javacommons/security/javaunicertstoreplugin/src.s60/javacertstoreimpl.cpp
author Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Fri, 14 May 2010 15:47:24 +0300
changeset 23 98ccebc37403
parent 21 2a9601315dfc
child 35 85266cc22c7f
child 60 6c158198356e
permissions -rw-r--r--
Revision: v2.1.24 Kit: 201019

/*
* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of "Eclipse Public License v1.0"
* which accompanies this distribution, and is available
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
*
* Initial Contributors:
* Nokia Corporation - initial contribution.
*
* Contributors:
*
* Description:
*
*/

#include <e32std.h>
#include <memory>

#include <javausermessages.rsg>

#include <avkon.rsg>
#include <AknGlobalConfirmationQuery.h>
#include <stringresourcereader.h>
#include <StringLoader.h>
#include <data_caging_path_literals.hrh>

#ifndef SYMBIAN_ENABLE_SPLIT_HEADERS
#include <securitydefs.h>
#else
#include <securitydefs.h>
#include <securitydefsconst.h>
#endif

#include "javacertstoreimpl.h"
#include "javacertstoretoken.h"
#include "logger.h"
#include "javasymbianoslayer.h"
#include "comms.h"
#include "javacertstoretoken.h"
#include "javacommonutils.h"
#include "s60commonutils.h"
#include "securitycommsmessagedefs.h"



//_LIT(KMIDP2TrustRoot, "J2ME MIDP2 Trust Root");
_LIT(KMIDP2TrustRoot, "Java Trust Root");
_LIT(KJavaUserMessagesResourceFileName, "javausermessages.rsc");
//_LIT( KRuntimeSecPolicyResourceFileName, "z:midp2runtimesecuritypolicy.rsc" );

//const TUid KCertManUIViewTrustJavaInstallingId = { 0x101F9B28 };
//const TUid KCertManUIViewTrustJavaInstallingId = { KMidletInstallApplicabilityUi };

using namespace java::security;
using namespace java::comms;

/**
 *
 */
CJavaCertStoreImpl::CJavaCertStoreImpl(CJavaCertStoreToken& aToken)
        : CActive(EPriorityNormal),mToken(aToken),mClientStatus(NULL),mState(EInitial),mQuery(0),mTempCertData(0)
{
}

/**
 *
 */
CJavaCertStoreImpl::~CJavaCertStoreImpl()
{

    if (IsActive())
    {
        Cancel();
    }

    mComms.unregisterListener(PLUGIN_ID_JAVA_CERT_STORE_ECOM_C,this);
    mComms.unregisterDefaultListener(this);
    mComms.disconnect();
    mCertsData.ResetAndDestroy();
    mUiThread.Close();
}

/**
 *
 */
CJavaCertStoreImpl* CJavaCertStoreImpl::NewL(CJavaCertStoreToken& aToken)
{
    CJavaCertStoreImpl* impl = new(ELeave) CJavaCertStoreImpl(aToken);
    CleanupStack::PushL(impl);
    impl->ConstructL();
    CleanupStack::Pop(impl);
    return impl;
}

/**
 *
 */
void CJavaCertStoreImpl::ConstructL()
{

    CActiveScheduler::Add(this);

    int err = mComms.registerDefaultListener(this);
    if (0 != err)
    {
        std::string errTxt("Registering comms listener failed: ");
        errTxt.append(java::util::JavaCommonUtils::intToString(err));
        ELOG1(EJavaSecurity, "ERROR!!! %s",errTxt.c_str());
        User::Leave(KErrCouldNotConnect);
    }
    err = mComms.connect(IPC_ADDRESS_JAVA_CAPTAIN_C);
    if (0 != err)
    {
        std::string errTxt("Comms connection failed: ");
        errTxt.append(java::util::JavaCommonUtils::intToString(err));
        ELOG1(EJavaSecurity, "ERROR!!! %s",errTxt.c_str());
        User::Leave(KErrCouldNotConnect);
    }
    err = mUiThread.Open(RThread().Id());
    if (KErrNone != err)
    {
        std::string errTxt("Initialization of thread failed: ");
        errTxt.append(java::util::JavaCommonUtils::intToString(err));
        ELOG1(EJavaSecurity, "ERROR!!! %s",errTxt.c_str());
        User::Leave(err);
    }
}

