Crypto++  8.2
Free C++ class library of cryptographic schemes
cryptlib.cpp
1 // cryptlib.cpp - originally written and placed in the public domain by Wei Dai
2 
3 #include "pch.h"
4 #include "config.h"
5 
6 #if CRYPTOPP_MSC_VERSION
7 # pragma warning(disable: 4127 4189 4459)
8 #endif
9 
10 #if CRYPTOPP_GCC_DIAGNOSTIC_AVAILABLE
11 # pragma GCC diagnostic ignored "-Wunused-value"
12 # pragma GCC diagnostic ignored "-Wunused-variable"
13 # pragma GCC diagnostic ignored "-Wunused-parameter"
14 #endif
15 
16 #ifndef CRYPTOPP_IMPORTS
17 
18 #include "cryptlib.h"
19 #include "filters.h"
20 #include "algparam.h"
21 #include "fips140.h"
22 #include "argnames.h"
23 #include "fltrimpl.h"
24 #include "osrng.h"
25 #include "secblock.h"
26 #include "smartptr.h"
27 #include "stdcpp.h"
28 #include "misc.h"
29 
30 NAMESPACE_BEGIN(CryptoPP)
31 
32 CRYPTOPP_COMPILE_ASSERT(sizeof(byte) == 1);
33 CRYPTOPP_COMPILE_ASSERT(sizeof(word16) == 2);
34 CRYPTOPP_COMPILE_ASSERT(sizeof(word32) == 4);
35 CRYPTOPP_COMPILE_ASSERT(sizeof(word64) == 8);
36 #ifdef CRYPTOPP_NATIVE_DWORD_AVAILABLE
37 CRYPTOPP_COMPILE_ASSERT(sizeof(dword) == 2*sizeof(word));
38 #endif
39 
41 {
42  static BitBucket bitBucket;
43  return bitBucket;
44 }
45 
46 Algorithm::Algorithm(bool checkSelfTestStatus)
47 {
48  if (checkSelfTestStatus && FIPS_140_2_ComplianceEnabled())
49  {
50  if (GetPowerUpSelfTestStatus() == POWER_UP_SELF_TEST_NOT_DONE && !PowerUpSelfTestInProgressOnThisThread())
51  throw SelfTestFailure("Cryptographic algorithms are disabled before the power-up self tests are performed.");
52 
54  throw SelfTestFailure("Cryptographic algorithms are disabled after a power-up self test failed.");
55  }
56 }
57 
58 void SimpleKeyingInterface::SetKey(const byte *key, size_t length, const NameValuePairs &params)
59 {
60  this->ThrowIfInvalidKeyLength(length);
61  this->UncheckedSetKey(key, static_cast<unsigned int>(length), params);
62 }
63 
64 void SimpleKeyingInterface::SetKeyWithRounds(const byte *key, size_t length, int rounds)
65 {
66  SetKey(key, length, MakeParameters(Name::Rounds(), rounds));
67 }
68 
69 void SimpleKeyingInterface::SetKeyWithIV(const byte *key, size_t length, const byte *iv, size_t ivLength)
70 {
71  SetKey(key, length, MakeParameters(Name::IV(), ConstByteArrayParameter(iv, ivLength)));
72 }
73 
74 void SimpleKeyingInterface::ThrowIfInvalidKeyLength(size_t length)
75 {
76  if (!IsValidKeyLength(length))
77  throw InvalidKeyLength(GetAlgorithm().AlgorithmName(), length);
78 }
79 
80 void SimpleKeyingInterface::ThrowIfResynchronizable()
81 {
82  if (IsResynchronizable())
83  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": this object requires an IV");
84 }
85 
86 void SimpleKeyingInterface::ThrowIfInvalidIV(const byte *iv)
87 {
88  if (!iv && IVRequirement() == UNPREDICTABLE_RANDOM_IV)
89  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": this object cannot use a null IV");
90 }
91 
92 size_t SimpleKeyingInterface::ThrowIfInvalidIVLength(int length)
93 {
94  size_t size = 0;
95  if (length < 0)
96  size = static_cast<size_t>(IVSize());
97  else if ((size_t)length < MinIVLength())
98  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": IV length " + IntToString(length) + " is less than the minimum of " + IntToString(MinIVLength()));
99  else if ((size_t)length > MaxIVLength())
100  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": IV length " + IntToString(length) + " exceeds the maximum of " + IntToString(MaxIVLength()));
101  else
102  size = static_cast<size_t>(length);
103 
104  return size;
105 }
106 
107 const byte * SimpleKeyingInterface::GetIVAndThrowIfInvalid(const NameValuePairs &params, size_t &size)
108 {
109  ConstByteArrayParameter ivWithLength;
110  const byte *iv = NULLPTR;
111  bool found = false;
112 
113  try {found = params.GetValue(Name::IV(), ivWithLength);}
114  catch (const NameValuePairs::ValueTypeMismatch &) {}
115 
116  if (found)
117  {
118  iv = ivWithLength.begin();
119  ThrowIfInvalidIV(iv);
120  size = ThrowIfInvalidIVLength(static_cast<int>(ivWithLength.size()));
121  }
122  else if (params.GetValue(Name::IV(), iv))
123  {
124  ThrowIfInvalidIV(iv);
125  size = static_cast<size_t>(IVSize());
126  }
127  else
128  {
129  ThrowIfResynchronizable();
130  size = 0;
131  }
132 
133  return iv;
134 }
135 
137 {
138  rng.GenerateBlock(iv, IVSize());
139 }
140 
141 size_t BlockTransformation::AdvancedProcessBlocks(const byte *inBlocks, const byte *xorBlocks, byte *outBlocks, size_t length, word32 flags) const
142 {
143  CRYPTOPP_ASSERT(inBlocks);
144  CRYPTOPP_ASSERT(outBlocks);
145  CRYPTOPP_ASSERT(length);
146 
147  const unsigned int blockSize = BlockSize();
148  size_t inIncrement = (flags & (BT_InBlockIsCounter|BT_DontIncrementInOutPointers)) ? 0 : blockSize;
149  size_t xorIncrement = xorBlocks ? blockSize : 0;
150  size_t outIncrement = (flags & BT_DontIncrementInOutPointers) ? 0 : blockSize;
151 
152  if (flags & BT_ReverseDirection)
153  {
154  inBlocks = PtrAdd(inBlocks, length - blockSize);
155  xorBlocks = PtrAdd(xorBlocks, length - blockSize);
156  outBlocks = PtrAdd(outBlocks, length - blockSize);
157  inIncrement = 0-inIncrement;
158  xorIncrement = 0-xorIncrement;
159  outIncrement = 0-outIncrement;
160  }
161 
162  // Coverity finding.
163  const bool xorFlag = xorBlocks && (flags & BT_XorInput);
164  while (length >= blockSize)
165  {
166  if (xorFlag)
167  {
168  // xorBlocks non-NULL and with BT_XorInput.
169  xorbuf(outBlocks, xorBlocks, inBlocks, blockSize);
170  ProcessBlock(outBlocks);
171  }
172  else
173  {
174  // xorBlocks may be non-NULL and without BT_XorInput.
