pkiutilities/untrustedcertificatedialog/src/untrustedcertificatewidget_symbian.cpp
/*
* Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of "Eclipse Public License v1.0"
* which accompanies this distribution, and is available
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
*
* Initial Contributors:
* Nokia Corporation - initial contribution.
*
* Contributors:
*
* Description: Device dialog plugin that shows untrusted certificate
* dialog for TLS server authentication failure errors.
*
*/
#include "untrustedcertificatewidget.h"
#include "untrustedcertificatedefinitions.h"
#include "untrustedcertificateinfobase.h"
#include "untrustedcertificateinfo_symbian.h"
#include <securitydefs.h> // TValidationError
// ======== MEMBER FUNCTIONS ========
// ----------------------------------------------------------------------------
// UntrustedCertificateWidget::isInvalidCertificate()
// ----------------------------------------------------------------------------
//
bool UntrustedCertificateWidget::isCertificateValid()
{
return (mValidationError != ESignatureInvalid && mValidationError != ECertificateRevoked);
}
// ----------------------------------------------------------------------------
// UntrustedCertificateWidget::processEncodedCertificate()
// ----------------------------------------------------------------------------
//
void UntrustedCertificateWidget::processEncodedCertificate(const QByteArray &encodedCert)
{
UntrustedCertificateInfoBase *info = new UntrustedCertificateInfoSymbian(encodedCert);
if (mCertificateInfo) {
delete mCertificateInfo;
mCertificateInfo = 0;
}
mCertificateInfo = info;
}
// ----------------------------------------------------------------------------
// UntrustedCertificateWidget::descriptionText()
// ----------------------------------------------------------------------------
//
QString UntrustedCertificateWidget::descriptionText()
{
QString text;
if (!isCertificateValid()) {
//: Information note text shown if the server certificate has an invalid signature
// TODO: localised UI string
text = tr("'%1' has sent an invalid certificate. Connection cannot be created.");
} else if (mValidationError == EValidatedOK || mValidationError == EDateOutOfRange) {
bool isDateValid = mCertificateInfo->isDateValid();
bool isSiteValid = mCertificateInfo->commonNameMatches(mServerName);
if (!isDateValid && !isSiteValid) {
// TODO: hbTrId("txt_untrustedcert_dialog _accept_site_ood")
text = tr("'%1' has sent a certificate with different site name and which is out of date. Accept anyway?");
} else if (!isSiteValid) {
// TODO: hbTrId("txt_untrustedcert_dialog _accept_site"
text = tr("'%1' has sent a certificate with different site name. Accept anyway?");
} else {
// TODO: hbTrId("txt_untrustedcert_dialog_accept_ood")
text = tr("'%1' has sent a certificate which is out of date. Accept anyway?");
}
} else {
bool isDateValid = mCertificateInfo->isDateValid();
bool isSiteValid = mCertificateInfo->commonNameMatches(mServerName);
if (!isDateValid && !isSiteValid) {
// TODO: hbTrId("txt_untrustedcert_dialog _accept_untrusted_site_ood"
text = tr("'%1' has sent an untrusted certificate with different site name and which is out of date. Accept anyway?");
} else if (!isSiteValid) {
// TODO: hbTrId("txt_untrustedcert_dialog _accept_untrusted_site"
text = tr("'%1' has sent an untrusted certificate with different site name. Accept anyway?");
} else if (!isDateValid) {
// TODO: hbTrId("txt_untrustedcert_dialog _accept_untrusted_ood")
text = tr("'%1' has sent an untrusted certificate which is out of date. Accept anyway?");
} else {
// TODO: hbTrId("txt_untrustedcert_dialog _accept_untrusted"
text = tr("'%1' has sent an untrusted certificate. Accept anyway?");
}
}
return text;
}