/**
 *
 */
MCTToken& CJavaCertStoreImpl::Token()
{
    return mToken;
}

/**
 *
 */
void CJavaCertStoreImpl::processMessage(java::comms::CommsMessage& aMessage)
{
    //Request has been cancelled if it is not active anymore.
    if (!IsActive())
        return;
    mReceivedCommsMsg = aMessage;
    //ActiveScheduler calls RunL() operation after request has been completed.
    TRequestStatus* stat = &iStatus;
    mUiThread.RequestComplete(stat,KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::RunL()
{
    TInt status = iStatus.Int();

    switch (mState)
    {
    case EListing:
        mState = EInitial;
        //In current implementation status cannot be any than KErrNone
        //in this state.
        if (KErrNone == status)
        {
            FillCertificateInfos(*mClientList);
        }
        break;

    case EPreDisabling:
        SendDisableMsg(status);
        return;

    case EPreDeleting:
        SendDeleteMsg(status);
        return;
        
    default:
        //Do nothing.
        break;
    }

    User::RequestComplete(mClientStatus,status);
}

/**
 *
 */
void CJavaCertStoreImpl::DoCancel()
{
    if (IsActive() && mClientStatus)
    {
        User::RequestComplete(mClientStatus,KErrCancel);
    }
}

/**
 *
 */
TInt CJavaCertStoreImpl::RunError(TInt /*aError*/)
{
    return KErrNone;
}

/**
 *
 */
void CJavaCertStoreImpl::Add(const TDesC& /*aLabel*/, TCertificateFormat,
                             TCertificateOwnerType,
                             const TKeyIdentifier* /*aSubjectKeyId*/,
                             const TKeyIdentifier* /*aIssuerKeyId*/,
                             const TDesC8& /*aCert*/, TRequestStatus& aStatus)
{
    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;
    User::RequestComplete(pRequestStatus,KErrNotSupported);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelAdd()
{
}

/**
 *
 */
void CJavaCertStoreImpl::Remove(const CCTCertInfo& aCertInfo,TRequestStatus& aStatus)
{
    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    TBool flag = CheckCapability(ECapabilityWriteDeviceData,pRequestStatus);
    if (!flag)
    {
        return;
    }

    CJavaCertData* certData = 0;
    flag = GetCertDataObj(aCertInfo,pRequestStatus,certData);
    if (!flag)
    {
        return;
    }

    if (!certData->mCanDelete)
    {
        User::RequestComplete(pRequestStatus,KErrArgument);
        return;
    }
    
    mState = EPreDeleting;
    mTempCertData = certData;
    HandleDeleteDisableQuery(aStatus, false /* disableCertQuery */);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelRemove()
{
}

/**
 *
 */
void CJavaCertStoreImpl::SetApplicability(const CCTCertInfo& aCertInfo,
        const RArray<TUid>& aApplications,
        TRequestStatus &aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    TBool flag = CheckCapability(ECapabilityWriteDeviceData,pRequestStatus);
    if (!flag)
    {
        return;
    }

    TState state = EPreDisabling;
    for (TInt i = 0; i < aApplications.Count(); i++)
    {
        if (KMidletInstallApplicabilityUid == aApplications[i])
        {
            state = EPreEnabling;
            break;
        }
    }

