Remove unused bEncrypt argument from CRYPT_AESSetKey.
Change-Id: I085417c5f7311c0e8877578c46aeca80ba0b8212
Reviewed-on: https://pdfium-review.googlesource.com/c/pdfium/+/80930
Auto-Submit: Tom Sepez <tsepez@chromium.org>
Commit-Queue: Tom Sepez <tsepez@chromium.org>
Commit-Queue: Lei Zhang <thestig@chromium.org>
Reviewed-by: Lei Zhang <thestig@chromium.org>
diff --git a/core/fdrm/fx_crypt.h b/core/fdrm/fx_crypt.h
index 7c28e38..9bc9f8c 100644
--- a/core/fdrm/fx_crypt.h
+++ b/core/fdrm/fx_crypt.h
@@ -57,8 +57,7 @@
void CRYPT_AESSetKey(CRYPT_aes_context* context,
const uint8_t* key,
- uint32_t keylen,
- bool bEncrypt);
+ uint32_t keylen);
void CRYPT_AESSetIV(CRYPT_aes_context* context, const uint8_t* iv);
void CRYPT_AESDecrypt(CRYPT_aes_context* context,
uint8_t* dest,
diff --git a/core/fdrm/fx_crypt_aes.cpp b/core/fdrm/fx_crypt_aes.cpp
index 600642f..3be9ac4 100644
--- a/core/fdrm/fx_crypt_aes.cpp
+++ b/core/fdrm/fx_crypt_aes.cpp
@@ -638,8 +638,7 @@
void CRYPT_AESSetKey(CRYPT_aes_context* context,
const uint8_t* key,
- uint32_t keylen,
- bool bEncrypt) {
+ uint32_t keylen) {
aes_setup(context, key, keylen);
}
diff --git a/core/fpdfapi/parser/cpdf_crypto_handler.cpp b/core/fpdfapi/parser/cpdf_crypto_handler.cpp
index b51d2fb..9fa9b65 100644
--- a/core/fpdfapi/parser/cpdf_crypto_handler.cpp
+++ b/core/fpdfapi/parser/cpdf_crypto_handler.cpp
@@ -68,8 +68,7 @@
}
if (m_Cipher == Cipher::kAES) {
CRYPT_AESSetKey(m_pAESContext.get(),
- m_KeyLen == 32 ? m_EncryptKey : realkey, m_KeyLen,
- bEncrypt);
+ m_KeyLen == 32 ? m_EncryptKey : realkey, m_KeyLen);
if (bEncrypt) {
uint8_t iv[16];
for (int i = 0; i < 16; i++) {
@@ -119,7 +118,7 @@
AESCryptContext* pContext = FX_Alloc(AESCryptContext, 1);
pContext->m_bIV = true;
pContext->m_BlockOffset = 0;
- CRYPT_AESSetKey(&pContext->m_Context, m_EncryptKey, 32, bEncrypt);
+ CRYPT_AESSetKey(&pContext->m_Context, m_EncryptKey, 32);
if (bEncrypt) {
for (int i = 0; i < 16; i++) {
pContext->m_Block[i] = (uint8_t)rand();
@@ -143,7 +142,7 @@
AESCryptContext* pContext = FX_Alloc(AESCryptContext, 1);
pContext->m_bIV = true;
pContext->m_BlockOffset = 0;
- CRYPT_AESSetKey(&pContext->m_Context, realkey, 16, bEncrypt);
+ CRYPT_AESSetKey(&pContext->m_Context, realkey, 16);
if (bEncrypt) {
for (int i = 0; i < 16; i++) {
pContext->m_Block[i] = (uint8_t)rand();
diff --git a/core/fpdfapi/parser/cpdf_security_handler.cpp b/core/fpdfapi/parser/cpdf_security_handler.cpp
index 6a6f81b8..d9201e7 100644
--- a/core/fpdfapi/parser/cpdf_security_handler.cpp
+++ b/core/fpdfapi/parser/cpdf_security_handler.cpp
@@ -149,7 +149,7 @@
content.insert(std::end(content), vector, vector + 48);
}
}
- CRYPT_AESSetKey(&aes, key, 16, true);
+ CRYPT_AESSetKey(&aes, key, 16);
CRYPT_AESSetIV(&aes, iv);
CRYPT_AESEncrypt(&aes, E, content.data(), iBufLen);
int iHash = 0;
@@ -366,11 +366,11 @@
return false;
CRYPT_aes_context aes = {};
- CRYPT_AESSetKey(&aes, digest, sizeof(digest), false);
+ CRYPT_AESSetKey(&aes, digest, sizeof(digest));
uint8_t iv[16] = {};
CRYPT_AESSetIV(&aes, iv);
CRYPT_AESDecrypt(&aes, m_EncryptKey, ekey.raw_str(), 32);
- CRYPT_AESSetKey(&aes, m_EncryptKey, sizeof(m_EncryptKey), false);
+ CRYPT_AESSetKey(&aes, m_EncryptKey, sizeof(m_EncryptKey));
CRYPT_AESSetIV(&aes, iv);
ByteString perms = m_pEncryptDict->GetStringFor("Perms");
if (perms.IsEmpty())
@@ -681,7 +681,7 @@
CRYPT_SHA256Finish(&sha2, digest1);
}
CRYPT_aes_context aes = {};
- CRYPT_AESSetKey(&aes, digest1, 32, true);
+ CRYPT_AESSetKey(&aes, digest1, 32);
uint8_t iv[16] = {};
CRYPT_AESSetIV(&aes, iv);
CRYPT_AESEncrypt(&aes, digest1, m_EncryptKey, sizeof(m_EncryptKey));
@@ -710,7 +710,7 @@
FX_Random_GenerateMT(buf_random, 1);
CRYPT_aes_context aes = {};
- CRYPT_AESSetKey(&aes, m_EncryptKey, sizeof(m_EncryptKey), true);
+ CRYPT_AESSetKey(&aes, m_EncryptKey, sizeof(m_EncryptKey));
uint8_t iv[16] = {};
CRYPT_AESSetIV(&aes, iv);