5 #ifndef CRYPTOPP_PKCSPAD_CPP // SunCC workaround: compiler could cause this file to be included twice 6 #define CRYPTOPP_PKCSPAD_CPP 15 template<> const byte
PKCS_DigestDecoration<Weak1::MD2>::decoration[] = {0x30,0x20,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x02,0x05,0x00,0x04,0x10};
18 template<>
const byte
PKCS_DigestDecoration<Weak1::MD5>::decoration[] = {0x30,0x20,0x30,0x0c,0x06,0x08,0x2a,0x86,0x48,0x86,0xf7,0x0d,0x02,0x05,0x05,0x00,0x04,0x10};
21 template<>
const byte
PKCS_DigestDecoration<RIPEMD160>::decoration[] = {0x30,0x21,0x30,0x09,0x06,0x05,0x2b,0x24,0x03,0x02,0x01,0x05,0x00,0x04,0x14};
24 template<>
const byte
PKCS_DigestDecoration<Tiger>::decoration[] = {0x30,0x29,0x30,0x0D,0x06,0x09,0x2B,0x06,0x01,0x04,0x01,0xDA,0x47,0x0C,0x02,0x05,0x00,0x04,0x18};
32 void PKCS_EncryptionPaddingScheme::Pad(
RandomNumberGenerator& rng,
const byte *input,
size_t inputLen, byte *pkcsBlock,
size_t pkcsBlockLen,
const NameValuePairs& parameters)
const 34 CRYPTOPP_UNUSED(parameters);
38 if (pkcsBlockLen % 8 != 0)
48 for (
unsigned i = 1; i < pkcsBlockLen-inputLen-1; i++)
51 pkcsBlock[pkcsBlockLen-inputLen-1] = 0;
52 memcpy(pkcsBlock+pkcsBlockLen-inputLen, input, inputLen);
55 DecodingResult PKCS_EncryptionPaddingScheme::Unpad(
const byte *pkcsBlock,
size_t pkcsBlockLen, byte *output,
const NameValuePairs& parameters)
const 57 CRYPTOPP_UNUSED(parameters);
62 if (pkcsBlockLen % 8 != 0)
64 invalid = (pkcsBlock[0] != 0) || invalid;
70 invalid = (pkcsBlock[0] != 2) || invalid;
74 while (i<pkcsBlockLen && pkcsBlock[i++]) {
76 assert(i==pkcsBlockLen || pkcsBlock[i-1]==0);
78 size_t outputLen = pkcsBlockLen - i;
79 invalid = (outputLen > maxOutputLen) || invalid;
84 memcpy (output, pkcsBlock+i, outputLen);
90 #ifndef CRYPTOPP_IMPORTS 92 void PKCS1v15_SignatureMessageEncodingMethod::ComputeMessageRepresentative(
RandomNumberGenerator &rng,
93 const byte *recoverableMessage,
size_t recoverableMessageLength,
95 byte *representative,
size_t representativeBitLength)
const 97 CRYPTOPP_UNUSED(rng), CRYPTOPP_UNUSED(recoverableMessage), CRYPTOPP_UNUSED(recoverableMessageLength);
98 CRYPTOPP_UNUSED(messageEmpty), CRYPTOPP_UNUSED(hashIdentifier);
99 assert(representativeBitLength >= MinRepresentativeBitLength(hashIdentifier.second, hash.
DigestSize()));
101 size_t pkcsBlockLen = representativeBitLength;
103 if (pkcsBlockLen % 8 != 0)
105 representative[0] = 0;
110 representative[0] = 1;
113 byte *pPadding = representative + 1;
114 byte *pDigest = representative + pkcsBlockLen - digestSize;
115 byte *pHashId = pDigest - hashIdentifier.second;
116 byte *pSeparator = pHashId - 1;
119 memset(pPadding, 0xff, pSeparator-pPadding);
121 memcpy(pHashId, hashIdentifier.first, hashIdentifier.second);
Utility functions for the Crypto++ library.
virtual word32 GenerateWord32(word32 min=0, word32 max=0xffffffffUL)
Generate a random 32 bit word in the range min to max, inclusive.
Interface for random number generators.
Returns a decoding results.
T1 SaturatingSubtract(const T1 &a, const T2 &b)
Performs a saturating subtract clamped at 0.
size_t MaxUnpaddedLength(size_t paddedLength) const
max size of unpadded message in bytes, given max size of padded message in bits (1 less than size of ...
Crypto++ library namespace.
Interface for retrieving values given their names.