Merge 9796e7a903 into 7b901f8edc
commit
794cf790c9
33
chacha.cpp
33
chacha.cpp
|
|
@ -27,11 +27,17 @@ void ChaCha_TestInstantiations()
|
|||
}
|
||||
#endif
|
||||
|
||||
template <unsigned int R>
|
||||
void ChaCha_Policy<R>::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
|
||||
void ChaCha_Policy::CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length)
|
||||
{
|
||||
CRYPTOPP_UNUSED(params);
|
||||
m_rounds = params.GetIntValueWithDefault(Name::Rounds(), 20);
|
||||
|
||||
if (!(m_rounds == 8 || m_rounds == 12 || m_rounds == 20))
|
||||
throw InvalidRounds(ChaCha::StaticAlgorithmName(), m_rounds);
|
||||
<<<<<<< HEAD
|
||||
|
||||
assert(length == 16 || length == 32);
|
||||
=======
|
||||
>>>>>>> origin/ChaCha-VarRounds
|
||||
|
||||
// "expand 16-byte k" or "expand 32-byte k"
|
||||
m_state[0] = 0x61707865;
|
||||
|
|
@ -46,8 +52,7 @@ void ChaCha_Policy<R>::CipherSetKey(const NameValuePairs ¶ms, const byte *ke
|
|||
get2(m_state[8])(m_state[9])(m_state[10])(m_state[11]);
|
||||
}
|
||||
|
||||
template <unsigned int R>
|
||||
void ChaCha_Policy<R>::CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length)
|
||||
void ChaCha_Policy::CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length)
|
||||
{
|
||||
CRYPTOPP_UNUSED(keystreamBuffer), CRYPTOPP_UNUSED(length);
|
||||
assert(length==8);
|
||||
|
|
@ -57,11 +62,10 @@ void ChaCha_Policy<R>::CipherResynchronize(byte *keystreamBuffer, const byte *IV
|
|||
get(m_state[14])(m_state[15]);
|
||||
}
|
||||
|
||||
template<unsigned int R>
|
||||
void ChaCha_Policy<R>::SeekToIteration(lword iterationCount)
|
||||
void ChaCha_Policy::SeekToIteration(lword iterationCount)
|
||||
{
|
||||
CRYPTOPP_UNUSED(iterationCount);
|
||||
throw NotImplemented(std::string(ChaCha_Info<R>::StaticAlgorithmName()) + ": SeekToIteration is not yet implemented");
|
||||
throw NotImplemented(std::string(ChaCha_Info::StaticAlgorithmName()) + ": SeekToIteration is not yet implemented");
|
||||
|
||||
// TODO: these were Salsa20, and Wei re-arranged the state array for SSE2 operations.
|
||||
// If we can generate some out-of-band test vectors, then test and implement. Also
|
||||
|
|
@ -70,8 +74,7 @@ void ChaCha_Policy<R>::SeekToIteration(lword iterationCount)
|
|||
// m_state[5] = (word32)SafeRightShift<32>(iterationCount);
|
||||
}
|
||||
|
||||
template<unsigned int R>
|
||||
unsigned int ChaCha_Policy<R>::GetAlignment() const
|
||||
unsigned int ChaCha_Policy::GetAlignment() const
|
||||
{
|
||||
#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE && 0
|
||||
if (HasSSE2())
|
||||
|
|
@ -81,8 +84,7 @@ unsigned int ChaCha_Policy<R>::GetAlignment() const
|
|||
return GetAlignmentOf<word32>();
|
||||
}
|
||||
|
||||
template<unsigned int R>
|
||||
unsigned int ChaCha_Policy<R>::GetOptimalBlockSize() const
|
||||
unsigned int ChaCha_Policy::GetOptimalBlockSize() const
|
||||
{
|
||||
#if CRYPTOPP_BOOL_SSE2_ASM_AVAILABLE && 0
|
||||
if (HasSSE2())
|
||||
|
|
@ -92,8 +94,7 @@ unsigned int ChaCha_Policy<R>::GetOptimalBlockSize() const
|
|||
return BYTES_PER_ITERATION;
|
||||
}
|
||||
|
||||
template<unsigned int R>
|
||||
void ChaCha_Policy<R>::OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount)
|
||||
void ChaCha_Policy::OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount)
|
||||
{
|
||||
word32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15;
|
||||
|
||||
|
|
@ -104,7 +105,7 @@ void ChaCha_Policy<R>::OperateKeystream(KeystreamOperation operation, byte *outp
|
|||
x8 = m_state[8]; x9 = m_state[9]; x10 = m_state[10]; x11 = m_state[11];
|
||||
x12 = m_state[12]; x13 = m_state[13]; x14 = m_state[14]; x15 = m_state[15];
|
||||
|
||||
for (int i = static_cast<int>(ROUNDS); i > 0; i -= 2)
|
||||
for (int i = static_cast<int>(m_rounds); i > 0; i -= 2)
|
||||
{
|
||||
CHACHA_QUARTER_ROUND(x0, x4, x8, x12);
|
||||
CHACHA_QUARTER_ROUND(x1, x5, x9, x13);
|
||||
|
|
@ -145,9 +146,11 @@ void ChaCha_Policy<R>::OperateKeystream(KeystreamOperation operation, byte *outp
|
|||
}
|
||||
}
|
||||
|
||||
/*
|
||||
template class ChaCha_Policy<8>;
|
||||
template class ChaCha_Policy<12>;
|
||||
template class ChaCha_Policy<20>;
|
||||
*/
|
||||
|
||||
NAMESPACE_END
|
||||
|
||||
|
|
|
|||
54
chacha.h
54
chacha.h
|
|
@ -4,32 +4,37 @@
|
|||
// family implementation at http://cr.yp.to/chacha.html.
|
||||
|
||||
//! \file chacha.h
|
||||
//! \brief Classes for ChaCha8, ChaCha12 and ChaCha20 stream ciphers
|
||||
//! \brief Classes for the ChaCha family of stream ciphers
|
||||
|
||||
#ifndef CRYPTOPP_CHACHA_H
|
||||
#define CRYPTOPP_CHACHA_H
|
||||
|
||||
#include "strciphr.h"
|
||||
#include "secblock.h"
|
||||
#include "algparam.h" // for MakeParameters()
|
||||
|
||||
NAMESPACE_BEGIN(CryptoPP)
|
||||
|
||||
//! \class ChaCha_Info
|
||||
//! \brief ChaCha stream cipher information
|
||||
struct ChaCha_Info : public VariableKeyLength<32, 16, 32, 16, SimpleKeyingInterface::UNIQUE_IV, 8>
|
||||
{
|
||||
static const char *StaticAlgorithmName() {static const std::string name = "ChaCha"; return name.c_str();}
|
||||
};
|
||||
|
||||
//! \class ChaChaFR_Info
|
||||
//! \brief ChaCha stream cipher information for compile-time fixed rounds
|
||||
template<unsigned int R>
|
||||
struct ChaCha_Info : public VariableKeyLength<32, 16, 32, 16, SimpleKeyingInterface::UNIQUE_IV, 8>, public FixedRounds<R>
|
||||
struct ChaChaFR_Info : public VariableKeyLength<32, 16, 32, 16, SimpleKeyingInterface::UNIQUE_IV, 8>, public FixedRounds<R>
|
||||
{
|
||||
static const char *StaticAlgorithmName() { static const std::string name = "ChaCha" + IntToString(R); return name.c_str(); }
|
||||
};
|
||||
|
||||
//! \class ChaCha_Policy
|
||||
//! \brief ChaCha stream cipher implementation
|
||||
template <unsigned int R>
|
||||
class CRYPTOPP_NO_VTABLE ChaCha_Policy : public AdditiveCipherConcretePolicy<word32, 16>
|
||||
{
|
||||
protected:
|
||||
CRYPTOPP_CONSTANT(ROUNDS=FixedRounds<R>::ROUNDS);
|
||||
|
||||
void CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length);
|
||||
void OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount);
|
||||
void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length);
|
||||
|
|
@ -39,33 +44,54 @@ protected:
|
|||
unsigned int GetOptimalBlockSize() const;
|
||||
|
||||
FixedSizeAlignedSecBlock<word32, 16> m_state;
|
||||
unsigned int m_rounds;
|
||||
};
|
||||
|
||||
//! \class ChaCha_Policy
|
||||
//! \brief ChaCha stream cipher implementation for fixed rounds
|
||||
template<unsigned int R>
|
||||
class CRYPTOPP_NO_VTABLE ChaChaFR_Policy : public ChaCha_Policy
|
||||
{
|
||||
protected:
|
||||
CRYPTOPP_CONSTANT(ROUNDS = FixedRounds<R>::ROUNDS);
|
||||
|
||||
void CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length) { CRYPTOPP_UNUSED(params); ChaCha_Policy::CipherSetKey(MakeParameters(Name::Rounds(), ROUNDS), key, length); }
|
||||
};
|
||||
|
||||
//! \class ChaCha8
|
||||
//! \brief ChaCha8 stream cipher
|
||||
//! \sa <a href="http://cr.yp.to/chacha/chacha-20080128.pdf">ChaCha, a variant of Salsa20</a> (2008.01.28).
|
||||
struct ChaCha8 : public ChaCha_Info<8>, public SymmetricCipherDocumentation
|
||||
struct ChaCha8 : public ChaChaFR_Info<8>, public SymmetricCipherDocumentation
|
||||
{
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy<8>, AdditiveCipherTemplate<> >, ChaCha_Info<8> > Encryption;
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy<8>, AdditiveCipherTemplate<> >, ChaCha_Info<8> > Decryption;
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaChaFR_Policy<8>, AdditiveCipherTemplate<> >, ChaChaFR_Info<8> > Encryption;
|
||||
typedef Encryption Decryption;
|
||||
};
|
||||
|
||||
//! \class ChaCha12
|
||||
//! \brief ChaCha12 stream cipher
|
||||
//! \sa <a href="http://cr.yp.to/chacha/chacha-20080128.pdf">ChaCha, a variant of Salsa20</a> (2008.01.28).
|
||||
struct ChaCha12 : public ChaCha_Info<12>, public SymmetricCipherDocumentation
|
||||
struct ChaCha12 : public ChaChaFR_Info<12>, public SymmetricCipherDocumentation
|
||||
{
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy<12>, AdditiveCipherTemplate<> >, ChaCha_Info<12> > Encryption;
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy<12>, AdditiveCipherTemplate<> >, ChaCha_Info<12> > Decryption;
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaChaFR_Policy<12>, AdditiveCipherTemplate<> >, ChaChaFR_Info<12> > Encryption;
|
||||
typedef Encryption Decryption;
|
||||
};
|
||||
|
||||
//! \class ChaCha20
|
||||
//! \brief ChaCha20 stream cipher
|
||||
//! \sa <a href="http://cr.yp.to/chacha/chacha-20080128.pdf">ChaCha, a variant of Salsa20</a> (2008.01.28).
|
||||
struct ChaCha20 : public ChaCha_Info<20>, public SymmetricCipherDocumentation
|
||||
struct ChaCha20 : public ChaChaFR_Info<20>, public SymmetricCipherDocumentation
|
||||
{
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy<20>, AdditiveCipherTemplate<> >, ChaCha_Info<20> > Encryption;
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy<20>, AdditiveCipherTemplate<> >, ChaCha_Info<20> > Decryption;
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaChaFR_Policy<20>, AdditiveCipherTemplate<> >, ChaChaFR_Info<20> > Encryption;
|
||||
typedef Encryption Decryption;
|
||||
};
|
||||
|
||||
//! \class ChaCha
|
||||
//! \brief ChaCha stream cipher
|
||||
//! \sa <a href="http://cr.yp.to/chacha/chacha-20080128.pdf">ChaCha, a variant of Salsa20</a> (2008.01.28).
|
||||
struct ChaCha : public ChaCha_Info, public SymmetricCipherDocumentation
|
||||
{
|
||||
typedef SymmetricCipherFinal<ConcretePolicyHolder<ChaCha_Policy, AdditiveCipherTemplate<> >, ChaCha_Info > Encryption;
|
||||
typedef Encryption Decryption;
|
||||
};
|
||||
|
||||
NAMESPACE_END
|
||||
|
|
|
|||
Loading…
Reference in New Issue