2626 * bfac: (output) pointer to array of DECAF_255_SCALAR_BYTES (32) bytes - the blinding factor
2727 * chal: (output) pointer to array of DECAF_255_SER_BYTES (32) bytes - the challenge
2828 */
29- void challenge (const uint8_t * pwd , const size_t p_len , uint8_t * bfac , uint8_t * chal ) {
29+ void sphinx_challenge (const uint8_t * pwd , const size_t p_len , uint8_t * bfac , uint8_t * chal ) {
3030 unsigned char hash [DECAF_255_HASH_BYTES ];
3131 crypto_generichash (hash , sizeof hash , pwd , p_len , 0 , 0 );
3232 // hashed_to_point with elligator the password hash
@@ -58,7 +58,7 @@ void challenge(const uint8_t *pwd, const size_t p_len, uint8_t *bfac, uint8_t *c
5858 * resp: (output) the response, DECAF_255_SER_BYTES (32) bytes array
5959 * returns 1 on error, 0 on success
6060 */
61- int respond (const uint8_t * chal , const uint8_t * secret , uint8_t * resp ) {
61+ int sphinx_respond (const uint8_t * chal , const uint8_t * secret , uint8_t * resp ) {
6262 // deserialize challenge into C
6363 decaf_255_point_t C , R ;
6464 if (DECAF_SUCCESS != decaf_255_point_decode (C , chal , DECAF_FALSE )) return 1 ;
@@ -82,7 +82,7 @@ int respond(const uint8_t *chal, const uint8_t *secret, uint8_t *resp) {
8282 * rwd: (output) the derived password, DECAF_255_SER_BYTES (32) bytes array
8383 * returns 1 on error, 0 on success
8484 */
85- int finish (const uint8_t * bfac , const uint8_t * resp , uint8_t * rwd ) {
85+ int sphinx_finish (const uint8_t * bfac , const uint8_t * resp , uint8_t * rwd ) {
8686 // decode blinding factor into scalar
8787 decaf_255_scalar_t b ;
8888 decaf_255_scalar_decode_long (b , bfac , DECAF_255_SCALAR_BYTES );
0 commit comments