aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2021-04-04 16:47:11 -0400
committerJack Lloyd <[email protected]>2021-04-05 10:08:21 -0400
commitec8b0aa05cf08aa356ab0631903597bf178480fd (patch)
tree164e449557b12c45fd7a0007517a505ea4d29bac /src/lib
parent262681832f7b58287b17a3d33754f5dc4699b660 (diff)
More raw pointer removal
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/entropy/entropy_srcs.cpp12
-rw-r--r--src/lib/pbkdf/pbkdf2/pbkdf2.cpp2
-rw-r--r--src/lib/pbkdf/pbkdf2/pbkdf2.h2
-rw-r--r--src/lib/pk_pad/eme.cpp10
-rw-r--r--src/lib/pk_pad/eme.h14
-rw-r--r--src/lib/pk_pad/emsa.cpp36
-rw-r--r--src/lib/pk_pad/emsa.h20
-rw-r--r--src/lib/pk_pad/emsa1/emsa1.cpp4
-rw-r--r--src/lib/pk_pad/emsa1/emsa1.h2
-rw-r--r--src/lib/pk_pad/emsa_pkcs1/emsa_pkcs1.h4
-rw-r--r--src/lib/pk_pad/emsa_pssr/pssr.cpp8
-rw-r--r--src/lib/pk_pad/emsa_pssr/pssr.h4
-rw-r--r--src/lib/pk_pad/emsa_raw/emsa_raw.h2
-rw-r--r--src/lib/pk_pad/emsa_x931/emsa_x931.h2
-rw-r--r--src/lib/pk_pad/iso9796/iso9796.cpp8
-rw-r--r--src/lib/pk_pad/iso9796/iso9796.h4
-rw-r--r--src/lib/prov/commoncrypto/commoncrypto_block.cpp2
-rw-r--r--src/lib/prov/tpm/tpm.cpp4
-rw-r--r--src/lib/pubkey/pk_ops.cpp20
-rw-r--r--src/lib/pubkey/pk_ops_impl.h4
-rw-r--r--src/lib/tls/msg_client_hello.cpp6
-rw-r--r--src/lib/tls/msg_server_kex.cpp6
-rw-r--r--src/lib/tls/tls_client.cpp2
-rw-r--r--src/lib/utils/os_utils.cpp6
-rw-r--r--src/lib/x509/crl_ent.cpp6
-rw-r--r--src/lib/x509/pkcs10.cpp2
-rw-r--r--src/lib/x509/pkix_types.h2
-rw-r--r--src/lib/x509/x509_crl.cpp4
-rw-r--r--src/lib/x509/x509_obj.cpp10
-rw-r--r--src/lib/x509/x509cert.cpp7
30 files changed, 113 insertions, 102 deletions
diff --git a/src/lib/entropy/entropy_srcs.cpp b/src/lib/entropy/entropy_srcs.cpp
index 8eadfd9c2..46b025ef2 100644
--- a/src/lib/entropy/entropy_srcs.cpp
+++ b/src/lib/entropy/entropy_srcs.cpp
@@ -92,7 +92,7 @@ std::unique_ptr<Entropy_Source> Entropy_Source::create(const std::string& name)
#if defined(BOTAN_HAS_SYSTEM_RNG)
if(name == "system_rng")
{
- return std::unique_ptr<Entropy_Source>(new System_RNG_EntropySource);
+ return std::make_unique<System_RNG_EntropySource>();
}
#endif
@@ -101,7 +101,7 @@ std::unique_ptr<Entropy_Source> Entropy_Source::create(const std::string& name)
{
if(Processor_RNG::available())
{
- return std::unique_ptr<Entropy_Source>(new Processor_RNG_EntropySource);
+ return std::make_unique<Processor_RNG_EntropySource>();
}
}
#endif
@@ -109,26 +109,26 @@ std::unique_ptr<Entropy_Source> Entropy_Source::create(const std::string& name)
#if defined(BOTAN_HAS_ENTROPY_SRC_RDSEED)
if(name == "rdseed")
{
- return std::unique_ptr<Entropy_Source>(new Intel_Rdseed);
+ return std::make_unique<Intel_Rdseed>();
}
#endif
#if defined(BOTAN_HAS_ENTROPY_SRC_GETENTROPY)
if(name == "getentropy")
{
- return std::unique_ptr<Entropy_Source>(new Getentropy);
+ return std::make_unique<Getentropy>();
}
#endif
#if defined(BOTAN_HAS_ENTROPY_SRC_WIN32)
if(name == "system_stats")
{
- return std::unique_ptr<Entropy_Source>(new Win32_EntropySource);
+ return std::make_unique<Win32_EntropySource>();
}
#endif
BOTAN_UNUSED(name);
- return std::unique_ptr<Entropy_Source>();
+ return nullptr;
}
void Entropy_Sources::add_source(std::unique_ptr<Entropy_Source> src)
diff --git a/src/lib/pbkdf/pbkdf2/pbkdf2.cpp b/src/lib/pbkdf/pbkdf2/pbkdf2.cpp
index 1b3c0be5c..51dfa2fdd 100644
--- a/src/lib/pbkdf/pbkdf2/pbkdf2.cpp
+++ b/src/lib/pbkdf/pbkdf2/pbkdf2.cpp
@@ -182,7 +182,7 @@ PBKDF* PKCS5_PBKDF2::clone() const
// PasswordHash interface
PBKDF2::PBKDF2(const MessageAuthenticationCode& prf, size_t olen, std::chrono::milliseconds msec) :
- m_prf(prf.clone()),
+ m_prf(prf.new_object()),
m_iterations(tune_pbkdf2(*m_prf, olen, static_cast<uint32_t>(msec.count())))
