--- a/authenticationservices/authenticationserver/test/authtool/authtool.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/authtool/authtool.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -32,7 +32,7 @@
SOURCEPATH .
SOURCE authtool.cpp
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
USERINCLUDE ../../inc/authserver
LIBRARY euser.lib authclient.lib authcommon.lib
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg.mmh Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg.mmh Fri Apr 02 10:15:22 2010 +0100
@@ -46,10 +46,11 @@
USERINCLUDE .
-SYSTEMINCLUDE \epoc32\include\techview
-SYSTEMINCLUDE \epoc32\include\ecom
-SYSTEMINCLUDE \epoc32\include
-SYSTEMINCLUDE \epoc32\include\test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(techview)
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
SOURCEPATH ..\tpinplugindlg
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/tpinplugin.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/reftestplugin/group/tpinplugin.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -33,9 +33,9 @@
CAPABILITY TrustedUI ProtServ ReadDeviceData WriteDeviceData Location SurroundingsDD UserEnvironment
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/authserver
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(authserver)
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
USERINCLUDE .
USERINCLUDE ../../../source/common
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthPlugin.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthPlugin.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -45,12 +45,11 @@
USERINCLUDE ../../../source/client
USERINCLUDE ../../../inc_private
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/ecom
-
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
//Use of Test Execute logging functions
-//SYSTEMINCLUDE /epoc32/include/test
+//OS_LAYER_SYSTEMINCLUDE(test)
//LIBRARY testexecuteutils.lib
//LIBRARY testexecutelogclient.lib
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthSvr.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthSvr.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -23,8 +23,8 @@
CAPABILITY AllFiles ReadUserData WriteUserData ReadDeviceData WriteDeviceData TrustedUI
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
USERINCLUDE ../../../source/server
USERINCLUDE ../../../source/common
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tMiscAuthPlugin.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tMiscAuthPlugin.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -39,8 +39,8 @@
USERINCLUDE ../../../source/common
USERINCLUDE ../../../source/client
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /EPOC32/INCLUDE/ECOM
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
LIBRARY euser.lib
LIBRARY ecom.lib
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthpluginupgrade.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthpluginupgrade.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -45,8 +45,8 @@
USERINCLUDE ../../../source/common
USERINCLUDE ../../../source/client
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/ecom
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
LIBRARY cinidata.lib // add text INI file parsing ability
LIBRARY ecom.lib //ECOM plug-in DLLs must link against ECOM.lib
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrnc.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrnc.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -22,8 +22,8 @@
VENDORID 0x70000001
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
USERINCLUDE ../../../source/server
USERINCLUDE ../../../source/common
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrwdd.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrwdd.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -22,8 +22,8 @@
VENDORID 0x70000001
CAPABILITY AllFiles ReadUserData WriteUserData ReadDeviceData WriteDeviceData
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
USERINCLUDE ../../../source/server
USERINCLUDE ../../../source/common
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tpostmarketramplugin.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tAuthSvr/group/tpostmarketramplugin.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -46,8 +46,8 @@
USERINCLUDE ../../../source/common
USERINCLUDE ../../../source/client
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/ecom
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
LIBRARY cinidata.lib // add text INI file parsing ability
LIBRARY ecom.lib //ECOM plug-in DLLs must link against ECOM.lib
--- a/authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -31,8 +31,8 @@
USERINCLUDE ../../inc_private
USERINCLUDE ../../inc/authserver
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
SOURCEPATH .
USERINCLUDE .
--- a/authenticationservices/authenticationserver/test/tauthdb/tauthdb.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tauthdb/tauthdb.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -41,8 +41,8 @@
USERINCLUDE ../../inc_private
USERINCLUDE ../../inc/authserver
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
LIBRARY bafl.lib edbms.lib estor.lib efsrv.lib euser.lib
LIBRARY testexecuteutils.lib testexecutelogclient.lib
--- a/authenticationservices/authenticationserver/test/tauthkeys/tauthkeys.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tauthkeys/tauthkeys.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -36,8 +36,8 @@
USERINCLUDE ../../inc_private
USERINCLUDE ../../inc/authserver
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
LIBRARY euser.lib
LIBRARY efsrv.lib
--- a/authenticationservices/authenticationserver/test/tauthplugins/tauthplugins.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tauthplugins/tauthplugins.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -21,8 +21,8 @@
UID 0x1000007A 0x10204F0D
VENDORID 0x70000001
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/test
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
USERINCLUDE .
USERINCLUDE ../../source/common
--- a/authenticationservices/authenticationserver/test/tauthplugins/testplugins.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tauthplugins/testplugins.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -23,7 +23,7 @@
CAPABILITY ALL -TCB
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
USERINCLUDE .
USERINCLUDE ../../source/common
--- a/authenticationservices/authenticationserver/test/tauthplugins/testpluginsupgrade.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/authenticationservices/authenticationserver/test/tauthplugins/testpluginsupgrade.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -25,7 +25,7 @@
VERSION 10.1
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
USERINCLUDE .
USERINCLUDE ../../source/common
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/BWINS/staclientu.def Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,13 @@
+EXPORTS
+ ??0RStaClient@StreamAccess@@QAE@XZ @ 1 NONAME ; StreamAccess::RStaClient::RStaClient(void)
+ ?Close@RStaClient@StreamAccess@@QAEXXZ @ 2 NONAME ; void StreamAccess::RStaClient::Close(void)
+ ?Connect@RStaClient@StreamAccess@@QAEHXZ @ 3 NONAME ; int StreamAccess::RStaClient::Connect(void)
+ ?GetAttributeL@RStaClient@StreamAccess@@QAEXABW4TAttribute@2@AAH@Z @ 4 NONAME ; void StreamAccess::RStaClient::GetAttributeL(enum StreamAccess::TAttribute const &, int &)
+ ?GetPostDeliveryRightsL@RStaClient@StreamAccess@@QAEXAAVRFile@@AAVTDes8@@11@Z @ 5 NONAME ; void StreamAccess::RStaClient::GetPostDeliveryRightsL(class RFile &, class TDes8 &, class TDes8 &, class TDes8 &)
+ ?GetStringAttributeLC@RStaClient@StreamAccess@@QAEPAVHBufC16@@ABW4TStringAttribute@2@@Z @ 6 NONAME ; class HBufC16 * StreamAccess::RStaClient::GetStringAttributeLC(enum StreamAccess::TStringAttribute const &)
+ ?SendIpSecAssociationL@RStaClient@StreamAccess@@QBEXJPAVHBufC8@@0@Z @ 7 NONAME ; void StreamAccess::RStaClient::SendIpSecAssociationL(long, class HBufC8 *, class HBufC8 *) const
+ ?SendKeyStreamL@RStaClient@StreamAccess@@QBEXABVTDesC8@@@Z @ 8 NONAME ; void StreamAccess::RStaClient::SendKeyStreamL(class TDesC8 const &) const
+ ?SetKeyStreamSinkL@RStaClient@StreamAccess@@QBEXABVCKeyStreamSink@2@@Z @ 9 NONAME ; void StreamAccess::RStaClient::SetKeyStreamSinkL(class StreamAccess::CKeyStreamSink const &) const
+ ?SetSdpMediaFieldL@RStaClient@StreamAccess@@QBEXABVCSdpMediaField@@@Z @ 10 NONAME ; void StreamAccess::RStaClient::SetSdpMediaFieldL(class CSdpMediaField const &) const
+ ?SetSdpDocumentL@RStaClient@StreamAccess@@QBEXABVCSdpDocument@@@Z @ 11 NONAME ; void StreamAccess::RStaClient::SetSdpDocumentL(class CSdpDocument const &) const
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/BWINS/stasharedu.def Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,32 @@
+EXPORTS
+ ??1CTestKeyAssociation@StreamAccess@@UAE@XZ @ 1 NONAME ; StreamAccess::CTestKeyAssociation::~CTestKeyAssociation(void)
+ ??1CTestKeyStreamSink@StreamAccess@@UAE@XZ @ 2 NONAME ; StreamAccess::CTestKeyStreamSink::~CTestKeyStreamSink(void)
+ ??1CTestProtectedStreamDesc@StreamAccess@@UAE@XZ @ 3 NONAME ; StreamAccess::CTestProtectedStreamDesc::~CTestProtectedStreamDesc(void)
+ ?CloneLC@CTestKeyStreamSink@StreamAccess@@UBEPAVCKeyStreamSink@2@XZ @ 4 NONAME ; class StreamAccess::CKeyStreamSink * StreamAccess::CTestKeyStreamSink::CloneLC(void) const
+ ?CreateKeyStreamSinkLC@CTestProtectedStreamDesc@StreamAccess@@UBEPAVCKeyStreamSink@2@XZ @ 5 NONAME ; class StreamAccess::CKeyStreamSink * StreamAccess::CTestProtectedStreamDesc::CreateKeyStreamSinkLC(void) const
+ ?DoExternalizeL@CTestKeyStreamSink@StreamAccess@@MBEXAAVRWriteStream@@@Z @ 6 NONAME ; void StreamAccess::CTestKeyStreamSink::DoExternalizeL(class RWriteStream &) const
+ ?ExternalizeL@CTestKeyAssociation@StreamAccess@@QBEXAAVRWriteStream@@@Z @ 7 NONAME ; void StreamAccess::CTestKeyAssociation::ExternalizeL(class RWriteStream &) const
+ ?GetAttributeL@CTestAgentKeyStreamDecoder@StreamAccess@@UAEXABW4TAttribute@2@AAH@Z @ 8 NONAME ; void StreamAccess::CTestAgentKeyStreamDecoder::GetAttributeL(enum StreamAccess::TAttribute const &, int &)
+ ?GetAttributeL@CTestSingleProcessKeyStreamDecoder@StreamAccess@@UAEXABW4TAttribute@2@AAH@Z @ 9 NONAME ; void StreamAccess::CTestSingleProcessKeyStreamDecoder::GetAttributeL(enum StreamAccess::TAttribute const &, int &)
+ ?GetPostDeliveryRightsL@CTestAgentKeyStreamDecoder@StreamAccess@@UAEXAAVRFile@@AAVTDes8@@11@Z @ 10 NONAME ; void StreamAccess::CTestAgentKeyStreamDecoder::GetPostDeliveryRightsL(class RFile &, class TDes8 &, class TDes8 &, class TDes8 &)
+ ?GetPostDeliveryRightsL@CTestSingleProcessKeyStreamDecoder@StreamAccess@@UAEXAAVRFile@@AAVTDes8@@11@Z @ 11 NONAME ; void StreamAccess::CTestSingleProcessKeyStreamDecoder::GetPostDeliveryRightsL(class RFile &, class TDes8 &, class TDes8 &, class TDes8 &)
+ ?GetStringAttributeLC@CTestAgentKeyStreamDecoder@StreamAccess@@UAEPAVHBufC16@@ABW4TStringAttribute@2@@Z @ 12 NONAME ; class HBufC16 * StreamAccess::CTestAgentKeyStreamDecoder::GetStringAttributeLC(enum StreamAccess::TStringAttribute const &)
+ ?GetStringAttributeLC@CTestSingleProcessKeyStreamDecoder@StreamAccess@@UAEPAVHBufC16@@ABW4TStringAttribute@2@@Z @ 13 NONAME ; class HBufC16 * StreamAccess::CTestSingleProcessKeyStreamDecoder::GetStringAttributeLC(enum StreamAccess::TStringAttribute const &)
+ ?GetTestKey@CTestKeyAssociation@StreamAccess@@QBEPBVHBufC8@@XZ @ 14 NONAME ; class HBufC8 const * StreamAccess::CTestKeyAssociation::GetTestKey(void) const
+ ?NewL@CTestAgentKeyStreamDecoder@StreamAccess@@SAPAV12@ABVCKeyStreamSink@2@ABVCSdpMediaField@@ABVCSdpDocument@@@Z @ 15 NONAME ; class StreamAccess::CTestAgentKeyStreamDecoder * StreamAccess::CTestAgentKeyStreamDecoder::NewL(class StreamAccess::CKeyStreamSink const &, class CSdpMediaField const &, class CSdpDocument const &)
+ ?NewL@CTestKeyAssociation@StreamAccess@@SAPAV12@AAVRReadStream@@@Z @ 16 NONAME ; class StreamAccess::CTestKeyAssociation * StreamAccess::CTestKeyAssociation::NewL(class RReadStream &)
+ ?NewL@CTestKeyAssociation@StreamAccess@@SAPAV12@ABVTDesC8@@@Z @ 17 NONAME ; class StreamAccess::CTestKeyAssociation * StreamAccess::CTestKeyAssociation::NewL(class TDesC8 const &)
+ ?NewL@CTestKeyStreamSink@StreamAccess@@SAPAV12@AAVRReadStream@@@Z @ 18 NONAME ; class StreamAccess::CTestKeyStreamSink * StreamAccess::CTestKeyStreamSink::NewL(class RReadStream &)
+ ?NewL@CTestKeyStreamSink@StreamAccess@@SAPAV12@ABVTDesC16@@@Z @ 19 NONAME ; class StreamAccess::CTestKeyStreamSink * StreamAccess::CTestKeyStreamSink::NewL(class TDesC16 const &)
+ ?NewL@CTestProtectedStreamDesc@StreamAccess@@SAPAV12@ABVTDesC16@@@Z @ 20 NONAME ; class StreamAccess::CTestProtectedStreamDesc * StreamAccess::CTestProtectedStreamDesc::NewL(class TDesC16 const &)
+ ?NewL@CTestSingleProcessKeyStreamDecoder@StreamAccess@@SAPAV12@ABVCKeyStreamSink@2@ABVCSdpMediaField@@ABVCSdpDocument@@@Z @ 21 NONAME ; class StreamAccess::CTestSingleProcessKeyStreamDecoder * StreamAccess::CTestSingleProcessKeyStreamDecoder::NewL(class StreamAccess::CKeyStreamSink const &, class CSdpMediaField const &, class CSdpDocument const &)
+ ?NewLC@CTestAgentKeyStreamDecoder@StreamAccess@@SAPAV12@ABVCKeyStreamSink@2@ABVCSdpMediaField@@ABVCSdpDocument@@@Z @ 22 NONAME ; class StreamAccess::CTestAgentKeyStreamDecoder * StreamAccess::CTestAgentKeyStreamDecoder::NewLC(class StreamAccess::CKeyStreamSink const &, class CSdpMediaField const &, class CSdpDocument const &)
+ ?NewLC@CTestSingleProcessKeyStreamDecoder@StreamAccess@@SAPAV12@ABVCKeyStreamSink@2@ABVCSdpMediaField@@ABVCSdpDocument@@@Z @ 23 NONAME ; class StreamAccess::CTestSingleProcessKeyStreamDecoder * StreamAccess::CTestSingleProcessKeyStreamDecoder::NewLC(class StreamAccess::CKeyStreamSink const &, class CSdpMediaField const &, class CSdpDocument const &)
+ ?ProcessNewKeyAssociationL@CTestKeyStreamSink@StreamAccess@@UAEXABVCKeyAssociation@2@@Z @ 24 NONAME ; void StreamAccess::CTestKeyStreamSink::ProcessNewKeyAssociationL(class StreamAccess::CKeyAssociation const &)
+ ?SendIpSecAssociationL@CTestAgentKeyStreamDecoder@StreamAccess@@UBEXJPAVHBufC8@@0@Z @ 25 NONAME ; void StreamAccess::CTestAgentKeyStreamDecoder::SendIpSecAssociationL(long, class HBufC8 *, class HBufC8 *) const
+ ?SendIpSecAssociationL@CTestSingleProcessKeyStreamDecoder@StreamAccess@@UBEXJPAVHBufC8@@0@Z @ 26 NONAME ; void StreamAccess::CTestSingleProcessKeyStreamDecoder::SendIpSecAssociationL(long, class HBufC8 *, class HBufC8 *) const
+ ?SendKeyStreamL@CTestAgentKeyStreamDecoder@StreamAccess@@UBEXABVTDesC8@@@Z @ 27 NONAME ; void StreamAccess::CTestAgentKeyStreamDecoder::SendKeyStreamL(class TDesC8 const &) const
+ ?SendKeyStreamL@CTestSingleProcessKeyStreamDecoder@StreamAccess@@UBEXABVTDesC8@@@Z @ 28 NONAME ; void StreamAccess::CTestSingleProcessKeyStreamDecoder::SendKeyStreamL(class TDesC8 const &) const
+ ?SetAuthenticationAlgorithmL@CTestKeyStreamSink@StreamAccess@@UAEXABW4TAuthenticationAlgorithm@2@@Z @ 29 NONAME ; void StreamAccess::CTestKeyStreamSink::SetAuthenticationAlgorithmL(enum StreamAccess::TAuthenticationAlgorithm const &)
+ ?SetEncryptionAlgorithmL@CTestKeyStreamSink@StreamAccess@@UAEXABW4TEncryptionAlgorithm@2@@Z @ 30 NONAME ; void StreamAccess::CTestKeyStreamSink::SetEncryptionAlgorithmL(enum StreamAccess::TEncryptionAlgorithm const &)
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/BWINS/streamingcafu.def Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,20 @@
+EXPORTS
+ ??0CAgentKeyStreamDecoder@StreamAccess@@IAE@XZ @ 1 NONAME ; StreamAccess::CAgentKeyStreamDecoder::CAgentKeyStreamDecoder(void)
+ ??0CStreamAgentFactory@StreamAccess@@IAE@XZ @ 2 NONAME ; StreamAccess::CStreamAgentFactory::CStreamAgentFactory(void)
+ ??1CAgentKeyStreamDecoder@StreamAccess@@UAE@XZ @ 3 NONAME ; StreamAccess::CAgentKeyStreamDecoder::~CAgentKeyStreamDecoder(void)
+ ??1CKeyAssociation@StreamAccess@@UAE@XZ @ 4 NONAME ; StreamAccess::CKeyAssociation::~CKeyAssociation(void)
+ ??1CStreamAgentFactory@StreamAccess@@UAE@XZ @ 5 NONAME ; StreamAccess::CStreamAgentFactory::~CStreamAgentFactory(void)
+ ?CreateImportSessionLC@CKeyStreamDecoder@StreamAccess@@QBEPAVCImportFile@ContentAccess@@ABVTDesC8@@@Z @ 6 NONAME ; class ContentAccess::CImportFile * StreamAccess::CKeyStreamDecoder::CreateImportSessionLC(class TDesC8 const &) const
+ ?CreateImportSessionLC@CKeyStreamDecoder@StreamAccess@@QBEPAVCImportFile@ContentAccess@@ABVTDesC8@@ABVTDesC16@@1@Z @ 7 NONAME ; class ContentAccess::CImportFile * StreamAccess::CKeyStreamDecoder::CreateImportSessionLC(class TDesC8 const &, class TDesC16 const &, class TDesC16 const &) const
+ ?CreateKeyStreamSinkLC@CIpSecProtectedStreamDesc@StreamAccess@@UBEPAVCKeyStreamSink@2@XZ @ 8 NONAME ; class StreamAccess::CKeyStreamSink * StreamAccess::CIpSecProtectedStreamDesc::CreateKeyStreamSinkLC(void) const
+ ?ExternalizeLC@CKeyStreamSink@StreamAccess@@QBE?AVTPtr8@@XZ @ 9 NONAME ; class TPtr8 StreamAccess::CKeyStreamSink::ExternalizeLC(void) const
+ ?GetAttributeL@CKeyStreamDecoder@StreamAccess@@QBEXABW4TAttribute@2@AAH@Z @ 10 NONAME ; void StreamAccess::CKeyStreamDecoder::GetAttributeL(enum StreamAccess::TAttribute const &, int &) const
+ ?GetStringAttributeLC@CKeyStreamDecoder@StreamAccess@@QBEPAVHBufC16@@ABW4TStringAttribute@2@@Z @ 11 NONAME ; class HBufC16 * StreamAccess::CKeyStreamDecoder::GetStringAttributeLC(enum StreamAccess::TStringAttribute const &) const
+ ?InternalizeLC@CKeyStreamSink@StreamAccess@@SAPAV12@ABVTDesC8@@@Z @ 12 NONAME ; class StreamAccess::CKeyStreamSink * StreamAccess::CKeyStreamSink::InternalizeLC(class TDesC8 const &)
+ ?NewL@CIpSecKeyAssociation@StreamAccess@@SAPAV12@JPAVHBufC8@@0@Z @ 13 NONAME ; class StreamAccess::CIpSecKeyAssociation * StreamAccess::CIpSecKeyAssociation::NewL(long, class HBufC8 *, class HBufC8 *)
+ ?NewL@CKeyStreamDecoder@StreamAccess@@SAPAV12@ABVCProtectedStreamDesc@2@ABVCSdpMediaField@@ABVCSdpDocument@@@Z @ 14 NONAME ; class StreamAccess::CKeyStreamDecoder * StreamAccess::CKeyStreamDecoder::NewL(class StreamAccess::CProtectedStreamDesc const &, class CSdpMediaField const &, class CSdpDocument const &)
+ ?NewLC@CIpSecKeyAssociation@StreamAccess@@SAPAV12@JPAVHBufC8@@0@Z @ 15 NONAME ; class StreamAccess::CIpSecKeyAssociation * StreamAccess::CIpSecKeyAssociation::NewLC(long, class HBufC8 *, class HBufC8 *)
+ ?NewLC@CIpSecProtectedStreamDesc@StreamAccess@@SAPAV12@ABVTInetAddr@@0@Z @ 16 NONAME ; class StreamAccess::CIpSecProtectedStreamDesc * StreamAccess::CIpSecProtectedStreamDesc::NewLC(class TInetAddr const &, class TInetAddr const &)
+ ?NewLC@CKeyStreamDecoder@StreamAccess@@SAPAV12@ABVCProtectedStreamDesc@2@ABVCSdpMediaField@@ABVCSdpDocument@@@Z @ 17 NONAME ; class StreamAccess::CKeyStreamDecoder * StreamAccess::CKeyStreamDecoder::NewLC(class StreamAccess::CProtectedStreamDesc const &, class CSdpMediaField const &, class CSdpDocument const &)
+ ?KCafLoadPostProductionAgents@@3EB @ 18 NONAME ; unsigned char const KCafLoadPostProductionAgents
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/EABI/staclientu.def Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+EXPORTS
+ _ZN12StreamAccess10RStaClient13GetAttributeLERKNS_10TAttributeERi @ 1 NONAME
+ _ZN12StreamAccess10RStaClient20GetStringAttributeLCERKNS_16TStringAttributeE @ 2 NONAME
+ _ZN12StreamAccess10RStaClient22GetPostDeliveryRightsLER5RFileR5TDes8S4_S4_ @ 3 NONAME
+ _ZN12StreamAccess10RStaClient5CloseEv @ 4 NONAME
+ _ZN12StreamAccess10RStaClient7ConnectEv @ 5 NONAME
+ _ZN12StreamAccess10RStaClientC1Ev @ 6 NONAME
+ _ZN12StreamAccess10RStaClientC2Ev @ 7 NONAME
+ _ZNK12StreamAccess10RStaClient14SendKeyStreamLERK6TDesC8 @ 8 NONAME
+ _ZNK12StreamAccess10RStaClient17SetKeyStreamSinkLERKNS_14CKeyStreamSinkE @ 9 NONAME
+ _ZNK12StreamAccess10RStaClient17SetSdpMediaFieldLERK14CSdpMediaField @ 10 NONAME
+ _ZNK12StreamAccess10RStaClient21SendIpSecAssociationLElP6HBufC8S2_ @ 11 NONAME
+ _ZNK12StreamAccess10RStaClient15SetSdpDocumentLERK12CSdpDocument @ 12 NONAME
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/EABI/stasharedu.def Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,38 @@
+EXPORTS
+ _ZN12StreamAccess18CTestKeyStreamSink23SetEncryptionAlgorithmLERKNS_20TEncryptionAlgorithmE @ 1 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSink25ProcessNewKeyAssociationLERKNS_15CKeyAssociationE @ 2 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSink27SetAuthenticationAlgorithmLERKNS_24TAuthenticationAlgorithmE @ 3 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSink4NewLER11RReadStream @ 4 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSink4NewLERK7TDesC16 @ 5 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSinkD0Ev @ 6 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSinkD1Ev @ 7 NONAME
+ _ZN12StreamAccess18CTestKeyStreamSinkD2Ev @ 8 NONAME
+ _ZN12StreamAccess19CTestKeyAssociation4NewLER11RReadStream @ 9 NONAME
+ _ZN12StreamAccess19CTestKeyAssociation4NewLERK6TDesC8 @ 10 NONAME
+ _ZN12StreamAccess19CTestKeyAssociationD0Ev @ 11 NONAME
+ _ZN12StreamAccess19CTestKeyAssociationD1Ev @ 12 NONAME
+ _ZN12StreamAccess19CTestKeyAssociationD2Ev @ 13 NONAME
+ _ZN12StreamAccess24CTestProtectedStreamDesc4NewLERK7TDesC16 @ 14 NONAME
+ _ZN12StreamAccess24CTestProtectedStreamDescD0Ev @ 15 NONAME
+ _ZN12StreamAccess24CTestProtectedStreamDescD1Ev @ 16 NONAME
+ _ZN12StreamAccess24CTestProtectedStreamDescD2Ev @ 17 NONAME
+ _ZN12StreamAccess26CTestAgentKeyStreamDecoder13GetAttributeLERKNS_10TAttributeERi @ 18 NONAME
+ _ZN12StreamAccess26CTestAgentKeyStreamDecoder20GetStringAttributeLCERKNS_16TStringAttributeE @ 19 NONAME
+ _ZN12StreamAccess26CTestAgentKeyStreamDecoder22GetPostDeliveryRightsLER5RFileR5TDes8S4_S4_ @ 20 NONAME
+ _ZN12StreamAccess26CTestAgentKeyStreamDecoder4NewLERKNS_14CKeyStreamSinkERK14CSdpMediaFieldRK12CSdpDocument @ 21 NONAME
+ _ZN12StreamAccess26CTestAgentKeyStreamDecoder5NewLCERKNS_14CKeyStreamSinkERK14CSdpMediaFieldRK12CSdpDocument @ 22 NONAME
+ _ZN12StreamAccess34CTestSingleProcessKeyStreamDecoder13GetAttributeLERKNS_10TAttributeERi @ 23 NONAME
+ _ZN12StreamAccess34CTestSingleProcessKeyStreamDecoder20GetStringAttributeLCERKNS_16TStringAttributeE @ 24 NONAME
+ _ZN12StreamAccess34CTestSingleProcessKeyStreamDecoder22GetPostDeliveryRightsLER5RFileR5TDes8S4_S4_ @ 25 NONAME
+ _ZN12StreamAccess34CTestSingleProcessKeyStreamDecoder4NewLERKNS_14CKeyStreamSinkERK14CSdpMediaFieldRK12CSdpDocument @ 26 NONAME
+ _ZN12StreamAccess34CTestSingleProcessKeyStreamDecoder5NewLCERKNS_14CKeyStreamSinkERK14CSdpMediaFieldRK12CSdpDocument @ 27 NONAME
+ _ZNK12StreamAccess18CTestKeyStreamSink14DoExternalizeLER12RWriteStream @ 28 NONAME
+ _ZNK12StreamAccess18CTestKeyStreamSink7CloneLCEv @ 29 NONAME
+ _ZNK12StreamAccess19CTestKeyAssociation10GetTestKeyEv @ 30 NONAME
+ _ZNK12StreamAccess19CTestKeyAssociation12ExternalizeLER12RWriteStream @ 31 NONAME
+ _ZNK12StreamAccess24CTestProtectedStreamDesc21CreateKeyStreamSinkLCEv @ 32 NONAME
+ _ZNK12StreamAccess26CTestAgentKeyStreamDecoder14SendKeyStreamLERK6TDesC8 @ 33 NONAME
+ _ZNK12StreamAccess26CTestAgentKeyStreamDecoder21SendIpSecAssociationLElP6HBufC8S2_ @ 34 NONAME
+ _ZNK12StreamAccess34CTestSingleProcessKeyStreamDecoder14SendKeyStreamLERK6TDesC8 @ 35 NONAME
+ _ZNK12StreamAccess34CTestSingleProcessKeyStreamDecoder21SendIpSecAssociationLElP6HBufC8S2_ @ 36 NONAME
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/EABI/streamingcafu.def Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,38 @@
+EXPORTS
+ KCafLoadPostProductionAgents @ 1 NONAME DATA 1
+ _ZN12StreamAccess14CKeyStreamSink13InternalizeLCERK6TDesC8 @ 2 NONAME
+ _ZN12StreamAccess15CKeyAssociationD0Ev @ 3 NONAME
+ _ZN12StreamAccess15CKeyAssociationD1Ev @ 4 NONAME
+ _ZN12StreamAccess15CKeyAssociationD2Ev @ 5 NONAME
+ _ZN12StreamAccess17CKeyStreamDecoder4NewLERKNS_20CProtectedStreamDescERK14CSdpMediaFieldRK12CSdpDocument @ 6 NONAME
+ _ZN12StreamAccess17CKeyStreamDecoder5NewLCERKNS_20CProtectedStreamDescERK14CSdpMediaFieldRK12CSdpDocument @ 7 NONAME
+ _ZN12StreamAccess19CStreamAgentFactoryC2Ev @ 8 NONAME
+ _ZN12StreamAccess19CStreamAgentFactoryD0Ev @ 9 NONAME
+ _ZN12StreamAccess19CStreamAgentFactoryD1Ev @ 10 NONAME
+ _ZN12StreamAccess19CStreamAgentFactoryD2Ev @ 11 NONAME
+ _ZN12StreamAccess20CIpSecKeyAssociation4NewLElP6HBufC8S2_ @ 12 NONAME
+ _ZN12StreamAccess20CIpSecKeyAssociation5NewLCElP6HBufC8S2_ @ 13 NONAME
+ _ZN12StreamAccess22CAgentKeyStreamDecoderC2Ev @ 14 NONAME
+ _ZN12StreamAccess22CAgentKeyStreamDecoderD0Ev @ 15 NONAME
+ _ZN12StreamAccess22CAgentKeyStreamDecoderD1Ev @ 16 NONAME
+ _ZN12StreamAccess22CAgentKeyStreamDecoderD2Ev @ 17 NONAME
+ _ZN12StreamAccess25CIpSecProtectedStreamDesc5NewLCERK9TInetAddrS3_ @ 18 NONAME
+ _ZNK12StreamAccess14CKeyStreamSink13ExternalizeLCEv @ 19 NONAME
+ _ZNK12StreamAccess17CKeyStreamDecoder13GetAttributeLERKNS_10TAttributeERi @ 20 NONAME
+ _ZNK12StreamAccess17CKeyStreamDecoder20GetStringAttributeLCERKNS_16TStringAttributeE @ 21 NONAME
+ _ZNK12StreamAccess17CKeyStreamDecoder21CreateImportSessionLCERK6TDesC8 @ 22 NONAME
+ _ZNK12StreamAccess17CKeyStreamDecoder21CreateImportSessionLCERK6TDesC8RK7TDesC16S6_ @ 23 NONAME
+ _ZNK12StreamAccess25CIpSecProtectedStreamDesc21CreateKeyStreamSinkLCEv @ 24 NONAME
+ _ZTIN12StreamAccess15CKeyAssociationE @ 25 NONAME
+ _ZTIN12StreamAccess16CStreamAgentInfoE @ 26 NONAME
+ _ZTIN12StreamAccess17CKeyStreamDecoderE @ 27 NONAME
+ _ZTIN12StreamAccess19CStreamAgentFactoryE @ 28 NONAME
+ _ZTIN12StreamAccess20CStreamAgentResolverE @ 29 NONAME
+ _ZTIN12StreamAccess22CAgentKeyStreamDecoderE @ 30 NONAME
+ _ZTVN12StreamAccess15CKeyAssociationE @ 31 NONAME
+ _ZTVN12StreamAccess16CStreamAgentInfoE @ 32 NONAME
+ _ZTVN12StreamAccess17CKeyStreamDecoderE @ 33 NONAME
+ _ZTVN12StreamAccess19CStreamAgentFactoryE @ 34 NONAME
+ _ZTVN12StreamAccess20CStreamAgentResolverE @ 35 NONAME
+ _ZTVN12StreamAccess22CAgentKeyStreamDecoderE @ 36 NONAME
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/bld.inf Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,101 @@
+// Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Stream Access Framework for DRM agents and consumers
+//
+//
+
+/**
+ @file
+*/
+
+
+PRJ_PLATFORMS
+DEFAULT
+
+PRJ_EXPORTS
+
+// Streaming CAF includes
+../inc/keyassociation.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/keyassociation.h)
+../inc/keystreamdecoder.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/keystreamdecoder.h)
+../inc/keystreamsink.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/keystreamsink.h)
+../inc/protectedstreamdesc.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/protectedstreamdesc.h)
+../inc/streamagentfactory.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/streamagentfactory.h)
+../inc/streamagentinterface.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/streamagentinterface.h)
+../inc/streamcaftypes.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/streaming/streamcaftypes.h)
+
+// ROMKIT includes
+../inc/streamingcaf.iby /epoc32/rom/include/streamingcaf.iby
+
+PRJ_MMPFILES
+
+#ifndef TOOLS
+#ifndef TOOLS2
+streamingcaf.mmp
+#endif // TOOLS2
+#endif // TOOLS
+
+PRJ_TESTMMPFILES
+
+#ifndef TOOLS
+#ifndef TOOLS2
+// Common test stream agent implementation projects
+stashared.mmp
+staclient.mmp
+staserver.mmp
+
+// Test stream agent ECOM plugins
+tscaf_streamagent01.mmp
+tscaf_streamagent02.mmp
+
+// Test "Single Process" Stream agent ECOM Plugins
+tscaf_singleprocess_streamagent.mmp
+
+// Integration Test Harness
+tscaf.mmp
+#endif // TOOLS2
+#endif // TOOLS
+
+PRJ_TESTEXPORTS
+
+../test/tscaf/scripts/tscaf.ini z:/tcaf/tscaf/tscaf.ini
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+../test/tscaf/scripts/tscaf.script z:/tcaf/tscaf/tscaf.script
+../test/tscaf/scripts/tscaf_oom.script z:/tcaf/tscaf/tscaf_oom.script
+#else
+../test/tscaf/scripts/tscaf_without_upward_dependent.script z:/tcaf/tscaf/tscaf.script
+../test/tscaf/scripts/tscaf_oom_without_upward_dependent.script z:/tcaf/tscaf/tscaf_oom.script
+#endif
+../test/tscaf/scripts/tscafipsec.script z:/tcaf/tscaf/tscafipsec.script
+../test/tscaf/scripts/tscafipsec_oom.script z:/tcaf/tscaf/tscafipsec_oom.script
+../test/tscaf/scripts/tscafipsecmanual.script z:/tcaf/tscaf/tscafipsecmanual.script
+
+../test/tscaf/scripts/data/rosimple.dr z:/tcaf/tscaf/data/rosimple.dr
+../test/tscaf/scripts/data/roexpired.dr z:/tcaf/tscaf/data/roexpired.dr
+../test/tscaf/scripts/data/roprogramprotected.dr z:/tcaf/tscaf/data/roprogramprotected.dr
+../test/tscaf/scripts/data/roserviceprotected.dr z:/tcaf/tscaf/data/roserviceprotected.dr
+../test/tscaf/scripts/data/rorecordable.dr z:/tcaf/tscaf/data/rorecordable.dr
+../test/tscaf/scripts/data/ropostacquisition.dr z:/tcaf/tscaf/data/postacquisitiontest.dr
+
+../test/tscaf/scripts/data/tscaf_rights_programprotect01.dr z:/tcaf/tscaf/data/tscaf_rights_programprotect01.dr
+../test/tscaf/scripts/data/tscaf_rights_programprotect02.dr z:/tcaf/tscaf/data/tscaf_rights_programprotect02.dr
+../test/tscaf/scripts/data/tscaf_rights_programprotect03.dr z:/tcaf/tscaf/data/tscaf_rights_programprotect03.dr
+../test/tscaf/scripts/data/tscaf_rights_serviceprotect01.dr z:/tcaf/tscaf/data/tscaf_rights_serviceprotect01.dr
+../test/tscaf/scripts/data/tscaf_rights_serviceprotect02.dr z:/tcaf/tscaf/data/tscaf_rights_serviceprotect02.dr
+../test/tscaf/scripts/data/tscaf_rights_serviceprotect03.dr z:/tcaf/tscaf/data/tscaf_rights_serviceprotect03.dr
+../test/tscaf/scripts/data/tscaf_rights_expired01.dr z:/tcaf/tscaf/data/tscaf_rights_expired01.dr
+
+// ROM streaming caf test iby
+../inc/tscaf.iby /epoc32/rom/include/tscaf.iby
+
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/security_streamingcaf.history.xml Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,20 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<relnotes name=" CAF Streaming Support">
+ <purpose>
+ Framework support for Digital Rights Management (DRM) of streaming DRM standards, provides integration with corresponding data protection layers and interfaces for addition of new DRM schemes and their usage.
+ </purpose>
+
+ <deliverystep number="" name="PREQ2193 SMP-Safe Crypto Services Components" osproject="Diran" revision="002">
+ <milestone project="GT0433" number="MS3.7"/>
+ <preq number="2193" title="SMP-Safe Crypto Services Components">
+ Add SMPSAFE keyword in SDP mmp files
+ </preq>
+ </deliverystep>
+
+ <deliverystep number="779" name="PREQ782: Crypto Services: CAF" osproject="Sphinx" revision="001">
+ <milestone project="GT0379" number="MS3.4"/>
+ <preq number="782" title="Over-the-air Streamed Content Protection">
+ Added Streaming CAF interface, streaming reference agent and test codes. Configured in 9.4 onwards by using marco "SYMBIAN_CAF_STREAMING".
+ </preq>
+ </deliverystep>
+</relnotes>
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/security_streamingcaf.mrp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,10 @@
+component security_streamingcaf
+source \sf\os\security\contentmgmt\cafstreamingsupport
+binary \sf\os\security\contentmgmt\cafstreamingsupport\group all
+exports \sf\os\security\contentmgmt\cafstreamingsupport\group
+notes_source \component_defs\release.src
+
+
+ipr E
+ipr T \sf\os\security\contentmgmt\cafstreamingsupport\test
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/staclient.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,44 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// @file
+// This is the project specification file for the streaming test agent client.
+//
+//
+
+TARGETTYPE DLL
+TARGET staclient.dll
+
+UID 0 0x10285889
+
+CAPABILITY All -Tcb
+
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+SOURCEPATH ../test/streamingtestagent/source/client
+SOURCE staclient.cpp
+
+LIBRARY euser.lib
+LIBRARY scsclient.lib
+LIBRARY estor.lib
+LIBRARY cafutils.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY stashared.lib
+LIBRARY streamingcaf.lib efsrv.lib
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/staserver.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,48 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// @file
+// This is the project specification file for the streaming test agent server.
+//
+//
+
+TARGET staserver.exe
+TARGETTYPE exe
+UID 0 0x1028588B
+
+CAPABILITY DRM NetworkControl NetworkServices
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+SOURCEPATH ../test/streamingtestagent/source/server
+SOURCE staserver.cpp
+SOURCE startup.cpp
+SOURCE stasession.cpp
+
+LIBRARY euser.lib
+LIBRARY scsserver.lib
+LIBRARY efsrv.lib
+LIBRARY cafutils.lib
+LIBRARY estor.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY bafl.lib
+LIBRARY stashared.lib
+LIBRARY streamingcaf.lib
+LIBRARY srautils.lib
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/stashared.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,54 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// @file
+// This is the project specification file for the streaming test agent utils.
+//
+//
+
+TARGET stashared.dll
+TARGETTYPE DLL
+
+UID 0 0x1028588A
+
+CAPABILITY All -Tcb
+
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../test/streamingtestagent_singleprocess/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+SOURCEPATH ../test/streamingtestagent/source/shared
+SOURCE testprotstrdesc.cpp
+SOURCE testkeystreamsink.cpp
+SOURCE testkeyassociation.cpp
+SOURCE testkeystreamdecoderbase.cpp
+SOURCE testagentkeystreamdecoder.cpp
+
+SOURCEPATH ../test/streamingtestagent_singleprocess/source/shared
+SOURCE testsingleprocesskeystreamdecoder.cpp
+
+LIBRARY euser.lib
+LIBRARY streamingcaf.lib
+LIBRARY estor.lib
+LIBRARY staclient.lib
+LIBRARY srautils.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY efsrv.lib
+LIBRARY bafl.lib
+SMPSAFE
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/streamingcaf.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,54 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// @file
+// @SYMPurpose streamingcaf.dll Content Access Framework implementation for Streaming DRM support
+//
+//
+
+TARGET streamingcaf.dll
+TARGETTYPE DLL
+
+CAPABILITY All -Tcb
+
+UID 0 0x10285888
+VENDORID 0x70000001
+
+SOURCEPATH ../source/
+
+SOURCE keyassociation.cpp
+SOURCE keystreamsink.cpp
+SOURCE keystreamdecoder.cpp
+SOURCE streamagentinterface.cpp
+SOURCE streamagentfactory.cpp
+SOURCE streamagentresolver.cpp
+SOURCE streamagentinfo.cpp
+SOURCE patchdata.cpp
+
+SOURCE ipsec/ipseckeystreamsink.cpp
+SOURCE ipsec/ipseckeyassociation.cpp
+SOURCE ipsec/ipsecprotectedstreamdesc.cpp
+
+USERINCLUDE ../inc/
+USERINCLUDE ../../../cryptomgmtlibs/securitycommonutils/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+LIBRARY euser.lib
+LIBRARY lib_pfkey.lib
+LIBRARY esock.lib
+LIBRARY insock.lib
+LIBRARY ecom.lib
+LIBRARY ipsecpolapi.lib
+LIBRARY estor.lib caf.lib cafutils.lib efsrv.lib
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/tscaf.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,75 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// @file
+// This is the project specification file for the streaming CAF test harness
+// @test
+//
+//
+
+TARGETTYPE EXE
+TARGET tscaf.exe
+
+UID 0 0x1028588C
+
+// NetworkServices and NetworkControl are used for IpSec testing
+CAPABILITY AllFiles DRM NetworkServices NetworkControl
+
+SOURCEPATH ../test/tscaf/source
+
+SOURCE tscafserver.cpp
+SOURCE tscafstep.cpp
+SOURCE tstaunittest.cpp
+SOURCE tkeystreamsink.cpp
+SOURCE tkeystreamdecoderconstruct.cpp
+SOURCE tkeystreamdecoderattributes.cpp
+SOURCE tmultikeystreamdecoders.cpp
+SOURCE tpostacquisition.cpp
+SOURCE tipsec.cpp
+SOURCE treferenceagent.cpp
+SOURCE startupcommsstep.cpp
+
+// Utility Steps
+SOURCE tsetuprightsobjects.cpp
+
+USERINCLUDE ../test/tscaf/inc
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../test/streamingtestagent_singleprocess/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+LIBRARY euser.lib
+LIBRARY estlib.lib
+LIBRARY efsrv.lib
+LIBRARY estor.lib
+LIBRARY staclient.lib
+LIBRARY testexecuteutils.lib
+LIBRARY testexecutelogclient.lib
+LIBRARY rfileloggerclient.lib
+LIBRARY cafutils.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY bafl.lib
+LIBRARY streamingcaf.lib
+LIBRARY stashared.lib
+LIBRARY srautils.lib
+
+// Networking libraries for IpSec tests
+LIBRARY esock.lib
+LIBRARY insock.lib
+LIBRARY lib_pfkey.lib caf.lib rtaarchive.lib
+LIBRARY c32.lib
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/tscaf_singleprocess_streamagent.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,53 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Specification file for the 'Single Process' test stream agent "tscaf_singleprocess_streamagent" ECOM Plugin
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+TARGET tscaf_singleprocess_streamagent.dll
+TARGETTYPE PLUGIN
+
+UID 0x10009D8D 0x10285A42
+
+CAPABILITY AllFiles DRM NetworkServices NetworkControl
+
+MACRO STREAMAGENT_SP_01
+
+SOURCEPATH ../test/streamingtestagent_singleprocess/source/plugin
+SOURCE testsingleprocessagentfactory.cpp
+
+USERINCLUDE ../test/streamingtestagent_singleprocess/inc
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+LIBRARY euser.lib
+LIBRARY streamingcaf.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY stashared.lib
+LIBRARY srautils.lib
+
+START RESOURCE 10285a42.rss
+ TARGET tscaf_singleprocess_streamagent.rsc
+END
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/tscaf_streamagent01.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,52 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Specification file for the test stream agent "tsaf_streamagent01" ECOM Plugin
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+TARGET tscaf_streamagent01.dll
+TARGETTYPE PLUGIN
+
+UID 0x10009D8D 0x10285892
+
+CAPABILITY AllFiles DRM NetworkServices NetworkControl
+
+MACRO STREAMAGENT_01
+
+SOURCEPATH ../test/streamingtestagent/source/plugin
+SOURCE teststreamagentfactory.cpp
+
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+LIBRARY euser.lib
+LIBRARY streamingcaf.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY stashared.lib
+LIBRARY srautils.lib
+
+START RESOURCE 10285892.rss
+ TARGET tscaf_streamagent01.rsc
+END
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/group/tscaf_streamagent02.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,52 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Specification file for the test stream agent "tsaf_streamagent02" ECOM Plugin
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+TARGET tscaf_streamagent02.dll
+TARGETTYPE PLUGIN
+
+UID 0x10009D8D 0x102859F4
+
+CAPABILITY AllFiles DRM NetworkServices NetworkControl
+
+MACRO STREAMAGENT_02
+
+SOURCEPATH ../test/streamingtestagent/source/plugin
+SOURCE teststreamagentfactory.cpp
+
+USERINCLUDE ../test/streamingtestagent/inc
+USERINCLUDE ../../referencedrmagent/RefTestAgent/streamingrefagent/inc
+
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
+MW_LAYER_SYSTEMINCLUDE_SYMBIAN
+
+LIBRARY euser.lib
+LIBRARY streamingcaf.lib
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+LIBRARY sdpcodec.lib
+#endif
+LIBRARY stashared.lib
+LIBRARY srautils.lib
+
+START RESOURCE 102859F4.rss
+ TARGET tscaf_streamagent02.rsc
+END
+SMPSAFE
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/keyassociation.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,75 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#include <e32base.h>
+
+#ifndef KEYASSOCIATION_H
+#define KEYASSOCIATION_H
+
+namespace StreamAccess
+ {
+ /**
+ Defines the key association abstraction. In streaming protection, keys can be used slightly differently
+ for different protection layers. In IPSec they are used as a part of SA (Security Associations), while in SRTP they
+ are used as the Master Key - used for deriving the decryption and the authentication keys.
+ */
+ class CKeyAssociation : public CBase
+ {
+ public:
+ IMPORT_C virtual ~CKeyAssociation();
+ };
+
+
+ /**
+ Defines a key association for the IPSec protocol.
+ */
+ class CIpSecKeyAssociation : public CKeyAssociation
+ {
+ friend class CIpSecKeyStreamSink;
+ public:
+ /** Constructs a new key association for IPSec.
+ @param aSpi The SPI (security parameter index) to be used.
+ @param aEncryptionKey The encryption key to be used in this association. Please note that the ownership on aEncryptionKey is passed to the newly created object.
+ @param aAuthenticationKey The authentication key to be used in this association. Please note that the ownership on aAuthenticationKey is passed to the newly created object.
+ @leave One of the system-wide error codes.
+ */
+ IMPORT_C static CIpSecKeyAssociation* NewL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey);
+
+ /**
+ @see CIpSecKeyAssociation::NewL
+ */
+ IMPORT_C static CIpSecKeyAssociation* NewLC(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey);
+
+ private:
+ TInt32 GetSpiL() const;
+ const HBufC8* GetEncryptionKeyL() const;
+ const HBufC8* GetAuthenticationKeyL() const;
+ private:
+ CIpSecKeyAssociation(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey);
+ private:
+ TInt32 iSpi;
+ HBufC8 *iEncryptionKey;
+ HBufC8 *iAuthenticationKey;
+ };
+
+ } // namespace StreamAccess
+#endif // KEYASSOCIATION_H
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/keystreamdecoder.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,195 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#ifndef KEYSTREAMDECODER_H
+#define KEYSTREAMDECODER_H
+
+#include <e32base.h>
+#include <f32file.h>
+#include <caf/importfile.h>
+#include <caf/streaming/streamcaftypes.h>
+
+class CSdpMediaField;
+class CSdpDocument;
+
+namespace StreamAccess
+ {
+ class CAgentKeyStreamDecoder;
+ class CProtectedStreamDesc;
+ class CStreamAgentFactory;
+ class ContentAccess::CImportFile;
+ /**
+ Allows clients to instantiate key stream decoders for short-term key streams in protected broadcasts.
+
+ This class is initialised with an agent implementation that supports the standard with which the stream is protected.
+ */
+ class CKeyStreamDecoder : public CBase
+ {
+ public:
+ /**
+ Creates a new CKeyStreamDecoder object.
+
+ Sample code pattern from a media controller for using this interface. (This sample assumes that the stream is protected using
+ IPSec. Similar code pattern can be used for other protection layers.)
+
+ @code
+ using namespace StreamAccess;
+
+ // Create protected stream description by using the source and target connection addresses.
+ CIpSecProtectedStreamDesc *ipSecProtectedStreamDec = CIpSecProtectedStreamDesc::NewLC(sourceAddr, targetAddr);
+
+ // Extract the relevant media field for the key stream
+ ...
+ // Now create the key stream decoder
+ CKeyStreamDecoder *keyStreamDecoder = CKeyStreamDecoder::NewLC(ipSecProtectedStreamDesc, keyStreamSDPDesc, sdpDocument);
+ // If we reached this point, then key stream decoder was initialized correctly, and if the user has rights to
+ // view the stream, it will get decrypted.
+ // If the user doesn't have the rights to view the stream (e.g. no rights for a specific pay-per-view program),
+ // no cryptographic context will be set. In such case, the reason for lack of decryption can be queried via
+ // the GetAttributeL interface.
+ @endcode
+
+ @param aProtectedStreamDesc Description of the protected media stream (e.g. a specific audio track, or the video channel). This parameter defines where the keys will be applied to.
+ Description may vary according to the protection layer. For example, for IPSec it might be a subsession, while for ISMACryp a reference to the ISMACryp decoder
+ @param aSdpKeyStream Defines the parameters for the key stream. If several key streams are present (e.g. one for video protection, and one for audio protection), then
+ several CKeyStreamDecoder objects must be instantiated. If several key streams are available for the same media, then a key stream decoder should be
+ attempted for all of them - depending on the nature of the broadcast, some of these key streams might be optional or not.
+ For example, if SRTP is used for authentication and ISMACryp for encryption then there would be two key streams - both mandatory.
+ On the other hand, if there are two alternative purchase options for the same service, there may be two corresponding key streams.
+ If no key stream decoder can be created, then the media stream cannot be decoded on the device.
+ @param aSdpDoc Description of the Session Description Protocol (SDP) document which contains all defined SDP fields and related values describing a session.
+ By using SDP document, agents can extract SDP connection field and other fields or attributes which they may need and which are not defined in the key stream
+ SDP media field.
+ @return The new CKeyStreamDecoder object.
+
+ @leave KErrCANoAgent There is no agent on the device which can support the requested key management system.
+ @leave ... One of the system-wide error codes.
+
+ @capability
+ Only processes with the DRM capability are able to instantiate key stream decoders.
+ If there is prior knowledge of the DRM agent handling this stream, the documentation for that DRM agent should also be consulted.
+ */
+ IMPORT_C static CKeyStreamDecoder* NewL(const CProtectedStreamDesc& aProtectedStreamDesc, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc);
+
+ /**
+ @see CKeyStreamDecoder::NewL()
+ */
+ IMPORT_C static CKeyStreamDecoder* NewLC(const CProtectedStreamDesc& aProtectedStreamDesc, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc);
+
+ /** Get an attribute for the service/content protection.
+
+ @param aAttribute The attribute to query, from StreamAccess::TAttribute.
+ @param aValue [out] Used to return the attribute value.
+ @leave KErrCANotSupported if the requested attribute does not exist.
+ @leave Otherwise one of the other CAF error codes defined in \c caferr.h or one of the
+ other system-wide error codes for any other errors.
+ @capability Requires the DRM capability.
+ @see StreamAccess::TAttribute
+ */
+ IMPORT_C void GetAttributeL(const TAttribute& aAttribute, TBool& aValue) const;
+
+ /** Get text string attributes or meta-data for the service/content protection.
+
+ @param aAttribute The attribute to query, from StreamAccess::TStringAttribute.
+ @return A pointer to the value of the attribute. The pointer is put onto the cleanup stack.
+ @leave KErrCANotSupported if the requested attribute does not exist.
+ @leave Otherwise one of the other CAF error codes defined in \c caferr.h or one of the
+ other system-wide error codes for any other errors.
+ @capability Requires the DRM capability.
+ @see StreamAccess::TStringAttribute
+ */
+ IMPORT_C HBufC* GetStringAttributeLC(const TStringAttribute& aAttribute) const;
+
+ /** Creates a new import session which is used to import the streamed content into a protected file
+ storage for later viewing.
+
+ A corresponding rights object for post-acquisition protection is delivered automatically to
+ the CAF agent. The returned session has to be closed when the recording has finished.
+
+ If the agent requires a new output file it will return KErrCANewFileHandleRequired from
+ @see ContentAccess::CImportFile::Write() or @see ContentAccess::CImportFile::WriteComplete().
+ The application using this API should provide the agent with a new file handle using
+ ContentAccess::CImportFile::ContinueWithNewOutputFile().
+
+ @param aContentMimeType The mime type of the content which is recorded (e.g. video/3gpp).
+ @return A CImportFile object to import the protected streamed content.
+ The newly created object is left on the cleanup stack.
+ @leave KErrCANoAgent No agent supports recording a protected streamed content.
+ @leave KErrCANotSupported if the protection scheme does not have or is not capable of exporting rights info.
+ @leave Otherwise one of the other CAF error codes defined in \c caferr.h or one of the other system-wide
+ error codes for any other errors.
+ @capability Requires the DRM capability.
+ */
+ IMPORT_C ContentAccess::CImportFile* CreateImportSessionLC(const TDesC8& aContentMimeType) const;
+
+ /** Creates a new import session which is used to import the streamed content into a protected file
+ storage for later viewing.
+
+ A corresponding rights object for post-acquisition protection is delivered automatically to
+ the CAF agent. The returned session has to be closed when the recording has finished.
+
+ @param aContentMimeType The mime type of the content which is recorded (e.g. video/3gpp).
+ @param aSuggestedFileName Suggested filename for the CAF agent to use when creating the output file for
+ the content being recorded. Details of the output files produced can be obtained
+ using ContentAccess::CImportFile::OutputFileL().
+ @param aOutputDirectory The preferred location to store the protected streaming content.
+ @return A CImportFile object to import the protected streamed content.
+ The newly created object is left on the cleanup stack.
+ @leave KErrCANoAgent No agent supports recording a protected streamed content.
+ @leave KErrCANotSupported if the protection scheme does not have or is not capable of exporting rights info.
+ @leave Otherwise one of the other CAF error codes defined in \c caferr.h or one of the other system-wide
+ error codes for any other errors.
+ @capability Requires the DRM capability.
+ */
+ IMPORT_C ContentAccess::CImportFile* CreateImportSessionLC(const TDesC8& aContentMimeType, const TDesC& aSuggestedFileName, const TDesC& aOutputDirectory) const;
+
+ // Destructor
+ ~CKeyStreamDecoder();
+
+ protected:
+ // Constructor
+ CKeyStreamDecoder();
+
+ // Second phase constructor
+ void ConstructL(const CProtectedStreamDesc& aProtectedStreamDesc, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc);
+
+ private:
+ ContentAccess::CImportFile* DoCreateImportSessionLC(const TDesC8& aContentMimeType, const TDesC& aSuggestedName, const TDesC& aOutputDirectory) const;
+
+ private:
+ // Pointer to the resolved agent key stream decoder
+ CAgentKeyStreamDecoder* iAgentKeyStreamDecoder;
+
+ // Handle to the factory of the resolved stream agent is required in order to successfully cleanup
+ // the factory instance during destruction.
+ CStreamAgentFactory *iStreamAgentFactory;
+
+ // ECOM session key. This is set by REComSession::CreateImplementationL() during construction
+ TUid iEcomKey;
+ };
+ /**
+ The maximum length of a mime type string. Agents should not use mime types and content IDs
+ which is longer than this value.
+ */
+ const TInt KMimeTypesMaxLength = 512;
+
+ } // namespace StreamAccess
+#endif // KEYSTREAMDECODER_H
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/keystreamsink.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,111 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#ifndef KEYSTREAMSINK_H
+#define KEYSTREAMSINK_H
+
+#include <e32base.h>
+#include <caf/streaming/keyassociation.h>
+
+class RWriteStream;
+
+namespace StreamAccess
+ {
+ enum TEncryptionAlgorithm
+ {
+ ENoEncryption = 0,
+ EAES_128_CBC,
+ EAES_128_CTR
+ };
+
+ enum TAuthenticationAlgorithm
+ {
+ ENoAuthentication = 0,
+ EHMAC_SHA1
+ };
+ /**
+ Defines the key stream sink abstraction. Key stream sink is used for applying keys decrypted by the CAF streaming agent
+ to their correct destination.
+
+ Typical implementations would be CIpSecKeyStreamSink, CSrtpKeyStreamSink etc.
+ */
+ class CKeyStreamSink : public CBase
+ {
+ public:
+
+ /** Clone the key stream sink. Required to support copying of key stream sinks without knowing their runtime type.
+ */
+ virtual CKeyStreamSink *CloneLC() const = 0;
+
+ /** Push a decrypted key association to its sink. This function should be called only by CAgentKeyStreamDecoder
+ instances. Please note that this interface is synchronous, i.e. the function returns when the key is implemented.
+
+ @see CAgentKeyStreamDecoder
+
+ @param aKeyAssociation The key association extracted from the short-term key message.
+ @leave One of the system-wide error codes.
+ */
+ virtual void ProcessNewKeyAssociationL(const CKeyAssociation& aKeyAssociation) = 0;
+
+ /** Set the encryption algorithm. If encryption is used, the encryption algorithm must be set before processing any key associations.
+ Please note that changing the encryption algorithm once key associations have been processed is not supported.
+
+ @param aEncryptionAlgorithm The encryption algorithm
+ @leave One of the system-wide error codes.
+ */
+ virtual void SetEncryptionAlgorithmL(const TEncryptionAlgorithm& aEncryptionAlgorithm) = 0;
+
+ /** Set the authentication algorithm. If authentication is used, the authetication algorithm must be set before processing any key associations.
+ Please note that changing the authentication algorithm once key associations have been processed is not supported.
+
+ @param aAuthenticationAlgorithm The authentication algorithm
+ @leave One of the system-wide error codes.
+ */
+ virtual void SetAuthenticationAlgorithmL(const TAuthenticationAlgorithm& aAuthenticationAlgorithm) = 0;
+
+ /** Externalize the key stream sink to a buffer. Leaves the allocated buffer on the cleanup stack.
+
+ @return Pointer to the buffer
+ @leave One of the system-wide error codes.
+ */
+ IMPORT_C TPtr8 ExternalizeLC() const;
+
+ /** Internalize the key stream sink from a buffer. Leaves the allocated key stream sink on the cleanup stack.
+
+ @param aBuf Buffer with the externalized key stream sink
+ @return Pointer to the key stream sink
+ @leave One of the system-wide error codes.
+ */
+ IMPORT_C static CKeyStreamSink *InternalizeLC(const TDesC8 &aBuf);
+
+ virtual ~CKeyStreamSink() {}
+ protected:
+ virtual void DoExternalizeL(RWriteStream &aStream) const = 0;
+ protected:
+ // Used for serialization
+ enum TSinksEnum
+ {
+ EIpSecSinkId = 1
+ };
+ };
+ } // namespace StreamAccess
+#endif // KEYSTREAMSINK_H
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/patchdata.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,34 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <e32base.h>
+
+/**
+This 8-bit variable is used in agent resolution. It is used to override CAF's
+default resolution behaviour of only loading Stream Access Agents (SAAs)
+from the ROM drive. Compile time value is 0 - default resolution behaviour.
+When non-zero CAF will load all SAA visible to the ECOM service regardless of
+the drive. In the emulator platform the default resolution behaviour is the
+same as when this variable is non-zero, therefore loading all SAAs.
+
+This variable is changed at ROM build time using the patchdata obey keyword.
+See Symbian OS Developer Library documentation on how to patch DLL data exports.
+@file
+
+@publishedPartner
+@released
+*/
+IMPORT_C extern const TUint8 KCafLoadPostProductionAgents;
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/protectedstreamdesc.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,90 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#ifndef PROTECTEDSTREAMDESC_H
+#define PROTECTEDSTREAMDESC_H
+
+#include <e32base.h>
+
+// Should be removed if and when direct TInetAddr usage is removed.
+#include <in_sock.h>
+
+class TInetAddr;
+
+class RSubConnection;
+
+namespace StreamAccess
+ {
+
+ class CKeyStreamSink;
+ /**
+ Represents parameters for the protected stream. Specific subclasses of this interface are used to define parameters relevant to
+ the protection layer.
+ Instances of this interface are created by the clients of the consumer interface before calling CKeyStreamDecoder::NewL
+ */
+ class CProtectedStreamDesc : public CBase
+ {
+ public:
+ /**
+ Instantiates the correct implementation of key stream sink. Should be used for creating the binding between
+ the short-term key stream that delivers the decryption keys for the traffic and the protocol which protects the
+ traffic itself, e.g. IPSec, ISMACryp
+ */
+ virtual CKeyStreamSink* CreateKeyStreamSinkLC() const = 0;
+ virtual ~CProtectedStreamDesc() {}
+ };
+
+ /**
+ Represents a media stream protected by IPSec.
+ @see StreamAccess::CProtectedStreamDesc
+ */
+ NONSHARABLE_CLASS(CIpSecProtectedStreamDesc) : public CProtectedStreamDesc
+ {
+ public:
+ /**
+ Create a description of media stream protected by IPSec.
+
+ @param aSourceAddr Source connection address.
+ @param aTargetAddr Target connection address.
+ @return New CIpSecProtectedStreamDesc instance
+
+ */
+ IMPORT_C static CIpSecProtectedStreamDesc* NewLC(const TInetAddr& aSourceAddr, const TInetAddr& aTargetAddr);
+
+ /**
+ @see CProtectedStreamDesc::CreateKeyStreamSinkLC()
+ */
+ IMPORT_C CKeyStreamSink* CreateKeyStreamSinkLC() const;
+
+ //Destructor
+ ~CIpSecProtectedStreamDesc();
+
+ private:
+ CIpSecProtectedStreamDesc(const TInetAddr& aSourceAddr, const TInetAddr& aTargetAddr);
+
+ private:
+ TInetAddr iSourceAddr;
+ TInetAddr iTargetAddr;
+
+ };
+ } // namespace StreamAccess
+#endif // PROTECTEDSTREAMDESC_H
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/scaflog.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,43 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements print functions for streaming caf component.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @released
+*/
+
+#ifndef SCAFLOG_H
+#define SCAFLOG_H
+
+#include "securitylog.h"
+
+namespace StreamAccess
+ {
+ _LIT8(KComponentName, "[SCAF]");
+
+ #define DEBUG_PRINTF(a) {SEC_DEBUG_PRINTF(KComponentName, a);}
+ #define DEBUG_PRINTF2(a, b) {SEC_DEBUG_PRINTF2(KComponentName, a, b);}
+ #define DEBUG_PRINTF3(a, b, c) {SEC_DEBUG_PRINTF3(KComponentName, a, b, c);}
+ #define DEBUG_PRINTF4(a, b, c, d) {SEC_DEBUG_PRINTF4(KComponentName, a, b, c, d);}
+ #define DEBUG_PRINTF5(a, b, c, d, e) {SEC_DEBUG_PRINTF5(KComponentName, a, b, c, d, e);}
+
+ #define DEBUG_CODE_SECTION(a) {SEC_DEBUG_CODE_SECTION(a);}
+
+ } // End of namespace StreamAccess
+
+#endif // SCAFLOG_H
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/streamagentfactory.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,93 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#ifndef STREAMAGENTFACTORY_H
+#define STREAMAGENTFACTORY_H
+
+#include <caf/streaming/keystreamsink.h>
+#include <caf/streaming/streamagentinterface.h>
+#include <e32base.h>
+#include <ecom/ecom.h>
+#include <ecom/implementationproxy.h>
+
+class CSdpMediaField;
+class CSdpDocument;
+
+namespace StreamAccess
+ {
+
+ /**
+ Abstract interface handed out by an ECOM agent implementation by REComSession::CreateImplementationL().
+
+ CStreamAgentFactory defines an abstract factory that is responsible for creating instances of CKeyStreamDecoder.
+
+ Derived classes will hand out concrete product implementations which are specific for that particular agent.
+
+ Derived classes effectively represent the ECOM session handle used by Streaming CAF classes.
+
+ */
+ class CStreamAgentFactory : public CBase
+ {
+ public:
+ /** Destructor. */
+ IMPORT_C ~CStreamAgentFactory();
+
+ /**
+ Factory function that creates a CAgentKeyStreamDecoder object for decoding and applying the short-term key stream.
+
+ @param aKeyStreamSink The reference to the necessary CKeyStreamSink object used to create the binding between
+ the short-term key stream that delivers the decryption keys for the traffic and the protocol which protects the
+ traffic itself.
+
+ NOTE: A copy of the key stream sink is made by the stream agent implementation during construction. This means
+ that the local copy can be destroyed once it has been used to retrieve a handle to the desired CAgentKeyStreamDecoder
+ object.
+
+ @param aSdpKeyStream Conatins the metadata for the SDP key management scheme of the stream
+ @param aSdpDoc Contains a collection of SDP fields and values describing session.
+ @return A pointer to the CAgentKeyStreamDecoder object. Ownership on the object is transferred to the client of the interface.
+ @return NULL if the agent does not support the key management scheme specified in the SDP key stream definition.
+ @leave KErrPermissionDenied if the process does not have the rights to instantiate key stream decoders.
+ @leave ... One of the system-wide error codes.
+ */
+ virtual CAgentKeyStreamDecoder* GetKeyStreamDecoderL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc) = 0;
+
+ /**
+ Function to determine whether the stream agent supports the key management scheme specified in the SDP key stream definition
+
+ @param aSdpKeyStream Conatins the metadata for the SDP key management scheme of the stream
+ @return ETrue if the stream agent recognises the SDP format and is able to decode the key stream
+ @return EFalse if the stream agent fails to recofnise the SDP format or is unable to decode the key stream
+ */
+ virtual TBool IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream) = 0;
+
+ protected:
+ /** Constructor. */
+ IMPORT_C CStreamAgentFactory();
+ };
+
+ /** Hosting the Stream Agent Factory Interface UID. */
+ const TUid KUidStreamAgentFactoryInterface = {0x10285890};
+
+ } // namespace StreamAccess
+#endif // STREAMAGENTFACTORY_H
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/streamagentinfo.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,117 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @internalComponent
+ @released
+*/
+
+#ifndef STREAMAGENTINFO_H
+#define STREAMAGENTINFO_H
+
+#include <e32base.h>
+
+class CImplementationInformation;
+class CSdpMediaField;
+
+namespace StreamAccess
+ {
+
+ class CStreamAgentFactory;
+
+ /* Stores information regarding a Stream Agent interface plug-in implementation.
+ *
+ * Registration data from the plug-in's resource file and details about the
+ * agents decryption capabilities are contained so that the stream agents credentials
+ * can be obtained without the need to instantiate an instantce of it.
+ *
+ * If an instance of the agent is required, the StreamAgentFactoryL() method provides a
+ * handle to it's factory object.
+ */
+ class CStreamAgentInfo : public CBase
+ {
+ public:
+
+ /* Constructs a new instance of CStreamAgentInfo and pushs it onto the cleanup stack
+ * @param aImplementationInfo Contains regristration information relating to the stream
+ * agent interface implementation
+ * @return Pointer to the new CStreamAgentInfo object
+ */
+ static CStreamAgentInfo* NewLC(const CImplementationInformation& aImplementationInfo);
+
+ /* Destructor
+ */
+ ~CStreamAgentInfo();
+
+ /* Returns the name of the stream agent plug-in implementation
+ * @return Name of the steam agent interface implementation
+ */
+ const TDesC& Name() const;
+
+ /* Returns the implementation UID of the stream agent plug-in DLL
+ * @return Implementation UID of the stream agent plug-in DLL
+ */
+ TUid ImplementationUid() const;
+
+ /* Determines whether the stream agent is capable of decoding the specified key stream
+ * @param aSdpKeyStream Conatins the metadata for SDP key management scheme of the stream
+ * @return ETrue if the stream agent recognises the SDP format and is able to
+ * decode the key stream
+ * @return EFalse if the stream agent fails to recognise the SDP format or is unable to
+ * decode the key stream
+ */
+ TBool IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream) const;
+
+ /* Returns a handle to the stream agents factory.
+ *
+ * The factory is instantiated once and can then be called many times. This method
+ * DOES NOT transfer ownership of the factory to the calling client.
+ *
+ * @return Reference to the CStreamAgentFactory instance
+ */
+ CStreamAgentFactory& StreamAgentFactory() const;
+
+ protected:
+
+ /* Constructor
+ */
+ CStreamAgentInfo();
+
+ /* Second phase of construction for CStreamAgentInfo
+ * @param aImplementationInfo Contains registration information relating to the stream
+ * agent interface implementation
+ */
+ void ConstructL(const CImplementationInformation& aImplementationInfo);
+
+ private:
+
+ /* Name of the stream agent plug-in implementation
+ */
+ HBufC* iName;
+
+ /* Implementation UID of the stream agent plug-in DLL
+ */
+ TUid iImplementationUid;
+
+ /* Stream agent factory handle used to generate instances of the agent key stream decoder
+ */
+ CStreamAgentFactory* iStreamAgentFactory;
+
+ // ECOM session key. This is set by REComSession::CreateImplementationL() during construction
+ TUid iEcomKey;
+ };
+ } // namespace StreamAccess
+#endif /*STREAMAGENTINFO_H*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/streamagentinterface.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,69 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#ifndef STREAMAGENTINTERFACE_H
+#define STREAMAGENTINTERFACE_H
+
+#include <e32base.h>
+#include <f32file.h>
+#include <caf/streaming/streamcaftypes.h>
+
+#include <caf/rightsinfo.h>
+
+namespace StreamAccess
+ {
+
+ class CAgentKeyStreamDecoder : public CBase
+ {
+ public:
+
+ /** Destructor. */
+ IMPORT_C virtual ~CAgentKeyStreamDecoder();
+
+ /**
+ @see CKeyStreamDecoder::GetAttributeL
+ */
+ virtual void GetAttributeL(const TAttribute& aAttribute, TBool& aValue) =0;
+
+ /**
+ @see CKeyStreamDecoder::GetStringAttributeL
+ */
+ virtual HBufC* GetStringAttributeLC(const TStringAttribute& aAttribute) =0;
+
+ /** Gets information data about the post-delivery rights objects for the protected service/content.
+ Used when the content is imported into protected file storage for later viewing.
+
+ @param aFile A reference to the rights object file handle. The file handle must be closed by the client application.
+ @param aCid The content Id of the post-acquisition rights object.
+ @param aRightsMimeType The mime type of the rights object file.
+ @param aContentMimeType The mime type of the content which is recorded.
+ @leave KErrCANotSupported if the protection scheme does not have or is not capable of exporting rights info.
+ @leave Otherwise one of the other system-wide error codes.
+ */
+ virtual void GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType) =0;
+
+protected:
+ /** Constructor.*/
+ IMPORT_C CAgentKeyStreamDecoder();
+ };
+ } // namespace StreamAccess
+#endif // STREAMAGENTINTERFACE_H
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/streamagentresolver.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,103 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @internalComponent
+ @released
+*/
+
+#ifndef STREAMAGENTRESOLVER_H
+#define STREAMAGENTRESOLVER_H
+
+#include <e32base.h>
+#include <ecom/ecom.h>
+#include "streamagentinfo.h"
+
+namespace StreamAccess
+ {
+
+ class CStreamAgentInfo;
+
+ /**
+ * Responsible for the identification of stream agent ECOM plug-in implementations and
+ * the selection of the most appropriate agent based on the key stream session description
+ * metadata and plug-in resource file information.
+ */
+ class CStreamAgentResolver : public CBase
+ {
+ public:
+
+ /* Constructs a new instance of CStreamAgentResolver and pushs it onto the cleanup stack
+ * @return Pointer to the new CStreamAgentResolver object
+ */
+ static CStreamAgentResolver* NewLC();
+
+ /* Destructor
+ */
+ ~CStreamAgentResolver();
+
+ /* Resolves a stream agent by the SDP (Session Description Protocol) media description
+ * of the key stream.
+ * @param aSdpKeyStream SDP media description of the key stream
+ * @return Reference to the CStreamAgentInfo instance for the chosen Stream Agent, capable
+ * of decoding the key stream.
+ * NOTE: The lifetime of the returned reference is limited by the lifetime of the resolver.
+ * The CStreamAgentInfo reference cannot be used after the CStreamAgentResolver object is
+ * destroyed.
+ * @leave KErrCANoAgent No stream agent can be found that supports the given SDP key management
+ * description
+ * @leave One of the system-wide error codes
+ */
+ CStreamAgentInfo& ResolveSdpKeyStreamL(const CSdpMediaField& aSdpKeyStream) const;
+
+ protected:
+
+ /* Constructor
+ */
+ CStreamAgentResolver();
+
+ /* Second phase of construction for CStreamAgentResolver
+ */
+ void ConstructL();
+
+ private:
+
+ /* Constructs a list of information about plug-in implementations located
+ * by the ECOM framework that satisfy the stream agent interface.
+ */
+ void BuildStreamAgentListL();
+
+ /* Adds a new instance of a stream agent to the CStreamAgentInfo array
+ * @param aAgentInfo Registration data regarding the stream agent interface implementation,
+ * retrieved from the associated resource file
+ */
+ void AddStreamAgentL(const CImplementationInformation& aAgentInfo);
+
+ /* Cleanup Item Operation used when constructing the stream agent list via ECOM
+ * @param aArray Pointer to an RImplInfoPtrArray array which is used by ECOM to store
+ * information about located stream agents implementations
+ */
+ static void CleanAgentImplArray(TAny* aArray);
+
+ private:
+
+ /* Array of information regarding stream agent interface implementations located by ECOM
+ */
+ RPointerArray<CStreamAgentInfo> iStreamAgentInfoArray;
+
+ };
+ } // namespace StreamAccess
+#endif /*STREAMAGENTRESOLVER_H*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/streamcaftypes.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,65 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// This file contains enumerations and constants used in the StreamAccess functionality of the Content Access Framework
+// content access framework
+//
+//
+
+/**
+ @file
+ @publishedPartner
+ @released
+*/
+
+#ifndef STREAM_CAF_TYPES_H
+#define STREAM_CAF_TYPES_H
+
+/**
+@namespace StreamAccess
+StreamAccess namespace defines protection functionality specific for streams.
+*/
+namespace StreamAccess
+ {
+ /**
+ The list of stream access attributes. Each of these attributes has a
+ value that is either ETrue or EFalse unless otherwise specified.\n
+ Remember to update any streaming DRM agents if new values are added here.
+ */
+ enum TAttribute
+ {
+ EIsProgramProtected = 0, ///< The specific program is protected
+ EIsServiceProtected = 1, ///< The whole service is protected
+ ECanExport = 2, ///< The content can be exported
+ EMustProtectIfRecording = 3, ///< The content must be protected if recorded. If ECanRecord is EFalse, then this attribute is undefined.
+ ECanPlay = 4, ///< The content can be played
+ EAgentSpecificAttributeBase = 32768 ///< Base index the agents should use when implementing new agent specific attributes
+ };
+
+
+
+ /** The list of generic string attributes. Each of these attributes has a value that is returned to the client as a string.
+ Remember to update any DRM agents if new values are added here.
+ */
+ enum TStringAttribute
+ {
+ ERating = 0, ///< Rating of the protected content
+ ECountry = 1, ///< Target country of the content
+ ERightsIssuerURI = 2, ///< URI where the rights for this content may be acquired from
+ EContentID = 3, ///< Content ID
+ EAgentSpecificStringAttributeBase = 32768 ///< Base index the agents should use when implementing new string attributes
+ };
+ } // Namespace StreamAccess
+
+#endif // STREAM_CAF_TYPES_H
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/streamingcaf.iby Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,30 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#ifndef __STREAMINGCAF_IBY__
+#define __STREAMINGCAF_IBY__
+
+file=ABI_DIR\BUILD_DIR\streamingcaf.dll System\Libs\streamingcaf.dll
+
+// When CAF_LOAD_POST_PRODUCTION_AGENTS is defined CAF run-time agent
+// resolution will load all Stream Access Agents (SAAs) visible to
+// the ECOM service. By default it is not defined - only ROM based SAAs
+// are used for agent resolution.
