--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptoplugins/cryptospiplugins/source/softwarecrypto/rsaverifyimpl.cpp Fri Nov 06 13:21:00 2009 +0200
@@ -0,0 +1,143 @@
+/*
+* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description:
+*
+*/
+
+
+#include "rsaverifyimpl.h"
+#include "pluginconfig.h"
+#include "rsafunction.h"
+
+using namespace SoftwareCrypto;
+
+// Implementation of CRSAVerifierImpl
+CRSAVerifierImpl* CRSAVerifierImpl::NewL(const CKey& aKey, TUid aPaddingMode)
+ {
+ CRSAVerifierImpl* self = CRSAVerifierImpl::NewLC(aKey, aPaddingMode);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+CRSAVerifierImpl* CRSAVerifierImpl::NewLC(const CKey& aKey, TUid aPaddingMode)
+ {
+ CRSAVerifierImpl* self = new(ELeave) CRSAVerifierImpl(aPaddingMode);
+ CleanupStack::PushL(self);
+ self->ConstructL(aKey);
+ return self;
+ }
+
+CRSAVerifierImpl::CRSAVerifierImpl(TUid aPaddingMode)
+ : iPaddingMode(aPaddingMode)
+ {
+ }
+
+CRSAVerifierImpl::~CRSAVerifierImpl()
+ {
+ delete iPadding;
+ }
+
+void CRSAVerifierImpl::ConstructL(const CKey& aKey)
+ {
+ CVerifierImpl::ConstructL(aKey);
+ SetPaddingModeL(iPaddingMode);
+ }
+
+CExtendedCharacteristics* CRSAVerifierImpl::CreateExtendedCharacteristicsL()
+ {
+ // All Symbian software plug-ins have unlimited concurrency, cannot be reserved
+ // for exclusive use and are not CERTIFIED to be standards compliant.
+ return CExtendedCharacteristics::NewL(KMaxTInt, EFalse);
+ }
+
+const CExtendedCharacteristics* CRSAVerifierImpl::GetExtendedCharacteristicsL()
+ {
+ return CRSAVerifierImpl::CreateExtendedCharacteristicsL();
+ }
+
+TUid CRSAVerifierImpl::ImplementationUid() const
+ {
+ return KCryptoPluginRsaVerifierUid;
+ }
+
+void CRSAVerifierImpl::SetPaddingModeL(TUid aPaddingMode)
+ {
+ CPadding* padding(0);
+ switch (aPaddingMode.iUid)
+ {
+ case KPaddingModeNone:
+ padding = CPaddingNone::NewL(GetMaximumOutputLengthL());
+ break;
+ case KPaddingModePkcs1_v1_5_Signature:
+ padding = CPaddingPKCS1Signature::NewL(GetMaximumOutputLengthL());
+ break;
+ default:
+ User::Leave(KErrNotSupported);
+ }
+ delete iPadding;
+ iPadding = padding;
+ iPaddingMode = aPaddingMode;
+ Reset();
+ }
+
+void CRSAVerifierImpl::SetKeyL(const CKey& aPublicKey)
+ {
+ DoSetKeyL(aPublicKey);
+ Reset();
+ }
+
+TInt CRSAVerifierImpl::GetMaximumInputLengthL() const
+ {
+ return GetMaximumOutputLengthL() - iPadding->MinPaddingLength();
+ }
+
+TInt CRSAVerifierImpl::GetMaximumOutputLengthL() const
+ {
+ const TInteger& paramN = iKey->GetBigIntL(KRsaKeyParameterNUid);
+ return paramN.ByteCount();
+ }
+
+void CRSAVerifierImpl::VerifyL(const TDesC8& aInput, const CCryptoParams& aSignature, TBool& aVerificationResult)
+ {
+ HBufC8* output = NULL;
+ InverseSignL(output, aSignature);
+ CleanupStack::PushL(output);
+
+ // is the original hash the same as the hash extracted from the signature
+ aVerificationResult = EFalse;
+ if (!output->Compare(aInput))
+ {
+ aVerificationResult = ETrue;
+ }
+ CleanupStack::PopAndDestroy(output);
+ }
+
+void CRSAVerifierImpl::InverseSignL(HBufC8*& aOutput, const CCryptoParams& aSignature)
+ {
+ // extract the original hash from the signature
+ const TInteger& signature = aSignature.GetBigIntL(KRsaSignatureParameterSUid);
+ RInteger output;
+ RSAFunction::VerifyL(*iKey, signature, output);
+ CleanupClosePushL(output);
+
+ // format the extracted hash so it can be compared with the original hash
+ HBufC8* paddedHashPtr = output.BufferLC();
+ aOutput = HBufC8::NewLC(GetMaximumOutputLengthL());
+ TPtr8 unpaddedHash = aOutput->Des();
+
+ iPadding->UnPadL(*paddedHashPtr, unpaddedHash);
+
+ CleanupStack::Pop(aOutput);
+ CleanupStack::PopAndDestroy(2, &output);
+ }