prevent mangling user output by correct escapes
+ some code cleaning
This commit is contained in:
parent
1d2197ca02
commit
dabb8fe1a1
126
src/actions.cpp
126
src/actions.cpp
|
@ -108,15 +108,20 @@ algspectable_t& algspectable()
|
||||||
static bool init = false;
|
static bool init = false;
|
||||||
|
|
||||||
if (!init) {
|
if (!init) {
|
||||||
table["enc"] = "MCEQCMDPC128FO-CUBE256-CHACHA20";
|
table["ENC"] = "MCEQCMDPC128FO-CUBE256-CHACHA20";
|
||||||
table["enc-256"] = "MCEQCMDPC256FO-CUBE512-CHACHA20";
|
table["ENC-256"] = "MCEQCMDPC256FO-CUBE512-CHACHA20";
|
||||||
|
|
||||||
table["sig"] = "FMTSEQ128C-CUBE256-CUBE128";
|
table["SIG"] = "FMTSEQ128C-CUBE256-CUBE128";
|
||||||
table["sig-192"] = "FMTSEQ192C-CUBE384-CUBE192";
|
table["SIG-192"] = "FMTSEQ192C-CUBE384-CUBE192";
|
||||||
table["sig-256"] = "FMTSEQ256C-CUBE512-CUBE256";
|
table["SIG-256"] = "FMTSEQ256C-CUBE512-CUBE256";
|
||||||
|
|
||||||
table["sym"] = "chacha20,sha256";
|
#if HAVE_CRYPTOPP==1
|
||||||
table["sym-combined"] = "chacha20,xsynd,arcfour,cube512,sha512";
|
table["SYM"] = "CHACHA20,SHA256";
|
||||||
|
table["SYM-COMBINED"] = "CHACHA20,XSYND,ARCFOUR,CUBE512,SHA512";
|
||||||
|
#else
|
||||||
|
table["SYM"] = "CHACHA20,CUBE512";
|
||||||
|
table["SYM-COMBINED"] = "CHACHA20,XSYND,ARCFOUR,CUBE512";
|
||||||
|
#endif
|
||||||
|
|
||||||
init = true;
|
init = true;
|
||||||
}
|
}
|
||||||
|
@ -128,10 +133,12 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
|
||||||
const std::string&symmetric, bool armor,
|
const std::string&symmetric, bool armor,
|
||||||
keyring&KR, algorithm_suite&AS)
|
keyring&KR, algorithm_suite&AS)
|
||||||
{
|
{
|
||||||
if (p_algspec == "help") {
|
std::string algspec = to_unicase (p_algspec);
|
||||||
|
|
||||||
|
if (algspec == "HELP") {
|
||||||
//provide overview of algorithms available
|
//provide overview of algorithms available
|
||||||
err ("available algorithms: "
|
err ("available algorithms: "
|
||||||
"([S]ig., [E]nc., sym. [C]ipher, [H]ash) ");
|
"([S]ig., [E]nc., sym. [C]ipher, [H]ash)");
|
||||||
std::string tag;
|
std::string tag;
|
||||||
for (algorithm_suite::iterator i = AS.begin(), e = AS.end();
|
for (algorithm_suite::iterator i = AS.begin(), e = AS.end();
|
||||||
i != e; ++i) {
|
i != e; ++i) {
|
||||||
|
@ -153,21 +160,25 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
|
||||||
i != hash_proc::suite().end(); ++i)
|
i != hash_proc::suite().end(); ++i)
|
||||||
out (" H\t" << i->first);
|
out (" H\t" << i->first);
|
||||||
|
|
||||||
err ("following aliases are available for convenience: ");
|
err ("\nfollowing aliases are available for convenience:");
|
||||||
for (algspectable_t::iterator i = algspectable().begin(),
|
for (algspectable_t::iterator i = algspectable().begin(),
|
||||||
e = algspectable().end();
|
e = algspectable().end();
|
||||||
i != e; ++i)
|
i != e; ++i)
|
||||||
err (i->first << " = " << i->second);
|
err (i->first << " = " << i->second);
|
||||||
|
|
||||||
|
err ("\nfollowing modifiers are available for symmetric keys:");
|
||||||
|
err ("SHORTBLOCK 1KiB blocks instead of default 1MiB"
|
||||||
|
" (for small files)");
|
||||||
|
err ("LONGBLOCK 64MiB blocks");
|
||||||
|
err ("LONGKEY 512B of key seed instead of default 64B"
|
||||||
|
" (paranoid)");
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
//replace algorithm name on match with alias
|
//replace algorithm name on match with alias
|
||||||
std::string algspec;
|
if (algspectable().count (algspec))