+
+#ifdef CAF_LOAD_POST_PRODUCTION_AGENTS
+patchdata streamingcaf.dll@KCafLoadPostProductionAgents 0x01
+#endif
+
+#endif
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/inc/tscaf.iby Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,60 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+
+#ifndef __TSCAF_IBY__
+#define __TSCAF_IBY__
+
+#include <testexecute.iby>
+#include "scs.iby"
+
+define ZDRIVE \epoc32\data\Z
+
+REM Streaming CAF Tests
+
+// Test Streaming CAF Agent binaries
+file=ABI_DIR\BUILD_DIR\tscaf.exe \sys\bin\tscaf.exe
+file=ABI_DIR\BUILD_DIR\staserver.exe \sys\bin\staserver.exe
+file=ABI_DIR\BUILD_DIR\staclient.dll \sys\bin\staclient.dll
+file=ABI_DIR\BUILD_DIR\stashared.dll \sys\bin\stashared.dll
+
+// Test Streaming CAF Agent plugin
+ECOM_PLUGIN(tscaf_streamagent01.dll, tscaf_streamagent01.rsc)
+ECOM_PLUGIN(tscaf_streamagent02.dll, tscaf_streamagent02.rsc)
+ECOM_PLUGIN(tscaf_singleprocess_streamagent.dll, tscaf_singleprocess_streamagent.rsc)
+
+// Test Streaming CAF Agent scripts
+data = ZDRIVE\tcaf\tscaf\tscaf.ini \tcaf\tscaf\tscaf.ini
+data = ZDRIVE\tcaf\tscaf\tscaf.script \tcaf\tscaf\tscaf.script
+data = ZDRIVE\tcaf\tscaf\tscafipsec.script \tcaf\tscaf\tscafipsec.script
+data = ZDRIVE\tcaf\tscaf\tscafipsecmanual.script \tcaf\tscaf\tscafipsecmanual.script
+
+// Test Streaming CAF Agent data
+data = ZDRIVE\tcaf\tscaf\data\rosimple.dr \tcaf\tscaf\data\rosimple.dr
+data = ZDRIVE\tcaf\tscaf\data\roexpired.dr \tcaf\tscaf\data\roexpired.dr
+data = ZDRIVE\tcaf\tscaf\data\roprogramprotected.dr \tcaf\tscaf\data\roprogramprotected.dr
+data = ZDRIVE\tcaf\tscaf\data\roserviceprotected.dr \tcaf\tscaf\data\roserviceprotected.dr
+data = ZDRIVE\tcaf\tscaf\data\rorecordable.dr \tcaf\tscaf\data\rorecordable.dr
+data = ZDRIVE\tcaf\tscaf\data\postacquisitiontest.dr \tcaf\tscaf\data\postacquisitiontest.dr
+
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_programprotect01.dr \tcaf\tscaf\data\tscaf_rights_programprotect01.dr
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_programprotect02.dr \tcaf\tscaf\data\tscaf_rights_programprotect02.dr
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_programprotect03.dr \tcaf\tscaf\data\tscaf_rights_programprotect03.dr
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_serviceprotect01.dr \tcaf\tscaf\data\tscaf_rights_serviceprotect01.dr
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_serviceprotect02.dr \tcaf\tscaf\data\tscaf_rights_serviceprotect02.dr
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_serviceprotect03.dr \tcaf\tscaf\data\tscaf_rights_serviceprotect03.dr
+data = ZDRIVE\tcaf\tscaf\data\tscaf_rights_expired01.dr \tcaf\tscaf\data\tscaf_rights_expired01.dr
+
+#endif
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/ipsec/ipseckeyassociation.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,60 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <caf/streaming/keyassociation.h>
+#include <e32cmn.h>
+#include <e32def.h>
+
+using namespace StreamAccess;
+
+EXPORT_C CIpSecKeyAssociation* CIpSecKeyAssociation::NewL(TInt32 aSpi, HBufC8* aEncryptionKey,
+ HBufC8* aAuthenticationKey)
+{
+ CIpSecKeyAssociation* self = CIpSecKeyAssociation::NewLC(aSpi, aEncryptionKey, aAuthenticationKey);
+ CleanupStack::Pop(self);
+ return self;
+}
+
+EXPORT_C CIpSecKeyAssociation* CIpSecKeyAssociation::NewLC(TInt32 aSpi, HBufC8* aEncryptionKey,
+ HBufC8* aAuthenticationKey)
+{
+ CIpSecKeyAssociation* self = new (ELeave) CIpSecKeyAssociation(aSpi, aEncryptionKey, aAuthenticationKey);
+ CleanupStack::PushL(self);
+ return self;
+}
+
+CIpSecKeyAssociation::CIpSecKeyAssociation(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) :
+ iSpi(aSpi), iEncryptionKey(aEncryptionKey),
+ iAuthenticationKey(aAuthenticationKey)
+{
+}
+
+
+TInt32 CIpSecKeyAssociation::GetSpiL() const
+{
+ return iSpi;
+}
+
+const HBufC8* CIpSecKeyAssociation::GetEncryptionKeyL() const
+{
+ return iEncryptionKey;
+}
+
+const HBufC8* CIpSecKeyAssociation::GetAuthenticationKeyL() const
+{
+ return iAuthenticationKey;
+}
+
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/ipsec/ipseckeystreamsink.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,366 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include "ipseckeystreamsink.h"
+#include <caf/streaming/keyassociation.h>
+#include <networking/pfkeyv2.h>
+#include <s32mem.h>
+#include "scaflog.h"
+
+using namespace StreamAccess;
+
+// The last two rules: (inbound = {}, outbound = {}) are catch-all rules - without them, all packets
+// which do not match the policy will get rejected
+_LIT8( KPolicyFormat,
+"SECURITY_FILE_VERSION: 3\r\n[INFO]\r\n\
+Test CAF IpSec Integration Policy\r\n\
+[POLICY]\r\n\
+sa caf_sas = {\r\n\
+esp\r\n\
+encrypt_alg %d\r\n\
+auth_alg %d\r\n\
+src_specific\r\n\
+local_port_specific\r\n\
+remote_port_specific\r\n\
+}\r\n\
+inbound local %S 255.255.255.255 local_port %d remote_port %d = { caf_sas() }\r\n\
+inbound = {}\r\n\
+outbound = {}\r\n" );
+
+// The number is taken as the maximal recommendation from OMA DRM BCAST standard (section 9.1, IPSec management)
+const TUint KDefaultMaxSpiNumber = 3;
+
+CIpSecKeyStreamSink* CIpSecKeyStreamSink::NewLC(const TInetAddr& aSrcAddr, const TInetAddr& aDstAddr)
+ {
+ CIpSecKeyStreamSink* self = new (ELeave) CIpSecKeyStreamSink(aSrcAddr, aDstAddr);
+ CleanupStack::PushL(self);
+ self->ConstructL();
+ return self;
+ }
+
+CIpSecKeyStreamSink::CIpSecKeyStreamSink(const TInetAddr& aSrcAddr, const TInetAddr& aDstAddr) :
+ iSourceAddr(aSrcAddr),
+ iDestinationAddr(aDstAddr),
+ iPolicySet(EFalse),
+ iMaxSpiNumber(KDefaultMaxSpiNumber)
+ {
+ }
+
+CIpSecKeyStreamSink::~CIpSecKeyStreamSink()
+ {
+ // Remove all SA-s
+ TInt submittedSaCount = iSubmittedSpiList.Count();
+ for (TInt i = 0; i < submittedSaCount; ++i)
+ {
+ TRAP_IGNORE(RemoveSaL(iSubmittedSpiList[i]));
+ }
+
+ if (iPolicySet)
+ {
+ TRequestStatus status;
+ iPolicyServer.UnloadPolicy( iPolicyHandle(), status );
+ User::WaitForRequest(status);
+ // Impossible to handle the error well in destructor - ignore the status code
+ }
+
+ iSADB.Close();
+ iSocketServ.Close();
+
+ iPolicyServer.Close();
+ iSubmittedSpiList.Close();
+ }
+
+void CIpSecKeyStreamSink::ConstructL()
+ {
+ DEBUG_PRINTF(_L("Constructing an IPSec key stream sink."));
+ User::LeaveIfError(iSocketServ.Connect());
+ User::LeaveIfError(iSADB.Open(iSocketServ));
+ User::LeaveIfError(iPolicyServer.Connect());
+ DEBUG_PRINTF(_L("Constructed an IPSec key stream sink."));
+ }
+
+CKeyStreamSink* CIpSecKeyStreamSink::CloneLC() const
+ {
+ CIpSecKeyStreamSink *ret = CIpSecKeyStreamSink::NewLC(iSourceAddr, iDestinationAddr);
+ ret->iEncAlg = this->iEncAlg;
+ ret->iAuthAlg = this->iAuthAlg;
+ return ret;
+ }
+
+static TUint32 ConvertToNetworkOrder(TUint32 aNum)
+ {
+ const TInt KMaxTUint32CStringLen = 11;
+ TUint8 temp[ KMaxTUint32CStringLen ];
+ LittleEndian::Put32( temp, aNum );
+ return BigEndian::Get32( temp );
+ }
+
+TBool CIpSecKeyStreamSink::CompareReceivedMessageExtensionsL(TPfkeyRecvMsg &aReceivedReply, TUint32 aSpi) const
+ {
+ TBool spiVerified(EFalse), destAddrVerified(EFalse);
+
+ TPfkeyAnyExt ext;
+
+ // We verify that both the SPI matches and the destination address matches - this should exclude
+ // replies to unrelated messages
+ while ( !spiVerified || !destAddrVerified )
+ {
+ // Both extensions should be found in the reply
+ User::LeaveIfError(aReceivedReply.NextExtension(ext));
+ TInt extType = ext.ExtType();
+ if ( extType == SADB_EXT_ADDRESS_DST )
+ {
+ const TInetAddr* addr = reinterpret_cast<const TInetAddr *>(ext.Ptr() + sizeof(struct sadb_address));
+ if (*addr == iDestinationAddr)
+ destAddrVerified = ETrue;
+ else
+ return EFalse;
+ }
+ else if (extType == SADB_EXT_SA)
+ {
+ const sadb_sa* saExt = reinterpret_cast<const sadb_sa *>(ext.Ptr());
+ if (saExt->sadb_sa_spi == aSpi)
+ spiVerified = ETrue;
+ else
+ return EFalse;
+ }
+ }
+ return ETrue;
+ }
+
+void CIpSecKeyStreamSink::SynchronousSendAndVerifyMessageL(TPfkeySendMsg& aMessage, TInt aMessageType, TUint32 aSpi)
+ {
+ // Wait for the message to be sent
+ TRequestStatus status;
+ iSADB.FinalizeAndSend(aMessage, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ // Receive a reply - since SADB sends replies to _all_ sockets, we need to filter out replies
+ // which do not correspond to our own request
+ for(;;)
+ {
+ TPfkeyRecvMsg receivedReply;
+ iSADB.ReadRequest(receivedReply, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ // Verify that the message is a reply to the one sent by us
+ sadb_msg &msgHeader = receivedReply.MsgHdr();
+ if (msgHeader.sadb_msg_pid != RProcess().Id())
+ continue;
+ if (msgHeader.sadb_msg_seq != iSequenceNumber)
+ continue;
+ // Do additional validation by checking whether the destination address and the SPI are the same as ours
+ TBool isResponseToRequest(ETrue);
+ switch (aMessageType)
+ {
+ case SADB_ADD:
+ case SADB_DELETE:
+ isResponseToRequest = CompareReceivedMessageExtensionsL(receivedReply, aSpi);
+ break;
+ default:
+ ASSERT(0); // Unexpected state
+ }
+ if (!isResponseToRequest)
+ continue;
+ // If the message types does not match, then the problem is internal in IPSec - it should not answer with a different message type
+ if (msgHeader.sadb_msg_type != aMessageType)
+ User::Leave(KErrArgument);
+ if (msgHeader.sadb_msg_errno != 0)
+ {
+ // Mimic the logic in IPSec error handling (see the Update function in key_msg.cpp)
+ TUint16 reservedField = (TUint16)msgHeader.sadb_msg_reserved << 8;
+ TUint16 errnoField = msgHeader.sadb_msg_errno;
+ User::Leave(-(reservedField + errnoField));
+ }
+ break;
+ }
+ }
+
+void CIpSecKeyStreamSink::AddAssociationL(TPfkeySendMsg& aMessage, TUint32 aSpi)
+ {
+ SynchronousSendAndVerifyMessageL(aMessage, SADB_ADD, aSpi);
+
+ // Take care to delete old SA-s, if needed
+ iSubmittedSpiList.AppendL(aSpi);
+ if (iSubmittedSpiList.Count() > iMaxSpiNumber)
+ {
+ RemoveSaL(iSubmittedSpiList[0]);
+ iSubmittedSpiList.Remove(0);
+ }
+ }
+
+void CIpSecKeyStreamSink::ProcessNewKeyAssociationL(const CKeyAssociation& aKeyAssociation)
+ {
+ if (!iPolicySet)
+ {
+ SetPolicyL();
+ }
+ // No official RTTI support, using static_cast - no validation that it is indeed an IPSec association
+ const CIpSecKeyAssociation* ipsecKeyAssociation = static_cast<const CIpSecKeyAssociation *>(&aKeyAssociation);
+
+ DEBUG_PRINTF2(_L("IPSec key stream sink - processing new association with SPI %d."), ipsecKeyAssociation->GetSpiL());
+
+ // We use ESP, since there is very low probability that AH will be used - it does not provide confidentiality
+ TPfkeySendMsg sendMessage(SADB_ADD, SADB_SATYPE_ESP, ++iSequenceNumber, RProcess().Id());
+ TUint32 bigEndianSpi(ConvertToNetworkOrder(ipsecKeyAssociation->GetSpiL()));
+ sendMessage.Add( Int2Type<SADB_EXT_SA>(), bigEndianSpi, iAuthAlg, iEncAlg);
+ const HBufC8 *encryptionKey(ipsecKeyAssociation->GetEncryptionKeyL());
+ if(!encryptionKey)
+ User::Leave(KErrArgument);
+
+ sendMessage.Add( Int2Type<SADB_EXT_KEY_ENCRYPT>(), *encryptionKey, encryptionKey->Length() * 8);
+ if (iAuthAlg) // Authentication is optional - use it only if algorithm has been set
+ {
+ const HBufC8 *authenticationKey(ipsecKeyAssociation->GetAuthenticationKeyL());
+ if (!authenticationKey)
+ User::Leave(KErrArgument);
+ sendMessage.Add( Int2Type<SADB_EXT_KEY_AUTH>(), *authenticationKey, authenticationKey->Length() * 8);
+ }
+ sendMessage.Add( Int2Type<SADB_EXT_ADDRESS_SRC>(), iSourceAddr);
+ sendMessage.Add( Int2Type<SADB_EXT_ADDRESS_DST>(), iDestinationAddr);
+
+ TRAPD(err, AddAssociationL(sendMessage, bigEndianSpi));
+ // If something went wrong, try to remove the SA, to keep the SADB in consistent state.
+ // We only do our best effort, since the error might be global to the device, or it may have occured before we've added the SA
+ if (err != KErrNone)
+ {
+ TRAP_IGNORE(RemoveSaL(bigEndianSpi));
+ TInt submittedSpiCount = iSubmittedSpiList.Count();
+ if (submittedSpiCount > 0 && iSubmittedSpiList[submittedSpiCount - 1] == bigEndianSpi)
+ iSubmittedSpiList.Remove(submittedSpiCount - 1);
+
+ User::Leave(err);
+ }
+ DEBUG_PRINTF2(_L("IPSec key stream sink - processed new association with SPI %d."), ipsecKeyAssociation->GetSpiL());
+ }
+
+void CIpSecKeyStreamSink::RemoveSaL(TUint32 aSpi)
+ {
+ TPfkeySendMsg sendMessage(SADB_DELETE, SADB_SATYPE_ESP, ++iSequenceNumber, RProcess().Id());
+ sendMessage.Add( Int2Type<SADB_EXT_SA>(), aSpi, iAuthAlg, iEncAlg);
+ sendMessage.Add( Int2Type<SADB_EXT_ADDRESS_DST>(), iDestinationAddr);
+ SynchronousSendAndVerifyMessageL(sendMessage, SADB_DELETE, aSpi);
+ }
+
+void CIpSecKeyStreamSink::VerifyAssociationsNotSentL() const
+ {
+ if (iSubmittedSpiList.Count())
+ {
+ User::Leave(KErrNotSupported); // It is forbidden to change the algorithm once associations have been processed
+ }
+ }
+
+const TUint32 SADB_AALG_AESCBC = 12; // temporarily here until IPSec supports AES constants
+
+void CIpSecKeyStreamSink::SetEncryptionAlgorithmL(const TEncryptionAlgorithm& aEncryptionAlgorithm)
+ {
+ VerifyAssociationsNotSentL();
+ switch (aEncryptionAlgorithm)
+ {
+ case EAES_128_CBC: iEncAlg = SADB_AALG_AESCBC; break;
+ case ENoEncryption:
+ case EAES_128_CTR:
+ default: User::Leave(KErrNotSupported);
+ };
+ }
+
+void CIpSecKeyStreamSink::SetAuthenticationAlgorithmL(const TAuthenticationAlgorithm& aAuthenticationAlgorithm)
+ {
+ VerifyAssociationsNotSentL();
+ switch (aAuthenticationAlgorithm)
+ {
+ case EHMAC_SHA1: iAuthAlg = SADB_AALG_SHA1HMAC; break;
+ case ENoAuthentication: iAuthAlg = 0; break;
+ default: User::Leave(KErrNotSupported);
+ };
+ }
+
+const TUint KInet6AddrMaxBufferSize = 40;
+
+void CIpSecKeyStreamSink::SetPolicyL()
+ {
+ DEBUG_PRINTF(_L("IPSec key stream sink - setting policy."));
+ ASSERT(!iPolicySet);
+
+ TBuf<KInet6AddrMaxBufferSize> destAddrStr;
+ iDestinationAddr.Output(destAddrStr);
+
+ // Convert 16-bit to 8-bit. For some strange reason, the string for IP address is returned in 16-bit.
+ TBuf8<KInet6AddrMaxBufferSize> destAddrStr8bit;
+ destAddrStr8bit.Copy(destAddrStr);
+
+ HBufC8 *policyData = HBufC8::NewLC( KPolicyFormat().Length() + 256); // Allow size for port and IP spec.
+ TPtr8 policyDataPtr(policyData->Des());
+ policyDataPtr.AppendFormat(KPolicyFormat, iEncAlg, iAuthAlg, &destAddrStr8bit, iDestinationAddr.Port(),
+ iSourceAddr.Port());
+
+ // Load the server-side policy to protect all packets to a specific port
+ TRequestStatus status;
+ iPolicyServer.LoadPolicy( *policyData, iPolicyHandle, status );
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ iPolicyServer.ActivatePolicy( iPolicyHandle(), status );
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ CleanupStack::PopAndDestroy(policyData);
+ iPolicySet = ETrue;
+ DEBUG_PRINTF(_L("IPSec key stream sink - policy set."));
+ }
+
+static void ReadIpAddrFromStreamL(RReadStream& aStream, TInetAddr& addr)
+ {
+ TBuf<KInet6AddrMaxBufferSize> addrStr;
+ TUint8 addrStrLen = aStream.ReadUint8L();
+ aStream.ReadL(addrStr, addrStrLen);
+ User::LeaveIfError(addr.Input(addrStr));
+ TInt port = aStream.ReadInt32L();
+ addr.SetPort(port);
+ }
+
+static void WriteIpAddrToStreamL(RWriteStream& aStream, const TInetAddr& addr)
+ {
+ TBuf<KInet6AddrMaxBufferSize> addrStr;
+ addr.Output(addrStr);
+ aStream.WriteUint8L(addrStr.Length());
+ aStream.WriteL(addrStr);
+ aStream.WriteInt32L(addr.Port());
+ }
+
+void CIpSecKeyStreamSink::DoExternalizeL(RWriteStream& aStream) const
+ {
+ aStream.WriteUint16L(CKeyStreamSink::EIpSecSinkId);
+ WriteIpAddrToStreamL(aStream, iDestinationAddr);
+ WriteIpAddrToStreamL(aStream, iSourceAddr);
+ aStream.WriteUint16L(iEncAlg);
+ aStream.WriteUint16L(iAuthAlg);
+ }
+
+CIpSecKeyStreamSink* CIpSecKeyStreamSink::NewLC(RReadStream& aReadStream)
+ {
+ TInetAddr destAddr;
+ ReadIpAddrFromStreamL(aReadStream, destAddr);
+ TInetAddr srcAddr;
+ ReadIpAddrFromStreamL(aReadStream, srcAddr);
+ CIpSecKeyStreamSink* self = new (ELeave) CIpSecKeyStreamSink(srcAddr, destAddr);
+ CleanupStack::PushL(self);
+ self->ConstructL();
+ self->iEncAlg = aReadStream.ReadUint16L();
+ self->iAuthAlg = aReadStream.ReadUint16L();
+ return self;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/ipsec/ipseckeystreamsink.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,86 @@
+/*
+* Copyright (c) 2007 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description:
+*
+*/
+
+
+/**
+@file
+
+@internalComponent
+@released
+*/
+
+#include <caf/streaming/keystreamsink.h>
+#include <caf/streaming/keyassociation.h>
+
+#include <in_sock.h>
+#include <lib_pfkey.h>
+#include <pfkey_send.h>
+#include <ipsecpolapi.h>
+
+#ifndef __IPSECKEYSTREAMSINK_H__
+#define __IPSECKEYSTREAMSINK_H__
+
+class RDesReadStream;
+
+namespace StreamAccess
+{
+ NONSHARABLE_CLASS(CIpSecKeyStreamSink) : public CKeyStreamSink
+ {
+ public:
+ static CIpSecKeyStreamSink* NewLC(RReadStream& aReadStream);
+ static CIpSecKeyStreamSink* NewLC(const TInetAddr& aSrcAddr, const TInetAddr& aDstAddr);
+ ~CIpSecKeyStreamSink();
+
+ // CKeyStreamSink interface
+ CKeyStreamSink* CloneLC() const;
+ void ProcessNewKeyAssociationL(const CKeyAssociation& aKeyAssociation);
+ void SetEncryptionAlgorithmL(const TEncryptionAlgorithm& aEncryptionAlgorithm);
+ void SetAuthenticationAlgorithmL(const TAuthenticationAlgorithm& aAuthenticationAlgorithm);
+ protected:
+ void DoExternalizeL(RWriteStream& aStream) const;
+ private:
+ void ConstructL();
+ void SetPolicyL();
+ void RemoveSaL(TUint32 aSpi);
+ void SynchronousSendAndVerifyMessageL(TPfkeySendMsg& aMessage, TInt aMessageType, TUint32 aSpi);
+ TBool CompareReceivedMessageExtensionsL(TPfkeyRecvMsg &aReceivedReply, TUint32 aSpi) const;
+ void VerifyAssociationsNotSentL() const;
+ CIpSecKeyStreamSink(const TInetAddr& aSrcAddr, const TInetAddr& aDstAddr);
+ void AddAssociationL(TPfkeySendMsg& aMessage, TUint32 aSpi);
+ private:
+ RSocketServ iSocketServ;
+ /** Handle to policy server */
+ RIpsecPolicyServ iPolicyServer;
+ /** Handle to SADB socket */
+ RSADB iSADB;
+ TInetAddr iSourceAddr;
+ TInetAddr iDestinationAddr;
+ TUint8 iAuthAlg;
+ TUint8 iEncAlg;
+ TUint32 iSequenceNumber;
+ /** Signifies whether a security policy has already been set */
+ TBool iPolicySet;
+ TPolicyHandlePckg iPolicyHandle;
+ /** Used for removing old SA-s, managed as a FIFO queue */
+ RArray<TUint32> iSubmittedSpiList;
+ /** Number of supported concurrent SA-s */
+ TInt iMaxSpiNumber;
+ };
+} // namespace StreamAccess
+#endif /* __IPSECKEYSTREAMSINK_H__ */
+
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/ipsec/ipsecprotectedstreamdesc.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,43 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <caf/streaming/protectedstreamdesc.h>
+#include "ipseckeystreamsink.h"
+
+using namespace StreamAccess;
+
+
+EXPORT_C CIpSecProtectedStreamDesc* CIpSecProtectedStreamDesc::NewLC(const TInetAddr& aSourceAddr, const TInetAddr& aTargetAddr)
+ {
+ CIpSecProtectedStreamDesc* self = new (ELeave) CIpSecProtectedStreamDesc(aSourceAddr, aTargetAddr);
+ CleanupStack::PushL(self);
+ return self;
+ }
+
+EXPORT_C CKeyStreamSink* CIpSecProtectedStreamDesc::CreateKeyStreamSinkLC() const
+ {
+ CIpSecKeyStreamSink* keyStreamSink = CIpSecKeyStreamSink::NewLC(iSourceAddr, iTargetAddr);
+ return keyStreamSink;
+ }
+
+CIpSecProtectedStreamDesc::CIpSecProtectedStreamDesc(const TInetAddr& aSourceAddr, const TInetAddr& aTargetAddr) :
+ iSourceAddr(aSourceAddr),
+ iTargetAddr(aTargetAddr)
+ {
+ }
+
+CIpSecProtectedStreamDesc::~CIpSecProtectedStreamDesc()
+ {
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/keyassociation.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,23 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// keystreamsink.cpp
+//
+//
+
+
+#include <caf/streaming/keyassociation.h>
+
+EXPORT_C StreamAccess::CKeyAssociation::~CKeyAssociation()
+{}
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/keystreamdecoder.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,199 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <caf/streaming/keystreamdecoder.h>
+#include <caf/streaming/streamagentfactory.h>
+#include "streamagentresolver.h"
+#include <caf/streaming/protectedstreamdesc.h>
+#include "scaflog.h"
+#include <caf/supplier.h>
+#include <caf/metadataarray.h>
+
+using namespace StreamAccess;
+
+EXPORT_C CKeyStreamDecoder* CKeyStreamDecoder::NewL(const CProtectedStreamDesc& aProtectedStreamDesc, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc)
+ {
+ CKeyStreamDecoder* self = CKeyStreamDecoder::NewLC(aProtectedStreamDesc,aSdpKeyStream,aSdpDoc);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+EXPORT_C CKeyStreamDecoder* CKeyStreamDecoder::NewLC(const CProtectedStreamDesc& aProtectedStreamDesc, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc)
+ {
+ CKeyStreamDecoder* self = new(ELeave) CKeyStreamDecoder();
+ CleanupStack::PushL(self);
+ self->ConstructL(aProtectedStreamDesc,aSdpKeyStream,aSdpDoc);
+ return self;
+ }
+
+CKeyStreamDecoder::CKeyStreamDecoder()
+ {
+ }
+
+CKeyStreamDecoder::~CKeyStreamDecoder()
+ {
+ delete iAgentKeyStreamDecoder;
+ delete iStreamAgentFactory;
+
+ REComSession::DestroyedImplementation(iEcomKey);
+ REComSession::FinalClose();
+ }
+
+void CKeyStreamDecoder::ConstructL(const CProtectedStreamDesc& aProtectedStreamDesc, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc)
+ {
+ DEBUG_PRINTF(_L("Creating a key stream decoder object."));
+
+ // Create an instance of the Stream Agent Resolver
+ CStreamAgentResolver* resolver = CStreamAgentResolver::NewLC();
+
+ /* Retrieve a reference to the CStreamAgentInfo object, associated to the resolved stream agent plugin
+ * capable of supporting the supplied SDP media description
+ */
+ CStreamAgentInfo& agentInfo = resolver->ResolveSdpKeyStreamL(aSdpKeyStream);
+
+ /* Create a handle to the factory object (CStreamAgentFactory) associated to the
+ * resolved stream agent, so that it can be successfully destroyed and freed having been used
+ */
+ iStreamAgentFactory = static_cast<CStreamAgentFactory *>(REComSession::CreateImplementationL(agentInfo.ImplementationUid(), iEcomKey));
+
+ // Instantiate the necessary implementation of key stream sink
+ CKeyStreamSink* keyStreamSink = aProtectedStreamDesc.CreateKeyStreamSinkLC();
+
+ // Retrieve a reference to the stream agents factory
+ CStreamAgentFactory& agentFactory = agentInfo.StreamAgentFactory();
+
+ /* The factory is then used to generate an instance of the CAgentKeyStreamDecoder, using the instantiated key
+ * stream sink and the SDP media description
+ */
+ iAgentKeyStreamDecoder = agentFactory.GetKeyStreamDecoderL(*keyStreamSink,aSdpKeyStream,aSdpDoc);
+
+ CleanupStack::PopAndDestroy(2,resolver); //< keyStreamSink, resolver
+
+ DEBUG_PRINTF(_L("The key stream decoder object has been created successfully."));
+ }
+
+EXPORT_C void CKeyStreamDecoder::GetAttributeL(const TAttribute& aAttribute, TBool& aValue) const
+ {
+ iAgentKeyStreamDecoder->GetAttributeL(aAttribute, aValue);
+ }
+
+EXPORT_C HBufC* CKeyStreamDecoder::GetStringAttributeLC(const TStringAttribute& aAttribute) const
+ {
+ return iAgentKeyStreamDecoder->GetStringAttributeLC(aAttribute);
+ }
+
+
+EXPORT_C ContentAccess::CImportFile* CKeyStreamDecoder::CreateImportSessionLC(const TDesC8& aContentMimeType, const TDesC& aSuggestedName, const TDesC& aOutputDirectory) const
+ {
+ return DoCreateImportSessionLC(aContentMimeType, aSuggestedName, aOutputDirectory);
+ }
+
+EXPORT_C ContentAccess::CImportFile* CKeyStreamDecoder::CreateImportSessionLC(const TDesC8& aContentMimeType) const
+ {
+ return DoCreateImportSessionLC(aContentMimeType, KNullDesC(), KNullDesC());
+ }
+
+ContentAccess::CImportFile* CKeyStreamDecoder::DoCreateImportSessionLC(const TDesC8& aContentMimeType, const TDesC& aSuggestedName, const TDesC& aOutputDirectory) const
+ {
+ DEBUG_PRINTF(_L("Creating an import session for post-acquisition content."));
+
+ // Handle to the post-acquisition rights object file owned by the agent
+ RFile fPostAcq;
+ // The content Id of the pos-acquisition rights object.
+ RBuf8 contentId;
+ contentId.CreateL(KMimeTypesMaxLength);
+ contentId.CleanupClosePushL();
+ // The mime type which will be used to import the rights object
+ RBuf8 mimeTypeRights;
+ mimeTypeRights.CreateL(KMimeTypesMaxLength);
+ mimeTypeRights.CleanupClosePushL();
+ // The mime type which will be used to import the content file.
+ RBuf8 mimeTypeContent;
+ mimeTypeContent.CreateL(KMimeTypesMaxLength);
+ mimeTypeContent.CleanupClosePushL();
+
+ iAgentKeyStreamDecoder->GetPostDeliveryRightsL(fPostAcq, contentId, mimeTypeRights, mimeTypeContent);
+ CleanupClosePushL(fPostAcq);
+
+ DEBUG_PRINTF2(_L8("Post-acquisition RO's Mime Type: (%S)"), &mimeTypeRights);
+ DEBUG_PRINTF2(_L8("Post-acquisition Content's Mime Type: (%S)"), &mimeTypeContent);
+
+ // Create a supplier
+ ContentAccess::CSupplier* supplier = ContentAccess::CSupplier::NewLC();
+ // Check if there is any CAF agent supporting postacquisition rights object import
+ if(!supplier->IsImportSupported(mimeTypeRights))
+ {
+ DEBUG_PRINTF2(_L8("A CAF agent capable of importing (%S) mime type can not be found!"), &mimeTypeRights);
+ User::Leave(KErrNotSupported);
+ }
+ // if everything went successfully, create a file import object and import the rights object
+ // Create meta-data array
+ ContentAccess::CMetaDataArray* metaDataArray = ContentAccess::CMetaDataArray::NewLC();
+
+ // The content Id is provided as suggested name to allow the agent to generate the output file
+ HBufC* roName = HBufC::NewLC(contentId.Length());
+ TPtr roPtr (roName->Des());
+ roPtr.Copy(contentId);
+ // Create the import object for the rights object file
+ ContentAccess::CImportFile* importRo = supplier->ImportFileL(mimeTypeRights, *metaDataArray, *roName);
+ CleanupStack::PopAndDestroy(roName);
+ CleanupStack::PushL(importRo);
+
+ TBuf8<128> buf;
+ TInt dataLen = 0;
+ // Start importing the content of the post-acquisition RO file
+ do
+ {
+ User::LeaveIfError(fPostAcq.Read(buf));
+ dataLen = buf.Length();
+ User::LeaveIfError(importRo->WriteData(buf));
+ } while(dataLen > 0);
+ // Post-acquisition rigths object import is being completed
+ User::LeaveIfError(importRo->WriteDataComplete());
+ CleanupStack::PopAndDestroy(importRo);
+
+ //The meta data field of the content Id. A content Id is passed to an agent through this meta-data field.
+ _LIT8(KMetaDataFieldCid, "cid");
+ // Add the (postacq) RO's content id used to match the content with the RO
+ metaDataArray->AddL(KMetaDataFieldCid(), contentId);
+
+ //The meta data field of the mime type. A mime type is passed to an agent through this meta-data field.
+ _LIT8(KMetaDataFieldMimeType, "mimetype");
+ // Add the mime type of the protected streamed data (e.g. video/3gpp)
+ metaDataArray->AddL(KMetaDataFieldMimeType(), aContentMimeType);
+
+ // Create the import object for the protected streamed content
+ ContentAccess::CImportFile* importContent(0);
+ if((aSuggestedName.Length() > 0) && (aOutputDirectory.Length() > 0))
+ {
+ // A file name is suggested. The client wants the agent to generate the output files.
+ DEBUG_PRINTF2(_L("Output filename (%S) is suggested."), &aSuggestedName);
+ supplier->SetOutputDirectoryL(aOutputDirectory);
+ importContent = supplier->ImportFileL(mimeTypeContent, *metaDataArray, aSuggestedName);
+ }
+ else
+ {
+ // No suggested file name is passed to the agent, the client will provide output files for the agent to use
+ DEBUG_PRINTF(_L("Output filename is not suggested."));
+ importContent = supplier->ImportFileL(mimeTypeContent, *metaDataArray);
+ }
+
+ CleanupStack::PopAndDestroy(6, &contentId);
+ CleanupStack::PushL(importContent);
+
+ DEBUG_PRINTF(_L("Import session has been created successfully."));
+
+ return importContent;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/keystreamsink.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,58 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+
+#include <caf/streaming/keystreamsink.h>
+#include "ipsec/ipseckeystreamsink.h"
+#include <s32mem.h>
+
+const TInt KExpandSize = 128;
+
+using namespace StreamAccess;
+
+EXPORT_C TPtr8 CKeyStreamSink::ExternalizeLC() const
+ {
+ CBufFlat* buf = CBufFlat::NewL(KExpandSize);
+ CleanupStack::PushL(buf);
+
+ RBufWriteStream stream(*buf);
+ CleanupClosePushL(stream);
+ this->DoExternalizeL(stream);
+ CleanupStack::PopAndDestroy(&stream);
+
+ HBufC8 *allocatedBuf = HBufC8::NewL(buf->Size());
+ TPtr8 ptr(allocatedBuf->Des());
+ buf->Read(0, ptr, buf->Size());
+ CleanupStack::PopAndDestroy(buf);
+ CleanupStack::PushL(allocatedBuf);
+ return ptr;
+ }
+
+EXPORT_C CKeyStreamSink* CKeyStreamSink::InternalizeLC(const TDesC8 &aBuf)
+ {
+ CKeyStreamSink* ret(NULL);
+ RDesReadStream readStream(aBuf);
+ CleanupClosePushL(readStream);
+ TUint16 keyStreamSinkType = readStream.ReadUint16L();
+ switch (keyStreamSinkType)
+ {
+ case EIpSecSinkId: ret = CIpSecKeyStreamSink::NewLC(readStream); break;
+ default: User::Leave(KErrNotSupported);
+ }
+ CleanupStack::Pop(ret);
+ CleanupStack::PopAndDestroy(&readStream);
+ CleanupStack::PushL(ret);
+ return ret;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/patchdata.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,26 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <e32base.h>
+
+// All the patchable variables in the streamingcaf.dll need to be in a separate file.
+// Care should be taken not to define the exported data in the same source file
+// in which they are referred, lest the compiler inline's it. If inlined, the
+// data cannot be patched. Hence, the definition of data must be put in a
+// separate source file and they must be declared in other source files by
+// #including <caf/patchdata.h>.
+
+EXPORT_C extern const TUint8 KCafLoadPostProductionAgents = 0x00;
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/streamagentfactory.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,30 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the base stream agent factory interface
+//
+//
+
+#include <caf/streaming/streamagentfactory.h>
+
+using namespace StreamAccess;
+
+EXPORT_C CStreamAgentFactory::CStreamAgentFactory()
+ {
+ //empty
+ }
+
+EXPORT_C CStreamAgentFactory::~CStreamAgentFactory()
+ {
+ //empty
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/streamagentinfo.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,76 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <ecom/ecom.h>
+#include "streamagentinfo.h"
+#include <caf/streaming/streamagentfactory.h>
+
+using namespace StreamAccess;
+
+CStreamAgentInfo* CStreamAgentInfo::NewLC(const CImplementationInformation& aImplementationInfo)
+ {
+ CStreamAgentInfo* self = new(ELeave) CStreamAgentInfo();
+ CleanupStack::PushL(self);
+ self->ConstructL(aImplementationInfo);
+ return self;
+ }
+
+CStreamAgentInfo::CStreamAgentInfo()
+ {
+ }
+
+CStreamAgentInfo::~CStreamAgentInfo()
+ {
+ delete iName;
+ delete iStreamAgentFactory;
+
+ REComSession::DestroyedImplementation(iEcomKey);
+ REComSession::FinalClose();
+ }
+
+void CStreamAgentInfo::ConstructL(const CImplementationInformation& aImplementationInfo)
+ {
+ /* Retrieve the stream agent's Name and Implementation Uid from the CImplementationInformation
+ * object constructed by ECOM
+ */
+ iName = aImplementationInfo.DisplayName().AllocL();
+ iImplementationUid = aImplementationInfo.ImplementationUid();
+
+ // Instantiate an instance of the stream agents factory using the Implementation Uid
+ iStreamAgentFactory = static_cast<CStreamAgentFactory *>(REComSession::CreateImplementationL(iImplementationUid, iEcomKey));
+ }
+
+const TDesC& CStreamAgentInfo::Name() const
+ {
+ return *iName;
+ }
+
+TUid CStreamAgentInfo::ImplementationUid() const
+ {
+ return iImplementationUid;
+ }
+
+TBool CStreamAgentInfo::IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream) const
+ {
+ /* Query the stream agent factory to determine whether the SDP key management description
+ * is supported
+ */
+ return iStreamAgentFactory->IsKeyStreamSupportedL(aSdpKeyStream);
+ }
+
+CStreamAgentFactory& CStreamAgentInfo::StreamAgentFactory() const
+ {
+ return *iStreamAgentFactory;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/streamagentinterface.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,29 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the agent interface for key stream decoders.
+//
+//
+
+#include <caf/streaming/streamagentinterface.h>
+using namespace StreamAccess;
+
+EXPORT_C CAgentKeyStreamDecoder::CAgentKeyStreamDecoder()
+ {
+ //empty
+ }
+
+EXPORT_C CAgentKeyStreamDecoder::~CAgentKeyStreamDecoder()
+ {
+ //empty
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/source/streamagentresolver.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,133 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include "streamagentresolver.h"
+#include "streamagentinfo.h"
+#include <caf/streaming/streamagentfactory.h>
+#include <caf/patchdata.h>
+#include "scaflog.h"
+
+#include <caf/caferr.h>
+
+using namespace StreamAccess;
+
+CStreamAgentResolver* CStreamAgentResolver::NewLC()
+ {
+ CStreamAgentResolver* self = new(ELeave) CStreamAgentResolver();
+ CleanupStack::PushL(self);
+ self->ConstructL();
+ return self;
+ }
+
+CStreamAgentResolver::CStreamAgentResolver()
+ {
+ }
+
+CStreamAgentResolver::~CStreamAgentResolver()
+ {
+ // Reset and Destroy the stream agent information array
+ iStreamAgentInfoArray.ResetAndDestroy();
+ }
+
+void CStreamAgentResolver::ConstructL()
+ {
+ // Construct a list of the available stream agent interface implementations
+ BuildStreamAgentListL();
+ }
+
+void CStreamAgentResolver::BuildStreamAgentListL()
+ {
+ /* Construct a new implementation information array that is used in conjunction with the ECOM
+ * framework in order to retrieve resource data about the available stream agent plug-ins
+ */
+ RImplInfoPtrArray agentImplArray;
+ CleanupStack::PushL(TCleanupItem(CleanAgentImplArray, &agentImplArray));
+ REComSession::ListImplementationsL(KUidStreamAgentFactoryInterface, agentImplArray);
+
+ TInt streamAgentCount = agentImplArray.Count();
+
+ DEBUG_PRINTF2(_L("Number of streaming agents found on the device: %d"),streamAgentCount);
+
+ for (TInt i = 0; i < streamAgentCount; ++i)
+ {
+ /* In order to load stream agents from sources other than ROM, the patch
+ * data KCafLoadPostProductionAgents must be set to True (non-zero).
+ * Default SymbianOS behavior is to only load file and streaming agents from ROM
+ */
+ if ((KCafLoadPostProductionAgents == 0) &&
+ !agentImplArray[i]->RomBased())
+ {
+ /* If the stream agent is not in ROM, don't load it because it might
+ * be a security risk.
+ */
+ continue;
+ }
+
+ /* Construct a seperate element in the CStreamAgentInfo array for each of the
+ * identified stream agent implementations
+ */
+ AddStreamAgentL(*agentImplArray[i]);
+ }
+
+ CleanupStack::PopAndDestroy(&agentImplArray);
+ }
+
+void CStreamAgentResolver::CleanAgentImplArray(TAny* aArray)
+ {
+ // Performs the cleanup on the implementation information array
+ static_cast<RImplInfoPtrArray*>(aArray)->ResetAndDestroy();
+ }
+
+void CStreamAgentResolver::AddStreamAgentL(const CImplementationInformation& aAgentInfo)
+ {
+ // Create a new CStreamAgentInfo instance to add to the stream agent list
+ CStreamAgentInfo* agentInformation = CStreamAgentInfo::NewLC(aAgentInfo);
+
+ TUid agentUid(agentInformation->ImplementationUid());
+ TPtrC agentName(agentInformation->Name());
+
+ DEBUG_PRINTF3(_L("Stream Agent Identified: 0x%08x (%S)"),agentUid,&agentName);
+
+ // Append the CStreamAgentInfo object to the stream agent information array
+ User::LeaveIfError(iStreamAgentInfoArray.Append(agentInformation));
+ CleanupStack::Pop(agentInformation);
+ }
+
+CStreamAgentInfo& CStreamAgentResolver::ResolveSdpKeyStreamL(const CSdpMediaField& aSdpKeyStream) const
+ {
+ TInt streamAgentInfoCount = iStreamAgentInfoArray.Count();
+
+ /* Loop through each of the identified stream agents to determine which (if any) supports
+ * the SDP key management description
+ */
+ for(TInt i=0; i < streamAgentInfoCount; ++i)
+ {
+ if(iStreamAgentInfoArray[i]->IsKeyStreamSupportedL(aSdpKeyStream))
+ {
+ TUid agentUid(iStreamAgentInfoArray[i]->ImplementationUid());
+ TPtrC agentName (iStreamAgentInfoArray[i]->Name());
+ DEBUG_PRINTF3(_L("Key stream is supported by the agent: 0x%08x (%S)"),agentUid,&agentName);
+ return *iStreamAgentInfoArray[i];
+ }
+ }
+
+ // If a stream agent capable of decoding the key stream can not be found, leave with KErrCANoAgent
+ DEBUG_PRINTF(_L("A stream agent capable of decoding the key stream can not be found!"));
+ User::Leave(KErrCANoAgent);
+
+ // Return NULL reference to avoid warnings (should never get here)
+ CStreamAgentInfo* retVal=NULL;
+ return *retVal;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/run_tests.bat Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,26 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description:
+@rem
+
+
+@ECHO OFF
+rem Runs this component's tests for udeb and cleans up afterwards, results stored in \logs\winscw\.
+rem This script requires ExecTimeOut.exe to be downloaded through Perforce from //PR/share/DABSRelease/buildscripts/ and the environment variable SECURITYSOURCEDIR to be set (though this should have been set prior to a build) to the root of the security source tree.
+rem See test_launcher.pl -help for more information.
+IF (%SECURITYSOURCEDIR%)==() (
+ECHO ERROR: Environment variable SECURITYSOURCEDIR has not been set. This should point to the root of your Security source tree.
+) ELSE (
+%SECURITYSOURCEDIR%\testframework\test\autotesting\test_launcher.pl -components streamingcaf -testreleases udeb -exectimeout \ExecTimeOut.exe -resultsoutput \logs\winscw
+)
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/staclient.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,61 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Client-side API via which the key stream decoder uses the streaming test agent service.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef STACLIENT_H_
+#define STACLIENT_H_
+
+#include <scs/scsclient.h>
+#include <caf/rightsinfo.h>
+#include "stacommon.h"
+#include "testkeyassociation.h"
+#include "testkeystreamsink.h"
+
+class CSdpMediaField;
+class CSdpDocument;
+namespace StreamAccess
+ {
+
+ NONSHARABLE_CLASS(RStaClient) : public RScsClientBase
+ /**
+ The Key Stream Decoder uses this class to establish a connection with the Streaming Test
+ Agent Server and to get/set a variety of information and objects from the connected server.
+
+ @see StreamAccess::TStaFunction
+ */
+ {
+ public:
+ IMPORT_C RStaClient();
+ IMPORT_C TInt Connect();
+ IMPORT_C void GetAttributeL(const TAttribute& aAttribute, TBool& aValue);
+ IMPORT_C HBufC* GetStringAttributeLC(const TStringAttribute& aAttribute);
+ IMPORT_C void GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType);
+ IMPORT_C void SendKeyStreamL(const TDesC8& aKey) const;
+ IMPORT_C void SetKeyStreamSinkL(const CKeyStreamSink& aSink) const;
+ IMPORT_C void SetSdpMediaFieldL(const CSdpMediaField& aSdp) const;
+ IMPORT_C void SetSdpDocumentL(const CSdpDocument& aSdpDoc) const;
+ IMPORT_C void SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const;
+ IMPORT_C void Close();
+ };
+ }//End of the namespace StreamAccess
+
+#endif /*STACLIENT_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/stacommon.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,108 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Information shared between the Streaming Test Agent client and server implementations.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef STACOMMON_H_
+#define STACOMMON_H_
+
+#include <e32base.h>
+#include <e32std.h>
+#include <e32cmn.h>
+#include <e32ver.h>
+#include <e32uid.h>
+#include <s32mem.h>
+#include <stringpool.h>
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+#include <sdpdocument.h>
+#include <sdpmediafield.h>
+#include <sdpattributefield.h>
+#include <sdpcodecstringpool.h>
+#include <sdpfmtattributefield.h>
+#include <sdpcodecstringconstants.h>
+#endif
+#include <caf/streaming/streamcaftypes.h>
+#include <caf/streaming/keyassociation.h>
+#include <caf/streaming/keystreamsink.h>
+#include <caf/caferr.h>
+
+namespace StreamAccess
+ {
+ _LIT(KStaName, "StreamingTestAgent"); ///< Identifies Streaming Test Agent server.
+
+ const TInt KStaVerMajor = 1; ///< Streaming Test Agent version major component.
+ const TInt KStaVerMinor = 0; ///< Streaming Test Agent version minor component.
+ const TInt KStaVerBuild = 0; ///< Streaming Test Agent version build component.
+
+ inline TVersion StaVersion();
+
+ /**
+ Executable which hosts the Streaming Test Agent. Required to launch the process.
+
+ @see KUidStreamingTestAgent
+ */
+ _LIT(KStaImageName, "staserver.exe");
+
+ /**
+ Hosting the executable's secure ID. Required to launch the process.
+
+ @see KStreamingTestAgentImageName
+ */
+ const TUid KUidStreamingTestAgent = {0x1028588B};
+
+ inline TUidType StaImageFullUid();
+
+ /**
+ Delay in microseconds before the Streaming Test Agent server is shut down, after
+ the last remaining session has been closed.
+ */
+ const TInt KStaShutdownPeriod = 2 * 1000 * 1000;
+
+ enum TStaFunction
+ /**
+ Functions supported by the Streaming Test Agent session.
+ */
+ {
+ EGetAttribute=0, ///< Gets an attribute.
+ EGetStringAttributeSize, ///< Gets the size of a string attribute.
+ EGetStringAttributeData, ///< Gets the data of a string attribute.
+ EGetPostDeliveryRights, ///< Gets the handle of a post-acqusition rights object file and the size of the mime type data.
+ ESendKeyStream, ///< Sends a key stream (an encrypted short-term key).
+ ESetKeyStreamSink, ///< Sends a key stream sink to the test agent server.
+ ESetSdpKeyStream, ///< Sends an SDP key stream field object to the streaming test agent server.
+ ESetSdpDocument, ///< Sends an SDP document object to the streaming test agent server.
+ ESetIpSecAssoc ///< Sends an IPSec association to the streaming test agent server.
+ };
+
+ }//End of the namespace StreamAccess
+
+ /** The file extension of the rights object files. */
+ _LIT(KRoFileExtension,".dr");
+
+ /**
+ Test Stream Agent clients are panicked with this category when invalid
+ input to the server is detected.
+ */
+ _LIT(KStaClientPanicCat, "STA-Client");
+
+#include "stacommon.inl"
+
+#endif /*STACOMMON_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/stacommon.inl Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,65 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// The functions defined in this file provide constant data which is
+// used by both the Streaming Test Agent server and client side implementations.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef STACOMMON_INL
+#define STACOMMON_INL
+
+#include "stacommon.h"
+#include "sratemplate.inl"
+
+namespace StreamAccess
+ {
+ inline TVersion StaVersion()
+ /**
+ This function is defined because there is no literal constructor for TVersion.
+
+ @return Defines a version number which the client side code can use
+ to open the Streaming Test Agent server. If the client code
+ was built with a higher version number, then it cannot open
+ the Streaming Test Agent Server. This ensures that a client
+ only talks to the Streaming Test Agent Server version is at
+ least as high as its own.
+ */
+ {
+ TVersion v(KStaVerMajor, KStaVerMinor, KStaVerBuild);
+ return v;
+ }
+
+ inline TUidType StaImageFullUid()
+ /**
+ This function is defined because there is no literal constructor
+ for TUidType. It returns the Streaming Test Agent executable's UID, which is used
+ to ensure the client side code launches the correct server process, as opposed
+ to another application which uses the same executable name.
+
+ @return TUidType The Streaming Test Agent executable's full UID.
+ */
+ {
+ TUidType t(KExecutableImageUid, KNullUid, KUidStreamingTestAgent);
+ return t;
+ }
+
+ } // End of the namespace StreamAccess
+
+#endif /*STACOMMON_INL*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/staserver.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,131 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines server-side classes which are used to implement the Streaming Test Agent.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef STASERVER_H_
+#define STASERVER_H_
+
+#include <scs/scsserver.h>
+#include <caf/rightsinfo.h>
+#include <f32file.h>
+#include <s32file.h>
+#include "stacommon.h"
+#include "srarightsobject.h"
+#include "testkeyassociation.h"
+#include "testkeystreamsink.h"
+
+class CSdpMediaField;
+class CSdpDocument;
+
+namespace StreamAccess
+ {
+ //forward declaration
+ class CStaServer;
+
+ class CStaSession : public CScsSession
+ /**
+ This session object is created for each key stream decoder client.
+ It is used to perform client requests.
+ */
+ {
+ public:
+ static CStaSession* NewL(CStaServer &aServer);
+ ~CStaSession();
+
+ // implement CStreamingTestAgentSession
+ TBool DoServiceL(TInt aFunction, const RMessage2& aMessage);
+ inline CStaServer* Server();
+
+ private:
+ CStaSession(CStaServer& aServer);
+
+ void GetAttributeL(const RMessage2& aMessage);
+ void GetStringAttributeSizeL(const RMessage2& aMessage);
+ void GetStringAttributeDataL(const RMessage2& aMessage);
+ void GetPostDeliveryRightsL(const RMessage2& aMessage);
+ void GetKeyStreamL(const RMessage2& aMessage);
+ void SetKeyStreamSinkL(const RMessage2& aMessage);
+ void SetSdpMediaFieldL(const RMessage2& aMessage);
+ void SetIpSecAssociationL(const RMessage2& aMessage);
+ void SetSdpDocumentL(const RMessage2& aMessage);
+
+ void VerifyRoL();
+ void PanicClient(const RMessagePtr2& aMessage, TInt aReason);
+
+ private:
+ HBufC8* iBuffer;
+ CKeyStreamSink* iKeyStreamSink;
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ CSdpMediaField* iSdp;
+ CSdpDocument* iSdpDoc;
+#endif
+ CSraRightsObject* iRo;
+ };
+
+ /** The mime type of the post-acquisition rights object file. */
+ _LIT8(KPostAcquisitionRoMimeType,"application/x-rta.drm.postacqrights");
+ /** The mime type of the post-acquisition rights object file. */
+ _LIT8(KPostAcquisitionContentMimeType,"application/x-rta.drm.postacqcontent");
+ /** The content Id of the post-acquisition rights object file. */
+ _LIT8(KPostAcquisitionCid,"PostAcquisitionTest");
+
+ class CStaServer : public CScsServer
+ /**
+ The CScsServer derived object which is used to generate Streaming
+ Test Agent sessions for the key stream decoder client.
+ */
+ {
+ public:
+ static CStaServer* NewLC();
+
+ ~CStaServer();
+
+ //Implement from CScsServer
+ //void DoPreHeapMarkOrCheckL();
+ //void DoPostHeapMarkOrCheckL();
+ CScsSession* DoNewSessionL(const RMessage2& aMessage);
+
+ private:
+ CStaServer();
+ void ConstructL();
+
+ public:
+ /**
+ File server handle. Public, because it is accessed by session objects.
+ Since session objects write/read files, they need a file server handle.
+ Sessions use this file handle instead of creating a new one.
+ */
+ RFs iFs;
+ };
+
+ inline CStaServer* CStaSession::Server()
+ {
+ CStaServer *server = dynamic_cast<CStaServer*>(&iServer);
+ ASSERT(server);
+ return server;
+ }
+
+ /** The private folder of the Streaming Test Agent. */
+ _LIT(KStaPrivateFolder,"!:\\private\\1028588b\\");
+ } //End of the namespace StreamAccess
+
+#endif /*STASERVER_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/testagentkeystreamdecoder.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,60 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the test agent key stream decoder object.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TESTAGENTKEYSTREAMDECODER_H
+#define TESTAGENTKEYSTREAMDECODER_H
+
+#include "testkeystreamdecoderbase.h"
+#include "staclient.h"
+
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestAgentKeyStreamDecoder) : public CTestKeyStreamDecoderBase
+ {
+ public:
+ IMPORT_C static CTestAgentKeyStreamDecoder* NewL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+ IMPORT_C static CTestAgentKeyStreamDecoder* NewLC(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+ ~CTestAgentKeyStreamDecoder();
+
+ //From CAgentKeyStreamDecoder
+ IMPORT_C void GetAttributeL(const TAttribute& aAttribute, TBool& aValue);
+ IMPORT_C HBufC* GetStringAttributeLC(const TStringAttribute& aAttribute);
+ IMPORT_C void GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType);
+
+ //From CTestKeyStreamDecoderBase
+ IMPORT_C void SendKeyStreamL(const TDesC8& aKey) const;
+ IMPORT_C void SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const;
+
+ private:
+ CTestAgentKeyStreamDecoder();
+ void ConstructL(const CKeyStreamSink& aKeyStreamSink, const CSdpMediaField& aSdpKeyStream, const CSdpDocument& aSdpDoc);
+
+ private:
+ RStaClient iAgentClient;
+ };
+ }//End of the namespace StreamAccess
+#endif /*TESTAGENTKEYSTREAMDECODER_H*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/testkeyassociation.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,58 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the test key association object for the streaming test agent.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+
+#ifndef TESTKEYASSOCIATION_H_
+#define TESTKEYASSOCIATION_H_
+
+#include <e32base.h>
+#include <s32strm.h>
+#include <caf/streaming/keyassociation.h>
+
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestKeyAssociation) : public CKeyAssociation
+ /**
+ A specific key association object for the streaming test agent.
+ The test key association is different from the key associations
+ of IPSec, SRTP and ISMACryp.
+ */
+ {
+ public:
+ IMPORT_C static CTestKeyAssociation* NewL(RReadStream& aStream);
+ IMPORT_C static CTestKeyAssociation* NewL(const TDesC8& aKey);
+ IMPORT_C const HBufC8* GetTestKey() const;
+ IMPORT_C void ExternalizeL(RWriteStream& aStream) const;
+ IMPORT_C ~CTestKeyAssociation();
+
+ private:
+ CTestKeyAssociation();
+ void ConstructL(const TDesC8& aKey);
+ void InternalizeL(RReadStream& aStream);
+
+ private:
+ HBufC8* iKey;
+ };
+ }//End of the namespace StreamAccess
+
+#endif /*TESTKEYASSOCIATION_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/testkeystreamdecoderbase.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,49 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the base class for a test key stream decoder object.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TESTKEYSTREAMDECODERBASE_H_
+#define TESTKEYSTREAMDECODERBASE_H_
+
+#include <caf/streaming/streamagentinterface.h>
+
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestKeyStreamDecoderBase) : public CAgentKeyStreamDecoder
+ {
+ public:
+ ~CTestKeyStreamDecoderBase();
+
+ //From CAgentKeyStreamDecoder
+ IMPORT_C virtual void GetAttributeL(const TAttribute& aAttribute, TBool& aValue) = 0;
+ IMPORT_C virtual HBufC* GetStringAttributeLC(const TStringAttribute& aAttribute) = 0;
+ IMPORT_C virtual void GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType) = 0;
+
+ IMPORT_C virtual void SendKeyStreamL(const TDesC8& aKey) const = 0;
+ IMPORT_C virtual void SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const = 0;
+
+ protected:
+ CTestKeyStreamDecoderBase();
+ };
+ }//End of the namespace StreamAccess
+
+#endif /*TESTKEYSTREAMDECODERBASE_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/testkeystreamsink.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,68 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the test key stream sink object for the streaming test agent.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+
+#ifndef TESTKEYSTREAMSINK_H_
+#define TESTKEYSTREAMSINK_H_
+
+#include <caf/streaming/keystreamsink.h>
+#include <s32strm.h>
+#include <e32const.h>
+#include <f32file.h>
+#include "testkeyassociation.h"
+
+namespace StreamAccess
+ {
+
+ NONSHARABLE_CLASS(CTestKeyStreamSink) : public CKeyStreamSink
+ /**
+ A specific key stream sink for the streaming test agent.
+ Differs from the correspondent implementations of IPSec, SRTP and ISMACryp.
+ */
+ {
+ public:
+ IMPORT_C static CTestKeyStreamSink* NewL(RReadStream& aStream);
+ IMPORT_C static CTestKeyStreamSink* NewL(const TDesC& aOutput);
+ IMPORT_C ~CTestKeyStreamSink();
+
+ IMPORT_C CKeyStreamSink *CloneLC() const;
+
+ // CKeyStreamSink interface
+ IMPORT_C void ProcessNewKeyAssociationL(const CKeyAssociation& aKeyAssociation);
+ IMPORT_C void SetEncryptionAlgorithmL(const TEncryptionAlgorithm& aEncryptionAlgorithm);
+ IMPORT_C void SetAuthenticationAlgorithmL(const TAuthenticationAlgorithm& aAuthenticationAlgorithm);
+ protected:
+ IMPORT_C void DoExternalizeL(RWriteStream& aStream) const;
+ private:
+ CTestKeyStreamSink();
+ void ConstructL(const TDesC& aOutput);
+ void InternalizeL(RReadStream& aStream);
+
+ private:
+ HBufC* iOutput; ///< The fully qualified path of the output file in which the key association is stored.
+ RFs iFs;
+ };
+
+ }//End of the namespace StreamAccess
+
+#endif /*TESTKEYSTREAMSINK_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/testprotstrdesc.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,49 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the test protected stream description object for the streaming test agent.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TESTPROTSTRDESC_H_
+#define TESTPROTSTRDESC_H_
+
+#include <caf/streaming/protectedstreamdesc.h>
+
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestProtectedStreamDesc) : public CProtectedStreamDesc
+ /**
+ Represents parameters for the test protected stream.
+ */
+ {
+ public:
+ IMPORT_C static CTestProtectedStreamDesc* NewL(const TDesC& aOutput);
+ IMPORT_C ~CTestProtectedStreamDesc();
+ IMPORT_C CKeyStreamSink* CreateKeyStreamSinkLC() const;
+
+ private:
+ CTestProtectedStreamDesc();
+ void ConstructL(const TDesC& aOutput);
+
+ private:
+ HBufC* iOutput; ///< The fully qualified path of the file which the decrypted key is written.
+ };
+ }//End of the namespace StreamAccess
+#endif /*TESTPROTSTRDESC_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/teststreamagentfactory.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,51 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the base test stream agent factory plug-in.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TESTSTREAMAGENTFACTORY_H_
+#define TESTSTREAMAGENTFACTORY_H_
+
+#include <caf/streaming/streamagentfactory.h>
+#include "testagentkeystreamdecoder.h"
+#include "tscaf_streamagentdefs.h"
+
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestStreamAgentFactory) : public CStreamAgentFactory
+ {
+ public:
+ static CStreamAgentFactory* CreateTestAgentL();
+ CAgentKeyStreamDecoder* GetKeyStreamDecoderL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+ TBool IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream);
+ protected:
+ ~CTestStreamAgentFactory();
+
+ private:
+ CTestStreamAgentFactory();
+ HBufC8* ExtractKmsIdLC(const TDesC8& aValue);
+ };
+
+ }//End of the namespace StreamAccess
+
+#endif /*TESTSTREAMAGENTFACTORY_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/inc/tscaf_streamagentdefs.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,47 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TSCAF_STREAMAGENTDEFS_H_
+#define TSCAF_STREAMAGENTDEFS_H_
+
+namespace StreamAccess
+ {
+
+ #ifdef STREAMAGENT_01
+ // Test Stream Agent Factory Implementation UID
+ static const TUint KTestStreamAgentFactoryImpId = 0x10285891;
+
+ // Supported KMS Id's
+ _LIT8(KSupportedKmsIds,"1002;1005;1008;");
+ #endif
+
+
+ #ifdef STREAMAGENT_02
+ // Test Stream Agent Factory Implementation UID
+ static const TUint KTestStreamAgentFactoryImpId = 0x10285893;
+
+ // Supported KMS Id's
+ _LIT8(KSupportedKmsIds,"1003;1004;1006;");
+ #endif
+
+ }
+
+#endif /*TSCAF_STREAMAGENTDEFS_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/client/staclient.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,203 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// RStaClient implementation. See class and function definitions
+// for more detail.
+//
+//
+
+#include "staclient.h"
+
+using namespace StreamAccess;
+using namespace ContentAccess;
+
+EXPORT_C RStaClient::RStaClient()
+/**
+ This constructor provides a single point of definition from
+ which the superclass constructor is called.
+ */
+ : RScsClientBase()
+ {
+ //empty
+ }
+
+
+EXPORT_C TInt RStaClient::Connect()
+/**
+ Connect to the Streaming Test Agent server.
+
+ @return Symbian OS error code where KErrNone indicates
+ success and any other value indicates failure.
+ */
+ {
+ TVersion v = StaVersion();
+ TUidType fullUid = StaImageFullUid();
+
+ return RScsClientBase::Connect(KStaName, v, KStaImageName, fullUid);
+ }
+
+
+EXPORT_C void RStaClient::Close()
+/**
+ Closes the streaming test agent connection.
+*/
+ {
+ RScsClientBase::Close();
+ }
+
+
+EXPORT_C void RStaClient::GetAttributeL(const TAttribute& aAttribute, TBool& aValue)
+/**
+ Gets the value of a requested attribute listed in TAttribute enumeration.
+
+ @param aAttribute The requested attribute.
+ @param aValue The value of the requested attribute
+
+ @see StreamAccess::TAttribute
+ */
+ {
+ TPckg<TAttribute> attrBuf(aAttribute);
+ TPckg<TBool> valueBuf(aValue);
+ User::LeaveIfError(CallSessionFunction(EGetAttribute, TIpcArgs(&attrBuf, &valueBuf)));
+ }
+
+
+EXPORT_C HBufC* RStaClient::GetStringAttributeLC(const TStringAttribute& aAttribute)
+/**
+ Gets the value of a requested string attribute listed in TStringAttribute enumeration.
+
+ @param aAttribute The requested string attribute.
+ @return A pointer to the value of the requested string attribute.
+ The ownership is transfered to the calling function.
+ @see StreamAccess::TStringAttribute
+ */
+ {
+ TPckg<TStringAttribute> strAttr(aAttribute);
+ TInt size = 0;
+ TPckg<TInt> sizeBuf(size);
+ User::LeaveIfError(CallSessionFunction(EGetStringAttributeSize, TIpcArgs(&strAttr, &sizeBuf)));
+
+ HBufC8* value8 = HBufC8::NewLC(size);
+ TPtr8 ptr8(value8->Des());
+
+ User::LeaveIfError(CallSessionFunction(EGetStringAttributeData, TIpcArgs(&strAttr, &ptr8)));
+
+ //Convert 8-bit to 16-bit
+ HBufC* value = HBufC::NewL(ptr8.Size());
+ TPtr ptr(value->Des());
+ ptr.Copy(ptr8);
+
+ CleanupStack::PopAndDestroy(value8);
+ CleanupStack::PushL(value);
+ return value;
+ }
+
+
+EXPORT_C void RStaClient::GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType)
+/**
+ @param aFile The file handle of the post-delivery rights object obtained from
+ the streaming test agent server. The receiving party is responsible
+ to close the file handle.
+ @param aCid The content Id
+ @param aRightsMimeType The mime type of the post-acquisition rights object.
+ @param aContentMimeType The mime type of the content.
+ */
+ {
+ TInt fsh; //session (RFs) handle
+ TPckgBuf<TInt> fh; //subsession (RFile) handle
+
+ //The message is completed with the file-server (RFs) session handle
+ //Pointer to the file subsession handle in slot 0
+ fsh = CallSessionFunction(EGetPostDeliveryRights, TIpcArgs(&fh, &aCid, &aRightsMimeType, &aContentMimeType));
+ User::LeaveIfError(fsh);
+
+ // Adopt the file using the returned handles
+ User::LeaveIfError(aFile.AdoptFromServer(fsh,fh()));
+ }
+
+EXPORT_C void RStaClient::SendKeyStreamL(const TDesC8& aKey) const
+/**
+ Sends an encrypted short-term key to the test agent server.
+ @param aKey An encrypted key.
+ */
+ {
+ User::LeaveIfError(CallSessionFunction(ESendKeyStream, TIpcArgs(&aKey)));
+ }
+
+EXPORT_C void RStaClient::SetKeyStreamSinkL(const CKeyStreamSink& aSink) const
+/**
+ Sends a key stream sink object to the test agent server.
+ @param aKey A key stream sink object.
+ */
+ {
+ TPtr8 ptr(aSink.ExternalizeLC());
+ User::LeaveIfError(CallSessionFunction(ESetKeyStreamSink, TIpcArgs(&ptr)));
+ CleanupStack::PopAndDestroy(); // Delete the allocated buffer
+ }
+
+EXPORT_C void RStaClient::SetSdpMediaFieldL(const CSdpMediaField& aSdp) const
+/**
+ Sends an SDP key stream field to the test agent server.
+ @param aKey An SDP object data.
+ */
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ HBufC8* sdpBuf(0);
+ TPtr8 ptr(EncodeLC(aSdp, sdpBuf));
+ User::LeaveIfError(CallSessionFunction(ESetSdpKeyStream, TIpcArgs(&ptr)));
+ CleanupStack::PopAndDestroy(sdpBuf);
+#else
+ (void) aSdp;
+#endif
+
+ }
+
+EXPORT_C void RStaClient::SetSdpDocumentL(const CSdpDocument& aSdpDoc) const
+/**
+ Sends an SDP document object data to the reference agent server.
+ @param aKey An SDP object data.
+ */
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ HBufC8* sdpDocBuf(0);
+ TPtr8 ptr(EncodeLC(aSdpDoc, sdpDocBuf));
+ User::LeaveIfError(CallSessionFunction(ESetSdpDocument, TIpcArgs(&ptr)));
+ CleanupStack::PopAndDestroy(sdpDocBuf);
+#else
+ (void) aSdpDoc;
+#endif
+
+ }
+
+EXPORT_C void RStaClient::SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const
+ {
+ CBufFlat* buf = CBufFlat::NewL(KExpandSize);
+ CleanupStack::PushL(buf);
+
+ RBufWriteStream stream(*buf);
+ CleanupClosePushL(stream);
+
+ stream.WriteInt32L(aSpi);
+ stream << *aEncryptionKey;
+ stream << *aAuthenticationKey;
+
+ HBufC8* des = HBufC8::NewL(buf->Size());
+ TPtr8 ptr(des->Des());
+ buf->Read(0, ptr, buf->Size());
+
+ CleanupStack::PopAndDestroy(2, buf);
+ CleanupStack::PushL(des);
+
+ User::LeaveIfError(CallSessionFunction(ESetIpSecAssoc, TIpcArgs(&ptr)));
+ CleanupStack::PopAndDestroy(des);
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/plugin/10285892.rss Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// ECOM DLL UID: 0x10285892
+// ECOM interface UID: 0x10285890 (KUidStreamAgentFactoryInterface)
+// ECOM Implementation: 0x10285891
+//
+//
+
+#include <ecom/registryinfo.rh>
+
+RESOURCE REGISTRY_INFO so_registry
+ {
+ dll_uid = 0x10285892;
+ interfaces =
+ {
+ INTERFACE_INFO
+ {
+ interface_uid = 0x10285890;
+
+ implementations =
+ {
+ IMPLEMENTATION_INFO
+ {
+ implementation_uid = 0x10285891;
+ version_no = 1;
+ display_name = "Test Stream Agent 1 ECOM Plugin";
+ default_data = "";
+ opaque_data = "";
+ }
+ };
+ }
+ };
+ }
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/plugin/102859F4.rss Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,46 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// 10285894.RSS
+// ECOM DLL UID: 0x102859F4
+// ECOM interface UID: 0x10285890 (KUidStreamAgentFactoryInterface)
+// ECOM Implementation: 0x10285893
+//
+//
+
+#include <ecom/registryinfo.rh>
+
+RESOURCE REGISTRY_INFO so_registry
+ {
+ dll_uid = 0x102859F4;
+ interfaces =
+ {
+ INTERFACE_INFO
+ {
+ interface_uid = 0x10285890;
+
+ implementations =
+ {
+ IMPLEMENTATION_INFO
+ {
+ implementation_uid = 0x10285893;
+ version_no = 1;
+ display_name = "Test Stream Agent 2 ECOM Plugin";
+ default_data = "";
+ opaque_data = "";
+ }
+ };
+ }
+ };
+ }
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/plugin/teststreamagentfactory.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,93 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the test stream agent factory plug-in.
+//
+//
+
+#include "teststreamagentfactory.h"
+#include "srautils.h"
+
+using namespace StreamAccess;
+
+
+static const TImplementationProxy ImplementationTable[] =
+ {
+ IMPLEMENTATION_PROXY_ENTRY(KTestStreamAgentFactoryImpId, CTestStreamAgentFactory::CreateTestAgentL)
+ };
+
+
+EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
+/**
+ Standard ECOM factory
+*/
+ {
+ aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
+ return ImplementationTable;
+ }
+
+//
+//CTestStreamAgentFactory
+//
+
+CTestStreamAgentFactory::CTestStreamAgentFactory()
+/**
+ Constructor.
+ */
+: CStreamAgentFactory()
+ {
+ //empty
+ }
+
+
+CTestStreamAgentFactory::~CTestStreamAgentFactory()
+/**
+ Destructor
+ */
+ {
+ //empty
+ }
+
+
+CStreamAgentFactory* CTestStreamAgentFactory::CreateTestAgentL()
+/**
+ Factory method that instantiates a new test stream agent factory ECOM plug-in.
+
+ @return A pointer to the new test stream agent factory object.
+*/
+ {
+ CTestStreamAgentFactory *self = new(ELeave) CTestStreamAgentFactory();
+ return self;
+ }
+
+CAgentKeyStreamDecoder* CTestStreamAgentFactory::GetKeyStreamDecoderL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ @see CStreamAgentFactory::GetKeyStreamDecoderL
+ */
+ {
+ return CTestAgentKeyStreamDecoder::NewL(aKeyStreamSink, aSdpKeyStream, aSdpDoc);
+ }
+
+TBool CTestStreamAgentFactory::IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream)
+/**
+ Function to determine whether the test stream agent supports the key management scheme
+ specified in the SDP key stream definition
+ @param aSdpKeyStream Contains the metadata for the SDP key management scheme of the stream
+ @return ETrue if the test stream agent recognises the SDP format and is able to decode the key stream
+ @return EFalse if the test stream agent fails to recofnise the SDP format or is unable to decode the key stream
+ */
+ {
+ return CheckKeyStreamSupportedL(aSdpKeyStream, KSupportedKmsIds());
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/server/startup.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,47 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Executable entrypoint and server object factory function. The latter
+// is supplied to the SCS boilerplate code which starts up the server.
+//
+//
+
+#include "staserver.h"
+
+using namespace StreamAccess;
+
+static CScsServer* NewStreamingTestAgentLC()
+/**
+ This factory function is called by SCS framework. It allocates
+ the Streaming Test Agent Server object and
+ leaves it on the cleanup stack.
+
+ @return New initialized instance of CStaServer.
+ On return this is on the cleanup stack.
+ */
+ {
+ return StreamAccess::CStaServer::NewLC();
+ }
+
+
+GLDEF_C TInt E32Main()
+/**
+ Executable entrypoint. Calls the SCS boilerplate code which starts the server
+ and does not return until the server shuts down.
+
+ @return Symbian OS error code where KErrNone indicates success
+ and any other value indicates failure.
+ */
+ {
+ return StartScsServer(NewStreamingTestAgentLC);
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/server/staserver.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,118 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements CStaServer which provides streaming test agent services.
+//
+//
+
+#include "staserver.h"
+
+using namespace StreamAccess;
+
+static const TUint staRangeCount = 2;
+
+static const TInt staRanges[staRangeCount] =
+ {
+ 0, //Range 0 - 0 to EBaseSession-1. Not used.
+ CScsServer::EBaseSession, //Range 1 - EBaseSession to KMaxTInt inclusive.
+ };
+
+static const TUint8 staElementsIndex[staRangeCount] =
+ {
+ CPolicyServer::ENotSupported, // Range 0 is not supported.
+ 0, // Range 1 must come from a client who has DRM capability.
+ };
+
+static const CPolicyServer::TPolicyElement staElements[] =
+ {
+ {_INIT_SECURITY_POLICY_C1(ECapabilityDRM), CPolicyServer::EFailClient},
+ };
+
+static const CPolicyServer::TPolicy staPolicy =
+ {
+ CPolicyServer::EAlwaysPass, // Allow all connects
+ staRangeCount,
+ staRanges,
+ staElementsIndex,
+ staElements,
+ };
+
+//
+//CStaServer
+//
+
+CStaServer::CStaServer()
+/**
+ Intializes the Streaming Test Agent object with its version and policy.
+ */
+ : CScsServer(StaVersion(),staPolicy)
+ {
+ //empty
+ }
+
+CStaServer::~CStaServer()
+/**
+ Destructor. Cleanup the Streaming Test Agent object.
+ */
+ {
+ iFs.Close();
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ SdpCodecStringPool::Close();
+#endif
+ }
+
+
+CStaServer* CStaServer::NewLC()
+/**
+ Factory function allocates new, initialized instance of CStaServer.
+
+ @return New, initialized instance of CStaServer which is left on the cleanup stack.
+ */
+ {
+ CStaServer *sta = new (ELeave) CStaServer();
+ CleanupStack::PushL(sta);
+ sta->ConstructL();
+ return sta;
+ }
+
+
+void CStaServer::ConstructL()
+/**
+ Second phase constructor starts the Streaming Test Agent Server.
+ */
+ {
+ CScsServer::ConstructL(KStaShutdownPeriod);
+
+ User::LeaveIfError(iFs.Connect());
+ User::LeaveIfError(iFs.ShareProtected());
+ User::LeaveIfError(iFs.CreatePrivatePath(iFs.GetSystemDrive()));
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ SdpCodecStringPool::OpenL();
+#endif
+ StartL(KStaName);
+ }
+
+
+CScsSession* CStaServer::DoNewSessionL(const RMessage2& aMessage)
+/**
+ Implement CScsServer by allocating a new instance of CStaSession.
+
+ @param aMessage Standard server-side handle to message.
+ @return New instance of CStaSession which is owned by the caller.
+ */
+ {
+ (void)aMessage;
+ return CStaSession::NewL(*this);
+ }
+
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/server/stasession.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,427 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements CStaSession which is server-side session object.
+//
+//
+
+#include "staserver.h"
+#include "srautils.h"
+
+using namespace StreamAccess;
+using namespace ContentAccess;
+
+CStaSession::CStaSession(CStaServer& aServer)
+/**
+ Intializes the Streaming Test Agent session object with the server handle.
+ */
+ : CScsSession(aServer)
+ {
+ //empty
+ }
+
+
+CStaSession::~CStaSession()
+/**
+ Destructor.
+ */
+ {
+ delete iBuffer;
+ delete iKeyStreamSink;
+ delete iRo;
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ delete iSdp;
+ delete iSdpDoc;
+#endif
+ }
+
+
+CStaSession* CStaSession::NewL(CStaServer& aServer)
+/**
+ Factory function allocates new instance of CStaSession.
+
+ @param aServer Streaming Test Agent server object.
+ @return New, initialized instance of CStaSession
+ which is owned by the caller.
+ */
+ {
+ CStaSession* s = new (ELeave) CStaSession(aServer);
+ CleanupStack::PushL(s);
+ s->ConstructL();
+ CleanupStack::Pop(s);
+ return s;
+ }
+
+
+TBool CStaSession::DoServiceL(TInt aFunction, const RMessage2& aMessage)
+/**
+ Implement CScsSession by handling the supplied message.
+
+ @param aFunction Function identifier without SCS code.
+ @param aMessage Standard server-side handle to message.
+ @return ETrue, if the service is done successfully. Otherwise, EFalse.
+ */
+ {
+ TStaFunction f = static_cast<TStaFunction>(aFunction);
+
+ switch(f)
+ {
+ case EGetAttribute:
+ GetAttributeL(aMessage);
+ break;
+ case EGetStringAttributeSize:
+ GetStringAttributeSizeL(aMessage);
+ break;
+ case EGetStringAttributeData:
+ GetStringAttributeDataL(aMessage);
+ break;
+ case EGetPostDeliveryRights:
+ GetPostDeliveryRightsL(aMessage);
+ //RMessage2 object is closed by both TransferToClient() and SCS framework.
+ //return EFalse to prevent SCS to close the message object.
+ return EFalse;
+ case ESendKeyStream:
+ GetKeyStreamL(aMessage);
+ break;
+ case ESetKeyStreamSink:
+ SetKeyStreamSinkL(aMessage);
+ break;
+ case ESetSdpKeyStream:
+ SetSdpMediaFieldL(aMessage);
+ break;
+ case ESetSdpDocument:
+ SetSdpDocumentL(aMessage);
+ break;
+ case ESetIpSecAssoc:
+ SetIpSecAssociationL(aMessage);
+ break;
+ default:
+ User::Leave(KErrNotSupported);
+ }
+ return ETrue;
+ }//End of function DoServiceL
+
+
+void CStaSession::GetAttributeL(const RMessage2& aMessage)
+/**
+ Returns the value of an attribute requested by the client.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+ TAttribute attr;
+ TPckg<TAttribute> attrBuf(attr);
+ aMessage.ReadL(0,attrBuf);
+
+ VerifyRoL();
+
+ TBool retVal = EFalse;
+
+ switch(attr)
+ {
+ case EIsProgramProtected:
+ retVal = iRo->AccessRights() & EProgramProtected;
+ break;
+ case EIsServiceProtected:
+ retVal = iRo->AccessRights() & EServiceProtected;
+ break;
+ case ECanExport:
+ retVal = iRo->AccessRights() & ECanExportContent;
+ break;
+ case EMustProtectIfRecording:
+ retVal = iRo->AccessRights() & EMustProtectContentIfRecording;
+ break;
+ case ECanPlay:
+ retVal = iRo->AccessRights() & ECanPlayContent;
+ break;
+ default:
+ PanicClient(aMessage, KErrCAOutOfRange);
+ }
+
+ // If the the return value is greater than 0, set the boolean value to ETrue
+ if(retVal)
+ {
+ retVal = ETrue;
+ }
+
+ TPckg<TBool> retValBuf(retVal);
+ aMessage.WriteL(1, retValBuf);
+ }
+
+
+void CStaSession::GetStringAttributeSizeL(const RMessage2& aMessage)
+/**
+ Returns the size of the string attribute requested by the client.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+ TStringAttribute strAttr;
+ TPckg<TStringAttribute> strAttrBuf(strAttr);
+ aMessage.ReadL(0,strAttrBuf);
+
+ VerifyRoL();
+ TInt size = 0;
+
+ switch(strAttr)
+ {
+ case EContentID:
+ size = iRo->ContentId()->Des().Size();
+ break;
+ case ERightsIssuerURI:
+ size = iRo->RightsIssuer()->Des().Size();
+ break;
+ default:
+ PanicClient(aMessage, KErrCAOutOfRange);
+ }
+
+ TPckg<TInt> sizeBuf(size);
+ aMessage.WriteL(1, sizeBuf);
+ }
+
+
+void CStaSession::GetStringAttributeDataL(const RMessage2& aMessage)
+/**
+ Returns the value of a string attribute requested by the client.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+ TStringAttribute strAttr;
+ TPckg<TStringAttribute> strAttrBuf(strAttr);
+ aMessage.ReadL(0,strAttrBuf);
+
+ VerifyRoL();
+ HBufC8* str = NULL;
+
+ switch(strAttr)
+ {
+ case EContentID:
+ str = iRo->ContentId();
+ break;
+ case ERightsIssuerURI:
+ str = iRo->RightsIssuer();
+ break;
+ default:
+ PanicClient(aMessage, KErrCAOutOfRange);
+ }
+ TPtr8 ptr(str->Des());
+ aMessage.WriteL(1, ptr);
+ }
+
+
+void CStaSession::GetPostDeliveryRightsL(const RMessage2& aMessage)
+/**
+ Returns the file handle of the requested post-acqusition rights, its content id,
+ the post-acquisition rights' mime type and the post-acquisition content's mime type.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+ VerifyRoL();
+
+ //In this test agent, a pre-defined post-acquisition rights object is used.
+ //In real-life standards, the post-acquisition rights object would be generated
+ //from the rights object which is used to decode key stream.
+
+ //Get the file path of the pre-defined post acqusition rights object
+ TFileName fPath(KStaPrivateFolder);
+ fPath[0] = Server()->iFs.GetSystemDriveChar();
+ //Convert 8-bit to 16-bit
+ HBufC* fName = HBufC::NewLC(iRo->ContentId()->Des().Length());
+ TPtr ptrName(fName->Des());
+ ptrName.Copy(iRo->ContentId()->Des());
+ fPath.Append(*fName);
+ fPath.Append(KRoFileExtension);
+ CleanupStack::PopAndDestroy(fName);
+
+ //Open the post-acqusition rights object file
+ RFile f;
+ User::LeaveIfError(f.Open(Server()->iFs, fPath, EFileRead | EFileShareAny));
+ CleanupClosePushL(f);
+
+ //Send the content id of the post-acquisition rights object
+ aMessage.WriteL(1, KPostAcquisitionCid());
+ //Send the mime type of the post-acquisition rights object
+ aMessage.WriteL(2, KPostAcquisitionRoMimeType());
+ //Send the mime type of the post-acquisition content
+ aMessage.WriteL(3, KPostAcquisitionContentMimeType());
+
+ //Pass the file handle to the client
+ User::LeaveIfError(f.TransferToClient(aMessage, 0));
+ //The message should have been completed
+ ASSERT(aMessage.IsNull());
+ CleanupStack::PopAndDestroy(&f);
+ }
+
+
+void CStaSession::GetKeyStreamL(const RMessage2& aMessage)
+/**
+ Gets an encrypyed short-term key from the client.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+ TInt len = aMessage.GetDesMaxLengthL(0);
+ HBufC8* shortTermKey = HBufC8::NewLC(len);
+ TPtr8 ptr(shortTermKey->Des());
+ aMessage.ReadL(0,ptr);
+
+ //Check if the long-term key key exists in the short-term key
+ TInt ret = shortTermKey->Find(*iRo->Key());
+ if(ret == KErrNotFound)
+ {
+ User::Leave(KErrGeneral);
+ }
+
+ //Get the plain string (key)
+ HBufC8* decryptedKey = HBufC8::NewLC(ret);
+ TPtr8 ptrKey(decryptedKey->Des());
+ ptrKey.Copy(shortTermKey->Des().Ptr(), ret);
+
+ CTestKeyAssociation* decryptedAssoc = CTestKeyAssociation::NewL(ptrKey);
+ CleanupStack::PushL(decryptedAssoc);
+
+ iKeyStreamSink->ProcessNewKeyAssociationL(*decryptedAssoc);
+
+ CleanupStack::PopAndDestroy(3, shortTermKey);
+ }
+
+
+void CStaSession::SetKeyStreamSinkL(const RMessage2& aMessage)
+/**
+ Gets a key stream sink from the client.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+ TInt len = aMessage.GetDesMaxLengthL(0);
+ HBufC8* des = HBufC8::NewLC(len);
+ TPtr8 ptr(des->Des());
+ aMessage.ReadL(0,ptr);
+ delete iKeyStreamSink;
+ iKeyStreamSink = NULL;
+ TRAPD(err,
+ iKeyStreamSink = CKeyStreamSink::InternalizeLC(ptr);
+ CleanupStack::Pop(iKeyStreamSink););
+ // In addition to the production supported key stream sinks, there is also the Test key stream sink
+ // If the production code could not load the key stream sink, it must be the test key stream sink - load it
+ if (err == KErrNotSupported)
+ {
+ RDesReadStream readStream(ptr);
+ CleanupClosePushL(readStream);
+ iKeyStreamSink = CTestKeyStreamSink::NewL(readStream);
+ CleanupStack::PopAndDestroy(&readStream);
+ }
+ else
+ User::LeaveIfError(err);
+ CleanupStack::PopAndDestroy(des);
+ }
+
+void CStaSession::SetIpSecAssociationL(const RMessage2& aMessage)
+ {
+ TInt len = aMessage.GetDesMaxLengthL(0);
+ HBufC8* des = HBufC8::NewLC(len);
+ TPtr8 ptr(des->Des());
+ aMessage.ReadL(0,ptr);
+
+ RDesReadStream readStream(ptr);
+ CleanupClosePushL(readStream);
+
+ TInt32 spi = readStream.ReadInt32L();
+ HBufC8* encryptionKey = HBufC8::NewLC(readStream, 128);
+ HBufC8* authenticationKey = HBufC8::NewLC(readStream, 128);
+
+ CKeyAssociation *ipSecKeyAssociation = CIpSecKeyAssociation::NewLC(spi, encryptionKey, authenticationKey);
+ iKeyStreamSink->ProcessNewKeyAssociationL(*ipSecKeyAssociation);
+ CleanupStack::PopAndDestroy(5, des);
+ }
+
+void CStaSession::SetSdpMediaFieldL(const RMessage2& aMessage)
+/**
+ Gets an SDP object from the client.
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ TInt len = aMessage.GetDesMaxLengthL(0);
+ HBufC8* des = HBufC8::NewLC(len);
+ TPtr8 ptr(des->Des());
+ aMessage.ReadL(0,ptr);
+
+ //Delete previous SDP and rights objects
+ delete iSdp;
+ iSdp = NULL;
+ delete iRo;
+ iRo = NULL;
+
+ DoSetSdpMediaFieldL(Server()->iFs, iSdp, iRo, ptr, KStaPrivateFolder());
+ CleanupStack::PopAndDestroy(des);
+
+ //Leave if no RO has been found
+ if(!iRo)
+ {
+ User::Leave(KErrCANoRights);
+ }
+#else
+ (void) aMessage;
+ User::Leave(KErrCANoRights);
+#endif
+ }
+
+void CStaSession::SetSdpDocumentL(const RMessage2& aMessage)
+/**
+ Sets the SDP document object coming from the client.
