1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
3 * This file is part of the LibreOffice project.
5 * This Source Code Form is subject to the terms of the Mozilla Public
6 * License, v. 2.0. If a copy of the MPL was not distributed with this
7 * file, You can obtain one at http://mozilla.org/MPL/2.0/.
9 * This file incorporates work covered by the following license notice:
11 * Licensed to the Apache Software Foundation (ASF) under one or more
12 * contributor license agreements. See the NOTICE file distributed
13 * with this work for additional information regarding copyright
14 * ownership. The ASF licenses this file to you under the Apache
15 * License, Version 2.0 (the "License"); you may not use this file
16 * except in compliance with the License. You may obtain a copy of
17 * the License at http://www.apache.org/licenses/LICENSE-2.0 .
22 #include <rtl/random.h>
23 #include <rtl/ref.hxx>
25 #include "ciphercontext.hxx"
27 using namespace ::com::sun::star
;
29 uno::Reference
< xml::crypto::XCipherContext
> OCipherContext::Create( CK_MECHANISM_TYPE nNSSCipherID
, const uno::Sequence
< ::sal_Int8
>& aKey
, const uno::Sequence
< ::sal_Int8
>& aInitializationVector
, bool bEncryption
, bool bW3CPadding
)
31 ::rtl::Reference
< OCipherContext
> xResult
= new OCipherContext
;
33 xResult
->m_pSlot
= PK11_GetBestSlot( nNSSCipherID
, NULL
);
34 if ( xResult
->m_pSlot
)
36 SECItem aKeyItem
= { siBuffer
, const_cast< unsigned char* >( reinterpret_cast< const unsigned char* >( aKey
.getConstArray() ) ), sal::static_int_cast
<unsigned>( aKey
.getLength() ) };
37 xResult
->m_pSymKey
= PK11_ImportSymKey( xResult
->m_pSlot
, nNSSCipherID
, PK11_OriginDerive
, bEncryption
? CKA_ENCRYPT
: CKA_DECRYPT
, &aKeyItem
, NULL
);
38 if ( xResult
->m_pSymKey
)
40 SECItem aIVItem
= { siBuffer
, const_cast< unsigned char* >( reinterpret_cast< const unsigned char* >( aInitializationVector
.getConstArray() ) ), sal::static_int_cast
<unsigned>( aInitializationVector
.getLength() ) };
41 xResult
->m_pSecParam
= PK11_ParamFromIV( nNSSCipherID
, &aIVItem
);
42 if ( xResult
->m_pSecParam
)
44 xResult
->m_pContext
= PK11_CreateContextBySymKey( nNSSCipherID
, bEncryption
? CKA_ENCRYPT
: CKA_DECRYPT
, xResult
->m_pSymKey
, xResult
->m_pSecParam
);
45 if ( xResult
->m_pContext
)
47 xResult
->m_bEncryption
= bEncryption
;
48 xResult
->m_bW3CPadding
= bW3CPadding
;
49 xResult
->m_bPadding
= bW3CPadding
|| ( PK11_GetPadMechanism( nNSSCipherID
) == nNSSCipherID
);
50 xResult
->m_nBlockSize
= PK11_GetBlockSize( nNSSCipherID
, xResult
->m_pSecParam
);
51 if ( xResult
->m_nBlockSize
<= SAL_MAX_INT8
)
58 return uno::Reference
< xml::crypto::XCipherContext
>();
61 void OCipherContext::Dispose()
63 ::osl::MutexGuard
aGuard( m_aMutex
);
67 PK11_DestroyContext( m_pContext
, PR_TRUE
);
73 SECITEM_FreeItem( m_pSecParam
, PR_TRUE
);
79 PK11_FreeSymKey( m_pSymKey
);
85 PK11_FreeSlot( m_pSlot
);
92 uno::Sequence
< ::sal_Int8
> SAL_CALL
OCipherContext::convertWithCipherContext( const uno::Sequence
< ::sal_Int8
>& aData
)
93 throw ( lang::IllegalArgumentException
, lang::DisposedException
