<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <title>Crypto++: default.cpp Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <link href="doxygen.css" rel="stylesheet" type="text/css"/> </head> <body> <!-- Generated by Doxygen 1.7.3 --> <div id="top"> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td style="padding-left: 0.5em;"> <div id="projectname">Crypto++</div> </td> </tr> </tbody> </table> </div> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="namespaces.html"><span>Namespaces</span></a></li> <li><a href="annotated.html"><span>Classes</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>File Members</span></a></li> </ul> </div> <div class="header"> <div class="headertitle"> <h1>default.cpp</h1> </div> </div> <div class="contents"> <div class="fragment"><pre class="fragment"><a name="l00001"></a>00001 <span class="comment">// default.cpp - written and placed in the public domain by Wei Dai</span> <a name="l00002"></a>00002 <a name="l00003"></a>00003 <span class="preprocessor">#include "pch.h"</span> <a name="l00004"></a>00004 <span class="preprocessor">#include "default.h"</span> <a name="l00005"></a>00005 <span class="preprocessor">#include "queue.h"</span> <a name="l00006"></a>00006 <span class="preprocessor">#include <time.h></span> <a name="l00007"></a>00007 <span class="preprocessor">#include <memory></span> <a name="l00008"></a>00008 <a name="l00009"></a>00009 NAMESPACE_BEGIN(CryptoPP) <a name="l00010"></a>00010 <a name="l00011"></a>00011 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> MASH_ITERATIONS = 200; <a name="l00012"></a>00012 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> SALTLENGTH = 8; <a name="l00013"></a>00013 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> BLOCKSIZE = <a class="code" href="class_d_e_s___e_d_e2.html" title="DES-EDE2">Default_BlockCipher</a>::Encryption::BLOCKSIZE; <a name="l00014"></a>00014 static const <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> KEYLENGTH = <a class="code" href="class_d_e_s___e_d_e2.html" title="DES-EDE2">Default_BlockCipher</a>::Encryption::DEFAULT_KEYLENGTH; <a name="l00015"></a>00015 <a name="l00016"></a>00016 <span class="comment">// The purpose of this function Mash() is to take an arbitrary length input</span> <a name="l00017"></a>00017 <span class="comment">// string and *deterministicly* produce an arbitrary length output string such</span> <a name="l00018"></a>00018 <span class="comment">// that (1) it looks random, (2) no information about the input is</span> <a name="l00019"></a>00019 <span class="comment">// deducible from it, and (3) it contains as much entropy as it can hold, or</span> <a name="l00020"></a>00020 <span class="comment">// the amount of entropy in the input string, whichever is smaller.</span> <a name="l00021"></a>00021 <a name="l00022"></a>00022 static <span class="keywordtype">void</span> Mash(const byte *in, <span class="keywordtype">size_t</span> inLen, byte *out, <span class="keywordtype">size_t</span> outLen, <span class="keywordtype">int</span> iterations) <a name="l00023"></a>00023 { <a name="l00024"></a>00024 <span class="keywordflow">if</span> (BytePrecision(outLen) > 2) <a name="l00025"></a>00025 <span class="keywordflow">throw</span> <a class="code" href="class_invalid_argument.html" title="exception thrown when an invalid argument is detected">InvalidArgument</a>(<span class="stringliteral">"Mash: output legnth too large"</span>); <a name="l00026"></a>00026 <a name="l00027"></a>00027 <span class="keywordtype">size_t</span> bufSize = RoundUpToMultipleOf(outLen, (<span class="keywordtype">size_t</span>)DefaultHashModule::DIGESTSIZE); <a name="l00028"></a>00028 byte b[2]; <a name="l00029"></a>00029 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> buf(bufSize); <a name="l00030"></a>00030 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> outBuf(bufSize); <a