Update contrib.
2 * Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
4 * This component and the accompanying materials are made available
5 * under the terms of the License "Eclipse Public License v1.0"
6 * which accompanies this distribution, and is available
7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
9 * Initial Contributors:
10 * Nokia Corporation - initial contribution.
19 #include "rijndaelimpl.h"
20 #include <cryptospi/keys.h>
22 #include "rijndaeltables.h"
23 #include "../../../source/common/inlines.h"
24 #include "pluginconfig.h"
25 #include "symmetriccipherimpl.h"
26 #include <cryptostrength.h>
28 using namespace SoftwareCrypto;
30 const TUint KAESKeyBytes128 = 16;
31 const TUint KAESKeyBytes192 = 24;
32 const TUint KAESKeyBytes256 = 32;
33 const TUint KAESBlockBytes = 16;
36 CRijndaelImpl::CRijndaelImpl(
40 TUid aImplementationUid) :
41 CSymmetricBlockCipherImpl(KAESBlockBytes, aCryptoMode, aOperationMode, aPadding),
42 iImplementationUid(aImplementationUid)
46 CRijndaelImpl* CRijndaelImpl::NewL(const CKey& aKey, TUid aCryptoMode, TUid aOperationMode,
47 TUid aPadding, TUid aImplementationUid)
49 CRijndaelImpl* self = CRijndaelImpl::NewLC(aKey, aCryptoMode, aOperationMode,
50 aPadding, aImplementationUid);
51 CleanupStack::Pop(self);
55 CRijndaelImpl* CRijndaelImpl::NewLC(const CKey& aKey, TUid aCryptoMode, TUid aOperationMode,
56 TUid aPadding, TUid aImplementationUid)
58 CRijndaelImpl* self = new(ELeave) CRijndaelImpl(aCryptoMode, aOperationMode, aPadding,
60 CleanupStack::PushL(self);
61 self->ConstructL(aKey);
63 const TDesC8& keyContent = aKey.GetTDesC8L(KSymmetricKeyParameterUid);
64 TCrypto::IsSymmetricWeakEnoughL(BytesToBits(keyContent.Size()) - keyContent.Size());
68 CRijndaelImpl::~CRijndaelImpl()
70 // make sure key information isn't visible to other processes if the
72 Mem::FillZ(&iK, sizeof(iK));
75 void CRijndaelImpl::ConstructL(const CKey& aKey)
77 CSymmetricBlockCipherImpl::ConstructL(aKey);
81 CExtendedCharacteristics* CRijndaelImpl::CreateExtendedCharacteristicsL()
83 // All Symbian software plug-ins have unlimited concurrency, cannot be reserved
84 // for exclusive use and are not CERTIFIED to be standards compliant.
85 return CExtendedCharacteristics::NewL(KMaxTInt, EFalse);
88 const CExtendedCharacteristics* CRijndaelImpl::GetExtendedCharacteristicsL()
90 return CRijndaelImpl::CreateExtendedCharacteristicsL();
93 TUid CRijndaelImpl::ImplementationUid() const
95 return iImplementationUid;
98 TBool CRijndaelImpl::IsValidKeyLength(TInt aKeyBytes) const
102 case KAESKeyBytes128:
103 case KAESKeyBytes192:
104 case KAESKeyBytes256:
111 void CRijndaelImpl::SetKeySchedule()
113 iRounds = iKeyBytes/4 + 6;
114 if (iCryptoMode.iUid == KCryptoModeEncrypt)
116 SetEncryptKeySchedule(*iKey, &iK[0]);
120 ASSERT(iCryptoMode.iUid == KCryptoModeDecrypt);
121 SetDecryptKeySchedule(*iKey, &iK[0]);
125 void CRijndaelImpl::TransformEncrypt(
129 for (TInt i = 0; i < aNumBlocks; ++i)
131 ModeEncryptStart(aBuffer);
133 TUint32 s0, s1, s2, s3, t0, t1, t2, t3;
134 const TUint32* rk = &iK[0];
137 * map byte array block to cipher state
138 * and add initial round key:
140 GetBlockBigEndian(aBuffer, s0, s1, s2, s3);
146 * Nr - 1 full rounds:
