2002-10-04 17:31:41 +00:00
// cryptlib.h - written and placed in the public domain by Wei Dai
/*! \file
This file contains the declarations for the abstract base
classes that provide a uniform interface to this library .
*/
2005-07-13 02:19:10 +00:00
/*! \mainpage <a href="http://www.cryptopp.com">Crypto++</a><sup><small>®</small></sup> Library 5.3 Reference Manual
2002-10-04 17:31:41 +00:00
< dl >
< dt > Abstract Base Classes < dd >
cryptlib . h
< dt > Symmetric Ciphers < dd >
SymmetricCipherDocumentation
< dt > Hash Functions < dd >
2005-09-05 21:02:56 +00:00
HAVAL , MD2 , MD4 , MD5 , PanamaHash , RIPEMD160 , RIPEMD320 , RIPEMD128 , RIPEMD256 , SHA1 , SHA224 , SHA256 , SHA384 , SHA512 , Tiger , Whirlpool
2002-10-04 17:31:41 +00:00
< dt > Non - Cryptographic Checksums < dd >
CRC32 , Adler32
< dt > Message Authentication Codes < dd >
2004-07-22 00:51:57 +00:00
# MD5MAC, XMACC, HMAC, CBC_MAC, DMAC, PanamaMAC, TTMAC
2002-10-04 17:31:41 +00:00
< dt > Random Number Generators < dd >
NullRNG ( ) , LC_RNG , RandomPool , BlockingRng , NonblockingRng , AutoSeededRandomPool , AutoSeededX917RNG
2004-07-22 00:51:57 +00:00
< dt > Password - based Cryptography < dd >
PasswordBasedKeyDerivationFunction
2002-10-04 17:31:41 +00:00
< dt > Public Key Cryptosystems < dd >
DLIES , ECIES , LUCES , RSAES , RabinES , LUC_IES
< dt > Public Key Signature Schemes < dd >
2005-09-05 21:02:56 +00:00
DSA , GDSA , ECDSA , NR , ECNR , LUCSS , RSASS , RSASS_ISO , RabinSS , RWSS , ESIGN
2002-10-04 17:31:41 +00:00
< dt > Key Agreement < dd >
# DH, DH2, #MQV, ECDH, ECMQV, XTR_DH
< dt > Algebraic Structures < dd >
Integer , PolynomialMod2 , PolynomialOver , RingOfPolynomialsOver ,
ModularArithmetic , MontgomeryRepresentation , GFP2_ONB ,
GF2NP , GF256 , GF2_32 , EC2N , ECP
< dt > Secret Sharing and Information Dispersal < dd >
SecretSharing , SecretRecovery , InformationDispersal , InformationRecovery
< dt > Compression < dd >
Deflator , Inflator , Gzip , Gunzip , ZlibCompressor , ZlibDecompressor
< dt > Input Source Classes < dd >
StringSource , FileSource , SocketSource , WindowsPipeSource , RandomNumberSource
< dt > Output Sink Classes < dd >
StringSinkTemplate , ArraySink , FileSink , SocketSink , WindowsPipeSink
< dt > Filter Wrappers < dd >
StreamTransformationFilter , HashFilter , HashVerificationFilter , SignerFilter , SignatureVerificationFilter
< dt > Binary to Text Encoders and Decoders < dd >
2004-07-22 00:51:57 +00:00
HexEncoder , HexDecoder , Base64Encoder , Base64Decoder , Base32Encoder , Base32Decoder
2002-10-04 17:31:41 +00:00
< dt > Wrappers for OS features < dd >
2004-07-22 00:51:57 +00:00
Timer , Socket , WindowsHandle , ThreadLocalStorage , ThreadUserTimer
2002-10-04 17:31:41 +00:00
< dt > FIPS 140 related < dd >
fips140 . h
< / dl >
2003-07-04 00:17:37 +00:00
In the FIPS 140 - 2 validated DLL version of Crypto + + , only the following implementation class are available .
< dl >
< dt > Block Ciphers < dd >
2003-07-10 04:34:23 +00:00
AES , DES_EDE2 , DES_EDE3 , SKIPJACK
2003-07-04 00:17:37 +00:00
< dt > Cipher Modes ( replace template parameter BC with one of the block ciphers above ) < dd >
2005-09-05 21:02:56 +00:00
ECB_Mode \ < BC \ > , CTR_Mode \ < BC \ > , CBC_Mode \ < BC \ > , CFB_FIPS_Mode \ < BC \ > , OFB_Mode \ < BC \ >
2003-07-04 00:17:37 +00:00
< dt > Hash Functions < dd >
2005-09-05 21:02:56 +00:00
SHA1 , SHA224 , SHA256 , SHA384 , SHA512
< dt > Public Key Signature Schemes ( replace template parameter H with one of the hash functions above ) < dd >
RSASS \ < PKCS1v15 , H \ > , RSASS \ < PSS , H \ > , RSASS_ISO \ < H \ > , RWSS \ < P1363_EMSA2 , H \ > , DSA , ECDSA \ < ECP , H \ > , ECDSA \ < EC2N , H \ >
< dt > Message Authentication Codes ( replace template parameter H with one of the hash functions above ) < dd >
HMAC \ < H \ > , CBC_MAC \ < DES_EDE2 \ > , CBC_MAC \ < DES_EDE3 \ >
2003-07-04 00:17:37 +00:00
< dt > Random Number Generators < dd >
2004-07-22 00:51:57 +00:00
AutoSeededX917RNG \ < DES_EDE3 \ >
2003-07-04 00:17:37 +00:00
< dt > Key Agreement < dd >
# DH
< dt > Public Key Cryptosystems < dd >
2005-09-05 21:02:56 +00:00
RSAES \ < OAEP \ < SHA1 \ > \ >
2003-07-04 00:17:37 +00:00
< / dl >
2002-10-04 17:31:41 +00:00
< p > This reference manual is a work in progress . Some classes are still lacking detailed descriptions .
< p > Click < a href = " CryptoPPRef.zip " > here < / a > to download a zip archive containing this manual .
< p > Thanks to Ryan Phillips for providing the Doxygen configuration file
and getting me started with this manual .
*/
# ifndef CRYPTOPP_CRYPTLIB_H
# define CRYPTOPP_CRYPTLIB_H
# include "config.h"
2003-07-04 00:17:37 +00:00
# include "stdcpp.h"
2002-10-04 17:31:41 +00:00
NAMESPACE_BEGIN ( CryptoPP )
// forward declarations
class Integer ;
//! used to specify a direction for a cipher to operate in (encrypt or decrypt)
enum CipherDir { ENCRYPTION , DECRYPTION } ;
//! used to represent infinite time
const unsigned long INFINITE_TIME = ULONG_MAX ;
// VC60 workaround: using enums as template parameters causes problems
template < typename ENUM_TYPE , int VALUE >
struct EnumToType
{
static ENUM_TYPE ToEnum ( ) { return ( ENUM_TYPE ) VALUE ; }
} ;
enum ByteOrder { LITTLE_ENDIAN_ORDER = 0 , BIG_ENDIAN_ORDER = 1 } ;
typedef EnumToType < ByteOrder , LITTLE_ENDIAN_ORDER > LittleEndian ;
typedef EnumToType < ByteOrder , BIG_ENDIAN_ORDER > BigEndian ;
//! base class for all exceptions thrown by Crypto++
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL Exception : public std : : exception
2002-10-04 17:31:41 +00:00
{
public :
//! error types
enum ErrorType {
//! a method is not implemented
NOT_IMPLEMENTED ,
//! invalid function argument
INVALID_ARGUMENT ,
//! BufferedTransformation received a Flush(true) signal but can't flush buffers
CANNOT_FLUSH ,
//! data integerity check (such as CRC or MAC) failed
DATA_INTEGRITY_CHECK_FAILED ,
//! received input data that doesn't conform to expected format
INVALID_DATA_FORMAT ,
//! error reading from input device or writing to output device
IO_ERROR ,
//! some error not belong to any of the above categories
OTHER_ERROR
} ;
2003-03-20 01:24:12 +00:00
explicit Exception ( ErrorType errorType , const std : : string & s ) : m_errorType ( errorType ) , m_what ( s ) { }
2002-10-04 17:31:41 +00:00
virtual ~ Exception ( ) throw ( ) { }
const char * what ( ) const throw ( ) { return ( m_what . c_str ( ) ) ; }
const std : : string & GetWhat ( ) const { return m_what ; }
void SetWhat ( const std : : string & s ) { m_what = s ; }
ErrorType GetErrorType ( ) const { return m_errorType ; }
void SetErrorType ( ErrorType errorType ) { m_errorType = errorType ; }
private :
ErrorType m_errorType ;
std : : string m_what ;
} ;
//! exception thrown when an invalid argument is detected
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL InvalidArgument : public Exception
2002-10-04 17:31:41 +00:00
{
public :
explicit InvalidArgument ( const std : : string & s ) : Exception ( INVALID_ARGUMENT , s ) { }
} ;
2004-07-23 09:57:11 +00:00
//! exception thrown when input data is received that doesn't conform to expected format
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL InvalidDataFormat : public Exception
2002-10-04 17:31:41 +00:00
{
public :
explicit InvalidDataFormat ( const std : : string & s ) : Exception ( INVALID_DATA_FORMAT , s ) { }
} ;
//! exception thrown by decryption filters when trying to decrypt an invalid ciphertext
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL InvalidCiphertext : public InvalidDataFormat
2002-10-04 17:31:41 +00:00
{
public :
explicit InvalidCiphertext ( const std : : string & s ) : InvalidDataFormat ( s ) { }
} ;
//! exception thrown by a class if a non-implemented method is called
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL NotImplemented : public Exception
2002-10-04 17:31:41 +00:00
{
public :
explicit NotImplemented ( const std : : string & s ) : Exception ( NOT_IMPLEMENTED , s ) { }
} ;
//! exception thrown by a class when Flush(true) is called but it can't completely flush its buffers
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CannotFlush : public Exception
2002-10-04 17:31:41 +00:00
{
public :
explicit CannotFlush ( const std : : string & s ) : Exception ( CANNOT_FLUSH , s ) { }
} ;
//! error reported by the operating system
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL OS_Error : public Exception
2002-10-04 17:31:41 +00:00
{
public :
2003-07-19 00:30:19 +00:00
OS_Error ( ErrorType errorType , const std : : string & s , const std : : string & operation , int errorCode )
2002-10-04 17:31:41 +00:00
: Exception ( errorType , s ) , m_operation ( operation ) , m_errorCode ( errorCode ) { }
~ OS_Error ( ) throw ( ) { }
// the operating system API that reported the error
const std : : string & GetOperation ( ) const { return m_operation ; }
// the error code return by the operating system
int GetErrorCode ( ) const { return m_errorCode ; }
protected :
std : : string m_operation ;
int m_errorCode ;
} ;
//! used to return decoding results
2003-07-04 00:17:37 +00:00
struct CRYPTOPP_DLL DecodingResult
2002-10-04 17:31:41 +00:00
{
explicit DecodingResult ( ) : isValidCoding ( false ) , messageLength ( 0 ) { }
2005-07-12 04:23:32 +00:00
explicit DecodingResult ( size_t len ) : isValidCoding ( true ) , messageLength ( len ) { }
2002-10-04 17:31:41 +00:00
bool operator = = ( const DecodingResult & rhs ) const { return isValidCoding = = rhs . isValidCoding & & messageLength = = rhs . messageLength ; }
bool operator ! = ( const DecodingResult & rhs ) const { return ! operator = = ( rhs ) ; }
bool isValidCoding ;
2005-07-12 04:23:32 +00:00
size_t messageLength ;
2002-10-04 17:31:41 +00:00
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
2005-07-12 04:23:32 +00:00
operator size_t ( ) const { return isValidCoding ? messageLength : 0 ; }
2002-10-04 17:31:41 +00:00
# endif
} ;
//! interface for retrieving values given their names
2003-07-18 04:35:30 +00:00
/*! \note This class is used to safely pass a variable number of arbitrarily typed arguments to functions
2002-10-04 17:31:41 +00:00
and to read values from keys and crypto parameters .
