91 lines
4.3 KiB
C++
91 lines
4.3 KiB
C++
//
|
|
// Copyright 2020 Electronic Arts Inc.
|
|
//
|
|
// TiberianDawn.DLL and RedAlert.dll and corresponding source code is free
|
|
// software: you can redistribute it and/or modify it under the terms of
|
|
// the GNU General Public License as published by the Free Software Foundation,
|
|
// either version 3 of the License, or (at your option) any later version.
|
|
|
|
// TiberianDawn.DLL and RedAlert.dll and corresponding source code is distributed
|
|
// in the hope that it will be useful, but with permitted additional restrictions
|
|
// under Section 7 of the GPL. See the GNU General Public License in LICENSE.TXT
|
|
// distributed with this program. You should have received a copy of the
|
|
// GNU General Public License along with permitted additional restrictions
|
|
// with this program. If not, see https://github.com/electronicarts/CnC_Remastered_Collection
|
|
|
|
/* $Header: /CounterStrike/PK.H 1 3/03/97 10:25a Joe_bostic $ */
|
|
/***********************************************************************************************
|
|
*** C O N F I D E N T I A L --- W E S T W O O D S T U D I O S ***
|
|
***********************************************************************************************
|
|
* *
|
|
* Project Name : Command & Conquer *
|
|
* *
|
|
* File Name : PK.H *
|
|
* *
|
|
* Programmer : Joe L. Bostic *
|
|
* *
|
|
* Start Date : 07/03/96 *
|
|
* *
|
|
* Last Update : July 3, 1996 [JLB] *
|
|
* *
|
|
*---------------------------------------------------------------------------------------------*
|
|
* Functions: *
|
|
* - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - */
|
|
|
|
#ifndef PK_H
|
|
#define PK_H
|
|
|
|
#include "int.h"
|
|
|
|
/*
|
|
** This class holds a public or private key used in Public Key Cryptography. It also serves
|
|
** as the conduit for encrypting/decrypting data using that key. Cryptography, using this
|
|
** method, has a couple of characteristics that affect how it is used. One, the process of
|
|
** encrypting/decrypting is very slow. This limits the effective quantity of data that can
|
|
** be processed. Two, the ciphertext is larger than the plaintext. This property generally
|
|
** limits its use to streaming data as opposed to random access data. The data is processed
|
|
** in blocks. The size of the ciphertext and plaintext blocks can be determined only from
|
|
** the key itself.
|
|
**
|
|
** A reasonable use of this technology would be to encrypt only critical data such as the
|
|
** password for a fast general purpose cryptographic algorithm.
|
|
*/
|
|
class PKey
|
|
{
|
|
public:
|
|
PKey(void) : Modulus(0), Exponent(0), BitPrecision(0) {}
|
|
PKey(void const * exponent, void const * modulus); // DER initialization.
|
|
|
|
int Encrypt(void const * source, int slen, void * dest) const;
|
|
int Decrypt(void const * source, int slen, void * dest) const;
|
|
|
|
static void Generate(Straw & random, int bits, PKey & fastkey, PKey & slowkey);
|
|
|
|
int Plain_Block_Size(void) const {return((BitPrecision-1)/8);}
|
|
int Crypt_Block_Size(void) const {return(Plain_Block_Size()+1);}
|
|
int Block_Count(int plaintext_length) const {return((((plaintext_length-1)/Plain_Block_Size())+1));}
|
|
|
|
int Encode_Modulus(void * buffer) const;
|
|
int Encode_Exponent(void * buffer) const;
|
|
|
|
void Decode_Modulus(void * buffer);
|
|
void Decode_Exponent(void * buffer);
|
|
|
|
static long Fast_Exponent(void) {return(65537L);}
|
|
|
|
private:
|
|
|
|
// p*q
|
|
BigInt Modulus;
|
|
|
|
// 65537 or
|
|
// inverse of (p-1)(q-1).
|
|
BigInt Exponent;
|
|
|
|
// Maximum bits allowed for block.
|
|
int BitPrecision;
|
|
};
|
|
|
|
|
|
#endif
|