{}
diff --git a/src/lib/pbkdf/pbkdf2/pbkdf2.h b/src/lib/pbkdf/pbkdf2/pbkdf2.h
index 9f90799c4..bea5893f3 100644
--- a/src/lib/pbkdf/pbkdf2/pbkdf2.h
+++ b/src/lib/pbkdf/pbkdf2/pbkdf2.h
@@ -40,7 +40,7 @@ class BOTAN_PUBLIC_API(2,8) PBKDF2 final : public PasswordHash
{
public:
PBKDF2(const MessageAuthenticationCode& prf, size_t iter) :
- m_prf(prf.clone()),
+ m_prf(prf.new_object()),
m_iterations(iter)
{}
diff --git a/src/lib/pk_pad/eme.cpp b/src/lib/pk_pad/eme.cpp
index 042db3fab..d30cd11f8 100644
--- a/src/lib/pk_pad/eme.cpp
+++ b/src/lib/pk_pad/eme.cpp
@@ -24,16 +24,16 @@
namespace Botan {
-EME* get_eme(const std::string& algo_spec)
+std::unique_ptr<EME> EME::create(const std::string& algo_spec)
{
#if defined(BOTAN_HAS_EME_RAW)
if(algo_spec == "Raw")
- return new EME_Raw;
+ return std::make_unique<EME_Raw>();
#endif
#if defined(BOTAN_HAS_EME_PKCS1)
if(algo_spec == "PKCS1v15" || algo_spec == "EME-PKCS1-v1_5")
- return new EME_PKCS1v15;
+ return std::make_unique<EME_PKCS1v15>();
#endif
#if defined(BOTAN_HAS_EME_OAEP)
@@ -47,7 +47,7 @@ EME* get_eme(const std::string& algo_spec)
((req.arg_count() == 2 || req.arg_count() == 3) && req.arg(1) == "MGF1"))
{
if(auto hash = HashFunction::create(req.arg(0)))
- return new OAEP(hash.release(), req.arg(2, ""));
+ return std::make_unique<OAEP>(hash.release(), req.arg(2, ""));
}
else if(req.arg_count() == 2 || req.arg_count() == 3)
{
@@ -60,7 +60,7 @@ EME* get_eme(const std::string& algo_spec)
if(hash && mgf1_hash)
{
- return new OAEP(hash.release(), mgf1_hash.release(), req.arg(2, ""));
+ return std::make_unique<OAEP>(hash.release(), mgf1_hash.release(), req.arg(2, ""));
}
}
}
diff --git a/src/lib/pk_pad/eme.h b/src/lib/pk_pad/eme.h
index c21dfde45..c913492a9 100644
--- a/src/lib/pk_pad/eme.h
+++ b/src/lib/pk_pad/eme.h
@@ -24,6 +24,13 @@ class EME
virtual ~EME() = default;
/**
+ * Factory method for EME (message-encoding methods for encryption) objects
+ * @param algo_spec the name of the EME to create
+ * @return pointer to newly allocated object of that type
+ */
+ static std::unique_ptr<EME> create(const std::string& algo_spec);
+
+ /**
* Return the maximum input size in bytes we can support
* @param keybits the size of the key in bits
* @return upper bound of input in bytes
@@ -80,13 +87,6 @@ class EME
RandomNumberGenerator& rng) const = 0;
};
-/**
-* Factory method for EME (message-encoding methods for encryption) objects
-* @param algo_spec the name of the EME to create
-* @return pointer to newly allocated object of that type
-*/
-EME* get_eme(const std::string& algo_spec);
-
}
#endif
diff --git a/src/lib/pk_pad/emsa.cpp b/src/lib/pk_pad/emsa.cpp
index 63a0488d9..25a954233 100644
--- a/src/lib/pk_pad/emsa.cpp
+++ b/src/lib/pk_pad/emsa.cpp
@@ -41,7 +41,7 @@ AlgorithmIdentifier EMSA::config_for_x509(const Private_Key&,
throw Not_Implemented("Encoding " + name() + " not supported for signing X509 objects");
}
-EMSA* get_emsa(const std::string& algo_spec)
+std::unique_ptr<EMSA> EMSA::create(const std::string& algo_spec)
{
SCAN_Name req(algo_spec);
@@ -49,7 +49,7 @@ EMSA* get_emsa(const std::string& algo_spec)
if(req.algo_name() == "EMSA1" && req.arg_count() == 1)
{
if(auto hash = HashFunction::create(req.arg(0)))
- return new EMSA1(hash.release());
+ return std::make_unique<EMSA1>(hash.release());
}
#endif
@@ -61,19 +61,19 @@ EMSA* get_emsa(const std::string& algo_spec)
{
if(req.arg_count() == 2 && req.arg(0) == "Raw")
{
- return new EMSA_PKCS1v15_Raw(req.arg(1));
+ return std::make_unique<EMSA_PKCS1v15_Raw>(req.arg(1));
}
else if(req.arg_count() == 1)
{
if(req.arg(0) == "Raw")
{
- return new EMSA_PKCS1v15_Raw;
+ return std::make_unique<EMSA_PKCS1v15_Raw>();
}
else
{
if(auto hash = HashFunction::create(req.arg(0)))
