sl@0: /* sl@0: * Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies). sl@0: * All rights reserved. sl@0: * This component and the accompanying materials are made available sl@0: * under the terms of the License "Eclipse Public License v1.0" sl@0: * which accompanies this distribution, and is available sl@0: * at the URL "http://www.eclipse.org/legal/epl-v10.html". sl@0: * sl@0: * Initial Contributors: sl@0: * Nokia Corporation - initial contribution. sl@0: * sl@0: * Contributors: sl@0: * sl@0: * Description: sl@0: * secdlgImpl.cpp sl@0: * sl@0: */ sl@0: sl@0: sl@0: #include "Tsecdlg.h" sl@0: #include sl@0: #include sl@0: #include sl@0: sl@0: sl@0: // These are not really allocated to us, but this is only for finding errors sl@0: // while debugging, so it doesn't really matter sl@0: const TInt KErrTooManyDialogs = -12000; sl@0: const TInt KErrLabelMismatch = -12001; sl@0: const TInt KErrOperationMismatch = -12002; sl@0: const TInt KErrOperationNotSupported = -12003; sl@0: sl@0: _LIT(KpinValue,"pinkcloud"); sl@0: _LIT(KYes,"Yes"); sl@0: sl@0: // ---------------------------------------------------------------------------- sl@0: // Lib main entry point. sl@0: // This can leave and should leave (if failure occurs) despite the lack of trailing L. sl@0: // sl@0: sl@0: #ifdef _T_SECDLG_TEXTSHELL sl@0: EXPORT_C CArrayPtr* NotifierArray() sl@0: #else sl@0: CArrayPtr* NotifierArray() sl@0: #endif sl@0: { sl@0: //The notifierArray function CAN leave, despite no trailing L sl@0: CArrayPtrFlat* subjects = new (ELeave) CArrayPtrFlat( 1 ); sl@0: CleanupStack::PushL(subjects); sl@0: CTestSecDlgNotifier* notifier = CTestSecDlgNotifier::NewL(); sl@0: CleanupStack::PushL( notifier ); sl@0: subjects->AppendL( notifier ); sl@0: CleanupStack::Pop( 2,subjects); //notifier, subjects sl@0: return subjects; sl@0: } sl@0: sl@0: // ---------------------------------------------------------------------------- sl@0: // Ecom plugin implementation for UI notifier sl@0: // sl@0: sl@0: #ifndef _T_SECDLG_TEXTSHELL sl@0: sl@0: const TImplementationProxy ImplementationTable[] = sl@0: { sl@0: IMPLEMENTATION_PROXY_ENTRY(KTSecDlgNotiferUid, NotifierArray) sl@0: }; sl@0: sl@0: EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount) sl@0: { sl@0: aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy); sl@0: return (ImplementationTable); sl@0: } sl@0: sl@0: #endif sl@0: sl@0: // ---------------------------------------------------------------------------- sl@0: // CInputSpec sl@0: // sl@0: sl@0: CInputSpec::CInputSpec(TSecurityDialogOperation aOp, HBufC* aLabelSpec, HBufC* aResponse1, HBufC* aResponse2) : sl@0: iOp(aOp), iLabelSpec(aLabelSpec), iResponse1(aResponse1), iResponse2(aResponse2) sl@0: { sl@0: } sl@0: sl@0: CInputSpec::~CInputSpec() sl@0: { sl@0: delete iLabelSpec; sl@0: delete iResponse1; sl@0: delete iResponse2; sl@0: } sl@0: sl@0: sl@0: // ---------------------------------------------------------------------------- sl@0: // CTestSecDlgNotifier sl@0: // sl@0: sl@0: _LIT(KInputFile, "\\t_secdlg_in.dat"); sl@0: _LIT(KOutputFile, "\\t_secdlg_out.dat"); sl@0: sl@0: CTestSecDlgNotifier* CTestSecDlgNotifier::NewL() sl@0: { sl@0: CTestSecDlgNotifier* self=new (ELeave) CTestSecDlgNotifier(); sl@0: CleanupStack::PushL(self); sl@0: self->ConstructL(); sl@0: CleanupStack::Pop(self); sl@0: return self; sl@0: } sl@0: sl@0: CTestSecDlgNotifier::CTestSecDlgNotifier() sl@0: { sl@0: iInfo.iUid = KUidSecurityDialogNotifier; sl@0: iInfo.iChannel = TUid::Uid(0x00001234); // dummy sl@0: iInfo.iPriority = ENotifierPriorityHigh; sl@0: } sl@0: sl@0: void CTestSecDlgNotifier::ConstructL() sl@0: { sl@0: User::LeaveIfError(iFs.Connect()); sl@0: } sl@0: sl@0: sl@0: TInt CTestSecDlgNotifier::GetInputIndexL() sl@0: { sl@0: RFileReadStream stream; sl@0: TDriveUnit sysDrive (RFs::GetSystemDrive()); sl@0: TDriveName driveName(sysDrive.Name()); sl@0: TBuf<128> outputFile (driveName); sl@0: outputFile.Append(KOutputFile); sl@0: sl@0: TInt err = stream.Open(iFs, outputFile, EFileRead | EFileShareExclusive); sl@0: // If the file doesn't exist yet just return zero sl@0: if (err == KErrNotFound) sl@0: { sl@0: return 0; sl@0: } sl@0: User::LeaveIfError(err); sl@0: stream.PushL(); sl@0: TInt index = stream.ReadInt32L(); sl@0: CleanupStack::PopAndDestroy(); // stream sl@0: return index; sl@0: } sl@0: sl@0: void CTestSecDlgNotifier::WriteDialogCountL(TInt aCount) sl@0: { sl@0: RFileWriteStream stream; sl@0: TDriveUnit sysDrive (RFs::GetSystemDrive()); sl@0: TDriveName driveName(sysDrive.Name()); sl@0: TBuf<128> outputFile (driveName); sl@0: outputFile.Append(KOutputFile); sl@0: sl@0: TInt err = stream.Replace(iFs, outputFile, EFileWrite | EFileShareExclusive); sl@0: if (err == KErrNotFound) sl@0: { sl@0: err = stream.Create(iFs, outputFile, EFileWrite | EFileShareExclusive); sl@0: } sl@0: User::LeaveIfError(err); sl@0: stream.PushL(); sl@0: stream.WriteInt32L(aCount); sl@0: stream.CommitL(); sl@0: CleanupStack::PopAndDestroy(); // stream sl@0: } sl@0: sl@0: CInputSpec* CTestSecDlgNotifier::ReadInputSpecL(TInt aIndex) sl@0: { sl@0: RFileReadStream stream; sl@0: TDriveUnit sysDrive (RFs::GetSystemDrive()); sl@0: TDriveName driveName(sysDrive.Name()); sl@0: TBuf<128> inputFile (driveName); sl@0: inputFile.Append(KInputFile); sl@0: User::LeaveIfError(stream.Open(iFs, inputFile, EFileRead | EFileShareExclusive)); sl@0: stream.PushL(); sl@0: sl@0: // Update dialog count here so test code can see how many dialogs were sl@0: // requested if there were more than expected sl@0: WriteDialogCountL(aIndex + 1); sl@0: sl@0: MStreamBuf* streamBuf = stream.Source(); sl@0: TInt labelSize, response1Size, response2Size; sl@0: sl@0: // Skip records until we reach the one we want sl@0: for (TInt i = 0 ; i < aIndex ; ++i) sl@0: { sl@0: stream.ReadInt32L(); sl@0: labelSize = stream.ReadInt32L(); sl@0: streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, labelSize * 2); sl@0: response1Size = stream.ReadInt32L(); sl@0: streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response1Size * 2); sl@0: response2Size = stream.ReadInt32L(); sl@0: streamBuf->SeekL(MStreamBuf::ERead, EStreamMark, response2Size * 2); sl@0: } sl@0: sl@0: TSecurityDialogOperation op = static_cast(stream.ReadInt32L()); sl@0: sl@0: labelSize = stream.ReadInt32L(); sl@0: HBufC* labelSpec = HBufC::NewMaxLC(labelSize); sl@0: TPtr labelPtr(labelSpec->Des()); sl@0: stream.ReadL(labelPtr, labelSize); sl@0: sl@0: response1Size = stream.ReadInt32L(); sl@0: HBufC* response1 = HBufC::NewMaxLC(response1Size); sl@0: TPtr response1Ptr(response1->Des()); sl@0: stream.ReadL(response1Ptr, response1Size); sl@0: sl@0: response2Size = stream.ReadInt32L(); sl@0: HBufC* response2 = HBufC::NewMaxLC(response2Size); sl@0: TPtr response2Ptr(response2->Des()); sl@0: stream.ReadL(response2Ptr, response2Size); sl@0: sl@0: CInputSpec* inputSpec = new (ELeave) CInputSpec(op, labelSpec, response1, response2); sl@0: CleanupStack::Pop(3, labelSpec); sl@0: CleanupStack::PopAndDestroy(); // stream sl@0: sl@0: return inputSpec; sl@0: } sl@0: sl@0: sl@0: void CTestSecDlgNotifier::DoEnterPINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage) sl@0: { sl@0: const TPINInput& pinInput = reinterpret_cast(*aBuffer.Ptr()); sl@0: sl@0: if (pinInput.