os/security/cryptomgmtlibs/cryptotokenfw/tsecdlg/Tsecdlg.cpp
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
* secdlgImpl.cpp
sl@0
    16
*
sl@0
    17
*/
sl@0
    18
sl@0
    19
sl@0
    20
#include "Tsecdlg.h"
sl@0
    21
#include <secdlgimpldefs.h>
sl@0
    22
#include <certificateapps.h>
sl@0
    23
#include <x509cert.h>
sl@0
    24
sl@0
    25
sl@0
    26
// These are not really allocated to us, but this is only for finding errors
sl@0
    27
// while debugging, so it doesn't really matter
sl@0
    28
const TInt KErrTooManyDialogs			= -12000;
sl@0
    29
const TInt KErrLabelMismatch 			= -12001;
sl@0
    30
const TInt KErrOperationMismatch		= -12002;
sl@0
    31
const TInt KErrOperationNotSupported	= -12003;
sl@0
    32
sl@0
    33
_LIT(KpinValue,"pinkcloud");
sl@0
    34
_LIT(KYes,"Yes");
sl@0
    35
	
sl@0
    36
// ----------------------------------------------------------------------------
sl@0
    37
// Lib main entry point.
sl@0
    38
// This can leave and should leave (if failure occurs) despite the lack of trailing L.
sl@0
    39
//
sl@0
    40
sl@0
    41
#ifdef _T_SECDLG_TEXTSHELL
sl@0
    42
EXPORT_C CArrayPtr<MNotifierBase2>* NotifierArray()
sl@0
    43
#else
sl@0
    44
CArrayPtr<MNotifierBase2>* NotifierArray()
sl@0
    45
#endif
sl@0
    46
	{
sl@0
    47
	//The notifierArray function CAN leave, despite no trailing L
sl@0
    48
	CArrayPtrFlat<MNotifierBase2>* subjects = new (ELeave) CArrayPtrFlat<MNotifierBase2>( 1 );
sl@0
    49
	CleanupStack::PushL(subjects);
sl@0
    50
	CTestSecDlgNotifier* notifier = CTestSecDlgNotifier::NewL();
sl@0
    51
	CleanupStack::PushL( notifier );
sl@0
    52
	subjects->AppendL( notifier );
sl@0
    53
	CleanupStack::Pop( 2,subjects);	//notifier, subjects
sl@0
    54
	return subjects;
sl@0
    55
	}
sl@0
    56
sl@0
    57
// ----------------------------------------------------------------------------
sl@0
    58
// Ecom plugin implementation for UI notifier
sl@0
    59
//
sl@0
    60
sl@0
    61
#ifndef _T_SECDLG_TEXTSHELL
sl@0
    62
sl@0
    63
const TImplementationProxy ImplementationTable[] =
sl@0
    64
	{
sl@0
    65
		IMPLEMENTATION_PROXY_ENTRY(KTSecDlgNotiferUid, NotifierArray)
sl@0
    66
	};
sl@0
    67
sl@0
    68
EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
sl@0
    69
	{
sl@0
    70
	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
sl@0
    71
	return (ImplementationTable);
sl@0
    72
	}
sl@0
    73
sl@0
    74
#endif
sl@0
    75
sl@0
    76
// ----------------------------------------------------------------------------
sl@0
    77
// CInputSpec
sl@0
    78
//
sl@0
    79
sl@0
    80
CInputSpec::CInputSpec(TSecurityDialogOperation aOp, HBufC* aLabelSpec, HBufC* aResponse1, HBufC* aResponse2) :
sl@0
    81
	iOp(aOp), iLabelSpec(aLabelSpec), iResponse1(aResponse1), iResponse2(aResponse2)
sl@0
    82
	{
sl@0
    83
	}
sl@0
    84
sl@0
    85
CInputSpec::~CInputSpec()
sl@0
    86
	{
sl@0
    87
	delete iLabelSpec;
sl@0
    88
	delete iResponse1;
sl@0
    89
	delete iResponse2;
sl@0
    90
	}
sl@0
    91
sl@0
    92
sl@0
    93
// ----------------------------------------------------------------------------
sl@0
    94
// CTestSecDlgNotifier
sl@0
    95
//
sl@0
    96
sl@0
    97
_LIT(KInputFile, "\\t_secdlg_in.dat");
sl@0
    98
_LIT(KOutputFile, "\\t_secdlg_out.dat");
sl@0
    99
sl@0
   100
CTestSecDlgNotifier* CTestSecDlgNotifier::NewL()
sl@0
   101
	{
sl@0
   102
	CTestSecDlgNotifier* self=new (ELeave) CTestSecDlgNotifier();
sl@0
   103
	CleanupStack::PushL(self);
sl@0
   104
	self->ConstructL();
sl@0
   105
	CleanupStack::Pop(self);
sl@0
   106
	return self;
sl@0
   107
	}
sl@0
   108
sl@0
   109
CTestSecDlgNotifier::CTestSecDlgNotifier()
sl@0
   110
	{
sl@0
   111
	iInfo.iUid = KUidSecurityDialogNotifier;
sl@0
   112
	iInfo.iChannel = TUid::Uid(0x00001234); // dummy
sl@0
   113
	iInfo.iPriority = ENotifierPriorityHigh;
sl@0
   114
	}
sl@0
   115
sl@0
   116
void CTestSecDlgNotifier::ConstructL()
sl@0
   117
	{
sl@0
   118
	User::LeaveIfError(iFs.Connect());
sl@0
   119
	}
sl@0
   120
sl@0
   121
sl@0
   122
TInt CTestSecDlgNotifier::GetInputIndexL()
sl@0
   123
	{
sl@0
   124
	RFileReadStream stream;
sl@0
   125
	TDriveUnit sysDrive (RFs::GetSystemDrive());
sl@0
   126
	TDriveName driveName(sysDrive.Name());
sl@0
   127
	TBuf<128> outputFile (driveName);
sl@0
   128
	outputFile.Append(KOutputFile);
sl@0
   129
	