    CJavaCertData* certData = 0;
    //GetCertDataObj() operation checks whether cert is deleted.
    flag = GetCertDataObj(aCertInfo,pRequestStatus,certData);
    if (!flag)
    {
        return;
    }

    if ((EPreDisabling == state) && (!certData->mCanDisable))
    {
        User::RequestComplete(pRequestStatus,KErrArgument);
        return;
    }

    if (EPreDisabling == state)
    {
//RD_JAVA_S60_RELEASE_5_0_IAD flag is needed because otherwise "disable cert" confirmation
//prompt is shown twice. First time by unicertstore plugin of legacy java and second
//time by unicertstore plugin of OMJ.
#ifdef RD_JAVA_S60_RELEASE_5_0_IAD
        HandleSendingEnableDisableMsg(pRequestStatus,EPreDisabling,*certData);
#else
        mState = state;
        mTempCertData = certData;
        HandleDeleteDisableQuery(aStatus, true /* disableCertQuery */);
#endif
        return;
    }
    HandleSendingEnableDisableMsg(pRequestStatus,EPreEnabling,*certData);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelSetApplicability()
{
}

/**
 *
 */
void CJavaCertStoreImpl::SetTrust(const CCTCertInfo& aCertInfo, TBool aTrusted,
                                  TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    TBool flag = CheckCapability(ECapabilityWriteDeviceData,pRequestStatus);
    if (!flag)
    {
        return;
    }

    CJavaCertData* certData = 0;
    flag = GetCertDataObj(aCertInfo,pRequestStatus,certData);
    if (!flag)
    {
        return;
    }

    if (!aTrusted)
    {
        User::RequestComplete(pRequestStatus,KErrArgument);
        return;
    }

    User::RequestComplete(pRequestStatus,KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelSetTrust()
{
}

/**
 *
 */
void CJavaCertStoreImpl::List(RMPointerArray<CCTCertInfo>& aCerts,
                              const CCertAttributeFilter& aFilter,
                              TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    if (IsActive())
    {
        User::RequestComplete(pRequestStatus,KErrInUse);
        return;
    }

    TBool validRequest = validateCertAttrFilter(aFilter);
    if (!validRequest)
    {
        ELOG(EJavaSecurity,"No certificates matching the filter supplied");
        User::RequestComplete(pRequestStatus,KErrNone);
        return;
    }

    if (0 < mCertsData.Count())
    {
        TRAPD(err,FillCertInfoFromCacheL(aCerts));
        User::RequestComplete(pRequestStatus,err);
        return;
    }

    mClientStatus = &aStatus;

    mClientList = &aCerts;
    iStatus = KRequestPending;
    SetActive();

    CommsMessage commsMsg;
    commsMsg.setReceiver(IPC_ADDRESS_JAVA_CAPTAIN_C);
    commsMsg.setSender(IPC_ADDRESS_JAVA_CAPTAIN_C);
    commsMsg.setModuleId(PLUGIN_ID_JAVA_CERT_STORE_EXTENSION_C);
    commsMsg.setMessageId(JAVA_CERT_STORE_MSG_ID_REQUEST);
    commsMsg << JAVA_CERT_STORE_OPERATION_QUERY_CERTS;
    commsMsg << JAVA_CERT_STORE_QUERY_ID_FULL_DETAILS;
    commsMsg << JAVA_CERT_STORE_FILTER_ID_STATE
    << (JAVA_CERT_STORE_STATE_ENABLED | JAVA_CERT_STORE_STATE_DISABLED);
    int err = mComms.send(commsMsg);
    if (0 != err)
    {
        std::string errTxt("Sending a comms request failed: ");
        errTxt.append(java::util::JavaCommonUtils::intToString(err));
        ELOG1(EJavaSecurity, "ERROR!!! %s",errTxt.c_str());
        User::RequestComplete(mClientStatus, KErrCommsBreak);
    }
    mState = EListing;
}

/**
 *
 */
void CJavaCertStoreImpl::CancelList()
{
    if (IsActive())
    {
        Cancel();
    }
}

/**
 *
 */
void CJavaCertStoreImpl::GetCert(CCTCertInfo*& aCertInfo,
                                 const TCTTokenObjectHandle& aHandle,
                                 TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    TInt index = GetIndexToCertData(aHandle);
    if (-1 == index)
    {
        User::RequestComplete(pRequestStatus,KErrArgument);
        return;
    }

