2021-04-10 04:00:37 +00:00
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "https://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
2015-10-16 00:33:37 +00:00
< html xmlns = "http://www.w3.org/1999/xhtml" >
< head >
< meta http-equiv = "Content-Type" content = "text/xhtml;charset=UTF-8" / >
< meta http-equiv = "X-UA-Compatible" content = "IE=9" / >
2021-06-22 00:16:40 +00:00
< meta name = "generator" content = "Doxygen 1.8.17" / >
2018-02-10 23:37:42 +00:00
< meta name = "viewport" content = "width=device-width, initial-scale=1" / >
2017-09-20 02:35:05 +00:00
< title > Shaka Packager SDK: packager/media/base/aes_encryptor.cc Source File< / title >
2015-10-16 00:33:37 +00:00
< link href = "../../tabs.css" rel = "stylesheet" type = "text/css" / >
< script type = "text/javascript" src = "../../jquery.js" > < / script >
< script type = "text/javascript" src = "../../dynsections.js" > < / script >
< link href = "../../search/search.css" rel = "stylesheet" type = "text/css" / >
2018-02-10 23:37:42 +00:00
< script type = "text/javascript" src = "../../search/searchdata.js" > < / script >
2015-10-16 00:33:37 +00:00
< script type = "text/javascript" src = "../../search/search.js" > < / script >
< link href = "../../doxygen.css" rel = "stylesheet" type = "text/css" / >
< / head >
< body >
< div id = "top" > <!-- do not remove this div, it is closed by doxygen! -->
< div id = "titlearea" >
< table cellspacing = "0" cellpadding = "0" >
< tbody >
< tr style = "height: 56px;" >
2018-02-10 23:37:42 +00:00
< td id = "projectalign" style = "padding-left: 0.5em;" >
2017-09-20 02:35:05 +00:00
< div id = "projectname" > Shaka Packager SDK
2015-10-16 00:33:37 +00:00
< / div >
< / td >
< / tr >
< / tbody >
< / table >
< / div >
<!-- end header part -->
2021-06-22 00:16:40 +00:00
<!-- Generated by Doxygen 1.8.17 -->
2015-10-16 00:33:37 +00:00
< script type = "text/javascript" >
2021-04-10 04:00:37 +00:00
/* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3& dn=gpl-2.0.txt GPL-v2 */
2021-06-22 00:16:40 +00:00
var searchBox = new SearchBox("searchBox", "../../search",false,'Search');
2021-04-10 04:00:37 +00:00
/* @license-end */
2015-10-16 00:33:37 +00:00
< / script >
2018-02-10 23:37:42 +00:00
< script type = "text/javascript" src = "../../menudata.js" > < / script >
< script type = "text/javascript" src = "../../menu.js" > < / script >
< script type = "text/javascript" >
2021-04-10 04:00:37 +00:00
/* @license magnet:?xt=urn:btih:cf05388f2679ee054f2beb29a391d25f4e673ac3& dn=gpl-2.0.txt GPL-v2 */
2018-02-10 23:37:42 +00:00
$(function() {
initMenu('../../',true,false,'search.php','Search');
$(document).ready(function() { init_search(); });
});
2021-04-10 04:00:37 +00:00
/* @license-end */< / script >
2018-02-10 23:37:42 +00:00
< div id = "main-nav" > < / div >
2015-10-16 00:33:37 +00:00
<!-- window showing the filter options -->
< div id = "MSearchSelectWindow"
onmouseover="return searchBox.OnSearchSelectShow()"
onmouseout="return searchBox.OnSearchSelectHide()"
onkeydown="return searchBox.OnSearchSelectKey(event)">
2018-02-10 23:37:42 +00:00
< / div >
2015-10-16 00:33:37 +00:00
<!-- iframe showing the search results (closed by default) -->
< div id = "MSearchResultsWindow" >
< iframe src = "javascript:void(0)" frameborder = "0"
name="MSearchResults" id="MSearchResults">
< / iframe >
< / div >
< div id = "nav-path" class = "navpath" >
< ul >
2017-09-20 02:35:05 +00:00
< li class = "navelem" > < a class = "el" href = "../../dir_3f8eec2fc361645de4b1ec14c19fffc7.html" > packager< / a > < / li > < li class = "navelem" > < a class = "el" href = "../../dir_f99dae54fe7170f791f339b952d5067a.html" > media< / a > < / li > < li class = "navelem" > < a class = "el" href = "../../dir_e3bda0bde998a4d5063328245b9909be.html" > base< / a > < / li > < / ul >
2015-10-16 00:33:37 +00:00
< / div >
< / div > <!-- top -->
< div class = "header" >
< div class = "headertitle" >
< div class = "title" > aes_encryptor.cc< / div > < / div >
< / div > <!-- header -->
< div class = "contents" >
2021-04-10 04:00:37 +00:00
< div class = "fragment" > < div class = "line" > < a name = "l00001" > < / a > < span class = "lineno" > 1< / span >   < span class = "comment" > // Copyright 2014 Google Inc. All rights reserved.< / span > < / div >
< div class = "line" > < a name = "l00002" > < / a > < span class = "lineno" > 2< / span >   < span class = "comment" > //< / span > < / div >
< div class = "line" > < a name = "l00003" > < / a > < span class = "lineno" > 3< / span >   < span class = "comment" > // Use of this source code is governed by a BSD-style< / span > < / div >
< div class = "line" > < a name = "l00004" > < / a > < span class = "lineno" > 4< / span >   < span class = "comment" > // license that can be found in the LICENSE file or at< / span > < / div >
< div class = "line" > < a name = "l00005" > < / a > < span class = "lineno" > 5< / span >   < span class = "comment" > // https://developers.google.com/open-source/licenses/bsd< / span > < / div >
< div class = "line" > < a name = "l00006" > < / a > < span class = "lineno" > 6< / span >   < / div >
< div class = "line" > < a name = "l00007" > < / a > < span class = "lineno" > 7< / span >   < span class = "preprocessor" > #include " packager/media/base/aes_encryptor.h" < / span > < / div >
< div class = "line" > < a name = "l00008" > < / a > < span class = "lineno" > 8< / span >   < / div >
< div class = "line" > < a name = "l00009" > < / a > < span class = "lineno" > 9< / span >   < span class = "preprocessor" > #include < openssl/aes.h> < / span > < / div >
< div class = "line" > < a name = "l00010" > < / a > < span class = "lineno" > 10< / span >   < / div >
< div class = "line" > < a name = "l00011" > < / a > < span class = "lineno" > 11< / span >   < span class = "preprocessor" > #include " packager/base/logging.h" < / span > < / div >
< div class = "line" > < a name = "l00012" > < / a > < span class = "lineno" > 12< / span >   < / div >
< div class = "line" > < a name = "l00013" > < / a > < span class = "lineno" > 13< / span >   < span class = "keyword" > namespace < / span > {< / div >
< div class = "line" > < a name = "l00014" > < / a > < span class = "lineno" > 14< / span >   < / div >
< div class = "line" > < a name = "l00015" > < / a > < span class = "lineno" > 15< / span >   < span class = "comment" > // Increment an 8-byte counter by 1. Return true if overflowed.< / span > < / div >
< div class = "line" > < a name = "l00016" > < / a > < span class = "lineno" > 16< / span >   < span class = "keywordtype" > bool< / span > Increment64(uint8_t* counter) {< / div >
< div class = "line" > < a name = "l00017" > < / a > < span class = "lineno" > 17< / span >   DCHECK(counter);< / div >
< div class = "line" > < a name = "l00018" > < / a > < span class = "lineno" > 18< / span >   < span class = "keywordflow" > for< / span > (< span class = "keywordtype" > int< / span > i = 7; i > = 0; --i) {< / div >
< div class = "line" > < a name = "l00019" > < / a > < span class = "lineno" > 19< / span >   < span class = "keywordflow" > if< / span > (++counter[i] != 0)< / div >
< div class = "line" > < a name = "l00020" > < / a > < span class = "lineno" > 20< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > false< / span > ;< / div >
< div class = "line" > < a name = "l00021" > < / a > < span class = "lineno" > 21< / span >   }< / div >
< div class = "line" > < a name = "l00022" > < / a > < span class = "lineno" > 22< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > true< / span > ;< / div >
< div class = "line" > < a name = "l00023" > < / a > < span class = "lineno" > 23< / span >   }< / div >
< div class = "line" > < a name = "l00024" > < / a > < span class = "lineno" > 24< / span >   < / div >
< div class = "line" > < a name = "l00025" > < / a > < span class = "lineno" > 25< / span >   < span class = "comment" > // AES defines three key sizes: 128, 192 and 256 bits.< / span > < / div >
< div class = "line" > < a name = "l00026" > < / a > < span class = "lineno" > 26< / span >   < span class = "keywordtype" > bool< / span > IsKeySizeValidForAes(< span class = "keywordtype" > size_t< / span > key_size) {< / div >
< div class = "line" > < a name = "l00027" > < / a > < span class = "lineno" > 27< / span >   < span class = "keywordflow" > return< / span > key_size == 16 || key_size == 24 || key_size == 32;< / div >
< div class = "line" > < a name = "l00028" > < / a > < span class = "lineno" > 28< / span >   }< / div >
< div class = "line" > < a name = "l00029" > < / a > < span class = "lineno" > 29< / span >   < / div >
< div class = "line" > < a name = "l00030" > < / a > < span class = "lineno" > 30< / span >   } < span class = "comment" > // namespace< / span > < / div >
< div class = "line" > < a name = "l00031" > < / a > < span class = "lineno" > 31< / span >   < / div >
< div class = "line" > < a name = "l00032" > < / a > < span class = "lineno" > 32< / span >   < span class = "keyword" > namespace < / span > < a class = "code" href = "../../d8/daf/namespaceshaka.html" > shaka< / a > {< / div >
< div class = "line" > < a name = "l00033" > < / a > < span class = "lineno" > 33< / span >   < span class = "keyword" > namespace < / span > media {< / div >
< div class = "line" > < a name = "l00034" > < / a > < span class = "lineno" > 34< / span >   < / div >
< div class = "line" > < a name = "l00035" > < / a > < span class = "lineno" > < a class = "line" href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html#a873b0794baca91b36dbc484fc9c37e58" > 35< / a > < / span >   < a class = "code" href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html#a873b0794baca91b36dbc484fc9c37e58" > AesEncryptor::AesEncryptor< / a > (ConstantIvFlag constant_iv_flag)< / div >
< div class = "line" > < a name = "l00036" > < / a > < span class = "lineno" > 36< / span >   : < a class = "code" href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html" > AesCryptor< / a > (constant_iv_flag) {}< / div >
< div class = "line" > < a name = "l00037" > < / a > < span class = "lineno" > 37< / span >   AesEncryptor::~AesEncryptor() {}< / div >
< div class = "line" > < a name = "l00038" > < / a > < span class = "lineno" > 38< / span >   < / div >
< div class = "line" > < a name = "l00039" > < / a > < span class = "lineno" > < a class = "line" href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html#a0695df5615cadf6977fdbac978daeffa" > 39< / a > < / span >   < span class = "keywordtype" > bool< / span > < a class = "code" href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html#a0695df5615cadf6977fdbac978daeffa" > AesEncryptor::InitializeWithIv< / a > (< span class = "keyword" > const< / span > std::vector< uint8_t> & key,< / div >
< div class = "line" > < a name = "l00040" > < / a > < span class = "lineno" > 40< / span >   < span class = "keyword" > const< / span > std::vector< uint8_t> & iv) {< / div >
< div class = "line" > < a name = "l00041" > < / a > < span class = "lineno" > 41< / span >   < span class = "keywordflow" > if< / span > (!IsKeySizeValidForAes(key.size())) {< / div >
< div class = "line" > < a name = "l00042" > < / a > < span class = "lineno" > 42< / span >   LOG(ERROR) < < < span class = "stringliteral" > " Invalid AES key size: " < / span > < < key.size();< / div >
< div class = "line" > < a name = "l00043" > < / a > < span class = "lineno" > 43< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > false< / span > ;< / div >
< div class = "line" > < a name = "l00044" > < / a > < span class = "lineno" > 44< / span >   }< / div >
< div class = "line" > < a name = "l00045" > < / a > < span class = "lineno" > 45< / span >   < / div >
< div class = "line" > < a name = "l00046" > < / a > < span class = "lineno" > 46< / span >   CHECK_EQ(AES_set_encrypt_key(key.data(), key.size() * 8, mutable_aes_key()),< / div >
< div class = "line" > < a name = "l00047" > < / a > < span class = "lineno" > 47< / span >   0);< / div >
< div class = "line" > < a name = "l00048" > < / a > < span class = "lineno" > 48< / span >   < span class = "keywordflow" > return< / span > < a class = "code" href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a4875146da4761bb757d6b00132ae6fea" > SetIv< / a > (< a class = "code" href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a15094d3249fa0b82b8acc4d52209c51e" > iv< / a > );< / div >
< div class = "line" > < a name = "l00049" > < / a > < span class = "lineno" > 49< / span >   }< / div >
< div class = "line" > < a name = "l00050" > < / a > < span class = "lineno" > 50< / span >   < / div >
< div class = "line" > < a name = "l00051" > < / a > < span class = "lineno" > 51< / span >   < span class = "comment" > // We don' t support constant iv for counter mode, as we don' t have a use case< / span > < / div >
< div class = "line" > < a name = "l00052" > < / a > < span class = "lineno" > 52< / span >   < span class = "comment" > // for that.< / span > < / div >
< div class = "line" > < a name = "l00053" > < / a > < span class = "lineno" > 53< / span >   AesCtrEncryptor::AesCtrEncryptor()< / div >
< div class = "line" > < a name = "l00054" > < / a > < span class = "lineno" > 54< / span >   : < a class = "code" href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html" > AesEncryptor< / a > (kDontUseConstantIv),< / div >
< div class = "line" > < a name = "l00055" > < / a > < span class = "lineno" > 55< / span >   block_offset_(0),< / div >
< div class = "line" > < a name = "l00056" > < / a > < span class = "lineno" > 56< / span >   encrypted_counter_(AES_BLOCK_SIZE, 0) {}< / div >
< div class = "line" > < a name = "l00057" > < / a > < span class = "lineno" > 57< / span >   < / div >
< div class = "line" > < a name = "l00058" > < / a > < span class = "lineno" > 58< / span >   AesCtrEncryptor::~AesCtrEncryptor() {}< / div >
< div class = "line" > < a name = "l00059" > < / a > < span class = "lineno" > 59< / span >   < / div >
< div class = "line" > < a name = "l00060" > < / a > < span class = "lineno" > 60< / span >   < / div >
< div class = "line" > < a name = "l00061" > < / a > < span class = "lineno" > 61< / span >   < span class = "keywordtype" > bool< / span > AesCtrEncryptor::CryptInternal(< span class = "keyword" > const< / span > uint8_t* plaintext,< / div >
< div class = "line" > < a name = "l00062" > < / a > < span class = "lineno" > 62< / span >   < span class = "keywordtype" > size_t< / span > plaintext_size,< / div >
< div class = "line" > < a name = "l00063" > < / a > < span class = "lineno" > 63< / span >   uint8_t* ciphertext,< / div >
< div class = "line" > < a name = "l00064" > < / a > < span class = "lineno" > 64< / span >   < span class = "keywordtype" > size_t< / span > * ciphertext_size) {< / div >
< div class = "line" > < a name = "l00065" > < / a > < span class = "lineno" > 65< / span >   DCHECK(plaintext);< / div >
< div class = "line" > < a name = "l00066" > < / a > < span class = "lineno" > 66< / span >   DCHECK(ciphertext);< / div >
< div class = "line" > < a name = "l00067" > < / a > < span class = "lineno" > 67< / span >   DCHECK(aes_key());< / div >
< div class = "line" > < a name = "l00068" > < / a > < span class = "lineno" > 68< / span >   < / div >
< div class = "line" > < a name = "l00069" > < / a > < span class = "lineno" > 69< / span >   < span class = "comment" > // |ciphertext_size| is always the same as |plaintext_size| for counter mode.< / span > < / div >
< div class = "line" > < a name = "l00070" > < / a > < span class = "lineno" > 70< / span >   < span class = "keywordflow" > if< / span > (*ciphertext_size < plaintext_size) {< / div >
