summaryrefslogtreecommitdiffstats
path: root/base/crypto/encryptor_nss.cc
diff options
context:
space:
mode:
Diffstat (limited to 'base/crypto/encryptor_nss.cc')
-rw-r--r--base/crypto/encryptor_nss.cc124
1 files changed, 124 insertions, 0 deletions
diff --git a/base/crypto/encryptor_nss.cc b/base/crypto/encryptor_nss.cc
new file mode 100644
index 0000000..78ddb64
--- /dev/null
+++ b/base/crypto/encryptor_nss.cc
@@ -0,0 +1,124 @@
+// Copyright (c) 2010 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "base/crypto/encryptor.h"
+
+#include <cryptohi.h>
+#include <vector>
+
+#include "base/logging.h"
+#include "base/nss_util.h"
+
+namespace base {
+
+Encryptor::Encryptor() {
+ EnsureNSSInit();
+}
+
+Encryptor::~Encryptor() {
+}
+
+bool Encryptor::Init(SymmetricKey* key, Mode mode, const std::string& iv) {
+ DCHECK(key);
+ DCHECK_EQ(CBC, mode);
+
+ mode_ = mode;
+ if (iv.size() != AES_BLOCK_SIZE)
+ return false;
+
+ slot_.reset(PK11_GetBestSlot(CKM_AES_CBC_PAD, NULL));
+ if (!slot_.get())
+ return false;
+
+ SECItem iv_item;
+ iv_item.type = siBuffer;
+ iv_item.data = reinterpret_cast<unsigned char*>(
+ const_cast<char *>(iv.data()));
+ iv_item.len = iv.size();
+
+ param_.reset(PK11_ParamFromIV(CKM_AES_CBC_PAD, &iv_item));
+ if (!param_.get())
+ return false;
+
+ key_.reset(key);
+ return true;
+}
+
+bool Encryptor::Encrypt(const std::string& plaintext, std::string* ciphertext) {
+ if (plaintext.size() == 0)
+ return false;
+
+ ScopedPK11Context context(PK11_CreateContextBySymKey(CKM_AES_CBC_PAD,
+ CKA_ENCRYPT,
+ key_->key(),
+ param_.get()));
+ if (!context.get())
+ return false;
+
+ size_t ciphertext_len = plaintext.size() + AES_BLOCK_SIZE;
+ std::vector<unsigned char> buffer(ciphertext_len);
+
+ int op_len;
+ SECStatus rv = PK11_CipherOp(context.get(),
+ &buffer[0],
+ &op_len,
+ ciphertext_len,
+ reinterpret_cast<unsigned char*>(
+ const_cast<char*>(plaintext.data())),
+ plaintext.size());
+ if (SECSuccess != rv)
+ return false;
+
+ unsigned int digest_len;
+ rv = PK11_DigestFinal(context.get(),
+ &buffer[op_len],
+ &digest_len,
+ ciphertext_len - op_len);
+ if (SECSuccess != rv)
+ return false;
+
+ ciphertext->assign(reinterpret_cast<char *>(&buffer[0]),
+ op_len + digest_len);
+ return true;
+}
+
+bool Encryptor::Decrypt(const std::string& ciphertext, std::string* plaintext) {
+ if (ciphertext.size() == 0)
+ return false;
+
+ ScopedPK11Context context(PK11_CreateContextBySymKey(CKM_AES_CBC_PAD,
+ CKA_DECRYPT,
+ key_->key(),
+ param_.get()));
+ if (!context.get())
+ return false;
+
+ size_t plaintext_len = ciphertext.size();
+ std::vector<unsigned char> buffer(plaintext_len);
+
+ int op_len;
+ SECStatus rv = PK11_CipherOp(context.get(),
+ &buffer[0],
+ &op_len,
+ plaintext_len,
+ reinterpret_cast<unsigned char*>(
+ const_cast<char*>(ciphertext.data())),
+ ciphertext.size());
+ if (SECSuccess != rv)
+ return false;
+
+ unsigned int digest_len;
+ rv = PK11_DigestFinal(context.get(),
+ &buffer[op_len],
+ &digest_len,
+ plaintext_len - op_len);
+ if (SECSuccess != rv)
+ return false;
+
+ plaintext->assign(reinterpret_cast<char *>(&buffer[0]),
+ op_len + digest_len);
+ return true;
+}
+
+} // namespace base