Add Poly1305TLS algorithm (GH #727)
This is the IETF's rendition of Poly1305 that forgoes AES and the nonce, and uses 16-bytes of the key directly to mac the messagepull/795/head
parent
6cd2d0a06a
commit
e388f2d88d
|
|
@ -506,6 +506,7 @@ TestVectors/mars.txt
|
||||||
TestVectors/nr.txt
|
TestVectors/nr.txt
|
||||||
TestVectors/panama.txt
|
TestVectors/panama.txt
|
||||||
TestVectors/poly1305aes.txt
|
TestVectors/poly1305aes.txt
|
||||||
|
TestVectors/poly1305_tls.txt
|
||||||
TestVectors/rabbit.txt
|
TestVectors/rabbit.txt
|
||||||
TestVectors/Readme.txt
|
TestVectors/Readme.txt
|
||||||
TestVectors/rsa_oaep.txt
|
TestVectors/rsa_oaep.txt
|
||||||
|
|
|
||||||
|
|
@ -29,6 +29,7 @@ Test: TestVectors/mars.txt
|
||||||
Test: TestVectors/nr.txt
|
Test: TestVectors/nr.txt
|
||||||
Test: TestVectors/panama.txt
|
Test: TestVectors/panama.txt
|
||||||
Test: TestVectors/poly1305aes.txt
|
Test: TestVectors/poly1305aes.txt
|
||||||
|
Test: TestVectors/poly1305_tls.txt
|
||||||
Test: TestVectors/rabbit.txt
|
Test: TestVectors/rabbit.txt
|
||||||
Test: TestVectors/rsa_oaep.txt
|
Test: TestVectors/rsa_oaep.txt
|
||||||
Test: TestVectors/rsa_pkcs1_1_5.txt
|
Test: TestVectors/rsa_pkcs1_1_5.txt
|
||||||
|
|
|
||||||
File diff suppressed because it is too large
Load Diff
|
|
@ -125,6 +125,7 @@ void Benchmark2(double t, double hertz)
|
||||||
BenchMarkByName<MessageAuthenticationCode>("CMAC(AES)");
|
BenchMarkByName<MessageAuthenticationCode>("CMAC(AES)");
|
||||||
BenchMarkByName<MessageAuthenticationCode>("DMAC(AES)");
|
BenchMarkByName<MessageAuthenticationCode>("DMAC(AES)");
|
||||||
BenchMarkByName<MessageAuthenticationCode>("Poly1305(AES)");
|
BenchMarkByName<MessageAuthenticationCode>("Poly1305(AES)");
|
||||||
|
BenchMarkByName<MessageAuthenticationCode>("Poly1305TLS");
|
||||||
BenchMarkByName<MessageAuthenticationCode>("BLAKE2s");
|
BenchMarkByName<MessageAuthenticationCode>("BLAKE2s");
|
||||||
BenchMarkByName<MessageAuthenticationCode>("BLAKE2b");
|
BenchMarkByName<MessageAuthenticationCode>("BLAKE2b");
|
||||||
BenchMarkByName<MessageAuthenticationCode>("SipHash-2-4");
|
BenchMarkByName<MessageAuthenticationCode>("SipHash-2-4");
|
||||||
|
|
|
||||||
139
poly1305.cpp
139
poly1305.cpp
|
|
@ -25,12 +25,13 @@
|
||||||
#include "aes.h"
|
#include "aes.h"
|
||||||
#include "cpu.h"
|
#include "cpu.h"
|
||||||
|
|
||||||
|
////////////////////////////// Common Poly1305 //////////////////////////////
|
||||||
|
|
||||||
#define CONSTANT_TIME_CARRY(a,b) ((a ^ ((a ^ b) | ((a - b) ^ b))) >> (sizeof(a) * 8 - 1))
|
#define CONSTANT_TIME_CARRY(a,b) ((a ^ ((a ^ b) | ((a - b) ^ b))) >> (sizeof(a) * 8 - 1))
|
||||||
|
|
||||||
ANONYMOUS_NAMESPACE_BEGIN
|
ANONYMOUS_NAMESPACE_BEGIN
|
||||||
|
|
||||||
using namespace CryptoPP;
|
using namespace CryptoPP;
|
||||||
enum {BLOCKSIZE=16};
|
|
||||||
|
|
||||||
void Poly1305_HashBlocks(word32 h[5], word32 r[4], const byte *input, size_t length, word32 padbit)
|
