diff --git a/contrib/keygen-html/Makefile b/contrib/keygen-html/Makefile deleted file mode 100644 index a3acec0..0000000 --- a/contrib/keygen-html/Makefile +++ /dev/null @@ -1,6 +0,0 @@ -curve25519_generate.js: src/curve25519_generate.c src/glue.js - emcc -O2 --memory-init-file 0 --closure 1 --post-js src/glue.js -s 'EXTRA_EXPORTED_RUNTIME_METHODS=["Pointer_stringify"]' -o $@ src/curve25519_generate.c -clean: - rm -f curve25519_generate.js -all: curve25519_generate.js -.PHONY: clean all diff --git a/contrib/keygen-html/README b/contrib/keygen-html/README index eaa4244..f1c3412 100644 --- a/contrib/keygen-html/README +++ b/contrib/keygen-html/README @@ -17,11 +17,3 @@ introduces interesting side-channel attacks. Secrets aren't zerored after use. Maybe you can get around this with some tricks taking advantage of browser allocator behavior and different processes, but it seems pretty hard. - -Building --------- - -In order to use the example `keygen.html` file, you must first build -the C sources using emscripten. Simply run: - - $ make diff --git a/contrib/keygen-html/keygen.html b/contrib/keygen-html/keygen.html index af2a545..939e637 100644 --- a/contrib/keygen-html/keygen.html +++ b/contrib/keygen-html/keygen.html @@ -1,4 +1,4 @@ - +