crypto_int64 f0f3_2 = f0_2 * (crypto_int64) f3; - crypto_int64 f0f4_2 = f0_2 * (crypto_int64) f4; - crypto_int64 f0f5_2 = f0_2 * (crypto_int64) f5; - crypto_int64 f0f6_2 = f0_2 * (crypto_int64) f6; - crypto_int64 f0f7_2 = f0_2 * (crypto_int64) f7; - crypto_int64 f0f8_2 = f0_2 * (crypto_int64) f8; - crypto_int64 f0f9_2 = f0_2 * (crypto_int64) f9; - crypto_int64 f1f1_2 = f1_2 * (crypto_int64) f1; - crypto_int64 f1f2_2 = f1_2 * (crypto_int64) f2; - crypto_int64 f1f3_4 = f1_2 * (crypto_int64) f3_2; - crypto_int64 f1f4_2 = f1_2 * (crypto_int64) f4; - crypto_int64 f1f5_4 = f1_2 * (crypto_int64) f5_2; - crypto_int64 f1f6_2 = f1_2 * (crypto_int64) f6; - crypto_int64 f1f7_4 = f1_2 * (crypto_int64) f7_2; - crypto_int64 f1f8_2 = f1_2 * (crypto_int64) f8; - crypto_int64 f1f9_76 = f1_2 * (crypto_int64) f9_38; - crypto_int64 f2f2 = f2 * (crypto_int64) f2; - crypto_int64 f2f3_2 = f2_2 * (crypto_int64) f3; - crypto_int64 f2f4_2 = f2_2 * (crypto_int64) f4; - crypto_int64 f2f5_2 = f2_2 * (crypto_int64) f5; - crypto_int64 f2f6_2 = f2_2 * (crypto_int64) f6; - crypto_int64 f2f7_2 = f2_2 * (crypto_int64) f7; - crypto_int64 f2f8_38 = f2_2 * (crypto_int64) f8_19; - crypto_int64 f2f9_38 = f2 * (crypto_int64) f9_38; - crypto_int64 f3f3_2 = f3_2 * (crypto_int64) f3; - crypto_int64 f3f4_2 = f3_2 * (crypto_int64) f4; - crypto_int64 f3f5_4 = f3_2 * (crypto_int64) f5_2; - crypto_int64 f3f6_2 = f3_2 * (crypto_int64) f6; - crypto_int64 f3f7_76 = f3_2 * (crypto_int64) f7_38; - crypto_int64 f3f8_38 = f3_2 * (crypto_int64) f8_19; - crypto_int64 f3f9_76 = f3_2 * (crypto_int64) f9_38; - crypto_int64 f4f4 = f4 * (crypto_int64) f4; - crypto_int64 f4f5_2 = f4_2 * (crypto_int64) f5; - crypto_int64 f4f6_38 = f4_2 * (crypto_int64) f6_19; - crypto_int64 f4f7_38 = f4 * (crypto_int64) f7_38; - crypto_int64 f4f8_38 = f4_2 * (crypto_int64) f8_19; - crypto_int64 f4f9_38 = f4 * (crypto_int64) f9_38; - crypto_int64 f5f5_38 = f5 * (crypto_int64) f5_38; - crypto_int64 f5f6_38 = f5_2 * (crypto_int64) f6_19; - crypto_int64 f5f7_76 = f5_2 * (crypto_int64) f7_38; - crypto_int64 f5f8_38 = f5_2 * (crypto_int64) f8_19; - crypto_int64 f5f9_76 = f5_2 * (crypto_int64) f9_38; - crypto_int64 f6f6_19 = f6 * (crypto_int64) f6_19; - crypto_int64 f6f7_38 = f6 * (crypto_int64) f7_38; - crypto_int64 f6f8_38 = f6_2 * (crypto_int64) f8_19; - crypto_int64 f6f9_38 = f6 * (crypto_int64) f9_38; - crypto_int64 f7f7_38 = f7 * (crypto_int64) f7_38; - crypto_int64 f7f8_38 = f7_2 * (crypto_int64) f8_19; - crypto_int64 f7f9_76 = f7_2 * (crypto_int64) f9_38; - crypto_int64 f8f8_19 = f8 * (crypto_int64) f8_19; - crypto_int64 f8f9_38 = f8 * (crypto_int64) f9_38; - crypto_int64 f9f9_38 = f9 * (crypto_int64) f9_38; - crypto_int64 h0 = f0f0 +f1f9_76+f2f8_38+f3f7_76+f4f6_38+f5f5_38; - crypto_int64 h1 = f0f1_2+f2f9_38+f3f8_38+f4f7_38+f5f6_38; - crypto_int64 h2 = f0f2_2+f1f1_2 +f3f9_76+f4f8_38+f5f7_76+f6f6_19; - crypto_int64 h3 = f0f3_2+f1f2_2 +f4f9_38+f5f8_38+f6f7_38; - crypto_int64 h4 = f0f4_2+f1f3_4 +f2f2 +f5f9_76+f6f8_38+f7f7_38; - crypto_int64 h5 = f0f5_2+f1f4_2 +f2f3_2 +f6f9_38+f7f8_38; - crypto_int64 h6 = f0f6_2+f1f5_4 +f2f4_2 +f3f3_2 +f7f9_76+f8f8_19; - crypto_int64 h7 = f0f7_2+f1f6_2 +f2f5_2 +f3f4_2 +f8f9_38; - crypto_int64 h8 = f0f8_2+f1f7_4 +f2f6_2 +f3f5_4 +f4f4 +f9f9_38; - crypto_int64 h9 = f0f9_2+f1f8_2 +f2f7_2 +f3f6_2 +f4f5_2; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - - h0 += h0; - h1 += h1; - h2 += h2; - h3 += h3; - h4 += h4; - h5 += h5; - h6 += h6; - h7 += h7; - h8 += h8; - h9 += h9; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - - carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25; - carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25; - - carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26; - carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26; - - carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25; - carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25; - - carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26; - carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26; - - carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25; - - carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26; - - h[0] = (crypto_int32) h0; - h[1] = (crypto_int32) h1; - h[2] = (crypto_int32) h2; - h[3] = (crypto_int32) h3; - h[4] = (crypto_int32) h4; - h[5] = (crypto_int32) h5; - h[6] = (crypto_int32) h6; - h[7] = (crypto_int32) h7; - h[8] = (crypto_int32) h8; - h[9] = (crypto_int32) h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sub.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sub.c deleted file mode 100644 index 6e26b7d..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_sub.c +++ /dev/null @@ -1,57 +0,0 @@ -#include "fe.h" - -/* -h = f - g -Can overlap h with f or g. - -Preconditions: - |f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - |g| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc. - -Postconditions: - |h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. -*/ - -void fe_sub(fe h,const fe f,const fe g) -{ - crypto_int32 f0 = f[0]; - crypto_int32 f1 = f[1]; - crypto_int32 f2 = f[2]; - crypto_int32 f3 = f[3]; - crypto_int32 f4 = f[4]; - crypto_int32 f5 = f[5]; - crypto_int32 f6 = f[6]; - crypto_int32 f7 = f[7]; - crypto_int32 f8 = f[8]; - crypto_int32 f9 = f[9]; - crypto_int32 g0 = g[0]; - crypto_int32 g1 = g[1]; - crypto_int32 g2 = g[2]; - crypto_int32 g3 = g[3]; - crypto_int32 g4 = g[4]; - crypto_int32 g5 = g[5]; - crypto_int32 g6 = g[6]; - crypto_int32 g7 = g[7]; - crypto_int32 g8 = g[8]; - crypto_int32 g9 = g[9]; - crypto_int32 h0 = f0 - g0; - crypto_int32 h1 = f1 - g1; - crypto_int32 h2 = f2 - g2; - crypto_int32 h3 = f3 - g3; - crypto_int32 h4 = f4 - g4; - crypto_int32 h5 = f5 - g5; - crypto_int32 h6 = f6 - g6; - crypto_int32 h7 = f7 - g7; - crypto_int32 h8 = f8 - g8; - crypto_int32 h9 = f9 - g9; - h[0] = h0; - h[1] = h1; - h[2] = h2; - h[3] = h3; - h[4] = h4; - h[5] = h5; - h[6] = h6; - h[7] = h7; - h[8] = h8; - h[9] = h9; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_tobytes.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_tobytes.c deleted file mode 100644 index 0a63baf..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/fe_tobytes.c +++ /dev/null @@ -1,119 +0,0 @@ -#include "fe.h" - -/* -Preconditions: - |h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc. - -Write p=2^255-19; q=floor(h/p). -Basic claim: q = floor(2^(-255)(h + 19 2^(-25)h9 + 2^(-1))). - -Proof: - Have |h|<=p so |q|<=1 so |19^2 2^(-255) q|<1/4. - Also have |h-2^230 h9|<2^231 so |19 2^(-255)(h-2^230 h9)|<1/4. - - Write y=2^(-1)-19^2 2^(-255)q-19 2^(-255)(h-2^230 h9). - Then 0> 25; - q = (h0 + q) >> 26; - q = (h1 + q) >> 25; - q = (h2 + q) >> 26; - q = (h3 + q) >> 25; - q = (h4 + q) >> 26; - q = (h5 + q) >> 25; - q = (h6 + q) >> 26; - q = (h7 + q) >> 25; - q = (h8 + q) >> 26; - q = (h9 + q) >> 25; - - /* Goal: Output h-(2^255-19)q, which is between 0 and 2^255-20. */ - h0 += 19 * q; - /* Goal: Output h-2^255 q, which is between 0 and 2^255-20. */ - - carry0 = h0 >> 26; h1 += carry0; h0 -= carry0 << 26; - carry1 = h1 >> 25; h2 += carry1; h1 -= carry1 << 25; - carry2 = h2 >> 26; h3 += carry2; h2 -= carry2 << 26; - carry3 = h3 >> 25; h4 += carry3; h3 -= carry3 << 25; - carry4 = h4 >> 26; h5 += carry4; h4 -= carry4 << 26; - carry5 = h5 >> 25; h6 += carry5; h5 -= carry5 << 25; - carry6 = h6 >> 26; h7 += carry6; h6 -= carry6 << 26; - carry7 = h7 >> 25; h8 += carry7; h7 -= carry7 << 25; - carry8 = h8 >> 26; h9 += carry8; h8 -= carry8 << 26; - carry9 = h9 >> 25; h9 -= carry9 << 25; - /* h10 = carry9 */ - - /* - Goal: Output h0+...+2^255 h10-2^255 q, which is between 0 and 2^255-20. - Have h0+...+2^230 h9 between 0 and 2^255-1; - evidently 2^255 h10-2^255 q = 0. - Goal: Output h0+...+2^230 h9. - */ - - s[0] = h0 >> 0; - s[1] = h0 >> 8; - s[2] = h0 >> 16; - s[3] = (h0 >> 24) | (h1 << 2); - s[4] = h1 >> 6; - s[5] = h1 >> 14; - s[6] = (h1 >> 22) | (h2 << 3); - s[7] = h2 >> 5; - s[8] = h2 >> 13; - s[9] = (h2 >> 21) | (h3 << 5); - s[10] = h3 >> 3; - s[11] = h3 >> 11; - s[12] = (h3 >> 19) | (h4 << 6); - s[13] = h4 >> 2; - s[14] = h4 >> 10; - s[15] = h4 >> 18; - s[16] = h5 >> 0; - s[17] = h5 >> 8; - s[18] = h5 >> 16; - s[19] = (h5 >> 24) | (h6 << 1); - s[20] = h6 >> 7; - s[21] = h6 >> 15; - s[22] = (h6 >> 23) | (h7 << 3); - s[23] = h7 >> 5; - s[24] = h7 >> 13; - s[25] = (h7 >> 21) | (h8 << 4); - s[26] = h8 >> 4; - s[27] = h8 >> 12; - s[28] = (h8 >> 20) | (h9 << 6); - s[29] = h9 >> 2; - s[30] = h9 >> 10; - s[31] = h9 >> 18; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge.h deleted file mode 100644 index 55e95f9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge.h +++ /dev/null @@ -1,95 +0,0 @@ -#ifndef GE_H -#define GE_H - -/* -ge means group element. - -Here the group is the set of pairs (x,y) of field elements (see fe.h) -satisfying -x^2 + y^2 = 1 + d x^2y^2 -where d = -121665/121666. - -Representations: - ge_p2 (projective): (X:Y:Z) satisfying x=X/Z, y=Y/Z - ge_p3 (extended): (X:Y:Z:T) satisfying x=X/Z, y=Y/Z, XY=ZT - ge_p1p1 (completed): ((X:Z),(Y:T)) satisfying x=X/Z, y=Y/T - ge_precomp (Duif): (y+x,y-x,2dxy) -*/ - -#include "fe.h" - -typedef struct { - fe X; - fe Y; - fe Z; -} ge_p2; - -typedef struct { - fe X; - fe Y; - fe Z; - fe T; -} ge_p3; - -typedef struct { - fe X; - fe Y; - fe Z; - fe T; -} ge_p1p1; - -typedef struct { - fe yplusx; - fe yminusx; - fe xy2d; -} ge_precomp; - -typedef struct { - fe YplusX; - fe YminusX; - fe Z; - fe T2d; -} ge_cached; - -#define ge_frombytes_negate_vartime crypto_sign_ed25519_ref10_ge_frombytes_negate_vartime -#define ge_tobytes crypto_sign_ed25519_ref10_ge_tobytes -#define ge_p3_tobytes crypto_sign_ed25519_ref10_ge_p3_tobytes - -#define ge_p2_0 crypto_sign_ed25519_ref10_ge_p2_0 -#define ge_p3_0 crypto_sign_ed25519_ref10_ge_p3_0 -#define ge_precomp_0 crypto_sign_ed25519_ref10_ge_precomp_0 -#define ge_p3_to_p2 crypto_sign_ed25519_ref10_ge_p3_to_p2 -#define ge_p3_to_cached crypto_sign_ed25519_ref10_ge_p3_to_cached -#define ge_p1p1_to_p2 crypto_sign_ed25519_ref10_ge_p1p1_to_p2 -#define ge_p1p1_to_p3 crypto_sign_ed25519_ref10_ge_p1p1_to_p3 -#define ge_p2_dbl crypto_sign_ed25519_ref10_ge_p2_dbl -#define ge_p3_dbl crypto_sign_ed25519_ref10_ge_p3_dbl - -#define ge_madd crypto_sign_ed25519_ref10_ge_madd -#define ge_msub crypto_sign_ed25519_ref10_ge_msub -#define ge_add crypto_sign_ed25519_ref10_ge_add -#define ge_sub crypto_sign_ed25519_ref10_ge_sub -#define ge_scalarmult_base crypto_sign_ed25519_ref10_ge_scalarmult_base -#define ge_double_scalarmult_vartime crypto_sign_ed25519_ref10_ge_double_scalarmult_vartime - -extern void ge_tobytes(unsigned char *,const ge_p2 *); -extern void ge_p3_tobytes(unsigned char *,const ge_p3 *); -extern int ge_frombytes_negate_vartime(ge_p3 *,const unsigned char *); - -extern void ge_p2_0(ge_p2 *); -extern void ge_p3_0(ge_p3 *); -extern void ge_precomp_0(ge_precomp *); -extern void ge_p3_to_p2(ge_p2 *,const ge_p3 *); -extern void ge_p3_to_cached(ge_cached *,const ge_p3 *); -extern void ge_p1p1_to_p2(ge_p2 *,const ge_p1p1 *); -extern void ge_p1p1_to_p3(ge_p3 *,const ge_p1p1 *); -extern void ge_p2_dbl(ge_p1p1 *,const ge_p2 *); -extern void ge_p3_dbl(ge_p1p1 *,const ge_p3 *); - -extern void ge_madd(ge_p1p1 *,const ge_p3 *,const ge_precomp *); -extern void ge_msub(ge_p1p1 *,const ge_p3 *,const ge_precomp *); -extern void ge_add(ge_p1p1 *,const ge_p3 *,const ge_cached *); -extern void ge_sub(ge_p1p1 *,const ge_p3 *,const ge_cached *); -extern void ge_scalarmult_base(ge_p3 *,const unsigned char *); -extern void ge_double_scalarmult_vartime(ge_p2 *,const unsigned char *,const ge_p3 *,const unsigned char *); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.c deleted file mode 100644 index da7ff5d..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "ge.h" - -/* -r = p + q -*/ - -void ge_add(ge_p1p1 *r,const ge_p3 *p,const ge_cached *q) -{ - fe t0; -#include "ge_add.h" -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.h deleted file mode 100644 index 7481f8f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_add.h +++ /dev/null @@ -1,97 +0,0 @@ - -/* qhasm: enter ge_add */ - -/* qhasm: fe X1 */ - -/* qhasm: fe Y1 */ - -/* qhasm: fe Z1 */ - -/* qhasm: fe Z2 */ - -/* qhasm: fe T1 */ - -/* qhasm: fe ZZ */ - -/* qhasm: fe YpX2 */ - -/* qhasm: fe YmX2 */ - -/* qhasm: fe T2d2 */ - -/* qhasm: fe X3 */ - -/* qhasm: fe Y3 */ - -/* qhasm: fe Z3 */ - -/* qhasm: fe T3 */ - -/* qhasm: fe YpX1 */ - -/* qhasm: fe YmX1 */ - -/* qhasm: fe A */ - -/* qhasm: fe B */ - -/* qhasm: fe C */ - -/* qhasm: fe D */ - -/* qhasm: YpX1 = Y1+X1 */ -/* asm 1: fe_add(>YpX1=fe#1,YpX1=r->X,Y,X); */ -fe_add(r->X,p->Y,p->X); - -/* qhasm: YmX1 = Y1-X1 */ -/* asm 1: fe_sub(>YmX1=fe#2,YmX1=r->Y,Y,X); */ -fe_sub(r->Y,p->Y,p->X); - -/* qhasm: A = YpX1*YpX2 */ -/* asm 1: fe_mul(>A=fe#3,A=r->Z,X,YplusX); */ -fe_mul(r->Z,r->X,q->YplusX); - -/* qhasm: B = YmX1*YmX2 */ -/* asm 1: fe_mul(>B=fe#2,B=r->Y,Y,YminusX); */ -fe_mul(r->Y,r->Y,q->YminusX); - -/* qhasm: C = T2d2*T1 */ -/* asm 1: fe_mul(>C=fe#4,C=r->T,T2d,T); */ -fe_mul(r->T,q->T2d,p->T); - -/* qhasm: ZZ = Z1*Z2 */ -/* asm 1: fe_mul(>ZZ=fe#1,ZZ=r->X,Z,Z); */ -fe_mul(r->X,p->Z,q->Z); - -/* qhasm: D = 2*ZZ */ -/* asm 1: fe_add(>D=fe#5,D=t0,X,X); */ -fe_add(t0,r->X,r->X); - -/* qhasm: X3 = A-B */ -/* asm 1: fe_sub(>X3=fe#1,X3=r->X,Z,Y); */ -fe_sub(r->X,r->Z,r->Y); - -/* qhasm: Y3 = A+B */ -/* asm 1: fe_add(>Y3=fe#2,Y3=r->Y,Z,Y); */ -fe_add(r->Y,r->Z,r->Y); - -/* qhasm: Z3 = D+C */ -/* asm 1: fe_add(>Z3=fe#3,Z3=r->Z,T); */ -fe_add(r->Z,t0,r->T); - -/* qhasm: T3 = D-C */ -/* asm 1: fe_sub(>T3=fe#4,T3=r->T,T); */ -fe_sub(r->T,t0,r->T); - -/* qhasm: return */ diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_double_scalarmult.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_double_scalarmult.c deleted file mode 100644 index f8bf4bf..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_double_scalarmult.c +++ /dev/null @@ -1,96 +0,0 @@ -#include "ge.h" - -static void slide(signed char *r,const unsigned char *a) -{ - int i; - int b; - int k; - - for (i = 0;i < 256;++i) - r[i] = 1 & (a[i >> 3] >> (i & 7)); - - for (i = 0;i < 256;++i) - if (r[i]) { - for (b = 1;b <= 6 && i + b < 256;++b) { - if (r[i + b]) { - if (r[i] + (r[i + b] << b) <= 15) { - r[i] += r[i + b] << b; r[i + b] = 0; - } else if (r[i] - (r[i + b] << b) >= -15) { - r[i] -= r[i + b] << b; - for (k = i + b;k < 256;++k) { - if (!r[k]) { - r[k] = 1; - break; - } - r[k] = 0; - } - } else - break; - } - } - } - -} - -static ge_precomp Bi[8] = { -#include "base2.h" -} ; - -/* -r = a * A + b * B -where a = a[0]+256*a[1]+...+256^31 a[31]. -and b = b[0]+256*b[1]+...+256^31 b[31]. -B is the Ed25519 base point (x,4/5) with x positive. -*/ - -void ge_double_scalarmult_vartime(ge_p2 *r,const unsigned char *a,const ge_p3 *A,const unsigned char *b) -{ - signed char aslide[256]; - signed char bslide[256]; - ge_cached Ai[8]; /* A,3A,5A,7A,9A,11A,13A,15A */ - ge_p1p1 t; - ge_p3 u; - ge_p3 A2; - int i; - - slide(aslide,a); - slide(bslide,b); - - ge_p3_to_cached(&Ai[0],A); - ge_p3_dbl(&t,A); ge_p1p1_to_p3(&A2,&t); - ge_add(&t,&A2,&Ai[0]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[1],&u); - ge_add(&t,&A2,&Ai[1]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[2],&u); - ge_add(&t,&A2,&Ai[2]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[3],&u); - ge_add(&t,&A2,&Ai[3]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[4],&u); - ge_add(&t,&A2,&Ai[4]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[5],&u); - ge_add(&t,&A2,&Ai[5]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[6],&u); - ge_add(&t,&A2,&Ai[6]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[7],&u); - - ge_p2_0(r); - - for (i = 255;i >= 0;--i) { - if (aslide[i] || bslide[i]) break; - } - - for (;i >= 0;--i) { - ge_p2_dbl(&t,r); - - if (aslide[i] > 0) { - ge_p1p1_to_p3(&u,&t); - ge_add(&t,&u,&Ai[aslide[i]/2]); - } else if (aslide[i] < 0) { - ge_p1p1_to_p3(&u,&t); - ge_sub(&t,&u,&Ai[(-aslide[i])/2]); - } - - if (bslide[i] > 0) { - ge_p1p1_to_p3(&u,&t); - ge_madd(&t,&u,&Bi[bslide[i]/2]); - } else if (bslide[i] < 0) { - ge_p1p1_to_p3(&u,&t); - ge_msub(&t,&u,&Bi[(-bslide[i])/2]); - } - - ge_p1p1_to_p2(r,&t); - } -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_frombytes.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_frombytes.c deleted file mode 100644 index 1a059ee..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_frombytes.c +++ /dev/null @@ -1,50 +0,0 @@ -#include "ge.h" - -static const fe d = { -#include "d.h" -} ; - -static const fe sqrtm1 = { -#include "sqrtm1.h" -} ; - -int ge_frombytes_negate_vartime(ge_p3 *h,const unsigned char *s) -{ - fe u; - fe v; - fe v3; - fe vxx; - fe check; - - fe_frombytes(h->Y,s); - fe_1(h->Z); - fe_sq(u,h->Y); - fe_mul(v,u,d); - fe_sub(u,u,h->Z); /* u = y^2-1 */ - fe_add(v,v,h->Z); /* v = dy^2+1 */ - - fe_sq(v3,v); - fe_mul(v3,v3,v); /* v3 = v^3 */ - fe_sq(h->X,v3); - fe_mul(h->X,h->X,v); - fe_mul(h->X,h->X,u); /* x = uv^7 */ - - fe_pow22523(h->X,h->X); /* x = (uv^7)^((q-5)/8) */ - fe_mul(h->X,h->X,v3); - fe_mul(h->X,h->X,u); /* x = uv^3(uv^7)^((q-5)/8) */ - - fe_sq(vxx,h->X); - fe_mul(vxx,vxx,v); - fe_sub(check,vxx,u); /* vx^2-u */ - if (fe_isnonzero(check)) { - fe_add(check,vxx,u); /* vx^2+u */ - if (fe_isnonzero(check)) return -1; - fe_mul(h->X,h->X,sqrtm1); - } - - if (fe_isnegative(h->X) == (s[31] >> 7)) - fe_neg(h->X,h->X); - - fe_mul(h->T,h->X,h->Y); - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.c deleted file mode 100644 index 6225717..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "ge.h" - -/* -r = p + q -*/ - -void ge_madd(ge_p1p1 *r,const ge_p3 *p,const ge_precomp *q) -{ - fe t0; -#include "ge_madd.h" -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.h deleted file mode 100644 index ecae849..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_madd.h +++ /dev/null @@ -1,88 +0,0 @@ - -/* qhasm: enter ge_madd */ - -/* qhasm: fe X1 */ - -/* qhasm: fe Y1 */ - -/* qhasm: fe Z1 */ - -/* qhasm: fe T1 */ - -/* qhasm: fe ypx2 */ - -/* qhasm: fe ymx2 */ - -/* qhasm: fe xy2d2 */ - -/* qhasm: fe X3 */ - -/* qhasm: fe Y3 */ - -/* qhasm: fe Z3 */ - -/* qhasm: fe T3 */ - -/* qhasm: fe YpX1 */ - -/* qhasm: fe YmX1 */ - -/* qhasm: fe A */ - -/* qhasm: fe B */ - -/* qhasm: fe C */ - -/* qhasm: fe D */ - -/* qhasm: YpX1 = Y1+X1 */ -/* asm 1: fe_add(>YpX1=fe#1,YpX1=r->X,Y,X); */ -fe_add(r->X,p->Y,p->X); - -/* qhasm: YmX1 = Y1-X1 */ -/* asm 1: fe_sub(>YmX1=fe#2,YmX1=r->Y,Y,X); */ -fe_sub(r->Y,p->Y,p->X); - -/* qhasm: A = YpX1*ypx2 */ -/* asm 1: fe_mul(>A=fe#3,A=r->Z,X,yplusx); */ -fe_mul(r->Z,r->X,q->yplusx); - -/* qhasm: B = YmX1*ymx2 */ -/* asm 1: fe_mul(>B=fe#2,B=r->Y,Y,yminusx); */ -fe_mul(r->Y,r->Y,q->yminusx); - -/* qhasm: C = xy2d2*T1 */ -/* asm 1: fe_mul(>C=fe#4,C=r->T,xy2d,T); */ -fe_mul(r->T,q->xy2d,p->T); - -/* qhasm: D = 2*Z1 */ -/* asm 1: fe_add(>D=fe#5,D=t0,Z,Z); */ -fe_add(t0,p->Z,p->Z); - -/* qhasm: X3 = A-B */ -/* asm 1: fe_sub(>X3=fe#1,X3=r->X,Z,Y); */ -fe_sub(r->X,r->Z,r->Y); - -/* qhasm: Y3 = A+B */ -/* asm 1: fe_add(>Y3=fe#2,Y3=r->Y,Z,Y); */ -fe_add(r->Y,r->Z,r->Y); - -/* qhasm: Z3 = D+C */ -/* asm 1: fe_add(>Z3=fe#3,Z3=r->Z,T); */ -fe_add(r->Z,t0,r->T); - -/* qhasm: T3 = D-C */ -/* asm 1: fe_sub(>T3=fe#4,T3=r->T,T); */ -fe_sub(r->T,t0,r->T); - -/* qhasm: return */ diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.c deleted file mode 100644 index 741ecbf..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "ge.h" - -/* -r = p - q -*/ - -void ge_msub(ge_p1p1 *r,const ge_p3 *p,const ge_precomp *q) -{ - fe t0; -#include "ge_msub.h" -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.h deleted file mode 100644 index 500f986..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_msub.h +++ /dev/null @@ -1,88 +0,0 @@ - -/* qhasm: enter ge_msub */ - -/* qhasm: fe X1 */ - -/* qhasm: fe Y1 */ - -/* qhasm: fe Z1 */ - -/* qhasm: fe T1 */ - -/* qhasm: fe ypx2 */ - -/* qhasm: fe ymx2 */ - -/* qhasm: fe xy2d2 */ - -/* qhasm: fe X3 */ - -/* qhasm: fe Y3 */ - -/* qhasm: fe Z3 */ - -/* qhasm: fe T3 */ - -/* qhasm: fe YpX1 */ - -/* qhasm: fe YmX1 */ - -/* qhasm: fe A */ - -/* qhasm: fe B */ - -/* qhasm: fe C */ - -/* qhasm: fe D */ - -/* qhasm: YpX1 = Y1+X1 */ -/* asm 1: fe_add(>YpX1=fe#1,YpX1=r->X,Y,X); */ -fe_add(r->X,p->Y,p->X); - -/* qhasm: YmX1 = Y1-X1 */ -/* asm 1: fe_sub(>YmX1=fe#2,YmX1=r->Y,Y,X); */ -fe_sub(r->Y,p->Y,p->X); - -/* qhasm: A = YpX1*ymx2 */ -/* asm 1: fe_mul(>A=fe#3,A=r->Z,X,yminusx); */ -fe_mul(r->Z,r->X,q->yminusx); - -/* qhasm: B = YmX1*ypx2 */ -/* asm 1: fe_mul(>B=fe#2,B=r->Y,Y,yplusx); */ -fe_mul(r->Y,r->Y,q->yplusx); - -/* qhasm: C = xy2d2*T1 */ -/* asm 1: fe_mul(>C=fe#4,C=r->T,xy2d,T); */ -fe_mul(r->T,q->xy2d,p->T); - -/* qhasm: D = 2*Z1 */ -/* asm 1: fe_add(>D=fe#5,D=t0,Z,Z); */ -fe_add(t0,p->Z,p->Z); - -/* qhasm: X3 = A-B */ -/* asm 1: fe_sub(>X3=fe#1,X3=r->X,Z,Y); */ -fe_sub(r->X,r->Z,r->Y); - -/* qhasm: Y3 = A+B */ -/* asm 1: fe_add(>Y3=fe#2,Y3=r->Y,Z,Y); */ -fe_add(r->Y,r->Z,r->Y); - -/* qhasm: Z3 = D-C */ -/* asm 1: fe_sub(>Z3=fe#3,Z3=r->Z,T); */ -fe_sub(r->Z,t0,r->T); - -/* qhasm: T3 = D+C */ -/* asm 1: fe_add(>T3=fe#4,T3=r->T,T); */ -fe_add(r->T,t0,r->T); - -/* qhasm: return */ diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p2.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p2.c deleted file mode 100644 index 9bb5013..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p2.c +++ /dev/null @@ -1,12 +0,0 @@ -#include "ge.h" - -/* -r = p -*/ - -extern void ge_p1p1_to_p2(ge_p2 *r,const ge_p1p1 *p) -{ - fe_mul(r->X,p->X,p->T); - fe_mul(r->Y,p->Y,p->Z); - fe_mul(r->Z,p->Z,p->T); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p3.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p3.c deleted file mode 100644 index 2f57b10..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p1p1_to_p3.c +++ /dev/null @@ -1,13 +0,0 @@ -#include "ge.h" - -/* -r = p -*/ - -extern void ge_p1p1_to_p3(ge_p3 *r,const ge_p1p1 *p) -{ - fe_mul(r->X,p->X,p->T); - fe_mul(r->Y,p->Y,p->Z); - fe_mul(r->Z,p->Z,p->T); - fe_mul(r->T,p->X,p->Y); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_0.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_0.c deleted file mode 100644 index 6191d1e..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_0.c +++ /dev/null @@ -1,8 +0,0 @@ -#include "ge.h" - -void ge_p2_0(ge_p2 *h) -{ - fe_0(h->X); - fe_1(h->Y); - fe_1(h->Z); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.c deleted file mode 100644 index 2e332b5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "ge.h" - -/* -r = 2 * p -*/ - -void ge_p2_dbl(ge_p1p1 *r,const ge_p2 *p) -{ - fe t0; -#include "ge_p2_dbl.h" -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.h deleted file mode 100644 index 128efed..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p2_dbl.h +++ /dev/null @@ -1,73 +0,0 @@ - -/* qhasm: enter ge_p2_dbl */ - -/* qhasm: fe X1 */ - -/* qhasm: fe Y1 */ - -/* qhasm: fe Z1 */ - -/* qhasm: fe A */ - -/* qhasm: fe AA */ - -/* qhasm: fe XX */ - -/* qhasm: fe YY */ - -/* qhasm: fe B */ - -/* qhasm: fe X3 */ - -/* qhasm: fe Y3 */ - -/* qhasm: fe Z3 */ - -/* qhasm: fe T3 */ - -/* qhasm: XX=X1^2 */ -/* asm 1: fe_sq(>XX=fe#1,XX=r->X,X); */ -fe_sq(r->X,p->X); - -/* qhasm: YY=Y1^2 */ -/* asm 1: fe_sq(>YY=fe#3,YY=r->Z,Y); */ -fe_sq(r->Z,p->Y); - -/* qhasm: B=2*Z1^2 */ -/* asm 1: fe_sq2(>B=fe#4,B=r->T,Z); */ -fe_sq2(r->T,p->Z); - -/* qhasm: A=X1+Y1 */ -/* asm 1: fe_add(>A=fe#2,A=r->Y,X,Y); */ -fe_add(r->Y,p->X,p->Y); - -/* qhasm: AA=A^2 */ -/* asm 1: fe_sq(>AA=fe#5,AA=t0,Y); */ -fe_sq(t0,r->Y); - -/* qhasm: Y3=YY+XX */ -/* asm 1: fe_add(>Y3=fe#2,Y3=r->Y,Z,X); */ -fe_add(r->Y,r->Z,r->X); - -/* qhasm: Z3=YY-XX */ -/* asm 1: fe_sub(>Z3=fe#3,Z3=r->Z,Z,X); */ -fe_sub(r->Z,r->Z,r->X); - -/* qhasm: X3=AA-Y3 */ -/* asm 1: fe_sub(>X3=fe#1,X3=r->X,Y); */ -fe_sub(r->X,t0,r->Y); - -/* qhasm: T3=B-Z3 */ -/* asm 1: fe_sub(>T3=fe#4,T3=r->T,T,Z); */ -fe_sub(r->T,r->T,r->Z); - -/* qhasm: return */ diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_0.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_0.c deleted file mode 100644 index 401b293..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_0.c +++ /dev/null @@ -1,9 +0,0 @@ -#include "ge.h" - -void ge_p3_0(ge_p3 *h) -{ - fe_0(h->X); - fe_1(h->Y); - fe_1(h->Z); - fe_0(h->T); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_dbl.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_dbl.c deleted file mode 100644 index 0d8a059..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_dbl.c +++ /dev/null @@ -1,12 +0,0 @@ -#include "ge.h" - -/* -r = 2 * p -*/ - -void ge_p3_dbl(ge_p1p1 *r,const ge_p3 *p) -{ - ge_p2 q; - ge_p3_to_p2(&q,p); - ge_p2_dbl(r,&q); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_cached.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_cached.c deleted file mode 100644 index bde6422..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_cached.c +++ /dev/null @@ -1,17 +0,0 @@ -#include "ge.h" - -/* -r = p -*/ - -static const fe d2 = { -#include "d2.h" -} ; - -extern void ge_p3_to_cached(ge_cached *r,const ge_p3 *p) -{ - fe_add(r->YplusX,p->Y,p->X); - fe_sub(r->YminusX,p->Y,p->X); - fe_copy(r->Z,p->Z); - fe_mul(r->T2d,p->T,d2); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_p2.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_p2.c deleted file mode 100644 index e532a9e..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_to_p2.c +++ /dev/null @@ -1,12 +0,0 @@ -#include "ge.h" - -/* -r = p -*/ - -extern void ge_p3_to_p2(ge_p2 *r,const ge_p3 *p) -{ - fe_copy(r->X,p->X); - fe_copy(r->Y,p->Y); - fe_copy(r->Z,p->Z); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_tobytes.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_tobytes.c deleted file mode 100644 index 21cb2fc..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_p3_tobytes.c +++ /dev/null @@ -1,14 +0,0 @@ -#include "ge.h" - -void ge_p3_tobytes(unsigned char *s,const ge_p3 *h) -{ - fe recip; - fe x; - fe y; - - fe_invert(recip,h->Z); - fe_mul(x,h->X,recip); - fe_mul(y,h->Y,recip); - fe_tobytes(s,y); - s[31] ^= fe_isnegative(x) << 7; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_precomp_0.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_precomp_0.c deleted file mode 100644 index 2e21886..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_precomp_0.c +++ /dev/null @@ -1,8 +0,0 @@ -#include "ge.h" - -void ge_precomp_0(ge_precomp *h) -{ - fe_1(h->yplusx); - fe_1(h->yminusx); - fe_0(h->xy2d); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_scalarmult_base.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_scalarmult_base.c deleted file mode 100644 index f3490a9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_scalarmult_base.c +++ /dev/null @@ -1,111 +0,0 @@ -#include "ge.h" -#include "crypto_uint32.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -#endif - -static unsigned char equal(signed char b,signed char c) -{ - unsigned char ub = b; - unsigned char uc = c; - unsigned char x = ub ^ uc; /* 0: yes; 1..255: no */ - crypto_uint32 y = x; /* 0: yes; 1..255: no */ - y -= 1; /* 4294967295: yes; 0..254: no */ - y >>= 31; /* 1: yes; 0: no */ - return y; -} - -static unsigned char negative(signed char b) -{ - unsigned long long x = b; /* 18446744073709551361..18446744073709551615: yes; 0..255: no */ - x >>= 63; /* 1: yes; 0: no */ - return x; -} - -static void cmov(ge_precomp *t,ge_precomp *u,unsigned char b) -{ - fe_cmov(t->yplusx,u->yplusx,b); - fe_cmov(t->yminusx,u->yminusx,b); - fe_cmov(t->xy2d,u->xy2d,b); -} - -/* base[i][j] = (j+1)*256^i*B */ -static ge_precomp base[32][8] = { -#include "base.h" -} ; - -static void ge_select(ge_precomp *t,int pos,signed char b) -{ - ge_precomp minust; - unsigned char bnegative = negative(b); - unsigned char babs = b - (((-bnegative) & b) << 1); - - ge_precomp_0(t); - cmov(t,&base[pos][0],equal(babs,1)); - cmov(t,&base[pos][1],equal(babs,2)); - cmov(t,&base[pos][2],equal(babs,3)); - cmov(t,&base[pos][3],equal(babs,4)); - cmov(t,&base[pos][4],equal(babs,5)); - cmov(t,&base[pos][5],equal(babs,6)); - cmov(t,&base[pos][6],equal(babs,7)); - cmov(t,&base[pos][7],equal(babs,8)); - fe_copy(minust.yplusx,t->yminusx); - fe_copy(minust.yminusx,t->yplusx); - fe_neg(minust.xy2d,t->xy2d); - cmov(t,&minust,bnegative); -} - -/* -h = a * B -where a = a[0]+256*a[1]+...+256^31 a[31] -B is the Ed25519 base point (x,4/5) with x positive. - -Preconditions: - a[31] <= 127 -*/ - -void ge_scalarmult_base(ge_p3 *h,const unsigned char *a) -{ - signed char e[64]; - signed char carry; - ge_p1p1 r; - ge_p2 s; - ge_precomp t; - int i; - - for (i = 0;i < 32;++i) { - e[2 * i + 0] = (a[i] >> 0) & 15; - e[2 * i + 1] = (a[i] >> 4) & 15; - } - /* each e[i] is between 0 and 15 */ - /* e[63] is between 0 and 7 */ - - carry = 0; - for (i = 0;i < 63;++i) { - e[i] += carry; - carry = e[i] + 8; - carry >>= 4; - e[i] -= carry << 4; - } - e[63] += carry; - /* each e[i] is between -8 and 8 */ - - ge_p3_0(h); - for (i = 1;i < 64;i += 2) { - ge_select(&t,i / 2,e[i]); - ge_madd(&r,h,&t); ge_p1p1_to_p3(h,&r); - } - - ge_p3_dbl(&r,h); ge_p1p1_to_p2(&s,&r); - ge_p2_dbl(&r,&s); ge_p1p1_to_p2(&s,&r); - ge_p2_dbl(&r,&s); ge_p1p1_to_p2(&s,&r); - ge_p2_dbl(&r,&s); ge_p1p1_to_p3(h,&r); - - for (i = 0;i < 64;i += 2) { - ge_select(&t,i / 2,e[i]); - ge_madd(&r,h,&t); ge_p1p1_to_p3(h,&r); - } -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.c deleted file mode 100644 index 69f3d54..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "ge.h" - -/* -r = p - q -*/ - -void ge_sub(ge_p1p1 *r,const ge_p3 *p,const ge_cached *q) -{ - fe t0; -#include "ge_sub.h" -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.h deleted file mode 100644 index b4ef1f5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_sub.h +++ /dev/null @@ -1,97 +0,0 @@ - -/* qhasm: enter ge_sub */ - -/* qhasm: fe X1 */ - -/* qhasm: fe Y1 */ - -/* qhasm: fe Z1 */ - -/* qhasm: fe Z2 */ - -/* qhasm: fe T1 */ - -/* qhasm: fe ZZ */ - -/* qhasm: fe YpX2 */ - -/* qhasm: fe YmX2 */ - -/* qhasm: fe T2d2 */ - -/* qhasm: fe X3 */ - -/* qhasm: fe Y3 */ - -/* qhasm: fe Z3 */ - -/* qhasm: fe T3 */ - -/* qhasm: fe YpX1 */ - -/* qhasm: fe YmX1 */ - -/* qhasm: fe A */ - -/* qhasm: fe B */ - -/* qhasm: fe C */ - -/* qhasm: fe D */ - -/* qhasm: YpX1 = Y1+X1 */ -/* asm 1: fe_add(>YpX1=fe#1,YpX1=r->X,Y,X); */ -fe_add(r->X,p->Y,p->X); - -/* qhasm: YmX1 = Y1-X1 */ -/* asm 1: fe_sub(>YmX1=fe#2,YmX1=r->Y,Y,X); */ -fe_sub(r->Y,p->Y,p->X); - -/* qhasm: A = YpX1*YmX2 */ -/* asm 1: fe_mul(>A=fe#3,A=r->Z,X,YminusX); */ -fe_mul(r->Z,r->X,q->YminusX); - -/* qhasm: B = YmX1*YpX2 */ -/* asm 1: fe_mul(>B=fe#2,B=r->Y,Y,YplusX); */ -fe_mul(r->Y,r->Y,q->YplusX); - -/* qhasm: C = T2d2*T1 */ -/* asm 1: fe_mul(>C=fe#4,C=r->T,T2d,T); */ -fe_mul(r->T,q->T2d,p->T); - -/* qhasm: ZZ = Z1*Z2 */ -/* asm 1: fe_mul(>ZZ=fe#1,ZZ=r->X,Z,Z); */ -fe_mul(r->X,p->Z,q->Z); - -/* qhasm: D = 2*ZZ */ -/* asm 1: fe_add(>D=fe#5,D=t0,X,X); */ -fe_add(t0,r->X,r->X); - -/* qhasm: X3 = A-B */ -/* asm 1: fe_sub(>X3=fe#1,X3=r->X,Z,Y); */ -fe_sub(r->X,r->Z,r->Y); - -/* qhasm: Y3 = A+B */ -/* asm 1: fe_add(>Y3=fe#2,Y3=r->Y,Z,Y); */ -fe_add(r->Y,r->Z,r->Y); - -/* qhasm: Z3 = D-C */ -/* asm 1: fe_sub(>Z3=fe#3,Z3=r->Z,T); */ -fe_sub(r->Z,t0,r->T); - -/* qhasm: T3 = D+C */ -/* asm 1: fe_add(>T3=fe#4,T3=r->T,T); */ -fe_add(r->T,t0,r->T); - -/* qhasm: return */ diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_tobytes.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_tobytes.c deleted file mode 100644 index 31b3d33..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ge_tobytes.c +++ /dev/null @@ -1,14 +0,0 @@ -#include "ge.h" - -void ge_tobytes(unsigned char *s,const ge_p2 *h) -{ - fe recip; - fe x; - fe y; - - fe_invert(recip,h->Z); - fe_mul(x,h->X,recip); - fe_mul(y,h->Y,recip); - fe_tobytes(s,y); - s[31] ^= fe_isnegative(x) << 7; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/keypair.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/keypair.c deleted file mode 100644 index b6335f3..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/keypair.c +++ /dev/null @@ -1,78 +0,0 @@ - -#include - -#include "api.h" -#include "crypto_hash_sha512.h" -#include "crypto_scalarmult_curve25519.h" -#include "randombytes.h" -#include "utils.h" -#include "fe.h" -#include "ge.h" - -int crypto_sign_seed_keypair(unsigned char *pk, unsigned char *sk, - const unsigned char *seed) -{ - ge_p3 A; - - crypto_hash_sha512(sk,seed,32); - sk[0] &= 248; - sk[31] &= 63; - sk[31] |= 64; - - ge_scalarmult_base(&A,sk); - ge_p3_tobytes(pk,&A); - - memmove(sk, seed, 32); - memmove(sk + 32, pk, 32); - return 0; -} - -int crypto_sign_keypair(unsigned char *pk, unsigned char *sk) -{ - unsigned char seed[32]; - int ret; - - randombytes_buf(seed, sizeof seed); - ret = crypto_sign_seed_keypair(pk, sk, seed); - sodium_memzero(seed, sizeof seed); - - return ret; -} - -int crypto_sign_ed25519_pk_to_curve25519(unsigned char *curve25519_pk, - const unsigned char *ed25519_pk) -{ - ge_p3 A; - fe x; - fe one_minus_y; - - if (ge_frombytes_negate_vartime(&A, ed25519_pk) != 0) { - return -1; - } - fe_1(one_minus_y); - fe_sub(one_minus_y, one_minus_y, A.Y); - fe_invert(one_minus_y, one_minus_y); - fe_1(x); - fe_add(x, x, A.Y); - fe_mul(x, x, one_minus_y); - fe_tobytes(curve25519_pk, x); - - return 0; -} - -int crypto_sign_ed25519_sk_to_curve25519(unsigned char *curve25519_sk, - const unsigned char *ed25519_sk) -{ - unsigned char h[crypto_hash_sha512_BYTES]; - - crypto_hash_sha512(h, ed25519_sk, - crypto_sign_ed25519_SECRETKEYBYTES - - crypto_sign_ed25519_PUBLICKEYBYTES); - h[0] &= 248; - h[31] &= 127; - h[31] |= 64; - memcpy(curve25519_sk, h, crypto_scalarmult_curve25519_BYTES); - sodium_memzero(h, sizeof h); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/open.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/open.c deleted file mode 100644 index 71e9d1b..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/open.c +++ /dev/null @@ -1,77 +0,0 @@ - -#include -#include - -#include "api.h" -#include "crypto_hash_sha512.h" -#include "crypto_verify_32.h" -#include "ge.h" -#include "sc.h" -#include "utils.h" - -int -crypto_sign_verify_detached(const unsigned char *sig, const unsigned char *m, - unsigned long long mlen, const unsigned char *pk) -{ - crypto_hash_sha512_state hs; - unsigned char h[64]; - unsigned char rcheck[32]; - unsigned int i; - unsigned char d = 0; - ge_p3 A; - ge_p2 R; - - if (sig[63] & 224) { - return -1; - } - if (ge_frombytes_negate_vartime(&A, pk) != 0) { - return -1; - } - for (i = 0; i < 32; ++i) { - d |= pk[i]; - } - if (d == 0) { - return -1; - } - crypto_hash_sha512_init(&hs); - crypto_hash_sha512_update(&hs, sig, 32); - crypto_hash_sha512_update(&hs, pk, 32); - crypto_hash_sha512_update(&hs, m, mlen); - crypto_hash_sha512_final(&hs, h); - sc_reduce(h); - - ge_double_scalarmult_vartime(&R, h, &A, sig + 32); - ge_tobytes(rcheck, &R); - - return crypto_verify_32(rcheck, sig) | (-(rcheck == sig)) | - sodium_memcmp(sig, rcheck, 32); -} - -int -crypto_sign_open(unsigned char *m, unsigned long long *mlen_p, - const unsigned char *sm, unsigned long long smlen, - const unsigned char *pk) -{ - unsigned long long mlen; - - if (smlen < 64 || smlen > SIZE_MAX) { - goto badsig; - } - mlen = smlen - 64; - if (crypto_sign_verify_detached(sm, sm + 64, mlen, pk) != 0) { - memset(m, 0, mlen); - goto badsig; - } - if (mlen_p != NULL) { - *mlen_p = mlen; - } - memmove(m, sm + 64, mlen); - - return 0; - -badsig: - if (mlen_p != NULL) { - *mlen_p = 0; - } - return -1; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow22523.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow22523.h deleted file mode 100644 index 9bd45f1..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/pow22523.h +++ /dev/null @@ -1,160 +0,0 @@ - -/* qhasm: fe z1 */ - -/* qhasm: fe z2 */ - -/* qhasm: fe z8 */ - -/* qhasm: fe z9 */ - -/* qhasm: fe z11 */ - -/* qhasm: fe z22 */ - -/* qhasm: fe z_5_0 */ - -/* qhasm: fe z_10_5 */ - -/* qhasm: fe z_10_0 */ - -/* qhasm: fe z_20_10 */ - -/* qhasm: fe z_20_0 */ - -/* qhasm: fe z_40_20 */ - -/* qhasm: fe z_40_0 */ - -/* qhasm: fe z_50_10 */ - -/* qhasm: fe z_50_0 */ - -/* qhasm: fe z_100_50 */ - -/* qhasm: fe z_100_0 */ - -/* qhasm: fe z_200_100 */ - -/* qhasm: fe z_200_0 */ - -/* qhasm: fe z_250_50 */ - -/* qhasm: fe z_250_0 */ - -/* qhasm: fe z_252_2 */ - -/* qhasm: fe z_252_3 */ - -/* qhasm: enter pow22523 */ - -/* qhasm: z2 = z1^2^1 */ -/* asm 1: fe_sq(>z2=fe#1,z2=fe#1,>z2=fe#1); */ -/* asm 2: fe_sq(>z2=t0,z2=t0,>z2=t0); */ -fe_sq(t0,z); /* for (i = 1;i < 1;++i) fe_sq(t0,t0); */ - -/* qhasm: z8 = z2^2^2 */ -/* asm 1: fe_sq(>z8=fe#2,z8=fe#2,>z8=fe#2); */ -/* asm 2: fe_sq(>z8=t1,z8=t1,>z8=t1); */ -fe_sq(t1,t0); for (i = 1;i < 2;++i) fe_sq(t1,t1); - -/* qhasm: z9 = z1*z8 */ -/* asm 1: fe_mul(>z9=fe#2,z9=t1,z11=fe#1,z11=t0,z22=fe#1,z22=fe#1,>z22=fe#1); */ -/* asm 2: fe_sq(>z22=t0,z22=t0,>z22=t0); */ -fe_sq(t0,t0); /* for (i = 1;i < 1;++i) fe_sq(t0,t0); */ - -/* qhasm: z_5_0 = z9*z22 */ -/* asm 1: fe_mul(>z_5_0=fe#1,z_5_0=t0,z_10_5=fe#2,z_10_5=fe#2,>z_10_5=fe#2); */ -/* asm 2: fe_sq(>z_10_5=t1,z_10_5=t1,>z_10_5=t1); */ -fe_sq(t1,t0); for (i = 1;i < 5;++i) fe_sq(t1,t1); - -/* qhasm: z_10_0 = z_10_5*z_5_0 */ -/* asm 1: fe_mul(>z_10_0=fe#1,z_10_0=t0,z_20_10=fe#2,z_20_10=fe#2,>z_20_10=fe#2); */ -/* asm 2: fe_sq(>z_20_10=t1,z_20_10=t1,>z_20_10=t1); */ -fe_sq(t1,t0); for (i = 1;i < 10;++i) fe_sq(t1,t1); - -/* qhasm: z_20_0 = z_20_10*z_10_0 */ -/* asm 1: fe_mul(>z_20_0=fe#2,z_20_0=t1,z_40_20=fe#3,z_40_20=fe#3,>z_40_20=fe#3); */ -/* asm 2: fe_sq(>z_40_20=t2,z_40_20=t2,>z_40_20=t2); */ -fe_sq(t2,t1); for (i = 1;i < 20;++i) fe_sq(t2,t2); - -/* qhasm: z_40_0 = z_40_20*z_20_0 */ -/* asm 1: fe_mul(>z_40_0=fe#2,z_40_0=t1,z_50_10=fe#2,z_50_10=fe#2,>z_50_10=fe#2); */ -/* asm 2: fe_sq(>z_50_10=t1,z_50_10=t1,>z_50_10=t1); */ -fe_sq(t1,t1); for (i = 1;i < 10;++i) fe_sq(t1,t1); - -/* qhasm: z_50_0 = z_50_10*z_10_0 */ -/* asm 1: fe_mul(>z_50_0=fe#1,z_50_0=t0,z_100_50=fe#2,z_100_50=fe#2,>z_100_50=fe#2); */ -/* asm 2: fe_sq(>z_100_50=t1,z_100_50=t1,>z_100_50=t1); */ -fe_sq(t1,t0); for (i = 1;i < 50;++i) fe_sq(t1,t1); - -/* qhasm: z_100_0 = z_100_50*z_50_0 */ -/* asm 1: fe_mul(>z_100_0=fe#2,z_100_0=t1,z_200_100=fe#3,z_200_100=fe#3,>z_200_100=fe#3); */ -/* asm 2: fe_sq(>z_200_100=t2,z_200_100=t2,>z_200_100=t2); */ -fe_sq(t2,t1); for (i = 1;i < 100;++i) fe_sq(t2,t2); - -/* qhasm: z_200_0 = z_200_100*z_100_0 */ -/* asm 1: fe_mul(>z_200_0=fe#2,z_200_0=t1,z_250_50=fe#2,z_250_50=fe#2,>z_250_50=fe#2); */ -/* asm 2: fe_sq(>z_250_50=t1,z_250_50=t1,>z_250_50=t1); */ -fe_sq(t1,t1); for (i = 1;i < 50;++i) fe_sq(t1,t1); - -/* qhasm: z_250_0 = z_250_50*z_50_0 */ -/* asm 1: fe_mul(>z_250_0=fe#1,z_250_0=t0,z_252_2=fe#1,z_252_2=fe#1,>z_252_2=fe#1); */ -/* asm 2: fe_sq(>z_252_2=t0,z_252_2=t0,>z_252_2=t0); */ -fe_sq(t0,t0); for (i = 1;i < 2;++i) fe_sq(t0,t0); - -/* qhasm: z_252_3 = z_252_2*z1 */ -/* asm 1: fe_mul(>z_252_3=fe#12,z_252_3=out,z2=fe#1,z2=fe#1,>z2=fe#1); */ -/* asm 2: fe_sq(>z2=t0,z2=t0,>z2=t0); */ -fe_sq(t0,z); /* for (i = 1;i < 1;++i) fe_sq(t0,t0); */ - -/* qhasm: z8 = z2^2^2 */ -/* asm 1: fe_sq(>z8=fe#2,z8=fe#2,>z8=fe#2); */ -/* asm 2: fe_sq(>z8=t1,z8=t1,>z8=t1); */ -fe_sq(t1,t0); for (i = 1;i < 2;++i) fe_sq(t1,t1); - -/* qhasm: z9 = z1*z8 */ -/* asm 1: fe_mul(>z9=fe#2,z9=t1,z11=fe#1,z11=t0,z22=fe#3,z22=fe#3,>z22=fe#3); */ -/* asm 2: fe_sq(>z22=t2,z22=t2,>z22=t2); */ -fe_sq(t2,t0); /* for (i = 1;i < 1;++i) fe_sq(t2,t2); */ - -/* qhasm: z_5_0 = z9*z22 */ -/* asm 1: fe_mul(>z_5_0=fe#2,z_5_0=t1,z_10_5=fe#3,z_10_5=fe#3,>z_10_5=fe#3); */ -/* asm 2: fe_sq(>z_10_5=t2,z_10_5=t2,>z_10_5=t2); */ -fe_sq(t2,t1); for (i = 1;i < 5;++i) fe_sq(t2,t2); - -/* qhasm: z_10_0 = z_10_5*z_5_0 */ -/* asm 1: fe_mul(>z_10_0=fe#2,z_10_0=t1,z_20_10=fe#3,z_20_10=fe#3,>z_20_10=fe#3); */ -/* asm 2: fe_sq(>z_20_10=t2,z_20_10=t2,>z_20_10=t2); */ -fe_sq(t2,t1); for (i = 1;i < 10;++i) fe_sq(t2,t2); - -/* qhasm: z_20_0 = z_20_10*z_10_0 */ -/* asm 1: fe_mul(>z_20_0=fe#3,z_20_0=t2,z_40_20=fe#4,z_40_20=fe#4,>z_40_20=fe#4); */ -/* asm 2: fe_sq(>z_40_20=t3,z_40_20=t3,>z_40_20=t3); */ -fe_sq(t3,t2); for (i = 1;i < 20;++i) fe_sq(t3,t3); - -/* qhasm: z_40_0 = z_40_20*z_20_0 */ -/* asm 1: fe_mul(>z_40_0=fe#3,z_40_0=t2,z_50_10=fe#3,z_50_10=fe#3,>z_50_10=fe#3); */ -/* asm 2: fe_sq(>z_50_10=t2,z_50_10=t2,>z_50_10=t2); */ -fe_sq(t2,t2); for (i = 1;i < 10;++i) fe_sq(t2,t2); - -/* qhasm: z_50_0 = z_50_10*z_10_0 */ -/* asm 1: fe_mul(>z_50_0=fe#2,z_50_0=t1,z_100_50=fe#3,z_100_50=fe#3,>z_100_50=fe#3); */ -/* asm 2: fe_sq(>z_100_50=t2,z_100_50=t2,>z_100_50=t2); */ -fe_sq(t2,t1); for (i = 1;i < 50;++i) fe_sq(t2,t2); - -/* qhasm: z_100_0 = z_100_50*z_50_0 */ -/* asm 1: fe_mul(>z_100_0=fe#3,z_100_0=t2,z_200_100=fe#4,z_200_100=fe#4,>z_200_100=fe#4); */ -/* asm 2: fe_sq(>z_200_100=t3,z_200_100=t3,>z_200_100=t3); */ -fe_sq(t3,t2); for (i = 1;i < 100;++i) fe_sq(t3,t3); - -/* qhasm: z_200_0 = z_200_100*z_100_0 */ -/* asm 1: fe_mul(>z_200_0=fe#3,z_200_0=t2,z_250_50=fe#3,z_250_50=fe#3,>z_250_50=fe#3); */ -/* asm 2: fe_sq(>z_250_50=t2,z_250_50=t2,>z_250_50=t2); */ -fe_sq(t2,t2); for (i = 1;i < 50;++i) fe_sq(t2,t2); - -/* qhasm: z_250_0 = z_250_50*z_50_0 */ -/* asm 1: fe_mul(>z_250_0=fe#2,z_250_0=t1,z_255_5=fe#2,z_255_5=fe#2,>z_255_5=fe#2); */ -/* asm 2: fe_sq(>z_255_5=t1,z_255_5=t1,>z_255_5=t1); */ -fe_sq(t1,t1); for (i = 1;i < 5;++i) fe_sq(t1,t1); - -/* qhasm: z_255_21 = z_255_5*z11 */ -/* asm 1: fe_mul(>z_255_21=fe#12,z_255_21=out,> 5); - crypto_int64 a2 = 2097151 & (load_3(a + 5) >> 2); - crypto_int64 a3 = 2097151 & (load_4(a + 7) >> 7); - crypto_int64 a4 = 2097151 & (load_4(a + 10) >> 4); - crypto_int64 a5 = 2097151 & (load_3(a + 13) >> 1); - crypto_int64 a6 = 2097151 & (load_4(a + 15) >> 6); - crypto_int64 a7 = 2097151 & (load_3(a + 18) >> 3); - crypto_int64 a8 = 2097151 & load_3(a + 21); - crypto_int64 a9 = 2097151 & (load_4(a + 23) >> 5); - crypto_int64 a10 = 2097151 & (load_3(a + 26) >> 2); - crypto_int64 a11 = (load_4(a + 28) >> 7); - crypto_int64 b0 = 2097151 & load_3(b); - crypto_int64 b1 = 2097151 & (load_4(b + 2) >> 5); - crypto_int64 b2 = 2097151 & (load_3(b + 5) >> 2); - crypto_int64 b3 = 2097151 & (load_4(b + 7) >> 7); - crypto_int64 b4 = 2097151 & (load_4(b + 10) >> 4); - crypto_int64 b5 = 2097151 & (load_3(b + 13) >> 1); - crypto_int64 b6 = 2097151 & (load_4(b + 15) >> 6); - crypto_int64 b7 = 2097151 & (load_3(b + 18) >> 3); - crypto_int64 b8 = 2097151 & load_3(b + 21); - crypto_int64 b9 = 2097151 & (load_4(b + 23) >> 5); - crypto_int64 b10 = 2097151 & (load_3(b + 26) >> 2); - crypto_int64 b11 = (load_4(b + 28) >> 7); - crypto_int64 c0 = 2097151 & load_3(c); - crypto_int64 c1 = 2097151 & (load_4(c + 2) >> 5); - crypto_int64 c2 = 2097151 & (load_3(c + 5) >> 2); - crypto_int64 c3 = 2097151 & (load_4(c + 7) >> 7); - crypto_int64 c4 = 2097151 & (load_4(c + 10) >> 4); - crypto_int64 c5 = 2097151 & (load_3(c + 13) >> 1); - crypto_int64 c6 = 2097151 & (load_4(c + 15) >> 6); - crypto_int64 c7 = 2097151 & (load_3(c + 18) >> 3); - crypto_int64 c8 = 2097151 & load_3(c + 21); - crypto_int64 c9 = 2097151 & (load_4(c + 23) >> 5); - crypto_int64 c10 = 2097151 & (load_3(c + 26) >> 2); - crypto_int64 c11 = (load_4(c + 28) >> 7); - crypto_int64 s0; - crypto_int64 s1; - crypto_int64 s2; - crypto_int64 s3; - crypto_int64 s4; - crypto_int64 s5; - crypto_int64 s6; - crypto_int64 s7; - crypto_int64 s8; - crypto_int64 s9; - crypto_int64 s10; - crypto_int64 s11; - crypto_int64 s12; - crypto_int64 s13; - crypto_int64 s14; - crypto_int64 s15; - crypto_int64 s16; - crypto_int64 s17; - crypto_int64 s18; - crypto_int64 s19; - crypto_int64 s20; - crypto_int64 s21; - crypto_int64 s22; - crypto_int64 s23; - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - crypto_int64 carry10; - crypto_int64 carry11; - crypto_int64 carry12; - crypto_int64 carry13; - crypto_int64 carry14; - crypto_int64 carry15; - crypto_int64 carry16; - crypto_int64 carry17; - crypto_int64 carry18; - crypto_int64 carry19; - crypto_int64 carry20; - crypto_int64 carry21; - crypto_int64 carry22; - - s0 = c0 + a0*b0; - s1 = c1 + a0*b1 + a1*b0; - s2 = c2 + a0*b2 + a1*b1 + a2*b0; - s3 = c3 + a0*b3 + a1*b2 + a2*b1 + a3*b0; - s4 = c4 + a0*b4 + a1*b3 + a2*b2 + a3*b1 + a4*b0; - s5 = c5 + a0*b5 + a1*b4 + a2*b3 + a3*b2 + a4*b1 + a5*b0; - s6 = c6 + a0*b6 + a1*b5 + a2*b4 + a3*b3 + a4*b2 + a5*b1 + a6*b0; - s7 = c7 + a0*b7 + a1*b6 + a2*b5 + a3*b4 + a4*b3 + a5*b2 + a6*b1 + a7*b0; - s8 = c8 + a0*b8 + a1*b7 + a2*b6 + a3*b5 + a4*b4 + a5*b3 + a6*b2 + a7*b1 + a8*b0; - s9 = c9 + a0*b9 + a1*b8 + a2*b7 + a3*b6 + a4*b5 + a5*b4 + a6*b3 + a7*b2 + a8*b1 + a9*b0; - s10 = c10 + a0*b10 + a1*b9 + a2*b8 + a3*b7 + a4*b6 + a5*b5 + a6*b4 + a7*b3 + a8*b2 + a9*b1 + a10*b0; - s11 = c11 + a0*b11 + a1*b10 + a2*b9 + a3*b8 + a4*b7 + a5*b6 + a6*b5 + a7*b4 + a8*b3 + a9*b2 + a10*b1 + a11*b0; - s12 = a1*b11 + a2*b10 + a3*b9 + a4*b8 + a5*b7 + a6*b6 + a7*b5 + a8*b4 + a9*b3 + a10*b2 + a11*b1; - s13 = a2*b11 + a3*b10 + a4*b9 + a5*b8 + a6*b7 + a7*b6 + a8*b5 + a9*b4 + a10*b3 + a11*b2; - s14 = a3*b11 + a4*b10 + a5*b9 + a6*b8 + a7*b7 + a8*b6 + a9*b5 + a10*b4 + a11*b3; - s15 = a4*b11 + a5*b10 + a6*b9 + a7*b8 + a8*b7 + a9*b6 + a10*b5 + a11*b4; - s16 = a5*b11 + a6*b10 + a7*b9 + a8*b8 + a9*b7 + a10*b6 + a11*b5; - s17 = a6*b11 + a7*b10 + a8*b9 + a9*b8 + a10*b7 + a11*b6; - s18 = a7*b11 + a8*b10 + a9*b9 + a10*b8 + a11*b7; - s19 = a8*b11 + a9*b10 + a10*b9 + a11*b8; - s20 = a9*b11 + a10*b10 + a11*b9; - s21 = a10*b11 + a11*b10; - s22 = a11*b11; - s23 = 0; - - carry0 = (s0 + (1<<20)) >> 21; s1 += carry0; s0 -= carry0 << 21; - carry2 = (s2 + (1<<20)) >> 21; s3 += carry2; s2 -= carry2 << 21; - carry4 = (s4 + (1<<20)) >> 21; s5 += carry4; s4 -= carry4 << 21; - carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21; - carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21; - carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21; - carry12 = (s12 + (1<<20)) >> 21; s13 += carry12; s12 -= carry12 << 21; - carry14 = (s14 + (1<<20)) >> 21; s15 += carry14; s14 -= carry14 << 21; - carry16 = (s16 + (1<<20)) >> 21; s17 += carry16; s16 -= carry16 << 21; - carry18 = (s18 + (1<<20)) >> 21; s19 += carry18; s18 -= carry18 << 21; - carry20 = (s20 + (1<<20)) >> 21; s21 += carry20; s20 -= carry20 << 21; - carry22 = (s22 + (1<<20)) >> 21; s23 += carry22; s22 -= carry22 << 21; - - carry1 = (s1 + (1<<20)) >> 21; s2 += carry1; s1 -= carry1 << 21; - carry3 = (s3 + (1<<20)) >> 21; s4 += carry3; s3 -= carry3 << 21; - carry5 = (s5 + (1<<20)) >> 21; s6 += carry5; s5 -= carry5 << 21; - carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21; - carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21; - carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21; - carry13 = (s13 + (1<<20)) >> 21; s14 += carry13; s13 -= carry13 << 21; - carry15 = (s15 + (1<<20)) >> 21; s16 += carry15; s15 -= carry15 << 21; - carry17 = (s17 + (1<<20)) >> 21; s18 += carry17; s17 -= carry17 << 21; - carry19 = (s19 + (1<<20)) >> 21; s20 += carry19; s19 -= carry19 << 21; - carry21 = (s21 + (1<<20)) >> 21; s22 += carry21; s21 -= carry21 << 21; - - s11 += s23 * 666643; - s12 += s23 * 470296; - s13 += s23 * 654183; - s14 -= s23 * 997805; - s15 += s23 * 136657; - s16 -= s23 * 683901; - - - s10 += s22 * 666643; - s11 += s22 * 470296; - s12 += s22 * 654183; - s13 -= s22 * 997805; - s14 += s22 * 136657; - s15 -= s22 * 683901; - - - s9 += s21 * 666643; - s10 += s21 * 470296; - s11 += s21 * 654183; - s12 -= s21 * 997805; - s13 += s21 * 136657; - s14 -= s21 * 683901; - - - s8 += s20 * 666643; - s9 += s20 * 470296; - s10 += s20 * 654183; - s11 -= s20 * 997805; - s12 += s20 * 136657; - s13 -= s20 * 683901; - - - s7 += s19 * 666643; - s8 += s19 * 470296; - s9 += s19 * 654183; - s10 -= s19 * 997805; - s11 += s19 * 136657; - s12 -= s19 * 683901; - - - s6 += s18 * 666643; - s7 += s18 * 470296; - s8 += s18 * 654183; - s9 -= s18 * 997805; - s10 += s18 * 136657; - s11 -= s18 * 683901; - - - carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21; - carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21; - carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21; - carry12 = (s12 + (1<<20)) >> 21; s13 += carry12; s12 -= carry12 << 21; - carry14 = (s14 + (1<<20)) >> 21; s15 += carry14; s14 -= carry14 << 21; - carry16 = (s16 + (1<<20)) >> 21; s17 += carry16; s16 -= carry16 << 21; - - carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21; - carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21; - carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21; - carry13 = (s13 + (1<<20)) >> 21; s14 += carry13; s13 -= carry13 << 21; - carry15 = (s15 + (1<<20)) >> 21; s16 += carry15; s15 -= carry15 << 21; - - s5 += s17 * 666643; - s6 += s17 * 470296; - s7 += s17 * 654183; - s8 -= s17 * 997805; - s9 += s17 * 136657; - s10 -= s17 * 683901; - - - s4 += s16 * 666643; - s5 += s16 * 470296; - s6 += s16 * 654183; - s7 -= s16 * 997805; - s8 += s16 * 136657; - s9 -= s16 * 683901; - - - s3 += s15 * 666643; - s4 += s15 * 470296; - s5 += s15 * 654183; - s6 -= s15 * 997805; - s7 += s15 * 136657; - s8 -= s15 * 683901; - - - s2 += s14 * 666643; - s3 += s14 * 470296; - s4 += s14 * 654183; - s5 -= s14 * 997805; - s6 += s14 * 136657; - s7 -= s14 * 683901; - - - s1 += s13 * 666643; - s2 += s13 * 470296; - s3 += s13 * 654183; - s4 -= s13 * 997805; - s5 += s13 * 136657; - s6 -= s13 * 683901; - - - s0 += s12 * 666643; - s1 += s12 * 470296; - s2 += s12 * 654183; - s3 -= s12 * 997805; - s4 += s12 * 136657; - s5 -= s12 * 683901; - s12 = 0; - - carry0 = (s0 + (1<<20)) >> 21; s1 += carry0; s0 -= carry0 << 21; - carry2 = (s2 + (1<<20)) >> 21; s3 += carry2; s2 -= carry2 << 21; - carry4 = (s4 + (1<<20)) >> 21; s5 += carry4; s4 -= carry4 << 21; - carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21; - carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21; - carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21; - - carry1 = (s1 + (1<<20)) >> 21; s2 += carry1; s1 -= carry1 << 21; - carry3 = (s3 + (1<<20)) >> 21; s4 += carry3; s3 -= carry3 << 21; - carry5 = (s5 + (1<<20)) >> 21; s6 += carry5; s5 -= carry5 << 21; - carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21; - carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21; - carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21; - - s0 += s12 * 666643; - s1 += s12 * 470296; - s2 += s12 * 654183; - s3 -= s12 * 997805; - s4 += s12 * 136657; - s5 -= s12 * 683901; - s12 = 0; - - carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21; - carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21; - carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21; - carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21; - carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21; - carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21; - carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21; - carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21; - carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21; - carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21; - carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21; - carry11 = s11 >> 21; s12 += carry11; s11 -= carry11 << 21; - - s0 += s12 * 666643; - s1 += s12 * 470296; - s2 += s12 * 654183; - s3 -= s12 * 997805; - s4 += s12 * 136657; - s5 -= s12 * 683901; - - - carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21; - carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21; - carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21; - carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21; - carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21; - carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21; - carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21; - carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21; - carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21; - carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21; - carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21; - - s[0] = s0 >> 0; - s[1] = s0 >> 8; - s[2] = (s0 >> 16) | (s1 << 5); - s[3] = s1 >> 3; - s[4] = s1 >> 11; - s[5] = (s1 >> 19) | (s2 << 2); - s[6] = s2 >> 6; - s[7] = (s2 >> 14) | (s3 << 7); - s[8] = s3 >> 1; - s[9] = s3 >> 9; - s[10] = (s3 >> 17) | (s4 << 4); - s[11] = s4 >> 4; - s[12] = s4 >> 12; - s[13] = (s4 >> 20) | (s5 << 1); - s[14] = s5 >> 7; - s[15] = (s5 >> 15) | (s6 << 6); - s[16] = s6 >> 2; - s[17] = s6 >> 10; - s[18] = (s6 >> 18) | (s7 << 3); - s[19] = s7 >> 5; - s[20] = s7 >> 13; - s[21] = s8 >> 0; - s[22] = s8 >> 8; - s[23] = (s8 >> 16) | (s9 << 5); - s[24] = s9 >> 3; - s[25] = s9 >> 11; - s[26] = (s9 >> 19) | (s10 << 2); - s[27] = s10 >> 6; - s[28] = (s10 >> 14) | (s11 << 7); - s[29] = s11 >> 1; - s[30] = s11 >> 9; - s[31] = s11 >> 17; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sc_reduce.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sc_reduce.c deleted file mode 100644 index e5caefc..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sc_reduce.c +++ /dev/null @@ -1,275 +0,0 @@ -#include "sc.h" -#include "crypto_int64.h" -#include "crypto_uint32.h" -#include "crypto_uint64.h" - -static crypto_uint64 load_3(const unsigned char *in) -{ - crypto_uint64 result; - result = (crypto_uint64) in[0]; - result |= ((crypto_uint64) in[1]) << 8; - result |= ((crypto_uint64) in[2]) << 16; - return result; -} - -static crypto_uint64 load_4(const unsigned char *in) -{ - crypto_uint64 result; - result = (crypto_uint64) in[0]; - result |= ((crypto_uint64) in[1]) << 8; - result |= ((crypto_uint64) in[2]) << 16; - result |= ((crypto_uint64) in[3]) << 24; - return result; -} - -/* -Input: - s[0]+256*s[1]+...+256^63*s[63] = s - -Output: - s[0]+256*s[1]+...+256^31*s[31] = s mod l - where l = 2^252 + 27742317777372353535851937790883648493. - Overwrites s in place. -*/ - -void sc_reduce(unsigned char *s) -{ - crypto_int64 s0 = 2097151 & load_3(s); - crypto_int64 s1 = 2097151 & (load_4(s + 2) >> 5); - crypto_int64 s2 = 2097151 & (load_3(s + 5) >> 2); - crypto_int64 s3 = 2097151 & (load_4(s + 7) >> 7); - crypto_int64 s4 = 2097151 & (load_4(s + 10) >> 4); - crypto_int64 s5 = 2097151 & (load_3(s + 13) >> 1); - crypto_int64 s6 = 2097151 & (load_4(s + 15) >> 6); - crypto_int64 s7 = 2097151 & (load_3(s + 18) >> 3); - crypto_int64 s8 = 2097151 & load_3(s + 21); - crypto_int64 s9 = 2097151 & (load_4(s + 23) >> 5); - crypto_int64 s10 = 2097151 & (load_3(s + 26) >> 2); - crypto_int64 s11 = 2097151 & (load_4(s + 28) >> 7); - crypto_int64 s12 = 2097151 & (load_4(s + 31) >> 4); - crypto_int64 s13 = 2097151 & (load_3(s + 34) >> 1); - crypto_int64 s14 = 2097151 & (load_4(s + 36) >> 6); - crypto_int64 s15 = 2097151 & (load_3(s + 39) >> 3); - crypto_int64 s16 = 2097151 & load_3(s + 42); - crypto_int64 s17 = 2097151 & (load_4(s + 44) >> 5); - crypto_int64 s18 = 2097151 & (load_3(s + 47) >> 2); - crypto_int64 s19 = 2097151 & (load_4(s + 49) >> 7); - crypto_int64 s20 = 2097151 & (load_4(s + 52) >> 4); - crypto_int64 s21 = 2097151 & (load_3(s + 55) >> 1); - crypto_int64 s22 = 2097151 & (load_4(s + 57) >> 6); - crypto_int64 s23 = (load_4(s + 60) >> 3); - crypto_int64 carry0; - crypto_int64 carry1; - crypto_int64 carry2; - crypto_int64 carry3; - crypto_int64 carry4; - crypto_int64 carry5; - crypto_int64 carry6; - crypto_int64 carry7; - crypto_int64 carry8; - crypto_int64 carry9; - crypto_int64 carry10; - crypto_int64 carry11; - crypto_int64 carry12; - crypto_int64 carry13; - crypto_int64 carry14; - crypto_int64 carry15; - crypto_int64 carry16; - - s11 += s23 * 666643; - s12 += s23 * 470296; - s13 += s23 * 654183; - s14 -= s23 * 997805; - s15 += s23 * 136657; - s16 -= s23 * 683901; - - - s10 += s22 * 666643; - s11 += s22 * 470296; - s12 += s22 * 654183; - s13 -= s22 * 997805; - s14 += s22 * 136657; - s15 -= s22 * 683901; - - - s9 += s21 * 666643; - s10 += s21 * 470296; - s11 += s21 * 654183; - s12 -= s21 * 997805; - s13 += s21 * 136657; - s14 -= s21 * 683901; - - - s8 += s20 * 666643; - s9 += s20 * 470296; - s10 += s20 * 654183; - s11 -= s20 * 997805; - s12 += s20 * 136657; - s13 -= s20 * 683901; - - - s7 += s19 * 666643; - s8 += s19 * 470296; - s9 += s19 * 654183; - s10 -= s19 * 997805; - s11 += s19 * 136657; - s12 -= s19 * 683901; - - - s6 += s18 * 666643; - s7 += s18 * 470296; - s8 += s18 * 654183; - s9 -= s18 * 997805; - s10 += s18 * 136657; - s11 -= s18 * 683901; - - - carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21; - carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21; - carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21; - carry12 = (s12 + (1<<20)) >> 21; s13 += carry12; s12 -= carry12 << 21; - carry14 = (s14 + (1<<20)) >> 21; s15 += carry14; s14 -= carry14 << 21; - carry16 = (s16 + (1<<20)) >> 21; s17 += carry16; s16 -= carry16 << 21; - - carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21; - carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21; - carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21; - carry13 = (s13 + (1<<20)) >> 21; s14 += carry13; s13 -= carry13 << 21; - carry15 = (s15 + (1<<20)) >> 21; s16 += carry15; s15 -= carry15 << 21; - - s5 += s17 * 666643; - s6 += s17 * 470296; - s7 += s17 * 654183; - s8 -= s17 * 997805; - s9 += s17 * 136657; - s10 -= s17 * 683901; - - - s4 += s16 * 666643; - s5 += s16 * 470296; - s6 += s16 * 654183; - s7 -= s16 * 997805; - s8 += s16 * 136657; - s9 -= s16 * 683901; - - - s3 += s15 * 666643; - s4 += s15 * 470296; - s5 += s15 * 654183; - s6 -= s15 * 997805; - s7 += s15 * 136657; - s8 -= s15 * 683901; - - - s2 += s14 * 666643; - s3 += s14 * 470296; - s4 += s14 * 654183; - s5 -= s14 * 997805; - s6 += s14 * 136657; - s7 -= s14 * 683901; - - - s1 += s13 * 666643; - s2 += s13 * 470296; - s3 += s13 * 654183; - s4 -= s13 * 997805; - s5 += s13 * 136657; - s6 -= s13 * 683901; - - - s0 += s12 * 666643; - s1 += s12 * 470296; - s2 += s12 * 654183; - s3 -= s12 * 997805; - s4 += s12 * 136657; - s5 -= s12 * 683901; - s12 = 0; - - carry0 = (s0 + (1<<20)) >> 21; s1 += carry0; s0 -= carry0 << 21; - carry2 = (s2 + (1<<20)) >> 21; s3 += carry2; s2 -= carry2 << 21; - carry4 = (s4 + (1<<20)) >> 21; s5 += carry4; s4 -= carry4 << 21; - carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21; - carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21; - carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21; - - carry1 = (s1 + (1<<20)) >> 21; s2 += carry1; s1 -= carry1 << 21; - carry3 = (s3 + (1<<20)) >> 21; s4 += carry3; s3 -= carry3 << 21; - carry5 = (s5 + (1<<20)) >> 21; s6 += carry5; s5 -= carry5 << 21; - carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21; - carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21; - carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21; - - s0 += s12 * 666643; - s1 += s12 * 470296; - s2 += s12 * 654183; - s3 -= s12 * 997805; - s4 += s12 * 136657; - s5 -= s12 * 683901; - s12 = 0; - - carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21; - carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21; - carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21; - carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21; - carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21; - carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21; - carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21; - carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21; - carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21; - carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21; - carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21; - carry11 = s11 >> 21; s12 += carry11; s11 -= carry11 << 21; - - s0 += s12 * 666643; - s1 += s12 * 470296; - s2 += s12 * 654183; - s3 -= s12 * 997805; - s4 += s12 * 136657; - s5 -= s12 * 683901; - - - carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21; - carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21; - carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21; - carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21; - carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21; - carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21; - carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21; - carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21; - carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21; - carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21; - carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21; - - s[0] = s0 >> 0; - s[1] = s0 >> 8; - s[2] = (s0 >> 16) | (s1 << 5); - s[3] = s1 >> 3; - s[4] = s1 >> 11; - s[5] = (s1 >> 19) | (s2 << 2); - s[6] = s2 >> 6; - s[7] = (s2 >> 14) | (s3 << 7); - s[8] = s3 >> 1; - s[9] = s3 >> 9; - s[10] = (s3 >> 17) | (s4 << 4); - s[11] = s4 >> 4; - s[12] = s4 >> 12; - s[13] = (s4 >> 20) | (s5 << 1); - s[14] = s5 >> 7; - s[15] = (s5 >> 15) | (s6 << 6); - s[16] = s6 >> 2; - s[17] = s6 >> 10; - s[18] = (s6 >> 18) | (s7 << 3); - s[19] = s7 >> 5; - s[20] = s7 >> 13; - s[21] = s8 >> 0; - s[22] = s8 >> 8; - s[23] = (s8 >> 16) | (s9 << 5); - s[24] = s9 >> 3; - s[25] = s9 >> 11; - s[26] = (s9 >> 19) | (s10 << 2); - s[27] = s10 >> 6; - s[28] = (s10 >> 14) | (s11 << 7); - s[29] = s11 >> 1; - s[30] = s11 >> 9; - s[31] = s11 >> 17; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sign.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sign.c deleted file mode 100644 index 25652ec..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sign.c +++ /dev/null @@ -1,78 +0,0 @@ - -#include - -#include "api.h" -#include "crypto_hash_sha512.h" -#include "ge.h" -#include "sc.h" -#include "utils.h" - -int -crypto_sign_detached(unsigned char *sig, unsigned long long *siglen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk) -{ - crypto_hash_sha512_state hs; - unsigned char az[64]; - unsigned char nonce[64]; - unsigned char hram[64]; - ge_p3 R; - - crypto_hash_sha512(az, sk, 32); - az[0] &= 248; - az[31] &= 63; - az[31] |= 64; - - crypto_hash_sha512_init(&hs); - crypto_hash_sha512_update(&hs, az + 32, 32); - crypto_hash_sha512_update(&hs, m, mlen); - crypto_hash_sha512_final(&hs, nonce); - - memmove(sig + 32, sk + 32, 32); - - sc_reduce(nonce); - ge_scalarmult_base(&R, nonce); - ge_p3_tobytes(sig, &R); - - crypto_hash_sha512_init(&hs); - crypto_hash_sha512_update(&hs, sig, 64); - crypto_hash_sha512_update(&hs, m, mlen); - crypto_hash_sha512_final(&hs, hram); - - sc_reduce(hram); - sc_muladd(sig + 32, hram, az, nonce); - - sodium_memzero(az, sizeof az); - sodium_memzero(nonce, sizeof nonce); - - if (siglen_p != NULL) { - *siglen_p = 64U; - } - return 0; -} - -int -crypto_sign(unsigned char *sm, unsigned long long *smlen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk) -{ - unsigned long long siglen; - - memmove(sm + crypto_sign_ed25519_BYTES, m, mlen); -/* LCOV_EXCL_START */ - if (crypto_sign_detached(sm, &siglen, sm + crypto_sign_ed25519_BYTES, - mlen, sk) != 0 || - siglen != crypto_sign_ed25519_BYTES) { - if (smlen_p != NULL) { - *smlen_p = 0; - } - memset(sm, 0, mlen + crypto_sign_ed25519_BYTES); - return -1; - } -/* LCOV_EXCL_STOP */ - - if (smlen_p != NULL) { - *smlen_p = mlen + siglen; - } - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sqrtm1.h b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sqrtm1.h deleted file mode 100644 index d8caa23..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/ref10/sqrtm1.h +++ /dev/null @@ -1 +0,0 @@ --32595792,-7943725,9377950,3500415,12389472,-272473,-25146209,-2005654,326686,11406482 diff --git a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/sign_ed25519_api.c b/Pods/libsodium/src/libsodium/crypto_sign/ed25519/sign_ed25519_api.c deleted file mode 100644 index 7ba6b4c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/ed25519/sign_ed25519_api.c +++ /dev/null @@ -1,39 +0,0 @@ - -#include - -#include "crypto_sign_ed25519.h" - -size_t -crypto_sign_ed25519_bytes(void) { - return crypto_sign_ed25519_BYTES; -} - -size_t -crypto_sign_ed25519_seedbytes(void) { - return crypto_sign_ed25519_SEEDBYTES; -} - -size_t -crypto_sign_ed25519_publickeybytes(void) { - return crypto_sign_ed25519_PUBLICKEYBYTES; -} - -size_t -crypto_sign_ed25519_secretkeybytes(void) { - return crypto_sign_ed25519_SECRETKEYBYTES; -} - -int -crypto_sign_ed25519_sk_to_seed(unsigned char *seed, const unsigned char *sk) -{ - memmove(seed, sk, crypto_sign_ed25519_SEEDBYTES); - return 0; -} - -int -crypto_sign_ed25519_sk_to_pk(unsigned char *pk, const unsigned char *sk) -{ - memmove(pk, sk + crypto_sign_ed25519_SEEDBYTES, - crypto_sign_ed25519_PUBLICKEYBYTES); - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/api.h b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/api.h deleted file mode 100644 index 5cb0f76..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/api.h +++ /dev/null @@ -1,12 +0,0 @@ - -#include "crypto_sign_edwards25519sha512batch.h" - -#define crypto_sign crypto_sign_edwards25519sha512batch -#define crypto_sign_open crypto_sign_edwards25519sha512batch_open -#define crypto_sign_keypair crypto_sign_edwards25519sha512batch_keypair -#define crypto_sign_BYTES crypto_sign_edwards25519sha512batch_BYTES -#define crypto_sign_PUBLICKEYBYTES crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES -#define crypto_sign_SECRETKEYBYTES crypto_sign_edwards25519sha512batch_SECRETKEYBYTES -#define crypto_sign_IMPLEMENTATION crypto_sign_edwards25519sha512batch_IMPLEMENTATION -#define crypto_sign_VERSION crypto_sign_edwards25519sha512batch_VERSION - diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519.h b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519.h deleted file mode 100644 index 98c613f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519.h +++ /dev/null @@ -1,54 +0,0 @@ -#ifndef FE25519_H -#define FE25519_H - -#define fe25519 crypto_sign_edwards25519sha512batch_fe25519 -#define fe25519_unpack crypto_sign_edwards25519sha512batch_fe25519_unpack -#define fe25519_pack crypto_sign_edwards25519sha512batch_fe25519_pack -#define fe25519_cmov crypto_sign_edwards25519sha512batch_fe25519_cmov -#define fe25519_setone crypto_sign_edwards25519sha512batch_fe25519_setone -#define fe25519_setzero crypto_sign_edwards25519sha512batch_fe25519_setzero -#define fe25519_neg crypto_sign_edwards25519sha512batch_fe25519_neg -#define fe25519_getparity crypto_sign_edwards25519sha512batch_fe25519_getparity -#define fe25519_add crypto_sign_edwards25519sha512batch_fe25519_add -#define fe25519_sub crypto_sign_edwards25519sha512batch_fe25519_sub -#define fe25519_mul crypto_sign_edwards25519sha512batch_fe25519_mul -#define fe25519_square crypto_sign_edwards25519sha512batch_fe25519_square -#define fe25519_pow crypto_sign_edwards25519sha512batch_fe25519_pow -#define fe25519_sqrt_vartime crypto_sign_edwards25519sha512batch_fe25519_sqrt_vartime -#define fe25519_invert crypto_sign_edwards25519sha512batch_fe25519_invert - -#include "crypto_uint32.h" - -typedef struct { - crypto_uint32 v[32]; -} fe25519; - -void fe25519_unpack(fe25519 *r, const unsigned char x[32]); - -void fe25519_pack(unsigned char r[32], const fe25519 *x); - -void fe25519_cmov(fe25519 *r, const fe25519 *x, unsigned char b); - -void fe25519_setone(fe25519 *r); - -void fe25519_setzero(fe25519 *r); - -void fe25519_neg(fe25519 *r, const fe25519 *x); - -unsigned char fe25519_getparity(const fe25519 *x); - -void fe25519_add(fe25519 *r, const fe25519 *x, const fe25519 *y); - -void fe25519_sub(fe25519 *r, const fe25519 *x, const fe25519 *y); - -void fe25519_mul(fe25519 *r, const fe25519 *x, const fe25519 *y); - -void fe25519_square(fe25519 *r, const fe25519 *x); - -void fe25519_pow(fe25519 *r, const fe25519 *x, const unsigned char *e); - -int fe25519_sqrt_vartime(fe25519 *r, const fe25519 *x, unsigned char parity); - -void fe25519_invert(fe25519 *r, const fe25519 *x); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519_edwards25519sha512batch.c b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519_edwards25519sha512batch.c deleted file mode 100644 index df7a923..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/fe25519_edwards25519sha512batch.c +++ /dev/null @@ -1,348 +0,0 @@ -#include "fe25519.h" - -#define WINDOWSIZE 4 /* Should be 1,2, or 4 */ -#define WINDOWMASK ((1<v[31] >> 7; - r->v[31] &= 127; - t *= 19; - r->v[0] += t; - for(i=0;i<31;i++) - { - t = r->v[i] >> 8; - r->v[i+1] += t; - r->v[i] &= 255; - } - } -} - -static void reduce_mul(fe25519 *r) -{ - crypto_uint32 t; - int i,rep; - - for(rep=0;rep<2;rep++) - { - t = r->v[31] >> 7; - r->v[31] &= 127; - t *= 19; - r->v[0] += t; - for(i=0;i<31;i++) - { - t = r->v[i] >> 8; - r->v[i+1] += t; - r->v[i] &= 255; - } - } -} - -/* reduction modulo 2^255-19 */ -static void freeze(fe25519 *r) -{ - int i; - unsigned int m = (r->v[31] == 127); - for(i=30;i>1;i--) - m *= (r->v[i] == 255); - m *= (r->v[0] >= 237); - - r->v[31] -= m*127; - for(i=30;i>0;i--) - r->v[i] -= m*255; - r->v[0] -= m*237; -} - -/*freeze input before calling isone*/ -static int isone(const fe25519 *x) -{ - int i; - int r = (x->v[0] == 1); - for(i=1;i<32;i++) - r *= (x->v[i] == 0); - return r; -} - -/*freeze input before calling iszero*/ -static int iszero(const fe25519 *x) -{ - int i; - int r = (x->v[0] == 0); - for(i=1;i<32;i++) - r *= (x->v[i] == 0); - return r; -} - - -static int issquare(const fe25519 *x) -{ - unsigned char e[32] = {0xf6,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x3f}; /* (p-1)/2 */ - fe25519 t; - - fe25519_pow(&t,x,e); - freeze(&t); - return isone(&t) || iszero(&t); -} - -void fe25519_unpack(fe25519 *r, const unsigned char x[32]) -{ - int i; - for(i=0;i<32;i++) r->v[i] = x[i]; - r->v[31] &= 127; -} - -/* Assumes input x being reduced mod 2^255 */ -void fe25519_pack(unsigned char r[32], const fe25519 *x) -{ - int i; - unsigned int m; - for(i=0;i<32;i++) - r[i] = x->v[i]; - - /* freeze byte array */ - m = (r[31] == 127); /* XXX: some compilers might use branches; fix */ - for(i=30;i>1;i--) - m *= (r[i] == 255); - m *= (r[0] >= 237); - r[31] -= m*127; - for(i=30;i>0;i--) - r[i] -= m*255; - r[0] -= m*237; -} - -void fe25519_cmov(fe25519 *r, const fe25519 *x, unsigned char b) -{ - unsigned char nb = 1-b; - int i; - for(i=0;i<32;i++) r->v[i] = nb * r->v[i] + b * x->v[i]; -} - -unsigned char fe25519_getparity(const fe25519 *x) -{ - fe25519 t; - int i; - for(i=0;i<32;i++) t.v[i] = x->v[i]; - freeze(&t); - return t.v[0] & 1; -} - -void fe25519_setone(fe25519 *r) -{ - int i; - r->v[0] = 1; - for(i=1;i<32;i++) r->v[i]=0; -} - -void fe25519_setzero(fe25519 *r) -{ - int i; - for(i=0;i<32;i++) r->v[i]=0; -} - -void fe25519_neg(fe25519 *r, const fe25519 *x) -{ - fe25519 t; - int i; - for(i=0;i<32;i++) t.v[i]=x->v[i]; - fe25519_setzero(r); - fe25519_sub(r, r, &t); -} - -void fe25519_add(fe25519 *r, const fe25519 *x, const fe25519 *y) -{ - int i; - for(i=0;i<32;i++) r->v[i] = x->v[i] + y->v[i]; - reduce_add_sub(r); -} - -void fe25519_sub(fe25519 *r, const fe25519 *x, const fe25519 *y) -{ - int i; - crypto_uint32 t[32]; - t[0] = x->v[0] + 0x1da; - t[31] = x->v[31] + 0xfe; - for(i=1;i<31;i++) t[i] = x->v[i] + 0x1fe; - for(i=0;i<32;i++) r->v[i] = t[i] - y->v[i]; - reduce_add_sub(r); -} - -void fe25519_mul(fe25519 *r, const fe25519 *x, const fe25519 *y) -{ - int i,j; - crypto_uint32 t[63]; - for(i=0;i<63;i++)t[i] = 0; - - for(i=0;i<32;i++) - for(j=0;j<32;j++) - t[i+j] += x->v[i] * y->v[j]; - - for(i=32;i<63;i++) - r->v[i-32] = t[i-32] + 38*t[i]; - r->v[31] = t[31]; /* result now in r[0]...r[31] */ - - reduce_mul(r); -} - -void fe25519_square(fe25519 *r, const fe25519 *x) -{ - fe25519_mul(r, x, x); -} - -/*XXX: Make constant time! */ -void fe25519_pow(fe25519 *r, const fe25519 *x, const unsigned char *e) -{ - /* - fe25519 g; - fe25519_setone(&g); - int i; - unsigned char j; - for(i=32;i>0;i--) - { - for(j=128;j>0;j>>=1) - { - fe25519_square(&g,&g); - if(e[i-1] & j) - fe25519_mul(&g,&g,x); - } - } - for(i=0;i<32;i++) r->v[i] = g.v[i]; - */ - fe25519 g; - int i,j,k; - fe25519 t; - unsigned char w; - fe25519 pre[(1 << WINDOWSIZE)]; - - fe25519_setone(&g); - - // Precomputation - fe25519_setone(pre); - pre[1] = *x; - for(i=2;i<(1<0;i--) - { - for(j=8-WINDOWSIZE;j>=0;j-=WINDOWSIZE) - { - for(k=0;k>j) & WINDOWMASK; - t = pre[0]; - for(k=1;k<(1<v[i]; - fe25519_pow(&d,&d,e3); - for(i=0;i<32;i++) - r->v[i] = 2*x->v[i]; - fe25519_mul(r,r,&d); - } - freeze(r); - if((r->v[0] & 1) != (parity & 1)) - { - fe25519_sub(r,&p,r); - } - return 0; -} - -void fe25519_invert(fe25519 *r, const fe25519 *x) -{ - fe25519 z2; - fe25519 z9; - fe25519 z11; - fe25519 z2_5_0; - fe25519 z2_10_0; - fe25519 z2_20_0; - fe25519 z2_50_0; - fe25519 z2_100_0; - fe25519 t0; - fe25519 t1; - int i; - - /* 2 */ fe25519_square(&z2,x); - /* 4 */ fe25519_square(&t1,&z2); - /* 8 */ fe25519_square(&t0,&t1); - /* 9 */ fe25519_mul(&z9,&t0,x); - /* 11 */ fe25519_mul(&z11,&z9,&z2); - /* 22 */ fe25519_square(&t0,&z11); - /* 2^5 - 2^0 = 31 */ fe25519_mul(&z2_5_0,&t0,&z9); - - /* 2^6 - 2^1 */ fe25519_square(&t0,&z2_5_0); - /* 2^7 - 2^2 */ fe25519_square(&t1,&t0); - /* 2^8 - 2^3 */ fe25519_square(&t0,&t1); - /* 2^9 - 2^4 */ fe25519_square(&t1,&t0); - /* 2^10 - 2^5 */ fe25519_square(&t0,&t1); - /* 2^10 - 2^0 */ fe25519_mul(&z2_10_0,&t0,&z2_5_0); - - /* 2^11 - 2^1 */ fe25519_square(&t0,&z2_10_0); - /* 2^12 - 2^2 */ fe25519_square(&t1,&t0); - /* 2^20 - 2^10 */ for (i = 2;i < 10;i += 2) { fe25519_square(&t0,&t1); fe25519_square(&t1,&t0); } - /* 2^20 - 2^0 */ fe25519_mul(&z2_20_0,&t1,&z2_10_0); - - /* 2^21 - 2^1 */ fe25519_square(&t0,&z2_20_0); - /* 2^22 - 2^2 */ fe25519_square(&t1,&t0); - /* 2^40 - 2^20 */ for (i = 2;i < 20;i += 2) { fe25519_square(&t0,&t1); fe25519_square(&t1,&t0); } - /* 2^40 - 2^0 */ fe25519_mul(&t0,&t1,&z2_20_0); - - /* 2^41 - 2^1 */ fe25519_square(&t1,&t0); - /* 2^42 - 2^2 */ fe25519_square(&t0,&t1); - /* 2^50 - 2^10 */ for (i = 2;i < 10;i += 2) { fe25519_square(&t1,&t0); fe25519_square(&t0,&t1); } - /* 2^50 - 2^0 */ fe25519_mul(&z2_50_0,&t0,&z2_10_0); - - /* 2^51 - 2^1 */ fe25519_square(&t0,&z2_50_0); - /* 2^52 - 2^2 */ fe25519_square(&t1,&t0); - /* 2^100 - 2^50 */ for (i = 2;i < 50;i += 2) { fe25519_square(&t0,&t1); fe25519_square(&t1,&t0); } - /* 2^100 - 2^0 */ fe25519_mul(&z2_100_0,&t1,&z2_50_0); - - /* 2^101 - 2^1 */ fe25519_square(&t1,&z2_100_0); - /* 2^102 - 2^2 */ fe25519_square(&t0,&t1); - /* 2^200 - 2^100 */ for (i = 2;i < 100;i += 2) { fe25519_square(&t1,&t0); fe25519_square(&t0,&t1); } - /* 2^200 - 2^0 */ fe25519_mul(&t1,&t0,&z2_100_0); - - /* 2^201 - 2^1 */ fe25519_square(&t0,&t1); - /* 2^202 - 2^2 */ fe25519_square(&t1,&t0); - /* 2^250 - 2^50 */ for (i = 2;i < 50;i += 2) { fe25519_square(&t0,&t1); fe25519_square(&t1,&t0); } - /* 2^250 - 2^0 */ fe25519_mul(&t0,&t1,&z2_50_0); - - /* 2^251 - 2^1 */ fe25519_square(&t1,&t0); - /* 2^252 - 2^2 */ fe25519_square(&t0,&t1); - /* 2^253 - 2^3 */ fe25519_square(&t1,&t0); - /* 2^254 - 2^4 */ fe25519_square(&t0,&t1); - /* 2^255 - 2^5 */ fe25519_square(&t1,&t0); - /* 2^255 - 21 */ fe25519_mul(r,&t1,&z11); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519.h b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519.h deleted file mode 100644 index 49ad163..