1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
|
/*
* Hash Function Identification
* (C) 1999-2008 Jack Lloyd
*
* Distributed under the terms of the Botan license
*/
#include <botan/hash_id.h>
#include <botan/exceptn.h>
namespace Botan {
namespace {
const byte MD2_PKCS_ID[] = {
0x30, 0x20, 0x30, 0x0C, 0x06, 0x08, 0x2A, 0x86, 0x48, 0x86,
0xF7, 0x0D, 0x02, 0x02, 0x05, 0x00, 0x04, 0x10 };
const byte MD5_PKCS_ID[] = {
0x30, 0x20, 0x30, 0x0C, 0x06, 0x08, 0x2A, 0x86, 0x48, 0x86,
0xF7, 0x0D, 0x02, 0x05, 0x05, 0x00, 0x04, 0x10 };
const byte RIPEMD_128_PKCS_ID[] = {
0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x24, 0x03, 0x02,
0x02, 0x05, 0x00, 0x04, 0x14 };
const byte RIPEMD_160_PKCS_ID[] = {
0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x24, 0x03, 0x02,
0x01, 0x05, 0x00, 0x04, 0x14 };
const byte SHA_160_PKCS_ID[] = {
0x30, 0x21, 0x30, 0x09, 0x06, 0x05, 0x2B, 0x0E, 0x03, 0x02,
0x1A, 0x05, 0x00, 0x04, 0x14 };
const byte SHA_224_PKCS_ID[] = {
0x30, 0x2D, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01,
0x65, 0x03, 0x04, 0x02, 0x04, 0x05, 0x00, 0x04, 0x1C };
const byte SHA_256_PKCS_ID[] = {
0x30, 0x31, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01,
0x65, 0x03, 0x04, 0x02, 0x01, 0x05, 0x00, 0x04, 0x20 };
const byte SHA_384_PKCS_ID[] = {
0x30, 0x41, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01,
0x65, 0x03, 0x04, 0x02, 0x02, 0x05, 0x00, 0x04, 0x30 };
const byte SHA_512_PKCS_ID[] = {
0x30, 0x51, 0x30, 0x0D, 0x06, 0x09, 0x60, 0x86, 0x48, 0x01,
0x65, 0x03, 0x04, 0x02, 0x03, 0x05, 0x00, 0x04, 0x40 };
const byte TIGER_PKCS_ID[] = {
0x30, 0x29, 0x30, 0x0D, 0x06, 0x09, 0x2B, 0x06, 0x01, 0x04,
0x01, 0xDA, 0x47, 0x0C, 0x02, 0x05, 0x00, 0x04, 0x18 };
}
/**
* @return HashID as specified by PKCS
* For details see RFC 3447 section 9.2
* http://tools.ietf.org/html/rfc3447#section-9.2
*/
MemoryVector<byte> pkcs_hash_id(const std::string& name)
{
MemoryVector<byte> out;
// Special case for SSL/TLS RSA signatures
if(name == "Parallel(MD5,SHA-160)")
return out;
if(name == "MD2")
out.set(MD2_PKCS_ID, sizeof(MD2_PKCS_ID));
else if(name == "MD5")
out.set(MD5_PKCS_ID, sizeof(MD5_PKCS_ID));
else if(name == "RIPEMD-128")
out.set(RIPEMD_128_PKCS_ID, sizeof(RIPEMD_128_PKCS_ID));
else if(name == "RIPEMD-160")
out.set(RIPEMD_160_PKCS_ID, sizeof(RIPEMD_160_PKCS_ID));
else if(name == "SHA-160")
out.set(SHA_160_PKCS_ID, sizeof(SHA_160_PKCS_ID));
else if(name == "SHA-224")
out.set(SHA_224_PKCS_ID, sizeof(SHA_224_PKCS_ID));
else if(name == "SHA-256")
out.set(SHA_256_PKCS_ID, sizeof(SHA_256_PKCS_ID));
else if(name == "SHA-384")
out.set(SHA_384_PKCS_ID, sizeof(SHA_384_PKCS_ID));
else if(name == "SHA-512")
out.set(SHA_512_PKCS_ID, sizeof(SHA_512_PKCS_ID));
else if(name == "Tiger(24,3)")
out.set(TIGER_PKCS_ID, sizeof(TIGER_PKCS_ID));
if(out.size())
return out;
throw Invalid_Argument("No PKCS #1 identifier for " + name);
}
/**
* @return HashID as specified by IEEE 1363/X9.31
*/
byte ieee1363_hash_id(const std::string& name)
{
if(name == "SHA-160") return 0x33;
if(name == "SHA-224") return 0x38;
if(name == "SHA-256") return 0x34;
if(name == "SHA-384") return 0x36;
if(name == "SHA-512") return 0x35;
if(name == "RIPEMD-160") return 0x31;
if(name == "RIPEMD-128") return 0x32;
if(name == "Whirlpool") return 0x37;
return 0;
}
}
|