|
||||||
if (algspectable().count (p_algspec))
|
algspec = algspectable() [algspec];
|
||||||
algspec = algspectable() [p_algspec];
|
|
||||||
else
|
|
||||||
algspec = p_algspec;
|
|
||||||
|
|
||||||
//handle symmetric operation
|
//handle symmetric operation
|
||||||
if (symmetric.length())
|
if (symmetric.length())
|
||||||
|
@ -182,8 +193,8 @@ int action_gen_key (const std::string& p_algspec, const std::string&name,
|
||||||
algname = i->first;
|
algname = i->first;
|
||||||
alg = i->second;
|
alg = i->second;
|
||||||
} else {
|
} else {
|
||||||
err ("error: algorithm name `" << algspec
|
err ("error: algorithm name "
|
||||||
<< "' matches multiple algorithms");
|
"matches multiple algorithms");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -505,7 +516,7 @@ int action_decrypt (bool armor, const std::string&symmetric,
|
||||||
if ( (!AS.count (msg.alg_id))
|
if ( (!AS.count (msg.alg_id))
|
||||||
|| (!AS[msg.alg_id]->provides_encryption())) {
|
|| (!AS[msg.alg_id]->provides_encryption())) {
|
||||||
err ("error: decryption algorithm unsupported");
|
err ("error: decryption algorithm unsupported");
|
||||||
err ("info: requires algorithm " << msg.alg_id
|
err ("info: requires algorithm " << escape_output (msg.alg_id)
|
||||||
<< " with encryption support");
|
<< " with encryption support");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
@ -525,9 +536,10 @@ int action_decrypt (bool armor, const std::string&symmetric,
|
||||||
|
|
||||||
//SEEMS OKAY, let's print some info.
|
//SEEMS OKAY, let's print some info.
|
||||||
err ("incoming encrypted message details:");
|
err ("incoming encrypted message details:");
|
||||||
err (" algorithm: " << msg.alg_id);
|
err (" algorithm: " << escape_output (msg.alg_id));
|
||||||
err (" recipient: @" << msg.key_id);
|
err (" recipient: @" << msg.key_id);
|
||||||
err (" recipient local name: `" << kpe->pub.name << "'");
|
err (" recipient local name: `" <<
|
||||||
|
escape_output (kpe->pub.name) << "'");
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* because there's no possibility to distinguish encrypted from
|
* because there's no possibility to distinguish encrypted from
|
||||||
|
@ -989,7 +1001,7 @@ int action_verify (bool armor, const std::string&detach,
|
||||||
if ( (!AS.count (msg.alg_id))
|
if ( (!AS.count (msg.alg_id))
|
||||||
|| (!AS[msg.alg_id]->provides_signatures())) {
|
|| (!AS[msg.alg_id]->provides_signatures())) {
|
||||||
err ("error: verification algorithm unsupported");
|
err ("error: verification algorithm unsupported");
|
||||||
err ("info: requires algorithm " << msg.alg_id
|
err ("info: requires algorithm " << escape_output (msg.alg_id)
|
||||||
<< " with signature support");
|
<< " with signature support");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
@ -998,9 +1010,9 @@ int action_verify (bool armor, const std::string&detach,
|
||||||
int r = msg.verify (AS, KR);
|
int r = msg.verify (AS, KR);
|
||||||
|
|
||||||
err ("incoming signed message details:");
|
err ("incoming signed message details:");
|
||||||
err (" algorithm: " << msg.alg_id);
|
err (" algorithm: " << escape_output (msg.alg_id));
|
||||||
err (" signed by: @" << msg.key_id);
|
err (" signed by: @" << msg.key_id);
|
||||||
err (" signed local name: `" << pke->name << "'");
|
err (" signed local name: `" << escape_output (pke->name) << "'");
|
||||||
err (" verification status: "
|
err (" verification status: "
|
||||||
<< (r == 0 ?
