Initial Commit
This commit is contained in:
43
iTechSharp/srcbc/crypto/paddings/BlockCipherPadding.cs
Normal file
43
iTechSharp/srcbc/crypto/paddings/BlockCipherPadding.cs
Normal file
@@ -0,0 +1,43 @@
|
||||
using System;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
/**
|
||||
* Block cipher padders are expected to conform to this interface
|
||||
*/
|
||||
public interface IBlockCipherPadding
|
||||
{
|
||||
/**
|
||||
* Initialise the padder.
|
||||
*
|
||||
* @param param parameters, if any required.
|
||||
*/
|
||||
void Init(SecureRandom random);
|
||||
//throws ArgumentException;
|
||||
|
||||
/**
|
||||
* Return the name of the algorithm the cipher implements.
|
||||
*
|
||||
* @return the name of the algorithm the cipher implements.
|
||||
*/
|
||||
string PaddingName { get; }
|
||||
|
||||
/**
|
||||
* add the pad bytes to the passed in block, returning the
|
||||
* number of bytes added.
|
||||
*/
|
||||
int AddPadding(byte[] input, int inOff);
|
||||
|
||||
/**
|
||||
* return the number of pad bytes present in the block.
|
||||
* @exception InvalidCipherTextException if the padding is badly formed
|
||||
* or invalid.
|
||||
*/
|
||||
int PadCount(byte[] input);
|
||||
//throws InvalidCipherTextException;
|
||||
}
|
||||
|
||||
}
|
76
iTechSharp/srcbc/crypto/paddings/ISO10126d2Padding.cs
Normal file
76
iTechSharp/srcbc/crypto/paddings/ISO10126d2Padding.cs
Normal file
@@ -0,0 +1,76 @@
|
||||
using System;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
|
||||
/**
|
||||
* A padder that adds ISO10126-2 padding to a block.
|
||||
*/
|
||||
public class ISO10126d2Padding: IBlockCipherPadding
|
||||
{
|
||||
private SecureRandom random;
|
||||
|
||||
/**
|
||||
* Initialise the padder.
|
||||
*
|
||||
* @param random a SecureRandom if available.
|
||||
*/
|
||||
public void Init(
|
||||
SecureRandom random)
|
||||
//throws ArgumentException
|
||||
{
|
||||
this.random = (random != null) ? random : new SecureRandom();
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the name of the algorithm the cipher implements.
|
||||
*
|
||||
* @return the name of the algorithm the cipher implements.
|
||||
*/
|
||||
public string PaddingName
|
||||
{
|
||||
get { return "ISO10126-2"; }
|
||||
}
|
||||
|
||||
/**
|
||||
* add the pad bytes to the passed in block, returning the
|
||||
* number of bytes added.
|
||||
*/
|
||||
public int AddPadding(
|
||||
byte[] input,
|
||||
int inOff)
|
||||
{
|
||||
byte code = (byte)(input.Length - inOff);
|
||||
|
||||
while (inOff < (input.Length - 1))
|
||||
{
|
||||
input[inOff] = (byte)random.NextInt();
|
||||
inOff++;
|
||||
}
|
||||
|
||||
input[inOff] = code;
|
||||
|
||||
return code;
|
||||
}
|
||||
|
||||
/**
|
||||
* return the number of pad bytes present in the block.
|
||||
*/
|
||||
public int PadCount(byte[] input)
|
||||
//throws InvalidCipherTextException
|
||||
{
|
||||
int count = input[input.Length - 1] & 0xff;
|
||||
|
||||
if (count > input.Length)
|
||||
{
|
||||
throw new InvalidCipherTextException("pad block corrupted");
|
||||
}
|
||||
|
||||
return count;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
79
iTechSharp/srcbc/crypto/paddings/ISO7816d4Padding.cs
Normal file
79
iTechSharp/srcbc/crypto/paddings/ISO7816d4Padding.cs
Normal file
@@ -0,0 +1,79 @@
|
||||
using System;
|
||||
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
/**
|
||||
* A padder that adds the padding according to the scheme referenced in
|
||||
* ISO 7814-4 - scheme 2 from ISO 9797-1. The first byte is 0x80, rest is 0x00
|
||||
*/
|
||||
public class ISO7816d4Padding
|
||||
: IBlockCipherPadding
|
||||
{
|
||||
/**
|
||||
* Initialise the padder.
|
||||
*
|
||||
* @param random - a SecureRandom if available.
|
||||
*/
|
||||
public void Init(
|
||||
SecureRandom random)
|
||||
{
|
||||
// nothing to do.
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the name of the algorithm the padder implements.
|
||||
*
|
||||
* @return the name of the algorithm the padder implements.
|
||||
*/
|
||||
public string PaddingName
|
||||
{
|
||||
get { return "ISO7816-4"; }
|
||||
}
|
||||
|
||||
/**
|
||||
* add the pad bytes to the passed in block, returning the
|
||||
* number of bytes added.
|
||||
*/
|
||||
public int AddPadding(
|
||||
byte[] input,
|
||||
int inOff)
|
||||
{
|
||||
int added = (input.Length - inOff);
|
||||
|
||||
input[inOff]= (byte) 0x80;
|
||||
inOff ++;
|
||||
|
||||
while (inOff < input.Length)
|
||||
{
|
||||
input[inOff] = (byte) 0;
|
||||
inOff++;
|
||||
}
|
||||
|
||||
return added;
|
||||
}
|
||||
|
||||
/**
|
||||
* return the number of pad bytes present in the block.
|
||||
*/
|
||||
public int PadCount(
|
||||
byte[] input)
|
||||
{
|
||||
int count = input.Length - 1;
|
||||
|
||||
while (count > 0 && input[count] == 0)
|
||||
{
|
||||
count--;
|
||||
}
|
||||
|
||||
if (input[count] != (byte)0x80)
|
||||
{
|
||||
throw new InvalidCipherTextException("pad block corrupted");
|
||||
}
|
||||
|
||||
return input.Length - count;
|
||||
}
|
||||
}
|
||||
}
|
287
iTechSharp/srcbc/crypto/paddings/PaddedBufferedBlockCipher.cs
Normal file
287
iTechSharp/srcbc/crypto/paddings/PaddedBufferedBlockCipher.cs
Normal file
@@ -0,0 +1,287 @@
|
||||
using System;
|
||||
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Crypto.Parameters;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
/**
|
||||
* A wrapper class that allows block ciphers to be used to process data in
|
||||
* a piecemeal fashion with padding. The PaddedBufferedBlockCipher
|
||||
* outputs a block only when the buffer is full and more data is being added,
|
||||
* or on a doFinal (unless the current block in the buffer is a pad block).
|
||||
* The default padding mechanism used is the one outlined in Pkcs5/Pkcs7.
|
||||
*/
|
||||
public class PaddedBufferedBlockCipher
|
||||
: BufferedBlockCipher
|
||||
{
|
||||
private readonly IBlockCipherPadding padding;
|
||||
|
||||
/**
|
||||
* Create a buffered block cipher with the desired padding.
|
||||
*
|
||||
* @param cipher the underlying block cipher this buffering object wraps.
|
||||
* @param padding the padding type.
|
||||
*/
|
||||
public PaddedBufferedBlockCipher(
|
||||
IBlockCipher cipher,
|
||||
IBlockCipherPadding padding)
|
||||
{
|
||||
this.cipher = cipher;
|
||||
this.padding = padding;
|
||||
|
||||
buf = new byte[cipher.GetBlockSize()];
|
||||
bufOff = 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Create a buffered block cipher Pkcs7 padding
|
||||
*
|
||||
* @param cipher the underlying block cipher this buffering object wraps.
|
||||
*/
|
||||
public PaddedBufferedBlockCipher(IBlockCipher cipher)
|
||||
: this(cipher, new Pkcs7Padding()) { }
|
||||
|
||||
/**
|
||||
* initialise the cipher.
|
||||
*
|
||||
* @param forEncryption if true the cipher is initialised for
|
||||
* encryption, if false for decryption.
|
||||
* @param param the key and other data required by the cipher.
|
||||
* @exception ArgumentException if the parameters argument is
|
||||
* inappropriate.
|
||||
*/
|
||||
public override void Init(
|
||||
bool forEncryption,
|
||||
ICipherParameters parameters)
|
||||
{
|
||||
this.forEncryption = forEncryption;
|
||||
|
||||
SecureRandom initRandom = null;
|
||||
if (parameters is ParametersWithRandom)
|
||||
{
|
||||
ParametersWithRandom p = (ParametersWithRandom)parameters;
|
||||
initRandom = p.Random;
|
||||
parameters = p.Parameters;
|
||||
}
|
||||
|
||||
Reset();
|
||||
padding.Init(initRandom);
|
||||
cipher.Init(forEncryption, parameters);
|
||||
}
|
||||
|
||||
/**
|
||||
* return the minimum size of the output buffer required for an update
|
||||
* plus a doFinal with an input of len bytes.
|
||||
*
|
||||
* @param len the length of the input.
|
||||
* @return the space required to accommodate a call to update and doFinal
|
||||
* with len bytes of input.
|
||||
*/
|
||||
public override int GetOutputSize(
|
||||
int length)
|
||||
{
|
||||
int total = length + bufOff;
|
||||
int leftOver = total % buf.Length;
|
||||
|
||||
if (leftOver == 0)
|
||||
{
|
||||
if (forEncryption)
|
||||
{
|
||||
return total + buf.Length;
|
||||
}
|
||||
|
||||
return total;
|
||||
}
|
||||
|
||||
return total - leftOver + buf.Length;
|
||||
}
|
||||
|
||||
/**
|
||||
* return the size of the output buffer required for an update
|
||||
* an input of len bytes.
|
||||
*
|
||||
* @param len the length of the input.
|
||||
* @return the space required to accommodate a call to update
|
||||
* with len bytes of input.
|
||||
*/
|
||||
public override int GetUpdateOutputSize(
|
||||
int length)
|
||||
{
|
||||
int total = length + bufOff;
|
||||
int leftOver = total % buf.Length;
|
||||
|
||||
if (leftOver == 0)
|
||||
{
|
||||
return total - buf.Length;
|
||||
}
|
||||
|
||||
return total - leftOver;
|
||||
}
|
||||
|
||||
/**
|
||||
* process a single byte, producing an output block if neccessary.
|
||||
*
|
||||
* @param in the input byte.
|
||||
* @param out the space for any output that might be produced.
|
||||
* @param outOff the offset from which the output will be copied.
|
||||
* @return the number of output bytes copied to out.
|
||||
* @exception DataLengthException if there isn't enough space in out.
|
||||
* @exception InvalidOperationException if the cipher isn't initialised.
|
||||
*/
|
||||
public override int ProcessByte(
|
||||
byte input,
|
||||
byte[] output,
|
||||
int outOff)
|
||||
{
|
||||
int resultLen = 0;
|
||||
|
||||
if (bufOff == buf.Length)
|
||||
{
|
||||
resultLen = cipher.ProcessBlock(buf, 0, output, outOff);
|
||||
bufOff = 0;
|
||||
}
|
||||
|
||||
buf[bufOff++] = input;
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
|
||||
/**
|
||||
* process an array of bytes, producing output if necessary.
|
||||
*
|
||||
* @param in the input byte array.
|
||||
* @param inOff the offset at which the input data starts.
|
||||
* @param len the number of bytes to be copied out of the input array.
|
||||
* @param out the space for any output that might be produced.
|
||||
* @param outOff the offset from which the output will be copied.
|
||||
* @return the number of output bytes copied to out.
|
||||
* @exception DataLengthException if there isn't enough space in out.
|
||||
* @exception InvalidOperationException if the cipher isn't initialised.
|
||||
*/
|
||||
public override int ProcessBytes(
|
||||
byte[] input,
|
||||
int inOff,
|
||||
int length,
|
||||
byte[] output,
|
||||
int outOff)
|
||||
{
|
||||
if (length < 0)
|
||||
{
|
||||
throw new ArgumentException("Can't have a negative input length!");
|
||||
}
|
||||
|
||||
int blockSize = GetBlockSize();
|
||||
int outLength = GetUpdateOutputSize(length);
|
||||
|
||||
if (outLength > 0)
|
||||
{
|
||||
if ((outOff + outLength) > output.Length)
|
||||
{
|
||||
throw new DataLengthException("output buffer too short");
|
||||
}
|
||||
}
|
||||
|
||||
int resultLen = 0;
|
||||
int gapLen = buf.Length - bufOff;
|
||||
|
||||
if (length > gapLen)
|
||||
{
|
||||
Array.Copy(input, inOff, buf, bufOff, gapLen);
|
||||
|
||||
resultLen += cipher.ProcessBlock(buf, 0, output, outOff);
|
||||
|
||||
bufOff = 0;
|
||||
length -= gapLen;
|
||||
inOff += gapLen;
|
||||
|
||||
while (length > buf.Length)
|
||||
{
|
||||
resultLen += cipher.ProcessBlock(input, inOff, output, outOff + resultLen);
|
||||
|
||||
length -= blockSize;
|
||||
inOff += blockSize;
|
||||
}
|
||||
}
|
||||
|
||||
Array.Copy(input, inOff, buf, bufOff, length);
|
||||
|
||||
bufOff += length;
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
|
||||
/**
|
||||
* Process the last block in the buffer. If the buffer is currently
|
||||
* full and padding needs to be added a call to doFinal will produce
|
||||
* 2 * GetBlockSize() bytes.
|
||||
*
|
||||
* @param out the array the block currently being held is copied into.
|
||||
* @param outOff the offset at which the copying starts.
|
||||
* @return the number of output bytes copied to out.
|
||||
* @exception DataLengthException if there is insufficient space in out for
|
||||
* the output or we are decrypting and the input is not block size aligned.
|
||||
* @exception InvalidOperationException if the underlying cipher is not
|
||||
* initialised.
|
||||
* @exception InvalidCipherTextException if padding is expected and not found.
|
||||
*/
|
||||
public override int DoFinal(
|
||||
byte[] output,
|
||||
int outOff)
|
||||
{
|
||||
int blockSize = cipher.GetBlockSize();
|
||||
int resultLen = 0;
|
||||
|
||||
if (forEncryption)
|
||||
{
|
||||
if (bufOff == blockSize)
|
||||
{
|
||||
if ((outOff + 2 * blockSize) > output.Length)
|
||||
{
|
||||
Reset();
|
||||
|
||||
throw new DataLengthException("output buffer too short");
|
||||
}
|
||||
|
||||
resultLen = cipher.ProcessBlock(buf, 0, output, outOff);
|
||||
bufOff = 0;
|
||||
}
|
||||
|
||||
padding.AddPadding(buf, bufOff);
|
||||
|
||||
resultLen += cipher.ProcessBlock(buf, 0, output, outOff + resultLen);
|
||||
|
||||
Reset();
|
||||
}
|
||||
else
|
||||
{
|
||||
if (bufOff == blockSize)
|
||||
{
|
||||
resultLen = cipher.ProcessBlock(buf, 0, buf, 0);
|
||||
bufOff = 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
Reset();
|
||||
|
||||
throw new DataLengthException("last block incomplete in decryption");
|
||||
}
|
||||
|
||||
try
|
||||
{
|
||||
resultLen -= padding.PadCount(buf);
|
||||
|
||||
Array.Copy(buf, 0, output, outOff, resultLen);
|
||||
}
|
||||
finally
|
||||
{
|
||||
Reset();
|
||||
}
|
||||
}
|
||||
|
||||
return resultLen;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
77
iTechSharp/srcbc/crypto/paddings/Pkcs7Padding.cs
Normal file
77
iTechSharp/srcbc/crypto/paddings/Pkcs7Padding.cs
Normal file
@@ -0,0 +1,77 @@
|
||||
using System;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
/**
|
||||
* A padder that adds Pkcs7/Pkcs5 padding to a block.
|
||||
*/
|
||||
public class Pkcs7Padding: IBlockCipherPadding
|
||||
{
|
||||
/**
|
||||
* Initialise the padder.
|
||||
*
|
||||
* @param random - a SecureRandom if available.
|
||||
*/
|
||||
public void Init(SecureRandom random)
|
||||
{
|
||||
// nothing to do.
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the name of the algorithm the cipher implements.
|
||||
*
|
||||
* @return the name of the algorithm the cipher implements.
|
||||
*/
|
||||
public string PaddingName
|
||||
{
|
||||
get { return "PKCS7"; }
|
||||
}
|
||||
|
||||
/**
|
||||
* add the pad bytes to the passed in block, returning the
|
||||
* number of bytes added.
|
||||
*/
|
||||
public int AddPadding(
|
||||
byte[] input,
|
||||
int inOff)
|
||||
{
|
||||
byte code = (byte)(input.Length - inOff);
|
||||
|
||||
while (inOff < input.Length)
|
||||
{
|
||||
input[inOff] = code;
|
||||
inOff++;
|
||||
}
|
||||
|
||||
return code;
|
||||
}
|
||||
|
||||
/**
|
||||
* return the number of pad bytes present in the block.
|
||||
*/
|
||||
public int PadCount(
|
||||
byte[] input)
|
||||
{
|
||||
int count = (int) input[input.Length - 1];
|
||||
|
||||
if (count < 1 || count > input.Length)
|
||||
{
|
||||
throw new InvalidCipherTextException("pad block corrupted");
|
||||
}
|
||||
|
||||
for (int i = 1; i <= count; i++)
|
||||
{
|
||||
if (input[input.Length - i] != count)
|
||||
{
|
||||
throw new InvalidCipherTextException("pad block corrupted");
|
||||
}
|
||||
}
|
||||
|
||||
return count;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
79
iTechSharp/srcbc/crypto/paddings/TbcPadding.cs
Normal file
79
iTechSharp/srcbc/crypto/paddings/TbcPadding.cs
Normal file
@@ -0,0 +1,79 @@
|
||||
using System;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
|
||||
/// <summary> A padder that adds Trailing-Bit-Compliment padding to a block.
|
||||
/// <p>
|
||||
/// This padding pads the block out compliment of the last bit
|
||||
/// of the plain text.
|
||||
/// </p>
|
||||
/// </summary>
|
||||
public class TbcPadding
|
||||
: IBlockCipherPadding
|
||||
{
|
||||
/// <summary> Return the name of the algorithm the cipher implements.</summary>
|
||||
/// <returns> the name of the algorithm the cipher implements.
|
||||
/// </returns>
|
||||
public string PaddingName
|
||||
{
|
||||
get { return "TBC"; }
|
||||
}
|
||||
|
||||
/// <summary> Initialise the padder.</summary>
|
||||
/// <param name="random">- a SecureRandom if available.
|
||||
/// </param>
|
||||
public virtual void Init(SecureRandom random)
|
||||
{
|
||||
// nothing to do.
|
||||
}
|
||||
|
||||
/// <summary> add the pad bytes to the passed in block, returning the
|
||||
/// number of bytes added.
|
||||
/// <p>
|
||||
/// Note: this assumes that the last block of plain text is always
|
||||
/// passed to it inside in. i.e. if inOff is zero, indicating the
|
||||
/// entire block is to be overwritten with padding the value of in
|
||||
/// should be the same as the last block of plain text.
|
||||
/// </p>
|
||||
/// </summary>
|
||||
public virtual int AddPadding(byte[] input, int inOff)
|
||||
{
|
||||
int count = input.Length - inOff;
|
||||
byte code;
|
||||
|
||||
if (inOff > 0)
|
||||
{
|
||||
code = (byte)((input[inOff - 1] & 0x01) == 0?0xff:0x00);
|
||||
}
|
||||
else
|
||||
{
|
||||
code = (byte)((input[input.Length - 1] & 0x01) == 0?0xff:0x00);
|
||||
}
|
||||
|
||||
while (inOff < input.Length)
|
||||
{
|
||||
input[inOff] = code;
|
||||
inOff++;
|
||||
}
|
||||
|
||||
return count;
|
||||
}
|
||||
|
||||
/// <summary> return the number of pad bytes present in the block.</summary>
|
||||
public virtual int PadCount(byte[] input)
|
||||
{
|
||||
byte code = input[input.Length - 1];
|
||||
|
||||
int index = input.Length - 1;
|
||||
while (index > 0 && input[index - 1] == code)
|
||||
{
|
||||
index--;
|
||||
}
|
||||
|
||||
return input.Length - index;
|
||||
}
|
||||
}
|
||||
}
|
82
iTechSharp/srcbc/crypto/paddings/X923Padding.cs
Normal file
82
iTechSharp/srcbc/crypto/paddings/X923Padding.cs
Normal file
@@ -0,0 +1,82 @@
|
||||
using System;
|
||||
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
/**
|
||||
* A padder that adds X9.23 padding to a block - if a SecureRandom is
|
||||
* passed in random padding is assumed, otherwise padding with zeros is used.
|
||||
*/
|
||||
public class X923Padding
|
||||
: IBlockCipherPadding
|
||||
{
|
||||
private SecureRandom random;
|
||||
|
||||
/**
|
||||
* Initialise the padder.
|
||||
*
|
||||
* @param random a SecureRandom if one is available.
|
||||
*/
|
||||
public void Init(
|
||||
SecureRandom random)
|
||||
{
|
||||
this.random = random;
|
||||
}
|
||||
|
||||
/**
|
||||
* Return the name of the algorithm the cipher implements.
|
||||
*
|
||||
* @return the name of the algorithm the cipher implements.
|
||||
*/
|
||||
public string PaddingName
|
||||
{
|
||||
get { return "X9.23"; }
|
||||
}
|
||||
|
||||
/**
|
||||
* add the pad bytes to the passed in block, returning the
|
||||
* number of bytes added.
|
||||
*/
|
||||
public int AddPadding(
|
||||
byte[] input,
|
||||
int inOff)
|
||||
{
|
||||
byte code = (byte)(input.Length - inOff);
|
||||
|
||||
while (inOff < input.Length - 1)
|
||||
{
|
||||
if (random == null)
|
||||
{
|
||||
input[inOff] = 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
input[inOff] = (byte)random.NextInt();
|
||||
}
|
||||
inOff++;
|
||||
}
|
||||
|
||||
input[inOff] = code;
|
||||
|
||||
return code;
|
||||
}
|
||||
|
||||
/**
|
||||
* return the number of pad bytes present in the block.
|
||||
*/
|
||||
public int PadCount(
|
||||
byte[] input)
|
||||
{
|
||||
int count = input[input.Length - 1] & 0xff;
|
||||
|
||||
if (count > input.Length)
|
||||
{
|
||||
throw new InvalidCipherTextException("pad block corrupted");
|
||||
}
|
||||
|
||||
return count;
|
||||
}
|
||||
}
|
||||
}
|
68
iTechSharp/srcbc/crypto/paddings/ZeroBytePadding.cs
Normal file
68
iTechSharp/srcbc/crypto/paddings/ZeroBytePadding.cs
Normal file
@@ -0,0 +1,68 @@
|
||||
using System;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
|
||||
namespace Org.BouncyCastle.Crypto.Paddings
|
||||
{
|
||||
|
||||
/// <summary> A padder that adds Null byte padding to a block.</summary>
|
||||
public class ZeroBytePadding : IBlockCipherPadding
|
||||
{
|
||||
/// <summary> Return the name of the algorithm the cipher implements.
|
||||
///
|
||||
/// </summary>
|
||||
/// <returns> the name of the algorithm the cipher implements.
|
||||
/// </returns>
|
||||
public string PaddingName
|
||||
{
|
||||
get { return "ZeroBytePadding"; }
|
||||
}
|
||||
|
||||
/// <summary> Initialise the padder.
|
||||
///
|
||||
/// </summary>
|
||||
/// <param name="random">- a SecureRandom if available.
|
||||
/// </param>
|
||||
public void Init(SecureRandom random)
|
||||
{
|
||||
// nothing to do.
|
||||
}
|
||||
|
||||
/// <summary> add the pad bytes to the passed in block, returning the
|
||||
/// number of bytes added.
|
||||
/// </summary>
|
||||
public int AddPadding(
|
||||
byte[] input,
|
||||
int inOff)
|
||||
{
|
||||
int added = (input.Length - inOff);
|
||||
|
||||
while (inOff < input.Length)
|
||||
{
|
||||
input[inOff] = (byte) 0;
|
||||
inOff++;
|
||||
}
|
||||
|
||||
return added;
|
||||
}
|
||||
|
||||
/// <summary> return the number of pad bytes present in the block.</summary>
|
||||
public int PadCount(
|
||||
byte[] input)
|
||||
{
|
||||
int count = input.Length;
|
||||
|
||||
while (count > 0)
|
||||
{
|
||||
if (input[count - 1] != 0)
|
||||
{
|
||||
break;
|
||||
}
|
||||
|
||||
count--;
|
||||
}
|
||||
|
||||
return input.Length - count;
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user