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519.h +++ /dev/null @@ -1,34 +0,0 @@ -#ifndef GE25519_H -#define GE25519_H - -#include "fe25519.h" -#include "sc25519.h" - -#define ge25519 crypto_sign_edwards25519sha512batch_ge25519 -#define ge25519_unpack_vartime crypto_sign_edwards25519sha512batch_ge25519_unpack_vartime -#define ge25519_pack crypto_sign_edwards25519sha512batch_ge25519_pack -#define ge25519_add crypto_sign_edwards25519sha512batch_ge25519_add -#define ge25519_double crypto_sign_edwards25519sha512batch_ge25519_double -#define ge25519_scalarmult crypto_sign_edwards25519sha512batch_ge25519_scalarmult -#define ge25519_scalarmult_base crypto_sign_edwards25519sha512batch_ge25519_scalarmult_base - -typedef struct { - fe25519 x; - fe25519 y; - fe25519 z; - fe25519 t; -} ge25519; - -int ge25519_unpack_vartime(ge25519 *r, const unsigned char p[32]); - -void ge25519_pack(unsigned char r[32], const ge25519 *p); - -void ge25519_add(ge25519 *r, const ge25519 *p, const ge25519 *q); - -void ge25519_double(ge25519 *r, const ge25519 *p); - -void ge25519_scalarmult(ge25519 *r, const ge25519 *p, const sc25519 *s); - -void ge25519_scalarmult_base(ge25519 *r, const sc25519 *s); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519_edwards25519sha512batch.c b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519_edwards25519sha512batch.c deleted file mode 100644 index 253b68f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/ge25519_edwards25519sha512batch.c +++ /dev/null @@ -1,230 +0,0 @@ -#include "fe25519.h" -#include "sc25519.h" -#include "ge25519.h" - -/* - * Arithmetic on the twisted Edwards curve -x^2 + y^2 = 1 + dx^2y^2 - * with d = -(121665/121666) = 37095705934669439343138083508754565189542113879843219016388785533085940283555 - * Base point: (15112221349535400772501151409588531511454012693041857206046113283949847762202,46316835694926478169428394003475163141307993866256225615783033603165251855960); - */ - -typedef struct -{ - fe25519 x; - fe25519 z; - fe25519 y; - fe25519 t; -} ge25519_p1p1; - -typedef struct -{ - fe25519 x; - fe25519 y; - fe25519 z; -} ge25519_p2; - -#define ge25519_p3 ge25519 - -/* Windowsize for fixed-window scalar multiplication */ -#define WINDOWSIZE 2 /* Should be 1,2, or 4 */ -#define WINDOWMASK ((1<x, &p->x, &p->t); - fe25519_mul(&r->y, &p->y, &p->z); - fe25519_mul(&r->z, &p->z, &p->t); -} - -static void p1p1_to_p3(ge25519_p3 *r, const ge25519_p1p1 *p) -{ - p1p1_to_p2((ge25519_p2 *)r, p); - fe25519_mul(&r->t, &p->x, &p->y); -} - -/* Constant-time version of: if(b) r = p */ -static void cmov_p3(ge25519_p3 *r, const ge25519_p3 *p, unsigned char b) -{ - fe25519_cmov(&r->x, &p->x, b); - fe25519_cmov(&r->y, &p->y, b); - fe25519_cmov(&r->z, &p->z, b); - fe25519_cmov(&r->t, &p->t, b); -} - -/* See http://www.hyperelliptic.org/EFD/g1p/auto-twisted-extended-1.html#doubling-dbl-2008-hwcd */ -static void dbl_p1p1(ge25519_p1p1 *r, const ge25519_p2 *p) -{ - fe25519 a,b,c,d; - fe25519_square(&a, &p->x); - fe25519_square(&b, &p->y); - fe25519_square(&c, &p->z); - fe25519_add(&c, &c, &c); - fe25519_neg(&d, &a); - - fe25519_add(&r->x, &p->x, &p->y); - fe25519_square(&r->x, &r->x); - fe25519_sub(&r->x, &r->x, &a); - fe25519_sub(&r->x, &r->x, &b); - fe25519_add(&r->z, &d, &b); - fe25519_sub(&r->t, &r->z, &c); - fe25519_sub(&r->y, &d, &b); -} - -static void add_p1p1(ge25519_p1p1 *r, const ge25519_p3 *p, const ge25519_p3 *q) -{ - fe25519 a, b, c, d, t, fd; - fe25519_unpack(&fd, ecd); - - fe25519_sub(&a, &p->y, &p->x); // A = (Y1-X1)*(Y2-X2) - fe25519_sub(&t, &q->y, &q->x); - fe25519_mul(&a, &a, &t); - fe25519_add(&b, &p->x, &p->y); // B = (Y1+X1)*(Y2+X2) - fe25519_add(&t, &q->x, &q->y); - fe25519_mul(&b, &b, &t); - fe25519_mul(&c, &p->t, &q->t); //C = T1*k*T2 - fe25519_mul(&c, &c, &fd); - fe25519_add(&c, &c, &c); //XXX: Can save this addition by precomputing 2*ecd - fe25519_mul(&d, &p->z, &q->z); //D = Z1*2*Z2 - fe25519_add(&d, &d, &d); - fe25519_sub(&r->x, &b, &a); // E = B-A - fe25519_sub(&r->t, &d, &c); // F = D-C - fe25519_add(&r->z, &d, &c); // G = D+C - fe25519_add(&r->y, &b, &a); // H = B+A -} - -/* ******************************************************************** - * EXPORTED FUNCTIONS - ******************************************************************** */ - -/* return 0 on success, -1 otherwise */ -int ge25519_unpack_vartime(ge25519_p3 *r, const unsigned char p[32]) -{ - int ret; - fe25519 t, fd; - unsigned char par; - - fe25519_setone(&r->z); - fe25519_unpack(&fd, ecd); - par = p[31] >> 7; - fe25519_unpack(&r->y, p); - fe25519_square(&r->x, &r->y); - fe25519_mul(&t, &r->x, &fd); - fe25519_sub(&r->x, &r->x, &r->z); - fe25519_add(&t, &r->z, &t); - fe25519_invert(&t, &t); - fe25519_mul(&r->x, &r->x, &t); - ret = fe25519_sqrt_vartime(&r->x, &r->x, par); - fe25519_mul(&r->t, &r->x, &r->y); - return ret; -} - -void ge25519_pack(unsigned char r[32], const ge25519_p3 *p) -{ - fe25519 tx, ty, zi; - fe25519_invert(&zi, &p->z); - fe25519_mul(&tx, &p->x, &zi); - fe25519_mul(&ty, &p->y, &zi); - fe25519_pack(r, &ty); - r[31] ^= fe25519_getparity(&tx) << 7; -} - -void ge25519_add(ge25519_p3 *r, const ge25519_p3 *p, const ge25519_p3 *q) -{ - ge25519_p1p1 grp1p1; - add_p1p1(&grp1p1, p, q); - p1p1_to_p3(r, &grp1p1); -} - -void ge25519_double(ge25519_p3 *r, const ge25519_p3 *p) -{ - ge25519_p1p1 grp1p1; - dbl_p1p1(&grp1p1, (const ge25519_p2 *)p); - p1p1_to_p3(r, &grp1p1); -} - -void ge25519_scalarmult(ge25519_p3 *r, const ge25519_p3 *p, const sc25519 *s) -{ - int i,j,k; - ge25519_p3 g; - ge25519_p3 pre[(1 << WINDOWSIZE)]; - ge25519_p3 t; - ge25519_p1p1 tp1p1; - unsigned char w; - unsigned char sb[32]; - - fe25519_unpack(&g.x, ge25519_neutral_x); - fe25519_unpack(&g.y, ge25519_neutral_y); - fe25519_unpack(&g.z, ge25519_neutral_z); - fe25519_unpack(&g.t, ge25519_neutral_t); - - sc25519_to32bytes(sb, s); - - // Precomputation - pre[0] = g; - pre[1] = *p; - for(i=2;i<(1<0;i--) - { - for(j=8-WINDOWSIZE;j>=0;j-=WINDOWSIZE) - { - for(k=0;k>j) & WINDOWMASK; - t = pre[0]; - for(k=1;k<(1<x = g.x; - r->y = g.y; - r->z = g.z; - r->t = g.t; -} - -void ge25519_scalarmult_base(ge25519_p3 *r, const sc25519 *s) -{ - /* XXX: Better algorithm for known-base-point scalar multiplication */ - ge25519_p3 t; - fe25519_unpack(&t.x, ge25519_base_x); - fe25519_unpack(&t.y, ge25519_base_y); - fe25519_unpack(&t.z, ge25519_base_z); - fe25519_unpack(&t.t, ge25519_base_t); - ge25519_scalarmult(r, &t, s); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519.h b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519.h deleted file mode 100644 index f791dea..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519.h +++ /dev/null @@ -1,51 +0,0 @@ -#ifndef SC25519_H -#define SC25519_H - -#define sc25519 crypto_sign_edwards25519sha512batch_sc25519 -#define sc25519_from32bytes crypto_sign_edwards25519sha512batch_sc25519_from32bytes -#define sc25519_from64bytes crypto_sign_edwards25519sha512batch_sc25519_from64bytes -#define sc25519_to32bytes crypto_sign_edwards25519sha512batch_sc25519_to32bytes -#define sc25519_pack crypto_sign_edwards25519sha512batch_sc25519_pack -#define sc25519_getparity crypto_sign_edwards25519sha512batch_sc25519_getparity -#define sc25519_setone crypto_sign_edwards25519sha512batch_sc25519_setone -#define sc25519_setzero crypto_sign_edwards25519sha512batch_sc25519_setzero -#define sc25519_neg crypto_sign_edwards25519sha512batch_sc25519_neg -#define sc25519_add crypto_sign_edwards25519sha512batch_sc25519_add -#define sc25519_sub crypto_sign_edwards25519sha512batch_sc25519_sub -#define sc25519_mul crypto_sign_edwards25519sha512batch_sc25519_mul -#define sc25519_square crypto_sign_edwards25519sha512batch_sc25519_square -#define sc25519_invert crypto_sign_edwards25519sha512batch_sc25519_invert - -#include "crypto_uint32.h" - -typedef struct { - crypto_uint32 v[32]; -} sc25519; - -void sc25519_from32bytes(sc25519 *r, const unsigned char x[32]); - -void sc25519_from64bytes(sc25519 *r, const unsigned char x[64]); - -void sc25519_to32bytes(unsigned char r[32], const sc25519 *x); - -void sc25519_pack(unsigned char r[32], const sc25519 *x); - -unsigned char sc25519_getparity(const sc25519 *x); - -void sc25519_setone(sc25519 *r); - -void sc25519_setzero(sc25519 *r); - -void sc25519_neg(sc25519 *r, const sc25519 *x); - -void sc25519_add(sc25519 *r, const sc25519 *x, const sc25519 *y); - -void sc25519_sub(sc25519 *r, const sc25519 *x, const sc25519 *y); - -void sc25519_mul(sc25519 *r, const sc25519 *x, const sc25519 *y); - -void sc25519_square(sc25519 *r, const sc25519 *x); - -void sc25519_invert(sc25519 *r, const sc25519 *x); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519_edwards25519sha512batch.c b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519_edwards25519sha512batch.c deleted file mode 100644 index 085e3f9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sc25519_edwards25519sha512batch.c +++ /dev/null @@ -1,150 +0,0 @@ -#include "sc25519.h" - -/*Arithmetic modulo the group order n = 2^252 + 27742317777372353535851937790883648493 = 7237005577332262213973186563042994240857116359379907606001950938285454250989 */ - -static const crypto_uint32 m[32] = {0xED, 0xD3, 0xF5, 0x5C, 0x1A, 0x63, 0x12, 0x58, 0xD6, 0x9C, 0xF7, 0xA2, 0xDE, 0xF9, 0xDE, 0x14, - 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10}; - -static const crypto_uint32 mu[33] = {0x1B, 0x13, 0x2C, 0x0A, 0xA3, 0xE5, 0x9C, 0xED, 0xA7, 0x29, 0x63, 0x08, 0x5D, 0x21, 0x06, 0x21, - 0xEB, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0x0F}; - -/* Reduce coefficients of r before calling reduce_add_sub */ -static void reduce_add_sub(sc25519 *r) -{ - int i, b, pb=0, nb; - unsigned char t[32]; - - for(i=0;i<32;i++) - { - b = (r->v[i]v[i]-pb-m[i]+b*256; - pb = b; - } - nb = 1-b; - for(i=0;i<32;i++) - r->v[i] = r->v[i]*b + t[i]*nb; -} - -/* Reduce coefficients of x before calling barrett_reduce */ -static void barrett_reduce(sc25519 *r, const crypto_uint32 x[64]) -{ - /* See HAC, Alg. 14.42 */ - int i,j; - crypto_uint32 q2[66] = {0}; - crypto_uint32 *q3 = q2 + 33; - crypto_uint32 r1[33]; - crypto_uint32 r2[33] = {0}; - crypto_uint32 carry; - int b, pb=0; - - for(i=0;i<33;i++) - for(j=0;j<33;j++) - if(i+j >= 31) q2[i+j] += mu[i]*x[j+31]; - carry = q2[31] >> 8; - q2[32] += carry; - carry = q2[32] >> 8; - q2[33] += carry; - - for(i=0;i<33;i++)r1[i] = x[i]; - for(i=0;i<32;i++) { - for(j=0;j<33;j++) { - if(i+j < 33) { - /* coverity[overrun-local] */ - r2[i+j] += m[i]*q3[j]; - } - } - } - for(i=0;i<32;i++) - { - carry = r2[i] >> 8; - r2[i+1] += carry; - r2[i] &= 0xff; - } - - for(i=0;i<32;i++) - { - b = (r1[i]v[i] = r1[i]-pb-r2[i]+b*256; - pb = b; - } - - /* XXX: Can it really happen that r<0?, See HAC, Alg 14.42, Step 3 - * If so: Handle it here! - */ - - reduce_add_sub(r); - reduce_add_sub(r); -} - -/* -static int iszero(const sc25519 *x) -{ - // Implement - return 0; -} -*/ - -void sc25519_from32bytes(sc25519 *r, const unsigned char x[32]) -{ - int i; - crypto_uint32 t[64] = {0}; - for(i=0;i<32;i++) t[i] = x[i]; - barrett_reduce(r, t); -} - -void sc25519_from64bytes(sc25519 *r, const unsigned char x[64]) -{ - int i; - crypto_uint32 t[64] = {0}; - for(i=0;i<64;i++) t[i] = x[i]; - barrett_reduce(r, t); -} - -/* XXX: What we actually want for crypto_group is probably just something like - * void sc25519_frombytes(sc25519 *r, const unsigned char *x, size_t xlen) - */ - -void sc25519_to32bytes(unsigned char r[32], const sc25519 *x) -{ - int i; - for(i=0;i<32;i++) r[i] = x->v[i]; -} - -void sc25519_add(sc25519 *r, const sc25519 *x, const sc25519 *y) -{ - int i, carry; - for(i=0;i<32;i++) r->v[i] = x->v[i] + y->v[i]; - for(i=0;i<31;i++) - { - carry = r->v[i] >> 8; - r->v[i+1] += carry; - r->v[i] &= 0xff; - } - reduce_add_sub(r); -} - -void sc25519_mul(sc25519 *r, const sc25519 *x, const sc25519 *y) -{ - int i,j,carry; - crypto_uint32 t[64]; - for(i=0;i<64;i++)t[i] = 0; - - for(i=0;i<32;i++) - for(j=0;j<32;j++) - t[i+j] += x->v[i] * y->v[j]; - - /* Reduce coefficients */ - for(i=0;i<63;i++) - { - carry = t[i] >> 8; - t[i+1] += carry; - t[i] &= 0xff; - } - - barrett_reduce(r, t); -} - -void sc25519_square(sc25519 *r, const sc25519 *x) -{ - sc25519_mul(r, x, x); -} diff --git a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sign_edwards25519sha512batch.c b/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sign_edwards25519sha512batch.c deleted file mode 100644 index b3c0c0d..0000000 --- a/Pods/libsodium/src/libsodium/crypto_sign/edwards25519sha512batch/ref/sign_edwards25519sha512batch.c +++ /dev/null @@ -1,106 +0,0 @@ -#include "api.h" -#include "crypto_hash_sha512.h" -#include "randombytes.h" -#include "crypto_verify_32.h" - -#include "ge25519.h" - -int crypto_sign_keypair( - unsigned char *pk, - unsigned char *sk - ) -{ - sc25519 scsk; - ge25519 gepk; - - randombytes_buf(sk, 32); - crypto_hash_sha512(sk, sk, 32); - sk[0] &= 248; - sk[31] &= 127; - sk[31] |= 64; - - sc25519_from32bytes(&scsk,sk); - - ge25519_scalarmult_base(&gepk, &scsk); - ge25519_pack(pk, &gepk); - return 0; -} - -int crypto_sign( - unsigned char *sm,unsigned long long *smlen_p, - const unsigned char *m,unsigned long long mlen, - const unsigned char *sk - ) -{ - sc25519 sck, scs, scsk; - ge25519 ger; - unsigned char r[32]; - unsigned char s[32]; - unsigned long long i; - unsigned char hmg[crypto_hash_sha512_BYTES]; - unsigned char hmr[crypto_hash_sha512_BYTES]; - - if (smlen_p != NULL) { - *smlen_p = mlen+64; - } - for(i=0;i>= 4; - - tmp = load32_bigendian(np + 12); - tmp += len; - store32_bigendian(np + 12, tmp); - - blp = bl; - *(int128 *)(blp + 0) = xmm8; - *(int128 *)(blp + 16) = xmm9; - *(int128 *)(blp + 32) = xmm12; - *(int128 *)(blp + 48) = xmm14; - *(int128 *)(blp + 64) = xmm11; - *(int128 *)(blp + 80) = xmm15; - *(int128 *)(blp + 96) = xmm10; - *(int128 *)(blp + 112) = xmm13; - - bytes: - - if(lensav == 0) goto end; - - b = blp[0]; /* clang false positive */ - *(unsigned char *)(out + 0) = b; - - blp += 1; - out +=1; - lensav -= 1; - - goto bytes; - - full: - - tmp = load32_bigendian(np + 12); - tmp += 8; - store32_bigendian(np + 12, tmp); - - *(int128 *) (out + 0) = xmm8; - *(int128 *) (out + 16) = xmm9; - *(int128 *) (out + 32) = xmm12; - *(int128 *) (out + 48) = xmm14; - *(int128 *) (out + 64) = xmm11; - *(int128 *) (out + 80) = xmm15; - *(int128 *) (out + 96) = xmm10; - *(int128 *) (out + 112) = xmm13; - - end: - return 0; - -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/api.h b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/api.h deleted file mode 100644 index 3c53fb9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/api.h +++ /dev/null @@ -1,13 +0,0 @@ - -#include "crypto_stream_aes128ctr.h" - -#define crypto_stream crypto_stream_aes128ctr -#define crypto_stream_xor crypto_stream_aes128ctr_xor -#define crypto_stream_beforenm crypto_stream_aes128ctr_beforenm -#define crypto_stream_afternm crypto_stream_aes128ctr_afternm -#define crypto_stream_xor_afternm crypto_stream_aes128ctr_xor_afternm -#define crypto_stream_KEYBYTES crypto_stream_aes128ctr_KEYBYTES -#define crypto_stream_NONCEBYTES crypto_stream_aes128ctr_NONCEBYTES -#define crypto_stream_BEFORENMBYTES crypto_stream_aes128ctr_BEFORENMBYTES -#define crypto_stream_IMPLEMENTATION crypto_stream_aes128ctr_IMPLEMENTATION -#define crypto_stream_VERSION crypto_stream_aes128ctr_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/beforenm_aes128ctr.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/beforenm_aes128ctr.c deleted file mode 100644 index f8623dd..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/beforenm_aes128ctr.c +++ /dev/null @@ -1,59 +0,0 @@ -/* Author: Peter Schwabe, ported from an assembly implementation by Emilia Käsper - * Date: 2009-03-19 - * Public domain */ - -#include "api.h" -#include "consts.h" -#include "int128.h" -#include "common.h" - -int crypto_stream_beforenm(unsigned char *c, const unsigned char *k) -{ - - /* - int64 x0; - int64 x1; - int64 x2; - int64 x3; - int64 e; - int64 q0; - int64 q1; - int64 q2; - int64 q3; - */ - - int128 xmm0; - int128 xmm1; - int128 xmm2; - int128 xmm3; - int128 xmm4; - int128 xmm5; - int128 xmm6; - int128 xmm7; - int128 xmm8; - int128 xmm9; - int128 xmm10; - int128 xmm11; - int128 xmm12; - int128 xmm13; - int128 xmm14; - int128 xmm15; - int128 t; - - bitslicekey0(k, c) - - keyexpbs1(xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - keyexpbs(xmm0, xmm1, xmm4, xmm6, xmm3, xmm7, xmm2, xmm5, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm1);, 2,c) - keyexpbs(xmm0, xmm1, xmm3, xmm2, xmm6, xmm5, xmm4, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm6);, 3,c) - keyexpbs(xmm0, xmm1, xmm6, xmm4, xmm2, xmm7, xmm3, xmm5, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm3);, 4,c) - - keyexpbs(xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm3);, 5,c) - keyexpbs(xmm0, xmm1, xmm4, xmm6, xmm3, xmm7, xmm2, xmm5, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm5);, 6,c) - keyexpbs(xmm0, xmm1, xmm3, xmm2, xmm6, xmm5, xmm4, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm3);, 7,c) - keyexpbs(xmm0, xmm1, xmm6, xmm4, xmm2, xmm7, xmm3, xmm5, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm7);, 8,c) - - keyexpbs(xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xor_rcon(&xmm0); xor_rcon(&xmm1); xor_rcon(&xmm6); xor_rcon(&xmm3);, 9,c) - keyexpbs10(xmm0, xmm1, xmm4, xmm6, xmm3, xmm7, xmm2, xmm5, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common.h b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common.h deleted file mode 100644 index 3923c02..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common.h +++ /dev/null @@ -1,788 +0,0 @@ -/* Author: Peter Schwabe, ported from an assembly implementation by Emilia Käsper - Date: 2009-03-19 - Public domain */ -#ifndef COMMON_H -#define COMMON_H - -#include "types.h" - -#define load32_bigendian crypto_stream_aes128ctr_portable_load32_bigendian -uint32 load32_bigendian(const unsigned char *x); - -#define store32_bigendian crypto_stream_aes128ctr_portable_store32_bigendian -void store32_bigendian(unsigned char *x,uint32 u); - -#define load32_littleendian crypto_stream_aes128ctr_portable_load32_littleendian -uint32 load32_littleendian(const unsigned char *x); - -#define store32_littleendian crypto_stream_aes128ctr_portable_store32_littleendian -void store32_littleendian(unsigned char *x,uint32 u); - -#define load64_littleendian crypto_stream_aes128ctr_portable_load64_littleendian -uint64 load64_littleendian(const unsigned char *x); - -#define store64_littleendian crypto_stream_aes128ctr_portable_store64_littleendian -void store64_littleendian(unsigned char *x,uint64 u); - -/* Macros required only for key expansion */ - -#define keyexpbs1(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7, bskey) \ - rotbyte(&b0);\ - rotbyte(&b1);\ - rotbyte(&b2);\ - rotbyte(&b3);\ - rotbyte(&b4);\ - rotbyte(&b5);\ - rotbyte(&b6);\ - rotbyte(&b7);\ - ;\ - sbox(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7);\ - ;\ - xor_rcon(&b0);\ - shufb(&b0, EXPB0);\ - shufb(&b1, EXPB0);\ - shufb(&b4, EXPB0);\ - shufb(&b6, EXPB0);\ - shufb(&b3, EXPB0);\ - shufb(&b7, EXPB0);\ - shufb(&b2, EXPB0);\ - shufb(&b5, EXPB0);\ - shufb(&b0, EXPB0);\ - ;\ - t0 = *(int128 *)(bskey + 0);\ - t1 = *(int128 *)(bskey + 16);\ - t2 = *(int128 *)(bskey + 32);\ - t3 = *(int128 *)(bskey + 48);\ - t4 = *(int128 *)(bskey + 64);\ - t5 = *(int128 *)(bskey + 80);\ - t6 = *(int128 *)(bskey + 96);\ - t7 = *(int128 *)(bskey + 112);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - *(int128 *)(bskey + 128) = b0;\ - *(int128 *)(bskey + 144) = b1;\ - *(int128 *)(bskey + 160) = b4;\ - *(int128 *)(bskey + 176) = b6;\ - *(int128 *)(bskey + 192) = b3;\ - *(int128 *)(bskey + 208) = b7;\ - *(int128 *)(bskey + 224) = b2;\ - *(int128 *)(bskey + 240) = b5;\ - -#define keyexpbs10(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7, bskey) ;\ - toggle(&b0);\ - toggle(&b1);\ - toggle(&b5);\ - toggle(&b6);\ - rotbyte(&b0);\ - rotbyte(&b1);\ - rotbyte(&b2);\ - rotbyte(&b3);\ - rotbyte(&b4);\ - rotbyte(&b5);\ - rotbyte(&b6);\ - rotbyte(&b7);\ - ;\ - sbox(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7);\ - ;\ - xor_rcon(&b1);\ - xor_rcon(&b4);\ - xor_rcon(&b3);\ - xor_rcon(&b7);\ - shufb(&b0, EXPB0);\ - shufb(&b1, EXPB0);\ - shufb(&b4, EXPB0);\ - shufb(&b6, EXPB0);\ - shufb(&b3, EXPB0);\ - shufb(&b7, EXPB0);\ - shufb(&b2, EXPB0);\ - shufb(&b5, EXPB0);\ - ;\ - t0 = *(int128 *)(bskey + 9 * 128 + 0);\ - t1 = *(int128 *)(bskey + 9 * 128 + 16);\ - t2 = *(int128 *)(bskey + 9 * 128 + 32);\ - t3 = *(int128 *)(bskey + 9 * 128 + 48);\ - t4 = *(int128 *)(bskey + 9 * 128 + 64);\ - t5 = *(int128 *)(bskey + 9 * 128 + 80);\ - t6 = *(int128 *)(bskey + 9 * 128 + 96);\ - t7 = *(int128 *)(bskey + 9 * 128 + 112);\ - ;\ - toggle(&t0);\ - toggle(&t1);\ - toggle(&t5);\ - toggle(&t6);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - shufb(&b0, M0);\ - shufb(&b1, M0);\ - shufb(&b2, M0);\ - shufb(&b3, M0);\ - shufb(&b4, M0);\ - shufb(&b5, M0);\ - shufb(&b6, M0);\ - shufb(&b7, M0);\ - ;\ - *(int128 *)(bskey + 1280) = b0;\ - *(int128 *)(bskey + 1296) = b1;\ - *(int128 *)(bskey + 1312) = b4;\ - *(int128 *)(bskey + 1328) = b6;\ - *(int128 *)(bskey + 1344) = b3;\ - *(int128 *)(bskey + 1360) = b7;\ - *(int128 *)(bskey + 1376) = b2;\ - *(int128 *)(bskey + 1392) = b5;\ - - -#define keyexpbs(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7, rcon, i, bskey) \ - toggle(&b0);\ - toggle(&b1);\ - toggle(&b5);\ - toggle(&b6);\ - rotbyte(&b0);\ - rotbyte(&b1);\ - rotbyte(&b2);\ - rotbyte(&b3);\ - rotbyte(&b4);\ - rotbyte(&b5);\ - rotbyte(&b6);\ - rotbyte(&b7);\ - ;\ - sbox(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7);\ - ;\ - rcon;\ - shufb(&b0, EXPB0);\ - shufb(&b1, EXPB0);\ - shufb(&b4, EXPB0);\ - shufb(&b6, EXPB0);\ - shufb(&b3, EXPB0);\ - shufb(&b7, EXPB0);\ - shufb(&b2, EXPB0);\ - shufb(&b5, EXPB0);\ - ;\ - t0 = *(int128 *)(bskey + (i-1) * 128 + 0);\ - t1 = *(int128 *)(bskey + (i-1) * 128 + 16);\ - t2 = *(int128 *)(bskey + (i-1) * 128 + 32);\ - t3 = *(int128 *)(bskey + (i-1) * 128 + 48);\ - t4 = *(int128 *)(bskey + (i-1) * 128 + 64);\ - t5 = *(int128 *)(bskey + (i-1) * 128 + 80);\ - t6 = *(int128 *)(bskey + (i-1) * 128 + 96);\ - t7 = *(int128 *)(bskey + (i-1) * 128 + 112);\ - ;\ - toggle(&t0);\ - toggle(&t1);\ - toggle(&t5);\ - toggle(&t6);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - rshift32_littleendian(&t0, 8);\ - rshift32_littleendian(&t1, 8);\ - rshift32_littleendian(&t2, 8);\ - rshift32_littleendian(&t3, 8);\ - rshift32_littleendian(&t4, 8);\ - rshift32_littleendian(&t5, 8);\ - rshift32_littleendian(&t6, 8);\ - rshift32_littleendian(&t7, 8);\ - ;\ - xor2(&b0, &t0);\ - xor2(&b1, &t1);\ - xor2(&b4, &t2);\ - xor2(&b6, &t3);\ - xor2(&b3, &t4);\ - xor2(&b7, &t5);\ - xor2(&b2, &t6);\ - xor2(&b5, &t7);\ - ;\ - *(int128 *)(bskey + i*128 + 0) = b0;\ - *(int128 *)(bskey + i*128 + 16) = b1;\ - *(int128 *)(bskey + i*128 + 32) = b4;\ - *(int128 *)(bskey + i*128 + 48) = b6;\ - *(int128 *)(bskey + i*128 + 64) = b3;\ - *(int128 *)(bskey + i*128 + 80) = b7;\ - *(int128 *)(bskey + i*128 + 96) = b2;\ - *(int128 *)(bskey + i*128 + 112) = b5;\ - -/* Macros used in multiple contexts */ - -#define bitslicekey0(key, bskey) \ - xmm0 = *(const int128 *) (key + 0);\ - shufb(&xmm0, M0);\ - copy2(&xmm1, &xmm0);\ - copy2(&xmm2, &xmm0);\ - copy2(&xmm3, &xmm0);\ - copy2(&xmm4, &xmm0);\ - copy2(&xmm5, &xmm0);\ - copy2(&xmm6, &xmm0);\ - copy2(&xmm7, &xmm0);\ - ;\ - bitslice(xmm7, xmm6, xmm5, xmm4, xmm3, xmm2, xmm1, xmm0, t);\ - ;\ - *(int128 *) (bskey + 0) = xmm0;\ - *(int128 *) (bskey + 16) = xmm1;\ - *(int128 *) (bskey + 32) = xmm2;\ - *(int128 *) (bskey + 48) = xmm3;\ - *(int128 *) (bskey + 64) = xmm4;\ - *(int128 *) (bskey + 80) = xmm5;\ - *(int128 *) (bskey + 96) = xmm6;\ - *(int128 *) (bskey + 112) = xmm7;\ - - -#define bitslicekey10(key, bskey) \ - xmm0 = *(int128 *) (key + 0);\ - copy2(xmm1, xmm0);\ - copy2(xmm2, xmm0);\ - copy2(xmm3, xmm0);\ - copy2(xmm4, xmm0);\ - copy2(xmm5, xmm0);\ - copy2(xmm6, xmm0);\ - copy2(xmm7, xmm0);\ - ;\ - bitslice(xmm7, xmm6, xmm5, xmm4, xmm3, xmm2, xmm1, xmm0, t);\ - ;\ - toggle(&xmm6);\ - toggle(&xmm5);\ - toggle(&xmm1);\ - toggle(&xmm0);\ - ;\ - *(int128 *) (bskey + 0 + 1280) = xmm0;\ - *(int128 *) (bskey + 16 + 1280) = xmm1;\ - *(int128 *) (bskey + 32 + 1280) = xmm2;\ - *(int128 *) (bskey + 48 + 1280) = xmm3;\ - *(int128 *) (bskey + 64 + 1280) = xmm4;\ - *(int128 *) (bskey + 80 + 1280) = xmm5;\ - *(int128 *) (bskey + 96 + 1280) = xmm6;\ - *(int128 *) (bskey + 112 + 1280) = xmm7;\ - - -#define bitslicekey(i,key,bskey) \ - xmm0 = *(int128 *) (key + 0);\ - shufb(&xmm0, M0);\ - copy2(&xmm1, &xmm0);\ - copy2(&xmm2, &xmm0);\ - copy2(&xmm3, &xmm0);\ - copy2(&xmm4, &xmm0);\ - copy2(&xmm5, &xmm0);\ - copy2(&xmm6, &xmm0);\ - copy2(&xmm7, &xmm0);\ - ;\ - bitslice(xmm7, xmm6, xmm5, xmm4, xmm3, xmm2, xmm1, xmm0, t);\ - ;\ - toggle(&xmm6);\ - toggle(&xmm5);\ - toggle(&xmm1);\ - toggle(&xmm0);\ - ;\ - *(int128 *) (bskey + 0 + 128*i) = xmm0;\ - *(int128 *) (bskey + 16 + 128*i) = xmm1;\ - *(int128 *) (bskey + 32 + 128*i) = xmm2;\ - *(int128 *) (bskey + 48 + 128*i) = xmm3;\ - *(int128 *) (bskey + 64 + 128*i) = xmm4;\ - *(int128 *) (bskey + 80 + 128*i) = xmm5;\ - *(int128 *) (bskey + 96 + 128*i) = xmm6;\ - *(int128 *) (bskey + 112 + 128*i) = xmm7;\ - - -#define bitslice(x0, x1, x2, x3, x4, x5, x6, x7, t) \ - swapmove(x0, x1, 1, BS0, t);\ - swapmove(x2, x3, 1, BS0, t);\ - swapmove(x4, x5, 1, BS0, t);\ - swapmove(x6, x7, 1, BS0, t);\ - ;\ - swapmove(x0, x2, 2, BS1, t);\ - swapmove(x1, x3, 2, BS1, t);\ - swapmove(x4, x6, 2, BS1, t);\ - swapmove(x5, x7, 2, BS1, t);\ - ;\ - swapmove(x0, x4, 4, BS2, t);\ - swapmove(x1, x5, 4, BS2, t);\ - swapmove(x2, x6, 4, BS2, t);\ - swapmove(x3, x7, 4, BS2, t);\ - - -#define swapmove(a, b, n, m, t) \ - copy2(&t, &b);\ - rshift64_littleendian(&t, n);\ - xor2(&t, &a);\ - and2(&t, &m);\ - xor2(&a, &t);\ - lshift64_littleendian(&t, n);\ - xor2(&b, &t); - -#define rotbyte(x) \ - shufb(x, ROTB) /* TODO: Make faster */ - - -/* Macros used for encryption (and decryption) */ - -#define shiftrows(x0, x1, x2, x3, x4, x5, x6, x7, i, M, bskey) \ - xor2(&x0, (const int128 *)(bskey + 128*(i-1) + 0));\ - shufb(&x0, M);\ - xor2(&x1, (const int128 *)(bskey + 128*(i-1) + 16));\ - shufb(&x1, M);\ - xor2(&x2, (const int128 *)(bskey + 128*(i-1) + 32));\ - shufb(&x2, M);\ - xor2(&x3, (const int128 *)(bskey + 128*(i-1) + 48));\ - shufb(&x3, M);\ - xor2(&x4, (const int128 *)(bskey + 128*(i-1) + 64));\ - shufb(&x4, M);\ - xor2(&x5, (const int128 *)(bskey + 128*(i-1) + 80));\ - shufb(&x5, M);\ - xor2(&x6, (const int128 *)(bskey + 128*(i-1) + 96));\ - shufb(&x6, M);\ - xor2(&x7, (const int128 *)(bskey + 128*(i-1) + 112));\ - shufb(&x7, M);\ - - -#define mixcolumns(x0, x1, x2, x3, x4, x5, x6, x7, t0, t1, t2, t3, t4, t5, t6, t7) \ - shufd(&t0, &x0, 0x93);\ - shufd(&t1, &x1, 0x93);\ - shufd(&t2, &x2, 0x93);\ - shufd(&t3, &x3, 0x93);\ - shufd(&t4, &x4, 0x93);\ - shufd(&t5, &x5, 0x93);\ - shufd(&t6, &x6, 0x93);\ - shufd(&t7, &x7, 0x93);\ - ;\ - xor2(&x0, &t0);\ - xor2(&x1, &t1);\ - xor2(&x2, &t2);\ - xor2(&x3, &t3);\ - xor2(&x4, &t4);\ - xor2(&x5, &t5);\ - xor2(&x6, &t6);\ - xor2(&x7, &t7);\ - ;\ - xor2(&t0, &x7);\ - xor2(&t1, &x0);\ - xor2(&t2, &x1);\ - xor2(&t1, &x7);\ - xor2(&t3, &x2);\ - xor2(&t4, &x3);\ - xor2(&t5, &x4);\ - xor2(&t3, &x7);\ - xor2(&t6, &x5);\ - xor2(&t7, &x6);\ - xor2(&t4, &x7);\ - ;\ - shufd(&x0, &x0, 0x4e);\ - shufd(&x1, &x1, 0x4e);\ - shufd(&x2, &x2, 0x4e);\ - shufd(&x3, &x3, 0x4e);\ - shufd(&x4, &x4, 0x4e);\ - shufd(&x5, &x5, 0x4e);\ - shufd(&x6, &x6, 0x4e);\ - shufd(&x7, &x7, 0x4e);\ - ;\ - xor2(&t0, &x0);\ - xor2(&t1, &x1);\ - xor2(&t2, &x2);\ - xor2(&t3, &x3);\ - xor2(&t4, &x4);\ - xor2(&t5, &x5);\ - xor2(&t6, &x6);\ - xor2(&t7, &x7);\ - - -#define aesround(i, b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7, bskey) \ - shiftrows(b0, b1, b2, b3, b4, b5, b6, b7, i, SR, bskey);\ - sbox(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7);\ - mixcolumns(b0, b1, b4, b6, b3, b7, b2, b5, t0, t1, t2, t3, t4, t5, t6, t7);\ - - -#define lastround(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7, bskey) \ - shiftrows(b0, b1, b2, b3, b4, b5, b6, b7, 10, SRM0, bskey);\ - sbox(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, t4, t5, t6, t7);\ - xor2(&b0,(const int128 *)(bskey + 128*10));\ - xor2(&b1,(const int128 *)(bskey + 128*10+16));\ - xor2(&b4,(const int128 *)(bskey + 128*10+32));\ - xor2(&b6,(const int128 *)(bskey + 128*10+48));\ - xor2(&b3,(const int128 *)(bskey + 128*10+64));\ - xor2(&b7,(const int128 *)(bskey + 128*10+80));\ - xor2(&b2,(const int128 *)(bskey + 128*10+96));\ - xor2(&b5,(const int128 *)(bskey + 128*10+112));\ - - -#define sbox(b0, b1, b2, b3, b4, b5, b6, b7, t0, t1, t2, t3, s0, s1, s2, s3) \ - InBasisChange(b0, b1, b2, b3, b4, b5, b6, b7); \ - Inv_GF256(b6, b5, b0, b3, b7, b1, b4, b2, t0, t1, t2, t3, s0, s1, s2, s3); \ - OutBasisChange(b7, b1, b4, b2, b6, b5, b0, b3); \ - - -#define InBasisChange(b0, b1, b2, b3, b4, b5, b6, b7) \ - xor2(&b5, &b6);\ - xor2(&b2, &b1);\ - xor2(&b5, &b0);\ - xor2(&b6, &b2);\ - xor2(&b3, &b0);\ - ;\ - xor2(&b6, &b3);\ - xor2(&b3, &b7);\ - xor2(&b3, &b4);\ - xor2(&b7, &b5);\ - xor2(&b3, &b1);\ - ;\ - xor2(&b4, &b5);\ - xor2(&b2, &b7);\ - xor2(&b1, &b5);\ - -#define OutBasisChange(b0, b1, b2, b3, b4, b5, b6, b7) \ - xor2(&b0, &b6);\ - xor2(&b1, &b4);\ - xor2(&b2, &b0);\ - xor2(&b4, &b6);\ - xor2(&b6, &b1);\ - ;\ - xor2(&b1, &b5);\ - xor2(&b5, &b3);\ - xor2(&b2, &b5);\ - xor2(&b3, &b7);\ - xor2(&b7, &b5);\ - ;\ - xor2(&b4, &b7);\ - -#define Mul_GF4(x0, x1, y0, y1, t0) \ - copy2(&t0, &y0);\ - xor2(&t0, &y1);\ - and2(&t0, &x0);\ - xor2(&x0, &x1);\ - and2(&x0, &y1);\ - and2(&x1, &y0);\ - xor2(&x0, &x1);\ - xor2(&x1, &t0);\ - -#define Mul_GF4_N(x0, x1, y0, y1, t0) \ - copy2(&t0, &y0);\ - xor2(&t0, &y1);\ - and2(&t0, &x0);\ - xor2(&x0, &x1);\ - and2(&x0, &y1);\ - and2(&x1, &y0);\ - xor2(&x1, &x0);\ - xor2(&x0, &t0);\ - -#define Mul_GF4_2(x0, x1, x2, x3, y0, y1, t0, t1) \ - copy2(&t0, = y0);\ - xor2(&t0, &y1);\ - copy2(&t1, &t0);\ - and2(&t0, &x0);\ - and2(&t1, &x2);\ - xor2(&x0, &x1);\ - xor2(&x2, &x3);\ - and2(&x0, &y1);\ - and2(&x2, &y1);\ - and2(&x1, &y0);\ - and2(&x3, &y0);\ - xor2(&x0, &x1);\ - xor2(&x2, &x3);\ - xor2(&x1, &t0);\ - xor2(&x3, &t1);\ - -#define Mul_GF16(x0, x1, x2, x3, y0, y1, y2, y3, t0, t1, t2, t3) \ - copy2(&t0, &x0);\ - copy2(&t1, &x1);\ - Mul_GF4(x0, x1, y0, y1, t2);\ - xor2(&t0, &x2);\ - xor2(&t1, &x3);\ - xor2(&y0, &y2);\ - xor2(&y1, &y3);\ - Mul_GF4_N(t0, t1, y0, y1, t2);\ - Mul_GF4(x2, x3, y2, y3, t3);\ - ;\ - xor2(&x0, &t0);\ - xor2(&x2, &t0);\ - xor2(&x1, &t1);\ - xor2(&x3, &t1);\ - -#define Mul_GF16_2(x0, x1, x2, x3, x4, x5, x6, x7, y0, y1, y2, y3, t0, t1, t2, t3) \ - copy2(&t0, &x0);\ - copy2(&t1, &x1);\ - Mul_GF4(x0, x1, y0, y1, t2);\ - xor2(&t0, &x2);\ - xor2(&t1, &x3);\ - xor2(&y0, &y2);\ - xor2(&y1, &y3);\ - Mul_GF4_N(t0, t1, y0, y1, t3);\ - Mul_GF4(x2, x3, y2, y3, t2);\ - ;\ - xor2(&x0, &t0);\ - xor2(&x2, &t0);\ - xor2(&x1, &t1);\ - xor2(&x3, &t1);\ - ;\ - copy2(&t0, &x4);\ - copy2(&t1, &x5);\ - xor2(&t0, &x6);\ - xor2(&t1, &x7);\ - Mul_GF4_N(t0, t1, y0, y1, t3);\ - Mul_GF4(x6, x7, y2, y3, t2);\ - xor2(&y0, &y2);\ - xor2(&y1, &y3);\ - Mul_GF4(x4, x5, y0, y1, t3);\ - ;\ - xor2(&x4, &t0);\ - xor2(&x6, &t0);\ - xor2(&x5, &t1);\ - xor2(&x7, &t1);\ - -#define Inv_GF16(x0, x1, x2, x3, t0, t1, t2, t3) \ - copy2(&t0, &x1);\ - copy2(&t1, &x0);\ - and2(&t0, &x3);\ - or2(&t1, &x2);\ - copy2(&t2, &x1);\ - copy2(&t3, &x0);\ - or2(&t2, &x2);\ - or2(&t3, &x3);\ - xor2(&t2, &t3);\ - ;\ - xor2(&t0, &t2);\ - xor2(&t1, &t2);\ - ;\ - Mul_GF4_2(x0, x1, x2, x3, t1, t0, t2, t3);\ - - -#define Inv_GF256(x0, x1, x2, x3, x4, x5, x6, x7, t0, t1, t2, t3, s0, s1, s2, s3) \ - copy2(&t3, &x4);\ - copy2(&t2, &x5);\ - copy2(&t1, &x1);\ - copy2(&s1, &x7);\ - copy2(&s0, &x0);\ - ;\ - xor2(&t3, &x6);\ - xor2(&t2, &x7);\ - xor2(&t1, &x3);\ - xor2(&s1, &x6);\ - xor2(&s0, &x2);\ - ;\ - copy2(&s2, &t3);\ - copy2(&t0, &t2);\ - copy2(&s3, &t3);\ - ;\ - or2(&t2, &t1);\ - or2(&t3, &s0);\ - xor2(&s3, &t0);\ - and2(&s2, &s0);\ - and2(&t0, &t1);\ - xor2(&s0, &t1);\ - and2(&s3, &s0);\ - copy2(&s0, &x3);\ - xor2(&s0, &x2);\ - and2(&s1, &s0);\ - xor2(&t3, &s1);\ - xor2(&t2, &s1);\ - copy2(&s1, &x4);\ - xor2(&s1, &x5);\ - copy2(&s0, &x1);\ - copy2(&t1, &s1);\ - xor2(&s0, &x0);\ - or2(&t1, &s0);\ - and2(&s1, &s0);\ - xor2(&t0, &s1);\ - xor2(&t3, &s3);\ - xor2(&t2, &s2);\ - xor2(&t1, &s3);\ - xor2(&t0, &s2);\ - xor2(&t1, &s2);\ - copy2(&s0, &x7);\ - copy2(&s1, &x6);\ - copy2(&s2, &x5);\ - copy2(&s3, &x4);\ - and2(&s0, &x3);\ - and2(&s1, &x2);\ - and2(&s2, &x1);\ - or2(&s3, &x0);\ - xor2(&t3, &s0);\ - xor2(&t2, &s1);\ - xor2(&t1, &s2);\ - xor2(&t0, &s3);\ - ;\ - copy2(&s0, &t3);\ - xor2(&s0, &t2);\ - and2(&t3, &t1);\ - copy2(&s2, &t0);\ - xor2(&s2, &t3);\ - copy2(&s3, &s0);\ - and2(&s3, &s2);\ - xor2(&s3, &t2);\ - copy2(&s1, &t1);\ - xor2(&s1, &t0);\ - xor2(&t3, &t2);\ - and2(&s1, &t3);\ - xor2(&s1, &t0);\ - xor2(&t1, &s1);\ - copy2(&t2, &s2);\ - xor2(&t2, &s1);\ - and2(&t2, &t0);\ - xor2(&t1, &t2);\ - xor2(&s2, &t2);\ - and2(&s2, &s3);\ - xor2(&s2, &s0);\ - ;\ - Mul_GF16_2(x0, x1, x2, x3, x4, x5, x6, x7, s3, s2, s1, t1, s0, t0, t2, t3);\ - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common_aes128ctr.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common_aes128ctr.c deleted file mode 100644 index 14a28cc..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/common_aes128ctr.c +++ /dev/null @@ -1,64 +0,0 @@ -#include "common.h" - -uint32 load32_bigendian(const unsigned char *x) -{ - return - (uint32) (x[3]) \ - | (((uint32) (x[2])) << 8) \ - | (((uint32) (x[1])) << 16) \ - | (((uint32) (x[0])) << 24) - ; -} - -void store32_bigendian(unsigned char *x,uint32 u) -{ - x[3] = u; u >>= 8; - x[2] = u; u >>= 8; - x[1] = u; u >>= 8; - x[0] = u; -} - -uint32 load32_littleendian(const unsigned char *x) -{ - return - (uint32) (x[0]) \ - | (((uint32) (x[1])) << 8) \ - | (((uint32) (x[2])) << 16) \ - | (((uint32) (x[3])) << 24) - ; -} - -void store32_littleendian(unsigned char *x,uint32 u) -{ - x[0] = u; u >>= 8; - x[1] = u; u >>= 8; - x[2] = u; u >>= 8; - x[3] = u; -} - - -uint64 load64_littleendian(const unsigned char *x) -{ - return - (uint64) (x[0]) \ - | (((uint64) (x[1])) << 8) \ - | (((uint64) (x[2])) << 16) \ - | (((uint64) (x[3])) << 24) - | (((uint64) (x[4])) << 32) - | (((uint64) (x[5])) << 40) - | (((uint64) (x[6])) << 48) - | (((uint64) (x[7])) << 56) - ; -} - -void store64_littleendian(unsigned char *x,uint64 u) -{ - x[0] = u; u >>= 8; - x[1] = u; u >>= 8; - x[2] = u; u >>= 8; - x[3] = u; u >>= 8; - x[4] = u; u >>= 8; - x[5] = u; u >>= 8; - x[6] = u; u >>= 8; - x[7] = u; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts.h b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts.h deleted file mode 100644 index 4c50360..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts.h +++ /dev/null @@ -1,28 +0,0 @@ -#ifndef CONSTS_H -#define CONSTS_H - -#include "int128.h" - -#define ROTB crypto_stream_aes128ctr_portable_ROTB -#define M0 crypto_stream_aes128ctr_portable_M0 -#define EXPB0 crypto_stream_aes128ctr_portable_EXPB0 -#define SWAP32 crypto_stream_aes128ctr_portable_SWAP32 -#define M0SWAP crypto_stream_aes128ctr_portable_M0SWAP -#define SR crypto_stream_aes128ctr_portable_SR -#define SRM0 crypto_stream_aes128ctr_portable_SRM0 -#define BS0 crypto_stream_aes128ctr_portable_BS0 -#define BS1 crypto_stream_aes128ctr_portable_BS1 -#define BS2 crypto_stream_aes128ctr_portable_BS2 - -extern const unsigned char ROTB[16]; -extern const unsigned char M0[16]; -extern const unsigned char EXPB0[16]; -extern const unsigned char SWAP32[16]; -extern const unsigned char M0SWAP[16]; -extern const unsigned char SR[16]; -extern const unsigned char SRM0[16]; -extern const int128 BS0; -extern const int128 BS1; -extern const int128 BS2; - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts_aes128ctr.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts_aes128ctr.c deleted file mode 100644 index f8029b8..