< div class = "line" > < a name = "l00071" > < / a > < span class = "lineno" > 71< / span >   LOG(ERROR) < < < span class = "stringliteral" > " Expecting output size of at least " < / span > < < plaintext_size< / div >
< div class = "line" > < a name = "l00072" > < / a > < span class = "lineno" > 72< / span >   < < < span class = "stringliteral" > " bytes." < / span > ;< / div >
< div class = "line" > < a name = "l00073" > < / a > < span class = "lineno" > 73< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > false< / span > ;< / div >
< div class = "line" > < a name = "l00074" > < / a > < span class = "lineno" > 74< / span >   }< / div >
< div class = "line" > < a name = "l00075" > < / a > < span class = "lineno" > 75< / span >   *ciphertext_size = plaintext_size;< / div >
< div class = "line" > < a name = "l00076" > < / a > < span class = "lineno" > 76< / span >   < / div >
< div class = "line" > < a name = "l00077" > < / a > < span class = "lineno" > 77< / span >   < span class = "keywordflow" > for< / span > (< span class = "keywordtype" > size_t< / span > i = 0; i < plaintext_size; ++i) {< / div >
< div class = "line" > < a name = "l00078" > < / a > < span class = "lineno" > 78< / span >   < span class = "keywordflow" > if< / span > (block_offset_ == 0) {< / div >
< div class = "line" > < a name = "l00079" > < / a > < span class = "lineno" > 79< / span >   AES_encrypt(& counter_[0], & encrypted_counter_[0], aes_key());< / div >
< div class = "line" > < a name = "l00080" > < / a > < span class = "lineno" > 80< / span >   < span class = "comment" > // As mentioned in ISO/IEC 23001-7:2016 CENC spec, of the 16 byte counter< / span > < / div >
< div class = "line" > < a name = "l00081" > < / a > < span class = "lineno" > 81< / span >   < span class = "comment" > // block, bytes 8 to 15 (i.e. the least significant bytes) are used as a< / span > < / div >
< div class = "line" > < a name = "l00082" > < / a > < span class = "lineno" > 82< / span >   < span class = "comment" > // simple 64 bit unsigned integer that is incremented by one for each< / span > < / div >
< div class = "line" > < a name = "l00083" > < / a > < span class = "lineno" > 83< / span >   < span class = "comment" > // subsequent block of sample data processed and is kept in network byte< / span > < / div >
< div class = "line" > < a name = "l00084" > < / a > < span class = "lineno" > 84< / span >   < span class = "comment" > // order.< / span > < / div >
< div class = "line" > < a name = "l00085" > < / a > < span class = "lineno" > 85< / span >   Increment64(& counter_[8]);< / div >
< div class = "line" > < a name = "l00086" > < / a > < span class = "lineno" > 86< / span >   }< / div >
< div class = "line" > < a name = "l00087" > < / a > < span class = "lineno" > 87< / span >   ciphertext[i] = plaintext[i] ^ encrypted_counter_[block_offset_];< / div >
< div class = "line" > < a name = "l00088" > < / a > < span class = "lineno" > 88< / span >   block_offset_ = (block_offset_ + 1) % AES_BLOCK_SIZE;< / div >
< div class = "line" > < a name = "l00089" > < / a > < span class = "lineno" > 89< / span >   }< / div >
< div class = "line" > < a name = "l00090" > < / a > < span class = "lineno" > 90< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > true< / span > ;< / div >
< div class = "line" > < a name = "l00091" > < / a > < span class = "lineno" > 91< / span >   }< / div >
< div class = "line" > < a name = "l00092" > < / a > < span class = "lineno" > 92< / span >   < / div >
< div class = "line" > < a name = "l00093" > < / a > < span class = "lineno" > 93< / span >   < span class = "keywordtype" > void< / span > AesCtrEncryptor::SetIvInternal() {< / div >
< div class = "line" > < a name = "l00094" > < / a > < span class = "lineno" > 94< / span >   block_offset_ = 0;< / div >
< div class = "line" > < a name = "l00095" > < / a > < span class = "lineno" > 95< / span >   counter_ = < a class = "code" href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a15094d3249fa0b82b8acc4d52209c51e" > iv< / a > ();< / div >
< div class = "line" > < a name = "l00096" > < / a > < span class = "lineno" > 96< / span >   counter_.resize(AES_BLOCK_SIZE, 0);< / div >
< div class = "line" > < a name = "l00097" > < / a > < span class = "lineno" > 97< / span >   }< / div >
< div class = "line" > < a name = "l00098" > < / a > < span class = "lineno" > 98< / span >   < / div >
< div class = "line" > < a name = "l00099" > < / a > < span class = "lineno" > < a class = "line" href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html#a2cc8f20b92d884d959b3a586b527fece" > 99< / a > < / span >   < a class = "code" href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html#a2cc8f20b92d884d959b3a586b527fece" > AesCbcEncryptor::AesCbcEncryptor< / a > (CbcPaddingScheme padding_scheme)< / div >
< div class = "line" > < a name = "l00100" > < / a > < span class = "lineno" > 100< / span >   : < a class = "code" href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html" > AesCbcEncryptor< / a > (padding_scheme, kDontUseConstantIv) {}< / div >
< div class = "line" > < a name = "l00101" > < / a > < span class = "lineno" > 101< / span >   < / div >