+
+ @param aMessage Standard server-side handle to message.
+ */
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ TInt len = aMessage.GetDesMaxLengthL(0);
+ HBufC8* des = HBufC8::NewLC(len);
+ TPtr8 ptr(des->Des());
+ aMessage.ReadL(0,ptr);
+
+ //Delete previous SDPDoc
+ delete iSdpDoc;
+ iSdpDoc = NULL;
+
+ // Decode the SDP document object from the encoded data
+ iSdpDoc = CSdpDocument::DecodeL(*des);
+ CleanupStack::PopAndDestroy(des);
+#else
+ (void) aMessage;
+#endif
+ }
+
+void CStaSession::VerifyRoL()
+/**
+ Verifies that the rights object exists.
+ */
+ {
+ if(!iRo)
+ {//The RO defined in the SDP does not exist
+ User::Leave(KErrCANoRights);
+ }
+ if(iRo->IsExpired())
+ {
+ User::Leave(KErrCANoPermission);
+ }
+ }
+
+void CStaSession::PanicClient(const RMessagePtr2& aMessage, TInt aReason)
+/**
+ Panic the client which sent the supplied message with
+ category KScsClientPanicCat and the supplied reason.
+
+ @param aMessage Client message.
+ @param aReason Why the client will be panicked.
+ @see KStaClientPanicCat
+ */
+ {
+ aMessage.Panic(KStaClientPanicCat, aReason);
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/shared/testagentkeystreamdecoder.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,118 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements tthe test agent key stream decoder object.
+//
+//
+
+#include "testagentkeystreamdecoder.h"
+
+using namespace StreamAccess;
+
+CTestAgentKeyStreamDecoder::CTestAgentKeyStreamDecoder()
+/**
+ Constructor.
+ */
+ : CTestKeyStreamDecoderBase()
+ {
+ //empty
+ }
+
+CTestAgentKeyStreamDecoder::~CTestAgentKeyStreamDecoder()
+/**
+ Destructor.
+ */
+ {
+ iAgentClient.Close();
+ }
+
+EXPORT_C CTestAgentKeyStreamDecoder* CTestAgentKeyStreamDecoder::NewL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ Factory function allocates a new instance of CTestAgentKeyStreamDecoder.
+ @return New instance of CTestAgentKeyStreamDecoder
+ */
+ {
+ //TInt count = aSdpKeyStream.AttributeFields().Count();
+ CTestAgentKeyStreamDecoder* self = CTestAgentKeyStreamDecoder::NewLC(aKeyStreamSink, aSdpKeyStream, aSdpDoc);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+EXPORT_C CTestAgentKeyStreamDecoder* CTestAgentKeyStreamDecoder::NewLC(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ Factory function allocates a new instance of CTestAgentKeyStreamDecoder
+ and places the object on the cleanup stack.
+ @return A new instance of CTestAgentKeyStreamDecoder
+ which is left on the cleanup stack.
+ */
+ {
+ CTestAgentKeyStreamDecoder* self = new (ELeave) CTestAgentKeyStreamDecoder();
+ CleanupStack::PushL(self);
+ self->ConstructL(aKeyStreamSink, aSdpKeyStream, aSdpDoc);
+ return self;
+ }
+
+void CTestAgentKeyStreamDecoder::ConstructL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ Second phase constructor.
+ */
+ {
+ User::LeaveIfError(iAgentClient.Connect());
+ iAgentClient.SetKeyStreamSinkL(aKeyStreamSink);
+ iAgentClient.SetSdpMediaFieldL(aSdpKeyStream);
+ iAgentClient.SetSdpDocumentL(aSdpDoc);
+ }
+
+EXPORT_C void CTestAgentKeyStreamDecoder::GetAttributeL(const TAttribute& aAttribute, TBool& aValue)
+/**
+ @see CAgentKeyStreamDecoder::GetAttributeL
+ */
+ {
+ iAgentClient.GetAttributeL(aAttribute, aValue);
+ }
+
+EXPORT_C HBufC* CTestAgentKeyStreamDecoder::GetStringAttributeLC(const TStringAttribute& aAttribute)
+/**
+ @see CAgentKeyStreamDecoder::GetStringAttributeL
+ */
+ {
+ return iAgentClient.GetStringAttributeLC(aAttribute);
+ }
+
+EXPORT_C void CTestAgentKeyStreamDecoder::GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType)
+/**
+ @see CAgentKeyStreamDecoder::GetPostDeliveryRightsHandleL
+ */
+ {
+ iAgentClient.GetPostDeliveryRightsL(aFile, aCid, aRightsMimeType, aContentMimeType);
+ }
+
+EXPORT_C void CTestAgentKeyStreamDecoder::SendKeyStreamL(const TDesC8& aKey) const
+/**
+ Sends an encrypted short-term key to the test agent server.
+ @param aKey An encrypted key.
+ */
+ {
+ iAgentClient.SendKeyStreamL(aKey);
+ }
+
+EXPORT_C void CTestAgentKeyStreamDecoder::SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const
+ {
+ iAgentClient.SendIpSecAssociationL(aSpi, aEncryptionKey, aAuthenticationKey);
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/shared/testkeyassociation.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,105 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the test key association object for the streaming test agent.
+//
+//
+
+#include "testkeyassociation.h"
+
+using namespace StreamAccess;
+
+CTestKeyAssociation::CTestKeyAssociation()
+/**
+ Constructor for CTestKeyAssociation object.
+ */
+ {
+ //empty
+ }
+
+EXPORT_C CTestKeyAssociation::~CTestKeyAssociation()
+/**
+ Destructor for CTestKeyAssociation object.
+ */
+ {
+ delete iKey;
+ }
+
+EXPORT_C CTestKeyAssociation* CTestKeyAssociation::NewL(RReadStream& aStream)
+/**
+ Creates an empty test key association object.
+
+ @return A pointer to the empty test key association object.
+ */
+ {
+ CTestKeyAssociation* self = new(ELeave)CTestKeyAssociation();
+ CleanupStack::PushL(self);
+ self->InternalizeL(aStream);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+
+EXPORT_C CTestKeyAssociation* CTestKeyAssociation::NewL(const TDesC8& aKey)
+/**
+ Creates a new test key association object.
+
+ @param aKey The encryption key.
+ @return A pointer to the new test key association object.
+ */
+ {
+ CTestKeyAssociation* self = new (ELeave)CTestKeyAssociation();
+ CleanupStack::PushL(self);
+ self->ConstructL(aKey);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+void CTestKeyAssociation::ConstructL(const TDesC8& aKey)
+/**
+ Second-phase constructor for CTestKeyAssociation object.
+
+ @param aKey The encryption key.
+ */
+ {
+ iKey = aKey.AllocL();
+ }
+
+
+EXPORT_C const HBufC8* CTestKeyAssociation::GetTestKey() const
+/**
+ @return The encryption key.
+ */
+ {
+ return iKey;
+ }
+
+
+EXPORT_C void CTestKeyAssociation::ExternalizeL(RWriteStream& aStream) const
+/**
+ Externalizes CTestKeyAssociation object.
+ */
+ {
+ aStream<<*iKey;
+ }
+
+void CTestKeyAssociation::InternalizeL(RReadStream& aStream)
+/**
+ Internalizes CTestKeyAssociation object.
+ @param aStream Stream to read from.
+ */
+ {
+ const TInt KMaxKeyLen = 4096;
+ iKey = HBufC8::NewL(aStream,KMaxKeyLen);
+ }
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/shared/testkeystreamdecoderbase.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,37 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the base class for a test key stream decoder object.
+//
+//
+
+#include "testkeystreamdecoderbase.h"
+
+using namespace StreamAccess;
+
+CTestKeyStreamDecoderBase::CTestKeyStreamDecoderBase()
+/**
+ Constructor.
+ */
+ : CAgentKeyStreamDecoder()
+ {
+ //empty
+ }
+
+CTestKeyStreamDecoderBase::~CTestKeyStreamDecoderBase()
+/**
+ Destructor.
+ */
+ {
+ //empty
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/shared/testkeystreamsink.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,142 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the test key stream sink object for the streaming test agent.
+//
+//
+
+#include "testkeystreamsink.h"
+
+using namespace StreamAccess;
+
+
+CTestKeyStreamSink::CTestKeyStreamSink()
+/**
+ Constructor for CTestKeyStreamSink object.
+ */
+ {
+ //empty
+ }
+
+EXPORT_C CTestKeyStreamSink::~CTestKeyStreamSink()
+/**
+ Destructor for CTestKeyStreamSink object.
+ */
+ {
+ delete iOutput;
+ iFs.Close();
+ }
+
+
+EXPORT_C CTestKeyStreamSink* CTestKeyStreamSink::NewL(RReadStream& aStream)
+/**
+ Creates a new test key stream sink object from a stream.
+ @param aOutput Stream to read.
+ @return A pointer to the new test key stream object.
+ */
+ {
+ CTestKeyStreamSink* self = new (ELeave) CTestKeyStreamSink();
+ CleanupStack::PushL(self);
+ User::LeaveIfError(self->iFs.Connect());
+ self->InternalizeL(aStream);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+
+EXPORT_C CTestKeyStreamSink* CTestKeyStreamSink::NewL(const TDesC& aOutput)
+/**
+ Creates a new test key stream sink object.
+ @param aOutput The fully qualified output path.
+ @return A pointer to the new test key stream object.
+ */
+ {
+ CTestKeyStreamSink* self = new (ELeave) CTestKeyStreamSink();
+ CleanupStack::PushL(self);
+ User::LeaveIfError(self->iFs.Connect());
+ self->ConstructL(aOutput);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+void CTestKeyStreamSink::ConstructL(const TDesC& aOutput)
+/**
+ Second phase constructor for CTestKeyStreamSink object.
+ @param aOutput The fully qualified output path.
+ */
+ {
+ iOutput = aOutput.AllocL();
+ }
+
+EXPORT_C CKeyStreamSink *CTestKeyStreamSink::CloneLC() const
+/**
+ Clone the key stream sink.
+ */
+ {
+ CTestKeyStreamSink *newSink = CTestKeyStreamSink::NewL(*iOutput);
+ CleanupStack::PushL(newSink);
+ return newSink;
+ }
+
+EXPORT_C void CTestKeyStreamSink::ProcessNewKeyAssociationL(const CKeyAssociation& aKeyAssociation)
+/**
+ Implementation from CKeyStreamSink.
+ @see CKeyStreamSink::ProcessNewKeyAssociationL
+ */
+ {
+ RFile file;
+ User::LeaveIfError(file.Create(iFs, *iOutput, EFileWrite));
+ CleanupClosePushL(file);
+ const CTestKeyAssociation* key = dynamic_cast<const CTestKeyAssociation*>(&aKeyAssociation);
+ ASSERT(key);
+ User::LeaveIfError(file.Write(*(key->GetTestKey())));
+ CleanupStack::PopAndDestroy(&file);
+ }
+
+EXPORT_C void CTestKeyStreamSink::SetEncryptionAlgorithmL(const TEncryptionAlgorithm& /*aEncryptionAlgorithm*/)
+/**
+ Implementation from CKeyStreamSink.
+ @see CKeyStreamSink::SetEncryptionAlgorithmL
+ */
+ {
+ //empty
+ }
+
+EXPORT_C void CTestKeyStreamSink::SetAuthenticationAlgorithmL(const TAuthenticationAlgorithm& /*aAuthenticationAlgorithm*/)
+/**
+ Implementation from CKeyStreamSink.
+ @see CKeyStreamSink::SetEncryptionAlgorithmL
+ */
+ {
+ //empty
+ }
+
+EXPORT_C void CTestKeyStreamSink::DoExternalizeL(RWriteStream& aStream) const
+/**
+ Externalizes CTestKeyStreamSink object.
+ */
+ {
+ aStream<<*iOutput;
+ }
+
+
+void CTestKeyStreamSink::InternalizeL(RReadStream& aStream)
+/**
+ Internalizes CTestKeyStreamSink object.
+ @param aStream Stream to read from.
+ */
+ {
+ delete iOutput;
+ iOutput = NULL;
+ iOutput = HBufC::NewL(aStream,KMaxFileName);
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent/source/shared/testprotstrdesc.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,71 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the test protected stream description object for the streaming test agent.
+//
+//
+
+#include "testprotstrdesc.h"
+#include "testkeystreamsink.h"
+
+using namespace StreamAccess;
+
+CTestProtectedStreamDesc::CTestProtectedStreamDesc()
+/**
+ Constructor for CTestProtectedStreamDesc object.
+ */
+ {
+ //empty
+ }
+
+EXPORT_C CTestProtectedStreamDesc::~CTestProtectedStreamDesc()
+/**
+ Destructor for CTestProtectedStreamDesc object.
+ */
+ {
+ delete iOutput;
+ }
+
+EXPORT_C CTestProtectedStreamDesc* CTestProtectedStreamDesc::NewL(const TDesC& aOutput)
+/**
+ Creates a new test protected stream description object.
+ @param aOutput The fully qualified output path.
+ @return A pointer to the new test protected stream description object.
+ */
+ {
+ CTestProtectedStreamDesc* self = new (ELeave) CTestProtectedStreamDesc();
+ CleanupStack::PushL(self);
+ self->ConstructL(aOutput);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+void CTestProtectedStreamDesc::ConstructL(const TDesC& aOutput)
+/**
+ Second phase constructor for CTestProtectedStreamDesc object.
+ @param aOutput The fully qualified output path.
+ */
+ {
+ iOutput = aOutput.AllocL();
+ }
+
+EXPORT_C CKeyStreamSink* CTestProtectedStreamDesc::CreateKeyStreamSinkLC() const
+/**
+ Implementation from CProtectedStreamDesc
+ @see CProtectedStreamDesc::CreateKeyStreamSinkLC
+ */
+ {
+ CTestKeyStreamSink* sink = CTestKeyStreamSink::NewL(iOutput->Des());
+ CleanupStack::PushL(sink);
+ return sink;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent_singleprocess/inc/testsingleprocessagentfactory.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,51 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the Test 'Single Process' Stream Agent Factory
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+#ifndef TESTSINGLEPROCESSAGENTFACTORY_H_
+#define TESTSINGLEPROCESSAGENTFACTORY_H_
+
+#include <caf/streaming/streamagentfactory.h>
+#include "testsingleprocesskeystreamdecoder.h"
+#include "tscaf_spsadefs.h"
+
+class CSdpMediaField;
+class CSdpDocument;
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestSingleProcessAgentFactory) : public CStreamAgentFactory
+ {
+ public:
+ static CStreamAgentFactory* CreateTestAgentL();
+ CAgentKeyStreamDecoder* GetKeyStreamDecoderL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+ TBool IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream);
+ protected:
+ ~CTestSingleProcessAgentFactory();
+
+ private:
+ CTestSingleProcessAgentFactory();
+ };
+
+ }//End of the namespace StreamAccess
+
+#endif /*TESTSINGLEPROCESSAGENTFACTORY_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent_singleprocess/inc/testsingleprocesskeystreamdecoder.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,81 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the Test 'Single Process' Stream Agent Key Stream Decoder object.
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+#ifndef TESTSINGLEPROCESSKEYSTREAMDECODER_H
+#define TESTSINGLEPROCESSKEYSTREAMDECODER_H
+
+#include <s32file.h>
+
+#include "testkeystreamdecoderbase.h"
+#include "stacommon.h"
+#include "srarightsobject.h"
+#include "srautils.h"
+
+#include "testkeyassociation.h"
+#include "testkeystreamsink.h"
+
+class CSdpDocument;
+class CSdpDocument;
+namespace StreamAccess
+ {
+ NONSHARABLE_CLASS(CTestSingleProcessKeyStreamDecoder) : public CTestKeyStreamDecoderBase
+ {
+ public:
+ IMPORT_C static CTestSingleProcessKeyStreamDecoder* NewL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+ IMPORT_C static CTestSingleProcessKeyStreamDecoder* NewLC(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+ ~CTestSingleProcessKeyStreamDecoder();
+
+ //From CAgentKeyStreamDecoder
+ IMPORT_C void GetAttributeL(const TAttribute& aAttribute, TBool& aValue);
+ IMPORT_C HBufC* GetStringAttributeLC(const TStringAttribute& aAttribute);
+ IMPORT_C void GetPostDeliveryRightsL(RFile& aFile, TDes8& aCid, TDes8& aRightsMimeType, TDes8& aContentMimeType);
+
+ //From CTestKeyStreamDecoderBase
+ IMPORT_C void SendKeyStreamL(const TDesC8& aKey) const;
+ IMPORT_C void SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const;
+
+ protected:
+ void SetRoL();
+ void VerifyRoL();
+
+ private:
+ CTestSingleProcessKeyStreamDecoder();
+
+ void ConstructL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc);
+
+ private:
+ RFs iFs;
+
+ CKeyStreamSink* iKeyStreamSink;
+ CSdpMediaField* iSdp;
+ CSdpDocument* iSdpDoc;
+ CSraRightsObject* iRo;
+ };
+
+ }//End of the namespace StreamAccess
+#endif /*TESTSINGLEPROCESSKEYSTREAMDECODER_H*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent_singleprocess/inc/tscaf_spsadefs.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,37 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+/**
+ @file
+ @test
+*/
+
+#ifndef TSCAF_SPSADEFS_H_
+#define TSCAF_SPSADEFS_H_
+
+namespace StreamAccess
+ {
+
+ #ifdef STREAMAGENT_SP_01
+ // Test Stream Agent Factory Implementation UID
+ static const TUint KTestStreamAgentFactoryImpId = 0x10285A41;
+
+ // Supported KMS Id's
+ _LIT8(KSupportedKmsIds,"1234;2468;9876;");
+ #endif
+
+ }
+
+#endif /*TSCAF_SPSADEFS_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent_singleprocess/source/plugin/10285a42.rss Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// ECOM DLL UID: 0x10285A42
+// ECOM interface UID: 0x10285890 (KUidStreamAgentFactoryInterface)
+// ECOM Implementation: 0x10285A41
+//
+//
+
+#include <ecom/registryinfo.rh>
+
+RESOURCE REGISTRY_INFO so_registry
+ {
+ dll_uid = 0x10285A42;
+ interfaces =
+ {
+ INTERFACE_INFO
+ {
+ interface_uid = 0x10285890;
+
+ implementations =
+ {
+ IMPLEMENTATION_INFO
+ {
+ implementation_uid = 0x10285A41;
+ version_no = 1;
+ display_name = "Test 'Single Process' Stream Agent 1 ECOM Plugin";
+ default_data = "";
+ opaque_data = "";
+ }
+ };
+ }
+ };
+ }
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent_singleprocess/source/plugin/testsingleprocessagentfactory.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,98 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the Test 'Single Process' Stream Agent Factory
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+#include "testsingleprocessagentfactory.h"
+#include "srautils.h"
+
+using namespace StreamAccess;
+
+
+static const TImplementationProxy ImplementationTable[] =
+ {
+ IMPLEMENTATION_PROXY_ENTRY(KTestStreamAgentFactoryImpId, CTestSingleProcessAgentFactory::CreateTestAgentL)
+ };
+
+
+EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
+/**
+ Standard ECOM factory
+*/
+ {
+ aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
+ return ImplementationTable;
+ }
+
+
+// CTestSingleProcessAgentFactory
+
+
+CTestSingleProcessAgentFactory::CTestSingleProcessAgentFactory()
+/**
+ Constructor.
+ */
+: CStreamAgentFactory()
+ {
+ //empty
+ }
+
+
+CTestSingleProcessAgentFactory::~CTestSingleProcessAgentFactory()
+/**
+ Destructor
+ */
+ {
+ //empty
+ }
+
+
+CStreamAgentFactory* CTestSingleProcessAgentFactory::CreateTestAgentL()
+/**
+ Factory method that instantiates a new test stream agent factory ECOM plug-in.
+
+ @return A pointer to the new test stream agent factory object.
+*/
+ {
+ CTestSingleProcessAgentFactory *self = new(ELeave) CTestSingleProcessAgentFactory();
+ return self;
+ }
+
+CAgentKeyStreamDecoder* CTestSingleProcessAgentFactory::GetKeyStreamDecoderL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ @see CStreamAgentFactory::GetKeyStreamDecoderL
+ */
+ {
+ return CTestSingleProcessKeyStreamDecoder::NewL(aKeyStreamSink, aSdpKeyStream, aSdpDoc);
+ }
+
+TBool CTestSingleProcessAgentFactory::IsKeyStreamSupportedL(const CSdpMediaField& aSdpKeyStream)
+/**
+ Function to determine whether the test stream agent supports the key management scheme
+ specified in the SDP key stream definition
+ @param aSdpKeyStream Contains the metadata for the SDP key management scheme of the stream
+ @return ETrue if the test stream agent recognises the SDP format and is able to decode the key stream
+ @return EFalse if the test stream agent fails to recofnise the SDP format or is unable to decode the key stream
+ */
+ {
+ return CheckKeyStreamSupportedL(aSdpKeyStream, KSupportedKmsIds());
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/streamingtestagent_singleprocess/source/shared/testsingleprocesskeystreamdecoder.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,239 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the Test 'Single Process' Stream Agent Key Stream Decoder object.
+//
+//
+
+/**
+ @file
+ @test
+*/
+
+#include "testsingleprocesskeystreamdecoder.h"
+
+using namespace StreamAccess;
+
+CTestSingleProcessKeyStreamDecoder::CTestSingleProcessKeyStreamDecoder()
+/**
+ Constructor.
+ */
+ : CTestKeyStreamDecoderBase()
+ {
+ //empty
+ }
+
+CTestSingleProcessKeyStreamDecoder::~CTestSingleProcessKeyStreamDecoder()
+/**
+ Destructor.
+ */
+ {
+ iFs.Close();
+
+ delete iKeyStreamSink;
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ delete iSdp;
+ delete iSdpDoc;
+#endif
+ delete iRo;
+ }
+
+EXPORT_C CTestSingleProcessKeyStreamDecoder* CTestSingleProcessKeyStreamDecoder::NewL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ Factory function allocates a new instance of CTestSingleProcessKeyStreamDecoder.
+ @return New instance of CTestSingleProcessKeyStreamDecoder
+ */
+ {
+ CTestSingleProcessKeyStreamDecoder* self = CTestSingleProcessKeyStreamDecoder::NewLC(aKeyStreamSink, aSdpKeyStream, aSdpDoc);
+ CleanupStack::Pop(self);
+ return self;
+ }
+
+EXPORT_C CTestSingleProcessKeyStreamDecoder* CTestSingleProcessKeyStreamDecoder::NewLC(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ Factory function allocates a new instance of CTestSingleProcessKeyStreamDecoder
+ and places the object on the cleanup stack.
+ @return A new instance of CTestSingleProcessKeyStreamDecoder
+ which is left on the cleanup stack.
+ */
+ {
+ CTestSingleProcessKeyStreamDecoder* self = new (ELeave) CTestSingleProcessKeyStreamDecoder();
+ CleanupStack::PushL(self);
+ self->ConstructL(aKeyStreamSink, aSdpKeyStream, aSdpDoc);
+ return self;
+ }
+
+void CTestSingleProcessKeyStreamDecoder::ConstructL(const CKeyStreamSink& aKeyStreamSink,
+ const CSdpMediaField& aSdpKeyStream,
+ const CSdpDocument& aSdpDoc)
+/**
+ Second phase constructor.
+ */
+ {
+ User::LeaveIfError(iFs.Connect());
+
+ iKeyStreamSink = aKeyStreamSink.CloneLC();
+ CleanupStack::Pop(iKeyStreamSink);
+
+ // Set the encryption and authentication algorithm of the key stream sink
+ iKeyStreamSink->SetEncryptionAlgorithmL(EAES_128_CBC);
+ iKeyStreamSink->SetAuthenticationAlgorithmL(EHMAC_SHA1);
+
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ iSdp = aSdpKeyStream.CloneL();
+ iSdpDoc = aSdpDoc.CloneL();
+#else
+ (void) aSdpKeyStream;
+ (void) aSdpDoc;
+#endif
+ SetRoL();
+ }
+
+EXPORT_C void CTestSingleProcessKeyStreamDecoder::GetAttributeL(const TAttribute& aAttribute, TBool& aValue)
+/**
+ @see CAgentKeyStreamDecoder::GetAttributeL
+ */
+ {
+ VerifyRoL();
+
+ aValue = EFalse;
+
+ switch(aAttribute)
+ {
+ case EIsProgramProtected:
+ aValue = iRo->AccessRights() & EProgramProtected;
+ break;
+ case EIsServiceProtected:
+ aValue = iRo->AccessRights() & EServiceProtected;
+ break;
+ case ECanExport:
+ aValue = iRo->AccessRights() & ECanExportContent;
+ break;
+ case EMustProtectIfRecording:
+ aValue = iRo->AccessRights() & EMustProtectContentIfRecording;
+ break;
+ case ECanPlay:
+ aValue = iRo->AccessRights() & ECanPlayContent;
+ break;
+ default:
+ User::Leave(KErrCAOutOfRange);
+ }
+
+ // If the the return value is greater than 0, set the boolean value to ETrue
+ if(aValue)
+ {
+ aValue = ETrue;
+ }
+ }
+
+EXPORT_C HBufC* CTestSingleProcessKeyStreamDecoder::GetStringAttributeLC(const TStringAttribute& aAttribute)
+/**
+ @see CAgentKeyStreamDecoder::GetStringAttributeL
+ */
+ {
+ VerifyRoL();
+
+ HBufC8* str8 = NULL;
+
+ switch(aAttribute)
+ {
+ case EContentID:
+ str8 = iRo->ContentId();
+ break;
+ case ERightsIssuerURI:
+ str8 = iRo->RightsIssuer();
+ break;
+ default:
+ User::Leave(KErrCAOutOfRange);
+ }
+
+ //Convert 8-bit to 16-bit
+ HBufC* value = HBufC::NewL(str8->Des().Size());
+ TPtr ptr(value->Des());
+ ptr.Copy(str8->Des());
+
+ CleanupStack::PushL(value);
+ return value;
+ }
+
+EXPORT_C void CTestSingleProcessKeyStreamDecoder::GetPostDeliveryRightsL(RFile& /*aFile*/, TDes8& /*aCid*/, TDes8& /*aRightsMimeType*/, TDes8& /*aContentMimeType*/)
+/**
+ @see CAgentKeyStreamDecoder::GetPostDeliveryRightsHandleL
+ */
+ {
+ User::Leave(KErrNotSupported);
+ }
+
+EXPORT_C void CTestSingleProcessKeyStreamDecoder::SendKeyStreamL(const TDesC8& aKey) const
+/**
+ Sends an encrypted short-term key to the key stream sink
+ @param aKey An encrypted key.
+ */
+ {
+ HBufC8* shortTermKey = aKey.AllocLC();
+
+ //Check if the long-term key key exists in the short-term key
+ TInt ret = shortTermKey->Find(*iRo->Key());
+ if(ret == KErrNotFound)
+ {
+ User::Leave(KErrGeneral);
+ }
+
+ //Get the plain string (key)
+ HBufC8* decryptedKey = HBufC8::NewLC(ret);
+ TPtr8 ptrKey(decryptedKey->Des());
+ ptrKey.Copy(shortTermKey->Des().Ptr(), ret);
+
+ CTestKeyAssociation* decryptedAssoc = CTestKeyAssociation::NewL(ptrKey);
+ CleanupStack::PushL(decryptedAssoc);
+
+ iKeyStreamSink->ProcessNewKeyAssociationL(*decryptedAssoc);
+
+ CleanupStack::PopAndDestroy(3, shortTermKey); //< shortTermKey, decryptedKey, decryptedAssoc
+ }
+
+EXPORT_C void CTestSingleProcessKeyStreamDecoder::SendIpSecAssociationL(TInt32 aSpi, HBufC8* aEncryptionKey, HBufC8* aAuthenticationKey) const
+ {
+ CKeyAssociation* ipSecKeyAssociation = CIpSecKeyAssociation::NewLC(aSpi, aEncryptionKey, aAuthenticationKey);
+ iKeyStreamSink->ProcessNewKeyAssociationL(*ipSecKeyAssociation);
+ CleanupStack::PopAndDestroy(ipSecKeyAssociation);
+ }
+
+void CTestSingleProcessKeyStreamDecoder::SetRoL()
+ {
+ _LIT(KDriveFormat,"!:");
+ TBuf<50> privateFolder;
+ iFs.PrivatePath(privateFolder);
+ privateFolder.Insert(0,KDriveFormat);
+
+ DoSetRightsObjectL(iFs, *iSdp, iRo, privateFolder);
+ }
+
+void CTestSingleProcessKeyStreamDecoder::VerifyRoL()
+/**
+ Verifies that the rights object exists.
+ */
+ {
+ if(!iRo)
+ {//The RO defined in the SDP does not exist
+ User::Leave(KErrCANoRights);
+ }
+ if(iRo->IsExpired())
+ {
+ User::Leave(KErrCANoPermission);
+ }
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/startupcommsstep.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,30 @@
+// Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#ifndef STARTUPCOMMSSTEP_H
+#define STARTUPCOMMSSTEP_H
+
+#include <test/testexecutestepbase.h>
+
+_LIT(KStartupCommsStep, "StartupCommsStep");
+
+class CStartupCommsStep : public CTestStep
+ {
+ public:
+ CStartupCommsStep ();
+ TVerdict doTestStepL();
+ };
+
+#endif //STARTUPCOMMSSTEP_H
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tipsec.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,122 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines IPSec key stream sink test cases
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TIPSEC_H_
+#define TIPSEC_H_
+
+#include <es_sock.h>
+#include <in_sock.h>
+#include <lib_pfkey.h>
+
+#include "tscafstep.h"
+
+class CScafIpSec: public CScafStep
+ {
+public:
+ CScafIpSec(CScafServer& aParent);
+ TVerdict doTestStepPreambleL();
+ TVerdict doTestL();
+ TVerdict doTestStepPostambleL();
+protected:
+ void SendKeyAssociationToKeySinkL(TInt aSpi, CKeyStreamSink *aKeyStreamSink);
+ void AddAndValidateAssociationsL(CKeyStreamSink *aKeyStreamSink, TInt aSpiBase);
+ void ValidateNoAssociationsL(TInt aSpiBase);
+ CKeyStreamSink *CreateDefaultKeyStreamSinkLC();
+ void InitializeAlgorithmsL(CKeyStreamSink *aKeyStreamSink);
+ static void CallValidateSadbL(TInt32 aSpi, TInetAddr &aSourceAddr, TInetAddr &aDestAddr, TBool aPositiveTesting);
+protected:
+ RSocketServ iSocketServ;
+ RConnection iConnection;
+ RSocket iClientSocket;
+ CKeyStreamSink *iKeyStreamSink;
+ TInetAddr iServerAddr;
+ TInetAddr iClientAddr;
+ HBufC8* iEncryptionKey;
+ HBufC8* iAuthenticationKey;
+ TInt iAssociationsNumber;
+ TBool iAuthenticationUsed;
+ TInt iEncryptionAlgorithm;
+ TInt iAuthenticationAlgorithm;
+ };
+
+class CScafIpSecDecoderIntegration : public CScafIpSec
+ {
+public:
+ CScafIpSecDecoderIntegration(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+class CScafIpSecSadbVerification : public CScafIpSec
+ {
+public:
+ CScafIpSecSadbVerification(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+class CScafIpSecSadbVerificationConcurrency : public CScafIpSec
+ {
+public:
+ CScafIpSecSadbVerificationConcurrency(CScafServer& aParent);
+ TVerdict doTestL();
+ void TestThreadFuncL(TInt aBaseSpi);
+ };
+
+class CScafIpSecNegative : public CScafIpSec
+ {
+public:
+ CScafIpSecNegative(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+class CScafIpSecMultipleSinks: public CScafIpSec
+ {
+public:
+ CScafIpSecMultipleSinks(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+class CScafIpSecAlgorithmChange: public CScafIpSec
+ {
+public:
+ CScafIpSecAlgorithmChange(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+class CScafIpSecSARemoval: public CScafIpSec
+ {
+public:
+ CScafIpSecSARemoval(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+// Test case identifier definition
+_LIT(KScafIpSec,"SCAFIpSec");
+_LIT(KScafIpSecDecoderIntegration,"SCAFIpSecDecoderIntegration");
+_LIT(KScafIpSecSadbVerification, "SCAFIpSecSadbVerification");
+_LIT(KScafIpSecSadbVerificationConcurrency, "SCAFIpSecSadbVerificationConcurrency");
+_LIT(KScafIpSecNegative,"SCAFIpSecNegative");
+_LIT(KScafIpSecMultipleSinks,"SCAFIpSecMultipleSinks");
+_LIT(KScafIpSecAlgorithmChange,"SCAFIpSecAlgorithmChange");
+_LIT(KScafIpSecSARemoval,"SCAFIpSecSARemoval");
+
+#endif /*TIPSEC_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tkeystreamdecoderattributes.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,44 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the Key Stream Decoder Query Attribute Test Case
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TKEYSTREAMDECODERATTRIBUTES_H_
+#define TKEYSTREAMDECODERATTRIBUTES_H_
+
+#include "tscafstep.h"
+
+class CScafKeyStreamDecoderAttributes : public CScafStep
+ {
+public:
+ CScafKeyStreamDecoderAttributes(CScafServer& aParent);
+ ~CScafKeyStreamDecoderAttributes();
+ TVerdict doTestStepPreambleL();
+ TVerdict doTestStepPostambleL();
+ TVerdict doTestL();
+
+private:
+ };
+
+// Test case identifier definition
+_LIT(KScafKeyStreamDecoderAttributes,"SCAFKeyStreamDecoderAttributes");
+
+#endif /*TKEYSTREAMDECODERATTRIBUTES_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tkeystreamdecoderconstruct.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,42 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the Key Stream Decoder Construction Test Case
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TKEYSTREAMDECODERCONSTRUCT_H_
+#define TKEYSTREAMDECODERCONSTRUCT_H_
+
+#include "tscafstep.h"
+
+class CScafKeyStreamDecoderConstruct : public CScafStep
+ {
+public:
+ CScafKeyStreamDecoderConstruct(CScafServer& aParent);
+ ~CScafKeyStreamDecoderConstruct();
+ TVerdict doTestL();
+
+private:
+ };
+
+// Test case identifier definition
+_LIT(KScafKeyStreamDecoderConstruct,"SCAFKeyStreamDecoderConstruct");
+
+#endif /*TKEYSTREAMDECODERCONSTRUCT_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tkeystreamsink.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,57 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the Key Stream Sink usage tests.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TKEYSTREAMSINK_H_
+#define TKEYSTREAMSINK_H_
+
+#include "tscafstep.h"
+#include "srarightsobject.h"
+#include "testagentkeystreamdecoder.h"
+
+class CScafKeyStreamSink : public CScafStep
+ {
+public:
+ CScafKeyStreamSink(CScafServer& aParent);
+ ~CScafKeyStreamSink();
+ TVerdict doTestL();
+ };
+
+// Constant used to name this test case
+_LIT(KScafKeyStreamSinkStep,"SCAFKeyStreamSink");
+
+
+class CScafConcurrentKeyStreamSinks : public CScafStep
+/**
+ Defines a test showing usage of key stream sinks in concurrent sessions.
+ */
+ {
+public:
+ CScafConcurrentKeyStreamSinks(CScafServer& aParent);
+ ~CScafConcurrentKeyStreamSinks();
+ TVerdict doTestL();
+ };
+
+// Constant used to name this test case
+_LIT(KScafConcurrentKeyStreamSinksStep,"SCAFConcurrentKeyStreamSinks");
+
+#endif /*TKEYSTREAMSINK_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tmultikeystreamdecoders.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the Multiple Key Stream Decoder Test Case
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TMULTIKEYSTREAMDECODERS_H_
+#define TMULTIKEYSTREAMDECODERS_H_
+
+#include "tscafstep.h"
+#include <caf/streaming/keystreamdecoder.h>
+
+class CScafMultiKeyStreamDecoders : public CScafStep
+ {
+public:
+ CScafMultiKeyStreamDecoders(CScafServer& aParent);
+ ~CScafMultiKeyStreamDecoders();
+ TVerdict doTestStepPreambleL();
+ TVerdict doTestStepPostambleL();
+ TVerdict doTestL();
+
+private:
+ };
+
+// Test case identifier definition
+_LIT(KScafMultiKeyStreamDecoders,"SCAFMultiKeyStreamDecoders");
+
+#endif /*TMULTIKEYSTREAMDECODERS_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tpostacquisition.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,48 @@
+
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the post-acquisition content protection test.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TPOSTACQUISITION_H_
+#define TPOSTACQUISITION_H_
+
+#include "tscafstep.h"
+#include <caf/importfile.h>
+
+// Constant used to name test cases
+_LIT(KScafPostAcquisitionStep,"SCAFPostAcquisition");
+
+class CScafPostAcquisition : public CScafStep
+/**
+ Defines the post-acqusition test showing how to record
+ protected content.
+ */
+ {
+public:
+ CScafPostAcquisition(CScafServer& aParent);
+ ~CScafPostAcquisition();
+ TVerdict doTestL();
+private:
+ TInt ProvideNewOutputFileL(ContentAccess::CImportFile& aImport, TDes& aName);
+ };
+
+#endif /*TPOSTACQUISITION_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/treferenceagent.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Describes the reference agent test case verifying the validity of the reference agent implementation.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TREFERENCEAGENT_H
+#define TREFERENCEAGENT_H
+
+#include "tipsec.h"
+
+// The reference agent test sends and validates IPSec associations,
+// thus it shares much functionality with CScafIpSec class. Therefore,
+// CScafRefAgent class derives from CScafIpSec.
+
+class CScafRefAgent: public CScafIpSec
+ {
+public:
+ CScafRefAgent(CScafServer& aParent);
+ TVerdict doTestL();
+ };
+
+// Test case identifier definition
+_LIT(KScafRefAgent,"SCAFRefAgent");
+// Reference agent private folder
+_LIT(KSraPrivateFolder, "!:\\private\\10285A1C\\");
+
+#endif /* REFERENCEAGENT_H */
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tscafdefs.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,105 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the common constant definitions for the Streaming CAF test harness
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TSCAFDEFS_H_
+#define TSCAFDEFS_H_
+
+//Names of the test RO files
+_LIT(KServiceProtectedRo,"roserviceprotected.dr");
+_LIT(KProgramProtectedRo,"roprogramprotected.dr");
+_LIT(KSimpleRoFileName,"rosimple.dr");
+_LIT(KExpiredRoFileName,"roexpired.dr");
+_LIT(KRecordableRoFileName,"rorecordable.dr");
+_LIT(KPostAcquisitionRoFileName,"postacquisitiontest.dr");
+
+/** The private folder of the Streaming Test Agent. */
+_LIT(KStaPrivateFolder,"!:\\private\\1028588b\\");
+
+/** The private folder of the Test Server. */
+_LIT(KTestServerPrivateFolder,"!:\\private\\1028588c\\");
+
+/** The private folder of the Reference Test Agent. */
+_LIT(KRtaPrivateFolder,"!:\\private\\10205ea5\\");
+
+/** The path where data files live. */
+_LIT(KDataFilesPath,"z:\\tcaf\\tscaf\\data\\");
+
+/** The test folder of the Reference Test Agent. */
+_LIT(KRtaTestFolder,"!:\\rta\\");
+
+/** Maximum length of the Rights Object's content. */
+const TInt KMaxRightsObjectLength = 255;
+
+/** Maximum length of a Mime type. */
+const TInt KMaxMimeTypeLength = 50;
+
+// ******* INI file configuration constants *******
+
+// Out of Memory Test attributes
+_LIT(KScafConfigOOMTest,"OOMTest");
+
+// Rights object filename attribute
+_LIT(KScafConfigRoName,"RoName_%d");
+
+// Key Stream Decoder Attribute Identifiers
+_LIT(KScafConfigIsServiceProtected,"IsServiceProtected%d");
+_LIT(KScafConfigIsProgramProtected,"IsProgramProtected%d");
+_LIT(KScafConfigCanExport,"CanExport%d");
+_LIT(KScafConfigMustProtectIfRecording,"MustProtectIfRecording%d");
+_LIT(KScafConfigCanPlay,"CanPlay%d");
+_LIT(KScafConfigContentId,"ContentId%d");
+_LIT(KScafConfigRightsIssuerUri,"RightsIssuerUri%d");
+
+// Single Process Stream Agent Specific Attributes
+_LIT(KScafConfigSingleProcessAgent,"SingleProcessAgent%d");
+_LIT(KScafConfigPrivateFolderPath,"PrivateFolderPath%d");
+
+// SDP Construction Attributes
+_LIT(KSdpMedia,"Media%d");
+_LIT(KSdpPort,"Port%d");
+_LIT(KSdpProtocol,"Protocol%d");
+_LIT(KSdpFormat,"Format%d");
+_LIT(KSdpConnAddr,"ConnectionAddress%d");
+_LIT(KSdpAttributeNum,"AttributeNum%d");
+_LIT(KSdpAttributeName,"AttributeName%d%d");
+_LIT(KSdpAttributeValue,"AttributeValue%d%d");
+_LIT(KSdpAttributeType,"AttributeType%d%d");
+
+// Constants for Media types
+_LIT(KSdpMediaAudio,"Audio");
+_LIT(KSdpMediaVideo,"Video");
+_LIT(KSdpMediaData,"Data");
+
+//Constants for Protocol types
+_LIT(KSdpProtocolUdp,"Udp");
+_LIT(KSdpProtocolTcp,"Tcp");
+_LIT(KSdpProtocolRtp,"Rtp");
+
+//Whether the output file is created by the test harness
+//ETrue=Test Harness creates output files
+//EFalse=The agent creates output files
+_LIT(KCreateOutputFiles, "CreateOutputFiles");
+
+// ********************************************
+
+#endif /*TSCAFDEFS_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tscafserver.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,50 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the test server of the Streaming CAF test harness
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TSCAFSERVER_H_
+#define TSCAFSERVER_H_
+
+#include <test/testexecuteserverbase.h>
+
+_LIT(KStaServerName, "tscaf");
+
+class CScafServer : public CTestServer
+/**
+ Describes the test server for the Stremaing CAF test harness.
+ */
+ {
+public:
+ static CScafServer* NewL();
+ virtual CTestStep* CreateTestStep(const TDesC& aStepName);
+ RFs& Fs();
+ ~CScafServer();
+private:
+ RFs iFs;
+ };
+
+inline RFs& CScafServer::Fs()
+ {
+ return iFs;
+ }
+
+#endif /*TSCAFSERVER_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tscafstep.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,158 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the basic test step for the Streaming CAF test harness
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TSCAFSTEP_H_
+#define TSCAFSTEP_H_
+
+#include <test/testexecutestepbase.h>
+#include <caf/streaming/keystreamdecoder.h>
+#include "testagentkeystreamdecoder.h"
+#include "testsingleprocesskeystreamdecoder.h"
+#include "testkeystreamsink.h"
+#include "srarightsobject.h"
+#include "tscafserver.h"
+#include "tscafdefs.h"
+#include <f32file.h>
+#include <s32file.h>
+
+using namespace StreamAccess;
+class CSdpMediaField;
+class CSdpDocument;
+
+class TSdpAttribute
+/**
+ * Data storage class containing the information about a single SDP Attribute
+ */
+ {
+public:
+ TSdpAttribute();
+
+ TPtrC iAttributeType;
+ TPtrC iAttributeName;
+ TPtrC iAttributeValue;
+ };
+
+
+class CTestDecoderConfiguration : public CBase
+/**
+ * Container class storing the parameters and attributes retreived from the configuration file
+ * that are required to construct a key stream decoder object
+ */
+ {
+public:
+ static CTestDecoderConfiguration* NewLC();
+ ~CTestDecoderConfiguration();
+
+ TBool iSingleProcessAgent;
+ TPtrC iPrivateFolderPath;
+ TPtrC iMedia;
+ TPtrC iProtocol;
+ TInt iPort;
+ TPtrC iFormat;
+ TPtrC iConnAddr; ///< SDP connection field's IP address
+
+ // Array of sdp meta data attributes
+ RArray<TSdpAttribute> iAttributeArray;
+
+protected:
+ CTestDecoderConfiguration();
+ };
+
+
+class TExpectedKeyStreamDecoderAttributes
+ {
+/**
+ * Data storage class containing expected values for the attributes associated to a particular
+ * Key Stream Decoder
+ */
+public:
+ TExpectedKeyStreamDecoderAttributes();
+
+ TBool IsProgramProtected;
+ TBool IsServiceProtected;
+ TBool CanExport;
+ TBool MustProtectIfRecording;
+ TBool CanPlay;
+
+ TPtrC ContentId;
+ TPtrC RightsIssuerUri;
+ };
+
+
+class CScafStep : public CTestStep
+/**
+ Base class used to provide handy functions available to test step classes.
+ */
+ {
+public:
+ virtual ~CScafStep();
+
+ TVerdict doTestStepPreambleL();
+ TVerdict doTestStepL();
+ TVerdict doTestStepPostambleL();
+ void CleanAgentsPrivateFolderL(const TDesC& aPrivatePath);
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ CSdpDocument* CreateSdpDocumentLC();
+ CSdpMediaField* CreateSdpLC(TInt aSdpNum);
+ void AddMediaFieldL(CSdpDocument& aSdpDoc, const CSdpMediaField* aSdpKeyStream);
+#endif
+ CKeyStreamSink* CreateKeyStreamSinkLC(const TDesC& aFilePath, const TDesC& aPrivPath);
+ void CopyFile2AgentsPrivateFolderL(RFs& aFs, const TDesC& aFileName, const TDesC& aPrivPath);
+ HBufC* GetFullPathLC(const TDesC& aPath, const TDesC& aFileName);
+ CSraRightsObject* GetRightsObjectLC(const TDesC& aName, const TDesC& aPrivPath);
+ void ReadTestConfigurationL();
+ TBool CheckKeyStreamDecoderAttributesL(const CKeyStreamDecoder& aDecoder,
+ const TExpectedKeyStreamDecoderAttributes& aExpectedData);
+
+protected:
+ CScafStep(CScafServer& aParent);
+ TPtr8 Convert16To8LC(TDesC& aDes);
+ TVerdict doOOMTestL();
+ virtual TVerdict doTestL();
+ TBool CompareBooleanAttributeL(const CKeyStreamDecoder& aDecoder,
+ const TAttribute& aAttributeEnum,
+ const TDesC& aAttributeDescription,
+ const TBool aExpectedValue);
+ TBool CompareStringAttributeL(const CKeyStreamDecoder& aDecoder,
+ const TStringAttribute& aAttributeEnum,
+ const TDesC& aAttributeDescription,
+ const TDesC& aExpectedValue);
+
+private:
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ void AddAttributes2SdpL(CSdpMediaField& aSdp, TInt aSdpNum);
+#endif
+ void PrintErrorAndLeaveL(TDesC& aKey);
+ static void DeleteSdpDocAndCloseCodecPool(TAny* aSdpDoc);
+
+protected:
+ CScafServer& iParent;
+ TInt iThreadId;
+ TBool iOOMTest;
+ RPointerArray<CTestDecoderConfiguration> iDecoderConfigurationArray;
+ RArray<TExpectedKeyStreamDecoderAttributes> iExpectedKeyStreamDecoderData;
+
+private:
+ CActiveScheduler *iActiveScheduler;
+ };
+#endif /*TSCAFSTEP_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tsetuprightsobjects.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,43 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the setup utility step for copying rights objects into the test stream agents
+// private directory
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TSETUPRIGHTSOBJECTS_H_
+#define TSETUPRIGHTSOBJECTS_H_
+
+#include "tscafstep.h"
+
+class CScafSetupRightsObjects : public CScafStep
+ {
+public:
+ CScafSetupRightsObjects(CScafServer& aParent);
+ ~CScafSetupRightsObjects();
+ TVerdict doTestStepL();
+
+private:
+ };
+
+// Test case identifier definition
+_LIT(KScafSetupRightsObjectsStep,"SCAFSetupRightsObjects");
+
+#endif /*TSETUPRIGHTSOBJECTS_H_*/
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/inc/tstaunittest.h Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,41 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Defines the unit test steps for the Test Streaming Agent.
+//
+//
+
+/**
+ @file
+ @internalComponent
+ @test
+*/
+
+#ifndef TSTAUNITTEST_H_
+#define TSTAUNITTEST_H_
+
+#include "tscafstep.h"
+#include <caf/rightsinfo.h>
+
+// Constant used to name this test case
+_LIT(KScafTestAgentServerStep,"SCAFTestAgentServer");
+
+class CScafTestAgentServer : public CScafStep
+ {
+public:
+ CScafTestAgentServer(CScafServer& aParent);
+ ~CScafTestAgentServer();
+ TVerdict doTestStepL();
+ };
+
+#endif /*TSTAUNITTEST_H_*/
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/roexpired.dr has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/ropostacquisition.dr Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,22 @@
+<?xml version="1.0" encoding="ISO-8859-1" ?>
+<drmrights>
+ <rights cid="PostAcquisitionTest">
+ <Intent type="display">
+ <count>
+ 33
+ </count>
+ <expiry>
+ <day>
+ 11
+ </day>
+ <month>
+ 11
+ </month>
+ <year>
+ 2011
+ </year>
+ </expiry>
+ </Intent>
+ </rights>
+</drmrights>
+
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/roprogramprotected.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/rorecordable.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/roserviceprotected.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/rosimple.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_expired01.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_programprotect01.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_programprotect02.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_programprotect03.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_serviceprotect01.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_serviceprotect02.dr has changed
Binary file contentmgmt/cafstreamingsupport/test/tscaf/scripts/data/tscaf_rights_serviceprotect03.dr has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscaf.ini Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1595 @@
+//********************** Utility Configurations **********************
+[Rights_None]
+
+[Rights_Service]
+RoName_0=tscaf_rights_serviceprotect01.dr
+RoName_1=tscaf_rights_serviceprotect02.dr
+RoName_2=tscaf_rights_serviceprotect03.dr
+
+[Rights_Program]
+RoName_0=tscaf_rights_programprotect01.dr
+RoName_1=tscaf_rights_programprotect02.dr
+RoName_2=tscaf_rights_programprotect03.dr
+
+[Rights_Expired]
+RoName_0=tscaf_rights_expired01.dr
+
+[Rights_ServiceProgram]
+RoName_0=tscaf_rights_programprotect01.dr
+RoName_1=tscaf_rights_programprotect02.dr
+RoName_2=tscaf_rights_programprotect03.dr
+RoName_3=tscaf_rights_serviceprotect01.dr
+RoName_4=tscaf_rights_serviceprotect02.dr
+RoName_5=tscaf_rights_serviceprotect03.dr
+
+[Rights_ServiceProgramExpired]
+RoName_0=tscaf_rights_programprotect01.dr
+RoName_1=tscaf_rights_programprotect02.dr
+RoName_2=tscaf_rights_programprotect03.dr
+RoName_3=tscaf_rights_serviceprotect01.dr
+RoName_4=tscaf_rights_serviceprotect02.dr
+RoName_5=tscaf_rights_serviceprotect03.dr
+RoName_6=tscaf_rights_expired01.dr
+
+[Rights_Service_SingleProcessAgent]
+PrivateFolderPath0=!:\private\1028588c\
+
+RoName_0=tscaf_rights_serviceprotect01.dr
+RoName_1=tscaf_rights_serviceprotect02.dr
+RoName_2=tscaf_rights_serviceprotect03.dr
+
+[Rights_Program_SingleProcessAgent]
+PrivateFolderPath0=!:\private\1028588c\
+
+RoName_0=tscaf_rights_programprotect01.dr
+RoName_1=tscaf_rights_programprotect02.dr
+RoName_2=tscaf_rights_programprotect03.dr
+
+[Rights_ServiceProgram_SingleProcessAgent]
+PrivateFolderPath0=!:\private\1028588c\
+
+RoName_0=tscaf_rights_programprotect01.dr
+RoName_1=tscaf_rights_programprotect02.dr
+RoName_2=tscaf_rights_programprotect03.dr
+RoName_3=tscaf_rights_serviceprotect01.dr
+RoName_4=tscaf_rights_serviceprotect02.dr
+RoName_5=tscaf_rights_serviceprotect03.dr
+
+
+//********************** SEC-SCAF-A : CONSUMER INTERFACE **********************
+
+// **** SEC-SCAF-A001 ****
+
+[keystreamdecoder_positiveconstruct]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=1002
+AttributeType01=Format
+
+[keystreamdecoder_positiveconstruct_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=1002
+AttributeType01=Format
+
+
+// **** SEC-SCAF-A002 ****
+
+[keystreamdecoder_negativeconstruct]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=1
+AttributeName00=ipdc-ksm
+AttributeValue00=IPDCStreamId=16; IPDCKMSId=9999
+AttributeType00=Format
+
+
+[keystreamdecoder_negativeconstruct_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=1
+AttributeName00=ipdc-ksm
+AttributeValue00=IPDCStreamId=16; IPDCKMSId=9999
+AttributeType00=Format
+
+
+// **** SEC-SCAF-A004 ****
+
+[keystreamdecoder_positivequery_programprotectedRO]
+IsProgramProtected0=True
+IsServiceProtected0=False
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=P01
+RightsIssuerUri0=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType01=Format
+
+
+[keystreamdecoder_positivequery_programprotectedRO_OOM]
+OOMTest=True
+
+IsProgramProtected0=True
+IsServiceProtected0=False
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=P01
+RightsIssuerUri0=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType01=Format
+
+
+[keystreamdecoder_positivequery_serviceprotectedRO]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=18; IPDCKMSId=1005; IPDCOperatorId=267
+AttributeType01=Format
+
+
+[keystreamdecoder_positivequery_serviceprotectedRO_OOM]
+OOMTest=True
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=18; IPDCKMSId=1005; IPDCOperatorId=267
+AttributeType01=Format
+
+
+// **** SEC-SCAF-A005 ****
+
+[keystreamdecoder_missingrights]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=19; IPDCKMSId=1002; IPDCOperatorId=123
+AttributeType01=Format
+
+
+[keystreamdecoder_missingrights_OOM]
+OOMTest=True
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=19; IPDCKMSId=1002; IPDCOperatorId=123
+AttributeType01=Format
+
+
+// **** SEC-SCAF-A006 ****
+
+[keystreamdecoder_expiredrights]
+IsProgramProtected0=True
+IsServiceProtected0=False
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=E01
+RightsIssuerUri0=http://expired.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=E01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=20; IPDCKMSId=1005; IPDCOperatorId=111
+AttributeType01=Format
+
+
+[keystreamdecoder_expiredrights_OOM]
+OOMTest=True
+
+IsProgramProtected0=True
+IsServiceProtected0=False
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=E01
+RightsIssuerUri0=http://expired.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=E01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=20; IPDCKMSId=1005; IPDCOperatorId=111
+AttributeType01=Format
+
+
+// **** SEC-SCAF-A007 ****
+[keystreamdecoder_concurrentquery_threadA]
+IsProgramProtected0=True
+IsServiceProtected0=False
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=P01
+RightsIssuerUri0=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=21; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType01=Format
+
+
+[keystreamdecoder_concurrentquery_threadB]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=22; IPDCKMSId=1003; IPDCOperatorId=246
+AttributeType01=Format
+
+
+[keystreamdecoder_concurrentquery_threadC]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=23; IPDCKMSId=1006; IPDCOperatorId=123
+AttributeType01=Format
+
+
+
+// **** SEC-SCAF-A008 ****
+[multikeystreamdecoders_singlethread_singleagent]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S03
+RightsIssuerUri0=http://sprot03.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=False
+CanPlay1=True
+ContentId1=P01
+RightsIssuerUri1=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S03
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=24; IPDCKMSId=1005; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P01
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=25; IPDCKMSId=1002; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_singlethread_singleagent_OOM]
+OOMTest=True
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S03
+RightsIssuerUri0=http://sprot03.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=False
+CanPlay1=True
+ContentId1=P01
+RightsIssuerUri1=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S03
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=24; IPDCKMSId=1005; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P01
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=25; IPDCKMSId=1002; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_singlethread_multiagents]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=26; IPDCKMSId=1005; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=27; IPDCKMSId=1004; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_singlethread_multiagents_OOM]
+OOMTest=True
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=26; IPDCKMSId=1005; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=27; IPDCKMSId=1004; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_concurrent_singleagent_threadA]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=28; IPDCKMSId=1005; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=29; IPDCKMSId=1002; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_concurrent_singleagent_threadB]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=True
+CanPlay1=True
+ContentId1=P02
+RightsIssuerUri1=http://pprot02.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=30; IPDCKMSId=1003; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P02
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=31; IPDCKMSId=1004; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_concurrent_singleagent_threadC]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S03
+RightsIssuerUri0=http://sprot03.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=False
+CanPlay1=True
+ContentId1=P01
+RightsIssuerUri1=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S03
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=32; IPDCKMSId=1006; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P01
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=33; IPDCKMSId=1003; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[multikeystreamdecoders_concurrent_multiagents_threadA]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=False
+CanPlay1=True
+ContentId1=P01
+RightsIssuerUri1=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=34; IPDCKMSId=1002; IPDCOperatorId=111
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P01
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=35; IPDCKMSId=1003; IPDCOperatorId=222
+AttributeType11=Format
+
+
+[multikeystreamdecoders_concurrent_multiagents_threadB]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=True
+CanPlay1=True
+ContentId1=P02
+RightsIssuerUri1=http://pprot02.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=36; IPDCKMSId=1005; IPDCOperatorId=333
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P02
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=37; IPDCKMSId=1004; IPDCOperatorId=444
+AttributeType11=Format
+
+
+[multikeystreamdecoders_concurrent_multiagents_threadC]
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S03
+RightsIssuerUri0=http://sprot03.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S03
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=38; IPDCKMSId=1008; IPDCOperatorId=555
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=39; IPDCKMSId=1006; IPDCOperatorId=666
+AttributeType11=Format
+
+
+// **** SEC-SCAF-D001 ****
+[post_acquisition]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=postacquisitiontest
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1002; IPDCOperatorId=277
+AttributeType01=Format
+CreateOutputFiles=EFalse
+
+[post_acquisition_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=postacquisitiontest
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1002; IPDCOperatorId=277
+AttributeType01=Format
+CreateOutputFiles=EFalse
+
+[post_acquisition_create_outputs]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=postacquisitiontest
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1002; IPDCOperatorId=277
+AttributeType01=Format
+CreateOutputFiles=ETrue
+
+[post_acquisition_create_outputs_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=postacquisitiontest
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1002; IPDCOperatorId=277
+AttributeType01=Format
+CreateOutputFiles=ETrue
+
+//********************************************************************************
+
+[sdp_service_protected]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=11; IPDCKMSId=1005; IPDCOperatorId=267
+AttributeType01=Format
+
+
+[sdp_service_protected_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=11; IPDCKMSId=1005; IPDCOperatorId=267
+AttributeType01=Format
+
+
+[sdp_program_protected]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoB
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=12; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType01=Format
+
+[sdp_program_protected_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoB
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=12; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType01=Format
+
+
+[concurrent_keystreamsinks]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=13; IPDCKMSId=1002; IPDCOperatorId=344
+AttributeType01=Format
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=RoB
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=14; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType11=Format
+
+
+[concurrent_keystreamsinks_OOM]
+OOMTest=True
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=13; IPDCKMSId=1002; IPDCOperatorId=344
+AttributeType01=Format
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=RoB
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=14; IPDCKMSId=1008; IPDCOperatorId=589
+AttributeType11=Format
+
+
+
+//******************IPSec Tests**************************************************************
+
+// Default Values:
+// UseAuthentincation = True (authentication is used)
+// AssociationsNumber = 1 (one key association is sent)
+// IntegrationTest = True (integration with the networking stack is tested)
+// ListenPort = 667
+// ThreadsNumber = 10 (applies to concurrency test only)
+// EncryptionAlgorithm = 1 (AES-CBC)
+// AuthenticationAlgorithm = 1 (HMAC-SHA1)
+// SinksNumber = 10 (applies only to multiple sinks test)
+
+[basic_ipsec_integration]
+ServerAddress=192.168.174.5
+
+[ipsec_integration_multiple_messages]
+AssociationsNumber=2
+ServerAddress=192.168.174.5
+
+[ipsec_integration_no_authentication]
+UseAuthentication=0
+IntegrationTest=True
+ServerAddress=192.168.174.5
+
+[ipsec_integration_decoder]
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=1002
+AttributeType01=Format
+ServerAddress=192.168.174.5
+
+[ipsec_integration_decoder_automatic]
+IntegrationTest=0
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=1002
+AttributeType01=Format
+
+[ipsec_integration_negative_uprotected_port]
+ListenPort=999
+ServerAddress=192.168.174.5
+
+[ipsec_positiveconstruct]
+IntegrationTest=0
+
+[ipsec_verify_sadb]
+AssociationsNumber=2
+
+[ipsec_verify_sadb_concurrency]
+ThreadsNumber=5
+AssociationsNumber=2
+
+[ipsec_negative]
+
+[ipsec_multiple_sinks]
+SinksNumber=5
+AssociationsNumber=2
+
+[ipsec_algorithm_change]
+
+[ipsec_wrong_enc_algorithm1]
+EncryptionAlgorithm=0
+
+[ipsec_wrong_enc_algorithm2]
+EncryptionAlgorithm=2
+
+[ipsec_wrong_enc_algorithm3]
+EncryptionAlgorithm=333
+
+[ipsec_wrong_auth_algorithm]
+AuthenticationAlgorithm=333
+
+[ipsec_no_authentication]
+UseAuthentication=0
+
+[ipsec_sa_removal]
+AssociationsNumber=10
+
+
+IPSEC OOM Tests
+******************
+
+[ipsec_integration_decoder_automatic_OOM]
+OOMTest=True
+IntegrationTest=0
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=1002
+AttributeType01=Format
+
+[ipsec_positiveconstruct_OOM]
+OOMTest=True
+IntegrationTest=0
+
+[ipsec_negative_OOM]
+OOMTest=True
+
+[ipsec_algorithm_change_OOM]
+OOMTest=True
+
+[ipsec_no_authentication_OOM]
+OOMTest=True
+UseAuthentication=0
+
+//******************* Reference Agent Tests ******************************
+[reference_agent]
+Media0=Data
+Port0=3003
+Protocol0=Udp
+Format0=ipdc-ksm
+ConnectionAddress0=192.168.0.3
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoB
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=2222
+AttributeType01=Format
+
+AssociationsNumber = 1 (one key association is sent)
+UseAuthentincation = True (authentication is used)
+EncryptionKey=0123456789ABCDEF
+EncryptionAlgorithm = 1 (AES-CBC)
+AuthenticationAlgorithm = 1 (HMAC-SHA1)
+AuthenticationKey=FEDCBA9876543210
+
+[reference_agent_OOM]
+OOMTest=True
+Media0=Data
+Port0=3003
+Protocol0=Udp
+Format0=ipdc-ksm
+ConnectionAddress0=192.168.0.3
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoB
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=2222
+AttributeType01=Format
+
+AssociationsNumber = 1 (one key association is sent)
+UseAuthentincation = True (authentication is used)
+EncryptionKey=0123456789ABCDEF
+EncryptionAlgorithm = 1 (AES-CBC)
+AuthenticationAlgorithm = 1 (HMAC-SHA1)
+AuthenticationKey=FEDCBA9876543210
+
+
+//********************** SEC-SCAF-G : SINGLE PROCESS STREAM AGENT TESTING **********************
+
+// **** SEC-SCAF-G001 ****
+
+[spsa_keystreamdecoder_positiveconstruct]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=1234
+AttributeType01=Format
+
+
+
+// **** SEC-SCAF-G002 ****
+
+[spsa_keystreamdecoder_positivequery_programprotectedRO]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+IsProgramProtected0=True
+IsServiceProtected0=False
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=P01
+RightsIssuerUri0=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=17; IPDCKMSId=1234; IPDCOperatorId=589
+AttributeType01=Format
+
+
+[spsa_keystreamdecoder_positivequery_serviceprotectedRO]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=18; IPDCKMSId=1234; IPDCOperatorId=267
+AttributeType01=Format
+
+
+
+// **** SEC-SCAF-G003 ****
+
+[spsa_multikeystreamdecoders_singlethread_singleagent]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+SingleProcessAgent1=True
+PrivateFolderPath1=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S03
+RightsIssuerUri0=http://sprot03.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=False
+CanPlay1=True
+ContentId1=P01
+RightsIssuerUri1=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S03
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=24; IPDCKMSId=1234; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P01
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=25; IPDCKMSId=2468; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[spsa_multikeystreamdecoders_singlethread_multiagents]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=26; IPDCKMSId=1234; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=27; IPDCKMSId=1004; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[spsa_multikeystreamdecoders_concurrent_singleagent_threadA]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+SingleProcessAgent1=True
+PrivateFolderPath1=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=28; IPDCKMSId=1234; IPDCOperatorId=935
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=29; IPDCKMSId=2468; IPDCOperatorId=638
+AttributeType11=Format
+
+
+[spsa_multikeystreamdecoders_concurrent_multiagents_threadA]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=False
+CanPlay0=True
+ContentId0=S01
+RightsIssuerUri0=http://sprot01.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=False
+CanPlay1=True
+ContentId1=P01
+RightsIssuerUri1=http://pprot01.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=34; IPDCKMSId=1234; IPDCOperatorId=111
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P01
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=35; IPDCKMSId=1003; IPDCOperatorId=222
+AttributeType11=Format
+
+
+[spsa_multikeystreamdecoders_concurrent_multiagents_threadB]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=False
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S02
+RightsIssuerUri0=http://sprot02.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=True
+MustProtectIfRecording1=True
+CanPlay1=True
+ContentId1=P02
+RightsIssuerUri1=http://pprot02.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S02
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=36; IPDCKMSId=2468; IPDCOperatorId=333
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P02
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=37; IPDCKMSId=1004; IPDCOperatorId=444
+AttributeType11=Format
+
+
+[spsa_multikeystreamdecoders_concurrent_multiagents_threadC]
+SingleProcessAgent1=True
+PrivateFolderPath1=!:\private\1028588c\
+
+IsProgramProtected0=False
+IsServiceProtected0=True
+CanExport0=True
+MustProtectIfRecording0=True
+CanPlay0=True
+ContentId0=S03
+RightsIssuerUri0=http://sprot03.net/issuerights
+
+IsProgramProtected1=True
+IsServiceProtected1=False
+CanExport1=False
+MustProtectIfRecording1=True
+CanPlay1=False
+ContentId1=P03
+RightsIssuerUri1=http://pprot03.net/issuerights
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=S03
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=38; IPDCKMSId=1008; IPDCOperatorId=555
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=P03
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=39; IPDCKMSId=9876; IPDCOperatorId=666
+AttributeType11=Format
+
+
+
+// **** SEC-SCAF-G004 ****
+
+[spsa_keystreamink]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=11; IPDCKMSId=1234; IPDCOperatorId=267
+AttributeType01=Format
+
+
+[spsa_concurrent_keystreamsinks]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+SingleProcessAgent1=True
+PrivateFolderPath1=!:\private\1028588c\
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=13; IPDCKMSId=1234; IPDCOperatorId=344
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=RoB
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=14; IPDCKMSId=2468; IPDCOperatorId=589
+AttributeType11=Format
+
+
+[spsa_cssa_concurrent_keystreamsinks]
+SingleProcessAgent1=True
+PrivateFolderPath1=!:\private\1028588c\
+
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=RoA
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=13; IPDCKMSId=1008; IPDCOperatorId=344
+AttributeType01=Format
+
+Media1=Data
+Port1=10155
+Protocol1=Udp
+Format1=ipdc-ksm
+AttributeNum1=2
+AttributeName10=baseCID
+AttributeValue10=RoB
+AttributeType10=Normal
+AttributeName11=ipdc-ksm
+AttributeValue11=IPDCStreamId=14; IPDCKMSId=2468; IPDCOperatorId=589
+AttributeType11=Format
+
+
+
+// **** SEC-SCAF-G006 ****
+
+[spsa_ipsec_integration_decoder_automatic]
+SingleProcessAgent0=True
+PrivateFolderPath0=!:\private\1028588c\
+
+IntegrationTest=0
+Media0=Data
+Port0=10104
+Protocol0=Udp
+Format0=ipdc-ksm
+AttributeNum0=2
+AttributeName00=baseCID
+AttributeValue00=P01
+AttributeType00=Normal
+AttributeName01=ipdc-ksm
+AttributeValue01=IPDCStreamId=15; IPDCKMSId=2468
+AttributeType01=Format
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscaf.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,668 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF Integration Tests
+
+PRINT Run PREQ782 Streaming CAF Integration Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+
+//! @SYMTestCaseID SEC-SCAF-MISC-0001
+//! @SYMTestCaseDesc StartupComms
+
+START_TESTCASE SEC-SCAF-MISC-0001
+RUN_TEST_STEP 100 tscaf StartupCommsStep
+END_TESTCASE SEC-SCAF-MISC-0001
+
+
+//********************** SEC-SCAF-A : CONSUMER INTERFACE **********************
+
+//! @SYMTestCaseID SEC-SCAF-A001
+//! @SYMTestCaseDesc Key stream decoder construction with a supported protected key stream description
+//! (keystreamdecoder_positiveconstruct)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • There are the necessary ROM based test stream agent plug-ins present that support
+//! the SDP media description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream.
+//! • Construct the key stream decoder using the protected stream description and SDP
+//! media description objects previously generated.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • The key stream decoder is successfully created and destroyed.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A001
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positiveconstruct
+END_TESTCASE SEC-SCAF-A001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A002
+//! @SYMTestCaseDesc Key stream decoder construction with an unsupported protected key stream description
+//! (keystreamdecoder_negativeconstruct)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The ROM based test stream agent plug-ins present DO NOT support the SDP media
+//! description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream that is incompatible with all
+//! available stream agent implementations.
+//! • Construct the key stream decoder using the protected stream description and
+//! incompatible SDP media description objects previously generated.
+//! @SYMTestExpectedResults • Construction of the key stream decoder leaves with the KErrCANoAgent error code.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A002
+RUN_TEST_STEP !Result=-17453 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini keystreamdecoder_negativeconstruct
+END_TESTCASE SEC-SCAF-A002
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A004
+//! @SYMTestCaseDesc Querying attributes related to a key stream decoder
+//! (keystreamdecoder_positivequery)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based test stream agent plug-in is present that supports the SDP
+//! media description
+//! supplied during construction of the key stream decoder.
+//! • There are two Rights Objects files (serviceProtectedRO and programProtectedRO) in
+//! the private folder of the supporting test stream agent.
+//! • The Rights Issuer URI of the serviceProtectedRO is set to “IssuerUriServiceProtectedRO”
+//! and programProtectedRO is set to “IssuerUriProgramProtectedRO”
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream with an attribute requiring
+//! programProtectedRO
+//! • Construct the key stream decoder using the protected stream description and SDP media
+//! description objects previously generated.
+//! • Query the stream agent to determine whether the program is protected.
+//! • Query the stream agent to determine whether the whole service is protected.
+//! • Query the stream agent to retrieve the Rights Issuer URI.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • The key stream decoder is successfully created.
+//! • The program is protected but the whole service is not.
+//! • The Rights Issuer URI retrieved is “IssuerUriProgramProtectedRO”
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A004
+
+// Copy the necessary 'Program' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_programprotectedRO
+
+// Copy the necessary 'Service' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Service
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_serviceprotectedRO
+
+END_TESTCASE SEC-SCAF-A004
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A005
+//! @SYMTestCaseDesc Querying attributes related to a key stream decoder with missing rights object
+//! (keystreamdecoder_missingrights)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based test stream agent plug-in is present that supports the SDP
+//! media description supplied during construction of the key stream decoder.
+//! • The program protected rights object (programProtectedRO) exists in the private
+//! directory of the supporting test stream agent, but the service protected rights object
+//! (serviceProtectedRO) is missing.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream with an attribute requiring
+//! serviceProtectedRO.
+//! • Construct the key stream decoder using the protected stream description and SDP media
+//! description objects previously generated.
+//! • Query the stream agent to determine whether the program is protected.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • Querying the stream agent results in a leave with error code KErrCANoRights, showing
+//! that serviceProtectedRO is missing.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A005
+
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_None
+
+RUN_TEST_STEP !Result=-17452 tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_missingrights
+
+END_TESTCASE SEC-SCAF-A005
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A006
+//! @SYMTestCaseDesc Querying attributes related to a key stream decoder with an expired rights object
+//! (keystreamdecoder_expiredrights)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based test stream agent plug-in is present that supports the SDP media
+//! description supplied during construction of the key stream decoder.
+//! • There is an expired Rights Object file (expiredRO) in the private folder of the supporting
+//! test stream agent.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream with an attribute requiring expiredRo.
+//! • Construct the key stream decoder using the protected stream description and SDP media
+//! description objects previously generated.
+//! • Query the stream agent to determine whether the program is protected.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • Querying the stream agent results in a leave with error code KErrCANoPermission, showing
+//! that expiredRo has expired.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A006
+
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Expired
+
+RUN_TEST_STEP !Result=-17451 tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_expiredrights
+
+END_TESTCASE SEC-SCAF-A006
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A007
+//! @SYMTestCaseDesc Concurrent key stream decoder construction and querying
+//! (keystreamdecoder_concurrentquery)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! The following test actions should be carried out concurrently in 3 separate threads:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description. Thread A should generate an SDP media description
+//! supported by test stream agent plug-in A and Threads B & C should generate SDP media
+//! description objects supported by test stream agent plug-in B.
+//! • Construct a key stream decoder object using the generated protected key stream
+//! description and SDP media description objects.
+//! • When the key stream decoder has been constructed, query the attributes associated
+//! with the stream agent.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • Each key stream decoder object should construct successfully.
+//! • Checking the implementation attributes reveals that Thread A has invoked test stream
+//! agent A and Thread B & C have invoked test stream agent B.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A007
+
+// Copy the necessary rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_concurrentquery_threadA
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_concurrentquery_threadB
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_concurrentquery_threadC
+CONSECUTIVE
+
+END_TESTCASE SEC-SCAF-A007
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A008
+//! @SYMTestCaseDesc Concurrent multi-thread usage of multiple key stream decoders
+//! (multikeystreamdecoders)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7775, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! The following test actions should be carried out concurrently in 3 separate threads:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description (SDPa) for the key stream with an attribute
+//! requiring serviceProtectedRO.
+//! • Construct a key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPa – decoderA.
+//! • Generate another SDP media description (SDPb) for the key stream with an attribute
+//! requiring programProtectedRO.
+//! • Construct another key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPb – decoderB.
+//! • Query decoderA to retrieve the ‘Rights Issuer URI’ attribute from the invoked
+//! stream agent.
+//! • Query decoderB to retrieve the ‘Rights Issuer URI’ attribute from the invoked
+//! stream agent.
+//! • Destroy both key stream decoder objects.
+//!
+//! @SYMTestExpectedResults • Each key stream decoder object should construct successfully.
+//! • The Rights Issuer URI attribute value retrieved from decoderA is
+//! “IssuerUriServiceProtectedRO”
+//! • The Rights Issuer URI attribute value retrieved from decoderB is
+//! “IssuerUriProgramProtectedRO”
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A008
+
+// Copy the necessary rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+// 2 Key Stream Decoders, Invoking the same stream agent
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_singleagent
+
+// 2 Key Stream Decoders, Invoking different stream agents
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_multiagents
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking the same agent
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadC
+CONSECUTIVE
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking different agents
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_multiagents_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_multiagents_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_multiagents_threadC
+CONSECUTIVE
+
+END_TESTCASE SEC-SCAF-A008
+
+
+
+//****************** TEST STREAM AGENT UNIT TESTING *******************
+
+//! @SYMTestCaseID SEC-SCAF-S001
+//! @SYMTestCaseDesc A unit test step which tests the Test Streaming Agent
+//! (StreamingTestAgent)
+//! @SYMREQ Req-b
+//! @SYMTestPriority Low
+//! @SYMTestActions A connection is established with the Test Agent Server via its client side and the closed.
+//! @SYMTestExpectedResults Successful connection and disconnectiom to/from the Test Streaming Agent Server.
+//! @SYMDevelopedForRelease Oghma
+
+START_TESTCASE SEC-SCAF-S001
+RUN_TEST_STEP 100 tscaf SCAFTestAgentServer
+END_TESTCASE SEC-SCAF-S001
+
+
+
+//************ SEC-SCAF-C : INTEROPERABILITY WITH DECODING STACK ***********
+
+
+//! @SYMTestCaseID SEC-SCAF-C001
+//! @SYMTestCaseDesc Usage of key stream sink
+//! (keystreamsinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7774, REQ7778, REQ7786
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • There are the necessary ROM based test stream agent plug-ins present that support
+//! the SDP media description supplied during construction of each key stream decoder.
+//! • There is a Right Object file in the private folder of the supporting test stream agent.
+//!
+//! Test Actions:
+//! • Create a key stream sink
+//! • Create a plain key and encrypt it with the key extracted from the RO
+//! • Connect to the Test Agent
+//! • Send the key stream sink
+//! • Send the encrypted string (a simple key stream)
+//! • The test agent server decrypts the key stream by using the key from the RO.
+//! • The test agent server processes the decrypted key (the key is written into a file
+//! defined in the key stream sink)
+//! • Check whether the right plain key is written down
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • The plain string is found in the predefined location.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-C001
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamSink z:\tcaf\tscaf\tscaf.ini sdp_service_protected
+END_TESTCASE SEC-SCAF-C001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-C002
+//! @SYMTestCaseDesc Usage of key stream sinks in concurrent sessions
+//! (concurrent_keystreamsinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7774, REQ7778, REQ7786
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Preconditions:
+//! • There are the necessary ROM based test stream agent plug-ins present that support
+//! the SDP media description supplied during construction of each key stream decoder.
+//! • There are two Rights Object files (serviceProtectedRO and programProtectedRO) in the
+//! private folder of each test stream agent.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description (SDPa) for the key stream with an attribute requiring
+//! serviceProtectedRO.
+//! • Construct a key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPa – decoderA.
+//! • Generate another SDP media description (SDPb) for the key stream with an attribute requiring
+//! programProtectedRO.
+//! • Construct another key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPb – decoderB.
+//! • Create plain_keyA
+//! • Encrypt plain_keyA with encryption_keyA extracted from serviceProtectedRO
+//! • Send the encrypted plain_keyA using decoderA
+//! • Create plain_keyB
+//! • Encrypt plain_keyB with encryption_keyB extracted from programProtectedRO
+//! • Send the encrypted plain_keyB using decoderB
+//! • Check whether stringA is in pathA and stringB is in pathB
+//! • Destroy both key stream decoder objects.
+//!
+//! @SYMTestExpectedResults • The plain strings are found in the predefined locations.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-C002
+RUN_TEST_STEP 100 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini concurrent_keystreamsinks
+END_TESTCASE SEC-SCAF-C002
+
+
+
+//********************** SEC-SCAF-D : POST-ACQUISITION **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-D001
+//! @SYMTestCaseDesc Post-acquisition content protection
+//! (postacqusition)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7788
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! The following test actions should be carried out:
+//! • Copy rorecordable.dr (a rights object where ECanExport and EMustProtectIfRecording
+//! flags shall be set) and its post-acquistion rights object (ropostacquisition.dr) into
+//! the private directory of the test agent server.
+//! • Generate a test key stream description
+//! • Generate an SDP media description for the key stream with an attribute requiring
+//! rorecordable.dr
+//! • Construct the key stream decoder using the protected key stream description and SDP
+//! media description objects previously generated.
+//! • Query the stream agent to determine whether it is allowed to export and record the
+//! content.
+//! • Request and gets a handle to the postacqusition rights object file
+//! • Import the postacqusition rights object file to the post-acquisition caf agent
+//! • Open a session to import the content
+//! • Import the content to the post-acquisition caf agent
+//!
+//! @SYMTestExpectedResults
+//! • The protected stream is allowed to be recorded
+//! • The test streaming agent returns a handle of the post-acquistion RO successfully
+//! • The post-acquistion RO is successfully imported to the post-acquisition caf agent
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-D001
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition_create_outputs
+
+END_TESTCASE SEC-SCAF-D001
+
+
+
+//********************** SEC-SCAF-E : INTEROPERABILITY WITH DECODING STACK - IPSEC ***********
+
+RUN_SCRIPT z:\tcaf\tscaf\tscafipsec.script
+
+
+
+//********************** SEC-SCAF-G : SINGLE PROCESS STREAM AGENT TESTING **********************
+
+//! @SYMTestCaseID SEC-SCAF-G001
+//! @SYMTestCaseDesc SPSA - Key stream decoder construction with a supported protected key stream description
+//! (spsa_keystreamdecoder_positiveconstruct)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports
+//! the SDP media description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-A001.
+//!
+//! @SYMTestExpectedResults • The key stream decoder constructed by the single process stream agent is successfully
+//! created and destroyed.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G001
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini spsa_keystreamdecoder_positiveconstruct
+END_TESTCASE SEC-SCAF-G001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G002
+//! @SYMTestCaseDesc SPSA - Querying attributes related to a key stream decoder
+//! (spsa_keystreamdecoder_positivequery)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports
+//! the SDP media description supplied during construction of the key stream decoder.
+//! • The required Rights Object file is present in the private folder for the supporting
+//! single process stream agent.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-A004.
+//!
+//! @SYMTestExpectedResults • The key stream decoder constructed by the single process stream agent is successfully
+//! created.
+//! • All of the expected attribute values match their corresponding values retrieved from
+//! the key stream decoder.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G002
+
+// Copy the necessary 'Program' Protected rights objects into the single process stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program_SingleProcessAgent
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini spsa_keystreamdecoder_positivequery_programprotectedRO
+
+// Copy the necessary 'Service' Protected rights objects into the single process stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Service_SingleProcessAgent
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini spsa_keystreamdecoder_positivequery_serviceprotectedRO
+
+END_TESTCASE SEC-SCAF-G002
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G003
+//! @SYMTestCaseDesc SPSA - Concurrent multi-thread usage of multiple key stream decoders
+//! (spsa_multikeystreamdecoders)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ and ‘client-server’ stream agent plug-in
+//! implementations are present that support the SDP media descriptions supplied during
+//! construction of the key stream decoders.
+//! • The required Rights Object files are present in the private folder of the supporting
+//! stream agents.
+//!
+//! Test Actions:
+//! The following test actions should be carried out concurrently in 3 separate threads
+//! (1 of the threads should instantiate a ‘single process’ stream agent, whereas the others
+//! should instantiate ‘client-server’ based stream agents) :
+//!
+//! • Run the test step actions as described in test case SEC-SCAF-A008
+//!
+//! @SYMTestExpectedResults • Each of the key stream decoder objects that have been constructed by either a
+//! client-server or single process stream agent plug-in are created successfully.
