Crypto++
8.0
Free C++ class library of cryptographic schemes
|
Base class for feedback based stream ciphers with SymmetricCipher interface. More...
Public Types | |
typedef BASE::PolicyInterface | PolicyInterface |
Public Member Functions | |
void | ProcessData (byte *outString, const byte *inString, size_t length) |
Apply keystream to data. More... | |
void | Resynchronize (const byte *iv, int length=-1) |
Resynchronize the cipher. More... | |
unsigned int | OptimalBlockSize () const |
Provides number of ideal bytes to process. More... | |
unsigned int | GetOptimalNextBlockSize () const |
Provides number of ideal bytes to process. More... | |
unsigned int | OptimalDataAlignment () const |
Provides number of ideal data alignment. More... | |
bool | IsRandomAccess () const |
Flag indicating random access. More... | |
bool | IsSelfInverting () const |
Determines if the cipher is self inverting. More... | |
std::string | AlgorithmProvider () const |
Retrieve the provider of this algorithm. More... | |
Base class for feedback based stream ciphers with SymmetricCipher interface.
BASE | AbstractPolicyHolder base class |
Definition at line 563 of file strciphr.h.
void CFB_CipherTemplate< BASE >::ProcessData | ( | byte * | outString, |
const byte * | inString, | ||
size_t | length | ||
) |
Apply keystream to data.
outString | a buffer to write the transformed data |
inString | a buffer to read the data |
length | the size fo the buffers, in bytes |
This is the primary method to operate a stream cipher. For example:
size_t size = 30; byte plain[size] = "Do or do not; there is no try"; byte cipher[size]; ... ChaCha20 chacha(key, keySize); chacha.ProcessData(cipher, plain, size);
Definition at line 172 of file strciphr.cpp.
void CFB_CipherTemplate< BASE >::Resynchronize | ( | const byte * | iv, |
int | length = -1 |
||
) |
Resynchronize the cipher.
iv | a byte array used to resynchronize the cipher |
length | the size of the IV array |
Definition at line 164 of file strciphr.cpp.
|
inline |
Provides number of ideal bytes to process.
Internally, the default implementation returns GetBytesPerIteration()
Definition at line 593 of file strciphr.h.
|
inline |
Provides number of ideal bytes to process.
Internally, the default implementation returns remaining unprocessed bytes
Definition at line 599 of file strciphr.h.
|
inline |
Provides number of ideal data alignment.
Definition at line 604 of file strciphr.h.
|
inline |
Flag indicating random access.
Definition at line 609 of file strciphr.h.
|
inline |
Determines if the cipher is self inverting.
Definition at line 613 of file strciphr.h.
|
inline |
Retrieve the provider of this algorithm.
The algorithm provider can be a name like "C++", "SSE", "NEON", "AESNI", "ARMv8" and "Power8". C++ is standard C++ code. Other labels, like SSE, usually indicate a specialized implementation using instructions from a higher instruction set architecture (ISA). Future labels may include external hardware like a hardware security module (HSM).
Generally speaking Wei Dai's original IA-32 ASM code falls under "SSE2". Labels like "SSSE3" and "SSE4.1" follow after Wei's code and use intrinsics instead of ASM.
Algorithms which combine different instructions or ISAs provide the dominant one. For example on x86 AES/GCM
returns "AESNI" rather than "CLMUL" or "AES+SSE4.1" or "AES+CLMUL" or "AES+SSE4.1+CLMUL".
Definition at line 629 of file strciphr.h.