mirror of
https://github.com/nillerusr/source-engine.git
synced 2024-12-23 14:46:53 +00:00
145 lines
3.8 KiB
C
145 lines
3.8 KiB
C
|
#ifndef CRYPTOPP_PANAMA_H
|
||
|
#define CRYPTOPP_PANAMA_H
|
||
|
|
||
|
#include "strciphr.h"
|
||
|
#include "iterhash.h"
|
||
|
|
||
|
NAMESPACE_BEGIN(CryptoPP)
|
||
|
|
||
|
/// base class, do not use directly
|
||
|
template <class B>
|
||
|
class CRYPTOPP_NO_VTABLE Panama
|
||
|
{
|
||
|
public:
|
||
|
void Reset();
|
||
|
void Iterate(size_t count, const word32 *p=NULL, word32 *z=NULL, const word32 *y=NULL);
|
||
|
|
||
|
protected:
|
||
|
typedef word32 Stage[8];
|
||
|
CRYPTOPP_CONSTANT(STAGES = 32)
|
||
|
|
||
|
FixedSizeAlignedSecBlock<word32, 20 + 8*32> m_state;
|
||
|
};
|
||
|
|
||
|
namespace Weak {
|
||
|
/// <a href="http://www.weidai.com/scan-mirror/md.html#Panama">Panama Hash</a>
|
||
|
template <class B = LittleEndian>
|
||
|
class PanamaHash : protected Panama<B>, public AlgorithmImpl<IteratedHash<word32, NativeByteOrder, 32>, PanamaHash<B> >
|
||
|
{
|
||
|
public:
|
||
|
CRYPTOPP_CONSTANT(DIGESTSIZE = 32)
|
||
|
PanamaHash() {Panama<B>::Reset();}
|
||
|
unsigned int DigestSize() const {return DIGESTSIZE;}
|
||
|
void TruncatedFinal(byte *hash, size_t size);
|
||
|
static const char * StaticAlgorithmName() {return B::ToEnum() == BIG_ENDIAN_ORDER ? "Panama-BE" : "Panama-LE";}
|
||
|
|
||
|
protected:
|
||
|
void Init() {Panama<B>::Reset();}
|
||
|
void HashEndianCorrectedBlock(const word32 *data) {this->Iterate(1, data);} // push
|
||
|
size_t HashMultipleBlocks(const word32 *input, size_t length);
|
||
|
word32* StateBuf() {return NULL;}
|
||
|
};
|
||
|
}
|
||
|
|
||
|
//! MAC construction using a hermetic hash function
|
||
|
template <class T_Hash, class T_Info = T_Hash>
|
||
|
class HermeticHashFunctionMAC : public AlgorithmImpl<SimpleKeyingInterfaceImpl<TwoBases<MessageAuthenticationCode, VariableKeyLength<32, 0, INT_MAX> > >, T_Info>
|
||
|
{
|
||
|
public:
|
||
|
void UncheckedSetKey(const byte *key, unsigned int length, const NameValuePairs ¶ms)
|
||
|
{
|
||
|
m_key.Assign(key, length);
|
||
|
Restart();
|
||
|
}
|
||
|
|
||
|
void Restart()
|
||
|
{
|
||
|
m_hash.Restart();
|
||
|
m_keyed = false;
|
||
|
}
|
||
|
|
||
|
void Update(const byte *input, size_t length)
|
||
|
{
|
||
|
if (!m_keyed)
|
||
|
KeyHash();
|
||
|
m_hash.Update(input, length);
|
||
|
}
|
||
|
|
||
|
void TruncatedFinal(byte *digest, size_t digestSize)
|
||
|
{
|
||
|
if (!m_keyed)
|
||
|
KeyHash();
|
||
|
m_hash.TruncatedFinal(digest, digestSize);
|
||
|
m_keyed = false;
|
||
|
}
|
||
|
|
||
|
unsigned int DigestSize() const
|
||
|
{return m_hash.DigestSize();}
|
||
|
unsigned int BlockSize() const
|
||
|
{return m_hash.BlockSize();}
|
||
|
unsigned int OptimalBlockSize() const
|
||
|
{return m_hash.OptimalBlockSize();}
|
||
|
unsigned int OptimalDataAlignment() const
|
||
|
{return m_hash.OptimalDataAlignment();}
|
||
|
|
||
|
protected:
|
||
|
void KeyHash()
|
||
|
{
|
||
|
m_hash.Update(m_key, m_key.size());
|
||
|
m_keyed = true;
|
||
|
}
|
||
|
|
||
|
T_Hash m_hash;
|
||
|
bool m_keyed;
|
||
|
SecByteBlock m_key;
|
||
|
};
|
||
|
|
||
|
namespace Weak {
|
||
|
/// Panama MAC
|
||
|
template <class B = LittleEndian>
|
||
|
class PanamaMAC : public HermeticHashFunctionMAC<PanamaHash<B> >
|
||
|
{
|
||
|
public:
|
||
|
PanamaMAC() {}
|
||
|
PanamaMAC(const byte *key, unsigned int length)
|
||
|
{this->SetKey(key, length);}
|
||
|
};
|
||
|
}
|
||
|
|
||
|
//! algorithm info
|
||
|
template <class B>
|
||
|
struct PanamaCipherInfo : public FixedKeyLength<32, SimpleKeyingInterface::UNIQUE_IV, 32>
|
||
|
{
|
||
|
static const char * StaticAlgorithmName() {return B::ToEnum() == BIG_ENDIAN_ORDER ? "Panama-BE" : "Panama-LE";}
|
||
|
};
|
||
|
|
||
|
//! _
|
||
|
template <class B>
|
||
|
class PanamaCipherPolicy : public AdditiveCipherConcretePolicy<word32, 8>,
|
||
|
public PanamaCipherInfo<B>,
|
||
|
protected Panama<B>
|
||
|
{
|
||
|
protected:
|
||
|
void CipherSetKey(const NameValuePairs ¶ms, const byte *key, size_t length);
|
||
|
void OperateKeystream(KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount);
|
||
|
bool CipherIsRandomAccess() const {return false;}
|
||
|
void CipherResynchronize(byte *keystreamBuffer, const byte *iv, size_t length);
|
||
|
#if CRYPTOPP_BOOL_X86 || CRYPTOPP_BOOL_X64
|
||
|
unsigned int GetAlignment() const;
|
||
|
#endif
|
||
|
|
||
|
FixedSizeSecBlock<word32, 8> m_key;
|
||
|
};
|
||
|
|
||
|
//! <a href="http://www.cryptolounge.org/wiki/PANAMA">Panama Stream Cipher</a>
|
||
|
template <class B = LittleEndian>
|
||
|
struct PanamaCipher : public PanamaCipherInfo<B>, public SymmetricCipherDocumentation
|
||
|
{
|
||
|
typedef SymmetricCipherFinal<ConcretePolicyHolder<PanamaCipherPolicy<B>, AdditiveCipherTemplate<> >, PanamaCipherInfo<B> > Encryption;
|
||
|
typedef Encryption Decryption;
|
||
|
};
|
||
|
|
||
|
NAMESPACE_END
|
||
|
|
||
|
#endif
|