mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-05-04 02:08:53 +00:00
Just take ReadonlyBytes instead of a raw pointer. Fixes #7072 (tested with the ASAN build fixed by #7060).
122 lines
3.7 KiB
C++
122 lines
3.7 KiB
C++
/*
|
|
* Copyright (c) 2020, Ali Mohammad Pur <mpfard@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#pragma once
|
|
|
|
#include <AK/String.h>
|
|
#include <AK/StringBuilder.h>
|
|
#include <AK/StringView.h>
|
|
#include <LibCrypto/Cipher/Mode/Mode.h>
|
|
|
|
namespace Crypto {
|
|
namespace Cipher {
|
|
|
|
template<typename T>
|
|
class CBC : public Mode<T> {
|
|
public:
|
|
constexpr static size_t IVSizeInBits = 128;
|
|
|
|
virtual ~CBC() { }
|
|
template<typename... Args>
|
|
explicit constexpr CBC<T>(Args... args)
|
|
: Mode<T>(args...)
|
|
{
|
|
}
|
|
|
|
virtual String class_name() const override
|
|
{
|
|
StringBuilder builder;
|
|
builder.append(this->cipher().class_name());
|
|
builder.append("_CBC");
|
|
return builder.build();
|
|
}
|
|
|
|
virtual size_t IV_length() const override { return IVSizeInBits / 8; }
|
|
|
|
virtual void encrypt(ReadonlyBytes in, Bytes& out, ReadonlyBytes ivec = {}, Bytes* ivec_out = nullptr) override
|
|
{
|
|
auto length = in.size();
|
|
if (length == 0)
|
|
return;
|
|
|
|
auto& cipher = this->cipher();
|
|
|
|
// FIXME: We should have two of these encrypt/decrypt functions that
|
|
// we SFINAE out based on whether the Cipher mode needs an ivec
|
|
VERIFY(!ivec.is_empty());
|
|
ReadonlyBytes iv = ivec;
|
|
|
|
m_cipher_block.set_padding_mode(cipher.padding_mode());
|
|
size_t offset { 0 };
|
|
auto block_size = cipher.block_size();
|
|
|
|
while (length >= block_size) {
|
|
m_cipher_block.overwrite(in.slice(offset, block_size));
|
|
m_cipher_block.apply_initialization_vector(iv);
|
|
cipher.encrypt_block(m_cipher_block, m_cipher_block);
|
|
VERIFY(offset + block_size <= out.size());
|
|
__builtin_memcpy(out.offset(offset), m_cipher_block.bytes().data(), block_size);
|
|
iv = out.slice(offset);
|
|
length -= block_size;
|
|
offset += block_size;
|
|
}
|
|
|
|
if (length > 0) {
|
|
m_cipher_block.overwrite(in.slice(offset, length));
|
|
m_cipher_block.apply_initialization_vector(iv);
|
|
cipher.encrypt_block(m_cipher_block, m_cipher_block);
|
|
VERIFY(offset + block_size <= out.size());
|
|
__builtin_memcpy(out.offset(offset), m_cipher_block.bytes().data(), block_size);
|
|
iv = out.slice(offset);
|
|
}
|
|
|
|
if (ivec_out)
|
|
__builtin_memcpy(ivec_out->data(), iv.data(), min(IV_length(), ivec_out->size()));
|
|
}
|
|
|
|
virtual void decrypt(ReadonlyBytes in, Bytes& out, ReadonlyBytes ivec = {}) override
|
|
{
|
|
auto length = in.size();
|
|
if (length == 0)
|
|
return;
|
|
|
|
auto& cipher = this->cipher();
|
|
|
|
VERIFY(!ivec.is_empty());
|
|
ReadonlyBytes iv = ivec;
|
|
|
|
auto block_size = cipher.block_size();
|
|
|
|
// if the data is not aligned, it's not correct encrypted data
|
|
// FIXME (ponder): Should we simply decrypt as much as we can?
|
|
VERIFY(length % block_size == 0);
|
|
|
|
m_cipher_block.set_padding_mode(cipher.padding_mode());
|
|
size_t offset { 0 };
|
|
|
|
while (length > 0) {
|
|
auto slice = in.slice(offset);
|
|
m_cipher_block.overwrite(slice.data(), block_size);
|
|
cipher.decrypt_block(m_cipher_block, m_cipher_block);
|
|
m_cipher_block.apply_initialization_vector(iv);
|
|
auto decrypted = m_cipher_block.bytes();
|
|
VERIFY(offset + decrypted.size() <= out.size());
|
|
__builtin_memcpy(out.offset(offset), decrypted.data(), decrypted.size());
|
|
iv = slice;
|
|
length -= block_size;
|
|
offset += block_size;
|
|
}
|
|
out = out.slice(0, offset);
|
|
this->prune_padding(out);
|
|
}
|
|
|
|
private:
|
|
typename T::BlockType m_cipher_block {};
|
|
};
|
|
|
|
}
|
|
|
|
}
|