2003-07-18 04:35:30 +00:00
\ note To obtain an object that implements NameValuePairs for the purpose of parameter
passing , use the MakeParameters ( ) function .
\ note To get a value from NameValuePairs , you need to know the name and the type of the value .
2002-10-04 17:31:41 +00:00
Call GetValueNames ( ) on a NameValuePairs object to obtain a list of value names that it supports .
Then look at the Name namespace documentation to see what the type of each value is , or
alternatively , call GetIntValue ( ) with the value name , and if the type is not int , a
ValueTypeMismatch exception will be thrown and you can get the actual type from the exception object .
*/
2003-05-16 00:02:31 +00:00
class CRYPTOPP_NO_VTABLE NameValuePairs
2002-10-04 17:31:41 +00:00
{
public :
virtual ~ NameValuePairs ( ) { }
//! exception thrown when trying to retrieve a value using a different type than expected
2003-07-16 01:53:45 +00:00
class CRYPTOPP_DLL ValueTypeMismatch : public InvalidArgument
2002-10-04 17:31:41 +00:00
{
public :
2003-07-19 00:30:19 +00:00
ValueTypeMismatch ( const std : : string & name , const std : : type_info & stored , const std : : type_info & retrieving )
2002-10-04 17:31:41 +00:00
: InvalidArgument ( " NameValuePairs: type mismatch for ' " + name + " ', stored ' " + stored . name ( ) + " ', trying to retrieve ' " + retrieving . name ( ) + " ' " )
, m_stored ( stored ) , m_retrieving ( retrieving ) { }
const std : : type_info & GetStoredTypeInfo ( ) const { return m_stored ; }
const std : : type_info & GetRetrievingTypeInfo ( ) const { return m_retrieving ; }
private :
const std : : type_info & m_stored ;
const std : : type_info & m_retrieving ;
} ;
//! get a copy of this object or a subobject of it
template < class T >
bool GetThisObject ( T & object ) const
{
return GetValue ( ( std : : string ( " ThisObject: " ) + typeid ( T ) . name ( ) ) . c_str ( ) , object ) ;
}
//! get a pointer to this object, as a pointer to T
template < class T >
bool GetThisPointer ( T * & p ) const
{
return GetValue ( ( std : : string ( " ThisPointer: " ) + typeid ( T ) . name ( ) ) . c_str ( ) , p ) ;
}
//! get a named value, returns true if the name exists
template < class T >
bool GetValue ( const char * name , T & value ) const
{
return GetVoidValue ( name , typeid ( T ) , & value ) ;
}
//! get a named value, returns the default if the name doesn't exist
template < class T >
T GetValueWithDefault ( const char * name , T defaultValue ) const
{
GetValue ( name , defaultValue ) ;
return defaultValue ;
}
//! get a list of value names that can be retrieved
2003-07-04 00:17:37 +00:00
CRYPTOPP_DLL std : : string GetValueNames ( ) const
2002-10-04 17:31:41 +00:00
{ std : : string result ; GetValue ( " ValueNames " , result ) ; return result ; }
//! get a named value with type int
/*! used to ensure we don't accidentally try to get an unsigned int
or some other type when we mean int ( which is the most common case ) */
2003-07-04 00:17:37 +00:00
CRYPTOPP_DLL bool GetIntValue ( const char * name , int & value ) const
2002-10-04 17:31:41 +00:00
{ return GetValue ( name , value ) ; }
//! get a named value with type int, with default
2003-07-04 00:17:37 +00:00
CRYPTOPP_DLL int GetIntValueWithDefault ( const char * name , int defaultValue ) const
2002-10-04 17:31:41 +00:00
{ return GetValueWithDefault ( name , defaultValue ) ; }
//! used by derived classes to check for type mismatch
2005-01-20 04:19:35 +00:00
CRYPTOPP_DLL static void CRYPTOPP_API ThrowIfTypeMismatch ( const char * name , const std : : type_info & stored , const std : : type_info & retrieving )
2002-10-04 17:31:41 +00:00
{ if ( stored ! = retrieving ) throw ValueTypeMismatch ( name , stored , retrieving ) ; }
template < class T >
void GetRequiredParameter ( const char * className , const char * name , T & value ) const
{
if ( ! GetValue ( name , value ) )
throw InvalidArgument ( std : : string ( className ) + " : missing required parameter ' " + name + " ' " ) ;
}
2003-07-04 00:17:37 +00:00
CRYPTOPP_DLL void GetRequiredIntParameter ( const char * className , const char * name , int & value ) const
2002-10-04 17:31:41 +00:00
{
if ( ! GetIntValue ( name , value ) )
throw InvalidArgument ( std : : string ( className ) + " : missing required parameter ' " + name + " ' " ) ;
}
//! to be implemented by derived classes, users should use one of the above functions instead
2003-07-04 00:17:37 +00:00
CRYPTOPP_DLL virtual bool GetVoidValue ( const char * name , const std : : type_info & valueType , void * pValue ) const = 0 ;
2002-10-04 17:31:41 +00:00
} ;
//! namespace containing value name definitions
/*! value names, types and semantics:
ThisObject : ClassName ( ClassName , copy of this object or a subobject )
ThisPointer : ClassName ( const ClassName * , pointer to this object or a subobject )
*/
DOCUMENTED_NAMESPACE_BEGIN ( Name )
// more names defined in argnames.h
DOCUMENTED_NAMESPACE_END
2004-07-22 00:51:57 +00:00
//! empty set of name-value pairs
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL NullNameValuePairs : public NameValuePairs
2002-10-04 17:31:41 +00:00
{
public :
bool GetVoidValue ( const char * name , const std : : type_info & valueType , void * pValue ) const { return false ; }
} ;
2004-07-22 00:51:57 +00:00
//! _
2003-07-04 00:17:37 +00:00
extern CRYPTOPP_DLL const NullNameValuePairs g_nullNameValuePairs ;
2002-10-04 17:31:41 +00:00
// ********************************************************
//! interface for cloning objects, this is not implemented by most classes yet
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE Clonable
2002-10-04 17:31:41 +00:00
{
public :
virtual ~ Clonable ( ) { }
//! this is not implemented by most classes yet
virtual Clonable * Clone ( ) const { throw NotImplemented ( " Clone() is not implemented yet. " ) ; } // TODO: make this =0
} ;
//! interface for all crypto algorithms
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE Algorithm : public Clonable
2002-10-04 17:31:41 +00:00
{
public :
2003-03-20 01:24:12 +00:00
/*! When FIPS 140-2 compliance is enabled and checkSelfTestStatus == true,
2002-10-04 17:31:41 +00:00
this constructor throws SelfTestFailure if the self test hasn ' t been run or fails . */
Algorithm ( bool checkSelfTestStatus = true ) ;
//! returns name of this algorithm, not universally implemented yet
virtual std : : string AlgorithmName ( ) const { return " unknown " ; }
} ;
//! keying interface for crypto algorithms that take byte strings as keys
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE SimpleKeyingInterface
2002-10-04 17:31:41 +00:00
{
public :
//! returns smallest valid key length in bytes */
2005-07-12 04:23:32 +00:00
virtual size_t MinKeyLength ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! returns largest valid key length in bytes */
2005-07-12 04:23:32 +00:00
virtual size_t MaxKeyLength ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! returns default (recommended) key length in bytes */
2005-07-12 04:23:32 +00:00
virtual size_t DefaultKeyLength ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! returns the smallest valid key length in bytes that is >= min(n, GetMaxKeyLength())
2005-07-12 04:23:32 +00:00
virtual size_t GetValidKeyLength ( size_t n ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! returns whether n is a valid key length
2005-07-12 04:23:32 +00:00
virtual bool IsValidKeyLength ( size_t n ) const
2002-10-04 17:31:41 +00:00
{ return n = = GetValidKeyLength ( n ) ; }
//! set or reset the key of this object
/*! \param params is used to specify Rounds, BlockSize, etc */
2005-07-12 04:23:32 +00:00
virtual void SetKey ( const byte * key , size_t length , const NameValuePairs & params = g_nullNameValuePairs ) = 0 ;
2002-10-04 17:31:41 +00:00
//! calls SetKey() with an NameValuePairs object that just specifies "Rounds"
2005-07-12 04:23:32 +00:00
void SetKeyWithRounds ( const byte * key , size_t length , int rounds ) ;
2002-10-04 17:31:41 +00:00
//! calls SetKey() with an NameValuePairs object that just specifies "IV"
2005-07-12 04:23:32 +00:00
void SetKeyWithIV ( const byte * key , size_t length , const byte * iv ) ;
2002-10-04 17:31:41 +00:00
enum IV_Requirement { STRUCTURED_IV = 0 , RANDOM_IV , UNPREDICTABLE_RANDOM_IV , INTERNALLY_GENERATED_IV , NOT_RESYNCHRONIZABLE } ;
//! returns the minimal requirement for secure IVs
virtual IV_Requirement IVRequirement ( ) const = 0 ;
//! returns whether this object can be resynchronized (i.e. supports initialization vectors)
/*! If this function returns true, and no IV is passed to SetKey() and CanUseStructuredIVs()==true, an IV of all 0's will be assumed. */
bool IsResynchronizable ( ) const { return IVRequirement ( ) < NOT_RESYNCHRONIZABLE ; }
//! returns whether this object can use random IVs (in addition to ones returned by GetNextIV)
bool CanUseRandomIVs ( ) const { return IVRequirement ( ) < = UNPREDICTABLE_RANDOM_IV ; }
//! returns whether this object can use random but possibly predictable IVs (in addition to ones returned by GetNextIV)
bool CanUsePredictableIVs ( ) const { return IVRequirement ( ) < = RANDOM_IV ; }
//! returns whether this object can use structured IVs, for example a counter (in addition to ones returned by GetNextIV)
bool CanUseStructuredIVs ( ) const { return IVRequirement ( ) < = STRUCTURED_IV ; }
//! returns size of IVs used by this object
virtual unsigned int IVSize ( ) const { throw NotImplemented ( " SimpleKeyingInterface: this object doesn't support resynchronization " ) ; }
//! resynchronize with an IV
virtual void Resynchronize ( const byte * IV ) { throw NotImplemented ( " SimpleKeyingInterface: this object doesn't support resynchronization " ) ; }
//! get a secure IV for the next message
/*! This method should be called after you finish encrypting one message and are ready to start the next one.
