OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include <cryptohi.h> | |
6 | |
7 #include "content/child/webcrypto/crypto_data.h" | |
8 #include "content/child/webcrypto/nss/aes_key_nss.h" | |
9 #include "content/child/webcrypto/nss/key_nss.h" | |
10 #include "content/child/webcrypto/nss/util_nss.h" | |
11 #include "content/child/webcrypto/status.h" | |
12 #include "content/child/webcrypto/webcrypto_util.h" | |
13 #include "crypto/scoped_nss_types.h" | |
14 #include "third_party/WebKit/public/platform/WebCryptoAlgorithmParams.h" | |
15 | |
16 namespace content { | |
17 | |
18 namespace webcrypto { | |
19 | |
20 namespace { | |
21 | |
22 Status AesCbcEncryptDecrypt(EncryptOrDecrypt mode, | |
23 const blink::WebCryptoAlgorithm& algorithm, | |
24 const blink::WebCryptoKey& key, | |
25 const CryptoData& data, | |
26 std::vector<uint8>* buffer) { | |
27 const blink::WebCryptoAesCbcParams* params = algorithm.aesCbcParams(); | |
28 if (!params) | |
29 return Status::ErrorUnexpected(); | |
30 | |
31 CryptoData iv(params->iv().data(), params->iv().size()); | |
32 if (iv.byte_length() != 16) | |
33 return Status::ErrorIncorrectSizeAesCbcIv(); | |
34 | |
35 PK11SymKey* sym_key = SymKeyNss::Cast(key)->key(); | |
36 | |
37 CK_ATTRIBUTE_TYPE operation = (mode == ENCRYPT) ? CKA_ENCRYPT : CKA_DECRYPT; | |
38 | |
39 SECItem iv_item = MakeSECItemForBuffer(iv); | |
40 | |
41 crypto::ScopedSECItem param(PK11_ParamFromIV(CKM_AES_CBC_PAD, &iv_item)); | |
42 if (!param) | |
43 return Status::OperationError(); | |
44 | |
45 crypto::ScopedPK11Context context(PK11_CreateContextBySymKey( | |
46 CKM_AES_CBC_PAD, operation, sym_key, param.get())); | |
47 | |
48 if (!context.get()) | |
49 return Status::OperationError(); | |
50 | |
51 // Oddly PK11_CipherOp takes input and output lengths as "int" rather than | |
52 // "unsigned int". Do some checks now to avoid integer overflowing. | |
53 if (data.byte_length() >= INT_MAX - AES_BLOCK_SIZE) { | |
54 // TODO(eroman): Handle this by chunking the input fed into NSS. Right now | |
55 // it doesn't make much difference since the one-shot API would end up | |
56 // blowing out the memory and crashing anyway. | |
57 return Status::ErrorDataTooLarge(); | |
58 } | |
59 | |
60 // PK11_CipherOp does an invalid memory access when given empty decryption | |
61 // input, or input which is not a multiple of the block size. See also | |
62 // https://bugzilla.mozilla.com/show_bug.cgi?id=921687. | |
63 if (operation == CKA_DECRYPT && | |
64 (data.byte_length() == 0 || (data.byte_length() % AES_BLOCK_SIZE != 0))) { | |
65 return Status::OperationError(); | |
66 } | |
67 | |
68 // TODO(eroman): Refine the output buffer size. It can be computed exactly for | |
69 // encryption, and can be smaller for decryption. | |
70 unsigned int output_max_len = data.byte_length() + AES_BLOCK_SIZE; | |
71 CHECK_GT(output_max_len, data.byte_length()); | |
72 | |
73 buffer->resize(output_max_len); | |
74 | |
75 unsigned char* buffer_data = Uint8VectorStart(buffer); | |
76 | |
77 int output_len; | |
78 if (SECSuccess != PK11_CipherOp(context.get(), | |
79 buffer_data, | |
80 &output_len, | |
81 buffer->size(), | |
82 data.bytes(), | |
83 data.byte_length())) { | |
84 return Status::OperationError(); | |
85 } | |
86 | |
87 unsigned int final_output_chunk_len; | |
88 if (SECSuccess != PK11_DigestFinal(context.get(), | |
89 buffer_data + output_len, | |
90 &final_output_chunk_len, | |
91 output_max_len - output_len)) { | |
92 return Status::OperationError(); | |
93 } | |
94 | |
95 buffer->resize(final_output_chunk_len + output_len); | |
96 return Status::Success(); | |
97 } | |
98 | |
99 class AesCbcImplementation : public AesAlgorithm { | |
100 public: | |
101 AesCbcImplementation() : AesAlgorithm(CKM_AES_CBC, "CBC") {} | |
102 | |
103 virtual Status Encrypt(const blink::WebCryptoAlgorithm& algorithm, | |
104 const blink::WebCryptoKey& key, | |
105 const CryptoData& data, | |
106 std::vector<uint8>* buffer) const OVERRIDE { | |
107 return AesCbcEncryptDecrypt(ENCRYPT, algorithm, key, data, buffer); | |
108 } | |
109 | |
110 virtual Status Decrypt(const blink::WebCryptoAlgorithm& algorithm, | |
111 const blink::WebCryptoKey& key, | |
112 const CryptoData& data, | |
113 std::vector<uint8>* buffer) const OVERRIDE { | |
114 return AesCbcEncryptDecrypt(DECRYPT, algorithm, key, data, buffer); | |
115 } | |
116 }; | |
117 | |
118 } // namespace | |
119 | |
120 AlgorithmImplementation* CreatePlatformAesCbcImplementation() { | |
121 return new AesCbcImplementation; | |
122 } | |
123 | |
124 } // namespace webcrypto | |
125 | |
126 } // namespace content | |
OLD | NEW |