> I think that this is a good time to write down the API in the
   > reference manual. Would you like to prepare the draft taking into
   > account the comments made in this mailing list about the issue?

   I would like it :). So I have already written down the draft.

Thanks :) Some comments about the patch follows.

[EMAIL PROTECTED] Initializating the module
[EMAIL PROTECTED] Initializating the module
+
+The encryption module must be initialized when Libgnupdf library was
+loaded It is *NOT* safe-thread.

What kind of global data will be maintained by the module? All the
information related with the ciphers will be stored in the per-cipher
data structure, isnt it?

[EMAIL PROTECTED] {Data Type} {pdf_crypt_algo_t}
+Enumeration of encryption algorithms provided.
[EMAIL PROTECTED] deftp

Note that we are using the convention of naming the enumeration data
types as 'enum pdf_XXX_e'. Also, we use to include the complete data
type name in the @deftp entry, as:

  @deftp {Data Type} {enum pdf_crypt_algo_e}
  ...
  @end deftp

[EMAIL PROTECTED] {Data Type} {pdf_crypt_t}
+A cipher. It contains data which is required between several calls to
+functions.
[EMAIL PROTECTED] deftp

The crypt module will implement several abstractions, one of which is
the 'cipher'. I would suggest to use a more explicit data type such as
'pdf_crypt_cipher_t' for ciphers.

Also, the functions operating in ciphers should be named after
'pdf_crypt_cipher_xxx'.

[EMAIL PROTECTED] pdf_status_t pdf_crypt_new (pdf_crypt_algo_t @var{algorithm}, 
pdf_crypt_t @var{*cipher})

Please use '[EMAIL PROTECTED]' instead of '@var{*cipher}'

+The algorithm the cipher will use in order to encrypt or decrypt
+data. Possible values are:
[EMAIL PROTECTED] @code
[EMAIL PROTECTED] PDF_CRYPT_IDENTITY
[EMAIL PROTECTED] PDF_CRYPT_AESV2
[EMAIL PROTECTED] PDF_CRYPT_V2

Please document the possible values of the enumeration data type in
the appropriate @deftp entry.

[EMAIL PROTECTED] Encryption and decryption
[EMAIL PROTECTED] Encryption and decryption
+
[EMAIL PROTECTED] pdf_status_t pdf_crypt_setkey (pdf_crypt_t @var{cipher}, 
pdf_char_t  @var{*key}, pdf_size_t  @var{length})
+
+Set the key which will be used to encrypt and decrypt data. This
+function should be called each time @code{pdf_crypt_encrypt} or
[EMAIL PROTECTED] are called.

Is that restriction really needed?

[EMAIL PROTECTED] length
+The length of the key in bytes. Note that some algorithms could require
+a fixed length of key.
[EMAIL PROTECTED] table
[EMAIL PROTECTED] Returns
+A PDF status value:
[EMAIL PROTECTED] @code
[EMAIL PROTECTED] PDF_OK
[EMAIL PROTECTED] PDF_ERROR
[EMAIL PROTECTED] table
[EMAIL PROTECTED] table
[EMAIL PROTECTED] deftypefun

Since you can pass invalid parameters to this function
(pdf_crypt_cipher_setkey) would be good to have more detailed return
status values, such as PDF_EBADDATA for an invalid key (wrong key
length, etc).

Dont hesitate to define new values for pdf_status_t as needed.

[EMAIL PROTECTED] pdf_status_t pdf_crypt_encrypt (pdf_crypt_t @var{cipher}, 
pdf_char_t  @var{*out}, pdf_size_t  @var{outsize}, pdf_char_t  @var{*in}, 
pdf_size_t  @var{length}) 
+
+Encrypt a buffer. The ciphered text will be put in @var{out}.
+
[EMAIL PROTECTED] deftypefun

Please include information about parameters, return value, etc in
every @deftypefun entry.

Also note that if you call the first size parameter 'in_size' then
would be reasonable to do the same with 'out_size' ('length' name
may be confusing).

BTW, how do we know the size of the de/ciphered text? As far as I
understand it the *_crypt_size functions provides information about
the minimum buffer space required to hold the de/ciphered text, but
not the exact number of bytes.

[EMAIL PROTECTED] Usage example
[EMAIL PROTECTED] Usage example

We are including "Usage example" entries for every function documented
in the reference manual (into the @deftypefun block).

If you want to provide additional examples involving several functions
or non-simple examples then it is ok to include a subsection like
"Examples of use".



Reply via email to