First public contribution.
2 * Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
4 * This component and the accompanying materials are made available
5 * under the terms of the License "Eclipse Public License v1.0"
6 * which accompanies this distribution, and is available
7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
9 * Initial Contributors:
10 * Nokia Corporation - initial contribution.
21 #include <secdlgimpldefs.h>
22 #include <certificateapps.h>
26 // These are not really allocated to us, but this is only for finding errors
27 // while debugging, so it doesn't really matter
28 const TInt KErrTooManyDialogs = -12000;
29 const TInt KErrLabelMismatch = -12001;
30 const TInt KErrOperationMismatch = -12002;
31 const TInt KErrOperationNotSupported = -12003;
33 _LIT(KpinValue,"pinkcloud");
36 // ----------------------------------------------------------------------------
37 // Lib main entry point.
38 // This can leave and should leave (if failure occurs) despite the lack of trailing L.
41 #ifdef _T_SECDLG_TEXTSHELL
42 EXPORT_C CArrayPtr<MNotifierBase2>* NotifierArray()
44 CArrayPtr<MNotifierBase2>* NotifierArray()
47 //The notifierArray function CAN leave, despite no trailing L
48 CArrayPtrFlat<MNotifierBase2>* subjects = new (ELeave) CArrayPtrFlat<MNotifierBase2>( 1 );
49 CleanupStack::PushL(subjects);
50 CTestSecDlgNotifier* notifier = CTestSecDlgNotifier::NewL();
51 CleanupStack::PushL( notifier );
52 subjects->AppendL( notifier );
53 CleanupStack::Pop( 2,subjects); //notifier, subjects
57 // ----------------------------------------------------------------------------
58 // Ecom plugin implementation for UI notifier
61 #ifndef _T_SECDLG_TEXTSHELL
63 const TImplementationProxy ImplementationTable[] =
65 IMPLEMENTATION_PROXY_ENTRY(KTSecDlgNotiferUid, NotifierArray)
68 EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
70 aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
71 return (ImplementationTable);
76 // ----------------------------------------------------------------------------
80 CInputSpec::CInputSpec(TSecurityDialogOperation aOp, HBufC* aLabelSpec, HBufC* aResponse1, HBufC* aResponse2) :
81 iOp(aOp), iLabelSpec(aLabelSpec), iResponse1(aResponse1), iResponse2(aResponse2)
85 CInputSpec::~CInputSpec()
93 // ----------------------------------------------------------------------------
94 // CTestSecDlgNotifier
97 _LIT(KInputFile, "\\t_secdlg_in.dat");
98 _LIT(KOutputFile, "\\t_secdlg_out.dat");
100 CTestSecDlgNotifier* CTestSecDlgNotifier::NewL()
102 CTestSecDlgNotifier* self=new (ELeave) CTestSecDlgNotifier();
103 CleanupStack::PushL(self);
105 CleanupStack::Pop(self);
109 CTestSecDlgNotifier::CTestSecDlgNotifier()
111 iInfo.iUid = KUidSecurityDialogNotifier;
112 iInfo.iChannel = TUid::Uid(0x00001234); // dummy
113 iInfo.iPriority = ENotifierPriorityHigh;
116 void CTestSecDlgNotifier::ConstructL()
118 User::LeaveIfError(iFs.Connect());
122 TInt CTestSecDlgNotifier::GetInputIndexL()
124 RFileReadStream stream;
125 TDriveUnit sysDrive (RFs::GetSystemDrive());
126 TDriveName driveName(sysDrive.Name());
127 TBuf<128> outputFile (driveName);
128 outputFile.Append(KOutputFile);
130 TInt err = stream.Open(iFs, outputFile, EFileRead | EFileShareExclusive);
131 // If the file doesn't exist yet just return zero
132 if (err == KErrNotFound)
136 User::LeaveIfError(err);
138 TInt index = stream.ReadInt32L();
139 CleanupStack::PopAndDestroy(); // stream
143 void CTestSecDlgNotifier::WriteDialogCountL(TInt aCount)
145 RFileWriteStream stream;
146 TDriveUnit sysDrive (RFs::GetSystemDrive());
147 TDriveName driveName(sysDrive.Name());
148 TBuf<128> outputFile (driveName);
149 outputFile.Append(KOutputFile);
151 TInt err = stream.Replace(iFs, outputFile, EFileWrite | EFileShareExclusive);
152 if (err == KErrNotFound)
