changes related to the next FIPS validation
parent
bfd8ad2f1f
commit
c39b3de3c4
|
|
@ -1,5 +1,5 @@
|
||||||
Crypto++: a C++ Class Library of Cryptographic Schemes
|
Crypto++: a C++ Class Library of Cryptographic Schemes
|
||||||
Version 6.0 (in development)
|
Version 5.2.2 (in development)
|
||||||
|
|
||||||
This library includes:
|
This library includes:
|
||||||
|
|
||||||
|
|
@ -344,6 +344,7 @@ the mailing list.
|
||||||
- fixed inability to instantiate PanamaMAC
|
- fixed inability to instantiate PanamaMAC
|
||||||
- fixed problems with inline documentation
|
- fixed problems with inline documentation
|
||||||
|
|
||||||
6.0 - added SHA-224
|
5.2.2 - added SHA-224
|
||||||
|
- put SHA-256, SHA-384, SHA-512, RSASSA-PSS into DLL
|
||||||
|
|
||||||
Written by Wei Dai
|
Written by Wei Dai
|
||||||
|
|
|
||||||
|
|
@ -231,6 +231,9 @@ void BenchmarkAll(double t)
|
||||||
BenchMarkKeyless<Tiger>("Tiger", t);
|
BenchMarkKeyless<Tiger>("Tiger", t);
|
||||||
#endif
|
#endif
|
||||||
BenchMarkKeyless<RIPEMD160>("RIPE-MD160", t);
|
BenchMarkKeyless<RIPEMD160>("RIPE-MD160", t);
|
||||||
|
BenchMarkKeyless<RIPEMD320>("RIPE-MD320", t);
|
||||||
|
BenchMarkKeyless<RIPEMD128>("RIPE-MD128", t);
|
||||||
|
BenchMarkKeyless<RIPEMD256>("RIPE-MD256", t);
|
||||||
BenchMarkKeyless<PanamaHash<LittleEndian> >("Panama Hash (little endian)", t);
|
BenchMarkKeyless<PanamaHash<LittleEndian> >("Panama Hash (little endian)", t);
|
||||||
BenchMarkKeyless<PanamaHash<BigEndian> >("Panama Hash (big endian)", t);
|
BenchMarkKeyless<PanamaHash<BigEndian> >("Panama Hash (big endian)", t);
|
||||||
#ifdef WORD64_AVAILABLE
|
#ifdef WORD64_AVAILABLE
|
||||||
|
|
@ -280,7 +283,6 @@ void BenchmarkAll(double t)
|
||||||
BenchMarkKeyedVariable<SHACAL2::Encryption>("SHACAL-2 (512-bit key)", t, 64);
|
BenchMarkKeyedVariable<SHACAL2::Encryption>("SHACAL-2 (512-bit key)", t, 64);
|
||||||
#ifdef WORD64_AVAILABLE
|
#ifdef WORD64_AVAILABLE
|
||||||
BenchMarkKeyedVariable<Camellia::Encryption>("Camellia (128-bit key)", t, 16);
|
BenchMarkKeyedVariable<Camellia::Encryption>("Camellia (128-bit key)", t, 16);
|
||||||
BenchMarkKeyedVariable<Camellia::Encryption>("Camellia (192-bit key)", t, 24);
|
|
||||||
BenchMarkKeyedVariable<Camellia::Encryption>("Camellia (256-bit key)", t, 32);
|
BenchMarkKeyedVariable<Camellia::Encryption>("Camellia (256-bit key)", t, 32);
|
||||||
#endif
|
#endif
|
||||||
BenchMarkKeyed<MD5MAC>("MD5-MAC", t);
|
BenchMarkKeyed<MD5MAC>("MD5-MAC", t);
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
classes that provide a uniform interface to this library.