148 TUint r = iRounds >> 1;
152 RIJNDAEL_TABLE::Te0[GETBYTE(s0, 3)] ^
153 RIJNDAEL_TABLE::Te1[GETBYTE(s1, 2)] ^
154 RIJNDAEL_TABLE::Te2[GETBYTE(s2, 1)] ^
155 RIJNDAEL_TABLE::Te3[GETBYTE(s3, 0)] ^
158 RIJNDAEL_TABLE::Te0[GETBYTE(s1, 3)] ^
159 RIJNDAEL_TABLE::Te1[GETBYTE(s2, 2)] ^
160 RIJNDAEL_TABLE::Te2[GETBYTE(s3, 1)] ^
161 RIJNDAEL_TABLE::Te3[GETBYTE(s0, 0)] ^
164 RIJNDAEL_TABLE::Te0[GETBYTE(s2, 3)] ^
165 RIJNDAEL_TABLE::Te1[GETBYTE(s3, 2)] ^
166 RIJNDAEL_TABLE::Te2[GETBYTE(s0, 1)] ^
167 RIJNDAEL_TABLE::Te3[GETBYTE(s1, 0)] ^
170 RIJNDAEL_TABLE::Te0[GETBYTE(s3, 3)] ^
171 RIJNDAEL_TABLE::Te1[GETBYTE(s0, 2)] ^
172 RIJNDAEL_TABLE::Te2[GETBYTE(s1, 1)] ^
173 RIJNDAEL_TABLE::Te3[GETBYTE(s2, 0)] ^
181 RIJNDAEL_TABLE::Te0[GETBYTE(t0, 3)] ^
182 RIJNDAEL_TABLE::Te1[GETBYTE(t1, 2)] ^
183 RIJNDAEL_TABLE::Te2[GETBYTE(t2, 1)] ^
184 RIJNDAEL_TABLE::Te3[GETBYTE(t3, 0)] ^
187 RIJNDAEL_TABLE::Te0[GETBYTE(t1, 3)] ^
188 RIJNDAEL_TABLE::Te1[GETBYTE(t2, 2)] ^
189 RIJNDAEL_TABLE::Te2[GETBYTE(t3, 1)] ^
190 RIJNDAEL_TABLE::Te3[GETBYTE(t0, 0)] ^
193 RIJNDAEL_TABLE::Te0[GETBYTE(t2, 3)] ^
194 RIJNDAEL_TABLE::Te1[GETBYTE(t3, 2)] ^
195 RIJNDAEL_TABLE::Te2[GETBYTE(t0, 1)] ^
196 RIJNDAEL_TABLE::Te3[GETBYTE(t1, 0)] ^
199 RIJNDAEL_TABLE::Te0[GETBYTE(t3, 3)] ^
200 RIJNDAEL_TABLE::Te1[GETBYTE(t0, 2)] ^
201 RIJNDAEL_TABLE::Te2[GETBYTE(t1, 1)] ^
202 RIJNDAEL_TABLE::Te3[GETBYTE(t2, 0)] ^
206 * apply last round and
207 * map cipher state to byte array block:
211 (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 3)] & 0xff000000) ^
212 (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 2)] & 0x00ff0000) ^
213 (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 1)] & 0x0000ff00) ^
214 (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 0)] & 0x000000ff) ^
217 (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 3)] & 0xff000000) ^
218 (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 2)] & 0x00ff0000) ^
219 (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 1)] & 0x0000ff00) ^
220 (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 0)] & 0x000000ff) ^
223 (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 3)] & 0xff000000) ^
224 (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 2)] & 0x00ff0000) ^
225 (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 1)] & 0x0000ff00) ^
226 (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 0)] & 0x000000ff) ^
229 (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 3)] & 0xff000000) ^
230 (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 2)] & 0x00ff0000) ^
231 (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 1)] & 0x0000ff00) ^
232 (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 0)] & 0x000000ff) ^
235 PutBlockBigEndian(aBuffer, s0, s1, s2, s3);
236 ModeEncryptEnd(aBuffer);
237 aBuffer += KAESBlockBytes;
241 void CRijndaelImpl::TransformDecrypt(
245 for (TInt i = 0; i < aNumBlocks; ++i)
247 ModeDecryptStart(aBuffer);
249 TUint32 s0, s1, s2, s3, t0, t1, t2, t3;
250 const TUint32* rk = &iK[0];
253 * map byte array block to cipher state
254 * and add initial round key:
256 GetBlockBigEndian(aBuffer, s0, s1, s2, s3);
263 * Nr - 1 full rounds:
265 TUint r = iRounds >> 1;