void Poly1305_HashBlocks(word32 h[5], word32 r[4], const byte *input, size_t length, word32 padbit)
|
||||||
{
|
{
|
||||||
|
|
@ -49,7 +50,7 @@ void Poly1305_HashBlocks(word32 h[5], word32 r[4], const byte *input, size_t len
|
||||||
h0 = h[0]; h1 = h[1]; h2 = h[2];
|
h0 = h[0]; h1 = h[1]; h2 = h[2];
|
||||||
h3 = h[3]; h4 = h[4];
|
h3 = h[3]; h4 = h[4];
|
||||||
|
|
||||||
while (length >= BLOCKSIZE)
|
while (length >= 16)
|
||||||
{
|
{
|
||||||
// h += m[i]
|
// h += m[i]
|
||||||
h0 = (word32)(d0 = (word64)h0 + GetWord<word32>(false, LITTLE_ENDIAN_ORDER, input + 0));
|
h0 = (word32)(d0 = (word64)h0 + GetWord<word32>(false, LITTLE_ENDIAN_ORDER, input + 0));
|
||||||
|
|
@ -96,8 +97,8 @@ void Poly1305_HashBlocks(word32 h[5], word32 r[4], const byte *input, size_t len
|
||||||
h3 += (c = CONSTANT_TIME_CARRY(h2,c));
|
h3 += (c = CONSTANT_TIME_CARRY(h2,c));
|
||||||
h4 += CONSTANT_TIME_CARRY(h3,c);
|
h4 += CONSTANT_TIME_CARRY(h3,c);
|
||||||
|
|
||||||
input += BLOCKSIZE;
|
input += 16;
|
||||||
length -= BLOCKSIZE;
|
length -= 16;
|
||||||
}
|
}
|
||||||
|
|
||||||
h[0] = h0; h[1] = h1; h[2] = h2;
|
h[0] = h0; h[1] = h1; h[2] = h2;
|
||||||
|
|
@ -138,7 +139,7 @@ void Poly1305_HashFinal(word32 h[5], word32 n[4], byte *mac, size_t size)
|
||||||
h2 = (word32)(t = (word64)h2 + (t >> 32) + n[2]);
|
h2 = (word32)(t = (word64)h2 + (t >> 32) + n[2]);
|
||||||
h3 = (word32)(t = (word64)h3 + (t >> 32) + n[3]);
|
h3 = (word32)(t = (word64)h3 + (t >> 32) + n[3]);
|
||||||
|
|
||||||
if (size >= BLOCKSIZE)
|
if (size >= 16)
|
||||||
{
|
{
|
||||||
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, mac + 0, h0);
|
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, mac + 0, h0);
|
||||||
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, mac + 4, h1);
|
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, mac + 4, h1);
|
||||||
|
|
@ -147,12 +148,12 @@ void Poly1305_HashFinal(word32 h[5], word32 n[4], byte *mac, size_t size)
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
FixedSizeAlignedSecBlock<byte, BLOCKSIZE> m;
|
FixedSizeAlignedSecBlock<byte, 16> m;
|
||||||
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 0, h0);
|
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 0, h0);
|
||||||
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 4, h1);
|
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 4, h1);
|
||||||
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 8, h2);
|
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 8, h2);
|
||||||
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 12, h3);
|
PutWord<word32>(false, LITTLE_ENDIAN_ORDER, m + 12, h3);
|
||||||
memcpy(mac, m, size);
|
std::memcpy(mac, m, size);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -160,6 +161,8 @@ ANONYMOUS_NAMESPACE_END
|
||||||
|
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
|
////////////////////////////// Bernstein Poly1305 //////////////////////////////
|
||||||
|
|
||||||
// No longer needed. Remove at next major version bump
|
// No longer needed. Remove at next major version bump
|
||||||
template <class T>
|
template <class T>
|
||||||
void Poly1305_Base<T>::HashBlocks(const byte *input, size_t length, word32 padbit) {
|
void Poly1305_Base<T>::HashBlocks(const byte *input, size_t length, word32 padbit) {
|
||||||
|
|
@ -183,9 +186,9 @@ std::string Poly1305_Base<T>::AlgorithmProvider() const
|
||||||
template <class T>
|
template <class T>
|
||||||
void Poly1305_Base<T>::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
|
void Poly1305_Base<T>::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
|
||||||
{
|
{
|
||||||
if (key && length)
|
CRYPTOPP_ASSERT(key && length >= 32);
|
||||||
{
|
|
||||||
// key is {k,r} pair, r is 16 bytes
|
// key is {k,r} pair. k is AES key, r is 16 bytes
|
||||||
length = SaturatingSubtract(length, (unsigned)BLOCKSIZE);
|
length = SaturatingSubtract(length, (unsigned)BLOCKSIZE);
|
||||||
m_cipher.SetKey(key, length);
|
m_cipher.SetKey(key, length);
|
||||||
key += length;
|
key += length;
|
||||||
|
|
@ -196,23 +199,14 @@ void Poly1305_Base<T>::UncheckedSetKey(const byte *key, unsigned int length, con
|
||||||
m_r[2] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 8) & 0x0ffffffc;
|
m_r[2] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 8) & 0x0ffffffc;
|
||||||
m_r[3] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 12) & 0x0ffffffc;
|
m_r[3] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 12) & 0x0ffffffc;
|
||||||
|
|
||||||
m_used = false;
|
// Mark the nonce as dirty, meaning we need a new one
|
||||||
}
|
m_used = true;
|
||||||
|
|
||||||
ConstByteArrayParameter t;
|
ConstByteArrayParameter t;
|
||||||
if (params.GetValue(Name::IV(), t) && t.begin() && t.size())
|
if (params.GetValue(Name::IV(), t) && t.begin() && t.size())
|
||||||
{
|
{
|
||||||
// Nonce key is a class member to avoid the zeroizer on a temporary
|
|
||||||
CRYPTOPP_ASSERT(t.size() == m_nk.size());
|
CRYPTOPP_ASSERT(t.size() == m_nk.size());
|
||||||
std::memcpy(m_nk.begin(), t.begin(), m_nk.size());
|
Resynchronize(t.begin(), t.size());
|
||||||
m_cipher.ProcessBlock(m_nk.begin());
|
|
||||||
|
|
||||||
m_n[0] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 0);
|
|
||||||
m_n[1] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 4);
|
|
||||||
m_n[2] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 8);
|
|
||||||
m_n[3] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 12);
|
|
||||||
|
|
||||||
m_used = false;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
Restart();
|
Restart();
|
||||||
|
|
@ -288,7 +282,17 @@ void Poly1305_Base<T>::Resynchronize(const byte *nonce, int nonceLength)
|
||||||
{
|
{
|
||||||
CRYPTOPP_ASSERT(nonceLength == -1 || nonceLength == (int)BLOCKSIZE);
|
CRYPTOPP_ASSERT(nonceLength == -1 || nonceLength == (int)BLOCKSIZE);
|
||||||
nonceLength == -1 ? nonceLength = BLOCKSIZE : nonceLength;
|
nonceLength == -1 ? nonceLength = BLOCKSIZE : nonceLength;
|
||||||
