bulk-apply new code styling rules

This commit is contained in:
Mirek Kratochvil 2015-10-31 22:58:17 +01:00
parent a2c1c3992d
commit 19d59f9ec1
41 changed files with 532 additions and 532 deletions

View file

@ -46,7 +46,7 @@
inline bool open_keyring (keyring&KR) inline bool open_keyring (keyring&KR)
{ {
if (!KR.open() ) { if (!KR.open()) {
err ("could not open keyring!"); err ("could not open keyring!");
return false; return false;
} }
@ -62,7 +62,7 @@ int action_gen_symkey (const std::string&algspec,
ccr_rng r; ccr_rng r;
r.seed (256); r.seed (256);
if (!sk.create (algspec, r) ) { if (!sk.create (algspec, r)) {
err ("error: symkey creation failed"); err ("error: symkey creation failed");
return 1; return 1;
} }
@ -87,13 +87,13 @@ int action_gen_symkey (const std::string&algspec,
} }
sk_out << data; sk_out << data;
if (!sk_out.good() ) { if (!sk_out.good()) {
err ("error: can't write to symkey file"); err ("error: can't write to symkey file");
return 1; return 1;
} }
sk_out.close(); sk_out.close();
if (!sk_out.good() ) { if (!sk_out.good()) {
err ("error: couldn't close symkey file"); err ("error: couldn't close symkey file");
return 1; return 1;
} }
@ -165,20 +165,20 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
//replace algorithm name on match with alias //replace algorithm name on match with alias
std::string algspec; std::string algspec;
if (algspectable().count (p_algspec) ) if (algspectable().count (p_algspec))
algspec = algspectable() [p_algspec]; algspec = algspectable() [p_algspec];
else else
algspec = p_algspec; algspec = p_algspec;
//handle symmetric operation //handle symmetric operation
if (symmetric.length() ) if (symmetric.length())
return action_gen_symkey (algspec, symmetric, armor); return action_gen_symkey (algspec, symmetric, armor);
algorithm*alg = NULL; algorithm*alg = NULL;
std::string algname; std::string algname;
for (algorithm_suite::iterator i = AS.begin(), e = AS.end(); for (algorithm_suite::iterator i = AS.begin(), e = AS.end();
i != e; ++i) { i != e; ++i) {
if (algorithm_name_matches (algspec, i->first) ) { if (algorithm_name_matches (algspec, i->first)) {
if (!alg) { if (!alg) {
algname = i->first; algname = i->first;
alg = i->second; alg = i->second;
@ -195,7 +195,7 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
return 1; return 1;
} }
if (!name.length() ) { if (!name.length()) {
err ("error: no key name provided"); err ("error: no key name provided");
return 1; return 1;
} }
@ -211,7 +211,7 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
err ("Seeding done, generating the key..."); err ("Seeding done, generating the key...");
if (alg->create_keypair (&pub, &priv, r) ) { if (alg->create_keypair (&pub, &priv, r)) {
err ("error: key generator failed"); err ("error: key generator failed");
return 1; return 1;
} }
@ -224,7 +224,7 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
* improbable, so apologize nicely in that case. * improbable, so apologize nicely in that case.
*/ */
if (!KR.store_keypair (keyring::get_keyid (pub), if (!KR.store_keypair (keyring::get_keyid (pub),
name, algname, pub, priv) ) { name, algname, pub, priv)) {
err ("error: new key cannot be saved into the keyring."); err ("error: new key cannot be saved into the keyring.");
err ("notice: produced KeyID @" << keyring::get_keyid (pub) err ("notice: produced KeyID @" << keyring::get_keyid (pub)
@ -235,7 +235,7 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
} }
//note that pub&priv sencode data will get destroyed along with keyring //note that pub&priv sencode data will get destroyed along with keyring
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }
@ -260,7 +260,7 @@ int action_sym_encrypt (const std::string&symmetric, bool armor)
} }
std::string sk_data; std::string sk_data;
if (!read_all_input (sk_data, sk_in) ) { if (!read_all_input (sk_data, sk_in)) {
err ("error: can't read symkey"); err ("error: can't read symkey");
return 1; return 1;
} }
@ -269,7 +269,7 @@ int action_sym_encrypt (const std::string&symmetric, bool armor)
if (armor) { if (armor) {
std::vector<std::string> parts; std::vector<std::string> parts;
std::string type; std::string type;
if (!envelope_read (sk_data, 0, type, parts) ) { if (!envelope_read (sk_data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -279,7 +279,7 @@ int action_sym_encrypt (const std::string&symmetric, bool armor)
return 1; return 1;
} }
if (!base64_decode (parts[0], sk_data) ) { if (!base64_decode (parts[0], sk_data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -292,7 +292,7 @@ int action_sym_encrypt (const std::string&symmetric, bool armor)
} }
symkey sk; symkey sk;
if (!sk.unserialize (SK) ) { if (!sk.unserialize (SK)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
return 1; return 1;
} }
@ -302,7 +302,7 @@ int action_sym_encrypt (const std::string&symmetric, bool armor)
ccr_rng r; ccr_rng r;
r.seed (256); r.seed (256);
if (!sk.encrypt (std::cin, std::cout, r) ) { if (!sk.encrypt (std::cin, std::cout, r)) {
err ("error: encryption failed"); err ("error: encryption failed");
return 1; return 1;
} }
@ -314,7 +314,7 @@ int action_encrypt (const std::string&recipient, bool armor,
const std::string&symmetric, const std::string&symmetric,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
if (symmetric.length() ) if (symmetric.length())
return action_sym_encrypt (symmetric, armor); return action_sym_encrypt (symmetric, armor);
//first, read plaintext //first, read plaintext
@ -329,9 +329,9 @@ int action_encrypt (const std::string&recipient, bool armor,
//search both publickeys and keypairs that are valid for encryption //search both publickeys and keypairs that are valid for encryption
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i != e; ++i) { i = KR.pubs.begin(), e = KR.pubs.end(); i != e; ++i) {
if (keyspec_matches (recipient, i->second.name, i->first) ) { if (keyspec_matches (recipient, i->second.name, i->first)) {
if (!AS.count (i->second.alg) ) continue; if (!AS.count (i->second.alg)) continue;
if (!AS[i->second.alg]->provides_encryption() ) if (!AS[i->second.alg]->provides_encryption())
continue; continue;
if (recip) { if (recip) {
@ -343,9 +343,9 @@ int action_encrypt (const std::string&recipient, bool armor,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) { i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) {
if (keyspec_matches (recipient, i->second.pub.name, i->first) ) { if (keyspec_matches (recipient, i->second.pub.name, i->first)) {
if (!AS.count (i->second.pub.alg) ) continue; if (!AS.count (i->second.pub.alg)) continue;
if (!AS[i->second.pub.alg]->provides_encryption() ) if (!AS[i->second.pub.alg]->provides_encryption())
continue; continue;
if (recip) { if (recip) {
@ -368,7 +368,7 @@ int action_encrypt (const std::string&recipient, bool armor,
bvector plaintext; bvector plaintext;
plaintext.from_string (data); plaintext.from_string (data);
if (msg.encrypt (plaintext, recip->alg, recip->keyid, AS, KR, r) ) { if (msg.encrypt (plaintext, recip->alg, recip->keyid, AS, KR, r)) {
err ("error: encryption failed"); err ("error: encryption failed");
return 1; return 1;
} }
@ -401,7 +401,7 @@ int action_sym_decrypt (const std::string&symmetric, bool armor)
} }
std::string sk_data; std::string sk_data;
if (!read_all_input (sk_data, sk_in) ) { if (!read_all_input (sk_data, sk_in)) {
err ("error: can't read symkey"); err ("error: can't read symkey");
return 1; return 1;
} }
@ -410,7 +410,7 @@ int action_sym_decrypt (const std::string&symmetric, bool armor)
if (armor) { if (armor) {
std::vector<std::string> parts; std::vector<std::string> parts;
std::string type; std::string type;
if (!envelope_read (sk_data, 0, type, parts) ) { if (!envelope_read (sk_data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -420,7 +420,7 @@ int action_sym_decrypt (const std::string&symmetric, bool armor)
return 1; return 1;
} }
if (!base64_decode (parts[0], sk_data) ) { if (!base64_decode (parts[0], sk_data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -433,7 +433,7 @@ int action_sym_decrypt (const std::string&symmetric, bool armor)
} }
symkey sk; symkey sk;
if (!sk.unserialize (SK) ) { if (!sk.unserialize (SK)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
return 1; return 1;
} }
@ -449,7 +449,7 @@ int action_sym_decrypt (const std::string&symmetric, bool armor)
int action_decrypt (bool armor, const std::string&symmetric, int action_decrypt (bool armor, const std::string&symmetric,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
if (symmetric.length() ) if (symmetric.length())
return action_sym_decrypt (symmetric, armor); return action_sym_decrypt (symmetric, armor);
std::string data; std::string data;
@ -458,7 +458,7 @@ int action_decrypt (bool armor, const std::string&symmetric,
if (armor) { if (armor) {
std::string type; std::string type;
std::vector<std::string> parts; std::vector<std::string> parts;
if (!envelope_read (data, 0, type, parts) ) { if (!envelope_read (data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -467,7 +467,7 @@ int action_decrypt (bool armor, const std::string&symmetric,
err ("error: wrong envelope format"); err ("error: wrong envelope format");
return 1; return 1;
} }
if (!base64_decode (parts[0], data) ) { if (!base64_decode (parts[0], data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -476,14 +476,14 @@ int action_decrypt (bool armor, const std::string&symmetric,
sencode*M = sencode_decode (data); sencode*M = sencode_decode (data);
if (!M) { if (!M) {
err ("error: could not parse input sencode"); err ("error: could not parse input sencode");
if (!armor && envelope_lookalike (data) ) if (!armor && envelope_lookalike (data))
err ("notice: input looks ascii-armored, " err ("notice: input looks ascii-armored, "
"try using the armor option"); "try using the armor option");
return 1; return 1;
} }
encrypted_msg msg; encrypted_msg msg;
if (!msg.unserialize (M) ) { if (!msg.unserialize (M)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (M); sencode_destroy (M);
return 1; return 1;
@ -503,8 +503,8 @@ int action_decrypt (bool armor, const std::string&symmetric,
} }
//and the algorithm //and the algorithm
if ( (!AS.count (msg.alg_id) ) if ( (!AS.count (msg.alg_id))
|| (!AS[msg.alg_id]->provides_encryption() ) ) { || (!AS[msg.alg_id]->provides_encryption())) {
err ("error: decryption algorithm unsupported"); err ("error: decryption algorithm unsupported");
err ("info: requires algorithm " << msg.alg_id err ("info: requires algorithm " << msg.alg_id
<< " with encryption support"); << " with encryption support");
@ -514,12 +514,12 @@ int action_decrypt (bool armor, const std::string&symmetric,
//actual decryption //actual decryption
bvector plaintext; bvector plaintext;
if (msg.decrypt (plaintext, AS, KR) ) { if (msg.decrypt (plaintext, AS, KR)) {
err ("error: decryption failed"); err ("error: decryption failed");
return 1; return 1;
} }
if (!plaintext.to_string (data) ) { if (!plaintext.to_string (data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -538,7 +538,7 @@ int action_decrypt (bool armor, const std::string&symmetric,
M = sencode_decode (data); M = sencode_decode (data);
if (M) { if (M) {
signed_msg m; signed_msg m;
if (m.unserialize (M) ) { if (m.unserialize (M)) {
err ("notice: message content looks signed"); err ("notice: message content looks signed");
err ("hint: try also decrypt+verify operation"); err ("hint: try also decrypt+verify operation");
} }
@ -554,7 +554,7 @@ int action_decrypt (bool armor, const std::string&symmetric,
int action_hash_sign (bool armor, const std::string&symmetric) int action_hash_sign (bool armor, const std::string&symmetric)
{ {
hashfile hf; hashfile hf;
if (!hf.create (std::cin) ) { if (!hf.create (std::cin)) {
err ("error: hashing failed"); err ("error: hashing failed");
return 1; return 1;
} }
@ -581,13 +581,13 @@ int action_hash_sign (bool armor, const std::string&symmetric)
} }
hf_out << data; hf_out << data;
if (!hf_out.good() ) { if (!hf_out.good()) {
err ("error: can't write to hashfile"); err ("error: can't write to hashfile");
return 1; return 1;
} }
hf_out.close(); hf_out.close();
if (!hf_out.good() ) { if (!hf_out.good()) {
err ("error: couldn't close hashfile"); err ("error: couldn't close hashfile");
return 1; return 1;
} }
@ -600,7 +600,7 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
//symmetric processing has its own function //symmetric processing has its own function
if (symmetric.length() ) if (symmetric.length())
return action_hash_sign (armor, symmetric); return action_hash_sign (armor, symmetric);
/* /*
@ -613,14 +613,14 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
* - clearsign (which is always armored) * - clearsign (which is always armored)
*/ */
if (clearsign && (detach.length() || armor) ) { if (clearsign && (detach.length() || armor)) {
err ("error: clearsign cannot be combined " err ("error: clearsign cannot be combined "
"with armor or detach-sign"); "with armor or detach-sign");
return 1; return 1;
} }
std::ofstream detf; std::ofstream detf;
if (detach.length() ) { if (detach.length()) {
detf.open (detach == "-" ? "/dev/stdout" : detach.c_str(), detf.open (detach == "-" ? "/dev/stdout" : detach.c_str(),
std::ios::out | std::ios::binary); std::ios::out | std::ios::binary);
if (!detf) { if (!detf) {
@ -640,15 +640,15 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) { i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) {
if (keyspec_matches (user, i->second.pub.name, i->first) ) { if (keyspec_matches (user, i->second.pub.name, i->first)) {
/* /*
* also match having signature alg availability, * also match having signature alg availability,
* because it saves time when you only have one locally * because it saves time when you only have one locally
* available signature privkey. Also, no need to check * available signature privkey. Also, no need to check
* it again later. * it again later.
*/ */
if (!AS.count (i->second.pub.alg) ) continue; if (!AS.count (i->second.pub.alg)) continue;
if (!AS[i->second.pub.alg]->provides_signatures() ) if (!AS[i->second.pub.alg]->provides_signatures())
continue; continue;
if (u) { if (u) {
@ -671,7 +671,7 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
bvector message; bvector message;
message.from_string (data); message.from_string (data);
if (msg.sign (message, u->pub.alg, u->pub.keyid, AS, KR, r) ) { if (msg.sign (message, u->pub.alg, u->pub.keyid, AS, KR, r)) {
err ("error: digital signature failed"); err ("error: digital signature failed");
return 1; return 1;
} }
@ -689,9 +689,9 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
base64_encode (M->encode(), parts[1]); base64_encode (M->encode(), parts[1]);
sencode_destroy (M); sencode_destroy (M);
out_bin (envelope_format (ENVELOPE_CLEARSIGN, parts, r) ); out_bin (envelope_format (ENVELOPE_CLEARSIGN, parts, r));
} else if (detach.length() ) { } else if (detach.length()) {
msg.message.from_string (MSG_DETACHED); msg.message.from_string (MSG_DETACHED);
sencode*M = msg.serialize(); sencode*M = msg.serialize();
data = M->encode(); data = M->encode();
@ -705,12 +705,12 @@ int action_sign (const std::string&user, bool armor, const std::string&detach,
} }
detf << data; detf << data;
if (!detf.good() ) { if (!detf.good()) {
err ("error: could not write detached signature file"); err ("error: could not write detached signature file");
return 1; return 1;
} }
detf.close(); detf.close();
if (!detf.good() ) { if (!detf.good()) {
err ("error: could not close detached signature file"); err ("error: could not close detached signature file");
return 1; return 1;
} }
@ -745,7 +745,7 @@ int action_hash_verify (bool armor, const std::string&symmetric)
} }
std::string hf_data; std::string hf_data;
if (!read_all_input (hf_data, hf_in) ) { if (!read_all_input (hf_data, hf_in)) {
err ("error: can't read hashfile"); err ("error: can't read hashfile");
return 1; return 1;
} }
@ -754,7 +754,7 @@ int action_hash_verify (bool armor, const std::string&symmetric)
if (armor) { if (armor) {
std::vector<std::string> parts; std::vector<std::string> parts;
std::string type; std::string type;
if (!envelope_read (hf_data, 0, type, parts) ) { if (!envelope_read (hf_data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -764,7 +764,7 @@ int action_hash_verify (bool armor, const std::string&symmetric)
return 1; return 1;
} }
if (!base64_decode (parts[0], hf_data) ) { if (!base64_decode (parts[0], hf_data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -777,7 +777,7 @@ int action_hash_verify (bool armor, const std::string&symmetric)
} }
hashfile hf; hashfile hf;
if (!hf.unserialize (H) ) { if (!hf.unserialize (H)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
return 1; return 1;
} }
@ -795,20 +795,20 @@ int action_verify (bool armor, const std::string&detach,
keyring&KR, algorithm_suite&AS) keyring&KR, algorithm_suite&AS)
{ {
//symmetric processing has its own function //symmetric processing has its own function
if (symmetric.length() ) if (symmetric.length())
return action_hash_verify (armor, symmetric); return action_hash_verify (armor, symmetric);
/* /*
* check flags validity, open detach if possible * check flags validity, open detach if possible
*/ */
if (clearsign && (detach.length() || armor) ) { if (clearsign && (detach.length() || armor)) {
err ("error: clearsign cannot be combined " err ("error: clearsign cannot be combined "
"with armor or detach-sign"); "with armor or detach-sign");
return 1; return 1;
} }
std::ifstream detf; std::ifstream detf;
if (detach.length() ) { if (detach.length()) {
detf.open (detach == "-" ? "/dev/stdin" : detach.c_str(), detf.open (detach == "-" ? "/dev/stdin" : detach.c_str(),
std::ios::in | std::ios::binary); std::ios::in | std::ios::binary);
if (!detf) { if (!detf) {
@ -831,7 +831,7 @@ int action_verify (bool armor, const std::string&detach,
std::string type; std::string type;
std::vector<std::string> parts; std::vector<std::string> parts;
if (!envelope_read (data, 0, type, parts) ) { if (!envelope_read (data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -842,7 +842,7 @@ int action_verify (bool armor, const std::string&detach,
} }
std::string sig; std::string sig;
if (!base64_decode (parts[1], sig) ) { if (!base64_decode (parts[1], sig)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -853,7 +853,7 @@ int action_verify (bool armor, const std::string&detach,
return 1; return 1;
} }
if (!msg.unserialize (M) ) { if (!msg.unserialize (M)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (M); sencode_destroy (M);
return 1; return 1;
@ -869,10 +869,10 @@ int action_verify (bool armor, const std::string&detach,
msg.message.from_string (parts[0]); msg.message.from_string (parts[0]);
} else if (detach.length() ) { } else if (detach.length()) {
std::string sig; std::string sig;
if (!read_all_input (sig, detf) ) { if (!read_all_input (sig, detf)) {
err ("error: can't read detached signature file"); err ("error: can't read detached signature file");
return 1; return 1;
} }
@ -882,7 +882,7 @@ int action_verify (bool armor, const std::string&detach,
if (armor) { if (armor) {
std::vector<std::string> parts; std::vector<std::string> parts;
std::string type; std::string type;
if (!envelope_read (sig, 0, type, parts) ) { if (!envelope_read (sig, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -892,7 +892,7 @@ int action_verify (bool armor, const std::string&detach,
return 1; return 1;
} }
if (!base64_decode (parts[0], sig) ) { if (!base64_decode (parts[0], sig)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -904,7 +904,7 @@ int action_verify (bool armor, const std::string&detach,
return 1; return 1;
} }
if (!msg.unserialize (M) ) { if (!msg.unserialize (M)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (M); sencode_destroy (M);
return 1; return 1;
@ -926,7 +926,7 @@ int action_verify (bool armor, const std::string&detach,
std::string type; std::string type;
std::vector<std::string> parts; std::vector<std::string> parts;
if (!envelope_read (data, 0, type, parts) ) { if (!envelope_read (data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -936,7 +936,7 @@ int action_verify (bool armor, const std::string&detach,
return 1; return 1;
} }
if (!base64_decode (parts[0], data) ) { if (!base64_decode (parts[0], data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -945,13 +945,13 @@ int action_verify (bool armor, const std::string&detach,
sencode*M = sencode_decode (data); sencode*M = sencode_decode (data);
if (!M) { if (!M) {
err ("error: could not parse input sencode"); err ("error: could not parse input sencode");
if (!armor && envelope_lookalike (data) ) if (!armor && envelope_lookalike (data))
err ("notice: input looks ascii-armored, " err ("notice: input looks ascii-armored, "
"try using the armor option"); "try using the armor option");
return 1; return 1;
} }
if (!msg.unserialize (M) ) { if (!msg.unserialize (M)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (M); sencode_destroy (M);
return 1; return 1;
@ -985,8 +985,8 @@ int action_verify (bool armor, const std::string&detach,
return 2; //missing key flag return 2; //missing key flag
} }
if ( (!AS.count (msg.alg_id) ) if ( (!AS.count (msg.alg_id))
|| (!AS[msg.alg_id]->provides_signatures() ) ) { || (!AS[msg.alg_id]->provides_signatures())) {
err ("error: verification algorithm unsupported"); err ("error: verification algorithm unsupported");
err ("info: requires algorithm " << msg.alg_id err ("info: requires algorithm " << msg.alg_id
<< " with signature support"); << " with signature support");
@ -1003,7 +1003,7 @@ int action_verify (bool armor, const std::string&detach,
err (" verification status: " err (" verification status: "
<< (r == 0 ? << (r == 0 ?
"GOOD signature ;-)" : "GOOD signature ;-)" :
"BAD signature :-(") ); "BAD signature :-("));
if (r) { if (r) {
if (!yes) { if (!yes) {
@ -1049,9 +1049,9 @@ int action_sign_encrypt (const std::string&user, const std::string&recipient,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) { i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) {
if (keyspec_matches (user, i->second.pub.name, i->first) ) { if (keyspec_matches (user, i->second.pub.name, i->first)) {
if (!AS.count (i->second.pub.alg) ) continue; if (!AS.count (i->second.pub.alg)) continue;
if (!AS[i->second.pub.alg]->provides_signatures() ) if (!AS[i->second.pub.alg]->provides_signatures())
continue; continue;
if (u) { if (u) {
@ -1071,9 +1071,9 @@ int action_sign_encrypt (const std::string&user, const std::string&recipient,
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i != e; ++i) { i = KR.pubs.begin(), e = KR.pubs.end(); i != e; ++i) {
if (keyspec_matches (recipient, i->second.name, i->first) ) { if (keyspec_matches (recipient, i->second.name, i->first)) {
if (!AS.count (i->second.alg) ) continue; if (!AS.count (i->second.alg)) continue;
if (!AS[i->second.alg]->provides_encryption() ) if (!AS[i->second.alg]->provides_encryption())
continue; continue;
if (recip) { if (recip) {
@ -1085,9 +1085,9 @@ int action_sign_encrypt (const std::string&user, const std::string&recipient,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) { i = KR.pairs.begin(), e = KR.pairs.end(); i != e; ++i) {
if (keyspec_matches (recipient, i->second.pub.name, i->first) ) { if (keyspec_matches (recipient, i->second.pub.name, i->first)) {
if (!AS.count (i->second.pub.alg) ) continue; if (!AS.count (i->second.pub.alg)) continue;
if (!AS[i->second.pub.alg]->provides_encryption() ) if (!AS[i->second.pub.alg]->provides_encryption())
continue; continue;
if (recip) { if (recip) {
@ -1110,7 +1110,7 @@ int action_sign_encrypt (const std::string&user, const std::string&recipient,
bvector bv; bvector bv;
bv.from_string (data); bv.from_string (data);
if (smsg.sign (bv, u->pub.alg, u->pub.keyid, AS, KR, r) ) { if (smsg.sign (bv, u->pub.alg, u->pub.keyid, AS, KR, r)) {
err ("error: digital signature failed"); err ("error: digital signature failed");
return 1; return 1;
} }
@ -1122,7 +1122,7 @@ int action_sign_encrypt (const std::string&user, const std::string&recipient,
//encrypt it //encrypt it
encrypted_msg emsg; encrypted_msg emsg;
bv.from_string (data); bv.from_string (data);
if (emsg.encrypt (bv, recip->alg, recip->keyid, AS, KR, r) ) { if (emsg.encrypt (bv, recip->alg, recip->keyid, AS, KR, r)) {
err ("error: encryption failed"); err ("error: encryption failed");
return 1; return 1;
} }
@ -1152,7 +1152,7 @@ int action_decrypt_verify (bool armor, bool yes,
if (armor) { if (armor) {
std::string type; std::string type;
std::vector<std::string> parts; std::vector<std::string> parts;
if (!envelope_read (data, 0, type, parts) ) { if (!envelope_read (data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -1161,7 +1161,7 @@ int action_decrypt_verify (bool armor, bool yes,
err ("error: wrong envelope format"); err ("error: wrong envelope format");
return 1; return 1;
} }
if (!base64_decode (parts[0], data) ) { if (!base64_decode (parts[0], data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -1170,14 +1170,14 @@ int action_decrypt_verify (bool armor, bool yes,
sencode*M = sencode_decode (data); sencode*M = sencode_decode (data);
if (!M) { if (!M) {
err ("error: could not parse input sencode"); err ("error: could not parse input sencode");
if (!armor && envelope_lookalike (data) ) if (!armor && envelope_lookalike (data))
err ("notice: input looks ascii-armored, " err ("notice: input looks ascii-armored, "
"try using the armor option"); "try using the armor option");
return 1; return 1;
} }
encrypted_msg emsg; encrypted_msg emsg;
if (!emsg.unserialize (M) ) { if (!emsg.unserialize (M)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (M); sencode_destroy (M);
return 1; return 1;
@ -1196,8 +1196,8 @@ int action_decrypt_verify (bool armor, bool yes,
return 2; //missing key flag return 2; //missing key flag
} }
if ( (!AS.count (emsg.alg_id) ) if ( (!AS.count (emsg.alg_id))
|| (!AS[emsg.alg_id]->provides_encryption() ) ) { || (!AS[emsg.alg_id]->provides_encryption())) {
err ("error: decryption algorithm unsupported"); err ("error: decryption algorithm unsupported");
err ("info: requires algorithm " << emsg.alg_id err ("info: requires algorithm " << emsg.alg_id
<< " with encryption support"); << " with encryption support");
@ -1205,12 +1205,12 @@ int action_decrypt_verify (bool armor, bool yes,
} }
bvector bv; bvector bv;
if (emsg.decrypt (bv, AS, KR) ) { if (emsg.decrypt (bv, AS, KR)) {
err ("error: decryption failed"); err ("error: decryption failed");
return 1; return 1;
} }
if (!bv.to_string (data) ) { if (!bv.to_string (data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -1229,7 +1229,7 @@ int action_decrypt_verify (bool armor, bool yes,
} }
signed_msg smsg; signed_msg smsg;
if (!smsg.unserialize (M) ) { if (!smsg.unserialize (M)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (M); sencode_destroy (M);
return 1; return 1;
@ -1258,8 +1258,8 @@ int action_decrypt_verify (bool armor, bool yes,
return 2; //missing key flag return 2; //missing key flag
} }
if ( (!AS.count (smsg.alg_id) ) if ( (!AS.count (smsg.alg_id))
|| (!AS[smsg.alg_id]->provides_signatures() ) ) { || (!AS[smsg.alg_id]->provides_signatures())) {
err ("error: verification algorithm unsupported"); err ("error: verification algorithm unsupported");
err ("info: requires algorithm " << smsg.alg_id err ("info: requires algorithm " << smsg.alg_id
<< " with signature support"); << " with signature support");
@ -1276,7 +1276,7 @@ int action_decrypt_verify (bool armor, bool yes,
err (" verification status: " err (" verification status: "
<< (r == 0 ? << (r == 0 ?
"GOOD signature ;-)" : "GOOD signature ;-)" :
"BAD signature :-(") ); "BAD signature :-("));
if (r) { if (r) {
if (!yes) { if (!yes) {
@ -1350,9 +1350,9 @@ static void output_key (bool fp,
if (!fp) if (!fp)
out (ident << '\t' << alg << '\t' out (ident << '\t' << alg << '\t'
<< '@' << keyid.substr (0, 22) << "...\t" << '@' << keyid.substr (0, 22) << "...\t"
<< escape_key_name (name) ); << escape_key_name (name));
else { else {
out ( longid << " with algorithm " << alg out (longid << " with algorithm " << alg
<< ", name `" << escape_key_name (name) << "'"); << ", name `" << escape_key_name (name) << "'");
std::cout << " fingerprint "; std::cout << " fingerprint ";
@ -1375,7 +1375,7 @@ int action_list (bool nice_fingerprint, const std::string&filter,
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) if (keyspec_matches (filter, i->second.pub.name, i->first))
output_key (nice_fingerprint, output_key (nice_fingerprint,
"pubkey", "public key in keypair", "pubkey", "public key in keypair",
@ -1386,7 +1386,7 @@ int action_list (bool nice_fingerprint, const std::string&filter,
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i = KR.pubs.begin(), e = KR.pubs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.name, i->first) ) if (keyspec_matches (filter, i->second.name, i->first))
output_key (nice_fingerprint, output_key (nice_fingerprint,
"pubkey", "public key", "pubkey", "public key",
i->second.alg, i->first, i->second.alg, i->first,
@ -1406,7 +1406,7 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
if (armor) { if (armor) {
std::string type; std::string type;
std::vector<std::string> parts; std::vector<std::string> parts;
if (!envelope_read (data, 0, type, parts) ) { if (!envelope_read (data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -1416,7 +1416,7 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
return 1; return 1;
} }
if (!base64_decode (parts[0], data) ) { if (!base64_decode (parts[0], data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -1425,21 +1425,21 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
sencode*S = sencode_decode (data); sencode*S = sencode_decode (data);
if (!S) { if (!S) {
err ("error: could not parse input sencode"); err ("error: could not parse input sencode");
if (!armor && envelope_lookalike (data) ) if (!armor && envelope_lookalike (data))
err ("notice: input looks ascii-armored, " err ("notice: input looks ascii-armored, "
"try using the armor option"); "try using the armor option");
return 1; return 1;
} }
keyring::pubkey_storage p; keyring::pubkey_storage p;
if (!keyring::parse_pubkeys (S, p) ) { if (!keyring::parse_pubkeys (S, p)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (S); sencode_destroy (S);
return 1; return 1;
} }
sencode_destroy (S); sencode_destroy (S);
if (!p.size() ) { if (!p.size()) {
err ("notice: keyring was empty"); err ("notice: keyring was empty");
return 0; return 0;
} }
@ -1448,7 +1448,7 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = p.begin(), e = p.end(); i != e; ++i) { i = p.begin(), e = p.end(); i != e; ++i) {
if (keyspec_matches (filter, i->second.name, if (keyspec_matches (filter, i->second.name,
i->first) ) i->first))
output_key (fp, output_key (fp,
"pubkey", "public key", "pubkey", "public key",
i->second.alg, i->first, i->second.alg, i->first,
@ -1463,11 +1463,11 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
int rewrites = 0, privs = 0; int rewrites = 0, privs = 0;
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = p.begin(), e = p.end(); i != e; ++i) { i = p.begin(), e = p.end(); i != e; ++i) {
if (keyspec_matches (filter, i->second.name, i->first) ) { if (keyspec_matches (filter, i->second.name, i->first)) {
if (KR.pairs.count (i->first) ) { if (KR.pairs.count (i->first)) {
++privs; ++privs;
++rewrites; ++rewrites;
} else if (KR.pubs.count (i->first) ) { } else if (KR.pubs.count (i->first)) {
++rewrites; ++rewrites;
} }
} }
@ -1484,7 +1484,7 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
//merge into KR. Also prevent keyID collisions //merge into KR. Also prevent keyID collisions
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = p.begin(), e = p.end(); i != e; ++i) { i = p.begin(), e = p.end(); i != e; ++i) {
if (keyspec_matches (filter, i->second.name, i->first) ) { if (keyspec_matches (filter, i->second.name, i->first)) {
KR.remove_pubkey (i->first); KR.remove_pubkey (i->first);
KR.remove_keypair (i->first); KR.remove_keypair (i->first);
KR.store_pubkey (i->first, KR.store_pubkey (i->first,
@ -1494,7 +1494,7 @@ int action_import (bool armor, bool no_action, bool yes, bool fp,
} }
} }
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }
@ -1514,9 +1514,9 @@ int action_export (bool armor,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) { if (keyspec_matches (filter, i->second.pub.name, i->first)) {
s[i->first] = i->second.pub; s[i->first] = i->second.pub;
if (name.length() ) if (name.length())
s[i->first].name = name; s[i->first].name = name;
} }
} }
@ -1524,14 +1524,14 @@ int action_export (bool armor,
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i = KR.pubs.begin(), e = KR.pubs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.name, i->first) ) { if (keyspec_matches (filter, i->second.name, i->first)) {
s[i->first] = i->second; s[i->first] = i->second;
if (name.length() ) if (name.length())
s[i->first].name = name; s[i->first].name = name;
} }
} }
if (!s.size() ) { if (!s.size()) {
err ("error: no such public keys"); err ("error: no such public keys");
return 1; return 1;
} }
@ -1565,7 +1565,7 @@ int action_delete (bool yes, const std::string & filter, keyring & KR)
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i = KR.pubs.begin(), e = KR.pubs.end();
i != e; ++i) i != e; ++i)
if (keyspec_matches (filter, i->second.name, i->first) ) { if (keyspec_matches (filter, i->second.name, i->first)) {
++kc; ++kc;
todel.push_back (i->first); todel.push_back (i->first);
} }
@ -1585,7 +1585,7 @@ int action_delete (bool yes, const std::string & filter, keyring & KR)
i = todel.begin(), e = todel.end(); i != e; ++i) i = todel.begin(), e = todel.end(); i != e; ++i)
KR.remove_pubkey (*i); KR.remove_pubkey (*i);
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }
@ -1598,7 +1598,7 @@ int action_rename (bool yes,
const std::string & filter, const std::string & name, const std::string & filter, const std::string & name,
keyring & KR) keyring & KR)
{ {
if (!name.length() ) { if (!name.length()) {
err ("error: missing new name specification"); err ("error: missing new name specification");
return 1; return 1;
} }
@ -1609,7 +1609,7 @@ int action_rename (bool yes,
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i = KR.pubs.begin(), e = KR.pubs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.name, i->first) ) if (keyspec_matches (filter, i->second.name, i->first))
++kc; ++kc;
} }
if (!kc) { if (!kc) {
@ -1628,11 +1628,11 @@ int action_rename (bool yes,
for (keyring::pubkey_storage::iterator for (keyring::pubkey_storage::iterator
i = KR.pubs.begin(), e = KR.pubs.end(); i = KR.pubs.begin(), e = KR.pubs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.name, i->first) ) if (keyspec_matches (filter, i->second.name, i->first))
i->second.name = name; i->second.name = name;
} }
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }
@ -1651,7 +1651,7 @@ int action_list_sec (bool nice_fingerprint, const std::string & filter,
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) if (keyspec_matches (filter, i->second.pub.name, i->first))
output_key (nice_fingerprint, output_key (nice_fingerprint,
"keypair", "key pair", "keypair", "key pair",
i->second.pub.alg, i->first, i->second.pub.alg, i->first,
@ -1671,7 +1671,7 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
if (armor) { if (armor) {
std::string type; std::string type;
std::vector<std::string> parts; std::vector<std::string> parts;
if (!envelope_read (data, 0, type, parts) ) { if (!envelope_read (data, 0, type, parts)) {
err ("error: no data envelope found"); err ("error: no data envelope found");
return 1; return 1;
} }
@ -1681,7 +1681,7 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
return 1; return 1;
} }
if (!base64_decode (parts[0], data) ) { if (!base64_decode (parts[0], data)) {
err ("error: malformed data"); err ("error: malformed data");
return 1; return 1;
} }
@ -1690,21 +1690,21 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
sencode*S = sencode_decode (data); sencode*S = sencode_decode (data);
if (!S) { if (!S) {
err ("error: could not parse input sencode"); err ("error: could not parse input sencode");
if (!armor && envelope_lookalike (data) ) if (!armor && envelope_lookalike (data))
err ("notice: input looks ascii-armored, " err ("notice: input looks ascii-armored, "
"try using the armor option"); "try using the armor option");
return 1; return 1;
} }
keyring::keypair_storage s; keyring::keypair_storage s;
if (!keyring::parse_keypairs (S, s) ) { if (!keyring::parse_keypairs (S, s)) {
err ("error: could not parse input structure"); err ("error: could not parse input structure");
sencode_destroy (S); sencode_destroy (S);
return 1; return 1;
} }
sencode_destroy (S); sencode_destroy (S);
if (!s.size() ) { if (!s.size()) {
err ("notice: keyring was empty"); err ("notice: keyring was empty");
return 0; return 0;
} }
@ -1713,7 +1713,7 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = s.begin(), e = s.end(); i != e; ++i) { i = s.begin(), e = s.end(); i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, if (keyspec_matches (filter, i->second.pub.name,
i->first) ) i->first))
output_key (fp, output_key (fp,
"keypair", "key pair", "keypair", "key pair",
i->second.pub.alg, i->first, i->second.pub.alg, i->first,
@ -1729,7 +1729,7 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
i = s.begin(), e = s.end(); i != e; ++i) { i = s.begin(), e = s.end(); i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) if (keyspec_matches (filter, i->second.pub.name, i->first)
&& (KR.pubs.count (i->first) && (KR.pubs.count (i->first)
|| KR.pairs.count (i->first) ) ) || KR.pairs.count (i->first)))
++rewrites; ++rewrites;
} }
@ -1743,7 +1743,7 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
//merge into KR. Also prevent keyID collisions //merge into KR. Also prevent keyID collisions
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = s.begin(), e = s.end(); i != e; ++i) { i = s.begin(), e = s.end(); i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) { if (keyspec_matches (filter, i->second.pub.name, i->first)) {
KR.remove_pubkey (i->first); KR.remove_pubkey (i->first);
KR.remove_keypair (i->first); KR.remove_keypair (i->first);
KR.store_keypair (i->first, KR.store_keypair (i->first,
@ -1754,7 +1754,7 @@ int action_import_sec (bool armor, bool no_action, bool yes, bool fp,
} }
} }
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }
@ -1773,14 +1773,14 @@ int action_export_sec (bool armor, bool yes,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) { if (keyspec_matches (filter, i->second.pub.name, i->first)) {
s[i->first] = i->second; s[i->first] = i->second;
if (name.length() ) if (name.length())
s[i->first].pub.name = name; s[i->first].pub.name = name;
} }
} }
if (!s.size() ) { if (!s.size()) {
err ("error: no such secret"); err ("error: no such secret");
return 1; return 1;
} }
@ -1821,7 +1821,7 @@ int action_delete_sec (bool yes, const std::string & filter, keyring & KR)
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) i != e; ++i)
if (keyspec_matches (filter, i->second.pub.name, i->first) ) { if (keyspec_matches (filter, i->second.pub.name, i->first)) {
++kc; ++kc;
todel.push_back (i->first); todel.push_back (i->first);
} }
@ -1842,7 +1842,7 @@ int action_delete_sec (bool yes, const std::string & filter, keyring & KR)
i = todel.begin(), e = todel.end(); i != e; ++i) i = todel.begin(), e = todel.end(); i != e; ++i)
KR.remove_keypair (*i); KR.remove_keypair (*i);
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }
@ -1855,7 +1855,7 @@ int action_rename_sec (bool yes,
const std::string & filter, const std::string & name, const std::string & filter, const std::string & name,
keyring & KR) keyring & KR)
{ {
if (!name.length() ) { if (!name.length()) {
err ("error: missing new name specification"); err ("error: missing new name specification");
return 1; return 1;
} }
@ -1866,7 +1866,7 @@ int action_rename_sec (bool yes,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) if (keyspec_matches (filter, i->second.pub.name, i->first))
++kc; ++kc;
} }
if (!kc) { if (!kc) {
@ -1885,11 +1885,11 @@ int action_rename_sec (bool yes,
for (keyring::keypair_storage::iterator for (keyring::keypair_storage::iterator
i = KR.pairs.begin(), e = KR.pairs.end(); i = KR.pairs.begin(), e = KR.pairs.end();
i != e; ++i) { i != e; ++i) {
if (keyspec_matches (filter, i->second.pub.name, i->first) ) if (keyspec_matches (filter, i->second.pub.name, i->first))
i->second.pub.name = name; i->second.pub.name = name;
} }
if (!KR.save() ) { if (!KR.save()) {
err ("error: couldn't save keyring"); err ("error: couldn't save keyring");
return 1; return 1;
} }

