ext-cryptopp/pkcspad.h

95 lines
2.8 KiB
C
Raw Normal View History

2002-10-04 17:31:41 +00:00
#ifndef CRYPTOPP_PKCSPAD_H
#define CRYPTOPP_PKCSPAD_H
#include "cryptlib.h"
#include "pubkey.h"
#ifdef CRYPTOPP_IS_DLL
#include "sha.h"
#endif
2002-10-04 17:31:41 +00:00
NAMESPACE_BEGIN(CryptoPP)
2003-03-20 01:24:12 +00:00
//! <a href="http://www.weidai.com/scan-mirror/ca.html#cem_PKCS1-1.5">EME-PKCS1-v1_5</a>
class PKCS_EncryptionPaddingScheme : public PK_EncryptionMessageEncodingMethod
2002-10-04 17:31:41 +00:00
{
public:
static const char * StaticAlgorithmName() {return "EME-PKCS1-v1_5";}
2005-07-12 04:23:32 +00:00
size_t MaxUnpaddedLength(size_t paddedLength) const;
void Pad(RandomNumberGenerator &rng, const byte *raw, size_t inputLength, byte *padded, size_t paddedLength, const NameValuePairs &parameters) const;
DecodingResult Unpad(const byte *padded, size_t paddedLength, byte *raw, const NameValuePairs &parameters) const;
2002-10-04 17:31:41 +00:00
};
template <class H> class PKCS_DigestDecoration
2002-10-04 17:31:41 +00:00
{
public:
2003-03-20 01:24:12 +00:00
static const byte decoration[];
static const unsigned int length;
2002-10-04 17:31:41 +00:00
};
// PKCS_DigestDecoration can be instantiated with the following
// classes as specified in PKCS#1 v2.0 and P1363a
class SHA1;
class RIPEMD160;
class Tiger;
class SHA224;
class SHA256;
class SHA384;
class SHA512;
2007-05-04 15:10:50 +00:00
namespace Weak1 {
class MD2;
class MD5;
}
// end of list
#ifdef CRYPTOPP_IS_DLL
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA1>;
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA224>;
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA256>;
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA384>;
CRYPTOPP_DLL_TEMPLATE_CLASS PKCS_DigestDecoration<SHA512>;
#endif
2003-03-20 01:24:12 +00:00
//! <a href="http://www.weidai.com/scan-mirror/sig.html#sem_PKCS1-1.5">EMSA-PKCS1-v1_5</a>
class CRYPTOPP_DLL PKCS1v15_SignatureMessageEncodingMethod : public PK_DeterministicSignatureMessageEncodingMethod
2002-10-04 17:31:41 +00:00
{
public:
static const char * CRYPTOPP_API StaticAlgorithmName() {return "EMSA-PKCS1-v1_5";}
2005-07-12 04:23:32 +00:00
size_t MinRepresentativeBitLength(size_t hashIdentifierSize, size_t digestSize) const
{return 8 * (digestSize + hashIdentifierSize + 10);}
2002-10-04 17:31:41 +00:00
2003-03-20 01:24:12 +00:00
void ComputeMessageRepresentative(RandomNumberGenerator &rng,
2005-07-12 04:23:32 +00:00
const byte *recoverableMessage, size_t recoverableMessageLength,
2003-03-20 01:24:12 +00:00
HashTransformation &hash, HashIdentifier hashIdentifier, bool messageEmpty,
2005-07-12 04:23:32 +00:00
byte *representative, size_t representativeBitLength) const;
2003-03-20 01:24:12 +00:00
struct HashIdentifierLookup
{
template <class H> struct HashIdentifierLookup2
{
static HashIdentifier Lookup()
{
return HashIdentifier(PKCS_DigestDecoration<H>::decoration, PKCS_DigestDecoration<H>::length);
}
};
};
2002-10-04 17:31:41 +00:00
};
//! PKCS #1 version 1.5, for use with RSAES and RSASS
/*! Only the following hash functions are supported by this signature standard:
\dontinclude pkcspad.h
\skip can be instantiated
\until end of list
*/
2002-10-04 17:31:41 +00:00
struct PKCS1v15 : public SignatureStandard, public EncryptionStandard
{
2003-03-20 01:24:12 +00:00
typedef PKCS_EncryptionPaddingScheme EncryptionMessageEncodingMethod;
typedef PKCS1v15_SignatureMessageEncodingMethod SignatureMessageEncodingMethod;
2002-10-04 17:31:41 +00:00
};
NAMESPACE_END
#endif