|
classes that provide a uniform interface to this library.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/*! \mainpage <a href="http://www.cryptopp.com">Crypto++</a><sup><small>TM</small></sup> Library 5.2.1 Reference Manual
|
/*! \mainpage <a href="http://www.cryptopp.com">Crypto++</a><sup><small>®</small></sup> Library 5.2.2 Reference Manual
|
||||||
<dl>
|
<dl>
|
||||||
<dt>Abstract Base Classes<dd>
|
<dt>Abstract Base Classes<dd>
|
||||||
cryptlib.h
|
cryptlib.h
|
||||||
|
|
|
||||||
14
dll.cpp
14
dll.cpp
|
|
@ -40,6 +40,20 @@ CRYPTOPP_DLL_TEMPLATE_CLASS AbstractEuclideanDomain<Integer>;
|
||||||
template<> const byte PKCS_DigestDecoration<SHA>::decoration[] = {0x30,0x21,0x30,0x09,0x06,0x05,0x2B,0x0E,0x03,0x02,0x1A,0x05,0x00,0x04,0x14};
|
template<> const byte PKCS_DigestDecoration<SHA>::decoration[] = {0x30,0x21,0x30,0x09,0x06,0x05,0x2B,0x0E,0x03,0x02,0x1A,0x05,0x00,0x04,0x14};
|
||||||
template<> const unsigned int PKCS_DigestDecoration<SHA>::length = sizeof(PKCS_DigestDecoration<SHA>::decoration);
|
template<> const unsigned int PKCS_DigestDecoration<SHA>::length = sizeof(PKCS_DigestDecoration<SHA>::decoration);
|
||||||
|
|
||||||
|
template<> const byte PKCS_DigestDecoration<SHA256>::decoration[] = {0x30,0x31,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x01,0x05,0x00,0x04,0x20};
|
||||||
|
template<> const unsigned int PKCS_DigestDecoration<SHA256>::length = sizeof(PKCS_DigestDecoration<SHA256>::decoration);
|
||||||
|
|
||||||
|
template<> const byte PKCS_DigestDecoration<SHA384>::decoration[] = {0x30,0x41,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x02,0x05,0x00,0x04,0x30};
|
||||||
|
template<> const unsigned int PKCS_DigestDecoration<SHA384>::length = sizeof(PKCS_DigestDecoration<SHA384>::decoration);
|
||||||
|
|
||||||
|
template<> const byte PKCS_DigestDecoration<SHA512>::decoration[] = {0x30,0x51,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x03,0x05,0x00,0x04,0x40};
|
||||||
|
template<> const unsigned int PKCS_DigestDecoration<SHA512>::length = sizeof(PKCS_DigestDecoration<SHA512>::decoration);
|
||||||
|
|
||||||
|
template<> const byte EMSA2HashId<SHA>::id = 0x33;
|
||||||
|
template<> const byte EMSA2HashId<SHA256>::id = 0x34;
|
||||||
|
template<> const byte EMSA2HashId<SHA384>::id = 0x36;
|
||||||
|
template<> const byte EMSA2HashId<SHA512>::id = 0x35;
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
||||||
1
dll.h
1
dll.h
|
|
@ -26,6 +26,7 @@
|
||||||
#include "nbtheory.h"
|
#include "nbtheory.h"
|
||||||
#include "osrng.h"
|
#include "osrng.h"
|
||||||
#include "pkcspad.h"
|
#include "pkcspad.h"
|
||||||
|
#include "pssr.h"
|
||||||
#include "randpool.h"
|
#include "randpool.h"
|
||||||
#include "rsa.h"
|
#include "rsa.h"
|
||||||
#include "sha.h"
|
#include "sha.h"
|
||||||
|
|
|
||||||
2
haval.h
2
haval.h
|
|
@ -6,6 +6,8 @@
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
/// <a href="http://www.weidai.com/scan-mirror/md.html#HAVAL">HAVAL</a>
|
/// <a href="http://www.weidai.com/scan-mirror/md.html#HAVAL">HAVAL</a>
|
||||||
|
/*! \warning HAVAL with 128-bit or 160-bit output is considered insecure, and should not be used
|
||||||
|
unless you absolutely need it for compatibility. */
|
||||||
class HAVAL : public IteratedHash<word32, LittleEndian, 128>
|
class HAVAL : public IteratedHash<word32, LittleEndian, 128>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
|
||||||
33
iterhash.cpp
33
iterhash.cpp
|
|
@ -6,11 +6,6 @@
|
||||||
|
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
HashInputTooLong::HashInputTooLong(const std::string &alg)
|
|
||||||
: InvalidDataFormat("IteratedHashBase: input data exceeds maximum allowed by hash function " + alg)
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
template <class T, class BASE> void IteratedHashBase<T, BASE>::Update(const byte *input, unsigned int len)
|
template <class T, class BASE> void IteratedHashBase<T, BASE>::Update(const byte *input, unsigned int len)
|
||||||
{
|
{
|
||||||
HashWordType oldCountLo = m_countLo, oldCountHi = m_countHi;
|
HashWordType oldCountLo = m_countLo, oldCountHi = m_countHi;
|
||||||
|
|
@ -80,9 +75,17 @@ template <class T, class BASE> byte * IteratedHashBase<T, BASE>::CreateUpdateSpa
|
||||||
template <class T, class BASE> unsigned int IteratedHashBase<T, BASE>::HashMultipleBlocks(const T *input, unsigned int length)
|
template <class T, class BASE> unsigned int IteratedHashBase<T, BASE>::HashMultipleBlocks(const T *input, unsigned int length)
|
||||||
{
|
{
|
||||||
unsigned int blockSize = BlockSize();
|
unsigned int blockSize = BlockSize();
|
||||||
|
bool noReverse = NativeByteOrderIs(GetByteOrder());
|
||||||
do
|
do
|
||||||
{
|
{
|
||||||
HashBlock(input);
|
if (noReverse)
|
||||||
|
HashEndianCorrectedBlock(input);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
ByteReverse(this->m_data.begin(), input, this->BlockSize());
|
||||||
|
HashEndianCorrectedBlock(this->m_data);
|
||||||
|
}
|
||||||
|
|
||||||
input += blockSize/sizeof(T);
|
input += blockSize/sizeof(T);
|
||||||
length -= blockSize;
|
length -= blockSize;
|
||||||
}
|
}
|
||||||
|
|
@ -111,4 +114,22 @@ template <class T, class BASE> void IteratedHashBase<T, BASE>::Restart()
|
||||||
Init();
|
Init();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
template <class T, class BASE> void IteratedHashBase<T, BASE>::TruncatedFinal(byte *digest, unsigned int size)
|
||||||
|
{
|
||||||
|
this->ThrowIfInvalidTruncatedSize(size);
|
||||||
|
|
||||||
|
PadLastBlock(this->BlockSize() - 2*sizeof(HashWordType));
|
||||||
|
ByteOrder order = this->GetByteOrder();
|
||||||
|
ConditionalByteReverse<HashWordType>(order, this->m_data, this->m_data, this->BlockSize() - 2*sizeof(HashWordType));
|
||||||
|
|
||||||
|
this->m_data[this->m_data.size()-2] = order ? this->GetBitCountHi() : this->GetBitCountLo();
|
||||||
|
this->m_data[this->m_data.size()-1] = order ? this->GetBitCountLo() : this->GetBitCountHi();
|
||||||
|
|
||||||
|
HashEndianCorrectedBlock(this->m_data);
|
||||||
|
ConditionalByteReverse<HashWordType>(order, this->m_digest, this->m_digest, this->DigestSize());
|
||||||
|
memcpy(digest, this->m_digest, size);
|
||||||
|
|
||||||
|
this->Restart(); // reinit for next use
|
||||||
|
}
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
|
||||||
73
iterhash.h
73
iterhash.h
|
|
@ -12,7 +12,8 @@ NAMESPACE_BEGIN(CryptoPP)
|
||||||
class CRYPTOPP_DLL HashInputTooLong : public InvalidDataFormat
|
class CRYPTOPP_DLL HashInputTooLong : public InvalidDataFormat
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
explicit HashInputTooLong(const std::string &alg);
|
explicit HashInputTooLong(const std::string &alg)
|
||||||
|
: InvalidDataFormat("IteratedHashBase: input data exceeds maximum allowed by hash function " + alg) {}
|
||||||
};
|
};
|
||||||
|
|
||||||
//! _
|
//! _
|
||||||
|
|
@ -29,6 +30,7 @@ public:
|
||||||
void Update(const byte *input, unsigned int length);
|
void Update(const byte *input, unsigned int length);
|
||||||
byte * CreateUpdateSpace(unsigned int &size);
|
byte * CreateUpdateSpace(unsigned int &size);
|
||||||
void Restart();
|
void Restart();
|
||||||
|
void TruncatedFinal(byte *digest, unsigned int size);
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
void SetBlockSize(unsigned int blockSize) {m_data.resize(blockSize / sizeof(HashWordType));}
|
void SetBlockSize(unsigned int blockSize) {m_data.resize(blockSize / sizeof(HashWordType));}
|
||||||
|
|
@ -37,10 +39,13 @@ protected:
|
||||||
T GetBitCountHi() const {return (m_countLo >> (8*sizeof(T)-3)) + (m_countHi << 3);}
|
T GetBitCountHi() const {return (m_countLo >> (8*sizeof(T)-3)) + (m_countHi << 3);}
|
||||||
T GetBitCountLo() const {return m_countLo << 3;}
|
T GetBitCountLo() const {return m_countLo << 3;}
|
||||||
|
|
||||||
virtual unsigned int HashMultipleBlocks(const T *input, unsigned int length);