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/consts_aes128ctr.c +++ /dev/null @@ -1,14 +0,0 @@ -#include "consts.h" - -const unsigned char ROTB[16] = {0x00, 0x00, 0x00, 0x0c, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x08}; -const unsigned char M0[16] = {0x0f, 0x0b, 0x07, 0x03, 0x0e, 0x0a, 0x06, 0x02, 0x0d, 0x09, 0x05, 0x01, 0x0c, 0x08, 0x04, 0x00}; -const unsigned char EXPB0[16] = {0x03, 0x03, 0x03, 0x03, 0x07, 0x07, 0x07, 0x07, 0x0b, 0x0b, 0x0b, 0x0b, 0x0f, 0x0f, 0x0f, 0x0f}; - -const unsigned char SWAP32[16] = {0x03, 0x02, 0x01, 0x00, 0x07, 0x06, 0x05, 0x04, 0x0b, 0x0a, 0x09, 0x08, 0x0f, 0x0e, 0x0d, 0x0c}; -const unsigned char M0SWAP[16] = {0x0c, 0x08, 0x04, 0x00, 0x0d, 0x09, 0x05, 0x01, 0x0e, 0x0a, 0x06, 0x02, 0x0f, 0x0b, 0x07, 0x03}; -const unsigned char SR[16] = {0x01, 0x02, 0x03, 0x00, 0x06, 0x07, 0x04, 0x05, 0x0b, 0x08, 0x09, 0x0a, 0x0c, 0x0d, 0x0e, 0x0f}; -const unsigned char SRM0[16] = {0x0f, 0x0a, 0x05, 0x00, 0x0e, 0x09, 0x04, 0x03, 0x0d, 0x08, 0x07, 0x02, 0x0c, 0x0b, 0x06, 0x01}; - -const int128 BS0 = {{0x5555555555555555ULL, 0x5555555555555555ULL}}; -const int128 BS1 = {{0x3333333333333333ULL, 0x3333333333333333ULL}}; -const int128 BS2 = {{0x0f0f0f0f0f0f0f0fULL, 0x0f0f0f0f0f0f0f0fULL}}; diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128.h b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128.h deleted file mode 100644 index 3fd2111..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128.h +++ /dev/null @@ -1,56 +0,0 @@ -#ifndef INT128_H -#define INT128_H - -#include - -#include "common.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -#endif - -typedef union { - uint64_t u64[2]; - uint32_t u32[4]; - uint8_t u8[16]; -} int128; - -#define xor2 crypto_stream_aes128ctr_portable_xor2 -void xor2(int128 *r, const int128 *x); - -#define and2 crypto_stream_aes128ctr_portable_and2 -void and2(int128 *r, const int128 *x); - -#define or2 crypto_stream_aes128ctr_portable_or2 -void or2(int128 *r, const int128 *x); - -#define copy2 crypto_stream_aes128ctr_portable_copy2 -void copy2(int128 *r, const int128 *x); - -#define shufb crypto_stream_aes128ctr_portable_shufb -void shufb(int128 *r, const unsigned char *l); - -#define shufd crypto_stream_aes128ctr_portable_shufd -void shufd(int128 *r, const int128 *x, const unsigned int c); - -#define rshift32_littleendian crypto_stream_aes128ctr_portable_rshift32_littleendian -void rshift32_littleendian(int128 *r, const unsigned int n); - -#define rshift64_littleendian crypto_stream_aes128ctr_portable_rshift64_littleendian -void rshift64_littleendian(int128 *r, const unsigned int n); - -#define lshift64_littleendian crypto_stream_aes128ctr_portable_lshift64_littleendian -void lshift64_littleendian(int128 *r, const unsigned int n); - -#define toggle crypto_stream_aes128ctr_portable_toggle -void toggle(int128 *r); - -#define xor_rcon crypto_stream_aes128ctr_portable_xor_rcon -void xor_rcon(int128 *r); - -#define add_uint32_big crypto_stream_aes128ctr_portable_add_uint32_big -void add_uint32_big(int128 *r, uint32 x); - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128_aes128ctr.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128_aes128ctr.c deleted file mode 100644 index 703de39..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/int128_aes128ctr.c +++ /dev/null @@ -1,131 +0,0 @@ - -#include "int128.h" -#include "common.h" - -void xor2(int128 *r, const int128 *x) -{ - r->u64[0] ^= x->u64[0]; - r->u64[1] ^= x->u64[1]; -} - -void and2(int128 *r, const int128 *x) -{ - r->u64[0] &= x->u64[0]; - r->u64[1] &= x->u64[1]; -} - -void or2(int128 *r, const int128 *x) -{ - r->u64[0] |= x->u64[0]; - r->u64[1] |= x->u64[1]; -} - -void copy2(int128 *r, const int128 *x) -{ - r->u64[0] = x->u64[0]; - r->u64[1] = x->u64[1]; -} - -void shufb(int128 *r, const unsigned char *l) -{ - int128 t; - uint8_t *ct; - uint8_t *cr; - - copy2(&t, r); - cr = r->u8; - ct = t.u8; - cr[0] = ct[l[0]]; - cr[1] = ct[l[1]]; - cr[2] = ct[l[2]]; - cr[3] = ct[l[3]]; - cr[4] = ct[l[4]]; - cr[5] = ct[l[5]]; - cr[6] = ct[l[6]]; - cr[7] = ct[l[7]]; - cr[8] = ct[l[8]]; - cr[9] = ct[l[9]]; - cr[10] = ct[l[10]]; - cr[11] = ct[l[11]]; - cr[12] = ct[l[12]]; - cr[13] = ct[l[13]]; - cr[14] = ct[l[14]]; - cr[15] = ct[l[15]]; -} - -void shufd(int128 *r, const int128 *x, const unsigned int c) -{ - int128 t; - - t.u32[0] = x->u32[c >> 0 & 3]; - t.u32[1] = x->u32[c >> 2 & 3]; - t.u32[2] = x->u32[c >> 4 & 3]; - t.u32[3] = x->u32[c >> 6 & 3]; - copy2(r, &t); -} - -void rshift32_littleendian(int128 *r, const unsigned int n) -{ - unsigned char *rp = (unsigned char *)r; - uint32 t; - t = load32_littleendian(rp); - t >>= n; - store32_littleendian(rp, t); - t = load32_littleendian(rp+4); - t >>= n; - store32_littleendian(rp+4, t); - t = load32_littleendian(rp+8); - t >>= n; - store32_littleendian(rp+8, t); - t = load32_littleendian(rp+12); - t >>= n; - store32_littleendian(rp+12, t); -} - -void rshift64_littleendian(int128 *r, const unsigned int n) -{ - unsigned char *rp = (unsigned char *)r; - uint64 t; - t = load64_littleendian(rp); - t >>= n; - store64_littleendian(rp, t); - t = load64_littleendian(rp+8); - t >>= n; - store64_littleendian(rp+8, t); -} - -void lshift64_littleendian(int128 *r, const unsigned int n) -{ - unsigned char *rp = (unsigned char *)r; - uint64 t; - t = load64_littleendian(rp); - t <<= n; - store64_littleendian(rp, t); - t = load64_littleendian(rp+8); - t <<= n; - store64_littleendian(rp+8, t); -} - -void toggle(int128 *r) -{ - r->u64[0] ^= 0xffffffffffffffffULL; - r->u64[1] ^= 0xffffffffffffffffULL; -} - -void xor_rcon(int128 *r) -{ - unsigned char *rp = (unsigned char *)r; - uint32 t; - t = load32_littleendian(rp+12); - t ^= 0xffffffff; - store32_littleendian(rp+12, t); -} - -void add_uint32_big(int128 *r, uint32 x) -{ - unsigned char *rp = (unsigned char *)r; - uint32 t; - t = load32_littleendian(rp+12); - t += x; - store32_littleendian(rp+12, t); -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/stream_aes128ctr.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/stream_aes128ctr.c deleted file mode 100644 index 8f4ec72..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/stream_aes128ctr.c +++ /dev/null @@ -1,28 +0,0 @@ -#include "api.h" - -int crypto_stream( - unsigned char *out, - unsigned long long outlen, - const unsigned char *n, - const unsigned char *k - ) -{ - unsigned char d[crypto_stream_BEFORENMBYTES]; - crypto_stream_beforenm(d, k); - crypto_stream_afternm(out, outlen, n, d); - return 0; -} - -int crypto_stream_xor( - unsigned char *out, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *n, - const unsigned char *k - ) -{ - unsigned char d[crypto_stream_BEFORENMBYTES]; - crypto_stream_beforenm(d, k); - crypto_stream_xor_afternm(out, in, inlen, n, d); - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/types.h b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/types.h deleted file mode 100644 index 6aa502f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/types.h +++ /dev/null @@ -1,10 +0,0 @@ -#ifndef TYPES_H -#define TYPES_H - -#include "crypto_uint32.h" -typedef crypto_uint32 uint32; - -#include "crypto_uint64.h" -typedef crypto_uint64 uint64; - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/xor_afternm_aes128ctr.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/xor_afternm_aes128ctr.c deleted file mode 100644 index 139dbe5..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/portable/xor_afternm_aes128ctr.c +++ /dev/null @@ -1,181 +0,0 @@ -/* Author: Peter Schwabe, ported from an assembly implementation by Emilia Käsper - * Date: 2009-03-19 - * Public domain */ - -#include -#include "api.h" -#include "int128.h" -#include "common.h" -#include "consts.h" - -int crypto_stream_xor_afternm(unsigned char *out, const unsigned char *in, unsigned long long len, const unsigned char *nonce, const unsigned char *c) -{ - - int128 xmm0; - int128 xmm1; - int128 xmm2; - int128 xmm3; - int128 xmm4; - int128 xmm5; - int128 xmm6; - int128 xmm7; - - int128 xmm8; - int128 xmm9; - int128 xmm10; - int128 xmm11; - int128 xmm12; - int128 xmm13; - int128 xmm14; - int128 xmm15; - - int128 nonce_stack; - unsigned long long lensav; - unsigned char bl[128]; - unsigned char *blp; - unsigned char *np; - unsigned char b; - - uint32 tmp; - - /* Copy nonce on the stack */ - copy2(&nonce_stack, (const int128 *) (nonce + 0)); - np = (unsigned char *)&nonce_stack; - - enc_block: - - xmm0 = *(int128 *) (np + 0); - copy2(&xmm1, &xmm0); - shufb(&xmm1, SWAP32); - copy2(&xmm2, &xmm1); - copy2(&xmm3, &xmm1); - copy2(&xmm4, &xmm1); - copy2(&xmm5, &xmm1); - copy2(&xmm6, &xmm1); - copy2(&xmm7, &xmm1); - - add_uint32_big(&xmm1, 1); - add_uint32_big(&xmm2, 2); - add_uint32_big(&xmm3, 3); - add_uint32_big(&xmm4, 4); - add_uint32_big(&xmm5, 5); - add_uint32_big(&xmm6, 6); - add_uint32_big(&xmm7, 7); - - shufb(&xmm0, M0); - shufb(&xmm1, M0SWAP); - shufb(&xmm2, M0SWAP); - shufb(&xmm3, M0SWAP); - shufb(&xmm4, M0SWAP); - shufb(&xmm5, M0SWAP); - shufb(&xmm6, M0SWAP); - shufb(&xmm7, M0SWAP); - - bitslice(xmm7, xmm6, xmm5, xmm4, xmm3, xmm2, xmm1, xmm0, xmm8) - - aesround( 1, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - aesround( 2, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7,c) - aesround( 3, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - aesround( 4, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7,c) - aesround( 5, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - aesround( 6, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7,c) - aesround( 7, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - aesround( 8, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7,c) - aesround( 9, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7, xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15,c) - lastround(xmm8, xmm9, xmm10, xmm11, xmm12, xmm13, xmm14, xmm15, xmm0, xmm1, xmm2, xmm3, xmm4, xmm5, xmm6, xmm7,c) - - bitslice(xmm13, xmm10, xmm15, xmm11, xmm14, xmm12, xmm9, xmm8, xmm0) - - if(len < 128) goto partial; - if(len == 128) goto full; - - tmp = load32_bigendian(np + 12); - tmp += 8; - store32_bigendian(np + 12, tmp); - - xor2(&xmm8, (const int128 *)(in + 0)); - xor2(&xmm9, (const int128 *)(in + 16)); - xor2(&xmm12, (const int128 *)(in + 32)); - xor2(&xmm14, (const int128 *)(in + 48)); - xor2(&xmm11, (const int128 *)(in + 64)); - xor2(&xmm15, (const int128 *)(in + 80)); - xor2(&xmm10, (const int128 *)(in + 96)); - xor2(&xmm13, (const int128 *)(in + 112)); - - *(int128 *) (out + 0) = xmm8; - *(int128 *) (out + 16) = xmm9; - *(int128 *) (out + 32) = xmm12; - *(int128 *) (out + 48) = xmm14; - *(int128 *) (out + 64) = xmm11; - *(int128 *) (out + 80) = xmm15; - *(int128 *) (out + 96) = xmm10; - *(int128 *) (out + 112) = xmm13; - - len -= 128; - in += 128; - out += 128; - - goto enc_block; - - partial: - - lensav = len; - len >>= 4; - - tmp = load32_bigendian(np + 12); - tmp += len; - store32_bigendian(np + 12, tmp); - - blp = bl; - *(int128 *)(blp + 0) = xmm8; - *(int128 *)(blp + 16) = xmm9; - *(int128 *)(blp + 32) = xmm12; - *(int128 *)(blp + 48) = xmm14; - *(int128 *)(blp + 64) = xmm11; - *(int128 *)(blp + 80) = xmm15; - *(int128 *)(blp + 96) = xmm10; - *(int128 *)(blp + 112) = xmm13; - - bytes: - - if(lensav == 0) goto end; - - b = blp[0]; /* clang false positive */ - b ^= *(const unsigned char *)(in + 0); - *(unsigned char *)(out + 0) = b; - - blp += 1; - in +=1; - out +=1; - lensav -= 1; - - goto bytes; - - full: - - tmp = load32_bigendian(np + 12); - tmp += 8; - store32_bigendian(np + 12, tmp); - - xor2(&xmm8, (const int128 *)(in + 0)); - xor2(&xmm9, (const int128 *)(in + 16)); - xor2(&xmm12, (const int128 *)(in + 32)); - xor2(&xmm14, (const int128 *)(in + 48)); - xor2(&xmm11, (const int128 *)(in + 64)); - xor2(&xmm15, (const int128 *)(in + 80)); - xor2(&xmm10, (const int128 *)(in + 96)); - xor2(&xmm13, (const int128 *)(in + 112)); - - *(int128 *) (out + 0) = xmm8; - *(int128 *) (out + 16) = xmm9; - *(int128 *) (out + 32) = xmm12; - *(int128 *) (out + 48) = xmm14; - *(int128 *) (out + 64) = xmm11; - *(int128 *) (out + 80) = xmm15; - *(int128 *) (out + 96) = xmm10; - *(int128 *) (out + 112) = xmm13; - - end: - return 0; - -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/stream_aes128ctr_api.c b/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/stream_aes128ctr_api.c deleted file mode 100644 index 184ad3f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/aes128ctr/stream_aes128ctr_api.c +++ /dev/null @@ -1,16 +0,0 @@ -#include "crypto_stream_aes128ctr.h" - -size_t -crypto_stream_aes128ctr_keybytes(void) { - return crypto_stream_aes128ctr_KEYBYTES; -} - -size_t -crypto_stream_aes128ctr_noncebytes(void) { - return crypto_stream_aes128ctr_NONCEBYTES; -} - -size_t -crypto_stream_aes128ctr_beforenmbytes(void) { - return crypto_stream_aes128ctr_BEFORENMBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/chacha20/ref/api.h b/Pods/libsodium/src/libsodium/crypto_stream/chacha20/ref/api.h deleted file mode 100644 index 3d85867..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/chacha20/ref/api.h +++ /dev/null @@ -1,12 +0,0 @@ - -#include "crypto_stream_chacha20.h" - -int -crypto_stream_chacha20_ref(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -int -crypto_stream_chacha20_ref_xor_ic(unsigned char *c, const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k); diff --git a/Pods/libsodium/src/libsodium/crypto_stream/chacha20/ref/stream_chacha20_ref.c b/Pods/libsodium/src/libsodium/crypto_stream/chacha20/ref/stream_chacha20_ref.c deleted file mode 100644 index 967015f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/chacha20/ref/stream_chacha20_ref.c +++ /dev/null @@ -1,276 +0,0 @@ - -/* $OpenBSD: chacha.c,v 1.1 2013/11/21 00:45:44 djm Exp $ */ - -/* - chacha-merged.c version 20080118 - D. J. Bernstein - Public domain. - */ - -#include -#include - -#include "api.h" -#include "crypto_stream_chacha20.h" -#include "utils.h" - -struct chacha_ctx { - uint32_t input[16]; -}; - -typedef uint8_t u8; -typedef uint32_t u32; - -typedef struct chacha_ctx chacha_ctx; - -#define U8C(v) (v##U) -#define U32C(v) (v##U) - -#define U8V(v) ((u8)(v) & U8C(0xFF)) -#define U32V(v) ((u32)(v) & U32C(0xFFFFFFFF)) - -#define ROTL32(v, n) \ - (U32V((v) << (n)) | ((v) >> (32 - (n)))) - -#define U8TO32_LITTLE(p) \ - (((u32)((p)[0]) ) | \ - ((u32)((p)[1]) << 8) | \ - ((u32)((p)[2]) << 16) | \ - ((u32)((p)[3]) << 24)) - -#define U32TO8_LITTLE(p, v) \ - do { \ - (p)[0] = U8V((v) ); \ - (p)[1] = U8V((v) >> 8); \ - (p)[2] = U8V((v) >> 16); \ - (p)[3] = U8V((v) >> 24); \ - } while (0) - -#define ROTATE(v,c) (ROTL32(v,c)) -#define XOR(v,w) ((v) ^ (w)) -#define PLUS(v,w) (U32V((v) + (w))) -#define PLUSONE(v) (PLUS((v),1)) - -#define QUARTERROUND(a,b,c,d) \ - a = PLUS(a,b); d = ROTATE(XOR(d,a),16); \ - c = PLUS(c,d); b = ROTATE(XOR(b,c),12); \ - a = PLUS(a,b); d = ROTATE(XOR(d,a), 8); \ - c = PLUS(c,d); b = ROTATE(XOR(b,c), 7); - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -static void -chacha_keysetup(chacha_ctx *x, const u8 *k) -{ - const unsigned char *constants; - - x->input[4] = U8TO32_LITTLE(k + 0); - x->input[5] = U8TO32_LITTLE(k + 4); - x->input[6] = U8TO32_LITTLE(k + 8); - x->input[7] = U8TO32_LITTLE(k + 12); - k += 16; - constants = sigma; - x->input[8] = U8TO32_LITTLE(k + 0); - x->input[9] = U8TO32_LITTLE(k + 4); - x->input[10] = U8TO32_LITTLE(k + 8); - x->input[11] = U8TO32_LITTLE(k + 12); - x->input[0] = U8TO32_LITTLE(constants + 0); - x->input[1] = U8TO32_LITTLE(constants + 4); - x->input[2] = U8TO32_LITTLE(constants + 8); - x->input[3] = U8TO32_LITTLE(constants + 12); -} - -static void -chacha_ivsetup(chacha_ctx *x, const u8 *iv, const u8 *counter) -{ - x->input[12] = counter == NULL ? 0 : U8TO32_LITTLE(counter + 0); - x->input[13] = counter == NULL ? 0 : U8TO32_LITTLE(counter + 4); - x->input[14] = U8TO32_LITTLE(iv + 0); - x->input[15] = U8TO32_LITTLE(iv + 4); -} - -static void -chacha_encrypt_bytes(chacha_ctx *x, const u8 *m, u8 *c, unsigned long long bytes) -{ - u32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15; - u32 j0, j1, j2, j3, j4, j5, j6, j7, j8, j9, j10, j11, j12, j13, j14, j15; - u8 *ctarget = NULL; - u8 tmp[64]; - unsigned int i; - - if (!bytes) { - return; /* LCOV_EXCL_LINE */ - } - j0 = x->input[0]; - j1 = x->input[1]; - j2 = x->input[2]; - j3 = x->input[3]; - j4 = x->input[4]; - j5 = x->input[5]; - j6 = x->input[6]; - j7 = x->input[7]; - j8 = x->input[8]; - j9 = x->input[9]; - j10 = x->input[10]; - j11 = x->input[11]; - j12 = x->input[12]; - j13 = x->input[13]; - j14 = x->input[14]; - j15 = x->input[15]; - - for (;;) { - if (bytes < 64) { - for (i = 0; i < bytes; ++i) { - tmp[i] = m[i]; - } - m = tmp; - ctarget = c; - c = tmp; - } - x0 = j0; - x1 = j1; - x2 = j2; - x3 = j3; - x4 = j4; - x5 = j5; - x6 = j6; - x7 = j7; - x8 = j8; - x9 = j9; - x10 = j10; - x11 = j11; - x12 = j12; - x13 = j13; - x14 = j14; - x15 = j15; - for (i = 20; i > 0; i -= 2) { - QUARTERROUND(x0, x4, x8, x12) - QUARTERROUND(x1, x5, x9, x13) - QUARTERROUND(x2, x6, x10, x14) - QUARTERROUND(x3, x7, x11, x15) - QUARTERROUND(x0, x5, x10, x15) - QUARTERROUND(x1, x6, x11, x12) - QUARTERROUND(x2, x7, x8, x13) - QUARTERROUND(x3, x4, x9, x14) - } - x0 = PLUS(x0, j0); - x1 = PLUS(x1, j1); - x2 = PLUS(x2, j2); - x3 = PLUS(x3, j3); - x4 = PLUS(x4, j4); - x5 = PLUS(x5, j5); - x6 = PLUS(x6, j6); - x7 = PLUS(x7, j7); - x8 = PLUS(x8, j8); - x9 = PLUS(x9, j9); - x10 = PLUS(x10, j10); - x11 = PLUS(x11, j11); - x12 = PLUS(x12, j12); - x13 = PLUS(x13, j13); - x14 = PLUS(x14, j14); - x15 = PLUS(x15, j15); - - x0 = XOR(x0, U8TO32_LITTLE(m + 0)); - x1 = XOR(x1, U8TO32_LITTLE(m + 4)); - x2 = XOR(x2, U8TO32_LITTLE(m + 8)); - x3 = XOR(x3, U8TO32_LITTLE(m + 12)); - x4 = XOR(x4, U8TO32_LITTLE(m + 16)); - x5 = XOR(x5, U8TO32_LITTLE(m + 20)); - x6 = XOR(x6, U8TO32_LITTLE(m + 24)); - x7 = XOR(x7, U8TO32_LITTLE(m + 28)); - x8 = XOR(x8, U8TO32_LITTLE(m + 32)); - x9 = XOR(x9, U8TO32_LITTLE(m + 36)); - x10 = XOR(x10, U8TO32_LITTLE(m + 40)); - x11 = XOR(x11, U8TO32_LITTLE(m + 44)); - x12 = XOR(x12, U8TO32_LITTLE(m + 48)); - x13 = XOR(x13, U8TO32_LITTLE(m + 52)); - x14 = XOR(x14, U8TO32_LITTLE(m + 56)); - x15 = XOR(x15, U8TO32_LITTLE(m + 60)); - - j12 = PLUSONE(j12); - /* LCOV_EXCL_START */ - if (!j12) { - j13 = PLUSONE(j13); - } - /* LCOV_EXCL_STOP */ - - U32TO8_LITTLE(c + 0, x0); - U32TO8_LITTLE(c + 4, x1); - U32TO8_LITTLE(c + 8, x2); - U32TO8_LITTLE(c + 12, x3); - U32TO8_LITTLE(c + 16, x4); - U32TO8_LITTLE(c + 20, x5); - U32TO8_LITTLE(c + 24, x6); - U32TO8_LITTLE(c + 28, x7); - U32TO8_LITTLE(c + 32, x8); - U32TO8_LITTLE(c + 36, x9); - U32TO8_LITTLE(c + 40, x10); - U32TO8_LITTLE(c + 44, x11); - U32TO8_LITTLE(c + 48, x12); - U32TO8_LITTLE(c + 52, x13); - U32TO8_LITTLE(c + 56, x14); - U32TO8_LITTLE(c + 60, x15); - - if (bytes <= 64) { - if (bytes < 64) { - for (i = 0; i < (unsigned int) bytes; ++i) { - ctarget[i] = c[i]; - } - } - x->input[12] = j12; - x->input[13] = j13; - return; - } - bytes -= 64; - c += 64; - m += 64; - } -} - -int -crypto_stream_chacha20_ref(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k) -{ - struct chacha_ctx ctx; - - if (!clen) { - return 0; - } - (void) sizeof(int[crypto_stream_chacha20_KEYBYTES == 256 / 8 ? 1 : -1]); - chacha_keysetup(&ctx, k); - chacha_ivsetup(&ctx, n, NULL); - memset(c, 0, clen); - chacha_encrypt_bytes(&ctx, c, c, clen); - sodium_memzero(&ctx, sizeof ctx); - - return 0; -} - -int -crypto_stream_chacha20_ref_xor_ic(unsigned char *c, const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k) -{ - struct chacha_ctx ctx; - uint8_t ic_bytes[8]; - uint32_t ic_high; - uint32_t ic_low; - - if (!mlen) { - return 0; - } - ic_high = U32V(ic >> 32); - ic_low = U32V(ic); - U32TO8_LITTLE(&ic_bytes[0], ic_low); - U32TO8_LITTLE(&ic_bytes[4], ic_high); - chacha_keysetup(&ctx, k); - chacha_ivsetup(&ctx, n, ic_bytes); - chacha_encrypt_bytes(&ctx, m, c, mlen); - sodium_memzero(&ctx, sizeof ctx); - sodium_memzero(ic_bytes, sizeof ic_bytes); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/chacha20/stream_chacha20_api.c b/Pods/libsodium/src/libsodium/crypto_stream/chacha20/stream_chacha20_api.c deleted file mode 100644 index 412cdfa..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/chacha20/stream_chacha20_api.c +++ /dev/null @@ -1,36 +0,0 @@ -#include "crypto_stream_chacha20.h" -#include "ref/api.h" - -size_t -crypto_stream_chacha20_keybytes(void) { - return crypto_stream_chacha20_KEYBYTES; -} - -size_t -crypto_stream_chacha20_noncebytes(void) { - return crypto_stream_chacha20_NONCEBYTES; -} - -int -crypto_stream_chacha20(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k) -{ - return crypto_stream_chacha20_ref(c, clen, n, k); -} - -int -crypto_stream_chacha20_xor_ic(unsigned char *c, const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k) -{ - return crypto_stream_chacha20_ref_xor_ic(c, m, mlen, n, ic, k); -} - -int -crypto_stream_chacha20_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_stream_chacha20_ref_xor_ic(c, m, mlen, n, 0U, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/crypto_stream.c b/Pods/libsodium/src/libsodium/crypto_stream/crypto_stream.c deleted file mode 100644 index 50a9c1c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/crypto_stream.c +++ /dev/null @@ -1,36 +0,0 @@ - -#include "crypto_stream.h" - -size_t -crypto_stream_keybytes(void) -{ - return crypto_stream_KEYBYTES; -} - -size_t -crypto_stream_noncebytes(void) -{ - return crypto_stream_NONCEBYTES; -} - -const char * -crypto_stream_primitive(void) -{ - return crypto_stream_PRIMITIVE; -} - -int -crypto_stream(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k) -{ - return crypto_stream_xsalsa20(c, clen, n, k); -} - - -int -crypto_stream_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_stream_xsalsa20_xor(c, m, mlen, n, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/amd64_xmm6/api.h b/Pods/libsodium/src/libsodium/crypto_stream/salsa20/amd64_xmm6/api.h deleted file mode 100644 index 037fb59..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/amd64_xmm6/api.h +++ /dev/null @@ -1 +0,0 @@ -#include "crypto_stream_salsa20.h" diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/api.h b/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/api.h deleted file mode 100644 index 3616ea7..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/api.h +++ /dev/null @@ -1,5 +0,0 @@ - -#include "crypto_stream_salsa20.h" - -#define crypto_stream crypto_stream_salsa20 -#define crypto_stream_xor crypto_stream_salsa20_xor diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/stream_salsa20_ref.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/stream_salsa20_ref.c deleted file mode 100644 index b90827c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/stream_salsa20_ref.c +++ /dev/null @@ -1,61 +0,0 @@ -/* -version 20140420 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_salsa20.h" -#include "utils.h" - -#ifndef HAVE_AMD64_ASM - -typedef unsigned int uint32; - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream( - unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - unsigned char in[16]; - unsigned char block[64]; - unsigned char kcopy[32]; - unsigned int i; - unsigned int u; - - if (!clen) return 0; - - for (i = 0;i < 32;++i) kcopy[i] = k[i]; - for (i = 0;i < 8;++i) in[i] = n[i]; - for (i = 8;i < 16;++i) in[i] = 0; - - while (clen >= 64) { - crypto_core_salsa20(c,in,kcopy,sigma); - - u = 1; - for (i = 8;i < 16;++i) { - u += (unsigned int) in[i]; - in[i] = u; - u >>= 8; - } - - clen -= 64; - c += 64; - } - - if (clen) { - crypto_core_salsa20(block,in,kcopy,sigma); - for (i = 0;i < (unsigned int) clen;++i) c[i] = block[i]; - } - sodium_memzero(block, sizeof block); - sodium_memzero(kcopy, sizeof kcopy); - - return 0; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/xor_salsa20_ref.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/xor_salsa20_ref.c deleted file mode 100644 index 27cf147..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/ref/xor_salsa20_ref.c +++ /dev/null @@ -1,69 +0,0 @@ -/* -version 20140420 -D. J. Bernstein -Public domain. -*/ - -#include - -#include "api.h" -#include "crypto_core_salsa20.h" -#include "utils.h" - -#ifndef HAVE_AMD64_ASM - -typedef unsigned int uint32; - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream_salsa20_xor_ic( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k -) -{ - unsigned char in[16]; - unsigned char block[64]; - unsigned char kcopy[32]; - unsigned int i; - unsigned int u; - - if (!mlen) return 0; - - for (i = 0;i < 32;++i) kcopy[i] = k[i]; - for (i = 0;i < 8;++i) in[i] = n[i]; - for (i = 8;i < 16;++i) { - in[i] = (unsigned char) (ic & 0xff); - ic >>= 8; - } - - while (mlen >= 64) { - crypto_core_salsa20(block,in,kcopy,sigma); - for (i = 0;i < 64;++i) c[i] = m[i] ^ block[i]; - - u = 1; - for (i = 8;i < 16;++i) { - u += (unsigned int) in[i]; - in[i] = u; - u >>= 8; - } - - mlen -= 64; - c += 64; - m += 64; - } - - if (mlen) { - crypto_core_salsa20(block,in,kcopy,sigma); - for (i = 0;i < (unsigned int) mlen;++i) c[i] = m[i] ^ block[i]; - } - sodium_memzero(block, sizeof block); - sodium_memzero(kcopy, sizeof kcopy); - - return 0; -} - -#endif diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/stream_salsa20_api.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa20/stream_salsa20_api.c deleted file mode 100644 index 3bc0580..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa20/stream_salsa20_api.c +++ /dev/null @@ -1,19 +0,0 @@ -#include "crypto_stream_salsa20.h" - -size_t -crypto_stream_salsa20_keybytes(void) { - return crypto_stream_salsa20_KEYBYTES; -} - -size_t -crypto_stream_salsa20_noncebytes(void) { - return crypto_stream_salsa20_NONCEBYTES; -} - -int -crypto_stream_salsa20_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k) -{ - return crypto_stream_salsa20_xor_ic(c, m, mlen, n, 0U, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/api.h b/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/api.h deleted file mode 100644 index 0efe8b8..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/api.h +++ /dev/null @@ -1,10 +0,0 @@ - -#include "crypto_stream_salsa2012.h" - -#define crypto_stream crypto_stream_salsa2012 -#define crypto_stream_xor crypto_stream_salsa2012_xor -#define crypto_stream_KEYBYTES crypto_stream_salsa2012_KEYBYTES -#define crypto_stream_NONCEBYTES crypto_stream_salsa2012_NONCEBYTES -#define crypto_stream_IMPLEMENTATION crypto_stream_salsa2012_IMPLEMENTATION -#define crypto_stream_VERSION crypto_stream_salsa2012_VERSION - diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/stream_salsa2012.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/stream_salsa2012.c deleted file mode 100644 index ef12123..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/stream_salsa2012.c +++ /dev/null @@ -1,57 +0,0 @@ -/* -version 20140420 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_salsa2012.h" -#include "utils.h" - -typedef unsigned int uint32; - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream( - unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - unsigned char in[16]; - unsigned char block[64]; - unsigned char kcopy[32]; - unsigned int i; - unsigned int u; - - if (!clen) return 0; - - for (i = 0;i < 32;++i) kcopy[i] = k[i]; - for (i = 0;i < 8;++i) in[i] = n[i]; - for (i = 8;i < 16;++i) in[i] = 0; - - while (clen >= 64) { - crypto_core_salsa2012(c,in,kcopy,sigma); - - u = 1; - for (i = 8;i < 16;++i) { - u += (unsigned int) in[i]; - in[i] = u; - u >>= 8; - } - - clen -= 64; - c += 64; - } - - if (clen) { - crypto_core_salsa2012(block,in,kcopy,sigma); - for (i = 0;i < (unsigned int) clen;++i) c[i] = block[i]; - } - sodium_memzero(block, sizeof block); - sodium_memzero(kcopy, sizeof kcopy); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/xor_salsa2012.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/xor_salsa2012.c deleted file mode 100644 index 132a720..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/ref/xor_salsa2012.c +++ /dev/null @@ -1,60 +0,0 @@ -/* -version 20140420 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_salsa2012.h" -#include "utils.h" - -typedef unsigned int uint32; - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream_xor( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -) -{ - unsigned char in[16]; - unsigned char block[64]; - unsigned char kcopy[32]; - unsigned int i; - unsigned int u; - - if (!mlen) return 0; - - for (i = 0;i < 32;++i) kcopy[i] = k[i]; - for (i = 0;i < 8;++i) in[i] = n[i]; - for (i = 8;i < 16;++i) in[i] = 0; - - while (mlen >= 64) { - crypto_core_salsa2012(block,in,kcopy,sigma); - for (i = 0;i < 64;++i) c[i] = m[i] ^ block[i]; - - u = 1; - for (i = 8;i < 16;++i) { - u += (unsigned int) in[i]; - in[i] = u; - u >>= 8; - } - - mlen -= 64; - c += 64; - m += 64; - } - - if (mlen) { - crypto_core_salsa2012(block,in,kcopy,sigma); - for (i = 0;i < (unsigned int) mlen;++i) c[i] = m[i] ^ block[i]; - } - sodium_memzero(block, sizeof block); - sodium_memzero(kcopy, sizeof kcopy); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/stream_salsa2012_api.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/stream_salsa2012_api.c deleted file mode 100644 index 3b5685f..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa2012/stream_salsa2012_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_stream_salsa2012.h" - -size_t -crypto_stream_salsa2012_keybytes(void) { - return crypto_stream_salsa2012_KEYBYTES; -} - -size_t -crypto_stream_salsa2012_noncebytes(void) { - return crypto_stream_salsa2012_NONCEBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/api.h b/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/api.h deleted file mode 100644 index 14b4a77..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/api.h +++ /dev/null @@ -1,9 +0,0 @@ - -#include "crypto_stream_salsa208.h" - -#define crypto_stream crypto_stream_salsa208 -#define crypto_stream_xor crypto_stream_salsa208_xor -#define crypto_stream_KEYBYTES crypto_stream_salsa208_KEYBYTES -#define crypto_stream_NONCEBYTES crypto_stream_salsa208_NONCEBYTES -#define crypto_stream_IMPLEMENTATION crypto_stream_salsa208_IMPLEMENTATION -#define crypto_stream_VERSION crypto_stream_salsa208_VERSION diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/stream_salsa208.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/stream_salsa208.c deleted file mode 100644 index 6a15ff1..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/stream_salsa208.c +++ /dev/null @@ -1,57 +0,0 @@ -/* -version 20140420 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_salsa208.h" -#include "utils.h" - -typedef unsigned int uint32; - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream( - unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - unsigned char in[16]; - unsigned char block[64]; - unsigned char kcopy[32]; - unsigned int i; - unsigned int u; - - if (!clen) return 0; - - for (i = 0;i < 32;++i) kcopy[i] = k[i]; - for (i = 0;i < 8;++i) in[i] = n[i]; - for (i = 8;i < 16;++i) in[i] = 0; - - while (clen >= 64) { - crypto_core_salsa208(c,in,kcopy,sigma); - - u = 1; - for (i = 8;i < 16;++i) { - u += (unsigned int) in[i]; - in[i] = u; - u >>= 8; - } - - clen -= 64; - c += 64; - } - - if (clen) { - crypto_core_salsa208(block,in,kcopy,sigma); - for (i = 0;i < (unsigned int) clen;++i) c[i] = block[i]; - } - sodium_memzero(block, sizeof block); - sodium_memzero(kcopy, sizeof kcopy); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/xor_salsa208.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/xor_salsa208.c deleted file mode 100644 index de0eae9..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/ref/xor_salsa208.c +++ /dev/null @@ -1,60 +0,0 @@ -/* -version 20140420 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_salsa208.h" -#include "utils.h" - -typedef unsigned int uint32; - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream_xor( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -) -{ - unsigned char in[16]; - unsigned char block[64]; - unsigned char kcopy[32]; - unsigned int i; - unsigned int u; - - if (!mlen) return 0; - - for (i = 0;i < 32;++i) kcopy[i] = k[i]; - for (i = 0;i < 8;++i) in[i] = n[i]; - for (i = 8;i < 16;++i) in[i] = 0; - - while (mlen >= 64) { - crypto_core_salsa208(block,in,kcopy,sigma); - for (i = 0;i < 64;++i) c[i] = m[i] ^ block[i]; - - u = 1; - for (i = 8;i < 16;++i) { - u += (unsigned int) in[i]; - in[i] = u; - u >>= 8; - } - - mlen -= 64; - c += 64; - m += 64; - } - - if (mlen) { - crypto_core_salsa208(block,in,kcopy,sigma); - for (i = 0;i < (unsigned int) mlen;++i) c[i] = m[i] ^ block[i]; - } - sodium_memzero(block, sizeof block); - sodium_memzero(kcopy, sizeof kcopy); - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/stream_salsa208_api.c b/Pods/libsodium/src/libsodium/crypto_stream/salsa208/stream_salsa208_api.c deleted file mode 100644 index 640a8b2..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/salsa208/stream_salsa208_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_stream_salsa208.h" - -size_t -crypto_stream_salsa208_keybytes(void) { - return crypto_stream_salsa208_KEYBYTES; -} - -size_t -crypto_stream_salsa208_noncebytes(void) { - return crypto_stream_salsa208_NONCEBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/api.h b/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/api.h deleted file mode 100644 index 1812709..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/api.h +++ /dev/null @@ -1,11 +0,0 @@ - -#include "crypto_stream_xsalsa20.h" - -#define crypto_stream crypto_stream_xsalsa20 -#define crypto_stream_xor_ic crypto_stream_xsalsa20_xor_ic -#define crypto_stream_xor crypto_stream_xsalsa20_xor -#define crypto_stream_KEYBYTES crypto_stream_xsalsa20_KEYBYTES -#define crypto_stream_NONCEBYTES crypto_stream_xsalsa20_NONCEBYTES -#define crypto_stream_IMPLEMENTATION crypto_stream_xsalsa20_IMPLEMENTATION -#define crypto_stream_VERSION crypto_stream_xsalsa20_VERSION - diff --git a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/stream_xsalsa20.c b/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/stream_xsalsa20.c deleted file mode 100644 index 64e42cb..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/stream_xsalsa20.c +++ /dev/null @@ -1,28 +0,0 @@ -/* -version 20080914 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_hsalsa20.h" -#include "crypto_stream_salsa20.h" -#include "utils.h" - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream( - unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - unsigned char subkey[32]; - int ret; - crypto_core_hsalsa20(subkey,n,k,sigma); - ret = crypto_stream_salsa20(c,clen,n + 16,subkey); - sodium_memzero(subkey, sizeof subkey); - return ret; -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/xor_xsalsa20.c b/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/xor_xsalsa20.c deleted file mode 100644 index 4dd2fad..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/ref/xor_xsalsa20.c +++ /dev/null @@ -1,39 +0,0 @@ -/* -version 20080913 -D. J. Bernstein -Public domain. -*/ - -#include "api.h" -#include "crypto_core_hsalsa20.h" -#include "crypto_stream_salsa20.h" -#include "utils.h" - -static const unsigned char sigma[16] = { - 'e', 'x', 'p', 'a', 'n', 'd', ' ', '3', '2', '-', 'b', 'y', 't', 'e', ' ', 'k' -}; - -int crypto_stream_xor_ic( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n,uint64_t ic, - const unsigned char *k -) -{ - unsigned char subkey[32]; - int ret; - crypto_core_hsalsa20(subkey,n,k,sigma); - ret = crypto_stream_salsa20_xor_ic(c,m,mlen,n + 16,ic,subkey); - sodium_memzero(subkey, sizeof subkey); - return ret; -} - -int crypto_stream_xor( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -) -{ - return crypto_stream_xor_ic(c, m, mlen, n, 0ULL, k); -} diff --git a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/stream_xsalsa20_api.c b/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/stream_xsalsa20_api.c deleted file mode 100644 index 256084e..0000000 --- a/Pods/libsodium/src/libsodium/crypto_stream/xsalsa20/stream_xsalsa20_api.c +++ /dev/null @@ -1,11 +0,0 @@ -#include "crypto_stream_xsalsa20.h" - -size_t -crypto_stream_xsalsa20_keybytes(void) { - return crypto_stream_xsalsa20_KEYBYTES; -} - -size_t -crypto_stream_xsalsa20_noncebytes(void) { - return crypto_stream_xsalsa20_NONCEBYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_verify/16/ref/api.h b/Pods/libsodium/src/libsodium/crypto_verify/16/ref/api.h deleted file mode 100644 index 8dcaf87..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/16/ref/api.h +++ /dev/null @@ -1,2 +0,0 @@ - -#include "crypto_verify_16.h" diff --git a/Pods/libsodium/src/libsodium/crypto_verify/16/ref/verify_16.c b/Pods/libsodium/src/libsodium/crypto_verify/16/ref/verify_16.c deleted file mode 100644 index f7e33f1..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/16/ref/verify_16.c +++ /dev/null @@ -1,24 +0,0 @@ -#include "api.h" - -int crypto_verify_16(const unsigned char *x,const unsigned char *y) -{ - unsigned int differentbits = 0; -#define F(i) differentbits |= x[i] ^ y[i]; - F(0) - F(1) - F(2) - F(3) - F(4) - F(5) - F(6) - F(7) - F(8) - F(9) - F(10) - F(11) - F(12) - F(13) - F(14) - F(15) - return (1 & ((differentbits - 1) >> 8)) - 1; -} diff --git a/Pods/libsodium/src/libsodium/crypto_verify/16/verify_16_api.c b/Pods/libsodium/src/libsodium/crypto_verify/16/verify_16_api.c deleted file mode 100644 index 757f9b6..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/16/verify_16_api.c +++ /dev/null @@ -1,6 +0,0 @@ -#include "crypto_verify_16.h" - -size_t -crypto_verify_16_bytes(void) { - return crypto_verify_16_BYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_verify/32/ref/api.h b/Pods/libsodium/src/libsodium/crypto_verify/32/ref/api.h deleted file mode 100644 index e2e3a1c..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/32/ref/api.h +++ /dev/null @@ -1,2 +0,0 @@ - -#include "crypto_verify_32.h" diff --git a/Pods/libsodium/src/libsodium/crypto_verify/32/ref/verify_32.c b/Pods/libsodium/src/libsodium/crypto_verify/32/ref/verify_32.c deleted file mode 100644 index 31c3697..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/32/ref/verify_32.c +++ /dev/null @@ -1,40 +0,0 @@ -#include "api.h" - -int crypto_verify_32(const unsigned char *x,const unsigned char *y) -{ - unsigned int differentbits = 0; -#define F(i) differentbits |= x[i] ^ y[i]; - F(0) - F(1) - F(2) - F(3) - F(4) - F(5) - F(6) - F(7) - F(8) - F(9) - F(10) - F(11) - F(12) - F(13) - F(14) - F(15) - F(16) - F(17) - F(18) - F(19) - F(20) - F(21) - F(22) - F(23) - F(24) - F(25) - F(26) - F(27) - F(28) - F(29) - F(30) - F(31) - return (1 & ((differentbits - 1) >> 8)) - 1; -} diff --git a/Pods/libsodium/src/libsodium/crypto_verify/32/verify_32_api.c b/Pods/libsodium/src/libsodium/crypto_verify/32/verify_32_api.c deleted file mode 100644 index 6241c4d..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/32/verify_32_api.c +++ /dev/null @@ -1,6 +0,0 @@ -#include "crypto_verify_32.h" - -size_t -crypto_verify_32_bytes(void) { - return crypto_verify_32_BYTES; -} diff --git a/Pods/libsodium/src/libsodium/crypto_verify/64/ref/api.h b/Pods/libsodium/src/libsodium/crypto_verify/64/ref/api.h deleted file mode 100644 index 1ffd2f8..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/64/ref/api.h +++ /dev/null @@ -1,2 +0,0 @@ - -#include "crypto_verify_64.h" diff --git a/Pods/libsodium/src/libsodium/crypto_verify/64/ref/verify_64.c b/Pods/libsodium/src/libsodium/crypto_verify/64/ref/verify_64.c deleted file mode 100644 index 730f598..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/64/ref/verify_64.c +++ /dev/null @@ -1,72 +0,0 @@ -#include "api.h" - -int crypto_verify_64(const unsigned char *x,const unsigned char *y) -{ - unsigned int differentbits = 0; -#define F(i) differentbits |= x[i] ^ y[i]; - F(0) - F(1) - F(2) - F(3) - F(4) - F(5) - F(6) - F(7) - F(8) - F(9) - F(10) - F(11) - F(12) - F(13) - F(14) - F(15) - F(16) - F(17) - F(18) - F(19) - F(20) - F(21) - F(22) - F(23) - F(24) - F(25) - F(26) - F(27) - F(28) - F(29) - F(30) - F(31) - F(32) - F(33) - F(34) - F(35) - F(36) - F(37) - F(38) - F(39) - F(40) - F(41) - F(42) - F(43) - F(44) - F(45) - F(46) - F(47) - F(48) - F(49) - F(50) - F(51) - F(52) - F(53) - F(54) - F(55) - F(56) - F(57) - F(58) - F(59) - F(60) - F(61) - F(62) - F(63) - return (1 & ((differentbits - 1) >> 8)) - 1; -} diff --git a/Pods/libsodium/src/libsodium/crypto_verify/64/verify_64_api.c b/Pods/libsodium/src/libsodium/crypto_verify/64/verify_64_api.c deleted file mode 100644 index ec3e4d4..0000000 --- a/Pods/libsodium/src/libsodium/crypto_verify/64/verify_64_api.c +++ /dev/null @@ -1,6 +0,0 @@ -#include "crypto_verify_64.h" - -size_t -crypto_verify_64_bytes(void) { - return crypto_verify_64_BYTES; -} diff --git a/Pods/libsodium/src/libsodium/include/sodium.h b/Pods/libsodium/src/libsodium/include/sodium.h deleted file mode 100644 index 207bded..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium.h +++ /dev/null @@ -1,50 +0,0 @@ - -#ifndef sodium_H -#define sodium_H - -#include "sodium/core.h" -#include "sodium/crypto_aead_chacha20poly1305.h" -#include "sodium/crypto_auth.h" -#include "sodium/crypto_auth_hmacsha256.h" -#include "sodium/crypto_auth_hmacsha512.h" -#include "sodium/crypto_auth_hmacsha512256.h" -#include "sodium/crypto_box.h" -#include "sodium/crypto_box_curve25519xsalsa20poly1305.h" -#include "sodium/crypto_core_hsalsa20.h" -#include "sodium/crypto_core_salsa20.h" -#include "sodium/crypto_core_salsa2012.h" -#include "sodium/crypto_core_salsa208.h" -#include "sodium/crypto_generichash.h" -#include "sodium/crypto_generichash_blake2b.h" -#include "sodium/crypto_hash.h" -#include "sodium/crypto_hash_sha256.h" -#include "sodium/crypto_hash_sha512.h" -#include "sodium/crypto_onetimeauth.h" -#include "sodium/crypto_onetimeauth_poly1305.h" -#include "sodium/crypto_pwhash_scryptsalsa208sha256.h" -#include "sodium/crypto_scalarmult.h" -#include "sodium/crypto_scalarmult_curve25519.h" -#include "sodium/crypto_secretbox.h" -#include "sodium/crypto_secretbox_xsalsa20poly1305.h" -#include "sodium/crypto_shorthash.h" -#include "sodium/crypto_shorthash_siphash24.h" -#include "sodium/crypto_sign.h" -#include "sodium/crypto_sign_ed25519.h" -#include "sodium/crypto_stream.h" -#include "sodium/crypto_stream_aes128ctr.h" -#include "sodium/crypto_stream_chacha20.h" -#include "sodium/crypto_stream_salsa20.h" -#include "sodium/crypto_stream_salsa2012.h" -#include "sodium/crypto_stream_salsa208.h" -#include "sodium/crypto_stream_xsalsa20.h" -#include "sodium/crypto_verify_16.h" -#include "sodium/crypto_verify_32.h" -#include "sodium/crypto_verify_64.h" -#include "sodium/randombytes.h" -#include "sodium/randombytes_salsa20_random.h" -#include "sodium/randombytes_sysrandom.h" -#include "sodium/runtime.h" -#include "sodium/utils.h" -#include "sodium/version.h" - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/core.h b/Pods/libsodium/src/libsodium/include/sodium/core.h deleted file mode 100644 index 7faa983..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/core.h +++ /dev/null @@ -1,18 +0,0 @@ - -#ifndef sodium_core_H -#define sodium_core_H - -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -SODIUM_EXPORT -int sodium_init(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_aead_chacha20poly1305.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_aead_chacha20poly1305.h deleted file mode 100644 index b36807c..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_aead_chacha20poly1305.h +++ /dev/null @@ -1,55 +0,0 @@ -#ifndef crypto_aead_chacha20poly1305_H -#define crypto_aead_chacha20poly1305_H - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_aead_chacha20poly1305_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_aead_chacha20poly1305_keybytes(void); - -#define crypto_aead_chacha20poly1305_NSECBYTES 0U -SODIUM_EXPORT -size_t crypto_aead_chacha20poly1305_nsecbytes(void); - -#define crypto_aead_chacha20poly1305_NPUBBYTES 8U -SODIUM_EXPORT -size_t crypto_aead_chacha20poly1305_npubbytes(void); - -#define crypto_aead_chacha20poly1305_ABYTES 16U -SODIUM_EXPORT -size_t crypto_aead_chacha20poly1305_abytes(void); - -SODIUM_EXPORT -int crypto_aead_chacha20poly1305_encrypt(unsigned char *c, - unsigned long long *clen, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *ad, - unsigned long long adlen, - const unsigned char *nsec, - const unsigned char *npub, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_aead_chacha20poly1305_decrypt(unsigned char *m, - unsigned long long *mlen, - unsigned char *nsec, - const unsigned char *c, - unsigned long long clen, - const unsigned char *ad, - unsigned long long adlen, - const unsigned char *npub, - const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_auth.h deleted file mode 100644 index 1c8d22e..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth.h +++ /dev/null @@ -1,39 +0,0 @@ -#ifndef crypto_auth_H -#define crypto_auth_H - -#include - -#include "crypto_auth_hmacsha512256.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_auth_BYTES crypto_auth_hmacsha512256_BYTES -SODIUM_EXPORT -size_t crypto_auth_bytes(void); - -#define crypto_auth_KEYBYTES crypto_auth_hmacsha512256_KEYBYTES -SODIUM_EXPORT -size_t crypto_auth_keybytes(void); - -#define crypto_auth_PRIMITIVE "hmacsha512256" -SODIUM_EXPORT -const char *crypto_auth_primitive(void); - -SODIUM_EXPORT -int crypto_auth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k); - -SODIUM_EXPORT -int crypto_auth_verify(const unsigned char *h, const unsigned char *in, - unsigned long long inlen, const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha256.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha256.h deleted file mode 100644 index b74e1d7..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha256.h +++ /dev/null @@ -1,62 +0,0 @@ -#ifndef crypto_auth_hmacsha256_H -#define crypto_auth_hmacsha256_H - -#include -#include "crypto_hash_sha256.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_auth_hmacsha256_BYTES 32U -SODIUM_EXPORT -size_t crypto_auth_hmacsha256_bytes(void); - -#define crypto_auth_hmacsha256_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_auth_hmacsha256_keybytes(void); - -SODIUM_EXPORT -int crypto_auth_hmacsha256(unsigned char *out, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_auth_hmacsha256_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -/* ------------------------------------------------------------------------- */ - -typedef struct crypto_auth_hmacsha256_state { - crypto_hash_sha256_state ictx; - crypto_hash_sha256_state octx; -} crypto_auth_hmacsha256_state; -SODIUM_EXPORT -size_t crypto_auth_hmacsha256_statebytes(void); - -SODIUM_EXPORT -int crypto_auth_hmacsha256_init(crypto_auth_hmacsha256_state *state, - const unsigned char *key, - size_t keylen); - -SODIUM_EXPORT -int crypto_auth_hmacsha256_update(crypto_auth_hmacsha256_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_auth_hmacsha256_final(crypto_auth_hmacsha256_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512.h deleted file mode 100644 index ff36b9a..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512.h +++ /dev/null @@ -1,62 +0,0 @@ -#ifndef crypto_auth_hmacsha512_H -#define crypto_auth_hmacsha512_H - -#include -#include "crypto_hash_sha512.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_auth_hmacsha512_BYTES 64U -SODIUM_EXPORT -size_t crypto_auth_hmacsha512_bytes(void); - -#define crypto_auth_hmacsha512_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_auth_hmacsha512_keybytes(void); - -SODIUM_EXPORT -int crypto_auth_hmacsha512(unsigned char *out, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_auth_hmacsha512_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -/* ------------------------------------------------------------------------- */ - -typedef struct crypto_auth_hmacsha512_state { - crypto_hash_sha512_state ictx; - crypto_hash_sha512_state octx; -} crypto_auth_hmacsha512_state; -SODIUM_EXPORT -size_t crypto_auth_hmacsha512_statebytes(void); - -SODIUM_EXPORT -int crypto_auth_hmacsha512_init(crypto_auth_hmacsha512_state *state, - const unsigned char *key, - size_t keylen); - -SODIUM_EXPORT -int crypto_auth_hmacsha512_update(crypto_auth_hmacsha512_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_auth_hmacsha512_final(crypto_auth_hmacsha512_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512256.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512256.h deleted file mode 100644 index da05e38..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_auth_hmacsha512256.h +++ /dev/null @@ -1,57 +0,0 @@ -#ifndef crypto_auth_hmacsha512256_H -#define crypto_auth_hmacsha512256_H - -#include -#include "crypto_auth_hmacsha512.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_auth_hmacsha512256_BYTES 32U -SODIUM_EXPORT -size_t crypto_auth_hmacsha512256_bytes(void); - -#define crypto_auth_hmacsha512256_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_auth_hmacsha512256_keybytes(void); - -SODIUM_EXPORT -int crypto_auth_hmacsha512256(unsigned char *out, const unsigned char *in, - unsigned long long inlen,const unsigned char *k); - -SODIUM_EXPORT -int crypto_auth_hmacsha512256_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -/* ------------------------------------------------------------------------- */ - -typedef crypto_auth_hmacsha512_state crypto_auth_hmacsha512256_state; -SODIUM_EXPORT -size_t crypto_auth_hmacsha512256_statebytes(void); - -SODIUM_EXPORT -int crypto_auth_hmacsha512256_init(crypto_auth_hmacsha512256_state *state, - const unsigned char *key, - size_t keylen); - -SODIUM_EXPORT -int crypto_auth_hmacsha512256_update(crypto_auth_hmacsha512256_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_auth_hmacsha512256_final(crypto_auth_hmacsha512256_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_box.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_box.h deleted file mode 100644 index 827d109..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_box.h +++ /dev/null @@ -1,157 +0,0 @@ -#ifndef crypto_box_H -#define crypto_box_H - -/* - * THREAD SAFETY: crypto_box_keypair() is thread-safe, - * provided that you called sodium_init() once before using any - * other libsodium function. - * Other functions are always thread-safe. - */ - -#include - -#include "crypto_box_curve25519xsalsa20poly1305.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_box_SEEDBYTES crypto_box_curve25519xsalsa20poly1305_SEEDBYTES -SODIUM_EXPORT -size_t crypto_box_seedbytes(void); - -#define crypto_box_PUBLICKEYBYTES crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES -SODIUM_EXPORT -size_t crypto_box_publickeybytes(void); - -#define crypto_box_SECRETKEYBYTES crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES -SODIUM_EXPORT -size_t crypto_box_secretkeybytes(void); - -#define crypto_box_NONCEBYTES crypto_box_curve25519xsalsa20poly1305_NONCEBYTES -SODIUM_EXPORT -size_t crypto_box_noncebytes(void); - -#define crypto_box_MACBYTES crypto_box_curve25519xsalsa20poly1305_MACBYTES -SODIUM_EXPORT -size_t crypto_box_macbytes(void); - -#define crypto_box_PRIMITIVE "curve25519xsalsa20poly1305" -SODIUM_EXPORT -const char *crypto_box_primitive(void); - -SODIUM_EXPORT -int crypto_box_seed_keypair(unsigned char *pk, unsigned char *sk, - const unsigned char *seed); - -SODIUM_EXPORT -int crypto_box_keypair(unsigned char *pk, unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_easy(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_open_easy(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_detached(unsigned char *c, unsigned char *mac, - const unsigned char *m, unsigned long long mlen, - const unsigned char *n, const unsigned char *pk, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_open_detached(unsigned char *m, const unsigned char *c, - const unsigned char *mac, - unsigned long long clen, - const unsigned char *n, - const unsigned char *pk, - const unsigned char *sk); - -/* -- Precomputation interface -- */ - -#define crypto_box_BEFORENMBYTES crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES -SODIUM_EXPORT -size_t crypto_box_beforenmbytes(void); - -SODIUM_EXPORT -int crypto_box_beforenm(unsigned char *k, const unsigned char *pk, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_easy_afternm(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_box_open_easy_afternm(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_box_detached_afternm(unsigned char *c, unsigned char *mac, - const unsigned char *m, unsigned long long mlen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_box_open_detached_afternm(unsigned char *m, const unsigned char *c, - const unsigned char *mac, - unsigned long long clen, const unsigned char *n, - const unsigned char *k); - -/* -- Ephemeral SK interface -- */ - -#define crypto_box_SEALBYTES (crypto_box_PUBLICKEYBYTES + crypto_box_MACBYTES) -SODIUM_EXPORT -size_t crypto_box_sealbytes(void); - -SODIUM_EXPORT -int crypto_box_seal(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *pk); - -SODIUM_EXPORT -int crypto_box_seal_open(unsigned char *m, const unsigned char *c, - unsigned long long clen, - const unsigned char *pk, const unsigned char *sk); - -/* -- NaCl compatibility interface ; Requires padding -- */ - -#define crypto_box_ZEROBYTES crypto_box_curve25519xsalsa20poly1305_ZEROBYTES -SODIUM_EXPORT -size_t crypto_box_zerobytes(void); - -#define crypto_box_BOXZEROBYTES crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES -SODIUM_EXPORT -size_t crypto_box_boxzerobytes(void); - -SODIUM_EXPORT -int crypto_box(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_open(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *pk, const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_afternm(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_box_open_afternm(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_box_curve25519xsalsa20poly1305.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_box_curve25519xsalsa20poly1305.h deleted file mode 100644 index 865602f..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_box_curve25519xsalsa20poly1305.h +++ /dev/null @@ -1,96 +0,0 @@ -#ifndef crypto_box_curve25519xsalsa20poly1305_H -#define crypto_box_curve25519xsalsa20poly1305_H - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_box_curve25519xsalsa20poly1305_SEEDBYTES 32U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_seedbytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES 32U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_publickeybytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES 32U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_secretkeybytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES 32U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_beforenmbytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_NONCEBYTES 24U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_noncebytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_ZEROBYTES 32U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_zerobytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES 16U -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_boxzerobytes(void); - -#define crypto_box_curve25519xsalsa20poly1305_MACBYTES \ - (crypto_box_curve25519xsalsa20poly1305_ZEROBYTES - \ - crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES) -SODIUM_EXPORT -size_t crypto_box_curve25519xsalsa20poly1305_macbytes(void); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305(unsigned char *c, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, - const unsigned char *pk, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305_open(unsigned char *m, - const unsigned char *c, - unsigned long long clen, - const unsigned char *n, - const unsigned char *pk, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305_seed_keypair(unsigned char *pk, - unsigned char *sk, - const unsigned char *seed); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305_keypair(unsigned char *pk, - unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305_beforenm(unsigned char *k, - const unsigned char *pk, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305_afternm(unsigned char *c, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_box_curve25519xsalsa20poly1305_open_afternm(unsigned char *m, - const unsigned char *c, - unsigned long long clen, - const unsigned char *n, - const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_hsalsa20.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_core_hsalsa20.h deleted file mode 100644 index 82e475b..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_hsalsa20.h +++ /dev/null @@ -1,35 +0,0 @@ -#ifndef crypto_core_hsalsa20_H -#define crypto_core_hsalsa20_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_core_hsalsa20_OUTPUTBYTES 32U -SODIUM_EXPORT -size_t crypto_core_hsalsa20_outputbytes(void); - -#define crypto_core_hsalsa20_INPUTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_hsalsa20_inputbytes(void); - -#define crypto_core_hsalsa20_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_core_hsalsa20_keybytes(void); - -#define crypto_core_hsalsa20_CONSTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_hsalsa20_constbytes(void); - -SODIUM_EXPORT -int crypto_core_hsalsa20(unsigned char *out, const unsigned char *in, - const unsigned char *k, const unsigned char *c); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa20.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa20.h deleted file mode 100644 index 160cc56..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa20.h +++ /dev/null @@ -1,35 +0,0 @@ -#ifndef crypto_core_salsa20_H -#define crypto_core_salsa20_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_core_salsa20_OUTPUTBYTES 64U -SODIUM_EXPORT -size_t crypto_core_salsa20_outputbytes(void); - -#define crypto_core_salsa20_INPUTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_salsa20_inputbytes(void); - -#define crypto_core_salsa20_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_core_salsa20_keybytes(void); - -#define crypto_core_salsa20_CONSTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_salsa20_constbytes(void); - -SODIUM_EXPORT -int crypto_core_salsa20(unsigned char *out, const unsigned char *in, - const unsigned char *k, const unsigned char *c); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa2012.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa2012.h deleted file mode 100644 index bdd5f9f..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa2012.h +++ /dev/null @@ -1,35 +0,0 @@ -#ifndef crypto_core_salsa2012_H -#define crypto_core_salsa2012_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_core_salsa2012_OUTPUTBYTES 64U -SODIUM_EXPORT -size_t crypto_core_salsa2012_outputbytes(void); - -#define crypto_core_salsa2012_INPUTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_salsa2012_inputbytes(void); - -#define crypto_core_salsa2012_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_core_salsa2012_keybytes(void); - -#define crypto_core_salsa2012_CONSTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_salsa2012_constbytes(void); - -SODIUM_EXPORT -int crypto_core_salsa2012(unsigned char *out, const unsigned char *in, - const unsigned char *k, const unsigned char *c); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa208.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa208.h deleted file mode 100644 index 3c13efa..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_core_salsa208.h +++ /dev/null @@ -1,35 +0,0 @@ -#ifndef crypto_core_salsa208_H -#define crypto_core_salsa208_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_core_salsa208_OUTPUTBYTES 64U -SODIUM_EXPORT -size_t crypto_core_salsa208_outputbytes(void); - -#define crypto_core_salsa208_INPUTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_salsa208_inputbytes(void); - -#define crypto_core_salsa208_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_core_salsa208_keybytes(void); - -#define crypto_core_salsa208_CONSTBYTES 16U -SODIUM_EXPORT -size_t crypto_core_salsa208_constbytes(void); - -SODIUM_EXPORT -int crypto_core_salsa208(unsigned char *out, const unsigned char *in, - const unsigned char *k, const unsigned char *c); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_generichash.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_generichash.h deleted file mode 100644 index 60d4652..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_generichash.h +++ /dev/null @@ -1,71 +0,0 @@ -#ifndef crypto_generichash_H -#define crypto_generichash_H - -#include - -#include "crypto_generichash_blake2b.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_generichash_BYTES_MIN crypto_generichash_blake2b_BYTES_MIN -SODIUM_EXPORT -size_t crypto_generichash_bytes_min(void); - -#define crypto_generichash_BYTES_MAX crypto_generichash_blake2b_BYTES_MAX -SODIUM_EXPORT -size_t crypto_generichash_bytes_max(void); - -#define crypto_generichash_BYTES crypto_generichash_blake2b_BYTES -SODIUM_EXPORT -size_t crypto_generichash_bytes(void); - -#define crypto_generichash_KEYBYTES_MIN crypto_generichash_blake2b_KEYBYTES_MIN -SODIUM_EXPORT -size_t crypto_generichash_keybytes_min(void); - -#define crypto_generichash_KEYBYTES_MAX crypto_generichash_blake2b_KEYBYTES_MAX -SODIUM_EXPORT -size_t crypto_generichash_keybytes_max(void); - -#define crypto_generichash_KEYBYTES crypto_generichash_blake2b_KEYBYTES -SODIUM_EXPORT -size_t crypto_generichash_keybytes(void); - -#define crypto_generichash_PRIMITIVE "blake2b" -SODIUM_EXPORT -const char *crypto_generichash_primitive(void); - -typedef crypto_generichash_blake2b_state crypto_generichash_state; -SODIUM_EXPORT -size_t crypto_generichash_statebytes(void); - -SODIUM_EXPORT -int crypto_generichash(unsigned char *out, size_t outlen, - const unsigned char *in, unsigned long long inlen, - const unsigned char *key, size_t keylen); - -SODIUM_EXPORT -int crypto_generichash_init(crypto_generichash_state *state, - const unsigned char *key, - const size_t keylen, const size_t outlen); - -SODIUM_EXPORT -int crypto_generichash_update(crypto_generichash_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_generichash_final(crypto_generichash_state *state, - unsigned char *out, const size_t outlen); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_generichash_blake2b.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_generichash_blake2b.h deleted file mode 100644 index cddfdaa..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_generichash_blake2b.h +++ /dev/null @@ -1,107 +0,0 @@ -#ifndef crypto_generichash_blake2b_H -#define crypto_generichash_blake2b_H - -#include -#include -#include - -#include "export.h" - -#if defined(_MSC_VER) -# define CRYPTO_ALIGN(x) __declspec(align(x)) -#else -# define CRYPTO_ALIGN(x) __attribute__((aligned(x))) -#endif - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#pragma pack(push, 1) -typedef CRYPTO_ALIGN(64) struct crypto_generichash_blake2b_state { - uint64_t h[8]; - uint64_t t[2]; - uint64_t f[2]; - uint8_t buf[2 * 128]; - size_t buflen; - uint8_t last_node; -} crypto_generichash_blake2b_state; -#pragma pack(pop) - -#define crypto_generichash_blake2b_BYTES_MIN 16U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_bytes_min(void); - -#define crypto_generichash_blake2b_BYTES_MAX 64U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_bytes_max(void); - -#define crypto_generichash_blake2b_BYTES 32U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_bytes(void); - -#define crypto_generichash_blake2b_KEYBYTES_MIN 16U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_keybytes_min(void); - -#define crypto_generichash_blake2b_KEYBYTES_MAX 64U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_keybytes_max(void); - -#define crypto_generichash_blake2b_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_keybytes(void); - -#define crypto_generichash_blake2b_SALTBYTES 16U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_saltbytes(void); - -#define crypto_generichash_blake2b_PERSONALBYTES 16U -SODIUM_EXPORT -size_t crypto_generichash_blake2b_personalbytes(void); - -SODIUM_EXPORT -int crypto_generichash_blake2b(unsigned char *out, size_t outlen, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *key, size_t keylen); - -SODIUM_EXPORT -int crypto_generichash_blake2b_salt_personal(unsigned char *out, size_t outlen, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *key, - size_t keylen, - const unsigned char *salt, - const unsigned char *personal); - -SODIUM_EXPORT -int crypto_generichash_blake2b_init(crypto_generichash_blake2b_state *state, - const unsigned char *key, - const size_t keylen, const size_t outlen); - -SODIUM_EXPORT -int crypto_generichash_blake2b_init_salt_personal(crypto_generichash_blake2b_state *state, - const unsigned char *key, - const size_t keylen, const size_t outlen, - const unsigned char *salt, - const unsigned char *personal); - -SODIUM_EXPORT -int crypto_generichash_blake2b_update(crypto_generichash_blake2b_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_generichash_blake2b_final(crypto_generichash_blake2b_state *state, - unsigned char *out, - const size_t outlen); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_hash.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_hash.h deleted file mode 100644 index d455bd5..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_hash.h +++ /dev/null @@ -1,39 +0,0 @@ -#ifndef crypto_hash_H -#define crypto_hash_H - -/* - * WARNING: Unless you absolutely need to use SHA512 for interoperatibility, - * purposes, you might want to consider crypto_generichash() instead. - * Unlike SHA512, crypto_generichash() is not vulnerable to length - * extension attacks. - */ - -#include - -#include "crypto_hash_sha512.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_hash_BYTES crypto_hash_sha512_BYTES -SODIUM_EXPORT -size_t crypto_hash_bytes(void); - -SODIUM_EXPORT -int crypto_hash(unsigned char *out, const unsigned char *in, - unsigned long long inlen); - -#define crypto_hash_PRIMITIVE "sha512" -SODIUM_EXPORT -const char *crypto_hash_primitive(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_hash_sha256.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_hash_sha256.h deleted file mode 100644 index 2bc33ef..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_hash_sha256.h +++ /dev/null @@ -1,56 +0,0 @@ -#ifndef crypto_hash_sha256_H -#define crypto_hash_sha256_H - -/* - * WARNING: Unless you absolutely need to use SHA256 for interoperatibility, - * purposes, you might want to consider crypto_generichash() instead. - * Unlike SHA256, crypto_generichash() is not vulnerable to length - * extension attacks. - */ - -#include -#include -#include - -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -typedef struct crypto_hash_sha256_state { - uint32_t state[8]; - uint32_t count[2]; - unsigned char buf[64]; -} crypto_hash_sha256_state; -SODIUM_EXPORT -size_t crypto_hash_sha256_statebytes(void); - -#define crypto_hash_sha256_BYTES 32U -SODIUM_EXPORT -size_t crypto_hash_sha256_bytes(void); - -SODIUM_EXPORT -int crypto_hash_sha256(unsigned char *out, const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_hash_sha256_init(crypto_hash_sha256_state *state); - -SODIUM_EXPORT -int crypto_hash_sha256_update(crypto_hash_sha256_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_hash_sha256_final(crypto_hash_sha256_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_hash_sha512.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_hash_sha512.h deleted file mode 100644 index 12df033..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_hash_sha512.h +++ /dev/null @@ -1,56 +0,0 @@ -#ifndef crypto_hash_sha512_H -#define crypto_hash_sha512_H - -/* - * WARNING: Unless you absolutely need to use SHA512 for interoperatibility, - * purposes, you might want to consider crypto_generichash() instead. - * Unlike SHA512, crypto_generichash() is not vulnerable to length - * extension attacks. - */ - -#include -#include -#include - -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -typedef struct crypto_hash_sha512_state { - uint64_t state[8]; - uint64_t count[2]; - unsigned char buf[128]; -} crypto_hash_sha512_state; -SODIUM_EXPORT -size_t crypto_hash_sha512_statebytes(void); - -#define crypto_hash_sha512_BYTES 64U -SODIUM_EXPORT -size_t crypto_hash_sha512_bytes(void); - -SODIUM_EXPORT -int crypto_hash_sha512(unsigned char *out, const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_hash_sha512_init(crypto_hash_sha512_state *state); - -SODIUM_EXPORT -int crypto_hash_sha512_update(crypto_hash_sha512_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_hash_sha512_final(crypto_hash_sha512_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_int32.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_int32.h deleted file mode 100644 index a22019d..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_int32.h +++ /dev/null @@ -1,8 +0,0 @@ -#ifndef crypto_int32_H -#define crypto_int32_H - -#include - -typedef int32_t crypto_int32; - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_int64.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_int64.h deleted file mode 100644 index f68a283..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_int64.h +++ /dev/null @@ -1,8 +0,0 @@ -#ifndef crypto_int64_H -#define crypto_int64_H - -#include - -typedef int64_t crypto_int64; - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_onetimeauth.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_onetimeauth.h deleted file mode 100644 index 318f672..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_onetimeauth.h +++ /dev/null @@ -1,57 +0,0 @@ -#ifndef crypto_onetimeauth_H -#define crypto_onetimeauth_H - -#include - -#include "crypto_onetimeauth_poly1305.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -typedef crypto_onetimeauth_poly1305_state crypto_onetimeauth_state; -SODIUM_EXPORT -size_t crypto_onetimeauth_statebytes(void); - -#define crypto_onetimeauth_BYTES crypto_onetimeauth_poly1305_BYTES -SODIUM_EXPORT -size_t crypto_onetimeauth_bytes(void); - -#define crypto_onetimeauth_KEYBYTES crypto_onetimeauth_poly1305_KEYBYTES -SODIUM_EXPORT -size_t crypto_onetimeauth_keybytes(void); - -#define crypto_onetimeauth_PRIMITIVE "poly1305" -SODIUM_EXPORT -const char *crypto_onetimeauth_primitive(void); - -SODIUM_EXPORT -int crypto_onetimeauth(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k); - -SODIUM_EXPORT -int crypto_onetimeauth_verify(const unsigned char *h, const unsigned char *in, - unsigned long long inlen, const unsigned char *k); - -SODIUM_EXPORT -int crypto_onetimeauth_init(crypto_onetimeauth_state *state, - const unsigned char *key); - -SODIUM_EXPORT -int crypto_onetimeauth_update(crypto_onetimeauth_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_onetimeauth_final(crypto_onetimeauth_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_onetimeauth_poly1305.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_onetimeauth_poly1305.h deleted file mode 100644 index fb6eb49..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_onetimeauth_poly1305.h +++ /dev/null @@ -1,89 +0,0 @@ -#ifndef crypto_onetimeauth_poly1305_H -#define crypto_onetimeauth_poly1305_H - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#include - -#include -#include - -typedef struct crypto_onetimeauth_poly1305_state { - unsigned long long aligner; - unsigned char opaque[136]; -} crypto_onetimeauth_poly1305_state; - -typedef struct crypto_onetimeauth_poly1305_implementation { - const char *(*implementation_name)(void); - int (*onetimeauth)(unsigned char *out, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - int (*onetimeauth_verify)(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - int (*onetimeauth_init)(crypto_onetimeauth_poly1305_state *state, - const unsigned char *key); - int (*onetimeauth_update)(crypto_onetimeauth_poly1305_state *state, - const unsigned char *in, - unsigned long long inlen); - int (*onetimeauth_final)(crypto_onetimeauth_poly1305_state *state, - unsigned char *out); -} crypto_onetimeauth_poly1305_implementation; - -#define crypto_onetimeauth_poly1305_BYTES 16U -SODIUM_EXPORT -size_t crypto_onetimeauth_poly1305_bytes(void); - -#define crypto_onetimeauth_poly1305_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_onetimeauth_poly1305_keybytes(void); - -SODIUM_EXPORT -const char *crypto_onetimeauth_poly1305_implementation_name(void); - -SODIUM_EXPORT -int crypto_onetimeauth_poly1305_set_implementation(crypto_onetimeauth_poly1305_implementation *impl); - -crypto_onetimeauth_poly1305_implementation * -crypto_onetimeauth_pick_best_implementation(void); - -SODIUM_EXPORT -int crypto_onetimeauth_poly1305(unsigned char *out, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_onetimeauth_poly1305_verify(const unsigned char *h, - const unsigned char *in, - unsigned long long inlen, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_onetimeauth_poly1305_init(crypto_onetimeauth_poly1305_state *state, - const unsigned char *key); - -SODIUM_EXPORT -int crypto_onetimeauth_poly1305_update(crypto_onetimeauth_poly1305_state *state, - const unsigned char *in, - unsigned long long inlen); - -SODIUM_EXPORT -int crypto_onetimeauth_poly1305_final(crypto_onetimeauth_poly1305_state *state, - unsigned char *out); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_pwhash_scryptsalsa208sha256.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_pwhash_scryptsalsa208sha256.h deleted file mode 100644 index 0d98e0b..