os/security/cryptoservices/certificateandkeymgmt/tx509/extensiontest.h
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/security/cryptoservices/certificateandkeymgmt/tx509/extensiontest.h	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,93 @@
     1.4 +/*
     1.5 +* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.6 +* All rights reserved.
     1.7 +* This component and the accompanying materials are made available
     1.8 +* under the terms of the License "Eclipse Public License v1.0"
     1.9 +* which accompanies this distribution, and is available
    1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.11 +*
    1.12 +* Initial Contributors:
    1.13 +* Nokia Corporation - initial contribution.
    1.14 +*
    1.15 +* Contributors:
    1.16 +*
    1.17 +* Description: 
    1.18 +* CExtensionTest class implementation
    1.19 +*
    1.20 +*/
    1.21 +
    1.22 +
    1.23 +/**
    1.24 + @file 
    1.25 + @internalTechnology
    1.26 +*/
    1.27 + 
    1.28 +#ifndef __EXTENSIONTEST_H
    1.29 +#define __EXTENSIONTEST_H
    1.30 +
    1.31 +#include <x509certext.h>
    1.32 +
    1.33 +#include "t_testaction.h"
    1.34 +#include "tcertwriter.h"
    1.35 +
    1.36 +class CExtensionTest : public CTestAction
    1.37 +	{
    1.38 +public:
    1.39 +	static CTestAction* NewL(RFs& aFs, CConsoleBase& aConsole, 
    1.40 +		Output& aOut, const TTestActionSpec& aTestActionSpec);
    1.41 +	static CTestAction* NewLC(RFs& aFs, CConsoleBase& aConsole,
    1.42 +		Output& aOut, const TTestActionSpec& aTestActionSpec);
    1.43 +	void TestValidation(TRequestStatus& aStatus);
    1.44 +	~CExtensionTest();
    1.45 +
    1.46 +	void PerformAction(TRequestStatus& aStatus);
    1.47 +	void DoReportAction();
    1.48 +	void DoCheckResult(TInt aError);
    1.49 +
    1.50 +private:
    1.51 +	CExtensionTest(RFs& aFs, CConsoleBase& aConsole, Output& aOut);
    1.52 +	void ConstructL(const TTestActionSpec& aTestActionSpec);
    1.53 +	
    1.54 +	// compares arrays of things returning true if they are equal
    1.55 +	TBool IsEqual(const RArray<TInt>& aArray1, const RArray<TInt>& aArray2);
    1.56 +	TBool IsEqual(const RPointerArray<HBufC>& aArray1, const RPointerArray<HBufC>& aArray2);
    1.57 +	
    1.58 +	// return true if the extension data matches the expected value
    1.59 +	void CheckExtensionsL(const CX509Certificate& cert, TBool& match, TBool& result);
    1.60 +	TBool CheckDeviceIdListL(const CX509Certificate& cert);
    1.61 +	TBool CheckSidListL(const CX509Certificate& cert);
    1.62 +	TBool CheckVidListL(const CX509Certificate& cert);
    1.63 +	TBool CheckCapabilitiesL(const CX509Certificate& cert);
    1.64 +	
    1.65 +	// populate expected value data structures from scritps
    1.66 +	void BuildIntList(RArray<TInt>& aInts, const TDesC& aBuf, const TDesC& aTag);
    1.67 +	void BuildStringListL(RPointerArray<HBufC>& aStrings, const TDesC& aBuf, const TDesC& aTag);
    1.68 +	void BuildCapabilitySet(TCapabilitySet& aCapabilitySet, const TDesC& aBuf);
    1.69 +	
    1.70 +	void PrintLine(const TDesC& aText);
    1.71 +	void Print(const TDesC& aText);
    1.72 +
    1.73 +private:
    1.74 +	RFs& iFs;		
    1.75 +	TFileName iCertFileName;
    1.76 +		
    1.77 +	// Whether the input data is expeceted to match the certificate extension.
    1.78 +	TBool iExpectedMatch;
    1.79 +	
    1.80 +	// Whether the parsing of extension is expected to fail.
    1.81 +	TBool iExpectedCorrupt;	
    1.82 +	
    1.83 +	// Whether the constraints are expected within the certificate
    1.84 +	TBool iDeviceIdsPresent;
    1.85 +	TBool iSidsPresent;
    1.86 +	TBool iVidsPresent;
    1.87 +	TBool iCapabilitiesPresent;
    1.88 +	
    1.89 +	// The expected values associated with the extensions
    1.90 +	RPointerArray<HBufC> iExpectedDeviceIdList;
    1.91 +	RArray<TInt> iExpectedSidList;
    1.92 +	RArray<TInt> iExpectedVidList;
    1.93 +	TCapabilitySet iExpectedCapabilities;
    1.94 +	};
    1.95 +
    1.96 +#endif