After calling it , you must call SetKey ( ) or Resynchronize ( ) before using this object again .
This method is not implemented on decryption objects . */
virtual void GetNextIV ( byte * IV ) { throw NotImplemented ( " SimpleKeyingInterface: this object doesn't support GetNextIV() " ) ; }
protected :
2005-07-12 04:23:32 +00:00
void ThrowIfInvalidKeyLength ( const Algorithm & algorithm , size_t length ) ;
2003-03-26 21:50:44 +00:00
void ThrowIfResynchronizable ( ) ; // to be called when no IV is passed
void ThrowIfInvalidIV ( const byte * iv ) ; // check for NULL IV if it can't be used
const byte * GetIVAndThrowIfInvalid ( const NameValuePairs & params ) ;
2002-10-04 17:31:41 +00:00
2005-07-12 04:23:32 +00:00
inline void AssertValidKeyLength ( size_t length ) const
2002-10-04 17:31:41 +00:00
{
assert ( IsValidKeyLength ( length ) ) ;
}
} ;
//! interface for the data processing part of block ciphers
/*! Classes derived from BlockTransformation are block ciphers
in ECB mode ( for example the DES : : Encryption class ) , which are stateless ,
and they can make assumptions about the memory alignment of their inputs and outputs .
These classes should not be used directly , but only in combination with
a mode class ( see CipherModeDocumentation in modes . h ) .
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE BlockTransformation : public Algorithm
2002-10-04 17:31:41 +00:00
{
public :
//! encrypt or decrypt inBlock, xor with xorBlock, and write to outBlock
virtual void ProcessAndXorBlock ( const byte * inBlock , const byte * xorBlock , byte * outBlock ) const = 0 ;
//! encrypt or decrypt one block
/*! \pre size of inBlock and outBlock == BlockSize() */
void ProcessBlock ( const byte * inBlock , byte * outBlock ) const
{ ProcessAndXorBlock ( inBlock , NULL , outBlock ) ; }
//! encrypt or decrypt one block in place
void ProcessBlock ( byte * inoutBlock ) const
{ ProcessAndXorBlock ( inoutBlock , NULL , inoutBlock ) ; }
//! block size of the cipher in bytes
virtual unsigned int BlockSize ( ) const = 0 ;
//! block pointers must be divisible by this
virtual unsigned int BlockAlignment ( ) const { return 4 ; }
//! returns true if this is a permutation (i.e. there is an inverse transformation)
virtual bool IsPermutation ( ) const { return true ; }
//! returns true if this is an encryption object
virtual bool IsForwardTransformation ( ) const = 0 ;
//! return number of blocks that can be processed in parallel, for bit-slicing implementations
virtual unsigned int OptimalNumberOfParallelBlocks ( ) const { return 1 ; }
//! encrypt or decrypt multiple blocks, for bit-slicing implementations
2005-07-12 04:23:32 +00:00
virtual void ProcessAndXorMultipleBlocks ( const byte * inBlocks , const byte * xorBlocks , byte * outBlocks , size_t numberOfBlocks ) const ;
2002-10-04 17:31:41 +00:00
} ;
//! interface for the data processing part of stream ciphers
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE StreamTransformation : public Algorithm
2002-10-04 17:31:41 +00:00
{
public :
//! return a reference to this object,
/*! This function is useful for passing a temporary StreamTransformation object to a
function that takes a non - const reference . */
StreamTransformation & Ref ( ) { return * this ; }
//! returns block size, if input must be processed in blocks, otherwise 1
virtual unsigned int MandatoryBlockSize ( ) const { return 1 ; }
//! returns the input block size that is most efficient for this cipher
/*! \note optimal input length is n * OptimalBlockSize() - GetOptimalBlockSizeUsed() for any n > 0 */
virtual unsigned int OptimalBlockSize ( ) const { return MandatoryBlockSize ( ) ; }
//! returns how much of the current block is used up
virtual unsigned int GetOptimalBlockSizeUsed ( ) const { return 0 ; }
//! returns how input should be aligned for optimal performance
virtual unsigned int OptimalDataAlignment ( ) const { return 1 ; }
//! encrypt or decrypt an array of bytes of specified length
/*! \note either inString == outString, or they don't overlap */
2005-07-12 04:23:32 +00:00
virtual void ProcessData ( byte * outString , const byte * inString , size_t length ) = 0 ;
2002-10-04 17:31:41 +00:00
//! for ciphers where the last block of data is special, encrypt or decrypt the last block of data
/*! For now the only use of this function is for CBC-CTS mode. */
2005-07-12 04:23:32 +00:00
virtual void ProcessLastBlock ( byte * outString , const byte * inString , size_t length ) ;
2002-10-04 17:31:41 +00:00
//! returns the minimum size of the last block, 0 indicating the last block is not special
virtual unsigned int MinLastBlockSize ( ) const { return 0 ; }
//! same as ProcessData(inoutString, inoutString, length)
2005-07-12 04:23:32 +00:00
inline void ProcessString ( byte * inoutString , size_t length )
2002-10-04 17:31:41 +00:00
{ ProcessData ( inoutString , inoutString , length ) ; }
//! same as ProcessData(outString, inString, length)
2005-07-12 04:23:32 +00:00
inline void ProcessString ( byte * outString , const byte * inString , size_t length )
2002-10-04 17:31:41 +00:00
{ ProcessData ( outString , inString , length ) ; }
//! implemented as {ProcessData(&input, &input, 1); return input;}
inline byte ProcessByte ( byte input )
{ ProcessData ( & input , & input , 1 ) ; return input ; }
//! returns whether this cipher supports random access
virtual bool IsRandomAccess ( ) const = 0 ;
//! for random access ciphers, seek to an absolute position
2003-07-25 00:15:52 +00:00
virtual void Seek ( lword n )
2002-10-04 17:31:41 +00:00
{
assert ( ! IsRandomAccess ( ) ) ;
throw NotImplemented ( " StreamTransformation: this object doesn't support random access " ) ;
}
//! returns whether this transformation is self-inverting (e.g. xor with a keystream)
virtual bool IsSelfInverting ( ) const = 0 ;
//! returns whether this is an encryption object
virtual bool IsForwardTransformation ( ) const = 0 ;
} ;
//! interface for hash functions and data processing part of MACs
/*! HashTransformation objects are stateful. They are created in an initial state,
change state as Update ( ) is called , and return to the initial
state when Final ( ) is called . This interface allows a large message to
be hashed in pieces by calling Update ( ) on each piece followed by
calling Final ( ) .
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE HashTransformation : public Algorithm
2002-10-04 17:31:41 +00:00
{
public :
//! process more input
2005-07-12 04:23:32 +00:00
virtual void Update ( const byte * input , size_t length ) = 0 ;
2002-10-04 17:31:41 +00:00
//! request space to write input into
2005-07-12 04:23:32 +00:00
virtual byte * CreateUpdateSpace ( size_t & size ) { size = 0 ; return NULL ; }
2002-10-04 17:31:41 +00:00
//! compute hash for current message, then restart for a new message
/*! \pre size of digest == DigestSize(). */
virtual void Final ( byte * digest )
{ TruncatedFinal ( digest , DigestSize ( ) ) ; }
//! discard the current state, and restart with a new message
virtual void Restart ( )
{ TruncatedFinal ( NULL , 0 ) ; }
//! size of the hash returned by Final()
virtual unsigned int DigestSize ( ) const = 0 ;
2003-07-04 00:17:37 +00:00
//! block size of underlying compression function, or 0 if not block based
virtual unsigned int BlockSize ( ) const { return 0 ; }
2002-10-04 17:31:41 +00:00
//! input to Update() should have length a multiple of this for optimal speed
virtual unsigned int OptimalBlockSize ( ) const { return 1 ; }
2003-03-20 01:24:12 +00:00
//! returns how input should be aligned for optimal performance
virtual unsigned int OptimalDataAlignment ( ) const { return 1 ; }
2002-10-04 17:31:41 +00:00
//! use this if your input is in one piece and you don't want to call Update() and Final() separately
2005-07-12 04:23:32 +00:00
virtual void CalculateDigest ( byte * digest , const byte * input , size_t length )
2002-10-04 17:31:41 +00:00
{ Update ( input , length ) ; Final ( digest ) ; }
//! verify that digest is a valid digest for the current message, then reinitialize the object
/*! Default implementation is to call Final() and do a bitwise comparison
between its output and digest . */
virtual bool Verify ( const byte * digest )
{ return TruncatedVerify ( digest , DigestSize ( ) ) ; }
//! use this if your input is in one piece and you don't want to call Update() and Verify() separately
2005-07-12 04:23:32 +00:00
virtual bool VerifyDigest ( const byte * digest , const byte * input , size_t length )
2002-10-04 17:31:41 +00:00
{ Update ( input , length ) ; return Verify ( digest ) ; }
//! truncated version of Final()
2005-07-12 04:23:32 +00:00
virtual void TruncatedFinal ( byte * digest , size_t digestSize ) = 0 ;
2002-10-04 17:31:41 +00:00
//! truncated version of CalculateDigest()
2005-07-12 04:23:32 +00:00
virtual void CalculateTruncatedDigest ( byte * digest , size_t digestSize , const byte * input , size_t length )
2002-10-04 17:31:41 +00:00
{ Update ( input , length ) ; TruncatedFinal ( digest , digestSize ) ; }
//! truncated version of Verify()
2005-07-12 04:23:32 +00:00
virtual bool TruncatedVerify ( const byte * digest , size_t digestLength ) ;
2002-10-04 17:31:41 +00:00
//! truncated version of VerifyDigest()
2005-07-12 04:23:32 +00:00
virtual bool VerifyTruncatedDigest ( const byte * digest , size_t digestLength , const byte * input , size_t length )
2002-10-04 17:31:41 +00:00
{ Update ( input , length ) ; return TruncatedVerify ( digest , digestLength ) ; }
protected :
2005-07-12 04:23:32 +00:00
void ThrowIfInvalidTruncatedSize ( size_t size ) const ;
2002-10-04 17:31:41 +00:00
} ;
2004-07-22 00:51:57 +00:00
typedef HashTransformation HashFunction ;
2002-10-04 17:31:41 +00:00
template < class T >
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE SimpleKeyedTransformation : public T , public SimpleKeyingInterface
2002-10-04 17:31:41 +00:00
{
public :
2005-07-12 04:23:32 +00:00
void ThrowIfInvalidKeyLength ( size_t length )
2002-10-04 17:31:41 +00:00
{ SimpleKeyingInterface : : ThrowIfInvalidKeyLength ( * this , length ) ; }
} ;
# ifdef CRYPTOPP_DOXYGEN_PROCESSING
2004-07-22 00:51:57 +00:00
//! interface for one direction (encryption or decryption) of a block cipher
/*! \note These objects usually should not be used directly. See BlockTransformation for more details. */
2002-10-04 17:31:41 +00:00
class BlockCipher : public BlockTransformation , public SimpleKeyingInterface { } ;
2004-07-22 00:51:57 +00:00
//! interface for one direction (encryption or decryption) of a stream cipher or cipher mode
2002-10-04 17:31:41 +00:00
class SymmetricCipher : public StreamTransformation , public SimpleKeyingInterface { } ;
//! interface for message authentication codes
class MessageAuthenticationCode : public HashTransformation , public SimpleKeyingInterface { } ;
# else
typedef SimpleKeyedTransformation < BlockTransformation > BlockCipher ;
typedef SimpleKeyedTransformation < StreamTransformation > SymmetricCipher ;
typedef SimpleKeyedTransformation < HashTransformation > MessageAuthenticationCode ;
2004-07-22 00:51:57 +00:00
# endif
2003-07-04 00:17:37 +00:00
CRYPTOPP_DLL_TEMPLATE_CLASS SimpleKeyedTransformation < BlockTransformation > ;
CRYPTOPP_DLL_TEMPLATE_CLASS SimpleKeyedTransformation < StreamTransformation > ;
CRYPTOPP_DLL_TEMPLATE_CLASS SimpleKeyedTransformation < HashTransformation > ;
2002-10-04 17:31:41 +00:00
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
typedef SymmetricCipher StreamCipher ;
# endif
//! interface for random number generators
/*! All return values are uniformly distributed over the range specified.