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound) sl@0: { sl@0: User::Leave(KErrLabelMismatch); sl@0: } sl@0: sl@0: TPINValue pinValue = aSpec.Response1(); sl@0: TPckg pinValueBufPtr(pinValue); sl@0: aMessage.WriteL(aReplySlot, pinValueBufPtr); sl@0: } sl@0: sl@0: void CTestSecDlgNotifier::DoChangePINL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage) sl@0: { sl@0: const TPINInput& input = reinterpret_cast(*aBuffer.Ptr()); sl@0: sl@0: if (input.iPIN.iPINLabel.Find(aSpec.LabelSpec()) == KErrNotFound) sl@0: { sl@0: User::Leave(KErrLabelMismatch); sl@0: } sl@0: sl@0: TTwoPINOutput output; sl@0: output.iPINValueToCheck = aSpec.Response1(); sl@0: output.iNewPINValue = aSpec.Response2(); sl@0: TPckg outputPckg(output); sl@0: aMessage.WriteL(aReplySlot, outputPckg); sl@0: } sl@0: sl@0: sl@0: void CTestSecDlgNotifier::Release() sl@0: { sl@0: delete this; sl@0: } sl@0: sl@0: sl@0: sl@0: CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::RegisterL() sl@0: { sl@0: return iInfo; sl@0: } sl@0: sl@0: sl@0: sl@0: CTestSecDlgNotifier::TNotifierInfo CTestSecDlgNotifier::Info() const sl@0: { sl@0: return iInfo; sl@0: } sl@0: sl@0: sl@0: sl@0: void CTestSecDlgNotifier::StartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage) sl@0: { sl@0: TRAPD(err, DoStartL(aBuffer, aReplySlot, aMessage)); sl@0: aMessage.Complete(err); sl@0: } sl@0: sl@0: sl@0: void CTestSecDlgNotifier::DoStartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage) sl@0: { sl@0: // Minimum length is 4 sl@0: __ASSERT_DEBUG( aBuffer.Length() >= 4, User::Panic(_L("CTestSecDlgNotifier"), 0)); sl@0: sl@0: TUint operation = *reinterpret_cast(aBuffer.Ptr()) & KSecurityDialogOperationMask; sl@0: sl@0: TInt index = GetInputIndexL(); sl@0: CInputSpec* spec = NULL; sl@0: sl@0: TRAPD(err, spec = ReadInputSpecL(index)); sl@0: sl@0: // If the input file doesn't exist then we will answer PIN requests with the sl@0: // "pinkcloud" passphrase - this is so the certstore tests work independantly sl@0: // from keystore sl@0: if (err == KErrNotFound) sl@0: { sl@0: switch(operation) sl@0: { sl@0: case EEnterPIN: sl@0: { sl@0: TPINValue pinValue(KpinValue); sl@0: TPckg pinValueBufPtr(pinValue); sl@0: aMessage.WriteL(aReplySlot, pinValueBufPtr); sl@0: break; sl@0: } sl@0: case EServerAuthenticationFailure: sl@0: { sl@0: TServerAuthenticationFailureDialogResult output; sl@0: output = EStop; sl@0: TServerAuthenticationFailureOutputBuf outputPckg(output); sl@0: aMessage.WriteL(aReplySlot, outputPckg); sl@0: break; sl@0: } sl@0: default: sl@0: { sl@0: User::Leave(KErrOperationMismatch); sl@0: break; sl@0: } sl@0: } sl@0: return; sl@0: } sl@0: sl@0: if (err == KErrEof) sl@0: { sl@0: User::Leave(KErrTooManyDialogs); sl@0: } sl@0: sl@0: User::LeaveIfError(err); sl@0: sl@0: CleanupStack::PushL(spec); sl@0: sl@0: if (operation != spec->Operation()) sl@0: { sl@0: User::Leave(KErrOperationMismatch); sl@0: } sl@0: sl@0: switch (operation) sl@0: { sl@0: case EEnterPIN: sl@0: DoEnterPINL(*spec, aBuffer, aReplySlot, aMessage); sl@0: break; sl@0: sl@0: case EChangePIN: sl@0: DoChangePINL(*spec, aBuffer, aReplySlot, aMessage); sl@0: break; sl@0: sl@0: case ESecureConnection: sl@0: DoSecureConnectionL(*spec, aBuffer, aReplySlot, aMessage); sl@0: break; sl@0: sl@0: case ESignText: sl@0: case EEnablePIN: sl@0: case EDisablePIN: sl@0: case EUnblockPIN: sl@0: case EUnblockPINInClear: sl@0: case EPINBlocked: sl@0: // these operations are not yet implemented in this test harness sl@0: User::Leave(KErrOperationNotSupported); sl@0: break; sl@0: sl@0: case EServerAuthenticationFailure: sl@0: DoServerAuthenticationFailureL(*spec, aBuffer, aReplySlot, aMessage); sl@0: break; sl@0: sl@0: default: sl@0: User::Panic(_L("CTestSecDlgNotifier"), 0); sl@0: } sl@0: CleanupStack::PopAndDestroy(spec); sl@0: } sl@0: sl@0: void CTestSecDlgNotifier::DoServerAuthenticationFailureL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage ) sl@0: { sl@0: // Test for valid packing of dialog data by extracting the encoded certificate sl@0: // and attempting to construct an X509 certificate from it. sl@0: CServerAuthenticationFailureInput* srvAuthFail = CServerAuthenticationFailureInput::NewLC(aBuffer); sl@0: TPtrC8 encodedCert; sl@0: srvAuthFail->GetEncodedCert(encodedCert); sl@0: sl@0: // If CX509Certificate::NewL leaves the encoded cert buffer must not be valid. sl@0: const CX509Certificate* cert = CX509Certificate::NewL(encodedCert); sl@0: sl@0: // There is no further need for the cert, so it can be deleted immediately. sl@0: delete cert; sl@0: sl@0: CleanupStack::PopAndDestroy(srvAuthFail); sl@0: sl@0: TServerAuthenticationFailureDialogResult output; sl@0: output = EStop; sl@0: if( (aSpec.Response1()).CompareF(KYes) == KErrNone ) sl@0: { sl@0: output = EContinue; sl@0: } sl@0: TServerAuthenticationFailureOutputBuf outputPckg(output); sl@0: aMessage.WriteL(aReplySlot, outputPckg); sl@0: } sl@0: sl@0: void CTestSecDlgNotifier::DoSecureConnectionL(const CInputSpec& aSpec, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage ) sl@0: { sl@0: // If the client does not want to continue sl@0: if( (aSpec.Response1()).CompareF(KYes) != KErrNone ) sl@0: { sl@0: User::Leave(KErrCancel); sl@0: } sl@0: else sl@0: { sl@0: const TSignInput* secureConnectionInput = sl@0: reinterpret_cast( aBuffer.Ptr() ); sl@0: // if the client certificate is requested sl@0: if (secureConnectionInput->iDoClientAuthentication) sl@0: { sl@0: TLex lexi(aSpec.Response2()); sl@0: TInt32 selectionId=0; sl@0: TInt err=lexi.Val(selectionId); sl@0: sl@0: TInt certHandleTotal = secureConnectionInput->iCertHandleArrayTotal; sl@0: if (selectionId>certHandleTotal) sl@0: { sl@0: User::Leave(KErrNotFound); sl@0: } sl@0: sl@0: // Get index at start of list of TCTTokenObjectHandle objects sl@0: TInt bufferIndex = sizeof( TSignInput ); sl@0: TInt certHandleSize = sizeof( TCTTokenObjectHandle ); sl@0: TPckgBuf certHandleBuf; sl@0: TPtrC8 certHandleData( aBuffer.Mid( bufferIndex+(selectionId-1)*certHandleSize, certHandleSize ) ); sl@0: certHandleBuf.Copy( certHandleData ); sl@0: aMessage.WriteL( aReplySlot, certHandleBuf ); sl@0: } sl@0: } sl@0: } sl@0: sl@0: sl@0: TPtrC8 CTestSecDlgNotifier::StartL( const TDesC8& /*aBuffer*/ ) sl@0: { sl@0: User::Panic(_L("CTestSecDlgNotifier"), 0); sl@0: return TPtrC8(KNullDesC8); sl@0: } sl@0: sl@0: sl@0: void CTestSecDlgNotifier::Cancel() sl@0: { sl@0: // Don't think there is much we can do here. If a client deletes the sl@0: // client-side security dialog instance, after calling a method that sl@0: // displays a dialog, this will not get called until the user dismisses sl@0: // the dialog. We can't do anything then. sl@0: } sl@0: sl@0: sl@0: TPtrC8 CTestSecDlgNotifier::UpdateL( const TDesC8& /*aBuffer*/ ) sl@0: { sl@0: User::Panic(_L("CTestSecDlgNotifier"), 0); sl@0: return NULL; sl@0: }