crypto/weakcryptospi/test/tcryptospi/src/symmetriccipherincrementalencryptdecryptstep.cpp
author Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Wed, 14 Apr 2010 17:48:59 +0300
branchRCL_3
changeset 53 030c4fbc13d7
parent 8 35751d3474b7
permissions -rw-r--r--
Revision: 201015 Kit: 201015

/*
* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
* which accompanies this distribution, and is available
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
*
* Initial Contributors:
* Nokia Corporation - initial contribution.
*
* Contributors:
*
* Description: 
* Example CTestStep derived implementation
*
*/


/**
 @file
 @internalTechnology
*/
#include "symmetriccipherincrementalencryptdecryptstep.h"

#include "filewriter.h"
#include "filecompare.h"

using namespace CryptoSpi;

CSymmetricCipherIncrementalEncryptDecryptStep::~CSymmetricCipherIncrementalEncryptDecryptStep()
	{
	}


CSymmetricCipherIncrementalEncryptDecryptStep::CSymmetricCipherIncrementalEncryptDecryptStep(TInt aOffset) : iOffset(aOffset)
	{
	SetTestStepName(KSymmetricCipherIncrementalEncryptDecryptStep);
	}


TVerdict CSymmetricCipherIncrementalEncryptDecryptStep::doTestStepPreambleL()
	{
	SetTestStepResult(EPass);
	return TestStepResult();
	}


TVerdict CSymmetricCipherIncrementalEncryptDecryptStep::doTestStepL()
	{
	INFO_PRINTF1(_L("*** Symmetric Cipher - Incremental Encrypt/Decrypt ***"));
	INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells());
	
  	if (TestStepResult()==EPass)
		{
		
		//Assume faliure, unless all is successful
		SetTestStepResult(EFail);
		
		TPtrC srcPath;
		if (!GetStringFromConfig(ConfigSection(),KConfigSourcePath, srcPath))
			{
			User::Leave(KErrNotFound);
			}
		
		TVariantPtrC operationMode;

		// Create a Symmetric Cipher with the values from the ini file	
		CryptoSpi::CSymmetricCipher * impl = NULL;	
			
		CKey* key = NULL;
		SetupCipherL(ETrue, EFalse, operationMode, impl, key);

		INFO_PRINTF1(_L("Plugin loaded."));
	
		CleanupStack::PushL(key);
		CleanupStack::PushL(impl);
		
		HBufC8* iv = NULL;
		TInt err(0);
		
		TInt blockSize(0);
		if (TUid(operationMode) == KOperationModeCTRUid)
			{
			blockSize = CtrModeCalcBlockSizeL(*impl);
			}
		else
			{
			blockSize = impl->BlockSize();
			}

		if((TUid(operationMode) == KOperationModeCBCUid) || (TUid(operationMode) == KOperationModeCTRUid))
			{
			// blocksize is in bits so to allocate the correct number of bytes divide by 8
			// iv is left on the cleanup stack for the duration of the test and deleted in a conditional at the end of the outer block.
			// If this conditional block changes, take care to update the condition for deleting this allocated IV, near the end of this function.
			iv = HBufC8::NewLC(blockSize/8);	
				
			// blocksize is in bits so to allocate the correct number of 8 byte chunks divide by 64
			for(TInt i = 0 ; i <blockSize/64 ; i++)
				{
				iv->Des().Append(_L8("12345678"));
				}
					
			TRAP_LOG(err,impl->SetIvL(iv->Des()));
			}	

		// convert to bytesize
		blockSize/=8;
		blockSize += iOffset;
		
		//read from src file
		CFileReader* srcData = CFileReader::NewLC(srcPath,blockSize);


		// first step is to read from the src file one block
		// at a time, encrypt that block and then write
		// the encrypted block out to a temporary file.
		CFileWriter* encryptedDataWriter = CFileWriter::NewLC(TPtrC(KEncryptedFilePath));
			
		TInt numBlocks = srcData->NumBlocks();
				
		INFO_PRINTF1(_L("Encrypting Source Data..."));
	
		for(TInt i = 1 ; i <= numBlocks ; i++)
			{
			TRAP_LOG(err,srcData->ReadBlockL());
			
			//Create buffer for encrypted data
			TInt maxOutputLength = impl->MaxFinalOutputLength(TPtrC8(*srcData).Length());
			HBufC8* encrypted =	HBufC8::NewLC(maxOutputLength);
			TPtr8 encryptedPtr = encrypted->Des();

			if(i == numBlocks)
				{
				TRAP_LOG(err,impl->ProcessFinalL(*srcData, encryptedPtr));
				}
			else
				{
				TRAP_LOG(err,impl->ProcessL(*srcData, encryptedPtr));
				}
					
			TRAP_LOG(err,encryptedDataWriter->WriteBlockL(encryptedPtr));
				
			CleanupStack::PopAndDestroy(encrypted); 
			}
		CleanupStack::PopAndDestroy(encryptedDataWriter); 
				
		if(err == KErrNone)
			{
			//Switch to decrypt
			TRAP_LOG(err,impl->SetCryptoModeL(KCryptoModeDecryptUid));
					
			//If in CTR mode need to reset the keystream to the start of the sequence used for encryption.
			if(TUid(operationMode) == KOperationModeCTRUid)
				{
				impl->SetIvL(iv->Des());
				}
				
			// the next step is to read the previously encrypted data
			// from the temporary file decrypting this one block
			// at a time and outputing this to a temporary file.
			CFileReader* encryptedDataReader = CFileReader::NewLC(TPtrC(KEncryptedFilePath),blockSize);
			CFileWriter* decryptedDataWriter = CFileWriter::NewLC(TPtrC(KDecryptedFilePath));
				
			numBlocks = encryptedDataReader->NumBlocks();
					
			INFO_PRINTF1(_L("Decrypting Data..."));
					
			for(TInt i = 1 ; i <= numBlocks ; i++)
				{
				TRAP_LOG(err,encryptedDataReader->ReadBlockL());
						
				//Create buffer for encrypted data
				TInt maxOutputLength = impl->MaxFinalOutputLength(TPtrC8(*encryptedDataReader).Length());
				HBufC8* decrypted =	HBufC8::NewLC(maxOutputLength);
				TPtr8 decryptedPtr = decrypted->Des();

				//Perform the decryption operation
				if(i == numBlocks)
					{
					TRAP_LOG(err,impl->ProcessFinalL(*encryptedDataReader, decryptedPtr));
					}
				else
					{
					TRAP_LOG(err,impl->ProcessL(*encryptedDataReader, decryptedPtr));
					}
							
				TRAP_LOG(err,decryptedDataWriter->WriteBlockL(decryptedPtr));
					
				CleanupStack::PopAndDestroy(decrypted); 
				}
						
			CleanupStack::PopAndDestroy(decryptedDataWriter); 
			CleanupStack::PopAndDestroy(encryptedDataReader); 	
			}
				
		CleanupStack::PopAndDestroy(srcData);
		if((TUid(operationMode) == KOperationModeCBCUid) || (TUid(operationMode) == KOperationModeCTRUid))
			{
			// Iv is left on the cleanupstack at creation.  
			// If it becomes possible for operationMode to be modified during
			// the test this needs to be re-engineered.
			CleanupStack::PopAndDestroy(iv);
			}
		CleanupStack::PopAndDestroy(impl);							
		CleanupStack::PopAndDestroy(key);
	
		// compare the src with the file thats been
		// encrypted then decrypted
		if(!TFileCompare::CompareL(srcPath,TPtrC(KDecryptedFilePath)))
			{
			INFO_PRINTF1(_L("PASS : Source File and Decrypted Data Match"));
			SetTestStepResult(EPass);
			}
		else
			{
			INFO_PRINTF1(_L("FAIL : Source File and Decrypted Data Mismatch"));	
			SetTestStepResult(EFail);
			}
				
		RFs rFs;
		rFs.Connect();
		rFs.Delete(	KDecryptedFilePath );
		rFs.Delete(	KEncryptedFilePath );
		rFs.Close();
		}
	INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells());

	return TestStepResult();
	}


TVerdict CSymmetricCipherIncrementalEncryptDecryptStep::doTestStepPostambleL()
	{
	return TestStepResult();
	}