aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/pubkey
diff options
context:
space:
mode:
authorlloyd <[email protected]>2014-12-27 18:05:03 +0000
committerlloyd <[email protected]>2014-12-27 18:05:03 +0000
commit223ef5ef234a9534e7b71c4738788299755b654e (patch)
treec9a3314a31df65c9c58c2e7caa2f7d1bf7ff8abe /src/lib/pubkey
parentd0daf875978848c3edf65c7b3683a21605f72e64 (diff)
When encrypting McEliece or Curve25519 keys, default to GCM instead of CBC.
Add OIDS for OCB mode with various ciphers.
Diffstat (limited to 'src/lib/pubkey')
-rw-r--r--src/lib/pubkey/mce/mceliece_key.h2
-rw-r--r--src/lib/pubkey/pkcs8.cpp20
2 files changed, 13 insertions, 9 deletions
diff --git a/src/lib/pubkey/mce/mceliece_key.h b/src/lib/pubkey/mce/mceliece_key.h
index cb9412c05..d8b4b59ce 100644
--- a/src/lib/pubkey/mce/mceliece_key.h
+++ b/src/lib/pubkey/mce/mceliece_key.h
@@ -32,7 +32,7 @@ class BOTAN_DLL McEliece_PublicKey : public virtual Public_Key
McEliece_PublicKey(const McEliece_PublicKey & other);
- std::string algo_name() const { return "McEliece/BIGGF2M"; }
+ std::string algo_name() const { return "McEliece"; }
/**
* Get the maximum number of bits allowed to be fed to this key.
diff --git a/src/lib/pubkey/pkcs8.cpp b/src/lib/pubkey/pkcs8.cpp
index 15f0c4539..298cea064 100644
--- a/src/lib/pubkey/pkcs8.cpp
+++ b/src/lib/pubkey/pkcs8.cpp
@@ -153,17 +153,21 @@ std::string PEM_encode(const Private_Key& key)
namespace {
std::pair<std::string, std::string>
-choose_pbe_params(const std::string& pbe_algo)
+choose_pbe_params(const std::string& pbe_algo, const std::string& key_algo)
{
- if(!pbe_algo.empty())
+ if(pbe_algo == "")
{
- SCAN_Name request(pbe_algo);
- if(request.algo_name() != "PBE-PKCS5v20")
- throw std::runtime_error("Unsupported PBE " + pbe_algo);
- return std::make_pair(request.arg(1), request.arg(0));
+ // Defaults:
+ if(key_algo == "Curve25519" || key_algo == "McEliece")
+ return std::make_pair("AES-256/GCM", "SHA-512");
+ else // for everything else (RSA, DSA, ECDSA, GOST, ...)
+ return std::make_pair("AES-256/CBC", "SHA-256");
}
- return std::make_pair("AES-256/CBC", "SHA-256");
+ SCAN_Name request(pbe_algo);
+ if(request.algo_name() != "PBE-PKCS5v20" || request.arg_count() != 2)
+ throw std::runtime_error("Unsupported PBE " + pbe_algo);
+ return std::make_pair(request.arg(1), request.arg(0));
}
}
@@ -177,7 +181,7 @@ std::vector<byte> BER_encode(const Private_Key& key,
std::chrono::milliseconds msec,
const std::string& pbe_algo)
{
- const auto pbe_params = choose_pbe_params(pbe_algo);
+ const auto pbe_params = choose_pbe_params(pbe_algo, key.algo_name());
const std::pair<AlgorithmIdentifier, std::vector<byte>> pbe_info =
pbes2_encrypt(PKCS8::BER_encode(key), pass, msec,