{
- return new EMSA_PKCS1v15(hash.release());
+ return std::make_unique<EMSA_PKCS1v15>(hash.release());
}
}
}
@@ -91,11 +91,11 @@ EMSA* get_emsa(const std::string& algo_spec)
if(req.arg_count() == 3)
{
const size_t salt_size = req.arg_as_integer(2, 0);
- return new PSSR_Raw(h.release(), salt_size);
+ return std::make_unique<PSSR_Raw>(h.release(), salt_size);
}
else
{
- return new PSSR_Raw(h.release());
+ return std::make_unique<PSSR_Raw>(h.release());
}
}
}
@@ -114,11 +114,11 @@ EMSA* get_emsa(const std::string& algo_spec)
if(req.arg_count() == 3)
{
const size_t salt_size = req.arg_as_integer(2, 0);
- return new PSSR(h.release(), salt_size);
+ return std::make_unique<PSSR>(h.release(), salt_size);
}
else
{
- return new PSSR(h.release());
+ return std::make_unique<PSSR>(h.release());
}
}
}
@@ -134,7 +134,7 @@ EMSA* get_emsa(const std::string& algo_spec)
{
const size_t salt_size = req.arg_as_integer(2, h->output_length());
const bool implicit = req.arg(1, "exp") == "imp";
- return new ISO_9796_DS2(h.release(), implicit, salt_size);
+ return std::make_unique<ISO_9796_DS2>(h.release(), implicit, salt_size);
}
}
}
@@ -146,7 +146,7 @@ EMSA* get_emsa(const std::string& algo_spec)
if(auto h = HashFunction::create(req.arg(0)))
{
const bool implicit = req.arg(1, "exp") == "imp";
- return new ISO_9796_DS3(h.release(), implicit);
+ return std::make_unique<ISO_9796_DS3>(h.release(), implicit);
}
}
}
@@ -161,7 +161,7 @@ EMSA* get_emsa(const std::string& algo_spec)
{
if(auto hash = HashFunction::create(req.arg(0)))
{
- return new EMSA_X931(hash.release());
+ return std::make_unique<EMSA_X931>(hash.release());
}
}
}
@@ -172,17 +172,25 @@ EMSA* get_emsa(const std::string& algo_spec)
{
if(req.arg_count() == 0)
{
- return new EMSA_Raw;
+ return std::make_unique<EMSA_Raw>();
}
else
{
auto hash = HashFunction::create(req.arg(0));
if(hash)
- return new EMSA_Raw(hash->output_length());
+ return std::make_unique<EMSA_Raw>(hash->output_length());
}
}
#endif
+ return nullptr;
+ }
+
+std::unique_ptr<EMSA> EMSA::create_or_throw(const std::string& algo_spec)
+ {
+ auto emsa = EMSA::create(algo_spec);
+ if(emsa)
+ return emsa;
throw Algorithm_Not_Found(algo_spec);
}
diff --git a/src/lib/pk_pad/emsa.h b/src/lib/pk_pad/emsa.h
index c2e352325..5a8f0daec 100644
--- a/src/lib/pk_pad/emsa.h
+++ b/src/lib/pk_pad/emsa.h
@@ -22,12 +22,28 @@ class RandomNumberGenerator;
*
* Any way of encoding/padding signatures
*/
-class EMSA
+class BOTAN_TEST_API EMSA
{
public:
virtual ~EMSA() = default;
/**
+ * Factory method for EMSA (message-encoding methods for signatures
+ * with appendix) objects
+ * @param algo_spec the name of the EMSA to create
+ * @return pointer to newly allocated object of that type, or nullptr
+ */
+ static std::unique_ptr<EMSA> create(const std::string& algo_spec);
+
+ /**
+ * Factory method for EMSA (message-encoding methods for signatures
+ * with appendix) objects
+ * @param algo_spec the name of the EMSA to create
+ * @return pointer to newly allocated object of that type, or throws
+ */
+ static std::unique_ptr<EMSA> create_or_throw(const std::string& algo_spec);
+
+ /**
* Add more data to the signature computation
* @param input some data
* @param length length of input in bytes
@@ -75,7 +91,7 @@ class EMSA
/**
* @return a new object representing the same encoding method as *this
*/
- virtual EMSA* clone() = 0;
+ virtual std::unique_ptr<EMSA> new_object() = 0;
/**
* @return the SCAN name of the encoding/padding scheme
diff --git a/src/lib/pk_pad/emsa1/emsa1.cpp b/src/lib/pk_pad/emsa1/emsa1.cpp
index 42228e8fd..706806152 100644
--- a/src/lib/pk_pad/emsa1/emsa1.cpp
+++ b/src/lib/pk_pad/emsa1/emsa1.cpp
@@ -48,9 +48,9 @@ std::string EMSA1::name() const
