crypto/weakcrypto/test/tsymmetric/tactionmontecarlo.cpp
changeset 71 dd83586b62d6
equal deleted inserted replaced
66:8873e6835f7b 71:dd83586b62d6
       
     1 /*
       
     2 * Copyright (c) 1998-2009 Nokia Corporation and/or its subsidiary(-ies).
       
     3 * All rights reserved.
       
     4 * This component and the accompanying materials are made available
       
     5 * under the terms of the License "Eclipse Public License v1.0"
       
     6 * which accompanies this distribution, and is available
       
     7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 *
       
     9 * Initial Contributors:
       
    10 * Nokia Corporation - initial contribution.
       
    11 *
       
    12 * Contributors:
       
    13 *
       
    14 * Description: 
       
    15 *
       
    16 */
       
    17 
       
    18 
       
    19 #include "tactionmontecarlo.h"
       
    20 #include "bufferedtransformation.h"
       
    21 #include "rijndael.h"
       
    22 #include "cbcmode.h"
       
    23 #include "padding.h"
       
    24 
       
    25 const TInt KAESBlockSizeBytes = 16;	//	128 bits
       
    26 
       
    27 CTestAction* CActionMonteCarlo::NewL(RFs& aFs,
       
    28 									   CConsoleBase& aConsole,
       
    29 									   Output& aOut, 
       
    30 									   const TTestActionSpec& aTestActionSpec)
       
    31 	{
       
    32 	CTestAction* self = CActionMonteCarlo::NewLC(aFs, aConsole,
       
    33 		aOut, aTestActionSpec);
       
    34 	CleanupStack::Pop();
       
    35 	return self;
       
    36 	}
       
    37 
       
    38 CTestAction* CActionMonteCarlo::NewLC(RFs& aFs,
       
    39 										CConsoleBase& aConsole,
       
    40 										Output& aOut, 
       
    41 										const TTestActionSpec& aTestActionSpec)
       
    42 	{
       
    43 	CActionMonteCarlo* self = new(ELeave) CActionMonteCarlo(aFs, aConsole, aOut);
       
    44 	CleanupStack::PushL(self);
       
    45 	self->ConstructL(aTestActionSpec);
       
    46 	return self;
       
    47 	}
       
    48 
       
    49 CActionMonteCarlo::~CActionMonteCarlo()
       
    50 {
       
    51 	delete iEncrypt;
       
    52 	delete iDecrypt;
       
    53 }
       
    54 
       
    55 CActionMonteCarlo::CActionMonteCarlo(RFs& aFs, 
       
    56 								 CConsoleBase& aConsole,
       
    57 								 Output& aOut)
       
    58 								 
       
    59 : CCryptoTestAction(aFs, aConsole, aOut)
       
    60 {}
       
    61 
       
    62 
       
    63 void CActionMonteCarlo::DoPerformPrerequisiteL()
       
    64 {
       
    65 	TInt err = KErrNone;
       
    66 	TInt pos = 0;
       
    67 	TPtrC8 monteCarlo = Input::ParseElement(*iBody, KMonteCarloStart, KMonteCarloEnd, pos, err);
       
    68 
       
    69 	DoInputParseL(monteCarlo);
       
    70 
       
    71 	CBlockTransformation* encryptor = NULL;
       
    72 	CBlockTransformation* decryptor = NULL;
       
    73 
       
    74 	switch (iCipherType)
       
    75 	{
       
    76 		case (EAESMonteCarloEncryptECB):
       
    77 		{
       
    78 			encryptor = CAESEncryptor::NewLC(iKey->Des());
       
    79 		}
       
    80 		break;
       
    81 		case (EAESMonteCarloDecryptECB):
       
    82 		{
       
    83 			decryptor = CAESDecryptor::NewLC(iKey->Des());
       
    84 		}
       
    85 		break;
       
    86 		case (EAESMonteCarloEncryptCBC):
       
    87 		{
       
    88 			CBlockTransformation* aesEncryptor = NULL;		
       
    89 			aesEncryptor = CAESEncryptor::NewLC(iKey->Des());
       
    90 			
       
    91 			encryptor = CModeCBCEncryptor::NewL(aesEncryptor, iIV->Des());
       
    92 			CleanupStack::Pop(aesEncryptor);
       
    93 			CleanupStack::PushL(encryptor);		
       
    94 		}
       
    95 		break;
       
    96 		case (EAESMonteCarloDecryptCBC):
       
    97 		{
       
    98 			CBlockTransformation* aesDecryptor = NULL;		
       
    99 			aesDecryptor = CAESDecryptor::NewLC(iKey->Des());
       
   100 			
       
   101 			decryptor = CModeCBCDecryptor::NewL(aesDecryptor, iIV->Des());
       
   102 			CleanupStack::Pop(aesDecryptor);
       
   103 			CleanupStack::PushL(decryptor);		
       
   104 		}
       
   105 		break;
       
   106 		default:
       
   107 		{
       
   108 			ASSERT(0);
       
   109 			User::Leave(KErrNotSupported);
       
   110 		}
       
   111 	}
       
   112 	
       
   113 
       
   114 	CPaddingSSLv3* padding = 0;
       
   115 	if (encryptor)
       
   116 		{
       
   117 		padding = CPaddingSSLv3::NewLC(encryptor->BlockSize());
       
   118 		iEncrypt = CBufferedEncryptor::NewL(encryptor, padding);	
       
   119 		iEResult = HBufC8::NewMaxL(iEncrypt->MaxOutputLength(iInput->Length()));
       
   120 		}
       
   121 	else if (decryptor)
       
   122 		{
       
   123 		padding = CPaddingSSLv3::NewLC(decryptor->BlockSize());
       
   124 		iDecrypt = CBufferedDecryptor::NewL(decryptor, padding);
       
   125 		iDResult = HBufC8::NewMaxL(iDecrypt->MaxOutputLength(iInput->Size()));
       
   126 		}
       
   127 
       
   128 	CleanupStack::Pop(2);	//	padding, encryptor/decryptor
       
   129 
       
   130 }
       
   131 
       
   132 
       
   133 void CActionMonteCarlo::DoPerformActionL()
       
   134 {
       
   135 	iResult = EFalse;
       
   136 
       
   137 	__ASSERT_DEBUG(iInput->Size()==KAESBlockSizeBytes, User::Panic(_L("tsymmetric"), KErrNotSupported));
       
   138 	
       
   139 	if (iCipherType==EAESMonteCarloEncryptECB)
       
   140 		DoAESEncryptECB();
       
   141 	else if (iCipherType==EAESMonteCarloDecryptECB)
       
   142 		DoAESDecryptECB();	
       
   143 	else if (iCipherType==EAESMonteCarloEncryptCBC)
       
   144 		DoAESEncryptCBC();
       
   145 	else if (iCipherType==EAESMonteCarloDecryptCBC)
       
   146 		DoAESDecryptCBC();
       
   147 	else
       
   148 		User::Leave(KErrNotSupported);
       
   149 }
       
   150 
       
   151 void CActionMonteCarlo::DoAESEncryptECB()
       
   152 {
       
   153 	TPtr8 theEncryptResult(iEResult->Des());
       
   154 	theEncryptResult.FillZ(theEncryptResult.MaxLength());
       
   155 	theEncryptResult.SetLength(0);
       
   156 
       
   157 	TInt index = 0;
       
   158 	TPtr8 theInput(iInput->Des());
       
   159 	for (; index < KMonteCarloIterations; index++)
       
   160 	{
       
   161 		iEncrypt->Process(theInput, theEncryptResult);	
       
   162 		theInput.Copy(theEncryptResult);
       
   163 		theEncryptResult.FillZ(theEncryptResult.MaxLength());
       
   164 		theEncryptResult.SetLength(0);
       
   165 	}
       
   166 	
       
   167 	if (*iOutput==*iEResult)
       
   168 	{	
       
   169 		iResult = ETrue;
       
   170 	}
       
   171 }
       
   172 
       
   173 void CActionMonteCarlo::DoAESDecryptECB()
       
   174 {
       
   175 	TPtr8 theDecryptResult(iDResult->Des());
       
   176 	theDecryptResult.FillZ(theDecryptResult.MaxLength());
       
   177 	theDecryptResult.SetLength(0);
       
   178 
       
   179 	TInt index = 0;
       
   180 	TPtr8 theInput(iInput->Des());
       
   181 	for (; index < KMonteCarloIterations; index++)
       
   182 	{
       
   183 		iDecrypt->Process(theInput, theDecryptResult);	
       
   184 		theInput.Copy(theDecryptResult);
       
   185 		theDecryptResult.FillZ(theDecryptResult.MaxLength());
       
   186 		theDecryptResult.SetLength(0);
       
   187 	}
       
   188 	
       
   189 	if (*iOutput==*iInput)
       
   190 	{	
       
   191 		iResult = ETrue;
       
   192 	}
       
   193 }
       
   194 
       
   195 void CActionMonteCarlo::DoAESEncryptCBC()
       
   196     {	
       
   197 	TPtr8 theEncryptResult(iEResult->Des());
       
   198 	theEncryptResult.FillZ(theEncryptResult.MaxLength());
       
   199 	theEncryptResult.SetLength(0);
       
   200 
       
   201 	TInt index = 0;
       
   202 	TPtr8 theInput(iInput->Des());
       
   203 
       
   204 	TBuf8<KAESBlockSizeBytes> nextBuf;
       
   205 	nextBuf.FillZ(KAESBlockSizeBytes);
       
   206 
       
   207     for (; index < KMonteCarloIterations-1; index++)
       
   208 	    {
       
   209 	    iEncrypt->Process(theInput, theEncryptResult);	
       
   210 
       
   211 	    if (index==0)
       
   212 		theInput.Copy(*iIV);	//	First loop, use the original IV as next PT block
       
   213 		else	
       
   214 		theInput.Copy(nextBuf);	//	Use previous CT block as next PT block
       
   215 		
       
   216 	    //	 Save CT block for next loop when it'll become the PT block	
       
   217 		nextBuf.Copy(theEncryptResult);
       
   218 	    //	 Reset for next encryption	
       
   219 		theEncryptResult.FillZ(theEncryptResult.MaxLength());
       
   220 		theEncryptResult.SetLength(0);
       
   221 	    }
       
   222 	
       
   223     iEncrypt->Process(theInput, theEncryptResult);	
       
   224 	
       
   225 	if  (theEncryptResult.Compare(*iOutput)==KErrNone)
       
   226 	    {	
       
   227 	    iResult = ETrue;
       
   228 	    }
       
   229 
       
   230     }
       
   231 
       
   232 void CActionMonteCarlo::DoAESDecryptCBC()
       
   233     {
       
   234 	TPtr8 theDecryptResult(iDResult->Des());
       
   235 	theDecryptResult.FillZ(theDecryptResult.MaxLength());
       
   236 	theDecryptResult.SetLength(0);
       
   237 
       
   238 	TInt index = 0;
       
   239     TPtr8 theInput(iInput->Des());
       
   240 
       
   241     for (; index < KMonteCarloIterations-1; index++)
       
   242 	    {
       
   243 	    iDecrypt->Process(theInput, theDecryptResult);	
       
   244 		
       
   245 		//	Use previous PT block as next CT block
       
   246 	 	theInput.Copy(theDecryptResult);
       
   247 
       
   248 	    //  Reset for next decryption	
       
   249 		theDecryptResult.FillZ(theDecryptResult.MaxLength());
       
   250 		theDecryptResult.SetLength(0);
       
   251 	    }
       
   252 	
       
   253     // Last loop	
       
   254     iDecrypt->Process(theInput, theDecryptResult);	
       
   255 
       
   256 	if (theDecryptResult.Compare(*iOutput)==KErrNone)
       
   257  	   {	
       
   258 	   iResult = ETrue;
       
   259 	   }
       
   260 
       
   261     }