diff -r 675a964f4eb5 -r 35751d3474b7 crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherencrypteddatacheckstep.cpp --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherencrypteddatacheckstep.cpp Thu Sep 10 14:01:51 2009 +0300 @@ -0,0 +1,183 @@ +/* +* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies). +* All rights reserved. +* This component and the accompanying materials are made available +* under the terms of the License "Eclipse Public License v1.0" +* which accompanies this distribution, and is available +* at the URL "http://www.eclipse.org/legal/epl-v10.html". +* +* Initial Contributors: +* Nokia Corporation - initial contribution. +* +* Contributors: +* +* Description: +* Example CTestStep derived implementation +* +*/ + + +/** + @file + @internalTechnology +*/ +#include "asymmetriccipherencrypteddatacheckstep.h" + +#include "cryptoasymmetriccipherapi.h" +#include "cryptokeypairgeneratorapi.h" +#include "keypair.h" +#include "filereader.h" + +using namespace CryptoSpi; + +CASymmetricCipherEncryptedDataCheckStep::~CASymmetricCipherEncryptedDataCheckStep() + { + } + + +CASymmetricCipherEncryptedDataCheckStep::CASymmetricCipherEncryptedDataCheckStep() + { + SetTestStepName(KASymmetricCipherEncryptedDataCheckStep); + } + + +TVerdict CASymmetricCipherEncryptedDataCheckStep::doTestStepPreambleL() + { + SetTestStepResult(EPass); + return TestStepResult(); + } + + +TVerdict CASymmetricCipherEncryptedDataCheckStep::doTestStepL() + { + + INFO_PRINTF1(_L("*** Asymmetric Cipher - Encrypted Data Check ***")); + INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells()); + + if (TestStepResult()==EPass) + { + + //Assume faliure, unless all is successful + SetTestStepResult(EFail); + + TVariantPtrC algorithm; + TVariantPtrC srcPath; + TVariantPtrC encrypted; + TVariantPtrC paddingMode; + + + if(!GetStringFromConfig(ConfigSection(),KConfigAlgorithmUid, algorithm) || + !GetStringFromConfig(ConfigSection(),KConfigPaddingMode, paddingMode) || + !GetStringFromConfig(ConfigSection(),KConfigSourcePath, srcPath) || + !GetStringFromConfig(ConfigSection(),KConfigExEncryptedData, encrypted)) + { + User::Leave(KErrNotFound); + } + else + { + //assume failure, unless all is successful + SetTestStepResult(EFail); + + CCryptoParams* keyParams = CCryptoParams::NewLC(); + + //**************************************************** + //Create Key Pair and Key Pair Generator Objects + CKeyPair* keyPair = NULL; + CKeyPairGenerator * keypairImpl = NULL; + + // create an RSA key pair + INFO_PRINTF1(_L("Generating RSA keys")); + + keyParams->AddL(KKeyExponent, KRsaKeyParameterEUid); + keyParams->AddL(KRsaPrivateKeyStandard, KRsaKeyTypeUid); + + // create a key pair generator implementation interface + TRAPD_LOG(err,CKeyPairGeneratorFactory::CreateKeyPairGeneratorL(keypairImpl, + KRSAKeyPairGeneratorUid, + keyParams)); + + CleanupStack::PushL(keypairImpl); + + // Create a Key Pair + TRAP_LOG(err,keypairImpl->GenerateKeyPairL(1024, *keyParams, keyPair)); + + CleanupStack::PushL(keyPair); + + //***************************************************** + + INFO_PRINTF1(_L("Creating Asymmetric Cipher Object...")); + + // Create a Symmetric Cipher + CryptoSpi::CAsymmetricCipher * impl = NULL; + + TRAP(err,CAsymmetricCipherFactory::CreateAsymmetricCipherL(impl, + algorithm, + keyPair->PublicKey(), + KCryptoModeEncryptUid, + paddingMode, + NULL)); + + if(impl && (err == KErrNone)) + { + CleanupStack::PushL(impl); + + INFO_PRINTF1(_L("*** Asymmetric Cipher Implementation Created... ***")); + + //read from src file + CFileReader* srcData = CFileReader::NewLC(srcPath); + + //Create buffer for encrypted data + TInt maxOutputLength = impl->GetMaximumOutputLengthL(); + HBufC8* encrypted = HBufC8::NewLC(maxOutputLength); + TPtr8 encryptedPtr = encrypted->Des(); + + INFO_PRINTF1(_L("Encrypting Source Data...")); + + //Perform the encryption operation + TRAP_LOG(err,impl->ProcessL(TPtrC8(*srcData), encryptedPtr)); + + if(err == KErrNone) + { + INFO_PRINTF1(_L("*** DATA ENCRYPTED ***")); + + //Check that the source data matches the data thats + //been encrypted then decrypted + if( !encryptedPtr.Compare(TPtrC8(*srcData))) + { + INFO_PRINTF1(_L("PASS : Encrypted Data Matches Expected")); + SetTestStepResult(EPass); + } + else + { + INFO_PRINTF1(_L("FAIL : Encrypted Data and Expected Mismatch")); + SetTestStepResult(EFail); + } + } + + CleanupStack::PopAndDestroy(encrypted); + CleanupStack::PopAndDestroy(srcData); + CleanupStack::PopAndDestroy(impl); + } + else + { + ERR_PRINTF2(_L("*** FAIL: Failed to Create Asymmetric Object - %d ***"), err); + User::Leave(err); + } + + CleanupStack::PopAndDestroy(keyPair); + CleanupStack::PopAndDestroy(keypairImpl); + CleanupStack::PopAndDestroy(keyParams); + } + + } + + INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells()); + + return TestStepResult(); + } + + +TVerdict CASymmetricCipherEncryptedDataCheckStep::doTestStepPostambleL() + { + return TestStepResult(); + }