Skip to content

Commit ebc8657

Browse files
committed
update
Signed-off-by: Vlad Gheorghiu <[email protected]>
1 parent cb372f7 commit ebc8657

File tree

1 file changed

+38
-38
lines changed

1 file changed

+38
-38
lines changed

oqs/oqs.py

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -278,13 +278,13 @@ def encap_secret(self, public_key):
278278
279279
:param public_key: the peer's public key.
280280
"""
281-
my_public_key = ct.create_string_buffer(
281+
c_public_key = ct.create_string_buffer(
282282
public_key, self._kem.contents.length_public_key
283283
)
284284
ciphertext = ct.create_string_buffer(self._kem.contents.length_ciphertext)
285285
shared_secret = ct.create_string_buffer(self._kem.contents.length_shared_secret)
286286
rv = native().OQS_KEM_encaps(
287-
self._kem, ct.byref(ciphertext), ct.byref(shared_secret), my_public_key
287+
self._kem, ct.byref(ciphertext), ct.byref(shared_secret), c_public_key
288288
)
289289
return bytes(ciphertext), bytes(shared_secret) if rv == OQS_SUCCESS else 0
290290

@@ -294,12 +294,12 @@ def decap_secret(self, ciphertext):
294294
295295
:param ciphertext: the ciphertext received from the peer.
296296
"""
297-
my_ciphertext = ct.create_string_buffer(
297+
c_ciphertext = ct.create_string_buffer(
298298
ciphertext, self._kem.contents.length_ciphertext
299299
)
300300
shared_secret = ct.create_string_buffer(self._kem.contents.length_shared_secret)
301301
rv = native().OQS_KEM_decaps(
302-
self._kem, ct.byref(shared_secret), my_ciphertext, self.secret_key
302+
self._kem, ct.byref(shared_secret), c_ciphertext, self.secret_key
303303
)
304304
return bytes(shared_secret) if rv == OQS_SUCCESS else 0
305305

@@ -436,23 +436,23 @@ def sign(self, message):
436436
:param message: the message to sign.
437437
"""
438438
# Provide length to avoid extra null char
439-
my_message = ct.create_string_buffer(message, len(message))
440-
message_len = ct.c_int(len(my_message))
441-
my_signature = ct.create_string_buffer(self._sig.contents.length_signature)
439+
c_message = ct.create_string_buffer(message, len(message))
440+
message_len = ct.c_int(len(c_message))
441+
c_signature = ct.create_string_buffer(self._sig.contents.length_signature)
442442

443443
# Initialize to maximum signature size
444444
signature_len = ct.c_int(self._sig.contents.length_signature)
445445

446446
rv = native().OQS_SIG_sign(
447447
self._sig,
448-
ct.byref(my_signature),
448+
ct.byref(c_signature),
449449
ct.byref(signature_len),
450-
my_message,
450+
c_message,
451451
message_len,
452452
self.secret_key,
453453
)
454454

455-
return bytes(my_signature[: signature_len.value]) if rv == OQS_SUCCESS else 0
455+
return bytes(c_signature[: signature_len.value]) if rv == OQS_SUCCESS else 0
456456

457457
def verify(self, message, signature, public_key):
458458
"""
@@ -463,21 +463,21 @@ def verify(self, message, signature, public_key):
463463
:param public_key: the signer's public key.
464464
"""
465465
# Provide length to avoid extra null char
466-
my_message = ct.create_string_buffer(message, len(message))
467-
message_len = ct.c_int(len(my_message))
468-
my_signature = ct.create_string_buffer(signature, len(signature))
469-
signature_len = ct.c_int(len(my_signature))
470-
my_public_key = ct.create_string_buffer(
466+
c_message = ct.create_string_buffer(message, len(message))
467+
message_len = ct.c_int(len(c_message))
468+
c_signature = ct.create_string_buffer(signature, len(signature))
469+
signature_len = ct.c_int(len(c_signature))
470+
c_public_key = ct.create_string_buffer(
471471
public_key, self._sig.contents.length_public_key
472472
)
473473

474474
rv = native().OQS_SIG_verify(
475475
self._sig,
476-
my_message,
476+
c_message,
477477
message_len,
478-
my_signature,
478+
c_signature,
479479
signature_len,
480-
my_public_key,
480+
c_public_key,
481481
)
482482

483483
return True if rv == OQS_SUCCESS else False
@@ -490,27 +490,27 @@ def sign_with_ctx_str(self, message, context):
490490
:param message: the message to sign.
491491
"""
492492
# Provide length to avoid extra null char
493-
my_message = ct.create_string_buffer(message, len(message))
494-
message_len = ct.c_int(len(my_message))
495-
my_context = ct.create_string_buffer(context, len(context))
496-
context_len = ct.c_int(len(my_context))
497-
my_signature = ct.create_string_buffer(self._sig.contents.length_signature)
493+
c_message = ct.create_string_buffer(message, len(message))
494+
message_len = ct.c_int(len(c_message))
495+
c_context = ct.create_string_buffer(context, len(context))
496+
context_len = ct.c_int(len(c_context))
497+
c_signature = ct.create_string_buffer(self._sig.contents.length_signature)
498498

499499
# Initialize to maximum signature size
500500
signature_len = ct.c_int(self._sig.contents.length_signature)
501501

502502
rv = native().OQS_SIG_sign_with_ctx_str(
503503
self._sig,
504-
ct.byref(my_signature),
504+
ct.byref(c_signature),
505505
ct.byref(signature_len),
506-
my_message,
506+
c_message,
507507
message_len,
508-
my_context,
508+
c_context,
509509
context_len,
510510
self.secret_key,
511511
)
512512

513-
return bytes(my_signature[: signature_len.value]) if rv == OQS_SUCCESS else 0
513+
return bytes(c_signature[: signature_len.value]) if rv == OQS_SUCCESS else 0
514514

515515
def verify_with_ctx_str(self, message, signature, context, public_key):
516516
"""
@@ -522,25 +522,25 @@ def verify_with_ctx_str(self, message, signature, context, public_key):
522522
:param public_key: the signer's public key.
523523
"""
524524
# Provide length to avoid extra null char
525-
my_message = ct.create_string_buffer(message, len(message))
526-
message_len = ct.c_int(len(my_message))
527-
my_signature = ct.create_string_buffer(signature, len(signature))
528-
signature_len = ct.c_int(len(my_signature))
529-
my_context = ct.create_string_buffer(context, len(context))
530-
context_len = ct.c_int(len(my_context))
531-
my_public_key = ct.create_string_buffer(
525+
c_message = ct.create_string_buffer(message, len(message))
526+
message_len = ct.c_int(len(c_message))
527+
c_signature = ct.create_string_buffer(signature, len(signature))
528+
signature_len = ct.c_int(len(c_signature))
529+
c_context = ct.create_string_buffer(context, len(context))
530+
context_len = ct.c_int(len(c_context))
531+
c_public_key = ct.create_string_buffer(
532532
public_key, self._sig.contents.length_public_key
533533
)
534534

535535
rv = native().OQS_SIG_verify_with_ctx_str(
536536
self._sig,
537-
my_message,
537+
c_message,
538538
message_len,
539-
my_signature,
539+
c_signature,
540540
signature_len,
541-
my_context,
541+
c_context,
542542
context_len,
543-
my_public_key,
543+
c_public_key,
544544
)
545545

546546
return True if rv == OQS_SUCCESS else False

0 commit comments

Comments
 (0)