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE RandomNumberGenerator : public Algorithm
2002-10-04 17:31:41 +00:00
{
public :
//! generate new random byte and return it
virtual byte GenerateByte ( ) = 0 ;
//! generate new random bit and return it
/*! Default implementation is to call GenerateByte() and return its parity. */
virtual unsigned int GenerateBit ( ) ;
//! generate a random 32 bit word in the range min to max, inclusive
virtual word32 GenerateWord32 ( word32 a = 0 , word32 b = 0xffffffffL ) ;
//! generate random array of bytes
/*! Default implementation is to call GenerateByte() size times. */
2005-07-12 04:23:32 +00:00
virtual void GenerateBlock ( byte * output , size_t size ) ;
2002-10-04 17:31:41 +00:00
//! generate and discard n bytes
/*! Default implementation is to call GenerateByte() n times. */
2005-07-12 04:23:32 +00:00
virtual void DiscardBytes ( size_t n ) ;
2002-10-04 17:31:41 +00:00
//! randomly shuffle the specified array, resulting permutation is uniformly distributed
template < class IT > void Shuffle ( IT begin , IT end )
{
for ( ; begin ! = end ; + + begin )
std : : iter_swap ( begin , begin + GenerateWord32 ( 0 , end - begin - 1 ) ) ;
}
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
byte GetByte ( ) { return GenerateByte ( ) ; }
unsigned int GetBit ( ) { return GenerateBit ( ) ; }
word32 GetLong ( word32 a = 0 , word32 b = 0xffffffffL ) { return GenerateWord32 ( a , b ) ; }
word16 GetShort ( word16 a = 0 , word16 b = 0xffff ) { return ( word16 ) GenerateWord32 ( a , b ) ; }
2005-07-12 04:23:32 +00:00
void GetBlock ( byte * output , size_t size ) { GenerateBlock ( output , size ) ; }
2002-10-04 17:31:41 +00:00
# endif
} ;
//! returns a reference that can be passed to functions that ask for a RNG but doesn't actually use it
2005-01-20 04:19:35 +00:00
CRYPTOPP_DLL RandomNumberGenerator & CRYPTOPP_API NullRNG ( ) ;
2002-10-04 17:31:41 +00:00
class WaitObjectContainer ;
//! interface for objects that you can wait for
2003-05-16 00:02:31 +00:00
class CRYPTOPP_NO_VTABLE Waitable
2002-10-04 17:31:41 +00:00
{
public :
//! maximum number of wait objects that this object can return
virtual unsigned int GetMaxWaitObjectCount ( ) const = 0 ;
//! put wait objects into container
virtual void GetWaitObjects ( WaitObjectContainer & container ) = 0 ;
//! wait on this object
/*! same as creating an empty container, calling GetWaitObjects(), and calling Wait() on the container */
bool Wait ( unsigned long milliseconds ) ;
} ;
//! interface for buffered transformations
/*! BufferedTransformation is a generalization of BlockTransformation,
StreamTransformation , and HashTransformation .
A buffered transformation is an object that takes a stream of bytes
as input ( this may be done in stages ) , does some computation on them , and
then places the result into an internal buffer for later retrieval . Any
partial result already in the output buffer is not modified by further
input .
If a method takes a " blocking " parameter , and you
pass " false " for it , the method will return before all input has been processed if
the input cannot be processed without waiting ( for network buffers to become available , for example ) .
In this case the method will return true
or a non - zero integer value . When this happens you must continue to call the method with the same
parameters until it returns false or zero , before calling any other method on it or
attached BufferedTransformation . The integer return value in this case is approximately
the number of bytes left to be processed , and can be used to implement a progress bar .
For functions that take a " propagation " parameter , propagation ! = 0 means pass on the signal to attached
BufferedTransformation objects , with propagation decremented at each step until it reaches 0.
- 1 means unlimited propagation .
\ nosubgrouping
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE BufferedTransformation : public Algorithm , public Waitable
2002-10-04 17:31:41 +00:00
{
public :
// placed up here for CW8
static const std : : string NULL_CHANNEL ; // the empty string ""
BufferedTransformation ( ) : Algorithm ( false ) { }
//! return a reference to this object
/*! This function is useful for passing a temporary BufferedTransformation object to a
function that takes a non - const reference . */
BufferedTransformation & Ref ( ) { return * this ; }
//! \name INPUT
//@{
//! input a byte for processing
2005-07-12 04:23:32 +00:00
size_t Put ( byte inByte , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return Put ( & inByte , 1 , blocking ) ; }
//! input multiple bytes
2005-07-12 04:23:32 +00:00
size_t Put ( const byte * inString , size_t length , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return Put2 ( inString , length , 0 , blocking ) ; }
//! input a 16-bit word
2005-07-12 04:23:32 +00:00
size_t PutWord16 ( word16 value , ByteOrder order = BIG_ENDIAN_ORDER , bool blocking = true ) ;
2002-10-04 17:31:41 +00:00
//! input a 32-bit word
2005-07-12 04:23:32 +00:00
size_t PutWord32 ( word32 value , ByteOrder order = BIG_ENDIAN_ORDER , bool blocking = true ) ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! request space which can be written into by the caller, and then used as input to Put()
2002-10-04 17:31:41 +00:00
/*! \param size is requested size (as a hint) for input, and size of the returned space for output */
2003-03-20 01:24:12 +00:00
/*! \note The purpose of this method is to help avoid doing extra memory allocations. */
2005-07-12 04:23:32 +00:00
virtual byte * CreatePutSpace ( size_t & size ) { size = 0 ; return NULL ; }
2002-10-04 17:31:41 +00:00
virtual bool CanModifyInput ( ) const { return false ; }
//! input multiple bytes that may be modified by callee
2005-07-12 04:23:32 +00:00
size_t PutModifiable ( byte * inString , size_t length , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return PutModifiable2 ( inString , length , 0 , blocking ) ; }
bool MessageEnd ( int propagation = - 1 , bool blocking = true )
{ return ! ! Put2 ( NULL , 0 , propagation < 0 ? - 1 : propagation + 1 , blocking ) ; }
2005-07-12 04:23:32 +00:00
size_t PutMessageEnd ( const byte * inString , size_t length , int propagation = - 1 , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return Put2 ( inString , length , propagation < 0 ? - 1 : propagation + 1 , blocking ) ; }
//! input multiple bytes for blocking or non-blocking processing
/*! \param messageEnd means how many filters to signal MessageEnd to, including this one */
2005-07-12 04:23:32 +00:00
virtual size_t Put2 ( const byte * inString , size_t length , int messageEnd , bool blocking ) = 0 ;
2002-10-04 17:31:41 +00:00
//! input multiple bytes that may be modified by callee for blocking or non-blocking processing
/*! \param messageEnd means how many filters to signal MessageEnd to, including this one */
2005-07-12 04:23:32 +00:00
virtual size_t PutModifiable2 ( byte * inString , size_t length , int messageEnd , bool blocking )
2002-10-04 17:31:41 +00:00
{ return Put2 ( inString , length , messageEnd , blocking ) ; }
//! thrown by objects that have not implemented nonblocking input processing
struct BlockingInputOnly : public NotImplemented
{ BlockingInputOnly ( const std : : string & s ) : NotImplemented ( s + " : Nonblocking input is not implemented by this object. " ) { } } ;
//@}
//! \name WAITING
//@{
unsigned int GetMaxWaitObjectCount ( ) const ;
void GetWaitObjects ( WaitObjectContainer & container ) ;
//@}
//! \name SIGNALS
//@{
virtual void IsolatedInitialize ( const NameValuePairs & parameters ) { throw NotImplemented ( " BufferedTransformation: this object can't be reinitialized " ) ; }
virtual bool IsolatedFlush ( bool hardFlush , bool blocking ) = 0 ;
virtual bool IsolatedMessageSeriesEnd ( bool blocking ) { return false ; }
//! initialize or reinitialize this object
virtual void Initialize ( const NameValuePairs & parameters = g_nullNameValuePairs , int propagation = - 1 ) ;
//! flush buffered input and/or output
/*! \param hardFlush is used to indicate whether all data should be flushed
\ note Hard flushes must be used with care . It means try to process and output everything , even if
there may not be enough data to complete the action . For example , hard flushing a HexDecoder would
cause an error if you do it after inputing an odd number of hex encoded characters .
For some types of filters , for example ZlibDecompressor , hard flushes can only
be done at " synchronization points " . These synchronization points are positions in the data
stream that are created by hard flushes on the corresponding reverse filters , in this
example ZlibCompressor . This is useful when zlib compressed data is moved across a
network in packets and compression state is preserved across packets , as in the ssh2 protocol .
