diff options
| author | tomsmeding <tom.smeding@gmail.com> | 2016-10-08 11:56:47 +0200 | 
|---|---|---|
| committer | tomsmeding <tom.smeding@gmail.com> | 2016-10-08 11:56:47 +0200 | 
| commit | f49e2058ad2c6d7eedded27fa41bd30405db5aaa (patch) | |
| tree | 30dc9842617c58ffc9313c8a9c1b254fdc1e8176 | |
| parent | 2fe3a5f06bf4423fbb881238b30f6f592b5c0127 (diff) | |
Make parameter order a bit more consistent
| -rw-r--r-- | aes.cpp | 12 | ||||
| -rw-r--r-- | aes.h | 4 | ||||
| -rw-r--r-- | main.cpp | 4 | ||||
| -rw-r--r-- | rsa.cpp | 6 | ||||
| -rw-r--r-- | rsa.h | 4 | 
5 files changed, 16 insertions, 14 deletions
| @@ -174,7 +174,7 @@ namespace AES{  		addRoundKey(state,keysched);  	} -	string encryptCBC(const string &key,const string &data,int numrounds){ +	string encryptCBC(const string &data,const string &key,int numrounds){  		if(roundconstant[0]==0)initTables();  		int sz=data.size(); @@ -211,7 +211,7 @@ namespace AES{  		return res;  	} -	string decryptCBC(const string &key,const string &data,int numrounds){ +	string decryptCBC(const string &data,const string &key,int numrounds){  		if(roundconstant[0]==0)initTables();  		if(data.size()==0)return {}; @@ -232,7 +232,7 @@ namespace AES{  		return res;  	} -	string encrypt(const string &key,const string &data,Algorithm algo){ +	string encrypt(const string &data,const string &key,Algorithm algo){  		int increment;  		switch(algo){  			case AES_128_CBC: increment=0; break; @@ -241,10 +241,10 @@ namespace AES{  			default: assert(false);  		}  		assert((int)key.size()==4*(4+2*increment)); -		return encryptCBC(key,data,10+2*increment); +		return encryptCBC(data,key,10+2*increment);  	} -	string decrypt(const string &key,const string &data,Algorithm algo){ +	string decrypt(const string &data,const string &key,Algorithm algo){  		int increment;  		switch(algo){  			case AES_128_CBC: increment=0; break; @@ -253,7 +253,7 @@ namespace AES{  			default: assert(false);  		}  		assert((int)key.size()==4*(4+2*increment)); -		return decryptCBC(key,data,10+2*increment); +		return decryptCBC(data,key,10+2*increment);  	}  	void test(){ @@ -10,10 +10,10 @@ namespace AES{  		AES_256_CBC,  	}; -	std::string encrypt(const std::string &key,const std::string &data,Algorithm algo); +	std::string encrypt(const std::string &data,const std::string &key,Algorithm algo);  	//throws invalid_argument for an invalid ciphertext (length not a multiple of block size, or padding malformed) -	std::string decrypt(const std::string &key,const std::string &data,Algorithm algo); +	std::string decrypt(const std::string &data,const std::string &key,Algorithm algo);  	void test(); @@ -143,9 +143,9 @@ void performrsa(){  	cout<<"d = "<<privkey.pexp<<endl;  	Bigint msg(123456789);  	cout<<"msg = "<<msg<<endl; -	Bigint encr=RSA::encrypt(privkey.pub,msg); +	Bigint encr=RSA::encrypt(msg,privkey.pub);  	cout<<"encr = "<<encr<<endl; -	Bigint msg2=RSA::decrypt(privkey,encr); +	Bigint msg2=RSA::decrypt(encr,privkey);  	cout<<"msg = "<<msg2<<endl;  } @@ -10,12 +10,14 @@ using namespace std;  namespace RSA{ -	Bigint encrypt(const PublicKey &pubkey,Bigint msg){ +	Bigint encrypt(Bigint msg,const PublicKey &pubkey){ +		// cerr<<"msg="<<msg<<endl; +		// cerr<<"mod="<<pubkey.mod<<endl;  		assert(msg>1&&msg<pubkey.mod);  		return expmod(msg,pubkey.exp,pubkey.mod);  	} -	Bigint decrypt(const PrivateKey &privkey,Bigint encr){ +	Bigint decrypt(Bigint encr,const PrivateKey &privkey){  		return expmod(encr,privkey.pexp,privkey.pub.mod);  	} @@ -15,8 +15,8 @@ namespace RSA{  		Bigint pexp;  	}; -	Bigint encrypt(const PublicKey &key,Bigint msg); -	Bigint decrypt(const PrivateKey &key,Bigint msg); +	Bigint encrypt(Bigint msg,const PublicKey &key); +	Bigint decrypt(Bigint msg,const PrivateKey &key);  	PrivateKey genkey(int nbits); //nbits is target number of bits of modulus  	PrivateKey genkey(int nbits,const std::string &password); //generates key seeded by password | 
