gladmanContext.cpp [plain text]
#include "gladmanContext.h"
#include "cspdebugging.h"
#include <CommonCrypto/CommonCryptor.h>
GAESContext::GAESContext(AppleCSPSession &session) :
BlockCryptor(session),
mInitFlag(false),
mRawKeySize(0),
mWasEncrypting(false)
{
cbcCapable(true);
multiBlockCapable(true);
}
GAESContext::~GAESContext()
{
deleteKey();
memset(mRawKey, 0, MAX_AES_KEY_BITS / 8);
mInitFlag = false;
}
void GAESContext::deleteKey()
{
memset(&mAesKey, 0, sizeof(mAesKey));
mRawKeySize = 0;
}
void GAESContext::init(
const Context &context,
bool encrypting)
{
if(mInitFlag && !opStarted()) {
return;
}
CSSM_SIZE keyLen;
uint8 *keyData = NULL;
bool sameKeySize = false;
symmetricKeyBits(context, session(), CSSM_ALGID_AES,
encrypting ? CSSM_KEYUSE_ENCRYPT : CSSM_KEYUSE_DECRYPT,
keyData, keyLen);
switch(keyLen) {
case MIN_AES_KEY_BITS / 8:
case MID_AES_KEY_BITS / 8:
case MAX_AES_KEY_BITS / 8:
break;
default:
CssmError::throwMe(CSSMERR_CSP_INVALID_ATTR_KEY);
}
if(mRawKeySize == keyLen) {
sameKeySize = true;
}
else {
deleteKey();
}
if(!sameKeySize || (mWasEncrypting != encrypting) ||
memcmp(mRawKey, keyData, mRawKeySize)) {
aes_cc_set_key(&mAesKey, keyData, keyLen, encrypting);
memmove(mRawKey, keyData, keyLen);
mRawKeySize = keyLen;
mWasEncrypting = encrypting;
}
CSSM_ENCRYPT_MODE cssmMode = context.getInt(CSSM_ATTRIBUTE_MODE);
switch (cssmMode) {
case CSSM_ALGMODE_CBCPadIV8:
case CSSM_ALGMODE_CBC_IV8:
CssmData *iv = context.get<CssmData>(CSSM_ATTRIBUTE_INIT_VECTOR);
if(iv == NULL) {
CssmError::throwMe(CSSMERR_CSP_MISSING_ATTR_INIT_VECTOR);
}
if(iv->Length != kCCBlockSizeAES128) {
CssmError::throwMe(CSSMERR_CSP_INVALID_ATTR_INIT_VECTOR);
}
aes_cc_set_iv(&mAesKey, encrypting, iv->Data);
break;
default:
break;
}
setup(GLADMAN_BLOCK_SIZE_BYTES, context);
mInitFlag = true;
}
void GAESContext::encryptBlock(
const void *plainText, size_t plainTextLen,
void *cipherText,
size_t &cipherTextLen, bool final) {
if(cipherTextLen < plainTextLen) {
CssmError::throwMe(CSSMERR_CSP_OUTPUT_LENGTH_ERROR);
}
aes_encrypt_cbc((const unsigned char *)plainText, NULL,
plainTextLen / GLADMAN_BLOCK_SIZE_BYTES,
(unsigned char *)cipherText, &mAesKey.encrypt);
cipherTextLen = plainTextLen;
}
void GAESContext::decryptBlock(
const void *cipherText, size_t cipherTextLen,
void *plainText,
size_t &plainTextLen, bool final) {
if(plainTextLen < cipherTextLen) {
CssmError::throwMe(CSSMERR_CSP_OUTPUT_LENGTH_ERROR);
}
aes_decrypt_cbc((const unsigned char *)cipherText, NULL,
cipherTextLen / GLADMAN_BLOCK_SIZE_BYTES,
(unsigned char *)plainText, &mAesKey.decrypt);
plainTextLen = cipherTextLen;
}