Sophie

Sophie

distrib > Fedora > 15 > i386 > by-pkgid > 326b45141e798bc915a333a5e4f07d68 > files > 1694

cryptopp-doc-5.6.1-4.fc15.noarch.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<title>Crypto++: default.cpp Source File</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<link href="doxygen.css" rel="stylesheet" type="text/css"/>
</head>
<body>
<!-- Generated by Doxygen 1.7.3 -->
<div id="top">
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td style="padding-left: 0.5em;">
   <div id="projectname">Crypto++</div>
  </td>
 </tr>
 </tbody>
</table>
</div>
  <div id="navrow1" class="tabs">
    <ul class="tablist">
      <li><a href="index.html"><span>Main&#160;Page</span></a></li>
      <li><a href="namespaces.html"><span>Namespaces</span></a></li>
      <li><a href="annotated.html"><span>Classes</span></a></li>
      <li class="current"><a href="files.html"><span>Files</span></a></li>
    </ul>
  </div>
  <div id="navrow2" class="tabs2">
    <ul class="tablist">
      <li><a href="files.html"><span>File&#160;List</span></a></li>
      <li><a href="globals.html"><span>File&#160;Members</span></a></li>
    </ul>
  </div>
<div class="header">
  <div class="headertitle">
<h1>default.cpp</h1>  </div>
</div>
<div class="contents">
<div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// default.cpp - written and placed in the public domain by Wei Dai</span>
<a name="l00002"></a>00002 
<a name="l00003"></a>00003 <span class="preprocessor">#include &quot;pch.h&quot;</span>
<a name="l00004"></a>00004 <span class="preprocessor">#include &quot;default.h&quot;</span>
<a name="l00005"></a>00005 <span class="preprocessor">#include &quot;queue.h&quot;</span>
<a name="l00006"></a>00006 <span class="preprocessor">#include &lt;time.h&gt;</span>
<a name="l00007"></a>00007 <span class="preprocessor">#include &lt;memory&gt;</span>
<a name="l00008"></a>00008 
<a name="l00009"></a>00009 NAMESPACE_BEGIN(CryptoPP)
<a name="l00010"></a>00010 
<a name="l00011"></a>00011 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> MASH_ITERATIONS = 200;
<a name="l00012"></a>00012 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> SALTLENGTH = 8;
<a name="l00013"></a>00013 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> BLOCKSIZE = <a class="code" href="class_d_e_s___e_d_e2.html" title="DES-EDE2">Default_BlockCipher</a>::Encryption::BLOCKSIZE;
<a name="l00014"></a>00014 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> KEYLENGTH = <a class="code" href="class_d_e_s___e_d_e2.html" title="DES-EDE2">Default_BlockCipher</a>::Encryption::DEFAULT_KEYLENGTH;
<a name="l00015"></a>00015 
<a name="l00016"></a>00016 <span class="comment">// The purpose of this function Mash() is to take an arbitrary length input</span>
<a name="l00017"></a>00017 <span class="comment">// string and *deterministicly* produce an arbitrary length output string such</span>
<a name="l00018"></a>00018 <span class="comment">// that (1) it looks random, (2) no information about the input is</span>
<a name="l00019"></a>00019 <span class="comment">// deducible from it, and (3) it contains as much entropy as it can hold, or</span>
<a name="l00020"></a>00020 <span class="comment">// the amount of entropy in the input string, whichever is smaller.</span>
<a name="l00021"></a>00021 
<a name="l00022"></a>00022 static <span class="keywordtype">void</span> Mash(const byte *in, <span class="keywordtype">size_t</span> inLen, byte *out, <span class="keywordtype">size_t</span> outLen, <span class="keywordtype">int</span> iterations)
<a name="l00023"></a>00023 {
<a name="l00024"></a>00024         <span class="keywordflow">if</span> (BytePrecision(outLen) &gt; 2)
<a name="l00025"></a>00025                 <span class="keywordflow">throw</span> <a class="code" href="class_invalid_argument.html" title="exception thrown when an invalid argument is detected">InvalidArgument</a>(<span class="stringliteral">&quot;Mash: output legnth too large&quot;</span>);
<a name="l00026"></a>00026 