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_pwhash_scryptsalsa208sha256.h +++ /dev/null @@ -1,75 +0,0 @@ -#ifndef crypto_pwhash_scryptsalsa208sha256_H -#define crypto_pwhash_scryptsalsa208sha256_H - -#include -#include - -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_pwhash_scryptsalsa208sha256_SALTBYTES 32U -SODIUM_EXPORT -size_t crypto_pwhash_scryptsalsa208sha256_saltbytes(void); - -#define crypto_pwhash_scryptsalsa208sha256_STRBYTES 102U -SODIUM_EXPORT -size_t crypto_pwhash_scryptsalsa208sha256_strbytes(void); - -#define crypto_pwhash_scryptsalsa208sha256_STRPREFIX "$7$" -SODIUM_EXPORT -const char *crypto_pwhash_scryptsalsa208sha256_strprefix(void); - -#define crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVE 524288ULL -SODIUM_EXPORT -size_t crypto_pwhash_scryptsalsa208sha256_opslimit_interactive(void); - -#define crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVE 16777216ULL -SODIUM_EXPORT -size_t crypto_pwhash_scryptsalsa208sha256_memlimit_interactive(void); - -#define crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_SENSITIVE 33554432ULL -SODIUM_EXPORT -size_t crypto_pwhash_scryptsalsa208sha256_opslimit_sensitive(void); - -#define crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_SENSITIVE 1073741824ULL -SODIUM_EXPORT -size_t crypto_pwhash_scryptsalsa208sha256_memlimit_sensitive(void); - -SODIUM_EXPORT -int crypto_pwhash_scryptsalsa208sha256(unsigned char * const out, - unsigned long long outlen, - const char * const passwd, - unsigned long long passwdlen, - const unsigned char * const salt, - unsigned long long opslimit, - size_t memlimit); - -SODIUM_EXPORT -int crypto_pwhash_scryptsalsa208sha256_str(char out[crypto_pwhash_scryptsalsa208sha256_STRBYTES], - const char * const passwd, - unsigned long long passwdlen, - unsigned long long opslimit, - size_t memlimit); - -SODIUM_EXPORT -int crypto_pwhash_scryptsalsa208sha256_str_verify(const char str[crypto_pwhash_scryptsalsa208sha256_STRBYTES], - const char * const passwd, - unsigned long long passwdlen); - -SODIUM_EXPORT -int crypto_pwhash_scryptsalsa208sha256_ll(const uint8_t * passwd, size_t passwdlen, - const uint8_t * salt, size_t saltlen, - uint64_t N, uint32_t r, uint32_t p, - uint8_t * buf, size_t buflen); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_scalarmult.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_scalarmult.h deleted file mode 100644 index 3d59b3a..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_scalarmult.h +++ /dev/null @@ -1,36 +0,0 @@ -#ifndef crypto_scalarmult_H -#define crypto_scalarmult_H - -#include - -#include "crypto_scalarmult_curve25519.h" -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_scalarmult_BYTES crypto_scalarmult_curve25519_BYTES -SODIUM_EXPORT -size_t crypto_scalarmult_bytes(void); - -#define crypto_scalarmult_SCALARBYTES crypto_scalarmult_curve25519_SCALARBYTES -SODIUM_EXPORT -size_t crypto_scalarmult_scalarbytes(void); - -#define crypto_scalarmult_PRIMITIVE "curve25519" -SODIUM_EXPORT -const char *crypto_scalarmult_primitive(void); - -SODIUM_EXPORT -int crypto_scalarmult_base(unsigned char *q, const unsigned char *n); - -SODIUM_EXPORT -int crypto_scalarmult(unsigned char *q, const unsigned char *n, - const unsigned char *p); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_scalarmult_curve25519.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_scalarmult_curve25519.h deleted file mode 100644 index c75d224..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_scalarmult_curve25519.h +++ /dev/null @@ -1,31 +0,0 @@ -#ifndef crypto_scalarmult_curve25519_H -#define crypto_scalarmult_curve25519_H - -#include - -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_scalarmult_curve25519_BYTES 32U -SODIUM_EXPORT -size_t crypto_scalarmult_curve25519_bytes(void); - -#define crypto_scalarmult_curve25519_SCALARBYTES 32U -SODIUM_EXPORT -size_t crypto_scalarmult_curve25519_scalarbytes(void); - -SODIUM_EXPORT -int crypto_scalarmult_curve25519(unsigned char *q, const unsigned char *n, - const unsigned char *p); - -SODIUM_EXPORT -int crypto_scalarmult_curve25519_base(unsigned char *q, const unsigned char *n); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_secretbox.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_secretbox.h deleted file mode 100644 index e0d6969..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_secretbox.h +++ /dev/null @@ -1,80 +0,0 @@ -#ifndef crypto_secretbox_H -#define crypto_secretbox_H - -#include - -#include "crypto_secretbox_xsalsa20poly1305.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_secretbox_KEYBYTES crypto_secretbox_xsalsa20poly1305_KEYBYTES -SODIUM_EXPORT -size_t crypto_secretbox_keybytes(void); - -#define crypto_secretbox_NONCEBYTES crypto_secretbox_xsalsa20poly1305_NONCEBYTES -SODIUM_EXPORT -size_t crypto_secretbox_noncebytes(void); - -#define crypto_secretbox_MACBYTES crypto_secretbox_xsalsa20poly1305_MACBYTES -SODIUM_EXPORT -size_t crypto_secretbox_macbytes(void); - -#define crypto_secretbox_PRIMITIVE "xsalsa20poly1305" -SODIUM_EXPORT -const char *crypto_secretbox_primitive(void); - -SODIUM_EXPORT -int crypto_secretbox_easy(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_secretbox_open_easy(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_secretbox_detached(unsigned char *c, unsigned char *mac, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_secretbox_open_detached(unsigned char *m, - const unsigned char *c, - const unsigned char *mac, - unsigned long long clen, - const unsigned char *n, - const unsigned char *k); - -/* -- NaCl compatibility interface ; Requires padding -- */ - -#define crypto_secretbox_ZEROBYTES crypto_secretbox_xsalsa20poly1305_ZEROBYTES -SODIUM_EXPORT -size_t crypto_secretbox_zerobytes(void); - -#define crypto_secretbox_BOXZEROBYTES crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES -SODIUM_EXPORT -size_t crypto_secretbox_boxzerobytes(void); - -SODIUM_EXPORT -int crypto_secretbox(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_secretbox_open(unsigned char *m, const unsigned char *c, - unsigned long long clen, const unsigned char *n, - const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_secretbox_xsalsa20poly1305.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_secretbox_xsalsa20poly1305.h deleted file mode 100644 index 4afc2cd..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_secretbox_xsalsa20poly1305.h +++ /dev/null @@ -1,54 +0,0 @@ -#ifndef crypto_secretbox_xsalsa20poly1305_H -#define crypto_secretbox_xsalsa20poly1305_H - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_secretbox_xsalsa20poly1305_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_secretbox_xsalsa20poly1305_keybytes(void); - -#define crypto_secretbox_xsalsa20poly1305_NONCEBYTES 24U -SODIUM_EXPORT -size_t crypto_secretbox_xsalsa20poly1305_noncebytes(void); - -#define crypto_secretbox_xsalsa20poly1305_ZEROBYTES 32U -SODIUM_EXPORT -size_t crypto_secretbox_xsalsa20poly1305_zerobytes(void); - -#define crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES 16U -SODIUM_EXPORT -size_t crypto_secretbox_xsalsa20poly1305_boxzerobytes(void); - -#define crypto_secretbox_xsalsa20poly1305_MACBYTES \ - (crypto_secretbox_xsalsa20poly1305_ZEROBYTES - \ - crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES) -SODIUM_EXPORT -size_t crypto_secretbox_xsalsa20poly1305_macbytes(void); - -SODIUM_EXPORT -int crypto_secretbox_xsalsa20poly1305(unsigned char *c, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_secretbox_xsalsa20poly1305_open(unsigned char *m, - const unsigned char *c, - unsigned long long clen, - const unsigned char *n, - const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_shorthash.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_shorthash.h deleted file mode 100644 index 5458b9c..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_shorthash.h +++ /dev/null @@ -1,36 +0,0 @@ -#ifndef crypto_shorthash_H -#define crypto_shorthash_H - -#include - -#include "crypto_shorthash_siphash24.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_shorthash_BYTES crypto_shorthash_siphash24_BYTES -SODIUM_EXPORT -size_t crypto_shorthash_bytes(void); - -#define crypto_shorthash_KEYBYTES crypto_shorthash_siphash24_KEYBYTES -SODIUM_EXPORT -size_t crypto_shorthash_keybytes(void); - -#define crypto_shorthash_PRIMITIVE "siphash24" -SODIUM_EXPORT -const char *crypto_shorthash_primitive(void); - -SODIUM_EXPORT -int crypto_shorthash(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_shorthash_siphash24.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_shorthash_siphash24.h deleted file mode 100644 index a2cab0c..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_shorthash_siphash24.h +++ /dev/null @@ -1,30 +0,0 @@ -#ifndef crypto_shorthash_siphash24_H -#define crypto_shorthash_siphash24_H - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_shorthash_siphash24_BYTES 8U -SODIUM_EXPORT -size_t crypto_shorthash_siphash24_bytes(void); - -#define crypto_shorthash_siphash24_KEYBYTES 16U -SODIUM_EXPORT -size_t crypto_shorthash_siphash24_keybytes(void); - -SODIUM_EXPORT -int crypto_shorthash_siphash24(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_sign.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_sign.h deleted file mode 100644 index 8b854d3..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_sign.h +++ /dev/null @@ -1,74 +0,0 @@ -#ifndef crypto_sign_H -#define crypto_sign_H - -/* - * THREAD SAFETY: crypto_sign_keypair() is thread-safe, - * provided that you called sodium_init() once before using any - * other libsodium function. - * Other functions, including crypto_sign_seed_keypair() are always thread-safe. - */ - -#include - -#include "crypto_sign_ed25519.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_sign_BYTES crypto_sign_ed25519_BYTES -SODIUM_EXPORT -size_t crypto_sign_bytes(void); - -#define crypto_sign_SEEDBYTES crypto_sign_ed25519_SEEDBYTES -SODIUM_EXPORT -size_t crypto_sign_seedbytes(void); - -#define crypto_sign_PUBLICKEYBYTES crypto_sign_ed25519_PUBLICKEYBYTES -SODIUM_EXPORT -size_t crypto_sign_publickeybytes(void); - -#define crypto_sign_SECRETKEYBYTES crypto_sign_ed25519_SECRETKEYBYTES -SODIUM_EXPORT -size_t crypto_sign_secretkeybytes(void); - -#define crypto_sign_PRIMITIVE "ed25519" -SODIUM_EXPORT -const char *crypto_sign_primitive(void); - -SODIUM_EXPORT -int crypto_sign_seed_keypair(unsigned char *pk, unsigned char *sk, - const unsigned char *seed); - -SODIUM_EXPORT -int crypto_sign_keypair(unsigned char *pk, unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign(unsigned char *sm, unsigned long long *smlen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_open(unsigned char *m, unsigned long long *mlen_p, - const unsigned char *sm, unsigned long long smlen, - const unsigned char *pk); - -SODIUM_EXPORT -int crypto_sign_detached(unsigned char *sig, unsigned long long *siglen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_verify_detached(const unsigned char *sig, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *pk); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_sign_ed25519.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_sign_ed25519.h deleted file mode 100644 index 5238c2a..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_sign_ed25519.h +++ /dev/null @@ -1,79 +0,0 @@ -#ifndef crypto_sign_ed25519_H -#define crypto_sign_ed25519_H - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_sign_ed25519_BYTES 64U -SODIUM_EXPORT -size_t crypto_sign_ed25519_bytes(void); - -#define crypto_sign_ed25519_SEEDBYTES 32U -SODIUM_EXPORT -size_t crypto_sign_ed25519_seedbytes(void); - -#define crypto_sign_ed25519_PUBLICKEYBYTES 32U -SODIUM_EXPORT -size_t crypto_sign_ed25519_publickeybytes(void); - -#define crypto_sign_ed25519_SECRETKEYBYTES (32U + 32U) -SODIUM_EXPORT -size_t crypto_sign_ed25519_secretkeybytes(void); - -SODIUM_EXPORT -int crypto_sign_ed25519(unsigned char *sm, unsigned long long *smlen_p, - const unsigned char *m, unsigned long long mlen, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_ed25519_open(unsigned char *m, unsigned long long *mlen_p, - const unsigned char *sm, unsigned long long smlen, - const unsigned char *pk); - -SODIUM_EXPORT -int crypto_sign_ed25519_detached(unsigned char *sig, - unsigned long long *siglen_p, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_ed25519_verify_detached(const unsigned char *sig, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *pk); - -SODIUM_EXPORT -int crypto_sign_ed25519_keypair(unsigned char *pk, unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_ed25519_seed_keypair(unsigned char *pk, unsigned char *sk, - const unsigned char *seed); - -SODIUM_EXPORT -int crypto_sign_ed25519_pk_to_curve25519(unsigned char *curve25519_pk, - const unsigned char *ed25519_pk); - -SODIUM_EXPORT -int crypto_sign_ed25519_sk_to_curve25519(unsigned char *curve25519_sk, - const unsigned char *ed25519_sk); - -SODIUM_EXPORT -int crypto_sign_ed25519_sk_to_seed(unsigned char *seed, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_ed25519_sk_to_pk(unsigned char *pk, const unsigned char *sk); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_sign_edwards25519sha512batch.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_sign_edwards25519sha512batch.h deleted file mode 100644 index 01b4f2e..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_sign_edwards25519sha512batch.h +++ /dev/null @@ -1,59 +0,0 @@ -#ifndef crypto_sign_edwards25519sha512batch_H -#define crypto_sign_edwards25519sha512batch_H - -/* - * WARNING: This construction was a prototype, which should not be used - * any more in new projects. - * - * crypto_sign_edwards25519sha512batch is provided for applications - * initially built with NaCl, but as recommended by the author of this - * construction, new applications should use ed25519 instead. - * - * In Sodium, you should use the high-level crypto_sign_*() functions instead. - */ - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_sign_edwards25519sha512batch_BYTES 64U -SODIUM_EXPORT -size_t crypto_sign_edwards25519sha512batch_bytes(void); - -#define crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES 32U -SODIUM_EXPORT -size_t crypto_sign_edwards25519sha512batch_publickeybytes(void); - -#define crypto_sign_edwards25519sha512batch_SECRETKEYBYTES (32U + 32U) -SODIUM_EXPORT -size_t crypto_sign_edwards25519sha512batch_secretkeybytes(void); - -SODIUM_EXPORT -int crypto_sign_edwards25519sha512batch(unsigned char *sm, - unsigned long long *smlen_p, - const unsigned char *m, - unsigned long long mlen, - const unsigned char *sk); - -SODIUM_EXPORT -int crypto_sign_edwards25519sha512batch_open(unsigned char *m, - unsigned long long *mlen_p, - const unsigned char *sm, - unsigned long long smlen, - const unsigned char *pk); - -SODIUM_EXPORT -int crypto_sign_edwards25519sha512batch_keypair(unsigned char *pk, - unsigned char *sk); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream.h deleted file mode 100644 index b0c6c41..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream.h +++ /dev/null @@ -1,49 +0,0 @@ -#ifndef crypto_stream_H -#define crypto_stream_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include - -#include "crypto_stream_xsalsa20.h" -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_KEYBYTES crypto_stream_xsalsa20_KEYBYTES -SODIUM_EXPORT -size_t crypto_stream_keybytes(void); - -#define crypto_stream_NONCEBYTES crypto_stream_xsalsa20_NONCEBYTES -SODIUM_EXPORT -size_t crypto_stream_noncebytes(void); - -#define crypto_stream_PRIMITIVE "xsalsa20" -SODIUM_EXPORT -const char *crypto_stream_primitive(void); - -SODIUM_EXPORT -int crypto_stream(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_aes128ctr.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_aes128ctr.h deleted file mode 100644 index 2913319..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_aes128ctr.h +++ /dev/null @@ -1,60 +0,0 @@ -#ifndef crypto_stream_aes128ctr_H -#define crypto_stream_aes128ctr_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_aes128ctr_KEYBYTES 16U -SODIUM_EXPORT -size_t crypto_stream_aes128ctr_keybytes(void); - -#define crypto_stream_aes128ctr_NONCEBYTES 16U -SODIUM_EXPORT -size_t crypto_stream_aes128ctr_noncebytes(void); - -#define crypto_stream_aes128ctr_BEFORENMBYTES 1408U -SODIUM_EXPORT -size_t crypto_stream_aes128ctr_beforenmbytes(void); - -SODIUM_EXPORT -int crypto_stream_aes128ctr(unsigned char *out, unsigned long long outlen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_aes128ctr_xor(unsigned char *out, const unsigned char *in, - unsigned long long inlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_aes128ctr_beforenm(unsigned char *c, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_aes128ctr_afternm(unsigned char *out, unsigned long long len, - const unsigned char *nonce, const unsigned char *c); - -SODIUM_EXPORT -int crypto_stream_aes128ctr_xor_afternm(unsigned char *out, const unsigned char *in, - unsigned long long len, - const unsigned char *nonce, - const unsigned char *c); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_chacha20.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_chacha20.h deleted file mode 100644 index 6b577fc..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_chacha20.h +++ /dev/null @@ -1,49 +0,0 @@ -#ifndef crypto_stream_chacha20_H -#define crypto_stream_chacha20_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_chacha20_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_stream_chacha20_keybytes(void); - -#define crypto_stream_chacha20_NONCEBYTES 8U -SODIUM_EXPORT -size_t crypto_stream_chacha20_noncebytes(void); - -SODIUM_EXPORT -int crypto_stream_chacha20(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_chacha20_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_chacha20_xor_ic(unsigned char *c, const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa20.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa20.h deleted file mode 100644 index 1c06512..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa20.h +++ /dev/null @@ -1,49 +0,0 @@ -#ifndef crypto_stream_salsa20_H -#define crypto_stream_salsa20_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_salsa20_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_stream_salsa20_keybytes(void); - -#define crypto_stream_salsa20_NONCEBYTES 8U -SODIUM_EXPORT -size_t crypto_stream_salsa20_noncebytes(void); - -SODIUM_EXPORT -int crypto_stream_salsa20(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_salsa20_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_salsa20_xor_ic(unsigned char *c, const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa2012.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa2012.h deleted file mode 100644 index 6fcf436..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa2012.h +++ /dev/null @@ -1,43 +0,0 @@ -#ifndef crypto_stream_salsa2012_H -#define crypto_stream_salsa2012_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_salsa2012_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_stream_salsa2012_keybytes(void); - -#define crypto_stream_salsa2012_NONCEBYTES 8U -SODIUM_EXPORT -size_t crypto_stream_salsa2012_noncebytes(void); - -SODIUM_EXPORT -int crypto_stream_salsa2012(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_salsa2012_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa208.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa208.h deleted file mode 100644 index a8fd2ce..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_salsa208.h +++ /dev/null @@ -1,43 +0,0 @@ -#ifndef crypto_stream_salsa208_H -#define crypto_stream_salsa208_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_salsa208_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_stream_salsa208_keybytes(void); - -#define crypto_stream_salsa208_NONCEBYTES 8U -SODIUM_EXPORT -size_t crypto_stream_salsa208_noncebytes(void); - -SODIUM_EXPORT -int crypto_stream_salsa208(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_salsa208_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_xsalsa20.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_xsalsa20.h deleted file mode 100644 index c09425a..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_stream_xsalsa20.h +++ /dev/null @@ -1,49 +0,0 @@ -#ifndef crypto_stream_xsalsa20_H -#define crypto_stream_xsalsa20_H - -/* - * WARNING: This is just a stream cipher. It is NOT authenticated encryption. - * While it provides some protection against eavesdropping, it does NOT - * provide any security against active attacks. - * Unless you know what you're doing, what you are looking for is probably - * the crypto_box functions. - */ - -#include -#include -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -#define crypto_stream_xsalsa20_KEYBYTES 32U -SODIUM_EXPORT -size_t crypto_stream_xsalsa20_keybytes(void); - -#define crypto_stream_xsalsa20_NONCEBYTES 24U -SODIUM_EXPORT -size_t crypto_stream_xsalsa20_noncebytes(void); - -SODIUM_EXPORT -int crypto_stream_xsalsa20(unsigned char *c, unsigned long long clen, - const unsigned char *n, const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_xsalsa20_xor(unsigned char *c, const unsigned char *m, - unsigned long long mlen, const unsigned char *n, - const unsigned char *k); - -SODIUM_EXPORT -int crypto_stream_xsalsa20_xor_ic(unsigned char *c, const unsigned char *m, - unsigned long long mlen, - const unsigned char *n, uint64_t ic, - const unsigned char *k); -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint16.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_uint16.h deleted file mode 100644 index 6be4e34..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint16.h +++ /dev/null @@ -1,8 +0,0 @@ -#ifndef crypto_uint16_H -#define crypto_uint16_H - -#include - -typedef uint16_t crypto_uint16; - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint32.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_uint32.h deleted file mode 100644 index ba66cec..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint32.h +++ /dev/null @@ -1,8 +0,0 @@ -#ifndef crypto_uint32_H -#define crypto_uint32_H - -#include - -typedef uint32_t crypto_uint32; - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint64.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_uint64.h deleted file mode 100644 index 98b3f6d..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint64.h +++ /dev/null @@ -1,8 +0,0 @@ -#ifndef crypto_uint64_H -#define crypto_uint64_H - -#include - -typedef uint64_t crypto_uint64; - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint8.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_uint8.h deleted file mode 100644 index 789613b..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_uint8.h +++ /dev/null @@ -1,8 +0,0 @@ -#ifndef crypto_uint8_H -#define crypto_uint8_H - -#include - -typedef uint8_t crypto_uint8; - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_16.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_16.h deleted file mode 100644 index 7370b15..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_16.h +++ /dev/null @@ -1,22 +0,0 @@ -#ifndef crypto_verify_16_H -#define crypto_verify_16_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_verify_16_BYTES 16U -SODIUM_EXPORT -size_t crypto_verify_16_bytes(void); - -SODIUM_EXPORT -int crypto_verify_16(const unsigned char *x, const unsigned char *y); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_32.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_32.h deleted file mode 100644 index 58e4d0e..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_32.h +++ /dev/null @@ -1,22 +0,0 @@ -#ifndef crypto_verify_32_H -#define crypto_verify_32_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_verify_32_BYTES 32U -SODIUM_EXPORT -size_t crypto_verify_32_bytes(void); - -SODIUM_EXPORT -int crypto_verify_32(const unsigned char *x, const unsigned char *y); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_64.h b/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_64.h deleted file mode 100644 index 7ed9c89..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/crypto_verify_64.h +++ /dev/null @@ -1,22 +0,0 @@ -#ifndef crypto_verify_64_H -#define crypto_verify_64_H - -#include -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#define crypto_verify_64_BYTES 64U -SODIUM_EXPORT -size_t crypto_verify_64_bytes(void); - -SODIUM_EXPORT -int crypto_verify_64(const unsigned char *x, const unsigned char *y); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/export.h b/Pods/libsodium/src/libsodium/include/sodium/export.h deleted file mode 100644 index 53fcd7b..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/export.h +++ /dev/null @@ -1,32 +0,0 @@ - -#ifndef sodium_export_H -#define sodium_export_H - -#ifndef __GNUC__ -# ifdef __attribute__ -# undef __attribute__ -# endif -# define __attribute__(a) -#endif - -#ifdef SODIUM_STATIC -# define SODIUM_EXPORT -#else -# if defined(_MSC_VER) -# ifdef SODIUM_DLL_EXPORT -# define SODIUM_EXPORT __declspec(dllexport) -# else -# define SODIUM_EXPORT __declspec(dllimport) -# endif -# else -# if defined(__SUNPRO_C) -# define SODIUM_EXPORT __attribute__ __global -# elif defined(_MSG_VER) -# define SODIUM_EXPORT extern __declspec(dllexport) -# else -# define SODIUM_EXPORT __attribute__ ((visibility ("default"))) -# endif -# endif -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/randombytes.h b/Pods/libsodium/src/libsodium/include/sodium/randombytes.h deleted file mode 100644 index 08aff05..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/randombytes.h +++ /dev/null @@ -1,58 +0,0 @@ - -#ifndef randombytes_H -#define randombytes_H - -#include - -#include -#include - -#include "export.h" - -#ifdef __cplusplus -# if __GNUC__ -# pragma GCC diagnostic ignored "-Wlong-long" -# endif -extern "C" { -#endif - -typedef struct randombytes_implementation { - const char *(*implementation_name)(void); /* required */ - uint32_t (*random)(void); /* required */ - void (*stir)(void); /* optional */ - uint32_t (*uniform)(const uint32_t upper_bound); /* optional, a default implementation will be used if NULL */ - void (*buf)(void * const buf, const size_t size); /* required */ - int (*close)(void); /* optional */ -} randombytes_implementation; - -SODIUM_EXPORT -void randombytes_buf(void * const buf, const size_t size); - -SODIUM_EXPORT -uint32_t randombytes_random(void); - -SODIUM_EXPORT -uint32_t randombytes_uniform(const uint32_t upper_bound); - -SODIUM_EXPORT -void randombytes_stir(void); - -SODIUM_EXPORT -int randombytes_close(void); - -SODIUM_EXPORT -int randombytes_set_implementation(randombytes_implementation *impl); - -SODIUM_EXPORT -const char *randombytes_implementation_name(void); - -/* -- NaCl compatibility interface -- */ - -SODIUM_EXPORT -void randombytes(unsigned char * const buf, const unsigned long long buf_len); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/randombytes_salsa20_random.h b/Pods/libsodium/src/libsodium/include/sodium/randombytes_salsa20_random.h deleted file mode 100644 index 46d38c5..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/randombytes_salsa20_random.h +++ /dev/null @@ -1,45 +0,0 @@ - -#ifndef randombytes_salsa20_random_H -#define randombytes_salsa20_random_H - -/* - * THREAD SAFETY: randombytes_salsa20_random*() functions are - * fork()-safe but not thread-safe. - * Always wrap them in a mutex if you need thread safety. - */ - -#include -#include - -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -SODIUM_EXPORT -extern struct randombytes_implementation randombytes_salsa20_implementation; - -SODIUM_EXPORT -const char *randombytes_salsa20_implementation_name(void); - -SODIUM_EXPORT -uint32_t randombytes_salsa20_random(void); - -SODIUM_EXPORT -void randombytes_salsa20_random_stir(void); - -SODIUM_EXPORT -uint32_t randombytes_salsa20_random_uniform(const uint32_t upper_bound); - -SODIUM_EXPORT -void randombytes_salsa20_random_buf(void * const buf, const size_t size); - -SODIUM_EXPORT -int randombytes_salsa20_random_close(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/randombytes_sysrandom.h b/Pods/libsodium/src/libsodium/include/sodium/randombytes_sysrandom.h deleted file mode 100644 index 20dab78..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/randombytes_sysrandom.h +++ /dev/null @@ -1,45 +0,0 @@ - -#ifndef randombytes_sysrandom_H -#define randombytes_sysrandom_H - -/* - * THREAD SAFETY: randombytes_sysrandom() functions are thread-safe, - * provided that you called sodium_init() once before using any - * other libsodium function. - */ - -#include -#include - -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -SODIUM_EXPORT -extern struct randombytes_implementation randombytes_sysrandom_implementation; - -SODIUM_EXPORT -const char *randombytes_sysrandom_implementation_name(void); - -SODIUM_EXPORT -uint32_t randombytes_sysrandom(void); - -SODIUM_EXPORT -void randombytes_sysrandom_stir(void); - -SODIUM_EXPORT -uint32_t randombytes_sysrandom_uniform(const uint32_t upper_bound); - -SODIUM_EXPORT -void randombytes_sysrandom_buf(void * const buf, const size_t size); - -SODIUM_EXPORT -int randombytes_sysrandom_close(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/runtime.h b/Pods/libsodium/src/libsodium/include/sodium/runtime.h deleted file mode 100644 index 50226ae..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/runtime.h +++ /dev/null @@ -1,27 +0,0 @@ - -#ifndef sodium_runtime_H -#define sodium_runtime_H - -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -SODIUM_EXPORT -int sodium_runtime_get_cpu_features(void); - -SODIUM_EXPORT -int sodium_runtime_has_neon(void); - -SODIUM_EXPORT -int sodium_runtime_has_sse2(void); - -SODIUM_EXPORT -int sodium_runtime_has_sse3(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/utils.h b/Pods/libsodium/src/libsodium/include/sodium/utils.h deleted file mode 100644 index 42f21bc..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/utils.h +++ /dev/null @@ -1,106 +0,0 @@ - -#ifndef sodium_utils_H -#define sodium_utils_H - -#include - -#include "export.h" - -#ifdef __cplusplus -extern "C" { -#endif - -#if defined(__cplusplus) || !defined(__STDC_VERSION__) || __STDC_VERSION__ < 199901L -# define SODIUM_C99(X) -#else -# define SODIUM_C99(X) X -#endif - -SODIUM_EXPORT -void sodium_memzero(void * const pnt, const size_t len); - -/* WARNING: sodium_memcmp() must be used to verify if two secret keys - * are equal, in constant time. - * It returns 0 if the keys are equal, and -1 if they differ. - * This function is not designed for lexicographical comparisons. - */ -SODIUM_EXPORT -int sodium_memcmp(const void * const b1_, const void * const b2_, size_t len); - -SODIUM_EXPORT -char *sodium_bin2hex(char * const hex, const size_t hex_maxlen, - const unsigned char * const bin, const size_t bin_len); - -SODIUM_EXPORT -int sodium_hex2bin(unsigned char * const bin, const size_t bin_maxlen, - const char * const hex, const size_t hex_len, - const char * const ignore, size_t * const bin_len, - const char ** const hex_end); - -SODIUM_EXPORT -int sodium_mlock(void * const addr, const size_t len); - -SODIUM_EXPORT -int sodium_munlock(void * const addr, const size_t len); - -/* WARNING: sodium_malloc() and sodium_allocarray() are not general-purpose - * allocation functions. - * - * They return a pointer to a region filled with 0xd0 bytes, immediately - * followed by a guard page. - * As a result, accessing a single byte after the requested allocation size - * will intentionally trigger a segmentation fault. - * - * A canary and an additional guard page placed before the beginning of the - * region may also kill the process if a buffer underflow is detected. - * - * The memory layout is: - * [unprotected region size (read only)][guard page (no access)][unprotected pages (read/write)][guard page (no access)] - * With the layout of the unprotected pages being: - * [optional padding][16-bytes canary][user region] - * - * However: - * - These functions are significantly slower than standard functions - * - Each allocation requires 3 or 4 additional pages - * - The returned address will not be aligned if the allocation size is not - * a multiple of the required alignment. For this reason, these functions - * are designed to store data, such as secret keys and messages. - * - * sodium_malloc() can be used to allocate any libsodium data structure, - * with the exception of crypto_generichash_state. - * - * The crypto_generichash_state structure is packed and its length is - * either 357 or 361 bytes. For this reason, when using sodium_malloc() to - * allocate a crypto_generichash_state structure, padding must be added in - * order to ensure proper alignment: - * state = sodium_malloc((crypto_generichash_statebytes() + (size_t) 63U) - * & ~(size_t) 63U); - */ - -SODIUM_EXPORT -void *sodium_malloc(const size_t size); - -SODIUM_EXPORT -void *sodium_allocarray(size_t count, size_t size); - -SODIUM_EXPORT -void sodium_free(void *ptr); - -SODIUM_EXPORT -int sodium_mprotect_noaccess(void *ptr); - -SODIUM_EXPORT -int sodium_mprotect_readonly(void *ptr); - -SODIUM_EXPORT -int sodium_mprotect_readwrite(void *ptr); - -/* -------- */ - -int _sodium_alloc_init(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/version.h b/Pods/libsodium/src/libsodium/include/sodium/version.h deleted file mode 100644 index ce4fb6c..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/version.h +++ /dev/null @@ -1,29 +0,0 @@ - -#ifndef sodium_version_H -#define sodium_version_H - -#include "export.h" - -#define SODIUM_VERSION_STRING "1.0.3" - -#define SODIUM_LIBRARY_VERSION_MAJOR 7 -#define SODIUM_LIBRARY_VERSION_MINOR 5 - -#ifdef __cplusplus -extern "C" { -#endif - -SODIUM_EXPORT -const char *sodium_version_string(void); - -SODIUM_EXPORT -int sodium_library_version_major(void); - -SODIUM_EXPORT -int sodium_library_version_minor(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/include/sodium/version.h.in b/Pods/libsodium/src/libsodium/include/sodium/version.h.in deleted file mode 100644 index ef230ef..0000000 --- a/Pods/libsodium/src/libsodium/include/sodium/version.h.in +++ /dev/null @@ -1,29 +0,0 @@ - -#ifndef sodium_version_H -#define sodium_version_H - -#include "export.h" - -#define SODIUM_VERSION_STRING "@VERSION@" - -#define SODIUM_LIBRARY_VERSION_MAJOR @SODIUM_LIBRARY_VERSION_MAJOR@ -#define SODIUM_LIBRARY_VERSION_MINOR @SODIUM_LIBRARY_VERSION_MINOR@ - -#ifdef __cplusplus -extern "C" { -#endif - -SODIUM_EXPORT -const char *sodium_version_string(void); - -SODIUM_EXPORT -int sodium_library_version_major(void); - -SODIUM_EXPORT -int sodium_library_version_minor(void); - -#ifdef __cplusplus -} -#endif - -#endif diff --git a/Pods/libsodium/src/libsodium/randombytes/randombytes.c b/Pods/libsodium/src/libsodium/randombytes/randombytes.c deleted file mode 100644 index 53a7a2f..0000000 --- a/Pods/libsodium/src/libsodium/randombytes/randombytes.c +++ /dev/null @@ -1,144 +0,0 @@ - -#include - -#include -#include -#include - -#ifdef __EMSCRIPTEN__ -# include -#endif - -#include "randombytes.h" -#include "randombytes_sysrandom.h" - -#ifndef __EMSCRIPTEN__ -static const randombytes_implementation *implementation = - &randombytes_sysrandom_implementation; -#else -static const randombytes_implementation *implementation = NULL; -#endif - -int -randombytes_set_implementation(randombytes_implementation *impl) -{ - implementation = impl; - - return 0; -} - -const char * -randombytes_implementation_name(void) -{ -#ifndef __EMSCRIPTEN__ - return implementation->implementation_name(); -#else - return "js"; -#endif -} - -uint32_t -randombytes_random(void) -{ -#ifndef __EMSCRIPTEN__ - return implementation->random(); -#else - return EM_ASM_INT_V({ - return Module.getRandomValue(); - }); -#endif -} - -void -randombytes_stir(void) -{ -#ifndef __EMSCRIPTEN__ - if (implementation != NULL && implementation->stir != NULL) { - implementation->stir(); - } -#else - EM_ASM({ - if (Module.getRandomValue === undefined) { - try { - var crypto_ = ("object" === typeof window ? window : self).crypto, - randomValuesStandard = function() { - var buf = new Uint32Array(1); - crypto_.getRandomValues(buf); - return buf[0] >>> 0; - }; - randomValuesStandard(); - Module.getRandomValue = randomValuesStandard; - } catch (e) { - try { - var crypto = require('crypto'), - randomValueIOJS = function() { - var buf = crypto.randomBytes(4); - return (buf[0] << 24 | buf[1] << 16 | buf[2] << 8 | buf[3]) >>> 0; - }; - randomValueIOJS(); - Module.getRandomValue = randomValueIOJS; - } catch (e) { - throw 'No secure random number generator found'; - } - } - } - }); -#endif -} - -/* - * randombytes_uniform() derives from OpenBSD's arc4random_uniform() - * Copyright (c) 2008, Damien Miller - */ -uint32_t -randombytes_uniform(const uint32_t upper_bound) -{ - uint32_t min; - uint32_t r; - - if (implementation != NULL && implementation->uniform != NULL) { - return implementation->uniform(upper_bound); - } - if (upper_bound < 2) { - return 0; - } - min = (uint32_t) (-upper_bound % upper_bound); - do { - r = randombytes_random(); - } while (r < min); - - return r % upper_bound; -} - -void -randombytes_buf(void * const buf, const size_t size) -{ -#ifndef __EMSCRIPTEN__ - if (size > (size_t) 0U) { - implementation->buf(buf, size); - } -#else - unsigned char *p = buf; - size_t i; - - for (i = (size_t) 0U; i < size; i++) { - p[i] = (unsigned char) randombytes_random(); - } -#endif -} - -int -randombytes_close(void) -{ - if (implementation != NULL && implementation->close != NULL) { - return implementation->close(); - } - return 0; -} - -void -randombytes(unsigned char * const buf, const unsigned long long buf_len) -{ - assert(buf_len <= SIZE_MAX); - randombytes_buf(buf, (size_t) buf_len); -} diff --git a/Pods/libsodium/src/libsodium/randombytes/salsa20/randombytes_salsa20_random.c b/Pods/libsodium/src/libsodium/randombytes/salsa20/randombytes_salsa20_random.c deleted file mode 100644 index 43e2d0f..0000000 --- a/Pods/libsodium/src/libsodium/randombytes/salsa20/randombytes_salsa20_random.c +++ /dev/null @@ -1,403 +0,0 @@ - -#include -#ifndef _WIN32 -# include -# include -#endif -#ifdef __linux__ -# include -#endif - -#include -#include -#include -#include -#include -#include -#include -#ifndef _MSC_VER -# include -#endif - -#include "crypto_core_salsa20.h" -#include "crypto_auth_hmacsha512256.h" -#include "crypto_stream_salsa20.h" -#include "randombytes.h" -#include "randombytes_salsa20_random.h" -#include "utils.h" - -#ifdef _WIN32 -# include -# include -# define RtlGenRandom SystemFunction036 -# if defined(__cplusplus) -extern "C" -# endif -BOOLEAN NTAPI RtlGenRandom(PVOID RandomBuffer, ULONG RandomBufferLength); -# pragma comment(lib, "advapi32.lib") -#endif - -#define SALSA20_RANDOM_BLOCK_SIZE crypto_core_salsa20_OUTPUTBYTES -#define SHA512_BLOCK_SIZE 128U -#define SHA512_MIN_PAD_SIZE (1U + 16U) -#define COMPILER_ASSERT(X) (void) sizeof(char[(X) ? 