os/security/cryptomgmtlibs/cryptotokenfw/tsecdlg/Tsecdlg.cpp
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 /*
     2 * Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
     3 * All rights reserved.
     4 * This component and the accompanying materials are made available
     5 * under the terms of the License "Eclipse Public License v1.0"
     6 * which accompanies this distribution, and is available
     7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
     8 *
     9 * Initial Contributors:
    10 * Nokia Corporation - initial contribution.
    11 *
    12 * Contributors:
    13 *
    14 * Description: 
    15 * secdlgImpl.cpp
    16 *
    17 */
    18 
    19 
    20 #include "Tsecdlg.h"
    21 #include <secdlgimpldefs.h>
    22 #include <certificateapps.h>
    23 #include <x509cert.h>
    24 
    25 
    26 // These are not really allocated to us, but this is only for finding errors
    27 // while debugging, so it doesn't really matter
    28 const TInt KErrTooManyDialogs			= -12000;
    29 const TInt KErrLabelMismatch 			= -12001;
    30 const TInt KErrOperationMismatch		= -12002;
    31 const TInt KErrOperationNotSupported	= -12003;
    32 
    33 _LIT(KpinValue,"pinkcloud");
    34 _LIT(KYes,"Yes");
    35 	
    36 // ----------------------------------------------------------------------------
    37 // Lib main entry point.
    38 // This can leave and should leave (if failure occurs) despite the lack of trailing L.
    39 //
    40 
    41 #ifdef _T_SECDLG_TEXTSHELL
    42 EXPORT_C CArrayPtr<MNotifierBase2>* NotifierArray()
    43 #else
    44 CArrayPtr<MNotifierBase2>* NotifierArray()
    45 #endif
    46 	{
    47 	//The notifierArray function CAN leave, despite no trailing L
    48 	CArrayPtrFlat<MNotifierBase2>* subjects = new (ELeave) CArrayPtrFlat<MNotifierBase2>( 1 );
    49 	CleanupStack::PushL(subjects);
    50 	CTestSecDlgNotifier* notifier = CTestSecDlgNotifier::NewL();
    51 	CleanupStack::PushL( notifier );
    52 	subjects->AppendL( notifier );
    53 	CleanupStack::Pop( 2,subjects);	//notifier, subjects
    54 	return subjects;
    55 	}
    56 
    57 // ----------------------------------------------------------------------------
    58 // Ecom plugin implementation for UI notifier
    59 //
    60 
    61 #ifndef _T_SECDLG_TEXTSHELL
    62 
    63 const TImplementationProxy ImplementationTable[] =
    64 	{
    65 		IMPLEMENTATION_PROXY_ENTRY(KTSecDlgNotiferUid, NotifierArray)
    66 	};
    67 
    68 EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
    69 	{
    70 	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
    71 	return (ImplementationTable);
    72 	}
    73 
    74 #endif
    75 
    76 // ----------------------------------------------------------------------------
    77 // CInputSpec
    78 //
    79 
    80 CInputSpec::CInputSpec(TSecurityDialogOperation aOp, HBufC* aLabelSpec, HBufC* aResponse1, HBufC* aResponse2) :
    81 	iOp(aOp), iLabelSpec(aLabelSpec), iResponse1(aResponse1), iResponse2(aResponse2)
    82 	{
    83 	}
    84 
    85 CInputSpec::~CInputSpec()
    86 	{
    87 	delete iLabelSpec;
    88 	delete iResponse1;
    89 	delete iResponse2;
    90 	}
    91 
    92 
    93 // ----------------------------------------------------------------------------
    94 // CTestSecDlgNotifier
    95 //
    96 
    97 _LIT(KInputFile, "\\t_secdlg_in.dat");
    98 _LIT(KOutputFile, "\\t_secdlg_out.dat");
    99 
   100 CTestSecDlgNotifier* CTestSecDlgNotifier::NewL()
   101 	{
   102 	CTestSecDlgNotifier* self=new (ELeave) CTestSecDlgNotifier();
   103 	CleanupStack::PushL(self);
   104 	self->ConstructL();
   105 	CleanupStack::Pop(self);
   106 	return self;
   107 	}
   108 
   109 CTestSecDlgNotifier::CTestSecDlgNotifier()
   110 	{
   111 	iInfo.iUid = KUidSecurityDialogNotifier;
   112 	iInfo.iChannel = TUid::Uid(0x00001234); // dummy
   113 	iInfo.iPriority = ENotifierPriorityHigh;
   114 	}
   115 
   116 void CTestSecDlgNotifier::ConstructL()
   117 	{
   118 	User::LeaveIfError(iFs.Connect());
   119 	}
   120 
   121 
   122 TInt CTestSecDlgNotifier::GetInputIndexL()
   123 	{
   124 	RFileReadStream stream;