269 RIJNDAEL_TABLE::Td0[GETBYTE(s0, 3)] ^
270 RIJNDAEL_TABLE::Td1[GETBYTE(s3, 2)] ^
271 RIJNDAEL_TABLE::Td2[GETBYTE(s2, 1)] ^
272 RIJNDAEL_TABLE::Td3[GETBYTE(s1, 0)] ^
275 RIJNDAEL_TABLE::Td0[GETBYTE(s1, 3)] ^
276 RIJNDAEL_TABLE::Td1[GETBYTE(s0, 2)] ^
277 RIJNDAEL_TABLE::Td2[GETBYTE(s3, 1)] ^
278 RIJNDAEL_TABLE::Td3[GETBYTE(s2, 0)] ^
281 RIJNDAEL_TABLE::Td0[GETBYTE(s2, 3)] ^
282 RIJNDAEL_TABLE::Td1[GETBYTE(s1, 2)] ^
283 RIJNDAEL_TABLE::Td2[GETBYTE(s0, 1)] ^
284 RIJNDAEL_TABLE::Td3[GETBYTE(s3, 0)] ^
287 RIJNDAEL_TABLE::Td0[GETBYTE(s3, 3)] ^
288 RIJNDAEL_TABLE::Td1[GETBYTE(s2, 2)] ^
289 RIJNDAEL_TABLE::Td2[GETBYTE(s1, 1)] ^
290 RIJNDAEL_TABLE::Td3[GETBYTE(s0, 0)] ^
298 RIJNDAEL_TABLE::Td0[GETBYTE(t0, 3)] ^
299 RIJNDAEL_TABLE::Td1[GETBYTE(t3, 2)] ^
300 RIJNDAEL_TABLE::Td2[GETBYTE(t2, 1)] ^
301 RIJNDAEL_TABLE::Td3[GETBYTE(t1, 0)] ^
304 RIJNDAEL_TABLE::Td0[GETBYTE(t1, 3)] ^
305 RIJNDAEL_TABLE::Td1[GETBYTE(t0, 2)] ^
306 RIJNDAEL_TABLE::Td2[GETBYTE(t3, 1)] ^
307 RIJNDAEL_TABLE::Td3[GETBYTE(t2, 0)] ^
310 RIJNDAEL_TABLE::Td0[GETBYTE(t2, 3)] ^
311 RIJNDAEL_TABLE::Td1[GETBYTE(t1, 2)] ^
312 RIJNDAEL_TABLE::Td2[GETBYTE(t0, 1)] ^
313 RIJNDAEL_TABLE::Td3[GETBYTE(t3, 0)] ^
316 RIJNDAEL_TABLE::Td0[GETBYTE(t3, 3)] ^
317 RIJNDAEL_TABLE::Td1[GETBYTE(t2, 2)] ^
318 RIJNDAEL_TABLE::Td2[GETBYTE(t1, 1)] ^
319 RIJNDAEL_TABLE::Td3[GETBYTE(t0, 0)] ^
323 * apply last round and
324 * map cipher state to byte array block:
327 (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 3)] & 0xff000000) ^
328 (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 2)] & 0x00ff0000) ^
329 (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 1)] & 0x0000ff00) ^
330 (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 0)] & 0x000000ff) ^
333 (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 3)] & 0xff000000) ^
334 (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 2)] & 0x00ff0000) ^
335 (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 1)] & 0x0000ff00) ^
336 (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 0)] & 0x000000ff) ^
339 (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 3)] & 0xff000000) ^
340 (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 2)] & 0x00ff0000) ^
341 (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 1)] & 0x0000ff00) ^
342 (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 0)] & 0x000000ff) ^
345 (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 3)] & 0xff000000) ^
346 (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 2)] & 0x00ff0000) ^
347 (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 1)] & 0x0000ff00) ^
348 (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 0)] & 0x000000ff) ^
350 PutBlockBigEndian(aBuffer, s0, s1, s2, s3);
351 ModeDecryptEnd(aBuffer);
352 aBuffer += KAESBlockBytes;
356 void CRijndaelImpl::SetEncryptKeySchedule(const TDesC8& aKey, TUint32* aKeySchedule)
358 TUint keySize = aKey.Length();
360 TUint32* rk = aKeySchedule;
364 GetUserKeyBigEndian(rk, keySize/4, &aKey[0], keySize);
368 case (KAESKeyBytes128):
374 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
375 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
376 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
377 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
378 RIJNDAEL_TABLE::rcon[i];
379 rk[5] = rk[1] ^ rk[4];
380 rk[6] = rk[2] ^ rk[5];
381 rk[7] = rk[3] ^ rk[6];
389 case (KAESKeyBytes192):
395 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
396 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
397 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
398 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
399 RIJNDAEL_TABLE::rcon[i];
400 rk[ 7] = rk[ 1] ^ rk[ 6];
401 rk[ 8] = rk[ 2] ^ rk[ 7];
402 rk[ 9] = rk[ 3] ^ rk[ 8];
405 rk[10] = rk[ 4] ^ rk[ 9];
406 rk[11] = rk[ 5] ^ rk[10];
412 case (KAESKeyBytes256):
418 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
419 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
420 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
421 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
422 RIJNDAEL_TABLE::rcon[i];
423 rk[ 9] = rk[ 1] ^ rk[ 8];
424 rk[10] = rk[ 2] ^ rk[ 9];
425 rk[11] = rk[ 3] ^ rk[10];
430 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0xff000000) ^
431 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0x00ff0000) ^
432 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x0000ff00) ^
433 (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x000000ff);
434 rk[13] = rk[ 5] ^ rk[12];
435 rk[14] = rk[ 6] ^ rk[13];
436 rk[15] = rk[ 7] ^ rk[14];
444 assert(0); // Shouldn't get here, keeps compiler happy
448 void CRijndaelImpl::SetDecryptKeySchedule(const TDesC8& aKey, TUint32* aKeySchedule)
450 SetEncryptKeySchedule(aKey, aKeySchedule);
453 TUint32* rk = aKeySchedule;
456 // invert the order of the round keys
457 for (i = 0, j = 4*iRounds; i < j; i += 4, j -= 4)
459 temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp;
460 temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
461 temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
462 temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
465 // apply the inverse MixColumn transform to all round keys but the first and the last
466 for (i = 1; i < iRounds; i++)
470 RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 3)] & 0xff] ^
471 RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 2)] & 0xff] ^
472 RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 1)] & 0xff] ^
473 RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 0)] & 0xff];
475 RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 3)] & 0xff] ^
476 RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 2)] & 0xff] ^
477 RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 1)] & 0xff] ^
478 RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 0)] & 0xff];
480 RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 3)] & 0xff] ^
481 RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 2)] & 0xff] ^
482 RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 1)] & 0xff] ^
483 RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 0)] & 0xff];
485 RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 3)] & 0xff] ^
486 RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 2)] & 0xff] ^
487 RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 1)] & 0xff] ^
488 RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 0)] & 0xff];