175  ProcessAndXorBlock(inBlocks, xorBlocks, outBlocks);
176  }
177 
178  if (flags & BT_InBlockIsCounter)
179  const_cast<byte *>(inBlocks)[blockSize-1]++;
180 
181  inBlocks = PtrAdd(inBlocks, inIncrement);
182  outBlocks = PtrAdd(outBlocks, outIncrement);
183  xorBlocks = PtrAdd(xorBlocks, xorIncrement);
184  length -= blockSize;
185  }
186 
187  return length;
188 }
189 
191 {
192  return GetAlignmentOf<word32>();
193 }
194 
196 {
197  return GetAlignmentOf<word32>();
198 }
199 
201 {
202  return GetAlignmentOf<word32>();
203 }
204 
205 #if 0
206 void StreamTransformation::ProcessLastBlock(byte *outString, const byte *inString, size_t length)
207 {
208  CRYPTOPP_ASSERT(MinLastBlockSize() == 0); // this function should be overridden otherwise
209 
210  if (length == MandatoryBlockSize())
211  ProcessData(outString, inString, length);
212  else if (length != 0)
213  throw NotImplemented(AlgorithmName() + ": this object doesn't support a special last block");
214 }
215 #endif
216 
217 size_t StreamTransformation::ProcessLastBlock(byte *outString, size_t outLength, const byte *inString, size_t inLength)
218 {
219  // this function should be overridden otherwise
220  CRYPTOPP_ASSERT(MinLastBlockSize() == 0);
221 
222  if (inLength == MandatoryBlockSize())
223  {
224  outLength = inLength; // squash unused warning
225  ProcessData(outString, inString, inLength);
226  }
227  else if (inLength != 0)
228  throw NotImplemented(AlgorithmName() + ": this object doesn't support a special last block");
229 
230  return outLength;
231 }
232 
233 void AuthenticatedSymmetricCipher::SpecifyDataLengths(lword headerLength, lword messageLength, lword footerLength)
234 {
235  if (headerLength > MaxHeaderLength())
236  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": header length " + IntToString(headerLength) + " exceeds the maximum of " + IntToString(MaxHeaderLength()));
237 
238  if (messageLength > MaxMessageLength())
239  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": message length " + IntToString(messageLength) + " exceeds the maximum of " + IntToString(MaxMessageLength()));
240 
241  if (footerLength > MaxFooterLength())
242  throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": footer length " + IntToString(footerLength) + " exceeds the maximum of " + IntToString(MaxFooterLength()));
243 
244  UncheckedSpecifyDataLengths(headerLength, messageLength, footerLength);
245 }
246 
247 void AuthenticatedSymmetricCipher::EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *message, size_t messageLength)
248 {
249  Resynchronize(iv, ivLength);
250  SpecifyDataLengths(headerLength, messageLength);
251  Update(header, headerLength);
252  ProcessString(ciphertext, message, messageLength);
253  TruncatedFinal(mac, macSize);
254 }
255 
256 bool AuthenticatedSymmetricCipher::DecryptAndVerify(byte *message, const byte *mac, size_t macLength, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *ciphertext, size_t ciphertextLength)
257 {
258  Resynchronize(iv, ivLength);
259  SpecifyDataLengths(headerLength, ciphertextLength);
260  Update(header, headerLength);
261  ProcessString(message, ciphertext, ciphertextLength);
262  return TruncatedVerify(mac, macLength);
263 }
264 
266 {
267  // Squash C4505 on Visual Studio 2008 and friends
268  return "Unknown";
269 }
270 
272 {
273  return GenerateByte() & 1;
274 }
275 
277 {
278  byte b;
279  GenerateBlock(&b, 1);
280  return b;
281 }
282 
283 word32 RandomNumberGenerator::GenerateWord32(word32 min, word32 max)
284 {
285  const word32 range = max-min;
286  const unsigned int maxBits = BitPrecision(range);
287 
288  word32 value;
289 
290  do
291  {
292  GenerateBlock((byte *)&value, sizeof(value));
293  value = Crop(value, maxBits);
294  } while (value > range);
295 
296  return value+min;
297 }
298 
299 // Stack recursion below... GenerateIntoBufferedTransformation calls GenerateBlock,
300 // and GenerateBlock calls GenerateIntoBufferedTransformation. Ad infinitum. Also
301 // see http://github.com/weidai11/cryptopp/issues/38.
302 //
303 // According to Wei, RandomNumberGenerator is an interface, and it should not
304 // be instantiable. Its now spilt milk, and we are going to CRYPTOPP_ASSERT it in Debug
305 // builds to alert the programmer and throw in Release builds. Developers have
306 // a reference implementation in case its needed. If a programmer
307 // unintentionally lands here, then they should ensure use of a
308 // RandomNumberGenerator pointer or reference so polymorphism can provide the
309 // proper runtime dispatching.
310 
311 void RandomNumberGenerator::GenerateBlock(byte *output, size_t size)
312 {
313  CRYPTOPP_UNUSED(output), CRYPTOPP_UNUSED(size);
314 
315  ArraySink s(output, size);
316  GenerateIntoBufferedTransformation(s, DEFAULT_CHANNEL, size);
317 }
318 
320 {
321  GenerateIntoBufferedTransformation(TheBitBucket(), DEFAULT_CHANNEL, n);
322 }
323 
324 void RandomNumberGenerator::GenerateIntoBufferedTransformation(BufferedTransformation &target, const std::string &channel, lword length)
325 {
327  while (length)
328  {
329  size_t len = UnsignedMin(buffer.size(), length);
330  GenerateBlock(buffer, len);
331  (void)target.ChannelPut(channel, buffer, len);
332  length -= len;
333  }
334 }
335 
337 {
338  return 0;
339 }
340 
342 {
343  return static_cast<size_t>(-1);
344 }
345 
346 void KeyDerivationFunction::ThrowIfInvalidDerivedKeyLength(size_t length) const
347 {
348  if (!IsValidDerivedLength(length))
349  throw InvalidDerivedKeyLength(GetAlgorithm().AlgorithmName(), length);
350 }
351 
353  CRYPTOPP_UNUSED(params);
354 }
355 
356 /// \brief Random Number Generator that does not produce random numbers
357 /// \details ClassNullRNG can be used for functions that require a RandomNumberGenerator
358 /// but don't actually use it. The class throws NotImplemented when a generation function is called.