    CJavaCertData* certData = mCertsData[index];
    TRAPD(err,
          aCertInfo = CCTCertInfo::NewL(KMIDP2TrustRoot,EX509Certificate,
                                        ECACertificate,certData->mSizeOfCert,
                                        NULL,NULL,Token(),index,certData->mCanDelete);
         ); // TRAPD

    User::RequestComplete(pRequestStatus,err);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelGetCert()
{
}

/**
 *
 */
void CJavaCertStoreImpl::Applications(const CCTCertInfo& aCertInfo,RArray<TUid>& aApplications,
                                      TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    //GetIndexToCertData() operation checks deleted case.
    CJavaCertData* certData = 0;
    TBool flag = GetCertDataObj(aCertInfo,pRequestStatus,certData);
    if (!flag)
    {
        return;
    }

    if (!certData->mIsDisabled)
    {
        aApplications.Append(KMidletInstallApplicabilityUid);
    }

    User::RequestComplete(pRequestStatus,KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelApplications()
{
}

/**
 *
 */
void CJavaCertStoreImpl::IsApplicable(const CCTCertInfo& aCertInfo,TUid aApplication,
                                      TBool& aIsApplicable,TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    if (KMidletInstallApplicabilityUid != aApplication)
    {
        aIsApplicable = EFalse;
        User::RequestComplete(pRequestStatus,KErrNone);
        return;
    }

    TCTTokenObjectHandle handle = aCertInfo.Handle();
    TInt certDataIndex = -1;
    if ((handle.iObjectId >= 0) && (handle.iObjectId < mCertsData.Count()))
    {
        if (mCertsData[handle.iObjectId]->mDeleted)
        {
            aIsApplicable = EFalse;
            User::RequestComplete(pRequestStatus,KErrNone);
            return;
        }
        certDataIndex = handle.iObjectId;
    }
    if (-1 == certDataIndex)
    {
        User::RequestComplete(pRequestStatus,KErrArgument);
        return;
    }
    CJavaCertData* certData = mCertsData[certDataIndex];

    aIsApplicable = ETrue;
    if (certData->mIsDisabled)
    {
        aIsApplicable = EFalse;
    }
    User::RequestComplete(pRequestStatus,KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelIsApplicable()
{
}

/**
 *
 */
void CJavaCertStoreImpl::Trusted(const CCTCertInfo& aCertInfo,
                                 TBool& aTrusted,TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    CJavaCertData* certData = 0;
    //GetCertDataObj() operation returns error if cert has been deleted.
    TBool flag = GetCertDataObj(aCertInfo,pRequestStatus,certData);
    if (!flag)
    {
        return;
    }

    //Java certificates can be always trusted because this operation is never called
    //for java certificate.
    aTrusted = ETrue;
    User::RequestComplete(pRequestStatus,KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelTrusted()
{
}

/**
 *
 */
void CJavaCertStoreImpl::Retrieve(const CCTCertInfo& aCertInfo,
                                  TDes8& aEncodedCert,TRequestStatus& aStatus)
{

    aStatus = KRequestPending;
    TRequestStatus* pRequestStatus = &aStatus;

    TBool flag = CheckCapability(ECapabilityReadUserData,pRequestStatus);
    if (!flag)
    {
        return;
    }

    if (IsActive())
    {
        User::RequestComplete(pRequestStatus,KErrInUse);
        return;
    }

    //mClientStatus = pRequestStatus;

    CJavaCertData* certData = 0;
    flag = GetCertDataObj(aCertInfo,pRequestStatus,certData);
    if (!flag)
    {
        return;
    }

    // copy certData->mCertContent into aEncodedCert
    //aEncodedCert = (const TUint8*)certData->mCertContent.c_str();
    TPtr8 ptr8((TUint8 *)(certData->mCertContent.c_str()), certData->mSizeOfCert);
    ptr8.SetLength(certData->mSizeOfCert);
    aEncodedCert.Copy(ptr8);

    User::RequestComplete(pRequestStatus, KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::CancelRetrieve()
{
    if (IsActive())
    {
        Cancel();
    }
}

