Crypto++ 8.9
Free C++ class library of cryptographic schemes
|
Base class for feedback based stream ciphers with SymmetricCipher interface. More...
#include <strciphr.h>
Public Types | |
typedef BASE::PolicyInterface | PolicyInterface |
Public Member Functions | |
void | ProcessData (byte *outString, const byte *inString, size_t length) |
Apply keystream to data. | |
void | Resynchronize (const byte *iv, int length=-1) |
Resynchronize the cipher. | |
unsigned int | OptimalBlockSize () const |
Provides number of ideal bytes to process. | |
unsigned int | GetOptimalNextBlockSize () const |
Provides number of ideal bytes to process. | |
unsigned int | OptimalDataAlignment () const |
Provides number of ideal data alignment. | |
bool | IsRandomAccess () const |
Flag indicating random access. | |
bool | IsSelfInverting () const |
Determines if the cipher is self inverting. | |
std::string | AlgorithmProvider () const |
Retrieve the provider of this algorithm. | |
Base class for feedback based stream ciphers with SymmetricCipher interface.
BASE | AbstractPolicyHolder base class |
Definition at line 567 of file strciphr.h.
typedef BASE::PolicyInterface CFB_CipherTemplate< BASE >::PolicyInterface |
Definition at line 641 of file strciphr.h.
|
inlinevirtual |
Definition at line 570 of file strciphr.h.
|
inline |
Definition at line 571 of file strciphr.h.
void CFB_CipherTemplate< BASE >::ProcessData | ( | byte * | outString, |
const byte * | inString, | ||
size_t | length ) |
Apply keystream to data.
outString | a buffer to write the transformed data |
inString | a buffer to read the data |
length | the size of the buffers, in bytes |
This is the primary method to operate a stream cipher. For example:
size_t size = 30; byte plain[size] = "Do or do not; there is no try"; byte cipher[size]; ... ChaCha20 chacha(key, keySize); chacha.ProcessData(cipher, plain, size);
You should use distinct buffers for inString and outString. If the buffers are the same, then the data will be copied to an internal buffer to avoid GCC alias violations. The internal copy will impact performance.
void CFB_CipherTemplate< BASE >::Resynchronize | ( | const byte * | iv, |
int | length = -1 ) |
Resynchronize the cipher.
iv | a byte array used to resynchronize the cipher |
length | the size of the IV array |
|
inline |
Provides number of ideal bytes to process.
Internally, the default implementation returns GetBytesPerIteration()
Definition at line 603 of file strciphr.h.
|
inline |
Provides number of ideal bytes to process.
Internally, the default implementation returns remaining unprocessed bytes
Definition at line 609 of file strciphr.h.
|
inline |
Provides number of ideal data alignment.
Definition at line 614 of file strciphr.h.
|
inline |
Flag indicating random access.
Definition at line 619 of file strciphr.h.
|
inline |
Determines if the cipher is self inverting.
Definition at line 623 of file strciphr.h.
|
inline |
Retrieve the provider of this algorithm.
The algorithm provider can be a name like "C++", "SSE", "NEON", "AESNI", "ARMv8" and "Power8". C++ is standard C++ code. Other labels, like SSE, usually indicate a specialized implementation using instructions from a higher instruction set architecture (ISA). Future labels may include external hardware like a hardware security module (HSM).
Generally speaking Wei Dai's original IA-32 ASM code falls under "SSE2". Labels like "SSSE3" and "SSE4.1" follow after Wei's code and use intrinsics instead of ASM.
Algorithms which combine different instructions or ISAs provide the dominant one. For example on x86 AES/GCM
returns "AESNI" rather than "CLMUL" or "AES+SSE4.1" or "AES+CLMUL" or "AES+SSE4.1+CLMUL".
Definition at line 639 of file strciphr.h.