|
|
||||||
void PadLastBlock(unsigned int lastBlockSize, byte padFirst=0x80);
|
void PadLastBlock(unsigned int lastBlockSize, byte padFirst=0x80);
|
||||||
virtual void Init() =0;
|
virtual void Init() =0;
|
||||||
virtual void HashBlock(const T *input) =0;
|
|
||||||
|
virtual ByteOrder GetByteOrder() const =0;
|
||||||
|
virtual void HashEndianCorrectedBlock(const HashWordType *data) =0;
|
||||||
|
virtual unsigned int HashMultipleBlocks(const T *input, unsigned int length);
|
||||||
|
void HashBlock(const HashWordType *input) {HashMultipleBlocks(input, BlockSize());}
|
||||||
|
|
||||||
SecBlock<T> m_data; // Data buffer
|
SecBlock<T> m_data; // Data buffer
|
||||||
SecBlock<T> m_digest; // Message digest
|
SecBlock<T> m_digest; // Message digest
|
||||||
|
|
@ -50,7 +55,7 @@ private:
|
||||||
};
|
};
|
||||||
|
|
||||||
#ifdef WORD64_AVAILABLE
|
#ifdef WORD64_AVAILABLE
|
||||||
CRYPTOPP_STATIC_TEMPLATE_CLASS IteratedHashBase<word64, HashTransformation>;
|
CRYPTOPP_DLL_TEMPLATE_CLASS IteratedHashBase<word64, HashTransformation>;
|
||||||
CRYPTOPP_STATIC_TEMPLATE_CLASS IteratedHashBase<word64, MessageAuthenticationCode>;
|
CRYPTOPP_STATIC_TEMPLATE_CLASS IteratedHashBase<word64, MessageAuthenticationCode>;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
@ -58,33 +63,23 @@ CRYPTOPP_DLL_TEMPLATE_CLASS IteratedHashBase<word32, HashTransformation>;
|
||||||
CRYPTOPP_STATIC_TEMPLATE_CLASS IteratedHashBase<word32, MessageAuthenticationCode>;
|
CRYPTOPP_STATIC_TEMPLATE_CLASS IteratedHashBase<word32, MessageAuthenticationCode>;
|
||||||
|
|
||||||
//! _
|
//! _
|
||||||
template <class T, class B, class BASE>
|
template <class T_HashWordType, class T_Endianness, unsigned int T_BlockSize, class T_Base = HashTransformation>
|
||||||
class CRYPTOPP_NO_VTABLE IteratedHashBase2 : public IteratedHashBase<T, BASE>
|
class CRYPTOPP_NO_VTABLE IteratedHash : public IteratedHashBase<T_HashWordType, T_Base>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
typedef B ByteOrderClass;
|
typedef T_Endianness ByteOrderClass;
|
||||||
typedef typename IteratedHashBase<T, BASE>::HashWordType HashWordType;
|
typedef T_HashWordType HashWordType;
|
||||||
|
|
||||||
|
enum {BLOCKSIZE = T_BlockSize};
|
||||||
|
CRYPTOPP_COMPILE_ASSERT((BLOCKSIZE & (BLOCKSIZE - 1)) == 0); // blockSize is a power of 2
|
||||||
|
|
||||||
|
ByteOrder GetByteOrder() const {return T_Endianness::ToEnum();}
|
||||||
|
|
||||||
inline static void CorrectEndianess(HashWordType *out, const HashWordType *in, unsigned int byteCount)
|
inline static void CorrectEndianess(HashWordType *out, const HashWordType *in, unsigned int byteCount)
|
||||||
{
|
{
|
||||||
ConditionalByteReverse(B::ToEnum(), out, in, byteCount);
|
ConditionalByteReverse(T_Endianness::ToEnum(), out, in, byteCount);
|
||||||
}
|
}
|
||||||
|
|
||||||
void TruncatedFinal(byte *digest, unsigned int size);
|
|
||||||
|
|
||||||
protected:
|
|
||||||
void HashBlock(const HashWordType *input);
|
|
||||||
virtual void HashEndianCorrectedBlock(const HashWordType *data) =0;
|
|
||||||
};
|
|
||||||
|
|
||||||
//! _
|
|
||||||
template <class T_HashWordType, class T_Endianness, unsigned int T_BlockSize, class T_Base = HashTransformation>
|
|
||||||
class CRYPTOPP_NO_VTABLE IteratedHash : public IteratedHashBase2<T_HashWordType, T_Endianness, T_Base>
|
|
||||||
{
|
|
||||||
public:
|
|
||||||
enum {BLOCKSIZE = T_BlockSize};
|
|
||||||
CRYPTOPP_COMPILE_ASSERT((BLOCKSIZE & (BLOCKSIZE - 1)) == 0); // blockSize is a power of 2
|
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
IteratedHash() {this->SetBlockSize(T_BlockSize);}
|
IteratedHash() {this->SetBlockSize(T_BlockSize);}
|
||||||
};
|
};
|
||||||
|
|
@ -108,36 +103,6 @@ protected:
|
||||||
void Init() {T_Transform::InitState(this->m_digest);}
|
void Init() {T_Transform::InitState(this->m_digest);}
|
||||||
};
|
};
|
||||||
|
|
||||||
// *************************************************************
|
|
||||||
|
|
||||||
template <class T, class B, class BASE> void IteratedHashBase2<T, B, BASE>::TruncatedFinal(byte *digest, unsigned int size)
|
|
||||||
{
|
|
||||||
this->ThrowIfInvalidTruncatedSize(size);
|
|
||||||
|
|
||||||
PadLastBlock(this->BlockSize() - 2*sizeof(HashWordType));
|
|
||||||
CorrectEndianess(this->m_data, this->m_data, this->BlockSize() - 2*sizeof(HashWordType));
|
|
||||||
|
|
||||||
this->m_data[this->m_data.size()-2] = B::ToEnum() ? this->GetBitCountHi() : this->GetBitCountLo();
|
|
||||||
this->m_data[this->m_data.size()-1] = B::ToEnum() ? this->GetBitCountLo() : this->GetBitCountHi();
|
|
||||||
|
|
||||||
HashEndianCorrectedBlock(this->m_data);
|
|
||||||
CorrectEndianess(this->m_digest, this->m_digest, this->DigestSize());
|
|
||||||
memcpy(digest, this->m_digest, size);
|
|
||||||
|
|
||||||
this->Restart(); // reinit for next use
|
|
||||||
}
|
|
||||||
|
|
||||||
template <class T, class B, class BASE> void IteratedHashBase2<T, B, BASE>::HashBlock(const HashWordType *input)
|
|
||||||
{
|
|
||||||
if (NativeByteOrderIs(B::ToEnum()))
|
|
||||||
HashEndianCorrectedBlock(input);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
ByteReverse(this->m_data.begin(), input, this->BlockSize());
|
|
||||||
HashEndianCorrectedBlock(this->m_data);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
||||||
2
md4.h
2
md4.h
|
|
@ -7,7 +7,7 @@ NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
//! <a href="http://www.weidai.com/scan-mirror/md.html#MD4">MD4</a>
|
//! <a href="http://www.weidai.com/scan-mirror/md.html#MD4">MD4</a>
|
||||||
/*! \warning MD4 is considered insecure, and should not be used
|
/*! \warning MD4 is considered insecure, and should not be used
|
||||||
unless you absolutely need compatibility with a broken product. */
|
unless you absolutely need it for compatibility. */
|
||||||
class MD4 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 16, MD4>
|
class MD4 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 16, MD4>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
|
||||||
3
md5.h
3
md5.h
|
|
@ -6,7 +6,8 @@
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
//! <a href="http://www.weidai.com/scan-mirror/md.html#MD5">MD5</a>
|
//! <a href="http://www.weidai.com/scan-mirror/md.html#MD5">MD5</a>
|
||||||
/*! 128 Bit Hash */
|
/*! \warning MD5 is considered insecure, and should not be used
|
||||||
|
unless you absolutely need it for compatibility. */
|
||||||
class MD5 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 16, MD5>
|
class MD5 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 16, MD5>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
|
||||||
10
pkcspad.cpp
10
pkcspad.cpp
|
|
@ -7,6 +7,7 @@
|
||||||
|
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
|
// more in dll.cpp
|
||||||
template<> const byte PKCS_DigestDecoration<MD2>::decoration[] = {0x30,0x20,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x02,0x05,0x00,0x04,0x10};
|
template<> const byte PKCS_DigestDecoration<MD2>::decoration[] = {0x30,0x20,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x02,0x05,0x00,0x04,0x10};
|
||||||
template<> const unsigned int PKCS_DigestDecoration<MD2>::length = sizeof(PKCS_DigestDecoration<MD2>::decoration);
|
template<> const unsigned int PKCS_DigestDecoration<MD2>::length = sizeof(PKCS_DigestDecoration<MD2>::decoration);
|
||||||
|
|
||||||
|
|
@ -19,15 +20,6 @@ template<> const unsigned int PKCS_DigestDecoration<RIPEMD160>::length = sizeof(
|
||||||
template<> const byte PKCS_DigestDecoration<Tiger>::decoration[] = {0x30,0x29,0x30,0x0D,0x06,0x09,0x2B,0x06,0x01,0x04,0x01,0xDA,0x47,0x0C,0x02,0x05,0x00,0x04,0x18};
|
template<> const byte PKCS_DigestDecoration<Tiger>::decoration[] = {0x30,0x29,0x30,0x0D,0x06,0x09,0x2B,0x06,0x01,0x04,0x01,0xDA,0x47,0x0C,0x02,0x05,0x00,0x04,0x18};
|
||||||