/**
 *
 */
TBool CJavaCertStoreImpl::validateCertAttrFilter(const CCertAttributeFilter& aFilter) const
{

    //0x101F9B28 - Midlet suite signing certificates
    //UID  taken from from security subsystem
    //(Applications for certificates from this cert store)
    TBool validRequest = ETrue;
    if (aFilter.iUidIsSet && aFilter.iUid.iUid != KMidletInstallApplicabilityUid.iUid)
    {
        validRequest = EFalse;
    }
    if (aFilter.iFormatIsSet && validRequest)
    {
        validRequest = (aFilter.iFormat == EX509Certificate);
    }
    if (aFilter.iOwnerTypeIsSet && validRequest)
    {
        validRequest = (aFilter.iOwnerType == ECACertificate);
    }
    if (aFilter.iSubjectKeyIdIsSet && validRequest)
    {
        validRequest = EFalse;//We do not have a subject key id
    }
    if (aFilter.iIssuerKeyIdIsSet && validRequest)
    {
        validRequest = EFalse;//We do not have a issuer key id
    }
    if (aFilter.iLabelIsSet && validRequest)
    {
        validRequest = (aFilter.iLabel == KMIDP2TrustRoot);
    }
    return validRequest;
}

/**
 *
 */
void CJavaCertStoreImpl::FillCertificateInfos(RMPointerArray<CCTCertInfo>& aInfoArray)
{

    std::vector<std::string> paths(10);
    long long certSize;
    TInt i = 0;
    CCTCertInfo* tmpCertInfo = 0;

    //Comms message contains the content's length, the content, the hash and the state
    while ((mReceivedCommsMsg >> certSize && certSize != 0))
    {
        std::string certContent;
        std::string idStr;
        int encodedState = -1;
        mReceivedCommsMsg >> certContent;
        mReceivedCommsMsg >> idStr;
        mReceivedCommsMsg >> encodedState;
        if (0 == idStr.size())
            continue;
        if (-1 == encodedState)
            continue;

        std::auto_ptr<CJavaCertData> certData
        (new CJavaCertData(certContent,certSize,idStr,encodedState));
        TEntry entry;
        int err;
        TRAP(err,tmpCertInfo = CCTCertInfo::NewL(KMIDP2TrustRoot,EX509Certificate,
                               ECACertificate,certSize,
                               NULL,NULL,Token(),i,
                               certData->mCanDelete));
        if (KErrNone != err)
            continue;
        err = mCertsData.Insert(certData.release(),i);
        if (KErrNone != err)
        {
            tmpCertInfo->Release();
            continue;
        }
        err = aInfoArray.Append(tmpCertInfo);
        if (KErrNone != err)
        {
            tmpCertInfo->Release();
            delete mCertsData[i];
            mCertsData.Remove(i);
            continue;
        }
        i++;
    }//end while
}

/**
 *
 */
void CJavaCertStoreImpl::FillCertInfoFromCacheL(RMPointerArray<CCTCertInfo>& aInfoArray)
{

    CJavaCertData* certData = NULL;
    for (TInt i = 0; i < mCertsData.Count(); ++i)
    {
        certData = mCertsData[i];
        if (certData->mDeleted)
            continue;

        CCTCertInfo* certInfo = CCTCertInfo::NewL(KMIDP2TrustRoot,EX509Certificate,
                                ECACertificate,certData->mSizeOfCert,
                                NULL,NULL,Token(),i,certData->mCanDelete);
        TInt err = aInfoArray.Append(certInfo);
        User::LeaveIfError(err);
    }//end for
}

/**
 *
 */
TInt CJavaCertStoreImpl::GetIndexToCertData(const TCTTokenObjectHandle& aHandle)
{

    if ((aHandle.iObjectId >= 0) && (aHandle.iObjectId < mCertsData.Count()))
    {
        if (mCertsData[aHandle.iObjectId]->mDeleted)
            return -1;
        return aHandle.iObjectId;
    }
    return -1;
}

/**
 *
 */
TBool CJavaCertStoreImpl::GetCertDataObj(const CCTCertInfo& aCertInfo,
        TRequestStatus* aRequestStatus,
        CJavaCertData*& aOutCertDataObj)
{