   125 	TDriveUnit sysDrive (RFs::GetSystemDrive());
   126 	TDriveName driveName(sysDrive.Name());
   127 	TBuf<128> outputFile (driveName);
   128 	outputFile.Append(KOutputFile);
   129 	
   130 	TInt err = stream.Open(iFs, outputFile, EFileRead | EFileShareExclusive);
   131 	// If the file doesn't exist yet just return zero
   132 	if (err == KErrNotFound)
   133 		{
   134 		return 0;
   135 		}
   136 	User::LeaveIfError(err);
   137 	stream.PushL();
   138 	TInt index = stream.ReadInt32L();
   139 	CleanupStack::PopAndDestroy(); // stream
   140 	return index;
   141 	}
   142 
   143 void CTestSecDlgNotifier::WriteDialogCountL(TInt aCount)
   144 	{
   145 	RFileWriteStream stream;
   146 	TDriveUnit sysDrive (RFs::GetSystemDrive());
   147 	TDriveName driveName(sysDrive.Name());
   148 	TBuf<128> outputFile (driveName);
   149 	outputFile.Append(KOutputFile);
   150 	
   151 	TInt err = stream.Replace(iFs, outputFile, EFileWrite | EFileShareExclusive);
   152 	if (err == KErrNotFound)
   153 		{
   154 		err = stream.Create(iFs, outputFile, EFileWrite | EFileShareExclusive);
   155 		}
   156 	User::LeaveIfError(err);
   157 	stream.PushL();
   158 	stream.WriteInt32L(aCount);
   159 	stream.CommitL();
   160 	CleanupStack::PopAndDestroy(); // stream	
   161 	}
   162 
   163 CInputSpec* CTestSecDlgNotifier::ReadInputSpecL(TInt aIndex)
   164 	{
   165 	RFileReadStream stream;
   166 	TDriveUnit sysDrive (RFs::GetSystemDrive());
   167 	TDriveName driveName(sysDrive.Name());
   168 	TBuf<128> inputFile (driveName);
   169 	inputFile.Append(KInputFile);
   170 	User::LeaveIfError(stream.Open(iFs, inputFile, EFileRead | EFileShareExclusive));
   171 	stream.PushL();
   172 
   173 	// Update dialog count here so test code can see how many dialogs were
   174 	// requested if there were more than expected
   175 	WriteDialogCountL(aIndex + 1);
   176 	
   177 	MStreamBuf* streamBuf = stream.Source();
   178 	TInt labelSize, response1Size, response2Size;
   179 
   180 	// Skip records until we reach the one we want
   181 	for (TInt i = 0 ; i < aIndex ; ++i)
   182 		{
   183 		stream.ReadInt32L();
   184 		labelSize = stream.ReadInt32L();
   185 		streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, labelSize * 2);
   186 		response1Size = stream.ReadInt32L();
   187 		streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response1Size * 2);
   188 		response2Size = stream.ReadInt32L();
   189 		streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response2Size * 2);
   190 		}
   191 
   192 	TSecurityDialogOperation op = static_cast<TSecurityDialogOperation>(stream.ReadInt32L());
   193 
   194 	labelSize = stream.ReadInt32L();
   195 	HBufC* labelSpec = HBufC::NewMaxLC(labelSize);
   196 	TPtr labelPtr(labelSpec->Des());
   197 	stream.ReadL(labelPtr, labelSize);
   198 	
   199 	response1Size = stream.ReadInt32L();
   200 	HBufC* response1 = HBufC::NewMaxLC(response1Size);
   201 	TPtr response1Ptr(response1->Des());
   202 	stream.ReadL(response1Ptr, response1Size);
   203 	
   204 	response2Size = stream.ReadInt32L();
   205 	HBufC* response2 = HBufC::NewMaxLC(response2Size);
   206 	TPtr response2Ptr(response2->Des());
   207 	stream.ReadL(response2Ptr, response2Size);
   208 
   209 	CInputSpec* inputSpec = new (ELeave) CInputSpec(op, labelSpec, response1, response2);	
   210 	CleanupStack::Pop(3, labelSpec);	
   211 	CleanupStack::PopAndDestroy(); // stream
   212 
   213 	return inputSpec;
   214 	}
   215 
   216 
   217 void CTestSecDlgNotifier::DoEnterPINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
   218 	{
   219 	const TPINInput& pinInput = reinterpret_cast<const TPINInput&>(*aBuffer.Ptr());
   220 
   221 	if (pinInput.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound)
   222 		{
   223 		User::Leave(KErrLabelMismatch);
   224 		}
   225 	
   226 	TPINValue pinValue = aSpec.Response1();
   227 	TPckg<TPINValue> pinValueBufPtr(pinValue);
   228 	aMessage.WriteL(aReplySlot, pinValueBufPtr);
   229 	}
   230 
   231 void CTestSecDlgNotifier::DoChangePINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
   232 	{