this->UncheckedSetKey(NULLPTR, 0, MakeParameters(Name::IV(), ConstByteArrayParameter(nonce, nonceLength)));
|
|
||||||
|
std::memcpy(m_nk.begin(), nonce, nonceLength);
|
||||||
|
m_cipher.ProcessBlock(m_nk.begin());
|
||||||
|
|
||||||
|
m_n[0] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 0);
|
||||||
|
m_n[1] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 4);
|
||||||
|
m_n[2] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 8);
|
||||||
|
m_n[3] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, m_nk + 12);
|
||||||
|
|
||||||
|
// Mark nonce as unused, meaning it is fresh
|
||||||
|
m_used = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
template <class T>
|
template <class T>
|
||||||
|
|
@ -301,7 +305,94 @@ template <class T>
|
||||||
void Poly1305_Base<T>::Restart()
|
void Poly1305_Base<T>::Restart()
|
||||||
{
|
{
|
||||||
m_h[0] = m_h[1] = m_h[2] = m_h[3] = m_h[4] = 0;
|
m_h[0] = m_h[1] = m_h[2] = m_h[3] = m_h[4] = 0;
|
||||||
// m_r[0] = m_r[1] = m_r[2] = m_r[3] = 0;
|
m_idx = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
////////////////////////////// IETF Poly1305 //////////////////////////////
|
||||||
|
|
||||||
|
//void Poly1305TLS_Base::Resynchronize (const byte *iv, int ivLength) {}
|
||||||
|
//void Poly1305TLS_Base::GetNextIV (RandomNumberGenerator &rng, byte *iv) {}
|
||||||
|
|
||||||
|
void Poly1305TLS_Base::UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
|
||||||
|
{
|
||||||
|
CRYPTOPP_UNUSED(params);
|
||||||
|
CRYPTOPP_ASSERT(key && length >= 32);
|
||||||
|
|
||||||
|
// key is {r,s} pair. s is nonce, r is 16 bytes
|
||||||
|
m_r[0] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 0) & 0x0fffffff;
|
||||||
|
m_r[1] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 4) & 0x0ffffffc;
|
||||||
|
m_r[2] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 8) & 0x0ffffffc;
|
||||||
|
m_r[3] = GetWord<word32>(false, LITTLE_ENDIAN_ORDER, key + 12) & 0x0ffffffc;
|
||||||
|
|
||||||
|
key += 16;
|
||||||
|
std::memcpy(m_n, key, 16);
|
||||||
|
|
||||||
|
Restart();
|
||||||
|
}
|
||||||
|
|
||||||
|
void Poly1305TLS_Base::Update(const byte *input, size_t length)
|
||||||
|
{
|
||||||
|
CRYPTOPP_ASSERT((input && length) || !length);
|
||||||
|
if (!length) return;
|
||||||
|
|
||||||
|
size_t rem, num = m_idx;
|
||||||
|
if (num)
|
||||||
|
{
|
||||||
|
rem = BLOCKSIZE - num;
|
||||||
|
if (length >= rem)
|
||||||
|
{
|
||||||
|
// Process
|
||||||
|
memcpy_s(m_acc + num, BLOCKSIZE - num, input, rem);
|
||||||
|
Poly1305_HashBlocks(m_h, m_r, m_acc, BLOCKSIZE, 1);
|
||||||
|
input += rem;
|
||||||
|
length -= rem;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
// Accumulate
|
||||||
|
memcpy_s(m_acc + num, BLOCKSIZE - num, input, length);
|
||||||
|
m_idx = num + length;
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
rem = length % BLOCKSIZE;
|
||||||
|
length -= rem;
|
||||||
|
|
||||||
|
if (length >= BLOCKSIZE) {
|
||||||
|
Poly1305_HashBlocks(m_h, m_r, input, length, 1);
|
||||||
|
input += length;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rem)
|
||||||
|
memcpy(m_acc, input, rem);
|
||||||
|
|
||||||
|
m_idx = rem;
|
||||||
|
}
|
||||||
|
|
||||||
|
void Poly1305TLS_Base::TruncatedFinal(byte *mac, size_t size)
|
||||||
|
{
|
||||||
|
CRYPTOPP_ASSERT(mac); // Pointer is valid
|
||||||
|
|
||||||
|
ThrowIfInvalidTruncatedSize(size);
|
||||||
|
|
||||||
|
size_t num = m_idx;
|
||||||
|
if (num)
|
||||||
|
{
|
||||||
|
m_acc[num++] = 1; /* pad bit */
|
||||||
|
while (num < BLOCKSIZE)
|
||||||
|
m_acc[num++] = 0;
|
||||||
|
Poly1305_HashBlocks(m_h, m_r, m_acc, BLOCKSIZE, 0);
|
||||||
|
}
|
||||||
|
|
||||||
|
Poly1305_HashFinal(m_h, m_n, mac, size);
|
||||||
|
|
||||||
|
Restart();
|
||||||
|
}
|
||||||
|
|
||||||
|
void Poly1305TLS_Base::Restart()
|
||||||
|
{
|
||||||
|
m_h[0] = m_h[1] = m_h[2] = m_h[3] = m_h[4] = 0;
|
||||||
m_idx = 0;
|
m_idx = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
47
poly1305.h
47
poly1305.h
|
|
@ -52,6 +52,8 @@
|
||||||
|
|
||||||
NAMESPACE_BEGIN(CryptoPP)
|
NAMESPACE_BEGIN(CryptoPP)
|
||||||
|
|
||||||
|
////////////////////////////// Bernstein Poly1305 //////////////////////////////
|
||||||
|
|
||||||
/// \brief Poly1305 message authentication code base class
|
/// \brief Poly1305 message authentication code base class
|
||||||
/// \tparam T class derived from BlockCipherDocumentation with 16-byte key and 16-byte blocksize
|
/// \tparam T class derived from BlockCipherDocumentation with 16-byte key and 16-byte blocksize
|
||||||
/// \since Crypto++ 6.0
|
/// \since Crypto++ 6.0
|
||||||
|
|
@ -67,6 +69,7 @@ public:
|
||||||
CRYPTOPP_CONSTANT(DIGESTSIZE=T::BLOCKSIZE)
|
CRYPTOPP_CONSTANT(DIGESTSIZE=T::BLOCKSIZE)
|
||||||
CRYPTOPP_CONSTANT(BLOCKSIZE=T::BLOCKSIZE)
|
CRYPTOPP_CONSTANT(BLOCKSIZE=T::BLOCKSIZE)
|
||||||
|
|
||||||
|
virtual ~Poly1305_Base() {}
|
||||||
Poly1305_Base() : m_idx(0), m_used(true) {}
|
Poly1305_Base() : m_idx(0), m_used(true) {}
|
||||||
|
|
||||||
void Resynchronize (const byte *iv, int ivLength=-1);
|
void Resynchronize (const byte *iv, int ivLength=-1);
|
||||||
|
|
@ -83,7 +86,7 @@ public:
|
||||||
std::string AlgorithmProvider() const;
|
std::string AlgorithmProvider() const;
|
||||||
|
|
||||||
protected:
|
protected:
|
||||||
// No longer needed. Remove at next major version bump
|
// TODO: No longer needed. Remove at next major version bump
|
||||||
void HashBlocks(const byte *input, size_t length, word32 padbit);
|
void HashBlocks(const byte *input, size_t length, word32 padbit);
|
||||||
void HashFinal(byte *mac, size_t length);
|
void HashFinal(byte *mac, size_t length);
|
||||||
|
|
||||||
|
|
@ -165,6 +168,48 @@ public:
|
||||||
{this->SetKey(key, keyLength, MakeParameters(Name::IV(), ConstByteArrayParameter(nonce, nonceLength)));}
|
{this->SetKey(key, keyLength, MakeParameters(Name::IV(), ConstByteArrayParameter(nonce, nonceLength)));}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
