1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109
|
// Copyright 2014 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <stddef.h>
#include <stdint.h>
#include <memory>
#include <vector>
#include "base/location.h"
#include "base/numerics/safe_math.h"
#include "components/webcrypto/algorithms/aes.h"
#include "components/webcrypto/blink_key_handle.h"
#include "components/webcrypto/status.h"
#include "crypto/openssl_util.h"
#include "third_party/boringssl/src/include/openssl/aes.h"
namespace webcrypto {
namespace {
class AesKwImplementation : public AesAlgorithm {
public:
AesKwImplementation()
: AesAlgorithm(blink::kWebCryptoKeyUsageWrapKey |
blink::kWebCryptoKeyUsageUnwrapKey,
"KW") {}
Status Encrypt(const blink::WebCryptoAlgorithm& algorithm,
const blink::WebCryptoKey& key,
base::span<const uint8_t> data,
std::vector<uint8_t>* buffer) const override {
crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
// These length checks are done in order to give a more specific
// error. These are not required for correctness.
if (data.size() < 16)
return Status::ErrorDataTooSmall();
if (data.size() % 8)
return Status::ErrorInvalidAesKwDataLength();
// Key import validates key sizes, so the bits computation will not
// overflow.
const std::vector<uint8_t>& raw_key = GetSymmetricKeyData(key);
AES_KEY aes_key;
if (AES_set_encrypt_key(raw_key.data(),
static_cast<unsigned>(raw_key.size() * 8),
&aes_key) < 0) {
return Status::OperationError();
}
// Key wrap's overhead is 8 bytes.
base::CheckedNumeric<size_t> length(data.size());
length += 8;
if (!length.IsValid())
return Status::ErrorDataTooLarge();
buffer->resize(length.ValueOrDie());
if (AES_wrap_key(&aes_key, nullptr /* default IV */, buffer->data(),
data.data(), data.size()) < 0) {
return Status::OperationError();
}
return Status::Success();
}
Status Decrypt(const blink::WebCryptoAlgorithm& algorithm,
const blink::WebCryptoKey& key,
base::span<const uint8_t> data,
std::vector<uint8_t>* buffer) const override {
crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE);
// These length checks are done in order to give a more specific
// error. These are not required for correctness.
if (data.size() < 24)
return Status::ErrorDataTooSmall();
if (data.size() % 8)
return Status::ErrorInvalidAesKwDataLength();
// Key import validates key sizes, so the bits computation will not
// overflow.
const std::vector<uint8_t>& raw_key = GetSymmetricKeyData(key);
AES_KEY aes_key;
if (AES_set_decrypt_key(raw_key.data(),
static_cast<unsigned>(raw_key.size() * 8),
&aes_key) < 0) {
return Status::OperationError();
}
// Key wrap's overhead is 8 bytes.
buffer->resize(data.size() - 8);
if (AES_unwrap_key(&aes_key, nullptr /* default IV */, buffer->data(),
data.data(), data.size()) < 0) {
return Status::OperationError();
}
return Status::Success();
}
};
} // namespace
std::unique_ptr<AlgorithmImplementation> CreateAesKwImplementation() {
return std::make_unique<AesKwImplementation>();
}
} // namespace webcrypto
|