1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "crypto/encryptor.h"
7 #include <openssl/aes.h>
8 #include <openssl/evp.h>
10 #include "base/logging.h"
11 #include "base/strings/string_util.h"
12 #include "crypto/openssl_util.h"
13 #include "crypto/symmetric_key.h"
19 const EVP_CIPHER
* GetCipherForKey(SymmetricKey
* key
) {
20 switch (key
->key().length()) {
21 case 16: return EVP_aes_128_cbc();
22 case 32: return EVP_aes_256_cbc();
27 // On destruction this class will cleanup the ctx, and also clear the OpenSSL
28 // ERR stack as a convenience.
29 class ScopedCipherCTX
{
31 explicit ScopedCipherCTX() {
32 EVP_CIPHER_CTX_init(&ctx_
);
35 EVP_CIPHER_CTX_cleanup(&ctx_
);
36 ClearOpenSSLERRStack(FROM_HERE
);
38 EVP_CIPHER_CTX
* get() { return &ctx_
; }
46 Encryptor::Encryptor()
51 Encryptor::~Encryptor() {
54 bool Encryptor::Init(SymmetricKey
* key
,
56 const base::StringPiece
& iv
) {
58 DCHECK(mode
== CBC
|| mode
== CTR
);
61 if (mode
== CBC
&& iv
.size() != AES_BLOCK_SIZE
)
64 if (GetCipherForKey(key
) == NULL
)
69 iv
.CopyToString(&iv_
);
73 bool Encryptor::Encrypt(const base::StringPiece
& plaintext
,
74 std::string
* ciphertext
) {
75 CHECK(!plaintext
.empty() || (mode_
== CBC
));
76 return (mode_
== CTR
) ?
77 CryptCTR(true, plaintext
, ciphertext
) :
78 Crypt(true, plaintext
, ciphertext
);
81 bool Encryptor::Decrypt(const base::StringPiece
& ciphertext
,
82 std::string
* plaintext
) {
83 CHECK(!ciphertext
.empty());
84 return (mode_
== CTR
) ?
85 CryptCTR(false, ciphertext
, plaintext
) :
86 Crypt(false, ciphertext
, plaintext
);
89 bool Encryptor::Crypt(bool do_encrypt
,
90 const base::StringPiece
& input
,
91 std::string
* output
) {
92 DCHECK(key_
); // Must call Init() before En/De-crypt.
93 // Work on the result in a local variable, and then only transfer it to
94 // |output| on success to ensure no partial data is returned.
98 const EVP_CIPHER
* cipher
= GetCipherForKey(key_
);
99 DCHECK(cipher
); // Already handled in Init();
101 const std::string
& key
= key_
->key();
102 DCHECK_EQ(EVP_CIPHER_iv_length(cipher
), iv_
.length());
103 DCHECK_EQ(EVP_CIPHER_key_length(cipher
), key
.length());
106 if (!EVP_CipherInit_ex(ctx
.get(), cipher
, NULL
,
107 reinterpret_cast<const uint8
*>(key
.data()),
108 reinterpret_cast<const uint8
*>(iv_
.data()),
112 // When encrypting, add another block size of space to allow for any padding.
113 const size_t output_size
= input
.size() + (do_encrypt
? iv_
.size() : 0);
114 CHECK_GT(output_size
, 0u);
115 CHECK_GT(output_size
+ 1, input
.size());
117 reinterpret_cast<uint8
*>(base::WriteInto(&result
, output_size
+ 1));
119 if (!EVP_CipherUpdate(ctx
.get(), out_ptr
, &out_len
,
120 reinterpret_cast<const uint8
*>(input
.data()),
124 // Write out the final block plus padding (if any) to the end of the data
127 if (!EVP_CipherFinal_ex(ctx
.get(), out_ptr
+ out_len
, &tail_len
))
131 DCHECK_LE(out_len
, static_cast<int>(output_size
));
132 result
.resize(out_len
);
134 output
->swap(result
);
138 bool Encryptor::CryptCTR(bool do_encrypt
,
139 const base::StringPiece
& input
,
140 std::string
* output
) {
141 if (!counter_
.get()) {
142 LOG(ERROR
) << "Counter value not set in CTR mode.";
147 if (AES_set_encrypt_key(reinterpret_cast<const uint8
*>(key_
->key().data()),
148 key_
->key().size() * 8, &aes_key
) != 0) {
152 const size_t out_size
= input
.size();
153 CHECK_GT(out_size
, 0u);
154 CHECK_GT(out_size
+ 1, input
.size());
158 reinterpret_cast<uint8
*>(base::WriteInto(&result
, out_size
+ 1));
160 uint8_t ivec
[AES_BLOCK_SIZE
] = { 0 };
161 uint8_t ecount_buf
[AES_BLOCK_SIZE
] = { 0 };
162 unsigned int block_offset
= 0;
164 counter_
->Write(ivec
);
166 AES_ctr128_encrypt(reinterpret_cast<const uint8
*>(input
.data()), out_ptr
,
167 input
.size(), &aes_key
, ivec
, ecount_buf
, &block_offset
);
169 // AES_ctr128_encrypt() updates |ivec|. Update the |counter_| here.
170 SetCounter(base::StringPiece(reinterpret_cast<const char*>(ivec
),
173 output
->swap(result
);
177 } // namespace crypto