<a name="l00027"></a>00027         <span class="keywordtype">size_t</span> bufSize = RoundUpToMultipleOf(outLen, (<span class="keywordtype">size_t</span>)DefaultHashModule::DIGESTSIZE);
<a name="l00028"></a>00028         byte b[2];
<a name="l00029"></a>00029         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> buf(bufSize);
<a name="l00030"></a>00030         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> outBuf(bufSize);
<a name="l00031"></a>00031         <a class="code" href="class_s_h_a1.html" title="SHA-1">DefaultHashModule</a> hash;
<a name="l00032"></a>00032 
<a name="l00033"></a>00033         <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i;
<a name="l00034"></a>00034         <span class="keywordflow">for</span>(i=0; i&lt;outLen; i+=DefaultHashModule::DIGESTSIZE)
<a name="l00035"></a>00035         {
<a name="l00036"></a>00036                 b[0] = (byte) (i &gt;&gt; 8);
<a name="l00037"></a>00037                 b[1] = (byte) i;
<a name="l00038"></a>00038                 hash.Update(b, 2);
<a name="l00039"></a>00039                 hash.Update(in, inLen);
<a name="l00040"></a>00040                 hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(outBuf+i);
<a name="l00041"></a>00041         }
<a name="l00042"></a>00042 
<a name="l00043"></a>00043         <span class="keywordflow">while</span> (iterations-- &gt; 1)
<a name="l00044"></a>00044         {
<a name="l00045"></a>00045                 memcpy(buf, outBuf, bufSize);
<a name="l00046"></a>00046                 <span class="keywordflow">for</span> (i=0; i&lt;bufSize; i+=DefaultHashModule::DIGESTSIZE)
<a name="l00047"></a>00047                 {
<a name="l00048"></a>00048                         b[0] = (byte) (i &gt;&gt; 8);
<a name="l00049"></a>00049                         b[1] = (byte) i;
<a name="l00050"></a>00050                         hash.Update(b, 2);
<a name="l00051"></a>00051                         hash.Update(buf, bufSize);
<a name="l00052"></a>00052                         hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(outBuf+i);
<a name="l00053"></a>00053                 }
<a name="l00054"></a>00054         }
<a name="l00055"></a>00055 
<a name="l00056"></a>00056         memcpy(out, outBuf, outLen);
<a name="l00057"></a>00057 }
<a name="l00058"></a>00058 
<a name="l00059"></a>00059 <span class="keyword">static</span> <span class="keywordtype">void</span> GenerateKeyIV(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLength, byte *key, byte *IV)
<a name="l00060"></a>00060 {
<a name="l00061"></a>00061         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> temp(passphraseLength+saltLength);
<a name="l00062"></a>00062         memcpy(temp, passphrase, passphraseLength);
<a name="l00063"></a>00063         memcpy(temp+passphraseLength, salt, saltLength);
<a name="l00064"></a>00064         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> keyIV(KEYLENGTH+BLOCKSIZE);
<a name="l00065"></a>00065         Mash(temp, passphraseLength + saltLength, keyIV, KEYLENGTH+BLOCKSIZE, MASH_ITERATIONS);
<a name="l00066"></a>00066         memcpy(key, keyIV, KEYLENGTH);
<a name="l00067"></a>00067         memcpy(IV, keyIV+KEYLENGTH, BLOCKSIZE);
<a name="l00068"></a>00068 }
<a name="l00069"></a>00069 
<a name="l00070"></a>00070 <span class="comment">// ********************************************************</span>
<a name="l00071"></a>00071 
<a name="l00072"></a>00072 DefaultEncryptor::DefaultEncryptor(<span class="keyword">const</span> <span class="keywordtype">char</span> *passphrase, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment)
<a name="l00073"></a>00073         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment), m_passphrase((const byte *)passphrase, strlen(passphrase))
<a name="l00074"></a>00074 {
<a name="l00075"></a>00075 }
<a name="l00076"></a>00076 
<a name="l00077"></a>00077 DefaultEncryptor::DefaultEncryptor(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment)
<a name="l00078"></a>00078         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment), m_passphrase(passphrase, passphraseLength)