   233 	const TPINInput& input = reinterpret_cast<const TPINInput&>(*aBuffer.Ptr());
   234 
   235 	if (input.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound)
   236 		{
   237 		User::Leave(KErrLabelMismatch);
   238 		}
   239 
   240 	TTwoPINOutput output;
   241 	output.iPINValueToCheck = aSpec.Response1();
   242 	output.iNewPINValue = aSpec.Response2();
   243 	TPckg<TTwoPINOutput> outputPckg(output);
   244 	aMessage.WriteL(aReplySlot, outputPckg);
   245 	}
   246 
   247 
   248 void CTestSecDlgNotifier::Release()
   249 	{
   250 	delete this;
   251 	}
   252 
   253 
   254 
   255 CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::RegisterL()
   256 	{
   257 	return iInfo;
   258 	}
   259 
   260 
   261 
   262 CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::Info() const
   263 	{
   264 	return iInfo;
   265 	}
   266 
   267 
   268 
   269 void CTestSecDlgNotifier::StartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
   270 	{
   271 	TRAPD(err, DoStartL(aBuffer, aReplySlot, aMessage));
   272 	aMessage.Complete(err);
   273 	}
   274 	
   275 	
   276 void CTestSecDlgNotifier::DoStartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
   277 	{
   278 	// Minimum length is 4
   279 	__ASSERT_DEBUG( aBuffer.Length() >= 4, User::Panic(_L("CTestSecDlgNotifier"), 0));
   280 
   281 	TUint operation = *reinterpret_cast<const TInt *>(aBuffer.Ptr()) & KSecurityDialogOperationMask;
   282 	
   283 	TInt index = GetInputIndexL();
   284 	CInputSpec* spec = NULL;
   285 
   286 	TRAPD(err, spec = ReadInputSpecL(index));
   287 	
   288 	// If the input file doesn't exist then we will answer PIN requests with the
   289 	// "pinkcloud" passphrase - this is so the certstore tests work independantly
   290 	// from keystore
   291 	if (err == KErrNotFound)
   292 		{
   293 		switch(operation)
   294 			{
   295 			case EEnterPIN:
   296 				{
   297 				TPINValue pinValue(KpinValue);
   298 				TPckg<TPINValue> pinValueBufPtr(pinValue);
   299 				aMessage.WriteL(aReplySlot, pinValueBufPtr);
   300 				break;
   301 				}
   302 			case EServerAuthenticationFailure:
   303 				{
   304 				TServerAuthenticationFailureDialogResult output;
   305 				output = EStop;				
   306 	    		TServerAuthenticationFailureOutputBuf outputPckg(output);	
   307 				aMessage.WriteL(aReplySlot, outputPckg);
   308 				break;
   309 				}
   310 			default:
   311 				{
   312 				User::Leave(KErrOperationMismatch);
   313 				break;
   314 				}			
   315 			}
   316 		return;	
   317 		}
   318 	
   319 	if (err == KErrEof)
   320 		{
   321 		User::Leave(KErrTooManyDialogs);
   322 		}
   323 
   324 	User::LeaveIfError(err);
   325 
   326 	CleanupStack::PushL(spec);
   327 	
   328 	if (operation != spec->Operation())
   329 		{
   330 		User::Leave(KErrOperationMismatch);
   331 		}
   332 		
   333 	switch (operation)
   334 		{
   335 		case EEnterPIN:
   336 			DoEnterPINL(*spec, aBuffer, aReplySlot, aMessage);
   337 			break;
   338 
   339 		case EChangePIN:
   340 			DoChangePINL(*spec, aBuffer, aReplySlot, aMessage);
   341 			break;
   342 
   343 		case ESecureConnection:
   344  			DoSecureConnectionL(*spec, aBuffer, aReplySlot, aMessage);
   345  			break;
   346 
   347 		case ESignText:
   348 		case EEnablePIN:
   349 		case EDisablePIN:
   350 		case EUnblockPIN:		
   351 		case EUnblockPINInClear:
   352 		case EPINBlocked:
   353 			// these operations are not yet implemented in this test harness
   354 			User::Leave(KErrOperationNotSupported);
   355 			break;
   356 
   357 		case EServerAuthenticationFailure:
   358 			DoServerAuthenticationFailureL(*spec, aBuffer, aReplySlot, aMessage);
   359 			break;
   360 
   361 		default:
   362 			User::Panic(_L("CTestSecDlgNotifier"), 0);
   363 		}
   364 	CleanupStack::PopAndDestroy(spec);
   365 	}
   366 
   367 void CTestSecDlgNotifier::DoServerAuthenticationFailureL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage )
   368 	{
   369 	// Test for valid packing of dialog data by extracting the encoded certificate
   370 	// and attempting to construct an X509 certificate from it.