359 /// \sa NullRNG()
361 {
362 public:
363  /// \brief The name of the generator
364  /// \returns the string \a NullRNGs
365  std::string AlgorithmName() const {return "NullRNG";}
366 
367 #if defined(CRYPTOPP_DOXYGEN_PROCESSING)
368  /// \brief An implementation that throws NotImplemented
369  byte GenerateByte () {}
370  /// \brief An implementation that throws NotImplemented
371  unsigned int GenerateBit () {}
372  /// \brief An implementation that throws NotImplemented
373  word32 GenerateWord32 (word32 min, word32 max) {}
374 #endif
375 
376  /// \brief An implementation that throws NotImplemented
377  void GenerateBlock(byte *output, size_t size)
378  {
379  CRYPTOPP_UNUSED(output); CRYPTOPP_UNUSED(size);
380  throw NotImplemented("NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes");
381  }
382 
383 #if defined(CRYPTOPP_DOXYGEN_PROCESSING)
384  /// \brief An implementation that throws NotImplemented
385  void GenerateIntoBufferedTransformation (BufferedTransformation &target, const std::string &channel, lword length) {}
386  /// \brief An implementation that throws NotImplemented
387  void IncorporateEntropy (const byte *input, size_t length) {}
388  /// \brief An implementation that returns \p false
389  bool CanIncorporateEntropy () const {}
390  /// \brief An implementation that does nothing
391  void DiscardBytes (size_t n) {}
392  /// \brief An implementation that does nothing
393  void Shuffle (IT begin, IT end) {}
394 
395 private:
396  Clonable* Clone () const { return NULLPTR; }
397 #endif
398 };
399 
401 {
402  static ClassNullRNG s_nullRNG;
403  return s_nullRNG;
404 }
405 
406 bool HashTransformation::TruncatedVerify(const byte *digest, size_t digestLength)
407 {
408  // Allocate at least 1 for calculated to avoid triggering diagnostics
409  ThrowIfInvalidTruncatedSize(digestLength);
410  SecByteBlock calculated(digestLength ? digestLength : 1);
411  TruncatedFinal(calculated, digestLength);
412  return VerifyBufsEqual(calculated, digest, digestLength);
413 }
414 
415 void HashTransformation::ThrowIfInvalidTruncatedSize(size_t size) const
416 {
417  if (size > DigestSize())
418  throw InvalidArgument("HashTransformation: can't truncate a " + IntToString(DigestSize()) + " byte digest to " + IntToString(size) + " bytes");
419 }
420 
422 {
423  const BufferedTransformation *t = AttachedTransformation();
424  return t ? t->GetMaxWaitObjectCount() : 0;
425 }
426 
427 void BufferedTransformation::GetWaitObjects(WaitObjectContainer &container, CallStack const& callStack)
428 {
429  BufferedTransformation *t = AttachedTransformation();
430  if (t)
431  t->GetWaitObjects(container, callStack); // reduce clutter by not adding to stack here
432 }
433 
434 void BufferedTransformation::Initialize(const NameValuePairs &parameters, int propagation)
435 {
436  CRYPTOPP_UNUSED(propagation);
437  CRYPTOPP_ASSERT(!AttachedTransformation());
438  IsolatedInitialize(parameters);
439 }
440 
441 bool BufferedTransformation::Flush(bool hardFlush, int propagation, bool blocking)
442 {
443  CRYPTOPP_UNUSED(propagation);
444  CRYPTOPP_ASSERT(!AttachedTransformation());
445  return IsolatedFlush(hardFlush, blocking);
446 }
447 
448 bool BufferedTransformation::MessageSeriesEnd(int propagation, bool blocking)
449 {
450  CRYPTOPP_UNUSED(propagation);
451  CRYPTOPP_ASSERT(!AttachedTransformation());
452  return IsolatedMessageSeriesEnd(blocking);
453 }
454 
455 byte * BufferedTransformation::ChannelCreatePutSpace(const std::string &channel, size_t &size)
456 {
457  byte* space = NULLPTR;
458  if (channel.empty())
459  space = CreatePutSpace(size);
460  else
462  return space;
463 }
464 
465 size_t BufferedTransformation::ChannelPut2(const std::string &channel, const byte *inString, size_t length, int messageEnd, bool blocking)
466 {
467  size_t size = 0;
468  if (channel.empty())
469  size = Put2(inString, length, messageEnd, blocking);
470  else
472  return size;
473 }
474 
475 size_t BufferedTransformation::ChannelPutModifiable2(const std::string &channel, byte *inString, size_t length, int messageEnd, bool blocking)
476 {
477  size_t size = 0;
478  if (channel.empty())
479  size = PutModifiable2(inString, length, messageEnd, blocking);
480  else
481  size = ChannelPut2(channel, inString, length, messageEnd, blocking);
482  return size;
483 }
484 
485 bool BufferedTransformation::ChannelFlush(const std::string &channel, bool hardFlush, int propagation, bool blocking)
486 {
487  bool result = 0;
488  if (channel.empty())
489  result = Flush(hardFlush, propagation, blocking);
490  else
492  return result;
493 }
494 
495 bool BufferedTransformation::ChannelMessageSeriesEnd(const std::string &channel, int propagation, bool blocking)
496 {
497  bool result = false;
498  if (channel.empty())
499  result = MessageSeriesEnd(propagation, blocking);
500  else
502  return result;
503 }
504 
506 {
507  lword size = 0;
508  if (AttachedTransformation())
509  size = AttachedTransformation()->MaxRetrievable();
510  else
511  size = CopyTo(TheBitBucket());
512  return size;
513 }
514 
516 {
517  bool result = false;
518  if (AttachedTransformation())
519  result = AttachedTransformation()->AnyRetrievable();
520  else
521  {
522  byte b;
523  result = Peek(b) != 0;
524  }
525  return result;
526 }
527 
528 size_t BufferedTransformation::Get(byte &outByte)
529 {
530  size_t size = 0;
531  if (AttachedTransformation())
532  size = AttachedTransformation()->Get(outByte);
533  else
534  size = Get(&outByte, 1);
535  return size;
536 }
537 
538 size_t BufferedTransformation::Get(byte *outString, size_t getMax)
539 {
540  size_t size = 0;
541  if (AttachedTransformation())
542  size = AttachedTransformation()->Get(outString, getMax);
543  else
544  {
545  ArraySink arraySink(outString, getMax);
546  size = (size_t)TransferTo(arraySink, getMax);
547  }
548  return size;
549 }
550 
551 size_t BufferedTransformation::Peek(byte &outByte) const
552 {
553  size_t size = 0;
554  if (AttachedTransformation())
555  size = AttachedTransformation()->Peek(outByte);
556  else
557  size = Peek(&outByte, 1);
558  return size;
559 }
560 
561 size_t BufferedTransformation::Peek(byte *outString, size_t peekMax) const
562 {
563  size_t size = 0;
564  if (AttachedTransformation())
565  size = AttachedTransformation()->Peek(outString, peekMax);
566  else
567  {
568  ArraySink arraySink(outString, peekMax);
569  size = (size_t)CopyTo(arraySink, peekMax);
570  }
571  return size;
572 }
573 
574 lword BufferedTransformation::Skip(lword skipMax)
575 {
576  lword size = 0;
577  if (AttachedTransformation())
578  size = AttachedTransformation()->Skip(skipMax);
579  else
580  size = TransferTo(TheBitBucket(), skipMax);
581  return size;
582 }
583 
585 {
586  lword size = 0;
587  if (AttachedTransformation())
588  size = AttachedTransformation()->TotalBytesRetrievable();
589  else
590  size = MaxRetrievable();
591  return size;
592 }
593 
595 {
596  unsigned int size = 0;
597  if (AttachedTransformation())
598  size = AttachedTransformation()->NumberOfMessages();
599  else
600  size = CopyMessagesTo(TheBitBucket());
601  return size;
602 }
603 
605 {
606  bool result = false;
607  if (AttachedTransformation())
608  result = AttachedTransformation()->AnyMessages();
609  else
610  result = NumberOfMessages() != 0;
611  return result;
612 }
613 
615 {
616  bool result = false;
617  if (AttachedTransformation())