sl@0
   130
	TInt err = stream.Open(iFs, outputFile, EFileRead | EFileShareExclusive);
sl@0
   131
	// If the file doesn't exist yet just return zero
sl@0
   132
	if (err == KErrNotFound)
sl@0
   133
		{
sl@0
   134
		return 0;
sl@0
   135
		}
sl@0
   136
	User::LeaveIfError(err);
sl@0
   137
	stream.PushL();
sl@0
   138
	TInt index = stream.ReadInt32L();
sl@0
   139
	CleanupStack::PopAndDestroy(); // stream
sl@0
   140
	return index;
sl@0
   141
	}
sl@0
   142
sl@0
   143
void CTestSecDlgNotifier::WriteDialogCountL(TInt aCount)
sl@0
   144
	{
sl@0
   145
	RFileWriteStream stream;
sl@0
   146
	TDriveUnit sysDrive (RFs::GetSystemDrive());
sl@0
   147
	TDriveName driveName(sysDrive.Name());
sl@0
   148
	TBuf<128> outputFile (driveName);
sl@0
   149
	outputFile.Append(KOutputFile);
sl@0
   150
	
sl@0
   151
	TInt err = stream.Replace(iFs, outputFile, EFileWrite | EFileShareExclusive);
sl@0
   152
	if (err == KErrNotFound)
sl@0
   153
		{
sl@0
   154
		err = stream.Create(iFs, outputFile, EFileWrite | EFileShareExclusive);
sl@0
   155
		}
sl@0
   156
	User::LeaveIfError(err);
sl@0
   157
	stream.PushL();
sl@0
   158
	stream.WriteInt32L(aCount);
sl@0
   159
	stream.CommitL();
sl@0
   160
	CleanupStack::PopAndDestroy(); // stream	
sl@0
   161
	}
sl@0
   162
sl@0
   163
CInputSpec* CTestSecDlgNotifier::ReadInputSpecL(TInt aIndex)
sl@0
   164
	{
sl@0
   165
	RFileReadStream stream;
sl@0
   166
	TDriveUnit sysDrive (RFs::GetSystemDrive());
sl@0
   167
	TDriveName driveName(sysDrive.Name());
sl@0
   168
	TBuf<128> inputFile (driveName);
sl@0
   169
	inputFile.Append(KInputFile);
sl@0
   170
	User::LeaveIfError(stream.Open(iFs, inputFile, EFileRead | EFileShareExclusive));
sl@0
   171
	stream.PushL();
sl@0
   172
sl@0
   173
	// Update dialog count here so test code can see how many dialogs were
sl@0
   174
	// requested if there were more than expected
sl@0
   175
	WriteDialogCountL(aIndex + 1);
sl@0
   176
	
sl@0
   177
	MStreamBuf* streamBuf = stream.Source();
sl@0
   178
	TInt labelSize, response1Size, response2Size;
sl@0
   179
sl@0
   180
	// Skip records until we reach the one we want
sl@0
   181
	for (TInt i = 0 ; i < aIndex ; ++i)
sl@0
   182
		{
sl@0
   183
		stream.ReadInt32L();
sl@0
   184
		labelSize = stream.ReadInt32L();
sl@0
   185
		streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, labelSize * 2);
sl@0
   186
		response1Size = stream.ReadInt32L();
sl@0
   187
		streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response1Size * 2);
sl@0
   188
		response2Size = stream.ReadInt32L();
sl@0
   189
		streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response2Size * 2);
sl@0
   190
		}
sl@0
   191
sl@0
   192
	TSecurityDialogOperation op = static_cast<TSecurityDialogOperation>(stream.ReadInt32L());
sl@0
   193
sl@0
   194
	labelSize = stream.ReadInt32L();
sl@0
   195
	HBufC* labelSpec = HBufC::NewMaxLC(labelSize);
sl@0
   196
	TPtr labelPtr(labelSpec->Des());
sl@0
   197
	stream.ReadL(labelPtr, labelSize);
sl@0
   198
	
sl@0
   199
	response1Size = stream.ReadInt32L();
sl@0
   200
	HBufC* response1 = HBufC::NewMaxLC(response1Size);
sl@0
   201
	TPtr response1Ptr(response1->Des());
sl@0
   202
	stream.ReadL(response1Ptr, response1Size);
sl@0
   203
	
sl@0
   204
	response2Size = stream.ReadInt32L();
sl@0
   205
	HBufC* response2 = HBufC::NewMaxLC(response2Size);
sl@0
   206
	TPtr response2Ptr(response2->Des());
sl@0
   207
	stream.ReadL(response2Ptr, response2Size);
sl@0
   208
sl@0
   209
	CInputSpec* inputSpec = new (ELeave) CInputSpec(op, labelSpec, response1, response2);	
sl@0
   210
	CleanupStack::Pop(3, labelSpec);	
sl@0
   211
	CleanupStack::PopAndDestroy(); // stream
sl@0
   212
sl@0
   213
	return inputSpec;
sl@0
   214
	}
sl@0
   215
sl@0
   216
sl@0
   217
void CTestSecDlgNotifier::DoEnterPINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
sl@0
   218
	{
sl@0
   219
	const TPINInput& pinInput = reinterpret_cast<const TPINInput&>(*aBuffer.Ptr());
sl@0
   220
sl@0
   221
	if (pinInput.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound)
sl@0
   222
		{
sl@0
   223
		User::Leave(KErrLabelMismatch);
sl@0
   224
		}
sl@0
   225
	
sl@0
   226
	TPINValue pinValue = aSpec.Response1();
sl@0
   227
	TPckg<TPINValue> pinValueBufPtr(pinValue);
sl@0
   228
	aMessage.WriteL(aReplySlot, pinValueBufPtr);
sl@0
   229
	}
sl@0
   230
sl@0
   231
void CTestSecDlgNotifier::DoChangePINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
sl@0
   232
	{
sl@0
   233
	const TPINInput& input = reinterpret_cast<const TPINInput&>(*aBuffer.Ptr());
sl@0
   234
sl@0
   235
	if (input.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound)
sl@0
   236
		{
sl@0
   237
		User::Leave(KErrLabelMismatch);
sl@0
   238
		}
sl@0
   239
sl@0
   240
	TTwoPINOutput output;
sl@0
   241
	output.iPINValueToCheck = aSpec.Response1();
sl@0
   242
	output.iNewPINValue = aSpec.Response2();
sl@0
   243
	TPckg<TTwoPINOutput> outputPckg(output);
sl@0
   244
	aMessage.WriteL(aReplySlot, outputPckg);
sl@0
   245
	}
sl@0
   246
sl@0
   247
sl@0
   248
void CTestSecDlgNotifier::Release()
sl@0
   249
	{
sl@0
   250
	delete this;
sl@0
   251
	}
sl@0
   252
sl@0
   253
sl@0
   254
sl@0
   255
CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::RegisterL()
sl@0
   256
	{
sl@0
   257
	return iInfo;
sl@0
   258
	}
sl@0
   259
sl@0
   260
sl@0
   261
sl@0
   262
CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::Info() const
sl@0
   263
	{
sl@0
   264
	return iInfo;
sl@0
   265
	}
sl@0
   266
sl@0
   267
sl@0
   268
sl@0
   269
void CTestSecDlgNotifier::StartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
sl@0
   270
	{
sl@0
   271
	TRAPD(err, DoStartL(aBuffer, aReplySlot, aMessage));
sl@0
   272
	aMessage.Complete(err);
sl@0
   273
	}
sl@0
   274
	
sl@0
   275
	
sl@0
   276
void CTestSecDlgNotifier::DoStartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
sl@0
   277
	{
sl@0
   278
	// Minimum length is 4
sl@0
   279
	__ASSERT_DEBUG( aBuffer.Length() >= 4, User::Panic(_L("CTestSecDlgNotifier"), 0));
sl@0
   280
sl@0
   281
	TUint operation = *reinterpret_cast<const TInt *>(aBuffer.Ptr()) & KSecurityDialogOperationMask;
sl@0
   282
	
sl@0
   283
	TInt index = GetInputIndexL();
sl@0
   284
	CInputSpec* spec = NULL;
sl@0
   285
sl@0
   286
	TRAPD(err, spec = ReadInputSpecL(index));
sl@0
   287
	
sl@0
   288
	// If the input file doesn't exist then we will answer PIN requests with the
sl@0
   289
	// "pinkcloud" passphrase - this is so the certstore tests work independantly
sl@0
   290
	// from keystore
sl@0
   291
	if (err == KErrNotFound)
sl@0
   292
		{
sl@0
   293
		switch(operation)
sl@0
   294
			{
sl@0
   295
			case EEnterPIN:
sl@0
   296
				{
sl@0
   297
				TPINValue pinValue(KpinValue);
sl@0
   298
				TPckg<TPINValue> pinValueBufPtr(pinValue);
sl@0
   299
				aMessage.WriteL(aReplySlot, pinValueBufPtr);
sl@0
   300
				break;
sl@0
   301
				}
sl@0
   302
			case EServerAuthenticationFailure:
sl@0
   303
				{
sl@0
   304
				TServerAuthenticationFailureDialogResult output;
sl@0
   305
				output = EStop;				
sl@0
   306
	    		TServerAuthenticationFailureOutputBuf outputPckg(output);	
sl@0
   307
				aMessage.WriteL(aReplySlot, outputPckg);
sl@0
   308
				break;
sl@0
   309
				}
sl@0
   310
			default:
sl@0
   311
				{
sl@0
   312
				User::Leave(KErrOperationMismatch);
sl@0
   313
				break;
sl@0
   314
				}			
sl@0
   315
			}
sl@0
   316
		return;	
sl@0
   317
		}
sl@0
   318
	
sl@0
   319
	if (err == KErrEof)
sl@0
   320
		{
sl@0
   321
		User::Leave(KErrTooManyDialogs);
sl@0
   322
		}
sl@0
   323
sl@0
   324
	User::LeaveIfError(err);
sl@0
   325
sl@0
   326
	CleanupStack::PushL(spec);
sl@0
   327
	
sl@0
   328
	if (operation != spec->Operation())
sl@0
   329
		{
sl@0
   330
		User::Leave(KErrOperationMismatch);
sl@0
   331
		}
sl@0
   332
		
sl@0
   333
	switch (operation)
sl@0
   334
		{
sl@0
   335
		case EEnterPIN:
sl@0
   336
			DoEnterPINL(*spec, aBuffer, aReplySlot, aMessage);
sl@0
   337
			break;
sl@0
   338
sl@0
   339
		case EChangePIN:
sl@0
   340
			DoChangePINL(*spec, aBuffer, aReplySlot, aMessage);
sl@0
   341
			break;
sl@0
   342
sl@0
   343
		case ESecureConnection:
sl@0
   344
 			DoSecureConnectionL(*spec, aBuffer, aReplySlot, aMessage);
sl@0
   345
 			break;
sl@0
   346
sl@0
   347
		case ESignText:
sl@0
   348
		case EEnablePIN:
sl@0
   349
		case EDisablePIN:
sl@0
   350
		case EUnblockPIN:		
sl@0
   351
		case EUnblockPINInClear:
sl@0
   352
		case EPINBlocked:
sl@0
   353
			// these operations are not yet implemented in this test harness
sl@0
   354
			User::Leave(KErrOperationNotSupported);
sl@0
   355
			break;
sl@0
   356
sl@0
   357
		case EServerAuthenticationFailure:
sl@0
   358
			DoServerAuthenticationFailureL(*spec, aBuffer, aReplySlot, aMessage);
sl@0
   359
			break;
sl@0
   360
sl@0
   361
		default:
sl@0
   362
			User::Panic(_L("CTestSecDlgNotifier"), 0);
sl@0
   363
		}
sl@0
   364
	CleanupStack::PopAndDestroy(spec);
sl@0
   365
	}
sl@0
   366
sl@0
   367
void CTestSecDlgNotifier::DoServerAuthenticationFailureL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage )
sl@0
   368
	{
sl@0
   369
	// Test for valid packing of dialog data by extracting the encoded certificate
sl@0
   370
	// and attempting to construct an X509 certificate from it.
sl@0
   371
	CServerAuthenticationFailureInput* srvAuthFail = CServerAuthenticationFailureInput::NewLC(aBuffer);
sl@0
   372
	TPtrC8 encodedCert;
sl@0
   373
	srvAuthFail->GetEncodedCert(encodedCert);
sl@0
   374
	
sl@0
   375
	// If CX509Certificate::NewL leaves the encoded cert buffer must not be valid.
sl@0
   376
	const CX509Certificate* cert = CX509Certificate::NewL(encodedCert);
sl@0
   377
sl@0
   378
	// There is no further need for the cert, so it can be deleted immediately.
sl@0
   379
	delete cert;
sl@0
   380
	
sl@0
   381
	CleanupStack::PopAndDestroy(srvAuthFail);
sl@0
   382
	
sl@0
   383
	TServerAuthenticationFailureDialogResult output;
sl@0
   384
	output = EStop;
sl@0
   385
	if( (aSpec.Response1()).CompareF(KYes) == KErrNone )
sl@0
   386
		{
sl@0
   387
		output = EContinue;			
sl@0
   388
		}
sl@0
   389
	TServerAuthenticationFailureOutputBuf outputPckg(output);	
sl@0
   390
	aMessage.WriteL(aReplySlot, outputPckg);
sl@0
   391
	}
sl@0
   392
sl@0
   393
void CTestSecDlgNotifier::DoSecureConnectionL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage )
sl@0
   394
	{
sl@0
   395
	// If the client does not want to continue
sl@0
   396
	if( (aSpec.Response1()).CompareF(KYes) != KErrNone )
sl@0
   397
		{
sl@0
   398
		User::Leave(KErrCancel);	
sl@0
   399
		}
sl@0
   400
	else
sl@0
   401
		{
sl@0
   402
		const TSignInput* secureConnectionInput =
sl@0
   403
								reinterpret_cast<const TSignInput*>( aBuffer.Ptr() );
sl@0
   404
		// if the client certificate is requested
sl@0
   405
		if (secureConnectionInput->iDoClientAuthentication)
sl@0
   406
			{			
sl@0
   407
			TLex lexi(aSpec.Response2());
sl@0
   408
			TInt32 selectionId=0;
sl@0
   409
			TInt err=lexi.Val(selectionId);
sl@0
   410
sl@0
   411
			TInt certHandleTotal = secureConnectionInput->iCertHandleArrayTotal;
sl@0
   412
			if (selectionId>certHandleTotal)
sl@0
   413
				{
sl@0
   414
				User::Leave(KErrNotFound);	
sl@0
   415
				}
sl@0
   416
												
sl@0
   417
			// Get index at start of list of TCTTokenObjectHandle objects
sl@0
   418
			TInt bufferIndex = sizeof( TSignInput );
sl@0
   419
			TInt certHandleSize = sizeof( TCTTokenObjectHandle );
sl@0
   420
			TPckgBuf<TCTTokenObjectHandle> certHandleBuf;
sl@0
   421
			TPtrC8 certHandleData( aBuffer.Mid( bufferIndex+(selectionId-1)*certHandleSize, certHandleSize ) );
sl@0
   422
			certHandleBuf.Copy( certHandleData );
sl@0
   423
			aMessage.WriteL( aReplySlot, certHandleBuf );			
sl@0
   424
			}			
sl@0
   425
		}	
sl@0
   426
	}	
sl@0
   427
sl@0
   428
	
sl@0
   429
TPtrC8 CTestSecDlgNotifier::StartL( const TDesC8& /*aBuffer*/ )
sl@0
   430
	{
sl@0
   431
	User::Panic(_L("CTestSecDlgNotifier"), 0);
sl@0
   432
	return TPtrC8(KNullDesC8);
sl@0
   433
	}
sl@0
   434
sl@0
   435
sl@0
   436
void CTestSecDlgNotifier::Cancel()
sl@0
   437
	{
sl@0
   438
	// Don't think there is much we can do here. If a client deletes the
sl@0
   439
	// client-side security dialog instance, after calling a method that 
sl@0
   440
	// displays a dialog, this will not get called until the user dismisses
sl@0
   441
	// the dialog. We can't do anything then.
sl@0
   442
	}
sl@0
   443
sl@0
   444
sl@0
   445
TPtrC8 CTestSecDlgNotifier::UpdateL( const TDesC8& /*aBuffer*/ )
sl@0
   446
	{
sl@0
   447
	User::Panic(_L("CTestSecDlgNotifier"), 0);
sl@0
   448
	return NULL;
sl@0
   449
	}