author | Michael Krelin <hacker@klever.net> | 2007-06-18 22:02:02 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2007-06-18 22:02:02 (UTC) |
commit | 9af3fae2d53a34003af405b68923061c01584bc6 (patch) (unidiff) | |
tree | dd63e5bc3515c47ab074c564c51879b7c9652ab2 /lib/util.cc | |
parent | 3b404dd029a2aba05efc2edadcc7f67c59746cf7 (diff) | |
download | libopkele-9af3fae2d53a34003af405b68923061c01584bc6.zip libopkele-9af3fae2d53a34003af405b68923061c01584bc6.tar.gz libopkele-9af3fae2d53a34003af405b68923061c01584bc6.tar.bz2 |
reworked zero-padding machinery and added one more instance of zero-padding
-rw-r--r-- | lib/util.cc | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/lib/util.cc b/lib/util.cc index d9abca7..94f6f53 100644 --- a/lib/util.cc +++ b/lib/util.cc | |||
@@ -1,158 +1,162 @@ | |||
1 | #include <errno.h> | 1 | #include <errno.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <vector> | 3 | #include <vector> |
4 | #include <string> | 4 | #include <string> |
5 | #include <openssl/bio.h> | 5 | #include <openssl/bio.h> |
6 | #include <openssl/evp.h> | 6 | #include <openssl/evp.h> |
7 | #include <curl/curl.h> | 7 | #include <curl/curl.h> |
8 | #include "opkele/util.h" | 8 | #include "opkele/util.h" |
9 | #include "opkele/exception.h" | 9 | #include "opkele/exception.h" |
10 | 10 | ||
11 | namespace opkele { | 11 | namespace opkele { |
12 | using namespace std; | 12 | using namespace std; |
13 | 13 | ||
14 | namespace util { | 14 | namespace util { |
15 | 15 | ||
16 | /* | 16 | /* |
17 | * base64 | 17 | * base64 |
18 | */ | 18 | */ |
19 | string encode_base64(const void *data,size_t length) { | 19 | string encode_base64(const void *data,size_t length) { |
20 | BIO *b64 = 0, *bmem = 0; | 20 | BIO *b64 = 0, *bmem = 0; |
21 | try { | 21 | try { |
22 | b64 = BIO_new(BIO_f_base64()); | 22 | b64 = BIO_new(BIO_f_base64()); |
23 | if(!b64) | 23 | if(!b64) |
24 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); | 24 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); |
25 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 25 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
26 | bmem = BIO_new(BIO_s_mem()); | 26 | bmem = BIO_new(BIO_s_mem()); |
27 | BIO_set_flags(b64,BIO_CLOSE); | 27 | BIO_set_flags(b64,BIO_CLOSE); |
28 | if(!bmem) | 28 | if(!bmem) |
29 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); | 29 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); |
30 | BIO_push(b64,bmem); | 30 | BIO_push(b64,bmem); |
31 | if(BIO_write(b64,data,length)!=length) | 31 | if(BIO_write(b64,data,length)!=length) |
32 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); | 32 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); |
33 | BIO_flush(b64); | 33 | BIO_flush(b64); |
34 | char *rvd; | 34 | char *rvd; |
35 | long rvl = BIO_get_mem_data(bmem,&rvd); | 35 | long rvl = BIO_get_mem_data(bmem,&rvd); |
36 | string rv(rvd,rvl); | 36 | string rv(rvd,rvl); |
37 | BIO_free_all(b64); | 37 | BIO_free_all(b64); |
38 | return rv; | 38 | return rv; |
39 | }catch(...) { | 39 | }catch(...) { |
40 | if(b64) BIO_free_all(b64); | 40 | if(b64) BIO_free_all(b64); |
41 | throw; | 41 | throw; |
42 | } | 42 | } |
43 | } | 43 | } |
44 | 44 | ||
45 | void decode_base64(const string& data,vector<unsigned char>& rv) { | 45 | void decode_base64(const string& data,vector<unsigned char>& rv) { |