+//! • All of the expected attribute values match their corresponding values retrieved from
+//! the associated key stream decoder.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G003
+
+// Copy the necessary rights objects into the stream agent's private directory (Client/Server Architecture)
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+// Copy the necessary rights objects into the stream agent's private directory (Single Process Stream Agent)
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram_SingleProcessAgent
+
+// 2 Key Stream Decoders, Invoking the same single process stream agent
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_singlethread_singleagent
+
+// 2 Key Stream Decoders, Invoking different stream agents (1 Single Process & 1 Client/Server)
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_singlethread_multiagents
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking the same agent
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_singleagent_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadC
+CONSECUTIVE
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking different agents (1 Single Process & 1 Client/Server)
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_multiagents_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_multiagents_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_multiagents_threadC
+CONSECUTIVE
+
+END_TESTCASE SEC-SCAF-G003
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G004
+//! @SYMTestCaseDesc SPSA - Usage of key stream sink
+//! (spsa_keystreamsinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports
+//! the SDP media description supplied during construction of the key stream decoder.
+//! • The required Rights Object file is present in the private folder for the supporting single
+//! process stream agent.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-C001.
+//!
+//! @SYMTestExpectedResults • The expected plain text string is found in the predefined location.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G004
+
+// Single Process Stream Agent Invoked
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamSink z:\tcaf\tscaf\tscaf.ini spsa_keystreamink
+
+// 2 Single Process Stream Agents Invoked
+RUN_TEST_STEP 100 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini spsa_concurrent_keystreamsinks
+
+// 1 Single Process Stream Agent and 1 Client/Server Stream Agent Invoked
+RUN_TEST_STEP 100 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini spsa_cssa_concurrent_keystreamsinks
+
+END_TESTCASE SEC-SCAF-G004
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G006
+//! @SYMTestCaseDesc SPSA - Testing IPSec integration with key stream decoder
+//! (spsa_ipsec_integration_decoder_automatic)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports the
+//! SDP media description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-E015.
+//!
+//! @SYMTestExpectedResults • Associations was added
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G006
+
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program_SingleProcessAgent
+
+//The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini spsa_ipsec_integration_decoder_automatic
+
+END_TESTCASE SEC-SCAF-G006
+
+
+
+//********************** SEC-SCAF-H : REFERENCE AGENT TEST **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-H001
+//! @SYMTestCaseDesc Smoke testing for the Reference Agent
+//! (referenceagent)
+//! @SYMPREQ PREQ782
+//! @SYMREQ -------
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Generate a IPSec protected key stream description.
+//! • Create a key stream sink from the protected key stream description.
+//! • Create a key stream decoder from an SDP message requiring the reference agent
+//! and the key stream sink.
+//! • Create a short term key message and write it to a predefined socket.
+//! @SYMTestExpectedResults
+//! • Interfaces are invoked without leaves and panics.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-H001
+
+RUN_TEST_STEP 100 tscaf SCAFRefAgent z:\tcaf\tscaf\tscaf.ini reference_agent
+
+END_TESTCASE SEC-SCAF-H001
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscaf_oom.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,170 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF "Out of Memory" Tests
+
+PRINT Run PREQ782 Streaming CAF OOM Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-0001
+//! @SYMTestCaseDesc StartupComms
+
+START_TESTCASE SEC-SCAF-OOM-0001
+RUN_TEST_STEP 100 tscaf StartupCommsStep
+END_TESTCASE SEC-SCAF-OOM-0001
+
+
+// Note: For test case descriptions, please refer to the corresponding tscaf.script file
+
+
+//********************** SEC-SCAF-A : CONSUMER INTERFACE **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A001
+//! @SYMTestCaseDesc (keystreamdecoder_positiveconstruct_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A001
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positiveconstruct_OOM
+END_TESTCASE SEC-SCAF-OOM-A001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A002
+//! @SYMTestCaseDesc (keystreamdecoder_negativeconstruct_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A002
+RUN_TEST_STEP !Result=-17453 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini keystreamdecoder_negativeconstruct_OOM
+END_TESTCASE SEC-SCAF-OOM-A002
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A004
+//! @SYMTestCaseDesc (keystreamdecoder_positivequery_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A004
+
+// Copy the necessary 'Program' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_programprotectedRO_OOM
+
+// Copy the necessary 'Service' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Service
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_serviceprotectedRO_OOM
+
+END_TESTCASE SEC-SCAF-OOM-A004
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A005
+//! @SYMTestCaseDesc (keystreamdecoder_missingrights_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A005
+
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_None
+
+RUN_TEST_STEP !Result=-17452 tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_missingrights_OOM
+
+END_TESTCASE SEC-SCAF-OOM-A005
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A006
+//! @SYMTestCaseDesc (keystreamdecoder_expiredrights_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A006
+
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Expired
+
+RUN_TEST_STEP !Result=-17451 tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_expiredrights_OOM
+
+END_TESTCASE SEC-SCAF-OOM-A006
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A008
+//! @SYMTestCaseDesc (multikeystreamdecoders_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A008
+
+// Copy the necessary rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+// 2 Key Stream Decoders, Invoking the same stream agent
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_singleagent_OOM
+
+// 2 Key Stream Decoders, Invoking different stream agents
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_multiagents_OOM
+
+END_TESTCASE SEC-SCAF-OOM-A008
+
+
+
+//************ SEC-SCAF-C : INTEROPERABILITY WITH DECODING STACK ***********
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-C001
+//! @SYMTestCaseDesc (keystreamsinks_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-C001
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamSink z:\tcaf\tscaf\tscaf.ini sdp_service_protected_OOM
+END_TESTCASE SEC-SCAF-OOM-C001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-C002
+//! @SYMTestCaseDesc (concurrent_keystreamsinks_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-C002
+RUN_TEST_STEP 150 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini concurrent_keystreamsinks_OOM
+END_TESTCASE SEC-SCAF-OOM-C002
+
+
+
+//********************** SEC-SCAF-D : POST-ACQUISITION **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-D001
+//! @SYMTestCaseDesc (postacqusition_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-D001
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition_OOM
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition_create_outputs_OOM
+
+END_TESTCASE SEC-SCAF-OOM-D001
+
+
+
+//********************** SEC-SCAF-E : INTEROPERABILITY WITH DECODING STACK - IPSEC ***********
+
+RUN_SCRIPT z:\tcaf\tscaf\tscafipsec_oom.script
+
+
+
+//********************** SEC-SCAF-H : REFERENCE AGENT TEST **********************
+
+//! @SYMTestCaseID SEC-SCAF-OOM-H001
+//! @SYMTestCaseDesc (referenceagent_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-H001
+RUN_TEST_STEP 100 tscaf SCAFRefAgent z:\tcaf\tscaf\tscaf.ini reference_agent_OOM
+END_TESTCASE SEC-SCAF-OOM-H001
+
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscaf_oom_without_upward_dependent.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,134 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF "Out of Memory" Tests
+
+PRINT Run PREQ782 Streaming CAF OOM Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-0001
+//! @SYMTestCaseDesc StartupComms
+
+START_TESTCASE SEC-SCAF-OOM-0001
+RUN_TEST_STEP 100 tscaf StartupCommsStep
+END_TESTCASE SEC-SCAF-OOM-0001
+
+
+// Note: For test case descriptions, please refer to the corresponding tscaf.script file
+
+
+//********************** SEC-SCAF-A : CONSUMER INTERFACE **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A001
+//! @SYMTestCaseDesc (keystreamdecoder_positiveconstruct_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A001
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positiveconstruct_OOM
+END_TESTCASE SEC-SCAF-OOM-A001
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A004
+//! @SYMTestCaseDesc (keystreamdecoder_positivequery_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A004
+
+// Copy the necessary 'Program' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_programprotectedRO_OOM
+
+// Copy the necessary 'Service' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Service
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_serviceprotectedRO_OOM
+
+END_TESTCASE SEC-SCAF-OOM-A004
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-A008
+//! @SYMTestCaseDesc (multikeystreamdecoders_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-A008
+
+// Copy the necessary rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+// 2 Key Stream Decoders, Invoking the same stream agent
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_singleagent_OOM
+
+// 2 Key Stream Decoders, Invoking different stream agents
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_multiagents_OOM
+
+END_TESTCASE SEC-SCAF-OOM-A008
+
+
+
+//************ SEC-SCAF-C : INTEROPERABILITY WITH DECODING STACK ***********
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-C001
+//! @SYMTestCaseDesc (keystreamsinks_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-C001
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamSink z:\tcaf\tscaf\tscaf.ini sdp_service_protected_OOM
+END_TESTCASE SEC-SCAF-OOM-C001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-C002
+//! @SYMTestCaseDesc (concurrent_keystreamsinks_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-C002
+RUN_TEST_STEP 150 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini concurrent_keystreamsinks_OOM
+END_TESTCASE SEC-SCAF-OOM-C002
+
+
+
+//********************** SEC-SCAF-D : POST-ACQUISITION **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-D001
+//! @SYMTestCaseDesc (postacqusition_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-D001
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition_OOM
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition_create_outputs_OOM
+
+END_TESTCASE SEC-SCAF-OOM-D001
+
+
+
+//********************** SEC-SCAF-E : INTEROPERABILITY WITH DECODING STACK - IPSEC ***********
+
+RUN_SCRIPT z:\tcaf\tscaf\tscafipsec_oom.script
+
+
+
+//********************** SEC-SCAF-H : REFERENCE AGENT TEST **********************
+
+//! @SYMTestCaseID SEC-SCAF-OOM-H001
+//! @SYMTestCaseDesc (referenceagent_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-H001
+RUN_TEST_STEP 100 tscaf SCAFRefAgent z:\tcaf\tscaf\tscaf.ini reference_agent_OOM
+END_TESTCASE SEC-SCAF-OOM-H001
+
+
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscaf_without_upward_dependent.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,566 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF Integration Tests
+
+PRINT Run PREQ782 Streaming CAF Integration Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+
+//! @SYMTestCaseID SEC-SCAF-MISC-0001
+//! @SYMTestCaseDesc StartupComms
+
+START_TESTCASE SEC-SCAF-MISC-0001
+RUN_TEST_STEP 100 tscaf StartupCommsStep
+END_TESTCASE SEC-SCAF-MISC-0001
+
+
+//********************** SEC-SCAF-A : CONSUMER INTERFACE **********************
+
+//! @SYMTestCaseID SEC-SCAF-A001
+//! @SYMTestCaseDesc Key stream decoder construction with a supported protected key stream description
+//! (keystreamdecoder_positiveconstruct)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • There are the necessary ROM based test stream agent plug-ins present that support
+//! the SDP media description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream.
+//! • Construct the key stream decoder using the protected stream description and SDP
+//! media description objects previously generated.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • The key stream decoder is successfully created and destroyed.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A001
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positiveconstruct
+END_TESTCASE SEC-SCAF-A001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A004
+//! @SYMTestCaseDesc Querying attributes related to a key stream decoder
+//! (keystreamdecoder_positivequery)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based test stream agent plug-in is present that supports the SDP
+//! media description
+//! supplied during construction of the key stream decoder.
+//! • There are two Rights Objects files (serviceProtectedRO and programProtectedRO) in
+//! the private folder of the supporting test stream agent.
+//! • The Rights Issuer URI of the serviceProtectedRO is set to “IssuerUriServiceProtectedRO”
+//! and programProtectedRO is set to “IssuerUriProgramProtectedRO”
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description for the key stream with an attribute requiring
+//! programProtectedRO
+//! • Construct the key stream decoder using the protected stream description and SDP media
+//! description objects previously generated.
+//! • Query the stream agent to determine whether the program is protected.
+//! • Query the stream agent to determine whether the whole service is protected.
+//! • Query the stream agent to retrieve the Rights Issuer URI.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • The key stream decoder is successfully created.
+//! • The program is protected but the whole service is not.
+//! • The Rights Issuer URI retrieved is “IssuerUriProgramProtectedRO”
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A004
+
+// Copy the necessary 'Program' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_programprotectedRO
+
+// Copy the necessary 'Service' Protected rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Service
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_positivequery_serviceprotectedRO
+
+END_TESTCASE SEC-SCAF-A004
+
+//! @SYMTestCaseID SEC-SCAF-A007
+//! @SYMTestCaseDesc Concurrent key stream decoder construction and querying
+//! (keystreamdecoder_concurrentquery)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! The following test actions should be carried out concurrently in 3 separate threads:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description. Thread A should generate an SDP media description
+//! supported by test stream agent plug-in A and Threads B & C should generate SDP media
+//! description objects supported by test stream agent plug-in B.
+//! • Construct a key stream decoder object using the generated protected key stream
+//! description and SDP media description objects.
+//! • When the key stream decoder has been constructed, query the attributes associated
+//! with the stream agent.
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • Each key stream decoder object should construct successfully.
+//! • Checking the implementation attributes reveals that Thread A has invoked test stream
+//! agent A and Thread B & C have invoked test stream agent B.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A007
+
+// Copy the necessary rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_concurrentquery_threadA
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_concurrentquery_threadB
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini keystreamdecoder_concurrentquery_threadC
+CONSECUTIVE
+
+END_TESTCASE SEC-SCAF-A007
+
+
+
+//! @SYMTestCaseID SEC-SCAF-A008
+//! @SYMTestCaseDesc Concurrent multi-thread usage of multiple key stream decoders
+//! (multikeystreamdecoders)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7772, REQ7775, REQ7776, REQ7781, REQ7784, REQ7954
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! The following test actions should be carried out concurrently in 3 separate threads:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description (SDPa) for the key stream with an attribute
+//! requiring serviceProtectedRO.
+//! • Construct a key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPa – decoderA.
+//! • Generate another SDP media description (SDPb) for the key stream with an attribute
+//! requiring programProtectedRO.
+//! • Construct another key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPb – decoderB.
+//! • Query decoderA to retrieve the ‘Rights Issuer URI’ attribute from the invoked
+//! stream agent.
+//! • Query decoderB to retrieve the ‘Rights Issuer URI’ attribute from the invoked
+//! stream agent.
+//! • Destroy both key stream decoder objects.
+//!
+//! @SYMTestExpectedResults • Each key stream decoder object should construct successfully.
+//! • The Rights Issuer URI attribute value retrieved from decoderA is
+//! “IssuerUriServiceProtectedRO”
+//! • The Rights Issuer URI attribute value retrieved from decoderB is
+//! “IssuerUriProgramProtectedRO”
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-A008
+
+// Copy the necessary rights objects into the stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+// 2 Key Stream Decoders, Invoking the same stream agent
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_singleagent
+
+// 2 Key Stream Decoders, Invoking different stream agents
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_singlethread_multiagents
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking the same agent
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadC
+CONSECUTIVE
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking different agents
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_multiagents_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_multiagents_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_multiagents_threadC
+CONSECUTIVE
+
+END_TESTCASE SEC-SCAF-A008
+
+
+
+//****************** TEST STREAM AGENT UNIT TESTING *******************
+
+//! @SYMTestCaseID SEC-SCAF-S001
+//! @SYMTestCaseDesc A unit test step which tests the Test Streaming Agent
+//! (StreamingTestAgent)
+//! @SYMREQ Req-b
+//! @SYMTestPriority Low
+//! @SYMTestActions A connection is established with the Test Agent Server via its client side and the closed.
+//! @SYMTestExpectedResults Successful connection and disconnectiom to/from the Test Streaming Agent Server.
+//! @SYMDevelopedForRelease Oghma
+
+START_TESTCASE SEC-SCAF-S001
+RUN_TEST_STEP 100 tscaf SCAFTestAgentServer
+END_TESTCASE SEC-SCAF-S001
+
+
+
+//************ SEC-SCAF-C : INTEROPERABILITY WITH DECODING STACK ***********
+
+
+//! @SYMTestCaseID SEC-SCAF-C001
+//! @SYMTestCaseDesc Usage of key stream sink
+//! (keystreamsinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7774, REQ7778, REQ7786
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • There are the necessary ROM based test stream agent plug-ins present that support
+//! the SDP media description supplied during construction of each key stream decoder.
+//! • There is a Right Object file in the private folder of the supporting test stream agent.
+//!
+//! Test Actions:
+//! • Create a key stream sink
+//! • Create a plain key and encrypt it with the key extracted from the RO
+//! • Connect to the Test Agent
+//! • Send the key stream sink
+//! • Send the encrypted string (a simple key stream)
+//! • The test agent server decrypts the key stream by using the key from the RO.
+//! • The test agent server processes the decrypted key (the key is written into a file
+//! defined in the key stream sink)
+//! • Check whether the right plain key is written down
+//! • Destroy the key stream decoder object.
+//!
+//! @SYMTestExpectedResults • The plain string is found in the predefined location.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-C001
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamSink z:\tcaf\tscaf\tscaf.ini sdp_service_protected
+END_TESTCASE SEC-SCAF-C001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-C002
+//! @SYMTestCaseDesc Usage of key stream sinks in concurrent sessions
+//! (concurrent_keystreamsinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7774, REQ7778, REQ7786
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Preconditions:
+//! • There are the necessary ROM based test stream agent plug-ins present that support
+//! the SDP media description supplied during construction of each key stream decoder.
+//! • There are two Rights Object files (serviceProtectedRO and programProtectedRO) in the
+//! private folder of each test stream agent.
+//!
+//! Test Actions:
+//! • Generate a protected key stream description.
+//! • Generate an SDP media description (SDPa) for the key stream with an attribute requiring
+//! serviceProtectedRO.
+//! • Construct a key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPa – decoderA.
+//! • Generate another SDP media description (SDPb) for the key stream with an attribute requiring
+//! programProtectedRO.
+//! • Construct another key stream decoder object using the generated protected key stream
+//! description and SDP media description object SDPb – decoderB.
+//! • Create plain_keyA
+//! • Encrypt plain_keyA with encryption_keyA extracted from serviceProtectedRO
+//! • Send the encrypted plain_keyA using decoderA
+//! • Create plain_keyB
+//! • Encrypt plain_keyB with encryption_keyB extracted from programProtectedRO
+//! • Send the encrypted plain_keyB using decoderB
+//! • Check whether stringA is in pathA and stringB is in pathB
+//! • Destroy both key stream decoder objects.
+//!
+//! @SYMTestExpectedResults • The plain strings are found in the predefined locations.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-C002
+RUN_TEST_STEP 100 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini concurrent_keystreamsinks
+END_TESTCASE SEC-SCAF-C002
+
+
+
+//********************** SEC-SCAF-D : POST-ACQUISITION **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-D001
+//! @SYMTestCaseDesc Post-acquisition content protection
+//! (postacqusition)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7788
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! The following test actions should be carried out:
+//! • Copy rorecordable.dr (a rights object where ECanExport and EMustProtectIfRecording
+//! flags shall be set) and its post-acquistion rights object (ropostacquisition.dr) into
+//! the private directory of the test agent server.
+//! • Generate a test key stream description
+//! • Generate an SDP media description for the key stream with an attribute requiring
+//! rorecordable.dr
+//! • Construct the key stream decoder using the protected key stream description and SDP
+//! media description objects previously generated.
+//! • Query the stream agent to determine whether it is allowed to export and record the
+//! content.
+//! • Request and gets a handle to the postacqusition rights object file
+//! • Import the postacqusition rights object file to the post-acquisition caf agent
+//! • Open a session to import the content
+//! • Import the content to the post-acquisition caf agent
+//!
+//! @SYMTestExpectedResults
+//! • The protected stream is allowed to be recorded
+//! • The test streaming agent returns a handle of the post-acquistion RO successfully
+//! • The post-acquistion RO is successfully imported to the post-acquisition caf agent
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-D001
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition
+
+RUN_TEST_STEP 100 tscaf SCAFPostAcquisition z:\tcaf\tscaf\tscaf.ini post_acquisition_create_outputs
+
+END_TESTCASE SEC-SCAF-D001
+
+
+
+//********************** SEC-SCAF-E : INTEROPERABILITY WITH DECODING STACK - IPSEC ***********
+
+RUN_SCRIPT z:\tcaf\tscaf\tscafipsec.script
+
+
+
+//********************** SEC-SCAF-G : SINGLE PROCESS STREAM AGENT TESTING **********************
+
+//! @SYMTestCaseID SEC-SCAF-G001
+//! @SYMTestCaseDesc SPSA - Key stream decoder construction with a supported protected key stream description
+//! (spsa_keystreamdecoder_positiveconstruct)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports
+//! the SDP media description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-A001.
+//!
+//! @SYMTestExpectedResults • The key stream decoder constructed by the single process stream agent is successfully
+//! created and destroyed.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G001
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamDecoderConstruct z:\tcaf\tscaf\tscaf.ini spsa_keystreamdecoder_positiveconstruct
+END_TESTCASE SEC-SCAF-G001
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G002
+//! @SYMTestCaseDesc SPSA - Querying attributes related to a key stream decoder
+//! (spsa_keystreamdecoder_positivequery)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports
+//! the SDP media description supplied during construction of the key stream decoder.
+//! • The required Rights Object file is present in the private folder for the supporting
+//! single process stream agent.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-A004.
+//!
+//! @SYMTestExpectedResults • The key stream decoder constructed by the single process stream agent is successfully
+//! created.
+//! • All of the expected attribute values match their corresponding values retrieved from
+//! the key stream decoder.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G002
+
+// Copy the necessary 'Program' Protected rights objects into the single process stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program_SingleProcessAgent
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini spsa_keystreamdecoder_positivequery_programprotectedRO
+
+// Copy the necessary 'Service' Protected rights objects into the single process stream agent's private directory
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Service_SingleProcessAgent
+RUN_TEST_STEP tscaf SCAFKeyStreamDecoderAttributes z:\tcaf\tscaf\tscaf.ini spsa_keystreamdecoder_positivequery_serviceprotectedRO
+
+END_TESTCASE SEC-SCAF-G002
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G003
+//! @SYMTestCaseDesc SPSA - Concurrent multi-thread usage of multiple key stream decoders
+//! (spsa_multikeystreamdecoders)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ and ‘client-server’ stream agent plug-in
+//! implementations are present that support the SDP media descriptions supplied during
+//! construction of the key stream decoders.
+//! • The required Rights Object files are present in the private folder of the supporting
+//! stream agents.
+//!
+//! Test Actions:
+//! The following test actions should be carried out concurrently in 3 separate threads
+//! (1 of the threads should instantiate a ‘single process’ stream agent, whereas the others
+//! should instantiate ‘client-server’ based stream agents) :
+//!
+//! • Run the test step actions as described in test case SEC-SCAF-A008
+//!
+//! @SYMTestExpectedResults • Each of the key stream decoder objects that have been constructed by either a
+//! client-server or single process stream agent plug-in are created successfully.
+//! • All of the expected attribute values match their corresponding values retrieved from
+//! the associated key stream decoder.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G003
+
+// Copy the necessary rights objects into the stream agent's private directory (Client/Server Architecture)
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram
+
+// Copy the necessary rights objects into the stream agent's private directory (Single Process Stream Agent)
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_ServiceProgram_SingleProcessAgent
+
+// 2 Key Stream Decoders, Invoking the same single process stream agent
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_singlethread_singleagent
+
+// 2 Key Stream Decoders, Invoking different stream agents (1 Single Process & 1 Client/Server)
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_singlethread_multiagents
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking the same agent
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_singleagent_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini multikeystreamdecoders_concurrent_singleagent_threadC
+CONSECUTIVE
+
+// 3 concurrent threads, 2 key stream decoders per thread invoking different agents (1 Single Process & 1 Client/Server)
+CONCURRENT
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_multiagents_threadA
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_multiagents_threadB
+RUN_TEST_STEP tscaf SCAFMultiKeyStreamDecoders z:\tcaf\tscaf\tscaf.ini spsa_multikeystreamdecoders_concurrent_multiagents_threadC
+CONSECUTIVE
+
+END_TESTCASE SEC-SCAF-G003
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G004
+//! @SYMTestCaseDesc SPSA - Usage of key stream sink
+//! (spsa_keystreamsinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports
+//! the SDP media description supplied during construction of the key stream decoder.
+//! • The required Rights Object file is present in the private folder for the supporting single
+//! process stream agent.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-C001.
+//!
+//! @SYMTestExpectedResults • The expected plain text string is found in the predefined location.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G004
+
+// Single Process Stream Agent Invoked
+RUN_TEST_STEP 100 tscaf SCAFKeyStreamSink z:\tcaf\tscaf\tscaf.ini spsa_keystreamink
+
+// 2 Single Process Stream Agents Invoked
+RUN_TEST_STEP 100 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini spsa_concurrent_keystreamsinks
+
+// 1 Single Process Stream Agent and 1 Client/Server Stream Agent Invoked
+RUN_TEST_STEP 100 tscaf SCAFConcurrentKeyStreamSinks z:\tcaf\tscaf\tscaf.ini spsa_cssa_concurrent_keystreamsinks
+
+END_TESTCASE SEC-SCAF-G004
+
+
+
+//! @SYMTestCaseID SEC-SCAF-G006
+//! @SYMTestCaseDesc SPSA - Testing IPSec integration with key stream decoder
+//! (spsa_ipsec_integration_decoder_automatic)
+//! @SYMPREQ PREQ782
+//! @SYMREQ
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions Preconditions:
+//! • The necessary ROM based ‘single process’ stream agent plug-in is present that supports the
+//! SDP media description supplied during construction of the key stream decoder.
+//!
+//! Test Actions:
+//! • Run the test step actions as described in test case SEC-SCAF-E015.
+//!
+//! @SYMTestExpectedResults • Associations was added
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-G006
+
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program_SingleProcessAgent
+
+//The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini spsa_ipsec_integration_decoder_automatic
+
+END_TESTCASE SEC-SCAF-G006
+
+
+
+//********************** SEC-SCAF-H : REFERENCE AGENT TEST **********************
+
+
+//! @SYMTestCaseID SEC-SCAF-H001
+//! @SYMTestCaseDesc Smoke testing for the Reference Agent
+//! (referenceagent)
+//! @SYMPREQ PREQ782
+//! @SYMREQ -------
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Generate a IPSec protected key stream description.
+//! • Create a key stream sink from the protected key stream description.
+//! • Create a key stream decoder from an SDP message requiring the reference agent
+//! and the key stream sink.
+//! • Create a short term key message and write it to a predefined socket.
+//! @SYMTestExpectedResults
+//! • Interfaces are invoked without leaves and panics.
+//!
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-H001
+
+RUN_TEST_STEP 100 tscaf SCAFRefAgent z:\tcaf\tscaf\tscaf.ini reference_agent
+
+END_TESTCASE SEC-SCAF-H001
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscafipsec.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,218 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF IpSec Unit Tests
+
+PRINT Run PREQ782 Streaming CAF IpSec Unit Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+//! @SYMTestCaseID SEC-SCAF-E001
+//! @SYMTestCaseDesc Smoke testing for IPSec plugin
+//! (ipsec_positiveconstruct)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Generate a IPSec protected key stream description.
+//! • Create a key stream sink from the protected key stream description.
+//! • Create an IPSec key association.
+//! • Supply the key association to the IPSec key stream sink.
+//!
+//! @SYMTestExpectedResults • Interfaces are invoked without leaves and panics.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E001
+RUN_TEST_STEP 100 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_positiveconstruct
+END_TESTCASE SEC-SCAF-E001
+
+//! @SYMTestCaseID SEC-SCAF-E002
+//! @SYMTestCaseDesc Testing SADB integration
+//! (ipsec_verify_sadb)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Same as with SEC-SCAF-E001. Take care to create a key association with a known SPI - SPI x.
+//! • Query the SADB with SADB_GET message on SPI x.
+//! • Submit another key association through IPSec with SPI y.
+//! • Query the SADB to verify that the SPI was submitted correctly.
+
+//! @SYMTestExpectedResults • Expected SA entries match when queried from SADB.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E002
+RUN_TEST_STEP 100 tscaf SCAFIpSecSadbVerification z:\tcaf\tscaf\tscaf.ini ipsec_verify_sadb
+END_TESTCASE SEC-SCAF-E002
+
+//! @SYMTestCaseID SEC-SCAF-E003
+//! @SYMTestCaseDesc Testing SADB integration under concurrency
+//! (ipsec_verify_sadb_concurrency)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Same as with SEC-SCAF-E002, but using multiple threads - each hosting a different key stream sink. Different SPI values must be used in each key stream sink to avoid collisions in the SADB.
+//! @SYMTestExpectedResults • Expected SA entries match when queried from SADB.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E003
+RUN_TEST_STEP 200 tscaf SCAFIpSecSadbVerificationConcurrency z:\tcaf\tscaf\tscaf.ini ipsec_verify_sadb_concurrency
+END_TESTCASE SEC-SCAF-E003
+
+//! @SYMTestCaseID SEC-SCAF-E007
+//! @SYMTestCaseDesc Negative testing for IPSec components
+//! (ipsec_negative)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create an IPSec key stream sink as detailed in SEC-SCAF-A001.
+//! • Create an IPSec key association with incorrect keys.
+//! • Submit it to key stream sink - step A.
+//! • Create a non-IPSec key association.
+//! • Submit it to key stream sink - step B.
+//! • Delete the key stream sink.
+//! • Try adding twice the same valid key association again - step C. The second key association addition should fail.
+//! @SYMTestExpectedResults • Proper errors are returned in all steps.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E007
+RUN_TEST_STEP 100 tscaf SCAFIpSecNegative z:\tcaf\tscaf\tscaf.ini ipsec_negative
+END_TESTCASE SEC-SCAF-E007
+
+//! @SYMTestCaseID SEC-SCAF-E009
+//! @SYMTestCaseDesc SA Removal
+//! (ipsec_sa_removal)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create an IPSec key stream sink as detailed in SEC-SCAF-A001.
+//! • Submit 10 different key associations - all with different SPI-s.
+//! • Query the SADB.
+//! @SYMTestExpectedResults • Only the last 3 SA-s should be present in the SADB. The first 7 must not be present. The number 3 is a source constant - KDefaulMaxSpiNumber.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E009
+RUN_TEST_STEP 100 tscaf SCAFIpSecSARemoval z:\tcaf\tscaf\tscaf.ini ipsec_sa_removal
+END_TESTCASE SEC-SCAF-E009
+
+//! @SYMTestCaseID SEC-SCAF-E010
+//! @SYMTestCaseDesc Change of algorithms
+//! (ipsec_algorithm_change)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority Medium
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create an IPSec key stream sink as detailed in SEC-SCAF-A001.
+//! • Submit an IPSec key association with arbitrary parameters.
+//! • Try changing the encryption algorithm.
+//! • Repeat the previous steps, while trying to change the authentication algorithm.
+//! @SYMTestExpectedResults • KErrNotSupported should be returned each time.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E010
+RUN_TEST_STEP 100 tscaf SCAFIpSecAlgorithmChange z:\tcaf\tscaf\tscaf.ini ipsec_algorithm_change
+END_TESTCASE SEC-SCAF-E010
+
+//! @SYMTestCaseID SEC-SCAF-E011
+//! @SYMTestCaseDesc IPSec - no authentication
+//! (ipsec_no_authentication)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create an IPSec key stream sink as detailed in SEC-SCAF-A001.
+//! • Do not use authentication.
+//! • Submit a key association.
+//! • Query the SADB on the key association.
+
+//! @SYMTestExpectedResults • The key association should be in SADB.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E011
+RUN_TEST_STEP 100 tscaf SCAFIpSecSadbVerification z:\tcaf\tscaf\tscaf.ini ipsec_no_authentication
+END_TESTCASE SEC-SCAF-E011
+
+
+//! @SYMTestCaseID SEC-SCAF-E013
+//! @SYMTestCaseDesc IPSec - unsupported algorithms
+//! (ipsec_unsupported_algorithms)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create an IPSec key stream sink as detailed in SEC-SCAF-A001.
+//! • Try setting any encryption algorithm which is not AES-CBC.
+//! • Try setting any authentication algorithm which is not NULL or HMAC-SHA1.
+//! @SYMTestExpectedResults • KErrNotSupported should be returned each time.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E013
+RUN_TEST_STEP !Result=-5 100 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_wrong_enc_algorithm1
+RUN_TEST_STEP !Result=-5 100 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_wrong_enc_algorithm2
+RUN_TEST_STEP !Result=-5 100 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_wrong_enc_algorithm3
+RUN_TEST_STEP !Result=-5 100 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_wrong_auth_algorithm
+END_TESTCASE SEC-SCAF-E013
+
+
+//! @SYMTestCaseID SEC-SCAF-E014
+//! @SYMTestCaseDesc Multiple IPSec key stream sinks
+//! (ipsec_multiple_sinks)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Same as with SEC-SCAF-E002, but using a separate key stream sink for each association.
+
+//! @SYMTestExpectedResults • Expected SA entries match when queried from SADB.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E014
+RUN_TEST_STEP 200 tscaf SCAFIpSecMultipleSinks z:\tcaf\tscaf\tscaf.ini ipsec_multiple_sinks
+END_TESTCASE SEC-SCAF-E014
+
+//! @SYMTestCaseID SEC-SCAF-E015
+//! @SYMTestCaseDesc Testing IPSec integration with key stream decoder - automatic
+//! (ipsec_integration_decoder_automatic)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create manually a test agent key stream decoder using SDP information
+//! • Take care to supply an IPSec key stream sink as detailed in SEC-SCAF-E001.
+//! • Send the key association for the test agent. The key association is as defined in step SEC-SCAF-E004.
+//! • Verify with SADB_GET that associations was added
+//!
+//! @SYMTestExpectedResults • Associations was added
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E015
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini ipsec_integration_decoder_automatic
+END_TESTCASE SEC-SCAF-E015
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscafipsec_oom.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,64 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF IpSec "Out of Memory" Tests
+
+PRINT Run PREQ782 Streaming CAF IpSec OOM Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+// Note: For test case descriptions, please refer to the corresponding tscafipsec.script file
+
+//! @SYMTestCaseID SEC-SCAF-OOM-E001
+//! @SYMTestCaseDesc (ipsec_positiveconstruct_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-E001
+RUN_TEST_STEP 100 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_positiveconstruct_OOM
+END_TESTCASE SEC-SCAF-OOM-E001
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-E007
+//! @SYMTestCaseDesc (ipsec_negative_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-E007
+RUN_TEST_STEP 100 tscaf SCAFIpSecNegative z:\tcaf\tscaf\tscaf.ini ipsec_negative_OOM
+END_TESTCASE SEC-SCAF-OOM-E007
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-E010
+//! @SYMTestCaseDesc (ipsec_algorithm_change_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-E010
+RUN_TEST_STEP 100 tscaf SCAFIpSecAlgorithmChange z:\tcaf\tscaf\tscaf.ini ipsec_algorithm_change_OOM
+END_TESTCASE SEC-SCAF-OOM-E010
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-E011
+//! @SYMTestCaseDesc (ipsec_no_authentication_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-E011
+RUN_TEST_STEP 100 tscaf SCAFIpSecSadbVerification z:\tcaf\tscaf\tscaf.ini ipsec_no_authentication_OOM
+END_TESTCASE SEC-SCAF-OOM-E011
+
+
+//! @SYMTestCaseID SEC-SCAF-OOM-E015
+//! @SYMTestCaseDesc (ipsec_integration_decoder_automatic_OOM)
+
+START_TESTCASE SEC-SCAF-OOM-E015
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini ipsec_integration_decoder_automatic_OOM
+END_TESTCASE SEC-SCAF-OOM-E015
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/scripts/tscafipsecmanual.script Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,145 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+// Streaming CAF Integration Tests
+
+PRINT Run PREQ782 Streaming CAF Manual IPSec Integration Tests
+
+// Load Suite
+LOAD_SUITE tscaf
+
+//********************** SEC-SCAF-E004 **********************
+
+//! @SYMTestCaseID SEC-SCAF-E004
+//! @SYMTestCaseDesc Testing overall IPSec integration - manual
+//! (basic_ipsec_integration)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Execute steps in SEC-SCAF-E001.
+//! • Submit key association with pre-defined attributes using IPSec key stream sink.
+//! • Wait for a decrypted packet synchronously.
+//! • Use a Linux machine and set SADB and Policy DB settings there accordingly (see V:\Dev\TS\TS0013 Crypto Services\Technical\Testing)
+//! • Send a packet from the Linux machine.
+//!
+//! @SYMTestExpectedResults • Packet is decrypted correctly with expected content.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E004
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
+END_TESTCASE SEC-SCAF-E004
+
+
+//********************** SEC-SCAF-E005 **********************
+
+//! @SYMTestCaseID SEC-SCAF-E005
+//! @SYMTestCaseDesc Testing overall IPSec integration: multiple key messages - manual
+//! (ipsec_integration_multiple_messages)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Execute steps in SEC-SCAF-E004.
+//! • Submit another SA through a new key association in key stream sink.
+//! • Change configuration on the Linux machine to use the new key association. (use rtest2.conf instead of rtest.conf)
+//! • Send another packet from the Linux machines
+//!
+//! @SYMTestExpectedResults • Both packets are decrypted correctly with expected content.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E005
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_multiple_messages
+END_TESTCASE SEC-SCAF-E005
+
+//********************** SEC-SCAF-E006 **********************
+
+//! @SYMTestCaseID SEC-SCAF-E006
+//! @SYMTestCaseDesc Testing IPSec integration with key stream decoder - manual
+//! (ipsec_integration_decoder)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority Critical
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create manually a test agent key stream decoder using SDP information
+//! • Take care to supply an IPSec key stream sink as detailed in SEC-SCAF-E001.
+//! • Send the key association for the test agent. The key association is as defined in step SEC-SCAF-E004.
+//! • Change configuration on the Linux machine to use the new key association.
+//! • Send an encrypted packet
+//!
+//! @SYMTestExpectedResults • The packet decrypts correctly
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E006
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP tscaf SCAFSetupRightsObjects z:\tcaf\tscaf\tscaf.ini Rights_Program
+RUN_TEST_STEP -1 tscaf SCAFIpSecDecoderIntegration z:\tcaf\tscaf\tscaf.ini ipsec_integration_decoder
+END_TESTCASE SEC-SCAF-E006
+
+//********************** SEC-SCAF-E012 **********************
+
+//! @SYMTestCaseID SEC-SCAF-E012
+//! @SYMTestCaseDesc Testing overall IPSec integration: no authentication - manual
+//! (ipsec_integration_no_authentication)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Execute steps in SEC-SCAF-E004.
+//! • Reset the authentication algorithm.
+//! • Submit a key association.
+//! • Change configuration on the Linux machine to use the new key association. (use rtest_noAuth.conf instead of rtest.conf)
+//! • Send an encrypted packet
+//!
+//! @SYMTestExpectedResults • The packet decrypts correctly
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E012
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_no_authentication
+END_TESTCASE SEC-SCAF-E012
+
+//********************** SEC-SCAF-E008 **********************
+
+//! @SYMTestCaseID SEC-SCAF-E008
+//! @SYMTestCaseDesc Negative testing for IPSec integration - unprotected port
+//! (ipsec_integration_negative_uprotected_port)
+//! @SYMPREQ PREQ782
+//! @SYMREQ REQ7779
+//! @SYMTestPriority High
+//! @SYMTestStatus Implemented
+//! @SYMTestActions
+//! • Create an IPSec testing environment as detailed in SEC-SCAF-E004.
+//! • Add a synchronous listening socket on the client side on a port not protected by the security policy on the server. Key stream decoder should add the relevant SA at this point. This checks that it is possible to communicate with the same server while the protected stream is being received.
+//! • Send a packet from the Linux machine to the same port - use rsend-differentPort.sh
+//! • Send data on the protected port, but encrypted with a different key than on the client - step B. This checks that SA added by key stream sink take effect. - use rtest-differentKey.conf followed by rsend.sh
+//! • Send data on the protected port, but encrypted with the same key than on the client - use rtest.conf with rsend.sh
+//! • Send data from the server using a different local port.
+//!
+//! @SYMTestExpectedResults
+//! • Data should not be received in step B, and should be received in step A.
+//! @SYMTestType CIT
+
+START_TESTCASE SEC-SCAF-E008
+// The time limit is disabled since this test is manual
+RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini ipsec_integration_negative_uprotected_port
+RUN_TEST_STEP -1 tscaf SCAFIpSec z:\tcaf\tscaf\tscaf.ini basic_ipsec_integration
+END_TESTCASE SEC-SCAF-E008
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/startupcommsstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,56 @@
+// Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+
+#include <c32root.h>
+#include "startupcommsstep.h"
+
+// PDD names for the physical device drivers that are loaded in wins or arm
+#if defined (__WINS__)
+#define PDD_NAME _L("ECDRV")
+#else
+#define PDD_NAME _L("EUART1")
+#define PDD2_NAME _L("EUART2")
+#define PDD3_NAME _L("EUART3")
+#define PDD4_NAME _L("EUART4")
+#endif
+
+#define LDD_NAME _L("ECOMM")
+
+CStartupCommsStep::CStartupCommsStep()
+ {
+ SetTestStepName(KStartupCommsStep);
+ }
+
+TVerdict CStartupCommsStep::doTestStepL()
+ {
+ SetTestStepResult(EFail);
+
+ TInt ret = User::LoadPhysicalDevice(PDD_NAME);
+ User::LeaveIfError(ret == KErrAlreadyExists?KErrNone:ret);
+
+#ifndef __WINS__
+ ret = User::LoadPhysicalDevice(PDD2_NAME);
+ ret = User::LoadPhysicalDevice(PDD3_NAME);
+ ret = User::LoadPhysicalDevice(PDD4_NAME);
+#endif
+
+ ret = User::LoadLogicalDevice(LDD_NAME);
+ User::LeaveIfError(ret == KErrAlreadyExists?KErrNone:ret);
+ ret = StartC32();
+ User::LeaveIfError(ret == KErrAlreadyExists?KErrNone:ret);
+ SetTestStepResult(EPass);
+
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tipsec.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,766 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the IpSec Test Cases
+//
+//
+
+#include "tipsec.h"
+
+#include <caf/streaming/keystreamdecoder.h>
+#include <caf/streaming/protectedstreamdesc.h>
+#include <caf/streaming/keystreamsink.h>
+#include <caf/streaming/keyassociation.h>
+
+//Networking and IpSec includes
+#include <networking/pfkeyv2.h>
+#include <networking/ipsecerr.h>
+#include <pfkey_send.h>
+#include <es_sock.h>
+#include <es_enum.h>
+
+#include <e32base.h>
+#include <c32comm.h>
+
+_LIT(KDefaultServerAddr,"192.168.174.5");
+_LIT(KClientLocalAddr,"192.168.0.3");
+_LIT(KDefaultListenAddr, "0.0.0.0");
+const TInt KClientPort = 3002;
+const TInt KServerPort = 3003;
+const TUint KTestSpiBase = 667;
+_LIT8(KTestData, "test\n");
+_LIT8(KDefaultEncryptionKey, "1234567890123456");
+_LIT8(KDefaultAuthenticationKey, "12345678901234567890");
+
+using namespace StreamAccess;
+
+//--------------------------CScafIpSec--------------------
+
+CScafIpSec::CScafIpSec(CScafServer& aParent): CScafStep(aParent)
+ {
+ SetTestStepName(KScafIpSec);
+ }
+
+TVerdict CScafIpSec::doTestStepPreambleL()
+ {
+ __UHEAP_MARK;
+ INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells());
+
+ ReadTestConfigurationL();
+
+ // Create a session to esock server
+ User::LeaveIfError(iSocketServ.Connect());
+ // Create a connection
+ User::LeaveIfError(iConnection.Open(iSocketServ, KAfInet));
+ TRequestStatus status;
+ User::LeaveIfError(iConnection.Start());
+
+ User::LeaveIfError(iClientSocket.Open(iSocketServ, KAfInet, KSockDatagram, KProtocolInetUdp, iConnection));
+ // By default, we listen on the same port as then we use for the SA - can be different on a negative test
+ TInt listenPort(KClientPort);
+ GetIntFromConfig(ConfigSection(), _L("ListenPort"), listenPort);
+
+ // Create and bind the client socket
+ TInetAddr listenAddr;
+ User::LeaveIfError(listenAddr.Input(KDefaultListenAddr));
+ listenAddr.SetPort(listenPort);
+ User::LeaveIfError(iClientSocket.Bind(listenAddr));
+
+ TPtrC serverAddrFromConfig;
+ if (GetStringFromConfig(ConfigSection(), _L("ServerAddress"), serverAddrFromConfig))
+ {// If the IP address of the server is specified explicitly in the configuration file, use it as the server address.
+ // This specification is made when the server is a remote host.
+ INFO_PRINTF2(_L("Assign server address from the configuration: %S"), &serverAddrFromConfig);
+ User::LeaveIfError(iServerAddr.Input(serverAddrFromConfig));
+ }
+ else
+ {// If the server IP address is not specified, try to find out the own IP address of the device
+ // by looking up its ethernet interface. It means that the client and server are running on the same device.
+ TBool srvAddrFound = EFalse;
+ TSoInetInterfaceInfo networkInfo;
+ TPckg<TSoInetInterfaceInfo> opt(networkInfo);
+ User::LeaveIfError(iClientSocket.SetOpt(KSoInetEnumInterfaces, KSolInetIfCtrl));
+ TInt res = KErrNone;
+ TName ip;
+ do
+ {
+ res = iClientSocket.GetOpt(KSoInetNextInterface, KSolInetIfCtrl, opt);
+ if(!opt().iAddress.IsUnspecified())
+ {
+ opt().iAddress.Output(ip);
+ INFO_PRINTF3(_L("Interface Name:%S Interface Address:%S"),&(opt().iName), &ip);
+ // Skip loopback interfaces and get the address of first extrenal interface
+ if(opt().iName.Find(_L("loop")) == KErrNotFound)
+ {
+ INFO_PRINTF2(_L("Assign server address as %S"), &ip);
+ iServerAddr = opt().iAddress;
+ srvAddrFound = ETrue;
+ break;
+ }
+ }
+ }while (res == KErrNone);
+ // If the device doesn't have got an ethernet interface or its address has not been obtained, try to use a default one.
+ if(!srvAddrFound)
+ {
+ INFO_PRINTF2(_L("Couldn't find a proper interface. Assign server address as %S"), &KDefaultServerAddr);
+ User::LeaveIfError(iServerAddr.Input(KDefaultServerAddr));
+ }
+ }
+ iServerAddr.SetPort(KServerPort);
+
+ // Connect the UDP socket - this is needed for the sub-connection interface
+ iClientSocket.Connect(iServerAddr, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ // The client address is not equal to the listening address, since the PF_KEY association set
+ // by key stream sink needs to have a well defined dest. address and not INADDR_ANY used on the listening socket
+ // The section below should be removed if and when we switch to sub-connection interface
+ User::LeaveIfError(iClientAddr.Input(KClientLocalAddr));
+ iClientAddr.SetPort(KClientPort);
+
+ iAssociationsNumber = 1;
+ GetIntFromConfig(ConfigSection(), _L("AssociationsNumber"), iAssociationsNumber);
+
+ iAuthenticationUsed = ETrue;
+ GetBoolFromConfig(ConfigSection(), _L("UseAuthentication"), iAuthenticationUsed);
+
+ TPtrC encryptionKeyFromConfig;
+ if (GetStringFromConfig(ConfigSection(), _L("EncryptionKey"), encryptionKeyFromConfig))
+ {
+ iEncryptionKey = HBufC8::NewL(encryptionKeyFromConfig.Length());
+ iEncryptionKey->Des().Copy(encryptionKeyFromConfig);
+ }
+ else
+ iEncryptionKey = KDefaultEncryptionKey().AllocL();
+
+ iEncryptionAlgorithm = EAES_128_CBC;
+ GetIntFromConfig(ConfigSection(), _L("EncryptionAlgorithm"), iEncryptionAlgorithm);
+
+ if (iAuthenticationUsed)
+ {
+ TPtrC authenticationKeyFromConfig;
+ if (GetStringFromConfig(ConfigSection(), _L("AuthenticationKey"), authenticationKeyFromConfig))
+ {
+ iAuthenticationKey = HBufC8::NewL(authenticationKeyFromConfig.Length());
+ iAuthenticationKey->Des().Copy(authenticationKeyFromConfig);
+ }
+ else
+ iAuthenticationKey = KDefaultAuthenticationKey().AllocL();
+ iAuthenticationAlgorithm = EHMAC_SHA1;
+ GetIntFromConfig(ConfigSection(), _L("AuthenticationAlgorithm"), iAuthenticationAlgorithm);
+ }
+ else
+ iAuthenticationAlgorithm = ENoAuthentication;
+
+ return TestStepResult();
+ }
+
+void ReceiveAndCompareBufL(RSocket &aSocket, const TDesC8 &aCompareTo)
+ {
+ HBufC8 *testBuf = HBufC8::NewLC(aCompareTo.Length());
+ TRequestStatus status;
+ TPtr8 testBufPtr(testBuf->Des());
+ aSocket.Recv(testBufPtr, 0, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ if (testBufPtr.Compare(aCompareTo) != 0)
+ User::Leave(KErrGeneral);
+
+ CleanupStack::PopAndDestroy(testBuf);
+ }
+
+TUint32 ConvertToNetworkOrder(TUint32 aNum)
+ {
+ const TInt KMaxTUint32CStringLen = 11;
+ TUint8 temp[ KMaxTUint32CStringLen ];
+ LittleEndian::Put32( temp, aNum );
+ return BigEndian::Get32( temp );
+ }
+
+// Check whether a particular SA is present in SADB - used for testing the IPsec key stream decoder.
+// Two modes supported: positive and negative - in the negative one the SA should not be present
+// Some of the code is copy/pasted from IPSec key stream production code, since it cannot be exposed in the
+// interfaces there
+static void ValidateSadbL(TInt32 aSpi, TInetAddr &aSourceAddr, TInetAddr &aDestAddr, TBool aPositiveTesting)
+ {
+ RSocketServ socketServ;
+ User::LeaveIfError(socketServ.Connect());
+ CleanupClosePushL(socketServ);
+ RSADB rsadb;
+ User::LeaveIfError(rsadb.Open(socketServ));
+ CleanupClosePushL(rsadb);
+ // We use the same sequence number as the SPI - since we use different SPI in our tests
+ // this provides uniqueness required of sequence id-s
+ TPfkeySendMsg sendMessage(SADB_GET, SADB_SATYPE_ESP, aSpi, RProcess().Id());
+ TUint32 bigEndianSpi(ConvertToNetworkOrder(aSpi));
+ sendMessage.Add( Int2Type<SADB_EXT_SA>(), bigEndianSpi, 0, 0);
+ sendMessage.Add( Int2Type<SADB_EXT_ADDRESS_SRC>(), aSourceAddr, 0, 0 );
+ sendMessage.Add( Int2Type<SADB_EXT_ADDRESS_DST>(), aDestAddr, 0, 0 );
+
+ TRequestStatus status;
+ rsadb.FinalizeAndSend(sendMessage, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ // Since SADB sends replies to _all_ sockets, we must take care to filter out replies which
+ // do not correspond to our request. A similar logic is done in IPSec key stream decoder, but it is private there
+ // and cannot be reused
+ while (1)
+ {
+ TPfkeyRecvMsg receivedReply;
+ rsadb.ReadRequest(receivedReply, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ sadb_msg &msgHeader = receivedReply.MsgHdr();
+
+ if (msgHeader.sadb_msg_pid != RProcess().Id())
+ continue;
+ if (msgHeader.sadb_msg_seq != aSpi)
+ continue;
+
+ // If the message types does not match, then the problem is internal in IPSec - it should not answer with a different message type
+ if (msgHeader.sadb_msg_type != SADB_GET)
+ User::Leave(KErrArgument);
+ if (msgHeader.sadb_msg_errno ^ aPositiveTesting == 0)
+ {
+ // Mimic the logic in IPSec error handling (see the Update function in key_msg.cpp)
+ TUint16 reservedField = (TUint16)msgHeader.sadb_msg_reserved << 8;
+ TUint16 errnoField = msgHeader.sadb_msg_errno;
+ User::Leave(-(reservedField + errnoField));
+ }
+ break;
+ }
+ CleanupStack::PopAndDestroy(2, &socketServ);
+ }
+
+void CScafIpSec::CallValidateSadbL(TInt32 aSpi, TInetAddr &aSourceAddr, TInetAddr &aDestAddr, TBool aPositiveTesting)
+ {
+ ValidateSadbL(aSpi, aSourceAddr, aDestAddr, aPositiveTesting);
+ }
+
+void CScafIpSec::InitializeAlgorithmsL(CKeyStreamSink *aKeyStreamSink)
+ {
+ aKeyStreamSink->SetEncryptionAlgorithmL((TEncryptionAlgorithm)iEncryptionAlgorithm);
+ aKeyStreamSink->SetAuthenticationAlgorithmL((TAuthenticationAlgorithm)iAuthenticationAlgorithm);
+ }
+
+CKeyStreamSink *CScafIpSec::CreateDefaultKeyStreamSinkLC()
+ {
+ // when RSubConnection interface starts working use the below code
+ /*
+ RSubConnection subconn;
+ User::LeaveIfError(subconn.Open(ss, RSubConnection::ECreateNew, conn));
+ CleanupClosePushL(subconn);
+
+ subconn.Add(clientSocket, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ CProtectedStreamDesc *protectedStreamDesc = CIPSecProtectedStreamDesc::NewLC(subconn);
+ */
+
+ CProtectedStreamDesc *protectedStreamDesc = CIpSecProtectedStreamDesc::NewLC(iServerAddr, iClientAddr);
+ CKeyStreamSink *keyStreamSink = protectedStreamDesc->CreateKeyStreamSinkLC();
+ InitializeAlgorithmsL(keyStreamSink);
+
+ CleanupStack::Pop(keyStreamSink);
+ CleanupStack::PopAndDestroy(protectedStreamDesc);
+ CleanupStack::PushL(keyStreamSink);
+ return keyStreamSink;
+ }
+
+void CScafIpSec::SendKeyAssociationToKeySinkL(TInt aSpi, CKeyStreamSink *aKeyStreamSink)
+ {
+ INFO_PRINTF2(_L("Sending key association with SPI %d"), aSpi);
+ CKeyAssociation *ipSecKeyAssociation = CIpSecKeyAssociation::NewL(aSpi, iEncryptionKey,
+ iAuthenticationKey);
+ CleanupStack::PushL(ipSecKeyAssociation); // Not using NewLC directly, so that NewL and NewLC will both be covered in tests
+
+ aKeyStreamSink->ProcessNewKeyAssociationL(*ipSecKeyAssociation);
+
+ //aKeyStreamSink->ProcessNewKeyAssociationL(*ipSecKeyAssociation);
+ INFO_PRINTF2(_L("Sent key association with SPI %d"), aSpi);
+ CleanupStack::PopAndDestroy(ipSecKeyAssociation);
+ }
+
+void CScafIpSec::AddAndValidateAssociationsL(CKeyStreamSink *aKeyStreamSink, TInt aSpiBase)
+ {
+ for (TInt i = 0; i < iAssociationsNumber; ++i)
+ {
+ SendKeyAssociationToKeySinkL(aSpiBase + i, aKeyStreamSink);
+ INFO_PRINTF2(_L("Validating key association with SPI %d"), aSpiBase + i);
+ ValidateSadbL(aSpiBase + i, iServerAddr, iClientAddr, ETrue);
+ INFO_PRINTF2(_L("Validated key association with SPI %d"), aSpiBase + i);
+ }
+ }
+
+void CScafIpSec::ValidateNoAssociationsL(TInt aSpiBase)
+ {
+ // Check that after key stream decoder was removed, all the SA-s had been deleted
+ for (TInt i = 0; i < iAssociationsNumber; ++i)
+ ValidateSadbL(aSpiBase + i, iServerAddr, iClientAddr, EFalse);
+ INFO_PRINTF3(_L("Validated that no associations exist from SPI %d to SPI %d"), aSpiBase, aSpiBase + iAssociationsNumber - 1);
+ }
+
+TVerdict CScafIpSec::doTestL()
+ {
+ CKeyStreamSink *keyStreamSink = CreateDefaultKeyStreamSinkLC();
+
+ TBool integrationTest(ETrue);
+ GetBoolFromConfig(ConfigSection(), _L("IntegrationTest"), integrationTest);
+
+ for (TInt i = 0; i < iAssociationsNumber; ++i)
+ {
+ SendKeyAssociationToKeySinkL(KTestSpiBase + i, keyStreamSink);
+ // Receive the packet and compare the data - disabled on automatic tests
+ if (integrationTest)
+ {
+ ReceiveAndCompareBufL(iClientSocket, KTestData());
+ }
+ }
+ CleanupStack::PopAndDestroy(keyStreamSink);
+ return TestStepResult();
+ }
+
+TVerdict CScafIpSec::doTestStepPostambleL()
+ {
+ delete iEncryptionKey;
+ delete iAuthenticationKey;
+ iClientSocket.Close();
+ iConnection.Close();
+ iSocketServ.Close();
+
+ iDecoderConfigurationArray.ResetAndDestroy();
+
+ INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells());
+ __UHEAP_MARKEND;
+
+ return TestStepResult();
+ }
+
+//-------------------------CScafIpSecDecoderIntegration---------------------------
+
+CScafIpSecDecoderIntegration::CScafIpSecDecoderIntegration(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecDecoderIntegration);
+ }
+
+TVerdict CScafIpSecDecoderIntegration::doTestL()
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ TBool integrationTest(ETrue);
+ GetBoolFromConfig(ConfigSection(), _L("IntegrationTest"), integrationTest);
+
+ CTestKeyStreamDecoderBase *keyStreamDecoder = NULL;
+ CSdpMediaField *sdp = NULL;
+ CSdpDocument* sdpDoc = NULL;
+
+ TPtrC privatePath;
+
+ if(iDecoderConfigurationArray[0]->iPrivateFolderPath.Length())
+ {
+ privatePath.Set(iDecoderConfigurationArray[0]->iPrivateFolderPath);
+ }
+ else
+ {
+ privatePath.Set(KStaPrivateFolder());
+ }
+
+ //Create an SDP document object and set the created key stream field object
+ sdpDoc = CreateSdpDocumentLC();
+
+ //Create an SDP object with an attribute requiring the service protected RO
+ sdp = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdp);
+ CleanupStack::Pop(sdp);
+
+ INFO_PRINTF1(_L("Decoder integration test - created SDP"));
+ CKeyStreamSink *keyStreamSink = CreateDefaultKeyStreamSinkLC();
+
+ //Create a test agent key stream decoder
+ if(iDecoderConfigurationArray[0]->iSingleProcessAgent)
+ {
+ // Single Process Stream Agent
+ keyStreamDecoder = CTestSingleProcessKeyStreamDecoder::NewL(*keyStreamSink, *sdp, *sdpDoc);
+ }
+ else
+ {
+ // Client/Server Stream Agent
+ keyStreamDecoder = CTestAgentKeyStreamDecoder::NewL(*keyStreamSink, *sdp, *sdpDoc);
+ }
+
+ INFO_PRINTF1(_L("Decoder integration test - created key stream decoder"));
+ CleanupStack::PushL(keyStreamDecoder);
+
+ for (TInt i = 0; i < iAssociationsNumber; ++i)
+ {
+ INFO_PRINTF2(_L("Decoder integration test - before sending association %d"), i + 1);
+ keyStreamDecoder->SendIpSecAssociationL(KTestSpiBase + i, iEncryptionKey, iAuthenticationKey);
+ if (integrationTest)
+ ReceiveAndCompareBufL(iClientSocket, KTestData());
+ else
+ ValidateSadbL(KTestSpiBase + i, iServerAddr, iClientAddr, ETrue);
+ INFO_PRINTF2(_L("Decoder integration test - after receiving and comparing buffer for association %d"), i + 1);
+ }
+ CleanupStack::PopAndDestroy(2, keyStreamSink);
+ CleanupStack::PopAndDestroy(); // sdpDoc
+#endif
+ return TestStepResult();
+ }
+
+//-------------------------CScafIpSecSadbVerification---------------------------
+
+CScafIpSecSadbVerification::CScafIpSecSadbVerification(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecSadbVerification);
+ }
+
+TVerdict CScafIpSecSadbVerification::doTestL()
+ {
+ CKeyStreamSink *keyStreamSink = CreateDefaultKeyStreamSinkLC();
+ AddAndValidateAssociationsL(keyStreamSink, KTestSpiBase);
+ CleanupStack::PopAndDestroy(keyStreamSink);
+
+ ValidateNoAssociationsL(KTestSpiBase);
+ return TestStepResult();
+ }
+
+//-------------------------CScafIpSecSadbVerificationConcurrency---------------------------
+
+CScafIpSecSadbVerificationConcurrency::CScafIpSecSadbVerificationConcurrency(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecSadbVerificationConcurrency);
+ }
+
+template <class T> void ResetAndDestroyPointerArray(TAny *pointerArray)
+ {
+ reinterpret_cast<RPointerArray<T> *>(pointerArray)->ResetAndDestroy();
+ }
+
+struct CThreadFuncParam : public CBase
+ {
+ CThreadFuncParam(TInt aBaseSpi, TInt aAssociationsNumber)
+ : iBaseSpi(aBaseSpi), iAssociationsNumber(aAssociationsNumber) {}
+
+ TInt iBaseSpi;
+ TInt iAssociationsNumber;
+ };
+
+void TestThreadFuncL(CThreadFuncParam *aThreadParam)
+ {
+ // Since this function runs in another thread, we cannot use member stack variables
+ // of the CScafIpSecSadbVerificationConcurrency class - some of the functionality has to be duplicated here
+ TInetAddr clientAddr, serverAddr;
+ User::LeaveIfError(clientAddr.Input(KClientLocalAddr));
+ clientAddr.SetPort(KClientPort);
+ User::LeaveIfError(serverAddr.Input(KDefaultServerAddr));
+ serverAddr.SetPort(KServerPort);
+ RSocketServ socketServ;
+ User::LeaveIfError(socketServ.Connect());
+ CleanupClosePushL(socketServ);
+ RSADB rsadb;
+ User::LeaveIfError(rsadb.Open(socketServ));
+ CleanupClosePushL(rsadb);
+
+ HBufC8 *encryptionKey = KDefaultEncryptionKey().AllocLC();
+ HBufC8 *authenticationKey = KDefaultAuthenticationKey().AllocLC();
+
+ CProtectedStreamDesc *protectedStreamDesc = CIpSecProtectedStreamDesc::NewLC(serverAddr, clientAddr);
+ CKeyStreamSink *keyStreamSink = protectedStreamDesc->CreateKeyStreamSinkLC();
+
+ keyStreamSink->SetEncryptionAlgorithmL(EAES_128_CBC);
+ keyStreamSink->SetAuthenticationAlgorithmL(EHMAC_SHA1);
+
+ for (TInt i = 0; i < aThreadParam->iAssociationsNumber; ++i)
+ {
+ TInt spi = aThreadParam->iBaseSpi + i;
+ CKeyAssociation *ipSecKeyAssociation = CIpSecKeyAssociation::NewLC(spi, encryptionKey,
+ authenticationKey);
+
+ keyStreamSink->ProcessNewKeyAssociationL(*ipSecKeyAssociation);
+
+ CleanupStack::PopAndDestroy(ipSecKeyAssociation);
+ ValidateSadbL(spi, serverAddr, clientAddr, ETrue);
+ }
+
+ CleanupStack::PopAndDestroy(keyStreamSink);
+
+ for (TInt i = 0; i < aThreadParam->iAssociationsNumber; ++i)
+ ValidateSadbL(aThreadParam->iBaseSpi + i, serverAddr, clientAddr, EFalse);
+
+ CleanupStack::PopAndDestroy(5, &socketServ); // socketServ, rsadb, protectedStreamDesc, copiedEncryptionKey, copiedAuthenticationKey
+ }
+
+TInt TestThreadFunc(TAny *aThreadParam)
+ {
+ CThreadFuncParam *param = reinterpret_cast<CThreadFuncParam *>(aThreadParam);
+ CTrapCleanup* cleanup=CTrapCleanup::New();
+ TRAPD(err, TestThreadFuncL(param));
+ delete cleanup;
+ return err;
+ }
+
+void ThreadCleanup(TAny *aThread)
+ {
+ ((RThread *)aThread)->Terminate(0);
+ ((RThread *)aThread)->Close();
+ }
+
+void CleanupThreadArray(TAny *aThreadArray)
+ {
+ RArray<RThread> *threadArrayPtr = reinterpret_cast<RArray<RThread> *>(aThreadArray);
+ TInt threadsNum = threadArrayPtr->Count();
+ for (TInt i = 0; i < threadsNum; ++i)
+ {
+ ThreadCleanup(&(*threadArrayPtr)[i]);
+ }
+ threadArrayPtr->Close();
+ }
+
+TVerdict CScafIpSecSadbVerificationConcurrency::doTestL()
+ {
+ const TInt KDefaultThreadsNumber = 10;
+ TInt threadsNumber(KDefaultThreadsNumber);
+ GetIntFromConfig(ConfigSection(), _L("ThreadsNumber"), threadsNumber);
+
+ RArray<RThread> spawnedThreads;
+ CleanupStack::PushL(TCleanupItem(CleanupThreadArray, &spawnedThreads));
+ RPointerArray<CThreadFuncParam> threadParams;
+ CleanupStack::PushL(TCleanupItem(ResetAndDestroyPointerArray<CKeyStreamSink>, &threadParams));
+
+ TInt i = 0;
+ for (; i < threadsNumber; ++i)
+ {
+ const TInt KHeapSize = 0x600;
+ RThread thread;
+ TInt spiBase = KTestSpiBase + iAssociationsNumber * i;
+
+ CThreadFuncParam *threadParam = new (ELeave) CThreadFuncParam(spiBase, iAssociationsNumber);
+ CleanupStack::PushL(threadParam);
+ threadParams.AppendL(threadParam);
+ CleanupStack::Pop(threadParam);
+
+ TBuf<25> threadName;
+ threadName.Format(_L("CAF IPSec Thread %d"), i);
+ User::LeaveIfError(thread.Create(threadName, TestThreadFunc, KDefaultStackSize, KHeapSize, KHeapSize, threadParam));
+ CleanupStack::PushL(TCleanupItem(ThreadCleanup, &thread));
+ spawnedThreads.AppendL(thread);
+ // The thread itself is owned by the array
+ CleanupStack::Pop(&thread);
+ }
+
+ for (i = 0; i < threadsNumber; ++i)
+ spawnedThreads[i].Resume();
+
+ for (i = 0; i < threadsNumber; ++i)
+ {
+ TRequestStatus status;
+ // Wait for all threads to finish
+ spawnedThreads[i].Logon(status);
+ User::WaitForRequest(status);
+ if (status.Int() != KErrNone)
+ {
+ ERR_PRINTF3(_L("In IpSec concurrency tests, thread %d has returned with status %d"), i, status.Int());
+ SetTestStepResult(EFail);
+ }
+ else
+ INFO_PRINTF2(_L("IPSec concurrency test - thread %d finished successfully"), i);
+ }
+
+ CleanupStack::PopAndDestroy(2); // threadParams, spawnedThreads - cleanup item
+ return TestStepResult();
+ }
+
+//-------------------------CScafIpSecNegative---------------------------
+
+CScafIpSecNegative::CScafIpSecNegative(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecNegative);
+ }
+
+TVerdict CScafIpSecNegative::doTestL()
+ {
+ TInt encryptionKeyLength(iEncryptionKey->Length());
+ ASSERT(encryptionKeyLength);
+ // Save encryption and authentication key to temp. variable
+ HBufC8 *malformedEncryptionKey = HBufC8::NewLC(encryptionKeyLength);
+ TPtr8 malformedEncryptionKeyPtr(malformedEncryptionKey->Des());
+ malformedEncryptionKeyPtr.Copy(iEncryptionKey->Des());
+
+ TInt authenticationKeyLength(iAuthenticationKey->Length());
+ ASSERT(authenticationKeyLength);
+ HBufC8 *malformedAuthenticationKey = HBufC8::NewLC(authenticationKeyLength);
+ TPtr8 malformedAuthenticationKeyPtr(malformedAuthenticationKey->Des());
+ malformedAuthenticationKeyPtr.Copy(iAuthenticationKey->Des());
+ // Delete the last characters from keys - this makes them invalid
+ malformedEncryptionKeyPtr.SetLength(encryptionKeyLength - 1);
+ malformedAuthenticationKeyPtr.SetLength(authenticationKeyLength - 1);
+
+ CKeyStreamSink *keyStreamSink = CreateDefaultKeyStreamSinkLC();
+ // Send new assoc. - should fail
+ CKeyAssociation *malformedKeyAssociation = CIpSecKeyAssociation::NewLC(KTestSpiBase, malformedEncryptionKey,
+ malformedAuthenticationKey);
+ TRAPD(err, keyStreamSink->ProcessNewKeyAssociationL(*malformedKeyAssociation));
+ if (err != EIpsec_BadCipherKey)
+ {
+ if (err != KErrNoMemory)
+ {
+ ERR_PRINTF2(_L("In IpSec negative tests, an incorrect error was returned when setting invalid keys. The error is %d"), err);
+ }
+ if (err == KErrNone)
+ SetTestStepResult(EFail);
+ else
+ User::Leave(err);
+ }
+ INFO_PRINTF1(_L("IPSec negative test - received correct error on malformed association"));
+ // Here, we should have had a test which verifies that IPSec key stream sink rejects non-IPSec associations
+ // Due to lack of dynamic_cast support, it is omitted.
+
+ // Send twice a new assoc. - should fail. KTestSpiBase + 1 is used
+ // since IPSec implementation adds the malformed assoc. from step A to DB despite returning an error
+ SendKeyAssociationToKeySinkL(KTestSpiBase + 1, keyStreamSink);
+ INFO_PRINTF1(_L("IPSec negative test - sent correct association"));
+ TRAP(err, SendKeyAssociationToKeySinkL(KTestSpiBase + 1, keyStreamSink));
+ if (err != KErrAlreadyExists)
+ {
+ if (err != KErrNoMemory)
+ {
+ ERR_PRINTF2(_L("In IpSec negative tests, an incorrect error was returned when setting duplicate SA. The error is %d"), err);
+ }
+ if (err == KErrNone)
+ SetTestStepResult(EFail);
+ else
+ User::Leave(err);
+ }
+ INFO_PRINTF1(_L("IPSec negative test - received correct error on duplicate association"));
+ CleanupStack::PopAndDestroy(4, malformedEncryptionKey); // malformedEncryptionKey, malformedAuthenticationKey, keyStreamSink, malformedKeyAssociation
+ return TestStepResult();
+ }
+
+//-------------------------CScafIpSecMultipleSinks---------------------------
+
+CScafIpSecMultipleSinks::CScafIpSecMultipleSinks(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecMultipleSinks);
+ }
+
+TInt KDefaultNumberOfSinks = 10;
+
+TVerdict CScafIpSecMultipleSinks::doTestL()
+ {
+ // Read from configuration the number of sinks
+ TInt sinksNumber(KDefaultNumberOfSinks);
+ GetIntFromConfig(ConfigSection(), _L("SinksNumber"), sinksNumber);
+ // Instantiate decoders using the same protected stream desc.
+ CProtectedStreamDesc *protectedStreamDesc = CIpSecProtectedStreamDesc::NewLC(iServerAddr, iClientAddr);
+ RPointerArray<CKeyStreamSink> sinkArray;
+ CleanupStack::PushL(TCleanupItem(ResetAndDestroyPointerArray<CKeyStreamSink>, &sinkArray));
+ TInt i = 0;
+ for (; i < sinksNumber; ++i)
+ {
+ CKeyStreamSink *sink = protectedStreamDesc->CreateKeyStreamSinkLC();
+ User::LeaveIfError(sinkArray.Append(sink));
+ InitializeAlgorithmsL(sink);
+ CleanupStack::Pop(sink);
+ INFO_PRINTF2(_L("IPSec multiple sinks test - instantiated decoder %d"), i);
+ }
+ // Loop over decoders and number of associations, submit associations and validate them
+ for (i = 0; i < iAssociationsNumber; ++i)
+ for (TInt j = 0; j < sinksNumber; ++j)
+ {
+ TInt spi = KTestSpiBase + j * iAssociationsNumber + i;
+ SendKeyAssociationToKeySinkL(spi, sinkArray[j]);
+ ValidateSadbL(spi, iServerAddr, iClientAddr, ETrue);
+ }
+
+ // Delete decoders
+ CleanupStack::PopAndDestroy(&sinkArray);
+ // Validate that there are no associations
+ for (; i < sinksNumber; ++i)
+ {
+ ValidateNoAssociationsL(KTestSpiBase + i * iAssociationsNumber);
+ }
+ CleanupStack::PopAndDestroy(protectedStreamDesc);
+ return TestStepResult();
+ }
+
+//-------------------------CScafIpSecAlgorithmChange---------------------------
+
+CScafIpSecAlgorithmChange::CScafIpSecAlgorithmChange(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecAlgorithmChange);
+ }
+
+TVerdict CScafIpSecAlgorithmChange::doTestL()
+ {
+ CKeyStreamSink *keyStreamSink = CreateDefaultKeyStreamSinkLC();
+ SendKeyAssociationToKeySinkL(KTestSpiBase, keyStreamSink);
+ TRAPD(err, keyStreamSink->SetEncryptionAlgorithmL(ENoEncryption));
+ if (err != KErrNotSupported)
+ {
+ ERR_PRINTF2(_L("In IpSec algorithm change, an incorrect error was returned when setting NULL encryption. The error is %d"), err);
+ SetTestStepResult(EFail);
+ }
+ INFO_PRINTF1(_L("IPSec algorithms change test - received correct error after modifying encryption algorithm"));
+ TRAP(err, keyStreamSink->SetAuthenticationAlgorithmL(ENoAuthentication));
+ if (err != KErrNotSupported)
+ {
+ ERR_PRINTF2(_L("In IpSec algorithm change, an incorrect error was returned when setting NULL authentication. The error is %d"), err);
+ SetTestStepResult(EFail);
+ }
+ INFO_PRINTF1(_L("IPSec algorithms change test - received correct error after modifying authentication algorithm"));
+ CleanupStack::PopAndDestroy(keyStreamSink);
+ return TestStepResult();
+ }
+
+
+//-------------------------CScafIpSecSARemoval---------------------------
+
+CScafIpSecSARemoval::CScafIpSecSARemoval(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafIpSecSARemoval);
+ }
+
+const TUint KDefaultMaxSpiNumber = 3; // The constant is copied from IPSec's sink production code - it is not exposed in its interface
+
+TVerdict CScafIpSecSARemoval::doTestL()
+ {
+ CKeyStreamSink *keyStreamSink = CreateDefaultKeyStreamSinkLC();
+ if (iAssociationsNumber <= KDefaultMaxSpiNumber)
+ {
+ ERR_PRINTF3(_L("Incorrect number of associations specified in SA removal test - should be at least %d, and it is %d"), KDefaultMaxSpiNumber + 1, iAssociationsNumber);
+ User::Leave(KErrArgument);
+ }
+ TInt i = 0;
+ for (; i < iAssociationsNumber; ++i)
+ {
+ SendKeyAssociationToKeySinkL(KTestSpiBase + i, keyStreamSink);
+ }
+ INFO_PRINTF2(_L("IPSec SA removal test - sent %d associations successfully"), iAssociationsNumber);
+ for (i = 0; i < iAssociationsNumber - KDefaultMaxSpiNumber; ++i)
+ {
+ ValidateSadbL(KTestSpiBase + i, iServerAddr, iClientAddr, EFalse);
+ }
+ INFO_PRINTF3(_L("IPSec SA removal test - verified that associations %d to %d do not exist"), KTestSpiBase, KTestSpiBase + iAssociationsNumber - KDefaultMaxSpiNumber - 1);
+ for (i = iAssociationsNumber - KDefaultMaxSpiNumber; i < iAssociationsNumber; ++i)
+ {
+ ValidateSadbL(KTestSpiBase + i, iServerAddr, iClientAddr, ETrue);
+ }
+ INFO_PRINTF3(_L("IPSec SA removal test - verified that associations %d to %d exist"), KTestSpiBase + iAssociationsNumber - KDefaultMaxSpiNumber, KTestSpiBase + iAssociationsNumber - 1);
+
+ CleanupStack::PopAndDestroy(keyStreamSink);
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tkeystreamdecoderattributes.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,122 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the Key Stream Decoder Query Attribute Test Case
+//
+//
+
+#include "tkeystreamdecoderattributes.h"
+
+#include "testprotstrdesc.h"
+#include <caf/streaming/keystreamdecoder.h>
+
+using namespace StreamAccess;
+
+CScafKeyStreamDecoderAttributes::CScafKeyStreamDecoderAttributes(CScafServer& aParent) : CScafStep(aParent)
+/**
+ * Constructor
+ */
+ {
+ SetTestStepName(KScafKeyStreamDecoderAttributes);
+ }
+
+CScafKeyStreamDecoderAttributes::~CScafKeyStreamDecoderAttributes()
+/**
+ * Destructor
+ */
+ {
+ }
+
+TVerdict CScafKeyStreamDecoderAttributes::doTestStepPreambleL()
+ {
+ __UHEAP_MARK;
+
+ // Reads the Thread ID
+ RThread thread;
+ iThreadId = thread.Id();
+ thread.Close();
+
+ INFO_PRINTF3(_L("Thread %d - HEAP CELLS: %d"),iThreadId,User::CountAllocCells());
+
+ ReadTestConfigurationL();
+
+ return TestStepResult();
+ }
+
+TVerdict CScafKeyStreamDecoderAttributes::doTestL()
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ // Assume faliure, unless all is successful
+ SetTestStepResult(EFail);
+
+ // Retrieve the expected values from the array constructed using ini configuration data
+ TExpectedKeyStreamDecoderAttributes expectedAttributes = iExpectedKeyStreamDecoderData[0];
+
+ //Create an SDP document object and set the created key stream field object
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+
+ // Create an SDP media field object from the attributes with the INI configuration section
+ CSdpMediaField* sdp = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdp);
+ CleanupStack::Pop(sdp);
+
+ // Generate a protected key stream description.
+ HBufC* filePath;
+
+ if(iDecoderConfigurationArray[0]->iPrivateFolderPath.Length())
+ {
+ filePath = GetFullPathLC(iDecoderConfigurationArray[0]->iPrivateFolderPath, KNullDesC);
+ }
+ else
+ {
+ filePath = GetFullPathLC(KStaPrivateFolder, KNullDesC);
+ }
+
+ CTestProtectedStreamDesc* protectStreamDesc = CTestProtectedStreamDesc::NewL(*filePath);
+ CleanupStack::PopAndDestroy(filePath);
+ CleanupStack::PushL(protectStreamDesc);
+
+ // Create a key stream decoder
+ CKeyStreamDecoder* decoder = NULL;
+
+ TRAPD(err,decoder = CKeyStreamDecoder::NewL(*protectStreamDesc, *sdp, *sdpDoc));
+
+ if(!decoder || err != KErrNone)
+ {
+ ERR_PRINTF3(_L("*** Thread %d: FAIL - Unsuccessful Construction of Key Stream Decoder - %d ***"),iThreadId,err);
+ User::Leave(err);
+ }
+
+ CleanupStack::PushL(decoder);
+
+ if(CheckKeyStreamDecoderAttributesL(*decoder, expectedAttributes))
+ {
+ INFO_PRINTF2(_L("*** Thread %d: SUCCESS - Key Stream Decoder Attributes Match Expected Values ***"),iThreadId);
+ SetTestStepResult(EPass);
+ }
+
+ CleanupStack::PopAndDestroy(3, sdpDoc); //< decoder, protectStreamDesc, sdpDoc
+#endif
+ return TestStepResult();
+ }
+
+TVerdict CScafKeyStreamDecoderAttributes::doTestStepPostambleL()
+ {
+ iDecoderConfigurationArray.ResetAndDestroy();
+ iExpectedKeyStreamDecoderData.Close();
+
+ INFO_PRINTF3(_L("Thread %d - HEAP CELLS: %d"),iThreadId,User::CountAllocCells());
+ __UHEAP_MARKEND;
+
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tkeystreamdecoderconstruct.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,92 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// tkeystreamdecoderconstruct.h
+// Implements the Key Stream Decoder Construction Test Case
+//
+//
+
+#include "tkeystreamdecoderconstruct.h"
+
+#include "testprotstrdesc.h"
+#include <caf/streaming/keystreamdecoder.h>
+
+using namespace StreamAccess;
+
+CScafKeyStreamDecoderConstruct::CScafKeyStreamDecoderConstruct(CScafServer& aParent): CScafStep(aParent)
+/**
+ * Constructor
+ */
+ {
+ SetTestStepName(KScafKeyStreamDecoderConstruct);
+ }
+
+CScafKeyStreamDecoderConstruct::~CScafKeyStreamDecoderConstruct()
+/**
+ * Destructor
+ */
+ {
+ }
+
+TVerdict CScafKeyStreamDecoderConstruct::doTestL()
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ // Assume the test has failed if the test step result hasn't been otherwise set to EPass
+ SetTestStepResult(EFail);
+
+ //Create an SDP document object and set the created key stream field object
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+
+ // Create an SDP media field object from the attributes with the INI configuration section
+ CSdpMediaField* sdp = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdp);
+ CleanupStack::Pop(sdp);
+
+ // Generate a protected key stream description.
+ HBufC* filePath;
+
+ if(iDecoderConfigurationArray[0]->iPrivateFolderPath.Length())
+ {
+ filePath = GetFullPathLC(iDecoderConfigurationArray[0]->iPrivateFolderPath, KNullDesC);
+ }
+ else
+ {
+ filePath = GetFullPathLC(KStaPrivateFolder, KNullDesC);
+ }
+
+ CTestProtectedStreamDesc* protectStreamDesc = CTestProtectedStreamDesc::NewL(*filePath);
+ CleanupStack::PopAndDestroy(filePath);
+ CleanupStack::PushL(protectStreamDesc);
+
+ // Create a key stream decoder
+ CKeyStreamDecoder* decoder = NULL;
+
+ TRAPD(err,decoder = CKeyStreamDecoder::NewL(*protectStreamDesc, *sdp, *sdpDoc));
+
+ if(decoder && (err == KErrNone))
+ {
+ delete decoder;
+ INFO_PRINTF1(_L("*** SUCCESS: Key Stream Decoder Successfully Constructed ***"));
+ SetTestStepResult(EPass);
+ }
+ else
+ {
+ ERR_PRINTF1(_L("*** FAIL: Unsuccessful Construction of Key Stream Decoder ***"));
+ User::Leave(err);
+ }
+
+ // Delete the protected stream descriptor
+ CleanupStack::PopAndDestroy(2, sdpDoc); //< protectStreamDesc, sdpDoc
+#endif
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tkeystreamsink.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,289 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the Key Stream Sink usage tests.
+//
+//
+
+#include "tkeystreamsink.h"
+
+using namespace StreamAccess;
+
+// CScafKeyStreamSink
+
+CScafKeyStreamSink::CScafKeyStreamSink(CScafServer& aParent)
+/**
+ Constructor.