return "EMSA1(" + m_hash->name() + ")";
}
-EMSA* EMSA1::clone()
+std::unique_ptr<EMSA> EMSA1::new_object()
{
- return new EMSA1(m_hash->clone());
+ return std::make_unique<EMSA1>(m_hash->clone());
}
void EMSA1::update(const uint8_t input[], size_t length)
diff --git a/src/lib/pk_pad/emsa1/emsa1.h b/src/lib/pk_pad/emsa1/emsa1.h
index cf5068240..06ffea2e2 100644
--- a/src/lib/pk_pad/emsa1/emsa1.h
+++ b/src/lib/pk_pad/emsa1/emsa1.h
@@ -25,7 +25,7 @@ class EMSA1 final : public EMSA
*/
explicit EMSA1(HashFunction* hash) : m_hash(hash) {}
- EMSA* clone() override;
+ std::unique_ptr<EMSA> new_object() override;
std::string name() const override;
diff --git a/src/lib/pk_pad/emsa_pkcs1/emsa_pkcs1.h b/src/lib/pk_pad/emsa_pkcs1/emsa_pkcs1.h
index 7a9b169c4..1e582832e 100644
--- a/src/lib/pk_pad/emsa_pkcs1/emsa_pkcs1.h
+++ b/src/lib/pk_pad/emsa_pkcs1/emsa_pkcs1.h
@@ -26,7 +26,7 @@ class EMSA_PKCS1v15 final : public EMSA
*/
explicit EMSA_PKCS1v15(HashFunction* hash);
- EMSA* clone() override { return new EMSA_PKCS1v15(m_hash->clone()); }
+ std::unique_ptr<EMSA> new_object() override { return std::make_unique<EMSA_PKCS1v15>(m_hash->clone()); }
void update(const uint8_t[], size_t) override;
@@ -56,7 +56,7 @@ class EMSA_PKCS1v15 final : public EMSA
class EMSA_PKCS1v15_Raw final : public EMSA
{
public:
- EMSA* clone() override { return new EMSA_PKCS1v15_Raw(); }
+ std::unique_ptr<EMSA> new_object() override { return std::make_unique<EMSA_PKCS1v15_Raw>(); }
void update(const uint8_t[], size_t) override;
diff --git a/src/lib/pk_pad/emsa_pssr/pssr.cpp b/src/lib/pk_pad/emsa_pssr/pssr.cpp
index cf7312900..d9b2ec30b 100644
--- a/src/lib/pk_pad/emsa_pssr/pssr.cpp
+++ b/src/lib/pk_pad/emsa_pssr/pssr.cpp
@@ -179,9 +179,9 @@ bool PSSR::verify(const secure_vector<uint8_t>& coded,
return ok;
}
-EMSA* PSSR::clone()
+std::unique_ptr<EMSA> PSSR::new_object()
{
- return new PSSR(m_hash->clone(), m_salt_size);
+ return std::make_unique<PSSR>(m_hash->clone(), m_salt_size);
}
std::string PSSR::name() const
@@ -278,9 +278,9 @@ bool PSSR_Raw::verify(const secure_vector<uint8_t>& coded,
return ok;
}
-EMSA* PSSR_Raw::clone()
+std::unique_ptr<EMSA> PSSR_Raw::new_object()
{
- return new PSSR_Raw(m_hash->clone(), m_salt_size);
+ return std::make_unique<PSSR_Raw>(m_hash->clone(), m_salt_size);
}
std::string PSSR_Raw::name() const
diff --git a/src/lib/pk_pad/emsa_pssr/pssr.h b/src/lib/pk_pad/emsa_pssr/pssr.h
index a33cf42a0..9deec7c03 100644
--- a/src/lib/pk_pad/emsa_pssr/pssr.h
+++ b/src/lib/pk_pad/emsa_pssr/pssr.h
@@ -31,7 +31,7 @@ class PSSR final : public EMSA
*/
PSSR(HashFunction* hash, size_t salt_size);
- EMSA* clone() override;
+ std::unique_ptr<EMSA> new_object() override;
std::string name() const override;
@@ -74,7 +74,7 @@ class PSSR_Raw final : public EMSA
*/
PSSR_Raw(HashFunction* hash, size_t salt_size);
- EMSA* clone() override;
+ std::unique_ptr<EMSA> new_object() override;
std::string name() const override;
private:
diff --git a/src/lib/pk_pad/emsa_raw/emsa_raw.h b/src/lib/pk_pad/emsa_raw/emsa_raw.h
index fdcd89aa9..10c39bd35 100644
--- a/src/lib/pk_pad/emsa_raw/emsa_raw.h
+++ b/src/lib/pk_pad/emsa_raw/emsa_raw.h
@@ -19,7 +19,7 @@ namespace Botan {
class EMSA_Raw final : public EMSA
{
public:
- EMSA* clone() override { return new EMSA_Raw(); }
+ std::unique_ptr<EMSA> new_object() override { return std::make_unique<EMSA_Raw>(); }
explicit EMSA_Raw(size_t expected_hash_size = 0) :
m_expected_size(expected_hash_size) {}
diff --git a/src/lib/pk_pad/emsa_x931/emsa_x931.h b/src/lib/pk_pad/emsa_x931/emsa_x931.h
index 9c8fdc07a..a7075a74e 100644
--- a/src/lib/pk_pad/emsa_x931/emsa_x931.h
+++ b/src/lib/pk_pad/emsa_x931/emsa_x931.h
@@ -26,7 +26,7 @@ class EMSA_X931 final : public EMSA
*/
