os/persistentdata/persistentstorage/store/UCRYPT/UE_FLTR.CPP
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/persistentdata/persistentstorage/store/UCRYPT/UE_FLTR.CPP	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,247 @@
     1.4 +// Copyright (c) 1998-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.5 +// All rights reserved.
     1.6 +// This component and the accompanying materials are made available
     1.7 +// under the terms of "Eclipse Public License v1.0"
     1.8 +// which accompanies this distribution, and is available
     1.9 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.10 +//
    1.11 +// Initial Contributors:
    1.12 +// Nokia Corporation - initial contribution.
    1.13 +//
    1.14 +// Contributors:
    1.15 +//
    1.16 +// Description:
    1.17 +//
    1.18 +
    1.19 +#include "UE_STD.H"
    1.20 +
    1.21 +#include <pbe.h>
    1.22 +
    1.23 +#define UNUSED_VAR(a) a = a
    1.24 +
    1.25 +TSecureFilter::TSecureFilter()
    1.26 +	{}
    1.27 +
    1.28 +void TSecureFilter::Set(MStreamBuf* aHost,TInt aMode)
    1.29 +//
    1.30 +// Set this filter up for encryption.
    1.31 +//
    1.32 +	{
    1.33 +	TStreamFilter::Set(aHost,aMode);
    1.34 +	iIn.Zero();
    1.35 +//	Make sure any header added by the en/de-cryption goes
    1.36 +//	straight into the output buffer 
    1.37 +    TPtr8 buf(iBuf,sizeof(iBuf));
    1.38 +    TRAPD(r, CryptL(buf,iIn));
    1.39 +    UNUSED_VAR(r);
    1.40 +    iOut.Set(buf);
    1.41 +	}
    1.42 +
    1.43 +EXPORT_C TInt TSecureFilter::Capacity(TInt aMaxLength)
    1.44 +//
    1.45 +// Return the maximum guaranteed input used for aMaxLength output.
    1.46 +// If we can fulfil the request from the output buffer, consume nothing,
    1.47 +// otherwise return the space left in the input buffer
    1.48 +//
    1.49 +	{
    1.50 +	return aMaxLength<=iOut.Length() ? 0 : KEncryptionFilterBufSize-iIn.Length();
    1.51 +	}
    1.52 +
    1.53 +LOCAL_C TInt transfer(TDes8& aTarg,TPtrC8& aSrc)
    1.54 +	{
    1.55 +	TInt avail=aTarg.MaxLength()-aTarg.Length();
    1.56 +	TInt len=Min(aSrc.Length(),avail);
    1.57 +	if (len)
    1.58 +		{
    1.59 +		aTarg.Append(aSrc.Left(len));
    1.60 +		aSrc.Set(aSrc.Mid(len));
    1.61 +		}
    1.62 +	return avail-len;
    1.63 +	}
    1.64 +
    1.65 +EXPORT_C TInt TSecureFilter::FilterL(TAny* aPtr,TInt aMaxLength,const TUint8*& aFrom,const TUint8* anEnd)
    1.66 +//
    1.67 +// Encrypt the input buffer.
    1.68 +//
    1.69 +// This must consume all its input - when called during reading, it's asserted
    1.70 +// that aFrom == anEnd after calling this
    1.71 +//
    1.72 +	{
    1.73 +	TPtr8 dest((TUint8*)aPtr,aMaxLength);
    1.74 +	TPtrC8 src(aFrom,anEnd-aFrom);
    1.75 +
    1.76 +    // Copy as much as possible from the output buffer to the destination
    1.77 +	TInt req=transfer(dest,iOut);
    1.78 +
    1.79 +    // If there's input in src, copy as much as possible to the input buffer
    1.80 +    // iIn.  If the input buffer is full, the output buffer is empty, and there
    1.81 +    // is space in the destination buffer, process data
    1.82 +	if ((src.Length()==0 || transfer(iIn,src)==0) && req)
    1.83 +		{	// process input buffer to generate more output
    1.84 +		do
    1.85 +			{
    1.86 +            TPtr8 buf(iBuf,sizeof(iBuf));
    1.87 +			CryptL(buf,iIn);
    1.88 +			iOut.Set(buf);
    1.89 +            iIn.Zero();
    1.90 +
    1.91 +            // Copy as much data as possible from the output buffer to the final
    1.92 +            // destination (updating iOut to point to the remainder), and as
    1.93 +            // much as possible from the source to the input buffer.  If we have
    1.94 +            // completely emptied the output buffer and filled the input buffer,
    1.95 +            // and there is space in the destination buffer, go round again.
