Index: crypto/openpgp_symmetric_encryption_openssl.cc |
diff --git a/crypto/openpgp_symmetric_encryption_openssl.cc b/crypto/openpgp_symmetric_encryption_openssl.cc |
deleted file mode 100644 |
index bebf095deda65473deff30dc8102a1419a7bfc36..0000000000000000000000000000000000000000 |
--- a/crypto/openpgp_symmetric_encryption_openssl.cc |
+++ /dev/null |
@@ -1,707 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "crypto/openpgp_symmetric_encryption.h" |
- |
-#include <vector> |
-#include <stdlib.h> |
- |
-#include <openssl/evp.h> |
-#include <openssl/aes.h> |
-#include <openssl/sha.h> |
- |
-#include "base/rand_util.h" |
-#include "base/logging.h" |
- |
-namespace crypto { |
- |
-namespace { |
- |
-// Reader wraps a StringPiece and provides methods to read several datatypes |
-// while advancing the StringPiece. |
-class Reader { |
- public: |
- Reader(base::StringPiece input) |
- : data_(input) { |
- } |
- |
- bool U8(uint8* out) { |
- if (data_.size() < 1) |
- return false; |
- *out = static_cast<uint8>(data_[0]); |
- data_.remove_prefix(1); |
- return true; |
- } |
- |
- bool U32(uint32* out) { |
- if (data_.size() < 4) |
- return false; |
- *out = static_cast<uint32>(data_[0]) << 24 | |
- static_cast<uint32>(data_[1]) << 16 | |
- static_cast<uint32>(data_[2]) << 8 | |
- static_cast<uint32>(data_[3]); |
- data_.remove_prefix(4); |
- return true; |
- } |
- |
- // Prefix sets |*out| to the first |n| bytes of the StringPiece and advances |
- // the StringPiece by |n|. |
- bool Prefix(uint32 n, base::StringPiece *out) { |
- if (data_.size() < n) |
- return false; |
- *out = base::StringPiece(data_.data(), n); |
- data_.remove_prefix(n); |
- return true; |
- } |
- |
- // Remainder returns the remainer of the StringPiece and advances it to the |
- // end. |
- base::StringPiece Remainder() { |
- base::StringPiece ret = data_; |
- data_ = base::StringPiece(); |
- return ret; |
- } |
- |
- typedef base::StringPiece Position; |
- |
- Position tell() const { |
- return data_; |
- } |
- |
- void Seek(Position p) { |
- data_ = p; |
- } |
- |
- bool Skip(uint32 n) { |
- if (data_.size() < n) |
- return false; |
- data_.remove_prefix(n); |
- return true; |
- } |
- |
- bool empty() const { |
- return data_.empty(); |
- } |
- |
- size_t size() const { |
- return data_.size(); |
- } |
- |
- private: |
- base::StringPiece data_; |
-}; |
- |
-// SaltedIteratedS2K implements the salted and iterated string-to-key |
-// convertion. See RFC 4880, section 3.7.1.3. |
-void SaltedIteratedS2K(uint32 cipher_key_length, |
- const EVP_MD *hash_function, |
- base::StringPiece passphrase, |
- base::StringPiece salt, |
- uint32 count, |
- uint8 *out_key) { |
- const std::string combined = salt.as_string() + passphrase.as_string(); |
- const size_t combined_len = combined.size(); |
- |
- uint32 done = 0; |
- uint8 zero[1] = {0}; |
- |
- EVP_MD_CTX ctx; |
- EVP_MD_CTX_init(&context); |
- |
- for (uint32 i = 0; done < cipher_key_length; i++) { |
- CHECK_EQ(EVP_DigestInit_ex(&ctx, hash_function, NULL), 1); |
- |
- for (uint32 j = 0; j < i; j++) |
- EVP_DigestUpdate(&ctx, zero, sizeof(zero)); |
- |
- uint32 written = 0; |
- while (written < count) { |
- if (written + combined_len > count) { |
- uint32 todo = count - written; |
- EVP_DigestUpdate(&ctx, combined.data(), todo); |
- written = count; |
- } else { |
- EVP_DigestUpdate(&ctx, combined.data(), combined_len); |
- written += combined_len; |
- } |
- } |
- |
- uint32 num_hash_bytes; |
- uint8 hash[EVP_MAX_MD_SIZE]; |
- CHECK_EQ(EVP_DigestFinal_ex(&ctx, hash, &num_hash_bytes), 1); |
- |
- uint32 todo = cipher_key_length - done; |
- if (todo > num_hash_bytes) |
- todo = num_hash_bytes; |
- memcpy(out_key + done, hash, todo); |
- done += todo; |
- } |
- |
- EVP_MD_CTX_cleanup(&context); |
-} |
- |
-// These constants are the tag numbers for the various packet types that we |
-// use. |
-static const uint32 kSymmetricKeyEncryptedTag = 3; |
-static const uint32 kSymmetricallyEncryptedTag = 18; |
-static const uint32 kCompressedTag = 8; |
-static const uint32 kLiteralDataTag = 11; |
- |
-class Decrypter { |
- public: |
- ~Decrypter() { |
- for (std::vector<void*>::iterator |
- i = arena_.begin(); i != arena_.end(); i++) { |
- free(*i); |
- } |
- arena_.clear(); |
- } |
- |
- OpenPGPSymmetricEncrytion::Result Decrypt(base::StringPiece in, |
- base::StringPiece passphrase, |
- base::StringPiece *out_contents) { |
- Reader reader(in); |
- uint32 tag; |
- base::StringPiece contents; |
- AES_KEY key; |
- |
- if (!ParsePacket(&reader, &tag, &contents)) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- if (tag != kSymmetricKeyEncryptedTag) |
- return OpenPGPSymmetricEncrytion::NOT_SYMMETRICALLY_ENCRYPTED; |
- Reader inner(contents); |
- OpenPGPSymmetricEncrytion::Result result = |
- ParseSymmetricKeyEncrypted(&inner, passphrase, &key); |
- if (result != OpenPGPSymmetricEncrytion::OK) |
- return result; |
- |
- if (!ParsePacket(&reader, &tag, &contents)) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- if (tag != kSymmetricallyEncryptedTag) |
- return OpenPGPSymmetricEncrytion::NOT_SYMMETRICALLY_ENCRYPTED; |
- if (!reader.empty()) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- inner = Reader(contents); |
- if (!ParseSymmetricallyEncrypted(&inner, &key, &contents)) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- |
- reader = Reader(contents); |
- if (!ParsePacket(&reader, &tag, &contents)) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- if (tag == kCompressedTag) |
- return OpenPGPSymmetricEncrytion::COMPRESSED; |
- if (tag != kLiteralDataTag) |
- return OpenPGPSymmetricEncrytion::NOT_SYMMETRICALLY_ENCRYPTED; |
- inner = Reader(contents); |
- if (!ParseLiteralData(&inner, out_contents)) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- |
- return OpenPGPSymmetricEncrytion::OK; |
- } |
- |
- private: |
- // ParsePacket parses an OpenPGP packet from reader. See RFC 4880, section |
- // 4.2.2. |
- bool ParsePacket(Reader *reader, |
- uint32 *out_tag, |
- base::StringPiece *out_contents) { |
- uint8 header; |
- if (!reader->U8(&header)) |
- return false; |
- if ((header & 0x80) == 0) { |
- // Tag byte must have MSB set. |
- return false; |
- } |
- |
- if ((header & 0x40) == 0) { |
- // Old format packet. |
- *out_tag = (header & 0x3f) >> 2; |
- |
- uint8 length_type = header & 3; |
- if (length_type == 3) { |
- *out_contents = reader->Remainder(); |
- return true; |
- } |
- |
- const uint32 length_bytes = 1 << length_type; |
- uint32 length = 0; |
- for (uint32 i = 0; i < length_bytes; i++) { |
- uint8 length_byte; |
- if (!reader->U8(&length_byte)) |
- return false; |
- length <<= 8; |
- length |= length_byte; |
- } |
- |
- return reader->Prefix(length, out_contents); |
- } |
- |
- // New format packet. |
- *out_tag = header & 0x3f; |
- uint32 length; |
- bool is_partial; |
- if (!ParseLength(reader, &length, &is_partial)) |
- return false; |
- if (is_partial) |
- return ParseStreamContents(reader, length, out_contents); |
- return reader->Prefix(length, out_contents); |
- } |
- |
- // ParseStreamContents parses all the chunks of a partial length stream from |
- // reader. See http://tools.ietf.org/html/rfc4880#section-4.2.2.4 |
- bool ParseStreamContents(Reader *reader, |
- uint32 length, |
- base::StringPiece *out_contents) { |
- const Reader::Position beginning_of_stream = reader->tell(); |
- const uint32 first_chunk_length = length; |
- |
- // First we parse the stream to find its length. |
- if (!reader->Skip(length)) |
- return false; |
- |
- for (;;) { |
- uint32 chunk_length; |
- bool is_partial; |
- |
- if (!ParseLength(reader, &chunk_length, &is_partial)) |
- return false; |
- if (length + chunk_length < length) |
- return false; |
- length += chunk_length; |
- if (!reader->Skip(chunk_length)) |
- return false; |
- if (!is_partial) |
- break; |
- } |
- |
- // Now we have the length of the whole stream in |length|. |
- char* buf = reinterpret_cast<char*>(malloc(length)); |
- arena_.push_back(buf); |
- uint32 j = 0; |
- reader->Seek(beginning_of_stream); |
- |
- base::StringPiece first_chunk; |
- if (!reader->Prefix(first_chunk_length, &first_chunk)) |
- return false; |
- memcpy(buf + j, first_chunk.data(), first_chunk_length); |
- j += first_chunk_length; |
- |
- // Now we parse the stream again, this time copying into |buf| |
- for (;;) { |
- uint32 chunk_length; |
- bool is_partial; |
- |
- if (!ParseLength(reader, &chunk_length, &is_partial)) |
- return false; |
- base::StringPiece chunk; |
- if (!reader->Prefix(chunk_length, &chunk)) |
- return false; |
- memcpy(buf + j, chunk.data(), chunk_length); |
- j += chunk_length; |
- if (!is_partial) |
- break; |
- } |
- |
- *out_contents = base::StringPiece(buf, length); |
- return true; |
- } |
- |
- // ParseLength parses an OpenPGP length from reader. See RFC 4880, section |
- // 4.2.2. |
- bool ParseLength(Reader *reader, uint32 *out_length, bool *out_is_prefix) { |
- uint8 length_spec; |
- if (!reader->U8(&length_spec)) |
- return false; |
- |
- *out_is_prefix = false; |
- if (length_spec < 192) { |
- *out_length = length_spec; |
- return true; |
- } else if (length_spec < 224) { |
- uint8 next_byte; |
- if (!reader->U8(&next_byte)) |
- return false; |
- |
- *out_length = (length_spec - 192) << 8; |
- *out_length += next_byte; |
- return true; |
- } else if (length_spec < 255) { |
- *out_length = 1u << (length_spec & 0x1f); |
- *out_is_prefix = true; |
- return true; |
- } else { |
- return reader->U32(out_length); |
- } |
- } |
- |
- // ParseSymmetricKeyEncrypted parses a passphrase protected session key. See |
- // RFC 4880, section 5.3. |
- OpenPGPSymmetricEncrytion::Result ParseSymmetricKeyEncrypted( |
- Reader *reader, |
- base::StringPiece passphrase, |
- AES_KEY *out_key) { |
- uint8 version, cipher, s2k_type, hash_func_id; |
- if (!reader->U8(&version) || version != 4) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- |
- if (!reader->U8(&cipher) || |
- !reader->U8(&s2k_type) || |
- !reader->U8(&hash_func_id)) { |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- } |
- |
- uint8 cipher_key_length = OpenPGPCipherIdToKeyLength(cipher); |
- if (cipher_key_length == 0) |
- return OpenPGPSymmetricEncrytion::UNKNOWN_CIPHER; |
- |
- const EVP_MD *hash_function; |
- switch (hash_func_id) { |
- case 2: // SHA-1 |
- hash_function = EVP_sha1(); |
- break; |
- case 8: // SHA-256 |
- hash_function = EVP_sha256(); |
- break; |
- default: |
- return OpenPGPSymmetricEncrytion::UNKNOWN_HASH; |
- } |
- |
- base::StringPiece salt; |
- uint8 key[32]; |
- uint8 count_spec; |
- switch (s2k_type) { |
- case 1: |
- if (!reader->Prefix(8, &salt)) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- case 0: |
- SaltedIteratedS2K(cipher_key_length, hash_function, passphrase, salt, |
- passphrase.size() + salt.size(), key); |
- break; |
- case 3: |
- if (!reader->Prefix(8, &salt) || |
- !reader->U8(&count_spec)) { |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- } |
- SaltedIteratedS2K( |
- cipher_key_length, hash_function, passphrase, salt, |
- static_cast<uint32>( |
- 16 + (count_spec&15)) << ((count_spec >> 4) + 6), key); |
- break; |
- default: |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- } |
- |
- if (AES_set_encrypt_key(key, 8 * cipher_key_length, out_key)) |
- return OpenPGPSymmetricEncrytion::INTERNAL_ERROR; |
- |
- if (reader->empty()) { |
- // The resulting key is used directly. |
- return OpenPGPSymmetricEncrytion::OK; |
- } |
- |
- // The S2K derived key encrypts another key that follows: |
- base::StringPiece encrypted_key = reader->Remainder(); |
- if (encrypted_key.size() < 1) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- |
- uint8* plaintext_key = reinterpret_cast<uint8*>( |
- malloc(encrypted_key.size())); |
- arena_.push_back(plaintext_key); |
- |
- int num = 0; |
- uint8 iv[16] = {0}; |
- |
- AES_cfb128_encrypt(reinterpret_cast<const uint8*>(encrypted_key.data()), |
- plaintext_key, |
- encrypted_key.size(), |
- out_key, |
- iv, |
- &num, |
- AES_DECRYPT); |
- |
- cipher_key_length = OpenPGPCipherIdToKeyLength(plaintext_key[0]); |
- if (cipher_key_length == 0) |
- return OpenPGPSymmetricEncrytion::UNKNOWN_CIPHER; |
- if (encrypted_key.size() != 1u + cipher_key_length) |
- return OpenPGPSymmetricEncrytion::PARSE_ERROR; |
- if (AES_set_encrypt_key(plaintext_key + 1, 8 * cipher_key_length, |
- out_key)) { |
- return OpenPGPSymmetricEncrytion::INTERNAL_ERROR; |
- } |
- return OpenPGPSymmetricEncrytion::OK; |
- } |
- |
- uint32 OpenPGPCipherIdToKeyLength(uint8 cipher) { |
- switch (cipher) { |
- case 7: // AES-128 |
- return 16; |
- case 8: // AES-192 |
- return 24; |
- case 9: // AES-256 |
- return 32; |
- default: |
- return 0; |
- } |
- } |
- |
- // ParseSymmetricallyEncrypted parses a Symmetrically Encrypted packet. See |
- // RFC 4880, sections 5.7 and 5.13. |
- bool ParseSymmetricallyEncrypted(Reader *reader, |
- AES_KEY *key, |
- base::StringPiece *out_plaintext) { |
- uint8 version; |
- if (!reader->U8(&version) || version != 1) |
- return false; |
- |
- base::StringPiece prefix_sp; |
- if (!reader->Prefix(AES_BLOCK_SIZE + 2, &prefix_sp)) |
- return false; |
- uint8 prefix[AES_BLOCK_SIZE + 2]; |
- memcpy(prefix, prefix_sp.data(), sizeof(prefix)); |
- |
- uint8 prefix_copy[AES_BLOCK_SIZE + 2]; |
- uint8 fre[AES_BLOCK_SIZE]; |
- |
- memset(prefix_copy, 0, AES_BLOCK_SIZE); |
- AES_ecb_encrypt(prefix_copy, fre, key, AES_ENCRYPT); |
- for (uint32 i = 0; i < AES_BLOCK_SIZE; i++) |
- prefix_copy[i] = fre[i] ^ prefix[i]; |
- AES_ecb_encrypt(prefix, fre, key, AES_ENCRYPT); |
- prefix_copy[AES_BLOCK_SIZE] = prefix[AES_BLOCK_SIZE] ^ fre[0]; |
- prefix_copy[AES_BLOCK_SIZE + 1] = prefix[AES_BLOCK_SIZE + 1] ^ fre[1]; |
- |
- if (prefix_copy[AES_BLOCK_SIZE - 2] != prefix_copy[AES_BLOCK_SIZE] || |
- prefix_copy[AES_BLOCK_SIZE - 1] != prefix_copy[AES_BLOCK_SIZE + 1]) { |
- return false; |
- } |
- |
- fre[0] = prefix[AES_BLOCK_SIZE]; |
- fre[1] = prefix[AES_BLOCK_SIZE + 1]; |
- |
- uint32 out_used = 2; |
- |
- const uint32 plaintext_size = reader->size(); |
- if (plaintext_size < SHA_DIGEST_LENGTH + 2) { |
- // Too small to contain an MDC trailer. |
- return false; |
- } |
- |
- uint8* plaintext = reinterpret_cast<uint8*>(malloc(plaintext_size)); |
- arena_.push_back(plaintext); |
- |
- for (uint32 i = 0; i < plaintext_size; i++) { |
- uint8 b; |
- if (!reader->U8(&b)) |
- return false; |
- if (out_used == AES_BLOCK_SIZE) { |
- AES_ecb_encrypt(fre, fre, key, AES_ENCRYPT); |
- out_used = 0; |
- } |
- |
- plaintext[i] = b ^ fre[out_used]; |
- fre[out_used++] = b; |
- } |
- |
- // The plaintext should be followed by a Modification Detection Code |
- // packet. This packet is specified such that the header is always |
- // serialized as exactly these two bytes: |
- if (plaintext[plaintext_size - SHA_DIGEST_LENGTH - 2] != 0xd3 || |
- plaintext[plaintext_size - SHA_DIGEST_LENGTH - 1] != 0x14) { |
- return false; |
- } |
- |
- SHA_CTX sha1; |
- SHA1_Init(&sha1); |
- SHA1_Update(&sha1, prefix_copy, sizeof(prefix_copy)); |
- SHA1_Update(&sha1, plaintext, plaintext_size - SHA_DIGEST_LENGTH); |
- uint8 digest[SHA_DIGEST_LENGTH]; |
- SHA1_Final(digest, &sha1); |
- |
- if (memcmp(digest, &plaintext[plaintext_size - SHA_DIGEST_LENGTH], |
- SHA_DIGEST_LENGTH) != 0) { |
- return false; |
- } |
- |
- *out_plaintext = base::StringPiece(reinterpret_cast<char*>(plaintext), |
- plaintext_size - SHA_DIGEST_LENGTH); |
- return true; |
- } |
- |
- // ParseLiteralData parses a Literal Data packet. See RFC 4880, section 5.9. |
- bool ParseLiteralData(Reader *reader, base::StringPiece *out_data) { |
- uint8 is_binary, filename_len; |
- if (!reader->U8(&is_binary) || |
- !reader->U8(&filename_len) || |
- !reader->Skip(filename_len) || |
- !reader->Skip(sizeof(uint32) /* mtime */)) { |
- return false; |
- } |
- |
- *out_data = reader->Remainder(); |
- return true; |
- } |
- |
- // arena_ contains malloced pointers that are used as temporary space during |
- // the decryption. |
- std::vector<void*> arena_; |
-}; |
- |
-class Encrypter { |
- public: |
- // ByteString is used throughout in order to avoid signedness issues with a |
- // std::string. |
- typedef std::basic_string<uint8> ByteString; |
- |
- static ByteString Encrypt(base::StringPiece plaintext, |
- base::StringPiece passphrase) { |
- ByteString key; |
- ByteString ske = SerializeSymmetricKeyEncrypted(passphrase, &key); |
- |
- ByteString literal_data = SerializeLiteralData(plaintext); |
- ByteString se = SerializeSymmetricallyEncrypted(literal_data, key); |
- return ske + se; |
- } |
- |
- private: |
- static ByteString MakePacket(uint32 tag, const ByteString& contents) { |
- ByteString header; |
- header.push_back(0x80 | 0x40 | tag); |
- |
- if (contents.size() < 192) { |
- header.push_back(contents.size()); |
- } else if (contents.size() < 8384) { |
- size_t length = contents.size(); |
- length -= 192; |
- header.push_back(192 + (length >> 8)); |
- header.push_back(length & 0xff); |
- } else { |
- size_t length = contents.size(); |
- header.push_back(255); |
- header.push_back(length >> 24); |
- header.push_back(length >> 16); |
- header.push_back(length >> 8); |
- header.push_back(length); |
- } |
- |
- return header + contents; |
- } |
- |
- static ByteString SerializeLiteralData(base::StringPiece contents) { |
- ByteString literal_data; |
- literal_data.push_back(0x74); // text mode |
- literal_data.push_back(0x00); // no filename |
- literal_data.push_back(0x00); // zero mtime |
- literal_data.push_back(0x00); |
- literal_data.push_back(0x00); |
- literal_data.push_back(0x00); |
- literal_data += ByteString(reinterpret_cast<const uint8*>(contents.data()), |
- contents.size()); |
- return MakePacket(kLiteralDataTag, literal_data); |
- } |
- |
- static ByteString SerializeSymmetricKeyEncrypted(base::StringPiece passphrase, |
- ByteString *out_key) { |
- ByteString ske; |
- ske.push_back(4); // version 4 |
- ske.push_back(7); // AES-128 |
- ske.push_back(3); // iterated and salted S2K |
- ske.push_back(2); // SHA-1 |
- |
- uint64 salt64 = base::RandUint64(); |
- ByteString salt(sizeof(salt64), 0); |
- |
- // It's a random value, so endianness doesn't matter. |
- ske += ByteString(reinterpret_cast<uint8*>(&salt64), sizeof(salt64)); |
- ske.push_back(96); // iteration count of 65536 |
- |
- uint8 key[16]; |
- SaltedIteratedS2K( |
- sizeof(key), EVP_sha1(), passphrase, |
- base::StringPiece(reinterpret_cast<char*>(&salt64), sizeof(salt64)), |
- 65536, key); |
- *out_key = ByteString(key, sizeof(key)); |
- return MakePacket(kSymmetricKeyEncryptedTag, ske); |
- } |
- |
- static ByteString SerializeSymmetricallyEncrypted(ByteString plaintext, |
- const ByteString& key) { |
- ByteString packet; |
- packet.push_back(1); // version 1 |
- static const uint32 kBlockSize = 16; // AES block size |
- |
- uint8 prefix[kBlockSize + 2], fre[kBlockSize], iv[kBlockSize]; |
- base::RandBytes(iv, kBlockSize); |
- memset(fre, 0, sizeof(fre)); |
- |
- AES_KEY aes_key; |
- AES_set_encrypt_key(key.data(), 8 * key.size(), &aes_key); |
- |
- AES_ecb_encrypt(fre, fre, &aes_key, AES_ENCRYPT); |
- for (uint32 i = 0; i < 16; i++) |
- prefix[i] = iv[i] ^ fre[i]; |
- AES_ecb_encrypt(prefix, fre, &aes_key, AES_ENCRYPT); |
- prefix[kBlockSize] = iv[kBlockSize - 2] ^ fre[0]; |
- prefix[kBlockSize + 1] = iv[kBlockSize - 1] ^ fre[1]; |
- |
- packet += ByteString(prefix, sizeof(prefix)); |
- |
- ByteString plaintext_copy = plaintext; |
- plaintext_copy.push_back(0xd3); // MDC packet |
- plaintext_copy.push_back(20); // packet length (20 bytes) |
- |
- SHA_CTX sha1; |
- SHA1_Init(&sha1); |
- SHA1_Update(&sha1, iv, sizeof(iv)); |
- SHA1_Update(&sha1, iv + kBlockSize - 2, 2); |
- SHA1_Update(&sha1, plaintext_copy.data(), plaintext_copy.size()); |
- uint8 digest[SHA_DIGEST_LENGTH]; |
- SHA1_Final(digest, &sha1); |
- |
- plaintext_copy += ByteString(digest, sizeof(digest)); |
- |
- fre[0] = prefix[kBlockSize]; |
- fre[1] = prefix[kBlockSize+1]; |
- uint32 out_used = 2; |
- |
- for (size_t i = 0; i < plaintext_copy.size(); i++) { |
- if (out_used == kBlockSize) { |
- AES_ecb_encrypt(fre, fre, &aes_key, AES_ENCRYPT); |
- out_used = 0; |
- } |
- |
- uint8 c = plaintext_copy[i] ^ fre[out_used]; |
- fre[out_used++] = c; |
- packet.push_back(c); |
- } |
- |
- return MakePacket(kSymmetricallyEncryptedTag, packet); |
- } |
-}; |
- |
-} // anonymous namespace |
- |
-// static |
-OpenPGPSymmetricEncrytion::Result OpenPGPSymmetricEncrytion::Decrypt( |
- base::StringPiece encrypted, |
- base::StringPiece passphrase, |
- std::string *out) { |
- Decrypter decrypter; |
- |
- base::StringPiece result; |
- Result reader = decrypter.Decrypt(encrypted, passphrase, &result); |
- if (reader == OK) |
- *out = result.as_string(); |
- return reader; |
-} |
- |
-// static |
-std::string OpenPGPSymmetricEncrytion::Encrypt( |
- base::StringPiece plaintext, |
- base::StringPiece passphrase) { |
- Encrypter::ByteString b = |
- Encrypter::Encrypt(plaintext, passphrase); |
- return std::string(reinterpret_cast<const char*>(b.data()), b.size()); |
-} |
- |
-} // namespace crypto |