1 : -1]) - -typedef struct Salsa20Random_ { - unsigned char key[crypto_stream_salsa20_KEYBYTES]; - unsigned char rnd32[16U * SALSA20_RANDOM_BLOCK_SIZE]; - uint64_t nonce; - size_t rnd32_outleft; -#ifndef _MSC_VER - pid_t pid; -#endif - int random_data_source_fd; - int initialized; - int getrandom_available; -} Salsa20Random; - -static Salsa20Random stream = { - SODIUM_C99(.random_data_source_fd =) -1, - SODIUM_C99(.rnd32_outleft =) (size_t) 0U, - SODIUM_C99(.initialized =) 0, - SODIUM_C99(.getrandom_available =) 0 -}; - -static uint64_t -sodium_hrtime(void) -{ - struct timeval tv; - uint64_t ts = (uint64_t) 0U; - int ret; - -#ifdef _WIN32 - struct _timeb tb; - -# pragma warning(push) -# pragma warning(disable: 4996) - _ftime(&tb); -# pragma warning(pop) - tv.tv_sec = (long) tb.time; - tv.tv_usec = ((int) tb.millitm) * 1000; - ret = 0; -#else - ret = gettimeofday(&tv, NULL); -#endif - assert(ret == 0); - if (ret == 0) { - ts = (uint64_t) tv.tv_sec * 1000000U + (uint64_t) tv.tv_usec; - } - return ts; -} - -#ifndef _WIN32 -static ssize_t -safe_read(const int fd, void * const buf_, size_t size) -{ - unsigned char *buf = (unsigned char *) buf_; - ssize_t readnb; - - assert(size > (size_t) 0U); - do { - while ((readnb = read(fd, buf, size)) < (ssize_t) 0 && - (errno == EINTR || errno == EAGAIN)); /* LCOV_EXCL_LINE */ - if (readnb < (ssize_t) 0) { - return readnb; /* LCOV_EXCL_LINE */ - } - if (readnb == (ssize_t) 0) { - break; /* LCOV_EXCL_LINE */ - } - size -= (size_t) readnb; - buf += readnb; - } while (size > (ssize_t) 0); - - return (ssize_t) (buf - (unsigned char *) buf_); -} -#endif - -#ifndef _WIN32 -static int -randombytes_salsa20_random_random_dev_open(void) -{ -/* LCOV_EXCL_START */ - struct stat st; - static const char *devices[] = { -# ifndef USE_BLOCKING_RANDOM - "/dev/urandom", -# endif - "/dev/random", NULL - }; - const char ** device = devices; - int fd; - - do { - fd = open(*device, O_RDONLY); - if (fd != -1) { - if (fstat(fd, &st) == 0 && S_ISCHR(st.st_mode)) { -# if defined(F_SETFD) && defined(FD_CLOEXEC) - (void) fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC); -# endif - return fd; - } - (void) close(fd); - } else if (errno == EINTR) { - continue; - } - device++; - } while (*device != NULL); - - errno = EIO; - return -1; -/* LCOV_EXCL_STOP */ -} - -#ifdef SYS_getrandom -static int -_randombytes_linux_getrandom(void * const buf, const size_t size) -{ - int readnb; - - assert(size <= 256U); - do { - readnb = syscall(SYS_getrandom, buf, (int) size, 0); - } while (readnb < 0 && (errno == EINTR || errno == EAGAIN)); - - return (readnb == (int) size) - 1; -} - -static int -randombytes_linux_getrandom(void * const buf_, size_t size) -{ - unsigned char *buf = (unsigned char *) buf_; - size_t chunk_size = 256U; - - do { - if (size < chunk_size) { - chunk_size = size; - assert(chunk_size > (size_t) 0U); - } - if (_randombytes_linux_getrandom(buf, chunk_size) != 0) { - return -1; - } - size -= chunk_size; - buf += chunk_size; - } while (size > (size_t) 0U); - - return 0; -} -#endif - -static void -randombytes_salsa20_random_init(void) -{ - const int errno_save = errno; - - stream.nonce = sodium_hrtime(); - assert(stream.nonce != (uint64_t) 0U); - -# ifdef SYS_getrandom - { - unsigned char fodder[16]; - - if (randombytes_linux_getrandom(fodder, sizeof fodder) == 0) { - stream.getrandom_available = 1; - errno = errno_save; - return; - } - stream.getrandom_available = 0; - } -# endif - - if ((stream.random_data_source_fd = - randombytes_salsa20_random_random_dev_open()) == -1) { - abort(); /* LCOV_EXCL_LINE */ - } - errno = errno_save; -} - -#else /* _WIN32 */ - -static void -randombytes_salsa20_random_init(void) -{ - stream.nonce = sodium_hrtime(); - assert(stream.nonce != (uint64_t) 0U); -} -#endif - -void -randombytes_salsa20_random_stir(void) -{ - const unsigned char s[crypto_auth_hmacsha512256_KEYBYTES] = { - 'T', 'h', 'i', 's', 'I', 's', 'J', 'u', 's', 't', 'A', 'T', - 'h', 'i', 'r', 't', 'y', 'T', 'w', 'o', 'B', 'y', 't', 'e', - 's', 'S', 'e', 'e', 'd', '.', '.', '.' - }; - unsigned char m0[crypto_auth_hmacsha512256_BYTES + - 2U * SHA512_BLOCK_SIZE - SHA512_MIN_PAD_SIZE]; - unsigned char *k0 = m0 + crypto_auth_hmacsha512256_BYTES; - size_t i; - size_t sizeof_k0 = sizeof m0 - crypto_auth_hmacsha512256_BYTES; - - memset(stream.rnd32, 0, sizeof stream.rnd32); - stream.rnd32_outleft = (size_t) 0U; - if (stream.initialized == 0) { - randombytes_salsa20_random_init(); - stream.initialized = 1; - } -#ifndef _WIN32 -# ifdef SYS_getrandom - if (stream.getrandom_available != 0) { - if (randombytes_linux_getrandom(m0, sizeof m0) != 0) { - abort(); /* LCOV_EXCL_LINE */ - } - } else if (stream.random_data_source_fd == -1 || - safe_read(stream.random_data_source_fd, m0, - sizeof m0) != (ssize_t) sizeof m0) { - abort(); /* LCOV_EXCL_LINE */ - } -# else - if (stream.random_data_source_fd == -1 || - safe_read(stream.random_data_source_fd, m0, - sizeof m0) != (ssize_t) sizeof m0) { - abort(); /* LCOV_EXCL_LINE */ - } -# endif -#else /* _WIN32 */ - if (! RtlGenRandom((PVOID) m0, (ULONG) sizeof m0)) { - abort(); /* LCOV_EXCL_LINE */ - } -#endif - COMPILER_ASSERT(sizeof stream.key == crypto_auth_hmacsha512256_BYTES); - crypto_auth_hmacsha512256(stream.key, k0, sizeof_k0, s); - COMPILER_ASSERT(sizeof stream.key <= sizeof m0); - for (i = (size_t) 0U; i < sizeof stream.key; i++) { - stream.key[i] ^= m0[i]; - } - sodium_memzero(m0, sizeof m0); -} - -static void -randombytes_salsa20_random_stir_if_needed(void) -{ -#ifdef _MSC_VER - if (stream.initialized == 0) { - randombytes_salsa20_random_stir(); - } -#else - const pid_t pid = getpid(); - - if (stream.initialized == 0 || stream.pid != pid) { - stream.pid = pid; - randombytes_salsa20_random_stir(); - } -#endif -} - -static void -randombytes_salsa20_random_rekey(const unsigned char * const mix) -{ - unsigned char *key = stream.key; - size_t i; - - for (i = (size_t) 0U; i < sizeof stream.key; i++) { - key[i] ^= mix[i]; - } -} - -static uint32_t -randombytes_salsa20_random_getword(void) -{ - uint32_t val; - int ret; - - COMPILER_ASSERT(sizeof stream.rnd32 >= (sizeof stream.key) + (sizeof val)); - COMPILER_ASSERT(((sizeof stream.rnd32) - (sizeof stream.key)) - % sizeof val == (size_t) 0U); - if (stream.rnd32_outleft <= (size_t) 0U) { - randombytes_salsa20_random_stir_if_needed(); - COMPILER_ASSERT(sizeof stream.nonce == crypto_stream_salsa20_NONCEBYTES); - ret = crypto_stream_salsa20((unsigned char *) stream.rnd32, - (unsigned long long) sizeof stream.rnd32, - (unsigned char *) &stream.nonce, - stream.key); - assert(ret == 0); - stream.rnd32_outleft = (sizeof stream.rnd32) - (sizeof stream.key); - randombytes_salsa20_random_rekey(&stream.rnd32[stream.rnd32_outleft]); - stream.nonce++; - } - stream.rnd32_outleft -= sizeof val; - memcpy(&val, &stream.rnd32[stream.rnd32_outleft], sizeof val); - memset(&stream.rnd32[stream.rnd32_outleft], 0, sizeof val); - - return val; -} - -int -randombytes_salsa20_random_close(void) -{ - int ret = -1; - -#ifndef _WIN32 - if (stream.random_data_source_fd != -1 && - close(stream.random_data_source_fd) == 0) { - stream.random_data_source_fd = -1; - stream.initialized = 0; - ret = 0; - } -# ifdef SYS_getrandom - if (stream.getrandom_available != 0) { - ret = 0; - } -# endif -#else /* _WIN32 */ - if (stream.initialized != 0) { - stream.initialized = 0; - ret = 0; - } -#endif - return ret; -} - -uint32_t -randombytes_salsa20_random(void) -{ - return randombytes_salsa20_random_getword(); -} - -void -randombytes_salsa20_random_buf(void * const buf, const size_t size) -{ - size_t i; - int ret; - - randombytes_salsa20_random_stir_if_needed(); - COMPILER_ASSERT(sizeof stream.nonce == crypto_stream_salsa20_NONCEBYTES); -#ifdef ULONG_LONG_MAX - /* coverity[result_independent_of_operands] */ - assert(size <= ULONG_LONG_MAX); -#endif - ret = crypto_stream_salsa20((unsigned char *) buf, (unsigned long long) size, - (unsigned char *) &stream.nonce, stream.key); - assert(ret == 0); - for (i = 0U; i < sizeof size; i++) { - stream.key[i] ^= ((const unsigned char *) (const void *) &size)[i]; - } - stream.nonce++; - crypto_stream_salsa20_xor(stream.key, stream.key, sizeof stream.key, - (unsigned char *) &stream.nonce, stream.key); -} - -const char * -randombytes_salsa20_implementation_name(void) -{ - return "salsa20"; -} - -struct randombytes_implementation randombytes_salsa20_implementation = { - SODIUM_C99(.implementation_name =) randombytes_salsa20_implementation_name, - SODIUM_C99(.random =) randombytes_salsa20_random, - SODIUM_C99(.stir =) randombytes_salsa20_random_stir, - SODIUM_C99(.uniform =) NULL, - SODIUM_C99(.buf =) randombytes_salsa20_random_buf, - SODIUM_C99(.close =) randombytes_salsa20_random_close -}; diff --git a/Pods/libsodium/src/libsodium/randombytes/sysrandom/randombytes_sysrandom.c b/Pods/libsodium/src/libsodium/randombytes/sysrandom/randombytes_sysrandom.c deleted file mode 100644 index 5d836a1..0000000 --- a/Pods/libsodium/src/libsodium/randombytes/sysrandom/randombytes_sysrandom.c +++ /dev/null @@ -1,304 +0,0 @@ - -#include -#ifndef _WIN32 -# include -# include -#endif -#ifdef __linux__ -# include -#endif - -#include -#include -#include -#include -#include -#include -#include -#ifndef _WIN32 -# include -#endif - -#include "randombytes.h" -#include "randombytes_sysrandom.h" -#include "utils.h" - -#ifdef _WIN32 -# include -# define RtlGenRandom SystemFunction036 -# if defined(__cplusplus) -extern "C" -# endif -BOOLEAN NTAPI RtlGenRandom(PVOID RandomBuffer, ULONG RandomBufferLength); -# pragma comment(lib, "advapi32.lib") -#endif - -#ifdef __OpenBSD__ - -uint32_t -randombytes_sysrandom(void) -{ - return arc4random(); -} - -void -randombytes_sysrandom_stir(void) -{ -} - -void -randombytes_sysrandom_buf(void * const buf, const size_t size) -{ - return arc4random_buf(buf, size); -} - -int -randombytes_sysrandom_close(void) -{ - return 0; -} - -#else /* __OpenBSD__ */ - -typedef struct SysRandom_ { - int random_data_source_fd; - int initialized; - int getrandom_available; -} SysRandom; - -static SysRandom stream = { - SODIUM_C99(.random_data_source_fd =) -1, - SODIUM_C99(.initialized =) 0, - SODIUM_C99(.getrandom_available =) 0 -}; - -#ifndef _WIN32 -static ssize_t -safe_read(const int fd, void * const buf_, size_t size) -{ - unsigned char *buf = (unsigned char *) buf_; - ssize_t readnb; - - assert(size > (size_t) 0U); - do { - while ((readnb = read(fd, buf, size)) < (ssize_t) 0 && - (errno == EINTR || errno == EAGAIN)); /* LCOV_EXCL_LINE */ - if (readnb < (ssize_t) 0) { - return readnb; /* LCOV_EXCL_LINE */ - } - if (readnb == (ssize_t) 0) { - break; /* LCOV_EXCL_LINE */ - } - size -= (size_t) readnb; - buf += readnb; - } while (size > (ssize_t) 0); - - return (ssize_t) (buf - (unsigned char *) buf_); -} -#endif - -#ifndef _WIN32 -static int -randombytes_sysrandom_random_dev_open(void) -{ -/* LCOV_EXCL_START */ - struct stat st; - static const char *devices[] = { -# ifndef USE_BLOCKING_RANDOM - "/dev/urandom", -# endif - "/dev/random", NULL - }; - const char ** device = devices; - int fd; - - do { - fd = open(*device, O_RDONLY); - if (fd != -1) { - if (fstat(fd, &st) == 0 && S_ISCHR(st.st_mode)) { -# if defined(F_SETFD) && defined(FD_CLOEXEC) - (void) fcntl(fd, F_SETFD, fcntl(fd, F_GETFD) | FD_CLOEXEC); -# endif - return fd; - } - (void) close(fd); - } else if (errno == EINTR) { - continue; - } - device++; - } while (*device != NULL); - - errno = EIO; - return -1; -/* LCOV_EXCL_STOP */ -} - -# ifdef SYS_getrandom -static int -_randombytes_linux_getrandom(void * const buf, const size_t size) -{ - int readnb; - - assert(size <= 256U); - do { - readnb = syscall(SYS_getrandom, buf, (int) size, 0); - } while (readnb < 0 && (errno == EINTR || errno == EAGAIN)); - - return (readnb == (int) size) - 1; -} - -static int -randombytes_linux_getrandom(void * const buf_, size_t size) -{ - unsigned char *buf = (unsigned char *) buf_; - size_t chunk_size = 256U; - - do { - if (size < chunk_size) { - chunk_size = size; - assert(chunk_size > (size_t) 0U); - } - if (_randombytes_linux_getrandom(buf, chunk_size) != 0) { - return -1; - } - size -= chunk_size; - buf += chunk_size; - } while (size > (size_t) 0U); - - return 0; -} -# endif - -static void -randombytes_sysrandom_init(void) -{ - const int errno_save = errno; - -# ifdef SYS_getrandom - { - unsigned char fodder[16]; - - if (randombytes_linux_getrandom(fodder, sizeof fodder) == 0) { - stream.getrandom_available = 1; - errno = errno_save; - return; - } - stream.getrandom_available = 0; - } -# endif - - if ((stream.random_data_source_fd = - randombytes_sysrandom_random_dev_open()) == -1) { - abort(); /* LCOV_EXCL_LINE */ - } - errno = errno_save; -} - -#else /* _WIN32 */ - -static void -randombytes_sysrandom_init(void) -{ -} -#endif - -void -randombytes_sysrandom_stir(void) -{ - if (stream.initialized == 0) { - randombytes_sysrandom_init(); - stream.initialized = 1; - } -} - -static void -randombytes_sysrandom_stir_if_needed(void) -{ - if (stream.initialized == 0) { - randombytes_sysrandom_stir(); - } -} - -int -randombytes_sysrandom_close(void) -{ - int ret = -1; - -#ifndef _WIN32 - if (stream.random_data_source_fd != -1 && - close(stream.random_data_source_fd) == 0) { - stream.random_data_source_fd = -1; - stream.initialized = 0; - ret = 0; - } -# ifdef SYS_getrandom - if (stream.getrandom_available != 0) { - ret = 0; - } -# endif -#else /* _WIN32 */ - if (stream.initialized != 0) { - stream.initialized = 0; - ret = 0; - } -#endif - return ret; -} - -uint32_t -randombytes_sysrandom(void) -{ - uint32_t r; - - randombytes_sysrandom_buf(&r, sizeof r); - - return r; -} - -void -randombytes_sysrandom_buf(void * const buf, const size_t size) -{ - randombytes_sysrandom_stir_if_needed(); -#ifdef ULONG_LONG_MAX - /* coverity[result_independent_of_operands] */ - assert(size <= ULONG_LONG_MAX); -#endif -#ifndef _WIN32 -# ifdef SYS_getrandom - if (stream.getrandom_available != 0) { - if (randombytes_linux_getrandom(buf, size) != 0) { - abort(); - } - return; - } -# endif - if (stream.random_data_source_fd == -1 || - safe_read(stream.random_data_source_fd, buf, size) != (ssize_t) size) { - abort(); /* LCOV_EXCL_LINE */ - } -#else - if (size > (size_t) 0xffffffff) { - abort(); /* LCOV_EXCL_LINE */ - } - if (! RtlGenRandom((PVOID) buf, (ULONG) size)) { - abort(); /* LCOV_EXCL_LINE */ - } -#endif -} - -#endif /* __OpenBSD__ */ - -const char * -randombytes_sysrandom_implementation_name(void) -{ - return "sysrandom"; -} - -struct randombytes_implementation randombytes_sysrandom_implementation = { - SODIUM_C99(.implementation_name =) randombytes_sysrandom_implementation_name, - SODIUM_C99(.random =) randombytes_sysrandom, - SODIUM_C99(.stir =) randombytes_sysrandom_stir, - SODIUM_C99(.uniform =) NULL, - SODIUM_C99(.buf =) randombytes_sysrandom_buf, - SODIUM_C99(.close =) randombytes_sysrandom_close -}; diff --git a/Pods/libsodium/src/libsodium/sodium/core.c b/Pods/libsodium/src/libsodium/sodium/core.c deleted file mode 100644 index 367f275..0000000 --- a/Pods/libsodium/src/libsodium/sodium/core.c +++ /dev/null @@ -1,25 +0,0 @@ - -#include "core.h" -#include "crypto_onetimeauth.h" -#include "randombytes.h" -#include "runtime.h" -#include "utils.h" - -static int initialized; - -int -sodium_init(void) -{ - if (initialized != 0) { - return 1; - } - sodium_runtime_get_cpu_features(); - if (crypto_onetimeauth_pick_best_implementation() == NULL) { - return -1; /* LCOV_EXCL_LINE */ - } - randombytes_stir(); - _sodium_alloc_init(); - initialized = 1; - - return 0; -} diff --git a/Pods/libsodium/src/libsodium/sodium/runtime.c b/Pods/libsodium/src/libsodium/sodium/runtime.c deleted file mode 100644 index 3e424a0..0000000 --- a/Pods/libsodium/src/libsodium/sodium/runtime.c +++ /dev/null @@ -1,134 +0,0 @@ - -#ifdef HAVE_ANDROID_GETCPUFEATURES -# include -#endif - -#include "runtime.h" - -typedef struct CPUFeatures_ { - int initialized; - int has_neon; - int has_sse2; - int has_sse3; -} CPUFeatures; - -static CPUFeatures _cpu_features; - -#define CPUID_SSE2 0x04000000 -#define CPUIDECX_SSE3 0x00000001 - -static int -_sodium_runtime_arm_cpu_features(CPUFeatures * const cpu_features) -{ -#ifndef __arm__ - cpu_features->has_neon = 0; - return -1; -#else -# ifdef __APPLE__ -# ifdef __ARM_NEON__ - cpu_features->has_neon = 1; -# else - cpu_features->has_neon = 0; -# endif -# elif defined(HAVE_ANDROID_GETCPUFEATURES) && defined(ANDROID_CPU_ARM_FEATURE_NEON) - cpu_features->has_neon = - (android_getCpuFeatures() & ANDROID_CPU_ARM_FEATURE_NEON) != 0x0; -# else - cpu_features->has_neon = 0; -# endif - return 0; -#endif -} - -static void -_cpuid(unsigned int cpu_info[4U], const unsigned int cpu_info_type) -{ -#ifdef _MSC_VER - __cpuid((int *) cpu_info, cpu_info_type); -#elif defined(HAVE_CPUID) - cpu_info[0] = cpu_info[1] = cpu_info[2] = cpu_info[3] = 0; -# ifdef __i386__ - __asm__ __volatile__ ("pushfl; pushfl; " - "popl %0; " - "movl %0, %1; xorl %2, %0; " - "pushl %0; " - "popfl; pushfl; popl %0; popfl" : - "=&r" (cpu_info[0]), "=&r" (cpu_info[1]) : - "i" (0x200000)); - if (((cpu_info[0] ^ cpu_info[1]) & 0x200000) == 0x0) { - return; /* LCOV_EXCL_LINE */ - } -# endif -# ifdef __i386__ - __asm__ __volatile__ ("xchgl %%ebx, %k1; cpuid; xchgl %%ebx, %k1" : - "=a" (cpu_info[0]), "=&r" (cpu_info[1]), - "=c" (cpu_info[2]), "=d" (cpu_info[3]) : - "0" (cpu_info_type), "2" (0U)); -# elif defined(__x86_64__) - __asm__ __volatile__ ("xchgq %%rbx, %q1; cpuid; xchgq %%rbx, %q1" : - "=a" (cpu_info[0]), "=&r" (cpu_info[1]), - "=c" (cpu_info[2]), "=d" (cpu_info[3]) : - "0" (cpu_info_type), "2" (0U)); -# else - __asm__ __volatile__ ("cpuid" : - "=a" (cpu_info[0]), "=b" (cpu_info[1]), - "=c" (cpu_info[2]), "=d" (cpu_info[3]) : - "0" (cpu_info_type), "2" (0U)); -# endif -#else - cpu_info[0] = cpu_info[1] = cpu_info[2] = cpu_info[3] = 0; -#endif -} - -static int -_sodium_runtime_intel_cpu_features(CPUFeatures * const cpu_features) -{ - unsigned int cpu_info[4]; - unsigned int id; - - _cpuid(cpu_info, 0x0); - if ((id = cpu_info[0]) == 0U) { - return -1; /* LCOV_EXCL_LINE */ - } - _cpuid(cpu_info, 0x00000001); -#ifndef HAVE_EMMINTRIN_H - cpu_features->has_sse2 = 0; -#else - cpu_features->has_sse2 = ((cpu_info[3] & CPUID_SSE2) != 0x0); -#endif - -#ifndef HAVE_PMMINTRIN_H - cpu_features->has_sse3 = 0; -#else - cpu_features->has_sse3 = ((cpu_info[2] & CPUIDECX_SSE3) != 0x0); -#endif - - return 0; -} - -int -sodium_runtime_get_cpu_features(void) -{ - int ret = -1; - - ret &= _sodium_runtime_arm_cpu_features(&_cpu_features); - ret &= _sodium_runtime_intel_cpu_features(&_cpu_features); - _cpu_features.initialized = 1; - - return ret; -} - -int -sodium_runtime_has_neon(void) { - return _cpu_features.has_neon; -} - -int -sodium_runtime_has_sse2(void) { - return _cpu_features.has_sse2; -} - -int -sodium_runtime_has_sse3(void) { - return _cpu_features.has_sse3; -} diff --git a/Pods/libsodium/src/libsodium/sodium/utils.c b/Pods/libsodium/src/libsodium/sodium/utils.c deleted file mode 100644 index 607f252..0000000 --- a/Pods/libsodium/src/libsodium/sodium/utils.c +++ /dev/null @@ -1,508 +0,0 @@ -#ifndef __STDC_WANT_LIB_EXT1__ -# define __STDC_WANT_LIB_EXT1__ 1 -#endif -#include -#include -#include -#include -#include -#include -#include -#include - -#ifdef HAVE_SYS_MMAN_H -# include -#endif - -#include "utils.h" -#include "randombytes.h" -#ifdef _WIN32 -# include -# include -#else -# include -#endif - -#define CANARY_SIZE 16U -#define GARBAGE_VALUE 0xd0 - -#ifndef MAP_NOCORE -# define MAP_NOCORE 0 -#endif -#if !defined(MAP_ANON) && defined(MAP_ANONYMOUS) -# define MAP_ANON MAP_ANONYMOUS -#endif -#if defined(_WIN32) || (defined(MAP_ANON) && defined(HAVE_MMAP)) || defined(HAVE_POSIX_MEMALIGN) -# define HAVE_ALIGNED_MALLOC -#endif -#if defined(HAVE_MPROTECT) && !(defined(PROT_NONE) && defined(PROT_READ) && defined(PROT_WRITE)) -# undef HAVE_MPROTECT -#endif -#if defined(HAVE_ALIGNED_MALLOC) && (defined(_WIN32) || defined(HAVE_MPROTECT)) -# define HAVE_PAGE_PROTECTION -#endif - -static size_t page_size; -static unsigned char canary[CANARY_SIZE]; - -#ifdef HAVE_WEAK_SYMBOLS -__attribute__((weak)) void -_sodium_dummy_symbol_to_prevent_lto(void * const pnt, const size_t len) -{ - (void) pnt; - (void) len; -} -#endif - -void -sodium_memzero(void * const pnt, const size_t len) -{ -#ifdef _WIN32 - SecureZeroMemory(pnt, len); -#elif defined(HAVE_MEMSET_S) - if (memset_s(pnt, (rsize_t) len, 0, (rsize_t) len) != 0) { - abort(); /* LCOV_EXCL_LINE */ - } -#elif defined(HAVE_EXPLICIT_BZERO) - explicit_bzero(pnt, len); -#elif HAVE_WEAK_SYMBOLS - memset(pnt, 0, len); - _sodium_dummy_symbol_to_prevent_lto(pnt, len); -#else - volatile unsigned char *pnt_ = (volatile unsigned char *) pnt; - size_t i = (size_t) 0U; - - while (i < len) { - pnt_[i++] = 0U; - } -#endif -} - -int -sodium_memcmp(const void * const b1_, const void * const b2_, size_t len) -{ - const unsigned char *b1 = (const unsigned char *) b1_; - const unsigned char *b2 = (const unsigned char *) b2_; - size_t i; - unsigned char d = (unsigned char) 0U; - - for (i = 0U; i < len; i++) { - d |= b1[i] ^ b2[i]; - } - return (int) ((1 & ((d - 1) >> 8)) - 1); -} - -/* Derived from original code by CodesInChaos */ -char * -sodium_bin2hex(char * const hex, const size_t hex_maxlen, - const unsigned char * const bin, const size_t bin_len) -{ - size_t i = (size_t) 0U; - unsigned int x; - int b; - int c; - - if (bin_len >= SIZE_MAX / 2 || hex_maxlen < bin_len * 2U) { - abort(); /* LCOV_EXCL_LINE */ - } - while (i < bin_len) { - c = bin[i] & 0xf; - b = bin[i] >> 4; - x = (unsigned char) (87U + c + (((c - 10U) >> 8) & ~38U)) << 8 | - (unsigned char) (87U + b + (((b - 10U) >> 8) & ~38U)); - hex[i * 2U] = (char) x; - x >>= 8; - hex[i * 2U + 1U] = (char) x; - i++; - } - hex[i * 2U] = 0U; - - return hex; -} - -int -sodium_hex2bin(unsigned char * const bin, const size_t bin_maxlen, - const char * const hex, const size_t hex_len, - const char * const ignore, size_t * const bin_len, - const char ** const hex_end) -{ - size_t bin_pos = (size_t) 0U; - size_t hex_pos = (size_t) 0U; - int ret = 0; - unsigned char c; - unsigned char c_acc = 0U; - unsigned char c_alpha0, c_alpha; - unsigned char c_num0, c_num; - unsigned char c_val; - unsigned char state = 0U; - - while (hex_pos < hex_len) { - c = (unsigned char) hex[hex_pos]; - c_num = c ^ 48U; - c_num0 = (c_num - 10U) >> 8; - c_alpha = (c & ~32U) - 55U; - c_alpha0 = ((c_alpha - 10U) ^ (c_alpha - 16U)) >> 8; - if ((c_num0 | c_alpha0) == 0U) { - if (ignore != NULL && state == 0U && strchr(ignore, c) != NULL) { - hex_pos++; - continue; - } - break; - } - c_val = (c_num0 & c_num) | (c_alpha0 & c_alpha); - if (bin_pos >= bin_maxlen) { - ret = -1; - errno = ERANGE; - break; - } - if (state == 0U) { - c_acc = c_val * 16U; - } else { - bin[bin_pos++] = c_acc | c_val; - } - state = ~state; - hex_pos++; - } - if (state != 0U) { - hex_pos--; - } - if (hex_end != NULL) { - *hex_end = &hex[hex_pos]; - } - if (bin_len != NULL) { - *bin_len = bin_pos; - } - return ret; -} - -int -_sodium_alloc_init(void) -{ -#ifdef HAVE_ALIGNED_MALLOC -# if defined(_SC_PAGESIZE) - long page_size_ = sysconf(_SC_PAGESIZE); - if (page_size_ > 0L) { - page_size = (size_t) page_size_; - } -# elif defined(_WIN32) - SYSTEM_INFO si; - GetSystemInfo(&si); - page_size = (size_t) si.dwPageSize; -# endif - if (page_size < CANARY_SIZE || page_size < sizeof(size_t)) { - abort(); /* LCOV_EXCL_LINE */ - } -#endif - randombytes_buf(canary, sizeof canary); - - return 0; -} - -int -sodium_mlock(void * const addr, const size_t len) -{ -#if defined(MADV_DONTDUMP) && defined(HAVE_MADVISE) - (void) madvise(addr, len, MADV_DONTDUMP); -#endif -#ifdef HAVE_MLOCK - return mlock(addr, len); -#elif defined(_WIN32) - return -(VirtualLock(addr, len) == 0); -#else - errno = ENOSYS; - return -1; -#endif -} - -int -sodium_munlock(void * const addr, const size_t len) -{ - sodium_memzero(addr, len); -#if defined(MADV_DODUMP) && defined(HAVE_MADVISE) - (void) madvise(addr, len, MADV_DODUMP); -#endif -#ifdef HAVE_MLOCK - return munlock(addr, len); -#elif defined(_WIN32) - return -(VirtualUnlock(addr, len) == 0); -#else - errno = ENOSYS; - return -1; -#endif -} - -static int -_mprotect_noaccess(void *ptr, size_t size) -{ -#ifdef HAVE_MPROTECT - return mprotect(ptr, size, PROT_NONE); -#elif defined(_WIN32) - DWORD old; - return -(VirtualProtect(ptr, size, PAGE_NOACCESS, &old) == 0); -#else - errno = ENOSYS; - return -1; -#endif -} - -static int -_mprotect_readonly(void *ptr, size_t size) -{ -#ifdef HAVE_MPROTECT - return mprotect(ptr, size, PROT_READ); -#elif defined(_WIN32) - DWORD old; - return -(VirtualProtect(ptr, size, PAGE_READONLY, &old) == 0); -#else - errno = ENOSYS; - return -1; -#endif -} - -static int -_mprotect_readwrite(void *ptr, size_t size) -{ -#ifdef HAVE_MPROTECT - return mprotect(ptr, size, PROT_READ | PROT_WRITE); -#elif defined(_WIN32) - DWORD old; - return -(VirtualProtect(ptr, size, PAGE_READWRITE, &old) == 0); -#else - errno = ENOSYS; - return -1; -#endif -} - -#ifdef HAVE_ALIGNED_MALLOC - -static void -_out_of_bounds(void) -{ -# ifdef SIGSEGV - raise(SIGSEGV); -# elif defined(SIGKILL) - raise(SIGKILL); -# endif - abort(); -} /* LCOV_EXCL_LINE */ - -static inline size_t -_page_round(const size_t size) -{ - const size_t page_mask = page_size - 1U; - - return (size + page_mask) & ~page_mask; -} - -static __attribute__((malloc)) unsigned char * -_alloc_aligned(const size_t size) -{ - void *ptr; - -# if defined(MAP_ANON) && defined(HAVE_MMAP) - if ((ptr = mmap(NULL, size, PROT_READ | PROT_WRITE, - MAP_ANON | MAP_PRIVATE | MAP_NOCORE, -1, 0)) == MAP_FAILED) { - ptr = NULL; /* LCOV_EXCL_LINE */ - } /* LCOV_EXCL_LINE */ -# elif defined(HAVE_POSIX_MEMALIGN) - if (posix_memalign(&ptr, page_size, size) != 0) { - ptr = NULL; /* LCOV_EXCL_LINE */ - } /* LCOV_EXCL_LINE */ -# elif defined(_WIN32) - ptr = VirtualAlloc(NULL, size, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE); -# else -# error Bug -# endif - return (unsigned char *) ptr; -} - -static void -_free_aligned(unsigned char * const ptr, const size_t size) -{ -# if defined(MAP_ANON) && defined(HAVE_MMAP) - (void) munmap(ptr, size); -# elif defined(HAVE_POSIX_MEMALIGN) - free(ptr); -# elif defined(_WIN32) - VirtualFree(ptr, 0U, MEM_RELEASE); -# else -# error Bug -# endif -} - -static unsigned char * -_unprotected_ptr_from_user_ptr(const void *ptr) -{ - uintptr_t unprotected_ptr_u; - unsigned char *canary_ptr; - size_t page_mask; - - canary_ptr = ((unsigned char *) ptr) - sizeof canary; - page_mask = page_size - 1U; - unprotected_ptr_u = ((uintptr_t) canary_ptr & (uintptr_t) ~page_mask); - if (unprotected_ptr_u <= page_size * 2U) { - abort(); /* LCOV_EXCL_LINE */ - } - return (unsigned char *) unprotected_ptr_u; -} - -#endif /* HAVE_ALIGNED_MALLOC */ - -#ifndef HAVE_ALIGNED_MALLOC -static __attribute__((malloc)) void * -_sodium_malloc(const size_t size) -{ - return malloc(size); -} -#else -static __attribute__((malloc)) void * -_sodium_malloc(const size_t size) -{ - void *user_ptr; - unsigned char *base_ptr; - unsigned char *canary_ptr; - unsigned char *unprotected_ptr; - size_t size_with_canary; - size_t total_size; - size_t unprotected_size; - - if (size >= (size_t) SIZE_MAX - page_size * 4U) { - errno = ENOMEM; - return NULL; - } - if (page_size <= sizeof canary || page_size < sizeof unprotected_size) { - abort(); /* LCOV_EXCL_LINE */ - } - size_with_canary = (sizeof canary) + size; - unprotected_size = _page_round(size_with_canary); - total_size = page_size + page_size + unprotected_size + page_size; - if ((base_ptr = _alloc_aligned(total_size)) == NULL) { - return NULL; /* LCOV_EXCL_LINE */ - } - unprotected_ptr = base_ptr + page_size * 2U; - _mprotect_noaccess(base_ptr + page_size, page_size); -# ifndef HAVE_PAGE_PROTECTION - memcpy(unprotected_ptr + unprotected_size, canary, sizeof canary); -# endif - _mprotect_noaccess(unprotected_ptr + unprotected_size, page_size); - sodium_mlock(unprotected_ptr, unprotected_size); - canary_ptr = unprotected_ptr + _page_round(size_with_canary) - - size_with_canary; - user_ptr = canary_ptr + sizeof canary; - memcpy(canary_ptr, canary, sizeof canary); - memcpy(base_ptr, &unprotected_size, sizeof unprotected_size); - _mprotect_readonly(base_ptr, page_size); - assert(_unprotected_ptr_from_user_ptr(user_ptr) == unprotected_ptr); - - return user_ptr; -} -#endif /* !HAVE_ALIGNED_MALLOC */ - -__attribute__((malloc)) void * -sodium_malloc(const size_t size) -{ - void *ptr; - - if ((ptr = _sodium_malloc(size)) == NULL) { - return NULL; /* LCOV_EXCL_LINE */ - } - memset(ptr, (int) GARBAGE_VALUE, size); - - return ptr; -} - -__attribute__((malloc)) void * -sodium_allocarray(size_t count, size_t size) -{ - size_t total_size; - - if (count > (size_t) 0U && size >= (size_t) SIZE_MAX / count) { - errno = ENOMEM; - return NULL; - } - total_size = count * size; - - return sodium_malloc(total_size); -} - -#ifndef HAVE_ALIGNED_MALLOC -void -sodium_free(void *ptr) -{ - free(ptr); -} -#else -void -sodium_free(void *ptr) -{ - unsigned char *base_ptr; - unsigned char *canary_ptr; - unsigned char *unprotected_ptr; - size_t total_size; - size_t unprotected_size; - - if (ptr == NULL) { - return; - } - canary_ptr = ((unsigned char *) ptr) - sizeof canary; - unprotected_ptr = _unprotected_ptr_from_user_ptr(ptr); - base_ptr = unprotected_ptr - page_size * 2U; - memcpy(&unprotected_size, base_ptr, sizeof unprotected_size); - total_size = page_size + page_size + unprotected_size + page_size; - _mprotect_readwrite(base_ptr, total_size); - if (sodium_memcmp(canary_ptr, canary, sizeof canary) != 0) { - _out_of_bounds(); - } -# ifndef HAVE_PAGE_PROTECTION - if (sodium_memcmp(unprotected_ptr + unprotected_size, - canary, sizeof canary) != 0) { - _out_of_bounds(); - } -# endif - sodium_munlock(unprotected_ptr, unprotected_size); - _free_aligned(base_ptr, total_size); -} -#endif /* HAVE_ALIGNED_MALLOC */ - -#ifndef HAVE_PAGE_PROTECTION -static int -_sodium_mprotect(void *ptr, int (*cb)(void *ptr, size_t size)) -{ - (void) ptr; - (void) cb; - errno = ENOSYS; - return -1; -} -#else -static int -_sodium_mprotect(void *ptr, int (*cb)(void *ptr, size_t size)) -{ - unsigned char *base_ptr; - unsigned char *unprotected_ptr; - size_t unprotected_size; - - unprotected_ptr = _unprotected_ptr_from_user_ptr(ptr); - base_ptr = unprotected_ptr - page_size * 2U; - memcpy(&unprotected_size, base_ptr, sizeof unprotected_size); - - return cb(unprotected_ptr, unprotected_size); -} -#endif - -int -sodium_mprotect_noaccess(void *ptr) -{ - return _sodium_mprotect(ptr, _mprotect_noaccess); -} - -int -sodium_mprotect_readonly(void *ptr) -{ - return _sodium_mprotect(ptr, _mprotect_readonly); -} - -int -sodium_mprotect_readwrite(void *ptr) -{ - return _sodium_mprotect(ptr, _mprotect_readwrite); -} diff --git a/Pods/libsodium/src/libsodium/sodium/version.c b/Pods/libsodium/src/libsodium/sodium/version.c deleted file mode 100644 index 4083c81..0000000 --- a/Pods/libsodium/src/libsodium/sodium/version.c +++ /dev/null @@ -1,20 +0,0 @@ - -#include "version.h" - -const char * -sodium_version_string(void) -{ - return SODIUM_VERSION_STRING; -} - -int -sodium_library_version_major(void) -{ - return SODIUM_LIBRARY_VERSION_MAJOR; -} - -int -sodium_library_version_minor(void) -{ - return SODIUM_LIBRARY_VERSION_MINOR; -} diff --git a/README.md b/README.md index 0f27e26..15db4b5 100644 --- a/README.md +++ b/README.md @@ -1,7 +1 @@ -ShadowVPN for iOS -================= - -Work in progress - -License: GPLv3 - +Removed according to regulations. diff --git a/ShadowVPN.xcodeproj/project.pbxproj b/ShadowVPN.xcodeproj/project.pbxproj deleted file mode 100644 index 4064def..0000000 --- a/ShadowVPN.xcodeproj/project.pbxproj +++ /dev/null @@ -1,556 +0,0 @@ -// !$*UTF8*$! -{ - archiveVersion = 1; - classes = { - }; - objectVersion = 46; - objects = { - -/* Begin PBXBuildFile section */ - 5EA8D9810A0C84460A50A3DA /* libPods-tunnel.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 5FC75A2A2AB75447D9D64CB9 /* libPods-tunnel.a */; }; - 620A5B881B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.c in Sources */ = {isa = PBXBuildFile; fileRef = 620A5B841B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.c */; }; - 620A5B891B5A9F1E00F98476 /* crypto.c in Sources */ = {isa = PBXBuildFile; fileRef = 620A5B861B5A9F1E00F98476 /* crypto.c */; }; - 620A5B901B5AA85800F98476 /* SVCrypto.m in Sources */ = {isa = PBXBuildFile; fileRef = 620A5B8F1B5AA85800F98476 /* SVCrypto.m */; }; - 62A427511B5A3C9700BB4AD9 /* AppDelegate.swift in Sources */ = {isa = PBXBuildFile; fileRef = 62A427501B5A3C9700BB4AD9 /* AppDelegate.swift */; }; - 62A427531B5A3C9700BB4AD9 /* ViewController.swift in Sources */ = {isa = PBXBuildFile; fileRef = 62A427521B5A3C9700BB4AD9 /* ViewController.swift */; }; - 62A427561B5A3C9700BB4AD9 /* Main.storyboard in Resources */ = {isa = PBXBuildFile; fileRef = 62A427541B5A3C9700BB4AD9 /* Main.storyboard */; }; - 62A427581B5A3C9700BB4AD9 /* Assets.xcassets in Resources */ = {isa = PBXBuildFile; fileRef = 62A427571B5A3C9700BB4AD9 /* Assets.xcassets */; }; - 62A4275B1B5A3C9700BB4AD9 /* LaunchScreen.storyboard in Resources */ = {isa = PBXBuildFile; fileRef = 62A427591B5A3C9700BB4AD9 /* LaunchScreen.storyboard */; }; - 62A427671B5A3E2500BB4AD9 /* NetworkExtension.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 62A427661B5A3E2500BB4AD9 /* NetworkExtension.framework */; }; - 62A427721B5A3ED800BB4AD9 /* PacketTunnelProvider.swift in Sources */ = {isa = PBXBuildFile; fileRef = 62A427711B5A3ED800BB4AD9 /* PacketTunnelProvider.swift */; }; - 62A427761B5A3ED800BB4AD9 /* tunnel.appex in Embed App Extensions */ = {isa = PBXBuildFile; fileRef = 62A4276D1B5A3ED800BB4AD9 /* tunnel.appex */; settings = {ATTRIBUTES = (RemoveHeadersOnCopy, ); }; }; -/* End PBXBuildFile section */ - -/* Begin PBXContainerItemProxy section */ - 62A427741B5A3ED800BB4AD9 /* PBXContainerItemProxy */ = { - isa = PBXContainerItemProxy; - containerPortal = 62A427451B5A3C9700BB4AD9 /* Project object */; - proxyType = 1; - remoteGlobalIDString = 62A4276C1B5A3ED800BB4AD9; - remoteInfo = tunnel; - }; -/* End PBXContainerItemProxy section */ - -/* Begin PBXCopyFilesBuildPhase section */ - 62A4277A1B5A3ED800BB4AD9 /* Embed App Extensions */ = { - isa = PBXCopyFilesBuildPhase; - buildActionMask = 2147483647; - dstPath = ""; - dstSubfolderSpec = 13; - files = ( - 62A427761B5A3ED800BB4AD9 /* tunnel.appex in Embed App Extensions */, - ); - name = "Embed App Extensions"; - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXCopyFilesBuildPhase section */ - -/* Begin PBXFileReference section */ - 52E22CBCA9CEB75CB469204A /* Pods-tunnel.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-tunnel.debug.xcconfig"; path = "Pods/Target Support Files/Pods-tunnel/Pods-tunnel.debug.xcconfig"; sourceTree = ""; }; - 5FC75A2A2AB75447D9D64CB9 /* libPods-tunnel.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-tunnel.a"; sourceTree = BUILT_PRODUCTS_DIR; }; - 620A5B821B5A9E3100F98476 /* tunnel-Bridging-Header.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = "tunnel-Bridging-Header.h"; sourceTree = ""; }; - 620A5B841B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = crypto_secretbox_salsa208poly1305.c; sourceTree = ""; }; - 620A5B851B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = crypto_secretbox_salsa208poly1305.h; sourceTree = ""; }; - 620A5B861B5A9F1E00F98476 /* crypto.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = crypto.c; sourceTree = ""; }; - 620A5B871B5A9F1E00F98476 /* crypto.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = crypto.h; sourceTree = ""; }; - 620A5B8E1B5AA85800F98476 /* SVCrypto.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = SVCrypto.h; sourceTree = ""; }; - 620A5B8F1B5AA85800F98476 /* SVCrypto.