|
<< (r == 0 ?
|
||||||
"GOOD signature ;-)" :
|
"GOOD signature ;-)" :
|
||||||
|
@ -1200,7 +1212,7 @@ int action_decrypt_verify (bool armor, bool yes,
|
||||||
if ( (!AS.count (emsg.alg_id))
|
if ( (!AS.count (emsg.alg_id))
|
||||||
|| (!AS[emsg.alg_id]->provides_encryption())) {
|
|| (!AS[emsg.alg_id]->provides_encryption())) {
|
||||||
err ("error: decryption algorithm unsupported");
|
err ("error: decryption algorithm unsupported");
|
||||||
err ("info: requires algorithm " << emsg.alg_id
|
err ("info: requires algorithm " << escape_output (emsg.alg_id)
|
||||||
<< " with encryption support");
|
<< " with encryption support");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
@ -1218,9 +1230,10 @@ int action_decrypt_verify (bool armor, bool yes,
|
||||||
|
|
||||||
//looks okay, print decryption status
|
//looks okay, print decryption status
|
||||||
err ("incoming encrypted message details:");
|
err ("incoming encrypted message details:");
|
||||||
err (" algorithm: " << emsg.alg_id);
|
err (" algorithm: " << escape_output (emsg.alg_id));
|
||||||
err (" recipient: @" << emsg.key_id);
|
err (" recipient: @" << emsg.key_id);
|
||||||
err (" recipient local name: `" << kpe->pub.name << "'");
|
err (" recipient local name: `" <<
|
||||||
|
escape_output (kpe->pub.name) << "'");
|
||||||
|
|
||||||
//continue with verification
|
//continue with verification
|
||||||
M = sencode_decode (data);
|
M = sencode_decode (data);
|
||||||
|
@ -1262,7 +1275,7 @@ int action_decrypt_verify (bool armor, bool yes,
|
||||||
if ( (!AS.count (smsg.alg_id))
|
if ( (!AS.count (smsg.alg_id))
|
||||||
|| (!AS[smsg.alg_id]->provides_signatures())) {
|
|| (!AS[smsg.alg_id]->provides_signatures())) {
|
||||||
err ("error: verification algorithm unsupported");
|
err ("error: verification algorithm unsupported");
|
||||||
err ("info: requires algorithm " << smsg.alg_id
|
err ("info: requires algorithm " << escape_output (smsg.alg_id)
|
||||||
<< " with signature support");
|
<< " with signature support");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
@ -1271,9 +1284,9 @@ int action_decrypt_verify (bool armor, bool yes,
|
||||||
int r = smsg.verify (AS, KR);
|
int r = smsg.verify (AS, KR);
|
||||||
|
|
||||||
err ("incoming signed message details:");
|
err ("incoming signed message details:");
|
||||||
err (" algorithm: " << smsg.alg_id);
|
err (" algorithm: " << escape_output (smsg.alg_id));
|
||||||
err (" signed by: @" << smsg.key_id);
|
err (" signed by: @" << smsg.key_id);
|
||||||
err (" signed local name: `" << pke->name << "'");
|
err (" signed local name: `" << escape_output (pke->name) << "'");
|
||||||
err (" verification status: "
|
err (" verification status: "
|
||||||
<< (r == 0 ?
|
<< (r == 0 ?
