summaryrefslogtreecommitdiffstats
path: root/crypto/encryptor_nss.cc
diff options
context:
space:
mode:
authorrvargas@google.com <rvargas@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2011-04-14 17:37:14 +0000
committerrvargas@google.com <rvargas@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2011-04-14 17:37:14 +0000
commit4b559b4ddffc0b7f688019bcb80658f05e063af7 (patch)
tree0be21d8914de707f5125d2cb66733cbcf088606c /crypto/encryptor_nss.cc
parent056dd45d610de34312344445d7b078a31f4a1e20 (diff)
downloadchromium_src-4b559b4ddffc0b7f688019bcb80658f05e063af7.zip
chromium_src-4b559b4ddffc0b7f688019bcb80658f05e063af7.tar.gz
chromium_src-4b559b4ddffc0b7f688019bcb80658f05e063af7.tar.bz2
Move crypto files out of base, to a top level directory.
src/crypto is now an independent project that contains our cryptographic primitives (except md5 and sha1). This removes the base dependency from nss, openssl and sqlite. BUG=76996 TEST=none Review URL: http://codereview.chromium.org/6805019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@81611 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'crypto/encryptor_nss.cc')
-rw-r--r--crypto/encryptor_nss.cc125
1 files changed, 125 insertions, 0 deletions
diff --git a/crypto/encryptor_nss.cc b/crypto/encryptor_nss.cc
new file mode 100644
index 0000000..aaa6626
--- /dev/null
+++ b/crypto/encryptor_nss.cc
@@ -0,0 +1,125 @@
+// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "crypto/encryptor.h"
+
+#include <cryptohi.h>
+#include <vector>
+
+#include "base/logging.h"
+#include "crypto/nss_util.h"
+#include "crypto/symmetric_key.h"
+
+namespace crypto {
+
+Encryptor::Encryptor()
+ : key_(NULL),
+ mode_(CBC) {
+ EnsureNSSInit();
+}
+
+Encryptor::~Encryptor() {
+}
+
+bool Encryptor::Init(SymmetricKey* key, Mode mode, const std::string& iv) {
+ DCHECK(key);
+ DCHECK_EQ(CBC, mode);
+
+ key_ = key;
+ mode_ = mode;
+
+ if (iv.size() != AES_BLOCK_SIZE)
+ return false;
+
+ slot_.reset(PK11_GetBestSlot(CKM_AES_CBC_PAD, NULL));
+ if (!slot_.get())
+ return false;
+
+ SECItem iv_item;
+ iv_item.type = siBuffer;
+ iv_item.data = reinterpret_cast<unsigned char*>(
+ const_cast<char *>(iv.data()));
+ iv_item.len = iv.size();
+
+ param_.reset(PK11_ParamFromIV(CKM_AES_CBC_PAD, &iv_item));
+ if (!param_.get())
+ return false;
+
+ return true;
+}
+
+bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) {
+ ScopedPK11Context context(PK11_CreateContextBySymKey(CKM_AES_CBC_PAD,
+ CKA_ENCRYPT,
+ key_->key(),
+ param_.get()));
+ if (!context.get())
+ return false;
+
+ size_t ciphertext_len = plaintext.size() + AES_BLOCK_SIZE;
+ std::vector<unsigned char> buffer(ciphertext_len);
+
+ int op_len;
+ SECStatus rv = PK11_CipherOp(context.get(),
+ &buffer[0],
+ &op_len,
+ ciphertext_len,
+ reinterpret_cast<unsigned char*>(
+ const_cast<char*>(plaintext.data())),
+ plaintext.size());
+ if (SECSuccess != rv)
+ return false;
+
+ unsigned int digest_len;
+ rv = PK11_DigestFinal(context.get(),
+ &buffer[op_len],
+ &digest_len,
+ ciphertext_len - op_len);
+ if (SECSuccess != rv)
+ return false;
+
+ ciphertext->assign(reinterpret_cast<char *>(&buffer[0]),
+ op_len + digest_len);
+ return true;
+}
+
+bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) {
+ if (ciphertext.empty())
+ return false;
+
+ ScopedPK11Context context(PK11_CreateContextBySymKey(CKM_AES_CBC_PAD,
+ CKA_DECRYPT,
+ key_->key(),
+ param_.get()));
+ if (!context.get())
+ return false;
+
+ size_t plaintext_len = ciphertext.size();
+ std::vector<unsigned char> buffer(plaintext_len);
+
+ int op_len;
+ SECStatus rv = PK11_CipherOp(context.get(),
+ &buffer[0],
+ &op_len,
+ plaintext_len,
+ reinterpret_cast<unsigned char*>(
+ const_cast<char*>(ciphertext.data())),
+ ciphertext.size());
+ if (SECSuccess != rv)
+ return false;
+
+ unsigned int digest_len;
+ rv = PK11_DigestFinal(context.get(),
+ &buffer[op_len],
+ &digest_len,
+ plaintext_len - op_len);
+ if (SECSuccess != rv)
+ return false;
+
+ plaintext->assign(reinterpret_cast<char *>(&buffer[0]),
+ op_len + digest_len);
+ return true;
+}
+
+} // namespace crypto