+ */
+ : CScafStep(aParent)
+ {
+ SetTestStepName(KScafKeyStreamSinkStep);
+ }
+
+CScafKeyStreamSink::~CScafKeyStreamSink()
+/**
+ Destructor.
+ */
+ {
+ //empty
+ }
+
+TVerdict CScafKeyStreamSink::doTestL()
+ {
+ TPtrC privatePath;
+
+ if(iDecoderConfigurationArray[0]->iPrivateFolderPath.Length())
+ {
+ privatePath.Set(iDecoderConfigurationArray[0]->iPrivateFolderPath);
+ }
+ else
+ {
+ privatePath.Set(KStaPrivateFolder());
+ }
+
+ //Ensure pre-conditions
+ CleanAgentsPrivateFolderL(privatePath);
+
+ //First copy the service protected RO into the test agent's private directory
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KServiceProtectedRo(), privatePath);
+
+ _LIT8(KPlainString,"aplainstring");
+ CSraRightsObject* ro = GetRightsObjectLC(KServiceProtectedRo(),privatePath);
+ //Encrypt the string with the encryption key
+ //Since encryption is not tested here, the encrypted key is
+ //created by appending the encryption key.
+ TBuf8<50> encryptedStr;
+ encryptedStr.Append(KPlainString);
+ encryptedStr.Append(*ro->Key());
+ CleanupStack::PopAndDestroy(ro);
+
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ //Create an SDP document object and set the created key stream field object
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+ //Create an SDP key stream field object with an attribute requiring the service protected RO
+ CSdpMediaField* sdp = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdp);
+ CleanupStack::Pop(sdp);
+
+ //Create a test key stream sink
+ _LIT(KKeySinkOutputFileName,"testkeysstreamsink.dat");
+ CKeyStreamSink* sink = CreateKeyStreamSinkLC(KKeySinkOutputFileName, privatePath);
+
+ CTestKeyStreamDecoderBase* decoder = NULL;
+
+ if(iDecoderConfigurationArray[0]->iSingleProcessAgent)
+ {
+ // Single Process Stream Agent
+ decoder = CTestSingleProcessKeyStreamDecoder::NewL(*sink, *sdp, *sdpDoc);
+ }
+ else
+ {
+ // Client/Server Stream Agent
+ decoder = CTestAgentKeyStreamDecoder::NewL(*sink, *sdp, *sdpDoc);
+ }
+
+ CleanupStack::PushL(decoder);
+
+ //Send the encrypted string
+ decoder->SendKeyStreamL(encryptedStr);
+
+ //Compare the output key with the original one
+ HBufC* fOutput = GetFullPathLC(privatePath, KKeySinkOutputFileName);
+
+ RFile fOutputKey;
+ User::LeaveIfError(fOutputKey.Open(iParent.Fs(), *fOutput, EFileRead));
+ CleanupStack::PopAndDestroy(fOutput);
+ CleanupClosePushL(fOutputKey);
+ TBuf8<50> decryptedKey;
+ User::LeaveIfError(fOutputKey.Read(decryptedKey));
+
+ if(decryptedKey.Compare(KPlainString))
+ {
+ SetTestStepResult(EFail);
+ }
+
+ CleanupStack::PopAndDestroy(4, sdpDoc); // fOutputKey, decoder, sink, sdpDoc
+#endif
+
+
+ return TestStepResult();
+ }
+
+
+//CScafConcurrentKeyStreamSinks
+
+CScafConcurrentKeyStreamSinks::CScafConcurrentKeyStreamSinks(CScafServer& aParent)
+/**
+ Constructor.
+ */
+ : CScafStep(aParent)
+ {
+ SetTestStepName(KScafConcurrentKeyStreamSinksStep);
+ }
+
+CScafConcurrentKeyStreamSinks::~CScafConcurrentKeyStreamSinks()
+/**
+ Destructor.
+ */
+ {
+ //empty
+ }
+
+TVerdict CScafConcurrentKeyStreamSinks::doTestL()
+ {
+ TPtrC privatePathA;
+
+ if(iDecoderConfigurationArray[0]->iPrivateFolderPath.Length())
+ {
+ privatePathA.Set(iDecoderConfigurationArray[0]->iPrivateFolderPath);
+ }
+ else
+ {
+ privatePathA.Set(KStaPrivateFolder());
+ }
+
+ TPtrC privatePathB;
+
+ if(iDecoderConfigurationArray[1]->iPrivateFolderPath.Length())
+ {
+ privatePathB.Set(iDecoderConfigurationArray[1]->iPrivateFolderPath);
+ }
+ else
+ {
+ privatePathB.Set(KStaPrivateFolder());
+ }
+
+ //Ensure pre-conditions
+ CleanAgentsPrivateFolderL(privatePathA);
+ CleanAgentsPrivateFolderL(privatePathB);
+
+ //First copy the service protected RO into the private directories of each stream agent
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KServiceProtectedRo(), privatePathA);
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KServiceProtectedRo(), privatePathB);
+
+ //Secondly copy the program protected RO into the private directories of each stream agent
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KProgramProtectedRo(), privatePathA);
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KProgramProtectedRo(), privatePathB);
+
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ //Create an SDP document object and set the created key stream field object for each decoder
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+
+ //Create a SDP object for RO-A
+ TInt sdpNum = 0;
+ CSdpMediaField* sdpA = CreateSdpLC(sdpNum++);
+ AddMediaFieldL(*sdpDoc, sdpA);
+ CleanupStack::Pop(sdpA);
+
+ //Create a SDP object for RO-B
+ CSdpMediaField* sdpB = CreateSdpLC(sdpNum);
+ AddMediaFieldL(*sdpDoc, sdpB);
+ CleanupStack::Pop(sdpB);
+
+ //Create a test key stream sink for test key stream decoder A
+ _LIT(KKeySinkOutputFileNameA,"testkeysstreamsinkA.dat");
+ CKeyStreamSink* sinkA = CreateKeyStreamSinkLC(KKeySinkOutputFileNameA,privatePathA);
+
+
+ //Create test key stream decoder A
+ CTestKeyStreamDecoderBase* decoderA = NULL;
+
+ if(iDecoderConfigurationArray[0]->iSingleProcessAgent)
+ {
+ // Single Process Stream Agent
+ decoderA = CTestSingleProcessKeyStreamDecoder::NewL(*sinkA, *sdpA, *sdpDoc);
+ }
+ else
+ {
+ // Client/Server Stream Agent
+ decoderA = CTestAgentKeyStreamDecoder::NewL(*sinkA, *sdpA, *sdpDoc);
+ }
+
+ CleanupStack::PushL(decoderA);
+
+ //Create a test key stream sink for test key stream decoder B
+ _LIT(KKeySinkOutputFileNameB,"testkeysstreamsinkB.dat");
+ CKeyStreamSink* sinkB = CreateKeyStreamSinkLC(KKeySinkOutputFileNameB,privatePathB);
+
+ //Create test key stream decoder B
+ CTestKeyStreamDecoderBase* decoderB = NULL;
+
+ if(iDecoderConfigurationArray[1]->iSingleProcessAgent)
+ {
+ // Single Process Stream Agent
+ decoderB = CTestSingleProcessKeyStreamDecoder::NewL(*sinkB, *sdpB, *sdpDoc);
+ }
+ else
+ {
+ // Client/Server Stream Agent
+ decoderB = CTestAgentKeyStreamDecoder::NewL(*sinkB, *sdpB, *sdpDoc);
+ }
+
+ CleanupStack::PushL(decoderB);
+
+ _LIT8(KPlainStringA,"plainstringA");
+ CSraRightsObject* roA = GetRightsObjectLC(KServiceProtectedRo,privatePathA);
+ //Encrypt the plain string A
+ TBuf8<50> encryptedStr;
+ encryptedStr.Append(KPlainStringA);
+ encryptedStr.Append(*roA->Key());
+ CleanupStack::PopAndDestroy(roA);
+ //Send the encrypted string A
+ decoderA->SendKeyStreamL(encryptedStr);
+
+ _LIT8(KPlainStringB,"plainstringB");
+ CSraRightsObject* roB = GetRightsObjectLC(KProgramProtectedRo,privatePathB);
+ //Encrypt the plain string B
+ encryptedStr.Zero();
+ encryptedStr.Append(KPlainStringB);
+ encryptedStr.Append(*roB->Key());
+ CleanupStack::PopAndDestroy(roB);
+ //Send the encrypted string B
+ decoderB->SendKeyStreamL(encryptedStr);
+
+ //Compare the output key file A with the original one
+ HBufC* fOutputA = GetFullPathLC(privatePathA, KKeySinkOutputFileNameA);
+ RFile fOutputKey;
+ User::LeaveIfError(fOutputKey.Open(iParent.Fs(), *fOutputA, EFileRead));
+ CleanupStack::PopAndDestroy(fOutputA);
+ CleanupClosePushL(fOutputKey);
+ TBuf8<50> decryptedKey;
+ User::LeaveIfError(fOutputKey.Read(decryptedKey));
+ CleanupStack::PopAndDestroy(&fOutputKey);
+
+ if(decryptedKey.Compare(KPlainStringA))
+ {
+ SetTestStepResult(EFail);
+ }
+
+ //Compare the output key file B with the original one
+ HBufC* fOutputB = GetFullPathLC(privatePathB, KKeySinkOutputFileNameB);
+ User::LeaveIfError(fOutputKey.Open(iParent.Fs(), *fOutputB, EFileRead));
+ CleanupStack::PopAndDestroy(fOutputB);
+ CleanupClosePushL(fOutputKey);
+ decryptedKey.Zero();
+ User::LeaveIfError(fOutputKey.Read(decryptedKey));
+ CleanupStack::PopAndDestroy(&fOutputKey);
+
+ if(decryptedKey.Compare(KPlainStringB))
+ {
+ SetTestStepResult(EFail);
+ }
+
+ //Release allocated resources
+ CleanupStack::PopAndDestroy(2, sinkB); //< decoderB, sink B
+ CleanupStack::PopAndDestroy(2, sinkA); //< decoderA, sinkA
+ CleanupStack::PopAndDestroy(sdpDoc); //< sdpDoc
+#endif
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tmultikeystreamdecoders.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,179 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the Multiple Key Stream Decoder Test Case
+//
+//
+
+#include "tmultikeystreamdecoders.h"
+
+#include "testprotstrdesc.h"
+
+using namespace StreamAccess;
+
+CScafMultiKeyStreamDecoders::CScafMultiKeyStreamDecoders(CScafServer& aParent): CScafStep(aParent)
+/**
+ * Constructor
+ */
+ {
+ SetTestStepName(KScafMultiKeyStreamDecoders);
+ }
+
+CScafMultiKeyStreamDecoders::~CScafMultiKeyStreamDecoders()
+/**
+ * Destructor
+ */
+ {
+ }
+
+TVerdict CScafMultiKeyStreamDecoders::doTestStepPreambleL()
+ {
+ __UHEAP_MARK;
+
+ // Reads the Thread ID
+ RThread thread;
+ iThreadId = thread.Id();
+ thread.Close();
+
+ INFO_PRINTF3(_L("Thread %d - HEAP CELLS: %d"),iThreadId,User::CountAllocCells());
+
+ ReadTestConfigurationL();
+
+ return TestStepResult();
+ }
+
+TVerdict CScafMultiKeyStreamDecoders::doTestL()
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ // Assume the test has failed if the test step result hasn't been otherwise set to EPass
+ SetTestStepResult(EFail);
+
+ // Retrieval of expected values for Key stream Decoder "A"
+ TExpectedKeyStreamDecoderAttributes expectedAttributesA = iExpectedKeyStreamDecoderData[0];
+
+ // Retrieval of expected values for Key stream Decoder "B"
+ TExpectedKeyStreamDecoderAttributes expectedAttributesB = iExpectedKeyStreamDecoderData[1];
+
+ //Create an SDP document object and set the created key stream field object
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+
+ // Generate the 2 SDP media field objects from the attributes with the INI configuration
+ CSdpMediaField* sdpA = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdpA);
+ CleanupStack::Pop(sdpA);
+
+ CSdpMediaField* sdpB = CreateSdpLC(1);
+ AddMediaFieldL(*sdpDoc, sdpB);
+ CleanupStack::Pop(sdpB);
+
+ // Generate the 2 protected key stream description objects for each of the key stream decoders.
+ HBufC* filePathA;
+ if(iDecoderConfigurationArray[0]->iPrivateFolderPath.Length())
+ {
+ filePathA = GetFullPathLC(iDecoderConfigurationArray[0]->iPrivateFolderPath, KNullDesC);
+ }
+ else
+ {
+ filePathA = GetFullPathLC(KStaPrivateFolder, KNullDesC);
+ }
+ CTestProtectedStreamDesc* protectStreamDescA = CTestProtectedStreamDesc::NewL(*filePathA);
+ CleanupStack::PopAndDestroy(filePathA);
+ CleanupStack::PushL(protectStreamDescA);
+
+ HBufC* filePathB;
+ if(iDecoderConfigurationArray[1]->iPrivateFolderPath.Length())
+ {
+ filePathB = GetFullPathLC(iDecoderConfigurationArray[1]->iPrivateFolderPath, KNullDesC);
+ }
+ else
+ {
+ filePathB = GetFullPathLC(KStaPrivateFolder, KNullDesC);
+ }
+ CTestProtectedStreamDesc* protectStreamDescB = CTestProtectedStreamDesc::NewL(*filePathB);
+ CleanupStack::PopAndDestroy(filePathB);
+ CleanupStack::PushL(protectStreamDescB);
+
+ /* Create key stream decoder A using the generated protected key stream description
+ * and SDP media description A
+ */
+ CKeyStreamDecoder* decoderA = NULL;
+
+ TRAPD(err,decoderA = CKeyStreamDecoder::NewL(*protectStreamDescA, *sdpA, *sdpDoc));
+
+ if(!decoderA || err != KErrNone)
+ {
+ ERR_PRINTF3(_L("*** Thread %d: FAIL - Unsuccessful Construction of Key Stream Decoder A - %d ***"),iThreadId,err);
+ User::Leave(err);
+ }
+
+ CleanupStack::PushL(decoderA);
+
+
+ /* Create key stream decoder B using the generated protected key stream description
+ * and SDP media description B
+ */
+ CKeyStreamDecoder* decoderB = NULL;
+
+ TRAP(err,decoderB = CKeyStreamDecoder::NewL(*protectStreamDescB, *sdpB, *sdpDoc));
+
+ if(!decoderB || err != KErrNone)
+ {
+ ERR_PRINTF3(_L("*** Thread %d: FAIL - Unsuccessful Construction of Key Stream Decoder B - %d ***"),iThreadId,err);
+ User::Leave(err);
+ }
+
+ CleanupStack::PushL(decoderB);
+
+
+ /* Check that the retrieved attribute values from either key stream decoder
+ * match the expected results stated within the configuration file
+ */
+ TBool attributeCheckResult = ETrue;
+
+
+ INFO_PRINTF2(_L("Thread %d: Checking Attributes for Key Stream Decoder A..."),iThreadId);
+ if(!CheckKeyStreamDecoderAttributesL(*decoderA, expectedAttributesA))
+ {
+ ERR_PRINTF2(_L("*** Thread %d: FAIL - Key Stream Decoder A attributes mismatch expected values ***"),iThreadId);
+ attributeCheckResult = EFalse;
+ }
+
+
+ INFO_PRINTF2(_L("Thread %d: Checking Attributes for Key Stream Decoder B..."),iThreadId);
+ if(!CheckKeyStreamDecoderAttributesL(*decoderB, expectedAttributesB))
+ {
+ ERR_PRINTF2(_L("*** Thread %d: FAIL - Key Stream Decoder B attributes mismatch expected values ***"),iThreadId);
+ attributeCheckResult = EFalse;
+ }
+
+ if(attributeCheckResult)
+ {
+ INFO_PRINTF2(_L("*** Thread %d: SUCCESS - Attributes associated with Key Stream Decoders A & B match expected values ***"),iThreadId);
+ SetTestStepResult(EPass);
+ }
+
+ CleanupStack::PopAndDestroy(5, sdpDoc); //< decoderB, decoderA, protectStreamDescB, protectStreamDescA, sdpDoc
+#endif
+ return TestStepResult();
+ }
+
+TVerdict CScafMultiKeyStreamDecoders::doTestStepPostambleL()
+ {
+ iDecoderConfigurationArray.ResetAndDestroy();
+ iExpectedKeyStreamDecoderData.Close();
+
+ INFO_PRINTF3(_L("Thread %d - HEAP CELLS: %d"),iThreadId,User::CountAllocCells());
+ __UHEAP_MARKEND;
+
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tpostacquisition.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,196 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the post-acquisition content protection test.
+//
+//
+
+#include "tpostacquisition.h"
+#include "testprotstrdesc.h"
+#include "testagentkeystreamdecoder.h"
+#include <caf/data.h>
+#include <caf/content.h>
+#include <caf/supplier.h>
+#include <caf/metadataarray.h>
+#include <caf/supplieroutputfile.h>
+#include <caf/streaming/keystreamdecoder.h>
+
+using namespace StreamAccess;
+using namespace ContentAccess;
+
+CScafPostAcquisition::CScafPostAcquisition(CScafServer& aParent)
+/**
+ Constructor for the postacquisition test object.
+ */
+ : CScafStep(aParent)
+ {
+ SetTestStepName(KScafPostAcquisitionStep);
+ }
+
+CScafPostAcquisition::~CScafPostAcquisition()
+/**
+ Destructor for the postacquisition test object.
+ */
+ {
+ //empty
+ }
+
+void DeleteFileL(RFs& aFs, const TDesC& aPath)
+ {
+ TInt err = 0;
+ err = aFs.Delete(aPath);
+ if(err != KErrNone && err != KErrNotFound && err != KErrPathNotFound)
+ {
+ User::Leave(err);
+ }
+ }
+
+TVerdict CScafPostAcquisition::doTestL()
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ TBool createOutputFile = EFalse;
+
+ if(!GetBoolFromConfig(ConfigSection(), KCreateOutputFiles, createOutputFile))
+ {
+ ERR_PRINTF2(_L("Failed to read '%S' key of configuration"), &KCreateOutputFiles);
+ SetTestStepResult(EFail);
+ return TestStepResult();
+ }
+
+ //Ensure pre-conditions
+ CleanAgentsPrivateFolderL(KRtaPrivateFolder());
+ CleanAgentsPrivateFolderL(KStaPrivateFolder());
+ CleanAgentsPrivateFolderL(KTestServerPrivateFolder());
+ CleanAgentsPrivateFolderL(KRtaTestFolder());
+ DeleteFileL(iParent.Fs(), _L("c:\\PostAcquisitionTest.dr"));
+ DeleteFileL(iParent.Fs(), _L("c:\\PostAcquisitionTest.TXT"));
+
+ //First copy the RO, which allows to record the protected content, into the test agent's private directory
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KRecordableRoFileName(), KStaPrivateFolder());
+
+ //Secondly copy the program protected RO into the test agent's private directory
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KPostAcquisitionRoFileName(), KStaPrivateFolder());
+
+ //Create an SDP document object and set the created key stream field object
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+ //Create a SDP object for RO-Recordable
+ CSdpMediaField* sdp = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdp);
+ CleanupStack::Pop(sdp);
+
+ // Generate a protected key stream description.
+ HBufC* filePath = GetFullPathLC(KStaPrivateFolder, KNullDesC);
+ CTestProtectedStreamDesc* protectStreamDesc = CTestProtectedStreamDesc::NewL(*filePath);
+ CleanupStack::PopAndDestroy(filePath);
+ CleanupStack::PushL(protectStreamDesc);
+
+ //Create a key stream decoder
+ CKeyStreamDecoder* decoder = CKeyStreamDecoder::NewL(*protectStreamDesc, *sdp, *sdpDoc);
+ CleanupStack::PushL(decoder);
+
+ //Check whether the content is recordable
+ TBool value = EFalse;
+ decoder->GetAttributeL(ECanExport, value);
+ if(!value)
+ {
+ ERR_PRINTF1(_L("The content can not be exported. Unexpected result!"));
+ SetTestStepResult(EFail);
+ User::Leave(KErrCANotSupported);
+ }
+
+ CImportFile* import(0);
+ _LIT(KPostAcqContentFileName, "postacquisition.content");
+ if(!createOutputFile)
+ {
+ HBufC* outputDir = GetFullPathLC(KRtaPrivateFolder(), KNullDesC());
+ import = decoder->CreateImportSessionLC(_L8("text/plain"), KPostAcqContentFileName(), *outputDir);
+ CleanupStack::Pop(import);
+ CleanupStack::PopAndDestroy(outputDir);
+ CleanupStack::PushL(import);
+ }
+ else
+ {
+ import = decoder->CreateImportSessionLC(_L8("text/plain"));
+ //To get a better coverage, delete this import object and create another one with zero-length-output-directory.
+ CleanupStack::PopAndDestroy(import);
+ DeleteFileL(iParent.Fs(), _L("c:\\PostAcquisitionTest.dr"));
+ DeleteFileL(iParent.Fs(), _L("c:\\PostAcquisitionTest.TXT"));
+ import = decoder->CreateImportSessionLC(_L8("text/plain"), _L("NULL"), KNullDesC());
+ }
+
+ _LIT8(KStreamingData1,"SampleStreamingDataBegan");
+ _LIT8(KStreamingData2,"TheEndOfStreamingData");
+ _LIT8(KStreamingDataFull,"SampleStreamingDataBeganTheEndOfStreamingData");
+
+ User::LeaveIfError(import->WriteData(KStreamingData1()));
+ User::LeaveIfError(import->WriteData(KStreamingData2()));
+ //Import has been completed
+ TFileName fileName;
+ TInt err = 0;
+ err = import->WriteDataComplete();
+ while (err == KErrCANewFileHandleRequired)
+ {
+ err = ProvideNewOutputFileL(*import, fileName);
+ if(err == KErrNone)
+ {
+ err = import->WriteDataComplete();
+ }
+ }
+ User::LeaveIfError(err);
+
+ CleanupStack::PopAndDestroy(3, protectStreamDesc);
+ CleanupStack::PopAndDestroy(); //sdpDoc
+
+ //Try to read what we have imported
+ CContent* content(0);
+ if(!createOutputFile)
+ {
+ HBufC* filePath = GetFullPathLC(KRtaPrivateFolder(), KPostAcqContentFileName());
+ content = CContent::NewL(*filePath);
+ CleanupStack::PopAndDestroy(filePath);
+ CleanupStack::PushL(content);
+ }
+ else
+ {
+ content = CContent::NewLC(fileName);
+ }
+ CData* mydata = content->OpenContentL(EView);
+ CleanupStack::PushL(mydata);
+
+ RBuf8 rdata;
+ rdata.CreateL(KStreamingDataFull().Length());
+ rdata.CleanupClosePushL();
+ User::LeaveIfError(mydata->Read(rdata));
+ if(rdata.Compare(KStreamingDataFull()))
+ {
+ SetTestStepResult(EFail);
+ }
+ CleanupStack::PopAndDestroy(3, content);
+#endif
+ return TestStepResult();
+ }
+
+TInt CScafPostAcquisition::ProvideNewOutputFileL(CImportFile& aImport, TDes& aName)
+ {
+ TInt err = 0;
+ // supply new file in order to continue writing
+ aImport.GetSuggestedOutputFileName(aName);
+ HBufC* newFullName = GetFullPathLC(KRtaTestFolder(), aName);
+ RFile newFile;
+ User::LeaveIfError(newFile.Replace(iParent.Fs(), *newFullName, EFileWrite));
+ err = aImport.ContinueWithNewOutputFile(newFile, *newFullName);
+ newFile.Close();
+ aName.Copy(*newFullName);
+ CleanupStack::PopAndDestroy(newFullName);
+ return err;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/treferenceagent.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,100 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the reference agent test case.
+//
+//
+
+#include <caf/streaming/keystreamdecoder.h>
+#include <caf/streaming/protectedstreamdesc.h>
+#include "treferenceagent.h"
+#include "stkm.h"
+
+using namespace StreamAccess;
+
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+const TUint32 KTestSpiBase = 667;
+#endif
+
+CScafRefAgent::CScafRefAgent(CScafServer& aParent): CScafIpSec(aParent)
+ {
+ SetTestStepName(KScafRefAgent);
+ }
+
+
+TVerdict CScafRefAgent::doTestL()
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ SetTestStepResult(EPass);
+ CleanAgentsPrivateFolderL(KSraPrivateFolder());
+ CopyFile2AgentsPrivateFolderL(iParent.Fs(), KProgramProtectedRo(), KSraPrivateFolder());
+
+ //Create an SDP document object and set the created key stream field object
+ CSdpDocument* sdpDoc = CreateSdpDocumentLC();
+ // Generate an SDP object by reading the values from the configuration file
+ CSdpMediaField* sdp = CreateSdpLC(0);
+ AddMediaFieldL(*sdpDoc, sdp);
+ CleanupStack::Pop(sdp);
+
+ // Create a trivial source IP address. Since the protected content is not required
+ // in this test, this IP address used here is not important, any IP address can be used.
+ TInetAddr sourceAddr;
+ User::LeaveIfError(sourceAddr.Input(_L("192.168.174.5")));
+ sourceAddr.SetPort(3004);
+
+ // Destination IP address must be the agent's address
+ TInetAddr destinationAddr (iClientAddr);
+
+ // Create an IPSec protected key stream description object from the source and destination IP addresses
+ CProtectedStreamDesc *protectedStreamDesc = CIpSecProtectedStreamDesc::NewLC(sourceAddr, destinationAddr);
+ // Create a key stream decoder by using the IPSec key stream decoder and sdp requiring the reference agent
+ CKeyStreamDecoder* keyStreamDecoder = CKeyStreamDecoder::NewLC(*protectedStreamDesc, *sdp, *sdpDoc);
+
+ // Create a short term key message (STKM)
+ CStkm* stkm = CStkm::NewLC(0, KTestSpiBase, *iEncryptionKey, *iAuthenticationKey);
+ CBufFlat* buf = CBufFlat::NewL(KExpandSize);
+ CleanupStack::PushL(buf);
+
+ RBufWriteStream stream(*buf);
+ CleanupClosePushL(stream);
+ stkm->ExternalizeL(stream);
+ CleanupStack::PopAndDestroy(&stream);
+
+ HBufC8* des = HBufC8::NewL(buf->Size());
+ TPtr8 ptr((des)->Des());
+ buf->Read(0, ptr, buf->Size());
+ CleanupStack::PopAndDestroy(buf);
+ CleanupStack::PushL(des);
+
+ // Send the STKM to the reference agent
+ TRequestStatus status;
+ iClientSocket.Send(*des, 0, status);
+ User::WaitForRequest(status);
+ User::LeaveIfError(status.Int());
+
+ // Wait until the agent is finished with the key processing
+ RMutex mutex;
+ _LIT(KSraMutexName, "MutexBtwTestHarnessAndRefAgent");
+ User::LeaveIfError(mutex.OpenGlobal(KSraMutexName()));
+ CleanupClosePushL(mutex);
+ mutex.Wait();
+
+ // Check whether the STKM message has been added to the SADB
+ CallValidateSadbL(KTestSpiBase, sourceAddr, destinationAddr, ETrue);
+
+ // Release the allocated memories
+ CleanupStack::PopAndDestroy(5, protectedStreamDesc);
+ CleanupStack::PopAndDestroy(); // sdpDoc
+#endif
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tscafserver.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,154 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the test server of the Streaming CAF test harness
+//
+//
+
+#include "tscafserver.h" // TEF Test Server
+#include "tscafstep.h" // TEF Steps Test Code
+#include "tstaunittest.h"
+#include "tkeystreamsink.h"
+#include "tpostacquisition.h"
+#include "tipsec.h"
+#include "treferenceagent.h"
+#include "startupcommsstep.h"
+
+// Consumer interface test steps
+#include "tkeystreamdecoderconstruct.h"
+#include "tkeystreamdecoderattributes.h"
+#include "tmultikeystreamdecoders.h"
+
+// Utility Steps
+#include "tsetuprightsobjects.h"
+
+CScafServer* CScafServer::NewL()
+/**
+ * @return - Instance of the test server
+ * Called inside the MainL() function to create and start the
+ * CTestServer derived server.
+ */
+ {
+ CScafServer* server = new (ELeave) CScafServer();
+ CleanupStack::PushL(server);
+ User::LeaveIfError(server->iFs.Connect());
+ User::LeaveIfError(server->iFs.ShareProtected());
+ User::LeaveIfError(server->iFs.CreatePrivatePath(server->iFs.GetSystemDrive()));
+ server->ConstructL(KStaServerName);
+ CleanupStack::Pop(server);
+ return server;
+ }
+
+CScafServer::~CScafServer()
+/**
+ Destructor.
+ */
+ {
+ iFs.Close();
+ }
+
+LOCAL_C void MainL()
+/**
+ * Secure variant
+ * Much simpler, uses the new Rendezvous() call to sync with the client
+ */
+ {
+
+ CActiveScheduler *sched = new(ELeave) CActiveScheduler;
+ CActiveScheduler::Install(sched);
+
+ CScafServer* server = NULL;
+
+ // Create the CTestServer derived server
+ TRAPD(err,server = CScafServer::NewL());
+ if(!err)
+ {
+ // Sync with the client and enter the active scheduler
+ RProcess::Rendezvous(KErrNone);
+ sched->Start();
+ }
+
+ delete server;
+ delete sched;
+ }
+
+GLDEF_C TInt E32Main()
+/**
+ * @return - Standard Epoc error code on process exit
+ * Process entry point. Called by client using RProcess API
+ */
+ {
+ __UHEAP_MARK;
+ CTrapCleanup* cleanup = CTrapCleanup::New();
+ if(cleanup == NULL)
+ {
+ return KErrNoMemory;
+ }
+ TRAPD(err,MainL());
+ delete cleanup;
+ __UHEAP_MARKEND;
+ return err;
+ }
+
+
+CTestStep* CScafServer::CreateTestStep(const TDesC& aStepName)
+/**
+ Creates a new test step.
+ @param aStepName The name of the requested test step.
+ @return A pointer to the object of the requested test step.
+ */
+ {
+ // Initialise test step object to NULL if no TEF steps are assigned
+ CTestStep* testStep = NULL;
+
+ if(aStepName == KScafTestAgentServerStep)
+ testStep = new CScafTestAgentServer(*this);
+ else if (aStepName == KScafKeyStreamSinkStep)
+ testStep = new CScafKeyStreamSink(*this);
+ else if (aStepName == KScafConcurrentKeyStreamSinksStep)
+ testStep = new CScafConcurrentKeyStreamSinks(*this);
+ else if (aStepName == KScafPostAcquisitionStep)
+ testStep = new CScafPostAcquisition(*this);
+ else if (aStepName == KScafSetupRightsObjectsStep)
+ testStep = new CScafSetupRightsObjects(*this);
+ else if (aStepName == KScafKeyStreamDecoderConstruct)
+ testStep = new CScafKeyStreamDecoderConstruct(*this);
+ else if (aStepName == KScafKeyStreamDecoderAttributes)
+ testStep = new CScafKeyStreamDecoderAttributes(*this);
+ else if (aStepName == KScafMultiKeyStreamDecoders)
+ testStep = new CScafMultiKeyStreamDecoders(*this);
+ else if (aStepName == KStartupCommsStep)
+ testStep = new CStartupCommsStep();
+ // IPSec tests
+ else if (aStepName == KScafIpSec)
+ testStep = new CScafIpSec(*this);
+ else if (aStepName == KScafIpSecDecoderIntegration)
+ testStep = new CScafIpSecDecoderIntegration(*this);
+ else if (aStepName == KScafIpSecSadbVerification)
+ testStep = new CScafIpSecSadbVerification(*this);
+ else if (aStepName == KScafIpSecSadbVerificationConcurrency)
+ testStep = new CScafIpSecSadbVerificationConcurrency(*this);
+ else if (aStepName == KScafIpSecNegative)
+ testStep = new CScafIpSecNegative(*this);
+ else if (aStepName == KScafIpSecMultipleSinks)
+ testStep = new CScafIpSecMultipleSinks(*this);
+ else if (aStepName == KScafIpSecAlgorithmChange)
+ testStep = new CScafIpSecAlgorithmChange(*this);
+ else if (aStepName == KScafIpSecSARemoval)
+ testStep = new CScafIpSecSARemoval(*this);
+ //Reference agent test
+ else if (aStepName == KScafRefAgent)
+ testStep = new CScafRefAgent(*this);
+
+ return testStep;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tscafstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,827 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the basic test step for the Streaming CAF test harness
+//
+//
+
+#include "tscafstep.h"
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+#include <sdpconnectionfield.h>
+#include <sdporiginfield.h>
+#endif
+
+TSdpAttribute::TSdpAttribute()
+ {
+ }
+
+CTestDecoderConfiguration* CTestDecoderConfiguration::NewLC()
+ {
+ CTestDecoderConfiguration* self = new (ELeave) CTestDecoderConfiguration();
+ CleanupStack::PushL(self);
+ return self;
+ }
+
+CTestDecoderConfiguration::~CTestDecoderConfiguration()
+ {
+ iAttributeArray.Close();
+ }
+
+CTestDecoderConfiguration::CTestDecoderConfiguration()
+ {
+ }
+
+TExpectedKeyStreamDecoderAttributes::TExpectedKeyStreamDecoderAttributes()
+ {
+ }
+
+CScafStep::CScafStep(CScafServer& aParent)
+/**
+ Constructor.
+ */
+ : iParent(aParent), iThreadId(0), iOOMTest(EFalse)
+ {
+ //empty
+ }
+
+CScafStep::~CScafStep()
+/**
+ Destructor.
+ */
+ {
+ //empty
+ }
+
+
+TVerdict CScafStep::doTestStepPreambleL()
+/**
+ From CTestStep. Creates an active scheduler for the test step.
+ */
+ {
+ __UHEAP_MARK;
+ INFO_PRINTF2(_L("HEAP CELLS: %d"), User::CountAllocCells());
+
+ iActiveScheduler = new (ELeave) CActiveScheduler;
+ CActiveScheduler::Install(iActiveScheduler);
+
+ ReadTestConfigurationL();
+
+ SetTestStepResult(EPass);
+ return TestStepResult();
+ }
+
+TVerdict CScafStep::doTestStepL()
+/**
+ * From CTestStep. Default behaviour of doTestStepL() allows for the test case to be run both
+ * under 'Normal' and 'Out of Memory' Conditions.
+ *
+ * Implementation of the test case itself is called from the doTestL() of the derived test step.
+ *
+ * The state of the iOOMTest member variable determines the type of test conditons:
+ * EFalse - Normal Test
+ * ETrue - Out of Memory Test
+ */
+ {
+ if (!iOOMTest)
+ {
+ doTestL();
+ }
+ else
+ {
+ doOOMTestL();
+ }
+
+ return TestStepResult();
+ }
+
+TVerdict CScafStep::doTestStepPostambleL()
+/**
+ From CTestStep. Destroys the active scheduler of the test step.
+ */
+ {
+ CActiveScheduler::Install(NULL);
+ delete iActiveScheduler;
+
+ iDecoderConfigurationArray.ResetAndDestroy();
+ iExpectedKeyStreamDecoderData.Close();
+
+ INFO_PRINTF2(_L("HEAP CELLS: %d"),User::CountAllocCells());
+ __UHEAP_MARKEND;
+
+ return TestStepResult();
+ }
+
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+// We need this dummy function because TCleanupItem c'tor (see below) does not accept functions without parameters
+void CloseSdpCodecPool(TAny *)
+ {
+ SdpCodecStringPool::Close();
+ }
+
+CSdpDocument* CScafStep::CreateSdpDocumentLC()
+/**
+ Creates an SDP document object which is a collection of all media fields and session attributes.
+ @return A pointer to the SDP document object.
+ The ownership is transferred. Please note that
+ the returned object must be deleted by DeleteSdpAndCloseCodecPool method.
+ */
+ {
+ // Open the string pool to access all predefined SDP constants
+ SdpCodecStringPool::OpenL();
+ CleanupStack::PushL(TCleanupItem(CloseSdpCodecPool,this)); //Pass the class pointer to make armv5 compiler (for urel) happy
+
+ // Create the CSdpDocument object
+ CSdpDocument* sdpDocument = CSdpDocument::NewLC();
+
+ // Define the session name
+ sdpDocument->SetSessionNameL(_L8("ScafTest"));
+
+ // Set the origin field. The values are not important.
+ // Because they are not used in our tests.
+ TInt64 sessionId(TUint(2055478987));
+ TInt64 sessionVersion(TUint(2027813655));
+ TInetAddr address;
+ const TUint32 KInetAddr = INET_ADDR(192,168,0,3);
+ address.SetAddress( KInetAddr );
+ CSdpOriginField* originField = CSdpOriginField::NewLC(_L8("scafuser"), sessionId, sessionVersion, address);
+ sdpDocument->SetOriginField(originField);
+ CleanupStack::Pop(originField);
+
+ CleanupStack::Pop(); // Pop the temporary guard on SDP Codec string pool close
+ CleanupStack::Pop(); // Pop sdpDocument object
+ CleanupStack::PushL(TCleanupItem(CScafStep::DeleteSdpDocAndCloseCodecPool, reinterpret_cast<TAny *>(sdpDocument)));
+
+ return sdpDocument;
+ }
+
+void CScafStep::AddMediaFieldL(CSdpDocument& aSdpDoc, const CSdpMediaField* aSdpKeyStream)
+/**
+ Adds an SDP media field object to a given SDP document object.
+ @param aSdpDoc The SDP document object
+ @param aSdpKeyStream Sdp media field which will be appended to the SDP document object.
+ This object should be popped from the cleanupstack after this function runs successfully.
+ */
+ {
+ // Set the key stream field given
+ User::LeaveIfError(aSdpDoc.MediaFields().Append(aSdpKeyStream));
+ }
+
+CSdpMediaField* CScafStep::CreateSdpLC(TInt aSdpNum)
+/**
+ Creates a simple SDP media field object.
+ @param aSdpNum An integer representing the accessor to the SDP parameter
+ array and the required data
+ @return A pointer to the SDP media field object.
+ The ownership is transferred. Please note that
+ the returned object must be deleted by DeleteSdpAndCloseCodecPool method.
+ @see CScafStep::DeleteSdp
+ */
+ {
+ TPtrC pMedia;
+ pMedia.Set(iDecoderConfigurationArray[aSdpNum]->iMedia);
+
+ TInt mIndex = 0;
+ if(!pMedia.CompareF(KSdpMediaAudio))
+ {
+ mIndex = SdpCodecStringConstants::EMediaAudio;
+ }
+ else if(!pMedia.CompareF(KSdpMediaVideo))
+ {
+ mIndex = SdpCodecStringConstants::EMediaVideo;
+ }
+ else if(!pMedia.CompareF(KSdpMediaData))
+ {
+ mIndex = SdpCodecStringConstants::EMediaData;
+ }
+ else
+ {
+ ERR_PRINTF2(_L("Unsupported media type: '%S'"),&pMedia);
+ SetTestStepResult(EFail);
+ User::Leave(KErrNotFound);
+ }
+
+ TPtrC pProtocol;
+ pProtocol.Set(iDecoderConfigurationArray[aSdpNum]->iProtocol);
+
+ TInt mProtocol = 0;
+ if(!pProtocol.CompareF(KSdpProtocolUdp))
+ {
+ mProtocol = SdpCodecStringConstants::EProtocolUdp;
+ }
+ else if(!pProtocol.CompareF(KSdpProtocolTcp))
+ {
+ mProtocol = SdpCodecStringConstants::EProtocolTcp;
+ }
+ else if(!pProtocol.CompareF(KSdpProtocolRtp))
+ {
+ mProtocol = SdpCodecStringConstants::EProtocolRtpAvp;
+ }
+ else
+ {
+ ERR_PRINTF2(_L("Unsupported protocol type: '%S'"),mProtocol);
+ SetTestStepResult(EFail);
+ User::Leave(KErrNotFound);
+ }
+
+ TInt port = iDecoderConfigurationArray[aSdpNum]->iPort;
+
+ TPtrC pFormat;
+ pFormat.Set(iDecoderConfigurationArray[aSdpNum]->iFormat);
+
+ //Convert 16-bit to 8-bit
+ TPtr8 ptrFormat(Convert16To8LC(pFormat));
+
+ RStringPool pool = SdpCodecStringPool::StringPoolL();
+ RStringF mediaData = pool.StringF(mIndex, SdpCodecStringPool::StringTableL());
+ CleanupClosePushL(mediaData);
+ RStringF protocol = pool.StringF(mProtocol, SdpCodecStringPool::StringTableL());
+ CleanupClosePushL(protocol);
+
+ CSdpMediaField* sdp = CSdpMediaField::NewL(mediaData, port, protocol, ptrFormat);
+ CleanupStack::PopAndDestroy(3);
+ CleanupStack::PushL(sdp);
+
+ //If a connection address is defined, create an SDP connection field and add it to the SDP media field
+ if(iDecoderConfigurationArray[aSdpNum]->iConnAddr.Length()>0)
+ {
+ //The only supported network type is ENetType
+ RStringF netType = pool.StringF(SdpCodecStringConstants::ENetType, SdpCodecStringPool::StringTableL());
+ CleanupClosePushL(netType);
+ //The only supported address type is IP v4
+ RStringF addressType = pool.StringF(SdpCodecStringConstants::EAddressTypeIP4, SdpCodecStringPool::StringTableL());
+ CleanupClosePushL(addressType);
+ //Create the connection field
+ CSdpConnectionField* connField = CSdpConnectionField::NewL(netType, addressType, Convert16To8LC(iDecoderConfigurationArray[aSdpNum]->iConnAddr));
+ CleanupStack::PushL(connField);
+ //Set the connection field into the SDP media field
+ sdp->ConnectionFields().AppendL(connField);
+ CleanupStack::Pop(connField);
+ CleanupStack::PopAndDestroy(3, &netType); //netType, addressType, Convert16To8LC
+ }
+
+ //Add atrributes
+ AddAttributes2SdpL(*sdp, aSdpNum);
+
+ return sdp;
+ }
+#endif
+
+CKeyStreamSink* CScafStep::CreateKeyStreamSinkLC(const TDesC& aFileName, const TDesC& aPrivPath)
+/**
+ Creates a test key stream sink object.
+ @param aFilePath The output file name of the test key stream sink.
+ @param aPrivPath Stream Agents Private Folder Path
+ @return A pointer to the test key stream sink object.
+ The ownership is transferred.
+ */
+ {
+ HBufC* privFolder = GetFullPathLC(aPrivPath, aFileName);
+ CTestKeyStreamSink* sink = CTestKeyStreamSink::NewL(*privFolder);
+ CleanupStack::PopAndDestroy(privFolder);
+ CleanupStack::PushL(sink);
+ return sink;
+ }
+
+void CScafStep::CleanAgentsPrivateFolderL(const TDesC& aPrivatePath)
+/**
+ Delete all files and folders under the private directory of the test agent.
+ */
+ {
+ HBufC* agentPrivFol = GetFullPathLC(aPrivatePath, _L("*.*"));
+ CFileMan *fm = CFileMan::NewL(iParent.Fs());
+ CleanupStack::PushL(fm);
+
+ TInt ret = fm->Delete(*agentPrivFol,0);
+ if((ret != KErrNone)&&(ret != KErrNotFound)&&(ret != KErrPathNotFound))
+ {
+ User::Leave(ret);
+ }
+ CleanupStack::PopAndDestroy(2, agentPrivFol);
+ }
+
+
+void CScafStep::DeleteSdpDocAndCloseCodecPool(TAny* aSdpDoc)
+/**
+ Delete the SDP document object and close the codec pool
+ @param aSdp The SDP object which will be deleted.
+ */
+ {
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+ delete reinterpret_cast<CSdpDocument *>(aSdpDoc);
+ SdpCodecStringPool::Close();
+#else
+ (void) aSdpDoc;
+#endif
+ }
+
+void CScafStep::CopyFile2AgentsPrivateFolderL(RFs& aFs, const TDesC& aFileName, const TDesC& aPrivPath)
+/**
+ Copy a test file from Z drive to the private folder of the test agent server.
+ @param aFs File Server session.
+ @param aPrivPath Stream Agents Private Folder Path
+ @param aFileName The name of the file which lives in the folder of Z drive.
+ */
+ {
+ //Gets the target file path
+ HBufC* fTarget = GetFullPathLC(aPrivPath, aFileName);
+ //Make sure that the path exists
+ TInt err = aFs.MkDirAll(*fTarget);
+ if(err != KErrNone && err != KErrAlreadyExists)
+ {
+ User::Leave(err);
+ }
+
+ //Get the file source path
+ TFileName fSource(KDataFilesPath);
+ fSource.Append(aFileName);
+
+ //Create a file manager
+ CFileMan *fm = CFileMan::NewL(aFs);
+ CleanupStack::PushL(fm);
+
+ //Copy the source file to the target
+ User::LeaveIfError(fm->Copy(fSource, *fTarget));
+ // Make the file writeable
+ User::LeaveIfError(fm->Attribs(*fTarget, 0, KEntryAttReadOnly, TTime(0), 0));
+ CleanupStack::PopAndDestroy(2, fTarget);
+ }
+
+#ifdef INTERNALLY_ENABLE_UPWARD_DEPENDENCY
+void CScafStep::AddAttributes2SdpL(CSdpMediaField& aSdp, TInt aSdpNum)
+/**
+ * Add attributes from the instance within the CSdpConfiguration array, where
+ * the attribute information is stored, into the SDP object being constructed.
+ * @param aSdp The SDP object where the attribute is added.
+ */
+ {
+ TInt attrCount = iDecoderConfigurationArray[aSdpNum]->iAttributeArray.Count();
+
+ RStringPool pool = SdpCodecStringPool::StringPoolL();
+
+ for(TInt i=0; i < attrCount; ++i)
+ {
+ TPtrC pAttrType;
+ pAttrType.Set(iDecoderConfigurationArray[aSdpNum]->iAttributeArray[i].iAttributeType);
+
+ TPtrC pAttrName;
+ pAttrName.Set(iDecoderConfigurationArray[aSdpNum]->iAttributeArray[i].iAttributeName);
+
+ //Convert 16-bit to 8-bit
+ TPtr8 ptrAttrName(Convert16To8LC(pAttrName));
+
+ TPtrC pAttrValue;
+ pAttrValue.Set(iDecoderConfigurationArray[aSdpNum]->iAttributeArray[i].iAttributeValue);
+
+ //Convert 16-bit to 8-bit
+ TPtr8 ptrAttrValue(Convert16To8LC(pAttrValue));
+
+ if(pAttrType.Compare(_L("Format")))
+ {
+ RStringF attrName = pool.OpenFStringL(ptrAttrName);
+ CleanupClosePushL(attrName);
+ CSdpAttributeField *attribute = CSdpAttributeField::NewLC(attrName, ptrAttrValue);
+ User::LeaveIfError((aSdp.AttributeFields()).Append(attribute));
+ CleanupStack::Pop(attribute);
+ }
+ else
+ {
+ RStringF fmtpStr = pool.StringF(SdpCodecStringConstants::EAttributeFmtp, SdpCodecStringPool::StringTableL());
+ CleanupClosePushL(fmtpStr);
+ CSdpFmtAttributeField* fmtpAttribute = CSdpFmtAttributeField::NewLC(fmtpStr, ptrAttrName, ptrAttrValue);
+ User::LeaveIfError(aSdp.FormatAttributeFields().Append(fmtpAttribute));
+ CleanupStack::Pop(fmtpAttribute);
+ }
+ CleanupStack::PopAndDestroy(3);
+ }//for
+ }//End of function
+#endif
+
+void CScafStep::PrintErrorAndLeaveL(TDesC& aKey)
+/**
+ Prints an error message and then leaves with not found error.
+ @param aKey The name of the key which is not found.
+ */
+ {
+ ERR_PRINTF2(_L("Failed to read '%S' key of configuration"), &aKey);
+ SetTestStepResult(EFail);
+ User::Leave(KErrNotFound);
+ }
+
+TPtr8 CScafStep::Convert16To8LC(TDesC& aDes)
+/**
+ Convert a 16-bit descriptor into 8-bit.
+ @param aVal The 16-bit descriptor.
+ @return The descriptor converted to 8-bit.
+ */
+ {
+ HBufC8* buf = HBufC8::NewLC(aDes.Size());
+ TPtr8 ptr(buf->Des());
+ ptr.Copy(aDes);
+ return ptr;
+ }
+
+HBufC* CScafStep::GetFullPathLC(const TDesC& aPath, const TDesC& aFileName)
+/**
+ Create a fully qualified file path.
+ @param aPath The folder path of the file.
+ @param aFileName The name of the file.
+ @return A pointer to the fully qualified file path.
+ */
+ {
+ HBufC* fullPath = HBufC::NewLC(aPath.Length()+aFileName.Length()+1);
+ TPtr ptr(fullPath->Des());
+ ptr.Copy(aPath);
+ ptr[0] = iParent.Fs().GetSystemDriveChar();
+ if(aFileName.Length()>0)
+ {
+ ptr.Append(aFileName);
+ }
+ return fullPath;
+ }
+
+CSraRightsObject* CScafStep::GetRightsObjectLC(const TDesC& aName, const TDesC& aPrivPath)
+/**
+ Reads the given RO file and creates a RO object.
+ @param aName The name of the RO file.
+ @param aPrivPath Stream Agents Private Folder Path
+ @return The RO object.
+ */
+ {
+ RFile f;
+ HBufC* path = GetFullPathLC(aPrivPath, aName);
+ User::LeaveIfError(f.Open(iParent.Fs(), *path, EFileRead));
+ CleanupStack::PopAndDestroy(path);
+ CleanupClosePushL(f);
+ RFileReadStream stream(f);
+ CleanupClosePushL(stream);
+ CSraRightsObject* ro = CSraRightsObject::NewL(stream);
+ CleanupStack::PopAndDestroy(2, &f);
+ CleanupStack::PushL(ro);
+ return ro;
+ }
+
+TVerdict CScafStep::doOOMTestL()
+/**
+ * Runs the test step under OOM Conditions checking that each heap allocation is fail safe
+ */
+ {
+ // Pre and Post test heap cell allocation counts
+ TInt cellCountAfter = 0;
+ TInt cellCountBefore = 0;
+
+ /**
+ * The loop tests each heap allocation under out of memory conditions to determine whether
+ * the framework cleans up correctly without leaking memory.
+ *
+ * The 'for' loop does not have any completion criteria, so the loop breaks out as soon
+ * as any of the following events occur:
+ * a) The pre and post heap cell counts mismatch signalling a memory leakage
+ * b) An unexpected leave (any leave with an error code other than 'KErrNoMemory')
+ * c) All heap allocations have been tested and the test returns 'KErrNone'
+ */
+ for (TInt testCount = 0; ; ++testCount)
+ {
+ __UHEAP_MARK;
+ __UHEAP_SETFAIL(RHeap::EDeterministic, testCount+1);
+ cellCountBefore = User::CountAllocCells();
+ TRAPD(err, doTestL());
+ cellCountAfter = User::CountAllocCells();
+ __UHEAP_MARKEND;
+
+ INFO_PRINTF3(_L("OOM Test %d: Status = %d"),testCount,err);
+
+ if (err == KErrNone)
+ {
+ INFO_PRINTF1(_L("OOM Test Finished"));
+ break;
+ }
+ else if(err == KErrNoMemory)
+ {
+ if (cellCountBefore != cellCountAfter)
+ {
+ ERR_PRINTF2(_L("OOM Test Result: Failed - Memory leakage on iteration %d"), testCount);
+ ERR_PRINTF2(_L("Pre-Test Heap Cell Count: %d"), cellCountBefore);
+ ERR_PRINTF2(_L("Post-Test Heap Cell Count: %d"), cellCountAfter);
+ SetTestStepResult(EFail);
+ break;
+ }
+ }
+ else
+ {
+ User::Leave(err);
+ break;
+ }
+ }
+
+ return TestStepResult();
+ }
+
+TVerdict CScafStep::doTestL()
+ {
+ return TestStepResult();
+ }
+
+void CScafStep::ReadTestConfigurationL()
+ {
+ TInt baseIndex=0;
+
+ // Read SDP Configuration Data
+ TName fMedia;
+ TName fProtocol;
+ TName fPort;
+ TName fFormat;
+ TName fConnAddr;
+
+ fMedia.Format(KSdpMedia, baseIndex);
+ fProtocol.Format(KSdpProtocol, baseIndex);
+ fPort.Format(KSdpPort, baseIndex);
+ fFormat.Format(KSdpFormat, baseIndex);
+ fConnAddr.Format(KSdpConnAddr, baseIndex);
+
+ TPtrC mediaData;
+ TPtrC protocolData;
+ TInt portData;
+ TPtrC formatData;
+ TPtrC connAddrData;
+
+ while (GetStringFromConfig(ConfigSection(), fMedia, mediaData) &&
+ GetStringFromConfig(ConfigSection(), fProtocol, protocolData) &&
+ GetIntFromConfig(ConfigSection(), fPort, portData) &&
+ GetStringFromConfig(ConfigSection(), fFormat, formatData))
+ {
+
+ CTestDecoderConfiguration* newSdpConfig = CTestDecoderConfiguration::NewLC();
+
+ newSdpConfig->iMedia.Set(mediaData);
+ newSdpConfig->iProtocol.Set(protocolData);
+ newSdpConfig->iPort = portData;
+ newSdpConfig->iFormat.Set(formatData);
+
+ if(GetStringFromConfig(ConfigSection(), fConnAddr, connAddrData))
+ {
+ newSdpConfig->iConnAddr.Set(connAddrData);
+ }
+
+ // Read Stream Associated Agents Private Folder Path
+ TName fPrivateFolderPath;
+ TName fSingleProcessAgent;
+
+ fPrivateFolderPath.Format(KScafConfigPrivateFolderPath, baseIndex);
+ fSingleProcessAgent.Format(KScafConfigSingleProcessAgent, baseIndex);
+
+ TPtrC privateFolderPath;
+ TBool singleProcessAgent;
+
+ if(GetStringFromConfig(ConfigSection(), fPrivateFolderPath, privateFolderPath) &&
+ GetBoolFromConfig(ConfigSection(), fSingleProcessAgent, singleProcessAgent))
+ {
+ newSdpConfig->iPrivateFolderPath.Set(privateFolderPath);
+ newSdpConfig->iSingleProcessAgent = singleProcessAgent;
+ }
+
+ // Read SDP Attribute Data
+ TInt attributeIndex = 0;
+
+ TName fAttributeType;
+ TName fAttributeName;
+ TName fAttributeValue;
+
+ fAttributeType.Format(KSdpAttributeType,baseIndex,attributeIndex);
+ fAttributeName.Format(KSdpAttributeName,baseIndex,attributeIndex);
+ fAttributeValue.Format(KSdpAttributeValue,baseIndex,attributeIndex);
+
+ TPtrC attributeType;
+ TPtrC attributeName;
+ TPtrC attributeValue;
+
+ while (GetStringFromConfig(ConfigSection(), fAttributeType, attributeType) &&
+ GetStringFromConfig(ConfigSection(), fAttributeName, attributeName) &&
+ GetStringFromConfig(ConfigSection(), fAttributeValue, attributeValue))
+ {
+ TSdpAttribute newAttribute;
+
+ newAttribute.iAttributeType.Set(attributeType);
+ newAttribute.iAttributeName.Set(attributeName);
+ newAttribute.iAttributeValue.Set(attributeValue);
+
+ newSdpConfig->iAttributeArray.Append(newAttribute);
+
+ attributeIndex++;
+ fAttributeType.Format(KSdpAttributeType,baseIndex,attributeIndex);
+ fAttributeName.Format(KSdpAttributeName,baseIndex,attributeIndex);
+ fAttributeValue.Format(KSdpAttributeValue,baseIndex,attributeIndex);
+ }
+
+ iDecoderConfigurationArray.Append(newSdpConfig);
+
+ CleanupStack::Pop(newSdpConfig);
+
+ baseIndex++;
+ fMedia.Format(KSdpMedia, baseIndex);
+ fProtocol.Format(KSdpProtocol, baseIndex);
+ fPort.Format(KSdpPort, baseIndex);
+ fFormat.Format(KSdpFormat, baseIndex);
+ fConnAddr.Format(KSdpConnAddr, baseIndex);
+ }
+
+ // Read Expected Key Stream Decoder Attribute Values
+ TName fIsProgramProtected;
+ TName fIsServiceProtected;
+ TName fCanExport;
+ TName fMustProtectIfRecording;
+ TName fCanPlay;
+ TName fContentId;
+ TName fRightsIssuerUri;
+
+ baseIndex = 0;
+
+ fIsProgramProtected.Format(KScafConfigIsProgramProtected,baseIndex);
+ fIsServiceProtected.Format(KScafConfigIsServiceProtected,baseIndex);
+ fCanExport.Format(KScafConfigCanExport,baseIndex);
+ fMustProtectIfRecording.Format(KScafConfigMustProtectIfRecording,baseIndex);
+ fCanPlay.Format(KScafConfigCanPlay,baseIndex);
+ fContentId.Format(KScafConfigContentId,baseIndex);
+ fRightsIssuerUri.Format(KScafConfigRightsIssuerUri,baseIndex);
+
+ TBool isProgramProtected;
+ TBool isServiceProtected;
+ TBool canExport;
+ TBool mustProtectIfRecording;
+ TBool canPlay;
+ TPtrC contentId;
+ TPtrC rightsIssuerUri;
+
+ while(GetBoolFromConfig(ConfigSection(),fIsProgramProtected,isProgramProtected) &&
+ GetBoolFromConfig(ConfigSection(),fIsServiceProtected,isServiceProtected) &&
+ GetBoolFromConfig(ConfigSection(),fCanExport,canExport) &&
+ GetBoolFromConfig(ConfigSection(),fMustProtectIfRecording,mustProtectIfRecording) &&
+ GetBoolFromConfig(ConfigSection(),fCanPlay,canPlay) &&
+ GetStringFromConfig(ConfigSection(),fContentId,contentId) &&
+ GetStringFromConfig(ConfigSection(),fRightsIssuerUri,rightsIssuerUri))
+ {
+ TExpectedKeyStreamDecoderAttributes newExpectedValues;
+
+ newExpectedValues.IsProgramProtected = isProgramProtected;
+ newExpectedValues.IsServiceProtected = isServiceProtected;
+ newExpectedValues.CanExport = canExport;
+ newExpectedValues.MustProtectIfRecording = mustProtectIfRecording;
+ newExpectedValues.CanPlay = canPlay;
+ newExpectedValues.ContentId.Set(contentId);
+ newExpectedValues.RightsIssuerUri.Set(rightsIssuerUri);
+
+ iExpectedKeyStreamDecoderData.Append(newExpectedValues);
+
+ baseIndex++;
+ fIsProgramProtected.Format(KScafConfigIsProgramProtected,baseIndex);
+ fIsServiceProtected.Format(KScafConfigIsServiceProtected,baseIndex);
+ fCanExport.Format(KScafConfigCanExport,baseIndex);
+ fMustProtectIfRecording.Format(KScafConfigMustProtectIfRecording,baseIndex);
+ fCanPlay.Format(KScafConfigCanPlay,baseIndex);
+ fContentId.Format(KScafConfigContentId,baseIndex);
+ fRightsIssuerUri.Format(KScafConfigRightsIssuerUri,baseIndex);
+ }
+
+ // Read OOM Test Flag
+ GetBoolFromConfig(ConfigSection(), KScafConfigOOMTest, iOOMTest);
+ }
+
+TBool CScafStep::CheckKeyStreamDecoderAttributesL(const CKeyStreamDecoder& aDecoder,
+ const TExpectedKeyStreamDecoderAttributes& aExpectedData)
+ {
+ // Overall result of the attribute value checks (ETrue = Pass / EFalse = Fail)
+ TBool result = ETrue;
+
+ _LIT(KIsProgramProtectedDescription,"IsProgramProtected");
+ _LIT(KIsServiceProtectedDescription,"IsServiceProtected");
+ _LIT(KCanExportDescription,"CanExport");
+ _LIT(KMustProtectIfRecordingDescription,"MustProtectIfRecording");
+ _LIT(KCanPlayDescription,"CanPlay");
+ _LIT(KContentIDDescription,"ContentID");
+ _LIT(KRightIssuerURIDescription,"RightIssuerURI");
+
+ // Query the stream agent to determine whether the program is protected
+ if(!CompareBooleanAttributeL(aDecoder,
+ EIsProgramProtected,
+ KIsProgramProtectedDescription,
+ aExpectedData.IsProgramProtected))
+ {
+ result = EFalse;
+ }
+
+ // Query the stream agent to determine whether the whole service is protected
+ if(!CompareBooleanAttributeL(aDecoder,
+ EIsServiceProtected,
+ KIsServiceProtectedDescription,
+ aExpectedData.IsServiceProtected))
+ {
+ result = EFalse;
+ }
+
+ // Query the stream agent to determine whether the content can be exported
+ if(!CompareBooleanAttributeL(aDecoder,
+ ECanExport,
+ KCanExportDescription,
+ aExpectedData.CanExport))
+ {
+ result = EFalse;
+ }
+
+ // Query the stream agent to determine whether the content must be protected whilst recording
+ if(!CompareBooleanAttributeL(aDecoder,
+ EMustProtectIfRecording,
+ KMustProtectIfRecordingDescription,
+ aExpectedData.MustProtectIfRecording))
+ {
+ result = EFalse;
+ }
+
+ // Query the stream agent to determine whether the content can be played
+ if(!CompareBooleanAttributeL(aDecoder,
+ ECanPlay,
+ KCanPlayDescription,
+ aExpectedData.CanPlay))
+ {
+ result = EFalse;
+ }
+
+ // Query the stream agent to retrieve the Content ID
+ if(!CompareStringAttributeL(aDecoder,
+ EContentID,
+ KContentIDDescription,
+ aExpectedData.ContentId))
+ {
+ result = EFalse;
+ }
+
+ // Query the stream agent to retrieve the Rights Issuer URI
+ if(!CompareStringAttributeL(aDecoder,
+ ERightsIssuerURI,
+ KRightIssuerURIDescription,
+ aExpectedData.RightsIssuerUri))
+ {
+ result = EFalse;
+ }
+
+ return result;
+ }
+
+TBool CScafStep::CompareBooleanAttributeL(const CKeyStreamDecoder& aDecoder,
+ const TAttribute& aAttributeEnum,
+ const TDesC& aAttributeDescription,
+ const TBool aExpectedValue)
+ {
+ TBool retrievedValue;
+
+ // Query the stream agent to determine the actual value of the attribute
+ TRAPD(err,aDecoder.GetAttributeL(aAttributeEnum,retrievedValue));
+
+ if(err != KErrNone)
+ {
+ ERR_PRINTF4(_L("*** Thread %d: Failed to Retrieve '%S' Value - %d ***"),iThreadId,&aAttributeDescription,err);
+ User::Leave(err);
+ }
+
+ if(retrievedValue != aExpectedValue)
+ {
+ INFO_PRINTF4(_L("Thread %d: Expected '%S' Value = %d"),iThreadId,&aAttributeDescription,aExpectedValue);
+ INFO_PRINTF4(_L("Thread %d: Retrieved '%S' Value = %d"),iThreadId,&aAttributeDescription,retrievedValue);
+ ERR_PRINTF3(_L("*** Thread %d: Unexpected '%S' Value ***"),iThreadId,&aAttributeDescription);
+ return EFalse;
+ }
+
+ return ETrue;
+ }
+
+TBool CScafStep::CompareStringAttributeL(const CKeyStreamDecoder& aDecoder,
+ const TStringAttribute& aAttributeEnum,
+ const TDesC& aAttributeDescription,
+ const TDesC& aExpectedValue)
+ {
+ TBool result = ETrue;
+
+ // Query the stream agent to determine the actual value of the attribute
+ HBufC* retrievedValue = aDecoder.GetStringAttributeLC(aAttributeEnum);
+
+ if(retrievedValue->Des() != aExpectedValue)
+ {
+ INFO_PRINTF4(_L("Thread %d: Expected '%S' Value = %S"),iThreadId,&aAttributeDescription,&aExpectedValue);
+ INFO_PRINTF4(_L("Thread %d: Retrieved '%S' Value = %S"),iThreadId,&aAttributeDescription,retrievedValue);
+ ERR_PRINTF3(_L("*** Thread %d: Unexpected '%S' Value ***"),iThreadId,&aAttributeDescription);
+ result = EFalse;
+ }
+
+ // Destroy the heap based descriptor
+ CleanupStack::PopAndDestroy(retrievedValue);
+
+ return result;
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tsetuprightsobjects.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,89 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the setup utility step for copying rights objects into the test stream agents
+//
+//
+
+#include "tsetuprightsobjects.h"
+
+using namespace StreamAccess;
+
+CScafSetupRightsObjects::CScafSetupRightsObjects(CScafServer& aParent): CScafStep(aParent)
+/**
+ * Constructor
+ */
+ {
+ SetTestStepName(KScafSetupRightsObjectsStep);
+ }
+
+CScafSetupRightsObjects::~CScafSetupRightsObjects()
+/**
+ * Destructor
+ */
+ {
+ }
+
+TVerdict CScafSetupRightsObjects::doTestStepL()
+ {
+ INFO_PRINTF1(_L("*** Setup Rights Objects ***"));
+
+ TPtrC privateFolderPath;
+
+ TName fPrivateFolderPath;
+
+ fPrivateFolderPath.Format(KScafConfigPrivateFolderPath, 0);
+
+ if(!GetStringFromConfig(ConfigSection(),fPrivateFolderPath,privateFolderPath))
+ {
+ privateFolderPath.Set(KStaPrivateFolder);
+ }
+
+ //Clear the contents of the stream agents private directory
+ TRAPD(err,CleanAgentsPrivateFolderL(privateFolderPath));
+
+ if(err != KErrNone)
+ {
+ ERR_PRINTF2(_L("*** CleanAgentsPrivateFolderL() Leave : %d ***"),err);
+ User::Leave(err);
+ }
+
+ /* Rights object identifier is formatted with the index in order to copy the list of rights
+ * object files stated within the configuration, into the stream agents private
+ * directory
+ */
+ TInt index=0;
+ TName roIdentifier;
+ roIdentifier.Format(KScafConfigRoName, index);
+
+ // Filename of the current rights object
+ TPtrC roName;
+
+ while (GetStringFromConfig(ConfigSection(),roIdentifier,roName))
+ {
+ //Copy the rights object into the private directory of the stream agent
+ TRAP(err,CopyFile2AgentsPrivateFolderL(iParent.Fs(),roName, privateFolderPath));
+
+ if(err != KErrNone)
+ {
+ ERR_PRINTF3(_L("*** PREAMBLE - CopyFile2AgentsPrivateFolderL() Leave: %S - %d ***"),&roName,err);
+ User::Leave(err);
+ }
+
+ // increment the index and reformat the identifier for the next filename
+ index++;
+ roIdentifier.Format(KScafConfigRoName, index);
+ }
+
+ return TestStepResult();
+ }
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/contentmgmt/cafstreamingsupport/test/tscaf/source/tstaunittest.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,59 @@
+// Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+// Implements the unit test steps for the Test Streaming Agent.
+//
+//
+
+#include "tstaunittest.h"
+
+using namespace StreamAccess;
+
+CScafTestAgentServer::CScafTestAgentServer(CScafServer& aParent)
+/**
+ Constructor.
+ */
+ : CScafStep(aParent)
+ {
+ SetTestStepName(KScafTestAgentServerStep);
+ }
+
+CScafTestAgentServer::~CScafTestAgentServer()
+/**
+ Destructor.
+ */
+ {
+ //empty
+ }
+
+TVerdict CScafTestAgentServer::doTestStepL()
+ {
+ INFO_PRINTF1(_L("CStaTestAgentServer test"));
+ __UHEAP_MARK;
+
+ RStaClient sta;
+ TInt r = sta.Connect();
+
+ if(KErrNone == r)
+ {
+ sta.Close();
+ }
+ else
+ {
+ SetTestStepResult(EFail);
+ }
+
+ __UHEAP_MARKEND;
+ return TestStepResult();
+ }
+
--- a/contentmgmt/referencedrmagent/refcafhelper/group/refcafhelper.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/contentmgmt/referencedrmagent/refcafhelper/group/refcafhelper.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -35,8 +35,9 @@
USERINCLUDE ../inc
-SYSTEMINCLUDE /epoc32/include
-SYSTEMINCLUDE /epoc32/include/caf
+OS_LAYER_SYSTEMINCLUDE
+SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(caf)
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(caf)
LIBRARY euser.lib
SMPSAFE
--- a/crypto/weakcryptospi/examples/mac_api_usage/t_mac_example.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/examples/mac_api_usage/t_mac_example.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include <cryptospi/cryptospidef.h>
#include <cryptospi/cryptomacapi.h>
#include <cryptospi/cryptoparams.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <f32file.h>
#include "utf.h"
--- a/crypto/weakcryptospi/group/bld.inf Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/bld.inf Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2002-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -60,20 +60,26 @@
#endif
-// Everything else is subject to export control; do not export them
-//../inc/spi/asymmetriccipherplugin.h /epoc32/include/cryptospi/asymmetriccipherplugin.h
-//../inc/spi/cryptosymmetriccipherapi.h /epoc32/include/cryptospi/cryptosymmetriccipherapi.h
-//../inc/spi/cryptoasymmetriccipherapi.h /epoc32/include/cryptospi/cryptoasymmetriccipherapi.h
-//../inc/spi/cryptosignatureapi.h /epoc32/include/cryptospi/cryptosignatureapi.h
-//../inc/spi/cryptokeypairgeneratorapi.h /epoc32/include/cryptospi/cryptokeypairgeneratorapi.h
-//../inc/spi/keys.h /epoc32/include/cryptospi/keys.h
-//../inc/spi/keypair.h /epoc32/include/cryptospi/keypair.h
-//../inc/spi/keypairgeneratorplugin.h /epoc32/include/cryptospi/keypairgeneratorplugin.h
-//../inc/spi/signerplugin.h /epoc32/include/cryptospi/signerplugin.h
-//../inc/spi/symmetriccipherplugin.h /epoc32/include/cryptospi/symmetriccipherplugin.h
-//../inc/spi/verifierplugin.h /epoc32/include/cryptospi/verifierplugin.h
-//../inc/spi/cryptokeyagreementapi.h /epoc32/include/cryptospi/cryptokeyagreementapi.h
-//../inc/spi/keyagreementplugin.h /epoc32/include/cryptospi/keyagreementplugin.h
+
+// Now, the export control measures do not apply for the below set of headers. Hence, they can be exported.
+../inc/spi/asymmetriccipherplugin.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/asymmetriccipherplugin.h)
+../inc/spi/cryptosymmetriccipherapi.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/cryptosymmetriccipherapi.h)
+../inc/spi/cryptoasymmetriccipherapi.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/cryptoasymmetriccipherapi.h)
+../inc/spi/cryptosignatureapi.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/cryptosignatureapi.h)
+../inc/spi/cryptokeypairgeneratorapi.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/cryptokeypairgeneratorapi.h)
+../inc/spi/keys.h SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(cryptospi/keys.h)
+../inc/spi/keypair.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/keypair.h)
+../inc/spi/keypairgeneratorplugin.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/keypairgeneratorplugin.h)
+../inc/spi/signerplugin.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/signerplugin.h)
+../inc/spi/symmetriccipherplugin.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/symmetriccipherplugin.h)
+../inc/spi/verifierplugin.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/verifierplugin.h)
+../inc/spi/cryptokeyagreementapi.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/cryptokeyagreementapi.h)
+../inc/spi/keyagreementplugin.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(cryptospi/keyagreementplugin.h)
+
+
+// Cryptospi error codes.
+../inc/spi/cryptospi_errs.h SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(cryptospi/cryptospi_errs.h)
+
../inc/cryptopanic.h SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(cryptopanic.h)
../inc/hash.h SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(hash.h)
--- a/crypto/weakcryptospi/group/crypto.mmh Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/crypto.mmh Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2004-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -53,7 +53,7 @@
SOURCE windowslider.cpp algorithms.cpp bigint.cpp mont.cpp rinteger.cpp
SOURCE primes.cpp
-USERINCLUDE ../inc ../inc/spi
+USERINCLUDE ../inc
OS_LAYER_SYSTEMINCLUDE
LIBRARY euser.lib random.lib hash.lib cryptospi.lib
--- a/crypto/weakcryptospi/group/cryptospi.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/cryptospi.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -33,7 +33,7 @@
CAPABILITY All
-USERINCLUDE ../inc ../inc/spi
+USERINCLUDE ../inc/spi
OS_LAYER_SYSTEMINCLUDE
SOURCEPATH ../source/spi
--- a/crypto/weakcryptospi/group/cryptospisetup.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/cryptospisetup.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -28,7 +28,6 @@
UID 0 0x10283514
OS_LAYER_SYSTEMINCLUDE
-USERINCLUDE ../inc ../inc/spi
USERINCLUDE ../source/spi
SOURCEPATH ../source/spi
--- a/crypto/weakcryptospi/group/dumpcryptoplugin.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/dumpcryptoplugin.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,6 @@
VENDORID 0x70000001
UID 0 0x102832e6
-USERINCLUDE ../inc ../inc/spi
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
SOURCEPATH ../test/dumpcryptoplugin
--- a/crypto/weakcryptospi/group/hash.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/hash.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -33,8 +33,6 @@
SOURCEPATH ../source/hash
SOURCE hash.cpp md2.cpp md5.cpp sha1.cpp hmac.cpp hashshim.cpp md4.cpp sha2.cpp
-USERINCLUDE ../inc
-USERINCLUDE ../inc/spi
OS_LAYER_SYSTEMINCLUDE
LIBRARY euser.lib cryptospi.lib
--- a/crypto/weakcryptospi/group/pbe.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/pbe.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2004-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -40,7 +40,6 @@
SOURCEPATH ../source/pkcs12kdf
SOURCE pkcs12kdf.cpp
-USERINCLUDE ../inc
USERINCLUDE ../source/symmetric
OS_LAYER_SYSTEMINCLUDE
--- a/crypto/weakcryptospi/group/random.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/random.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -33,8 +33,6 @@
SOURCEPATH ../source/random
SOURCE random.cpp threadrandom.cpp randomshim.cpp
-USERINCLUDE ../inc
-USERINCLUDE ../inc/spi
USERINCLUDE ../../../cryptomgmtlibs/securityutils/inc
USERINCLUDE ../../../cryptoplugins/cryptospiplugins/source/softwarecrypto
OS_LAYER_SYSTEMINCLUDE
--- a/crypto/weakcryptospi/group/tasymmetric.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/tasymmetric.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -38,7 +38,6 @@
SOURCE trsaparams.cpp tasymmetricmisc.cpp
USERINCLUDE .
-USERINCLUDE ../inc
USERINCLUDE ../../../cryptomgmtlibs/securitytestfw/test/testhandler2
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
--- a/crypto/weakcryptospi/group/tcryptospi.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/tcryptospi.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -112,7 +112,6 @@
USERINCLUDE ..
USERINCLUDE ../test/tcryptospi/src
-USERINCLUDE ../inc/spi
USERINCLUDE ../../../cryptomgmtlibs/securityutils/inc
--- a/crypto/weakcryptospi/group/thash.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/thash.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -28,7 +28,6 @@
SOURCE ../test/thash/thash.cpp
SOURCE ../test/thash/hashtestutils.cpp
-USERINCLUDE ../inc
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
LIBRARY euser.lib efsrv.lib hash.lib charconv.lib
--- a/crypto/weakcryptospi/group/tpaddingServer.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/tpaddingServer.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -31,8 +31,6 @@
SOURCE tpaddingPKCS1.cpp
SOURCE tpaddingPKCS7.cpp
-USERINCLUDE ../inc
-
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
LIBRARY testexecuteutils.lib
--- a/crypto/weakcryptospi/group/tpbe.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/tpbe.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -30,7 +30,6 @@
SOURCE tactionelement.cpp tpbemain.cpp tactionset.cpp tactionsetwritepfs.cpp tactionsetreadpfs.cpp
SOURCE texternpbeparams.cpp
-USERINCLUDE ../inc
USERINCLUDE ../../../cryptomgmtlibs/securitytestfw/test/testhandler2
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
--- a/crypto/weakcryptospi/group/tpkcs5kdf.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/tpkcs5kdf.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -29,7 +29,6 @@
SOURCEPATH ../test/tpkcs5kdf
SOURCE tactionderivekey.cpp tpkcs5kdfmain.cpp
-USERINCLUDE ../inc
USERINCLUDE ../../../cryptomgmtlibs/securitytestfw/test/testhandler2
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
--- a/crypto/weakcryptospi/group/trandom.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/trandom.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
SOURCEPATH ../test/trandom
SOURCE t_random.cpp
-USERINCLUDE ../inc ../source/random
+USERINCLUDE ../source/random
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
LIBRARY euser.lib
LIBRARY efsrv.lib random.lib
--- a/crypto/weakcryptospi/group/tsymmetric.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/group/tsymmetric.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -36,7 +36,6 @@
SOURCE tactionincrementallegacy.cpp
USERINCLUDE .
-USERINCLUDE ../inc
USERINCLUDE ../source/symmetric
USERINCLUDE ../../../cryptomgmtlibs/securitytestfw/test/testhandler2
--- a/crypto/weakcryptospi/inc/random.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/inc/random.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2005-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -140,11 +140,9 @@
*
* Implements the contract as specified in the base class, CRandom, filling the buffer
* supplied with random data up to its current length, discarding its current content.
- * It will leave with KErrNotSecure when the generated random data is not secure enough.
+ * It will leave under no memory condition.
*
- * @param aDest The buffer to which to write random data
- * @leave KErrNotSecure The generated random data is not secure enough for cryptographic operations
- * otherwise, leaves with any other system wide error codes.
+ * @param aDest The buffer to be filled with random data
*
*/
virtual void GenerateBytesL(TDes8& aDest);
--- a/crypto/weakcryptospi/inc/spi/keypair.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/inc/spi/keypair.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#ifndef __CRYPTOAPI_KEYPAIR_H__
#define __CRYPTOAPI_KEYPAIR_H__
-#include "keys.h"
+#include <cryptospi/keys.h>
namespace CryptoSpi
{
--- a/crypto/weakcryptospi/inc/spi/signerplugin.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/inc/spi/signerplugin.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#define __CRYPTOAPI_SIGNER_H__
#include <cryptospi/cryptoplugin.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
namespace CryptoSpi
{
--- a/crypto/weakcryptospi/inc/spi/verifierplugin.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/inc/spi/verifierplugin.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#ifndef __CRYPTOAPI_VERIFIER_H__
#define __CRYPTOAPI_VERIFIER_H__
-#include "signerplugin.h"
+#include <cryptospi/signerplugin.h>
namespace CryptoSpi
{
--- a/crypto/weakcryptospi/source/asymmetric/dh.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/asymmetric/dh.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2003-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,9 +18,9 @@
#include <asymmetric.h>
#include <asymmetrickeys.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "keyconverter.h"
-#include "cryptokeyagreementapi.h"
+#include <cryptospi/cryptokeyagreementapi.h>
#include <cryptospi/cryptospidef.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/asymmetric/dhkeypairshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/asymmetric/dhkeypairshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,8 +18,8 @@
#include "dhkeypairshim.h"
#include <bigint.h>
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include <cryptospi/cryptoparams.h>
#include <cryptospi/cryptospidef.h>
--- a/crypto/weakcryptospi/source/asymmetric/dsakeypairshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/asymmetric/dsakeypairshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,8 +17,8 @@
#include "dsakeypairshim.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include <cryptospi/cryptoparams.h>
#include <cryptospi/cryptospidef.h>
--- a/crypto/weakcryptospi/source/asymmetric/dsashim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/asymmetric/dsashim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,9 +17,9 @@
#include "dsashim.h"
-#include "cryptosignatureapi.h"
+#include <cryptospi/cryptosignatureapi.h>
#include <cryptospi/cryptospidef.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "keyconverter.h"
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/asymmetric/rsakeypairshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/asymmetric/rsakeypairshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,8 +17,8 @@
#include "rsakeypairshim.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include <cryptospi/cryptoparams.h>
#include <cryptospi/cryptospidef.h>
--- a/crypto/weakcryptospi/source/asymmetric/rsashim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/asymmetric/rsashim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,11 +17,11 @@
#include "rsashim.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptosignatureapi.h>
#include <cryptospi/cryptospidef.h>
#include "keyconverter.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/common/keyconverter.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/common/keyconverter.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -19,8 +19,8 @@
#include "keyconverter.h"
#include <cryptospi/cryptoparams.h>
#include <cryptospi/cryptospidef.h>
-#include "keys.h"
-#include "keypair.h"
+#include <cryptospi/keys.h>
+#include <cryptospi/keypair.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/hash/hashshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/hash/hashshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -25,7 +25,7 @@
#include "hashshim.h"
#include <cryptospi/cryptospidef.h>
#include <cryptospi/plugincharacteristics.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/hash/hashshim.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/hash/hashshim.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -29,7 +29,7 @@
#include <e32def.h>
#include <hash.h>
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#ifdef SYMBIAN_SDP_IPSEC_VOIP_SUPPORT
#include <cryptospi/cryptomacapi.h>
--- a/crypto/weakcryptospi/source/random/random.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/random/random.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2005-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -56,8 +56,13 @@
void CSystemRandom::GenerateBytesL(TDes8& aDest)
{
- iShim->GenerateBytesL(aDest);
- }
+ TRAPD(error, iShim->GenerateBytesL(aDest));
+ // This method must leave on low memory conditions.