explicit EMSA_X931(HashFunction* hash);
- EMSA* clone() override { return new EMSA_X931(m_hash->clone()); }
+ std::unique_ptr<EMSA> new_object() override { return std::make_unique<EMSA_X931>(m_hash->clone()); }
std::string name() const override;
diff --git a/src/lib/pk_pad/iso9796/iso9796.cpp b/src/lib/pk_pad/iso9796/iso9796.cpp
index 1025be521..9931ab2fa 100644
--- a/src/lib/pk_pad/iso9796/iso9796.cpp
+++ b/src/lib/pk_pad/iso9796/iso9796.cpp
@@ -216,9 +216,9 @@ bool iso9796_verification(const secure_vector<uint8_t>& const_coded,
}
-EMSA* ISO_9796_DS2::clone()
+std::unique_ptr<EMSA> ISO_9796_DS2::new_object()
{
- return new ISO_9796_DS2(m_hash->clone(), m_implicit, m_SALT_SIZE);
+ return std::make_unique<ISO_9796_DS2>(m_hash->clone(), m_implicit, m_SALT_SIZE);
}
/*
@@ -269,9 +269,9 @@ std::string ISO_9796_DS2::name() const
+ (m_implicit ? "imp" : "exp") + "," + std::to_string(m_SALT_SIZE) + ")";
}
-EMSA* ISO_9796_DS3::clone()
+std::unique_ptr<EMSA> ISO_9796_DS3::new_object()
{
- return new ISO_9796_DS3(m_hash->clone(), m_implicit);
+ return std::make_unique<ISO_9796_DS3>(m_hash->clone(), m_implicit);
}
/*
diff --git a/src/lib/pk_pad/iso9796/iso9796.h b/src/lib/pk_pad/iso9796/iso9796.h
index 1ce696a77..92a93f54f 100644
--- a/src/lib/pk_pad/iso9796/iso9796.h
+++ b/src/lib/pk_pad/iso9796/iso9796.h
@@ -34,7 +34,7 @@ class ISO_9796_DS2 final : public EMSA
ISO_9796_DS2(HashFunction* hash, bool implicit, size_t salt_size) : m_hash(hash), m_implicit(implicit),
m_SALT_SIZE(salt_size) {}
- EMSA* clone() override;
+ std::unique_ptr<EMSA> new_object() override;
std::string name() const override;
private:
@@ -69,7 +69,7 @@ class ISO_9796_DS3 final : public EMSA
ISO_9796_DS3(HashFunction* hash, bool implicit = false) : m_hash(hash), m_implicit(implicit)
{}
- EMSA* clone() override;
+ std::unique_ptr<EMSA> new_object() override;
std::string name() const override;
private:
diff --git a/src/lib/prov/commoncrypto/commoncrypto_block.cpp b/src/lib/prov/commoncrypto/commoncrypto_block.cpp
index 053b195f7..55ddd276b 100644
--- a/src/lib/prov/commoncrypto/commoncrypto_block.cpp
+++ b/src/lib/prov/commoncrypto/commoncrypto_block.cpp
@@ -153,7 +153,7 @@ make_commoncrypto_block_cipher(const std::string& name)
try
{
CommonCryptor_Opts opts = commoncrypto_opts_from_algo_name(name);
- return std::unique_ptr<BlockCipher>(new CommonCrypto_BlockCipher(name, opts));
+ return std::make_unique<CommonCrypto_BlockCipher>(name, opts);
}
catch(CommonCrypto_Error& e)
{
diff --git a/src/lib/prov/tpm/tpm.cpp b/src/lib/prov/tpm/tpm.cpp
index d131c1a92..b98dee56d 100644
--- a/src/lib/prov/tpm/tpm.cpp
+++ b/src/lib/prov/tpm/tpm.cpp
@@ -375,7 +375,7 @@ std::vector<uint8_t> TPM_PrivateKey::export_blob() const
std::unique_ptr<Public_Key> TPM_PrivateKey::public_key() const
{
- return std::unique_ptr<Public_Key>(new RSA_PublicKey(get_n(), get_e()));
+ return std::make_unique<RSA_PublicKey>(get_n(), get_e());
}
bool TPM_PrivateKey::check_key(RandomNumberGenerator&, bool) const
@@ -454,7 +454,7 @@ TPM_PrivateKey::create_signature_op(RandomNumberGenerator& /*rng*/,
const std::string& params,
const std::string& /*provider*/) const
{
- return std::unique_ptr<PK_Ops::Signature>(new TPM_Signing_Operation(*this, params));
+ return std::make_unique<TPM_Signing_Operation>(*this, params);
}
}
diff --git a/src/lib/pubkey/pk_ops.cpp b/src/lib/pubkey/pk_ops.cpp
index 025836878..59e553530 100644
--- a/src/lib/pubkey/pk_ops.cpp
+++ b/src/lib/pubkey/pk_ops.cpp
@@ -11,11 +11,9 @@
namespace Botan {
-PK_Ops::Encryption_with_EME::Encryption_with_EME(const std::string& eme)
+PK_Ops::Encryption_with_EME::Encryption_with_EME(const std::string& eme) :
+ m_eme(EME::create(eme))
{
- m_eme.reset(get_eme(eme));
- if(!m_eme.get())