< div class = "line" > < a name = "l00102" > < / a > < span class = "lineno" > < a class = "line" href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html#adbe4df9a37be949487a806301d143230" > 102< / a > < / span >   < a class = "code" href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html#a2cc8f20b92d884d959b3a586b527fece" > AesCbcEncryptor::AesCbcEncryptor< / a > (CbcPaddingScheme padding_scheme,< / div >
< div class = "line" > < a name = "l00103" > < / a > < span class = "lineno" > 103< / span >   ConstantIvFlag constant_iv_flag)< / div >
< div class = "line" > < a name = "l00104" > < / a > < span class = "lineno" > 104< / span >   : < a class = "code" href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html" > AesEncryptor< / a > (constant_iv_flag), padding_scheme_(padding_scheme) {< / div >
< div class = "line" > < a name = "l00105" > < / a > < span class = "lineno" > 105< / span >   < span class = "keywordflow" > if< / span > (padding_scheme_ != kNoPadding) {< / div >
< div class = "line" > < a name = "l00106" > < / a > < span class = "lineno" > 106< / span >   CHECK_EQ(constant_iv_flag, kUseConstantIv)< / div >
< div class = "line" > < a name = "l00107" > < / a > < span class = "lineno" > 107< / span >   < < < span class = "stringliteral" > " non-constant iv (cipher block chain across calls) only makes sense " < / span > < / div >
< div class = "line" > < a name = "l00108" > < / a > < span class = "lineno" > 108< / span >   < span class = "stringliteral" > " if the padding_scheme is kNoPadding." < / span > ;< / div >
< div class = "line" > < a name = "l00109" > < / a > < span class = "lineno" > 109< / span >   }< / div >
< div class = "line" > < a name = "l00110" > < / a > < span class = "lineno" > 110< / span >   }< / div >
< div class = "line" > < a name = "l00111" > < / a > < span class = "lineno" > 111< / span >   < / div >
< div class = "line" > < a name = "l00112" > < / a > < span class = "lineno" > 112< / span >   AesCbcEncryptor::~AesCbcEncryptor() {}< / div >
< div class = "line" > < a name = "l00113" > < / a > < span class = "lineno" > 113< / span >   < / div >
< div class = "line" > < a name = "l00114" > < / a > < span class = "lineno" > 114< / span >   < span class = "keywordtype" > bool< / span > AesCbcEncryptor::CryptInternal(< span class = "keyword" > const< / span > uint8_t* plaintext,< / div >
< div class = "line" > < a name = "l00115" > < / a > < span class = "lineno" > 115< / span >   < span class = "keywordtype" > size_t< / span > plaintext_size,< / div >
< div class = "line" > < a name = "l00116" > < / a > < span class = "lineno" > 116< / span >   uint8_t* ciphertext,< / div >
< div class = "line" > < a name = "l00117" > < / a > < span class = "lineno" > 117< / span >   < span class = "keywordtype" > size_t< / span > * ciphertext_size) {< / div >
< div class = "line" > < a name = "l00118" > < / a > < span class = "lineno" > 118< / span >   DCHECK(aes_key());< / div >
< div class = "line" > < a name = "l00119" > < / a > < span class = "lineno" > 119< / span >   < / div >
< div class = "line" > < a name = "l00120" > < / a > < span class = "lineno" > 120< / span >   < span class = "keyword" > const< / span > < span class = "keywordtype" > size_t< / span > residual_block_size = plaintext_size % AES_BLOCK_SIZE;< / div >
< div class = "line" > < a name = "l00121" > < / a > < span class = "lineno" > 121< / span >   < span class = "keyword" > const< / span > < span class = "keywordtype" > size_t< / span > num_padding_bytes = NumPaddingBytes(plaintext_size);< / div >
< div class = "line" > < a name = "l00122" > < / a > < span class = "lineno" > 122< / span >   < span class = "keyword" > const< / span > < span class = "keywordtype" > size_t< / span > required_ciphertext_size = plaintext_size + num_padding_bytes;< / div >
< div class = "line" > < a name = "l00123" > < / a > < span class = "lineno" > 123< / span >   < span class = "keywordflow" > if< / span > (*ciphertext_size < required_ciphertext_size) {< / div >
< div class = "line" > < a name = "l00124" > < / a > < span class = "lineno" > 124< / span >   LOG(ERROR) < < < span class = "stringliteral" > " Expecting output size of at least " < / span > < / div >
< div class = "line" > < a name = "l00125" > < / a > < span class = "lineno" > 125< / span >   < < required_ciphertext_size < < < span class = "stringliteral" > " bytes." < / span > ;< / div >
< div class = "line" > < a name = "l00126" > < / a > < span class = "lineno" > 126< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > false< / span > ;< / div >
< div class = "line" > < a name = "l00127" > < / a > < span class = "lineno" > 127< / span >   }< / div >
< div class = "line" > < a name = "l00128" > < / a > < span class = "lineno" > 128< / span >   *ciphertext_size = required_ciphertext_size;< / div >
< div class = "line" > < a name = "l00129" > < / a > < span class = "lineno" > 129< / span >   < / div >
< div class = "line" > < a name = "l00130" > < / a > < span class = "lineno" > 130< / span >   < span class = "comment" > // Encrypt everything but the residual block using CBC.< / span > < / div >