name="l00031"></a>00031 <a class="code" href="class_s_h_a1.html" title="SHA-1">DefaultHashModule</a> hash; <a name="l00032"></a>00032 <a name="l00033"></a>00033 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i; <a name="l00034"></a>00034 <span class="keywordflow">for</span>(i=0; i<outLen; i+=DefaultHashModule::DIGESTSIZE) <a name="l00035"></a>00035 { <a name="l00036"></a>00036 b[0] = (byte) (i >> 8); <a name="l00037"></a>00037 b[1] = (byte) i; <a name="l00038"></a>00038 hash.Update(b, 2); <a name="l00039"></a>00039 hash.Update(in, inLen); <a name="l00040"></a>00040 hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(outBuf+i); <a name="l00041"></a>00041 } <a name="l00042"></a>00042 <a name="l00043"></a>00043 <span class="keywordflow">while</span> (iterations-- > 1) <a name="l00044"></a>00044 { <a name="l00045"></a>00045 memcpy(buf, outBuf, bufSize); <a name="l00046"></a>00046 <span class="keywordflow">for</span> (i=0; i<bufSize; i+=DefaultHashModule::DIGESTSIZE) <a name="l00047"></a>00047 { <a name="l00048"></a>00048 b[0] = (byte) (i >> 8); <a name="l00049"></a>00049 b[1] = (byte) i; <a name="l00050"></a>00050 hash.Update(b, 2); <a name="l00051"></a>00051 hash.Update(buf, bufSize); <a name="l00052"></a>00052 hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(outBuf+i); <a name="l00053"></a>00053 } <a name="l00054"></a>00054 } <a name="l00055"></a>00055 <a name="l00056"></a>00056 memcpy(out, outBuf, outLen); <a name="l00057"></a>00057 } <a name="l00058"></a>00058 <a name="l00059"></a>00059 <span class="keyword">static</span> <span class="keywordtype">void</span> GenerateKeyIV(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <span class="keyword">const</span> byte *salt, <span class="keywordtype">size_t</span> saltLength, byte *key, byte *IV) <a name="l00060"></a>00060 { <a name="l00061"></a>00061 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> temp(passphraseLength+saltLength); <a name="l00062"></a>00062 memcpy(temp, passphrase, passphraseLength); <a name="l00063"></a>00063 memcpy(temp+passphraseLength, salt, saltLength); <a name="l00064"></a>00064 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> keyIV(KEYLENGTH+BLOCKSIZE); <a name="l00065"></a>00065 Mash(temp, passphraseLength + saltLength, keyIV, KEYLENGTH+BLOCKSIZE, MASH_ITERATIONS); <a name="l00066"></a>00066 memcpy(key, keyIV, KEYLENGTH); <a name="l00067"></a>00067 memcpy(IV, keyIV+KEYLENGTH, BLOCKSIZE); <a name="l00068"></a>00068 } <a name="l00069"></a>00069 <a name="l00070"></a>00070 <span class="comment">// ********************************************************</span> <a name="l00071"></a>00071 <a name="l00072"></a>00072 DefaultEncryptor::DefaultEncryptor(<span class="keyword">const</span> <span class="keywordtype">char</span> *passphrase, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment) <a name="l00073"></a>00073 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment), m_passphrase((const byte *)passphrase, strlen(passphrase)) <a name="l00074"></a>00074 { <a name="l00075"></a>00075 } <a name="l00076"></a>00076 <a name="l00077"></a>00077 DefaultEncryptor::DefaultEncryptor(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment) <a name="l00078"></a>00078 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment), m_passphrase(passphrase, passphraseLength) <a name="l00079"></a>00079 { <a name="l00080"></a>00080 } <a name="l00081"></a>00081 <a name="l00082"></a>00082 <a name="l00083"></a>00083 <span class="keywordtype">void</span> DefaultEncryptor::FirstPut(<span class="keyword">const</span> byte *) <a name="l00084"></a>00084 { <a name="l00085"></a>00085 <span class="comment">// VC60 workaround: __LINE__ expansion bug</span> <a name="l00086"></a>00086 CRYPTOPP_COMPILE_ASSERT_INSTANCE(SALTLENGTH <= DefaultHashModule::DIGESTSIZE, 1); <a name="l00087"></a>00087 CRYPTOPP_COMPILE_ASSERT_INSTANCE(BLOCKSIZE <= DefaultHashModule::DIGESTSIZE, 2); <a name="l00088"></a>00088 <a name="l00089"></a>00089 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> salt(DefaultHashModule::DIGESTSIZE), keyCheck(DefaultHashModule::DIGESTSIZE); <a name="l00090"></a>00090 <a class="code" href="class_s_h_a1.html" title="SHA-1">DefaultHashModule</a> hash; <a name="l00091"></a>00091 <a name="l00092"></a>00092 <span class="comment">// use hash(passphrase | time | clock) as salt</span> <a name="l00093"></a>00093 hash.Update(m_passphrase, m_passphrase.size()); <a name="l00094"></a>00094 time_t t=time(0); <a name="l00095"></a>00095 hash.Update((byte *)&t, <span class="keyword">sizeof</span>(t)); <a name="l00096"></a>00096 clock_t c=clock(); <a name="l00097"></a>00097 hash.Update((byte *)&c, <span class="keyword">sizeof</span>(c)); <a name="l00098"></a>00098 hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(salt); <a name="l00099"></a>00099 <a name="l00100"></a>00100 <span class="comment">// use hash(passphrase | salt) as key check</span> <a name="l00101"></a>00101 hash.Update(m_passphrase, m_passphrase.size()); <a name="l00102"></a>00102 hash.Update(salt, SALTLENGTH); <a name="l00103"></a>00103 hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(keyCheck); <a name="l00104"></a>00104 <a name="l00105"></a>00105 <a class="code" href="class_filter.html#ac8fc888888b2dad88bf64fc703044a93" title="returns the object immediately attached to this object or NULL for no attachment">AttachedTransformation</a>()-><a class="code" href="class_buffered_transformation.html#ae70658b0d271f8e114ac6c3cc9774ede" title="input a byte for processing">Put</a>(salt, SALTLENGTH); <a name="l00106"></a>00106 <a name="l00107"></a>00107 <span class="comment">// mash passphrase and salt together into key and IV</span> <a name="l00108"></a>00108 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> key(KEYLENGTH); <a name="l00109"></a>00109 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>(BLOCKSIZE); <a name="l00110"></a>00110 GenerateKeyIV(m_passphrase, m_passphrase.size(), salt, SALTLENGTH, key, <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>); <a name="l00111"></a>00111 <a name="l00112"></a>00112 m_cipher.SetKeyWithIV(key, key.size(), <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>); <a name="l00113"></a>00113 SetFilter(<span class="keyword">new</span> <a class="code" href="class_stream_transformation_filter.html" title="Filter Wrapper for StreamTransformation, optionally handling padding/unpadding when needed...">StreamTransformationFilter</a>(m_cipher)); <a name="l00114"></a>00114 <a name="l00115"></a>00115 m_filter->Put(keyCheck, BLOCKSIZE); <a name="l00116"></a>00116 } <a name="l00117"></a>00117 <a name="l00118"></a>00118 <span class="keywordtype">void</span> DefaultEncryptor::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length) <a name="l00119"></a>00119 { <a name="l00120"></a>00120 m_filter->MessageEnd(); <a name="l00121"></a>00121 } <a name="l00122"></a>00122 <a name="l00123"></a>00123 <span class="comment">// ********************************************************</span> <a name="l00124"></a>00124 <a name="l00125"></a>00125 DefaultDecryptor::DefaultDecryptor(<span class="keyword">const</span> <span class="keywordtype">char</span> *p, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException) <a name="l00126"></a>00126 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, SALTLENGTH+BLOCKSIZE, 0, attachment) <a name="l00127"></a>00127 , m_state(WAITING_FOR_KEYCHECK) <a name="l00128"></a>00128 , m_passphrase((const byte *)p, strlen(p)) <a name="l00129"></a>00129 , m_throwException(throwException) <a name="l00130"></a>00130 { <a name="l00131"></a>00131 } <a name="l00132"></a>00132 <a name="l00133"></a>00133 DefaultDecryptor::DefaultDecryptor(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException) <a name="l00134"></a>00134 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, SALTLENGTH+BLOCKSIZE, 0, attachment) <a name="l00135"></a>00135 , m_state(WAITING_FOR_KEYCHECK) <a name="l00136"></a>00136 , m_passphrase(passphrase, passphraseLength) <a name="l00137"></a>00137 , m_throwException(throwException) <a name="l00138"></a>00138 { <a name="l00139"></a>00139 } <a name="l00140"></a>00140 <a name="l00141"></a>00141 <span class="keywordtype">void</span> DefaultDecryptor::FirstPut(<span class="keyword">const</span> byte *inString) <a name="l00142"></a>00142 { <a name="l00143"></a>00143 CheckKey(inString, inString+SALTLENGTH); <a name="l00144"></a>00144 } <a name="l00145"></a>00145 <a name="l00146"></a>00146 <span class="keywordtype">void</span> DefaultDecryptor::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length) <a name="l00147"></a>00147 { <a name="l00148"></a>00148 <span class="keywordflow">if</span> (m_filter.get() == NULL) <a name="l00149"></a>00149 { <a name="l00150"></a>00150 m_state = KEY_BAD; <a name="l00151"></a>00151 <span class="keywordflow">if</span> (m_throwException) <a name="l00152"></a>00152 <span class="keywordflow">throw</span> KeyBadErr(); <a name="l00153"></a>00153 } <a name="l00154"></a>00154 <span class="keywordflow">else</span> <a name="l00155"></a>00155 { <a name="l00156"></a>00156 m_filter->MessageEnd(); <a name="l00157"></a>00157 m_state = WAITING_FOR_KEYCHECK; <a name="l00158"></a>00158 } <a name="l00159"></a>00159 } <a name="l00160"></a>00160 <a name="l00161"></a>00161 <span class="keywordtype">void</span> DefaultDecryptor::CheckKey(<span class="keyword">const</span> byte *salt, <span class="keyword">const</span> byte *keyCheck) <a name="l00162"></a>00162 { <a name="l00163"></a>00163 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> check(STDMAX((<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span>)2*BLOCKSIZE, (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span>)DefaultHashModule::DIGESTSIZE)); <a name="l00164"></a>00164 <a name="l00165"></a>00165 <a class="code" href="class_s_h_a1.html" title="SHA-1">DefaultHashModule</a> hash; <a name="l00166"></a>00166 hash.Update(m_passphrase, m_passphrase.size()); <a name="l00167"></a>00167 hash.Update(salt, SALTLENGTH); <a name="l00168"></a>00168 hash.<a class="code" href="class_hash_transformation.html#aa0b8c7a110d8968268fd02ec32b9a8e8" title="compute hash for current message, then restart for a new message">Final</a>(check); <a name="l00169"></a>00169 <a name="l00170"></a>00170 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> key(KEYLENGTH); <a name="l00171"></a>00171 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>(BLOCKSIZE); <a name="l00172"></a>00172 GenerateKeyIV(m_passphrase, m_passphrase.size(), salt, SALTLENGTH, key, <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>); <a name="l00173"></a>00173 <a name="l00174"></a>00174 m_cipher.SetKeyWithIV(key, key.size(), <a class="code" href="namespace_name.html#a9b6839240a8bdf1f5bcbebf1866f4733" title="ConstByteArrayParameter, also accepts const byte * for backwards compatibility.">IV</a>); <a name="l00175"></a>00175 std::auto_ptr<StreamTransformationFilter> decryptor(<span class="keyword">new</span> <a class="code" href="class_stream_transformation_filter.html" title="Filter Wrapper for StreamTransformation, optionally handling padding/unpadding when needed...">StreamTransformationFilter</a>(m_cipher)); <a name="l00176"></a>00176 <a name="l00177"></a>00177 decryptor->Put(keyCheck, BLOCKSIZE); <a name="l00178"></a>00178 decryptor->ForceNextPut(); <a name="l00179"></a>00179 decryptor->Get(check+BLOCKSIZE, BLOCKSIZE); <a name="l00180"></a>00180 <a name="l00181"></a>00181 SetFilter(decryptor.release()); <a name="l00182"></a>00182 <a name="l00183"></a>00183 <span class="keywordflow">if</span> (!VerifyBufsEqual(check, check+BLOCKSIZE, BLOCKSIZE)) <a name="l00184"></a>00184 { <a name="l00185"></a>00185 m_state = KEY_BAD; <a name="l00186"></a>00186 <span class="keywordflow">if</span> (m_throwException) <a name="l00187"></a>00187 <span class="keywordflow">throw</span> KeyBadErr(); <a name="l00188"></a>00188 } <a name="l00189"></a>00189 <span class="keywordflow">else</span> <a name="l00190"></a>00190 m_state = KEY_GOOD; <a name="l00191"></a>00191 } <a name="l00192"></a>00192 <a name="l00193"></a>00193 <span class="comment">// ********************************************************</span> <a name="l00194"></a>00194 <a name="l00195"></a>00195 <span class="keyword">static</span> <a class="code" href="class_h_m_a_c.html" title="HMAC">DefaultMAC</a> * NewDefaultEncryptorMAC(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength) <a name="l00196"></a>00196 { <a name="l00197"></a>00197 <span class="keywordtype">size_t</span> macKeyLength = DefaultMAC::StaticGetValidKeyLength(16); <a name="l00198"></a>00198 <a class="code" href="class_sec_block.html" title="a block of memory allocated using A">SecByteBlock</a> macKey(macKeyLength); <a name="l00199"></a>00199 <span class="comment">// since the MAC is encrypted there is no reason to mash the passphrase for many iterations</span> <a name="l00200"></a>00200 Mash(passphrase, passphraseLength, macKey, macKeyLength, 1); <a name="l00201"></a>00201 <span class="keywordflow">return</span> <span class="keyword">new</span> <a class="code" href="class_h_m_a_c.html" title="HMAC">DefaultMAC</a>(macKey, macKeyLength); <a name="l00202"></a>00202 } <a name="l00203"></a>00203 <a name="l00204"></a>00204 DefaultEncryptorWithMAC::DefaultEncryptorWithMAC(<span class="keyword">const</span> <span class="keywordtype">char</span> *passphrase, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment) <a name="l00205"></a>00205 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment) <a name="l00206"></a>00206 , m_mac(NewDefaultEncryptorMAC((const byte *)passphrase, strlen(passphrase))) <a name="l00207"></a>00207 { <a name="l00208"></a>00208 SetFilter(<span class="keyword">new</span> <a class="code" href="class_hash_filter.html" title="Filter Wrapper for HashTransformation.">HashFilter</a>(*m_mac, <span class="keyword">new</span> <a class="code" href="class_default_encryptor.html" title="Password-Based Encryptor using DES-EDE2.">DefaultEncryptor</a>(passphrase), <span class="keyword">true</span>)); <a name="l00209"></a>00209 } <a name="l00210"></a>00210 <a name="l00211"></a>00211 DefaultEncryptorWithMAC::DefaultEncryptorWithMAC(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment) <a name="l00212"></a>00212 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment) <a name="l00213"></a>00213 , m_mac(NewDefaultEncryptorMAC(passphrase, passphraseLength)) <a name="l00214"></a>00214 { <a name="l00215"></a>00215 SetFilter(<span class="keyword">new</span> <a class="code" href="class_hash_filter.html" title="Filter Wrapper for HashTransformation.">HashFilter</a>(*m_mac, <span class="keyword">new</span> <a class="code" href="class_default_encryptor.html" title="Password-Based Encryptor using DES-EDE2.">DefaultEncryptor</a>(passphrase, passphraseLength), <span class="keyword">true</span>)); <a name="l00216"></a>00216 } <a name="l00217"></a>00217 <a name="l00218"></a>00218 <span class="keywordtype">void</span> DefaultEncryptorWithMAC::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length) <a name="l00219"></a>00219 { <a name="l00220"></a>00220 m_filter->MessageEnd(); <a name="l00221"></a>00221 } <a name="l00222"></a>00222 <a name="l00223"></a>00223 <span class="comment">// ********************************************************</span> <a name="l00224"></a>00224 <a name="l00225"></a>00225 DefaultDecryptorWithMAC::DefaultDecryptorWithMAC(<span class="keyword">const</span> <span class="keywordtype">char</span> *passphrase, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException) <a name="l00226"></a>00226 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment) <a name="l00227"></a>00227 , m_mac(NewDefaultEncryptorMAC((const byte *)passphrase, strlen(passphrase))) <a name="l00228"></a>00228 , m_throwException(throwException) <a name="l00229"></a>00229 { <a name="l00230"></a>00230 SetFilter(<span class="keyword">new</span> <a class="code" href="class_default_decryptor.html" title="Password-Based Decryptor using DES-EDE2.">DefaultDecryptor</a>(passphrase, m_hashVerifier=<span class="keyword">new</span> <a class="code" href="class_hash_verification_filter.html" title="Filter Wrapper for HashTransformation.">HashVerifier</a>(*m_mac, NULL, HashVerifier::PUT_MESSAGE), throwException)); <a name="l00231"></a>00231 } <a name="l00232"></a>00232 <a name="l00233"></a>00233 DefaultDecryptorWithMAC::DefaultDecryptorWithMAC(<span class="keyword">const</span> byte *passphrase, <span class="keywordtype">size_t</span> passphraseLength, <a class="code" href="class_buffered_transformation.html" title="interface for buffered transformations">BufferedTransformation</a> *attachment, <span class="keywordtype">bool</span> throwException) <a name="l00234"></a>00234 : <a class="code" href="class_proxy_filter.html" title="Base class for Filter classes that are proxies for a chain of other filters.">ProxyFilter</a>(NULL, 0, 0, attachment) <a name="l00235"></a>00235 , m_mac(NewDefaultEncryptorMAC(passphrase, passphraseLength)) <a name="l00236"></a>00236 , m_throwException(throwException) <a name="l00237"></a>00237 { <a name="l00238"></a>00238 SetFilter(<span class="keyword">new</span> <a class="code" href="class_default_decryptor.html" title="Password-Based Decryptor using DES-EDE2.">DefaultDecryptor</a>(passphrase, passphraseLength, m_hashVerifier=<span class="keyword">new</span> <a class="code" href="class_hash_verification_filter.html" title="Filter Wrapper for HashTransformation.">HashVerifier</a>(*m_mac, NULL, HashVerifier::PUT_MESSAGE), throwException)); <a name="l00239"></a>00239 } <a name="l00240"></a>00240 <a name="l00241"></a>00241 DefaultDecryptor::State DefaultDecryptorWithMAC::CurrentState()<span class="keyword"> const</span> <a name="l00242"></a>00242 <span class="keyword"></span>{ <a name="l00243"></a>00243 <span class="keywordflow">return</span> <span class="keyword">static_cast<</span><span class="keyword">const </span><a class="code" href="class_default_decryptor.html" title="Password-Based Decryptor using DES-EDE2.">DefaultDecryptor</a> *<span class="keyword">></span>(m_filter.get())->CurrentState(); <a name="l00244"></a>00244 } <a name="l00245"></a>00245 <a name="l00246"></a>00246 <span class="keywordtype">bool</span> DefaultDecryptorWithMAC::CheckLastMAC()<span class="keyword"> const</span> <a name="l00247"></a>00247 <span class="keyword"></span>{ <a name="l00248"></a>00248 <span class="keywordflow">return</span> m_hashVerifier->GetLastResult(); <a name="l00249"></a>00249 } <a name="l00250"></a>00250 <a name="l00251"></a>00251 <span class="keywordtype">void</span> DefaultDecryptorWithMAC::LastPut(<span class="keyword">const</span> byte *inString, <span class="keywordtype">size_t</span> length) <a name="l00252"></a>00252 { <a name="l00253"></a>00253 m_filter->MessageEnd(); <a name="l00254"></a>00254 <span class="keywordflow">if</span> (m_throwException && !CheckLastMAC()) <a name="l00255"></a>00255 <span class="keywordflow">throw</span> MACBadErr(); <a name="l00256"></a>00256 } <a name="l00257"></a>00257 <a name="l00258"></a>00258 NAMESPACE_END </pre></div></div> </div> <hr class="footer"/><address class="footer"><small>Generated on Tue Feb 8 2011 for Crypto++ by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/></a> 1.7.3 </small></address> </body> </html>