- throw Algorithm_Not_Found(eme);
}
size_t PK_Ops::Encryption_with_EME::max_input_bits() const
@@ -31,11 +29,9 @@ secure_vector<uint8_t> PK_Ops::Encryption_with_EME::encrypt(const uint8_t msg[],
return raw_encrypt(encoded.data(), encoded.size(), rng);
}
-PK_Ops::Decryption_with_EME::Decryption_with_EME(const std::string& eme)
+PK_Ops::Decryption_with_EME::Decryption_with_EME(const std::string& eme) :
+ m_eme(EME::create(eme))
{
- m_eme.reset(get_eme(eme));
- if(!m_eme.get())
- throw Algorithm_Not_Found(eme);
}
secure_vector<uint8_t>
@@ -65,12 +61,10 @@ secure_vector<uint8_t> PK_Ops::Key_Agreement_with_KDF::agree(size_t key_len,
PK_Ops::Signature_with_EMSA::Signature_with_EMSA(const std::string& emsa) :
Signature(),
- m_emsa(get_emsa(emsa)),
+ m_emsa(EMSA::create_or_throw(emsa)),
m_hash(hash_for_emsa(emsa)),
m_prefix_used(false)
{
- if(!m_emsa)
- throw Algorithm_Not_Found(emsa);
}
void PK_Ops::Signature_with_EMSA::update(const uint8_t msg[], size_t msg_len)
@@ -94,12 +88,10 @@ secure_vector<uint8_t> PK_Ops::Signature_with_EMSA::sign(RandomNumberGenerator&
PK_Ops::Verification_with_EMSA::Verification_with_EMSA(const std::string& emsa) :
Verification(),
- m_emsa(get_emsa(emsa)),
+ m_emsa(EMSA::create_or_throw(emsa)),
m_hash(hash_for_emsa(emsa)),
m_prefix_used(false)
{
- if(!m_emsa)
- throw Algorithm_Not_Found(emsa);
}
void PK_Ops::Verification_with_EMSA::update(const uint8_t msg[], size_t msg_len)
diff --git a/src/lib/pubkey/pk_ops_impl.h b/src/lib/pubkey/pk_ops_impl.h
index 65604e598..fffcc87f8 100644
--- a/src/lib/pubkey/pk_ops_impl.h
+++ b/src/lib/pubkey/pk_ops_impl.h
@@ -116,7 +116,7 @@ class Verification_with_EMSA : public Verification
throw Invalid_State("Message recovery not supported");
}
- std::unique_ptr<EMSA> clone_emsa() const { return std::unique_ptr<EMSA>(m_emsa->clone()); }
+ std::unique_ptr<EMSA> clone_emsa() const { return m_emsa->new_object(); }
private:
std::unique_ptr<EMSA> m_emsa;
@@ -148,7 +148,7 @@ class Signature_with_EMSA : public Signature
*/
virtual secure_vector<uint8_t> message_prefix() const { throw Invalid_State("No prefix"); }
- std::unique_ptr<EMSA> clone_emsa() const { return std::unique_ptr<EMSA>(m_emsa->clone()); }
+ std::unique_ptr<EMSA> clone_emsa() const { return m_emsa->new_object(); }
private:
diff --git a/src/lib/tls/msg_client_hello.cpp b/src/lib/tls/msg_client_hello.cpp
index 23869e1f7..f04b80989 100644
--- a/src/lib/tls/msg_client_hello.cpp
+++ b/src/lib/tls/msg_client_hello.cpp
@@ -35,7 +35,7 @@ std::vector<uint8_t> make_hello_random(RandomNumberGenerator& rng,
std::vector<uint8_t> buf(32);
rng.randomize(buf.data(), buf.size());
- std::unique_ptr<HashFunction> sha256 = HashFunction::create_or_throw("SHA-256");
+ auto sha256 = HashFunction::create_or_throw("SHA-256");
sha256->update(buf);
sha256->final(buf);
@@ -123,7 +123,7 @@ Client_Hello::Client_Hello(Handshake_IO& io,
if(m_version.is_datagram_protocol())
m_extensions.add(new SRTP_Protection_Profiles(policy.srtp_profiles()));
- std::unique_ptr<Supported_Groups> supported_groups(new Supported_Groups(policy.key_exchange_groups()));
+ auto supported_groups = std::make_unique<Supported_Groups>(policy.key_exchange_groups());
if(supported_groups->ec_groups().size() > 0)
{
@@ -175,7 +175,7 @@ Client_Hello::Client_Hello(Handshake_IO& io,
if(policy.support_cert_status_message())
m_extensions.add(new Certificate_Status_Request({}, {}));
- std::unique_ptr<Supported_Groups> supported_groups(new Supported_Groups(policy.key_exchange_groups()));
+ auto supported_groups = std::make_unique<Supported_Groups>(policy.key_exchange_groups());
if(supported_groups->ec_groups().size() > 0)
{
diff --git a/src/lib/tls/msg_server_kex.cpp b/src/lib/tls/msg_server_kex.cpp