View file

@ -30,7 +30,7 @@ static int mceqd_create_keypair (sencode**pub, sencode**priv, prng&rng)
mce_qd::pubkey Pub; mce_qd::pubkey Pub;
mce_qd::privkey Priv; mce_qd::privkey Priv;
if (mce_qd::generate (Pub, Priv, rng, m, T, b, d) ) if (mce_qd::generate (Pub, Priv, rng, m, T, b, d))
return 1; return 1;
*pub = Pub.serialize(); *pub = Pub.serialize();
@ -121,7 +121,7 @@ static void message_pad (const bvector&in, std::vector<byte>&out,
//pad with random bits to whole byte //pad with random bits to whole byte
unsigned char rtmp = rng.random (256); unsigned char rtmp = rng.random (256);
for (; i & 0x7; ++i) for (; i & 0x7; ++i)
if (rtmp >> (i & 0x7) ) if (rtmp >> (i & 0x7))
out[i >> 3] |= 1 << (i & 0x7); out[i >> 3] |= 1 << (i & 0x7);
//append message overflow size //append message overflow size
@ -149,7 +149,7 @@ static bool message_unpad (std::vector<byte> in, bvector&out,
hash_func&pad_hash) hash_func&pad_hash)
{ {
//check byte padding sizes //check byte padding sizes
if (!in.size() ) return false; if (!in.size()) return false;
//get rid of the byte padding //get rid of the byte padding
uint padsize_begin, padsize_end; uint padsize_begin, padsize_end;
@ -158,7 +158,7 @@ static bool message_unpad (std::vector<byte> in, bvector&out,
padsize_end = in[in.size() - 1]; padsize_end = in[in.size() - 1];
//check if it really fits //check if it really fits
//(2 bytes padding + 1 byte min padded msg length) //(2 bytes padding + 1 byte min padded msg length)
if ( (uint) padsize_begin + (uint) padsize_end + 3 > in.size() ) if ( (uint) padsize_begin + (uint) padsize_end + 3 > in.size())
return false; return false;
//get rid of beginning padding //get rid of beginning padding
@ -183,15 +183,15 @@ static bool message_unpad (std::vector<byte> in, bvector&out,
if (bit_overflow >= 8) return false; if (bit_overflow >= 8) return false;
//check if there's byte with overflow bits //check if there's byte with overflow bits
if (bit_overflow && (in_end < 2) ) return false; if (bit_overflow && (in_end < 2)) return false;
//convert to bvector //convert to bvector
uint msg_size = ( (in_end - (bit_overflow ? 2 : 1) ) << 3) uint msg_size = ( (in_end - (bit_overflow ? 2 : 1)) << 3)
+ bit_overflow; + bit_overflow;
out.clear(); out.clear();
out.resize (msg_size); out.resize (msg_size);
for (uint i = 0; i < msg_size; ++i) for (uint i = 0; i < msg_size; ++i)
out[i] = 1 & (in[i >> 3] >> (i & 0x7) ); out[i] = 1 & (in[i >> 3] >> (i & 0x7));
return true; return true;
} }
@ -225,7 +225,7 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
//load the key //load the key
pubkey_type Pub; pubkey_type Pub;
if (!Pub.unserialize (pubkey) ) return 1; if (!Pub.unserialize (pubkey)) return 1;
//verify that key parameters match our scheme //verify that key parameters match our scheme
if (Pub.plain_size() != plainsize) return 2; if (Pub.plain_size() != plainsize) return 2;
@ -245,7 +245,7 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
//create the base for error vector //create the base for error vector
std::vector<byte> H, M2; std::vector<byte> H, M2;
M2 = M; M2 = M;
M2.insert (M2.end(), K.begin(), K.end() ); M2.insert (M2.end(), K.begin(), K.end());
hash_type hf; hash_type hf;
H = hf (M2); H = hf (M2);
@ -253,7 +253,7 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
bvector ev_rank; bvector ev_rank;
ev_rank.resize (ranksize); ev_rank.resize (ranksize);
for (i = 0; i < ranksize; ++i) for (i = 0; i < ranksize; ++i)
ev_rank[i] = 1 & (H[ (i >> 3) % H.size()] >> (i & 0x7) ); ev_rank[i] = 1 & (H[ (i >> 3) % H.size()] >> (i & 0x7));
bvector ev; bvector ev;
ev_rank.colex_unrank (ev, ciphersize, errorcount); ev_rank.colex_unrank (ev, ciphersize, errorcount);
@ -261,10 +261,10 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
//prepare plaintext //prepare plaintext
bvector mce_plain; bvector mce_plain;
mce_plain.resize (plainsize); mce_plain.resize (plainsize);
for (i = 0; i < plainsize; ++i) mce_plain[i] = 1 & (K[i >> 3] >> (i & 0x7) ); for (i = 0; i < plainsize; ++i) mce_plain[i] = 1 & (K[i >> 3] >> (i & 0x7));
//run McEliece //run McEliece
if (Pub.encrypt (mce_plain, cipher, ev) ) return 5; if (Pub.encrypt (mce_plain, cipher, ev)) return 5;
//encrypt the message part //encrypt the message part
scipher sc; scipher sc;
@ -276,9 +276,9 @@ static int fo_encrypt (const bvector&plain, bvector&cipher,
for (i = 0; i < M.size(); ++i) M[i] = M[i] ^ sc.gen(); for (i = 0; i < M.size(); ++i) M[i] = M[i] ^ sc.gen();
//append the message part to the ciphertext //append the message part to the ciphertext
cipher.resize (ciphersize + (M.size() << 3) ); cipher.resize (ciphersize + (M.size() << 3));
for (i = 0; i < (M.size() << 3); ++i) for (i = 0; i < (M.size() << 3); ++i)
cipher[ciphersize + i] = 1 & (M[i >> 3] >> (i & 0x7) ); cipher[ciphersize + i] = 1 & (M[i >> 3] >> (i & 0x7));
return 0; return 0;
} }
@ -298,9 +298,9 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
//load the key //load the key
privkey_type Priv; privkey_type Priv;
if (!Priv.unserialize (privkey) ) return 1; if (!Priv.unserialize (privkey)) return 1;
if (Priv.prepare() ) return 100; if (Priv.prepare()) return 100;
//verify that key parameters match the scheme //verify that key parameters match the scheme
if (Priv.plain_size() != plainsize) return 2; if (Priv.plain_size() != plainsize) return 2;
@ -371,7 +371,7 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
//compute the hash of K+M //compute the hash of K+M
std::vector<byte>H, M2; std::vector<byte>H, M2;
M2 = M; M2 = M;
M2.insert (M2.end(), K.begin(), K.end() ); M2.insert (M2.end(), K.begin(), K.end());
hash_type hf; hash_type hf;
H = hf (M2); H = hf (M2);
@ -381,13 +381,13 @@ static int fo_decrypt (const bvector&cipher, bvector&plain,
ev_rank.resize (ranksize, 0); ev_rank.resize (ranksize, 0);
for (i = 0; i < ranksize; ++i) for (i = 0; i < ranksize; ++i)
if (ev_rank[i] != (1 & (H[ (i >> 3) % H.size()] if (ev_rank[i] != (1 & (H[ (i >> 3) % H.size()]
>> (i & 0x7) ) ) ) >> (i & 0x7))))
return 7; return 7;
//if the message seems okay, unpad and return it. //if the message seems okay, unpad and return it.
pad_hash_type phf; pad_hash_type phf;
if (!message_unpad (M, plain, phf) ) return 8; if (!message_unpad (M, plain, phf)) return 8;
return 0; return 0;
} }

View file

@ -92,11 +92,11 @@ static int fmtseq_generic_sign (const bvector&msg,
{ {
//load the key //load the key
fmtseq::privkey Priv; fmtseq::privkey Priv;
if (!Priv.unserialize (*privkey) ) return 1; if (!Priv.unserialize (*privkey)) return 1;
//check parameters //check parameters
if ( (Priv.h != h) || (Priv.l != l) if ( (Priv.h != h) || (Priv.l != l)
|| (Priv.hs != hs) ) return 2; || (Priv.hs != hs)) return 2;
//prepare the message and hash it //prepare the message and hash it
std::vector<byte> M, H; std::vector<byte> M, H;
@ -107,12 +107,12 @@ static int fmtseq_generic_sign (const bvector&msg,
//convert to bvector //convert to bvector
bvector hash; bvector hash;
hash.resize (hs, 0); hash.resize (hs, 0);
for (uint i = 0; i < hs; ++i) hash[i] = 1 & (H[i >> 3] >> (i & 0x7) ); for (uint i = 0; i < hs; ++i) hash[i] = 1 & (H[i >> 3] >> (i & 0x7));
//make a signature //make a signature
tree_hash hf; tree_hash hf;
generator g; generator g;
if (Priv.sign (hash, sig, hf, g) ) return 3; if (Priv.sign (hash, sig, hf, g)) return 3;
//if it went okay, refresh the privkey //if it went okay, refresh the privkey
sencode* new_pk = Priv.serialize(); sencode* new_pk = Priv.serialize();
@ -132,10 +132,10 @@ static int fmtseq_generic_verify (const bvector&sig,
{ {
//load the key //load the key
fmtseq::pubkey Pub; fmtseq::pubkey Pub;
if (!Pub.unserialize (pubkey) ) return 1; if (!Pub.unserialize (pubkey)) return 1;
//check parameters //check parameters
if ( (Pub.H != h * l) || (Pub.hs != hs) ) return 2; if ( (Pub.H != h * l) || (Pub.hs != hs)) return 2;
//prepare the message and hash it //prepare the message and hash it
std::vector<byte> M, H; std::vector<byte> M, H;
@ -146,11 +146,11 @@ static int fmtseq_generic_verify (const bvector&sig,
//convert to bvector //convert to bvector
bvector hash; bvector hash;
hash.resize (hs, 0); hash.resize (hs, 0);
for (uint i = 0; i < hs; ++i) hash[i] = 1 & (H[i >> 3] >> (i & 0x7) ); for (uint i = 0; i < hs; ++i) hash[i] = 1 & (H[i >> 3] >> (i & 0x7));
//check the signature //check the signature
tree_hash hf; tree_hash hf;
if (Pub.verify (sig, hash, hf) ) return 3; if (Pub.verify (sig, hash, hf)) return 3;
//otherwise the sig is okay! //otherwise the sig is okay!
return 0; return 0;
@ -165,7 +165,7 @@ static int fmtseq_create_keypair (sencode**pub, sencode**priv, prng&rng)
treehash hf; treehash hf;
generator g; generator g;
if (fmtseq::generate (Pub, Priv, rng, hf, g, hs, h, l) ) if (fmtseq::generate (Pub, Priv, rng, hf, g, hs, h, l))
return 1; return 1;
*pub = Pub.serialize(); *pub = Pub.serialize();

View file

@ -35,7 +35,7 @@ public:
I = J = 0; I = J = 0;
S.resize (Ssize); S.resize (Ssize);
mask = ~ (inttype) 0; mask = ~ (inttype) 0;
if ( (inttype) (1 << bits) ) mask %= 1 << bits; if ( (inttype) (1 << bits)) mask %= 1 << bits;
for (size_t i = 0; i < Ssize; ++i) S[i] = i; for (size_t i = 0; i < Ssize; ++i) S[i] = i;
} }
@ -55,7 +55,7 @@ public:
i <= mask; i <= mask;
++i, ++keypos) { ++i, ++keypos) {
if (keypos >= end) keypos = begin; //rotate if (keypos >= end) keypos = begin; //rotate
j = (j + S[i] + (*keypos) ) & mask; j = (j + S[i] + (*keypos)) & mask;
t = S[j]; t = S[j];
S[j] = S[i]; S[j] = S[i];
S[i] = t; S[i] = t;
@ -86,7 +86,7 @@ public:
void gen (size_t n, std::vector<inttype>&out) { void gen (size_t n, std::vector<inttype>&out) {
out.resize (n); out.resize (n);
gen (n, & (out[0]) ); gen (n, & (out[0]));
} }
size_t key_size() { size_t key_size() {

View file

@ -27,7 +27,7 @@ void base64_encode (const std::string& in, std::string&out, int cols)
unsigned int acc = 0; unsigned int acc = 0;
int accbits = 0, idx = 0, idxmax = in.length(), col = 0; int accbits = 0, idx = 0, idxmax = in.length(), col = 0;
out.clear(); out.clear();
out.reserve (idxmax + (2 * idxmax / 5) ); //reserve around 140% out.reserve (idxmax + (2 * idxmax / 5)); //reserve around 140%
while (idx < idxmax) { while (idx < idxmax) {
if (accbits < 6) { if (accbits < 6) {
acc = (acc << 8) | (unsigned char) in[idx++]; acc = (acc << 8) | (unsigned char) in[idx++];
@ -37,14 +37,14 @@ void base64_encode (const std::string& in, std::string&out, int cols)
accbits -= 6; accbits -= 6;
out.push_back (b64str[ (acc >> accbits) & 0x3f]); out.push_back (b64str[ (acc >> accbits) & 0x3f]);
if (cols && ( (++col) >= cols) ) { if (cols && ( (++col) >= cols)) {
out.push_back ('\n'); out.push_back ('\n');
col = 0; col = 0;
} }
} }
} }
if (accbits) { if (accbits) {
out.push_back (b64str[ (acc << (6 - accbits) ) & 0x3f]); out.push_back (b64str[ (acc << (6 - accbits)) & 0x3f]);
if (accbits == 2) out.push_back ('='); if (accbits == 2) out.push_back ('=');
if (accbits <= 4) out.push_back ('='); if (accbits <= 4) out.push_back ('=');
} }
@ -149,7 +149,7 @@ static bool eat_4 (const std::string&in, int&idx, int idxmax, unsigned char*a)
{ {
for (int i = 0; i < 4; ++i) { for (int i = 0; i < 4; ++i) {
eat_white (in, idx, idxmax); eat_white (in, idx, idxmax);
if ( (idx < idxmax) && is_b64 (in[idx]) ) if ( (idx < idxmax) && is_b64 (in[idx]))
a[i] = in[idx]; a[i] = in[idx];
else return false; else return false;
++idx; ++idx;
@ -174,13 +174,13 @@ bool base64_decode (const std::string& in, std::string&out)
//start parsing //start parsing
unsigned char c[4]; unsigned char c[4];
while (eat_4 (in, idx, idxmax, c) ) { while (eat_4 (in, idx, idxmax, c)) {
for (int i = 0; i < 4; ++i) for (int i = 0; i < 4; ++i)
c[i] = b64d[c[i]]; // '=' gets converted to -1 c[i] = b64d[c[i]]; // '=' gets converted to -1
//consistency checks //consistency checks
if ( (c[0] == -1) || (c[1] == -1) ) return false; if ( (c[0] == -1) || (c[1] == -1)) return false;
if ( (c[2] == -1) && (c[3] != -1) ) return false; if ( (c[2] == -1) && (c[3] != -1)) return false;
tmp = (c[0] << 18) | (c[1] << 12); tmp = (c[0] << 18) | (c[1] << 12);
if (c[2] != -1) tmp |= c[2] << 6; if (c[2] != -1) tmp |= c[2] << 6;

View file

@ -29,35 +29,35 @@ uint bvector::hamming_weight()
void bvector::add (const bvector&a) void bvector::add (const bvector&a)
{ {
if (a.size() > size() ) resize (a.size(), 0); if (a.size() > size()) resize (a.size(), 0);
for (uint i = 0; i < a.size(); ++i) for (uint i = 0; i < a.size(); ++i)
item (i) = item (i) ^ a[i]; item (i) = item (i) ^ a[i];
} }
void bvector::add_range (const bvector&a, uint b, uint e) void bvector::add_range (const bvector&a, uint b, uint e)
{ {
if (e > size() ) resize (e, 0); if (e > size()) resize (e, 0);
for (uint i = b; i < e; ++i) for (uint i = b; i < e; ++i)
item (i) = item (i) ^ a[i]; item (i) = item (i) ^ a[i];
} }
void bvector::add_offset (const bvector&a, uint offset) void bvector::add_offset (const bvector&a, uint offset)
{ {
if (offset + a.size() > size() ) resize (offset + a.size(), 0); if (offset + a.size() > size()) resize (offset + a.size(), 0);
for (uint i = 0; i < a.size(); ++i) for (uint i = 0; i < a.size(); ++i)
item (offset + i) = item (offset + i) ^ a[i]; item (offset + i) = item (offset + i) ^ a[i];
} }
void bvector::set_block (const bvector&a, uint offset) void bvector::set_block (const bvector&a, uint offset)
{ {
if (offset + a.size() > size() ) resize (offset + a.size(), 0); if (offset + a.size() > size()) resize (offset + a.size(), 0);
for (uint i = 0; i < a.size(); ++i) for (uint i = 0; i < a.size(); ++i)
item (offset + i) = a[i]; item (offset + i) = a[i];
} }
void bvector::get_block (uint offset, uint bs, bvector&out) const void bvector::get_block (uint offset, uint bs, bvector&out) const
{ {
if (offset + bs > size() ) return; if (offset + bs > size()) return;
out.resize (bs); out.resize (bs);
for (uint i = 0; i < bs; ++i) out[i] = item (offset + i); for (uint i = 0; i < bs; ++i) out[i] = item (offset + i);
} }
@ -66,14 +66,14 @@ bool bvector::operator* (const bvector&a)
{ {
bool r = 0; bool r = 0;
uint s = size(), i; uint s = size(), i;
if (s > a.size() ) s = a.size(); if (s > a.size()) s = a.size();
for (i = 0; i < s; ++i) r ^= (item (i) &a[i]); for (i = 0; i < s; ++i) r ^= (item (i) &a[i]);
return r; return r;
} }
bool bvector::zero() const bool bvector::zero() const
{ {
for (uint i = 0; i < size(); ++i) if (item (i) ) return false; for (uint i = 0; i < size(); ++i) if (item (i)) return false;
return true; return true;
} }
@ -83,7 +83,7 @@ void bvector::to_poly (polynomial&r, gf2m&fld) const
if (size() % fld.m) return; //impossible if (size() % fld.m) return; //impossible
r.resize (size() / fld.m, 0); r.resize (size() / fld.m, 0);
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
if (item (i) ) r[i / fld.m] |= (1 << (i % fld.m) ); if (item (i)) r[i / fld.m] |= (1 << (i % fld.m));
} }
void bvector::from_poly (const polynomial&r, gf2m&fld) void bvector::from_poly (const polynomial&r, gf2m&fld)
@ -91,7 +91,7 @@ void bvector::from_poly (const polynomial&r, gf2m&fld)
clear(); clear();
resize (r.size() *fld.m, 0); resize (r.size() *fld.m, 0);
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
item (i) = (r[i / fld.m] >> (i % fld.m) ) & 1; item (i) = (r[i / fld.m] >> (i % fld.m)) & 1;
} }
void bvector::to_poly_cotrace (polynomial&r, gf2m&fld) const void bvector::to_poly_cotrace (polynomial&r, gf2m&fld) const
@ -101,7 +101,7 @@ void bvector::to_poly_cotrace (polynomial&r, gf2m&fld) const
uint s = size() / fld.m; uint s = size() / fld.m;
r.resize (s, 0); r.resize (s, 0);
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
if (item (i) ) r[i % s] |= (1 << (i / s) ); if (item (i)) r[i % s] |= (1 << (i / s));
} }
void bvector::from_poly_cotrace (const polynomial&r, gf2m&fld) void bvector::from_poly_cotrace (const polynomial&r, gf2m&fld)
@ -110,7 +110,7 @@ void bvector::from_poly_cotrace (const polynomial&r, gf2m&fld)
uint s = r.size(); uint s = r.size();
resize (s * fld.m, 0); resize (s * fld.m, 0);
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
item (i) = (r[i % s] >> (i / s) ) & 1; item (i) = (r[i % s] >> (i / s)) & 1;
} }
bool bvector::to_string (std::string& out) const bool bvector::to_string (std::string& out) const
@ -121,7 +121,7 @@ bool bvector::to_string (std::string& out) const
out.resize (size() >> 3, 0); out.resize (size() >> 3, 0);
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
if (item (i) ) out[i >> 3] |= (1 << (i & 0x7) ); if (item (i)) out[i >> 3] |= (1 << (i & 0x7));
return true; return true;
} }
@ -132,7 +132,7 @@ void bvector::from_string (const std::string&in)
resize (in.length() << 3); resize (in.length() << 3);
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
item (i) = (in[i >> 3] >> (i & 0x7) ) & 1; item (i) = (in[i >> 3] >> (i & 0x7)) & 1;
} }
/* /*
@ -204,7 +204,7 @@ static void combination_number (mpz_t& r, uint n, uint k)
static void bvector_to_mpz (const bvector&v, mpz_t&r) static void bvector_to_mpz (const bvector&v, mpz_t&r)
{ {
mpz_set_ui (r, 0); mpz_set_ui (r, 0);
mpz_realloc2 (r, v.size() ); mpz_realloc2 (r, v.size());
for (uint i = 0; i < v.size(); ++i) for (uint i = 0; i < v.size(); ++i)
if (v[i]) if (v[i])
mpz_setbit (r, i); mpz_setbit (r, i);
@ -213,7 +213,7 @@ static void bvector_to_mpz (const bvector&v, mpz_t&r)
static void mpz_to_bvector (mpz_t&x, bvector&r) static void mpz_to_bvector (mpz_t&x, bvector&r)
{ {
r.resize (mpz_sizeinbase (x, 2) ); r.resize (mpz_sizeinbase (x, 2));
for (uint i = 0; i < r.size(); ++i) for (uint i = 0; i < r.size(); ++i)
r[i] = mpz_tstbit (x, i); r[i] = mpz_tstbit (x, i);
} }
@ -227,14 +227,14 @@ void bvector::colex_rank (bvector&r) const
uint n = 0, k = 1; uint n = 0, k = 1;
while (item (n) ) ++n, ++k; //skip the "zeroes" on the beginning while (item (n)) ++n, ++k; //skip the "zeroes" on the beginning
++n; //now n=k=1, comb=1 ++n; //now n=k=1, comb=1
//non-zero positions //non-zero positions
for (; n < size(); ++n) { for (; n < size(); ++n) {
if (item (n) ) { if (item (n)) {
//add combination number to result //add combination number to result
mpz_swap (t, res); mpz_swap (t, res);
mpz_add (res, t, comb); mpz_add (res, t, comb);
@ -246,7 +246,7 @@ void bvector::colex_rank (bvector&r) const
mpz_swap (t, comb); mpz_swap (t, comb);
mpz_fdiv_q_ui (comb, t, n - k + 1); mpz_fdiv_q_ui (comb, t, n - k + 1);
if (item (n) ) { if (item (n)) {
//increase k in comb //increase k in comb
mpz_swap (t, comb); mpz_swap (t, comb);
mpz_mul_ui (comb, t, n + 1 - k); //n has changed! mpz_mul_ui (comb, t, n + 1 - k); //n has changed!