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = SVCrypto.m; sourceTree = ""; }; - 62A4274D1B5A3C9700BB4AD9 /* ShadowVPN.app */ = {isa = PBXFileReference; explicitFileType = wrapper.application; includeInIndex = 0; path = ShadowVPN.app; sourceTree = BUILT_PRODUCTS_DIR; }; - 62A427501B5A3C9700BB4AD9 /* AppDelegate.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = AppDelegate.swift; sourceTree = ""; }; - 62A427521B5A3C9700BB4AD9 /* ViewController.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ViewController.swift; sourceTree = ""; }; - 62A427551B5A3C9700BB4AD9 /* Base */ = {isa = PBXFileReference; lastKnownFileType = file.storyboard; name = Base; path = Base.lproj/Main.storyboard; sourceTree = ""; }; - 62A427571B5A3C9700BB4AD9 /* Assets.xcassets */ = {isa = PBXFileReference; lastKnownFileType = folder.assetcatalog; path = Assets.xcassets; sourceTree = ""; }; - 62A4275A1B5A3C9700BB4AD9 /* Base */ = {isa = PBXFileReference; lastKnownFileType = file.storyboard; name = Base; path = Base.lproj/LaunchScreen.storyboard; sourceTree = ""; }; - 62A4275C1B5A3C9700BB4AD9 /* Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = Info.plist; sourceTree = ""; }; - 62A427661B5A3E2500BB4AD9 /* NetworkExtension.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = NetworkExtension.framework; path = System/Library/Frameworks/NetworkExtension.framework; sourceTree = SDKROOT; }; - 62A427681B5A3E2500BB4AD9 /* ShadowVPN.entitlements */ = {isa = PBXFileReference; lastKnownFileType = text.xml; path = ShadowVPN.entitlements; sourceTree = ""; }; - 62A4276D1B5A3ED800BB4AD9 /* tunnel.appex */ = {isa = PBXFileReference; explicitFileType = "wrapper.app-extension"; includeInIndex = 0; path = tunnel.appex; sourceTree = BUILT_PRODUCTS_DIR; }; - 62A427701B5A3ED800BB4AD9 /* tunnel.entitlements */ = {isa = PBXFileReference; lastKnownFileType = text.xml; path = tunnel.entitlements; sourceTree = ""; }; - 62A427711B5A3ED800BB4AD9 /* PacketTunnelProvider.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PacketTunnelProvider.swift; sourceTree = ""; }; - 62A427731B5A3ED800BB4AD9 /* Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = Info.plist; sourceTree = ""; }; - F8715C8B6D2ECED571986A72 /* Pods-tunnel.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-tunnel.release.xcconfig"; path = "Pods/Target Support Files/Pods-tunnel/Pods-tunnel.release.xcconfig"; sourceTree = ""; }; -/* End PBXFileReference section */ - -/* Begin PBXFrameworksBuildPhase section */ - 62A4274A1B5A3C9700BB4AD9 /* Frameworks */ = { - isa = PBXFrameworksBuildPhase; - buildActionMask = 2147483647; - files = ( - 62A427671B5A3E2500BB4AD9 /* NetworkExtension.framework in Frameworks */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - 62A4276A1B5A3ED800BB4AD9 /* Frameworks */ = { - isa = PBXFrameworksBuildPhase; - buildActionMask = 2147483647; - files = ( - 5EA8D9810A0C84460A50A3DA /* libPods-tunnel.a in Frameworks */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXFrameworksBuildPhase section */ - -/* Begin PBXGroup section */ - 486E76D16A13A84BC2514505 /* Frameworks */ = { - isa = PBXGroup; - children = ( - 5FC75A2A2AB75447D9D64CB9 /* libPods-tunnel.a */, - ); - name = Frameworks; - sourceTree = ""; - }; - 620A5B831B5A9F0E00F98476 /* Crypto */ = { - isa = PBXGroup; - children = ( - 620A5B821B5A9E3100F98476 /* tunnel-Bridging-Header.h */, - 620A5B841B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.c */, - 620A5B851B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.h */, - 620A5B861B5A9F1E00F98476 /* crypto.c */, - 620A5B871B5A9F1E00F98476 /* crypto.h */, - 620A5B8E1B5AA85800F98476 /* SVCrypto.h */, - 620A5B8F1B5AA85800F98476 /* SVCrypto.m */, - ); - name = Crypto; - sourceTree = ""; - }; - 62A427441B5A3C9700BB4AD9 = { - isa = PBXGroup; - children = ( - 62A427661B5A3E2500BB4AD9 /* NetworkExtension.framework */, - 62A4274F1B5A3C9700BB4AD9 /* ShadowVPN */, - 62A4276E1B5A3ED800BB4AD9 /* tunnel */, - 62A4274E1B5A3C9700BB4AD9 /* Products */, - C8337FA84DBF382377A3AB97 /* Pods */, - 486E76D16A13A84BC2514505 /* Frameworks */, - ); - sourceTree = ""; - }; - 62A4274E1B5A3C9700BB4AD9 /* Products */ = { - isa = PBXGroup; - children = ( - 62A4274D1B5A3C9700BB4AD9 /* ShadowVPN.app */, - 62A4276D1B5A3ED800BB4AD9 /* tunnel.appex */, - ); - name = Products; - sourceTree = ""; - }; - 62A4274F1B5A3C9700BB4AD9 /* ShadowVPN */ = { - isa = PBXGroup; - children = ( - 62A427681B5A3E2500BB4AD9 /* ShadowVPN.entitlements */, - 62A427501B5A3C9700BB4AD9 /* AppDelegate.swift */, - 62A427521B5A3C9700BB4AD9 /* ViewController.swift */, - 62A427541B5A3C9700BB4AD9 /* Main.storyboard */, - 62A427571B5A3C9700BB4AD9 /* Assets.xcassets */, - 62A427591B5A3C9700BB4AD9 /* LaunchScreen.storyboard */, - 62A4275C1B5A3C9700BB4AD9 /* Info.plist */, - ); - path = ShadowVPN; - sourceTree = ""; - }; - 62A4276E1B5A3ED800BB4AD9 /* tunnel */ = { - isa = PBXGroup; - children = ( - 620A5B831B5A9F0E00F98476 /* Crypto */, - 62A427711B5A3ED800BB4AD9 /* PacketTunnelProvider.swift */, - 62A427731B5A3ED800BB4AD9 /* Info.plist */, - 62A4276F1B5A3ED800BB4AD9 /* Supporting Files */, - ); - path = tunnel; - sourceTree = ""; - }; - 62A4276F1B5A3ED800BB4AD9 /* Supporting Files */ = { - isa = PBXGroup; - children = ( - 62A427701B5A3ED800BB4AD9 /* tunnel.entitlements */, - ); - name = "Supporting Files"; - sourceTree = ""; - }; - C8337FA84DBF382377A3AB97 /* Pods */ = { - isa = PBXGroup; - children = ( - 52E22CBCA9CEB75CB469204A /* Pods-tunnel.debug.xcconfig */, - F8715C8B6D2ECED571986A72 /* Pods-tunnel.release.xcconfig */, - ); - name = Pods; - sourceTree = ""; - }; -/* End PBXGroup section */ - -/* Begin PBXNativeTarget section */ - 62A4274C1B5A3C9700BB4AD9 /* ShadowVPN */ = { - isa = PBXNativeTarget; - buildConfigurationList = 62A4275F1B5A3C9700BB4AD9 /* Build configuration list for PBXNativeTarget "ShadowVPN" */; - buildPhases = ( - 62A427491B5A3C9700BB4AD9 /* Sources */, - 62A4274A1B5A3C9700BB4AD9 /* Frameworks */, - 62A4274B1B5A3C9700BB4AD9 /* Resources */, - 62A4277A1B5A3ED800BB4AD9 /* Embed App Extensions */, - ); - buildRules = ( - ); - dependencies = ( - 62A427751B5A3ED800BB4AD9 /* PBXTargetDependency */, - ); - name = ShadowVPN; - productName = ShadowVPN; - productReference = 62A4274D1B5A3C9700BB4AD9 /* ShadowVPN.app */; - productType = "com.apple.product-type.application"; - }; - 62A4276C1B5A3ED800BB4AD9 /* tunnel */ = { - isa = PBXNativeTarget; - buildConfigurationList = 62A427771B5A3ED800BB4AD9 /* Build configuration list for PBXNativeTarget "tunnel" */; - buildPhases = ( - E4EB07B6CDD86D9D38054741 /* Check Pods Manifest.lock */, - 62A427691B5A3ED800BB4AD9 /* Sources */, - 62A4276A1B5A3ED800BB4AD9 /* Frameworks */, - 62A4276B1B5A3ED800BB4AD9 /* Resources */, - 0F5A1901A991DD08B2C3112B /* Copy Pods Resources */, - ); - buildRules = ( - ); - dependencies = ( - ); - name = tunnel; - productName = tunnel; - productReference = 62A4276D1B5A3ED800BB4AD9 /* tunnel.appex */; - productType = "com.apple.product-type.app-extension"; - }; -/* End PBXNativeTarget section */ - -/* Begin PBXProject section */ - 62A427451B5A3C9700BB4AD9 /* Project object */ = { - isa = PBXProject; - attributes = { - LastSwiftUpdateCheck = 0700; - LastUpgradeCheck = 0700; - ORGANIZATIONNAME = clowwindy; - TargetAttributes = { - 62A4274C1B5A3C9700BB4AD9 = { - CreatedOnToolsVersion = 7.0; - DevelopmentTeam = LND7PS23X9; - SystemCapabilities = { - com.apple.ApplicationGroups.iOS = { - enabled = 1; - }; - com.apple.Keychain = { - enabled = 1; - }; - com.apple.VPNLite = { - enabled = 1; - }; - }; - }; - 62A4276C1B5A3ED800BB4AD9 = { - CreatedOnToolsVersion = 7.0; - DevelopmentTeam = LND7PS23X9; - }; - }; - }; - buildConfigurationList = 62A427481B5A3C9700BB4AD9 /* Build configuration list for PBXProject "ShadowVPN" */; - compatibilityVersion = "Xcode 3.2"; - developmentRegion = English; - hasScannedForEncodings = 0; - knownRegions = ( - en, - Base, - ); - mainGroup = 62A427441B5A3C9700BB4AD9; - productRefGroup = 62A4274E1B5A3C9700BB4AD9 /* Products */; - projectDirPath = ""; - projectRoot = ""; - targets = ( - 62A4274C1B5A3C9700BB4AD9 /* ShadowVPN */, - 62A4276C1B5A3ED800BB4AD9 /* tunnel */, - ); - }; -/* End PBXProject section */ - -/* Begin PBXResourcesBuildPhase section */ - 62A4274B1B5A3C9700BB4AD9 /* Resources */ = { - isa = PBXResourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - 62A4275B1B5A3C9700BB4AD9 /* LaunchScreen.storyboard in Resources */, - 62A427581B5A3C9700BB4AD9 /* Assets.xcassets in Resources */, - 62A427561B5A3C9700BB4AD9 /* Main.storyboard in Resources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - 62A4276B1B5A3ED800BB4AD9 /* Resources */ = { - isa = PBXResourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - ); - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXResourcesBuildPhase section */ - -/* Begin PBXShellScriptBuildPhase section */ - 0F5A1901A991DD08B2C3112B /* Copy Pods Resources */ = { - isa = PBXShellScriptBuildPhase; - buildActionMask = 2147483647; - files = ( - ); - inputPaths = ( - ); - name = "Copy Pods Resources"; - outputPaths = ( - ); - runOnlyForDeploymentPostprocessing = 0; - shellPath = /bin/sh; - shellScript = "\"${SRCROOT}/Pods/Target Support Files/Pods-tunnel/Pods-tunnel-resources.sh\"\n"; - showEnvVarsInLog = 0; - }; - E4EB07B6CDD86D9D38054741 /* Check Pods Manifest.lock */ = { - isa = PBXShellScriptBuildPhase; - buildActionMask = 2147483647; - files = ( - ); - inputPaths = ( - ); - name = "Check Pods Manifest.lock"; - outputPaths = ( - ); - runOnlyForDeploymentPostprocessing = 0; - shellPath = /bin/sh; - shellScript = "diff \"${PODS_ROOT}/../Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [[ $? != 0 ]] ; then\n cat << EOM\nerror: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\nEOM\n exit 1\nfi\n"; - showEnvVarsInLog = 0; - }; -/* End PBXShellScriptBuildPhase section */ - -/* Begin PBXSourcesBuildPhase section */ - 62A427491B5A3C9700BB4AD9 /* Sources */ = { - isa = PBXSourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - 62A427531B5A3C9700BB4AD9 /* ViewController.swift in Sources */, - 62A427511B5A3C9700BB4AD9 /* AppDelegate.swift in Sources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; - 62A427691B5A3ED800BB4AD9 /* Sources */ = { - isa = PBXSourcesBuildPhase; - buildActionMask = 2147483647; - files = ( - 62A427721B5A3ED800BB4AD9 /* PacketTunnelProvider.swift in Sources */, - 620A5B891B5A9F1E00F98476 /* crypto.c in Sources */, - 620A5B881B5A9F1E00F98476 /* crypto_secretbox_salsa208poly1305.c in Sources */, - 620A5B901B5AA85800F98476 /* SVCrypto.m in Sources */, - ); - runOnlyForDeploymentPostprocessing = 0; - }; -/* End PBXSourcesBuildPhase section */ - -/* Begin PBXTargetDependency section */ - 62A427751B5A3ED800BB4AD9 /* PBXTargetDependency */ = { - isa = PBXTargetDependency; - target = 62A4276C1B5A3ED800BB4AD9 /* tunnel */; - targetProxy = 62A427741B5A3ED800BB4AD9 /* PBXContainerItemProxy */; - }; -/* End PBXTargetDependency section */ - -/* Begin PBXVariantGroup section */ - 62A427541B5A3C9700BB4AD9 /* Main.storyboard */ = { - isa = PBXVariantGroup; - children = ( - 62A427551B5A3C9700BB4AD9 /* Base */, - ); - name = Main.storyboard; - sourceTree = ""; - }; - 62A427591B5A3C9700BB4AD9 /* LaunchScreen.storyboard */ = { - isa = PBXVariantGroup; - children = ( - 62A4275A1B5A3C9700BB4AD9 /* Base */, - ); - name = LaunchScreen.storyboard; - sourceTree = ""; - }; -/* End PBXVariantGroup section */ - -/* Begin XCBuildConfiguration section */ - 62A4275D1B5A3C9700BB4AD9 /* Debug */ = { - isa = XCBuildConfiguration; - buildSettings = { - ALWAYS_SEARCH_USER_PATHS = NO; - CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; - CLANG_CXX_LIBRARY = "libc++"; - CLANG_ENABLE_MODULES = YES; - CLANG_ENABLE_OBJC_ARC = YES; - CLANG_WARN_BOOL_CONVERSION = YES; - CLANG_WARN_CONSTANT_CONVERSION = YES; - CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR; - CLANG_WARN_EMPTY_BODY = YES; - CLANG_WARN_ENUM_CONVERSION = YES; - CLANG_WARN_INT_CONVERSION = YES; - CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR; - CLANG_WARN_UNREACHABLE_CODE = YES; - CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; - "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; - COPY_PHASE_STRIP = NO; - DEBUG_INFORMATION_FORMAT = dwarf; - ENABLE_STRICT_OBJC_MSGSEND = YES; - ENABLE_TESTABILITY = YES; - GCC_C_LANGUAGE_STANDARD = gnu99; - GCC_DYNAMIC_NO_PIC = NO; - GCC_NO_COMMON_BLOCKS = YES; - GCC_OPTIMIZATION_LEVEL = 0; - GCC_PREPROCESSOR_DEFINITIONS = ( - "DEBUG=1", - "$(inherited)", - ); - GCC_WARN_64_TO_32_BIT_CONVERSION = YES; - GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR; - GCC_WARN_UNDECLARED_SELECTOR = YES; - GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE; - GCC_WARN_UNUSED_FUNCTION = YES; - GCC_WARN_UNUSED_VARIABLE = YES; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - MTL_ENABLE_DEBUG_INFO = YES; - ONLY_ACTIVE_ARCH = YES; - SDKROOT = iphoneos; - SWIFT_OPTIMIZATION_LEVEL = "-Onone"; - TARGETED_DEVICE_FAMILY = "1,2"; - }; - name = Debug; - }; - 62A4275E1B5A3C9700BB4AD9 /* Release */ = { - isa = XCBuildConfiguration; - buildSettings = { - ALWAYS_SEARCH_USER_PATHS = NO; - CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; - CLANG_CXX_LIBRARY = "libc++"; - CLANG_ENABLE_MODULES = YES; - CLANG_ENABLE_OBJC_ARC = YES; - CLANG_WARN_BOOL_CONVERSION = YES; - CLANG_WARN_CONSTANT_CONVERSION = YES; - CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR; - CLANG_WARN_EMPTY_BODY = YES; - CLANG_WARN_ENUM_CONVERSION = YES; - CLANG_WARN_INT_CONVERSION = YES; - CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR; - CLANG_WARN_UNREACHABLE_CODE = YES; - CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; - "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; - COPY_PHASE_STRIP = NO; - DEBUG_INFORMATION_FORMAT = "dwarf-with-dsym"; - ENABLE_NS_ASSERTIONS = NO; - ENABLE_STRICT_OBJC_MSGSEND = YES; - GCC_C_LANGUAGE_STANDARD = gnu99; - GCC_NO_COMMON_BLOCKS = YES; - GCC_WARN_64_TO_32_BIT_CONVERSION = YES; - GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR; - GCC_WARN_UNDECLARED_SELECTOR = YES; - GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE; - GCC_WARN_UNUSED_FUNCTION = YES; - GCC_WARN_UNUSED_VARIABLE = YES; - IPHONEOS_DEPLOYMENT_TARGET = 9.0; - MTL_ENABLE_DEBUG_INFO = NO; - SDKROOT = iphoneos; - TARGETED_DEVICE_FAMILY = "1,2"; - VALIDATE_PRODUCT = YES; - }; - name = Release; - }; - 62A427601B5A3C9700BB4AD9 /* Debug */ = { - isa = XCBuildConfiguration; - buildSettings = { - ASSETCATALOG_COMPILER_APPICON_NAME = AppIcon; - CODE_SIGN_ENTITLEMENTS = ShadowVPN/ShadowVPN.entitlements; - CODE_SIGN_IDENTITY = "iPhone Developer"; - "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; - EMBEDDED_CONTENT_CONTAINS_SWIFT = YES; - INFOPLIST_FILE = ShadowVPN/Info.plist; - LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks"; - PRODUCT_BUNDLE_IDENTIFIER = clowwindy.ShadowVPN; - PRODUCT_NAME = "$(TARGET_NAME)"; - PROVISIONING_PROFILE = ""; - }; - name = Debug; - }; - 62A427611B5A3C9700BB4AD9 /* Release */ = { - isa = XCBuildConfiguration; - buildSettings = { - ASSETCATALOG_COMPILER_APPICON_NAME = AppIcon; - CODE_SIGN_ENTITLEMENTS = ShadowVPN/ShadowVPN.entitlements; - CODE_SIGN_IDENTITY = "iPhone Developer"; - "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; - EMBEDDED_CONTENT_CONTAINS_SWIFT = YES; - INFOPLIST_FILE = ShadowVPN/Info.plist; - LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks"; - PRODUCT_BUNDLE_IDENTIFIER = clowwindy.ShadowVPN; - PRODUCT_NAME = "$(TARGET_NAME)"; - PROVISIONING_PROFILE = ""; - }; - name = Release; - }; - 62A427781B5A3ED800BB4AD9 /* Debug */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = 52E22CBCA9CEB75CB469204A /* Pods-tunnel.debug.xcconfig */; - buildSettings = { - CODE_SIGN_ENTITLEMENTS = tunnel/tunnel.entitlements; - CODE_SIGN_IDENTITY = "iPhone Developer"; - "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; - INFOPLIST_FILE = tunnel/Info.plist; - LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @executable_path/../../Frameworks"; - PRODUCT_BUNDLE_IDENTIFIER = clowwindy.ShadowVPN.tunnel; - PRODUCT_NAME = "$(TARGET_NAME)"; - PROVISIONING_PROFILE = ""; - SKIP_INSTALL = YES; - SWIFT_OBJC_BRIDGING_HEADER = "$(SRCROOT)/tunnel/tunnel-Bridging-Header.h"; - }; - name = Debug; - }; - 62A427791B5A3ED800BB4AD9 /* Release */ = { - isa = XCBuildConfiguration; - baseConfigurationReference = F8715C8B6D2ECED571986A72 /* Pods-tunnel.release.xcconfig */; - buildSettings = { - CODE_SIGN_ENTITLEMENTS = tunnel/tunnel.entitlements; - CODE_SIGN_IDENTITY = "iPhone Developer"; - "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; - INFOPLIST_FILE = tunnel/Info.plist; - LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @executable_path/../../Frameworks"; - PRODUCT_BUNDLE_IDENTIFIER = clowwindy.ShadowVPN.tunnel; - PRODUCT_NAME = "$(TARGET_NAME)"; - PROVISIONING_PROFILE = ""; - SKIP_INSTALL = YES; - SWIFT_OBJC_BRIDGING_HEADER = "$(SRCROOT)/tunnel/tunnel-Bridging-Header.h"; - }; - name = Release; - }; -/* End XCBuildConfiguration section */ - -/* Begin XCConfigurationList section */ - 62A427481B5A3C9700BB4AD9 /* Build configuration list for PBXProject "ShadowVPN" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - 62A4275D1B5A3C9700BB4AD9 /* Debug */, - 62A4275E1B5A3C9700BB4AD9 /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; - 62A4275F1B5A3C9700BB4AD9 /* Build configuration list for PBXNativeTarget "ShadowVPN" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - 62A427601B5A3C9700BB4AD9 /* Debug */, - 62A427611B5A3C9700BB4AD9 /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; - 62A427771B5A3ED800BB4AD9 /* Build configuration list for PBXNativeTarget "tunnel" */ = { - isa = XCConfigurationList; - buildConfigurations = ( - 62A427781B5A3ED800BB4AD9 /* Debug */, - 62A427791B5A3ED800BB4AD9 /* Release */, - ); - defaultConfigurationIsVisible = 0; - defaultConfigurationName = Release; - }; -/* End XCConfigurationList section */ - }; - rootObject = 62A427451B5A3C9700BB4AD9 /* Project object */; -} diff --git a/ShadowVPN.xcodeproj/project.xcworkspace/contents.xcworkspacedata b/ShadowVPN.xcodeproj/project.xcworkspace/contents.xcworkspacedata deleted file mode 100644 index 7c2d924..0000000 --- a/ShadowVPN.xcodeproj/project.xcworkspace/contents.xcworkspacedata +++ /dev/null @@ -1,7 +0,0 @@ - - - - - diff --git a/ShadowVPN.xcworkspace/contents.xcworkspacedata b/ShadowVPN.xcworkspace/contents.xcworkspacedata deleted file mode 100644 index 60ea0d3..0000000 --- a/ShadowVPN.xcworkspace/contents.xcworkspacedata +++ /dev/null @@ -1,10 +0,0 @@ - - - - - - - diff --git a/ShadowVPN/AppDelegate.swift b/ShadowVPN/AppDelegate.swift deleted file mode 100644 index 42437d5..0000000 --- a/ShadowVPN/AppDelegate.swift +++ /dev/null @@ -1,46 +0,0 @@ -// -// AppDelegate.swift -// ShadowVPN -// -// Created by clowwindy on 7/18/15. -// Copyright © 2015 clowwindy. All rights reserved. -// - -import UIKit - -@UIApplicationMain -class AppDelegate: UIResponder, UIApplicationDelegate { - - var window: UIWindow? - - - func application(application: UIApplication, didFinishLaunchingWithOptions launchOptions: [NSObject: AnyObject]?) -> Bool { - // Override point for customization after application launch. - return true - } - - func applicationWillResignActive(application: UIApplication) { - // Sent when the application is about to move from active to inactive state. This can occur for certain types of temporary interruptions (such as an incoming phone call or SMS message) or when the user quits the application and it begins the transition to the background state. - // Use this method to pause ongoing tasks, disable timers, and throttle down OpenGL ES frame rates. Games should use this method to pause the game. - } - - func applicationDidEnterBackground(application: UIApplication) { - // Use this method to release shared resources, save user data, invalidate timers, and store enough application state information to restore your application to its current state in case it is terminated later. - // If your application supports background execution, this method is called instead of applicationWillTerminate: when the user quits. - } - - func applicationWillEnterForeground(application: UIApplication) { - // Called as part of the transition from the background to the inactive state; here you can undo many of the changes made on entering the background. - } - - func applicationDidBecomeActive(application: UIApplication) { - // Restart any tasks that were paused (or not yet started) while the application was inactive. If the application was previously in the background, optionally refresh the user interface. - } - - func applicationWillTerminate(application: UIApplication) { - // Called when the application is about to terminate. Save data if appropriate. See also applicationDidEnterBackground:. - } - - -} - diff --git a/ShadowVPN/Assets.xcassets/AppIcon.appiconset/Contents.json b/ShadowVPN/Assets.xcassets/AppIcon.appiconset/Contents.json deleted file mode 100644 index 36d2c80..0000000 --- a/ShadowVPN/Assets.xcassets/AppIcon.appiconset/Contents.json +++ /dev/null @@ -1,68 +0,0 @@ -{ - "images" : [ - { - "idiom" : "iphone", - "size" : "29x29", - "scale" : "2x" - }, - { - "idiom" : "iphone", - "size" : "29x29", - "scale" : "3x" - }, - { - "idiom" : "iphone", - "size" : "40x40", - "scale" : "2x" - }, - { - "idiom" : "iphone", - "size" : "40x40", - "scale" : "3x" - }, - { - "idiom" : "iphone", - "size" : "60x60", - "scale" : "2x" - }, - { - "idiom" : "iphone", - "size" : "60x60", - "scale" : "3x" - }, - { - "idiom" : "ipad", - "size" : "29x29", - "scale" : "1x" - }, - { - "idiom" : "ipad", - "size" : "29x29", - "scale" : "2x" - }, - { - "idiom" : "ipad", - "size" : "40x40", - "scale" : "1x" - }, - { - "idiom" : "ipad", - "size" : "40x40", - "scale" : "2x" - }, - { - "idiom" : "ipad", - "size" : "76x76", - "scale" : "1x" - }, - { - "idiom" : "ipad", - "size" : "76x76", - "scale" : "2x" - } - ], - "info" : { - "version" : 1, - "author" : "xcode" - } -} \ No newline at end of file diff --git a/ShadowVPN/Base.lproj/LaunchScreen.storyboard b/ShadowVPN/Base.lproj/LaunchScreen.storyboard deleted file mode 100644 index 6788c67..0000000 --- a/ShadowVPN/Base.lproj/LaunchScreen.storyboard +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/ShadowVPN/Base.lproj/Main.storyboard b/ShadowVPN/Base.lproj/Main.storyboard deleted file mode 100644 index 3a2a49b..0000000 --- a/ShadowVPN/Base.lproj/Main.storyboard +++ /dev/null @@ -1,25 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/ShadowVPN/Info.plist b/ShadowVPN/Info.plist deleted file mode 100644 index b7511fb..0000000 --- a/ShadowVPN/Info.plist +++ /dev/null @@ -1,54 +0,0 @@ - - - - - CFBundleDevelopmentRegion - en - CFBundleExecutable - $(EXECUTABLE_NAME) - CFBundleIdentifier - $(PRODUCT_BUNDLE_IDENTIFIER) - CFBundleInfoDictionaryVersion - 6.0 - CFBundleName - $(PRODUCT_NAME) - CFBundlePackageType - APPL - CFBundleShortVersionString - 1.0 - CFBundleSignature - ???? - CFBundleVersion - 1 - LSRequiresIPhoneOS - - UILaunchStoryboardName - LaunchScreen - UIMainStoryboardFile - Main - UIRequiredDeviceCapabilities - - armv7 - - UISupportedInterfaceOrientations - - UIInterfaceOrientationPortrait - UIInterfaceOrientationLandscapeLeft - UIInterfaceOrientationLandscapeRight - - UISupportedInterfaceOrientations~ipad - - UIInterfaceOrientationPortrait - UIInterfaceOrientationPortraitUpsideDown - UIInterfaceOrientationLandscapeLeft - UIInterfaceOrientationLandscapeRight - - NSExtension - - NSExtensionPointIdentifier - com.apple.networkextension.packet-tunnel - NSExtensionPrincipalClass - $(PRODUCT_MODULE_NAME).PacketTunnelProvider - - - diff --git a/ShadowVPN/ShadowVPN.entitlements b/ShadowVPN/ShadowVPN.entitlements deleted file mode 100644 index 509730d..0000000 --- a/ShadowVPN/ShadowVPN.entitlements +++ /dev/null @@ -1,33 +0,0 @@ - - - - - keychain-access-groups - - LND7PS23X9.* - com.apple.managed.vpn.shared - - get-task-allow - - application-identifier - LND7PS23X9.clowwindy.ShadowVPN - com.apple.security.application-groups - - - com.apple.developer.team-identifier - LND7PS23X9 - com.apple.developer.networking.vpn.api - - allow-vpn - - - com.apple.developer.networking.networkextension - - packet-tunnel-provider - app-proxy-provider - content-filter-provider - - com.apple.developer.networking.HotspotHelper - - - diff --git a/ShadowVPN/ViewController.swift b/ShadowVPN/ViewController.swift deleted file mode 100644 index f67dc8e..0000000 --- a/ShadowVPN/ViewController.swift +++ /dev/null @@ -1,48 +0,0 @@ -// -// ViewController.swift -// ShadowVPN -// -// Created by clowwindy on 7/18/15. -// Copyright © 2015 clowwindy. All rights reserved. -// - -import UIKit -import NetworkExtension - -class ViewController: UIViewController { - - override func viewDidLoad() { - super.viewDidLoad() - // Do any additional setup after loading the view, typically from a nib. - - NETunnelProviderManager.loadAllFromPreferencesWithCompletionHandler() { newManagers, error in - guard let vpnManagers = newManagers else { return } - for vpnManager in vpnManagers { - // remove existing managers - vpnManager.removeFromPreferencesWithCompletionHandler({ error -> Void in - }) - } - } - - let manager = NETunnelProviderManager() - manager.loadFromPreferencesWithCompletionHandler { (error) -> Void in - let providerProtocol = NETunnelProviderProtocol() - providerProtocol.providerBundleIdentifier = "clowwindy.ShadowVPN.tunnel" - providerProtocol.providerConfiguration = [String: AnyObject]() - providerProtocol.serverAddress = "10.0.1.118" - manager.protocolConfiguration = providerProtocol - manager.enabled = true - - manager.saveToPreferencesWithCompletionHandler({ (error) -> Void in - print(error) - }) - } - } - - override func didReceiveMemoryWarning() { - super.didReceiveMemoryWarning() - // Dispose of any resources that can be recreated. - } - - -} diff --git a/tunnel/Info.plist b/tunnel/Info.plist deleted file mode 100644 index 049fd10..0000000 --- a/tunnel/Info.plist +++ /dev/null @@ -1,33 +0,0 @@ - - - - - CFBundleDevelopmentRegion - en - CFBundleDisplayName - tunnel - CFBundleExecutable - $(EXECUTABLE_NAME) - CFBundleIdentifier - $(PRODUCT_BUNDLE_IDENTIFIER) - CFBundleInfoDictionaryVersion - 6.0 - CFBundleName - $(PRODUCT_NAME) - CFBundlePackageType - XPC! - CFBundleShortVersionString - 1.0 - CFBundleSignature - ???? - CFBundleVersion - 1 - NSExtension - - NSExtensionPointIdentifier - com.apple.networkextension.packet-tunnel - NSExtensionPrincipalClass - $(PRODUCT_MODULE_NAME).PacketTunnelProvider - - - diff --git a/tunnel/PacketTunnelProvider.swift b/tunnel/PacketTunnelProvider.swift deleted file mode 100644 index 3d38ac9..0000000 --- a/tunnel/PacketTunnelProvider.swift +++ /dev/null @@ -1,103 +0,0 @@ -// -// PacketTunnelProvider.swift -// tunnel -// -// Created by clowwindy on 7/18/15. -// Copyright © 2015 clowwindy. All rights reserved. -// - -import NetworkExtension - -class PacketTunnelProvider: NEPacketTunnelProvider { - var session: NWUDPSession? = nil - var pendingStartCompletion: (NSError? -> Void)? - - override func startTunnelWithOptions(options: [String : NSObject]?, completionHandler: (NSError?) -> Void) { - // Add code here to start the process of connecting the tunnel - if let serverAddress = self.protocolConfiguration.serverAddress { - session = self.createUDPSessionToEndpoint(NWHostEndpoint(hostname: serverAddress, port: "1123"), fromEndpoint: nil) - self.pendingStartCompletion = completionHandler - self.updateNetwork() - } else { - completionHandler(NSError(domain:"PacketTunnelProviderDomain", code:-1, userInfo:[NSLocalizedDescriptionKey:"Configuration is missing serverAddress"])) - } - } - - func log(data: String) { - self.session?.writeDatagram(data.dataUsingEncoding(NSUTF8StringEncoding)!, completionHandler: { (error: NSError?) -> Void in - }) - } - - func updateNetwork() { - let newSettings = NEPacketTunnelNetworkSettings(tunnelRemoteAddress: self.protocolConfiguration.serverAddress!) - newSettings.IPv4Settings = NEIPv4Settings(addresses: ["10.7.0.2"], subnetMasks: ["255.255.0.0"]) - newSettings.IPv4Settings!.includedRoutes = [NEIPv4Route.defaultRoute()] - newSettings.tunnelOverheadBytes = 64 - newSettings.DNSSettings = NEDNSSettings(servers: ["8.8.8.8"]) - SVCrypto.setPassword("my_password") - self.setTunnelNetworkSettings(newSettings) { (error: NSError?) -> Void in - self.readPacketsFromTUN() - self.readPacketsFromUDP() - if let completionHandler = self.pendingStartCompletion { - // send an packet -// self.log("completion") - completionHandler(error) - } - } - } - - func readPacketsFromTUN() { - self.packetFlow.readPacketsWithCompletionHandler { - packets, protocols in -// self.log("readPacketsWithCompletionHandler") -// for p in protocols { -// self.log("protocol: " + p.stringValue) -// } - for packet in packets { - self.session?.writeDatagram(SVCrypto.encrypt(packet), completionHandler: { (error: NSError?) -> Void in - }) - } - self.readPacketsFromTUN() - } - - } - - func readPacketsFromUDP() { - session?.setReadHandler({ (newPackets: [NSData]?, error: NSError?) -> Void in -// self.log("readPacketsFromUDP") - guard let packets = newPackets else { return } - var protocols = [NSNumber]() - var decryptedPackets = [NSData]() - for packet in packets { - // currently IPv4 only - decryptedPackets.append(SVCrypto.decrypt(packet)) - protocols.append(2) - } - self.packetFlow.writePackets(decryptedPackets, withProtocols: protocols) - }, maxDatagrams: 1024) - } - - override func stopTunnelWithReason(reason: NEProviderStopReason, completionHandler: () -> Void) { - // Add code here to start the process of stopping the tunnel -// self.log("stop tunnel") - session?.cancel() - completionHandler() - super.stopTunnelWithReason(reason, completionHandler: completionHandler) - } - - override func handleAppMessage(messageData: NSData, completionHandler: ((NSData?) -> Void)?) { - // Add code here to handle the message - if let handler = completionHandler { - handler(messageData) - } - } - - override func sleepWithCompletionHandler(completionHandler: () -> Void) { - // Add code here to get ready to sleep - completionHandler() - } - - override func wake() { - // Add code here to wake up - } -} diff --git a/tunnel/SVCrypto.h b/tunnel/SVCrypto.h deleted file mode 100644 index 33187d5..0000000 --- a/tunnel/SVCrypto.h +++ /dev/null @@ -1,19 +0,0 @@ -// -// SVCrypto.h -// ShadowVPN -// -// Created by clowwindy on 7/18/15. -// Copyright © 2015 clowwindy. All rights reserved. -// - -#import - -@interface SVCrypto : NSObject - -+ (void)setPassword:(NSString *)password; - -+ (NSData *)encrypt:(NSData *)data; - -+ (NSData *)decrypt:(NSData *)data; - -@end diff --git a/tunnel/SVCrypto.m b/tunnel/SVCrypto.m deleted file mode 100644 index b632185..0000000 --- a/tunnel/SVCrypto.m +++ /dev/null @@ -1,48 +0,0 @@ -// -// SVCrypto.m -// ShadowVPN -// -// Created by clowwindy on 7/18/15. -// Copyright © 2015 clowwindy. All rights reserved. -// - -#import "SVCrypto.h" -#import "crypto.h" - -static const int max_mtu = 8192; -static unsigned char tun_buf[max_mtu + SHADOWVPN_ZERO_BYTES]; -static unsigned char udp_buf[max_mtu + SHADOWVPN_ZERO_BYTES]; - -@implementation SVCrypto - -+ (void)load { - crypto_init(); - bzero(tun_buf, SHADOWVPN_ZERO_BYTES); - bzero(udp_buf, SHADOWVPN_ZERO_BYTES); -} - -+ (void)setPassword:(NSString *)password { - crypto_set_password([password cStringUsingEncoding:NSUTF8StringEncoding], password.length); -} - -+ (NSData *)encrypt:(NSData *)data { - if (data.length > max_mtu) { - return nil; - } - memcpy(tun_buf + SHADOWVPN_ZERO_BYTES, data.bytes, data.length); - crypto_encrypt(udp_buf, tun_buf, data.length); - NSData *result = [NSData dataWithBytes:udp_buf + SHADOWVPN_PACKET_OFFSET length:data.length + SHADOWVPN_OVERHEAD_LEN]; - return result; -} - -+ (NSData *)decrypt:(NSData *)data { - if (data.length > max_mtu || data.length < SHADOWVPN_OVERHEAD_LEN) { - return nil; - } - memcpy(udp_buf + SHADOWVPN_PACKET_OFFSET, data.bytes, data.length); - crypto_decrypt(tun_buf, udp_buf, data.length - SHADOWVPN_OVERHEAD_LEN); - NSData *result = [NSData dataWithBytes:tun_buf + SHADOWVPN_ZERO_BYTES length:data.length - SHADOWVPN_OVERHEAD_LEN]; - return result; -} - -@end diff --git a/tunnel/crypto.c b/tunnel/crypto.c deleted file mode 100644 index 1d08540..0000000 --- a/tunnel/crypto.c +++ /dev/null @@ -1,61 +0,0 @@ -/** - crypto.c - - Copyright (C) 2015 clowwindy - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -*/ - -#include -#include -#include "crypto_secretbox_salsa208poly1305.h" - -// will not copy key any more -static unsigned char key[32]; - -int crypto_init() { - if (-1 == sodium_init()) - return 1; - randombytes_set_implementation(&randombytes_salsa20_implementation); - randombytes_stir(); - return 0; -} - -int crypto_set_password(const char *password, - unsigned long long password_len) { - return crypto_generichash(key, sizeof key, (unsigned char *)password, - password_len, NULL, 0); -} - -int crypto_encrypt(unsigned char *c, unsigned char *m, - unsigned long long mlen) { - unsigned char nonce[8]; - randombytes_buf(nonce, 8); - int r = crypto_secretbox_salsa208poly1305(c, m, mlen + 32, nonce, key); - if (r != 0) return r; - // copy nonce to the head - memcpy(c + 8, nonce, 8); - return 0; -} - -int crypto_decrypt(unsigned char *m, unsigned char *c, - unsigned long long clen) { - unsigned char nonce[8]; - memcpy(nonce, c + 8, 8); - int r = crypto_secretbox_salsa208poly1305_open(m, c, clen + 32, nonce, key); - if (r != 0) return r; - return 0; -} - diff --git a/tunnel/crypto.h b/tunnel/crypto.h deleted file mode 100644 index b591395..0000000 --- a/tunnel/crypto.h +++ /dev/null @@ -1,43 +0,0 @@ -/** - crypto.h - - Copyright (C) 2015 clowwindy - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -*/ - -#ifndef CRYPTO_H -#define CRYPTO_H - -/* call once after start */ -int crypto_init(); - -// TODO use a struct to hold context instead -/* call when password changed */ -int crypto_set_password(const char *password, - unsigned long long password_len); - -int crypto_encrypt(unsigned char *c, unsigned char *m, - unsigned long long mlen); - -int crypto_decrypt(unsigned char *m, unsigned char *c, - unsigned long long clen); - -#define SHADOWVPN_KEY_LEN 32 -#define SHADOWVPN_ZERO_BYTES 32 -#define SHADOWVPN_OVERHEAD_LEN 24 -#define SHADOWVPN_PACKET_OFFSET 8 - -#endif diff --git a/tunnel/crypto_secretbox_salsa208poly1305.c b/tunnel/crypto_secretbox_salsa208poly1305.c deleted file mode 100644 index d2a3219..0000000 --- a/tunnel/crypto_secretbox_salsa208poly1305.c +++ /dev/null @@ -1,53 +0,0 @@ -/** - crypto_secretbox_salsa208poly1305.c - - Copyright (C) 2015 clowwindy - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -*/ - -#include - -int crypto_secretbox_salsa208poly1305( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -) -{ - int i; - if (mlen < 32) return -1; - crypto_stream_salsa208_xor(c,m,mlen,n,k); - crypto_onetimeauth_poly1305(c + 16,c + 32,mlen - 32,c); - for (i = 0;i < 16;++i) c[i] = 0; - return 0; -} - -int crypto_secretbox_salsa208poly1305_open( - unsigned char *m, - const unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -) -{ - int i; - unsigned char subkey[32]; - if (clen < 32) return -1; - crypto_stream_salsa208(subkey,32,n,k); - if (crypto_onetimeauth_poly1305_verify(c + 16,c + 32,clen - 32,subkey) != 0) return -1; - crypto_stream_salsa208_xor(m,c,clen,n,k); - for (i = 0;i < 32;++i) m[i] = 0; - return 0; -} diff --git a/tunnel/crypto_secretbox_salsa208poly1305.h b/tunnel/crypto_secretbox_salsa208poly1305.h deleted file mode 100644 index 1231e29..0000000 --- a/tunnel/crypto_secretbox_salsa208poly1305.h +++ /dev/null @@ -1,38 +0,0 @@ -/** - crypto_secretbox_salsa208poly1305.h - - Copyright (C) 2015 clowwindy - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program. If not, see . - -*/ - -#ifndef CRYPTO_SECRETBOX_SALSA208POLY1305_H -#define CRYPTO_SECRETBOX_SALSA208POLY1305_H - -int crypto_secretbox_salsa208poly1305( - unsigned char *c, - const unsigned char *m,unsigned long long mlen, - const unsigned char *n, - const unsigned char *k -); - -int crypto_secretbox_salsa208poly1305_open( - unsigned char *m, - const unsigned char *c,unsigned long long clen, - const unsigned char *n, - const unsigned char *k -); - -#endif diff --git a/tunnel/tunnel-Bridging-Header.h b/tunnel/tunnel-Bridging-Header.h deleted file mode 100644 index 20a5d41..0000000 --- a/tunnel/tunnel-Bridging-Header.h +++ /dev/null @@ -1,14 +0,0 @@ -// -// tunnel-Bridging-Header.h -// ShadowVPN -// -// Created by clowwindy on 7/18/15. -// Copyright © 2015 clowwindy. All rights reserved. -// - -#ifndef tunnel_Bridging_Header_h -#define tunnel_Bridging_Header_h - -#import "SVCrypto.h" - -#endif /* tunnel_Bridging_Header_h */ diff --git a/tunnel/tunnel.entitlements b/tunnel/tunnel.entitlements deleted file mode 100644 index d08ff75..0000000 --- a/tunnel/tunnel.entitlements +++ /dev/null @@ -1,16 +0,0 @@ - - - - - com.apple.developer.networking.networkextension - - packet-tunnel-provider - app-proxy-provider - content-filter-provider - - com.apple.security.application-groups - - group.clowwindy.ShadowVPN - - -