}
BLOWFISH_CTX ctx;
-EnDecodeInit(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
+InitContext(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
char login[ADM_LOGIN_LEN + 1];
for (size_t i = 0; i < ADM_LOGIN_LEN / 8; i++)
- DecodeString(login + i * 8, loginS + i * 8, &ctx);
+ DecryptBlock(login + i * 8, loginS + i * 8, &ctx);
if (currAdmin == admins->GetNoAdmin())
{
requestList.clear();
BLOWFISH_CTX ctx;
-EnDecodeInit(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
+InitContext(currAdmin->GetPassword().c_str(), ADM_PASSWD_LEN, &ctx);
while (1)
{
char buffer[8];
buffer[7] = 0;
- DecodeString(buffer, bufferS, &ctx);
+ DecryptBlock(buffer, bufferS, &ctx);
requestList.push_back(std::string(buffer, pos));
if (done || memchr(buffer, 0, pos) != NULL)
if (ParseCommand())
return SendError(sock, "Bad command");
else
- return SendDataAnswer(sock, currParser->GetAnswer());
+ return SendDataAnswer(sock, GetDataAnswer());
}
}
//return 0;
return 0;
BLOWFISH_CTX ctx;
-EnDecodeInit(adminPassword.c_str(), ADM_PASSWD_LEN, &ctx);
+InitContext(adminPassword.c_str(), ADM_PASSWD_LEN, &ctx);
std::string::size_type pos = 0;
-std::string::size_type length = answer.length();
+std::string::size_type length = answer.length() + 1;
while (pos < length)
{
char buffer[1024];
std::string::size_type chunkLength = std::min(length - pos, sizeof(buffer));
- EncodeFullString(buffer, answer.c_str() + pos, chunkLength, ctx);
- if (send(sock, buffer, chunkLength, 0) < 0)
+ EncryptString(buffer, answer.c_str() + pos, chunkLength, &ctx);
+ if (send(sock, buffer, (chunkLength & ~7) < chunkLength ? chunkLength + 8 : chunkLength, 0) < 0) // Need to send data adjusted to the 8-byte boundary.
return -1;
pos += chunkLength;
}