line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::xDBM_File; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
644
|
use strict; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
35
|
|
4
|
1
|
|
|
1
|
|
4
|
use vars qw($VERSION); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
1651
|
|
5
|
|
|
|
|
|
|
|
6
|
|
|
|
|
|
|
$VERSION = '1.02'; |
7
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
# Preloaded methods go here. |
9
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
sub _encrypt_string { |
11
|
11
|
|
|
11
|
|
22
|
my ($self, $string, $block_size) = @_; |
12
|
11
|
|
|
|
|
13
|
my ($i, $len, $tmp_string, $crypt_string); |
13
|
|
|
|
|
|
|
|
14
|
11
|
|
|
|
|
13
|
$string .= "+"; # pad marker |
15
|
11
|
|
|
|
|
15
|
$len = $block_size - (length($string) % $block_size); |
16
|
11
|
50
|
|
|
|
26
|
if ($len != $block_size) { |
17
|
11
|
|
|
|
|
20
|
$string .= "\0" x $len; |
18
|
|
|
|
|
|
|
} |
19
|
11
|
|
|
|
|
13
|
$len = length($string); |
20
|
11
|
|
|
|
|
13
|
$crypt_string = ""; |
21
|
11
|
|
|
|
|
25
|
for ($i=0; $i < $len; $i += $block_size) { |
22
|
14
|
|
|
|
|
55
|
$tmp_string = $self->{'cipher'}->encrypt(substr($string, |
23
|
|
|
|
|
|
|
$i, $block_size)); |
24
|
14
|
|
|
|
|
140
|
$crypt_string .= $tmp_string; |
25
|
|
|
|
|
|
|
} |
26
|
11
|
|
|
|
|
43
|
return $crypt_string; |
27
|
|
|
|
|
|
|
} |
28
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
sub _decrypt_string { # should already be padded to block size |
30
|
3
|
|
|
3
|
|
5
|
my ($self, $crypted_string, $block_size) = @_; |
31
|
3
|
|
|
|
|
4
|
my ($i, $len, $tmp_string, $string); |
32
|
|
|
|
|
|
|
|
33
|
3
|
|
|
|
|
4
|
$len = length($crypted_string); |
34
|
3
|
|
|
|
|
12
|
$string = ""; |
35
|
3
|
|
|
|
|
9
|
for ($i=0; $i < $len; $i += $block_size) { |
36
|
6
|
|
|
|
|
22
|
$tmp_string = $self->{'cipher'}->decrypt(substr($crypted_string, |
37
|
|
|
|
|
|
|
$i, $block_size)); |
38
|
6
|
|
|
|
|
59
|
$string .= $tmp_string; |
39
|
|
|
|
|
|
|
} |
40
|
3
|
|
|
|
|
73
|
return (substr($string, 0, rindex($string, "+"))); |
41
|
|
|
|
|
|
|
} |
42
|
|
|
|
|
|
|
|
43
|
|
|
|
|
|
|
sub TIEHASH { # associate hash variable to these routines |
44
|
1
|
|
|
1
|
|
51
|
my ($pkg) = shift @_; |
45
|
1
|
|
|
|
|
2
|
my $self = {}; |
46
|
|
|
|
|
|
|
|
47
|
1
|
|
|
|
|
4
|
$self->{'crypt_method'} = shift @_; |
48
|
1
|
|
|
|
|
4
|
$self->{'key'} = shift @_; |
49
|
|
|
|
|
|
|
|
50
|
1
|
|
|
|
|
3
|
$self->{'key_pad'} = keysize {$self->{'crypt_method'}}; |
|
1
|
|
|
|
|
10
|
|
51
|
1
|
50
|
|
|
|
7
|
if ($self->{'key_pad'} == 0) { # pad to 8 byte boundary by default |
52
|
1
|
|
|
|
|
3
|
$self->{'key_pad'} = 8; |
53
|
|
|
|
|
|
|
} |
54
|
1
|
|
|
|
|
2
|
$self->{'block_pad'} = blocksize {$self->{'crypt_method'}}; |
|
1
|
|
|
|
|
6
|
|
55
|
1
|
50
|
|
|
|
8
|
if ($self->{'block_pad'} == 0) { # pad to 8 byte boundary by default |
56
|
0
|
|
|
|
|
0
|
$self->{'block_pad'} = 8; |
57
|
|
|
|
|
|
|
} |
58
|
|
|
|
|
|
|
# print "key_pad = [$self->{'key_pad'}]\n"; |
59
|
|
|
|
|
|
|
# print "block_pad = [$self->{'block_pad'}]\n"; |
60
|
|
|
|
|
|
|
# print "crypt method [$self->{'crypt_method'}], key [$self->{'key'}]\n"; |
61
|
|
|
|
|
|
|
|
62
|
1
|
|
|
|
|
4
|
my $len = length($self->{'key'}) % $self->{'key_pad'}; |
63
|
1
|
|
|
|
|
5
|
$self->{'key'} .= ' ' x ($self->{'key_pad'} - $len); |
64
|
1
|
|
|
|
|
4
|
$self->{'key'} = substr($self->{'key'}, 0, $self->{'key_pad'}); |
