O'Reilly logo

Cryptography in C and C++, Second Edition by Michael Welschenbach

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Directory of C Functions

Input/Output, Assignment, Conversions, Comparisons

int
byte2clint_l (CLINT n_l,
    char *bytes, int len);

conversion of a byte vector to CLINT (after IEEE, P1363, 5.5.1)

UCHAR*
clint2byte_l (CLINT n_l,
     int *len);

convert CLINT to a byte vector (according to IEEE, P1363, 5.5.1)

int
cmp_l (CLINT a_l, CLINT b_l);

size comparison of a_l and b_l

int
cpy_l (CLINT dest_l, CLINT src_l);

assignment of src_l to dest_l

int
equ_l (CLINT a_l, CLINT b_l);

test of equality of a_l and b_l

void
fswap_l (CLINT a_l, CLINT b_l);

exchange of a_l and b_l

clint*
setmax_l (CLINT n_l);

set n_l to the largest CLINT integer representable by the number Nmax

int
str2clint_l (CLINT n_l,
    char *N, USHORT b);

convert a character string to the base b to CLINT ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required