@@ -278,13 +278,13 @@ def encap_secret(self, public_key):
278278
279279 :param public_key: the peer's public key.
280280 """
281- my_public_key = ct .create_string_buffer (
281+ c_public_key = ct .create_string_buffer (
282282 public_key , self ._kem .contents .length_public_key
283283 )
284284 ciphertext = ct .create_string_buffer (self ._kem .contents .length_ciphertext )
285285 shared_secret = ct .create_string_buffer (self ._kem .contents .length_shared_secret )
286286 rv = native ().OQS_KEM_encaps (
287- self ._kem , ct .byref (ciphertext ), ct .byref (shared_secret ), my_public_key
287+ self ._kem , ct .byref (ciphertext ), ct .byref (shared_secret ), c_public_key
288288 )
289289 return bytes (ciphertext ), bytes (shared_secret ) if rv == OQS_SUCCESS else 0
290290
@@ -294,12 +294,12 @@ def decap_secret(self, ciphertext):
294294
295295 :param ciphertext: the ciphertext received from the peer.
296296 """
297- my_ciphertext = ct .create_string_buffer (
297+ c_ciphertext = ct .create_string_buffer (
298298 ciphertext , self ._kem .contents .length_ciphertext
299299 )
300300 shared_secret = ct .create_string_buffer (self ._kem .contents .length_shared_secret )
301301 rv = native ().OQS_KEM_decaps (
302- self ._kem , ct .byref (shared_secret ), my_ciphertext , self .secret_key
302+ self ._kem , ct .byref (shared_secret ), c_ciphertext , self .secret_key
303303 )
304304 return bytes (shared_secret ) if rv == OQS_SUCCESS else 0
305305
@@ -436,23 +436,23 @@ def sign(self, message):
436436 :param message: the message to sign.
437437 """
438438 # Provide length to avoid extra null char
439- my_message = ct .create_string_buffer (message , len (message ))
440- message_len = ct .c_int (len (my_message ))
441- my_signature = ct .create_string_buffer (self ._sig .contents .length_signature )
439+ c_message = ct .create_string_buffer (message , len (message ))
440+ message_len = ct .c_int (len (c_message ))
441+ c_signature = ct .create_string_buffer (self ._sig .contents .length_signature )
442442
443443 # Initialize to maximum signature size
444444 signature_len = ct .c_int (self ._sig .contents .length_signature )
445445
446446 rv = native ().OQS_SIG_sign (
447447 self ._sig ,
448- ct .byref (my_signature ),
448+ ct .byref (c_signature ),
449449 ct .byref (signature_len ),
450- my_message ,
450+ c_message ,
451451 message_len ,
452452 self .secret_key ,
453453 )
454454
455- return bytes (my_signature [: signature_len .value ]) if rv == OQS_SUCCESS else 0
455+ return bytes (c_signature [: signature_len .value ]) if rv == OQS_SUCCESS else 0
456456
457457 def verify (self , message , signature , public_key ):
458458 """
@@ -463,21 +463,21 @@ def verify(self, message, signature, public_key):
463463 :param public_key: the signer's public key.
464464 """
465465 # Provide length to avoid extra null char
466- my_message = ct .create_string_buffer (message , len (message ))
467- message_len = ct .c_int (len (my_message ))
468- my_signature = ct .create_string_buffer (signature , len (signature ))
469- signature_len = ct .c_int (len (my_signature ))
470- my_public_key = ct .create_string_buffer (
466+ c_message = ct .create_string_buffer (message , len (message ))
467+ message_len = ct .c_int (len (c_message ))
468+ c_signature = ct .create_string_buffer (signature , len (signature ))
469+ signature_len = ct .c_int (len (c_signature ))
470+ c_public_key = ct .create_string_buffer (
471471 public_key , self ._sig .contents .length_public_key
472472 )
473473
474474 rv = native ().OQS_SIG_verify (
475475 self ._sig ,
476- my_message ,
476+ c_message ,
477477 message_len ,
478- my_signature ,
478+ c_signature ,
479479 signature_len ,
480- my_public_key ,
480+ c_public_key ,
481481 )
482482
483483 return True if rv == OQS_SUCCESS else False
@@ -490,27 +490,27 @@ def sign_with_ctx_str(self, message, context):
490490 :param message: the message to sign.
491491 """
492492 # Provide length to avoid extra null char
493- my_message = ct .create_string_buffer (message , len (message ))
494- message_len = ct .c_int (len (my_message ))
495- my_context = ct .create_string_buffer (context , len (context ))
496- context_len = ct .c_int (len (my_context ))
497- my_signature = ct .create_string_buffer (self ._sig .contents .length_signature )
493+ c_message = ct .create_string_buffer (message , len (message ))
494+ message_len = ct .c_int (len (c_message ))
495+ c_context = ct .create_string_buffer (context , len (context ))
496+ context_len = ct .c_int (len (c_context ))
497+ c_signature = ct .create_string_buffer (self ._sig .contents .length_signature )
498498
499499 # Initialize to maximum signature size
500500 signature_len = ct .c_int (self ._sig .contents .length_signature )
501501
502502 rv = native ().OQS_SIG_sign_with_ctx_str (
503503 self ._sig ,
504- ct .byref (my_signature ),
504+ ct .byref (c_signature ),
505505 ct .byref (signature_len ),
506- my_message ,
506+ c_message ,
507507 message_len ,
508- my_context ,
508+ c_context ,
509509 context_len ,
510510 self .secret_key ,
511511 )
512512
513- return bytes (my_signature [: signature_len .value ]) if rv == OQS_SUCCESS else 0
513+ return bytes (c_signature [: signature_len .value ]) if rv == OQS_SUCCESS else 0
514514
515515 def verify_with_ctx_str (self , message , signature , context , public_key ):
516516 """
@@ -522,25 +522,25 @@ def verify_with_ctx_str(self, message, signature, context, public_key):
522522 :param public_key: the signer's public key.
523523 """
524524 # Provide length to avoid extra null char
525- my_message = ct .create_string_buffer (message , len (message ))
526- message_len = ct .c_int (len (my_message ))
527- my_signature = ct .create_string_buffer (signature , len (signature ))
528- signature_len = ct .c_int (len (my_signature ))
529- my_context = ct .create_string_buffer (context , len (context ))
530- context_len = ct .c_int (len (my_context ))
531- my_public_key = ct .create_string_buffer (
525+ c_message = ct .create_string_buffer (message , len (message ))
526+ message_len = ct .c_int (len (c_message ))
527+ c_signature = ct .create_string_buffer (signature , len (signature ))
528+ signature_len = ct .c_int (len (c_signature ))
529+ c_context = ct .create_string_buffer (context , len (context ))
530+ context_len = ct .c_int (len (c_context ))
531+ c_public_key = ct .create_string_buffer (
532532 public_key , self ._sig .contents .length_public_key
533533 )
534534
535535 rv = native ().OQS_SIG_verify_with_ctx_str (
536536 self ._sig ,
537- my_message ,
537+ c_message ,
538538 message_len ,
539- my_signature ,
539+ c_signature ,
540540 signature_len ,
541- my_context ,
541+ c_context ,
542542 context_len ,
543- my_public_key ,
543+ c_public_key ,
544544 )
545545
546546 return True if rv == OQS_SUCCESS else False
0 commit comments