index 7a2054acb..54f341e5b 100644
--- a/src/lib/tls/msg_server_kex.cpp
+++ b/src/lib/tls/msg_server_kex.cpp
@@ -78,7 +78,7 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
BOTAN_ASSERT(group_param_is_dh(shared_group), "DH groups for the DH ciphersuites god");
const std::string group_name = state.callbacks().tls_decode_group_param(shared_group);
- std::unique_ptr<DH_PrivateKey> dh(new DH_PrivateKey(rng, DL_Group(group_name)));
+ auto dh = std::make_unique<DH_PrivateKey>(rng, DL_Group(group_name));
append_tls_length_value(m_params, BigInt::encode(dh->get_domain().get_p()), 2);
append_tls_length_value(m_params, BigInt::encode(dh->get_domain().get_g()), 2);
@@ -102,7 +102,7 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
if(shared_group == Group_Params::X25519)
{
#if defined(BOTAN_HAS_CURVE_25519)
- std::unique_ptr<Curve25519_PrivateKey> x25519(new Curve25519_PrivateKey(rng));
+ auto x25519 = std::make_unique<X25519_PrivateKey>(rng);
ecdh_public_val = x25519->public_value();
m_kex_key.reset(x25519.release());
#else
@@ -116,7 +116,7 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io,
const std::string curve_name = state.callbacks().tls_decode_group_param(curve);
EC_Group ec_group(curve_name);
- std::unique_ptr<ECDH_PrivateKey> ecdh(new ECDH_PrivateKey(rng, ec_group));
+ auto ecdh = std::make_unique<ECDH_PrivateKey>(rng, ec_group);
// follow client's preference for point compression
ecdh_public_val = ecdh->public_value(
diff --git a/src/lib/tls/tls_client.cpp b/src/lib/tls/tls_client.cpp
index 59a092867..43b7278cb 100644
--- a/src/lib/tls/tls_client.cpp
+++ b/src/lib/tls/tls_client.cpp
@@ -120,7 +120,7 @@ void Client::send_client_hello(Handshake_State& state_base,
if(!force_full_renegotiation && !m_info.empty())
{
- std::unique_ptr<Session> session_info(new Session);;
+ auto session_info = std::make_unique<Session>();
if(session_manager().load_from_server_info(m_info, *session_info))
{
/*
diff --git a/src/lib/utils/os_utils.cpp b/src/lib/utils/os_utils.cpp
index 8fd3cd4f4..e278a6d07 100644
--- a/src/lib/utils/os_utils.cpp
+++ b/src/lib/utils/os_utils.cpp
@@ -754,7 +754,7 @@ std::unique_ptr<OS::Echo_Suppression> OS::suppress_echo_on_terminal()
struct termios m_old_termios;
};
- return std::unique_ptr<Echo_Suppression>(new POSIX_Echo_Suppression);
+ return std::make_unique<POSIX_Echo_Suppression>();
#elif defined(BOTAN_TARGET_OS_HAS_WIN32)
@@ -798,12 +798,12 @@ std::unique_ptr<OS::Echo_Suppression> OS::suppress_echo_on_terminal()
DWORD m_console_state;
};
- return std::unique_ptr<Echo_Suppression>(new Win32_Echo_Suppression);
+ return std::make_unique<Win32_Echo_Suppression>();
#else
// Not supported on this platform, return null
- return std::unique_ptr<Echo_Suppression>();
+ return nullptr;
#endif
}
diff --git a/src/lib/x509/crl_ent.cpp b/src/lib/x509/crl_ent.cpp
index 138590f59..affae3184 100644
--- a/src/lib/x509/crl_ent.cpp
+++ b/src/lib/x509/crl_ent.cpp
@@ -27,7 +27,7 @@ struct CRL_Entry_Data
*/
CRL_Entry::CRL_Entry(const X509_Certificate& cert, CRL_Code why)
{
- m_data.reset(new CRL_Entry_Data);
+ m_data = std::make_shared<CRL_Entry_Data>();
m_data->m_serial = cert.serial_number();
m_data->m_time = X509_Time(std::chrono::system_clock::now());
m_data->m_reason = why;
@@ -81,7 +81,7 @@ void CRL_Entry::decode_from(BER_Decoder& source)
{
BigInt serial_number_bn;
- std::unique_ptr<CRL_Entry_Data> data(new CRL_Entry_Data);
+ auto data = std::make_unique<CRL_Entry_Data>();
BER_Decoder entry = source.start_sequence();
@@ -103,7 +103,7 @@ void CRL_Entry::decode_from(BER_Decoder& source)
entry.end_cons();
- m_data.reset(data.release());
+ m_data = std::move(data);
}
const CRL_Entry_Data& CRL_Entry::data() const
diff --git a/src/lib/x509/pkcs10.cpp b/src/lib/x509/pkcs10.cpp
