sl@0
|
1 |
// Copyright (c) 1998-2009 Nokia Corporation and/or its subsidiary(-ies).
|
sl@0
|
2 |
// All rights reserved.
|
sl@0
|
3 |
// This component and the accompanying materials are made available
|
sl@0
|
4 |
// under the terms of "Eclipse Public License v1.0"
|
sl@0
|
5 |
// which accompanies this distribution, and is available
|
sl@0
|
6 |
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
sl@0
|
7 |
//
|
sl@0
|
8 |
// Initial Contributors:
|
sl@0
|
9 |
// Nokia Corporation - initial contribution.
|
sl@0
|
10 |
//
|
sl@0
|
11 |
// Contributors:
|
sl@0
|
12 |
//
|
sl@0
|
13 |
// Description:
|
sl@0
|
14 |
//
|
sl@0
|
15 |
|
sl@0
|
16 |
#include "UE_STD.H"
|
sl@0
|
17 |
|
sl@0
|
18 |
#include <pbe.h>
|
sl@0
|
19 |
|
sl@0
|
20 |
#define UNUSED_VAR(a) a = a
|
sl@0
|
21 |
|
sl@0
|
22 |
TSecureFilter::TSecureFilter()
|
sl@0
|
23 |
{}
|
sl@0
|
24 |
|
sl@0
|
25 |
void TSecureFilter::Set(MStreamBuf* aHost,TInt aMode)
|
sl@0
|
26 |
//
|
sl@0
|
27 |
// Set this filter up for encryption.
|
sl@0
|
28 |
//
|
sl@0
|
29 |
{
|
sl@0
|
30 |
TStreamFilter::Set(aHost,aMode);
|
sl@0
|
31 |
iIn.Zero();
|
sl@0
|
32 |
// Make sure any header added by the en/de-cryption goes
|
sl@0
|
33 |
// straight into the output buffer
|
sl@0
|
34 |
TPtr8 buf(iBuf,sizeof(iBuf));
|
sl@0
|
35 |
TRAPD(r, CryptL(buf,iIn));
|
sl@0
|
36 |
UNUSED_VAR(r);
|
sl@0
|
37 |
iOut.Set(buf);
|
sl@0
|
38 |
}
|
sl@0
|
39 |
|
sl@0
|
40 |
EXPORT_C TInt TSecureFilter::Capacity(TInt aMaxLength)
|
sl@0
|
41 |
//
|
sl@0
|
42 |
// Return the maximum guaranteed input used for aMaxLength output.
|
sl@0
|
43 |
// If we can fulfil the request from the output buffer, consume nothing,
|
sl@0
|
44 |
// otherwise return the space left in the input buffer
|
sl@0
|
45 |
//
|
sl@0
|
46 |
{
|
sl@0
|
47 |
return aMaxLength<=iOut.Length() ? 0 : KEncryptionFilterBufSize-iIn.Length();
|
sl@0
|
48 |
}
|
sl@0
|
49 |
|
sl@0
|
50 |
LOCAL_C TInt transfer(TDes8& aTarg,TPtrC8& aSrc)
|
sl@0
|
51 |
{
|
sl@0
|
52 |
TInt avail=aTarg.MaxLength()-aTarg.Length();
|
sl@0
|
53 |
TInt len=Min(aSrc.Length(),avail);
|
sl@0
|
54 |
if (len)
|
sl@0
|
55 |
{
|
sl@0
|
56 |
aTarg.Append(aSrc.Left(len));
|
sl@0
|
57 |
aSrc.Set(aSrc.Mid(len));
|
sl@0
|
58 |
}
|
sl@0
|
59 |
return avail-len;
|
sl@0
|
60 |
}
|
sl@0
|
61 |
|
sl@0
|
62 |
EXPORT_C TInt TSecureFilter::FilterL(TAny* aPtr,TInt aMaxLength,const TUint8*& aFrom,const TUint8* anEnd)
|
sl@0
|
63 |
//
|
sl@0
|
64 |
// Encrypt the input buffer.
|
sl@0
|
65 |
//
|
sl@0
|
66 |
// This must consume all its input - when called during reading, it's asserted
|
sl@0
|
67 |
// that aFrom == anEnd after calling this
|
sl@0
|
68 |
//
|
sl@0
|
69 |
{
|
sl@0
|
70 |
TPtr8 dest((TUint8*)aPtr,aMaxLength);
|
sl@0
|
71 |
TPtrC8 src(aFrom,anEnd-aFrom);
|
sl@0
|
72 |
|
sl@0
|
73 |
// Copy as much as possible from the output buffer to the destination
|
sl@0
|
74 |
TInt req=transfer(dest,iOut);
|
sl@0
|
75 |
|
sl@0
|
76 |
// If there's input in src, copy as much as possible to the input buffer
|
sl@0
|
77 |
// iIn. If the input buffer is full, the output buffer is empty, and there
|
sl@0
|
78 |
// is space in the destination buffer, process data
|
sl@0
|
79 |
if ((src.Length()==0 || transfer(iIn,src)==0) && req)
|
sl@0
|
80 |
{ // process input buffer to generate more output
|
sl@0
|
81 |
do
|
sl@0
|
82 |
{
|
sl@0
|
83 |
TPtr8 buf(iBuf,sizeof(iBuf));
|
sl@0
|
84 |
CryptL(buf,iIn);
|
sl@0
|
85 |
iOut.Set(buf);
|
sl@0
|
86 |
iIn.Zero();
|
sl@0
|
87 |
|
sl@0
|
88 |
// Copy as much data as possible from the output buffer to the final
|
sl@0
|
89 |
// destination (updating iOut to point to the remainder), and as
|
sl@0
|
90 |
// much as possible from the source to the input buffer. If we have
|
sl@0
|
91 |
// completely emptied the output buffer and filled the input buffer,
|
sl@0
|
92 |
// and there is space in the destination buffer, go round again.