+ if(error == KErrNoMemory)
+ {
+ User::Leave(error);
+ }
+ }
CSystemRandom::CSystemRandom(void)
{
--- a/crypto/weakcryptospi/source/random/randomshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/random/randomshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include <cryptospi/cryptospidef.h>
#include <cryptospi/cryptorandomapi.h>
#include <cryptospi/plugincharacteristics.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <e32debug.h>
#include "securityerr.h"
--- a/crypto/weakcryptospi/source/spi/cryptoasymmetriccipherapi.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/cryptoasymmetriccipherapi.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,8 +22,8 @@
@file
*/
-#include "cryptoasymmetriccipherapi.h"
-#include "asymmetriccipherplugin.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/asymmetriccipherplugin.h>
#include "legacyselector.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/spi/cryptokeyagreementapi.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/cryptokeyagreementapi.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,8 +22,8 @@
@file
*/
-#include "cryptokeyagreementapi.h"
-#include "keyagreementplugin.h"
+#include <cryptospi/cryptokeyagreementapi.h>
+#include <cryptospi/keyagreementplugin.h>
#include "legacyselector.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/spi/cryptokeypairgeneratorapi.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/cryptokeypairgeneratorapi.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,9 +22,9 @@
@file
*/
-#include "cryptokeypairgeneratorapi.h"
-#include "keypairgeneratorplugin.h"
-#include "keypair.h"
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypairgeneratorplugin.h>
+#include <cryptospi/keypair.h>
#include "legacyselector.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/spi/cryptosignatureapi.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/cryptosignatureapi.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,9 +22,9 @@
@file
*/
-#include "cryptosignatureapi.h"
-#include "signerplugin.h"
-#include "verifierplugin.h"
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/signerplugin.h>
+#include <cryptospi/verifierplugin.h>
#include "legacyselector.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/spi/cryptosymmetriccipherapi.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/cryptosymmetriccipherapi.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,9 +22,9 @@
@file
*/
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include "legacyselector.h"
-#include "symmetriccipherplugin.h"
+#include <cryptospi/symmetriccipherplugin.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/spi/keypair.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/keypair.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,9 +22,9 @@
@file
*/
-#include "keypair.h"
+#include <cryptospi/keypair.h>
#include <cryptospi/cryptoparams.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/spi/keys.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/keys.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,7 +22,7 @@
@file
*/
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/cryptoparams.h>
#include <cryptospi/cryptospidef.h>
#include <cryptopanic.h>
--- a/crypto/weakcryptospi/source/spi/legacyselector.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/legacyselector.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,19 +27,19 @@
#include "cryptospiproperty.h"
#include <cryptospi/hashplugin.h>
#include <cryptospi/randomplugin.h>
-#include "symmetriccipherplugin.h"
-#include "asymmetriccipherplugin.h"
-#include "signerplugin.h"
-#include "verifierplugin.h"
-#include "keyagreementplugin.h"
-#include "keypairgeneratorplugin.h"
+#include <cryptospi/symmetriccipherplugin.h>
+#include <cryptospi/asymmetriccipherplugin.h>
+#include <cryptospi/signerplugin.h>
+#include <cryptospi/verifierplugin.h>
+#include <cryptospi/keyagreementplugin.h>
+#include <cryptospi/keypairgeneratorplugin.h>
#include <cryptospi/cryptohashapi.h>
#include <cryptospi/cryptorandomapi.h>
-#include "cryptosymmetriccipherapi.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeyagreementapi.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
#include <cryptospi/pluginentrydef.h>
#include "cryptospiutil.h"
--- a/crypto/weakcryptospi/source/spi/ruleselector.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/spi/ruleselector.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,20 +27,20 @@
#include "cryptospiutil.h"
#include <cryptospi/cryptohashapi.h>
#include <cryptospi/cryptorandomapi.h>
-#include "cryptosymmetriccipherapi.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeyagreementapi.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
#include <cryptospi/pluginentrydef.h>
#include <cryptospi/hashplugin.h>
#include <cryptospi/randomplugin.h>
-#include "symmetriccipherplugin.h"
-#include "asymmetriccipherplugin.h"
-#include "signerplugin.h"
-#include "verifierplugin.h"
-#include "keyagreementplugin.h"
-#include "keypairgeneratorplugin.h"
+#include <cryptospi/symmetriccipherplugin.h>
+#include <cryptospi/asymmetriccipherplugin.h>
+#include <cryptospi/signerplugin.h>
+#include <cryptospi/verifierplugin.h>
+#include <cryptospi/keyagreementplugin.h>
+#include <cryptospi/keypairgeneratorplugin.h>
#include <cryptospi/cryptospidef.h>
#include "cryptospiproperty.h"
#include "rulecharacteristics.h"
--- a/crypto/weakcryptospi/source/symmetric/3desshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/3desshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,10 +18,10 @@
#include "3desshim.h"
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/cryptospidef.h>
#include <cryptospi/plugincharacteristics.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptostrength.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/symmetric/arc4shim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/arc4shim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -19,12 +19,12 @@
#include "arc4shim.h"
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/cryptospidef.h>
#include <cryptospi/plugincharacteristics.h>
#include <cryptostrength.h>
#include "../common/inlines.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/source/symmetric/bufferedtransformation.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/bufferedtransformation.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2002-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -21,7 +21,7 @@
#include <cryptospi/cryptospidef.h>
#include <cryptopanic.h>
#include <e32cmn.h>
-#include "symmetriccipherplugin.h"
+#include <cryptospi/symmetriccipherplugin.h>
#include "blocktransformation.h"
#include "bufferedtransformationshim.h"
--- a/crypto/weakcryptospi/source/symmetric/bufferedtransformationshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/bufferedtransformationshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -21,7 +21,7 @@
#include <cryptospi/cryptospidef.h>
#include <padding.h>
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/plugincharacteristics.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/symmetric/cbcmodeshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/cbcmodeshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -21,7 +21,7 @@
#include <cryptopanic.h>
#include <cryptospi/cryptospidef.h>
#include <padding.h>
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/plugincharacteristics.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/symmetric/desshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/desshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,10 +18,10 @@
#include "desshim.h"
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/cryptospidef.h>
#include <cryptospi/plugincharacteristics.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptostrength.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/symmetric/rc2shim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/rc2shim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -19,10 +19,10 @@
#include "rc2shim.h"
#include <cryptospi/cryptoparams.h>
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/cryptospidef.h>
#include <cryptospi/plugincharacteristics.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptostrength.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/source/symmetric/rijndaelshim.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/source/symmetric/rijndaelshim.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,10 +18,10 @@
#include "rijndaelshim.h"
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include <cryptospi/cryptospidef.h>
#include <cryptospi/plugincharacteristics.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptostrength.h>
#include "../common/inlines.h"
--- a/crypto/weakcryptospi/test/tasymmetric/script_gen/keys.c Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tasymmetric/script_gen/keys.c Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2005-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
@file
*/
-#include "keys.h"
+#include <cryptospi/keys.h>
RSA* key1; /* modulus is 64 bytes */
RSA* key2; /* modulus is 50 bytes */
--- a/crypto/weakcryptospi/test/tasymmetric/script_gen/rsa_test.c Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tasymmetric/script_gen/rsa_test.c Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2005-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -32,7 +32,7 @@
#include <openssl/rsa.h>
#include "utils.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
void printPublicKey(RSA* key)
{
--- a/crypto/weakcryptospi/test/tcryptospi/src/KeyExchangeSyncStep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/KeyExchangeSyncStep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "keyexchangesyncstep.h"
-#include "keypair.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "cryptokeyagreementapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
#include <bigint.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherencryptdecryptstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherencryptdecryptstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "asymmetriccipherencryptdecryptstep.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include "filereader.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherencrypteddatacheckstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherencrypteddatacheckstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "asymmetriccipherencrypteddatacheckstep.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include "filereader.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherpositiveobjectloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/asymmetriccipherpositiveobjectloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "asymmetriccipherpositiveobjectloadstep.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include "filereader.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/dummyecccipherloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/dummyecccipherloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "dummyecccipherloadstep.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
#include "filereader.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/dummyeccsignerloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/dummyeccsignerloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "dummyeccsignerloadstep.h"
-#include "keypair.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacbasichashofdatastep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacbasichashofdatastep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacbasichashofdatastep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacincrementalhmacstep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacwithcopystep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacwithcopystep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacincrementalhmacwithcopystep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacwithreplicatestep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacwithreplicatestep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacincrementalhmacwithreplicatestep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacwithresetstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacincrementalhmacwithresetstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacincrementalhmacwithresetstep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacpositiveobjectloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacpositiveobjectloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacpositiveobjectloadstep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacsetkeycheckingstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacsetkeycheckingstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacsetkeycheckingstep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/hmacsetoperationmodecheckingstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/hmacsetoperationmodecheckingstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "hmacsetoperationmodecheckingstep.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/keypairgeneratorpositiveobjectloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/keypairgeneratorpositiveobjectloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,8 +24,8 @@
#include "keypairgeneratorpositiveobjectloadstep.h"
-#include "keypair.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/mac_basic_data_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/mac_basic_data_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "mac_basic_data_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_reset_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_reset_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "mac_incremental_reset_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
*/
#include "mac_incremental_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_with_copy_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_with_copy_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
*/
#include "mac_incremental_with_copy_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_with_replicate_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/mac_incremental_with_replicate_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
*/
#include "mac_incremental_with_replicate_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/mac_positive_object_load_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/mac_positive_object_load_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "mac_positive_object_load_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugin_chars_new_hash_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugin_chars_new_hash_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "plugin_chars_new_hash_step.h"
#include "plugincharschecker.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymkeypairstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymkeypairstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,8 +24,8 @@
#include "plugincharsasymkeypairstep.h"
#include "plugincharschecker.h"
-#include "keypair.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymmetriccipherstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymmetriccipherstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,9 +24,9 @@
#include "plugincharsasymmetriccipherstep.h"
#include "plugincharschecker.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymsignstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharsasymsignstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,9 +24,9 @@
#include "plugincharsasymsignstep.h"
#include "plugincharschecker.h"
-#include "keypair.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "cryptosignatureapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/cryptosignatureapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharscommonstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharscommonstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,8 +24,8 @@
#include "plugincharscommonstep.h"
#include "plugincharschecker.h"
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharsextendedstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharsextendedstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,8 +24,8 @@
#include "plugincharsextendedstep.h"
#include "plugincharschecker.h"
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharshashstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharshashstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -25,7 +25,7 @@
#include "plugincharschecker.h"
#include <cryptospi/cryptohashapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharskeyagreestep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharskeyagreestep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,9 +24,9 @@
#include "plugincharskeyagreestep.h"
#include "plugincharschecker.h"
-#include "keypair.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "cryptokeyagreementapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharsmacstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharsmacstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -25,7 +25,7 @@
#include "plugincharschecker.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/plugincharssymmetriccipherstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/plugincharssymmetriccipherstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,8 +24,8 @@
#include "plugincharssymmetriccipherstep.h"
#include "plugincharschecker.h"
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/pluginloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/pluginloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,17 +24,17 @@
#include "pluginloadstep.h"
#include "plugincharschecker.h"
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
#include <cryptospi/cryptospistateapi.h>
#include <cryptospi/cryptohashapi.h>
#include <cryptospi/cryptorandomapi.h>
-#include "cryptosymmetriccipherapi.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "cryptokeyagreementapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
#include <cryptospi/ruleselector.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/ruleselectcommonstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/ruleselectcommonstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,15 +22,15 @@
*/
#include "ruleselectcommonstep.h"
#include "plugincharschecker.h"
-#include "cryptosymmetriccipherapi.h"
-#include "cryptoasymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/cryptoasymmetriccipherapi.h>
#include <cryptospi/cryptohashapi.h>
#include <cryptospi/cryptorandomapi.h>
-#include "cryptosignatureapi.h"
-#include "cryptokeyagreementapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "keypair.h"
-#include "keys.h"
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypair.h>
+#include <cryptospi/keys.h>
#ifdef SYMBIAN_SDP_IPSEC_VOIP_SUPPORT
#include <cryptospi/cryptomacapi.h>
--- a/crypto/weakcryptospi/test/tcryptospi/src/signerpositiveobjectloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/signerpositiveobjectloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "signerpositiveobjectloadstep.h"
-#include "keypair.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/signerverifierstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/signerverifierstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,9 +23,9 @@
*/
#include "signerverifierstep.h"
-#include "keypair.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_re_init_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_re_init_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "symmetric_mac_incremental_re_init_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_reset_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_reset_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -24,7 +24,7 @@
#include "symmetric_mac_incremental_reset_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
*/
#include "symmetric_mac_incremental_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_with_copy_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_with_copy_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
*/
#include "symmetric_mac_incremental_with_copy_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_with_replicate_step.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetric_mac_incremental_with_replicate_step.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,7 +23,7 @@
*/
#include "symmetric_mac_incremental_with_replicate_step.h"
#include <cryptospi/cryptomacapi.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetriccipherpositiveobjectloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetriccipherpositiveobjectloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,8 +23,8 @@
*/
#include "symmetriccipherpositiveobjectloadstep.h"
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
#include "filereader.h"
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/symmetriccipherstepbase.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/symmetriccipherstepbase.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -25,8 +25,8 @@
#ifndef SYMMETRICCIPHERSTEPBASE_H
#define SYMMETRICCIPHERSTEPBASE_H
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
#include "te_cryptospistepbase.h"
#include "filereader.h"
--- a/crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiconversion.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiconversion.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -25,11 +25,11 @@
#include "te_cryptospidefs.h"
#include <cryptospi/cryptohashapi.h>
#include <cryptospi/cryptorandomapi.h>
-#include "cryptosymmetriccipherapi.h"
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeypairgeneratorapi.h"
-#include "cryptokeyagreementapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/cryptoasymmetriccipherapi.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/cryptokeyagreementapi.h>
#include <cryptospi/ruleselector.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tcryptospi/src/verifierpositiveobjectloadstep.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tcryptospi/src/verifierpositiveobjectloadstep.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,10 +23,10 @@
*/
#include "verifierpositiveobjectloadstep.h"
-#include "keys.h"
-#include "keypair.h"
-#include "cryptosignatureapi.h"
-#include "cryptokeypairgeneratorapi.h"
+#include <cryptospi/keys.h>
+#include <cryptospi/keypair.h>
+#include <cryptospi/cryptosignatureapi.h>
+#include <cryptospi/cryptokeypairgeneratorapi.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tplugins/inc/3desimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/3desimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "desimpl.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/arc4impl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/arc4impl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -28,7 +28,7 @@
#include "symmetriccipherimpl.h"
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/asymmetriccipherimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/asymmetriccipherimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -28,8 +28,8 @@
#include <e32base.h>
#include <cryptospi/cryptospidef.h>
#include <padding.h>
-#include "asymmetriccipherplugin.h"
-#include "keys.h"
+#include <cryptospi/asymmetriccipherplugin.h>
+#include <cryptospi/keys.h>
#include "../../../source/common/inlines.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/cmacimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/cmacimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,8 +26,8 @@
#ifndef __CRYPTOAPI_SOFTWARECIPHERMACIMPL_H__
#define __CRYPTOAPI_SOFTWARECIPHERMACIMPL_H__
-#include "cryptosymmetriccipherapi.h"
-#include "keys.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
+#include <cryptospi/keys.h>
namespace SoftwareCrypto
--- a/crypto/weakcryptospi/test/tplugins/inc/desimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/desimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "symmetriccipherimpl.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/hmacimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/hmacimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#define __CRYPTOAPI_SOFTWAREHMACIMPL_H__
#include "softwarehashbase.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
namespace SoftwareCrypto
{
--- a/crypto/weakcryptospi/test/tplugins/inc/keyagreementimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/keyagreementimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,8 +27,8 @@
#include <e32base.h>
#include <cryptospi/cryptospidef.h>
-#include "keys.h"
-#include "keyagreementplugin.h"
+#include <cryptospi/keys.h>
+#include <cryptospi/keyagreementplugin.h>
/**
* Abstract base class for key agreement plug-ins.
--- a/crypto/weakcryptospi/test/tplugins/inc/keypairgenimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/keypairgenimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -25,8 +25,8 @@
@released
*/
-#include "cryptokeypairgeneratorapi.h"
-#include "keypairgeneratorplugin.h"
+#include <cryptospi/cryptokeypairgeneratorapi.h>
+#include <cryptospi/keypairgeneratorplugin.h>
/**
* Key pair generator plugin base class
--- a/crypto/weakcryptospi/test/tplugins/inc/macimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/macimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,9 +27,9 @@
#define __CRYPTOAPI_SOFTWAREMACIMPL_H__
#include <cryptospi/macplugin.h>
-#include "cryptosymmetriccipherapi.h"
+#include <cryptospi/cryptosymmetriccipherapi.h>
#include "softwarehashbase.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "cmacimpl.h"
#include "hmacimpl.h"
--- a/crypto/weakcryptospi/test/tplugins/inc/pluginentry.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/pluginentry.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -28,15 +28,15 @@
#include <cryptospi/cryptoparams.h>
#include <e32cmn.h>
#include <cryptospi/cryptospidef.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/hashplugin.h>
#include <cryptospi/randomplugin.h>
-#include "symmetriccipherplugin.h"
-#include "asymmetriccipherplugin.h"
-#include "signerplugin.h"
-#include "verifierplugin.h"
-#include "keypairgeneratorplugin.h"
-#include "keyagreementplugin.h"
+#include <cryptospi/symmetriccipherplugin.h>
+#include <cryptospi/asymmetriccipherplugin.h>
+#include <cryptospi/signerplugin.h>
+#include <cryptospi/verifierplugin.h>
+#include <cryptospi/keypairgeneratorplugin.h>
+#include <cryptospi/keyagreementplugin.h>
#ifdef SYMBIAN_SDP_IPSEC_VOIP_SUPPORT
#include <cryptospi/macplugin.h>
--- a/crypto/weakcryptospi/test/tplugins/inc/rc2impl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/rc2impl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "symmetriccipherimpl.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/rijndaelimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/rijndaelimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "symmetriccipherimpl.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/rsafunction.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/rsafunction.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2003-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#define __RSAFUNCTION_H__
#include <e32base.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tplugins/inc/rsaimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/rsaimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "asymmetriccipherimpl.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/signerimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/signerimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -28,7 +28,7 @@
#include <e32base.h>
#include <e32cmn.h>
#include <cryptospi/cryptospidef.h>
-#include "signerplugin.h"
+#include <cryptospi/signerplugin.h>
#include <padding.h>
#include "../../../source/common/inlines.h"
--- a/crypto/weakcryptospi/test/tplugins/inc/softwarehashbase.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/softwarehashbase.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#define __CRYPTOAPI_SOFTWAREHASHBASE_H__
#include <cryptospi/hashplugin.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
namespace SoftwareCrypto
{
--- a/crypto/weakcryptospi/test/tplugins/inc/symmetriccipherimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/symmetriccipherimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -29,7 +29,7 @@
#include <e32cmn.h>
#include <cryptospi/cryptospidef.h>
#include <padding.h>
-#include "symmetriccipherplugin.h"
+#include <cryptospi/symmetriccipherplugin.h>
/** The maximum block size supported (in bytes) */
const TUint KMaxBlockSizeSupported = 32;
--- a/crypto/weakcryptospi/test/tplugins/inc/tplugin02/desextendimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/tplugin02/desextendimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include <e32base.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "symmetriccipherimpl.h"
/**
--- a/crypto/weakcryptospi/test/tplugins/inc/verifierimpl.h Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/inc/verifierimpl.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -29,7 +29,7 @@
#include <e32cmn.h>
#include <cryptospi/cryptospidef.h>
#include <padding.h>
-#include "verifierplugin.h"
+#include <cryptospi/verifierplugin.h>
#include "../../../source/common/inlines.h"
--- a/crypto/weakcryptospi/test/tplugins/src/asymmetriccipherimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/asymmetriccipherimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,7 +17,7 @@
#include <e32def.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "asymmetriccipherimpl.h"
#include <cryptostrength.h>
#include <cryptospi/cryptospidef.h>
--- a/crypto/weakcryptospi/test/tplugins/src/dhkeypairgenimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/dhkeypairgenimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,7 +18,7 @@
#include "dhkeypairgenimpl.h"
#include "pluginconfig.h"
-#include "keypair.h"
+#include <cryptospi/keypair.h>
using namespace SoftwareCrypto;
using namespace CryptoSpi;
--- a/crypto/weakcryptospi/test/tplugins/src/hmacimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/hmacimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -27,7 +27,7 @@
#include "md2impl.h"
#include "md5impl.h"
#include "sha1impl.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
using namespace SoftwareCrypto;
--- a/crypto/weakcryptospi/test/tplugins/src/keypairgenimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/keypairgenimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,7 +18,7 @@
#include <e32def.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "keypairgenimpl.h"
--- a/crypto/weakcryptospi/test/tplugins/src/rijndaelimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/rijndaelimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,7 +17,7 @@
#include "rijndaelimpl.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "rijndaeltables.h"
#include "../../../source/common/inlines.h"
--- a/crypto/weakcryptospi/test/tplugins/src/rsafunction.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/rsafunction.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2003-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -17,7 +17,7 @@
#include <bigint.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <asymmetrickeys.h>
#include <cryptospi/cryptospidef.h>
#include <cryptospi/cryptoparams.h>
--- a/crypto/weakcryptospi/test/tplugins/src/rsakeypairgenimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/rsakeypairgenimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include "pluginconfig.h"
#include <ct.h>
-#include "keypair.h"
+#include <cryptospi/keypair.h>
#include <cryptospi/cryptospidef.h>
#include "../../../source/common/inlines.h" // For TClassSwap
--- a/crypto/weakcryptospi/test/tplugins/src/signerimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/signerimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,7 +18,7 @@
#include <e32def.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/cryptospidef.h>
#include "signerimpl.h"
--- a/crypto/weakcryptospi/test/tplugins/src/symmetriccipherimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/symmetriccipherimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -21,7 +21,7 @@
#include <e32def.h>
#include <cryptostrength.h>
#include <cryptospi/cryptospidef.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include <cryptospi/plugincharacteristics.h>
#include "pluginconfig.h"
#include <cryptopanic.h>
--- a/crypto/weakcryptospi/test/tplugins/src/tplugin01/pluginentry.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/tplugin01/pluginentry.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include "pluginconfig.h"
#include "md2impl.h"
#include "hmacimpl.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "desimpl.h"
#include "rsakeypairgenextendimpl.h"
#include "rsaverifyimpl.h"
--- a/crypto/weakcryptospi/test/tplugins/src/tplugin01/rsakeypairgenextendimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/tplugin01/rsakeypairgenextendimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include "pluginconfig.h"
#include <ct.h>
-#include "keypair.h"
+#include <cryptospi/keypair.h>
#include <cryptospi/cryptospidef.h>
#include "../../../source/common/inlines.h" // For TClassSwap
--- a/crypto/weakcryptospi/test/tplugins/src/tplugin01/softwarehashbase.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/tplugin01/softwarehashbase.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include <cryptospi/hashplugin.h>
#include "pluginconfig.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "md2impl.h"
#include "md5impl.h"
#include "sha1impl.h"
--- a/crypto/weakcryptospi/test/tplugins/src/tplugin02/pluginentry.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/tplugin02/pluginentry.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,11 +23,11 @@
*/
#include "pluginentry.h"
-#include "keypair.h"
+#include <cryptospi/keypair.h>
#include "pluginconfig.h"
#include "md5impl.h"
#include "hmacimpl.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "desimpl.h"
#include "desextendimpl.h"
#include "rsaimpl.h"
--- a/crypto/weakcryptospi/test/tplugins/src/tplugin02/softwarehashbase.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/tplugin02/softwarehashbase.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -26,7 +26,7 @@
#include <cryptospi/hashplugin.h>
#include "pluginconfig.h"
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "md5impl.h"
#include "hmacimpl.h"
--- a/crypto/weakcryptospi/test/tplugins/src/verifierimpl.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/crypto/weakcryptospi/test/tplugins/src/verifierimpl.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -18,7 +18,7 @@
#include <e32def.h>
#include <e32cmn.h>
-#include "keys.h"
+#include <cryptospi/keys.h>
#include "verifierimpl.h"
--- a/cryptomgmtlibs/securitytestfw/group/bld.inf Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptomgmtlibs/securitytestfw/group/bld.inf Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2002-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -23,6 +23,9 @@
// Generic technology part of test framework security subsystem
#include "../test/testutil/group/bld.inf"
+// test certificate of security subsystem
+#include "../testcertificates/group/bld.inf"
+
PRJ_PLATFORMS
DEFAULT
@@ -97,6 +100,7 @@
#endif
#ifdef SYMBIAN_CRYPTOSPI
../test/autotesting/runcrypto_9.5.bat /epoc32/winscw/c/autohardware/runcrypto_9.5.bat
+ ../test/autotesting/runhardwarecrypto.bat /epoc32/winscw/c/autohardware/runhardwarecrypto.bat
#else
../test/autotesting/runcrypto_9.4.bat /epoc32/winscw/c/autohardware/runcrypto_9.4.bat
#endif
--- a/cryptomgmtlibs/securitytestfw/group/security_testframework.mrp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptomgmtlibs/securitytestfw/group/security_testframework.mrp Fri Apr 02 10:15:22 2010 +0100
@@ -1,9 +1,6 @@
component security_testframework
-source \sf\os\security\cryptomgmtlibs\securitytestfw\bwins
-source \sf\os\security\cryptomgmtlibs\securitytestfw\eabi
-source \sf\os\security\cryptomgmtlibs\securitytestfw\group
-source \sf\os\security\cryptomgmtlibs\securitytestfw\inc
-source \sf\os\security\cryptomgmtlibs\securitytestfw\test
+source \sf\os\security\cryptomgmtlibs\securitytestfw\
+
notes_source \component_defs\release.src
--- a/cryptomgmtlibs/securitytestfw/group/t_testhandler2.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptomgmtlibs/securitytestfw/group/t_testhandler2.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -35,7 +35,7 @@
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
#ifdef SYMBIAN_AUTH_SERVER
-SYSTEMINCLUDE /epoc32/include/authserver
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(authserver)
#endif
SOURCEPATH ../test/testhandler2
--- a/cryptomgmtlibs/securitytestfw/inc/SecurityTests_sdp_9.5.iby Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptomgmtlibs/securitytestfw/inc/SecurityTests_sdp_9.5.iby Fri Apr 02 10:15:22 2010 +0100
@@ -57,6 +57,7 @@
#include "tpkcs7server.iby"
#include "tpkcs12integrationserver.iby"
#include "ctframeworktests.iby"
+ #include "cryptotests.iby"
#else
#include "streamingcaf.iby"
// iby files for caf
@@ -133,7 +134,11 @@
#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
data = ZDRIVE\autohardware\runcrypto_wmdrm.bat \runcrypto.bat
#else
- data = ZDRIVE\autohardware\runcrypto_9.5.bat \runcrypto.bat
+ #ifdef __SECURITY_MANDATORY_SWICERTSTORE__
+ data = ZDRIVE\autohardware\runhardwarecrypto.bat \runcrypto.bat
+ #else
+ data = ZDRIVE\autohardware\runcrypto_9.5.bat \runcrypto.bat
+ #endif
#endif
#else
data = ZDRIVE\autohardware\runcrypto_9.4.bat \runcrypto.bat
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto_9.5.bat Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto_9.5.bat Fri Apr 02 10:15:22 2010 +0100
@@ -13,9 +13,6 @@
@rem
@rem Description:
@rem
-temb
-move c:\temblog.txt c:\testresults\
-move c:\testresults\temblog.txt e:\testresults\temblog.txt
REM hash
copy /s z:\thash\ c:\thash\
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runhardwarecrypto.bat Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,21 @@
+@rem
+@rem Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description:
+@rem
+
+// Test the hardware crypto reference test plug-in
+
+temb
+move c:\temblog.txt c:\testresults\
+move c:\testresults\temblog.txt e:\testresults\temblog.txt
\ No newline at end of file
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_sdp_newrom.bat Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_sdp_newrom.bat Fri Apr 02 10:15:22 2010 +0100
@@ -35,6 +35,8 @@
sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
+runcrypto.bat
+
runupstests.bat
runpkcs12tests.bat
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tcertstore/tdata/selfsignedcertificate.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tcertstore/tdata/subjectkeycert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tcertstore/testdata.zip has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tcertstore/unifiedcertstore2/url1k1.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+www.symbian.co.uk
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tcertstore/unifiedcertstore2/url2k2.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+www.symbian.co.uk
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tcertstore/unifiedcertstore2/url3k5.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+www.symbian.co.uk
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/goodaia-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----
+MIICITCCAYqgAwIBAgIBADANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ0MloXDTE0MDMwMTE2MzQ0MlowMzEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxEjAQBgNVBAMTCVJvb3Q1LVJTQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAw
+gYkCgYEAufV5zRvgR/ohzfb8AizbLePxK7QfBOuTtwy70/ifZCP5aZMri6DgObYM
+Jwh4lChQ+UnQgMX9sRP1kWZ6UEbrhm7oUz7keI6wu4m4myYmMjY3nc+7T/std+o/
+Vzt/bSyLNYpAqUW50g46SL1lof8fXKGkqFRH42czeMUwqnEffRsCAwEAAaNFMEMw
+DgYDVR0PAQH/BAQDAgIEMBIGA1UdEwEB/wQIMAYBAf8CAQUwHQYDVR0OBBYEFHzj
+BilRFiByFNQlr/0YW21eSK9vMA0GCSqGSIb3DQEBBAUAA4GBACEv1s039YBNfVn/
+dxZm+1XDLmrm6Of5p3SjBz94osLV+cNsddP5W+jmdtEL2u+x33foGFPOkDyFFnIW
+gkFVfAKKCH70K2liJWDS5D+mu32zU8Kc/JF0musvKZ/EbuddJS+x7t7kBl4fFgr1
+0/AO8YOgD1AV55Z9Bjf1lTTHZMcX
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,44 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Jan 13 17:27:15 2006 GMT
+ Not After : Jan 13 17:27:15 2007 GMT
+ Subject: C=UK, ST=London, O=Symbian Software Ltd, CN=End Entity
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (512 bit)
+ Modulus (512 bit):
+ 00:bd:26:d9:08:13:61:f2:22:3e:1b:58:c9:ae:56:
+ b1:32:9a:27:f0:64:41:06:09:08:12:e5:96:16:08:
+ 7a:18:02:4a:53:8a:e9:23:f2:b0:aa:c8:3f:e2:86:
+ ef:a6:bb:12:2d:51:1d:48:0e:e4:5e:8f:3b:f1:2c:
+ c7:e0:3f:3a:b7
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Extended Key Usage:
+ Code Signing
+ Signature Algorithm: md5WithRSAEncryption
+ 54:44:db:ff:5a:b1:9e:53:67:ae:b8:99:35:18:3e:3a:50:38:
+ 6b:95:fe:7d:e6:d8:84:29:96:53:fe:bf:8f:af:f2:38:06:16:
+ f9:c6:0c:8a:48:5c:1a:14:b3:69:60:88:08:96:90:04:cf:32:
+ 92:1d:63:7a:f4:4e:90:cc:27:8d:79:8f:e5:21:ee:e6:14:e5:
+ b2:34:cf:b7:7b:a3:fa:91:7a:4a:88:60:95:62:b5:35:12:4f:
+ 90:69:d6:b9:ed:63:8a:ac:52:d3:3a:38:21:4a:0f:09:3f:eb:
+ b8:8f:a5:8f:20:0a:78:39:ea:9b:7e:0c:ae:66:0f:77:9a:49:
+ cc:f0
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/ee_key.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/ee_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,9 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIIBOwIBAAJBAL0m2QgTYfIiPhtYya5WsTKaJ/BkQQYJCBLllhYIehgCSlOK6SPy
+sKrIP+KG76a7Ei1RHUgO5F6PO/Esx+A/OrcCAwEAAQJATt4p1EIwrsM0XjaxMS4Y
+iF7alFNZAWk2oppz8A/syKFDV4cS0xmqQwb8Ny9Xm33QOg4jUe7NSFJdm9jwZHHx
+IQIhAPQ4pLhaIVG2QZIArbbZuo6okPjiQFY+M48A4QeioBH/AiEAxkZFVRk4ND9n
+tulnUFhVczM5Plju/u4EC2N3KWWj50kCIQDZM19cDdzAPWXHog7dJntC0SxODXrG
+uP9F2bRJBBt0pQIgKvgxsGadypzvIjHlJQFvy16PilaFvRPiJoGw4nTXl5kCIQDS
+exvniT31LpyHW+9/Xqxa8hqvp4fYufrUf3JHx92n3Q==
+-----END RSA PRIVATE KEY-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/root5_ee.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/root5_ee.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,44 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Jan 13 17:27:15 2006 GMT
+ Not After : Jan 13 17:27:15 2007 GMT
+ Subject: C=UK, ST=London, O=Symbian Software Ltd, CN=End Entity
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (512 bit)
+ Modulus (512 bit):
+ 00:bd:26:d9:08:13:61:f2:22:3e:1b:58:c9:ae:56:
+ b1:32:9a:27:f0:64:41:06:09:08:12:e5:96:16:08:
+ 7a:18:02:4a:53:8a:e9:23:f2:b0:aa:c8:3f:e2:86:
+ ef:a6:bb:12:2d:51:1d:48:0e:e4:5e:8f:3b:f1:2c:
+ c7:e0:3f:3a:b7
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Extended Key Usage:
+ Code Signing
+ Signature Algorithm: md5WithRSAEncryption
+ 54:44:db:ff:5a:b1:9e:53:67:ae:b8:99:35:18:3e:3a:50:38:
+ 6b:95:fe:7d:e6:d8:84:29:96:53:fe:bf:8f:af:f2:38:06:16:
+ f9:c6:0c:8a:48:5c:1a:14:b3:69:60:88:08:96:90:04:cf:32:
+ 92:1d:63:7a:f4:4e:90:cc:27:8d:79:8f:e5:21:ee:e6:14:e5:
+ b2:34:cf:b7:7b:a3:fa:91:7a:4a:88:60:95:62:b5:35:12:4f:
+ 90:69:d6:b9:ed:63:8a:ac:52:d3:3a:38:21:4a:0f:09:3f:eb:
+ b8:8f:a5:8f:20:0a:78:39:ea:9b:7e:0c:ae:66:0f:77:9a:49:
+ cc:f0
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/root5crl.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca/root5crl.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,9 @@
+-----BEGIN X509 CRL-----
+MIIBHzCBiQIBATANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1iaWFuIFNv
+ZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBFw0wNjAxMTMxNzI3MTZaFw0w
+NjAyMTIxNzI3MTZaMCIwIAIBARcNMDYwMTEzMTcyNzE2WjAMMAoGA1UdFQQDCgEB
+MA0GCSqGSIb3DQEBBAUAA4GBAGh8Ky/qF72kXqzVtLIjoKSRZ1dXmwJ/qYjEcmzO
+YVEdQEJEWWrraxDcFv6BPSVrb63u04HSfyzogTcdoagms22DnED52ZuNAS4lpGSL
+rc04T8DK2OkTK3tIEc+IO+5E0SMnYw2A7eyl6W682Cg+BaLSHq7v/Qa8OtXFPC3Y
+bNE2
+-----END X509 CRL-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/root5ca_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/symbiantestrootcadsa.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/symbiantestrootcadsa.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,19 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tder/example/symbiantestrootcadsa_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/ocspsigningroot/certs/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,46 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: sha1WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=OCSPSigningRoot-RSA
+ Validity
+ Not Before: Mar 2 13:55:05 2004 GMT
+ Not After : Feb 28 13:55:05 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Signer-OCSPR
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:dc:14:d3:36:b2:2a:94:35:e4:04:3e:c3:e8:5b:
+ ee:93:85:c7:2d:ba:fb:6c:27:eb:01:3c:af:f3:c9:
+ e4:9d:1b:ad:0e:c1:3b:f8:7d:ed:f4:c9:e0:d3:15:
+ e8:d8:76:2f:a4:50:8a:a5:5f:2a:74:bb:38:b8:fd:
+ 49:ac:7f:60:2b:d8:0d:c9:93:5f:4f:18:20:5d:54:
+ 9e:16:b3:8d:80:6e:38:d9:d0:fb:34:9a:1d:a0:4d:
+ 03:6e:29:cb:02:f9:b6:79:17:7e:98:d3:c7:c8:29:
+ af:22:24:fa:06:7c:d6:f0:0c:e1:4d:c8:c9:79:91:
+ 4b:2d:2d:5a:63:36:0e:d4:0b
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: sha1WithRSAEncryption
+ 0e:d3:58:f1:bb:c9:7c:13:37:37:42:a0:11:56:f6:d3:92:c2:
+ a6:54:1c:d8:32:cf:01:f9:65:25:4b:ef:65:75:4e:f6:19:bd:
+ ec:32:4f:8f:92:5e:ff:75:cc:d8:74:c1:50:52:f2:d6:b3:a7:
+ cc:2b:41:3f:59:4a:ff:2d:34:d6:69:69:61:79:f5:4b:d1:d1:
+ 95:bd:10:fc:e4:94:8f:9d:ba:50:53:39:9a:bd:15:4b:6b:53:
+ 3a:ae:d4:14:4b:41:7c:8d:61:d0:77:ba:38:00:5b:18:5e:9f:
+ c7:4e:e0:a2:e5:1e:03:57:16:8f:5b:e3:d6:db:56:08:6f:06:
+ 1e:8f
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/ocspsigningroot/certs/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,13 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/ocspsigningroot/private/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/ocspsigningroot/private/signer-ocspr.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Feb 3 12:00:00 1982 GMT
+ Not After : Feb 3 12:00:01 1982 GMT
+ Subject: O=Symbian Software Ltd, CN=Expired-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:ad:0e:8d:c3:ca:ae:ab:e2:d1:29:81:45:75:01:
+ 48:d3:36:d3:9f:07:7c:ea:71:9f:47:ca:b5:0d:32:
+ 16:6c:dd:66:6c:20:fb:56:4e:9e:09:49:f9:81:44:
+ 5b:44:09:67:d1:e8:c0:be:99:36:b6:93:fa:de:4d:
+ ab:08:31:a9:b5:72:a2:08:bc:5c:c2:3b:d2:08:c6:
+ 01:60:4d:74:04:98:84:06:61:33:e8:eb:7f:e1:94:
+ 7b:5a:11:6e:a7:5d:c0:f5:e8:98:c7:3b:f4:f6:08:
+ 96:35:4e:77:a8:a5:49:25:60:e5:76:d3:1f:15:46:
+ 28:36:2b:aa:18:32:99:e2:c5
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 91:ab:ff:f1:8a:04:4d:87:01:9d:52:53:87:f5:06:be:b8:95:
+ 58:34:2f:54:18:5b:fb:e1:76:01:e0:ad:d1:08:11:ee:db:15:
+ 29:b3:1d:f5:0e:9b:ba:92:d5:7b:50:2b:40:04:b0:64:81:70:
+ c8:63:f3:ee:0d:9e:3e:c3:d1:ca:9f:93:1a:8b:c9:a5:0f:2a:
+ 40:4b:48:b6:27:ab:dd:64:9d:bd:3c:2f:f7:d8:46:5b:8f:b4:
+ 55:ea:62:0b:aa:ab:6a:b1:f3:02:7a:db:bc:08:64:58:fd:02:
+ 36:41:18:ec:1a:21:1f:a4:7e:82:cc:e3:99:8d:25:78:c2:6f:
+ c0:4f
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/02.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 2 (0x2)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 1 14:39:58 2004 GMT
+ Not After : Feb 27 14:39:58 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Good-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:f0:ff:55:8a:55:25:97:ad:7c:50:82:63:fe:fa:
+ 72:e4:ce:9c:ad:54:48:d8:bb:1c:9c:2b:83:19:e4:
+ fe:68:7c:80:a6:a0:94:bd:a6:3d:f4:18:8e:0f:11:
+ fe:c4:83:2f:24:4a:66:75:da:0b:d4:d4:bb:c6:25:
+ 5d:a1:ea:40:95:61:82:2e:92:09:11:58:cb:66:25:
+ 0a:d3:05:f6:ec:b9:8d:17:ea:ac:b9:60:0d:dc:56:
+ fb:dd:6b:7f:0b:e7:bc:10:62:81:fa:d8:fc:5b:fd:
+ 8d:83:4c:74:23:de:9a:b0:d8:2f:9d:00:d0:f2:b6:
+ 85:c1:d5:f4:ae:6e:bb:73:75
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ d3:f0:5f:9e:09:5a:c2:36:f4:02:a8:a3:22:ea:1a:e3:85:ab:
+ 74:d3:5d:56:93:49:e6:db:44:a2:ec:93:ae:52:8e:63:93:fc:
+ c5:94:4a:05:50:39:d5:67:6e:7c:83:7d:09:ca:4b:ba:91:ed:
+ 00:f4:36:3e:58:ee:07:ac:a8:09:63:a6:c7:09:36:f1:c3:24:
+ 8b:25:51:85:06:ff:07:f8:37:02:6e:5a:dc:43:94:bb:06:68:
+ 60:38:cb:68:17:2f:03:0d:ac:59:70:20:c8:ad:92:3b:37:1a:
+ 16:c1:12:89:69:b8:b8:66:d6:bc:27:2b:de:81:e4:03:bb:cb:
+ 74:fd
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/03.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 3 (0x3)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 1 14:40:00 2004 GMT
+ Not After : Feb 27 14:40:00 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Revoked-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:a5:c0:b6:0c:e8:e5:ba:5f:05:96:bb:0e:a3:58:
+ bd:2f:a1:66:94:9e:34:76:a9:84:88:a8:cd:fb:e2:
+ d5:14:b8:ce:15:76:d0:03:0a:aa:bc:1c:ff:c4:d9:
+ 53:96:b7:aa:28:b1:3b:30:a3:3d:e6:88:08:32:a1:
+ 92:2d:d5:7b:85:3e:93:6a:52:dd:cb:2d:b7:99:59:
+ da:4c:08:12:62:c6:57:77:ab:d5:10:8f:2c:0b:39:
+ 16:c0:5e:87:7d:40:31:f0:34:4e:75:5f:42:28:56:
+ cd:e4:60:c9:a0:b3:cc:08:d0:a7:2d:4d:19:56:95:
+ 82:4d:18:26:37:4c:78:b3:21
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 32:96:f8:f3:29:b3:f7:d4:31:4f:60:e4:86:f5:b8:ad:cd:9d:
+ be:ac:d7:c6:87:80:4f:ff:df:4c:26:b0:9f:8d:ed:48:8d:39:
+ 50:28:3f:57:d9:d0:d4:98:96:f2:b9:fb:6b:98:77:a2:12:2d:
+ 83:64:bd:72:ca:1b:84:3f:b1:02:9e:92:63:59:54:af:ff:1e:
+ 61:6d:8e:1f:b6:2c:e5:d7:3f:b6:df:df:47:6a:31:99:54:04:
+ e5:c1:ee:a7:9c:74:2f:62:9a:4b:96:f2:d5:a6:5b:b5:d3:50:
+ 40:2e:24:ed:cd:09:da:9f:6e:5c:92:4a:a5:1a:1b:a5:33:4b:
+ 55:4b
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/04.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 4 (0x4)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 1 14:40:01 2004 GMT
+ Not After : Feb 27 14:40:01 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Unknown-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:ea:0f:71:8a:e7:17:38:37:06:16:18:62:be:0e:
+ 8a:07:7d:06:34:ad:1f:6d:c9:3c:05:14:3a:0a:75:
+ d9:20:9e:75:21:b7:1b:af:2e:39:e2:68:76:c7:27:
+ 97:af:f2:f4:2a:10:1e:51:92:10:73:99:8e:20:af:
+ ee:1f:b7:26:47:72:00:d7:8c:a5:17:85:a1:b4:20:
+ 83:6c:91:17:0e:64:3a:b1:ee:5a:13:4b:39:43:f4:
+ 7f:6a:60:72:cf:9a:32:8c:cf:a3:73:5d:b1:28:b8:
+ e2:6f:bf:92:46:9d:b7:83:5e:0a:9c:61:19:3d:86:
+ 32:7d:29:43:5b:32:31:3f:33
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 4a:7b:ab:cf:90:81:ce:3b:bf:0e:87:fa:fb:fd:31:73:e6:62:
+ fb:6f:7c:0e:45:74:16:c0:c5:32:0c:eb:e3:e4:c1:0c:2f:5f:
+ 46:f8:29:bb:33:59:f3:73:1b:c9:e1:58:a5:58:66:d1:6f:88:
+ 64:c8:80:74:8c:8e:0d:be:ea:32:fa:36:be:2f:16:8b:c4:f3:
+ 56:13:bc:c6:7a:d4:3d:6f:81:fd:79:20:54:ef:9f:fc:d6:9a:
+ 41:d1:46:6d:d7:d5:aa:78:76:28:44:5a:15:33:ab:fa:cc:f3:
+ 4a:19:92:67:5e:48:4d:f6:76:7f:67:d1:02:b9:0d:3f:99:5b:
+ 42:72
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/05.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,49 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 5 (0x5)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 1 14:40:02 2004 GMT
+ Not After : Feb 27 14:40:02 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=OCSPSigner-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:cd:d2:c5:76:31:8c:1c:e9:5b:90:b0:2e:3f:0f:
+ 07:9d:d2:55:4f:27:b2:a1:0f:56:17:5e:aa:14:38:
+ 17:2a:44:91:22:5e:52:4d:b9:c2:62:2e:e9:ea:09:
+ 35:4e:fa:03:9c:f2:7f:e2:ee:8f:5e:fc:de:60:cc:
+ a2:40:41:b6:fc:df:77:10:3f:a1:8e:4d:db:f1:94:
+ 04:a3:ad:23:85:c5:b2:29:54:49:b5:8e:fc:15:a3:
+ 9f:f3:15:e8:91:14:bb:b1:cc:c8:5d:b1:37:74:03:
+ 70:65:89:a7:7f:89:0e:60:dc:b1:5a:71:2a:b6:f7:
+ 61:0f:5e:c0:7c:3b:c0:72:03
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ OCSP No Check:
+
+ Signature Algorithm: md5WithRSAEncryption
+ 63:04:47:0e:8c:2c:21:7b:d7:ff:29:cd:a4:54:97:51:fd:87:
+ 69:b7:d4:05:5f:4e:f9:ef:9d:c5:64:03:59:f8:85:c5:e3:9f:
+ 41:63:ee:eb:32:0b:b8:b2:97:11:af:3c:a7:2c:d3:d2:a5:c3:
+ 94:63:3f:4a:21:01:74:68:0b:8d:10:ed:ae:fa:b8:27:86:06:
+ 9f:cc:ed:ee:c2:db:89:45:9c:a8:c6:01:67:1e:f5:0c:72:3b:
+ 0c:44:13:5a:86:af:16:3f:84:b8:46:11:fd:11:51:fd:d6:27:
+ 26:81:c1:3a:ba:dc:42:b3:3c:79:41:48:74:0a:82:9c:ea:7f:
+ 27:6a
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/06.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,49 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 6 (0x6)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Ltd, CN=TOCSP-Root5-RSA
+ Validity
+ Not Before: Mar 1 16:37:23 2004 GMT
+ Not After : Feb 27 16:37:23 2014 GMT
+ Subject: O=Symbian Ltd, CN=OCSPSigner-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:d6:30:e1:71:05:a4:f6:a1:b4:f6:6c:09:50:e8:
+ 65:1b:7c:08:49:e8:39:d9:ae:16:7f:c7:59:8c:20:
+ 64:88:69:84:03:2d:87:4a:3d:52:6b:92:40:12:b1:
+ 21:02:dd:57:79:5b:a1:24:70:8e:66:ed:c5:ae:9a:
+ 0c:d4:5b:68:b7:ae:0e:78:c1:82:1d:e3:5c:33:1c:
+ 42:3f:52:46:33:7e:e4:48:19:c4:a1:91:77:ac:cb:
+ d7:74:e4:8d:d7:91:1e:e5:d5:91:3a:d0:d7:e6:a5:
+ 02:bd:0b:09:62:f3:c8:89:2a:fb:e9:e2:77:b6:91:
+ d0:84:4a:9c:05:da:fa:dd:19
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ OCSP No Check:
+
+ Signature Algorithm: md5WithRSAEncryption
+ 2f:7a:f2:9f:e7:a4:de:5f:71:10:a6:fa:68:bc:67:0f:ad:57:
+ 44:78:70:41:99:af:a8:cc:bd:73:ef:68:a3:51:6e:39:a8:e4:
+ 62:0a:6e:6f:5c:20:36:e7:0e:09:40:b5:e9:29:e6:fd:ca:51:
+ 43:2b:8e:2d:d1:9e:c8:b3:a9:cd:02:57:31:c1:47:fa:a8:01:
+ 0e:b8:ee:4a:dc:f8:b9:e4:5b:7d:17:25:2e:57:53:2d:d8:9e:
+ 49:56:e8:eb:b0:9f:b0:f4:9f:1c:03:26:ba:42:63:89:4a:2d:
+ e2:50:18:4d:88:59:09:16:82:df:e0:3a:38:5b:c6:d1:64:80:
+ 30:3f
+-----BEGIN CERTIFICATE-----
+MIIB5zCCAVCgAwIBAgIBBjANBgkqhkiG9w0BAQQFADAwMRQwEgYDVQQKEwtTeW1i
+aWFuIEx0ZDEYMBYGA1UEAxMPVE9DU1AtUm9vdDUtUlNBMB4XDTA0MDMwMTE2Mzcy
+M1oXDTE0MDIyNzE2MzcyM1owLjEUMBIGA1UEChMLU3ltYmlhbiBMdGQxFjAUBgNV
+BAMTDU9DU1BTaWduZXItUjEwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANYw
+4XEFpPahtPZsCVDoZRt8CEnoOdmuFn/HWYwgZIhphAMth0o9UmuSQBKxIQLdV3lb
+oSRwjmbtxa6aDNRbaLeuDnjBgh3jXDMcQj9SRjN+5EgZxKGRd6zL13TkjdeRHuXV
+kTrQ1+alAr0LCWLzyIkq++nid7aR0IRKnAXa+t0ZAgMBAAGjEzARMA8GCSsGAQUF
+BzABBQQCBQAwDQYJKoZIhvcNAQEEBQADgYEAL3ryn+ek3l9xEKb6aLxnD61XRHhw
+QZmvqMy9c+9oo1FuOajkYgpub1wgNucOCUC16Snm/cpRQyuOLdGeyLOpzQJXMcFH
++qgBDrjuStz4ueRbfRclLldTLdieSVbo67CfsPSfHAMmukJjiUot4lAYTYhZCRaC
+3+A6OFvG0WSAMD8=
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/0ab202020000027c0000000a00000002.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/0ab202020000027c0000000a00000009.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/0ab202020000027c0000000a0000000b.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----
+MIICFTCCAX6gAwIBAgIQCrICAgAAAnwAAAAKAAAACzANBgkqhkiG9w0BAQUFADAw
+MRQwEgYDVQQKEwtTeW1iaWFuIEx0ZDEYMBYGA1UEAxMPVE9DU1AtUm9vdDUtUlNB
+MB4XDTAxMDQyNzEwNDQyMVoXDTA0MDQyMjEzNTYyMVowMTEUMBIGA1UEChMLU3lt
+YmlhbiBMdGQxGTAXBgNVBAMTEFRPQ1NQLVJldm9rZWQtUjUwgZ8wDQYJKoZIhvcN
+AQEBBQADgY0AMIGJAoGBAOez4SWw5b9NEle6e8+xKOxjHQ403oaA3vNejVNI65VN
+xRMVi7fvr9nA2lDAIJs6JuUAKVQqvSs2EVuxRpdr4lzjyXo/Wql0CzYo386B0rWd
+smlU2MTJkltJQ/KNV6h8GpKD9LMxQ3pjxR2gz34tnOJlwMCz36Ts98zVDXq7UifJ
+AgMBAAGjLzAtMBMGA1UdJQQMMAoGCCsGAQUFBwMDMBYGA1UdIAQPMA0wCwYJKoY6
+AAHt02sBMA0GCSqGSIb3DQEBBQUAA4GBAI0kY6yR7aIiZ4wO2QlbEfDVmaRsqtGq
+chvfiyJwwcvsw9QbY1iR4Inrrlfpf4tk2vQJs14Id/EsgTu5G91lnpylq40dKBSs
+CcoqaX/fktORTXY7vTfiVBGaRwwhRnQdnrN2ONb/Iwk/V8XhXJJzirTgyBW2X9T2
+0TqhlevFBxVj
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/0ab202020000027c0000000a0000000d.pem.crt Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,28 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----
+MIICJzCCAZCgAwIBAgIQCrICAgAAAnwAAAAKAAAAAjANBgkqhkiG9w0BAQUFADAw
+MRQwEgYDVQQKEwtTeW1iaWFuIEx0ZDEYMBYGA1UEAxMPVE9DU1AtUm9vdDUtUlNB
+MB4XDTAxMDQyNjEzNTIyOFoXDTA0MDQyNTEzNTIyOFowMDEUMBIGA1UEChMLU3lt
+YmlhbiBMdGQxGDAWBgNVBAMTD1RPQ1NQLVJvb3Q1LVJTQTCBnzANBgkqhkiG9w0B
+AQEFAAOBjQAwgYkCgYEArhyr0bLBhcydT33nvs6Ah4siBtRShw3x7GCNvIJghkfS
+rMESbZiyDzVRwZnxCIuwem4wcnF3QeqsxKrizVv+yHwd6SpuRowASylhEAUQn5vt
+eSOThIrwDKLWaxc7jwAsoWfYq/wR+O12Icv2rtCA3DDQs9C/ktWgxqA9YRvJyK0C
+AwEAAaNCMEAwDgYDVR0PAQH/BAQDAgIEMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O
+BBYEFEmys26Juh4ky2Q52OHOIh4bqv+EMA0GCSqGSIb3DQEBBQUAA4GBAI5QmXEp
+3xtEf4KKSV65+Tfj2md8E+mjJfZ6LCRw8U5+KrdJm9XxeqVQX21SAD+/i3sfZXJo
+1BQTucDpzHgM8XiNJWMpDtxi1NbqZw2VHEcJWTyMld/4dV5iIQShHmh9NacZybds
+Kazd1WoCa35tKhdrCDcAyCDdMDyvOmkEC/eD
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/tocsp-good-m5.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/tocsp-goodaia-r5.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/tocsp-signing5-rsa.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,13 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/certs/tocsp-unknown-r5.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----
+MIICFTCCAX6gAwIBAgIQCrICAgAAAnwAAAAKAAAADzANBgkqhkiG9w0BAQUFADAw
+MRQwEgYDVQQKEwtTeW1iaWFuIEx0ZDEYMBYGA1UEAxMPVE9DU1AtUm9vdDUtUlNB
+MB4XDTAxMDQyNzExNDg1MVoXDTA0MDQyMjEzNTQ1MVowMTEUMBIGA1UEChMLU3lt
+YmlhbiBMdGQxGTAXBgNVBAMTEFRPQ1NQLVVua25vd24tUjUwgZ8wDQYJKoZIhvcN
+AQEBBQADgY0AMIGJAoGBAMFdUO8mhEq/m369AZ3UBNGhbessPomqTiEmO2of1fJy
+anutHqZNQ4F8bJmlswjn7NCAl4uEgl94JHdGEYP84QxXI123T3RJhlXs8Wjo9E+j
+6ZU2ZPMOLueBBGKwCtysLby+Vv4UTYCLWI6e9T1qCu+dr1vT4m9RCWMkpW7m/bTr
+AgMBAAGjLzAtMBMGA1UdJQQMMAoGCCsGAQUFBwMDMBYGA1UdIAQPMA0wCwYJKoY6
+AAHt02sBMA0GCSqGSIb3DQEBBQUAA4GBAJuQpc0JDAnR7feUhKdChABphXOjEgFT
+/I7AgrgrYqO1U4ZEA9jqe9CGTIwtgFKMrBu6rJMf2WTOWIa4Dt3urUHk4C2cK15X
++ljapcB6y1EpGHpvLu3/FE6XpT2i0N+xE2I0f7GQHMsOTVIs8qLCCZrWvoY9BC1E
+aKI6ZaJ/YDka
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/private/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/oldca/root1/private/ocspsigner-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/apache-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/expired-r1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/expired-r2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/expired-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/good-m5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/good-r1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/good-r2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/good-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/goodaia-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/mid-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/ocspsigner-r1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/ocspsigner-r2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/ocspsigner-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/ocspsigningroot-rsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/revoked-r1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/revoked-r2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/revoked-r5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/root1-rsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/root2-dsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/root5-rsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/unknown-r1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/unknown-r2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/certs/unknown-r5.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/chains/expired-r5.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,27 @@
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/chains/good-r5.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,27 @@
+-----BEGIN CERTIFICATE-----
+MIICCTCCAXKgAwIBAgIBAjANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ0NVoXDTE0MDMwMTE2MzQ0NVowMTEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxEDAOBgNVBAMTB0dvb2QtUjUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ
+AoGBANZdoZZZnxy4PXjFNPDA4nQzJ7TeaPGqLJvkcRGL8GG1IkWayH2ALmu1/y9k
+zubeZexDixycYWMtF5ftpkhdAl+uuEUpmZALFNZNVRE2WUHGwLI4byK4cRemkyg0
+mpaI1Dj7RykZlDi1G68uZPwYq9P0zw1oLMdHoBpXoKUYKXwFAgMBAAGjLzAtMBMG
+A1UdJQQMMAoGCCsGAQUFBwMDMBYGA1UdIAQPMA0wCwYJKoY6AAHt02sBMA0GCSqG
+SIb3DQEBBAUAA4GBACfm9aZVS9CJKKcIxqmyhnOhNDHhkO/6c0pTM3IUK0QZSSoT
+9gD9+MVfx2IX43+k/ePu4xHeSY/7cJXuWgWW7nVKwk/da96hRcTPM1in6vb03a5O
+CsnC7W9cI65EC2WvxI7htnicYg3XZCE42JHx0OfKYrUfEmkAT7xqUNvW31b7
+-----END CERTIFICATE-----
+-----BEGIN CERTIFICATE-----
+MIICITCCAYqgAwIBAgIBADANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ0MloXDTE0MDMwMTE2MzQ0MlowMzEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxEjAQBgNVBAMTCVJvb3Q1LVJTQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAw
+gYkCgYEAufV5zRvgR/ohzfb8AizbLePxK7QfBOuTtwy70/ifZCP5aZMri6DgObYM
+Jwh4lChQ+UnQgMX9sRP1kWZ6UEbrhm7oUz7keI6wu4m4myYmMjY3nc+7T/std+o/
+Vzt/bSyLNYpAqUW50g46SL1lof8fXKGkqFRH42czeMUwqnEffRsCAwEAAaNFMEMw
+DgYDVR0PAQH/BAQDAgIEMBIGA1UdEwEB/wQIMAYBAf8CAQUwHQYDVR0OBBYEFHzj
+BilRFiByFNQlr/0YW21eSK9vMA0GCSqGSIb3DQEBBAUAA4GBACEv1s039YBNfVn/
+dxZm+1XDLmrm6Of5p3SjBz94osLV+cNsddP5W+jmdtEL2u+x33foGFPOkDyFFnIW
+gkFVfAKKCH70K2liJWDS5D+mu32zU8Kc/JF0musvKZ/EbuddJS+x7t7kBl4fFgr1
+0/AO8YOgD1AV55Z9Bjf1lTTHZMcX
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/chains/goodaia-r5.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,28 @@
+-----BEGIN CERTIFICATE-----
+MIICHjCCAYegAwIBAgIBCDANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ1NFoXDTE0MDMwMTE2MzQ1NFowNDEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxEzARBgNVBAMTCkdvb2RBSUEtUjUwgZ8wDQYJKoZIhvcNAQEBBQADgY0A
+MIGJAoGBAOKPFux89K7U7f1oyCHhM0fN1nV7hJ84SBnv0dCqNKFqGfmQx5nqFKN2
+Z362IgJfqrvlMVE6WwqwpeHsaBliT54YjmHtJG8Fh1AcBpp5gs2zD9A/Y+5Jctqr
+Ouq8APCHB6LeSVDNHYO8MCA+/1CweUy9fQoD6WSh03HkZFuCue0FAgMBAAGjQTA/
+MD0GCCsGAQUFBwEBBDEwLzAtBggrBgEFBQcwAYYhaHR0cDovL2xvbi1zeXNidWls
+ZDAzLmludHJhOjE5MDAzMA0GCSqGSIb3DQEBBAUAA4GBAJtGHFQpQe0XRmnkbjTp
+au3ifzvbWv6tHE8Hd3BSV5FXyJL2pjke2fZNFJg6tmOvoZr2ug144UqSxeNLGYhA
+D0/hRixc8RLFxxRnlGQKPYgMqdQQNfd36H5Vb/Hy0fQO03nX0qTTXVPp+bHP1hw4
+dB6DtZJHX4xQOHh1n+BF9aAh
+-----END CERTIFICATE-----
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/chains/revoked-r5.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,27 @@
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
+-----BEGIN CERTIFICATE-----
+MIICITCCAYqgAwIBAgIBADANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ0MloXDTE0MDMwMTE2MzQ0MlowMzEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxEjAQBgNVBAMTCVJvb3Q1LVJTQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAw
+gYkCgYEAufV5zRvgR/ohzfb8AizbLePxK7QfBOuTtwy70/ifZCP5aZMri6DgObYM
+Jwh4lChQ+UnQgMX9sRP1kWZ6UEbrhm7oUz7keI6wu4m4myYmMjY3nc+7T/std+o/
+Vzt/bSyLNYpAqUW50g46SL1lof8fXKGkqFRH42czeMUwqnEffRsCAwEAAaNFMEMw
+DgYDVR0PAQH/BAQDAgIEMBIGA1UdEwEB/wQIMAYBAf8CAQUwHQYDVR0OBBYEFHzj
+BilRFiByFNQlr/0YW21eSK9vMA0GCSqGSIb3DQEBBAUAA4GBACEv1s039YBNfVn/
+dxZm+1XDLmrm6Of5p3SjBz94osLV+cNsddP5W+jmdtEL2u+x33foGFPOkDyFFnIW
+gkFVfAKKCH70K2liJWDS5D+mu32zU8Kc/JF0musvKZ/EbuddJS+x7t7kBl4fFgr1
+0/AO8YOgD1AV55Z9Bjf1lTTHZMcX
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/chains/unknown-r5.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,27 @@
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/ocspsigningroot/certs/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,46 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: sha1WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=OCSPSigningRoot-RSA
+ Validity
+ Not Before: Mar 3 16:34:57 2004 GMT
+ Not After : Mar 1 16:34:57 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Signer-OCSPR
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:cb:cc:34:96:9f:92:a2:08:28:e2:43:13:c8:d2:
+ c7:2f:45:b3:68:2b:6c:9b:fb:42:46:9e:d2:42:30:
+ 3e:14:2e:d5:bc:4d:dd:b3:dd:34:c7:a3:76:cf:9b:
+ 51:dd:c6:28:05:1a:f3:19:dd:3d:6e:e1:ad:9f:f8:
+ 08:04:0e:94:da:5e:f2:19:73:8b:8f:8c:9c:03:f2:
+ 8f:96:7a:64:9c:99:bf:cd:1c:5f:4f:10:9e:86:19:
+ 22:58:4c:f8:74:73:d8:7d:b4:e8:3b:21:de:4f:94:
+ b0:65:4b:a3:3b:5c:02:47:f2:f7:e5:d1:36:c0:7f:
+ cb:4d:00:28:01:9b:ad:41:03
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: sha1WithRSAEncryption
+ 3e:d2:26:f1:8b:ee:3d:e4:cc:34:38:8a:03:3d:6a:98:81:dc:
+ 7a:bf:ba:39:c0:3b:78:6e:eb:00:de:51:2e:8e:f0:da:45:47:
+ f5:2f:8c:29:db:f2:67:9e:d8:2c:72:7b:0d:d5:83:e1:dd:50:
+ 39:e1:c1:fc:8f:5a:33:76:b1:fd:b7:40:54:58:9f:a5:6f:34:
+ 75:f6:0f:23:c2:af:77:94:0f:00:a3:ad:cf:cd:94:2e:6f:e4:
+ 70:70:fb:19:5b:5e:8c:93:8f:70:e1:aa:5d:2f:58:81:90:79:
+ f3:9d:9f:4c:06:8e:28:57:09:00:76:52:73:87:01:be:b5:8d:
+ 44:25
+-----BEGIN CERTIFICATE-----
+MIIB4jCCAUsCAQEwDQYJKoZIhvcNAQEFBQAwPTEdMBsGA1UEChMUU3ltYmlhbiBT
+b2Z0d2FyZSBMdGQxHDAaBgNVBAMTE09DU1BTaWduaW5nUm9vdC1SU0EwHhcNMDQw
+MzAzMTYzNDU3WhcNMTQwMzAxMTYzNDU3WjA2MR0wGwYDVQQKExRTeW1iaWFuIFNv
+ZnR3YXJlIEx0ZDEVMBMGA1UEAxMMU2lnbmVyLU9DU1BSMIGfMA0GCSqGSIb3DQEB
+AQUAA4GNADCBiQKBgQDLzDSWn5KiCCjiQxPI0scvRbNoK2yb+0JGntJCMD4ULtW8
+Td2z3TTHo3bPm1HdxigFGvMZ3T1u4a2f+AgEDpTaXvIZc4uPjJwD8o+WemScmb/N
+HF9PEJ6GGSJYTPh0c9h9tOg7Id5PlLBlS6M7XAJH8vfl0TbAf8tNACgBm61BAwID
+AQABMA0GCSqGSIb3DQEBBQUAA4GBAD7SJvGL7j3kzDQ4igM9apiB3Hq/ujnAO3hu
+6wDeUS6O8NpFR/UvjCnb8mee2Cxyew3Vg+HdUDnhwfyPWjN2sf23QFRYn6VvNHX2
+DyPCr3eUDwCjrc/NlC5v5HBw+xlbXoyTj3Dhql0vWIGQefOdn0wGjihXCQB2UnOH
+Ab61jUQl
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/ocspsigningroot/certs/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,13 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/ocspsigningroot/private/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIICXwIBAAKBgQCenPKlRpy6v/3p/qWqFlDnjpmVptub+wVyoFLOJ4J/To2nDPMP
+dcByyJBdT3wDiJZh2XCInd4WpDYs8awvF0rLpR44sWrJ9oSSA+W3F8dZOVJclaGO
+Pn8M9qB4pQeXZo6BTH6HMcybDS1ZY7dDUk6uj+NoJQqEa/moyesi49qvSwIDAQAB
+AoGBAIy4cg5wN1z4OS4A3rmoUt8dhOVgxDX+3zZzRwPfycdoygQLWRm+Pp+XkX03
+p67633CwmUabyQ4NYoM9ZqXg5Fmi1r4mMkQIcvW5M0OSd/cDd+bVhK4VBF0lyMpf
+NNHKjwab0D9gAMI/2gx5Iuxn3IXYh+SRuE6DfZ+IDtGltKwBAkEAzuASvpNHMEiz
+aU11IN5sy3stXbkuNQvOwaayhrk6OhRZd9+gQdHe7tEYcEYnhBKbqQX1csaj4WuJ
+fCD+kFpo+wJBAMRHBSJkE1o1rak1OaBsDUbjiZyYMSXUPMDa2PZv9lNcEfHTVb9f
+Cit6xd49hJTaPBchXtvXh8xMUAb/tVqoofECQQC+hVY99N0m9o1keVVZg/6mFzbc
+jeKkL8+mQKNBt+yL+Jm88FJiy6mIP0FGhRV3aLu6miZGIfJjc+oWSzymLN1pAkEA
+irorvdf/+aWw/cS521IjvDP8wqqrKjKtUh4cdWpDLz4HDOYzWBSjioG3MtJGUDND
+f5G9iyL2P4a8lYXMt6wy8QJBAK78muFrgou864RXIXZ8iebkvW+hAU11pyp06Fj9
+nr7ym1TOlYK4EhB43oF44ZY+TvRDOIxRS+99VG2fOf8W1+g=
+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/ocspsigningroot/private/signer-ocspr.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/certs/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Feb 3 12:00:00 1982 GMT
+ Not After : Feb 3 12:00:01 1982 GMT
+ Subject: O=Symbian Software Ltd, CN=Expired-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:be:9b:80:75:eb:7d:31:77:9a:f9:95:44:79:dc:
+ 60:f5:fb:35:f5:c5:8d:a4:bd:0e:90:0c:91:91:79:
+ e4:8e:db:7a:00:bc:44:cf:83:56:f2:28:2a:fa:e8:
+ e2:37:84:6e:5b:e1:06:80:5f:e0:a8:df:98:02:e2:
+ 23:04:56:6a:10:a9:0e:2c:a3:8b:c4:a3:d9:98:b7:
+ ef:2e:23:06:1f:e2:73:3f:23:89:3e:62:76:67:9d:
+ 79:6f:ae:5f:09:4f:e2:9a:a3:e3:7b:ba:2e:99:e7:
+ bb:ec:b9:e8:80:97:4d:cc:ec:7d:34:04:0b:f5:ac:
+ 54:12:b7:cf:62:c6:74:20:a3
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 46:6a:38:30:f4:de:9a:85:60:ac:2c:3d:01:40:98:1d:b2:f0:
+ 42:fb:ed:e5:fb:2e:0c:7d:1a:6b:e9:70:23:c1:9c:54:a9:97:
+ 9e:3d:79:bf:38:53:b4:e7:6e:f0:c1:09:d3:9e:29:14:4d:4c:
+ 42:1e:af:90:bb:7f:07:5d:73:6d:52:08:eb:42:04:a3:a8:f0:
+ 62:68:e3:5f:e9:f5:7e:51:cc:c2:be:83:a4:b0:53:3c:cb:1b:
+ ef:39:19:58:24:6d:38:a5:03:78:e3:f7:2a:f5:3e:f3:c5:8b:
+ bb:3d:ae:c6:40:be:87:7e:fd:b0:74:b2:a4:75:b7:5d:0c:aa:
+ e9:91
+-----BEGIN CERTIFICATE-----
+MIIB1jCCAT8CAQEwDQYJKoZIhvcNAQEEBQAwMzEdMBsGA1UEChMUU3ltYmlhbiBT
+b2Z0d2FyZSBMdGQxEjAQBgNVBAMTCVJvb3QxLVJTQTAeFw04MjAyMDMxMjAwMDBa
+Fw04MjAyMDMxMjAwMDFaMDQxHTAbBgNVBAoTFFN5bWJpYW4gU29mdHdhcmUgTHRk
+MRMwEQYDVQQDEwpFeHBpcmVkLVIxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
+gQC+m4B1630xd5r5lUR53GD1+zX1xY2kvQ6QDJGReeSO23oAvETPg1byKCr66OI3
+hG5b4QaAX+Co35gC4iMEVmoQqQ4so4vEo9mYt+8uIwYf4nM/I4k+YnZnnXlvrl8J
+T+Kao+N7ui6Z57vsueiAl03M7H00BAv1rFQSt89ixnQgowIDAQABMA0GCSqGSIb3
+DQEBBAUAA4GBAEZqODD03pqFYKwsPQFAmB2y8EL77eX7Lgx9GmvpcCPBnFSpl549
+eb84U7TnbvDBCdOeKRRNTEIer5C7fwddc21SCOtCBKOo8GJo41/p9X5RzMK+g6Sw
+UzzLG+85GVgkbTilA3jj9yr1PvPFi7s9rsZAvod+/bB0sqR1t10MqumR
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/certs/02.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 2 (0x2)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 3 16:34:15 2004 GMT
+ Not After : Mar 1 16:34:15 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Good-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:cd:b1:ce:69:06:a2:de:75:e2:4b:fd:92:a8:14:
+ 50:bf:8e:91:27:4d:e6:5f:78:ef:c0:85:d3:04:f2:
+ 42:6d:e2:32:db:c1:a5:b2:1b:60:32:cf:6d:6a:99:
+ ca:09:17:8a:e9:dc:21:b0:02:c3:eb:d9:e1:4f:be:
+ 09:63:4d:cf:7c:98:b8:fa:8a:b1:5a:e9:73:16:e1:
+ e0:62:a6:56:d6:3f:5f:c6:a0:a3:5f:4b:25:01:13:
+ 42:a5:b1:9c:30:34:25:55:04:d7:c3:1a:32:3c:90:
+ c4:33:82:ae:da:6c:e5:c5:81:3b:06:c3:64:4c:48:
+ be:24:fc:57:d0:b3:2d:36:97
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 4a:2f:ee:56:60:70:93:df:6e:bc:55:b7:48:ab:fc:45:09:99:
+ b8:59:76:71:3e:4b:d4:62:ca:99:2a:b6:a2:36:92:bc:70:82:
+ b9:0c:6a:4e:96:34:7b:7c:d2:5d:94:22:57:43:aa:78:18:03:
+ ff:0e:fc:43:06:e4:2d:9f:4e:13:d6:6c:ef:0c:2d:58:ac:56:
+ 1c:49:2f:0b:d3:63:1f:d3:38:80:78:f8:c0:74:e7:5d:2d:e6:
+ b6:4c:87:e8:52:b4:0e:41:a7:fb:ac:4e:23:ae:76:2a:35:02:
+ d7:cd:af:4d:7d:2b:b4:e6:af:7a:16:cb:e3:31:38:fb:a5:c8:
+ 05:c3
+-----BEGIN CERTIFICATE-----
+MIIB0zCCATwCAQIwDQYJKoZIhvcNAQEEBQAwMzEdMBsGA1UEChMUU3ltYmlhbiBT
+b2Z0d2FyZSBMdGQxEjAQBgNVBAMTCVJvb3QxLVJTQTAeFw0wNDAzMDMxNjM0MTVa
+Fw0xNDAzMDExNjM0MTVaMDExHTAbBgNVBAoTFFN5bWJpYW4gU29mdHdhcmUgTHRk
+MRAwDgYDVQQDEwdHb29kLVIxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDN
+sc5pBqLedeJL/ZKoFFC/jpEnTeZfeO/AhdME8kJt4jLbwaWyG2Ayz21qmcoJF4rp
+3CGwAsPr2eFPvgljTc98mLj6irFa6XMW4eBiplbWP1/GoKNfSyUBE0KlsZwwNCVV
+BNfDGjI8kMQzgq7abOXFgTsGw2RMSL4k/FfQsy02lwIDAQABMA0GCSqGSIb3DQEB
+BAUAA4GBAEov7lZgcJPfbrxVt0ir/EUJmbhZdnE+S9RiypkqtqI2krxwgrkMak6W
+NHt80l2UIldDqngYA/8O/EMG5C2fThPWbO8MLVisVhxJLwvTYx/TOIB4+MB0510t
+5rZMh+hStA5Bp/usTiOudio1AtfNr019K7Tmr3oWy+MxOPulyAXD
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/certs/03.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 3 (0x3)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 3 16:34:17 2004 GMT
+ Not After : Mar 1 16:34:17 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Revoked-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:d4:c5:4e:5e:ea:33:21:9c:74:15:61:00:67:0e:
+ d7:c6:03:23:9c:9b:d0:cd:11:21:0b:bb:c1:40:a1:
+ 57:6e:fe:db:61:d7:a3:cb:3f:2e:18:c4:b8:39:be:
+ 58:23:83:d1:bf:b7:55:b8:e9:c3:21:bf:3e:b5:e1:
+ dd:99:6e:f7:9f:3f:6c:f2:d9:76:82:b6:04:db:fe:
+ 16:51:99:70:c3:fd:35:04:9e:69:38:fb:6e:3d:1d:
+ 48:e2:e1:8b:31:3e:be:ff:7d:7a:c6:11:b9:a4:ca:
+ ad:e9:d7:74:2f:26:b1:45:c4:ba:98:3f:d4:39:4a:
+ 89:4e:2a:4f:e2:f5:58:58:f9
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 6f:e0:05:ad:ec:05:c4:ea:68:b2:ae:8a:0b:28:15:d4:52:e2:
+ 49:53:70:8f:96:33:38:82:da:40:c4:5b:2c:9d:63:81:4a:9f:
+ 37:af:95:14:56:ea:fc:60:dd:87:60:7b:c9:fb:f9:08:bf:d8:
+ cc:4a:af:31:dd:f8:24:89:2d:3e:5d:66:8c:15:86:0a:cd:c9:
+ 51:5a:c6:b4:3c:c4:7f:9e:6c:2c:5a:b2:75:2e:0d:32:c9:59:
+ 41:3a:ce:bc:bc:e9:a9:01:49:0b:13:28:d6:be:17:0d:67:0c:
+ 2e:29:33:18:a1:20:0b:ac:e1:a5:35:cd:99:ef:3a:7e:bd:1e:
+ e2:1a
+-----BEGIN CERTIFICATE-----
+MIIB1jCCAT8CAQMwDQYJKoZIhvcNAQEEBQAwMzEdMBsGA1UEChMUU3ltYmlhbiBT
+b2Z0d2FyZSBMdGQxEjAQBgNVBAMTCVJvb3QxLVJTQTAeFw0wNDAzMDMxNjM0MTda
+Fw0xNDAzMDExNjM0MTdaMDQxHTAbBgNVBAoTFFN5bWJpYW4gU29mdHdhcmUgTHRk
+MRMwEQYDVQQDEwpSZXZva2VkLVIxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
+gQDUxU5e6jMhnHQVYQBnDtfGAyOcm9DNESELu8FAoVdu/tth16PLPy4YxLg5vlgj
+g9G/t1W46cMhvz614d2ZbvefP2zy2XaCtgTb/hZRmXDD/TUEnmk4+249HUji4Ysx
+Pr7/fXrGEbmkyq3p13QvJrFFxLqYP9Q5SolOKk/i9VhY+QIDAQABMA0GCSqGSIb3
+DQEBBAUAA4GBAG/gBa3sBcTqaLKuigsoFdRS4klTcI+WMziC2kDEWyydY4FKnzev
+lRRW6vxg3Ydge8n7+Qi/2MxKrzHd+CSJLT5dZowVhgrNyVFaxrQ8xH+ebCxasnUu
+DTLJWUE6zry86akBSQsTKNa+Fw1nDC4pMxihIAus4aU1zZnvOn69HuIa
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/certs/04.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,45 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 4 (0x4)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 3 16:34:19 2004 GMT
+ Not After : Mar 1 16:34:19 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Unknown-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:ec:95:4c:29:c8:d5:19:f0:f0:f3:f3:03:fd:e7:
+ 97:f1:bf:da:74:2f:ef:bf:d1:28:ca:3b:c6:f1:48:
+ 1a:29:ac:bd:4f:ed:49:99:68:fe:ec:12:00:4d:8e:
+ 33:61:e5:84:94:a9:00:22:c6:39:10:a4:54:77:3a:
+ d1:b1:75:07:e5:36:3b:fa:50:d5:d7:cf:c2:38:74:
+ bc:9b:14:0e:08:29:89:07:8b:f0:d6:fc:c9:4b:43:
+ 68:89:bc:11:2e:5a:2e:c9:7e:b9:31:5f:e6:88:6f:
+ 4a:ce:e3:60:70:8b:41:92:63:75:80:a8:35:ad:ed:
+ 41:25:04:b6:93:a6:47:8c:c1
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 64:a5:52:db:e4:c2:84:26:59:13:1a:a9:7d:cd:b4:94:60:82:
+ 77:4a:37:1f:f2:69:0e:f2:79:dd:45:25:1c:33:37:95:80:0b:
+ 40:e2:d3:a7:f7:a5:27:ca:01:af:f6:c2:0b:f4:f0:b5:11:47:
+ 5c:fd:00:25:d0:53:01:61:90:7e:32:63:77:23:ac:f7:7e:a4:
+ 5d:57:c5:a2:1a:2f:33:22:4e:84:16:41:9c:20:3b:e9:71:a8:
+ 1e:87:af:a4:55:82:85:4e:66:62:25:40:cd:a6:56:a2:02:1a:
+ 17:4f:2f:62:e7:bb:9b:b6:4c:17:7d:d0:78:bd:55:80:68:33:
+ 24:01
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/certs/05.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,49 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 5 (0x5)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root1-RSA
+ Validity
+ Not Before: Mar 3 16:34:20 2004 GMT
+ Not After : Mar 1 16:34:20 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=OCSPSigner-R1
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:a6:35:bc:9e:6f:a0:f7:c6:d3:91:22:bf:2d:2b:
+ 71:91:e7:e5:3c:e9:cb:93:31:ce:3c:56:f2:4b:d0:
+ ec:63:af:0d:df:95:ab:b5:c3:25:25:ba:6e:57:c7:
+ 55:d0:e2:05:78:6c:46:65:05:6b:56:c0:1a:09:cb:
+ f5:c5:50:ea:59:01:b8:dd:73:40:66:b0:f2:e0:ed:
+ 76:c6:65:5d:f2:00:d1:ba:e7:78:79:57:3f:fb:e2:
+ ed:f6:dd:a7:78:dc:69:69:20:90:78:d7:b7:65:7d:
+ d8:df:62:09:de:f7:fe:d8:b8:85:a4:aa:0f:f2:30:
+ 08:30:9f:bf:b8:f3:59:f4:5f
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ OCSP No Check:
+
+ Signature Algorithm: md5WithRSAEncryption
+ 63:26:8c:19:0d:98:b0:1c:4f:97:44:44:be:a6:c8:ab:b3:fb:
+ c5:1d:50:1d:c7:b4:01:e4:93:55:27:3e:45:6c:53:95:3d:45:
+ 65:d5:b6:7b:fd:61:f8:73:06:e7:9b:a7:82:d9:28:49:7b:f6:
+ 58:90:fe:11:d4:e5:92:f8:04:d1:73:0d:9b:53:22:6a:a1:03:
+ 8f:01:53:d5:60:08:66:56:64:c4:cd:64:20:98:0e:34:dc:66:
+ 35:b0:b9:4f:16:fd:e4:af:06:12:dd:de:77:d6:bd:0e:3d:55:
+ cb:c1:d9:7d:55:f4:56:25:7f:5d:bf:72:8e:a7:67:8e:c8:3c:
+ cf:1d
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/certs/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,13 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/private/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/private/expired-r1.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/private/good-r1.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/private/ocspsigner-r1.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIICWwIBAAKBgQCmNbyeb6D3xtORIr8tK3GR5+U86cuTMc48VvJL0Oxjrw3flau1
+wyUlum5Xx1XQ4gV4bEZlBWtWwBoJy/XFUOpZAbjdc0BmsPLg7XbGZV3yANG653h5
+Vz/74u323ad43GlpIJB417dlfdjfYgne9/7YuIWkqg/yMAgwn7+481n0XwIDAQAB
+AoGAWMwawjZ3NAkYXNDIfFRab44JrbpmVXRlb10wQ4sRz8vlSI9I1mm0feyVKPZJ
+BbjLHWQTU8NKbmVhQ9ygqFMrb5cScyLRAiTvEAG8c4j+p3ySsraTMePqyLxzQwPY
