aboutsummaryrefslogtreecommitdiffstats
path: root/doc/examples/encrypt2.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2008-11-24 19:12:32 +0000
committerlloyd <[email protected]>2008-11-24 19:12:32 +0000
commit24647f786af84eafb2b5c12c1629546bb7df911d (patch)
treed64a3eb415e563649c5e86b22e29625c815da23e /doc/examples/encrypt2.cpp
parent83473a28f4882c0e39cd6c923d1624f6210509ec (diff)
Add an example taken from the tutorial
Diffstat (limited to 'doc/examples/encrypt2.cpp')
-rw-r--r--doc/examples/encrypt2.cpp55
1 files changed, 55 insertions, 0 deletions
diff --git a/doc/examples/encrypt2.cpp b/doc/examples/encrypt2.cpp
new file mode 100644
index 000000000..3d91a9bc5
--- /dev/null
+++ b/doc/examples/encrypt2.cpp
@@ -0,0 +1,55 @@
+#include <botan/botan.h>
+#include <botan/pbkdf2.h>
+#include <botan/hmac.h>
+#include <botan/sha160.h>
+
+#include <fstream>
+
+using namespace Botan;
+
+int main()
+ {
+ LibraryInitializer init;
+
+ AutoSeeded_RNG rng;
+
+ std::string passphrase = "secret";
+
+ std::ifstream infile("readme.txt");
+ std::ofstream outfile("readme.txt.enc");
+
+ PKCS5_PBKDF2 pbkdf2(new HMAC(new SHA_160));
+
+ pbkdf2.set_iterations(4096);
+ pbkdf2.new_random_salt(rng, 8);
+ SecureVector<byte> the_salt = pbkdf2.current_salt();
+
+ SecureVector<byte> master_key = pbkdf2.derive_key(48, passphrase).bits_of();
+
+ KDF* kdf = get_kdf("KDF2(SHA-1)");
+
+ SymmetricKey key = kdf->derive_key(20, master_key, "cipher key");
+ SymmetricKey mac_key = kdf->derive_key(20, master_key, "hmac key");
+ InitializationVector iv = kdf->derive_key(8, master_key, "cipher iv");
+
+ Pipe pipe(new Fork(
+ new Chain(
+ get_cipher("Blowfish/CBC/PKCS7", key, iv, ENCRYPTION),
+ new Base64_Encoder,
+ new DataSink_Stream(outfile)
+ ),
+ new Chain(
+ new MAC_Filter("HMAC(SHA-1)", mac_key),
+ new Hex_Encoder)
+ )
+ );
+
+ outfile.write((const char*)the_salt.begin(), the_salt.size());
+
+ pipe.start_msg();
+ infile >> pipe;
+ pipe.end_msg();
+
+ SecureVector<byte> hmac = pipe.read_all(1);
+ outfile.write((const char*)hmac.begin(), hmac.size());
+ }