os/security/crypto/weakcryptospi/test/tplugins/src/rsaimpl.cpp
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
*
sl@0
    16
*/
sl@0
    17
sl@0
    18
sl@0
    19
#include "rsaimpl.h"
sl@0
    20
#include "rsafunction.h"
sl@0
    21
#include "pluginconfig.h"
sl@0
    22
#include <cryptopanic.h>
sl@0
    23
#include <cryptostrength.h>
sl@0
    24
#include <securityerr.h>
sl@0
    25
sl@0
    26
using namespace SoftwareCrypto;
sl@0
    27
sl@0
    28
/* CRSAImpl */
sl@0
    29
CRSAImpl::CRSAImpl(
sl@0
    30
	TUid aImplementationUid,
sl@0
    31
	TUid aCryptoMode,
sl@0
    32
	TUid aPadding) : 
sl@0
    33
	CAsymmetricCipherImpl(aCryptoMode, aPadding),
sl@0
    34
	iImplementationUid(aImplementationUid)
sl@0
    35
	{
sl@0
    36
	}
sl@0
    37
sl@0
    38
CRSAImpl* CRSAImpl::NewL(TUid aImplementationUid, const CKey& aKey, TUid aCryptoMode, TUid aPadding)
sl@0
    39
	{
sl@0
    40
	CRSAImpl* self = CRSAImpl::NewLC(aImplementationUid, aKey, aCryptoMode, aPadding);
sl@0
    41
	CleanupStack::Pop(self);
sl@0
    42
	return self;
sl@0
    43
	}
sl@0
    44
	
sl@0
    45
CRSAImpl* CRSAImpl::NewLC(TUid aImplementationUid, const CKey& aKey, TUid aCryptoMode, TUid aPadding)
sl@0
    46
	{
sl@0
    47
	CRSAImpl* self = new(ELeave) CRSAImpl(aImplementationUid, aCryptoMode, aPadding);
sl@0
    48
	CleanupStack::PushL(self);
sl@0
    49
	self->ConstructL(aKey);
sl@0
    50
	return self;
sl@0
    51
	}
sl@0
    52
	
sl@0
    53
CRSAImpl::~CRSAImpl()
sl@0
    54
	{
sl@0
    55
	}
sl@0
    56
	
sl@0
    57
TInt CRSAImpl::GetMaximumOutputLengthL() const
sl@0
    58
	{
sl@0
    59
	const TInteger& N = iKey->GetBigIntL(KRsaKeyParameterNUid);
sl@0
    60
	
sl@0
    61
	if (iCryptoMode.iUid == KCryptoModeDecrypt)
sl@0
    62
		return N.ByteCount() - iPadding->MinPaddingLength();
sl@0
    63
	else
sl@0
    64
		return N.ByteCount();
sl@0
    65
	}
sl@0
    66
	
sl@0
    67
TInt CRSAImpl::GetMaximumInputLengthL() const
sl@0
    68
	{
sl@0
    69
	const TInteger& N = iKey->GetBigIntL(KRsaKeyParameterNUid);
sl@0
    70
	
sl@0
    71
	if (iCryptoMode.iUid == KCryptoModeEncrypt)
sl@0
    72
		return N.ByteCount() - iPadding->MinPaddingLength();
sl@0
    73
	else
sl@0
    74
		return N.ByteCount();
sl@0
    75
	}
sl@0
    76
	
sl@0
    77
void CRSAImpl::ConstructL(const CKey& aKey)
sl@0
    78
	{
sl@0
    79
	const TInteger& N = aKey.GetBigIntL(KRsaKeyParameterNUid);
sl@0
    80
	TCrypto::IsAsymmetricWeakEnoughL(N.BitCount());
sl@0
    81
	CAsymmetricCipherImpl::ConstructL(aKey);
sl@0
    82
	
sl@0
    83
	if (! IsValidKeyLengthL(N.ByteCount()))
sl@0
    84
		{
sl@0
    85
		User::Leave(KErrKeySize);
sl@0
    86
		}
sl@0
    87
	}
sl@0
    88
	
sl@0
    89
CExtendedCharacteristics* CRSAImpl::CreateExtendedCharacteristicsL()
sl@0
    90
	{
sl@0
    91
	// All Symbian software plug-ins have unlimited concurrency, cannot be reserved
sl@0
    92
	// for exclusive use and are not CERTIFIED to be standards compliant.
sl@0
    93
	return CExtendedCharacteristics::NewL(KMaxTInt, EFalse);
sl@0
    94
	}
sl@0
    95
	
sl@0
    96
const CExtendedCharacteristics* CRSAImpl::GetExtendedCharacteristicsL()
sl@0
    97
	{
sl@0
    98
	return CRSAImpl::CreateExtendedCharacteristicsL();
sl@0
    99
	}
sl@0
   100
	
sl@0
   101
TUid CRSAImpl::ImplementationUid() const
sl@0
   102
	{
sl@0
   103
	return iImplementationUid;
sl@0
   104
	}
sl@0
   105
	
sl@0
   106
void CRSAImpl::EncryptL(const TDesC8& aInput, TDes8& aOutput) const
sl@0
   107
	{
sl@0
   108
	__ASSERT_DEBUG(aOutput.MaxLength() >= GetMaximumOutputLengthL(), User::Panic(KCryptoPanic, ECryptoPanicOutputDescriptorOverflow));
sl@0
   109
	__ASSERT_DEBUG(aInput.Length() <= GetMaximumInputLengthL(), User::Panic(KCryptoPanic, ECryptoPanicInputTooLarge));
sl@0
   110
	
sl@0
   111
	HBufC8* buf = HBufC8::NewLC(GetMaximumOutputLengthL());
sl@0
   112
	TPtr8 ptr = buf->Des();
sl@0
   113
	
sl@0
   114
	iPadding->PadL(aInput, ptr);
sl@0
   115
	RInteger input = RInteger::NewL(ptr);
sl@0
   116
	CleanupStack::PushL(input);
sl@0
   117
	
sl@0
   118
	RInteger output;
sl@0
   119
	RSAFunction::EncryptL(*iKey, input, output);
sl@0
   120
	CleanupStack::PushL(output);
sl@0
   121
	
sl@0
   122
	aOutput.Append(*(output.BufferLC()));
sl@0
   123
	CleanupStack::PopAndDestroy(4, buf); //BufferLC, output, input, buf
sl@0
   124
	}
sl@0
   125
sl@0
   126
void CRSAImpl::DecryptL(const TDesC8& aInput, TDes8& aOutput) const
sl@0
   127
	{
sl@0
   128
	__ASSERT_DEBUG(aOutput.MaxLength() >= GetMaximumOutputLengthL(), User::Panic(KCryptoPanic, ECryptoPanicOutputDescriptorOverflow));
sl@0
   129
	__ASSERT_DEBUG(aInput.Length() <= GetMaximumInputLengthL(), User::Panic(KCryptoPanic, ECryptoPanicInputTooLarge));
sl@0
   130
	
sl@0
   131
	RInteger input = RInteger::NewL(aInput);
sl@0
   132
	CleanupStack::PushL(input);
sl@0
   133
	
sl@0
   134
	RInteger output;
sl@0
   135
	
sl@0
   136
	RSAFunction::DecryptL(*iKey, input, output);
sl@0
   137
	CleanupStack::PushL(output);
sl@0
   138
	
sl@0
   139
	TPtrC8 ptr = *(output.BufferLC());
sl@0
   140
	iPadding->UnPadL(ptr, aOutput);
sl@0
   141
	
sl@0
   142
	CleanupStack::PopAndDestroy(3, &input); //BufferLC(), output, input
sl@0
   143
	}
sl@0
   144
sl@0
   145
void CRSAImpl::ProcessL(const TDesC8& aInput, TDes8& aOutput)
sl@0
   146
	{
sl@0
   147
	if (iCryptoMode.iUid == KCryptoModeEncrypt)
sl@0
   148
		{
sl@0
   149
		EncryptL(aInput, aOutput);
sl@0
   150
		}
sl@0
   151
	else
sl@0
   152
		{
sl@0
   153
		DecryptL(aInput, aOutput);
sl@0
   154
		}
sl@0
   155
	}
sl@0
   156
sl@0
   157
TBool CRSAImpl::IsValidKeyLengthL(TInt aKeyBytes) const
sl@0
   158
	{
sl@0
   159
	if (aKeyBytes < 1)
sl@0
   160
		return EFalse;
sl@0
   161
	
sl@0
   162
	switch (iCryptoMode.iUid)
sl@0
   163
		{
sl@0
   164
		case KCryptoModeEncrypt:
sl@0
   165
			// Check if GetMaximumInputLengthL() makes sense,
sl@0
   166
			// if not the key length must be too small
sl@0
   167
			if (GetMaximumInputLengthL() <= 0)
sl@0
   168
				return EFalse;
sl@0
   169
			break;
sl@0
   170
		
sl@0
   171
		case KCryptoModeDecrypt:
sl@0
   172
			// Check if GetMaximumOutputLengthL() makes sense,
sl@0
   173
			// if not the key length must be too small
sl@0
   174
			if (GetMaximumOutputLengthL() <= 0)
sl@0
   175
				return EFalse;
sl@0
   176
			break;
sl@0
   177
		}
sl@0
   178
	return ETrue;
sl@0
   179
	}
sl@0
   180