+pgxYYTtkK1IPLh6zbgXEIqJmwzbLW7Lou6v2DYYZqyClR6ECQQDch1IHdGfN9ZHL
+QEEb26rYFJi5Evvz+tECsu0GsogGuDIP705L8GVxjTKItF76EpBxUiIXU0nRrSGt
+mj+u7Q1PAkEAwPG+CYGhRQ7dWFvulcoD/G/IRrNmAwmlgtrFWfXtuFVKMZZRZAVL
+H8UFIJ7iHdXHtvgQOcCBsy3iSwKCE0+D8QJAKB+m2Rxg1qRbhnOGZR8ukmoM7394
+wAdeh/MuFQ3emfphgWy0/jQbAPIDw8OtlCpUhYnAEiZhQ/kQK5npBFa1GQJARwKx
+pl4HNJtb64EqNga7oNSjKSItkUCjoZ1StOFGNGlvfQCNw/oOxAqG8JKJNeHQNw7l
+Kdwn4AIrHuA1b1X8gQJAdm3P5oCUpbxMbXfJlg8s2DBmQU5LKAhUTl1juVEd69kf
+hTZnTGhcLo1VvZj+V2yrzq4G2Vi6M1Zv8RZpV52IBA==
+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/private/revoked-r1.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root1/private/unknown-r1.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/certs/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,66 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: dsaWithSHA1
+ Issuer: O=Symbian Software Ltd, CN=Root2-DSA
+ Validity
+ Not Before: Feb 3 12:00:00 1982 GMT
+ Not After : Feb 3 12:00:01 1982 GMT
+ Subject: O=Symbian Software Ltd, CN=Expired-R2
+ Subject Public Key Info:
+ Public Key Algorithm: dsaEncryption
+ DSA Public Key:
+ pub:
+ 00:92:c9:b1:a3:af:ea:92:a5:ec:e0:83:bf:2f:fc:
+ 35:92:07:ea:7a:e2:f6:7f:7d:c5:90:07:45:1c:4b:
+ 16:f5:50:66:ca:66:4d:c2:82:d2:c2:dc:7a:cb:df:
+ de:f8:4c:d9:e1:6f:36:dc:ba:b9:e2:a3:3a:21:f4:
+ 15:69:ac:df:2f:51:8a:13:23:64:56:27:6d:63:a7:
+ df:65:23:d7:53:45:9c:89:10:d5:26:af:52:a9:da:
+ f1:7a:ba:f8:92:5f:fc:bb:99:c0:0b:1a:95:b4:af:
+ 25:75:19:cd:83:51:59:eb:1d:56:2b:9a:8e:3b:34:
+ db:33:87:bd:87:d0:2a:bc:fc
+ P:
+ 00:c0:46:1a:89:48:cb:d2:7c:6d:af:22:06:1e:16:
+ 60:70:ef:3c:af:9f:a1:f5:47:dc:65:ad:a3:60:c9:
+ 0a:b7:ee:b6:45:22:50:c3:6c:2a:bf:a9:94:e6:db:
+ 75:f8:58:7f:c0:1f:98:18:ec:47:af:0f:17:10:28:
+ cd:5a:04:33:23:0a:42:55:48:be:13:e1:9b:0b:42:
+ 02:09:0d:06:3a:ab:6f:06:fb:86:d1:77:85:08:2f:
+ 87:de:0e:7f:cf:df:d4:d8:f0:68:80:3c:94:1f:cf:
+ 3b:1f:4a:44:93:32:ba:06:0a:e8:71:0f:46:2a:f9:
+ e6:02:d3:46:2e:1b:79:75:f5
+ Q:
+ 00:9f:bb:32:4d:ea:56:27:10:b1:b1:47:1c:69:99:
+ b8:c0:da:85:86:77
+ G:
+ 00:b4:83:a7:c0:49:ba:c3:1f:95:33:94:ca:90:ce:
+ 1d:b7:48:06:2f:20:97:ce:c8:98:0f:ec:fa:33:fe:
+ 8d:71:c8:13:d4:23:06:a3:b3:a8:3a:71:33:53:16:
+ 5d:4a:db:04:00:6e:5c:c2:91:f8:13:95:ce:0c:46:
+ bd:bc:23:93:85:be:55:ca:99:6c:ac:ed:0a:01:7c:
+ 52:0f:d5:4a:42:a2:91:3f:ef:c5:09:a4:17:0d:83:
+ 5c:38:fe:65:58:3c:d6:eb:fc:b7:09:d7:b7:71:57:
+ 35:76:57:9e:cd:62:15:16:c0:c7:f7:e1:61:8e:a4:
+ 51:fd:8a:7a:05:53:a6:b5:77
+ Signature Algorithm: dsaWithSHA1
+ 30:2c:02:14:71:83:67:a8:11:29:d6:88:fa:ef:82:59:34:9b:
+ 47:f5:ac:22:f2:68:02:14:65:5e:ab:c2:fd:87:63:94:d6:06:
+ 5e:1b:34:3b:3d:2a:58:ba:fd:f1
+-----BEGIN CERTIFICATE-----
+MIIClTCCAlUCAQEwCQYHKoZIzjgEAzAzMR0wGwYDVQQKExRTeW1iaWFuIFNvZnR3
+YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDItRFNBMB4XDTgyMDIwMzEyMDAwMFoXDTgy
+MDIwMzEyMDAwMVowNDEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2FyZSBMdGQxEzAR
+BgNVBAMTCkV4cGlyZWQtUjIwggG4MIIBLAYHKoZIzjgEATCCAR8CgYEAwEYaiUjL
+0nxtryIGHhZgcO88r5+h9UfcZa2jYMkKt+62RSJQw2wqv6mU5tt1+Fh/wB+YGOxH
+rw8XECjNWgQzIwpCVUi+E+GbC0ICCQ0GOqtvBvuG0XeFCC+H3g5/z9/U2PBogDyU
+H887H0pEkzK6BgrocQ9GKvnmAtNGLht5dfUCFQCfuzJN6lYnELGxRxxpmbjA2oWG
+dwKBgQC0g6fASbrDH5UzlMqQzh23SAYvIJfOyJgP7Poz/o1xyBPUIwajs6g6cTNT
+Fl1K2wQAblzCkfgTlc4MRr28I5OFvlXKmWys7QoBfFIP1UpCopE/78UJpBcNg1w4
+/mVYPNbr/LcJ17dxVzV2V57NYhUWwMf34WGOpFH9inoFU6a1dwOBhQACgYEAksmx
+o6/qkqXs4IO/L/w1kgfqeuL2f33FkAdFHEsW9VBmymZNwoLSwtx6y9/e+EzZ4W82
+3Lq54qM6IfQVaazfL1GKEyNkVidtY6ffZSPXU0WciRDVJq9Sqdrxerr4kl/8u5nA
+CxqVtK8ldRnNg1FZ6x1WK5qOOzTbM4e9h9AqvPwwCQYHKoZIzjgEAwMvADAsAhRx
+g2eoESnWiPrvglk0m0f1rCLyaAIUZV6rwv2HY5TWBl4bNDs9Kli6/fE=
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/certs/02.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,66 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 2 (0x2)
+ Signature Algorithm: dsaWithSHA1
+ Issuer: O=Symbian Software Ltd, CN=Root2-DSA
+ Validity
+ Not Before: Mar 3 16:34:38 2004 GMT
+ Not After : Mar 1 16:34:38 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Good-R2
+ Subject Public Key Info:
+ Public Key Algorithm: dsaEncryption
+ DSA Public Key:
+ pub:
+ 5e:99:90:10:a7:85:6a:3c:5d:f6:e5:1c:9e:1e:54:
+ 05:59:a2:02:cb:75:aa:09:61:3f:db:ab:f8:51:f3:
+ 7a:5a:61:3e:58:e4:97:e7:06:9f:45:e6:77:b7:d0:
+ dd:9f:c2:1c:d6:fc:be:06:a8:50:51:3f:66:13:a1:
+ 55:f2:b7:05:55:7b:43:aa:ce:2e:76:4f:e4:1c:90:
+ 83:6e:d8:73:83:b9:8b:f9:f3:dc:40:f6:78:d7:50:
+ 05:a4:9f:0f:62:7c:4f:17:88:a2:ba:0d:9d:14:97:
+ 54:31:d7:a0:af:f5:f3:40:66:7f:16:cd:0a:06:a0:
+ a2:86:cb:0a:f1:77:a6:f0
+ P:
+ 00:c0:46:1a:89:48:cb:d2:7c:6d:af:22:06:1e:16:
+ 60:70:ef:3c:af:9f:a1:f5:47:dc:65:ad:a3:60:c9:
+ 0a:b7:ee:b6:45:22:50:c3:6c:2a:bf:a9:94:e6:db:
+ 75:f8:58:7f:c0:1f:98:18:ec:47:af:0f:17:10:28:
+ cd:5a:04:33:23:0a:42:55:48:be:13:e1:9b:0b:42:
+ 02:09:0d:06:3a:ab:6f:06:fb:86:d1:77:85:08:2f:
+ 87:de:0e:7f:cf:df:d4:d8:f0:68:80:3c:94:1f:cf:
+ 3b:1f:4a:44:93:32:ba:06:0a:e8:71:0f:46:2a:f9:
+ e6:02:d3:46:2e:1b:79:75:f5
+ Q:
+ 00:9f:bb:32:4d:ea:56:27:10:b1:b1:47:1c:69:99:
+ b8:c0:da:85:86:77
+ G:
+ 00:b4:83:a7:c0:49:ba:c3:1f:95:33:94:ca:90:ce:
+ 1d:b7:48:06:2f:20:97:ce:c8:98:0f:ec:fa:33:fe:
+ 8d:71:c8:13:d4:23:06:a3:b3:a8:3a:71:33:53:16:
+ 5d:4a:db:04:00:6e:5c:c2:91:f8:13:95:ce:0c:46:
+ bd:bc:23:93:85:be:55:ca:99:6c:ac:ed:0a:01:7c:
+ 52:0f:d5:4a:42:a2:91:3f:ef:c5:09:a4:17:0d:83:
+ 5c:38:fe:65:58:3c:d6:eb:fc:b7:09:d7:b7:71:57:
+ 35:76:57:9e:cd:62:15:16:c0:c7:f7:e1:61:8e:a4:
+ 51:fd:8a:7a:05:53:a6:b5:77
+ Signature Algorithm: dsaWithSHA1
+ 30:2c:02:14:1e:1f:88:07:88:67:9f:25:c3:cc:dc:ed:09:1c:
+ 8c:cf:7b:d1:03:fe:02:14:45:f7:b3:33:3e:8c:39:ad:1f:1b:
+ 66:b5:85:f7:d6:24:0a:c4:02:0a
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/certs/03.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,66 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 3 (0x3)
+ Signature Algorithm: dsaWithSHA1
+ Issuer: O=Symbian Software Ltd, CN=Root2-DSA
+ Validity
+ Not Before: Mar 3 16:34:39 2004 GMT
+ Not After : Mar 1 16:34:39 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Revoked-R2
+ Subject Public Key Info:
+ Public Key Algorithm: dsaEncryption
+ DSA Public Key:
+ pub:
+ 00:b4:8a:64:c1:f6:9a:c4:ba:c0:4e:d6:c5:b2:c4:
+ 1b:80:0b:4c:0e:aa:ff:98:c2:8b:ef:ca:f5:bc:d9:
+ b7:d2:87:2f:c9:00:52:3b:c7:23:a6:d8:66:2f:99:
+ 68:b3:ec:fe:2d:63:70:83:93:8d:48:cd:ec:c3:2f:
+ 5b:8e:41:d3:6c:00:fd:b7:a0:b6:20:be:2d:36:88:
+ 02:69:28:a7:9c:08:18:8a:7e:91:25:fc:77:13:96:
+ a9:3e:06:5e:5f:ea:19:8b:03:eb:0a:f2:3b:b4:81:
+ 4f:c4:76:fc:46:cc:e6:3c:80:e8:e4:43:a0:a2:ce:
+ 60:f5:d9:1d:a8:f8:d5:9c:e4
+ P:
+ 00:c0:46:1a:89:48:cb:d2:7c:6d:af:22:06:1e:16:
+ 60:70:ef:3c:af:9f:a1:f5:47:dc:65:ad:a3:60:c9:
+ 0a:b7:ee:b6:45:22:50:c3:6c:2a:bf:a9:94:e6:db:
+ 75:f8:58:7f:c0:1f:98:18:ec:47:af:0f:17:10:28:
+ cd:5a:04:33:23:0a:42:55:48:be:13:e1:9b:0b:42:
+ 02:09:0d:06:3a:ab:6f:06:fb:86:d1:77:85:08:2f:
+ 87:de:0e:7f:cf:df:d4:d8:f0:68:80:3c:94:1f:cf:
+ 3b:1f:4a:44:93:32:ba:06:0a:e8:71:0f:46:2a:f9:
+ e6:02:d3:46:2e:1b:79:75:f5
+ Q:
+ 00:9f:bb:32:4d:ea:56:27:10:b1:b1:47:1c:69:99:
+ b8:c0:da:85:86:77
+ G:
+ 00:b4:83:a7:c0:49:ba:c3:1f:95:33:94:ca:90:ce:
+ 1d:b7:48:06:2f:20:97:ce:c8:98:0f:ec:fa:33:fe:
+ 8d:71:c8:13:d4:23:06:a3:b3:a8:3a:71:33:53:16:
+ 5d:4a:db:04:00:6e:5c:c2:91:f8:13:95:ce:0c:46:
+ bd:bc:23:93:85:be:55:ca:99:6c:ac:ed:0a:01:7c:
+ 52:0f:d5:4a:42:a2:91:3f:ef:c5:09:a4:17:0d:83:
+ 5c:38:fe:65:58:3c:d6:eb:fc:b7:09:d7:b7:71:57:
+ 35:76:57:9e:cd:62:15:16:c0:c7:f7:e1:61:8e:a4:
+ 51:fd:8a:7a:05:53:a6:b5:77
+ Signature Algorithm: dsaWithSHA1
+ 30:2d:02:14:47:07:70:59:5f:63:e4:e7:90:bf:5a:8b:fe:3b:
+ 35:ea:ae:5a:a8:5e:02:15:00:80:bf:9c:e3:20:27:09:d0:62:
+ ad:9f:a6:d6:a3:f0:41:05:ff:56:61
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/certs/05.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,70 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 5 (0x5)
+ Signature Algorithm: dsaWithSHA1
+ Issuer: O=Symbian Software Ltd, CN=Root2-DSA
+ Validity
+ Not Before: Mar 3 16:34:42 2004 GMT
+ Not After : Aug 6 16:34:42 2020 GMT
+ Subject: O=Symbian Software Ltd, CN=OCSPSigner-R2
+ Subject Public Key Info:
+ Public Key Algorithm: dsaEncryption
+ DSA Public Key:
+ pub:
+ 33:65:12:70:85:96:46:5f:c4:d4:72:a3:0d:57:09:
+ 5a:09:28:af:05:0d:28:82:f1:57:a9:cc:70:b0:ec:
+ 7a:b4:7f:0c:6d:0a:20:d7:1f:08:3f:ec:89:72:c0:
+ a0:b8:8b:2e:b9:77:3a:99:f9:09:d6:70:3b:25:91:
+ 97:1a:9e:bd:0d:15:b6:a6:bc:ca:02:c5:f3:11:b9:
+ d1:22:f9:c1:2c:6b:a6:ff:fd:90:78:ee:4a:7e:d5:
+ e9:7d:25:16:f4:98:2d:1b:7a:e2:04:c9:dc:0e:80:
+ 4b:ce:3b:bd:a5:b8:a6:d6:58:54:eb:c4:96:3a:e0:
+ b9:cc:d5:05:10:8b:df:54
+ P:
+ 00:c0:46:1a:89:48:cb:d2:7c:6d:af:22:06:1e:16:
+ 60:70:ef:3c:af:9f:a1:f5:47:dc:65:ad:a3:60:c9:
+ 0a:b7:ee:b6:45:22:50:c3:6c:2a:bf:a9:94:e6:db:
+ 75:f8:58:7f:c0:1f:98:18:ec:47:af:0f:17:10:28:
+ cd:5a:04:33:23:0a:42:55:48:be:13:e1:9b:0b:42:
+ 02:09:0d:06:3a:ab:6f:06:fb:86:d1:77:85:08:2f:
+ 87:de:0e:7f:cf:df:d4:d8:f0:68:80:3c:94:1f:cf:
+ 3b:1f:4a:44:93:32:ba:06:0a:e8:71:0f:46:2a:f9:
+ e6:02:d3:46:2e:1b:79:75:f5
+ Q:
+ 00:9f:bb:32:4d:ea:56:27:10:b1:b1:47:1c:69:99:
+ b8:c0:da:85:86:77
+ G:
+ 00:b4:83:a7:c0:49:ba:c3:1f:95:33:94:ca:90:ce:
+ 1d:b7:48:06:2f:20:97:ce:c8:98:0f:ec:fa:33:fe:
+ 8d:71:c8:13:d4:23:06:a3:b3:a8:3a:71:33:53:16:
+ 5d:4a:db:04:00:6e:5c:c2:91:f8:13:95:ce:0c:46:
+ bd:bc:23:93:85:be:55:ca:99:6c:ac:ed:0a:01:7c:
+ 52:0f:d5:4a:42:a2:91:3f:ef:c5:09:a4:17:0d:83:
+ 5c:38:fe:65:58:3c:d6:eb:fc:b7:09:d7:b7:71:57:
+ 35:76:57:9e:cd:62:15:16:c0:c7:f7:e1:61:8e:a4:
+ 51:fd:8a:7a:05:53:a6:b5:77
+ X509v3 extensions:
+ OCSP No Check:
+
+ Signature Algorithm: dsaWithSHA1
+ 30:2c:02:14:32:6e:fc:d0:05:a3:03:80:de:36:ea:f3:0c:20:
+ 7f:34:1c:a3:3c:3f:02:14:5c:3c:e9:26:57:99:6a:24:f9:81:
+ d6:78:8a:bb:cd:e2:3b:e4:8b:00
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/certs/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,17 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/private/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/private/expired-r2.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----
+MIIBvAIBAAKBgQDARhqJSMvSfG2vIgYeFmBw7zyvn6H1R9xlraNgyQq37rZFIlDD
+bCq/qZTm23X4WH/AH5gY7EevDxcQKM1aBDMjCkJVSL4T4ZsLQgIJDQY6q28G+4bR
+d4UIL4feDn/P39TY8GiAPJQfzzsfSkSTMroGCuhxD0Yq+eYC00YuG3l19QIVAJ+7
+Mk3qVicQsbFHHGmZuMDahYZ3AoGBALSDp8BJusMflTOUypDOHbdIBi8gl87ImA/s
++jP+jXHIE9QjBqOzqDpxM1MWXUrbBABuXMKR+BOVzgxGvbwjk4W+VcqZbKztCgF8
+Ug/VSkKikT/vxQmkFw2DXDj+ZVg81uv8twnXt3FXNXZXns1iFRbAx/fhYY6kUf2K
+egVTprV3AoGBAJLJsaOv6pKl7OCDvy/8NZIH6nri9n99xZAHRRxLFvVQZspmTcKC
+0sLcesvf3vhM2eFvNty6ueKjOiH0FWms3y9RihMjZFYnbWOn32Uj11NFnIkQ1Sav
+Uqna8Xq6+JJf/LuZwAsalbSvJXUZzYNRWesdViuajjs02zOHvYfQKrz8AhR6I7Wy
+OTyaSnnd+ZbNKoTtn/acHw==
+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/private/good-r2.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/private/ocspsigner-r2.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/private/revoked-r2.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root2/private/unknown-r2.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/01.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,52 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 1 (0x1)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Feb 3 12:00:00 1982 GMT
+ Not After : Feb 3 12:00:01 1982 GMT
+ Subject: O=Symbian Software Ltd, CN=Expired-R5
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:d3:10:17:e4:19:39:27:f2:0a:ba:4e:5d:5f:8a:
+ 7d:43:f5:18:99:4a:16:5c:21:71:1f:5f:ff:44:5c:
+ 24:f1:89:ff:7b:60:b1:27:15:f5:42:a6:a9:15:61:
+ bb:04:a3:e3:b5:ef:9c:44:90:fd:a4:c8:2e:0d:1d:
+ 15:25:8c:cc:ea:ca:46:58:00:11:8d:35:ec:49:65:
+ a1:f5:ff:df:d5:8b:a6:bf:f2:ac:f1:bf:ff:04:e1:
+ 18:07:55:97:06:1c:75:b7:0f:bf:04:65:56:33:b5:
+ 6c:e4:11:c8:6d:88:43:f0:20:42:9c:18:67:c6:de:
+ f7:9f:9f:10:21:63:74:0d:91
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Extended Key Usage:
+ Code Signing
+ X509v3 Certificate Policies:
+ Policy: 1.2.826.0.1.1796587.1
+
+ Signature Algorithm: md5WithRSAEncryption
+ 59:ab:2d:9d:6f:6a:d4:b7:e7:2c:fe:e3:c6:15:ac:7b:aa:bf:
+ d0:40:96:d2:c3:44:e7:3c:46:33:ea:64:8b:2a:85:82:fc:89:
+ 43:05:de:fa:83:b1:94:83:09:1b:53:5c:54:ad:99:0a:8c:38:
+ e5:0b:d6:59:ca:c9:18:8d:8d:7a:35:04:0e:5e:36:b2:d8:a4:
+ a0:48:f5:92:ab:80:c5:30:b3:96:39:f3:1b:2e:d4:5d:47:cc:
+ c3:31:b0:cc:3b:2c:df:93:2d:34:b2:76:14:55:6c:59:ff:5f:
+ 97:f9:bc:68:ed:07:d9:1d:2c:73:70:1d:f5:30:ec:9f:a1:f8:
+ e0:ed
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/02.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,52 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 2 (0x2)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Mar 3 16:34:45 2004 GMT
+ Not After : Mar 1 16:34:45 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Good-R5
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:d6:5d:a1:96:59:9f:1c:b8:3d:78:c5:34:f0:c0:
+ e2:74:33:27:b4:de:68:f1:aa:2c:9b:e4:71:11:8b:
+ f0:61:b5:22:45:9a:c8:7d:80:2e:6b:b5:ff:2f:64:
+ ce:e6:de:65:ec:43:8b:1c:9c:61:63:2d:17:97:ed:
+ a6:48:5d:02:5f:ae:b8:45:29:99:90:0b:14:d6:4d:
+ 55:11:36:59:41:c6:c0:b2:38:6f:22:b8:71:17:a6:
+ 93:28:34:9a:96:88:d4:38:fb:47:29:19:94:38:b5:
+ 1b:af:2e:64:fc:18:ab:d3:f4:cf:0d:68:2c:c7:47:
+ a0:1a:57:a0:a5:18:29:7c:05
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Extended Key Usage:
+ Code Signing
+ X509v3 Certificate Policies:
+ Policy: 1.2.826.0.1.1796587.1
+
+ Signature Algorithm: md5WithRSAEncryption
+ 27:e6:f5:a6:55:4b:d0:89:28:a7:08:c6:a9:b2:86:73:a1:34:
+ 31:e1:90:ef:fa:73:4a:53:33:72:14:2b:44:19:49:2a:13:f6:
+ 00:fd:f8:c5:5f:c7:62:17:e3:7f:a4:fd:e3:ee:e3:11:de:49:
+ 8f:fb:70:95:ee:5a:05:96:ee:75:4a:c2:4f:dd:6b:de:a1:45:
+ c4:cf:33:58:a7:ea:f6:f4:dd:ae:4e:0a:c9:c2:ed:6f:5c:23:
+ ae:44:0b:65:af:c4:8e:e1:b6:78:9c:62:0d:d7:64:21:38:d8:
+ 91:f1:d0:e7:ca:62:b5:1f:12:69:00:4f:bc:6a:50:db:d6:df:
+ 56:fb
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/03.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,52 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 3 (0x3)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Mar 3 16:34:47 2004 GMT
+ Not After : Mar 1 16:34:47 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Revoked-R5
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:d9:bf:f3:b5:f0:ad:82:64:4d:c5:d4:e6:49:b0:
+ 2a:f0:fa:b9:2c:b1:47:12:c9:5c:fb:85:21:c6:35:
+ 89:dd:fb:03:01:e6:b7:ef:94:4d:14:60:f3:85:ff:
+ be:ef:87:8f:23:18:40:a9:99:3c:72:a8:44:81:22:
+ fe:2e:d7:a4:e5:00:48:4d:ed:a7:fc:68:07:6e:8f:
+ 78:67:7d:43:0b:80:b4:86:00:8e:55:5d:12:c4:d0:
+ e5:68:97:fe:3f:21:37:bb:b3:cd:23:2b:36:70:dd:
+ 3e:41:82:86:24:0a:56:59:5f:f4:4e:cd:08:39:5c:
+ 8a:5e:79:99:13:98:3f:37:f1
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Extended Key Usage:
+ Code Signing
+ X509v3 Certificate Policies:
+ Policy: 1.2.826.0.1.1796587.1
+
+ Signature Algorithm: md5WithRSAEncryption
+ 59:92:c7:0e:41:39:3a:9e:62:5a:28:7d:63:77:57:02:f0:66:
+ 32:00:91:4d:1b:c6:e1:fa:0e:31:bb:20:96:49:0a:36:71:48:
+ 1b:3c:19:40:ad:0d:56:b9:9e:c3:ed:e9:a5:d4:4a:af:40:c5:
+ ee:67:c8:06:a7:d7:bf:4c:40:8b:3e:0e:11:45:dc:3d:69:95:
+ 67:dc:2b:74:f1:d1:d5:75:15:d7:46:13:36:5b:b5:8d:b5:d1:
+ 28:35:41:fc:e1:a4:af:2b:1f:82:75:62:66:db:80:1f:87:96:
+ 8e:e7:f9:0c:e6:b6:d9:36:1d:68:ea:b4:33:7d:c3:97:1f:68:
+ 3f:af
+-----BEGIN CERTIFICATE-----
+MIICDDCCAXWgAwIBAgIBAzANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ0N1oXDTE0MDMwMTE2MzQ0N1owNDEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxEzARBgNVBAMTClJldm9rZWQtUjUwgZ8wDQYJKoZIhvcNAQEBBQADgY0A
+MIGJAoGBANm/87XwrYJkTcXU5kmwKvD6uSyxRxLJXPuFIcY1id37AwHmt++UTRRg
+84X/vu+HjyMYQKmZPHKoRIEi/i7XpOUASE3tp/xoB26PeGd9QwuAtIYAjlVdEsTQ
+5WiX/j8hN7uzzSMrNnDdPkGChiQKVllf9E7NCDlcil55mROYPzfxAgMBAAGjLzAt
+MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBYGA1UdIAQPMA0wCwYJKoY6AAHt02sBMA0G
+CSqGSIb3DQEBBAUAA4GBAFmSxw5BOTqeYloofWN3VwLwZjIAkU0bxuH6DjG7IJZJ
+CjZxSBs8GUCtDVa5nsPt6aXUSq9Axe5nyAan179MQIs+DhFF3D1plWfcK3Tx0dV1
+FddGEzZbtY210Sg1QfzhpK8rH4J1YmbbgB+Hlo7n+Qzmttk2HWjqtDN9w5cfaD+v
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/05.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,54 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 5 (0x5)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Mar 3 16:34:50 2004 GMT
+ Not After : Mar 1 16:34:50 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=Mid-R5
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:ab:91:02:0d:a3:d4:8c:8a:0b:16:e3:dc:88:c8:
+ a3:64:be:07:e9:b1:64:61:e4:0a:af:90:21:74:ef:
+ 20:a3:13:98:d0:df:c7:a0:c4:73:25:d4:84:19:e8:
+ 29:34:32:ca:1b:83:2b:20:87:20:e8:12:98:c0:ba:
+ f0:ff:c5:10:d2:f3:30:d5:f1:17:45:47:43:ef:26:
+ 63:2e:21:87:89:75:46:01:3a:5e:d7:bd:04:30:df:
+ 1e:5c:6d:f7:80:87:3a:8b:58:a3:a3:f7:f0:43:d1:
+ 12:93:d6:52:c7:23:f6:2b:87:d0:79:40:a3:7c:7e:
+ ec:ba:39:22:78:6d:39:06:41
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Key Usage: critical
+ Certificate Sign
+ X509v3 Basic Constraints: critical
+ CA:TRUE, pathlen:5
+ X509v3 Subject Key Identifier:
+ 7B:87:EE:22:1A:C5:10:17:A6:CD:C7:40:D2:F0:57:2E:AD:8E:51:B1
+ Signature Algorithm: md5WithRSAEncryption
+ a5:36:76:77:f2:fb:e4:ad:bb:9d:46:39:9b:d2:bd:1c:ea:00:
+ b9:0d:e9:a0:45:4b:33:6c:a2:f5:fe:d0:e0:e5:5e:29:85:0b:
+ af:1d:4a:16:e2:ba:8d:14:91:75:b5:ba:97:84:c3:a4:fa:76:
+ 76:d3:3d:6b:68:5a:af:bf:da:c5:70:94:0c:1f:ae:06:bd:67:
+ 67:7f:9a:c2:e0:a5:7c:fe:b9:0b:a5:3a:4b:3e:7c:75:6e:b7:
+ 63:18:3e:e4:69:fa:9f:de:c9:4a:4a:58:90:cb:da:94:37:6e:
+ 0c:7f:7d:da:5e:51:a3:01:4b:88:0a:88:17:b4:e2:13:66:c3:
+ 3f:0c
+-----BEGIN CERTIFICATE-----
+MIICHjCCAYegAwIBAgIBBTANBgkqhkiG9w0BAQQFADAzMR0wGwYDVQQKExRTeW1i
+aWFuIFNvZnR3YXJlIEx0ZDESMBAGA1UEAxMJUm9vdDUtUlNBMB4XDTA0MDMwMzE2
+MzQ1MFoXDTE0MDMwMTE2MzQ1MFowMDEdMBsGA1UEChMUU3ltYmlhbiBTb2Z0d2Fy
+ZSBMdGQxDzANBgNVBAMTBk1pZC1SNTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC
+gYEAq5ECDaPUjIoLFuPciMijZL4H6bFkYeQKr5AhdO8goxOY0N/HoMRzJdSEGegp
+NDLKG4MrIIcg6BKYwLrw/8UQ0vMw1fEXRUdD7yZjLiGHiXVGATpe170EMN8eXG33
+gIc6i1ijo/fwQ9ESk9ZSxyP2K4fQeUCjfH7sujkieG05BkECAwEAAaNFMEMwDgYD
+VR0PAQH/BAQDAgIEMBIGA1UdEwEB/wQIMAYBAf8CAQUwHQYDVR0OBBYEFHuH7iIa
+xRAXps3HQNLwVy6tjlGxMA0GCSqGSIb3DQEBBAUAA4GBAKU2dnfy++Stu51GOZvS
+vRzqALkN6aBFSzNsovX+0ODlXimFC68dShbiuo0UkXW1upeEw6T6dnbTPWtoWq+/
+2sVwlAwfrga9Z2d/msLgpXz+uQulOks+fHVut2MYPuRp+p/eyUpKWJDL2pQ3bgx/
+fdpeUaMBS4gKiBe04hNmwz8M
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/07.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,49 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 7 (0x7)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Mar 3 16:34:52 2004 GMT
+ Not After : Aug 6 16:34:52 2020 GMT
+ Subject: O=Symbian Software Ltd, CN=OCSPSigner-R5
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:a8:95:e1:f6:c6:50:e3:7e:09:ac:84:e5:78:51:
+ 71:27:50:c4:43:d5:80:55:c9:00:40:35:c4:d6:70:
+ 87:86:85:56:2e:0d:c6:91:ee:a8:5c:4a:c8:cf:d1:
+ d4:42:34:be:90:4e:09:d4:58:e6:da:cf:e3:0c:ca:
+ b1:19:7a:8a:a9:5f:7c:59:f7:be:64:07:f6:81:7b:
+ 51:de:53:9b:bd:7c:f3:c0:1f:e3:fd:b1:b5:0f:33:
+ 49:c1:32:3f:1d:b5:dc:6c:8b:c5:a3:c6:28:67:77:
+ ad:61:e2:23:4a:e5:1e:51:11:26:d6:49:5a:6b:67:
+ 12:f4:d3:d3:47:24:68:f6:9f
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ OCSP No Check:
+
+ Signature Algorithm: md5WithRSAEncryption
+ 59:79:91:29:ad:29:3b:2d:6a:14:2a:07:be:76:60:82:b0:4a:
+ ab:a0:f8:e6:89:07:49:d6:75:2b:66:1d:a6:ea:0c:bd:2f:4d:
+ 81:57:10:3d:bf:4d:ab:b2:6d:d8:bd:82:dd:c6:3b:51:80:39:
+ 66:7e:8b:b0:f8:f9:90:06:c6:65:33:49:af:e7:58:b0:66:1b:
+ 10:fa:00:52:a5:d0:3b:e3:75:3b:d9:d2:77:85:e5:c6:fe:c5:
+ e6:42:32:2c:82:eb:be:ab:f1:e0:f3:91:6b:49:c7:54:b8:9a:
+ c4:b6:33:83:c5:98:f4:28:fc:76:ff:21:c1:81:b0:40:11:75:
+ 3d:8c
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/08.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,51 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 8 (0x8)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Mar 3 16:34:54 2004 GMT
+ Not After : Mar 1 16:34:54 2014 GMT
+ Subject: O=Symbian Software Ltd, CN=GoodAIA-R5
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:e2:8f:16:ec:7c:f4:ae:d4:ed:fd:68:c8:21:e1:
+ 33:47:cd:d6:75:7b:84:9f:38:48:19:ef:d1:d0:aa:
+ 34:a1:6a:19:f9:90:c7:99:ea:14:a3:76:67:7e:b6:
+ 22:02:5f:aa:bb:e5:31:51:3a:5b:0a:b0:a5:e1:ec:
+ 68:19:62:4f:9e:18:8e:61:ed:24:6f:05:87:50:1c:
+ 06:9a:79:82:cd:b3:0f:d0:3f:63:ee:49:72:da:ab:
+ 3a:ea:bc:00:f0:87:07:a2:de:49:50:cd:1d:83:bc:
+ 30:20:3e:ff:50:b0:79:4c:bd:7d:0a:03:e9:64:a1:
+ d3:71:e4:64:5b:82:b9:ed:05
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ Authority Information Access:
+ OCSP - URI:http://cam-ocsptest01.intra:19003
+
+ Signature Algorithm: md5WithRSAEncryption
+ 9b:46:1c:54:29:41:ed:17:46:69:e4:6e:34:e9:6a:ed:e2:7f:
+ 3b:db:5a:fe:ad:1c:4f:07:77:70:52:57:91:57:c8:92:f6:a6:
+ 39:1e:d9:f6:4d:14:98:3a:b6:63:af:a1:9a:f6:ba:0d:78:e1:
+ 4a:92:c5:e3:4b:19:88:40:0f:4f:e1:46:2c:5c:f1:12:c5:c7:
+ 14:67:94:64:0a:3d:88:0c:a9:d4:10:35:f7:77:e8:7e:55:6f:
+ f1:f2:d1:f4:0e:d3:79:d7:d2:a4:d3:5d:53:e9:f9:b1:cf:d6:
+ 1c:38:74:1e:83:b5:92:47:5f:8c:50:38:78:75:9f:e0:45:f5:
+ a0:21
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/09.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,46 @@
+Certificate:
+ Data:
+ Version: 1 (0x0)
+ Serial Number: 9 (0x9)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: O=Symbian Software Ltd, CN=Root5-RSA
+ Validity
+ Not Before: Mar 3 16:34:55 2004 GMT
+ Not After : Aug 6 16:34:55 2020 GMT
+ Subject: O=Symbian Software Ltd, CN=cam-ocsptest01.intra
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:b2:4e:0f:6d:9b:fa:5c:7c:a3:cb:94:a5:97:b0:
+ 03:27:bf:49:3d:56:ab:a4:03:11:62:82:d4:c7:da:
+ 1c:e3:57:78:b8:9b:b5:9f:70:a8:0e:33:9d:e7:3c:
+ 16:bb:04:af:d9:28:fd:36:4b:c9:5d:7c:d1:02:ba:
+ 8f:e4:aa:b9:f1:97:7b:84:a1:88:4e:32:fb:37:f9:
+ ec:b8:c4:a2:77:81:de:b2:8c:17:4e:1b:29:4d:e4:
+ 7b:33:fe:1f:71:cf:04:00:f6:2b:f3:53:04:7d:1d:
+ 27:2e:3e:74:17:a1:4f:7f:0d:1a:b9:3f:23:10:8d:
+ 19:cc:62:95:5b:d2:6f:d8:91
+ Exponent: 65537 (0x10001)
+ Signature Algorithm: md5WithRSAEncryption
+ 74:e6:5f:15:e6:40:17:79:58:34:a4:e9:fd:bd:88:2c:4e:58:
+ d9:66:85:b7:39:9a:c1:3b:05:66:93:6b:66:3a:f0:e5:bd:cc:
+ 67:7e:7f:65:71:af:34:86:3c:06:d8:c4:7a:12:de:ea:fb:0d:
+ 93:ef:55:30:a0:5a:9d:77:0d:c0:b3:f8:2a:8a:a5:01:6d:20:
+ bf:76:f1:7e:1e:0c:5d:b0:40:cd:99:89:6c:ca:37:b9:ec:d8:
+ aa:b0:bf:89:b9:80:d0:2f:80:f1:88:57:78:4e:61:9a:3e:87:
+ b8:ab:f1:63:42:3a:10:e3:c4:1a:8e:d5:93:62:7a:4e:31:57:
+ 9b:4a
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/certs/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/apache-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/expired-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/good-m5.cert.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,13 @@
+
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/good-m5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/good-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/goodaia-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/mid-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/ocspsigner-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/revoked-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/testcertificates/openssl/root5/private/unknown-r5.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca1-entity1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca1-entity2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca1-entity3.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca1-root.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca2-entity1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca2-entity2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca2-entity3.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ca2-root.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-1-1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-1-1_good.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-1-1_respsign.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-1-1_revoked.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-1-1_unknown.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-dsa-1-1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-dsa-1-1_good.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-dsa-1-1_respsign.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-dsa-1-1_revoked.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadelg-dsa-1-1_unknown.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadirect-dsa_good.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadirect-dsa_revoked.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadirect-dsa_unknown.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadirect-rsa_good.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadirect-rsa_revoked.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/cadirect-rsa_unknown.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ee_with_aia.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ee_withaia_19005.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ee_withaia_19006.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ee_without_aia.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/ica_cert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/rootcadelg-dsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/rootcadelg-rsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/rootcadirect-dsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/openssl/der/rootcadirect-rsa.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/valicert/der/tocsp_valicert1_rsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-expired-r1.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-expired-r5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-good-m5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-good-r1.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-good-r5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-goodaia-r5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-mid5-rsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-revoked-r1.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-revoked-r5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-root5-rsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-signing5-rsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-suspended-r1.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-suspended-r5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-unknown-r1.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp-unknown-r5.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_good_r2.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_revoked_r2.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_root1_rsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_root2_dsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_signing1_rsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_signing2_dsa.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_suspended_r2.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/certificates/xcert/der/tocsp_unknown_r2.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tocsp/responses/r5_key.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/authorityinfoaccess.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+0"0 +0†http://ocsp.my.host/
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/basicconstrains.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+0ÿ
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/extkeyusage.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,2 @@
+0
++
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/issueraltname.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+0my@other.address
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/keyusage.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/newdsa2048.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/newdsa512.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/newrsa2048.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/newrsa512.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_ext_dsasha1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_ext_rsamd2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_ext_rsamd5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_ext_rsasha1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_rsamd2_512.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_rsamd5_512.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_rsasha1_2048_2attr.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_rsasha1_512.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_rsasha1_512_1attr.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/os_req_rsasha1_512_2attr.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs10/testdata/subjectaltname.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+0my@other.address‡À¨
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb002_friendlyname.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb002_localkeyid.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_friendlyname_firstcert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_friendlyname_firstkey.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_friendlyname_firstshrouded.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_friendlyname_secondcert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_friendlyname_secondkey.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_friendlyname_secondshrouded.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_localkeyid_firstcert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_localkeyid_firstkey.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_localkeyid_firstshrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_localkeyid_secondcert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_localkeyid_secondkey.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb004_localkeyid_secondshrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_friendlyname_firstcertbag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_friendlyname_firstkey.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_friendlyname_firstshrouded.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_friendlyname_secondcert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_friendlyname_secondkey.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_friendlyname_secondshrouded.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_localkeyid_firstcertbag.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_localkeyid_firstkey.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_localkeyid_firstshrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_localkeyid_secondcert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_localkeyid_secondkey.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb005_localkeyid_secondshrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb006_friendlyname_firstcert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb006_friendlyname_firstkey.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb006_friendlyname_firstshrouded.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb006_localkeyid_firstcert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb006_localkeyid_firstkey.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/cb006_localkeyid_firstshrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/digestchangedmac.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+½3â@õ¿‘ÍêyÊšê•°a
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/digestchangedmacsalt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+o…]<aL
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/friendlyname.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/friendlyname_ct001.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/friendlyname_im001.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/friendlyname_im002.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/friendlyname_pm001.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/friendlyname_pm001_shrouded.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/im002_mac.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+‡LJ7Z¾ZÇØhó2
Jh8
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/im002_macsalt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+•]b™Ó1PW
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_cert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_ct001.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ 8÷c ¾Îô{’ÿk¢‘ìíÍY
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_im001.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_im002.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+˜¯ŠQj?ü fýªôðÊ6
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_pm001.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_pm001_shrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/localkeyid_shrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomattributes.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomauthsafedata.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomcertbag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomcrlbag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomkeybag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oommacdata.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomsafebag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomsafecontentsbag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomsecretbag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/oomshroudedkeybag.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pkcs12_digestalgnotsha1_mac.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ËæöMÐÇ+WŠÑVR´
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pkcs12_digestalgnotsha1_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+o…]<aL
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pm006_friendlyname_cert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pm006_friendlyname_shrouded.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pm006_localkeyid_cert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pm006_localkeyid_shrouded.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÞnÒXþ€U²éÚ“Paíæß
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pm006_mac.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/pm006_macsalt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+o…]<aL
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/root5_ee.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/root5ca.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/root5ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/root5ca_key.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/root5ca_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_10.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_3.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_4.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_5.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_6.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_7.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_8.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb001.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb002_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb002_2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb003_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb003_2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb004_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb004_2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb005_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb005_2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_cb006_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm001.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm002.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm003.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm004.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm005.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm006.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm007.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm008.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/safebag_shrouded_pm010.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/data/sdsicert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+hjgfjkdgfksdgfksdgfdjkfaghklsfghsdkfhdkfhsdkhfkasdhfkasdhfk
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/testdatainput/mycert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/testdatainput/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/testdatainput/root5crl.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs12intgrtn/testdatainput/sdsicert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+hjgfjkdgfksdgfksdgfdjkfaghklsfghsdkfhdkfhsdkhfkasdhfkasdhfk
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_cert_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_cert_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_key_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_key_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_cert_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_cert_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_cert_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_cert_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_cert_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_cert_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_key_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_key_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_key_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_key_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_key_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_dsa_len1/int_cms_dsa_key_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_cert_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_cert_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_key_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_key_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_cert_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_cert_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_cert_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_cert_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_cert_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_cert_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_key_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_key_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_key_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_key_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_key_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cert_rsa_len1/int_cms_rsa_key_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/cms_add_rsa_cert_is.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/corruptattributecert.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+Symbian OS is the global industry standard
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/corruptattributecert_noseq.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_cert_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_cert_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_cert_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_cert_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_cert_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_cert_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_key_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_key_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_key_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_key_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_key_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_dsa_key_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_cert_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_cert_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_cert_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_cert_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_cert_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_cert_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_key_1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_key_1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_key_2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_key_2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_key_3_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_cms_rsa_key_3_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_dsa_2_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_dsa_3_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_dsa_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_rsa_2_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_rsa_3_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/int_rsa_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_dsa_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_dsa_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md5_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md5_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_attributecert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_attributes.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_nocert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_nosignerinfo.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_unsignedattributes.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_dsa_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_dsa_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md2_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md5_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md5_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_rsa_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_1_detached_rsa_sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_algorithmoid.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_block.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_certsettag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_content_tag_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_contentoid.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_datacontent.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_encapcontent_tag_1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_encapcontent_tag_2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_encapcontentoid.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_excerttag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_length.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_signature.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_signdataversion.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_corrupt_signinfoversion.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_data.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+09 *†H†÷ ,*Symbian OS is the global industry standard
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_data_corrupt_class.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+09 *†H†÷ ,Ä*Symbian OS is the global industry standard
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_data_corrupt_tag.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+09 *†H†÷ ,*Symbian OS is the global industry standard
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_multi_2_attached_dsais_rsaki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_multi_2_attached_rsaki_dsais.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_multi_2_attached_rsakimd5_dsais.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cms_multi_2_attached_rsakimd5_dsais_addcert.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cmsauthdata.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cmsdigestdata.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cmsencryteddata.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/cmsenvelopeddata.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_authenticated_data.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_12rsa_3dsa_certdetach_md2md5sha1_1ki_23is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certattach_md2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certattach_md2md5sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certattach_md5_13ki_2is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1_is_x509.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1md2md5_is_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certattach_rsa_md5_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certattach_rsa_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_is_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_rsa_md2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_rsa_sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_12rsa_3_dsa_certdetach_sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_12rsa_3dsa_certdetach_1md2_2md5_3sha1_1ki_23is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3dsa_certattach_3sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3dsa_certdetach_sha1_is_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_12sha1_3md5_1ki_23is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_3md2_12ki_3is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_sha1_is_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certdattach_md5_13ki_2is_.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certdetach_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_certattach_rsa_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_certdetach_rsa_md2_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certattach_sha1_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certattach_sha1_is_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certdetach_sha1_ki.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certdetach_sha1_ki_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_rsa_certattach_md5_is.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_datadetached_rsa_certdetach_sha1_is_attribute.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_digested.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_encrypted.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_enveloped.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_plain_data.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+0 *†H†÷
1234
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_1_signed_and_enveloped_data.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_cms_invalid_attr_cert_value_2.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_large_data.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1091 @@
+0‚Ãú *†H†÷ ‚Ãë‚ÃçThis data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+This data is to test symbian CMS plain data
+The end.....
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/cms/results/int_small_data.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+0 *†H†÷
1234
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digest_sha1.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ÿÆ®ä]Àt˜@¯p(+iB°
Ä
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digestinfo_digest_notoctetstring.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digestinfo_md5alg.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digestinfo_negalgtag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digestinfo_nodigest.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digestinfo_sha1.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/digestinfo_unsupportedalg.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/encrypteddata_versiontag.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/encrypteddata_withoutsalt.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/encrypteddata_withoutsalt_content.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/notencrypteddata.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/pkcs7_digest_md5alg.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+òlÔ,—ëhÀ×µ•ï»í
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/pkcs7_encryptedneg_contenttype.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/pkcs7_encryptedneg_nocontsalt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/pkcs7_encryptedneg_noencryptedcon.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/pkcs7_encryptedneg_version.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and128bitrc2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and128bitrc2_encryptedcontent.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and128bitrc2_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and128bitrc4.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and128bitrc4_encryptedcontent.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,4 @@
+‹Ë‰ƒ»º‡4ºgòQ$+$ËÏJÒRHPõ>»7OAGÍá¦tIÜ:}ŒsÓJT¦Ñl\0/¢Gµé‚lGñ@¢§«Ã\çŽÊáOÐeÇaœÅê>O¾ãkør¦i™oÁ¿._¥FpœÚE¯
+ñQE[V—4”µNõim D9ð³ÊC]¬+ܨÚF¿›”¢ûõzsžkL“^•Ä½ÕóPÃè4+<&©½rÐ,òºN8;Ž§íÑBæ€3‡eL 2‘¡^zÇSðép†Ó/rÜïëÎê—=1ÜÙe8±z¼¥U·¹`èlížH¹øÆ?ªÇŒÛŒS–òGjRvç¢îQ[äL×!Y!°Ôc-Îè7Œg³'*Nb£ÔË%=oÇHÔRhô•Qù<ˆhéŒM‡ÔÛO5Œc~ðò,¤dÂÕ!\ï]Up÷;ªN„-idðî´ÛÑä?âíðÒxÜômxÏÛ%
+I®>îÊ^–œ¥®Ð‚l×ømšýìG8”7´js¹ó¶í¦Ç˜ýÎÔú¬WlTpŒ¥Fß‹¬*P‡gIZbÏ’wãÂÂêô[:åù¦#ܹ9"Ý
+ieâ<Š¿c„År‹Š3„“ä¹Sú2øYCÙøÑó·¤\ÂÖ÷o¤!V…Ó»LЈ 4Eå‡È×4®½pæþ(ƒÓ9aÓcx£è
ØÐ2.»ÂäÀ@ï¥+È0*n(zqAÁZ!BG”F•:FWšx¤"ITzéOKìVáy’W\/þ€d˜‚˜Òa¯sIUP[dX8&fDP§f‹oPt);U
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and128bitrc4_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and2_keytripledes.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and2_keytripledes_encryptedcontent.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and2_keytripledes_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and3_keytripledes_cbc.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and3_keytripledes_cbc_encryptedcontent.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,6 @@
+lçlÒ@aôCë6³Æù’@Uäd+úö¯*9¹ð±QQ|£4ø?óÚbju³j/̤Ÿ{lªž¸T†^æ½K¬bn(UÒ:™OÍp–]j€ÆàÏK!`‰Åm«3A^ö¥"|ÑÞƒjmG/Är™45ô÷ˆe+=å“÷^‰ñ)vúFÒ;ܯ l¡üÂC¹£áôXO|Æʈ\ɾC€¯oŸÿê¦# PîÙ¬)RË’ûqÐÔŠ$m¾Þ÷Ý¡xÅú£\nñg /Ÿ%&ÜØs²ó8¶Á ]—Lîàñ¨Ïœ··¼øGáŠCwû±±QÆÞ\Z@@©öú
+Ê«…KOâ¸UNÞ
°½”È+^ï8î&–rÞ*¾N’ÑGB÷à£ZW)N
+ö±2u*ÉT}‚ÝxÔ¤rdíÕâÂÓÒòûäD,Ž3]÷ìÞVrG2CRQg}Çt¯ž;‚‘-ë,Ûq¦Ç f™†8¾\,ÊqåŽÿ¦õLÐL—R©Ç7R^‘@î43ŸÚKb’U9È$QaFfFt]m2cµ6$ÙqyNŒ
J—Ðÿåaò}*åYªäGÕ]Ñm̬éù×Dž°ÄKx~¿¬bVX
ëR
+O©ƒŸ:‡ææFK6üøµ±™2<¦Ëê>î.EÎ6¹ ÿ&Ès%ŸN Z„ôÂ×ïGfå,9©t‡â`á#E„Ö
+h¥¡˜££Ò]’¿¥ëF^^1 C9È·Ó‰ZNàXè´™×!¿ÒÝM^ÚóÌý³þ(Ì~ Î"ëýõ½¯"ƒO$%ùßp
+TW÷Ý#7”ÉŠ›D.y¿”oç
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and3_keytripledes_cbc_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and40bitrc2_cbc.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and40bitrc2_cbc_encryptedcontent.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and40bitrc2_cbc_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and40bitrc4.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and40bitrc4_encryptedcontent.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/data/sha1and40bitrc4_salt.der Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+îC(.ÿùÔ
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/128bit_rc2/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/128bit_rc4/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/2key_tripledes/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/3key_tripledes/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/40bit_rc2/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/40bit_rc4/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/contenttype_notdata/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/digest_negalgtag/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/digest_negdigesttag/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/digestinfo_withoutdigest/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/md5_digestalg/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/noencryptedcontent/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/notencrypteddata/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/sha1_digestalg/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/unsupported_digestalg/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/versiontag_changed/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkcs7/testdatainput/withoutencryptparams/root5ca.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/bmpstring/cacert_bmp.crt has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/bmpstring/eecert_bmp.crt has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/critical_extns/ee_critical_extns.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/critical_extns/intermediate_critical_extns.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/critical_extns/root.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/invalidaltname/invalidaltname.crt has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/pkixtestdata/validation/invalidaltname/root.crt has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert/testdata.zip has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_ee.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=001 End Entity
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.2=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_ee.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_im1.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=001 Intermediate 1
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.2=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.3=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_im1.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_im2.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=001 Intermediate 2
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.3=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.4=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_im2.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_rc.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=001 Root Cert
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.4=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/001_rc.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_ee.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,33 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=002 End Entity
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+policyMappings=critical,@policy_mappings
+extendedKeyUsage=critical,codeSigning
+1.2.826.0.1.1796587.1.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1796587.1.1.1.4=critical,DER:30:06:02:04:11:00:00:06
+1.2.826.0.1.1796587.1.1.1.5=critical,DER:30:06:02:04:70:00:00:01
+1.2.826.0.1.1796587.1.1.1.6=critical,DER:03:04:04:7F:FF:F0
+certificatePolicies=critical,1.2.3.4,@polsect
+policyConstraints=critical,inhibitPolicyMapping:0
+nameConstraints=critical,permitted;email:some.one@symbian.com
+basicConstraints=critical,CA:TRUE
+keyUsage=critical,keyCertSign
+subjectAltName=critical,email:some.one@symbian.com
+inhibitAnyPolicy=critical,1
+
+[polsect]
+
+policyIdentifier = 1.3.5.8
+CPS.1="http://my.host.name/";
+CPS.2="http://my.your.name/";
+
+[policy_mappings]
+1.3.6.1.4.1.25054.1.2.101=1.3.6.1.4.1.24019.1.1.1.11
+1.3.6.1.4.1.25054.1.2.102=1.3.6.1.4.1.24019.1.1.1.12
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_ee.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_im1.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,33 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=002 Intermediate Cert 1
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+policyMappings=critical,@policy_mappings
+extendedKeyUsage=critical,codeSigning
+1.2.826.0.1.1796587.1.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1796587.1.1.1.4=critical,DER:30:06:02:04:11:00:00:06
+1.2.826.0.1.1796587.1.1.1.5=critical,DER:30:06:02:04:70:00:00:01
+1.2.826.0.1.1796587.1.1.1.6=critical,DER:03:04:04:7F:FF:F0
+certificatePolicies=critical,1.2.3.4,@polsect
+policyConstraints=critical,inhibitPolicyMapping:0
+nameConstraints=critical,permitted;email:some.one@symbian.com
+basicConstraints=critical,CA:TRUE
+keyUsage=critical,keyCertSign
+subjectAltName=critical,email:some.one@symbian.com
+inhibitAnyPolicy=critical,1
+
+[polsect]
+
+policyIdentifier = 1.3.5.8
+CPS.1="http://my.host.name/";
+CPS.2="http://my.your.name/";
+
+[policy_mappings]
+1.3.6.1.4.1.25054.1.2.101=1.3.6.1.4.1.24019.1.1.1.11
+1.3.6.1.4.1.25054.1.2.102=1.3.6.1.4.1.24019.1.1.1.12
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_im1.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_im2.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,33 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=002 Intermediate Cert 2
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+policyMappings=critical,@policy_mappings
+extendedKeyUsage=critical,codeSigning
+1.2.826.0.1.1796587.1.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1796587.1.1.1.4=critical,DER:30:06:02:04:11:00:00:06
+1.2.826.0.1.1796587.1.1.1.5=critical,DER:30:06:02:04:70:00:00:01
+1.2.826.0.1.1796587.1.1.1.6=critical,DER:03:04:04:7F:FF:F0
+certificatePolicies=critical,1.2.3.4,@polsect
+policyConstraints=critical,inhibitPolicyMapping:0
+nameConstraints=critical,permitted;email:some.one@symbian.com
+basicConstraints=critical,CA:TRUE
+keyUsage=critical,keyCertSign
+subjectAltName=critical,email:some.one@symbian.com
+inhibitAnyPolicy=critical,1
+
+[polsect]
+
+policyIdentifier = 1.3.5.8
+CPS.1="http://my.host.name/";
+CPS.2="http://my.your.name/";
+
+[policy_mappings]
+1.3.6.1.4.1.25054.1.2.101=1.3.6.1.4.1.24019.1.1.1.11
+1.3.6.1.4.1.25054.1.2.102=1.3.6.1.4.1.24019.1.1.1.12
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_im2.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_rc1.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,11 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=002 Root Cert 1
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_rc1.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_rc2.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,33 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=002 Root Cert 2
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+policyMappings=critical,@policy_mappings
+extendedKeyUsage=critical,codeSigning
+1.2.826.0.1.1796587.1.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1796587.1.1.1.4=critical,DER:30:06:02:04:11:00:00:06
+1.2.826.0.1.1796587.1.1.1.5=critical,DER:30:06:02:04:70:00:00:01
+1.2.826.0.1.1796587.1.1.1.6=critical,DER:03:04:04:7F:FF:F0
+certificatePolicies=critical,1.2.3.4,@polsect
+policyConstraints=critical,inhibitPolicyMapping:0
+nameConstraints=critical,permitted;email:some.one@symbian.com
+basicConstraints=critical,CA:TRUE
+keyUsage=critical,keyCertSign
+subjectAltName=critical,email:some.one@symbian.com
+inhibitAnyPolicy=critical,1
+
+[polsect]
+
+policyIdentifier = 1.3.5.8
+CPS.1="http://my.host.name/";
+CPS.2="http://my.your.name/";
+
+[policy_mappings]
+1.3.6.1.4.1.25054.1.2.101=1.3.6.1.4.1.24019.1.1.1.11
+1.3.6.1.4.1.25054.1.2.102=1.3.6.1.4.1.24019.1.1.1.12
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/002_rc2.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/003_ee.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,11 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=003 End Entity
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/003_ee.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/003_rc.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,11 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=003 and 004 Root Cert
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/003_rc.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/004_ee.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,10 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=004 End Entity
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/004_ee.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/009_ee.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,34 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=009 End Entity
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+policyMappings=critical,@policy_mappings
+extendedKeyUsage=critical,codeSigning
+1.2.826.0.1.1796587.1.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+1.2.826.0.1.1796587.1.1.1.4=critical,DER:30:06:02:04:11:00:00:06
+1.2.826.0.1.1796587.1.1.1.5=critical,DER:30:06:02:04:70:00:00:01
+1.2.826.0.1.1796587.1.1.1.6=critical,DER:03:04:04:7F:FF:F0
+certificatePolicies=critical,1.2.3.4,@polsect
+policyConstraints=critical,inhibitPolicyMapping:0
+nameConstraints=critical,permitted;email:some.one@symbian.com
+basicConstraints=critical,CA:FALSE
+keyUsage=critical,keyCertSign
+subjectAltName=critical,email:some.one@symbian.com
+inhibitAnyPolicy=critical,1
+1.2.826.0.1.1.1796587.1.1.1=critical,DER:30:16:0C:14:31:31:31:31:31:31:31:31:2D:32:32:32:32:32:32:2D:33:2D:34:34
+
+[polsect]
+
+policyIdentifier = 1.3.5.8
+CPS.1="http://my.host.name/";
+CPS.2="http://my.your.name/";
+
+[policy_mappings]
+1.3.6.1.4.1.25054.1.2.101=1.3.6.1.4.1.24019.1.1.1.11
+1.3.6.1.4.1.25054.1.2.102=1.3.6.1.4.1.24019.1.1.1.12
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/009_ee.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/009_rc.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,11 @@
+[req]
+prompt = no
+distinguished_name = req_distinguished_name
+
+[req_distinguished_name]
+CN=009 to 022 Root Cert
+OU=Symbian Software Ltd
+emailAddress=some.one@symbian.com
+
+[v3_ca]
+basicConstraints=critical,CA:TRUE
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/009_rc.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/datetime_0001_endentity.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/datetime_0001_root.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/fulltrust.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/makecert.bat Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,137 @@
+@rem
+@rem Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description:
+@rem
+
+REM days default is 30 and generated on 13/03/2008
+
+REM *** SEC-CERTMAN-DATETIME-001 ***
+REM - Root Cert
+
+openssl req -newkey rsa:1024 -keyform PEM -keyout datetime_0001_root_key.pem -subj "/O=Symbian/CN=datetime_0001_root" -nodes -config openssl.cfg -out datetime_0001_root_req.pem -outform PEM
+openssl x509 -req -inform PEM -in datetime_0001_root_req.pem -signkey datetime_0001_root_key.pem -outform PEM -out datetime_0001_root.pem -days 60
+openssl x509 -inform PEM -in datetime_0001_root.pem -outform DER -out datetime_0001_root.der
+
+
+
+REM - End Entity
+
+openssl req -newkey rsa:1024 -keyform PEM -keyout datetime_0001_endentity_key.pem -subj "/O=Symbian/CN=datetime_0001_ee" -nodes -config openssl.cfg -out datetime_0001_endentity_req.pem -outform PEM
+openssl x509 -req -inform PEM -in datetime_0001_endentity_req.pem -CA datetime_0001_root.pem -CAkey datetime_0001_root_key.pem -CAcreateserial -outform PEM -out datetime_0001_endentity.pem
+openssl x509 -inform PEM -in datetime_0001_endentity.pem -outform DER -out datetime_0001_endentity.der
+
+
+
+REM *** SEC-CERTMAN-CRITEXT-001 ***
+REM - Root Cert
+
+openssl req -newkey rsa:512 -nodes -out 001_rc.pem -keyout 001_rc.key.pem -config 001_rc.cfg -days 3650
+openssl x509 -req -days 3650 -in 001_rc.pem -signkey 001_rc.key.pem -out 001_rc.pem -extfile 001_rc.cfg -extensions v3_ca
+openssl x509 -inform PEM -in 001_rc.pem -outform DER -out 001_rc.der
+
+
+REM - Intermediate 2 Cert
+
+openssl req -newkey rsa:512 -nodes -out 001_im2.pem -keyout 001_im2.key.pem -config 001_im2.cfg -days 3650
+openssl x509 -req -in 001_im2.pem -out 001_im2.pem -CA 001_rc.pem -CAkey 001_rc.key.pem -days 3650 -CAserial 001_rc.srl -CAcreateserial -extfile 001_im2.cfg -extensions v3_ca
+openssl x509 -inform PEM -in 001_im2.pem -outform DER -out 001_im2.der
+
+
+REM - Intermediate 1 Cert
+
+openssl req -newkey rsa:512 -nodes -out 001_im1.pem -keyout 001_im1.key.pem -config 001_im1.cfg -days 3650
+openssl x509 -req -in 001_im1.pem -out 001_im1.pem -CA 001_im2.pem -CAkey 001_im2.key.pem -days 3650 -extfile 001_im1.cfg -extensions v3_ca -CAserial 001_im2.srl -CAcreateserial
+openssl x509 -inform PEM -in 001_im1.pem -outform DER -out 001_im1.der
+
+
+REM - End Entity Cert
+
+openssl req -newkey rsa:512 -nodes -out 001_ee.pem -keyout 001_ee.key.pem -config 001_ee.cfg -days 3650
+openssl x509 -req -in 001_ee.pem -out 001_ee.pem -CA 001_im1.pem -CAkey 001_im1.key.pem -days 3650 -extfile 001_ee.cfg -extensions v3_ca -CAserial 001_im1.srl -CAcreateserial
+openssl x509 -inform PEM -in 001_ee.pem -outform DER -out 001_ee.der
+
+
+REM *** SEC-CERTMAN-CRITEXT-002 ***
+REM - Root Cert 1
+
+openssl req -newkey rsa:512 -nodes -out 002_rc1.pem -keyout 002_rc1.key.pem -config 002_rc1.cfg -days 3650
+openssl x509 -req -days 3650 -in 002_rc1.pem -signkey 002_rc1.key.pem -out 002_rc1.pem
+openssl x509 -inform PEM -in 002_rc1.pem -outform DER -out 002_rc1.der
+
+
+REM - Root Cert 2
+
+openssl req -newkey rsa:512 -nodes -out 002_rc2.pem -keyout 002_rc2.key.pem -config 002_rc2.cfg -days 3650
+openssl x509 -req -days 3650 -in 002_rc2.pem -out 002_rc2.pem -CA 002_rc1.pem -CAkey 002_rc1.key.pem -days 3650 -CAserial 002_rc1.srl -CAcreateserial -extfile 002_rc2.cfg -extensions v3_ca
+openssl x509 -inform PEM -in 002_rc2.pem -outform DER -out 002_rc2.der
+
+
+REM - Intermediate 2 Cert
+
+openssl req -newkey rsa:512 -nodes -out 002_im2.pem -keyout 002_im2.key.pem -config 002_im2.cfg -days 3650
+openssl x509 -req -in 002_im2.pem -out 002_im2.pem -CA 002_rc2.pem -CAkey 002_rc2.key.pem -days 3650 -CAserial 002_rc2.srl -CAcreateserial -extfile 002_im2.cfg -extensions v3_ca
+openssl x509 -inform PEM -in 002_im2.pem -outform DER -out 002_im2.der
+
+
+REM - Intermediate 1 Cert
+
+openssl req -newkey rsa:512 -nodes -out 002_im1.pem -keyout 002_im1.key.pem -config 002_im1.cfg -days 3650
+openssl x509 -req -in 002_im1.pem -out 002_im1.pem -CA 002_im2.pem -CAkey 002_im2.key.pem -days 3650 -extfile 002_im1.cfg -extensions v3_ca -CAserial 002_im2.srl -CAcreateserial
+openssl x509 -inform PEM -in 002_im1.pem -outform DER -out 002_im1.der
+
+
+REM - End Entity Cert
+
+openssl req -newkey rsa:512 -nodes -out 002_ee.pem -keyout 002_ee.key.pem -config 002_ee.cfg -days 3650
+openssl x509 -req -in 002_ee.pem -out 002_ee.pem -CA 002_im1.pem -CAkey 002_im1.key.pem -days 3650 -extfile 002_ee.cfg -extensions v3_ca -CAserial 002_im1.srl -CAcreateserial
+openssl x509 -inform PEM -in 002_ee.pem -outform DER -out 002_ee.der
+
+
+REM *** SEC-CERTMAN-CRITEXT-003 ***
+REM - Root Cert
+
+openssl req -newkey rsa:512 -nodes -out 003_rc.pem -keyout 003_rc.key.pem -config 003_rc.cfg -days 3650
+openssl x509 -req -days 3650 -in 003_rc.pem -signkey 003_rc.key.pem -out 003_rc.pem -extfile 003_rc.cfg -extensions v3_ca
+openssl x509 -inform PEM -in 003_rc.pem -outform DER -out 003_rc.der
+
+
+REM - End Entity Cert
+
+openssl req -newkey rsa:512 -nodes -out 003_ee.pem -keyout 003_ee.key.pem -config 003_ee.cfg -days 3650
+openssl x509 -req -in 003_ee.pem -out 003_ee.pem -CA 003_rc.pem -CAkey 003_rc.key.pem -days 3650 -extfile 003_ee.cfg -extensions v3_ca -CAserial 003_rc.srl -CAcreateserial
+openssl x509 -inform PEM -in 003_ee.pem -outform DER -out 003_ee.der
+
+
+REM *** SEC-CERTMAN-CRITEXT-004 ***
+REM - using Root Cert from 003
+REM - End Entity Cert
+
+openssl req -newkey rsa:512 -nodes -out 004_ee.pem -keyout 004_ee.key.pem -config 004_ee.cfg -days 3650
+openssl x509 -req -in 004_ee.pem -out 004_ee.pem -CA 003_rc.pem -CAkey 003_rc.key.pem -days 3650 -extfile 004_ee.cfg -extensions v3_ca -CAserial 003_rc.srl -CAcreateserial
+openssl x509 -inform PEM -in 004_ee.pem -outform DER -out 004_ee.der
+
+
+REM *** SEC-CERTMAN-CRITEXT-009 to 022 ***
+REM - Root Cert
+
+openssl req -newkey rsa:512 -nodes -out 009_rc.pem -keyout 009_rc.key.pem -config 009_rc.cfg -days 3650
+openssl x509 -req -days 3650 -in 009_rc.pem -signkey 009_rc.key.pem -out 009_rc.pem
+openssl x509 -inform PEM -in 009_rc.pem -outform DER -out 009_rc.der
+
+
+REM - End Entity Cert
+
+openssl req -newkey rsa:512 -nodes -out 009_ee.pem -keyout 009_ee.key.pem -config 009_ee.cfg -days 3650
+openssl x509 -req -in 009_ee.pem -out 009_ee.pem -CA 009_rc.pem -CAkey 009_rc.key.pem -days 3650 -extfile 009_ee.cfg -extensions v3_ca -CAserial 009_rc.srl -CAcreateserial
+openssl x509 -inform PEM -in 009_ee.pem -outform DER -out 009_ee.der
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/certman/tpkixcert_tef/openssl.cfg Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,42 @@
+# openssl.cfg
+#
+# Config file for OpenSSL CA
+
+[ ca ]
+
+default_ca = ca_default # The default ca section
+
+[ ca1 ]
+
+dir = .\ca1
+database = $dir\index.txt # index file.
+new_certs_dir = $dir\certs # new certs dir
+
+certificate = $dir\cacert.pem # The CA cert
+serial = $dir\serial # serial no file
+private_key = $dir\private\cakey.pem # CA private key
+RANDFILE = $dir\private\.rand # random number file
+
+default_days = 3650 # how long to certify for
+default_crl_days= 30 # how long before next CRL
+default_md = md5 # md to use
+
+policy = ca_policy # our policy
+email_in_dn = no # Don't add the email into cert DN
+
+nameopt = default_ca # Subject name display option
+certopt = default_ca # Certificate display option
+copy_extensions = none # Don't copy extensions from request
+
+[req]
+distinguished_name = dname
+
+[ ca_policy ]
+
+organizationName = supplied
+commonName = supplied
+
+[ dname ]
+C=UK
+O=Symbian
+OU=Security - Test
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_email_lc.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_email_mixed.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_printable_lc.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_printable_mixed.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_unstructuredname_lc.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_unstructuredname_mixed.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_utf8_lc.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/dnames/dn_utf8_mixed.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/absent.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/ca1-root.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/corrupt.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/empty.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/empty_fields.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/longcaps.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/multi.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/certman/tx509/data/extensions/certs/simple.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/common/test/trecog/data/longserialnumber.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/common/test/trecog/data/noversion.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/common/test/trecog/data/serialnumberlengthff.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/common/test/trecog/data/user.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/common/test/trecog/data/x509v1.cer has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/certs/enciphersign/enciphersign.cer has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/certs/enciphersign/keypair2.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIICXQIBAAKBgQDjqCME4URB54iWdg/1hGDruXA9Oaa9zCLekLSnZJxop70AzAQt
+ZbXymE69TKWYbJD95nDEEXvcoOPIz4TbmTlR/KFcbFc/ZALzyEp1OAZaxTTECaJj
+qAAwvlfB87LL7G7CuB/v0ZZIJvA6A8dcwkFoBocPEoVySNvMPlZz3cPGrwIDAQAB
+AoGAFaNEeNFEYJM2Gz7rc2V6pM0CSv9wxrdhVRAh64sXhqbywuGhQANb0MwDJ+Di
+GGOxQECn1SroP+cW315B/XFJzkAzr5qkiEyPiGMurN68I7omkrgYSsG7zFgNmipa
+UdPRZybK7z6XT9ABT387wsS3CzhbzeRF6f9szZwY3Fvh0HkCQQD12HX5i8sj6bJL
+klx8+Apai2nvlngl4rdabfINz8AENbUkF2PqVk0dS3RzrDd9DWo3cQcc+gTLC4Vt
+/bLlpvR9AkEA7Q9ZrIgtze9hBWim30NPycqQh32Fa2f7WTrjwA6FWKhjlqj97c2B
+f2J1umKn+9nIpw42UIs2CUSAJlh9C2vrmwJAKtbZV+7AKzXh18FdVHl0dGquvw0d
+SpzDDoLyFu4Iq7MgKXXZ90+qiFxJoo5z7NqVk6uiba4zf542VgBLWDFLkQJBAMD8
+8ysDPg7d5yVJGji+CrGjp9+1ry1OXJA64fiTmbkgdNrNPtQermLu3BrdgBYHKVPe
+vRb7DgWjb5RIC5yFwisCQQCgOJOMKlwloGR4iF8Mr5rGVRwI67Oj7cPNUuUbkbH3
+NLiE7zIDUjeSOwcTUvbZDeNcj2AL5kQ6MnJ53iD7GmoC
+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/certs/enciphersign/thecert2.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,65 @@
+Certificate:
+ Data:
+ Version: 3 (0x2)
+ Serial Number: 19 (0x13)
+ Signature Algorithm: md5WithRSAEncryption
+ Issuer: C=AU, ST=NSW, L=Neutral Bay, O=AdvansysCorp, CN=Jo Stichbury/Email=JoS@test.com
+ Validity
+ Not Before: Nov 14 12:57:39 2002 GMT
+ Not After : Nov 13 12:57:39 2004 GMT
+ Subject: C=UK, ST=London, L=London, O=Lovells, CN=Wibble/Email=wibble@lovells.com
+ Subject Public Key Info:
+ Public Key Algorithm: rsaEncryption
+ RSA Public Key: (1024 bit)
+ Modulus (1024 bit):
+ 00:e3:a8:23:04:e1:44:41:e7:88:96:76:0f:f5:84:
+ 60:eb:b9:70:3d:39:a6:bd:cc:22:de:90:b4:a7:64:
+ 9c:68:a7:bd:00:cc:04:2d:65:b5:f2:98:4e:bd:4c:
+ a5:98:6c:90:fd:e6:70:c4:11:7b:dc:a0:e3:c8:cf:
+ 84:db:99:39:51:fc:a1:5c:6c:57:3f:64:02:f3:c8:
+ 4a:75:38:06:5a:c5:34:c4:09:a2:63:a8:00:30:be:
+ 57:c1:f3:b2:cb:ec:6e:c2:b8:1f:ef:d1:96:48:26:
+ f0:3a:03:c7:5c:c2:41:68:06:87:0f:12:85:72:48:
+ db:cc:3e:56:73:dd:c3:c6:af
+ Exponent: 65537 (0x10001)
+ X509v3 extensions:
+ X509v3 Subject Key Identifier:
+ 22:D7:B5:12:5E:39:D0:89:8A:6A:48:AF:51:5E:07:C5:D8:2C:29:A1
+ X509v3 Authority Key Identifier:
+ keyid:41:4D:37:FF:44:2A:E7:08:C6:BA:F3:95:46:D2:B8:4B:68:8F:E6:4A
+ DirName:/C=AU/ST=NSW/L=Neutral Bay/O=AdvansysCorp/CN=Jo Stichbury/Email=JoS@test.com
+ serial:00
+
+ X509v3 Basic Constraints:
+ CA:TRUE
+ X509v3 Key Usage:
+ Key Encipherment, Certificate Sign
+ Signature Algorithm: md5WithRSAEncryption
+ 9c:15:23:10:11:82:95:4f:95:3d:50:64:54:c4:38:75:00:32:
+ 71:01:54:63:26:e5:e1:b5:ca:7b:cb:33:d3:98:a6:01:0d:a9:
+ f5:07:9e:a4:36:ee:5c:7f:56:bd:41:3f:3e:5a:2f:8f:5b:4b:
+ 73:3e:77:4e:88:6b:03:51:af:ce:de:66:2e:4e:b9:c6:d9:51:
+ ee:4d:56:d0:63:84:e6:f2:83:68:54:9b:e5:84:f9:5e:bb:95:
+ 03:bf:84:74:a6:11:b9:46:39:09:b0:ee:db:06:e5:b6:74:74:
+ b1:31:18:66:e2:ab:d5:8e:a6:2f:23:d1:31:2b:9e:95:1e:8b:
+ c7:35
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/pkcs8dsa1_des3_embed.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/pkcs8dsa1_des3_nsdh.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/pkcs8rsa1_3des.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/pkcs8rsa1_des3_nooctet.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/pkcs8rsa1_rc2.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/tkeystore/data/pkcs8rsa1_rc4.der has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/filetokens/test/ttesttools/data/corrupt.cer Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,1 @@
+ IEntrust.net Test WAP CA; Limited liability. See www.entrust.net/TESTCPS; 8»â^Z†– IEntrust.net Test WAP CA; Limited liability. See www.entrust.net/TESTCPS; €¾¹a6°€KŒf䕶ÕÇ°žu:OéFŸ„ûSÚ‘¡þ\œ·ß
\ No newline at end of file
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/group/bld.inf Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,456 @@
+/*
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description:
+* Test Certificates for security subsystem
+*
+*/
+
+/**
+ @file
+ @internalAll
+*/
+
+
+PRJ_TESTEXPORTS
+// Export certificates for security tests.
+// Note that these certificates should not appear in a CBR and are not included in the source directives in the mrp file.
+
+// Certman Component
+../certman/tcertstore/tdata/subjectkeycert.der /epoc32/winscw/c/unifiedcertstore2/subjectkeycert.der
+../certman/tcertstore/tdata/SelfSignedCertificate.der /epoc32/winscw/c/tcertstore/data/SelfSignedCertificate.der
+../certman/tcertstore/unifiedcertstore2/URL1K1.cer /epoc32/winscw/c/unifiedcertstore2/url1k1.cer
+../certman/tcertstore/unifiedcertstore2/URL2K2.cer /epoc32/winscw/c/unifiedcertstore2/url2k2.cer
+../certman/tcertstore/unifiedcertstore2/URL3K5.cer /epoc32/winscw/c/unifiedcertstore2/url3k5.cer
+../certman/testcertificates/openssl/Certs/Expired-R1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/expired-r1.der
+../certman/testcertificates/openssl/Certs/Expired-R2.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/expired-r2.der
+../certman/testcertificates/openssl/Certs/Expired-R5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/expired-r5.der
+../certman/testcertificates/openssl/Certs/Good-M5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/good-m5.der
+../certman/testcertificates/openssl/Certs/Good-R1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/good-r1.der
+../certman/testcertificates/openssl/Certs/Good-R2.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/good-r2.der
+../certman/testcertificates/openssl/Certs/Good-R5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/good-r5.der
+../certman/testcertificates/openssl/Certs/GoodAIA-R5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/goodaia-r5.der
+../certman/testcertificates/openssl/Certs/OCSPSigner-R1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ocspsigner-r1.der
+../certman/testcertificates/openssl/Certs/OCSPSigner-R2.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ocspsigner-r2.der
+../certman/testcertificates/openssl/Certs/OCSPSigner-R5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ocspsigner-r5.der
+../certman/testcertificates/openssl/Certs/Revoked-R1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/revoked-r1.der
+../certman/testcertificates/openssl/Certs/Revoked-R2.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/revoked-r2.der
+../certman/testcertificates/openssl/Certs/Revoked-R5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/revoked-r5.der
+../certman/testcertificates/openssl/Certs/Root1-RSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/root1-rsa.der
+../certman/testcertificates/openssl/Certs/Root2-DSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/root2-dsa.der
+../certman/testcertificates/openssl/Certs/Root5-RSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/root5-rsa.der
+../certman/testcertificates/openssl/Certs/Unknown-R1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/unknown-r1.der
+../certman/testcertificates/openssl/Certs/Unknown-R2.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/unknown-r2.der
+../certman/testcertificates/openssl/Certs/Unknown-R5.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/unknown-r5.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-1-1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-1-1.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-1-1_Good.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-1-1_good.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-1-1_RespSign.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-1-1_respsign.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-1-1_Revoked.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-1-1_revoked.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-1-1_Unknown.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-1-1_unknown.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-DSA-1-1.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-dsa-1-1.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-DSA-1-1_Good.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-dsa-1-1_good.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-DSA-1-1_RespSign.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-dsa-1-1_respsign.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-DSA-1-1_Revoked.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-dsa-1-1_revoked.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADelg-DSA-1-1_Unknown.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadelg-dsa-1-1_unknown.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADirect-DSA_Good.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadirect-dsa_good.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADirect-DSA_Revoked.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadirect-dsa_revoked.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADirect-DSA_Unknown.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadirect-dsa_unknown.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADirect-RSA_Good.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadirect-rsa_good.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADirect-RSA_Revoked.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadirect-rsa_revoked.der
+../certman/tocsp/Certificates/OpenSSL/DER/CADirect-RSA_Unknown.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/cadirect-rsa_unknown.der
+../certman/tocsp/Certificates/OpenSSL/DER/RootCADelg-DSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/rootcadelg-dsa.der
+../certman/tocsp/Certificates/OpenSSL/DER/RootCADelg-RSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/rootcadelg-rsa.der
+../certman/tocsp/Certificates/OpenSSL/DER/RootCADirect-DSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/rootcadirect-dsa.der
+../certman/tocsp/Certificates/OpenSSL/DER/RootCADirect-RSA.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/rootcadirect-rsa.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca1-entity1.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca1-entity1.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca1-entity2.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca1-entity2.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca1-entity3.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca1-entity3.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca1-root.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca1-root.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca2-entity1.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca2-entity1.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca2-entity2.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca2-entity2.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca2-entity3.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca2-entity3.der
+../certman/tocsp/Certificates/OpenSSL/DER/ca2-root.der /epoc32/winscw/c/system/tocsp/certs/openssl/ca2-root.der
+../certman/tocsp/Certificates/OpenSSL/DER/ee_with_aia.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ee_with_aia.der
+../certman/tocsp/Certificates/OpenSSL/DER/ee_without_aia.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ee_without_aia.der
+../certman/tocsp/Certificates/OpenSSL/DER/ee_withaia_19005.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ee_withaia_19005.der
+../certman/tocsp/Certificates/OpenSSL/DER/ee_withaia_19006.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ee_withaia_19006.der
+../certman/tocsp/Certificates/OpenSSL/DER/ica_cert.der /epoc32/winscw/c/system/tocsp/certs/newopenssl/ica_cert.der
+../certman/tocsp/Certificates/Valicert/DER/TOCSP_Valicert1_RSA.cer /epoc32/winscw/c/system/tocsp/certs/valicert1_rsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Expired-R1.cer /epoc32/winscw/c/system/tocsp/certs/expired-r1.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Expired-R5.cer /epoc32/winscw/c/system/tocsp/certs/expired-r5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Good-M5.cer /epoc32/winscw/c/system/tocsp/certs/good-m5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Good-R1.cer /epoc32/winscw/c/system/tocsp/certs/good-r1.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Good-R5.cer /epoc32/winscw/c/system/tocsp/certs/good-r5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-GoodAIA-R5.cer /epoc32/winscw/c/system/tocsp/certs/goodaia-r5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Mid5-RSA.cer /epoc32/winscw/c/system/tocsp/certs/mid5-rsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Revoked-R1.cer /epoc32/winscw/c/system/tocsp/certs/revoked-r1.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Revoked-R5.cer /epoc32/winscw/c/system/tocsp/certs/revoked-r5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Root5-RSA.cer /epoc32/winscw/c/system/tocsp/certs/root5-rsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Signing5-RSA.cer /epoc32/winscw/c/system/tocsp/certs/signing5-rsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Suspended-R1.cer /epoc32/winscw/c/system/tocsp/certs/suspended-r1.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Suspended-R5.cer /epoc32/winscw/c/system/tocsp/certs/suspended-r5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Unknown-R1.cer /epoc32/winscw/c/system/tocsp/certs/unknown-r1.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP-Unknown-R5.cer /epoc32/winscw/c/system/tocsp/certs/unknown-r5.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Good_R2.cer /epoc32/winscw/c/system/tocsp/certs/good_r2.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Revoked_R2.cer /epoc32/winscw/c/system/tocsp/certs/revoked_r2.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Root1_RSA.cer /epoc32/winscw/c/system/tocsp/certs/root1_rsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Root2_DSA.cer /epoc32/winscw/c/system/tocsp/certs/root2_dsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Signing1_RSA.cer /epoc32/winscw/c/system/tocsp/certs/signing1_rsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Signing2_DSA.cer /epoc32/winscw/c/system/tocsp/certs/signing2_dsa.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Suspended_R2.cer /epoc32/winscw/c/system/tocsp/certs/suspended_r2.cer
+../certman/tocsp/Certificates/XCert/DER/TOCSP_Unknown_R2.cer /epoc32/winscw/c/system/tocsp/certs/unknown_r2.cer
+../certman/tpkcs10/testdata/authorityinfoaccess.der /epoc32/winscw/c/tpkcs10/v3extensions/authorityinfoaccess.der
+../certman/tpkcs10/testdata/basicconstrains.der /epoc32/winscw/c/tpkcs10/v3extensions/basicconstrains.der
+../certman/tpkcs10/testdata/extkeyusage.der /epoc32/winscw/c/tpkcs10/v3extensions/extkeyusage.der
+../certman/tpkcs10/testdata/issueraltname.der /epoc32/winscw/c/tpkcs10/v3extensions/issueraltname.der
+../certman/tpkcs10/testdata/keyusage.der /epoc32/winscw/c/tpkcs10/v3extensions/keyusage.der
+../certman/tpkcs10/testdata/newdsa2048.der /epoc32/winscw/c/tpkcs10/keys/newdsa2048.der
+../certman/tpkcs10/testdata/newdsa512.der /epoc32/winscw/c/tpkcs10/keys/newdsa512.der
+../certman/tpkcs10/testdata/newrsa2048.der /epoc32/winscw/c/tpkcs10/keys/newrsa2048.der
+../certman/tpkcs10/testdata/newrsa512.der /epoc32/winscw/c/tpkcs10/keys/newrsa512.der
+../certman/tpkcs10/testdata/os_req_ext_dsasha1.der /epoc32/winscw/c/tpkcs10/requests/os_req_ext_dsasha1.der
+../certman/tpkcs10/testdata/os_req_ext_rsamd2.der /epoc32/winscw/c/tpkcs10/requests/os_req_ext_rsamd2.der
+../certman/tpkcs10/testdata/os_req_ext_rsamd5.der /epoc32/winscw/c/tpkcs10/requests/os_req_ext_rsamd5.der
+../certman/tpkcs10/testdata/os_req_ext_rsasha1.der /epoc32/winscw/c/tpkcs10/requests/os_req_ext_rsasha1.der
+../certman/tpkcs10/testdata/os_req_rsamd2_512.der /epoc32/winscw/c/tpkcs10/requests/os_req_rsamd2_512.der
+../certman/tpkcs10/testdata/os_req_rsamd5_512.der /epoc32/winscw/c/tpkcs10/requests/os_req_rsamd5_512.der
+../certman/tpkcs10/testdata/os_req_rsasha1_2048_2attr.der /epoc32/winscw/c/tpkcs10/requests/os_req_rsasha1_2048_2attr.der
+../certman/tpkcs10/testdata/os_req_rsasha1_512.der /epoc32/winscw/c/tpkcs10/requests/os_req_rsasha1_512.der
+../certman/tpkcs10/testdata/os_req_rsasha1_512_1attr.der /epoc32/winscw/c/tpkcs10/requests/os_req_rsasha1_512_1attr.der
+../certman/tpkcs10/testdata/os_req_rsasha1_512_2attr.der /epoc32/winscw/c/tpkcs10/requests/os_req_rsasha1_512_2attr.der
+../certman/tpkcs10/testdata/subjectaltname.der /epoc32/winscw/c/tpkcs10/v3extensions/subjectaltname.der
+../certman/tpkcs12intgrtn/data/cb004_friendlyname_firstcert.der /epoc32/winscw/c/tpkcs12intg/data/cb004_friendlyname_firstcert.der
+../certman/tpkcs12intgrtn/data/cb004_friendlyname_firstkey.der /epoc32/winscw/c/tpkcs12intg/data/cb004_friendlyname_firstkey.der
+../certman/tpkcs12intgrtn/data/cb004_friendlyname_firstshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb004_friendlyname_firstshrouded.der
+../certman/tpkcs12intgrtn/data/cb004_friendlyname_secondcert.der /epoc32/winscw/c/tpkcs12intg/data/cb004_friendlyname_secondcert.der
+../certman/tpkcs12intgrtn/data/cb004_friendlyname_secondkey.der /epoc32/winscw/c/tpkcs12intg/data/cb004_friendlyname_secondkey.der
+../certman/tpkcs12intgrtn/data/cb004_friendlyname_secondshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb004_friendlyname_secondshrouded.der
+../certman/tpkcs12intgrtn/data/cb004_localkeyid_firstcert.der /epoc32/winscw/c/tpkcs12intg/data/cb004_localkeyid_firstcert.der
+../certman/tpkcs12intgrtn/data/cb004_localkeyid_firstkey.der /epoc32/winscw/c/tpkcs12intg/data/cb004_localkeyid_firstkey.der
+../certman/tpkcs12intgrtn/data/cb004_localkeyid_firstshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb004_localkeyid_firstshrouded.der
+../certman/tpkcs12intgrtn/data/cb004_localkeyid_secondcert.der /epoc32/winscw/c/tpkcs12intg/data/cb004_localkeyid_secondcert.der
+../certman/tpkcs12intgrtn/data/cb004_localkeyid_secondkey.der /epoc32/winscw/c/tpkcs12intg/data/cb004_localkeyid_secondkey.der
+../certman/tpkcs12intgrtn/data/cb004_localkeyid_secondshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb004_localkeyid_secondshrouded.der
+../certman/tpkcs12intgrtn/data/cb005_friendlyname_firstcertbag.der /epoc32/winscw/c/tpkcs12intg/data/cb005_friendlyname_firstcertbag.der
+../certman/tpkcs12intgrtn/data/cb005_friendlyname_firstkey.der /epoc32/winscw/c/tpkcs12intg/data/cb005_friendlyname_firstkey.der
+../certman/tpkcs12intgrtn/data/cb005_friendlyname_firstshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb005_friendlyname_firstshrouded.der
+../certman/tpkcs12intgrtn/data/cb005_friendlyname_secondcert.der /epoc32/winscw/c/tpkcs12intg/data/cb005_friendlyname_secondcert.der
+../certman/tpkcs12intgrtn/data/cb005_friendlyname_secondkey.der /epoc32/winscw/c/tpkcs12intg/data/cb005_friendlyname_secondkey.der
+../certman/tpkcs12intgrtn/data/cb005_friendlyname_secondshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb005_friendlyname_secondshrouded.der
+../certman/tpkcs12intgrtn/data/cb005_localkeyid_firstcertbag.der /epoc32/winscw/c/tpkcs12intg/data/cb005_localkeyid_firstcertbag.der
+../certman/tpkcs12intgrtn/data/cb005_localkeyid_firstkey.der /epoc32/winscw/c/tpkcs12intg/data/cb005_localkeyid_firstkey.der
+../certman/tpkcs12intgrtn/data/cb005_localkeyid_firstshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb005_localkeyid_firstshrouded.der
+../certman/tpkcs12intgrtn/data/cb005_localkeyid_secondcert.der /epoc32/winscw/c/tpkcs12intg/data/cb005_localkeyid_secondcert.der
+../certman/tpkcs12intgrtn/data/cb005_localkeyid_secondkey.der /epoc32/winscw/c/tpkcs12intg/data/cb005_localkeyid_secondkey.der
+../certman/tpkcs12intgrtn/data/cb005_localkeyid_secondshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb005_localkeyid_secondshrouded.der
+../certman/tpkcs12intgrtn/data/cb006_friendlyname_firstcert.der /epoc32/winscw/c/tpkcs12intg/data/cb006_friendlyname_firstcert.der
+../certman/tpkcs12intgrtn/data/cb006_friendlyname_firstkey.der /epoc32/winscw/c/tpkcs12intg/data/cb006_friendlyname_firstkey.der
+../certman/tpkcs12intgrtn/data/cb006_friendlyname_firstshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb006_friendlyname_firstshrouded.der
+../certman/tpkcs12intgrtn/data/cb006_localkeyid_firstcert.der /epoc32/winscw/c/tpkcs12intg/data/cb006_localkeyid_firstcert.der
+../certman/tpkcs12intgrtn/data/cb006_localkeyid_firstkey.der /epoc32/winscw/c/tpkcs12intg/data/cb006_localkeyid_firstkey.der
+../certman/tpkcs12intgrtn/data/cb006_localkeyid_firstshrouded.der /epoc32/winscw/c/tpkcs12intg/data/cb006_localkeyid_firstshrouded.der
+../certman/tpkcs12intgrtn/data/digestchangedmac.der /epoc32/winscw/c/tpkcs12intg/data/digestchangedmac.der
+../certman/tpkcs12intgrtn/data/digestchangedmacsalt.der /epoc32/winscw/c/tpkcs12intg/data/digestchangedmacsalt.der
+../certman/tpkcs12intgrtn/data/friendlyname.der /epoc32/winscw/c/tpkcs12intg/data/friendlyname.der
+../certman/tpkcs12intgrtn/data/friendlyname_ct001.der /epoc32/winscw/c/tpkcs12intg/data/friendlyname_ct001.der
+../certman/tpkcs12intgrtn/data/friendlyname_im002.der /epoc32/winscw/c/tpkcs12intg/data/friendlyname_im002.der
+../certman/tpkcs12intgrtn/data/localkeyid.der /epoc32/winscw/c/tpkcs12intg/data/localkeyid.der
+../certman/tpkcs12intgrtn/data/localkeyid_cert.der /epoc32/winscw/c/tpkcs12intg/data/localkeyid_cert.der
+../certman/tpkcs12intgrtn/data/localkeyid_ct001.der /epoc32/winscw/c/tpkcs12intg/data/localkeyid_ct001.der
+../certman/tpkcs12intgrtn/data/localkeyid_im002.der /epoc32/winscw/c/tpkcs12intg/data/localkeyid_im002.der
+../certman/tpkcs12intgrtn/data/localkeyid_shrouded.der /epoc32/winscw/c/tpkcs12intg/data/localkeyid_shrouded.der
+../certman/tpkcs12intgrtn/data/oomattributes.der /epoc32/winscw/c/tpkcs12intg/data/oomattributes.der
+../certman/tpkcs12intgrtn/data/oomauthsafedata.der /epoc32/winscw/c/tpkcs12intg/data/oomauthsafedata.der
+../certman/tpkcs12intgrtn/data/oomcertbag.der /epoc32/winscw/c/tpkcs12intg/data/oomcertbag.der
+../certman/tpkcs12intgrtn/data/oomcrlbag.der /epoc32/winscw/c/tpkcs12intg/data/oomcrlbag.der
+../certman/tpkcs12intgrtn/data/oomkeybag.der /epoc32/winscw/c/tpkcs12intg/data/oomkeybag.der
+../certman/tpkcs12intgrtn/data/oommacdata.der /epoc32/winscw/c/tpkcs12intg/data/oommacdata.der
+../certman/tpkcs12intgrtn/data/oomsafebag.der /epoc32/winscw/c/tpkcs12intg/data/oomsafebag.der
+../certman/tpkcs12intgrtn/data/oomsafecontentsbag.der /epoc32/winscw/c/tpkcs12intg/data/oomsafecontentsbag.der
+../certman/tpkcs12intgrtn/data/oomsecretbag.der /epoc32/winscw/c/tpkcs12intg/data/oomsecretbag.der
+../certman/tpkcs12intgrtn/data/oomshroudedkeybag.der /epoc32/winscw/c/tpkcs12intg/data/oomshroudedkeybag.der
+../certman/tpkcs12intgrtn/data/pkcs12_digestalgnotsha1_mac.der /epoc32/winscw/c/tpkcs12intg/data/pkcs12_digestalgnotsha1_mac.der
+../certman/tpkcs12intgrtn/data/pkcs12_digestalgnotsha1_salt.der /epoc32/winscw/c/tpkcs12intg/data/pkcs12_digestalgnotsha1_salt.der
+../certman/tpkcs12intgrtn/data/root5_ee.der /epoc32/winscw/c/tpkcs12intg/data/root5_ee.der
+../certman/tpkcs12intgrtn/data/root5ca.der /epoc32/winscw/c/tpkcs12intg/data/root5ca.der
+../certman/tpkcs12intgrtn/data/root5ca_key.der /epoc32/winscw/c/tpkcs12intg/data/root5ca_key.der
+../certman/tpkcs12intgrtn/data/safebag.der /epoc32/winscw/c/tpkcs12intg/data/safebag.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_1.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_1.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_10.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_10.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_2.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_2.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_3.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_3.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_4.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_4.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_5.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_5.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_6.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_6.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_7.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_7.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_8.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_8.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb001.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb001.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb002_1.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb002_1.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb002_2.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb002_2.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb003_1.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb003_1.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb004_1.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb004_1.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb004_2.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb004_2.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb005_1.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb005_1.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb005_2.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb005_2.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_cb006_1.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_cb006_1.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm001.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm001.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm002.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm002.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm003.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm003.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm004.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm004.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm005.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm005.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm006.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm006.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm007.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm007.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm008.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm008.der
+../certman/tpkcs12intgrtn/data/safebag_shrouded_pm010.der /epoc32/winscw/c/tpkcs12intg/data/safebag_shrouded_pm010.der
+../certman/tpkcs12intgrtn/data/sdsicert.der /epoc32/winscw/c/tpkcs12intg/data/sdsicert.der
+../certman/tpkcs7/data/cms/attributecert.der /epoc32/winscw/c/tpkcs7/cms/data/attributecert.der
+../certman/tpkcs7/data/cms/ca.der /epoc32/winscw/c/tpkcs7/cms/data/ca.der
+../certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_cert_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/cms_dsa_cert_1_is.der
+../certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_cert_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/cms_dsa_cert_1_ki.der
+../certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_key_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/cms_dsa_key_1_is.der
+../certman/tpkcs7/data/cms/cert_dsa_len1/cms_dsa_key_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/cms_dsa_key_1_ki.der
+../certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_cert_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/cms_rsa_cert_1_is.der
+../certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_cert_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/cms_rsa_cert_1_ki.der
+../certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_key_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/cms_rsa_key_1_is.der
+../certman/tpkcs7/data/cms/cert_rsa_len1/cms_rsa_key_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/cms_rsa_key_1_ki.der
+../certman/tpkcs7/data/cms/cms_add_rsa_cert_is.der /epoc32/winscw/c/tpkcs7/cms/data/cms_add_rsa_cert_is.der
+../certman/tpkcs7/data/cms/corruptattributecert.der /epoc32/winscw/c/tpkcs7/cms/data/corruptattributecert.der
+../certman/tpkcs7/data/cms/corruptattributecert_noseq.der /epoc32/winscw/c/tpkcs7/cms/data/corruptattributecert_noseq.der
+../certman/tpkcs7/data/cms/int_ca.der /epoc32/winscw/c/tpkcs7/cms/data/int_ca.der
+../certman/tpkcs7/data/cms/int_cms_dsa_cert_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_cert_1_is.der
+../certman/tpkcs7/data/cms/int_cms_dsa_cert_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_cert_1_ki.der
+../certman/tpkcs7/data/cms/int_cms_dsa_cert_2_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_cert_2_is.der
+../certman/tpkcs7/data/cms/int_cms_dsa_cert_2_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_cert_2_ki.der
+../certman/tpkcs7/data/cms/int_cms_dsa_cert_3_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_cert_3_is.der
+../certman/tpkcs7/data/cms/int_cms_dsa_cert_3_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_cert_3_ki.der
+../certman/tpkcs7/data/cms/int_cms_dsa_key_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_key_1_is.der
+../certman/tpkcs7/data/cms/int_cms_dsa_key_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_key_1_ki.der
+../certman/tpkcs7/data/cms/int_cms_dsa_key_2_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_key_2_is.der
+../certman/tpkcs7/data/cms/int_cms_dsa_key_2_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_key_2_ki.der
+../certman/tpkcs7/data/cms/int_cms_dsa_key_3_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_key_3_is.der
+../certman/tpkcs7/data/cms/int_cms_dsa_key_3_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_dsa_key_3_ki.der
+../certman/tpkcs7/data/cms/int_cms_rsa_cert_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_cert_1_is.der
+../certman/tpkcs7/data/cms/int_cms_rsa_cert_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_cert_1_ki.der
+../certman/tpkcs7/data/cms/int_cms_rsa_cert_2_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_cert_2_is.der
+../certman/tpkcs7/data/cms/int_cms_rsa_cert_2_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_cert_2_ki.der
+../certman/tpkcs7/data/cms/int_cms_rsa_cert_3_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_cert_3_is.der
+../certman/tpkcs7/data/cms/int_cms_rsa_cert_3_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_cert_3_ki.der
+../certman/tpkcs7/data/cms/int_cms_rsa_key_1_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_key_1_is.der
+../certman/tpkcs7/data/cms/int_cms_rsa_key_1_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_key_1_ki.der
+../certman/tpkcs7/data/cms/int_cms_rsa_key_2_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_key_2_is.der
+../certman/tpkcs7/data/cms/int_cms_rsa_key_2_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_key_2_ki.der
+../certman/tpkcs7/data/cms/int_cms_rsa_key_3_is.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_key_3_is.der
+../certman/tpkcs7/data/cms/int_cms_rsa_key_3_ki.der /epoc32/winscw/c/tpkcs7/cms/data/int_cms_rsa_key_3_ki.der
+../certman/tpkcs7/data/cms/int_dsa_2_attributeCert.der /epoc32/winscw/c/tpkcs7/cms/data/int_dsa_2_attributecert.der
+../certman/tpkcs7/data/cms/int_dsa_3_attributeCert.der /epoc32/winscw/c/tpkcs7/cms/data/int_dsa_3_attributecert.der
+../certman/tpkcs7/data/cms/int_dsa_attributeCert.der /epoc32/winscw/c/tpkcs7/cms/data/int_dsa_attributecert.der
+../certman/tpkcs7/data/cms/int_rsa_2_attributeCert.der /epoc32/winscw/c/tpkcs7/cms/data/int_rsa_2_attributecert.der
+../certman/tpkcs7/data/cms/int_rsa_3_attributecert.der /epoc32/winscw/c/tpkcs7/cms/data/int_rsa_3_attributecert.der
+../certman/tpkcs7/data/cms/int_rsa_attributeCert.der /epoc32/winscw/c/tpkcs7/cms/data/int_rsa_attributecert.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_dsa_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_dsa_is.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_dsa_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_dsa_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md2_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_md2_is.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md2_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_md2_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md5_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_md5_is.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_md5_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_md5_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_KI_attributecert.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_ki_attributecert.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_is.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_attributes.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_ki_attributes.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_nocert.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_ki_nocert.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_nosignerinfo.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_ki_nosignerinfo.der
+../certman/tpkcs7/data/cms/results/cms_1_attached_rsa_sha1_ki_unsignedattributes.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_attached_rsa_sha1_ki_unsignedattributes.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_dsa_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_dsa_is.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_dsa_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_dsa_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md2_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_rsa_md2_is.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md2_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_rsa_md2_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md5_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_rsa_md5_is.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_rsa_md5_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_rsa_md5_ki.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_rsa_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_rsa_sha1_is.der
+../certman/tpkcs7/data/cms/results/cms_1_detached_rsa_sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_1_detached_rsa_sha1_ki.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_algorithmoid.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_algorithmoid.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_block.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_block.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_certsettag.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_certsettag.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_content_tag_1.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_content_tag_1.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_contentoid.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_contentoid.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_datacontent.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_datacontent.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_encapcontent_tag_1.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_encapcontent_tag_1.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_encapcontent_tag_2.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_encapcontent_tag_2.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_encapcontentoid.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_encapcontentoid.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_excerttag.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_excerttag.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_length.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_length.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_signature.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_signature.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_signdataversion.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_signdataversion.der
+../certman/tpkcs7/data/cms/results/cms_corrupt_signinfoversion.der /epoc32/winscw/c/tpkcs7/cms/results/cms_corrupt_signinfoversion.der
+../certman/tpkcs7/data/cms/results/cms_data.der /epoc32/winscw/c/tpkcs7/cms/results/cms_data.der
+../certman/tpkcs7/data/cms/results/cms_data_corrupt_class.der /epoc32/winscw/c/tpkcs7/cms/results/cms_data_corrupt_class.der
+../certman/tpkcs7/data/cms/results/cms_data_corrupt_tag.der /epoc32/winscw/c/tpkcs7/cms/results/cms_data_corrupt_tag.der
+../certman/tpkcs7/data/cms/results/cms_multi_2_attached_dsais_rsaki.der /epoc32/winscw/c/tpkcs7/cms/results/cms_multi_2_attached_dsais_rsaki.der
+../certman/tpkcs7/data/cms/results/cms_multi_2_attached_rsaki_dsais.der /epoc32/winscw/c/tpkcs7/cms/results/cms_multi_2_attached_rsaki_dsais.der
+../certman/tpkcs7/data/cms/results/cms_multi_2_attached_rsakimd5_dsais.der /epoc32/winscw/c/tpkcs7/cms/results/cms_multi_2_attached_rsakimd5_dsais.der
+../certman/tpkcs7/data/cms/results/cms_multi_2_attached_rsakimd5_dsais_addcert.der /epoc32/winscw/c/tpkcs7/cms/results/cms_multi_2_attached_rsakimd5_dsais_addcert.der
+../certman/tpkcs7/data/cms/results/cmsauthdata.der /epoc32/winscw/c/tpkcs7/cms/results/cmsauthdata.der
+../certman/tpkcs7/data/cms/results/cmsdigestdata.der /epoc32/winscw/c/tpkcs7/cms/results/cmsdigestdata.der
+../certman/tpkcs7/data/cms/results/cmsencryteddata.der /epoc32/winscw/c/tpkcs7/cms/results/cmsencryteddata.der
+../certman/tpkcs7/data/cms/results/cmsenvelopeddata.der /epoc32/winscw/c/tpkcs7/cms/results/cmsenvelopeddata.der
+../certman/tpkcs7/data/cms/results/int_cms_1_authenticated_data.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_authenticated_data.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_12rsa_3dsa_certdetach_md2md5sha1_1ki_23is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_12rsa_3dsa_certdetach_md2md5sha1_1ki_23is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certattach_md2_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_3rsa_certattach_md2_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certattach_md2md5sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_3rsa_certattach_md2md5sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certattach_md5_13ki_2is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_3rsa_certattach_md5_13ki_2is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1_is_x509.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1_is_x509.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1md2md5_is_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_3rsa_certdetach_sha1md2md5_is_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certattach_rsa_md5_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certattach_rsa_md5_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certattach_rsa_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certattach_rsa_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_is_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_is_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certdetach_dsa_sha1_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_rsa_md2_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certdetach_rsa_md2_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_dataattached_certdetach_rsa_sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_dataattached_certdetach_rsa_sha1_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_12rsa_3_dsa_certdetach_sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_12rsa_3_dsa_certdetach_sha1_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_12rsa_3dsa_certdetach_1md2_2md5_3sha1_1ki_23is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_12rsa_3dsa_certdetach_1md2_2md5_3sha1_1ki_23is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3dsa_certattach_3sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3dsa_certattach_3sha1_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3dsa_certdetach_sha1_is_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3dsa_certdetach_sha1_is_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_12sha1_3md5_1ki_23is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3rsa_certattach_12sha1_3md5_1ki_23is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_3md2_12ki_3is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3rsa_certattach_3md2_12ki_3is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3rsa_certattach_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certattach_sha1_is_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3rsa_certattach_sha1_is_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certdattach_md5_13ki_2is_.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3rsa_certdattach_md5_13ki_2is_.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_3rsa_certdetach_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_3rsa_certdetach_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_certattach_rsa_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_certattach_rsa_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_certdetach_rsa_md2_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_certdetach_rsa_md2_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certattach_sha1_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_dsa_certattach_sha1_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certattach_sha1_is_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_dsa_certattach_sha1_is_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certdetach_sha1_ki.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_dsa_certdetach_sha1_ki.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_dsa_certdetach_sha1_ki_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_dsa_certdetach_sha1_ki_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_rsa_certattach_md5_is.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_rsa_certattach_md5_is.der
+../certman/tpkcs7/data/cms/results/int_cms_1_datadetached_rsa_certdetach_sha1_is_attribute.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_datadetached_rsa_certdetach_sha1_is_attribute.der
+../certman/tpkcs7/data/cms/results/int_cms_1_digested.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_digested.der
+../certman/tpkcs7/data/cms/results/int_cms_1_encrypted.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_encrypted.der
+../certman/tpkcs7/data/cms/results/int_cms_1_enveloped.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_enveloped.der
+../certman/tpkcs7/data/cms/results/int_cms_1_plain_data.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_plain_data.der
+../certman/tpkcs7/data/cms/results/int_cms_1_signed_and_enveloped_data.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_1_signed_and_enveloped_data.der
+../certman/tpkcs7/data/cms/results/int_cms_invalid_attr_cert_value_2.der /epoc32/winscw/c/tpkcs7/cms/results/int_cms_invalid_attr_cert_value_2.der
+../certman/tpkcs7/data/cms/results/int_large_data.der /epoc32/winscw/c/tpkcs7/cms/results/int_large_data.der
+../certman/tpkcs7/data/cms/results/int_small_data.der /epoc32/winscw/c/tpkcs7/cms/results/int_small_data.der
+../certman/tpkcs7/data/digest_sha1.der /epoc32/winscw/c/tpkcs7/data/digest_sha1.der
+../certman/tpkcs7/data/digestinfo_digest_notoctetstring.der /epoc32/winscw/c/tpkcs7/data/digestinfo_digest_notoctetstring.der
+../certman/tpkcs7/data/digestinfo_md5alg.der /epoc32/winscw/c/tpkcs7/data/digestinfo_md5alg.der
+../certman/tpkcs7/data/digestinfo_negalgtag.der /epoc32/winscw/c/tpkcs7/data/digestinfo_negalgtag.der
+../certman/tpkcs7/data/digestinfo_nodigest.der /epoc32/winscw/c/tpkcs7/data/digestinfo_nodigest.der
+../certman/tpkcs7/data/digestinfo_sha1.der /epoc32/winscw/c/tpkcs7/data/digestinfo_sha1.der
+../certman/tpkcs7/data/digestinfo_unsupportedalg.der /epoc32/winscw/c/tpkcs7/data/digestinfo_unsupportedalg.der
+../certman/tpkcs7/data/encrypteddata_versiontag.der /epoc32/winscw/c/tpkcs7/data/encrypteddata_versiontag.der
+../certman/tpkcs7/data/encrypteddata_withoutsalt.der /epoc32/winscw/c/tpkcs7/data/encrypteddata_withoutsalt.der
+../certman/tpkcs7/data/encrypteddata_withoutsalt_content.der /epoc32/winscw/c/tpkcs7/data/encrypteddata_withoutsalt_content.der
+../certman/tpkcs7/data/notencrypteddata.der /epoc32/winscw/c/tpkcs7/data/notencrypteddata.der
+../certman/tpkcs7/data/pkcs7_digest_md5alg.der /epoc32/winscw/c/tpkcs7/data/pkcs7_digest_md5alg.der
+../certman/tpkcs7/data/pkcs7_encryptedneg_contentType.der /epoc32/winscw/c/tpkcs7/data/pkcs7_encryptedneg_contenttype.der
+../certman/tpkcs7/data/pkcs7_encryptedneg_nocontsalt.der /epoc32/winscw/c/tpkcs7/data/pkcs7_encryptedneg_nocontsalt.der
+../certman/tpkcs7/data/pkcs7_encryptedneg_noencryptedcon.der /epoc32/winscw/c/tpkcs7/data/pkcs7_encryptedneg_noencryptedcon.der
+../certman/tpkcs7/data/pkcs7_encryptedneg_version.der /epoc32/winscw/c/tpkcs7/data/pkcs7_encryptedneg_version.der
+../certman/tpkcs7/data/sha1and128bitrc2.der /epoc32/winscw/c/tpkcs7/data/sha1and128bitrc2.der
+../certman/tpkcs7/data/sha1and128bitrc2_encryptedcontent.der /epoc32/winscw/c/tpkcs7/data/sha1and128bitrc2_encryptedcontent.der
+../certman/tpkcs7/data/sha1and128bitrc2_salt.der /epoc32/winscw/c/tpkcs7/data/sha1and128bitrc2_salt.der
+../certman/tpkcs7/data/sha1and128bitrc4.der /epoc32/winscw/c/tpkcs7/data/sha1and128bitrc4.der
+../certman/tpkcs7/data/sha1and128bitrc4_encryptedcontent.der /epoc32/winscw/c/tpkcs7/data/sha1and128bitrc4_encryptedcontent.der
+../certman/tpkcs7/data/sha1and128bitrc4_salt.der /epoc32/winscw/c/tpkcs7/data/sha1and128bitrc4_salt.der
+../certman/tpkcs7/data/sha1and2_keytripledes.der /epoc32/winscw/c/tpkcs7/data/sha1and2_keytripledes.der
+../certman/tpkcs7/data/sha1and2_keytripledes_encryptedcontent.der /epoc32/winscw/c/tpkcs7/data/sha1and2_keytripledes_encryptedcontent.der
+../certman/tpkcs7/data/sha1and2_keytripledes_salt.der /epoc32/winscw/c/tpkcs7/data/sha1and2_keytripledes_salt.der
+../certman/tpkcs7/data/sha1and3_keytripledes_cbc.der /epoc32/winscw/c/tpkcs7/data/sha1and3_keytripledes_cbc.der
+../certman/tpkcs7/data/sha1and3_keytripledes_cbc_encryptedcontent.der /epoc32/winscw/c/tpkcs7/data/sha1and3_keytripledes_cbc_encryptedcontent.der
+../certman/tpkcs7/data/sha1and3_keytripledes_cbc_salt.der /epoc32/winscw/c/tpkcs7/data/sha1and3_keytripledes_cbc_salt.der
+../certman/tpkcs7/data/sha1and40bitrc2_cbc.der /epoc32/winscw/c/tpkcs7/data/sha1and40bitrc2_cbc.der
+../certman/tpkcs7/data/sha1and40bitrc2_cbc_encryptedcontent.der /epoc32/winscw/c/tpkcs7/data/sha1and40bitrc2_cbc_encryptedcontent.der
+../certman/tpkcs7/data/sha1and40bitrc2_cbc_salt.der /epoc32/winscw/c/tpkcs7/data/sha1and40bitrc2_cbc_salt.der
+../certman/tpkcs7/data/sha1and40bitrc4.der /epoc32/winscw/c/tpkcs7/data/sha1and40bitrc4.der
+../certman/tpkcs7/data/sha1and40bitrc4_encryptedcontent.der /epoc32/winscw/c/tpkcs7/data/sha1and40bitrc4_encryptedcontent.der
+../certman/tpkcs7/data/sha1and40bitrc4_salt.der /epoc32/winscw/c/tpkcs7/data/sha1and40bitrc4_salt.der
+../certman/tpkixcert/pkixtestdata/validation/bmpstring/cacert_bmp.crt /epoc32/winscw/c/pkixtestdata/validation/bmpstring/cacert_bmp.crt
+../certman/tpkixcert/pkixtestdata/validation/bmpstring/eecert_bmp.crt /epoc32/winscw/c/pkixtestdata/validation/bmpstring/eecert_bmp.crt
+../certman/tpkixcert/pkixtestdata/validation/invalidaltname/invalidaltname.crt /epoc32/winscw/c/pkixtestdata/validation/invalidaltname/invalidaltname.crt
+../certman/tpkixcert/pkixtestdata/validation/invalidaltname/root.crt /epoc32/winscw/c/pkixtestdata/validation/invalidaltname/root.crt
+../certman/tpkixcert/pkixtestdata/validation/critical_extns/root.der /epoc32/winscw/c/pkixtestdata/validation/critical_extns/root.der
+../certman/tpkixcert/pkixtestdata/validation/critical_extns/ee_critical_extns.der /epoc32/winscw/c/pkixtestdata/validation/critical_extns/ee_critical_extns.der
+../certman/tpkixcert/pkixtestdata/validation/critical_extns/intermediate_critical_extns.der /epoc32/winscw/c/pkixtestdata/validation/critical_extns/intermediate_critical_extns.der
+../certman/tpkixcert_tef/datetime_0001_endentity.der /epoc32/winscw/c/tpkixcert_tef/data/datetime_0001_endentity.der
+../certman/tpkixcert_tef/datetime_0001_root.der /epoc32/winscw/c/tpkixcert_tef/data/datetime_0001_root.der
+../certman/tpkixcert_tef/001_rc.der /epoc32/winscw/c/tpkixcert_tef/data/001_rc.der
+../certman/tpkixcert_tef/001_im2.der /epoc32/winscw/c/tpkixcert_tef/data/001_im2.der
+../certman/tpkixcert_tef/001_im1.der /epoc32/winscw/c/tpkixcert_tef/data/001_im1.der
+../certman/tpkixcert_tef/001_ee.der /epoc32/winscw/c/tpkixcert_tef/data/001_ee.der
+../certman/tpkixcert_tef/002_rc1.der /epoc32/winscw/c/tpkixcert_tef/data/002_rc1.der
+../certman/tpkixcert_tef/002_rc2.der /epoc32/winscw/c/tpkixcert_tef/data/002_rc2.der
+../certman/tpkixcert_tef/002_im2.der /epoc32/winscw/c/tpkixcert_tef/data/002_im2.der
+../certman/tpkixcert_tef/002_im1.der /epoc32/winscw/c/tpkixcert_tef/data/002_im1.der
+../certman/tpkixcert_tef/002_ee.der /epoc32/winscw/c/tpkixcert_tef/data/002_ee.der
+../certman/tpkixcert_tef/003_rc.der /epoc32/winscw/c/tpkixcert_tef/data/003_rc.der
+../certman/tpkixcert_tef/003_ee.der /epoc32/winscw/c/tpkixcert_tef/data/003_ee.der
+../certman/tpkixcert_tef/004_ee.der /epoc32/winscw/c/tpkixcert_tef/data/004_ee.der
+../certman/tpkixcert_tef/009_rc.der /epoc32/winscw/c/tpkixcert_tef/data/009_rc.der
+../certman/tpkixcert_tef/009_ee.der /epoc32/winscw/c/tpkixcert_tef/data/009_ee.der
+
+../certman/tpkixcert_tef/fulltrust.der /epoc32/winscw/c/tpkixcert_tef/data/fulltrust.der
+
+../certman/tx509/Data/dnames/dn_unstructuredname_lc.der /epoc32/winscw/c/tx509/data/dn_unstructuredname_lc.der
+../certman/tx509/Data/extensions/certs/absent.der /epoc32/winscw/c/tx509/data/extensions/certs/absent.der
+../certman/tx509/Data/extensions/certs/corrupt.der /epoc32/winscw/c/tx509/data/extensions/certs/corrupt.der
+../certman/tx509/Data/extensions/certs/empty.der /epoc32/winscw/c/tx509/data/extensions/certs/empty.der
+../certman/tx509/Data/extensions/certs/empty_fields.der /epoc32/winscw/c/tx509/data/extensions/certs/empty_fields.der
+../certman/tx509/Data/extensions/certs/longcaps.der /epoc32/winscw/c/tx509/data/extensions/certs/longcaps.der
+../certman/tx509/Data/extensions/certs/multi.der /epoc32/winscw/c/tx509/data/extensions/certs/multi.der
+../certman/tx509/Data/extensions/certs/simple.der /epoc32/winscw/c/tx509/data/extensions/certs/simple.der
+../certman/tpkcs12intgrtn/data/root5ca.pem /epoc32/winscw/c/tpkcs12intg/data/root5ca.pem
+../certman/tpkcs12intgrtn/data/root5ca_key.pem /epoc32/winscw/c/tpkcs12intg/data/root5ca_key.pem
+
+// Distinguished name tests
+../certman/tx509/Data/dnames/dn_email_mixed.der /epoc32/winscw/c/tx509/data/dnames/dn_email_mixed.der
+../certman/tx509/Data/dnames/dn_email_lc.der /epoc32/winscw/c/tx509/data/dnames/dn_email_lc.der
+../certman/tx509/Data/dnames/dn_printable_lc.der /epoc32/winscw/c/tx509/data/dnames/dn_printable_lc.der
+../certman/tx509/Data/dnames/dn_printable_mixed.der /epoc32/winscw/c/tx509/data/dnames/dn_printable_mixed.der
+../certman/tx509/Data/dnames/dn_utf8_lc.der /epoc32/winscw/c/tx509/data/dnames/dn_utf8_lc.der
+../certman/tx509/Data/dnames/dn_utf8_mixed.der /epoc32/winscw/c/tx509/data/dnames/dn_utf8_mixed.der
+../certman/tx509/Data/dnames/dn_unstructuredname_lc.der /epoc32/winscw/c/tx509/data/dnames/dn_unstructuredname_lc.der
+../certman/tx509/Data/dnames/dn_unstructuredname_mixed.der /epoc32/winscw/c/tx509/data/dnames/dn_unstructuredname_mixed.der
+../common/test/trecog/data/noversion.cer /epoc32/winscw/c/trecog/noversion.cer
+../common/test/trecog/data/serialnumberlengthFF.der /epoc32/winscw/c/trecog/serialnumberlengthff.der
+../common/test/trecog/data/user.der /epoc32/winscw/c/trecog/user.der
+../common/test/trecog/data/x509v1.cer /epoc32/winscw/c/trecog/x509v1.cer
+../common/test/trecog/data/longserialnumber.der /epoc32/winscw/c/trecog/longserialnumber.der
+
+// Filetokens Component
+../filetokens/test/tkeystore/data/pkcs8dsa1_des3_embed.der /epoc32/winscw/c/tkeystore/data/pkcs8dsa1_des3_embed.der
+../filetokens/test/tkeystore/data/pkcs8dsa1_des3_nsdh.der /epoc32/winscw/c/tkeystore/data/pkcs8dsa1_des3_nsdh.der
+../filetokens/test/tkeystore/data/pkcs8rsa1_3des.der /epoc32/winscw/c/tkeystore/data/pkcs8rsa1_3des.der
+../filetokens/test/tkeystore/data/pkcs8rsa1_des3_nooctet.der /epoc32/winscw/c/tkeystore/data/pkcs8rsa1_des3_nooctet.der
+../filetokens/test/tkeystore/data/pkcs8rsa1_rc2.der /epoc32/winscw/c/tkeystore/data/pkcs8rsa1_rc2.der
+../filetokens/test/tkeystore/data/pkcs8rsa1_rc4.der /epoc32/winscw/c/tkeystore/data/pkcs8rsa1_rc4.der
+../filetokens/test/ttesttools/data/corrupt.cer /epoc32/winscw/c/tcertstore/corrupt.cer
+../filetokens/test/ttesttools/data/empty.cer /epoc32/winscw/c/tcertstore/empty.cer
+
+// security_tools certs and stores containing certs
+../security_tools/tcertapp/cacerts.dat /epoc32/winscw/c/security_tools/tcertapp/cacerts.dat
+../security_tools/tcertapp/cacerts_new.dat /epoc32/winscw/c/security_tools/tcertapp/cacerts_new.dat
+../security_tools/tcertapp/cert0.der /epoc32/winscw/c/security_tools/tcertapp/cert0.der
+../certman/tpkcs12intgrtn/data/root5ca.der /epoc32/winscw/c/security_tools/tcertapp/swicertstore_cert0.der
+../security_tools/tcertapp/certclients.dat /epoc32/winscw/c/security_tools/tcertapp/certclients.dat
+../security_tools/tcertapp/swicertstore.dat /epoc32/winscw/c/security_tools/tcertapp/swicertstore.dat
+../security_tools/tcertapp/swicertstore_mandatory.dat /epoc32/winscw/c/security_tools/tcertapp/swicertstore_mandatory.dat
+../security_tools/tcertapp/swicertstore_sucert.dat /epoc32/winscw/c/security_tools/tcertapp/swicertstore_sucert.dat
+../security_tools/tcertapp/teststore1.dat /epoc32/winscw/c/security_tools/tcertapp/teststore1.dat
+../security_tools/tcertapp/teststore3.dat /epoc32/winscw/c/security_tools/tcertapp/teststore3.dat
+../security_tools/tcertapp/teststore2.dat /epoc32/winscw/c/security_tools/tcertapp/teststore2.dat
+../security_tools/tcertapp/root5ca.pem /epoc32/winscw/c/security_tools/tcertapp/root5ca.pem
+../security_tools/tcertapp/certclients_0.dat /epoc32/winscw/c/security_tools/tcertapp/certclients_0.dat
\ No newline at end of file
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/cacerts.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/cacerts_new.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/cert0.der has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/certclients.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/certclients_0.dat has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/root5ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/swicertstore.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/swicertstore_mandatory.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/swicertstore_sucert.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/teststore1.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/teststore2.dat has changed
Binary file cryptomgmtlibs/securitytestfw/testcertificates/security_tools/tcertapp/teststore3.dat has changed
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/certificatesnotinstore/ebook_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIICXgIBAAKBgQC5hX3rlH5bWLL42sOxRbDLFyDH1AyJDbd8QqX0I8hFsX+ZDAJ5
+59TdDUzKYh3bFoqcd9rrWI4BnVFbmsOEaXKFLxjlWReIAxy28TYFys+ChZcdDefp
+HnWAPVw5aFvw9CetwYPYG4fmc414r88DVSDGcKSn4ZxiVE6EUPNCkeHw4wIDAQAB
+AoGAAptuppXipLP9Z+PjJiWdk20Sx9wiBPcNYhCptmGeWeRhr6vsiPwKEMU0FBAG
+7WJGtmY0zGPlMv6b+xaUstKsik57QfZPtj92tVzZCYbZV99GsiNgkvj4Ht6bTwPG
+mcx+XLWHShljgS8u1kvvNsllUK9NrQFVkL4ynUEkR+Weq0ECQQDhAe4wcD4eR7ZR
+1sv0T+Ny1LtpPIT1DPSfJWaLsZfa/M9tq5HKheZsl1UkT9GeDrRUOixTkRINUbMJ
+vB/wTvahAkEA0xM6i2tfP3Vu0Usb2ZeadCo5Cnt8MXF8IM4jclBoXBxbt6Hl9Eeb
+xVt14lsjF35zx9D2sBMTMTUeEAffHWLtAwJBAKiJaqFLoavKqUzZqEFiiYqcv5gO
+5cQrpRuDxzDBoG4+SRzrkzNwYm1aWULuqqNKflZMkKEzm6LwXDvhdsboTqECQQCj
+8K1qGC1UhotZ97Jb4MpQK3M+VwbxCCnW+QTDBvznfgcmq5KFlxC/yvfWpd6tosOe
+kQjpXQdtEsqUvOhoVKutAkEAlOmVvA1ZajLUuatXbXEFbQIz9of9uBkc2Ur+criB
+6Ox7VUckfn3NtPGyZVnQ5VXhTnyz+ObOqiL7sCeHn4pMsQ==
+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/certificatesnotinstore/pool_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/certificatesnotinstore/selfsigned_cert.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,22 @@
+-----BEGIN CERTIFICATE-----
+MIIDrTCCAxagAwIBAgIBADANBgkqhkiG9w0BAQQFADCBnDELMAkGA1UEBhMCSU4x
+EjAQBgNVBAgTCUthcm5hdGFrYTESMBAGA1UEBxMJQmFuZ2Fsb3JlMRAwDgYDVQQK
+EwdTeW1iaWFuMQ8wDQYDVQQLEwZDcnlwdG8xGDAWBgNVBAMTD3d3dy5zeW1iaWFu
+LmNvbTEoMCYGCSqGSIb3DQEJARYZcmFqZXNoLmpvc2VwaEBzeW1iaWFuLmNvbTAe
+Fw0wNjExMTYwNTU2MTlaFw0wNjEyMTYwNTU2MTlaMIGcMQswCQYDVQQGEwJJTjES
+MBAGA1UECBMJS2FybmF0YWthMRIwEAYDVQQHEwlCYW5nYWxvcmUxEDAOBgNVBAoT
+B1N5bWJpYW4xDzANBgNVBAsTBkNyeXB0bzEYMBYGA1UEAxMPd3d3LnN5bWJpYW4u
+Y29tMSgwJgYJKoZIhvcNAQkBFhlyYWplc2guam9zZXBoQHN5bWJpYW4uY29tMIGf
+MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDu3LQX/3Qdk0QDxN2ioeLI+woi9qAv
+QYLqyUA0sUrgMQN2WVe0qEJSNbYxCe4QwD7eb6jjTcF9BIaHUYAI/nX7p2M7yEol
+VZQ37Nc4RA2Ui2rDa+BhF1t7qSyr2DWQEOe+bp+E1SIDnnWEwRPIflOOUAdlk6jx
+ikUo4dDFZkDlMQIDAQABo4H8MIH5MB0GA1UdDgQWBBTTQKKFUc0LoAjUvoNDYnQq
+AniKNjCByQYDVR0jBIHBMIG+gBTTQKKFUc0LoAjUvoNDYnQqAniKNqGBoqSBnzCB
+nDELMAkGA1UEBhMCSU4xEjAQBgNVBAgTCUthcm5hdGFrYTESMBAGA1UEBxMJQmFu
+Z2Fsb3JlMRAwDgYDVQQKEwdTeW1iaWFuMQ8wDQYDVQQLEwZDcnlwdG8xGDAWBgNV
+BAMTD3d3dy5zeW1iaWFuLmNvbTEoMCYGCSqGSIb3DQEJARYZcmFqZXNoLmpvc2Vw
+aEBzeW1iaWFuLmNvbYIBADAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBBAUAA4GB
+AL6wmIOwcnQUjyV/TlftR3RG48Z5YYElIont8oU1QnjQlJ78QgX9jrGaooJ21Dw/
+m3oosYDPwUw9oY5QhB3Iu8iViI7JbermkMR0vdUG5TuuCCjZbzlSver9J4jTUud7
+W8Z4cvt2wYqIK79gKU04A3G7jw5EDEarjbdi5KGrkXnm
+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/certificatesnotinstore/selfsigned_key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIICXgIBAAKBgQDu3LQX/3Qdk0QDxN2ioeLI+woi9qAvQYLqyUA0sUrgMQN2WVe0
+qEJSNbYxCe4QwD7eb6jjTcF9BIaHUYAI/nX7p2M7yEolVZQ37Nc4RA2Ui2rDa+Bh
+F1t7qSyr2DWQEOe+bp+E1SIDnnWEwRPIflOOUAdlk6jxikUo4dDFZkDlMQIDAQAB
+AoGBAMYTCtzjnxxvZHVjqQ8WA4P6ePtpXIgTYUblQHLxmk+zFVXs3IgZB3Y4yC5+
+N4Z4hSnbmkdz0UGkoRJRiUTsDlTY5mQ68wwBJdWKlZIs2JoPV9kqg923UG9H8N5C
+fbxa3sv9wg4M7Xc7/0qTwAa2QMf/8BbOU5PWhto9q84OP9FhAkEA+QDySMsI41Yh
+XVW6JkF9rkjhJIfNBVk4QGfFDxWjFN58y32MOlzBGZP+j+o2916dlHr+CCMjLvyT
+6D/n4w61RQJBAPWSz1jRG6dqg85NP7y6URr7f/e2wDPlWNv/hMy0atkIAj1sD0bN
+avKWXoY0Nk+EEv5rS4/1TeFckeavjRf0wP0CQQCuZeBL5ZBjETcrFNjc5G+vOrId
+kNOilFuWmFdnekMPYcjMCTHGyqIgVQwtJeC7ntQFY6M6dcm1pge92cyCthF1AkAo
+zk5aCdU4ioCAZWGz8JnNjAEFnn5toSyU0e61PT2L9sK4hh47u6KL0OTAFCj6KY4m
+bJnPwAlC62jrFjyxwF/ZAkEAqu9ZmG293n73kis+r0FBHsJA25rtbTUcCBtSdv79
+w0gSxwmA+xT+JZXZHgptiLUZCYqTyGEpxU15QfphiC4vYA==
+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/root5ca/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/root5ca/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,14 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/symbiantestallcapabilitiesca/cakey.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,15 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/symbiantestallcapabilitiesca/careq.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN CERTIFICATE REQUEST-----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+-----END CERTIFICATE REQUEST-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/symbiantestallcapabilitiesca/symbiantestallcapabilitiesca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,18 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/symbiantestrootcadsa/ca.key.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,12 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/symbiantestrootcadsa/ca.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,19 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/testcertificates/ups/test/symbiantestrootcadsa/dsaparam.pem Fri Apr 02 10:15:22 2010 +0100
@@ -0,0 +1,6 @@
+-----BEGIN DSA PARAMETERS-----
+MIGdAkEAuge0Mq1oh1FS1UPU915suBNyGT6VBHZzqqDnbnLjvnE8FvZmGWKhwxvC
+cgbRMQpolX1dTZDk1f/MSZaUN50mMwIVAI8Zf1qgjHYqo5z+Y5SQCKviKkZRAkEA
+sumNlsR/gZc5EWxoDZM+XMC00bWn6jD4BgNEN7afWx+C0tnoAoST7WZBfZ8kEyXv
++QSFeXu3vwenpGLJLffd0A==
+-----END DSA PARAMETERS-----
--- a/cryptoplugins/cryptospiplugins/inc/cryptospi_testplugins.iby Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoplugins/cryptospiplugins/inc/cryptospi_testplugins.iby Fri Apr 02 10:15:22 2010 +0100
@@ -18,6 +18,7 @@
REM H4 Hardware Device Driver
#ifndef __SECURITY_NOTH4__
+#ifdef __SECURITY_MANDATORY_SWICERTSTORE__
// Proof of concept H4 driver (NOT supported)
#ifdef __SECURITY_TEST_ROM__
ROM_IMAGE[0] {
@@ -48,3 +49,4 @@
file=ABI_DIR\BUILD_DIR\temb.exe "sys\bin\temb.exe"
file=ABI_DIR\BUILD_DIR\tasync.exe "sys\bin\tasync.exe"
#endif
+#endif
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/cryptospihai.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/cryptospihai.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -36,7 +36,7 @@
DEFFILE cryptospihai.def
USERINCLUDE .
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
USERINCLUDE ../../../../../crypto/weakcryptospi/inc/spi
USERINCLUDE ../../../../../cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/dummyecchwplugin.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/dummyecchwplugin.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -38,7 +38,7 @@
USERINCLUDE .
USERINCLUDE ../../../../../crypto/weakcryptospi/inc/spi
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
SOURCEPATH ../src
SOURCE pluginentry.cpp
--- a/cryptoplugins/cryptospiplugins/test/h4drv/crypto_h4/cryptoh4.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoplugins/cryptospiplugins/test/h4drv/crypto_h4/cryptoh4.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -19,13 +19,13 @@
#define NO_EKERN_LIB
#include "kernel/kern_ext.mmh"
OS_LAYER_SYSTEMINCLUDE_SYMBIAN
-SYSTEMINCLUDE /epoc32/include/drivers
+SYMBIAN_BASE_SYSTEMINCLUDE(drivers)
#ifdef MARM
#include "omap2420.mmh"
-SYSTEMINCLUDE /epoc32/include/omap_hrp/h4
-SYSTEMINCLUDE /epoc32/include/omap_hrp/assp/shared
-SYSTEMINCLUDE /epoc32/include/omap_hrp/assp/omap24xx
+SYMBIAN_OMAP_HRP_SYSTEMINCLUDE(h4)
+SYMBIAN_OMAP_HRP_SYSTEMINCLUDE(assp/shared)
+SYMBIAN_OMAP_HRP_SYSTEMINCLUDE(assp/omap24xx)
#endif
USERINCLUDE .
--- a/cryptoservices/certificateandkeymgmt/bwins/X509_v2u.def Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/bwins/X509_v2u.def Fri Apr 02 10:15:22 2010 +0100
@@ -279,4 +279,5 @@
?NewL@CCertificateValidationWarnings@@SAPAV1@H@Z @ 278 NONAME ; class CCertificateValidationWarnings * CCertificateValidationWarnings::NewL(int)
?NewLC@CCertificateValidationWarnings@@SAPAV1@H@Z @ 279 NONAME ; class CCertificateValidationWarnings * CCertificateValidationWarnings::NewLC(int)
?Warnings@CCertificateValidationWarnings@@QBEABV?$RArray@VTValidationStatus@@@@XZ @ 280 NONAME ; class RArray<class TValidationStatus> const & CCertificateValidationWarnings::Warnings(void) const
+ ?SubjectKeyIdL@CX509Certificate@@QAE?AV?$TBuf8@$0BE@@@XZ @ 281 NONAME ; class TBuf8<20> CX509Certificate::SubjectKeyIdL(void)
--- a/cryptoservices/certificateandkeymgmt/eabi/x509_v2u.def Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/eabi/x509_v2u.def Fri Apr 02 10:15:22 2010 +0100
@@ -397,4 +397,5 @@
_ZNK30CCertificateValidationWarnings9CertIndexEv @ 396 NONAME
_ZTI30CCertificateValidationWarnings @ 397 NONAME
_ZTV30CCertificateValidationWarnings @ 398 NONAME
+ _ZN16CX509Certificate13SubjectKeyIdLEv @ 399 NONAME
--- a/cryptoservices/certificateandkeymgmt/group/bld.inf Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/group/bld.inf Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2001-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -31,8 +31,6 @@
// If there's no destination then the source file will be copied
// to the same name in /epoc32/include
-../group/makecertstore.ipr /epoc32/engdoc/tools/makecertstore.ipr
-
../inc/x509cert.h SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(x509cert.h)
../inc/x509keys.h SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(x509keys.h)
../inc/pkcs10attr.h SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(pkcs10attr.h)
@@ -505,6 +503,7 @@
../tcertstore/tdata/nrcertkey.txt /epoc32/winscw/c/tcertstore/data/nrcertkey.txt
../tcertstore/tdata/signcertkey2.txt /epoc32/winscw/c/tcertstore/data/signcertkey2.txt
../tcertstore/tdata/enciphersigncertkey2.txt /epoc32/winscw/c/tcertstore/data/enciphersigncertkey2.txt
+../tcertstore/tdata/SelfSignedPrivateKey_pk8.pk8 /epoc32/winscw/c/tcertstore/data/SelfSignedPrivateKey_pk8.pk8
../tcertstore/scripts/certstoreconcurrent1.txt /epoc32/winscw/c/tcertstoreconcurrent/scripts/certstoreconcurrent1.txt
../tcertstore/scripts/certstoreconcurrent2.txt /epoc32/winscw/c/tcertstoreconcurrent/scripts/certstoreconcurrent2.txt
--- a/cryptoservices/certificateandkeymgmt/group/makecertstore.ipr Sat Feb 27 23:09:01 2010 +0000
+++ /dev/null Thu Jan 01 00:00:00 1970 +0000
@@ -1,22 +0,0 @@
-[purpose]
-
-Creates a default certificate store, as used by the certificate
-management component. For use by licensees only for the purpose
-of creating a certificate store to be included within the ROM
-of a device.
-
-[categories]
-licensee
-
-[files]
-tools\makecertstore.bat
-release\winc\urel\makecertstore.exe
-
-[owner]
-Runtime & Tools # CERTMAN
-
-[IPR]
-Copyright (c) 2000 Symbian Ltd. All rights reserved.
-
-Makecertstore.exe can be freely distributed as a binary,
-but the source code requires an export licence.
--- a/cryptoservices/certificateandkeymgmt/group/security_certman.mrp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/group/security_certman.mrp Fri Apr 02 10:15:22 2010 +0100
@@ -2,7 +2,6 @@
source \sf\os\security\cryptoservices\certificateandkeymgmt
binary \sf\os\security\cryptoservices\certificateandkeymgmt\group all
exports \sf\os\security\cryptoservices\certificateandkeymgmt\group
--export_file \sf\os\security\cryptoservices\certificateandkeymgmt\group\makecertstore.ipr \epoc32\engdoc\tools\makecertstore.ipr
notes_source \component_defs\release.src
--- a/cryptoservices/certificateandkeymgmt/inc/x509cert.h Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/inc/x509cert.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 1998-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 1998-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -616,6 +616,13 @@
* @return The new X.509 certificate object. */
IMPORT_C static CX509Certificate* NewLC(const CX509Certificate& aCert);
+ /** Retrieves the subject key identifier of a certificate based on the decision whether
+ * it is a CA certificate or not. If it is a CA certificate then returns the stored subject key id
+ * as an extension in the certificate, any other certificate it returns the keyidentifier as
+ * calculated by Symbian's proprietary logic.
+ * @return The subject key identifier for the certificate. */
+ IMPORT_C TKeyIdentifier SubjectKeyIdL();
+
/** Destructor.
*
* Frees all resources owned by the object, prior to its destruction. */
--- a/cryptoservices/certificateandkeymgmt/tcertstore/T_unifiedcertstoreadd.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tcertstore/T_unifiedcertstoreadd.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2004-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -637,9 +637,8 @@
TPtr8 data(iKeyData->Des());
data.FillZ();
User::LeaveIfError(file.Read(data, fileSize));
- CleanupStack::Pop(1);
}
-
+ CleanupStack::Pop(1);
file.Close();
}
--- a/cryptoservices/certificateandkeymgmt/tcertstore/scripts/unifiedcertstore2-conf1.ini Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tcertstore/scripts/unifiedcertstore2-conf1.ini Fri Apr 02 10:15:22 2010 +0100
@@ -1,1071 +1,2333 @@
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-002]
+
<actionbody>
+
<name>A1</name>
+
<uid>1</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-003]
+
<actionbody>
+
<name>A2</name>
+
<uid>2</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-004]
+
<actionbody>
+
<name>A3</name>
+
<uid>3</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-005]
+
<actionbody>
+
<name>A4</name>
+
<uid>4</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-007]
+
<actionbody>
+
<ImportData>rsacertkey1.txt</ImportData>
+
<keyusage>AllUsagesButNR</keyusage>
+
<keylabel>*IMPORTED* RSA key 1</keylabel>
+
<keyaccesstype>Extractable</keyaccesstype>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-008]
+
<actionbody>
+
<ImportData>rsacertkey2.txt</ImportData>
+
<keyusage>AllUsagesButNR</keyusage>
+
<keylabel>*IMPORTED* RSA key 2</keylabel>
+
<keyaccesstype>Extractable</keyaccesstype>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-009]
+
<actionbody>
+
<ImportData>rsacertkey3.txt</ImportData>
+
<keyusage>AllUsagesButNR</keyusage>
+
<keylabel>*IMPORTED* RSA key 3</keylabel>
+
<keyaccesstype>Extractable</keyaccesstype>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-010]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-011]
+
<actionbody>
+
<label>*.*</label>
+
<deleteallcerts>1</deleteallcerts>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-012]
+
<actionbody>
+
<format>X509</format>
+
<label>BadUserCert</label>
+
<issuerkey></issuerkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-013]
+
<actionbody>
+
<format>X509</format>
+
<label>BadUserCert</label>
+
<issuerkey></issuerkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX2.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-014]
+
<actionbody>
+
<format>X509</format>
+
<label>BadUserCert</label>
+
<issuerkey></issuerkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX3.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-015]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-016]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX2</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX2.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-017]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX3</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX3.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-018]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-019]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-020]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
<issuerdn>c:\unifiedcertstore2\CAX1.cer</issuerdn>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-021]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
<issuerdn>c:\unifiedcertstore2\CAX1.cer</issuerdn>
+
<issuerdn>c:\unifiedcertstore2\CAX2.cer</issuerdn>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-022]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
<issuerdn>c:\unifiedcertstore2\CAX1.cer</issuerdn>
+
<issuerdn>c:\unifiedcertstore2\CAX2.cer</issuerdn>
+
<issuerdn>c:\unifiedcertstore2\CAX3.cer</issuerdn>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-024]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-025]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-026]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
<label>CAX1</label>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0001-027]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
<label>CAX3</label>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-001]
+
<actionbody>
+
<format>WTLS</format>
+
<label>CAW1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAW1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-002]
+
<actionbody>
+
<format>WTLS</format>
+
<label>CAW2</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAW2.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-003]
+
<actionbody>
+
<format>WTLS</format>
+
<label>CAW3</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAW3.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-004]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-005]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
<issuerdn>c:\unifiedcertstore2\CAX1.cer</issuerdn>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-006]
+
<actionbody>
+
<label>CAW1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-008]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002-009]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-001]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2 3</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-002]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 1 1</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-003]
+
<actionbody>
+
<label>CAX1</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-004]
+
<actionbody>
+
<label>CAX2</label>
+
<uid>1</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-005]
+
<actionbody>
+
<label>CAX2</label>
+
<uid>1 2 1</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-006]
+
<actionbody>
+
<label>CAX2</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-007]
+
<actionbody>
+
<label>CAX3</label>
+
<uid></uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-008]
+
<actionbody>
+
<label>CAX3</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-009]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2 3</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-010]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-011]
+
<actionbody>
+
<label>CAX2</label>
+
</actionbody>
+
<actionresult>
+
<uid>1</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-012]
+
<actionbody>
+
<label>CAX2</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-013]
+
<actionbody>
+
<label>CAX3</label>
+
</actionbody>
+
<actionresult>
+
<uid></uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-014]
+
<actionbody>
+
<label>CAX3</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-015]
+
<actionbody>
+
<label>CAW2</label>
+
<uid>1 2 3</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-016]
+
<actionbody>
+
<label>CAW2</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-017]
+
<actionbody>
+
<label>CAW3</label>
+
<uid>1 2</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-018]
+
<actionbody>
+
<label>CAW3</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-019]
+
<actionbody>
+
<label>CAW1</label>
+
</actionbody>
+
<actionresult>
+
<uid></uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-020]
+
<actionbody>
+
<label>CAW1</label>
+
</actionbody>
+
<actionresult>
+
<trust>0</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-021]
+
<actionbody>
+
<label>CAW2</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2 3</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-022]
+
<actionbody>
+
<label>CAW2</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-023]
+
<actionbody>
+
<label>CAW3</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0003-024]
+
<actionbody>
+
<label>CAW3</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0004-001]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0004-002]
+
<actionbody>
+
<label>CAX1</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0004-003]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0004-004]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0005-001]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2 3 4</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0005-002]
+
<actionbody>
+
<label>CAX1</label>
+
<trust>0</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0005-003]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2 3 4</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0005-004]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<trust>0</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0006-001]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2 3</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0006-002]
+
<actionbody>
+
<label>CAX1</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0006-003]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2 3</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0006-004]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<trust>1</trust>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0007-001]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2 3 4 5</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0007-002]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2 3</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0007-003]
+
<actionbody>
+
<label>CAX1</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0007-004]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2 3 4</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0007-005]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1 2 3 4 5 7 8 9</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0007-006]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
<actionresult>
+
<uid>1 2 3 4</uid>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-001]
+
<actionbody>
+
<format>X509</format>
+
<label>rsacert1</label>
+
<issuerkey></issuerkey>
+
<subjectkey>4808f03892fe836e78d048bcefcca4a37913d886</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\rsacert1.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-002]
+
<actionbody>
+
<format>X509</format>
+
<label>rsacert2</label>
+
<issuerkey></issuerkey>
+
<subjectkey>dc448293c7c3ed68c9fabd37db43007136ae2ef4</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\rsacert2.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-003]
+
<actionbody>
+
<format>X509</format>
+
<label>rsacert3</label>
+
<issuerkey></issuerkey>
+
<subjectkey>0b2e1d1d4dbae5fc59a02a5115d2c2910fa796e0</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\rsacert3.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-004]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAX3</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW1</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW2</label></CCTCertInfo>
+
<CCTCertInfo><label>CAW3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-005]
+
<actionbody>
+
<filter>
+
<ownertype>user</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>rsacert1</label></CCTCertInfo>
+
<CCTCertInfo><label>rsacert2</label></CCTCertInfo>
+
<CCTCertInfo><label>rsacert3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-006]
+
<actionbody>
+
<filter>
+
<ownertype>user</ownertype>
+
</filter>
+
<issuerdn>c:\unifiedcertstore2\rsacert1.cer</issuerdn>
+
</actionbody>
+
<actionresult>
+
// All 3 user certs have same issuer
+
<CCTCertInfo><label>rsacert1</label></CCTCertInfo>
+
<CCTCertInfo><label>rsacert2</label></CCTCertInfo>
+
<CCTCertInfo><label>rsacert3</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-007]
+
<actionbody>
+
<filter>
+
<ownertype>user</ownertype>
+
</filter>
+
<issuerdn>c:\unifiedcertstore2\CAX1.cer</issuerdn>
+
</actionbody>
+
<actionresult>
+
// No user certs with this DN expected
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-008]
+
<actionbody>
+
<label>rsacert1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-009]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-010]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX2</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-011]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX3</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-012]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAW1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-013]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAW2</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-014]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAW3</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-015]
+
<actionbody>
+
<certtype>user</certtype>
+
<label>rsacert1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-016]
+
<actionbody>
+
<certtype>user</certtype>
+
<label>rsacert2</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0008-017]
+
<actionbody>
+
<certtype>user</certtype>
+
<label>rsacert3</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0009-001]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0009-002]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0009-003]
+
<actionbody>
+
<filter>
+
<ownertype>user</ownertype>
+
</filter>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0010-001]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0010-002]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0010-003]
+
<actionbody>
+
<filter>
+
<ownertype>ca</ownertype>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>CAX1</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0010-004]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>7</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0011-001]
+
<actionbody>
+
<format>X509</format>
+
<label>U5K3</label>
+
<issuerkey></issuerkey>
+
<subjectkey>eeda2c6da84f17519ee837eadb8a5289dadfbb26</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\U5K3.crt</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0011-002]
+
<actionbody>
+
<format>X509</format>
+
<label>U6K5</label>
+
<issuerkey></issuerkey>
+
<subjectkey>eeda2c6da84f17519ee837eadb8a5289dadf0000</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\U6K5.crt</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0011-003]
+
<actionbody>
+
<format>X509URL</format>
+
<label>URL3K5</label>
+
<issuerkey></issuerkey>
+
<subjectkey>eeda2c6da84f17519ee837eadb8a5289dadf0000</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\URL3K5.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0011-004]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-001]
+
<actionbody>
+
<format>WTLS</format>
+
<label>CAW1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAW1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-002]
+
<actionbody>
+
<format>WTLS</format>
+
<label>CAW1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAW1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-003]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-004]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-005]
+
<actionbody>
+
<format>X509</format>
+
<label>rsacert3</label>
+
<subjectkeyid>0b2e1d1d4dbae5fc59a02a5115d2c2910fa796e0</subjectkeyid>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\rsacert3.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-006]
+
<actionbody>
+
<format>X509</format>
+
<label>rsacert3</label>
+
<subjectkeyid>0b2e1d1d4dbae5fc59a02a5115d2c2910fa796e0</subjectkeyid>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\rsacert3.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-007]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-008]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAW1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0012-009]
+
<actionbody>
+
<certtype>user</certtype>
+
<label>rsacert3</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-001]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-002]
+
<actionbody>
+
<format>WTLS</format>
+
<label>CAW1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAW1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-003]
+
<actionbody>
+
<format>X509URL</format>
+
<label>URL1rsa1</label>
+
<issuerkey></issuerkey>
+
<subjectkey>4808f03892fe836e78d048bcefcca4a37913d886</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\URL1K1.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-004]
+
<actionbody>
+
<format>X509URL</format>
+
<label>URL2rsa2</label>
+
<issuerkey></issuerkey>
+
<subjectkey>dc448293c7c3ed68c9fabd37db43007136ae2ef4</subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\URL2K2.cer</certfile>
+
<certowner>user</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-005]
+
<actionbody>
+
<filter>
+
<ownertype>user</ownertype>
+
<formatflags>X509URL</formatflags>
+
</filter>
+
</actionbody>
+
<actionresult>
+
<CCTCertInfo><label>URL1rsa1</label></CCTCertInfo>
+
<CCTCertInfo><label>URL2rsa2</label></CCTCertInfo>
+
</actionresult>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-006]
+
<actionbody>
+
<label>URL1rsa1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-007]
+
<actionbody>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-008]
+
<actionbody>
+
<label>CAW1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-009]
+
<actionbody>
+
<label>U1K1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-010]
+
<actionbody>
+
<label>URL2rsa2</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0013-011]
+
<actionbody>
+
<label>URL1rsa1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-001]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-002]
+
<actionbody>
+
<format>X509</format>
+
<label>CAX1</label>
+
<issuerkey></issuerkey>
+
<subjectkey></subjectkey>
+
<certstore>0</certstore>
+
<certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
<certowner>ca</certowner>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-004]
+
<actionbody>
+
<mode>read</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-005]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-006]
+
<actionbody>
+
<label>CAX1</label>
+
<uid>1</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-007]
+
<actionbody>
+
<label>CAX1</label>
+
<trust>1</trust>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-009]
+
<actionbody>
+
<mode>write</mode>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-010]
+
<actionbody>
+
<certtype>ca</certtype>
+
<label>CAX1</label>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014-011]
+
<actionbody>
+
<label>*.*</label>
+
<deleteallcerts>1</deleteallcerts>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0015-002]
+
<actionbody>
+
<uid>1</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0015-003]
+
<actionbody>
+
<uid>2</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0015-004]
+
<actionbody>
+
<uid>3</uid>
+
</actionbody>
+
+
[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0015-005]
+
<actionbody>
+
<uid>4</uid>
+
</actionbody>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-001]
+
+<actionbody>
+
+ <mode>write</mode>
+
+</actionbody>
+
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-002]
+
+<actionbody>
+
+ <certtype>ca</certtype>
+ <label>*.*</label>
+ <deleteallcerts>1</deleteallcerts>
+
+</actionbody>
+
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-003]
+
+<actionbody>
+
+ <ImportData>rsacertkey3.txt</ImportData>
+
+ <keyusage>AllUsagesButNR</keyusage>
+
+ <keylabel>Add RSA key 3</keylabel>
+
+ <keyaccesstype>Extractable</keyaccesstype>
+
+</actionbody>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-004]
+
+<actionbody>
+
+ <format>X509</format>
+
+ <label>rsacert3</label>
+
+ <subjectkeyid></subjectkeyid>
+
+ <certstore>0</certstore>
+
+ <certfile>c:\unifiedcertstore2\rsacert3.cer</certfile>
+
+ <certowner>user</certowner>
+
+</actionbody>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-005]
+
+<actionbody>
+
+ <filter>
+
+ <usesubjectkeyid>c:\unifiedcertstore2\rsacert3.cer</usesubjectkeyid>
+
+ </filter>
+
+</actionbody>
+
+<actionresult>
+
+ <CCTCertInfo><label>rsacert3</label></CCTCertInfo>
+
+</actionresult>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-006]
+
+<actionbody>
+
+ <certtype>user</certtype>
+
+ <label>rsacert3</label>
+
+</actionbody>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-007]
+
+<actionbody>
+
+ <ImportData>SelfSignedPrivateKey_pk8.pk8</ImportData>
+
+ <keyusage>AllUsagesButNR</keyusage>
+
+ <keylabel>selfsignedprivatekey</keylabel>
+
+ <keyaccesstype>Extractable</keyaccesstype>
+
+</actionbody>
+
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-008]
+
+<actionbody>
+
+ <format>X509</format>
+
+ <label>selfsignedcert</label>
+
+ <issuerkey></issuerkey>
+
+ <subjectkey></subjectkey>
+
+ <certstore>0</certstore>
+
+ <certfile>c:\tcertstore\data\SelfSignedCertificate.der</certfile>
+
+ <certowner>user</certowner>
+
+</actionbody>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-009]
+
+<actionbody>
+
+ <filter>
+
+ <usesubjectkeyid>c:\tcertstore\data\SelfSignedCertificate.der</usesubjectkeyid>
+
+ </filter>
+
+</actionbody>
+
+<actionresult>
+
+ <CCTCertInfo><label>selfsignedcert</label></CCTCertInfo>
+
+</actionresult>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-010]
+
+<actionbody>
+
+ <certtype>user</certtype>
+
+ <label>selfsignedcert</label>
+
+</actionbody>
+
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-011]
+
+<actionbody>
+
+ <format>X509</format>
+
+ <label>cacert</label>
+
+ <issuerkey></issuerkey>
+
+ <subjectkey></subjectkey>
+
+ <certstore>0</certstore>
+
+ <certfile>c:\unifiedcertstore2\CAX1.cer</certfile>
+
+ <certowner>ca</certowner>
+
+</actionbody>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-012]
+
+<actionbody>
+
+ <filter>
+
+ <usesubjectkeyid>c:\unifiedcertstore2\CAX1.cer</usesubjectkeyid>
+
+ </filter>
+
+</actionbody>
+
+<actionresult>
+
+ <CCTCertInfo><label>cacert</label></CCTCertInfo>
+
+</actionresult>
+
+[SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-013]
+
+<actionbody>
+
+ <certtype>ca</certtype>
+
+ <label>cacert</label>
+
+</actionbody>
+
--- a/cryptoservices/certificateandkeymgmt/tcertstore/scripts/unifiedcertstore2-conf1.script Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tcertstore/scripts/unifiedcertstore2-conf1.script Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// Copyright (c) 2009-2010 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of the License "Eclipse Public License v1.0"
@@ -137,7 +137,6 @@
-
START_TESTCASE SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002
//! @SYMTestCaseID SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0002
@@ -751,7 +750,55 @@
END_TESTCASE SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0014
+START_TESTCASE SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId
+//! @SYMTestCaseID SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId
+
+//! @SYMTestCaseDesc 4.1 Test cases for cheking the retrieval of certificates based on subject key identifier.
+
+//!
+
+//! @SYMTestActions 1) No Test, Add a private key (rsacertkey)
+
+//! 2) No Test,Add the end entity certificate (rsacert1) without specifying the subject keyid.
+
+//! 3) Filter the certificate based on subject key id.
+
+//! 4) No Test,Add a self signed certificate
+
+//! 5) Filter the self signed certificate based on subject key id.
+
+//! 6) No Test,Add a CA certificate
+
+//! 7) Filter the CA certificate based on subject key id.
+
+RUN_TEST_STEP -1 CTestHandler init unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-001
+
+RUN_TEST_STEP -1 CTestHandler deletecert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-002
+
+RUN_TEST_STEP -1 CTestHandler importkey unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-003
+
+RUN_TEST_STEP -1 CTestHandler addcert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-004
+
+RUN_TEST_STEP -1 CTestHandler listcert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-005
+
+RUN_TEST_STEP -1 CTestHandler deletecert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-006
+
+RUN_TEST_STEP -1 CTestHandler importkey unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-007
+
+RUN_TEST_STEP -1 CTestHandler addcert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-008
+
+RUN_TEST_STEP -1 CTestHandler listcert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-009
+
+RUN_TEST_STEP -1 CTestHandler deletecert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-010
+
+RUN_TEST_STEP -1 CTestHandler addcert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-011
+
+RUN_TEST_STEP -1 CTestHandler listcert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-012
+
+RUN_TEST_STEP -1 CTestHandler deletecert unifiedcertstore2-conf1.ini SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId-013
+
+END_TESTCASE SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-FilterOnSubjectKeyId
START_TESTCASE SEC-CERTMAN-UNIFIEDCERTSTORE2-CONF1-0015
--- a/cryptoservices/certificateandkeymgmt/tcertstore/t_certstoredefs.h Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tcertstore/t_certstoredefs.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2004-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -151,6 +151,8 @@
_LIT8(KSubjectKeyIdEnd,"</subjectkeyid>");
_LIT8(KIssuerKeyIdStart,"<issuerkeyid>");
_LIT8(KIssuerKeyIdEnd,"</issuerkeyid>");
+_LIT8(KUseSubjectKeyIdStart,"<usesubjectkeyid>");
+_LIT8(KUseSubjectKeyIdEnd,"</usesubjectkeyid>");
// tag for Notification of Change
_LIT8(KChangeNotifiedStart, "<ChangeNotification>");
--- a/cryptoservices/certificateandkeymgmt/tcertstore/t_filter.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tcertstore/t_filter.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -22,6 +22,7 @@
#include "t_certstoredefs.h"
#include <ccertattributefilter.h>
+#include <x509cert.h>
CCertAttributeFilter* CFilter::NewL(Output& aOut,
const TDesC8& aFilter)
@@ -81,6 +82,10 @@
// Set subjetkeyid filter
SetIssuerKeyIdFilter(Input::ParseElement(aFilter, KIssuerKeyIdStart));
+
+ // Set subjetkeyid using the certificate details
+ SetSubjectKeyIdFromCertFilterL(Input::ParseElement(aFilter, KUseSubjectKeyIdStart));
+
}
void CFilter::SetLabelFilter(const TDesC8& aLabel)
@@ -386,4 +391,22 @@
}
}
+void CFilter::SetSubjectKeyIdFromCertFilterL(const TDesC8& aCertPath)
+ {
+ if(aCertPath != KNullDesC8)
+ {
+ RFs fs;
+ User::LeaveIfError(fs.Connect());
+ CleanupClosePushL(fs);
+ TFileName filename;
+ filename.Copy(aCertPath);
+ HBufC8* buf = Input::ReadFileL(filename, fs);
+ CleanupStack::PushL(buf);
+ CX509Certificate* cert = CX509Certificate::NewLC(buf->Des());
+ TKeyIdentifier id = cert->SubjectKeyIdL();
+ CleanupStack::PopAndDestroy(3, &fs); // buf, cert, fs
+ iFilter->SetSubjectKeyId(id);
+ }
+ }
+
CCertAttributeFilter* CFilter::iFilter = NULL;
--- a/cryptoservices/certificateandkeymgmt/tcertstore/t_filter.h Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tcertstore/t_filter.h Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -64,7 +64,9 @@
void SetSubjectKeyIdFilter(const TDesC8& aSubjectKeyId);
// Sets the issuerkeyid which is synonymous to the authority key identifier.
void SetIssuerKeyIdFilter(const TDesC8& aIssuerKeyId);
-
+ // Sets the subjetkeyid filter using the certificate.
+ void SetSubjectKeyIdFromCertFilterL(const TDesC8& aCertPath);
+
private:
static CCertAttributeFilter* iFilter;
Output& iOut;
Binary file cryptoservices/certificateandkeymgmt/tcertstore/tdata/selfsignedprivatekey_pk8.pk8 has changed
--- a/cryptoservices/certificateandkeymgmt/tpkixcert_tef/scripts/validatetests.ini Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/tpkixcert_tef/scripts/validatetests.ini Fri Apr 02 10:15:22 2010 +0100
@@ -80,8 +80,6 @@
endentity=c:\tpkixcert_tef\data\fulltrust.der
rootcert-01=c:\tpkixcert_tef\data\fulltrust.der
oid-01=2.5.29.19
-cert-00critoid-01=2.5.29.19
-cert-01critoid-01=2.5.29.19
error=0
numberofcerts=2
--- a/cryptoservices/certificateandkeymgmt/x509/x509cert.cpp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/certificateandkeymgmt/x509/x509cert.cpp Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 1998-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 1998-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -1337,3 +1337,30 @@
return KeyIdentifierL();
}
+
+EXPORT_C TKeyIdentifier CX509Certificate::SubjectKeyIdL()
+ {
+ // if it is a v1 or v2 type then there is no way of knowing which is a CA, treat all certs as CA as done in the certificate recognizer.
+ if (Version() != 3 )
+ {
+ return SubjectKeyIdentifierL();
+ }
+
+ // if it is x509 v3 certificate then check for the basic constraint extension.
+ const CX509CertExtension* ext = Extension(KBasicConstraints);
+ if (ext)
+ {
+ CX509BasicConstraintsExt* basic = CX509BasicConstraintsExt::NewLC(ext->Data());
+ TBool markedAsCA = basic->IsCA();
+ CleanupStack::PopAndDestroy(basic);
+ // it can be an intermediate as well as root CA
+ if ( markedAsCA )
+ {
+ return SubjectKeyIdentifierL();
+ }
+ }
+ // For non-CA certs, use the recommended method of computing it from RFC5280, section 4.2.1.2
+ return KeyIdentifierL();
+
+ }
+
--- a/cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -40,7 +40,7 @@
SOURCEPATH ../thwkeystore/common
SOURCE tkeydetails.cpp
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
USERINCLUDE .
USERINCLUDE ../thwkeystore/common
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -37,13 +37,13 @@
target 101faaaa.rsc
end
-SYSTEMINCLUDE /epoc32/include
+OS_LAYER_SYSTEMINCLUDE
/*
* Need to put "/epoc32/include/ecom" as one of the system includes
* as cryptotokenregistryinfo.rh has the line, '#include "registryinfo.rh"'
* in place of '#include <ecom/registryinfo.rh>'
*/
-SYSTEMINCLUDE /epoc32/include/ecom
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
USERINCLUDE .
USERINCLUDE ../../../../../crypto/weakcryptospi/inc
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/tkeystore.mmp Sat Feb 27 23:09:01 2010 +0000
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/tkeystore.mmp Fri Apr 02 10:15:22 2010 +0100
@@ -80,11 +80,11 @@
USERINCLUDE ../../../../crypto/weakcrypto/inc
USERINCLUDE ../../source/generic/client
USERINCLUDE ../../source/generic/common
-OS_LAYER_SYSTEMINCLUDE
+OS_LAYER_SYSTEMINCLUDE_SYMBIAN
USERINCLUDE ../../Inc
#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-SYSTEMINCLUDE /epoc32/include/cryptospi
+SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(cryptospi)
#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
LIBRARY euser.lib efsrv.lib ecom.lib cryptography.lib
--- a/package_definition.xml Sat Feb 27 23:09:01 2010 +0000
+++ b/package_definition.xml Fri Apr 02 10:15:22 2010 +0100
@@ -24,6 +24,9 @@
<component id="referencedrmagent" name="Reference DRM Agent" introduced="8.0" purpose="development">
<unit bldFile="contentmgmt/referencedrmagent/RefTestAgent/group" mrp="contentmgmt/referencedrmagent/RefTestAgent/group/security_rta.mrp"/>
</component>
+ <component id="cafstreamingsupport" name="CAF Streaming Support" introduced="^3" purpose="optional">
+ <unit bldFile="contentmgmt/cafstreamingsupport/group" mrp="contentmgmt/cafstreamingsupport/group/security_streamingcaf.mrp"/>
+ </component>
</collection>
<collection id="crypto" name="Crypto Libraries" level="libraries">
<component id="weakcryptospi" name="Weak Crypto SPI" filter="gt" introduced="^3" purpose="optional">
Binary file securityanddataprivacytools/securityconfig/conf/securityconfig.confml has changed
Binary file securityanddataprivacytools/securityconfig/conf/securityconfig_2001ea7f.crml has changed
Binary file securityanddataprivacytools/securityconfig/conf/securityconfig_2002b28b.crml has changed
--- a/securityanddataprivacytools/securityconfig/group/bld.inf Sat Feb 27 23:09:01 2010 +0000
+++ b/securityanddataprivacytools/securityconfig/group/bld.inf Fri Apr 02 10:15:22 2010 +0100
@@ -1,5 +1,5 @@
/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2006-2010 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
@@ -45,6 +45,9 @@
../conf/securityconfig.confml OS_LAYER_EXPORTS_CONFML(securityconfig.confml)
../conf/securityconfig_2001ea7f.crml OS_LAYER_EXPORTS_CRML(securityconfig_2001ea7f.crml)
+// crml file for customizing the OCSP central reposiroty settings - GenerateResponseForMissingUri and EnableGetHttpMethod.
+../conf/securityconfig_2002b28b.crml OS_LAYER_EXPORTS_CRML(securityconfig_2002b28b.crml)
+
PRJ_TESTEXPORTS
PRJ_MMPFILES