Security Scol plugin
|
Salsa20 stream cipher operation. More...
#include <salsa.h>
Protected Member Functions | |
void | CipherSetKey (const NameValuePairs ¶ms, const byte *key, size_t length) |
Key the cipher. | |
void | OperateKeystream (KeystreamOperation operation, byte *output, const byte *input, size_t iterationCount) |
Operates the keystream. | |
void | CipherResynchronize (byte *keystreamBuffer, const byte *IV, size_t length) |
Resynchronize the cipher. | |
bool | CipherIsRandomAccess () const |
Flag indicating random access. | |
void | SeekToIteration (lword iterationCount) |
Seeks to a random position in the stream. | |
std::string | AlgorithmProvider () const |
Retrieve the provider of this algorithm. | |
CRYPTOPP_CONSTANT (ROUNDS=20) | |
Protected Attributes | |
FixedSizeAlignedSecBlock< word32, 16 > | m_state |
int | m_rounds |
Additional Inherited Members | |
Public Types inherited from AdditiveCipherConcretePolicy< word32, 16 > | |
typedef word32 | WordType |
Word type for the cipher. | |
Public Member Functions inherited from AdditiveCipherConcretePolicy< word32, 16 > | |
CRYPTOPP_CONSTANT (BYTES_PER_ITERATION=sizeof(WordType) *W) | |
Number of bytes for an iteration. | |
unsigned int | GetAlignment () const |
Provides data alignment requirements. | |
unsigned int | GetBytesPerIteration () const |
Provides number of bytes operated upon during an iteration. | |
unsigned int | GetIterationsToBuffer () const |
Provides buffer size based on iterations. | |
bool | CanOperateKeystream () const |
Flag indicating. | |
Public Member Functions inherited from AdditiveCipherAbstractPolicy | |
virtual unsigned int | GetOptimalBlockSize () const |
Provides number of ideal bytes to process. | |
virtual void | WriteKeystream (byte *keystream, size_t iterationCount) |
Generate the keystream. | |
|
protectedvirtual |
Retrieve the provider of this algorithm.
The algorithm provider can be a name like "C++", "SSE", "NEON", "AESNI", "ARMv8" and "Power8". C++ is standard C++ code. Other labels, like SSE, usually indicate a specialized implementation using instructions from a higher instruction set architecture (ISA). Future labels may include external hardware like a hardware security module (HSM).
Generally speaking Wei Dai's original IA-32 ASM code falls under "SSE2". Labels like "SSSE3" and "SSE4.1" follow after Wei's code and use intrinsics instead of ASM.
Algorithms which combine different instructions or ISAs provide the dominant one. For example on x86 AES/GCM
returns "AESNI" rather than "CLMUL" or "AES+SSE4.1" or "AES+CLMUL" or "AES+SSE4.1+CLMUL".
Reimplemented from AdditiveCipherAbstractPolicy.
|
inlineprotectedvirtual |
Flag indicating random access.
Implements AdditiveCipherAbstractPolicy.
|
protectedvirtual |
Resynchronize the cipher.
keystreamBuffer | the keystream buffer |
iv | a byte array used to resynchronize the cipher |
length | the size of the IV array |
Reimplemented from AdditiveCipherAbstractPolicy.
Reimplemented in XSalsa20_Policy.
|
protectedvirtual |
Key the cipher.
params | set of NameValuePairs use to initialize this object |
key | a byte array used to key the cipher |
length | the size of the key array |
Implements AdditiveCipherAbstractPolicy.
Reimplemented in XSalsa20_Policy.
|
protectedvirtual |
Operates the keystream.
operation | the operation with additional flags |
output | the output buffer |
input | the input buffer |
iterationCount | the number of iterations to perform on the input |
OperateKeystream() will attempt to operate upon GetOptimalBlockSize() buffer, which will be derived from GetBytesPerIteration().
Implements AdditiveCipherConcretePolicy< word32, 16 >.
|
protectedvirtual |
Seeks to a random position in the stream.
Reimplemented from AdditiveCipherAbstractPolicy.
|
protected |