<a name="l00079"></a>00079 {
<a name="l00080"></a>00080 }
<a name="l00081"></a>00081 
<a name="l00082"></a>00082 
<a name="l00083"></a>00083 <span class="keywordtype">void</span> DefaultEncryptor::FirstPut(<span class="keyword">const</span> byte *)
<a name="l00084"></a>00084 {
<a name="l00085"></a>00085         <span class="comment">// VC60 workaround: __LINE__ expansion bug</span>
<a name="l00086"></a>00086         CRYPTOPP_COMPILE_ASSERT_INSTANCE(SALTLENGTH &lt;= DefaultHashModule::DIGESTSIZE, 1);
<a name="l00087"></a>00087         CRYPTOPP_COMPILE_ASSERT_INSTANCE(BLOCKSIZE &lt;= DefaultHashModule::DIGESTSIZE, 2);
<a name="l00088"></a>00088 
<a name="l00089"></a>00089         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> salt(DefaultHashModule::DIGESTSIZE), keyCheck(DefaultHashModule::DIGESTSIZE);
<a name="l00090"></a>00090         <a class="code" href="class_s_h_a1.html" title="SHA-1">DefaultHashModule</a> hash;
<a name="l00091"></a>00091 
<a name="l00092"></a>00092         <span class="comment">// use hash(passphrase | time | clock) as salt</span>
<a name="l00093"></a>00093         hash.Update(m_passphrase, m_passphrase.size());
<a name="l00094"></a>00094         time_t t=time(0);
<a name="l00095"></a>00095         hash.Update((byte *)&amp;t, <span class="keyword">sizeof</span>(t));
<a name="l00096"></a>00096         clock_t c=clock();
<a name="l00097"></a>00097         hash.Update((byte *)&amp;c, <span class="keyword">sizeof</span>(c));
<a name="l00098"></a>00098         hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(salt);
<a name="l00099"></a>00099 
<a name="l00100"></a>00100         <span class="comment">// use hash(passphrase | salt) as key check</span>
<a name="l00101"></a>00101         hash.Update(m_passphrase, m_passphrase.size());
<a name="l00102"></a>00102         hash.Update(salt, SALTLENGTH);
<a name="l00103"></a>00103         hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(keyCheck);
<a name="l00104"></a>00104 
<a name="l00105"></a>00105         <a class="code" href="class_filter.html#ac8fc888888b2dad88bf64fc703044a93" title="returns the object immediately attached to this object or NULL for no attachment">AttachedTransformation</a>()-&gt;<a class="code" href="class_buffered_transformation.html#ae70658b0d271f8e114ac6c3cc9774ede" title="input a byte for processing">Put</a>(salt, SALTLENGTH);
<a name="l00106"></a>00106 
<a name="l00107"></a>00107         <span class="comment">// mash passphrase and salt together into key and IV</span>
<a name="l00108"></a>00108         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> key(KEYLENGTH);
<a name="l00109"></a>00109         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>(BLOCKSIZE);
<a name="l00110"></a>00110         GenerateKeyIV(m_passphrase, m_passphrase.size(), salt, SALTLENGTH, key, <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>);
<a name="l00111"></a>00111 
<a name="l00112"></a>00112         m_cipher.SetKeyWithIV(key, key.size(), <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>);
<a name="l00113"></a>00113         SetFilter(<span class="keyword">new</span> <a class="code" href="class_stream_transformation_filter.html" title="Filter Wrapper for StreamTransformation, optionally handling padding/unpadding when needed...">StreamTransformationFilter</a>(m_cipher));
<a name="l00114"></a>00114 
<a name="l00115"></a>00115         m_filter-&gt;Put(keyCheck, BLOCKSIZE);
<a name="l00116"></a>00116 }
<a name="l00117"></a>00117 
<a name="l00118"></a>00118 <span class="keywordtype">void</span> DefaultEncryptor::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length)
<a name="l00119"></a>00119 {
<a name="l00120"></a>00120         m_filter-&gt;MessageEnd();
<a name="l00121"></a>00121 }
<a name="l00122"></a>00122 
<a name="l00123"></a>00123 <span class="comment">// ********************************************************</span>
<a name="l00124"></a>00124 
<a name="l00125"></a>00125 DefaultDecryptor::DefaultDecryptor(<span class="keyword">const</span> <span class="keywordtype">char</span> *p, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException)
