4RYULBDDDIVSJTIOTBBSQAWMSN6ZBZEFJ6UR7P6ECEXEXTGPMUOAC
VXGUQZIVOLPAPINOY3EMFDHLFNBI3H6BNYYENS7P4G2WT4CCWCAQC
OBKF6SIIFFHHY7YWKPPX75N23NAVUD5662DKIHXSSIDPKKXQ5ZDQC
Y26WT3ZFN7KSVXOZ26B5Y2OR4M4VQYQLPMAHPC4O5VIT3ENBISXAC
Q7TKZCJP2Z75EICZYKCEZDHKGERSOKZGMTSU3UXETBHTF663T66AC
RIWSVVASWLJQQTSVRHIIUPENOZWOMHQLZMTQVGJUS2ZUGDPSWWIQC
VKLGQREYOZDV46F672RFE5XJO3OEOP4EHTCWZYOJY24HVPQX3L6QC
*/
/**
* This approach could simplify signatures a bit (in the sense of changing to a
* single pointer again). It would also allow adding some bounds checking that
* we aren't trying to read more data than available in the buffer. Maybe a case
* for "if (unlikely(s->len - s->count < sizeof(type)))" ?
uint16_t bincode_getu16(uint8_t **);
uint32_t bincode_getu32(uint8_t **);
uint64_t bincode_getu64(uint8_t **);
uint8_t bincode_getu8(struct bincode_state *);
uint16_t bincode_getu16(struct bincode_state *);
uint32_t bincode_getu32(struct bincode_state *);
uint64_t bincode_getu64(struct bincode_state *);