|
||||||
"GOOD signature ;-)" :
|
"GOOD signature ;-)" :
|
||||||
|
@ -1302,61 +1315,20 @@ int action_decrypt_verify (bool armor, bool yes,
|
||||||
* keyring stuff
|
* keyring stuff
|
||||||
*/
|
*/
|
||||||
|
|
||||||
static std::string escape_key_name (const std::string&s)
|
|
||||||
{
|
|
||||||
std::string r;
|
|
||||||
const char hex[] = "0123456789abcdef";
|
|
||||||
for (size_t i = 0; i < s.length(); ++i)
|
|
||||||
if (s[i] == '\\') r += "\\\\";
|
|
||||||
else if (s[i] < 0x20)
|
|
||||||
switch (s[i]) {
|
|
||||||
case '\a':
|
|
||||||
r += "\\a";
|
|
||||||
break;
|
|
||||||
case '\b':
|
|
||||||
r += "\\b";
|
|
||||||
break;
|
|
||||||
case '\x1b':
|
|
||||||
r += "\\e";
|
|
||||||
break;
|
|
||||||
case '\f':
|
|
||||||
r += "\\f";
|
|
||||||
break;
|
|
||||||
case '\n':
|
|
||||||
r += "\\n";
|
|
||||||
break;
|
|
||||||
case '\r':
|
|
||||||
r += "\\r";
|
|
||||||
break;
|
|
||||||
case '\t':
|
|
||||||
r += "\\t";
|
|
||||||
break;
|
|
||||||
case '\v':
|
|
||||||
r += "\\v";
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
r += "\\x";
|
|
||||||
r += hex[0xf & (s[i] >> 4)];
|
|
||||||
r += hex[0xf & s[i]];
|
|
||||||
}
|
|
||||||
else r += s[i];
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void output_key (bool fp,
|
static void output_key (bool fp,
|
||||||
const std::string& ident, const std::string&longid,
|
const std::string& ident, const std::string&longid,
|
||||||
const std::string&alg, const std::string&keyid,
|
const std::string&alg, const std::string&keyid,
|
||||||
const std::string&name)
|
const std::string&name)
|
||||||
{
|
{
|
||||||
if (!fp)
|
if (!fp)
|
||||||
out (ident << '\t' << alg << '\t'
|
out (ident << '\t' << escape_output (alg) << '\t'
|
||||||
<< '@' << keyid.substr (0, 22) << "...\t"
|
<< '@' << keyid.substr (0, 22) << "...\t"
|
||||||
<< escape_key_name (name));
|
<< escape_output (name));
|
||||||
else {
|
else {
|
||||||
out (longid << " with algorithm " << alg
|
out (longid << " with algorithm " << escape_output (alg)
|
||||||
<< ", name `" << escape_key_name (name) << "'");
|
<< ", name `" << escape_output (name) << "'");
|
||||||
|
|
||||||
std::cout << " fingerprint ";
|
std::cout << " fingerprint/keyid: ";
|
||||||
for (size_t j = 0; j < keyid.length(); ++j) {
|
for (size_t j = 0; j < keyid.length(); ++j) {
|
||||||
std::cout << keyid[j];
|
std::cout << keyid[j];
|
||||||
if (! ( (j + 1) % 4) &&
|
if (! ( (j + 1) % 4) &&
|
||||||
|
@ -1621,7 +1593,7 @@ int action_rename (bool yes,
|
||||||
bool okay = false;
|
bool okay = false;
|
||||||
ask_for_yes (okay, "This will rename " << kc
|
ask_for_yes (okay, "This will rename " << kc
|
||||||
<< " pubkeys from your keyring to `"
|
<< " pubkeys from your keyring to `"
|
||||||
<< escape_key_name (name) << "'. Continue?");
|
<< escape_output (name) << "'. Continue?");
|
||||||
if (!okay) return 0;
|
if (!okay) return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1878,7 +1850,7 @@ int action_rename_sec (bool yes,
|
||||||
bool okay = false;
|
bool okay = false;
|
||||||
ask_for_yes (okay, "This will rename " << kc
|
ask_for_yes (okay, "This will rename " << kc
|
||||||
<< " secrets from your keyring to `"
|
<< " secrets from your keyring to `"
|
||||||
<< escape_key_name (name) << "'. Continue?");
|
<< escape_output (name) << "'. Continue?");
|
||||||
if (!okay) return 0;
|
if (!okay) return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -259,7 +259,6 @@ bvector bvector::ext_gcd (const bvector&b, bvector&s0, bvector&t0)
|
||||||
for (;;) {
|
for (;;) {
|
||||||
int d0 = r0.degree();