View file

@ -35,12 +35,12 @@ public:
state.init(); state.init();
for (i = 0; i + B <= a.size(); i += B) for (i = 0; i + B <= a.size(); i += B)
state.process_block (& (a[i]) ); state.process_block (& (a[i]));
state.process_final_incomplete_block (& (a[i]), a.size() - i); state.process_final_incomplete_block (& (a[i]), a.size() - i);
std::vector<byte> result; std::vector<byte> result;
result.resize (H, 0); result.resize (H, 0);
state.get_hash (& (result[0]) ); state.get_hash (& (result[0]));
return result; return result;
} }
}; };
@ -72,8 +72,8 @@ public:
bpos = 0; bpos = 0;
} }
} }
while (apos + B <= asize ) { while (apos + B <= asize) {
state.process_block (& (a[apos]) ); state.process_block (& (a[apos]));
apos += B; apos += B;
} }
for (; apos < asize; ++apos, ++bpos) for (; apos < asize; ++apos, ++bpos)
@ -84,7 +84,7 @@ public:
state.process_final_incomplete_block (buf, bpos); state.process_final_incomplete_block (buf, bpos);
std::vector<byte> result; std::vector<byte> result;
result.resize (H, 0); result.resize (H, 0);
state.get_hash (& (result[0]) ); state.get_hash (& (result[0]));
return result; return result;
} }
}; };

View file

@ -45,13 +45,13 @@ class cubehash_state
for (; n; --n) { for (; n; --n) {
i16 (X[i + 16] += X[i]); i16 (X[i + 16] += X[i]);
i16 (T[i ^ 8] = X[i]); i16 (T[i ^ 8] = X[i]);
i16 (X[i] = ROT (T[i], 7, 32) ); i16 (X[i] = ROT (T[i], 7, 32));
i16 (X[i] ^= X[i + 16]); i16 (X[i] ^= X[i + 16]);
i16 (T[i ^ 2] = X[i + 16]); i16 (T[i ^ 2] = X[i + 16]);
i16 (X[i + 16] = T[i]); i16 (X[i + 16] = T[i]);
i16 (X[i + 16] += X[i]); i16 (X[i + 16] += X[i]);
i16 (T[i ^ 4] = X[i]); i16 (T[i ^ 4] = X[i]);
i16 (X[i] = ROT (T[i], 11, 32) ); i16 (X[i] = ROT (T[i], 11, 32));
i16 (X[i] ^= X[i + 16]); i16 (X[i] ^= X[i + 16]);
i16 (T[i ^ 1] = X[i + 16]); i16 (T[i ^ 1] = X[i + 16]);
i16 (X[i + 16] = T[i]); i16 (X[i + 16] = T[i]);
@ -87,7 +87,7 @@ public:
X[i / 4] ^= * (uint32_t*) &data[i]; X[i / 4] ^= * (uint32_t*) &data[i];
for (; i < B; ++i) for (; i < B; ++i)
X[i / 4] ^= ( (uint32_t) (data[i]) ) << ( (i % 4) * 8); X[i / 4] ^= ( (uint32_t) (data[i])) << ( (i % 4) * 8);
rounds (R); rounds (R);
} }
@ -99,7 +99,7 @@ public:
X[i / 4] ^= * (uint32_t*) &data[i]; X[i / 4] ^= * (uint32_t*) &data[i];
for (; i < n; ++i) for (; i < n; ++i)
X[i / 4] ^= ( (uint32_t) (data[i]) ) << ( (i % 4) * 8); X[i / 4] ^= ( (uint32_t) (data[i])) << ( (i % 4) * 8);
i++; i++;
X[i / 2] ^= ( (uint32_t) 0x80) << ( (i % 4) * 8); X[i / 2] ^= ( (uint32_t) 0x80) << ( (i % 4) * 8);
@ -113,7 +113,7 @@ public:
void get_hash (byte*out) { void get_hash (byte*out) {
for (int i = 0; i < H; ++i) for (int i = 0; i < H; ++i)
out[i] = (X[i / 4] >> ( (i % 4) * 8) ) & 0xff; out[i] = (X[i / 4] >> ( (i % 4) * 8)) & 0xff;
} }
}; };

View file

@ -23,7 +23,7 @@ void compute_goppa_error_locator (polynomial&syndrome, gf2m&fld,
std::vector<polynomial>& sqInv, std::vector<polynomial>& sqInv,
polynomial&out) polynomial&out)
{ {
if (syndrome.zero() ) { if (syndrome.zero()) {
//ensure no roots //ensure no roots
out.resize (1); out.resize (1);
out[0] = 1; out[0] = 1;
@ -52,7 +52,7 @@ void compute_goppa_error_locator (polynomial&syndrome, gf2m&fld,
void compute_alternant_error_locator (polynomial&syndrome, gf2m&fld, void compute_alternant_error_locator (polynomial&syndrome, gf2m&fld,
uint t, polynomial&out) uint t, polynomial&out)
{ {
if (syndrome.zero() ) { if (syndrome.zero()) {
//ensure no roots //ensure no roots
out.resize (1); out.resize (1);
out[0] = 1; out[0] = 1;
@ -139,22 +139,22 @@ bool evaluate_error_locator_trace (polynomial&sigma, bvector&ev, gf2m&fld)
std::set<std::pair<uint, polynomial> > stk; //"stack" std::set<std::pair<uint, polynomial> > stk; //"stack"
stk.insert (make_pair (0, sigma) ); stk.insert (make_pair (0, sigma));
bool failed = false; bool failed = false;
while (!stk.empty() ) { while (!stk.empty()) {
uint i = stk.begin()->first; uint i = stk.begin()->first;
polynomial cur = stk.begin()->second; polynomial cur = stk.begin()->second;
stk.erase (stk.begin() ); stk.erase (stk.begin());
int deg = cur.degree(); int deg = cur.degree();
if (deg <= 0) continue; if (deg <= 0) continue;
if (deg == 1) { //found a linear factor if (deg == 1) { //found a linear factor
ev[fld.mult (cur[0], fld.inv (cur[1]) ) ] = 1; ev[fld.mult (cur[0], fld.inv (cur[1])) ] = 1;
continue; continue;
} }
@ -163,7 +163,7 @@ bool evaluate_error_locator_trace (polynomial&sigma, bvector&ev, gf2m&fld)
continue; continue;
} }
if (trace[i].zero() ) { if (trace[i].zero()) {
//compute the trace if it isn't cached //compute the trace if it isn't cached
uint a = fld.exp (i); uint a = fld.exp (i);
for (uint j = 0; j < fld.m; ++j) { for (uint j = 0; j < fld.m; ++j) {
@ -177,8 +177,8 @@ bool evaluate_error_locator_trace (polynomial&sigma, bvector&ev, gf2m&fld)
polynomial q, r; polynomial q, r;
cur.divmod (t, q, r, fld); cur.divmod (t, q, r, fld);
stk.insert (make_pair (i + 1, t) ); stk.insert (make_pair (i + 1, t));
stk.insert (make_pair (i + 1, q) ); stk.insert (make_pair (i + 1, q));
} }
return !failed; return !failed;

View file

@ -33,9 +33,9 @@ inline static bool acceptable_char (char c)
static bool acceptable_id (const std::string&a) static bool acceptable_id (const std::string&a)
{ {
if (!a.length() ) return false; if (!a.length()) return false;
for (size_t i = 0; i < a.length(); ++i) for (size_t i = 0; i < a.length(); ++i)
if (!acceptable_char (a[i]) ) return false; if (!acceptable_char (a[i])) return false;
return true; return true;
} }
@ -107,7 +107,7 @@ size_t envelope_read (const std::string&data, size_t offset,
term = data.substr (eotype + 1, eoterm - eotype - 1); term = data.substr (eotype + 1, eoterm - eotype - 1);
//verify that type&term are only of acceptable characters //verify that type&term are only of acceptable characters
if (!acceptable_id (type) || !acceptable_id (term) ) if (!acceptable_id (type) || !acceptable_id (term))
continue; continue;
offset = eoterm + begin_suffix.length(); offset = eoterm + begin_suffix.length();
@ -131,14 +131,14 @@ size_t envelope_read (const std::string&data, size_t offset,
break; break;
} }
if ( cut_pos != data.npos && cut_pos < end_pos) { if (cut_pos != data.npos && cut_pos < end_pos) {
//there is cut //there is cut
out_parts.push_back out_parts.push_back
(data.substr (offset, cut_pos - offset) ); (data.substr (offset, cut_pos - offset));
} else { } else {
//no cut, it's till the end //no cut, it's till the end
out_parts.push_back out_parts.push_back
(data.substr (offset, end_pos - offset) ); (data.substr (offset, end_pos - offset));
} }
if (cut_pos == data.npos) { if (cut_pos == data.npos) {
@ -191,7 +191,7 @@ std::string envelope_format (const std::string&type,
bool good = true; bool good = true;
std::vector<std::string>::const_iterator i, e; std::vector<std::string>::const_iterator i, e;
for (i = parts.begin(), e = parts.end(); i != e; ++i) { for (i = parts.begin(), e = parts.end(); i != e; ++i) {
if ( i->find (cut_sep) != i->npos || if (i->find (cut_sep) != i->npos ||
i->find (end_sep) != i->npos) { i->find (end_sep) != i->npos) {
good = false; good = false;
break; break;

View file

@ -41,7 +41,7 @@ static void add_zero_checksum (bvector& v)
uint z = s - v.hamming_weight(); //0's instead of 1's uint z = s - v.hamming_weight(); //0's instead of 1's
v.resize (fmtseq_commitments (s) ); v.resize (fmtseq_commitments (s));
while (z) { while (z) {
v[s] = z & 1; v[s] = z & 1;
z >>= 1; z >>= 1;
@ -52,7 +52,7 @@ static void add_zero_checksum (bvector& v)
static void alloc_exist (privkey&priv) static void alloc_exist (privkey&priv)
{ {
priv.exist.resize (priv.l); priv.exist.resize (priv.l);
uint ts = (1 << (priv.h + 1) ) - 2; uint ts = (1 << (priv.h + 1)) - 2;
for (uint i = 0; i < priv.l; ++i) for (uint i = 0; i < priv.l; ++i)
priv.exist[i].resize (ts); priv.exist[i].resize (ts);
} }
@ -75,7 +75,7 @@ static void alloc_desired (privkey&priv, hash_func&hf)
priv.desired_stack.resize (priv.l - 1); priv.desired_stack.resize (priv.l - 1);
priv.desired_progress.resize (priv.l - 1, 0); priv.desired_progress.resize (priv.l - 1, 0);
for (uint i = 0; i < priv.l - 1; ++i) { for (uint i = 0; i < priv.l - 1; ++i) {
priv.desired[i].resize ( (1 << (priv.h + 1) ) - 2); priv.desired[i].resize ( (1 << (priv.h + 1)) - 2);
for (uint j = 0; j < priv.desired[i].size(); ++j) for (uint j = 0; j < priv.desired[i].size(); ++j)
priv.desired[i][j].resize (hf.size(), 0); priv.desired[i][j].resize (hf.size(), 0);
} }
@ -86,14 +86,14 @@ static void store_desired (privkey&priv, uint did,
{ {
if ( (i.level / priv.h) != did) return; //too below or above if ( (i.level / priv.h) != did) return; //too below or above
uint depth = priv.h - (i.level % priv.h); uint depth = priv.h - (i.level % priv.h);
if (i.pos >= ( (uint) 1 << depth) ) return; //too far right, omg why?! if (i.pos >= ( (uint) 1 << depth)) return; //too far right, omg why?!
priv.desired[did][i.pos + (1 << depth) - 2] = i.item; priv.desired[did][i.pos + (1 << depth) - 2] = i.item;
} }
static bool check_privkey (privkey&priv, hash_func&hf) static bool check_privkey (privkey&priv, hash_func&hf)
{ {
size_t i, j; size_t i, j;
uint ts = (1 << (priv.h + 1) ) - 2; uint ts = (1 << (priv.h + 1)) - 2;
/* /*
* check the content of privkey caches to prevent reading/writing * check the content of privkey caches to prevent reading/writing
@ -110,19 +110,19 @@ static bool check_privkey (privkey&priv, hash_func&hf)
//exist tree hash sizes must be OK //exist tree hash sizes must be OK
for (j = 0; j < ts; ++j) for (j = 0; j < ts; ++j)
if (priv.exist[i][j].size() if (priv.exist[i][j].size()
!= hf.size() ) != hf.size())
return false; return false;
} }
//check desired stuff //check desired stuff
if (priv.desired_stack.size() < priv.desired.size() ) return false; if (priv.desired_stack.size() < priv.desired.size()) return false;
if (priv.desired_progress.size() < priv.desired.size() ) return false; if (priv.desired_progress.size() < priv.desired.size()) return false;
for (i = 0; i < priv.desired.size(); ++i) { for (i = 0; i < priv.desired.size(); ++i) {
if (priv.desired[i].size() != ts) return false; if (priv.desired[i].size() != ts) return false;
for (j = 0; j < ts; ++j) for (j = 0; j < ts; ++j)
if (priv.desired[i][j].size() if (priv.desired[i][j].size()
!= hf.size() ) != hf.size())
return false; return false;
} }
@ -162,7 +162,7 @@ static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
* whole algorithm is kindof complex. Omitted for simplicity. * whole algorithm is kindof complex. Omitted for simplicity.
*/ */
x.resize (hf.size() ); x.resize (hf.size());
uint d_leaves, d_startpos, d_h; uint d_leaves, d_startpos, d_h;
for (i = 0; i < priv.desired.size(); ++i) { for (i = 0; i < priv.desired.size(); ++i) {
@ -172,15 +172,15 @@ static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
continue; //already done continue; //already done
//create the leaf //create the leaf
d_startpos = (1 + (priv.sigs_used >> d_h) ) << d_h; d_startpos = (1 + (priv.sigs_used >> d_h)) << d_h;
uint leafid = d_startpos + priv.desired_progress[i]; uint leafid = d_startpos + priv.desired_progress[i];
prepare_keygen (generator, priv.SK, leafid); prepare_keygen (generator, priv.SK, leafid);
Y.clear(); Y.clear();
for (j = 0; j < commitments; ++j) { for (j = 0; j < commitments; ++j) {
generator.gen (hf.size(), & (x[0]) ); generator.gen (hf.size(), & (x[0]));
x = hf (x); x = hf (x);
Y.insert (Y.end(), x.begin(), x.end() ); Y.insert (Y.end(), x.begin(), x.end());
} }
@ -188,8 +188,8 @@ static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
&stk = priv.desired_stack[i]; &stk = priv.desired_stack[i];
stk.push_back (privkey::tree_stk_item stk.push_back (privkey::tree_stk_item
(0, priv.desired_progress[i], hf (Y) ) ); (0, priv.desired_progress[i], hf (Y)));
store_desired (priv, i, stk.back() ); store_desired (priv, i, stk.back());
++priv.desired_progress[i]; ++priv.desired_progress[i];
@ -202,17 +202,17 @@ static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
Y.clear(); Y.clear();
Y.insert (Y.end(), Y.insert (Y.end(),
(stk.end() - 2)->item.begin(), (stk.end() - 2)->item.begin(),
(stk.end() - 2)->item.end() ); (stk.end() - 2)->item.end());
Y.insert (Y.end(), Y.insert (Y.end(),
(stk.end() - 1)->item.begin(), (stk.end() - 1)->item.begin(),
(stk.end() - 1)->item.end() ); (stk.end() - 1)->item.end());
uint l = stk.back().level + 1; uint l = stk.back().level + 1;
uint p = stk.back().pos / 2; uint p = stk.back().pos / 2;
stk.pop_back(); stk.pop_back();
stk.pop_back(); stk.pop_back();
stk.push_back (privkey::tree_stk_item stk.push_back (privkey::tree_stk_item
(l, p, hf (Y) ) ); (l, p, hf (Y)));
store_desired (priv, i, stk.back() ); store_desired (priv, i, stk.back());
} }
} }
@ -227,11 +227,11 @@ static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
uint idx = priv.l - i - 1; uint idx = priv.l - i - 1;
//ignore unused top levels //ignore unused top levels
if (idx >= priv.desired.size() ) continue; if (idx >= priv.desired.size()) continue;
//if nothing changed, do nothing //if nothing changed, do nothing
if (! ( (subtree_changes >> (priv.h * (1 + idx) ) ) if (! ( (subtree_changes >> (priv.h * (1 + idx)))
& one_subtree_mask) ) continue; & one_subtree_mask)) continue;
//move desired to exist //move desired to exist
priv.exist[idx] = priv.desired[idx]; priv.exist[idx] = priv.desired[idx];
@ -242,9 +242,9 @@ static void update_privkey (privkey&priv, hash_func&hf, streamcipher&generator)
//if there aren't more desired subtrees on this level, //if there aren't more desired subtrees on this level,
//strip it off. //strip it off.
uint next_subtree_start = uint next_subtree_start =
(1 + (next_sigs_used >> ( (1 + idx) * priv.h) ) ) (1 + (next_sigs_used >> ( (1 + idx) * priv.h)))
<< ( (1 + idx) * priv.h); << ( (1 + idx) * priv.h);
if (next_subtree_start >= ( (uint) 1 << (priv.h * priv.l) ) ) { if (next_subtree_start >= ( (uint) 1 << (priv.h * priv.l))) {
priv.desired.resize (idx); priv.desired.resize (idx);
priv.desired_stack.resize (idx); priv.desired_stack.resize (idx);
priv.desired_progress.resize (idx); priv.desired_progress.resize (idx);
@ -288,23 +288,23 @@ int fmtseq::generate (pubkey&pub, privkey&priv,
uint commitments = fmtseq_commitments (hs); uint commitments = fmtseq_commitments (hs);
std::vector<byte> x, Y; std::vector<byte> x, Y;
x.resize (hf.size() ); x.resize (hf.size());
alloc_exist (priv); alloc_exist (priv);
for (i = 0; i < sigs; ++i) { for (i = 0; i < sigs; ++i) {
//generate commitments and concat publics into Y //generate commitments and concat publics into Y
Y.clear(); Y.clear();
Y.reserve (commitments * hf.size() ); Y.reserve (commitments * hf.size());
prepare_keygen (generator, priv.SK, i); prepare_keygen (generator, priv.SK, i);
for (j = 0; j < commitments; ++j) { for (j = 0; j < commitments; ++j) {
generator.gen (hf.size(), & (x[0]) ); generator.gen (hf.size(), & (x[0]));
x = hf (x); x = hf (x);
Y.insert (Y.end(), x.begin(), x.end() ); Y.insert (Y.end(), x.begin(), x.end());
} }
stk.push_back (privkey::tree_stk_item (0, i, hf (Y) ) ); stk.push_back (privkey::tree_stk_item (0, i, hf (Y)));
store_exist (priv, stk.back() ); store_exist (priv, stk.back());
//try squashing the stack //try squashing the stack
for (;;) { for (;;) {
@ -315,17 +315,17 @@ int fmtseq::generate (pubkey&pub, privkey&priv,
Y.clear(); Y.clear();
Y.insert (Y.end(), Y.insert (Y.end(),
(stk.end() - 2)->item.begin(), (stk.end() - 2)->item.begin(),
(stk.end() - 2)->item.end() ); (stk.end() - 2)->item.end());
Y.insert (Y.end(), Y.insert (Y.end(),
(stk.end() - 1)->item.begin(), (stk.end() - 1)->item.begin(),
(stk.end() - 1)->item.end() ); (stk.end() - 1)->item.end());
uint l = stk.back().level + 1; uint l = stk.back().level + 1;
uint p = stk.back().pos / 2; uint p = stk.back().pos / 2;
stk.pop_back(); stk.pop_back();
stk.pop_back(); stk.pop_back();
stk.push_back (privkey::tree_stk_item stk.push_back (privkey::tree_stk_item
(l, p, hf (Y) ) ); (l, p, hf (Y)));
store_exist (priv, stk.back() ); store_exist (priv, stk.back());
} }
} }
@ -362,13 +362,13 @@ int fmtseq::generate (pubkey&pub, privkey&priv,
int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf, int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
streamcipher&generator) streamcipher&generator)
{ {
if (hash.size() != hash_size() ) return 2; if (hash.size() != hash_size()) return 2;
if (!sigs_remaining() ) { if (!sigs_remaining()) {
err ("fmtseq notice: no signatures left"); err ("fmtseq notice: no signatures left");
return 2; return 2;
} }
if (!check_privkey (*this, hf) ) { if (!check_privkey (*this, hf)) {
err ("fmtseq: mangled privkey"); err ("fmtseq: mangled privkey");
return 3; return 3;
} }
@ -381,20 +381,20 @@ int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
std::vector<byte> Sig, t; std::vector<byte> Sig, t;
uint i; uint i;
t.resize (hf.size() ); t.resize (hf.size());
Sig.reserve (hf.size() * (commitments + h * l) ); Sig.reserve (hf.size() * (commitments + h * l));
//first, compute the commitments and push them to the signature //first, compute the commitments and push them to the signature
prepare_keygen (generator, SK, sigs_used); prepare_keygen (generator, SK, sigs_used);
for (i = 0; i < commitments; ++i) { for (i = 0; i < commitments; ++i) {
//generate x_i //generate x_i
generator.gen (hf.size(), & (t[0]) ); generator.gen (hf.size(), & (t[0]));
//if it's 0, publish y_i, else publish x_i //if it's 0, publish y_i, else publish x_i
if (!M2[i]) t = hf (t); if (!M2[i]) t = hf (t);
//append it to signature //append it to signature
Sig.insert (Sig.end(), t.begin(), t.end() ); Sig.insert (Sig.end(), t.begin(), t.end());
} }
//now retrieve the authentication path //now retrieve the authentication path
@ -407,7 +407,7 @@ int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
expos = (pos ^ 1) % (1 << exlev); expos = (pos ^ 1) % (1 << exlev);
Sig.insert (Sig.end(), Sig.insert (Sig.end(),
exist[exid][expos + (1 << exlev) - 2].begin(), exist[exid][expos + (1 << exlev) - 2].begin(),
exist[exid][expos + (1 << exlev) - 2].end() ); exist[exid][expos + (1 << exlev) - 2].end());
pos >>= 1; pos >>= 1;
} }
@ -418,7 +418,7 @@ int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
//convert to bits //convert to bits
uint sig_no_start = (commitments + h * l) * hf.size() * 8; uint sig_no_start = (commitments + h * l) * hf.size() * 8;
for (i = 0; i < sig_no_start; ++i) for (i = 0; i < sig_no_start; ++i)
sig[i] = 1 & (Sig[i / 8] >> (i % 8) ); sig[i] = 1 & (Sig[i / 8] >> (i % 8));
//append signature number //append signature number
pos = sigs_used; pos = sigs_used;
@ -431,10 +431,10 @@ int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
update_privkey (*this, hf, generator); update_privkey (*this, hf, generator);
//start moaning at around 1% of remaining signatures //start moaning at around 1% of remaining signatures
if (!sigs_remaining() ) if (!sigs_remaining())
err ("fmtseq notice: no signatures left, " err ("fmtseq notice: no signatures left, "
"you should discard this key"); "you should discard this key");
else if (sigs_remaining() <= (uint) (1 << (h * l) ) / 100) else if (sigs_remaining() <= (uint) (1 << (h * l)) / 100)
err ("fmtseq notice: only " << sigs_remaining() err ("fmtseq notice: only " << sigs_remaining()
<< " signatures left, you should certify new keys"); << " signatures left, you should certify new keys");
else else
@ -447,8 +447,8 @@ int privkey::sign (const bvector& hash, bvector& sig, hash_func& hf,
int pubkey::verify (const bvector& sig, const bvector& hash, hash_func& hf) int pubkey::verify (const bvector& sig, const bvector& hash, hash_func& hf)
{ {
uint i, j; uint i, j;
if (sig.size() != signature_size (hf) ) return 2; if (sig.size() != signature_size (hf)) return 2;
if (hash.size() != hash_size() ) return 2; if (hash.size() != hash_size()) return 2;
uint commitments = fmtseq_commitments (hs); uint commitments = fmtseq_commitments (hs);
@ -470,14 +470,14 @@ int pubkey::verify (const bvector& sig, const bvector& hash, hash_func& hf)
Sig[i].resize (hf.size(), 0); Sig[i].resize (hf.size(), 0);
for (j = 0; j < hf.size() * 8; ++j) for (j = 0; j < hf.size() * 8; ++j)
if (sig[j + i * hf.size() * 8]) if (sig[j + i * hf.size() * 8])
Sig[i][j / 8] |= (1 << (j % 8) ); Sig[i][j / 8] |= (1 << (j % 8));
} }
Y.clear(); Y.clear();
for (i = 0; i < commitments; ++i) { for (i = 0; i < commitments; ++i) {
if (M2[i]) t = hf (Sig[i]); //convert pk_i to sk_i at 1's if (M2[i]) t = hf (Sig[i]); //convert pk_i to sk_i at 1's
else t = Sig[i]; //else it should already be pk_i else t = Sig[i]; //else it should already be pk_i
Y.insert (Y.end(), t.begin(), t.end() ); //append it to Y_i Y.insert (Y.end(), t.begin(), t.end()); //append it to Y_i
} }
//create the leaf //create the leaf
@ -489,11 +489,11 @@ int pubkey::verify (const bvector& sig, const bvector& hash, hash_func& hf)
Y = Sig[commitments + i]; Y = Sig[commitments + i];
if ( (sig_no >> i) & 1) { if ( (sig_no >> i) & 1) {
//append path auth from left //append path auth from left
Y.insert (Y.end(), t.begin(), t.end() ); Y.insert (Y.end(), t.begin(), t.end());
t = hf (Y); t = hf (Y);
} else { } else {
//append from right //append from right
t.insert (t.end(), Y.begin(), Y.end() ); t.insert (t.end(), Y.begin(), Y.end());
t = hf (t); t = hf (t);
} }

