| Index: crypto/encryptor_win.cc
|
| diff --git a/crypto/encryptor_win.cc b/crypto/encryptor_win.cc
|
| index dc595198a4b420c31a303bd6f5ace6d78ad5d07e..c14c4e60b68d004a6656b568939f41b1ded58e4b 100644
|
| --- a/crypto/encryptor_win.cc
|
| +++ b/crypto/encryptor_win.cc
|
| @@ -41,8 +41,9 @@ Encryptor::~Encryptor() {
|
| bool Encryptor::Init(SymmetricKey* key,
|
| Mode mode,
|
| const base::StringPiece& iv) {
|
| - DCHECK(key);
|
| - DCHECK_EQ(CBC, mode) << "Unsupported mode of operation";
|
| + DCHECK_EQ(CBC, mode);
|
| + if (!key)
|
| + return false;
|
|
|
| // In CryptoAPI, the IV, padding mode, and feedback register (for a chaining
|
| // mode) are properties of a key, so we have to create a copy of the key for
|
| @@ -82,23 +83,23 @@ bool Encryptor::Init(SymmetricKey* key,
|
|
|
| bool Encryptor::Encrypt(const base::StringPiece& plaintext,
|
| std::string* ciphertext) {
|
| + if (plaintext.empty() && mode_ != CBC)
|
| + return false;
|
| +
|
| DWORD data_len = plaintext.size();
|
| - CHECK((data_len > 0u) || (mode_ == CBC));
|
| DWORD total_len = data_len + block_size_;
|
| - CHECK_GT(total_len, 0u);
|
| - CHECK_GT(total_len + 1, data_len);
|
| + if (total_len == 0 || total_len + 1 < data_len)
|
| + return false;
|
|
|
| // CryptoAPI encrypts/decrypts in place.
|
| - char* ciphertext_data = WriteInto(ciphertext, total_len + 1);
|
| - memcpy(ciphertext_data, plaintext.data(), data_len);
|
| + char* output_data = WriteInto(ciphertext, total_len + 1);
|
| + memcpy(output_data, plaintext.data(), data_len);
|
|
|
| BOOL ok = CryptEncrypt(capi_key_.get(), NULL, TRUE, 0,
|
| - reinterpret_cast<BYTE*>(ciphertext_data), &data_len,
|
| + reinterpret_cast<BYTE*>(output_data), &data_len,
|
| total_len);
|
| - if (!ok) {
|
| - ciphertext->clear();
|
| + if (!ok)
|
| return false;
|
| - }
|
|
|
| ciphertext->resize(data_len);
|
| return true;
|
| @@ -107,19 +108,17 @@ bool Encryptor::Encrypt(const base::StringPiece& plaintext,
|
| bool Encryptor::Decrypt(const base::StringPiece& ciphertext,
|
| std::string* plaintext) {
|
| DWORD data_len = ciphertext.size();
|
| - CHECK_GT(data_len, 0u);
|
| - CHECK_GT(data_len + 1, data_len);
|
| + if (data_len == 0 || data_len + 1 < data_len)
|
| + return false;
|
|
|
| // CryptoAPI encrypts/decrypts in place.
|
| - char* plaintext_data = WriteInto(plaintext, data_len + 1);
|
| - memcpy(plaintext_data, ciphertext.data(), data_len);
|
| + char* output_data = WriteInto(plaintext, data_len + 1);
|
| + memcpy(output_data, ciphertext.data(), data_len);
|
|
|
| BOOL ok = CryptDecrypt(capi_key_.get(), NULL, TRUE, 0,
|
| - reinterpret_cast<BYTE*>(plaintext_data), &data_len);
|
| - if (!ok) {
|
| - plaintext->clear();
|
| + reinterpret_cast<BYTE*>(output_data), &data_len);
|
| + if (!ok)
|
| return false;
|
| - }
|
|
|
| plaintext->resize(data_len);
|
| return true;
|
|
|