Chromium Code Reviews| Index: crypto/encryptor_nss.cc |
| =================================================================== |
| --- crypto/encryptor_nss.cc (revision 107404) |
| +++ crypto/encryptor_nss.cc (working copy) |
| @@ -72,13 +72,12 @@ |
| break; |
| } |
| - if (!param_.get()) |
| - return false; |
| - return true; |
| + return param_ != NULL; |
| } |
| bool Encryptor::Encrypt(const base::StringPiece& plaintext, |
| std::string* ciphertext) { |
| + DCHECK(!plaintext.empty() || (mode_ == CBC)); |
| ScopedPK11Context context(PK11_CreateContextBySymKey(GetMechanism(mode_), |
| CKA_ENCRYPT, |
| key_->key(), |
| @@ -86,34 +85,30 @@ |
| if (!context.get()) |
| return false; |
| - if (mode_ == CTR) |
| - return CryptCTR(context.get(), plaintext, ciphertext); |
| - else |
| - return Crypt(context.get(), plaintext, ciphertext); |
| + return (mode_ == CTR) ? |
| + CryptCTR(context.get(), plaintext, ciphertext) : |
| + Crypt(context.get(), plaintext, ciphertext); |
| } |
| bool Encryptor::Decrypt(const base::StringPiece& ciphertext, |
| std::string* plaintext) { |
| - if (ciphertext.empty()) |
| - return false; |
| - |
| + DCHECK(!ciphertext.empty()); |
| ScopedPK11Context context(PK11_CreateContextBySymKey( |
| GetMechanism(mode_), (mode_ == CTR ? CKA_ENCRYPT : CKA_DECRYPT), |
| key_->key(), param_.get())); |
| if (!context.get()) |
| return false; |
| - if (mode_ == CTR) |
| - return CryptCTR(context.get(), ciphertext, plaintext); |
| - else |
| - return Crypt(context.get(), ciphertext, plaintext); |
| + return (mode_ == CTR) ? |
| + CryptCTR(context.get(), ciphertext, plaintext) : |
| + Crypt(context.get(), ciphertext, plaintext); |
| } |
| bool Encryptor::Crypt(PK11Context* context, |
| const base::StringPiece& input, |
| std::string* output) { |
| size_t output_len = input.size() + AES_BLOCK_SIZE; |
| - CHECK(output_len > input.size()) << "Output size overflow"; |
| + DCHECK_GT(output_len, input.size()); |
|
Ryan Sleevi
2011/11/01 23:08:59
CHECK_GT
|
| output->resize(output_len); |
| uint8* output_data = |
| @@ -160,7 +155,7 @@ |
| size_t output_len = ((input.size() + AES_BLOCK_SIZE - 1) / AES_BLOCK_SIZE) * |
| AES_BLOCK_SIZE; |
| - CHECK(output_len >= input.size()) << "Output size overflow"; |
| + DCHECK_GE(output_len, input.size()); |
|
Ryan Sleevi
2011/11/01 23:08:59
CHECK_GE
|
| output->resize(output_len); |
| uint8* output_data = |
| reinterpret_cast<uint8*>(const_cast<char*>(output->data())); |