| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "crypto/encryptor.h" | 5 #include "crypto/encryptor.h" |
| 6 | 6 |
| 7 #include <string.h> | 7 #include <string.h> |
| 8 | 8 |
| 9 #include "base/string_util.h" | 9 #include "base/string_util.h" |
| 10 #include "crypto/symmetric_key.h" | 10 #include "crypto/symmetric_key.h" |
| (...skipping 23 matching lines...) Expand all Loading... |
| 34 mode_(CBC), | 34 mode_(CBC), |
| 35 block_size_(0) { | 35 block_size_(0) { |
| 36 } | 36 } |
| 37 | 37 |
| 38 Encryptor::~Encryptor() { | 38 Encryptor::~Encryptor() { |
| 39 } | 39 } |
| 40 | 40 |
| 41 bool Encryptor::Init(SymmetricKey* key, | 41 bool Encryptor::Init(SymmetricKey* key, |
| 42 Mode mode, | 42 Mode mode, |
| 43 const base::StringPiece& iv) { | 43 const base::StringPiece& iv) { |
| 44 DCHECK(key); | 44 DCHECK_EQ(CBC, mode); |
| 45 DCHECK_EQ(CBC, mode) << "Unsupported mode of operation"; | 45 if (!key) |
| 46 return false; |
| 46 | 47 |
| 47 // In CryptoAPI, the IV, padding mode, and feedback register (for a chaining | 48 // In CryptoAPI, the IV, padding mode, and feedback register (for a chaining |
| 48 // mode) are properties of a key, so we have to create a copy of the key for | 49 // mode) are properties of a key, so we have to create a copy of the key for |
| 49 // the Encryptor. See the Remarks section of the CryptEncrypt MSDN page. | 50 // the Encryptor. See the Remarks section of the CryptEncrypt MSDN page. |
| 50 BOOL ok = CryptDuplicateKey(key->key(), NULL, 0, capi_key_.receive()); | 51 BOOL ok = CryptDuplicateKey(key->key(), NULL, 0, capi_key_.receive()); |
| 51 if (!ok) | 52 if (!ok) |
| 52 return false; | 53 return false; |
| 53 | 54 |
| 54 // CRYPT_MODE_CBC is the default for Microsoft Base Cryptographic Provider, | 55 // CRYPT_MODE_CBC is the default for Microsoft Base Cryptographic Provider, |
| 55 // but we set it anyway to be safe. | 56 // but we set it anyway to be safe. |
| (...skipping 19 matching lines...) Expand all Loading... |
| 75 ok = CryptSetKeyParam(capi_key_.get(), KP_PADDING, | 76 ok = CryptSetKeyParam(capi_key_.get(), KP_PADDING, |
| 76 reinterpret_cast<BYTE*>(&padding_method), 0); | 77 reinterpret_cast<BYTE*>(&padding_method), 0); |
| 77 if (!ok) | 78 if (!ok) |
| 78 return false; | 79 return false; |
| 79 | 80 |
| 80 return true; | 81 return true; |
| 81 } | 82 } |
| 82 | 83 |
| 83 bool Encryptor::Encrypt(const base::StringPiece& plaintext, | 84 bool Encryptor::Encrypt(const base::StringPiece& plaintext, |
| 84 std::string* ciphertext) { | 85 std::string* ciphertext) { |
| 86 if (plaintext.empty() && mode_ != CBC) |
| 87 return false; |
| 88 |
| 85 DWORD data_len = plaintext.size(); | 89 DWORD data_len = plaintext.size(); |
| 86 CHECK((data_len > 0u) || (mode_ == CBC)); | |
| 87 DWORD total_len = data_len + block_size_; | 90 DWORD total_len = data_len + block_size_; |
| 88 CHECK_GT(total_len, 0u); | 91 if (total_len == 0 || total_len + 1 < data_len) |
| 89 CHECK_GT(total_len + 1, data_len); | 92 return false; |
| 90 | 93 |
| 91 // CryptoAPI encrypts/decrypts in place. | 94 // CryptoAPI encrypts/decrypts in place. |
| 92 char* ciphertext_data = WriteInto(ciphertext, total_len + 1); | 95 char* output_data = WriteInto(ciphertext, total_len + 1); |
| 93 memcpy(ciphertext_data, plaintext.data(), data_len); | 96 memcpy(output_data, plaintext.data(), data_len); |
| 94 | 97 |
| 95 BOOL ok = CryptEncrypt(capi_key_.get(), NULL, TRUE, 0, | 98 BOOL ok = CryptEncrypt(capi_key_.get(), NULL, TRUE, 0, |
| 96 reinterpret_cast<BYTE*>(ciphertext_data), &data_len, | 99 reinterpret_cast<BYTE*>(output_data), &data_len, |
| 97 total_len); | 100 total_len); |
| 98 if (!ok) { | 101 if (!ok) |
| 99 ciphertext->clear(); | |
| 100 return false; | 102 return false; |
| 101 } | |
| 102 | 103 |
| 103 ciphertext->resize(data_len); | 104 ciphertext->resize(data_len); |
| 104 return true; | 105 return true; |
| 105 } | 106 } |
| 106 | 107 |
| 107 bool Encryptor::Decrypt(const base::StringPiece& ciphertext, | 108 bool Encryptor::Decrypt(const base::StringPiece& ciphertext, |
| 108 std::string* plaintext) { | 109 std::string* plaintext) { |
| 109 DWORD data_len = ciphertext.size(); | 110 DWORD data_len = ciphertext.size(); |
| 110 CHECK_GT(data_len, 0u); | 111 if (data_len == 0 || data_len + 1 < data_len) |
| 111 CHECK_GT(data_len + 1, data_len); | 112 return false; |
| 112 | 113 |
| 113 // CryptoAPI encrypts/decrypts in place. | 114 // CryptoAPI encrypts/decrypts in place. |
| 114 char* plaintext_data = WriteInto(plaintext, data_len + 1); | 115 char* output_data = WriteInto(plaintext, data_len + 1); |
| 115 memcpy(plaintext_data, ciphertext.data(), data_len); | 116 memcpy(output_data, ciphertext.data(), data_len); |
| 116 | 117 |
| 117 BOOL ok = CryptDecrypt(capi_key_.get(), NULL, TRUE, 0, | 118 BOOL ok = CryptDecrypt(capi_key_.get(), NULL, TRUE, 0, |
| 118 reinterpret_cast<BYTE*>(plaintext_data), &data_len); | 119 reinterpret_cast<BYTE*>(output_data), &data_len); |
| 119 if (!ok) { | 120 if (!ok) |
| 120 plaintext->clear(); | |
| 121 return false; | 121 return false; |
| 122 } | |
| 123 | 122 |
| 124 plaintext->resize(data_len); | 123 plaintext->resize(data_len); |
| 125 return true; | 124 return true; |
| 126 } | 125 } |
| 127 | 126 |
| 128 } // namespace crypto | 127 } // namespace crypto |
| OLD | NEW |