< div class = "line" > < a name = "l00131" > < / a > < span class = "lineno" > 131< / span >   < span class = "keyword" > const< / span > < span class = "keywordtype" > size_t< / span > cbc_size = plaintext_size - residual_block_size;< / div >
< div class = "line" > < a name = "l00132" > < / a > < span class = "lineno" > 132< / span >   < span class = "keywordflow" > if< / span > (cbc_size != 0) {< / div >
< div class = "line" > < a name = "l00133" > < / a > < span class = "lineno" > 133< / span >   AES_cbc_encrypt(plaintext, ciphertext, cbc_size, aes_key(),< / div >
< div class = "line" > < a name = "l00134" > < / a > < span class = "lineno" > 134< / span >   internal_iv_.data(), AES_ENCRYPT);< / div >
< div class = "line" > < a name = "l00135" > < / a > < span class = "lineno" > 135< / span >   } < span class = "keywordflow" > else< / span > < span class = "keywordflow" > if< / span > (padding_scheme_ == kCtsPadding) {< / div >
< div class = "line" > < a name = "l00136" > < / a > < span class = "lineno" > 136< / span >   < span class = "comment" > // Don' t have a full block, leave unencrypted.< / span > < / div >
< div class = "line" > < a name = "l00137" > < / a > < span class = "lineno" > 137< / span >   memcpy(ciphertext, plaintext, plaintext_size);< / div >
< div class = "line" > < a name = "l00138" > < / a > < span class = "lineno" > 138< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > true< / span > ;< / div >
< div class = "line" > < a name = "l00139" > < / a > < span class = "lineno" > 139< / span >   }< / div >
< div class = "line" > < a name = "l00140" > < / a > < span class = "lineno" > 140< / span >   < span class = "keywordflow" > if< / span > (residual_block_size == 0 & & padding_scheme_ != kPkcs5Padding) {< / div >
< div class = "line" > < a name = "l00141" > < / a > < span class = "lineno" > 141< / span >   < span class = "comment" > // No residual block. No need to do padding.< / span > < / div >
< div class = "line" > < a name = "l00142" > < / a > < span class = "lineno" > 142< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > true< / span > ;< / div >
< div class = "line" > < a name = "l00143" > < / a > < span class = "lineno" > 143< / span >   }< / div >
< div class = "line" > < a name = "l00144" > < / a > < span class = "lineno" > 144< / span >   < / div >
< div class = "line" > < a name = "l00145" > < / a > < span class = "lineno" > 145< / span >   < span class = "keywordflow" > if< / span > (padding_scheme_ == kNoPadding) {< / div >
< div class = "line" > < a name = "l00146" > < / a > < span class = "lineno" > 146< / span >   < span class = "comment" > // The residual block is left unencrypted.< / span > < / div >
< div class = "line" > < a name = "l00147" > < / a > < span class = "lineno" > 147< / span >   memcpy(ciphertext + cbc_size, plaintext + cbc_size, residual_block_size);< / div >
< div class = "line" > < a name = "l00148" > < / a > < span class = "lineno" > 148< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > true< / span > ;< / div >
< div class = "line" > < a name = "l00149" > < / a > < span class = "lineno" > 149< / span >   }< / div >
< div class = "line" > < a name = "l00150" > < / a > < span class = "lineno" > 150< / span >   < / div >
< div class = "line" > < a name = "l00151" > < / a > < span class = "lineno" > 151< / span >   std::vector< uint8_t> residual_block(plaintext + cbc_size,< / div >
< div class = "line" > < a name = "l00152" > < / a > < span class = "lineno" > 152< / span >   plaintext + plaintext_size);< / div >
< div class = "line" > < a name = "l00153" > < / a > < span class = "lineno" > 153< / span >   DCHECK_EQ(residual_block.size(), residual_block_size);< / div >
< div class = "line" > < a name = "l00154" > < / a > < span class = "lineno" > 154< / span >   uint8_t* residual_ciphertext_block = ciphertext + cbc_size;< / div >
< div class = "line" > < a name = "l00155" > < / a > < span class = "lineno" > 155< / span >   < / div >
< div class = "line" > < a name = "l00156" > < / a > < span class = "lineno" > 156< / span >   < span class = "keywordflow" > if< / span > (padding_scheme_ == kPkcs5Padding) {< / div >
< div class = "line" > < a name = "l00157" > < / a > < span class = "lineno" > 157< / span >   DCHECK_EQ(num_padding_bytes, AES_BLOCK_SIZE - residual_block_size);< / div >
< div class = "line" > < a name = "l00158" > < / a > < span class = "lineno" > 158< / span >   < / div >
< div class = "line" > < a name = "l00159" > < / a > < span class = "lineno" > 159< / span >   < span class = "comment" > // Pad residue block with PKCS5 padding.< / span > < / div >
< div class = "line" > < a name = "l00160" > < / a > < span class = "lineno" > 160< / span >   residual_block.resize(AES_BLOCK_SIZE, < span class = "keyword" > static_cast< < / span > < span class = "keywordtype" > char< / span > < span class = "keyword" > > < / span > (num_padding_bytes));< / div >
< div class = "line" > < a name = "l00161" > < / a > < span class = "lineno" > 161< / span >   AES_cbc_encrypt(residual_block.data(), residual_ciphertext_block,< / div >
< div class = "line" > < a name = "l00162" > < / a > < span class = "lineno" > 162< / span >   AES_BLOCK_SIZE, aes_key(), internal_iv_.data(),< / div >
< div class = "line" > < a name = "l00163" > < / a > < span class = "lineno" > 163< / span >   AES_ENCRYPT);< / div >
< div class = "line" > < a name = "l00164" > < / a > < span class = "lineno" > 164< / span >   } < span class = "keywordflow" > else< / span > {< / div >
< div class = "line" > < a name = "l00165" > < / a > < span class = "lineno" > 165< / span >   DCHECK_EQ(num_padding_bytes, 0u);< / div >
< div class = "line" > < a name = "l00166" > < / a > < span class = "lineno" > 166< / span >   DCHECK_EQ(padding_scheme_, kCtsPadding);< / div >
< div class = "line" > < a name = "l00167" > < / a > < span class = "lineno" > 167< / span >   < / div >
< div class = "line" > < a name = "l00168" > < / a > < span class = "lineno" > 168< / span >   < span class = "comment" > // Zero-pad the residual block and encrypt using CBC.< / span > < / div >
< div class = "line" > < a name = "l00169" > < / a > < span class = "lineno" > 169< / span >   residual_block.resize(AES_BLOCK_SIZE, 0);< / div >
< div class = "line" > < a name = "l00170" > < / a > < span class = "lineno" > 170< / span >   AES_cbc_encrypt(residual_block.data(), residual_block.data(),< / div >
< div class = "line" > < a name = "l00171" > < / a > < span class = "lineno" > 171< / span >   AES_BLOCK_SIZE, aes_key(), internal_iv_.data(),< / div >
< div class = "line" > < a name = "l00172" > < / a > < span class = "lineno" > 172< / span >   AES_ENCRYPT);< / div >
< div class = "line" > < a name = "l00173" > < / a > < span class = "lineno" > 173< / span >   < / div >
< div class = "line" > < a name = "l00174" > < / a > < span class = "lineno" > 174< / span >   < span class = "comment" > // Replace the last full block with the zero-padded, encrypted residual< / span > < / div >
< div class = "line" > < a name = "l00175" > < / a > < span class = "lineno" > 175< / span >   < span class = "comment" > // block, and replace the residual block with the equivalent portion of the< / span > < / div >
< div class = "line" > < a name = "l00176" > < / a > < span class = "lineno" > 176< / span >   < span class = "comment" > // last full encrypted block. It may appear that some encrypted bits of the< / span > < / div >
< div class = "line" > < a name = "l00177" > < / a > < span class = "lineno" > 177< / span >   < span class = "comment" > // last full block are lost, but they are not, as they were used as the IV< / span > < / div >
< div class = "line" > < a name = "l00178" > < / a > < span class = "lineno" > 178< / span >   < span class = "comment" > // when encrypting the zero-padded residual block.< / span > < / div >
< div class = "line" > < a name = "l00179" > < / a > < span class = "lineno" > 179< / span >   memcpy(residual_ciphertext_block,< / div >
< div class = "line" > < a name = "l00180" > < / a > < span class = "lineno" > 180< / span >   residual_ciphertext_block - AES_BLOCK_SIZE, residual_block_size);< / div >
< div class = "line" > < a name = "l00181" > < / a > < span class = "lineno" > 181< / span >   memcpy(residual_ciphertext_block - AES_BLOCK_SIZE, residual_block.data(),< / div >
< div class = "line" > < a name = "l00182" > < / a > < span class = "lineno" > 182< / span >   AES_BLOCK_SIZE);< / div >
< div class = "line" > < a name = "l00183" > < / a > < span class = "lineno" > 183< / span >   }< / div >
< div class = "line" > < a name = "l00184" > < / a > < span class = "lineno" > 184< / span >   < span class = "keywordflow" > return< / span > < span class = "keyword" > true< / span > ;< / div >
< div class = "line" > < a name = "l00185" > < / a > < span class = "lineno" > 185< / span >   }< / div >
< div class = "line" > < a name = "l00186" > < / a > < span class = "lineno" > 186< / span >   < / div >
< div class = "line" > < a name = "l00187" > < / a > < span class = "lineno" > 187< / span >   < span class = "keywordtype" > void< / span > AesCbcEncryptor::SetIvInternal() {< / div >
< div class = "line" > < a name = "l00188" > < / a > < span class = "lineno" > 188< / span >   internal_iv_ = < a class = "code" href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a15094d3249fa0b82b8acc4d52209c51e" > iv< / a > ();< / div >
< div class = "line" > < a name = "l00189" > < / a > < span class = "lineno" > 189< / span >   internal_iv_.resize(AES_BLOCK_SIZE, 0);< / div >
< div class = "line" > < a name = "l00190" > < / a > < span class = "lineno" > 190< / span >   }< / div >
< div class = "line" > < a name = "l00191" > < / a > < span class = "lineno" > 191< / span >   < / div >
< div class = "line" > < a name = "l00192" > < / a > < span class = "lineno" > 192< / span >   < span class = "keywordtype" > size_t< / span > AesCbcEncryptor::NumPaddingBytes(< span class = "keywordtype" > size_t< / span > size)< span class = "keyword" > const < / span > {< / div >
< div class = "line" > < a name = "l00193" > < / a > < span class = "lineno" > 193< / span >   < span class = "keywordflow" > return< / span > (padding_scheme_ == kPkcs5Padding)< / div >
< div class = "line" > < a name = "l00194" > < / a > < span class = "lineno" > 194< / span >   ? (AES_BLOCK_SIZE - (size % AES_BLOCK_SIZE))< / div >
< div class = "line" > < a name = "l00195" > < / a > < span class = "lineno" > 195< / span >   : 0;< / div >
< div class = "line" > < a name = "l00196" > < / a > < span class = "lineno" > 196< / span >   }< / div >
< div class = "line" > < a name = "l00197" > < / a > < span class = "lineno" > 197< / span >   < / div >
< div class = "line" > < a name = "l00198" > < / a > < span class = "lineno" > 198< / span >   } < span class = "comment" > // namespace media< / span > < / div >
< div class = "line" > < a name = "l00199" > < / a > < span class = "lineno" > 199< / span >   } < span class = "comment" > // namespace shaka< / span > < / div >
2021-06-22 00:16:40 +00:00
< / div > <!-- fragment --> < / div > <!-- contents -->
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesEncryptor_html" > < div class = "ttname" > < a href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html" > shaka::media::AesEncryptor< / a > < / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d1/df0/aes__encryptor_8h_source.html#l00021" > aes_encryptor.h:21< / a > < / div > < / div >
< div class = "ttc" id = "anamespaceshaka_html" > < div class = "ttname" > < a href = "../../d8/daf/namespaceshaka.html" > shaka< / a > < / div > < div class = "ttdoc" > All the methods that are virtual are virtual for mocking.< / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d4/d15/gflags__hex__bytes_8cc_source.html#l00011" > gflags_hex_bytes.cc:11< / a > < / div > < / div >
2021-04-10 04:00:37 +00:00
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesCbcEncryptor_html_a2cc8f20b92d884d959b3a586b527fece" > < div class = "ttname" > < a href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html#a2cc8f20b92d884d959b3a586b527fece" > shaka::media::AesCbcEncryptor::AesCbcEncryptor< / a > < / div > < div class = "ttdeci" > AesCbcEncryptor(CbcPaddingScheme padding_scheme)< / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d5/da4/aes__encryptor_8cc_source.html#l00099" > aes_encryptor.cc:99< / a > < / div > < / div >
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesCryptor_html_a15094d3249fa0b82b8acc4d52209c51e" > < div class = "ttname" > < a href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a15094d3249fa0b82b8acc4d52209c51e" > shaka::media::AesCryptor::iv< / a > < / div > < div class = "ttdeci" > const std::vector< uint8_t > & iv() const< / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d0/d42/aes__cryptor_8h_source.html#l00082" > aes_cryptor.h:82< / a > < / div > < / div >
2021-06-22 00:16:40 +00:00
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesCbcEncryptor_html" > < div class = "ttname" > < a href = "../../d4/d20/classshaka_1_1media_1_1AesCbcEncryptor.html" > shaka::media::AesCbcEncryptor< / a > < / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d1/df0/aes__encryptor_8h_source.html#l00077" > aes_encryptor.h:77< / a > < / div > < / div >
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesCryptor_html" > < div class = "ttname" > < a href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html" > shaka::media::AesCryptor< / a > < / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d0/d42/aes__cryptor_8h_source.html#l00025" > aes_cryptor.h:25< / a > < / div > < / div >
2021-04-10 04:00:37 +00:00
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesCryptor_html_a4875146da4761bb757d6b00132ae6fea" > < div class = "ttname" > < a href = "../../df/d87/classshaka_1_1media_1_1AesCryptor.html#a4875146da4761bb757d6b00132ae6fea" > shaka::media::AesCryptor::SetIv< / a > < / div > < div class = "ttdeci" > bool SetIv(const std::vector< uint8_t > & iv)< / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d6/d55/aes__cryptor_8cc_source.html#l00070" > aes_cryptor.cc:70< / a > < / div > < / div >
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesEncryptor_html_a873b0794baca91b36dbc484fc9c37e58" > < div class = "ttname" > < a href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html#a873b0794baca91b36dbc484fc9c37e58" > shaka::media::AesEncryptor::AesEncryptor< / a > < / div > < div class = "ttdeci" > AesEncryptor(ConstantIvFlag constant_iv_flag)< / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d5/da4/aes__encryptor_8cc_source.html#l00035" > aes_encryptor.cc:35< / a > < / div > < / div >
2021-06-22 00:16:40 +00:00
< div class = "ttc" id = "aclassshaka_1_1media_1_1AesEncryptor_html_a0695df5615cadf6977fdbac978daeffa" > < div class = "ttname" > < a href = "../../d3/d75/classshaka_1_1media_1_1AesEncryptor.html#a0695df5615cadf6977fdbac978daeffa" > shaka::media::AesEncryptor::InitializeWithIv< / a > < / div > < div class = "ttdeci" > bool InitializeWithIv(const std::vector< uint8_t > & key, const std::vector< uint8_t > & iv) override< / div > < div class = "ttdef" > < b > Definition:< / b > < a href = "../../d5/da4/aes__encryptor_8cc_source.html#l00039" > aes_encryptor.cc:39< / a > < / div > < / div >
2015-10-16 00:33:37 +00:00
<!-- start footer part -->
< hr class = "footer" / > < address class = "footer" > < small >
2021-06-22 00:16:40 +00:00
Generated on Tue Jun 22 2021 00:16:03 for Shaka Packager SDK by   < a href = "http://www.doxygen.org/index.html" >
< img class = "footer" src = "../../doxygen.png" alt = "doxygen" / >
< / a > 1.8.17
2015-10-16 00:33:37 +00:00
< / small > < / address >
< / body >
< / html >