template<> const unsigned int PKCS_DigestDecoration<Tiger>::length = sizeof(PKCS_DigestDecoration<Tiger>::decoration);
|
template<> const unsigned int PKCS_DigestDecoration<Tiger>::length = sizeof(PKCS_DigestDecoration<Tiger>::decoration);
|
||||||
|
|
||||||
template<> const byte PKCS_DigestDecoration<SHA256>::decoration[] = {0x30,0x31,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x01,0x05,0x00,0x04,0x20};
|
|
||||||
template<> const unsigned int PKCS_DigestDecoration<SHA256>::length = sizeof(PKCS_DigestDecoration<SHA256>::decoration);
|
|
||||||
|
|
||||||
template<> const byte PKCS_DigestDecoration<SHA384>::decoration[] = {0x30,0x41,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x02,0x05,0x00,0x04,0x30};
|
|
||||||
template<> const unsigned int PKCS_DigestDecoration<SHA384>::length = sizeof(PKCS_DigestDecoration<SHA384>::decoration);
|
|
||||||
|
|
||||||
template<> const byte PKCS_DigestDecoration<SHA512>::decoration[] = {0x30,0x51,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x03,0x05,0x00,0x04,0x40};
|
|
||||||
template<> const unsigned int PKCS_DigestDecoration<SHA512>::length = sizeof(PKCS_DigestDecoration<SHA512>::decoration);
|
|
||||||
|
|
||||||
unsigned int PKCS_EncryptionPaddingScheme::MaxUnpaddedLength(unsigned int paddedLength) const
|
unsigned int PKCS_EncryptionPaddingScheme::MaxUnpaddedLength(unsigned int paddedLength) const
|
||||||
{
|
{
|
||||||
return SaturatingSubtract(paddedLength/8, 10U);
|
return SaturatingSubtract(paddedLength/8, 10U);
|
||||||
|
|
|
||||||
11
pkcspad.h
11
pkcspad.h
|
|
@ -40,6 +40,13 @@ class SHA384;
|
||||||
class SHA512;
|
class SHA512;
|
||||||
// end of list
|
// end of list
|
||||||
|
|
||||||
|
#ifdef CRYPTOPP_IS_DLL
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA>;
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA256>;
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA384>;
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA512>;
|
||||||
|
#endif
|
||||||
|
|
||||||
//! <a href="http://www.weidai.com/scan-mirror/sig.html#sem_PKCS1-1.5">EMSA-PKCS1-v1_5</a>
|
//! <a href="http://www.weidai.com/scan-mirror/sig.html#sem_PKCS1-1.5">EMSA-PKCS1-v1_5</a>
|
||||||
class CRYPTOPP_DLL PKCS1v15_SignatureMessageEncodingMethod : public PK_DeterministicSignatureMessageEncodingMethod
|
class CRYPTOPP_DLL PKCS1v15_SignatureMessageEncodingMethod : public PK_DeterministicSignatureMessageEncodingMethod
|
||||||
{
|
{
|
||||||
|
|
@ -75,10 +82,6 @@ struct PKCS1v15 : public SignatureStandard, public EncryptionStandard
|
||||||
typedef PKCS1v15_SignatureMessageEncodingMethod SignatureMessageEncodingMethod;
|
typedef PKCS1v15_SignatureMessageEncodingMethod SignatureMessageEncodingMethod;
|
||||||
};
|
};
|
||||||
|
|
||||||
#ifdef CRYPTOPP_IS_DLL
|
|
||||||
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA>;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
|
||||||
9
pssr.cpp
9
pssr.cpp
|
|
@ -5,14 +5,13 @@
|
||||||
|
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
template<> const byte EMSA2HashId<SHA>::id = 0x33;
|
// more in dll.cpp
|
||||||
template<> const byte EMSA2HashId<RIPEMD160>::id = 0x31;
|
template<> const byte EMSA2HashId<RIPEMD160>::id = 0x31;
|
||||||
template<> const byte EMSA2HashId<RIPEMD128>::id = 0x32;
|
template<> const byte EMSA2HashId<RIPEMD128>::id = 0x32;
|
||||||
template<> const byte EMSA2HashId<SHA256>::id = 0x34;
|
|
||||||
template<> const byte EMSA2HashId<SHA384>::id = 0x36;
|
|
||||||
template<> const byte EMSA2HashId<SHA512>::id = 0x35;
|
|
||||||
template<> const byte EMSA2HashId<Whirlpool>::id = 0x37;
|
template<> const byte EMSA2HashId<Whirlpool>::id = 0x37;
|
||||||
|
|
||||||
|
#ifndef CRYPTOPP_IMPORTS
|
||||||
|
|
||||||
unsigned int PSSR_MEM_Base::MaxRecoverableLength(unsigned int representativeBitLength, unsigned int hashIdentifierLength, unsigned int digestLength) const
|
unsigned int PSSR_MEM_Base::MaxRecoverableLength(unsigned int representativeBitLength, unsigned int hashIdentifierLength, unsigned int digestLength) const