index 8b24d6493..936653e33 100644
--- a/src/lib/x509/pkcs10.cpp
+++ b/src/lib/x509/pkcs10.cpp
@@ -105,7 +105,7 @@ namespace {
std::unique_ptr<PKCS10_Data> decode_pkcs10(const std::vector<uint8_t>& body)
{
- std::unique_ptr<PKCS10_Data> data(new PKCS10_Data);
+ auto data = std::make_unique<PKCS10_Data>();
BER_Decoder cert_req_info(body);
diff --git a/src/lib/x509/pkix_types.h b/src/lib/x509/pkix_types.h
index 609c6c796..9d4183caa 100644
--- a/src/lib/x509/pkix_types.h
+++ b/src/lib/x509/pkix_types.h
@@ -523,7 +523,7 @@ class BOTAN_PUBLIC_API(2,0) Extensions final : public ASN1_Object
// Unknown_Extension oid_name is empty
if(extn_info->second.obj().oid_name() == "")
{
- std::unique_ptr<T> ext(new T);
+ auto ext = std::make_unique<T>();
ext->decode_inner(extn_info->second.bits());
return ext;
}
diff --git a/src/lib/x509/x509_crl.cpp b/src/lib/x509/x509_crl.cpp
index a8f3b0a2c..3dcdeb108 100644
--- a/src/lib/x509/x509_crl.cpp
+++ b/src/lib/x509/x509_crl.cpp
@@ -63,7 +63,7 @@ X509_CRL::X509_CRL(const X509_DN& issuer,
const std::vector<CRL_Entry>& revoked) :
X509_Object()
{
- m_data.reset(new CRL_Data);
+ m_data = std::make_shared<CRL_Data>();
m_data->m_issuer = issuer;
m_data->m_this_update = this_update;
m_data->m_next_update = next_update;
@@ -118,7 +118,7 @@ namespace {
std::unique_ptr<CRL_Data> decode_crl_body(const std::vector<uint8_t>& body,
const AlgorithmIdentifier& sig_algo)
{
- std::unique_ptr<CRL_Data> data(new CRL_Data);
+ auto data = std::make_unique<CRL_Data>();
BER_Decoder tbs_crl(body);
diff --git a/src/lib/x509/x509_obj.cpp b/src/lib/x509/x509_obj.cpp
index 43d37da44..1ac7f8279 100644
--- a/src/lib/x509/x509_obj.cpp
+++ b/src/lib/x509/x509_obj.cpp
@@ -374,10 +374,10 @@ std::string choose_sig_algo(AlgorithmIdentifier& sig_algo,
std::unique_ptr<EMSA> emsa;
try
{
- emsa.reset(get_emsa(padding));
+ emsa = EMSA::create_or_throw(padding);
}
/*
- * get_emsa will throw if opts contains {"padding",<valid_padding>} but
+ * EMSA::create will throw if opts contains {"padding",<valid_padding>} but
* <valid_padding> does not specify a hash function.
* Omitting it is valid since it needs to be identical to hash_fn.
* If it still throws, something happened that we cannot repair here,
@@ -385,7 +385,7 @@ std::string choose_sig_algo(AlgorithmIdentifier& sig_algo,
*/
catch(...)
{
- emsa.reset(get_emsa(padding + "(" + hash_fn + ")"));
+ emsa = EMSA::create(padding + "(" + hash_fn + ")");
}
if(!emsa)
@@ -415,10 +415,8 @@ std::unique_ptr<PK_Signer> X509_Object::choose_sig_format(AlgorithmIdentifier& s
const std::string& padding_algo)
{
const Signature_Format format = key.default_x509_signature_format();
-
const std::string emsa = choose_sig_algo(sig_algo, key, hash_fn, padding_algo);
-
- return std::unique_ptr<PK_Signer>(new PK_Signer(key, rng, emsa, format));
+ return std::make_unique<PK_Signer>(key, rng, emsa, format);
}
}
diff --git a/src/lib/x509/x509cert.cpp b/src/lib/x509/x509cert.cpp
index 336790336..c742a688f 100644
--- a/src/lib/x509/x509cert.cpp
+++ b/src/lib/x509/x509cert.cpp
@@ -107,7 +107,7 @@ namespace {
std::unique_ptr<X509_Certificate_Data> parse_x509_cert_body(const X509_Object& obj)
{
- std::unique_ptr<X509_Certificate_Data> data(new X509_Certificate_Data);
+ auto data = std::make_unique<X509_Certificate_Data>();
BigInt serial_bn;
BER_Object public_key;
@@ -366,10 +366,7 @@ std::unique_ptr<X509_Certificate_Data> parse_x509_cert_body(const X509_Object& o
void X509_Certificate::force_decode()
{
m_data.reset();
-
- std::unique_ptr<X509_Certificate_Data> data = parse_x509_cert_body(*this);
-
- m_data.reset(data.release());
+ m_data = parse_x509_cert_body(*this);
}
const X509_Certificate_Data& X509_Certificate::data() const