46 | BIO *b64 = 0, *bmem = 0; | 46 | BIO *b64 = 0, *bmem = 0; |
47 | rv.clear(); | 47 | rv.clear(); |
48 | try { | 48 | try { |
49 | bmem = BIO_new_mem_buf((void*)data.data(),data.size()); | 49 | bmem = BIO_new_mem_buf((void*)data.data(),data.size()); |
50 | if(!bmem) | 50 | if(!bmem) |
51 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); | 51 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); |
52 | b64 = BIO_new(BIO_f_base64()); | 52 | b64 = BIO_new(BIO_f_base64()); |
53 | if(!b64) | 53 | if(!b64) |
54 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); | 54 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); |
55 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 55 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
56 | BIO_push(b64,bmem); | 56 | BIO_push(b64,bmem); |
57 | unsigned char tmp[512]; | 57 | unsigned char tmp[512]; |
58 | size_t rb = 0; | 58 | size_t rb = 0; |
59 | while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) | 59 | while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) |
60 | rv.insert(rv.end(),tmp,&tmp[rb]); | 60 | rv.insert(rv.end(),tmp,&tmp[rb]); |
61 | BIO_free_all(b64); | 61 | BIO_free_all(b64); |
62 | }catch(...) { | 62 | }catch(...) { |
63 | if(b64) BIO_free_all(b64); | 63 | if(b64) BIO_free_all(b64); |
64 | throw; | 64 | throw; |
65 | } | 65 | } |
66 | } | 66 | } |
67 | 67 | ||
68 | /* | 68 | /* |
69 | * big numerics | 69 | * big numerics |
70 | */ | 70 | */ |
71 | 71 | ||
72 | BIGNUM *base64_to_bignum(const string& b64) { | 72 | BIGNUM *base64_to_bignum(const string& b64) { |
73 | vector<unsigned char> bin; | 73 | vector<unsigned char> bin; |
74 | decode_base64(b64,bin); | 74 | decode_base64(b64,bin); |
75 | BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); | 75 | BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); |
76 | if(!rv) | 76 | if(!rv) |
77 | throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); | 77 | throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); |
78 | return rv; | 78 | return rv; |
79 | } | 79 | } |
80 | 80 | ||
81 | BIGNUM *dec_to_bignum(const string& dec) { | 81 | BIGNUM *dec_to_bignum(const string& dec) { |
82 | BIGNUM *rv = 0; | 82 | BIGNUM *rv = 0; |
83 | if(!BN_dec2bn(&rv,dec.c_str())) | 83 | if(!BN_dec2bn(&rv,dec.c_str())) |
84 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); | 84 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); |
85 | return rv; | 85 | return rv; |
86 | } | 86 | } |
87 | 87 | ||
88 | string bignum_to_base64(const BIGNUM *bn) { | 88 | string bignum_to_base64(const BIGNUM *bn) { |
89 | vector<unsigned char> bin(BN_num_bytes(bn)); | 89 | vector<unsigned char> bin(BN_num_bytes(bn)+1); |
90 | int l = BN_bn2bin(bn,&(bin.front())); | 90 | unsigned char *binptr = &(bin.front())+1; |
91 | return encode_base64(&(bin.front()),l); | 91 | int l = BN_bn2bin(bn,binptr); |
92 | if(l && (*binptr)&0x80){ | ||
93 | (*(--binptr)) = 0; ++l; | ||
94 | } | ||
95 | return encode_base64(binptr,l); | ||
92 | } | 96 | } |
93 | 97 | ||
94 | /* | 98 | /* |
95 | * w3c times | 99 | * w3c times |
96 | */ | 100 | */ |
97 | 101 | ||
98 | string time_to_w3c(time_t t) { | 102 | string time_to_w3c(time_t t) { |
99 | struct tm tm_t; | 103 | struct tm tm_t; |
100 | if(!gmtime_r(&t,&tm_t)) | 104 | if(!gmtime_r(&t,&tm_t)) |