154 err = stream.Create(iFs, outputFile, EFileWrite | EFileShareExclusive);
156 User::LeaveIfError(err);
158 stream.WriteInt32L(aCount);
160 CleanupStack::PopAndDestroy(); // stream
163 CInputSpec* CTestSecDlgNotifier::ReadInputSpecL(TInt aIndex)
165 RFileReadStream stream;
166 TDriveUnit sysDrive (RFs::GetSystemDrive());
167 TDriveName driveName(sysDrive.Name());
168 TBuf<128> inputFile (driveName);
169 inputFile.Append(KInputFile);
170 User::LeaveIfError(stream.Open(iFs, inputFile, EFileRead | EFileShareExclusive));
173 // Update dialog count here so test code can see how many dialogs were
174 // requested if there were more than expected
175 WriteDialogCountL(aIndex + 1);
177 MStreamBuf* streamBuf = stream.Source();
178 TInt labelSize, response1Size, response2Size;
180 // Skip records until we reach the one we want
181 for (TInt i = 0 ; i < aIndex ; ++i)
184 labelSize = stream.ReadInt32L();
185 streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, labelSize * 2);
186 response1Size = stream.ReadInt32L();
187 streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response1Size * 2);
188 response2Size = stream.ReadInt32L();
189 streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response2Size * 2);
192 TSecurityDialogOperation op = static_cast<TSecurityDialogOperation>(stream.ReadInt32L());
194 labelSize = stream.ReadInt32L();
195 HBufC* labelSpec = HBufC::NewMaxLC(labelSize);
196 TPtr labelPtr(labelSpec->Des());
197 stream.ReadL(labelPtr, labelSize);
199 response1Size = stream.ReadInt32L();
200 HBufC* response1 = HBufC::NewMaxLC(response1Size);
201 TPtr response1Ptr(response1->Des());
202 stream.ReadL(response1Ptr, response1Size);
204 response2Size = stream.ReadInt32L();
205 HBufC* response2 = HBufC::NewMaxLC(response2Size);
206 TPtr response2Ptr(response2->Des());
207 stream.ReadL(response2Ptr, response2Size);
209 CInputSpec* inputSpec = new (ELeave) CInputSpec(op, labelSpec, response1, response2);
210 CleanupStack::Pop(3, labelSpec);
211 CleanupStack::PopAndDestroy(); // stream
217 void CTestSecDlgNotifier::DoEnterPINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
219 const TPINInput& pinInput = reinterpret_cast<const TPINInput&>(*aBuffer.Ptr());
221 if (pinInput.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound)
223 User::Leave(KErrLabelMismatch);
226 TPINValue pinValue = aSpec.Response1();
227 TPckg<TPINValue> pinValueBufPtr(pinValue);
228 aMessage.WriteL(aReplySlot, pinValueBufPtr);
231 void CTestSecDlgNotifier::DoChangePINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
233 const TPINInput& input = reinterpret_cast<const TPINInput&>(*aBuffer.Ptr());
235 if (input.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound)
237 User::Leave(KErrLabelMismatch);
240 TTwoPINOutput output;
241 output.iPINValueToCheck = aSpec.Response1();
242 output.iNewPINValue = aSpec.Response2();
243 TPckg<TTwoPINOutput> outputPckg(output);
244 aMessage.WriteL(aReplySlot, outputPckg);
248 void CTestSecDlgNotifier::Release()
255 CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::RegisterL()
262 CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::Info() const
269 void CTestSecDlgNotifier::StartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
271 TRAPD(err, DoStartL(aBuffer, aReplySlot, aMessage));
272 aMessage.Complete(err);
276 void CTestSecDlgNotifier::DoStartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
278 // Minimum length is 4
279 __ASSERT_DEBUG( aBuffer.Length() >= 4, User::Panic(_L("CTestSecDlgNotifier"), 0));
281 TUint operation = *reinterpret_cast<const TInt *>(aBuffer.Ptr()) & KSecurityDialogOperationMask;
283 TInt index = GetInputIndexL();
284 CInputSpec* spec = NULL;
286 TRAPD(err, spec = ReadInputSpecL(index));
288 // If the input file doesn't exist then we will answer PIN requests with the
