mirror of
https://github.com/pocoproject/poco.git
synced 2025-10-26 10:32:56 +01:00
Remove trailing whitespace (#3668)
This commit is contained in:
@@ -31,25 +31,25 @@ template <class PRF>
|
||||
class PBKDF2Engine: public DigestEngine
|
||||
/// This class implements the Password-Based Key Derivation Function 2,
|
||||
/// as specified in RFC 2898. The underlying DigestEngine (HMACEngine, etc.),
|
||||
/// which must accept the passphrase as constructor argument (std::string),
|
||||
/// must be given as template argument.
|
||||
/// which must accept the passphrase as constructor argument (std::string),
|
||||
/// must be given as template argument.
|
||||
///
|
||||
/// PBKDF2 (Password-Based Key Derivation Function 2) is a key derivation function
|
||||
/// that is part of RSA Laboratories' Public-Key Cryptography Standards (PKCS) series,
|
||||
/// specifically PKCS #5 v2.0, also published as Internet Engineering Task Force's
|
||||
/// RFC 2898. It replaces an earlier standard, PBKDF1, which could only produce
|
||||
/// PBKDF2 (Password-Based Key Derivation Function 2) is a key derivation function
|
||||
/// that is part of RSA Laboratories' Public-Key Cryptography Standards (PKCS) series,
|
||||
/// specifically PKCS #5 v2.0, also published as Internet Engineering Task Force's
|
||||
/// RFC 2898. It replaces an earlier standard, PBKDF1, which could only produce
|
||||
/// derived keys up to 160 bits long.
|
||||
///
|
||||
/// PBKDF2 applies a pseudorandom function, such as a cryptographic hash, cipher, or
|
||||
/// HMAC to the input password or passphrase along with a salt value and repeats the
|
||||
/// process many times to produce a derived key, which can then be used as a
|
||||
/// cryptographic key in subsequent operations. The added computational work makes
|
||||
/// password cracking much more difficult, and is known as key stretching.
|
||||
/// When the standard was written in 2000, the recommended minimum number of
|
||||
/// iterations was 1000, but the parameter is intended to be increased over time as
|
||||
/// CPU speeds increase. Having a salt added to the password reduces the ability to
|
||||
/// use precomputed hashes (rainbow tables) for attacks, and means that multiple
|
||||
/// passwords have to be tested individually, not all at once. The standard
|
||||
/// PBKDF2 applies a pseudorandom function, such as a cryptographic hash, cipher, or
|
||||
/// HMAC to the input password or passphrase along with a salt value and repeats the
|
||||
/// process many times to produce a derived key, which can then be used as a
|
||||
/// cryptographic key in subsequent operations. The added computational work makes
|
||||
/// password cracking much more difficult, and is known as key stretching.
|
||||
/// When the standard was written in 2000, the recommended minimum number of
|
||||
/// iterations was 1000, but the parameter is intended to be increased over time as
|
||||
/// CPU speeds increase. Having a salt added to the password reduces the ability to
|
||||
/// use precomputed hashes (rainbow tables) for attacks, and means that multiple
|
||||
/// passwords have to be tested individually, not all at once. The standard
|
||||
/// recommends a salt length of at least 64 bits. [Wikipedia]
|
||||
///
|
||||
/// The PBKDF2 algorithm is implemented as a DigestEngine. The passphrase is specified
|
||||
@@ -65,30 +65,30 @@ public:
|
||||
{
|
||||
PRF_DIGEST_SIZE = PRF::DIGEST_SIZE
|
||||
};
|
||||
|
||||
|
||||
PBKDF2Engine(const std::string& salt, unsigned c = 4096, Poco::UInt32 dkLen = PRF_DIGEST_SIZE):
|
||||
_s(salt),
|
||||
_c(c),
|
||||
_dkLen(dkLen)
|
||||
{
|
||||
{
|
||||
_result.reserve(_dkLen + PRF_DIGEST_SIZE);
|
||||
}
|
||||
|
||||
|
||||
~PBKDF2Engine()
|
||||
{
|
||||
}
|
||||
|
||||
|
||||
std::size_t digestLength() const
|
||||
{
|
||||
return _dkLen;
|
||||
}
|
||||
|
||||
|
||||
void reset()
|
||||
{
|
||||
_p.clear();
|
||||
_result.clear();
|
||||
}
|
||||
|
||||
|
||||
const DigestEngine::Digest& digest()
|
||||
{
|
||||
Poco::UInt32 i = 1;
|
||||
@@ -105,7 +105,7 @@ protected:
|
||||
{
|
||||
_p.append(reinterpret_cast<const char*>(data), length);
|
||||
}
|
||||
|
||||
|
||||
void f(Poco::UInt32 i)
|
||||
{
|
||||
PRF prf(_p);
|
||||
|
||||
Reference in New Issue
Block a user