101 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); | 105 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); |
102 | char rv[25]; | 106 | char rv[25]; |
103 | if(!strftime(rv,sizeof(rv)-1,"%Y-%m-%dT%H:%M:%SZ",&tm_t)) | 107 | if(!strftime(rv,sizeof(rv)-1,"%Y-%m-%dT%H:%M:%SZ",&tm_t)) |
104 | throw failed_conversion(OPKELE_CP_ "failed to strftime()"); | 108 | throw failed_conversion(OPKELE_CP_ "failed to strftime()"); |
105 | return rv; | 109 | return rv; |
106 | } | 110 | } |
107 | 111 | ||
108 | time_t w3c_to_time(const string& w) { | 112 | time_t w3c_to_time(const string& w) { |
109 | struct tm tm_t; | 113 | struct tm tm_t; |
110 | memset(&tm_t,0,sizeof(tm_t)); | 114 | memset(&tm_t,0,sizeof(tm_t)); |
111 | if( | 115 | if( |
112 | sscanf( | 116 | sscanf( |
113 | w.c_str(), | 117 | w.c_str(), |
114 | "%04d-%02d-%02dT%02d:%02d:%02dZ", | 118 | "%04d-%02d-%02dT%02d:%02d:%02dZ", |
115 | &tm_t.tm_year,&tm_t.tm_mon,&tm_t.tm_mday, | 119 | &tm_t.tm_year,&tm_t.tm_mon,&tm_t.tm_mday, |
116 | &tm_t.tm_hour,&tm_t.tm_min,&tm_t.tm_sec | 120 | &tm_t.tm_hour,&tm_t.tm_min,&tm_t.tm_sec |
117 | ) != 6 ) | 121 | ) != 6 ) |
118 | throw failed_conversion(OPKELE_CP_ "failed to sscanf()"); | 122 | throw failed_conversion(OPKELE_CP_ "failed to sscanf()"); |
119 | tm_t.tm_mon--; | 123 | tm_t.tm_mon--; |
120 | tm_t.tm_year-=1900; | 124 | tm_t.tm_year-=1900; |
121 | time_t rv = mktime(&tm_t); | 125 | time_t rv = mktime(&tm_t); |
122 | if(rv==(time_t)-1) | 126 | if(rv==(time_t)-1) |
123 | throw failed_conversion(OPKELE_CP_ "failed to mktime()"); | 127 | throw failed_conversion(OPKELE_CP_ "failed to mktime()"); |
124 | return rv; | 128 | return rv; |
125 | } | 129 | } |
126 | 130 | ||
127 | /* | 131 | /* |
128 | * | 132 | * |
129 | */ | 133 | */ |
130 | 134 | ||
131 | string url_encode(const string& str) { | 135 | string url_encode(const string& str) { |
132 | char * t = curl_escape(str.c_str(),str.length()); | 136 | char * t = curl_escape(str.c_str(),str.length()); |
133 | if(!t) | 137 | if(!t) |
134 | throw failed_conversion(OPKELE_CP_ "failed to curl_escape()"); | 138 | throw failed_conversion(OPKELE_CP_ "failed to curl_escape()"); |
135 | string rv(t); | 139 | string rv(t); |
136 | curl_free(t); | 140 | curl_free(t); |
137 | return rv; | 141 | return rv; |
138 | } | 142 | } |
139 | 143 | ||
140 | string long_to_string(long l) { | 144 | string long_to_string(long l) { |
141 | char rv[32]; | 145 | char rv[32]; |
142 | int r=snprintf(rv,sizeof(rv),"%ld",l); | 146 | int r=snprintf(rv,sizeof(rv),"%ld",l); |
143 | if(r<0 || r>=sizeof(rv)) | 147 | if(r<0 || r>=sizeof(rv)) |
144 | throw failed_conversion(OPKELE_CP_ "failed to snprintf()"); | 148 | throw failed_conversion(OPKELE_CP_ "failed to snprintf()"); |
145 | return rv; | 149 | return rv; |
146 | } | 150 | } |
147 | 151 | ||
148 | long string_to_long(const string& s) { | 152 | long string_to_long(const string& s) { |
149 | char *endptr = 0; | 153 | char *endptr = 0; |
150 | long rv = strtol(s.c_str(),&endptr,10); | 154 | long rv = strtol(s.c_str(),&endptr,10); |
151 | if((!endptr) || endptr==s.c_str()) | 155 | if((!endptr) || endptr==s.c_str()) |
152 | throw failed_conversion(OPKELE_CP_ "failed to strtol()"); | 156 | throw failed_conversion(OPKELE_CP_ "failed to strtol()"); |
153 | return rv; | 157 | return rv; |
154 | } | 158 | } |
155 | 159 | ||
156 | } | 160 | } |
157 | 161 | ||
158 | } | 162 | } |