diff -r 000000000000 -r bde4ae8d615e os/security/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymmetriccipherstep.cpp --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/os/security/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymmetriccipherstep.cpp Fri Jun 15 03:10:57 2012 +0200 @@ -0,0 +1,239 @@ +/* +* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies). +* All rights reserved. +* This component and the accompanying materials are made available +* under the terms of the License "Eclipse Public License v1.0" +* which accompanies this distribution, and is available +* at the URL "http://www.eclipse.org/legal/epl-v10.html". +* +* Initial Contributors: +* Nokia Corporation - initial contribution. +* +* Contributors: +* +* Description: +* +*/ + + +/** + @file + @internalTechnology +*/ + +#include "plugincharsasymmetriccipherstep.h" +#include "plugincharschecker.h" + +#include +#include +#include + +using namespace CryptoSpi; + +CPluginCharsAsymmetricCipherStep::~CPluginCharsAsymmetricCipherStep() + { + } + +CPluginCharsAsymmetricCipherStep::CPluginCharsAsymmetricCipherStep() + { + SetTestStepName(KPluginCharsAsymmetricCipherStep); + } + +TVerdict CPluginCharsAsymmetricCipherStep::doTestStepPreambleL() + { + SetTestStepResult(EPass); + return TestStepResult(); + } + +TVerdict CPluginCharsAsymmetricCipherStep::doTestStepL() + { + + INFO_PRINTF1(_L("Plugin Characteristics - Asymmetric Cipher Chracteristics")); + INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells()); + + if (TestStepResult()==EPass) + { + + //Assume faliure, unless all is successful + SetTestStepResult(EFail); + + TVariantPtrC algorithmUid; + TVariantPtrC cryptoMode; + TVariantPtrC paddingMode; + TVariantPtrC invalidPaddingMode; + + //Each of the individual parameters required to create the Asymmetric Cipher object + //are read in from the specified INI configuration file + if(!GetStringFromConfig(ConfigSection(),KConfigAlgorithmUid,algorithmUid) || + !GetStringFromConfig(ConfigSection(),KConfigCryptoMode,cryptoMode) || + !GetStringFromConfig(ConfigSection(),KConfigPaddingMode,paddingMode) || + !GetStringFromConfig(ConfigSection(),KConfigInvalidPaddingMode,invalidPaddingMode)) + { + ERR_PRINTF1(_L("** .INI Error: Asymmetric Cipher Arguments Not Located **")); + SetTestStepResult(EFail); + } + else + { + CCryptoParams* keyParams = CCryptoParams::NewLC(); + + //**************************************************** + //Create Key Pair and Key Pair Generator Objects + CKeyPair* keyPair = NULL; + CKeyPairGenerator * keypairImpl = NULL; + + INFO_PRINTF1(_L("Generating RSA keys")); + + // create an RSA key pair + keyParams->AddL(KKeyExponent, KRsaKeyParameterEUid); + keyParams->AddL(KRsaPrivateKeyStandard, KRsaKeyTypeUid); + + // create a key pair generator implementation interface + TRAPD_LOG(err,CKeyPairGeneratorFactory::CreateKeyPairGeneratorL(keypairImpl, + KRSAKeyPairGeneratorUid, + keyParams)); + + CleanupStack::PushL(keypairImpl); + + // Create a Key Pair + TRAP_LOG(err,keypairImpl->GenerateKeyPairL(1024, *keyParams, keyPair)); + + CleanupStack::PushL(keyPair); + + //***************************************************** + + CAsymmetricCipher* asymmetricCipherImpl = NULL; + + TRAP(err,CAsymmetricCipherFactory::CreateAsymmetricCipherL(asymmetricCipherImpl, + algorithmUid, + keyPair->PrivateKey(), + cryptoMode, + paddingMode, + NULL)); + + if(asymmetricCipherImpl && (err == KErrNone)) + { + + CleanupStack::PushL(asymmetricCipherImpl); + + INFO_PRINTF1(_L("** Successfully Loaded Asymmetric Cipher Object **")); + + //Define a pointer of type TCharacteristics in order to store the asymmetric cipher + //encryption object's characterisctics + const TCharacteristics* chars(NULL); + + //Retrieve the characteristics for the asymmetric cipher implementation object + TRAP_LOG(err, asymmetricCipherImpl->GetCharacteristicsL(chars)); + + //Static cast the characteristics to type TAsymmetricCipherCharacteristics + const TAsymmetricCipherCharacteristics* asymmetricChars = static_cast(chars); + + //Retrieve all the Common characteristics that are required for all test cases + TVariantPtrC exInterfaceUid; + TVariantPtrC exAlgorithmUid; + TVariantPtrC exImplementationUid; + TVariantPtrC exCreatorName; + TBool exFIPSApproved; + TBool exHardwareSupported; + TInt exMaxConcurrencySupported; + TVariantPtrC exAlgorithmName; + TInt exLatency; + TInt exThroughput; + + //Retrieve all the Asymmetric characteristics that are required for all test cases + TInt exAsymmetricMaxKeyLength; + TVariantPtrC exAsymmetricPaddingModes; + TInt exAsymmetricPaddingModeNum; + TInt exAsymmetricKeySupportMode; + + if(!GetStringFromConfig(ConfigSection(),KConfigExInterfaceUid,exInterfaceUid) || + !GetStringFromConfig(ConfigSection(),KConfigExAlgorithmUid,exAlgorithmUid) || + !GetStringFromConfig(ConfigSection(),KConfigExImplementationUid,exImplementationUid) || + !GetStringFromConfig(ConfigSection(),KConfigExCreatorName,exCreatorName) || + !GetBoolFromConfig(ConfigSection(),KConfigExFIPSApproved,exFIPSApproved) || + !GetBoolFromConfig(ConfigSection(),KConfigExHardwareSupport,exHardwareSupported) || + !GetIntFromConfig(ConfigSection(),KConfigExMaxConcurrency,exMaxConcurrencySupported) || + !GetStringFromConfig(ConfigSection(),KConfigExAlgorithmName,exAlgorithmName) || + !GetIntFromConfig(ConfigSection(),KConfigExLatency,exLatency) || + !GetIntFromConfig(ConfigSection(),KConfigExThroughput,exThroughput) || + !GetIntFromConfig(ConfigSection(),KConfigExMaxKeyLength,exAsymmetricMaxKeyLength) || + !GetStringFromConfig(ConfigSection(),KConfigExPaddingModes,exAsymmetricPaddingModes) || + !GetIntFromConfig(ConfigSection(),KConfigExPaddingModeNum,exAsymmetricPaddingModeNum) || + !GetIntFromConfig(ConfigSection(),KConfigExKeySupportMode,exAsymmetricKeySupportMode)) + { + ERR_PRINTF1(_L("** .INI Error: Expected Asymmetric Cipher/Common Chracteristic Arguments Not Located **")); + SetTestStepResult(EFail); + } + else + { + INFO_PRINTF1(_L("** Checking Asymmetric Cipher/Common Characteristics.... **")); + + CPluginCharsChecker* pluginCheck = CPluginCharsChecker::NewLC(); + + //Retrieve the Common Characteristics from TAsymmetricCipherCharacteristics + const TCommonCharacteristics* asymCommonChars = &asymmetricChars->cmn; + + TPtrC errorMessage; + + //Perform Asymmetric Cipher/Common Characteristic Checks + if(pluginCheck->checkCommonCharacteristics(asymCommonChars, + exInterfaceUid, + exAlgorithmUid, + exImplementationUid, + exCreatorName, + exFIPSApproved, + exHardwareSupported, + exMaxConcurrencySupported, + exAlgorithmName, + exLatency, + exThroughput, + errorMessage) && + pluginCheck->checkAsymmetricCharacteristics(asymmetricChars, + exAsymmetricMaxKeyLength, + exAsymmetricPaddingModes, + exAsymmetricPaddingModeNum, + exAsymmetricKeySupportMode, + errorMessage)) + { + INFO_PRINTF1(_L("Asymmetric Cipher/Common characteristics successfully match expected values...")); + + if(asymmetricChars->IsPaddingModeSupported(paddingMode) && !asymmetricChars->IsPaddingModeSupported(invalidPaddingMode)) + { + INFO_PRINTF1(_L("Successful Padding Mode Supported Tests....")); + + INFO_PRINTF1(_L("** PASS: Asymmetric Cipher/Common Characteristics Tests Successful **")); + + SetTestStepResult(EPass); + } + else + { + ERR_PRINTF1(_L("** FAIL: Unexpected 'Padding' Mode Supported Results")); + } + } + else + { + ERR_PRINTF2(_L("** FAIL: Characteristic Mismatch - %S **"),&errorMessage); + } + + CleanupStack::PopAndDestroy(pluginCheck); + } + + CleanupStack::PopAndDestroy(asymmetricCipherImpl); + } + else + { + ERR_PRINTF1(_L("** Error: Loading Asymmetric Cipher Object **")); + } + + CleanupStack::PopAndDestroy(3,keyParams); + } + + } + + INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells()); + return TestStepResult(); + } + +TVerdict CPluginCharsAsymmetricCipherStep::doTestStepPostambleL() + { + return TestStepResult(); + }