|
int d0 = r0.degree();
|
||||||
int d1 = r1.degree();
|
int d1 = r1.degree();
|
||||||
//out ("r0" << r0 << "r1" << r1 << "s0" << s0 << "s1" << s1 << "t0" << t0 << "t1" << t1 << "d0=" << d0 << " d1=" << d1);
|
|
||||||
if (d0 < 0) {
|
if (d0 < 0) {
|
||||||
s0.swap (s1);
|
s0.swap (s1);
|
||||||
t0.swap (t1);
|
t0.swap (t1);
|
||||||
|
|
|
@ -158,7 +158,7 @@ int hashfile::verify (istream&in)
|
||||||
i != e; ++i) {
|
i != e; ++i) {
|
||||||
if (!hm.count (i->first)) {
|
if (!hm.count (i->first)) {
|
||||||
err ("hash verification: :-/ "
|
err ("hash verification: :-/ "
|
||||||
<< i->first << " not supported");
|
<< escape_output (i->first) << " not supported");
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
if (i->second == hm[i->first]->finish()) {
|
if (i->second == hm[i->first]->finish()) {
|
||||||
|
|
|
@ -36,3 +36,43 @@ bool redirect_cout (const std::string& fn)
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::string escape_output (const std::string&s)
|
||||||
|
{
|
||||||
|
std::string r;
|
||||||
|
const char hex[] = "0123456789abcdef";
|
||||||
|
for (size_t i = 0; i < s.length(); ++i)
|
||||||
|
if (s[i] == '\\') r += "\\\\";
|
||||||
|
else if (s[i]>=0 && s[i] < 0x20) //utf-8 is "negative" here
|
||||||
|
switch (s[i]) {
|
||||||
|
case '\a':
|
||||||
|
r += "\\a";
|
||||||
|
break;
|
||||||
|
case '\b':
|
||||||
|
r += "\\b";
|
||||||
|
break;
|
||||||
|
case '\x1b':
|
||||||
|
r += "\\e";
|
||||||
|
break;
|
||||||
|
case '\f':
|
||||||
|
r += "\\f";
|
||||||
|
break;
|
||||||
|
case '\n':
|
||||||
|
r += "\\n";
|
||||||
|
break;
|
||||||
|
case '\r':
|
||||||
|
r += "\\r";
|
||||||
|
break;
|
||||||
|
case '\t':
|
||||||
|
r += "\\t";
|
||||||
|
break;
|
||||||
|
case '\v':
|
||||||
|
r += "\\v";
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
r += "\\x";
|
||||||
|
r += hex[0xf & (s[i] >> 4)];
|
||||||
|
r += hex[0xf & s[i]];
|
||||||
|
}
|
||||||
|
else r += s[i];
|
||||||
|
return r;
|
||||||
|
}
|
||||||
|
|
|
@ -62,4 +62,6 @@ bool read_all_input (output_seq&data, std::istream&input = std::cin)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::string escape_output (const std::string&);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -25,7 +25,7 @@ void keyring::clear()
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* KeyID is SHA256 of pubkey string representation. Also serves as a
|
* KeyID is CUBE256 of pubkey string representation. Also serves as a
|
||||||
* simple fingerprint.
|
* simple fingerprint.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
|
@ -219,7 +219,7 @@ int privkey::decrypt (const bvector & in_orig, bvector & out, bvector & errors)
|
||||||
for (j = 0; j < bs; ++j) synd_diag[j] += Htmp[j] * tmp[j];
|
for (j = 0; j < bs; ++j) synd_diag[j] += Htmp[j] * tmp[j];
|
||||||
}
|
}
|
||||||
|
|
||||||
bvector (syndrome);
|
bvector syndrome;
|
||||||
fft (synd_diag, syndrome);
|
fft (synd_diag, syndrome);
|
||||||
|
|
||||||
//precompute sparse matrix indexes
|
//precompute sparse matrix indexes
|
||||||
|
|
|
@ -69,13 +69,13 @@ public:
|
||||||
|
|
||||||
r.resize (a.size());
|
r.resize (a.size());
|
||||||
|
|
||||||
uint i, t, x;
|
uint i;
|
||||||
for (i = 0; i < a.size(); ++i) {
|
for (i = 0; i < a.size(); ++i) {
|
||||||
r[sig] = a[i];
|
r[sig] = a[i];
|
||||||
|
|
||||||
//flip the correct bit in signature
|
//flip the correct bit in signature
|
||||||
t = i + 1;
|
uint t = i + 1;
|
||||||
x = 1;
|
uint x = 1;
|
||||||
while (! (t & 1)) {
|
while (! (t & 1)) {
|
||||||
t >>= 1;
|
t >>= 1;
|
||||||
x <<= 1;
|
x <<= 1;
|
||||||
|
|
|
@ -224,7 +224,6 @@ void polynomial::ext_euclid (polynomial&a_out, polynomial&b_out,
|
||||||
{
|
{
|
||||||
//TODO: speed this up (spare degree calculations)
|
//TODO: speed this up (spare degree calculations)
|
||||||
polynomial A, B, a, b, tmp;
|
polynomial A, B, a, b, tmp;
|
||||||
int j;
|
|
||||||
uint h;
|
uint h;
|
||||||
|
|
||||||
A = *this;
|
A = *this;
|
||||||
|
@ -239,6 +238,7 @@ void polynomial::ext_euclid (polynomial&a_out, polynomial&b_out,
|
||||||
|
|
||||||
A.swap (a);
|
A.swap (a);
|
||||||
B.swap (b);
|
B.swap (b);
|
||||||
|
int j;
|
||||||
while ( (j = A.degree() - a.degree()) >= 0) {
|
while ( (j = A.degree() - a.degree()) >= 0) {
|
||||||
h = fld.div (A.head(), a.head());
|
h = fld.div (A.head(), a.head());
|
||||||
tmp = a;
|
tmp = a;
|
||||||
|
|
|
@ -52,7 +52,7 @@ bool symkey::create (const std::string&in, prng&rng)
|
||||||
else if (hash_proc::suite().count (tok))
|
else if (hash_proc::suite().count (tok))
|
||||||
hashes.insert (tok);
|
hashes.insert (tok);
|
||||||
else {
|
else {
|
||||||
err ("symkey: unknown token: " << tok);
|
err ("symkey: unknown token: " << escape_output (tok));
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -115,7 +115,7 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
|
||||||
i = ciphers.begin(), e = ciphers.end();
|
i = ciphers.begin(), e = ciphers.end();
|
||||||
i != e; ++i) {
|
i != e; ++i) {
|
||||||
if (!streamcipher::suite().count (*i)) {
|
if (!streamcipher::suite().count (*i)) {
|
||||||
err ("symkey: unsupported cipher: " << *i);
|
err ("symkey: unsupported cipher: " << escape_output (*i));
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
scs.push_back (streamcipher::suite() [*i]->get());
|
scs.push_back (streamcipher::suite() [*i]->get());
|
||||||
|
@ -136,7 +136,7 @@ bool symkey::encrypt (std::istream&in, std::ostream&out, prng&rng)
|
||||||
i = hashes.begin(), e = hashes.end();
|
i = hashes.begin(), e = hashes.end();
|
||||||
i != e; ++i) {
|
i != e; ++i) {
|
||||||
if (!hash_proc::suite().count (*i)) {
|
if (!hash_proc::suite().count (*i)) {
|
||||||
err ("symkey: unsupported hash function: " << *i);
|
err ("symkey: unsupported hash function: " << escape_output (*i));
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
hs.push_back (hash_proc::suite() [*i]->get());
|
hs.push_back (hash_proc::suite() [*i]->get());
|
||||||
|
@ -232,7 +232,7 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
|
||||||
i = ciphers.begin(), e = ciphers.end();
|
i = ciphers.begin(), e = ciphers.end();
|
||||||
i != e; ++i) {
|
i != e; ++i) {
|
||||||
if (!streamcipher::suite().count (*i)) {
|
if (!streamcipher::suite().count (*i)) {
|
||||||
err ("symkey: unsupported cipher: " << *i);
|
err ("symkey: unsupported cipher: " << escape_output (*i));
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
scs.push_back (streamcipher::suite() [*i]->get());
|
scs.push_back (streamcipher::suite() [*i]->get());
|
||||||
|
@ -253,7 +253,7 @@ int symkey::decrypt (std::istream&in, std::ostream&out)
|
||||||
i = hashes.begin(), e = hashes.end();
|
i = hashes.begin(), e = hashes.end();
|
||||||
i != e; ++i) {
|
i != e; ++i) {
|
||||||
if (!hash_proc::suite().count (*i)) {
|
if (!hash_proc::suite().count (*i)) {
|
||||||
err ("symkey: unsupported hash function: " << *i);
|
err ("symkey: unsupported hash function: " << escape_output (*i));
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
hs.push_back (hash_proc::suite() [*i]->get());
|
hs.push_back (hash_proc::suite() [*i]->get());
|
||||||
|
|
Loading…
Reference in a new issue