summaryrefslogtreecommitdiff
path: root/src/AS_DCP_AES.cpp
diff options
context:
space:
mode:
authorCarl Hetherington <cth@carlh.net>2016-07-01 12:22:38 +0100
committerCarl Hetherington <cth@carlh.net>2019-12-03 17:01:32 +0100
commitdfb6aa39a8000fc071dfa0680584dae173535c9a (patch)
treeccf64f8dbc81ab13d36f3319475fc0e59f95e2ec /src/AS_DCP_AES.cpp
parent8204f14304dd463a42f8540413cf95cf49e1f829 (diff)
Move public headers into src/asdcp and install them in a asdcp subdirectory.
Diffstat (limited to 'src/AS_DCP_AES.cpp')
-rwxr-xr-xsrc/AS_DCP_AES.cpp18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/AS_DCP_AES.cpp b/src/AS_DCP_AES.cpp
index 379e8ab..a320fb0 100755
--- a/src/AS_DCP_AES.cpp
+++ b/src/AS_DCP_AES.cpp
@@ -25,15 +25,15 @@ THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*! \file AS_DCP_AES.h
- \version $Id$
+ \version $Id$
\brief AS-DCP library, AES wrapper
*/
#include <assert.h>
-#include <AS_DCP.h>
+#include <asdcp/AS_DCP.h>
#include <KM_log.h>
-#include <KM_prng.h>
+#include <asdcp/KM_prng.h>
using Kumu::DefaultLogSink;
using namespace ASDCP;
@@ -142,8 +142,8 @@ ASDCP::AESEncContext::EncryptBlock(const byte_t* pt_buf, byte_t* ct_buf, ui32_t
{
// xor with the previous block
for ( ui32_t i = 0; i < CBC_BLOCK_SIZE; i++ )
- tmp_buf[i] = in_p[i] ^ Ctx->m_IVec[i];
-
+ tmp_buf[i] = in_p[i] ^ Ctx->m_IVec[i];
+
AES_encrypt(tmp_buf, Ctx->m_IVec, Ctx);
memcpy(out_p, Ctx->m_IVec, CBC_BLOCK_SIZE);
@@ -226,7 +226,7 @@ ASDCP::AESDecContext::DecryptBlock(const byte_t* ct_buf, byte_t* pt_buf, ui32_t
while ( block_size )
{
- AES_decrypt(in_p, out_p, Ctx);
+ AES_decrypt(in_p, out_p, Ctx);
for ( ui32_t i = 0; i < CBC_BLOCK_SIZE; i++ )
out_p[i] ^= Ctx->m_IVec[i];
@@ -276,7 +276,7 @@ public:
// MXF Interop MIC key generation
void SetInteropKey(const byte_t* key)
{
- static byte_t key_nonce[KeyLen] = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
+ static byte_t key_nonce[KeyLen] = { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff };
byte_t sha_buf[SHA_DIGEST_LENGTH];
@@ -411,7 +411,7 @@ HMACContext::Finalize()
{
if ( m_Context.empty() || m_Context->m_Final )
return RESULT_INIT;
-
+
m_Context->Finalize();
return RESULT_OK;
}
@@ -439,7 +439,7 @@ HMACContext::TestHMACValue(const byte_t* buf) const
if ( m_Context.empty() || ! m_Context->m_Final )
return RESULT_INIT;
-
+
return ( memcmp(buf, m_Context->m_SHAValue, HMAC_SIZE) == 0 ) ? RESULT_OK : RESULT_HMACFAIL;
}