View file

@ -74,7 +74,7 @@ public:
int sign (const bvector&, bvector&, hash_func&, streamcipher&); int sign (const bvector&, bvector&, hash_func&, streamcipher&);
uint sigs_remaining() { uint sigs_remaining() {
return (1 << (h * l) ) - sigs_used; return (1 << (h * l)) - sigs_used;
} }
uint hash_size () { uint hash_size () {
@ -82,7 +82,7 @@ public:
} }
uint signature_size (hash_func&hf) { uint signature_size (hash_func&hf) {
return ( (h * l + fmtseq_commitments (hs) ) * hf.size() * 8) return ( (h * l + fmtseq_commitments (hs)) * hf.size() * 8)
+ (h * l); + (h * l);
} }
@ -103,7 +103,7 @@ public:
} }
uint signature_size (hash_func&hf) { uint signature_size (hash_func&hf) {
return ( (H + fmtseq_commitments (hs) ) * hf.size() * 8) + H; return ( (H + fmtseq_commitments (hs)) * hf.size() * 8) + H;
} }
sencode* serialize(); sencode* serialize();

View file

@ -36,8 +36,8 @@ uint gf2p_mod (uint a, uint p)
{ {
if (!p) return 0; if (!p) return 0;
int t, degp = gf2p_degree (p); int t, degp = gf2p_degree (p);
while ( (t = gf2p_degree (a) ) >= degp) { while ( (t = gf2p_degree (a)) >= degp) {
a ^= (p << (t - degp) ); a ^= (p << (t - degp));
} }
return a; return a;
} }
@ -98,7 +98,7 @@ bool gf2m::create (uint M)
*/ */
for (uint t = (1 << m) + 1, e = 1 << (m + 1); t < e; t += 2) { for (uint t = (1 << m) + 1, e = 1 << (m + 1); t < e; t += 2) {
if (!is_irreducible_gf2_poly (t) ) continue; if (!is_irreducible_gf2_poly (t)) continue;
//try to prepare log and antilog tables //try to prepare log and antilog tables
log.resize (n, 0); log.resize (n, 0);

View file

@ -42,7 +42,7 @@ public:
} }
inline uint mult (uint a, uint b) { inline uint mult (uint a, uint b) {
if (! (a && b) ) return 0; if (! (a && b)) return 0;
return antilog[ (log[a] + log[b]) % (n - 1)]; return antilog[ (log[a] + log[b]) % (n - 1)];
} }
@ -63,12 +63,12 @@ public:
inline uint inv_square (uint a) { inline uint inv_square (uint a) {
if (!a) return 0; if (!a) return 0;
return antilog[ (2 * (n - 1 - log[a]) ) return antilog[ (2 * (n - 1 - log[a]))
% (n - 1)]; % (n - 1)];
} }
inline uint div (uint a, uint b) { inline uint div (uint a, uint b) {
if (! (a && b) ) return 0; if (! (a && b)) return 0;
return antilog[ (n - 1 - log[b] + log[a]) return antilog[ (n - 1 - log[b] + log[a])
% (n - 1)]; % (n - 1)];
} }

View file

@ -33,7 +33,7 @@ hash_proc::suite_t& hash_proc::suite()
static factoryof<hash_proc,type> type##_var; \ static factoryof<hash_proc,type> type##_var; \
s[to_unicase(name)]=&type##_var; s[to_unicase(name)]=&type##_var;
if (s.empty() ) { if (s.empty()) {
do_hash ("CUBE512", cube512proc); do_hash ("CUBE512", cube512proc);
#if HAVE_CRYPTOPP==1 #if HAVE_CRYPTOPP==1
do_hash ("RIPEMD128", rmd128proc); do_hash ("RIPEMD128", rmd128proc);

View file

@ -46,7 +46,7 @@ public:
virtual ~hash_proc() {} virtual ~hash_proc() {}
void eat (const std::vector<byte>&a) { void eat (const std::vector<byte>&a) {
return eat (& (a[0]), & (a[a.size()]) ); return eat (& (a[0]), & (a[a.size()]));
} }
typedef std::map<std::string, factoryof<hash_proc>*> suite_t; typedef std::map<std::string, factoryof<hash_proc>*> suite_t;

View file

@ -97,8 +97,8 @@ bool hashfile::create (istream&in)
for (hashmap::iterator i = hm.begin(), e = hm.end(); for (hashmap::iterator i = hm.begin(), e = hm.end();
i != e; ++i) i != e; ++i)
i->second->eat (buf); i->second->eat (buf);
else if (in.eof() ) { else if (in.eof()) {
buf.resize (in.gcount() ); buf.resize (in.gcount());
for (hashmap::iterator i = hm.begin(), e = hm.end(); for (hashmap::iterator i = hm.begin(), e = hm.end();
i != e; ++i) { i != e; ++i) {
i->second->eat (buf); i->second->eat (buf);
@ -115,13 +115,13 @@ int hashfile::verify (istream&in)
fill_hashmap (hm_all); fill_hashmap (hm_all);
for (hashes_t::iterator i = hashes.begin(), e = hashes.end(); i != e; ++i) for (hashes_t::iterator i = hashes.begin(), e = hashes.end(); i != e; ++i)
if (hm_all.count (i->first) ) { if (hm_all.count (i->first)) {
hm[i->first] = hm_all[i->first]; hm[i->first] = hm_all[i->first];
hm_all[i->first].forget(); hm_all[i->first].forget();
} }
if (hm.empty() ) { if (hm.empty()) {
err ("notice: no verifiable hash found in hashfile"); err ("notice: no verifiable hash found in hashfile");
return 2; return 2;
} }
@ -138,8 +138,8 @@ int hashfile::verify (istream&in)
for (hashmap::iterator i = hm.begin(), e = hm.end(); for (hashmap::iterator i = hm.begin(), e = hm.end();
i != e; ++i) i != e; ++i)
i->second->eat (buf); i->second->eat (buf);
else if (in.eof() ) { else if (in.eof()) {
buf.resize (in.gcount() ); buf.resize (in.gcount());
for (hashmap::iterator i = hm.begin(), e = hm.end(); for (hashmap::iterator i = hm.begin(), e = hm.end();
i != e; ++i) { i != e; ++i) {
i->second->eat (buf); i->second->eat (buf);
@ -151,12 +151,12 @@ int hashfile::verify (istream&in)
int ok = 0, failed = 0; int ok = 0, failed = 0;
for (hashes_t::iterator i = hashes.begin(), e = hashes.end(); for (hashes_t::iterator i = hashes.begin(), e = hashes.end();
i != e; ++i) { i != e; ++i) {
if (!hm.count (i->first) ) { if (!hm.count (i->first)) {
err ("hash verification: :-/ " err ("hash verification: :-/ "
<< i->first << " not supported"); << i->first << " not supported");
continue; continue;
} }
if (i->second == hm[i->first]->finish() ) { if (i->second == hm[i->first]->finish()) {
++ok; ++ok;
err ("hash verification: ;-) " err ("hash verification: ;-) "
<< i->first << " is GOOD"); << i->first << " is GOOD");

View file

@ -22,8 +22,8 @@ bool redirect_cin (const std::string& fn)
{ {
static std::ifstream alt_cin; static std::ifstream alt_cin;
alt_cin.open (fn.c_str(), std::ios::in | std::ios::binary); alt_cin.open (fn.c_str(), std::ios::in | std::ios::binary);
if (alt_cin.fail() ) return false; if (alt_cin.fail()) return false;
std::cin.rdbuf (alt_cin.rdbuf() ); std::cin.rdbuf (alt_cin.rdbuf());
return true; return true;
} }
@ -31,8 +31,8 @@ bool redirect_cout (const std::string& fn)
{ {
static std::ofstream alt_cout; static std::ofstream alt_cout;
alt_cout.open (fn.c_str(), std::ios::out | std::ios::binary); alt_cout.open (fn.c_str(), std::ios::out | std::ios::binary);
if (alt_cout.fail() ) return false; if (alt_cout.fail()) return false;
std::cout.rdbuf (alt_cout.rdbuf() ); std::cout.rdbuf (alt_cout.rdbuf());
return true; return true;
} }

View file

@ -53,9 +53,9 @@ bool read_all_input (output_seq&data, std::istream&input = std::cin)
input.read (buf, readall_bufsize); input.read (buf, readall_bufsize);
if (input) data.insert (data.end(), buf, if (input) data.insert (data.end(), buf,
buf + readall_bufsize); buf + readall_bufsize);
else if (input.eof() ) { else if (input.eof()) {
data.insert (data.end(), buf, data.insert (data.end(), buf,
buf + input.gcount() ); buf + input.gcount());
return true; return true;
} else return false; } else return false;
} }

View file

@ -42,7 +42,7 @@ std::string keyring::get_keyid (const std::string&pubkey)
std::vector<byte> tmp = std::vector<byte> tmp =
hf (std::vector<byte> hf (std::vector<byte>
(&pubkey[0], (&pubkey[0],
&pubkey[pubkey.length()]) ); &pubkey[pubkey.length()]));
r.resize (tmp.size() * 2, ' '); r.resize (tmp.size() * 2, ' ');
for (size_t i = 0; i < tmp.size(); ++i) { for (size_t i = 0; i < tmp.size(); ++i) {
@ -125,7 +125,7 @@ bool keyring::parse_keypairs (sencode*keypairs, keypair_storage&pairs)
L = dynamic_cast<sencode_list*> (keypairs); L = dynamic_cast<sencode_list*> (keypairs);
if (!L) goto failure; if (!L) goto failure;
if (!L->items.size() ) goto failure; if (!L->items.size()) goto failure;
ID = dynamic_cast<sencode_bytes*> (L->items[0]); ID = dynamic_cast<sencode_bytes*> (L->items[0]);
if (!ID) goto failure; if (!ID) goto failure;
if (ID->b != KEYPAIRS_ID) goto failure; if (ID->b != KEYPAIRS_ID) goto failure;
@ -144,7 +144,7 @@ bool keyring::parse_keypairs (sencode*keypairs, keypair_storage&pairs)
*privkey = dynamic_cast<sencode_bytes*> (entry->items[2]), *privkey = dynamic_cast<sencode_bytes*> (entry->items[2]),
*pubkey = dynamic_cast<sencode_bytes*> (entry->items[3]); *pubkey = dynamic_cast<sencode_bytes*> (entry->items[3]);
if (! (ident && alg && privkey && pubkey) ) goto failure; if (! (ident && alg && privkey && pubkey)) goto failure;
std::string keyid = get_keyid (pubkey->b); std::string keyid = get_keyid (pubkey->b);
sencode *priv, *pub; sencode *priv, *pub;
@ -171,7 +171,7 @@ failure:
sencode* keyring::serialize_keypairs (const keypair_storage&pairs) sencode* keyring::serialize_keypairs (const keypair_storage&pairs)
{ {
sencode_list*L = new sencode_list(); sencode_list*L = new sencode_list();
L->items.push_back (new sencode_bytes (KEYPAIRS_ID) ); L->items.push_back (new sencode_bytes (KEYPAIRS_ID));
for (keypair_storage::const_iterator for (keypair_storage::const_iterator
i = pairs.begin(), e = pairs.end(); i = pairs.begin(), e = pairs.end();
@ -180,8 +180,8 @@ sencode* keyring::serialize_keypairs (const keypair_storage&pairs)
a->items.resize (4); a->items.resize (4);
a->items[0] = new sencode_bytes (i->second.pub.name); a->items[0] = new sencode_bytes (i->second.pub.name);
a->items[1] = new sencode_bytes (i->second.pub.alg); a->items[1] = new sencode_bytes (i->second.pub.alg);
a->items[2] = new sencode_bytes (i->second.privkey->encode() ); a->items[2] = new sencode_bytes (i->second.privkey->encode());
a->items[3] = new sencode_bytes (i->second.pub.key->encode() ); a->items[3] = new sencode_bytes (i->second.pub.key->encode());
L->items.push_back (a); L->items.push_back (a);
} }
@ -198,7 +198,7 @@ bool keyring::parse_pubkeys (sencode* pubkeys, pubkey_storage&pubs)
L = dynamic_cast<sencode_list*> (pubkeys); L = dynamic_cast<sencode_list*> (pubkeys);
if (!L) goto failure; if (!L) goto failure;
if (!L->items.size() ) goto failure; if (!L->items.size()) goto failure;
ID = dynamic_cast<sencode_bytes*> (L->items[0]); ID = dynamic_cast<sencode_bytes*> (L->items[0]);
if (!ID) goto failure; if (!ID) goto failure;
if (ID->b != PUBKEYS_ID) goto failure; if (ID->b != PUBKEYS_ID) goto failure;
@ -217,7 +217,7 @@ bool keyring::parse_pubkeys (sencode* pubkeys, pubkey_storage&pubs)
*alg = dynamic_cast<sencode_bytes*> (entry->items[1]), *alg = dynamic_cast<sencode_bytes*> (entry->items[1]),
*pubkey = dynamic_cast<sencode_bytes*> (entry->items[2]); *pubkey = dynamic_cast<sencode_bytes*> (entry->items[2]);
if (! (ident && alg && pubkey) ) goto failure; if (! (ident && alg && pubkey)) goto failure;
std::string keyid = get_keyid (pubkey->b); std::string keyid = get_keyid (pubkey->b);
sencode*key; sencode*key;
@ -237,7 +237,7 @@ failure:
sencode* keyring::serialize_pubkeys (const pubkey_storage&pubs) sencode* keyring::serialize_pubkeys (const pubkey_storage&pubs)
{ {
sencode_list*L = new sencode_list(); sencode_list*L = new sencode_list();
L->items.push_back (new sencode_bytes (PUBKEYS_ID) ); L->items.push_back (new sencode_bytes (PUBKEYS_ID));
for (pubkey_storage::const_iterator for (pubkey_storage::const_iterator
i = pubs.begin(), e = pubs.end(); i = pubs.begin(), e = pubs.end();
@ -246,7 +246,7 @@ sencode* keyring::serialize_pubkeys (const pubkey_storage&pubs)
a->items.resize (3); a->items.resize (3);
a->items[0] = new sencode_bytes (i->second.name); a->items[0] = new sencode_bytes (i->second.name);
a->items[1] = new sencode_bytes (i->second.alg); a->items[1] = new sencode_bytes (i->second.alg);
a->items[2] = new sencode_bytes (i->second.key->encode() ); a->items[2] = new sencode_bytes (i->second.key->encode());
L->items.push_back (a); L->items.push_back (a);
} }
@ -302,7 +302,7 @@ static bool ensure_empty_sencode_file (const std::string&fn,
const std::string&ident) const std::string&ident)
{ {
struct stat st; struct stat st;
if (stat (fn.c_str(), &st) ) { if (stat (fn.c_str(), &st)) {
if (errno != ENOENT) if (errno != ENOENT)
return false; return false;
@ -316,16 +316,16 @@ static bool ensure_empty_sencode_file (const std::string&fn,
fd = creat (fn.c_str(), S_IRUSR | S_IWUSR); fd = creat (fn.c_str(), S_IRUSR | S_IWUSR);
if (fd < 0) return false; if (fd < 0) return false;
ssize_t res = write (fd, emptyfile.c_str(), ssize_t res = write (fd, emptyfile.c_str(),
emptyfile.length() ); emptyfile.length());
if (close (fd) ) return false; if (close (fd)) return false;
if ( (size_t) res != emptyfile.length() ) return false; if ( (size_t) res != emptyfile.length()) return false;
} else { } else {
if (!S_ISREG (st.st_mode) ) if (!S_ISREG (st.st_mode))
return false; return false;
} }
if (access (fn.c_str(), R_OK | W_OK) ) return false; if (access (fn.c_str(), R_OK | W_OK)) return false;
return true; return true;
} }
@ -334,20 +334,20 @@ static bool prepare_user_dir (const std::string&dir)
{ {
//try to create the directory, continue if it's already there //try to create the directory, continue if it's already there
#ifdef WIN32 #ifdef WIN32
if (mkdir (dir.c_str() ) ) { if (mkdir (dir.c_str())) {
#else #else
if (mkdir (dir.c_str(), 0777) ) { if (mkdir (dir.c_str(), 0777)) {
#endif #endif
if (errno != EEXIST) return false; if (errno != EEXIST) return false;
} }
//and no matter what, verify it's there //and no matter what, verify it's there
struct stat st; struct stat st;
if (stat (dir.c_str(), &st) ) if (stat (dir.c_str(), &st))
return false; return false;
//and is really a directory. //and is really a directory.
if (!S_ISDIR (st.st_mode) ) if (!S_ISDIR (st.st_mode))
return false; return false;
//finally create empty key storages and backups, if not present //finally create empty key storages and backups, if not present
@ -366,10 +366,10 @@ static sencode* file_get_sencode (const std::string&fn,
{ {
//check whether it is a file first //check whether it is a file first
struct stat st; struct stat st;
if (stat (fn.c_str(), &st) ) if (stat (fn.c_str(), &st))
return NULL; return NULL;
if (!S_ISREG (st.st_mode) ) if (!S_ISREG (st.st_mode))
return NULL; return NULL;
//not we got the size, prepare buffer space //not we got the size, prepare buffer space
@ -388,10 +388,10 @@ static bool file_put_string (const std::string&fn, const std::string&data)
{ {
std::ofstream out (fn.c_str(), std::ios::out | std::ios::binary); std::ofstream out (fn.c_str(), std::ios::out | std::ios::binary);
if (!out) return false; if (!out) return false;
out.write (data.c_str(), data.length() ); out.write (data.c_str(), data.length());
if (!out.good() ) return false; if (!out.good()) return false;
out.close(); out.close();
if (!out.good() ) return false; if (!out.good()) return false;
return true; return true;
} }
@ -483,7 +483,7 @@ bool keyring::open()
{ {
//ensure the existence of file structure //ensure the existence of file structure
std::string dir = get_user_dir(); std::string dir = get_user_dir();
if (!prepare_user_dir (dir) ) return false; if (!prepare_user_dir (dir)) return false;
//create the lock //create the lock
std::string fn = dir + LOCK_FILENAME; std::string fn = dir + LOCK_FILENAME;
@ -493,7 +493,7 @@ bool keyring::open()
#ifdef WIN32 #ifdef WIN32
//no locking on windows yet //no locking on windows yet
#else #else
if (flock (lockfd, LOCK_EX) ) { if (flock (lockfd, LOCK_EX)) {
::close (lockfd); ::close (lockfd);
lockfd = -1; lockfd = -1;
return false; return false;
@ -543,7 +543,7 @@ bool keyring::close()
if (lockfd < 0) return true; //nothing to close if (lockfd < 0) return true; //nothing to close
std::string fn = get_user_dir() + LOCK_FILENAME; std::string fn = get_user_dir() + LOCK_FILENAME;
unlink (fn.c_str() ); unlink (fn.c_str());
#ifdef WIN32 #ifdef WIN32
//no locking on windows yet //no locking on windows yet