*/
virtual bool Flush ( bool hardFlush , int propagation = - 1 , bool blocking = true ) ;
//! mark end of a series of messages
/*! There should be a MessageEnd immediately before MessageSeriesEnd. */
virtual bool MessageSeriesEnd ( int propagation = - 1 , bool blocking = true ) ;
2003-07-18 04:35:30 +00:00
//! set propagation of automatically generated and transferred signals
2002-10-04 17:31:41 +00:00
/*! propagation == 0 means do not automaticly generate signals */
virtual void SetAutoSignalPropagation ( int propagation ) { }
//!
virtual int GetAutoSignalPropagation ( ) const { return 0 ; }
public :
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
void Close ( ) { MessageEnd ( ) ; }
# endif
//@}
//! \name RETRIEVAL OF ONE MESSAGE
//@{
//! returns number of bytes that is currently ready for retrieval
/*! All retrieval functions return the actual number of bytes
retrieved , which is the lesser of the request number and
MaxRetrievable ( ) . */
2005-07-12 04:23:32 +00:00
virtual lword MaxRetrievable ( ) const ;
2002-10-04 17:31:41 +00:00
//! returns whether any bytes are currently ready for retrieval
virtual bool AnyRetrievable ( ) const ;
//! try to retrieve a single byte
2005-07-12 04:23:32 +00:00
virtual size_t Get ( byte & outByte ) ;
2002-10-04 17:31:41 +00:00
//! try to retrieve multiple bytes
2005-07-12 04:23:32 +00:00
virtual size_t Get ( byte * outString , size_t getMax ) ;
2002-10-04 17:31:41 +00:00
//! peek at the next byte without removing it from the output buffer
2005-07-12 04:23:32 +00:00
virtual size_t Peek ( byte & outByte ) const ;
2002-10-04 17:31:41 +00:00
//! peek at multiple bytes without removing them from the output buffer
2005-07-12 04:23:32 +00:00
virtual size_t Peek ( byte * outString , size_t peekMax ) const ;
2002-10-04 17:31:41 +00:00
//! try to retrieve a 16-bit word
2005-07-12 04:23:32 +00:00
size_t GetWord16 ( word16 & value , ByteOrder order = BIG_ENDIAN_ORDER ) ;
2002-10-04 17:31:41 +00:00
//! try to retrieve a 32-bit word
2005-07-12 04:23:32 +00:00
size_t GetWord32 ( word32 & value , ByteOrder order = BIG_ENDIAN_ORDER ) ;
2002-10-04 17:31:41 +00:00
//! try to peek at a 16-bit word
2005-07-12 04:23:32 +00:00
size_t PeekWord16 ( word16 & value , ByteOrder order = BIG_ENDIAN_ORDER ) const ;
2002-10-04 17:31:41 +00:00
//! try to peek at a 32-bit word
2005-07-12 04:23:32 +00:00
size_t PeekWord32 ( word32 & value , ByteOrder order = BIG_ENDIAN_ORDER ) const ;
2002-10-04 17:31:41 +00:00
//! move transferMax bytes of the buffered output to target as input
2005-07-12 04:23:32 +00:00
lword TransferTo ( BufferedTransformation & target , lword transferMax = LWORD_MAX , const std : : string & channel = NULL_CHANNEL )
2002-10-04 17:31:41 +00:00
{ TransferTo2 ( target , transferMax , channel ) ; return transferMax ; }
//! discard skipMax bytes from the output buffer
2005-07-12 04:23:32 +00:00
virtual lword Skip ( lword skipMax = LWORD_MAX ) ;
2002-10-04 17:31:41 +00:00
//! copy copyMax bytes of the buffered output to target as input
2005-07-12 04:23:32 +00:00
lword CopyTo ( BufferedTransformation & target , lword copyMax = LWORD_MAX , const std : : string & channel = NULL_CHANNEL ) const
2002-10-04 17:31:41 +00:00
{ return CopyRangeTo ( target , 0 , copyMax , channel ) ; }
//! copy copyMax bytes of the buffered output, starting at position (relative to current position), to target as input
2005-07-12 04:23:32 +00:00
lword CopyRangeTo ( BufferedTransformation & target , lword position , lword copyMax = LWORD_MAX , const std : : string & channel = NULL_CHANNEL ) const
{ lword i = position ; CopyRangeTo2 ( target , i , i + copyMax , channel ) ; return i - position ; }
2002-10-04 17:31:41 +00:00
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
unsigned long MaxRetrieveable ( ) const { return MaxRetrievable ( ) ; }
# endif
//@}
//! \name RETRIEVAL OF MULTIPLE MESSAGES
//@{
//!
2005-07-12 04:23:32 +00:00
virtual lword TotalBytesRetrievable ( ) const ;
2002-10-04 17:31:41 +00:00
//! number of times MessageEnd() has been received minus messages retrieved or skipped
virtual unsigned int NumberOfMessages ( ) const ;
//! returns true if NumberOfMessages() > 0
virtual bool AnyMessages ( ) const ;
//! start retrieving the next message
/*!
Returns false if no more messages exist or this message
is not completely retrieved .
*/
virtual bool GetNextMessage ( ) ;
//! skip count number of messages
virtual unsigned int SkipMessages ( unsigned int count = UINT_MAX ) ;
//!
unsigned int TransferMessagesTo ( BufferedTransformation & target , unsigned int count = UINT_MAX , const std : : string & channel = NULL_CHANNEL )
{ TransferMessagesTo2 ( target , count , channel ) ; return count ; }
//!
unsigned int CopyMessagesTo ( BufferedTransformation & target , unsigned int count = UINT_MAX , const std : : string & channel = NULL_CHANNEL ) const ;
//!
virtual void SkipAll ( ) ;
//!
void TransferAllTo ( BufferedTransformation & target , const std : : string & channel = NULL_CHANNEL )
{ TransferAllTo2 ( target , channel ) ; }
//!
void CopyAllTo ( BufferedTransformation & target , const std : : string & channel = NULL_CHANNEL ) const ;
virtual bool GetNextMessageSeries ( ) { return false ; }
virtual unsigned int NumberOfMessagesInThisSeries ( ) const { return NumberOfMessages ( ) ; }
virtual unsigned int NumberOfMessageSeries ( ) const { return 0 ; }
//@}
//! \name NON-BLOCKING TRANSFER OF OUTPUT
//@{
2005-07-12 04:23:32 +00:00
//! upon return, byteCount contains number of bytes that have finished being transfered, and returns the number of bytes left in the current transfer block
virtual size_t TransferTo2 ( BufferedTransformation & target , lword & byteCount , const std : : string & channel = NULL_CHANNEL , bool blocking = true ) = 0 ;
//! upon return, begin contains the start position of data yet to be finished copying, and returns the number of bytes left in the current transfer block
virtual size_t CopyRangeTo2 ( BufferedTransformation & target , lword & begin , lword end = LWORD_MAX , const std : : string & channel = NULL_CHANNEL , bool blocking = true ) const = 0 ;
//! upon return, messageCount contains number of messages that have finished being transfered, and returns the number of bytes left in the current transfer block
size_t TransferMessagesTo2 ( BufferedTransformation & target , unsigned int & messageCount , const std : : string & channel = NULL_CHANNEL , bool blocking = true ) ;
//! returns the number of bytes left in the current transfer block
size_t TransferAllTo2 ( BufferedTransformation & target , const std : : string & channel = NULL_CHANNEL , bool blocking = true ) ;
2002-10-04 17:31:41 +00:00
//@}
//! \name CHANNELS
//@{
struct NoChannelSupport : public NotImplemented
{ NoChannelSupport ( ) : NotImplemented ( " BufferedTransformation: this object doesn't support multiple channels " ) { } } ;
2005-07-12 04:23:32 +00:00
size_t ChannelPut ( const std : : string & channel , byte inByte , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return ChannelPut ( channel , & inByte , 1 , blocking ) ; }
2005-07-12 04:23:32 +00:00
size_t ChannelPut ( const std : : string & channel , const byte * inString , size_t length , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return ChannelPut2 ( channel , inString , length , 0 , blocking ) ; }
2005-07-12 04:23:32 +00:00
size_t ChannelPutModifiable ( const std : : string & channel , byte * inString , size_t length , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return ChannelPutModifiable2 ( channel , inString , length , 0 , blocking ) ; }
2005-07-12 04:23:32 +00:00
size_t ChannelPutWord16 ( const std : : string & channel , word16 value , ByteOrder order = BIG_ENDIAN_ORDER , bool blocking = true ) ;
size_t ChannelPutWord32 ( const std : : string & channel , word32 value , ByteOrder order = BIG_ENDIAN_ORDER , bool blocking = true ) ;
2002-10-04 17:31:41 +00:00
bool ChannelMessageEnd ( const std : : string & channel , int propagation = - 1 , bool blocking = true )
{ return ! ! ChannelPut2 ( channel , NULL , 0 , propagation < 0 ? - 1 : propagation + 1 , blocking ) ; }
2005-07-12 04:23:32 +00:00
size_t ChannelPutMessageEnd ( const std : : string & channel , const byte * inString , size_t length , int propagation = - 1 , bool blocking = true )
2002-10-04 17:31:41 +00:00
{ return ChannelPut2 ( channel , inString , length , propagation < 0 ? - 1 : propagation + 1 , blocking ) ; }
2005-07-12 04:23:32 +00:00
virtual byte * ChannelCreatePutSpace ( const std : : string & channel , size_t & size ) ;
2002-10-04 17:31:41 +00:00
2005-07-12 04:23:32 +00:00
virtual size_t ChannelPut2 ( const std : : string & channel , const byte * begin , size_t length , int messageEnd , bool blocking ) ;
virtual size_t ChannelPutModifiable2 ( const std : : string & channel , byte * begin , size_t length , int messageEnd , bool blocking ) ;
2002-10-04 17:31:41 +00:00
virtual bool ChannelFlush ( const std : : string & channel , bool hardFlush , int propagation = - 1 , bool blocking = true ) ;
virtual bool ChannelMessageSeriesEnd ( const std : : string & channel , int propagation = - 1 , bool blocking = true ) ;
virtual void SetRetrievalChannel ( const std : : string & channel ) ;
//@}
//! \name ATTACHMENT
/*! Some BufferedTransformation objects (e.g. Filter objects)
allow other BufferedTransformation objects to be attached . When
this is done , the first object instead of buffering its output ,
sents that output to the attached object as input . The entire
attachment chain is deleted when the anchor object is destructed .
