mirror of
https://github.com/RGBCube/serenity
synced 2025-05-20 09:35:08 +00:00
LibCrypto: Format all files with clang-format 10
This commit is contained in:
parent
d52ea37717
commit
d497521d2b
4 changed files with 85 additions and 86 deletions
|
@ -89,7 +89,7 @@ struct AESCipherKey : public CipherKey {
|
||||||
expand_decrypt_key(user_key, key_bits);
|
expand_decrypt_key(user_key, key_bits);
|
||||||
}
|
}
|
||||||
|
|
||||||
virtual ~AESCipherKey() override {}
|
virtual ~AESCipherKey() override { }
|
||||||
|
|
||||||
size_t rounds() const { return m_rounds; }
|
size_t rounds() const { return m_rounds; }
|
||||||
size_t length() const { return m_bits / 8; }
|
size_t length() const { return m_bits / 8; }
|
||||||
|
|
|
@ -39,7 +39,7 @@ enum class Intent {
|
||||||
};
|
};
|
||||||
|
|
||||||
enum class PaddingMode {
|
enum class PaddingMode {
|
||||||
CMS, // RFC 1423
|
CMS, // RFC 1423
|
||||||
RFC5246, // very similar to CMS, but filled with |length - 1|, instead of |length|
|
RFC5246, // very similar to CMS, but filled with |length - 1|, instead of |length|
|
||||||
Null,
|
Null,
|
||||||
// FIXME: We do not implement these yet
|
// FIXME: We do not implement these yet
|
||||||
|
@ -137,4 +137,3 @@ private:
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -33,100 +33,100 @@
|
||||||
namespace Crypto {
|
namespace Crypto {
|
||||||
namespace Cipher {
|
namespace Cipher {
|
||||||
|
|
||||||
template <typename T>
|
template<typename T>
|
||||||
class CBC : public Mode<T> {
|
class CBC : public Mode<T> {
|
||||||
public:
|
public:
|
||||||
constexpr static size_t IVSizeInBits = 128;
|
constexpr static size_t IVSizeInBits = 128;
|
||||||
|
|
||||||
virtual ~CBC() {}
|
virtual ~CBC() { }
|
||||||
template <typename... Args>
|
template<typename... Args>
|
||||||
explicit constexpr CBC<T>(Args... args)
|
explicit constexpr CBC<T>(Args... args)
|
||||||
: Mode<T>(args...)
|
: Mode<T>(args...)
|
||||||
{
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
virtual String class_name() const override
|
||||||
|
{
|
||||||
|
StringBuilder builder;
|
||||||
|
builder.append(this->cipher().class_name());
|
||||||
|
builder.append("_CBC");
|
||||||
|
return builder.build();
|
||||||
|
}
|
||||||
|
|
||||||
|
virtual size_t IV_length() const { return IVSizeInBits / 8; }
|
||||||
|
|
||||||
|
virtual Optional<ByteBuffer> encrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
||||||
|
{
|
||||||
|
auto length = in.size();
|
||||||
|
if (length == 0)
|
||||||
|
return {};
|
||||||
|
|
||||||
|
auto& cipher = this->cipher();
|
||||||
|
|
||||||
|
// FIXME: We should have two of these encrypt/decrypt functions that
|
||||||
|
// we SFINAE out based on whether the Cipher mode needs an ivec
|
||||||
|
ASSERT(ivec.has_value());
|
||||||
|
const auto* iv = ivec.value().data();
|
||||||
|
|
||||||
|
typename T::BlockType block { cipher.padding_mode() };
|
||||||
|
size_t offset { 0 };
|
||||||
|
auto block_size = cipher.block_size();
|
||||||
|
|
||||||
|
while (length >= block_size) {
|
||||||
|
block.overwrite(in.slice_view(offset, block_size));
|
||||||
|
block.apply_initialization_vector(iv);
|
||||||
|
cipher.encrypt_block(block, block);
|
||||||
|
out.overwrite(offset, block.get().data(), block_size);
|
||||||
|
iv = out.offset_pointer(offset);
|
||||||
|
length -= block_size;
|
||||||
|
offset += block_size;
|
||||||
}
|
}
|
||||||
|
|
||||||
virtual String class_name() const override
|
if (length > 0) {
|
||||||
{
|
block.overwrite(in.slice_view(offset, length));
|
||||||
StringBuilder builder;
|
block.apply_initialization_vector(iv);
|
||||||
builder.append(this->cipher().class_name());
|
cipher.encrypt_block(block, block);
|
||||||
builder.append("_CBC");
|
out.overwrite(offset, block.get().data(), block_size);
|
||||||
return builder.build();
|
iv = out.offset_pointer(offset);
|
||||||
}
|
}
|
||||||
|
|
||||||
virtual size_t IV_length() const { return IVSizeInBits / 8; }
|
return ByteBuffer::copy(iv, block_size);
|
||||||
|
}
|
||||||
|
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
||||||
|
{
|
||||||
|
auto length = in.size();
|
||||||
|
if (length == 0)
|
||||||
|
return;
|
||||||
|
|
||||||
virtual Optional<ByteBuffer> encrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
auto& cipher = this->cipher();
|
||||||
{
|
|
||||||
auto length = in.size();
|
|
||||||
if (length == 0)
|
|
||||||
return {};
|
|
||||||
|
|
||||||
auto& cipher = this->cipher();
|
ASSERT(ivec.has_value());
|
||||||
|
const auto* iv = ivec.value().data();
|
||||||
|
|
||||||
// FIXME: We should have two of these encrypt/decrypt functions that
|
auto block_size = cipher.block_size();
|
||||||
// we SFINAE out based on whether the Cipher mode needs an ivec
|
|
||||||
ASSERT(ivec.has_value());
|
|
||||||
const auto* iv = ivec.value().data();
|
|
||||||
|
|
||||||
typename T::BlockType block { cipher.padding_mode() };
|
// if the data is not aligned, it's not correct encrypted data
|
||||||
size_t offset { 0 };
|
// FIXME (ponder): Should we simply decrypt as much as we can?
|
||||||
auto block_size = cipher.block_size();
|
ASSERT(length % block_size == 0);
|
||||||
|
|
||||||
while (length >= block_size) {
|
typename T::BlockType block { cipher.padding_mode() };
|
||||||
block.overwrite(in.slice_view(offset, block_size));
|
size_t offset { 0 };
|
||||||
block.apply_initialization_vector(iv);
|
|
||||||
cipher.encrypt_block(block, block);
|
|
||||||
out.overwrite(offset, block.get().data(), block_size);
|
|
||||||
iv = out.offset_pointer(offset);
|
|
||||||
length -= block_size;
|
|
||||||
offset += block_size;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (length > 0) {
|
while (length > 0) {
|
||||||
block.overwrite(in.slice_view(offset, length));
|
auto* slice = in.offset_pointer(offset);
|
||||||
block.apply_initialization_vector(iv);
|
block.overwrite(slice, block_size);
|
||||||
cipher.encrypt_block(block, block);
|
cipher.decrypt_block(block, block);
|
||||||
out.overwrite(offset, block.get().data(), block_size);
|
block.apply_initialization_vector(iv);
|
||||||
iv = out.offset_pointer(offset);
|
auto decrypted = block.get();
|
||||||
}
|
out.overwrite(offset, decrypted.data(), decrypted.size());
|
||||||
|
iv = slice;
|
||||||
return ByteBuffer::copy(iv, block_size);
|
length -= block_size;
|
||||||
|
offset += block_size;
|
||||||
}
|
}
|
||||||
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out, Optional<ByteBuffer> ivec = {}) override
|
out.trim(offset);
|
||||||
{
|
this->prune_padding(out);
|
||||||
auto length = in.size();
|
}
|
||||||
if (length == 0)
|
};
|
||||||
return;
|
|
||||||
|
|
||||||
auto& cipher = this->cipher();
|
|
||||||
|
|
||||||
ASSERT(ivec.has_value());
|
|
||||||
const auto* iv = ivec.value().data();
|
|
||||||
|
|
||||||
auto block_size = cipher.block_size();
|
|
||||||
|
|
||||||
// if the data is not aligned, it's not correct encrypted data
|
|
||||||
// FIXME (ponder): Should we simply decrypt as much as we can?
|
|
||||||
ASSERT(length % block_size == 0);
|
|
||||||
|
|
||||||
typename T::BlockType block { cipher.padding_mode() };
|
|
||||||
size_t offset { 0 };
|
|
||||||
|
|
||||||
while (length > 0) {
|
|
||||||
auto* slice = in.offset_pointer(offset);
|
|
||||||
block.overwrite(slice, block_size);
|
|
||||||
cipher.decrypt_block(block, block);
|
|
||||||
block.apply_initialization_vector(iv);
|
|
||||||
auto decrypted = block.get();
|
|
||||||
out.overwrite(offset, decrypted.data(), decrypted.size());
|
|
||||||
iv = slice;
|
|
||||||
length -= block_size;
|
|
||||||
offset += block_size;
|
|
||||||
}
|
|
||||||
out.trim(offset);
|
|
||||||
this->prune_padding(out);
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -219,7 +219,7 @@ public:
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
|
|
||||||
~RSA_PKCS1_EME() {}
|
~RSA_PKCS1_EME() { }
|
||||||
|
|
||||||
virtual void encrypt(const ByteBuffer& in, ByteBuffer& out) override;
|
virtual void encrypt(const ByteBuffer& in, ByteBuffer& out) override;
|
||||||
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out) override;
|
virtual void decrypt(const ByteBuffer& in, ByteBuffer& out) override;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue