diff options
author | Jeffrey Walton <noloader@gmail.com> | 2015-07-26 16:03:14 -0400 |
---|---|---|
committer | Jeffrey Walton <noloader@gmail.com> | 2015-07-26 16:03:14 -0400 |
commit | b7de164d6251dc066123b59bc15d30c74e920756 (patch) | |
tree | 650e67242386d55616a2038c5cbc7042568ed377 /pwdbased.h | |
parent | 7b64ca489a7e1da36b02b4a35d149275914d8268 (diff) | |
download | cryptopp-git-b7de164d6251dc066123b59bc15d30c74e920756.tar.gz |
Cut-in CRYPTOPP_ASSERT in all remaining header and source files
Diffstat (limited to 'pwdbased.h')
-rw-r--r-- | pwdbased.h | 12 |
1 files changed, 6 insertions, 6 deletions
@@ -57,8 +57,8 @@ public: template <class T> unsigned int PKCS5_PBKDF1<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const { - assert(derivedLen <= MaxDerivedKeyLength()); - assert(iterations > 0 || timeInSeconds > 0); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); + CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0); if (!iterations) iterations = 1; @@ -86,8 +86,8 @@ unsigned int PKCS5_PBKDF1<T>::DeriveKey(byte *derived, size_t derivedLen, byte p template <class T> unsigned int PKCS5_PBKDF2_HMAC<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const { - assert(derivedLen <= MaxDerivedKeyLength()); - assert(iterations > 0 || timeInSeconds > 0); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); + CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0); if (!iterations) iterations = 1; @@ -150,8 +150,8 @@ public: template <class T> unsigned int PKCS12_PBKDF<T>::DeriveKey(byte *derived, size_t derivedLen, byte purpose, const byte *password, size_t passwordLen, const byte *salt, size_t saltLen, unsigned int iterations, double timeInSeconds) const { - assert(derivedLen <= MaxDerivedKeyLength()); - assert(iterations > 0 || timeInSeconds > 0); + CRYPTOPP_ASSERT(derivedLen <= MaxDerivedKeyLength()); + CRYPTOPP_ASSERT(iterations > 0 || timeInSeconds > 0); if (!iterations) iterations = 1; |