diff options
author | lloyd <[email protected]> | 2008-11-28 16:22:51 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2008-11-28 16:22:51 +0000 |
commit | 3bbd21e87931a855c39a1ae3a767e6d09f98f5b4 (patch) | |
tree | 7587237eaca56fddba86ded284b8c062bd48b928 /src/pk_pad/emsa3/emsa3.cpp | |
parent | ec87551bfcc83ddcd4f4052db4f330542c8c23ac (diff) |
Add a variant of EMSA3 called EMSA3_Raw which does not hash the data or
add a digest identifier. This was a feature requested on the mailing list.
Apparently this scheme is called CKM_RSA_PKCS in PKCS #11, and is supported
by a number of libraries, including QCA.
Diffstat (limited to 'src/pk_pad/emsa3/emsa3.cpp')
-rw-r--r-- | src/pk_pad/emsa3/emsa3.cpp | 123 |
1 files changed, 88 insertions, 35 deletions
diff --git a/src/pk_pad/emsa3/emsa3.cpp b/src/pk_pad/emsa3/emsa3.cpp index 060dd40d8..fc772e796 100644 --- a/src/pk_pad/emsa3/emsa3.cpp +++ b/src/pk_pad/emsa3/emsa3.cpp @@ -1,7 +1,7 @@ -/************************************************* -* EMSA3 Source File * -* (C) 1999-2007 Jack Lloyd * -*************************************************/ +/* +* EMSA3 and EMSA3_Raw +* (C) 1999-2008 Jack Lloyd +*/ #include <botan/emsa3.h> #include <botan/hash_id.h> @@ -10,73 +10,75 @@ namespace Botan { namespace { -/************************************************* -* EMSA3 Encode Operation * -*************************************************/ +/** +* EMSA3 Encode Operation +*/ SecureVector<byte> emsa3_encoding(const MemoryRegion<byte>& msg, u32bit output_bits, - const MemoryRegion<byte>& hash_id, - u32bit hash_size) + const byte hash_id[], + u32bit hash_id_length) { - if(msg.size() != hash_size) - throw Encoding_Error("EMSA3::encoding_of: Bad input length"); - u32bit output_length = output_bits / 8; - if(output_length < hash_id.size() + hash_size + 10) + if(output_length < hash_id_length + msg.size() + 10) throw Encoding_Error("EMSA3::pad: Output length is too small"); SecureVector<byte> T(output_length); - const u32bit P_LENGTH = output_length - hash_size - hash_id.size() - 2; + const u32bit P_LENGTH = output_length - msg.size() - hash_id_length - 2; T[0] = 0x01; set_mem(T+1, P_LENGTH, 0xFF); T[P_LENGTH+1] = 0x00; - T.copy(P_LENGTH+2, hash_id, hash_id.size()); - T.copy(output_length-hash_size, msg, msg.size()); + T.copy(P_LENGTH+2, hash_id, hash_id_length); + T.copy(output_length-msg.size(), msg, msg.size()); return T; } } -/************************************************* -* EMSA3 Update Operation * -*************************************************/ +/** +* EMSA3 Update Operation +*/ void EMSA3::update(const byte input[], u32bit length) { hash->update(input, length); } -/************************************************* -* Return the raw (unencoded) data * -*************************************************/ +/** +* Return the raw (unencoded) data +*/ SecureVector<byte> EMSA3::raw_data() { return hash->final(); } -/************************************************* -* EMSA3 Encode Operation * -*************************************************/ +/** +* EMSA3 Encode Operation +*/ SecureVector<byte> EMSA3::encoding_of(const MemoryRegion<byte>& msg, u32bit output_bits, RandomNumberGenerator&) { - return emsa3_encoding(msg, output_bits, hash_id, - hash->OUTPUT_LENGTH); + if(msg.size() != hash->OUTPUT_LENGTH) + throw Encoding_Error("EMSA3::encoding_of: Bad input length"); + + return emsa3_encoding(msg, output_bits, + hash_id, hash_id.size()); } -/************************************************* -* Default signature decoding * -*************************************************/ +/** +* Default signature decoding +*/ bool EMSA3::verify(const MemoryRegion<byte>& coded, const MemoryRegion<byte>& raw, u32bit key_bits) throw() { + if(raw.size() != hash->OUTPUT_LENGTH) + return false; + try { return (coded == emsa3_encoding(raw, key_bits, - hash_id, - hash->OUTPUT_LENGTH)); + hash_id, hash_id.size())); } catch(...) { @@ -84,12 +86,63 @@ bool EMSA3::verify(const MemoryRegion<byte>& coded, } } -/************************************************* -* EMSA3 Constructor * -*************************************************/ +/** +* EMSA3 Constructor +*/ EMSA3::EMSA3(HashFunction* hash_in) : hash(hash_in) { hash_id = pkcs_hash_id(hash->name()); } +/** +* EMSA3 Destructor +*/ +EMSA3::~EMSA3() + { + delete hash; + } + +/** +* EMSA3_Raw Update Operation +*/ +void EMSA3_Raw::update(const byte input[], u32bit length) + { + message.append(input, length); + } + +/** +* Return the raw (unencoded) data +*/ +SecureVector<byte> EMSA3_Raw::raw_data() + { + return message; + } + +/** +* EMSA3_Raw Encode Operation +*/ +SecureVector<byte> EMSA3_Raw::encoding_of(const MemoryRegion<byte>& msg, + u32bit output_bits, + RandomNumberGenerator&) + { + return emsa3_encoding(msg, output_bits, 0, 0); + } + +/** +* Default signature decoding +*/ +bool EMSA3_Raw::verify(const MemoryRegion<byte>& coded, + const MemoryRegion<byte>& raw, + u32bit key_bits) throw() + { + try + { + return (coded == emsa3_encoding(raw, key_bits, 0, 0)); + } + catch(...) + { + return false; + } + } + } |