ext-cryptopp/randpool.h

105 lines
4.6 KiB
C
Raw Normal View History

// randpool.h - originally written and placed in the public domain by Wei Dai
// OldRandPool added by JW in August, 2017.
2016-01-25 04:09:28 +00:00
/// \file randpool.h
/// \brief Class file for Randomness Pool
/// \details RandomPool can be used to generate cryptographic quality pseudorandom bytes
2020-04-02 12:29:45 +00:00
/// after seeding the pool with IncorporateEntropy(). Internally, the generator uses
/// AES-256 to produce the stream. Entropy is stirred in using SHA-256.
/// \details RandomPool used to follow the design of randpool in PGP 2.6.x. At version 5.5
2020-04-02 12:29:45 +00:00
/// RandomPool was redesigned to reduce the risk of reusing random numbers after state
/// rollback (which may occur when running in a virtual machine like VMware or a hosted
/// environment).
/// \details If you need the pre-Crypto++ 5.5 generator then use OldRandomPool class. You
2020-04-02 12:29:45 +00:00
/// should migrate away from OldRandomPool at the earliest opportunity. Use RandomPool
/// or AutoSeededRandomPool instead.
/// \since Crypto++ 4.0 (PGP 2.6.x style), Crypto++ 5.5 (AES-256 based)
2016-01-25 04:09:28 +00:00
2015-11-05 06:59:46 +00:00
#ifndef CRYPTOPP_RANDPOOL_H
#define CRYPTOPP_RANDPOOL_H
#include "cryptlib.h"
#include "filters.h"
#include "secblock.h"
#include "smartptr.h"
#include "aes.h"
NAMESPACE_BEGIN(CryptoPP)
/// \brief Randomness Pool based on AES-256
/// \details RandomPool can be used to generate cryptographic quality pseudorandom bytes
2020-04-02 12:29:45 +00:00
/// after seeding the pool with IncorporateEntropy(). Internally, the generator uses
/// AES-256 to produce the stream. Entropy is stirred in using SHA-256.
/// \details RandomPool used to follow the design of randpool in PGP 2.6.x. At version 5.5
2020-04-02 12:29:45 +00:00
/// RandomPool was redesigned to reduce the risk of reusing random numbers after state
/// rollback, which may occur when running in a virtual machine like VMware or a hosted
/// environment.
/// \details You should reseed the generator after a fork() to avoid multiple generators
/// with the same internal state.
/// \details If you need the pre-Crypto++ 5.5 generator then use OldRandomPool class. You
2020-04-02 12:29:45 +00:00
/// should migrate away from OldRandomPool at the earliest opportunity.
/// \sa OldRandomPool
/// \since Crypto++ 4.0 (PGP 2.6.x style), Crypto++ 5.5 (AES-256 based)
2015-11-05 06:59:46 +00:00
class CRYPTOPP_DLL RandomPool : public RandomNumberGenerator, public NotCopyable
{
public:
/// \brief Construct a RandomPool
2015-11-05 06:59:46 +00:00
RandomPool();
bool CanIncorporateEntropy() const {return true;}
void IncorporateEntropy(const byte *input, size_t length);
void GenerateIntoBufferedTransformation(BufferedTransformation &target, const std::string &channel, lword size);
private:
2016-01-25 04:09:28 +00:00
FixedSizeAlignedSecBlock<byte, 16, true> m_seed;
FixedSizeAlignedSecBlock<byte, 32> m_key;
2015-11-05 06:59:46 +00:00
member_ptr<BlockCipher> m_pCipher;
bool m_keySet;
};
/// \brief Randomness Pool based on PGP 2.6.x with MDC
/// \details If you need the pre-Crypto++ 5.5 generator then use OldRandomPool class. The
2020-12-28 21:44:29 +00:00
/// OldRandomPool also provides the modern interface, including <tt>CanIncorporateEntropy</tt>,
2020-04-02 12:29:45 +00:00
/// <tt>IncorporateEntropy</tt> and <tt>GenerateIntoBufferedTransformation</tt>.
/// \details You should reseed the generator after a fork() to avoid multiple generators
/// with the same internal state.
/// \details You should migrate away from OldRandomPool at the earliest opportunity. Use a
2020-04-02 12:29:45 +00:00
/// modern random number generator or key derivation function, like AutoSeededRandomPool or
/// HKDF.
/// \warning This class uses an old style PGP 2.6.x with MDC. The generator risks reusing
2020-04-02 12:29:45 +00:00
/// random numbers after state rollback. You should migrate away from OldRandomPool at
/// the earliest opportunity.
/// \sa RandomPool, AutoSeededRandomPool, HKDF, P1363_KDF2, PKCS12_PBKDF, PKCS5_PBKDF2_HMAC
2020-12-28 21:44:29 +00:00
/// \since Crypto++ 6.0
class CRYPTOPP_DLL OldRandomPool : public RandomNumberGenerator
{
public:
/// \brief Construct an OldRandomPool
/// \param poolSize internal pool size of the generator
/// \details poolSize must be greater than 16
2017-08-01 23:58:08 +00:00
OldRandomPool(unsigned int poolSize=384);
// RandomNumberGenerator interface (Crypto++ 5.5 and above)
bool CanIncorporateEntropy() const {return true;}
void IncorporateEntropy(const byte *input, size_t length);
void GenerateIntoBufferedTransformation(BufferedTransformation &target, const std::string &channel, lword size);
2017-08-01 23:58:08 +00:00
byte GenerateByte();
void GenerateBlock(byte *output, size_t size);
// Endian swapped on little-endian machines. This is different
// behavior from Crypto++ 5.4. Provide an override to correct it.
word32 GenerateWord32 (word32 min=0, word32 max=0xffffffffUL);
protected:
2017-08-01 23:58:08 +00:00
void Stir();
private:
2017-08-01 23:58:08 +00:00
SecByteBlock pool, key;
size_t addPos, getPos;
};
2015-11-05 06:59:46 +00:00
NAMESPACE_END
#endif