, uno::RuntimeException
)
95 ::osl::MutexGuard
aGuard( m_aMutex
);
98 throw uno::RuntimeException();
101 throw lang::DisposedException();
103 uno::Sequence
< sal_Int8
> aToConvert
;
104 if ( aData
.getLength() )
106 sal_Int32 nOldLastBlockLen
= m_aLastBlock
.getLength();
107 OSL_ENSURE( nOldLastBlockLen
<= m_nBlockSize
, "Unexpected last block size!" );
109 sal_Int32 nAvailableData
= nOldLastBlockLen
+ aData
.getLength();
110 sal_Int32 nToConvertLen
= nAvailableData
;
111 if ( m_bEncryption
|| !m_bW3CPadding
)
113 if ( nAvailableData
% m_nBlockSize
== 0 )
114 nToConvertLen
= nAvailableData
;
115 else if ( nAvailableData
< m_nBlockSize
)
118 nToConvertLen
= nAvailableData
- nAvailableData
% m_nBlockSize
;
122 // decryption with W3C padding needs at least one block for finalizing
123 if ( nAvailableData
< m_nBlockSize
* 2 )
126 nToConvertLen
= nAvailableData
- nAvailableData
% m_nBlockSize
- m_nBlockSize
;
129 aToConvert
.realloc( nToConvertLen
);
130 if ( nToConvertLen
== 0 )
132 m_aLastBlock
.realloc( nOldLastBlockLen
+ aData
.getLength() );
133 memcpy( m_aLastBlock
.getArray() + nOldLastBlockLen
, aData
.getConstArray(), aData
.getLength() );
134 // aToConvert stays empty
136 else if ( nToConvertLen
< nOldLastBlockLen
)
138 memcpy( aToConvert
.getArray(), m_aLastBlock
.getConstArray(), nToConvertLen
);
139 memcpy( m_aLastBlock
.getArray(), m_aLastBlock
.getConstArray() + nToConvertLen
, nOldLastBlockLen
- nToConvertLen
);
140 m_aLastBlock
.realloc( nOldLastBlockLen
- nToConvertLen
+ aData
.getLength() );
141 memcpy( m_aLastBlock
.getArray() + nOldLastBlockLen
- nToConvertLen
, aData
.getConstArray(), aData
.getLength() );
145 memcpy( aToConvert
.getArray(), m_aLastBlock
.getConstArray(), nOldLastBlockLen
);
146 if ( nToConvertLen
> nOldLastBlockLen
)
147 memcpy( aToConvert
.getArray() + nOldLastBlockLen
, aData
.getConstArray(), nToConvertLen
- nOldLastBlockLen
);
148 m_aLastBlock
.realloc( nAvailableData
- nToConvertLen
);
149 memcpy( m_aLastBlock
.getArray(), aData
.getConstArray() + nToConvertLen
- nOldLastBlockLen
, nAvailableData
- nToConvertLen
);
153 uno::Sequence
< sal_Int8
> aResult
;
154 OSL_ENSURE( aToConvert
.getLength() % m_nBlockSize
== 0, "Unexpected size of the data to encrypt!" );
155 if ( aToConvert
.getLength() )
158 aResult
.realloc( aToConvert
.getLength() + m_nBlockSize
);
159 if ( PK11_CipherOp( m_pContext
, reinterpret_cast< unsigned char* >( aResult
.getArray() ), &nResultLen
, aResult
.getLength(), const_cast< unsigned char* >( reinterpret_cast< const unsigned char* >( aToConvert
.getConstArray() ) ), aToConvert
.getLength() ) != SECSuccess
)
163 throw uno::RuntimeException();
166 m_nConverted
+= aToConvert
.getLength();
167 aResult
.realloc( nResultLen
);
173 uno::Sequence
< ::sal_Int8
> SAL_CALL
OCipherContext::finalizeCipherContextAndDispose()
174 throw (lang::DisposedException
, uno::RuntimeException
)
176 ::osl::MutexGuard
aGuard( m_aMutex
);
179 throw uno::RuntimeException();
182 throw lang::DisposedException();
184 OSL_ENSURE( m_nBlockSize
<= SAL_MAX_INT8
, "Unexpected block size!" );
