Crypto++ 8.6
Free C++ class library of cryptographic schemes
|
Base class for feedback based stream ciphers with SymmetricCipher interface. More...
#include <strciphr.h>
Public Types | |
typedef BASE::PolicyInterface | PolicyInterface |
Public Member Functions | |
void | ProcessData (byte *outString, const byte *inString, size_t length) |
Apply keystream to data. | |
void | Resynchronize (const byte *iv, int length=-1) |
Resynchronize the cipher. | |
unsigned int | OptimalBlockSize () const |
Provides number of ideal bytes to process. | |
unsigned int | GetOptimalNextBlockSize () const |
Provides number of ideal bytes to process. | |
unsigned int | OptimalDataAlignment () const |
Provides number of ideal data alignment. | |
bool | IsRandomAccess () const |
Flag indicating random access. | |
bool | IsSelfInverting () const |
Determines if the cipher is self inverting. | |
std::string | AlgorithmProvider () const |
Retrieve the provider of this algorithm. | |
Base class for feedback based stream ciphers with SymmetricCipher interface.
BASE | AbstractPolicyHolder base class |
Definition at line 562 of file strciphr.h.
BASE::PolicyInterface CFB_CipherTemplate< BASE >::PolicyInterface |
Definition at line 630 of file strciphr.h.
|
inlinevirtual |
Definition at line 565 of file strciphr.h.
|
inline |
Definition at line 566 of file strciphr.h.
void CFB_CipherTemplate< BASE >::ProcessData | ( | byte * | outString, |
const byte * | inString, | ||
size_t | length ) |
Apply keystream to data.
outString | a buffer to write the transformed data |
inString | a buffer to read the data |
length | the size of the buffers, in bytes |
This is the primary method to operate a stream cipher. For example:
size_t size = 30; byte plain[size] = "Do or do not; there is no try"; byte cipher[size]; ... ChaCha20 chacha(key, keySize); chacha.ProcessData(cipher, plain, size);
void CFB_CipherTemplate< BASE >::Resynchronize | ( | const byte * | iv, |
int | length = -1 ) |
Resynchronize the cipher.
iv | a byte array used to resynchronize the cipher |
length | the size of the IV array |
|
inline |
Provides number of ideal bytes to process.
Internally, the default implementation returns GetBytesPerIteration()
Definition at line 592 of file strciphr.h.
|
inline |
Provides number of ideal bytes to process.
Internally, the default implementation returns remaining unprocessed bytes
Definition at line 598 of file strciphr.h.
|
inline |
Provides number of ideal data alignment.
Definition at line 603 of file strciphr.h.
|
inline |
Flag indicating random access.
Definition at line 608 of file strciphr.h.
|
inline |
Determines if the cipher is self inverting.
Definition at line 612 of file strciphr.h.
|
inline |
Retrieve the provider of this algorithm.
The algorithm provider can be a name like "C++", "SSE", "NEON", "AESNI", "ARMv8" and "Power8". C++ is standard C++ code. Other labels, like SSE, usually indicate a specialized implementation using instructions from a higher instruction set architecture (ISA). Future labels may include external hardware like a hardware security module (HSM).
Generally speaking Wei Dai's original IA-32 ASM code falls under "SSE2". Labels like "SSSE3" and "SSE4.1" follow after Wei's code and use intrinsics instead of ASM.
Algorithms which combine different instructions or ISAs provide the dominant one. For example on x86 AES/GCM
returns "AESNI" rather than "CLMUL" or "AES+SSE4.1" or "AES+CLMUL" or "AES+SSE4.1+CLMUL".
Definition at line 628 of file strciphr.h.