blob: 74b9db9e78177af0b0fe6fbc0cf79e59aa8830d7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
|
/*
* Stream Ciphers
* (C) 2015,2016 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include <botan/stream_cipher.h>
#include <botan/scan_name.h>
#if defined(BOTAN_HAS_CHACHA)
#include <botan/chacha.h>
#endif
#if defined(BOTAN_HAS_SALSA20)
#include <botan/salsa20.h>
#endif
#if defined(BOTAN_HAS_SHAKE_CIPHER)
#include <botan/shake_cipher.h>
#endif
#if defined(BOTAN_HAS_CTR_BE)
#include <botan/ctr.h>
#endif
#if defined(BOTAN_HAS_OFB)
#include <botan/ofb.h>
#endif
#if defined(BOTAN_HAS_RC4)
#include <botan/rc4.h>
#endif
#if defined(BOTAN_HAS_OPENSSL)
#include <botan/internal/openssl.h>
#endif
namespace Botan {
std::unique_ptr<StreamCipher> StreamCipher::create(const std::string& algo_spec,
const std::string& provider)
{
const SCAN_Name req(algo_spec);
#if defined(BOTAN_HAS_CTR_BE)
if(req.algo_name() == "CTR-BE" && req.arg_count() == 1)
{
if(provider.empty() || provider == "base")
{
if(auto c = BlockCipher::create(req.arg(0)))
return std::unique_ptr<StreamCipher>(new CTR_BE(c.release()));
}
}
#endif
#if defined(BOTAN_HAS_CHACHA)
if(req.algo_name() == "ChaCha")
{
if(provider.empty() || provider == "base")
return std::unique_ptr<StreamCipher>(new ChaCha(req.arg_as_integer(0, 20)));
}
#endif
#if defined(BOTAN_HAS_SALSA20)
if(req.algo_name() == "Salsa20")
{
if(provider.empty() || provider == "base")
return std::unique_ptr<StreamCipher>(new Salsa20);
}
#endif
#if defined(BOTAN_HAS_SHAKE_CIPHER)
if(req.algo_name() == "SHAKE-128")
{
if(provider.empty() || provider == "base")
return std::unique_ptr<StreamCipher>(new SHAKE_128);
}
#endif
#if defined(BOTAN_HAS_OFB)
if(req.algo_name() == "OFB" && req.arg_count() == 1)
{
if(provider.empty() || provider == "base")
{
if(auto c = BlockCipher::create(req.arg(0)))
return std::unique_ptr<StreamCipher>(new OFB(c.release()));
}
}
#endif
#if defined(BOTAN_HAS_RC4)
if(req.algo_name() == "RC4")
{
const size_t skip = req.arg_as_integer(0, 0);
#if defined(BOTAN_HAS_OPENSSL)
if(provider.empty() || provider == "openssl")
{
return std::unique_ptr<StreamCipher>(make_openssl_rc4(skip));
}
#endif
if(provider.empty() || provider == "base")
{
return std::unique_ptr<StreamCipher>(new RC4(skip));
}
}
#endif
return nullptr;
}
//static
std::unique_ptr<StreamCipher>
StreamCipher::create_or_throw(const std::string& algo,
const std::string& provider)
{
if(auto sc = StreamCipher::create(algo, provider))
{
return sc;
}
throw Lookup_Error("Stream cipher", algo, provider);
}
std::vector<std::string> StreamCipher::providers(const std::string& algo_spec)
{
return probe_providers_of<StreamCipher>(algo_spec, {"base", "openssl"});
}
}
|