Line data Source code
1 : /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
2 : /*
3 : * This file is part of the LibreOffice project.
4 : *
5 : * This Source Code Form is subject to the terms of the Mozilla Public
6 : * License, v. 2.0. If a copy of the MPL was not distributed with this
7 : * file, You can obtain one at http://mozilla.org/MPL/2.0/.
8 : *
9 : * This file incorporates work covered by the following license notice:
10 : *
11 : * Licensed to the Apache Software Foundation (ASF) under one or more
12 : * contributor license agreements. See the NOTICE file distributed
13 : * with this work for additional information regarding copyright
14 : * ownership. The ASF licenses this file to you under the Apache
15 : * License, Version 2.0 (the "License"); you may not use this file
16 : * except in compliance with the License. You may obtain a copy of
17 : * the License at http://www.apache.org/licenses/LICENSE-2.0 .
18 : */
19 :
20 : #include <rtl/cipher.h>
21 : #include <rtl/ref.hxx>
22 :
23 : #include "blowfishcontext.hxx"
24 :
25 : using namespace ::com::sun::star;
26 :
27 : // static
28 16 : uno::Reference< xml::crypto::XCipherContext > BlowfishCFB8CipherContext::Create( const uno::Sequence< sal_Int8 >& aDerivedKey, const uno::Sequence< sal_Int8 >& aInitVector, bool bEncrypt )
29 : {
30 16 : ::rtl::Reference< BlowfishCFB8CipherContext > xResult = new BlowfishCFB8CipherContext();
31 16 : xResult->m_pCipher = rtl_cipher_create( rtl_Cipher_AlgorithmBF, rtl_Cipher_ModeStream );
32 16 : if ( !xResult->m_pCipher )
33 0 : throw uno::RuntimeException("Can not create cipher!" );
34 :
35 16 : if ( rtl_Cipher_E_None != rtl_cipher_init(
36 16 : xResult->m_pCipher,
37 : bEncrypt ? rtl_Cipher_DirectionEncode : rtl_Cipher_DirectionDecode,
38 16 : reinterpret_cast< const sal_uInt8* >( aDerivedKey.getConstArray() ),
39 16 : aDerivedKey.getLength(),
40 16 : reinterpret_cast< const sal_uInt8* >( aInitVector.getConstArray() ),
41 64 : aInitVector.getLength() ) )
42 : {
43 0 : throw uno::RuntimeException("Can not initialize cipher!" );
44 : }
45 :
46 16 : xResult->m_bEncrypt = bEncrypt;
47 :
48 16 : return uno::Reference< xml::crypto::XCipherContext >( xResult.get() );
49 : }
50 :
51 48 : BlowfishCFB8CipherContext::~BlowfishCFB8CipherContext()
52 : {
53 16 : if ( m_pCipher )
54 : {
55 0 : rtl_cipher_destroy ( m_pCipher );
56 0 : m_pCipher = NULL;
57 : }
58 32 : }
59 :
60 16 : uno::Sequence< sal_Int8 > SAL_CALL BlowfishCFB8CipherContext::convertWithCipherContext( const uno::Sequence< ::sal_Int8 >& aData )
61 : throw( lang::IllegalArgumentException, lang::DisposedException, uno::RuntimeException, std::exception )
62 : {
63 16 : ::osl::MutexGuard aGuard( m_aMutex );
64 16 : if ( !m_pCipher )
65 0 : throw lang::DisposedException();
66 :
67 16 : uno::Sequence< sal_Int8 > aResult( aData.getLength() );
68 16 : rtlCipherError nError = rtl_Cipher_E_None;
69 :
70 16 : if ( m_bEncrypt )
71 : {
72 : nError = rtl_cipher_encode( m_pCipher,
73 0 : aData.getConstArray(),
74 0 : aData.getLength(),
75 0 : reinterpret_cast< sal_uInt8* >( aResult.getArray() ),
76 0 : aResult.getLength() );
77 : }
78 : else
79 : {
80 : nError = rtl_cipher_decode( m_pCipher,
81 16 : aData.getConstArray(),
82 16 : aData.getLength(),
83 16 : reinterpret_cast< sal_uInt8* >( aResult.getArray() ),
84 48 : aResult.getLength() );
85 : }
86 :
87 16 : if ( rtl_Cipher_E_None != nError )
88 : {
89 0 : throw uno::RuntimeException("Can not decrypt/encrypt with cipher!" );
90 : }
91 :
92 16 : return aResult;
93 : }
94 :
95 16 : uno::Sequence< ::sal_Int8 > SAL_CALL BlowfishCFB8CipherContext::finalizeCipherContextAndDispose()
96 : throw( lang::DisposedException, uno::RuntimeException, std::exception )
97 : {
98 16 : ::osl::MutexGuard aGuard( m_aMutex );
99 16 : if ( !m_pCipher )
100 0 : throw lang::DisposedException();
101 :
102 16 : rtl_cipher_destroy ( m_pCipher );
103 16 : m_pCipher = NULL;
104 :
105 16 : return uno::Sequence< sal_Int8 >();
106 : }
107 :
108 : /* vim:set shiftwidth=4 softtabstop=4 expandtab: */
|