1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/cryptoservices/certificateandkeymgmt/tx509/extensiontest.h Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,93 @@
1.4 +/*
1.5 +* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of the License "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +* CExtensionTest class implementation
1.19 +*
1.20 +*/
1.21 +
1.22 +
1.23 +/**
1.24 + @file
1.25 + @internalTechnology
1.26 +*/
1.27 +
1.28 +#ifndef __EXTENSIONTEST_H
1.29 +#define __EXTENSIONTEST_H
1.30 +
1.31 +#include <x509certext.h>
1.32 +
1.33 +#include "t_testaction.h"
1.34 +#include "tcertwriter.h"
1.35 +
1.36 +class CExtensionTest : public CTestAction
1.37 + {
1.38 +public:
1.39 + static CTestAction* NewL(RFs& aFs, CConsoleBase& aConsole,
1.40 + Output& aOut, const TTestActionSpec& aTestActionSpec);
1.41 + static CTestAction* NewLC(RFs& aFs, CConsoleBase& aConsole,
1.42 + Output& aOut, const TTestActionSpec& aTestActionSpec);
1.43 + void TestValidation(TRequestStatus& aStatus);
1.44 + ~CExtensionTest();
1.45 +
1.46 + void PerformAction(TRequestStatus& aStatus);
1.47 + void DoReportAction();
1.48 + void DoCheckResult(TInt aError);
1.49 +
1.50 +private:
1.51 + CExtensionTest(RFs& aFs, CConsoleBase& aConsole, Output& aOut);
1.52 + void ConstructL(const TTestActionSpec& aTestActionSpec);
1.53 +
1.54 + // compares arrays of things returning true if they are equal
1.55 + TBool IsEqual(const RArray<TInt>& aArray1, const RArray<TInt>& aArray2);
1.56 + TBool IsEqual(const RPointerArray<HBufC>& aArray1, const RPointerArray<HBufC>& aArray2);
1.57 +
1.58 + // return true if the extension data matches the expected value
1.59 + void CheckExtensionsL(const CX509Certificate& cert, TBool& match, TBool& result);
1.60 + TBool CheckDeviceIdListL(const CX509Certificate& cert);
1.61 + TBool CheckSidListL(const CX509Certificate& cert);
1.62 + TBool CheckVidListL(const CX509Certificate& cert);
1.63 + TBool CheckCapabilitiesL(const CX509Certificate& cert);
1.64 +
1.65 + // populate expected value data structures from scritps
1.66 + void BuildIntList(RArray<TInt>& aInts, const TDesC& aBuf, const TDesC& aTag);
1.67 + void BuildStringListL(RPointerArray<HBufC>& aStrings, const TDesC& aBuf, const TDesC& aTag);
1.68 + void BuildCapabilitySet(TCapabilitySet& aCapabilitySet, const TDesC& aBuf);
1.69 +
1.70 + void PrintLine(const TDesC& aText);
1.71 + void Print(const TDesC& aText);
1.72 +
1.73 +private:
1.74 + RFs& iFs;
1.75 + TFileName iCertFileName;
1.76 +
1.77 + // Whether the input data is expeceted to match the certificate extension.
1.78 + TBool iExpectedMatch;
1.79 +
1.80 + // Whether the parsing of extension is expected to fail.
1.81 + TBool iExpectedCorrupt;
1.82 +
1.83 + // Whether the constraints are expected within the certificate
1.84 + TBool iDeviceIdsPresent;
1.85 + TBool iSidsPresent;
1.86 + TBool iVidsPresent;
1.87 + TBool iCapabilitiesPresent;
1.88 +
1.89 + // The expected values associated with the extensions
1.90 + RPointerArray<HBufC> iExpectedDeviceIdList;
1.91 + RArray<TInt> iExpectedSidList;
1.92 + RArray<TInt> iExpectedVidList;
1.93 + TCapabilitySet iExpectedCapabilities;
1.94 + };
1.95 +
1.96 +#endif