*/
//@{
//! returns whether this object allows attachment
virtual bool Attachable ( ) { return false ; }
//! returns the object immediately attached to this object or NULL for no attachment
virtual BufferedTransformation * AttachedTransformation ( ) { assert ( ! Attachable ( ) ) ; return 0 ; }
//!
virtual const BufferedTransformation * AttachedTransformation ( ) const
{ return const_cast < BufferedTransformation * > ( this ) - > AttachedTransformation ( ) ; }
//! delete the current attachment chain and replace it with newAttachment
virtual void Detach ( BufferedTransformation * newAttachment = 0 )
{ assert ( ! Attachable ( ) ) ; throw NotImplemented ( " BufferedTransformation: this object is not attachable " ) ; }
//! add newAttachment to the end of attachment chain
virtual void Attach ( BufferedTransformation * newAttachment ) ;
//@}
protected :
static int DecrementPropagation ( int propagation )
{ return propagation ! = 0 ? propagation - 1 : 0 ; }
2005-07-12 04:23:32 +00:00
private :
byte m_buf [ 4 ] ; // for ChannelPutWord16 and ChannelPutWord32, to ensure buffer isn't deallocated before non-blocking operation completes
2002-10-04 17:31:41 +00:00
} ;
//! returns a reference to a BufferedTransformation object that discards all input
BufferedTransformation & TheBitBucket ( ) ;
//! interface for crypto material, such as public and private keys, and crypto parameters
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE CryptoMaterial : public NameValuePairs
2002-10-04 17:31:41 +00:00
{
public :
//! exception thrown when invalid crypto material is detected
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL InvalidMaterial : public InvalidDataFormat
2002-10-04 17:31:41 +00:00
{
public :
explicit InvalidMaterial ( const std : : string & s ) : InvalidDataFormat ( s ) { }
} ;
//! assign values from source to this object
/*! \note This function can be used to create a public key from a private key. */
virtual void AssignFrom ( const NameValuePairs & source ) = 0 ;
//! check this object for errors
/*! \param level denotes the level of thoroughness:
0 - using this object won ' t cause a crash or exception ( rng is ignored )
1 - this object will probably function ( encrypt , sign , etc . ) correctly ( but may not check for weak keys and such )
2 - make sure this object will function correctly , and do reasonable security checks
3 - do checks that may take a long time
\ return true if the tests pass */
virtual bool Validate ( RandomNumberGenerator & rng , unsigned int level ) const = 0 ;
//! throws InvalidMaterial if this object fails Validate() test
virtual void ThrowIfInvalid ( RandomNumberGenerator & rng , unsigned int level ) const
{ if ( ! Validate ( rng , level ) ) throw InvalidMaterial ( " CryptoMaterial: this object contains invalid values " ) ; }
// virtual std::vector<std::string> GetSupportedFormats(bool includeSaveOnly=false, bool includeLoadOnly=false);
//! save key into a BufferedTransformation
virtual void Save ( BufferedTransformation & bt ) const
{ throw NotImplemented ( " CryptoMaterial: this object does not support saving " ) ; }
//! load key from a BufferedTransformation
/*! \throws KeyingErr if decode fails
\ note Generally does not check that the key is valid .
Call ValidateKey ( ) or ThrowIfInvalidKey ( ) to check that . */
virtual void Load ( BufferedTransformation & bt )
{ throw NotImplemented ( " CryptoMaterial: this object does not support loading " ) ; }
//! \return whether this object supports precomputation
virtual bool SupportsPrecomputation ( ) const { return false ; }
//! do precomputation
/*! The exact semantics of Precompute() is varies, but
typically it means calculate a table of n objects
that can be used later to speed up computation . */
virtual void Precompute ( unsigned int n )
{ assert ( ! SupportsPrecomputation ( ) ) ; throw NotImplemented ( " CryptoMaterial: this object does not support precomputation " ) ; }
//! retrieve previously saved precomputation
virtual void LoadPrecomputation ( BufferedTransformation & storedPrecomputation )
{ assert ( ! SupportsPrecomputation ( ) ) ; throw NotImplemented ( " CryptoMaterial: this object does not support precomputation " ) ; }
//! save precomputation for later use
virtual void SavePrecomputation ( BufferedTransformation & storedPrecomputation ) const
{ assert ( ! SupportsPrecomputation ( ) ) ; throw NotImplemented ( " CryptoMaterial: this object does not support precomputation " ) ; }
// for internal library use
void DoQuickSanityCheck ( ) const { ThrowIfInvalid ( NullRNG ( ) , 0 ) ; }
} ;
//! interface for generatable crypto material, such as private keys and crypto parameters
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE GeneratableCryptoMaterial : virtual public CryptoMaterial
2002-10-04 17:31:41 +00:00
{
public :
//! generate a random key or crypto parameters
/*! \throws KeyingErr if algorithm parameters are invalid, or if a key can't be generated
( e . g . , if this is a public key object ) */
virtual void GenerateRandom ( RandomNumberGenerator & rng , const NameValuePairs & params = g_nullNameValuePairs )
{ throw NotImplemented ( " GeneratableCryptoMaterial: this object does not support key/parameter generation " ) ; }
//! calls the above function with a NameValuePairs object that just specifies "KeySize"
void GenerateRandomWithKeySize ( RandomNumberGenerator & rng , unsigned int keySize ) ;
} ;
//! interface for public keys
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PublicKey : virtual public CryptoMaterial
2002-10-04 17:31:41 +00:00
{
} ;
//! interface for private keys
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PrivateKey : public GeneratableCryptoMaterial
2002-10-04 17:31:41 +00:00
{
} ;
//! interface for crypto prameters
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE CryptoParameters : public GeneratableCryptoMaterial
2002-10-04 17:31:41 +00:00
{
} ;
//! interface for asymmetric algorithms
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE AsymmetricAlgorithm : public Algorithm
2002-10-04 17:31:41 +00:00
{
public :
//! returns a reference to the crypto material used by this object
virtual CryptoMaterial & AccessMaterial ( ) = 0 ;
//! returns a const reference to the crypto material used by this object
virtual const CryptoMaterial & GetMaterial ( ) const = 0 ;
//! for backwards compatibility, calls AccessMaterial().Load(bt)
void BERDecode ( BufferedTransformation & bt )
{ AccessMaterial ( ) . Load ( bt ) ; }
//! for backwards compatibility, calls GetMaterial().Save(bt)
void DEREncode ( BufferedTransformation & bt ) const
{ GetMaterial ( ) . Save ( bt ) ; }
} ;
//! interface for asymmetric algorithms using public keys
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PublicKeyAlgorithm : public AsymmetricAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
// VC60 workaround: no co-variant return type
CryptoMaterial & AccessMaterial ( ) { return AccessPublicKey ( ) ; }
const CryptoMaterial & GetMaterial ( ) const { return GetPublicKey ( ) ; }
virtual PublicKey & AccessPublicKey ( ) = 0 ;
virtual const PublicKey & GetPublicKey ( ) const { return const_cast < PublicKeyAlgorithm * > ( this ) - > AccessPublicKey ( ) ; }
} ;
//! interface for asymmetric algorithms using private keys
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PrivateKeyAlgorithm : public AsymmetricAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
CryptoMaterial & AccessMaterial ( ) { return AccessPrivateKey ( ) ; }
const CryptoMaterial & GetMaterial ( ) const { return GetPrivateKey ( ) ; }
virtual PrivateKey & AccessPrivateKey ( ) = 0 ;
virtual const PrivateKey & GetPrivateKey ( ) const { return const_cast < PrivateKeyAlgorithm * > ( this ) - > AccessPrivateKey ( ) ; }
} ;
//! interface for key agreement algorithms
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE KeyAgreementAlgorithm : public AsymmetricAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
CryptoMaterial & AccessMaterial ( ) { return AccessCryptoParameters ( ) ; }
const CryptoMaterial & GetMaterial ( ) const { return GetCryptoParameters ( ) ; }
virtual CryptoParameters & AccessCryptoParameters ( ) = 0 ;
virtual const CryptoParameters & GetCryptoParameters ( ) const { return const_cast < KeyAgreementAlgorithm * > ( this ) - > AccessCryptoParameters ( ) ; }
} ;
//! interface for public-key encryptors and decryptors
/*! This class provides an interface common to encryptors and decryptors
for querying their plaintext and ciphertext lengths .
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_CryptoSystem
2002-10-04 17:31:41 +00:00
{
public :
virtual ~ PK_CryptoSystem ( ) { }
//! maximum length of plaintext for a given ciphertext length
2003-05-16 00:02:31 +00:00
/*! \note This function returns 0 if ciphertextLength is not valid (too long or too short). */
2005-07-12 04:23:32 +00:00
virtual size_t MaxPlaintextLength ( size_t ciphertextLength ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! calculate length of ciphertext given length of plaintext
2003-05-16 00:02:31 +00:00
/*! \note This function returns 0 if plaintextLength is not valid (too long). */
2005-07-12 04:23:32 +00:00
virtual size_t CiphertextLength ( size_t plaintextLength ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-07-16 01:53:45 +00:00
//! this object supports the use of the parameter with the given name
/*! some possible parameter names: EncodingParameters, KeyDerivationParameters */
virtual bool ParameterSupported ( const char * name ) const = 0 ;
//! return fixed ciphertext length, if one exists, otherwise return 0
/*! \note "Fixed" here means length of ciphertext does not depend on length of plaintext.
It usually does depend on the key length . */
2005-07-12 04:23:32 +00:00
virtual size_t FixedCiphertextLength ( ) const { return 0 ; }
2003-07-16 01:53:45 +00:00
//! return maximum plaintext length given the fixed ciphertext length, if one exists, otherwise return 0
2005-07-12 04:23:32 +00:00
virtual size_t FixedMaxPlaintextLength ( ) const { return 0 ; }
2003-07-16 01:53:45 +00:00
2002-10-04 17:31:41 +00:00
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
2005-07-12 04:23:32 +00:00
size_t MaxPlainTextLength ( size_t cipherTextLength ) const { return MaxPlaintextLength ( cipherTextLength ) ; }
size_t CipherTextLength ( size_t plainTextLength ) const { return CiphertextLength ( plainTextLength ) ; }
2002-10-04 17:31:41 +00:00
# endif
} ;
//! interface for public-key encryptors
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_Encryptor : virtual public PK_CryptoSystem , public PublicKeyAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
2004-07-22 00:51:57 +00:00
//! exception thrown when trying to encrypt plaintext of invalid length
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL InvalidPlaintextLength : public Exception
2002-10-04 17:31:41 +00:00
{
public :
InvalidPlaintextLength ( ) : Exception ( OTHER_ERROR , " PK_Encryptor: invalid plaintext length " ) { }
} ;
//! encrypt a byte string
2003-05-16 00:02:31 +00:00
/*! \pre CiphertextLength(plaintextLength) != 0 (i.e., plaintext isn't too long)
\ pre size of ciphertext = = CiphertextLength ( plaintextLength )
2002-10-04 17:31:41 +00:00
*/
2003-07-16 01:53:45 +00:00
virtual void Encrypt ( RandomNumberGenerator & rng ,
2005-07-12 04:23:32 +00:00
const byte * plaintext , size_t plaintextLength ,
2003-07-16 01:53:45 +00:00
byte * ciphertext , const NameValuePairs & parameters = g_nullNameValuePairs ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! create a new encryption filter
2003-07-16 01:53:45 +00:00
/*! \note The caller is responsible for deleting the returned pointer.
\ note Encoding parameters should be passed in the " EP " channel .