618  result = AttachedTransformation()->GetNextMessage();
619  else
620  {
621  CRYPTOPP_ASSERT(!AnyMessages());
622  }
623  return result;
624 }
625 
626 unsigned int BufferedTransformation::SkipMessages(unsigned int count)
627 {
628  unsigned int size = 0;
629  if (AttachedTransformation())
630  size = AttachedTransformation()->SkipMessages(count);
631  else
632  size = TransferMessagesTo(TheBitBucket(), count);
633  return size;
634 }
635 
636 size_t BufferedTransformation::TransferMessagesTo2(BufferedTransformation &target, unsigned int &messageCount, const std::string &channel, bool blocking)
637 {
638  if (AttachedTransformation())
639  return AttachedTransformation()->TransferMessagesTo2(target, messageCount, channel, blocking);
640  else
641  {
642  unsigned int maxMessages = messageCount;
643  for (messageCount=0; messageCount < maxMessages && AnyMessages(); messageCount++)
644  {
645  size_t blockedBytes;
646  lword transferredBytes;
647 
648  while (AnyRetrievable())
649  {
650  transferredBytes = LWORD_MAX;
651  blockedBytes = TransferTo2(target, transferredBytes, channel, blocking);
652  if (blockedBytes > 0)
653  return blockedBytes;
654  }
655 
656  if (target.ChannelMessageEnd(channel, GetAutoSignalPropagation(), blocking))
657  return 1;
658 
659  bool result = GetNextMessage();
660  CRYPTOPP_UNUSED(result); CRYPTOPP_ASSERT(result);
661  }
662  return 0;
663  }
664 }
665 
666 unsigned int BufferedTransformation::CopyMessagesTo(BufferedTransformation &target, unsigned int count, const std::string &channel) const
667 {
668  unsigned int size = 0;
669  if (AttachedTransformation())
670  size = AttachedTransformation()->CopyMessagesTo(target, count, channel);
671  return size;
672 }
673 
675 {
676  if (AttachedTransformation())
677  AttachedTransformation()->SkipAll();
678  else
679  {
680  while (SkipMessages()) {}
681  while (Skip()) {}
682  }
683 }
684 
685 size_t BufferedTransformation::TransferAllTo2(BufferedTransformation &target, const std::string &channel, bool blocking)
686 {
687  if (AttachedTransformation())
688  return AttachedTransformation()->TransferAllTo2(target, channel, blocking);
689  else
690  {
691  CRYPTOPP_ASSERT(!NumberOfMessageSeries());
692 
693  unsigned int messageCount;
694  do
695  {
696  messageCount = UINT_MAX;
697  size_t blockedBytes = TransferMessagesTo2(target, messageCount, channel, blocking);
698  if (blockedBytes)
699  return blockedBytes;
700  }
701  while (messageCount != 0);
702 
703  lword byteCount;
704  do
705  {
706  byteCount = ULONG_MAX;
707  size_t blockedBytes = TransferTo2(target, byteCount, channel, blocking);
708  if (blockedBytes)
709  return blockedBytes;
710  }
711  while (byteCount != 0);
712 
713  return 0;
714  }
715 }
716 
717 void BufferedTransformation::CopyAllTo(BufferedTransformation &target, const std::string &channel) const
718 {
719  if (AttachedTransformation())
720  AttachedTransformation()->CopyAllTo(target, channel);
721  else
722  {
723  CRYPTOPP_ASSERT(!NumberOfMessageSeries());
724  while (CopyMessagesTo(target, UINT_MAX, channel)) {}
725  }
726 }
727 
728 void BufferedTransformation::SetRetrievalChannel(const std::string &channel)
729 {
730  if (AttachedTransformation())
731  AttachedTransformation()->SetRetrievalChannel(channel);
732 }
733 
734 size_t BufferedTransformation::ChannelPutWord16(const std::string &channel, word16 value, ByteOrder order, bool blocking)
735 {
736  PutWord(false, order, m_buf, value);
737  return ChannelPut(channel, m_buf, 2, blocking);
738 }
739 
740 size_t BufferedTransformation::ChannelPutWord32(const std::string &channel, word32 value, ByteOrder order, bool blocking)
741 {
742  PutWord(false, order, m_buf, value);
743  return ChannelPut(channel, m_buf, 4, blocking);
744 }
745 
746 size_t BufferedTransformation::ChannelPutWord64(const std::string &channel, word64 value, ByteOrder order, bool blocking)
747 {
748  PutWord(false, order, m_buf, value);
749  return ChannelPut(channel, m_buf, 8, blocking);
750 }
751 
752 size_t BufferedTransformation::PutWord16(word16 value, ByteOrder order, bool blocking)
753 {
754  return ChannelPutWord16(DEFAULT_CHANNEL, value, order, blocking);
755 }
756 
757 size_t BufferedTransformation::PutWord32(word32 value, ByteOrder order, bool blocking)
758 {
759  return ChannelPutWord32(DEFAULT_CHANNEL, value, order, blocking);
760 }
761 
762 size_t BufferedTransformation::PutWord64(word64 value, ByteOrder order, bool blocking)
763 {
764  return ChannelPutWord64(DEFAULT_CHANNEL, value, order, blocking);
765 }
766 
767 size_t BufferedTransformation::PeekWord16(word16 &value, ByteOrder order) const
768 {
769  byte buf[2] = {0, 0};
770  size_t len = Peek(buf, 2);
771 
772  if (order == BIG_ENDIAN_ORDER)
773  value = word16((buf[0] << 8) | buf[1]);
774  else
775  value = word16((buf[1] << 8) | buf[0]);
776 
777  return len;
778 }
779 
780 size_t BufferedTransformation::PeekWord32(word32 &value, ByteOrder order) const
781 {
782  byte buf[4] = {0, 0, 0, 0};
783  size_t len = Peek(buf, 4);
784 
785  if (order == BIG_ENDIAN_ORDER)
786  value = word32((buf[0] << 24) | (buf[1] << 16) |
787  (buf[2] << 8) | (buf[3] << 0));
788  else
789  value = word32((buf[3] << 24) | (buf[2] << 16) |
790  (buf[1] << 8) | (buf[0] << 0));
791 
792  return len;
793 }
794 
795 size_t BufferedTransformation::PeekWord64(word64 &value, ByteOrder order) const
796 {
797  byte buf[8] = {0, 0, 0, 0, 0, 0, 0, 0};
798  size_t len = Peek(buf, 8);
799 
800  if (order == BIG_ENDIAN_ORDER)
801  value = ((word64)buf[0] << 56) | ((word64)buf[1] << 48) | ((word64)buf[2] << 40) |
802  ((word64)buf[3] << 32) | ((word64)buf[4] << 24) | ((word64)buf[5] << 16) |
803  ((word64)buf[6] << 8) | (word64)buf[7];
804  else
805  value = ((word64)buf[7] << 56) | ((word64)buf[6] << 48) | ((word64)buf[5] << 40) |
806  ((word64)buf[4] << 32) | ((word64)buf[3] << 24) | ((word64)buf[2] << 16) |
807  ((word64)buf[1] << 8) | (word64)buf[0];
808 
809  return len;
810 }
811 
812 size_t BufferedTransformation::GetWord16(word16 &value, ByteOrder order)
813 {
814  return (size_t)Skip(PeekWord16(value, order));
815 }
816 
817 size_t BufferedTransformation::GetWord32(word32 &value, ByteOrder order)
818 {
819  return (size_t)Skip(PeekWord32(value, order));
820 }
821 
822 size_t BufferedTransformation::GetWord64(word64 &value, ByteOrder order)
823 {
824  return (size_t)Skip(PeekWord64(value, order));
825 }
826 
828 {
829  if (AttachedTransformation() && AttachedTransformation()->Attachable())
830  AttachedTransformation()->Attach(newAttachment);
831  else
832  Detach(newAttachment);
833 }
834 
836 {
837  GenerateRandom(rng, MakeParameters("KeySize", (int)keySize));
838 }
839 
841 {
842 public:
843  PK_DefaultEncryptionFilter(RandomNumberGenerator &rng, const PK_Encryptor &encryptor, BufferedTransformation *attachment, const NameValuePairs &parameters)
844  : m_rng(rng), m_encryptor(encryptor), m_parameters(parameters)
845  {
846  Detach(attachment);
847  }
848 
849  size_t Put2(const byte *inString, size_t length, int messageEnd, bool blocking)
850  {
851  FILTER_BEGIN;
852  m_plaintextQueue.Put(inString, length);
853 
854  if (messageEnd)
855  {
856  {
857  size_t plaintextLength;
858  if (!SafeConvert(m_plaintextQueue.CurrentSize(), plaintextLength))
859  throw InvalidArgument("PK_DefaultEncryptionFilter: plaintext too long");
860  size_t ciphertextLength = m_encryptor.CiphertextLength(plaintextLength);
861 
862  SecByteBlock plaintext(plaintextLength);
863  m_plaintextQueue.Get(plaintext, plaintextLength);
864  m_ciphertext.resize(ciphertextLength);
865  m_encryptor.Encrypt(m_rng, plaintext, plaintextLength, m_ciphertext, m_parameters);
866  }
867 
868  FILTER_OUTPUT(1, m_ciphertext, m_ciphertext.size(), messageEnd);
869  }
870  FILTER_END_NO_MESSAGE_END;
871  }
872 
873  RandomNumberGenerator &m_rng;
874  const PK_Encryptor &m_encryptor;
875  const NameValuePairs &m_parameters;
876  ByteQueue m_plaintextQueue;
877  SecByteBlock m_ciphertext;
878 };
879 
881 {
882  return new PK_DefaultEncryptionFilter(rng, *this, attachment, parameters);
883 }
884 
886 {
887 public:
888  PK_DefaultDecryptionFilter(RandomNumberGenerator &rng, const PK_Decryptor &decryptor, BufferedTransformation *attachment, const NameValuePairs &parameters)
889  : m_rng(rng), m_decryptor(decryptor), m_parameters(parameters)
890  {
891  Detach(attachment);
892  }
893 
894  size_t Put2(const byte *inString, size_t length, int messageEnd, bool blocking)
895  {
896  FILTER_BEGIN;
897  m_ciphertextQueue.Put(inString, length);
898 
899  if (messageEnd)
900  {
901  {
902  size_t ciphertextLength;
903  if (!SafeConvert(m_ciphertextQueue.CurrentSize(), ciphertextLength))
904  throw InvalidArgument("PK_DefaultDecryptionFilter: ciphertext too long");
905  size_t maxPlaintextLength = m_decryptor.MaxPlaintextLength(ciphertextLength);
906 
907  SecByteBlock ciphertext(ciphertextLength);
908  m_ciphertextQueue.Get(ciphertext, ciphertextLength);
909  m_plaintext.resize(maxPlaintextLength);
910  m_result = m_decryptor.Decrypt(m_rng, ciphertext, ciphertextLength, m_plaintext, m_parameters);
911  if (!m_result.isValidCoding)
912  throw InvalidCiphertext(m_decryptor.AlgorithmName() + ": invalid ciphertext");
913  }
914 
915  FILTER_OUTPUT(1, m_plaintext, m_result.messageLength, messageEnd);
916  }
917  FILTER_END_NO_MESSAGE_END;
918  }
919 
920  RandomNumberGenerator &m_rng;
921  const PK_Decryptor &m_decryptor;
922  const NameValuePairs &m_parameters;
923  ByteQueue m_ciphertextQueue;
924  SecByteBlock m_plaintext;
925  DecodingResult m_result;
926 };
927 
929 {
930  return new PK_DefaultDecryptionFilter(rng, *this, attachment, parameters);
931 }
932 
933 size_t PK_Signer::Sign(RandomNumberGenerator &rng, PK_MessageAccumulator *messageAccumulator, byte *signature) const
934 {
935  member_ptr<PK_MessageAccumulator> m(messageAccumulator);
936  return SignAndRestart(rng, *m, signature, false);
937 }
938 
939 size_t PK_Signer::SignMessage(RandomNumberGenerator &rng, const byte *message, size_t messageLen, byte *signature) const
940 {
941  member_ptr<PK_MessageAccumulator> m(NewSignatureAccumulator(rng));
942  m->Update(message, messageLen);
943  return SignAndRestart(rng, *m, signature, false);
944 }
945 
946 size_t PK_Signer::SignMessageWithRecovery(RandomNumberGenerator &rng, const byte *recoverableMessage, size_t recoverableMessageLength,
947  const byte *nonrecoverableMessage, size_t nonrecoverableMessageLength, byte *signature) const
948 {
949  member_ptr<PK_MessageAccumulator> m(NewSignatureAccumulator(rng));
950  InputRecoverableMessage(*m, recoverableMessage, recoverableMessageLength);
951  m->Update(nonrecoverableMessage, nonrecoverableMessageLength);
952  return SignAndRestart(rng, *m, signature, false);
953 }
954 
955 bool PK_Verifier::Verify(PK_MessageAccumulator *messageAccumulator) const
956 {
957  member_ptr<PK_MessageAccumulator> m(messageAccumulator);
958  return VerifyAndRestart(*m);
959 }
960 
961 bool PK_Verifier::VerifyMessage(const byte *message, size_t messageLen, const byte *signature, size_t signatureLen) const
962 {
963  member_ptr<PK_MessageAccumulator> m(NewVerificationAccumulator());
964  InputSignature(*m, signature, signatureLen);
965  m->Update(message, messageLen);
966  return VerifyAndRestart(*m);
967 }
968 
969 DecodingResult PK_Verifier::Recover(byte *recoveredMessage, PK_MessageAccumulator *messageAccumulator) const
970 {
971  member_ptr<PK_MessageAccumulator> m(messageAccumulator);
972  return RecoverAndRestart(recoveredMessage, *m);
973 }
974 
976  const byte *nonrecoverableMessage, size_t nonrecoverableMessageLength,
977  const byte *signature, size_t signatureLength) const
978 {
979  member_ptr<PK_MessageAccumulator> m(NewVerificationAccumulator());
980  InputSignature(*m, signature, signatureLength);
981  m->Update(nonrecoverableMessage, nonrecoverableMessageLength);
982  return RecoverAndRestart(recoveredMessage, *m);
983 }
984 
985 void SimpleKeyAgreementDomain::GenerateKeyPair(RandomNumberGenerator &rng, byte *privateKey, byte *publicKey) const
986 {
987  GeneratePrivateKey(rng, privateKey);
988  GeneratePublicKey(rng, privateKey, publicKey);
989 }
990 
991 void AuthenticatedKeyAgreementDomain::GenerateStaticKeyPair(RandomNumberGenerator &rng, byte *privateKey, byte *publicKey) const
992 {
993  GenerateStaticPrivateKey(rng, privateKey);
994  GenerateStaticPublicKey(rng, privateKey, publicKey);
995 }
996 
997 void AuthenticatedKeyAgreementDomain::GenerateEphemeralKeyPair(RandomNumberGenerator &rng, byte *privateKey, byte *publicKey) const
998 {
999  GenerateEphemeralPrivateKey(rng, privateKey);
1000  GenerateEphemeralPublicKey(rng, privateKey, publicKey);
1001 }
1002 
1003 // Allow a distro or packager to override the build-time version
1004 // http://github.com/weidai11/cryptopp/issues/371
1005 #ifndef CRYPTOPP_BUILD_VERSION
1006 # define CRYPTOPP_BUILD_VERSION CRYPTOPP_VERSION
1007 #endif
1008 int LibraryVersion(CRYPTOPP_NOINLINE_DOTDOTDOT)
1009 {
1010  return CRYPTOPP_BUILD_VERSION;
1011 }
1012 
1014 {
1015 public:
1016  NullNameValuePairs() {} // Clang complains a default ctor must be avilable
1017  bool GetVoidValue(const char *name, const std::type_info &valueType, void *pValue) const
1018  {CRYPTOPP_UNUSED(name); CRYPTOPP_UNUSED(valueType); CRYPTOPP_UNUSED(pValue); return false;}
1019 };
1020 
1021 #if HAVE_GCC_INIT_PRIORITY
1022  const std::string DEFAULT_CHANNEL __attribute__ ((init_priority (CRYPTOPP_INIT_PRIORITY + 25))) = "";
1023  const std::string AAD_CHANNEL __attribute__ ((init_priority (CRYPTOPP_INIT_PRIORITY + 26))) = "AAD";
1024  const NullNameValuePairs s_nullNameValuePairs __attribute__ ((init_priority (CRYPTOPP_INIT_PRIORITY + 27)));
1025  const NameValuePairs& g_nullNameValuePairs = s_nullNameValuePairs;
1026 #elif HAVE_MSC_INIT_PRIORITY
1027  #pragma warning(disable: 4073)
1028  #pragma init_seg(lib)
1029  const std::string DEFAULT_CHANNEL = "";
1030  const std::string AAD_CHANNEL = "AAD";
1031  const NullNameValuePairs s_nullNameValuePairs;
1032  const NameValuePairs& g_nullNameValuePairs = s_nullNameValuePairs;
1033  #pragma warning(default: 4073)
1034 #elif HAVE_XLC_INIT_PRIORITY
1035  #pragma priority(260)
1036  const std::string DEFAULT_CHANNEL = "";
1037  const std::string AAD_CHANNEL = "AAD";
1038  const NullNameValuePairs s_nullNameValuePairs;
1039  const NameValuePairs& g_nullNameValuePairs = s_nullNameValuePairs;
1040 #else
1041  const std::string DEFAULT_CHANNEL = "";
1042  const std::string AAD_CHANNEL = "AAD";
1043  const simple_ptr<NullNameValuePairs> s_pNullNameValuePairs(new NullNameValuePairs);
1044  const NameValuePairs &g_nullNameValuePairs = *s_pNullNameValuePairs.m_p;
1045 #endif
1046 
1047 NAMESPACE_END // CryptoPP
1048 
1049 #endif // CRYPTOPP_IMPORTS
Used to pass byte array input as part of a NameValuePairs object.
Definition: algparam.h:20
bool GetVoidValue(const char *name, const std::type_info &valueType, void *pValue) const
Get a named value.
Definition: cryptlib.cpp:1017
Standard names for retrieving values by name when working with NameValuePairs.
const char * DigestSize()
int, in bytes
Definition: argnames.h:79
An invalid argument was detected.
Definition: cryptlib.h:202
virtual size_t ChannelPutModifiable2(const std::string &channel, byte *inString, size_t length, int messageEnd, bool blocking)
Input multiple bytes that may be modified by callee on a channel.
Definition: cryptlib.cpp:475
virtual void SetParameters(const NameValuePairs &params)
Set or change parameters.
Definition: cryptlib.cpp:352
virtual void GenerateKeyPair(RandomNumberGenerator &rng, byte *privateKey, byte *publicKey) const
Generate a private/public key pair.
Definition: cryptlib.cpp:985
size_t ChannelPutWord32(const std::string &channel, word32 value, ByteOrder order=BIG_ENDIAN_ORDER, bool blocking=true)
Input a 32-bit word for processing on a channel.
Definition: cryptlib.cpp:740
size_t ChannelPutWord64(const std::string &channel, word64 value, ByteOrder order=BIG_ENDIAN_ORDER, bool blocking=true)
Input a 64-bit word for processing on a channel.
Definition: cryptlib.cpp:746
size_t TransferAllTo2(BufferedTransformation &target, const std::string &channel=DEFAULT_CHANNEL, bool blocking=true)
Transfer all bytes from this object to another BufferedTransformation.
Definition: cryptlib.cpp:685
Classes for working with NameValuePairs.
word32 GenerateWord32(word32 min, word32 max)
An implementation that throws NotImplemented.
Definition: cryptlib.cpp:373
bool SafeConvert(T1 from, T2 &to)
Tests whether a conversion from -> to is safe to perform.
Definition: misc.h:685
size_t TransferMessagesTo2(BufferedTransformation &target, unsigned int &messageCount, const std::string &channel=DEFAULT_CHANNEL, bool blocking=true)
Transfer messages from this object to another BufferedTransformation.
Definition: cryptlib.cpp:636
Utility functions for the Crypto++ library.
virtual void SetKey(const byte *key, size_t length, const NameValuePairs &params=g_nullNameValuePairs)
Sets or reset the key of this object.
Definition: cryptlib.cpp:58
const char * Rounds()
int
Definition: argnames.h:24
virtual size_t Peek(byte &outByte) const
Peek a 8-bit byte.
Definition: cryptlib.cpp:551
ByteOrder
Provides the byte ordering.
Definition: cryptlib.h:143
virtual void GenerateBlock(byte *output, size_t size)
Generate random array of bytes.
Definition: cryptlib.cpp:311
size_t size() const
Length of the memory block.
Definition: algparam.h:84
size_t ChannelPut(const std::string &channel, byte inByte, bool blocking=true)
Input a byte for processing on a channel.
Definition: cryptlib.h:2169
virtual bool Verify(PK_MessageAccumulator *messageAccumulator) const
Check whether messageAccumulator contains a valid signature and message.
Definition: cryptlib.cpp:955
virtual size_t SignMessage(RandomNumberGenerator &rng, const byte *message, size_t messageLen, byte *signature) const
Sign a message.
Definition: cryptlib.cpp:939
unsigned int GetMaxWaitObjectCount() const
Retrieves the maximum number of waitable objects.
Definition: cryptlib.cpp:421
Exception thrown when an invalid key length is encountered.
Definition: simple.h:55
virtual size_t ProcessLastBlock(byte *outString, size_t outLength, const byte *inString, size_t inLength)
Encrypt or decrypt the last block of data.
Definition: cryptlib.cpp:217
void PutWord(bool assumeAligned, ByteOrder order, byte *block, T value, const byte *xorBlock=NULL)
Access a block of memory.
Definition: misc.h:2483
virtual bool DecryptAndVerify(byte *message, const byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *ciphertext, size_t ciphertextLength)
Decrypts and verifies a MAC in one call.
Definition: cryptlib.cpp:256
virtual void GenerateStaticKeyPair(RandomNumberGenerator &rng, byte *privateKey, byte *publicKey) const
Generate a static private/public key pair.
Definition: cryptlib.cpp:991
Interface for public-key encryptors.
Definition: cryptlib.h:2671
byte GenerateByte()
An implementation that throws NotImplemented.
Definition: cryptlib.cpp:369
virtual word32 GenerateWord32(word32 min=0, word32 max=0xffffffffUL)
Generate a random 32 bit word in the range min to max, inclusive.
Definition: cryptlib.cpp:283
Abstract base classes that provide a uniform interface to this library.
Thrown when an unexpected type is encountered.
Definition: cryptlib.h:329
void GenerateBlock(byte *output, size_t size)
An implementation that throws NotImplemented.
Definition: cryptlib.cpp:377
virtual void DiscardBytes(size_t n)
Generate and discard n bytes.
Definition: cryptlib.cpp:319
The self tests were executed via DoPowerUpSelfTest() or DoDllPowerUpSelfTest(), but the result was fa...
Definition: fips140.h:43
Classes for automatic resource management.
virtual Clonable * Clone() const
Copies this object.
Definition: cryptlib.h:595
void GenerateIntoBufferedTransformation(BufferedTransformation &target, const std::string &channel, lword length)
An implementation that throws NotImplemented.
Definition: cryptlib.cpp:385
Library configuration file.
Interface for random number generators.
Definition: cryptlib.h:1414
Common C++ header files.
virtual bool MessageSeriesEnd(int propagation=-1, bool blocking=true)
Marks the end of a series of messages, with signal propagation.
Definition: cryptlib.cpp:448
void SetKeyWithRounds(const byte *key, size_t length, int rounds)
Sets or reset the key of this object.
Definition: cryptlib.cpp:64
virtual void GenerateEphemeralKeyPair(RandomNumberGenerator &rng, byte *privateKey, byte *publicKey) const
Generate private/public key pair.
