cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Ckeystoreconduit.cpp
branchRCL_3
changeset 53 030c4fbc13d7
parent 8 35751d3474b7
child 95 641f389e9157
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Ckeystoreconduit.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Ckeystoreconduit.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -29,11 +29,6 @@
 #include "cfskeystoreserver.h"
 #include <mctkeystoreuids.h>
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <authserver/identity.h>
-#include <e32debug.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 
 // CKeyStoreConduit ////////////////////////////////////////////////////////////
 
@@ -178,25 +173,7 @@
    	case ECancelDH:
 		CancelDH(aMessage, aSession);
 		break;	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
-	case ECreateUserKey:
-		CreateUserKeyL(aMessage);
-		break;
-	
-	case EImportUserKey:
-	case EImportEncryptedUserKey:
-		ImportUserKeyL(aMessage);
-		break;
-		
-	case ESetAuthenticationPolicy:
-		SetAuthenticationPolicyL(aMessage);
-		break;
-	
-	case EGetAuthenticationPolicy:
-		GetAuthenticationPolicyL(aMessage);
-		break;
-#else
 	case EChangePassphrase:
 		ChangePassphrase(aMessage);
 		break;
@@ -224,14 +201,7 @@
 	case ERelock:
 		Relock(aMessage);
 		break;	
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
-#ifdef SYMBIAN_AUTH_SERVER
-	case EUseNewKeyServer:
-			IsKeyServerNewL(aMessage);
-			break;
-#endif // SYMBIAN_AUTH_SERVER
-			
 	default:	//	Should not reach here
 		PanicClient(aMessage,EPanicIllegalFunction);
 		break;
@@ -342,151 +312,6 @@
 	iServer.CreateKey(*iKeyInfo, iStatus);
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
-void CKeyStoreConduit::IsKeyServerNewL(const RMessage2& aMessage)
-	{
-	TBool newKeyServer = EFalse;
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	newKeyServer = ETrue;
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-	TPckg<TBool> idNewKeyServer(newKeyServer);
-	aMessage.WriteL(1,idNewKeyServer);
-	aMessage.Complete(KErrNone);
-	}
-#endif // SYMBIAN_AUTH_SERVER
-
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-void CKeyStoreConduit::CreateUserKeyL(const RMessage2& aMessage)
-	{
-	ASSERT(!iKeyInfo);
-		
-	//	p[0] has the length of the buffer. Check our buffer is big
-	//	enough, to cope with requests for keys with very long labels.
-
-	TInt bufLength = User::LeaveIfError(aMessage.GetDesLength(1));
-	iServer.CheckRangeL(bufLength);
-	
-	TInt authExprLength = User::LeaveIfError(aMessage.GetDesLength(2));
-	iServer.CheckRangeL(authExprLength);
-	HBufC* authExprBuf = HBufC::NewMaxLC(authExprLength);
-
-	//	p[2] has the authentication expression
-	TPtr authExprPtr(authExprBuf->Des());
-	authExprPtr.FillZ();
-	
-	aMessage.ReadL(2, authExprPtr);
-	
-	TInt freshness = aMessage.Int3();
-	
-	// the iKeyInfo buffer should be read at the last as in 
-	// case of OOM this memory would not get freed.
-	HBufC8* keyInfoBuf = HBufC8::NewMaxLC(bufLength);
-
-	//	p[1] has the CKeyInfo structure required to create a key
-	//	Read it and convert from descriptor back to a CKeyInfo
-	TPtr8 thePtr(keyInfoBuf->Des());
-	thePtr.FillZ();
-
-	aMessage.ReadL(1, thePtr);
-	TokenDataMarshaller::ReadL(*keyInfoBuf, iKeyInfo);
-	CleanupStack::PopAndDestroy(keyInfoBuf);
-			
-	iCurrentRequest.Set(ECreateUserKey, aMessage);
-	
-	SetActive();
-	iServer.CreateUserKey(*iKeyInfo, *authExprBuf, freshness, iStatus);
-	CleanupStack::PopAndDestroy(authExprBuf);
-	}
-
-void CKeyStoreConduit::ImportUserKeyL(const RMessage2& aMessage)
-	{
-	ASSERT(!iImportKey);
-	ASSERT(!iKeyInfo);
-	
-	// p[0] has the descriptor containing the PKCS8 object (may or may not be encrypted)
-	TInt keyLen = User::LeaveIfError(aMessage.GetDesLength(0));
-	iServer.CheckRangeL(keyLen);
-	
-	HBufC8* importBuf = HBufC8::NewMaxLC(keyLen);
-	TPtr8 theKeyData(importBuf->Des());
-	theKeyData.FillZ();
-	aMessage.ReadL(0, theKeyData);
-
-		
-	TInt bufLen = User::LeaveIfError(aMessage.GetDesLength(1));
-	iServer.CheckRangeL(bufLen);
-	
-	// retrieve the authentication expression
-	TInt authExprLength = User::LeaveIfError(aMessage.GetDesLength(2));
-	iServer.CheckRangeL(authExprLength);
-	HBufC* authExprBuf = HBufC::NewMaxLC(authExprLength);
-
-	//	p[2] has the authentication expression
-	TPtr authExprPtr(authExprBuf->Des());
-	authExprPtr.FillZ();
-	
-	aMessage.ReadL(2, authExprPtr);
-	
-	// retrieve the freshness value
-	TInt freshness = aMessage.Int3();
-	
-	HBufC8* keyInfoBuf = HBufC8::NewMaxLC(bufLen);
-
-	// p[1] has the CKeyInfo structure required to create a key
-	// Read it and convert from descriptor back to a CKeyInfo
-	TPtr8 thePtr(keyInfoBuf->Des());
-	thePtr.FillZ();
-	aMessage.ReadL(1, thePtr);
-
-	TokenDataMarshaller::ReadL(*keyInfoBuf, iKeyInfo);
-	CleanupStack::PopAndDestroy(keyInfoBuf);
-
-	iImportKey = importBuf;
-	iCurrentRequest.Set(static_cast<TFSTokenMessages>(aMessage.Function()), aMessage);
-	
-	TBool isEncrypted = (aMessage.Function() == EImportEncryptedUserKey);
-	SetActive();
-	iServer.ImportUserKey(*iImportKey, *iKeyInfo, isEncrypted, *authExprBuf, freshness, iStatus);
-	CleanupStack::PopAndDestroy(authExprBuf);
-	CleanupStack::Pop(importBuf);
-}
-
-void CKeyStoreConduit::SetAuthenticationPolicyL(const RMessage2& aMessage)
-	{
-	TInt objectId = aMessage.Int0();
-	
-	TInt authExprLen = User::LeaveIfError(aMessage.GetDesLength(1));
-	iServer.CheckRangeL(authExprLen);
-	HBufC* authExpr = HBufC::NewMaxLC(authExprLen);
-	TPtr authExprPtr(authExpr->Des());
-	authExprPtr.FillZ();
-	aMessage.ReadL(1, authExprPtr);
-
-	TInt freshness = aMessage.Int2();
-	iCurrentRequest.Set(ESetAuthenticationPolicy, aMessage);
-		
-	SetActive();
-	// ownership of authExpr is with the caller
-	iServer.SetAuthenticationPolicy(objectId, authExpr, freshness, iStatus);
-	CleanupStack::Pop(authExpr);
-	}
-
-void CKeyStoreConduit::GetAuthenticationPolicyL(const RMessage2& aMessage)
-	{
-	TInt objectId = aMessage.Int0();
-	HBufC* authExpression = iServer.AuthExpressionL(objectId);
-	CleanupStack::PushL(authExpression);
-	TInt freshness = iServer.FreshnessL(objectId);
-	TPckg<TInt> pckgFreshness(freshness); 
-	aMessage.WriteL(1, *authExpression);
-	aMessage.WriteL(2, pckgFreshness);
-	CleanupStack::PopAndDestroy(authExpression);
-	aMessage.Complete(KErrNone);
-	}
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 void CKeyStoreConduit::CancelCreateKey(const RMessage2& aMessage)
 	{
@@ -910,8 +735,6 @@
 	aMessage.Complete(KErrNone);
 	}
 
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 void CKeyStoreConduit::ChangePassphrase(const RMessage2& aMessage)
 	{
 	iCurrentRequest.Set(EChangePassphrase, aMessage);
@@ -983,8 +806,6 @@
 	aMessage.Complete(KErrNone);
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 //
 //	CActive functions
 //
@@ -1020,14 +841,6 @@
 			iServer.CancelExportEncryptedKey();
 			break;
 			
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		case ECreateUserKey:
-			iServer.CancelCreateKey();
-			break;
-		case EImportUserKey:
-		case EImportEncryptedUserKey:
-			iServer.CancelImportKey();
-#else
 		case EChangePassphrase:
 			iServer.CancelChangePassphrase();
 			break;
@@ -1035,9 +848,6 @@
 		case EAuthOpen:
 			iServer.CancelAuthOpen();
 			break;
-
-			
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			
 		default:
 			// Nothing to do
@@ -1060,13 +870,6 @@
 
 	switch (iCurrentRequest.OutstandingRequest())
 		{
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		case ESetAuthenticationPolicy:
-			break;
-		case ECreateUserKey:
-		case EImportUserKey:
-		case EImportEncryptedUserKey:
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER	
 		case ECreateKey:
 		case EImportKey:
 		case EImportEncryptedKey:
@@ -1144,13 +947,10 @@
 		case EDHAgree:
 			FinishDHAgreeL();
 			break;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 		case EChangePassphrase:
 		case EAuthOpen:
 			// Nothing to do
-			break;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			
+			break;	
 		default:
 			__ASSERT_DEBUG(EFalse, PanicServer(EPanicInvalidRequest));
 			User::Leave(KErrNotSupported);