|
||||||
{
|
{
|
||||||
if (AllowRecovery())
|
if (AllowRecovery())
|
||||||
|
|
@ -128,4 +127,6 @@ DecodingResult PSSR_MEM_Base::RecoverMessageFromRepresentative(
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
|
||||||
16
pssr.h
16
pssr.h
|
|
@ -4,9 +4,13 @@
|
||||||
#include "pubkey.h"
|
#include "pubkey.h"
|
||||||
#include <functional>
|
#include <functional>
|
||||||
|
|
||||||
|
#ifdef CRYPTOPP_IS_DLL
|
||||||
|
#include "sha.h"
|
||||||
|
#endif
|
||||||
|
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
class PSSR_MEM_Base : public PK_RecoverableSignatureMessageEncodingMethod
|
class CRYPTOPP_DLL PSSR_MEM_Base : public PK_RecoverableSignatureMessageEncodingMethod
|
||||||
{
|
{
|
||||||
virtual bool AllowRecovery() const =0;
|
virtual bool AllowRecovery() const =0;
|
||||||
virtual unsigned int SaltLen(unsigned int hashLen) const =0;
|
virtual unsigned int SaltLen(unsigned int hashLen) const =0;
|
||||||
|
|
@ -28,8 +32,9 @@ public:
|
||||||
byte *recoverableMessage) const;
|
byte *recoverableMessage) const;
|
||||||
};
|
};
|
||||||
|
|
||||||
template <class H> struct EMSA2HashId
|
template <class H> class EMSA2HashId
|
||||||
{
|
{
|
||||||
|
public:
|
||||||
static const byte id;
|
static const byte id;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
@ -43,6 +48,13 @@ class SHA512;
|
||||||
class Whirlpool;
|
class Whirlpool;
|
||||||
// end of list
|
// end of list
|
||||||
|
|
||||||
|
#ifdef CRYPTOPP_IS_DLL
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS EMSA2HashId<SHA>;
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS EMSA2HashId<SHA256>;
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS EMSA2HashId<SHA384>;
|
||||||
|
CRYPTOPP_DLL_TEMPLATE_CLASS EMSA2HashId<SHA512>;
|
||||||
|
#endif
|
||||||
|
|
||||||
template <class BASE>
|
template <class BASE>
|
||||||
class EMSA2HashIdLookup : public BASE
|
class EMSA2HashIdLookup : public BASE
|
||||||
{
|
{
|
||||||
|
|
|
||||||
8
ripemd.h
8
ripemd.h
|
|
@ -15,7 +15,7 @@ public:
|
||||||
static const char * StaticAlgorithmName() {return "RIPEMD-160";}
|
static const char * StaticAlgorithmName() {return "RIPEMD-160";}
|
||||||
};
|
};
|
||||||
|
|
||||||
/*! Digest Length = 320 bits, Security = 160 bits */
|
/*! Digest Length = 320 bits, Security is similar to RIPEMD-160 */
|
||||||
class RIPEMD320 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 40, RIPEMD320>
|
class RIPEMD320 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 40, RIPEMD320>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
@ -24,7 +24,8 @@ public:
|
||||||
static const char * StaticAlgorithmName() {return "RIPEMD-320";}
|
static const char * StaticAlgorithmName() {return "RIPEMD-320";}
|
||||||
};
|
};
|
||||||
|
|
||||||
/*! Digest Length = 128 bits */
|
/*! \warning RIPEMD-128 is considered insecure, and should not be used
|
||||||
|
unless you absolutely need it for compatibility. */
|
||||||
class RIPEMD128 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 16, RIPEMD128>
|
class RIPEMD128 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 16, RIPEMD128>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
@ -33,7 +34,8 @@ public:
|
||||||
static const char * StaticAlgorithmName() {return "RIPEMD-128";}
|
static const char * StaticAlgorithmName() {return "RIPEMD-128";}
|
||||||
};
|
};
|
||||||
|
|
||||||
/*! Digest Length = 256 bits, Security = 128 bits */
|
/*! \warning RIPEMD-256 is considered insecure, and should not be used
|
||||||
|
unless you absolutely need it for compatibility. */
|
||||||
class RIPEMD256 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 32, RIPEMD256>
|
class RIPEMD256 : public IteratedHashWithStaticTransform<word32, LittleEndian, 64, 32, RIPEMD256>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
|
|
|
||||||
9
sha.cpp
9
sha.cpp
|
|
@ -4,6 +4,9 @@
|
||||||
// Both are in the public domain.
|
// Both are in the public domain.
|
||||||
|
|
||||||
#include "pch.h"
|
#include "pch.h"
|
||||||
|
|
||||||
|
#ifndef CRYPTOPP_IMPORTS
|
||||||
|
|
||||||
#include "sha.h"
|
#include "sha.h"
|
||||||
#include "misc.h"
|
#include "misc.h"
|
||||||
|
|
||||||
|
|
@ -14,8 +17,6 @@ NAMESPACE_BEGIN(CryptoPP)
|
||||||
#define blk0(i) (W[i] = data[i])
|
#define blk0(i) (W[i] = data[i])
|
||||||
#define blk1(i) (W[i&15] = rotlFixed(W[(i+13)&15]^W[(i+8)&15]^W[(i+2)&15]^W[i&15],1))
|
#define blk1(i) (W[i&15] = rotlFixed(W[(i+13)&15]^W[(i+8)&15]^W[(i+2)&15]^W[i&15],1))
|
||||||
|
|
||||||
#ifndef CRYPTOPP_IMPORTS
|
|
||||||
|
|
||||||
void SHA::InitState(HashWordType *state)
|
void SHA::InitState(HashWordType *state)
|
||||||
{
|
{
|
||||||
state[0] = 0x67452301L;
|
state[0] = 0x67452301L;
|
||||||
|
|
@ -78,8 +79,6 @@ void SHA::Transform(word32 *state, const word32 *data)
|
||||||
memset(W, 0, sizeof(W));
|
memset(W, 0, sizeof(W));
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif // #ifndef CRYPTOPP_IMPORTS
|
|
||||||
|
|
||||||
// end of Steve Reid's code
|
// end of Steve Reid's code
|
||||||
|
|
||||||
// *************************************************************
|
// *************************************************************
|
||||||
|
|
@ -291,3 +290,5 @@ void SHA384::InitState(HashWordType *state)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
||||||
|
#endif // #ifndef CRYPTOPP_IMPORTS
|
||||||
|
|
|
||||||
8
sha.h
8
sha.h
|
|
@ -17,7 +17,7 @@ public:
|
||||||
typedef SHA SHA1;
|
typedef SHA SHA1;
|
||||||
|
|
||||||
//! implements the SHA-256 standard
|
//! implements the SHA-256 standard
|
||||||
class SHA256 : public IteratedHashWithStaticTransform<word32, BigEndian, 64, 32, SHA256>
|
class CRYPTOPP_DLL SHA256 : public IteratedHashWithStaticTransform<word32, BigEndian, 64, 32, SHA256>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
static void InitState(HashWordType *state);
|
static void InitState(HashWordType *state);
|
||||||
|
|
@ -29,7 +29,7 @@ protected:
|
||||||
};
|
};
|
||||||
|
|
||||||
//! implements the SHA-224 standard
|
//! implements the SHA-224 standard
|
||||||
class SHA224 : public IteratedHashWithStaticTransform<word32, BigEndian, 64, 32, SHA224, 28>
|
class CRYPTOPP_DLL SHA224 : public IteratedHashWithStaticTransform<word32, BigEndian, 64, 32, SHA224, 28>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
static void InitState(HashWordType *state);
|
static void InitState(HashWordType *state);
|
||||||
|
|
@ -40,7 +40,7 @@ public:
|
||||||
#ifdef WORD64_AVAILABLE
|
#ifdef WORD64_AVAILABLE
|
||||||
|
|
||||||
//! implements the SHA-512 standard
|
//! implements the SHA-512 standard
|
||||||
class SHA512 : public IteratedHashWithStaticTransform<word64, BigEndian, 128, 64, SHA512>
|
class CRYPTOPP_DLL SHA512 : public IteratedHashWithStaticTransform<word64, BigEndian, 128, 64, SHA512>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
static void InitState(HashWordType *state);
|
static void InitState(HashWordType *state);
|
||||||
|
|
@ -52,7 +52,7 @@ protected:
|
||||||
};
|
};
|
||||||
|
|
||||||
//! implements the SHA-384 standard
|
//! implements the SHA-384 standard
|
||||||
class SHA384 : public IteratedHashWithStaticTransform<word64, BigEndian, 128, 64, SHA384, 48>
|
class CRYPTOPP_DLL SHA384 : public IteratedHashWithStaticTransform<word64, BigEndian, 128, 64, SHA384, 48>
|
||||||
{
|
{
|
||||||
public:
|
public:
|
||||||
static void InitState(HashWordType *state);
|
static void InitState(HashWordType *state);
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue