os/security/securityanddataprivacytools/securitytools/certapp/test/tcertapp/tcertapp_good.cpp
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
* Good/Supportted values for labels
sl@0
    16
*
sl@0
    17
*/
sl@0
    18
sl@0
    19
sl@0
    20
sl@0
    21
const char *goodLabels[]=
sl@0
    22
{
sl@0
    23
  	"\"SymbianA\"",
sl@0
    24
  	"\"SymbianB\"",
sl@0
    25
  	"\"SymbianC\"",
sl@0
    26
  	"\"SymbianD\"",
sl@0
    27
  	"\"Label With Spaces\"",
sl@0
    28
  	"\"label with a quote \\\" char in it\"",   
sl@0
    29
  	//"\"label with backslash \\\\ char in it \"",
sl@0
    30
	0                       //null termination
sl@0
    31
};
sl@0
    32
sl@0
    33
sl@0
    34
const char *goodCert_array[]= 
sl@0
    35
{
sl@0
    36
  	"\"Root5CA\"",
sl@0
    37
  	"\"SymbianTestDSACA\"",
sl@0
    38
  	"\"SymbianTestRSACA\"",
sl@0
    39
  	"\"0\"",
sl@0
    40
  	"\"Label With Spaces\"",
sl@0
    41
  	"\"label with a quote \\\" char in it\"",   
sl@0
    42
  	//"\"label with backslash \\\\ char in it \"",
sl@0
    43
	0
sl@0
    44
};
sl@0
    45
sl@0
    46
sl@0
    47
sl@0
    48
//good deletables
sl@0
    49
const char *goodDeletables[]=
sl@0
    50
{
sl@0
    51
	"\"true\"",
sl@0
    52
	"\"false\"",
sl@0
    53
	"\"0\"",
sl@0
    54
	"\"1\"",
sl@0
    55
	"\"ETrue\"",
sl@0
    56
	"\"EFalse\"",
sl@0
    57
	0
sl@0
    58
};
sl@0
    59
sl@0
    60
sl@0
    61
const char *goodEmuCert_array[]= 
sl@0
    62
{
sl@0
    63
	"Root5CA",
sl@0
    64
	"SymbianTestDSACA",
sl@0
    65
	"SymbianTestRSACA",
sl@0
    66
	"0",
sl@0
    67
	"Label With Spaces",
sl@0
    68
	"label with a quote \" char in it",   
sl@0
    69
	//"label with backslash \\\\ char in it ",
sl@0
    70
	0
sl@0
    71
};
sl@0
    72
sl@0
    73
sl@0
    74
const char *goodSwiCert_array[]=
sl@0
    75
{
sl@0
    76
  	"SymbianA",
sl@0
    77
  	"SymbianB",
sl@0
    78
  	"SymbianC",
sl@0
    79
  	"SymbianD",
sl@0
    80
  	"Label With Spaces",
sl@0
    81
  	"label with a quote \" char in it",   
sl@0
    82
  	//"label with backslash \\ char in it ",
sl@0
    83
	0                       //null termination
sl@0
    84
};
sl@0
    85
sl@0
    86
sl@0
    87
const char *goodFormats[]=
sl@0
    88
{
sl@0
    89
	"EX509Certificate",
sl@0
    90
	"EWTLSCertificate", // if specified as WTLS then subject key id is mandatory
sl@0
    91
	"0",
sl@0
    92
	0
sl@0
    93
};
sl@0
    94
		
sl@0
    95
const char *goodCertOwnerTypes[]=
sl@0
    96
{
sl@0
    97
	"\"ECACertificate\"",
sl@0
    98
	"\"EUserCertificate\"",
sl@0
    99
	"\"EPeerCertificate\"",
sl@0
   100
	"0",
sl@0
   101
	0
sl@0
   102
};
sl@0
   103
		
sl@0
   104
const char *goodSubjectKeyIds[]=
sl@0
   105
{
sl@0
   106
	"auto",
sl@0
   107
	"''", 
sl@0
   108
	"'53:CC:80:C1:A2:EA:9C:94:17:B3:DE:38:44:63:64:E4:4D:99:2B:74'",
sl@0
   109
	0
sl@0
   110
};
sl@0
   111
		
sl@0
   112
const char *goodIssuerKeyIds[] =
sl@0
   113
{
sl@0
   114
	"auto",
sl@0
   115
	"''", 
sl@0
   116
	"'53:CC:80:C1:A2:EA:9C:94:17:B3:DE:38:44:63:64:E4:4D:99:2B:74'",
sl@0
   117
	0
sl@0
   118
};
sl@0
   119
sl@0
   120
const char *goodApplications[] = 
sl@0
   121
{
sl@0
   122
	"\"SW Install\"",
sl@0
   123
	"\"0x1000a8b6\"",
sl@0
   124
	0
sl@0
   125
};
sl@0
   126
sl@0
   127
//good trusted values
sl@0
   128
const char *goodTrusteds[] =
sl@0
   129
{
sl@0
   130
	"\"true\"",
sl@0
   131
	"\"false\"",
sl@0
   132
	"0",
sl@0
   133
	"1",
sl@0
   134
	0
sl@0
   135
};
sl@0
   136
sl@0
   137
//for swi cert store
sl@0
   138
const char *goodCapabilitySets[]=
sl@0
   139
{
sl@0
   140
	"TCB",
sl@0
   141
	"CommDD",
sl@0
   142
	"PowerMgmt",
sl@0
   143
	"MultimediaDD",
sl@0
   144
	"ReadDeviceData",
sl@0
   145
	"WriteDeviceData",
sl@0
   146
	"DRM",
sl@0
   147
	"TrustedUI",
sl@0
   148
	"ProtServ",
sl@0
   149
	"DiskAdmin",
sl@0
   150
	"NetworkControl",
sl@0
   151
	"AllFiles",
sl@0
   152
	"SwEvent",
sl@0
   153
	"NetworkServices",
sl@0
   154
	"LocalServices",
sl@0
   155
	"ReadUserData",
sl@0
   156
	"WriteUserData",
sl@0
   157
	"Location",
sl@0
   158
	"SurroundingsDD",
sl@0
   159
	"UserEnvironment",
sl@0
   160
	0
sl@0
   161
};
sl@0
   162
sl@0
   163
//good mandatory
sl@0
   164
const char *goodMandatory[]=
sl@0
   165
{
sl@0
   166
	"\"true\"",
sl@0
   167
	"\"false\"",
sl@0
   168
	"0",
sl@0
   169
	"1",
sl@0
   170
	0
sl@0
   171
};
sl@0
   172
sl@0
   173
//good system upgrade
sl@0
   174
const char *goodSystemUpgrade[]=
sl@0
   175
{
sl@0
   176
	"\"true\"",
sl@0
   177
	"\"false\"",
sl@0
   178
	"0",
sl@0
   179
	"1",
sl@0
   180
	0
sl@0
   181
};
sl@0
   182
sl@0
   183
sl@0
   184
//for cacerts file
sl@0
   185
const char *goodUids[]=
sl@0
   186
{
sl@0
   187
	"0x100042ab",	  //SW Install
sl@0
   188
	"0x1000a8b6",  // SW install Ocsp Signing
sl@0
   189
	"0x101f9b28",  // Midlet Installation
sl@0
   190
	"0x1000183d",   //Server Authentication
sl@0
   191
	0
sl@0
   192
};
sl@0
   193
sl@0
   194
// for cert client store
sl@0
   195
const char *goodAppNames[]=
sl@0
   196
{
sl@0
   197
	"\"SW Install\"",
sl@0
   198
	"\"SW install Ocsp Signing\"",
sl@0
   199
	"\"Midlet Installation\"",
sl@0
   200
	"\"Server Authentication\"",
sl@0
   201
	0
sl@0
   202
};
sl@0
   203
sl@0
   204
const char *goodActionType[]=
sl@0
   205
{
sl@0
   206
	"init",
sl@0
   207
	"listcert",
sl@0
   208
	0
sl@0
   209
};
sl@0
   210
sl@0
   211
sl@0
   212
const char *goodOwnerType[]=
sl@0
   213
{
sl@0
   214
	"ca",
sl@0
   215
	"User",
sl@0
   216
	"Peer",
sl@0
   217
	"0",
sl@0
   218
	0
sl@0
   219
};
sl@0
   220
sl@0
   221
//Filter type required for rcsa
sl@0
   222
const char *goodRcsaFilterType[]=
sl@0
   223
{
sl@0
   224
	"Root5CA",
sl@0
   225
	"X509",
sl@0
   226
	"ca",
sl@0
   227
	"53cc80c1a2ea9c9417b3de38446364e44d992b74",
sl@0
   228
	"549",
sl@0
   229
	"1",
sl@0
   230
	0
sl@0
   231
};
sl@0
   232
sl@0
   233
sl@0
   234
// applications names used in the store
sl@0
   235
const char *goodcertclient_array[]=
sl@0
   236
{
sl@0
   237
	"SW Install",
sl@0
   238
	"SW install Ocsp Signing",
sl@0
   239
	"Midlet Installation",
sl@0
   240
	"Server Authentication",
sl@0
   241
	0
sl@0
   242
};
sl@0
   243
sl@0
   244
sl@0
   245
//hex array of uid 
sl@0
   246
const char *gooduid_array[]= 
sl@0
   247
{
sl@0
   248
	"0x100042ab", //uid of SWInstall
sl@0
   249
	"0x1000a8b6", //Uid of SW Install OCSP Signing
sl@0
   250
	"0x101f9b28", //Uid of Midlet Installation
sl@0
   251
	"0x1000183d"  //Uid of Server Authentication
sl@0
   252
};
sl@0
   253
sl@0
   254
// decimal arry of uid
sl@0
   255
const char *gooddecimalUid_array[]= 
sl@0
   256
{
sl@0
   257
	"268452523", //uid of SWInstall
sl@0
   258
	"268478646", //Uid of SW Install OCSP Signing
sl@0
   259
	"270506792", //Uid of Midlet Installation
sl@0
   260
	"268441661"  //Uid of Server Authentication
sl@0
   261
};
sl@0
   262
sl@0
   263
const char *goodTrust[]=
sl@0
   264
{
sl@0
   265
	"1",
sl@0
   266
	"0"
sl@0
   267
};
sl@0
   268
sl@0
   269
const char *mandatory[]=
sl@0
   270
{
sl@0
   271
	"ETrue",
sl@0
   272
	"EFalse",
sl@0
   273
	"0",
sl@0
   274
	"1"
sl@0
   275
};
sl@0
   276
sl@0
   277
const char *systemUpgrade[]=
sl@0
   278
{
sl@0
   279
	"ETrue",
sl@0
   280
	"EFalse",
sl@0
   281
	"1",
sl@0
   282
	"0"
sl@0
   283
};
sl@0
   284
sl@0
   285
const char *deletable[]=
sl@0
   286
{
sl@0
   287
	"ETrue",
sl@0
   288
	"EFalse",
sl@0
   289
	"0",
sl@0
   290
	"1"
sl@0
   291
};
sl@0
   292
sl@0
   293
// End of file
sl@0
   294
sl@0
   295