View file

@ -90,7 +90,7 @@ public:
static std::string get_keyid (const std::string& pubkey); static std::string get_keyid (const std::string& pubkey);
static std::string get_keyid (sencode* pubkey) { static std::string get_keyid (sencode* pubkey) {
return get_keyid (pubkey->encode() ); return get_keyid (pubkey->encode());
} }
static void clear_keypairs (keypair_storage&); static void clear_keypairs (keypair_storage&);
@ -103,8 +103,8 @@ public:
pubkey_entry* get_pubkey (const std::string&keyid) { pubkey_entry* get_pubkey (const std::string&keyid) {
// "own first", but there should not be collisions. // "own first", but there should not be collisions.
if (pairs.count (keyid) ) return & (pairs[keyid].pub); if (pairs.count (keyid)) return & (pairs[keyid].pub);
if (pubs.count (keyid) ) return & (pubs[keyid]); if (pubs.count (keyid)) return & (pubs[keyid]);
return NULL; return NULL;
} }
@ -113,21 +113,21 @@ public:
const std::string&alg, const std::string&alg,
sencode*key) { sencode*key) {
if (pairs.count (keyid) ) return false; if (pairs.count (keyid)) return false;
if (pubs.count (keyid) ) return false; if (pubs.count (keyid)) return false;
pubs[keyid] = pubkey_entry (keyid, name, alg, key); pubs[keyid] = pubkey_entry (keyid, name, alg, key);
return true; return true;
} }
void remove_pubkey (const std::string&keyid) { void remove_pubkey (const std::string&keyid) {
if (pubs.count (keyid) ) { if (pubs.count (keyid)) {
sencode_destroy (pubs[keyid].key); sencode_destroy (pubs[keyid].key);
pubs.erase (keyid); pubs.erase (keyid);
} }
} }
keypair_entry* get_keypair (const std::string&keyid) { keypair_entry* get_keypair (const std::string&keyid) {
if (pairs.count (keyid) ) return & (pairs[keyid]); if (pairs.count (keyid)) return & (pairs[keyid]);
return NULL; return NULL;
} }
@ -136,15 +136,15 @@ public:
const std::string&alg, const std::string&alg,
sencode*pubkey, sencode*privkey) { sencode*pubkey, sencode*privkey) {
if (pairs.count (keyid) ) return false; if (pairs.count (keyid)) return false;
if (pubs.count (keyid) ) return false; if (pubs.count (keyid)) return false;
pairs[keyid] = keypair_entry (keyid, name, alg, pairs[keyid] = keypair_entry (keyid, name, alg,
pubkey, privkey); pubkey, privkey);
return true; return true;
} }
void remove_keypair (const std::string&keyid) { void remove_keypair (const std::string&keyid) {
if (pairs.count (keyid) ) { if (pairs.count (keyid)) {
sencode_destroy (pairs[keyid].pub.key); sencode_destroy (pairs[keyid].pub.key);
sencode_destroy (pairs[keyid].privkey); sencode_destroy (pairs[keyid].privkey);
pairs.erase (keyid); pairs.erase (keyid);

View file

@ -310,13 +310,13 @@ int main (int argc, char**argv)
int exitval = 0; int exitval = 0;
if (input.length() && !redirect_cin (input) ) { if (input.length() && !redirect_cin (input)) {
progerr ("could not open input file"); progerr ("could not open input file");
exitval = 1; exitval = 1;
goto exit; goto exit;
} }
if (output.length() && !redirect_cout (output) ) { if (output.length() && !redirect_cout (output)) {
progerr ("could not redirect to output file"); progerr ("could not redirect to output file");
exitval = 1; exitval = 1;
goto exit; goto exit;
@ -331,7 +331,7 @@ int main (int argc, char**argv)
goto exit; goto exit;
} }
if (symmetric.length() ) switch (action) { if (symmetric.length()) switch (action) {
case 'd': case 'd':
case 'e': case 'e':
case 'g': case 'g':
@ -440,7 +440,7 @@ int main (int argc, char**argv)
*/ */
exit: exit:
if (!KR.close() ) { if (!KR.close()) {
progerr ("could not close keyring, " progerr ("could not close keyring, "
"something weird is going to happen."); "something weird is going to happen.");
} }

View file

@ -80,7 +80,7 @@ bool matrix::compute_inversion (matrix&res, bool upper_tri, bool lower_tri)
//we are computing with transposed matrices for simpler row ops //we are computing with transposed matrices for simpler row ops
uint s = width(); uint s = width();
if (s != height() ) return false; if (s != height()) return false;
matrix m, r; matrix m, r;
r.unit (s); r.unit (s);
this->compute_transpose (m); this->compute_transpose (m);
@ -248,7 +248,7 @@ bool matrix::create_goppa_generator (matrix&g, const permutation&p)
//generator construction from Barreto's PQC-4 slides p.21 //generator construction from Barreto's PQC-4 slides p.21
p.permute (*this, t); p.permute (*this, t);
t.get_right_square (sinv); t.get_right_square (sinv);
if (!sinv.compute_inversion (s) ) return false; //meant to be retried. if (!sinv.compute_inversion (s)) return false; //meant to be retried.
//TODO why multiply and THEN strip? //TODO why multiply and THEN strip?
s.mult (t); s.mult (t);
@ -280,7 +280,7 @@ bool matrix::mult_vec_right (const bvector&a, bvector&r)
r.clear(); r.clear();
r.resize (h, 0); r.resize (h, 0);
for (uint i = 0; i < w; ++i) for (uint i = 0; i < w; ++i)
if (a[i]) r.add (item (i) ); if (a[i]) r.add (item (i));
return true; return true;
} }

View file

@ -41,7 +41,7 @@ public:
} }
uint height() const { uint height() const {
if (size() ) return item (0).size(); if (size()) return item (0).size();
return 0; return 0;
} }

View file

@ -35,7 +35,7 @@ int mce::generate (pubkey&pub, privkey&priv, prng&rng, uint m, uint t)
matrix generator; matrix generator;
for (;;) if (priv.h.create_goppa_generator for (;;) if (priv.h.create_goppa_generator
(generator, priv.hperm, rng) ) break; (generator, priv.hperm, rng)) break;
//scramble matrix //scramble matrix
matrix S; matrix S;
@ -72,8 +72,8 @@ int pubkey::encrypt (const bvector& in, bvector&out, prng&rng)
int pubkey::encrypt (const bvector&in, bvector&out, const bvector&errors) int pubkey::encrypt (const bvector&in, bvector&out, const bvector&errors)
{ {
if (in.size() != plain_size() ) return 2; if (in.size() != plain_size()) return 2;
if (errors.size() != cipher_size() ) return 2; if (errors.size() != cipher_size()) return 2;
G.mult_vecT_left (in, out); G.mult_vecT_left (in, out);
out.add (errors); out.add (errors);
return 0; return 0;
@ -87,7 +87,7 @@ int privkey::decrypt (const bvector&in, bvector&out)
int privkey::decrypt (const bvector&in, bvector&out, bvector&errors) int privkey::decrypt (const bvector&in, bvector&out, bvector&errors)
{ {
if (in.size() != cipher_size() ) return 2; if (in.size() != cipher_size()) return 2;
//remove the P permutation //remove the P permutation
bvector not_permuted; bvector not_permuted;
@ -104,7 +104,7 @@ int privkey::decrypt (const bvector&in, bvector&out, bvector&errors)
compute_goppa_error_locator (synd, fld, g, sqInv, loc); compute_goppa_error_locator (synd, fld, g, sqInv, loc);
bvector ev; bvector ev;
if (!evaluate_error_locator_trace (loc, ev, fld) ) if (!evaluate_error_locator_trace (loc, ev, fld))
return 1; //if decoding somehow failed, fail as well. return 1; //if decoding somehow failed, fail as well.
//correct the errors //correct the errors
@ -115,7 +115,7 @@ int privkey::decrypt (const bvector&in, bvector&out, bvector&errors)
hperm.permute (ev, errors); hperm.permute (ev, errors);
//get rid of redundancy bits //get rid of redundancy bits
not_permuted.resize (plain_size() ); not_permuted.resize (plain_size());
//unscramble the result //unscramble the result
Sinv.mult_vecT_left (not_permuted, out); Sinv.mult_vecT_left (not_permuted, out);
@ -166,14 +166,14 @@ int privkey::sign (const bvector&in, bvector&out, uint delta, uint attempts, prn
synd.to_poly (Synd, fld); synd.to_poly (Synd, fld);
compute_goppa_error_locator (Synd, fld, g, sqInv, loc); compute_goppa_error_locator (Synd, fld, g, sqInv, loc);
if (evaluate_error_locator_trace (loc, e2, fld) ) { if (evaluate_error_locator_trace (loc, e2, fld)) {
//recreate the decodable codeword //recreate the decodable codeword
p.add (e); p.add (e);
p.add (e2); p.add (e2);
hperm.permute (p, e2); //back to systematic hperm.permute (p, e2); //back to systematic
e2.resize (signature_size() ); //strip to message e2.resize (signature_size()); //strip to message
Sinv.mult_vecT_left (e2, out); //signature Sinv.mult_vecT_left (e2, out); //signature
return 0; return 0;
} }
@ -191,9 +191,9 @@ int privkey::sign (const bvector&in, bvector&out, uint delta, uint attempts, prn
int pubkey::verify (const bvector&in, const bvector&hash, uint delta) int pubkey::verify (const bvector&in, const bvector&hash, uint delta)
{ {
bvector tmp; bvector tmp;
if (!G.mult_vecT_left (in, tmp) ) return 2; //wrong size of input if (!G.mult_vecT_left (in, tmp)) return 2; //wrong size of input
if (hash.size() != tmp.size() ) return 1; //wrong size of hash, not a sig. if (hash.size() != tmp.size()) return 1; //wrong size of hash, not a sig.
tmp.add (hash); tmp.add (hash);
if (tmp.hamming_weight() > (t + delta) ) return 1; //not a signature if (tmp.hamming_weight() > (t + delta)) return 1; //not a signature
return 0; //sig OK return 0; //sig OK
} }

View file

@ -27,9 +27,9 @@ int encrypted_msg::encrypt (const bvector&msg,
alg_id = Alg_id; alg_id = Alg_id;
algorithm*alg = NULL; algorithm*alg = NULL;
if (algs.count (alg_id) ) { if (algs.count (alg_id)) {
alg = algs[alg_id]; alg = algs[alg_id];
if (!alg->provides_encryption() ) if (!alg->provides_encryption())
alg = NULL; alg = NULL;
} }
@ -46,9 +46,9 @@ int encrypted_msg::encrypt (const bvector&msg,
int encrypted_msg::decrypt (bvector& msg, algorithm_suite&algs, keyring& kr) int encrypted_msg::decrypt (bvector& msg, algorithm_suite&algs, keyring& kr)
{ {
algorithm*alg = NULL; algorithm*alg = NULL;
if (algs.count (alg_id) ) { if (algs.count (alg_id)) {
alg = algs[alg_id]; alg = algs[alg_id];
if (!alg->provides_encryption() ) if (!alg->provides_encryption())
alg = NULL; alg = NULL;
} }
@ -72,9 +72,9 @@ int signed_msg::sign (const bvector&msg,
message = msg; message = msg;
algorithm*alg = NULL; algorithm*alg = NULL;
if (algs.count (alg_id) ) { if (algs.count (alg_id)) {
alg = algs[alg_id]; alg = algs[alg_id];
if (!alg->provides_signatures() ) if (!alg->provides_signatures())
alg = NULL; alg = NULL;
} }
@ -94,7 +94,7 @@ int signed_msg::sign (const bvector&msg,
if (privkey_dirty) { if (privkey_dirty) {
//we can't output a signature without storing privkey changes! //we can't output a signature without storing privkey changes!
if (!kr.save() ) return 4; if (!kr.save()) return 4;
} }
return 0; return 0;
@ -103,9 +103,9 @@ int signed_msg::sign (const bvector&msg,
int signed_msg::verify (algorithm_suite&algs, keyring&kr) int signed_msg::verify (algorithm_suite&algs, keyring&kr)
{ {
algorithm*alg = NULL; algorithm*alg = NULL;
if (algs.count (alg_id) ) { if (algs.count (alg_id)) {
alg = algs[alg_id]; alg = algs[alg_id];
if (!alg->provides_signatures() ) if (!alg->provides_signatures())
alg = NULL; alg = NULL;
} }

View file

@ -61,14 +61,14 @@ int privkey::prepare ()
int pubkey::encrypt (const bvector& in, bvector&out) int pubkey::encrypt (const bvector& in, bvector&out)
{ {
if (in.size() != plain_size() ) return 1; if (in.size() != plain_size()) return 1;
H.mult_vec_right (in, out); H.mult_vec_right (in, out);
return 0; return 0;
} }
int privkey::decrypt (const bvector&in, bvector&out) int privkey::decrypt (const bvector&in, bvector&out)
{ {
if (in.size() != cipher_size() ) return 2; if (in.size() != cipher_size()) return 2;
bvector unsc; //unscrambled bvector unsc; //unscrambled
Sinv.mult_vec_right (in, unsc); Sinv.mult_vec_right (in, unsc);
@ -78,10 +78,10 @@ int privkey::decrypt (const bvector&in, bvector&out)
compute_goppa_error_locator (synd, fld, g, sqInv, loc); compute_goppa_error_locator (synd, fld, g, sqInv, loc);
bvector ev; bvector ev;
if (!evaluate_error_locator_trace (loc, ev, fld) ) if (!evaluate_error_locator_trace (loc, ev, fld))
return 1; return 1;
if ( (int) ev.hamming_weight() != g.degree() ) if ( (int) ev.hamming_weight() != g.degree())
return 1; return 1;
Pinv.permute (ev, out); Pinv.permute (ev, out);
@ -111,7 +111,7 @@ int privkey::sign (const bvector&in, bvector&out, uint delta, uint attempts, prn
synd_unsc.to_poly (Synd, fld); synd_unsc.to_poly (Synd, fld);
compute_goppa_error_locator (Synd, fld, g, sqInv, loc); compute_goppa_error_locator (Synd, fld, g, sqInv, loc);
if (evaluate_error_locator_trace (loc, e, fld) ) { if (evaluate_error_locator_trace (loc, e, fld)) {
Pinv.permute (e, out); Pinv.permute (e, out);
return 0; return 0;
@ -124,8 +124,8 @@ int privkey::sign (const bvector&in, bvector&out, uint delta, uint attempts, prn
int pubkey::verify (const bvector&in, const bvector&hash, uint delta) int pubkey::verify (const bvector&in, const bvector&hash, uint delta)
{ {
bvector tmp; bvector tmp;
if (!H.mult_vec_right (in, tmp) ) return 2; if (!H.mult_vec_right (in, tmp)) return 2;
if (hash.size() != tmp.size() ) return 1; if (hash.size() != tmp.size()) return 1;
tmp.add (hash); tmp.add (hash);
if (tmp.hamming_weight() > delta) return 1; if (tmp.hamming_weight() > delta) return 1;
return 0; return 0;

View file

@ -46,7 +46,7 @@ void permutation::generate_random (uint size, prng&rng)
void permutation::permute_rows (const matrix&a, matrix&r) const void permutation::permute_rows (const matrix&a, matrix&r) const
{ {
r.resize (a.size() ); r.resize (a.size());
for (uint i = 0; i < a.size(); ++i) permute (a[i], r[i]); for (uint i = 0; i < a.size(); ++i) permute (a[i], r[i]);
} }

View file

@ -45,12 +45,12 @@ public:
} }
template<class A, class R> void permute (const A&a, R&r) const { template<class A, class R> void permute (const A&a, R&r) const {
r.resize (a.size() ); r.resize (a.size());
for (uint i = 0; i < size(); ++i) r[item (i) ] = a[i]; for (uint i = 0; i < size(); ++i) r[item (i) ] = a[i];
} }
template<class A, class R> void permute_inv (const A&a, R&r) const { template<class A, class R> void permute_inv (const A&a, R&r) const {
r.resize (a.size() ); r.resize (a.size());
for (uint i = 0; i < size(); ++i) r[i] = a[item (i)]; for (uint i = 0; i < size(); ++i) r[i] = a[item (i)];
} }
@ -67,9 +67,9 @@ public:
s >>= 1; s >>= 1;
} }
if (sig >= a.size() ) return false; if (sig >= a.size()) return false;
r.resize (a.size() ); r.resize (a.size());
uint i, t, x; uint i, t, x;
for (i = 0; i < a.size(); ++i) { for (i = 0; i < a.size(); ++i) {
@ -78,7 +78,7 @@ public:
//flip the correct bit in signature //flip the correct bit in signature
t = i + 1; t = i + 1;
x = 1; x = 1;
while (! (t & 1) ) { while (! (t & 1)) {
t >>= 1; t >>= 1;
x <<= 1; x <<= 1;
} }

View file

@ -24,7 +24,7 @@
int polynomial::degree() const int polynomial::degree() const
{ {
int r; int r;
for (r = ( (int) size() ) - 1; r >= 0; --r) if (item (r) ) break; for (r = ( (int) size()) - 1; r >= 0; --r) if (item (r)) break;
return r; return r;
} }
@ -35,7 +35,7 @@ void polynomial::strip()
bool polynomial::zero() const bool polynomial::zero() const
{ {
for (uint i = 0; i < size(); ++i) if (item (i) ) return false; for (uint i = 0; i < size(); ++i) if (item (i)) return false;
return true; return true;
} }
@ -48,16 +48,16 @@ bool polynomial::one() const
void polynomial::add (const polynomial&f, gf2m&fld) void polynomial::add (const polynomial&f, gf2m&fld)
{ {
int df = f.degree(); int df = f.degree();
if (df > degree() ) resize (df + 1); if (df > degree()) resize (df + 1);
for (int i = 0; i <= df; ++i) item (i) = fld.add (item (i), f[i]); for (int i = 0; i <= df; ++i) item (i) = fld.add (item (i), f[i]);
} }
void polynomial::add_mult (const polynomial&f, uint mult, gf2m&fld) void polynomial::add_mult (const polynomial&f, uint mult, gf2m&fld)
{ {
int df = f.degree(); int df = f.degree();
if (df > degree() ) resize (df + 1); if (df > degree()) resize (df + 1);
for (int i = 0; i <= df; ++i) for (int i = 0; i <= df; ++i)
item (i) = fld.add (item (i), fld.mult (mult, f[i]) ); item (i) = fld.add (item (i), fld.mult (mult, f[i]));
} }
void polynomial::mod (const polynomial&f, gf2m&fld) void polynomial::mod (const polynomial&f, gf2m&fld)
@ -71,13 +71,13 @@ void polynomial::mod (const polynomial&f, gf2m&fld)
uint hi = fld.inv (f[df]); uint hi = fld.inv (f[df]);
// while there's place to substract, reduce by x^(d-df)-multiply of f // while there's place to substract, reduce by x^(d-df)-multiply of f
for (d = degree(); d >= df; --d) for (d = degree(); d >= df; --d)
if (item (d) ) { if (item (d)) {
uint t = fld.mult (item (d), hi); uint t = fld.mult (item (d), hi);
for (int i = 0; i <= df; ++i) for (int i = 0; i <= df; ++i)
item (i + d - df) item (i + d - df)
= fld.add (item (i + d - df), = fld.add (item (i + d - df),
fld.mult (t, f[i]) ); fld.mult (t, f[i]));
} }
strip(); strip();
} }
@ -90,14 +90,14 @@ void polynomial::mult (const polynomial&b, gf2m&fld)
db = b.degree(); db = b.degree();
clear(); clear();
if ( (da < 0) || (db < 0) ) //multiply by zero, not much to do. if ( (da < 0) || (db < 0)) //multiply by zero, not much to do.
return; return;
resize (da + db + 1, 0); resize (da + db + 1, 0);
for (i = 0; i <= da; ++i) for (i = 0; i <= da; ++i)
if (a[i]) for (j = 0; j <= db; ++j) if (a[i]) for (j = 0; j <= db; ++j)
item (i + j) = fld.add (item (i + j), item (i + j) = fld.add (item (i + j),
fld.mult (a[i], b[j]) ); fld.mult (a[i], b[j]));
} }
polynomial polynomial::gcd (polynomial b, gf2m&fld) polynomial polynomial::gcd (polynomial b, gf2m&fld)
@ -107,9 +107,9 @@ polynomial polynomial::gcd (polynomial b, gf2m&fld)
//eukleides //eukleides
if (a.degree() < 0) return b; if (a.degree() < 0) return b;
for (;;) { for (;;) {
if (b.zero() ) return a; if (b.zero()) return a;
a.mod (b, fld); a.mod (b, fld);
if (a.zero() ) return b; if (a.zero()) return b;
b.mod (a, fld); b.mod (a, fld);
} }
//unreachable //unreachable
@ -152,8 +152,8 @@ void polynomial::generate_random_irreducible (uint s, gf2m&fld, prng& rng)
resize (s + 1); resize (s + 1);
item (s) = 1; //degree s item (s) = 1; //degree s
for (uint i = 0; i < s; ++i) item (i) = rng.random (fld.n); for (uint i = 0; i < s; ++i) item (i) = rng.random (fld.n);
while (!is_irreducible (fld) ) while (!is_irreducible (fld))
item (rng.random (s) ) = rng.random (fld.n); item (rng.random (s)) = rng.random (fld.n);
} }
bool polynomial::compute_square_root_matrix (std::vector<polynomial>&r, bool polynomial::compute_square_root_matrix (std::vector<polynomial>&r,
@ -234,7 +234,7 @@ uint polynomial::eval (uint x, gf2m&fld) const
uint r = 0; uint r = 0;
//horner //horner
for (int i = degree(); i >= 0; --i) for (int i = degree(); i >= 0; --i)
r = fld.add (item (i), fld.mult (r, x) ); r = fld.add (item (i), fld.mult (r, x));
return r; return r;
} }
@ -259,7 +259,7 @@ void polynomial::make_monic (gf2m&fld)
{ {
int d = degree(); int d = degree();
if (d < 0) return; if (d < 0) return;
uint m = fld.inv (item (d) ); uint m = fld.inv (item (d));
for (int i = 0; i <= d; ++i) item (i) = fld.mult (item (i), m); for (int i = 0; i <= d; ++i) item (i) = fld.mult (item (i), m);
} }
@ -284,14 +284,14 @@ void polynomial::sqrt (std::vector<polynomial>& sqInv, gf2m&fld)
for (uint i = 0; i < s; ++i) { for (uint i = 0; i < s; ++i) {
for (uint j = 0; j < s; ++j) { for (uint j = 0; j < s; ++j) {
if (j >= a.size() ) break; if (j >= a.size()) break;
if (i >= sqInv[j].size() ) continue; if (i >= sqInv[j].size()) continue;
item (i) = fld.add (item (i), fld.mult (sqInv[j][i], a[j]) ); item (i) = fld.add (item (i), fld.mult (sqInv[j][i], a[j]));
} }
} }
strip(); strip();
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
item (i) = fld.sq_root (item (i) ); item (i) = fld.sq_root (item (i));
} }
void polynomial::div (polynomial&p, polynomial&m, gf2m&fld) void polynomial::div (polynomial&p, polynomial&m, gf2m&fld)
@ -339,12 +339,12 @@ void polynomial::divmod (polynomial&d, polynomial&res, polynomial&rem, gf2m&fld)
rem = *this; rem = *this;
res.clear(); res.clear();
int t; int t;
while ( (t = rem.degree() ) >= degd) { while ( (t = rem.degree()) >= degd) {
int rp = t - degd; int rp = t - degd;
if ( (int) res.size() < rp + 1) res.resize (rp + 1, 0); if ( (int) res.size() < rp + 1) res.resize (rp + 1, 0);
res[rp] = fld.mult (headInv, rem[t]); res[rp] = fld.mult (headInv, rem[t]);
for (int i = 0; i <= degd; ++i) for (int i = 0; i <= degd; ++i)
rem[i + rp] = fld.add (rem[i + rp], fld.mult (res[rp], d[i]) ); rem[i + rp] = fld.add (rem[i + rp], fld.mult (res[rp], d[i]));
} }
rem.strip(); rem.strip();
} }
@ -377,8 +377,8 @@ void polynomial::ext_euclid (polynomial&a_out, polynomial&b_out,
A.swap (a); A.swap (a);
B.swap (b); B.swap (b);
while ( (j = A.degree() - a.degree() ) >= 0) { while ( (j = A.degree() - a.degree()) >= 0) {
h = fld.div (A.head(), a.head() ); h = fld.div (A.head(), a.head());
tmp = a; tmp = a;
tmp.shift (j); tmp.shift (j);
A.add_mult (tmp, h, fld); A.add_mult (tmp, h, fld);

View file

@ -45,7 +45,7 @@ public:
uint eval (uint, gf2m&) const; uint eval (uint, gf2m&) const;
uint head() { uint head() {
int t; int t;
if ( (t = degree() ) >= 0) return item (t); if ( (t = degree()) >= 0) return item (t);
else return 0; else return 0;
} }
void add (const polynomial&, gf2m&); void add (const polynomial&, gf2m&);

View file

@ -133,7 +133,7 @@ bool qd_to_right_echelon_form (std::vector<std::vector<bvector> >&mat)
l = mat [w - h + i] l = mat [w - h + i]
[j].hamming_weight(); [j].hamming_weight();
if (l == 0) continue; //zero is just okay :] if (l == 0) continue; //zero is just okay :]
if (! (l % 2) ) //singular, make it regular by adding the i-th row if (! (l % 2)) //singular, make it regular by adding the i-th row
for (k = 0; for (k = 0;
k < w; k < w;
++k) ++k)
@ -178,7 +178,7 @@ bool qd_to_right_echelon_form (std::vector<std::vector<bvector> >&mat)
l = mat[w - i - 1] l = mat[w - i - 1]
[h - j - 1].hamming_weight(); [h - j - 1].hamming_weight();
if (l == 0) continue; //already zero if (l == 0) continue; //already zero
if (! (l % 2) ) { //nonsingular, fix it by adding diagonal if (! (l % 2)) { //nonsingular, fix it by adding diagonal
for (k = 0; k < w; ++k) for (k = 0; k < w; ++k)
mat[k][h - j - 1].add mat[k][h - j - 1].add
(mat[k][h - i - 1]); (mat[k][h - i - 1]);
@ -206,7 +206,7 @@ uint choose_random (uint limit, prng&rng, std::set<uint>&used)
if (used.size() >= limit - 1) return 0; //die if (used.size() >= limit - 1) return 0; //die
for (;;) { for (;;) {
uint a = 1 + rng.random (limit - 1); uint a = 1 + rng.random (limit - 1);
if (used.count (a) ) continue; if (used.count (a)) continue;
used.insert (a); used.insert (a);
return a; return a;
} }

View file

@ -33,7 +33,7 @@ streamcipher::suite_t& streamcipher::suite()
static factoryof<streamcipher,type> type##_var; \ static factoryof<streamcipher,type> type##_var; \
s[to_unicase(name)]=&type##_var; s[to_unicase(name)]=&type##_var;
if (s.empty() ) { if (s.empty()) {
do_cipher ("ARCFOUR", arcfour_t); do_cipher ("ARCFOUR", arcfour_t);
do_cipher ("CHACHA20", chacha20); do_cipher ("CHACHA20", chacha20);
do_cipher ("XSYND", xsynd); do_cipher ("XSYND", xsynd);

View file

@ -48,7 +48,7 @@ public:
} }
void load_key_vector (const std::vector<byte>&K) { void load_key_vector (const std::vector<byte>&K) {
load_key (& (K[0]), & (K[K.size()]) ); load_key (& (K[0]), & (K[K.size()]));
} }
typedef std::map<std::string, factoryof<streamcipher>*> suite_t; typedef std::map<std::string, factoryof<streamcipher>*> suite_t;

View file

@ -53,7 +53,7 @@ static void parse_int (const std::string&str, int&pos, int len,
for (;;) { for (;;) {
if (pos >= len) goto fail; //not terminated if (pos >= len) goto fail; //not terminated
else if (str[pos] == 'e') break; //done good else if (str[pos] == 'e') break; //done good
else if ( (str[pos] >= '0') and (str[pos] <= '9') ) //integer else if ( (str[pos] >= '0') and (str[pos] <= '9')) //integer
res = (10 * res) + (unsigned int) (str[pos] - '0'); res = (10 * res) + (unsigned int) (str[pos] - '0');
else goto fail; //something weird! else goto fail; //something weird!
++pos; ++pos;
@ -93,7 +93,7 @@ static void parse_string (const std::string&str, int&pos, int len,
for (;;) { for (;;) {
if (pos >= len) goto fail; if (pos >= len) goto fail;
else if (str[pos] == ':') break; //got it else if (str[pos] == ':') break; //got it
else if ( (str[pos] >= '0') and (str[pos] <= '9') ) //integer else if ( (str[pos] >= '0') and (str[pos] <= '9')) //integer
bytes = (10 * bytes) + (int) (str[pos] - '0'); bytes = (10 * bytes) + (int) (str[pos] - '0');
else goto fail; //weird! else goto fail; //weird!
++pos; ++pos;
@ -132,18 +132,18 @@ sencode* sencode_decode (const std::string& str)
unsigned int res; unsigned int res;
parse_int (str, pos, len, res); parse_int (str, pos, len, res);
if (pos < 0) break; if (pos < 0) break;
stk.push_back (new sencode_int (res) ); stk.push_back (new sencode_int (res));
} else if ( (str[pos] >= '0') && (str[pos] <= '9') ) { } else if ( (str[pos] >= '0') && (str[pos] <= '9')) {
//parse a bytestring //parse a bytestring
std::string res; std::string res;
parse_string (str, pos, len, res); parse_string (str, pos, len, res);
if (pos < 0) break; if (pos < 0) break;
stk.push_back (new sencode_bytes (res) ); stk.push_back (new sencode_bytes (res));
} }
/* if there's nothing on the stack now, it's an error. */ /* if there's nothing on the stack now, it's an error. */
if (stk.empty() ) break; if (stk.empty()) break;
/* reduce stack. (return positively if it would /* reduce stack. (return positively if it would
* get empty and there's nothing more to parse.) */ * get empty and there's nothing more to parse.) */

View file

@ -65,7 +65,7 @@ class sencode_bytes: public sencode
public: public:
std::string b; std::string b;
sencode_bytes (const std::string&s) : b (s) {} sencode_bytes (const std::string&s) : b (s) {}
sencode_bytes (const std::vector<byte>&a) : b (a.begin(), a.end() ) {} sencode_bytes (const std::vector<byte>&a) : b (a.begin(), a.end()) {}
virtual std::string encode(); virtual std::string encode();
}; };

View file

@ -42,7 +42,7 @@
static sencode* serialize_uint_vector (std::vector<uint>*v) static sencode* serialize_uint_vector (std::vector<uint>*v)
{ {
sencode_list*l = new sencode_list; sencode_list*l = new sencode_list;
l->items.resize (v->size() ); l->items.resize (v->size());
for (uint i = 0; i < v->size(); ++i) for (uint i = 0; i < v->size(); ++i)
l->items[i] = new sencode_int ( (*v) [i]); l->items[i] = new sencode_int ( (*v) [i]);
return l; return l;
@ -53,7 +53,7 @@ static bool unserialize_uint_vector (std::vector<uint>*v, sencode*s)
sencode_list* CAST_LIST (s, l); sencode_list* CAST_LIST (s, l);
v->clear(); v->clear();
v->resize (l->items.size() ); v->resize (l->items.size());
for (uint i = 0; i < v->size(); ++i) { for (uint i = 0; i < v->size(); ++i) {
sencode_int*CAST_INT (l->items[i], x); sencode_int*CAST_INT (l->items[i], x);
(*v) [i] = x->i; (*v) [i] = x->i;
@ -67,10 +67,10 @@ sencode* bvector::serialize()
std::string bytes; std::string bytes;
bytes.resize (ss, '\0'); bytes.resize (ss, '\0');
for (uint i = 0; i < size(); ++i) for (uint i = 0; i < size(); ++i)
if (item (i) ) bytes[i / 8] |= 1 << (i % 8); if (item (i)) bytes[i / 8] |= 1 << (i % 8);
sencode_list*l = new sencode_list; sencode_list*l = new sencode_list;
l->items.push_back (new sencode_int (size() ) ); l->items.push_back (new sencode_int (size()));
l->items.push_back (new sencode_bytes (bytes) ); l->items.push_back (new sencode_bytes (bytes));
return l; return l;
} }
@ -81,11 +81,11 @@ bool bvector::unserialize (sencode* s)
if (l->items.size() != 2) return false; if (l->items.size() != 2) return false;
sencode_int*CAST_INT (l->items[0], size); sencode_int*CAST_INT (l->items[0], size);
sencode_bytes*CAST_BYTES (l->items[1], bytes); sencode_bytes*CAST_BYTES (l->items[1], bytes);
if (bytes->b.size() != ( (size->i + 7) / 8) ) return false; if (bytes->b.size() != ( (size->i + 7) / 8)) return false;
clear(); clear();
resize (size->i, 0); resize (size->i, 0);
for (i = 0; i < size->i; ++i) for (i = 0; i < size->i; ++i)
if ( (bytes->b[i / 8] >> (i % 8) ) & 1) if ( (bytes->b[i / 8] >> (i % 8)) & 1)
item (i) = 1; item (i) = 1;
/* /*
@ -93,7 +93,7 @@ bool bvector::unserialize (sencode* s)
* sencode serialization must be bijective * sencode serialization must be bijective
*/ */
for (; i < 8 * bytes->b.size(); ++i) for (; i < 8 * bytes->b.size(); ++i)
if ( (bytes->b[i / 8] >> (i % 8) ) & 1) if ( (bytes->b[i / 8] >> (i % 8)) & 1)
return false; return false;
return true; return true;
@ -106,11 +106,11 @@ sencode* matrix::serialize()
std::string bytes; std::string bytes;
bytes.resize (ss, '\0'); bytes.resize (ss, '\0');
for (uint i = 0; i < bits; ++i) for (uint i = 0; i < bits; ++i)
if (item (i / height(), i % height() ) ) bytes[i / 8] |= 1 << (i % 8); if (item (i / height(), i % height())) bytes[i / 8] |= 1 << (i % 8);
sencode_list*l = new sencode_list; sencode_list*l = new sencode_list;
l->items.push_back (new sencode_int (width() ) ); l->items.push_back (new sencode_int (width()));
l->items.push_back (new sencode_int (height() ) ); l->items.push_back (new sencode_int (height()));
l->items.push_back (new sencode_bytes (bytes) ); l->items.push_back (new sencode_bytes (bytes));
return l; return l;
} }
@ -121,11 +121,11 @@ bool matrix::unserialize (sencode* s)
sencode_int*CAST_INT (l->items[0], w); sencode_int*CAST_INT (l->items[0], w);
sencode_int*CAST_INT (l->items[1], h); sencode_int*CAST_INT (l->items[1], h);
sencode_bytes*CAST_BYTES (l->items[2], bytes); sencode_bytes*CAST_BYTES (l->items[2], bytes);
if (bytes->b.size() != ( ( (h->i * w->i) + 7) / 8) ) return false; if (bytes->b.size() != ( ( (h->i * w->i) + 7) / 8)) return false;
clear(); clear();
resize2 (w->i, h->i, 0); resize2 (w->i, h->i, 0);
for (uint i = 0; i < w->i * h->i; ++i) for (uint i = 0; i < w->i * h->i; ++i)
if ( (bytes->b[i / 8] >> (i % 8) ) & 1) if ( (bytes->b[i / 8] >> (i % 8)) & 1)
item (i / h->i, i % h->i) = 1; item (i / h->i, i % h->i) = 1;
return true; return true;
} }
@ -137,10 +137,10 @@ sencode* permutation::serialize()
bool permutation::unserialize (sencode* s) bool permutation::unserialize (sencode* s)
{ {
if (!unserialize_uint_vector (this, s) ) return false; if (!unserialize_uint_vector (this, s)) return false;
//small sanity check //small sanity check
for (uint i = 0; i < size(); ++i) if (item (i) >= size() ) return false; for (uint i = 0; i < size(); ++i) if (item (i) >= size()) return false;
return true; return true;
} }
@ -188,13 +188,13 @@ bool mce::privkey::unserialize (sencode* s)
if (l->items.size() != 6) return false; if (l->items.size() != 6) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PRIVKEY_IDENT "MCE") ) return false; if (ident->b.compare (PRIVKEY_IDENT "MCE")) return false;
if (! (fld.unserialize (l->items[1]) && if (! (fld.unserialize (l->items[1]) &&
g.unserialize (l->items[2]) && g.unserialize (l->items[2]) &&
hperm.unserialize (l->items[3]) && hperm.unserialize (l->items[3]) &&
Pinv.unserialize (l->items[4]) && Pinv.unserialize (l->items[4]) &&
Sinv.unserialize (l->items[5]) ) ) return false; Sinv.unserialize (l->items[5]))) return false;
return true; return true;
} }
@ -215,12 +215,12 @@ bool mce::pubkey::unserialize (sencode* s)
if (l->items.size() != 3) return false; if (l->items.size() != 3) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PUBKEY_IDENT "MCE") ) return false; if (ident->b.compare (PUBKEY_IDENT "MCE")) return false;
sencode_int*CAST_INT (l->items[0], p); sencode_int*CAST_INT (l->items[0], p);
t = p->i; t = p->i;
if (!G.unserialize (l->items[1]) ) return false; if (!G.unserialize (l->items[1])) return false;
return true; return true;
} }
@ -243,12 +243,12 @@ bool nd::privkey::unserialize (sencode* s)
if (l->items.size() != 5) return false; if (l->items.size() != 5) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PRIVKEY_IDENT "ND") ) return false; if (ident->b.compare (PRIVKEY_IDENT "ND")) return false;
if (! (fld.unserialize (l->items[1]) && if (! (fld.unserialize (l->items[1]) &&
g.unserialize (l->items[2]) && g.unserialize (l->items[2]) &&
Pinv.unserialize (l->items[3]) && Pinv.unserialize (l->items[3]) &&
Sinv.unserialize (l->items[4]) ) ) return false; Sinv.unserialize (l->items[4]))) return false;
return true; return true;
} }
@ -269,12 +269,12 @@ bool nd::pubkey::unserialize (sencode* s)
if (l->items.size() != 3) return false; if (l->items.size() != 3) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PRIVKEY_IDENT "ND") ) return false; if (ident->b.compare (PRIVKEY_IDENT "ND")) return false;
sencode_int*CAST_INT (l->items[1], p); sencode_int*CAST_INT (l->items[1], p);
t = p->i; t = p->i;
if (!H.unserialize (l->items[2]) ) return false; if (!H.unserialize (l->items[2])) return false;
return true; return true;
} }
@ -299,7 +299,7 @@ bool mce_qd::privkey::unserialize (sencode* s)
if (l->items.size() != 7) return false; if (l->items.size() != 7) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PRIVKEY_IDENT "QD-MCE") ) return false; if (ident->b.compare (PRIVKEY_IDENT "QD-MCE")) return false;
sencode_int*CAST_INT (l->items[2], p); sencode_int*CAST_INT (l->items[2], p);
T = p->i; T = p->i;
@ -308,7 +308,7 @@ bool mce_qd::privkey::unserialize (sencode* s)
unserialize_uint_vector (&essence, l->items[3]) && unserialize_uint_vector (&essence, l->items[3]) &&
block_perm.unserialize (l->items[4]) && block_perm.unserialize (l->items[4]) &&
unserialize_uint_vector (&block_perms, l->items[5]) && unserialize_uint_vector (&block_perms, l->items[5]) &&
hperm.unserialize (l->items[6]) ) ) return false; hperm.unserialize (l->items[6]))) return false;
return true; return true;
} }
@ -329,12 +329,12 @@ bool mce_qd::pubkey::unserialize (sencode* s)
if (l->items.size() != 3) return false; if (l->items.size() != 3) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PUBKEY_IDENT "QD-MCE") ) return false; if (ident->b.compare (PUBKEY_IDENT "QD-MCE")) return false;
sencode_int*CAST_INT (l->items[1], p); sencode_int*CAST_INT (l->items[1], p);
T = p->i; T = p->i;
if (!qd_sigs.unserialize (l->items[2]) ) return false; if (!qd_sigs.unserialize (l->items[2])) return false;
return true; return true;
} }
@ -362,7 +362,7 @@ bool fmtseq::privkey::tree_stk_item::unserialize (sencode*s)
pos = p->i; pos = p->i;
sencode_bytes* CAST_BYTES (l->items[2], a); sencode_bytes* CAST_BYTES (l->items[2], a);
item = std::vector<byte> (a->b.begin(), a->b.end() ); item = std::vector<byte> (a->b.begin(), a->b.end());
return true; return true;
@ -403,34 +403,34 @@ sencode* fmtseq::privkey::serialize()
L->items[8] = S = new sencode_list; L->items[8] = S = new sencode_list;
L->items[9] = P = new sencode_list; L->items[9] = P = new sencode_list;
E->items.resize (exist.size() ); E->items.resize (exist.size());
for (i = 0; i < exist.size(); ++i) { for (i = 0; i < exist.size(); ++i) {
sencode_list *t = new sencode_list; sencode_list *t = new sencode_list;
E->items[i] = t; E->items[i] = t;
t->items.resize (exist[i].size() ); t->items.resize (exist[i].size());
for (j = 0; j < exist[i].size(); ++j) for (j = 0; j < exist[i].size(); ++j)
t->items[j] = new sencode_bytes (exist[i][j]); t->items[j] = new sencode_bytes (exist[i][j]);
} }
D->items.resize (desired.size() ); D->items.resize (desired.size());
for (i = 0; i < desired.size(); ++i) { for (i = 0; i < desired.size(); ++i) {
sencode_list *t = new sencode_list; sencode_list *t = new sencode_list;
D->items[i] = t; D->items[i] = t;
t->items.resize (desired[i].size() ); t->items.resize (desired[i].size());
for (j = 0; j < desired[i].size(); ++j) for (j = 0; j < desired[i].size(); ++j)
t->items[j] = new sencode_bytes (desired[i][j]); t->items[j] = new sencode_bytes (desired[i][j]);
} }
S->items.resize (desired_stack.size() ); S->items.resize (desired_stack.size());
for (i = 0; i < desired_stack.size(); ++i) { for (i = 0; i < desired_stack.size(); ++i) {
sencode_list *t = new sencode_list; sencode_list *t = new sencode_list;
S->items[i] = t; S->items[i] = t;
t->items.resize (desired_stack[i].size() ); t->items.resize (desired_stack[i].size());
for (j = 0; j < desired_stack[i].size(); ++j) for (j = 0; j < desired_stack[i].size(); ++j)
t->items[j] = desired_stack[i][j].serialize(); t->items[j] = desired_stack[i][j].serialize();
} }
P->items.resize (desired_progress.size() ); P->items.resize (desired_progress.size());
for (i = 0; i < desired_progress.size(); ++i) for (i = 0; i < desired_progress.size(); ++i)
P->items[i] = new sencode_int (desired_progress[i]); P->items[i] = new sencode_int (desired_progress[i]);
@ -444,13 +444,13 @@ bool fmtseq::privkey::unserialize (sencode*s)
if (L->items.size() != 10) return false; if (L->items.size() != 10) return false;
sencode_bytes*CAST_BYTES (L->items[0], ident); sencode_bytes*CAST_BYTES (L->items[0], ident);
if (ident->b.compare (PRIVKEY_IDENT "FMTSEQ") ) return false; if (ident->b.compare (PRIVKEY_IDENT "FMTSEQ")) return false;
sencode_bytes*B; sencode_bytes*B;
sencode_int*I; sencode_int*I;
CAST_BYTES (L->items[1], B); CAST_BYTES (L->items[1], B);
SK = std::vector<byte> (B->b.begin(), B->b.end() ); SK = std::vector<byte> (B->b.begin(), B->b.end());
CAST_INT (L->items[2], I); CAST_INT (L->items[2], I);
h = I->i; h = I->i;
@ -469,49 +469,49 @@ bool fmtseq::privkey::unserialize (sencode*s)
//exist subtrees //exist subtrees
CAST_LIST (L->items[6], A); CAST_LIST (L->items[6], A);
exist.clear(); exist.clear();
exist.resize (A->items.size() ); exist.resize (A->items.size());
for (i = 0; i < exist.size(); ++i) { for (i = 0; i < exist.size(); ++i) {
sencode_list*CAST_LIST (A->items[i], e); sencode_list*CAST_LIST (A->items[i], e);
exist[i].resize (e->items.size() ); exist[i].resize (e->items.size());
for (j = 0; j < exist[i].size(); ++j) { for (j = 0; j < exist[i].size(); ++j) {
sencode_bytes*CAST_BYTES (e->items[j], item); sencode_bytes*CAST_BYTES (e->items[j], item);
exist[i][j] = std::vector<byte> exist[i][j] = std::vector<byte>
(item->b.begin(), (item->b.begin(),
item->b.end() ); item->b.end());
} }
} }
//desired subtrees //desired subtrees
CAST_LIST (L->items[7], A); CAST_LIST (L->items[7], A);
desired.clear(); desired.clear();
desired.resize (A->items.size() ); desired.resize (A->items.size());
for (i = 0; i < desired.size(); ++i) { for (i = 0; i < desired.size(); ++i) {
sencode_list*CAST_LIST (A->items[i], d); sencode_list*CAST_LIST (A->items[i], d);
desired[i].resize (d->items.size() ); desired[i].resize (d->items.size());
for (j = 0; j < desired[i].size(); ++j) { for (j = 0; j < desired[i].size(); ++j) {
sencode_bytes*CAST_BYTES (d->items[j], item); sencode_bytes*CAST_BYTES (d->items[j], item);
desired[i][j] = std::vector<byte> desired[i][j] = std::vector<byte>
(item->b.begin(), (item->b.begin(),
item->b.end() ); item->b.end());
} }
} }
//desired stacks //desired stacks
CAST_LIST (L->items[8], A); CAST_LIST (L->items[8], A);
desired_stack.clear(); desired_stack.clear();
desired_stack.resize (A->items.size() ); desired_stack.resize (A->items.size());
for (i = 0; i < desired_stack.size(); ++i) { for (i = 0; i < desired_stack.size(); ++i) {
sencode_list*CAST_LIST (A->items[i], d); sencode_list*CAST_LIST (A->items[i], d);
desired_stack[i].resize (d->items.size() ); desired_stack[i].resize (d->items.size());
for (j = 0; j < desired_stack[i].size(); ++j) for (j = 0; j < desired_stack[i].size(); ++j)
if (!desired_stack[i][j].unserialize (d->items[j]) ) if (!desired_stack[i][j].unserialize (d->items[j]))
return false; return false;
} }
//desired progress //desired progress
CAST_LIST (L->items[9], A); CAST_LIST (L->items[9], A);
desired_progress.clear(); desired_progress.clear();
desired_progress.resize (A->items.size() ); desired_progress.resize (A->items.size());
for (i = 0; i < desired_progress.size(); ++i) { for (i = 0; i < desired_progress.size(); ++i) {
CAST_INT (A->items[i], I); CAST_INT (A->items[i], I);
desired_progress[i] = I->i; desired_progress[i] = I->i;
@ -539,7 +539,7 @@ bool fmtseq::pubkey::unserialize (sencode*s)
if (l->items.size() != 4) return false; if (l->items.size() != 4) return false;
sencode_bytes*CAST_BYTES (l->items[0], ident); sencode_bytes*CAST_BYTES (l->items[0], ident);
if (ident->b.compare (PUBKEY_IDENT "FMTSEQ") ) return false; if (ident->b.compare (PUBKEY_IDENT "FMTSEQ")) return false;
sencode_int*p; sencode_int*p;
CAST_INT (l->items[1], p); CAST_INT (l->items[1], p);
@ -549,7 +549,7 @@ bool fmtseq::pubkey::unserialize (sencode*s)
hs = p->i; hs = p->i;
sencode_bytes* CAST_BYTES (l->items[3], a); sencode_bytes* CAST_BYTES (l->items[3], a);
check = std::vector<byte> (a->b.begin(), a->b.end() ); check = std::vector<byte> (a->b.begin(), a->b.end());
return true; return true;
} }
@ -634,7 +634,7 @@ bool signed_msg::unserialize (sencode*s)
sencode* hashfile::serialize() sencode* hashfile::serialize()
{ {
sencode_list*L = new sencode_list(); sencode_list*L = new sencode_list();
L->items.resize (1 + hashes.size() ); L->items.resize (1 + hashes.size());
L->items[0] = new sencode_bytes (HASHFILE_IDENT); L->items[0] = new sencode_bytes (HASHFILE_IDENT);
uint pos = 1; uint pos = 1;
for (hashes_t::iterator i = hashes.begin(), e = hashes.end(); i != e; ++i, ++pos) { for (hashes_t::iterator i = hashes.begin(), e = hashes.end(); i != e; ++i, ++pos) {
@ -666,9 +666,9 @@ bool hashfile::unserialize (sencode*s)
sencode_bytes*CAST_BYTES (hash->items[1], value); sencode_bytes*CAST_BYTES (hash->items[1], value);
//prevent multiple hash entries of same hash //prevent multiple hash entries of same hash
if (hashes.count (name->b) ) return false; if (hashes.count (name->b)) return false;
hashes[name->b] = std::vector<byte> (value->b.begin(), value->b.end() ); hashes[name->b] = std::vector<byte> (value->b.begin(), value->b.end());
} }
return true; return true;
@ -699,7 +699,7 @@ sencode* symkey::serialize()
std::set<std::string>::iterator i, e; std::set<std::string>::iterator i, e;
LL = new sencode_list(); LL = new sencode_list();
LL->items.resize (ciphers.size() ); LL->items.resize (ciphers.size());
k = 0; k = 0;
for (i = ciphers.begin(), e = ciphers.end(); for (i = ciphers.begin(), e = ciphers.end();
i != e; ++i) i != e; ++i)
@ -707,7 +707,7 @@ sencode* symkey::serialize()
L->items[1] = LL; L->items[1] = LL;
LL = new sencode_list(); LL = new sencode_list();
LL->items.resize (hashes.size() ); LL->items.resize (hashes.size());
k = 0; k = 0;
for (i = hashes.begin(), e = hashes.end(); for (i = hashes.begin(), e = hashes.end();
i != e; ++i) i != e; ++i)
@ -734,7 +734,7 @@ bool symkey::unserialize (sencode*s)
CAST_BYTES (L->items[4], B); CAST_BYTES (L->items[4], B);
key.clear(); key.clear();
key.insert (key.begin(), B->b.begin(), B->b.end() ); key.insert (key.begin(), B->b.begin(), B->b.end());
sencode_list*LL; sencode_list*LL;
uint i; uint i;
@ -743,7 +743,7 @@ bool symkey::unserialize (sencode*s)
ciphers.clear(); ciphers.clear();
for (i = 0; i < LL->items.size(); ++i) { for (i = 0; i < LL->items.size(); ++i) {
CAST_BYTES (LL->items[i], B); CAST_BYTES (LL->items[i], B);
if (ciphers.count (B->b) ) return false; if (ciphers.count (B->b)) return false;
ciphers.insert (B->b); ciphers.insert (B->b);
} }
@ -751,7 +751,7 @@ bool symkey::unserialize (sencode*s)
hashes.clear(); hashes.clear();
for (i = 0; i < LL->items.size(); ++i) { for (i = 0; i < LL->items.size(); ++i) {
CAST_BYTES (LL->items[i], B); CAST_BYTES (LL->items[i], B);
if (hashes.count (B->b) ) return false; if (hashes.count (B->b)) return false;
hashes.insert (B->b); hashes.insert (B->b);
} }

