<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <title>Crypto++: pwdbased.h Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <link href="doxygen.css" rel="stylesheet" type="text/css"/> </head> <body> <!-- Generated by Doxygen 1.6.1 --> <div class="navigation" id="top"> <div class="tabs"> <ul> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="namespaces.html"><span>Namespaces</span></a></li> <li><a href="annotated.html"><span>Classes</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div class="tabs"> <ul> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>File Members</span></a></li> </ul> </div> <h1>pwdbased.h</h1><div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// pwdbased.h - written and placed in the public domain by Wei Dai</span> <a name="l00002"></a>00002 <a name="l00003"></a>00003 <span class="preprocessor">#ifndef CRYPTOPP_PWDBASED_H</span> <a name="l00004"></a>00004 <span class="preprocessor"></span><span class="preprocessor">#define CRYPTOPP_PWDBASED_H</span> <a name="l00005"></a>00005 <span class="preprocessor"></span> <a name="l00006"></a>00006 <span class="preprocessor">#include "<a class="code" href="cryptlib_8h.html">cryptlib.h</a>"</span> <a name="l00007"></a>00007 <span class="preprocessor">#include "hmac.h"</span> <a name="l00008"></a>00008 <span class="preprocessor">#include "hrtimer.h"</span> <a name="l00009"></a>00009 <a name="l00010"></a>00010 NAMESPACE_BEGIN(CryptoPP) <a name="l00011"></a>00011 <a name="l00012"></a>00012 <span class="comment">//! abstract base class for password based key derivation function</span> <a name="l00013"></a><a class="code" href="class_password_based_key_derivation_function.html">00013</a> <span class="comment"></span>class <a class="code" href="class_password_based_key_derivation_function.html" title="abstract base class for password based key derivation function">PasswordBasedKeyDerivationFunction</a> <a name="l00014"></a>00014 { <a name="l00015"></a>00015 <span class="keyword">public</span>: <a name="l00016"></a>00016 <span class="keyword">virtual</span> <span class="keywordtype">size_t</span> MaxDerivedKeyLength() <span class="keyword">const</span> =0; <a name="l00017"></a>00017 <span class="keyword">virtual</span> <span class="keywordtype">bool</span> UsesPurposeByte() <span class="keyword">const</span> =0;<span class="comment"></span> <a name="l00018"></a>00018 <span class="comment"> //! derive key from password</span> <a name="l00019"></a>00019 <span class="comment"></span><span class="comment"> /*! If timeInSeconds != 0, will iterate until time elapsed, as measured by ThreadUserTimer</span> <a name="l00020"></a>00020 <span class="comment"> Returns actual iteration count, which is equal to iterations if timeInSeconds == 0, and not less than iterations otherwise. */</span> <a name="l00021"></a>00021 <span class="keyword">virtual</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> DeriveKey(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds=0) <span class="keyword">const</span> =0; <a name="l00022"></a>00022 }; <a name="l00023"></a>00023 <span class="comment"></span> <a name="l00024"></a>00024 <span class="comment">//! PBKDF1 from PKCS #5, T should be a HashTransformation class</span> <a name="l00025"></a>00025 <span class="comment"></span><span class="keyword">template</span> <<span class="keyword">class</span> T> <a name="l00026"></a><a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html">00026</a> <span class="keyword">class </span><a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html" title="PBKDF1 from PKCS #5, T should be a HashTransformation class.">PKCS5_PBKDF1</a> : <span class="keyword">public</span> <a class="code" href="class_password_based_key_derivation_function.html" title="abstract base class for password based key derivation function">PasswordBasedKeyDerivationFunction</a> <a name="l00027"></a>00027 { <a name="l00028"></a>00028 <span class="keyword">public</span>: <a name="l00029"></a>00029 <span class="keywordtype">size_t</span> MaxDerivedKeyLength()<span class="keyword"> const </span>{<span class="keywordflow">return</span> T::DIGESTSIZE;} <a name="l00030"></a>00030 <span class="keywordtype">bool</span> UsesPurposeByte()<span class="keyword"> const </span>{<span class="keywordflow">return</span> <span class="keyword">false</span>;} <a name="l00031"></a>00031 <span class="comment">// PKCS #5 says PBKDF1 should only take 8-byte salts. This implementation allows salts of any length.</span> <a name="l00032"></a>00032 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html#ae0d2eab2aaf14d0478d1bbd72e5f3e5a" title="derive key from password">DeriveKey</a>(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds=0) <span class="keyword">const</span>; <a name="l00033"></a>00033 }; <a name="l00034"></a>00034 <span class="comment"></span> <a name="l00035"></a>00035 <span class="comment">//! PBKDF2 from PKCS #5, T should be a HashTransformation class</span> <a name="l00036"></a>00036 <span class="comment"></span><span class="keyword">template</span> <<span class="keyword">class</span> T> <a name="l00037"></a><a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html">00037</a> <span class="keyword">class </span><a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html" title="PBKDF2 from PKCS #5, T should be a HashTransformation class.">PKCS5_PBKDF2_HMAC</a> : <span class="keyword">public</span> <a class="code" href="class_password_based_key_derivation_function.html" title="abstract base class for password based key derivation function">PasswordBasedKeyDerivationFunction</a> <a name="l00038"></a>00038 { <a name="l00039"></a>00039 <span class="keyword">public</span>: <a name="l00040"></a>00040 <span class="keywordtype">size_t</span> MaxDerivedKeyLength()<span class="keyword"> const </span>{<span class="keywordflow">return</span> 0xffffffffU;} <span class="comment">// should multiply by T::DIGESTSIZE, but gets overflow that way</span> <a name="l00041"></a>00041 <span class="keywordtype">bool</span> UsesPurposeByte()<span class="keyword"> const </span>{<span class="keywordflow">return</span> <span class="keyword">false</span>;} <a name="l00042"></a>00042 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html#a570d711d2a840cdcca4b574b6c20f368" title="derive key from password">DeriveKey</a>(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds=0) <span class="keyword">const</span>; <a name="l00043"></a>00043 }; <a name="l00044"></a>00044 <a name="l00045"></a>00045 <span class="comment">/*</span> <a name="l00046"></a>00046 <span class="comment">class PBKDF2Params</span> <a name="l00047"></a>00047 <span class="comment">{</span> <a name="l00048"></a>00048 <span class="comment">public:</span> <a name="l00049"></a>00049 <span class="comment"> SecByteBlock m_salt;</span> <a name="l00050"></a>00050 <span class="comment"> unsigned int m_interationCount;</span> <a name="l00051"></a>00051 <span class="comment"> ASNOptional<ASNUnsignedWrapper<word32> > m_keyLength;</span> <a name="l00052"></a>00052 <span class="comment">};</span> <a name="l00053"></a>00053 <span class="comment">*/</span> <a name="l00054"></a>00054 <a name="l00055"></a>00055 <span class="keyword">template</span> <<span class="keyword">class</span> T> <a name="l00056"></a><a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html#ae0d2eab2aaf14d0478d1bbd72e5f3e5a">00056</a> <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html#ae0d2eab2aaf14d0478d1bbd72e5f3e5a" title="derive key from password">PKCS5_PBKDF1<T>::DeriveKey</a>(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds)<span class="keyword"> const</span> <a name="l00057"></a>00057 <span class="keyword"></span>{ <a name="l00058"></a>00058 assert(derivedLen <= MaxDerivedKeyLength()); <a name="l00059"></a>00059 assert(iterations > 0 || timeInSeconds > 0); <a name="l00060"></a>00060 <a name="l00061"></a>00061 <span class="keywordflow">if</span> (!iterations) <a name="l00062"></a>00062 iterations = 1; <a name="l00063"></a>00063 <a name="l00064"></a>00064 T hash; <a name="l00065"></a>00065 hash.Update(password, passwordLen); <a name="l00066"></a>00066 hash.Update(salt, saltLen); <a name="l00067"></a>00067 <a name="l00068"></a>00068 <a class="code" href="class_sec_block.html">SecByteBlock</a> buffer(hash.DigestSize()); <a name="l00069"></a>00069 hash.Final(buffer); <a name="l00070"></a>00070 <a name="l00071"></a>00071 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i; <a name="l00072"></a>00072 <a class="code" href="class_thread_user_timer.html" title="measure CPU time spent executing instructions of this thread (if supported by OS)...">ThreadUserTimer</a> timer; <a name="l00073"></a>00073 <a name="l00074"></a>00074 <span class="keywordflow">if</span> (timeInSeconds) <a name="l00075"></a>00075 timer.StartTimer(); <a name="l00076"></a>00076 <a name="l00077"></a>00077 <span class="keywordflow">for</span> (i=1; i<iterations || (timeInSeconds && (i%128!=0 || timer.ElapsedTimeAsDouble() < timeInSeconds)); i++) <a name="l00078"></a>00078 hash.CalculateDigest(buffer, buffer, buffer.size()); <a name="l00079"></a>00079 <a name="l00080"></a>00080 memcpy(derived, buffer, derivedLen); <a name="l00081"></a>00081 <span class="keywordflow">return</span> i; <a name="l00082"></a>00082 } <a name="l00083"></a>00083 <a name="l00084"></a>00084 <span class="keyword">template</span> <<span class="keyword">class</span> T> <a name="l00085"></a><a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html#a570d711d2a840cdcca4b574b6c20f368">00085</a> <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html#a570d711d2a840cdcca4b574b6c20f368" title="derive key from password">PKCS5_PBKDF2_HMAC<T>::DeriveKey</a>(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds)<span class="keyword"> const</span> <a name="l00086"></a>00086 <span class="keyword"></span>{ <a name="l00087"></a>00087 assert(derivedLen <= MaxDerivedKeyLength()); <a name="l00088"></a>00088 assert(iterations > 0 || timeInSeconds > 0); <a name="l00089"></a>00089 <a name="l00090"></a>00090 <span class="keywordflow">if</span> (!iterations) <a name="l00091"></a>00091 iterations = 1; <a name="l00092"></a>00092 <a name="l00093"></a>00093 <a class="code" href="class_h_m_a_c.html" title="HMAC">HMAC<T></a> hmac(password, passwordLen); <a name="l00094"></a>00094 <a class="code" href="class_sec_block.html">SecByteBlock</a> buffer(hmac.<a class="code" href="class_h_m_a_c___base.html#a4b3ee793dee4bf86a16fe18326db20e6" title="size of the hash/digest/MAC returned by Final()">DigestSize</a>()); <a name="l00095"></a>00095 <a class="code" href="class_thread_user_timer.html" title="measure CPU time spent executing instructions of this thread (if supported by OS)...">ThreadUserTimer</a> timer; <a name="l00096"></a>00096 <a name="l00097"></a>00097 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i=1; <a name="l00098"></a>00098 <span class="keywordflow">while</span> (derivedLen > 0) <a name="l00099"></a>00099 { <a name="l00100"></a>00100 hmac.<a class="code" href="class_h_m_a_c___base.html#aefb8a1fb43ef8c9390ee89bbb41c83af" title="process more input">Update</a>(salt, saltLen); <a name="l00101"></a>00101 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> j; <a name="l00102"></a>00102 <span class="keywordflow">for</span> (j=0; j<4; j++) <a name="l00103"></a>00103 { <a name="l00104"></a>00104 byte b = byte(i >> ((3-j)*8)); <a name="l00105"></a>00105 hmac.<a class="code" href="class_h_m_a_c___base.html#aefb8a1fb43ef8c9390ee89bbb41c83af" title="process more input">Update</a>(&b, 1); <a name="l00106"></a>00106 } <a name="l00107"></a>00107 hmac.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(buffer); <a name="l00108"></a>00108 <a name="l00109"></a>00109 <span class="keywordtype">size_t</span> segmentLen = STDMIN(derivedLen, buffer.size()); <a name="l00110"></a>00110 memcpy(derived, buffer, segmentLen); <a name="l00111"></a>00111 <a name="l00112"></a>00112 <span class="keywordflow">if</span> (timeInSeconds) <a name="l00113"></a>00113 { <a name="l00114"></a>00114 timeInSeconds = timeInSeconds / ((derivedLen + buffer.size() - 1) / buffer.size()); <a name="l00115"></a>00115 timer.StartTimer(); <a name="l00116"></a>00116 } <a name="l00117"></a>00117 <a name="l00118"></a>00118 <span class="keywordflow">for</span> (j=1; j<iterations || (timeInSeconds && (j%128!=0 || timer.ElapsedTimeAsDouble() < timeInSeconds)); j++) <a name="l00119"></a>00119 { <a name="l00120"></a>00120 hmac.<a class="code" href="class_hash_transformation.html#af8124c4fca23b74bbdc43660bdae692c" title="use this if your input is in one piece and you don&#39;t want to call Update() and...">CalculateDigest</a>(buffer, buffer, buffer.size()); <a name="l00121"></a>00121 xorbuf(derived, buffer, segmentLen); <a name="l00122"></a>00122 } <a name="l00123"></a>00123 <a name="l00124"></a>00124 <span class="keywordflow">if</span> (timeInSeconds) <a name="l00125"></a>00125 { <a name="l00126"></a>00126 iterations = j; <a name="l00127"></a>00127 timeInSeconds = 0; <a name="l00128"></a>00128 } <a name="l00129"></a>00129 <a name="l00130"></a>00130 derived += segmentLen; <a name="l00131"></a>00131 derivedLen -= segmentLen; <a name="l00132"></a>00132 i++; <a name="l00133"></a>00133 } <a name="l00134"></a>00134 <a name="l00135"></a>00135 <span class="keywordflow">return</span> iterations; <a name="l00136"></a>00136 } <a name="l00137"></a>00137 <span class="comment"></span> <a name="l00138"></a>00138 <span class="comment">//! PBKDF from PKCS #12, appendix B, T should be a HashTransformation class</span> <a name="l00139"></a>00139 <span class="comment"></span><span class="keyword">template</span> <<span class="keyword">class</span> T> <a name="l00140"></a><a class="code" href="class_p_k_c_s12___p_b_k_d_f.html">00140</a> <span class="keyword">class </span><a class="code" href="class_p_k_c_s12___p_b_k_d_f.html" title="PBKDF from PKCS #12, appendix B, T should be a HashTransformation class.">PKCS12_PBKDF</a> : <span class="keyword">public</span> <a class="code" href="class_password_based_key_derivation_function.html" title="abstract base class for password based key derivation function">PasswordBasedKeyDerivationFunction</a> <a name="l00141"></a>00141 { <a name="l00142"></a>00142 <span class="keyword">public</span>: <a name="l00143"></a>00143 <span class="keywordtype">size_t</span> MaxDerivedKeyLength()<span class="keyword"> const </span>{<span class="keywordflow">return</span> size_t(0)-1;} <a name="l00144"></a>00144 <span class="keywordtype">bool</span> UsesPurposeByte()<span class="keyword"> const </span>{<span class="keywordflow">return</span> <span class="keyword">true</span>;} <a name="l00145"></a>00145 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_p_k_c_s12___p_b_k_d_f.html#a10da705e5b49d3777e244bac6ae0182b" title="derive key from password">DeriveKey</a>(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds) <span class="keyword">const</span>; <a name="l00146"></a>00146 }; <a name="l00147"></a>00147 <a name="l00148"></a>00148 <span class="keyword">template</span> <<span class="keyword">class</span> T> <a name="l00149"></a><a class="code" href="class_p_k_c_s12___p_b_k_d_f.html#a10da705e5b49d3777e244bac6ae0182b">00149</a> <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> <a class="code" href="class_p_k_c_s12___p_b_k_d_f.html#a10da705e5b49d3777e244bac6ae0182b" title="derive key from password">PKCS12_PBKDF<T>::DeriveKey</a>(byte *derived, <span class="keywordtype">size_t</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">size_t</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations, <span class="keywordtype">double</span> timeInSeconds)<span class="keyword"> const</span> <a name="l00150"></a>00150 <span class="keyword"></span>{ <a name="l00151"></a>00151 assert(derivedLen <= MaxDerivedKeyLength()); <a name="l00152"></a>00152 assert(iterations > 0 || timeInSeconds > 0); <a name="l00153"></a>00153 <a name="l00154"></a>00154 <span class="keywordflow">if</span> (!iterations) <a name="l00155"></a>00155 iterations = 1; <a name="l00156"></a>00156 <a name="l00157"></a>00157 <span class="keyword">const</span> <span class="keywordtype">size_t</span> v = T::BLOCKSIZE; <span class="comment">// v is in bytes rather than bits as in PKCS #12</span> <a name="l00158"></a>00158 <span class="keyword">const</span> <span class="keywordtype">size_t</span> DLen = v, SLen = RoundUpToMultipleOf(saltLen, v); <a name="l00159"></a>00159 <span class="keyword">const</span> <span class="keywordtype">size_t</span> PLen = RoundUpToMultipleOf(passwordLen, v), ILen = SLen + PLen; <a name="l00160"></a>00160 <a class="code" href="class_sec_block.html">SecByteBlock</a> buffer(DLen + SLen + PLen); <a name="l00161"></a>00161 byte *D = buffer, *S = buffer+DLen, *P = buffer+DLen+SLen, *I = S; <a name="l00162"></a>00162 <a name="l00163"></a>00163 memset(D, purpose, DLen); <a name="l00164"></a>00164 <span class="keywordtype">size_t</span> i; <a name="l00165"></a>00165 <span class="keywordflow">for</span> (i=0; i<SLen; i++) <a name="l00166"></a>00166 S[i] = salt[i % saltLen]; <a name="l00167"></a>00167 <span class="keywordflow">for</span> (i=0; i<PLen; i++) <a name="l00168"></a>00168 P[i] = password[i % passwordLen]; <a name="l00169"></a>00169 <a name="l00170"></a>00170 <a name="l00171"></a>00171 T hash; <a name="l00172"></a>00172 <a class="code" href="class_sec_block.html">SecByteBlock</a> Ai(T::DIGESTSIZE), B(v); <a name="l00173"></a>00173 <a class="code" href="class_thread_user_timer.html" title="measure CPU time spent executing instructions of this thread (if supported by OS)...">ThreadUserTimer</a> timer; <a name="l00174"></a>00174 <a name="l00175"></a>00175 <span class="keywordflow">while</span> (derivedLen > 0) <a name="l00176"></a>00176 { <a name="l00177"></a>00177 hash.CalculateDigest(Ai, buffer, buffer.size()); <a name="l00178"></a>00178 <a name="l00179"></a>00179 <span class="keywordflow">if</span> (timeInSeconds) <a name="l00180"></a>00180 { <a name="l00181"></a>00181 timeInSeconds = timeInSeconds / ((derivedLen + Ai.size() - 1) / Ai.size()); <a name="l00182"></a>00182 timer.StartTimer(); <a name="l00183"></a>00183 } <a name="l00184"></a>00184 <a name="l00185"></a>00185 <span class="keywordflow">for</span> (i=1; i<iterations || (timeInSeconds && (i%128!=0 || timer.ElapsedTimeAsDouble() < timeInSeconds)); i++) <a name="l00186"></a>00186 hash.CalculateDigest(Ai, Ai, Ai.size()); <a name="l00187"></a>00187 <a name="l00188"></a>00188 <span class="keywordflow">if</span> (timeInSeconds) <a name="l00189"></a>00189 { <a name="l00190"></a>00190 iterations = (<span class="keywordtype">unsigned</span> int)i; <a name="l00191"></a>00191 timeInSeconds = 0; <a name="l00192"></a>00192 } <a name="l00193"></a>00193 <a name="l00194"></a>00194 <span class="keywordflow">for</span> (i=0; i<B.size(); i++) <a name="l00195"></a>00195 B[i] = Ai[i % Ai.size()]; <a name="l00196"></a>00196 <a name="l00197"></a>00197 <a class="code" href="class_integer.html" title="multiple precision integer and basic arithmetics">Integer</a> B1(B, B.size()); <a name="l00198"></a>00198 ++B1; <a name="l00199"></a>00199 <span class="keywordflow">for</span> (i=0; i<ILen; i+=v) <a name="l00200"></a>00200 (<a class="code" href="class_integer.html" title="multiple precision integer and basic arithmetics">Integer</a>(I+i, v) + B1).Encode(I+i, v); <a name="l00201"></a>00201 <a name="l00202"></a>00202 <span class="keywordtype">size_t</span> segmentLen = STDMIN(derivedLen, Ai.size()); <a name="l00203"></a>00203 memcpy(derived, Ai, segmentLen); <a name="l00204"></a>00204 derived += segmentLen; <a name="l00205"></a>00205 derivedLen -= segmentLen; <a name="l00206"></a>00206 } <a name="l00207"></a>00207 <a name="l00208"></a>00208 <span class="keywordflow">return</span> iterations; <a name="l00209"></a>00209 } <a name="l00210"></a>00210 <a name="l00211"></a>00211 NAMESPACE_END <a name="l00212"></a>00212 <a name="l00213"></a>00213 <span class="preprocessor">#endif</span> </pre></div></div> <hr size="1"/><address style="text-align: right;"><small>Generated on 9 Dec 2009 for Crypto++ by <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.6.1 </small></address> </body> </html>