185 OSL_ENSURE( m_nConverted
% m_nBlockSize
== 0, "Unexpected amount of bytes is already converted!" );
186 sal_Int32 nSizeForPadding
= ( m_nConverted
+ m_aLastBlock
.getLength() ) % m_nBlockSize
;
188 // if it is decryption, the amount of data should be rounded to the block size even in case of padding
189 if ( ( !m_bPadding
|| !m_bEncryption
) && nSizeForPadding
)
190 throw uno::RuntimeException( OUString( "The data should contain complete blocks only." ), uno::Reference
< uno::XInterface
>() );
192 if ( m_bW3CPadding
&& m_bEncryption
)
194 // in this case the last block should be smaller than standtard block
195 // it will be increased with the padding
196 OSL_ENSURE( m_aLastBlock
.getLength() < m_nBlockSize
, "Unexpected size of cashed incomplete last block!" );
198 // W3CPadding handling for encryption
199 sal_Int32 nPaddingSize
= m_nBlockSize
- nSizeForPadding
;
200 sal_Int32 nOldLastBlockLen
= m_aLastBlock
.getLength();
201 m_aLastBlock
.realloc( nOldLastBlockLen
+ nPaddingSize
);
203 if ( nPaddingSize
> 1 )
206 osl_getSystemTime( &aTime
);
207 rtlRandomPool aRandomPool
= rtl_random_createPool();
208 rtl_random_addBytes( aRandomPool
, &aTime
, 8 );
209 rtl_random_getBytes( aRandomPool
, m_aLastBlock
.getArray() + nOldLastBlockLen
, nPaddingSize
- 1 );
210 rtl_random_destroyPool ( aRandomPool
);
212 m_aLastBlock
[m_aLastBlock
.getLength() - 1] = static_cast< sal_Int8
>( nPaddingSize
);
215 // finally should the last block be smaller than two standard blocks
216 OSL_ENSURE( m_aLastBlock
.getLength() < m_nBlockSize
* 2 , "Unexpected size of cashed incomplete last block!" );
218 uno::Sequence
< sal_Int8
> aResult
;
219 if ( m_aLastBlock
.getLength() )
222 aResult
.realloc( m_aLastBlock
.getLength() + m_nBlockSize
);
223 if ( PK11_CipherOp( m_pContext
, reinterpret_cast< unsigned char* >( aResult
.getArray() ), &nPrefResLen
, aResult
.getLength(), const_cast< unsigned char* >( reinterpret_cast< const unsigned char* >( m_aLastBlock
.getConstArray() ) ), m_aLastBlock
.getLength() ) != SECSuccess
)
227 throw uno::RuntimeException();
230 aResult
.realloc( nPrefResLen
);
231 m_aLastBlock
.realloc( 0 );
234 sal_Int32 nPrefixLen
= aResult
.getLength();
235 aResult
.realloc( nPrefixLen
+ m_nBlockSize
* 2 );
236 unsigned nFinalLen
= 0;
237 if ( PK11_DigestFinal( m_pContext
, reinterpret_cast< unsigned char* >( aResult
.getArray() + nPrefixLen
), &nFinalLen
, aResult
.getLength() - nPrefixLen
) != SECSuccess
)
241 throw uno::RuntimeException();
244 aResult
.realloc( nPrefixLen
+ nFinalLen
);
246 if ( m_bW3CPadding
&& !m_bEncryption
)
248 // W3CPadding handling for decryption
249 // aResult should have anough data, since we let m_aLastBlock be big enough in case of decryption
250 OSL_ENSURE( aResult
.getLength() >= m_nBlockSize
, "Not enough data to handle the padding!" );
252 sal_Int8 nBytesToRemove
= aResult
[aResult
.getLength() - 1];
253 if ( nBytesToRemove
<= 0 || nBytesToRemove
> aResult
.getLength() )
257 throw uno::RuntimeException();
260 aResult
.realloc( aResult
.getLength() - nBytesToRemove
);
268 /* vim:set shiftwidth=4 softtabstop=4 expandtab: */