View file

@ -35,10 +35,10 @@ public:
std::vector<byte> operator() (const std::vector<byte>&a) { std::vector<byte> operator() (const std::vector<byte>&a) {
std::vector<byte> r; std::vector<byte> r;
r.resize (size() ); r.resize (size());
shatype().CalculateDigest (& (r[0]), shatype().CalculateDigest (& (r[0]),
& (a[0]), & (a[0]),
a.size() ); a.size());
return r; return r;
} }
}; };
@ -66,8 +66,8 @@ public:
std::vector<byte> finish() { std::vector<byte> finish() {
std::vector<byte> r; std::vector<byte> r;
r.resize (size() ); r.resize (size());
state.Final (& (r[0]) ); state.Final (& (r[0]));
return r; return r;
} }
}; };

View file

@ -26,9 +26,9 @@ bool algorithm_name_matches (const std::string& search,
const std::string&name) const std::string&name)
{ {
if (search.length() > name.length() ) return false; if (search.length() > name.length()) return false;
for (size_t i = 0; i < search.length(); ++i) for (size_t i = 0; i < search.length(); ++i)
if (tolower (search[i]) != tolower (name[i]) ) return false; if (tolower (search[i]) != tolower (name[i])) return false;
return true; return true;
} }
@ -43,11 +43,11 @@ bool keyspec_matches (const std::string&search,
const std::string&name, const std::string&name,
const std::string&keyid) const std::string&keyid)
{ {
if (!search.length() ) return true; if (!search.length()) return true;
if (search[0] == '@') { //match for keyID if (search[0] == '@') { //match for keyID
if (search.length() > keyid.length() + 1) return false; if (search.length() > keyid.length() + 1) return false;
for (size_t i = 1; i < search.length(); ++i) for (size_t i = 1; i < search.length(); ++i)
if (tolower (search[i] != tolower (keyid[i - 1]) ) ) if (tolower (search[i] != tolower (keyid[i - 1])))
return false; return false;
return true; return true;
} }

View file

@ -42,14 +42,14 @@ bool symkey::create (const std::string&in, prng&rng)
uint keysize = 32; uint keysize = 32;
std::stringstream ss (in); std::stringstream ss (in);
std::string tok; std::string tok;
while (getline (ss, tok, ',') ) { while (getline (ss, tok, ',')) {
tok = to_unicase (tok); tok = to_unicase (tok);
if (tok == "SHORTBLOCK") blocksize = 1024; if (tok == "SHORTBLOCK") blocksize = 1024;
else if (tok == "LONGBLOCK") blocksize = 64 * 1024 * 1024; else if (tok == "LONGBLOCK") blocksize = 64 * 1024 * 1024;
else if (tok == "LONGKEY") keysize = 512; //overkill ;] else if (tok == "LONGKEY") keysize = 512; //overkill ;]
else if (streamcipher::suite().count (tok) ) else if (streamcipher::suite().count (tok))
ciphers.insert (tok); ciphers.insert (tok);
else if (hash_proc::suite().count (tok) ) else if (hash_proc::suite().count (tok))
hashes.insert (tok); hashes.insert (tok);
else { else {
err ("symkey: unknown token: " << tok); err ("symkey: unknown token: " << tok);
@ -63,7 +63,7 @@ bool symkey::create (const std::string&in, prng&rng)
i != e; ++i) { i != e; ++i) {
instanceof<streamcipher> sc instanceof<streamcipher> sc
(streamcipher::suite() [*i]->get() ); (streamcipher::suite() [*i]->get());
sc.collect(); sc.collect();
if (sc->key_size() > keysize) keysize = sc->key_size(); if (sc->key_size() > keysize) keysize = sc->key_size();
} }
@ -73,7 +73,7 @@ bool symkey::create (const std::string&in, prng&rng)
key.resize (keysize); key.resize (keysize);
for (uint i = 0; i < keysize; ++i) key[i] = rng.random (256); for (uint i = 0; i < keysize; ++i) key[i] = rng.random (256);
if (!is_valid() ) { if (!is_valid()) {
err ("symkey: failed to produce valid symmetric key"); err ("symkey: failed to produce valid symmetric key");
err ("symkey: check that at least one hash and cipher is used"); err ("symkey: check that at least one hash and cipher is used");
return false; return false;
@ -87,7 +87,7 @@ typedef std::list<instanceof<hash_proc> > hashes_t;
bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng) bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
{ {
if (!is_valid() ) return false; if (!is_valid()) return false;
/* /*
* structure of symmetrically encrypted file: * structure of symmetrically encrypted file:
@ -103,7 +103,7 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
*/ */
std::vector<byte> otkey; std::vector<byte> otkey;
otkey.resize (key.size() ); otkey.resize (key.size());
for (uint i = 0; i < otkey.size(); ++i) otkey[i] = rng.random (256); for (uint i = 0; i < otkey.size(); ++i) otkey[i] = rng.random (256);
/* /*
@ -114,11 +114,11 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
for (std::set<std::string>::iterator for (std::set<std::string>::iterator
i = ciphers.begin(), e = ciphers.end(); i = ciphers.begin(), e = ciphers.end();
i != e; ++i) { i != e; ++i) {
if (!streamcipher::suite().count (*i) ) { if (!streamcipher::suite().count (*i)) {
err ("symkey: unsupported cipher: " << *i); err ("symkey: unsupported cipher: " << *i);
return false; return false;
} }
scs.push_back (streamcipher::suite() [*i]->get() ); scs.push_back (streamcipher::suite() [*i]->get());
scs.back().collect(); scs.back().collect();
scs.back()->init(); scs.back()->init();
scs.back()->load_key_vector (key); scs.back()->load_key_vector (key);
@ -135,11 +135,11 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
for (std::set<std::string>::iterator for (std::set<std::string>::iterator
i = hashes.begin(), e = hashes.end(); i = hashes.begin(), e = hashes.end();
i != e; ++i) { i != e; ++i) {
if (!hash_proc::suite().count (*i) ) { if (!hash_proc::suite().count (*i)) {
err ("symkey: unsupported hash function: " << *i); err ("symkey: unsupported hash function: " << *i);
return false; return false;
} }
hs.push_back (hash_proc::suite() [*i]->get() ); hs.push_back (hash_proc::suite() [*i]->get());
hs.back().collect(); hs.back().collect();
hashes_size += hs.back()->size(); hashes_size += hs.back()->size();
@ -149,7 +149,7 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
* output the onetime key * output the onetime key
*/ */
out.write ( (char*) & (otkey[0]), otkey.size() ); out.write ( (char*) & (otkey[0]), otkey.size());
/* /*
* process the blocks * process the blocks
@ -157,13 +157,13 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
std::vector<byte>buf, cipbuf; std::vector<byte>buf, cipbuf;
buf.resize (blocksize + hashes_size); buf.resize (blocksize + hashes_size);
cipbuf.resize (buf.size() ); cipbuf.resize (buf.size());
for (;;) { for (;;) {
in.read ( (char*) & (buf[0]), blocksize); in.read ( (char*) & (buf[0]), blocksize);
uint bytes_read = in.gcount(); uint bytes_read = in.gcount();
if (!in && !in.eof() ) { if (!in && !in.eof()) {
err ("symkey: failed reading input"); err ("symkey: failed reading input");
return false; return false;
} }
@ -174,7 +174,7 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
i != e; ++i) { i != e; ++i) {
hash_proc&hp = **i; hash_proc&hp = **i;
hp.init(); hp.init();
hp.eat (& (buf[0]), & (buf[bytes_read]) ); hp.eat (& (buf[0]), & (buf[bytes_read]));
hp.eat (key); hp.eat (key);
hp.eat (otkey); hp.eat (otkey);
std::vector<byte> res = hp.finish(); std::vector<byte> res = hp.finish();
@ -187,7 +187,7 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
for (scs_t::iterator i = scs.begin(), e = scs.end(); for (scs_t::iterator i = scs.begin(), e = scs.end();
i != e; ++i) { i != e; ++i) {
streamcipher&sc = **i; streamcipher&sc = **i;
sc.gen (hashpos, & (cipbuf[0]) ); sc.gen (hashpos, & (cipbuf[0]));
for (uint j = 0; j < hashpos; ++j) for (uint j = 0; j < hashpos; ++j)
buf[j] = buf[j] ^ cipbuf[j]; buf[j] = buf[j] ^ cipbuf[j];
} }
@ -208,16 +208,16 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
int symkey::decrypt (std::istream&in, std::ostream&out) int symkey::decrypt (std::istream&in, std::ostream&out)
{ {
if (!is_valid() ) return 1; if (!is_valid()) return 1;
std::vector<byte> otkey; std::vector<byte> otkey;
otkey.resize (key.size() ); otkey.resize (key.size());
/* /*
* read otkey * read otkey
*/ */
in.read ( (char*) & (otkey[0]), otkey.size() ); in.read ( (char*) & (otkey[0]), otkey.size());
if (in.gcount() != (std::streamsize) otkey.size() || !in) { if (in.gcount() != (std::streamsize) otkey.size() || !in) {
err ("symkey: failed reading input"); err ("symkey: failed reading input");
return 1; return 1;
@ -231,11 +231,11 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
for (std::set<std::string>::iterator for (std::set<std::string>::iterator
i = ciphers.begin(), e = ciphers.end(); i = ciphers.begin(), e = ciphers.end();
i != e; ++i) { i != e; ++i) {
if (!streamcipher::suite().count (*i) ) { if (!streamcipher::suite().count (*i)) {
err ("symkey: unsupported cipher: " << *i); err ("symkey: unsupported cipher: " << *i);
return 1; return 1;
} }
scs.push_back (streamcipher::suite() [*i]->get() ); scs.push_back (streamcipher::suite() [*i]->get());
scs.back().collect(); scs.back().collect();
scs.back()->init(); scs.back()->init();
scs.back()->load_key_vector (key); scs.back()->load_key_vector (key);
@ -252,11 +252,11 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
for (std::set<std::string>::iterator for (std::set<std::string>::iterator
i = hashes.begin(), e = hashes.end(); i = hashes.begin(), e = hashes.end();
i != e; ++i) { i != e; ++i) {
if (!hash_proc::suite().count (*i) ) { if (!hash_proc::suite().count (*i)) {
err ("symkey: unsupported hash function: " << *i); err ("symkey: unsupported hash function: " << *i);
return 1; return 1;
} }
hs.push_back (hash_proc::suite() [*i]->get() ); hs.push_back (hash_proc::suite() [*i]->get());
hs.back().collect(); hs.back().collect();
hashes_size += hs.back()->size(); hashes_size += hs.back()->size();
@ -268,13 +268,13 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
std::vector<byte> buf, cipbuf; std::vector<byte> buf, cipbuf;
buf.resize (blocksize + hashes_size); buf.resize (blocksize + hashes_size);
cipbuf.resize (buf.size() ); cipbuf.resize (buf.size());
for (;;) { for (;;) {
in.read ( (char*) & (buf[0]), buf.size() ); in.read ( (char*) & (buf[0]), buf.size());
uint bytes_read = in.gcount(); uint bytes_read = in.gcount();
if ( (!in && !in.eof() ) || bytes_read < hashes_size) { if ( (!in && !in.eof()) || bytes_read < hashes_size) {
err ("symkey: failed reading input"); err ("symkey: failed reading input");
return 1; return 1;
} }
@ -283,7 +283,7 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
for (scs_t::iterator i = scs.begin(), e = scs.end(); for (scs_t::iterator i = scs.begin(), e = scs.end();
i != e; ++i) { i != e; ++i) {
streamcipher&sc = **i; streamcipher&sc = **i;
sc.gen (bytes_read, & (cipbuf[0]) ); sc.gen (bytes_read, & (cipbuf[0]));
for (uint j = 0; j < bytes_read; ++j) for (uint j = 0; j < bytes_read; ++j)
buf[j] = buf[j] ^ cipbuf[j]; buf[j] = buf[j] ^ cipbuf[j];
} }
@ -296,7 +296,7 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
i != e; ++i) { i != e; ++i) {
hash_proc&hp = **i; hash_proc&hp = **i;
hp.init(); hp.init();
hp.eat (& (buf[0]), & (buf[bytes_read]) ); hp.eat (& (buf[0]), & (buf[bytes_read]));
hp.eat (key); hp.eat (key);
hp.eat (otkey); hp.eat (otkey);
std::vector<byte> res = hp.finish(); std::vector<byte> res = hp.finish();
@ -315,7 +315,7 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
} }
//did we read whole input? //did we read whole input?
if (!in.eof() ) { if (!in.eof()) {
err ("symkey: failed reading input"); err ("symkey: failed reading input");
return 1; return 1;
} }

View file

@ -46,7 +46,7 @@ static void xsynd_multiply (const uint64_t*A, const uint64_t*X, uint64_t*Y)
>> brot) >> brot)
| |
(A[qcoff + ( (j + wrot + 1) % 16)] (A[qcoff + ( (j + wrot + 1) % 16)]
<< (64 - brot) ) << (64 - brot))
); );
} }
} }