65
|
1
|
|
|
|
|
2
|
$self->{'cipher'} = new {$self->{'crypt_method'}} $self->{'key'}; |
|
1
|
|
|
|
|
9
|
|
66
|
1
|
|
|
|
|
111
|
tie %{$self->{'localhash'}}, shift @_, @_; |
|
1
|
|
|
|
|
81
|
|
67
|
1
|
|
|
|
|
5
|
return (bless $self, $pkg); |
68
|
|
|
|
|
|
|
} |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
sub FETCH { # get an encrypted item and decrypt it |
71
|
3
|
|
|
3
|
|
21
|
my ($self, $key) = @_; |
72
|
3
|
|
|
|
|
8
|
my $crypted_key = $self->_encrypt_string($key, $self->{'block_pad'}); |
73
|
3
|
|
|
|
|
18
|
my $crypted_value = $self->{'localhash'}{$crypted_key}; |
74
|
3
|
50
|
|
|
|
9
|
if (defined($crypted_value)) { |
75
|
3
|
|
|
|
|
11
|
return ($self->_decrypt_string($crypted_value, $self->{'block_pad'})); |
76
|
|
|
|
|
|
|
} else { |
77
|
0
|
|
|
|
|
0
|
return; |
78
|
|
|
|
|
|
|
} |
79
|
|
|
|
|
|
|
} |
80
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
sub STORE { # get an encrypted item and decrypt it |
82
|
3
|
|
|
3
|
|
33
|
my ($self, $key, $value) = @_; |
83
|
3
|
|
|
|
|
13
|
my $crypted_key = $self->_encrypt_string($key, $self->{'block_pad'}); |
84
|
3
|
|
|
|
|
9
|
my $crypted_value = $self->_encrypt_string($value, $self->{'block_pad'}); |
85
|
3
|
|
|
|
|
104
|
return ($self->{'localhash'}{$crypted_key} = $crypted_value); |
86
|
|
|
|
|
|
|
} |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
sub DELETE { # delete an item |
89
|
1
|
|
|
1
|
|
11
|
my ($self, $key) = @_; |
90
|
1
|
|
|
|
|
9
|
my $crypted_key = $self->_encrypt_string($key, $self->{'block_pad'}); |
91
|
|
|
|
|
|
|
|
92
|
1
|
|
|
|
|
22
|
return (delete $self->{'localhash'}{$crypted_key}); |
93
|
|
|
|
|
|
|
} |
94
|
|
|
|
|
|
|
|
95
|
|
|
|
|
|
|
sub EXISTS { # does it exist |
96
|
1
|
|
|
1
|
|
8
|
my ($self, $key) = @_; |
97
|
1
|
|
|
|
|
4
|
my $crypted_key = $self->_encrypt_string($key, $self->{'block_pad'}); |
98
|
|
|
|
|
|
|
|
99
|
1
|
|
|
|
|
9
|
return (exists $self->{'localhash'}{$crypted_key}); |
100
|
|
|
|
|
|
|
} |
101
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
sub FIRSTKEY { # first key request |
103
|
0
|
|
|
0
|
|
0
|
my $self = shift; |
104
|
0
|
|
|
|
|
0
|
my ($key, $crypted_key); |
105
|
|
|
|
|
|
|
|
106
|
0
|
|
|
|
|
0
|
keys(%{$self->{'localhash'}}); # reset eachness |
|
0
|
|
|
|
|
0
|
|
107
|
0
|
|
|
|
|
0
|
return($self->NEXTKEY()); |
108
|
|
|
|
|
|
|
} |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
sub NEXTKEY { |
111
|
0
|
|
|
0
|
|
0
|
my $self = shift; |
112
|
0
|
|
|
|
|
0
|
my $crypted_key = each (%{$self->{'localhash'}}); |
|
0
|
|
|
|
|
0
|
|
113
|
0
|
0
|
|
|
|
0
|
if (defined $crypted_key) { |
114
|
0
|
|
|
|
|
0
|
return ($self->_decrypt_string($crypted_key, $self->{'block_pad'})); |
115
|
|
|
|
|
|
|
} else { |
116
|
0
|
|
|
|
|
0
|
return; |
117
|
|
|
|
|
|
|
} |
118
|
|
|
|
|
|
|
} |
119
|
|
|
|
|
|
|
|
120
|
|
|
|
|
|
|
sub CLEAR { |
121
|
0
|
|
|
0
|
|
0
|
my $self = shift; |
122
|
0
|
|
|
|
|
0
|
return ($self->{'localhash'} = ()); |
123
|
|
|
|
|
|
|
} |
124
|
|
|
|
|
|
|
|
125
|
|
|
|
|
|
|
sub DESTROY { |
126
|
1
|
|
|
1
|
|
13
|
my $self = shift; |
127
|
1
|
|
|
|
|
2
|
return (untie %{$self->{'localhash'}}); |
|
1
|
|
|
|
|
39
|
|
128
|
|
|
|
|
|
|
} |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
# Autoload methods go after =cut, and are processed by the autosplit program. |
132
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
1; |
134
|
|
|
|
|
|
|
__END__ |