////////////////////////////// IETF Poly1305 //////////////////////////////
|
||||||
|
|
||||||
|
class Poly1305TLS_Base : public FixedKeyLength<32>, public MessageAuthenticationCode
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
static std::string StaticAlgorithmName() {return std::string("Poly1305TLS");}
|
||||||
|
CRYPTOPP_CONSTANT(DIGESTSIZE=16)
|
||||||
|
CRYPTOPP_CONSTANT(BLOCKSIZE=16)
|
||||||
|
|
||||||
|
virtual ~Poly1305TLS_Base() {}
|
||||||
|
Poly1305TLS_Base() {}
|
||||||
|
|
||||||
|
//void Resynchronize (const byte *iv, int ivLength=-1);
|
||||||
|
//void GetNextIV (RandomNumberGenerator &rng, byte *iv);
|
||||||
|
|
||||||
|
void UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms);
|
||||||
|
void Update(const byte *input, size_t length);
|
||||||
|
void TruncatedFinal(byte *mac, size_t size);
|
||||||
|
void Restart();
|
||||||
|
|
||||||
|
unsigned int BlockSize() const {return BLOCKSIZE;}
|
||||||
|
unsigned int DigestSize() const {return DIGESTSIZE;}
|
||||||
|
|
||||||
|
// std::string AlgorithmProvider() const;
|
||||||
|
|
||||||
|
protected:
|
||||||
|
// Accumulated hash, clamped r-key, and encrypted nonce
|
||||||
|
FixedSizeAlignedSecBlock<word32, 5> m_h;
|
||||||
|
FixedSizeAlignedSecBlock<word32, 4> m_r;
|
||||||
|
FixedSizeAlignedSecBlock<word32, 4> m_n;
|
||||||
|
|
||||||
|
// Accumulated message bytes and index
|
||||||
|
FixedSizeAlignedSecBlock<byte, BLOCKSIZE> m_acc;
|
||||||
|
size_t m_idx;
|
||||||
|
};
|
||||||
|
|
||||||
|
/// \brief Poly1305 TLS message authentication code
|
||||||
|
/// \tparam T HashTransformation class
|
||||||
|
/// \details 160-bit MAC with 160-bit key
|
||||||
|
/// \sa MessageAuthenticationCode()
|
||||||
|
DOCUMENTED_TYPEDEF(MessageAuthenticationCodeFinal<Poly1305TLS_Base>, Poly1305TLS)
|
||||||
|
|
||||||
NAMESPACE_END
|
NAMESPACE_END
|
||||||
|
|
||||||
#endif // CRYPTOPP_POLY1305_H
|
#endif // CRYPTOPP_POLY1305_H
|
||||||
|
|
|
||||||
|
|
@ -72,6 +72,7 @@ void RegisterFactories2()
|
||||||
RegisterDefaultFactoryFor<MessageAuthenticationCode, CMAC<AES> >();
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, CMAC<AES> >();
|
||||||
RegisterDefaultFactoryFor<MessageAuthenticationCode, DMAC<AES> >();
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, DMAC<AES> >();
|
||||||
RegisterDefaultFactoryFor<MessageAuthenticationCode, Poly1305<AES> >();
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, Poly1305<AES> >();
|
||||||
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, Poly1305TLS>();
|
||||||
RegisterDefaultFactoryFor<MessageAuthenticationCode, CMAC<DES_EDE3> >();
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, CMAC<DES_EDE3> >();
|
||||||
RegisterDefaultFactoryFor<MessageAuthenticationCode, BLAKE2s>();
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, BLAKE2s>();
|
||||||
RegisterDefaultFactoryFor<MessageAuthenticationCode, BLAKE2b>();
|
RegisterDefaultFactoryFor<MessageAuthenticationCode, BLAKE2b>();
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue