Chromium Code Reviews| Index: crypto/aead_openssl.cc |
| diff --git a/crypto/aead_openssl.cc b/crypto/aead_openssl.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..e32168a576b4b8b42fe39a6d53f2f81ea74f3cc8 |
| --- /dev/null |
| +++ b/crypto/aead_openssl.cc |
| @@ -0,0 +1,125 @@ |
| +// Copyright 2015 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "crypto/aead_openssl.h" |
| + |
| +#if defined(USE_OPENSSL) |
| + |
| +#include <openssl/aes.h> |
| +#include <openssl/evp.h> |
| +#include <string> |
| + |
| +#include "base/basictypes.h" |
| +#include "base/strings/string_util.h" |
| +#include "crypto/openssl_util.h" |
| + |
| +namespace crypto { |
| + |
| +Aead::Aead(AeadAlgorithm algorithm) : key_(nullptr) { |
| + EnsureOpenSSLInit(); |
| + switch (algorithm) { |
| + case AES_128_CTR_HMAC_SHA256: |
| + aead_ = EVP_aead_aes_128_ctr_hmac_sha256(); |
| + break; |
| + } |
| +} |
| + |
| +Aead::~Aead() { |
| +} |
| + |
| +void Aead::Init(const std::string* key) { |
| + DCHECK(!key_); |
| + DCHECK_EQ(KeyLength(), key->size()); |
| + key_ = key; |
|
agl
2015/04/23 20:09:22
This should be fixed up afterwards to do there key
|
| +} |
| + |
| +bool Aead::Seal(const base::StringPiece& plaintext, |
| + const base::StringPiece& nonce, |
| + const base::StringPiece& additional_data, |
| + std::string* ciphertext) const { |
| + DCHECK(key_); |
| + DCHECK_EQ(NonceLength(), nonce.size()); |
| + EVP_AEAD_CTX ctx; |
| + |
| + if (!EVP_AEAD_CTX_init(&ctx, aead_, |
| + reinterpret_cast<const uint8*>(key_->data()), |
| + key_->size(), EVP_AEAD_DEFAULT_TAG_LENGTH, nullptr)) { |
| + return false; |
| + } |
| + |
| + std::string result; |
| + const size_t max_output_length = |
| + EVP_AEAD_max_overhead(aead_) + plaintext.size(); |
| + size_t output_length; |
| + uint8* out_ptr = |
| + reinterpret_cast<uint8*>(WriteInto(&result, max_output_length + 1)); |
| + |
| + if (!EVP_AEAD_CTX_seal( |
| + &ctx, out_ptr, &output_length, max_output_length, |
| + reinterpret_cast<const uint8*>(nonce.data()), nonce.size(), |
| + reinterpret_cast<const uint8*>(plaintext.data()), plaintext.size(), |
| + reinterpret_cast<const uint8*>(additional_data.data()), |
| + additional_data.size())) { |
| + EVP_AEAD_CTX_cleanup(&ctx); |
| + return false; |
| + } |
| + |
| + DCHECK_LE(output_length, max_output_length); |
| + result.resize(output_length); |
| + |
| + ciphertext->swap(result); |
| + EVP_AEAD_CTX_cleanup(&ctx); |
| + |
| + return true; |
| +} |
| + |
| +bool Aead::Open(const base::StringPiece& ciphertext, |
| + const base::StringPiece& nonce, |
| + const base::StringPiece& additional_data, |
| + std::string* plaintext) const { |
| + DCHECK(key_); |
| + EVP_AEAD_CTX ctx; |
| + |
| + if (!EVP_AEAD_CTX_init(&ctx, aead_, |
| + reinterpret_cast<const uint8*>(key_->data()), |
| + key_->size(), EVP_AEAD_DEFAULT_TAG_LENGTH, nullptr)) { |
| + return false; |
| + } |
| + |
| + std::string result; |
| + const size_t max_output_length = ciphertext.size(); |
| + size_t output_length; |
| + uint8* out_ptr = |
| + reinterpret_cast<uint8*>(WriteInto(&result, max_output_length + 1)); |
| + |
| + if (!EVP_AEAD_CTX_open( |
| + &ctx, out_ptr, &output_length, max_output_length, |
| + reinterpret_cast<const uint8*>(nonce.data()), nonce.size(), |
| + reinterpret_cast<const uint8*>(ciphertext.data()), ciphertext.size(), |
| + reinterpret_cast<const uint8*>(additional_data.data()), |
| + additional_data.size())) { |
| + EVP_AEAD_CTX_cleanup(&ctx); |
| + return false; |
| + } |
| + |
| + DCHECK_LE(output_length, max_output_length); |
| + result.resize(output_length); |
| + |
| + plaintext->swap(result); |
| + EVP_AEAD_CTX_cleanup(&ctx); |
| + |
| + return true; |
| +} |
| + |
| +size_t Aead::KeyLength() const { |
| + return EVP_AEAD_key_length(aead_); |
| +} |
| + |
| +size_t Aead::NonceLength() const { |
| + return EVP_AEAD_nonce_length(aead_); |
| +} |
| + |
| +} // namespace |
| + |
| +#endif |