    TCTTokenObjectHandle handle = aCertInfo.Handle();
    TInt certDataIndex = GetIndexToCertData(handle);
    if (-1 == certDataIndex)
    {
        User::RequestComplete(aRequestStatus,KErrArgument);
        return EFalse;
    }

    aOutCertDataObj = mCertsData[certDataIndex];
    return ETrue;
}

/**
 *
 */
TBool CJavaCertStoreImpl::SendDisableEnableCommsMsg(const std::string& aId,
        TState aState,
        TRequestStatus* aRequestStatus)
{

    CommsMessage commsMsg;
    commsMsg.setReceiver(IPC_ADDRESS_JAVA_CAPTAIN_C);
    commsMsg.setSender(IPC_ADDRESS_JAVA_CAPTAIN_C);
    commsMsg.setModuleId(PLUGIN_ID_JAVA_CERT_STORE_EXTENSION_C);
    commsMsg.setMessageId(JAVA_CERT_STORE_MSG_ID_REQUEST);
    if (EPreEnabling == aState)
        commsMsg << JAVA_CERT_STORE_OPERATION_ENABLE_CERT;
    else
        commsMsg << JAVA_CERT_STORE_OPERATION_DISABLE_CERT;
    commsMsg << aId;
    int err = mComms.send(commsMsg);
    if (0 != err)
    {
        std::string errTxt("Sending a comms request failed: ");
        errTxt.append(java::util::JavaCommonUtils::intToString(err));
        ELOG1(EJavaSecurity, "ERROR!!! %s",errTxt.c_str());
        User::RequestComplete(aRequestStatus,KErrCommsBreak);
        return EFalse;
    }
    return ETrue;
}

/**
 *
 */
TBool CJavaCertStoreImpl::SendDeleteCommsMsg(const std::string& aId,
        TRequestStatus* aRequestStatus)
{
    CommsMessage commsMsg;
    commsMsg.setReceiver(IPC_ADDRESS_JAVA_CAPTAIN_C);
    commsMsg.setSender(IPC_ADDRESS_JAVA_CAPTAIN_C);
    commsMsg.setModuleId(PLUGIN_ID_JAVA_CERT_STORE_EXTENSION_C);
    commsMsg.setMessageId(JAVA_CERT_STORE_MSG_ID_REQUEST);
    commsMsg << JAVA_CERT_STORE_OPERATION_DELETE_CERT;
    commsMsg << aId;
    int err = mComms.send(commsMsg);
    if (0 != err)
    {
        std::string errTxt("Sending a comms request failed: ");
        errTxt.append(java::util::JavaCommonUtils::intToString(err));
        ELOG1(EJavaSecurity, "ERROR!!! %s",errTxt.c_str());
        User::RequestComplete(aRequestStatus,KErrCommsBreak);
        return EFalse;
    }
    
    return ETrue;
}

/**
 *
 */
TBool CJavaCertStoreImpl::CheckCapability(const TCapability& aCapability,TRequestStatus* aRequestStatus)
{
    RThread thread;
    if (!thread.HasCapability(aCapability,0))
    {
        ELOG(EJavaSecurity, "ERROR!!! List(): Not enough capabilities to call this operation");
        User::RequestComplete(aRequestStatus,KErrPermissionDenied);
        return EFalse;
    }
    return ETrue;
}

/**
 *
 */
void CJavaCertStoreImpl::HandleDeleteDisableQuery(TRequestStatus &aRequestStatus, bool disableCertQuery)
{
    TInt leaveStatus = KErrNone;
    if (disableCertQuery)
    {
#ifndef RD_JAVA_S60_RELEASE_5_0_IAD
    TRAP(leaveStatus,ShowQueryL(R_JAVA_SECUR_CERT_DISABLING));
#endif
    }
    else
    {
    TRAP(leaveStatus,ShowQueryL(R_JAVA_SECUR_CERT_DELETING));
    }
    if (KErrNone == leaveStatus)
    {
        mClientStatus = &aRequestStatus;
        SetActive();
        return;
    }
    delete mQuery.release();
    mState = EInitial;
    TRequestStatus* pRequestStatus = &aRequestStatus;
    User::RequestComplete(pRequestStatus,KErrCancel);
}