289 // "pinkcloud" passphrase - this is so the certstore tests work independantly
291 if (err == KErrNotFound)
297 TPINValue pinValue(KpinValue);
298 TPckg<TPINValue> pinValueBufPtr(pinValue);
299 aMessage.WriteL(aReplySlot, pinValueBufPtr);
302 case EServerAuthenticationFailure:
304 TServerAuthenticationFailureDialogResult output;
306 TServerAuthenticationFailureOutputBuf outputPckg(output);
307 aMessage.WriteL(aReplySlot, outputPckg);
312 User::Leave(KErrOperationMismatch);
321 User::Leave(KErrTooManyDialogs);
324 User::LeaveIfError(err);
326 CleanupStack::PushL(spec);
328 if (operation != spec->Operation())
330 User::Leave(KErrOperationMismatch);
336 DoEnterPINL(*spec, aBuffer, aReplySlot, aMessage);
340 DoChangePINL(*spec, aBuffer, aReplySlot, aMessage);
343 case ESecureConnection:
344 DoSecureConnectionL(*spec, aBuffer, aReplySlot, aMessage);
351 case EUnblockPINInClear:
353 // these operations are not yet implemented in this test harness
354 User::Leave(KErrOperationNotSupported);
357 case EServerAuthenticationFailure:
358 DoServerAuthenticationFailureL(*spec, aBuffer, aReplySlot, aMessage);
362 User::Panic(_L("CTestSecDlgNotifier"), 0);
364 CleanupStack::PopAndDestroy(spec);
367 void CTestSecDlgNotifier::DoServerAuthenticationFailureL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage )
369 // Test for valid packing of dialog data by extracting the encoded certificate
370 // and attempting to construct an X509 certificate from it.
371 CServerAuthenticationFailureInput* srvAuthFail = CServerAuthenticationFailureInput::NewLC(aBuffer);
373 srvAuthFail->GetEncodedCert(encodedCert);
375 // If CX509Certificate::NewL leaves the encoded cert buffer must not be valid.
376 const CX509Certificate* cert = CX509Certificate::NewL(encodedCert);
378 // There is no further need for the cert, so it can be deleted immediately.
381 CleanupStack::PopAndDestroy(srvAuthFail);
383 TServerAuthenticationFailureDialogResult output;
385 if( (aSpec.Response1()).CompareF(KYes) == KErrNone )
389 TServerAuthenticationFailureOutputBuf outputPckg(output);
390 aMessage.WriteL(aReplySlot, outputPckg);
393 void CTestSecDlgNotifier::DoSecureConnectionL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage )
395 // If the client does not want to continue
396 if( (aSpec.Response1()).CompareF(KYes) != KErrNone )
398 User::Leave(KErrCancel);
402 const TSignInput* secureConnectionInput =
403 reinterpret_cast<const TSignInput*>( aBuffer.Ptr() );
404 // if the client certificate is requested
405 if (secureConnectionInput->iDoClientAuthentication)
407 TLex lexi(aSpec.Response2());
408 TInt32 selectionId=0;
409 TInt err=lexi.Val(selectionId);
411 TInt certHandleTotal = secureConnectionInput->iCertHandleArrayTotal;
412 if (selectionId>certHandleTotal)
414 User::Leave(KErrNotFound);
417 // Get index at start of list of TCTTokenObjectHandle objects
418 TInt bufferIndex = sizeof( TSignInput );
419 TInt certHandleSize = sizeof( TCTTokenObjectHandle );
420 TPckgBuf<TCTTokenObjectHandle> certHandleBuf;
421 TPtrC8 certHandleData( aBuffer.Mid( bufferIndex+(selectionId-1)*certHandleSize, certHandleSize ) );
422 certHandleBuf.Copy( certHandleData );
423 aMessage.WriteL( aReplySlot, certHandleBuf );
429 TPtrC8 CTestSecDlgNotifier::StartL( const TDesC8& /*aBuffer*/ )
431 User::Panic(_L("CTestSecDlgNotifier"), 0);
432 return TPtrC8(KNullDesC8);
436 void CTestSecDlgNotifier::Cancel()
438 // Don't think there is much we can do here. If a client deletes the
439 // client-side security dialog instance, after calling a method that
440 // displays a dialog, this will not get called until the user dismisses
441 // the dialog. We can't do anything then.
445 TPtrC8 CTestSecDlgNotifier::UpdateL( const TDesC8& /*aBuffer*/ )
447 User::Panic(_L("CTestSecDlgNotifier"), 0);