diff options
author | lloyd <[email protected]> | 2014-01-01 21:20:55 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2014-01-01 21:20:55 +0000 |
commit | 197dc467dec28a04c3b2f30da7cef122dfbb13e9 (patch) | |
tree | cdbd3ddaec051c72f0a757db461973d90c37b97a /lib/pbkdf/pbkdf1/pbkdf1.cpp | |
parent | 62faac373c07cfe10bc8c309e89ebdd30d8e5eaa (diff) |
Shuffle things around. Add NIST X.509 test to build.
Diffstat (limited to 'lib/pbkdf/pbkdf1/pbkdf1.cpp')
-rw-r--r-- | lib/pbkdf/pbkdf1/pbkdf1.cpp | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/lib/pbkdf/pbkdf1/pbkdf1.cpp b/lib/pbkdf/pbkdf1/pbkdf1.cpp new file mode 100644 index 000000000..9d1672529 --- /dev/null +++ b/lib/pbkdf/pbkdf1/pbkdf1.cpp @@ -0,0 +1,58 @@ +/* +* PBKDF1 +* (C) 1999-2007 Jack Lloyd +* +* Distributed under the terms of the Botan license +*/ + +#include <botan/pbkdf1.h> +#include <botan/exceptn.h> + +namespace Botan { + +/* +* Return a PKCS#5 PBKDF1 derived key +*/ +std::pair<size_t, OctetString> +PKCS5_PBKDF1::key_derivation(size_t key_len, + const std::string& passphrase, + const byte salt[], size_t salt_len, + size_t iterations, + std::chrono::milliseconds msec) const + { + if(key_len > hash->output_length()) + throw Invalid_Argument("PKCS5_PBKDF1: Requested output length too long"); + + hash->update(passphrase); + hash->update(salt, salt_len); + secure_vector<byte> key = hash->final(); + + const auto start = std::chrono::high_resolution_clock::now(); + size_t iterations_performed = 1; + + while(true) + { + if(iterations == 0) + { + if(iterations_performed % 10000 == 0) + { + auto time_taken = std::chrono::high_resolution_clock::now() - start; + auto msec_taken = std::chrono::duration_cast<std::chrono::milliseconds>(time_taken); + if(msec_taken > msec) + break; + } + } + else if(iterations_performed == iterations) + break; + + hash->update(key); + hash->final(&key[0]); + + ++iterations_performed; + } + + return std::make_pair(iterations_performed, + OctetString(&key[0], std::min(key_len, key.size()))); + } + +} |