diff --git a/cryptlib.cpp b/cryptlib.cpp index c4f03393..621f4f9a 100644 --- a/cryptlib.cpp +++ b/cryptlib.cpp @@ -334,12 +334,12 @@ void RandomNumberGenerator::GenerateIntoBufferedTransformation(BufferedTransform } } -size_t KeyDerivationFunction::MinDerivedLength() const +size_t KeyDerivationFunction::MinDerivedKeyLength() const { return 0; } -size_t KeyDerivationFunction::MaxDerivedLength() const +size_t KeyDerivationFunction::MaxDerivedKeyLength() const { return static_cast(-1); } diff --git a/cryptlib.h b/cryptlib.h index 1cb753ac..b1f5a71b 100644 --- a/cryptlib.h +++ b/cryptlib.h @@ -1477,11 +1477,11 @@ public: /// \brief Determine minimum number of bytes /// \returns Minimum number of bytes which can be derived - virtual size_t MinDerivedLength() const; + virtual size_t MinDerivedKeyLength() const; /// \brief Determine maximum number of bytes /// \returns Maximum number of bytes which can be derived - virtual size_t MaxDerivedLength() const; + virtual size_t MaxDerivedKeyLength() const; /// \brief Returns a valid key length for the derivation function /// \param keylength the size of the derived key, in bytes diff --git a/pwdbased.h b/pwdbased.h index e2a01464..dcc23837 100644 --- a/pwdbased.h +++ b/pwdbased.h @@ -82,8 +82,8 @@ protected: template size_t PKCS5_PBKDF1::GetValidDerivedLength(size_t keylength) const { - if (keylength > MaxDerivedLength()) - return MaxDerivedLength(); + if (keylength > MaxDerivedKeyLength()) + return MaxDerivedKeyLength(); return keylength; } @@ -93,7 +93,7 @@ size_t PKCS5_PBKDF1::DeriveKey(byte *derived, size_t derivedLen, { CRYPTOPP_ASSERT(secret /*&& secretLen*/); CRYPTOPP_ASSERT(derived && derivedLen); - CRYPTOPP_ASSERT(derivedLen <= MaxDerivedLength()); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); byte purpose = (byte)params.GetIntValueWithDefault("Purpose", 0); unsigned int iterations = (unsigned int)params.GetIntValueWithDefault("Iterations", 1); @@ -112,7 +112,7 @@ size_t PKCS5_PBKDF1::DeriveKey(byte *derived, size_t derivedLen, byte purpose { CRYPTOPP_ASSERT(secret /*&& secretLen*/); CRYPTOPP_ASSERT(derived && derivedLen); - CRYPTOPP_ASSERT(derivedLen <= MaxDerivedLength()); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0); CRYPTOPP_UNUSED(purpose); @@ -137,7 +137,8 @@ size_t PKCS5_PBKDF1::DeriveKey(byte *derived, size_t derivedLen, byte purpose for (i=1; i size_t PKCS5_PBKDF2_HMAC::GetValidDerivedLength(size_t keylength) const { - if (keylength > MaxDerivedLength()) - return MaxDerivedLength(); + if (keylength > MaxDerivedKeyLength()) + return MaxDerivedKeyLength(); return keylength; } @@ -217,7 +218,7 @@ size_t PKCS5_PBKDF2_HMAC::DeriveKey(byte *derived, size_t derivedLen, { CRYPTOPP_ASSERT(secret /*&& secretLen*/); CRYPTOPP_ASSERT(derived && derivedLen); - CRYPTOPP_ASSERT(derivedLen <= MaxDerivedLength()); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); byte purpose = (byte)params.GetIntValueWithDefault("Purpose", 0); unsigned int iterations = (unsigned int)params.GetIntValueWithDefault("Iterations", 1); @@ -236,7 +237,7 @@ size_t PKCS5_PBKDF2_HMAC::DeriveKey(byte *derived, size_t derivedLen, byte pu { CRYPTOPP_ASSERT(secret /*&& secretLen*/); CRYPTOPP_ASSERT(derived && derivedLen); - CRYPTOPP_ASSERT(derivedLen <= MaxDerivedLength()); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0); CRYPTOPP_UNUSED(purpose); @@ -363,8 +364,8 @@ protected: template size_t PKCS12_PBKDF::GetValidDerivedLength(size_t keylength) const { - if (keylength > MaxDerivedLength()) - return MaxDerivedLength(); + if (keylength > MaxDerivedKeyLength()) + return MaxDerivedKeyLength(); return keylength; } @@ -374,7 +375,7 @@ size_t PKCS12_PBKDF::DeriveKey(byte *derived, size_t derivedLen, { CRYPTOPP_ASSERT(secret /*&& secretLen*/); CRYPTOPP_ASSERT(derived && derivedLen); - CRYPTOPP_ASSERT(derivedLen <= MaxDerivedLength()); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); byte purpose = (byte)params.GetIntValueWithDefault("Purpose", 0); unsigned int iterations = (unsigned int)params.GetIntValueWithDefault("Iterations", 1); @@ -394,7 +395,7 @@ size_t PKCS12_PBKDF::DeriveKey(byte *derived, size_t derivedLen, byte purpose { CRYPTOPP_ASSERT(secret /*&& secretLen*/); CRYPTOPP_ASSERT(derived && derivedLen); - CRYPTOPP_ASSERT(derivedLen <= MaxDerivedLength()); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0); ThrowIfInvalidDerivedLength(derivedLen);