   371 	CServerAuthenticationFailureInput* srvAuthFail = CServerAuthenticationFailureInput::NewLC(aBuffer);
   372 	TPtrC8 encodedCert;
   373 	srvAuthFail->GetEncodedCert(encodedCert);
   374 	
   375 	// If CX509Certificate::NewL leaves the encoded cert buffer must not be valid.
   376 	const CX509Certificate* cert = CX509Certificate::NewL(encodedCert);
   377 
   378 	// There is no further need for the cert, so it can be deleted immediately.
   379 	delete cert;
   380 	
   381 	CleanupStack::PopAndDestroy(srvAuthFail);
   382 	
   383 	TServerAuthenticationFailureDialogResult output;
   384 	output = EStop;
   385 	if( (aSpec.Response1()).CompareF(KYes) == KErrNone )
   386 		{
   387 		output = EContinue;			
   388 		}
   389 	TServerAuthenticationFailureOutputBuf outputPckg(output);	
   390 	aMessage.WriteL(aReplySlot, outputPckg);
   391 	}
   392 
   393 void CTestSecDlgNotifier::DoSecureConnectionL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage )
   394 	{
   395 	// If the client does not want to continue
   396 	if( (aSpec.Response1()).CompareF(KYes) != KErrNone )
   397 		{
   398 		User::Leave(KErrCancel);	
   399 		}
   400 	else
   401 		{
   402 		const TSignInput* secureConnectionInput =
   403 								reinterpret_cast<const TSignInput*>( aBuffer.Ptr() );
   404 		// if the client certificate is requested
   405 		if (secureConnectionInput->iDoClientAuthentication)
   406 			{			
   407 			TLex lexi(aSpec.Response2());
   408 			TInt32 selectionId=0;
   409 			TInt err=lexi.Val(selectionId);
   410 
   411 			TInt certHandleTotal = secureConnectionInput->iCertHandleArrayTotal;
   412 			if (selectionId>certHandleTotal)
   413 				{
   414 				User::Leave(KErrNotFound);	
   415 				}
   416 												
   417 			// Get index at start of list of TCTTokenObjectHandle objects
   418 			TInt bufferIndex = sizeof( TSignInput );
   419 			TInt certHandleSize = sizeof( TCTTokenObjectHandle );
   420 			TPckgBuf<TCTTokenObjectHandle> certHandleBuf;
   421 			TPtrC8 certHandleData( aBuffer.Mid( bufferIndex+(selectionId-1)*certHandleSize, certHandleSize ) );
   422 			certHandleBuf.Copy( certHandleData );
   423 			aMessage.WriteL( aReplySlot, certHandleBuf );			
   424 			}			
   425 		}	
   426 	}	
   427 
   428 	
   429 TPtrC8 CTestSecDlgNotifier::StartL( const TDesC8& /*aBuffer*/ )
   430 	{
   431 	User::Panic(_L("CTestSecDlgNotifier"), 0);
   432 	return TPtrC8(KNullDesC8);
   433 	}
   434 
   435 
   436 void CTestSecDlgNotifier::Cancel()
   437 	{
   438 	// Don't think there is much we can do here. If a client deletes the
   439 	// client-side security dialog instance, after calling a method that 
   440 	// displays a dialog, this will not get called until the user dismisses
   441 	// the dialog. We can't do anything then.
   442 	}
   443 
   444 
   445 TPtrC8 CTestSecDlgNotifier::UpdateL( const TDesC8& /*aBuffer*/ )
   446 	{
   447 	User::Panic(_L("CTestSecDlgNotifier"), 0);
   448 	return NULL;
   449 	}