Definition: cryptlib.cpp:997
virtual bool ChannelFlush(const std::string &channel, bool hardFlush, int propagation=-1, bool blocking=true)
Flush buffered input and/or output on a channel.
Definition: cryptlib.cpp:485
virtual bool TruncatedVerify(const byte *digest, size_t digestLength)
Verifies the hash of the current message.
Definition: cryptlib.cpp:406
SecBlock<byte> typedef.
Definition: secblock.h:1090
virtual unsigned int SkipMessages(unsigned int count=UINT_MAX)
Skip a number of meessages.
Definition: cryptlib.cpp:626
virtual void SetRetrievalChannel(const std::string &channel)
Sets the default retrieval channel.
Definition: cryptlib.cpp:728
Interface for buffered transformations.
Definition: cryptlib.h:1631
virtual unsigned int OptimalDataAlignment() const
Provides input and output data alignment for optimal performance.
Definition: cryptlib.cpp:190
void CopyAllTo(BufferedTransformation &target, const std::string &channel=DEFAULT_CHANNEL) const
Copy messages from this object to another BufferedTransformation.
Definition: cryptlib.cpp:717
Interface for cloning objects.
Definition: cryptlib.h:585
virtual size_t SignMessageWithRecovery(RandomNumberGenerator &rng, const byte *recoverableMessage, size_t recoverableMessageLength, const byte *nonrecoverableMessage, size_t nonrecoverableMessageLength, byte *signature) const
Sign a recoverable message.
Definition: cryptlib.cpp:946
std::string AlgorithmName() const
The name of the generator.
Definition: cryptlib.cpp:365
size_t Put2(const byte *inString, size_t length, int messageEnd, bool blocking)
Input multiple bytes for processing.
Definition: cryptlib.cpp:894
CRYPTOPP_DLL RandomNumberGenerator &CRYPTOPP_API NullRNG()
Random Number Generator that does not produce random numbers.
Definition: cryptlib.cpp:400
Classes and functions for secure memory allocations.
Copy input to a memory buffer.
Definition: filters.h:1137
Exception thrown when a filter does not support named channels.
Definition: cryptlib.h:2157
Returns a decoding results.
Definition: cryptlib.h:277
Algorithm(bool checkSelfTestStatus=true)
Interface for all crypto algorithms.
Definition: cryptlib.cpp:46
size_t PeekWord32(word32 &value, ByteOrder order=BIG_ENDIAN_ORDER) const
Peek a 32-bit word.
Definition: cryptlib.cpp:780
virtual void Attach(BufferedTransformation *newAttachment)
Add newAttachment to the end of attachment chain.
Definition: cryptlib.cpp:827
Interface for public-key decryptors.
Definition: cryptlib.h:2706
size_t PutWord64(word64 value, ByteOrder order=BIG_ENDIAN_ORDER, bool blocking=true)
Input a 64-bit word for processing.
Definition: cryptlib.cpp:762
void Shuffle(IT begin, IT end)
An implementation that does nothing.
Definition: cryptlib.cpp:393
A method was called which was not implemented.
Definition: cryptlib.h:232
CRYPTOPP_DLL bool CRYPTOPP_API VerifyBufsEqual(const byte *buf1, const byte *buf2, size_t count)
Performs a near constant-time comparison of two equally sized buffers.
Definition: misc.cpp:114
const byte * begin() const
Pointer to the first byte in the memory block.
Definition: algparam.h:80
const std::string DEFAULT_CHANNEL
Default channel for BufferedTransformation.
Definition: cryptlib.h:511
AlgorithmParameters MakeParameters(const char *name, const T &value, bool throwIfNotUsed=true)
Create an object that implements NameValuePairs.
Definition: algparam.h:504
virtual unsigned int NumberOfMessages() const
Provides the number of meesages processed by this object.
Definition: cryptlib.cpp:594
Manages resources for a single object.
Definition: smartptr.h:18
virtual lword TotalBytesRetrievable() const
Provides the number of bytes ready for retrieval.
Definition: cryptlib.cpp:584
Exception thrown when a crypto algorithm is used after a self test fails.
Definition: fips140.h:22
virtual bool ChannelMessageSeriesEnd(const std::string &channel, int propagation=-1, bool blocking=true)
Marks the end of a series of messages on a channel.
Definition: cryptlib.cpp:495
virtual DecodingResult RecoverMessage(byte *recoveredMessage, const byte *nonrecoverableMessage, size_t nonrecoverableMessageLength, const byte *signature, size_t signatureLength) const
Recover a message from its signature.
Definition: cryptlib.cpp:975
#define CRYPTOPP_COMPILE_ASSERT(expr)
Compile time assertion.
Definition: misc.h:149
virtual bool Flush(bool hardFlush, int propagation=-1, bool blocking=true)
Flush buffered input and/or output, with signal propagation.
Definition: cryptlib.cpp:441
virtual byte * ChannelCreatePutSpace(const std::string &channel, size_t &size)
Request space which can be written into by the caller.
Definition: cryptlib.cpp:455
T Crop(T value, size_t bits)
Truncates the value to the specified number of bits.
Definition: misc.h:901
virtual size_t AdvancedProcessBlocks(const byte *inBlocks, const byte *xorBlocks, byte *outBlocks, size_t length, word32 flags) const
Encrypt and xor multiple blocks using additional flags.
Definition: cryptlib.cpp:141
virtual size_t MaxDerivedKeyLength() const
Determine maximum number of bytes.
Definition: cryptlib.cpp:341
Precompiled header file.
virtual bool VerifyMessage(const byte *message, size_t messageLen, const byte *signature, size_t signatureLen) const
Check whether input signature is a valid signature for input message.
Definition: cryptlib.cpp:961
const T1 UnsignedMin(const T1 &a, const T2 &b)
Safe comparison of values that could be neagtive and incorrectly promoted.
Definition: misc.h:669
virtual size_t ChannelPut2(const std::string &channel, const byte *inString, size_t length, int messageEnd, bool blocking)
Input multiple bytes for processing on a channel.
Definition: cryptlib.cpp:465
const NameValuePairs & g_nullNameValuePairs
An empty set of name-value pairs.
Definition: cryptlib.h:529
unsigned int GenerateBit()
An implementation that throws NotImplemented.
Definition: cryptlib.cpp:371
virtual BufferedTransformation * CreateDecryptionFilter(RandomNumberGenerator &rng, BufferedTransformation *attachment=NULL, const NameValuePairs &parameters=g_nullNameValuePairs) const
Create a new decryption filter.
Definition: cryptlib.cpp:928
virtual unsigned int OptimalDataAlignment() const
Provides input and output data alignment for optimal performance.
Definition: cryptlib.cpp:195
virtual lword Skip(lword skipMax=LWORD_MAX)
Discard skipMax bytes from the output buffer.
Definition: cryptlib.cpp:574
virtual std::string AlgorithmName() const
Provides the name of this algorithm.
Definition: cryptlib.cpp:265
size_t GetWord64(word64 &value, ByteOrder order=BIG_ENDIAN_ORDER)
Retrieve a 64-bit word.
Definition: cryptlib.cpp:822
byte order is big-endian
Definition: cryptlib.h:147
virtual std::string AlgorithmName() const
Provides the name of this algorithm.
Definition: cryptlib.h:620
#define CRYPTOPP_ASSERT(exp)
Debugging and diagnostic assertion.
Definition: trap.h:69
virtual byte GenerateByte()
Generate new random byte and return it.
Definition: cryptlib.cpp:276
virtual bool AnyMessages() const
Determines if any messages are available for retrieval.
Definition: cryptlib.cpp:604
CRYPTOPP_DLL bool CRYPTOPP_API FIPS_140_2_ComplianceEnabled()
Determines whether the library provides FIPS validated cryptography.
Definition: fips140.cpp:24
Data structure used to store byte strings.
Definition: queue.h:18
const char * BlockSize()
int, in bytes
Definition: argnames.h:27
virtual bool AnyRetrievable() const
Determines whether bytes are ready for retrieval.
Definition: cryptlib.cpp:515
size_t GetWord16(word16 &value, ByteOrder order=BIG_ENDIAN_ORDER)
Retrieve a 16-bit word.
Definition: cryptlib.cpp:812
void GetWaitObjects(WaitObjectContainer &container, CallStack const &callStack)
Retrieves waitable objects.
Definition: cryptlib.cpp:427
Random Number Generator that does not produce random numbers.
Definition: cryptlib.cpp:360
virtual unsigned int OptimalDataAlignment() const
Provides input and output data alignment for optimal performance.
Definition: cryptlib.cpp:200
Implementation of BufferedTransformation&#39;s attachment interface.
const char * IV()
ConstByteArrayParameter, also accepts const byte * for backwards compatibility.
Definition: argnames.h:21
The self tests have not been performed.
Definition: fips140.h:40
Interface for accumulating messages to be signed or verified.
Definition: cryptlib.h:2834
unsigned int CopyMessagesTo(BufferedTransformation &target, unsigned int count=UINT_MAX, const std::string &channel=DEFAULT_CHANNEL) const
Copy messages from this object to another BufferedTransformation.
Definition: cryptlib.cpp:666
A decryption filter encountered invalid ciphertext.
Definition: cryptlib.h:222
size_t PutWord32(word32 value, ByteOrder order=BIG_ENDIAN_ORDER, bool blocking=true)
Input a 32-bit word for processing.
Definition: cryptlib.cpp:757
void SetKeyWithIV(const byte *key, size_t length, const byte *iv, size_t ivLength)
Sets or reset the key of this object.
Definition: cryptlib.cpp:69
PTR PtrAdd(PTR pointer, OFF offset)
Create a pointer with an offset.
Definition: misc.h:384
virtual lword MaxRetrievable() const
Provides the number of bytes ready for retrieval.
Definition: cryptlib.cpp:505
size_t GetWord32(word32 &value, ByteOrder order=BIG_ENDIAN_ORDER)
Retrieve a 32-bit word.
Definition: cryptlib.cpp:817
virtual unsigned int GenerateBit()
Generate new random bit and return it.
Definition: cryptlib.cpp:271
Base class for unflushable filters.
Definition: simple.h:133
virtual size_t Sign(RandomNumberGenerator &rng, PK_MessageAccumulator *messageAccumulator, byte *signature) const
Sign and delete the messageAccumulator.
Definition: cryptlib.cpp:933
virtual BufferedTransformation * CreateEncryptionFilter(RandomNumberGenerator &rng, BufferedTransformation *attachment=NULL, const NameValuePairs &parameters=g_nullNameValuePairs) const
Create a new encryption filter.
Definition: cryptlib.cpp:880
Classes and functions for the FIPS 140-2 validated library.
size_t PeekWord64(word64 &value, ByteOrder order=BIG_ENDIAN_ORDER) const
Peek a 64-bit word.
Definition: cryptlib.cpp:795
virtual void EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *message, size_t messageLength)
Encrypts and calculates a MAC in one call.
Definition: cryptlib.cpp:247
CRYPTOPP_DLL PowerUpSelfTestStatus CRYPTOPP_API GetPowerUpSelfTestStatus()
Provides the current power-up self test status.
Definition: fips140.cpp:34
virtual void SkipAll()
Skip all messages in the series.
Definition: cryptlib.cpp:674
void GenerateRandomWithKeySize(RandomNumberGenerator &rng, unsigned int keySize)
Generate a random key or crypto parameters.
Definition: cryptlib.cpp:835
Exception thrown when an invalid derived key length is encountered.
Definition: simple.h:85
std::string IntToString(T value, unsigned int base=10)
Converts a value to a string.
Definition: misc.h:699
CRYPTOPP_DLL void CRYPTOPP_API xorbuf(byte *buf, const byte *mask, size_t count)
Performs an XOR of a buffer with a mask.
Definition: misc.cpp:46
size_t PutWord16(word16 value, ByteOrder order=BIG_ENDIAN_ORDER, bool blocking=true)
Input a 16-bit word for processing.
Definition: cryptlib.cpp:752
virtual bool GetNextMessage()
Start retrieving the next message.
Definition: cryptlib.cpp:614
CRYPTOPP_DLL BufferedTransformation & TheBitBucket()
An input discarding BufferedTransformation.
Definition: cryptlib.cpp:40
size_t PeekWord16(word16 &value, ByteOrder order=BIG_ENDIAN_ORDER) const
Peek a 16-bit word.
Definition: cryptlib.cpp:767
void SpecifyDataLengths(lword headerLength, lword messageLength, lword footerLength=0)
Prescribes the data lengths.
Definition: cryptlib.cpp:233
Acts as an input discarding Filter or Sink.
Definition: simple.h:409
virtual size_t Get(byte &outByte)
Retrieve a 8-bit byte.
Definition: cryptlib.cpp:528
int LibraryVersion(...)
Specifies the build-time version of the library.
Definition: cryptlib.cpp:1008
Crypto++ library namespace.
bool GetValue(const char *name, T &value) const
Get a named value.
Definition: cryptlib.h:379
virtual DecodingResult Recover(byte *recoveredMessage, PK_MessageAccumulator *messageAccumulator) const
Recover a message from its signature.
Definition: cryptlib.cpp:969
bool CanIncorporateEntropy() const
An implementation that returns false.
Definition: cryptlib.cpp:389
void IncorporateEntropy(const byte *input, size_t length)
An implementation that throws NotImplemented.
Definition: cryptlib.cpp:387
const std::string AAD_CHANNEL
Channel for additional authenticated data.
Definition: cryptlib.h:520
virtual void Initialize(const NameValuePairs &parameters=g_nullNameValuePairs, int propagation=-1)
Initialize or reinitialize this object, with signal propagation.
Definition: cryptlib.cpp:434
size_t ChannelPutWord16(const std::string &channel, word16 value, ByteOrder order=BIG_ENDIAN_ORDER, bool blocking=true)
Input a 16-bit word for processing on a channel.
Definition: cryptlib.cpp:734
void DiscardBytes(size_t n)
An implementation that does nothing.
Definition: cryptlib.cpp:391
virtual void GetNextIV(RandomNumberGenerator &rng, byte *iv)
Retrieves a secure IV for the next message.
Definition: cryptlib.cpp:136
virtual void Update(const byte *input, size_t length)=0
Updates a hash with additional input.
virtual size_t MinDerivedKeyLength() const
Determine minimum number of bytes.
Definition: cryptlib.cpp:336
unsigned int BitPrecision(const T &value)
Returns the number of bits required for a value.
Definition: misc.h:817
size_type size() const
Provides the count of elements in the SecBlock.
Definition: secblock.h:828
virtual void GenerateIntoBufferedTransformation(BufferedTransformation &target, const std::string &channel, lword length)
Generate random bytes into a BufferedTransformation.
Definition: cryptlib.cpp:324
Classes for access to the operating system&#39;s random number generators.
bool ChannelMessageEnd(const std::string &channel, int propagation=-1, bool blocking=true)
Signal the end of a message.
Definition: cryptlib.h:2227
Interface for retrieving values given their names.
Definition: cryptlib.h:321
size_t Put2(const byte *inString, size_t length, int messageEnd, bool blocking)
Input multiple bytes for processing.
Definition: cryptlib.cpp:849