    1.96 +			} while (transfer(dest,iOut) && transfer(iIn,src)==0);
    1.97 +		}
    1.98 +
    1.99 +    // Update client's src pointer to reflect what we've consumed
   1.100 +	aFrom=src.Ptr();
   1.101 +
   1.102 +    // Return the number of bytes output
   1.103 +	return dest.Length();	
   1.104 +}
   1.105 +
   1.106 +TInt TSecureFilter::EmitL(const TDesC8& aDes)
   1.107 +	{
   1.108 +	TInt len=aDes.Length();
   1.109 +	if (len)
   1.110 +		TStreamFilter::EmitL(aDes.Ptr(),len);
   1.111 +	return len;
   1.112 +	}
   1.113 +
   1.114 +EXPORT_C void TSecureFilter::DoSynchL()
   1.115 +//
   1.116 +// Pad out remaining input if necessary, encrypt and emit.
   1.117 +//
   1.118 +	{
   1.119 +	if (IsCommitted())
   1.120 +		return;
   1.121 +//
   1.122 +	EmitL(iOut);
   1.123 +	iOut.Set(NULL,0);
   1.124 +	TPtr8 buf(iBuf,sizeof(iBuf));
   1.125 +	CompleteL(buf,iIn);
   1.126 +	TStreamFilter::DoSynchL();
   1.127 +	Committed();
   1.128 +	}
   1.129 +
   1.130 +
   1.131 +EXPORT_C TEncryptFilter::TEncryptFilter():
   1.132 +	iKey(NULL)
   1.133 +/** Constructs an empty encrypting filter object.
   1.134 +
   1.135 +The encrypting filter must be set up before use.
   1.136 +
   1.137 +@see Set() */
   1.138 +	{}
   1.139 +
   1.140 +
   1.141 +EXPORT_C void TEncryptFilter::SetL(MStreamBuf* aHost,CPBEncryptor* aKey,TInt aMode)
   1.142 +/*
   1.143 +Set this filter up for encryption using a Password Based Encryption object.
   1.144 +@publishedPartner
   1.145 +@leave KErrNoMemory. If a leave occurs, ownership of aKey is retained by the caller, 
   1.146 +which should thus keep aKey on the cleanup stack when calling this function.
   1.147 +@param aHost The stream buffer that is the target for encrypted data.
   1.148 +@param aKey A Password Based Encryption handling object. 
   1.149 +Ownership is transferred from the caller to this object as long as no allocation leave occurs.
   1.150 +@param aMode The mode in which the stream buffer is to be used. 
   1.151 +By default, this is write mode as represented by EWrite.
   1.152 +*/
   1.153 +	{
   1.154 +    __ASSERT_ALWAYS(aKey!=NULL,Panic(ECryptNoKey));
   1.155 +    iKey=aKey;
   1.156 +	TSecureFilter::Set(aHost,aMode);
   1.157 +	}
   1.158 +
   1.159 +EXPORT_C TInt TEncryptFilter::CryptL(TDes8& aTarget,const TDesC8& aSource)
   1.160 +	{
   1.161 +    iKey->Process(aSource,aTarget);
   1.162 +    return aSource.Length();
   1.163 +	}
   1.164 +
   1.165 +EXPORT_C void TEncryptFilter::CompleteL(TDes8& aTarget,const TDesC8& aSource)
   1.166 +	{
   1.167 +// Encrypt and send remaining input buffer
   1.168 +    if (aSource.Length() > 0)
   1.169 +        {
   1.170 +        CryptL(aTarget, aSource);
   1.171 +        EmitL(aTarget);
   1.172 +        aTarget.Zero();
   1.173 +        }
   1.174 +
   1.175 +	TPtrC8 ptr;
   1.176 +	ptr.Set(NULL,0);
   1.177 +    iKey->ProcessFinalL(ptr, aTarget);
   1.178 +	EmitL(aTarget);	
   1.179 +}
   1.180 +
   1.181 +EXPORT_C void TEncryptFilter::DoRelease()
   1.182 +	{
   1.183 +	delete iKey;
   1.184 +	iKey=NULL;
   1.185 +	TSecureFilter::DoRelease();
   1.186 +	}
   1.187 +
   1.188 +EXPORT_C TDecryptFilter::TDecryptFilter():
   1.189 +	iKey(NULL)
   1.190 +/** Constructs an empty decrypting filter object.
   1.191 +
   1.192 +The decrypting filter must be set up before use.
   1.193 +
   1.194 +@see Set() */
   1.195 +	{}
   1.196 +
   1.197 +
   1.198 +EXPORT_C void TDecryptFilter::SetL(MStreamBuf* aHost,CPBDecryptor* aKey,TInt aMode)
   1.199 +/*
   1.200 +Set this filter up for decryption using a Password Based Encryption object.
   1.201 +@publishedPartner
   1.202 +@leave KErrNoMemory. If a leave occurs, ownership of aKey is retained by the caller, 
   1.203 +which should thus keep aKey on the cleanup stack when calling this function.
   1.204 +@param aHost The stream buffer that is the source of encrypted data.
   1.205 +@param aKey A Password Based Encryption decryption object. 
   1.206 +Ownership is transferred from the caller to this object as long as no allocation leave occurs.
   1.207 +@param aMode The mode in which the stream buffer is to be used. 
   1.208 +By default, this is write mode as represented by ERead.
   1.209 +*/
   1.210 +	{
   1.211 +	__ASSERT_ALWAYS(aKey!=NULL,Panic(ECryptNoKey));
   1.212 +	iKey=aKey;
   1.213 +	TSecureFilter::Set(aHost,aMode);
   1.214 +	}
   1.215 +
   1.216 +EXPORT_C TInt TDecryptFilter::CryptL(TDes8& aTarget,const TDesC8& aSource)
   1.217 +	{
   1.218 +    iKey->Process(aSource,aTarget);
   1.219 +    return aSource.Length();
   1.220 +	}
   1.221 +
   1.222 +EXPORT_C void TDecryptFilter::CompleteL(TDes8& /*aTarget*/,const TDesC8& aSource)
   1.223 +	{
   1.224 +	if (aSource.Length()!=0)
   1.225 +		User::Leave(KErrCorrupt);
   1.226 +	}
   1.227 +
   1.228 +EXPORT_C void TDecryptFilter::DoRelease()
   1.229 +	{
   1.230 +	delete iKey;
   1.231 +	iKey=NULL;
   1.232 +	TSecureFilter::DoRelease();
   1.233 +	}
   1.234 +
   1.235 +void HEncryptFilter::DoRelease()
   1.236 +//
   1.237 +// Finished with this filter.
   1.238 +//
   1.239 +	{
   1.240 +	delete this;
   1.241 +	}
   1.242 +
   1.243 +void HDecryptFilter::DoRelease()
   1.244 +//
   1.245 +// Finished with this filter.
   1.246 +//
   1.247 +	{
   1.248 +	delete this;
   1.249 +	}
   1.250 +