2002-10-04 17:31:41 +00:00
*/
2003-07-16 01:53:45 +00:00
virtual BufferedTransformation * CreateEncryptionFilter ( RandomNumberGenerator & rng ,
BufferedTransformation * attachment = NULL , const NameValuePairs & parameters = g_nullNameValuePairs ) const ;
2002-10-04 17:31:41 +00:00
} ;
//! interface for public-key decryptors
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_Decryptor : virtual public PK_CryptoSystem , public PrivateKeyAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
//! decrypt a byte string, and return the length of plaintext
2003-05-16 00:02:31 +00:00
/*! \pre size of plaintext == MaxPlaintextLength(ciphertextLength) bytes.
2003-07-16 01:53:45 +00:00
\ return the actual length of the plaintext , indication that decryption failed .
2002-10-04 17:31:41 +00:00
*/
2003-07-16 01:53:45 +00:00
virtual DecodingResult Decrypt ( RandomNumberGenerator & rng ,
2005-07-12 04:23:32 +00:00
const byte * ciphertext , size_t ciphertextLength ,
2003-07-16 01:53:45 +00:00
byte * plaintext , const NameValuePairs & parameters = g_nullNameValuePairs ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! create a new decryption filter
/*! \note caller is responsible for deleting the returned pointer
*/
2003-07-16 01:53:45 +00:00
virtual BufferedTransformation * CreateDecryptionFilter ( RandomNumberGenerator & rng ,
BufferedTransformation * attachment = NULL , const NameValuePairs & parameters = g_nullNameValuePairs ) const ;
2002-10-04 17:31:41 +00:00
2003-07-16 01:53:45 +00:00
//! decrypt a fixed size ciphertext
DecodingResult FixedLengthDecrypt ( RandomNumberGenerator & rng , const byte * ciphertext , byte * plaintext , const NameValuePairs & parameters = g_nullNameValuePairs ) const
{ return Decrypt ( rng , ciphertext , FixedCiphertextLength ( ) , plaintext , parameters ) ; }
} ;
2002-10-04 17:31:41 +00:00
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
2003-07-16 01:53:45 +00:00
typedef PK_CryptoSystem PK_FixedLengthCryptoSystem ;
typedef PK_Encryptor PK_FixedLengthEncryptor ;
typedef PK_Decryptor PK_FixedLengthDecryptor ;
2002-10-04 17:31:41 +00:00
# endif
//! interface for public-key signers and verifiers
/*! This class provides an interface common to signers and verifiers
2003-03-20 01:24:12 +00:00
for querying scheme properties .
2002-10-04 17:31:41 +00:00
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_SignatureScheme
2002-10-04 17:31:41 +00:00
{
public :
2003-03-20 01:24:12 +00:00
//! invalid key exception, may be thrown by any function in this class if the private or public key has a length that can't be used
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL InvalidKeyLength : public Exception
2003-03-20 01:24:12 +00:00
{
public :
InvalidKeyLength ( const std : : string & message ) : Exception ( OTHER_ERROR , message ) { }
} ;
//! key too short exception, may be thrown by any function in this class if the private or public key is too short to sign or verify anything
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL KeyTooShort : public InvalidKeyLength
2003-03-20 01:24:12 +00:00
{
public :
KeyTooShort ( ) : InvalidKeyLength ( " PK_Signer: key too short for this signature scheme " ) { }
} ;
2002-10-04 17:31:41 +00:00
virtual ~ PK_SignatureScheme ( ) { }
2003-03-20 01:24:12 +00:00
//! signature length if it only depends on the key, otherwise 0
2005-07-12 04:23:32 +00:00
virtual size_t SignatureLength ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! maximum signature length produced for a given length of recoverable message part
2005-07-12 04:23:32 +00:00
virtual size_t MaxSignatureLength ( size_t recoverablePartLength = 0 ) const { return SignatureLength ( ) ; }
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! length of longest message that can be recovered, or 0 if this signature scheme does not support message recovery
2005-07-12 04:23:32 +00:00
virtual size_t MaxRecoverableLength ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! length of longest message that can be recovered from a signature of given length, or 0 if this signature scheme does not support message recovery
2005-07-12 04:23:32 +00:00
virtual size_t MaxRecoverableLengthFromSignatureLength ( size_t signatureLength ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! requires a random number generator to sign
/*! if this returns false, NullRNG() can be passed to functions that take RandomNumberGenerator & */
virtual bool IsProbabilistic ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! whether or not a non-recoverable message part can be signed
virtual bool AllowNonrecoverablePart ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! if this function returns true, during verification you must input the signature before the message, otherwise you can input it at anytime */
virtual bool SignatureUpfront ( ) const { return false ; }
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! whether you must input the recoverable part before the non-recoverable part during signing
virtual bool RecoverablePartFirst ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
} ;
2003-03-20 01:24:12 +00:00
//! interface for accumulating messages to be signed or verified
/*! Only Update() should be called
on this class . No other functions inherited from HashTransformation should be called .
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_MessageAccumulator : public HashTransformation
2003-03-20 01:24:12 +00:00
{
public :
//! should not be called on PK_MessageAccumulator
unsigned int DigestSize ( ) const
{ throw NotImplemented ( " PK_MessageAccumulator: DigestSize() should not be called " ) ; }
//! should not be called on PK_MessageAccumulator
2005-07-12 04:23:32 +00:00
void TruncatedFinal ( byte * digest , size_t digestSize )
2003-03-20 01:24:12 +00:00
{ throw NotImplemented ( " PK_MessageAccumulator: TruncatedFinal() should not be called " ) ; }
} ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! interface for public-key signers
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_Signer : public PK_SignatureScheme , public PrivateKeyAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
2003-03-20 01:24:12 +00:00
//! create a new HashTransformation to accumulate the message to be signed
2003-04-22 00:12:41 +00:00
virtual PK_MessageAccumulator * NewSignatureAccumulator ( RandomNumberGenerator & rng ) const = 0 ;
2002-10-04 17:31:41 +00:00
2005-07-12 04:23:32 +00:00
virtual void InputRecoverableMessage ( PK_MessageAccumulator & messageAccumulator , const byte * recoverableMessage , size_t recoverableMessageLength ) const = 0 ;
2003-03-20 01:24:12 +00:00
//! sign and delete messageAccumulator (even in case of exception thrown)
/*! \pre size of signature == MaxSignatureLength()
\ return actual signature length
2002-10-04 17:31:41 +00:00
*/
2005-07-12 04:23:32 +00:00
virtual size_t Sign ( RandomNumberGenerator & rng , PK_MessageAccumulator * messageAccumulator , byte * signature ) const ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! sign and restart messageAccumulator
/*! \pre size of signature == MaxSignatureLength()
\ return actual signature length
2002-10-04 17:31:41 +00:00
*/
2005-07-12 04:23:32 +00:00
virtual size_t SignAndRestart ( RandomNumberGenerator & rng , PK_MessageAccumulator & messageAccumulator , byte * signature , bool restart = true ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! sign a message
/*! \pre size of signature == MaxSignatureLength()
\ return actual signature length
*/
2005-07-12 04:23:32 +00:00
virtual size_t SignMessage ( RandomNumberGenerator & rng , const byte * message , size_t messageLen , byte * signature ) const ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! sign a recoverable message
/*! \pre size of signature == MaxSignatureLength(recoverableMessageLength)
\ return actual signature length
*/
2005-07-12 04:23:32 +00:00
virtual size_t SignMessageWithRecovery ( RandomNumberGenerator & rng , const byte * recoverableMessage , size_t recoverableMessageLength ,
const byte * nonrecoverableMessage , size_t nonrecoverableMessageLength , byte * signature ) const ;
2002-10-04 17:31:41 +00:00
} ;
2003-03-20 01:24:12 +00:00
//! interface for public-key signature verifiers
/*! The Recover* functions throw NotImplemented if the signature scheme does not support
message recovery .
The Verify * functions throw InvalidDataFormat if the scheme does support message
recovery and the signature contains a non - empty recoverable message part . The
Recovery * functions should be used in that case .
2002-10-04 17:31:41 +00:00
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE PK_Verifier : public PK_SignatureScheme , public PublicKeyAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
2003-03-20 01:24:12 +00:00
//! create a new HashTransformation to accumulate the message to be verified
virtual PK_MessageAccumulator * NewVerificationAccumulator ( ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! input signature into a message accumulator
2005-07-12 04:23:32 +00:00
virtual void InputSignature ( PK_MessageAccumulator & messageAccumulator , const byte * signature , size_t signatureLength ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! check whether messageAccumulator contains a valid signature and message, and delete messageAccumulator (even in case of exception thrown)
virtual bool Verify ( PK_MessageAccumulator * messageAccumulator ) const ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! check whether messageAccumulator contains a valid signature and message, and restart messageAccumulator
virtual bool VerifyAndRestart ( PK_MessageAccumulator & messageAccumulator ) const = 0 ;
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
//! check whether input signature is a valid signature for input message
2005-07-12 04:23:32 +00:00
virtual bool VerifyMessage ( const byte * message , size_t messageLen ,
const byte * signature , size_t signatureLength ) const ;
2002-10-04 17:31:41 +00:00
//! recover a message from its signature
2003-03-20 01:24:12 +00:00
/*! \pre size of recoveredMessage == MaxRecoverableLengthFromSignatureLength(signatureLength)
2002-10-04 17:31:41 +00:00
*/
2003-03-20 01:24:12 +00:00
virtual DecodingResult Recover ( byte * recoveredMessage , PK_MessageAccumulator * messageAccumulator ) const ;
2002-10-04 17:31:41 +00:00
//! recover a message from its signature
2003-03-20 01:24:12 +00:00
/*! \pre size of recoveredMessage == MaxRecoverableLengthFromSignatureLength(signatureLength)
*/
virtual DecodingResult RecoverAndRestart ( byte * recoveredMessage , PK_MessageAccumulator & messageAccumulator ) const = 0 ;
2002-10-04 17:31:41 +00:00
//! recover a message from its signature
2003-03-20 01:24:12 +00:00
/*! \pre size of recoveredMessage == MaxRecoverableLengthFromSignatureLength(signatureLength)
2002-10-04 17:31:41 +00:00
*/
2003-03-20 01:24:12 +00:00
virtual DecodingResult RecoverMessage ( byte * recoveredMessage ,
2005-07-12 04:23:32 +00:00
const byte * nonrecoverableMessage , size_t nonrecoverableMessageLength ,
const byte * signature , size_t signatureLength ) const ;
2002-10-04 17:31:41 +00:00
} ;
//! interface for domains of simple key agreement protocols
/*! A key agreement domain is a set of parameters that must be shared
by two parties in a key agreement protocol , along with the algorithms
for generating key pairs and deriving agreed values .
