📄 pwdbased_8h-source.html
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"><html><head><meta http-equiv="Content-Type" content="text/html;charset=iso-8859-1"><title>Crypto++: pwdbased.h Source File</title><link href="doxygen.css" rel="stylesheet" type="text/css"></head><body><!-- Generated by Doxygen 1.3.2 --><div class="qindex"><a class="qindex" href="index.html">Main Page</a> | <a class="qindex" href="namespaces.html">Namespace List</a> | <a class="qindex" href="hierarchy.html">Class Hierarchy</a> | <a class="qindex" href="classes.html">Alphabetical List</a> | <a class="qindex" href="annotated.html">Compound List</a> | <a class="qindex" href="files.html">File List</a> | <a class="qindex" href="namespacemembers.html">Namespace Members</a> | <a class="qindex" href="functions.html">Compound Members</a> | <a class="qindex" href="globals.html">File Members</a></div><h1>pwdbased.h</h1><div class="fragment"><pre>00001 <span class="comment">// pwdbased.h - written and placed in the public domain by Wei Dai</span>00002 00003 <span class="preprocessor">#ifndef CRYPTOPP_PWDBASED_H</span>00004 <span class="preprocessor"></span><span class="preprocessor">#define CRYPTOPP_PWDBASED_H</span>00005 <span class="preprocessor"></span>00006 <span class="preprocessor">#include "<a class="code" href="cryptlib_8h.html">cryptlib.h</a>"</span>00007 <span class="preprocessor">#include "hmac.h"</span>00008 00009 NAMESPACE_BEGIN(CryptoPP)00010 00011 <span class="keyword">class </span>PasswordBasedKeyDerivationFunction00012 {00013 <span class="keyword">public</span>:00014 <span class="keyword">virtual</span> <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> MaxDerivedKeyLength() <span class="keyword">const</span> =0;00015 <span class="keyword">virtual</span> <span class="keywordtype">void</span> GeneralDeriveKey(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, byte purpose, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations) <span class="keyword">const</span> =0;00016 };00017 <span class="comment"></span>00018 <span class="comment">//! PBKDF1 from PKCS #5, T should be a HashTransformation class</span>00019 <span class="comment"></span><span class="keyword">template</span> <<span class="keyword">class</span> T><a name="l00020"></a><a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html">00020</a> <span class="keyword">class </span><a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html">PKCS5_PBKDF1</a> : <span class="keyword">public</span> PasswordBasedKeyDerivationFunction00021 {00022 <span class="keyword">public</span>:00023 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> MaxDerivedKeyLength()<span class="keyword"> const </span>{<span class="keywordflow">return</span> T::DIGESTSIZE;}00024 <span class="comment">// PKCS #5 says PBKDF1 should only take 8-byte salts. This implementation allows salts of any length.</span>00025 <span class="keywordtype">void</span> GeneralDeriveKey(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, byte ignored, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations)<span class="keyword"> const</span>00026 <span class="keyword"> </span>{DeriveKey(derived, derivedLen, password, passwordLen, salt, saltLen, iterations);}00027 <span class="keywordtype">void</span> DeriveKey(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen=8, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations=1000) <span class="keyword">const</span>;00028 };00029 <span class="comment"></span>00030 <span class="comment">//! PBKDF2 from PKCS #5, T should be a HashTransformation class</span>00031 <span class="comment"></span><span class="keyword">template</span> <<span class="keyword">class</span> T><a name="l00032"></a><a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html">00032</a> <span class="keyword">class </span><a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html">PKCS5_PBKDF2_HMAC</a> : <span class="keyword">public</span> PasswordBasedKeyDerivationFunction00033 {00034 <span class="keyword">public</span>:00035 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> MaxDerivedKeyLength()<span class="keyword"> const </span>{<span class="keywordflow">return</span> 0xffffffffU;} <span class="comment">// should multiply by T::DIGESTSIZE, but gets overflow that way</span>00036 <span class="keywordtype">void</span> GeneralDeriveKey(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, byte ignored, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations)<span class="keyword"> const</span>00037 <span class="keyword"> </span>{DeriveKey(derived, derivedLen, password, passwordLen, salt, saltLen, iterations);}00038 <span class="keywordtype">void</span> DeriveKey(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations=1000) <span class="keyword">const</span>;00039 };00040 00041 <span class="comment">/*</span>00042 <span class="comment">class PBKDF2Params</span>00043 <span class="comment">{</span>00044 <span class="comment">public:</span>00045 <span class="comment"> SecByteBlock m_salt;</span>00046 <span class="comment"> unsigned int m_interationCount;</span>00047 <span class="comment"> ASNOptional<ASNUnsignedWrapper<word32> > m_keyLength;</span>00048 <span class="comment">};</span>00049 <span class="comment">*/</span>00050 00051 <span class="keyword">template</span> <<span class="keyword">class</span> T>00052 <span class="keywordtype">void</span> <a class="code" href="class_p_k_c_s5___p_b_k_d_f1.html">PKCS5_PBKDF1<T>::DeriveKey</a>(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations)<span class="keyword"> const</span>00053 <span class="keyword"></span>{00054 assert(derivedLen <= MaxDerivedLength());00055 assert(iterations > 0);00056 00057 T hash;00058 hash.Update(password, passwordLen);00059 hash.Update(salt, saltLen);00060 00061 <a class="code" href="class_sec_block.html">SecByteBlock</a> buffer(hash.DigestSize());00062 hash.Final(buffer);00063 00064 <span class="keywordflow">for</span> (<span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i=1; i<iterations; i++)00065 hash.CalculateDigest(buffer, buffer, buffer.<a class="code" href="class_sec_block.html#_sec_block_with_hinta13">size</a>());00066 00067 memcpy(derived, buffer, derivedLen);00068 }00069 00070 <span class="keyword">template</span> <<span class="keyword">class</span> T>00071 <span class="keywordtype">void</span> <a class="code" href="class_p_k_c_s5___p_b_k_d_f2___h_m_a_c.html">PKCS5_PBKDF2_HMAC<T>::DeriveKey</a>(byte *derived, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> derivedLen, <span class="keyword">const</span> byte *password, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> passwordLen, <span class="keyword">const</span> byte *salt, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> saltLen, <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> iterations)<span class="keyword"> const</span>00072 <span class="keyword"></span>{00073 assert(derivedLen <= MaxDerivedKeyLength());00074 assert(iterations > 0);00075 00076 <a class="code" href="class_h_m_a_c.html">HMAC<T></a> hmac(password, passwordLen);00077 <a class="code" href="class_sec_block.html">SecByteBlock</a> buffer(hmac.<a class="code" href="class_hash_transformation.html#_x_m_a_c_ca9">DigestSize</a>());00078 00079 <span class="keywordtype">unsigned</span> <span class="keywordtype">int</span> i=1;00080 <span class="keywordflow">while</span> (derivedLen > 0)00081 {
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -