| Index: crypto/secure_hash_openssl.cc
|
| diff --git a/crypto/secure_hash_openssl.cc b/crypto/secure_hash_openssl.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..1033b8e25eb82993ffc0ebee65f5ce3fce2189e3
|
| --- /dev/null
|
| +++ b/crypto/secure_hash_openssl.cc
|
| @@ -0,0 +1,102 @@
|
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "crypto/secure_hash.h"
|
| +
|
| +#include <openssl/mem.h>
|
| +#include <openssl/sha.h>
|
| +
|
| +#include "base/basictypes.h"
|
| +#include "base/logging.h"
|
| +#include "base/pickle.h"
|
| +#include "crypto/openssl_util.h"
|
| +
|
| +namespace crypto {
|
| +
|
| +namespace {
|
| +
|
| +const char kSHA256Descriptor[] = "OpenSSL";
|
| +
|
| +class SecureHashSHA256OpenSSL : public SecureHash {
|
| + public:
|
| + static const int kSecureHashVersion = 1;
|
| +
|
| + SecureHashSHA256OpenSSL() {
|
| + SHA256_Init(&ctx_);
|
| + }
|
| +
|
| + ~SecureHashSHA256OpenSSL() override {
|
| + OPENSSL_cleanse(&ctx_, sizeof(ctx_));
|
| + }
|
| +
|
| + void Update(const void* input, size_t len) override {
|
| + SHA256_Update(&ctx_, static_cast<const unsigned char*>(input), len);
|
| + }
|
| +
|
| + void Finish(void* output, size_t len) override {
|
| + ScopedOpenSSLSafeSizeBuffer<SHA256_DIGEST_LENGTH> result(
|
| + static_cast<unsigned char*>(output), len);
|
| + SHA256_Final(result.safe_buffer(), &ctx_);
|
| + }
|
| +
|
| + bool Serialize(base::Pickle* pickle) override;
|
| + bool Deserialize(base::PickleIterator* data_iterator) override;
|
| +
|
| + private:
|
| + SHA256_CTX ctx_;
|
| +};
|
| +
|
| +bool SecureHashSHA256OpenSSL::Serialize(base::Pickle* pickle) {
|
| + if (!pickle)
|
| + return false;
|
| +
|
| + if (!pickle->WriteInt(kSecureHashVersion) ||
|
| + !pickle->WriteString(kSHA256Descriptor) ||
|
| + !pickle->WriteBytes(&ctx_, sizeof(ctx_))) {
|
| + return false;
|
| + }
|
| +
|
| + return true;
|
| +}
|
| +
|
| +bool SecureHashSHA256OpenSSL::Deserialize(base::PickleIterator* data_iterator) {
|
| + if (!data_iterator)
|
| + return false;
|
| +
|
| + int version;
|
| + if (!data_iterator->ReadInt(&version))
|
| + return false;
|
| +
|
| + if (version > kSecureHashVersion)
|
| + return false; // We don't know how to deal with this.
|
| +
|
| + std::string type;
|
| + if (!data_iterator->ReadString(&type))
|
| + return false;
|
| +
|
| + if (type != kSHA256Descriptor)
|
| + return false; // It's the wrong kind.
|
| +
|
| + const char* data = NULL;
|
| + if (!data_iterator->ReadBytes(&data, sizeof(ctx_)))
|
| + return false;
|
| +
|
| + memcpy(&ctx_, data, sizeof(ctx_));
|
| +
|
| + return true;
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +SecureHash* SecureHash::Create(Algorithm algorithm) {
|
| + switch (algorithm) {
|
| + case SHA256:
|
| + return new SecureHashSHA256OpenSSL();
|
| + default:
|
| + NOTIMPLEMENTED();
|
| + return NULL;
|
| + }
|
| +}
|
| +
|
| +} // namespace crypto
|
|
|