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE SimpleKeyAgreementDomain : public KeyAgreementAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
//! return length of agreed value produced
virtual unsigned int AgreedValueLength ( ) const = 0 ;
//! return length of private keys in this domain
virtual unsigned int PrivateKeyLength ( ) const = 0 ;
//! return length of public keys in this domain
virtual unsigned int PublicKeyLength ( ) const = 0 ;
//! generate private key
/*! \pre size of privateKey == PrivateKeyLength() */
virtual void GeneratePrivateKey ( RandomNumberGenerator & rng , byte * privateKey ) const = 0 ;
//! generate public key
/*! \pre size of publicKey == PublicKeyLength() */
virtual void GeneratePublicKey ( RandomNumberGenerator & rng , const byte * privateKey , byte * publicKey ) const = 0 ;
//! generate private/public key pair
/*! \note equivalent to calling GeneratePrivateKey() and then GeneratePublicKey() */
virtual void GenerateKeyPair ( RandomNumberGenerator & rng , byte * privateKey , byte * publicKey ) const ;
//! derive agreed value from your private key and couterparty's public key, return false in case of failure
/*! \note If you have previously validated the public key, use validateOtherPublicKey=false to save time.
2003-10-31 02:39:32 +00:00
\ pre size of agreedValue = = AgreedValueLength ( )
2002-10-04 17:31:41 +00:00
\ pre length of privateKey = = PrivateKeyLength ( )
\ pre length of otherPublicKey = = PublicKeyLength ( )
*/
virtual bool Agree ( byte * agreedValue , const byte * privateKey , const byte * otherPublicKey , bool validateOtherPublicKey = true ) const = 0 ;
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
bool ValidateDomainParameters ( RandomNumberGenerator & rng ) const
{ return GetCryptoParameters ( ) . Validate ( rng , 2 ) ; }
# endif
} ;
//! interface for domains of authenticated key agreement protocols
/*! In an authenticated key agreement protocol, each party has two
key pairs . The long - lived key pair is called the static key pair ,
and the short - lived key pair is called the ephemeral key pair .
*/
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE AuthenticatedKeyAgreementDomain : public KeyAgreementAlgorithm
2002-10-04 17:31:41 +00:00
{
public :
//! return length of agreed value produced
virtual unsigned int AgreedValueLength ( ) const = 0 ;
//! return length of static private keys in this domain
virtual unsigned int StaticPrivateKeyLength ( ) const = 0 ;
//! return length of static public keys in this domain
virtual unsigned int StaticPublicKeyLength ( ) const = 0 ;
//! generate static private key
/*! \pre size of privateKey == PrivateStaticKeyLength() */
virtual void GenerateStaticPrivateKey ( RandomNumberGenerator & rng , byte * privateKey ) const = 0 ;
//! generate static public key
/*! \pre size of publicKey == PublicStaticKeyLength() */
virtual void GenerateStaticPublicKey ( RandomNumberGenerator & rng , const byte * privateKey , byte * publicKey ) const = 0 ;
//! generate private/public key pair
/*! \note equivalent to calling GenerateStaticPrivateKey() and then GenerateStaticPublicKey() */
virtual void GenerateStaticKeyPair ( RandomNumberGenerator & rng , byte * privateKey , byte * publicKey ) const ;
//! return length of ephemeral private keys in this domain
virtual unsigned int EphemeralPrivateKeyLength ( ) const = 0 ;
//! return length of ephemeral public keys in this domain
virtual unsigned int EphemeralPublicKeyLength ( ) const = 0 ;
//! generate ephemeral private key
/*! \pre size of privateKey == PrivateEphemeralKeyLength() */
virtual void GenerateEphemeralPrivateKey ( RandomNumberGenerator & rng , byte * privateKey ) const = 0 ;
//! generate ephemeral public key
/*! \pre size of publicKey == PublicEphemeralKeyLength() */
virtual void GenerateEphemeralPublicKey ( RandomNumberGenerator & rng , const byte * privateKey , byte * publicKey ) const = 0 ;
//! generate private/public key pair
/*! \note equivalent to calling GenerateEphemeralPrivateKey() and then GenerateEphemeralPublicKey() */
virtual void GenerateEphemeralKeyPair ( RandomNumberGenerator & rng , byte * privateKey , byte * publicKey ) const ;
//! derive agreed value from your private keys and couterparty's public keys, return false in case of failure
/*! \note The ephemeral public key will always be validated.
If you have previously validated the static public key , use validateStaticOtherPublicKey = false to save time .
\ pre size of agreedValue = = AgreedValueLength ( )
\ pre length of staticPrivateKey = = StaticPrivateKeyLength ( )
\ pre length of ephemeralPrivateKey = = EphemeralPrivateKeyLength ( )
\ pre length of staticOtherPublicKey = = StaticPublicKeyLength ( )
\ pre length of ephemeralOtherPublicKey = = EphemeralPublicKeyLength ( )
*/
virtual bool Agree ( byte * agreedValue ,
const byte * staticPrivateKey , const byte * ephemeralPrivateKey ,
const byte * staticOtherPublicKey , const byte * ephemeralOtherPublicKey ,
bool validateStaticOtherPublicKey = true ) const = 0 ;
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
bool ValidateDomainParameters ( RandomNumberGenerator & rng ) const
{ return GetCryptoParameters ( ) . Validate ( rng , 2 ) ; }
# endif
} ;
// interface for password authenticated key agreement protocols, not implemented yet
#if 0
//! interface for protocol sessions
/*! The methods should be called in the following order:
InitializeSession ( rng , parameters ) ; // or call initialize method in derived class
while ( true )
{
if ( OutgoingMessageAvailable ( ) )
{
length = GetOutgoingMessageLength ( ) ;
GetOutgoingMessage ( message ) ;
; // send outgoing message
}
if ( LastMessageProcessed ( ) )
break ;
; // receive incoming message
ProcessIncomingMessage ( message ) ;
}
; // call methods in derived class to obtain result of protocol session
*/
class ProtocolSession
{
public :
//! exception thrown when an invalid protocol message is processed
class ProtocolError : public Exception
{
public :
ProtocolError ( ErrorType errorType , const std : : string & s ) : Exception ( errorType , s ) { }
} ;
//! exception thrown when a function is called unexpectedly
/*! for example calling ProcessIncomingMessage() when ProcessedLastMessage() == true */
class UnexpectedMethodCall : public Exception
{
public :
UnexpectedMethodCall ( const std : : string & s ) : Exception ( OTHER_ERROR , s ) { }
} ;
ProtocolSession ( ) : m_rng ( NULL ) , m_throwOnProtocolError ( true ) , m_validState ( false ) { }
virtual ~ ProtocolSession ( ) { }
virtual void InitializeSession ( RandomNumberGenerator & rng , const NameValuePairs & parameters ) = 0 ;
bool GetThrowOnProtocolError ( ) const { return m_throwOnProtocolError ; }
void SetThrowOnProtocolError ( bool throwOnProtocolError ) { m_throwOnProtocolError = throwOnProtocolError ; }
bool HasValidState ( ) const { return m_validState ; }
virtual bool OutgoingMessageAvailable ( ) const = 0 ;
virtual unsigned int GetOutgoingMessageLength ( ) const = 0 ;
virtual void GetOutgoingMessage ( byte * message ) = 0 ;
virtual bool LastMessageProcessed ( ) const = 0 ;
virtual void ProcessIncomingMessage ( const byte * message , unsigned int messageLength ) = 0 ;
protected :
void HandleProtocolError ( Exception : : ErrorType errorType , const std : : string & s ) const ;
void CheckAndHandleInvalidState ( ) const ;
void SetValidState ( bool valid ) { m_validState = valid ; }
RandomNumberGenerator * m_rng ;
private :
bool m_throwOnProtocolError , m_validState ;
} ;
class KeyAgreementSession : public ProtocolSession
{
public :
virtual unsigned int GetAgreedValueLength ( ) const = 0 ;
virtual void GetAgreedValue ( byte * agreedValue ) const = 0 ;
} ;
class PasswordAuthenticatedKeyAgreementSession : public KeyAgreementSession
{
public :
void InitializePasswordAuthenticatedKeyAgreementSession ( RandomNumberGenerator & rng ,
const byte * myId , unsigned int myIdLength ,
const byte * counterPartyId , unsigned int counterPartyIdLength ,
const byte * passwordOrVerifier , unsigned int passwordOrVerifierLength ) ;
} ;
class PasswordAuthenticatedKeyAgreementDomain : public KeyAgreementAlgorithm
{
public :
//! return whether the domain parameters stored in this object are valid
virtual bool ValidateDomainParameters ( RandomNumberGenerator & rng ) const
{ return GetCryptoParameters ( ) . Validate ( rng , 2 ) ; }
virtual unsigned int GetPasswordVerifierLength ( const byte * password , unsigned int passwordLength ) const = 0 ;
virtual void GeneratePasswordVerifier ( RandomNumberGenerator & rng , const byte * userId , unsigned int userIdLength , const byte * password , unsigned int passwordLength , byte * verifier ) const = 0 ;
enum RoleFlags { CLIENT = 1 , SERVER = 2 , INITIATOR = 4 , RESPONDER = 8 } ;
virtual bool IsValidRole ( unsigned int role ) = 0 ;
virtual PasswordAuthenticatedKeyAgreementSession * CreateProtocolSession ( unsigned int role ) const = 0 ;
} ;
# endif
//! BER Decode Exception Class, may be thrown during an ASN1 BER decode operation
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL BERDecodeErr : public InvalidArgument
2002-10-04 17:31:41 +00:00
{
public :
BERDecodeErr ( ) : InvalidArgument ( " BER decode error " ) { }
BERDecodeErr ( const std : : string & s ) : InvalidArgument ( s ) { }
} ;
//! interface for encoding and decoding ASN1 objects
2003-07-04 00:17:37 +00:00
class CRYPTOPP_DLL CRYPTOPP_NO_VTABLE ASN1Object
2002-10-04 17:31:41 +00:00
{
public :
virtual ~ ASN1Object ( ) { }
//! decode this object from a BufferedTransformation, using BER (Basic Encoding Rules)
virtual void BERDecode ( BufferedTransformation & bt ) = 0 ;
//! encode this object into a BufferedTransformation, using DER (Distinguished Encoding Rules)
virtual void DEREncode ( BufferedTransformation & bt ) const = 0 ;
//! encode this object into a BufferedTransformation, using BER
/*! this may be useful if DEREncode() would be too inefficient */
virtual void BEREncode ( BufferedTransformation & bt ) const { DEREncode ( bt ) ; }
} ;
# ifdef CRYPTOPP_MAINTAIN_BACKWARDS_COMPATIBILITY
2003-05-15 17:36:53 +00:00
typedef PK_SignatureScheme PK_SignatureSystem ;
typedef SimpleKeyAgreementDomain PK_SimpleKeyAgreementDomain ;
typedef AuthenticatedKeyAgreementDomain PK_AuthenticatedKeyAgreementDomain ;
2002-10-04 17:31:41 +00:00
# endif
NAMESPACE_END
# endif