<a name="l00126"></a>00126         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, SALTLENGTH+BLOCKSIZE, 0, attachment)
<a name="l00127"></a>00127         , m_state(WAITING_FOR_KEYCHECK)
<a name="l00128"></a>00128         , m_passphrase((const byte *)p, strlen(p))
<a name="l00129"></a>00129         , m_throwException(throwException)
<a name="l00130"></a>00130 {
<a name="l00131"></a>00131 }
<a name="l00132"></a>00132 
<a name="l00133"></a>00133 DefaultDecryptor::DefaultDecryptor(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException)
<a name="l00134"></a>00134         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, SALTLENGTH+BLOCKSIZE, 0, attachment)
<a name="l00135"></a>00135         , m_state(WAITING_FOR_KEYCHECK)
<a name="l00136"></a>00136         , m_passphrase(passphrase, passphraseLength)
<a name="l00137"></a>00137         , m_throwException(throwException)
<a name="l00138"></a>00138 {
<a name="l00139"></a>00139 }
<a name="l00140"></a>00140 
<a name="l00141"></a>00141 <span class="keywordtype">void</span> DefaultDecryptor::FirstPut(<span class="keyword">const</span> byte *inString)
<a name="l00142"></a>00142 {
<a name="l00143"></a>00143         CheckKey(inString, inString+SALTLENGTH);
<a name="l00144"></a>00144 }
<a name="l00145"></a>00145 
<a name="l00146"></a>00146 <span class="keywordtype">void</span> DefaultDecryptor::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length)
<a name="l00147"></a>00147 {
<a name="l00148"></a>00148         <span class="keywordflow">if</span> (m_filter.get() == NULL)
<a name="l00149"></a>00149         {
<a name="l00150"></a>00150                 m_state = KEY_BAD;
<a name="l00151"></a>00151                 <span class="keywordflow">if</span> (m_throwException)
<a name="l00152"></a>00152                         <span class="keywordflow">throw</span> KeyBadErr();
<a name="l00153"></a>00153         }
<a name="l00154"></a>00154         <span class="keywordflow">else</span>
<a name="l00155"></a>00155         {
<a name="l00156"></a>00156                 m_filter-&gt;MessageEnd();
<a name="l00157"></a>00157                 m_state = WAITING_FOR_KEYCHECK;
<a name="l00158"></a>00158         }
<a name="l00159"></a>00159 }
<a name="l00160"></a>00160 
<a name="l00161"></a>00161 <span class="keywordtype">void</span> DefaultDecryptor::CheckKey(<span class="keyword">const</span> byte *salt, <span class="keyword">const</span> byte *keyCheck)
<a name="l00162"></a>00162 {
<a name="l00163"></a>00163         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> check(STDMAX((<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span>)2*BLOCKSIZE, (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span>)DefaultHashModule::DIGESTSIZE));
<a name="l00164"></a>00164 
<a name="l00165"></a>00165         <a class="code" href="class_s_h_a1.html" title="SHA-1">DefaultHashModule</a> hash;
<a name="l00166"></a>00166         hash.Update(m_passphrase, m_passphrase.size());
<a name="l00167"></a>00167         hash.Update(salt, SALTLENGTH);
<a name="l00168"></a>00168         hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(check);
<a name="l00169"></a>00169 
<a name="l00170"></a>00170         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> key(KEYLENGTH);
<a name="l00171"></a>00171         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>(BLOCKSIZE);
<a name="l00172"></a>00172         GenerateKeyIV(m_passphrase, m_passphrase.size(), salt, SALTLENGTH, key, <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>);
<a name="l00173"></a>00173 
<a name="l00174"></a>00174         m_cipher.SetKeyWithIV(key, key.size(), <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>);
<a name="l00175"></a>00175         std::auto_ptr&lt;StreamTransformationFilter&gt; decryptor(<span class="keyword">new</span> <a class="code" href="class_stream_transformation_filter.html" title="Filter Wrapper for StreamTransformation, optionally handling padding/unpadding when needed...">StreamTransformationFilter</a>(m_cipher));
<a name="l00176"></a>00176 
<a name="l00177"></a>00177         decryptor-&gt;Put(keyCheck, BLOCKSIZE);
<a name="l00178"></a>00178         decryptor-&gt;ForceNextPut();
<a name="l00179"></a>00179         decryptor-&gt;Get(check+BLOCKSIZE, BLOCKSIZE);
<a name="l00180"></a>00180 
<a name="l00181"></a>00181         SetFilter(decryptor.release());
<a name="l00182"></a>00182 
<a name="l00183"></a>00183         <span class="keywordflow">if</span> (!VerifyBufsEqual(check, check+BLOCKSIZE, BLOCKSIZE))
<a name="l00184"></a>00184         {
<a name="l00185"></a>00185                 m_state = KEY_BAD;
<a name="l00186"></a>00186                 <span class="keywordflow">if</span> (m_throwException)
<a name="l00187"></a>00187                         <span class="keywordflow">throw</span> KeyBadErr();
<a name="l00188"></a>00188         }
<a name="l00189"></a>00189         <span class="keywordflow">else</span>
<a name="l00190"></a>00190                 m_state = KEY_GOOD;
<a name="l00191"></a>00191 }
<a name="l00192"></a>00192 
<a name="l00193"></a>00193 <span class="comment">// ********************************************************</span>
<a name="l00194"></a>00194 
<a name="l00195"></a>00195 <span class="keyword">static</span> <a class="code" href="class_h_m_a_c.html" title="HMAC">DefaultMAC</a> * NewDefaultEncryptorMAC(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength)
<a name="l00196"></a>00196 {
<a name="l00197"></a>00197         <span class="keywordtype">size_t</span> macKeyLength = DefaultMAC::StaticGetValidKeyLength(16);
<a name="l00198"></a>00198         <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> macKey(macKeyLength);
<a name="l00199"></a>00199         <span class="comment">// since the MAC is encrypted there is no reason to mash the passphrase for many iterations</span>
<a name="l00200"></a>00200         Mash(passphrase, passphraseLength, macKey, macKeyLength, 1);
<a name="l00201"></a>00201         <span class="keywordflow">return</span> <span class="keyword">new</span> <a class="code" href="class_h_m_a_c.html" title="HMAC">DefaultMAC</a>(macKey, macKeyLength);
<a name="l00202"></a>00202 }
<a name="l00203"></a>00203 
<a name="l00204"></a>00204 DefaultEncryptorWithMAC::DefaultEncryptorWithMAC(<span class="keyword">const</span> <span class="keywordtype">char</span> *passphrase, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment)
<a name="l00205"></a>00205         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment)
<a name="l00206"></a>00206         , m_mac(NewDefaultEncryptorMAC((const byte *)passphrase, strlen(passphrase)))
<a name="l00207"></a>00207 {
<a name="l00208"></a>00208         SetFilter(<span class="keyword">new</span> <a class="code" href="class_hash_filter.html" title="Filter Wrapper for HashTransformation.">HashFilter</a>(*m_mac, <span class="keyword">new</span> <a class="code" href="class_default_encryptor.html" title="Password-Based Encryptor using DES-EDE2.">DefaultEncryptor</a>(passphrase), <span class="keyword">true</span>));
<a name="l00209"></a>00209 }
<a name="l00210"></a>00210 
<a name="l00211"></a>00211 DefaultEncryptorWithMAC::DefaultEncryptorWithMAC(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment)
<a name="l00212"></a>00212         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment)
<a name="l00213"></a>00213         , m_mac(NewDefaultEncryptorMAC(passphrase, passphraseLength))
<a name="l00214"></a>00214 {
<a name="l00215"></a>00215         SetFilter(<span class="keyword">new</span> <a class="code" href="class_hash_filter.html" title="Filter Wrapper for HashTransformation.">HashFilter</a>(*m_mac, <span class="keyword">new</span> <a class="code" href="class_default_encryptor.html" title="Password-Based Encryptor using DES-EDE2.">DefaultEncryptor</a>(passphrase, passphraseLength), <span class="keyword">true</span>));
<a name="l00216"></a>00216 }
<a name="l00217"></a>00217 
<a name="l00218"></a>00218 <span class="keywordtype">void</span> DefaultEncryptorWithMAC::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length)
<a name="l00219"></a>00219 {
<a name="l00220"></a>00220         m_filter-&gt;MessageEnd();
<a name="l00221"></a>00221 }
<a name="l00222"></a>00222 
<a name="l00223"></a>00223 <span class="comment">// ********************************************************</span>
<a name="l00224"></a>00224 
<a name="l00225"></a>00225 DefaultDecryptorWithMAC::DefaultDecryptorWithMAC(<span class="keyword">const</span> <span class="keywordtype">char</span> *passphrase, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException)
<a name="l00226"></a>00226         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment)
<a name="l00227"></a>00227         , m_mac(NewDefaultEncryptorMAC((const byte *)passphrase, strlen(passphrase)))
<a name="l00228"></a>00228         , m_throwException(throwException)
<a name="l00229"></a>00229 {
<a name="l00230"></a>00230         SetFilter(<span class="keyword">new</span> <a class="code" href="class_default_decryptor.html" title="Password-Based Decryptor using DES-EDE2.">DefaultDecryptor</a>(passphrase, m_hashVerifier=<span class="keyword">new</span> <a class="code" href="class_hash_verification_filter.html" title="Filter Wrapper for HashTransformation.">HashVerifier</a>(*m_mac, NULL, HashVerifier::PUT_MESSAGE), throwException));
<a name="l00231"></a>00231 }
<a name="l00232"></a>00232 
<a name="l00233"></a>00233 DefaultDecryptorWithMAC::DefaultDecryptorWithMAC(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException)
<a name="l00234"></a>00234         : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment)
<a name="l00235"></a>00235         , m_mac(NewDefaultEncryptorMAC(passphrase, passphraseLength))
<a name="l00236"></a>00236         , m_throwException(throwException)
<a name="l00237"></a>00237 {
<a name="l00238"></a>00238         SetFilter(<span class="keyword">new</span> <a class="code" href="class_default_decryptor.html" title="Password-Based Decryptor using DES-EDE2.">DefaultDecryptor</a>(passphrase, passphraseLength, m_hashVerifier=<span class="keyword">new</span> <a class="code" href="class_hash_verification_filter.html" title="Filter Wrapper for HashTransformation.">HashVerifier</a>(*m_mac, NULL, HashVerifier::PUT_MESSAGE), throwException));
<a name="l00239"></a>00239 }
<a name="l00240"></a>00240 
<a name="l00241"></a>00241 DefaultDecryptor::State DefaultDecryptorWithMAC::CurrentState()<span class="keyword"> const</span>
<a name="l00242"></a>00242 <span class="keyword"></span>{
<a name="l00243"></a>00243         <span class="keywordflow">return</span> <span class="keyword">static_cast&lt;</span><span class="keyword">const </span><a class="code" href="class_default_decryptor.html" title="Password-Based Decryptor using DES-EDE2.">DefaultDecryptor</a> *<span class="keyword">&gt;</span>(m_filter.get())-&gt;CurrentState();
<a name="l00244"></a>00244 }
<a name="l00245"></a>00245 
<a name="l00246"></a>00246 <span class="keywordtype">bool</span> DefaultDecryptorWithMAC::CheckLastMAC()<span class="keyword"> const</span>
<a name="l00247"></a>00247 <span class="keyword"></span>{
<a name="l00248"></a>00248         <span class="keywordflow">return</span> m_hashVerifier-&gt;GetLastResult();
<a name="l00249"></a>00249 }
<a name="l00250"></a>00250 
<a name="l00251"></a>00251 <span class="keywordtype">void</span> DefaultDecryptorWithMAC::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length)
<a name="l00252"></a>00252 {
<a name="l00253"></a>00253         m_filter-&gt;MessageEnd();
<a name="l00254"></a>00254         <span class="keywordflow">if</span> (m_throwException &amp;&amp; !CheckLastMAC())
<a name="l00255"></a>00255                 <span class="keywordflow">throw</span> MACBadErr();
<a name="l00256"></a>00256 }
<a name="l00257"></a>00257 
<a name="l00258"></a>00258 NAMESPACE_END
</pre></div></div>
</div>
<hr class="footer"/><address class="footer"><small>Generated on Tue Feb 8 2011 for Crypto++ by&#160;
<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.7.3 </small></address>
</body>
</html>