|
sl@0
|
93 |
} while (transfer(dest,iOut) && transfer(iIn,src)==0);
|
sl@0
|
94 |
}
|
sl@0
|
95 |
|
sl@0
|
96 |
// Update client's src pointer to reflect what we've consumed
|
sl@0
|
97 |
aFrom=src.Ptr();
|
sl@0
|
98 |
|
sl@0
|
99 |
// Return the number of bytes output
|
sl@0
|
100 |
return dest.Length();
|
sl@0
|
101 |
}
|
sl@0
|
102 |
|
sl@0
|
103 |
TInt TSecureFilter::EmitL(const TDesC8& aDes)
|
sl@0
|
104 |
{
|
sl@0
|
105 |
TInt len=aDes.Length();
|
sl@0
|
106 |
if (len)
|
sl@0
|
107 |
TStreamFilter::EmitL(aDes.Ptr(),len);
|
sl@0
|
108 |
return len;
|
sl@0
|
109 |
}
|
sl@0
|
110 |
|
sl@0
|
111 |
EXPORT_C void TSecureFilter::DoSynchL()
|
sl@0
|
112 |
//
|
sl@0
|
113 |
// Pad out remaining input if necessary, encrypt and emit.
|
sl@0
|
114 |
//
|
sl@0
|
115 |
{
|
sl@0
|
116 |
if (IsCommitted())
|
sl@0
|
117 |
return;
|
sl@0
|
118 |
//
|
sl@0
|
119 |
EmitL(iOut);
|
sl@0
|
120 |
iOut.Set(NULL,0);
|
sl@0
|
121 |
TPtr8 buf(iBuf,sizeof(iBuf));
|
sl@0
|
122 |
CompleteL(buf,iIn);
|
sl@0
|
123 |
TStreamFilter::DoSynchL();
|
sl@0
|
124 |
Committed();
|
sl@0
|
125 |
}
|
sl@0
|
126 |
|
sl@0
|
127 |
|
sl@0
|
128 |
EXPORT_C TEncryptFilter::TEncryptFilter():
|
sl@0
|
129 |
iKey(NULL)
|
sl@0
|
130 |
/** Constructs an empty encrypting filter object.
|
sl@0
|
131 |
|
sl@0
|
132 |
The encrypting filter must be set up before use.
|
sl@0
|
133 |
|
sl@0
|
134 |
@see Set() */
|
sl@0
|
135 |
{}
|
sl@0
|
136 |
|
sl@0
|
137 |
|
sl@0
|
138 |
EXPORT_C void TEncryptFilter::SetL(MStreamBuf* aHost,CPBEncryptor* aKey,TInt aMode)
|
sl@0
|
139 |
/*
|
sl@0
|
140 |
Set this filter up for encryption using a Password Based Encryption object.
|
sl@0
|
141 |
@publishedPartner
|
sl@0
|
142 |
@leave KErrNoMemory. If a leave occurs, ownership of aKey is retained by the caller,
|
sl@0
|
143 |
which should thus keep aKey on the cleanup stack when calling this function.
|
sl@0
|
144 |
@param aHost The stream buffer that is the target for encrypted data.
|
sl@0
|
145 |
@param aKey A Password Based Encryption handling object.
|
sl@0
|
146 |
Ownership is transferred from the caller to this object as long as no allocation leave occurs.
|
sl@0
|
147 |
@param aMode The mode in which the stream buffer is to be used.
|
sl@0
|
148 |
By default, this is write mode as represented by EWrite.
|
sl@0
|
149 |
*/
|
sl@0
|
150 |
{
|
sl@0
|
151 |
__ASSERT_ALWAYS(aKey!=NULL,Panic(ECryptNoKey));
|
sl@0
|
152 |
iKey=aKey;
|
sl@0
|
153 |
TSecureFilter::Set(aHost,aMode);
|
sl@0
|
154 |
}
|
sl@0
|
155 |
|
sl@0
|
156 |
EXPORT_C TInt TEncryptFilter::CryptL(TDes8& aTarget,const TDesC8& aSource)
|
sl@0
|
157 |
{
|
sl@0
|
158 |
iKey->Process(aSource,aTarget);
|
sl@0
|
159 |
return aSource.Length();
|
sl@0
|
160 |
}
|
sl@0
|
161 |
|
sl@0
|
162 |
EXPORT_C void TEncryptFilter::CompleteL(TDes8& aTarget,const TDesC8& aSource)
|
sl@0
|
163 |
{
|
sl@0
|
164 |
// Encrypt and send remaining input buffer
|
sl@0
|
165 |
if (aSource.Length() > 0)
|
sl@0
|
166 |
{
|
sl@0
|
167 |
CryptL(aTarget, aSource);
|
sl@0
|
168 |
EmitL(aTarget);
|
sl@0
|
169 |
aTarget.Zero();
|
sl@0
|
170 |
}
|
sl@0
|
171 |
|
sl@0
|
172 |
TPtrC8 ptr;
|
sl@0
|
173 |
ptr.Set(NULL,0);
|
sl@0
|
174 |
iKey->ProcessFinalL(ptr, aTarget);
|
sl@0
|
175 |
EmitL(aTarget);
|
sl@0
|
176 |
}
|
sl@0
|
177 |
|
sl@0
|
178 |
EXPORT_C void TEncryptFilter::DoRelease()
|
sl@0
|
179 |
{
|
sl@0
|
180 |
delete iKey;
|
sl@0
|
181 |
iKey=NULL;
|
sl@0
|
182 |
TSecureFilter::DoRelease();
|
sl@0
|
183 |
}
|
sl@0
|
184 |
|
sl@0
|
185 |
EXPORT_C TDecryptFilter::TDecryptFilter():
|
sl@0
|
186 |
iKey(NULL)
|
sl@0
|
187 |
/** Constructs an empty decrypting filter object.
|
sl@0
|
188 |
|
sl@0
|
189 |
The decrypting filter must be set up before use.
|
sl@0
|
190 |
|
sl@0
|
191 |
@see Set() */
|
sl@0
|
192 |
{}
|
sl@0
|
193 |
|
sl@0
|
194 |
|
sl@0
|
195 |
EXPORT_C void TDecryptFilter::SetL(MStreamBuf* aHost,CPBDecryptor* aKey,TInt aMode)
|
sl@0
|
196 |
/*
|
sl@0
|
197 |
Set this filter up for decryption using a Password Based Encryption object.
|
sl@0
|
198 |
@publishedPartner
|
sl@0
|
199 |
@leave KErrNoMemory. If a leave occurs, ownership of aKey is retained by the caller,
|
sl@0
|
200 |
which should thus keep aKey on the cleanup stack when calling this function.
|
sl@0
|
201 |
@param aHost The stream buffer that is the source of encrypted data.
|
sl@0
|
202 |
@param aKey A Password Based Encryption decryption object.
|
sl@0
|
203 |
Ownership is transferred from the caller to this object as long as no allocation leave occurs.
|
sl@0
|
204 |
@param aMode The mode in which the stream buffer is to be used.
|
sl@0
|
205 |
By default, this is write mode as represented by ERead.
|
sl@0
|
206 |
*/
|
sl@0
|
207 |
{
|
sl@0
|
208 |
__ASSERT_ALWAYS(aKey!=NULL,Panic(ECryptNoKey));
|
sl@0
|
209 |
iKey=aKey;
|
sl@0
|
210 |
TSecureFilter::Set(aHost,aMode);
|
sl@0
|
211 |
}
|
sl@0
|
212 |
|
sl@0
|
213 |
EXPORT_C TInt TDecryptFilter::CryptL(TDes8& aTarget,const TDesC8& aSource)
|
sl@0
|
214 |
{
|
sl@0
|
215 |
iKey->Process(aSource,aTarget);
|
sl@0
|
216 |
return aSource.Length();
|
sl@0
|
217 |
}
|
sl@0
|
218 |
|
sl@0
|
219 |
EXPORT_C void TDecryptFilter::CompleteL(TDes8& /*aTarget*/,const TDesC8& aSource)
|
sl@0
|
220 |
{
|
sl@0
|
221 |
if (aSource.Length()!=0)
|
sl@0
|
222 |
User::Leave(KErrCorrupt);
|
sl@0
|
223 |
}
|
sl@0
|
224 |
|
sl@0
|
225 |
EXPORT_C void TDecryptFilter::DoRelease()
|
sl@0
|
226 |
{
|
sl@0
|
227 |
delete iKey;
|
sl@0
|
228 |
iKey=NULL;
|
sl@0
|
229 |
TSecureFilter::DoRelease();
|
sl@0
|
230 |
}
|
sl@0
|
231 |
|
sl@0
|
232 |
void HEncryptFilter::DoRelease()
|
sl@0
|
233 |
//
|
sl@0
|
234 |
// Finished with this filter.
|
sl@0
|
235 |
//
|
sl@0
|
236 |
{
|
sl@0
|
237 |
delete this;
|
sl@0
|
238 |
}
|
sl@0
|
239 |
|
sl@0
|
240 |
void HDecryptFilter::DoRelease()
|
sl@0
|
241 |
//
|
sl@0
|
242 |
// Finished with this filter.
|
sl@0
|
243 |
//
|
sl@0
|
244 |
{
|
sl@0
|
245 |
delete this;
|
sl@0
|
246 |
}
|
sl@0
|
247 |
|