/**
 *
 */
void CJavaCertStoreImpl::ShowQueryL(TInt resourceId)
{
    TFileName resourceFileName = java::util::S60CommonUtils::ResourceLanguageFileNameL(
                                     KJavaUserMessagesResourceFileName);

    std::auto_ptr<CStringResourceReader> reader(CStringResourceReader::NewL(resourceFileName));
    std::auto_ptr<HBufC> queryPrompt(reader->ReadResourceString(resourceId).AllocL());

    mQuery.reset(CAknGlobalConfirmationQuery::NewL());
    mQuery->ShowConfirmationQueryL(iStatus,queryPrompt->Des(),R_AVKON_SOFTKEYS_OK_CANCEL);
}

/**
 *
 */
void CJavaCertStoreImpl::SendDisableMsg(TInt aStatus)
{

    mState = EInitial;
    delete mQuery.release();
    mState = EInitial;
    if (EAknSoftkeyOk != aStatus)
    {
        User::RequestComplete(mClientStatus,KErrCancel);
        return;
    }
    HandleSendingEnableDisableMsg(mClientStatus,EPreDisabling,*mTempCertData);
}

/**
 *
 */
void CJavaCertStoreImpl::SendDeleteMsg(TInt aStatus)
{

    mState = EInitial;
    delete mQuery.release();
    mState = EInitial;
    if (EAknSoftkeyOk != aStatus)
    {
        User::RequestComplete(mClientStatus,KErrCancel);
        return;
    }
    HandleSendingDeleteMsg(mClientStatus,*mTempCertData);
}

/**
 *
 */
void CJavaCertStoreImpl::HandleSendingEnableDisableMsg(TRequestStatus* aRequestStatus,
        TState aState,CJavaCertData& aCertDataObj)
{

    TBool flag = SendDisableEnableCommsMsg(aCertDataObj.mId,aState,aRequestStatus);
    if (!flag)
    {
        //SendDisableEnableCommsMsg() operation calls RequestComplete()
        //operation in the error situation.
        return;
    }
    if (EPreEnabling == aState)
    {
        aCertDataObj.mIsDisabled = EFalse;
    }
    else if (EPreDisabling == aState)
    {
        aCertDataObj.mIsDisabled = ETrue;
    }

    User::RequestComplete(aRequestStatus,KErrNone);
}

/**
 *
 */
void CJavaCertStoreImpl::HandleSendingDeleteMsg(TRequestStatus* aRequestStatus,
    CJavaCertData& aCertDataObj)
{

    TBool flag = SendDeleteCommsMsg(aCertDataObj.mId,aRequestStatus);
    if (!flag)
    {
        //SendDeleteCommsMsg() operation calls RequestComplete()
        //operation in the error situation.
        return;
    }
    aCertDataObj.mDeleted = ETrue;    

    User::RequestComplete(aRequestStatus,KErrNone);
}

/////////////////////////////////////////////////////////////////////////////////
//
// IMPLEMENTATION OF CJavaCertData CLASS
//
//////////////////////////////////////////////////////////////////////////////////

CJavaCertData::CJavaCertData(const std::string& aCertContent,
                             long long aCertSize,
                             const std::string& aId,TInt aEncodedState)
        : mCertContent(aCertContent),mId(aId),mDeleted(EFalse),mSizeOfCert(aCertSize)
{
    mIsDisabled = ((aEncodedState & 0x1) == 0x1); // trust root is disabled if first bit is set
    mCanDisable = ((aEncodedState & 0x2) == 0x2);   // trust root can be disabled if second bit is set
    mCanDelete = ((aEncodedState & 0x4) == 0x4);    // trust root can be deleted if third bit is set
}

CJavaCertData::~CJavaCertData()
{
}